RSA Data Loss Prevention (DLP)

Similar documents
Citrix XenApp. RSA Secured Implementation Guide for RSA DLP Endpoint VDI. Partner Information. Last Modified: March 28 th, 2014

RSA Data Loss Prevention: Policy to Remediation

RSA pro VMware. David Matějů. RSA, The Security Division of EMC

VMware VMware View. RSA Secured Implementation Guide for RSA DLP Endpoint VDI. Partner Information. Last Modified: March 27 th, 2014

Trust in the Cloud. Mike Foley RSA Virtualization Evangelist 2009/2010/ VMware Inc. All rights reserved

Unlocking the Power of the Cloud

locuz.com SOC Services

The Convergence of Security and Compliance

CloudSOC and Security.cloud for Microsoft Office 365

Reinvent Your 2013 Security Management Strategy

Introduction. Deployment Models. IBM Watson on the IBM Cloud Security Overview

The Convergence of Security and Compliance. How Next Generation Endpoint Security Manages 5 Core Compliance Controls

Don t Be the Next Data Loss Story

<Partner Name> <Partner Product> RSA Ready Implementation Guide for. Rapid 7 Nexpose Enterprise 6.1

Secure Esri Solutions in the AWS Cloud. CJ Moses, AWS Deputy CISO

Symantec DLP: Detection Innovation and Expanded Coverage

Art of Performing Risk Assessments

ISO STANDARD IMPLEMENTATION AND TECHNOLOGY CONSOLIDATION

RFP/RFI Questions for Managed Security Services. Sample MSSP RFP Template

Best Practices for a Successful DLP Deployment

MaaS360 Secure Productivity Suite

To the Designer Where We Need Your Help

01.0 Policy Responsibilities and Oversight

Run the business. Not the risks.

White Paper. Why IDS Can t Adequately Protect Your IoT Devices

Session ID: CISO-W22 Session Classification: General Interest

Watson Developer Cloud Security Overview

Encryption Vision & Strategy

Netwrix Auditor. Visibility platform for user behavior analysis and risk mitigation. Mason Takacs Systems Engineer

SMARTCRYPT CONTENTS POLICY MANAGEMENT DISCOVERY CLASSIFICATION DATA PROTECTION REPORTING COMPANIES USE SMARTCRYPT TO. Where does Smartcrypt Work?

Delivering Integrated Cyber Defense for the Cloud Generation Darren Thomson

Cloud Customer Architecture for Securing Workloads on Cloud Services

eguide: Designing a Continuous Response Architecture 5 Steps to Reduce the Complexity of PCI Security Assessments

Healthcare Security Success Story

The Evolution of Data Center Security, Risk and Compliance

CipherCloud CASB+ Connector for ServiceNow

WITH ACTIVEWATCH EXPERT BACKED, DETECTION AND THREAT RESPONSE BENEFITS HOW THREAT MANAGER WORKS SOLUTION OVERVIEW:

Mission Defense via Information-Centric Security

Single Sign-On. Introduction

Twilio cloud communications SECURITY

Sirius Security Overview

A Guide to Closing All Potential VDI Security Gaps

Agenda. Introduction & Drivers of Networks DLP. Requirements, Challenges of Network DLP. Addressing Network DLP with Fidelis XPS

ENDNOTE SECURITY OVERVIEW INCLUDING ENDNOTE DESKTOP AND ONLINE

Managing Privacy Risk & Compliance in Financial Services. Brett Hamilton Advisory Solutions Consultant ServiceNow

INTELLIGENCE DRIVEN GRC FOR SECURITY

Business Advantages. In this age of heightened awareness of information security issues...

Amit Panchal Enterprise Technology Strategist

NERC Staff Organization Chart Budget

SYMANTEC DATA CENTER SECURITY

SOLUTION BRIEF HELPING BREACH RESPONSE FOR GDPR WITH RSA SECURITY ADDRESSING THE TICKING CLOCK OF GDPR COMPLIANCE

Quick Wins with Data Loss Prevention How to Make DLP Work for You

RSA IT Security Risk Management

TRUSTED IT: REDEFINE SOCIAL, MOBILE & CLOUD INFRASTRUCTURE. John McDonald

Netwrix Auditor. Know Your Data. Protect What Matters. Roy Lopez Solutions Engineer

Aligning IT, Security and Risk Management Programs. Ahmed Qurram Baig, CISSP, CBCP, CRISC, CISM Information Security & GRC Expert

Datasheet. Only Workspaces delivers the features users want and the control that IT needs.

Data Loss Prevention Endpoint

Secure Messaging is far more than traditional encryption.

EC-Council Certified Network Defender (CND) Duration: 5 Days Method: Instructor-Led

The Most Comprehensive Suite of Security Services and Solutions in the Market

Avanan for G Suite. Technical Overview. Copyright 2017 Avanan. All rights reserved.

Copyright 2011 Trend Micro Inc.

