SlideShare uma empresa Scribd logo
1 de 24
RSA Data Loss Prevention(DLP) Suite
Discover and Mitigate Business Risk from Sensitive Data
RSA Data Loss Prevention




                               Data Breaches Overview
                               RSA DLP Solution
                               Five Critical Factors
                               Customer Case Studies



     2
2
Why is Information Security So Difficult?
Endpoint     Network/E-mail        Apps/DB                   FS/CMS                    Storage



                  LAN


  Internal                     Enterprise    Production      File Server
 Employees                    Applications                                       Disk Arrays   Backup
                  WAN                         Database                                          Tape



                  VPN
                                                                                               Backup
                                Business      Replica         File Server        Disk Arrays   System
  Remote
                                Analytics
 Employees




                                                                                 Disk Arrays Backup Disk
                                                          SharePoint and other
                               Outsourced     Staging       Collaboration &
 Partners                         Dev.                       Content Mgmt
                                                                Systems

3
Endpoint     Network/E-mail        Apps/DB                   FS/CMS                    Storage
We Are Exposed At Every Point
Endpoint           Network/E-mail             Apps/DB                    FS/CMS                    Storage



                           LAN

                        Network Leak
    Endpoint                                   Privileged User          Privileged User             Tapes lost or
    Internal           Email-IM-HTTP-     Enterprise                     File Server
    theft/loss
                          FTP-etc.                 BreachProduction         Breach                     stolen
                                                                                                            Backup
  Employees                              Applications      Database                          Disk Arrays
                           WAN                                                                               Tape



                           VPN
                                                                                                            Backup
                       E-mail leak or      Business DB or Replica
                                                App,                       File Server       Disk Arrays    System
 Endpoint Leak                                                          File Server / CMS
   Remote             packets sniffed         Encryption Key
 via print/copy
                         in transit
                                           Analytics
                                                   Hack
                                                                              Hack
 Employees




                                                                                             Disk Arrays Backup Disk
                                                                      SharePoint and other
                            Public        Outsourced        Staging     Collaboration &
                                                                             (Semi)               Discarded disk
   IP Sent to
  Partners                                     Unintentional
                        Infrastructure       Dev.
non trusted user
                         Access Hack
                                                Distribution             Content User
                                                                          Trusted Mgmt               exploited
                                                                             Misuse
                                                                             Systems

4
Endpoint           Network/E-mail             Apps/DB                    FS/CMS                    Storage
There Are Many Point Solutions
Endpoint         Network/E-mail        Apps/DB                    FS/CMS                    Storage

      Mobile           Email              Application                  File
    Encryption       Encryption           Encryption                Encryption
                       LAN

                                                                                                Tape
  Internal                         Enterprise     Production      File Server                 Encryption
 Employees                        Applications                                        Disk Arrays   Backup
                       WAN                         Database                                          Tape
      Port            Network               Database                 CMS/FS
    Monitoring       Monitoring            Encryption             Access Controls



                       VPN
                                                                                                    Backup
                                    Business         Replica       File Server        Disk Arrays   System
  Remote
     File             Network               Activity
  Encryption         Encryption
                                    Analytics
                                          Monitoring
                                                                       eDRM
 Employees
                                                                                                 Disk
                                                                                              Encryption

                                                                                      Disk Arrays Backup Disk
                                            App/DB             SharePoint and other
      eDRM             eDRM        Outsourced      Staging              File
                                                                 Collaboration &
 Partners                                  Discovery                 Discovery
                                      Dev.                        Content Mgmt
                                                                     Systems

5
Endpoint         Network/E-mail        Apps/DB                    FS/CMS                    Storage
The Business Case for DLP
Reduce Risk | Minimize Cost | Avoid Disruption




                                      Reduce Risk

                           1. What data can you catch? Where?
                           2. What can you do about it?
                           3. Time to Value



             Minimize Cost                            Avoid Disruption
    1. Product                                  1. Consider the “who” not just “what”
    2. People
                                                2. Make controls transparent to users
       a) Setup/Maintain
       b) Investigations                        3. Involve the data owners
       c) Remediation
    3. Infrastructure
6
RSA Data Loss Prevention




                               Data Breaches Overview
                               RSA DLP Solution
                               Five Critical Factors
                               Customer Case Studies



     7
7
RSA Data Loss Prevention Suite


       Policy            System            RSA DLP                           Reporting &         Incident
     Management       Administration                                         Dashboard           Workflow
                                       Enterprise Manager


                                 Policies                              Incidents



        DLP Datacenter                          DLP Network                            DLP Endpoint

       Discover sensitive data               Monitor all traffic for                Discover sensitive data
          from everywhere                      sensitive data                      and Monitor user actions


         Enforce controls on                  Enforce controls on                  Enforce controls on both
           sensitive data                   sensitive transmissions                 data and user actions




                                    Third Party Enforcement Controls
 8
Reducing Your Sources of Risk: Data at Rest


            Discover                                  Analyze                        Remediate




                           Rescan sources to measure and manage risk




File shares, Servers, Laptops   300+ File types           Databases & Repositories            Remediation
•Windows file shares            •Microsoft Office Files   •SharePoint                 • Secure Delete
•Unix file shares               •PDFs, PSTs               •Documentum                 • Manual/Auto Move
•NAS / SAN storage              •Zip files                •Microsoft Access           • Manual/Auto Quarantine
•Windows 2000, 2003             •CATIA files              •Oracle, SQL                • Notifications
•Windows XP, Vista                                        •Content Mgmt systems       • eDRM
    9
Protecting Data in the Network: Data in Motion


