check point makes dlp work

33
©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone Check Point Makes DLP Work April 22, 2010

Upload: vartan

Post on 14-Feb-2016

61 views

Category:

Documents


2 download

DESCRIPTION

Check Point Makes DLP Work. April 22 , 2010. Agenda. 1. 2. 3. 4. What is Data Loss?. Key Challenges of DLP. Introducing Check Point DLP. Summary. Check Point DLP Makes data loss prevention work. Data Loss Prevention. Data breaches have happened to all of us. What is DLP?. - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: Check Point Makes  DLP Work

©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone

Check Point Makes DLP Work

April 22, 2010

Page 2: Check Point Makes  DLP Work

22©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone |

Check Point DLPMakes data loss prevention work

Agenda

1 What is Data Loss?

2 Key Challenges of DLP

3 Introducing Check Point DLP

4 Summary

Page 3: Check Point Makes  DLP Work

33©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone |

Data Loss Prevention

What is DLP?

[email protected]

Corporate Strategy

Green World Strategy Plan 2010

E-mail sent to the wrong recipient, intentionally or by mistake.

Data breaches have happened to all of us

Company document uploaded to an external website.

Page 4: Check Point Makes  DLP Work

44©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone |

Data Breaches—Headline Examples

Brand Damage

Compliance Liabilities

Costly Fines

Page 5: Check Point Makes  DLP Work

55©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone |

It’s Not Just About Regulatory Compliance

Chief Compliance Officer

Chief Security Officer

Compliance

►Customer data

►Corporate data

►Patient data

Security

► Intellectual property

►Strategic plans

► Internal data

Page 6: Check Point Makes  DLP Work

66©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone |

DLP Has Not Yet Been Solved!

Technology

Challenge

Computers can not reliably understand human content and

context

IT Staff

Challenge

Burden of incident handling

Exposure to sensitive data

Page 7: Check Point Makes  DLP Work

77©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone |

Check Point Makes DLP Work

[email protected]

Corporate Strategy

John,

Let’s review the corporate strategy in our morning meeting.

Green World Strategy Plan 2010

‘John’ <[email protected]>

[email protected]

Confidential data sent to the wrong recipient!

Data Loss Prevention Alert

An email that you have just sent has been quarantined.

Reason: attached document contains confidential internal data

The message is being held until further action.

Send , Discard , or Review Issue

User prompted to take action

User remediates

Page 8: Check Point Makes  DLP Work

88©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone |

John,

Let’s review the corporate strategy in our morning meeting.

Green World Strategy Plan 2010

[email protected]

Corporate Strategy

Data Loss Prevention Alert

An email that you have just sent has been quarantined.

Reason: attached document contains confidential internal data

The message is being held until further action.

Send , Discard , or Review Issue

Introducing Check Point Data Loss Prevention

EducateUsers on corporate

data policies

EnforceData loss

business processes

PreventMove from detection

to prevention

Check Point Combines Technology and Processes to Make DLP Work

NEW!

Page 9: Check Point Makes  DLP Work

99©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone |

Check Point Solves the DLP Challenge

Technology ChallengeEmpowers users to remediate

incidents in real time

IT Staff ChallengeEducates users on DLP policies

without involving IT staff

New UserCheck™ Technology

Page 10: Check Point Makes  DLP Work

1010©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone |

How Does Check Point DLP Work?

Simple Rule-based Policy Management

MultiSpect™ Detection Engine

Full Network Enforcement

Page 11: Check Point Makes  DLP Work

1111©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone |

Item No.

