By HAIDER I MOHSIN Securing Confidential Data with Data Loss Prevention Systems.

Slides:



Advertisements
Similar presentations
!! Are we under attack !! Consumer devices continue to invade *Corporate enterprise – just wanting to plug in* Mobile Device Management.
Advertisements

1 Effective, secure and reliable hosted security and continuity solution.
COMPREHENSIVE APPROACH TO INFORMATION SECURITY IN ADVANCED COMPANIES.
Avoid data leakage, espionage, sabotage and other reputation and business risks without losing employee performance and mobility.
The Case for Tripwire® Nick Chodorow Sarah Kronk Jim Moriarty Chris Tartaglia.
By The Wanderers Securing Cision’s Confidential Data with Data Loss Prevention Systems.
Preventing Good People From Doing Bad Things Best Practices for Cloud Security Brian Anderson Chief Marketing Officer & Author of “Preventing Good People.
Avoid data leakage, espionage, sabotage and other reputation and business risks without losing employee performance and mobility. Simplify authentication.
Network and Server Basics. 6/1/20152 Learning Objectives After viewing this presentation, you will be able to: Understand the benefits of a client/server.
Oracle Beehive Vivek Pavle Orabyte LLC Orabyte.
Sophos / Utimaco Data Loss Prevention Peter Szendröi, SOPHOS Nordics Jan 20, 2010.
Compliance in Office 365 Edge Pereira Sandy Millar From Avanade Australia OSS304.
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. 6 Packet Filtering By Whitman, Mattord, & Austin© 2008 Course Technology.
Version 2.0 for Office 365. Day 1 Administering Office 365 Day 2 Administering Exchange Online Office 365 Overview & InfrastructureLync Online Administration.
Barracuda Networks Confidential1 Barracuda Backup Service Integrated Local & Offsite Data Backup.
Designed By: Technical Training Department
Windows XP Professional Deployment and Support Microsoft IT Shares Its Experiences Published: May 2002 (Revised October 2004)
Kaspersky Open Space Security: Release 2 World-class security solution for your business.
Customized solutions. Keep It Secure Contents  Protection objectives  Endpoint and server software  Protection.
PCM2U Presentation by Paul A Cook IT SERVICES. PCM2U Our History  Our team has been providing complete development and networking solutions for over.
Barracuda Networks Steve Scheidegger Commercial Account Manager
©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone Endpoint Security Current portfolio and looking forward October 2010.
Presence Applications in the Real World Patrick Ferriter VP of Product Marketing.
A Comprehensive Solution Team Mag 5 Valerie B., Derek C., Jimmy C., Julia M., Mark Z.
IT-Partners Limited © 2011 IT Partners Limited Y OUR IT SOLUTION P ARTNERS Managing Director Confidential Data Loss Prevention Sunny Ho 1.
Partnering For Profitability Growing your business with Microsoft Forefront Security Solutions Mark Hassall Director Security & Access BG Microsoft Corporation.
1 Managed Security. 2 Managed Security provides a comprehensive suite of security services to manage and protect your network assets –Managed Firewall.
SEC835 Database and Web application security Information Security Architecture.
PROJECT PAPER ON BLUEFIRE MOBILE SECURITY. BY PONNURU VENKATA DINESH KUMAR STUDENT ID # A0815 PROFESSOR – VICKY HSU CS-426.
What Keeps You Awake at Night Compliance Corporate Governance Critical Infrastructure Are there regulatory risks? Do employees respect and adhere to internal.
©Kwan Sai Kit, All Rights Reserved Windows Small Business Server 2003 Features.
TRUSTPORT PRODUCT PORTFOLIO Marcela Parolkova Sales Director.
Managing and Securing Endpoints Bruce Hotte Chief Information Officer Jeff Swan Network Supervisor  The definition of “endpoint” used to be simple: a.
Dell Connected Security Solutions Simplify & unify.
Section 1: Introducing Group Policy What Is Group Policy? Group Policy Scenarios New Group Policy Features Introduced with Windows Server 2008 and Windows.
Extending Forefront beyond the limit TMG UAG ISA IAG Security Suite
Maintaining a Secure Messaging Environment Across , IM, Web and Other Protocols Jim Jessup Regional Manager, Information Risk Management Specialist.
Electronic Records Management: A Checklist for Success Jesse Wilkins April 15, 2009.
Network and Perimeter Security Paula Kiernan Senior Consultant Ward Solutions.
The Changing World of Endpoint Protection
OCTAVE-S on TradeSolution Inc.. Introduction Phase 1: Critical Assets and threats Phase 2: Critical IT Components Phase 3: Changes Required in current.
NON-COMPULSORY BRIEFING SESSION REQUEST FOR INFORMATION: ICT SECURITY SOLUTIONS RAF /2015/00019 Date: 29 September 2015 Time: 10:00.
Forefront – Security in Education Stephen Cakebread Security Solutions Sales Professional Microsoft Corporation.
© 2009 WatchGuard Technologies WatchGuard XCS Data Loss Prevention Ensuring Privacy & Security of Outbound Content.
Microsoft and Symantec
Agency Introduction to DDM Dell Desktop Manager (DDM) Implementation.
What’s New Data Loss Prevention 14. Information is Everywhere Brings Productivity, Agility, Convenience ……and Problems Copyright © 2015 Symantec Corporation.
By: Matt Winkeler.  PCI – Payment Card Industry  DSS – Data Security Standard  PAN – Primary Account Number.
Unit 2 Personal Cyber Security and Social Engineering Part 2.
Prepare, Migrate, and Operate with Barracuda. Who is Barracuda Networks? NYSE: CUDA Founded in 2003, IPO 2013 Headquartered in Silicon Valley, offices.
The Payment Card Industry Data Security Standard (PCI DSS) is a proprietary information security standard for organizations that handle branded credit.
SemiCorp Inc. Presented by Danu Hunskunatai GGU ID #
Data-Tech Guardian Endpoint Security Suite. Guardian Endpoint Security Suite secures All Things Mobile TM from one management console.
Network and Server Basics. Learning Objectives After viewing this presentation, you will be able to: Understand the benefits of a client/server network.
Introduction to Barracuda IM Firewall
Your Office 365 Journey Prepare, Migrate, and Operate with Barracuda
NON-COMPULSORY BRIEFING SESSION REQUEST FOR INFORMATION: ICT SECURITY SOLUTIONS RAF /2015/00019 Date: 29 September 2015 Time: 10:00.
Critical Security Controls
A Winning Combination !! and Good afternoon…
Skyhigh Enables Enterprises to Use Productivity Tools of Microsoft Office 365 While Meeting Their Security, Compliance & Governance Requirements Partner.
COMPREHENSIVE APPROACH TO INFORMATION SECURITY IN ADVANCED COMPANIES
Check Point Connectra NGX R60
A 5-minute overview of ADAudit Plus
DATS International Portfolio.
(With Hybrid Network Support)
4/9/ :42 PM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
Comodo Dome Data Protection
Presentation transcript:

