OPTIMIZE YOUR DATA LOSS PREVENTION INVESTMENT FOR BOTTOM LINE RESULTS.

Slides:



Advertisements
Similar presentations
Network Systems Sales LLC
Advertisements

BUILDING A SECURITY PROGRAM THAT PROTECTS AN ORGANIZATIONS MOST CRITICAL ASSETS.
LeadManager™- Internet Marketing Lead Management Solution May, 2009.
Test Automation Success: Choosing the Right People & Process
HP Quality Center Overview.
Taking a Waterfall Project Agile REF: Paul Geberth GCSS-J Project Manager Establishment of an Agile Project.
Presentation for the Management Study of the Code Enforcement Process City of Little Rock, Arkansas August 3, 2006.
AMI & Grid Data Analytics & Analysis Management Platform Page  1 What does this platform offer? Our tool is a next generation grid management software.
LOSS PREVENTION SOLUTIONS USING VIDEO ANALYTICS reduce shrinkage, protect profits A Bikal Distribution GKB Ltd Company © All Rights Reserved.
OPTIMIZE YOUR DATA LOSS PREVENTION INVESTMENT FOR BOTTOM LINE RESULTS.
Validata Release Coordinator Accelerated application delivery through automated end-to-end release management.
Security Controls – What Works
© Copyright Lumension Security Lumension Security PatchLink Enterprise Reporting™ 6.4 Overview and What’s New.
© 2014 Level 3 Communications, LLC. All Rights Reserved. Proprietary and Confidential. Polycom event Security Briefing 12/03/14 Level 3 Managed Security.
COMP8130 and 4130Adrian Marshall 8130 and 4130 Test Management Adrian Marshall.
BUILDING A SECURITY PROGRAM THAT PROTECTS AN ORGANIZATION’S MOST CRITICAL ASSETS.
Effort in hours Duration Over Weeks Or Months Inception Launch Web Lifecycle Methodology Maintenance Phases Copyright Wonderlane Studios.
Brian Bradley.  Data is any type of stored digital information.  Security is about the protection of assets.  Prevention: measures taken to protect.
Mel Pless, Sr. Director, Solutions Consulting Guidance Software, Inc. Let’s Get Right To The Endpoint Leveraging Endpoint Data to Expose,
Network security policy: best practices
Skybox® Security Solutions for Symantec CCS Comprehensive IT Governance Risk and Access Compliance Management Skybox Security's.
Optimize Your Data Protection Investment for Bottom Line Results.
RSA – Accenture Insurance Solution
S/W Project Management
Intrusion Detection MIS ALTER 0A234 Lecture 11.
Information Systems Security Computer System Life Cycle Security.
What Keeps You Awake at Night Compliance Corporate Governance Critical Infrastructure Are there regulatory risks? Do employees respect and adhere to internal.
Moving into Design SYSTEMS ANALYSIS AND DESIGN, 6 TH EDITION DENNIS, WIXOM, AND ROTH © 2015 JOHN WILEY & SONS. ALL RIGHTS RESERVED. 1 Roberta M. Roth.
Tools of the Trade: Building the Business Case and Legacy System Integration Presented by: Jerry Keely Customer Service Administrator.
© 2006 Avaya Inc. All rights reserved. Avaya Services Michael Dundon Business Development Manager.
Customer Relationship Management Wagner & Zubey (2007) 11 Copyright (c) 2006 Prentice-Hall. All rights reserved. Copyright 2007 Thomson Publishing: All.
Electronic Commerce & Marketing. What is E-Commerce? Business communications and transactions over networks and through computers, specifically –The buying.
IIA_Tampa_ Beth Breier, City of Tallahassee1 IT Auditing in the Small Audit Shop Beth Breier, CPA, CISA City of Tallahassee
1 CISCO SAFE: VALIDATED SECURITY REFERENCE ARCHITECTURE What It Is Business Transformation Top Questions To Ask To Initiate The Sale Where It Fits KEY.
BREAKING DOWN MISCONCEPTIONS ABOUT DLP. BEW GLOBAL’S DLP EXPERTISE Global Support in 130 countries Manage DLP Solutions in 22 Countries Daily Management.
Making Managed Services Easier Presenter: Greg Henderson Director, International.
Certification and Accreditation CS Phase-1: Definition Atif Sultanuddin Raja Chawat Raja Chawat.
Event Management & ITIL V3
Current Projects in DTEI Presented By: Tracy Jordan.
GREG CAPPS [ ASUG INSTALLATION MEMBER MEMBER SINCE:1998 ISRAEL OLIVKOVICH [ SAP EMPLOYEE MEMBER SINCE: 2004 GRETCHEN LINDQUIST [ ASUG INSTALLATION MEMBER.
AML Compliance Findings & Observations Wyn Clark U.S. Treasury.
2015 Security Conference Dave Gill Intel Security.
© 2013 IBM Corporation IBM Enterprise Content Management Solutions Services and Support.
Raya for Information Technology. About US  Raya IT, established in 1998, operates in the field of systems integration and IT business solutions.  A.
Information Technology Services Strategic Directions Approach and Proposal “Charting Our Course”
Microsoft and Symantec
State of Georgia Release Management Training
A way to develop software that emphasizes communication, collaboration, and integration between development and IT operations teams.
GRC: Aligning Policy, Risk and Compliance
ECAT 4.1 – Rule Your Endpoints What’s New Customer Overview.
Talent Acquisition, Staffing, Recruitment, Executive Search.
Kevin Watson and Ammar Ammar IT Asset Visibility.
Customer Relationship Management. Presentation By: Tarun Rattan Jyoti Sodani Akash Gupta Saloni.
Selecting the Right CRM System at AVEBE Refik Kocak CRM Partners (on behalf of AVEBE) CUSTOMER.
Customer Experience: Create a digitally led customer experience
Fourth Dimension Technologies
What is it ? …all via a single, proven Platform-as-a-Service.
CIM Modeling for E&U - (Short Version)
BEW GLOBAL’S DLP EXPERTISE
CCNET Managed Services
Description of Revision
11/17/2018 9:32 PM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
11/23/2018 3:03 PM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
Business Document Platform
Managed Content Services
ServiceDesk 7 Preview.
Comodo Dome Data Protection
AIR-T11 What We’ve Learned Building a Cyber Security Operation Center: du Case Study Tamer El Refaey Senior Director, Security Monitoring and Operations.
Presentation transcript:

OPTIMIZE YOUR DATA LOSS PREVENTION INVESTMENT FOR BOTTOM LINE RESULTS

Providing DLP Since 2002 Deployed 400+ DLP Projects Completed 500+ Assessments Manage 40+ DLP Solutions in 22 Countries Provide Daily Management of 1,000,000+ Users Globally DATA LOSS PREVENTION EXPERTISE QUICK FACTS Symantec Master Specialization DLP Partner RSA’s Only Authorized Managed DLP Partner 1st Managed DLP Services Provider (2008) Localized Chinese DLP Practice (2011) Global Support in 130 countries Data Mining, Custom Policies, & Scripting

MARKET EVOLUTION /2006 GARTNER RESULTS BEW Global forms partnership with Vericept in At the time of this report, BEW had 38 deployments of Vericept in the US and UK. BEW Global and Vontu form a partnership. BEW Global is the first Vontu reseller. Vidius changes name to PortAuthority and accelerates product development and US presence. Reconnex enters market with forensics approach.

MARKET EVOLUTION GARTNER RESULTS Websense acquires PortAuthority. ($80M) Trend Micro acquires Provilla, October Raytheon acquires Oakley Networks, October Tablus touted for exceptional data-at-rest capabilities. “Grid Worker”

MARKET EVOLUTION GARTNER RESULTS Vontu acquired by Symantec. ($350M) Tablus acquired by RSA. ($40M Approx.) McAfee acquires Reconnex for network DLP ($46M) and Onigma ($20M) for Host DLP. Verdasys and Fidelis announce strategic partnership.

MARKET EVOLUTION GARTNER RESULTS CA acquires Orchestria, January GTB struggles to gain a significant customer base. Palisade Systems and Code Green Networks target SMB DLP market. Workshare late entry into DLP market lacks functionality. Vericept acquired by Trustwave.

MARKET EVOLUTION GARTNER RESULTS Symantec releases 10.5 and DataInsight to enhance DAR capabilities. RSA releases 8.0 with enhanced endpoint capabilities. Strategic partnership with Varonis. Websense releases 7.5 with upgraded management interface. Claims DLP in 30-minutes…. McAfee releases 9.0 with greater integration with network and host DLP into ePO console.

