McAfee Data Protection Solutions



Similar documents
A Buyer's Guide to Data Loss Protection Solutions

Data Protection McAfee s Endpoint and Network Data Loss Prevention

Kelvin Wee CISA, CISM, CISSP Principal Consultant (DLP Specialist) Asia Pacific and Japan

McAfee Data Loss Prevention 9.3.0

CA Technologies Data Protection

RSA SIEM and DLP Infrastructure and Information Monitoring in One Solution

Practical DLP Deployment

A Websense Research Brief Prevent Data Loss and Comply with Payment Card Industry Data Security Standards

RSA Data Loss Prevention (DLP) Understand business risk and mitigate it effectively

RSA Solution Brief RSA. Data Loss. Uncover your risk, establish control. RSA. Key Manager. RSA Solution Brief

THE EXECUTIVE GUIDE TO DATA LOSS PREVENTION. Technology Overview, Business Justification, and Resource Requirements

IBM Data Security Services for endpoint data protection endpoint data loss prevention solution

Symantec DLP Overview. Jonathan Jesse ITS Partners

Securing SharePoint 101. Rob Rachwald Imperva

Strategies and Best Practices to Implement a Successful Data Loss Prevention Program Sebastian Brenner, CISSP

McAfee Network Data Loss Prevention Administration Intel Security Education Services Administration Course

Information Risk Management. Alvin Ow Director, Technology Consulting Asia Pacific & Japan RSA, The Security Division of EMC

Information & Asset Protection with SIEM and DLP

Building a Security Program that Protects an Organizations Most Critical Assets

Compliance and Security Solutions

Product Guide Revision A. McAfee Total Protection for Data Loss Prevention 9.2 Software

TRITON - Data Security Help

Understanding and Selecting a DLP Solution. Rich Mogull Securosis

How To Secure A Database From A Leaky, Unsecured, And Unpatched Server

Data Protection Strategy Simon K. Carvalho

The Cloud App Visibility Blindspot

Data Classification Technical Assessment

IBM Data Security Services for endpoint data protection endpoint data loss prevention solution

Protecting Data-at-Rest with SecureZIP for DLP

DLP Quick Start

Comodo MyDLP Software Version 2.0. Administration Guide Guide Version Comodo Security Solutions 1255 Broad Street Clifton, NJ 07013

10 Building Blocks for Securing File Data

BUILDING A SECURITY PROGRAM THAT PROTECTS AN ORGANIZATION S MOST CRITICAL ASSETS

HiSoftware Policy Sheriff. SP HiSoftware Security Sheriff SP. Content-aware. Compliance and Security Solutions for. Microsoft SharePoint

CounterACT Plugin Configuration Guide for ForeScout Mobile Integration Module MaaS360 Version ForeScout Mobile

White paper. Five Key Considerations for Selecting a Data Loss Prevention Solution

Enforcive / Enterprise Security

Data Security What are you waiting for? Lior Arbel General Manager Europe Performanta

Websense Data Security Solutions

with Managing RSA the Lifecycle of Key Manager RSA Streamlining Security Operations Data Loss Prevention Solutions RSA Solution Brief

Enterprise Security Solutions

Rule 4-004M Payment Card Industry (PCI) Monitoring, Logging and Audit (proposed)

Websense Data Security Suite and Cyber-Ark Inter-Business Vault. The Power of Integration

White Paper. Managing Risk to Sensitive Data with SecureSphere

Securely Yours LLC IT Hot Topics. Sajay Rai, CPA, CISSP, CISM

Data Loss Prevention. Keeping sensitive data out of the wrong hands*

Netwrix Auditor for Exchange

SANS Top 20 Critical Controls for Effective Cyber Defense

McAfee Host Data Loss Prevention Administration Intel Security Education Services Administration Course

McAfee Data Loss Prevention Endpoint

How To Manage Security On A Networked Computer System

Government of Canada Managed Security Service (GCMSS) Annex A-6: Statement of Work - Data Loss Prevention (DLP)

Analyzing Network Servers. Disk Space Utilization Analysis. DiskBoss - Data Management Solution

Raytheon Oakley Systems

Introduction to Network Discovery and Identity

Presentation to CSBS 10-Nov-10

Vistara Lifecycle Management

What We Do: Simplify Enterprise Mobility

DLP Vendors 8/8/2011. Data Loss Prevention: What We ve Learned from WikiLeaks TECH 15. A Few Good Questions

