SlideShare a Scribd company logo
1 of 40
Download to read offline
What’s Wild Within
Chapter One: Data Sprawl.......................................................5
How to Capture Endpoint Data and Achieve Full Visibility................................7
1) Capture data from all devices...............................................................................8
2) Frequently capture changes to data................................................................9
3) View all data activity.................................................................................................10
Chapter Two: Wrong Data in the Wrong Hands...........13
How to Prevent Data Exposure by Controlling Activity.....................................15
1) Control access and sharing with policies.....................................................16
2) Restrict activity by file classification...............................................................17
3) Block data access by any unauthorized application............................18
Chapter Three: Litigation and Compliance........................21
How to Gather and Provide Data for eDiscovery..................................................23
1) Gather and provide data to your legal team............................................24
2) Track data usage.........................................................................................................25
3) Locate deleted files...................................................................................................26
Chapter Four: Lost, Stolen and Damaged Devices.....29
How to Survive the Loss or Theft of a Device...........................................................31
1) Locate the misplaced laptop and prevent data breach....................32
2) Restore data and provide ongoing data access.....................................33
3) Make sure your users back up their data....................................................34
Text
A Survival Guide for
Defending Data in the Wild
It’s a wild world outside the corporate firewall.
Protecting data for your entire company is a heavy responsibility.
There’s the employee who leaves his laptop in the airport.
And the former employee who still has access to corporate data
from her personal device. Or the ever-present danger of litigation.
You’re accountable for a wide range of scenarios that put
your corporate data at risk.
Fortunately, you don’t have to go it alone. Learn from
the experience of others to ensure that you’re prepared for every
threat to your corporate data in the wild. With step-by-step
instructions, this Survival Guide is your most valuable
tool for keeping corporate assets out of harm’s way.
CHAPTER ONE
The Threat: Data Sprawl
Capturing data and maintaining
visibility into how it changes
Chapter 1 – Data Sprawl
14 months from now, there will
be twice as much data in your
organization as there is now.
Corporate users generate more data than
ever before. Emails, documents, spreadsheets,
presentations and more. Each file is typically
replicated countless times as users collaborate and
store data on multiple devices. With an average of
3.3 connected devices per employee, data resides
on laptops, smartphones, and tablets with different
operating systems. Sometimes, they’re users’
personal devices.
Do you know, with total certainty, what data is
being created, where it’s located, or how it’s being
accessed and shared? Honestly? To gain full visibility
into how endpoint corporate data is moving and
being used in your enterprise, you need a way to
centrally capture it. Quickly and frequently. Wherever
users are working.
Chapter 1 – Data Sprawl
How to Capture Endpoint Data
and Achieve Full Visibility
In addition to their company-issued laptops, your company’s
executives also use tablets and smartphones while on-the-go.
Working from conference centers, hotels, airports, client sites,
and more places in the wild, users connect to networks which
are frequently weak and unpredictable. Despite all of these
variables, you can defend their data with the right tool.
How to Capture Endpoint Data
and Achieve Full Visibility
Capture data from all devices
Capture data from heterogeneous devices. To gain
visibility into users’ activity on all of their devices,
you need to capture data from all of those devices —
regardless of manufacturer or operating system.
Containerize and capture data on BYOD devices.
Personal device use presents unique challenges due
to the intermixing of personal and work data.
By containerizing corporate data and capturing
changes from personal devices, you can see what, how,
and when changes happen without affecting
end user privacy.
1
Chapter 1 – Data Sprawl
Frequently capture changes to data
Speed up data capture processes. To provide
visibility into minute-by-minute changes, data capture
must be persistent and fast. About 80% of data is
duplicated. Deduplicating data globally across all
enterprise devices avoids inefficient transfer of the
same data over and over.
Reduce the impact of data capture on users.
If frequent data capture interrupts users, they may
try to disable capture processes. WAN optimization
automatically detects network changes and adjusts
bandwidth usage accordingly. So, data transfers
happen seamlessly and without disruption.
Make sure data capture completes successfully.
When users go mobile, you can’t guarantee that data
capture will fully complete before they disconnect from
their current network. With auto-resume functionality,
data capture will pick up where it left off as soon as a
new connection is detected.
2
Chapter 1 – Data Sprawl
Chapter 1 – Data Sprawl
View all data activity
Gain insight into all data on endpoints. By frequently
capturing data, you can see what data is created, how
users are accessing it, and where it’s located.
See how data is moving. Know exactly how users are
duplicating, downloading, and restoring data across all
their devices with minute-by-minute data capture.
A detailed log of changes provides you a complete
picture of data usage.
See how data is shared. By capturing how data is being
shared, you can gain visibility into which files have been
shared with internal and external users, who those users
are, how many times the file has been downloaded, and
whether external collaborators still have access. Granular
visibility like this lets you control access or provide
information during eDiscovery.
3
of the global workforce
works from multiple locations
in a given work week.57%
— Forrester Research, “Backup for Today’s Mobile Enterprise,” 2013
Chapter 1 – Data Sprawl
Devices Used for Work
63%
7%
12%
5%
13%
MS Windows and Phone
Google Android
Apple OS X and iOS
RIM Blackberry
Other/Unknown
— Forrester Research, “Redefine Your Workforce Computing
Policy To Empower Employees,” 2012
CHAPTER TWO
The Threat: Wrong Data in the
Wrong Hands
Controlling access and sharing
Controlling how your users create,
access, and share data is essential.
With the proliferation of data and devices, it’s all too
easy for data to fall into the wrong hands. You need
the ability to control who can do what and when.
Data defense might combat malicious activity by
a former employee that puts thousands of dollars’
worth of research data at risk. But, 36% of data
breaches are the result of inadvertent misuse. So
you also need the ability to prevent damage from
innocent mistakes by authorized users, such as
sharing the wrong file or accidentally emailing a file
to the wrong recipient.
Chapter 2 – Wrong Data in the Wrong Hands
— Forrester, “Understand the State of Data Security and Privacy, 2013-2014,” 2014
of data breaches are the result of
abuse by malicious insiders25%
How to Prevent Data Exposure
by Controlling Activity
Today, your employees often collaborate with each other,
external contractors, third-party vendors, customers, and
more. So, there’s a real risk that data may be shared with the
wrong person—either inadvertently or deliberately. Secure
collaboration is critical to productivity and innovation. With so
much data, multiple versions of files, employee turnover, and
the existence of personal file sharing tools, you need to be able
to effectively control activity to prevent data exposure.
Chapter 2 – Wrong Data in the Wrong Hands
How to Prevent Data Exposure
by Controlling Activity
Today, your employees often collaborate with each other,
external contractors, third-party vendors, customers, and
more. So, there’s a real risk that data may be shared with the
Chapter 2 – Wrong Data in the Wrong Hands
Control access and sharing with policies
Restrict data access. Establish user- and
device-based policies to control mobile access,
BYOD usage, and more. This will help ensure that only
the right people have access to data.
Prevent unauthorized data distribution. Control
permissions to mandate that only authorized individuals
can share data and specify whether they can share data
outside the organization. Restrict files to view-only or set
automatic link expiration for files shared externally.
Revoke data access. Sometimes data is shared with the
wrong person or should no longer be accessible. Being
able to immediately revoke access privileges lets you
prevent inappropriate access to files.
1 Control access and sharing with polic
Chapter 2 – Wrong Data in the Wrong Hands
Restrict activity by file classification
Specify file properties. Classify files to ensure
effective information rights management.
Specifying file properties enables you to control
and restrict how files can be viewed, edited,
and distributed.
Limit activity based on file properties. Once
you’ve specified file properties, create rules to
limit data usage by properties such as geographic
location, time of day, confidentiality level, version,
and more. For example, if only your U.S.-based
staff is supposed to have access to certain
documents, you can be confident that those
documents will not be available to those outside
U.S. borders.
Control all aspects of data usage. Achieve
granular control over all aspects of file usage,
beyond whether it can be viewed or shared.
Depending on your compliance requirements, you
can disable copy and paste, prevent screenshots,
enable offline viewing for a certain number of
hours, set classified files to self-destruct after a
period of time, and more.
2
Chapter 2 – Wrong Data in the Wrong Hands
Block data access by any
unauthorized application
Prevent employees from sharing with personal tools.
With the proliferation of personal file sharing tools,
it’s tempting for users to employ their own methods
to share corporate data. This introduces risk to data
security and protection. Blocking access to and
sharing of files by any unauthorized service helps you
safeguard confidential information.
Control mobile sharing. Mobile devices present unique
challenges versus laptops when it comes to accessing
and sharing data. You should be able to allow users
to access their data on mobile devices and share it
through approved channels while blocking distribution
of data through unauthorized apps.
3
Most Common Ways
Users Store and Access
Files on Multiple PCs,
Smartphones, or Tablets
In their quest to easily access their
data from multiple devices, users
resort to activities that leave data
unprotected and at risk.
USB flash drive or CD/DVD
Email attachments to myself
Network shared drive
File sync, sharing, or online
