Download presentation
Presentation is loading. Please wait.
Published byStewart Davidson Modified over 6 years ago
1
Glen Kosaka Director, DLP Marketing November 2007
Trend Micro LeakProof 3.0 Glen Kosaka Director, DLP Marketing November 2007
2
Agenda The Pain: Damaging Leaks of Sensitive Information
Uneducated employees cause accidental disclosures Companies don’t know where sensitive data is The Cure: Trend Micro LeakProof 3.0 Why Trend Micro LeakProof 3.0 Background Trend Micro Confidential 9/20/2018
3
Data Leak Prevention: PAIN Worldwide
BREAKING NEWS! Boeing Breach "Police reported finding a thumb drive that was connected to his computer terminal via a USB cord that ran along the back of the terminal to the storage device that was "hidden in a drawer" in his desk.” 7/11/07. Fidelity NIS Theft "To avoid detection, the administrator appears to have downloaded the data to a storage device rather than transmit it electronically." 7/03/07. Trend Micro Confidential 9/20/2018 3
4
Securing Enterprise Data
LeakProof enables companies to reduce the risk of data breaches and ensure privacy and compliance LeakProof understands the content of data at rest, in use, and in motion on every enterprise endpoint, providing protection of sensitive data Trend Micro Confidential 9/20/2018
5
The ‘Insider Threat’ Authorized Un-Authorized
78% of data breaches come from Authorized Insiders Ponemon Institute Study – 2006 Insiders Outsiders Threat Threat Accidental or malicious breach Lost or stolen data Goals Goals Monitor, log, prevent breaches Assess risk - continuously Educate employees Prevent use of data by unauthorized people Focus of LeakProof 3.0 Trend Micro Confidential 9/20/2018
6
Scenes of Mobile Data Leakage
Kristina, at Starbucks™… …edits a confidential document… …and s it How do you know? How can you tell it wasn’t a love letter? Could you have stopped it? Scene 2 Gary, at a branch office… …encrypts customer data… …and copies it How do you know? Is he authorized? Can you centrally monitor & log? USB Drive Trend Micro Confidential 9/20/2018
7
LeakProof™ Secures From the Endpoint
Protect Educate Client Software Intelligent Fingerprint, Regex, Keyword, Meta-data Interactive Invisible Independent Robust ACME Customer Privacy Protection Employees of ACME are expected to protect… Justify New 3.0 Anti-leak Client Discover DataDNA Server Enterprise Management Policy Visibility Workflow Trend Micro Confidential 9/20/2018 7
8
What’s New in LeakProof 3.0?
Interactive Employee Education & Workflow Log, Block, Client Alert Education: Custom messages and URL links Encryption for USB copying Justification Discovery of Sensitive Data Stand-alone discovery/scan module Administrative Workflow Dashboard, Policies, and Monitoring Broadest Coverage at the Endpoint USB, , Webmail, IM, Network… Windows Vista / Office 2007, Yahoo IM filtering, PrintScreen Blocking New New New New Enhanced New Trend Micro Confidential 9/20/2018
9
Unique Fingerprinting Technology
Fast Small Accurate Language independent The first step in building a fingerprint of a document is to find the characters in the document that are statistically significant. This is an important step and is what makes the Provilla fingerprinting technology language independent. Once we know what characters are important to that particular document, we record the relative positions of those characters within the document. This data becomes the fingerprint for that document. Trend Micro Confidential 9/20/2018
10
Core Filtering Technology
DataDNA™ Matching Engine High confidence, low false positives Language independent Multiple matching methods Signature/fingerprint Entity / Regex Keyword File meta-data Robust Anti-Leak A/L Agent DataDNA matching engine protects Online OR offline On edited, re-saved, cut/pasted content Broadest coverage Devices, channels, applications, clients, network protocols Authorizes encryption D ata NA™ Fingerprinted D ata NA™ BLOCKED! New archi-tecture plan Trend Micro Confidential 9/20/2018
