«Points at issue» Practical Aspects of Deploying a DLP System Based on the Experience of SearchInform Ltd www.searchinform.com.

Slides:



Advertisements
Similar presentations
Facts about Welcome to this video from Ozeki. In this video I will present what makes Ozeki Phone System XE the Worlds best on-site software PBX for Windows.
Advertisements

Network Systems Sales LLC
COMPREHENSIVE APPROACH TO INFORMATION SECURITY IN ADVANCED COMPANIES.
Presentation. Contemporary Communication Fast – connects us quickly without delays Reliable – works always Global – connects us with the whole world Low.
XProtect ® Professional Efficient solutions for mid-sized installations.
Avoid data leakage, espionage, sabotage and other reputation and business risks without losing employee performance and mobility.
XProtect ® Express Integration made easy. With support for up to 48 cameras, XProtect Express is easy and affordable IP video surveillance software with.
«Challenges companies face when building information security systems» Practical Aspects of Deploying Data Leak Prevention Systems Based on SearchInform.
Current Security Threats WMO CBS ET-CTS Toulouse, France May 2008 Allan Darling, NOAA’s National Weather Service WMO CBS ET-CTS Toulouse, France.
«Knowledge is power». DO YOU KNOW WHAT’S GOING ON IN YOUR COMPANY? LanAgent «Knowledge is power»
Packet Analyzers, a Threat to Network Security. Agenda Introduction The background of packet analyzers LAN technologies & network protocols Communication.
«Challenges companies face when building information security systems» Practical Aspects of Deploying Data Leak Prevention Systems Based on SearchInform.
Practical Aspects of DLP System Deployment
Network and Server Basics. 6/1/20152 Learning Objectives After viewing this presentation, you will be able to: Understand the benefits of a client/server.
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
Security Management IACT 918 July 2004 Gene Awyzio SITACS University of Wollongong.
Interpret Application Specifications
Security Management IACT 418/918 Autumn 2005 Gene Awyzio SITACS University of Wollongong.
Make your messaging reliable use it Messaging. A single and global solution Send, receive and process any type of message through the appropriate channel.
Kaspersky Open Space Security: Release 2 World-class security solution for your business.
Presented by Manager, MIS.  GRIDCo’s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to GRIDCo’s.
FIREWALL TECHNOLOGIES Tahani al jehani. Firewall benefits  A firewall functions as a choke point – all traffic in and out must pass through this single.
Data Loss Prevention in the Banking Industry.
IMonitor Software About IMonitorSoft Since the year of 2002, coming with EAM Security Series born, IMonitor Security Company stepped into the field of.
Comprehensive DLP Solutions in Large Geographically Dispersed Companies.
IT-Partners Limited © 2011 IT Partners Limited Y OUR IT SOLUTION P ARTNERS Managing Director Confidential Data Loss Prevention Sunny Ho 1.
1 Networks, advantages & types of What is a network? Two or more computers that are interconnected so they can exchange data, information & resources.
11 SECURING INTERNET MESSAGING Chapter 9. Chapter 9: SECURING INTERNET MESSAGING2 CHAPTER OBJECTIVES  Explain basic concepts of Internet messaging. 
Chapter 7: Using Windows Servers to Share Information.
Networks. What is a Network? Two or more computers linked together so they can send and receive data. We use them for sending s, downloading files,
Surveillance Equipment For Internet Activities It is a Internet activities surveillance equipment designed for sniffer package from networking, converter.
Protection from internal threats: Evolution of DLP or Who sets trends.
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Copyright © 2006 by The McGraw-Hill Companies,
AtomPark Software is founded in The head office is located in Saint-Petersburg, Russia. Company is officially registered in the United States. AtomPark.
Unit 1 — Computer Basics Lesson 1 — Understanding Computers and Computer Literacy.
Local Area Networks (LAN) are small networks, with a short distance for the cables to run, typically a room, a floor, or a building. - LANs are limited.
Application Layer CHAPTER 2. Announcements and Outline  Administrative Items  Questions? Recap 1.Introduction to Networks 1.Network Type 2.N etwork.
TRUSTPORT PRODUCT PORTFOLIO Marcela Parolkova Sales Director.
CSI-E Computer Security Investigator – Enterprise.
Introduction to Barracuda IM Firewall. Two Security Products in One Public IM Management –Manages traffic from public IM clients, including AIM, Yahoo!
Network Security Lecture 20 Presented by: Dr. Munam Ali Shah.
NETWORK HARDWARE AND SOFTWARE MR ROSS UNIT 3 IT APPLICATIONS.
Cloud Computing Project By:Jessica, Fadiah, and Bill.
TCP/IP (Transmission Control Protocol / Internet Protocol)
Mohammed F & Aya. Peer-to-peer network are usually common in homes and small businesses and are not necessarily expensive. On a peer-to-peer network each.
Falcongaze SecureTower: field experience
ITGS Network Architecture. ITGS Network architecture –The way computers are logically organized on a network, and the role each takes. Client/server network.
BUFFERZONE Advanced Endpoint Security Data Connectors-Charlotte January 2016 Company Confidential.
MCSE Guide to Microsoft Exchange Server 2003 Administration Chapter One Introduction to Exchange Server 2003.
Oman College of Management and Technology Course – MM Topic 7 Production and Distribution of Multimedia Titles CS/MIS Department.
Physical security By Ola Abd el-latif Abbass Hassan.
©Select Office Solutions 2000 PC support at your door Computer Training Business Analysis Strategic & Business Planning.
ATMeye.iQ Video security monitoring and dispute management solution ATMeye.iQ.
Computer Security Sample security policy Dr Alexei Vernitski.
IC 3 BASICS, Internet and Computing Core Certification Computing Fundamentals Lesson 1 What Is a Computer?
DLP Solutions in Large Geographically Dispersed Companies.
2.2 Interfacing Computers MR JOSEPH TAN CHOO KEE TUESDAY 1330 TO 1530
GroupRocket.net. Years back checking s in the morning was the first ever thing most of the professionals would start their day with. And with the.
Application Layer instructors at St. Clair College in Windsor, Ontario for their slides. Special thanks to instructors at St. Clair College in Windsor,
Main Features of iSafe All-in-One Keylogger Universal keylogger of isafe, Inc. Suitable for home parental control,corporate employee monitoring and cheating.
Network and Server Basics. Learning Objectives After viewing this presentation, you will be able to: Understand the benefits of a client/server network.
Advanced Endpoint Security Data Connectors-Charlotte January 2016
Introduction to Barracuda IM Firewall
BUILD SECURE PRODUCTS AND SERVICES
Ways to protect yourself against hackers
Store, Share, Sync and Collaborate
of DLP System Deployment
COMPREHENSIVE APPROACH TO INFORMATION SECURITY IN ADVANCED COMPANIES
Employee Monitoring Solution
Comodo Dome Data Protection
Presentation transcript:

«Points at issue» Practical Aspects of Deploying a DLP System Based on the Experience of SearchInform Ltd

SearchInform Information Security Perimeter (SISP) is deployed in more than 1000 companies in Russia, Ukraine, Belarus, Kazakhstan, Latvia, and Lithuania. The company has its offices in Moscow, Khabarovsk, Novosibirsk, Yekaterinburg, Kazan, St. Petersburg, Riga, Vilnius, Kiev, Minsk, and Almaty. SearchInform Today

Deployment Department Information security officers do not actively share knowledge in the sphere. However they trust their problems to us. SearchInform experts are like doctors: we do not spread information, we offer solutions.

Deployment Department Working with 1200 customers from different business spheres allowed accumulating a unique database of problem-solving cases. This database is the answer to your question “where to start from?” 100% of DLP solution functionality should be used.

Advantages of Deployment Department Manager taking care of your company supports all your initiatives and solves all your problems. You are informed about all recent updates related to SearchInform Information Security Perimeter (SISP) and its usage. All managers are involved in the training program. You will not only learn how to create security policies for your company’s needs, but also find out about the pitfalls of security processes and predicted results based on the examples taken from real life.

Training Center SearchInform training center has been working since May It offers a training course called “Practical application of DLP systems”. More than 300 people completed the course since then. Two other courses are planned for 2014.

Working with Colleges Quite often college graduates do not meet employer expectations because of the lack of experience. SearchInform participates in the graduate training program making it easier for college students to obtain priceless experience. Free SISP version is available for all interested colleges.

