SlideShare a Scribd company logo
Symantec Data Insight


    March 2, 2010



Symantec Proprietary and Confidential
Information Management Challenges
                                        Increasingly Unstructured




     WHO OWNS THE                          HOW IS THETHE
                                             HOW IS DATA                  PROTECTING THE
         DATA                                DATA USED
                                                USED                           DATA
 • Inadequate metadata                  • Who has accessed the data    • DLP 101 – contain leakage
   information                           •over time? information
                                           Lack of audit
                                           when incident occurs        • Who should have access?
 • What is the data governance          • When is the data no longer   • Are there gaps in the
   structure?                            •needed? the data no longer
                                           When is
                                           needed?                       protection or entitlements
 • Pre-requisite for other              • What is the optimal method     scheme?
   business initiatives                   to store data?



Symantec Proprietary and Confidential                                                                 2
Symantec’s solution: Data Insight Technology
                        Users
                                        • Leverages core competencies of
                                         security and storage

      Data Insight                      • Enables improved governance
     • File System Monitoring               • Infer data ownership based on usage
       Technology                           • Utilization (data, user)
                                            • Access patterns and logs

                                        • Design considerations
                                            • Scalability
                                            • Performance
                                            • Integration




                        Data

Symantec Proprietary and Confidential                                         3
Symantec’s Approach: Leverage Technology across the
Portfolio



    Technology & Integration
  • Data Insight
    Provides Ownership/Usage intelligence

  • Data Insight + Data Loss Prevention:
    Drives sensitive data remediation
  • Data Insight + Storage Management :
    Drives reclamation & chargeback
  • Data Insight + Information Management:
    Supports archive policy




Symantec Proprietary and Confidential                 4
Symantec Data Loss Prevention

         DISCOVER                        MONITOR       PROTECT          MANAGE


             Storage                        Endpoint          Network

                   DISCOVER                    DISCOVER          MONITOR


                     PROTECT                   PROTECT           PROTECT




           Management Platform

             Symantec Data Loss Prevention Enforce Platform


 Symantec Proprietary and Confidential                                           5
Discover, Protect, and Insight
For Storage DLP, customers are essentially looking to “find it” and “fix it” when it
comes to sensitive data.

                                          The Customer Process

                                    1   Scan for sensitive data
         Discover
                                    2   Generate a large list of incidents
                                    3   Identify data or business owner
             Insight
                                    4   Track usage and permissions
                                    5   Distribute for Authorization
            Protect
                                    6   Remediate

                        Simplify Remediation, Maximize Risk Reduction
Symantec Proprietary and Confidential                                                       6
                                                                    Symantec Confidential
Data Insight and DLP - Key Features



                                        • Top 5 Data Users, Readers, Writers
   Automated Data Owner                 • Filter service accounts
       Identification                   • Aggregation of incidents




                                        • Open share identification
         Data Access
                                        • Who has seen the data (data spill)
    Visualization & History
                                        • User investigation




Symantec Proprietary and Confidential                                          7
                                                      Symantec Confidential
Remediation Today



                                        3 Distribute incidents for remediation




               2
      Crack Content and
      Record Incidents




                                          1 Scan and Retrieve Data
                                                                                 Targets




Symantec Proprietary and Confidential                                                      8
Data Owner Identification
                                   3 Who do I contact and how do I remediate?




         2
                                                                    X
                                                                File Owner =
                                                                                                     Most active
                                                                                                       user

Crack Content                                                   Administrator
and Record                                                                                          “Data Owner”
Incidents




                                        1   Scan and Retrieve
                                                  Data                      Targets


        Key Benefits:
        • Identify data owner for remediation and notification
        • Understand scope of data usage – full file access history
        • Manage ACL based on actual access history and content intelligence
Symantec Proprietary and Confidential                                                                              9
                                                                            Symantec Confidential
Data Insight Key Take-Aways

• Addresses crucial challenges around securing and managing
  data
• Security / Storage convergence – delivering on the Symantec
  Veritas promise
• Provides an information-centric approach to Data Governance




Symantec Proprietary and Confidential                           10

More Related Content

PDF
Veritas-Information-Governance-Solution-Brochure-EN
PDF
Symantec Data Insight 4.0 July 2013
PDF
Symantec Data Insight 3.0
PPTX
Symantec Enterprise Mobility Enhancements
PPTX
Data Retention and eDiscovery from Symantec
PDF
Symantec Data Insight for Storage
PPTX
Information Governance Maturity for Financial Services
PPTX
GDPR Part 2: Quest Relevance
Veritas-Information-Governance-Solution-Brochure-EN
Symantec Data Insight 4.0 July 2013
Symantec Data Insight 3.0
Symantec Enterprise Mobility Enhancements
Data Retention and eDiscovery from Symantec
Symantec Data Insight for Storage
Information Governance Maturity for Financial Services
GDPR Part 2: Quest Relevance

What's hot (20)

