SlideShare une entreprise Scribd logo
1  sur  22
Télécharger pour lire hors ligne
Protecting Corporate Data
When an Employee Leaves
Our Speakers Today
Michael Osterman
Principal Analyst
Osterman Research, Inc.
@mosterman
Drew Nielsen
Director of Enterprise Security, CISSP, CISA, ISSAP, ISSMP, CCSK
Druva, Inc.
@virtualkjell
About Osterman Research
• Focused on the messaging, Web and collaboration industries
• Practice areas include archiving, security, encryption, content management, etc.
• Strong emphasis on primary research
conducted with decision makers and
influencers
• Founded in 2001
• Based near Seattle
©2017 Osterman Research, Inc.
Your
company has
sensitive,
confidential
and valuable
data
Employees
have access
to that data
(and IT often
does not)
Employees
leave your
company
Your
sensitive,
confidential
and valuable
data leaves
with them
Why We’re Here Today
©2017 Osterman Research, Inc.
Employee Turnover is a Fact of Life
• The typical company can expect 24% turnover of its employees
each year
• In 2016, the average employee tenure was 4.2 years
• In 2014, it was 4.6 years
• Turnover among Millennials is much higher than for older workers
• Good economies result in high levels of employee turnover
• Involuntary terminations are also common
• Individual terminations
• Mass layoffs
• Company closures
©2017 Osterman Research, Inc.
Protecting Data is a Major Problem
Companies face a wide range
of problems in retaining
corporate data when
employees leave…and even
knowing if they have done so
©2017 Osterman Research, Inc.
Percentage of Respondents Indicating a Significant or Major Problem
When Employees Leave, What is Retained?
Most companies retain
employees’ files and emails
when they leave
But they retain little else!
©2017 Osterman Research, Inc.
Why Do Employees Take Data?
• They do so unintentionally
• BYO devices/applications/mobile apps/storage make it easy for employees to depart with
corporate data and not realize it
• They don’t think it’s wrong
• Many employees believe that “their” clients, prospects,
intellectual property and social media contacts belong
to them, not their employer
• They do so maliciously
• Some are angry with management or feel they were
wrongly terminated
©2017 Osterman Research, Inc.
What are the Consequences?
• The biggest problem is loss of intellectual property
• Trade secrets, customer lists, marketing plans, financials, reputational damage, etc.
• Some examples:
• The day before and of his resignation, an employee of Leica Geosystems downloaded 190,000
files, deleted 54,000, and downloaded another 190,000
• An ex-employee of Ferguson Enterprises allegedly kept customer information and used it to set
up a competing company
• A soon-to-be-terminated employee of BlueScope downloaded the company’s trade secrets
before her departure
• An employee installed Google Chrome Remote Desktop without IT’s approval and used it to
access the corporate network at least 16 times in order to exfiltrate sensitive data
• An employee at Expedia’s Hotwire division kept a company laptop and used it to hack into
company executives’ email accounts and devices
©2017 Osterman Research, Inc.
Other Consequences
• Lawsuits and other litigation
• Loss of regulated data and data that could
be subject to legal hold requirements
• Loss of corporate reputation
• Loss of competitive advantage
• Data breaches
©2017 Osterman Research, Inc.
Signs to Look For
• Employees copying or downloading significant amounts of information to the cloud, USB
drives, personal drives, personal email accounts, personal file
sync-and-share accounts, cloud storage, etc.
• Employees deleting a significant number of documents or emails
• Odd timing of employee access to email, data repositories
or facilities
• Employees communicating with competitors
• Anomalous levels of email activity
©2017 Osterman Research, Inc.
Are Good Processes and Systems in Place?
Many companies have not
implemented the appropriate
processes and procedures to
manage employee departures
©2017 Osterman Research, Inc.
So, What Can You Do About It?
• Make sure your sensitive corporate data is under the control of IT, not just employees
• Content archiving is a key technology that will put the company in control
• Consider limiting employee access to data
• Does every employee need access to every piece of corporate data?
• Encrypt sensitive and confidential data
• In-transit, at-rest and in-use
• Use the right authentication for sensitive and confidential data
• Risk-based authentication should be considered
©2017 Osterman Research, Inc.
What Else Can You Do?
• Manage mobile devices and laptops properly
• Can all of your devices be wiped after employees leave? Even personally-owned devices?
• Your data needs to be backed up
• Backup and archiving are both essential best practices
• Make sure employment contracts contain confidentiality
provisions
• Develop, implement and update proper-use policies for
EVERYTHING
• Monitor and audit employee behavior
©2017 Osterman Research, Inc.
Even More Things You Can Do
• Conduct initial and ongoing employee training
• Don’t allow employees to be their own administrators
• This allows employees to decide where sensitive corporate data will be stored
• Establish the ownership of social media contacts
• Make sure that “ownership” of Twitter and other social media followers is well understood
• All managers must understand their employment contracts fully
• Data this created during employment, acceptable use policies, etc.
©2017 Osterman Research, Inc.
Technologies to Consider
• Information governance
• Centralized logging and reporting
• File analytics technology
• DLP
• Encryption
• Mobile device management
• Content archiving
• Virtual desktops
• Windows to Go
• Employee activitity and content monitoring
• Solutions to prevent the offloading of data
• BYO replacements
©2017 Osterman Research, Inc.
We now efficiently manage
the full lifecycle of data across
time, device and geography.
Druva makes this possible.
“
”Shah Nawaz,
Director of IT, Shire
Enterprise
Customers
4,000+
Data Under
Management
25PB+
Amazon Storage
Partner
Top 5
In Cloud Data
Protection
Gartner#1
2000 2005 2010 2015 2020 2025
Cloud
Endpoints
Remote Sites
Data Centers
40 Exabyte
Increasing Data & Business Risks
Insider Threat
& IP Theft
Corruption
& Loss
Legal Exposure
& Sanctions
Compliance
Infractions
Ransomware
& Malware
Druva : Cloud Information Management
Improve Business Agility, Reduce Risk & Cost
Single Pane of Glass
Improve Data Visibility
Reduced Infrastructure Dependency
Lower Overall TCO
Summary
• Employee turnover is common
• So is the departure of corporate data when employees leave
• Most companies are not adequately prepared to deal with two key issues
• The employee departure process
• The aftermath of data loss, data breaches and the other consequences that can result from not
protecting data
• There are steps that can be taken and technologies that can be implemented that will
almost entirely solve the problem
©2017 Osterman Research, Inc.
For More Information
Osterman Research, Inc.
+1 206 683 5683
+1 206 905 1010
info@ostermanresearch.com
www.ostermanresearch.com
ostermanresearch.blog
@mosterman
©2017 Osterman Research, Inc.
Druva, Inc.
+1 650 241 3501
+1 800 375 0160
info@druva.com
www.druva.com
www.druva.com/blog
@druvainc

