SlideShare a Scribd company logo
VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL
VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL2
What do over 2000 IT staff & end users
have to say about internal security risks
in their workplaces?
VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL3
VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL4
According to a recent
survey conducted by
The Ponemon Institute…
VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL5
71% of end users say
that they have access
to company data they
should not see.
VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL6
That’s bad.
VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL7
54% of those end
users characterize that
access as frequent or
very frequent.
VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL8
That’s worse.
How much data are we talking about here?
VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL9
38% of end users
report that they and
their co-workers can
see "a lot of data".
VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL10
Why is that?
VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL11
4 in 5 IT practitioners
say their organizations
don't enforce a
strict least-privilege
(or need-to-know)
data model.
VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL12
That’s bad, too.
VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL13
But they’re watching
what employees are
doing though, right?
VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL14
Only 22% of employees
say their organization
can tell them what
happened to lost data,
files, or emails.
VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL15
So about 78% of
organizations don’t
seem to be watching
very closely.
VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL16
In a nutshell, employees have access to a lot of
data they don’t need, and no one is watching
what they’re doing – do I have that right?
VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL17
Yup
VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL18
The failure of
companies to create and
enforce a least-privilege
model – especially for
confidential or sensitive
data like credit card
numbers or health
records – will most
certainly lead to more
breaches and loss of
critical data.
VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL19
So poor controls will lead to more breaches.
No surprise there. Is that all?
VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL20
Not quite. In the
Ponemon study,
most end users and
IT practitioners believe
their organization would
overlook security risks
before they would
sacrifice productivity.
VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL21
So employees must be
really productive, right?
(If security is so lax…)
VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL22
Wrong.
VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL23
73% of end users
believe the growth of
emails, presentations,
multimedia files and
other types of company
data has significantly
affected their ability to
find and access data.
VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL24
That’s weird –
does IT know that employees can’t find data?
VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL25
60% of IT practitioners
say it is very difficult or
difficult for employees to
search and find company
data or files they or their
co-workers have created
that isn't stored on their
own computers.
VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL26
That’s certainly counter-productive –
what about getting access to data?
VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL27
43% of end users say
it takes weeks, months,
or longer to be granted
access to data they
request access to in
order to do their jobs.
VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL28
Only 22% report
that access is typically
granted within minutes
or hours.
VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL29
That’s pretty bad,
too.
VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL30
What about being able to
share data easily?
VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL31
68% of end users
say it is difficult or
very difficult to share
appropriate data or files
with business partners
such as customers
or vendors.
VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL32
How would they prefer to share data?
VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL33
43% of employees prefer
to use public cloud file
sync and share services
to share data, which
means it’s more popular
than any platform other
than email.
VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL34
76% of end users
believe there are times
when it is acceptable
to transfer work
documents to their
personal devices…
VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL35
…while only 13% of
IT practitioners agree.
VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL36
So end users are sort of doing their own thing…
VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL37
Yup
VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL38
So how important is this data we’re talking about that:
we aren’t
protecting well
and can’t really find
anymore or share easily
and storing in the
public cloud when
we feel like it
(even though
IT doesn’t think
we should?)
VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL39
76% of end users
say their job requires
them to access and use
proprietary information
such as customer data,
employee records,
financial reports,
and confidential
business documents.
VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL40
So pretty much the
most important
data imaginable.
VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL41
44% of end users
believe their organization
experienced the loss
or theft of company data
over the past two years.
VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL42
67% of IT staff say their
organization experienced
the loss or theft of
company data over
the past two years.
VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL43
74% believe that
insider mistakes,
negligence, or malice
are frequently or very
frequently the cause of
leakage of company data.
VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL44
Shocker
VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL45
So everyone is frantically fixing everything, right?
VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL46
Only 22% of
employees believe
their organizations
as a whole place a
very high priority
on the protection
of company data.
VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL47
Only 47% of
IT practitioners believe
employees in their
organizations are taking
appropriate steps to
protect company data
they have access to.
VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL48
Not so much
VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL49
Ponemon Conclusion
An organization that reduces the amount of
data employees have access to (by implementing
a least-privilege access model, improving data
disposition policies or ideally both) and streamlines
their processes for granting access will likely benefit
from more productive employees.
From: Corporate Data: A Protected Asset or a Ticking Time Bomb?
VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL50
Could you reduce risk and increase productivity?
FIND OUT.
http://info.varonis.com/assessment
VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL51
Free Guide:
6 Tactics for Preventing
Insider Threats
Download here:
http://info.varonis.com/
insider-threats-guide
VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL52
Methodology
The survey report,
"Corporate Data: A Protected Asset or a Ticking Time Bomb?"
is derived from interviews conducted by the Ponemon Institute
in October 2014 with 2,276 employees in the United States,
United Kingdom, France, and Germany.
Respondents included 1,166 IT practitioners and 1,110 end users
in organizations ranging in size from dozens to tens of thousands
of employees, in a variety of industries including financial services,
public sector, health & pharmaceutical, retail, industrial, and
technology and software.
VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL53
About Ponemon
Ponemon Institute
Advancing Responsible Information Management
Ponemon Institute is dedicated to independent research and education that advances responsible
information and privacy management practices within business and government. Our mission is to
conduct high quality, empirical studies on critical issues affecting the management and security of
sensitive information about people and organizations.
As a member of the Council of American Survey Research Organizations (CASRO),
we uphold strict data confidentiality, privacy and ethical research standards. We do not collect
any personally identifiable information from individuals (or company identifiable information in
our business research). Furthermore, we have strict quality standards to ensure that subjects
are not asked extraneous, irrelevant or improper questions.
VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL54
About Varonis
Varonis is the leading provider of software solutions for unstructured, human-generated enterprise data.
Varonis provides an innovative software platform that allows enterprises to map, analyze, manage and
migrate their unstructured data. Varonis specializes in human-generated data, a type of unstructured data
that includes an enterprise's spreadsheets, word processing documents, presentations, audio files, video
files, emails, text messages and any other data created by employees. This data often contains an
enterprise's financial information, product plans, strategic initiatives, intellectual property and numerous
other forms of vital information. IT and business personnel deploy Varonis software for a variety of use
cases, including data governance, data security, archiving, file synchronization, enhanced mobile data
accessibility and information collaboration. As of September 30, 2014, Varonis had approximately 3,000
customers, spanning leading firms in the financial services, public, healthcare, industrial, energy & utilities,
technology, consumer and retail, education and media & entertainment sectors.
Join the Varonis conversation on Facebook, LinkedIn, Twitter, and YouTube
and subscribe to our Metadata Era blog.
VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL
Thank You
Name
Email Address
Phone Number

