CA Technologies Data Protection
|
|
- Christopher Patrick
- 8 years ago
- Views:
Transcription
1 CA Technologies Data Protection can you protect and control information? Johan Van Hove Senior Solutions Strategist Security
2 CA Technologies Content-Aware IAM strategy CA Technologies purchased Orchestria in 2009 Core capabilities of DLP: discovery, content classification & enforcement Support CSU Content-Aware IAM strategy Continued Content-Aware IAM execution Identity & Content: As roles change the control of data is maintained Access & Content: Content-aware access management 2 Security software from CA Technologies Controls identities, their access & how they can use the information they access that s Content Aware IAM!
3 IT challenges it is all about the unknowns Information Protection and Control Classification and location of sensitive data is not known Authorized or not authorized data users and usage is unknown Appropriate or inappropriate data flow is unknown Data Data relation to compliance is unknown Compounding Factors 3 Data is dynamic and massive Existing business processes can t be hindered Data usage education is not effective Virtualization and cloud amplify the issues Now what?
4 What do these numbers represent? 69% Of companies send sensitive information over Source: Ponemon Institute LLC, The Escalating Importance of , September % 71% 50% Of mission critical documents are stored in companies SharePoint environment Source: OpenText Global 360, How are Businesses using Microsoft SharePoint in the Enterprise? Fall 2011 Market Survey. Companies believe mobile devices have contributed to security events Source: CheckPoint Software Technologies, The Impact of Mobile Devices on Information Security, January 2012 Of global 1000 companies will have stored customersensitive data in the public cloud by 2016 Source: Gartner, Gartner reveals Top Prediction s for IT Organizations and Users for 2012 and Beyond 4
5 CA data protection solution areas 4 enterprise areas of high data risk Mitigate the risk of exposing sensitive information through the accidental, negligent and malicious communications COLLABORATION Control sensitive information posted, stored and shared in collaboration platforms Cloud Control the storage of sensitive corporate information across the datacenter and cloud MOBILITY Control the distribution and communication of sensitive information via mobile technologies 5
6 Product Suite
7 single solution provides best value not 3 but 4 channels of control DATA AT ACCESS DATA IN USE DATA IN MOTION DATA AT REST Classification Classifies content enabling fine grained access controls Endpoint Monitor and control data at the endpoint Network Monitor and control data at network egress points Message Server Monitor and control at messaging servers Stored Data Scan and manage data on shared folders, file and document repositories, public folders, ODBC sources and other repositories. ENTERPRISE MANAGEMENT Management Platform One management platform with common reporting, data policies and incident review 7
8 single solution provides best value DATA AT ACCESS DATA IN USE DATA IN MOTION DATA AT REST ENTERPRISE MANAGEMENT Classification Classifies content enabling fine grained access controls Scan, extract and classify content from file servers, databases and repositories Classification of content for consumption by 3rd party software components Web Services API enables external commands and integration of classification data Enables content aware Identity & Access Management Technology Supported: IAM Storage File Servers Collaboration Software SharePoint CA SiteMinder 3rd party software Classification Windows CA Access Control *Future 8
9 single solution provides best value DATA AT ACCESS DATA IN USE DATA IN MOTION DATA AT REST ENTERPRISE MANAGEMENT Endpoint Monitor and control data at the endpoint Controls , web, printing and saving data Scans for sensitive data on the endpoint On-line and off-line enforcement Incident-appropriate response upon detection of a violation Educate end-users with an educational popup window to explain company or regulatory policy Scalable to tens and hundreds of thousands of endpoints Endpoint Web Save Print App Control Infrastructure Load Gateways Common Services File Scan Management Platform 9
10 single solution provides best value DATA AT ACCESS DATA IN USE DATA IN MOTION DATA AT REST ENTERPRISE MANAGEMENT Network Monitor and control data at network egress points Controls many protocols (web, , instant message, ftp, etc) Implemented as a network appliance or integrated to ICAP servers and MTA s Message Server Monitor and control at messaging servers (MS Exchange and Lotus Notes) Control out bound but also internal, web access and mobile device Implemented as a component in conjunction with mail servers. Corporate Boundary Message Server Network Appliance Management Platform ICAP/MTA Plug-in 10
