SlideShare ist ein Scribd-Unternehmen logo
1 von 9
STEALTHbits Technologies, Inc.
Sensitive Data Discovery Solutions
STEALTHbits Technologies
All About Data. Agenda
 About STEALTHbits
 Sensitive Data Discovery – Top/Down or Bottom/Up?
 Product Overview
o Use Cases
o Statistics
o How it Works
o Roadmap
 Product Demonstration
STEALTHbits Technologies
All About Data. Sensitive Data Discovery
Top – Down: Integrated Sensitive Data Discovery
Bottom – Up: Focused Sensitive Data Discovery
StealthAUDIT®
Utilize Sensitive Data
Discovery to enrich the
context of Unstructured Data
during Data Access
Governance processes.
StealthSEEK®
The solution for those tasked
with Sensitive Data Discovery
and tactical remediation of
issues like permissions,
misuse, and improper storage
of Sensitive Data.
STEALTHbits Technologies
All About Data. What is StealthSEEK®?
 StealthSEEK is:
o Tactical Sensitive Data
Discovery
o Easy-to-Use
o Flexible & Customizable
o Scalable
o Intelligent
STEALTHbits Technologies
All About Data. StealthSEEK® Use Cases
StealthSEEK is used for:
 Compliance Fulfillment
o PCI-DSS, HIPAA/HITECH, SOX, GLBA, FERPA,
ITAR, and more
 Proactive Risk Mitigation
o Set up best practices to proactively avoid
untoward incidents
 Incident Response
o Respond to data breach events or failed audits
Who Uses StealthSEEK?
Universities/Higher Education
• Student and Faculty Info (SSN, Birth Dates, etc.)
• Health Records
• Financial Aid Records
Healthcare/Hospitals
• Health Records
• Patient Data
• Prescription Drugs
Financial Institutions/Credit Unions
• Personal Financial Documents
• Credit Card Information
Defense/Manufacturing
• ITAR related information
• Intellectual Property
Retail
• Credit Card Information
• Email Addresses & Contact Details
STEALTHbits Technologies
All About Data. Some Statistics
 In the United States, the average cost per organization
for data breach incidents was $5.4 million last year
o 2013 Cost of Data Breach Study: Global Analysis, Ponemon Institute, May 2013
 Through 2016, the financial impact of cybercrime will
grow 10 percent per year
o www.gartner.com, Gartner ., December 2011
 In a 2010 study, 46 percent of the lost laptops
contained confidential data, only 30 percent of those
systems were encrypted, and only 10 percent had other
anti-theft technologies.
o The Billion Dollar Lost Laptop Study, Ponemon Institute and Intel Corp., December 2010
STEALTHbits Technologies
All About Data. How it Works
Discovery & Risk Profiling Find Sensitive Data Remediate & Report
• Where is the data?
• Where does the greatest risk
exist?
• What does risk mean to you?
• What kind of sensitive content
is out there?
• Who has access to it? How
did they get that access?
• Delete, Copy,
Move/Consolidate Sensitive
Content
• Report on findings and access
rights
A Proven, 3-Step Workflow
STEALTHbits Technologies
All About Data. StealthSEEK® Roadmap
What’s next in the queue?
 Owner Notification Workflow
 Office 365 support, SharePoint scanning – v3.x (Q4 2014)
 Data Classification and Tagging
STEALTHbits Technologies
All About Data.
 Attend a Demo
o www.stealthbits.com/events
Next Steps
 Request a Trial
o www.stealthbits.com/trial
 Learn More
o www.stealthbits.com/resources
 Ask Us a Question
o www.stealthbits.com/company/contact-us
FREE 30-Day StealthSEEK Trial!
http://www.stealthbits.com/trial

Weitere ähnliche Inhalte

Was ist angesagt?

Was ist angesagt? (20)

Big Data Analytics to Enhance Security
Big Data Analytics to Enhance SecurityBig Data Analytics to Enhance Security
Big Data Analytics to Enhance Security
 
NTXISSACSC2 - Texas CISO Council - Information Security Program Essential Gui...
NTXISSACSC2 - Texas CISO Council - Information Security Program Essential Gui...NTXISSACSC2 - Texas CISO Council - Information Security Program Essential Gui...
NTXISSACSC2 - Texas CISO Council - Information Security Program Essential Gui...
 
