SlideShare a Scribd company logo
1 of 20
Download to read offline
Title Text
Body Level One
• Body Level Two
• Body Level Three
• Body Level Four
powered by
Discover
Secure
Monitor } Protect Your Sensitive Data
The Why
01
The What
02
The How
03
AGENDA
02
Knowledge of sensitive data storage is
tribal - not institutional.
THE WHY | DATA SECURITY01
Data is being generated and processed in
multiple ways and being stored in multiple
places
WHERE, AND
WHO ?
01
CODE
DATA
SMS
DOB
Email
Credit Card
LOG
Chat
Reports
Documents
03
DATA is Harder to Track Now
LOG
Keeping track of Data has almost
become impossible
01
03
CHANGING DATA LANDSCAPE
Location of Sensitive Data Storage
Keeps Changing
Today?
Tomorrow?
01
CODE
DATA
SMS
DOB
Email
Credit Card
LOG
Chat
Reports
Documents
THE WHY | DATA SECURITY
LOG
Compliance violations
FERPA, PCI, CCPA, GDPR
Harness data to create
Business Opportunities
THE WHY | DATA SECURITY01
Balance monetizing data with managing risk
THE WHAT | DATA SECURITY02
Tools that let you discover sensitive
data in Data Lakes and Enterprise
Data Sources
Support Cloud and On-Premise
data sources
Continuously monitor your
data sources
MONITOR
Continuously monitors data sources, and alerts in case
of policy violations.
DISCOVER
Scans enterprise datasources for sensitive data stored
in text and images . Supports different types of
datasources including Hadoop, NOSQL , RDBMS
SECURE
Supports Masking, Encryption, Tokenization of data
based on simple user driven configuration
02 THE WHAT | KOGNI SECURITY
THE WHAT | DATA SECURITY02
Role based access to sensitive data
Monitor for policy violations and data governance
Secure sensitive data
Discover sensitive data stored in text and images
Pre-built UDFs
Anomaly Detection
Alerts
Policy Violations
Tokenization
Masking
Pattern Matching
Context Aware
Checksum Discover
Secure
Monitor
Encryption
Redaction
Data Lineage
Data Dictionary
Advanced NLP
User Activity Monitoring
07
THE HOW | KOGNI INSPECTION03
Discovers, reports and alerts on
sensitive data stored in Enterprise data
sources
THE HOW | KOGNI INSPECTION
Relies on pattern matching, checksums, advanced
NLP, context, lineage, document recognition, data
dictionary, and manual flagging
Powered by Apache Spark for speed and scalability
Purpose-built classifiers for a wide variety of sensitive
data like credit card numbers, SSNs, and more
Supports user defined classifiers to identify sensitive
data unique to your organization
Smart scanning with minimal load on source systems
03
Advanced techniques like PII co-occurrence analysis
and PII Fingerprinting
Classifiers for Biometric Identifiers - fingerprints,
facial images
RDBMS
HADOOP
NOSQL
CLOUD/S3
Chat Logs Emails ImagesStructured
Data
Unstructured
Data
TEXT
Connects to RDBMS, S3, NoSql, Network File Shares
Supports file formats like word, pdf, excel, powerpoint, json, csv, and more
Scans both text and images
THE HOW | KOGNI INSPECTION03
Dashboard view of the sensitive data
across Enterprise Data Sources
Sensitive Data Catalog
Alerts for sensitive data volume and
location using Anomaly Detection
Monitoring for policy violations and
data governance support.
THE HOW | KOGNI INSPECTION03
User Activity Monitoring
Continuous monitoring of sensitive data
ARCHITECTURE | KOGNI03
Kogni UIKogni Inspection
KOGNI DB
KOGNI APP
DASHBOARD
CLASSIFIERS
ADMIN PAGE
SPARK JOB
Credit Card
Data Sources
SSN
US Passport
…
S3 HDFS
…
1
2
3
4
4
RDMSNOSQL
noSQL
DEPLOYMENT MODEL | OPTION 103
DEPLOYMENT MODEL | OPTION 203
• Is your data vulnerable to a data breach?
• Will your PII, PCI, PHI data be compromised?
• Is the data in our data lake secure enough?
• Are your systems compliant with regulations
(HIPAA, PCI, PHI,FERPA)?
• Do you know where your sensitive data is located?
• Is your data secured at rest and in motion in our
Hadoop infrastructure?
• Will your data breach/security risk increase with the
transition to Big Data solutions?
• Are you storing sensitive data in the cloud?
• Do you know who is accessing your sensitive data?
DATA SECURITY CHALLENGES
• Compliance with regulations such as HIPAA,
PCI,PHI,GDPR, FERPA and other
• Reduce regulatory compliance costs
• Improved confidence in the security of the data
• Accelerate big data Implementations - with security
and governance
• Reduced losses from a data breach
• Rapid deployment and fast time-to-value
• Managed offerings eliminate the need for additional
staff to deploy and maintain
• Secure use of data assets enabling business growth
• Brand protection
BUSINESS BENEFITSKOGNI’S VALUE PROPOSITION
• Inspects Network File Share, S3, NoSQL , RDBMS
data sources for sensitive data
• Transparently secures sensitive data  as it is ingested
into data lake (Hadoop, S3)  with zero code change
and with little overhead to the performance of the
ingestion process
• Provides support for variety of data security
strategies like tokenization masking, encryption,
redaction.
• Supports both on-premise and cloud data sources
• Continuous monitoring of datasets, access controls
and alerts in case of policy violations
• Offered as a managed service
KOGNI SECURITY
02 Benchmarks| KOGNI SECURITY
On m4.4xlarge EC2 instance, Kogni can process 

