SlideShare uma empresa Scribd logo
1 de 19
www.Seqrite.com 1
www.Seqrite.com 2
Contents
• Architects of Data Loss (Classification)
• Classification of DATA
• What is Data Loss Prevention (DLP)?
• Why organizations need DLP solution?
• Various Operating systems & channels supported under DLP
• Data Transfer Channels and Data Settings (Exception and DLP License utilization)
• What is Data at Rest and DAR Scan in DLP?
• Case scenarios to identify customer expectations
• Summary
www.Seqrite.com 3
Classification of DATA
Active data stored in non-
persistent digital sate
- in RAM, CPU caches,
registry entries etc.
Stored physically in any
digital form - databases,
data warehouses, archives,
spreadsheets, off-site
backups, tapes etc.
Data
in use
Data
at rest
Data in
motion
Data that traverses a network
or temporarily reside in
computer memory - emails,
downloaded files, VPN data
sharing etc.
www.Seqrite.com 4
Architects of Data Loss (Classification)
Employees/Insiders who accidentally
lose data.
Employees/Insiders who deliberately
leak data.
Attacker/Outsiders who target
specific silos of data.
www.Seqrite.com 5
Architects of Data Loss- Interesting Facts
59%
of employees
steal proprietary
corporate data
when they quit
or are fired.
80%
of analyzed
breaches had a
financial motive
60%
reported cases
analyzed that
attackers are able
to compromise
an organization
within minutes.
12.7mn
records exposed
in 454 data
breaches
reported during
2016
80%
4 out of 5 victims
don’t realize they’ve
been attacked for a
week or longer.
www.Seqrite.com 6
Why companies need DLP solution when it comes to data loss?
Employees or insiders are often the cause of deliberate or
accidental data breaches in established industries all around the
world.
The common source of accidental data leakage by employees can be
attributed to the following:
• Employees under-estimates the risks of data leakage
• Employees think that their IT policies are foolproof and secure
• Employees don't actively think about security as an issue
• Employees are not overly concerned with security protocols
• Employees generally neglects the recommended IT policies
www.Seqrite.com 7
What is DLP?
DLP is the methodology to identify and forestall the unauthorized
communication or disclosure of confidential data. In order to
ensure that sensitive information is utilized in its intended
manner, DLP consolidates people, technology and processes.
Reference: Seqrite Whitepaper on DLP
www.Seqrite.com 8
Windows Client and
Network OS
Mac OS X 10.6, 10.7,
10.8, 10.9, 10.10
Operating systems Channels Supported
Print Screen
Removable Devices
Network Shared
Clipboard
Printer Activity
Application/Online
Services.
Various Operating Systems & channels supported under DLP
www.Seqrite.com 9
Explaining Available Data Transfer Channels
Print Screen Using the Print Screen option to save the screenshot. (On Windows only)
Removable
Devices
Using Removable Devices to copy data (for Windows). For selected file types, the Removable
Devices go to ‘Read Only’ mode when ‘Monitor Removable Devices’ option is selected.
Network
Shares
Using Network Share accessed using UNC Path or Mapped Network Drive. (For Windows only)
Clipboard Using the Clipboard to paste information from one application to another
Printer
Activity
Using printer activity, printing through local and network printer. The file/data is not monitored.
(Windows only)
Application/
online Services
Using online services of third-party application/services to send data such as email, file sharing
apps, cloud services, Web browsers and other applications using social media
www.Seqrite.com 10
Disable Print Screen
• Using the Print Screen option to save the screenshot
• It works also for Alt + Print screen
• Applicable only for Windows platform
Benefits:
• This is the easiest method if someone wants to capture some information from
computer as it reduces the efforts of keyboard typing
• Enabling this channel will minimize the risk of data leakage if the user is trying to
take the snap of computer screen in order to capture some sensitive/confidential
information
www.Seqrite.com 11
Removable Devices
• If we block some specific file types from removable drives, users will not able to
copy those files to PC or from PC to drive
• Users will get an alert message & a report will be created for the same
• File will be copied but it will be of 0 KB. So it is unusable
• If we try to copy three files from which one is blocked, the blocked file will not be
copied
• Applicable only for Windows platform
Benefits:
Useful where users don’t want to block removable devices completely i.e. IT admins
can configure DLP with important file types.
www.Seqrite.com 12
Monitor Network Share
• Using Network Share accessed using UNC Path (192.168.x.x or PC-name) or
Mapped Network Drive
• PC having client agent & DLP applied for network sharing will not be able to access
