SlideShare a Scribd company logo
1 of 39
Download to read offline
Audit is Next Week – Will your
Endpoints fail You?
Brian Reed
VP Strategy
March 8, 2018
© 2018 ThinAir Labs, Inc.
#1 Asset of Digital Enterprise
INFORMATION
Security | Compliance | IT Ops
© 2018 ThinAir Labs, Inc.
© 2018 ThinAir Labs, Inc.
Why do breaches occur?
Lack of visibility.
© 2018 ThinAir Labs, Inc.
How information is created, consumed, and communicated
What is the financial impact of the data at risk
© 2018 ThinAir Labs, Inc.
DATA
Device
Application
Network
User
Data is What Matters in Security
o Current solutions focus on
tangential indicators of
compromise
o Data is the primary digital
asset at risk
o User-Data interaction at data-
element level is key
o Endpoint-based monitoring for
enterprise-wide data
interaction visibility
© 2018 ThinAir Labs, Inc.
Delivers complete intelligence about every
information in your organization.
With Simplicity and Speed.
CONVERSATIONAL	UI	
BUSINESS	IMPACT
ENDPOINT	VISIBILITY	
CONTINUOUS	
VISIBILITY
INFORMATION	
ATTRIBUTION
Endpoint Data Visibility
© 2018 ThinAir Labs, Inc.
Endpoint Visibility
o Endpoint is the point of
interaction between people and
data
o Endpoint is where a lot of IP is
created
o Endpoint is often the blind spot
o Unstructured vs. structured
data
© 2018 ThinAir Labs, Inc.
Continuous Visibility – Real-time & Historical
191 days: Average time to identify breach
66 days: Average time to contain breach
» Track all interactions with
information continuously
» Maintain historical audit
log (6, 12, 24 months or
longer)
• Even if evidence has
been tampered with or
deleted
© 2018 ThinAir Labs, Inc.
Real Time Information Attribution
o Detect suspicious activity along the threat kill chain
o Proactive prediction of exfiltration
© 2018 ThinAir Labs, Inc.
Conversational UI
Get Instant Answers to Any Information or Security Question
© 2018 ThinAir Labs, Inc.
Understand Business Impact
» Provide	business	impact	
assessment
• Scope	of	the	breach	in	$$$
• Based	on	value	of	the	data
• Cost	of	the	breach	(detection,	
remediation,	notification,	etc.)
• Regulatory	impact
• Brand	reputation,	business	loss
© 2018 ThinAir Labs, Inc.
ThinAir Next-Generation
Endpoint Data Visibility
Platform delivers complete
intelligence about every
information in your
organization. With
Simplicity and Speed.
© 2018 ThinAir Labs, Inc.
Where	to	Start?
• Start	with	visibility	on	the	endpoint
• Focus	on	information	at	the	data-element	level
• Continuously	track	interactions	with	your	information	
• Keep	sufficiently	long	audit	history
• It	should	not	require	a	PhD	to	investigate
“Ultimately,	IT	will	have	to	stop	worrying	about	how	to	control	which	applications	people	are	
using	or	where	documents	reside	and	focus	on	protecting	the	documents	themselves.”
Gartner
© 2018 ThinAir Labs, Inc.
SCARY	QUESTION:
patient	information	that	should	
not	have	it?
What	if	I	tell	you	there	is	a	user	in	
your	environment	who	has
© 2018 ThinAir Labs, Inc.
SCARY	QUESTION:
medical	research	or	other	business	
information	that	should	not	have	
it?
What	if	I	tell	you	there	is	a	user	in	
your	environment	who	has
© 2018 ThinAir Labs, Inc.
SCARY	QUESTION:
uploaded	sensitive	data	using	
unsanctioned	cloud	services?
What	if	I	tell	you	there	is	a	user	in	
your	environment	who	has
© 2018 ThinAir Labs, Inc.
A Different Approach to Security!
VISIBILITY
SIMPLICITY
SPEED
Static policies that cover
1% of information
100% of information, all
the time
Highly specialized and
trained sec analysts
Proficiency with product
in hours
Many months, complex
deployments
72 hours to value, fully
SaaS
© 2018 ThinAir Labs, Inc.
Regulatory Compliance Examples
o Show me all users who are out of compliance with PCI right
now
o Send me a weekly report with all users who violated HIPAA
o Alert me when users download more than 10 files containing
SSNs from confidential repository or application in the last day
o Find all files that contain a specific patient ID
o Alert me when users copy more than 10 files with CCNs to a
USB
o I found users out of compliance and want to understand how to
prevent it in the future => see user investigation use cases
© 2018 ThinAir Labs, Inc.
Security Investigations Examples
o Show me all users who had a leaked document on one of
their devices prior to data loss, even if it was deleted
afterwards
o Show me all sensitive data that was uploaded by a user to a
dark or personal web site
o Show me what a user did after downloading a file containing
information about a new invention
o Show me all the company proprietary data a user accessed
and exfiltrated last week prior to resigning today
o Show me all the files that were on a laptop that was just
lost
© 2018 ThinAir Labs, Inc.
Proprietary Information Protection
o Show me all users who downloaded files with secret project names
from our highly confidential web app site in the last week
o Show me all users who copied files marked confidential to a USB
o Show me all users who uploaded files marked confidential to a
personal cloud file sharing app
o Alert me when users download more than 100 files tagged
confidential from multiple repositories in the last day
o Show me all IP that was uploaded by a user to a dark web site
▪ I found users leaking IP and want to understand how to prevent it in the
future => see user investigation use cases
o Show we all the people who had access to a highly secretive project
© 2018 ThinAir Labs, Inc.
Actionable Data Visibility in 90 Seconds
INVESTIGATE INCIDENTS AND BREACHES
IDENTIFY RISKY DATA ACTIVITY
COMPLY WITH DATA REGULATIONS
PROTECT YOUR IP AND PII
© 2018 ThinAir Labs, Inc.
Thanks!Any questions?
Brian Reed
VP of Strategy
brian@thinair.com
(404) 310-6920
Thinair.com
@thinairlabs
info@thinair.com
+1 (877) 269-3090
© 2018 ThinAir Labs, Inc.

