SlideShare a Scribd company logo
1 of 39
Download to read offline
Audit is Next Week – Will your
Endpoints fail You?
Brian Reed
VP Strategy
March 8, 2018
© 2018 ThinAir Labs, Inc.
#1 Asset of Digital Enterprise
INFORMATION
Security | Compliance | IT Ops
© 2018 ThinAir Labs, Inc.
© 2018 ThinAir Labs, Inc.
Why do breaches occur?
Lack of visibility.
© 2018 ThinAir Labs, Inc.
How information is created, consumed, and communicated
What is the financial impact of the data at risk
© 2018 ThinAir Labs, Inc.
DATA
Device
Application
Network
User
Data is What Matters in Security
o Current solutions focus on
tangential indicators of
compromise
o Data is the primary digital
asset at risk
o User-Data interaction at data-
element level is key
o Endpoint-based monitoring for
enterprise-wide data
interaction visibility
© 2018 ThinAir Labs, Inc.
Delivers complete intelligence about every
information in your organization.
With Simplicity and Speed.
CONVERSATIONAL	UI	
BUSINESS	IMPACT
ENDPOINT	VISIBILITY	
CONTINUOUS	
VISIBILITY
INFORMATION	
ATTRIBUTION
Endpoint Data Visibility
© 2018 ThinAir Labs, Inc.
Endpoint Visibility
o Endpoint is the point of
interaction between people and
data
o Endpoint is where a lot of IP is
created
o Endpoint is often the blind spot
o Unstructured vs. structured
data
© 2018 ThinAir Labs, Inc.
Continuous Visibility – Real-time & Historical
191 days: Average time to identify breach
66 days: Average time to contain breach
» Track all interactions with
information continuously
» Maintain historical audit
log (6, 12, 24 months or
longer)
• Even if evidence has
been tampered with or
deleted
© 2018 ThinAir Labs, Inc.
Real Time Information Attribution
o Detect suspicious activity along the threat kill chain
o Proactive prediction of exfiltration
© 2018 ThinAir Labs, Inc.
Conversational UI
Get Instant Answers to Any Information or Security Question
© 2018 ThinAir Labs, Inc.
Understand Business Impact
» Provide	business	impact	
assessment
• Scope	of	the	breach	in	$$$
• Based	on	value	of	the	data
• Cost	of	the	breach	(detection,	
remediation,	notification,	etc.)
• Regulatory	impact
• Brand	reputation,	business	loss
© 2018 ThinAir Labs, Inc.
ThinAir Next-Generation
Endpoint Data Visibility
Platform delivers complete
intelligence about every
information in your
organization. With
Simplicity and Speed.
© 2018 ThinAir Labs, Inc.
Where	to	Start?
• Start	with	visibility	on	the	endpoint
• Focus	on	information	at	the	data-element	level
• Continuously	track	interactions	with	your	information	
• Keep	sufficiently	long	audit	history
• It	should	not	require	a	PhD	to	investigate
“Ultimately,	IT	will	have	to	stop	worrying	about	how	to	control	which	applications	people	are	
using	or	where	documents	reside	and	focus	on	protecting	the	documents	themselves.”
Gartner
© 2018 ThinAir Labs, Inc.
SCARY	QUESTION:
patient	information	that	should	
not	have	it?
What	if	I	tell	you	there	is	a	user	in	
your	environment	who	has
© 2018 ThinAir Labs, Inc.
SCARY	QUESTION:
medical	research	or	other	business	
information	that	should	not	have	
it?
What	if	I	tell	you	there	is	a	user	in	
your	environment	who	has
© 2018 ThinAir Labs, Inc.
SCARY	QUESTION:
uploaded	sensitive	data	using	
unsanctioned	cloud	services?
What	if	I	tell	you	there	is	a	user	in	
your	environment	who	has
© 2018 ThinAir Labs, Inc.
A Different Approach to Security!
VISIBILITY
SIMPLICITY
SPEED
Static policies that cover
1% of information
100% of information, all
the time
Highly specialized and
trained sec analysts
Proficiency with product
in hours
Many months, complex
deployments
72 hours to value, fully
SaaS
© 2018 ThinAir Labs, Inc.
Regulatory Compliance Examples
o Show me all users who are out of compliance with PCI right
now
o Send me a weekly report with all users who violated HIPAA
o Alert me when users download more than 10 files containing
SSNs from confidential repository or application in the last day
o Find all files that contain a specific patient ID
o Alert me when users copy more than 10 files with CCNs to a
USB
o I found users out of compliance and want to understand how to
prevent it in the future => see user investigation use cases
© 2018 ThinAir Labs, Inc.
Security Investigations Examples
o Show me all users who had a leaked document on one of
their devices prior to data loss, even if it was deleted
afterwards
o Show me all sensitive data that was uploaded by a user to a
dark or personal web site
o Show me what a user did after downloading a file containing
information about a new invention
o Show me all the company proprietary data a user accessed
and exfiltrated last week prior to resigning today
o Show me all the files that were on a laptop that was just
lost
© 2018 ThinAir Labs, Inc.
Proprietary Information Protection
o Show me all users who downloaded files with secret project names
from our highly confidential web app site in the last week
o Show me all users who copied files marked confidential to a USB
o Show me all users who uploaded files marked confidential to a
personal cloud file sharing app
o Alert me when users download more than 100 files tagged
confidential from multiple repositories in the last day
o Show me all IP that was uploaded by a user to a dark web site
▪ I found users leaking IP and want to understand how to prevent it in the
future => see user investigation use cases
o Show we all the people who had access to a highly secretive project
© 2018 ThinAir Labs, Inc.
Actionable Data Visibility in 90 Seconds
INVESTIGATE INCIDENTS AND BREACHES
IDENTIFY RISKY DATA ACTIVITY
COMPLY WITH DATA REGULATIONS
PROTECT YOUR IP AND PII
© 2018 ThinAir Labs, Inc.
Thanks!Any questions?
Brian Reed
VP of Strategy
brian@thinair.com
(404) 310-6920
Thinair.com
@thinairlabs
info@thinair.com
+1 (877) 269-3090
© 2018 ThinAir Labs, Inc.

