Data in the Wild: Survival Guide

Druva
DruvaConverged Data Protection, Bringing Datacenter-class Availability and Governance to the Mobile Workforce à Druva

In a world of evolving threats, your mobile data is in constant danger. All corporate data used to reside in the data center. Safe and sound behind the corporate firewall. But now, employees have multiple devices—usually a laptop, a tablet, and a smartphone—that they use both inside and outside of the office. Plus often they’re using their own personal devices to access corporate data. And outside the corporate firewall, it’s a wild world. Learn more at wild.druva.com.

Data in the Wild: Survival Guide
Data in the Wild: Survival Guide
What’s Wild Within
Chapter One: Data Sprawl.......................................................5
How to Capture Endpoint Data and Achieve Full Visibility................................7
1) Capture data from all devices...............................................................................8
2) Frequently capture changes to data................................................................9
3) View all data activity.................................................................................................10
Chapter Two: Wrong Data in the Wrong Hands...........13
How to Prevent Data Exposure by Controlling Activity.....................................15
1) Control access and sharing with policies.....................................................16
2) Restrict activity by file classification...............................................................17
3) Block data access by any unauthorized application............................18
Chapter Three: Litigation and Compliance........................21
How to Gather and Provide Data for eDiscovery..................................................23
1) Gather and provide data to your legal team............................................24
2) Track data usage.........................................................................................................25
3) Locate deleted files...................................................................................................26
Chapter Four: Lost, Stolen and Damaged Devices.....29
How to Survive the Loss or Theft of a Device...........................................................31
1) Locate the misplaced laptop and prevent data breach....................32
2) Restore data and provide ongoing data access.....................................33
3) Make sure your users back up their data....................................................34
Text
Data in the Wild: Survival Guide
A Survival Guide for
Defending Data in the Wild
It’s a wild world outside the corporate firewall.
Protecting data for your entire company is a heavy responsibility.
There’s the employee who leaves his laptop in the airport.
And the former employee who still has access to corporate data
from her personal device. Or the ever-present danger of litigation.
You’re accountable for a wide range of scenarios that put
your corporate data at risk.
Fortunately, you don’t have to go it alone. Learn from
the experience of others to ensure that you’re prepared for every
threat to your corporate data in the wild. With step-by-step
instructions, this Survival Guide is your most valuable
tool for keeping corporate assets out of harm’s way.
Data in the Wild: Survival Guide
CHAPTER ONE
The Threat: Data Sprawl
Capturing data and maintaining
visibility into how it changes
Chapter 1 – Data Sprawl
14 months from now, there will
be twice as much data in your
organization as there is now.
Corporate users generate more data than
ever before. Emails, documents, spreadsheets,
presentations and more. Each file is typically
replicated countless times as users collaborate and
store data on multiple devices. With an average of
3.3 connected devices per employee, data resides
on laptops, smartphones, and tablets with different
operating systems. Sometimes, they’re users’
personal devices.
Do you know, with total certainty, what data is
being created, where it’s located, or how it’s being
accessed and shared? Honestly? To gain full visibility
into how endpoint corporate data is moving and
being used in your enterprise, you need a way to
centrally capture it. Quickly and frequently. Wherever
users are working.
Chapter 1 – Data Sprawl
How to Capture Endpoint Data
and Achieve Full Visibility
In addition to their company-issued laptops, your company’s
executives also use tablets and smartphones while on-the-go.
Working from conference centers, hotels, airports, client sites,
and more places in the wild, users connect to networks which
are frequently weak and unpredictable. Despite all of these
variables, you can defend their data with the right tool.
How to Capture Endpoint Data
and Achieve Full Visibility
Capture data from all devices
Capture data from heterogeneous devices. To gain
visibility into users’ activity on all of their devices,
you need to capture data from all of those devices —
regardless of manufacturer or operating system.
Containerize and capture data on BYOD devices.
Personal device use presents unique challenges due
to the intermixing of personal and work data.
By containerizing corporate data and capturing
changes from personal devices, you can see what, how,
and when changes happen without affecting
end user privacy.
1
Chapter 1 – Data Sprawl
Frequently capture changes to data
Speed up data capture processes. To provide
visibility into minute-by-minute changes, data capture
must be persistent and fast. About 80% of data is
duplicated. Deduplicating data globally across all
enterprise devices avoids inefficient transfer of the
same data over and over.
Reduce the impact of data capture on users.
If frequent data capture interrupts users, they may
try to disable capture processes. WAN optimization
automatically detects network changes and adjusts
bandwidth usage accordingly. So, data transfers
happen seamlessly and without disruption.
Make sure data capture completes successfully.
When users go mobile, you can’t guarantee that data
capture will fully complete before they disconnect from
their current network. With auto-resume functionality,
data capture will pick up where it left off as soon as a
new connection is detected.
2
Chapter 1 – Data Sprawl
Chapter 1 – Data Sprawl
View all data activity
Gain insight into all data on endpoints. By frequently
capturing data, you can see what data is created, how
users are accessing it, and where it’s located.
See how data is moving. Know exactly how users are
duplicating, downloading, and restoring data across all
their devices with minute-by-minute data capture.
A detailed log of changes provides you a complete
picture of data usage.
See how data is shared. By capturing how data is being
shared, you can gain visibility into which files have been
shared with internal and external users, who those users
are, how many times the file has been downloaded, and
whether external collaborators still have access. Granular
visibility like this lets you control access or provide
information during eDiscovery.
3
of the global workforce
works from multiple locations
in a given work week.57%
— Forrester Research, “Backup for Today’s Mobile Enterprise,” 2013
Chapter 1 – Data Sprawl
Devices Used for Work
63%
7%
12%
5%
13%
MS Windows and Phone
Google Android
Apple OS X and iOS
RIM Blackberry
Other/Unknown
— Forrester Research, “Redefine Your Workforce Computing
Policy To Empower Employees,” 2012
Data in the Wild: Survival Guide
CHAPTER TWO
The Threat: Wrong Data in the
Wrong Hands
Controlling access and sharing
Controlling how your users create,
access, and share data is essential.
With the proliferation of data and devices, it’s all too
easy for data to fall into the wrong hands. You need
the ability to control who can do what and when.
Data defense might combat malicious activity by
a former employee that puts thousands of dollars’
worth of research data at risk. But, 36% of data
breaches are the result of inadvertent misuse. So
you also need the ability to prevent damage from
innocent mistakes by authorized users, such as
sharing the wrong file or accidentally emailing a file
to the wrong recipient.
Chapter 2 – Wrong Data in the Wrong Hands
— Forrester, “Understand the State of Data Security and Privacy, 2013-2014,” 2014
of data breaches are the result of
abuse by malicious insiders25%
How to Prevent Data Exposure
by Controlling Activity
Today, your employees often collaborate with each other,
external contractors, third-party vendors, customers, and
more. So, there’s a real risk that data may be shared with the
wrong person—either inadvertently or deliberately. Secure
collaboration is critical to productivity and innovation. With so
much data, multiple versions of files, employee turnover, and
the existence of personal file sharing tools, you need to be able
to effectively control activity to prevent data exposure.
Chapter 2 – Wrong Data in the Wrong Hands
How to Prevent Data Exposure
by Controlling Activity
Today, your employees often collaborate with each other,
external contractors, third-party vendors, customers, and
more. So, there’s a real risk that data may be shared with the
Chapter 2 – Wrong Data in the Wrong Hands
Control access and sharing with policies
Restrict data access. Establish user- and
device-based policies to control mobile access,
BYOD usage, and more. This will help ensure that only
the right people have access to data.
Prevent unauthorized data distribution. Control
permissions to mandate that only authorized individuals
can share data and specify whether they can share data
outside the organization. Restrict files to view-only or set
automatic link expiration for files shared externally.
Revoke data access. Sometimes data is shared with the
wrong person or should no longer be accessible. Being
able to immediately revoke access privileges lets you
prevent inappropriate access to files.
1 Control access and sharing with polic
Chapter 2 – Wrong Data in the Wrong Hands
Restrict activity by file classification
Specify file properties. Classify files to ensure
effective information rights management.
Specifying file properties enables you to control
and restrict how files can be viewed, edited,
and distributed.
Limit activity based on file properties. Once
you’ve specified file properties, create rules to
limit data usage by properties such as geographic
location, time of day, confidentiality level, version,
and more. For example, if only your U.S.-based
staff is supposed to have access to certain
documents, you can be confident that those
documents will not be available to those outside
U.S. borders.
Control all aspects of data usage. Achieve
granular control over all aspects of file usage,
beyond whether it can be viewed or shared.
Depending on your compliance requirements, you
can disable copy and paste, prevent screenshots,
enable offline viewing for a certain number of
hours, set classified files to self-destruct after a
period of time, and more.
2
Chapter 2 – Wrong Data in the Wrong Hands
Block data access by any
unauthorized application
Prevent employees from sharing with personal tools.
With the proliferation of personal file sharing tools,
it’s tempting for users to employ their own methods
to share corporate data. This introduces risk to data
security and protection. Blocking access to and
sharing of files by any unauthorized service helps you
safeguard confidential information.
Control mobile sharing. Mobile devices present unique
challenges versus laptops when it comes to accessing
and sharing data. You should be able to allow users
to access their data on mobile devices and share it
through approved channels while blocking distribution
of data through unauthorized apps.
