20
©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone Avoid the Deadly Sins of DLP and Know your Enemy Check Point University 2010

Avoid the Deadly Sins of DLP and Know your Enemy

Embed Size (px)

DESCRIPTION

Avoid the Deadly Sins of DLP and Know your Enemy. Check Point University 2010. Agenda. 1. 2. Requirements. Solution. Data Loss Prevention. Data breaches have happened to all of us. What is DLP?. [email protected]. Corporate Strategy. Green World Strategy Plan 2010. - PowerPoint PPT Presentation

Citation preview

Page 1: Avoid the Deadly Sins of DLP and Know your Enemy

©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone

Avoid the Deadly Sins of DLP and Know your Enemy

Check Point University 2010

Page 2: Avoid the Deadly Sins of DLP and Know your Enemy

22©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone |

Agenda

1 Requirements

2 Solution

Page 3: Avoid the Deadly Sins of DLP and Know your Enemy

33©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone |

Data Loss Prevention

What is DLP?

[email protected]

Corporate Strategy

Green World Strategy Plan 2010

E-mail sent to the wrong

recipient, intentionally or by mistake.

Data breaches have happened to all of usData breaches have happened to all of us

Company document uploaded to an external website.

Page 4: Avoid the Deadly Sins of DLP and Know your Enemy

44©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone |

The Cost of DLP

Costs

Professional Services:

Identify Data

Data loss risks – SMTP, HTTP, FTP

Data Classification

On going Classification

Employee awareness

Risks

Lack of business edge on competitors

Brand damage

Regulatory Compliance

Financial penalties – ISO

Page 5: Avoid the Deadly Sins of DLP and Know your Enemy

55©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone |

Risk AnalysisIm

pact

Probability

90% of all Data Loss incidents

seem to be accidental loss through -SMTP

email

Accidental

SMTP

Intentional

SMTP

Intentional

HTTP

high

lowlow

high

Page 6: Avoid the Deadly Sins of DLP and Know your Enemy

66©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone |

Requirements

Page 7: Avoid the Deadly Sins of DLP and Know your Enemy

88©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone |

Agenda

1 Requirements

2 Solution

3 Future

Page 8: Avoid the Deadly Sins of DLP and Know your Enemy

99©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone |

Graduate R&D employees are intelligent users, unintentional data loss is primary issue.

Users need to be educated regarding their actions. Must protect against information posted to Web sites and

FTP servers. Growing organization has finite IT administrator resources,

any solution must not be too onerous. The Solution must increase Data Leakage Visibility Gateway based Check point DLP will address these

issues.

Megahopeful

Page 9: Avoid the Deadly Sins of DLP and Know your Enemy

1010©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone |

John,

Let’s review the corporate strategy in our morning meeting.

Green World Strategy Plan 2010

[email protected]

Corporate Strategy

Data Loss Prevention Alert

An email that you have just sent has been quarantined.

Reason: attached document contains confidential internal data

The message is being held until further action.

Send , Discard , or Review Issue

Introducing Check Point Data Loss Prevention

Educate

Users on corporate data policies

Educate

Users on corporate data policies

EnforceData loss

business processes

EnforceData loss

business processes

PreventMove from detection

to prevention

PreventMove from detection

to prevention

Check Point Combines Technology and Processes to Make DLP Work

Check Point Combines Technology and Processes to Make DLP Work

NEW!

Page 10: Avoid the Deadly Sins of DLP and Know your Enemy

1111©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone |

Check Point Solves the DLP Challenge

Technology ChallengeEmpowers users to remediate

incidents in real time

Technology ChallengeEmpowers users to remediate

incidents in real time

IT Staff ChallengeEducates users on DLP policies

without involving IT staff

IT Staff ChallengeEducates users on DLP policies

without involving IT staff

New UserCheck™ TechnologyNew UserCheck™ Technology

Page 11: Avoid the Deadly Sins of DLP and Know your Enemy

1212©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone |

Item No.

Name Social Security Number

Job Title Gross Pay

1 John Smith 987-65-4320 CEO $200,000

2 Kevin Brian 987-65-4221 VP R&D $150,000

3 Margret White

769-65-7522 VP Marketing

$153,000

4 Bob Johns 342-62-3323 CFO $140,000

5 Mike Riddle 777-43-4324 COO $180,000

Correlates data from multiple sources using open languageCorrelates data from multiple sources using open language

New MultiSpect™ Technology

MultiSpect Detection EngineMultiSpect Detection EngineMultiSpect Detection EngineMultiSpect Detection Engine

Detects more than 600 file formatsDetects more than 600 file formats600+ File Formats600+ File Formats250+ Data Types250+ Data Types

Over 250 pre-defined content data types

Over 250 pre-defined content data types

Detect and recognize proprietary forms and templates

Detect and recognize proprietary forms and templates

Page 12: Avoid the Deadly Sins of DLP and Know your Enemy

1313©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone |

Simple Rule-based Policy Management

Easily Define Policy to Detect, Prevent or Ask UserEasily Define Policy to Detect, Prevent or Ask UserEasily Define Policy to Detect, Prevent or Ask UserEasily Define Policy to Detect, Prevent or Ask User

Page 13: Avoid the Deadly Sins of DLP and Know your Enemy

1414©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone |

Using Document Templates

Using document templates to identify sensitive Data

Page 14: Avoid the Deadly Sins of DLP and Know your Enemy

1515©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone |

Project Plan Numbers

Create an updated list of current project numbers, to check for project details leaking out

Page 15: Avoid the Deadly Sins of DLP and Know your Enemy

1616©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone |

More standardized Protections

Other Leakage protections

Page 16: Avoid the Deadly Sins of DLP and Know your Enemy

1717©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone |

For acquisitions solution may be extended Could use either the same policy or one more

tailored to their needs All secured from a central location using the

same entities As their current infrastructure is Cisco, DLP-1

appliance would slot in for immediate protection

New on the Block

New Acquisitions

Page 17: Avoid the Deadly Sins of DLP and Know your Enemy

1818©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone |

SmartEvent

Check Point SmartEvent will allow real time altering of DLP incidents

Page 18: Avoid the Deadly Sins of DLP and Know your Enemy

1919©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone |

Solution Overview

Page 19: Avoid the Deadly Sins of DLP and Know your Enemy

2020©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone |

Agenda

1 Requirements

2 Solution

Page 20: Avoid the Deadly Sins of DLP and Know your Enemy

2121©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone |

Summary

Check Point Application ControlSoftware Blade

Check Point Application ControlSoftware Blade

Detect and control application usage

Available on EVERY gatewayAvailable Q4 2010

AppWiki—Industry’s largest library with over 50,000 applications

Educate users on corporate policies