SlideShare a Scribd company logo
1 of 31
Download to read offline
It’s All About Insight
Agenda
1 Introduction
2 Locate
3 Protect
4 Monitor
© 2017 Veritas Technologies LLC2
Unknowns of Unstructured Data
What
data is
out
there?
Who
owns this
data?
Who can
access
this data? Where
should I
store this
data?
Who is
using this
data?
How is
this data
being
used?
What is the
Value of
this data?
Is the
information
storage
compliant?
© 2017 Veritas Technologies LLC3
File
Metadata
Size
Size on
Disk
Modify
Date
Access
Date
Create
Date
Creator
Risk
Score
User
Activity
Effective
Permissions
Share
Group
Structure
Protect
Bit Allows
Denies
User
SIDS
Nested
Groups
ACL
Content
Classification
PII
Credit
Card
User
Credentials Confidential
CanWe Locate Data
When it’s Dark?
© 2017 Veritas Technologies LLC4
Data Insight Multi-dimensional Classification
Age
Type
Size
Last accessed
Server
Location
Content
Policy
Created
date
User
Risk
Resource
Risk
© 2017 Veritas Technologies LLC5
Personally
Identifiable
Information
Confidential
De-Structured
• Proximity searching
• Regular expressions
• Dictionaries of sensitive types and terms
• Built-in Patterns
• Checksum validation
–LUHN
• Confidence ranges
• Keywords
• Incremental scans based on DI Forensics
reduces unnecessary re-scans
Target Content with Classification
© 2017 Veritas Technologies LLC6
Locate
© 2017 Veritas Technologies LLC7
Locate DifferentTypes of PII
Integrated Classification Engine
Define and Locate PII relevant to
GDPR or other Regulations
Scan all data at rest
Old Data
Newly created data
As writes occur
Keep a fresh and reliable Data
Map using intelligent classification
Updated policies constantly on
the way
© 2017 Veritas Technologies LLC8
Smart Classification
Find PII Efficiently
Machine Learning based Classification Prioritization
Continuous growth of unstructured data creates
a scale problem for inspecting file content
Predictive algorithm uses DI context to find
the data most likely to contain tagged data
Find PII more quickly within Dark Data for a
quicker time to value
© 2017 Veritas Technologies LLC9
Targeted Classification
Ensure Relevancy and Freshness
Use reports to target users who author
data for near time classification
• Scope users by
– Attribute
– Risk Score
• Scope files by
– Extension
– Risk Score
– Location
Department Citizenship
JobTitle
© 2017 Veritas Technologies LLC10
FindanyCustomer
PIIonshares
accessibletothe
EveryoneGroup,or
anyonenotin
DepartmentX
Find any
Customer PII that
was accessed by
User X between
time A and B
Did anyone
access this file
containing
Employee PII
while it was on an
inappropriate
share?
Locate Sample Questions
Find any stale
and orphaned
files we can
move/eliminate
I need to find the
person
responsible for
this sensitive file
© 2017 Veritas Technologies LLC11
Protect
© 2017 Veritas Technologies LLC12
Protect
“I need to
evaluate those
that can access
this data to
ensure only
authorized
people can
access.”
© 2017 Veritas Technologies LLC13
How Does a User Get to a file?
© 2017 Veritas Technologies LLC14
Is the Security Appropriate?
Contractor
Customer
PII
Contractor
Modify this group
© 2017 Veritas Technologies LLC15
Review and Attest
• Automatically guide
custodians through
reviewing security on their
data
• Provide audited proof of
approval from custodians
• Provide action plans for
remediation
Simplified Custodian
Entitlements Review and
Attestation
© 2017 Veritas Technologies LLC16
Inform Custodians with User and File Metadata
• Allow Custodians to see if
sensitive data is present
• Allow Custodians to see if users
are even actively using assigned
permissions
• Show user metadata to help
custodians understand types of
users with access to this data
Provide Custodians with enough data to
make informed decisions on access
Portal Options
© 2017 Veritas Technologies LLC17
Monitor
© 2017 Veritas Technologies LLC18
Monitor
“I need to track
users of
interest, or any
users interacting
with a file in
question”
“I want to look
for abnormal
behavior so I can
find suspicious
users, or
compromised
accounts”
© 2017 Veritas Technologies LLC19
Forensics Investigations / Alerts
High Risk
Users
Person of
Interest
Sensitive Data
Access Alerts
Group /
Like Users
© 2017 Veritas Technologies LLC20
Forensics Benefits
Risk
Regulatory
Protected Data
Activity Derived
Inferred
Ownership
Entitlements /
IPAC
© 2017 Veritas Technologies LLC21
Access Forensics
© 2017 Veritas Technologies LLC22
User Risk -Visualization
• Integrated Relative
User Risk Score
• Simple Risk
Assessment
Understand High
Risk Users and the
DataThey Interact
With
© 2017 Veritas Technologies LLC23
Resource Risk
• Resource Risk
Prioritization
• Incorporate Risky
User Action
• Action Prioritization
Understand Risk and
Prioritize Action
© 2017 Veritas Technologies LLC24
Risk Dossier
© 2017 Veritas Technologies LLC25
Risk Dossier
© 2017 Veritas Technologies LLC26
InsiderThreat
• Social Networking Map
Combined with Risk Score
Changes InsiderThreat
Tracking
• Proactive RealTime Alerts
to Mitigate Damage
Find the Risky Behavior
Before it’s a Problem
© 2017 Veritas Technologies LLC27
RealTime Alerts
• Continuous monitoring
of sensitive data
• Quick alerting and
response
• Minimize damage
Faster Response to
High Risk Events
© 2017 Veritas Technologies LLC28
Bringing itTogether to Identify Information
© 2017 Veritas Technologies LLC29
Data Insight
Q&A
© 2017 Veritas Technologies LLC30
Copyright © 2017 Veritas Technologies. All rights reserved. Veritas and the Veritas Logo are trademarks or registered trademarks of Veritas Technologies or its affiliates in the
U.S. and other countries. Other names may be trademarks of their respective owners.
This document is provided for informational purposes only and is not intended as advertising. All warranties relating to the information in this document, either express or
implied, are disclaimed to the maximum extent allowed by law. The information in this document is subject to change without notice.
ThankYou