3
Most Common Ways
Users Store and Access
Files on Multiple PCs,
Smartphones, or Tablets
In their quest to easily access their
data from multiple devices, users
resort to activities that leave data
unprotected and at risk.
USB flash drive or CD/DVD
Email attachments to myself
Network shared drive
File sync, sharing, or online
locker service
Web-based office
productivity suite
— Forrester, “Understand the State of Data Security and
Privacy, 2013-2014,” 2014
1
2
3
4
5
Chapter 2 – Wrong Data in the Wrong Hands
Data in the Wild: Survival Guide
CHAPTER THREE
The Threat: Litigation &
Compliance
Maintaining litigation and compliance readiness
to save future cost, time and headaches
eDiscovery and compliance are
scary topics.
They involve time-consuming and expensive processes.
They’re complicated by data dispersed across myriad
endpoint devices. They are the bane of IT’s existence.
Only 28% of CIOs believe their mobile security policies
would satisfy an auditor2
. Protecting data on endpoints
is now about more than just back up. Capturing and
tracking data on these devices to enable eDiscovery
and compliance is critical. By being litigation-ready,
you can save hours of IT and legal time, reduce the
overall cost of gathering data for legal hold, and ensure
all relevant data is effectively gathered for lawsuits
and audits.
2
Gartner, “CIO Attitudes Toward Consumerization of
Mobile Devices and Applications,” 2011
Chapter 3 – Litigation & Compliance
How to Gather and Provide
Data for eDiscovery
It’s happened: your company has been served legal
notice. The legal department has come to you
with a list of users to put on legal hold. You have to gather and
provide all relevant data. It doesn’t have to be a nightmare, though.
With the right survival tips, you can be fully prepared when
litigation and compliance issues strike.
Chapter 3 – Litigation & Compliance
How to Gather and Provide
Data for eDiscovery
It’s happened: your company has been served legal
notice The leg l dep rtment h come to o
Chapter 3 – Litigation & Compliance
Gather and provide data to your
legal team
Capture endpoint data to a centralized data store.
This will give you full visibility, and you’ll be prepared
for litigation before it happens.
Locate the data belonging to the users in question.
Determine custodians whose data needs to be put on
legal hold, then find these users by federated search
or list import.
Place legal holds on captured data. Suspend data
retention policies and preserve the content in place
to ensure it remains securely stored and unchanged.
Hold data until ready for review by legal teams.
Keep users on legal hold for an indefinite amount of
time until legal is ready to review stored data. All past
data will be preserved, and any new data created by
users can also be secured.
Provide data to legal teams. Activate access for legal
administration to review data that you’ve put on legal
hold. From there, data can be transferred into an
eDiscovery system, enabling the downstream
legal process of review and tagging to begin.
1
Chapter 3 – Litigation & Compliance
Track data usage
Find out how users have been sharing and
modifying data. With user audit trails, you’ll have
a stream of all user activity for full insight into all
aspects of sharing and access.
See activity for specific files and folders.
See the who, when and how of specific files
or folders. Know which have been shared,
downloaded, restored, accessed from a mobile
device, and/or deleted.
See how users have been sharing data with
external users. If your employees have been
collaborating with external users, see which files
have been shared and which ones have been
downloaded.
Don’t forget about admin activity. Users aren’t
the only ones you need to track for compliance
purposes. Use admin audit trails for an undeletable
stream of activity, including creating, modifying
or deleting a profile, downloading a file, updating
a user, adding or updating an admin and
restoring data.
2
Chapter 3 – Litigation & Compliance
Locate deleted files
Keep past copies of all data. Restoring previous file
versions or deleted files can be just as important as
putting data on legal hold. Configure data retention
policies to ensure your backup tool keeps copies of all
past data, even if it’s been deleted.
Locate the files in question. Use federated search to
locate the files by criteria such as file name, type, user,
and date.
Restore previous versions of files. By saving snapshots
of files over time, you can locate and restore previous
file versions to see how they have been modified. You
can even restore files that belonged to employees who
are no longer with the company.
3
Chapter 3 – Litigation & Compliance
IT’s Worst Nightmares
Forgetting to wear pants to work
Having the CEO’s computer crash
in the middle of a board meeting
Upgrading all the company’s machines
to a new OS
Having employees fall for a
phishing scam
Getting a notice from legal to
preserve data for litigation
5
4
3
2
1
Data in the Wild: Survival Guide
CHAPTER FOUR
The Threat: Lost, Stolen, and
Damaged Devices
Escaping data breach and lost productivity when
devices are lost, stolen, or damaged
75% of today’s workforce is mobile.3
Your corporate data is moving around like never before.
Employees store all kinds of data on laptops and mobile
devices because those are the devices that they primarily use.
In fact, Gartner calculates that 28% of corporate data is stored
exclusively on endpoint devices. However, employees don’t
think about what would happen if their devices were damaged
or broken—and sometimes, neither does IT. In fact, only 35% of
enterprise laptops are backed up4
.
Losing a laptop can result in extensive employee downtime.
It can also lead to data breach if devices fall into the wrong
hands. With the average cost of recovering from a single
corporate data breach at $7.2 million5
, it’s a risk your
organization can’t afford to take. The wild can be a
savage, unforgiving place.
3
IDC, “Worldwide Mobile Worker Population 2009-2013 Forecast,” 2010
4
ESG
5
Ponemon Institute, “2010 Annual Study: U.S. Cost of a Data Breach,” 2010
Chapter 4 – Lost, Stolen and Damaged Devices
How to Survive the Loss or
Theft of a Device
Here’s a typical scenario: you get a call from one of
your salespeople, saying that he’s lost his laptop. He
thinks he might have left it at airport security, but when
he goes back to check, it’s not there. The way in which
you’re able to respond to this situation can spell the
difference between survival and extinction.
Chapter 4 – Lost, Stolen and Damaged Devices
of a DeviceTheft
Chapter 4 – Lost, Stolen and Damaged Devices
Locate the misplaced laptop and
prevent data breach
Determine the location of the device. Use geolocation
to pinpoint the exact location of a lost or stolen device.
You should be able to determine the location of the
device within three to six feet, so if it’s still in the airport
you’ll be able to tell whether it’s at security, in the
bathroom, or in lost and found.
Retrieve the device if possible. If the device is
somewhere you or the salesperson can safely retrieve
it, then go and collect your property. However, if
the device is sitting on the tarmac, in the garbage
disposal, or in a thief’s car headed away from the airport,
recognize that it’s out of your reach and don’t attempt to
reclaim it.
Remotely wipe corporate data. If you’re unable to
retrieve the device, initiate a remote wipe so that all
corporate data will be removed the next time the
device connects to the Internet.
1
Chapter 4 – Lost, Stolen and Damaged Devices
Restore data and provide
ongoing data access
Get the user back to work immediately. With a web
client and mobile apps, the user can get back to work
with a spare laptop, personal tablet, smartphone, or
public computer.
Let users self-restore data and settings. Once the
user has a new laptop, let them restore data and
settings themselves. This reduces the time that your
team has to spend getting them back up and
running again.
Don’t wait for data to fully restore. Enable the user to
get back to work right away with a backup tool that
restores the most important files first. Users can start
working on their priority files while remaining files
restore in the background.
Provide the user with a familiar working environment.
Restore personal settings as well as data. Users can set
right to work without spending time bookmarking their
most-visited sites again, setting up mail preferences, or
restoring their favorite screensaver.
2
Chapter 4 – Lost, Stolen and Damaged Devices
Make sure your users back up their data
Recognize that you can’t rely on your users to actively
back up their own data. Whether it’s data on a coffee-
damaged laptop or files that have been accidentally
deleted, the key to retrieving lost data is to ensure
that the data is continuously backed up. The best
solution is an automatic backup that runs invisibly in
the background, without interrupting users.
Decide how frequently data should be backed up.
You can control the specifics of how data is backed up,
such as frequency and over what types of networks
(for example, avoiding backups over cellular networks).
Select the most important folders to back up.
Make sure users’ most important data is backed up
by selecting specific folders (such as My Documents)
for backup.
Give your users the ability to back up additional data,
at your discretion. You can give users as much or as
little control over what they back up as company policy
dictates. Let them add folders and files for backup if this
is permitted. If you don’t want them backing up home
videos, music files and personal photos, exclude those
file types from backup.
3
Where Laptops Are Lost
US Airports with
Highest Weekly Frequency of Laptop Loss
6
7
8
9
10
43%
12%
33%
12%
Off-site Workplace
In transit Unknown
— Ponemon Institute, “The Billion Dollar Lost Laptop Problem,” 2010.
— Ponemon Institute, “Airport Insecurity: The Case of Missing & Lost Laptops,” 2008
LAX
Los Angeles International
MIA
Miami International
JFK
John F. Kennedy International
ORD
Chicago O’Hare International
EWR
Newark Liberty International
LGA
New York La Guardia
DTW
Detroit Metropolitan Wayne County
DCA
Ronald Reagan Washington National
ATL
Hartsfield-Jackson Atlanta International
IAD
Washington Dulles International
1
2
3
4
5
Chapter 4 – Lost, Stolen and Damaged Devices
TECHNIQUES FOR BRINGING
A DEVICE BACK TO LIFE
THAT YOU
SHOULDN’T TRY
• Submerge the device in rice
• Use a vacuum cleaner to suck out
the water
• Clean the inside of the device with
rubbing alcohol
• Dry the device off with a hair dryer
• Microwave the device to evaporate
the water
Chapter 4 – Lost, Stolen and Damaged Devices
CONCLUSION
There are a lot of threats to
data in the wild; make sure your
data is defended.
We hope this Guide gives you a fresh
perspective on the current endpoint data
protection landscape. Protecting and governing
corporate data requires experience, cunning
and resourcefulness. You can venture into the
wild alone, or trust a partner uniquely qualified
to see you safely through. To learn how Druva
can be your critical key to survival, visit
wild.druva.com. To learn more about Druva
inSync, visit druva.com/insync.
© 2014 Druva. All rights reserved. 6/14
CORPORATE HEADQUARTERS
United States
150 Mathilda Place, Suite 450
Sunnyvale, CA 94086
Main: +1 888-248-4976
Sales: +1 800-375-0160
WORLDWIDE LOCATIONS
Singapore
The Co, 75 High Street
Singapore 179435
Sales: +65 3158 5080
Australia
Sales: +1 300-361-685
India
Muttha Chambers II, Level VI
Senapati Bapat Marg
Pune, India 411016
Main: +91 (0) 20 672 63 300
Sales: +91 (0) 20 672 63 395
Fax: +91 (0) 20 672 63 321
Europe
1 Furzeground Way
(Stockley Park)
Uxbridge, UB11 1BD, UK
Sales: +44 (0) 20 3150 1722