11 single solution provides best value DATA AT ACCESS DATA IN USE DATA IN MOTION DATA AT REST ENTERPRISE MANAGEMENT Stored Data Scan and manage data on shared folders, file and document repositories, public folders, ODBC sources and other repositories. Data Repositories File Shares SharePoint Databases Implemented as a local server or network scan. Discovery/scanning tasks can be executed on-demand or on a specified schedule Highly scalable and distributed architecture Information can be deleted, copied, stubbed or moved to another location Stored Data Management Platform 11
12 accurate, scalable, and modular DATA AT ACCESS DATA IN USE DATA IN MOTION DATA AT REST ENTERPRISE MANAGEMENT Management Platform Accurate Analysis Fingerprinting Zero False Positives Full fingerprinting Partial fingerprinting Description Minimize False Negatives Modular architecture to expand on demand Scalable Architecture Common reporting, data policies and incident review Address Multiple Use Cases Surveillance and supervision of compliance related information and DLP CA DATAMINDER PROVIDES COMPLETE SET OF DETECTION METHODS TO ACCURATELY DETECT CRITICAL DATA CONTENT REGISTRATION Exact Data Partial Data Fingerprinting CONTEXT ANALYSIS Identity Hierarchy Role CONTENT DESCRIPTION Keywords Stemming Wildcards CONCEPT ANALYSIS Intent Aware Business Aware Absence of Content 12
13 Technology Partnerships
14 Partnerships broad technology support protects sensitive information wherever it goes Partnerships Discovery Data Protection Network Protection System Protection Archive Encryption Digital Rights Management Message Server & ICAP Proxy Access Control
15 iconsole
16 iconsole Review events for all policies and control points from a single UI Interactive Dashboard with drill-down in charts to individual violations Get a quick status of the risk areas across the company URL access from SIM solutions 16
17 policy/role-based security and review user hierarchy controls the security applied to data access Reviewer roles control access to policy information and the subsequent audit trail 17
18 protection ecosystem Flexible Remediation Monitor for violations Warn to educate Quarantine for approval Encrypt valid use Block improper use Digital rights assignment Justification for improper use Replace sensitive data with links Move stored data Delete within unacceptable locations 18
19 flexible and scalable architecture Network HTTP/S SMTP IM FTP ICAP MTA Message Server Exchange Domino Bloomberg MTA Endpoint Removable Media Print, Screen Print Web App Execution File Scanning Stored Data File Shares NAS SharePoint Public Folders MS SQL, Oracle Data Import CA Message Manager 3rd Party Archives Historical , IM logs Gateway Scale and Load Balance Gateway Scale and Load Balance Policy Central Management Server Captured Events Review + Dashboards Workflow Policies Reports + Queries Identity / Roles Control Points Unified Platform Pre-Built Templates 19
20 summary Content Aware IAM CA Technologies is the only IAM vendor with DLP capabilities Identity Centric Approach Understand and leverage the relationship between people and data Complete Control of Data At-access, in-use, in-motion and at-rest Discover, monitor and protect Partner ecosystem Rapid Value Provide accurate analysis driven by flexible, identity-aware policies (accuracy leads to effective DLP) Modular solution 20
21 Endnotes *Source: Gartner, Magic Quadrant for Content-Aware Data Loss Prevention ; Eric Ouellet, Rob McMillan; August 10, 2011 This Magic Quadrant graphic was published by Gartner, Inc. as part of a larger research note and should be evaluated in the context of the entire report. The Gartner report is available upon request from CA. The Magic Quadrant is copyrighted August 2011 by Gartner, Inc. and is reused with permission. The Magic Quadrant is a graphical representation of a marketplace at and for a specific time period. It depicts Gartner's analysis of how certain vendors measure against criteria for that marketplace, as defined by Gartner. Gartner does not endorse any vendor, product or service depicted in the Magic Quadrant, and does not advise technology users to select only those vendors placed in the "Leaders" quadrant. The Magic Quadrant is intended solely as a research tool, and is not meant to be a specific guide to action. Gartner disclaims all warranties, express or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose. **Source: Forrester Research, Inc., The Forrester Wave : Data Leak Prevention Suites, Q ; October 12, 2010 The Forrester Wave is copyrighted by Forrester Research, Inc. Forrester and Forrester Wave are trademarks of Forrester Research, Inc. The Forrester Wave is a graphical representation of Forrester's call on a market and is plotted using a detailed spreadsheet with exposed scores, weightings, and comments. Forrester does not endorse any vendor, product, or service depicted in the Forrester Wave. Information is based on best available resources. Opinions reflect judgment at the time and are subject to change. 21
22 Thank You 22
how can I comprehensively control sensitive content within Microsoft SharePoint?