More Related Content

What's hot

Accelerate your digital business transformation with 360 Data Management
Accelerate your digital business transformation with 360 Data ManagementAccelerate your digital business transformation with 360 Data Management
Accelerate your digital business transformation with 360 Data ManagementVeritas Technologies LLC
 
NetBackup CloudCatalyst – efficient, cost-effective deduplication to the cloud
NetBackup CloudCatalyst – efficient, cost-effective deduplication to the cloudNetBackup CloudCatalyst – efficient, cost-effective deduplication to the cloud
NetBackup CloudCatalyst – efficient, cost-effective deduplication to the cloudVeritas Technologies LLC
 
NetBackup CloudCatalyst: Efficient, Cost-Effective Deduplication to the Cloud
NetBackup CloudCatalyst: Efficient, Cost-Effective Deduplication to the CloudNetBackup CloudCatalyst: Efficient, Cost-Effective Deduplication to the Cloud
NetBackup CloudCatalyst: Efficient, Cost-Effective Deduplication to the CloudVeritas Technologies LLC
 
A futuristic look at BnR: The rise of the machine learning
A futuristic look at BnR: The rise of the machine learningA futuristic look at BnR: The rise of the machine learning
A futuristic look at BnR: The rise of the machine learningVeritas Technologies LLC
 
SLA Consistency: Protecting Workloads from On-premises to Cloud without Compr...
SLA Consistency: Protecting Workloads from On-premises to Cloud without Compr...SLA Consistency: Protecting Workloads from On-premises to Cloud without Compr...
SLA Consistency: Protecting Workloads from On-premises to Cloud without Compr...Veritas Technologies LLC
 
Raising Your Game: Maximizing Uptime in the Multi-cloud
Raising Your Game: Maximizing Uptime in the Multi-cloudRaising Your Game: Maximizing Uptime in the Multi-cloud
Raising Your Game: Maximizing Uptime in the Multi-cloudVeritas Technologies LLC
 
Examining Technical Best Practices for Veritas and Azure Using a Detailed Re...
 Examining Technical Best Practices for Veritas and Azure Using a Detailed Re... Examining Technical Best Practices for Veritas and Azure Using a Detailed Re...
Examining Technical Best Practices for Veritas and Azure Using a Detailed Re...Veritas Technologies LLC
 
Moving to hyper-converged? Don’t forget about data protection.
Moving to hyper-converged? Don’t forget about data protection.Moving to hyper-converged? Don’t forget about data protection.
Moving to hyper-converged? Don’t forget about data protection.Veritas Technologies LLC
 
Implementing a long term data retention strategy that leverages the cloud
Implementing a long term data retention strategy that leverages the cloudImplementing a long term data retention strategy that leverages the cloud
Implementing a long term data retention strategy that leverages the cloudVeritas Technologies LLC
 
Rethinking data protection for open stack and container workloads
Rethinking data protection for open stack and container workloadsRethinking data protection for open stack and container workloads
Rethinking data protection for open stack and container workloadsVeritas Technologies LLC
 
Veritas Solution Day 2017, France, keynote by Mike Palmer
Veritas Solution Day 2017, France, keynote by Mike PalmerVeritas Solution Day 2017, France, keynote by Mike Palmer
Veritas Solution Day 2017, France, keynote by Mike PalmerVeritas Technologies LLC
 
Test Drive: Experience Single-Click Command with the Veritas Access User Inte...
Test Drive: Experience Single-Click Command with the Veritas Access User Inte...Test Drive: Experience Single-Click Command with the Veritas Access User Inte...
Test Drive: Experience Single-Click Command with the Veritas Access User Inte...Veritas Technologies LLC
 
Track technologique modernize data protection
Track technologique modernize data protectionTrack technologique modernize data protection
Track technologique modernize data protectionVeritas Technologies LLC
 
Top 5 Reasons to Replace Data Domain with NetBackup Appliances
Top 5 Reasons to Replace Data Domain with NetBackup AppliancesTop 5 Reasons to Replace Data Domain with NetBackup Appliances
Top 5 Reasons to Replace Data Domain with NetBackup AppliancesVeritas Technologies LLC
 