Recommandé

7 Steps to Better Cybersecurity Hygiene par
7 Steps to Better Cybersecurity Hygiene  7 Steps to Better Cybersecurity Hygiene
7 Steps to Better Cybersecurity Hygiene Microsoft
8.4K vues11 diapositives
Importance of Enterprise Mobility Solution in Healthcare par
Importance of Enterprise Mobility Solution in HealthcareImportance of Enterprise Mobility Solution in Healthcare
Importance of Enterprise Mobility Solution in HealthcareChromeInfo Technologies
1.2K vues26 diapositives
Social Enterprise: Trust; Vision; Revolution par
Social Enterprise: Trust; Vision; RevolutionSocial Enterprise: Trust; Vision; Revolution
Social Enterprise: Trust; Vision; RevolutionPeter Coffee
974 vues38 diapositives
10 alternatives to heavy handed cloud app control par
10 alternatives to heavy handed cloud app control10 alternatives to heavy handed cloud app control
10 alternatives to heavy handed cloud app controlAneel Mitra
344 vues5 diapositives
Allow is the New Block par
Allow is the New BlockAllow is the New Block
Allow is the New BlockSean Dickson
226 vues5 diapositives
Intelligent enterprise: Cognitive Business Presentation from World of Watson par
Intelligent enterprise: Cognitive Business Presentation from World of WatsonIntelligent enterprise: Cognitive Business Presentation from World of Watson
Intelligent enterprise: Cognitive Business Presentation from World of WatsonNancy Pearson
7K vues18 diapositives

Contenu connexe

Tendances

Is your infrastructure holding you back? par
Is your infrastructure holding you back?Is your infrastructure holding you back?
Is your infrastructure holding you back?Gabe Akisanmi
344 vues24 diapositives
Which type of mobile worker are you? par
Which type of mobile worker are you?Which type of mobile worker are you?
Which type of mobile worker are you?Fuji Xerox Asia Pacific
365 vues14 diapositives
Data set The Future of Big Data par
Data set The Future of Big DataData set The Future of Big Data
Data set The Future of Big DataData-Set
116 vues37 diapositives
10 Hottest trends in corporate digitisation par
10 Hottest trends in corporate digitisation10 Hottest trends in corporate digitisation
10 Hottest trends in corporate digitisationFuji Xerox Asia Pacific
758 vues16 diapositives
Speaker Kiersten E. Todt, President and Managing Partner, Liberty Group Ventu... par
Speaker Kiersten E. Todt, President and Managing Partner, Liberty Group Ventu...Speaker Kiersten E. Todt, President and Managing Partner, Liberty Group Ventu...
Speaker Kiersten E. Todt, President and Managing Partner, Liberty Group Ventu...Investorideas.com
4.5K vues10 diapositives
Symantec Intelligence Report: May 2015 par
Symantec Intelligence Report: May 2015Symantec Intelligence Report: May 2015
Symantec Intelligence Report: May 2015Symantec
8.4K vues19 diapositives

Tendances(20)

Is your infrastructure holding you back? par Gabe Akisanmi
Is your infrastructure holding you back?Is your infrastructure holding you back?
Is your infrastructure holding you back?
Gabe Akisanmi344 vues
Data set The Future of Big Data par Data-Set
Data set The Future of Big DataData set The Future of Big Data
Data set The Future of Big Data
Data-Set116 vues
Speaker Kiersten E. Todt, President and Managing Partner, Liberty Group Ventu... par Investorideas.com
Speaker Kiersten E. Todt, President and Managing Partner, Liberty Group Ventu...Speaker Kiersten E. Todt, President and Managing Partner, Liberty Group Ventu...
Speaker Kiersten E. Todt, President and Managing Partner, Liberty Group Ventu...
Investorideas.com4.5K vues
Symantec Intelligence Report: May 2015 par Symantec
Symantec Intelligence Report: May 2015Symantec Intelligence Report: May 2015
Symantec Intelligence Report: May 2015
Symantec8.4K vues
Predicting Mission Success through Improved Data Collection, Reuse and Analysis par Booz Allen Hamilton
Predicting Mission Success through Improved Data Collection, Reuse and AnalysisPredicting Mission Success through Improved Data Collection, Reuse and Analysis
Predicting Mission Success through Improved Data Collection, Reuse and Analysis
The Rise of Big Data and the Chief Data Officer (CDO) par gcharlesj
The Rise of Big Data and the Chief Data Officer (CDO)The Rise of Big Data and the Chief Data Officer (CDO)
The Rise of Big Data and the Chief Data Officer (CDO)
gcharlesj1.6K vues
eBook | Reimagine the Future of Healthcare par Insight
eBook | Reimagine the Future of Healthcare eBook | Reimagine the Future of Healthcare
eBook | Reimagine the Future of Healthcare
Insight91 vues
Big Data Analytics PowerPoint Presentation Slides par SlideTeam
Big Data Analytics PowerPoint Presentation Slides Big Data Analytics PowerPoint Presentation Slides
Big Data Analytics PowerPoint Presentation Slides
SlideTeam189 vues
Infographic: Symantec Healthcare IT Security Risk Management Study par CheapSSLsecurity
Infographic: Symantec Healthcare IT Security Risk Management StudyInfographic: Symantec Healthcare IT Security Risk Management Study
Infographic: Symantec Healthcare IT Security Risk Management Study
CheapSSLsecurity1.4K vues
11 Principles of Applied Analytics par Georgian
11 Principles of Applied Analytics11 Principles of Applied Analytics
11 Principles of Applied Analytics
Georgian10.6K vues
Data Has A Shelf Life: Why You Should Be Thinking About Real-Time Analytics par Bernard Marr
Data Has A Shelf Life: Why You Should Be Thinking About Real-Time AnalyticsData Has A Shelf Life: Why You Should Be Thinking About Real-Time Analytics
Data Has A Shelf Life: Why You Should Be Thinking About Real-Time Analytics
Bernard Marr14.2K vues
Losing the Cyber Culture War in Healthcare: Accenture 2018 Healthcare Workfor... par accenture
Losing the Cyber Culture War in Healthcare: Accenture 2018 Healthcare Workfor...Losing the Cyber Culture War in Healthcare: Accenture 2018 Healthcare Workfor...
Losing the Cyber Culture War in Healthcare: Accenture 2018 Healthcare Workfor...
accenture7.4K vues

