Data-Centric Security: An Effective Line of Defense Against Data Breaches

Post on 25-Jan-2017

179 views 0 download

Transcript of Data-Centric Security: An Effective Line of Defense Against Data Breaches

THE SOLUTION

Bring security closer to the data and secure the data itself rather than networks, servers or applications.

TODAY’ S HYBRID ENTERPRISE DATA ENVIRONMENTS

Raise new security challenges that need new solutions

Data-Centric Security

DATA-CENTRIC SECURITY

An Effective Line of Defense Against Data Breaches

What The Savviest Security Buyers Know That No One Else Does

DATA-CENTRIC SECURITY MINIMIZES RISKS

BlueTalon provides data-centric security across Hadoop, SQL and big data

environments. The BlueTalon Policy Engine enables consistent and precise

user access controls, dynamic data masking and auditing across multiple data

repositories regardless of applications in use. BlueTalon is used by Fortune 500

companies to secure their data initiatives deployed on-premises and in the cloud.

Sources: Verizon DBIR report 2012 to 2015, SANS Institute, Ponemon Institute, US News

www.bluetalon.com

info@bluetalon.com

+1 (888) 534 7154

IT’S ONLY GETTING WORSE

Enterprise data environments are getting more complex

Class action LAWSUITS

MORE REGULATIONSGovernment, industries,others

MORE ATTACKS,more targeted, more sophisticated

NEW TECHNOLOGIES:Hadoop, NoSQL, Cloud

A lot MORE DATA

MORE USERS with broader access

SOLUTIONSPAIN POINTS

RDBMS Public and Private Cloud

HybridEnvironments

Hadoop

Precise user access controls to give users access to the data they need, not a byte more

Consistent policies across repositories including cloud

environments

High performance security and dynamic controls designed for

today’s data environments

Complete track record of who requested what data

across the enterprise

Users have too much (or too little) access to enterprise data

Security policies don’t follow the data

Current security tools don’t scale to large

volumes of data

Lack of visibility into who has access to what data

MASSIVE REDUCTION

NUMBER OF RECORDS AT RISK

?

? ?

in the number of records at risk

with data-centric security

without data-centric security

Giving users access to the data they need, not a byte more, delivers the

greatest ROI in security

Securing data in cloud and on-premises repositories is a

major challenge for new data initiatives

THE UNTOLD STORY BEHIND

Today’s Data Breaches

of data breaches happen at the database level

96%of the time, attackers use stolen credentials

Compromised account led to 76 million stolen records

1

compromised accounts led to 80 million stolen records

5 of employees say they have access to data they shouldn’t

71%Hackers will GET IN, it’s almost inevitable. Focusing on PROTECTING THE DATA is needed.

LOGIN

95%