© 2009 WatchGuard Technologies WatchGuard XCS Data Loss Prevention Ensuring Privacy & Security of Outbound Content.

Slides:



Advertisements
Similar presentations
Complete Event Log Viewing, Monitoring and Management.
Advertisements

Copyright © 2012 AirWatch, LLC. All rights reserved. Proprietary & Confidential. Mobile Content Strategies and Deployment Best Practices.
Copyright Critical Software S.A All Rights Reserved. COTS based approach for the Multilevel Security Problem Bernardo Patrão.
1 SANS Technology Institute - Candidate for Master of Science Degree 1 Automating Crosswalk between SP 800, 20 Critical Controls, and Australian Government.
IAPP CONFIDENTIAL Insider Leakage Threatens Privacy.
Microsoft ® Exchange Online Advanced Security Name Title Microsoft Corporation.
FIREWALLS Chapter 11.
Complete Event Log Viewing, Monitoring and Management.
Introducing WatchGuard Dimension. Oceans of Log Data The 3 Dimensions of Big Data Volume –“Log Everything - Storage is Cheap” –Becomes too much data –
COPYRIGHT © 2010 TECTIA CORPORATION. ALL RIGHTS RESERVED. Proactive Measures to Prevent Data Theft Securing, Auditing and Controlling remote.
Presented by: Dan Landsberg August 12, Agenda  What is Social Media?  Social Media’s Professional Side  Benefits of Social Media  Regulatory.
Preventing Good People From Doing Bad Things Best Practices for Cloud Security Brian Anderson Chief Marketing Officer & Author of “Preventing Good People.
© 2009 WatchGuard Technologies WatchGuard XCS Extensible Content Security Superior Security with Lowest TCO.
Lisa Farmer, Cedo Vicente, Eric Ahlm
Sophos / Utimaco Data Loss Prevention Peter Szendröi, SOPHOS Nordics Jan 20, 2010.
Compliance in Office 365 Edge Pereira Sandy Millar From Avanade Australia OSS304.
Copyright 2011 Trend Micro Inc. Trend Micro Web Security- Overview.
©2011 Kingston Technology Corporation. All rights reserved. All trademarks and registered trademarks are the property of their respective owners. Best.
Barracuda Networks Steve Scheidegger Commercial Account Manager
1 ZIXCORP The Criticality of Security Dena Bauckman Director Product Management April 2015.
Federated Search: True Enterprise Search Abe Lederman, President and CTO Deep Web Technologies Search Engine Meeting – April 28-29, 2008.
Clinton Ho Program Manager Microsoft Corporation SESSION CODE: SIA311.
IT-Partners Limited © 2011 IT Partners Limited Y OUR IT SOLUTION P ARTNERS Managing Director Confidential Data Loss Prevention Sunny Ho 1.
1 Managed Security. 2 Managed Security provides a comprehensive suite of security services to manage and protect your network assets –Managed Firewall.
Market Trends Enterprise Web Applications Cloud Computing SaaS Applications BYOD Data Compliance Regulations 30 Second Elevator Pitch Web browsers have.
Enterprise Computing Community June , 2010February 27, Information Security Industry View Linda Betz IBM Director IT Policy and Information.
Social Media Jeevan Kaur, Michael Mai, Jing Jiang.
Protection from internal threats: Evolution of DLP or Who sets trends.
What Keeps You Awake at Night Compliance Corporate Governance Critical Infrastructure Are there regulatory risks? Do employees respect and adhere to internal.
Dell Connected Security Solutions Simplify & unify.
Security considerations for mobile devices in GoRTT
Module 6 Planning and Deploying Messaging Security.
Alert Logic Security and Compliance Solutions for vCloud Air High-level Overview.
Introduction to Barracuda IM Firewall. Two Security Products in One Public IM Management –Manages traffic from public IM clients, including AIM, Yahoo!
© 2009 WatchGuard Technologies WatchGuard Encryption Subscription Ensuring Privacy and Compliance of Messages.
Network and Perimeter Security Paula Kiernan Senior Consultant Ward Solutions.
The Changing World of Endpoint Protection
Pedigree: Network-wide Protection Against Enterprise Data Leaks Team: Nick Feamster, Assistant Professor, School of CS Anirudh Ramachandran, PhD candidate,
Copyright 2009 Trend Micro Inc. Beyond AV security, now with DLP and web protection. Trend Micro PortalProtect SharePoint Security.
Security Version 6.1 | August Need for Complete Security Stop threats at the perimeter High volume spam, phishing, viruses and.
Engineering and Management of Secure Computer Networks School of Engineering © Steve Woodhead 2009 Corporate Governance and Information Security (InfoSec)
Reducing data loss by threats detection. InfoWatch Traffic Monitor & Workplace Security. Andrey Sokurenko Business Development Director.
Chapter 11 Implementing Social Commerce Systems. Learning Objectives 1.Describe the major issues in the social commerce implementation landscape. 2.Discuss.
CYBERSECURITY: RISK AND LIABILITY March 2, 2016 Joshua A. Mooney Co-chair-Cyber Law and Data Protection White and Williams LLP (215)
GRC: Aligning Policy, Risk and Compliance
Enterprise Mobility Suite: Simplify security, stay productive Protect data and empower workers Unsecured company data can cost millions in lost research,
Identity Awareness and Data Loss Prevention Effective DLP David Miller Sr. Director, Security Products October 15, 2009.
Web security | data security | security © 2010 Websense, Inc. All rights reserved. Strategy for Defense Against Web-based Advanced Persistent Threats.
WEBCAST: AN OUNCE OF PREVENTION 1 Chris Wargo, CISSP, CISAPresenter: An Ounce of Prevention Is Worth… $5.9M How to use Symantec Unified Security to prevent.
White Paper: Enterprise Encryption and Key Management Strategy 1 Vormetric Contact: Name: Tina Stewart (send traffic.
Understanding DATA LOSS PREVENTION
Encrypted from CDS Office Technologies
CHAPTER FOUR OVERVIEW SECTION ETHICS
92% of the world’s data was created in the past 2 years
Proactive Information Management and eDiscovery
Reducing Cost and Risk During an Investigation
WatchGuard XCS Threat Prevention
Chapter 3: IRS and FTC Data Security Rules
Skyhigh Enables Enterprises to Use Productivity Tools of Microsoft Office 365 While Meeting Their Security, Compliance & Governance Requirements Partner.
Threat Landscape for Data Security
CHAPTER FOUR OVERVIEW SECTION ETHICS
DATA LOSS PREVENTION Mr. Collins Oduor.
By: Dorian Lockhart Wilston Johnston
4/9/ :42 PM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
Corporate Encryption:
Comodo Dome Data Protection
Security in SharePoint and Teams with DLP, IRM, and AIP
Presentation transcript:

