+ All Categories
Home > Technology > Steal This Data - Email Security and DLP

Steal This Data - Email Security and DLP

Date post: 01-Jun-2015
Category:
Upload: galaxytech-international
View: 307 times
Download: 0 times
Share this document with a friend
Description:
Data Loss Prevention (DLP) is often the number one concern for most organizations. With the growth of mobile devices and cloud storage, most network perimeters look more like swiss cheese than brick walls. See Full Webinar: http://www.gti1.com/webinars/?commid=64955
Popular Tags:
14
Steal This Data! Email Is the #1 Channel For Lost Data… What Can You Do About It?
Transcript
Page 1: Steal This Data - Email Security and DLP

Steal This Data!Email Is the #1 Channel For Lost Data…

What Can You Do About It?

Page 2: Steal This Data - Email Security and DLP

Let’s Talk - Agenda

• Your Presenter: Allan Cole• What Is DLP?• Why Do You Need it?• Regulations You Face• Case Study• How To Evaluate DLP• Why GalaxyTech• Next Steps

Page 3: Steal This Data - Email Security and DLP

Who Is Allan Cole?

• 15 years of information security, privacy and education experience

• Specializes in risk assessment, gap analysis, policy content development, awareness training, strategy development and implementation.

• Senior Security Architect/Manager for McAfee Inc. for 11 Years. Designed and lead the implementation of complex security solutions for the financial, governmental, and healthcare business sectors.

Page 4: Steal This Data - Email Security and DLP

What Is DLP?

Data loss prevention (DLP) solution is a system that is designed to detect potential data breach / data ex-filtration transmissions and prevent them by monitoring, detecting & blocking sensitive data while in-use (endpoint actions), in-motion (network traffic), and at-rest (data storage) .

Page 5: Steal This Data - Email Security and DLP

Why Do You Need DLP?

• Regulatory Compliance• Acceptable Use• Intellectual Property Protection

Page 6: Steal This Data - Email Security and DLP

Regulatory Compliance

• Regulatory Compliance• HIPAA, GLBA, PCIDSS, SOX Regulations• Scan for sensitive information and block infractions• Secure business partner communication

Page 7: Steal This Data - Email Security and DLP

Acceptable Use

• Acceptable Use• Block offensive content• Enforce messaging policy (attachment size, etc)• Add legal disclaimers to outgoing mails

Page 8: Steal This Data - Email Security and DLP

Intellectual PropertyProtection

• Intellectual Property Protection• Block messages containing confidential data• Prevent email communication with competitor

Page 9: Steal This Data - Email Security and DLP

Regulations You Face

• HIPAA- Health Insurance Portability and Accountability Act

• GLBA- Gramm, Leach, Bliley Act• PCIDSS- Payment Card Industry Data Security Standards• SOX- Sarbanes – Oxley Act of 2002

Page 10: Steal This Data - Email Security and DLP

Case Study: The Problem

Customer Profile

Printing company servicing small business to fortune 500 corporations.

Challenges

The company was being sued by an employee that had been receiving emails with nudity embedded in the content of the email. These emails were being sent by another employee repeatedly and they had no solution to prevent this context from entering their environment. As a part of the legal settlement they to had to implement countermeasures to provide this from happens in the future.

Page 11: Steal This Data - Email Security and DLP

Case Study: The Solution

Solution

Galaxytech recommend Cisco’s Ironport email security appliance with DLP and image analysis to ensure their acceptable use policy was being enforced.

Page 12: Steal This Data - Email Security and DLP

How To Evaluate DLP

Things to think about when evaluating a DLP solution• The solution must be able to discover and protect confidential data wherever

it is stored or used • The solution must monitor all data usage and prevent confidential data from

exiting any network gateway or endpoint• Accuracy is critical• Automate policy enforcement• Visibility and control over encrypted data • Safeguard employee privacy• Proven global scale and architecture

Page 13: Steal This Data - Email Security and DLP

Why GalaxyTech ?

Page 14: Steal This Data - Email Security and DLP

Next Steps

• Let’s Review Your Needs• Pre Call Form • Conference Call With Director of Engineering

• Proof Of Concept


Recommended