Upload
rudyard-bentley
View
21
Download
0
Embed Size (px)
DESCRIPTION
Avoid the Deadly Sins of DLP and Know your Enemy. Check Point University 2010. Agenda. 1. 2. Requirements. Solution. Data Loss Prevention. Data breaches have happened to all of us. What is DLP?. [email protected]. Corporate Strategy. Green World Strategy Plan 2010. - PowerPoint PPT Presentation
Citation preview
©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone
Avoid the Deadly Sins of DLP and Know your Enemy
Check Point University 2010
22©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone |
Agenda
1 Requirements
2 Solution
33©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone |
Data Loss Prevention
What is DLP?
Corporate Strategy
Green World Strategy Plan 2010
E-mail sent to the wrong
recipient, intentionally or by mistake.
Data breaches have happened to all of usData breaches have happened to all of us
Company document uploaded to an external website.
44©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone |
The Cost of DLP
Costs
Professional Services:
Identify Data
Data loss risks – SMTP, HTTP, FTP
Data Classification
On going Classification
Employee awareness
Risks
Lack of business edge on competitors
Brand damage
Regulatory Compliance
Financial penalties – ISO
55©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone |
Risk AnalysisIm
pact
Probability
90% of all Data Loss incidents
seem to be accidental loss through -SMTP
Accidental
SMTP
Intentional
SMTP
Intentional
HTTP
high
lowlow
high
66©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone |
Requirements
88©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone |
Agenda
1 Requirements
2 Solution
3 Future
99©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone |
Graduate R&D employees are intelligent users, unintentional data loss is primary issue.
Users need to be educated regarding their actions. Must protect against information posted to Web sites and
FTP servers. Growing organization has finite IT administrator resources,
any solution must not be too onerous. The Solution must increase Data Leakage Visibility Gateway based Check point DLP will address these
issues.
Megahopeful
1010©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone |
John,
Let’s review the corporate strategy in our morning meeting.
Green World Strategy Plan 2010
Corporate Strategy
Data Loss Prevention Alert
An email that you have just sent has been quarantined.
Reason: attached document contains confidential internal data
The message is being held until further action.
Send , Discard , or Review Issue
Introducing Check Point Data Loss Prevention
Educate
Users on corporate data policies
Educate
Users on corporate data policies
EnforceData loss
business processes
EnforceData loss
business processes
PreventMove from detection
to prevention
PreventMove from detection
to prevention
Check Point Combines Technology and Processes to Make DLP Work
Check Point Combines Technology and Processes to Make DLP Work
NEW!
1111©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone |
Check Point Solves the DLP Challenge
Technology ChallengeEmpowers users to remediate
incidents in real time
Technology ChallengeEmpowers users to remediate
incidents in real time
IT Staff ChallengeEducates users on DLP policies
without involving IT staff
IT Staff ChallengeEducates users on DLP policies
without involving IT staff
New UserCheck™ TechnologyNew UserCheck™ Technology
1212©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone |
Item No.
Name Social Security Number
Job Title Gross Pay
1 John Smith 987-65-4320 CEO $200,000
2 Kevin Brian 987-65-4221 VP R&D $150,000
3 Margret White
769-65-7522 VP Marketing
$153,000
4 Bob Johns 342-62-3323 CFO $140,000
5 Mike Riddle 777-43-4324 COO $180,000
Correlates data from multiple sources using open languageCorrelates data from multiple sources using open language
New MultiSpect™ Technology
MultiSpect Detection EngineMultiSpect Detection EngineMultiSpect Detection EngineMultiSpect Detection Engine
Detects more than 600 file formatsDetects more than 600 file formats600+ File Formats600+ File Formats250+ Data Types250+ Data Types
Over 250 pre-defined content data types
Over 250 pre-defined content data types
Detect and recognize proprietary forms and templates
Detect and recognize proprietary forms and templates
1313©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone |
Simple Rule-based Policy Management
Easily Define Policy to Detect, Prevent or Ask UserEasily Define Policy to Detect, Prevent or Ask UserEasily Define Policy to Detect, Prevent or Ask UserEasily Define Policy to Detect, Prevent or Ask User
1414©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone |
Using Document Templates
Using document templates to identify sensitive Data
1515©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone |
Project Plan Numbers
Create an updated list of current project numbers, to check for project details leaking out
1616©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone |
More standardized Protections
Other Leakage protections
1717©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone |
For acquisitions solution may be extended Could use either the same policy or one more
tailored to their needs All secured from a central location using the
same entities As their current infrastructure is Cisco, DLP-1
appliance would slot in for immediate protection
New on the Block
New Acquisitions
1818©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone |
SmartEvent
Check Point SmartEvent will allow real time altering of DLP incidents
1919©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone |
Solution Overview
2020©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone |
Agenda
1 Requirements
2 Solution
2121©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone |
Summary
Check Point Application ControlSoftware Blade
Check Point Application ControlSoftware Blade
Detect and control application usage
Available on EVERY gatewayAvailable Q4 2010
AppWiki—Industry’s largest library with over 50,000 applications
Educate users on corporate policies