SlideShare uma empresa Scribd logo
1 de 20
Baixar para ler offline
CORPORATE
Services
              2012 March




                           1
Agenda

1.    Who are we?
2.    Loss of control over information
3.    The solution
4.    Value

                                         2
•  Company with extensive experience and high expertise in the
   development of advanced information security solutions

•  Our researchers and engineers have relevant
   publications in the security sector

•  Drainware® is proprietary technology of intelligent
   content analysis and data

                    consists: DLP and Web Filter
        CORPORATE

                                                                 3
Corporate Network scheme




                           4
Threats to data
•  Insecurity of access to information derived from users
   unconsciously




                                                            5
Threats to data
•  Malicious users create insecurity in the management of
   corporate information




                                                            6
Threats to data
•  Corporate information suffers an additional threat to the
   possibility of external attacks by hackers or competitors




                                                               7
New concerns




               8
Network risks
                                            100%

•  Risks                                    90%
    o  Social network
    o  Mobile devices                       80%

                                            70%
•  Factors:
                                            60%
    o  Emerging technologies
    o  Risks not controlled from            50%
       IT departments or non
       regulated by internal rules          40%
                                                                                 Today
                                            30%
58% of companies in the world
WITHOUT concerted strategy                  20%
for safe use by employees of
the mobile and social networks              10%


           Source: PricewaterhouseCoopers    0%
                                                               World
                                                                               Malware for mobile
                                                   Without Security Strategy
                                                                               devices and social
                                                   With Security Strategy
                                                                                   networks
                                               Security in the enterprises
                                                                                                9
Compliance of legislation
•    SB-1386
•    HIPAA
•    GLBA
•    Sarbanes-Oxley
•    US PII
•    PCI



                            10
Data Leak Prevention
•  CONTROL AND PROTECTION OF THE SENSITIVE
   INFORMATION through Data Leak Prevention:
  o    Protection of all confidential and sensitive information
  o    Preservation of the competitive advantages
  o    Comply with the data protection legislation
  o    Limit the damage of laptop theft


•  Action
  o  All sensitive and confidential information is monitored and all
     abnormal actions are reported
  o  The information can be found in use, moving through the network,
     or stored
                                                                    11
Data Leak Prevention




                       12
MS Windows DLP




                 13
E-mail DLP
•  Blocking leakage of sensitive information




                                               14
Customization of severity




                            15
Track Laptops
•  DLP Drainware records the location and activity of a lost
   or stolen laptop




                                                               16
Drainware Rights Management




                          17
Additional features
•  Webfilter
   o  Blocking of websites based on categories

•  HTTP Antivirus
   o  Limit the download of web pages or files
      with virus
   o  Integration with antivirus through ICAP
•  Advertising block
   o  Removal of Advertising
   o  Block Pop-up
   o  Browser-independent technology

•  Anti-phising
   o  Protection of bank fraud in real time
   o  Intelligent analysis engine identifying
      phishing
   o  Daily integration with phishing databases

                                                  18
Drainware Corporate Service




                              19
The Drainware Service
    Values
    o Security
    o Dynamism
    o Efficiency



                   www.drainware.com


                                  20

Mais conteúdo relacionado

Mais procurados

ACS Talk (Melbourne) - The future of security
ACS Talk (Melbourne) - The future of securityACS Talk (Melbourne) - The future of security
ACS Talk (Melbourne) - The future of securitysiswarren
 
[CB21] Keynote1:Shaking the Cybersecurity Kaleidoscope – An Immersive Look in...
[CB21] Keynote1:Shaking the Cybersecurity Kaleidoscope – An Immersive Look in...[CB21] Keynote1:Shaking the Cybersecurity Kaleidoscope – An Immersive Look in...
[CB21] Keynote1:Shaking the Cybersecurity Kaleidoscope – An Immersive Look in...CODE BLUE
 
IoT security presented in Ada's List Conference
IoT security presented in Ada's List ConferenceIoT security presented in Ada's List Conference
IoT security presented in Ada's List ConferenceCigdem Sengul
 
การสร้างเกราะป้องกันภัยคุกคาม ต่อข้อมูลความเป็นส่วนบุคคลในองค์กร
การสร้างเกราะป้องกันภัยคุกคาม ต่อข้อมูลความเป็นส่วนบุคคลในองค์กรการสร้างเกราะป้องกันภัยคุกคาม ต่อข้อมูลความเป็นส่วนบุคคลในองค์กร
การสร้างเกราะป้องกันภัยคุกคาม ต่อข้อมูลความเป็นส่วนบุคคลในองค์กรSoftware Park Thailand
 
Reduciendo su riesgo cibernético midiendo su Cyber Exposure
Reduciendo su riesgo cibernético midiendo su Cyber Exposure Reduciendo su riesgo cibernético midiendo su Cyber Exposure
Reduciendo su riesgo cibernético midiendo su Cyber Exposure Cristian Garcia G.
 