millions of documents in just a few hours
hundreds of tables in just a few hours

Leverages Apache Spark for horizontal scalability
Kogni Throughput
Througput
(FilesperHour)
0 M
2 M
4 M
6 M
8 M
Cluster Size
1 4 8 12 16
Discover. Secure. Monitor
Questions ?02

More Related Content

What's hot

Big Data Security Intelligence and Analytics for Advanced Threat Protection
Big Data Security Intelligence and Analytics for Advanced Threat ProtectionBig Data Security Intelligence and Analytics for Advanced Threat Protection
Big Data Security Intelligence and Analytics for Advanced Threat ProtectionBlue Coat
 
Aspects of data security
Aspects of data securityAspects of data security
Aspects of data securitySaranSwathi1
 
Cloud Computing: Scalable and Secure Sharing of Personal Health Records Using...
Cloud Computing: Scalable and Secure Sharing of Personal Health Records Using...Cloud Computing: Scalable and Secure Sharing of Personal Health Records Using...
Cloud Computing: Scalable and Secure Sharing of Personal Health Records Using...dbpublications
 
Symantec Data Insight 4.0 July 2013
Symantec Data Insight 4.0 July 2013Symantec Data Insight 4.0 July 2013
Symantec Data Insight 4.0 July 2013Symantec
 
BigData and Privacy webinar at Brighttalk
BigData and Privacy webinar at BrighttalkBigData and Privacy webinar at Brighttalk
BigData and Privacy webinar at BrighttalkUlf Mattsson
 
Dallas texas data center services cyrus one
Dallas texas data center services   cyrus oneDallas texas data center services   cyrus one
Dallas texas data center services cyrus onebpm1102665
 
Steven Meister GDPR and Regulatory Compliance and Big Data Excelerator Profes...
Steven Meister GDPR and Regulatory Compliance and Big Data Excelerator Profes...Steven Meister GDPR and Regulatory Compliance and Big Data Excelerator Profes...
Steven Meister GDPR and Regulatory Compliance and Big Data Excelerator Profes...Steven Meister
 
Privacy preserving detection of sensitive data exposure
Privacy preserving detection of sensitive data exposurePrivacy preserving detection of sensitive data exposure
Privacy preserving detection of sensitive data exposureredpel dot com
 
ISSA Boston - PCI and Beyond: A Cost Effective Approach to Data Protection
ISSA Boston - PCI and Beyond: A Cost Effective Approach to Data ProtectionISSA Boston - PCI and Beyond: A Cost Effective Approach to Data Protection
ISSA Boston - PCI and Beyond: A Cost Effective Approach to Data ProtectionUlf Mattsson
 
Microsoft - Policing, Justice and the Law Enforcement Directive & GDPR
Microsoft - Policing, Justice and the Law Enforcement Directive & GDPRMicrosoft - Policing, Justice and the Law Enforcement Directive & GDPR
Microsoft - Policing, Justice and the Law Enforcement Directive & GDPRtechUK
 