locker service
Web-based office
productivity suite
— Forrester, “Understand the State of Data Security and
Privacy, 2013-2014,” 2014
1
2
3
4
5
Chapter 2 – Wrong Data in the Wrong Hands
CHAPTER THREE
The Threat: Litigation &
Compliance
Maintaining litigation and compliance readiness
to save future cost, time and headaches
eDiscovery and compliance are
scary topics.
They involve time-consuming and expensive processes.
They’re complicated by data dispersed across myriad
endpoint devices. They are the bane of IT’s existence.
Only 28% of CIOs believe their mobile security policies
would satisfy an auditor2
. Protecting data on endpoints
is now about more than just back up. Capturing and
tracking data on these devices to enable eDiscovery
and compliance is critical. By being litigation-ready,
you can save hours of IT and legal time, reduce the
overall cost of gathering data for legal hold, and ensure
all relevant data is effectively gathered for lawsuits
and audits.
2
Gartner, “CIO Attitudes Toward Consumerization of
Mobile Devices and Applications,” 2011
Chapter 3 – Litigation & Compliance
How to Gather and Provide
Data for eDiscovery
It’s happened: your company has been served legal
notice. The legal department has come to you
with a list of users to put on legal hold. You have to gather and
provide all relevant data. It doesn’t have to be a nightmare, though.
With the right survival tips, you can be fully prepared when
litigation and compliance issues strike.
Chapter 3 – Litigation & Compliance
How to Gather and Provide
Data for eDiscovery
It’s happened: your company has been served legal
notice The leg l dep rtment h come to o
Chapter 3 – Litigation & Compliance
Gather and provide data to your
legal team
Capture endpoint data to a centralized data store.
This will give you full visibility, and you’ll be prepared
for litigation before it happens.
Locate the data belonging to the users in question.
Determine custodians whose data needs to be put on
legal hold, then find these users by federated search
or list import.
Place legal holds on captured data. Suspend data
retention policies and preserve the content in place
to ensure it remains securely stored and unchanged.
Hold data until ready for review by legal teams.
Keep users on legal hold for an indefinite amount of
time until legal is ready to review stored data. All past
data will be preserved, and any new data created by
users can also be secured.
Provide data to legal teams. Activate access for legal
administration to review data that you’ve put on legal
hold. From there, data can be transferred into an
eDiscovery system, enabling the downstream
legal process of review and tagging to begin.
1
Chapter 3 – Litigation & Compliance
Track data usage
Find out how users have been sharing and
modifying data. With user audit trails, you’ll have
a stream of all user activity for full insight into all
aspects of sharing and access.
See activity for specific files and folders.
See the who, when and how of specific files
or folders. Know which have been shared,
downloaded, restored, accessed from a mobile
device, and/or deleted.
See how users have been sharing data with
external users. If your employees have been
collaborating with external users, see which files
have been shared and which ones have been
downloaded.
Don’t forget about admin activity. Users aren’t
the only ones you need to track for compliance
purposes. Use admin audit trails for an undeletable
stream of activity, including creating, modifying
or deleting a profile, downloading a file, updating
a user, adding or updating an admin and
restoring data.
2
Chapter 3 – Litigation & Compliance
Locate deleted files
Keep past copies of all data. Restoring previous file
versions or deleted files can be just as important as
putting data on legal hold. Configure data retention
policies to ensure your backup tool keeps copies of all
past data, even if it’s been deleted.
Locate the files in question. Use federated search to
locate the files by criteria such as file name, type, user,
and date.
Restore previous versions of files. By saving snapshots
of files over time, you can locate and restore previous
file versions to see how they have been modified. You
can even restore files that belonged to employees who
are no longer with the company.
3
Chapter 3 – Litigation & Compliance
IT’s Worst Nightmares
Forgetting to wear pants to work
Having the CEO’s computer crash
in the middle of a board meeting
Upgrading all the company’s machines
to a new OS
Having employees fall for a
phishing scam
Getting a notice from legal to
preserve data for litigation
5
4
3
2
1
CHAPTER FOUR
The Threat: Lost, Stolen, and
Damaged Devices
Escaping data breach and lost productivity when
devices are lost, stolen, or damaged
75% of today’s workforce is mobile.3
Your corporate data is moving around like never before.
Employees store all kinds of data on laptops and mobile
devices because those are the devices that they primarily use.
In fact, Gartner calculates that 28% of corporate data is stored
exclusively on endpoint devices. However, employees don’t
think about what would happen if their devices were damaged
or broken—and sometimes, neither does IT. In fact, only 35% of
enterprise laptops are backed up4
.
Losing a laptop can result in extensive employee downtime.
It can also lead to data breach if devices fall into the wrong
hands. With the average cost of recovering from a single
corporate data breach at $7.2 million5
, it’s a risk your
organization can’t afford to take. The wild can be a
savage, unforgiving place.
3
IDC, “Worldwide Mobile Worker Population 2009-2013 Forecast,” 2010
4
ESG
5
Ponemon Institute, “2010 Annual Study: U.S. Cost of a Data Breach,” 2010
Chapter 4 – Lost, Stolen and Damaged Devices
How to Survive the Loss or
Theft of a Device
Here’s a typical scenario: you get a call from one of
your salespeople, saying that he’s lost his laptop. He
thinks he might have left it at airport security, but when
he goes back to check, it’s not there. The way in which
you’re able to respond to this situation can spell the
difference between survival and extinction.
Chapter 4 – Lost, Stolen and Damaged Devices
of a DeviceTheft
Chapter 4 – Lost, Stolen and Damaged Devices
Locate the misplaced laptop and
prevent data breach
Determine the location of the device. Use geolocation
to pinpoint the exact location of a lost or stolen device.
You should be able to determine the location of the
device within three to six feet, so if it’s still in the airport
you’ll be able to tell whether it’s at security, in the
bathroom, or in lost and found.
Retrieve the device if possible. If the device is
somewhere you or the salesperson can safely retrieve
it, then go and collect your property. However, if
the device is sitting on the tarmac, in the garbage
disposal, or in a thief’s car headed away from the airport,
recognize that it’s out of your reach and don’t attempt to
reclaim it.
Remotely wipe corporate data. If you’re unable to
retrieve the device, initiate a remote wipe so that all
corporate data will be removed the next time the
device connects to the Internet.
1
Chapter 4 – Lost, Stolen and Damaged Devices
Restore data and provide
ongoing data access
Get the user back to work immediately. With a web
client and mobile apps, the user can get back to work
with a spare laptop, personal tablet, smartphone, or
public computer.
Let users self-restore data and settings. Once the
user has a new laptop, let them restore data and
settings themselves. This reduces the time that your
team has to spend getting them back up and
running again.
Don’t wait for data to fully restore. Enable the user to
get back to work right away with a backup tool that
restores the most important files first. Users can start
working on their priority files while remaining files
restore in the background.
Provide the user with a familiar working environment.
Restore personal settings as well as data. Users can set
right to work without spending time bookmarking their
most-visited sites again, setting up mail preferences, or
restoring their favorite screensaver.
2
Chapter 4 – Lost, Stolen and Damaged Devices
Make sure your users back up their data
Recognize that you can’t rely on your users to actively
back up their own data. Whether it’s data on a coffee-
damaged laptop or files that have been accidentally
deleted, the key to retrieving lost data is to ensure
that the data is continuously backed up. The best
solution is an automatic backup that runs invisibly in
the background, without interrupting users.
Decide how frequently data should be backed up.
You can control the specifics of how data is backed up,
such as frequency and over what types of networks
(for example, avoiding backups over cellular networks).
Select the most important folders to back up.
Make sure users’ most important data is backed up
by selecting specific folders (such as My Documents)
for backup.
Give your users the ability to back up additional data,
at your discretion. You can give users as much or as
little control over what they back up as company policy
dictates. Let them add folders and files for backup if this
is permitted. If you don’t want them backing up home
videos, music files and personal photos, exclude those
file types from backup.
3
Where Laptops Are Lost
US Airports with
Highest Weekly Frequency of Laptop Loss
6
7
8
9
10
43%
12%
33%
12%
Off-site Workplace
In transit Unknown
— Ponemon Institute, “The Billion Dollar Lost Laptop Problem,” 2010.
— Ponemon Institute, “Airport Insecurity: The Case of Missing & Lost Laptops,” 2008
LAX
Los Angeles International
MIA
Miami International
JFK
John F. Kennedy International
ORD
Chicago O’Hare International
EWR
Newark Liberty International
LGA
New York La Guardia
DTW
Detroit Metropolitan Wayne County
DCA
Ronald Reagan Washington National
ATL
Hartsfield-Jackson Atlanta International
IAD
Washington Dulles International
1
2
3
4
5
Chapter 4 – Lost, Stolen and Damaged Devices
TECHNIQUES FOR BRINGING
A DEVICE BACK TO LIFE
THAT YOU
SHOULDN’T TRY
• Submerge the device in rice
• Use a vacuum cleaner to suck out
the water
• Clean the inside of the device with
rubbing alcohol
• Dry the device off with a hair dryer
• Microwave the device to evaporate
the water
Chapter 4 – Lost, Stolen and Damaged Devices
CONCLUSION
There are a lot of threats to
data in the wild; make sure your
data is defended.
We hope this Guide gives you a fresh
perspective on the current endpoint data
protection landscape. Protecting and governing
corporate data requires experience, cunning
and resourcefulness. You can venture into the
wild alone, or trust a partner uniquely qualified
to see you safely through. To learn how Druva
can be your critical key to survival, visit
wild.druva.com. To learn more about Druva
inSync, visit druva.com/insync.
© 2014 Druva. All rights reserved. 6/14
CORPORATE HEADQUARTERS
United States
150 Mathilda Place, Suite 450
Sunnyvale, CA 94086
Main: +1 888-248-4976
Sales: +1 800-375-0160
WORLDWIDE LOCATIONS
Singapore
The Co, 75 High Street
Singapore 179435
Sales: +65 3158 5080
Australia
Sales: +1 300-361-685
India
Muttha Chambers II, Level VI
Senapati Bapat Marg
Pune, India 411016
Main: +91 (0) 20 672 63 300
Sales: +91 (0) 20 672 63 395
Fax: +91 (0) 20 672 63 321
Europe
1 Furzeground Way
(Stockley Park)
Uxbridge, UB11 1BD, UK
Sales: +44 (0) 20 3150 1722

