SlideShare une entreprise Scribd logo
1  sur  55
VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL
VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL2
What do over 2000 IT staff & end users
have to say about internal security risks
in their workplaces?
VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL3
VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL4
According to a recent
survey conducted by
The Ponemon Institute…
VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL5
71% of end users say
that they have access
to company data they
should not see.
VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL6
That’s bad.
VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL7
54% of those end
users characterize that
access as frequent or
very frequent.
VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL8
That’s worse.
How much data are we talking about here?
VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL9
38% of end users
report that they and
their co-workers can
see "a lot of data".
VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL10
Why is that?
VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL11
4 in 5 IT practitioners
say their organizations
don't enforce a
strict least-privilege
(or need-to-know)
data model.
VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL12
That’s bad, too.
VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL13
But they’re watching
what employees are
doing though, right?
VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL14
Only 22% of employees
say their organization
can tell them what
happened to lost data,
files, or emails.
VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL15
So about 78% of
organizations don’t
seem to be watching
very closely.
VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL16
In a nutshell, employees have access to a lot of
data they don’t need, and no one is watching
what they’re doing – do I have that right?
VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL17
Yup
VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL18
The failure of
companies to create and
enforce a least-privilege
model – especially for
confidential or sensitive
data like credit card
numbers or health
records – will most
certainly lead to more
breaches and loss of
critical data.
VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL19
So poor controls will lead to more breaches.
No surprise there. Is that all?
VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL20
Not quite. In the
Ponemon study,
most end users and
IT practitioners believe
their organization would
overlook security risks
before they would
sacrifice productivity.
VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL21
So employees must be
really productive, right?
(If security is so lax…)
VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL22
Wrong.
VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL23
73% of end users
believe the growth of
emails, presentations,
multimedia files and
other types of company
data has significantly
affected their ability to
find and access data.
VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL24
That’s weird –
does IT know that employees can’t find data?
VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL25
60% of IT practitioners
say it is very difficult or
difficult for employees to
search and find company
data or files they or their
co-workers have created
that isn't stored on their
own computers.
VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL26
That’s certainly counter-productive –
what about getting access to data?
VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL27
43% of end users say
it takes weeks, months,
or longer to be granted
access to data they
request access to in
order to do their jobs.
VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL28
Only 22% report
that access is typically
granted within minutes
or hours.
VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL29
That’s pretty bad,
too.
VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL30
What about being able to
share data easily?
VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL31
68% of end users
say it is difficult or
very difficult to share
appropriate data or files
with business partners
such as customers
or vendors.
VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL32
How would they prefer to share data?
VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL33
43% of employees prefer
to use public cloud file
sync and share services
to share data, which
means it’s more popular
than any platform other
than email.
VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL34
76% of end users
believe there are times
when it is acceptable
to transfer work
documents to their
personal devices…
VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL35
…while only 13% of
IT practitioners agree.
VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL36
So end users are sort of doing their own thing…
VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL37
Yup
VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL38
So how important is this data we’re talking about that:
we aren’t
protecting well
and can’t really find
anymore or share easily
and storing in the
public cloud when
we feel like it
(even though
IT doesn’t think
we should?)
VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL39
76% of end users
say their job requires
them to access and use
proprietary information
such as customer data,
employee records,
financial reports,
and confidential
business documents.
VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL40
So pretty much the
most important
data imaginable.
VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL41
44% of end users
believe their organization
experienced the loss
or theft of company data
over the past two years.
VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL42
67% of IT staff say their
organization experienced
the loss or theft of
company data over
the past two years.
VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL43
74% believe that
insider mistakes,
negligence, or malice
are frequently or very
frequently the cause of
leakage of company data.
VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL44
Shocker
VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL45
So everyone is frantically fixing everything, right?
VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL46
Only 22% of
employees believe
their organizations
as a whole place a
very high priority
on the protection
of company data.
VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL47
Only 47% of
IT practitioners believe
employees in their
organizations are taking
appropriate steps to
protect company data
they have access to.
VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL48
Not so much
VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL49
Ponemon Conclusion
An organization that reduces the amount of
data employees have access to (by implementing
a least-privilege access model, improving data
disposition policies or ideally both) and streamlines
their processes for granting access will likely benefit
from more productive employees.
From: Corporate Data: A Protected Asset or a Ticking Time Bomb?
VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL50
Could you reduce risk and increase productivity?
FIND OUT.
http://info.varonis.com/assessment
VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL51
Free Guide:
6 Tactics for Preventing
Insider Threats
Download here:
http://info.varonis.com/
insider-threats-guide
VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL52
Methodology
The survey report,
"Corporate Data: A Protected Asset or a Ticking Time Bomb?"
is derived from interviews conducted by the Ponemon Institute
in October 2014 with 2,276 employees in the United States,
United Kingdom, France, and Germany.
Respondents included 1,166 IT practitioners and 1,110 end users
in organizations ranging in size from dozens to tens of thousands
of employees, in a variety of industries including financial services,
public sector, health & pharmaceutical, retail, industrial, and
technology and software.
VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL53
About Ponemon
Ponemon Institute
Advancing Responsible Information Management
Ponemon Institute is dedicated to independent research and education that advances responsible
information and privacy management practices within business and government. Our mission is to
conduct high quality, empirical studies on critical issues affecting the management and security of
sensitive information about people and organizations.
As a member of the Council of American Survey Research Organizations (CASRO),
we uphold strict data confidentiality, privacy and ethical research standards. We do not collect
any personally identifiable information from individuals (or company identifiable information in
our business research). Furthermore, we have strict quality standards to ensure that subjects
are not asked extraneous, irrelevant or improper questions.
VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL54
About Varonis
Varonis is the leading provider of software solutions for unstructured, human-generated enterprise data.
Varonis provides an innovative software platform that allows enterprises to map, analyze, manage and
migrate their unstructured data. Varonis specializes in human-generated data, a type of unstructured data
that includes an enterprise's spreadsheets, word processing documents, presentations, audio files, video
files, emails, text messages and any other data created by employees. This data often contains an
enterprise's financial information, product plans, strategic initiatives, intellectual property and numerous
other forms of vital information. IT and business personnel deploy Varonis software for a variety of use
cases, including data governance, data security, archiving, file synchronization, enhanced mobile data
accessibility and information collaboration. As of September 30, 2014, Varonis had approximately 3,000
customers, spanning leading firms in the financial services, public, healthcare, industrial, energy & utilities,
technology, consumer and retail, education and media & entertainment sectors.
Join the Varonis conversation on Facebook, LinkedIn, Twitter, and YouTube
and subscribe to our Metadata Era blog.
VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL
Thank You
Name
Email Address
Phone Number