SOLUTION BRIEF Information Lifecycle Control for Sharepoint how can I comprehensively control sensitive content within Microsoft SharePoint? agility made possible CA Information Lifecycle Control for SharePoint
More informationStrategies and Best Practices to Implement a Successful Data Loss Prevention Program Sebastian Brenner, CISSP
Strategies and Best Practices to Implement a Successful Data Loss Prevention Program Sebastian Brenner, CISSP Principal Systems Engineer Symantec LAMC Agenda 1 What DLP is and its purpose 2 Challenges
More informationRSA Data Loss Prevention (DLP) Understand business risk and mitigate it effectively
RSA Data Loss Prevention (DLP) Understand business risk and mitigate it effectively Arrow ECS DLP workshop, Beograd September 2011 Marko Pust marko.pust@rsa.com 1 Agenda DLP in general What to expect from
More informationKelvin Wee CISA, CISM, CISSP Principal Consultant (DLP Specialist) Asia Pacific and Japan
The Truth about Data Loss Kelvin Wee CISA, CISM, CISSP Principal Consultant (DLP Specialist) Asia Pacific and Japan RSA Data Loss Prevention Data Breaches Overview RSA DLP Solution Five Critical Factors
More informationMaaSter Microsoft Ecosystem Management with MaaS360. Chuck Brown Jimmy Tsang www.maas360.com
MaaSter Microsoft Ecosystem Management with MaaS360 Chuck Brown Jimmy Tsang www.maas360.com Introductions Chuck Brown Product Management IBM MaaS360 Jimmy Tsang Director of Product Marketing IBM MaaS360
More informationMcAfee Data Protection Solutions
McAfee Data Protection Solutions Tamas Barna System Engineer CISSP, Security+ Eastern Europe The Solution: McAfee Data Protection McAfee Data Loss Prevention Full control and absolute visibility over user
More information<Insert Picture Here> Oracle Identity And Access Management
Oracle Identity And Access Management Gautam Gopal, MSIST, CISSP Senior Security Sales Consultant Oracle Public Sector The following is intended to outline our general product direction.
More informationRecognition of Websense Leadership. Industry Analysts Validate Websense Market and Technological Leadership
Recognition of Websense Leadership Industry Analysts Validate Websense Market and Technological Leadership Analysts Recognize Websense 2011 Secure Web Gateway MQ: Leaders Quadrant 2011 Content-Aware Data
More informationInformation Risk Management. Alvin Ow Director, Technology Consulting Asia Pacific & Japan RSA, The Security Division of EMC
Information Risk Management Alvin Ow Director, Technology Consulting Asia Pacific & Japan RSA, The Security Division of EMC Agenda Data Breaches Required Capabilities of preventing Data Loss Information
More informationRSA Solution Brief RSA. Data Loss. Uncover your risk, establish control. RSA. Key Manager. RSA Solution Brief
RSA Solution Brief RSA Managing Data Loss the Lifecycle of Prevention Encryption Suite Keys with Uncover your risk, establish control. RSA Key Manager RSA Solution Brief 1 Executive Summary RSA Data Loss
More informationData Protection McAfee s Endpoint and Network Data Loss Prevention
Data Protection McAfee s Endpoint and Network Data Loss Prevention Dipl.-Inform. Rolf Haas Principal Security Engineer, S+, CISSP rolf@mcafee.com January 22, 2013 for ANSWER SA Event, Geneva Position Features
More informationFive Tips to Ensure Data Loss Prevention Success
Five Tips to Ensure Data Loss Prevention Success A DLP Experts White Paper January, 2013 Author s Note The content of this white paper was developed independently of any vendor sponsors and is the sole
More informationINVESTOR PRESENTATION. First Quarter 2014
INVESTOR PRESENTATION First Quarter 2014 Note to Investors Certain non-gaap financial information regarding operating results may be discussed during this presentation. Reconciliations of the differences
More informationINVESTOR PRESENTATION. Third Quarter 2014
INVESTOR PRESENTATION Third Quarter 2014 Note to Investors Certain non-gaap financial information regarding operating results may be discussed during this presentation. Reconciliations of the differences
More informationEmbracing BYOD with MDM and NAC. Chris Isbrecht, Fiberlink Gil Friedrich, ForeScout
Embracing BYOD with MDM and NAC Chris Isbrecht, Fiberlink Gil Friedrich, ForeScout 1 Today s Agenda The BYOD Landscape Network Access Control (NAC) 101 Embracing BYOD with MDM and NAC Use Cases 2 The BYOD
More informationINCREASINGLY, ORGANIZATIONS ARE ASKING WHAT CAN T GO TO THE CLOUD, RATHER THAN WHAT CAN. Albin Penič Technical Team Leader Eastern Europe
