SlideShare a Scribd company logo
1 of 17
Download to read offline
DATA BREACH RISK INTELLIGENCE
FOR HIGHER ED
Financial prioritization of data breach risk in the
language of the C-suite
WHY?
Almost 1 million records were
stolen from just the top five
universities breached in 2014.
Data breaches are becoming front
and center in Boardrooms at
Higher Ed institutions.
…Yet data breach tools are
developed for yesterday’s IT.
Slow, disruptive to
students & staff
Discover data or
vulnerabilities, but not
both
Results not ready for
CFO and Board
presentations
False positives, unable to
scan largest servers
Not effective on Mac and
other platforms
ISCAN RISK INTELLIGENCE 

in dollars
prioritized
real-time
trends
Financial prioritization of data breach risk in the language of the C-suite
One tool does
it all
• Sensitive data
• Who has access
• Vulnerabilities
Know your
security number
Dollar value of risk liability per
device
Actionable
intelligence
Total risk exposure of
organization
C-level ready
dashboard
• Evidence of impact
• Board oversight
ISCAN ANSWERS KEY QUESTIONS FOR CISOS
What data is
at risk and
who has
access?
How can
attackers get
to it?
What will it
cost when
breached?
HOW ISCAN IS DIFFERENT
• Deploys rapidly, scans are faster and more accurate
• Detects big 3: sensitive data, access permissions and
vulnerabilities
• Admins can find hacker traps
• Provides actionable intelligence and financially
prioritizes data breach risk
• C-suite ready dashboard puts a dollar number on
your risk exposure
• Works well with popular education environments/
devices like Mac, iO, Ubuntu and Linux choices
All in
one tool
HOW DO WE DO IT? PATENTED
AGENTLESS DISCOVERY
Mobile
app
Command
line
Constant auto assessment across
all device types
Cloud-based lightweight
deployment with same day results
Millions of devices at one time
Active directory
Potential liability $
Data at Risk
• Social Security
numbers
• Driver’s licenses
• Birthdates
• Telephone numbers
• Credit card numbers
• Bank accounts
• Intellectual property
• Sensitive files
DATA BREACH RISK REPORT
PER DEVICE
Vulnerabilities
By severity
By vendor
Unauthorized
access
Configurations
INTELLIGENCE DASHBOARD
Like a Google map of your assets
Immediate liability costs/
prioritization displayed for
decision-making
Trends for tracking the impact of
initiatives
Ready for the Boardroom
INTEGRATION
Works with existing
technology investments in
Systems Management
and RMM tools
iScan Leading
competitor
Automatically find SSNs, IDs, Bank Accounts, Driver Licenses, Dates of Birth, Phone
Numbers, Addresses, Passports, Intellectual Property, Credit Cards, Patient Health Info
Find file patterns and MD5/SHA hashes – finds data theft artifacts, such as Cryptolocker, and
use for incidence response
Search files, e-mails and attachments on:
• File servers
• .zip files
• Outlook, Thunderbird, Apple Mail +
• Cloud storage folders including Dropbox, Skydrive, Google Drive, Box, Amazon Cloud Drive,
and more
• NAS
Search files on websites *
Search even the largest servers (1 TB+)
Schedule searches **
HOW WE COMPARE 1/3
* iScan searches the databases where form fill data resides
** iScan integrates with existing infrastructure for scheduled searches
iScan Leading
competitor
Works on:
• Windows XP - 8.1
• Windows Server - 2003 – 2012
• Linux 64 bit - RHEL 5+
• Mac OS X
Works on:
• CentOS 5+ Linux
• Oracle Linux
• Ubuntu
• Fedora
Works on mobile devices like tablets and smartphones
• Apple iOS 5 +
• Android 2.3 +
Effectively search both Mac and PC platforms
Manage data discovery without an agent
Non-intrusive, does not require scaling down resources on device
HOW WE COMPARE 2/3
HOW WE COMPARE 3/3 iScan Leading
competitor
View and manage by university, department or any sub group
Audit 3rd party devices “on the fly”
Receive results in your inbox daily
Fastest scanning available
Same day scalable implementation and results
Vulnerability scanning (How will data be breached)
View file permission access to sensitive data
Automatically calculates dollar value liability & financially prioritizes
Trend charts for monitoring impact
Intelligence dashboard for C-suite
One tool for data, access & vulnerabilities, and C-suite dashboard
IVY LEAGUE
UNIVERSITY
“We use iScan to report the
financial impact to our
Boardroom.
It also empowers our
students to self-assess their
computers.”
LIBERAL ARTS
UNIVERSITY
“We chose iScan Online as
the only vendor that could
complete the discovery of
sensitive data on our multi-
terabyte servers.”
RECOGNITION
Industry Innovator:
Analysis & Control
REMOTE SECURITY
SELF-ASSESSMENT
FRAMEWORK
Patent 9,032,520
Patent 8,819,773
TRY US FOR FREE
Sign up at
https://app.iscanonline.com/
THANK YOU
iscanonline.com