Contenu connexe

Tendances

ZSAH Security - Web
ZSAH Security - WebZSAH Security - Web
ZSAH Security - WebFahd Khan
 
WebShield eP3 Network Overview (02-04-2017)
WebShield eP3 Network Overview (02-04-2017)WebShield eP3 Network Overview (02-04-2017)
WebShield eP3 Network Overview (02-04-2017)rich_webshield
 
Безопасность данных мобильных приложений. Мифы и реальность.
Безопасность данных мобильных приложений. Мифы и реальность.Безопасность данных мобильных приложений. Мифы и реальность.
Безопасность данных мобильных приложений. Мифы и реальность.Advanced monitoring
 
Security&reliability
Security&reliabilitySecurity&reliability
Security&reliabilitycaca1009
 
Protecting Intellectual Property and Data Loss Prevention (DLP)
Protecting Intellectual Property and Data Loss Prevention (DLP)Protecting Intellectual Property and Data Loss Prevention (DLP)
Protecting Intellectual Property and Data Loss Prevention (DLP)Arpin Consulting
 
Secure Multimedia Content Protection and Sharing
Secure Multimedia Content Protection and SharingSecure Multimedia Content Protection and Sharing
Secure Multimedia Content Protection and SharingIRJET Journal
 
TRUSTe Online Security Guidelines v2.0
TRUSTe Online Security Guidelines v2.0TRUSTe Online Security Guidelines v2.0
TRUSTe Online Security Guidelines v2.0TRUSTe
 
Palerra_CASB_UBA_WhitePaper
Palerra_CASB_UBA_WhitePaperPalerra_CASB_UBA_WhitePaper
Palerra_CASB_UBA_WhitePaperEric Opp
 
Where Data Security and Value of Data Meet in the Cloud
Where Data Security and Value of Data Meet in the CloudWhere Data Security and Value of Data Meet in the Cloud
Where Data Security and Value of Data Meet in the CloudUlf Mattsson
 
Cyber Security: User Access Pitfalls, A Case Study Approach
Cyber Security: User Access Pitfalls, A Case Study Approach Cyber Security: User Access Pitfalls, A Case Study Approach
Cyber Security: User Access Pitfalls, A Case Study Approach Aviva Spectrum™
 
ISACA NA CACS 2012 Orlando session 414 Ulf Mattsson
ISACA NA CACS 2012 Orlando session 414 Ulf MattssonISACA NA CACS 2012 Orlando session 414 Ulf Mattsson
ISACA NA CACS 2012 Orlando session 414 Ulf MattssonUlf Mattsson
 
Risk Management Practices for PCI DSS 2.0
Risk Management Practices for PCI DSS 2.0Risk Management Practices for PCI DSS 2.0
Risk Management Practices for PCI DSS 2.0Ulf Mattsson
 
Lessons Learned From the Yahoo! Hack
Lessons Learned From the Yahoo! HackLessons Learned From the Yahoo! Hack
Lessons Learned From the Yahoo! HackImperva
 
beyond_the_firewall_0103
beyond_the_firewall_0103beyond_the_firewall_0103
beyond_the_firewall_0103Jack McCullough
 
Data Loss Prevention: Challenges, Impacts & Effective Strategies
Data Loss Prevention: Challenges, Impacts & Effective StrategiesData Loss Prevention: Challenges, Impacts & Effective Strategies
Data Loss Prevention: Challenges, Impacts & Effective StrategiesSeccuris Inc.
 