Stop compromising your data in the cloud with Veritas CloudPoint
Stop compromising your data in the cloud with Veritas CloudPointStop compromising your data in the cloud with Veritas CloudPoint
Stop compromising your data in the cloud with Veritas CloudPointVeritas Technologies LLC
 
Deep Dive: What's New in NetBackup Appliances 3.1
Deep Dive: What's New in NetBackup Appliances 3.1Deep Dive: What's New in NetBackup Appliances 3.1
Deep Dive: What's New in NetBackup Appliances 3.1Veritas Technologies LLC
 

What's hot (20)

Accelerate your digital business transformation with 360 Data Management
Accelerate your digital business transformation with 360 Data ManagementAccelerate your digital business transformation with 360 Data Management
Accelerate your digital business transformation with 360 Data Management
 
NetBackup CloudCatalyst – efficient, cost-effective deduplication to the cloud
NetBackup CloudCatalyst – efficient, cost-effective deduplication to the cloudNetBackup CloudCatalyst – efficient, cost-effective deduplication to the cloud
NetBackup CloudCatalyst – efficient, cost-effective deduplication to the cloud
 
NetBackup CloudCatalyst: Efficient, Cost-Effective Deduplication to the Cloud
NetBackup CloudCatalyst: Efficient, Cost-Effective Deduplication to the CloudNetBackup CloudCatalyst: Efficient, Cost-Effective Deduplication to the Cloud
NetBackup CloudCatalyst: Efficient, Cost-Effective Deduplication to the Cloud
 
A futuristic look at BnR: The rise of the machine learning
A futuristic look at BnR: The rise of the machine learningA futuristic look at BnR: The rise of the machine learning
A futuristic look at BnR: The rise of the machine learning
 
SLA Consistency: Protecting Workloads from On-premises to Cloud without Compr...
SLA Consistency: Protecting Workloads from On-premises to Cloud without Compr...SLA Consistency: Protecting Workloads from On-premises to Cloud without Compr...
SLA Consistency: Protecting Workloads from On-premises to Cloud without Compr...
 
Keeping Your Cloud Workloads Protected
Keeping Your Cloud Workloads ProtectedKeeping Your Cloud Workloads Protected
Keeping Your Cloud Workloads Protected
 
Raising Your Game: Maximizing Uptime in the Multi-cloud
Raising Your Game: Maximizing Uptime in the Multi-cloudRaising Your Game: Maximizing Uptime in the Multi-cloud
Raising Your Game: Maximizing Uptime in the Multi-cloud
 
Examining Technical Best Practices for Veritas and Azure Using a Detailed Re...
 Examining Technical Best Practices for Veritas and Azure Using a Detailed Re... Examining Technical Best Practices for Veritas and Azure Using a Detailed Re...
Examining Technical Best Practices for Veritas and Azure Using a Detailed Re...
 
Moving to hyper-converged? Don’t forget about data protection.
Moving to hyper-converged? Don’t forget about data protection.Moving to hyper-converged? Don’t forget about data protection.
Moving to hyper-converged? Don’t forget about data protection.
 
Implementing a long term data retention strategy that leverages the cloud
Implementing a long term data retention strategy that leverages the cloudImplementing a long term data retention strategy that leverages the cloud
Implementing a long term data retention strategy that leverages the cloud
 
AWSome Insider's View of NetBackup 8.1
AWSome Insider's View of NetBackup 8.1AWSome Insider's View of NetBackup 8.1
AWSome Insider's View of NetBackup 8.1
 
Rethinking data protection for open stack and container workloads
Rethinking data protection for open stack and container workloadsRethinking data protection for open stack and container workloads
Rethinking data protection for open stack and container workloads
 
Veritas Solution Day 2017, France, keynote by Mike Palmer
Veritas Solution Day 2017, France, keynote by Mike PalmerVeritas Solution Day 2017, France, keynote by Mike Palmer
Veritas Solution Day 2017, France, keynote by Mike Palmer
 
AWSome Data Protection with Backup Exec
AWSome Data Protection with Backup ExecAWSome Data Protection with Backup Exec
AWSome Data Protection with Backup Exec
 
Test Drive: Experience Single-Click Command with the Veritas Access User Inte...
Test Drive: Experience Single-Click Command with the Veritas Access User Inte...Test Drive: Experience Single-Click Command with the Veritas Access User Inte...
Test Drive: Experience Single-Click Command with the Veritas Access User Inte...
 