More Related Content

What's hot

Cloud Security for Dummies Webinar — The Identity Edition
Cloud Security for Dummies Webinar — The Identity EditionCloud Security for Dummies Webinar — The Identity Edition
Cloud Security for Dummies Webinar — The Identity EditionNetskope
 
Data Breach: The Cloud Multiplier Effect
Data Breach: The Cloud Multiplier EffectData Breach: The Cloud Multiplier Effect
Data Breach: The Cloud Multiplier EffectNetskope
 
WeSecure Data Security Congres: 5 must haves to safe cloud enablement
WeSecure Data Security Congres: 5 must haves to safe cloud enablementWeSecure Data Security Congres: 5 must haves to safe cloud enablement
WeSecure Data Security Congres: 5 must haves to safe cloud enablementWeSecure
 
Netskope — Shadow IT Is A Good Thing
Netskope — Shadow IT Is A Good ThingNetskope — Shadow IT Is A Good Thing
Netskope — Shadow IT Is A Good ThingNetskope
 
Netskope Overview
Netskope OverviewNetskope Overview
Netskope OverviewNetskope
 
Data Privacy, Security, and Sovereignty in a Cloudy World
Data Privacy, Security, and Sovereignty in a Cloudy WorldData Privacy, Security, and Sovereignty in a Cloudy World
Data Privacy, Security, and Sovereignty in a Cloudy WorldNetskope
 
Privacy and Security by Design
Privacy and Security by DesignPrivacy and Security by Design
Privacy and Security by DesignUnisys Corporation
 
Forcepoint Dynamic Data Protection
Forcepoint Dynamic Data ProtectionForcepoint Dynamic Data Protection
Forcepoint Dynamic Data ProtectionMarketingArrowECS_CZ
 
Reference Architecture for Data Loss Prevention in the Cloud
Reference Architecture for Data Loss Prevention in the CloudReference Architecture for Data Loss Prevention in the Cloud
Reference Architecture for Data Loss Prevention in the CloudNetskope
 
Protecting Corporate Data When an Employee Leaves: Survey and Best Practices
Protecting Corporate Data When an Employee Leaves: Survey and Best PracticesProtecting Corporate Data When an Employee Leaves: Survey and Best Practices
Protecting Corporate Data When an Employee Leaves: Survey and Best PracticesDruva
 
#Privacy Matters - Come il regolamento privacy europeo da un problema può div...
#Privacy Matters - Come il regolamento privacy europeo da un problema può div...#Privacy Matters - Come il regolamento privacy europeo da un problema può div...
#Privacy Matters - Come il regolamento privacy europeo da un problema può div...Giulio Coraggio
 
Big Data Security Analytics (BDSA) with Randy Franklin
Big Data Security Analytics (BDSA) with Randy FranklinBig Data Security Analytics (BDSA) with Randy Franklin
Big Data Security Analytics (BDSA) with Randy FranklinSridhar Karnam
 
Cloud Access Security Brokers - What's all the Hype
Cloud Access Security Brokers - What's all the HypeCloud Access Security Brokers - What's all the Hype
Cloud Access Security Brokers - What's all the HypeJoAnna Cheshire
 
Security Analytics and Big Data: What You Need to Know
Security Analytics and Big Data: What You Need to KnowSecurity Analytics and Big Data: What You Need to Know
Security Analytics and Big Data: What You Need to KnowMapR Technologies
 
The BYOD Security Battleground
The BYOD Security BattlegroundThe BYOD Security Battleground
The BYOD Security BattlegroundWatchful Software
 
CASBs and Office 365: The Security Menace
CASBs and Office 365: The Security MenaceCASBs and Office 365: The Security Menace
CASBs and Office 365: The Security MenaceBitglass
 
Google peter logli & jake shea
Google   peter logli & jake sheaGoogle   peter logli & jake shea
Google peter logli & jake sheaColloqueRISQ
 
Internet of Things With Privacy in Mind
Internet of Things With Privacy in MindInternet of Things With Privacy in Mind
Internet of Things With Privacy in MindGosia Fraser
 
Splunk GDPR Security Roundtable: Zurich - 22 Nov 2017 PT1
Splunk GDPR Security Roundtable: Zurich - 22 Nov 2017 PT1Splunk GDPR Security Roundtable: Zurich - 22 Nov 2017 PT1
Splunk GDPR Security Roundtable: Zurich - 22 Nov 2017 PT1Splunk
 
Shadow IT: The CISO Perspective on Regaining Control
Shadow IT: The CISO Perspective on Regaining ControlShadow IT: The CISO Perspective on Regaining Control
Shadow IT: The CISO Perspective on Regaining ControlCipherCloud
 

What's hot (20)

Cloud Security for Dummies Webinar — The Identity Edition
Cloud Security for Dummies Webinar — The Identity EditionCloud Security for Dummies Webinar — The Identity Edition
Cloud Security for Dummies Webinar — The Identity Edition
 
Data Breach: The Cloud Multiplier Effect
Data Breach: The Cloud Multiplier EffectData Breach: The Cloud Multiplier Effect
Data Breach: The Cloud Multiplier Effect
 
