Don t Be the Next Data Loss Story

Similar documents
Changing face of endpoint security

McAfee Total Protection for Data Loss Prevention

SIEM: Five Requirements that Solve the Bigger Business Issues

ForeScout CounterACT. Continuous Monitoring and Mitigation. Real-time Visibility. Network Access Control. Endpoint Compliance.

Delivering Integrated Cyber Defense for the Cloud Generation Darren Thomson

SMARTCRYPT CONTENTS POLICY MANAGEMENT DISCOVERY CLASSIFICATION DATA PROTECTION REPORTING COMPANIES USE SMARTCRYPT TO. Where does Smartcrypt Work?

The SANS Institute Top 20 Critical Security Controls. Compliance Guide

RSA Solution Brief. The RSA Solution for VMware. Key Manager RSA. RSA Solution Brief

What It Takes to be a CISO in 2017

Data Leak Prevention

McAfee Public Cloud Server Security Suite

Data Sheet: Endpoint Security Symantec Multi-tier Protection Trusted protection for endpoints and messaging environments

ClearPass Ecosystem. Tomas Muliuolis HPE Aruba Baltics lead

Enterprise & Cloud Security

Secure Reading WHITEPAPER DATA LOSS PREVENTION: A HOLISTIC APPROACH.

Not your Father s SIEM

McAfee MVISION Cloud. Data Security for the Cloud Era

To the Designer Where We Need Your Help

Data Classification is a Business Imperative. TITUS White Paper

align security instill confidence

Ransomware A case study of the impact, recovery and remediation events

A Guide to Closing All Potential VDI Security Gaps

The business case for end-toend data protection

ForeScout ControlFabric TM Architecture

Global Manufacturer MAUSER Realizes Dream of Interconnected, Adaptive Security a Reality

Joe Stocker, CISSP, MCITP, VTSP Patriot Consulting

Digital Forensics Readiness PREPARE BEFORE AN INCIDENT HAPPENS

Ransomware A case study of the impact, recovery and remediation events

RSA Data Loss Prevention (DLP)

CloudSOC and Security.cloud for Microsoft Office 365

Aligning with the Critical Security Controls to Achieve Quick Security Wins

Data Leak Prevention

Privilege Security & Next-Generation Technology. Morey J. Haber Chief Technology Officer

Preventing the Next Insider Threat from Leveraging Cross Domain Data Movement

CipherCloud CASB+ Connector for ServiceNow

Protecting Against Modern Attacks. Protection Against Modern Attack Vectors

Defense in Depth Security in the Enterprise

The McAfee MOVE Platform and Virtual Desktop Infrastructure

AlgoSec: How to Secure and Automate Your Heterogeneous Cisco Environment

Portnox CORE. On-Premise. Technology Introduction AT A GLANCE. Solution Overview

Christopher Covert. Principal Product Manager Enterprise Solutions Group. Copyright 2016 Symantec Endpoint Protection Cloud

Copyright 2011 Trend Micro Inc.

AT&T Endpoint Security

State of Cloud Adoption. Cloud usage is over 90%, are you ready?

GDPR: An Opportunity to Transform Your Security Operations

ATTIVO NETWORKS THREATDEFEND INTEGRATION WITH MCAFEE SOLUTIONS

Sourcefire Solutions Overview Security for the Real World. SEE everything in your environment. LEARN by applying security intelligence to data

KEEP YOUR BUSINESS SECURE WITH ESET. Proven. Trusted.

2013 InterWorks, Page 1

How Breaches Really Happen

Office 365 Buyers Guide: Best Practices for Securing Office 365

Best Practices in Securing a Multicloud World

THE SONICWALL CLEAN VPN APPROACH FOR THE MOBILE WORKFORCE

Angelo Gentili Head of Business Development, EMEA Region, PartnerNET

IBM Internet Security Systems Proventia Management SiteProtector

Symantec & Blue Coat Technical Update Webinar 29. Juni 2017

McAfee Skyhigh Security Cloud for Amazon Web Services

Securing Your Most Sensitive Data

ForeScout CounterACT. Automated Security Control Platform. Network Access Control Mobile Security Endpoint Compliance Threat Prevention

Securing Office 365 with SecureCloud

ISE North America Leadership Summit and Awards

Cisco Network Admission Control (NAC) Solution

Evolution Of Cyber Threats & Defense Approaches

ForeScout CounterACT Pervasive Network Security Platform Network Access Control Mobile Security Endpoint Compliance Threat Management

Seqrite Endpoint Security

Teradata and Protegrity High-Value Protection for High-Value Data

ISO COMPLIANCE GUIDE. How Rapid7 Can Help You Achieve Compliance with ISO 27002

Combating Cyber Risk in the Supply Chain

McAfee Cloud Workload Security Product Guide

External Supplier Control Obligations. Cyber Security

SUPPLEMENTARY DEFENSES FOR ENDPOINT SECURITY

Asset Discovery with Symantec Control Compliance Suite WHITE PAPER

Microsoft Security Management

IBM Europe, Middle East, and Africa Services Announcement ZS , dated October 6, 2009

Defense-in-Depth Against Malicious Software. Speaker name Title Group Microsoft Corporation

Introducing MVISION. Cohesive Cloud-based Management of Threat Countermeasures and Devices Leveraging Built-in Device Controls. Jon Parkes.