Contenu connexe

Tendances

Data Privacy Readiness Test
Data Privacy Readiness TestData Privacy Readiness Test
Data Privacy Readiness TestDruva
 
Himss 2016 Lunch & Learn: Data Security in IoT (and ePHI Risks)
Himss 2016 Lunch & Learn: Data Security in IoT (and ePHI Risks)Himss 2016 Lunch & Learn: Data Security in IoT (and ePHI Risks)
Himss 2016 Lunch & Learn: Data Security in IoT (and ePHI Risks)OnRamp
 
The value of big data analytics
The value of big data analyticsThe value of big data analytics
The value of big data analyticsMarc Vael
 
Security Analytics and Big Data: What You Need to Know
Security Analytics and Big Data: What You Need to KnowSecurity Analytics and Big Data: What You Need to Know
Security Analytics and Big Data: What You Need to KnowMapR Technologies
 
Eliminate the 49% of Documents that Contain Data Breaches Webinar
Eliminate the 49% of Documents that Contain Data Breaches WebinarEliminate the 49% of Documents that Contain Data Breaches Webinar
Eliminate the 49% of Documents that Contain Data Breaches WebinarConcept Searching, Inc
 
Delivering Analytics at Scale with a Governed Data Lake
Delivering Analytics at Scale with a Governed Data LakeDelivering Analytics at Scale with a Governed Data Lake
Delivering Analytics at Scale with a Governed Data LakeJean-Michel Franco
 
HPE Security Keynote from Istanbul 20th Jan 2016
HPE Security Keynote from Istanbul 20th Jan 2016HPE Security Keynote from Istanbul 20th Jan 2016
HPE Security Keynote from Istanbul 20th Jan 2016SteveAtHPE
 
Practical steps to GDPR compliance
Practical steps to GDPR compliance Practical steps to GDPR compliance
Practical steps to GDPR compliance Jean-Michel Franco
 
How Network Data Loss Prevention is Implemented
How Network Data Loss Prevention is ImplementedHow Network Data Loss Prevention is Implemented
How Network Data Loss Prevention is ImplementedJerry Paul Acosta
 
Why You Need to Govern Big Data
Why You Need to Govern Big DataWhy You Need to Govern Big Data
Why You Need to Govern Big DataIBM Analytics
 
Data Breaches: The Untold Story
Data Breaches: The Untold Story  Data Breaches: The Untold Story
Data Breaches: The Untold Story Isabelle Dumont
 
Guardians of Trust: Building Trust in Data & Analytics
Guardians of Trust: Building Trust in Data & AnalyticsGuardians of Trust: Building Trust in Data & Analytics
Guardians of Trust: Building Trust in Data & AnalyticsEryk Budi Pratama
 
Where data security and value of data meet in the cloud ulf mattsson
Where data security and value of data meet in the cloud   ulf mattssonWhere data security and value of data meet in the cloud   ulf mattsson
Where data security and value of data meet in the cloud ulf mattssonUlf Mattsson
 
ROI of Privacy: Building a Case for Investment [Webinar Slides]
ROI of Privacy: Building a Case for Investment [Webinar Slides]ROI of Privacy: Building a Case for Investment [Webinar Slides]
ROI of Privacy: Building a Case for Investment [Webinar Slides]TrustArc
 
Safeguarding Your Brand With Secure IT Asset Disposition
Safeguarding Your Brand With Secure IT Asset DispositionSafeguarding Your Brand With Secure IT Asset Disposition
Safeguarding Your Brand With Secure IT Asset DispositionIron Mountain
 
Privacy Advisory Service
Privacy Advisory ServicePrivacy Advisory Service
Privacy Advisory ServiceIron Mountain
 
Driving Digital Transformation
Driving Digital TransformationDriving Digital Transformation
Driving Digital TransformationIron Mountain
 