MARKET EVOLUTION GARTNER RESULTS

MARKET EVOLUTION GARTNER RESULTS

BEW GLOBAL METHODOLOGY Risk Assessment BEW GLOBAL’S CORE DIFFERENTIATORS Methodology based on the cornerstones of ISO Plan-Do-Check-Act Leverage our proven Quality Management System (QMS) to drive continuous improvement Reduce risk and increase operational efficiencies ASSESSQUANTIFYIMPLEMENT OPTIMIZE REVIEW

USE CASE: DLP PRE-PROJECT STATE Organization Overview: Medical Device & Pharmaceutical Manufacturer, 40,000 employees globally DLP Scope: Protection of Intellectual Property (General) DLP Primary Issue: Customer overwhelmed with inaccurate incident data, no meaningful information Application Management: Operated and managed by IT Security with limited input from business. Policy Governance: Failure to use a lifecycle software development process for policy construction Incident Triage: Infrequently reviewed by IT with little to no review by business owners. Event Management: Hard to accomplish due to large # of false positives. No “gold nuggets.” Reporting and Metrics: Zero customized reports. No relevant business analysis provided. Status: System generates 25,000 incidents/day / 750,000 incidents/month

APPLICATION SUPPORT & INTEGRATION Primary System DLP Management = Human Resource / Expertise Requirements Integrated System Management = Cross Department Collaboration Processes Health Check & System Validation Management = System Resource Requirements Vendor Management = Primary and Integrated Technology Vendor Relationships

POLICY & RULE GOVERNANCE Who requests rules & policy requirements? Are business owners engaged? Who reviews rule requests? Criteria for approved rule? What’s the process for converting a rule request into a policy? Who’s responsible for converting a rule into technical policy? Do they have technical policy authoring expertise? What is the formal policy development process? First drafts rarely work as expected! Is there a process to relay production policy metrics to stakeholders?

WORKFLOW DEVELOPMENT & MANAGEMENT Who develops & manages policy “buckets”? False positive, inbound partner, outbound employee Who defines thresholds that determine response rules for each “bucket”? Are 10 SSNs a high, medium or low severity incident? Who designs & sets the policy response triggers? Malicious, Inadvertent, Suspicious, above threshold. Triage response options: Human notification System notification (auto) Hybrid? Who’s responsible for building alerts, alarms & notifications? Has business been engaged on event management? Who manages the DLP policy & rules repository? Why recreate the wheel?

Who reviews volume & yield of incidents & events? What’s the review frequency? How are events/incidents routed? Who owns the incident/event? How does DLP fit in overall incident/event management process? Can this be mapped to DLP system? What metrics are developed to measure success of rules & related policy? Who ‘s responsible for developing metrics? Revision of rules based on quality of policy results. Who manages policy optimization process? How will integrated systems be tied together to yield valued info? Secure mail, web gateway, GRC, SIEM INCIDENT TRIAGE & EVENT MANAGEMENT

BUSINESS ANALYTICS Who develops reports? Are DLP system generated reports adequate? Who drives report requirements? Requestors, Reviewers, others? Do they have the expertise with 3 rd party reporting tools? Are the metrics valuable & driving meaningful change? Report accuracy tied into QA process?

APPLICATION MANAGEMENT PITFALL  Problem: Current IT infrastructure management is often inadequately trained for planning, deployment and ongoing operational management of DLP operation system. (Oracle vs. SQL, etc.)  Solution: Better internal planning & cross functional involvement. In addition to outsourced 3 rd party management of on premise solution or fully managed cloud-based delivery. This provides you with instance expertise reducing the need for staffing and providing higher availability. Inadequate Planning & Resources Inadequately Trained Infrastructure Resources

POLICY GOVERNANCE PITFALL No Plan of Attack  Problem: A survey of 50 DLP customers in 2010 said 83% of firms did not consider the overall DLP system cycle & the necessary resources for optimal system usage prior to solution acquisition. Inadequate or lack of resources leads to poor policy construction & unmanageable incidents.  Solution: A well thought out DLP scope with a supporting policy governance process that is VERY inclusive of business unit input as well as involvement with the triage & event management process. There must be people budgeted for any DLP project as well as preparation for business unit buy-in. Inadequate Planning & Resources

POLICY GOVERNANCE PITFALL Failure to Engage the Business Stuck in the IT Department Problem: A survey of 50 DLP customers in 2010 said 76% of firms stated the DLP system technical management & daily operations were the responsibility of a group directly involved with IT. In these cases it is very rare to find heavy involvement from business owners directly involved with the creation & usage of the data targeted for protection. Solution: Designation of a primary business owner of the DLP solution, in conjunction with technical management, is the best recipe for success on the front-end planning phase of the project. Without direct & serious involvement from the business, it is very likely that the entire DLP will never get more than mediocre results.

