SlideShare una empresa de Scribd logo
1 de 22
SolarWinds® Webinar
Stop Data From Walking Out the Door!

© 2013 SOLARWINDS WORLDWIDE, LLC. ALL RIGHTS RESERVED.
Agenda
» Risks of Insecure File Transfer

» Data Breach Impact
» Steps to Protect Sensitive Data

»Q&A

© 2013 SOLARWINDS WORLDWIDE, LLC. ALL RIGHTS RESERVED.
Bad News: Internal Data Breaches are on the Rise!
According to the Ponemon Institute:

© 2013 SOLARWINDS WORLDWIDE, LLC. ALL RIGHTS RESERVED.
USB Drives Come With Risks
“Taking Files Home”
Confidential
Data Leaves
the Building!
No Tracking!

End User at Work

Virus Enters
the Building!

USB Thumb
Drive

“Sharing Files With Other People”
Drive Stolen
or Borrowed!

End User at Work
© 2013 SOLARWINDS WORLDWIDE, LLC. ALL RIGHTS RESERVED.
Data Breach from a USB Storage Device is a Real Threat
October 2013:
Student data from Denver elementary schools at risk after thumb drive
was stolen from a school nurse’s car.
Source: denver.cbslocal.com, CBS Denver, Oct. 17, 2013.

June 2013:
Thousands of patient records compromised when Nebraska doctor
lost thumb drive he’d been wearing on a lanyard around his neck.
Source: www.journalstar.com, Lincoln Journal Star, June 30, 2013.

April 2013:
Investment regulator loses portable device containing personal
information belonging to clients of multiple investment firms.
Source: www.journalstar.com, Lincoln Journal Star, June 30, 2013.

© 2013 SOLARWINDS WORLDWIDE, LLC. ALL RIGHTS RESERVED.
Impact of a Data Breach
The loss or leakage of sensitive data can result in serious damage to an organization,
including:









Loss of Intellectual property
Loss of private customer data
Compliance violations
Damage to corporate reputation/brand
Loss of customer loyalty
Loss of future business opportunities
Lawsuits
Financial and criminal penalties

© 2013 SOLARWINDS WORLDWIDE, LLC. ALL RIGHTS RESERVED.
Good News: You Can Do Something About It!

Source: 2012 Data Breach Investigations Report, Verizon

© 2013 SOLARWINDS WORLDWIDE, LLC. ALL RIGHTS RESERVED.
Best News: SolarWinds Can Help!
Protect your organization from data loss and breaches with a simple 3-step approach
utilizing SolarWinds Log & Event Manager and SolarWinds Serv-U® Managed File Transfer.
Step 1: Use LEM’s USB Defender technology to block unauthorized USB storage devices
Step 2: Deploy Serv-U to provide a secure, managed alternative to risky USB file sharing
Step 3: Rest easy with LEM’s real-time monitoring, threat detection, and automated remediation

© 2013 SOLARWINDS WORLDWIDE, LLC. ALL RIGHTS RESERVED.
How SolarWinds
Log & Event Manager (LEM)
Can Help

© 2013 SOLARWINDS WORLDWIDE, LLC. ALL RIGHTS RESERVED.
SolarWinds Log & Event Manager: Powerful USB Defense
SolarWinds Log & Event Manager (LEM) includes built-in USB-Defender® technology to
protect sensitive data from hitching a ride out the door on a removable storage device.
With LEM’s USB defense, you can:
 Detect USB storage devices in real-time
 Automatically or manually eject USB devices
 Create whitelists to block unauthorized USB usage
 Monitor what files or processes are accessed
 Detach devices even when systems are offline
 Use built-in reporting to audit USB usage over time

© 2013 SOLARWINDS WORLDWIDE, LLC. ALL RIGHTS RESERVED.
Around-the-Clock USB Defense
With LEM’s USB Defender technology, you can take automated actions to block the
usage, so you can be confident your data is safe 24x7, even while you sleep!
LEM’s automated actions include the ability to:
 Automatically eject USB devices
 Quarantine workstations
 Shutdown machines
 Disable user accounts

© 2013 SOLARWINDS WORLDWIDE, LLC. ALL RIGHTS RESERVED.
Allowing Only Authorized USB Access: Step 1
Step 1: Create a user-defined group in the LEM console and enable USB Defender on
the systems you want to authorize USB access.