any files via sharing irrespective of the other PC having Seqrite installed or not
• Applicable only for Windows platform
Benefits:
• With removable drives being controlled by DLP, employees/others try to break the
company protocols by transferring data over the network. By enabling Monitor
Network Share, if end-users try to copy confidential data from one network
location to another, the data transfer will be blocked.
www.Seqrite.com 13
Clipboard
• Using the Clipboard to paste information from one application to another.
Benefits:
• Applicable only to confidential data & user-defined dictionaries.
• Data will not be copied even if you select full line or word containing blocked word.
• E.g. Master card is blocked. So 5555555555554444 can't be copied.
Also, Mastercard5555555555554444Visa will be blocked.
www.Seqrite.com 14
Printer Activity
• Printer activity over local and network printer can now be monitored
• Data will not be monitored while printing
• It will either block or allow printing independent of the data being printed
• Supported only on Windows platform
Benefits:
• IT admins can grant printer privileges on specific endpoints. Taking printouts of
documents is only allowed on those endpoints where admins grant printing
privileges. This ensures that even if the user is attempting data leakage using Print
Channel it will be denied.
www.Seqrite.com 15
Latest Enhancements
P
DLP for specific group:
Customer can buy DLP as per requirement i.e. less than or same as that of EPS license.
This is flexible i.e. IT admins can add/remove clients from DLP list as per need.
Custom Extension:
IT admin can define custom file extension if in case it is not in default list. This helps to
monitor/control almost all known/unknown file types through DLP.
Domain Exception:
Helpful to exclude certain domains while sharing DLP monitored data where customer
wants to exclude internal or some trusted domains from DLP.
Exclusion for File Share/Network Locations:
Can exclude require (centralized data repository) mapped drives or folders to allow users
to store the data at these locations.
D
L
P
www.Seqrite.com 16
Data at Rest Scan
Why DAR?
1. Usually most of the organizations are concerned about data transfer and not about the data stored in system which is not in
motion
2. Organizations also expects that sensitive data should be kept at recommended location to avoid unauthorized access
3. In such cases DAR helps you to find sensitive/confidential data stored in your system
4. You can scan the desired location such as drive, folder, or removable devices on the endpoints and detect the confidential
or sensitive information present
5. You can view the information related to the detected confidential data such as the file path, threat type, and matched text
Benefits:
• Based on this analysis IT admins/ owner of the organization take timely actions in order to make sure that the decided
Data Storage Policy is being followed by his employees.
www.Seqrite.com 17
Case Scenario
A customer is interested in Seqrite EPS with DLP and has certain expectations.
CONDITION 1: Wants to restrict some of the file types through email clients but the same can be shared only within the
organization under existing DLP policy.
CONDITION 2: Has its own software to create some graphic files but that extension is not in default DLP list and wants to
monitor it too.
CONDITION 3: Wants to restrict all Instant Messengers (IMs) except Skype on specific user endpoints.
What do we have in bucket?
SOLUTION 1: To share files within the organization you can add your mail domain in Domain Exception.
SOLUTION 2: If the required extension is unavailable in pre-defined extension then we have the facility to add Custom
Extensions from EPS 7.1.
SOLUTION 3: You can restrict IM tools through Online/Application services and can add Skype in Application exception list
from Admin Settings.
www.Seqrite.com 18
Summary of Benefits
• In today’s competitive world, many organizations are keen to keep their confidential data secure. Seqrite DLP helps the
customer to achieve this goal.
• If someone intentionally tries to transfer the data using certain data channels, in such cases, correct DLP configuration
detects and denies such activities
• In Government organizations/offices confidential data module plays a vital role to prevent any authorized and unauthorized
user to leak such information to outsiders. Example: PAN CARD
• Custom Extension helps to include other file types apart from default
• DAR Scan helps you to make sure that your IT policies related to DATA are being properly followed by your employees
• Most importantly, if you spend on a DLP solution in return, it decreases the restoration cost
• No need to buy DLP for all endpoints. Need based requirement reduces the surplus investment
• DLP reports keep IT admins/owner updated about violation incidents and to identify untrusted individuals
(Internal/External).
www.Seqrite.com 19
Thank You