More Related Content

What's hot

ZSAH Security - Web
ZSAH Security - WebZSAH Security - Web
ZSAH Security - Web
Fahd Khan
 
WebShield eP3 Network Overview (02-04-2017)
WebShield eP3 Network Overview (02-04-2017)WebShield eP3 Network Overview (02-04-2017)
WebShield eP3 Network Overview (02-04-2017)
rich_webshield
 
Безопасность данных мобильных приложений. Мифы и реальность.
Безопасность данных мобильных приложений. Мифы и реальность.Безопасность данных мобильных приложений. Мифы и реальность.
Безопасность данных мобильных приложений. Мифы и реальность.
Advanced monitoring
 
Security&reliability
Security&reliabilitySecurity&reliability
Security&reliability
caca1009
 
Protecting Intellectual Property and Data Loss Prevention (DLP)
Protecting Intellectual Property and Data Loss Prevention (DLP)Protecting Intellectual Property and Data Loss Prevention (DLP)
Protecting Intellectual Property and Data Loss Prevention (DLP)
Arpin Consulting
 
Secure Multimedia Content Protection and Sharing
Secure Multimedia Content Protection and SharingSecure Multimedia Content Protection and Sharing
Secure Multimedia Content Protection and Sharing
IRJET Journal
 
TRUSTe Online Security Guidelines v2.0
TRUSTe Online Security Guidelines v2.0TRUSTe Online Security Guidelines v2.0
TRUSTe Online Security Guidelines v2.0
TRUSTe
 
Palerra_CASB_UBA_WhitePaper
Palerra_CASB_UBA_WhitePaperPalerra_CASB_UBA_WhitePaper
Palerra_CASB_UBA_WhitePaper
Eric Opp
 
Where Data Security and Value of Data Meet in the Cloud
Where Data Security and Value of Data Meet in the CloudWhere Data Security and Value of Data Meet in the Cloud
Where Data Security and Value of Data Meet in the Cloud
Ulf Mattsson
 
Cyber Security: User Access Pitfalls, A Case Study Approach
Cyber Security: User Access Pitfalls, A Case Study Approach Cyber Security: User Access Pitfalls, A Case Study Approach
Cyber Security: User Access Pitfalls, A Case Study Approach
Aviva Spectrum™
 
ISACA NA CACS 2012 Orlando session 414 Ulf Mattsson
ISACA NA CACS 2012 Orlando session 414 Ulf MattssonISACA NA CACS 2012 Orlando session 414 Ulf Mattsson
ISACA NA CACS 2012 Orlando session 414 Ulf Mattsson
Ulf Mattsson
 
Risk Management Practices for PCI DSS 2.0
Risk Management Practices for PCI DSS 2.0Risk Management Practices for PCI DSS 2.0
Risk Management Practices for PCI DSS 2.0
Ulf Mattsson
 
Lessons Learned From the Yahoo! Hack
Lessons Learned From the Yahoo! HackLessons Learned From the Yahoo! Hack
Lessons Learned From the Yahoo! Hack
Imperva
 
beyond_the_firewall_0103
beyond_the_firewall_0103beyond_the_firewall_0103
beyond_the_firewall_0103
Jack McCullough
 
Data Loss Prevention: Challenges, Impacts & Effective Strategies
Data Loss Prevention: Challenges, Impacts & Effective StrategiesData Loss Prevention: Challenges, Impacts & Effective Strategies
Data Loss Prevention: Challenges, Impacts & Effective Strategies
Seccuris Inc.
 
Data Security and Regulatory Compliance
Data Security and Regulatory ComplianceData Security and Regulatory Compliance
Data Security and Regulatory Compliance
Lifeline Data Centers
 
Cyber liability and cyber security
Cyber liability and cyber securityCyber liability and cyber security
Cyber liability and cyber security
Helen Carpenter
 
Cyber Liabilty: A new exposure for businesses
Cyber Liabilty: A new exposure for businesses Cyber Liabilty: A new exposure for businesses
Cyber Liabilty: A new exposure for businesses
Maran Corporate Risk Associates, Inc.
 