En vedette

Cut Off Vampire Appliances' Phantom Loads with Tripp Lite par
Cut Off Vampire Appliances' Phantom Loads with Tripp LiteCut Off Vampire Appliances' Phantom Loads with Tripp Lite
Cut Off Vampire Appliances' Phantom Loads with Tripp LiteTripp Lite
5K vues1 diapositive
Dinámica par
DinámicaDinámica
DinámicaAndres David
591 vues24 diapositives
Complete Guide to Twitter Analytics par
Complete Guide to Twitter AnalyticsComplete Guide to Twitter Analytics
Complete Guide to Twitter AnalyticsAref Jdey
8.6K vues52 diapositives
Las tics de Andres David Valencia (1135997) par
Las tics de Andres David Valencia (1135997)Las tics de Andres David Valencia (1135997)
Las tics de Andres David Valencia (1135997)Andres David
359 vues9 diapositives
Squarespace sxsw panel submission 2013-3 par
Squarespace sxsw panel submission 2013-3Squarespace sxsw panel submission 2013-3
Squarespace sxsw panel submission 2013-3ryanstansky
463 vues8 diapositives
Exposing the Tooling API as a Mountable Filesystem par
Exposing the Tooling API as a Mountable FilesystemExposing the Tooling API as a Mountable Filesystem
Exposing the Tooling API as a Mountable FilesystemSalesforce Developers
499 vues29 diapositives

En vedette(17)

Cut Off Vampire Appliances' Phantom Loads with Tripp Lite par Tripp Lite
Cut Off Vampire Appliances' Phantom Loads with Tripp LiteCut Off Vampire Appliances' Phantom Loads with Tripp Lite
Cut Off Vampire Appliances' Phantom Loads with Tripp Lite
Tripp Lite5K vues
Complete Guide to Twitter Analytics par Aref Jdey
Complete Guide to Twitter AnalyticsComplete Guide to Twitter Analytics
Complete Guide to Twitter Analytics
Aref Jdey8.6K vues
Las tics de Andres David Valencia (1135997) par Andres David
Las tics de Andres David Valencia (1135997)Las tics de Andres David Valencia (1135997)
Las tics de Andres David Valencia (1135997)
Andres David359 vues
Squarespace sxsw panel submission 2013-3 par ryanstansky
Squarespace sxsw panel submission 2013-3Squarespace sxsw panel submission 2013-3
Squarespace sxsw panel submission 2013-3
ryanstansky463 vues
lightspeed-best-practices-for-hiring par Helen Morris
lightspeed-best-practices-for-hiringlightspeed-best-practices-for-hiring
lightspeed-best-practices-for-hiring
Helen Morris3.7K vues
B2B price prediction through crowd sourcing par Edwin Vlems
B2B price prediction through crowd sourcingB2B price prediction through crowd sourcing
B2B price prediction through crowd sourcing
Edwin Vlems501 vues
20131212 BrightTALK: design and data science par Dean Malmgren
20131212 BrightTALK: design and data science20131212 BrightTALK: design and data science
20131212 BrightTALK: design and data science
Dean Malmgren1.1K vues
Hr Vision Implementers 20090123 Rev1 par amylynkyler
Hr Vision Implementers 20090123 Rev1Hr Vision Implementers 20090123 Rev1
Hr Vision Implementers 20090123 Rev1
amylynkyler743 vues
The 10 Commandments of Electromagnetic Compatibility par Jaymie Murray
The 10 Commandments of Electromagnetic CompatibilityThe 10 Commandments of Electromagnetic Compatibility
The 10 Commandments of Electromagnetic Compatibility
Jaymie Murray3.7K vues
El llenguatge dels nous mitjans de comunicació par anna_arc
El llenguatge dels nous mitjans de comunicacióEl llenguatge dels nous mitjans de comunicació
El llenguatge dels nous mitjans de comunicació
anna_arc378 vues
Antropoliga de san_agustin par alejapapa
Antropoliga de san_agustinAntropoliga de san_agustin
Antropoliga de san_agustin
alejapapa2.1K vues
Big Design 2012 - Guerrilla Design & Research Methods Workshop par Russ U
Big Design 2012 - Guerrilla Design & Research Methods WorkshopBig Design 2012 - Guerrilla Design & Research Methods Workshop
Big Design 2012 - Guerrilla Design & Research Methods Workshop
Russ U18K vues

Similaire à Data in the Wild: Survival Guide

IRJET- Data Leak Prevention System: A Survey par
IRJET-  	  Data Leak Prevention System: A SurveyIRJET-  	  Data Leak Prevention System: A Survey
IRJET- Data Leak Prevention System: A SurveyIRJET Journal
28 vues3 diapositives
Version 3.6 Powerpoint March10 par
Version 3.6 Powerpoint March10Version 3.6 Powerpoint March10
Version 3.6 Powerpoint March10jpmccormack
251 vues25 diapositives
Accenture-Informed-Consent-Data-Motion par
Accenture-Informed-Consent-Data-MotionAccenture-Informed-Consent-Data-Motion
Accenture-Informed-Consent-Data-MotionSteven Tiell
142 vues20 diapositives
B Distributed Workforce Management In The Cloud Wp.En Us par
B Distributed Workforce Management In The Cloud Wp.En UsB Distributed Workforce Management In The Cloud Wp.En Us
B Distributed Workforce Management In The Cloud Wp.En UsVishal Shah
330 vues11 diapositives
Big Dat The Good And The Ugly par
Big Dat The Good And The UglyBig Dat The Good And The Ugly
Big Dat The Good And The UglyCarla Potier
2 vues47 diapositives
Protecting Data Privacy Beyond the Trusted System of Record par
Protecting Data Privacy Beyond the Trusted System of RecordProtecting Data Privacy Beyond the Trusted System of Record
Protecting Data Privacy Beyond the Trusted System of RecordCor Ranzijn
58 vues22 diapositives

Similaire à Data in the Wild: Survival Guide(20)

