Presentation is loading. Please wait.

Presentation is loading. Please wait.

Protection from internal threats: Evolution of DLP or Who sets trends.

Similar presentations


Presentation on theme: "Protection from internal threats: Evolution of DLP or Who sets trends."— Presentation transcript:

1 Protection from internal threats: Evolution of DLP or Who sets trends

2 EARLY DLP Tasks that DLPs were designed to address: Control of maximum number of communication channels Corporate data leakage prevention Archiving business communications Incidents management

3 DEVELOPMENT OF DLP Email messages, including encrypted onesFTP/FTPS, HTTP/HTTPS file transferSkype, Viber, ICQ and other IM messages and files Messages in social networks, blogs, forums, chats External devices, СD/DVD, printers Audio monitoring

4 USER ACTIVITY MONITORING SYSTEMS Control of work hours Logging user actions Application activity monitoring Reporting

5 THE EMERGENCE OF COMPREHENSIVE INSIDER THREAT PROTECTION SYSTEMS Conventional DLP system User Activity Monitoring System User Activity Monitoring System Conventional DLP system

6 REQUIREMENTS TO COMPREHENSIVE INSIDER THREAT PROTECTION SYSTEMS can control the maximum number of data transmission channels are easily integrated into any network with no need to change infrastructure operate on gateway level and on endpoints both are modularized are easily installed and configured, show high performance along with inconsiderable impact on endpoint operation are user-friendly and easy to interact with Market needs solutions that:

7 AN INTEGRATED APPROACH TO PROTECTION FROM INTERNAL THREATS Information flows control and data leak protection Work processes control Operational risk management Reputational risk management

8 SHIFT OF TRENDS

9

10 TOP 7 REASONS FOR DISMISSAL IN 2014 According to Falcongaze Analytics Center Misuse of work hours and internet — 37 % Corruption and bribery — 21 % Comments on management board and corporate policy — 17 % Search for new job — 11 % Violation of corporate rules — 6 % Negligent treatment of confidential data — 4 % Industrial espionage — 4 %

11 USER ACTIVITY STATISTICS

12 WORK HOURS MONITORING

13 INFORMATION ON VISITED SITES

14 USER RELATIONS GRAPH ANALYZER

15 USE OF APPLICATIONS ANALYSIS

16 REPORTING

17 CURRENT TRENDS Fast introduction Deployment in high complexity networks Flexibility — several ways to intercept traffic Comprehensive tool for information and economic security Usability Modularity Low TCO

18 Thank you


Download ppt "Protection from internal threats: Evolution of DLP or Who sets trends."

Similar presentations


Ads by Google