Data Leak Protection THE NEED, IMPLEMENTATION AND RESULTS



Similar documents
Using Data Loss Prevention for Financial Institutions Banks, Credit Unions, Payments

Eric Moriak - CISSP, CISM, CGEIT, CISA, CIA Program Manager - IT Audit Children s Medical Center Dallas. Dallas, Texas

A Buyer's Guide to Data Loss Protection Solutions

TRITON - Data Security Help

Ultimate control over data leaks

Somansa Data Security and Regulatory Compliance for Healthcare

Data Loss Prevention Best Practices to comply with PCI-DSS An Executive Guide

Kelvin Wee CISA, CISM, CISSP Principal Consultant (DLP Specialist) Asia Pacific and Japan

For your eyes only - Encryption and DLP Erkko Skantz

CSG & Cyberoam Endpoint Data Protection. Ubiquitous USBs - Leaving Millions on the Table

A Websense Research Brief Prevent Data Loss and Comply with Payment Card Industry Data Security Standards

Ovation Security Center Data Sheet

How To Set Up Safetica Insight 9 (Safetica) For A Safetrica Management Service (Sms) For An Ipad Or Ipad (Smb) (Sbc) (For A Safetaica) (

Larry Wilson Version 1.0 November, University Cyber-security Program Critical Asset Mapping

Best Practices for DLP Implementation in Healthcare Organizations

Data Loss Prevention Program

The Cloud App Visibility Blindspot

Information & Asset Protection with SIEM and DLP

plantemoran.com What School Personnel Administrators Need to know

Websense Data Security Suite and Cyber-Ark Inter-Business Vault. The Power of Integration

TRITON - Data Security Help

How To Understand Your Potential Customer Opportunity Profile (Cop) From A Profit Share To A Profit Profit (For A Profit)

Comodo MyDLP Software Version 2.0. Administration Guide Guide Version Comodo Security Solutions 1255 Broad Street Clifton, NJ 07013

Comodo MyDLP Software Version 2.0. Installation Guide Guide Version Comodo Security Solutions 1255 Broad Street Clifton, NJ 07013

Don't Be The Next Data Loss Story

THE EXECUTIVE GUIDE TO DATA LOSS PREVENTION. Technology Overview, Business Justification, and Resource Requirements

RSA Solution Brief RSA. Data Loss. Uncover your risk, establish control. RSA. Key Manager. RSA Solution Brief

Comodo MyDLP Software Version 2.0. Endpoint Installation Guide Guide Version Comodo Security Solutions 1255 Broad Street Clifton, NJ 07013

SECURE YOUR DATA EXCHANGE WITH SAFE-T BOX

McAfee Data Protection Solutions

RSA Data Loss Prevention (DLP) Understand business risk and mitigate it effectively

FileCloud Security FAQ

F-Secure Messaging Security Gateway. Deployment Guide

CA Technologies Data Protection

Managing Cloud Computing Risk

The Value of QRadar QFlow and QRadar VFlow for Security Intelligence

DATA LEAKAGE PREVENTION IMPLEMENTATION AND CHALLENGES

Enterprise Security Solutions

STRATEGIC POLICY. Information Security Policy Documentation. Network Management Policy. 1. Introduction

Securely Yours LLC IT Hot Topics. Sajay Rai, CPA, CISSP, CISM

Incident Response. Six Best Practices for Managing Cyber Breaches. Nick Pollard, Senior Director Professional Services EMEA / APAC, Guidance Software

Architecture. The DMZ is a portion of a network that separates a purely internal network from an external network.

Protect your internal users on the Internet with Secure Web Gateway. Richard Bible EMEA Security Solution Architect

KEY STEPS FOLLOWING A DATA BREACH

Sophos Enterprise Console policy setup guide. Product version: 5.2

Deployment Guide. Websense TRITON AP-DATA Gateway and Discover. v8.0.x

Ovation Security Center Data Sheet

Protecting Sensitive Data Reducing Risk with Oracle Database Security

Did you know your security solution can help with PCI compliance too?

Sample Data Security Policies

YOUR HIPAA RISK ANALYSIS IN FIVE STEPS

GFI Product Manual. Administrator Guide

Quick Start for Network Agent. 5-Step Quick Start. What is Network Agent?

