The Network Alone Can t Protect Your Data

Similar documents
Dell Bring Your Own Device

Data Security and Healthcare

Managing Remote and Mobile Workers Adam Licata, Enterprise Mobility SE, TSO Brian Sheedy, Sr. Principal TEC, Endpoint Management

Protect Your Mobile World

Introduction to Cyber Security / Information Security

Mobile Security: The good, the bad, the way forward

RFI Template for Enterprise MDM Solutions

APAC OF POSSIBILITIES: TIPS FOR INCREASING CLOUD SECURITY AND ADOPTION

The Holistic Guide to BYOD in Your Business Jazib Frahim

Mobile Device Management in the Systems Management Ecosystem. Katie Wiederholt, Dell Software

Mobile Protection. Driving Productivity Without Compromising Protection. Brian Duckering. Mobile Trend Marketing

W M U G NL. WMUG Meeting #2 - Deployment MOBILE APPLICATION DEPLOYMENT

Total Enterprise Mobility

Protect Breakout: Connected Security for a Connected World

Your New Cloud Storage Business. Three solutions that will impact your organization

The Cloud App Visibility Blind Spot

TMW01 Managing and Deploying BYOD Identity Solutions with a Microsoft PKI

Network Security Solution. Arktos Lam

10 best practice suggestions for common smartphone threats

Fundamentals of Secure Collaboration in the Mobile Workforce. Sinisha Patkovic

Orchestrated Security Network. Automated, Event Driven Network Security. Ralph Wanders Consulting Systems Engineer

Office 365 Cloud App Security MARKO DJORDJEVIC CLOUD BUSINESS LEAD EE TREND MICRO EMEA LTD.

Honeywell Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Honeywell Process Solutions (HPS) June 4, 2014

Replacing Microsoft Forefront Threat Management Gateway with F5 BIG-IP. Dennis de Leest Sr. Systems Engineer Netherlands

Securing Office 365 with MobileIron

Cisco Secure BYOD Solution

ARCHITECT S GUIDE: Mobile Security Using TNC Technology

Securing Dispersed Networks

Choosing a File Sync & Share Solution. PRESENTATION TITLE GOES HERE Darryl Pace Optimal Computer Solutions

Dell World Software User Forum 2013

6 Things To Think About Before Implementing BYOD

TRITON AP-ENDPOINT STOP ADVANCED THREATS AND SECURE SENSITIVE DATA FOR ROAMING USERS

For your eyes only - Encryption and DLP Erkko Skantz

Embracing Complete BYOD Security with MDM and NAC

ONE DEVICE TO RULE THEM ALL! AUDITING MOBILE DEVICES / BYOD NSAA IT CONFERENCE OCTOBER 2, 2014

Secure Access into Industrial Automation and Control Systems Industry Best Practice and Trends. Serhii Konovalov Venkat Pothamsetty Cisco

Rashmi Knowles Chief Security Architect EMEA

The Cloud App Visibility Blindspot

Cloud, security and the mobile enterprise: An end-to-end manageability challenge

Andrej Zdravkovic Regional Vice President, Platform Solutions Intellinet

Cloud Access Security Broker. Ted Hendriks HP Atalla Pre-Sales Consultant, APJ Region HP Enterprise Security Products

Readiness Assessments: Vital to Secure Mobility

Mobile, Cloud, Advanced Threats: A Unified Approach to Security

Security and Privacy Considerations for BYOD

While you are waiting for our webinar to begin, you might be interested in the downloads on the Attachment tab:

Empowering Your Business in the Cloud Without Compromising Security

The Secure Web Access Solution Includes:

Oracle Mobile Security Suite. René Klomp 6 mei 2014

How To Support Bring Your Own Device (Byod)

Cyber Security. John Leek Chief Strategist

How APIs Turned Cloud on Security on Its Head

Cybersecurity: An Innovative Approach to Advanced Persistent Threats

ONOS [Open Source SDN Network Operating System for Service Provider networks]

trends and audit considerations

micros MICROS Systems, Inc. Enterprise Information Security Policy (MEIP) August, 2013 Revision 8.0 MICROS Systems, Inc. Version 8.

IBM s Mobile Enterprise Strategy IBM Corporation

- DLP Des nuages. à la terre ferme

Time to Value: Successful Cloud Software Implementation

Mobile App Management:

Thank you for joining us today! The presentation will begin shortly. Thank you for your patience.

SECURE YOUR DATA EXCHANGE WITH SAFE-T BOX

OUTSIDE-IN Transforming Enterprise IT

Solving data residency and privacy compliance challenges Delivering business agility, regulatory compliance and risk reduction

SURVEY RESULTS CYBER-SECURITY PRACTICES OF MINNESOTA REGISTERD INVESTMENT ADVISERS

Mobile App Containers: Product Or Feature?

Cloud Vendor Evaluation

Information & Asset Protection with SIEM and DLP

Protect your internal users on the Internet with Secure Web Gateway. Richard Bible EMEA Security Solution Architect

Complex solutions aren t solutions. We make security for the real world for the pragmatic enterprise. Simple security is better security.