Mais conteúdo relacionado

Mais procurados

Introducing Data Loss Prevention 14
Introducing Data Loss Prevention 14Introducing Data Loss Prevention 14
Introducing Data Loss Prevention 14
Symantec
 
Active Directory Proposal
Active Directory ProposalActive Directory Proposal
Active Directory Proposal
MJ Ferdous
 

Mais procurados (20)

Technology Overview - Symantec Data Loss Prevention (DLP)
Technology Overview - Symantec Data Loss Prevention (DLP)Technology Overview - Symantec Data Loss Prevention (DLP)
Technology Overview - Symantec Data Loss Prevention (DLP)
 
Cato Management Console
Cato Management ConsoleCato Management Console
Cato Management Console
 
Introducing Data Loss Prevention 14
Introducing Data Loss Prevention 14Introducing Data Loss Prevention 14
Introducing Data Loss Prevention 14
 
Office 365 data loss prevention
Office 365 data loss preventionOffice 365 data loss prevention
Office 365 data loss prevention
 
Meraki Overview
Meraki OverviewMeraki Overview
Meraki Overview
 
Azure Information Protection
Azure Information ProtectionAzure Information Protection
Azure Information Protection
 
Active Directory
Active DirectoryActive Directory
Active Directory
 
CollabDaysBE - Microsoft Purview Information Protection demystified
CollabDaysBE - Microsoft Purview Information Protection demystifiedCollabDaysBE - Microsoft Purview Information Protection demystified
CollabDaysBE - Microsoft Purview Information Protection demystified
 
SDWAN vs MPLS: What Enterprises need?
SDWAN vs MPLS: What Enterprises need?SDWAN vs MPLS: What Enterprises need?
SDWAN vs MPLS: What Enterprises need?
 
Microsoft Windows 10 for the Enterprise
Microsoft Windows 10 for the EnterpriseMicrosoft Windows 10 for the Enterprise
Microsoft Windows 10 for the Enterprise
 
Delivering Data Democratization in the Cloud with Snowflake
Delivering Data Democratization in the Cloud with SnowflakeDelivering Data Democratization in the Cloud with Snowflake
Delivering Data Democratization in the Cloud with Snowflake
 
Overview SQL Server 2019
Overview SQL Server 2019Overview SQL Server 2019
Overview SQL Server 2019
 
Active Directory Proposal
Active Directory ProposalActive Directory Proposal
Active Directory Proposal
 
Palo Alto Networks 28.5.2013
Palo Alto Networks 28.5.2013Palo Alto Networks 28.5.2013
Palo Alto Networks 28.5.2013
 
DAS RAID NAS SAN
DAS RAID NAS SANDAS RAID NAS SAN
DAS RAID NAS SAN
 
What’s New in Oracle Database 19c - Part 1
What’s New in Oracle Database 19c - Part 1What’s New in Oracle Database 19c - Part 1
What’s New in Oracle Database 19c - Part 1
 
Data Mess to Data Mesh | Jay Kreps, CEO, Confluent | Kafka Summit Americas 20...
Data Mess to Data Mesh | Jay Kreps, CEO, Confluent | Kafka Summit Americas 20...Data Mess to Data Mesh | Jay Kreps, CEO, Confluent | Kafka Summit Americas 20...
Data Mess to Data Mesh | Jay Kreps, CEO, Confluent | Kafka Summit Americas 20...
 
LDAP
LDAPLDAP
LDAP
 
AV/DF Advanced Security Option
AV/DF Advanced Security OptionAV/DF Advanced Security Option
AV/DF Advanced Security Option
 
Data Mesh in Practice - How Europe's Leading Online Platform for Fashion Goes...
Data Mesh in Practice - How Europe's Leading Online Platform for Fashion Goes...Data Mesh in Practice - How Europe's Leading Online Platform for Fashion Goes...
Data Mesh in Practice - How Europe's Leading Online Platform for Fashion Goes...
 