More Expenses. Only this time the Telegraph will have to pay them after their recent data breech

Ensuring Security and Compliance of Your EMC Documentum Enterprise Content Management System: A Collaborative Effort of EMC Documentum and RSA

Using Data Loss Prevention for Financial Institutions Banks, Credit Unions, Payments

TRITON - Data Security Help

Five Tips to Ensure Data Loss Prevention Success

10 Things IT Should be Doing (But Isn t)

Empowering Your Business in the Cloud Without Compromising Security

Deployment Guide. Websense TRITON AP-DATA Gateway and Discover. v8.0.x

Identifying Broken Business Processes

Enterprise IT is complex. Today, IT infrastructure spans the physical, the virtual and applications, and crosses public, private and hybrid clouds.

NetCrunch 6. AdRem. Network Monitoring Server. Document. Monitor. Manage

Selecting Your Essential Cloud Services

Grayteq DLP Data. Loss. Prevention.

Netwrix Auditor. Administrator's Guide. Version: /30/2015

McAfee Data Loss Prevention Endpoint

McAfee Web Gateway Administration Intel Security Education Services Administration Course Training

Information Technology Solutions

DJIGZO ENCRYPTION. Djigzo white paper

Application Discovery Manager User s Guide vcenter Application Discovery Manager 6.2.1

CimTrak Technical Summary. DETECT All changes across your IT environment. NOTIFY Receive instant notification that a change has occurred

How To Manage Sourcefire From A Command Console

Symantec Enterprise Vault.cloud Overview

DLP Content Discovery: Best Practices for Stored Data Discovery and Protection

Mimecast Security

McAfee Endpoint Protection Products

Securing Content Management Systems

Mimecast Large File Send

The Impact of HIPAA and HITECH

Analyzing HTTP/HTTPS Traffic Logs

Enterprise Mobility Management Migration Migrating from Legacy EMM to an epo Managed EMM Environment. Paul Luetje Enterprise Solutions Architect

CIPHERMAIL ENCRYPTION. CipherMail white paper

SECURE YOUR DATA EXCHANGE WITH SAFE-T BOX

: RSA 050-V60X-CSEDLPS. : CSE RSA Data Loss Prevention 6.0. Version : R6.1

WhatsUp Gold vs. Orion

Take Control of Identities & Data Loss. Vipul Kumra

MSP End User. Version 3.0. Technical Solution Guide

Configuration Information

ForeScout MDM Enterprise

McAfee Data Loss Prevention Endpoint 9.4.0

Identity and Access Management Integration with PowerBroker. Providing Complete Visibility and Auditing of Identities

Splunk Enterprise Log Management Role Supporting the ISO Framework EXECUTIVE BRIEF

Transcription:

McAfee Data Protection Solutions Tamas Barna System Engineer CISSP, Security+ Eastern Europe

The Solution: McAfee Data Protection McAfee Data Loss Prevention Full control and absolute visibility over user behavior Data Loss Prevention Device Control McAfee Device Control Prevent unauthorized use of removable media devices McAfee Total Protection for Data Integrated technologies for a total data protection solution. Endpoint Encryption Encrypted USB McAfee Endpoint Encryption Full-disk, mobile device, and file and folder encryption coupled with strong authentication McAfee Encrypted USB Secure, portable external storage devices 2

Data types, risk areas, and DLP approach Data types Risk areas DLP approach IN MOTION (DIM) Email (int+ext) Webmail, blogs, etc. IM/chat File sharing Encrypted content Network DATA IN USE (DIU) USB sticks CDs/DVDs ipods External hard drives Printouts Endpoint AT REST (DAR) Desktops Databases/ repositories Mail archives File shares Document management systems Discovery 3

Data Loss Prevention Workflow Step 1: TAG Identify and classify confidential data Step 4: Monitor & Refine Monitor alerts, tune policies and rules, revise data handling guidelines DATA Step 2: REACT Create reaction rules or how need to react the agent in face of actions based on Tagging information in previous step Step 3: Deploy Deploy the policy with a couple clicks in epo 4

Tagging/Classification Methods Content Based Application Based Location Based Manual Tags are Named 5

Content Based Tagging/Classification Classify data according to: Regular Expressions e.g., Social Security number Credit Card Number Keywords e.g., Financial terms Patients discharge terms Thresholds may apply e.g., Classify as sensitive if more then 10 credit card numbers appear in the document 6