More Related Content

What's hot

Securing your IT infrastructure with SOC-NOC collaboration TWP
Securing your IT infrastructure with SOC-NOC collaboration TWPSecuring your IT infrastructure with SOC-NOC collaboration TWP
Securing your IT infrastructure with SOC-NOC collaboration TWP
Sridhar Karnam
 
Software Asset Management
Software Asset ManagementSoftware Asset Management
Software Asset Management
icomply
 
3 2006 06 cs6 4 gait principles v3a
3 2006 06 cs6 4 gait principles v3a3 2006 06 cs6 4 gait principles v3a
3 2006 06 cs6 4 gait principles v3a
Gene Kim
 
Information technology risks
Information technology risksInformation technology risks
Information technology risks
salman butt
 
Network operations center best practices (3)
Network operations center best practices (3)Network operations center best practices (3)
Network operations center best practices (3)
Gabby Nizri
 
Fortifying Cyber Defense: How to Act Now to Protect Global Supply Chains
Fortifying Cyber Defense: How to Act Now to Protect Global Supply ChainsFortifying Cyber Defense: How to Act Now to Protect Global Supply Chains
Fortifying Cyber Defense: How to Act Now to Protect Global Supply Chains
Ignyte Assurance Platform
 
SOC3D_Brochure_NEW_Digital
SOC3D_Brochure_NEW_DigitalSOC3D_Brochure_NEW_Digital
SOC3D_Brochure_NEW_Digital
Oscar Williams
 
Aicpa tech+panel presentation t6 managing risks and security 2014 v3
Aicpa tech+panel presentation t6 managing risks and security 2014 v3Aicpa tech+panel presentation t6 managing risks and security 2014 v3
Aicpa tech+panel presentation t6 managing risks and security 2014 v3
Doeren Mayhew
 

What's hot (20)

AMB410: ITxM: The ITAM, ITSM, and Security Crossroads
AMB410: ITxM: The ITAM, ITSM, and Security CrossroadsAMB410: ITxM: The ITAM, ITSM, and Security Crossroads
AMB410: ITxM: The ITAM, ITSM, and Security Crossroads
 
Securing your IT infrastructure with SOC-NOC collaboration TWP
Securing your IT infrastructure with SOC-NOC collaboration TWPSecuring your IT infrastructure with SOC-NOC collaboration TWP
Securing your IT infrastructure with SOC-NOC collaboration TWP
 
AMB110: IT Asset Management – How to Start When You Don’t Know Where to Start
AMB110: IT Asset Management – How to Start When You Don’t Know Where to StartAMB110: IT Asset Management – How to Start When You Don’t Know Where to Start
AMB110: IT Asset Management – How to Start When You Don’t Know Where to Start
 
Strengthening Security with Continuous Monitoring
Strengthening Security with Continuous MonitoringStrengthening Security with Continuous Monitoring
Strengthening Security with Continuous Monitoring
 
Software Asset Management
Software Asset ManagementSoftware Asset Management
Software Asset Management
 
CNIT 160 3a Information Risk Management
CNIT 160 3a Information Risk ManagementCNIT 160 3a Information Risk Management
CNIT 160 3a Information Risk Management
 
3 2006 06 cs6 4 gait principles v3a
3 2006 06 cs6 4 gait principles v3a3 2006 06 cs6 4 gait principles v3a
3 2006 06 cs6 4 gait principles v3a
 
Cyber Security Infographic
Cyber Security InfographicCyber Security Infographic
Cyber Security Infographic
 
Information technology risks
Information technology risksInformation technology risks
Information technology risks
 
Audit Sample Report
Audit Sample ReportAudit Sample Report
Audit Sample Report
 
Network operations center best practices (3)
Network operations center best practices (3)Network operations center best practices (3)
Network operations center best practices (3)
 
The value of our data
The value of our dataThe value of our data
The value of our data
 