Security&Governance
Security&GovernanceSecurity&Governance
Security&Governance
 
Sqrrl March Webinar: How to Build a Big App
Sqrrl March Webinar: How to Build a Big AppSqrrl March Webinar: How to Build a Big App
Sqrrl March Webinar: How to Build a Big App
 
Realizing the Value of Social: Evolving from Social Media to Customer Experience
Realizing the Value of Social: Evolving from Social Media to Customer ExperienceRealizing the Value of Social: Evolving from Social Media to Customer Experience
Realizing the Value of Social: Evolving from Social Media to Customer Experience
 
Leveraging Threat Intelligence to Guide Your Hunts
Leveraging Threat Intelligence to Guide Your HuntsLeveraging Threat Intelligence to Guide Your Hunts
Leveraging Threat Intelligence to Guide Your Hunts
 
How Walmart is Combating Fraud and Saving Consumers Millions
How Walmart is Combating Fraud and Saving Consumers MillionsHow Walmart is Combating Fraud and Saving Consumers Millions
How Walmart is Combating Fraud and Saving Consumers Millions
 
OpenID Foundation Workshop at EIC 2018 - HEART Working Group Update
OpenID Foundation Workshop at EIC 2018 - HEART Working Group UpdateOpenID Foundation Workshop at EIC 2018 - HEART Working Group Update
OpenID Foundation Workshop at EIC 2018 - HEART Working Group Update
 
Real-Time Clinical Analytics
Real-Time Clinical AnalyticsReal-Time Clinical Analytics
Real-Time Clinical Analytics
 
Steal This Data - Email Security and DLP
Steal This Data - Email Security and DLPSteal This Data - Email Security and DLP
Steal This Data - Email Security and DLP
 
Big Data Analytics to Enhance Security คุณอนพัทย์ พิพัฒน์กิติบดี Technical Ma...
Big Data Analytics to Enhance Security คุณอนพัทย์ พิพัฒน์กิติบดี Technical Ma...Big Data Analytics to Enhance Security คุณอนพัทย์ พิพัฒน์กิติบดี Technical Ma...
Big Data Analytics to Enhance Security คุณอนพัทย์ พิพัฒน์กิติบดี Technical Ma...
 
Network Security‬ and Big ‪‎Data Analytics‬
Network Security‬ and Big ‪‎Data Analytics‬Network Security‬ and Big ‪‎Data Analytics‬
Network Security‬ and Big ‪‎Data Analytics‬
 
The Case For Secure Data Science
The Case For Secure Data ScienceThe Case For Secure Data Science
The Case For Secure Data Science
 
Data Discovery Automation: How to Save Time & Protect Customer Data
Data Discovery Automation: How to Save Time & Protect Customer DataData Discovery Automation: How to Save Time & Protect Customer Data
Data Discovery Automation: How to Save Time & Protect Customer Data
 
Reveelium Data Science as a Service - Datasheet EN
Reveelium Data Science as a Service - Datasheet ENReveelium Data Science as a Service - Datasheet EN
Reveelium Data Science as a Service - Datasheet EN
 
Machine Learning for Incident Detection: Getting Started
Machine Learning for Incident Detection: Getting StartedMachine Learning for Incident Detection: Getting Started
Machine Learning for Incident Detection: Getting Started
 
10 things in Big Data Analytics
10 things in Big Data Analytics 10 things in Big Data Analytics
10 things in Big Data Analytics
 
The National Security Agency (NSA) -- PRISM Surveillance System _Not a Surpri...
The National Security Agency (NSA) -- PRISM Surveillance System _Not a Surpri...The National Security Agency (NSA) -- PRISM Surveillance System _Not a Surpri...
The National Security Agency (NSA) -- PRISM Surveillance System _Not a Surpri...
 
