SlideShare uma empresa Scribd logo
1 de 32
Information & Identity Protection

    Data Loss Prevention, Encryption, User Authentication


Information & Identity Protection Overview                  1
Agenda



           1        People and Information-Centric Security

           2        Symantec’s Information & Identity Protection Suite

           3        Next Steps




Information & Identity Protection Overview                               2
Data Breaches are Top of Mind
                            Insiders and Partners
                            • Employees and partners stealing customer data and IP
                            • 68% of breaches are caused by user negligence and system
                              glitches

                            Compliance
                            • Breach notification and encryption enforcement laws are
                              pervasive and now have real costs
                            • Average cost of a data breach is up to $7.2 million

                            External Threats
                            • Lead to the most expensive cost per record breached: $318
                            • Attackers are profit driven or politically motivated


Information & Identity Protection Overview                                                3
Evolving to Information-Centric Security

               System-                       Information-        People &
               Centric                       Centric             Information-
                                                                 Centric




           NEW BUSINESS TRENDS                                        NEW THREATS

    • Collaborative apps and social                         • WikiLeaks
      media                                                 • Hacker Collectives
    • Information explosion                                 • LulzSec
    • Virtual infrastructure and cloud                      • Anonymous
    • Mobile workforce                                      • State-sponsored, targeted attacks




Information & Identity Protection Overview                                                        4
As companies focus on securing their data,
                                             security professionals increasingly recognize that
                                             access control and information management are
                                             key components of data security. Proper
                                             management and control of user accounts,
                                             access permissions, and privileges is one of the
                                             most effective avenues to ensuring that data
                                             doesn’t walk out the door. Often, you must
    Khalid Kark                              demonstrate controls around segregation of
    CISO Advisor, Forrester                  duties, privileged access, and stronger
                                             authentication for Internet-facing applications to
                                             meet regulatory requirements.



Information & Identity Protection Overview                                                    5
Key Components of Information-Centric Security


                                             • Where is the sensitive data?
            AWARENESS
                                             • How is it being used?



            IDENTITY                         • Who should have access to sensitive data?




                                             • How to enforce data policies?
            PROTECTION
                                             • How to prevent breach?



Information & Identity Protection Overview                                                 6
Reducing Risk with Information and Identity Protection

                       IDENTITY              AWARENESS   PROTECTION
                  Authentication                DLP      Encryption

                      Passwords               Network      Email
                                                             +
 RISK




                      Heuristics                 +
                                              Endpoint    Endpoint
                     Two Factor
                                                +            +
                      Biometric               Storage      Storage




Information & Identity Protection Overview                            7
Information & Identity Protection Solution Portfolio
Map

                                              Storage DLP        Network DLP      Endpoint DLP
                                              • Where is the sensitive data?
            AWARENESS
                                              • How is it being used?


                                                            User Authentication
            IDENTITY                         • Who should have access to that data?
                                             Behavior       Two-Factor          PKI


                                             Shared Storage          Email          Endpoint
                                              • Encryption
                                                 How to enforce data policies?
                                                                  Encryption       Encryption
            PROTECTION
                                              • How to prevent breach?



Information & Identity Protection Overview                                                      8
Information & Identity Protection
    Solutions



Information & Identity Protection Overview   9
Symantec User Authentication Products

                Risk-Based                    Tokens & Mobile               Certificate
          • Machine and                                                • Cloud based
            configuration                    • Multiple form factors     infrastructure
            registered
                                             • Over 700 handsets       • Certificates for
          • Risk score determined              supported                 devices and people
            by machine, access
            pattern




                                     Symantec™ Management Platform

                              Symantec™ VIP/PKI Authentication Services



Information & Identity Protection Overview                                                    10
Symantec Encryption Products

                   Storage                          Endpoint                 Email

         • PGP™                               • PGP™ Whole Disk
                                                                     • PGP™ Gateway Email
           NetShareEncryption                   Encryption
                                                                       Encryption
         • PGP™ Command Line                  • Symantec Endpoint
                                                                     • PGP™ BlackBerry/iOS
           Encryption                           Encryption™
                                                                       Encryption
                                                Removable Storage
                                                                     • PGP™ Desktop Email
                                                                       Encryption



