Don`t Be the Next Data Loss Story

Don’t Be the Next Data Loss Story
Titus: Blair Canavan
McAfee: Chris Ellis
Date
-
Public
The Importance of Data Protection
McAfee DLP + TITUS Data Classification
About McAfee
Founded in 1987
as the world’s
largest dedicated
security company
More than 150M
user desktops
protected
Global research
for real-time
threat
intelligence
Compliance
processes
built into
solutions
Single
management
platform for
optimized security
R&D in 26
countries and
presence in 120
countries
Single
deployments in
excess of 5M
desktops
445 patents,
many more
pending
6,102 McAfee
employees
globally
83% of Fortune
100 companies
rely on McAfee
-
Public
WWW.TITUS.COM | © TITUS. ALL RIGHTS RESERVED |
Intel and McAfee
The Third Pillar of Computing
BETTER SECURITY SOLUTIONS AND PRODUCTS
POWERS EFFICIENT
PERFORMANCE
INTERNET
CONNECTIVITY
-
Public
SECURITY
WWW.TITUS.COM | © TITUS. ALL RIGHTS RESERVED |
Visibility - Integration - Partners
Enterprise Visibility
• Managing 100+ million
endpoints worldwide
• Security Management
• Malware Protection
Everywhere
• Risk Posture
Assessment
• Incident Management
& Incident Response
• Data Protection
Integrated Solutions
• Successful integration
of 12 best of breed
companies to expand
our breadth and depth
• McAfee Global Threat
Intelligence correlates
major threat vectors.
• Intel platform
experience
• Cost Efficiencies of
Scale
-
Public
Partners
• 200+ partners adopt the
McAfee ePO platform
• Vibrant ecosystem
across 8 technology
categories
• Standards and
published interfaces cut
integration and
maintenance, reduce
risk, ease change
• Enterprise data classification solutions
• TITUS solutions identify and protect information assets:
– Enhance and provide data leakage protection
– Raise user security awareness
– Enforce policies at the desktop and network
6
Public
October 10,
2013
-
Data Breaches Don’t Discriminate
“DuPont scientist stole 22,000
sensitive documents worth $400M
as he got ready to take a job with a
competitor…”
02/2007
“MasterCard, Visa, Amex and
Discover hit by a data-security
breach Global Payments Inc
systems were compromised by
unauthorized access.”
03/2012
Two USB devices lost Nov 2012
contained information on almost
583,000 Canadian student loan
recipients and more than 5,000
people receiving CPP and
disability benefits
(Mark Lennihan/Associated Press)
86,000 records compromised @ $214 per record (Ponemon Institute)
= $18,404,000
Which was certainlyPublic
not in the budget!
-
The Sources of Data Loss
Data Types
Data-in-Motion
Web Post
Network
IM Chat
W I L D
Data-at-Rest
File Share
Database
Removable
Media
-
Public
Printer
Screen
Clipboard
W E S T
Desktop/Laptop
Data-in-Use
8
W I L D
Email
TITUS and McAfee - Trending
• “DLP 2.0” a New way of thinking and implementing DLP
• Movement from DLR (Reporting) to true DLP (Prevention)
• Movement from blocking to sharing data
• Movement from Fearing DLP to Embracing DLP
• Classification - “the essential ingredient to successful DLP”
-
Public
“One of These Things…..”
We’ve had it all along…..
10
Public
October 10,
2013
-
DLP Policy Trending
Internal Only
Restrict distribution & access to internal documents
Protection
Encrypt all documents
marked Secret
Removable Media
Restrict copy of
internal docs
Remediation
Prompt user
Monitoring
Specific activities and
actions
11
-
Public
Monitor Data
DLP Endpoint
•
DLP Endpoint
Provide content-aware detection
 Over 300 content types
Switches/Routers
 Outlook, webmails
 IM/FTP/HTTP(S)
 I/O channels (USB, media, devices)
DLP Monitor
DLP Monitor
•
Passively monitor all network traffic
 Detect tags via keywords or concept
What It Does
•
Monitor data as it moves across the
network and as it leaves the endpoint.
Examine how data is being used
 What, where, who or why
•
-
Protocol agnostic
Public
12
Discover Data
DLP Endpoint
DLP Endpoint
•
DLP Discover
Crawl local drives & Tag
 Application, location or content
 Outlook files (PST/OST)
•
Remediate
 Move, delete or encrypt
DLP Discover
•
Crawl servers
 Inventory, classify, or fingerprint data
What It Does
•
Find and protect sensitive information in
storage repositories and hard drives.