IRJET- Data Leak Prevention System: A Survey par IRJET Journal
IRJET-  	  Data Leak Prevention System: A SurveyIRJET-  	  Data Leak Prevention System: A Survey
IRJET- Data Leak Prevention System: A Survey
IRJET Journal28 vues
Version 3.6 Powerpoint March10 par jpmccormack
Version 3.6 Powerpoint March10Version 3.6 Powerpoint March10
Version 3.6 Powerpoint March10
jpmccormack251 vues
Accenture-Informed-Consent-Data-Motion par Steven Tiell
Accenture-Informed-Consent-Data-MotionAccenture-Informed-Consent-Data-Motion
Accenture-Informed-Consent-Data-Motion
Steven Tiell142 vues
B Distributed Workforce Management In The Cloud Wp.En Us par Vishal Shah
B Distributed Workforce Management In The Cloud Wp.En UsB Distributed Workforce Management In The Cloud Wp.En Us
B Distributed Workforce Management In The Cloud Wp.En Us
Vishal Shah330 vues
Protecting Data Privacy Beyond the Trusted System of Record par Cor Ranzijn
Protecting Data Privacy Beyond the Trusted System of RecordProtecting Data Privacy Beyond the Trusted System of Record
Protecting Data Privacy Beyond the Trusted System of Record
Cor Ranzijn58 vues
Effective Data Erasure and Anti Forensics Techniques par ijtsrd
Effective Data Erasure and Anti Forensics TechniquesEffective Data Erasure and Anti Forensics Techniques
Effective Data Erasure and Anti Forensics Techniques
ijtsrd30 vues
10 Tips to Strengthen Your Insider Threat Program par Dtex Systems
10 Tips to Strengthen Your Insider Threat Program 10 Tips to Strengthen Your Insider Threat Program
10 Tips to Strengthen Your Insider Threat Program
Dtex Systems1.2K vues
1639(pm proofreading)(tracked) par Aida Harun
1639(pm proofreading)(tracked)1639(pm proofreading)(tracked)
1639(pm proofreading)(tracked)
Aida Harun237 vues
Integrating DLP and the 4 W's is a Must by Uzi Yair - CEO, GTB Technologies Inc. par Ravtach Solutions
Integrating DLP and the 4 W's is a Must by Uzi Yair - CEO, GTB Technologies Inc.Integrating DLP and the 4 W's is a Must by Uzi Yair - CEO, GTB Technologies Inc.
Integrating DLP and the 4 W's is a Must by Uzi Yair - CEO, GTB Technologies Inc.
PingPal infodeck: How to survive BYOD and mobile networks par Hyker Security
PingPal infodeck: How to survive BYOD and mobile networksPingPal infodeck: How to survive BYOD and mobile networks
PingPal infodeck: How to survive BYOD and mobile networks
Hyker Security1K vues
Strategies for Data Leakage Prevention par IRJET Journal
Strategies for Data Leakage PreventionStrategies for Data Leakage Prevention
Strategies for Data Leakage Prevention
IRJET Journal24 vues

Plus de Druva

Druva’s 2017 Ransomware Survey par
Druva’s 2017 Ransomware Survey Druva’s 2017 Ransomware Survey
Druva’s 2017 Ransomware Survey Druva
1.8K vues1 diapositive
Protecting Corporate Data When an Employee Leaves: Survey and Best Practices par
Protecting Corporate Data When an Employee Leaves: Survey and Best PracticesProtecting Corporate Data When an Employee Leaves: Survey and Best Practices
Protecting Corporate Data When an Employee Leaves: Survey and Best PracticesDruva
939 vues22 diapositives
New Strategies for More Effective Remote/Branch Office Data Protection par
New Strategies for More Effective Remote/Branch Office Data ProtectionNew Strategies for More Effective Remote/Branch Office Data Protection
New Strategies for More Effective Remote/Branch Office Data ProtectionDruva
1K vues36 diapositives
4 ways to cut your e discovery costs in half-webinar-exterro-druva par
4 ways to cut your e discovery costs in half-webinar-exterro-druva4 ways to cut your e discovery costs in half-webinar-exterro-druva
4 ways to cut your e discovery costs in half-webinar-exterro-druvaDruva
612 vues20 diapositives
Cut End-to-End eDiscovery Time in Half: Leveraging the Cloud par
Cut End-to-End eDiscovery Time in Half: Leveraging the CloudCut End-to-End eDiscovery Time in Half: Leveraging the Cloud
Cut End-to-End eDiscovery Time in Half: Leveraging the CloudDruva
537 vues37 diapositives
Rethink Server Backup and Regain Control par
Rethink Server Backup and Regain ControlRethink Server Backup and Regain Control
Rethink Server Backup and Regain ControlDruva
575 vues17 diapositives

Plus de Druva(20)

Druva’s 2017 Ransomware Survey par Druva
Druva’s 2017 Ransomware Survey Druva’s 2017 Ransomware Survey
Druva’s 2017 Ransomware Survey
Druva1.8K vues
Protecting Corporate Data When an Employee Leaves: Survey and Best Practices par Druva
Protecting Corporate Data When an Employee Leaves: Survey and Best PracticesProtecting Corporate Data When an Employee Leaves: Survey and Best Practices
Protecting Corporate Data When an Employee Leaves: Survey and Best Practices
Druva939 vues
New Strategies for More Effective Remote/Branch Office Data Protection par Druva
New Strategies for More Effective Remote/Branch Office Data ProtectionNew Strategies for More Effective Remote/Branch Office Data Protection
New Strategies for More Effective Remote/Branch Office Data Protection
Druva1K vues
4 ways to cut your e discovery costs in half-webinar-exterro-druva par Druva
4 ways to cut your e discovery costs in half-webinar-exterro-druva4 ways to cut your e discovery costs in half-webinar-exterro-druva
4 ways to cut your e discovery costs in half-webinar-exterro-druva
Druva612 vues
Cut End-to-End eDiscovery Time in Half: Leveraging the Cloud par Druva
Cut End-to-End eDiscovery Time in Half: Leveraging the CloudCut End-to-End eDiscovery Time in Half: Leveraging the Cloud
Cut End-to-End eDiscovery Time in Half: Leveraging the Cloud
Druva537 vues
Rethink Server Backup and Regain Control par Druva
Rethink Server Backup and Regain ControlRethink Server Backup and Regain Control
Rethink Server Backup and Regain Control
Druva575 vues
Taking a Proactive Approach to Combat Ransomware [Druva Webinar] par Druva
Taking a Proactive Approach to Combat Ransomware [Druva Webinar]Taking a Proactive Approach to Combat Ransomware [Druva Webinar]
Taking a Proactive Approach to Combat Ransomware [Druva Webinar]
Druva678 vues
20 point checklist : why move backup and disaster recovery to the cloud - druva par Druva
20 point checklist : why move backup and disaster recovery to the cloud - druva20 point checklist : why move backup and disaster recovery to the cloud - druva
20 point checklist : why move backup and disaster recovery to the cloud - druva
Druva641 vues
Getting a clue: uncovering the truth about your data with mobile forensics par Druva
Getting a clue: uncovering the truth about your data with mobile forensicsGetting a clue: uncovering the truth about your data with mobile forensics
Getting a clue: uncovering the truth about your data with mobile forensics
Druva1.6K vues
Interested in working at Druva? par Druva
Interested in working at Druva?Interested in working at Druva?
Interested in working at Druva?
Druva1.9K vues
Where in the world is your PII and other sensitive data? by @druva inc par Druva
Where in the world is your PII and other sensitive data? by @druva incWhere in the world is your PII and other sensitive data? by @druva inc
Where in the world is your PII and other sensitive data? by @druva inc
Druva1K vues
Black Hat 2015 Survey: The Challenge of Data Sprawl par Druva
Black Hat 2015 Survey: The Challenge of Data SprawlBlack Hat 2015 Survey: The Challenge of Data Sprawl
Black Hat 2015 Survey: The Challenge of Data Sprawl
Druva2K vues
Where In The World Is Your Sensitive Data? par Druva
Where In The World Is Your Sensitive Data?Where In The World Is Your Sensitive Data?
Where In The World Is Your Sensitive Data?
Druva7.6K vues
Soundbytes from the Frontlines par Druva
Soundbytes from the FrontlinesSoundbytes from the Frontlines
Soundbytes from the Frontlines
Druva1.2K vues
The state of data privacy with dimensional research par Druva
The state of data privacy with dimensional research The state of data privacy with dimensional research
The state of data privacy with dimensional research
Druva1K vues
Security and privacy of cloud data: what you need to know (Interop) par Druva
Security and privacy of cloud data: what you need to know (Interop)Security and privacy of cloud data: what you need to know (Interop)
Security and privacy of cloud data: what you need to know (Interop)
Druva1.5K vues
Enterprise Data Privacy Quiz par Druva
Enterprise Data Privacy QuizEnterprise Data Privacy Quiz
Enterprise Data Privacy Quiz
Druva5.5K vues
Data Privacy Readiness Test par Druva
Data Privacy Readiness TestData Privacy Readiness Test
Data Privacy Readiness Test
Druva4K vues
AWS reInvent: Building an enterprise class backup and archival solution on AWS par Druva
AWS reInvent: Building an enterprise class backup and archival solution on AWSAWS reInvent: Building an enterprise class backup and archival solution on AWS
AWS reInvent: Building an enterprise class backup and archival solution on AWS
Druva3.7K vues
Why You Need Enterprise Backup par Druva
Why You Need Enterprise BackupWhy You Need Enterprise Backup
Why You Need Enterprise Backup
Druva2.6K vues