A Little Security For Big Data
A Little Security For Big DataA Little Security For Big Data
A Little Security For Big DataSaurabh Kheni
 
Gdpr questions for compliance difficulties
Gdpr questions for compliance difficultiesGdpr questions for compliance difficulties
Gdpr questions for compliance difficultiesSteven Meister
 
The Impact of Cloud: Cloud Computing Security and Privacy
The Impact of Cloud: Cloud Computing Security and PrivacyThe Impact of Cloud: Cloud Computing Security and Privacy
The Impact of Cloud: Cloud Computing Security and PrivacyCharles Mok
 
what is data security full ppt
what is data security full pptwhat is data security full ppt
what is data security full pptShahbaz Khan
 
DBAs - Is Your Company’s Personal and Sensitive Data Safe?
DBAs - Is Your Company’s Personal and Sensitive Data Safe?DBAs - Is Your Company’s Personal and Sensitive Data Safe?
DBAs - Is Your Company’s Personal and Sensitive Data Safe?DevOps.com
 
Leverage Big Data for Security Intelligence
Leverage Big Data for Security Intelligence Leverage Big Data for Security Intelligence
Leverage Big Data for Security Intelligence Stefaan Van daele
 
Cloud Computing: Scalable and Secure Sharing of Personal Health Records Using...
Cloud Computing: Scalable and Secure Sharing of Personal Health Records Using...Cloud Computing: Scalable and Secure Sharing of Personal Health Records Using...
Cloud Computing: Scalable and Secure Sharing of Personal Health Records Using...dbpublications
 
Isaca journal - bridging the gap between access and security in big data...
Isaca journal  - bridging the gap between access and security in big data...Isaca journal  - bridging the gap between access and security in big data...
Isaca journal - bridging the gap between access and security in big data...Ulf Mattsson
 

What's hot (20)

Big Data Security Intelligence and Analytics for Advanced Threat Protection
Big Data Security Intelligence and Analytics for Advanced Threat ProtectionBig Data Security Intelligence and Analytics for Advanced Threat Protection
Big Data Security Intelligence and Analytics for Advanced Threat Protection
 
Access data
Access dataAccess data
Access data
 
NogaLogic
NogaLogicNogaLogic
NogaLogic
 
Aspects of data security
Aspects of data securityAspects of data security
Aspects of data security
 
Cloud Computing: Scalable and Secure Sharing of Personal Health Records Using...
Cloud Computing: Scalable and Secure Sharing of Personal Health Records Using...Cloud Computing: Scalable and Secure Sharing of Personal Health Records Using...
Cloud Computing: Scalable and Secure Sharing of Personal Health Records Using...
 
Symantec Data Insight 4.0 July 2013
Symantec Data Insight 4.0 July 2013Symantec Data Insight 4.0 July 2013
Symantec Data Insight 4.0 July 2013
 
BigData and Privacy webinar at Brighttalk
BigData and Privacy webinar at BrighttalkBigData and Privacy webinar at Brighttalk
BigData and Privacy webinar at Brighttalk
 
Dallas texas data center services cyrus one
Dallas texas data center services   cyrus oneDallas texas data center services   cyrus one
Dallas texas data center services cyrus one
 
Steven Meister GDPR and Regulatory Compliance and Big Data Excelerator Profes...
Steven Meister GDPR and Regulatory Compliance and Big Data Excelerator Profes...Steven Meister GDPR and Regulatory Compliance and Big Data Excelerator Profes...
Steven Meister GDPR and Regulatory Compliance and Big Data Excelerator Profes...
 