                                     Symantec™ Management Platform

                                             PGP™ Universal Server



Information & Identity Protection Overview                                                   11
Symantec Data Loss Prevention Products

                   Storage                          Endpoint                 Network
         • Symantec™                         • Symantec™              • Symantec™
           Data Loss                           Data Loss                Data Loss
           PreventionNetwork                   PreventionEndpoint       PreventionNetwork
           Discover                            Discover                 Monitor

         • Symantec™                         • Symantec™              • Symantec™
           Data Loss Prevention                Data Loss Prevention     Data Loss Prevention
           Data Insight                        Endpoint Prevent         Network Prevent

         • Symantec™
           Data Loss Prevention
           Network Protect

                                     Symantec™ Management Platform

                         Symantec™ Data Loss Prevention Enforce Platform



Information & Identity Protection Overview                                                     12
Defense-In-Depth: Encryption + Data Loss Prevention
                            Network DLP / Email Gateway Encryption
                            • Automatically encrypt emails containing sensitive data
                            • Notify employees in real time/context about encryption policies and tools



                            Storage DLP / Shared Storage Encryption
                            • Discover where confidential data files are stored and automatically apply
                              encryption
                            • Ease the burden to IT staff with near transparence to users


                            Endpoint DLP / Endpoint Encryption
                            • Target high risk users by discovering what laptops contain sensitive data
                            • Protect AND enable the business by targeting encryption efforts to
                              sensitive data moving to USB devices


Information & Identity Protection Overview                                                                13
The Symantec Advantage



             Integrated                                                      Flexible User
                                                    Broad DLP
             Encryption                                                     Authentication




  Protects data across                          Identifies sensitive   Strong authentication
laptops, mobile devices,                      information requiring     for people and their
   servers, and email                            protection across            devices
    communications                           endpoints, network, and
                                                      storage


Information & Identity Protection Overview                                                     14
Thank you!
    For more information, download:
     Whitepaper: Data Protection Strategies



    Copyright © 2011 Symantec Corporation. All rights reserved. Symantec and the Symantec Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in
    the U.S. and other countries. Other names may be trademarks of their respective owners.

    This document is provided for informational purposes only and is not intended as advertising. All warranties relating to the information in this document, either express or implied,
    are disclaimed to the maximum extent allowed by law. The information in this document is subject to change without notice.


Information & Identity Protection Overview                                                                                                                                                  15
Internet Security Threat Report (ISTR) Vol. 16
Internet Security Threat Report (ISTR) Vol. 16
Internet Security Threat Report (ISTR) Vol. 16
Internet Security Threat Report (ISTR) Vol. 16
Internet Security Threat Report (ISTR) Vol. 16
Internet Security Threat Report (ISTR) Vol. 16
Internet Security Threat Report (ISTR) Vol. 16
Internet Security Threat Report (ISTR) Vol. 16
Internet Security Threat Report (ISTR) Vol. 16
Internet Security Threat Report (ISTR) Vol. 16
Internet Security Threat Report (ISTR) Vol. 16
Internet Security Threat Report (ISTR) Vol. 16
Internet Security Threat Report (ISTR) Vol. 16
Internet Security Threat Report (ISTR) Vol. 16
Internet Security Threat Report (ISTR) Vol. 16
Internet Security Threat Report (ISTR) Vol. 16
Internet Security Threat Report (ISTR) Vol. 16

Mais conteúdo relacionado

Mais procurados

ISSA: Next Generation Tokenization for Compliance and Cloud Data Protection
ISSA: Next Generation Tokenization for Compliance and Cloud Data ProtectionISSA: Next Generation Tokenization for Compliance and Cloud Data Protection
ISSA: Next Generation Tokenization for Compliance and Cloud Data Protection
Ulf Mattsson
 
Trend micro data protection
Trend micro data protectionTrend micro data protection
Trend micro data protection
Andrew Wong
 
Trend micro real time threat management press presentation
Trend micro real time threat management press presentationTrend micro real time threat management press presentation
Trend micro real time threat management press presentation
Andrew Wong
 
Widepoint orc thales webinar 111313d - nov 2013
Widepoint orc thales webinar 111313d - nov 2013Widepoint orc thales webinar 111313d - nov 2013
Widepoint orc thales webinar 111313d - nov 2013
Federation for Identity and Cross-Credentialing Systems (FiXs)
 
Extending security in the cloud network box - v4
Extending security in the cloud   network box - v4Extending security in the cloud   network box - v4
Extending security in the cloud network box - v4
Valencell, Inc.
 
