For your eyes only - Encryption and DLP Erkko Skantz



Similar documents
Symantec DLP Overview. Jonathan Jesse ITS Partners

White Paper: Whole Disk Encryption

How Endpoint Encryption Works

PGP Whole Disk Encryption Training

Kaspersky Lab s Full Disk Encryption Technology

Securing Corporate Data and Making Life Easier for the IT Admin Benefits of Pre Boot Network Authentication Technology

Secure Your Mobile Workplace

Sample Data Security Policies

INFORMATION PROTECTION

How Drive Encryption Works

Data Protection McAfee s Endpoint and Network Data Loss Prevention

Chief Security Strategist Symantec Public Sector

Symantec to Acquire PGP Corporation and GuardianEdge Technolgies, Inc. April 29, 2010

Using End User Device Encryption to Protect Sensitive Information

SecureD Technical Overview

IBM Data Security Services for endpoint data protection endpoint encryption solution

DISCOVER, MONITOR AND PROTECT YOUR SENSITIVE INFORMATION Symantec Data Loss Prevention. symantec.com

PGP Product Update Juha Ropponen

More Expenses. Only this time the Telegraph will have to pay them after their recent data breech

Five Tips to Ensure Data Loss Prevention Success

Cloud Backup and Recovery for Endpoint Devices

A Websense Research Brief Prevent Data Loss and Comply with Payment Card Industry Data Security Standards

NetIQ Advanced Authentication Framework. Maintenance Guide. Version 5.1.0

Deciphering the Safe Harbor on Breach Notification: The Data Encryption Story

How-To Guide: Cyber Security. Content Provided by

The Impact of HIPAA and HITECH

Going Beyond Basic Full Disk Encryption: Are You Really Covered? A PGP Corporation White Paper

Enterprise Data Protection

Symantec Endpoint Encryption Deployment Best Practices and Roadmap

Windows Symantec Encryption Desktop (PGP) Install Guide. Symantec Encryption Desktop (PGP) Windows system requirements

Symantec PGP Whole Disk Encryption Hands-On Lab V 3.7

EXAM - ST Symantec PGP Universal Server 3.2 Technical Assessment. Buy Full Product.

FileCloud Security FAQ

EXECUTIVE SUMMARY Cloud Backup for Endpoint Devices

McAfee Endpoint Encryption (SafeBoot) User Documentation

State of South Carolina Policy Guidance and Training

HIPAA Privacy and Information Security Management Briefing

Did you know your security solution can help with PCI compliance too?

INFORMATION PROTECTED

YOUR DATA UNDER SIEGE. DEFEND IT WITH ENCRYPTION.

Only 8% of corporate laptop data is actually backed up to corporate servers. Pixius Advantage Outsourcing Managed Services

On-Site Computer Solutions values these technologies as part of an overall security plan:

For Managing Central Deployment, Policy Management, Hot Revocation, Audit Facilities, and Safe Central Recovery.

Security Overview Enterprise-Class Secure Mobile File Sharing

Check Point and Security Best Practices. December 2013 Presented by David Rawle

SECURE YOUR DATA EXCHANGE WITH SAFE-T BOX

Bryan Hadzik Network Consulting Services, inc. Endpoint Security Data At Rest

Understanding Northwestern University s contract with Symantec. Symantec Solutions for Cost Reduction & Optimization

Security Management. Keeping the IT Security Administrator Busy

Data Managers Interest Group. Research. April 17, 2012

The True Story of Data-At-Rest Encryption & the Cloud

Disk Encryption. Aaron Howard IT Security Office

Preparing for a Cyber Attack PROTECT YOUR PEOPLE AND INFORMATION WITH SYMANTEC SECURITY SOLUTIONS

Top Five Ways to Protect Your Network. A MainNerve Whitepaper

ISO COMPLIANCE WITH OBSERVEIT

Five Truths. About Enterprise Data Protection THE BEST WAY TO SECURE YOUR DATA AND YOUR BUSINESS DEFENDING THE DATA CMYK

Symantec Endpoint Security Management Solutions Presentation and Demo for:

ACER ProShield. Table of Contents

NETWORK SECURITY GUIDELINES

Strategies and Best Practices to Implement a Successful Data Loss Prevention Program Sebastian Brenner, CISSP

2014 All Rights Reserved ecfirst. An ecfirst Case Study: Encryption

Computer Security at Columbia College. Barak Zahavy April 2010

Vs Encryption Suites

ZENworks 11 Support Pack 4 Full Disk Encryption Agent Reference. May 2016

Name: Position held: Company Name: Is your organisation ISO27001 accredited:

Note: To view the most recent version of this document, go to the Products section on the Symantec Corporation Web site.