Privacy preserving detection of sensitive data exposure
Privacy preserving detection of sensitive data exposurePrivacy preserving detection of sensitive data exposure
Privacy preserving detection of sensitive data exposure
 
ISSA Boston - PCI and Beyond: A Cost Effective Approach to Data Protection
ISSA Boston - PCI and Beyond: A Cost Effective Approach to Data ProtectionISSA Boston - PCI and Beyond: A Cost Effective Approach to Data Protection
ISSA Boston - PCI and Beyond: A Cost Effective Approach to Data Protection
 
Microsoft - Policing, Justice and the Law Enforcement Directive & GDPR
Microsoft - Policing, Justice and the Law Enforcement Directive & GDPRMicrosoft - Policing, Justice and the Law Enforcement Directive & GDPR
Microsoft - Policing, Justice and the Law Enforcement Directive & GDPR
 
A Little Security For Big Data
A Little Security For Big DataA Little Security For Big Data
A Little Security For Big Data
 
Gdpr questions for compliance difficulties
Gdpr questions for compliance difficultiesGdpr questions for compliance difficulties
Gdpr questions for compliance difficulties
 
The Impact of Cloud: Cloud Computing Security and Privacy
The Impact of Cloud: Cloud Computing Security and PrivacyThe Impact of Cloud: Cloud Computing Security and Privacy
The Impact of Cloud: Cloud Computing Security and Privacy
 
what is data security full ppt
what is data security full pptwhat is data security full ppt
what is data security full ppt
 
DBAs - Is Your Company’s Personal and Sensitive Data Safe?
DBAs - Is Your Company’s Personal and Sensitive Data Safe?DBAs - Is Your Company’s Personal and Sensitive Data Safe?
DBAs - Is Your Company’s Personal and Sensitive Data Safe?
 
Leverage Big Data for Security Intelligence
Leverage Big Data for Security Intelligence Leverage Big Data for Security Intelligence
Leverage Big Data for Security Intelligence
 
Cloud Computing: Scalable and Secure Sharing of Personal Health Records Using...
Cloud Computing: Scalable and Secure Sharing of Personal Health Records Using...Cloud Computing: Scalable and Secure Sharing of Personal Health Records Using...
Cloud Computing: Scalable and Secure Sharing of Personal Health Records Using...
 
Isaca journal - bridging the gap between access and security in big data...
Isaca journal  - bridging the gap between access and security in big data...Isaca journal  - bridging the gap between access and security in big data...
Isaca journal - bridging the gap between access and security in big data...
 

Similar to Kogni - A Data Security Product. Discovers, Secures, & Monitors Sensitive Enterprise Data

Winning the war on data breaches in a changing data landscape
Winning the war on data breaches in a changing data landscapeWinning the war on data breaches in a changing data landscape
Winning the war on data breaches in a changing data landscapeAvinash Ramineni
 
ExpertsLive NL 2022 - Microsoft Purview - What's in it for my organization?
ExpertsLive NL 2022 - Microsoft Purview - What's in it for my organization?ExpertsLive NL 2022 - Microsoft Purview - What's in it for my organization?
ExpertsLive NL 2022 - Microsoft Purview - What's in it for my organization?Albert Hoitingh
 
dlp-sales-play-sales-customer-deck-2022.pptx
dlp-sales-play-sales-customer-deck-2022.pptxdlp-sales-play-sales-customer-deck-2022.pptx
dlp-sales-play-sales-customer-deck-2022.pptxalex hincapie
 
Dv decision makers presentation 310518[1]
Dv decision makers presentation 310518[1]Dv decision makers presentation 310518[1]
Dv decision makers presentation 310518[1]Certus Solutions
 
DocuClassify - AutoClassification at its best
DocuClassify - AutoClassification at its bestDocuClassify - AutoClassification at its best
DocuClassify - AutoClassification at its bestDocuLynx
 
Scalable Data Management for Kafka and Beyond | Dan Rice, BigID
Scalable Data Management for Kafka and Beyond | Dan Rice, BigIDScalable Data Management for Kafka and Beyond | Dan Rice, BigID
Scalable Data Management for Kafka and Beyond | Dan Rice, BigIDHostedbyConfluent
 
Microsoft Azure Rights Management
Microsoft Azure Rights ManagementMicrosoft Azure Rights Management
Microsoft Azure Rights ManagementDavid J Rosenthal
 
Sören Eickhoff, Informatica GmbH, "Informatica Intelligent Data Lake – Self S...
Sören Eickhoff, Informatica GmbH, "Informatica Intelligent Data Lake – Self S...Sören Eickhoff, Informatica GmbH, "Informatica Intelligent Data Lake – Self S...
Sören Eickhoff, Informatica GmbH, "Informatica Intelligent Data Lake – Self S...Dataconomy Media
 