WeSecure Data Security Congres: 5 must haves to safe cloud enablement
WeSecure Data Security Congres: 5 must haves to safe cloud enablementWeSecure Data Security Congres: 5 must haves to safe cloud enablement
WeSecure Data Security Congres: 5 must haves to safe cloud enablement
 
Netskope — Shadow IT Is A Good Thing
Netskope — Shadow IT Is A Good ThingNetskope — Shadow IT Is A Good Thing
Netskope — Shadow IT Is A Good Thing
 
Netskope Overview
Netskope OverviewNetskope Overview
Netskope Overview
 
Data Privacy, Security, and Sovereignty in a Cloudy World
Data Privacy, Security, and Sovereignty in a Cloudy WorldData Privacy, Security, and Sovereignty in a Cloudy World
Data Privacy, Security, and Sovereignty in a Cloudy World
 
Privacy and Security by Design
Privacy and Security by DesignPrivacy and Security by Design
Privacy and Security by Design
 
Forcepoint Dynamic Data Protection
Forcepoint Dynamic Data ProtectionForcepoint Dynamic Data Protection
Forcepoint Dynamic Data Protection
 
Reference Architecture for Data Loss Prevention in the Cloud
Reference Architecture for Data Loss Prevention in the CloudReference Architecture for Data Loss Prevention in the Cloud
Reference Architecture for Data Loss Prevention in the Cloud
 
Protecting Corporate Data When an Employee Leaves: Survey and Best Practices
Protecting Corporate Data When an Employee Leaves: Survey and Best PracticesProtecting Corporate Data When an Employee Leaves: Survey and Best Practices
Protecting Corporate Data When an Employee Leaves: Survey and Best Practices
 
#Privacy Matters - Come il regolamento privacy europeo da un problema può div...
#Privacy Matters - Come il regolamento privacy europeo da un problema può div...#Privacy Matters - Come il regolamento privacy europeo da un problema può div...
#Privacy Matters - Come il regolamento privacy europeo da un problema può div...
 
Big Data Security Analytics (BDSA) with Randy Franklin
Big Data Security Analytics (BDSA) with Randy FranklinBig Data Security Analytics (BDSA) with Randy Franklin
Big Data Security Analytics (BDSA) with Randy Franklin
 
Cloud Access Security Brokers - What's all the Hype
Cloud Access Security Brokers - What's all the HypeCloud Access Security Brokers - What's all the Hype
Cloud Access Security Brokers - What's all the Hype
 
Security Analytics and Big Data: What You Need to Know
Security Analytics and Big Data: What You Need to KnowSecurity Analytics and Big Data: What You Need to Know
Security Analytics and Big Data: What You Need to Know
 
The BYOD Security Battleground
The BYOD Security BattlegroundThe BYOD Security Battleground
The BYOD Security Battleground
 
CASBs and Office 365: The Security Menace
CASBs and Office 365: The Security MenaceCASBs and Office 365: The Security Menace
CASBs and Office 365: The Security Menace
 
Google peter logli & jake shea
Google   peter logli & jake sheaGoogle   peter logli & jake shea
Google peter logli & jake shea
 
Internet of Things With Privacy in Mind
Internet of Things With Privacy in MindInternet of Things With Privacy in Mind
Internet of Things With Privacy in Mind
 
Splunk GDPR Security Roundtable: Zurich - 22 Nov 2017 PT1
Splunk GDPR Security Roundtable: Zurich - 22 Nov 2017 PT1Splunk GDPR Security Roundtable: Zurich - 22 Nov 2017 PT1
Splunk GDPR Security Roundtable: Zurich - 22 Nov 2017 PT1
 
Shadow IT: The CISO Perspective on Regaining Control
Shadow IT: The CISO Perspective on Regaining ControlShadow IT: The CISO Perspective on Regaining Control
Shadow IT: The CISO Perspective on Regaining Control
 

Similar to ThinAir Endpoint Visibility Security HIMSS2018 Brian_Reed

Proteja sus datos en cualquier servicio Cloud y Web de forma unificada
Proteja sus datos en cualquier servicio Cloud y Web de forma unificadaProteja sus datos en cualquier servicio Cloud y Web de forma unificada
Proteja sus datos en cualquier servicio Cloud y Web de forma unificadaCristian Garcia G.
 
Investing in Digital Threat Intelligence Management to Protect Your Assets ou...
Investing in Digital Threat Intelligence Management to Protect Your Assets ou...Investing in Digital Threat Intelligence Management to Protect Your Assets ou...
Investing in Digital Threat Intelligence Management to Protect Your Assets ou...Enterprise Management Associates
 
User management - the next-gen of authentication meetup 27012022
User management - the next-gen of authentication meetup 27012022User management - the next-gen of authentication meetup 27012022
User management - the next-gen of authentication meetup 27012022lior mazor
 
Good Guys vs Bad Guys: Using Big Data to Counteract Advanced Threats
Good Guys vs Bad Guys: Using Big Data to Counteract Advanced ThreatsGood Guys vs Bad Guys: Using Big Data to Counteract Advanced Threats
Good Guys vs Bad Guys: Using Big Data to Counteract Advanced ThreatsZivaro Inc
 
Protecting endpoints from targeted attacks
Protecting endpoints from targeted attacksProtecting endpoints from targeted attacks
Protecting endpoints from targeted attacksAppSense
 
Using Digital Threat Intelligence Management (DTIM) to Combat Threats
Using Digital Threat Intelligence Management (DTIM) to Combat ThreatsUsing Digital Threat Intelligence Management (DTIM) to Combat Threats
Using Digital Threat Intelligence Management (DTIM) to Combat ThreatsEnterprise Management Associates
 