Semelhante a Seqrite Data Loss Prevention- Complete Protection from Data Theft and Data Loss

Enabling a Data Mesh Architecture with Data Virtualization
Enabling a Data Mesh Architecture with Data VirtualizationEnabling a Data Mesh Architecture with Data Virtualization
Enabling a Data Mesh Architecture with Data Virtualization
Denodo
 
MobileDBSecurity.pptx
MobileDBSecurity.pptxMobileDBSecurity.pptx
MobileDBSecurity.pptx
missionsk81
 

Semelhante a Seqrite Data Loss Prevention- Complete Protection from Data Theft and Data Loss (20)

DG_Architecture_Training.pptx
DG_Architecture_Training.pptxDG_Architecture_Training.pptx
DG_Architecture_Training.pptx
 
Make the Upgrade: Data protection in the cloud
Make the Upgrade: Data protection in the cloudMake the Upgrade: Data protection in the cloud
Make the Upgrade: Data protection in the cloud
 
Microsoft Azure Rights Management
Microsoft Azure Rights ManagementMicrosoft Azure Rights Management
Microsoft Azure Rights Management
 
Asug84339 how to secure privacy data in a hybrid s4 hana landscape
Asug84339   how to secure privacy data in a hybrid s4 hana landscapeAsug84339   how to secure privacy data in a hybrid s4 hana landscape
Asug84339 how to secure privacy data in a hybrid s4 hana landscape
 
Data Leakage Prevention
Data Leakage PreventionData Leakage Prevention
Data Leakage Prevention
 
Mcafee data loss_prevention_11.6.x_product_guide_9-28-2021
Mcafee data loss_prevention_11.6.x_product_guide_9-28-2021Mcafee data loss_prevention_11.6.x_product_guide_9-28-2021
Mcafee data loss_prevention_11.6.x_product_guide_9-28-2021
 
Digital Rights Management One For Sharepoint
Digital Rights Management One For SharepointDigital Rights Management One For Sharepoint
Digital Rights Management One For Sharepoint
 
Creating a Multi-Layered Secured Postgres Database
Creating a Multi-Layered Secured Postgres DatabaseCreating a Multi-Layered Secured Postgres Database
Creating a Multi-Layered Secured Postgres Database
 
Enabling a Data Mesh Architecture with Data Virtualization
Enabling a Data Mesh Architecture with Data VirtualizationEnabling a Data Mesh Architecture with Data Virtualization
Enabling a Data Mesh Architecture with Data Virtualization
 
Encrypting and Protecting Your Data in Neo4j(Jeff_Tallman).pptx
Encrypting and Protecting Your Data in Neo4j(Jeff_Tallman).pptxEncrypting and Protecting Your Data in Neo4j(Jeff_Tallman).pptx
Encrypting and Protecting Your Data in Neo4j(Jeff_Tallman).pptx
 
A proposed Solution: Data Availability and Error Correction in Cloud Computing
A proposed Solution: Data Availability and Error Correction in Cloud ComputingA proposed Solution: Data Availability and Error Correction in Cloud Computing
A proposed Solution: Data Availability and Error Correction in Cloud Computing
 
Cloud slide
Cloud slideCloud slide
Cloud slide
 
Webinar: Endpoint Backup is not Enough - You Need an End-user Data Strategy
Webinar: Endpoint Backup is not Enough - You Need an End-user Data StrategyWebinar: Endpoint Backup is not Enough - You Need an End-user Data Strategy
Webinar: Endpoint Backup is not Enough - You Need an End-user Data Strategy
 
Essential Layers of IBM i Security: File and Field Security
Essential Layers of IBM i Security: File and Field SecurityEssential Layers of IBM i Security: File and Field Security
Essential Layers of IBM i Security: File and Field Security
 
MobileDBSecurity.pptx
MobileDBSecurity.pptxMobileDBSecurity.pptx
MobileDBSecurity.pptx
 
ClouDoc brochure_eng_20160708
ClouDoc brochure_eng_20160708ClouDoc brochure_eng_20160708
ClouDoc brochure_eng_20160708
 
DSS ITSEC 2013 Conference 07.11.2013 - For your eyes only - Symantec PGP Re-L...
DSS ITSEC 2013 Conference 07.11.2013 - For your eyes only - Symantec PGP Re-L...DSS ITSEC 2013 Conference 07.11.2013 - For your eyes only - Symantec PGP Re-L...
DSS ITSEC 2013 Conference 07.11.2013 - For your eyes only - Symantec PGP Re-L...
 