Cyber Security Privacy Brochure 2015
Cyber Security Privacy Brochure 2015Cyber Security Privacy Brochure 2015
Cyber Security Privacy Brochure 2015
sarah kabirat
 
Hakin9 interview w Prof Sood
Hakin9 interview w Prof SoodHakin9 interview w Prof Sood
Hakin9 interview w Prof Sood
Zsolt Nemeth
 
GTB Technologies Datasheet 2014
GTB Technologies Datasheet 2014GTB Technologies Datasheet 2014
GTB Technologies Datasheet 2014
Ravindran Vasu
 

Mais procurados (20)

Tokenization on the Node - Data Protection for Security and Compliance
Tokenization on the Node - Data Protection for Security and ComplianceTokenization on the Node - Data Protection for Security and Compliance
Tokenization on the Node - Data Protection for Security and Compliance
 
Targeted Attacks: Have you found yours?
Targeted Attacks: Have you found yours?Targeted Attacks: Have you found yours?
Targeted Attacks: Have you found yours?
 
Insights Into Modern Day Threat Protection
Insights Into Modern Day Threat ProtectionInsights Into Modern Day Threat Protection
Insights Into Modern Day Threat Protection
 
ISSA: Next Generation Tokenization for Compliance and Cloud Data Protection
ISSA: Next Generation Tokenization for Compliance and Cloud Data ProtectionISSA: Next Generation Tokenization for Compliance and Cloud Data Protection
ISSA: Next Generation Tokenization for Compliance and Cloud Data Protection
 
Trend micro data protection
Trend micro data protectionTrend micro data protection
Trend micro data protection
 
Trend micro real time threat management press presentation
Trend micro real time threat management press presentationTrend micro real time threat management press presentation
Trend micro real time threat management press presentation
 
Widepoint orc thales webinar 111313d - nov 2013
Widepoint orc thales webinar 111313d - nov 2013Widepoint orc thales webinar 111313d - nov 2013
Widepoint orc thales webinar 111313d - nov 2013
 
Modern Cyber Threat Protection techniques for Enterprises
Modern Cyber Threat Protection techniques for EnterprisesModern Cyber Threat Protection techniques for Enterprises
Modern Cyber Threat Protection techniques for Enterprises
 
Securing Your Digital Files from Legal Threats
Securing Your Digital Files from Legal ThreatsSecuring Your Digital Files from Legal Threats
Securing Your Digital Files from Legal Threats
 
Extending security in the cloud network box - v4
Extending security in the cloud   network box - v4Extending security in the cloud   network box - v4
Extending security in the cloud network box - v4
 
Iadis Tns2007 Presentation
Iadis Tns2007 PresentationIadis Tns2007 Presentation
Iadis Tns2007 Presentation
 
DSS ITSEC CONFERENCE - Lumension Security - Intelligent application whiteli...
DSS   ITSEC CONFERENCE - Lumension Security - Intelligent application whiteli...DSS   ITSEC CONFERENCE - Lumension Security - Intelligent application whiteli...
DSS ITSEC CONFERENCE - Lumension Security - Intelligent application whiteli...
 
Cyber Security Privacy Brochure 2015
Cyber Security Privacy Brochure 2015Cyber Security Privacy Brochure 2015
Cyber Security Privacy Brochure 2015
 
Cyber Threats & Cybersecurity - Are You Ready? - Jared Carstensen
Cyber Threats & Cybersecurity - Are You Ready? - Jared CarstensenCyber Threats & Cybersecurity - Are You Ready? - Jared Carstensen
Cyber Threats & Cybersecurity - Are You Ready? - Jared Carstensen
 
Icete Secrypt2007 Presentation
Icete Secrypt2007 PresentationIcete Secrypt2007 Presentation
Icete Secrypt2007 Presentation
 
Risk Management Practices for PCI DSS 2.0
Risk Management Practices for PCI DSS 2.0Risk Management Practices for PCI DSS 2.0
Risk Management Practices for PCI DSS 2.0
 