Cyber liabilty
Cyber liabiltyCyber liabilty
ISACA Houston Texas Chapter 2010
ISACA Houston Texas Chapter 2010ISACA Houston Texas Chapter 2010
ISACA Houston Texas Chapter 2010
Ulf Mattsson
 

What's hot (20)

ZSAH Security - Web
ZSAH Security - WebZSAH Security - Web
ZSAH Security - Web
 
WebShield eP3 Network Overview (02-04-2017)
WebShield eP3 Network Overview (02-04-2017)WebShield eP3 Network Overview (02-04-2017)
WebShield eP3 Network Overview (02-04-2017)
 
Безопасность данных мобильных приложений. Мифы и реальность.
Безопасность данных мобильных приложений. Мифы и реальность.Безопасность данных мобильных приложений. Мифы и реальность.
Безопасность данных мобильных приложений. Мифы и реальность.
 
Security&reliability
Security&reliabilitySecurity&reliability
Security&reliability
 
Protecting Intellectual Property and Data Loss Prevention (DLP)
Protecting Intellectual Property and Data Loss Prevention (DLP)Protecting Intellectual Property and Data Loss Prevention (DLP)
Protecting Intellectual Property and Data Loss Prevention (DLP)
 
Secure Multimedia Content Protection and Sharing
Secure Multimedia Content Protection and SharingSecure Multimedia Content Protection and Sharing
Secure Multimedia Content Protection and Sharing
 
TRUSTe Online Security Guidelines v2.0
TRUSTe Online Security Guidelines v2.0TRUSTe Online Security Guidelines v2.0
TRUSTe Online Security Guidelines v2.0
 
Palerra_CASB_UBA_WhitePaper
Palerra_CASB_UBA_WhitePaperPalerra_CASB_UBA_WhitePaper
Palerra_CASB_UBA_WhitePaper
 
Where Data Security and Value of Data Meet in the Cloud
Where Data Security and Value of Data Meet in the CloudWhere Data Security and Value of Data Meet in the Cloud
Where Data Security and Value of Data Meet in the Cloud
 
Cyber Security: User Access Pitfalls, A Case Study Approach
Cyber Security: User Access Pitfalls, A Case Study Approach Cyber Security: User Access Pitfalls, A Case Study Approach
Cyber Security: User Access Pitfalls, A Case Study Approach
 
ISACA NA CACS 2012 Orlando session 414 Ulf Mattsson
ISACA NA CACS 2012 Orlando session 414 Ulf MattssonISACA NA CACS 2012 Orlando session 414 Ulf Mattsson
ISACA NA CACS 2012 Orlando session 414 Ulf Mattsson
 
Risk Management Practices for PCI DSS 2.0
Risk Management Practices for PCI DSS 2.0Risk Management Practices for PCI DSS 2.0
Risk Management Practices for PCI DSS 2.0
 
Lessons Learned From the Yahoo! Hack
Lessons Learned From the Yahoo! HackLessons Learned From the Yahoo! Hack
Lessons Learned From the Yahoo! Hack
 
beyond_the_firewall_0103
beyond_the_firewall_0103beyond_the_firewall_0103
beyond_the_firewall_0103
 
Data Loss Prevention: Challenges, Impacts & Effective Strategies
Data Loss Prevention: Challenges, Impacts & Effective StrategiesData Loss Prevention: Challenges, Impacts & Effective Strategies
Data Loss Prevention: Challenges, Impacts & Effective Strategies
 
Data Security and Regulatory Compliance
Data Security and Regulatory ComplianceData Security and Regulatory Compliance
Data Security and Regulatory Compliance
 
Cyber liability and cyber security
Cyber liability and cyber securityCyber liability and cyber security
Cyber liability and cyber security
 
Cyber Liabilty: A new exposure for businesses
Cyber Liabilty: A new exposure for businesses Cyber Liabilty: A new exposure for businesses
Cyber Liabilty: A new exposure for businesses
 
Cyber liabilty
Cyber liabiltyCyber liabilty
Cyber liabilty
 
ISACA Houston Texas Chapter 2010
ISACA Houston Texas Chapter 2010ISACA Houston Texas Chapter 2010
ISACA Houston Texas Chapter 2010
 

Similar to Corporate Data: A Protected Asset or a Ticking Time Bomb?

aOS Monaco 2019 - S3 - Présentation Varonis - Cloud Data Protection - Benjami...
aOS Monaco 2019 - S3 - Présentation Varonis - Cloud Data Protection - Benjami...aOS Monaco 2019 - S3 - Présentation Varonis - Cloud Data Protection - Benjami...
aOS Monaco 2019 - S3 - Présentation Varonis - Cloud Data Protection - Benjami...
aOS Community
 
DataGravity Security Pop Quiz
DataGravity Security Pop QuizDataGravity Security Pop Quiz
DataGravity Security Pop Quiz
DataGravity
 
Equilibrium Security Methodology 030414 Final v2
Equilibrium Security Methodology 030414 Final v2Equilibrium Security Methodology 030414 Final v2
Equilibrium Security Methodology 030414 Final v2
marchharvey
 
Intro To Secure Identity Management
Intro To Secure Identity ManagementIntro To Secure Identity Management
Intro To Secure Identity Management
Product Marketing Services
 
How Well is Your Organization Protecting its Real Crown Jewels - Identities?
How Well is Your Organization Protecting its Real Crown Jewels - Identities?How Well is Your Organization Protecting its Real Crown Jewels - Identities?
How Well is Your Organization Protecting its Real Crown Jewels - Identities?
Hitachi ID Systems, Inc.
 