Clou doc intro_eng_20160524
Clou doc intro_eng_20160524Clou doc intro_eng_20160524
Clou doc intro_eng_20160524
 
Achieving Secure, sclable and finegrained Cloud computing report
Achieving Secure, sclable and finegrained Cloud computing reportAchieving Secure, sclable and finegrained Cloud computing report
Achieving Secure, sclable and finegrained Cloud computing report
 
Software Defined Networking in the ATMOSPHERE project
Software Defined Networking in the ATMOSPHERE projectSoftware Defined Networking in the ATMOSPHERE project
Software Defined Networking in the ATMOSPHERE project
 

Mais de Quick Heal Technologies Ltd.

Mais de Quick Heal Technologies Ltd. (20)

Digital Threat Landscape
Digital Threat LandscapeDigital Threat Landscape
Digital Threat Landscape
 
Cybersecurity in Banking Sector
Cybersecurity in Banking SectorCybersecurity in Banking Sector
Cybersecurity in Banking Sector
 
31 Internet Security Tips on CyberSecurity Month Ocotober
31 Internet Security Tips on CyberSecurity Month Ocotober31 Internet Security Tips on CyberSecurity Month Ocotober
31 Internet Security Tips on CyberSecurity Month Ocotober
 
How a Ransomware Infects your Computer [INFOGRAPHIC]
How a Ransomware Infects your Computer [INFOGRAPHIC]How a Ransomware Infects your Computer [INFOGRAPHIC]
How a Ransomware Infects your Computer [INFOGRAPHIC]
 
Next-Gen Security Solution: Gateway Protection
Next-Gen Security Solution: Gateway ProtectionNext-Gen Security Solution: Gateway Protection
Next-Gen Security Solution: Gateway Protection
 
Centralized Patch Management - Proven Security Approach for Ransomware Protec...
Centralized Patch Management - Proven Security Approach for Ransomware Protec...Centralized Patch Management - Proven Security Approach for Ransomware Protec...
Centralized Patch Management - Proven Security Approach for Ransomware Protec...
 
Protecting Your organization from WannaCry Ransomware
Protecting Your organization from WannaCry RansomwareProtecting Your organization from WannaCry Ransomware
Protecting Your organization from WannaCry Ransomware
 
Is Antivirus (AV) Dead or Just Missing in Action
Is Antivirus (AV) Dead or Just Missing in Action Is Antivirus (AV) Dead or Just Missing in Action
Is Antivirus (AV) Dead or Just Missing in Action
 
Safeguard your enterprise against ransomware
Safeguard your enterprise against ransomwareSafeguard your enterprise against ransomware
Safeguard your enterprise against ransomware
 
Data Security in Healthcare
Data Security in HealthcareData Security in Healthcare
Data Security in Healthcare
 
GITEX 2016, Dubai
GITEX 2016, Dubai GITEX 2016, Dubai
GITEX 2016, Dubai
 
Seqrite EPS 7.0 launched in Poland by valued distributors, IT Dystrybucja 24
Seqrite EPS 7.0 launched in Poland by valued distributors, IT Dystrybucja 24Seqrite EPS 7.0 launched in Poland by valued distributors, IT Dystrybucja 24
Seqrite EPS 7.0 launched in Poland by valued distributors, IT Dystrybucja 24
 
Maharashtra Cooperative Summit 2016
Maharashtra Cooperative Summit 2016Maharashtra Cooperative Summit 2016
Maharashtra Cooperative Summit 2016
 
Seqrite Hyderabad Meet 2016
Seqrite Hyderabad Meet 2016 Seqrite Hyderabad Meet 2016
Seqrite Hyderabad Meet 2016
 
Seqrite CXO Meet, Ahmedabad, India
Seqrite CXO Meet, Ahmedabad, IndiaSeqrite CXO Meet, Ahmedabad, India
Seqrite CXO Meet, Ahmedabad, India
 
Fonetastic ppt
Fonetastic pptFonetastic ppt
Fonetastic ppt
 
Seqrite Launch Event in Athens, Greece.
Seqrite Launch Event in Athens, Greece.Seqrite Launch Event in Athens, Greece.
Seqrite Launch Event in Athens, Greece.
 
