Google Data Loss Prevention for work
|
|
|
- Geraldine Reynolds
- 9 years ago
- Views:
Transcription
1 INTRODUCING Google Data Loss Prevention for work PII Data loss prevention made easy We all care about keeping our data safe and private. Google DLP keeps sensitive data from slipping out of your organization.
2 Google Apps helps admins manage security needs across all information with features like encryption, audit reports, sharing controls, mobile management, and two-factor authentication. Data Loss Prevention (DLP) adds another layer of protection to prevent sensitive or private information from leaking outside of an organization. Gmail DLP is a tool that enables rules to prevent people from either accidently or maliciously sending confidential data and is the first step in a long term investment to bring rule based security across Google Apps. We re working on bringing DLP to Google Drive in 2016, along with other rule based security systems. Why is Gmail DLP important? is the main way people communicate at work. In fact, In 2015 over 200 billion s were sent and received each day worldwide. 1 And organizations are custodians of a lot of sensitive data, which includes both proprietary (e.g intellectual property) and third-party data (e.g. customer personally identifiable information (PII)). The cost of data leaks can be large, in the form of intellectual property loss and costly litigation. Interestingly, a large percentage of data leaks happen accidentally -- someone replies all when meaning to send a private message, chooses a client instead of teammate who has a similar name, or doesn t realize how confidential certain data is. When these mistakes happen, Gmail DLP helps Google Apps customers prevent losing data. Company Policy Admin Sets Rules Employees send s DLP checks content for all rules 1 Statistics Report, published by The Radicati Group
3 How Gmail DLP works Organizations may have a policy that the Sales department should not share customer credit cards externally. And to keep information safe, admins can easily set up a DLP policy by selecting Credit Card Numbers from a library of predefined content detectors. Gmail DLP will automatically check all outgoing s from the sales department and take action based on what the admin has specified: either quarantine the for review, tell users to modify the information, or block the from being sent and notify the sender. Attachment scanning These scans don t just apply to message subject and copy, but also to content inside common attachment types such as documents, presentations, and spreadsheets. Gmail DLP identifies each file type through a binary scan to provide more accurate data than relying on the supplied file extension, which can be inaccurate. Text is then extracted from the attachment using an algorithm specific to the file type, and processed via the DLP algorithm.
4 How to set up a DLP rule 1. Set the scope 2. Specify conditions to check for 3. Specify the appropriate action Set the scope Scope determines which set of users in your organization the rule applies to. Apply the rule to every message and employee Apply based on department or organizational unit Apply to only outgoing messages Apply to recipients to check incoming mail as well DLP Rules Scope Settings:
5 Specify conditions to check for Specify what the rule should check for using a combination of predefined and custom detectors. Custom content detectors Custom detectors (e.g. confidential project keywords) can be used to cover additional use-cases. And can be combined with predefined content detectors. Predefined content detectors Admins can choose from a library of predefined content detectors to easily setup DLP rules without having to specify their own regular expressions (regexes) or keywords. These detectors have intelligent logic that goes beyond simple keyword or regex matching. This helps reduce false positives or negatives. CANADA Quebec Health Insurance Number (HIN) Ontario Health Insurance Plan (OHIP) British Columbia Personal Health Number (PHN) Social Insurance Number (SIN) UNITED KINGDOM Driver s License Number National Health Service (NHS) Number National Insurance Number (NINO) FRANCE National ID Card (CNI) Social Security Number (NIR) UNITED STATES Social Security Number Driver s License Number Drug Enforcement Administration (DEA) Number ABA Routing Number National Provider Identifier (NPI) CUSIP GLOBAL Credit card number Bank account number (IBAN) Bank account number (SWIFT) We ll continue to add additional detectors to cover other countries and verticals over time.
