RSA Data Loss Prevention(DLP) Suite
Discover and Mitigate Business Risk from Sensitive Data
RSA Data Loss Prevention




                               Data Breaches Overview
                               RSA DLP Solution
                               Five Critical Factors
                               Customer Case Studies



     2
2
Why is Information Security So Difficult?
Endpoint     Network/E-mail        Apps/DB                   FS/CMS                    Storage



                  LAN


  Internal                     Enterprise    Production      File Server
 Employees                    Applications                                       Disk Arrays   Backup
                  WAN                         Database                                          Tape



                  VPN
                                                                                               Backup
                                Business      Replica         File Server        Disk Arrays   System
  Remote
                                Analytics
 Employees




                                                                                 Disk Arrays Backup Disk
                                                          SharePoint and other
                               Outsourced     Staging       Collaboration &
 Partners                         Dev.                       Content Mgmt
                                                                Systems

3
Endpoint     Network/E-mail        Apps/DB                   FS/CMS                    Storage
We Are Exposed At Every Point
Endpoint           Network/E-mail             Apps/DB                    FS/CMS                    Storage



                           LAN

                        Network Leak
    Endpoint                                   Privileged User          Privileged User             Tapes lost or
    Internal           Email-IM-HTTP-     Enterprise                     File Server
    theft/loss
                          FTP-etc.                 BreachProduction         Breach                     stolen
                                                                                                            Backup
  Employees                              Applications      Database                          Disk Arrays
                           WAN                                                                               Tape



                           VPN
                                                                                                            Backup
                       E-mail leak or      Business DB or Replica
                                                App,                       File Server       Disk Arrays    System
 Endpoint Leak                                                          File Server / CMS
   Remote             packets sniffed         Encryption Key
 via print/copy
                         in transit
                                           Analytics
                                                   Hack
                                                                              Hack
 Employees




                                                                                             Disk Arrays Backup Disk
                                                                      SharePoint and other
                            Public        Outsourced        Staging     Collaboration &
                                                                             (Semi)               Discarded disk
   IP Sent to
  Partners                                     Unintentional
                        Infrastructure       Dev.
non trusted user
                         Access Hack
                                                Distribution             Content User
                                                                          Trusted Mgmt               exploited
                                                                             Misuse
                                                                             Systems

4
Endpoint           Network/E-mail             Apps/DB                    FS/CMS                    Storage
There Are Many Point Solutions
Endpoint         Network/E-mail        Apps/DB                    FS/CMS                    Storage

      Mobile           Email              Application                  File
    Encryption       Encryption           Encryption                Encryption
                       LAN

                                                                                                Tape
  Internal                         Enterprise     Production      File Server                 Encryption
 Employees                        Applications                                        Disk Arrays   Backup
                       WAN                         Database                                          Tape
      Port            Network               Database                 CMS/FS
    Monitoring       Monitoring            Encryption             Access Controls



                       VPN
                                                                                                    Backup
                                    Business         Replica       File Server        Disk Arrays   System
  Remote
     File             Network               Activity
  Encryption         Encryption
                                    Analytics
                                          Monitoring
                                                                       eDRM
 Employees
                                                                                                 Disk
                                                                                              Encryption

                                                                                      Disk Arrays Backup Disk
                                            App/DB             SharePoint and other
      eDRM             eDRM        Outsourced      Staging              File
                                                                 Collaboration &
 Partners                                  Discovery                 Discovery
                                      Dev.                        Content Mgmt
                                                                     Systems

5
Endpoint         Network/E-mail        Apps/DB                    FS/CMS                    Storage
The Business Case for DLP
Reduce Risk | Minimize Cost | Avoid Disruption




                                      Reduce Risk

                           1. What data can you catch? Where?
                           2. What can you do about it?
                           3. Time to Value



             Minimize Cost                            Avoid Disruption
    1. Product                                  1. Consider the “who” not just “what”
    2. People
                                                2. Make controls transparent to users
       a) Setup/Maintain
       b) Investigations                        3. Involve the data owners
       c) Remediation
    3. Infrastructure
6
RSA Data Loss Prevention




                               Data Breaches Overview
                               RSA DLP Solution
                               Five Critical Factors
                               Customer Case Studies