BFSI Leadership Summit, Mumbai
BFSI Leadership Summit, MumbaiBFSI Leadership Summit, Mumbai
BFSI Leadership Summit, Mumbai
 
Jnana Sangama Day 1 - National convention for higher education
Jnana Sangama Day 1 - National convention for higher educationJnana Sangama Day 1 - National convention for higher education
Jnana Sangama Day 1 - National convention for higher education
 
Event S-Mart Milan, Italy - May 2016
Event S-Mart Milan, Italy - May 2016Event S-Mart Milan, Italy - May 2016
Event S-Mart Milan, Italy - May 2016
 

Último

%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
masabamasaba
 
%+27788225528 love spells in Toronto Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Toronto Psychic Readings, Attraction spells,Brin...%+27788225528 love spells in Toronto Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Toronto Psychic Readings, Attraction spells,Brin...
masabamasaba
 
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
Health
 
%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...
%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...
%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...
masabamasaba
 
%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...
%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...
%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...
masabamasaba
 

Último (20)

%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
 
WSO2CON 2024 - How to Run a Security Program
WSO2CON 2024 - How to Run a Security ProgramWSO2CON 2024 - How to Run a Security Program
WSO2CON 2024 - How to Run a Security Program
 
WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...
WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...
WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...
 
Announcing Codolex 2.0 from GDK Software
Announcing Codolex 2.0 from GDK SoftwareAnnouncing Codolex 2.0 from GDK Software
Announcing Codolex 2.0 from GDK Software
 
%in tembisa+277-882-255-28 abortion pills for sale in tembisa
%in tembisa+277-882-255-28 abortion pills for sale in tembisa%in tembisa+277-882-255-28 abortion pills for sale in tembisa
%in tembisa+277-882-255-28 abortion pills for sale in tembisa
 
%+27788225528 love spells in Toronto Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Toronto Psychic Readings, Attraction spells,Brin...%+27788225528 love spells in Toronto Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Toronto Psychic Readings, Attraction spells,Brin...
 
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
 
Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...
Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...
Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...
 
VTU technical seminar 8Th Sem on Scikit-learn
VTU technical seminar 8Th Sem on Scikit-learnVTU technical seminar 8Th Sem on Scikit-learn
VTU technical seminar 8Th Sem on Scikit-learn
 
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain
 
%in kempton park+277-882-255-28 abortion pills for sale in kempton park
%in kempton park+277-882-255-28 abortion pills for sale in kempton park %in kempton park+277-882-255-28 abortion pills for sale in kempton park
%in kempton park+277-882-255-28 abortion pills for sale in kempton park
 
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
 
%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...
%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...
%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...
 
MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...
MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...
MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...
 
Devoxx UK 2024 - Going serverless with Quarkus, GraalVM native images and AWS...
Devoxx UK 2024 - Going serverless with Quarkus, GraalVM native images and AWS...Devoxx UK 2024 - Going serverless with Quarkus, GraalVM native images and AWS...
Devoxx UK 2024 - Going serverless with Quarkus, GraalVM native images and AWS...
 
WSO2CON 2024 - API Management Usage at La Poste and Its Impact on Business an...
WSO2CON 2024 - API Management Usage at La Poste and Its Impact on Business an...WSO2CON 2024 - API Management Usage at La Poste and Its Impact on Business an...
WSO2CON 2024 - API Management Usage at La Poste and Its Impact on Business an...
 
%in tembisa+277-882-255-28 abortion pills for sale in tembisa
%in tembisa+277-882-255-28 abortion pills for sale in tembisa%in tembisa+277-882-255-28 abortion pills for sale in tembisa
%in tembisa+277-882-255-28 abortion pills for sale in tembisa
 
%in Rustenburg+277-882-255-28 abortion pills for sale in Rustenburg
%in Rustenburg+277-882-255-28 abortion pills for sale in Rustenburg%in Rustenburg+277-882-255-28 abortion pills for sale in Rustenburg
%in Rustenburg+277-882-255-28 abortion pills for sale in Rustenburg
 
%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...
%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...
%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...
 