Very often employees are not allowed to use the most efficient and popular data channels. For instance employees can only use corporate e- mail, while instant messengers are banned despite the fact they could considerably increase efficiency. A state-of-the-art DLP system should monitor, analyze, and control leaks of sensitive data over all possible data channels. Information Security Should Promote Business, not Hinder It. All Data Channels Should Be Open

“The Wizard of Oz” featured a big scary wolf protecting the gate of the country from intruders. Nobody could cross the border. However the rest of the border was just painted. Information Security System Should Control All Data Channels The same with information security: if flash drives are not allowed, confidential data will leak through or instant messengers. Skype has a reputation of being the most secure means of communication. Being at work employees feel free to use it rather than any other instant messenger. That is why files and sms, text and voice messages sent over Skype should be controlled. Integrated approach to information security is only possible when all data channels are controlled.

SearchInform Information Security Perimeter

One man doesn’t make a team? Captured data is useless until it is analyzed. Reading all captured data is a rather irrational way of information analysis. A security officer may only handle employees if traditional approach is used. And what if there is a couple of hundreds or even thousands of them? SISP offers an extensive set of search engines and automatic data analysis. This way one security officer can monitor activity of employees.

Domain Names Integration with Windows domain structure helps accurately identify users even if they use nicknames, free web mail or other computers.

SISP Applications Control and prevention of data leaks through laptops In 2013 we launched MicrophoneSniffer, a supplementary solution used to record employee conversations. SearchInform provides fully fledged control of laptops outside corporate network. Endpoint agents are completely unnoticed to users. Even skilled engineers will hardly be able to detect them running. As soon as installed, they start collecting and sending data to security officers for analysis.

SISP Applications Control and prevention of data leaks through iPads and iPhones Employee mobility is an issue that has taken on a whole new meaning. Corporate iPads and iPhones increase business efficiency as now employees can connect to the corporate network anywhere at any time. However, besides advantages, this presents a range of new threats to information security. SISP monitors, analyses and controls leaks of sensitive data through iPhone and iPad , Skype, and HTTP.

SISP Applications Worktime monitoring Alongside with protecting sensitive data and fighting malicious attacks security officers have to reveal non-efficient employees. ProgramSniffer offered as part of SISP faces the challenge. It creates reports on arrival and leave time real work performed applications use statistics

Tricks Sensitive data can be transmitted in graphic or encrypted files. SISP offers fully fledged control of all data channels: Optical character recognition (OCR) Capturing encrypted files Capturing files with changed extension

Company matters are often discussed in social networks and web blogs. Sharing company’s internal information may affect its public image and client opinion. Social Networks and Web Blogs

Many employees use their Gmail boxes despite corporate security rules. Being sure Gmail is protected they may use it for non-work- related purposes. Incoming Secured Gmail Correspondence SearchInform allows controlling two sides correspondence, and not just s from one party. Even if employees use their smartphones, as soon as they open their mail boxes from corporate computers, all correspondence will be captured.

With SISP you will always know who your employees communicate with and reveal opinion shapers. Data Leak Prevention

IT or IS? We strongly recommend drawing a line between info technology and info security departments. Each one of them has its own objectives. Employing a qualified information security officer would be the best possible solution.

Three Pillars of Information Security Prevent data leaks A state-of-the-art DLP system should not only discover data leaks, but also prevent them at the very stage of malicious intent. Keep up with employee moods A better understanding of your employees is achieved through monitoring instant messengers, social networks and web blogs. Optimize corporate policy By monitoring employees’ reaction to innovations, you can effectively update corporate policies and procedures.

User Rights Differentiation With SISP you can configure different access rights for different users.

All SISP components have a client-server architecture. Server side incorporates two platforms - NetworkSniffer or EndpointSniffer. Client side includes applications used to access databases and retrieve information. NetworkSniffer platform is developed to capture data with the help of a traffic-mirroring device, i.e. corporate network is not affected in any way. All data sent over SMTP, POP3, IMAP, HTTP, HTTPs, MAPI, ICQ, JABBER, and MSN are captured on the level of corporate network. The following products are offered as part of NetworkSniffer platform: System Architecture