Dernier

[DSC Europe 23][Cryptica] Martin_Summer_Digital_central_bank_money_Ideas_init... par
[DSC Europe 23][Cryptica] Martin_Summer_Digital_central_bank_money_Ideas_init...[DSC Europe 23][Cryptica] Martin_Summer_Digital_central_bank_money_Ideas_init...
[DSC Europe 23][Cryptica] Martin_Summer_Digital_central_bank_money_Ideas_init...DataScienceConferenc1
5 vues18 diapositives
AvizoImageSegmentation.pptx par
AvizoImageSegmentation.pptxAvizoImageSegmentation.pptx
AvizoImageSegmentation.pptxnathanielbutterworth1
6 vues14 diapositives
Ukraine Infographic_22NOV2023_v2.pdf par
Ukraine Infographic_22NOV2023_v2.pdfUkraine Infographic_22NOV2023_v2.pdf
Ukraine Infographic_22NOV2023_v2.pdfAnastosiyaGurin
1.4K vues3 diapositives
[DSC Europe 23] Stefan Mrsic_Goran Savic - Evolving Technology Excellence.pptx par
[DSC Europe 23] Stefan Mrsic_Goran Savic - Evolving Technology Excellence.pptx[DSC Europe 23] Stefan Mrsic_Goran Savic - Evolving Technology Excellence.pptx
[DSC Europe 23] Stefan Mrsic_Goran Savic - Evolving Technology Excellence.pptxDataScienceConferenc1
10 vues16 diapositives
Data Journeys Hard Talk workshop final.pptx par
Data Journeys Hard Talk workshop final.pptxData Journeys Hard Talk workshop final.pptx
Data Journeys Hard Talk workshop final.pptxinfo828217
11 vues18 diapositives
Report on OSINT par
Report on OSINTReport on OSINT
Report on OSINTAyonDebnathCertified
5 vues15 diapositives

Dernier(20)

[DSC Europe 23][Cryptica] Martin_Summer_Digital_central_bank_money_Ideas_init... par DataScienceConferenc1
[DSC Europe 23][Cryptica] Martin_Summer_Digital_central_bank_money_Ideas_init...[DSC Europe 23][Cryptica] Martin_Summer_Digital_central_bank_money_Ideas_init...
[DSC Europe 23][Cryptica] Martin_Summer_Digital_central_bank_money_Ideas_init...
Ukraine Infographic_22NOV2023_v2.pdf par AnastosiyaGurin
Ukraine Infographic_22NOV2023_v2.pdfUkraine Infographic_22NOV2023_v2.pdf
Ukraine Infographic_22NOV2023_v2.pdf
AnastosiyaGurin1.4K vues
[DSC Europe 23] Stefan Mrsic_Goran Savic - Evolving Technology Excellence.pptx par DataScienceConferenc1
[DSC Europe 23] Stefan Mrsic_Goran Savic - Evolving Technology Excellence.pptx[DSC Europe 23] Stefan Mrsic_Goran Savic - Evolving Technology Excellence.pptx
[DSC Europe 23] Stefan Mrsic_Goran Savic - Evolving Technology Excellence.pptx
Data Journeys Hard Talk workshop final.pptx par info828217
Data Journeys Hard Talk workshop final.pptxData Journeys Hard Talk workshop final.pptx
Data Journeys Hard Talk workshop final.pptx
info82821711 vues
6498-Butun_Beyinli_Cocuq-Daniel_J.Siegel-Tina_Payne_Bryson-2011-259s.pdf par 10urkyr34
6498-Butun_Beyinli_Cocuq-Daniel_J.Siegel-Tina_Payne_Bryson-2011-259s.pdf6498-Butun_Beyinli_Cocuq-Daniel_J.Siegel-Tina_Payne_Bryson-2011-259s.pdf
6498-Butun_Beyinli_Cocuq-Daniel_J.Siegel-Tina_Payne_Bryson-2011-259s.pdf
10urkyr347 vues
[DSC Europe 23] Luca Morena - From Psychohistory to Curious Machines par DataScienceConferenc1
[DSC Europe 23] Luca Morena - From Psychohistory to Curious Machines[DSC Europe 23] Luca Morena - From Psychohistory to Curious Machines
[DSC Europe 23] Luca Morena - From Psychohistory to Curious Machines
Listed Instruments Survey 2022.pptx par secretariat4
Listed Instruments Survey  2022.pptxListed Instruments Survey  2022.pptx
Listed Instruments Survey 2022.pptx
secretariat452 vues
Best Home Security Systems.pptx par mogalang
Best Home Security Systems.pptxBest Home Security Systems.pptx
Best Home Security Systems.pptx
mogalang9 vues
[DSC Europe 23] Danijela Horak - The Innovator’s Dilemma: to Build or Not to ... par DataScienceConferenc1
[DSC Europe 23] Danijela Horak - The Innovator’s Dilemma: to Build or Not to ...[DSC Europe 23] Danijela Horak - The Innovator’s Dilemma: to Build or Not to ...
[DSC Europe 23] Danijela Horak - The Innovator’s Dilemma: to Build or Not to ...
Games, Queries, and Argumentation Frameworks: Time for a Family Reunion par Bertram Ludäscher
Games, Queries, and Argumentation Frameworks: Time for a Family ReunionGames, Queries, and Argumentation Frameworks: Time for a Family Reunion
Games, Queries, and Argumentation Frameworks: Time for a Family Reunion
Dr. Ousmane Badiane-2023 ReSAKSS Conference par AKADEMIYA2063
Dr. Ousmane Badiane-2023 ReSAKSS ConferenceDr. Ousmane Badiane-2023 ReSAKSS Conference
Dr. Ousmane Badiane-2023 ReSAKSS Conference
AKADEMIYA20635 vues
[DSC Europe 23] Spela Poklukar & Tea Brasanac - Retrieval Augmented Generation par DataScienceConferenc1
[DSC Europe 23] Spela Poklukar & Tea Brasanac - Retrieval Augmented Generation[DSC Europe 23] Spela Poklukar & Tea Brasanac - Retrieval Augmented Generation
[DSC Europe 23] Spela Poklukar & Tea Brasanac - Retrieval Augmented Generation
Customer Data Cleansing Project.pptx par Nat O
Customer Data Cleansing Project.pptxCustomer Data Cleansing Project.pptx
Customer Data Cleansing Project.pptx
Nat O6 vues
DGST Methodology Presentation.pdf par maddierlegum
DGST Methodology Presentation.pdfDGST Methodology Presentation.pdf
DGST Methodology Presentation.pdf
maddierlegum5 vues