POLICY GOVERNANCE PITFALL Lack of Rule Customization Inaccuracy of Out-of-Box (OOB) Policies Problem: The reliance of organizations to use OOB policies as the primary detection criteria for their DLP scope. In many cases data identifiers in OOB policies may never capture unique attributes of a organizations information targets, yielding a combination of false positives and false negatives which lead to an unmanageable incident yield. Solution: Prior to enabling ANY managed production policies, it is highly recommended to select one primary data criteria to focus initial efforts. Once agreed upon, use business process mapping to capture how the data is used and stored, obtain examples, and then construct policies based on the collected data.

DATA-IN-MOTION PITFALLS: Missing the Target – False Sense of Security Mis-configured Tap or Port Span Problem Missing segments of network traffic or protocols Solution Comprehensive test plan that maps to in scope business processes and related data types transmitted from various network locations to ensure all relevant data streams are being captured. Encryption – The Masked Data Problem Analysis of data DID not take place prior to encryption. Solution Comprehensive test plan that proves ALL DLP data assessment takes place prior to the gateway encryption & implement managed “test” DLP policies that identify encrypted transmissions as part of the test plan. Misfire of Network Discovery Scans Problem Locations of sensitive data never targeted by the organization for scanning due to lack of an effective policy governance process. Solution Identify potential data stores by discussing the DLP program with staff to understand process. Network versus Endpoint Discovery Problem Running DAR scans using a combo of network & endpoint without thinking about which policy types & detection methods are not the same. Solution Prior to acquiring DLP solution, have an understanding of the data types that make up your target environment & then, decide on scanning method..

DATA-IN-MOTION (ENDPOINT) PITFALLS: The Pandora’s Box of DLP Environment Assessment Staying in Contact User Performance Impacts Network/System Performance Impacts Problem No rigorous endpoint environment assessment prior to the selection of the application & enablement. Solution Address age of environment, performance capabilities, technical & human issues, & load of applications, in conjunction with education on the DLP endpoints. Problem Failure to monitor endpoint population & their frequency of “checking-in” to the management server with validated results. Solution Phased deployment of endpoint with validation via test plan on initial success of ALL agents & on- going endpoint agent health reports. Problem Implementing same policies for network based & endpoint assessments without testing or modification. Solution Utilize a comprehensive test plan outlining specific metrics (time to open files, open/send s, open applications) prior to deployment. Problem Failure to calculate & measure the impact of endpoint policy traffic across wide & local area network connections. Solution Thorough assessment of endpoint policies that addresses all of the concerns including policy design requirements, timing, frequency & delivery methods.

QMS SAMPLE QUARTERLY REPORT

POLICY GOVERNANCE –POST PROJECT STATE Organization Overview: Medical Device & Pharmaceutical Manufacturer, 40,000 employees globally DLP Scope: Focused on 3 specific product lines linked to highest revenue & earnings DLP Primary Goal: Identification of unauthorized movement of specific elements of IP Application Management: Operated by a combination of IT, messaging & desktop management teams Policy Governance: 100% customized policies based on data collected from business unit Incident Triage: Daily review of incidents by Information Security Event Management: Incidents meeting severity criteria routed to business unit for investigation Reporting and Metrics: Behavioral pattern analysis leading to preventive actions Status: R&D teams have high-level of confidence in ability to identify leakage of IP.

BEW GLOBAL HQBEW GLOBAL EMEABEW GLOBAL APAC 5613 DTC Parkway Suite 810 Greenwood Village, CO USA (ph) (fax) Albany Court Albany Park Camberley GU16 7QR England (ph) +44 (0) (fax) +44 (0) Oxford Street Level 23, Tower 1 Bondi Junction Sydney 2022 (ph) +61 (2) (fax) +61 (2) BEW GLOBAL SALES CONTACT Cole Harter Regional Account Manager |