Data Security and Regulatory Compliance
Data Security and Regulatory ComplianceData Security and Regulatory Compliance
Data Security and Regulatory ComplianceLifeline Data Centers
 
Cyber liability and cyber security
Cyber liability and cyber securityCyber liability and cyber security
Cyber liability and cyber securityHelen Carpenter
 
ISACA Houston Texas Chapter 2010
ISACA Houston Texas Chapter 2010ISACA Houston Texas Chapter 2010
ISACA Houston Texas Chapter 2010Ulf Mattsson
 

Tendances (20)

ZSAH Security - Web
ZSAH Security - WebZSAH Security - Web
ZSAH Security - Web
 
WebShield eP3 Network Overview (02-04-2017)
WebShield eP3 Network Overview (02-04-2017)WebShield eP3 Network Overview (02-04-2017)
WebShield eP3 Network Overview (02-04-2017)
 
Безопасность данных мобильных приложений. Мифы и реальность.
Безопасность данных мобильных приложений. Мифы и реальность.Безопасность данных мобильных приложений. Мифы и реальность.
Безопасность данных мобильных приложений. Мифы и реальность.
 
Security&reliability
Security&reliabilitySecurity&reliability
Security&reliability
 
Protecting Intellectual Property and Data Loss Prevention (DLP)
Protecting Intellectual Property and Data Loss Prevention (DLP)Protecting Intellectual Property and Data Loss Prevention (DLP)
Protecting Intellectual Property and Data Loss Prevention (DLP)
 
Secure Multimedia Content Protection and Sharing
Secure Multimedia Content Protection and SharingSecure Multimedia Content Protection and Sharing
Secure Multimedia Content Protection and Sharing
 
TRUSTe Online Security Guidelines v2.0
TRUSTe Online Security Guidelines v2.0TRUSTe Online Security Guidelines v2.0
TRUSTe Online Security Guidelines v2.0
 
Palerra_CASB_UBA_WhitePaper
Palerra_CASB_UBA_WhitePaperPalerra_CASB_UBA_WhitePaper
Palerra_CASB_UBA_WhitePaper
 
Where Data Security and Value of Data Meet in the Cloud
Where Data Security and Value of Data Meet in the CloudWhere Data Security and Value of Data Meet in the Cloud
Where Data Security and Value of Data Meet in the Cloud
 
Cyber Security: User Access Pitfalls, A Case Study Approach
Cyber Security: User Access Pitfalls, A Case Study Approach Cyber Security: User Access Pitfalls, A Case Study Approach
Cyber Security: User Access Pitfalls, A Case Study Approach
 
ISACA NA CACS 2012 Orlando session 414 Ulf Mattsson
ISACA NA CACS 2012 Orlando session 414 Ulf MattssonISACA NA CACS 2012 Orlando session 414 Ulf Mattsson
ISACA NA CACS 2012 Orlando session 414 Ulf Mattsson
 
Risk Management Practices for PCI DSS 2.0
Risk Management Practices for PCI DSS 2.0Risk Management Practices for PCI DSS 2.0
Risk Management Practices for PCI DSS 2.0
 
Lessons Learned From the Yahoo! Hack
Lessons Learned From the Yahoo! HackLessons Learned From the Yahoo! Hack
Lessons Learned From the Yahoo! Hack
 
beyond_the_firewall_0103
beyond_the_firewall_0103beyond_the_firewall_0103
beyond_the_firewall_0103
 
Data Loss Prevention: Challenges, Impacts & Effective Strategies
Data Loss Prevention: Challenges, Impacts & Effective StrategiesData Loss Prevention: Challenges, Impacts & Effective Strategies
Data Loss Prevention: Challenges, Impacts & Effective Strategies
 
Data Security and Regulatory Compliance
Data Security and Regulatory ComplianceData Security and Regulatory Compliance
Data Security and Regulatory Compliance
 
Cyber liability and cyber security
Cyber liability and cyber securityCyber liability and cyber security
Cyber liability and cyber security
 
Cyber Liabilty: A new exposure for businesses
Cyber Liabilty: A new exposure for businesses Cyber Liabilty: A new exposure for businesses
Cyber Liabilty: A new exposure for businesses
 
Cyber liabilty
Cyber liabiltyCyber liabilty
Cyber liabilty
 
ISACA Houston Texas Chapter 2010
ISACA Houston Texas Chapter 2010ISACA Houston Texas Chapter 2010
ISACA Houston Texas Chapter 2010
 

Similaire à Corporate Data: A Protected Asset or a Ticking Time Bomb?

aOS Monaco 2019 - S3 - Présentation Varonis - Cloud Data Protection - Benjami...
aOS Monaco 2019 - S3 - Présentation Varonis - Cloud Data Protection - Benjami...aOS Monaco 2019 - S3 - Présentation Varonis - Cloud Data Protection - Benjami...
aOS Monaco 2019 - S3 - Présentation Varonis - Cloud Data Protection - Benjami...aOS Community
 
DataGravity Security Pop Quiz
DataGravity Security Pop QuizDataGravity Security Pop Quiz
DataGravity Security Pop QuizDataGravity
 
Equilibrium Security Methodology 030414 Final v2
Equilibrium Security Methodology 030414 Final v2Equilibrium Security Methodology 030414 Final v2
Equilibrium Security Methodology 030414 Final v2marchharvey
 
How Well is Your Organization Protecting its Real Crown Jewels - Identities?
How Well is Your Organization Protecting its Real Crown Jewels - Identities?How Well is Your Organization Protecting its Real Crown Jewels - Identities?
How Well is Your Organization Protecting its Real Crown Jewels - Identities?Hitachi ID Systems, Inc.
 