                Monitor                        Analyze                     Enforce




        Email               Instant Messages                 Web Traffic              Remediation
•SMTP email               •Yahoo IM                •FTP                    •Audit
•Exchange, Lotus, etc.    •MSN Messenger           •HTTP                   •Block
•Webmail                  •AOL Messenger           •HTTPS                  •Encrypt
•Text and attachments                              •TCP/IP                 •Log

   10
Protecting Data at the Endpoint: Data in Use


             Monitor                           Analyze                        Enforce




        Print & Burn           USB                    Copy and Save As             Actions & Controls
•Local printers        •External hard drives       •Copy to Network shares    • Allow
•Network printers      •Memory sticks              •Copy to external drives   • Justify
•Burn to CDs/DVDs      •Removable media            •Save As to external       • Block
                                                   drives                     • Audit & Log

   11
How Can RSA DLP Solution Help?

                Identify and address sources of risk
     Discover
                Identify broken business processes


                Enforce data security policies for compliance
     Enforce
                Leverage third-party control solutions

                Educate employees on policy and risk
     Educate
                Provide insight into violations & policies

                Monitor and protect all egress points
     Protect
                Prevent sensitive data from leaking out
12
How Can DLP Solutions Reduce Risk?
Endpoint            Network         Apps/DB                     FS/CMS              Storage



    Customers          Privileged           Privileged              Privileged                Privileged

 People                Users                Users                   Users                     Users



   • Discover unsafe user behavior and educate
                        WWW

        Internal                                   Production
     employees on security policies
        Employees
                                    eCommerce
                                    Applications   Database
                                                                                     Disk
                                                                                     Arrays
                                                                                                       Backup
                                                                                                       Tape
                         WAN


 Processes                          Enterprise     Production
                                                                                                Backup
                         LAN                       Database         File Server      Disk
   • Identify and fix broken business processes
    Remote
    Campuses
                                    Applications
                                                                                     Arrays     System



                         VPN
 Technology                          Business
                                     Analytics
                                                    Replica
                                                                      Portals        Disk              Backup
        Remote
   • Leverage technology controls more effectively
        Employees
                                                                                     Arrays            Disk



     to secure data                 Outsourced      Staging
                                                                  Collaboration &
                                    Dev.                                             Disk
                                                                  Content Mgmt
   13                                                             Systems            Arrays
        Partners
            13
RSA Data Loss Prevention




                            Data Breaches Overview
                            RSA DLP Solution
                            Five Critical Factors
                            Customer Case Studies



     14
14
Top 5 Success Factors for DLP




                                                                     E
   Policy &                Identity             Incident             Enterprise           Built-In vs.
Classification              Aware               Workflow             Scalability           Bolt-On

More policies and     Identity awareness     Consolidated alerts     Scan more data      Common policies
better policies for    for classification,       with the right     faster with lesser       across the
classification and       controls and         information to the      hardware and        infrastructure -
  risk mitigation         remediation        right people for the       resources        EMC, Cisco and
                                                 right actions                                Microsoft




15
Policy & Classification


                More policies and better policies for classification
                and risk mitigation



• Unified policy framework
• Best of breed classification
• 150+ built in policy templates
• Information Policy and Classification team
• Highest accuracy per Wipro analysis




 16
Identity Awareness


               Identity awareness for classification, controls and
               remediation


• Identity-based Policy
     E.g. Group x can send data y out
• Identity-based notification
     E.g. Notify the persons manager
• Identity-based control
     E.g. Lock this data so only group x can open
• Integration with Microsoft Active Directory




17
Incident Workflow


               Consolidated alerts with the right information to the
               right people for the right actions



• Intelligent correlation of events into incidents
• Right alerts to the right people in the right order
• Intuitive workflow to remediate violations
• Scheduled reports sent to subscribers automatically
• Integration with RSA enVision to simplify security
  operations



18
Enterprise Scalability



E             Scan more data faster with lesser hardware and
              resources


• Support distributed deployments
• Scale to 100’s of thousands of users
• Unique Grid Scanning technology
• Scan large amounts of data faster and cheaper




19
Built-in Vs. Bolt-on


              Common policies across the infrastructure –
              Microsoft, Cisco and EMC


• Leverage your existing infrastructure
• Microsoft: Integration with Microsoft RMS and will
  also integrate RSA DLP data classification engine
  and policies into Microsoft infrastructure
• Cisco: Integration with IronPort
• EMC: Integration with Documentum, Celerra,
  SourceOne, etc.



20
RSA Data Loss Prevention




                            Data Breaches Overview
                            RSA DLP Solution
                            Five Critical Factors
                            Customer Case Studies



     21
21
Customers From A Wide Range of Industries




22
How Can We Help

      Your Current Status                  We Can Help
Gathering Information                  By Offering

1. Investigating DLP in general        1. Risk Advisor to discover current risk
2. Identifying business drivers        2. Free Scan to support business case
3. Developing a business case          3. ROI/TCO analysis for DLP
4. Identifying a Project Sponsor       4. DLP workshop



Planning to Procure and Deploy         By Providing

1. Have a defined DLP project          1. A framework for DLP evaluation
                                       2. An evaluation environment
2. Developing a detailed DLP project
                                       3. A detailed DLP proposal
3. Evaluating DLP vendors
                                       4. Deployment architecture


 23
24

Mais conteúdo relacionado

Mais procurados

The Efficient Use of Cyberinfrastructure to Enable Data Analysis Collaboration
The Efficient Use of Cyberinfrastructure  to Enable Data Analysis CollaborationThe Efficient Use of Cyberinfrastructure  to Enable Data Analysis Collaboration
The Efficient Use of Cyberinfrastructure to Enable Data Analysis CollaborationCybera Inc.
 
