©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone Check Point Makes DLP Work April 22, 2010.

Slides:



Advertisements
Similar presentations
Travel and Expense Management Scenario Overview
Advertisements

IAPP CONFIDENTIAL Insider Leakage Threatens Privacy.
Introducing WatchGuard Dimension. Oceans of Log Data The 3 Dimensions of Big Data Volume –“Log Everything - Storage is Cheap” –Becomes too much data –
DEVELOPER DAY BEFORE WE START, PLEASE VISIT AND SIGN UPWWW.PAYNOW.CO.ZW.
1 Configuring Internet- related services (April 22, 2015) © Abdou Illia, Spring 2015.
©2012 Check Point Software Technologies Ltd. | [Unrestricted] For everyone Check Point DLP & Application Control V-ICT-OR event 26 April 2012 Jeroen De.
©2010 Check Point Software Technologies Ltd. | [Restricted] ONLY for designated groups and individuals Check Point DLP Technical Presentation.
Presented by: Dan Landsberg August 12, Agenda  What is Social Media?  Social Media’s Professional Side  Benefits of Social Media  Regulatory.
Compliance on Demand. Introduction ComplianceKeeper is a web-based Licensing and Learning Management System (LLMS), that allows users to manage all Company,
Nada Abdulla Ahmed.  SmoothWall Express is an open source firewall distribution based on the GNU/Linux operating system. Designed for ease of use, SmoothWall.
Workflow & Event Derivation Workshop
Travel and Expense Management Scenario Overview
Lisa Farmer, Cedo Vicente, Eric Ahlm
Sophos / Utimaco Data Loss Prevention Peter Szendröi, SOPHOS Nordics Jan 20, 2010.
Copyright 2011 Trend Micro Inc. Trend Micro Web Security- Overview.
Security Management IACT 918 July 2004 Gene Awyzio SITACS University of Wollongong.
Security Management IACT 418/918 Autumn 2005 Gene Awyzio SITACS University of Wollongong.
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. 6 Packet Filtering By Whitman, Mattord, & Austin© 2008 Course Technology.
What’s New in WatchGuard XCS 10.0 Update 3 WatchGuard Training.
Workflow & Event Derivation Workshop
Version 2.0 for Office 365. Day 1 Administering Office 365 Day 2 Administering Exchange Online Office 365 Overview & InfrastructureLync Online Administration.
Barracuda Networks Confidential1 Barracuda Backup Service Integrated Local & Offsite Data Backup.
Definitions Collaboration – working together on team projects and sharing information, often through ad-hoc processes, to accomplish project goals. Document.
Security Guidelines and Management
FIREWALL TECHNOLOGIES Tahani al jehani. Firewall benefits  A firewall functions as a choke point – all traffic in and out must pass through this single.
CensorNet Ltd An introduction to CensorNet Mailsafe Presented by: XXXXXXXX Product Manager Tel: XXXXXXXXXXXXX.
©2003–2008 Check Point Software Technologies Ltd. All rights reserved. CheckPoint new security architecture and R70 highlights.
©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone Visibility & Control – Identity, Application & Content Awareness.
Information Security 2013 Roadshow. Roadshow Outline  Why We Care About Information Security  Safe Computing Recognize a Secure Web Site (HTTPS) How.
Barracuda Load Balancer Server Availability and Scalability.
Packet Filtering. 2 Objectives Describe packets and packet filtering Explain the approaches to packet filtering Recommend specific filtering rules.
Syllabus outcomes Describes and applies problem-solving processes when creating solutions Designs, produces and evaluates appropriate solutions.
Using Windows Firewall and Windows Defender
Chapter 6: Packet Filtering
The way Archiving should be!.  Many organisations have either no archiving policy or is severely fragmented.  Archiving is considered as just another.