© 2013 SOLARWINDS WORLDWIDE, LLC. ALL RIGHTS RESERVED.
Allowing Only Authorized USB Access: Step 2
Step 2: Add the group of “authorized” devices to SolarWinds LEM rules and set up Active
Response rules to detach unauthorized USB devices.

LEM’s powerful correlation rules alert you in real time when unauthorized USB devices try to
access your network.
© 2013 SOLARWINDS WORLDWIDE, LLC. ALL RIGHTS RESERVED.
How SolarWinds
Serv-U Managed File Transfer (MFT)
Can Help

© 2013 SOLARWINDS WORLDWIDE, LLC. ALL RIGHTS RESERVED.
SolarWinds Serv-U MFT Server: SIMPLE & SECURE File Sharing
SolarWinds Serv-U MFT Server provides secure file sharing you can deploy in your own
datacenter, so you don’t have to worry about company data flying around in the cloud or
walking out the door on a USB device.
With Serv-U, you can:
 Enable users to securely share files

 Leverage existing infrastructure
 Apply your own security policy
 Eliminate the need for risky USB devices
 Replace unreliable or insecure cloud storage

© 2013 SOLARWINDS WORLDWIDE, LLC. ALL RIGHTS RESERVED.
Satisfy USB Use Cases with Serv-U
“Taking Files Home”
1) File Copied to Serv-U

End User at Work

Serv-U MFT
Server

2) File Copied from Serv-U (and Edited)

3) Edited File Copied to Serv-U

4) Edited File Copied from Serv-U

End User at Home

“Sharing Files With Other People”
1) File Copied to Serv-U

End User at Work
© 2013 SOLARWINDS WORLDWIDE, LLC. ALL RIGHTS RESERVED.

Serv-U MFT
Server

2) File Copied from Serv-U

Other End Users
Simple & Secure “Anywhere” File Access
With Serv-U’s “Web Client”, end-users can securely access work files from anywhere.

© 2013 SOLARWINDS WORLDWIDE, LLC. ALL RIGHTS RESERVED.
How Serv-U File Sharing Works

© 2013 SOLARWINDS WORLDWIDE, LLC. ALL RIGHTS RESERVED.
Easy-to-Use File Sharing Interface
Serv-U provides an easy-to-use interface for sending and requesting files, along with
advanced options like file retention, password protection, and notifications.

© 2013 SOLARWINDS WORLDWIDE, LLC. ALL RIGHTS RESERVED.
The Result: Effective File Sharing with Minimal Risks
DLP* Stops
Confidential
Data from
Leaving

“Taking Files Home”

Serv-U MFT
Server

1) File Copied to Drive

End User at Work

4) Edited File Copied from Drive

AV* Stops
Viruses and
Malware from
Entering

2) File Copied from Drive (and Edited)
Serv-U logs let
admins and
auditors know
who took what
3) Edited File Copied to Drive

End User at Home

“Sharing Files With Other People”
1) File Copied to Drive

End User at Work
* Serv-U works with your existing DLP and AV software

© 2013 SOLARWINDS WORLDWIDE, LLC. ALL RIGHTS RESERVED.