Ugly Storage Made Sexy in Novell Open Enterprise Server and Windows Environments
Ugly Storage Made Sexy in Novell Open Enterprise Server and Windows EnvironmentsUgly Storage Made Sexy in Novell Open Enterprise Server and Windows Environments
Ugly Storage Made Sexy in Novell Open Enterprise Server and Windows EnvironmentsNovell
 
Domain Services for Windows: Best Practices for Windows Interoperability
Domain Services for Windows: Best Practices for Windows InteroperabilityDomain Services for Windows: Best Practices for Windows Interoperability
Domain Services for Windows: Best Practices for Windows InteroperabilityNovell
 
Novell File Management Suite: Intelligently Manage File Storage for Maximum B...
Novell File Management Suite: Intelligently Manage File Storage for Maximum B...Novell File Management Suite: Intelligently Manage File Storage for Maximum B...
Novell File Management Suite: Intelligently Manage File Storage for Maximum B...Novell
 
Novell Filr Overview
Novell Filr OverviewNovell Filr Overview
Novell Filr OverviewNovell, Inc.
 
Life without the Novell Client
Life without the Novell ClientLife without the Novell Client
Life without the Novell ClientNovell
 
Momentum Infocare Corporate Presentation
Momentum Infocare   Corporate PresentationMomentum Infocare   Corporate Presentation
Momentum Infocare Corporate Presentationeraz
 
Best Practices for Administering Novell GroupWise 8
Best Practices for Administering Novell GroupWise 8Best Practices for Administering Novell GroupWise 8
Best Practices for Administering Novell GroupWise 8Novell
 
Webinar issues we_find_slideshare
Webinar issues we_find_slideshareWebinar issues we_find_slideshare
Webinar issues we_find_slideshareSOASTA
 
Mobility Solutions for Novell GroupWise
Mobility Solutions for Novell GroupWiseMobility Solutions for Novell GroupWise
Mobility Solutions for Novell GroupWiseNovell
 
SMB Cloud Solution Brief: Caffelli
SMB Cloud Solution Brief: CaffelliSMB Cloud Solution Brief: Caffelli
SMB Cloud Solution Brief: CaffelliIntelMSP
 
Custom Development with Novell Teaming
Custom Development with Novell TeamingCustom Development with Novell Teaming
Custom Development with Novell TeamingNovell
 
Customer Success - A Public Order Enforcement Government Agency in Asia-Pacific
Customer Success - A Public Order Enforcement Government Agency in Asia-PacificCustomer Success - A Public Order Enforcement Government Agency in Asia-Pacific
Customer Success - A Public Order Enforcement Government Agency in Asia-PacificBloombase
 
fiwalk With Me: Building Emergent Pre-Ingest Workflows for Digital Archival R...
fiwalk With Me: Building Emergent Pre-Ingest Workflows for Digital Archival R...fiwalk With Me: Building Emergent Pre-Ingest Workflows for Digital Archival R...
fiwalk With Me: Building Emergent Pre-Ingest Workflows for Digital Archival R...Mark Matienzo
 
Novell Storage Manager: Your Secret Weapon for Simplified File and User Manag...
Novell Storage Manager: Your Secret Weapon for Simplified File and User Manag...Novell Storage Manager: Your Secret Weapon for Simplified File and User Manag...
Novell Storage Manager: Your Secret Weapon for Simplified File and User Manag...Novell
 
Advanced DNS/DHCP for Novell eDirectory Environments
Advanced DNS/DHCP for Novell eDirectory EnvironmentsAdvanced DNS/DHCP for Novell eDirectory Environments
Advanced DNS/DHCP for Novell eDirectory EnvironmentsNovell
 
[café techno] Présentation de Backup Exec 2012
[café techno] Présentation de Backup Exec 2012[café techno] Présentation de Backup Exec 2012
[café techno] Présentation de Backup Exec 2012Groupe D.FI
 
File Access in Novell Open Enterprise Server 2 SP2
File Access in Novell Open Enterprise Server 2 SP2File Access in Novell Open Enterprise Server 2 SP2
File Access in Novell Open Enterprise Server 2 SP2Novell
 

Mais procurados (20)

Novell Filr
Novell FilrNovell Filr
Novell Filr
 
The Efficient Use of Cyberinfrastructure to Enable Data Analysis Collaboration
The Efficient Use of Cyberinfrastructure  to Enable Data Analysis CollaborationThe Efficient Use of Cyberinfrastructure  to Enable Data Analysis Collaboration
The Efficient Use of Cyberinfrastructure to Enable Data Analysis Collaboration
 
What's new in Exchange 2013?
What's new in Exchange 2013?What's new in Exchange 2013?
What's new in Exchange 2013?
 
Ugly Storage Made Sexy in Novell Open Enterprise Server and Windows Environments
Ugly Storage Made Sexy in Novell Open Enterprise Server and Windows EnvironmentsUgly Storage Made Sexy in Novell Open Enterprise Server and Windows Environments
Ugly Storage Made Sexy in Novell Open Enterprise Server and Windows Environments
 
Domain Services for Windows: Best Practices for Windows Interoperability
Domain Services for Windows: Best Practices for Windows InteroperabilityDomain Services for Windows: Best Practices for Windows Interoperability
Domain Services for Windows: Best Practices for Windows Interoperability
 
Novell File Management Suite: Intelligently Manage File Storage for Maximum B...
Novell File Management Suite: Intelligently Manage File Storage for Maximum B...Novell File Management Suite: Intelligently Manage File Storage for Maximum B...
Novell File Management Suite: Intelligently Manage File Storage for Maximum B...
 
