Post on 19-Oct-2014
description
transcript
WHO HAS ACCESS TO ANY DATA SET?
WHAT DATA CAN A USER OR GROUP ACCESS?
WHAT HAS A USER OR GROUP ACCESSED?
WHO DELETED MY FILES?
WHO SHOULDN’T HAVE ACCESS?
SIMULATE CHANGES
COMMIT CHANGES TO ALL PLATFORMS
EARLY RESIGNATION DETECTION
WHAT DATA IS STALE?
AUTOMATICALLY MOVE OR DELETE DATA
WHO OWNS DATA?
AUTOMATE ENTITLEMENT REVIEWS
AUTOMATE AUTHORIZATION PROCESSES
SELF-SERVICE PORTAL
NEXT STEPS
GOVERNANCE
ACCESS
RETENTION
Ensure that only the right people have access to the right data at all times, access is monitored and abuse is flagged.
Use your existing file shares, on your own servers, to provide file synchronization, mobile access, and secure 3rd party sharing.
Intelligently automate data disposition, archiving and migration process using the intelligence of the Varonis Metadata Framework