Interset-advanced threat detection wp
Interset-advanced threat detection wpInterset-advanced threat detection wp
Interset-advanced threat detection wp
 
Effectively Defending Your IBM i from Malware with Multi-Factor Authentication
 Effectively Defending Your IBM i from Malware with Multi-Factor Authentication  Effectively Defending Your IBM i from Malware with Multi-Factor Authentication
Effectively Defending Your IBM i from Malware with Multi-Factor Authentication
 
Fortifying Cyber Defense: How to Act Now to Protect Global Supply Chains
Fortifying Cyber Defense: How to Act Now to Protect Global Supply ChainsFortifying Cyber Defense: How to Act Now to Protect Global Supply Chains
Fortifying Cyber Defense: How to Act Now to Protect Global Supply Chains
 
SOC3D_Brochure_NEW_Digital
SOC3D_Brochure_NEW_DigitalSOC3D_Brochure_NEW_Digital
SOC3D_Brochure_NEW_Digital
 
Energy Industry Organizational Strategies to Increase Cyber Resiliency
Energy Industry Organizational Strategies to Increase Cyber ResiliencyEnergy Industry Organizational Strategies to Increase Cyber Resiliency
Energy Industry Organizational Strategies to Increase Cyber Resiliency
 
[Webinar] Supercharging Security with Behavioral Analytics
[Webinar] Supercharging Security with Behavioral Analytics[Webinar] Supercharging Security with Behavioral Analytics
[Webinar] Supercharging Security with Behavioral Analytics
 
Aicpa tech+panel presentation t6 managing risks and security 2014 v3
Aicpa tech+panel presentation t6 managing risks and security 2014 v3Aicpa tech+panel presentation t6 managing risks and security 2014 v3
Aicpa tech+panel presentation t6 managing risks and security 2014 v3
 
Trust and Transformation: Peter Coffee at Cloud@KM 20110503
Trust and Transformation: Peter Coffee at Cloud@KM 20110503Trust and Transformation: Peter Coffee at Cloud@KM 20110503
Trust and Transformation: Peter Coffee at Cloud@KM 20110503
 

Similar to Data Breach Risk Intelligence for Higher Education

TakeDownCon Rocket City: Research Advancements Towards Protecting Critical As...
TakeDownCon Rocket City: Research Advancements Towards Protecting Critical As...TakeDownCon Rocket City: Research Advancements Towards Protecting Critical As...
TakeDownCon Rocket City: Research Advancements Towards Protecting Critical As...
EC-Council
 
NetSecurity_ThreatResponder(r)_Capability_Brief_021116_Rev0
NetSecurity_ThreatResponder(r)_Capability_Brief_021116_Rev0NetSecurity_ThreatResponder(r)_Capability_Brief_021116_Rev0
NetSecurity_ThreatResponder(r)_Capability_Brief_021116_Rev0
James Perry, Jr.
 

Similar to Data Breach Risk Intelligence for Higher Education (20)

Data Breach Risk Intelligence
Data Breach Risk IntelligenceData Breach Risk Intelligence
Data Breach Risk Intelligence
 
Applied cognitive security complementing the security analyst
Applied cognitive security complementing the security analyst Applied cognitive security complementing the security analyst
Applied cognitive security complementing the security analyst
 
Breached! App Attacks, Application Protection and Incident Response
Breached! App Attacks, Application Protection and Incident ResponseBreached! App Attacks, Application Protection and Incident Response
Breached! App Attacks, Application Protection and Incident Response
 
Data exfiltration so many threats 2016
Data exfiltration so many threats 2016Data exfiltration so many threats 2016
Data exfiltration so many threats 2016
 
QRadar Security Intelligence Overview.pptx
QRadar Security Intelligence Overview.pptxQRadar Security Intelligence Overview.pptx
QRadar Security Intelligence Overview.pptx
 
Allianz Global CISO october-2015-draft
Allianz Global CISO  october-2015-draftAllianz Global CISO  october-2015-draft
Allianz Global CISO october-2015-draft
 
Application Portfolio Risk Ranking: Banishing FUD With Structure and Numbers
Application Portfolio Risk Ranking: Banishing FUD With Structure and NumbersApplication Portfolio Risk Ranking: Banishing FUD With Structure and Numbers
Application Portfolio Risk Ranking: Banishing FUD With Structure and Numbers
 