By HAIDER I MOHSIN Securing Confidential Data with Data Loss Prevention Systems

Outline of contents  Business Problem and Requirements  Data Loss Prevention (DLP) Solutions  Proposed Solution  Vendor Comparisons and Architecture  Company implementation & Conclusion

Business Problem Problem  X-BANK needs the capability to exchange confidential information securely and easily. X-BANK  1200 Employees, 30+ offices, 8 countries  Confidential Data  Credit Card / Client Information  Customer privileged data  Employee personal data  Business Confidential data  Secure data from  Employee Error, Employee Theft

Business Solution Requirements Business Solution Requirements Required  Meet the Payment Card Industry (PCI) requirements for credit card handling  Prevent client, business or employee data from being incorrectly disclosed internally and externally  Global capabilities with central configuration and enforcement Out of Scope  Anti Virus, Firewall, Intrusion Detection Systems, Spam Filtering  Limited Other legal requirements: No HIPPA or SOX requirements

Source:

DLP Background Definition of Data Loss Prevention  Products that, based on central policies, identify, monitor, and protect data at rest, in motion, and in use, through deep content analysis. - Rich Mogull of Securosis Other TLAs  Data Loss Protection  Data Leak Prevention/Protection  Information Loss Prevention/Protection  Information Leak Prevention/Protection  Extrusion Prevention System  Content Monitoring and Filtering  Content Monitoring and Protection

DLP Background Identify where holes or exit points where leaks may occur  Instant messaging (Yahoo Instant Messaging, Windows Live)  P2P file sharing (e.g. LimeWire case as reported by LA Times)  Media streaming  Web mail (Yahoo mail, Gmail, Hotmail)  USB storage devices (ZDNet story from UK)  Removable drives  Devices connected through external ports (Firewire, serial, parallel)  FTP server  Printouts