Ais Romney 2006 Slides 08 Is Control2
Ais Romney 2006 Slides 08 Is Control2Ais Romney 2006 Slides 08 Is Control2
Ais Romney 2006 Slides 08 Is Control2
Sharing Slides Training
 
Ais Romney 2006 Slides 08 Is Control2
Ais Romney 2006 Slides 08 Is Control2Ais Romney 2006 Slides 08 Is Control2
Ais Romney 2006 Slides 08 Is Control2
sharing notes123
 
10.1.1.436.3364.pdf
10.1.1.436.3364.pdf10.1.1.436.3364.pdf
10.1.1.436.3364.pdf
mistryritesh
 
Perimeter Security is Failing
Perimeter Security is FailingPerimeter Security is Failing
Perimeter Security is Failing
UL Transaction Security
 
I Series User Management
I Series User ManagementI Series User Management
I Series User Management
SJeffrey23
 
Guide Preview: Ensuring your enterprise image-viewer if fully secure
Guide Preview: Ensuring your enterprise image-viewer if fully secureGuide Preview: Ensuring your enterprise image-viewer if fully secure
Guide Preview: Ensuring your enterprise image-viewer if fully secure
Calgary Scientific Inc.
 
Microsoft DATA Protection To Put secure.
Microsoft DATA Protection To Put secure.Microsoft DATA Protection To Put secure.
Microsoft DATA Protection To Put secure.
jayceewong1
 
How to Secure Data Privacy in 2024.pdf
How to Secure Data Privacy in 2024.pdfHow to Secure Data Privacy in 2024.pdf
How to Secure Data Privacy in 2024.pdf
V2Infotech1
 
How to Secure Data Privacy in 2024.pptx
How to Secure Data Privacy in 2024.pptxHow to Secure Data Privacy in 2024.pptx
How to Secure Data Privacy in 2024.pptx
V2Infotech1
 
SPYRUS® Enterprise Management System
SPYRUS®  Enterprise  Management  System SPYRUS®  Enterprise  Management  System
SPYRUS® Enterprise Management System
SPYRUS
 
BAI Security - Brochure - IT Security Assessment (Financial)
BAI Security - Brochure - IT Security Assessment (Financial)BAI Security - Brochure - IT Security Assessment (Financial)
BAI Security - Brochure - IT Security Assessment (Financial)
Prahlad Reddy
 
Service now is a software platform that supports IT service manag.docx
Service now is a software platform that supports IT service manag.docxService now is a software platform that supports IT service manag.docx
Service now is a software platform that supports IT service manag.docx
klinda1
 
Softchoice - Microsoft Office 365 - Discussing legal concerns and informatio...
Softchoice  - Microsoft Office 365 - Discussing legal concerns and informatio...Softchoice  - Microsoft Office 365 - Discussing legal concerns and informatio...
Softchoice - Microsoft Office 365 - Discussing legal concerns and informatio...
Softchoice Corporation
 
Courion Survey Findings: Access Risk Attitudes
Courion Survey Findings: Access Risk AttitudesCourion Survey Findings: Access Risk Attitudes
Courion Survey Findings: Access Risk Attitudes
Courion Corporation
 
6 Ways to Fight the Data Loss Gremlins
6 Ways to Fight the Data Loss Gremlins6 Ways to Fight the Data Loss Gremlins
6 Ways to Fight the Data Loss Gremlins
Intronis MSP Solutions by Barracuda
 

Similar to Corporate Data: A Protected Asset or a Ticking Time Bomb? (20)

aOS Monaco 2019 - S3 - Présentation Varonis - Cloud Data Protection - Benjami...
aOS Monaco 2019 - S3 - Présentation Varonis - Cloud Data Protection - Benjami...aOS Monaco 2019 - S3 - Présentation Varonis - Cloud Data Protection - Benjami...
aOS Monaco 2019 - S3 - Présentation Varonis - Cloud Data Protection - Benjami...
 
DataGravity Security Pop Quiz
DataGravity Security Pop QuizDataGravity Security Pop Quiz
DataGravity Security Pop Quiz
 
Equilibrium Security Methodology 030414 Final v2
Equilibrium Security Methodology 030414 Final v2Equilibrium Security Methodology 030414 Final v2
Equilibrium Security Methodology 030414 Final v2
 
Intro To Secure Identity Management
Intro To Secure Identity ManagementIntro To Secure Identity Management
Intro To Secure Identity Management
 
How Well is Your Organization Protecting its Real Crown Jewels - Identities?
How Well is Your Organization Protecting its Real Crown Jewels - Identities?How Well is Your Organization Protecting its Real Crown Jewels - Identities?
How Well is Your Organization Protecting its Real Crown Jewels - Identities?
 
