SlideShare a Scribd company logo
1 of 22
Download to read offline
Live Demonstration –
Ensure Data Protection
with Fidelis Network®
© Fidelis Cybersecurity
Agenda
Introductions
Fidelis Overview
Integrated DLP vs Enterprise DLP
Metadata for Detection & Response
Visibility, DSI, Content & Context
Network DLP Demonstration
Questions & Answers
Kevin Harvey, CISSP
Senior Principle Security Engineer
Federal/DoD
Fidelis Cybersecurity
Tom Clare
Product/Technical Marketing
Fidelis Cybersecurity
2
© Fidelis Cybersecurity
Leader inAutomated Detection & Response
3
GLOBAL PRESENCE
• Established 2002
• HQ in Washington, DC
• Fortune 100 & DoD enterprise proven
• 12 of the Fortune 50
• 24 of the Fortune 100
• Backed by Marlin Equity Partners
PATENTED INNOVATION
• Fidelis Elevate Platform
• Network Detection and Response
• Endpoint Detection and Response (EDR)
• Data Loss Prevention (DLP)
• Deception
• Discovery and Classification of
Data and Assets
• Gartner Cool Vendor 2017 for Deception
• Gartner Visionary 2017 for DLP
© Fidelis Cybersecurity
Automate Detection and Response
with The Fidelis Elevate™ Platform
4
Accuracy. Clarity. Certainty.
• Gain threat visibility into networks,
endpoints and cloud environments
• See north-south traffic, lateral movement,
and traffic going in and out of your
network
• Automate detection and response to
reduce exposure and risk to data
• Respond to threats at the endpoint
• Mitigate data leakage and exfiltration
• Reduce dwell time with an active post-
breach defense
© Fidelis Cybersecurity
Fidelis Network DLP Leadership
Rated 4.9 for Network DLP (1-5 scale, 5 the highest rating)
“Fidelis Network is one of the most fully featured network DLP products in the enterprise DLP
market and operates at speeds of 20 Gbps and above. The strength of this product is its wide
range of deployment and throughput options, as well as port and protocol independence, and
no reliance on a proxy architecture.”
”Fidelis Network covers a number of DLP detection methods and can also analyze metadata
content. Fidelis Network has additional features to better determine malicious content, such as
payload analysis and sandboxing of files.”
“Fidelis Network CommandPost (K2) is feature-rich, with advanced configuration options,
logical event tracking and alert options. Fidelis also offers the capability to split ownership on
rules, which can be valuable for change control management of authoring and editing of DLP
rules, particularly in very large organizations.”
Gartner: Critical Capabilities for Enterprise DLP, Published 10 April 2017 - ID G00308328
© Fidelis Cybersecurity
Shift to Integrated DLP Solutions
By 2022, 60% of organizations will involve line-of-business
owners when crafting their data loss prevention (DLP) strategy, up
from 15% today.
By 2020, 85% of organizations will implement at least one form of
integrated DLP, up from 50% today.
By 2022, a majority of DLP market revenue will be driven by
integrated DLP products, as opposed to enterprise DLP systems.
6
Source - Magic Quadrant for Enterprise Data Loss Prevention,
Published 16 February 2017 - ID G00300911
Authors - Brian Reed, Deborah Kish
© Fidelis Cybersecurity
Integrated DLP
7
Endpoint
EDR
Network
NTA
CASB
SWG
w/ICAP
SEG
Cloud
Platform
SaaS Apps
Native DLP
Features
Integrated
DLP
Compliance
IP Data Protection
Sensitive
Data Use
Monitoring
Integrated
DLP
© Fidelis Cybersecurity
Analyst Perspective
8
Network Endpoint Cloud Platform SaaS Apps Web, Email &
Cloud
Gateways
Operating
Systems
Compliance for
Data-in-Motion,
Final DLP Pass
IP Data
Protection in
Use, On/Off
Networks
First Pass DLP First Pass DLP First Pass DLP Encryption
TLS Encrypted
Traffic Visibility
Application
Conflicts,
Feature Parity,
Control Factor
28% of 2018
Workload,
Trending Down
(44% in 2013)
59% of 2018
Workload,
Trending Up
SWG + ICAP
CASB API &
Proxy, MTA,
Limited Vis.
Not Always MS
OS and Files
NTA Visibility
Metadata
All Ports &
Protocols
EDR Visibility
Metadata
Policy Control &
Scripts
TAPs coming
soon…MS
Azure first, then
AWS tbd
Uniformity
Challenge
TLS at SWG Data Migration
to Cloud
DLP needs content & context to determine risk and threats.
© Fidelis Cybersecurity
DLP + Detection & Response
9
Endpoint
EDR
Network
NTA
CASB
SWG
w/ICAP
SEG
Cloud
Platform
SaaS Apps
Native DLP
Features
Integrated
DLP
Network DLP w/Email & Web Sensors
Deep Session Inspection (DSI)
Sand Boxing & Payload Analysis
ML Anomaly Detection & Threat Intelligence
Threat Prevention & Detection
Real-time & Retrospective Analysis
Metadata
© Fidelis Cybersecurity
Metadata – Fidelis Collector
Have I seen this document of interest on the network before? Query: Search all network
sessions for the past three months for my document of interest based on hash, title, author,
create date or other attributes.
Who else has sent or received this document of interest? Query: Search all network
sessions for the past three months for my document of interest based on hash, title, author,
create date or other attributes.
What other data has this user sent? Query: Map out all data from this user, what was sent
and where it went.
Where has the phrase “Tractor Beam” been seen on the network within the last
month? Tag sessions containing phrase or keywords of interest. Query: Search for tagged