More Related Content

What's hot

What's hot (20)

Cloud Security for Dummies Webinar — The Identity Edition
Cloud Security for Dummies Webinar — The Identity EditionCloud Security for Dummies Webinar — The Identity Edition
Cloud Security for Dummies Webinar — The Identity Edition
 
Data Breach: The Cloud Multiplier Effect
Data Breach: The Cloud Multiplier EffectData Breach: The Cloud Multiplier Effect
Data Breach: The Cloud Multiplier Effect
 
WeSecure Data Security Congres: 5 must haves to safe cloud enablement
WeSecure Data Security Congres: 5 must haves to safe cloud enablementWeSecure Data Security Congres: 5 must haves to safe cloud enablement
WeSecure Data Security Congres: 5 must haves to safe cloud enablement
 
Netskope — Shadow IT Is A Good Thing
Netskope — Shadow IT Is A Good ThingNetskope — Shadow IT Is A Good Thing
Netskope — Shadow IT Is A Good Thing
 
Netskope Overview
Netskope OverviewNetskope Overview
Netskope Overview
 
Data Privacy, Security, and Sovereignty in a Cloudy World
Data Privacy, Security, and Sovereignty in a Cloudy WorldData Privacy, Security, and Sovereignty in a Cloudy World
Data Privacy, Security, and Sovereignty in a Cloudy World
 
Privacy and Security by Design
Privacy and Security by DesignPrivacy and Security by Design
Privacy and Security by Design
 
Forcepoint Dynamic Data Protection
Forcepoint Dynamic Data ProtectionForcepoint Dynamic Data Protection
Forcepoint Dynamic Data Protection
 
Reference Architecture for Data Loss Prevention in the Cloud
Reference Architecture for Data Loss Prevention in the CloudReference Architecture for Data Loss Prevention in the Cloud
Reference Architecture for Data Loss Prevention in the Cloud
 
Protecting Corporate Data When an Employee Leaves: Survey and Best Practices
Protecting Corporate Data When an Employee Leaves: Survey and Best PracticesProtecting Corporate Data When an Employee Leaves: Survey and Best Practices
Protecting Corporate Data When an Employee Leaves: Survey and Best Practices
 
#Privacy Matters - Come il regolamento privacy europeo da un problema può div...
#Privacy Matters - Come il regolamento privacy europeo da un problema può div...#Privacy Matters - Come il regolamento privacy europeo da un problema può div...
#Privacy Matters - Come il regolamento privacy europeo da un problema può div...
 