     7
7
RSA Data Loss Prevention Suite


       Policy            System            RSA DLP                           Reporting &         Incident
     Management       Administration                                         Dashboard           Workflow
                                       Enterprise Manager


                                 Policies                              Incidents



        DLP Datacenter                          DLP Network                            DLP Endpoint

       Discover sensitive data               Monitor all traffic for                Discover sensitive data
          from everywhere                      sensitive data                      and Monitor user actions


         Enforce controls on                  Enforce controls on                  Enforce controls on both
           sensitive data                   sensitive transmissions                 data and user actions




                                    Third Party Enforcement Controls
 8
Reducing Your Sources of Risk: Data at Rest


            Discover                                  Analyze                        Remediate




                           Rescan sources to measure and manage risk




File shares, Servers, Laptops   300+ File types           Databases & Repositories            Remediation
•Windows file shares            •Microsoft Office Files   •SharePoint                 • Secure Delete
•Unix file shares               •PDFs, PSTs               •Documentum                 • Manual/Auto Move
•NAS / SAN storage              •Zip files                •Microsoft Access           • Manual/Auto Quarantine
•Windows 2000, 2003             •CATIA files              •Oracle, SQL                • Notifications
•Windows XP, Vista                                        •Content Mgmt systems       • eDRM
    9
Protecting Data in the Network: Data in Motion


                Monitor                        Analyze                     Enforce




        Email               Instant Messages                 Web Traffic              Remediation
•SMTP email               •Yahoo IM                •FTP                    •Audit
•Exchange, Lotus, etc.    •MSN Messenger           •HTTP                   •Block
•Webmail                  •AOL Messenger           •HTTPS                  •Encrypt
•Text and attachments                              •TCP/IP                 •Log

   10
Protecting Data at the Endpoint: Data in Use


             Monitor                           Analyze                        Enforce




        Print & Burn           USB                    Copy and Save As             Actions & Controls
•Local printers        •External hard drives       •Copy to Network shares    • Allow
•Network printers      •Memory sticks              •Copy to external drives   • Justify
•Burn to CDs/DVDs      •Removable media            •Save As to external       • Block
                                                   drives                     • Audit & Log

   11
How Can RSA DLP Solution Help?

                Identify and address sources of risk
     Discover
                Identify broken business processes


                Enforce data security policies for compliance
     Enforce
                Leverage third-party control solutions

                Educate employees on policy and risk
     Educate
                Provide insight into violations & policies

                Monitor and protect all egress points
     Protect
                Prevent sensitive data from leaking out
12
How Can DLP Solutions Reduce Risk?
Endpoint            Network         Apps/DB                     FS/CMS              Storage



    Customers          Privileged           Privileged              Privileged                Privileged

 People                Users                Users                   Users                     Users



   • Discover unsafe user behavior and educate
                        WWW

        Internal                                   Production
     employees on security policies
        Employees
                                    eCommerce
                                    Applications   Database
                                                                                     Disk
                                                                                     Arrays
                                                                                                       Backup
                                                                                                       Tape
                         WAN


 Processes                          Enterprise     Production
                                                                                                Backup
                         LAN                       Database         File Server      Disk
   • Identify and fix broken business processes
    Remote
    Campuses
                                    Applications
                                                                                     Arrays     System



                         VPN
 Technology                          Business
                                     Analytics
                                                    Replica
                                                                      Portals        Disk              Backup
        Remote
   • Leverage technology controls more effectively
        Employees
                                                                                     Arrays            Disk



     to secure data                 Outsourced      Staging
                                                                  Collaboration &
                                    Dev.                                             Disk
                                                                  Content Mgmt
   13                                                             Systems            Arrays
        Partners
            13
RSA Data Loss Prevention




                            Data Breaches Overview
                            RSA DLP Solution
                            Five Critical Factors
                            Customer Case Studies



     14
14
Top 5 Success Factors for DLP




                                                                     E
   Policy &                Identity             Incident             Enterprise           Built-In vs.
Classification              Aware               Workflow             Scalability           Bolt-On

More policies and     Identity awareness     Consolidated alerts     Scan more data      Common policies
better policies for    for classification,       with the right     faster with lesser       across the
classification and       controls and         information to the      hardware and        infrastructure -
  risk mitigation         remediation        right people for the       resources        EMC, Cisco and
                                                 right actions                                Microsoft