Application Based Tagging Classify data according to application that created it Most common usage: Files that are not text based e.g., Graphic design, Game authoring 7

Location Based Tagging Classify data according to its origin Tag files as they are being copied form a network share e.g., tag all files tagged from the finance network share Tagging can be narrowed by: File type File extension File contents (as in Content classification) 8

Reaction Rules Enforcing DLP policy Rules are per leakage channel Possible reactions: Block Monitor Notify User Store Evidence Can be applied to Online/Offline user state 9

Reaction Rules Types Email Prevent tagged data from leaking through emails Recipient granularity Removable Storage Prevent tagged data from being copied to removable storage e.g. USB keys, ipod, etc. Printing Prevent tagged content from being printed Printer granularity 10

Reaction Rules Types cont. Web post Prevent tagged content from being posted to websites e.g. Block posting to non company websites Network Connections Block network connectivity to applications which access tagged data e.g. IM/P2P May be used to restrict network usage to specific applications (e.g. IE) Network Share Monitor tagged data which is copied to network shares 11

Additional Features Privileged users Block reaction is converted to monitor only Bypass Help desk generate bypass key for DLP override Generated for limited time only 12

Technology Integrations - epo Events reported via CMA No Event Collector required epo SQL used No additional database epo reporting Using epo reporting mechanism No need for SQL reporting services installation epo Notifications mechanism integration Email, SNMP trap, external command 13

Technology Integrations Endpoint Encryption Encrypt on demand When copying to: Removable storage Network Shares Block unless encrypted Email/Webpost McAfee Encrypted devices predefined Requires McAfee Endpoint Encryption 14

Classification New Terminology Tagging Rules Creates physical tag on files ( Sticky Tag ) Location/Application based tagging Classification Rules Creates Categories Content based Regular expression Dictionaries Registered Documents Non- Sticky Tags and Categories are defined and used interchangeably 15

Classification Regular Expression Validators Adding algorithms for validating regular expression Reducing false-positives 16

Classification Dictionaries Dictionary is a list of phrases associated with a common subject e.g.: Bank transfer terms Patient discharge terms Weight can assigned to each phrase (including negative weight) Threshold is defined per dictionary Phrases occurrences can be counted as unique or multiple Dictionaries can be imported 17

Classification Registered Documents Registered document enable to protect sensitive files no matter how they reached the endpoint Several repositories of Registered Documents can be defined e.g.: Per department Scheduled runs of Host DLP management creates fingerprints (indexes) database of the files Fingerprints database incrementally transferred to the endpoints Registered documents are Category classified Endpoints can protect against leakage of content derived from registered documents 18

Discovery Rules Crawl local drives looking sensitive data-at-rest Each Discovery rule can be configured to: File Type/Extension Tag/Category File Creation/Modification Date User Group Reactions Encrypt (Using Endpoint Encryption) Monitor Quarantine (Locally, AES encrypted) Store Evidence Delete (Advanced Configuration) Discovery can open Endpoint Encryption encrypted files 19

Discovery Global Settings Discovery process can be restricted to CPU/Memory consumption Included/Excluded Directories Flexible Scheduling 20

Enforcement Business Justification Education/Cooperative Enforcement The user can bypass blocking in case justification is provided, or cancel the operation Configurable justifications (Including free text) 21

Fear of the Unknown Creates Data Anxiety Lost laptops Solved problems Lost USB devices Employee education Device Control Unmet needs Where is the information? What information needs protection? How do I get effective protection in place in a timely manner? Who should have access? How do I automate processes to reduce audit costs? Current solutions do not solve this problem 22

Pre-Game Warm Up Manager Monitor Prevent Discover 23 Risk and Compliance Sales Accreditation Presentation

What Makes Us Unique? Most DLP products require you to KNOW what you should protect But how do you deal with what you DO NOT KNOW how to find? Intellectual property Product/marketing plans Forecasts Financial records Legal discovery McAfee s LEARNING capabilities are what enable adaptive protection Google s value is in indexing the internet Reconnex s Google-like learning focuses on corporate information inmotion, at-rest Learning mines knowledge of content and its use, tunes protection WHAT I KNOW Create Rules for: HIPAA SSN CNN The Value of Google: Indexes the internet When you query, it teaches you where the most relevant information is WHAT I DON T KNOW Marketing? Plans? Product Plans?? WHAT IS LEARNING? Create Rules for: Sales Forecast Inventory Turn Reports? The Value of McAfee: 1. Indexes and classifies all content within or leaving an organization 2. Capture Index is required to: Improve Rule Accuracy, Perform Investigations, and To Define What CONTENT To Protect FROM WHOM 24