Hakin9 interview w Prof Sood
Hakin9 interview w Prof SoodHakin9 interview w Prof Sood
Hakin9 interview w Prof Sood
 
Big Data and Security - Where are we now? (2015)
Big Data and Security - Where are we now? (2015)Big Data and Security - Where are we now? (2015)
Big Data and Security - Where are we now? (2015)
 
GTB Technologies Datasheet 2014
GTB Technologies Datasheet 2014GTB Technologies Datasheet 2014
GTB Technologies Datasheet 2014
 
Winkler Cloud, ORCON, and Mobility
Winkler Cloud, ORCON, and MobilityWinkler Cloud, ORCON, and Mobility
Winkler Cloud, ORCON, and Mobility
 

Destaque

Symantec's Internet Security Threat Report for the Government Sector
Symantec's Internet Security Threat Report for the Government SectorSymantec's Internet Security Threat Report for the Government Sector
Symantec's Internet Security Threat Report for the Government Sector
Symantec
 

Destaque (6)

Annual security report cisco 2016 persian revision
Annual security report cisco 2016 persian revisionAnnual security report cisco 2016 persian revision
Annual security report cisco 2016 persian revision
 
2016 Symantec Internet Security Threat Report
2016 Symantec Internet Security Threat Report2016 Symantec Internet Security Threat Report
2016 Symantec Internet Security Threat Report
 
Symantec's Internet Security Threat Report for the Government Sector
Symantec's Internet Security Threat Report for the Government SectorSymantec's Internet Security Threat Report for the Government Sector
Symantec's Internet Security Threat Report for the Government Sector
 
Cisco 2016 Security Report
Cisco 2016 Security Report Cisco 2016 Security Report
Cisco 2016 Security Report
 
Cisco's 2016 Annual Security report
Cisco's 2016 Annual Security reportCisco's 2016 Annual Security report
Cisco's 2016 Annual Security report
 
Securing the Cloud
Securing the CloudSecuring the Cloud
Securing the Cloud
 

Semelhante a Internet Security Threat Report (ISTR) Vol. 16

Mobile Application Security
Mobile Application SecurityMobile Application Security
Mobile Application Security
Lenin Aboagye
 
Information Systems.pptx
Information Systems.pptxInformation Systems.pptx
Information Systems.pptx
KnownId
 
2011 hildebrandt institute cio forum data privacy and security presentation...
2011 hildebrandt institute cio forum   data privacy and security presentation...2011 hildebrandt institute cio forum   data privacy and security presentation...
2011 hildebrandt institute cio forum data privacy and security presentation...
David Cunningham
 

Semelhante a Internet Security Threat Report (ISTR) Vol. 16 (20)

Mobile application securitry risks ISACA Silicon Valley 2012
Mobile application securitry risks ISACA Silicon Valley 2012Mobile application securitry risks ISACA Silicon Valley 2012
Mobile application securitry risks ISACA Silicon Valley 2012
 
Mobile Application Security
Mobile Application SecurityMobile Application Security
Mobile Application Security
 
Information Security for Small Business
Information Security for Small BusinessInformation Security for Small Business
Information Security for Small Business
 
Information Security for Small Business
Information Security for Small BusinessInformation Security for Small Business
Information Security for Small Business
 
Microsoft India - Forefront Value Of Identity And Security Offerings Presenta...
Microsoft India - Forefront Value Of Identity And Security Offerings Presenta...Microsoft India - Forefront Value Of Identity And Security Offerings Presenta...
Microsoft India - Forefront Value Of Identity And Security Offerings Presenta...
 
Symantec Data Insight
Symantec Data InsightSymantec Data Insight
Symantec Data Insight
 
IT Compliance and Governance with DLP Controls and Vulnerability Scanning Sof...
IT Compliance and Governance with DLP Controls and Vulnerability Scanning Sof...IT Compliance and Governance with DLP Controls and Vulnerability Scanning Sof...
IT Compliance and Governance with DLP Controls and Vulnerability Scanning Sof...
 
