Symantec DLP Overview Jonathan Jesse ITS Partners
Today s Agenda What are the challenges? What is Data Loss Prevention (DLP)? How does DLP address key challenges? Why Symantec DLP and how does it work? 2
DLP is Imperative Insiders and partners cause most breaches Insiders make mistakes handling data Broken business processes increase risk 88% of breaches Compliance mandates data protection Increased focus on data privacy Need to demonstrate data controls 81% of companies breached were not PCI compliant More complex threats to your data External threats target high value data Limited visibility of where data is $6.7 million average cost of a breach 3
DLP is the Cornerstone of Security Protect the Infrastructure > Symantec Protection Suites Develop and Enforce IT Policies > Symantec Control Compliance Suite Protect Information Proactively > Symantec Data Loss Prevention Manage Security Efficiently > Altiris Management Suite 4
What is Data Loss Prevention? Where is your confidential data? How is it being used? How best to prevent its loss? DISCOVER MONITOR DATA LOSS PREVENTION (DLP) PROTECT 5
Key DLP Capabilities DISCOVER MONITOR PROTECT Find data wherever it is stored Create inventory of sensitive data Manage data clean up Understand how data is being used Understand content and context Gain visibility into policy violations Proactively secure data Prevent confidential data loss Enforce data protection policies Define unified policy across enterprise MANAGE Remediate and report on incidents Detect content accurately 6
How It Works DISCOVER MONITOR PROTECT 2 3 4 Identify scan targets Run scan to find sensitive data on network & endpoint Inspect data being sent Monitor network & endpoint events Block, remove or encrypt Quarantine or copy files Notify employee & manager MANAGE 1 Enable or customize policy templates MANAGE 5 Remediate and report on risk reduction 7
Strategic DLP Requirements Product: Proven to work and covers all threats. Validated as the strongest overall enterprise DLP capability Comprehensive coverage, measurable risk reduction Experience: Successful customers in your industry. Proven deployment methodology developed over 7 years The largest number of dedicated DLP experts Leadership: What s the most widely used solution? Over 300 customers 31 of the FORTUNE 100 Continue to innovate and anticipate customer demands 8
Continuous Risk Reduction 1000 Visibility Remediation 800 Notification 600 400 200 0 Incidents Per Week Risk Reduction Over Time Prevention 9
Symantec Data Loss Prevention Architecture MTA or Proxy SPAN Port or Tap Disconnected SECURED CORPORATE LAN DMZ 10
DLP for Storage Use Cases DISCOVER PROTECT MTA or Proxy SPAN Port or Tap Disconnected SECURED CORPORATE LAN DMZ 11
Fix Broken Business Processes 500k Personal Records on Open Share Find it. Fix it. Remove from open share and leave a file marker. 1212
DLP for Network Use Cases MTA or Proxy MONITOR PROTECT SPAN Port or Tap Disconnected SECURED CORPORATE LAN DMZ 13
Protect Competitive Advantage Unencrypted product design documents sent to a partner 1 4 14
Protect Competitive Advantage Unencrypted product design documents sent to a partner Educate users with automated email. Protect intellectual property. 1 5 15
DLP for Endpoint Use Cases MTA or Proxy MONITOR DISCOVER PROTECT SPAN Port or Tap Disconnected SECURED CORPORATE LAN DMZ 16
Fix Exposed Data on a Desktop Call center records improperly stored on an Endpoint 1 7 17
Clean Up Exposed Data on a Desktop Call center records improperly stored on an Endpoint Notify user via automated email. Empower users to self remediate. 1 8 18
Protect Competitive Advantage Pricing copied to USB 19
Protect Competitive Advantage Pricing copied to USB Stop it from being copied to USB. Notify User. Launch investigation. 20 20
Prevent Breach of Customer Data Sensitive data sent via personal webmail Block the email. On or off the corporate network. 21
Additional information Symantec DLP product Web site: http://www.symantec.com/en/uk/business/theme.jsp?th emeid=dlp E mail Chris Hagelin Symantec (Chris_Hagelin@symantec.com) Evaluation Workshop & Demo can be arranged 2 2