Name Social Security Number

Job Title Gross Pay

1 John Smith 987-65-4320 CEO $200,000

2 Kevin Brian 987-65-4221 VP R&D $150,000

3 Margret White

769-65-7522 VP Marketing

$153,000

4 Bob Johns 342-62-3323 CFO $140,000

5 Mike Riddle 777-43-4324 COO $180,000

Correlates data from multiple sources using open language

New MultiSpect™ Technology

MultiSpect Detection Engine

Detects more than 600 file formats600+ File Formats250+ Data Types

Over 250 pre-defined content data types

Detect and recognize proprietary forms and templates

Page 12: Check Point Makes  DLP Work

1212©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone |

Simple Rule-based Policy Management

Easily Define Policy to Detect, Prevent or Ask User

Page 13: Check Point Makes  DLP Work

1313©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone |

Unified Control and Deployment

Centralized Management

For Unified Control Across the Entire

Security Infrastructure

Data Loss Prevention

Page 14: Check Point Makes  DLP Work

1414©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone |

Ease-of-Deployment

Dedicated ApplianceSoftware Blade Network-based Inline Solution

On Existing Gateways or Open Servers

Be Up and Running Day-1!DLP-1

Page 15: Check Point Makes  DLP Work

1515©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone |

Check Point DLP At-A-Glance

Move from Detection to Prevention

Scaling from hundred to thousandsof users

Supporting HTTP, SMTP and FTP protocols

Inline network-based Software Bladerunning on any existing Check Point gateway

UserCheck notification using either thin agent or a returning email to the user

Proactively block intentional and unintentional data loss

Page 16: Check Point Makes  DLP Work

1616©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone |

Check Point DLP Summary

Check Point combines technology and processes to make DLP work

Prevent Data BreachesMove from detection to prevention

Enforce Data Policies Across the entire network

Educate and Alert UsersWithout involving IT staff

Page 17: Check Point Makes  DLP Work

©2010 Check Point Software Technologies Ltd. | [Restricted] ONLY for designated groups and individuals

Thank You!

Page 18: Check Point Makes  DLP Work

1818©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone |

Check Point DLP in Detail

Check Point DLP User Scenarios

Key DLP Technologies

Page 19: Check Point Makes  DLP Work

2020©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone |

Check Point DLP at Work

Block Web upload of proprietary information

Ask user to confirm and remediate potential breach

Filter communications of confidential information based on policy exception

Scenario 1: Prevent

Scenario 3:Alert, Ask

and Educate

Scenario 2:Enforce

Page 20: Check Point Makes  DLP Work

2121©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone |

[email protected]

[email protected]

Code subroutine to work on from home

Preemptively Prevent Data Breaches

Web Upload of Proprietary Information

Software Developer

Developer uploads

source code to file share to work on from home

Rights to files posted

to file-sharing sites

transfer to host site

Check Point DLP blocks upload and

notifies user

http://mywebuploads.com

Page 21: Check Point Makes  DLP Work

2222©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone |

Corporate VP sends M&A contract to

attorney

Filter Based on Corporate Data Policies

Policy Exception Allows Email to Pre-selected Recipients

Corporate Development

VP

[email protected]

M&A letter of intent for review

ProjectAtlantisLoI.pdf

Hi James,

We have revised the terms of the acquisition. Attached is the Letter of Intent for your review.

Thanks,David

Data Loss Prevention Alert

An email that you have just sent has been identified as containing sensitive information.

An email that you have just sent has been allowed based on DLP policy exception.

For additional details, please refer to the Corporate Data Security Policy

Alert notifies user of data

policy

Page 22: Check Point Makes  DLP Work

2323©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone |

Alert, Ask and Educate Users

Check Point Brings User Remediation to DLP

Chief Financial

Officer

[email protected]

Preliminary Financial Statement

Preliminary_financials.pdfGreg,

Sending you the Q1 preliminary financials for audit.

Thanks,Matt GerhartChief Financial OfficerACME [email protected]

Company CFO sends preliminary financial statement to external

auditor

Check Point Data Loss Prevention Reconsider sending this email (Prelimi… Fri 4/2/2010 3:45 PM

Rachel Greene PCI Audit Status Fri 4/2/2010 1:23 PM

Tom Peters Sales Planning Meeting Thu 3/2/2010 9:45 AM

[email protected]

Reconsider sending this email (Preli…

Preliminary Financial StatementThe attached message, sent by you, is addressed to an external email address. The Check Point Data Loss Prevention System determined that it may contain confidential information.

Email’s attachment Preliminary_financials.pdf appears to contain financial records. The message is being held until further action.