6 Specify the appropriate action For messages that trigger the rule, admins can specify the appropriate action to take. Modify messages Admins can add modifications to a message that are still OK to send. So if, for instance, employees send confidential information to each other that should not be sent externally, admins can choose to automatically append [INTERNAL ONLY] to the message subject to prevent the from being forwarded outside the organization. Quarantine messages When messages are quarantined, a chosen moderator, such as a member of the policy team, can review the before it is either delivered or held back. Inbound message can also be quarantined for review. The intended recipient has no indication of the message until the administrator releases it for delivery. Admins can allow or reject the message, or do nothing and the message will expire in 30 days. Reject messages Automatically reject the message if you know this information should never be sent, no exceptions. And to educate the sender, admins can craft/ customizable a notice and link relevant policy documents or online resources to send when a message is rejected to avoid future mistakes. Tips Test your DLP rules before applying to live traffic to make sure they cover the desired use case When introducing a new rule, start by quarantining any matches (vs automatically rejecting) to review false positives Set policies for specific groups and organizational units, for easy targeting
7 FAQ What if I am interested in a preset identifier which is not currently available? We are working to broader our identifier portfolio over time to include additional countries and target industries. Please file a support case if you have a request for specific identifiers, or suggestions for improving current identifiers. DLP for Gmail is great, but Google Apps is a platform, what about other services? We understand that customers want to protect data, not individual services. We are working to expand our DLP offering to Drive and other services. What does Google s DLP service cost to use? DLP is included at no additional charge with Google Apps Unlimited, which costs $10/user/ month and includes unlimited storage, advanced audit and reporting capabilities and Google Apps Vault for ediscovery and retention. How can I learn more about Google Apps security and compliance? The Google Security and Compliance Whitepaper describes how Google protects your data, meets regulatory and compliance needs, and empowers users and administrators. Who owns the data I put into Google Apps? To put it simply, the data that companies, schools and governments agencies put into our systems is theirs, whether it s corporate intellectual property, personal information or a homework assignment, Google does not own that data. Learn More Already a Google Apps customer? Gmail DLP is included with Google Apps Unlimited, so get started Get Started If you are not already a Google Apps customer, you can start a free 30-day trial.
THE COMPLETE GUIDE TO GOOGLE APPS SECURITY. Building a comprehensive Google Apps security plan
THE COMPLETE GUIDE TO GOOGLE APPS SECURITY Building a comprehensive Google Apps security plan Contents Introduction................................ 3 1. Secure the core.............................4 Google
What are the compliance challenges of Microsoft Office 365?
PROOFPOINT FOR OFFICE 365: ENABLES ADVANCED SECURITY AND COMPLIANCE FOR YOUR ENTERPRISE UNDERSTAND THE SOLUTION BY ROLE: COMPLIANCE What are the compliance challenges of Microsoft Office 365? Microsoft
Google Identity Services for work
INTRODUCING Google Identity Services for work One account. All of Google Enter your email Next Online safety made easy We all care about keeping our data safe and private. Google Identity brings a new
Trend Micro Hosted Email Security Stop Spam. Save Time.
Trend Micro Hosted Email Security Stop Spam. Save Time. How it Works: Trend Micro Hosted Email Security A Trend Micro White Paper l March 2010 Table of Contents Introduction...3 Solution Overview...4 Industry-Leading
Top 10 Features: Clearswift SECURE Email Gateway
Top 10 Features: Clearswift SECURE Email Gateway Top 10 Features: Clearswift SECURE Email Gateway Modern business simply couldn t function without email. However, both incoming and outgoing messages can
Why Email Encryption is Essential to the Safety of Your Business
Why Email Encryption is Essential to the Safety of Your Business What We ll Cover Email is Like a Postcard o The Cost of Unsecured Email 5 Steps to Implement Email Encryption o Know Your Compliance Regulations
Email DLP Quick Start
1 Email DLP Quick Start TRITON - Email Security is automatically configured to work with TRITON - Data Security. The Email Security module registers with the Data Security Management Server when you install
Administering Google Apps & Chromebooks for Education
Administering Google Apps & Chromebooks for Education February 4, 2016 Edward Doan @edwardd / google.com/+edwarddoan customer quotes and snippets It s almost this easy. also highlight customer map? Google
全 球 資 安 剖 析, 您 做 確 實 了 嗎? Albert Yung Barracuda Networks
全 球 資 安 剖 析, 您 做 確 實 了 嗎? Albert Yung Barracuda Networks Agenda Challenges and PCI DSS 3.0 Updates Personal Information Protection Act Strategy to Protect against leak of Confidential Personal and Corporate
Identifying Broken Business Processes
Identifying Broken Business Processes A data-centric approach to defining, identifying, and enforcing protection of sensitive documents at rest, in motion, and in use 6/07 I www.vericept.com Abstract The
Web Protection for Your Business, Customers and Data
WHITE PAPER: WEB PROTECTION FOR YOUR BUSINESS, CUSTOMERS............ AND.... DATA........................ Web Protection for Your Business, Customers and Data Who should read this paper For security decision
Fast, secure and scalable email archiving from FuseMail. Secure and easily accessible email storage
VaultSMART Fast, secure and scalable email archiving from FuseMail Secure and easily accessible email storage Compliance and retrieval requirements demand that businesses store more data than ever before.
