Presentation is loading. Please wait.

Presentation is loading. Please wait.

Alon Refaeli October 2012. AGENDA Who we are? What is DLP? Why say we are next generation? Enterprise configuration? How to prevent your data loss?

Similar presentations


Presentation on theme: "Alon Refaeli October 2012. AGENDA Who we are? What is DLP? Why say we are next generation? Enterprise configuration? How to prevent your data loss?"— Presentation transcript:

1 Alon Refaeli October 2012

2 AGENDA Who we are? What is DLP? Why say we are next generation? Enterprise configuration? How to prevent your data loss?

3 Who we are? Founded: 2005 Ownership: Private and self funded Headquarter: Newport Beach, CA – R&D in Kiev, Ukraine – International Office in Taipei, Tokyo, Kuala Lumpur, Bombay, Tel Aviv, Milano, and Brazil. Security Segment: Data Loss Prevention + EDRM (IRM) Target verticals: Financial Institutions, Government, High Tech, Healthcare Channel Partners: UK, Canada, Poland, Slovenia, Greece, Israel, Turkey, Italy, France, Russia, Kenya, Taiwan, Philippines, Singapore, Japan, South Korea, Malaysia, Mexico, Romania and more Named Accounts: – Apple Computer – American Greetings – E2V Semi Conductor – Citgo Oil Company

4 Who we are? GTB has primarily focused its efforts on developing a product with strong detection capabilities, and continues to improve the overall user experience. It has also achieved notable client wins in the past 12 months, thereby increasing its overall market presence. --- Gartner DLP MQ 2O11

5 Awards

6 What is DLP? DATA Data in Motion Who sent my data, and… to who? Data at Rest Where is my data? Data in Use Set access rights for data usage HTTP(S) FTP SMTP IM RDP VNC SSL Network Printer Too many to list here HTTP(S) FTP SMTP IM RDP VNC SSL Network Printer Too many to list here Cut / Copy Paste Print Print Screen Access Files Removable Media Cut / Copy Paste Print Print Screen Access Files Removable Media Desktops Laptops Network Shares (NTFS, NFS…) SharePoint Databases (via ODBC) Desktops Laptops Network Shares (NTFS, NFS…) SharePoint Databases (via ODBC)

7 What is DLP? DLP Answers 5 questions: is ? Where is my data? Desktops Laptops Network Shares (NTFS, NFS…) SharePoint Databases Who is sending my data? Trusted users Intruders Spyware Viruses What data is sent? PII PHI Source Code Intel. Property Who received my data? IP address Email destination Geographic location How do I protect my data? Cut / Copy Paste Print Print Screen Access Files Removable media

8 Why is GTB next generation DLP? GTB Inspector for Network GTB Endpoint Protector for endpoint end device control GTB Endpoint Protector for endpoint end device control GTB eDiscovery to find your sensitive Data at Rest GTB IRM Full content-aware Rights Management System GTB IRM Full content-aware Rights Management System GTB Central Console GTB Central Console control and monitor all behavior

9 Why is GTB Next Generation DLP DATA Data in Motion Data at Rest Data in Use HTTP(S) FTP SMTP IM Network Printer SSL RDP VNC SSH Webmail TCP on all ports Cut / Copy Paste Print Print Screen Access Files Removable Media Desktops Laptops Network Shares (NTFS, NFS…) SharePoint Databases (via ODBC)

10 Data Protection Architecture

11 How to prevent your data loss? Support multi-language content filtering Supports all file types Scan ports 0 to 65,535on all TCP channels Integrates with SEIM Scalable with Load Balancing MTA and Smart Host Integration with any external proxy Enforces content-based policies based Alerts violators, Managers SSL Content Filtering Redacts text from emails in real-time Educates users Seamless integration with email Encryption gateways Quarantines email with user remediation LogBlock Quaranti ne Severity Block Pass Enforcement actions

12 How to prevent your data loss?

13 How to specify/fingerprint files ? Controls granularity of detection size in bytes

14 Customized Policy definitions

15 Detailed Events Data

16 Management Log Complete Auditing

17 How to prevent data loss? USB Drives iPod, other mp3 players CD/DVD Firewire SD cards Floppy drives Other I/O devices Bluetooth Wi-Fi

18 Endpoint Protector access control Group rules Computer rules Individual user rules Entire domain rules File type rules File group rules Device type Device drive name Volume number Bus type Active Directory rules File rules Device rules How to prevent data loss?

19 Endpoint Protector Enforcement actions BLOCK LOG SHADOW ENCRYPT Endpoint Protector reporting Built in Table reports Built in Crystal reports Central Console reports How to prevent data loss?

20 How to prevent your data loss? FeaturesBenefits Agent Based solution Scans thousands of computers at same time with no performance degradation High performanceNetwork friendly Protects all file formats (binary/text) Secures all content including Source Code, Audio, Video and text files Protects database records & fieldsEnsures regulatory compliance Virtually zero false positive rateHighest precision Insures absence of violationsNo false negatives Automatic or manual discoveryNon-stop data protection Customized data type definitionDiscovers data unique to your business Unattended operationMaintenance free

21 SSL Connection Seclore Policy Server (PS) Usage Rights Matrix ViewEditPrintCpy/PasteTime LimitLocation USER 1 Office USER 2 1-5 Jan USER 3 USER 4 Office Representative form of Usage Rights Matrix Various Users Different Rights Examples of protected files View only View & Edit only View & Distribute onlyView & Print only … & other combinations How to prevent your data loss? ]

22 How to prevent data loss? Unified policies for Network, eDiscovery Endpoint and IRM

23 GTB Enterprise DLP Suite Solution Matrix

24 The competition?

25 Others? Feature / FunctionalityGTBWebsense Channel coverage - ability to BLOCK HTTP ServerNo HTTP/HTTPS HTTP TunnelNo FTPNo FTP ServerNo IMNo P2PNo SMTP Mail SSLNo Unknown ProtocolsNo Webmail SSHNo TelenetNo SFTP, SSMTPNo POP3No Printing Fingeprinting Central Policy Console Email Encryption support Voltage, Zix, Sophos, Secureworks, Secure Computing, PostX, Tumbleweed, Symantec, Front bridge, Exchange, Positini,Perimeter Voltage Smart Hostunknown SEIM integration Workflow ICAP support Proxy support TMG, Blue Coat, Ironport, Squid,Webroot, Mcafee, others TMG, Blue Coat, Squid Endpoint protection eDiscovery

26 When will you start? High accuracy of detection and a full range of defense capabilities Flexible data manipulation detection The largest set of protocol support and file format independence High efficiency and without interrupting the network status Encryption is no longer an issue Comprehensive policy framework for data protection

27 We are ready when you are!

28 Live Product Demo

29


Download ppt "Alon Refaeli October 2012. AGENDA Who we are? What is DLP? Why say we are next generation? Enterprise configuration? How to prevent your data loss?"

Similar presentations


Ads by Google