Secure User Guide

A HELPING HAND TO PROTECT YOUR REPUTATION

micros MICROS Systems, Inc. Enterprise Information Security Policy (MEIP) August, 2013 Revision 8.0 MICROS Systems, Inc. Version 8.

State of Wisconsin DET File Transfer Protocol Service Offering Definition (FTP & SFTP)

Navigating Endpoint Encryption Technologies

Encryption Buyers Guide

Data Protection in 4 Hours

Securely Yours LLC IT Hot Topics. Sajay Rai, CPA, CISSP, CISM

SafeNet Data Encryption and Control. Securing data over its lifecycle, wherever it resides from the data center to endpoints and into the cloud

SafeNet Data Encryption and Control. Securing data over its lifecycle, wherever it resides from the data center to endpoints and into the cloud

SafeGuard Enterprise User help. Product version: 7

Chapter 1 Scenario 1: Acme Corporation

Supplier Information Security Addendum for GE Restricted Data

Global security intelligence. YoUR DAtA UnDeR siege: DeFenD it with encryption. #enterprisesec kaspersky.com/enterprise

Your is outsourced to the Cloud and Mobile, Are You protecting it with Encryption? Wolf Schreiner

Endpoint data protection solutions for Healthcare

Devising a Server Protection Strategy with Trend Micro

How to Encrypt your Windows 7 SDS Machine with Bitlocker

DATA BREACH RISK INTELLIGENCE FOR HIGHER ED. Financial prioritization of data breach risk in the language of the C-suite

Honeywell Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Honeywell Process Solutions (HPS) June 4, 2014

Security Architecture Whitepaper

A Buyer's Guide to Data Loss Protection Solutions

SafeGuard Enterprise User help. Product version: 6.1

Protecting Data at Rest What to Consider When Selecting a Solution for Disk, Removable Media, and File Encryption

Protecting Data-at-Rest with SecureZIP for DLP

Data Security Best Practices & Reasonable Methods

Managing BitLocker Encryption

Office 365 Windows Intune Administration Guide

White Paper. Anywhere, Any Device File Access with IT in Control. Enterprise File Serving 2.0

2012 NCSA / Symantec. National Small Business Study

Symantec Encryption Solutions for , Powered by PGP Technology

End-to-end data protection solutions

Using Data Loss Prevention for Financial Institutions Banks, Credit Unions, Payments

Information Security It s Everyone s Responsibility

Transcription:

For your eyes only - Encryption and DLP Erkko Skantz Symantec Finland 1

USER PRODUCTIVITY INFORMATION MANAGEMENT DATA CENTER SECURITY 2

Focus on information 3

Today's System-Centric Enterprise Data Center Field Offices Point of Sale Field Headquarters 4

Today's System-Centric Enterprise Data Center Field Offices Point of Sale 1 in 10 people have lost a laptop, smart phone, or USB drive with corporate information on it 12,000 Headquarters Laptops lost in United States airports every week Field 5

Today's System-Centric Enterprise Data Center Field Offices 1/2 of corporate data resides on mobile devices Point of Sale Field Headquarters 6

Information is the most important asset you have Data Center Field Offices Point of Sale Field Headquarters 7

Where to get started? Where to implement encryption and DLP? 8

Recovey point- and time objective How much data can I afford to lose? How long does it take to get my system up again? CRASH 24 Hours 1 Hour 1/2 Hour 1 Hour Last backup taken Impact of data loss? System up again 9

The Mistakes that Companies Often Make Disk Encryption Find tactical solution Create keys Deploy infrastructure USB Encryption Find tactical solution Create keys Deploy infrastructure Mobile Encryption Find tactical solution Create keys Deploy infrastructure 10

Pay attention 11

Encryption is Easy 1) Take a document 2) Create a key and encrypt the document / file / disk Most customers think they are buying an encryption application. Don t make this mistake. Ask for management platform for encryption. 12

Administration can be difficult 1) Encryption management is UNLIKE any other administrative responsibility 2) Normally, administrative responsibilities end when the user leaves / quits 3) You must manage an encryption key for as long as there is encrypted data! 13

Suggested roadmap FTP, batch, backup transfer File/folder/shared server encryption Smartphone solutions Encryption Management Server Full disk encryption Device and media encryption End-2-end email encryption Gateway email encryption 14