11
Leading Agent Performance and Technology
Performance/ Footprint Provilla A/L Agent CPU cycles 2.54% (1/2) Run-time Memory 8,280K (1/5) Fast and light Fastest matching engine Smallest signatures Unobtrusive, Invisible Not in task manager Not in service list Hidden files/directory Search Provilla A/L Agent Competition Keywords: 1000 12.0 MB/s (10x) 1.3 MB/s Entity –SSN, Phone, Date 190 MB/s (40x) 4.75 MB/s Trend Micro Confidential 9/20/2018
12
Enterprise Workflow & Policy
Leak Protection Policies Logging, alerting, blocking Education, Encryption, Justification By endpoint, user, or group By data classification HIPAA, Customer, SOX, SS# Separate online and offline policies Inventory & Forensics Discovery By endpoint, group, policy Investigate events, see actual sensitive content Scalability, Availability Server clustering Agent monitoring DATA IN MOTION DATA AT REST DATA IN USE Dashboard & Reporting Trend Micro Confidential 9/20/2018
13
Trend Micro LeakProof distribution partners
Compelling Results Sony Ericsson: Global mobile handset manufacturer Over 100 security violation incidents in first 3 weeks ISSI: Technology manufacturer Detected large number of file copies after employee resigned Leading financial services company Protected customer privacy to address compliance regulations GLBA etc Trend Micro LeakProof distribution partners Trend Micro Confidential 9/20/2018
14
Discussion Background
15
Data Security & Protection
Why Data Security? Data is more mobile Mobile devices more powerful Difficult to secure the ‘infrastructure’ in a mobile world Laptops USB CD DVD PDAs Smart Phones Cell Content Sensitivity & Threat Potential (source: InfoLock) Employee & Client Information and Intellectual Property (R&D, HR) Documents, Sensitive Data , Contacts, Documents Contacts, Calendar According to Gartner, 47% of corporate data resides on mobile devices, and 350,000 mobile devices were lost or stolen in the U.S. over a two-year period Trend Micro Confidential 9/20/2018
16
Enterprise Mobile Device Market Penetration Over Time
Mobile Insecurity Desktop and Mobile Leakage Enterprise Mobile Device Market Penetration Over Time 2000 2005 2010 100 % Penetration 80 60 40 20 Top Leakage Concerns Mobile Population Anchored Desktop Source: Market Research International Source: The 451 Group and Infolock Trend Micro Confidential 9/20/2018
17
New Dashboard and Workflow
Trend Micro Confidential 9/20/2018
18
Employee Education Brandable Custom Links Severity:
Logo and custom messages Custom Links Company Policies ACME Customer Privacy Protection Employees of ACME are expected to protect sensitive information containing customer information such as names, account numbers, social security numbers etc. Please report any … Call the helpdesk or . Protection of Intellectual Property The IP of ACME is very valuable to us, and we expect all employees to help protect this data. Files con- taining IP secrets should not be ed, copied to USB, … If you have any questions about this, please contact HR at … Severity: Blocked, Warn & Log, Info only Custom Alert Messages File {name} contains {class} data and should not be sent via {channel} Trend Micro Confidential 9/20/2018
19
Trend Micro Confidential
9/20/2018
20
Patented DataDNA Technology
Superior endpoint-based enforcement Signature Engine Comparisons Copy-Detection: Shingling-based Copy-Detection: Byte-based DataDNA: Char-extraction Algorithm Method Text tokenization + Token-based sliding window + Hash Byte-based sliding window + Hash Character-based mathematical analysis Signature Profile File size/content dependent Potentially huge database Fixed, tunable size Smallest database Language Support Language dependent Language independent Endpoint Capable Not practical Slow Huge footprint Optimized Fast Small footprint Company PortAuthority, Vontu, Reconnex Code Green LeakProof Trend Micro Confidential 9/20/2018
Similar presentations
© 2024 SlidePlayer.com Inc.
All rights reserved.