DLP Background Source: Securosis.com

How data are flagged and identified  Initial predefined policies  Social security numbers  Prescribed in HIPAA, SOX, GLBA, etc. (Bank account numbers, Credit card numbers)  Customized categories based on client needs  Data Discovery  Looks into the content and not just the file type  Examine context considerations (factor in parent directories, user group matching)  Structured data matching (SSN, credit card numbers, etc)  Unstructured data matching (diagrams, source codes, media files)  Fingerprint the data by using one way hash and saved in the database  Information can then be used to identify confidential data elsewhere DLP Background

Three different levels of DLP solution  Data in Motion  Data which uses HTTP, FTP, IM, P2P and SMTP protocols are mirrored in the DLP server for inspection where visibility is enhanced  Data at Rest  Data in file servers, databases, hosts computers set for file sharing, etc.  Data at End Points  Data which sits on end user hosts (workstations and notebooks) DLP Background

Technical Feature Considerations  Deep content analysis, monitoring and prevention  Identification and blocking capability  Centralized Management  Central policy setting, dashboard features  Broad content management across platforms and ease of Integration  Review of information infrastructure including software for requirement and compatibility issues  Automated remediation  Transfer confidential files, LDAP lookup, secure purging of sensitive data Business Environment Considerations  Matching with Business Need  Matches defined business need over feature allure  Market Presence  Major presence in the market, financial industry experience  Staffing Needs  Staffing considerations to handle additional responsibilities DLP Background

The Selection  Given that the business problem of to be able to exchange confidential information securely and easily,  We believe that a DLP solution have the ability to address such need by identifying and securing confidential data in a comprehensive and efficient manner as described in the guidelines above,  We select SYS CURE as a representative of such DLP solution which has met all criteria mentioned above. SYS CURE  Global leader in integrated Web security, data security, and security solutions.  Protects approximately 40 million employees at more than 40,000 organizations worldwide  Core strength in Web filtering, discovery and classification of content Source: CURE.com/content/aboutus.aspx Solution Selection Solution Selection

SYS CURE Data Security Suite  Data Discovery  Data Protect  Data Monitor  Data Endpoint DLP Solution: DLP Solution:

Data Discovery  Software-based solution that remotely scans specified network file shares, databases, servers, data repositories, and desktops to discover and classify confidential data on these systems  Automated remediation of unsecured confidential data on data repositories, such as encryption, file removal, etc  370 different types of file definitions DLP Solution: DLP Solution:

Data Protection  Protects data with policy-based controls that map to business processes  Automated, policy-based enforcement options including block, quarantine, file removal, encrypt, audit and log, user notification in real time. DLP Solution: DLP Solution:

Data Monitor  Monitors and identifies what customer data is at risk; who is using the data in real time; and where this data is going  Precise ID technology DLP Solution: DLP Solution:

Data Endpoint  Provides endpoint security and control over what confidential data is and should be stored (through local discovery)  Who is using it  How it is being used (with what applications)  Where it is being transferred (USB storage, printer) DLP Solution: DLP Solution:

SYS CURE Data Security Suite in Action (Case: Miss Bea Haven) DLP Solution: DLP Solution:

Alternative Vendors (Considerations) Alternative Vendors (Considerations)

VendorStrengthsWeaknesses Symantec Industry-leading network discovery and endpoint protection Supports localization in 16 languages Mature deployment methodology Most expensive enterprise license costs Admin Console is not localized (English only) SYS CURE Robust on network discovery and endpoint protection Supports localization in multiple languages and already has global presence Subscription based or perpetual licensing Most appealing to current SYS CURE clients wishing to leverage existing products RSA(EMC) Robust on network discovery Providing a broad range of DLP inspection capabilities Document fingerprinting content-inspection capabilities. Weak on endpoint protection Limited localized detection and support Alternative Vendors (Comparison) Alternative Vendors (Comparison)

Deployment Architecture  Windows Enterprise Network  500 – 2,500 Users DLP Solution DLP Solution

Deployment Architecture  Windows Enterprise Network  500 – 2,500 Users DLP Solution DLP Solution

 X-BANK needs to add DLP capabilities to their current security solutions to meet the business needs.  SYS CURE meets the requirements  SYS CURE is well positioned to grow with X- BANK’s future needs.  Your mileage may vary Conclusion Conclusion

Questions? Preguntas? Pangutana? Questions? Preguntas? Pangutana? Tanong? Perguntas? क्वेस्चन्स ? Tanong? Perguntas? क्वेस्चन्स ?