1 / 13

AI-Powered Information Governance

AI-Powered Information Governance. March 2019. Solution Overview. Byte/Pixel Level Artificial Intelligence Identifies, categorizes, and classifies unstructured data Track categories and trigger protection Eliminate duplicative and near duplicative data Segregate data

altons
Download Presentation

AI-Powered Information Governance

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. AI-Powered Information Governance March 2019

  2. Solution Overview • Byte/Pixel Level Artificial Intelligence • Identifies, categorizes, and classifies unstructured data • Track categories and trigger protection • Eliminate duplicative and near duplicative data • Segregate data MinerEye will allow the Army to see, share, and acton their data – resulting in a modernized, data driven organization Agile Defense Proprietary

  3. SEE SHARE ACT Identify Data Classify Data Manage Data 70-80% of the data created in the last two years is unstructured, unidentified, uncontained, dark data 66% of IT professionals say security is their greatest concern when adopting a cloud computing strategy 50% of retained information in an organization has no business value Agile Defense Proprietary

  4. Solution Overview MinerEye interpretive AI™ is a fusion of Byte level pattern recognition and unsupervised clustering of patterns. MinerEye interpretive AI™ uses computer vision to read bytes of an exemplar file and create a signal – a mathematical vector. The exemplar & its signal is the rule Matched Matched Learned Learned Learned Matched Learned Matched Agile Defense Proprietary

  5. See Beyond Data Tactical Value & Impact Security Strategic Value & Impact Compliance • Classify • Define • Enforce • Identify • Analyze • Protect • Execute Mission • Enhance Oversight • Governance • Cybersecurity Identification Locate data to determine infrastructure and enhance data governance Data Minimization Remove redundant data to reduce storage and attack surface Set sensitivity labels, automatically cluster and track dispersed data ML Automated Classification Forensic Analysis Data spillages, FOIA requests, accidental or malicious release of data Minimize data, define criticality levels, provide visibility on-prem and cloud Data Optimization Agile Defense Proprietary

  6. Use Cases MinerEye utilized at a United States financial services company with $1.9 trillion in assets. • MinerEye located 5 million obsolete documents that customer subsequently deleted. • Customer is now utilizing data forensics to analyze dark data worldwide. Used at a worldwide semiconductor company specializing in design and assembly. • Dealt with both Internal IP leakage and GDPR compliance. • MinerEye aided in data protection concerning PII and purposeful protection of assets. MinerEye utilized at United Kingdom based bank that conducted a Sensitive Data Audit of unstructured data. • MinerEye found thousands of rogue files that contain sensitive customer data in the form of Excel and Access DB (.mdb) that were subsequently classified Agile Defense Proprietary

  7. Potential Savings The Association of Information and Image Management (AIIM) reports that on average, half of an organization’s retained information has no business value. The Compliance, Governance, and Oversight Council (CGOC) estimates that a large company with 10 petabytes of data could be spending as much as $34.5 million on data that could be deleted. “The Pentagon collects 22 terabytes of data every day…You cannot exploit 22 terabytes worth of data the way we are doing things today." -Lt. Gen Jack Shanahan Agile Defense Proprietary

  8. Benefits to The Army “Protecting Our Data” is a critical mission within the US Army and DoD MinerEye delivers AI-Powered Information Governance through • Cybersecurity • Modernization • Optimization Working to Achieve the Army Data Mission! Agile Defense Proprietary

  9. Points of Contact Gavin Kerr Strategic Programs, Agile Defense Inc (571) 206-5739 gavin.kerr@agile-defense.com Yaniv Avidan CEO/Co-Founder, MinerEye (434) 421-5957 yaniv.avidan@minereye.com

  10. Supporting Documents

  11. Distributed architecture (v3.0) MinerEye is shipped and deployed as a distributable micro services to provide maximum deployment flexibility and scalability for IT and multi-cloud customers.

  12. Distributed architecture (v3.0)

  13. MinerEye Integrated w/ NVidia GPU Lab Test acceleration performance of MinerEye in a future endpoint  cloud architecture

More Related