Sophos safeguard enterprise a solution for data protection
This presentation is the property of its rightful owner.
Sponsored Links
1 / 23

Sophos Safeguard Enterprise: A Solution for Data Protection PowerPoint PPT Presentation


  • 94 Views
  • Uploaded on
  • Presentation posted in: General

Sophos Safeguard Enterprise: A Solution for Data Protection. Presented by: W3(cube). Problem statement. Threat of Data theft or exposure from lost, stolen, or inappropriate decommissioned laptops. What is security?.

Download Presentation

Sophos Safeguard Enterprise: A Solution for Data Protection

An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.


- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -

Presentation Transcript


Sophos safeguard enterprise a solution for data protection

Sophos Safeguard Enterprise: A Solution for Data Protection

Presented by: W3(cube)


Problem statement

Problem statement

Threat of Data theft or exposure from lost, stolen, or inappropriate decommissioned laptops.


What is security

What is security?

“In the real world, security involves processes. It involves preventative technologies, but also detection and reaction processes, and an entire forensic system to hunt down and prosecute the guilty. Security is not a product; it itself is a process…..”

Bruce Shneiner (Secrets and Lies, Wiley and Sons, Inc.)


Challenges to achieving laptop security

Challenges to achieving laptop security

  • Cost

  • User negligence/sabotage of security measures

  • Increased value of information

  • Increase in access to computers =increased hackers not limited by time and space


The threat to data is real

The Threat to Data is Real!!


A perspective on laptop theft and data loss

A Perspective on Laptop Theft and Data Loss

  • Laptop theft and data loss are escalating concerns for companies of all sizes - from Fortune 500 level to small-to-medium sized businesses - and according to the FBI, 97% of stolen laptops are never recovered.

  • As employees become increasingly more mobile and rely on multiple mobile devices from laptops, smartphones and iPads to conduct business, crimes associated with these devices are also on the rise. Malicious insiders as well as outside culprits are increasingly becoming more innovative and inventive in finding ways to steal valuable information and proprietary data from company and employee mobile devices and laptops that don't have appropriate endpoint security.

    Source: http://www.bizjournals.com/losangeles/prnewswire/press_releases/California/2011/11/07/LA00777

    Los Angeles Business: Awareness Technologies Security Advisory: Top tips to prevent laptop theft (Nov 7, 2011)


Myths on data security

Myths on data security

The field of data security is rife with mistaken beliefs which cause people to design ineffective security solutions. Here are some of the most prevalent security myths:

Myth: Hackers cause most security breaches.

  • In fact, 80% of data loss is to caused by insiders.

    Myth: Encryption makes your data secure.

  • In fact, encryption is only one approach to securing data. Security also requires access control, data integrity, system availability, and auditing.

    Myth: Firewalls make your data secure.

  • In fact, 40% of Internet break-ins occur in spite of a firewall being in place.

To design an effective security solution you must understand the security requirements scope of current threats to your data.

http://Data Security Challenges:Oracle9i Security Overview


Sophos safeguard enterprise a solution for data protection

Four Elements of an Effective Data Loss Prevention Strategy

  • Control devices, applications, email and web usage

  • Ensure security policy compliance

Control User Environment by restricting data exit points

  • Empower knowledge workers to classify sensitive business data

  • Apply classification to existing documents and data sets

Effective Data Loss Prevention Strategy (DLP)

Classify intellectual property and sensitive business data

Protect confidential and sensitive information

  • Full disk, removable storage and file encryption

  • Email encryption

Prevent leakage of personal identifiable information

  • Comprehensive coverage of personally identifiable information types

  • Continuously assess, audit, report and enforce on endpoint and gateway

Source: Sophos / Utimaco Data Loss Prevention by Peter Szendröi, SOPHOS Nordics(Jan 20, 2010) page 10


Top it security solutions organizations are using

Top IT Security Solutions Organizations are using

Source: Harris Interactive: IT Security Final Report July 2011


Agreement with statement about currently available it security solutions

Agreement with Statement about currently available IT security Solutions

Source: Harris Interactive: IT Security Final Report July 2011


Solution

Solution

Sophos Safeguard Enterprise


Overall cascadia lab s summary comparison

Overall Cascadia Lab’s Summary comparison

http://www.sophos.com/en-us/security-news-trends/security-trends/enterprise-review.aspx - comparison


Comparison of key solution providers in the market today by category

Comparison of key solution providers in the market today by category

Source: Cascadia Labs: Comparative Review of Endpoint Security for Enterprises Comparative review Link


Sc magazine awards 2011

SC Magazine Awards 2011

Best Mobile/Portable Device Security

  • Good Technology for Good for Enterprise

  • IronKey for IronKey Enterprise

  • McAfee for McAfee Enterprise Mobility Management (McAfee EMM)