Setting up Microsoft Office 365
Integration Guide Revision G McAfee SaaS Email Protection Securing Exchange Online in Microsoft Office 365 Setting up Microsoft Office 365 Use this guide to configure Microsoft Office 365 and Microsoft
SECURE MESSAGING PLATFORM
SECURE MESSAGING PLATFORM WEB ADMIN CONSOLE ADMIN USER GUIDE Introduction... 2 Customer Management... 3 Dashboard... 3 User Account... 5 General & Feature Settings... 7 Secure Message Disclaimers... 9
Evaluation Guide. eprism Messaging Security Suite. 800-782-3762 www.edgewave.com V8.200
800-782-3762 www.edgewave.com Welcome to EdgeWave Messaging Security! This short guide is intended to help administrators setup and test the EdgeWave Messaging Security Suite for evaluation purposes. A
IC L05: Email Security.cloud Configuring DLP on to your email flow & Applying security to your Office 365 or Google Apps email deployment Hands-On Lab
IC L05: Email Security.cloud Configuring DLP on to your email flow & Applying security to your Office 365 or Google Apps email deployment Hands-On Lab Description This session is for existing customers
European developer & provider ensuring data protection User console: Simile Fingerprint Filter Policies and content filtering rules
Cloud Email Firewall Maximum email availability and protection against phishing and advanced threats. If the company email is not protected then the information is not safe Cloud Email Firewall is a solution
DJIGZO EMAIL ENCRYPTION. Djigzo white paper
DJIGZO EMAIL ENCRYPTION Djigzo white paper Copyright 2009-2011, djigzo.com. Introduction Most email is sent as plain text. This means that anyone who can intercept email messages, either in transit or
SECURE YOUR DATA EXCHANGE WITH SAFE-T BOX
SECURE YOUR DATA EXCHANGE SAFE-T BOX WHITE PAPER Safe-T. Smart Security Made Simple. 1 The Costs of Uncontrolled Data Exchange 2 Safe-T Box Secure Data Exchange Platform 2.1 Business Applications and Data
WHAT S NEW IN WEBSENSE TRITON RELEASE 7.8
WHAT S NEW IN WEBSENSE TRITON RELEASE 7.8 Overview Global organizations are constantly battling with advanced persistent threats (APTs) and targeted attacks focused on extracting intellectual property
RSA Data Loss Prevention (DLP) Understand business risk and mitigate it effectively
RSA Data Loss Prevention (DLP) Understand business risk and mitigate it effectively Arrow ECS DLP workshop, Beograd September 2011 Marko Pust [email protected] 1 Agenda DLP in general What to expect from
Setting up Microsoft Office 365
Setup Guide Revision F Using McAfee SaaS Email Protection to Secure Exchange Online in Microsoft Office 365 Setting up Microsoft Office 365 Use this guide to configure Microsoft Office 365 and Microsoft
Stop Spam. Save Time.