15
Policy & Classification


                More policies and better policies for classification
                and risk mitigation



• Unified policy framework
• Best of breed classification
• 150+ built in policy templates
• Information Policy and Classification team
• Highest accuracy per Wipro analysis




 16
Identity Awareness


               Identity awareness for classification, controls and
               remediation


• Identity-based Policy
     E.g. Group x can send data y out
• Identity-based notification
     E.g. Notify the persons manager
• Identity-based control
     E.g. Lock this data so only group x can open
• Integration with Microsoft Active Directory




17
Incident Workflow


               Consolidated alerts with the right information to the
               right people for the right actions



• Intelligent correlation of events into incidents
• Right alerts to the right people in the right order
• Intuitive workflow to remediate violations
• Scheduled reports sent to subscribers automatically
• Integration with RSA enVision to simplify security
  operations



18
Enterprise Scalability



E             Scan more data faster with lesser hardware and
              resources


• Support distributed deployments
• Scale to 100’s of thousands of users
• Unique Grid Scanning technology
• Scan large amounts of data faster and cheaper




19
Built-in Vs. Bolt-on


              Common policies across the infrastructure –
              Microsoft, Cisco and EMC


• Leverage your existing infrastructure
• Microsoft: Integration with Microsoft RMS and will
  also integrate RSA DLP data classification engine
  and policies into Microsoft infrastructure
• Cisco: Integration with IronPort
• EMC: Integration with Documentum, Celerra,
  SourceOne, etc.



20
RSA Data Loss Prevention




                            Data Breaches Overview
                            RSA DLP Solution
                            Five Critical Factors
                            Customer Case Studies



     21
21
Customers From A Wide Range of Industries




22
How Can We Help

      Your Current Status                  We Can Help
Gathering Information                  By Offering

1. Investigating DLP in general        1. Risk Advisor to discover current risk
2. Identifying business drivers        2. Free Scan to support business case
3. Developing a business case          3. ROI/TCO analysis for DLP
4. Identifying a Project Sponsor       4. DLP workshop



Planning to Procure and Deploy         By Providing

1. Have a defined DLP project          1. A framework for DLP evaluation
                                       2. An evaluation environment
2. Developing a detailed DLP project
                                       3. A detailed DLP proposal
3. Evaluating DLP vendors
                                       4. Deployment architecture


 23
24

More Related Content

PPTX
Track 2, session 5, aligning security with business kartik shahani
PDF
Securing Your Endpoints Using Novell ZENworks Endpoint Security Management
PDF
Terremark Backup Custom Storage Pre Press
PDF
Integrating Apple Macs Using Novell Technologies
PDF
The Cloud: A game changer to test, at scale and in production, SOA based web...
PPTX
The 5 Keys to Virtual Backup Excellence
PDF
Lessons Learned: Novell Open Enterprise Server Upgrades Made Easy
PDF
Finding Virtual Coins in the Couch
Track 2, session 5, aligning security with business kartik shahani
Securing Your Endpoints Using Novell ZENworks Endpoint Security Management
Terremark Backup Custom Storage Pre Press
Integrating Apple Macs Using Novell Technologies
The Cloud: A game changer to test, at scale and in production, SOA based web...
The 5 Keys to Virtual Backup Excellence
Lessons Learned: Novell Open Enterprise Server Upgrades Made Easy
Finding Virtual Coins in the Couch

What's hot (20)