Ais Romney 2006 Slides 08 Is Control2
Ais Romney 2006 Slides 08 Is Control2Ais Romney 2006 Slides 08 Is Control2
Ais Romney 2006 Slides 08 Is Control2
 
Ais Romney 2006 Slides 08 Is Control2
Ais Romney 2006 Slides 08 Is Control2Ais Romney 2006 Slides 08 Is Control2
Ais Romney 2006 Slides 08 Is Control2
 
10.1.1.436.3364.pdf
10.1.1.436.3364.pdf10.1.1.436.3364.pdf
10.1.1.436.3364.pdf
 
Perimeter Security is Failing
Perimeter Security is FailingPerimeter Security is Failing
Perimeter Security is Failing
 
I Series User Management
I Series User ManagementI Series User Management
I Series User Management
 
Guide Preview: Ensuring your enterprise image-viewer if fully secure
Guide Preview: Ensuring your enterprise image-viewer if fully secureGuide Preview: Ensuring your enterprise image-viewer if fully secure
Guide Preview: Ensuring your enterprise image-viewer if fully secure
 
Microsoft DATA Protection To Put secure.
Microsoft DATA Protection To Put secure.Microsoft DATA Protection To Put secure.
Microsoft DATA Protection To Put secure.
 
How to Secure Data Privacy in 2024.pdf
How to Secure Data Privacy in 2024.pdfHow to Secure Data Privacy in 2024.pdf
How to Secure Data Privacy in 2024.pdf
 
How to Secure Data Privacy in 2024.pptx
How to Secure Data Privacy in 2024.pptxHow to Secure Data Privacy in 2024.pptx
How to Secure Data Privacy in 2024.pptx
 
SPYRUS® Enterprise Management System
SPYRUS®  Enterprise  Management  System SPYRUS®  Enterprise  Management  System
SPYRUS® Enterprise Management System
 
BAI Security - Brochure - IT Security Assessment (Financial)
BAI Security - Brochure - IT Security Assessment (Financial)BAI Security - Brochure - IT Security Assessment (Financial)
BAI Security - Brochure - IT Security Assessment (Financial)
 
Service now is a software platform that supports IT service manag.docx
Service now is a software platform that supports IT service manag.docxService now is a software platform that supports IT service manag.docx
Service now is a software platform that supports IT service manag.docx
 
Softchoice - Microsoft Office 365 - Discussing legal concerns and informatio...
Softchoice  - Microsoft Office 365 - Discussing legal concerns and informatio...Softchoice  - Microsoft Office 365 - Discussing legal concerns and informatio...
Softchoice - Microsoft Office 365 - Discussing legal concerns and informatio...
 
Courion Survey Findings: Access Risk Attitudes
Courion Survey Findings: Access Risk AttitudesCourion Survey Findings: Access Risk Attitudes
Courion Survey Findings: Access Risk Attitudes
 
6 Ways to Fight the Data Loss Gremlins
6 Ways to Fight the Data Loss Gremlins6 Ways to Fight the Data Loss Gremlins
6 Ways to Fight the Data Loss Gremlins
 

Recently uploaded

Palo Alto Cortex XDR presentation .......
Palo Alto Cortex XDR presentation .......Palo Alto Cortex XDR presentation .......
Palo Alto Cortex XDR presentation .......
Sachin Paul
 
Udemy_2024_Global_Learning_Skills_Trends_Report (1).pdf
Udemy_2024_Global_Learning_Skills_Trends_Report (1).pdfUdemy_2024_Global_Learning_Skills_Trends_Report (1).pdf
Udemy_2024_Global_Learning_Skills_Trends_Report (1).pdf
Fernanda Palhano
 
Learn SQL from basic queries to Advance queries
Learn SQL from basic queries to Advance queriesLearn SQL from basic queries to Advance queries
Learn SQL from basic queries to Advance queries
manishkhaire30
 
一比一原版(GWU,GW文凭证书)乔治·华盛顿大学毕业证如何办理
一比一原版(GWU,GW文凭证书)乔治·华盛顿大学毕业证如何办理一比一原版(GWU,GW文凭证书)乔治·华盛顿大学毕业证如何办理
一比一原版(GWU,GW文凭证书)乔治·华盛顿大学毕业证如何办理
bopyb
 
The Ipsos - AI - Monitor 2024 Report.pdf
The  Ipsos - AI - Monitor 2024 Report.pdfThe  Ipsos - AI - Monitor 2024 Report.pdf
The Ipsos - AI - Monitor 2024 Report.pdf
Social Samosa
 
一比一原版(Coventry毕业证书)考文垂大学毕业证如何办理
一比一原版(Coventry毕业证书)考文垂大学毕业证如何办理一比一原版(Coventry毕业证书)考文垂大学毕业证如何办理
一比一原版(Coventry毕业证书)考文垂大学毕业证如何办理
74nqk8xf
 
06-12-2024-BudapestDataForum-BuildingReal-timePipelineswithFLaNK AIM
06-12-2024-BudapestDataForum-BuildingReal-timePipelineswithFLaNK AIM06-12-2024-BudapestDataForum-BuildingReal-timePipelineswithFLaNK AIM
06-12-2024-BudapestDataForum-BuildingReal-timePipelineswithFLaNK AIM
Timothy Spann
 
