1 / 20

Avoid the Deadly Sins of DLP and Know your Enemy

Avoid the Deadly Sins of DLP and Know your Enemy. Check Point University 2010. Agenda. 1. 2. Requirements. Solution. Data Loss Prevention. Data breaches have happened to all of us. What is DLP?. John.Stevens@yahoo.com. Corporate Strategy. Green World Strategy Plan 2010.

Download Presentation

Avoid the Deadly Sins of DLP and Know your Enemy

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Avoid the Deadly Sins of DLP and Know your Enemy Check Point University 2010

  2. Agenda 1 2 Requirements Solution

  3. Data Loss Prevention Data breaches have happened to all of us What is DLP? John.Stevens@yahoo.com Corporate Strategy Green World Strategy Plan 2010 Company document uploaded to an external website. E-mail sent to the wrong recipient, intentionally or by mistake.

  4. The Cost of DLP Risks Lack of business edge on competitors Brand damage Regulatory Compliance Financial penalties – ISO Costs Professional Services: Identify Data Data loss risks – SMTP, HTTP, FTP Data Classification On going Classification Employee awareness

  5. Risk Analysis 90% of all Data Loss incidents seem to be accidental loss through -SMTP email high Impact Intentional SMTP Accidental SMTP Intentional HTTP low low high Probability

  6. Requirements

  7. Agenda 1 2 3 Requirements Solution Future

  8. Megahopeful • Graduate R&D employees are intelligent users, unintentional data loss is primary issue. • Users need to be educated regarding their actions. • Must protect against information posted to Web sites and FTP servers. • Growing organization has finite IT administrator resources, any solution must not be too onerous. • The Solution must increase Data Leakage Visibility • Gateway based Check point DLP will address these issues.

  9. Introducing Check Point Data Loss Prevention Prevent Move from detection to prevention Data Loss Prevention Alert An email that you have just sent has been quarantined. Reason: attached document contains confidential internal data The message is being held until further action. Send ,Discard , or Review Issue Educate Users on corporate data policies Enforce Data loss business processes Check Point Combines Technology and Processes to Make DLP Work NEW! John.Stevens@yahoo.com Corporate Strategy Green World Strategy Plan 2010 John, Let’s review the corporate strategy in our morning meeting.

  10. Check Point Solves the DLP Challenge TechnologyChallenge Empowers users to remediate incidents in real time IT Staff Challenge Educates users on DLP policies without involving IT staff New UserCheck™ Technology

  11. New MultiSpect™ Technology 600+ File Formats 250+ Data Types Correlates data from multiple sources using open language Detects more than 600 file formats Over 250 pre-defined content data types Detect and recognize proprietary forms and templates MultiSpect Detection Engine

  12. Simple Rule-based Policy Management Easily Define Policy to Detect, Prevent or Ask User

  13. Using Document Templates • Using document templates to identify sensitive Data

  14. Project Plan Numbers • Create an updated list of current project numbers, to check for project details leaking out

  15. More standardized Protections • Other Leakage protections

  16. New Acquisitions • For acquisitions solution may be extended • Could use either the same policy or one more tailored to their needs • All secured from a central location using the same entities • As their current infrastructure is Cisco, DLP-1 appliance would slot in for immediate protection

  17. SmartEvent • Check Point SmartEvent will allow real time altering of DLP incidents

  18. Solution Overview

  19. Agenda 1 2 Requirements Solution

  20. Summary Detect and control application usage AppWiki—Industry’s largest library with over 50,000 applications Educate users on corporate policies Check Point Application Control Software Blade Available on EVERY gateway Available Q4 2010

More Related