Challenges & Opportunities the Data Privacy Act Brings
Challenges & Opportunities the Data Privacy Act BringsChallenges & Opportunities the Data Privacy Act Brings
Challenges & Opportunities the Data Privacy Act BringsRobert 'Bob' Reyes
 
Aalto cyber-10.4.18
Aalto cyber-10.4.18Aalto cyber-10.4.18
Aalto cyber-10.4.18japijapi
 
TECHNOLOGY 101 AND THE PRACTICE OF LAW: KEEPING YOUR FIRM SAFE
TECHNOLOGY 101 AND THE PRACTICE OF LAW: KEEPING YOUR FIRM SAFETECHNOLOGY 101 AND THE PRACTICE OF LAW: KEEPING YOUR FIRM SAFE
TECHNOLOGY 101 AND THE PRACTICE OF LAW: KEEPING YOUR FIRM SAFEJames Wier
 
2019 09-26 leveraging the power of automated intelligence for privacy management
2019 09-26 leveraging the power of automated intelligence for privacy management2019 09-26 leveraging the power of automated intelligence for privacy management
2019 09-26 leveraging the power of automated intelligence for privacy managementTrustArc
 
Jervis Hui - No Tradeoffs: Cloud Security & Privacy Don't Need To Be At Odds
Jervis Hui - No Tradeoffs: Cloud Security & Privacy Don't Need To Be At OddsJervis Hui - No Tradeoffs: Cloud Security & Privacy Don't Need To Be At Odds
Jervis Hui - No Tradeoffs: Cloud Security & Privacy Don't Need To Be At Oddscentralohioissa
 
Cyber Risk Management in 2017: Challenges & Recommendations
Cyber Risk Management in 2017: Challenges & RecommendationsCyber Risk Management in 2017: Challenges & Recommendations
Cyber Risk Management in 2017: Challenges & RecommendationsUlf Mattsson
 
Data Connectors San Antonio Cybersecurity Conference 2018
Data Connectors San Antonio Cybersecurity Conference 2018Data Connectors San Antonio Cybersecurity Conference 2018
Data Connectors San Antonio Cybersecurity Conference 2018Interset
 
How to Reduce the Attack Surface Created by Your Cyber-Tools
How to Reduce the Attack Surface Created by Your Cyber-ToolsHow to Reduce the Attack Surface Created by Your Cyber-Tools
How to Reduce the Attack Surface Created by Your Cyber-ToolsEnterprise Management Associates
 
David valovcin big data - big risk
David valovcin big data - big riskDavid valovcin big data - big risk
David valovcin big data - big riskIBM Sverige
 
Protecting What Matters Most – Data
Protecting What Matters Most – DataProtecting What Matters Most – Data
Protecting What Matters Most – DataFujitsu Middle East
 
Dataguise hortonworks insurance_feb25
Dataguise hortonworks insurance_feb25Dataguise hortonworks insurance_feb25
Dataguise hortonworks insurance_feb25Hortonworks
 
Proactive Risk Management and Compliance in a World of Digital Disruption
Proactive Risk Management and Compliance in a World of Digital DisruptionProactive Risk Management and Compliance in a World of Digital Disruption
Proactive Risk Management and Compliance in a World of Digital DisruptionMike Wons
 
2. Enterprise and Business Architecture Cloud Video Data
2. Enterprise and Business Architecture Cloud Video Data2. Enterprise and Business Architecture Cloud Video Data
2. Enterprise and Business Architecture Cloud Video DataMrsAlways RigHt
 
Virtual Gov Day - Introduction & Keynote - Alan Webber, IDC Government Insights
Virtual Gov Day - Introduction & Keynote - Alan Webber, IDC Government InsightsVirtual Gov Day - Introduction & Keynote - Alan Webber, IDC Government Insights
Virtual Gov Day - Introduction & Keynote - Alan Webber, IDC Government InsightsSplunk
 

Similar to ThinAir Endpoint Visibility Security HIMSS2018 Brian_Reed (20)

Proteja sus datos en cualquier servicio Cloud y Web de forma unificada
Proteja sus datos en cualquier servicio Cloud y Web de forma unificadaProteja sus datos en cualquier servicio Cloud y Web de forma unificada
Proteja sus datos en cualquier servicio Cloud y Web de forma unificada
 
Investing in Digital Threat Intelligence Management to Protect Your Assets ou...
Investing in Digital Threat Intelligence Management to Protect Your Assets ou...Investing in Digital Threat Intelligence Management to Protect Your Assets ou...
Investing in Digital Threat Intelligence Management to Protect Your Assets ou...
 
User management - the next-gen of authentication meetup 27012022
User management - the next-gen of authentication meetup 27012022User management - the next-gen of authentication meetup 27012022
User management - the next-gen of authentication meetup 27012022
 
Good Guys vs Bad Guys: Using Big Data to Counteract Advanced Threats
Good Guys vs Bad Guys: Using Big Data to Counteract Advanced ThreatsGood Guys vs Bad Guys: Using Big Data to Counteract Advanced Threats
Good Guys vs Bad Guys: Using Big Data to Counteract Advanced Threats
 
Protecting endpoints from targeted attacks
Protecting endpoints from targeted attacksProtecting endpoints from targeted attacks
Protecting endpoints from targeted attacks
 
Using Digital Threat Intelligence Management (DTIM) to Combat Threats
Using Digital Threat Intelligence Management (DTIM) to Combat ThreatsUsing Digital Threat Intelligence Management (DTIM) to Combat Threats
Using Digital Threat Intelligence Management (DTIM) to Combat Threats
 