Stop Spam. Save Time. A Trend Micro White Paper I January 2015 Stop Spam. Save Time. Hosted Email Security: How It Works» A Trend Micro White Paper January 2015 TABLE OF CONTENTS Introduction 3 Solution
Brochure Achieving security with cloud data protection. Autonomy LiveVault
Achieving security with cloud data protection Autonomy LiveVault Can cloud backup be secure? Today, more and more companies recognize the value and convenience of using cloud backup to protect their server
CIPHERMAIL EMAIL ENCRYPTION. CipherMail white paper
CIPHERMAIL EMAIL ENCRYPTION CipherMail white paper Copyright 2009-2014, ciphermail.com. Introduction Most email is sent as plain text. This means that anyone who can intercept email messages, either in
Policy Based Encryption E. Administrator Guide
Policy Based Encryption E Administrator Guide Policy Based Encryption E Administrator Guide Documentation version: 1.2 Legal Notice Legal Notice Copyright 2012 Symantec Corporation. All rights reserved.
Policy Based Encryption E. Administrator Guide
Policy Based Encryption E Administrator Guide Policy Based Encryption E Administrator Guide Documentation version: 1.2 Legal Notice Legal Notice Copyright 2012 Symantec Corporation. All rights reserved.
Selecting Your Essential Cloud Services
DATASHEET Selecting Your Essential Cloud Services Mimecast s flexible and scalable suite of essential cloud services for Microsoft Exchange removes the risks and complexities of business email management
Secure Web Delivery. Ron Miller PIM Manager
Secure Web Delivery Ron Miller PIM Manager McAfee Email Gateway (MEG) Implemented new MEG solution in January 2014 Enterprise mail routing, virus protection, SPAM filtering, DOS protection with Quarantine
Enabling Secure, Diverse Communications for B2B and B2C Organizations
WHITE PAPER Enabling Secure, Diverse Communications for B2B and B2C Organizations Introduction The ability to communicate with customers and business partners quickly, effectively and securely is crucial
Implementing Transparent Security for Desktop Encryption Users
Implementing Transparent Security for Desktop Encryption Users Solutions to automate email encryption with external parties Get this White Paper Entrust Inc. All All Rights Reserved. 1 1 Contents Introduction...
How To Secure Mail Delivery
FortiMail Identity Based Encryption A Business Enabler WHITE PAPER FORTINET FortiMail Identity Based Encryption - A Business Enabler PAGE 2 Contents Business Need Secure Mail Delivery... 3 Challenges with
Policy Based Encryption Essentials. Administrator Guide
Policy Based Encryption Essentials Administrator Guide Policy Based Encryption Essentials Administrator Guide Documentation version: 1.0 Legal Notice Copyright 2015 Symantec Corporation. All rights reserved.
Barracuda User Guide. Managing your Spam Quarantine
Managing your Spam Quarantine Barracuda User Guide Step1: Open your internet browser and go to http://myspam.datatechhosting.com this will automatically redirect you to Barracuda s email security service
Email security and compliance best practices
E-Guide Email security and compliance best practices Secure and compliant email systems are essential for financial services companies. In this two part series on email security best practices, expert
Compliance and Security Solutions
Content-aware Compliance and Security Solutions for Microsoft SharePoint SharePoint and the ECM Challenge The numbers tell the story. According to the consulting firm Doculabs, 80 percent of the information
A Buyer's Guide to Data Loss Protection Solutions
A Buyer's Guide to Data Loss Protection Solutions 2010 Websense, Inc. All rights reserved. Websense is a registered trademark of Websense, Inc. in the United States and certain international markets. Websense
Titus and Cisco IronPort Integration Guide Improving Outbound and Inbound Email Security. Titus White Paper
Titus and Cisco IronPort Integration Guide Improving Outbound and Inbound Email Security Titus White Paper Information in this document is subject to change without notice. Complying with all applicable
Outbound Email Security and Content Compliance in Today s Enterprise, 2005
Outbound Email Security and Content Compliance in Today s Enterprise, 2005 Results from a survey by Proofpoint, Inc. fielded by Forrester Consulting on outbound email content issues, May 2005 Proofpoint,
FileCloud Security FAQ
is currently used by many large organizations including banks, health care organizations, educational institutions and government agencies. Thousands of organizations rely on File- Cloud for their file
Email Router and Vetting G-Cloud Service Definition
Email Router and Vetting G-Cloud Service Definition 2013 General Dynamics Information Technology. All rights reserved 1 In partnership with Government and industry-leading technology partners, General
