There are times when the information security team of an organization needs to conduct internal investigations. There may be a departing employee suspected of potentially transferring sensitive data to their personal email account, or there has been a data leak where a file containing a critical trade secret is accidentally shared with a wider employee base in the organization.
In such scenarios – organizations only have days to investigate before the employee leaves or even a few crucial hours before the data leak becomes an unrecoverable extent. This means an organization can’t waste hours trying to investigate the incident. Yet in most cases, critical hours are wasted chasing dead ends due to bureaucracy and legacy IT systems.
What makes investigations so difficult?
The biggest issue with digital investigations faced by firms today is the distributed nature of data sources employees can potentially utilize – desktops, cloud shares, emails, and team drives. When an investigation is needed, searching all of these data sources quickly and efficiently is like searching for a needle in the haystack.
Additionally, there is the bureaucracy and logistical delays of separate admins and departments managing different data sources. Each investigation request to separate admins of different departments naturally causes further delays and bureaucratic headaches. To compound the problem further, there is no single person who knows the system 100%.
Finally, the legacy search capability provided by most data source vendors makes searching for a needle in a haystack an impossible task. There either is a limitation on the historical time period for a particular email or file, or a limitation on what metadata is available.
How can Druva help?
During investigations, working efficiently and quickly is the key. Druva’s search capability has been designed for the scale and diversity of a large enterprise. Druva’s federated search functionality collects data from multiple sources and provides results on a near real-time basis across multiple data sources in a single pane of glass. The data sources supported include, laptops, mobile devices, box folders, GSuite and Office 365. Some of Druva’s key capabilities to streamline search include:
Search at scale on a near real-time basis
With a focus on scale, Druva’s solution indexes data during backup as opposed to indexing the data when searched. However complex the query, Druva’s shard-based indexing mechanism ensures that search results show up in a matter of few seconds.
More importantly, data is available to search when it gets created. The net result that it saves investigators a significant amount of time.
Historical investigations made easy
Historical investigations are always a concern. We are often asked by our customers “What happens when a case is 6 months old and the employee no longer works for the organization?”
Fortunately, Druva maintains historic “As Is” copies of data enabling the ability to go back in time and search within a specific investigative time window. Even if an employee clears all traces – it is still possible to search historic snapshots to indicate whether a file or email existed at a specific point in time.
Extended metadata overage
Finally, Druva captures all relevant metadata of a file and email. This means search is quick, efficient and consistent. Through a single query, it is possible to search across data sources and potentially reduce the time to investigate from days to a few seconds.
Druva federated search today supports following metadata parameters
- File metadata parameters:
- Filename
- Extension
- Checksum
- Modified Time
- Create Time
- File Size
- Email metadata Parameters
- Email Subject
- Email Recipients (from/to/cc/bcc)
- Email Receive Time
- Attachment Name
- Attachment Extension
- Attachment Checksum
- Attachment Size
With all this in mind, consider the following three scenarios:
Scenario 1: HR and Legal Investigation
Employee Max gives notice to leave the company. Max has been working with several high profile customers in his role as a systems engineer. His manager suspects that he will be joining their competition and alerts HR. HR requests that John, the data protection analyst, to investigate and run a risk assessment of Max. John is given a couple of keywords including the companies that Max was working with.