27
Customer Spotlight: Deploying a Data Protection Program in less than 120 Days Michael Ring, Jabil Mark Stevens, Digital Guardian

Customer Spotlight:Deploying a Data Protection Program in less than 120 Days

Embed Size (px)

Citation preview

Customer Spotlight:Deploying a Data Protection Program in less than 120 DaysMichael Ring, JabilMark Stevens, Digital Guardian

Agenda

Introduction

Deploying a Data Protection Program in < 120 Days

• Mike Ring, Jabil

Digital Guardian Overview

• Mark Stevens, Digital Guardian

Live Q&A with Mike and Mark

About Mike Ring

Senior IT Manager, Threat and

Solution Architect

15 years’ experience in InfoSec

Jabil

Global manufacturing services company 180,000+ employees 90 plants in 23 countries $17.2B revenue in 2013

Proven Manufacturing SolutionsGlobal Expertise. Intelligent Supply Chain Design.

Jabil’s Security Situation

Data protection was in catch up mode

Lacked basic processes

“IP could be anything”

Security could be a competitive advantage

Jabil’s IT Environment

Cloud-based IT environment since 2010

No standardization

Had budget but not headcount to accelerate

security maturity

Security Objectives

52,000 devices at one level of security, needed to get to higher level

Protect:• IP: Jabil’s and customers’• Pricing data• Employee data

Quickly build a program focused on agility and collaboration

Jabil’s Solution

Three key security technologies

• Web Proxy• Single Sign-on• Data Protection

Had to be 100% managed service

Web

ProxySSO

Data Protection

Why DG Managed Security Program

InfoSec can govern, not administer

Unique context-awareness

Capabilities beyond just DLP

Very fast ramp

Time to value

Getting the CIO on Board

Prior successful rapid deployments

Application usage collection was major value-add

Able to reconcile license usage and reduce costs

Implementing Digital Guardian

3,000 agents deployed in dev environment

49,000 agents deployed next

May June July August

Initial

Engagement

3,000Agents Deployed

in Development

49,000Agents Deployed

in Monitor Mode

Fast Forward Framework

Results

Gained immediate visibility into all data access and usage

Saw data getting copied to USB drives

Used egress reports to drive adoption

What’s Next?

Using visibility to drive classification and policy making

Transition to operational plan

Roll out DG controls to mitigate top data risks

DG for advanced threat detection and forensic analysis

About Mark Stevens

VP, Global Services & Support

Driving customer success

20 year tech industry veteran• IBM, BMC, Progress, Lotus

Data-Centric Security Recap

“In this new reality, traditional perimeter-based approaches to security are insufficient. S&R pros must take a data-centric approach that ensures security travels with the data regardless of user population, location, or even hosting model.”

The Future Of Data Security: A Zero Trust Approach

John Kindervag, Heidi Shey, and Kelley Mak, June 5, 2014

Confidential 14

Data Security That Starts at the Source

15

Patented, Proven Endpoint Agent

16

Automatic Sensitive Data Classification

17

STOP Data Theft From Insiders and Outsiders

18

Protect Your Data From Insider Threats

Confidential 19

Protect Your Data for the Best Defense from Outsider Threats

Confidential 20

Flexible Deployment Models

Confidential 21

Infrastructure hosted in your

environment

Self-administration

Policies, rules and reports

managed by you

Engage with Digital Guardian

Pro Services as needed

Infrastructure hosted in Digital

Guardian private cloud

Administered by Digital

Guardian Pro Services

Access to policies, rules, and

reports

Weekly status meetings

Infrastructure hosted in your

environment

Administered remotely by

Digital Guardian Pro Services

Data remains within your IT

environment

Option 1

On PremiseOption 2

Managed ServiceOption 3

HybridManaged Service On Premise

“By selecting the managed service deployment option, we were able to be up and running in a matter of weeks. The

added visibility into how our confidential data is being used is invaluable.”

CISO, Regional Bank

22

23

24

Questions?