More Related Content

What's hot

Is your infrastructure holding you back?
Is your infrastructure holding you back?Is your infrastructure holding you back?
Is your infrastructure holding you back?Gabe Akisanmi
 
Data set The Future of Big Data
Data set The Future of Big DataData set The Future of Big Data
Data set The Future of Big DataData-Set
 
10 Hottest trends in corporate digitisation
10 Hottest trends in corporate digitisation10 Hottest trends in corporate digitisation
10 Hottest trends in corporate digitisationFuji Xerox Asia Pacific
 
Speaker Kiersten E. Todt, President and Managing Partner, Liberty Group Ventu...
Speaker Kiersten E. Todt, President and Managing Partner, Liberty Group Ventu...Speaker Kiersten E. Todt, President and Managing Partner, Liberty Group Ventu...
Speaker Kiersten E. Todt, President and Managing Partner, Liberty Group Ventu...Investorideas.com
 
Symantec Intelligence Report: May 2015
Symantec Intelligence Report: May 2015Symantec Intelligence Report: May 2015
Symantec Intelligence Report: May 2015Symantec
 
Should we fear the cloud?
Should we fear the cloud?Should we fear the cloud?
Should we fear the cloud?Gabe Akisanmi
 
Data Protection Maturity Survey Results 2013
Data Protection Maturity Survey Results 2013 Data Protection Maturity Survey Results 2013
Data Protection Maturity Survey Results 2013 - Mark - Fullbright
 
Predicting Mission Success through Improved Data Collection, Reuse and Analysis
Predicting Mission Success through Improved Data Collection, Reuse and AnalysisPredicting Mission Success through Improved Data Collection, Reuse and Analysis
Predicting Mission Success through Improved Data Collection, Reuse and AnalysisBooz Allen Hamilton
 
The Rise of Big Data and the Chief Data Officer (CDO)
The Rise of Big Data and the Chief Data Officer (CDO)The Rise of Big Data and the Chief Data Officer (CDO)
The Rise of Big Data and the Chief Data Officer (CDO)gcharlesj
 
Customer Experience Interactions - What’s at the top of your list?
Customer Experience Interactions - What’s at the top of your list?Customer Experience Interactions - What’s at the top of your list?
Customer Experience Interactions - What’s at the top of your list?Fuji Xerox Asia Pacific
 
eBook | Reimagine the Future of Healthcare
eBook | Reimagine the Future of Healthcare eBook | Reimagine the Future of Healthcare
eBook | Reimagine the Future of Healthcare Insight
 
The economist intelligence_unit_
The economist intelligence_unit_The economist intelligence_unit_
The economist intelligence_unit_Ali Reza Bakhshi
 
Big Data Analytics PowerPoint Presentation Slides
Big Data Analytics PowerPoint Presentation Slides Big Data Analytics PowerPoint Presentation Slides
Big Data Analytics PowerPoint Presentation Slides SlideTeam
 
Infographic: Symantec Healthcare IT Security Risk Management Study
Infographic: Symantec Healthcare IT Security Risk Management StudyInfographic: Symantec Healthcare IT Security Risk Management Study
Infographic: Symantec Healthcare IT Security Risk Management StudyCheapSSLsecurity
 
11 Principles of Applied Analytics
11 Principles of Applied Analytics11 Principles of Applied Analytics
11 Principles of Applied AnalyticsGeorgian
 
Data Has A Shelf Life: Why You Should Be Thinking About Real-Time Analytics
Data Has A Shelf Life: Why You Should Be Thinking About Real-Time AnalyticsData Has A Shelf Life: Why You Should Be Thinking About Real-Time Analytics
Data Has A Shelf Life: Why You Should Be Thinking About Real-Time AnalyticsBernard Marr
 
Losing the Cyber Culture War in Healthcare: Accenture 2018 Healthcare Workfor...
Losing the Cyber Culture War in Healthcare: Accenture 2018 Healthcare Workfor...Losing the Cyber Culture War in Healthcare: Accenture 2018 Healthcare Workfor...
Losing the Cyber Culture War in Healthcare: Accenture 2018 Healthcare Workfor...accenture
 

What's hot (20)

Is your infrastructure holding you back?
Is your infrastructure holding you back?Is your infrastructure holding you back?
Is your infrastructure holding you back?
 
Which type of mobile worker are you?
Which type of mobile worker are you?Which type of mobile worker are you?
Which type of mobile worker are you?
 
Data set The Future of Big Data
Data set The Future of Big DataData set The Future of Big Data
Data set The Future of Big Data
 
10 Hottest trends in corporate digitisation
10 Hottest trends in corporate digitisation10 Hottest trends in corporate digitisation
10 Hottest trends in corporate digitisation
 
Speaker Kiersten E. Todt, President and Managing Partner, Liberty Group Ventu...
Speaker Kiersten E. Todt, President and Managing Partner, Liberty Group Ventu...Speaker Kiersten E. Todt, President and Managing Partner, Liberty Group Ventu...
Speaker Kiersten E. Todt, President and Managing Partner, Liberty Group Ventu...
 
Symantec Intelligence Report: May 2015
Symantec Intelligence Report: May 2015Symantec Intelligence Report: May 2015
Symantec Intelligence Report: May 2015
 
Should we fear the cloud?
Should we fear the cloud?Should we fear the cloud?
Should we fear the cloud?
 
Data Protection Maturity Survey Results 2013
Data Protection Maturity Survey Results 2013 Data Protection Maturity Survey Results 2013
Data Protection Maturity Survey Results 2013
 
Predicting Mission Success through Improved Data Collection, Reuse and Analysis
Predicting Mission Success through Improved Data Collection, Reuse and AnalysisPredicting Mission Success through Improved Data Collection, Reuse and Analysis
Predicting Mission Success through Improved Data Collection, Reuse and Analysis
 
The Rise of Big Data and the Chief Data Officer (CDO)
The Rise of Big Data and the Chief Data Officer (CDO)The Rise of Big Data and the Chief Data Officer (CDO)
The Rise of Big Data and the Chief Data Officer (CDO)
 
Customer Experience Interactions - What’s at the top of your list?
Customer Experience Interactions - What’s at the top of your list?Customer Experience Interactions - What’s at the top of your list?
Customer Experience Interactions - What’s at the top of your list?
 
eBook | Reimagine the Future of Healthcare
eBook | Reimagine the Future of Healthcare eBook | Reimagine the Future of Healthcare
eBook | Reimagine the Future of Healthcare
 
The economist intelligence_unit_
The economist intelligence_unit_The economist intelligence_unit_
The economist intelligence_unit_
 
Big Data Analytics PowerPoint Presentation Slides
Big Data Analytics PowerPoint Presentation Slides Big Data Analytics PowerPoint Presentation Slides
Big Data Analytics PowerPoint Presentation Slides
 
Infographic: Symantec Healthcare IT Security Risk Management Study
Infographic: Symantec Healthcare IT Security Risk Management StudyInfographic: Symantec Healthcare IT Security Risk Management Study
Infographic: Symantec Healthcare IT Security Risk Management Study
 
Plan for the Worst; Fight for the Best
Plan for the Worst; Fight for the BestPlan for the Worst; Fight for the Best
Plan for the Worst; Fight for the Best
 
Get Prepared
Get PreparedGet Prepared
Get Prepared
 
11 Principles of Applied Analytics
11 Principles of Applied Analytics11 Principles of Applied Analytics
11 Principles of Applied Analytics
 
Data Has A Shelf Life: Why You Should Be Thinking About Real-Time Analytics
Data Has A Shelf Life: Why You Should Be Thinking About Real-Time AnalyticsData Has A Shelf Life: Why You Should Be Thinking About Real-Time Analytics
Data Has A Shelf Life: Why You Should Be Thinking About Real-Time Analytics
 
Losing the Cyber Culture War in Healthcare: Accenture 2018 Healthcare Workfor...
Losing the Cyber Culture War in Healthcare: Accenture 2018 Healthcare Workfor...Losing the Cyber Culture War in Healthcare: Accenture 2018 Healthcare Workfor...
Losing the Cyber Culture War in Healthcare: Accenture 2018 Healthcare Workfor...
 

Viewers also liked

Cut Off Vampire Appliances' Phantom Loads with Tripp Lite
Cut Off Vampire Appliances' Phantom Loads with Tripp LiteCut Off Vampire Appliances' Phantom Loads with Tripp Lite
Cut Off Vampire Appliances' Phantom Loads with Tripp LiteTripp Lite
 
Complete Guide to Twitter Analytics
Complete Guide to Twitter AnalyticsComplete Guide to Twitter Analytics
Complete Guide to Twitter AnalyticsAref Jdey
 
Las tics de Andres David Valencia (1135997)
Las tics de Andres David Valencia (1135997)Las tics de Andres David Valencia (1135997)
Las tics de Andres David Valencia (1135997)Andres David
 
Squarespace sxsw panel submission 2013-3
Squarespace sxsw panel submission 2013-3Squarespace sxsw panel submission 2013-3
Squarespace sxsw panel submission 2013-3ryanstansky
 
Exposing the Tooling API as a Mountable Filesystem
Exposing the Tooling API as a Mountable FilesystemExposing the Tooling API as a Mountable Filesystem
Exposing the Tooling API as a Mountable FilesystemSalesforce Developers
 
lightspeed-best-practices-for-hiring
lightspeed-best-practices-for-hiringlightspeed-best-practices-for-hiring
lightspeed-best-practices-for-hiringHelen Morris
 
B2B price prediction through crowd sourcing
B2B price prediction through crowd sourcingB2B price prediction through crowd sourcing
B2B price prediction through crowd sourcingEdwin Vlems
 
20131212 BrightTALK: design and data science
20131212 BrightTALK: design and data science20131212 BrightTALK: design and data science
20131212 BrightTALK: design and data scienceDean Malmgren
 
Comunicacion lascaris
Comunicacion lascarisComunicacion lascaris
Comunicacion lascarispao2213llosa
 
Hr Vision Implementers 20090123 Rev1
Hr Vision Implementers 20090123 Rev1Hr Vision Implementers 20090123 Rev1
Hr Vision Implementers 20090123 Rev1amylynkyler
 
Madison campus-and-downtown-apartments-how-well-do-you-know-uw-madison-wi-quiz
Madison campus-and-downtown-apartments-how-well-do-you-know-uw-madison-wi-quizMadison campus-and-downtown-apartments-how-well-do-you-know-uw-madison-wi-quiz
Madison campus-and-downtown-apartments-how-well-do-you-know-uw-madison-wi-quizMadison Campus & Downtown Living
 
The 10 Commandments of Electromagnetic Compatibility
The 10 Commandments of Electromagnetic CompatibilityThe 10 Commandments of Electromagnetic Compatibility
The 10 Commandments of Electromagnetic CompatibilityJaymie Murray
 
El llenguatge dels nous mitjans de comunicació
El llenguatge dels nous mitjans de comunicacióEl llenguatge dels nous mitjans de comunicació
El llenguatge dels nous mitjans de comunicacióanna_arc
 