Expanded top ten_big_data_security_and_privacy_challenges
Expanded top ten_big_data_security_and_privacy_challengesExpanded top ten_big_data_security_and_privacy_challenges
Expanded top ten_big_data_security_and_privacy_challengesTom Kirby
 
Realizing the Value of Social: Evolving from Social Media to Customer Experience
Realizing the Value of Social: Evolving from Social Media to Customer ExperienceRealizing the Value of Social: Evolving from Social Media to Customer Experience
Realizing the Value of Social: Evolving from Social Media to Customer ExperienceTata Consultancy Services
 
Enabling Data Governance - Data Trust, Data Ethics, Data Quality
Enabling Data Governance - Data Trust, Data Ethics, Data QualityEnabling Data Governance - Data Trust, Data Ethics, Data Quality
Enabling Data Governance - Data Trust, Data Ethics, Data QualityEryk Budi Pratama
 

Tendances (20)

Data Privacy Readiness Test
Data Privacy Readiness TestData Privacy Readiness Test
Data Privacy Readiness Test
 
Himss 2016 Lunch & Learn: Data Security in IoT (and ePHI Risks)
Himss 2016 Lunch & Learn: Data Security in IoT (and ePHI Risks)Himss 2016 Lunch & Learn: Data Security in IoT (and ePHI Risks)
Himss 2016 Lunch & Learn: Data Security in IoT (and ePHI Risks)
 
The value of big data analytics
The value of big data analyticsThe value of big data analytics
The value of big data analytics
 
Security Analytics and Big Data: What You Need to Know
Security Analytics and Big Data: What You Need to KnowSecurity Analytics and Big Data: What You Need to Know
Security Analytics and Big Data: What You Need to Know
 
Eliminate the 49% of Documents that Contain Data Breaches Webinar
Eliminate the 49% of Documents that Contain Data Breaches WebinarEliminate the 49% of Documents that Contain Data Breaches Webinar
Eliminate the 49% of Documents that Contain Data Breaches Webinar
 
Delivering Analytics at Scale with a Governed Data Lake
Delivering Analytics at Scale with a Governed Data LakeDelivering Analytics at Scale with a Governed Data Lake
Delivering Analytics at Scale with a Governed Data Lake
 
HPE Security Keynote from Istanbul 20th Jan 2016
HPE Security Keynote from Istanbul 20th Jan 2016HPE Security Keynote from Istanbul 20th Jan 2016
HPE Security Keynote from Istanbul 20th Jan 2016
 
Practical steps to GDPR compliance
Practical steps to GDPR compliance Practical steps to GDPR compliance
Practical steps to GDPR compliance
 
How Network Data Loss Prevention is Implemented
How Network Data Loss Prevention is ImplementedHow Network Data Loss Prevention is Implemented
How Network Data Loss Prevention is Implemented
 
Why You Need to Govern Big Data
Why You Need to Govern Big DataWhy You Need to Govern Big Data
Why You Need to Govern Big Data
 
Data Breaches: The Untold Story
Data Breaches: The Untold Story  Data Breaches: The Untold Story
Data Breaches: The Untold Story
 
Guardians of Trust: Building Trust in Data & Analytics
Guardians of Trust: Building Trust in Data & AnalyticsGuardians of Trust: Building Trust in Data & Analytics
Guardians of Trust: Building Trust in Data & Analytics
 
Where data security and value of data meet in the cloud ulf mattsson
Where data security and value of data meet in the cloud   ulf mattssonWhere data security and value of data meet in the cloud   ulf mattsson
Where data security and value of data meet in the cloud ulf mattsson
 
ROI of Privacy: Building a Case for Investment [Webinar Slides]
ROI of Privacy: Building a Case for Investment [Webinar Slides]ROI of Privacy: Building a Case for Investment [Webinar Slides]
ROI of Privacy: Building a Case for Investment [Webinar Slides]
 
Safeguarding Your Brand With Secure IT Asset Disposition
Safeguarding Your Brand With Secure IT Asset DispositionSafeguarding Your Brand With Secure IT Asset Disposition
Safeguarding Your Brand With Secure IT Asset Disposition
 
Privacy Advisory Service
Privacy Advisory ServicePrivacy Advisory Service
Privacy Advisory Service
 
Driving Digital Transformation
Driving Digital TransformationDriving Digital Transformation
Driving Digital Transformation
 
Expanded top ten_big_data_security_and_privacy_challenges
Expanded top ten_big_data_security_and_privacy_challengesExpanded top ten_big_data_security_and_privacy_challenges
Expanded top ten_big_data_security_and_privacy_challenges
 
Realizing the Value of Social: Evolving from Social Media to Customer Experience
Realizing the Value of Social: Evolving from Social Media to Customer ExperienceRealizing the Value of Social: Evolving from Social Media to Customer Experience
Realizing the Value of Social: Evolving from Social Media to Customer Experience
 
Enabling Data Governance - Data Trust, Data Ethics, Data Quality
Enabling Data Governance - Data Trust, Data Ethics, Data QualityEnabling Data Governance - Data Trust, Data Ethics, Data Quality
Enabling Data Governance - Data Trust, Data Ethics, Data Quality
 

En vedette

Soundbytes from the Frontlines
Soundbytes from the FrontlinesSoundbytes from the Frontlines
Soundbytes from the FrontlinesDruva
 