Send, Discard, or Review Issue

Alert asks owner of

sensitive data to confirm

communication

Preliminary Financial [email protected]

Hi,This information is OK to send to our outside auditor.Thanks, Matt

User provides an explanation of his request

to send

Page 23: Check Point Makes  DLP Work

2424©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone |

MultiSpect™ Detection Engine

UserCheck™ provides User Remediation

Key Technologies

Align DLP Rules to Your Policies and Processes

Page 24: Check Point Makes  DLP Work

2525©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone |

Data Loss Prevention AlertAn email that you have just sent has been quarantined.

Reason: attached document contains confidential internal data

The message is being held until further action.

Send , Discard , or Review Issue

2. User alert

1. Mail sent or document uploaded

3. User remediation

UserCheck Provides User Remediation

Non-disruptive Real-time Educational

Page 25: Check Point Makes  DLP Work

2626©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone |

Align With Your Business Processes

Examples ► Spreadsheets with over

500 rows

► More than 5 financial terms

► External recipients in BCC

► More than 10 company names

► Profanity

Adapts to Your Processes and Environment

SuspiciousCommunications

Identify unconventional business communication

behavior

Page 26: Check Point Makes  DLP Work

2727©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone |

Multi-data Correlation Prevents Potential Violations

MultiSpect™ Detection Engine

Correlates a combination of

data types

Prevents sending sensitive data to wrong recipients

Page 27: Check Point Makes  DLP Work

2828©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone |

Forms/Partial Forms

► Recognize sensitive forms and templates

Examples

► HR forms / salary / offers

► Financial docs

► Patient records

► Insurance forms

► Bank forms

MultiSpect Form Detection

Insurance claim.pdf

Detect and Recognize Your Proprietary Forms

Page 28: Check Point Makes  DLP Work

2929©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone |

MultiSpect Open Scripting Language

Custom Data Type

► Open Scripting Language

► Create completely new data types

► Enhance existing data types

► Flexibly tailor DLP to your environment

Extended Data Type Creation

Page 29: Check Point Makes  DLP Work

3030©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone |

DLP-1 Appliance Specifications

DLP-1 2571 DLP-1 9571Performance

Number of users 1,000 5,000Messages/Hour 70K 350K

Throughput 700 Mbps 2.5 GbpsSpecifications

Storage 500 GB 2 x 1 TB (RAID 1)NICs 6 Copper 1GbE 10 Copper 1GbE

Optional Bypass card4 ports - 2 segments

(pre-packaged appliance)4 ports - 2 segments

(orderable as accessory)Price

Price year 1Without bypass card - $14,990

With bypass card- $15,990$49,990

Add bypass card - $4,995

Annual price year 2+ $7,000 $12,000

Page 30: Check Point Makes  DLP Work

3131©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone |

Check Point DLP Software Blade

CPSB-DLP-500 CPSB-DLP-1500 CPSB-DLP-U

Recommended Users (depending on configuration)*

Up to 500 500-1,500 1,500+

Messages/Hour 5,000-15,000 15,000-50,000

50,000-250,000

Max Throughput 700 Mbps 1.5 Gbps 2.5 Gbps

Annual Price $3,000 $7,000 $12,000

Page 31: Check Point Makes  DLP Work

3232©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone |

DLP-1 9571 Appliances—Accessories

Model Price

Field Replaceable 4-Port, Copper, Bypass Card (for DLP-1 9571, PWR-1 907x, IPS-1)

$4,995

Check Point Replacement parts Kit including one Hard-Drive, one Power Supply, and one Fan (For DLP-1 9571)

$3,900

Check Point Lights-Out-Management card (for DLP-1 9571, PWR-1 907x, IPS-1))

$2,500

Page 32: Check Point Makes  DLP Work

3333©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone |

Check Point DLP Summary

Check Point combines technology and processes to make DLP work

Prevent Data BreachesMove from detection to prevention

Enforce Data Policies Across the entire network

Educate and Alert UsersWithout involving IT staff

Page 33: Check Point Makes  DLP Work

©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone

Thank You!