Symantec DLP Overview. Jonathan Jesse ITS Partners

Similar documents
For your eyes only - Encryption and DLP Erkko Skantz

Data Protection McAfee s Endpoint and Network Data Loss Prevention

The Impact of HIPAA and HITECH

DISCOVER, MONITOR AND PROTECT YOUR SENSITIVE INFORMATION Symantec Data Loss Prevention. symantec.com

A Buyer's Guide to Data Loss Protection Solutions

Data Loss Prevention and HIPAA. Kit Robinson Director

RSA Data Loss Prevention (DLP) Understand business risk and mitigate it effectively

Strategies and Best Practices to Implement a Successful Data Loss Prevention Program Sebastian Brenner, CISSP

Protecting Data-at-Rest with SecureZIP for DLP

Jeff Warson, GCIH, SCPS, CISSP, CCSK Sr. Principal Security Strategist Symantec Corpora5on

Five Tips to Ensure Data Loss Prevention Success

Best Practices for DLP Implementation in Healthcare Organizations

Practical DLP Deployment

Solutions for admission control and data loss prevention in a modern corporate network

Adopt a unified, holistic approach to a broad range of data security challenges with IBM Data Security Services.

Data Loss Prevention Best Practices to comply with PCI-DSS An Executive Guide

Cisco Security Optimization Service

Websense Data Security Suite and Cyber-Ark Inter-Business Vault. The Power of Integration

Websense Data Security Solutions

RSA SIEM and DLP Infrastructure and Information Monitoring in One Solution

Information Technology Solutions

Prevent Security Breaches by Protecting Information Proactively

Information Risk Management. Alvin Ow Director, Technology Consulting Asia Pacific & Japan RSA, The Security Division of EMC

Payment Card Industry Data Security Standard

HIPAA Omnibus Compliance How A Data Loss Prevention Solution Can Help

A HELPING HAND TO PROTECT YOUR REPUTATION

Kelvin Wee CISA, CISM, CISSP Principal Consultant (DLP Specialist) Asia Pacific and Japan

Information & Asset Protection with SIEM and DLP

McAfee Data Protection Solutions

Symantec Consulting Services

Identifying Broken Business Processes

A Websense Research Brief Prevent Data Loss and Comply with Payment Card Industry Data Security Standards

Compliance Management, made easy

10 Building Blocks for Securing File Data

Maintaining PCI-DSS compliance. Daniele Bertolotti Antonio Ricci

McAfee Data Loss Prevention 9.3.0

DLP Content Discovery: Best Practices for Stored Data Discovery and Protection

with Managing RSA the Lifecycle of Key Manager RSA Streamlining Security Operations Data Loss Prevention Solutions RSA Solution Brief

How To Implement Data Loss Prevention

Data Loss Prevention. Keeping sensitive data out of the wrong hands*

WHITEPAPER. Achieving Network Payment Card Industry Data Security Standard (PCI DSS) Compliance with NetMRI

THE EXECUTIVE GUIDE TO DATA LOSS PREVENTION. Technology Overview, Business Justification, and Resource Requirements

Guide to Successful Data Loss Prevention Risk Reduction: Part 1

IBM Data Security Services for endpoint data protection endpoint data loss prevention solution

IBM Data Security Services for endpoint data protection endpoint data loss prevention solution

RSA Solution Brief RSA. Data Loss. Uncover your risk, establish control. RSA. Key Manager. RSA Solution Brief

Sample Data Security Policies

ManageEngine Desktop Central Training

Preparing for a Cyber Attack PROTECT YOUR PEOPLE AND INFORMATION WITH SYMANTEC SECURITY SOLUTIONS

The Value of DLP

SANS Top 20 Critical Controls for Effective Cyber Defense

Sales Rep Frequently Asked Questions

Enterprise Security Solutions

AB 1149 Compliance: Data Security Best Practices

ForeScout CounterACT. Continuous Monitoring and Mitigation

On and off premises technologies Which is best for you?

Proven LANDesk Solutions

DeltaV System Health Monitoring Networking and Security

HIPAA Privacy and Information Security Management Briefing

Data Sheet: Endpoint Security Symantec Network Access Control Comprehensive Endpoint Enforcement

Using Data Loss Prevention for Financial Institutions Banks, Credit Unions, Payments

PCI Compliance for Cloud Applications

Data loss prevention and endpoint security. Survey findings

Data Classification Technical Assessment

Executive Summary Program Highlights for FY2009/2010 Mission Statement Authority State Law: University Policy:

PCI Solution for Retail: Addressing Compliance and Security Best Practices

Managing Remote and Mobile Workers Adam Licata, Enterprise Mobility SE, TSO Brian Sheedy, Sr. Principal TEC, Endpoint Management

Anatomy of a Data Breach: Why Breaches Happen and What to Do About It

State of South Carolina Policy Guidance and Training

EMC Security for Microsoft Exchange Solution: Data Loss Prevention and Secure Access Management

To Catch A Thief: Preventing the Next Fortune 500 Data Breach

INCREASINGLY, ORGANIZATIONS ARE ASKING WHAT CAN T GO TO THE CLOUD, RATHER THAN WHAT CAN. Albin Penič Technical Team Leader Eastern Europe

EMC CONSULTING SECURITY STANDARDS AND COMPLIANCE SERVICES

Leveraging a Maturity Model to Achieve Proactive Compliance

全 球 資 安 剖 析, 您 做 確 實 了 嗎? Albert Yung Barracuda Networks

Malware and Other Malicious Threats

Attaining HIPAA Compliance with Retina Vulnerability Assessment Technology

Total Protection for Compliance: Unified IT Policy Auditing

Data Loss Prevention Best Practices for Healthcare

Netzwerkvirtualisierung? Aber mit Sicherheit!