Big Data Security Analytics (BDSA) with Randy Franklin
Big Data Security Analytics (BDSA) with Randy FranklinBig Data Security Analytics (BDSA) with Randy Franklin
Big Data Security Analytics (BDSA) with Randy Franklin
 
Cloud Access Security Brokers - What's all the Hype
Cloud Access Security Brokers - What's all the HypeCloud Access Security Brokers - What's all the Hype
Cloud Access Security Brokers - What's all the Hype
 
Security Analytics and Big Data: What You Need to Know
Security Analytics and Big Data: What You Need to KnowSecurity Analytics and Big Data: What You Need to Know
Security Analytics and Big Data: What You Need to Know
 
The BYOD Security Battleground
The BYOD Security BattlegroundThe BYOD Security Battleground
The BYOD Security Battleground
 
CASBs and Office 365: The Security Menace
CASBs and Office 365: The Security MenaceCASBs and Office 365: The Security Menace
CASBs and Office 365: The Security Menace
 
Google peter logli & jake shea
Google   peter logli & jake sheaGoogle   peter logli & jake shea
Google peter logli & jake shea
 
Internet of Things With Privacy in Mind
Internet of Things With Privacy in MindInternet of Things With Privacy in Mind
Internet of Things With Privacy in Mind
 
Splunk GDPR Security Roundtable: Zurich - 22 Nov 2017 PT1
Splunk GDPR Security Roundtable: Zurich - 22 Nov 2017 PT1Splunk GDPR Security Roundtable: Zurich - 22 Nov 2017 PT1
Splunk GDPR Security Roundtable: Zurich - 22 Nov 2017 PT1
 
Shadow IT: The CISO Perspective on Regaining Control
Shadow IT: The CISO Perspective on Regaining ControlShadow IT: The CISO Perspective on Regaining Control
Shadow IT: The CISO Perspective on Regaining Control
 

Similar to ThinAir Endpoint Visibility Security HIMSS2018 Brian_Reed

Similar to ThinAir Endpoint Visibility Security HIMSS2018 Brian_Reed (20)

Proteja sus datos en cualquier servicio Cloud y Web de forma unificada
Proteja sus datos en cualquier servicio Cloud y Web de forma unificadaProteja sus datos en cualquier servicio Cloud y Web de forma unificada
Proteja sus datos en cualquier servicio Cloud y Web de forma unificada
 
Investing in Digital Threat Intelligence Management to Protect Your Assets ou...
Investing in Digital Threat Intelligence Management to Protect Your Assets ou...Investing in Digital Threat Intelligence Management to Protect Your Assets ou...
Investing in Digital Threat Intelligence Management to Protect Your Assets ou...
 
User management - the next-gen of authentication meetup 27012022
User management - the next-gen of authentication meetup 27012022User management - the next-gen of authentication meetup 27012022
User management - the next-gen of authentication meetup 27012022
 
Good Guys vs Bad Guys: Using Big Data to Counteract Advanced Threats
Good Guys vs Bad Guys: Using Big Data to Counteract Advanced ThreatsGood Guys vs Bad Guys: Using Big Data to Counteract Advanced Threats
Good Guys vs Bad Guys: Using Big Data to Counteract Advanced Threats
 
Protecting endpoints from targeted attacks
Protecting endpoints from targeted attacksProtecting endpoints from targeted attacks
Protecting endpoints from targeted attacks
 
Using Digital Threat Intelligence Management (DTIM) to Combat Threats
Using Digital Threat Intelligence Management (DTIM) to Combat ThreatsUsing Digital Threat Intelligence Management (DTIM) to Combat Threats
Using Digital Threat Intelligence Management (DTIM) to Combat Threats
 
Challenges & Opportunities the Data Privacy Act Brings
Challenges & Opportunities the Data Privacy Act BringsChallenges & Opportunities the Data Privacy Act Brings
Challenges & Opportunities the Data Privacy Act Brings
 
Aalto cyber-10.4.18
Aalto cyber-10.4.18Aalto cyber-10.4.18
Aalto cyber-10.4.18
 
TECHNOLOGY 101 AND THE PRACTICE OF LAW: KEEPING YOUR FIRM SAFE
TECHNOLOGY 101 AND THE PRACTICE OF LAW: KEEPING YOUR FIRM SAFETECHNOLOGY 101 AND THE PRACTICE OF LAW: KEEPING YOUR FIRM SAFE
TECHNOLOGY 101 AND THE PRACTICE OF LAW: KEEPING YOUR FIRM SAFE
 
2019 09-26 leveraging the power of automated intelligence for privacy management
2019 09-26 leveraging the power of automated intelligence for privacy management2019 09-26 leveraging the power of automated intelligence for privacy management
2019 09-26 leveraging the power of automated intelligence for privacy management
 