Mimecast Large File Send
DATASHEET Mimecast Large File Send For sending large files, lets go back to email Mimecast Large File Send simplifies large file sharing for users by removing the complexity and frustration associated
Information Security Policy. Appendix B. Secure Transfer of Information
Information Security Policy Appendix B Secure Transfer of Information Author: Data Protection and Information Security Officer. Version: 0.7 Date: March 2008 Document Control Information Document ID Document
Configuration Information
This chapter describes some basic Email Security Gateway configuration settings, some of which can be set in the first-time Configuration Wizard. Other topics covered include Email Security interface navigation,
Web DLP Quick Start. To get started with your Web DLP policy
1 Web DLP Quick Start Websense Data Security enables you to control how and where users upload or post sensitive data over HTTP or HTTPS connections. The Web Security manager is automatically configured
EXCHANGE ONLINE PROTECTION SPAM OVERVIEW. Tech Tips, Tricks and Tools by MessageOps
EXCHANGE ONLINE PROTECTION SPAM OVERVIEW Tech Tips, Tricks and Tools by MessageOps TABLE OF CONTENTS: OVERVIEW AND DOCUMENT INTENTION..3 TRANSPORT RULES..... 4 CONTENT FILTER... 12 MALWARE FILTER......15
Receiving Secure Email Customer Support frequently asked questions
Registering a Secure Password Q. Where do I find the current Secure email guidance documentation? A. Published on Glasgow City Council website. Q. My organisation has its own email encryption tool, do
Email Security in Law Firms. What you need to know and how you can use secure email to win more clients
Email Security in Law Firms What you need to know and how you can use secure email to win more clients Introduction As clients are demanding greater protection of their information, law firms must incorporate
The Disconnect Between Legal and IT Teams
WHEPAPER The Disconnect Between and Teams Examples of what each side doesn t know #2 in a series of 4 whitepapers. Circulate this document to,, and company management. It can be used to start a dialog,
Set Up and Maintain Customer Support Tools
Set Up and Maintain Customer Support Tools Salesforce, Winter 16 @salesforcedocs Last updated: December 10, 2015 Copyright 2000 2015 salesforce.com, inc. All rights reserved. Salesforce is a registered
Email Migration Project Plan for Cisco Cloud Email Security
Sales Tool Email Migration Project Plan for Cisco Cloud Email Security 2014 Cisco and/or its affiliates. All rights reserv ed. This document is Cisco Conf idential. For Channel Partner use only. Not f
Websense Data Security Suite and Cyber-Ark Inter-Business Vault. The Power of Integration
Websense Data Security Suite and Cyber-Ark Inter-Business Vault The Power of Integration Websense Data Security Suite Websense Data Security Suite is a leading solution to prevent information leaks; be
Table: Security Services (X.800)
SECURIT SERVICES X.800 defines a security service as a service provided by a protocol layer of communicating open systems, which ensures adequate security of the systems or of data transfers. Also the
Email Compliance in 5 Steps
Email Compliance in 5 Steps Introduction For most businesses, email is a vital communication resource. Used to perform essential business functions, many organizations rely on email to send sensitive confidential
Email Security. Secure Email Encryption: Protect Communication with Personal Certificates. An IceWarp White Paper. October 2008. www.icewarp.
20 Email Security Secure Email Encryption: Protect Communication with Personal Certificates An IceWarp White Paper October 2008 www.icewarp.com 21 Background Email has become the preferred method of communication
Securing enterprise collaboration through email and file sharing on a unified platform
Axway MailGate SC Securing enterprise collaboration through email and file sharing on a unified platform Email is the primary collaboration tool employees use to share information and send large files.
MESSAGING SECURITY GATEWAY. Detect attacks before they enter your network
MESSAGING SECURITY GATEWAY Detect attacks before they enter your network OVERVIEW This document explains the functionality of F-Secure Messaging Security Gateway (MSG) what it is, what it does, and how
Best Practices for Choosing a Content Control Solution
Best Practices for Choosing a Content Control Solution March 2006 Copyright 2006 Entrust. All rights reserved. Entrust is a registered trademark of Entrust, Inc. in the United States and certain other
WATCHGUARD BARRACUDA KEY SALES PITCH TRUTH BEHIND THE PITCH
KEY SALES PITCH Long time provider of email security with large customer base XCS 170, 370 and 570 appliances integrate bi directional email threat protection and data loss prevention on a single platform.