Novell Filr Overview
Novell Filr OverviewNovell Filr Overview
Novell Filr Overview
 
Life without the Novell Client
Life without the Novell ClientLife without the Novell Client
Life without the Novell Client
 
Momentum Infocare Corporate Presentation
Momentum Infocare   Corporate PresentationMomentum Infocare   Corporate Presentation
Momentum Infocare Corporate Presentation
 
Best Practices for Administering Novell GroupWise 8
Best Practices for Administering Novell GroupWise 8Best Practices for Administering Novell GroupWise 8
Best Practices for Administering Novell GroupWise 8
 
Webinar issues we_find_slideshare
Webinar issues we_find_slideshareWebinar issues we_find_slideshare
Webinar issues we_find_slideshare
 
Mobility Solutions for Novell GroupWise
Mobility Solutions for Novell GroupWiseMobility Solutions for Novell GroupWise
Mobility Solutions for Novell GroupWise
 
SMB Cloud Solution Brief: Caffelli
SMB Cloud Solution Brief: CaffelliSMB Cloud Solution Brief: Caffelli
SMB Cloud Solution Brief: Caffelli
 
Custom Development with Novell Teaming
Custom Development with Novell TeamingCustom Development with Novell Teaming
Custom Development with Novell Teaming
 
Customer Success - A Public Order Enforcement Government Agency in Asia-Pacific
Customer Success - A Public Order Enforcement Government Agency in Asia-PacificCustomer Success - A Public Order Enforcement Government Agency in Asia-Pacific
Customer Success - A Public Order Enforcement Government Agency in Asia-Pacific
 
fiwalk With Me: Building Emergent Pre-Ingest Workflows for Digital Archival R...
fiwalk With Me: Building Emergent Pre-Ingest Workflows for Digital Archival R...fiwalk With Me: Building Emergent Pre-Ingest Workflows for Digital Archival R...
fiwalk With Me: Building Emergent Pre-Ingest Workflows for Digital Archival R...
 
Novell Storage Manager: Your Secret Weapon for Simplified File and User Manag...
Novell Storage Manager: Your Secret Weapon for Simplified File and User Manag...Novell Storage Manager: Your Secret Weapon for Simplified File and User Manag...
Novell Storage Manager: Your Secret Weapon for Simplified File and User Manag...
 
Advanced DNS/DHCP for Novell eDirectory Environments
Advanced DNS/DHCP for Novell eDirectory EnvironmentsAdvanced DNS/DHCP for Novell eDirectory Environments
Advanced DNS/DHCP for Novell eDirectory Environments
 
[café techno] Présentation de Backup Exec 2012
[café techno] Présentation de Backup Exec 2012[café techno] Présentation de Backup Exec 2012
[café techno] Présentation de Backup Exec 2012
 
File Access in Novell Open Enterprise Server 2 SP2
File Access in Novell Open Enterprise Server 2 SP2File Access in Novell Open Enterprise Server 2 SP2
File Access in Novell Open Enterprise Server 2 SP2
 

Destaque (20)

McAfee MOVE & Endpoint Security
McAfee MOVE & Endpoint SecurityMcAfee MOVE & Endpoint Security
McAfee MOVE & Endpoint Security
 
Mcafee dyntek
Mcafee dyntekMcafee dyntek
Mcafee dyntek
 
Kimsey d
Kimsey dKimsey d
Kimsey d
 
Lauren fiiney
Lauren fiineyLauren fiiney
Lauren fiiney
 
Ethan a.
Ethan a.Ethan a.
Ethan a.
 
Rebeccab
RebeccabRebeccab
Rebeccab
 
Trentonhall
TrentonhallTrentonhall
Trentonhall
 
W all about mii
W all about miiW all about mii
W all about mii
 
Matthew c
Matthew cMatthew c
Matthew c
 
Isaac albrecht guess who powerpoint
Isaac albrecht guess who powerpointIsaac albrecht guess who powerpoint
Isaac albrecht guess who powerpoint
 
2
22
2
 
Avery F
Avery FAvery F
Avery F
 
Erin p
Erin pErin p
Erin p
 
Madilyn
MadilynMadilyn
Madilyn
 
Amber scott
Amber scottAmber scott
Amber scott
 
Abigail
AbigailAbigail
Abigail
 
Caleb c.
Caleb c.Caleb c.
Caleb c.
 