IoT security patterns
IoT security patterns IoT security patterns
IoT security patterns Exosite
 
Seguridad en Capas: Smart & Actionable Data
Seguridad en Capas: Smart & Actionable DataSeguridad en Capas: Smart & Actionable Data
Seguridad en Capas: Smart & Actionable DataCristian Garcia G.
 
Security and Privacy considerations in Internet of Things
Security and Privacy considerations in Internet of ThingsSecurity and Privacy considerations in Internet of Things
Security and Privacy considerations in Internet of ThingsSomasundaram Jambunathan
 
Cisco Cyber Security Essentials Chapter-1
Cisco Cyber Security Essentials Chapter-1Cisco Cyber Security Essentials Chapter-1
Cisco Cyber Security Essentials Chapter-1Mukesh Chinta
 
Investigating Cybercrime in the UK
Investigating Cybercrime in the UKInvestigating Cybercrime in the UK
Investigating Cybercrime in the UKNapier University
 
LaTronic 8 Page Web Optimized
LaTronic 8 Page Web OptimizedLaTronic 8 Page Web Optimized
LaTronic 8 Page Web OptimizedJermaine Isaac
 
SC Magazine & ForeScout Survey Results
SC Magazine & ForeScout Survey ResultsSC Magazine & ForeScout Survey Results
SC Magazine & ForeScout Survey ResultsForeScout Technologies
 
Boosting IoT Protection: An Enterprise Risk Imperative
Boosting IoT Protection: An Enterprise Risk ImperativeBoosting IoT Protection: An Enterprise Risk Imperative
Boosting IoT Protection: An Enterprise Risk ImperativeNational Retail Federation
 

Mais procurados (20)

Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Nac market
Nac marketNac market
Nac market
 
ACS Talk (Melbourne) - The future of security
ACS Talk (Melbourne) - The future of securityACS Talk (Melbourne) - The future of security
ACS Talk (Melbourne) - The future of security
 
[CB21] Keynote1:Shaking the Cybersecurity Kaleidoscope – An Immersive Look in...
[CB21] Keynote1:Shaking the Cybersecurity Kaleidoscope – An Immersive Look in...[CB21] Keynote1:Shaking the Cybersecurity Kaleidoscope – An Immersive Look in...
[CB21] Keynote1:Shaking the Cybersecurity Kaleidoscope – An Immersive Look in...
 
IoT security presented in Ada's List Conference
IoT security presented in Ada's List ConferenceIoT security presented in Ada's List Conference
IoT security presented in Ada's List Conference
 
การสร้างเกราะป้องกันภัยคุกคาม ต่อข้อมูลความเป็นส่วนบุคคลในองค์กร
การสร้างเกราะป้องกันภัยคุกคาม ต่อข้อมูลความเป็นส่วนบุคคลในองค์กรการสร้างเกราะป้องกันภัยคุกคาม ต่อข้อมูลความเป็นส่วนบุคคลในองค์กร
การสร้างเกราะป้องกันภัยคุกคาม ต่อข้อมูลความเป็นส่วนบุคคลในองค์กร
 
Iot(security)
Iot(security)Iot(security)
Iot(security)
 
Reduciendo su riesgo cibernético midiendo su Cyber Exposure
Reduciendo su riesgo cibernético midiendo su Cyber Exposure Reduciendo su riesgo cibernético midiendo su Cyber Exposure
Reduciendo su riesgo cibernético midiendo su Cyber Exposure
 
IoT security patterns
IoT security patterns IoT security patterns
IoT security patterns
 
Seguridad en Capas: Smart & Actionable Data
Seguridad en Capas: Smart & Actionable DataSeguridad en Capas: Smart & Actionable Data
Seguridad en Capas: Smart & Actionable Data
 
Protecting Americas Next Generation Networks
Protecting Americas Next Generation NetworksProtecting Americas Next Generation Networks
Protecting Americas Next Generation Networks
 
Evento 15 aprile
Evento 15 aprileEvento 15 aprile
Evento 15 aprile
 
Security and Privacy considerations in Internet of Things
Security and Privacy considerations in Internet of ThingsSecurity and Privacy considerations in Internet of Things
Security and Privacy considerations in Internet of Things
 
Don't let wireless_detour_your_pci_compliance
Don't let wireless_detour_your_pci_complianceDon't let wireless_detour_your_pci_compliance
Don't let wireless_detour_your_pci_compliance
 