Security Architecture Whitepaper

Protecting Regulated Information in Cloud Storage with DLP

Bryan Hadzik Network Consulting Services, inc. Endpoint Security Data At Rest

Step-by-Step Configuration

QUESTION: 1 Which of the following are valid authentication user group types on a FortiGate unit? (Select all that apply.)

Today s Topics. Protect - Detect - Respond A Security-First Strategy. HCCA Compliance Institute April 27, Concepts.

Information Security Policy

Incident Response. Six Best Practices for Managing Cyber Breaches.

Prevent Security Breaches by Protecting Information Proactively

Five Tips to Ensure Data Loss Prevention Success

DLP Quick Start

Guideline on Auditing and Log Management

Splunk Enterprise Log Management Role Supporting the ISO Framework EXECUTIVE BRIEF

Data Security Incident Response Plan. [Insert Organization Name]

Trust 9/10/2015. Why Does Privacy and Security Matter? Who Must Comply with HIPAA Rules? HIPAA Breaches, Security Risk Analysis, and Audits

THE TOP 4 CONTROLS.

Microsoft Online Subscription Agreement/Open Program License Amendment Microsoft Online Services Security Amendment Amendment ID MOS10

Managing PHI in the Cloud Best Practices

EXECUTIVE SUMMARY Cloud Backup for Endpoint Devices

WHAT S NEW IN WEBSENSE TRITON RELEASE 7.8

Use of The Information Services Active Directory Service (AD) Code of Practice

2014 Core Training 1

PHI- Protected Health Information

Feature List for Kaspersky Security for Mobile

NETWRIX FILE SERVER CHANGE REPORTER

Information Technology Security Procedures

Decryption. Palo Alto Networks. PAN-OS Administrator s Guide Version 6.0. Copyright Palo Alto Networks

Transcription:

Data Leak Protection THE NEED, IMPLEMENTATION AND RESULTS

Table Of Contents Our Introduction Introduction To Data Leak Organisation structures Data leak areas Data leak solutions Suggested data leak solution DL strategies DL products Implementation Expected results Results challenges Ongoing DL solutions Support

MIBM Introduction MUNSHIRAM INTERNATIONAL BUSINESS MACHINES LIMITED (MIBM Ltd) Established in 1980 with a mission to provide customers with efficient office solutions through in-house developed products and technical capabilities and capacity. The preferred choice in delivery of office furniture, business equipment's, ICT equipment's, ICT services and solutions. Designed and developed MyCBOMS, CSM, ASAH EDMS, Retail Management System(POS), Biometric Access Control System and NHIF CRV Software among others. Has elaborate distribution and support network in Kenya(Nairobi, Kisumu, Mombasa and Meru), Uganda(Kampala), Rwanda(Kigali) and Tanzania(Dar Es Salam). Other group companies are; Punchlines, Secura, Kengrow and Bracon.

Introduction To Data Leaks Data loss/leak prevention solution is a system that is designed to detect potential data breach, data ex-filtration transmissions and prevent them by monitoring, detecting & blocking sensitive data while; 1. In-use. Data in laptops, PCs, PDAs (endpoint actions), 2. In-motion. Data being sent (network traffic), 3. At-rest. Data stored in servers, PCs (data storage) Sensitive data is disclosed to unauthorized personnel either by malicious intent or inadvertent mistake.

The Many Faces of Data Leaks Accidental Disclosure Insider Threats Improper Access Control Social Engineering Customer information, Credit-card details Other Acronyms Data Loss Protection Data Leak Prevention/Protection Information Loss Prevention/Protection Information Leak Prevention/Protection Extrusion Prevention System Content Monitoring and Filtering Content Monitoring and Protection

Risk Of Loosing Sensitive Data 3:5 firms experience a data loss or theft event 1 9:10 data loss or theft events go unreported 1 1:5 employees have emailed confidential data from their corporate account to a personal one 2 1:2 business travellers carry sensitive corporate data on their laptops or PDAs 1:2 workers have lost portable devices containing work-related data4 Consequences Of Loosing Sensitive Data Band media and brand damage Regulatory penalties Liability and lawsuits

