Download presentation
Presentation is loading. Please wait.
Published byKaela Blaisdell Modified over 9 years ago
3
? ?
4
63K confirmed security incidents for 2013 w/ 1,367 confirmed data breaches. Over 40% targeted at server assets. 73% of enterprise IT hardware decision makers are concerned about security/privacy issues in virtualized and cloud environments. 92% of enterprises see security capabilities of public service providers a top influence in their purchasing decision.` 2014 Verizon Data Breach Investigations Report ForrSights Hardware Survey, Q3 2012 Forrester Research, Inc 2013: Advanced Malware Detection and Protection Trends, ESG Research
8
Data classification Demo
10
Automatic RMS protection Demo
11
AreaPropertiesValues Information Privacy Personally Identifiable InformationHigh; Moderate; Low; Public; Not PII Protected Health InformationHigh; Moderate; Low Information Security ConfidentialityHigh; Moderate; Low Required ClearanceRestricted; Internal Use; Public Legal Compliancy SOX; PCI; HIPAA/HITECH; NIST SP 800-53; NIST SP 800-122; U.S.-EU Safe Harbor Framework; GLBA; ITAR; PIPEDA; EU Data Protection Directive; Japanese Personal Information Privacy Act DiscoverabilityPrivileged; Hold ImmutableYes/No Intellectual Property Copyright; Trade Secret; Parent Application Document; Patent Supporting Document Records Management Retention Long-term; Mid-term; Short-term; Indefinite Retention Start Date Organizational ImpactHigh; Moderate; Low Department Engineering ;Legal; Human Resources … Project Personal UseYes/No
12
DCT Database 4. Report 1. Import 2. Export 3. Deploy OOB Knowledge Scale (#File Servers) Hybrid Environment Staging File Server Production File Servers Windows 2008 R2 Windows 2012 Collect Domain Controller (Active Directory) Management Client Windows 2012 R2
14
x 50 Country 50 Groups Branch x 20 1000 Groups Customers 100,000 Groups! x 100
15
User claims User.Department = Finance User.Clearance = High ACCESS POLICY Applies to: @File.Impact = High Allow | Read, Write | if (@User.Department == @File.Department) AND (@Device.Managed == True) Device claims Device.Department = Finance Device.Managed = True Resource properties Resource.Department = Finance Resource.Impact = High AD DS 15 File Server
17
Central access policies Demo
19
Domain Controller (Active Directory) Client User Accounts Forest 2012 Domain Controller (Active Directory) Resources Forest Share with Access Based Enumeration on Windows 2012 File Server COI1 COI2 COI3 Active Directory Trusts with Selective Authentication Access to User Data Shares
20
Files Rule 1 Files Rule 2Files Rule 3 Customer Defined Access Policy For access to COI information, a user must be a member of the COI for which the data is classified. If data is not classified, only the Owner, Administrators, and SYSTEM have Full Control.
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.