PDF
Novell Filr
PDF
The Efficient Use of Cyberinfrastructure to Enable Data Analysis Collaboration
PPTX
What's new in Exchange 2013?
PDF
Ugly Storage Made Sexy in Novell Open Enterprise Server and Windows Environments
PDF
Domain Services for Windows: Best Practices for Windows Interoperability
PDF
Novell File Management Suite: Intelligently Manage File Storage for Maximum B...
PPTX
Novell Filr Overview
PDF
Life without the Novell Client
PDF
Momentum Infocare Corporate Presentation
PDF
Best Practices for Administering Novell GroupWise 8
PPTX
Webinar issues we_find_slideshare
PDF
Mobility Solutions for Novell GroupWise
PDF
SMB Cloud Solution Brief: Caffelli
PDF
Custom Development with Novell Teaming
PDF
Customer Success - A Public Order Enforcement Government Agency in Asia-Pacific
PDF
fiwalk With Me: Building Emergent Pre-Ingest Workflows for Digital Archival R...
PDF
Novell Storage Manager: Your Secret Weapon for Simplified File and User Manag...
PDF
Advanced DNS/DHCP for Novell eDirectory Environments
PDF
[café techno] Présentation de Backup Exec 2012
PDF
File Access in Novell Open Enterprise Server 2 SP2
Novell Filr
The Efficient Use of Cyberinfrastructure to Enable Data Analysis Collaboration
What's new in Exchange 2013?
Ugly Storage Made Sexy in Novell Open Enterprise Server and Windows Environments
Domain Services for Windows: Best Practices for Windows Interoperability
Novell File Management Suite: Intelligently Manage File Storage for Maximum B...
Novell Filr Overview
Life without the Novell Client
Momentum Infocare Corporate Presentation
Best Practices for Administering Novell GroupWise 8
Webinar issues we_find_slideshare
Mobility Solutions for Novell GroupWise
SMB Cloud Solution Brief: Caffelli
Custom Development with Novell Teaming
Customer Success - A Public Order Enforcement Government Agency in Asia-Pacific
fiwalk With Me: Building Emergent Pre-Ingest Workflows for Digital Archival R...
Novell Storage Manager: Your Secret Weapon for Simplified File and User Manag...
Advanced DNS/DHCP for Novell eDirectory Environments
[café techno] Présentation de Backup Exec 2012
File Access in Novell Open Enterprise Server 2 SP2
Ad

Viewers also liked (20)

PDF
McAfee MOVE & Endpoint Security
PDF
Mcafee dyntek
PPT
PPT
Lauren fiiney
PPT
PPT
PPT
Trentonhall
PPT
W all about mii
PPT
PPT
Isaac albrecht guess who powerpoint
PPT
PPT
PPT
Amber scott
PPT
PPT
PPT
Stephen kapelet
PPT
PPT
McAfee MOVE & Endpoint Security
Mcafee dyntek
Lauren fiiney
Trentonhall
W all about mii
Isaac albrecht guess who powerpoint
Amber scott
Stephen kapelet
Ad

Similar to Data Loss Prevention de RSA (20)

PPTX
Vormetric - Gherkin Event
PPTX
What’s new in windows server 2012
PDF
Viestintäaamupäivä exchange 2013
PPTX
Windows Server 2012 Active Directory Domain and Trust (Forest Trust)
PDF
Next Gen Data Center Implementing Network Storage with Server Blades, Cluster...
PDF
Security in the Cloud
PDF
Security in the Cloud
PPTX
Exchange 2013 ABC's: Architecture, Best Practices and Client Access
PPTX
Viestinnän seminaari 8.11.2012 / Exchange
PDF
Tom McCann - Sopra
PPTX
Gtb Product Technical Present
PPTX
The 5 Keys To Virtual Backup Excellence Exa Grid And Veeam October 25 2012
PDF
Choosing Your Windows Azure Platform Strategy
PDF
Citrix Day 2012: ShareFile
PDF
SERVICE AGGREMENT IT
PDF
F5 Networks: architecture and risk management
PPTX
Aptare Introduction Presentation April 2012
PPTX
Patterns of Cloud Applications Using Microsoft Azure Services Platform
PDF
Virtualization for Development
PDF
Integration SharePoint 2010 with CRM 2010 by Mai Omar Desouki
Vormetric - Gherkin Event
What’s new in windows server 2012
Viestintäaamupäivä exchange 2013
Windows Server 2012 Active Directory Domain and Trust (Forest Trust)
Next Gen Data Center Implementing Network Storage with Server Blades, Cluster...
Security in the Cloud
Security in the Cloud
Exchange 2013 ABC's: Architecture, Best Practices and Client Access
Viestinnän seminaari 8.11.2012 / Exchange
Tom McCann - Sopra
Gtb Product Technical Present
The 5 Keys To Virtual Backup Excellence Exa Grid And Veeam October 25 2012
Choosing Your Windows Azure Platform Strategy
Citrix Day 2012: ShareFile
SERVICE AGGREMENT IT
F5 Networks: architecture and risk management
Aptare Introduction Presentation April 2012
Patterns of Cloud Applications Using Microsoft Azure Services Platform
Virtualization for Development
Integration SharePoint 2010 with CRM 2010 by Mai Omar Desouki