INCREASINGLY, ORGANIZATIONS ARE ASKING WHAT CAN T GO TO THE CLOUD, RATHER THAN WHAT CAN Albin Penič Technical Team Leader Eastern Europe Trend Micro 27 years focused on security software Headquartered
More informationIndependent process platform
Independent process platform Megatrend in infrastructure software Dr. Wolfram Jost CTO February 22, 2012 2 Agenda Positioning BPE Strategy Cloud Strategy Data Management Strategy ETS goes Mobile Each layer
More informationSimplify and Automate IT
Simplify and Automate IT The current state of IT INCIDENT SERVICE LEVEL DATA SERVICE REQUEST ASSET RELEASE CONFIGURATION GOVERNANCE AND COMPLIANCE EVENT AND IMPACT ENTERPRISE SCHEDULING DASHBOARDS CAPACITY
More informationA Websense Research Brief Prevent Data Loss and Comply with Payment Card Industry Data Security Standards
A Websense Research Brief Prevent Loss and Comply with Payment Card Industry Security Standards Prevent Loss and Comply with Payment Card Industry Security Standards Standards for Credit Card Security
More informationStatus Evolution Balance Trends
This summary represents opinions of Project Botticelli Ltd as of March 2011 only, and does not represent opinions or recommendations of Microsoft Corp, Gartner Group, Forrester Research, except when directly
More informationA Buyer's Guide to Data Loss Protection Solutions
A Buyer's Guide to Data Loss Protection Solutions 2010 Websense, Inc. All rights reserved. Websense is a registered trademark of Websense, Inc. in the United States and certain international markets. Websense
More informationWhite paper. Five Key Considerations for Selecting a Data Loss Prevention Solution
White paper Five Key Considerations for Selecting a Data Loss Prevention Solution What do you need to consider before selecting a data loss prevention solution? There is a renewed awareness of the value
More informationProtecting What Matters Most. Bartosz Kryński Senior Consultant, Clico
Protecting What Matters Most Bartosz Kryński Senior Consultant, Clico Cyber attacks are bad and getting Leaked films and scripts Employee lawsuit Media field day There are two kinds of big companies in
More informationGartner Magic Quadrant Sources and Disclaimer
Gartner Magic Quadrant Sources and Disclaimer 1. Gartner Magic Quadrant for Network Access Control; by Lawrence Orans, John Pescatore, Mark Nicolett; March 27, 2009 2. Gartner Magic Quadrant for Endpoint
More informationEmail Security.cloud Configuring DLP on to your email flow and applying security to your hosted email deployment
Email Security.cloud Configuring DLP on to your email flow and applying security to your hosted email deployment Phil Walters Principal Learning Consultant, Technical Field Enablement Email Security.cloud
More informationManaging PHI in the Cloud Best Practices
Managing PHI in the Cloud Best Practices Executive Whitepaper Recent advances in both Cloud services and Data Loss Prevention (DLP) technology have substantially improved the ability of healthcare organizations
More informationIntroduction to Oracle Business Intelligence Standard Edition One. Mike Donohue Senior Manager, Product Management Oracle Business Intelligence
Introduction to Oracle Business Intelligence Standard Edition One Mike Donohue Senior Manager, Product Management Oracle Business Intelligence The following is intended to outline our general product direction.
More informationWebsense Data Security Solutions
Data Security Suite Data Discover Data Monitor Data Protect Data Endpoint Data Security Solutions What is your confidential data and where is it stored? Who is using your confidential data and how? Protecting
More information<Insert Picture Here> Oracle BI Standard Edition One The Right BI Foundation for the Emerging Enterprise
Oracle BI Standard Edition One The Right BI Foundation for the Emerging Enterprise Business Intelligence is the #1 Priority the most important technology in 2007 is business intelligence
More informationINFORMATION PROTECTION
INFORMATION PROTECTION Johan Celis Principal Security Consultant Symantec Benelux SYMANTEC ENTERPRISE SECURITY STRATEGY Users Data Cyber Security Services Monitoring, Incident Response, Simulation, Adversary
More informationEnterprise Identity Management Reference Architecture
Enterprise Identity Management Reference Architecture Umut Ceyhan Principal Sales Consultant, IDM SEE Agenda Introduction Virtualization Access Management Provisioning Demo Architecture
More informationEnterprise content management solutions Better decisions, faster. Storing, finding and managing content in the digital enterprise.
