More Related Content Similar to ThinAir Endpoint Visibility Security HIMSS2018 Brian_Reed (20) ThinAir Endpoint Visibility Security HIMSS2018 Brian_Reed1. Audit is Next Week – Will your
Endpoints fail You?
Brian Reed
VP Strategy
March 8, 2018
© 2018 ThinAir Labs, Inc.
2. #1 Asset of Digital Enterprise
INFORMATION
Security | Compliance | IT Ops
© 2018 ThinAir Labs, Inc.
5. How information is created, consumed, and communicated
What is the financial impact of the data at risk
© 2018 ThinAir Labs, Inc.
6. DATA
Device
Application
Network
User
Data is What Matters in Security
o Current solutions focus on
tangential indicators of
compromise
o Data is the primary digital
asset at risk
o User-Data interaction at data-
element level is key
o Endpoint-based monitoring for
enterprise-wide data
interaction visibility
© 2018 ThinAir Labs, Inc.
7. Delivers complete intelligence about every
information in your organization.
With Simplicity and Speed.
CONVERSATIONAL UI
BUSINESS IMPACT
ENDPOINT VISIBILITY
CONTINUOUS
VISIBILITY
INFORMATION
ATTRIBUTION
Endpoint Data Visibility
© 2018 ThinAir Labs, Inc.
8. Endpoint Visibility
o Endpoint is the point of
interaction between people and
data
o Endpoint is where a lot of IP is
created
o Endpoint is often the blind spot
o Unstructured vs. structured
data
© 2018 ThinAir Labs, Inc.
9. Continuous Visibility – Real-time & Historical
191 days: Average time to identify breach
66 days: Average time to contain breach
» Track all interactions with
information continuously
» Maintain historical audit
log (6, 12, 24 months or
longer)
• Even if evidence has
been tampered with or
deleted
© 2018 ThinAir Labs, Inc.
10. Real Time Information Attribution
o Detect suspicious activity along the threat kill chain
o Proactive prediction of exfiltration
© 2018 ThinAir Labs, Inc.
12. Understand Business Impact
» Provide business impact
assessment
• Scope of the breach in $$$
• Based on value of the data
• Cost of the breach (detection,
remediation, notification, etc.)
• Regulatory impact
• Brand reputation, business loss
© 2018 ThinAir Labs, Inc.
13. ThinAir Next-Generation
Endpoint Data Visibility
Platform delivers complete
intelligence about every
information in your
organization. With
Simplicity and Speed.
© 2018 ThinAir Labs, Inc.
34. A Different Approach to Security!
VISIBILITY
SIMPLICITY
SPEED
Static policies that cover
1% of information
100% of information, all
the time
Highly specialized and
trained sec analysts
Proficiency with product
in hours
Many months, complex
deployments
72 hours to value, fully
SaaS
© 2018 ThinAir Labs, Inc.
35. Regulatory Compliance Examples
o Show me all users who are out of compliance with PCI right
now
o Send me a weekly report with all users who violated HIPAA
o Alert me when users download more than 10 files containing
SSNs from confidential repository or application in the last day
o Find all files that contain a specific patient ID
o Alert me when users copy more than 10 files with CCNs to a
USB
o I found users out of compliance and want to understand how to
prevent it in the future => see user investigation use cases
© 2018 ThinAir Labs, Inc.
36. Security Investigations Examples
o Show me all users who had a leaked document on one of
their devices prior to data loss, even if it was deleted
afterwards
o Show me all sensitive data that was uploaded by a user to a
dark or personal web site
o Show me what a user did after downloading a file containing
information about a new invention
o Show me all the company proprietary data a user accessed
and exfiltrated last week prior to resigning today
o Show me all the files that were on a laptop that was just
lost
© 2018 ThinAir Labs, Inc.
37. Proprietary Information Protection
o Show me all users who downloaded files with secret project names
from our highly confidential web app site in the last week
o Show me all users who copied files marked confidential to a USB
o Show me all users who uploaded files marked confidential to a
personal cloud file sharing app
o Alert me when users download more than 100 files tagged
confidential from multiple repositories in the last day
o Show me all IP that was uploaded by a user to a dark web site
▪ I found users leaking IP and want to understand how to prevent it in the
future => see user investigation use cases
o Show we all the people who had access to a highly secretive project
© 2018 ThinAir Labs, Inc.
38. Actionable Data Visibility in 90 Seconds
INVESTIGATE INCIDENTS AND BREACHES
IDENTIFY RISKY DATA ACTIVITY
COMPLY WITH DATA REGULATIONS
PROTECT YOUR IP AND PII
© 2018 ThinAir Labs, Inc.