Upload
iscan-online-inc
View
103
Download
3
Tags:
Embed Size (px)
Citation preview
DATA BREACH RISK INTELLIGENCEFOR HIGHER ED
Financial prioritization of data breach risk in the language of the C-suite
WHY?Almost 1 million records were stolen from just the top five universities breached in 2014. Data breaches are becoming front and center in Boardrooms at Higher Ed institutions.…Yet data breach tools are developed for yesterday’s IT.
Slow, disruptive to students & staff
Discover data or vulnerabilities, but not
both
Results not ready for CFO and Board presentations
False positives, unable to scan largest servers
Not effective on Mac and other platforms
ISCAN RISK INTELLIGENCE
in dollars prioritized real-time trends
Financial prioritization of data breach risk in the language of the C-suite
One tool does it all •Sensitive data •Who has access •Vulnerabilities
Know your security number Dollar value of risk liability per device
Actionable intelligence Total risk exposure of organization
C-level ready dashboard •Evidence of impact •Board oversight
ISCAN ANSWERS KEY QUESTIONS FOR CISOS
What data is at risk and who has access?
How can attackers get
to it?
What will it cost when breached?
HOW ISCAN IS DIFFERENT• Deploys rapidly, scans are faster and more accurate • Detects big 3: sensitive data, access permissions and
vulnerabilities • Admins can find hacker traps• Provides actionable intelligence and financially
prioritizes data breach risk • C-suite ready dashboard puts a dollar number on
your risk exposure • Works well with popular education environments/
devices like Mac, iO, Ubuntu and Linux choices
All in one tool
HOW DO WE DO IT? PATENTED AGENTLESS DISCOVERY
Mobile app
Command line
Constant auto assessment across all device types Cloud-based lightweight deployment with same day results Millions of devices at one time
Active directory
Potential liability $ Data at Risk • Social Security
numbers • Driver’s licenses • Birthdates • Telephone numbers • Credit card numbers • Bank accounts • Intellectual property • Sensitive files
DATA BREACH RISK REPORTPER DEVICE
Vulnerabilities By severity By vendor Unauthorized access Configurations
INTELLIGENCE DASHBOARD
Like a Google map of your assets Immediate liability costs/prioritization displayed for decision-making Trends for tracking the impact of initiatives Ready for the Boardroom
INTEGRATION
Works with existing technology investments in Systems Management and RMM tools
iScan Leading competitor
Automatically find SSNs, IDs, Bank Accounts, Driver Licenses, Dates of Birth, Phone Numbers, Addresses, Passports, Intellectual Property, Credit Cards, Patient Health Info
Find file patterns and MD5/SHA hashes – finds data theft artifacts, such as Cryptolocker, and use for incidence response
Search files, e-mails and attachments on:•File servers• .zip files•Outlook, Thunderbird, Apple Mail +•Cloud storage folders including Dropbox, Skydrive, Google Drive, Box, Amazon Cloud Drive, and more •NAS
Search files on websites *
Search even the largest servers (1 TB+)
Schedule searches **
HOW WE COMPARE 1/3
* iScan searches the databases where form fill data resides ** iScan integrates with existing infrastructure for scheduled searches
iScan Leading competitor
Works on:•Windows XP - 8.1•Windows Server - 2003 – 2012•Linux 64 bit - RHEL 5+•Mac OS X
Works on:•CentOS 5+ Linux•Oracle Linux•Ubuntu•Fedora
Works on mobile devices like tablets and smartphones•Apple iOS 5 +•Android 2.3 +
Effectively search both Mac and PC platforms
Manage data discovery without an agent
Non-intrusive, does not require scaling down resources on device
HOW WE COMPARE 2/3
HOW WE COMPARE 3/3 iScan Leading competitor
View and manage by university, department or any sub group
Audit 3rd party devices “on the fly”
Receive results in your inbox daily
Fastest scanning available
Same day scalable implementation and results
Vulnerability scanning (How will data be breached)
View file permission access to sensitive data
Automatically calculates dollar value liability & financially prioritizes
Trend charts for monitoring impact
Intelligence dashboard for C-suite
One tool for data, access & vulnerabilities, and C-suite dashboard
IVY LEAGUE UNIVERSITY
“We use iScan to report the financial impact to our Boardroom. It also empowers our students to self-assess their computers.”
LIBERAL ARTS UNIVERSITY
“We chose iScan Online as the only vendor that could complete the discovery of sensitive data on our multi-terabyte servers.”
RECOGNITION
Industry Innovator: Analysis & Control
REMOTE SECURITY SELF-ASSESSMENT FRAMEWORK
Patent 9,032,520Patent 8,819,773
TRY US FOR FREE
Sign up at https://app.iscanonline.com/
THANK YOU
iscanonline.com