Microsoft Cloud GDPR Compliance Options (SUGUK)
Microsoft Cloud GDPR Compliance Options (SUGUK)Microsoft Cloud GDPR Compliance Options (SUGUK)
Microsoft Cloud GDPR Compliance Options (SUGUK)Andy Talbot
 
Why a Data Services Marketplace is Critical for a Successful Data-Driven Ente...
Why a Data Services Marketplace is Critical for a Successful Data-Driven Ente...Why a Data Services Marketplace is Critical for a Successful Data-Driven Ente...
Why a Data Services Marketplace is Critical for a Successful Data-Driven Ente...Denodo
 
Replacing Tape Backup with Cloud-Enabled Solutions by Index Engines
Replacing Tape Backup with Cloud-Enabled Solutions by Index EnginesReplacing Tape Backup with Cloud-Enabled Solutions by Index Engines
Replacing Tape Backup with Cloud-Enabled Solutions by Index EnginesAmazon Web Services
 
Turn Big Data into Big Value on Informatica and AWS
Turn Big Data into Big Value on Informatica and AWSTurn Big Data into Big Value on Informatica and AWS
Turn Big Data into Big Value on Informatica and AWSAmazon Web Services
 
Solving the Really Big Tech Problems with IoT
 Solving the Really Big Tech Problems with IoT Solving the Really Big Tech Problems with IoT
Solving the Really Big Tech Problems with IoTEric Kavanagh
 
[IGNITE2018] [BRK2495] What’s new in Microsoft Information Protection solutio...
[IGNITE2018] [BRK2495] What’s new in Microsoft Information Protection solutio...[IGNITE2018] [BRK2495] What’s new in Microsoft Information Protection solutio...
[IGNITE2018] [BRK2495] What’s new in Microsoft Information Protection solutio...☁️ Gustavo Magella
 
Security and privacy of cloud data: what you need to know (Interop)
Security and privacy of cloud data: what you need to know (Interop)Security and privacy of cloud data: what you need to know (Interop)
Security and privacy of cloud data: what you need to know (Interop)Druva
 
GDPR Compliance Made Easy with Data Virtualization
GDPR Compliance Made Easy with Data VirtualizationGDPR Compliance Made Easy with Data Virtualization
GDPR Compliance Made Easy with Data VirtualizationDenodo
 
(SACON) Ramkumar Narayanan - Personal Data Discovery & Mapping - Challenges f...
(SACON) Ramkumar Narayanan - Personal Data Discovery & Mapping - Challenges f...(SACON) Ramkumar Narayanan - Personal Data Discovery & Mapping - Challenges f...
(SACON) Ramkumar Narayanan - Personal Data Discovery & Mapping - Challenges f...Priyanka Aash
 

Similar to Kogni - A Data Security Product. Discovers, Secures, & Monitors Sensitive Enterprise Data (20)

Winning the war on data breaches in a changing data landscape
Winning the war on data breaches in a changing data landscapeWinning the war on data breaches in a changing data landscape
Winning the war on data breaches in a changing data landscape
 
ExpertsLive NL 2022 - Microsoft Purview - What's in it for my organization?
ExpertsLive NL 2022 - Microsoft Purview - What's in it for my organization?ExpertsLive NL 2022 - Microsoft Purview - What's in it for my organization?
ExpertsLive NL 2022 - Microsoft Purview - What's in it for my organization?
 
dlp-sales-play-sales-customer-deck-2022.pptx
dlp-sales-play-sales-customer-deck-2022.pptxdlp-sales-play-sales-customer-deck-2022.pptx
dlp-sales-play-sales-customer-deck-2022.pptx
 
Biznet Gio Presentation - Database Security
Biznet Gio Presentation - Database SecurityBiznet Gio Presentation - Database Security
Biznet Gio Presentation - Database Security
 
Dv decision makers presentation 310518[1]
Dv decision makers presentation 310518[1]Dv decision makers presentation 310518[1]
Dv decision makers presentation 310518[1]
 
DocuClassify - AutoClassification at its best
DocuClassify - AutoClassification at its bestDocuClassify - AutoClassification at its best
DocuClassify - AutoClassification at its best
 
Scalable Data Management for Kafka and Beyond | Dan Rice, BigID
Scalable Data Management for Kafka and Beyond | Dan Rice, BigIDScalable Data Management for Kafka and Beyond | Dan Rice, BigID
Scalable Data Management for Kafka and Beyond | Dan Rice, BigID
 