tonesoftg
tonesoftgtonesoftg
tonesoftg
 

Seqrite Data Loss Prevention- Complete Protection from Data Theft and Data Loss

  • 2. www.Seqrite.com 2 Contents • Architects of Data Loss (Classification) • Classification of DATA • What is Data Loss Prevention (DLP)? • Why organizations need DLP solution? • Various Operating systems & channels supported under DLP • Data Transfer Channels and Data Settings (Exception and DLP License utilization) • What is Data at Rest and DAR Scan in DLP? • Case scenarios to identify customer expectations • Summary
  • 3. www.Seqrite.com 3 Classification of DATA Active data stored in non- persistent digital sate - in RAM, CPU caches, registry entries etc. Stored physically in any digital form - databases, data warehouses, archives, spreadsheets, off-site backups, tapes etc. Data in use Data at rest Data in motion Data that traverses a network or temporarily reside in computer memory - emails, downloaded files, VPN data sharing etc.
  • 4. www.Seqrite.com 4 Architects of Data Loss (Classification) Employees/Insiders who accidentally lose data. Employees/Insiders who deliberately leak data. Attacker/Outsiders who target specific silos of data.
  • 5. www.Seqrite.com 5 Architects of Data Loss- Interesting Facts 59% of employees steal proprietary corporate data when they quit or are fired. 80% of analyzed breaches had a financial motive 60% reported cases analyzed that attackers are able to compromise an organization within minutes. 12.7mn records exposed in 454 data breaches reported during 2016 80% 4 out of 5 victims don’t realize they’ve been attacked for a week or longer.
  • 6. www.Seqrite.com 6 Why companies need DLP solution when it comes to data loss? Employees or insiders are often the cause of deliberate or accidental data breaches in established industries all around the world. The common source of accidental data leakage by employees can be attributed to the following: • Employees under-estimates the risks of data leakage • Employees think that their IT policies are foolproof and secure • Employees don't actively think about security as an issue • Employees are not overly concerned with security protocols • Employees generally neglects the recommended IT policies
  • 7. www.Seqrite.com 7 What is DLP? DLP is the methodology to identify and forestall the unauthorized communication or disclosure of confidential data. In order to ensure that sensitive information is utilized in its intended manner, DLP consolidates people, technology and processes. Reference: Seqrite Whitepaper on DLP
  • 8. www.Seqrite.com 8 Windows Client and Network OS Mac OS X 10.6, 10.7, 10.8, 10.9, 10.10 Operating systems Channels Supported Print Screen Removable Devices Network Shared Clipboard Printer Activity Application/Online Services. Various Operating Systems & channels supported under DLP
  • 9. www.Seqrite.com 9 Explaining Available Data Transfer Channels Print Screen Using the Print Screen option to save the screenshot. (On Windows only) Removable Devices Using Removable Devices to copy data (for Windows). For selected file types, the Removable Devices go to ‘Read Only’ mode when ‘Monitor Removable Devices’ option is selected. Network Shares Using Network Share accessed using UNC Path or Mapped Network Drive. (For Windows only) Clipboard Using the Clipboard to paste information from one application to another Printer Activity Using printer activity, printing through local and network printer. The file/data is not monitored. (Windows only) Application/ online Services Using online services of third-party application/services to send data such as email, file sharing apps, cloud services, Web browsers and other applications using social media
  • 10. www.Seqrite.com 10 Disable Print Screen • Using the Print Screen option to save the screenshot • It works also for Alt + Print screen • Applicable only for Windows platform Benefits: • This is the easiest method if someone wants to capture some information from computer as it reduces the efforts of keyboard typing • Enabling this channel will minimize the risk of data leakage if the user is trying to take the snap of computer screen in order to capture some sensitive/confidential information
  • 11. www.Seqrite.com 11 Removable Devices • If we block some specific file types from removable drives, users will not able to copy those files to PC or from PC to drive • Users will get an alert message & a report will be created for the same • File will be copied but it will be of 0 KB. So it is unusable • If we try to copy three files from which one is blocked, the blocked file will not be copied • Applicable only for Windows platform Benefits: Useful where users don’t want to block removable devices completely i.e. IT admins can configure DLP with important file types.