Jervis Hui - No Tradeoffs: Cloud Security & Privacy Don't Need To Be At Odds
Jervis Hui - No Tradeoffs: Cloud Security & Privacy Don't Need To Be At OddsJervis Hui - No Tradeoffs: Cloud Security & Privacy Don't Need To Be At Odds
Jervis Hui - No Tradeoffs: Cloud Security & Privacy Don't Need To Be At Odds
 
Cyber Risk Management in 2017: Challenges & Recommendations
Cyber Risk Management in 2017: Challenges & RecommendationsCyber Risk Management in 2017: Challenges & Recommendations
Cyber Risk Management in 2017: Challenges & Recommendations
 
Data Connectors San Antonio Cybersecurity Conference 2018
Data Connectors San Antonio Cybersecurity Conference 2018Data Connectors San Antonio Cybersecurity Conference 2018
Data Connectors San Antonio Cybersecurity Conference 2018
 
How to Reduce the Attack Surface Created by Your Cyber-Tools
How to Reduce the Attack Surface Created by Your Cyber-ToolsHow to Reduce the Attack Surface Created by Your Cyber-Tools
How to Reduce the Attack Surface Created by Your Cyber-Tools
 
David valovcin big data - big risk
David valovcin big data - big riskDavid valovcin big data - big risk
David valovcin big data - big risk
 
Protecting What Matters Most – Data
Protecting What Matters Most – DataProtecting What Matters Most – Data
Protecting What Matters Most – Data
 
Dataguise hortonworks insurance_feb25
Dataguise hortonworks insurance_feb25Dataguise hortonworks insurance_feb25
Dataguise hortonworks insurance_feb25
 
Proactive Risk Management and Compliance in a World of Digital Disruption
Proactive Risk Management and Compliance in a World of Digital DisruptionProactive Risk Management and Compliance in a World of Digital Disruption
Proactive Risk Management and Compliance in a World of Digital Disruption
 
2. Enterprise and Business Architecture Cloud Video Data
2. Enterprise and Business Architecture Cloud Video Data2. Enterprise and Business Architecture Cloud Video Data
2. Enterprise and Business Architecture Cloud Video Data
 
Virtual Gov Day - Introduction & Keynote - Alan Webber, IDC Government Insights
Virtual Gov Day - Introduction & Keynote - Alan Webber, IDC Government InsightsVirtual Gov Day - Introduction & Keynote - Alan Webber, IDC Government Insights
Virtual Gov Day - Introduction & Keynote - Alan Webber, IDC Government Insights
 

Recently uploaded

Lucknow Call Girls Service ❤️🍑 9xx000xx09 👄🫦 Independent Escort Service Luckn...
Lucknow Call Girls Service ❤️🍑 9xx000xx09 👄🫦 Independent Escort Service Luckn...Lucknow Call Girls Service ❤️🍑 9xx000xx09 👄🫦 Independent Escort Service Luckn...
Lucknow Call Girls Service ❤️🍑 9xx000xx09 👄🫦 Independent Escort Service Luckn...
Sheetaleventcompany
 
Delhi Call Girl Service 📞8650700400📞Just Call Divya📲 Call Girl In Delhi No💰Ad...
Delhi Call Girl Service 📞8650700400📞Just Call Divya📲 Call Girl In Delhi No💰Ad...Delhi Call Girl Service 📞8650700400📞Just Call Divya📲 Call Girl In Delhi No💰Ad...
Delhi Call Girl Service 📞8650700400📞Just Call Divya📲 Call Girl In Delhi No💰Ad...
Sheetaleventcompany
 
🍑👄Ludhiana Escorts Service☎️98157-77685🍑👄 Call Girl service in Ludhiana☎️Ludh...
🍑👄Ludhiana Escorts Service☎️98157-77685🍑👄 Call Girl service in Ludhiana☎️Ludh...🍑👄Ludhiana Escorts Service☎️98157-77685🍑👄 Call Girl service in Ludhiana☎️Ludh...
🍑👄Ludhiana Escorts Service☎️98157-77685🍑👄 Call Girl service in Ludhiana☎️Ludh...
dilpreetentertainmen
 