Optimizing the Mobile Cloud Era Through Agility and Automation

ADDING NETWORK INTELLIGENCE TO VULNERABILITY MANAGEMENT

MobileIron. Hendrik Van De Velde Exclusive Mobile Eco-system

Klickstart Business Solutions & Services

Wi-Fi Security. More Control, Less Complexity. Private Pre-Shared Key

Addressing BYOD Challenges with ForeScout and Motorola Solutions

A POLYCOM WHITEPAPER Polycom. Recommended Best Security Practices for Unified Communications

Secure your cloud applications by building solid foundations with enterprise (security ) architecture

Securely Yours LLC IT Hot Topics. Sajay Rai, CPA, CISSP, CISM

Data Loss Prevention: A Holistic Approach. Sam D Amore, Principal Information Technology Security Office The Vanguard Group (

Encrypting Business Files in the Cloud

Top. Reasons Federal Government Agencies Select kiteworks by Accellion

SECURE, ENTERPRISE FILE SYNC AND SHARE WITH EMC SYNCPLICITY UTILIZING EMC ISILON, EMC ATMOS, AND EMC VNX

Mobile & Security? Brice Mees Security Services Operations Manager

REVOLUTIONIZING ADVANCED THREAT PROTECTION

Blending Embedded Hardware OTP, SSO, and Out of Band Auth for Secure Cloud Access

BYOD(evice) without BYOI(nsecurity)

Cyber Exploits: Improving Defenses Against Penetration Attempts

IT Game Changers: How Cloud, Mobile, Social and Big Data are Redefining Your IT Environment

Mobilizing Change: The Development of Medtronic s Global Security Program

Securing Healthcare Data on Mobile Devices

Sophos Acquires Cyberoam

A Guide to MAM and Planning for BYOD Security in the Enterprise

Securing and Auditing Cloud Computing. Jason Alexander Chief Information Security Officer

BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: Security Note

Leveraging Machine Data to Deliver New Insights for Business Analytics

Critical Controls for Cyber Security.

Key Security Questions to Ask a Financial Data Aggregation Provider Is the data aggregation partner you re considering following the best practices

TRITON APX. Websense TRITON APX

Logging In: Auditing Cybersecurity in an Unsecure World

Transcription:

The Network Alone Can t Protect Your Data SESSION ID: STU-T07B Elliot Lewis Chief Security Architect Dell / Dell Software Group @elliotdlewis Chad Skipper Senior Principal Engineer Dell / End User Computing @chadskipper

Agenda 1 The Data Journey 2 Powerful Disrupters: Data is More Connected 3 The Network Alone Can t Protect Your Data 4 Data Access Risk Models 5 Data Protection Reference Architecture

The Data Journey From mainframe to client server to distributed to risk everywhere 3

Powerful Disrupters: Data is More Connected Cloud 85% Use cloud tools Big Data 35 Zettabytes by 2020 Mobility Security & Risk 5X 79% Increase in personal owned devices Experienced significant security incident

Two Kinds of Protection Headquarters In the field 5

The Network Alone Can t Protect Your Data Headquarters In the field Corporate infrastructure DMZ In the wild Partners Supply chain Trusted customers BYOx clients Corporatemanaged clients Internet storage DropBox, PocketCloud, Skydrive, Google BYOx clients VPN SaaS cloud How does one prepare data for external protection? 6

Inherent risk of data loss Corp net External net Data Risk Models Managed Corporate asset Corp container External network Corporate asset Corp container Semi trusted (VPN/VDI/App) Corporate asset Corp image & container Corporate network Strong control Data access Unmanaged Personal asset Native (Raw) OS external network Personal asset container Semi trusted (VPN/VDI/App) Personal asset Corp Container Corp network Weak control Corp Net External net Managed BYOx SaaS Corporate network Strong control Data location Unmanaged In the wild Internet storage Corporate ecosystem Weak control Mitigation control weakness

Contextual Access Assessment Device, location and access method Identification processing Who should be allowed to start the assessment process? Endpoint platform assessment What kind of device are they on? What OS type? Managed/unmanaged? Connection allowance assessment What connectivity do they have? Corporate or public network? Wireless or wired?

Data Access Policy & Identity Verification Process Who, proof, authorization and RSOP Data classification access assessment Assessment proceed based on data classification? Identity verification If sensitive is 2F verification required? Policy selection Which policy best applies to access parameters? Resultant Set of Policy Resolution (RSOP) Which policy takes precedence? Policy conflict resolution Which policy should take effect in a conflict?

Enforcement Controls Location, what device, access method & data integrity Multiple enforcement mitigations from which to choose: Firewall DLP AV/AM Network segmentation Sandboxing Containerization VPN Virtualization Secure browser

Encryption Processing Encrypt, decrypt, key management Encryption state assessment Key management Platform assessment Decryption processing Encryption processing Key storage Process closure

Data Risk Assessment Process Identification processing Endpoint platform assessment Connection allowance assessment Data classification access assessment 2F Identity verification Policy selection Resultant Set of Policy Resolution (RSOP) Policy conflict resolution Firewall DLP AV/AM Network segmentation Sandboxing Containerization VPN Virtualization Secure browser Encryption processing Key management Platform assessment Decryption processing Encryption processing Key storage Process closure Intelligence management Audit/compliance Mitigation selection, activation & monitoring Ongoing monitoring & policy adherence Data integrity monitoring Session monitoring & closure control

Data Protection Reference Architecture Crowd sourcing Common threats Open source intelligence Government / private intelligence Security-as-a- Service providers Regulatory & compliance controls Risk Analysis Fabric External interfaces & intelligence Public APIs Data access request Contextual access Identity verification Data access policy Enforced controls Encryption processing Intelligence mgmt Access result Device Identity Access Enforcement Access result Managed laptop BYOD container Unmanaged BYOD Employee Contractor Customer Full access Read access View access Firewall VPN Virtual Data downloaded Container access Data streaming

14 Thank You