Enterprise content management solutions Better decisions, faster Storing, finding and managing content in the digital enterprise. Streamlines the collection, protection, sharing and distribution of digital
More informationSun and Oracle: Joining Forces in Identity Management
Sun and Oracle: Joining Forces in Identity Management The following is intended to outline our general product direction. It is intended for information purposes only, and may not be incorporated into
More informationRSA SIEM and DLP Infrastructure and Information Monitoring in One Solution
RSA SIEM and DLP Infrastructure and Information Monitoring in One Solution David Mateju RSA Sales Consultant, RSA CSE david.mateju@rsa.com Adding an information-centric view Infrastructure Information
More informationILM et Archivage Les solutions IBM
Information Management ILM et Archivage Les solutions IBM Dr. Christian ARNOUX Consultant Information Management IBM Suisse, Software Group 2007 IBM Corporation IBM Strategy for Enterprise Content Compliance
More informationDISCOVER, MONITOR AND PROTECT YOUR SENSITIVE INFORMATION Symantec Data Loss Prevention. symantec.com
DISCOVER, MONITOR AND PROTECT YOUR SENSITIVE INFORMATION Symantec Data Loss Prevention symantec.com One of the interesting things we ve found is that a lot of the activity you d expect to be malicious
More informationSimplify and Automate IT
Simplify and Automate IT Expectations have never been higher Reduce IT Costs 30% increase in staff efficiency Reduce support costs by 25% Improve Quality of Service Reduce downtime by 75% 70% faster MTTR
More informationGet More from Microsoft SharePoint with Oracle Fusion Middleware. An Oracle White Paper January 2008
Get More from Microsoft SharePoint with Oracle Fusion Middleware An Oracle White Paper January 2008 NOTE The following is intended to outline our general product direction. It is intended for information
More informationMicrosoft Business Intelligence solution. What makes Microsoft BI difference
Business Intelligence today Microsoft Business Intelligence solution What makes Microsoft BI difference Case study and Demo Gartner BI Platform Software Revenue (in $Billions) CIO Priorities: Data Analysis
More informationCOMMVAULT: LA GESTIONE DEL DATO OLTRE IL BACKUP ED IL DISASTER RECOVERY
20/05/14 COMMVAULT: LA GESTIONE DEL DATO OLTRE IL BACKUP ED IL DISASTER RECOVERY Roberto Massoli Channel Manager UNSTRUCTURED DATA FUELING COSTS 100TB =18x storage over 3 years, 100TB of production storage
More informationCloud Database Demystified to Deliver SaaS Customer Value
Cloud Database Demystified to Deliver SaaS Customer Value 2 The business of Cloud Savvis ranks as a leader Magic Quadrant for Cloud Infrastructure-as-a-Service and Web Hosting The Magic Quadrant is copyrighted
More informationMcAfee Data Loss Prevention 9.3.0
Product Guide Revision E McAfee Data Loss Prevention 9.3.0 For use with epolicy Orchestrator 4.5, 4.6, 5.0 Software COPYRIGHT Copyright 2014 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS
More informationG06 - How to store your data in SharePoint
G06 - How to store your data in SharePoint European Microsoft SharePoint Conference 2007 A story about Performance, Compliance and Reliability by NetApp February 12th to 14th, 2007 Convention Center Hotel
More informationwith Managing RSA the Lifecycle of Key Manager RSA Streamlining Security Operations Data Loss Prevention Solutions RSA Solution Brief
RSA Solution Brief Streamlining Security Operations with Managing RSA the Lifecycle of Data Loss Prevention and Encryption RSA envision Keys with Solutions RSA Key Manager RSA Solution Brief 1 Who is asking
More informationJeff Warson, GCIH, SCPS, CISSP, CCSK Sr. Principal Security Strategist Symantec Corpora5on
Jeff Warson, GCIH, SCPS, CISSP, CCSK Sr. Principal Security Strategist Symantec Corpora5on Agenda 1 2 3 4 5 Sources of a Breach Key IT Security Trends How is DLP Implemented Symantec's Strategy and Recent
More informationSam Cavaliere. Microsoft Corporation Sam.Cavaliere@microsoft.com 646-225-4860
Sam Cavaliere Unified Communications Solutions Sales Professional Microsoft Corporation Sam.Cavaliere@microsoft.com 646-225-4860 Agenda Define UC Foundation for Communications Demo Wrap up Q&A Confusing,
More informationWebsense Data Security Suite and Cyber-Ark Inter-Business Vault. The Power of Integration
Websense Data Security Suite and Cyber-Ark Inter-Business Vault The Power of Integration Websense Data Security Suite Websense Data Security Suite is a leading solution to prevent information leaks; be
More informationArchiving with Enterprise Vault Bruno Ritter
Archiving with Enterprise Vault Bruno Ritter Senior Presales Tech Specialist Symantec Enterprise Vault Flexible Policy-based Archiving Software Resource management Retention management Discovery management
More informationEnterprise Archiving Simplified
Enterprise Archiving Simplified For organizations that want the peace of mind of knowing that their digital assets are always secure and within reach. 2011 Until 2000 Enterprise Archiving 2015 5 Million
More informationThe real trend of the Future Workspace. John Phillips Enterprise Technology Strategist Microsoft Corporation john.phillips@microsoft.