Track technologique modernize data protection
Track technologique modernize data protectionTrack technologique modernize data protection
Track technologique modernize data protection
 
Top 5 Reasons to Replace Data Domain with NetBackup Appliances
Top 5 Reasons to Replace Data Domain with NetBackup AppliancesTop 5 Reasons to Replace Data Domain with NetBackup Appliances
Top 5 Reasons to Replace Data Domain with NetBackup Appliances
 
Stop compromising your data in the cloud with Veritas CloudPoint
Stop compromising your data in the cloud with Veritas CloudPointStop compromising your data in the cloud with Veritas CloudPoint
Stop compromising your data in the cloud with Veritas CloudPoint
 
Reduce Your Data Footprint
Reduce Your Data FootprintReduce Your Data Footprint
Reduce Your Data Footprint
 
Deep Dive: What's New in NetBackup Appliances 3.1
Deep Dive: What's New in NetBackup Appliances 3.1Deep Dive: What's New in NetBackup Appliances 3.1
Deep Dive: What's New in NetBackup Appliances 3.1
 

Similar to It's All about Insight: Unlocking Effective Risk Management for Your Unstructured Data

Keynote session – Mitigate risks and stay compliant with Chris Bridgland and ...
Keynote session – Mitigate risks and stay compliant with Chris Bridgland and ...Keynote session – Mitigate risks and stay compliant with Chris Bridgland and ...
Keynote session – Mitigate risks and stay compliant with Chris Bridgland and ...Veritas Technologies LLC
 
Beyond Kerberos and Ranger - Tips to discover, track and manage risks in hybr...
Beyond Kerberos and Ranger - Tips to discover, track and manage risks in hybr...Beyond Kerberos and Ranger - Tips to discover, track and manage risks in hybr...
Beyond Kerberos and Ranger - Tips to discover, track and manage risks in hybr...DataWorks Summit
 
SpTechCon OneDrive Success Part 1: Planning the Leap to the Cloud
SpTechCon OneDrive Success Part 1: Planning the Leap to the Cloud	SpTechCon OneDrive Success Part 1: Planning the Leap to the Cloud
SpTechCon OneDrive Success Part 1: Planning the Leap to the Cloud Adam Levithan
 
Peter Grimmond – Harnessing the power of data
Peter Grimmond – Harnessing the power of dataPeter Grimmond – Harnessing the power of data
Peter Grimmond – Harnessing the power of dataVeritas Technologies LLC
 
Introduction to Mydex CIC Personal Data Stores - 7th March 2013
Introduction to Mydex CIC Personal Data Stores -  7th March 2013Introduction to Mydex CIC Personal Data Stores -  7th March 2013
Introduction to Mydex CIC Personal Data Stores - 7th March 2013Mydex CIC
 
Strengthen Cloud Security
Strengthen Cloud SecurityStrengthen Cloud Security
Strengthen Cloud SecurityLora O'Haver
 
Secure Your Data with Fidelis Network® for DLP
Secure Your Data with Fidelis Network® for DLPSecure Your Data with Fidelis Network® for DLP
Secure Your Data with Fidelis Network® for DLPFidelis Cybersecurity
 
How to Improve Threat Detection & Simplify Security Operations
How to Improve Threat Detection & Simplify Security OperationsHow to Improve Threat Detection & Simplify Security Operations
How to Improve Threat Detection & Simplify Security OperationsIBM Security
 
GDPR Fast Start
GDPR Fast StartGDPR Fast Start
GDPR Fast StartDelphix
 
Seattle Tech4Good meetup: Data Security and Privacy
Seattle Tech4Good meetup: Data Security and PrivacySeattle Tech4Good meetup: Data Security and Privacy
Seattle Tech4Good meetup: Data Security and PrivacySabra Goldick
 
Sharon Dawes (CTG Albany) Open data quality: a practical view
Sharon Dawes (CTG Albany) Open data quality: a practical viewSharon Dawes (CTG Albany) Open data quality: a practical view
Sharon Dawes (CTG Albany) Open data quality: a practical viewOpen City Foundation
 
The value of big data analytics
The value of big data analyticsThe value of big data analytics
The value of big data analyticsMarc Vael
 
A New Approach to Threat Detection: Big Data Security Analytics
A New Approach to Threat Detection: Big Data Security Analytics A New Approach to Threat Detection: Big Data Security Analytics
A New Approach to Threat Detection: Big Data Security Analytics Interset
 
Data Analytics Governance and Ethics
Data Analytics Governance and EthicsData Analytics Governance and Ethics
Data Analytics Governance and EthicsHPCC Systems
 
GDPR Part 2: Quest Relevance
GDPR Part 2: Quest RelevanceGDPR Part 2: Quest Relevance
GDPR Part 2: Quest RelevanceAdrian Dumitrescu
 
Business Continuity and app Security
Business Continuity and app Security Business Continuity and app Security
Business Continuity and app Security Cristian Garcia G.
 
Importance of Identity Management in Security - Microsoft Tech Tour @Towson
Importance of Identity Management in Security - Microsoft Tech Tour @TowsonImportance of Identity Management in Security - Microsoft Tech Tour @Towson
Importance of Identity Management in Security - Microsoft Tech Tour @TowsonAdam Levithan
 
NTXISSACSC2 - Information Security Opportunity: Embracing Big Data with Peopl...
NTXISSACSC2 - Information Security Opportunity: Embracing Big Data with Peopl...NTXISSACSC2 - Information Security Opportunity: Embracing Big Data with Peopl...
NTXISSACSC2 - Information Security Opportunity: Embracing Big Data with Peopl...North Texas Chapter of the ISSA
 
B2 - The History of Content Security: Part 2 - Adam Levithan
B2 - The History of Content Security: Part 2 - Adam LevithanB2 - The History of Content Security: Part 2 - Adam Levithan
B2 - The History of Content Security: Part 2 - Adam LevithanSPS Paris
 
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...CA Technologies
 

Similar to It's All about Insight: Unlocking Effective Risk Management for Your Unstructured Data (20)

Keynote session – Mitigate risks and stay compliant with Chris Bridgland and ...
Keynote session – Mitigate risks and stay compliant with Chris Bridgland and ...Keynote session – Mitigate risks and stay compliant with Chris Bridgland and ...
Keynote session – Mitigate risks and stay compliant with Chris Bridgland and ...
 