Everything you wanted to know about LIHTC
Everything you wanted to know about LIHTCEverything you wanted to know about LIHTC
Everything you wanted to know about LIHTC
Roger Valdez
 
My burning issue is homelessness K.C.M.O.
My burning issue is homelessness K.C.M.O.My burning issue is homelessness K.C.M.O.
My burning issue is homelessness K.C.M.O.
rwarrenll
 
Population Growth in Bataan: The effects of population growth around rural pl...
Population Growth in Bataan: The effects of population growth around rural pl...Population Growth in Bataan: The effects of population growth around rural pl...
Population Growth in Bataan: The effects of population growth around rural pl...
Bill641377
 
The Building Blocks of QuestDB, a Time Series Database
The Building Blocks of QuestDB, a Time Series DatabaseThe Building Blocks of QuestDB, a Time Series Database
The Building Blocks of QuestDB, a Time Series Database
javier ramirez
 
06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Dat...
06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Dat...06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Dat...
06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Dat...
Timothy Spann
 
4th Modern Marketing Reckoner by MMA Global India & Group M: 60+ experts on W...
4th Modern Marketing Reckoner by MMA Global India & Group M: 60+ experts on W...4th Modern Marketing Reckoner by MMA Global India & Group M: 60+ experts on W...
4th Modern Marketing Reckoner by MMA Global India & Group M: 60+ experts on W...
Social Samosa
 
A presentation that explain the Power BI Licensing
A presentation that explain the Power BI LicensingA presentation that explain the Power BI Licensing
A presentation that explain the Power BI Licensing
AlessioFois2
 
End-to-end pipeline agility - Berlin Buzzwords 2024
End-to-end pipeline agility - Berlin Buzzwords 2024End-to-end pipeline agility - Berlin Buzzwords 2024
End-to-end pipeline agility - Berlin Buzzwords 2024
Lars Albertsson
 
Global Situational Awareness of A.I. and where its headed
Global Situational Awareness of A.I. and where its headedGlobal Situational Awareness of A.I. and where its headed
Global Situational Awareness of A.I. and where its headed
vikram sood
 
ViewShift: Hassle-free Dynamic Policy Enforcement for Every Data Lake
ViewShift: Hassle-free Dynamic Policy Enforcement for Every Data LakeViewShift: Hassle-free Dynamic Policy Enforcement for Every Data Lake
ViewShift: Hassle-free Dynamic Policy Enforcement for Every Data Lake
Walaa Eldin Moustafa
 
一比一原版(牛布毕业证书)牛津布鲁克斯大学毕业证如何办理
一比一原版(牛布毕业证书)牛津布鲁克斯大学毕业证如何办理一比一原版(牛布毕业证书)牛津布鲁克斯大学毕业证如何办理
一比一原版(牛布毕业证书)牛津布鲁克斯大学毕业证如何办理
74nqk8xf
 
Influence of Marketing Strategy and Market Competition on Business Plan
Influence of Marketing Strategy and Market Competition on Business PlanInfluence of Marketing Strategy and Market Competition on Business Plan
Influence of Marketing Strategy and Market Competition on Business Plan
jerlynmaetalle
 
一比一原版(Harvard毕业证书)哈佛大学毕业证如何办理
一比一原版(Harvard毕业证书)哈佛大学毕业证如何办理一比一原版(Harvard毕业证书)哈佛大学毕业证如何办理
一比一原版(Harvard毕业证书)哈佛大学毕业证如何办理
zsjl4mimo
 

Recently uploaded (20)

Palo Alto Cortex XDR presentation .......
Palo Alto Cortex XDR presentation .......Palo Alto Cortex XDR presentation .......
Palo Alto Cortex XDR presentation .......
 
Udemy_2024_Global_Learning_Skills_Trends_Report (1).pdf
Udemy_2024_Global_Learning_Skills_Trends_Report (1).pdfUdemy_2024_Global_Learning_Skills_Trends_Report (1).pdf
Udemy_2024_Global_Learning_Skills_Trends_Report (1).pdf
 
Learn SQL from basic queries to Advance queries
Learn SQL from basic queries to Advance queriesLearn SQL from basic queries to Advance queries
Learn SQL from basic queries to Advance queries
 
一比一原版(GWU,GW文凭证书)乔治·华盛顿大学毕业证如何办理
一比一原版(GWU,GW文凭证书)乔治·华盛顿大学毕业证如何办理一比一原版(GWU,GW文凭证书)乔治·华盛顿大学毕业证如何办理
一比一原版(GWU,GW文凭证书)乔治·华盛顿大学毕业证如何办理
 
The Ipsos - AI - Monitor 2024 Report.pdf
The  Ipsos - AI - Monitor 2024 Report.pdfThe  Ipsos - AI - Monitor 2024 Report.pdf
The Ipsos - AI - Monitor 2024 Report.pdf
 
一比一原版(Coventry毕业证书)考文垂大学毕业证如何办理
一比一原版(Coventry毕业证书)考文垂大学毕业证如何办理一比一原版(Coventry毕业证书)考文垂大学毕业证如何办理
一比一原版(Coventry毕业证书)考文垂大学毕业证如何办理
 
06-12-2024-BudapestDataForum-BuildingReal-timePipelineswithFLaNK AIM
06-12-2024-BudapestDataForum-BuildingReal-timePipelineswithFLaNK AIM06-12-2024-BudapestDataForum-BuildingReal-timePipelineswithFLaNK AIM
06-12-2024-BudapestDataForum-BuildingReal-timePipelineswithFLaNK AIM
 
Everything you wanted to know about LIHTC
Everything you wanted to know about LIHTCEverything you wanted to know about LIHTC
Everything you wanted to know about LIHTC
 
My burning issue is homelessness K.C.M.O.
My burning issue is homelessness K.C.M.O.My burning issue is homelessness K.C.M.O.
My burning issue is homelessness K.C.M.O.
 