The real trend of the Future Workspace John Phillips Enterprise Technology Strategist Microsoft Corporation john.phillips@microsoft.com Communications.... Our Vision Create experiences that combine the
More informationProtecting Regulated Information in Cloud Storage with DLP
Protecting Regulated Information in Cloud Storage with DLP Protection of Regulated Information in cloud storage can be provided by an appropriate Data Loss Prevention, DLP, solution. The steps involved
More informationAny Partner. Any System. Anywhere. IBM Sterling Business Integration Suite
Any Partner. Any System. Anywhere. IBM Sterling Business Integration Suite Any Partner. Any System. Anywhere. The IBM Sterling Business Integration Suite allows customers to solve critical business-tobusiness
More informationCompany Facts. 1,800 employees. 150 countries. 12,000 customers and growing. 17 languages. 11 global offices
Disclaimer This presentation may contain product features that are currently under development. This overview of new technology represents no commitment from VMware to deliver these features in any generally
More informationSOLUTION BRIEF CA TECHNOLOGIES IDENTITY-CENTRIC SECURITY. Identity-centric Security: The ca Securecenter Portfolio
SOLUTION BRIEF CA TECHNOLOGIES IDENTITY-CENTRIC SECURITY Identity-centric Security: The ca Securecenter Portfolio How can you leverage the benefits of cloud, mobile, and social media, while protecting
More informationProtecting Patient Data in the Cloud With DLP An Executive Whitepaper
Protecting Patient Data in the Cloud With DLP An Executive Whitepaper. Overview Healthcare and associated medical record handling organizations have, for many years, been utilizing DLP, Data Loss Prevention
More informationFileNet and SharePoint Better Together. Tom Moen Channel Development Manager
FileNet and SharePoint Better Together Tom Moen Channel Development Manager Agenda Introductions Who is FileNet Why FileNet ECM Content Process Connectivity SharePoint Integration FileNet $500 million
More informationCloud App Security. Tiberio Molino Sales Engineer
Cloud App Security Tiberio Molino Sales Engineer 2 Customer Challenges 3 Many Attacks Include Phishing Emails External Phishing attacks: May target specific individuals or companies Customer malware or
More information32% of Excel users are comfortable with using it for Advanced Analysis e.g., PivotTables
Only 28% of potential BI users have any meaningful access 32% of Excel users are comfortable with using it for Advanced Analysis e.g., PivotTables 31% of all BI initiatives partially meet or don t meet
More informationProtecting Data-at-Rest with SecureZIP for DLP
Protecting Data-at-Rest with SecureZIP for DLP TABLE OF CONTENTS INTRODUCTION 3 PROTECTING DATA WITH DLP 3 FINDING INDIVIDUAL AND SHARED INFORMATION-AT-REST 4 METHODS FOR REMEDIATION 4 ENCRYPTING UNPROTECTED
More informationSymantec Enterprise Vault.cloud Giovanni Alberici
Symantec Enterprise Vault.cloud Giovanni Alberici Global Product Marketing Manager 1 Agenda 1 2 3 4 Symantec s cloud strategy Overview of Symantec.cloud Symantec Enterprise Vault.cloud Symantec.cloud portfolio
More informationSymantec to Acquire Clearwell Systems, Inc. May 19, 2011
Symantec to Acquire Clearwell Systems, Inc. May 19, 2011 1 Forward-Looking Statements This presentation contains forward-looking statements within the meaning of U.S. federal securities laws, including
More informationData Loss Prevention Best Practices to comply with PCI-DSS An Executive Guide
Data Loss Prevention Best Practices to comply with PCI-DSS An Executive Guide. Four steps for success Implementing a Data Loss Prevention solution to address PCI requirements may be broken into four key
More informationSalient Managed Services. Hosting and Support
Salient Managed Services Hosting and Support Salient Managed Services: Hosting and Support Salient s Managed Services provide clients with the highest level of reliability and peace of mind. We have qualified
More informationPractical DLP Deployment
Practical DLP Deployment Practical DLP Deployment for your Organization Jon Damratoski, DLP Architect DLP Basics Overview A few items discussed today What is DLP? Define a DLP program using business driven
More informationAltiris Asset Management Suite 7.0
Altiris Asset Management Suite 7.0 1 Today s Agenda 1 Asset Management Overview 2 What's New in AMS 7 3 New Process Automations (workflow) 4 Migration from 6.x to 7.0 Altiris Asset Management Suite 7.0
More informationEfficiently Protect, Manage and Access Big Data. Nigel Tozer Business Development Director EMEA
Efficiently Protect, Manage and Access Big Data Nigel Tozer Business Development Director EMEA WHAT WE DO We are relentlessly focused on giving companies better, more cost-effective ways to protect, manage,
More informationIdentifying Broken Business Processes
