17
DATA BREACH RISK INTELLIGENCE FOR HIGHER ED Financial prioritization of data breach risk in the language of the C-suite

Data Breach Risk Intelligence for Higher Education

Embed Size (px)

Citation preview

Page 1: Data Breach Risk Intelligence for Higher Education

DATA BREACH RISK INTELLIGENCEFOR HIGHER ED

Financial prioritization of data breach risk in the language of the C-suite

Page 2: Data Breach Risk Intelligence for Higher Education

WHY?Almost 1 million records were stolen from just the top five universities breached in 2014. Data breaches are becoming front and center in Boardrooms at Higher Ed institutions.…Yet data breach tools are developed for yesterday’s IT.

Slow, disruptive to students & staff

Discover data or vulnerabilities, but not

both

Results not ready for CFO and Board presentations

False positives, unable to scan largest servers

Not effective on Mac and other platforms

Page 3: Data Breach Risk Intelligence for Higher Education

ISCAN RISK INTELLIGENCE

in dollars prioritized real-time trends

Financial prioritization of data breach risk in the language of the C-suite

One tool does it all •Sensitive data •Who has access •Vulnerabilities

Know your security number Dollar value of risk liability per device

Actionable intelligence Total risk exposure of organization

C-level ready dashboard •Evidence of impact •Board oversight

Page 4: Data Breach Risk Intelligence for Higher Education

ISCAN ANSWERS KEY QUESTIONS FOR CISOS

What data is at risk and who has access?

How can attackers get

to it?

What will it cost when breached?

Page 5: Data Breach Risk Intelligence for Higher Education

HOW ISCAN IS DIFFERENT• Deploys rapidly, scans are faster and more accurate • Detects big 3: sensitive data, access permissions and

vulnerabilities • Admins can find hacker traps• Provides actionable intelligence and financially

prioritizes data breach risk • C-suite ready dashboard puts a dollar number on

your risk exposure • Works well with popular education environments/

devices like Mac, iO, Ubuntu and Linux choices

All in one tool

Page 6: Data Breach Risk Intelligence for Higher Education

HOW DO WE DO IT? PATENTED AGENTLESS DISCOVERY

Mobile app

Command line

Constant auto assessment across all device types Cloud-based lightweight deployment with same day results Millions of devices at one time

Active directory

Page 7: Data Breach Risk Intelligence for Higher Education

Potential liability $ Data at Risk • Social Security

numbers • Driver’s licenses • Birthdates • Telephone numbers • Credit card numbers • Bank accounts • Intellectual property • Sensitive files

DATA BREACH RISK REPORTPER DEVICE

Vulnerabilities By severity By vendor Unauthorized access Configurations

Page 8: Data Breach Risk Intelligence for Higher Education

INTELLIGENCE DASHBOARD

Like a Google map of your assets Immediate liability costs/prioritization displayed for decision-making Trends for tracking the impact of initiatives Ready for the Boardroom

Page 9: Data Breach Risk Intelligence for Higher Education

INTEGRATION

Works with existing technology investments in Systems Management and RMM tools

Page 10: Data Breach Risk Intelligence for Higher Education

iScan Leading competitor

Automatically find SSNs, IDs, Bank Accounts, Driver Licenses, Dates of Birth, Phone Numbers, Addresses, Passports, Intellectual Property, Credit Cards, Patient Health Info

Find file patterns and MD5/SHA hashes – finds data theft artifacts, such as Cryptolocker, and use for incidence response

Search files, e-mails and attachments on:•File servers• .zip files•Outlook, Thunderbird, Apple Mail +•Cloud storage folders including Dropbox, Skydrive, Google Drive, Box, Amazon Cloud Drive, and more •NAS

Search files on websites *

Search even the largest servers (1 TB+)

Schedule searches **

HOW WE COMPARE 1/3

* iScan searches the databases where form fill data resides ** iScan integrates with existing infrastructure for scheduled searches

Page 11: Data Breach Risk Intelligence for Higher Education

iScan Leading competitor

Works on:•Windows XP - 8.1•Windows Server - 2003 – 2012•Linux 64 bit - RHEL 5+•Mac OS X

Works on:•CentOS 5+ Linux•Oracle Linux•Ubuntu•Fedora

Works on mobile devices like tablets and smartphones•Apple iOS 5 +•Android 2.3 +

Effectively search both Mac and PC platforms

Manage data discovery without an agent

Non-intrusive, does not require scaling down resources on device

HOW WE COMPARE 2/3

Page 12: Data Breach Risk Intelligence for Higher Education

HOW WE COMPARE 3/3 iScan Leading competitor

View and manage by university, department or any sub group

Audit 3rd party devices “on the fly”

Receive results in your inbox daily

Fastest scanning available

Same day scalable implementation and results

Vulnerability scanning (How will data be breached)

View file permission access to sensitive data

Automatically calculates dollar value liability & financially prioritizes

Trend charts for monitoring impact

Intelligence dashboard for C-suite

One tool for data, access & vulnerabilities, and C-suite dashboard

Page 13: Data Breach Risk Intelligence for Higher Education

IVY LEAGUE UNIVERSITY

“We use iScan to report the financial impact to our Boardroom. It also empowers our students to self-assess their computers.”

Page 14: Data Breach Risk Intelligence for Higher Education

LIBERAL ARTS UNIVERSITY

“We chose iScan Online as the only vendor that could complete the discovery of sensitive data on our multi-terabyte servers.”

Page 15: Data Breach Risk Intelligence for Higher Education

RECOGNITION

Industry Innovator: Analysis & Control

REMOTE SECURITY SELF-ASSESSMENT FRAMEWORK

Patent 9,032,520Patent 8,819,773

Page 16: Data Breach Risk Intelligence for Higher Education

TRY US FOR FREE

Sign up at https://app.iscanonline.com/

Page 17: Data Breach Risk Intelligence for Higher Education

THANK YOU

iscanonline.com