Vantage Report 3.0 Product Sales Guide
ITIS 1210 Introduction to Web-Based Information Systems Chapter 23 How Web Host Servers Work.
HOW WEB SERVER WORKS? By- PUSHPENDU MONDAL RAJAT CHAUHAN RAHUL YADAV RANJIT MEENA RAHUL TYAGI.
Introducing Paperless Bill Management and Accounts Receivable Processing.
Module 10: Monitoring ISA Server Overview Monitoring Overview Configuring Alerts Configuring Session Monitoring Configuring Logging Configuring.
V 1.0 May 16,2011 Audience: Staff Outlook Agent For the latest version of this document please go to:
Alert Logic Security and Compliance Solutions for vCloud Air High-level Overview.
©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone Network Access Technology: Secure Remote Access S Prasanna Bhaskaran.
PRIVACY, SECURITY & ID THEFT PREVENTION - TIPS FOR THE VIGILANT BUSINESS - SMALL BUSINESS & ECONOMIC DEVELOPMENT FORUM October 21, WITH THANKS TO.
© 2009 WatchGuard Technologies WatchGuard Encryption Subscription Ensuring Privacy and Compliance of Messages.
Packet Filtering Chapter 4. Learning Objectives Understand packets and packet filtering Understand approaches to packet filtering Set specific filtering.
Network and Perimeter Security Paula Kiernan Senior Consultant Ward Solutions.
Fundamentals of Proxying. Proxy Server Fundamentals  Proxy simply means acting on someone other’s behalf  A Proxy acts on behalf of the client or user.
Pedigree: Network-wide Protection Against Enterprise Data Leaks Team: Nick Feamster, Assistant Professor, School of CS Anirudh Ramachandran, PhD candidate,
Security and the Questions Business Users should be asking the Techies.
Copyright 2009 Trend Micro Inc. Beyond AV security, now with DLP and web protection. Trend Micro PortalProtect SharePoint Security.
High Performance Web Accelerator WEB INSIGHT AG Product Introduction March – 2007 MONITORAPP Co.,Ltd.
Yair Grindlinger, CEO and Co-Founder Do you know who your employees are sharing their credentials with? Do they?
Security Version 6.1 | August Need for Complete Security Stop threats at the perimeter High volume spam, phishing, viruses and.
INTERNET PROTOCOLS. Microsoft’s Internet Information Server Home Page Figure IT2031 UNIT-3.
© 2009 WatchGuard Technologies WatchGuard XCS Data Loss Prevention Ensuring Privacy & Security of Outbound Content.
Module 12: Responding to Security Incidents. Overview Introduction to Auditing and Incident Response Designing an Audit Policy Designing an Incident Response.
Protocols Monil Adhikari. Agenda Introduction Port Numbers Non Secure Protocols FTP HTTP Telnet POP3, SMTP Secure Protocols HTTPS.
MCSE Guide to Microsoft Exchange Server 2003 Administration Chapter One Introduction to Exchange Server 2003.
©2013 Check Point Software Technologies Ltd. Small Business. Big Security New SMB Appliances Clinton Cutajar Team Leader – Information Security Computime.
Identity Awareness and Data Loss Prevention Effective DLP David Miller Sr. Director, Security Products October 15, 2009.
(class #2) CLICK TO CONTINUE done by T Batchelor.
Web Content And Customer Relationship Management Solution. Transforming web sites into a customer-focused, revenue generating channel with less stress.
Compliance Management System. Intelex System Overview Focus Modules: –Permits Management –Monitoring & Measurement –Training Management –Document Control.
Intro to Data Loss Prevention In SharePoint 2016\Office 365
Centralized Management for Barracuda Networks products
Web Development Web Servers.
Securing the Network Perimeter with ISA 2004
Mysale Information Classification 101
Comodo Dome Data Protection
Presentation transcript:

©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone Check Point Makes DLP Work April 22, 2010

2 2©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | Check Point DLP Makes data loss prevention work Agenda 1 What is Data Loss? 2 Key Challenges of DLP 3 Introducing Check Point DLP 4 Summary

3 3©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | Data Loss Prevention What is DLP? Corporate Strategy Green World Strategy Plan sent to the wrong recipient, intentionally or by mistake. Data breaches have happened to all of us Company document uploaded to an external website.

4 4©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | Data Breaches—Headline Examples Brand Damage Compliance Liabilities Costly Fines Brand Damage Compliance Liabilities Costly Fines

5 5©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | It’s Not Just About Regulatory Compliance Chief Compliance Officer Chief Security Officer Compliance ► Customer data ► Corporate data ► Patient data Security ► Intellectual property ► Strategic plans ► Internal data

6 6©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | DLP Has Not Yet Been Solved! Technology Challenge Computers can not reliably understand human content and context IT Staff Challenge Burden of incident handling Exposure to sensitive data

7 7©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | Check Point Makes DLP Work Corporate Strategy John, Let’s review the corporate strategy in our morning meeting. Green World Strategy Plan 2010 ‘John’ Confidential data sent to the wrong recipient! Data Loss Prevention Alert An that you have just sent has been quarantined. Reason: attached document contains confidential internal data The message is being held until further action. Send, Discard, or Review Issue User prompted to take action User remediates

8 8©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | John, Let’s review the corporate strategy in our morning meeting. Green World Strategy Plan 2010 Corporate Strategy Data Loss Prevention Alert An that you have just sent has been quarantined. Reason: attached document contains confidential internal data The message is being held until further action. Send, Discard, or Review Issue Introducing Check Point Data Loss Prevention Educate Users on corporate data policies Educate Users on corporate data policies Enforce Data loss business processes Enforce Data loss business processes Prevent Move from detection to prevention Prevent Move from detection to prevention Check Point Combines Technology and Processes to Make DLP Work NEW!

9 9©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | Check Point Solves the DLP Challenge Technology Challenge Empowers users to remediate incidents in real time Technology Challenge Empowers users to remediate incidents in real time IT Staff Challenge Educates users on DLP policies without involving IT staff IT Staff Challenge Educates users on DLP policies without involving IT staff New UserCheck ™ Technology

10 ©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | How Does Check Point DLP Work? Simple Rule-based Policy Management MultiSpect ™ Detection Engine Full Network Enforcement

11 ©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | Item No. NameSocial Security Number Job TitleGross Pay 1John Smith CEO$200,000 2Kevin Brian VP R&D$150,000 3Margret White VP Marketing $153,000 4Bob Johns CFO$140,000 5Mike Riddle COO$180,000 Correlates data from multiple sources using open language New MultiSpect ™ Technology MultiSpect Detection Engine Detects more than 600 file formats 600+ File Formats 250+ Data Types Over 250 pre-defined content data types Detect and recognize proprietary forms and templates

12 ©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | Simple Rule-based Policy Management Easily Define Policy to Detect, Prevent or Ask User

13 ©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | Unified Control and Deployment Centralized Management For Unified Control Across the Entire Security Infrastructure Data Loss Prevention

14 ©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | Ease-of-Deployment Dedicated Appliance Software Blade Network-based Inline Solution On Existing Gateways or Open Servers Be Up and Running Day-1! DLP-1

15 ©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | Check Point DLP At-A-Glance Move from Detection to Prevention Scaling from hundred to thousands of users Supporting HTTP, SMTP and FTP protocols Inline network-based Software Blade running on any existing Check Point gateway UserCheck notification using either thin agent or a returning to the user Proactively block intentional and unintentional data loss

16 ©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | Check Point DLP Summary Check Point combines technology and processes to make DLP work Prevent Data Breaches Move from detection to prevention Enforce Data Policies Across the entire network Educate and Alert Users Without involving IT staff

©2010 Check Point Software Technologies Ltd. | [Restricted] ONLY for designated groups and individuals Thank You!

18 ©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | Check Point DLP in Detail Check Point DLP User Scenarios Key DLP Technologies

19 ©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | Check Point DLP Makes data loss prevention work Agenda 1 What is Data Loss? 2 Introducing Check Point DLP 3 Check Point DLP at Work 4 Key Technologies 5 Summary

20 ©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | Check Point DLP at Work Block Web upload of proprietary information Ask user to confirm and remediate potential breach Filter communications of confidential information based on policy exception Scenario 1: Prevent Scenario 1: Prevent Scenario 3: Alert, Ask and Educate Scenario 3: Alert, Ask and Educate Scenario 2: Enforce Scenario 2: Enforce

21 ©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | Code subroutine to work on from home Preemptively Prevent Data Breaches Web Upload of Proprietary Information Software Developer Developer uploads source code to file share to work on from home Rights to files posted to file- sharing sites transfer to host site Check Point DLP blocks upload and notifies user

22 ©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | Corporate VP sends M&A contract to attorney Filter Based on Corporate Data Policies Policy Exception Allows to Pre-selected Recipients Corporate Development VP M&A letter of intent for review ProjectAtlantisLoI.pdf Hi James, We have revised the terms of the acquisition. Attached is the Letter of Intent for your review. Thanks, David Alert notifies user of data policy

