preventing data breaches

27
. Intel Security Confidential 1 Preventing Data Breaches

Upload: xband

Post on 14-Jan-2017

68 views

Category:

Technology


0 download

TRANSCRIPT

.

Intel Security Confidential1

Preventing Data Breaches

.

Intel Security Confidential2

Agenda Slide

.

Intel Security Confidential3

Drawing Boardroom Attention

68%of data breaches required public disclosures1

.

Intel Security Confidential4

Impacting Company Bottom Line

Costly fines Loss of customers and revenue

Damaged reputation

$3.79M is the average cost of a data breach1

.

Intel Security Confidential5

Understanding Data Exfiltration

Who wants the data?Breaches are initiated by:

How are thieves getting data out?

Where is data being taken from?

57%

43%Externalactors Internal

actors

2/3of breaches occur on traditional networks

1/3occur in cloud infrastructures

60%Electronic means

40%Physical means

.

Intel Security Confidential6

Top Data Protection Challenges

Rising success rate of malware intrusions

Keeping up with regulatory compliance

Lack of visibility and control of data

Both a technical problem and a business problem to overcome

.

Intel Security Confidential7

Challenge:

Rising success rate of malware intrusions

Desired Outcome:

Stay out of the headlines

.

Intel Security Confidential8

Comprehensive PortfolioExtensive, effective, and integrated

Cloud

DLPFile

Encryption

DeviceControl

DiskEncryption

Common Policy,

Console and Keys

.

Intel Security Confidential9

Breath Of Components

Data-in-Motion

Data-at-Rest

Data-in-Use

Data Types Data Loss Vectors Solution

DLP Prevent

DLP Monitor

DLP Discover

Drive Encryption

DLP Endpoint

File and removable Media Encryption

Device Control

Email/IM Web Post Network Traffic Cloud

Desktop/LaptopDatabase

Removable/Devices Cloud AppsEmail/IM

File Share

File & Clipboard

Cloud Storage

101101100110101001

011001101010011011

1011011001101001

.

Intel Security Confidential10

Gartner Magic Quadrant for Enterprise Data Loss Prevention (DLP)

7 Consecutive Years as a Leader

Gartner Magic Quadrant for Mobile Data Protection (Encryption)

8 Consecutive Years as a Leader

Award Winning Technology

.

Intel Security Confidential11

Proactive Data Protection

McAfee Threat Intelligence

Exchange Server

McAfee Data Loss Prevention Endpoint

Data Exchange

Layer

DLPE Identifies new process (ProcessA.exe) starts running

1 DLPE post TIE request for ProcessA.exereputation

2 TIE performs reputation lookup for ProcessA.exe

3 TIE post reply: ProcessA.exe Most Likely Malicious

4 5 DLPE start monitoring ProcessA.exe for Any/Sensitive file access

.

Intel Security Confidential12

Challenge:

Keeping up with regulatory compliance

Desired Outcome:

Meet Regulatory Compliance

.

Intel Security Confidential13

Achieve Compliance EffortlesslyFlexible, reusable rule sets reduce time, effort and cost

North AmericaPolicies

EuropePolicies

John Moved from US to Germany

PCI ePO with built-in DLP policies

EuropePolicies

Marketing ruleset

HRruleset

.

Intel Security Confidential14

BlockRequest Justification

Report

Reduce Risks By Coaching

McAfee DLP & Encryption

~75% Reduction

in Employee Risky Behavior

.

Intel Security Confidential15

[McAfee DLP provides] bite-sized education opportunities …

DLP has an enormous impact on the business and security culture …

Global print/digital media company

The biggest benefit [of McAfee DLP Endpoint] is raising awareness when the notification pops up …

US-based chemical company

Customer ValidationReal-time feedback via educational popups

.

Intel Security Confidential16

40% of data loss occurs via lost or stolen hardware

A Laptop is Stolen every

53 seconds (1,600 per day)1

.

Intel Security Confidential17

Safe Harbor

Full Disk Encryption Locks Down Lost Data

McAfee ePO

“FileVault”“BitLocker” “McAfee Drive Encryption”

Audit physical thefts to avoid fines and public disclosure requirements

.

Intel Security Confidential18

ReportBlock Encrypt

File Encryption Protects Against USB Access

McAfee DLP & Encryption

.

Intel Security Confidential19

Challenge:

Disappearing corporate perimeters

Desired Outcome:

Visibility and control of sensitive data in risky places

.

Intel Security Confidential20

McAfee

EPO

ePO Centralized ManagementAutomation of monitoring, reporting, and auditing reduces costs!

Single consolidated source for policy management, incident response, and reporting

McAfee DLP (Network & Endpoint) McAfee Endpoint Encryption McAfee ESM

.

Intel Security Confidential21

Challenge:

It’s both a technical problem and a business problem

Desired Outcome:

Work with a trusted partner to help with data protection strategy

.

Intel Security Confidential22

Guidance from Data Protection Professionals

• Define success metrics

• Addresses People, Process, and

Technology components

• Integrate with existing infrastructure

• Achieve security and risk management

program data collection and analysis

objectives

• Create effective information protection

policies, without months of trial and error

Compliance

Governance

Classification

Remediation

Awareness

Discovery

Policies

Risk Assessment

Data Protection

.

Intel Security Confidential23

Finance/BankingMerrill LynchBank of the WestKleberg First National BankDavidson BankRoyal Bank of Canada

Federal (GHE)

Apollo GroupTexas Tech University – Health Science Center (TTUHSC)

NASAIndian ArmyFAA (Federal Aviation Administration)

Manufacturing/PharmaceuticalBayerGeneral MotorsKimberly-ClarkActavis3M

HealthcareKaiser PermanenteBoston ScientificHealth NetPresence HealthChildren’s Hospital of Philadelphia

RetailWal-MartRooms To GoTractor SupplyFreeman Decorating Co. Tricot

High TechOracleTelstraDocuSignJuniper NetworksApplied Materials

Customer Success

.

Intel Security Confidential24

Intel Security Can Help!

Stop data breaches and avoid being the next data breach headline

Achieve and/or show proof of regulatory compliance

Gain visibility and central control of sensitive data on different devices and locations, including the cloud

Engage professional services to help you with data protection strategy

.

Intel Security Confidential25

Next Step

Schedule a POC with local data protection specialists

Ask about these Jumpstart packages

Essential Services for McAfee Host Data Loss Prevention

Essential Services for McAfee Network Data Loss Prevention

Essential Services for McAfee Endpoint Encryption for PCs

.

Intel Security Confidential27

TD

L

Comprehensive and Integrated Suites

CD

A

CD

B

Endpoint Assistant App

ePO Deep Command

File & Removable Media Protection

Management of Native Encryption

Drive Encryption

DLP Endpoint & Device Control

CD

E

DLP Prevent

DLP Monitor

DLP Discover

DLP Endpoint & Device Control