Cisco Cyber Security Essentials Chapter-1
Cisco Cyber Security Essentials Chapter-1Cisco Cyber Security Essentials Chapter-1
Cisco Cyber Security Essentials Chapter-1
 
Investigating Cybercrime in the UK
Investigating Cybercrime in the UKInvestigating Cybercrime in the UK
Investigating Cybercrime in the UK
 
LaTronic 8 Page Web Optimized
LaTronic 8 Page Web OptimizedLaTronic 8 Page Web Optimized
LaTronic 8 Page Web Optimized
 
160415 lan and-wan-ctap
160415 lan and-wan-ctap160415 lan and-wan-ctap
160415 lan and-wan-ctap
 
SC Magazine & ForeScout Survey Results
SC Magazine & ForeScout Survey ResultsSC Magazine & ForeScout Survey Results
SC Magazine & ForeScout Survey Results
 
Boosting IoT Protection: An Enterprise Risk Imperative
Boosting IoT Protection: An Enterprise Risk ImperativeBoosting IoT Protection: An Enterprise Risk Imperative
Boosting IoT Protection: An Enterprise Risk Imperative
 

Semelhante a Drainware Corporate

Is6120 data security presentation
Is6120 data security presentationIs6120 data security presentation
Is6120 data security presentationJamesDempsey1
 
Top Risks of Enterprise Mobility
Top Risks of Enterprise MobilityTop Risks of Enterprise Mobility
Top Risks of Enterprise MobilitySymantec
 
Information Technology Security Basics
Information Technology Security BasicsInformation Technology Security Basics
Information Technology Security BasicsMohan Jadhav
 
Network Security of Data Protection
Network Security of Data ProtectionNetwork Security of Data Protection
Network Security of Data ProtectionUthsoNandy
 
Information Security Risk Management
Information Security Risk ManagementInformation Security Risk Management
Information Security Risk Managementipspat
 
The Top 7 Causes of Major Security Breaches
The Top 7 Causes of Major Security BreachesThe Top 7 Causes of Major Security Breaches
The Top 7 Causes of Major Security BreachesKaseya
 
Zero Trust: Redefining Security in the Digital Age
Zero Trust: Redefining Security in the Digital AgeZero Trust: Redefining Security in the Digital Age
Zero Trust: Redefining Security in the Digital AgeArnold Antoo
 
Mobile Application Security
Mobile Application SecurityMobile Application Security
Mobile Application SecurityLenin Aboagye
 
Segurinfo2014 Santiago Cavanna
Segurinfo2014 Santiago CavannaSegurinfo2014 Santiago Cavanna
Segurinfo2014 Santiago CavannaSantiago Cavanna
 
Defending Behind the Mobile Device
Defending Behind the Mobile DeviceDefending Behind the Mobile Device
Defending Behind the Mobile DeviceTyler Shields
 
Sholove cyren web security - technical datasheet2
Sholove cyren web security  - technical datasheet2Sholove cyren web security  - technical datasheet2
Sholove cyren web security - technical datasheet2SHOLOVE INTERNATIONAL LLC
 
GISEC 2015 Your Network in the Eyes of a Hacker - DTS Solution
GISEC 2015 Your Network in the Eyes of a Hacker - DTS SolutionGISEC 2015 Your Network in the Eyes of a Hacker - DTS Solution
GISEC 2015 Your Network in the Eyes of a Hacker - DTS SolutionShah Sheikh
 
kaspersky presentation for palette business solution June 2016 v1.0.
kaspersky presentation for palette business solution June 2016 v1.0.kaspersky presentation for palette business solution June 2016 v1.0.
kaspersky presentation for palette business solution June 2016 v1.0.Onwubiko Emmanuel
 

Semelhante a Drainware Corporate (20)

Is6120 data security presentation
Is6120 data security presentationIs6120 data security presentation
Is6120 data security presentation
 
Top Risks of Enterprise Mobility
Top Risks of Enterprise MobilityTop Risks of Enterprise Mobility
Top Risks of Enterprise Mobility
 
Mobile Apps Security
Mobile Apps SecurityMobile Apps Security
Mobile Apps Security
 
Information Technology Security Basics
Information Technology Security BasicsInformation Technology Security Basics
Information Technology Security Basics
 
Iot cyber security
Iot cyber securityIot cyber security
Iot cyber security
 
Network Security of Data Protection
Network Security of Data ProtectionNetwork Security of Data Protection
Network Security of Data Protection
 
Information Security Risk Management
Information Security Risk ManagementInformation Security Risk Management
Information Security Risk Management
 