Serv-U MFT
Server
Serv-U logs
show bad login
attempts and
locked IPs

2) File Copied from Serv-U

Access denied –
and IP
automatically
locked out
Other End Users
Unauthorized Person
Additional Resources
SolarWinds Log & Event Manager – Product Info and Online Demo
http://www.solarwinds.com/log-event-manager.aspx

SolarWinds Serv-U Managed File Transfer (MFT) Server – Product Info and Online Demo
http://www.solarwinds.com/serv-u-managed-file-transfer-server.aspx

SolarWinds Security Portfolio – Learn More about All of SolarWinds Security Products
http://www.solarwinds.com/security

SolarWinds Security: Helping Protect Your Sensitive Data
© 2013 SOLARWINDS WORLDWIDE, LLC. ALL RIGHTS RESERVED.
Thank You!
The SOLARWINDS and SOLARWINDS & Design marks are the exclusive property of SolarWinds
Worldwide, LLC, are registered with the U.S. Patent and Trademark Office, and may be registered or
pending registration in other countries. All other SolarWinds trademarks, service marks, and logos
may be common law marks, registered or pending registration in the United States or in other
countries. All other trademarks mentioned herein are used for identification purposes only and
may be or are trademarks or registered trademarks of their respective companies.

© 2013 SOLARWINDS WORLDWIDE, LLC. ALL RIGHTS RESERVED.

Más contenido relacionado

La actualidad más candente

Computer Security and Risks
Computer Security and RisksComputer Security and Risks
Computer Security and Risks
Miguel Rebollo
 
FinalResearch_95752_oliver
FinalResearch_95752_oliverFinalResearch_95752_oliver
FinalResearch_95752_oliver
Madison Oliver
 
Computer security and_privacy_2010-2011
Computer security and_privacy_2010-2011Computer security and_privacy_2010-2011
Computer security and_privacy_2010-2011
lbcollins18
 
Computer Security and Safety, Ethics & Privacy
Computer Security and Safety, Ethics & PrivacyComputer Security and Safety, Ethics & Privacy
Computer Security and Safety, Ethics & Privacy
Samudin Kassan
 
Information security and privacy
Information security and privacyInformation security and privacy
Information security and privacy
Joy Chakraborty
 
Ite pc v40_chapter9_edited_h
Ite pc v40_chapter9_edited_hIte pc v40_chapter9_edited_h
Ite pc v40_chapter9_edited_h
Dave Arvin
 
5 network-security-threats
5 network-security-threats5 network-security-threats
5 network-security-threats
ReadWrite
 
Form4 cd2
Form4 cd2Form4 cd2
Form4 cd2
smktsj2
 

La actualidad más candente (20)

Computer Security and Risks
Computer Security and RisksComputer Security and Risks
Computer Security and Risks
 
FinalResearch_95752_oliver
FinalResearch_95752_oliverFinalResearch_95752_oliver
FinalResearch_95752_oliver
 
Computer security and_privacy_2010-2011
Computer security and_privacy_2010-2011Computer security and_privacy_2010-2011
Computer security and_privacy_2010-2011
 
Mobile Security
Mobile SecurityMobile Security
Mobile Security
 
Computer Security and Safety, Ethics & Privacy
Computer Security and Safety, Ethics & PrivacyComputer Security and Safety, Ethics & Privacy
Computer Security and Safety, Ethics & Privacy
 
Addressing CIP
Addressing CIPAddressing CIP
Addressing CIP
 
Microsoft protect ppt_ms_final
Microsoft protect ppt_ms_finalMicrosoft protect ppt_ms_final
Microsoft protect ppt_ms_final
 
Information security and privacy
Information security and privacyInformation security and privacy
Information security and privacy
 
Ite pc v40_chapter9_edited_h
Ite pc v40_chapter9_edited_hIte pc v40_chapter9_edited_h
Ite pc v40_chapter9_edited_h
 
Microcontroller mayhem - ECTF & USSS 2011
Microcontroller mayhem - ECTF & USSS 2011Microcontroller mayhem - ECTF & USSS 2011
Microcontroller mayhem - ECTF & USSS 2011
 
anti_virus
anti_virusanti_virus
anti_virus
 
Viruses (Lecture) IT Slides # 3
Viruses (Lecture) IT Slides # 3Viruses (Lecture) IT Slides # 3
Viruses (Lecture) IT Slides # 3
 
Computer safety
Computer safetyComputer safety
Computer safety
 
Security concepts
Security conceptsSecurity concepts
Security concepts
 
5 network-security-threats
5 network-security-threats5 network-security-threats
5 network-security-threats
 
Managing IT Security
Managing IT SecurityManaging IT Security
Managing IT Security
 
Securing The Computer From Viruses ...
Securing The Computer From Viruses ...Securing The Computer From Viruses ...
Securing The Computer From Viruses ...
 
