Upload
others
View
1
Download
0
Embed Size (px)
Citation preview
© 2017 DataGravity Inc.
E-Safe Technologies
March 16, 2017
CLICK TO START >
© 2017 DataGravity Inc.
TODAY’S IT ENVIRONMENT
Unwieldy data growth Highly virtualizedSubject to data
privacy regulationsRise in cybercrime
Undetected Sensitive Data Theft
Ransomware Attacks
021/24/2017Company Confidential
© 2017 DataGravity Inc.
DATA VISUALIZATION & SENSITIVE DATA DETECTION
Understanding Your Data is the Critical to Protecting It
DataGravity enables
full visibility into your data
across your virtualized
environment and hybrid clouds
WHO is accessing or
modifying data?
WHAT files are being
changed?
WHEN is activity occurring?
WHERE is sensitive data
located?
WHY is sensitive data
exposed?
031/24/2017Company Confidential
© 2017 DataGravity Inc.
REAL LIFE DATA CRIMES
DATAGRAVITY HAS HELPED SOLVE
Digital Extortion
Manufacturer recovered from ransomware
without paying fines.
Sensitive Data Exposure
Insurance company finding 1000’s of files with
exposed PII.
Data Trespassing
Employee consuming 20% of file share with
home movies.
IP Theft / Corporate Espionage
Departing employee moving files to Dropbox,
then performing mass delete of files.
Illegal Exporting
Data moving to cloud in violation of regulatory
requirements.
041/24/2017Company Confidential
© 2017 DataGravity Inc.
BEHAVIORAL BASED DATA PROTECTION
DataGravity can enable data snapshots based on
anomalous user activities to proactively protect
customers.
Example ScenarioExample Scenario
User downloads malicious malware that
invokes a ransomware attack.
Attack starts to encrypt documents and files the
user has access on the corporate file shares.
DataGravity is proactively monitoring user activity
and takes action to mitigate attack by:
- Taking a Snapshot
- Blocking User Access
- Alarming to administrator
- Providing detailed list of files to recover from
last known good point in time
- Recover from within the tool
Minimal impact to business is achieved
resulting in a happy customer.
051/24/2017Company Confidential
© 2017 DataGravity Inc.
HIGH LEVEL ARCHITECTURE – CONTENT ANALYSIS
07
© 2017 DataGravity Inc.
HIGH LEVEL ARCHITECTURE
PUTTING IT ALL TOGETHER
08
© 2017 DataGravity Inc.
HIGH LEVEL ARCHITECTURE
ACTION FRAMEWORK
09
Actions: - In response to a trigger- Admin configurable- Can take the form of notification,
administrative action, or behavior based protection point
- Designed to be extensible- A single trigger can cause multiple
actions to occur
Triggers:- Content-based evaluated at DP time- Behavior-based evaluated near real-time- Built-in evaluated near real-time
© 2017 DataGravity Inc.
INTEGRATIONS
10
• Strong overlap with storage and ecosystem partners where additional benefits can be gained with deeper integration.
© 2017 DataGravity Inc.
DATAGRAVITY FOR VIRTUALIZATION
CAPABILITIES / EDITIONS
11
© 2017 DataGravity Inc.
SUMMARY
Virtualized Data Provides Unique
Opportunities and Obstacles Data Security Start and
Ends with Data
It is Difficult to Protect Data if
You Don’t Understand it
14
100%of organizations
who have data have
a data security problem.
DataGravity is the
only company that
that helps secure
and protect data
where it lives