dlp 10 overview · Symantec DLP Overview Jonathan Jesse ITS Partners. What are the challenges? ...
-
Upload
nguyennhan -
Category
Documents
-
view
236 -
download
9
Transcript of dlp 10 overview · Symantec DLP Overview Jonathan Jesse ITS Partners. What are the challenges? ...
What are the challenges?
What is Data Loss Prevention (DLP)?
Why Symantec DLP and how does it work?
Today’s Agenda
How does DLP address key challenges?
2
DLP is Imperative
Insiders and partners cause most breaches• Insiders make mistakes handling data• Broken business processes increase risk
Compliance mandates data protection• Increased focus on data privacy• Need to demonstrate data controls
More complex threats to your data• External threats target high value data• Limited visibility of where data is
88%of breaches
81%of companies breached were
not PCI compliant
$6.7million average cost of a breach
3
> Symantec Protection Suites
> Symantec Control Compliance Suite
> Symantec Data Loss Prevention
> Altiris Management Suite
Protect theInfrastructure
Develop and Enforce IT Policies
Protect Information Proactively
Manage Security Efficiently
4
DLP is the Cornerstone of Security
What is Data Loss Prevention?
DATA LOSS PREVENTION (DLP)
DISCOVER PROTECTMONITOR
5
How best toprevent its loss?
How is it being used?
Where is yourconfidential data?
MANAGE
• Find data wherever it is stored
• Create inventory of sensitive data
•Manage data clean up
•Understand how data is being used
•Understand content and context
•Gain visibility into policy violations
• Proactively secure data
• Prevent confidential data loss
• Enforce data protection policies
DISCOVER PROTECTMONITOR
• Define unified policy across enterprise
• Detect content accurately• Remediate and report on incidents
Key DLP Capabilities
6
MANAGE
MANAGE
DISCOVER
• Identify scan targets• Run scan to find sensitive
data on network & endpoint
• Enable or customize policy templates
• Remediate and report on risk reduction
MONITOR
1
2 3
PROTECT
4
5
• Inspect data being sent • Monitor network & endpoint events
• Block, remove or encrypt
• Quarantine or copy files• Notify employee & manager
How It Works
7
Strategic DLP Requirements
• Validated as the “strongest overall enterprise DLP capability”• Comprehensive coverage, measurable risk reduction
Product: Proven to work and covers all threats.
• Proven deployment methodology developed over 7 years• The largest number of dedicated DLP experts
Experience: Successful customers in your industry.
• Over 300 customers – 31 of the FORTUNE 100• Continue to innovate and anticipate customer demands
Leadership: What’s the most widely used solution?
8
1000
800
600
400
200
0 Incide
nts Pe
r Week
Remediation
Notification
Prevention
Risk Reduction Over Time
Visibility
Continuous Risk Reduction
9
10
SECURED CORPORATE LAN DMZDisconnected
SPAN Port or Tap
MTA or Proxy
Symantec Data Loss Prevention Architecture
11
SECURED CORPORATE LAN DMZDisconnected
SPAN Port or Tap
MTA or Proxy
DLP for Storage – Use Cases
DISCOVERPROTECT
12
Fix Broken Business Processes500k Personal Records on Open Share
Find it. Fix it.Remove from open share and leave a file marker.
Find it. Fix it.Remove from open share and leave a file marker.
12
13
SECURED CORPORATE LAN DMZDisconnected
SPAN Port or Tap
MTA or Proxy
DLP for Network – Use Cases
MONITORPROTECT
15
Educate users with automated email.Protect intellectual property.
Educate users with automated email.Protect intellectual property.
Protect Competitive Advantage Unencrypted product design documents sent to a partner
15
16
SECURED CORPORATE LAN DMZDisconnected
SPAN Port or Tap
MTA or Proxy
DLP for Endpoint – Use Cases
MONITORDISCOVER
PROTECT
18
Notify user via automated email.Empower users to self remediate.Notify user via automated email.Empower users to self remediate.
Clean Up Exposed Data on a DesktopCall center records improperly stored on an Endpoint
18
20
Stop it from being copied to USB.Notify User. Launch investigation.Stop it from being copied to USB.Notify User. Launch investigation.
Protect Competitive AdvantagePricing copied to USB
20
Prevent Breach of Customer DataSensitive data sent via personal webmail
Block the email.On or off the corporate network.
Block the email.On or off the corporate network.
21
Additional information
• Symantec DLP product Web site:– http://www.symantec.com/en/uk/business/theme.jsp?th
emeid=dlp
• E‐mail Chris Hagelin ‐ Symantec ([email protected])
• Evaluation Workshop & Demo can be arranged
22