Low Rate Call Girls Jaipur {9521753030} ❤️VVIP NISHA CCall Girls in Jaipur Es...
Low Rate Call Girls Jaipur {9521753030} ❤️VVIP NISHA CCall Girls in Jaipur Es...Low Rate Call Girls Jaipur {9521753030} ❤️VVIP NISHA CCall Girls in Jaipur Es...
Low Rate Call Girls Jaipur {9521753030} ❤️VVIP NISHA CCall Girls in Jaipur Es...
Sheetaleventcompany
 
Erotic Call Girls Bangalore {7304373326} ❤️VVIP SIYA Call Girls in Bangalore ...
Erotic Call Girls Bangalore {7304373326} ❤️VVIP SIYA Call Girls in Bangalore ...Erotic Call Girls Bangalore {7304373326} ❤️VVIP SIYA Call Girls in Bangalore ...
Erotic Call Girls Bangalore {7304373326} ❤️VVIP SIYA Call Girls in Bangalore ...
Sheetaleventcompany
 
Independent Call Girls Bangalore {7304373326} ❤️VVIP POOJA Call Girls in Bang...
Independent Call Girls Bangalore {7304373326} ❤️VVIP POOJA Call Girls in Bang...Independent Call Girls Bangalore {7304373326} ❤️VVIP POOJA Call Girls in Bang...
Independent Call Girls Bangalore {7304373326} ❤️VVIP POOJA Call Girls in Bang...
Sheetaleventcompany
 
Low Rate Call Girls Udaipur {9xx000xx09} ❤️VVIP NISHA CCall Girls in Udaipur ...
Low Rate Call Girls Udaipur {9xx000xx09} ❤️VVIP NISHA CCall Girls in Udaipur ...Low Rate Call Girls Udaipur {9xx000xx09} ❤️VVIP NISHA CCall Girls in Udaipur ...
Low Rate Call Girls Udaipur {9xx000xx09} ❤️VVIP NISHA CCall Girls in Udaipur ...
Sheetaleventcompany
 
Gorgeous Call Girls In Pune {9xx000xx09} ❤️VVIP ANKITA Call Girl in Pune Maha...
Gorgeous Call Girls In Pune {9xx000xx09} ❤️VVIP ANKITA Call Girl in Pune Maha...Gorgeous Call Girls In Pune {9xx000xx09} ❤️VVIP ANKITA Call Girl in Pune Maha...
Gorgeous Call Girls In Pune {9xx000xx09} ❤️VVIP ANKITA Call Girl in Pune Maha...
Sheetaleventcompany
 
💚 Low Rate Call Girls In Chandigarh 💯Lucky 📲🔝8868886958🔝Call Girl In Chandig...
💚 Low Rate  Call Girls In Chandigarh 💯Lucky 📲🔝8868886958🔝Call Girl In Chandig...💚 Low Rate  Call Girls In Chandigarh 💯Lucky 📲🔝8868886958🔝Call Girl In Chandig...
💚 Low Rate Call Girls In Chandigarh 💯Lucky 📲🔝8868886958🔝Call Girl In Chandig...
Sheetaleventcompany
 

Recently uploaded (20)

Call Girls Service Amritsar Just Call 9352988975 Top Class Call Girl Service ...
Call Girls Service Amritsar Just Call 9352988975 Top Class Call Girl Service ...Call Girls Service Amritsar Just Call 9352988975 Top Class Call Girl Service ...
Call Girls Service Amritsar Just Call 9352988975 Top Class Call Girl Service ...
 
Lucknow Call Girls Service ❤️🍑 9xx000xx09 👄🫦 Independent Escort Service Luckn...
Lucknow Call Girls Service ❤️🍑 9xx000xx09 👄🫦 Independent Escort Service Luckn...Lucknow Call Girls Service ❤️🍑 9xx000xx09 👄🫦 Independent Escort Service Luckn...
Lucknow Call Girls Service ❤️🍑 9xx000xx09 👄🫦 Independent Escort Service Luckn...
 
❤️Call Girl In Chandigarh☎️9814379184☎️ Call Girl service in Chandigarh☎️ Cha...
❤️Call Girl In Chandigarh☎️9814379184☎️ Call Girl service in Chandigarh☎️ Cha...❤️Call Girl In Chandigarh☎️9814379184☎️ Call Girl service in Chandigarh☎️ Cha...
❤️Call Girl In Chandigarh☎️9814379184☎️ Call Girl service in Chandigarh☎️ Cha...
 