Ais Romney 2006 Slides 08 Is Control2
Ais Romney 2006 Slides 08 Is Control2Ais Romney 2006 Slides 08 Is Control2
Ais Romney 2006 Slides 08 Is Control2sharing notes123
 
10.1.1.436.3364.pdf
10.1.1.436.3364.pdf10.1.1.436.3364.pdf
10.1.1.436.3364.pdfmistryritesh
 
I Series User Management
I Series User ManagementI Series User Management
I Series User ManagementSJeffrey23
 
Guide Preview: Ensuring your enterprise image-viewer if fully secure
Guide Preview: Ensuring your enterprise image-viewer if fully secureGuide Preview: Ensuring your enterprise image-viewer if fully secure
Guide Preview: Ensuring your enterprise image-viewer if fully secureCalgary Scientific Inc.
 
Microsoft DATA Protection To Put secure.
Microsoft DATA Protection To Put secure.Microsoft DATA Protection To Put secure.
Microsoft DATA Protection To Put secure.jayceewong1
 
How to Secure Data Privacy in 2024.pdf
How to Secure Data Privacy in 2024.pdfHow to Secure Data Privacy in 2024.pdf
How to Secure Data Privacy in 2024.pdfV2Infotech1
 
How to Secure Data Privacy in 2024.pptx
How to Secure Data Privacy in 2024.pptxHow to Secure Data Privacy in 2024.pptx
How to Secure Data Privacy in 2024.pptxV2Infotech1
 
SPYRUS® Enterprise Management System
SPYRUS®  Enterprise  Management  System SPYRUS®  Enterprise  Management  System
SPYRUS® Enterprise Management System SPYRUS
 
BAI Security - Brochure - IT Security Assessment (Financial)
BAI Security - Brochure - IT Security Assessment (Financial)BAI Security - Brochure - IT Security Assessment (Financial)
BAI Security - Brochure - IT Security Assessment (Financial)Prahlad Reddy
 
Service now is a software platform that supports IT service manag.docx
Service now is a software platform that supports IT service manag.docxService now is a software platform that supports IT service manag.docx
Service now is a software platform that supports IT service manag.docxklinda1
 
Softchoice - Microsoft Office 365 - Discussing legal concerns and informatio...
Softchoice  - Microsoft Office 365 - Discussing legal concerns and informatio...Softchoice  - Microsoft Office 365 - Discussing legal concerns and informatio...
Softchoice - Microsoft Office 365 - Discussing legal concerns and informatio...Softchoice Corporation
 
Courion Survey Findings: Access Risk Attitudes
Courion Survey Findings: Access Risk AttitudesCourion Survey Findings: Access Risk Attitudes
Courion Survey Findings: Access Risk AttitudesCourion Corporation
 

Similaire à Corporate Data: A Protected Asset or a Ticking Time Bomb? (20)

aOS Monaco 2019 - S3 - Présentation Varonis - Cloud Data Protection - Benjami...
aOS Monaco 2019 - S3 - Présentation Varonis - Cloud Data Protection - Benjami...aOS Monaco 2019 - S3 - Présentation Varonis - Cloud Data Protection - Benjami...
aOS Monaco 2019 - S3 - Présentation Varonis - Cloud Data Protection - Benjami...
 
DataGravity Security Pop Quiz
DataGravity Security Pop QuizDataGravity Security Pop Quiz
DataGravity Security Pop Quiz
 
Equilibrium Security Methodology 030414 Final v2
Equilibrium Security Methodology 030414 Final v2Equilibrium Security Methodology 030414 Final v2
Equilibrium Security Methodology 030414 Final v2
 
Intro To Secure Identity Management
Intro To Secure Identity ManagementIntro To Secure Identity Management
Intro To Secure Identity Management
 
How Well is Your Organization Protecting its Real Crown Jewels - Identities?
How Well is Your Organization Protecting its Real Crown Jewels - Identities?How Well is Your Organization Protecting its Real Crown Jewels - Identities?
How Well is Your Organization Protecting its Real Crown Jewels - Identities?
 
Ais Romney 2006 Slides 08 Is Control2
Ais Romney 2006 Slides 08 Is Control2Ais Romney 2006 Slides 08 Is Control2
Ais Romney 2006 Slides 08 Is Control2
 
Ais Romney 2006 Slides 08 Is Control2
Ais Romney 2006 Slides 08 Is Control2Ais Romney 2006 Slides 08 Is Control2
Ais Romney 2006 Slides 08 Is Control2
 
10.1.1.436.3364.pdf
10.1.1.436.3364.pdf10.1.1.436.3364.pdf
10.1.1.436.3364.pdf
 
Perimeter Security is Failing
Perimeter Security is FailingPerimeter Security is Failing
Perimeter Security is Failing
 
I Series User Management
I Series User ManagementI Series User Management
I Series User Management
 
Guide Preview: Ensuring your enterprise image-viewer if fully secure
Guide Preview: Ensuring your enterprise image-viewer if fully secureGuide Preview: Ensuring your enterprise image-viewer if fully secure
Guide Preview: Ensuring your enterprise image-viewer if fully secure
 
Microsoft DATA Protection To Put secure.
Microsoft DATA Protection To Put secure.Microsoft DATA Protection To Put secure.
Microsoft DATA Protection To Put secure.
 