23 ©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | Alert, Ask and Educate Users Check Point Brings User Remediation to DLP Chief Financial Officer Preliminary Financial Statement Preliminary_financials.pdf Greg, Sending you the Q1 preliminary financials for audit. Thanks, Matt Gerhart Chief Financial Officer ACME Corp. Company CFO sends preliminary financial statement to external auditor Check Point Data Loss Prevention Reconsider sending this (Prelimi… Fri 4/2/2010 3:45 PM Rachel Greene PCI Audit Status Fri 4/2/2010 1:23 PM Tom Peters Sales Planning Meeting Thu 3/2/2010 9:45 AM Reconsider sending this (Preli… Preliminary Financial Statement The attached message, sent by you, is addressed to an external address. The Check Point Data Loss Prevention System determined that it may contain confidential information. ’s attachment Preliminary_financials.pdf appears to contain financial records. The message is being held until further action. Send, Discard, or Review Issue Alert asks owner of sensitive data to confirm communication Preliminary Financial Statement Hi, This information is OK to send to our outside auditor. Thanks, Matt User provides an explanation of his request to send

24 ©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | MultiSpect ™ Detection Engine UserCheck™ provides User Remediation Key Technologies Align DLP Rules to Your Policies and Processes

25 ©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | Data Loss Prevention Alert An that you have just sent has been quarantined. Reason: attached document contains confidential internal data The message is being held until further action. Send, Discard, or Review Issue 2. User alert 1. Mail sent or document uploaded 3. User remediation UserCheck Provides User Remediation Non-disruptive Real-time Educational

26 ©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | Align With Your Business Processes Examples ► Spreadsheets with over 500 rows ► More than 5 financial terms ► External recipients in BCC ► More than 10 company names ► Profanity Examples ► Spreadsheets with over 500 rows ► More than 5 financial terms ► External recipients in BCC ► More than 10 company names ► Profanity Adapts to Your Processes and Environment Suspicious Communications Identify unconventional business communication behavior

27 ©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | Multi-data Correlation Prevents Potential Violations MultiSpect ™ Detection Engine Correlates a combination of data types Prevents sending sensitive data to wrong recipients

28 ©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | Forms/Partial Forms ► Recognize sensitive forms and templates Forms/Partial Forms ► Recognize sensitive forms and templates Examples ► HR forms / salary / offers ► Financial docs ► Patient records ► Insurance forms ► Bank forms Examples ► HR forms / salary / offers ► Financial docs ► Patient records ► Insurance forms ► Bank forms MultiSpect Form Detection Insurance claim.pdf Detect and Recognize Your Proprietary Forms

29 ©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | MultiSpect Open Scripting Language Custom Data Type ► Open Scripting Language Custom Data Type ► Open Scripting Language ► Create completely new data types ► Enhance existing data types ► Flexibly tailor DLP to your environment ► Create completely new data types ► Enhance existing data types ► Flexibly tailor DLP to your environment Extended Data Type Creation

30 ©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | DLP-1 Appliance Specifications DLP DLP Performance Number of users 1,0005,000 Messages/Hour 70K350K Throughput 700 Mbps2.5 Gbps Specifications Storage 500 GB2 x 1 TB ( RAID 1 ) NICs 6 Copper 1GbE10 Copper 1GbE Optional Bypass card 4 ports - 2 segments (pre-packaged appliance) 4 ports - 2 segments (orderable as accessory) Price Price year 1 Without bypass card - $14,990 With bypass card- $15,990 $49,990 Add bypass card - $4,995 Annual price year 2+$7,000$12,000

31 ©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | Check Point DLP Software Blade CPSB-DLP-500CPSB-DLP-1500CPSB-DLP-U Recommended Users (depending on configuration)* Up to ,5001,500+ Messages/Hour 5,000-15,000 15, ,000 50, ,000 Max Throughput 700 Mbps1.5 Gbps2.5 Gbps Annual Price $3,000$7,000$12,000

32 ©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | DLP Appliances—Accessories ModelPrice Field Replaceable 4-Port, Copper, Bypass Card (for DLP , PWR-1 907x, IPS-1) $4,995 Check Point Replacement parts Kit including one Hard-Drive, one Power Supply, and one Fan (For DLP ) $3,900 Check Point Lights-Out-Management card (for DLP , PWR-1 907x, IPS-1)) $2,500

33 ©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | Check Point DLP Summary Check Point combines technology and processes to make DLP work Prevent Data Breaches Move from detection to prevention Enforce Data Policies Across the entire network Educate and Alert Users Without involving IT staff

©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone Thank You!