Remediate
 Move, delete, or encrypt
•
Supported repositories/databases
 CIFS/NFS/HTTP(S)/FTP(S)
 SharePoint/Documentum
 SQL/Oracle/DB2/MySQL Enterprise
-
Public
13
Protect Data
DLP Endpoint
•
DLP Endpoint
Provide content-aware device
control
 Move or block
Email/Web Gateway
•
Integrated with Endpoint
Encryption
 File, folder, or USB
•
DLP Prevent
DRM support
 Adobe, MS RMS
DLP Prevent
What It Does
•
Protect against data loss via outbound
email, web postings, and endpoints such as
laptops, USBs and other devices.
Analyze network traffic for both
email and web
 SMTP/HTTP/HTTPS
 IM/Blog/FTP/FTPS
-
•
Allow, block, bounce or notify
•
Encrypt, quarantine, or redirect
Public
14
Why McAfee + TITUS?
TITUS + McAfee….How it Works
1.
Deploy
TITUS
withpolicy
ePO
3.
MFE DLP
applies
based
on documents
TITUS
metadata
2.
client
classifies
emails
and
4.
Emails
and
documents
are
released
or blocked
5. TITUS
Logging,
reporting
with
ESM
-
Public
Leveraging TITUS Metadata
In the McAfee Ecosystem
Network
Endpoint
Anti-Virus & Anti-Spyware
E-mail Security
Email AV & Anti-Spam
Web Security
Desktop Firewall
Network DLP
ePO
Host IPS
Policy Auditing
Macintosh AV
Firewall/UTM
Advanced Threat Defence
Behavioral Analysis
Linux AV
Risk & Compliance
Endpoint Encryption
Vulnerability Mgmt
Device Control
Remediation
DLP Endpoint
Policy Auditing
TITUS
Removable Media
-
Public
Data Discovery
Application Control
McAfee Agent
Site Advisor
Forensics
WWW.TITUS.COM | © TITUS. ALL RIGHTS RESERVED |
Security Connected Reference Architecture
ENDPOINT SECURITY
NETWORK SECURITY
Malware Protection
Device Encryption
Application Control
Desktop Firewall
Device Control
Email Protection
Host IPS
Endpoint Web Protection
Host Intrusion Protection
Next Generation Firewall
Intrusion Prevention
Advanced Threat Defence
Network User Behavior Analysis
INFORMATION SECURITY
Email Security
Web Security
Data Loss Prevention
Encryption
Server and Database Protection
On Chip (Silicon-Based) Security
Smartphone and Tablet Protection
Virtual Machine and VDI Protection
Embedded Device Protection
SECURITY MANAGEMENT
Security Operations Console
Policy Auditing & Management
Vulnerability Management
Risk Management
Compliance
SIEM
PARTNER COMMUNITY
Security Innovation Alliance (SIA)
McAfee Connected
Global Strategic Alliance Partners
Improve your risk posture, at a reduced cost while
incorporating the needs of your
strategic business initiatives
Public
-
Why McAfee DLP + TITUS is Unique…
1. Time-to-Value Deployment
2. Simplified Policy Management
3. Unique Forensic Investigation
4. A Part of the Security Connected Platform
5. ePO Leveraged by Joint Solutions
6. Accuracy and Reliability for Active DLP
19
-
Public
DLP endpoint – Use Cases
Data Loss via Social Media
Block
Unauthorized
Posting
21
-
Public
Uploading Sensitive Data to Box
Stop
Uploading
onto Box
22
-
Public
Unauthorized Clipboard Access to Data
Prevent
Unauthorized
Copying
23
-
Public
Data Leak via Outbound Email
Prevent Data
Loss from
Email
24
-
Public
24
60-Seconds in the Life of a User
25
-
Public
WWW.TITUS.COM | © TITUS. ALL RIGHTS RESERVED |
Joint McAfee & TITUS Clients
-
Public
-
Public
Contact Info
Blair Canavan
VP Business Development
[email protected]
613-355-0468 mobile
Chris Ellis
Senior System Engineer
[email protected]
613-292-2410 mobile
-
Public