Personal data on the blockchain and GDPR compatibility
Personal data on the blockchain and GDPR compatibility Personal data on the blockchain and GDPR compatibility
Personal data on the blockchain and GDPR compatibility
 
April 2015 Webinar: Cyber Hunting with Sqrrl
April 2015 Webinar: Cyber Hunting with SqrrlApril 2015 Webinar: Cyber Hunting with Sqrrl
April 2015 Webinar: Cyber Hunting with Sqrrl
 

Ähnlich wie STEALTHbits Sensitive Data Discovery Solutions

Data Loss Prevention
Data Loss PreventionData Loss Prevention
Data Loss Prevention
Reza Kopaee
 
The Bigger They Are The Harder They Fall
The Bigger They Are The Harder They FallThe Bigger They Are The Harder They Fall
The Bigger They Are The Harder They Fall
Trillium Software
 
Data mining and privacy preserving in data mining
Data mining and privacy preserving in data miningData mining and privacy preserving in data mining
Data mining and privacy preserving in data mining
Needa Multani
 

Ähnlich wie STEALTHbits Sensitive Data Discovery Solutions (20)

BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptxBSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
 
The X Factor in Data Centric Security
The X Factor in Data Centric SecurityThe X Factor in Data Centric Security
The X Factor in Data Centric Security
 
Of Unicorns, Yetis, and Error-Free Datasets (or what is data quality?)
Of Unicorns, Yetis, and Error-Free Datasets (or what is data quality?)Of Unicorns, Yetis, and Error-Free Datasets (or what is data quality?)
Of Unicorns, Yetis, and Error-Free Datasets (or what is data quality?)
 
Chapter 2.pdf
Chapter 2.pdfChapter 2.pdf
Chapter 2.pdf
 
Technical track chris calvert-1 30 pm-issa conference-calvert
Technical track chris calvert-1 30 pm-issa conference-calvertTechnical track chris calvert-1 30 pm-issa conference-calvert
Technical track chris calvert-1 30 pm-issa conference-calvert
 
A guide to Sustainable Cyber Security
A guide to Sustainable Cyber SecurityA guide to Sustainable Cyber Security
A guide to Sustainable Cyber Security
 
The Evolution of Data Stack: From Query Accelerators to Data Fabrics
The Evolution of Data Stack: From Query Accelerators to Data FabricsThe Evolution of Data Stack: From Query Accelerators to Data Fabrics
The Evolution of Data Stack: From Query Accelerators to Data Fabrics
 
Data Loss Prevention
Data Loss PreventionData Loss Prevention
Data Loss Prevention
 
John Eberhardt NSTAC Testimony
John Eberhardt NSTAC TestimonyJohn Eberhardt NSTAC Testimony
John Eberhardt NSTAC Testimony
 
Life After Compliance march 2010 v2
Life After Compliance march 2010 v2Life After Compliance march 2010 v2
Life After Compliance march 2010 v2
 
Fraud webinar - Prevention & Risk Management
Fraud webinar - Prevention & Risk ManagementFraud webinar - Prevention & Risk Management
Fraud webinar - Prevention & Risk Management
 
Putting data science into perspective
Putting data science into perspectivePutting data science into perspective
Putting data science into perspective
 
The Bigger They Are The Harder They Fall
The Bigger They Are The Harder They FallThe Bigger They Are The Harder They Fall
The Bigger They Are The Harder They Fall
 
BUSCAS UNA SEGURIDAD INTEGRADA Y DINÁMICA? ; INTELIGENCIA Y COLABORACIÓN LA ...
BUSCAS UNA SEGURIDAD INTEGRADA Y DINÁMICA?  ; INTELIGENCIA Y COLABORACIÓN LA ...BUSCAS UNA SEGURIDAD INTEGRADA Y DINÁMICA?  ; INTELIGENCIA Y COLABORACIÓN LA ...
BUSCAS UNA SEGURIDAD INTEGRADA Y DINÁMICA? ; INTELIGENCIA Y COLABORACIÓN LA ...
 
Guardium Data Activiy Monitor For C- Level Executives
Guardium Data Activiy Monitor For C- Level ExecutivesGuardium Data Activiy Monitor For C- Level Executives
Guardium Data Activiy Monitor For C- Level Executives
 
IRJET- An Approach Towards Data Security in Organizations by Avoiding Data Br...
IRJET- An Approach Towards Data Security in Organizations by Avoiding Data Br...IRJET- An Approach Towards Data Security in Organizations by Avoiding Data Br...
IRJET- An Approach Towards Data Security in Organizations by Avoiding Data Br...
 