Cirius Secure Messaging Single Sign-On

Secure your company s Crown Jewels. workshop

Microsoft Security Management

TRUSTED IT: REDEFINE SOCIAL, MOBILE & CLOUD INFRASTRUCTURE. Ralf Kaltenbach, Regional Director RSA Germany

Compliance Audit Readiness. Bob Kral Tenable Network Security

McAfee Total Protection for Data Loss Prevention

Cybersecurity Conference Presentation North Bay Business Journal. September 27, 2016

AKAMAI CLOUD SECURITY SOLUTIONS

Secure & Unified Identity

OWA Security & Enhancements

Microsoft Exchange Online

McAfee Data Loss Prevention Endpoint 9.4.0

RSA Solution Brief. The RSA Solution for Cloud Security and Compliance

NERC Staff Organization Chart Budget 2018

Transforming Security Part 2: From the Device to the Data Center

Administration of Symantec Data Loss Prevention 10.5 Study Guide

Security Configuration Assessment (SCA)

How To Build or Buy An Integrated Security Stack

Single Sign-On. Introduction. Feature Sheet

The trend to virtualisation

Securing Office 365 with SecureCloud

Accelerate GDPR compliance with the Microsoft Cloud Ole Tom Seierstad National Security Officer Microsoft Norway

CISO View: Top 4 Major Imperatives for Enterprise Defense

SECURITY SERVICES SECURITY

ForeScout ControlFabric TM Architecture

Consolidation Committee Final Report

Features. HDX WAN optimization. QoS

Document Title: IT Security Assessment Questionnaire

Oracle Buys Automated Applications Controls Leader LogicalApps

Advanced encryption and message control to complement and enhance your security investment in ZixDLP.

Morgan Independent Software Vendor Lead

empow s Security Platform The SIEM that Gives SIEM a Good Name

RSA Solution Brief. The RSA Solution for VMware. Key Manager RSA. RSA Solution Brief

TRUE SECURITY-AS-A-SERVICE

Copyright 2012 EMC Corporation. Todos os direitos reservados.

RSA. The security division of EMC. Visibilidad total en el entorno de seguridad. Javier Galvan Systems Engineer Mexico & NOLA

NEXT GENERATION CLOUD SECURITY

Transcription:

RSA Data Loss Prevention (DLP) Understand business risk and mitigate it effectively Aris Zikopoulos, Channel Manager ITWAY HELLAS Copyright 2013 EMC Corporation. All rights reserved. 1

Definition of DLP technology DLP is a that helped us process build a to protect our people from leaking sensitive data -CISO, Healthcare Company RSA subscribes to this philosophy and encourages customers to focus on people and process and to take a risk based approach in building DLP projects 2

Establishing a Risk Based DLP Program DLP Program Lifecycle Management (driven by risk based policies) DISCOVER EDUCATE ENFORCE Risk Across the Infrastructure End Users & Risk Teams Security Controls? RISK Understand Risk TIME Reduce Risk 3

DLP Covers Your Entire Infrastructure RSA DLP Enterprise Manager RSA DLP Network RSA DLP Datacenter RSA DLP Endpoint Discover, Educate, Enforce Consistent Classification & Management Across the Board 4

Risk Based Policy Management Enforce security controls based on the risk of a violation User Action Data Sensitivity User Identity Defined in DLP Policy LOW RISK HIGH ALLOW NOTIFY QUARANTINE JUSTIFY MOVE BLOCK ENCRYPT SHRED Manual or Automated AUDIT COPY DELETE RMS (DRM) 5

6

7

In-Depth Data Analysis Framework Attributes & Identity Analysis Email header data Attachment type, size, etc. Content in Email body & Attachment General keywords Specialized keywords Patterns and strings Proximity analysis negative rules 8

RSA DLP Policy Library & Methodology 170+ built-in policies you can use Knowledge Engineering Retail PCI DSS Healthcare HIPAA Telecom/Tech CPNI Sample Profile of a Knowledge Engineer MA CMR 201 Caldicott (UK) Source Code CA AB 1298 PIPEDA Design Docs Work Exp: 12 years Certifications: 18 regulations Manufacturing ITAR Patent Apps EAR Financial Serv GLBA FCRA NASD Other NERC Global PII 401k & 403b Languages : Four Background: Linguistics, artificial intelligence, search technologies Education: Library sciences, Computer science Dedicated Knowledge Engineering team develops and maintains DLP policies 9

RSA DLP for Virtualized Environments Virtualized Servers Run RSA DLP management software on virtual machines Deploy RSA DLP Network hardware as virtual appliances Leverage virtual servers for RSA DLP grid scanning Virtualized Desktops Use RSA DLP Endpoint agent on virtual desktops Both Citrix XenDesktop and VMware View are supported Scan Home Drives without interfering with the desktop Strategic partnership with major virtualization vendors 10

DLP for Virtual Desktops & Applications New Threat Vectors Covered: 1) Copying sensitive data from virtual apps & VDI to physical device 2) Saving files from virtual apps & VDI to physical device Key Benefits: No agent on endpoints Freedom & flexibility to BYOD 11

Providing Content-Awareness to GRC and SOC Proactive information risk management & content-aware security analytics Risk Officer Security Analyst Business users RSA Archer Information Risk Management RSA Security Analytics Content-level Intelligence RSA Data Discovery SharePoint File Servers Databases NAS/SAN Endpoints 12

Thank You The Security Division of EMC 13