Antropoliga de san_agustin
Antropoliga de san_agustinAntropoliga de san_agustin
Antropoliga de san_agustinalejapapa
 
Big Design 2012 - Guerrilla Design & Research Methods Workshop
Big Design 2012 - Guerrilla Design & Research Methods WorkshopBig Design 2012 - Guerrilla Design & Research Methods Workshop
Big Design 2012 - Guerrilla Design & Research Methods WorkshopRuss U
 

Viewers also liked (17)

Cut Off Vampire Appliances' Phantom Loads with Tripp Lite
Cut Off Vampire Appliances' Phantom Loads with Tripp LiteCut Off Vampire Appliances' Phantom Loads with Tripp Lite
Cut Off Vampire Appliances' Phantom Loads with Tripp Lite
 
Dinámica
DinámicaDinámica
Dinámica
 
Complete Guide to Twitter Analytics
Complete Guide to Twitter AnalyticsComplete Guide to Twitter Analytics
Complete Guide to Twitter Analytics
 
Las tics de Andres David Valencia (1135997)
Las tics de Andres David Valencia (1135997)Las tics de Andres David Valencia (1135997)
Las tics de Andres David Valencia (1135997)
 
Squarespace sxsw panel submission 2013-3
Squarespace sxsw panel submission 2013-3Squarespace sxsw panel submission 2013-3
Squarespace sxsw panel submission 2013-3
 
Exposing the Tooling API as a Mountable Filesystem
Exposing the Tooling API as a Mountable FilesystemExposing the Tooling API as a Mountable Filesystem
Exposing the Tooling API as a Mountable Filesystem
 
45 fotogr.
45 fotogr. 45 fotogr.
45 fotogr.
 
lightspeed-best-practices-for-hiring
lightspeed-best-practices-for-hiringlightspeed-best-practices-for-hiring
lightspeed-best-practices-for-hiring
 
B2B price prediction through crowd sourcing
B2B price prediction through crowd sourcingB2B price prediction through crowd sourcing
B2B price prediction through crowd sourcing
 
20131212 BrightTALK: design and data science
20131212 BrightTALK: design and data science20131212 BrightTALK: design and data science
20131212 BrightTALK: design and data science
 
Comunicacion lascaris
Comunicacion lascarisComunicacion lascaris
Comunicacion lascaris
 
Hr Vision Implementers 20090123 Rev1
Hr Vision Implementers 20090123 Rev1Hr Vision Implementers 20090123 Rev1
Hr Vision Implementers 20090123 Rev1
 
Madison campus-and-downtown-apartments-how-well-do-you-know-uw-madison-wi-quiz
Madison campus-and-downtown-apartments-how-well-do-you-know-uw-madison-wi-quizMadison campus-and-downtown-apartments-how-well-do-you-know-uw-madison-wi-quiz
Madison campus-and-downtown-apartments-how-well-do-you-know-uw-madison-wi-quiz
 
The 10 Commandments of Electromagnetic Compatibility
The 10 Commandments of Electromagnetic CompatibilityThe 10 Commandments of Electromagnetic Compatibility
The 10 Commandments of Electromagnetic Compatibility
 
El llenguatge dels nous mitjans de comunicació
El llenguatge dels nous mitjans de comunicacióEl llenguatge dels nous mitjans de comunicació
El llenguatge dels nous mitjans de comunicació
 
Antropoliga de san_agustin
Antropoliga de san_agustinAntropoliga de san_agustin
Antropoliga de san_agustin
 
Big Design 2012 - Guerrilla Design & Research Methods Workshop
Big Design 2012 - Guerrilla Design & Research Methods WorkshopBig Design 2012 - Guerrilla Design & Research Methods Workshop
Big Design 2012 - Guerrilla Design & Research Methods Workshop
 

Similar to Data in the Wild: Survival Guide

IRJET- Data Leak Prevention System: A Survey
IRJET-  	  Data Leak Prevention System: A SurveyIRJET-  	  Data Leak Prevention System: A Survey
IRJET- Data Leak Prevention System: A SurveyIRJET Journal
 
Version 3.6 Powerpoint March10
Version 3.6 Powerpoint March10Version 3.6 Powerpoint March10
Version 3.6 Powerpoint March10jpmccormack
 
Accenture-Informed-Consent-Data-Motion
Accenture-Informed-Consent-Data-MotionAccenture-Informed-Consent-Data-Motion
Accenture-Informed-Consent-Data-MotionSteven Tiell
 
B Distributed Workforce Management In The Cloud Wp.En Us
B Distributed Workforce Management In The Cloud Wp.En UsB Distributed Workforce Management In The Cloud Wp.En Us
B Distributed Workforce Management In The Cloud Wp.En UsVishal Shah
 
Protecting Data Privacy Beyond the Trusted System of Record
Protecting Data Privacy Beyond the Trusted System of RecordProtecting Data Privacy Beyond the Trusted System of Record
Protecting Data Privacy Beyond the Trusted System of RecordCor Ranzijn
 
Effective Data Erasure and Anti Forensics Techniques
Effective Data Erasure and Anti Forensics TechniquesEffective Data Erasure and Anti Forensics Techniques
Effective Data Erasure and Anti Forensics Techniquesijtsrd
 
eBook: 5 Steps to Secure Cloud Data Governance
eBook: 5 Steps to Secure Cloud Data GovernanceeBook: 5 Steps to Secure Cloud Data Governance
eBook: 5 Steps to Secure Cloud Data GovernanceKim Cook
 
10 Tips to Strengthen Your Insider Threat Program
10 Tips to Strengthen Your Insider Threat Program 10 Tips to Strengthen Your Insider Threat Program
10 Tips to Strengthen Your Insider Threat Program Dtex Systems
 
1639(pm proofreading)(tracked)
1639(pm proofreading)(tracked)1639(pm proofreading)(tracked)
1639(pm proofreading)(tracked)Aida Harun
 
Integrating DLP and the 4 W's is a Must by Uzi Yair - CEO, GTB Technologies Inc.
Integrating DLP and the 4 W's is a Must by Uzi Yair - CEO, GTB Technologies Inc.Integrating DLP and the 4 W's is a Must by Uzi Yair - CEO, GTB Technologies Inc.
Integrating DLP and the 4 W's is a Must by Uzi Yair - CEO, GTB Technologies Inc.Ravtach Solutions
 
Capabilities of Computing Technology
Capabilities of Computing TechnologyCapabilities of Computing Technology
Capabilities of Computing TechnologyBimpe Animashaun
 
PingPal infodeck: How to survive BYOD and mobile networks
PingPal infodeck: How to survive BYOD and mobile networksPingPal infodeck: How to survive BYOD and mobile networks
PingPal infodeck: How to survive BYOD and mobile networksHyker Security
 
Microsoft DATA Protection To Put secure.
Microsoft DATA Protection To Put secure.Microsoft DATA Protection To Put secure.
Microsoft DATA Protection To Put secure.jayceewong1
 
bus43-copier-data-security
bus43-copier-data-securitybus43-copier-data-security
bus43-copier-data-securityEd Worthington
 
Hindering data theft attack through fog computing
Hindering data theft attack through fog computingHindering data theft attack through fog computing
Hindering data theft attack through fog computingeSAT Publishing House
 
10.1.1.436.3364.pdf
10.1.1.436.3364.pdf10.1.1.436.3364.pdf
10.1.1.436.3364.pdfmistryritesh
 

Similar to Data in the Wild: Survival Guide (20)

IRJET- Data Leak Prevention System: A Survey
IRJET-  	  Data Leak Prevention System: A SurveyIRJET-  	  Data Leak Prevention System: A Survey
IRJET- Data Leak Prevention System: A Survey
 
Version 3.6 Powerpoint March10
Version 3.6 Powerpoint March10Version 3.6 Powerpoint March10
Version 3.6 Powerpoint March10
 
Accenture-Informed-Consent-Data-Motion
Accenture-Informed-Consent-Data-MotionAccenture-Informed-Consent-Data-Motion
Accenture-Informed-Consent-Data-Motion
 
B Distributed Workforce Management In The Cloud Wp.En Us
B Distributed Workforce Management In The Cloud Wp.En UsB Distributed Workforce Management In The Cloud Wp.En Us
B Distributed Workforce Management In The Cloud Wp.En Us
 
Protecting Data Privacy Beyond the Trusted System of Record
Protecting Data Privacy Beyond the Trusted System of RecordProtecting Data Privacy Beyond the Trusted System of Record
Protecting Data Privacy Beyond the Trusted System of Record
 
Effective Data Erasure and Anti Forensics Techniques
Effective Data Erasure and Anti Forensics TechniquesEffective Data Erasure and Anti Forensics Techniques
Effective Data Erasure and Anti Forensics Techniques
 
eBook: 5 Steps to Secure Cloud Data Governance
eBook: 5 Steps to Secure Cloud Data GovernanceeBook: 5 Steps to Secure Cloud Data Governance
eBook: 5 Steps to Secure Cloud Data Governance
 
Wp security-data-safe
Wp security-data-safeWp security-data-safe
Wp security-data-safe
 
10 Tips to Strengthen Your Insider Threat Program
10 Tips to Strengthen Your Insider Threat Program 10 Tips to Strengthen Your Insider Threat Program
10 Tips to Strengthen Your Insider Threat Program
 
1639(pm proofreading)(tracked)
1639(pm proofreading)(tracked)1639(pm proofreading)(tracked)
1639(pm proofreading)(tracked)
 
Integrating DLP and the 4 W's is a Must by Uzi Yair - CEO, GTB Technologies Inc.
Integrating DLP and the 4 W's is a Must by Uzi Yair - CEO, GTB Technologies Inc.Integrating DLP and the 4 W's is a Must by Uzi Yair - CEO, GTB Technologies Inc.
Integrating DLP and the 4 W's is a Must by Uzi Yair - CEO, GTB Technologies Inc.
 