How to Secure Data Privacy in 2024.pdf
How to Secure Data Privacy in 2024.pdfHow to Secure Data Privacy in 2024.pdf
How to Secure Data Privacy in 2024.pdf
 
How to Secure Data Privacy in 2024.pptx
How to Secure Data Privacy in 2024.pptxHow to Secure Data Privacy in 2024.pptx
How to Secure Data Privacy in 2024.pptx
 
SPYRUS® Enterprise Management System
SPYRUS®  Enterprise  Management  System SPYRUS®  Enterprise  Management  System
SPYRUS® Enterprise Management System
 
BAI Security - Brochure - IT Security Assessment (Financial)
BAI Security - Brochure - IT Security Assessment (Financial)BAI Security - Brochure - IT Security Assessment (Financial)
BAI Security - Brochure - IT Security Assessment (Financial)
 
Service now is a software platform that supports IT service manag.docx
Service now is a software platform that supports IT service manag.docxService now is a software platform that supports IT service manag.docx
Service now is a software platform that supports IT service manag.docx
 
Softchoice - Microsoft Office 365 - Discussing legal concerns and informatio...
Softchoice  - Microsoft Office 365 - Discussing legal concerns and informatio...Softchoice  - Microsoft Office 365 - Discussing legal concerns and informatio...
Softchoice - Microsoft Office 365 - Discussing legal concerns and informatio...
 
Courion Survey Findings: Access Risk Attitudes
Courion Survey Findings: Access Risk AttitudesCourion Survey Findings: Access Risk Attitudes
Courion Survey Findings: Access Risk Attitudes
 
6 Ways to Fight the Data Loss Gremlins
6 Ways to Fight the Data Loss Gremlins6 Ways to Fight the Data Loss Gremlins
6 Ways to Fight the Data Loss Gremlins
 

Dernier

Data Factory in Microsoft Fabric (MsBIP #82)
Data Factory in Microsoft Fabric (MsBIP #82)Data Factory in Microsoft Fabric (MsBIP #82)
Data Factory in Microsoft Fabric (MsBIP #82)Cathrine Wilhelmsen
 
ASML's Taxonomy Adventure by Daniel Canter
ASML's Taxonomy Adventure by Daniel CanterASML's Taxonomy Adventure by Daniel Canter
ASML's Taxonomy Adventure by Daniel Cantervoginip
 
Real-Time AI Streaming - AI Max Princeton
Real-Time AI  Streaming - AI Max PrincetonReal-Time AI  Streaming - AI Max Princeton
Real-Time AI Streaming - AI Max PrincetonTimothy Spann
 
1:1定制(UQ毕业证)昆士兰大学毕业证成绩单修改留信学历认证原版一模一样
1:1定制(UQ毕业证)昆士兰大学毕业证成绩单修改留信学历认证原版一模一样1:1定制(UQ毕业证)昆士兰大学毕业证成绩单修改留信学历认证原版一模一样
1:1定制(UQ毕业证)昆士兰大学毕业证成绩单修改留信学历认证原版一模一样vhwb25kk
 
RS 9000 Call In girls Dwarka Mor (DELHI)⇛9711147426🔝Delhi
RS 9000 Call In girls Dwarka Mor (DELHI)⇛9711147426🔝DelhiRS 9000 Call In girls Dwarka Mor (DELHI)⇛9711147426🔝Delhi
RS 9000 Call In girls Dwarka Mor (DELHI)⇛9711147426🔝Delhijennyeacort
 
RABBIT: A CLI tool for identifying bots based on their GitHub events.
RABBIT: A CLI tool for identifying bots based on their GitHub events.RABBIT: A CLI tool for identifying bots based on their GitHub events.
RABBIT: A CLI tool for identifying bots based on their GitHub events.natarajan8993
 
Multiple time frame trading analysis -brianshannon.pdf
Multiple time frame trading analysis -brianshannon.pdfMultiple time frame trading analysis -brianshannon.pdf
Multiple time frame trading analysis -brianshannon.pdfchwongval
 
Student profile product demonstration on grades, ability, well-being and mind...
Student profile product demonstration on grades, ability, well-being and mind...Student profile product demonstration on grades, ability, well-being and mind...
Student profile product demonstration on grades, ability, well-being and mind...Seán Kennedy
 
办理学位证中佛罗里达大学毕业证,UCF成绩单原版一比一
办理学位证中佛罗里达大学毕业证,UCF成绩单原版一比一办理学位证中佛罗里达大学毕业证,UCF成绩单原版一比一
办理学位证中佛罗里达大学毕业证,UCF成绩单原版一比一F sss
 
Minimizing AI Hallucinations/Confabulations and the Path towards AGI with Exa...
Minimizing AI Hallucinations/Confabulations and the Path towards AGI with Exa...Minimizing AI Hallucinations/Confabulations and the Path towards AGI with Exa...
Minimizing AI Hallucinations/Confabulations and the Path towards AGI with Exa...Thomas Poetter
 
Data Analysis Project : Targeting the Right Customers, Presentation on Bank M...
Data Analysis Project : Targeting the Right Customers, Presentation on Bank M...Data Analysis Project : Targeting the Right Customers, Presentation on Bank M...
Data Analysis Project : Targeting the Right Customers, Presentation on Bank M...Boston Institute of Analytics
 
Identifying Appropriate Test Statistics Involving Population Mean
Identifying Appropriate Test Statistics Involving Population MeanIdentifying Appropriate Test Statistics Involving Population Mean
Identifying Appropriate Test Statistics Involving Population MeanMYRABACSAFRA2
 