Rethink Server Backup and Regain Control
Rethink Server Backup and Regain ControlRethink Server Backup and Regain Control
Rethink Server Backup and Regain ControlDruva
 
20 point checklist : why move backup and disaster recovery to the cloud - druva
20 point checklist : why move backup and disaster recovery to the cloud - druva20 point checklist : why move backup and disaster recovery to the cloud - druva
20 point checklist : why move backup and disaster recovery to the cloud - druvaDruva
 
The Growth of Corporate Data (infographic)
The Growth of Corporate Data (infographic)The Growth of Corporate Data (infographic)
The Growth of Corporate Data (infographic)Druva
 
Why You Need Enterprise Backup
Why You Need Enterprise BackupWhy You Need Enterprise Backup
Why You Need Enterprise BackupDruva
 
AWS reInvent: Building an enterprise class backup and archival solution on AWS
AWS reInvent: Building an enterprise class backup and archival solution on AWSAWS reInvent: Building an enterprise class backup and archival solution on AWS
AWS reInvent: Building an enterprise class backup and archival solution on AWSDruva
 
Backup and Archiving in the AWS Cloud
Backup and Archiving in the AWS CloudBackup and Archiving in the AWS Cloud
Backup and Archiving in the AWS CloudAmazon Web Services
 
Report of hrm department waqar
Report of hrm department waqarReport of hrm department waqar
Report of hrm department waqarWAQAR AHMED
 
Veeva Systems: Business Prognosis
Veeva Systems: Business PrognosisVeeva Systems: Business Prognosis
Veeva Systems: Business PrognosisPatrice Hall
 
Personal Data Protection Act - Employee Data Privacy
Personal Data Protection Act - Employee Data PrivacyPersonal Data Protection Act - Employee Data Privacy
Personal Data Protection Act - Employee Data PrivacylegalPadmin
 
The 411 on phone interviews
The 411 on phone interviewsThe 411 on phone interviews
The 411 on phone interviewsHireology
 

En vedette (18)

Soundbytes from the Frontlines
Soundbytes from the FrontlinesSoundbytes from the Frontlines
Soundbytes from the Frontlines
 
Rethink Server Backup and Regain Control
Rethink Server Backup and Regain ControlRethink Server Backup and Regain Control
Rethink Server Backup and Regain Control
 
20 point checklist : why move backup and disaster recovery to the cloud - druva
20 point checklist : why move backup and disaster recovery to the cloud - druva20 point checklist : why move backup and disaster recovery to the cloud - druva
20 point checklist : why move backup and disaster recovery to the cloud - druva
 
The Growth of Corporate Data (infographic)
The Growth of Corporate Data (infographic)The Growth of Corporate Data (infographic)
The Growth of Corporate Data (infographic)
 
Make to stock po
Make to stock poMake to stock po
Make to stock po
 
Circuito en paralelo
Circuito en paraleloCircuito en paralelo
Circuito en paralelo
 
Why You Need Enterprise Backup
Why You Need Enterprise BackupWhy You Need Enterprise Backup
Why You Need Enterprise Backup
 
AWS reInvent: Building an enterprise class backup and archival solution on AWS
AWS reInvent: Building an enterprise class backup and archival solution on AWSAWS reInvent: Building an enterprise class backup and archival solution on AWS
AWS reInvent: Building an enterprise class backup and archival solution on AWS
 
Backup and Archiving in the AWS Cloud
Backup and Archiving in the AWS CloudBackup and Archiving in the AWS Cloud
Backup and Archiving in the AWS Cloud
 
Report of hrm department waqar
Report of hrm department waqarReport of hrm department waqar
Report of hrm department waqar
 
HRM report Main
HRM report MainHRM report Main
HRM report Main
 
Veeva Systems: Business Prognosis
Veeva Systems: Business PrognosisVeeva Systems: Business Prognosis
Veeva Systems: Business Prognosis
 
Personal Data Protection Act - Employee Data Privacy
Personal Data Protection Act - Employee Data PrivacyPersonal Data Protection Act - Employee Data Privacy
Personal Data Protection Act - Employee Data Privacy
 
CRM Idol
CRM IdolCRM Idol
CRM Idol
 
Csmpowerpoint2a
Csmpowerpoint2aCsmpowerpoint2a
Csmpowerpoint2a
 
The 411 on phone interviews
The 411 on phone interviewsThe 411 on phone interviews
The 411 on phone interviews
 
Imex Smart Cities
Imex Smart CitiesImex Smart Cities
Imex Smart Cities
 
Feeling words
Feeling wordsFeeling words
Feeling words
 

Similaire à Protecting Corporate Data When an Employee Leaves: Survey and Best Practices

Security 101 for No- techies
Security 101 for No- techiesSecurity 101 for No- techies
Security 101 for No- techiesBrenton Johnson
 
GDPR - Why it matters and how to make it Easy
GDPR - Why it matters and how to make it EasyGDPR - Why it matters and how to make it Easy
GDPR - Why it matters and how to make it EasyPaul McQuillan
 
What Are you Waiting For? Remediate your File Shares and Govern your Informat...
What Are you Waiting For? Remediate your File Shares and Govern your Informat...What Are you Waiting For? Remediate your File Shares and Govern your Informat...
What Are you Waiting For? Remediate your File Shares and Govern your Informat...Everteam
 