Challenges & Opportunities the Data Privacy Act Brings
Challenges & Opportunities the Data Privacy Act BringsChallenges & Opportunities the Data Privacy Act Brings
Challenges & Opportunities the Data Privacy Act Brings
 
Aalto cyber-10.4.18
Aalto cyber-10.4.18Aalto cyber-10.4.18
Aalto cyber-10.4.18
 
TECHNOLOGY 101 AND THE PRACTICE OF LAW: KEEPING YOUR FIRM SAFE
TECHNOLOGY 101 AND THE PRACTICE OF LAW: KEEPING YOUR FIRM SAFETECHNOLOGY 101 AND THE PRACTICE OF LAW: KEEPING YOUR FIRM SAFE
TECHNOLOGY 101 AND THE PRACTICE OF LAW: KEEPING YOUR FIRM SAFE
 
2019 09-26 leveraging the power of automated intelligence for privacy management
2019 09-26 leveraging the power of automated intelligence for privacy management2019 09-26 leveraging the power of automated intelligence for privacy management
2019 09-26 leveraging the power of automated intelligence for privacy management
 
Jervis Hui - No Tradeoffs: Cloud Security & Privacy Don't Need To Be At Odds
Jervis Hui - No Tradeoffs: Cloud Security & Privacy Don't Need To Be At OddsJervis Hui - No Tradeoffs: Cloud Security & Privacy Don't Need To Be At Odds
Jervis Hui - No Tradeoffs: Cloud Security & Privacy Don't Need To Be At Odds
 
Cyber Risk Management in 2017: Challenges & Recommendations
Cyber Risk Management in 2017: Challenges & RecommendationsCyber Risk Management in 2017: Challenges & Recommendations
Cyber Risk Management in 2017: Challenges & Recommendations
 
Data Connectors San Antonio Cybersecurity Conference 2018
Data Connectors San Antonio Cybersecurity Conference 2018Data Connectors San Antonio Cybersecurity Conference 2018
Data Connectors San Antonio Cybersecurity Conference 2018
 
How to Reduce the Attack Surface Created by Your Cyber-Tools
How to Reduce the Attack Surface Created by Your Cyber-ToolsHow to Reduce the Attack Surface Created by Your Cyber-Tools
How to Reduce the Attack Surface Created by Your Cyber-Tools
 
David valovcin big data - big risk
David valovcin big data - big riskDavid valovcin big data - big risk
David valovcin big data - big risk
 
Protecting What Matters Most – Data
Protecting What Matters Most – DataProtecting What Matters Most – Data
Protecting What Matters Most – Data
 
Dataguise hortonworks insurance_feb25
Dataguise hortonworks insurance_feb25Dataguise hortonworks insurance_feb25
Dataguise hortonworks insurance_feb25
 
Proactive Risk Management and Compliance in a World of Digital Disruption
Proactive Risk Management and Compliance in a World of Digital DisruptionProactive Risk Management and Compliance in a World of Digital Disruption
Proactive Risk Management and Compliance in a World of Digital Disruption
 
2. Enterprise and Business Architecture Cloud Video Data
2. Enterprise and Business Architecture Cloud Video Data2. Enterprise and Business Architecture Cloud Video Data
2. Enterprise and Business Architecture Cloud Video Data
 
Virtual Gov Day - Introduction & Keynote - Alan Webber, IDC Government Insights
Virtual Gov Day - Introduction & Keynote - Alan Webber, IDC Government InsightsVirtual Gov Day - Introduction & Keynote - Alan Webber, IDC Government Insights
Virtual Gov Day - Introduction & Keynote - Alan Webber, IDC Government Insights
 

Recently uploaded

College Call Girls Mumbai Alia 9910780858 Independent Escort Service Mumbai
College Call Girls Mumbai Alia 9910780858 Independent Escort Service MumbaiCollege Call Girls Mumbai Alia 9910780858 Independent Escort Service Mumbai
College Call Girls Mumbai Alia 9910780858 Independent Escort Service Mumbaisonalikaur4
 
Russian Call Girls Hyderabad Saloni 9907093804 Independent Escort Service Hyd...
Russian Call Girls Hyderabad Saloni 9907093804 Independent Escort Service Hyd...Russian Call Girls Hyderabad Saloni 9907093804 Independent Escort Service Hyd...
Russian Call Girls Hyderabad Saloni 9907093804 Independent Escort Service Hyd...delhimodelshub1
 
Russian Call Girls Mohan Nagar | 9711199171 | High Profile -New Model -Availa...
Russian Call Girls Mohan Nagar | 9711199171 | High Profile -New Model -Availa...Russian Call Girls Mohan Nagar | 9711199171 | High Profile -New Model -Availa...
Russian Call Girls Mohan Nagar | 9711199171 | High Profile -New Model -Availa...sandeepkumar69420
 
Call Girls Laxmi Nagar 9999965857 Cheap and Best with original Photos
Call Girls Laxmi Nagar 9999965857 Cheap and Best with original PhotosCall Girls Laxmi Nagar 9999965857 Cheap and Best with original Photos
Call Girls Laxmi Nagar 9999965857 Cheap and Best with original Photosparshadkalavatidevi7
 
FAMILY in sociology for physiotherapists.pptx
FAMILY in sociology for physiotherapists.pptxFAMILY in sociology for physiotherapists.pptx
FAMILY in sociology for physiotherapists.pptxMumux Mirani
 
