Más contenido relacionado La actualidad más candente (20) Similar a Learn How to Detect, Prevent, and Replace the Use of USB Drives (20) Learn How to Detect, Prevent, and Replace the Use of USB Drives2. Agenda
» Risks of Insecure File Transfer
» Data Breach Impact
» Steps to Protect Sensitive Data
»Q&A
© 2013 SOLARWINDS WORLDWIDE, LLC. ALL RIGHTS RESERVED.
3. Bad News: Internal Data Breaches are on the Rise!
According to the Ponemon Institute:
© 2013 SOLARWINDS WORLDWIDE, LLC. ALL RIGHTS RESERVED.
4. USB Drives Come With Risks
“Taking Files Home”
Confidential
Data Leaves
the Building!
No Tracking!
End User at Work
Virus Enters
the Building!
USB Thumb
Drive
“Sharing Files With Other People”
Drive Stolen
or Borrowed!
End User at Work
© 2013 SOLARWINDS WORLDWIDE, LLC. ALL RIGHTS RESERVED.
5. Data Breach from a USB Storage Device is a Real Threat
October 2013:
Student data from Denver elementary schools at risk after thumb drive
was stolen from a school nurse’s car.
Source: denver.cbslocal.com, CBS Denver, Oct. 17, 2013.
June 2013:
Thousands of patient records compromised when Nebraska doctor
lost thumb drive he’d been wearing on a lanyard around his neck.
Source: www.journalstar.com, Lincoln Journal Star, June 30, 2013.
April 2013:
Investment regulator loses portable device containing personal
information belonging to clients of multiple investment firms.
Source: www.journalstar.com, Lincoln Journal Star, June 30, 2013.
© 2013 SOLARWINDS WORLDWIDE, LLC. ALL RIGHTS RESERVED.
6. Impact of a Data Breach
The loss or leakage of sensitive data can result in serious damage to an organization,
including:
Loss of Intellectual property
Loss of private customer data
Compliance violations
Damage to corporate reputation/brand
Loss of customer loyalty
Loss of future business opportunities
Lawsuits
Financial and criminal penalties
© 2013 SOLARWINDS WORLDWIDE, LLC. ALL RIGHTS RESERVED.
7. Good News: You Can Do Something About It!
Source: 2012 Data Breach Investigations Report, Verizon
© 2013 SOLARWINDS WORLDWIDE, LLC. ALL RIGHTS RESERVED.
8. Best News: SolarWinds Can Help!
Protect your organization from data loss and breaches with a simple 3-step approach
utilizing SolarWinds Log & Event Manager and SolarWinds Serv-U® Managed File Transfer.
Step 1: Use LEM’s USB Defender technology to block unauthorized USB storage devices
Step 2: Deploy Serv-U to provide a secure, managed alternative to risky USB file sharing
Step 3: Rest easy with LEM’s real-time monitoring, threat detection, and automated remediation
© 2013 SOLARWINDS WORLDWIDE, LLC. ALL RIGHTS RESERVED.
9. How SolarWinds
Log & Event Manager (LEM)
Can Help
© 2013 SOLARWINDS WORLDWIDE, LLC. ALL RIGHTS RESERVED.
10. SolarWinds Log & Event Manager: Powerful USB Defense
SolarWinds Log & Event Manager (LEM) includes built-in USB-Defender® technology to
protect sensitive data from hitching a ride out the door on a removable storage device.
With LEM’s USB defense, you can:
Detect USB storage devices in real-time
Automatically or manually eject USB devices
Create whitelists to block unauthorized USB usage
Monitor what files or processes are accessed
Detach devices even when systems are offline
Use built-in reporting to audit USB usage over time
© 2013 SOLARWINDS WORLDWIDE, LLC. ALL RIGHTS RESERVED.
11. Around-the-Clock USB Defense
With LEM’s USB Defender technology, you can take automated actions to block the
usage, so you can be confident your data is safe 24x7, even while you sleep!
LEM’s automated actions include the ability to:
Automatically eject USB devices
Quarantine workstations
Shutdown machines
Disable user accounts
© 2013 SOLARWINDS WORLDWIDE, LLC. ALL RIGHTS RESERVED.
12. Allowing Only Authorized USB Access: Step 1
Step 1: Create a user-defined group in the LEM console and enable USB Defender on
the systems you want to authorize USB access.