Altitude Software. Data Protection Heading 2018

Symantec Network Access Control Starter Edition

Product Guide Revision B. McAfee Cloud Workload Security 5.0.0

United Automotive Electronic Systems Co., Ltd Relies on McAfee for Comprehensive Security

Data Loss Prevention. Toyota Motor Engineering & Manufacturing North America.

McAfee epolicy Orchestrator

IBM Future of Work Forum

Ultimate. Security Guide

The threat landscape is constantly

CIS Top 20 #13 Data Protection. Lisa Niles: CISSP, Director of Solutions Integration

DFARS Compliance. SLAIT Consulting SECURITY SERVICES. Mike D Arezzo Director of Security Services. SLAITCONSULTING.com

Quick Wins with Data Loss Prevention How to Make DLP Work for You

Securing the Modern Data Center with Trend Micro Deep Security

Protecting Health Information

Infoblox as Part of the Ecosystem

GEARS + CounterACT. Advanced Compliance Enforcement for Healthcare. December 16, Presented by:

Cybersecurity Auditing in an Unsecure World

Securing Data in the Cloud: Point of View

Klaudia Bakšová System Engineer Cisco Systems. Cisco Clean Access

THE PROCESS FOR ESTABLISHING DATA CLASSIFICATION. Session #155

DATA LOSS PREVENTION

Zero Trust with Okta: A Modern Approach to Secure Access from Anywhere. How Okta enables a Zero Trust solution for our customers

Total Security Management PCI DSS Compliance Guide

McAfee Complete Endpoint Threat Protection Advanced threat protection for sophisticated attacks

Transcription:

Don t Be the Next Data Loss Story Titus: Blair Canavan McAfee: Chris Ellis Date

The Importance of Data Protection McAfee DLP + TITUS Data Classification

About McAfee Founded in 1987 as the world s largest dedicated security company Global research for realtime threat intelligence Compliance processes built into solutions Single management platform for optimized security R&D in 26 countries and presence in 120 countries More than 150M user desktops protected Single deployments in excess of 5M desktops 445 patents, many more pending 6,102 McAfee employees globally 83% of Fortune 100 companies rely on McAfee WWW.TITUS.COM TITUS. ALL RIGHTS RESERVED

Intel and McAfee The Third Pillar of Computing BETTER SECURITY SOLUTIONS AND PRODUCTS POWERS EFFICIENT PERFORMANCE INTERNET CONNECTIVITY SECURITY WWW.TITUS.COM TITUS. ALL RIGHTS RESERVED

Visibility Integration Partners Enterprise Visibility Managing 100+ million endpoints worldwide Security Management Malware Protection Everywhere Risk Posture Assessment Incident Management & Incident Response Data Protection Integrated Solutions Successful integration of 12 best of breed companies to expand our breadth and depth McAfee Global Threat Intelligence correlates major threat vectors. Intel platform experience Cost Efficiencies of Scale Partners 200+ partners adopt the McAfee epo platform Vibrant ecosystem across 8 technology categories Standards and published interfaces cut integration and maintenance, reduce risk, ease change

Enterprise data classification solutions TITUS solutions identify and protect information assets: Enhance and provide data leakage protection Raise user security awareness Enforce policies at the desktop and network 6 October 10, 2013

Data Breaches Don t Discriminate DuPont scientist stole 22,000 sensitive documents worth $400M as he got ready to take a job with a competitor 02/2007 MasterCard, Visa, Amex and Discover hit by a datasecurity breach Global Payments Inc systems were compromised by unauthorized access. 03/2012 Two USB devices lost Nov 2012 contained information on almost 583,000 Canadian student loan recipients and more than 5,000 people receiving CPP and disability benefits (Mark Lennihan/Associated Press) 86,000 records compromised @ $214 per record (Ponemon Institute) = $18,404,000 Which was certainly not in the budget!