Stephen kapelet
Stephen kapeletStephen kapelet
Stephen kapelet
 
Skyler.n
Skyler.nSkyler.n
Skyler.n
 
Who am I
Who am IWho am I
Who am I
 

Semelhante a Data Loss Prevention de RSA

What’s new in windows server 2012
What’s new in windows server 2012What’s new in windows server 2012
What’s new in windows server 2012Alex de Jong
 
Viestintäaamupäivä exchange 2013
Viestintäaamupäivä exchange 2013Viestintäaamupäivä exchange 2013
Viestintäaamupäivä exchange 2013Salcom Group
 
Windows Server 2012 Active Directory Domain and Trust (Forest Trust)
Windows Server 2012 Active Directory Domain and Trust (Forest Trust)Windows Server 2012 Active Directory Domain and Trust (Forest Trust)
Windows Server 2012 Active Directory Domain and Trust (Forest Trust)Serhad MAKBULOĞLU, MBA
 
Next Gen Data Center Implementing Network Storage with Server Blades, Cluster...
Next Gen Data Center Implementing Network Storage with Server Blades, Cluster...Next Gen Data Center Implementing Network Storage with Server Blades, Cluster...
Next Gen Data Center Implementing Network Storage with Server Blades, Cluster...IMEX Research
 
Security in the Cloud
Security in the CloudSecurity in the Cloud
Security in the CloudWSO2
 
Risk Factory: PCI Shrink to Fit
Risk Factory: PCI Shrink to FitRisk Factory: PCI Shrink to Fit
Risk Factory: PCI Shrink to FitRisk Crew
 
Viestinnän seminaari 8.11.2012 / Exchange
Viestinnän seminaari 8.11.2012 / ExchangeViestinnän seminaari 8.11.2012 / Exchange
Viestinnän seminaari 8.11.2012 / ExchangeSalcom Group
 
Tom McCann - Sopra
Tom McCann - SopraTom McCann - Sopra
Tom McCann - SopraSocitm
 
Gtb Product Technical Present
Gtb Product Technical PresentGtb Product Technical Present
Gtb Product Technical Presentgtbsalesindia
 
The 5 Keys To Virtual Backup Excellence Exa Grid And Veeam October 25 2012
The 5 Keys To Virtual Backup Excellence  Exa Grid And Veeam October 25 2012The 5 Keys To Virtual Backup Excellence  Exa Grid And Veeam October 25 2012
The 5 Keys To Virtual Backup Excellence Exa Grid And Veeam October 25 2012Bill Hobbib
 
Choosing Your Windows Azure Platform Strategy
Choosing Your Windows Azure Platform StrategyChoosing Your Windows Azure Platform Strategy
Choosing Your Windows Azure Platform Strategydrmarcustillett
 
F5 Networks: architecture and risk management
F5 Networks: architecture and risk managementF5 Networks: architecture and risk management
F5 Networks: architecture and risk managementAEC Networks
 
Aptare Introduction Presentation April 2012
Aptare Introduction Presentation April 2012Aptare Introduction Presentation April 2012
Aptare Introduction Presentation April 2012nigelhoughton17
 
Patterns of Cloud Applications Using Microsoft Azure Services Platform
Patterns of Cloud Applications Using Microsoft Azure Services PlatformPatterns of Cloud Applications Using Microsoft Azure Services Platform
Patterns of Cloud Applications Using Microsoft Azure Services PlatformDavid Chou
 
Smartronix - Building Secure Applications on the AWS Cloud
Smartronix - Building Secure Applications on the AWS CloudSmartronix - Building Secure Applications on the AWS Cloud
Smartronix - Building Secure Applications on the AWS CloudAmazon Web Services
 

Semelhante a Data Loss Prevention de RSA (20)

Vormetric - Gherkin Event
Vormetric - Gherkin EventVormetric - Gherkin Event
Vormetric - Gherkin Event
 
What’s new in windows server 2012
What’s new in windows server 2012What’s new in windows server 2012
What’s new in windows server 2012
 
Viestintäaamupäivä exchange 2013
Viestintäaamupäivä exchange 2013Viestintäaamupäivä exchange 2013
Viestintäaamupäivä exchange 2013
 
Windows Server 2012 Active Directory Domain and Trust (Forest Trust)
Windows Server 2012 Active Directory Domain and Trust (Forest Trust)Windows Server 2012 Active Directory Domain and Trust (Forest Trust)
Windows Server 2012 Active Directory Domain and Trust (Forest Trust)
 
Next Gen Data Center Implementing Network Storage with Server Blades, Cluster...
Next Gen Data Center Implementing Network Storage with Server Blades, Cluster...Next Gen Data Center Implementing Network Storage with Server Blades, Cluster...
Next Gen Data Center Implementing Network Storage with Server Blades, Cluster...
 
Security in the Cloud
Security in the CloudSecurity in the Cloud
Security in the Cloud
 
Security in the Cloud
Security in the CloudSecurity in the Cloud
Security in the Cloud
 
Risk Factory: PCI Shrink to Fit
Risk Factory: PCI Shrink to FitRisk Factory: PCI Shrink to Fit
Risk Factory: PCI Shrink to Fit
 
Exchange 2013 ABC's: Architecture, Best Practices and Client Access
Exchange 2013 ABC's: Architecture, Best Practices and Client AccessExchange 2013 ABC's: Architecture, Best Practices and Client Access
Exchange 2013 ABC's: Architecture, Best Practices and Client Access
 
Viestinnän seminaari 8.11.2012 / Exchange
Viestinnän seminaari 8.11.2012 / ExchangeViestinnän seminaari 8.11.2012 / Exchange
Viestinnän seminaari 8.11.2012 / Exchange
 
Tom McCann - Sopra
Tom McCann - SopraTom McCann - Sopra
Tom McCann - Sopra
 
Gtb Product Technical Present
Gtb Product Technical PresentGtb Product Technical Present
Gtb Product Technical Present
 
The 5 Keys To Virtual Backup Excellence Exa Grid And Veeam October 25 2012
The 5 Keys To Virtual Backup Excellence  Exa Grid And Veeam October 25 2012The 5 Keys To Virtual Backup Excellence  Exa Grid And Veeam October 25 2012
The 5 Keys To Virtual Backup Excellence Exa Grid And Veeam October 25 2012
 