💸Cash Payment No Advance Call Girls Nagpur 🧿 9332606886 🧿 High Class Call Gir...
💸Cash Payment No Advance Call Girls Nagpur 🧿 9332606886 🧿 High Class Call Gir...💸Cash Payment No Advance Call Girls Nagpur 🧿 9332606886 🧿 High Class Call Gir...
💸Cash Payment No Advance Call Girls Nagpur 🧿 9332606886 🧿 High Class Call Gir...
 
💸Cash Payment No Advance Call Girls Bhopal 🧿 9332606886 🧿 High Class Call Gir...
💸Cash Payment No Advance Call Girls Bhopal 🧿 9332606886 🧿 High Class Call Gir...💸Cash Payment No Advance Call Girls Bhopal 🧿 9332606886 🧿 High Class Call Gir...
💸Cash Payment No Advance Call Girls Bhopal 🧿 9332606886 🧿 High Class Call Gir...
 
Delhi Call Girl Service 📞8650700400📞Just Call Divya📲 Call Girl In Delhi No💰Ad...
Delhi Call Girl Service 📞8650700400📞Just Call Divya📲 Call Girl In Delhi No💰Ad...Delhi Call Girl Service 📞8650700400📞Just Call Divya📲 Call Girl In Delhi No💰Ad...
Delhi Call Girl Service 📞8650700400📞Just Call Divya📲 Call Girl In Delhi No💰Ad...
 
🍑👄Ludhiana Escorts Service☎️98157-77685🍑👄 Call Girl service in Ludhiana☎️Ludh...
🍑👄Ludhiana Escorts Service☎️98157-77685🍑👄 Call Girl service in Ludhiana☎️Ludh...🍑👄Ludhiana Escorts Service☎️98157-77685🍑👄 Call Girl service in Ludhiana☎️Ludh...
🍑👄Ludhiana Escorts Service☎️98157-77685🍑👄 Call Girl service in Ludhiana☎️Ludh...
 
Low Rate Call Girls Jaipur {9521753030} ❤️VVIP NISHA CCall Girls in Jaipur Es...
Low Rate Call Girls Jaipur {9521753030} ❤️VVIP NISHA CCall Girls in Jaipur Es...Low Rate Call Girls Jaipur {9521753030} ❤️VVIP NISHA CCall Girls in Jaipur Es...
Low Rate Call Girls Jaipur {9521753030} ❤️VVIP NISHA CCall Girls in Jaipur Es...
 
❤️Chandigarh Escorts Service☎️9815457724☎️ Call Girl service in Chandigarh☎️ ...
❤️Chandigarh Escorts Service☎️9815457724☎️ Call Girl service in Chandigarh☎️ ...❤️Chandigarh Escorts Service☎️9815457724☎️ Call Girl service in Chandigarh☎️ ...
❤️Chandigarh Escorts Service☎️9815457724☎️ Call Girl service in Chandigarh☎️ ...
 
Erotic Call Girls Bangalore {7304373326} ❤️VVIP SIYA Call Girls in Bangalore ...
Erotic Call Girls Bangalore {7304373326} ❤️VVIP SIYA Call Girls in Bangalore ...Erotic Call Girls Bangalore {7304373326} ❤️VVIP SIYA Call Girls in Bangalore ...
Erotic Call Girls Bangalore {7304373326} ❤️VVIP SIYA Call Girls in Bangalore ...
 
❤️Chandigarh Escort Service☎️9815457724☎️ Call Girl service in Chandigarh☎️ C...
❤️Chandigarh Escort Service☎️9815457724☎️ Call Girl service in Chandigarh☎️ C...❤️Chandigarh Escort Service☎️9815457724☎️ Call Girl service in Chandigarh☎️ C...
❤️Chandigarh Escort Service☎️9815457724☎️ Call Girl service in Chandigarh☎️ C...
 
Independent Call Girls Bangalore {7304373326} ❤️VVIP POOJA Call Girls in Bang...
Independent Call Girls Bangalore {7304373326} ❤️VVIP POOJA Call Girls in Bang...Independent Call Girls Bangalore {7304373326} ❤️VVIP POOJA Call Girls in Bang...
Independent Call Girls Bangalore {7304373326} ❤️VVIP POOJA Call Girls in Bang...
 
Low Rate Call Girls Udaipur {9xx000xx09} ❤️VVIP NISHA CCall Girls in Udaipur ...
Low Rate Call Girls Udaipur {9xx000xx09} ❤️VVIP NISHA CCall Girls in Udaipur ...Low Rate Call Girls Udaipur {9xx000xx09} ❤️VVIP NISHA CCall Girls in Udaipur ...
Low Rate Call Girls Udaipur {9xx000xx09} ❤️VVIP NISHA CCall Girls in Udaipur ...
 