SARS (SEVERE ACUTE RESPIRATORY SYNDROME).pdf
SARS (SEVERE ACUTE RESPIRATORY SYNDROME).pdfSARS (SEVERE ACUTE RESPIRATORY SYNDROME).pdf
SARS (SEVERE ACUTE RESPIRATORY SYNDROME).pdfDolisha Warbi
 
Russian Escorts Delhi | 9711199171 | all area service available
Russian Escorts Delhi | 9711199171 | all area service availableRussian Escorts Delhi | 9711199171 | all area service available
Russian Escorts Delhi | 9711199171 | all area service availablesandeepkumar69420
 
Air-Hostess Call Girls Shanti Nagar - Call 7001305949 Rs-3500 with A/C Room C...
Air-Hostess Call Girls Shanti Nagar - Call 7001305949 Rs-3500 with A/C Room C...Air-Hostess Call Girls Shanti Nagar - Call 7001305949 Rs-3500 with A/C Room C...
Air-Hostess Call Girls Shanti Nagar - Call 7001305949 Rs-3500 with A/C Room C...narwatsonia7
 
Call Girls Ghaziabad 9999965857 Cheap and Best with original Photos
Call Girls Ghaziabad 9999965857 Cheap and Best with original PhotosCall Girls Ghaziabad 9999965857 Cheap and Best with original Photos
Call Girls Ghaziabad 9999965857 Cheap and Best with original Photosparshadkalavatidevi7
 
Disaster Management Cycle (DMC)| Ms. Pooja Sharma , Department of Hospital A...
Disaster Management Cycle (DMC)| Ms. Pooja Sharma , Department of  Hospital A...Disaster Management Cycle (DMC)| Ms. Pooja Sharma , Department of  Hospital A...
Disaster Management Cycle (DMC)| Ms. Pooja Sharma , Department of Hospital A...Era University , Lucknow
 
independent Call Girls Sarjapur Road - 7001305949 with real photos and phone ...
independent Call Girls Sarjapur Road - 7001305949 with real photos and phone ...independent Call Girls Sarjapur Road - 7001305949 with real photos and phone ...
independent Call Girls Sarjapur Road - 7001305949 with real photos and phone ...narwatsonia7
 
Call Girls Nandini Layout - 7001305949 Escorts Service with Real Photos and M...
Call Girls Nandini Layout - 7001305949 Escorts Service with Real Photos and M...Call Girls Nandini Layout - 7001305949 Escorts Service with Real Photos and M...
Call Girls Nandini Layout - 7001305949 Escorts Service with Real Photos and M...narwatsonia7
 
Call Girls Hyderabad Krisha 9907093804 Independent Escort Service Hyderabad
Call Girls Hyderabad Krisha 9907093804 Independent Escort Service HyderabadCall Girls Hyderabad Krisha 9907093804 Independent Escort Service Hyderabad
Call Girls Hyderabad Krisha 9907093804 Independent Escort Service Hyderabaddelhimodelshub1
 
Gurgaon iffco chowk 🔝 Call Girls Service 🔝 ( 8264348440 ) unlimited hard sex ...
Gurgaon iffco chowk 🔝 Call Girls Service 🔝 ( 8264348440 ) unlimited hard sex ...Gurgaon iffco chowk 🔝 Call Girls Service 🔝 ( 8264348440 ) unlimited hard sex ...
Gurgaon iffco chowk 🔝 Call Girls Service 🔝 ( 8264348440 ) unlimited hard sex ...callgirlsinsaket2024
 
MVP Health Care City of Schenectady Presentation
MVP Health Care City of Schenectady PresentationMVP Health Care City of Schenectady Presentation
MVP Health Care City of Schenectady PresentationMVP Health Care
 
Single Assessment Framework - What We Know So Far
Single Assessment Framework - What We Know So FarSingle Assessment Framework - What We Know So Far
Single Assessment Framework - What We Know So FarCareLineLive
 
9711199012 Najafgarh Call Girls ₹5.5k With COD Free Home Delivery
9711199012 Najafgarh Call Girls ₹5.5k With COD Free Home Delivery9711199012 Najafgarh Call Girls ₹5.5k With COD Free Home Delivery
9711199012 Najafgarh Call Girls ₹5.5k With COD Free Home Deliverymarshasaifi
 
Low Rate Call Girls In Bommanahalli Just Call 7001305949
Low Rate Call Girls In Bommanahalli Just Call 7001305949Low Rate Call Girls In Bommanahalli Just Call 7001305949
Low Rate Call Girls In Bommanahalli Just Call 7001305949ps5894268
 
Models Call Girls Electronic City | 7001305949 At Low Cost Cash Payment Booking
Models Call Girls Electronic City | 7001305949 At Low Cost Cash Payment BookingModels Call Girls Electronic City | 7001305949 At Low Cost Cash Payment Booking
Models Call Girls Electronic City | 7001305949 At Low Cost Cash Payment Bookingnarwatsonia7
 

Recently uploaded (20)

College Call Girls Mumbai Alia 9910780858 Independent Escort Service Mumbai
College Call Girls Mumbai Alia 9910780858 Independent Escort Service MumbaiCollege Call Girls Mumbai Alia 9910780858 Independent Escort Service Mumbai
College Call Girls Mumbai Alia 9910780858 Independent Escort Service Mumbai
 
Russian Call Girls Hyderabad Saloni 9907093804 Independent Escort Service Hyd...
Russian Call Girls Hyderabad Saloni 9907093804 Independent Escort Service Hyd...Russian Call Girls Hyderabad Saloni 9907093804 Independent Escort Service Hyd...
Russian Call Girls Hyderabad Saloni 9907093804 Independent Escort Service Hyd...
 
