Data Leakage Prevention (DLP) Understanding The Concept. George Ntontos Partner, In.T.Trust S.A.



Similar documents
Parla, Secure Cloud

anomaly, thus reported to our central servers.

How To Protect Your Data From Theft

European developer & provider ensuring data protection User console: Simile Fingerprint Filter Policies and content filtering rules

ITAR Compliance Best Practices Guide

ParlaMI, Enterprise Instant Messaging

Top tips for improved network security

THE CHALLENGES OF DATA SECURITY IN THE MODERN OFFICE

Making the difference between read to output, and read to copy GOING BEYOND BASIC FILE AUDITING FOR DATA PROTECTION

RSA Solution Brief RSA. Data Loss. Uncover your risk, establish control. RSA. Key Manager. RSA Solution Brief

Ultimate control over data leaks

A Buyer's Guide to Data Loss Protection Solutions

The Information Leak Detection & Prevention Guide

AB 1149 Compliance: Data Security Best Practices

Data Loss Prevention. Keeping sensitive data out of the wrong hands*

08/10/2013. Data protection and compliance. Agenda. Data protection life cycle and goals. Introduction. Data protection overview

BCS IT User Syllabus IT Security for Users Level 2. Version 1.0

SafeNet Content Security Product Overview. Protecting the Network Edge

Supplier Security Assessment Questionnaire

The State of Data Security Intelligence. Sponsored by Informatica. Independently conducted by Ponemon Institute LLC Publication Date: April 2015

Computer Security at Columbia College. Barak Zahavy April 2010

Why Encryption is Essential to the Safety of Your Business

: RSA 050-V60X-CSEDLPS. : CSE RSA Data Loss Prevention 6.0. Version : R6.1

SITECATALYST SECURITY

Evaluation Guide. eprism Messaging Security Suite V8.200

White paper. Why Encrypt? Securing without compromising communications

What s Wrong with Information Security Today? You are looking in the wrong places for the wrong things.

Executive Summary Program Highlights for FY2009/2010 Mission Statement Authority State Law: University Policy:

PROPOSED PROCEDURES FOR AN IDENTITY THEFT PROTECTION PROGRAM Setoff Debt Collection and GEAR Collection Programs

Outbound Security and Content Compliance in Today s Enterprise, 2005

McAfee Data Protection Solutions

OCT Training & Technology Solutions Training@qc.cuny.edu (718)

SECURITY THREATS: A GUIDE FOR SMALL AND MEDIUM BUSINESSES

Zscaler Internet Security Frequently Asked Questions

Dene Community School of Technology Staff Acceptable Use Policy

Database Security Guideline. Version 2.0 February 1, 2009 Database Security Consortium Security Guideline WG

Securing mobile devices in the business environment

EXIN Information Security Foundation based on ISO/IEC Sample Exam

ENISA s ten security awareness good practices July 09

IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including:

White Paper. Data Security. The Top Threat Facing Enterprises Today

3 Marketing Security Risks. How to combat the threats to the security of your Marketing Database

Whitepaper on AuthShield Two Factor Authentication with ERP Applications

Technology Blueprint. Protect Your Servers. Guard the data and availability that enable business-critical communications

RETHINKING CYBER SECURITY Changing the Business Conversation

SECURITY THREATS: A GUIDE FOR SMALL AND MEDIUM ENTERPRISES

FINANCIAL FRAUD: THE IMPACT ON CORPORATE SPEND IT SECURITY RISKS SPECIAL REPORT SERIES

Network Segmentation

PCI Compliance. Top 10 Questions & Answers

Top five strategies for combating modern threats Is anti-virus dead?

Brainloop Cloud Security

Protecting personally identifiable information: What data is at risk and what you can do about it

Dublin Institute of Technology IT Security Policy

AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE

The 12 Essentials of PCI Compliance How it Differs from HIPPA Compliance Understand & Implement Effective PCI Data Security Standard Compliance

Detecting Web Application Vulnerabilities Using Open Source Means. OWASP 3rd Free / Libre / Open Source Software (FLOSS) Conference 27/5/2008

The Ministry of Information & Communication Technology MICT

Protegent 360- Complete Security Software

In-House Vs. Hosted Security. 10 Reasons Why Your is More Secure in a Hosted Environment

Thoughts on PCI DSS 3.0. September, 2014

SearchInform Information Security Perimeter. Contents 1. SENSITIVE DATA PROTECTION: SEARCHINFORM INFORMATION SECURITY PERIMETER...