More from AEC Networks (17)

PPTX
Soluciones de Seguridad para Banca & Finanzas
PPSX
F5 Networks - Soluciones para Banca & Finanzas
PPTX
The Extreme Experience
PDF
Barracuda Networks Solutions
PPT
Barracuda Networks Overview
PPTX
La Cerveza
PPT
Blue Coat: Application Delivery Networks
PPTX
Zscaler - webcast de Gartner - Los peligros ocultos detrás de su motor de bús...
PPTX
Cifrado de Datos - PGP Corporation
PPTX
Virtualización de Archivos - F5 Networks
PPT
Combatiendo Amenazas de Seguridad en la Nube - WatchGuard
PPT
Virtualización en la Red del Data Center - Extreme Networks
PPT
Cata de Vinos de Chile
PDF
Feliz Navidad 2009
PDF
WatchGuard´s XCS Brochure
PDF
Introduccion a enVision de RSA
PPSX
Retos y Tendencias en Redes Convergentes
Soluciones de Seguridad para Banca & Finanzas
F5 Networks - Soluciones para Banca & Finanzas
The Extreme Experience
Barracuda Networks Solutions
Barracuda Networks Overview
La Cerveza
Blue Coat: Application Delivery Networks
Zscaler - webcast de Gartner - Los peligros ocultos detrás de su motor de bús...
Cifrado de Datos - PGP Corporation
Virtualización de Archivos - F5 Networks
Combatiendo Amenazas de Seguridad en la Nube - WatchGuard
Virtualización en la Red del Data Center - Extreme Networks
Cata de Vinos de Chile
Feliz Navidad 2009
WatchGuard´s XCS Brochure
Introduccion a enVision de RSA
Retos y Tendencias en Redes Convergentes

Recently uploaded (20)

PDF
Getting started with AI Agents and Multi-Agent Systems
PDF
Assigned Numbers - 2025 - Bluetooth® Document
PPT
Geologic Time for studying geology for geologist
PDF
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
PDF
A novel scalable deep ensemble learning framework for big data classification...
PDF
TrustArc Webinar - Click, Consent, Trust: Winning the Privacy Game
PDF
Transform Your ITIL® 4 & ITSM Strategy with AI in 2025.pdf
PDF
Hindi spoken digit analysis for native and non-native speakers
PPTX
Chapter 5: Probability Theory and Statistics
PDF
Unlock new opportunities with location data.pdf
PPTX
Tartificialntelligence_presentation.pptx
PPTX
Modernising the Digital Integration Hub
PDF
Microsoft Solutions Partner Drive Digital Transformation with D365.pdf
PPTX
Web Crawler for Trend Tracking Gen Z Insights.pptx
PDF
Univ-Connecticut-ChatGPT-Presentaion.pdf
PPTX
Final SEM Unit 1 for mit wpu at pune .pptx
PPT
What is a Computer? Input Devices /output devices
PDF
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
PDF
August Patch Tuesday
PDF
Hybrid horned lizard optimization algorithm-aquila optimizer for DC motor
Getting started with AI Agents and Multi-Agent Systems
Assigned Numbers - 2025 - Bluetooth® Document
Geologic Time for studying geology for geologist
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
A novel scalable deep ensemble learning framework for big data classification...
TrustArc Webinar - Click, Consent, Trust: Winning the Privacy Game
Transform Your ITIL® 4 & ITSM Strategy with AI in 2025.pdf
Hindi spoken digit analysis for native and non-native speakers
Chapter 5: Probability Theory and Statistics
Unlock new opportunities with location data.pdf
Tartificialntelligence_presentation.pptx
Modernising the Digital Integration Hub
Microsoft Solutions Partner Drive Digital Transformation with D365.pdf
Web Crawler for Trend Tracking Gen Z Insights.pptx
Univ-Connecticut-ChatGPT-Presentaion.pdf
Final SEM Unit 1 for mit wpu at pune .pptx
What is a Computer? Input Devices /output devices
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
August Patch Tuesday
Hybrid horned lizard optimization algorithm-aquila optimizer for DC motor