Sensitive Data That Can Be Leaked Intellectual property (IP), Financial or Employee Information Customer information, Credit-card details Method of Data Leaks

Data Leak Protection Solution Data is transferred to/from, processed in the workstations and can be easily shared with outside world using the following options. Internet Cloud Tablets Email s Flash Drives Mobile Phones External Hard Disks Web Email s CD/DVD Internet Link Corporate Servers (File servers, Mail Servers, Network Servers, Database Servers, Application Servers) Internet Access Instant Chat Room Workstation/PC Printin g Memory Cards Twitter Facebo ok Network Folders

Real Examples Of Data Leaks Laptop Stolen in Home Burglary: 2006 In May 2006, a thief broke into the home of a U.S. Veterans Affairs employee and took a laptop with the personal information of 17.5 million Veterans. This story had a rare happy ending, as the FBI recovered the laptop a month later and found that no one accessed the information Bradley Manning. a United States Army soldier who was arrested in May 2010 in Iraq on suspicion of having passed classified material to the website WikiLeaks. Swiss to US& Britain Alert. Swiss news reports and the sources close to the investigation said that investigators believe the technician downloaded terabytes, running into hundreds of thousands or even millions of printed pages, of classified material from the Swiss intelligence service's servers onto portable hard drives. He then carried them out of government buildings in a backpack.

Data Loss Solutions User training and sensitisation Use of dumb end workstations with no local data storage Disallow use of portable devices(pda) Disable emails and internet Only shareholders access and work on sensitive data Implement data leak protection solution. Deploy security guards to inspect add data carrying devices in and out of company premises. Assume all will be well.

Data Leak Protection Solution Data leaving the workstation to other points is filtered for content and also leaving the organisation servers. Internet Cloud Tablets Email s Flash Drives Mobile Phones External Hard Disks Internet Link Firewall jj Corporate Servers (File servers, Mail Servers, Network Servers, Database Servers, Application Servers) Web Email s Internet Access Workstation/PC CD/DVD Memory Cards Provide DLP Protection Layer Instant Chat Room Twitter Facebo ok Network Folders Printin g Provide DLP Protection Layer Data Leak Protection Server

Data Leak Protection Background Key Technical Features: Centralized Management Central policy creation for distributed deployments Predefined and customizable ready to use policies Context-aware information analysis, monitoring and prevention Identification and blocking capability Ease of integration Support for directory services (MS AD, LDAP etc) Ability to integrate with all popular SQL databases Support for all kind of printers independent from brand, model and connection type Doing all these without extra agent deployment. Business Alignment: Aligning with business needs Designed and preconfigured to satisfy business needs Customizable policies, messages etc. Market Position Should be used by several institutions and companies Further, should be assessed and evaluated by thousands of experts

Data Leak Protection Strategy DLP Focus: Data

MyDLP Solution Components MyDLP Management Console MyDLP Network Protection MyDLP Information Discovery MyDLP Endpoint Protection MyDLP Printer Protection MyDLP Information Discovery

MyDLP High Availability MyDLP can run on both physical and virtual servers. You can distribute and scale MyDLP almost linearly. MyDLP is fault tolerant. ( active-active )

MyDLP Integration And Network Protection Should be integrated with mail server to protect SMTP traffic. Supports all popular mail servers. Should be integrated with directory server to use directory users & groups in policies. Does not require any agent installation. Should intercept Web traffic to protect it. Can be integrated with your proxy server using ICAP protocol or bundled Squid 3.x can be used.

MyDLP Information Discovery MyDLP can crawl through your data stores, file servers and SQL servers to learn your sensitive data from them. Saves your time and keeps itself always up-to-date. If a sensitive information appears is in a place where it shouldn t be, MyDLP finds out, remediates and reports.

MyDLP Endpoint And Printer Protection If a sensitive information appears is in a place where it shouldn t be, MyDLP finds out, remediates and reports. On endpoints, too MyDLP will protect all kind of removable storage devices connected to your computers through USB (1.0, 1.1, 2.0, 3.0), Firewire (400, 800, 1600, 3200 and S types) and more. MyDLP support all printer models and all connection ports. Does not require print server or any other agent installation.