Full disk encryption, the easy way 15

Symantec Full Disk Encryption Encrypts desktops, laptops, and USB drives Protects against Personal computer loss / theft / compromise / improper disposal Reduces risk of data loss Protects against reputation damage Enables business continuity without disrupting user productivity Demonstrates compliance to regulatory standards Common Criteria Evaluation Assurance Level 4+ (EAL4+) certification 16

Symantec Full Disk Encryption Deployment Clients Encryption Management Server LDAP Software Deployment Tool Flexible.MSI and.pkg formats Support for SMS, Zenworks, Altiris, AD GPO Deploy to: Windows, (including Windows Server), Windows 8 (BIOS and UEFI), Mac OS X, Ubuntu, and Red Hat clients 17

Full Disk Encryption How It Works Step 1 Step 2 Step 3 Step 4 Step 5 Step 6 Policy and Provisioning Initial Encryption Pre-Boot Environment Authentication Compliance Helpdesk Administrators configure policy on Symantec Encryption Management Server Deploy installation package(s) to Windows (or Mac OS X/Linux) laptops/desktops Install Symantec Drive Encryption client System is encrypted, blockby-block User is presented with modified preboot environment on reboot (or resume from hibernation) User logs in using passphrase or smart card Administrator views logs and reports on Symantec Encryption Management Server Forgotten passwords Unavailable employee Machine recovery 18

It is about the information Symantec Drive Encryption Situation Bag (+computer) lost at the airport or stolen from the car. Product & Solution Symantec Drive Encryption: Encrypt all laptops and desktops. Result The laptop was encrypted and the data was inaccessible by unauthorized users. Because the data was encrypted, the company did not have to report the breach. The company did not suffer a public blackeye. 19

It is about the information THEME: Cloud Storage Situation Employees are storing confidential documents in the cloud. They are doing this for collaboration purposes. Product & Solution Symantec File Share Encryption: Encrypt data on internal file shares and data on cloud storage lockers. Result All data being stored in the cloud is encrypted prior to being sync d into the cloud. Data is secure from 3rd party cloud companies as well as from compromise of account information to the cloud. 20

It is about the information THEME: Email Situation Email administrators are reading the email of the Executive staff Product & Solution Symantec Desktop Email Encryption: Encrypt and decrypt emails at the desktop level before leaving the desktop to the mail servers. Result Emails are secured on the desktop. Email admins can still access the emails on the mail server, but cannot read them because they are encrypted. Backups of the emails remain encrypted and secured. 21

Information encrypted Objectives Tasks Products Keep data secure Meet compliance objective Protect the business Control costs and liabilities Protect data at rest Product data in motion Protect in use MANAGEMENT ENDPOINT ENCRYPTION FILE AND SERVER ENCRYPTION EMAIL ENCRYPTION 22

Complete Encryption Platform Full Disk Encryption (FDE) Device and Media Encryption FTP/Batch and Backups File/Folder/Shared Server Encryption End-End Email Gateway Email Encryption Management Central Management of Encryption Applications Symantec Encryption Management Server Key Management PGP Key Management Server (KMS) Smartphone Solutions 23

The alternative option for encrypting everything 24

Where is your confidential data? How is it being used? How best to prevent its loss? DISCOVER MONITOR PROTECT 25

How Symantec DLP Works DATA LOSS POLICY DETECTION RESPONSE Content Context Action Notification Credit Cards SSNs Intellectual Property Who? What? Where? Notify Justify Encrypt Prevent User Manager Security Escalate Find it. Fix it. 26

Symantec Data Loss Prevention 27

Symantec Data Loss Prevention Products STORAGE Network Discover ENDPOINT Endpoint Discover NETWORK Network Monitor Data Insight Network Protect Endpoint Prevent Mobile Email Monitor Mobile Prevent Network Prevent for Email Network Prevent for Web Management Platform Symantec Data Loss Prevention Enforce Platform 28

Symantec Data Loss Prevention Architecture Secured Corporate LAN DMZ STORAGE Network Discover - Data Insight - Network Protect MTA or Proxy MGMT PLATFORM Enforce NETWORK Network Monitor - Network Prevent Mobile Email Monitor Mobile Prevent ENDPOINT Endpoint Discover - Endpoint Prevent SPAN Port or Tap 29

Incidents Per Week Continuous Risk Reduction 1000 800 600 Visibility Remediation 400 200 0 Risk Reduction Over Time Competitive Trap Notification Prevention 30

Putting it all together 31

Defense in Depth: DLP and Encryption Gateway DLP: FIND Removable Storage ENCRYPTION: FIX File-Based 32

Thank you Questions? - erkko.skantz@symantec.com 33