SplunkLive! Customer Presentation - SSA
SplunkLive! Customer Presentation - SSASplunkLive! Customer Presentation - SSA
SplunkLive! Customer Presentation - SSA
 
Managing IT Risk and Assessing Vulnerability
Managing IT Risk and Assessing VulnerabilityManaging IT Risk and Assessing Vulnerability
Managing IT Risk and Assessing Vulnerability
 
Using Big Data for Cybersecurity
Using Big Data for CybersecurityUsing Big Data for Cybersecurity
Using Big Data for Cybersecurity
 
Open Source Security for Newbies - Best Practices
Open Source Security for Newbies - Best PracticesOpen Source Security for Newbies - Best Practices
Open Source Security for Newbies - Best Practices
 
Data Science for Cyber Risk
Data Science for Cyber RiskData Science for Cyber Risk
Data Science for Cyber Risk
 
TakeDownCon Rocket City: Research Advancements Towards Protecting Critical As...
TakeDownCon Rocket City: Research Advancements Towards Protecting Critical As...TakeDownCon Rocket City: Research Advancements Towards Protecting Critical As...
TakeDownCon Rocket City: Research Advancements Towards Protecting Critical As...
 
Simplify PCI DSS Compliance with AlienVault USM
Simplify PCI DSS Compliance with AlienVault USMSimplify PCI DSS Compliance with AlienVault USM
Simplify PCI DSS Compliance with AlienVault USM
 
Cyber Security # Lec 3
Cyber Security # Lec 3 Cyber Security # Lec 3
Cyber Security # Lec 3
 
CLASS 2018 - Palestra de Denis Prado (Security Intelligence Sales Leader Lati...
CLASS 2018 - Palestra de Denis Prado (Security Intelligence Sales Leader Lati...CLASS 2018 - Palestra de Denis Prado (Security Intelligence Sales Leader Lati...
CLASS 2018 - Palestra de Denis Prado (Security Intelligence Sales Leader Lati...
 
NetSecurity_ThreatResponder(r)_Capability_Brief_021116_Rev0
NetSecurity_ThreatResponder(r)_Capability_Brief_021116_Rev0NetSecurity_ThreatResponder(r)_Capability_Brief_021116_Rev0
NetSecurity_ThreatResponder(r)_Capability_Brief_021116_Rev0
 
Operational Security Intelligence
Operational Security IntelligenceOperational Security Intelligence
Operational Security Intelligence
 
Microsoft Avanced Threat Analytics
Microsoft Avanced Threat AnalyticsMicrosoft Avanced Threat Analytics
Microsoft Avanced Threat Analytics
 
How to protect your corporate from advanced attacks
How to protect your corporate from advanced attacksHow to protect your corporate from advanced attacks
How to protect your corporate from advanced attacks
 

More from MAX Risk Intelligence by LOGICnow

More from MAX Risk Intelligence by LOGICnow (6)

Data Breach Risk Brief - 2015
Data Breach Risk Brief - 2015Data Breach Risk Brief - 2015
Data Breach Risk Brief - 2015
 
iScan Risk Intelligence for Regional Banks
iScan Risk Intelligence for Regional BanksiScan Risk Intelligence for Regional Banks
iScan Risk Intelligence for Regional Banks
 
5 Phrases Every Security Chief Needs to Speak - Business
5 Phrases Every Security Chief Needs to Speak - Business5 Phrases Every Security Chief Needs to Speak - Business
5 Phrases Every Security Chief Needs to Speak - Business
 
5 Data Breach Charts for the Board Room
5 Data Breach Charts for the Board Room5 Data Breach Charts for the Board Room
5 Data Breach Charts for the Board Room
 
BYOD Security Scanning
BYOD Security ScanningBYOD Security Scanning
BYOD Security Scanning
 
iScan Online - PCI DSS Mobile Task Force
iScan Online - PCI DSS Mobile Task ForceiScan Online - PCI DSS Mobile Task Force
iScan Online - PCI DSS Mobile Task Force
 

Recently uploaded

Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
ZurliaSoop
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
KarakKing
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
ciinovamais
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
heathfieldcps1
 

Recently uploaded (20)

Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 

Data Breach Risk Intelligence for Higher Education

  • 1. DATA BREACH RISK INTELLIGENCE FOR HIGHER ED Financial prioritization of data breach risk in the language of the C-suite
  • 2. WHY? Almost 1 million records were stolen from just the top five universities breached in 2014. Data breaches are becoming front and center in Boardrooms at Higher Ed institutions. …Yet data breach tools are developed for yesterday’s IT. Slow, disruptive to students & staff Discover data or vulnerabilities, but not both Results not ready for CFO and Board presentations False positives, unable to scan largest servers Not effective on Mac and other platforms
  • 3. ISCAN RISK INTELLIGENCE 
 in dollars prioritized real-time trends Financial prioritization of data breach risk in the language of the C-suite One tool does it all • Sensitive data • Who has access • Vulnerabilities Know your security number Dollar value of risk liability per device Actionable intelligence Total risk exposure of organization C-level ready dashboard • Evidence of impact • Board oversight
  • 4. ISCAN ANSWERS KEY QUESTIONS FOR CISOS What data is at risk and who has access? How can attackers get to it? What will it cost when breached?
  • 5. HOW ISCAN IS DIFFERENT • Deploys rapidly, scans are faster and more accurate • Detects big 3: sensitive data, access permissions and vulnerabilities • Admins can find hacker traps • Provides actionable intelligence and financially prioritizes data breach risk • C-suite ready dashboard puts a dollar number on your risk exposure • Works well with popular education environments/ devices like Mac, iO, Ubuntu and Linux choices All in one tool
  • 6. HOW DO WE DO IT? PATENTED AGENTLESS DISCOVERY Mobile app Command line Constant auto assessment across all device types Cloud-based lightweight deployment with same day results Millions of devices at one time Active directory
  • 7. Potential liability $ Data at Risk • Social Security numbers • Driver’s licenses • Birthdates • Telephone numbers • Credit card numbers • Bank accounts • Intellectual property • Sensitive files DATA BREACH RISK REPORT PER DEVICE Vulnerabilities By severity By vendor Unauthorized access Configurations
  • 8. INTELLIGENCE DASHBOARD Like a Google map of your assets Immediate liability costs/ prioritization displayed for decision-making Trends for tracking the impact of initiatives Ready for the Boardroom
  • 9. INTEGRATION Works with existing technology investments in Systems Management and RMM tools
  • 10. iScan Leading competitor Automatically find SSNs, IDs, Bank Accounts, Driver Licenses, Dates of Birth, Phone Numbers, Addresses, Passports, Intellectual Property, Credit Cards, Patient Health Info Find file patterns and MD5/SHA hashes – finds data theft artifacts, such as Cryptolocker, and use for incidence response Search files, e-mails and attachments on: • File servers • .zip files • Outlook, Thunderbird, Apple Mail + • Cloud storage folders including Dropbox, Skydrive, Google Drive, Box, Amazon Cloud Drive, and more • NAS Search files on websites * Search even the largest servers (1 TB+) Schedule searches ** HOW WE COMPARE 1/3 * iScan searches the databases where form fill data resides ** iScan integrates with existing infrastructure for scheduled searches
  • 11. iScan Leading competitor Works on: • Windows XP - 8.1 • Windows Server - 2003 – 2012 • Linux 64 bit - RHEL 5+ • Mac OS X Works on: • CentOS 5+ Linux • Oracle Linux • Ubuntu • Fedora Works on mobile devices like tablets and smartphones • Apple iOS 5 + • Android 2.3 + Effectively search both Mac and PC platforms Manage data discovery without an agent Non-intrusive, does not require scaling down resources on device HOW WE COMPARE 2/3
  • 12. HOW WE COMPARE 3/3 iScan Leading competitor View and manage by university, department or any sub group Audit 3rd party devices “on the fly” Receive results in your inbox daily Fastest scanning available Same day scalable implementation and results Vulnerability scanning (How will data be breached) View file permission access to sensitive data Automatically calculates dollar value liability & financially prioritizes Trend charts for monitoring impact Intelligence dashboard for C-suite One tool for data, access & vulnerabilities, and C-suite dashboard
  • 13. IVY LEAGUE UNIVERSITY “We use iScan to report the financial impact to our Boardroom. It also empowers our students to self-assess their computers.”
  • 14. LIBERAL ARTS UNIVERSITY “We chose iScan Online as the only vendor that could complete the discovery of sensitive data on our multi- terabyte servers.”
  • 15. RECOGNITION Industry Innovator: Analysis & Control REMOTE SECURITY SELF-ASSESSMENT FRAMEWORK Patent 9,032,520 Patent 8,819,773
  • 16. TRY US FOR FREE Sign up at https://app.iscanonline.com/