Independent Call Girls Service Chandigarh Sector 17 | 8868886958 | Call Girl ...
Independent Call Girls Service Chandigarh Sector 17 | 8868886958 | Call Girl ...Independent Call Girls Service Chandigarh Sector 17 | 8868886958 | Call Girl ...
Independent Call Girls Service Chandigarh Sector 17 | 8868886958 | Call Girl ...
 
❤️Chandigarh Escort Service☎️9814379184☎️ Call Girl service in Chandigarh☎️ C...
❤️Chandigarh Escort Service☎️9814379184☎️ Call Girl service in Chandigarh☎️ C...❤️Chandigarh Escort Service☎️9814379184☎️ Call Girl service in Chandigarh☎️ C...
❤️Chandigarh Escort Service☎️9814379184☎️ Call Girl service in Chandigarh☎️ C...
 
💸Cash Payment No Advance Call Girls Surat 🧿 9332606886 🧿 High Class Call Girl...
💸Cash Payment No Advance Call Girls Surat 🧿 9332606886 🧿 High Class Call Girl...💸Cash Payment No Advance Call Girls Surat 🧿 9332606886 🧿 High Class Call Girl...
💸Cash Payment No Advance Call Girls Surat 🧿 9332606886 🧿 High Class Call Girl...
 
Gorgeous Call Girls In Pune {9xx000xx09} ❤️VVIP ANKITA Call Girl in Pune Maha...
Gorgeous Call Girls In Pune {9xx000xx09} ❤️VVIP ANKITA Call Girl in Pune Maha...Gorgeous Call Girls In Pune {9xx000xx09} ❤️VVIP ANKITA Call Girl in Pune Maha...
Gorgeous Call Girls In Pune {9xx000xx09} ❤️VVIP ANKITA Call Girl in Pune Maha...
 
Call Girls Service 11 Phase Mohali {7435815124} ❤️ MONA Call Girl in Mohali P...
Call Girls Service 11 Phase Mohali {7435815124} ❤️ MONA Call Girl in Mohali P...Call Girls Service 11 Phase Mohali {7435815124} ❤️ MONA Call Girl in Mohali P...
Call Girls Service 11 Phase Mohali {7435815124} ❤️ MONA Call Girl in Mohali P...
 
💸Cash Payment No Advance Call Girls Pune 🧿 9332606886 🧿 High Class Call Girl ...
💸Cash Payment No Advance Call Girls Pune 🧿 9332606886 🧿 High Class Call Girl ...💸Cash Payment No Advance Call Girls Pune 🧿 9332606886 🧿 High Class Call Girl ...
💸Cash Payment No Advance Call Girls Pune 🧿 9332606886 🧿 High Class Call Girl ...
 
💚 Low Rate Call Girls In Chandigarh 💯Lucky 📲🔝8868886958🔝Call Girl In Chandig...
💚 Low Rate  Call Girls In Chandigarh 💯Lucky 📲🔝8868886958🔝Call Girl In Chandig...💚 Low Rate  Call Girls In Chandigarh 💯Lucky 📲🔝8868886958🔝Call Girl In Chandig...
💚 Low Rate Call Girls In Chandigarh 💯Lucky 📲🔝8868886958🔝Call Girl In Chandig...
 