Incident Response. Proactive Incident Management. Sean Curran Director

Secure Your Mobile Workplace

Architecting and Building a Secure and Compliant Virtual Infrastructure and Private Cloud

Using Automated, Detailed Configuration and Change Reporting to Achieve and Maintain PCI Compliance Part 4

Larry Wilson Version 1.0 November, University Cyber-security Program Critical Asset Mapping

Transcription:

Symantec DLP Overview Jonathan Jesse ITS Partners

Today s Agenda What are the challenges? What is Data Loss Prevention (DLP)? How does DLP address key challenges? Why Symantec DLP and how does it work? 2

DLP is Imperative Insiders and partners cause most breaches Insiders make mistakes handling data Broken business processes increase risk 88% of breaches Compliance mandates data protection Increased focus on data privacy Need to demonstrate data controls 81% of companies breached were not PCI compliant More complex threats to your data External threats target high value data Limited visibility of where data is $6.7 million average cost of a breach 3

DLP is the Cornerstone of Security Protect the Infrastructure > Symantec Protection Suites Develop and Enforce IT Policies > Symantec Control Compliance Suite Protect Information Proactively > Symantec Data Loss Prevention Manage Security Efficiently > Altiris Management Suite 4

What is Data Loss Prevention? Where is your confidential data? How is it being used? How best to prevent its loss? DISCOVER MONITOR DATA LOSS PREVENTION (DLP) PROTECT 5

Key DLP Capabilities DISCOVER MONITOR PROTECT Find data wherever it is stored Create inventory of sensitive data Manage data clean up Understand how data is being used Understand content and context Gain visibility into policy violations Proactively secure data Prevent confidential data loss Enforce data protection policies Define unified policy across enterprise MANAGE Remediate and report on incidents Detect content accurately 6

How It Works DISCOVER MONITOR PROTECT 2 3 4 Identify scan targets Run scan to find sensitive data on network & endpoint Inspect data being sent Monitor network & endpoint events Block, remove or encrypt Quarantine or copy files Notify employee & manager MANAGE 1 Enable or customize policy templates MANAGE 5 Remediate and report on risk reduction 7

Strategic DLP Requirements Product: Proven to work and covers all threats. Validated as the strongest overall enterprise DLP capability Comprehensive coverage, measurable risk reduction Experience: Successful customers in your industry. Proven deployment methodology developed over 7 years The largest number of dedicated DLP experts Leadership: What s the most widely used solution? Over 300 customers 31 of the FORTUNE 100 Continue to innovate and anticipate customer demands 8

Continuous Risk Reduction 1000 Visibility Remediation 800 Notification 600 400 200 0 Incidents Per Week Risk Reduction Over Time Prevention 9

Symantec Data Loss Prevention Architecture MTA or Proxy SPAN Port or Tap Disconnected SECURED CORPORATE LAN DMZ 10

DLP for Storage Use Cases DISCOVER PROTECT MTA or Proxy SPAN Port or Tap Disconnected SECURED CORPORATE LAN DMZ 11

Fix Broken Business Processes 500k Personal Records on Open Share Find it. Fix it. Remove from open share and leave a file marker. 1212

DLP for Network Use Cases MTA or Proxy MONITOR PROTECT SPAN Port or Tap Disconnected SECURED CORPORATE LAN DMZ 13

Protect Competitive Advantage Unencrypted product design documents sent to a partner 1 4 14

Protect Competitive Advantage Unencrypted product design documents sent to a partner Educate users with automated email. Protect intellectual property. 1 5 15

DLP for Endpoint Use Cases MTA or Proxy MONITOR DISCOVER PROTECT SPAN Port or Tap Disconnected SECURED CORPORATE LAN DMZ 16

Fix Exposed Data on a Desktop Call center records improperly stored on an Endpoint 1 7 17

Clean Up Exposed Data on a Desktop Call center records improperly stored on an Endpoint Notify user via automated email. Empower users to self remediate. 1 8 18

Protect Competitive Advantage Pricing copied to USB 19

Protect Competitive Advantage Pricing copied to USB Stop it from being copied to USB. Notify User. Launch investigation. 20 20

Prevent Breach of Customer Data Sensitive data sent via personal webmail Block the email. On or off the corporate network. 21

Additional information Symantec DLP product Web site: http://www.symantec.com/en/uk/business/theme.jsp?th emeid=dlp E mail Chris Hagelin Symantec (Chris_Hagelin@symantec.com) Evaluation Workshop & Demo can be arranged 2 2