Topic 7
Topic 7Topic 7
Topic 7
 
Capabilities of Computing Technology
Capabilities of Computing TechnologyCapabilities of Computing Technology
Capabilities of Computing Technology
 
PingPal infodeck: How to survive BYOD and mobile networks
PingPal infodeck: How to survive BYOD and mobile networksPingPal infodeck: How to survive BYOD and mobile networks
PingPal infodeck: How to survive BYOD and mobile networks
 
Business Copier Data Security
Business Copier Data SecurityBusiness Copier Data Security
Business Copier Data Security
 
Microsoft DATA Protection To Put secure.
Microsoft DATA Protection To Put secure.Microsoft DATA Protection To Put secure.
Microsoft DATA Protection To Put secure.
 
bus43-copier-data-security
bus43-copier-data-securitybus43-copier-data-security
bus43-copier-data-security
 
Hindering data theft attack through fog computing
Hindering data theft attack through fog computingHindering data theft attack through fog computing
Hindering data theft attack through fog computing
 
10.1.1.436.3364.pdf
10.1.1.436.3364.pdf10.1.1.436.3364.pdf
10.1.1.436.3364.pdf
 
The Top Ten Insider Threats And How To Prevent Them
The Top Ten Insider Threats And How To Prevent ThemThe Top Ten Insider Threats And How To Prevent Them
The Top Ten Insider Threats And How To Prevent Them
 

More from Druva

Druva’s 2017 Ransomware Survey
Druva’s 2017 Ransomware Survey Druva’s 2017 Ransomware Survey
Druva’s 2017 Ransomware Survey Druva
 
Protecting Corporate Data When an Employee Leaves: Survey and Best Practices
Protecting Corporate Data When an Employee Leaves: Survey and Best PracticesProtecting Corporate Data When an Employee Leaves: Survey and Best Practices
Protecting Corporate Data When an Employee Leaves: Survey and Best PracticesDruva
 
New Strategies for More Effective Remote/Branch Office Data Protection
New Strategies for More Effective Remote/Branch Office Data ProtectionNew Strategies for More Effective Remote/Branch Office Data Protection
New Strategies for More Effective Remote/Branch Office Data ProtectionDruva
 
4 ways to cut your e discovery costs in half-webinar-exterro-druva
4 ways to cut your e discovery costs in half-webinar-exterro-druva4 ways to cut your e discovery costs in half-webinar-exterro-druva
4 ways to cut your e discovery costs in half-webinar-exterro-druvaDruva
 
Cut End-to-End eDiscovery Time in Half: Leveraging the Cloud
Cut End-to-End eDiscovery Time in Half: Leveraging the CloudCut End-to-End eDiscovery Time in Half: Leveraging the Cloud
Cut End-to-End eDiscovery Time in Half: Leveraging the CloudDruva
 
Rethink Server Backup and Regain Control
Rethink Server Backup and Regain ControlRethink Server Backup and Regain Control
Rethink Server Backup and Regain ControlDruva
 
Taking a Proactive Approach to Combat Ransomware [Druva Webinar]
Taking a Proactive Approach to Combat Ransomware [Druva Webinar]Taking a Proactive Approach to Combat Ransomware [Druva Webinar]
Taking a Proactive Approach to Combat Ransomware [Druva Webinar]Druva
 
20 point checklist : why move backup and disaster recovery to the cloud - druva
20 point checklist : why move backup and disaster recovery to the cloud - druva20 point checklist : why move backup and disaster recovery to the cloud - druva
20 point checklist : why move backup and disaster recovery to the cloud - druvaDruva
 
Getting a clue: uncovering the truth about your data with mobile forensics
Getting a clue: uncovering the truth about your data with mobile forensicsGetting a clue: uncovering the truth about your data with mobile forensics
Getting a clue: uncovering the truth about your data with mobile forensicsDruva
 
Interested in working at Druva?
Interested in working at Druva?Interested in working at Druva?
Interested in working at Druva?Druva
 
Where in the world is your PII and other sensitive data? by @druva inc
Where in the world is your PII and other sensitive data? by @druva incWhere in the world is your PII and other sensitive data? by @druva inc
Where in the world is your PII and other sensitive data? by @druva incDruva
 
Black Hat 2015 Survey: The Challenge of Data Sprawl
Black Hat 2015 Survey: The Challenge of Data SprawlBlack Hat 2015 Survey: The Challenge of Data Sprawl
Black Hat 2015 Survey: The Challenge of Data SprawlDruva
 
Where In The World Is Your Sensitive Data?
Where In The World Is Your Sensitive Data?Where In The World Is Your Sensitive Data?
Where In The World Is Your Sensitive Data?Druva
 
Soundbytes from the Frontlines
Soundbytes from the FrontlinesSoundbytes from the Frontlines
Soundbytes from the FrontlinesDruva
 
The state of data privacy with dimensional research
The state of data privacy with dimensional research The state of data privacy with dimensional research
The state of data privacy with dimensional research Druva
 
Security and privacy of cloud data: what you need to know (Interop)
Security and privacy of cloud data: what you need to know (Interop)Security and privacy of cloud data: what you need to know (Interop)
Security and privacy of cloud data: what you need to know (Interop)Druva
 
Enterprise Data Privacy Quiz
Enterprise Data Privacy QuizEnterprise Data Privacy Quiz
Enterprise Data Privacy QuizDruva
 
Data Privacy Readiness Test
Data Privacy Readiness TestData Privacy Readiness Test
Data Privacy Readiness TestDruva
 
AWS reInvent: Building an enterprise class backup and archival solution on AWS
AWS reInvent: Building an enterprise class backup and archival solution on AWSAWS reInvent: Building an enterprise class backup and archival solution on AWS
AWS reInvent: Building an enterprise class backup and archival solution on AWSDruva
 
Why You Need Enterprise Backup
Why You Need Enterprise BackupWhy You Need Enterprise Backup
Why You Need Enterprise BackupDruva
 

More from Druva (20)

Druva’s 2017 Ransomware Survey
Druva’s 2017 Ransomware Survey Druva’s 2017 Ransomware Survey
Druva’s 2017 Ransomware Survey
 
Protecting Corporate Data When an Employee Leaves: Survey and Best Practices
Protecting Corporate Data When an Employee Leaves: Survey and Best PracticesProtecting Corporate Data When an Employee Leaves: Survey and Best Practices
Protecting Corporate Data When an Employee Leaves: Survey and Best Practices
 
New Strategies for More Effective Remote/Branch Office Data Protection
New Strategies for More Effective Remote/Branch Office Data ProtectionNew Strategies for More Effective Remote/Branch Office Data Protection
New Strategies for More Effective Remote/Branch Office Data Protection
 
4 ways to cut your e discovery costs in half-webinar-exterro-druva
4 ways to cut your e discovery costs in half-webinar-exterro-druva4 ways to cut your e discovery costs in half-webinar-exterro-druva
4 ways to cut your e discovery costs in half-webinar-exterro-druva
 
Cut End-to-End eDiscovery Time in Half: Leveraging the Cloud
Cut End-to-End eDiscovery Time in Half: Leveraging the CloudCut End-to-End eDiscovery Time in Half: Leveraging the Cloud
Cut End-to-End eDiscovery Time in Half: Leveraging the Cloud
 
Rethink Server Backup and Regain Control
Rethink Server Backup and Regain ControlRethink Server Backup and Regain Control
Rethink Server Backup and Regain Control
 
Taking a Proactive Approach to Combat Ransomware [Druva Webinar]
Taking a Proactive Approach to Combat Ransomware [Druva Webinar]Taking a Proactive Approach to Combat Ransomware [Druva Webinar]
Taking a Proactive Approach to Combat Ransomware [Druva Webinar]
 
20 point checklist : why move backup and disaster recovery to the cloud - druva
20 point checklist : why move backup and disaster recovery to the cloud - druva20 point checklist : why move backup and disaster recovery to the cloud - druva
20 point checklist : why move backup and disaster recovery to the cloud - druva
 
Getting a clue: uncovering the truth about your data with mobile forensics
Getting a clue: uncovering the truth about your data with mobile forensicsGetting a clue: uncovering the truth about your data with mobile forensics
Getting a clue: uncovering the truth about your data with mobile forensics
 
Interested in working at Druva?
Interested in working at Druva?Interested in working at Druva?
Interested in working at Druva?
 
Where in the world is your PII and other sensitive data? by @druva inc
Where in the world is your PII and other sensitive data? by @druva incWhere in the world is your PII and other sensitive data? by @druva inc
Where in the world is your PII and other sensitive data? by @druva inc
 
Black Hat 2015 Survey: The Challenge of Data Sprawl
Black Hat 2015 Survey: The Challenge of Data SprawlBlack Hat 2015 Survey: The Challenge of Data Sprawl
Black Hat 2015 Survey: The Challenge of Data Sprawl
 
Where In The World Is Your Sensitive Data?
Where In The World Is Your Sensitive Data?Where In The World Is Your Sensitive Data?
Where In The World Is Your Sensitive Data?
 