The Top 7 Causes of Major Security Breaches
The Top 7 Causes of Major Security BreachesThe Top 7 Causes of Major Security Breaches
The Top 7 Causes of Major Security Breaches
 
BYOD and Your Business
BYOD and Your BusinessBYOD and Your Business
BYOD and Your Business
 
Zero Trust: Redefining Security in the Digital Age
Zero Trust: Redefining Security in the Digital AgeZero Trust: Redefining Security in the Digital Age
Zero Trust: Redefining Security in the Digital Age
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Mobile Application Security
Mobile Application SecurityMobile Application Security
Mobile Application Security
 
Mobile application securitry risks ISACA Silicon Valley 2012
Mobile application securitry risks ISACA Silicon Valley 2012Mobile application securitry risks ISACA Silicon Valley 2012
Mobile application securitry risks ISACA Silicon Valley 2012
 
Segurinfo2014 Santiago Cavanna
Segurinfo2014 Santiago CavannaSegurinfo2014 Santiago Cavanna
Segurinfo2014 Santiago Cavanna
 
Perimeter Security is Failing
Perimeter Security is FailingPerimeter Security is Failing
Perimeter Security is Failing
 
Defending Behind the Mobile Device
Defending Behind the Mobile DeviceDefending Behind the Mobile Device
Defending Behind the Mobile Device
 
Sholove cyren web security - technical datasheet2
Sholove cyren web security  - technical datasheet2Sholove cyren web security  - technical datasheet2
Sholove cyren web security - technical datasheet2
 
A6704d01
A6704d01A6704d01
A6704d01
 
GISEC 2015 Your Network in the Eyes of a Hacker - DTS Solution
GISEC 2015 Your Network in the Eyes of a Hacker - DTS SolutionGISEC 2015 Your Network in the Eyes of a Hacker - DTS Solution
GISEC 2015 Your Network in the Eyes of a Hacker - DTS Solution
 
kaspersky presentation for palette business solution June 2016 v1.0.
kaspersky presentation for palette business solution June 2016 v1.0.kaspersky presentation for palette business solution June 2016 v1.0.
kaspersky presentation for palette business solution June 2016 v1.0.
 

Drainware Corporate

  • 1. CORPORATE Services 2012 March 1
  • 2. Agenda 1.  Who are we? 2.  Loss of control over information 3.  The solution 4.  Value 2
  • 3. •  Company with extensive experience and high expertise in the development of advanced information security solutions •  Our researchers and engineers have relevant publications in the security sector •  Drainware® is proprietary technology of intelligent content analysis and data consists: DLP and Web Filter CORPORATE 3
  • 5. Threats to data •  Insecurity of access to information derived from users unconsciously 5
  • 6. Threats to data •  Malicious users create insecurity in the management of corporate information 6
  • 7. Threats to data •  Corporate information suffers an additional threat to the possibility of external attacks by hackers or competitors 7
  • 9. Network risks 100% •  Risks 90% o  Social network o  Mobile devices 80% 70% •  Factors: 60% o  Emerging technologies o  Risks not controlled from 50% IT departments or non regulated by internal rules 40% Today 30% 58% of companies in the world WITHOUT concerted strategy 20% for safe use by employees of the mobile and social networks 10% Source: PricewaterhouseCoopers 0% World Malware for mobile Without Security Strategy devices and social With Security Strategy networks Security in the enterprises 9
  • 10. Compliance of legislation •  SB-1386 •  HIPAA •  GLBA •  Sarbanes-Oxley •  US PII •  PCI 10
  • 11. Data Leak Prevention •  CONTROL AND PROTECTION OF THE SENSITIVE INFORMATION through Data Leak Prevention: o  Protection of all confidential and sensitive information o  Preservation of the competitive advantages o  Comply with the data protection legislation o  Limit the damage of laptop theft •  Action o  All sensitive and confidential information is monitored and all abnormal actions are reported o  The information can be found in use, moving through the network, or stored 11
  • 14. E-mail DLP •  Blocking leakage of sensitive information 14
  • 16. Track Laptops •  DLP Drainware records the location and activity of a lost or stolen laptop 16
  • 18. Additional features •  Webfilter o  Blocking of websites based on categories •  HTTP Antivirus o  Limit the download of web pages or files with virus o  Integration with antivirus through ICAP •  Advertising block o  Removal of Advertising o  Block Pop-up o  Browser-independent technology •  Anti-phising o  Protection of bank fraud in real time o  Intelligent analysis engine identifying phishing o  Daily integration with phishing databases 18
  • 20. The Drainware Service Values o Security o Dynamism o Efficiency www.drainware.com 20