Choosing Your Windows Azure Platform Strategy
Choosing Your Windows Azure Platform StrategyChoosing Your Windows Azure Platform Strategy
Choosing Your Windows Azure Platform Strategy
 
Citrix Day 2012: ShareFile
Citrix Day 2012: ShareFileCitrix Day 2012: ShareFile
Citrix Day 2012: ShareFile
 
SERVICE AGGREMENT IT
SERVICE AGGREMENT ITSERVICE AGGREMENT IT
SERVICE AGGREMENT IT
 
F5 Networks: architecture and risk management
F5 Networks: architecture and risk managementF5 Networks: architecture and risk management
F5 Networks: architecture and risk management
 
Aptare Introduction Presentation April 2012
Aptare Introduction Presentation April 2012Aptare Introduction Presentation April 2012
Aptare Introduction Presentation April 2012
 
Patterns of Cloud Applications Using Microsoft Azure Services Platform
Patterns of Cloud Applications Using Microsoft Azure Services PlatformPatterns of Cloud Applications Using Microsoft Azure Services Platform
Patterns of Cloud Applications Using Microsoft Azure Services Platform
 
Smartronix - Building Secure Applications on the AWS Cloud
Smartronix - Building Secure Applications on the AWS CloudSmartronix - Building Secure Applications on the AWS Cloud
Smartronix - Building Secure Applications on the AWS Cloud
 

Mais de AEC Networks

Soluciones de Seguridad para Banca & Finanzas
Soluciones de Seguridad para Banca & FinanzasSoluciones de Seguridad para Banca & Finanzas
Soluciones de Seguridad para Banca & FinanzasAEC Networks
 
F5 Networks - Soluciones para Banca & Finanzas
F5 Networks - Soluciones para Banca & FinanzasF5 Networks - Soluciones para Banca & Finanzas
F5 Networks - Soluciones para Banca & FinanzasAEC Networks
 
The Extreme Experience
The Extreme ExperienceThe Extreme Experience
The Extreme ExperienceAEC Networks
 
Barracuda Networks Solutions
Barracuda Networks SolutionsBarracuda Networks Solutions
Barracuda Networks SolutionsAEC Networks
 
Barracuda Networks Overview
Barracuda Networks OverviewBarracuda Networks Overview
Barracuda Networks OverviewAEC Networks
 
Blue Coat: Application Delivery Networks
Blue Coat: Application Delivery NetworksBlue Coat: Application Delivery Networks
Blue Coat: Application Delivery NetworksAEC Networks
 
Zscaler - webcast de Gartner - Los peligros ocultos detrás de su motor de bús...
Zscaler - webcast de Gartner - Los peligros ocultos detrás de su motor de bús...Zscaler - webcast de Gartner - Los peligros ocultos detrás de su motor de bús...
Zscaler - webcast de Gartner - Los peligros ocultos detrás de su motor de bús...AEC Networks
 
Cifrado de Datos - PGP Corporation
Cifrado de Datos - PGP CorporationCifrado de Datos - PGP Corporation
Cifrado de Datos - PGP CorporationAEC Networks
 
Virtualización de Archivos - F5 Networks
Virtualización de Archivos - F5 NetworksVirtualización de Archivos - F5 Networks
Virtualización de Archivos - F5 NetworksAEC Networks
 
Combatiendo Amenazas de Seguridad en la Nube - WatchGuard
Combatiendo Amenazas de Seguridad en la Nube - WatchGuardCombatiendo Amenazas de Seguridad en la Nube - WatchGuard
Combatiendo Amenazas de Seguridad en la Nube - WatchGuardAEC Networks
 
Virtualización en la Red del Data Center - Extreme Networks
Virtualización en la Red del Data Center - Extreme NetworksVirtualización en la Red del Data Center - Extreme Networks
Virtualización en la Red del Data Center - Extreme NetworksAEC Networks
 
Cata de Vinos de Chile
Cata de Vinos de ChileCata de Vinos de Chile
Cata de Vinos de ChileAEC Networks
 
Feliz Navidad 2009
Feliz Navidad 2009Feliz Navidad 2009
Feliz Navidad 2009AEC Networks
 
WatchGuard´s XCS Brochure
WatchGuard´s XCS BrochureWatchGuard´s XCS Brochure
WatchGuard´s XCS BrochureAEC Networks
 
Introduccion a enVision de RSA
Introduccion a enVision de RSAIntroduccion a enVision de RSA
Introduccion a enVision de RSAAEC Networks
 
Retos y Tendencias en Redes Convergentes
Retos y Tendencias en Redes ConvergentesRetos y Tendencias en Redes Convergentes
Retos y Tendencias en Redes ConvergentesAEC Networks
 

Mais de AEC Networks (17)

Soluciones de Seguridad para Banca & Finanzas
Soluciones de Seguridad para Banca & FinanzasSoluciones de Seguridad para Banca & Finanzas
Soluciones de Seguridad para Banca & Finanzas
 
F5 Networks - Soluciones para Banca & Finanzas
F5 Networks - Soluciones para Banca & FinanzasF5 Networks - Soluciones para Banca & Finanzas
F5 Networks - Soluciones para Banca & Finanzas
 
The Extreme Experience
The Extreme ExperienceThe Extreme Experience
The Extreme Experience
 
Barracuda Networks Solutions
Barracuda Networks SolutionsBarracuda Networks Solutions
Barracuda Networks Solutions
 
Barracuda Networks Overview
Barracuda Networks OverviewBarracuda Networks Overview
Barracuda Networks Overview
 
La Cerveza
La CervezaLa Cerveza
La Cerveza
 
Blue Coat: Application Delivery Networks
Blue Coat: Application Delivery NetworksBlue Coat: Application Delivery Networks
Blue Coat: Application Delivery Networks
 
Zscaler - webcast de Gartner - Los peligros ocultos detrás de su motor de bús...
Zscaler - webcast de Gartner - Los peligros ocultos detrás de su motor de bús...Zscaler - webcast de Gartner - Los peligros ocultos detrás de su motor de bús...
Zscaler - webcast de Gartner - Los peligros ocultos detrás de su motor de bús...
 
