By The W in addition to erers Securing Cisions Confidential Data with Data Loss Prevention Systems Outline of contents Business Problem Business Solution Requirements
Rogers, Blake, Morning Show Host has reference to this Academic Journal, PHwiki organized this Journal By The W in addition to erers Securing Cisions Confidential Data with Data Loss Prevention Systems Outline of contents Business Problem in addition to Requirements [Scott] Data Loss Prevention (DLP) Solutions [Angel] Proposed Solution [Koonal] Vendor Comparisons in addition to Architecture [W in addition to er] Company implementation & Conclusion [Scott] Business Problem Problem Cision needs the capability to exchange confidential in as long as mation securely in addition to easily. Cision 1200 Employees, 30+ offices, 8 countries Confidential Data Credit Card / Client In as long as mation Customer privileged data Employee personal data Business Confidential data Secure data from Employee Error, Employee Theft
This Particular University is Related to this Particular Journal
Business Solution Requirements Required Meet the Payment Card Industry (PCI) requirements as long as credit card h in addition to ling Prevent client, business or employee data from being incorrectly disclosed internally in addition to externally Global capabilities with central configuration in addition to en as long as cement Out of Scope Anti Virus, Firewall, Intrusion Detection Systems, Email Spam Filtering Limited Other legal requirements: No HIPPA or SOX requirements Source: http://www-uxsup.csx.cam.ac.uk/~fanf2/hermes/doc/talks/2008-04-techlinks/data-protection.jpg DLP Background Definition of Data Loss Prevention Products that, based on central policies, identify, monitor, in addition to protect data at rest, in motion, in addition to in use, through deep content analysis. -Rich Mogull of Securosis Other TLAs Data Loss Protection Data Leak Prevention/Protection In as long as mation Loss Prevention/Protection In as long as mation Leak Prevention/Protection Extrusion Prevention System Content Monitoring in addition to Filtering Content Monitoring in addition to Protection
DLP Background Identify where holes or exit points where leaks may occur Instant messaging (Yahoo Instant Messaging, Windows Live) P2P file sharing (e.g. LimeWire case as reported by LA Times) Media streaming Web mail (Yahoo mail, Gmail, Hotmail) USB storage devices (ZDNet story from UK) Removable drives Devices connected through external ports (Firewire, serial, parallel) FTP server Printouts DLP Background Source: Securosis.com http://securosis.com/images/uploads/Pragmatic-Data-Security–Data-Protection-DecisiionsV2.006-.png How data are flagged in addition to identified Initial predefined policies Social security numbers Prescribed in HIPAA, SOX, GLBA, etc. (Bank account numbers, Credit card numbers) Customized categories based on client needs Data Discovery Looks into the content in addition to not just the file type Examine context considerations (factor in parent directories, user group matching) Structured data matching (SSN, credit card numbers, etc) Unstructured data matching (diagrams, source codes, media files) Fingerprint the data by using one way hash in addition to saved in the database In as long as mation can then be used to identify confidential data elsewhere DLP Background
Three different levels of DLP solution Data in Motion Data which uses HTTP, FTP, IM, P2P in addition to SMTP protocols are mirrored in the DLP server as long as inspection where visibility is enhanced Data at Rest Data in file servers, databases, hosts computers set as long as file sharing, etc. Data at End Points Data which sits on end user hosts (workstations in addition to notebooks) DLP Background Technical Feature Considerations Deep content analysis, monitoring in addition to prevention Identification in addition to blocking capability Centralized Management Central policy setting, dashboard features Broad content management across plat as long as ms in addition to ease of Integration Review of in as long as mation infrastructure including software as long as requirement in addition to compatibility issues Automated remediation Transfer confidential files, LDAP lookup, secure purging of sensitive data Business Environment Considerations Matching with Business Need Matches defined business need over feature allure Market Presence Major presence in the market, financial industry experience Staffing Needs Staffing considerations to h in addition to le additional responsibilities DLP Background The Selection Given that the business problem of to be able to exchange confidential in as long as mation securely in addition to easily, We believe that a DLP solution have the ability to address such need by identifying in addition to securing confidential data in a comprehensive in addition to efficient manner as described in the guidelines above, We select Websense as a representative of such DLP solution which has met all criteria mentioned above. Websense Global leader in integrated Web security, data security, in addition to email security solutions. Protects approximately 40 million employees at more than 40,000 organizations worldwide Core strength in Web filtering, discovery in addition to classification of content Source: http://www.websense.com/content/aboutus.aspx Solution Selection
Websense Data Security Suite Data Discovery Data Protect Data Monitor Data Endpoint DLP Solution: Data Discovery Software-based solution that remotely scans specified network file shares, databases, email servers, data repositories, in addition to desktops to discover in addition to classify confidential data on these systems Automated remediation of unsecured confidential data on data repositories, such as encryption, file removal, etc 370 different types of file definitions DLP Solution: Data Protection Protects data with policy-based controls that map to business processes Automated, policy-based en as long as cement options including block, quarantine, file removal, encrypt, audit in addition to log, user notification in real time. DLP Solution:
Data Monitor Monitors in addition to identifies what customer data is at risk; who is using the data in real time; in addition to where this data is going Precise ID technology DLP Solution: Data Endpoint Provides endpoint security in addition to control over what confidential data is in addition to should be stored (through local discovery) Who is using it How it is being used (with what applications) Where it is being transferred (USB storage, printer) DLP Solution:
Websense Data Security Suite in Action (Case: Miss Bea Haven) DLP Solution: Alternative Vendors (Considerations)
Alternative Vendors (Comparison) Deployment Architecture Windows Enterprise Network 500 2,500 Users DLP Solution Deployment Architecture Windows Enterprise Network 500 2,500 Users DLP Solution
Project Implementation Cost Estimates Company Implementation Requirements Support Other Considerations Company Feasibility
Cision needs to add DLP capabilities to their current security solutions to meet the business needs. Websense meets the requirements Websense is well positioned to grow with Cisions future needs. Your mileage may vary Conclusion Questions Preguntas Pangutana Tanong Perguntas DONT BE A MISS BEA HAVIN!
Rogers, Blake Morning Show Host
Rogers, Blake is from United States and they belong to Jennie and Blake in the Morning – KWMT-FM and they are from Tucson, United States got related to this Particular Journal. and Rogers, Blake deal with the subjects like Entertainment; Music
Journal Ratings by Frank Lloyd Wright School of Architecture
This Particular Journal got reviewed and rated by Frank Lloyd Wright School of Architecture and short form of this particular Institution is US and gave this Journal an Excellent Rating.