DataGravity Security Pop Quiz

Post on 16-Jul-2015

1.009 views 0 download

Tags:

Transcript of DataGravity Security Pop Quiz

SECURITYPOP QUIZ:

WHAT’S IN YOUR DATA?Answering hard questions about data security, compliance risks

at most companies every year.

Unstructured data

is growing by

60 to 80%

Source: Gartner

Companies are struggling to

secure all that data.

Think about the widely

publicized breaches at

Morgan Stanley, Sony, Anthem Blue Cross Blue Shield

and many other businesses.

NEED PROOF?

And those are

companies with

massive resources.

Small and midsize

businesses (SMBs)

are potentially

more at risk.

The Ponemon Insitute

estimates that

55% of SMBshave had data breaches.

Your organization

also has

sensitive data –

About employees,

customers and

trade secrets.

Where is that data held?

How is it protected?

Who inside and outside the organization

can access it?

What is the risk of holding information you can’t auditor visualize?

These are all critical

security and governance

questions organizations

NEED TO ASKAND ANSWER.

1. Secure sensitive information and systems.

2. Make sure you can audit forensic information.

MOST COMPLIANCE REGULATIONS INCLUDE TWO STEPS:

What are you doing to address these steps?

The most effective

place to address those

regulations is at the

point of storage.

Household technology

has gotten smarter. Phones and wearables

have gotten smarter.

Storage devices need to get smarter, too.

So why does most storage innovation stop at $/ OP and $/TB?

Storage should be

treated as a throughput

device – transforming data as it writes, stores

and protects it.

A device that can harden and secure data, as

well as protect it and

optimize it for discovery.

BY ENHANCING DATA GOVERNANCE AT THE STORAGE LAYER, YOU CAN:

Track user activity in real time down to the file level, even within VMs.

BY ENHANCING DATA GOVERNANCE AT THE STORAGE LAYER, YOU CAN:

Track user activity in real time down to the file level, even within VMs.

Track, search and analyze user access and audit trails.

BY ENHANCING DATA GOVERNANCE AT THE STORAGE LAYER, YOU CAN:

Track user activity in real time down to the file level, even within VMs.

Track, search and analyze user access and audit trails.

Identify sensitive content and content access patterns.

Most organizations don’t know what data they have or where it lives.

That lack of knowledge can open the door for internal or external data exposure or breaches.

It’s time to get smarter about data

security and compliance.