Micro Focus SRG Solution Mapping to the New BDDK Regulations for Turkish Fina...
Micro Focus SRG Solution Mapping to the New BDDK Regulations for Turkish Fina...Micro Focus SRG Solution Mapping to the New BDDK Regulations for Turkish Fina...
Micro Focus SRG Solution Mapping to the New BDDK Regulations for Turkish Fina...
 
The day when 3rd party security providers disappear into cloud bright talk se...
The day when 3rd party security providers disappear into cloud bright talk se...The day when 3rd party security providers disappear into cloud bright talk se...
The day when 3rd party security providers disappear into cloud bright talk se...
 
Introduction to Mydex CIC Personal Data Stores - 7th March 2013
Introduction to Mydex CIC Personal Data Stores -  7th March 2013Introduction to Mydex CIC Personal Data Stores -  7th March 2013
Introduction to Mydex CIC Personal Data Stores - 7th March 2013
 
Cloud Security Checklist and Planning Guide Summary
Cloud Security Checklist and Planning Guide Summary Cloud Security Checklist and Planning Guide Summary
Cloud Security Checklist and Planning Guide Summary
 
FROM STRATEGY TO ACTION - Vasil Tsvimitidze
FROM STRATEGY TO ACTION - Vasil Tsvimitidze FROM STRATEGY TO ACTION - Vasil Tsvimitidze
FROM STRATEGY TO ACTION - Vasil Tsvimitidze
 
SYMCAnnual
SYMCAnnualSYMCAnnual
SYMCAnnual
 
Information Systems.pptx
Information Systems.pptxInformation Systems.pptx
Information Systems.pptx
 
PCTY 2012, IBM Security and Strategy v. Fabio Panada
PCTY 2012, IBM Security and Strategy v. Fabio PanadaPCTY 2012, IBM Security and Strategy v. Fabio Panada
PCTY 2012, IBM Security and Strategy v. Fabio Panada
 
Trust in a Digital World
Trust in a Digital WorldTrust in a Digital World
Trust in a Digital World
 
2011 hildebrandt institute cio forum data privacy and security presentation...
2011 hildebrandt institute cio forum   data privacy and security presentation...2011 hildebrandt institute cio forum   data privacy and security presentation...
2011 hildebrandt institute cio forum data privacy and security presentation...
 
Electronic data & record management
Electronic data & record managementElectronic data & record management
Electronic data & record management
 
Current trends in information security โดย ผศ.ดร.ปราโมทย์ กั่วเจริญ
Current trends in information security โดย ผศ.ดร.ปราโมทย์ กั่วเจริญCurrent trends in information security โดย ผศ.ดร.ปราโมทย์ กั่วเจริญ
Current trends in information security โดย ผศ.ดร.ปราโมทย์ กั่วเจริญ
 
CYBER SECURITY WHAT IS IT AND WHAT YOU NEED TO KNOW.pdf
CYBER SECURITY WHAT IS IT AND WHAT YOU NEED TO KNOW.pdfCYBER SECURITY WHAT IS IT AND WHAT YOU NEED TO KNOW.pdf
CYBER SECURITY WHAT IS IT AND WHAT YOU NEED TO KNOW.pdf
 

Último

Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 

Último (20)

Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 

Internet Security Threat Report (ISTR) Vol. 16

  • 1. Information & Identity Protection Data Loss Prevention, Encryption, User Authentication Information & Identity Protection Overview 1
  • 2. Agenda 1 People and Information-Centric Security 2 Symantec’s Information & Identity Protection Suite 3 Next Steps Information & Identity Protection Overview 2
  • 3. Data Breaches are Top of Mind Insiders and Partners • Employees and partners stealing customer data and IP • 68% of breaches are caused by user negligence and system glitches Compliance • Breach notification and encryption enforcement laws are pervasive and now have real costs • Average cost of a data breach is up to $7.2 million External Threats • Lead to the most expensive cost per record breached: $318 • Attackers are profit driven or politically motivated Information & Identity Protection Overview 3
  • 4. Evolving to Information-Centric Security System- Information- People & Centric Centric Information- Centric NEW BUSINESS TRENDS NEW THREATS • Collaborative apps and social • WikiLeaks media • Hacker Collectives • Information explosion • LulzSec • Virtual infrastructure and cloud • Anonymous • Mobile workforce • State-sponsored, targeted attacks Information & Identity Protection Overview 4
  • 5. As companies focus on securing their data, security professionals increasingly recognize that access control and information management are key components of data security. Proper management and control of user accounts, access permissions, and privileges is one of the most effective avenues to ensuring that data doesn’t walk out the door. Often, you must Khalid Kark demonstrate controls around segregation of CISO Advisor, Forrester duties, privileged access, and stronger authentication for Internet-facing applications to meet regulatory requirements. Information & Identity Protection Overview 5
  • 6. Key Components of Information-Centric Security • Where is the sensitive data? AWARENESS • How is it being used? IDENTITY • Who should have access to sensitive data? • How to enforce data policies? PROTECTION • How to prevent breach? Information & Identity Protection Overview 6
  • 7. Reducing Risk with Information and Identity Protection IDENTITY AWARENESS PROTECTION Authentication DLP Encryption Passwords Network Email + RISK Heuristics + Endpoint Endpoint Two Factor + + Biometric Storage Storage Information & Identity Protection Overview 7
  • 8. Information & Identity Protection Solution Portfolio Map Storage DLP Network DLP Endpoint DLP • Where is the sensitive data? AWARENESS • How is it being used? User Authentication IDENTITY • Who should have access to that data? Behavior Two-Factor PKI Shared Storage Email Endpoint • Encryption How to enforce data policies? Encryption Encryption PROTECTION • How to prevent breach? Information & Identity Protection Overview 8
  • 9. Information & Identity Protection Solutions Information & Identity Protection Overview 9
  • 10. Symantec User Authentication Products Risk-Based Tokens & Mobile Certificate • Machine and • Cloud based configuration • Multiple form factors infrastructure registered • Over 700 handsets • Certificates for • Risk score determined supported devices and people by machine, access pattern Symantec™ Management Platform Symantec™ VIP/PKI Authentication Services Information & Identity Protection Overview 10
  • 11. Symantec Encryption Products Storage Endpoint Email • PGP™ • PGP™ Whole Disk • PGP™ Gateway Email NetShareEncryption Encryption Encryption • PGP™ Command Line • Symantec Endpoint • PGP™ BlackBerry/iOS Encryption Encryption™ Encryption Removable Storage • PGP™ Desktop Email Encryption Symantec™ Management Platform PGP™ Universal Server Information & Identity Protection Overview 11
  • 12. Symantec Data Loss Prevention Products Storage Endpoint Network • Symantec™ • Symantec™ • Symantec™ Data Loss Data Loss Data Loss PreventionNetwork PreventionEndpoint PreventionNetwork Discover Discover Monitor • Symantec™ • Symantec™ • Symantec™ Data Loss Prevention Data Loss Prevention Data Loss Prevention Data Insight Endpoint Prevent Network Prevent • Symantec™ Data Loss Prevention Network Protect Symantec™ Management Platform Symantec™ Data Loss Prevention Enforce Platform Information & Identity Protection Overview 12
  • 13. Defense-In-Depth: Encryption + Data Loss Prevention Network DLP / Email Gateway Encryption • Automatically encrypt emails containing sensitive data • Notify employees in real time/context about encryption policies and tools Storage DLP / Shared Storage Encryption • Discover where confidential data files are stored and automatically apply encryption • Ease the burden to IT staff with near transparence to users Endpoint DLP / Endpoint Encryption • Target high risk users by discovering what laptops contain sensitive data • Protect AND enable the business by targeting encryption efforts to sensitive data moving to USB devices Information & Identity Protection Overview 13
  • 14. The Symantec Advantage Integrated Flexible User Broad DLP Encryption Authentication Protects data across Identifies sensitive Strong authentication laptops, mobile devices, information requiring for people and their servers, and email protection across devices communications endpoints, network, and storage Information & Identity Protection Overview 14
  • 15. Thank you! For more information, download: Whitepaper: Data Protection Strategies Copyright © 2011 Symantec Corporation. All rights reserved. Symantec and the Symantec Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners. This document is provided for informational purposes only and is not intended as advertising. All warranties relating to the information in this document, either express or implied, are disclaimed to the maximum extent allowed by law. The information in this document is subject to change without notice. Information & Identity Protection Overview 15