Sophos / Utimaco Data Loss Prevention Peter Szendröi, SOPHOS Nordics Jan 20, 2010.

Slides:



Advertisements
Similar presentations
2  Industry trends and challenges  Windows Server 2012: Modern workstyle, enabled  Access from virtually anywhere, any device  Full Windows experience.
Advertisements

By HAIDER I MOHSIN Securing Confidential Data with Data Loss Prevention Systems.
COPYRIGHT © 2010 TECTIA CORPORATION. ALL RIGHTS RESERVED. Proactive Measures to Prevent Data Theft Securing, Auditing and Controlling remote.
1 The future of Data Protection David Chow. 2 3.
Securing Corporate & Documents Richard Elphick Titus Labs.
Persistent Protection Using E-DRM Technology Jason Fasoo 06/18/2008.
Mohan Atreya Sr. Product Manager RSA Corporation SIA311 Marcio Mello Sr. Program Manager Lead Microsoft Corporation.
DESIGNING A PUBLIC KEY INFRASTRUCTURE
Security Controls – What Works
Lisa Farmer, Cedo Vicente, Eric Ahlm
Delivering Information-centric Security Carol Clark Senior Manager, EMEA Market Development.
On Privacy-aware Information Lifecycle Management (ILM) in Enterprises: Setting the Context Marco Casassa Mont Hewlett-Packard.
Chapter 9 Information Systems Controls for System Reliability— Part 2: Confidentiality and Privacy Copyright © 2012 Pearson Education, Inc. publishing.
Brian Bradley.  Data is any type of stored digital information.  Security is about the protection of assets.  Prevention: measures taken to protect.
Mel Pless, Sr. Director, Solutions Consulting Guidance Software, Inc. Let’s Get Right To The Endpoint Leveraging Endpoint Data to Expose,
Customized solutions. Keep It Secure Contents  Protection objectives  Endpoint and server software  Protection.
Presented by Manager, MIS.  GRIDCo’s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to GRIDCo’s.
©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone Endpoint Security Current portfolio and looking forward October 2010.
Security Risk Management Marcus Murray, CISSP, MVP (Security) Senior Security Advisor, Truesec
Mobility Without Vulnerability: Secure and Enable Your Mobile Users, Apps, and Devices David Clapp – Intuitive.
IT-Partners Limited © 2011 IT Partners Limited Y OUR IT SOLUTION P ARTNERS Managing Director Confidential Data Loss Prevention Sunny Ho 1.
1 Managed Security. 2 Managed Security provides a comprehensive suite of security services to manage and protect your network assets –Managed Firewall.
©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone Visibility & Control – Identity, Application & Content Awareness.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
SecureAware Building an Information Security Management System.
[Name / Title] [Date] Effective Threat Protection Strategies.
Unify and Simplify: Security Management
Copyright © 2006 CyberRAVE LLC. All rights reserved. 1 Virtual Private Network Service Grid A Fixed-to-Mobile Secure Communications Framework Managed Security.
What Keeps You Awake at Night Compliance Corporate Governance Critical Infrastructure Are there regulatory risks? Do employees respect and adhere to internal.
Managing and Securing Endpoints Bruce Hotte Chief Information Officer Jeff Swan Network Supervisor  The definition of “endpoint” used to be simple: a.
Dell Connected Security Solutions Simplify & unify.
Group 2: Marco Hidalgo Wesley Lao Michelle Marquez-Lim
Asif Jinnah Microsoft IT – United Kingdom. Security Challenges in an ever changing landscape Evolution of Security Controls: Microsoft’s Secure Anywhere.
Keep Your Information Safe! Josh Heller Sr. Product Manager Microsoft Corporation SIA206.
Module 9 Configuring Messaging Policy and Compliance.
ISO17799 Maturity. Confidentiality Confidentiality relates to the protection of sensitive data from unauthorized use and distribution. Examples include:
Introduction to Barracuda IM Firewall. Two Security Products in One Public IM Management –Manages traffic from public IM clients, including AIM, Yahoo!
© 2009 WatchGuard Technologies WatchGuard Encryption Subscription Ensuring Privacy and Compliance of Messages.
The Changing World of Endpoint Protection
Module 9 Configuring Messaging Policy and Compliance.
Information Asset Classification Community of Practicerev. 10/24/2007 Information Asset Classification What it means to employees.
Module 7 Planning and Deploying Messaging Compliance.
© 2009 WatchGuard Technologies WatchGuard XCS Data Loss Prevention Ensuring Privacy & Security of Outbound Content.
B-I-C-T Security Strategy Introducing a new framework November 19, 2015 Aman Raheja
Engineering and Management of Secure Computer Networks School of Engineering © Steve Woodhead 2009 Corporate Governance and Information Security (InfoSec)
User and Device Management
What’s New Data Loss Prevention 14. Information is Everywhere Brings Productivity, Agility, Convenience ……and Problems Copyright © 2015 Symantec Corporation.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Keep Your Information Safe! Josh Heller Sr. Product Manager Microsoft Corporation SIA206.
Enterprise Mobility Suite: Simplify security, stay productive Protect data and empower workers Unsecured company data can cost millions in lost research,
Identity Awareness and Data Loss Prevention Effective DLP David Miller Sr. Director, Security Products October 15, 2009.
Secure Services Shared Hosted MS Exchange 2010.
Complete Cloud Security Anyone, anywhere, any app, any device.
Best-in-class enterprise backup for the mobile enterprise Prepared for [Insert customer name] [Date}
Introduction to Barracuda IM Firewall
Information Security Program
92% of the world’s data was created in the past 2 years
Securing the Network Perimeter with ISA 2004
Basic Policy Overview Palo Alto.
Prevent Costly Data Leaks from Microsoft Office 365
Threat Landscape for Data Security
DATA LOSS PREVENTION Mr. Collins Oduor.
By: Dorian Lockhart Wilston Johnston
4/9/ :42 PM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
Microsoft Data Insights Summit
Comodo Dome Data Protection
Security in SharePoint and Teams with DLP, IRM, and AIP
Presentation transcript:

Sophos / Utimaco Data Loss Prevention Peter Szendröi, SOPHOS Nordics Jan 20, 2010

Sophos, Simply Secure

Changing security landscape PCI-DSS HIPAA CSB 1386 GLBA 95/46/EC Contractors, outsourcing Partners, customers Web 2.0 Mobile workers Firewall Corporate data $ Customer data Intellectual property Personally identifiable information Targeted...targeting commercial data Complex threats.... Web-based, Invisible Fast changing Regulatory disclosure and reputation damage Digital generation set looseInformation theft – not graffiti

Headlines are the tip of the iceberg 5 Brand damage Loss of customers Incremental internal costs Direct costs of intellectual property loss

How is this data exposed? Insider theft accounts for only 5-15% of the data loss Most data breaches are accidental Only 2.4% were prevented by protective measures (e.g. encryption) 6

What data is at risk? 7 Process Work Knowledge Work Well-defined responsibilities Well-defined workflows Dealing with PII Risks: - Non-compliance - Criminal prosecution - Brand / reputation damage Changing roles / assignments Unstructured data Company information assets Risks: - Competitive damage - Loss of partner trust Personally identifiable information Intellectual property Customer data

Business challenge Conflicting Goals! Challenge of Data Loss Prevention 8 Enable productivity, mobility and flexible “web 2.0” working Comply with regulation Avoid damaging data loss There is no “100% DLP” but also

Simply Secure Data Loss Prevention 9

Four elements of an effective DLP strategy Control the user environment by restricting data exit points Control devices, applications, and web usage Ensure security policy compliance Protect confidential and sensitive information Full disk, removable storage and file encryption encryption Prevent leakage of personal identifiable information Comprehensive coverage of personally identifiable information types Continuously assess, audit, report and enforce on endpoint and gateway Classify intellectual property and sensitive business data Empower knowledge workers to classify sensitive business data Apply classification to existing documents and data sets 10

Control user environment 11 Data loss objective: Significantly reduce risk by managing what users can do on data exit points Sophos solution provides granular control of: Storage devices and network interfaces Applications Web site access Continuously monitor user behaviour and enforce security policies SophosLabs provide the domain expertise: Managed application definitions (P2P, IM, Remote Access) Managed web site categories (webmail, social networks, IM) Indentify over 150 file formats using “True File Type” technology

Protect confidential and sensitive information Data loss objective: Data encryption is the ultimate data loss insurance policy Sophos solution protects data where it is most exposed: Laptops Removable storage and optical media Server file shares Data protection platform: Enterprise mangement console and key management Integration with Active Directory Transparent file and folder encryption Audit compliance 12

Prevent leakage of PII Data loss objective: Tackle the highest risk of regulatory infringement and brand damage Sophos solution covers all critical data leakage points: Storage, web, and IM Fully integrated into core endpoint and gateway products SophosLabs provide the content expertise: Over 100 expert definitions of personally identifiable information Administrator decides appropriate enforcement action: Audit – silent background monitoring of events Training – audited end user authorisation Enforcement - encrypt or block transfer 13

Classify and protect documents Data loss objective: Protect high value intellectual property and operations data Sophos solution is designed to empower knowledge workers: Define classification levels within policy Enable end user to tag and classify new documents Embed classification within document Scan for and classify existing documents using document context Enforce policies for classified documents on endpoint and gateway Integrated with enterprise encryption solution: Leverages existing user identity and permissions Provides workable enterprise rights management 14

Sophos Data Loss Prevention 15

Solutions designed to meet a need 16 Process Work Knowledge Work Comply with regulations Protect data using full disk encryption Prevent leakage of PII from endpoints Prevent leakage of PII from and web gateway Data at resting scanning of PII on endpoints Protect company assets using encryption and classification. Detect leakage of IP via common leak points. Classify and protect IP at the point of creation. Persistent tagging Identify and protect IP using automated classification and data at rest scanning.

SafeGuard Enterprise Your key to data protection with encryption 2. Encrypt laptops, desktops 6. Secure network file shares 1. Consistent policies, mgmt. of keys & certificates 3. Encrypt removable media 4. PC port control & DLP 5. Manage external security products (*) Future release

Safeguard Mail Gateway overview Client sends out in plain text 2. Server forwards to Content-Filter 3.Content-Filter forwards to SGMG 4.SGMG evaluates Security Policy and cryptographically handles the accordingly 5.SGMG delivers to the Recipient a.External Communication Partner sends an encrypted b.SGMG identifies encrypted and decrypts this . The is now in plain- text. c.SGMG forwards to AV-Scanner d.AV-Scanner checks and forwards the to the Server e. Client receives in plain text edc b a

DLP Implementation Tips Senior management sponsorship Cross-functional team Identify PII data types Prioritize risks Data security policies End-user education Warn before blocking

Questions? 20