Beyond Kerberos and Ranger - Tips to discover, track and manage risks in hybr...
Beyond Kerberos and Ranger - Tips to discover, track and manage risks in hybr...Beyond Kerberos and Ranger - Tips to discover, track and manage risks in hybr...
Beyond Kerberos and Ranger - Tips to discover, track and manage risks in hybr...
 
SpTechCon OneDrive Success Part 1: Planning the Leap to the Cloud
SpTechCon OneDrive Success Part 1: Planning the Leap to the Cloud	SpTechCon OneDrive Success Part 1: Planning the Leap to the Cloud
SpTechCon OneDrive Success Part 1: Planning the Leap to the Cloud
 
Peter Grimmond – Harnessing the power of data
Peter Grimmond – Harnessing the power of dataPeter Grimmond – Harnessing the power of data
Peter Grimmond – Harnessing the power of data
 
Introduction to Mydex CIC Personal Data Stores - 7th March 2013
Introduction to Mydex CIC Personal Data Stores -  7th March 2013Introduction to Mydex CIC Personal Data Stores -  7th March 2013
Introduction to Mydex CIC Personal Data Stores - 7th March 2013
 
Strengthen Cloud Security
Strengthen Cloud SecurityStrengthen Cloud Security
Strengthen Cloud Security
 
Secure Your Data with Fidelis Network® for DLP
Secure Your Data with Fidelis Network® for DLPSecure Your Data with Fidelis Network® for DLP
Secure Your Data with Fidelis Network® for DLP
 
How to Improve Threat Detection & Simplify Security Operations
How to Improve Threat Detection & Simplify Security OperationsHow to Improve Threat Detection & Simplify Security Operations
How to Improve Threat Detection & Simplify Security Operations
 
GDPR Fast Start
GDPR Fast StartGDPR Fast Start
GDPR Fast Start
 
Seattle Tech4Good meetup: Data Security and Privacy
Seattle Tech4Good meetup: Data Security and PrivacySeattle Tech4Good meetup: Data Security and Privacy
Seattle Tech4Good meetup: Data Security and Privacy
 
Sharon Dawes (CTG Albany) Open data quality: a practical view
Sharon Dawes (CTG Albany) Open data quality: a practical viewSharon Dawes (CTG Albany) Open data quality: a practical view
Sharon Dawes (CTG Albany) Open data quality: a practical view
 
The value of big data analytics
The value of big data analyticsThe value of big data analytics
The value of big data analytics
 
A New Approach to Threat Detection: Big Data Security Analytics
A New Approach to Threat Detection: Big Data Security Analytics A New Approach to Threat Detection: Big Data Security Analytics
A New Approach to Threat Detection: Big Data Security Analytics
 
Data Analytics Governance and Ethics
Data Analytics Governance and EthicsData Analytics Governance and Ethics
Data Analytics Governance and Ethics
 
GDPR Part 2: Quest Relevance
GDPR Part 2: Quest RelevanceGDPR Part 2: Quest Relevance
GDPR Part 2: Quest Relevance
 
Business Continuity and app Security
Business Continuity and app Security Business Continuity and app Security
Business Continuity and app Security
 
Importance of Identity Management in Security - Microsoft Tech Tour @Towson
Importance of Identity Management in Security - Microsoft Tech Tour @TowsonImportance of Identity Management in Security - Microsoft Tech Tour @Towson
Importance of Identity Management in Security - Microsoft Tech Tour @Towson
 
NTXISSACSC2 - Information Security Opportunity: Embracing Big Data with Peopl...
NTXISSACSC2 - Information Security Opportunity: Embracing Big Data with Peopl...NTXISSACSC2 - Information Security Opportunity: Embracing Big Data with Peopl...
NTXISSACSC2 - Information Security Opportunity: Embracing Big Data with Peopl...
 
