Upload
digital-guardian
View
149
Download
1
Tags:
Embed Size (px)
Citation preview
Customer Spotlight:Deploying a Data Protection Program in less than 120 DaysMichael Ring, JabilMark Stevens, Digital Guardian
Agenda
Introduction
Deploying a Data Protection Program in < 120 Days
• Mike Ring, Jabil
Digital Guardian Overview
• Mark Stevens, Digital Guardian
Live Q&A with Mike and Mark
Jabil
Global manufacturing services company 180,000+ employees 90 plants in 23 countries $17.2B revenue in 2013
Proven Manufacturing SolutionsGlobal Expertise. Intelligent Supply Chain Design.
Jabil’s Security Situation
Data protection was in catch up mode
Lacked basic processes
“IP could be anything”
Security could be a competitive advantage
Jabil’s IT Environment
Cloud-based IT environment since 2010
No standardization
Had budget but not headcount to accelerate
security maturity
Security Objectives
52,000 devices at one level of security, needed to get to higher level
Protect:• IP: Jabil’s and customers’• Pricing data• Employee data
Quickly build a program focused on agility and collaboration
Jabil’s Solution
Three key security technologies
• Web Proxy• Single Sign-on• Data Protection
Had to be 100% managed service
Web
ProxySSO
Data Protection
Why DG Managed Security Program
InfoSec can govern, not administer
Unique context-awareness
Capabilities beyond just DLP
Very fast ramp
Time to value
Getting the CIO on Board
Prior successful rapid deployments
Application usage collection was major value-add
Able to reconcile license usage and reduce costs
Implementing Digital Guardian
3,000 agents deployed in dev environment
49,000 agents deployed next
May June July August
Initial
Engagement
3,000Agents Deployed
in Development
49,000Agents Deployed
in Monitor Mode
Fast Forward Framework
Results
Gained immediate visibility into all data access and usage
Saw data getting copied to USB drives
Used egress reports to drive adoption
What’s Next?
Using visibility to drive classification and policy making
Transition to operational plan
Roll out DG controls to mitigate top data risks
DG for advanced threat detection and forensic analysis
About Mark Stevens
VP, Global Services & Support
Driving customer success
20 year tech industry veteran• IBM, BMC, Progress, Lotus
Data-Centric Security Recap
“In this new reality, traditional perimeter-based approaches to security are insufficient. S&R pros must take a data-centric approach that ensures security travels with the data regardless of user population, location, or even hosting model.”
The Future Of Data Security: A Zero Trust Approach
John Kindervag, Heidi Shey, and Kelley Mak, June 5, 2014
Confidential 14
Flexible Deployment Models
Confidential 21
Infrastructure hosted in your
environment
Self-administration
Policies, rules and reports
managed by you
Engage with Digital Guardian
Pro Services as needed
Infrastructure hosted in Digital
Guardian private cloud
Administered by Digital
Guardian Pro Services
Access to policies, rules, and
reports
Weekly status meetings
Infrastructure hosted in your
environment
Administered remotely by
Digital Guardian Pro Services
Data remains within your IT
environment
Option 1
On PremiseOption 2
Managed ServiceOption 3
HybridManaged Service On Premise
“By selecting the managed service deployment option, we were able to be up and running in a matter of weeks. The
added visibility into how our confidential data is being used is invaluable.”
CISO, Regional Bank
Interested in learning more about Jabil’s data protection program? Watch the webinar on demand:
http://bit.ly/1yCK9cT