Data in the Wild: Survival Guide

  • 3. What’s Wild Within Chapter One: Data Sprawl.......................................................5 How to Capture Endpoint Data and Achieve Full Visibility................................7 1) Capture data from all devices...............................................................................8 2) Frequently capture changes to data................................................................9 3) View all data activity.................................................................................................10 Chapter Two: Wrong Data in the Wrong Hands...........13 How to Prevent Data Exposure by Controlling Activity.....................................15 1) Control access and sharing with policies.....................................................16 2) Restrict activity by file classification...............................................................17 3) Block data access by any unauthorized application............................18 Chapter Three: Litigation and Compliance........................21 How to Gather and Provide Data for eDiscovery..................................................23 1) Gather and provide data to your legal team............................................24 2) Track data usage.........................................................................................................25 3) Locate deleted files...................................................................................................26 Chapter Four: Lost, Stolen and Damaged Devices.....29 How to Survive the Loss or Theft of a Device...........................................................31 1) Locate the misplaced laptop and prevent data breach....................32 2) Restore data and provide ongoing data access.....................................33 3) Make sure your users back up their data....................................................34 Text
  • 5. A Survival Guide for Defending Data in the Wild It’s a wild world outside the corporate firewall. Protecting data for your entire company is a heavy responsibility. There’s the employee who leaves his laptop in the airport. And the former employee who still has access to corporate data from her personal device. Or the ever-present danger of litigation. You’re accountable for a wide range of scenarios that put your corporate data at risk. Fortunately, you don’t have to go it alone. Learn from the experience of others to ensure that you’re prepared for every threat to your corporate data in the wild. With step-by-step instructions, this Survival Guide is your most valuable tool for keeping corporate assets out of harm’s way.
  • 7. CHAPTER ONE The Threat: Data Sprawl Capturing data and maintaining visibility into how it changes
  • 8. Chapter 1 – Data Sprawl 14 months from now, there will be twice as much data in your organization as there is now. Corporate users generate more data than ever before. Emails, documents, spreadsheets, presentations and more. Each file is typically replicated countless times as users collaborate and store data on multiple devices. With an average of 3.3 connected devices per employee, data resides on laptops, smartphones, and tablets with different operating systems. Sometimes, they’re users’ personal devices. Do you know, with total certainty, what data is being created, where it’s located, or how it’s being accessed and shared? Honestly? To gain full visibility into how endpoint corporate data is moving and being used in your enterprise, you need a way to centrally capture it. Quickly and frequently. Wherever users are working.
  • 9. Chapter 1 – Data Sprawl How to Capture Endpoint Data and Achieve Full Visibility In addition to their company-issued laptops, your company’s executives also use tablets and smartphones while on-the-go. Working from conference centers, hotels, airports, client sites, and more places in the wild, users connect to networks which are frequently weak and unpredictable. Despite all of these variables, you can defend their data with the right tool. How to Capture Endpoint Data and Achieve Full Visibility
  • 10. Capture data from all devices Capture data from heterogeneous devices. To gain visibility into users’ activity on all of their devices, you need to capture data from all of those devices — regardless of manufacturer or operating system. Containerize and capture data on BYOD devices. Personal device use presents unique challenges due to the intermixing of personal and work data. By containerizing corporate data and capturing changes from personal devices, you can see what, how, and when changes happen without affecting end user privacy. 1 Chapter 1 – Data Sprawl
  • 11. Frequently capture changes to data Speed up data capture processes. To provide visibility into minute-by-minute changes, data capture must be persistent and fast. About 80% of data is duplicated. Deduplicating data globally across all enterprise devices avoids inefficient transfer of the same data over and over. Reduce the impact of data capture on users. If frequent data capture interrupts users, they may try to disable capture processes. WAN optimization automatically detects network changes and adjusts bandwidth usage accordingly. So, data transfers happen seamlessly and without disruption. Make sure data capture completes successfully. When users go mobile, you can’t guarantee that data capture will fully complete before they disconnect from their current network. With auto-resume functionality, data capture will pick up where it left off as soon as a new connection is detected. 2 Chapter 1 – Data Sprawl
  • 12. Chapter 1 – Data Sprawl View all data activity Gain insight into all data on endpoints. By frequently capturing data, you can see what data is created, how users are accessing it, and where it’s located. See how data is moving. Know exactly how users are duplicating, downloading, and restoring data across all their devices with minute-by-minute data capture. A detailed log of changes provides you a complete picture of data usage. See how data is shared. By capturing how data is being shared, you can gain visibility into which files have been shared with internal and external users, who those users are, how many times the file has been downloaded, and whether external collaborators still have access. Granular visibility like this lets you control access or provide information during eDiscovery. 3 of the global workforce works from multiple locations in a given work week.57% — Forrester Research, “Backup for Today’s Mobile Enterprise,” 2013
  • 13. Chapter 1 – Data Sprawl Devices Used for Work 63% 7% 12% 5% 13% MS Windows and Phone Google Android Apple OS X and iOS RIM Blackberry Other/Unknown — Forrester Research, “Redefine Your Workforce Computing Policy To Empower Employees,” 2012
  • 15. CHAPTER TWO The Threat: Wrong Data in the Wrong Hands Controlling access and sharing
  • 16. Controlling how your users create, access, and share data is essential. With the proliferation of data and devices, it’s all too easy for data to fall into the wrong hands. You need the ability to control who can do what and when. Data defense might combat malicious activity by a former employee that puts thousands of dollars’ worth of research data at risk. But, 36% of data breaches are the result of inadvertent misuse. So you also need the ability to prevent damage from innocent mistakes by authorized users, such as sharing the wrong file or accidentally emailing a file to the wrong recipient. Chapter 2 – Wrong Data in the Wrong Hands — Forrester, “Understand the State of Data Security and Privacy, 2013-2014,” 2014 of data breaches are the result of abuse by malicious insiders25%
  • 17. How to Prevent Data Exposure by Controlling Activity Today, your employees often collaborate with each other, external contractors, third-party vendors, customers, and more. So, there’s a real risk that data may be shared with the wrong person—either inadvertently or deliberately. Secure collaboration is critical to productivity and innovation. With so much data, multiple versions of files, employee turnover, and the existence of personal file sharing tools, you need to be able to effectively control activity to prevent data exposure. Chapter 2 – Wrong Data in the Wrong Hands How to Prevent Data Exposure by Controlling Activity Today, your employees often collaborate with each other, external contractors, third-party vendors, customers, and more. So, there’s a real risk that data may be shared with the
  • 18. Chapter 2 – Wrong Data in the Wrong Hands Control access and sharing with policies Restrict data access. Establish user- and device-based policies to control mobile access, BYOD usage, and more. This will help ensure that only the right people have access to data. Prevent unauthorized data distribution. Control permissions to mandate that only authorized individuals can share data and specify whether they can share data outside the organization. Restrict files to view-only or set automatic link expiration for files shared externally. Revoke data access. Sometimes data is shared with the wrong person or should no longer be accessible. Being able to immediately revoke access privileges lets you prevent inappropriate access to files. 1 Control access and sharing with polic
  • 19. Chapter 2 – Wrong Data in the Wrong Hands Restrict activity by file classification Specify file properties. Classify files to ensure effective information rights management. Specifying file properties enables you to control and restrict how files can be viewed, edited, and distributed. Limit activity based on file properties. Once you’ve specified file properties, create rules to limit data usage by properties such as geographic location, time of day, confidentiality level, version, and more. For example, if only your U.S.-based staff is supposed to have access to certain documents, you can be confident that those documents will not be available to those outside U.S. borders. Control all aspects of data usage. Achieve granular control over all aspects of file usage, beyond whether it can be viewed or shared. Depending on your compliance requirements, you can disable copy and paste, prevent screenshots, enable offline viewing for a certain number of hours, set classified files to self-destruct after a period of time, and more. 2
  • 20. Chapter 2 – Wrong Data in the Wrong Hands Block data access by any unauthorized application Prevent employees from sharing with personal tools. With the proliferation of personal file sharing tools, it’s tempting for users to employ their own methods to share corporate data. This introduces risk to data security and protection. Blocking access to and sharing of files by any unauthorized service helps you safeguard confidential information. Control mobile sharing. Mobile devices present unique challenges versus laptops when it comes to accessing and sharing data. You should be able to allow users to access their data on mobile devices and share it through approved channels while blocking distribution of data through unauthorized apps. 3
  • 21. Most Common Ways Users Store and Access Files on Multiple PCs, Smartphones, or Tablets In their quest to easily access their data from multiple devices, users resort to activities that leave data unprotected and at risk. USB flash drive or CD/DVD Email attachments to myself Network shared drive File sync, sharing, or online locker service Web-based office productivity suite — Forrester, “Understand the State of Data Security and Privacy, 2013-2014,” 2014 1 2 3 4 5 Chapter 2 – Wrong Data in the Wrong Hands
