BREAKING DOWN MISCONCEPTIONS ABOUT DLP. BEW GLOBAL’S DLP EXPERTISE Global Support in 130 countries Manage DLP Solutions in 22 Countries Daily Management.

Slides:



Advertisements
Similar presentations
About Us AIMS is one of the leading insurance broking firms in India recognized for its reliability, stability, operational excellence and superior customer.
Advertisements

The impact of Quality Standards on Firm Attractiveness Standards in Action The Impact of Quality Standards on Firm.
Innovation or Necessity? ISM 158 By: Sepehr Saeb.
BUILDING A SECURITY PROGRAM THAT PROTECTS AN ORGANIZATIONS MOST CRITICAL ASSETS.
COMPREHENSIVE APPROACH TO INFORMATION SECURITY IN ADVANCED COMPANIES.
Chapter 15: Packaged Software and Enterprise Resource Planning
Discovery – The Next Generation!: Business Context of Risk Presentation to the North London Branch British Computer Society 19 March, 2008 Dr. Victoria.
Dell Compellent and SafeNet KeySecure
1 Getting Beyond Standalone Antivirus to Advanced Threat Protection Eric Schwake Sr. Product Marketing
PMO Services RFP Overview Patty Fontneau ED and CEO.
OPTIMIZE YOUR DATA LOSS PREVENTION INVESTMENT FOR BOTTOM LINE RESULTS.
Strategy: Analysis and Practice Slide 1 ©The McGraw-Hill Companies, Competitive strategy: The analysis of strategic capability.
Focus on Quality FDA Initiative: June 11, 2013 Francisco Vicenty
The ISO 9002 Quality Assurance Management System
A World of Opportunities A presentation to Indiana University September 20, 2005.
By: Ashwin Vignesh Madhu
© 2014 Level 3 Communications, LLC. All Rights Reserved. Proprietary and Confidential. Polycom event Security Briefing 12/03/14 Level 3 Managed Security.
Risk Management.
BUILDING A SECURITY PROGRAM THAT PROTECTS AN ORGANIZATION’S MOST CRITICAL ASSETS.
OPTIMIZE YOUR DATA LOSS PREVENTION INVESTMENT FOR BOTTOM LINE RESULTS.
Saks Gloweli Capital Saks Gloweli Capital is the Banking and Finance division of Saks Gloweli Consulting. It offers clients a range of financial advisory.
1 Data Strategy Overview Keith Wilson Session 15.
Where Do I Start? What Do I Automate? Melissa Henley Director of Marketing Communications.
Optimize Your Data Protection Investment for Bottom Line Results.
INFORMATION SECURITY GOVERNANCE (ISG) Relates to the security of information systems Is an element of corporate governance.
NUAGA May 22,  IT Specialist, Utah Department of Technology Services (DTS)  Assigned to Department of Alcoholic Beverage Control  PCI Professional.
The Evergreen, Background, Methodology and IT Service Management Model
Social Media Jeevan Kaur, Michael Mai, Jing Jiang.
What Keeps You Awake at Night Compliance Corporate Governance Critical Infrastructure Are there regulatory risks? Do employees respect and adhere to internal.
Driving and Sustaining Quality & Innovation in Manufacturing Processes Thursday, January 19, 20121Quality Presentation - EFY.
Bruce Hallas Director Marmalade Box Ltd. UK Business Comparison of Information Security Incidents & Financial Impact Corporate UK SME UK 25% ↓ in number.
1 Security Integration and Esgraf sales presentation 01/2015.
ETICS2 All Hands Meeting VEGA GmbH INFSOM-RI Uwe Mueller-Wilm Palermo, Oct ETICS Service Management Framework Business Objectives and “Best.
Joint Venture in construction company in West Bank.
CSI - Introduction General Understanding. What is ITSM and what is its Value? ITSM is a set of specialized organizational capabilities for providing value.
BPK Strategic Planning: Briefing for Denpasar Regional Office Leadership Team Craig Anderson Ahmed Fajarprana August 11-12, 2005.
OCTAVE-S on TradeSolution Inc.. Introduction Phase 1: Critical Assets and threats Phase 2: Critical IT Components Phase 3: Changes Required in current.
Security Policies and Procedures. cs490ns-cotter2 Objectives Define the security policy cycle Explain risk identification Design a security policy –Define.
Hazards Identification and Risk Assessment
Ali Pabrai, CISSP, CSCS ecfirst, chairman & ceo Preparing for a HIPAA Security Audit.
℠ Pryvos ℠ Computer Security and Forensic Services May 27, 2015 Copyright © 2015 Pryvos, Inc. 1.
GLOBAL SCHOOL OF PROJECT MANAGEMENT UNIVERSITY FOR INTERNATIONAL COOPERATION Ing. Osvaldo A. Martínez Gómez, MAP, MSc. Essential Topics - Project Management.
1 Accessibility: An Industry Case Study Jennifer Burrowes Kate Walser American Management Systems, Inc.
ENISA efforts for securing European Internet Infrastructure
OUTSOURCING PLANNING. Group Members Sumeet Rao 39 Aastha Salaskar 59 Krunal Madia 58 Dhanashree Kalamkar 18 Ritesh Karunakar 19.
Strategies for Knowledge Management Success SCP Best Practices Showcase March 18, 2004.
TMS - Cooperation partner of TÜV SÜD EFFECTIVE SERVICE MANAGEMENT based on ISO/IEC & ISO/IEC
Reducing data loss by threats detection. InfoWatch Traffic Monitor & Workplace Security. Andrey Sokurenko Business Development Director.
Visibility. Intelligence. response Information Security: Risk Management or Business Enablement? Mike Childs Vice President Rook Security.
1 CREATING AND MANAGING CERT. 2 Internet Wonderful and Terrible “The wonderful thing about the Internet is that you’re connected to everyone else. The.
© 2003 Six Sigma Academy0 The Roles of Six Sigma Champion Workshop.
Impact Research 1 Enabling Decision Making Through Business Intelligence: Preview of Report.
Cloud Security for eHealth – Study Validation
Fourth Dimension Technologies
Physical Security Governance Model
Dell Compellent and SafeNet KeySecure
Vendor Landscape Plus: IP Telephony Vendors
BEW GLOBAL’S DLP EXPERTISE
ServiceNow Implementation Knowledge Management
CCNET Managed Services
Information Security based on International Standard ISO 27001
COMPREHENSIVE APPROACH TO INFORMATION SECURITY IN ADVANCED COMPANIES
ROB PROW MIPI/MCMI ALTERNATIVE SOLUTIONS LIMITED
SOUTH AFRICAN INSURANCE ASSOCIATION
EU GATEWAY TO KOREA Facilitating long-lasting business collaborations
Innovative Foundations Services.
MAZARS’ CONSULTING PRACTICE Helping your Business Venture Further
KEY INITIATIVE Financial Data and Analytics
Presentation transcript:

BREAKING DOWN MISCONCEPTIONS ABOUT DLP

BEW GLOBAL’S DLP EXPERTISE Global Support in 130 countries Manage DLP Solutions in 22 Countries Daily Management of 1,000,000+ Users Deployed 400+ DLP Projects Completed 500+ Assessments Localized Chinese DLP Practice (2011) 1st Managed DLP Services Provider (2008) VENDOR RECOGNITIONS Symantec Master Specialization DLP Partner RSA’s Only Authorized Managed DLP Partner Websense Certified TRITONs – More than any other partner, 10 Olympians & 5 Gladiators

BEW GLOBAL SERVICES BEW GLOBAL’S CORE DIFFERENTIATORS Methodology based on the cornerstones of ISO Plan-Do-Check-Act Leverage our proven Quality Management System (QMS) to drive continuous improvement Reduce risk and increase operational efficiencies

Misconception 1: DLP is an IT only project

5 Pieces of DLP Advice You Can’t Afford t Ignore 5 Misconception 2: Out of the box policies are effective without customization

5 Pieces of DLP Advice You Can’t Afford to Ignore 6 Misconception 3: DLP is a plug and play technology

7 Misconception 4: DLP cannot protect intellectual property

BEW Global works in cooperation with customers to plan, implement and maintain a Critical Asset Protection Program (CAPP) that clearly defines what assets are deemed most important to the customer organization based on revenue, income, reputation and core operational impact.. BEW GLOBAL’S PROVEN APPROACH

SECURITY CONTINUUM

REALISTIC SCOPE, MEASUREABLE RESULTS Through a comprehensive interview and information gathering process, BEW Global works with the customer to develop a realistic Critical Asset Protection Program ( CAPP ) scope that defines the assets as well as the core attributes of those assets in regards creation, storage, usage and transmission.

USE CASE: DLP PRE-PROJECT STATE Organization Overview: Manufacturing firm of 30,000 employees operating in 50 countries globally DLP Scope: Protection of Intellectual Property (General) DLP Primary Issue: Lack of staff and buy-in from business owners who handle critical assets Application Management: Most information security tools operated and “managed” by IT or networks Policy Governance: No internal resources with any experience with DLP policy construction Incident Triage: Lean staff of Infosec staff already buried by SIEM and other tools output Event Management: Informal event management process with little feedback to the business Reporting and Metrics: Zero customized reports. Very little business analysis provided Status: Charged with implementing DLP to protect Critical Assets, specifically product IP

INTELISECURE QUALITY MANAGEMENT SYSTEM

USE CASE: POST-PROJECT STATE Organization Overview: Defined specific business units to initiate program DLP Scope: Focused on 3 specific product lines linked to highest revenue & earnings DLP Primary Goal: Identification of unauthorized movement of specific elements of IP Application Management: Operated by a combination of IT, messaging & desktop management teams Policy Governance: 100% customized policies based on data collected from business unit Incident Triage: Daily review of incidents by BEW Global Intelisecure Managed Services team Event Management: Incidents meeting severity criteria routed to business unit for investigation Reporting and Metrics: Behavioral pattern analysis leading to preventive actions Status: R&D teams have high-level of confidence in ability to identify leakage of IP

BEW GLOBAL IS THE CHOICE OF MARKET LEADERS CLIENTS INCLUDE MANUFACTURINGOIL & GAS RETAIL / ENTERTAINMENT TOP 100 GLOBAL

BEW GLOBAL IS THE CHOICE OF MARKET LEADERS CLIENTS INCLUDE UNIVERSITIESINSURANCE HEALTHCARE FINANCE TOP 50

QUESTIONS?