© 2013 SOLARWINDS WORLDWIDE, LLC. ALL RIGHTS RESERVED.
13. Allowing Only Authorized USB Access: Step 2
Step 2: Add the group of “authorized” devices to SolarWinds LEM rules and set up Active
Response rules to detach unauthorized USB devices.
LEM’s powerful correlation rules alert you in real time when unauthorized USB devices try to
access your network.
© 2013 SOLARWINDS WORLDWIDE, LLC. ALL RIGHTS RESERVED.
15. SolarWinds Serv-U MFT Server: SIMPLE & SECURE File Sharing
SolarWinds Serv-U MFT Server provides secure file sharing you can deploy in your own
datacenter, so you don’t have to worry about company data flying around in the cloud or
walking out the door on a USB device.
With Serv-U, you can:
Enable users to securely share files
Leverage existing infrastructure
Apply your own security policy
Eliminate the need for risky USB devices
Replace unreliable or insecure cloud storage
© 2013 SOLARWINDS WORLDWIDE, LLC. ALL RIGHTS RESERVED.
16. Satisfy USB Use Cases with Serv-U
“Taking Files Home”
1) File Copied to Serv-U
End User at Work
Serv-U MFT
Server
2) File Copied from Serv-U (and Edited)
3) Edited File Copied to Serv-U
4) Edited File Copied from Serv-U
End User at Home
“Sharing Files With Other People”
1) File Copied to Serv-U
End User at Work
© 2013 SOLARWINDS WORLDWIDE, LLC. ALL RIGHTS RESERVED.
Serv-U MFT
Server
2) File Copied from Serv-U
Other End Users
17. Simple & Secure “Anywhere” File Access
With Serv-U’s “Web Client”, end-users can securely access work files from anywhere.
© 2013 SOLARWINDS WORLDWIDE, LLC. ALL RIGHTS RESERVED.
18. How Serv-U File Sharing Works
© 2013 SOLARWINDS WORLDWIDE, LLC. ALL RIGHTS RESERVED.
19. Easy-to-Use File Sharing Interface
Serv-U provides an easy-to-use interface for sending and requesting files, along with
advanced options like file retention, password protection, and notifications.
© 2013 SOLARWINDS WORLDWIDE, LLC. ALL RIGHTS RESERVED.
20. The Result: Effective File Sharing with Minimal Risks
DLP* Stops
Confidential
Data from
Leaving
“Taking Files Home”
Serv-U MFT
Server
1) File Copied to Drive
End User at Work
4) Edited File Copied from Drive
AV* Stops
Viruses and
Malware from
Entering
2) File Copied from Drive (and Edited)
Serv-U logs let
admins and
auditors know
who took what
3) Edited File Copied to Drive
End User at Home
“Sharing Files With Other People”
1) File Copied to Drive
End User at Work
* Serv-U works with your existing DLP and AV software
© 2013 SOLARWINDS WORLDWIDE, LLC. ALL RIGHTS RESERVED.
Serv-U MFT
Server
Serv-U logs
show bad login
attempts and
locked IPs
2) File Copied from Serv-U
Access denied –
and IP
automatically
locked out
Other End Users
Unauthorized Person
21. Additional Resources
SolarWinds Log & Event Manager – Product Info and Online Demo
http://www.solarwinds.com/log-event-manager.aspx
SolarWinds Serv-U Managed File Transfer (MFT) Server – Product Info and Online Demo
http://www.solarwinds.com/serv-u-managed-file-transfer-server.aspx
SolarWinds Security Portfolio – Learn More about All of SolarWinds Security Products
http://www.solarwinds.com/security
SolarWinds Security: Helping Protect Your Sensitive Data
© 2013 SOLARWINDS WORLDWIDE, LLC. ALL RIGHTS RESERVED.
22. Thank You!
The SOLARWINDS and SOLARWINDS & Design marks are the exclusive property of SolarWinds
Worldwide, LLC, are registered with the U.S. Patent and Trademark Office, and may be registered or
pending registration in other countries. All other SolarWinds trademarks, service marks, and logos
may be common law marks, registered or pending registration in the United States or in other
countries. All other trademarks mentioned herein are used for identification purposes only and
may be or are trademarks or registered trademarks of their respective companies.
© 2013 SOLARWINDS WORLDWIDE, LLC. ALL RIGHTS RESERVED.