  • 23. CHAPTER THREE The Threat: Litigation & Compliance Maintaining litigation and compliance readiness to save future cost, time and headaches
  • 24. eDiscovery and compliance are scary topics. They involve time-consuming and expensive processes. They’re complicated by data dispersed across myriad endpoint devices. They are the bane of IT’s existence. Only 28% of CIOs believe their mobile security policies would satisfy an auditor2 . Protecting data on endpoints is now about more than just back up. Capturing and tracking data on these devices to enable eDiscovery and compliance is critical. By being litigation-ready, you can save hours of IT and legal time, reduce the overall cost of gathering data for legal hold, and ensure all relevant data is effectively gathered for lawsuits and audits. 2 Gartner, “CIO Attitudes Toward Consumerization of Mobile Devices and Applications,” 2011 Chapter 3 – Litigation & Compliance
  • 25. How to Gather and Provide Data for eDiscovery It’s happened: your company has been served legal notice. The legal department has come to you with a list of users to put on legal hold. You have to gather and provide all relevant data. It doesn’t have to be a nightmare, though. With the right survival tips, you can be fully prepared when litigation and compliance issues strike. Chapter 3 – Litigation & Compliance How to Gather and Provide Data for eDiscovery It’s happened: your company has been served legal notice The leg l dep rtment h come to o
  • 26. Chapter 3 – Litigation & Compliance Gather and provide data to your legal team Capture endpoint data to a centralized data store. This will give you full visibility, and you’ll be prepared for litigation before it happens. Locate the data belonging to the users in question. Determine custodians whose data needs to be put on legal hold, then find these users by federated search or list import. Place legal holds on captured data. Suspend data retention policies and preserve the content in place to ensure it remains securely stored and unchanged. Hold data until ready for review by legal teams. Keep users on legal hold for an indefinite amount of time until legal is ready to review stored data. All past data will be preserved, and any new data created by users can also be secured. Provide data to legal teams. Activate access for legal administration to review data that you’ve put on legal hold. From there, data can be transferred into an eDiscovery system, enabling the downstream legal process of review and tagging to begin. 1
  • 27. Chapter 3 – Litigation & Compliance Track data usage Find out how users have been sharing and modifying data. With user audit trails, you’ll have a stream of all user activity for full insight into all aspects of sharing and access. See activity for specific files and folders. See the who, when and how of specific files or folders. Know which have been shared, downloaded, restored, accessed from a mobile device, and/or deleted. See how users have been sharing data with external users. If your employees have been collaborating with external users, see which files have been shared and which ones have been downloaded. Don’t forget about admin activity. Users aren’t the only ones you need to track for compliance purposes. Use admin audit trails for an undeletable stream of activity, including creating, modifying or deleting a profile, downloading a file, updating a user, adding or updating an admin and restoring data. 2
  • 28. Chapter 3 – Litigation & Compliance Locate deleted files Keep past copies of all data. Restoring previous file versions or deleted files can be just as important as putting data on legal hold. Configure data retention policies to ensure your backup tool keeps copies of all past data, even if it’s been deleted. Locate the files in question. Use federated search to locate the files by criteria such as file name, type, user, and date. Restore previous versions of files. By saving snapshots of files over time, you can locate and restore previous file versions to see how they have been modified. You can even restore files that belonged to employees who are no longer with the company. 3
  • 29. Chapter 3 – Litigation & Compliance IT’s Worst Nightmares Forgetting to wear pants to work Having the CEO’s computer crash in the middle of a board meeting Upgrading all the company’s machines to a new OS Having employees fall for a phishing scam Getting a notice from legal to preserve data for litigation 5 4 3 2 1
  • 31. CHAPTER FOUR The Threat: Lost, Stolen, and Damaged Devices Escaping data breach and lost productivity when devices are lost, stolen, or damaged
  • 32. 75% of today’s workforce is mobile.3 Your corporate data is moving around like never before. Employees store all kinds of data on laptops and mobile devices because those are the devices that they primarily use. In fact, Gartner calculates that 28% of corporate data is stored exclusively on endpoint devices. However, employees don’t think about what would happen if their devices were damaged or broken—and sometimes, neither does IT. In fact, only 35% of enterprise laptops are backed up4 . Losing a laptop can result in extensive employee downtime. It can also lead to data breach if devices fall into the wrong hands. With the average cost of recovering from a single corporate data breach at $7.2 million5 , it’s a risk your organization can’t afford to take. The wild can be a savage, unforgiving place. 3 IDC, “Worldwide Mobile Worker Population 2009-2013 Forecast,” 2010 4 ESG 5 Ponemon Institute, “2010 Annual Study: U.S. Cost of a Data Breach,” 2010 Chapter 4 – Lost, Stolen and Damaged Devices
  • 33. How to Survive the Loss or Theft of a Device Here’s a typical scenario: you get a call from one of your salespeople, saying that he’s lost his laptop. He thinks he might have left it at airport security, but when he goes back to check, it’s not there. The way in which you’re able to respond to this situation can spell the difference between survival and extinction. Chapter 4 – Lost, Stolen and Damaged Devices of a DeviceTheft
  • 34. Chapter 4 – Lost, Stolen and Damaged Devices Locate the misplaced laptop and prevent data breach Determine the location of the device. Use geolocation to pinpoint the exact location of a lost or stolen device. You should be able to determine the location of the device within three to six feet, so if it’s still in the airport you’ll be able to tell whether it’s at security, in the bathroom, or in lost and found. Retrieve the device if possible. If the device is somewhere you or the salesperson can safely retrieve it, then go and collect your property. However, if the device is sitting on the tarmac, in the garbage disposal, or in a thief’s car headed away from the airport, recognize that it’s out of your reach and don’t attempt to reclaim it. Remotely wipe corporate data. If you’re unable to retrieve the device, initiate a remote wipe so that all corporate data will be removed the next time the device connects to the Internet. 1
  • 35. Chapter 4 – Lost, Stolen and Damaged Devices Restore data and provide ongoing data access Get the user back to work immediately. With a web client and mobile apps, the user can get back to work with a spare laptop, personal tablet, smartphone, or public computer. Let users self-restore data and settings. Once the user has a new laptop, let them restore data and settings themselves. This reduces the time that your team has to spend getting them back up and running again. Don’t wait for data to fully restore. Enable the user to get back to work right away with a backup tool that restores the most important files first. Users can start working on their priority files while remaining files restore in the background. Provide the user with a familiar working environment. Restore personal settings as well as data. Users can set right to work without spending time bookmarking their most-visited sites again, setting up mail preferences, or restoring their favorite screensaver. 2
  • 36. Chapter 4 – Lost, Stolen and Damaged Devices Make sure your users back up their data Recognize that you can’t rely on your users to actively back up their own data. Whether it’s data on a coffee- damaged laptop or files that have been accidentally deleted, the key to retrieving lost data is to ensure that the data is continuously backed up. The best solution is an automatic backup that runs invisibly in the background, without interrupting users. Decide how frequently data should be backed up. You can control the specifics of how data is backed up, such as frequency and over what types of networks (for example, avoiding backups over cellular networks). Select the most important folders to back up. Make sure users’ most important data is backed up by selecting specific folders (such as My Documents) for backup. Give your users the ability to back up additional data, at your discretion. You can give users as much or as little control over what they back up as company policy dictates. Let them add folders and files for backup if this is permitted. If you don’t want them backing up home videos, music files and personal photos, exclude those file types from backup. 3
  • 37. Where Laptops Are Lost US Airports with Highest Weekly Frequency of Laptop Loss 6 7 8 9 10 43% 12% 33% 12% Off-site Workplace In transit Unknown — Ponemon Institute, “The Billion Dollar Lost Laptop Problem,” 2010. — Ponemon Institute, “Airport Insecurity: The Case of Missing & Lost Laptops,” 2008 LAX Los Angeles International MIA Miami International JFK John F. Kennedy International ORD Chicago O’Hare International EWR Newark Liberty International LGA New York La Guardia DTW Detroit Metropolitan Wayne County DCA Ronald Reagan Washington National ATL Hartsfield-Jackson Atlanta International IAD Washington Dulles International 1 2 3 4 5 Chapter 4 – Lost, Stolen and Damaged Devices
  • 38. TECHNIQUES FOR BRINGING A DEVICE BACK TO LIFE THAT YOU SHOULDN’T TRY • Submerge the device in rice • Use a vacuum cleaner to suck out the water • Clean the inside of the device with rubbing alcohol • Dry the device off with a hair dryer • Microwave the device to evaporate the water Chapter 4 – Lost, Stolen and Damaged Devices
  • 39. CONCLUSION There are a lot of threats to data in the wild; make sure your data is defended. We hope this Guide gives you a fresh perspective on the current endpoint data protection landscape. Protecting and governing corporate data requires experience, cunning and resourcefulness. You can venture into the wild alone, or trust a partner uniquely qualified to see you safely through. To learn how Druva can be your critical key to survival, visit wild.druva.com. To learn more about Druva inSync, visit druva.com/insync.
  • 40. © 2014 Druva. All rights reserved. 6/14 CORPORATE HEADQUARTERS United States 150 Mathilda Place, Suite 450 Sunnyvale, CA 94086 Main: +1 888-248-4976 Sales: +1 800-375-0160 WORLDWIDE LOCATIONS Singapore The Co, 75 High Street Singapore 179435 Sales: +65 3158 5080 Australia Sales: +1 300-361-685 India Muttha Chambers II, Level VI Senapati Bapat Marg Pune, India 411016 Main: +91 (0) 20 672 63 300 Sales: +91 (0) 20 672 63 395 Fax: +91 (0) 20 672 63 321 Europe 1 Furzeground Way (Stockley Park) Uxbridge, UB11 1BD, UK Sales: +44 (0) 20 3150 1722