Soundbytes from the Frontlines
Soundbytes from the FrontlinesSoundbytes from the Frontlines
Soundbytes from the Frontlines
 
The state of data privacy with dimensional research
The state of data privacy with dimensional research The state of data privacy with dimensional research
The state of data privacy with dimensional research
 
Security and privacy of cloud data: what you need to know (Interop)
Security and privacy of cloud data: what you need to know (Interop)Security and privacy of cloud data: what you need to know (Interop)
Security and privacy of cloud data: what you need to know (Interop)
 
Enterprise Data Privacy Quiz
Enterprise Data Privacy QuizEnterprise Data Privacy Quiz
Enterprise Data Privacy Quiz
 
Data Privacy Readiness Test
Data Privacy Readiness TestData Privacy Readiness Test
Data Privacy Readiness Test
 
AWS reInvent: Building an enterprise class backup and archival solution on AWS
AWS reInvent: Building an enterprise class backup and archival solution on AWSAWS reInvent: Building an enterprise class backup and archival solution on AWS
AWS reInvent: Building an enterprise class backup and archival solution on AWS
 
Why You Need Enterprise Backup
Why You Need Enterprise BackupWhy You Need Enterprise Backup
Why You Need Enterprise Backup
 

Recently uploaded

Principles and Practices of Data Visualization
Principles and Practices of Data VisualizationPrinciples and Practices of Data Visualization
Principles and Practices of Data VisualizationKianJazayeri1
 
Defining Constituents, Data Vizzes and Telling a Data Story
Defining Constituents, Data Vizzes and Telling a Data StoryDefining Constituents, Data Vizzes and Telling a Data Story
Defining Constituents, Data Vizzes and Telling a Data StoryJeremy Anderson
 
modul pembelajaran robotic Workshop _ by Slidesgo.pptx
modul pembelajaran robotic Workshop _ by Slidesgo.pptxmodul pembelajaran robotic Workshop _ by Slidesgo.pptx
modul pembelajaran robotic Workshop _ by Slidesgo.pptxaleedritatuxx
 
Decoding Patterns: Customer Churn Prediction Data Analysis Project
Decoding Patterns: Customer Churn Prediction Data Analysis ProjectDecoding Patterns: Customer Churn Prediction Data Analysis Project
Decoding Patterns: Customer Churn Prediction Data Analysis ProjectBoston Institute of Analytics
 
Conf42-LLM_Adding Generative AI to Real-Time Streaming Pipelines
Conf42-LLM_Adding Generative AI to Real-Time Streaming PipelinesConf42-LLM_Adding Generative AI to Real-Time Streaming Pipelines
Conf42-LLM_Adding Generative AI to Real-Time Streaming PipelinesTimothy Spann
 
Easter Eggs From Star Wars and in cars 1 and 2
Easter Eggs From Star Wars and in cars 1 and 2Easter Eggs From Star Wars and in cars 1 and 2
Easter Eggs From Star Wars and in cars 1 and 217djon017
 
SMOTE and K-Fold Cross Validation-Presentation.pptx
SMOTE and K-Fold Cross Validation-Presentation.pptxSMOTE and K-Fold Cross Validation-Presentation.pptx
SMOTE and K-Fold Cross Validation-Presentation.pptxHaritikaChhatwal1
 
Cyber awareness ppt on the recorded data
Cyber awareness ppt on the recorded dataCyber awareness ppt on the recorded data
Cyber awareness ppt on the recorded dataTecnoIncentive
 
The Power of Data-Driven Storytelling_ Unveiling the Layers of Insight.pptx
The Power of Data-Driven Storytelling_ Unveiling the Layers of Insight.pptxThe Power of Data-Driven Storytelling_ Unveiling the Layers of Insight.pptx
The Power of Data-Driven Storytelling_ Unveiling the Layers of Insight.pptxTasha Penwell
 
Student Profile Sample report on improving academic performance by uniting gr...
Student Profile Sample report on improving academic performance by uniting gr...Student Profile Sample report on improving academic performance by uniting gr...
Student Profile Sample report on improving academic performance by uniting gr...Seán Kennedy
 
Decoding the Heart: Student Presentation on Heart Attack Prediction with Data...
Decoding the Heart: Student Presentation on Heart Attack Prediction with Data...Decoding the Heart: Student Presentation on Heart Attack Prediction with Data...
Decoding the Heart: Student Presentation on Heart Attack Prediction with Data...Boston Institute of Analytics
 
Predictive Analysis for Loan Default Presentation : Data Analysis Project PPT
Predictive Analysis for Loan Default  Presentation : Data Analysis Project PPTPredictive Analysis for Loan Default  Presentation : Data Analysis Project PPT
Predictive Analysis for Loan Default Presentation : Data Analysis Project PPTBoston Institute of Analytics
 
Data Analysis Project Presentation: Unveiling Your Ideal Customer, Bank Custo...
Data Analysis Project Presentation: Unveiling Your Ideal Customer, Bank Custo...Data Analysis Project Presentation: Unveiling Your Ideal Customer, Bank Custo...
Data Analysis Project Presentation: Unveiling Your Ideal Customer, Bank Custo...Boston Institute of Analytics
 
What To Do For World Nature Conservation Day by Slidesgo.pptx
What To Do For World Nature Conservation Day by Slidesgo.pptxWhat To Do For World Nature Conservation Day by Slidesgo.pptx
What To Do For World Nature Conservation Day by Slidesgo.pptxSimranPal17
 
6 Tips for Interpretable Topic Models _ by Nicha Ruchirawat _ Towards Data Sc...
6 Tips for Interpretable Topic Models _ by Nicha Ruchirawat _ Towards Data Sc...6 Tips for Interpretable Topic Models _ by Nicha Ruchirawat _ Towards Data Sc...
6 Tips for Interpretable Topic Models _ by Nicha Ruchirawat _ Towards Data Sc...Dr Arash Najmaei ( Phd., MBA, BSc)
 
Data Analysis Project : Targeting the Right Customers, Presentation on Bank M...
Data Analysis Project : Targeting the Right Customers, Presentation on Bank M...Data Analysis Project : Targeting the Right Customers, Presentation on Bank M...
Data Analysis Project : Targeting the Right Customers, Presentation on Bank M...Boston Institute of Analytics
 
wepik-insightful-infographics-a-data-visualization-overview-20240401133220kwr...
wepik-insightful-infographics-a-data-visualization-overview-20240401133220kwr...wepik-insightful-infographics-a-data-visualization-overview-20240401133220kwr...
wepik-insightful-infographics-a-data-visualization-overview-20240401133220kwr...KarteekMane1
 
Minimizing AI Hallucinations/Confabulations and the Path towards AGI with Exa...
Minimizing AI Hallucinations/Confabulations and the Path towards AGI with Exa...Minimizing AI Hallucinations/Confabulations and the Path towards AGI with Exa...
Minimizing AI Hallucinations/Confabulations and the Path towards AGI with Exa...Thomas Poetter
 
Digital Marketing Plan, how digital marketing works
Digital Marketing Plan, how digital marketing worksDigital Marketing Plan, how digital marketing works
Digital Marketing Plan, how digital marketing worksdeepakthakur548787
 

Recently uploaded (20)

Principles and Practices of Data Visualization
Principles and Practices of Data VisualizationPrinciples and Practices of Data Visualization
Principles and Practices of Data Visualization
 
Defining Constituents, Data Vizzes and Telling a Data Story
Defining Constituents, Data Vizzes and Telling a Data StoryDefining Constituents, Data Vizzes and Telling a Data Story
Defining Constituents, Data Vizzes and Telling a Data Story
 
modul pembelajaran robotic Workshop _ by Slidesgo.pptx
modul pembelajaran robotic Workshop _ by Slidesgo.pptxmodul pembelajaran robotic Workshop _ by Slidesgo.pptx
modul pembelajaran robotic Workshop _ by Slidesgo.pptx
 
Decoding Patterns: Customer Churn Prediction Data Analysis Project
Decoding Patterns: Customer Churn Prediction Data Analysis ProjectDecoding Patterns: Customer Churn Prediction Data Analysis Project
Decoding Patterns: Customer Churn Prediction Data Analysis Project
 
Conf42-LLM_Adding Generative AI to Real-Time Streaming Pipelines
Conf42-LLM_Adding Generative AI to Real-Time Streaming PipelinesConf42-LLM_Adding Generative AI to Real-Time Streaming Pipelines
Conf42-LLM_Adding Generative AI to Real-Time Streaming Pipelines
 
Data Analysis Project: Stroke Prediction
Data Analysis Project: Stroke PredictionData Analysis Project: Stroke Prediction
Data Analysis Project: Stroke Prediction
 
Easter Eggs From Star Wars and in cars 1 and 2
Easter Eggs From Star Wars and in cars 1 and 2Easter Eggs From Star Wars and in cars 1 and 2
Easter Eggs From Star Wars and in cars 1 and 2
 
SMOTE and K-Fold Cross Validation-Presentation.pptx
SMOTE and K-Fold Cross Validation-Presentation.pptxSMOTE and K-Fold Cross Validation-Presentation.pptx
SMOTE and K-Fold Cross Validation-Presentation.pptx
 
Cyber awareness ppt on the recorded data
Cyber awareness ppt on the recorded dataCyber awareness ppt on the recorded data
Cyber awareness ppt on the recorded data
 
The Power of Data-Driven Storytelling_ Unveiling the Layers of Insight.pptx
The Power of Data-Driven Storytelling_ Unveiling the Layers of Insight.pptxThe Power of Data-Driven Storytelling_ Unveiling the Layers of Insight.pptx
The Power of Data-Driven Storytelling_ Unveiling the Layers of Insight.pptx
 
Student Profile Sample report on improving academic performance by uniting gr...
Student Profile Sample report on improving academic performance by uniting gr...Student Profile Sample report on improving academic performance by uniting gr...
Student Profile Sample report on improving academic performance by uniting gr...
 
Decoding the Heart: Student Presentation on Heart Attack Prediction with Data...
Decoding the Heart: Student Presentation on Heart Attack Prediction with Data...Decoding the Heart: Student Presentation on Heart Attack Prediction with Data...
Decoding the Heart: Student Presentation on Heart Attack Prediction with Data...
 
Predictive Analysis for Loan Default Presentation : Data Analysis Project PPT
Predictive Analysis for Loan Default  Presentation : Data Analysis Project PPTPredictive Analysis for Loan Default  Presentation : Data Analysis Project PPT
Predictive Analysis for Loan Default Presentation : Data Analysis Project PPT
 
Data Analysis Project Presentation: Unveiling Your Ideal Customer, Bank Custo...
Data Analysis Project Presentation: Unveiling Your Ideal Customer, Bank Custo...Data Analysis Project Presentation: Unveiling Your Ideal Customer, Bank Custo...
Data Analysis Project Presentation: Unveiling Your Ideal Customer, Bank Custo...
 
What To Do For World Nature Conservation Day by Slidesgo.pptx
What To Do For World Nature Conservation Day by Slidesgo.pptxWhat To Do For World Nature Conservation Day by Slidesgo.pptx
What To Do For World Nature Conservation Day by Slidesgo.pptx
 
6 Tips for Interpretable Topic Models _ by Nicha Ruchirawat _ Towards Data Sc...
6 Tips for Interpretable Topic Models _ by Nicha Ruchirawat _ Towards Data Sc...6 Tips for Interpretable Topic Models _ by Nicha Ruchirawat _ Towards Data Sc...
6 Tips for Interpretable Topic Models _ by Nicha Ruchirawat _ Towards Data Sc...
 
