11
© 2017 DataGravity Inc. E-Safe Technologies March 16, 2017 CLICK TO START >

E-Safe Technologies · Virtualized Data Provides Unique Opportunities and Obstacles Data Security Start and Ends with Data It is Difficult to Protect Data if You Don’t Understand

  • Upload
    others

  • View
    1

  • Download
    0

Embed Size (px)

Citation preview

Page 1: E-Safe Technologies · Virtualized Data Provides Unique Opportunities and Obstacles Data Security Start and Ends with Data It is Difficult to Protect Data if You Don’t Understand

© 2017 DataGravity Inc.

E-Safe Technologies

March 16, 2017

CLICK TO START >

Page 2: E-Safe Technologies · Virtualized Data Provides Unique Opportunities and Obstacles Data Security Start and Ends with Data It is Difficult to Protect Data if You Don’t Understand

© 2017 DataGravity Inc.

TODAY’S IT ENVIRONMENT

Unwieldy data growth Highly virtualizedSubject to data

privacy regulationsRise in cybercrime

Undetected Sensitive Data Theft

Ransomware Attacks

021/24/2017Company Confidential

Page 3: E-Safe Technologies · Virtualized Data Provides Unique Opportunities and Obstacles Data Security Start and Ends with Data It is Difficult to Protect Data if You Don’t Understand

© 2017 DataGravity Inc.

DATA VISUALIZATION & SENSITIVE DATA DETECTION

Understanding Your Data is the Critical to Protecting It

DataGravity enables

full visibility into your data

across your virtualized

environment and hybrid clouds

WHO is accessing or

modifying data?

WHAT files are being

changed?

WHEN is activity occurring?

WHERE is sensitive data

located?

WHY is sensitive data

exposed?

031/24/2017Company Confidential

Page 4: E-Safe Technologies · Virtualized Data Provides Unique Opportunities and Obstacles Data Security Start and Ends with Data It is Difficult to Protect Data if You Don’t Understand

© 2017 DataGravity Inc.

REAL LIFE DATA CRIMES

DATAGRAVITY HAS HELPED SOLVE

Digital Extortion

Manufacturer recovered from ransomware

without paying fines.

Sensitive Data Exposure

Insurance company finding 1000’s of files with

exposed PII.

Data Trespassing

Employee consuming 20% of file share with

home movies.

IP Theft / Corporate Espionage

Departing employee moving files to Dropbox,

then performing mass delete of files.

Illegal Exporting

Data moving to cloud in violation of regulatory

requirements.

041/24/2017Company Confidential

Page 5: E-Safe Technologies · Virtualized Data Provides Unique Opportunities and Obstacles Data Security Start and Ends with Data It is Difficult to Protect Data if You Don’t Understand

© 2017 DataGravity Inc.

BEHAVIORAL BASED DATA PROTECTION

DataGravity can enable data snapshots based on

anomalous user activities to proactively protect

customers.

Example ScenarioExample Scenario

User downloads malicious malware that

invokes a ransomware attack.

Attack starts to encrypt documents and files the

user has access on the corporate file shares.

DataGravity is proactively monitoring user activity

and takes action to mitigate attack by:

- Taking a Snapshot

- Blocking User Access

- Alarming to administrator

- Providing detailed list of files to recover from

last known good point in time

- Recover from within the tool

Minimal impact to business is achieved

resulting in a happy customer.

051/24/2017Company Confidential

Page 6: E-Safe Technologies · Virtualized Data Provides Unique Opportunities and Obstacles Data Security Start and Ends with Data It is Difficult to Protect Data if You Don’t Understand

© 2017 DataGravity Inc.

HIGH LEVEL ARCHITECTURE – CONTENT ANALYSIS

07

Page 7: E-Safe Technologies · Virtualized Data Provides Unique Opportunities and Obstacles Data Security Start and Ends with Data It is Difficult to Protect Data if You Don’t Understand

© 2017 DataGravity Inc.

HIGH LEVEL ARCHITECTURE

PUTTING IT ALL TOGETHER

08

Page 8: E-Safe Technologies · Virtualized Data Provides Unique Opportunities and Obstacles Data Security Start and Ends with Data It is Difficult to Protect Data if You Don’t Understand

© 2017 DataGravity Inc.

HIGH LEVEL ARCHITECTURE

ACTION FRAMEWORK

09

Actions: - In response to a trigger- Admin configurable- Can take the form of notification,

administrative action, or behavior based protection point

- Designed to be extensible- A single trigger can cause multiple

actions to occur

Triggers:- Content-based evaluated at DP time- Behavior-based evaluated near real-time- Built-in evaluated near real-time

Page 9: E-Safe Technologies · Virtualized Data Provides Unique Opportunities and Obstacles Data Security Start and Ends with Data It is Difficult to Protect Data if You Don’t Understand

© 2017 DataGravity Inc.

INTEGRATIONS

10

• Strong overlap with storage and ecosystem partners where additional benefits can be gained with deeper integration.

Page 10: E-Safe Technologies · Virtualized Data Provides Unique Opportunities and Obstacles Data Security Start and Ends with Data It is Difficult to Protect Data if You Don’t Understand

© 2017 DataGravity Inc.

DATAGRAVITY FOR VIRTUALIZATION

CAPABILITIES / EDITIONS

11

Page 11: E-Safe Technologies · Virtualized Data Provides Unique Opportunities and Obstacles Data Security Start and Ends with Data It is Difficult to Protect Data if You Don’t Understand

© 2017 DataGravity Inc.

SUMMARY

Virtualized Data Provides Unique

Opportunities and Obstacles Data Security Start and

Ends with Data

It is Difficult to Protect Data if

You Don’t Understand it

14

100%of organizations

who have data have

a data security problem.

DataGravity is the

only company that

that helps secure

and protect data

where it lives