Prevent Security Breaches by Protecting Information Proactively

THE EXECUTIVE GUIDE TO DATA LOSS PREVENTION. Technology Overview, Business Justification, and Resource Requirements

Ensuring HIPAA Compliance with Computer BYTES Online Backup and Archiving Services

Security Policy for External Customers

Secure , Calendar, Contacts, Tasks, File sharing and Notes across devices

AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE

Ensuring HIPAA Compliance with Pros 4 Technology Online Backup and Archiving Services

DATA LEAKAGE PREVENTION IMPLEMENTATION AND CHALLENGES

Security.cloud Configuring DLP on to your flow and applying security to your hosted deployment

Get Started Guide - PC Tools Internet Security

Unified Security Anywhere HIPAA COMPLIANCE ACHIEVING HIPAA COMPLIANCE WITH MASERGY PROFESSIONAL SERVICES

Quick Heal Exchange Protection 4.0

Technology Blueprint. Secure Cloud-based Communications. Manage risk while embracing cloud services

How To Deal With A Converged Threat From A Cloud And Mobile Device To A Business Or A Customer'S Computer Or Network To A Cloud Device

Data Loss Prevention Program

Transcription:

Data Leakage Prevention (DLP) Understanding The Concept George Ntontos Partner,

External Threats: Viruses Hackers Blackmail Spamming Trojans Company Perimeter: Corporate Network Office Space Mobile Computers Removable Devices Internal Threats: Data Leakage Unauthorized access to information

70-80% of all losses from IT-incidents comes from authorized internal users, not external threats or hackers (!) The most dangerous incident possible is a DATA LEAK irreversible pursued by regulators damages reputation leads to direct financial loss

In 2008 the losses because of data leak contained from $400K to $32M Sources: Ponemon The 2008 Annual Study: Cost of a Data Breach

Biggest part of losses is lost profit: Lost clients Lost partners Lost market share Lost confidence Sources: Ponemon The 2008 Annual Study: Cost of a Data Breach

How much a data leak may cost? Customer Incident Possible loss, EU* Universal bank Reliable debtor registry 30 M Retail bank A list of a 1000 persons, checked by company security department 15 M IT-Company Malefactor communication 0.5 M Oil & gas company Purchase commission demands 0.2 M Oil & gas company Tender application 200 M * customer s estimations

Companies internal employees Temporary employees: translators, trainees, etc Outsourced employees: data-centers, call-centers Transportation companies: couriers Employees of other companies that have access to information within your company: auditing service companies, controlling units

Copies on removable media Forwarding and sending emails Web access (web-mail, blogs, messengers, etc) Printing and carrying away the printed copy Back up copies are carried away physically

Channels of data leakage Source: InfoWatch Data leaks in 2008 report

Sources: public leaks cases for year 2008, InfoWatch

Only 20% of information is structured * >10% of information is changing every day ** 10% of information is zero day documents ** 30% of documents are not absolute confidential ** IT MEANS THAT IT IS IMPOSSIBLE TO PROTECT DYNAMIC INFORMATION WITH STATIC DOCUMENT-BASED METHODS ONLY *) Autonomy 2008 **) InfoWatch 2009

Protection is required for all major risk vectors Removable Devices Leaks: USB/Flash disks/cards Printers Bluetooth, WiFi CD/DVD Company Perimeter: Corporate Network Office Space Mobile Computers Removable Devices Network Leaks: Web Mail Instant Messages Network Printing Portable Storage: Loss Theft

INTERCEPTION ANALYSIS DECISION- MAKING STORING Agents on workstations Universal traffic interceptors Server plug-ins Formal attributes Linguistics Fingerprints Tags Allow Block Process further In file system In DB (+ full-text search)

All modern DLP-systems allow to: Control network traffic Control network printing Control the connection of external devices to work-station Integrate with encryption tools Not all modern DLP-systems allow to: Effectively protect both static and dynamic data Analyze the details of incidents and investigate

Technology Stop-words and regular expressions Features and advantages Detection of leaks of information formed by a certain pattern, for example credit cards numbers, passports numbers, SSN, bank accounts, etc. Linguistic and context analysis Digital fingerprinting and watermarks Proactive protection of confidential data right after its creation (works with dynamic data, new or changed documents) Protection of rarely changing data, which was preliminary found and indexed (works well to protect static data, for example, protection of author s rights on media-content or initial codes)

Digital Fingerprinting Hybrid Analysis Digital Watermarks Regular expressions Dictionaries Linguistic Analysis Context Analysis Hybrid analysis is more efficient thanks to merging of several different technologies Stop words

Interceptors number and quality Controlled channels Ability to block suspicious objects Analysis methods Analyzed formats Encryption detection Classification method: probabilistic (linguistics and/or hash), deterministic (tags and/or attributes) Ability to collect evidence for investigation Including full-text search

The money is allocated from other budget item They are required by regulations and standards Every company has experienced a security incident Information security is overbudgeted + F.U.D. The projects are continuously growing

Many related services except installing and configuring Audit and change of data storage and circulation methods Audit and change of juridical base High resource intensity Several servers + DBs + a system for archiving and storing Related products: URL-filters, anti-spam, print-servers, etc. The majority of the projects are first implemented Nothing to compare The project may not be successful and this will not affect anyone Low-competitive market Several market players with different technologies It is easy to bookmark the product technical specification

Thank you for attention! Your questions are most welcome. Learn more : www.infowatch.com E-mail us : info@infowatch.com and georgedo@inttrust.gr