preventing data breaches
TRANSCRIPT
.
Intel Security Confidential3
Drawing Boardroom Attention
68%of data breaches required public disclosures1
.
Intel Security Confidential4
Impacting Company Bottom Line
Costly fines Loss of customers and revenue
Damaged reputation
$3.79M is the average cost of a data breach1
.
Intel Security Confidential5
Understanding Data Exfiltration
Who wants the data?Breaches are initiated by:
How are thieves getting data out?
Where is data being taken from?
57%
43%Externalactors Internal
actors
2/3of breaches occur on traditional networks
1/3occur in cloud infrastructures
60%Electronic means
40%Physical means
.
Intel Security Confidential6
Top Data Protection Challenges
Rising success rate of malware intrusions
Keeping up with regulatory compliance
Lack of visibility and control of data
Both a technical problem and a business problem to overcome
.
Intel Security Confidential7
Challenge:
Rising success rate of malware intrusions
Desired Outcome:
Stay out of the headlines
.
Intel Security Confidential8
Comprehensive PortfolioExtensive, effective, and integrated
Cloud
DLPFile
Encryption
DeviceControl
DiskEncryption
Common Policy,
Console and Keys
.
Intel Security Confidential9
Breath Of Components
Data-in-Motion
Data-at-Rest
Data-in-Use
Data Types Data Loss Vectors Solution
DLP Prevent
DLP Monitor
DLP Discover
Drive Encryption
DLP Endpoint
File and removable Media Encryption
Device Control
Email/IM Web Post Network Traffic Cloud
Desktop/LaptopDatabase
Removable/Devices Cloud AppsEmail/IM
File Share
File & Clipboard
Cloud Storage
101101100110101001
011001101010011011
1011011001101001
.
Intel Security Confidential10
Gartner Magic Quadrant for Enterprise Data Loss Prevention (DLP)
7 Consecutive Years as a Leader
Gartner Magic Quadrant for Mobile Data Protection (Encryption)
8 Consecutive Years as a Leader
Award Winning Technology
.
Intel Security Confidential11
Proactive Data Protection
McAfee Threat Intelligence
Exchange Server
McAfee Data Loss Prevention Endpoint
Data Exchange
Layer
DLPE Identifies new process (ProcessA.exe) starts running
1 DLPE post TIE request for ProcessA.exereputation
2 TIE performs reputation lookup for ProcessA.exe
3 TIE post reply: ProcessA.exe Most Likely Malicious
4 5 DLPE start monitoring ProcessA.exe for Any/Sensitive file access
.
Intel Security Confidential12
Challenge:
Keeping up with regulatory compliance
Desired Outcome:
Meet Regulatory Compliance
.
Intel Security Confidential13
Achieve Compliance EffortlesslyFlexible, reusable rule sets reduce time, effort and cost
North AmericaPolicies
EuropePolicies
John Moved from US to Germany
PCI ePO with built-in DLP policies
EuropePolicies
Marketing ruleset
HRruleset
.
Intel Security Confidential14
BlockRequest Justification
Report
Reduce Risks By Coaching
McAfee DLP & Encryption
~75% Reduction
in Employee Risky Behavior
.
Intel Security Confidential15
[McAfee DLP provides] bite-sized education opportunities …
DLP has an enormous impact on the business and security culture …
Global print/digital media company
The biggest benefit [of McAfee DLP Endpoint] is raising awareness when the notification pops up …
US-based chemical company
Customer ValidationReal-time feedback via educational popups
.
Intel Security Confidential16
40% of data loss occurs via lost or stolen hardware
A Laptop is Stolen every
53 seconds (1,600 per day)1
.
Intel Security Confidential17
Safe Harbor
Full Disk Encryption Locks Down Lost Data
McAfee ePO
“FileVault”“BitLocker” “McAfee Drive Encryption”
Audit physical thefts to avoid fines and public disclosure requirements
.
Intel Security Confidential18
ReportBlock Encrypt
File Encryption Protects Against USB Access
McAfee DLP & Encryption
.
Intel Security Confidential19
Challenge:
Disappearing corporate perimeters
Desired Outcome:
Visibility and control of sensitive data in risky places
.
Intel Security Confidential20
McAfee
EPO
ePO Centralized ManagementAutomation of monitoring, reporting, and auditing reduces costs!
Single consolidated source for policy management, incident response, and reporting
McAfee DLP (Network & Endpoint) McAfee Endpoint Encryption McAfee ESM
.
Intel Security Confidential21
Challenge:
It’s both a technical problem and a business problem
Desired Outcome:
Work with a trusted partner to help with data protection strategy
.
Intel Security Confidential22
Guidance from Data Protection Professionals
• Define success metrics
• Addresses People, Process, and
Technology components
• Integrate with existing infrastructure
• Achieve security and risk management
program data collection and analysis
objectives
• Create effective information protection
policies, without months of trial and error
Compliance
Governance
Classification
Remediation
Awareness
Discovery
Policies
Risk Assessment
Data Protection
.
Intel Security Confidential23
Finance/BankingMerrill LynchBank of the WestKleberg First National BankDavidson BankRoyal Bank of Canada
Federal (GHE)
Apollo GroupTexas Tech University – Health Science Center (TTUHSC)
NASAIndian ArmyFAA (Federal Aviation Administration)
Manufacturing/PharmaceuticalBayerGeneral MotorsKimberly-ClarkActavis3M
HealthcareKaiser PermanenteBoston ScientificHealth NetPresence HealthChildren’s Hospital of Philadelphia
RetailWal-MartRooms To GoTractor SupplyFreeman Decorating Co. Tricot
High TechOracleTelstraDocuSignJuniper NetworksApplied Materials
Customer Success
.
Intel Security Confidential24
Intel Security Can Help!
Stop data breaches and avoid being the next data breach headline
Achieve and/or show proof of regulatory compliance
Gain visibility and central control of sensitive data on different devices and locations, including the cloud
Engage professional services to help you with data protection strategy
.
Intel Security Confidential25
Next Step
Schedule a POC with local data protection specialists
Ask about these Jumpstart packages
Essential Services for McAfee Host Data Loss Prevention
Essential Services for McAfee Network Data Loss Prevention
Essential Services for McAfee Endpoint Encryption for PCs
.
Intel Security Confidential27
TD
L
Comprehensive and Integrated Suites
CD
A
CD
B
Endpoint Assistant App
ePO Deep Command
File & Removable Media Protection
Management of Native Encryption
Drive Encryption
DLP Endpoint & Device Control
CD
E
DLP Prevent
DLP Monitor
DLP Discover
DLP Endpoint & Device Control