Introduction to Digital Workflow Ticketing
WhitePaper Introduction to New concepts for enabling dissemination of digital workflow technologies across the enterprise http://www.nsius.com Notable Solutions, Inc. 600 Jefferson Plaza Suite 500 Rockville,
Policy Based Encryption Z. Administrator Guide
Policy Based Encryption Z Administrator Guide Policy Based Encryption Z Administrator Guide Documentation version: 1.2 Legal Notice Legal Notice Copyright 2012 Symantec Corporation. All rights reserved.
Strengthen Microsoft Office 365 with Sophos Cloud and Reflexion
Strengthen Microsoft Office 365 with Sophos Cloud and Reflexion Many organizations are embracing cloud technology and moving from complex, rigid on-premise infrastructure and software to the simplicity
Office 365 Compliance and Data Loss Prevention
Chapter 9 Office 365 Compliance and Data Loss Prevention Office 365 is a suite of software products that Microsoft Offers as a service subscription. The basis for the service is to reduce the IT costs
Djigzo email encryption. Djigzo white paper
Djigzo email encryption Djigzo white paper Copyright 2009-2011, djigzo.com. Introduction Most email is sent as plain text. This means that anyone who can intercept email messages, either in transit or
SharePoint Services: Using Workflows
SharePoint Services: Using Workflows Table of Contents INTRODUCTION TO WORKFLOWS... 1 WHAT ARE WORKFLOWS?... 1 WORKFLOWS THAT ARE INCLUDED IN OFFICE SHAREPOINT SERVER 2007... 2 ABOUT ADDING A WORKFLOW
Securemail User Guide
Securemail User Guide Created: 2009-02-17 Updated: 2013-07-05 - New links and Address Book instructions Updated: 2014-04-23 - http://dhhs.ne.gov/documents/dhhs-securemail-userguide.pdf 1 INDEX: How Securemail
Leonardo Hotels Group Page 1
Privacy Policy The Leonardo Hotels Group, represented by Sunflower Management GmbH & Co.KG, respects the right to privacy of every individual who access and navigate our website. Leonardo Hotels takes
Cloud Computing In a Post Snowden World. Guy Wiggins, Kelley Drye & Warren LLP Alicia Lowery Rosenbaum, Microsoft Legal and Corporate Affairs
Cloud Computing In a Post Snowden World Guy Wiggins, Kelley Drye & Warren LLP Alicia Lowery Rosenbaum, Microsoft Legal and Corporate Affairs Guy Wiggins Director of Practice Management Kelley Drye & Warren
efolder White Paper: 3 Little-Known Risks Associated with Leading Cloud Services
efolder White Paper: 3 Little-Known Risks Associated with Leading Cloud Services May 2015 Introduction In the last few years, an increasing amount of corporate information has moved to the cloud. Office
10 Things IT Should be Doing (But Isn t)
Contents Overview...1 Top Ten Things IT Should be Doing...2 Audit Data Access... 2 Inventory Permissions and Directory Services Group Objects... 2 Prioritize Which Data Should Be Addressed... 2 Remove
Using Data Loss Prevention for Financial Institutions Banks, Credit Unions, Payments
Using Data Loss Prevention for Financial Institutions Banks, Credit Unions, Payments How Data Loss Prevention (DLP) Technology can Protect Sensitive Company & Customer Information and Meet Compliance Requirements,
Transport Layer Security (TLS) About TLS
Transport Layer Security (TLS) About TLS Contents Secure email at HSBC 2 About Transport Layer Security. 2 Setting up a Forced TLS connection with HSBC 4 Glossary... 5 Support..... 5 Secure email at HSBC
E-mail Management: A Guide For Harvard Administrators
E-mail Management: A Guide For Harvard Administrators E-mail is information transmitted or exchanged between a sender and a recipient by way of a system of connected computers. Although e-mail is considered
Electronic approvals for forms FAQs
Click on any of the boxes below to explore more detail, including answers to frequently asked questions, video quick links, and more. Advisor experience Client experience Security Electronic approvals