EndpointSniffer platform is developed to capture data with the help of agents installed on user computers. It provides additional control of employees working outside the office. SearchInform EndpointSniffer collects all data sent or received by users and transfers it to security officers for analysis as soon as laptops are in corporate network again. Its major advantage is increased failure tolerance. Interception is ensured even if servers are not available. Data transmitted over secure protocols are also captured. EndpointSniffer agents: System Architecture

is the biggest threat to information security. It is used to send and receive huge data volumes every day. SMTP, POP3, MAPI, IMAP are supported. HTTP Sensitive data can be posted to social networks and web blogs or sent through free web mail and sms services. FTP FTP can be used to transmit entire databases, drawings, scanned documents, etc. Internet Traffic SearchInform NetworkSniffer is used to monitor, analyze, and control leaks of sensitive data over the Internet. All common protocols are supported, as well as proxy servers: software (Kerio, Squid, etc.) and hardware (BlueCoat, IronPort, etc.) through ICAP. SISP Applications

Skype Voice and text messages, sms and attached files are captured to be further retrieved and analyzed if a data breach occurs. PrintSniffer Printed documents are captured, indexed and saved to a database. It helps prevent data leaks and see if printers are used for work-related purpose. IM ICQ, Google Talk, XMPP (Jabber), Windows Live (MSN), Facebook, LinkedIn, etc. are supported. SISP Applications

DeviceSniffer is used to monitor, analyze and prevent leaks of sensitive data through removable media (CD/DVD/USB). MonitorSniffer is used to make screenshots and monitor user activity in real time. Control of RDP sessions is also supported. SISP Applications

IW is used to track operations with sensitive data on user computers. FileSniffer is used to prevent leaks of sensitive data through shared network resources. SISP Applications

Multi-office Deployment

Synonym Dictionaries Together with one of the city councils SearchInform Ltd. has worked out a synonym dictionary to find conversations related to bribery. If specific words, e.g. money, cash, franklins, booty etc. are found, security officers will be immediately notified about it. Data-Leak Incidents and Preventive Measures

Printer A company producing large volumes of grocery products found out a significant difference between the products shipped and the products stored at the end- seller’s warehouse. PrintSniffer helped discover illegal output of products organized by a group of employees which became possible due to printing invoice duplicates. Data-Leak Incidents and Preventive Measures

A large flow of negative comments in instant messengers or social networks can be a hard blow to the company’s reputation. By analyzing instant messages of your employees, you can adjust your corporate security policy and avoid harmful consequences. Monitoring ICQ and User Workstations Data-Leak Incidents and Preventive Measures

Swearing Swearing + names of top managers gives food for thought. Data-Leak Incidents and Preventive Measures

Alternative Business Schemes If the search returned Articles of Association that has nothing in common with your company, then perhaps someone of your employees has organized an alternative business scheme. Data-Leak Incidents and Preventive Measures

Any company has its own secrets to protect. It is crucial to monitor LAN activity and access to documents containing  last names of employees;  business partners data;  products description. Data-Leak Incidents and Preventive Measures

Some employees should be included in the risk group: 1. Employees who breached security policies even once 2. Employees who use various tricks, i.e. change file extensions, send password protected archives, etc. 3. Employees who post negative comments about company and top management in social networks and web blogs 4. Employees who all of a sudden started shirking work 5. Employees who operate cash flows and mid-level managers Data-Leak Incidents and Preventive Measures

Common Practice  Monitoring communication with dismissed employees  Monitoring so-called opinion shapers and bursts of activity  Monitoring activity of 1-2% of staff Data-Leak Incidents and Preventive Measures

DLP Solution Efficiency DLP solution is not a universal panacea, but an effective tool used to monitor, analyze and control leaks of sensitive data, as well as communication behavior through a fully-fledged product suite. SearchInform goes beyond data security and is viewed by our best clients as an integral management tool within the organization.

1. Easy to integrate. You will only need several hours to install SISP. Company’s information systems will not be affected in the process of system integration SISP Advantages 2.End-to-end solution. All data channels are controlled, including , instant messengers, Skype, social networks, iPads, and iPhones, printers, etc. 3. Similar-content search. This search type allows finding documents similar in content or meaning to the queried ones. High search precision helps increase efficiency and save on labor expenses 4. Integration with Windows Domain Structure allows accurate user identification 5. Extended search possibilities help effectively protect sensitive data. One security officer can monitor workstations

1.It is not expensive. As a rule, the cost of DLP solution equals to the cost of corporate tea, coffee, and corporate NY party for one employee. 2.Quick payout. On average, a data leak costs around 2.7M USD to the information owner. 3.A matter of urgency. Information security permits of no delay just like when your entrance door is broken. 4.Sensitive data is more expensive than the computer where it is stored. It seems reasonable to spend as much for information security as for SW and HW. Why DLP is a must?

Thank you!