ThinAir Endpoint Visibility Security HIMSS2018 Brian_Reed

  • 1. Audit is Next Week – Will your Endpoints fail You? Brian Reed VP Strategy March 8, 2018 © 2018 ThinAir Labs, Inc.
  • 2. #1 Asset of Digital Enterprise INFORMATION Security | Compliance | IT Ops © 2018 ThinAir Labs, Inc.
  • 3. © 2018 ThinAir Labs, Inc.
  • 4. Why do breaches occur? Lack of visibility. © 2018 ThinAir Labs, Inc.
  • 5. How information is created, consumed, and communicated What is the financial impact of the data at risk © 2018 ThinAir Labs, Inc.
  • 6. DATA Device Application Network User Data is What Matters in Security o Current solutions focus on tangential indicators of compromise o Data is the primary digital asset at risk o User-Data interaction at data- element level is key o Endpoint-based monitoring for enterprise-wide data interaction visibility © 2018 ThinAir Labs, Inc.
  • 7. Delivers complete intelligence about every information in your organization. With Simplicity and Speed. CONVERSATIONAL UI BUSINESS IMPACT ENDPOINT VISIBILITY CONTINUOUS VISIBILITY INFORMATION ATTRIBUTION Endpoint Data Visibility © 2018 ThinAir Labs, Inc.
  • 8. Endpoint Visibility o Endpoint is the point of interaction between people and data o Endpoint is where a lot of IP is created o Endpoint is often the blind spot o Unstructured vs. structured data © 2018 ThinAir Labs, Inc.
  • 9. Continuous Visibility – Real-time & Historical 191 days: Average time to identify breach 66 days: Average time to contain breach » Track all interactions with information continuously » Maintain historical audit log (6, 12, 24 months or longer) • Even if evidence has been tampered with or deleted © 2018 ThinAir Labs, Inc.
  • 10. Real Time Information Attribution o Detect suspicious activity along the threat kill chain o Proactive prediction of exfiltration © 2018 ThinAir Labs, Inc.
  • 11. Conversational UI Get Instant Answers to Any Information or Security Question © 2018 ThinAir Labs, Inc.
  • 12. Understand Business Impact » Provide business impact assessment • Scope of the breach in $$$ • Based on value of the data • Cost of the breach (detection, remediation, notification, etc.) • Regulatory impact • Brand reputation, business loss © 2018 ThinAir Labs, Inc.
  • 13. ThinAir Next-Generation Endpoint Data Visibility Platform delivers complete intelligence about every information in your organization. With Simplicity and Speed. © 2018 ThinAir Labs, Inc.
  • 14. Where to Start? • Start with visibility on the endpoint • Focus on information at the data-element level • Continuously track interactions with your information • Keep sufficiently long audit history • It should not require a PhD to investigate “Ultimately, IT will have to stop worrying about how to control which applications people are using or where documents reside and focus on protecting the documents themselves.” Gartner © 2018 ThinAir Labs, Inc.
  • 16.
  • 17.
  • 18.
  • 19.
  • 20.
  • 21.
  • 22.
  • 24.
  • 25.
  • 26.
  • 27.
  • 29.
  • 30.
  • 31.
  • 32.
  • 33.
  • 34. A Different Approach to Security! VISIBILITY SIMPLICITY SPEED Static policies that cover 1% of information 100% of information, all the time Highly specialized and trained sec analysts Proficiency with product in hours Many months, complex deployments 72 hours to value, fully SaaS © 2018 ThinAir Labs, Inc.
  • 35. Regulatory Compliance Examples o Show me all users who are out of compliance with PCI right now o Send me a weekly report with all users who violated HIPAA o Alert me when users download more than 10 files containing SSNs from confidential repository or application in the last day o Find all files that contain a specific patient ID o Alert me when users copy more than 10 files with CCNs to a USB o I found users out of compliance and want to understand how to prevent it in the future => see user investigation use cases © 2018 ThinAir Labs, Inc.
  • 36. Security Investigations Examples o Show me all users who had a leaked document on one of their devices prior to data loss, even if it was deleted afterwards o Show me all sensitive data that was uploaded by a user to a dark or personal web site o Show me what a user did after downloading a file containing information about a new invention o Show me all the company proprietary data a user accessed and exfiltrated last week prior to resigning today o Show me all the files that were on a laptop that was just lost © 2018 ThinAir Labs, Inc.
  • 37. Proprietary Information Protection o Show me all users who downloaded files with secret project names from our highly confidential web app site in the last week o Show me all users who copied files marked confidential to a USB o Show me all users who uploaded files marked confidential to a personal cloud file sharing app o Alert me when users download more than 100 files tagged confidential from multiple repositories in the last day o Show me all IP that was uploaded by a user to a dark web site ▪ I found users leaking IP and want to understand how to prevent it in the future => see user investigation use cases o Show we all the people who had access to a highly secretive project © 2018 ThinAir Labs, Inc.
  • 38. Actionable Data Visibility in 90 Seconds INVESTIGATE INCIDENTS AND BREACHES IDENTIFY RISKY DATA ACTIVITY COMPLY WITH DATA REGULATIONS PROTECT YOUR IP AND PII © 2018 ThinAir Labs, Inc.
  • 39. Thanks!Any questions? Brian Reed VP of Strategy brian@thinair.com (404) 310-6920 Thinair.com @thinairlabs info@thinair.com +1 (877) 269-3090 © 2018 ThinAir Labs, Inc.