B2 - The History of Content Security: Part 2 - Adam Levithan
B2 - The History of Content Security: Part 2 - Adam LevithanB2 - The History of Content Security: Part 2 - Adam Levithan
B2 - The History of Content Security: Part 2 - Adam Levithan
 
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
 

More from Veritas Technologies LLC

Veritas Vision Solution Day 2020, Istanbul, Turkey
Veritas Vision Solution Day 2020, Istanbul, TurkeyVeritas Vision Solution Day 2020, Istanbul, Turkey
Veritas Vision Solution Day 2020, Istanbul, TurkeyVeritas Technologies LLC
 
Experience Data Management Clarity with Veritas - VMworld 2019 Presentation
Experience Data Management Clarity with Veritas - VMworld 2019 PresentationExperience Data Management Clarity with Veritas - VMworld 2019 Presentation
Experience Data Management Clarity with Veritas - VMworld 2019 PresentationVeritas Technologies LLC
 
How to Extend Availability to the Application Layer Across the Hybrid Cloud -...
How to Extend Availability to the Application Layer Across the Hybrid Cloud -...How to Extend Availability to the Application Layer Across the Hybrid Cloud -...
How to Extend Availability to the Application Layer Across the Hybrid Cloud -...Veritas Technologies LLC
 
Get trust and confidence to manage your data in hybrid it environments japanese
 Get trust and confidence to manage your data in hybrid it environments japanese Get trust and confidence to manage your data in hybrid it environments japanese
Get trust and confidence to manage your data in hybrid it environments japaneseVeritas Technologies LLC
 
VSD Paris 2018: Vertical Use Case - Telco Services
VSD Paris 2018: Vertical Use Case - Telco ServicesVSD Paris 2018: Vertical Use Case - Telco Services
VSD Paris 2018: Vertical Use Case - Telco ServicesVeritas Technologies LLC
 
VSD Paris 2018: Vertical Use Case - Public Sector
VSD Paris 2018: Vertical Use Case - Public SectorVSD Paris 2018: Vertical Use Case - Public Sector
VSD Paris 2018: Vertical Use Case - Public SectorVeritas Technologies LLC
 
VSD Paris 2018: Vertical Use Case - Manufacturing
VSD Paris 2018: Vertical Use Case - Manufacturing VSD Paris 2018: Vertical Use Case - Manufacturing
VSD Paris 2018: Vertical Use Case - Manufacturing Veritas Technologies LLC
 
VSD Paris 2018: Vertical Use Case - Banking, Finance, Insurance
VSD Paris 2018: Vertical Use Case - Banking, Finance, InsuranceVSD Paris 2018: Vertical Use Case - Banking, Finance, Insurance
VSD Paris 2018: Vertical Use Case - Banking, Finance, InsuranceVeritas Technologies LLC
 
Gartner IT Infrastructure Operations & Cloud Strategies Conference 2018: Rise...
Gartner IT Infrastructure Operations & Cloud Strategies Conference 2018: Rise...Gartner IT Infrastructure Operations & Cloud Strategies Conference 2018: Rise...
Gartner IT Infrastructure Operations & Cloud Strategies Conference 2018: Rise...Veritas Technologies LLC
 
VSD Zurich 2018: 360 Data Management and Take Control Over the Most Valuable ...
VSD Zurich 2018: 360 Data Management and Take Control Over the Most Valuable ...VSD Zurich 2018: 360 Data Management and Take Control Over the Most Valuable ...
VSD Zurich 2018: 360 Data Management and Take Control Over the Most Valuable ...Veritas Technologies LLC
 
VSD Zurich 2018: The Secret to Successful Digital Transformation
VSD Zurich 2018: The Secret to Successful Digital TransformationVSD Zurich 2018: The Secret to Successful Digital Transformation
VSD Zurich 2018: The Secret to Successful Digital TransformationVeritas Technologies LLC
 
Take Control Over Storage Costs with Intuitive Management and Simplicity
Take Control Over Storage Costs with Intuitive Management and SimplicityTake Control Over Storage Costs with Intuitive Management and Simplicity
Take Control Over Storage Costs with Intuitive Management and SimplicityVeritas Technologies LLC
 
VSD Seoul 2018: VMware Cloud Foundation on "The Future of Private Cloud"
VSD Seoul 2018: VMware Cloud Foundation on "The Future of Private Cloud"VSD Seoul 2018: VMware Cloud Foundation on "The Future of Private Cloud"
VSD Seoul 2018: VMware Cloud Foundation on "The Future of Private Cloud"Veritas Technologies LLC
 
VSD Seoul 2018: customer highlights on InfoScale
VSD Seoul 2018: customer highlights on InfoScaleVSD Seoul 2018: customer highlights on InfoScale
VSD Seoul 2018: customer highlights on InfoScaleVeritas Technologies LLC
 
VSD Seoul 2018: a Veritas customer case with Meritz Fire Insurance
VSD Seoul 2018: a Veritas customer case with Meritz Fire InsuranceVSD Seoul 2018: a Veritas customer case with Meritz Fire Insurance
VSD Seoul 2018: a Veritas customer case with Meritz Fire InsuranceVeritas Technologies LLC
 

More from Veritas Technologies LLC (20)

Veritas Vision Solution Day 2020, Istanbul, Turkey
Veritas Vision Solution Day 2020, Istanbul, TurkeyVeritas Vision Solution Day 2020, Istanbul, Turkey
Veritas Vision Solution Day 2020, Istanbul, Turkey
 
Experience Data Management Clarity with Veritas - VMworld 2019 Presentation
Experience Data Management Clarity with Veritas - VMworld 2019 PresentationExperience Data Management Clarity with Veritas - VMworld 2019 Presentation
Experience Data Management Clarity with Veritas - VMworld 2019 Presentation
 
How to Extend Availability to the Application Layer Across the Hybrid Cloud -...
How to Extend Availability to the Application Layer Across the Hybrid Cloud -...How to Extend Availability to the Application Layer Across the Hybrid Cloud -...
How to Extend Availability to the Application Layer Across the Hybrid Cloud -...
 