Decoding the Heart: Student Presentation on Heart Attack Prediction with Data...
Decoding the Heart: Student Presentation on Heart Attack Prediction with Data...Decoding the Heart: Student Presentation on Heart Attack Prediction with Data...
Decoding the Heart: Student Presentation on Heart Attack Prediction with Data...Boston Institute of Analytics
 
DBA Basics: Getting Started with Performance Tuning.pdf
DBA Basics: Getting Started with Performance Tuning.pdfDBA Basics: Getting Started with Performance Tuning.pdf
DBA Basics: Getting Started with Performance Tuning.pdfJohn Sterrett
 
IMA MSN - Medical Students Network (2).pptx
IMA MSN - Medical Students Network (2).pptxIMA MSN - Medical Students Network (2).pptx
IMA MSN - Medical Students Network (2).pptxdolaknnilon
 
原版1:1定制南十字星大学毕业证(SCU毕业证)#文凭成绩单#真实留信学历认证永久存档
原版1:1定制南十字星大学毕业证(SCU毕业证)#文凭成绩单#真实留信学历认证永久存档原版1:1定制南十字星大学毕业证(SCU毕业证)#文凭成绩单#真实留信学历认证永久存档
原版1:1定制南十字星大学毕业证(SCU毕业证)#文凭成绩单#真实留信学历认证永久存档208367051
 
办理学位证加利福尼亚大学洛杉矶分校毕业证,UCLA成绩单原版一比一
办理学位证加利福尼亚大学洛杉矶分校毕业证,UCLA成绩单原版一比一办理学位证加利福尼亚大学洛杉矶分校毕业证,UCLA成绩单原版一比一
办理学位证加利福尼亚大学洛杉矶分校毕业证,UCLA成绩单原版一比一F sss
 
modul pembelajaran robotic Workshop _ by Slidesgo.pptx
modul pembelajaran robotic Workshop _ by Slidesgo.pptxmodul pembelajaran robotic Workshop _ by Slidesgo.pptx
modul pembelajaran robotic Workshop _ by Slidesgo.pptxaleedritatuxx
 
LLMs, LMMs, their Improvement Suggestions and the Path towards AGI
LLMs, LMMs, their Improvement Suggestions and the Path towards AGILLMs, LMMs, their Improvement Suggestions and the Path towards AGI
LLMs, LMMs, their Improvement Suggestions and the Path towards AGIThomas Poetter
 
Statistics, Data Analysis, and Decision Modeling, 5th edition by James R. Eva...
Statistics, Data Analysis, and Decision Modeling, 5th edition by James R. Eva...Statistics, Data Analysis, and Decision Modeling, 5th edition by James R. Eva...
Statistics, Data Analysis, and Decision Modeling, 5th edition by James R. Eva...ssuserf63bd7
 

Dernier (20)

Data Factory in Microsoft Fabric (MsBIP #82)
Data Factory in Microsoft Fabric (MsBIP #82)Data Factory in Microsoft Fabric (MsBIP #82)
Data Factory in Microsoft Fabric (MsBIP #82)
 
ASML's Taxonomy Adventure by Daniel Canter
ASML's Taxonomy Adventure by Daniel CanterASML's Taxonomy Adventure by Daniel Canter
ASML's Taxonomy Adventure by Daniel Canter
 
Real-Time AI Streaming - AI Max Princeton
Real-Time AI  Streaming - AI Max PrincetonReal-Time AI  Streaming - AI Max Princeton
Real-Time AI Streaming - AI Max Princeton
 
1:1定制(UQ毕业证)昆士兰大学毕业证成绩单修改留信学历认证原版一模一样
1:1定制(UQ毕业证)昆士兰大学毕业证成绩单修改留信学历认证原版一模一样1:1定制(UQ毕业证)昆士兰大学毕业证成绩单修改留信学历认证原版一模一样
1:1定制(UQ毕业证)昆士兰大学毕业证成绩单修改留信学历认证原版一模一样
 
RS 9000 Call In girls Dwarka Mor (DELHI)⇛9711147426🔝Delhi
RS 9000 Call In girls Dwarka Mor (DELHI)⇛9711147426🔝DelhiRS 9000 Call In girls Dwarka Mor (DELHI)⇛9711147426🔝Delhi
RS 9000 Call In girls Dwarka Mor (DELHI)⇛9711147426🔝Delhi
 
RABBIT: A CLI tool for identifying bots based on their GitHub events.
RABBIT: A CLI tool for identifying bots based on their GitHub events.RABBIT: A CLI tool for identifying bots based on their GitHub events.
RABBIT: A CLI tool for identifying bots based on their GitHub events.
 
Multiple time frame trading analysis -brianshannon.pdf
Multiple time frame trading analysis -brianshannon.pdfMultiple time frame trading analysis -brianshannon.pdf
Multiple time frame trading analysis -brianshannon.pdf
 
Student profile product demonstration on grades, ability, well-being and mind...
Student profile product demonstration on grades, ability, well-being and mind...Student profile product demonstration on grades, ability, well-being and mind...
Student profile product demonstration on grades, ability, well-being and mind...
 