Russian Call Girls Mohan Nagar | 9711199171 | High Profile -New Model -Availa...
Russian Call Girls Mohan Nagar | 9711199171 | High Profile -New Model -Availa...Russian Call Girls Mohan Nagar | 9711199171 | High Profile -New Model -Availa...
Russian Call Girls Mohan Nagar | 9711199171 | High Profile -New Model -Availa...
 
Call Girls Laxmi Nagar 9999965857 Cheap and Best with original Photos
Call Girls Laxmi Nagar 9999965857 Cheap and Best with original PhotosCall Girls Laxmi Nagar 9999965857 Cheap and Best with original Photos
Call Girls Laxmi Nagar 9999965857 Cheap and Best with original Photos
 
FAMILY in sociology for physiotherapists.pptx
FAMILY in sociology for physiotherapists.pptxFAMILY in sociology for physiotherapists.pptx
FAMILY in sociology for physiotherapists.pptx
 
SARS (SEVERE ACUTE RESPIRATORY SYNDROME).pdf
SARS (SEVERE ACUTE RESPIRATORY SYNDROME).pdfSARS (SEVERE ACUTE RESPIRATORY SYNDROME).pdf
SARS (SEVERE ACUTE RESPIRATORY SYNDROME).pdf
 
Russian Escorts Delhi | 9711199171 | all area service available
Russian Escorts Delhi | 9711199171 | all area service availableRussian Escorts Delhi | 9711199171 | all area service available
Russian Escorts Delhi | 9711199171 | all area service available
 
Air-Hostess Call Girls Shanti Nagar - Call 7001305949 Rs-3500 with A/C Room C...
Air-Hostess Call Girls Shanti Nagar - Call 7001305949 Rs-3500 with A/C Room C...Air-Hostess Call Girls Shanti Nagar - Call 7001305949 Rs-3500 with A/C Room C...
Air-Hostess Call Girls Shanti Nagar - Call 7001305949 Rs-3500 with A/C Room C...
 
Russian Call Girls South Delhi 9711199171 discount on your booking
Russian Call Girls South Delhi 9711199171 discount on your bookingRussian Call Girls South Delhi 9711199171 discount on your booking
Russian Call Girls South Delhi 9711199171 discount on your booking
 
Call Girls Ghaziabad 9999965857 Cheap and Best with original Photos
Call Girls Ghaziabad 9999965857 Cheap and Best with original PhotosCall Girls Ghaziabad 9999965857 Cheap and Best with original Photos
Call Girls Ghaziabad 9999965857 Cheap and Best with original Photos
 
Disaster Management Cycle (DMC)| Ms. Pooja Sharma , Department of Hospital A...
Disaster Management Cycle (DMC)| Ms. Pooja Sharma , Department of  Hospital A...Disaster Management Cycle (DMC)| Ms. Pooja Sharma , Department of  Hospital A...
Disaster Management Cycle (DMC)| Ms. Pooja Sharma , Department of Hospital A...
 
independent Call Girls Sarjapur Road - 7001305949 with real photos and phone ...
independent Call Girls Sarjapur Road - 7001305949 with real photos and phone ...independent Call Girls Sarjapur Road - 7001305949 with real photos and phone ...
independent Call Girls Sarjapur Road - 7001305949 with real photos and phone ...
 
Call Girls Nandini Layout - 7001305949 Escorts Service with Real Photos and M...
Call Girls Nandini Layout - 7001305949 Escorts Service with Real Photos and M...Call Girls Nandini Layout - 7001305949 Escorts Service with Real Photos and M...
Call Girls Nandini Layout - 7001305949 Escorts Service with Real Photos and M...
 
Call Girls Hyderabad Krisha 9907093804 Independent Escort Service Hyderabad
Call Girls Hyderabad Krisha 9907093804 Independent Escort Service HyderabadCall Girls Hyderabad Krisha 9907093804 Independent Escort Service Hyderabad
Call Girls Hyderabad Krisha 9907093804 Independent Escort Service Hyderabad
 
Gurgaon iffco chowk 🔝 Call Girls Service 🔝 ( 8264348440 ) unlimited hard sex ...
Gurgaon iffco chowk 🔝 Call Girls Service 🔝 ( 8264348440 ) unlimited hard sex ...Gurgaon iffco chowk 🔝 Call Girls Service 🔝 ( 8264348440 ) unlimited hard sex ...
Gurgaon iffco chowk 🔝 Call Girls Service 🔝 ( 8264348440 ) unlimited hard sex ...
 
MVP Health Care City of Schenectady Presentation
MVP Health Care City of Schenectady PresentationMVP Health Care City of Schenectady Presentation
MVP Health Care City of Schenectady Presentation
 
Single Assessment Framework - What We Know So Far
Single Assessment Framework - What We Know So FarSingle Assessment Framework - What We Know So Far
Single Assessment Framework - What We Know So Far
 
9711199012 Najafgarh Call Girls ₹5.5k With COD Free Home Delivery
9711199012 Najafgarh Call Girls ₹5.5k With COD Free Home Delivery9711199012 Najafgarh Call Girls ₹5.5k With COD Free Home Delivery
9711199012 Najafgarh Call Girls ₹5.5k With COD Free Home Delivery
 
Low Rate Call Girls In Bommanahalli Just Call 7001305949
Low Rate Call Girls In Bommanahalli Just Call 7001305949Low Rate Call Girls In Bommanahalli Just Call 7001305949
Low Rate Call Girls In Bommanahalli Just Call 7001305949
 
Models Call Girls Electronic City | 7001305949 At Low Cost Cash Payment Booking
Models Call Girls Electronic City | 7001305949 At Low Cost Cash Payment BookingModels Call Girls Electronic City | 7001305949 At Low Cost Cash Payment Booking
Models Call Girls Electronic City | 7001305949 At Low Cost Cash Payment Booking
 