Microsoft Azure Rights Management
Microsoft Azure Rights ManagementMicrosoft Azure Rights Management
Microsoft Azure Rights Management
 
Sören Eickhoff, Informatica GmbH, "Informatica Intelligent Data Lake – Self S...
Sören Eickhoff, Informatica GmbH, "Informatica Intelligent Data Lake – Self S...Sören Eickhoff, Informatica GmbH, "Informatica Intelligent Data Lake – Self S...
Sören Eickhoff, Informatica GmbH, "Informatica Intelligent Data Lake – Self S...
 
Microsoft Cloud GDPR Compliance Options (SUGUK)
Microsoft Cloud GDPR Compliance Options (SUGUK)Microsoft Cloud GDPR Compliance Options (SUGUK)
Microsoft Cloud GDPR Compliance Options (SUGUK)
 
Data Leakage Prevention
Data Leakage PreventionData Leakage Prevention
Data Leakage Prevention
 
Why a Data Services Marketplace is Critical for a Successful Data-Driven Ente...
Why a Data Services Marketplace is Critical for a Successful Data-Driven Ente...Why a Data Services Marketplace is Critical for a Successful Data-Driven Ente...
Why a Data Services Marketplace is Critical for a Successful Data-Driven Ente...
 
Replacing Tape Backup with Cloud-Enabled Solutions by Index Engines
Replacing Tape Backup with Cloud-Enabled Solutions by Index EnginesReplacing Tape Backup with Cloud-Enabled Solutions by Index Engines
Replacing Tape Backup with Cloud-Enabled Solutions by Index Engines
 
Turn Big Data into Big Value on Informatica and AWS
Turn Big Data into Big Value on Informatica and AWSTurn Big Data into Big Value on Informatica and AWS
Turn Big Data into Big Value on Informatica and AWS
 
Solving the Really Big Tech Problems with IoT
 Solving the Really Big Tech Problems with IoT Solving the Really Big Tech Problems with IoT
Solving the Really Big Tech Problems with IoT
 
[IGNITE2018] [BRK2495] What’s new in Microsoft Information Protection solutio...
[IGNITE2018] [BRK2495] What’s new in Microsoft Information Protection solutio...[IGNITE2018] [BRK2495] What’s new in Microsoft Information Protection solutio...
[IGNITE2018] [BRK2495] What’s new in Microsoft Information Protection solutio...
 
Dealing with Dark Data
Dealing with Dark DataDealing with Dark Data
Dealing with Dark Data
 
Security and privacy of cloud data: what you need to know (Interop)
Security and privacy of cloud data: what you need to know (Interop)Security and privacy of cloud data: what you need to know (Interop)
Security and privacy of cloud data: what you need to know (Interop)
 
GDPR Compliance Made Easy with Data Virtualization
GDPR Compliance Made Easy with Data VirtualizationGDPR Compliance Made Easy with Data Virtualization
GDPR Compliance Made Easy with Data Virtualization
 
(SACON) Ramkumar Narayanan - Personal Data Discovery & Mapping - Challenges f...
(SACON) Ramkumar Narayanan - Personal Data Discovery & Mapping - Challenges f...(SACON) Ramkumar Narayanan - Personal Data Discovery & Mapping - Challenges f...
(SACON) Ramkumar Narayanan - Personal Data Discovery & Mapping - Challenges f...
 

Recently uploaded

ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...Christina Lin
 
chapter--4-software-project-planning.ppt
chapter--4-software-project-planning.pptchapter--4-software-project-planning.ppt
chapter--4-software-project-planning.pptkotipi9215
 
Unlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language ModelsUnlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language Modelsaagamshah0812
 
Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...OnePlan Solutions
 
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdfThe Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdfkalichargn70th171
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...MyIntelliSource, Inc.
 