Threat Ready Data: Protect Data from the Inside and the Outside
Threat Ready Data: Protect Data from the Inside and the OutsideThreat Ready Data: Protect Data from the Inside and the Outside
Threat Ready Data: Protect Data from the Inside and the Outside
 
Data mining and privacy preserving in data mining
Data mining and privacy preserving in data miningData mining and privacy preserving in data mining
Data mining and privacy preserving in data mining
 
Internet of Things With Privacy in Mind
Internet of Things With Privacy in MindInternet of Things With Privacy in Mind
Internet of Things With Privacy in Mind
 
Symantec Data Loss Prevention 9
Symantec Data Loss Prevention 9Symantec Data Loss Prevention 9
Symantec Data Loss Prevention 9
 

Kürzlich hochgeladen

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Kürzlich hochgeladen (20)

Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 

STEALTHbits Sensitive Data Discovery Solutions

  • 1. STEALTHbits Technologies, Inc. Sensitive Data Discovery Solutions
  • 2. STEALTHbits Technologies All About Data. Agenda  About STEALTHbits  Sensitive Data Discovery – Top/Down or Bottom/Up?  Product Overview o Use Cases o Statistics o How it Works o Roadmap  Product Demonstration
  • 3. STEALTHbits Technologies All About Data. Sensitive Data Discovery Top – Down: Integrated Sensitive Data Discovery Bottom – Up: Focused Sensitive Data Discovery StealthAUDIT® Utilize Sensitive Data Discovery to enrich the context of Unstructured Data during Data Access Governance processes. StealthSEEK® The solution for those tasked with Sensitive Data Discovery and tactical remediation of issues like permissions, misuse, and improper storage of Sensitive Data.
  • 4. STEALTHbits Technologies All About Data. What is StealthSEEK®?  StealthSEEK is: o Tactical Sensitive Data Discovery o Easy-to-Use o Flexible & Customizable o Scalable o Intelligent
  • 5. STEALTHbits Technologies All About Data. StealthSEEK® Use Cases StealthSEEK is used for:  Compliance Fulfillment o PCI-DSS, HIPAA/HITECH, SOX, GLBA, FERPA, ITAR, and more  Proactive Risk Mitigation o Set up best practices to proactively avoid untoward incidents  Incident Response o Respond to data breach events or failed audits Who Uses StealthSEEK? Universities/Higher Education • Student and Faculty Info (SSN, Birth Dates, etc.) • Health Records • Financial Aid Records Healthcare/Hospitals • Health Records • Patient Data • Prescription Drugs Financial Institutions/Credit Unions • Personal Financial Documents • Credit Card Information Defense/Manufacturing • ITAR related information • Intellectual Property Retail • Credit Card Information • Email Addresses & Contact Details
  • 6. STEALTHbits Technologies All About Data. Some Statistics  In the United States, the average cost per organization for data breach incidents was $5.4 million last year o 2013 Cost of Data Breach Study: Global Analysis, Ponemon Institute, May 2013  Through 2016, the financial impact of cybercrime will grow 10 percent per year o www.gartner.com, Gartner ., December 2011  In a 2010 study, 46 percent of the lost laptops contained confidential data, only 30 percent of those systems were encrypted, and only 10 percent had other anti-theft technologies. o The Billion Dollar Lost Laptop Study, Ponemon Institute and Intel Corp., December 2010
  • 7. STEALTHbits Technologies All About Data. How it Works Discovery & Risk Profiling Find Sensitive Data Remediate & Report • Where is the data? • Where does the greatest risk exist? • What does risk mean to you? • What kind of sensitive content is out there? • Who has access to it? How did they get that access? • Delete, Copy, Move/Consolidate Sensitive Content • Report on findings and access rights A Proven, 3-Step Workflow
  • 8. STEALTHbits Technologies All About Data. StealthSEEK® Roadmap What’s next in the queue?  Owner Notification Workflow  Office 365 support, SharePoint scanning – v3.x (Q4 2014)  Data Classification and Tagging
  • 9. STEALTHbits Technologies All About Data.  Attend a Demo o www.stealthbits.com/events Next Steps  Request a Trial o www.stealthbits.com/trial  Learn More o www.stealthbits.com/resources  Ask Us a Question o www.stealthbits.com/company/contact-us FREE 30-Day StealthSEEK Trial! http://www.stealthbits.com/trial