Identifying Broken Business Processes A data-centric approach to defining, identifying, and enforcing protection of sensitive documents at rest, in motion, and in use 6/07 I www.vericept.com Abstract The
More informationTrend Micro Cloud App Security for Office 365. October 27, 2015 Trevor Richmond
Trend Micro Cloud App Security for Office 365 October 27, 2015 Trevor Richmond Too many malware incidents >90% Targeted Attacks Start with Email Attackers: Target specific companies or individuals Research
More informationOverview of F5 Networks. Fatih Bilger Senior Systems Engineer, Prolink. fatih.bilger@prolink.com.tr
Overview of F5 Networks Fatih Bilger Senior Systems Engineer, Prolink fatih.bilger@prolink.com.tr Company Snapshot Leading provider of Application Delivery Networking products that optimize the security,
More informationWeb Security Gateway Solutions
Web Security Gateway Solutions Websense Web Security Gateway Solutions 90 percent of the top 100 Web sites are classified as social networking or search and more than 47 percent of these sites support
More informationAirWatch Solution Overview
AirWatch Solution Overview Marenza Altieri-Douglas - AirWatch Massimiliano Moschini Brand Specialist Itway 2014 VMware Inc. All rights reserved. Cloud Computing 2 BYOD 3 Device aziendali? 4 From Client/Server
More informationBusiness Intelligence with SharePoint 2010
Business Intelligence with SharePoint 2010 August 2011 Asad Mahmood Head Of Business Analytics Consulting E: asad.mahmood@contemporary.co.uk T: @MrAsadMahmood Symon Garfield Chief Technology Officer E:
More informationVMware Vision Accelerating the Journey to Your Cloud
VMware Vision Accelerating the Journey to Your Cloud Ralf von Gunten Sr. Systems Engineer 2010 VMware Inc. All rights reserved VMware is the Customer-Proven Market Leader Company Overview > $2.6 billion
More informationTHE EXECUTIVE GUIDE TO DATA LOSS PREVENTION. Technology Overview, Business Justification, and Resource Requirements
THE EXECUTIVE GUIDE TO DATA LOSS PREVENTION Technology Overview, Business Justification, and Resource Requirements Introduction to Data Loss Prevention Intelligent Protection for Digital Assets Although
More informationIBM Security Intelligence Strategy
IBM Security Intelligence Strategy Delivering Insight with Agility October 17, 2014 Victor Margina Security Solutions Accent Electronic 12013 IBM Corporation We are in an era of continuous breaches Operational
More informationIBM Data Security Services for endpoint data protection endpoint data loss prevention solution
Automating policy enforcement to prevent endpoint data loss IBM Data Security Services for endpoint data protection endpoint data loss prevention solution Highlights Facilitate policy-based expertise and
More informationIntegrated email archiving: streamlining compliance and discovery through content and business process management
Make better decisions, faster March 2008 Integrated email archiving: streamlining compliance and discovery through content and business process management 2 Table of Contents Executive summary.........
More informationObserveIT User Activity Monitoring
KuppingerCole Report EXECUTIVE VIEW by Martin Kuppinger April 2015 ObserveIT provides a comprehensive solution for monitoring user activity across the enterprise. The product operates primarily based on
More informationAn Oracle White Paper June 2014. Security and the Oracle Database Cloud Service
An Oracle White Paper June 2014 Security and the Oracle Database Cloud Service 1 Table of Contents Overview... 3 Security architecture... 4 User areas... 4 Accounts... 4 Identity Domains... 4 Database
More informationCapital Market Day 2015
Capital Market Day 2015 Digital Business Platform & Product Roadmap Dr. Wolfram Jost Chief Technology Officer February 4, 2015 1 For Internal use only. Market Application infrastructure and middleware
More informationERNW Newsletter 29 / November 2009
ERNW Newsletter 29 / November 2009 Dear Partners and Colleagues, Welcome to the ERNW Newsletter no. 29 covering the topic: Data Leakage Prevention A Practical Evaluation Version 1.0 from 19th of november
More informationSecuring Content Management Systems
Securing Content Management Systems The Next Frontier in Leakage Prevention 1 Terms and Definitions 2 Leakage/Loss Prevention (DLP) Technology, products, or services that prevent sensitive information
More informationBackground. Liwei Ren. Trend Micro
Securing Your Data for the Journey to the Clouds Liwei Ren, Ph.D, Trend Micro April, 2015, SNIA DSI 2015, Santa Clara, California Copyright 2011 Trend Micro Inc. 1 Background Liwei Ren Research interests
More informationBest Practices for Choosing a Content Control Solution