Safe Computing At Home And Work
Safe Computing At Home And WorkSafe Computing At Home And Work
Safe Computing At Home And Work
 
Form4 cd2
Form4 cd2Form4 cd2
Form4 cd2
 
La sécurité de l'emploi : protégez votre SI
La sécurité de l'emploi : protégez votre SILa sécurité de l'emploi : protégez votre SI
La sécurité de l'emploi : protégez votre SI
 

Similar a Learn How to Detect, Prevent, and Replace the Use of USB Drives

TheInternetDigitalSecurityfddreeere.pptx
TheInternetDigitalSecurityfddreeere.pptxTheInternetDigitalSecurityfddreeere.pptx
TheInternetDigitalSecurityfddreeere.pptx
HAYDEECAYDA
 
Faux Disk Encryption....by Drew Suarez & Daniel Mayer
Faux Disk Encryption....by Drew Suarez & Daniel MayerFaux Disk Encryption....by Drew Suarez & Daniel Mayer
Faux Disk Encryption....by Drew Suarez & Daniel Mayer
Shakacon
 
Database Security Management
Database Security Management Database Security Management
Database Security Management
Ahsin Yousaf
 
Chapter 11 computer security and safety, ethics, and privacy
Chapter 11   computer security and safety, ethics, and privacyChapter 11   computer security and safety, ethics, and privacy
Chapter 11 computer security and safety, ethics, and privacy
haider ali
 

Similar a Learn How to Detect, Prevent, and Replace the Use of USB Drives (20)

databasesecurit-phpapp01.pdf
databasesecurit-phpapp01.pdfdatabasesecurit-phpapp01.pdf
databasesecurit-phpapp01.pdf
 
Database security
Database securityDatabase security
Database security
 
uu (2).pdf
uu (2).pdfuu (2).pdf
uu (2).pdf
 
Portable storage device management
Portable storage device managementPortable storage device management
Portable storage device management
 
TheInternetDigitalSecurityfddreeere.pptx
TheInternetDigitalSecurityfddreeere.pptxTheInternetDigitalSecurityfddreeere.pptx
TheInternetDigitalSecurityfddreeere.pptx
 
Spikes Security Isla Isolation
Spikes Security Isla IsolationSpikes Security Isla Isolation
Spikes Security Isla Isolation
 
Faux Disk Encryption....by Drew Suarez & Daniel Mayer
Faux Disk Encryption....by Drew Suarez & Daniel MayerFaux Disk Encryption....by Drew Suarez & Daniel Mayer
Faux Disk Encryption....by Drew Suarez & Daniel Mayer
 
CSE_Instructor_Materials_Chapter7.pptx
CSE_Instructor_Materials_Chapter7.pptxCSE_Instructor_Materials_Chapter7.pptx
CSE_Instructor_Materials_Chapter7.pptx
 
203135 Muhammad Usama.pptx
203135 Muhammad Usama.pptx203135 Muhammad Usama.pptx
203135 Muhammad Usama.pptx
 
Hiding in Plain Sight: The Danger of Known Vulnerabilities
Hiding in Plain Sight: The Danger of Known VulnerabilitiesHiding in Plain Sight: The Danger of Known Vulnerabilities
Hiding in Plain Sight: The Danger of Known Vulnerabilities
 
Database Security Management
Database Security Management Database Security Management
Database Security Management
 
Fog Computing:The Justifying Insider Data Stealing Attacks in the Cloud
Fog Computing:The Justifying Insider Data Stealing Attacks in the CloudFog Computing:The Justifying Insider Data Stealing Attacks in the Cloud
Fog Computing:The Justifying Insider Data Stealing Attacks in the Cloud
 