The McAfee Difference: Capture All Leakage! Egress out Legacy vendors PCI HIPAA Appropriate Use Trigger Words Other Policies McAfee Google-like search capabilities User-defined wiping schedule Takes the pressure off of policy tuning FRCP compliant Trash bin Violations DB All Matches Capture DB False negatives destroyed Can t LEARN and adjust policies Assumes know what to protect Pre-set policies Dashboard reports Distributed notification of violations and reports Everything captured Information gap solved Able to LEARN from the past 25

Knowledge Mining: The Key to Learning Capture and index all content in-motion and at-rest Identify sensitive data Investigate activity Tune rules Search for confidential Who sent it out, and to where? Where is it stored on my network? 26

Data-in-Motion: Monitor and Capture Mail Transfer Agent (MTA) Detect Anomalies in Network Traffic 2 Investigate All User Activity 1 FTP Servers, Extranet Sales Research Monitor Off-shore 3 View Risk Reports Modify Rules to Remove False-Positives 4 False-Positive 27

Data-at-Rest: Discovery and Classification Discover Intellectual Property in repositories using learning applications 1 Windows, UNIX, Linux, Mac, Novell (CIFS, NFS) Wikis, Blogs, SharePoint (HTTP/HTTPS) FTP, Documentum FTP Servers, Extranet 3 Detect proliferation at file servers, desktops, laptops, portals, blogs, and wikis Discover Sales Register IP signatures and arm for detection 2 Research Endpoint 4 Provide signatures to other McAfee Network DLP for protection at each vector Monitor Off-shore 5 Detect transmission of IP in any form 28

Data-in-Motion: Prevent Violations Identify Confidential Information in Motion (IP, Sales Info, Financial Data) 1 Mail Transfer Agent (MTA) Action SMTP FTP Servers, Extranet Sales Identify Violations to Acceptable Use Policy 2 3 Block, Quarantine, Encrypt, Return to Sender on any Policy Violation within Email Prevent ICAP Monitor! Proxy Research Off-shore Block any Policy Violation over Webmail, HTTP Post 4 5 Send Syslog, Email to Admin, Email Sender, Email Manager 29

Centralized Management Centralized system management Unified policies and rules Streamlined incident workflow Unified and flexible reports Device configuration and management Powerful case management Aggregation of common incidents Transfer of ownership and remediation Roles-based access and permissions Centralized data mining, search, and analytics Search historical data quickly Find sensitive data and how it is used Tune rules quickly, validate on-the-fly Perform user investigations 30 CEUR SE&C NDLP Training

Unified Rules and Policies Unified policies for protection Single interface for DiM, DaR rules Unified construction limits sprawl Powerful default rules and policies Compliance Acceptable Use Intellectual Property Protection 20+ policies and 150+ rules default False positive workflow Simple rule tuning from incident detail Incident data to create exceptions Complements learning applications Document registration Increase accuracy of rules Explicit protection for sensitive data Scalable registration: Discover crawler 31 CEUR SE&C NDLP Training

Simplified Incident Management Flexible incident visualization Incident listing, grouping, summary 40+ built-in views Configurable, schedulable reports Automatic incident assignment Incidents automatically assigned Presented to users in home page Dynamic filtering and grouping Create specific views for later use Focus view to areas of interest False positive workflow Streamline rule adjustments Transfer parameters to rule exception 32 CEUR SE&C NDLP Training

Integrated Case Management Centralized case management system and workflow Correlate incidents Assign owners and priority Remediate Case audit trail Automatic notifications Notes for collaboration Case history Collaborative approach Leverage roles based access control Facilitate interaction of stakeholders Adjust broken business process Correct user behavior Case export Full HTML export of case, incidents Includes associated files, context 33 CEUR SE&C NDLP Training

McAfee Network DLP Integration With epo Data-in-Motion Incident Status (by Severity) Data-at-Rest Top Shares Host DLP Data-in-Motion Top Policies Data-at-Rest Top Policies System Health and Monitoring 34

[HDLP PRODUCT DEMO] 35