Population Growth in Bataan: The effects of population growth around rural pl...
Population Growth in Bataan: The effects of population growth around rural pl...Population Growth in Bataan: The effects of population growth around rural pl...
Population Growth in Bataan: The effects of population growth around rural pl...
 
The Building Blocks of QuestDB, a Time Series Database
The Building Blocks of QuestDB, a Time Series DatabaseThe Building Blocks of QuestDB, a Time Series Database
The Building Blocks of QuestDB, a Time Series Database
 
06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Dat...
06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Dat...06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Dat...
06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Dat...
 
4th Modern Marketing Reckoner by MMA Global India & Group M: 60+ experts on W...
4th Modern Marketing Reckoner by MMA Global India & Group M: 60+ experts on W...4th Modern Marketing Reckoner by MMA Global India & Group M: 60+ experts on W...
4th Modern Marketing Reckoner by MMA Global India & Group M: 60+ experts on W...
 
A presentation that explain the Power BI Licensing
A presentation that explain the Power BI LicensingA presentation that explain the Power BI Licensing
A presentation that explain the Power BI Licensing
 
End-to-end pipeline agility - Berlin Buzzwords 2024
End-to-end pipeline agility - Berlin Buzzwords 2024End-to-end pipeline agility - Berlin Buzzwords 2024
End-to-end pipeline agility - Berlin Buzzwords 2024
 
Global Situational Awareness of A.I. and where its headed
Global Situational Awareness of A.I. and where its headedGlobal Situational Awareness of A.I. and where its headed
Global Situational Awareness of A.I. and where its headed
 
ViewShift: Hassle-free Dynamic Policy Enforcement for Every Data Lake
ViewShift: Hassle-free Dynamic Policy Enforcement for Every Data LakeViewShift: Hassle-free Dynamic Policy Enforcement for Every Data Lake
ViewShift: Hassle-free Dynamic Policy Enforcement for Every Data Lake
 
一比一原版(牛布毕业证书)牛津布鲁克斯大学毕业证如何办理
一比一原版(牛布毕业证书)牛津布鲁克斯大学毕业证如何办理一比一原版(牛布毕业证书)牛津布鲁克斯大学毕业证如何办理
一比一原版(牛布毕业证书)牛津布鲁克斯大学毕业证如何办理
 
Influence of Marketing Strategy and Market Competition on Business Plan
Influence of Marketing Strategy and Market Competition on Business PlanInfluence of Marketing Strategy and Market Competition on Business Plan
Influence of Marketing Strategy and Market Competition on Business Plan
 
一比一原版(Harvard毕业证书)哈佛大学毕业证如何办理
一比一原版(Harvard毕业证书)哈佛大学毕业证如何办理一比一原版(Harvard毕业证书)哈佛大学毕业证如何办理
一比一原版(Harvard毕业证书)哈佛大学毕业证如何办理
 

Corporate Data: A Protected Asset or a Ticking Time Bomb?