What is Binary Language? Computer Number Systems
What is Binary Language?  Computer Number SystemsWhat is Binary Language?  Computer Number Systems
What is Binary Language? Computer Number SystemsJheuzeDellosa
 
Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)OPEN KNOWLEDGE GmbH
 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...ICS
 
Introduction to Decentralized Applications (dApps)
Introduction to Decentralized Applications (dApps)Introduction to Decentralized Applications (dApps)
Introduction to Decentralized Applications (dApps)Intelisync
 
Salesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantSalesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantAxelRicardoTrocheRiq
 
TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providermohitmore19
 
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...kellynguyen01
 
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsAlberto González Trastoy
 
Engage Usergroup 2024 - The Good The Bad_The Ugly
Engage Usergroup 2024 - The Good The Bad_The UglyEngage Usergroup 2024 - The Good The Bad_The Ugly
Engage Usergroup 2024 - The Good The Bad_The UglyFrank van der Linden
 
EY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityEY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityNeo4j
 
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...stazi3110
 
Unit 1.1 Excite Part 1, class 9, cbse...
Unit 1.1 Excite Part 1, class 9, cbse...Unit 1.1 Excite Part 1, class 9, cbse...
Unit 1.1 Excite Part 1, class 9, cbse...aditisharan08
 

Recently uploaded (20)

ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
 
chapter--4-software-project-planning.ppt
chapter--4-software-project-planning.pptchapter--4-software-project-planning.ppt
chapter--4-software-project-planning.ppt
 
Unlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language ModelsUnlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language Models
 
Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...
 
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdfThe Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
 
What is Binary Language? Computer Number Systems
What is Binary Language?  Computer Number SystemsWhat is Binary Language?  Computer Number Systems
What is Binary Language? Computer Number Systems
 
Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)
 
Exploring iOS App Development: Simplifying the Process
Exploring iOS App Development: Simplifying the ProcessExploring iOS App Development: Simplifying the Process
Exploring iOS App Development: Simplifying the Process
 
Call Girls In Mukherjee Nagar 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
Call Girls In Mukherjee Nagar 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...Call Girls In Mukherjee Nagar 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
Call Girls In Mukherjee Nagar 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
 
Introduction to Decentralized Applications (dApps)
Introduction to Decentralized Applications (dApps)Introduction to Decentralized Applications (dApps)
Introduction to Decentralized Applications (dApps)
 
Salesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantSalesforce Certified Field Service Consultant
Salesforce Certified Field Service Consultant
 
TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service provider
 
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
 
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
 
Engage Usergroup 2024 - The Good The Bad_The Ugly
Engage Usergroup 2024 - The Good The Bad_The UglyEngage Usergroup 2024 - The Good The Bad_The Ugly
Engage Usergroup 2024 - The Good The Bad_The Ugly
 
EY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityEY_Graph Database Powered Sustainability
EY_Graph Database Powered Sustainability
 
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
 
Unit 1.1 Excite Part 1, class 9, cbse...
Unit 1.1 Excite Part 1, class 9, cbse...Unit 1.1 Excite Part 1, class 9, cbse...
Unit 1.1 Excite Part 1, class 9, cbse...
 

Kogni - A Data Security Product. Discovers, Secures, & Monitors Sensitive Enterprise Data