Free Guide-to-cybersecurity-fundamentals.pdf
Free Guide-to-cybersecurity-fundamentals.pdfFree Guide-to-cybersecurity-fundamentals.pdf
Free Guide-to-cybersecurity-fundamentals.pdf
 
Portfolio security, analytics and forensic blue coat
Portfolio security, analytics and forensic blue coatPortfolio security, analytics and forensic blue coat
Portfolio security, analytics and forensic blue coat
 
Protecting your Data in Google Apps
Protecting your Data in Google AppsProtecting your Data in Google Apps
Protecting your Data in Google Apps
 
Cloud_security.pptx
Cloud_security.pptxCloud_security.pptx
Cloud_security.pptx
 
Top Seven Risks of Enterprise Mobility - How to protect your business
Top Seven Risks of Enterprise Mobility - How to protect your businessTop Seven Risks of Enterprise Mobility - How to protect your business
Top Seven Risks of Enterprise Mobility - How to protect your business
 
Evaluate Top Seven Risks of Enterprise Mobility
Evaluate Top Seven Risks of Enterprise MobilityEvaluate Top Seven Risks of Enterprise Mobility
Evaluate Top Seven Risks of Enterprise Mobility
 
Chapter 11 computer security and safety, ethics, and privacy
Chapter 11   computer security and safety, ethics, and privacyChapter 11   computer security and safety, ethics, and privacy
Chapter 11 computer security and safety, ethics, and privacy
 
Symantec Mobile Security Whitepaper June 2011
Symantec Mobile Security Whitepaper June 2011Symantec Mobile Security Whitepaper June 2011
Symantec Mobile Security Whitepaper June 2011
 

Más de SolarWinds

Más de SolarWinds (20)

SolarWinds Government and Education Webinar: Greatest SolarWinds Features I N...
SolarWinds Government and Education Webinar: Greatest SolarWinds Features I N...SolarWinds Government and Education Webinar: Greatest SolarWinds Features I N...
SolarWinds Government and Education Webinar: Greatest SolarWinds Features I N...
 
SolarWinds Government and Education Webinar: Gaps Exist in Your Monitoring In...
SolarWinds Government and Education Webinar: Gaps Exist in Your Monitoring In...SolarWinds Government and Education Webinar: Gaps Exist in Your Monitoring In...
SolarWinds Government and Education Webinar: Gaps Exist in Your Monitoring In...
 
Government Webinar: Alerting and Reporting in the Age of Observability
Government Webinar: Alerting and Reporting in the Age of ObservabilityGovernment Webinar: Alerting and Reporting in the Age of Observability
Government Webinar: Alerting and Reporting in the Age of Observability
 
Government and Education Webinar: Full Stack Observability
Government and Education Webinar: Full Stack ObservabilityGovernment and Education Webinar: Full Stack Observability
Government and Education Webinar: Full Stack Observability
 
Government and Education Webinar: Public Sector Cybersecurity Survey - What I...
Government and Education Webinar: Public Sector Cybersecurity Survey - What I...Government and Education Webinar: Public Sector Cybersecurity Survey - What I...
Government and Education Webinar: Public Sector Cybersecurity Survey - What I...
 
Becoming Secure By Design: Questions You Should Ask Your Software Vendors
Becoming Secure By Design: Questions You Should Ask Your Software VendorsBecoming Secure By Design: Questions You Should Ask Your Software Vendors
Becoming Secure By Design: Questions You Should Ask Your Software Vendors
 
Government and Education Webinar: Real-Time Mission, CIO, and Command Dashboards
Government and Education Webinar: Real-Time Mission, CIO, and Command DashboardsGovernment and Education Webinar: Real-Time Mission, CIO, and Command Dashboards
Government and Education Webinar: Real-Time Mission, CIO, and Command Dashboards
 
Government and Education Webinar: Simplify Your Database Performance Manageme...
Government and Education Webinar: Simplify Your Database Performance Manageme...Government and Education Webinar: Simplify Your Database Performance Manageme...
Government and Education Webinar: Simplify Your Database Performance Manageme...
 
