insider and outsider threat data protection solution by digital guardian

20
Insider and Outsider Threat Data Protection Solution It’s about the data!

Upload: digital-guardian

Post on 16-Jul-2015

787 views

Category:

Technology


0 download

TRANSCRIPT

Page 1: Insider and outsider threat data protection solution by Digital Guardian

Insider and Outsider Threat Data Protection SolutionIt’s about the data!

Page 2: Insider and outsider threat data protection solution by Digital Guardian

The Nature of Data Protection is Changing

2

Page 3: Insider and outsider threat data protection solution by Digital Guardian

And the Threats to Your Data Have Changed

3

Page 4: Insider and outsider threat data protection solution by Digital Guardian

You Need Data Security That Starts at the Source

4

Page 5: Insider and outsider threat data protection solution by Digital Guardian

Patented, Proven Endpoint Agent

5

Page 6: Insider and outsider threat data protection solution by Digital Guardian

Automatic Sensitive Data Classification

6

Page 7: Insider and outsider threat data protection solution by Digital Guardian

STOP Data Theft From Insiders and Outsiders

7

Page 8: Insider and outsider threat data protection solution by Digital Guardian

The Only SINGLE Agent to Protect Data From…

8

Page 9: Insider and outsider threat data protection solution by Digital Guardian

DIGITALGUARDIANTM

for Outsider Threat Protection

Page 10: Insider and outsider threat data protection solution by Digital Guardian

DIGITALGUARDIANTM

for Outsider Threat Protection

Real-Time Threat Detection• Real time pattern detection via intelligent correlation rules

Real-Time Alerting & Instant Response• Attack alerts & instant quarantine & stop attacks in their tracks

Forensic Data Collection & Reporting Deep visibility into events across the user machine - kernel and user level

Maximizes the Return on Security Investment Easy direct integration extends your investment

Bi-directional integration, SIEM integration

10

Page 11: Insider and outsider threat data protection solution by Digital Guardian

DIGITALGUARDIANTM

for Insider Threat Protection

Page 12: Insider and outsider threat data protection solution by Digital Guardian

DIGITALGUARDIANTM

for Insider Threat Protection

Key Features:• Kernel Level Data Visibility

• Automatic, Content & Context Driven Data Classification

• Flexible Policy Management and Enforcement

• Best-in-Class Reporting and Dashboards

• Forensics Reporting and Legal Case Management

12

Page 13: Insider and outsider threat data protection solution by Digital Guardian

DIGITALGUARDIANTM

for Insider Threat Protection

Kernel Level Data Visibility• Deepest visibility to all events at point of risk/egress

• Broadest coverage of systems (Windows, MAC OS X and Linux)

• Broadest coverage of environments (Network, Cloud, Virtual, Online and Offline)

13

Page 14: Insider and outsider threat data protection solution by Digital Guardian

DIGITALGUARDIANTM

for Insider Threat Protection

Automatic, Content & Context Driven Data Classification

• Classify based on context, content, and user-definition

• Classify all data types • (structured, unstructured, MSOffice, CAD, source code, media, video, and more)

• Apply persistent and inheritable classification tags

14

Page 15: Insider and outsider threat data protection solution by Digital Guardian

Auto & User Classification

15

macJoe Smith

462-81-540642 Wallaby

Cook

Upload/Download Source/Destination

Application

Network State

Operation

Drive Type

Time of Day

User

Computer

Classification

Email

Session

1. Content 2. Context 3. User

~200ContextualParameters

3 ways of classifying data

Page 16: Insider and outsider threat data protection solution by Digital Guardian

DIGITALGUARDIANTM

for Insider Threat Protection

Policy Management and Enforcement • Powerful, customizable policy creation engine to define and deploy rules

• Flexible application and device management and control

Best-in-Class Reporting and Dashboards

Forensics Reporting & Case Management

• Evidentiary-level data capture & advance forensic data incident investigation

16

Page 17: Insider and outsider threat data protection solution by Digital Guardian

DIGITALGUARDIANTM

Flexible Deployment OptionsOn Premise, Managed Security Program, Hybrid

Page 18: Insider and outsider threat data protection solution by Digital Guardian

Flexible Deployment Models

18

Infrastructure hosted in your

environment

Self-administration

Policies, rules and reports

managed by you

Engage with Verdasys Pro

Services as needed

Infrastructure hosted in

Verdasys private cloud

Administered by Verdasys Pro

Services

Access to policies, rules, and

reports

Weekly status meetings

Infrastructure hosted in your

environment.

Administered remotely by

Verdasys Pro Services

Data remains within your IT

environment.

Option 1

On PremiseOption 2

Managed ServiceOption 3

HybridManaged Service On Premise

“By selecting the managed service deployment option, we were able to be up and running in a matter of weeks. The

added visibility into how our confidential data is being used is invaluable.”

CISO, Regional Bank

Page 19: Insider and outsider threat data protection solution by Digital Guardian

Deployment Methodology

19

Install Agents

Record Actions

Build Trends

Normalize Behavior

Identify Outliers

Identify Concerns

Display Warnings

Request Justification

Educate Users

Tune rules & policies

Rebuild Trending

Display Blocks

Enforce Policies

Alert on Violations

Encrypt egress

MONITOR PROMPT ENFORCE

Digital Guardian’s Insider Threat Protection

methodology focuses on 3 primary areas:

monitor, prompt, and enforce