  • 1. Title Text Body Level One • Body Level Two • Body Level Three • Body Level Four powered by Discover Secure Monitor } Protect Your Sensitive Data
  • 2. The Why 01 The What 02 The How 03 AGENDA 02
  • 3. Knowledge of sensitive data storage is tribal - not institutional. THE WHY | DATA SECURITY01
  • 4. Data is being generated and processed in multiple ways and being stored in multiple places WHERE, AND WHO ? 01 CODE DATA SMS DOB Email Credit Card LOG Chat Reports Documents 03 DATA is Harder to Track Now LOG Keeping track of Data has almost become impossible
  • 6. Location of Sensitive Data Storage Keeps Changing Today? Tomorrow? 01 CODE DATA SMS DOB Email Credit Card LOG Chat Reports Documents THE WHY | DATA SECURITY LOG
  • 7. Compliance violations FERPA, PCI, CCPA, GDPR Harness data to create Business Opportunities THE WHY | DATA SECURITY01 Balance monetizing data with managing risk
  • 8. THE WHAT | DATA SECURITY02 Tools that let you discover sensitive data in Data Lakes and Enterprise Data Sources Support Cloud and On-Premise data sources Continuously monitor your data sources
  • 9. MONITOR Continuously monitors data sources, and alerts in case of policy violations. DISCOVER Scans enterprise datasources for sensitive data stored in text and images . Supports different types of datasources including Hadoop, NOSQL , RDBMS SECURE Supports Masking, Encryption, Tokenization of data based on simple user driven configuration 02 THE WHAT | KOGNI SECURITY
  • 10. THE WHAT | DATA SECURITY02 Role based access to sensitive data Monitor for policy violations and data governance Secure sensitive data Discover sensitive data stored in text and images Pre-built UDFs Anomaly Detection Alerts Policy Violations Tokenization Masking Pattern Matching Context Aware Checksum Discover Secure Monitor Encryption Redaction Data Lineage Data Dictionary Advanced NLP User Activity Monitoring 07
  • 11. THE HOW | KOGNI INSPECTION03
  • 12. Discovers, reports and alerts on sensitive data stored in Enterprise data sources THE HOW | KOGNI INSPECTION Relies on pattern matching, checksums, advanced NLP, context, lineage, document recognition, data dictionary, and manual flagging Powered by Apache Spark for speed and scalability Purpose-built classifiers for a wide variety of sensitive data like credit card numbers, SSNs, and more Supports user defined classifiers to identify sensitive data unique to your organization Smart scanning with minimal load on source systems 03 Advanced techniques like PII co-occurrence analysis and PII Fingerprinting Classifiers for Biometric Identifiers - fingerprints, facial images
  • 13. RDBMS HADOOP NOSQL CLOUD/S3 Chat Logs Emails ImagesStructured Data Unstructured Data TEXT Connects to RDBMS, S3, NoSql, Network File Shares Supports file formats like word, pdf, excel, powerpoint, json, csv, and more Scans both text and images THE HOW | KOGNI INSPECTION03
  • 14. Dashboard view of the sensitive data across Enterprise Data Sources Sensitive Data Catalog Alerts for sensitive data volume and location using Anomaly Detection Monitoring for policy violations and data governance support. THE HOW | KOGNI INSPECTION03 User Activity Monitoring Continuous monitoring of sensitive data
  • 15. ARCHITECTURE | KOGNI03 Kogni UIKogni Inspection KOGNI DB KOGNI APP DASHBOARD CLASSIFIERS ADMIN PAGE SPARK JOB Credit Card Data Sources SSN US Passport … S3 HDFS … 1 2 3 4 4 RDMSNOSQL noSQL
  • 16. DEPLOYMENT MODEL | OPTION 103
  • 17. DEPLOYMENT MODEL | OPTION 203
  • 18. • Is your data vulnerable to a data breach? • Will your PII, PCI, PHI data be compromised? • Is the data in our data lake secure enough? • Are your systems compliant with regulations (HIPAA, PCI, PHI,FERPA)? • Do you know where your sensitive data is located? • Is your data secured at rest and in motion in our Hadoop infrastructure? • Will your data breach/security risk increase with the transition to Big Data solutions? • Are you storing sensitive data in the cloud? • Do you know who is accessing your sensitive data? DATA SECURITY CHALLENGES • Compliance with regulations such as HIPAA, PCI,PHI,GDPR, FERPA and other • Reduce regulatory compliance costs • Improved confidence in the security of the data • Accelerate big data Implementations - with security and governance • Reduced losses from a data breach • Rapid deployment and fast time-to-value • Managed offerings eliminate the need for additional staff to deploy and maintain • Secure use of data assets enabling business growth • Brand protection BUSINESS BENEFITSKOGNI’S VALUE PROPOSITION • Inspects Network File Share, S3, NoSQL , RDBMS data sources for sensitive data • Transparently secures sensitive data  as it is ingested into data lake (Hadoop, S3)  with zero code change and with little overhead to the performance of the ingestion process • Provides support for variety of data security strategies like tokenization masking, encryption, redaction. • Supports both on-premise and cloud data sources • Continuous monitoring of datasets, access controls and alerts in case of policy violations • Offered as a managed service KOGNI SECURITY
  • 19. 02 Benchmarks| KOGNI SECURITY On m4.4xlarge EC2 instance, Kogni can process 
 millions of documents in just a few hours hundreds of tables in just a few hours
 Leverages Apache Spark for horizontal scalability Kogni Throughput Througput (FilesperHour) 0 M 2 M 4 M 6 M 8 M Cluster Size 1 4 8 12 16