Best Practices for Choosing a Content Control Solution March 2006 Copyright 2006 Entrust. All rights reserved. Entrust is a registered trademark of Entrust, Inc. in the United States and certain other
More informationSM B13: Symantec Data Insight Ketan Shah, Principal Product Manager John Dodds, Director Technical Product Manager
Ketan Shah, Principal Product Manager John Dodds, Director Technical Product Manager 1 Agenda 1 2 3 4 Overview Data Management Data Protection and Compliance What s New and Futures SYMANTEC VISION 2012
More information<Insert Picture Here> Oracle bemutatkozás
Oracle bemutatkozás Fekete Zoltán Oracle üzleti intelligencia és adattárház termékmenedzser Oracle Corporation 2007 Legnagyobb vállalati szoftver szállító 18 milliárd $ bevétel, FY07
More information10 Building Blocks for Securing File Data
hite Paper 10 Building Blocks for Securing File Data Introduction Securing file data has never been more important or more challenging for organizations. Files dominate the data center, with analyst firm
More informationCA Systems Performance for Infrastructure Managers
PRODUCT SHEET: CA Systems Performance for Infrastructure Managers agility made possible CA Systems Performance for Infrastructure Managers CA Systems Performance for Infrastructure Managers is an add-on
More informationFind the needle in the security haystack
Find the needle in the security haystack Gunnar Kristian Kopperud Principal Presales Consultant Security & Endpoint Management Technology Day Oslo 1 Find the needle in the security haystack Manually deep
More informationEnsuring Security and Compliance of Your EMC Documentum Enterprise Content Management System: A Collaborative Effort of EMC Documentum and RSA
Ensuring Security and Compliance of Your EMC Documentum Enterprise Content Management System: A Collaborative Effort of EMC Documentum and RSA Applied Technology Abstract This white paper discusses the
More informationAPPLICATION MANAGEMENT SUITE FOR ORACLE E-BUSINESS SUITE APPLICATIONS
APPLICATION MANAGEMENT SUITE FOR ORACLE E-BUSINESS SUITE APPLICATIONS Oracle Application Management Suite for Oracle E-Business Suite delivers capabilities that helps to achieve high levels of application
More informationCA point of view: Content-Aware Identity & Access Management
TECHNOLOGY BRIEF CA Point of View: Content-Aware Identity and Access Management March 2011 CA point of view: Content-Aware Identity & Access Management table of contents EXECUTIVE SUMMARY SECTION 1 Challenge
More informationLowering E-Discovery Costs Through Enterprise Records and Retention Management. An Oracle White Paper March 2007
Lowering E-Discovery Costs Through Enterprise Records and Retention Management An Oracle White Paper March 2007 Lowering E-Discovery Costs Through Enterprise Records and Retention Management Exponential
More informationENTERPRISE CONTENT MANAGEMENT. Which one is best for your organisation?
ENTERPRISE CONTENT MANAGEMENT Which one is best for your organisation? INFORMATION MANAGEMENT Information management environments are comprised of legacy information resident in line of business applications,
More informationCA Message Manager. Benefits. Overview. CA Advantage
PRODUCT BRIEF: CA MESSAGE MANAGER CA Message Manager THE PROACTIVE MANAGEMENT OF EMAIL AND INSTANT MESSAGES IS INTEGRAL TO THE OVERALL STRATEGY OF INFORMATION GOVERNANCE. THERE ARE MANY COMPLEX CHALLENGES
More informationIdentity Management Overview. Bill Nelson bill.nelson@gca.net Vice President of Professional Services
Identity Management Overview Bill Nelson bill.nelson@gca.net Vice President of Professional Services 1 Agenda Common Identity-related Requests Business Drivers for Identity Management Account (Identity)
More informationUnderstanding and Selecting a DLP Solution. Rich Mogull Securosis
Understanding and Selecting a DLP Solution Rich Mogull Securosis No Wonder We re Confused Data Loss Prevention Data Leak Prevention Data Loss Protection Information Leak Prevention Extrusion Prevention
More informationCLOUD COMPUTING FOR THE ENTERPRISE AND GLOBAL COMPANIES Steve Midgley Head of AWS EMEA
CLOUD COMPUTING FOR THE ENTERPRISE AND GLOBAL COMPANIES Steve Midgley Head of AWS EMEA AWS Introduction Why are enterprises choosing AWS? What are enterprises using AWS for? How are enterprise getting
More informationProtect the data that drives our customers business. Data Security. Imperva s mission is simple:
The Imperva Story Who We Are Imperva is the global leader in data security. Thousands of the world s leading businesses, government organizations, and service providers rely on Imperva solutions to prevent
More informationWhat s new in AM 9.30 Accelerating business outcomes
What s new in AM 9.30 Accelerating business outcomes AGENDA HP Asset Manager overview Relevant Trends and Improvements What s new in AM 9.30 ASSET MANAGER AND HP SOFTWARE PORTFOLIO Industry s most comprehensive
More information