Compliance, Security, Migration, Systems Management – All Fixed by Microsoft?
Compliance, Security, Migration, Systems Management – All Fixed by Microsoft?Compliance, Security, Migration, Systems Management – All Fixed by Microsoft?
Compliance, Security, Migration, Systems Management – All Fixed by Microsoft?Concept Searching, Inc
 
ACEDS-Zylab 4-3-15 Webcast
ACEDS-Zylab 4-3-15 Webcast ACEDS-Zylab 4-3-15 Webcast
ACEDS-Zylab 4-3-15 Webcast Logikcull.com
 
Why Most Migration Projects Fail – Don’t Be a Statistic Webinar
Why Most Migration Projects Fail – Don’t Be a Statistic WebinarWhy Most Migration Projects Fail – Don’t Be a Statistic Webinar
Why Most Migration Projects Fail – Don’t Be a Statistic WebinarConcept Searching, Inc
 
Enough Talk – Solving GDPR Problems Through Metadata-Driven Compliance Webinar
Enough Talk – Solving GDPR Problems Through Metadata-Driven Compliance WebinarEnough Talk – Solving GDPR Problems Through Metadata-Driven Compliance Webinar
Enough Talk – Solving GDPR Problems Through Metadata-Driven Compliance WebinarConcept Searching, Inc
 
What makes an effective data team?
What makes an effective data team?What makes an effective data team?
What makes an effective data team?Snowplow Analytics
 
Securing your digital world - Cybersecurity for SBEs
Securing your digital world - Cybersecurity for SBEsSecuring your digital world - Cybersecurity for SBEs
Securing your digital world - Cybersecurity for SBEsSonny Hashmi
 
Securing your digital world cybersecurity for sb es
Securing your digital world   cybersecurity for sb esSecuring your digital world   cybersecurity for sb es
Securing your digital world cybersecurity for sb esSonny Hashmi
 
Doculabs Everteam houston breakfast 06.29.17 v0.2
Doculabs Everteam houston breakfast 06.29.17 v0.2Doculabs Everteam houston breakfast 06.29.17 v0.2
Doculabs Everteam houston breakfast 06.29.17 v0.2Everteam
 
Splunk at Aaron's Inc
Splunk at Aaron's IncSplunk at Aaron's Inc
Splunk at Aaron's IncSplunk
 
Usama Fayyad talk in South Africa: From BigData to Data Science
Usama Fayyad talk in South Africa:  From BigData to Data ScienceUsama Fayyad talk in South Africa:  From BigData to Data Science
Usama Fayyad talk in South Africa: From BigData to Data ScienceUsama Fayyad
 
Isc(2) eastbay-lenin aboagye
Isc(2) eastbay-lenin aboagyeIsc(2) eastbay-lenin aboagye
Isc(2) eastbay-lenin aboagyeLenin Aboagye
 
Mayfield CXO Survey: Post COVID-19 Impacts to IT
Mayfield CXO Survey: Post COVID-19 Impacts to ITMayfield CXO Survey: Post COVID-19 Impacts to IT
Mayfield CXO Survey: Post COVID-19 Impacts to ITNavin Chaddha
 
The Insider Threat
The Insider ThreatThe Insider Threat
The Insider ThreatPECB
 
Group 2 Handling and Processing of big data.pptx
Group 2 Handling and Processing of big data.pptxGroup 2 Handling and Processing of big data.pptx
Group 2 Handling and Processing of big data.pptxsalutiontechnology
 
How To Eliminate Security Exposures in Office 365 Webinar
How To Eliminate Security Exposures in Office 365 WebinarHow To Eliminate Security Exposures in Office 365 Webinar
How To Eliminate Security Exposures in Office 365 WebinarConcept Searching, Inc
 
Security For Business: Are You And Your Customers Safe
Security For Business:  Are You And Your Customers SafeSecurity For Business:  Are You And Your Customers Safe
Security For Business: Are You And Your Customers Safewoodsy01
 
Securing the New Digital Enterprise: Trackable, Controlled, and Authorized
Securing the New Digital Enterprise: Trackable, Controlled, and AuthorizedSecuring the New Digital Enterprise: Trackable, Controlled, and Authorized
Securing the New Digital Enterprise: Trackable, Controlled, and AuthorizedEnterprise Management Associates
 

Similaire à Protecting Corporate Data When an Employee Leaves: Survey and Best Practices (20)

Security 101 for No- techies
Security 101 for No- techiesSecurity 101 for No- techies
Security 101 for No- techies
 
GDPR - Why it matters and how to make it Easy
GDPR - Why it matters and how to make it EasyGDPR - Why it matters and how to make it Easy
GDPR - Why it matters and how to make it Easy
 
What Are you Waiting For? Remediate your File Shares and Govern your Informat...
What Are you Waiting For? Remediate your File Shares and Govern your Informat...What Are you Waiting For? Remediate your File Shares and Govern your Informat...
What Are you Waiting For? Remediate your File Shares and Govern your Informat...
 
Compliance, Security, Migration, Systems Management – All Fixed by Microsoft?
Compliance, Security, Migration, Systems Management – All Fixed by Microsoft?Compliance, Security, Migration, Systems Management – All Fixed by Microsoft?
Compliance, Security, Migration, Systems Management – All Fixed by Microsoft?
 