© 2009 WatchGuard Technologies WatchGuard XCS Data Loss Prevention Ensuring Privacy & Security of Outbound Content

© 2009 WatchGuard Technologies The Data Loss Landscape

Framing the Problem: Potential for Leaks is Vast Crimeware Sites Organization (Employee) WikisSocial NetworksBlogs

Data-In-Motion Accounts for 83% of Data Leakage “ has become the de facto filing system for nearly all corporate information, making it even more critical to protect the outbound flow of messages.” - Brian Burke, Secure Products Research Manager, IDC

Exasperating the Problem: Privacy and Security Acceptable UseIntellectual PropertyRegulationsInternal Policies Employee

The Cost of a Data Loss Incident  $6.6 million US per breach  Negative PR  Brand erosion  Lost consumer confidence  Lost business partner confidence  Regulatory fines  Stock market loss  Legal fees  Implementation of internal processes Can your organization afford a data loss incident?

© 2009 WatchGuard Technologies Data Loss Prevention

What is Data Loss Prevention (DLP)?  Data Loss Prevention is:  A business tool that requires a comprehensive strategy  Technology that inspects sensitive content, and audits and enforces content use policies  Data Loss Prevention can be used for:  Regulatory due diligence  Intellectual property protection  Accidental data loss  Data theft

Data Loss Prevention as a Tool, NOT as a Silo  DLP as a Silo…  Standalone product that requires agents, gateway and multiple FTEs for technical management and policy administration  High upfront expense with high total cost of ownership  Disparate and proprietary that does not integrate well with security  DLP as a Business Enablement Tool…  Seamlessly integrated with a secure content and threat management platform  Scans across and web with consolidated policies, management and administration  Automated with no additional FTEs required  Low entry expense with low total cost of ownership

WatchGuard Data Loss Prevention  Deep Inspection  & Web  Content and context scanning  Consolidated Policy Management  Single UI  Reporting  Integrated Remediation  Encryption  Block or allow  Quarantine or reroute  Instant-On Data Loss Prevention!!! “The true value of content monitoring and filtering lies in helping management to identify and correct faulty business processes and accidental disclosures.” Source: Gartner Research: Content Monitoring and Filtering Helps Find Faulty Business Process, Accidental Disclosures

The Power of Content & Context

Seamlessly Integrated Process

WatchGuard Encryption Subscription

© 2009 WatchGuard Technologies Centrally Control Data-In-Motion

Set-It-And-Forget-It Administration

Centralized Policy Management For & Web

Detailed Logging & Reporting of Policy Violations

© 2009 WatchGuard Technologies Thank you. Questions?