Data Leakage Prevention

Microsoft TechNet - Belgium and Luxembourg
11 de Jun de 2013
Data Leakage Prevention
Data Leakage Prevention
Data Leakage Prevention
Data Leakage Prevention
Data Leakage Prevention
Data Leakage Prevention
Data Leakage Prevention
Data Leakage Prevention
Data Leakage Prevention
Data Leakage Prevention
Data Leakage Prevention
Data Leakage Prevention
Data Leakage Prevention
Data Leakage Prevention
Data Leakage Prevention
Data Leakage Prevention
Data Leakage Prevention
Data Leakage Prevention
Data Leakage Prevention
Data Leakage Prevention
Data Leakage Prevention
Data Leakage Prevention
Data Leakage Prevention
Data Leakage Prevention
Data Leakage Prevention
Data Leakage Prevention
Data Leakage Prevention
Data Leakage Prevention
Data Leakage Prevention
Data Leakage Prevention
Data Leakage Prevention
Data Leakage Prevention
Data Leakage Prevention
Data Leakage Prevention
Data Leakage Prevention
Data Leakage Prevention
Data Leakage Prevention
Data Leakage Prevention
Data Leakage Prevention
Data Leakage Prevention
Data Leakage Prevention
Data Leakage Prevention
Data Leakage Prevention
Data Leakage Prevention
Data Leakage Prevention
Data Leakage Prevention
Data Leakage Prevention
Data Leakage Prevention
Data Leakage Prevention
Data Leakage Prevention
Data Leakage Prevention
Data Leakage Prevention
Data Leakage Prevention
Data Leakage Prevention
Data Leakage Prevention
Data Leakage Prevention
Data Leakage Prevention
Data Leakage Prevention
Data Leakage Prevention
Data Leakage Prevention
Data Leakage Prevention
Data Leakage Prevention
1 de 62

Mais conteúdo relacionado

Mais procurados

DSS ITSEC 2013 Conference 07.11.2013 - For your eyes only - Symantec PGP Re-L...DSS ITSEC 2013 Conference 07.11.2013 - For your eyes only - Symantec PGP Re-L...
DSS ITSEC 2013 Conference 07.11.2013 - For your eyes only - Symantec PGP Re-L...Andris Soroka
DLP Data leak preventionDLP Data leak prevention
DLP Data leak preventionAriel Evans
Introducing Data Loss Prevention 14Introducing Data Loss Prevention 14
Introducing Data Loss Prevention 14Symantec
Symantec Data Loss Prevention 11Symantec Data Loss Prevention 11
Symantec Data Loss Prevention 11Symantec
ISSA DLP Presentation - Oxford Consulting GroupISSA DLP Presentation - Oxford Consulting Group
ISSA DLP Presentation - Oxford Consulting Groupaengelbert
Technology Overview - Symantec Data Loss Prevention (DLP)Technology Overview - Symantec Data Loss Prevention (DLP)
Technology Overview - Symantec Data Loss Prevention (DLP)Iftikhar Ali Iqbal

Mais procurados(20)

Destaque

Information Leakage & DLPInformation Leakage & DLP
Information Leakage & DLPYun Lu
The Definitive Guide to Data Loss PreventionThe Definitive Guide to Data Loss Prevention
The Definitive Guide to Data Loss PreventionDigital Guardian
Data Loss PreventionData Loss Prevention
Data Loss PreventionReza Kopaee
Information Leakage - A knowledge Based ApproachInformation Leakage - A knowledge Based Approach
Information Leakage - A knowledge Based ApproachGlobal Business Events - the Heart of your Network.
Understanding the-demand-supply-equations-of-corruption-fraud-finalUnderstanding the-demand-supply-equations-of-corruption-fraud-final
Understanding the-demand-supply-equations-of-corruption-fraud-finalGlobalCompact
Unethical Behavior in Business - The Case Against HSBCUnethical Behavior in Business - The Case Against HSBC
Unethical Behavior in Business - The Case Against HSBCStacey Troup

Destaque(20)

Similar a Data Leakage Prevention

DSS.LV - Principles Of Data Protection - March2015 By Arturs FilatovsDSS.LV - Principles Of Data Protection - March2015 By Arturs Filatovs
DSS.LV - Principles Of Data Protection - March2015 By Arturs FilatovsAndris Soroka
Biznet Gio Presentation - Database SecurityBiznet Gio Presentation - Database Security
Biznet Gio Presentation - Database SecurityYusuf Hadiwinata Sutandar
Prevent Data Leakage Using Windows Information Protection (WIP)Prevent Data Leakage Using Windows Information Protection (WIP)
Prevent Data Leakage Using Windows Information Protection (WIP)BeyondTrust
Info Security: Microsoft Dynamic Access Control Info Security: Microsoft Dynamic Access Control
Info Security: Microsoft Dynamic Access Control McOWLMarketing
Microsoft Azure Rights ManagementMicrosoft Azure Rights Management
Microsoft Azure Rights ManagementDavid J Rosenthal
SharePoint Online vs. On-PremiseSharePoint Online vs. On-Premise
SharePoint Online vs. On-PremiseEvan Hodges

