2. STEALTHbits Technologies
All About Data. Agenda
About STEALTHbits
Sensitive Data Discovery – Top/Down or Bottom/Up?
Product Overview
o Use Cases
o Statistics
o How it Works
o Roadmap
Product Demonstration
3. STEALTHbits Technologies
All About Data. Sensitive Data Discovery
Top – Down: Integrated Sensitive Data Discovery
Bottom – Up: Focused Sensitive Data Discovery
StealthAUDIT®
Utilize Sensitive Data
Discovery to enrich the
context of Unstructured Data
during Data Access
Governance processes.
StealthSEEK®
The solution for those tasked
with Sensitive Data Discovery
and tactical remediation of
issues like permissions,
misuse, and improper storage
of Sensitive Data.
4. STEALTHbits Technologies
All About Data. What is StealthSEEK®?
StealthSEEK is:
o Tactical Sensitive Data
Discovery
o Easy-to-Use
o Flexible & Customizable
o Scalable
o Intelligent
5. STEALTHbits Technologies
All About Data. StealthSEEK® Use Cases
StealthSEEK is used for:
Compliance Fulfillment
o PCI-DSS, HIPAA/HITECH, SOX, GLBA, FERPA,
ITAR, and more
Proactive Risk Mitigation
o Set up best practices to proactively avoid
untoward incidents
Incident Response
o Respond to data breach events or failed audits
Who Uses StealthSEEK?
Universities/Higher Education
• Student and Faculty Info (SSN, Birth Dates, etc.)
• Health Records
• Financial Aid Records
Healthcare/Hospitals
• Health Records
• Patient Data
• Prescription Drugs
Financial Institutions/Credit Unions
• Personal Financial Documents
• Credit Card Information
Defense/Manufacturing
• ITAR related information
• Intellectual Property
Retail
• Credit Card Information
• Email Addresses & Contact Details
6. STEALTHbits Technologies
All About Data. Some Statistics
In the United States, the average cost per organization
for data breach incidents was $5.4 million last year
o 2013 Cost of Data Breach Study: Global Analysis, Ponemon Institute, May 2013
Through 2016, the financial impact of cybercrime will
grow 10 percent per year
o www.gartner.com, Gartner ., December 2011
In a 2010 study, 46 percent of the lost laptops
contained confidential data, only 30 percent of those
systems were encrypted, and only 10 percent had other
anti-theft technologies.
o The Billion Dollar Lost Laptop Study, Ponemon Institute and Intel Corp., December 2010
7. STEALTHbits Technologies
All About Data. How it Works
Discovery & Risk Profiling Find Sensitive Data Remediate & Report
• Where is the data?
• Where does the greatest risk
exist?
• What does risk mean to you?
• What kind of sensitive content
is out there?
• Who has access to it? How
did they get that access?
• Delete, Copy,
Move/Consolidate Sensitive
Content
• Report on findings and access
rights
A Proven, 3-Step Workflow
8. STEALTHbits Technologies
All About Data. StealthSEEK® Roadmap
What’s next in the queue?
Owner Notification Workflow
Office 365 support, SharePoint scanning – v3.x (Q4 2014)
Data Classification and Tagging
9. STEALTHbits Technologies
All About Data.
Attend a Demo
o www.stealthbits.com/events
Next Steps
Request a Trial
o www.stealthbits.com/trial
Learn More
o www.stealthbits.com/resources
Ask Us a Question
o www.stealthbits.com/company/contact-us
FREE 30-Day StealthSEEK Trial!
http://www.stealthbits.com/trial