Data Loss Prevention de RSA

  • 1. RSA Data Loss Prevention(DLP) Suite Discover and Mitigate Business Risk from Sensitive Data
  • 2. RSA Data Loss Prevention Data Breaches Overview RSA DLP Solution Five Critical Factors Customer Case Studies 2 2
  • 3. Why is Information Security So Difficult? Endpoint Network/E-mail Apps/DB FS/CMS Storage LAN Internal Enterprise Production File Server Employees Applications Disk Arrays Backup WAN Database Tape VPN Backup Business Replica File Server Disk Arrays System Remote Analytics Employees Disk Arrays Backup Disk SharePoint and other Outsourced Staging Collaboration & Partners Dev. Content Mgmt Systems 3 Endpoint Network/E-mail Apps/DB FS/CMS Storage
  • 4. We Are Exposed At Every Point Endpoint Network/E-mail Apps/DB FS/CMS Storage LAN Network Leak Endpoint Privileged User Privileged User Tapes lost or Internal Email-IM-HTTP- Enterprise File Server theft/loss FTP-etc. BreachProduction Breach stolen Backup Employees Applications Database Disk Arrays WAN Tape VPN Backup E-mail leak or Business DB or Replica App, File Server Disk Arrays System Endpoint Leak File Server / CMS Remote packets sniffed Encryption Key via print/copy in transit Analytics Hack Hack Employees Disk Arrays Backup Disk SharePoint and other Public Outsourced Staging Collaboration & (Semi) Discarded disk IP Sent to Partners Unintentional Infrastructure Dev. non trusted user Access Hack Distribution Content User Trusted Mgmt exploited Misuse Systems 4 Endpoint Network/E-mail Apps/DB FS/CMS Storage
  • 5. There Are Many Point Solutions Endpoint Network/E-mail Apps/DB FS/CMS Storage Mobile Email Application File Encryption Encryption Encryption Encryption LAN Tape Internal Enterprise Production File Server Encryption Employees Applications Disk Arrays Backup WAN Database Tape Port Network Database CMS/FS Monitoring Monitoring Encryption Access Controls VPN Backup Business Replica File Server Disk Arrays System Remote File Network Activity Encryption Encryption Analytics Monitoring eDRM Employees Disk Encryption Disk Arrays Backup Disk App/DB SharePoint and other eDRM eDRM Outsourced Staging File Collaboration & Partners Discovery Discovery Dev. Content Mgmt Systems 5 Endpoint Network/E-mail Apps/DB FS/CMS Storage
  • 6. The Business Case for DLP Reduce Risk | Minimize Cost | Avoid Disruption Reduce Risk 1. What data can you catch? Where? 2. What can you do about it? 3. Time to Value Minimize Cost Avoid Disruption 1. Product 1. Consider the “who” not just “what” 2. People 2. Make controls transparent to users a) Setup/Maintain b) Investigations 3. Involve the data owners c) Remediation 3. Infrastructure 6
  • 7. RSA Data Loss Prevention Data Breaches Overview RSA DLP Solution Five Critical Factors Customer Case Studies 7 7
  • 8. RSA Data Loss Prevention Suite Policy System RSA DLP Reporting & Incident Management Administration Dashboard Workflow Enterprise Manager Policies Incidents DLP Datacenter DLP Network DLP Endpoint Discover sensitive data Monitor all traffic for Discover sensitive data from everywhere sensitive data and Monitor user actions Enforce controls on Enforce controls on Enforce controls on both sensitive data sensitive transmissions data and user actions Third Party Enforcement Controls 8
  • 9. Reducing Your Sources of Risk: Data at Rest Discover Analyze Remediate Rescan sources to measure and manage risk File shares, Servers, Laptops 300+ File types Databases & Repositories Remediation •Windows file shares •Microsoft Office Files •SharePoint • Secure Delete •Unix file shares •PDFs, PSTs •Documentum • Manual/Auto Move •NAS / SAN storage •Zip files •Microsoft Access • Manual/Auto Quarantine •Windows 2000, 2003 •CATIA files •Oracle, SQL • Notifications •Windows XP, Vista •Content Mgmt systems • eDRM 9
  • 10. Protecting Data in the Network: Data in Motion Monitor Analyze Enforce Email Instant Messages Web Traffic Remediation •SMTP email •Yahoo IM •FTP •Audit •Exchange, Lotus, etc. •MSN Messenger •HTTP •Block •Webmail •AOL Messenger •HTTPS •Encrypt •Text and attachments •TCP/IP •Log 10
  • 11. Protecting Data at the Endpoint: Data in Use Monitor Analyze Enforce Print & Burn USB Copy and Save As Actions & Controls •Local printers •External hard drives •Copy to Network shares • Allow •Network printers •Memory sticks •Copy to external drives • Justify •Burn to CDs/DVDs •Removable media •Save As to external • Block drives • Audit & Log 11