Get trust and confidence to manage your data in hybrid it environments japanese
 Get trust and confidence to manage your data in hybrid it environments japanese Get trust and confidence to manage your data in hybrid it environments japanese
Get trust and confidence to manage your data in hybrid it environments japanese
 
VSD Madrid 2019
VSD Madrid 2019VSD Madrid 2019
VSD Madrid 2019
 
VSD Istanbul 2018
VSD Istanbul 2018VSD Istanbul 2018
VSD Istanbul 2018
 
VSD Paris 2018: Vertical Use Case - Telco Services
VSD Paris 2018: Vertical Use Case - Telco ServicesVSD Paris 2018: Vertical Use Case - Telco Services
VSD Paris 2018: Vertical Use Case - Telco Services
 
VSD Paris 2018: Vertical Use Case - Public Sector
VSD Paris 2018: Vertical Use Case - Public SectorVSD Paris 2018: Vertical Use Case - Public Sector
VSD Paris 2018: Vertical Use Case - Public Sector
 
VSD Paris 2018: Vertical Use Case - Manufacturing
VSD Paris 2018: Vertical Use Case - Manufacturing VSD Paris 2018: Vertical Use Case - Manufacturing
VSD Paris 2018: Vertical Use Case - Manufacturing
 
VSD Paris 2018: Vertical Use Case - Banking, Finance, Insurance
VSD Paris 2018: Vertical Use Case - Banking, Finance, InsuranceVSD Paris 2018: Vertical Use Case - Banking, Finance, Insurance
VSD Paris 2018: Vertical Use Case - Banking, Finance, Insurance
 
VSD Paris 2018 - Présentation Finale
VSD Paris 2018 - Présentation FinaleVSD Paris 2018 - Présentation Finale
VSD Paris 2018 - Présentation Finale
 
Nutanix .NEXT London 2018
Nutanix .NEXT London 2018  Nutanix .NEXT London 2018
Nutanix .NEXT London 2018
 
Gartner IT Infrastructure Operations & Cloud Strategies Conference 2018: Rise...
Gartner IT Infrastructure Operations & Cloud Strategies Conference 2018: Rise...Gartner IT Infrastructure Operations & Cloud Strategies Conference 2018: Rise...
Gartner IT Infrastructure Operations & Cloud Strategies Conference 2018: Rise...
 
VSD Zurich 2018: 360 Data Management and Take Control Over the Most Valuable ...
VSD Zurich 2018: 360 Data Management and Take Control Over the Most Valuable ...VSD Zurich 2018: 360 Data Management and Take Control Over the Most Valuable ...
VSD Zurich 2018: 360 Data Management and Take Control Over the Most Valuable ...
 
VSD Zurich 2018: The Secret to Successful Digital Transformation
VSD Zurich 2018: The Secret to Successful Digital TransformationVSD Zurich 2018: The Secret to Successful Digital Transformation
VSD Zurich 2018: The Secret to Successful Digital Transformation
 
Take Control Over Storage Costs with Intuitive Management and Simplicity
Take Control Over Storage Costs with Intuitive Management and SimplicityTake Control Over Storage Costs with Intuitive Management and Simplicity
Take Control Over Storage Costs with Intuitive Management and Simplicity
 
VSD Zurich 2018: The Data Opportunity
VSD Zurich 2018: The Data OpportunityVSD Zurich 2018: The Data Opportunity
VSD Zurich 2018: The Data Opportunity
 
VSD Seoul 2018: VMware Cloud Foundation on "The Future of Private Cloud"
VSD Seoul 2018: VMware Cloud Foundation on "The Future of Private Cloud"VSD Seoul 2018: VMware Cloud Foundation on "The Future of Private Cloud"
VSD Seoul 2018: VMware Cloud Foundation on "The Future of Private Cloud"
 
VSD Seoul 2018: customer highlights on InfoScale
VSD Seoul 2018: customer highlights on InfoScaleVSD Seoul 2018: customer highlights on InfoScale
VSD Seoul 2018: customer highlights on InfoScale
 
VSD Seoul 2018: a Veritas customer case with Meritz Fire Insurance
VSD Seoul 2018: a Veritas customer case with Meritz Fire InsuranceVSD Seoul 2018: a Veritas customer case with Meritz Fire Insurance
VSD Seoul 2018: a Veritas customer case with Meritz Fire Insurance
 

Recently uploaded

Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentationphoebematthew05
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsPrecisely
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 

Recently uploaded (20)

Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentation
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power Systems
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 

It's All about Insight: Unlocking Effective Risk Management for Your Unstructured Data