Management And Administration Enterprise manager has an easy to use web administration interface Predefined and customizable ready to use policies User roles with hierarchical authority scopes Automatically revisions policies. You can turn back to any state at any time. Advanced incident log searching including full text searches.

DLP Solution Server Implementation DLP Server with Active Directories Content Filtering Outgoing Emails Outgoing web content(text/multipart) End-Point Workstations Data Encryption Find and authenticate content Mobile Devices Data encryption Data wipe on device loss

Communications Control Policy Functions Port-independent application/protocol detection and filtering Message/session reconstruction with file/data/parameter extraction Content filtering Event/audit logging data shadowing Network-related parameters controlled IP address, range, subnet, masking Network ports and network ranges Protocols and network application types Identity-based parameters controlled User IDs and groups, email and IP addresses, Instant Messaging ID, URI/URL LDAP identities

Copying to external storage e.g flash disk, external disk Plain and SSL-tunneled SMTP emails Messages and attachments separately HTTP/HTTPS-based web access, Popular webmail & social networking applications Gmail, Yahoo! Mail, Hotmail, Windows Live Mail Facebook, Twitter, LinkedIn, MySpace Instant Messaging ICQ/AOL, MSN Messenger, Jabber, IRC, Yahoo Messenger, Mail.ru Agent IPTelephony and remote administration Skype, Teamviewer, Mikogo etc File transfer via FTP and FTP-SSL FileZilla, WinSCP, IIS etc Telnet sessions Screen shot prevention

Implementation Corporate overview Hardware and softwares delivery DLP Server Installation and configuration End-point DLP software installation Include group policies Technical training Management training Other employees training

MyDLP Implementation Schedule

MyDLP Licencing And Support Community Licences Enterprise Annual Maintenance Contracts Site Visits Email, chat support Remote support Troubleshoot server Local MyDLP forum and international forum

Justifying Costs To The Management Leakage of personally identifiable information (PII) and personal health information (PHI), direct costs: The average cost per record associated with a leak to make affected parties whole Fees for legal representation Engaging a PR firm to minimize damage and restore reputation to the extent possible Consumer credit monitoring for all customers (not necessarily only those affected by the leak) Up to five years of system and process audits conducted by an independent third party

Justifying Costs To The Management Intellectual property, direct costs: Fees for legal recourse to address who leaked the data and discover if it is being used inappropriately Short-term impact to R&D cost recuperation Long-term impact to profitability/revenue projections System and process audits to identify and correct the source of the leak

Justifying Costs To The management Total economic impact in one lost laptop: $49,256 (incl. replacement cost, detection, forensics, data breach, lost intellectual property costs, lost productivity and legal, consulting and regulatory expenses) Occurrence of data breach represents 80 % of cost; intellectual property loss is 59% of cost If the company discovers the loss in one day, it is $8,950. After one week, it is $115,849 Average cost for senior management is $28,449. For a manager or director it is about $61,000 Productivity loss is only about 1% of the cost Loss if laptop is encrypted: $29,256 (> $20,000 less) Loss varies by industry financial services: $112, 853, healthcare: $67,873, manufacturing: $2,184 Loss of intellectual property for healthcare is quite high - $17,999

MyDLP Customer Support Framework Customer Enquires Help Allocate Support Assistant Supported Phone Call Call Support Phone support data Record And Identify Support Nature Chat Allocate Support Assistant SMS Support Supported Copy Chat Logs Is Hardware Or Software Software Issues Hardware Issues Supported Hardware Email Email Suport Email logs Allocate Technician Allocate Technician SMS SMS Auto Response service Unavailable Reponse? Consolidate Auto Response & Queries Solves Issues Software Developm ent Internet Trouble shoot server Send Relevant Local Technician To Site No Issue Resolved? Yes, resolved remotely, or by assistance Customer Response Server

MyDLP International Support

Questions Questions Questions Questions Questions Questions Questions Questions

Punch Towers, East-Gate National Park Road, Off Mombasa Road P.O. Box 46667 00100 GPO Nairobi 020-534719/530936 http://www.munshiram.com http://www.misoo.co.ke Simon Kagara, kagara@munshiram.com 0722-674562/0733-674562 Abdul Ali, abdula@munshiram.com 0722-950575/0733-950575

Notes