  • 12. How Can RSA DLP Solution Help? Identify and address sources of risk Discover Identify broken business processes Enforce data security policies for compliance Enforce Leverage third-party control solutions Educate employees on policy and risk Educate Provide insight into violations & policies Monitor and protect all egress points Protect Prevent sensitive data from leaking out 12
  • 13. How Can DLP Solutions Reduce Risk? Endpoint Network Apps/DB FS/CMS Storage Customers Privileged Privileged Privileged Privileged People Users Users Users Users • Discover unsafe user behavior and educate WWW Internal Production employees on security policies Employees eCommerce Applications Database Disk Arrays Backup Tape WAN Processes Enterprise Production Backup LAN Database File Server Disk • Identify and fix broken business processes Remote Campuses Applications Arrays System VPN Technology Business Analytics Replica Portals Disk Backup Remote • Leverage technology controls more effectively Employees Arrays Disk to secure data Outsourced Staging Collaboration & Dev. Disk Content Mgmt 13 Systems Arrays Partners 13
  • 14. RSA Data Loss Prevention Data Breaches Overview RSA DLP Solution Five Critical Factors Customer Case Studies 14 14
  • 15. Top 5 Success Factors for DLP E Policy & Identity Incident Enterprise Built-In vs. Classification Aware Workflow Scalability Bolt-On More policies and Identity awareness Consolidated alerts Scan more data Common policies better policies for for classification, with the right faster with lesser across the classification and controls and information to the hardware and infrastructure - risk mitigation remediation right people for the resources EMC, Cisco and right actions Microsoft 15
  • 16. Policy & Classification More policies and better policies for classification and risk mitigation • Unified policy framework • Best of breed classification • 150+ built in policy templates • Information Policy and Classification team • Highest accuracy per Wipro analysis 16
  • 17. Identity Awareness Identity awareness for classification, controls and remediation • Identity-based Policy E.g. Group x can send data y out • Identity-based notification E.g. Notify the persons manager • Identity-based control E.g. Lock this data so only group x can open • Integration with Microsoft Active Directory 17
  • 18. Incident Workflow Consolidated alerts with the right information to the right people for the right actions • Intelligent correlation of events into incidents • Right alerts to the right people in the right order • Intuitive workflow to remediate violations • Scheduled reports sent to subscribers automatically • Integration with RSA enVision to simplify security operations 18
  • 19. Enterprise Scalability E Scan more data faster with lesser hardware and resources • Support distributed deployments • Scale to 100’s of thousands of users • Unique Grid Scanning technology • Scan large amounts of data faster and cheaper 19
  • 20. Built-in Vs. Bolt-on Common policies across the infrastructure – Microsoft, Cisco and EMC • Leverage your existing infrastructure • Microsoft: Integration with Microsoft RMS and will also integrate RSA DLP data classification engine and policies into Microsoft infrastructure • Cisco: Integration with IronPort • EMC: Integration with Documentum, Celerra, SourceOne, etc. 20
  • 21. RSA Data Loss Prevention Data Breaches Overview RSA DLP Solution Five Critical Factors Customer Case Studies 21 21
  • 22. Customers From A Wide Range of Industries 22
  • 23. How Can We Help Your Current Status We Can Help Gathering Information By Offering 1. Investigating DLP in general 1. Risk Advisor to discover current risk 2. Identifying business drivers 2. Free Scan to support business case 3. Developing a business case 3. ROI/TCO analysis for DLP 4. Identifying a Project Sponsor 4. DLP workshop Planning to Procure and Deploy By Providing 1. Have a defined DLP project 1. A framework for DLP evaluation 2. An evaluation environment 2. Developing a detailed DLP project 3. A detailed DLP proposal 3. Evaluating DLP vendors 4. Deployment architecture 23
  • 24. 24