ACEDS-Zylab 4-3-15 Webcast
ACEDS-Zylab 4-3-15 Webcast ACEDS-Zylab 4-3-15 Webcast
ACEDS-Zylab 4-3-15 Webcast
 
Why Most Migration Projects Fail – Don’t Be a Statistic Webinar
Why Most Migration Projects Fail – Don’t Be a Statistic WebinarWhy Most Migration Projects Fail – Don’t Be a Statistic Webinar
Why Most Migration Projects Fail – Don’t Be a Statistic Webinar
 
Enough Talk – Solving GDPR Problems Through Metadata-Driven Compliance Webinar
Enough Talk – Solving GDPR Problems Through Metadata-Driven Compliance WebinarEnough Talk – Solving GDPR Problems Through Metadata-Driven Compliance Webinar
Enough Talk – Solving GDPR Problems Through Metadata-Driven Compliance Webinar
 
What makes an effective data team?
What makes an effective data team?What makes an effective data team?
What makes an effective data team?
 
Securing your digital world - Cybersecurity for SBEs
Securing your digital world - Cybersecurity for SBEsSecuring your digital world - Cybersecurity for SBEs
Securing your digital world - Cybersecurity for SBEs
 
Securing your digital world cybersecurity for sb es
Securing your digital world   cybersecurity for sb esSecuring your digital world   cybersecurity for sb es
Securing your digital world cybersecurity for sb es
 
Doculabs Everteam houston breakfast 06.29.17 v0.2
Doculabs Everteam houston breakfast 06.29.17 v0.2Doculabs Everteam houston breakfast 06.29.17 v0.2
Doculabs Everteam houston breakfast 06.29.17 v0.2
 
Splunk at Aaron's Inc
Splunk at Aaron's IncSplunk at Aaron's Inc
Splunk at Aaron's Inc
 
Usama Fayyad talk in South Africa: From BigData to Data Science
Usama Fayyad talk in South Africa:  From BigData to Data ScienceUsama Fayyad talk in South Africa:  From BigData to Data Science
Usama Fayyad talk in South Africa: From BigData to Data Science
 
Isc(2) eastbay-lenin aboagye
Isc(2) eastbay-lenin aboagyeIsc(2) eastbay-lenin aboagye
Isc(2) eastbay-lenin aboagye
 
Mayfield CXO Survey: Post COVID-19 Impacts to IT
Mayfield CXO Survey: Post COVID-19 Impacts to ITMayfield CXO Survey: Post COVID-19 Impacts to IT
Mayfield CXO Survey: Post COVID-19 Impacts to IT
 
The Insider Threat
The Insider ThreatThe Insider Threat
The Insider Threat
 
Group 2 Handling and Processing of big data.pptx
Group 2 Handling and Processing of big data.pptxGroup 2 Handling and Processing of big data.pptx
Group 2 Handling and Processing of big data.pptx
 
How To Eliminate Security Exposures in Office 365 Webinar
How To Eliminate Security Exposures in Office 365 WebinarHow To Eliminate Security Exposures in Office 365 Webinar
How To Eliminate Security Exposures in Office 365 Webinar
 
Security For Business: Are You And Your Customers Safe
Security For Business:  Are You And Your Customers SafeSecurity For Business:  Are You And Your Customers Safe
Security For Business: Are You And Your Customers Safe
 
Securing the New Digital Enterprise: Trackable, Controlled, and Authorized
Securing the New Digital Enterprise: Trackable, Controlled, and AuthorizedSecuring the New Digital Enterprise: Trackable, Controlled, and Authorized
Securing the New Digital Enterprise: Trackable, Controlled, and Authorized
 

Plus de Druva

Druva’s 2017 Ransomware Survey
Druva’s 2017 Ransomware Survey Druva’s 2017 Ransomware Survey
Druva’s 2017 Ransomware Survey Druva
 
Taking a Proactive Approach to Combat Ransomware [Druva Webinar]
Taking a Proactive Approach to Combat Ransomware [Druva Webinar]Taking a Proactive Approach to Combat Ransomware [Druva Webinar]
Taking a Proactive Approach to Combat Ransomware [Druva Webinar]Druva
 
Where in the world is your PII and other sensitive data? by @druva inc
Where in the world is your PII and other sensitive data? by @druva incWhere in the world is your PII and other sensitive data? by @druva inc
Where in the world is your PII and other sensitive data? by @druva incDruva
 
Black Hat 2015 Survey: The Challenge of Data Sprawl
Black Hat 2015 Survey: The Challenge of Data SprawlBlack Hat 2015 Survey: The Challenge of Data Sprawl
Black Hat 2015 Survey: The Challenge of Data SprawlDruva
 
Where In The World Is Your Sensitive Data?
Where In The World Is Your Sensitive Data?Where In The World Is Your Sensitive Data?
Where In The World Is Your Sensitive Data?Druva
 
CIO Cloud Security Checklist
CIO Cloud Security ChecklistCIO Cloud Security Checklist
CIO Cloud Security ChecklistDruva
 
Data in the Wild: Survival Guide
Data in the Wild: Survival GuideData in the Wild: Survival Guide
Data in the Wild: Survival GuideDruva
 
40 scary stats about data at risk
40 scary stats about data at risk40 scary stats about data at risk
40 scary stats about data at riskDruva
 