PDF
Security and Audit for Big Data
PPTX
Information and Identity Protection - Data Loss Prevention, Encryption, User ...
PPTX
The CISO’s Guide to Data Loss Prevention
PPT
How Network Data Loss Prevention is Implemented
PDF
The Rise of Data Ethics and Security - AIDI Webinar
PDF
DLP Executive Overview
PDF
Data Loss Prevention: Brainstorming
PDF
Cybersecurity 101 - Auditing Cyber Security
PDF
Customer Spotlight: Deploying a Data Protection Program in less than 120 Days
PPTX
Big Data and Security - Where are we now? (2015)
PPTX
Symantec Data Loss Prevention 9
PPTX
Seclore: Information Rights Management
PDF
Urgensi RUU Perlindungan Data Pribadi
PPTX
Technology Overview - Symantec Data Loss Prevention (DLP)
PDF
Threat Ready Data: Protect Data from the Inside and the Outside
ODP
Big security for big data
PDF
Introducing Data Loss Prevention 14
PDF
Symantec Data Loss Prevention 11
PPT
PDF
Cross border - off-shoring and outsourcing privacy sensitive data
Security and Audit for Big Data
Information and Identity Protection - Data Loss Prevention, Encryption, User ...
The CISO’s Guide to Data Loss Prevention
How Network Data Loss Prevention is Implemented
The Rise of Data Ethics and Security - AIDI Webinar
DLP Executive Overview
Data Loss Prevention: Brainstorming
Cybersecurity 101 - Auditing Cyber Security
Customer Spotlight: Deploying a Data Protection Program in less than 120 Days
Big Data and Security - Where are we now? (2015)
Symantec Data Loss Prevention 9
Seclore: Information Rights Management
Urgensi RUU Perlindungan Data Pribadi
Technology Overview - Symantec Data Loss Prevention (DLP)
Threat Ready Data: Protect Data from the Inside and the Outside
Big security for big data
Introducing Data Loss Prevention 14
Symantec Data Loss Prevention 11
Cross border - off-shoring and outsourcing privacy sensitive data
Ad

Similar to Symantec Data Insight (20)

PDF
RSA 2010 Kevin Rowney
PDF
How to Secure Your Files with DLP and FAM
PDF
ISACA Los Angeles 2010 Compliance - Ulf Mattsson
PDF
Data Sheet - Manage unstructured data growth with Symantec Data Insight
PPTX
Ulf mattsson webinar jun 7 2012 slideshare version
PPT
Data breach protection from a DB2 perspective
PPTX
Encase cybersecurity alat za proaktivnu kontrolu korporativne it sigurnosti 2
PDF
Atlanta ISSA 2010 Enterprise Data Protection Ulf Mattsson
PPTX
ISACA New York Metro April 30 2012
PPTX
Internet Security Threat Report (ISTR) Vol. 16
PDF
Integrating Information Protection Into Data Architecture & SDLC
PDF
Why Have A Digital Investigative Infrastructure
PPTX
Data Management - NA CACS 2009
PPTX
ISACA NA CACS 2012 Orlando session 414 Ulf Mattsson
PPTX
Trend micro data protection
PDF
The Need for DLP now - A Clearswift White Paper
PDF
Ssi Data Protection Solutions V0.2
PDF
Security Awareness Training
PPT
Kevin Wharram Security Summit
PDF
ISACA Dallas Texas 2010 - Ulf Mattsson
RSA 2010 Kevin Rowney
How to Secure Your Files with DLP and FAM
ISACA Los Angeles 2010 Compliance - Ulf Mattsson
Data Sheet - Manage unstructured data growth with Symantec Data Insight
Ulf mattsson webinar jun 7 2012 slideshare version
Data breach protection from a DB2 perspective
Encase cybersecurity alat za proaktivnu kontrolu korporativne it sigurnosti 2
Atlanta ISSA 2010 Enterprise Data Protection Ulf Mattsson
ISACA New York Metro April 30 2012
Internet Security Threat Report (ISTR) Vol. 16
Integrating Information Protection Into Data Architecture & SDLC
Why Have A Digital Investigative Infrastructure
Data Management - NA CACS 2009
ISACA NA CACS 2012 Orlando session 414 Ulf Mattsson
Trend micro data protection
The Need for DLP now - A Clearswift White Paper
Ssi Data Protection Solutions V0.2
Security Awareness Training
Kevin Wharram Security Summit
ISACA Dallas Texas 2010 - Ulf Mattsson
Ad

More from Symantec (20)

PDF
Symantec Enterprise Security Products are now part of Broadcom
PDF
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
PDF
Symantec Webinar | National Cyber Security Awareness Month: Protect IT
PDF
Symantec Webinar | National Cyber Security Awareness Month: Secure IT
PDF
Symantec Webinar | National Cyber Security Awareness Month - Own IT
PDF
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
PDF
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
PDF
Symantec Mobile Security Webinar
PDF
Symantec Webinar Cloud Security Threat Report
PDF
Symantec Cloud Security Threat Report
PDF
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
PDF
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
PDF
Symantec Webinar | Tips for Successful CASB Projects
PDF
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
PDF
Symantec Webinar: GDPR 1 Year On
PDF
Symantec ISTR 24 Webcast 2019
PDF
Symantec Best Practices for Cloud Security: Insights from the Front Lines
PDF
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
PDF
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
PDF
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
Symantec Enterprise Security Products are now part of Broadcom
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
Symantec Webinar | National Cyber Security Awareness Month: Protect IT
Symantec Webinar | National Cyber Security Awareness Month: Secure IT
Symantec Webinar | National Cyber Security Awareness Month - Own IT
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Symantec Mobile Security Webinar
Symantec Webinar Cloud Security Threat Report
Symantec Cloud Security Threat Report
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Tips for Successful CASB Projects
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: GDPR 1 Year On
Symantec ISTR 24 Webcast 2019
Symantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear

Recently uploaded (20)

PDF
Approach and Philosophy of On baking technology
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
PPT
Teaching material agriculture food technology
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PPTX
Big Data Technologies - Introduction.pptx
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PDF
KodekX | Application Modernization Development
PDF
Modernizing your data center with Dell and AMD
PDF
Machine learning based COVID-19 study performance prediction
PDF
Spectral efficient network and resource selection model in 5G networks
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PPTX
Cloud computing and distributed systems.
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
Approach and Philosophy of On baking technology
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
Teaching material agriculture food technology
Digital-Transformation-Roadmap-for-Companies.pptx
“AI and Expert System Decision Support & Business Intelligence Systems”
Understanding_Digital_Forensics_Presentation.pptx
NewMind AI Weekly Chronicles - August'25 Week I
Big Data Technologies - Introduction.pptx
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
KodekX | Application Modernization Development
Modernizing your data center with Dell and AMD
Machine learning based COVID-19 study performance prediction
Spectral efficient network and resource selection model in 5G networks
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
Diabetes mellitus diagnosis method based random forest with bat algorithm
Cloud computing and distributed systems.
Chapter 3 Spatial Domain Image Processing.pdf
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Reach Out and Touch Someone: Haptics and Empathic Computing

Symantec Data Insight

  • 1. Symantec Data Insight March 2, 2010 Symantec Proprietary and Confidential
  • 2. Information Management Challenges Increasingly Unstructured WHO OWNS THE HOW IS THETHE HOW IS DATA PROTECTING THE DATA DATA USED USED DATA • Inadequate metadata • Who has accessed the data • DLP 101 – contain leakage information •over time? information Lack of audit when incident occurs • Who should have access? • What is the data governance • When is the data no longer • Are there gaps in the structure? •needed? the data no longer When is needed? protection or entitlements • Pre-requisite for other • What is the optimal method scheme? business initiatives to store data? Symantec Proprietary and Confidential 2
  • 3. Symantec’s solution: Data Insight Technology Users • Leverages core competencies of security and storage Data Insight • Enables improved governance • File System Monitoring • Infer data ownership based on usage Technology • Utilization (data, user) • Access patterns and logs • Design considerations • Scalability • Performance • Integration Data Symantec Proprietary and Confidential 3
  • 4. Symantec’s Approach: Leverage Technology across the Portfolio Technology & Integration • Data Insight Provides Ownership/Usage intelligence • Data Insight + Data Loss Prevention: Drives sensitive data remediation • Data Insight + Storage Management : Drives reclamation & chargeback • Data Insight + Information Management: Supports archive policy Symantec Proprietary and Confidential 4
  • 5. Symantec Data Loss Prevention DISCOVER MONITOR PROTECT MANAGE Storage Endpoint Network DISCOVER DISCOVER MONITOR PROTECT PROTECT PROTECT Management Platform Symantec Data Loss Prevention Enforce Platform Symantec Proprietary and Confidential 5
  • 6. Discover, Protect, and Insight For Storage DLP, customers are essentially looking to “find it” and “fix it” when it comes to sensitive data. The Customer Process 1 Scan for sensitive data Discover 2 Generate a large list of incidents 3 Identify data or business owner Insight 4 Track usage and permissions 5 Distribute for Authorization Protect 6 Remediate Simplify Remediation, Maximize Risk Reduction Symantec Proprietary and Confidential 6 Symantec Confidential
  • 7. Data Insight and DLP - Key Features • Top 5 Data Users, Readers, Writers Automated Data Owner • Filter service accounts Identification • Aggregation of incidents • Open share identification Data Access • Who has seen the data (data spill) Visualization & History • User investigation Symantec Proprietary and Confidential 7 Symantec Confidential
  • 8. Remediation Today 3 Distribute incidents for remediation 2 Crack Content and Record Incidents 1 Scan and Retrieve Data Targets Symantec Proprietary and Confidential 8
  • 9. Data Owner Identification 3 Who do I contact and how do I remediate? 2 X File Owner = Most active user Crack Content Administrator and Record “Data Owner” Incidents 1 Scan and Retrieve Data Targets Key Benefits: • Identify data owner for remediation and notification • Understand scope of data usage – full file access history • Manage ACL based on actual access history and content intelligence Symantec Proprietary and Confidential 9 Symantec Confidential
  • 10. Data Insight Key Take-Aways • Addresses crucial challenges around securing and managing data • Security / Storage convergence – delivering on the Symantec Veritas promise • Provides an information-centric approach to Data Governance Symantec Proprietary and Confidential 10