办理学位证中佛罗里达大学毕业证,UCF成绩单原版一比一
办理学位证中佛罗里达大学毕业证,UCF成绩单原版一比一办理学位证中佛罗里达大学毕业证,UCF成绩单原版一比一
办理学位证中佛罗里达大学毕业证,UCF成绩单原版一比一
 
Minimizing AI Hallucinations/Confabulations and the Path towards AGI with Exa...
Minimizing AI Hallucinations/Confabulations and the Path towards AGI with Exa...Minimizing AI Hallucinations/Confabulations and the Path towards AGI with Exa...
Minimizing AI Hallucinations/Confabulations and the Path towards AGI with Exa...
 
Data Analysis Project : Targeting the Right Customers, Presentation on Bank M...
Data Analysis Project : Targeting the Right Customers, Presentation on Bank M...Data Analysis Project : Targeting the Right Customers, Presentation on Bank M...
Data Analysis Project : Targeting the Right Customers, Presentation on Bank M...
 
Identifying Appropriate Test Statistics Involving Population Mean
Identifying Appropriate Test Statistics Involving Population MeanIdentifying Appropriate Test Statistics Involving Population Mean
Identifying Appropriate Test Statistics Involving Population Mean
 
Decoding the Heart: Student Presentation on Heart Attack Prediction with Data...
Decoding the Heart: Student Presentation on Heart Attack Prediction with Data...Decoding the Heart: Student Presentation on Heart Attack Prediction with Data...
Decoding the Heart: Student Presentation on Heart Attack Prediction with Data...
 
DBA Basics: Getting Started with Performance Tuning.pdf
DBA Basics: Getting Started with Performance Tuning.pdfDBA Basics: Getting Started with Performance Tuning.pdf
DBA Basics: Getting Started with Performance Tuning.pdf
 
IMA MSN - Medical Students Network (2).pptx
IMA MSN - Medical Students Network (2).pptxIMA MSN - Medical Students Network (2).pptx
IMA MSN - Medical Students Network (2).pptx
 
原版1:1定制南十字星大学毕业证(SCU毕业证)#文凭成绩单#真实留信学历认证永久存档
原版1:1定制南十字星大学毕业证(SCU毕业证)#文凭成绩单#真实留信学历认证永久存档原版1:1定制南十字星大学毕业证(SCU毕业证)#文凭成绩单#真实留信学历认证永久存档
原版1:1定制南十字星大学毕业证(SCU毕业证)#文凭成绩单#真实留信学历认证永久存档
 
办理学位证加利福尼亚大学洛杉矶分校毕业证,UCLA成绩单原版一比一
办理学位证加利福尼亚大学洛杉矶分校毕业证,UCLA成绩单原版一比一办理学位证加利福尼亚大学洛杉矶分校毕业证,UCLA成绩单原版一比一
办理学位证加利福尼亚大学洛杉矶分校毕业证,UCLA成绩单原版一比一
 
modul pembelajaran robotic Workshop _ by Slidesgo.pptx
modul pembelajaran robotic Workshop _ by Slidesgo.pptxmodul pembelajaran robotic Workshop _ by Slidesgo.pptx
modul pembelajaran robotic Workshop _ by Slidesgo.pptx
 
LLMs, LMMs, their Improvement Suggestions and the Path towards AGI
LLMs, LMMs, their Improvement Suggestions and the Path towards AGILLMs, LMMs, their Improvement Suggestions and the Path towards AGI
LLMs, LMMs, their Improvement Suggestions and the Path towards AGI
 
Statistics, Data Analysis, and Decision Modeling, 5th edition by James R. Eva...
Statistics, Data Analysis, and Decision Modeling, 5th edition by James R. Eva...Statistics, Data Analysis, and Decision Modeling, 5th edition by James R. Eva...
Statistics, Data Analysis, and Decision Modeling, 5th edition by James R. Eva...
 

Corporate Data: A Protected Asset or a Ticking Time Bomb?