Data Analysis Project : Targeting the Right Customers, Presentation on Bank M...
Data Analysis Project : Targeting the Right Customers, Presentation on Bank M...Data Analysis Project : Targeting the Right Customers, Presentation on Bank M...
Data Analysis Project : Targeting the Right Customers, Presentation on Bank M...
 
wepik-insightful-infographics-a-data-visualization-overview-20240401133220kwr...
wepik-insightful-infographics-a-data-visualization-overview-20240401133220kwr...wepik-insightful-infographics-a-data-visualization-overview-20240401133220kwr...
wepik-insightful-infographics-a-data-visualization-overview-20240401133220kwr...
 
Minimizing AI Hallucinations/Confabulations and the Path towards AGI with Exa...
Minimizing AI Hallucinations/Confabulations and the Path towards AGI with Exa...Minimizing AI Hallucinations/Confabulations and the Path towards AGI with Exa...
Minimizing AI Hallucinations/Confabulations and the Path towards AGI with Exa...
 
Digital Marketing Plan, how digital marketing works
Digital Marketing Plan, how digital marketing worksDigital Marketing Plan, how digital marketing works
Digital Marketing Plan, how digital marketing works
 

Data in the Wild: Survival Guide

  • 1.
  • 2.
  • 3. What’s Wild Within Chapter One: Data Sprawl.......................................................5 How to Capture Endpoint Data and Achieve Full Visibility................................7 1) Capture data from all devices...............................................................................8 2) Frequently capture changes to data................................................................9 3) View all data activity.................................................................................................10 Chapter Two: Wrong Data in the Wrong Hands...........13 How to Prevent Data Exposure by Controlling Activity.....................................15 1) Control access and sharing with policies.....................................................16 2) Restrict activity by file classification...............................................................17 3) Block data access by any unauthorized application............................18 Chapter Three: Litigation and Compliance........................21 How to Gather and Provide Data for eDiscovery..................................................23 1) Gather and provide data to your legal team............................................24 2) Track data usage.........................................................................................................25 3) Locate deleted files...................................................................................................26 Chapter Four: Lost, Stolen and Damaged Devices.....29 How to Survive the Loss or Theft of a Device...........................................................31 1) Locate the misplaced laptop and prevent data breach....................32 2) Restore data and provide ongoing data access.....................................33 3) Make sure your users back up their data....................................................34 Text
  • 4.
  • 5. A Survival Guide for Defending Data in the Wild It’s a wild world outside the corporate firewall. Protecting data for your entire company is a heavy responsibility. There’s the employee who leaves his laptop in the airport. And the former employee who still has access to corporate data from her personal device. Or the ever-present danger of litigation. You’re accountable for a wide range of scenarios that put your corporate data at risk. Fortunately, you don’t have to go it alone. Learn from the experience of others to ensure that you’re prepared for every threat to your corporate data in the wild. With step-by-step instructions, this Survival Guide is your most valuable tool for keeping corporate assets out of harm’s way.
  • 6.
  • 7. CHAPTER ONE The Threat: Data Sprawl Capturing data and maintaining visibility into how it changes
  • 8. Chapter 1 – Data Sprawl 14 months from now, there will be twice as much data in your organization as there is now. Corporate users generate more data than ever before. Emails, documents, spreadsheets, presentations and more. Each file is typically replicated countless times as users collaborate and store data on multiple devices. With an average of 3.3 connected devices per employee, data resides on laptops, smartphones, and tablets with different operating systems. Sometimes, they’re users’ personal devices. Do you know, with total certainty, what data is being created, where it’s located, or how it’s being accessed and shared? Honestly? To gain full visibility into how endpoint corporate data is moving and being used in your enterprise, you need a way to centrally capture it. Quickly and frequently. Wherever users are working.
  • 9. Chapter 1 – Data Sprawl How to Capture Endpoint Data and Achieve Full Visibility In addition to their company-issued laptops, your company’s executives also use tablets and smartphones while on-the-go. Working from conference centers, hotels, airports, client sites, and more places in the wild, users connect to networks which are frequently weak and unpredictable. Despite all of these variables, you can defend their data with the right tool. How to Capture Endpoint Data and Achieve Full Visibility
  • 10. Capture data from all devices Capture data from heterogeneous devices. To gain visibility into users’ activity on all of their devices, you need to capture data from all of those devices — regardless of manufacturer or operating system. Containerize and capture data on BYOD devices. Personal device use presents unique challenges due to the intermixing of personal and work data. By containerizing corporate data and capturing changes from personal devices, you can see what, how, and when changes happen without affecting end user privacy. 1 Chapter 1 – Data Sprawl
  • 11. Frequently capture changes to data Speed up data capture processes. To provide visibility into minute-by-minute changes, data capture must be persistent and fast. About 80% of data is duplicated. Deduplicating data globally across all enterprise devices avoids inefficient transfer of the same data over and over. Reduce the impact of data capture on users. If frequent data capture interrupts users, they may try to disable capture processes. WAN optimization automatically detects network changes and adjusts bandwidth usage accordingly. So, data transfers happen seamlessly and without disruption. Make sure data capture completes successfully. When users go mobile, you can’t guarantee that data capture will fully complete before they disconnect from their current network. With auto-resume functionality, data capture will pick up where it left off as soon as a new connection is detected. 2 Chapter 1 – Data Sprawl
  • 12. Chapter 1 – Data Sprawl View all data activity Gain insight into all data on endpoints. By frequently capturing data, you can see what data is created, how users are accessing it, and where it’s located. See how data is moving. Know exactly how users are duplicating, downloading, and restoring data across all their devices with minute-by-minute data capture. A detailed log of changes provides you a complete picture of data usage. See how data is shared. By capturing how data is being shared, you can gain visibility into which files have been shared with internal and external users, who those users are, how many times the file has been downloaded, and whether external collaborators still have access. Granular visibility like this lets you control access or provide information during eDiscovery. 3 of the global workforce works from multiple locations in a given work week.57% — Forrester Research, “Backup for Today’s Mobile Enterprise,” 2013
  • 13. Chapter 1 – Data Sprawl Devices Used for Work 63% 7% 12% 5% 13% MS Windows and Phone Google Android Apple OS X and iOS RIM Blackberry Other/Unknown — Forrester Research, “Redefine Your Workforce Computing Policy To Empower Employees,” 2012
  • 14.
  • 15. CHAPTER TWO The Threat: Wrong Data in the Wrong Hands Controlling access and sharing
  • 16. Controlling how your users create, access, and share data is essential. With the proliferation of data and devices, it’s all too easy for data to fall into the wrong hands. You need the ability to control who can do what and when. Data defense might combat malicious activity by a former employee that puts thousands of dollars’ worth of research data at risk. But, 36% of data breaches are the result of inadvertent misuse. So you also need the ability to prevent damage from innocent mistakes by authorized users, such as sharing the wrong file or accidentally emailing a file to the wrong recipient. Chapter 2 – Wrong Data in the Wrong Hands — Forrester, “Understand the State of Data Security and Privacy, 2013-2014,” 2014 of data breaches are the result of abuse by malicious insiders25%
  • 17. How to Prevent Data Exposure by Controlling Activity Today, your employees often collaborate with each other, external contractors, third-party vendors, customers, and more. So, there’s a real risk that data may be shared with the wrong person—either inadvertently or deliberately. Secure collaboration is critical to productivity and innovation. With so much data, multiple versions of files, employee turnover, and the existence of personal file sharing tools, you need to be able to effectively control activity to prevent data exposure. Chapter 2 – Wrong Data in the Wrong Hands How to Prevent Data Exposure by Controlling Activity Today, your employees often collaborate with each other, external contractors, third-party vendors, customers, and more. So, there’s a real risk that data may be shared with the
  • 18. Chapter 2 – Wrong Data in the Wrong Hands Control access and sharing with policies Restrict data access. Establish user- and device-based policies to control mobile access, BYOD usage, and more. This will help ensure that only the right people have access to data. Prevent unauthorized data distribution. Control permissions to mandate that only authorized individuals can share data and specify whether they can share data outside the organization. Restrict files to view-only or set automatic link expiration for files shared externally. Revoke data access. Sometimes data is shared with the wrong person or should no longer be accessible. Being able to immediately revoke access privileges lets you prevent inappropriate access to files. 1 Control access and sharing with polic
  • 19. Chapter 2 – Wrong Data in the Wrong Hands Restrict activity by file classification Specify file properties. Classify files to ensure effective information rights management. Specifying file properties enables you to control and restrict how files can be viewed, edited, and distributed. Limit activity based on file properties. Once you’ve specified file properties, create rules to limit data usage by properties such as geographic location, time of day, confidentiality level, version, and more. For example, if only your U.S.-based staff is supposed to have access to certain documents, you can be confident that those documents will not be available to those outside U.S. borders. Control all aspects of data usage. Achieve granular control over all aspects of file usage, beyond whether it can be viewed or shared. Depending on your compliance requirements, you can disable copy and paste, prevent screenshots, enable offline viewing for a certain number of hours, set classified files to self-destruct after a period of time, and more. 2
  • 20. Chapter 2 – Wrong Data in the Wrong Hands Block data access by any unauthorized application Prevent employees from sharing with personal tools. With the proliferation of personal file sharing tools, it’s tempting for users to employ their own methods to share corporate data. This introduces risk to data security and protection. Blocking access to and sharing of files by any unauthorized service helps you safeguard confidential information. Control mobile sharing. Mobile devices present unique challenges versus laptops when it comes to accessing and sharing data. You should be able to allow users to access their data on mobile devices and share it through approved channels while blocking distribution of data through unauthorized apps. 3