Druva inSync: Enterprise Endpoint Data Protection & Governance (Data Sheet)
Druva inSync: Enterprise Endpoint Data Protection & Governance (Data Sheet)Druva inSync: Enterprise Endpoint Data Protection & Governance (Data Sheet)
Druva inSync: Enterprise Endpoint Data Protection & Governance (Data Sheet)Druva
 
inSync Cloud FAQ
inSync Cloud FAQinSync Cloud FAQ
inSync Cloud FAQDruva
 
inSync FAQ
inSync FAQinSync FAQ
inSync FAQDruva
 
The Challenges of Windows XP Migration (infographic)
The Challenges of Windows XP Migration (infographic)The Challenges of Windows XP Migration (infographic)
The Challenges of Windows XP Migration (infographic)Druva
 
How Endpoint Mobility Kills Bare Metal Restore (infographic)
How Endpoint Mobility Kills Bare Metal Restore (infographic)How Endpoint Mobility Kills Bare Metal Restore (infographic)
How Endpoint Mobility Kills Bare Metal Restore (infographic)Druva
 
Series C: The growth, innovation, and leadership of Druva
Series C: The growth, innovation, and leadership of DruvaSeries C: The growth, innovation, and leadership of Druva
Series C: The growth, innovation, and leadership of DruvaDruva
 

Plus de Druva (14)

Druva’s 2017 Ransomware Survey
Druva’s 2017 Ransomware Survey Druva’s 2017 Ransomware Survey
Druva’s 2017 Ransomware Survey
 
Taking a Proactive Approach to Combat Ransomware [Druva Webinar]
Taking a Proactive Approach to Combat Ransomware [Druva Webinar]Taking a Proactive Approach to Combat Ransomware [Druva Webinar]
Taking a Proactive Approach to Combat Ransomware [Druva Webinar]
 
Where in the world is your PII and other sensitive data? by @druva inc
Where in the world is your PII and other sensitive data? by @druva incWhere in the world is your PII and other sensitive data? by @druva inc
Where in the world is your PII and other sensitive data? by @druva inc
 
Black Hat 2015 Survey: The Challenge of Data Sprawl
Black Hat 2015 Survey: The Challenge of Data SprawlBlack Hat 2015 Survey: The Challenge of Data Sprawl
Black Hat 2015 Survey: The Challenge of Data Sprawl
 
Where In The World Is Your Sensitive Data?
Where In The World Is Your Sensitive Data?Where In The World Is Your Sensitive Data?
Where In The World Is Your Sensitive Data?
 
CIO Cloud Security Checklist
CIO Cloud Security ChecklistCIO Cloud Security Checklist
CIO Cloud Security Checklist
 
Data in the Wild: Survival Guide
Data in the Wild: Survival GuideData in the Wild: Survival Guide
Data in the Wild: Survival Guide
 
40 scary stats about data at risk
40 scary stats about data at risk40 scary stats about data at risk
40 scary stats about data at risk
 
Druva inSync: Enterprise Endpoint Data Protection & Governance (Data Sheet)
Druva inSync: Enterprise Endpoint Data Protection & Governance (Data Sheet)Druva inSync: Enterprise Endpoint Data Protection & Governance (Data Sheet)
Druva inSync: Enterprise Endpoint Data Protection & Governance (Data Sheet)
 
inSync Cloud FAQ
inSync Cloud FAQinSync Cloud FAQ
inSync Cloud FAQ
 
inSync FAQ
inSync FAQinSync FAQ
inSync FAQ
 
The Challenges of Windows XP Migration (infographic)
The Challenges of Windows XP Migration (infographic)The Challenges of Windows XP Migration (infographic)
The Challenges of Windows XP Migration (infographic)
 
How Endpoint Mobility Kills Bare Metal Restore (infographic)
How Endpoint Mobility Kills Bare Metal Restore (infographic)How Endpoint Mobility Kills Bare Metal Restore (infographic)
How Endpoint Mobility Kills Bare Metal Restore (infographic)
 
Series C: The growth, innovation, and leadership of Druva
Series C: The growth, innovation, and leadership of DruvaSeries C: The growth, innovation, and leadership of Druva
Series C: The growth, innovation, and leadership of Druva
 

Dernier

Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 

Dernier (20)

Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 

Protecting Corporate Data When an Employee Leaves: Survey and Best Practices

  • 1. Protecting Corporate Data When an Employee Leaves
  • 2. Our Speakers Today Michael Osterman Principal Analyst Osterman Research, Inc. @mosterman Drew Nielsen Director of Enterprise Security, CISSP, CISA, ISSAP, ISSMP, CCSK Druva, Inc. @virtualkjell
  • 3. About Osterman Research • Focused on the messaging, Web and collaboration industries • Practice areas include archiving, security, encryption, content management, etc. • Strong emphasis on primary research conducted with decision makers and influencers • Founded in 2001 • Based near Seattle ©2017 Osterman Research, Inc.
  • 4. Your company has sensitive, confidential and valuable data Employees have access to that data (and IT often does not) Employees leave your company Your sensitive, confidential and valuable data leaves with them Why We’re Here Today ©2017 Osterman Research, Inc.
  • 5. Employee Turnover is a Fact of Life • The typical company can expect 24% turnover of its employees each year • In 2016, the average employee tenure was 4.2 years • In 2014, it was 4.6 years • Turnover among Millennials is much higher than for older workers • Good economies result in high levels of employee turnover • Involuntary terminations are also common • Individual terminations • Mass layoffs • Company closures ©2017 Osterman Research, Inc.
  • 6. Protecting Data is a Major Problem Companies face a wide range of problems in retaining corporate data when employees leave…and even knowing if they have done so ©2017 Osterman Research, Inc. Percentage of Respondents Indicating a Significant or Major Problem
  • 7. When Employees Leave, What is Retained? Most companies retain employees’ files and emails when they leave But they retain little else! ©2017 Osterman Research, Inc.
  • 8. Why Do Employees Take Data? • They do so unintentionally • BYO devices/applications/mobile apps/storage make it easy for employees to depart with corporate data and not realize it • They don’t think it’s wrong • Many employees believe that “their” clients, prospects, intellectual property and social media contacts belong to them, not their employer • They do so maliciously • Some are angry with management or feel they were wrongly terminated ©2017 Osterman Research, Inc.
  • 9. What are the Consequences? • The biggest problem is loss of intellectual property • Trade secrets, customer lists, marketing plans, financials, reputational damage, etc. • Some examples: • The day before and of his resignation, an employee of Leica Geosystems downloaded 190,000 files, deleted 54,000, and downloaded another 190,000 • An ex-employee of Ferguson Enterprises allegedly kept customer information and used it to set up a competing company • A soon-to-be-terminated employee of BlueScope downloaded the company’s trade secrets before her departure • An employee installed Google Chrome Remote Desktop without IT’s approval and used it to access the corporate network at least 16 times in order to exfiltrate sensitive data • An employee at Expedia’s Hotwire division kept a company laptop and used it to hack into company executives’ email accounts and devices ©2017 Osterman Research, Inc.
  • 10. Other Consequences • Lawsuits and other litigation • Loss of regulated data and data that could be subject to legal hold requirements • Loss of corporate reputation • Loss of competitive advantage • Data breaches ©2017 Osterman Research, Inc.
  • 11. Signs to Look For • Employees copying or downloading significant amounts of information to the cloud, USB drives, personal drives, personal email accounts, personal file sync-and-share accounts, cloud storage, etc. • Employees deleting a significant number of documents or emails • Odd timing of employee access to email, data repositories or facilities • Employees communicating with competitors • Anomalous levels of email activity ©2017 Osterman Research, Inc.
  • 12. Are Good Processes and Systems in Place? Many companies have not implemented the appropriate processes and procedures to manage employee departures ©2017 Osterman Research, Inc.
  • 13. So, What Can You Do About It? • Make sure your sensitive corporate data is under the control of IT, not just employees • Content archiving is a key technology that will put the company in control • Consider limiting employee access to data • Does every employee need access to every piece of corporate data? • Encrypt sensitive and confidential data • In-transit, at-rest and in-use • Use the right authentication for sensitive and confidential data • Risk-based authentication should be considered ©2017 Osterman Research, Inc.
  • 14. What Else Can You Do? • Manage mobile devices and laptops properly • Can all of your devices be wiped after employees leave? Even personally-owned devices? • Your data needs to be backed up • Backup and archiving are both essential best practices • Make sure employment contracts contain confidentiality provisions • Develop, implement and update proper-use policies for EVERYTHING • Monitor and audit employee behavior ©2017 Osterman Research, Inc.
  • 15. Even More Things You Can Do • Conduct initial and ongoing employee training • Don’t allow employees to be their own administrators • This allows employees to decide where sensitive corporate data will be stored • Establish the ownership of social media contacts • Make sure that “ownership” of Twitter and other social media followers is well understood • All managers must understand their employment contracts fully • Data this created during employment, acceptable use policies, etc. ©2017 Osterman Research, Inc.
  • 16. Technologies to Consider • Information governance • Centralized logging and reporting • File analytics technology • DLP • Encryption • Mobile device management • Content archiving • Virtual desktops • Windows to Go • Employee activitity and content monitoring • Solutions to prevent the offloading of data • BYO replacements ©2017 Osterman Research, Inc.
  • 17. We now efficiently manage the full lifecycle of data across time, device and geography. Druva makes this possible. “ ”Shah Nawaz, Director of IT, Shire Enterprise Customers 4,000+ Data Under Management 25PB+ Amazon Storage Partner Top 5 In Cloud Data Protection Gartner#1
  • 18. 2000 2005 2010 2015 2020 2025 Cloud Endpoints Remote Sites Data Centers 40 Exabyte Increasing Data & Business Risks Insider Threat & IP Theft Corruption & Loss Legal Exposure & Sanctions Compliance Infractions Ransomware & Malware
  • 19. Druva : Cloud Information Management
  • 20. Improve Business Agility, Reduce Risk & Cost Single Pane of Glass Improve Data Visibility Reduced Infrastructure Dependency Lower Overall TCO
  • 21. Summary • Employee turnover is common • So is the departure of corporate data when employees leave • Most companies are not adequately prepared to deal with two key issues • The employee departure process • The aftermath of data loss, data breaches and the other consequences that can result from not protecting data • There are steps that can be taken and technologies that can be implemented that will almost entirely solve the problem ©2017 Osterman Research, Inc.
  • 22. For More Information Osterman Research, Inc. +1 206 683 5683 +1 206 905 1010 info@ostermanresearch.com www.ostermanresearch.com ostermanresearch.blog @mosterman ©2017 Osterman Research, Inc. Druva, Inc. +1 650 241 3501 +1 800 375 0160 info@druva.com www.druva.com www.druva.com/blog @druvainc