  • 2. VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL2 What do over 2000 IT staff & end users have to say about internal security risks in their workplaces?
  • 4. VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL4 According to a recent survey conducted by The Ponemon Institute…
  • 5. VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL5 71% of end users say that they have access to company data they should not see.
  • 6. VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL6 That’s bad.
  • 7. VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL7 54% of those end users characterize that access as frequent or very frequent.
  • 8. VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL8 That’s worse. How much data are we talking about here?
  • 9. VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL9 38% of end users report that they and their co-workers can see "a lot of data".
  • 10. VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL10 Why is that?
  • 11. VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL11 4 in 5 IT practitioners say their organizations don't enforce a strict least-privilege (or need-to-know) data model.
  • 12. VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL12 That’s bad, too.
  • 13. VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL13 But they’re watching what employees are doing though, right?
  • 14. VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL14 Only 22% of employees say their organization can tell them what happened to lost data, files, or emails.
  • 15. VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL15 So about 78% of organizations don’t seem to be watching very closely.
  • 16. VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL16 In a nutshell, employees have access to a lot of data they don’t need, and no one is watching what they’re doing – do I have that right?
  • 17. VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL17 Yup
  • 18. VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL18 The failure of companies to create and enforce a least-privilege model – especially for confidential or sensitive data like credit card numbers or health records – will most certainly lead to more breaches and loss of critical data.
  • 19. VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL19 So poor controls will lead to more breaches. No surprise there. Is that all?
  • 20. VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL20 Not quite. In the Ponemon study, most end users and IT practitioners believe their organization would overlook security risks before they would sacrifice productivity.
  • 21. VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL21 So employees must be really productive, right? (If security is so lax…)
  • 22. VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL22 Wrong.
  • 23. VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL23 73% of end users believe the growth of emails, presentations, multimedia files and other types of company data has significantly affected their ability to find and access data.
  • 24. VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL24 That’s weird – does IT know that employees can’t find data?
  • 25. VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL25 60% of IT practitioners say it is very difficult or difficult for employees to search and find company data or files they or their co-workers have created that isn't stored on their own computers.
  • 26. VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL26 That’s certainly counter-productive – what about getting access to data?
  • 27. VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL27 43% of end users say it takes weeks, months, or longer to be granted access to data they request access to in order to do their jobs.
  • 28. VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL28 Only 22% report that access is typically granted within minutes or hours.
  • 29. VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL29 That’s pretty bad, too.
  • 30. VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL30 What about being able to share data easily?
  • 31. VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL31 68% of end users say it is difficult or very difficult to share appropriate data or files with business partners such as customers or vendors.
  • 32. VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL32 How would they prefer to share data?
  • 33. VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL33 43% of employees prefer to use public cloud file sync and share services to share data, which means it’s more popular than any platform other than email.
  • 34. VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL34 76% of end users believe there are times when it is acceptable to transfer work documents to their personal devices…
  • 35. VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL35 …while only 13% of IT practitioners agree.
  • 36. VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL36 So end users are sort of doing their own thing…
  • 37. VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL37 Yup
  • 38. VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL38 So how important is this data we’re talking about that: we aren’t protecting well and can’t really find anymore or share easily and storing in the public cloud when we feel like it (even though IT doesn’t think we should?)
  • 39. VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL39 76% of end users say their job requires them to access and use proprietary information such as customer data, employee records, financial reports, and confidential business documents.
  • 40. VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL40 So pretty much the most important data imaginable.
  • 41. VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL41 44% of end users believe their organization experienced the loss or theft of company data over the past two years.
  • 42. VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL42 67% of IT staff say their organization experienced the loss or theft of company data over the past two years.
  • 43. VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL43 74% believe that insider mistakes, negligence, or malice are frequently or very frequently the cause of leakage of company data.
  • 44. VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL44 Shocker
  • 45. VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL45 So everyone is frantically fixing everything, right?
  • 46. VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL46 Only 22% of employees believe their organizations as a whole place a very high priority on the protection of company data.
  • 47. VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL47 Only 47% of IT practitioners believe employees in their organizations are taking appropriate steps to protect company data they have access to.
  • 48. VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL48 Not so much
  • 49. VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL49 Ponemon Conclusion An organization that reduces the amount of data employees have access to (by implementing a least-privilege access model, improving data disposition policies or ideally both) and streamlines their processes for granting access will likely benefit from more productive employees. From: Corporate Data: A Protected Asset or a Ticking Time Bomb?
  • 50. VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL50 Could you reduce risk and increase productivity? FIND OUT. http://info.varonis.com/assessment
  • 51. VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL51 Free Guide: 6 Tactics for Preventing Insider Threats Download here: http://info.varonis.com/ insider-threats-guide
  • 52. VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL52 Methodology The survey report, "Corporate Data: A Protected Asset or a Ticking Time Bomb?" is derived from interviews conducted by the Ponemon Institute in October 2014 with 2,276 employees in the United States, United Kingdom, France, and Germany. Respondents included 1,166 IT practitioners and 1,110 end users in organizations ranging in size from dozens to tens of thousands of employees, in a variety of industries including financial services, public sector, health & pharmaceutical, retail, industrial, and technology and software.
  • 53. VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL53 About Ponemon Ponemon Institute Advancing Responsible Information Management Ponemon Institute is dedicated to independent research and education that advances responsible information and privacy management practices within business and government. Our mission is to conduct high quality, empirical studies on critical issues affecting the management and security of sensitive information about people and organizations. As a member of the Council of American Survey Research Organizations (CASRO), we uphold strict data confidentiality, privacy and ethical research standards. We do not collect any personally identifiable information from individuals (or company identifiable information in our business research). Furthermore, we have strict quality standards to ensure that subjects are not asked extraneous, irrelevant or improper questions.
  • 54. VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL54 About Varonis Varonis is the leading provider of software solutions for unstructured, human-generated enterprise data. Varonis provides an innovative software platform that allows enterprises to map, analyze, manage and migrate their unstructured data. Varonis specializes in human-generated data, a type of unstructured data that includes an enterprise's spreadsheets, word processing documents, presentations, audio files, video files, emails, text messages and any other data created by employees. This data often contains an enterprise's financial information, product plans, strategic initiatives, intellectual property and numerous other forms of vital information. IT and business personnel deploy Varonis software for a variety of use cases, including data governance, data security, archiving, file synchronization, enhanced mobile data accessibility and information collaboration. As of September 30, 2014, Varonis had approximately 3,000 customers, spanning leading firms in the financial services, public, healthcare, industrial, energy & utilities, technology, consumer and retail, education and media & entertainment sectors. Join the Varonis conversation on Facebook, LinkedIn, Twitter, and YouTube and subscribe to our Metadata Era blog.
  • 55. VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL Thank You Name Email Address Phone Number