  • 2. Agenda 1 Introduction 2 Locate 3 Protect 4 Monitor © 2017 Veritas Technologies LLC2
  • 3. Unknowns of Unstructured Data What data is out there? Who owns this data? Who can access this data? Where should I store this data? Who is using this data? How is this data being used? What is the Value of this data? Is the information storage compliant? © 2017 Veritas Technologies LLC3
  • 5. Data Insight Multi-dimensional Classification Age Type Size Last accessed Server Location Content Policy Created date User Risk Resource Risk © 2017 Veritas Technologies LLC5
  • 6. Personally Identifiable Information Confidential De-Structured • Proximity searching • Regular expressions • Dictionaries of sensitive types and terms • Built-in Patterns • Checksum validation –LUHN • Confidence ranges • Keywords • Incremental scans based on DI Forensics reduces unnecessary re-scans Target Content with Classification © 2017 Veritas Technologies LLC6
  • 7. Locate © 2017 Veritas Technologies LLC7
  • 8. Locate DifferentTypes of PII Integrated Classification Engine Define and Locate PII relevant to GDPR or other Regulations Scan all data at rest Old Data Newly created data As writes occur Keep a fresh and reliable Data Map using intelligent classification Updated policies constantly on the way © 2017 Veritas Technologies LLC8
  • 9. Smart Classification Find PII Efficiently Machine Learning based Classification Prioritization Continuous growth of unstructured data creates a scale problem for inspecting file content Predictive algorithm uses DI context to find the data most likely to contain tagged data Find PII more quickly within Dark Data for a quicker time to value © 2017 Veritas Technologies LLC9
  • 10. Targeted Classification Ensure Relevancy and Freshness Use reports to target users who author data for near time classification • Scope users by – Attribute – Risk Score • Scope files by – Extension – Risk Score – Location Department Citizenship JobTitle © 2017 Veritas Technologies LLC10
  • 11. FindanyCustomer PIIonshares accessibletothe EveryoneGroup,or anyonenotin DepartmentX Find any Customer PII that was accessed by User X between time A and B Did anyone access this file containing Employee PII while it was on an inappropriate share? Locate Sample Questions Find any stale and orphaned files we can move/eliminate I need to find the person responsible for this sensitive file © 2017 Veritas Technologies LLC11
  • 12. Protect © 2017 Veritas Technologies LLC12
  • 13. Protect “I need to evaluate those that can access this data to ensure only authorized people can access.” © 2017 Veritas Technologies LLC13
  • 14. How Does a User Get to a file? © 2017 Veritas Technologies LLC14
  • 15. Is the Security Appropriate? Contractor Customer PII Contractor Modify this group © 2017 Veritas Technologies LLC15
  • 16. Review and Attest • Automatically guide custodians through reviewing security on their data • Provide audited proof of approval from custodians • Provide action plans for remediation Simplified Custodian Entitlements Review and Attestation © 2017 Veritas Technologies LLC16
  • 17. Inform Custodians with User and File Metadata • Allow Custodians to see if sensitive data is present • Allow Custodians to see if users are even actively using assigned permissions • Show user metadata to help custodians understand types of users with access to this data Provide Custodians with enough data to make informed decisions on access Portal Options © 2017 Veritas Technologies LLC17
  • 18. Monitor © 2017 Veritas Technologies LLC18
  • 19. Monitor “I need to track users of interest, or any users interacting with a file in question” “I want to look for abnormal behavior so I can find suspicious users, or compromised accounts” © 2017 Veritas Technologies LLC19
  • 20. Forensics Investigations / Alerts High Risk Users Person of Interest Sensitive Data Access Alerts Group / Like Users © 2017 Veritas Technologies LLC20
  • 21. Forensics Benefits Risk Regulatory Protected Data Activity Derived Inferred Ownership Entitlements / IPAC © 2017 Veritas Technologies LLC21
  • 22. Access Forensics © 2017 Veritas Technologies LLC22
  • 23. User Risk -Visualization • Integrated Relative User Risk Score • Simple Risk Assessment Understand High Risk Users and the DataThey Interact With © 2017 Veritas Technologies LLC23
  • 24. Resource Risk • Resource Risk Prioritization • Incorporate Risky User Action • Action Prioritization Understand Risk and Prioritize Action © 2017 Veritas Technologies LLC24
  • 25. Risk Dossier © 2017 Veritas Technologies LLC25
  • 26. Risk Dossier © 2017 Veritas Technologies LLC26
  • 27. InsiderThreat • Social Networking Map Combined with Risk Score Changes InsiderThreat Tracking • Proactive RealTime Alerts to Mitigate Damage Find the Risky Behavior Before it’s a Problem © 2017 Veritas Technologies LLC27
  • 28. RealTime Alerts • Continuous monitoring of sensitive data • Quick alerting and response • Minimize damage Faster Response to High Risk Events © 2017 Veritas Technologies LLC28
  • 29. Bringing itTogether to Identify Information © 2017 Veritas Technologies LLC29 Data Insight
  • 30. Q&A © 2017 Veritas Technologies LLC30
  • 31. Copyright © 2017 Veritas Technologies. All rights reserved. Veritas and the Veritas Logo are trademarks or registered trademarks of Veritas Technologies or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners. This document is provided for informational purposes only and is not intended as advertising. All warranties relating to the information in this document, either express or implied, are disclaimed to the maximum extent allowed by law. The information in this document is subject to change without notice. ThankYou