  • 2. VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL2 What do over 2000 IT staff & end users have to say about internal security risks in their workplaces?
  • 4. VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL4 According to a recent survey conducted by The Ponemon Institute…
  • 5. VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL5 71% of end users say that they have access to company data they should not see.
  • 6. VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL6 That’s bad.
  • 7. VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL7 54% of those end users characterize that access as frequent or very frequent.
  • 8. VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL8 That’s worse. How much data are we talking about here?
  • 9. VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL9 38% of end users report that they and their co-workers can see "a lot of data".
  • 10. VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL10 Why is that?
  • 11. VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL11 4 in 5 IT practitioners say their organizations don't enforce a strict least-privilege (or need-to-know) data model.
  • 12. VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL12 That’s bad, too.
  • 13. VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL13 But they’re watching what employees are doing though, right?
  • 14. VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL14 Only 22% of employees say their organization can tell them what happened to lost data, files, or emails.
  • 15. VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL15 So about 78% of organizations don’t seem to be watching very closely.
  • 16. VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL16 In a nutshell, employees have access to a lot of data they don’t need, and no one is watching what they’re doing – do I have that right?
  • 17. VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL17 Yup
  • 18. VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL18 The failure of companies to create and enforce a least-privilege model – especially for confidential or sensitive data like credit card numbers or health records – will most certainly lead to more breaches and loss of critical data.
  • 19. VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL19 So poor controls will lead to more breaches. No surprise there. Is that all?
  • 20. VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL20 Not quite. In the Ponemon study, most end users and IT practitioners believe their organization would overlook security risks before they would sacrifice productivity.
  • 21. VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL21 So employees must be really productive, right? (If security is so lax…)
  • 22. VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL22 Wrong.
  • 23. VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL23 73% of end users believe the growth of emails, presentations, multimedia files and other types of company data has significantly affected their ability to find and access data.
  • 24. VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL24 That’s weird – does IT know that employees can’t find data?
  • 25. VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL25 60% of IT practitioners say it is very difficult or difficult for employees to search and find company data or files they or their co-workers have created that isn't stored on their own computers.
  • 26. VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL26 That’s certainly counter-productive – what about getting access to data?
  • 27. VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL27 43% of end users say it takes weeks, months, or longer to be granted access to data they request access to in order to do their jobs.
  • 28. VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL28 Only 22% report that access is typically granted within minutes or hours.
  • 29. VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL29 That’s pretty bad, too.
  • 30. VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL30 What about being able to share data easily?
  • 31. VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL31 68% of end users say it is difficult or very difficult to share appropriate data or files with business partners such as customers or vendors.
  • 32. VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL32 How would they prefer to share data?
  • 33. VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL33 43% of employees prefer to use public cloud file sync and share services to share data, which means it’s more popular than any platform other than email.
  • 34. VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL34 76% of end users believe there are times when it is acceptable to transfer work documents to their personal devices…
  • 35. VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL35 …while only 13% of IT practitioners agree.
  • 36. VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL36 So end users are sort of doing their own thing…
  • 37. VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL37 Yup
  • 38. VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL38 So how important is this data we’re talking about that: we aren’t protecting well and can’t really find anymore or share easily and storing in the public cloud when we feel like it (even though IT doesn’t think we should?)
  • 39. VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL39 76% of end users say their job requires them to access and use proprietary information such as customer data, employee records, financial reports, and confidential business documents.
  • 40. VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL40 So pretty much the most important data imaginable.
  • 41. VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL41 44% of end users believe their organization experienced the loss or theft of company data over the past two years.
  • 42. VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL42 67% of IT staff say their organization experienced the loss or theft of company data over the past two years.
  • 43. VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL43 74% believe that insider mistakes, negligence, or malice are frequently or very frequently the cause of leakage of company data.
  • 44. VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL44 Shocker
  • 45. VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL45 So everyone is frantically fixing everything, right?
  • 46. VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL46 Only 22% of employees believe their organizations as a whole place a very high priority on the protection of company data.
  • 47. VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL47 Only 47% of IT practitioners believe employees in their organizations are taking appropriate steps to protect company data they have access to.
  • 48. VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL48 Not so much
  • 49. VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL49 Ponemon Conclusion An organization that reduces the amount of data employees have access to (by implementing a least-privilege access model, improving data disposition policies or ideally both) and streamlines their processes for granting access will likely benefit from more productive employees. From: Corporate Data: A Protected Asset or a Ticking Time Bomb?
  • 50. VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL50 Could you reduce risk and increase productivity? FIND OUT. http://info.varonis.com/assessment
  • 51. VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL51 Free Guide: 6 Tactics for Preventing Insider Threats Download here: http://info.varonis.com/ insider-threats-guide
  • 52. VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL52 Methodology The survey report, "Corporate Data: A Protected Asset or a Ticking Time Bomb?" is derived from interviews conducted by the Ponemon Institute in October 2014 with 2,276 employees in the United States, United Kingdom, France, and Germany. Respondents included 1,166 IT practitioners and 1,110 end users in organizations ranging in size from dozens to tens of thousands of employees, in a variety of industries including financial services, public sector, health & pharmaceutical, retail, industrial, and technology and software.
  • 53. VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL53 About Ponemon Ponemon Institute Advancing Responsible Information Management Ponemon Institute is dedicated to independent research and education that advances responsible information and privacy management practices within business and government. Our mission is to conduct high quality, empirical studies on critical issues affecting the management and security of sensitive information about people and organizations. As a member of the Council of American Survey Research Organizations (CASRO), we uphold strict data confidentiality, privacy and ethical research standards. We do not collect any personally identifiable information from individuals (or company identifiable information in our business research). Furthermore, we have strict quality standards to ensure that subjects are not asked extraneous, irrelevant or improper questions.
  • 54. VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL54 About Varonis Varonis is the leading provider of software solutions for unstructured, human-generated enterprise data. Varonis provides an innovative software platform that allows enterprises to map, analyze, manage and migrate their unstructured data. Varonis specializes in human-generated data, a type of unstructured data that includes an enterprise's spreadsheets, word processing documents, presentations, audio files, video files, emails, text messages and any other data created by employees. This data often contains an enterprise's financial information, product plans, strategic initiatives, intellectual property and numerous other forms of vital information. IT and business personnel deploy Varonis software for a variety of use cases, including data governance, data security, archiving, file synchronization, enhanced mobile data accessibility and information collaboration. As of September 30, 2014, Varonis had approximately 3,000 customers, spanning leading firms in the financial services, public, healthcare, industrial, energy & utilities, technology, consumer and retail, education and media & entertainment sectors. Join the Varonis conversation on Facebook, LinkedIn, Twitter, and YouTube and subscribe to our Metadata Era blog.
  • 55. VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL Thank You Name Email Address Phone Number