Similar a Data Leakage Prevention(20)

Mais de Microsoft TechNet - Belgium and Luxembourg

Windows 10: all you need to know!Windows 10: all you need to know!
Windows 10: all you need to know!Microsoft TechNet - Belgium and Luxembourg
Configuration Manager 2012 – Compliance Settings 101 - Tim de KeukelaereConfiguration Manager 2012 – Compliance Settings 101 - Tim de Keukelaere
Configuration Manager 2012 – Compliance Settings 101 - Tim de KeukelaereMicrosoft TechNet - Belgium and Luxembourg
Windows 8.1 a closer lookWindows 8.1 a closer look
Windows 8.1 a closer lookMicrosoft TechNet - Belgium and Luxembourg
So you’ve successfully installed SCOM… Now what.So you’ve successfully installed SCOM… Now what.
So you’ve successfully installed SCOM… Now what.Microsoft TechNet - Belgium and Luxembourg
Deploying and managing ConfigMgr ClientsDeploying and managing ConfigMgr Clients
Deploying and managing ConfigMgr ClientsMicrosoft TechNet - Belgium and Luxembourg
Self Service BI anno 2013 – Where Do We Come From and Where Are We Going?Self Service BI anno 2013 – Where Do We Come From and Where Are We Going?
Self Service BI anno 2013 – Where Do We Come From and Where Are We Going?Microsoft TechNet - Belgium and Luxembourg

Mais de Microsoft TechNet - Belgium and Luxembourg(20)

Último

Metadata & Discovery Group Conference 2023 - Day 1 ProgrammeMetadata & Discovery Group Conference 2023 - Day 1 Programme
Metadata & Discovery Group Conference 2023 - Day 1 ProgrammeCILIP MDG
UiPath Tips and Techniques for Error Handling - Session 2UiPath Tips and Techniques for Error Handling - Session 2
UiPath Tips and Techniques for Error Handling - Session 2DianaGray10
Orchestration, Automation and Virtualisation Maturity ModelOrchestration, Automation and Virtualisation Maturity Model
Orchestration, Automation and Virtualisation Maturity ModelCSUC - Consorci de Serveis Universitaris de Catalunya
LLaMA 2.pptxLLaMA 2.pptx
LLaMA 2.pptxRkRahul16
Unleashing the Power of Modern Carpooling Apps, Inspired by BlaBlaCarUnleashing the Power of Modern Carpooling Apps, Inspired by BlaBlaCar
Unleashing the Power of Modern Carpooling Apps, Inspired by BlaBlaCarArchie Cadell
Easy Salesforce CI/CD with Open Source Only - Dreamforce 23Easy Salesforce CI/CD with Open Source Only - Dreamforce 23
Easy Salesforce CI/CD with Open Source Only - Dreamforce 23NicolasVuillamy1

Último(20)

Data Leakage Prevention

Notas do Editor

  1. PII – Personal Identifiable InformationIP – Intellectual PropertyNPI – Non-public Personal Information
  2. All of this started with the introduction of claims with WIF and ADFS. This is great because you don’t need to think about authN and authZ.This model was pushed into the core of Windows so that we can give developers the right level of flexibility and granularity to drive applicationsAdditionally, there is the challenge of applying policy. In Win8 we use classification and tagging as a key pivot to apply access control to data
  3. Today, ACLs have ACEs that list the SIDs that have access to the resourceExpressions allow need for less groups because you combine anythingBefore Win8, ACLs can only be based on groups, now we can base them on claims, which come from AD
  4. Rights Protected Folder Explorer allows you to work with Rights Protected Folders. A Rights Protected Folder is similar to a file folder in that it contains files and folders. However, a Rights Protected Folder controls access to the files that it contains, no matter where the Rights Protected Folder is located. By using Rights Protected Folder Explorer, you can securely store or send files to authorized users and control which users will be able to access those files while they are in the Rights Protected Folder.
  5. The drive must be formatted by using either the exFAT, FAT16, FAT32, or NTFS file system.The drive must have at least 64 MB of available disk space.The operating system drive must be pro