  • 12. www.Seqrite.com 12 Monitor Network Share • Using Network Share accessed using UNC Path (192.168.x.x or PC-name) or Mapped Network Drive • PC having client agent & DLP applied for network sharing will not be able to access any files via sharing irrespective of the other PC having Seqrite installed or not • Applicable only for Windows platform Benefits: • With removable drives being controlled by DLP, employees/others try to break the company protocols by transferring data over the network. By enabling Monitor Network Share, if end-users try to copy confidential data from one network location to another, the data transfer will be blocked.
  • 13. www.Seqrite.com 13 Clipboard • Using the Clipboard to paste information from one application to another. Benefits: • Applicable only to confidential data & user-defined dictionaries. • Data will not be copied even if you select full line or word containing blocked word. • E.g. Master card is blocked. So 5555555555554444 can't be copied. Also, Mastercard5555555555554444Visa will be blocked.
  • 14. www.Seqrite.com 14 Printer Activity • Printer activity over local and network printer can now be monitored • Data will not be monitored while printing • It will either block or allow printing independent of the data being printed • Supported only on Windows platform Benefits: • IT admins can grant printer privileges on specific endpoints. Taking printouts of documents is only allowed on those endpoints where admins grant printing privileges. This ensures that even if the user is attempting data leakage using Print Channel it will be denied.
  • 15. www.Seqrite.com 15 Latest Enhancements P DLP for specific group: Customer can buy DLP as per requirement i.e. less than or same as that of EPS license. This is flexible i.e. IT admins can add/remove clients from DLP list as per need. Custom Extension: IT admin can define custom file extension if in case it is not in default list. This helps to monitor/control almost all known/unknown file types through DLP. Domain Exception: Helpful to exclude certain domains while sharing DLP monitored data where customer wants to exclude internal or some trusted domains from DLP. Exclusion for File Share/Network Locations: Can exclude require (centralized data repository) mapped drives or folders to allow users to store the data at these locations. D L P
  • 16. www.Seqrite.com 16 Data at Rest Scan Why DAR? 1. Usually most of the organizations are concerned about data transfer and not about the data stored in system which is not in motion 2. Organizations also expects that sensitive data should be kept at recommended location to avoid unauthorized access 3. In such cases DAR helps you to find sensitive/confidential data stored in your system 4. You can scan the desired location such as drive, folder, or removable devices on the endpoints and detect the confidential or sensitive information present 5. You can view the information related to the detected confidential data such as the file path, threat type, and matched text Benefits: • Based on this analysis IT admins/ owner of the organization take timely actions in order to make sure that the decided Data Storage Policy is being followed by his employees.
  • 17. www.Seqrite.com 17 Case Scenario A customer is interested in Seqrite EPS with DLP and has certain expectations. CONDITION 1: Wants to restrict some of the file types through email clients but the same can be shared only within the organization under existing DLP policy. CONDITION 2: Has its own software to create some graphic files but that extension is not in default DLP list and wants to monitor it too. CONDITION 3: Wants to restrict all Instant Messengers (IMs) except Skype on specific user endpoints. What do we have in bucket? SOLUTION 1: To share files within the organization you can add your mail domain in Domain Exception. SOLUTION 2: If the required extension is unavailable in pre-defined extension then we have the facility to add Custom Extensions from EPS 7.1. SOLUTION 3: You can restrict IM tools through Online/Application services and can add Skype in Application exception list from Admin Settings.
  • 18. www.Seqrite.com 18 Summary of Benefits • In today’s competitive world, many organizations are keen to keep their confidential data secure. Seqrite DLP helps the customer to achieve this goal. • If someone intentionally tries to transfer the data using certain data channels, in such cases, correct DLP configuration detects and denies such activities • In Government organizations/offices confidential data module plays a vital role to prevent any authorized and unauthorized user to leak such information to outsiders. Example: PAN CARD • Custom Extension helps to include other file types apart from default • DAR Scan helps you to make sure that your IT policies related to DATA are being properly followed by your employees • Most importantly, if you spend on a DLP solution in return, it decreases the restoration cost • No need to buy DLP for all endpoints. Need based requirement reduces the surplus investment • DLP reports keep IT admins/owner updated about violation incidents and to identify untrusted individuals (Internal/External).