  • Sophos for Sophos SafeGuard Enterprise

  • Symantec for Symantec Endpoint Protection Mobile Edition

    Best Endpoint/UTM Security

  • Check Point Software Technologies for Check Point UTM-1

  • McAfee for McAfee Total Protection for Endpoint, Enterprise Edition

  • SonicWALL for SonicWALL E-Class Network Security Appliance (NSA) E8500

  • Sophos for Sophos Endpoint Security and Data Protection

  • Symantec for Symantec Endpoint Protection 11.0

SC Awards 2011


Sophos as a solution

Sophos as a solution

Sophos is a series of software based components that comprise and entire suite


Case study financial legal

Case Study – Financial & Legal –

http://www.sophos.com/en-us/your-needs/case-studies/financial.aspx


Case study government

Case Study – Government

http://www.sophos.com/en-us/your-needs/case-studies/government.aspx


Sc magazine awards 20111

SC Magazine Awards 2011

Best Mobile/Portable Device Security

  • Good Technology for Good for Enterprise

  • IronKey for IronKey Enterprise

  • McAfee for McAfee Enterprise Mobility Management (McAfee EMM)

  • Sophos for Sophos SafeGuard Enterprise

  • Symantec for Symantec Endpoint Protection Mobile Edition

    Best Endpoint/UTM Security

  • Check Point Software Technologies for Check Point UTM-1

  • McAfee for McAfee Total Protection for Endpoint, Enterprise Edition

  • SonicWALL for SonicWALL E-Class Network Security Appliance (NSA) E8500

  • Sophos for Sophos Endpoint Security and Data Protection

  • Symantec for Symantec Endpoint Protection 11.0

SC Awards 2011


Analysis of total cost of ownership tco

Analysis of Total Cost of Ownership (TCO)

  • 9 companies interviewed in-depth and costs analyzed:

    • Amica Life Insurance

    • Lincoln Public Schools

    • AW Chestern

    • British Services Company

    • Central Ohio Primary Care Physicians

    • US Healthcare Provider

    • CGh Medical Center

    • Germany Company

    • Escabia County School District


Sample vendor vs sophos cost savings analysis over a 5 year period

Sample Vendor Vs. Sophos: Cost Savings Analysis Over a 5 Year Period

  • Total cost for sample company =$1.3M

  • Total cost for Sophos = $880K

*Analysis shows significant savings of $420K can be experienced for switching to and managing Sophos end point and security over a 5 Year period

Source: Business Trends “A Strategic Overview Featuring Gartner Content” Featuring: A Buyers Guide to End Point Protection Programs (May 2009)

*The costs were calculated based on licensing, infrastructure and operational data provided by the companies interviewed


Sample vendor vs sophos extent of cost category to total cost

Sample Vendor Vs. Sophos: Extent of Cost Category to Total Cost

  • Represents largest cost at of the TCO

*Analysis shows significant savings of $420K can be experienced by switching to and managing Sophos end point and security over a 5 Year period

Source: Business Trends “A Strategic Overview Featuring Gartner Content” Featuring: A Buyers Guide to End Point Protection Programs (May 2009)

*The costs were calculated based on licensing, infrastructure and operational data provided by the companies interviewed


Snapshot of voice of the sophos end point security customer

Snapshot of Voice of the Sophos End Point Security Customer

“The high volume of calls to our IT department with McAfee was one of the key reasons we switched to Sophos” – Head of Global System& Security Solutions, German Company

“Sophos has saved me a lot of time with their administrative tools. The deployment is easier and I’ve been impressed with the client removal tool, it removes Symantec very well” – IT Manager CGH Medical Center

“The Sophos Console provides a snapshot of what’s going on at a glance. Symantec is definitely not easy to use. We need to see at a glance if there is something wrong” - Technical & Operations Security Administrator US Health Care Provider

McAfee proved to be more expensive from the point of view that it charged for every module. When we reviewed Sophos it was al part of one purchase and the price was less than for McAfee” – Technical Services Manager, British Services Company

“Sophos was the only tool that did not care if clients are Macs or PCs, It was the only cross platform solution at the time” – Director of Technology Lincoln Public Schools

Sophos offers a cost effective, easy to deploy/use, flexible with proven data loss prevention capabilities

Source: Business Trends “A Strategic Overview Featuring Gartner Content” Featuring: A Buyers Guide to End Point Protection Programs (May 2009)


Back up slides

In Closing…. Sophos, Simply Secure

Back up Slides

An organization’s risk of threat of Data theft or exposure from lost, stolen, or inappropriately decommissioned laptops is greatly reduced with Sophos end point security protection. However,

Organizations must remain proactive and vigilant and constantly review products & services to

meet increasingly sophisticated threats of data theft.

Diagram Source: Sophos / Utimaco Data Loss Prevention by Peter Szendröi, SOPHOS Nordics(Jan 20, 2010) page 2


  • Login