Government and Education Webinar: SolarWinds Orion Platform: Audit and Stream...
Government and Education Webinar: SolarWinds Orion Platform: Audit and Stream...Government and Education Webinar: SolarWinds Orion Platform: Audit and Stream...
Government and Education Webinar: SolarWinds Orion Platform: Audit and Stream...
 
Government and Education Webinar: Leverage Automation to Improve IT Operations
Government and Education Webinar: Leverage Automation to Improve IT OperationsGovernment and Education Webinar: Leverage Automation to Improve IT Operations
Government and Education Webinar: Leverage Automation to Improve IT Operations
 
Government and Education Webinar: Improving Application Performance
Government and Education Webinar: Improving Application PerformanceGovernment and Education Webinar: Improving Application Performance
Government and Education Webinar: Improving Application Performance
 
Government and Education: IT Tools to Support Your Hybrid Workforce
Government and Education: IT Tools to Support Your Hybrid WorkforceGovernment and Education: IT Tools to Support Your Hybrid Workforce
Government and Education: IT Tools to Support Your Hybrid Workforce
 
Government and Education Webinar: There's More Than One Way to Monitor SQL Da...
Government and Education Webinar: There's More Than One Way to Monitor SQL Da...Government and Education Webinar: There's More Than One Way to Monitor SQL Da...
Government and Education Webinar: There's More Than One Way to Monitor SQL Da...
 
SolarWinds Government and Education Webinar: Virtual Technology Briefing 08.0...
SolarWinds Government and Education Webinar: Virtual Technology Briefing 08.0...SolarWinds Government and Education Webinar: Virtual Technology Briefing 08.0...
SolarWinds Government and Education Webinar: Virtual Technology Briefing 08.0...
 
Government and Education Webinar: Zero-Trust Panel Discussion
Government and Education Webinar: Zero-Trust Panel Discussion Government and Education Webinar: Zero-Trust Panel Discussion
Government and Education Webinar: Zero-Trust Panel Discussion
 
Government and Education: Leveraging The SolarWinds Orion Assistance Program ...
Government and Education: Leveraging The SolarWinds Orion Assistance Program ...Government and Education: Leveraging The SolarWinds Orion Assistance Program ...
Government and Education: Leveraging The SolarWinds Orion Assistance Program ...
 
Government and Education Webinar: SQL Server—Advanced Performance Tuning
Government and Education Webinar: SQL Server—Advanced Performance Tuning Government and Education Webinar: SQL Server—Advanced Performance Tuning
Government and Education Webinar: SQL Server—Advanced Performance Tuning
 
Government and Education Webinar: Recovering IP Addresses on Your Network
Government and Education Webinar: Recovering IP Addresses on Your NetworkGovernment and Education Webinar: Recovering IP Addresses on Your Network
Government and Education Webinar: Recovering IP Addresses on Your Network
 
Government and Education Webinar: Optimize Performance With Advanced Host Mon...
Government and Education Webinar: Optimize Performance With Advanced Host Mon...Government and Education Webinar: Optimize Performance With Advanced Host Mon...
Government and Education Webinar: Optimize Performance With Advanced Host Mon...
 
Government and Education Webinar: Conquering Remote Work IT Challenges
Government and Education Webinar: Conquering Remote Work IT Challenges Government and Education Webinar: Conquering Remote Work IT Challenges
Government and Education Webinar: Conquering Remote Work IT Challenges
 

Último

Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Último (20)

ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 

Learn How to Detect, Prevent, and Replace the Use of USB Drives

  • 1. SolarWinds® Webinar Stop Data From Walking Out the Door! © 2013 SOLARWINDS WORLDWIDE, LLC. ALL RIGHTS RESERVED.
  • 2. Agenda » Risks of Insecure File Transfer » Data Breach Impact » Steps to Protect Sensitive Data »Q&A © 2013 SOLARWINDS WORLDWIDE, LLC. ALL RIGHTS RESERVED.
  • 3. Bad News: Internal Data Breaches are on the Rise! According to the Ponemon Institute: © 2013 SOLARWINDS WORLDWIDE, LLC. ALL RIGHTS RESERVED.
  • 4. USB Drives Come With Risks “Taking Files Home” Confidential Data Leaves the Building! No Tracking! End User at Work Virus Enters the Building! USB Thumb Drive “Sharing Files With Other People” Drive Stolen or Borrowed! End User at Work © 2013 SOLARWINDS WORLDWIDE, LLC. ALL RIGHTS RESERVED.
  • 5. Data Breach from a USB Storage Device is a Real Threat October 2013: Student data from Denver elementary schools at risk after thumb drive was stolen from a school nurse’s car. Source: denver.cbslocal.com, CBS Denver, Oct. 17, 2013. June 2013: Thousands of patient records compromised when Nebraska doctor lost thumb drive he’d been wearing on a lanyard around his neck. Source: www.journalstar.com, Lincoln Journal Star, June 30, 2013. April 2013: Investment regulator loses portable device containing personal information belonging to clients of multiple investment firms. Source: www.journalstar.com, Lincoln Journal Star, June 30, 2013. © 2013 SOLARWINDS WORLDWIDE, LLC. ALL RIGHTS RESERVED.
  • 6. Impact of a Data Breach The loss or leakage of sensitive data can result in serious damage to an organization, including:         Loss of Intellectual property Loss of private customer data Compliance violations Damage to corporate reputation/brand Loss of customer loyalty Loss of future business opportunities Lawsuits Financial and criminal penalties © 2013 SOLARWINDS WORLDWIDE, LLC. ALL RIGHTS RESERVED.
  • 7. Good News: You Can Do Something About It! Source: 2012 Data Breach Investigations Report, Verizon © 2013 SOLARWINDS WORLDWIDE, LLC. ALL RIGHTS RESERVED.
  • 8. Best News: SolarWinds Can Help! Protect your organization from data loss and breaches with a simple 3-step approach utilizing SolarWinds Log & Event Manager and SolarWinds Serv-U® Managed File Transfer. Step 1: Use LEM’s USB Defender technology to block unauthorized USB storage devices Step 2: Deploy Serv-U to provide a secure, managed alternative to risky USB file sharing Step 3: Rest easy with LEM’s real-time monitoring, threat detection, and automated remediation © 2013 SOLARWINDS WORLDWIDE, LLC. ALL RIGHTS RESERVED.
  • 9. How SolarWinds Log & Event Manager (LEM) Can Help © 2013 SOLARWINDS WORLDWIDE, LLC. ALL RIGHTS RESERVED.
  • 10. SolarWinds Log & Event Manager: Powerful USB Defense SolarWinds Log & Event Manager (LEM) includes built-in USB-Defender® technology to protect sensitive data from hitching a ride out the door on a removable storage device. With LEM’s USB defense, you can:  Detect USB storage devices in real-time  Automatically or manually eject USB devices  Create whitelists to block unauthorized USB usage  Monitor what files or processes are accessed  Detach devices even when systems are offline  Use built-in reporting to audit USB usage over time © 2013 SOLARWINDS WORLDWIDE, LLC. ALL RIGHTS RESERVED.
  • 11. Around-the-Clock USB Defense With LEM’s USB Defender technology, you can take automated actions to block the usage, so you can be confident your data is safe 24x7, even while you sleep! LEM’s automated actions include the ability to:  Automatically eject USB devices  Quarantine workstations  Shutdown machines  Disable user accounts © 2013 SOLARWINDS WORLDWIDE, LLC. ALL RIGHTS RESERVED.
  • 12. Allowing Only Authorized USB Access: Step 1 Step 1: Create a user-defined group in the LEM console and enable USB Defender on the systems you want to authorize USB access. © 2013 SOLARWINDS WORLDWIDE, LLC. ALL RIGHTS RESERVED.