ThinAir Endpoint Visibility Security HIMSS2018 Brian_Reed

  • 1. Audit is Next Week – Will your Endpoints fail You? Brian Reed VP Strategy March 8, 2018 © 2018 ThinAir Labs, Inc.
  • 2. #1 Asset of Digital Enterprise INFORMATION Security | Compliance | IT Ops © 2018 ThinAir Labs, Inc.
  • 3. © 2018 ThinAir Labs, Inc.
  • 4. Why do breaches occur? Lack of visibility. © 2018 ThinAir Labs, Inc.
  • 5. How information is created, consumed, and communicated What is the financial impact of the data at risk © 2018 ThinAir Labs, Inc.
  • 6. DATA Device Application Network User Data is What Matters in Security o Current solutions focus on tangential indicators of compromise o Data is the primary digital asset at risk o User-Data interaction at data- element level is key o Endpoint-based monitoring for enterprise-wide data interaction visibility © 2018 ThinAir Labs, Inc.
  • 7. Delivers complete intelligence about every information in your organization. With Simplicity and Speed. CONVERSATIONAL UI BUSINESS IMPACT ENDPOINT VISIBILITY CONTINUOUS VISIBILITY INFORMATION ATTRIBUTION Endpoint Data Visibility © 2018 ThinAir Labs, Inc.
  • 8. Endpoint Visibility o Endpoint is the point of interaction between people and data o Endpoint is where a lot of IP is created o Endpoint is often the blind spot o Unstructured vs. structured data © 2018 ThinAir Labs, Inc.
  • 9. Continuous Visibility – Real-time & Historical 191 days: Average time to identify breach 66 days: Average time to contain breach » Track all interactions with information continuously » Maintain historical audit log (6, 12, 24 months or longer) • Even if evidence has been tampered with or deleted © 2018 ThinAir Labs, Inc.
  • 10. Real Time Information Attribution o Detect suspicious activity along the threat kill chain o Proactive prediction of exfiltration © 2018 ThinAir Labs, Inc.
  • 11. Conversational UI Get Instant Answers to Any Information or Security Question © 2018 ThinAir Labs, Inc.
  • 12. Understand Business Impact » Provide business impact assessment • Scope of the breach in $$$ • Based on value of the data • Cost of the breach (detection, remediation, notification, etc.) • Regulatory impact • Brand reputation, business loss © 2018 ThinAir Labs, Inc.
  • 13. ThinAir Next-Generation Endpoint Data Visibility Platform delivers complete intelligence about every information in your organization. With Simplicity and Speed. © 2018 ThinAir Labs, Inc.
  • 14. Where to Start? • Start with visibility on the endpoint • Focus on information at the data-element level • Continuously track interactions with your information • Keep sufficiently long audit history • It should not require a PhD to investigate “Ultimately, IT will have to stop worrying about how to control which applications people are using or where documents reside and focus on protecting the documents themselves.” Gartner © 2018 ThinAir Labs, Inc.
  • 16.
  • 17.
  • 18.
  • 19.
  • 20.
  • 21.
  • 22.
  • 24.
  • 25.
  • 26.
  • 27.
  • 29.
  • 30.
  • 31.
  • 32.
  • 33.
  • 34. A Different Approach to Security! VISIBILITY SIMPLICITY SPEED Static policies that cover 1% of information 100% of information, all the time Highly specialized and trained sec analysts Proficiency with product in hours Many months, complex deployments 72 hours to value, fully SaaS © 2018 ThinAir Labs, Inc.
  • 35. Regulatory Compliance Examples o Show me all users who are out of compliance with PCI right now o Send me a weekly report with all users who violated HIPAA o Alert me when users download more than 10 files containing SSNs from confidential repository or application in the last day o Find all files that contain a specific patient ID o Alert me when users copy more than 10 files with CCNs to a USB o I found users out of compliance and want to understand how to prevent it in the future => see user investigation use cases © 2018 ThinAir Labs, Inc.
  • 36. Security Investigations Examples o Show me all users who had a leaked document on one of their devices prior to data loss, even if it was deleted afterwards o Show me all sensitive data that was uploaded by a user to a dark or personal web site o Show me what a user did after downloading a file containing information about a new invention o Show me all the company proprietary data a user accessed and exfiltrated last week prior to resigning today o Show me all the files that were on a laptop that was just lost © 2018 ThinAir Labs, Inc.
  • 37. Proprietary Information Protection o Show me all users who downloaded files with secret project names from our highly confidential web app site in the last week o Show me all users who copied files marked confidential to a USB o Show me all users who uploaded files marked confidential to a personal cloud file sharing app o Alert me when users download more than 100 files tagged confidential from multiple repositories in the last day o Show me all IP that was uploaded by a user to a dark web site ▪ I found users leaking IP and want to understand how to prevent it in the future => see user investigation use cases o Show we all the people who had access to a highly secretive project © 2018 ThinAir Labs, Inc.
  • 38. Actionable Data Visibility in 90 Seconds INVESTIGATE INCIDENTS AND BREACHES IDENTIFY RISKY DATA ACTIVITY COMPLY WITH DATA REGULATIONS PROTECT YOUR IP AND PII © 2018 ThinAir Labs, Inc.
  • 39. Thanks!Any questions? Brian Reed VP of Strategy brian@thinair.com (404) 310-6920 Thinair.com @thinairlabs info@thinair.com +1 (877) 269-3090 © 2018 ThinAir Labs, Inc.