  • 21. Most Common Ways Users Store and Access Files on Multiple PCs, Smartphones, or Tablets In their quest to easily access their data from multiple devices, users resort to activities that leave data unprotected and at risk. USB flash drive or CD/DVD Email attachments to myself Network shared drive File sync, sharing, or online locker service Web-based office productivity suite — Forrester, “Understand the State of Data Security and Privacy, 2013-2014,” 2014 1 2 3 4 5 Chapter 2 – Wrong Data in the Wrong Hands
  • 22.
  • 23. CHAPTER THREE The Threat: Litigation & Compliance Maintaining litigation and compliance readiness to save future cost, time and headaches
  • 24. eDiscovery and compliance are scary topics. They involve time-consuming and expensive processes. They’re complicated by data dispersed across myriad endpoint devices. They are the bane of IT’s existence. Only 28% of CIOs believe their mobile security policies would satisfy an auditor2 . Protecting data on endpoints is now about more than just back up. Capturing and tracking data on these devices to enable eDiscovery and compliance is critical. By being litigation-ready, you can save hours of IT and legal time, reduce the overall cost of gathering data for legal hold, and ensure all relevant data is effectively gathered for lawsuits and audits. 2 Gartner, “CIO Attitudes Toward Consumerization of Mobile Devices and Applications,” 2011 Chapter 3 – Litigation & Compliance
  • 25. How to Gather and Provide Data for eDiscovery It’s happened: your company has been served legal notice. The legal department has come to you with a list of users to put on legal hold. You have to gather and provide all relevant data. It doesn’t have to be a nightmare, though. With the right survival tips, you can be fully prepared when litigation and compliance issues strike. Chapter 3 – Litigation & Compliance How to Gather and Provide Data for eDiscovery It’s happened: your company has been served legal notice The leg l dep rtment h come to o
  • 26. Chapter 3 – Litigation & Compliance Gather and provide data to your legal team Capture endpoint data to a centralized data store. This will give you full visibility, and you’ll be prepared for litigation before it happens. Locate the data belonging to the users in question. Determine custodians whose data needs to be put on legal hold, then find these users by federated search or list import. Place legal holds on captured data. Suspend data retention policies and preserve the content in place to ensure it remains securely stored and unchanged. Hold data until ready for review by legal teams. Keep users on legal hold for an indefinite amount of time until legal is ready to review stored data. All past data will be preserved, and any new data created by users can also be secured. Provide data to legal teams. Activate access for legal administration to review data that you’ve put on legal hold. From there, data can be transferred into an eDiscovery system, enabling the downstream legal process of review and tagging to begin. 1
  • 27. Chapter 3 – Litigation & Compliance Track data usage Find out how users have been sharing and modifying data. With user audit trails, you’ll have a stream of all user activity for full insight into all aspects of sharing and access. See activity for specific files and folders. See the who, when and how of specific files or folders. Know which have been shared, downloaded, restored, accessed from a mobile device, and/or deleted. See how users have been sharing data with external users. If your employees have been collaborating with external users, see which files have been shared and which ones have been downloaded. Don’t forget about admin activity. Users aren’t the only ones you need to track for compliance purposes. Use admin audit trails for an undeletable stream of activity, including creating, modifying or deleting a profile, downloading a file, updating a user, adding or updating an admin and restoring data. 2
  • 28. Chapter 3 – Litigation & Compliance Locate deleted files Keep past copies of all data. Restoring previous file versions or deleted files can be just as important as putting data on legal hold. Configure data retention policies to ensure your backup tool keeps copies of all past data, even if it’s been deleted. Locate the files in question. Use federated search to locate the files by criteria such as file name, type, user, and date. Restore previous versions of files. By saving snapshots of files over time, you can locate and restore previous file versions to see how they have been modified. You can even restore files that belonged to employees who are no longer with the company. 3
  • 29. Chapter 3 – Litigation & Compliance IT’s Worst Nightmares Forgetting to wear pants to work Having the CEO’s computer crash in the middle of a board meeting Upgrading all the company’s machines to a new OS Having employees fall for a phishing scam Getting a notice from legal to preserve data for litigation 5 4 3 2 1
  • 30.
  • 31. CHAPTER FOUR The Threat: Lost, Stolen, and Damaged Devices Escaping data breach and lost productivity when devices are lost, stolen, or damaged
  • 32. 75% of today’s workforce is mobile.3 Your corporate data is moving around like never before. Employees store all kinds of data on laptops and mobile devices because those are the devices that they primarily use. In fact, Gartner calculates that 28% of corporate data is stored exclusively on endpoint devices. However, employees don’t think about what would happen if their devices were damaged or broken—and sometimes, neither does IT. In fact, only 35% of enterprise laptops are backed up4 . Losing a laptop can result in extensive employee downtime. It can also lead to data breach if devices fall into the wrong hands. With the average cost of recovering from a single corporate data breach at $7.2 million5 , it’s a risk your organization can’t afford to take. The wild can be a savage, unforgiving place. 3 IDC, “Worldwide Mobile Worker Population 2009-2013 Forecast,” 2010 4 ESG 5 Ponemon Institute, “2010 Annual Study: U.S. Cost of a Data Breach,” 2010 Chapter 4 – Lost, Stolen and Damaged Devices
  • 33. How to Survive the Loss or Theft of a Device Here’s a typical scenario: you get a call from one of your salespeople, saying that he’s lost his laptop. He thinks he might have left it at airport security, but when he goes back to check, it’s not there. The way in which you’re able to respond to this situation can spell the difference between survival and extinction. Chapter 4 – Lost, Stolen and Damaged Devices of a DeviceTheft
  • 34. Chapter 4 – Lost, Stolen and Damaged Devices Locate the misplaced laptop and prevent data breach Determine the location of the device. Use geolocation to pinpoint the exact location of a lost or stolen device. You should be able to determine the location of the device within three to six feet, so if it’s still in the airport you’ll be able to tell whether it’s at security, in the bathroom, or in lost and found. Retrieve the device if possible. If the device is somewhere you or the salesperson can safely retrieve it, then go and collect your property. However, if the device is sitting on the tarmac, in the garbage disposal, or in a thief’s car headed away from the airport, recognize that it’s out of your reach and don’t attempt to reclaim it. Remotely wipe corporate data. If you’re unable to retrieve the device, initiate a remote wipe so that all corporate data will be removed the next time the device connects to the Internet. 1
  • 35. Chapter 4 – Lost, Stolen and Damaged Devices Restore data and provide ongoing data access Get the user back to work immediately. With a web client and mobile apps, the user can get back to work with a spare laptop, personal tablet, smartphone, or public computer. Let users self-restore data and settings. Once the user has a new laptop, let them restore data and settings themselves. This reduces the time that your team has to spend getting them back up and running again. Don’t wait for data to fully restore. Enable the user to get back to work right away with a backup tool that restores the most important files first. Users can start working on their priority files while remaining files restore in the background. Provide the user with a familiar working environment. Restore personal settings as well as data. Users can set right to work without spending time bookmarking their most-visited sites again, setting up mail preferences, or restoring their favorite screensaver. 2
  • 36. Chapter 4 – Lost, Stolen and Damaged Devices Make sure your users back up their data Recognize that you can’t rely on your users to actively back up their own data. Whether it’s data on a coffee- damaged laptop or files that have been accidentally deleted, the key to retrieving lost data is to ensure that the data is continuously backed up. The best solution is an automatic backup that runs invisibly in the background, without interrupting users. Decide how frequently data should be backed up. You can control the specifics of how data is backed up, such as frequency and over what types of networks (for example, avoiding backups over cellular networks). Select the most important folders to back up. Make sure users’ most important data is backed up by selecting specific folders (such as My Documents) for backup. Give your users the ability to back up additional data, at your discretion. You can give users as much or as little control over what they back up as company policy dictates. Let them add folders and files for backup if this is permitted. If you don’t want them backing up home videos, music files and personal photos, exclude those file types from backup. 3
  • 37. Where Laptops Are Lost US Airports with Highest Weekly Frequency of Laptop Loss 6 7 8 9 10 43% 12% 33% 12% Off-site Workplace In transit Unknown — Ponemon Institute, “The Billion Dollar Lost Laptop Problem,” 2010. — Ponemon Institute, “Airport Insecurity: The Case of Missing & Lost Laptops,” 2008 LAX Los Angeles International MIA Miami International JFK John F. Kennedy International ORD Chicago O’Hare International EWR Newark Liberty International LGA New York La Guardia DTW Detroit Metropolitan Wayne County DCA Ronald Reagan Washington National ATL Hartsfield-Jackson Atlanta International IAD Washington Dulles International 1 2 3 4 5 Chapter 4 – Lost, Stolen and Damaged Devices
  • 38. TECHNIQUES FOR BRINGING A DEVICE BACK TO LIFE THAT YOU SHOULDN’T TRY • Submerge the device in rice • Use a vacuum cleaner to suck out the water • Clean the inside of the device with rubbing alcohol • Dry the device off with a hair dryer • Microwave the device to evaporate the water Chapter 4 – Lost, Stolen and Damaged Devices
  • 39. CONCLUSION There are a lot of threats to data in the wild; make sure your data is defended. We hope this Guide gives you a fresh perspective on the current endpoint data protection landscape. Protecting and governing corporate data requires experience, cunning and resourcefulness. You can venture into the wild alone, or trust a partner uniquely qualified to see you safely through. To learn how Druva can be your critical key to survival, visit wild.druva.com. To learn more about Druva inSync, visit druva.com/insync.
  • 40. © 2014 Druva. All rights reserved. 6/14 CORPORATE HEADQUARTERS United States 150 Mathilda Place, Suite 450 Sunnyvale, CA 94086 Main: +1 888-248-4976 Sales: +1 800-375-0160 WORLDWIDE LOCATIONS Singapore The Co, 75 High Street Singapore 179435 Sales: +65 3158 5080 Australia Sales: +1 300-361-685 India Muttha Chambers II, Level VI Senapati Bapat Marg Pune, India 411016 Main: +91 (0) 20 672 63 300 Sales: +91 (0) 20 672 63 395 Fax: +91 (0) 20 672 63 321 Europe 1 Furzeground Way (Stockley Park) Uxbridge, UB11 1BD, UK Sales: +44 (0) 20 3150 1722