The Sources of Data Loss Data Types DatainMotion DataatRest DatainUse Email Web Post Network IM Chat File Share Database Desktop/Laptop W I L D W I L D W E S T Removable Media Printer Screen Clipboard 8

TITUS and McAfee Trending DLP 2.0 a New way of thinking and implementing DLP Movement from DLR (Reporting) to true DLP (Prevention) Movement from blocking to sharing data Movement from Fearing DLP to Embracing DLP Classification the essential ingredient to successful DLP

One of These Things.. We ve had it all along.. 10 October 10, 2013

DLP Policy Trending Internal Only Restrict distribution & access to internal documents Protection Encrypt all documents marked Secret Removable Media Restrict copy of internal docs Remediation Prompt user Monitoring Specific activities and actions 11

Monitor Data Switches/Routers DLP Endpoint DLP Endpoint Provide contentaware detection Over 300 content types Outlook, webmails IM/FTP/HTTP(S) I/O channels (USB, media, devices) DLP Monitor What It Does Monitor data as it moves across the network and as it leaves the endpoint. DLP Monitor Passively monitor all network traffic Detect tags via keywords or concept Examine how data is being used What, where, who or why Protocol agnostic 12

Discover Data DLP Endpoint DLP Discover DLP Endpoint Crawl local drives & Tag Application, location or content Outlook files (PST/OST) Remediate Move, delete or encrypt What It Does Find and protect sensitive information in storage repositories and hard drives. DLP Discover Crawl servers Inventory, classify, or fingerprint data Remediate Move, delete, or encrypt Supported repositories/databases CIFS/NFS/HTTP(S)/FTP(S) SharePoint/Documentum SQL/Oracle/DB2/MySQL Enterprise 13

Protect Data Email/Web Gateway DLP Prevent DLP Endpoint DLP Endpoint Provide contentaware device control Move or block Integrated with Endpoint Encryption File, folder, or USB DRM support Adobe, MS RMS What It Does Protect against data loss via outbound email, web postings, and endpoints such as laptops, USBs and other devices. DLP Prevent Analyze network traffic for both email and web SMTP/HTTP/HTTPS IM/Blog/FTP/FTPS Allow, block, bounce or notify Encrypt, quarantine, or redirect 14

Why McAfee + TITUS?

TITUS + McAfee.How it Works 2. 1. 4. 3. 5. TITUS Deploy Emails Logging, MFE DLP client and TITUS reporting applies documents classifies with policy with epo emails are ESM based released and on documents TITUS or blocked metadata

Leveraging TITUS Metadata In the McAfee Ecosystem Endpoint AntiVirus & AntiSpyware Network Email Security Email AV & AntiSpam Web Security Desktop Firewall Host IPS epo Network DLP Site Advisor Application Control Policy Auditing Macintosh AV Linux AV Endpoint Encryption McAfee Agent Firewall/UTM Advanced Threat Defence Behavioral Analysis Risk & Compliance Vulnerability Mgmt Data Discovery Device Control Remediation DLP Endpoint TITUS Removable Media Policy Auditing Forensics WWW.TITUS.COM TITUS. ALL RIGHTS RESERVED

Security Connected Reference Architecture NETWORK SECURITY Next Generation Firewall Intrusion Prevention Advanced Threat Defence Network User Behavior Analysis INFORMATION SECURITY Email Security Web Security Data Loss Prevention Encryption SECURITY MANAGEMENT Security Operations Console Policy Auditing & Management Vulnerability Management Risk Management Compliance SIEM ENDPOINT SECURITY Malware Protection Device Encryption Application Control Desktop Firewall Device Control Email Protection Host IPS Endpoint Web Protection Host Intrusion Protection Server and Database Protection On Chip (SiliconBased) Security Smartphone and Tablet Protection Virtual Machine and VDI Protection Embedded Device Protection PARTNER COMMUNITY Security Innovation Alliance (SIA) McAfee Connected Global Strategic Alliance Partners Improve your risk posture, at a reduced cost while incorporating the needs of your strategic business initiatives

Why McAfee DLP + TITUS is Unique 1. TimetoValue Deployment 2. Simplified Policy Management 3. Unique Forensic Investigation 4. A Part of the Security Connected Platform 5. epo Leveraged by Joint Solutions 6. Accuracy and Reliability for Active DLP 19

DLP endpoint Use Cases

Data Loss via Social Media Block Unauthorized Posting 21

Uploading Sensitive Data to Box Stop Uploading onto Box 22

Unauthorized Clipboard Access to Data Prevent Unauthorized Copying 23

Data Leak via Outbound Email Prevent Data Loss from Email 24 24

60Seconds in the Life of a User 25 WWW.TITUS.COM TITUS. ALL RIGHTS RESERVED

Joint McAfee & TITUS Clients

Contact Info Blair Canavan VP Business Development blair.canavan@titus.com 6133550468 mobile Chris Ellis Senior System Engineer Chris_ellis@mcafee.com 6132922410 mobile