  • 13. Allowing Only Authorized USB Access: Step 2 Step 2: Add the group of “authorized” devices to SolarWinds LEM rules and set up Active Response rules to detach unauthorized USB devices. LEM’s powerful correlation rules alert you in real time when unauthorized USB devices try to access your network. © 2013 SOLARWINDS WORLDWIDE, LLC. ALL RIGHTS RESERVED.
  • 14. How SolarWinds Serv-U Managed File Transfer (MFT) Can Help © 2013 SOLARWINDS WORLDWIDE, LLC. ALL RIGHTS RESERVED.
  • 15. SolarWinds Serv-U MFT Server: SIMPLE & SECURE File Sharing SolarWinds Serv-U MFT Server provides secure file sharing you can deploy in your own datacenter, so you don’t have to worry about company data flying around in the cloud or walking out the door on a USB device. With Serv-U, you can:  Enable users to securely share files  Leverage existing infrastructure  Apply your own security policy  Eliminate the need for risky USB devices  Replace unreliable or insecure cloud storage © 2013 SOLARWINDS WORLDWIDE, LLC. ALL RIGHTS RESERVED.
  • 16. Satisfy USB Use Cases with Serv-U “Taking Files Home” 1) File Copied to Serv-U End User at Work Serv-U MFT Server 2) File Copied from Serv-U (and Edited) 3) Edited File Copied to Serv-U 4) Edited File Copied from Serv-U End User at Home “Sharing Files With Other People” 1) File Copied to Serv-U End User at Work © 2013 SOLARWINDS WORLDWIDE, LLC. ALL RIGHTS RESERVED. Serv-U MFT Server 2) File Copied from Serv-U Other End Users
  • 17. Simple & Secure “Anywhere” File Access With Serv-U’s “Web Client”, end-users can securely access work files from anywhere. © 2013 SOLARWINDS WORLDWIDE, LLC. ALL RIGHTS RESERVED.
  • 18. How Serv-U File Sharing Works © 2013 SOLARWINDS WORLDWIDE, LLC. ALL RIGHTS RESERVED.
  • 19. Easy-to-Use File Sharing Interface Serv-U provides an easy-to-use interface for sending and requesting files, along with advanced options like file retention, password protection, and notifications. © 2013 SOLARWINDS WORLDWIDE, LLC. ALL RIGHTS RESERVED.
  • 20. The Result: Effective File Sharing with Minimal Risks DLP* Stops Confidential Data from Leaving “Taking Files Home” Serv-U MFT Server 1) File Copied to Drive End User at Work 4) Edited File Copied from Drive AV* Stops Viruses and Malware from Entering 2) File Copied from Drive (and Edited) Serv-U logs let admins and auditors know who took what 3) Edited File Copied to Drive End User at Home “Sharing Files With Other People” 1) File Copied to Drive End User at Work * Serv-U works with your existing DLP and AV software © 2013 SOLARWINDS WORLDWIDE, LLC. ALL RIGHTS RESERVED. Serv-U MFT Server Serv-U logs show bad login attempts and locked IPs 2) File Copied from Serv-U Access denied – and IP automatically locked out Other End Users Unauthorized Person
  • 21. Additional Resources SolarWinds Log & Event Manager – Product Info and Online Demo http://www.solarwinds.com/log-event-manager.aspx SolarWinds Serv-U Managed File Transfer (MFT) Server – Product Info and Online Demo http://www.solarwinds.com/serv-u-managed-file-transfer-server.aspx SolarWinds Security Portfolio – Learn More about All of SolarWinds Security Products http://www.solarwinds.com/security SolarWinds Security: Helping Protect Your Sensitive Data © 2013 SOLARWINDS WORLDWIDE, LLC. ALL RIGHTS RESERVED.
  • 22. Thank You! The SOLARWINDS and SOLARWINDS & Design marks are the exclusive property of SolarWinds Worldwide, LLC, are registered with the U.S. Patent and Trademark Office, and may be registered or pending registration in other countries. All other SolarWinds trademarks, service marks, and logos may be common law marks, registered or pending registration in the United States or in other countries. All other trademarks mentioned herein are used for identification purposes only and may be or are trademarks or registered trademarks of their respective companies. © 2013 SOLARWINDS WORLDWIDE, LLC. ALL RIGHTS RESERVED.