Cifrado de Datos - PGP Corporation
Cifrado de Datos - PGP CorporationCifrado de Datos - PGP Corporation
Cifrado de Datos - PGP Corporation
 
Virtualización de Archivos - F5 Networks
Virtualización de Archivos - F5 NetworksVirtualización de Archivos - F5 Networks
Virtualización de Archivos - F5 Networks
 
Combatiendo Amenazas de Seguridad en la Nube - WatchGuard
Combatiendo Amenazas de Seguridad en la Nube - WatchGuardCombatiendo Amenazas de Seguridad en la Nube - WatchGuard
Combatiendo Amenazas de Seguridad en la Nube - WatchGuard
 
Virtualización en la Red del Data Center - Extreme Networks
Virtualización en la Red del Data Center - Extreme NetworksVirtualización en la Red del Data Center - Extreme Networks
Virtualización en la Red del Data Center - Extreme Networks
 
Cata de Vinos de Chile
Cata de Vinos de ChileCata de Vinos de Chile
Cata de Vinos de Chile
 
Feliz Navidad 2009
Feliz Navidad 2009Feliz Navidad 2009
Feliz Navidad 2009
 
WatchGuard´s XCS Brochure
WatchGuard´s XCS BrochureWatchGuard´s XCS Brochure
WatchGuard´s XCS Brochure
 
Introduccion a enVision de RSA
Introduccion a enVision de RSAIntroduccion a enVision de RSA
Introduccion a enVision de RSA
 
Retos y Tendencias en Redes Convergentes
Retos y Tendencias en Redes ConvergentesRetos y Tendencias en Redes Convergentes
Retos y Tendencias en Redes Convergentes
 

Último

Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 

Último (20)

Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 

Data Loss Prevention de RSA

  • 1. RSA Data Loss Prevention(DLP) Suite Discover and Mitigate Business Risk from Sensitive Data
  • 2. RSA Data Loss Prevention Data Breaches Overview RSA DLP Solution Five Critical Factors Customer Case Studies 2 2
  • 3. Why is Information Security So Difficult? Endpoint Network/E-mail Apps/DB FS/CMS Storage LAN Internal Enterprise Production File Server Employees Applications Disk Arrays Backup WAN Database Tape VPN Backup Business Replica File Server Disk Arrays System Remote Analytics Employees Disk Arrays Backup Disk SharePoint and other Outsourced Staging Collaboration & Partners Dev. Content Mgmt Systems 3 Endpoint Network/E-mail Apps/DB FS/CMS Storage
  • 4. We Are Exposed At Every Point Endpoint Network/E-mail Apps/DB FS/CMS Storage LAN Network Leak Endpoint Privileged User Privileged User Tapes lost or Internal Email-IM-HTTP- Enterprise File Server theft/loss FTP-etc. BreachProduction Breach stolen Backup Employees Applications Database Disk Arrays WAN Tape VPN Backup E-mail leak or Business DB or Replica App, File Server Disk Arrays System Endpoint Leak File Server / CMS Remote packets sniffed Encryption Key via print/copy in transit Analytics Hack Hack Employees Disk Arrays Backup Disk SharePoint and other Public Outsourced Staging Collaboration & (Semi) Discarded disk IP Sent to Partners Unintentional Infrastructure Dev. non trusted user Access Hack Distribution Content User Trusted Mgmt exploited Misuse Systems 4 Endpoint Network/E-mail Apps/DB FS/CMS Storage
  • 5. There Are Many Point Solutions Endpoint Network/E-mail Apps/DB FS/CMS Storage Mobile Email Application File Encryption Encryption Encryption Encryption LAN Tape Internal Enterprise Production File Server Encryption Employees Applications Disk Arrays Backup WAN Database Tape Port Network Database CMS/FS Monitoring Monitoring Encryption Access Controls VPN Backup Business Replica File Server Disk Arrays System Remote File Network Activity Encryption Encryption Analytics Monitoring eDRM Employees Disk Encryption Disk Arrays Backup Disk App/DB SharePoint and other eDRM eDRM Outsourced Staging File Collaboration & Partners Discovery Discovery Dev. Content Mgmt Systems 5 Endpoint Network/E-mail Apps/DB FS/CMS Storage
  • 6. The Business Case for DLP Reduce Risk | Minimize Cost | Avoid Disruption Reduce Risk 1. What data can you catch? Where? 2. What can you do about it? 3. Time to Value Minimize Cost Avoid Disruption 1. Product 1. Consider the “who” not just “what” 2. People 2. Make controls transparent to users a) Setup/Maintain b) Investigations 3. Involve the data owners c) Remediation 3. Infrastructure 6
  • 7. RSA Data Loss Prevention Data Breaches Overview RSA DLP Solution Five Critical Factors Customer Case Studies 7 7
  • 8. RSA Data Loss Prevention Suite Policy System RSA DLP Reporting & Incident Management Administration Dashboard Workflow Enterprise Manager Policies Incidents DLP Datacenter DLP Network DLP Endpoint Discover sensitive data Monitor all traffic for Discover sensitive data from everywhere sensitive data and Monitor user actions Enforce controls on Enforce controls on Enforce controls on both sensitive data sensitive transmissions data and user actions Third Party Enforcement Controls 8
  • 9. Reducing Your Sources of Risk: Data at Rest Discover Analyze Remediate Rescan sources to measure and manage risk File shares, Servers, Laptops 300+ File types Databases & Repositories Remediation •Windows file shares •Microsoft Office Files •SharePoint • Secure Delete •Unix file shares •PDFs, PSTs •Documentum • Manual/Auto Move •NAS / SAN storage •Zip files •Microsoft Access • Manual/Auto Quarantine •Windows 2000, 2003 •CATIA files •Oracle, SQL • Notifications •Windows XP, Vista •Content Mgmt systems • eDRM 9
  • 10. Protecting Data in the Network: Data in Motion Monitor Analyze Enforce Email Instant Messages Web Traffic Remediation •SMTP email •Yahoo IM •FTP •Audit •Exchange, Lotus, etc. •MSN Messenger •HTTP •Block •Webmail •AOL Messenger •HTTPS •Encrypt •Text and attachments •TCP/IP •Log 10
  • 11. Protecting Data at the Endpoint: Data in Use Monitor Analyze Enforce Print & Burn USB Copy and Save As Actions & Controls •Local printers •External hard drives •Copy to Network shares • Allow •Network printers •Memory sticks •Copy to external drives • Justify •Burn to CDs/DVDs •Removable media •Save As to external • Block drives • Audit & Log 11
  • 12. How Can RSA DLP Solution Help? Identify and address sources of risk Discover Identify broken business processes Enforce data security policies for compliance Enforce Leverage third-party control solutions Educate employees on policy and risk Educate Provide insight into violations & policies Monitor and protect all egress points Protect Prevent sensitive data from leaking out 12
  • 13. How Can DLP Solutions Reduce Risk? Endpoint Network Apps/DB FS/CMS Storage Customers Privileged Privileged Privileged Privileged People Users Users Users Users • Discover unsafe user behavior and educate WWW Internal Production employees on security policies Employees eCommerce Applications Database Disk Arrays Backup Tape WAN Processes Enterprise Production Backup LAN Database File Server Disk • Identify and fix broken business processes Remote Campuses Applications Arrays System VPN Technology Business Analytics Replica Portals Disk Backup Remote • Leverage technology controls more effectively Employees Arrays Disk to secure data Outsourced Staging Collaboration & Dev. Disk Content Mgmt 13 Systems Arrays Partners 13
  • 14. RSA Data Loss Prevention Data Breaches Overview RSA DLP Solution Five Critical Factors Customer Case Studies 14 14
  • 15. Top 5 Success Factors for DLP E Policy & Identity Incident Enterprise Built-In vs. Classification Aware Workflow Scalability Bolt-On More policies and Identity awareness Consolidated alerts Scan more data Common policies better policies for for classification, with the right faster with lesser across the classification and controls and information to the hardware and infrastructure - risk mitigation remediation right people for the resources EMC, Cisco and right actions Microsoft 15
  • 16. Policy & Classification More policies and better policies for classification and risk mitigation • Unified policy framework • Best of breed classification • 150+ built in policy templates • Information Policy and Classification team • Highest accuracy per Wipro analysis 16
  • 17. Identity Awareness Identity awareness for classification, controls and remediation • Identity-based Policy E.g. Group x can send data y out • Identity-based notification E.g. Notify the persons manager • Identity-based control E.g. Lock this data so only group x can open • Integration with Microsoft Active Directory 17
  • 18. Incident Workflow Consolidated alerts with the right information to the right people for the right actions • Intelligent correlation of events into incidents • Right alerts to the right people in the right order • Intuitive workflow to remediate violations • Scheduled reports sent to subscribers automatically • Integration with RSA enVision to simplify security operations 18
  • 19. Enterprise Scalability E Scan more data faster with lesser hardware and resources • Support distributed deployments • Scale to 100’s of thousands of users • Unique Grid Scanning technology • Scan large amounts of data faster and cheaper 19
  • 20. Built-in Vs. Bolt-on Common policies across the infrastructure – Microsoft, Cisco and EMC • Leverage your existing infrastructure • Microsoft: Integration with Microsoft RMS and will also integrate RSA DLP data classification engine and policies into Microsoft infrastructure • Cisco: Integration with IronPort • EMC: Integration with Documentum, Celerra, SourceOne, etc. 20
  • 21. RSA Data Loss Prevention Data Breaches Overview RSA DLP Solution Five Critical Factors Customer Case Studies 21 21
  • 22. Customers From A Wide Range of Industries 22
  • 23. How Can We Help Your Current Status We Can Help Gathering Information By Offering 1. Investigating DLP in general 1. Risk Advisor to discover current risk 2. Identifying business drivers 2. Free Scan to support business case 3. Developing a business case 3. ROI/TCO analysis for DLP 4. Identifying a Project Sponsor 4. DLP workshop Planning to Procure and Deploy By Providing 1. Have a defined DLP project 1. A framework for DLP evaluation 2. An evaluation environment 2. Developing a detailed DLP project 3. A detailed DLP proposal 3. Evaluating DLP vendors 4. Deployment architecture 23
  • 24. 24