sessions.
What documents contain specific header/footer text? Query: List all network sessions in
the last 30 days that contained a document with a header/footer that contains specific text.
10
© Fidelis Cybersecurity
Key Requirements OfA Network DLP Solution
• Conduct session-level (not packet-level) inspection of network traffic
across all 65,535 network ports
• Provide network visibility into protocols, channels, and applications in use
• Be able to extract enterprise human-readable content and related
metadata contained in the session and any attachments and compressed
files for analysis
• Provide multiple sophisticated content analysis technologies to detect
sensitive and/or protected information
• Policy engine with rules to determine network sessions that violate policy
• Ability to prevent network sessions violating policy across all 65,535 ports.
11
© Fidelis Cybersecurity
Fidelis Network®
12
Gain visibility into CONTENT over ALL PORTS
& PROTOCOLS to DETECT
threats and PREVENT data loss.
© Fidelis Cybersecurity
Fidelis Network®
See Deeper into Applications and Content Flowing Over
the Network
• Patented Deep Session Inspection® as well as Deep Packet Inspection - across
all ports and protocols
• Capture and store all meta data traffic that is searchable by threat hunters or
automated analytics
• Automatically decode and analyze traffic to detect and prevent threats as well as
unauthorized data transfers
Automate Threat Detection and Mitigate Data Theft
• Real-time network analysis to uncover initial compromise, suspicious hosts,
malware, compromised host
• Retroactive analysis against stored meta data based on indicators derived from
threat intelligence, machine learning, sandbox results, and Fidelis research
• Confirm and stop data theft by content inspection of all outgoing network activity
13
© Fidelis Cybersecurity
Fidelis Network®
Eliminate Alert Fatigue
• Automatically validate, correlate, and consolidate network alerts against every
endpoint in your network
• Suspicious network data, rich content, and files analyzed by multiple defenses,
security analytics and rules are included as pre-staged evidence – in one view
Respond Faster to Breaches
• Gain more context around an investigation with real-time and retrospective
analysis across the kill chain to ensure a faster, more effective response
Prevent Threats and Data Leakage
• Gateway and internal sensor locations allow for the dropping of sessions
• Mail sensor allows you to quarantine, drop, re-route and remove attachments
• Web sensor enables you to redirect web pages and drop sessions
14
© Fidelis Cybersecurity
Deep Content Decoding and Analysis
Deep, Recursive Content Decoding and Analysis
Detects content-level threats that are invisible to other network security systems
Able to apply threat intelligence over a larger detection surface
15
Network
Packets
Session Buffers (RAM)
Content Buffers (RAM)
Content Buffers (RAM)
Non-Selectively “Exploding” Recursively
Embedded Content Objects in RAM
Session
Reassembly
Content Decoders
and Analyzers
Content Decoders
and Analyzers
Protocol and
Application Decoders
and Analyzers
© Fidelis Cybersecurity
Configuration, Investigation, Analysis, Response, Integration
Deep Session Inspection®
Metadata
and Tags
D E E P S E S S I O N I N S P E C T I O N ®
Content Analysis,
Malware Detection
Deep Content
Decoding
Protocol and
Application Decoding
Full Session
Reassembly
Real-Time
Threat
Detection
Network
Non-
Selective
Network
Memory
Fidelis K2
FidelisCollector
Fidelis
Sensors
16
© Fidelis Cybersecurity
Deep Content Visibility
Visibility into Deeply Embedded Network Content (Inbound and Outbound)
17
PDF
DeflateText
Malware
ExcelText
ZIP
PPT
MIME
HTTP
Text
Gmail
Malicious
Inbound
Content
Classified
Sensitive
Outbound
Content
© Fidelis Cybersecurity
Comprehensive Data Protection Across
Different Types of Traffic
18
Fidelis Network Direct Sensor
Fidelis Network Mail Sensor
Fidelis Network Internal Sensor
Fidelis Network Web Sensor
Gateway sensor, all port visibility
Datacenter sensor, handles
SMB, DB transactions
Enables graceful quarantine,
prevention of email traffic
Web traffic only, traffic fed
from Proxy via ICAP
© Fidelis Cybersecurity
Automated Endpoint Validation & Response
(With Fidelis Network® Integration)
• Highlight the importance of an alert with endpoint
activity validation
• Automatically prioritize important alerts
• Answer critical analytic questions ahead of time
(compared to non-validated alerts)
• Be certain that the alerts you are looking at are
actionable
• Automate response with playbooks and rapid,
surgical remediation capabilities
19
Demonstration
© Fidelis Cybersecurity
Questions and Next Steps
• Review the Product Web Page & Videos
https://www.fidelissecurity.com/products/network
• Request a Demonstration
• Network:
https://www.fidelissecurity.com/products/network/demo
• Elevate:
www.fidelissecurity.com/products/security-operations-platform/demo
• Free Elevate Assessment
www.fidelissecurity.com/fidelis-elevate-security-assessment
21
Thank You!

More Related Content

What's hot

Key Data Privacy Roles Explained: Data Protection Officer, Information Securi...
Key Data Privacy Roles Explained: Data Protection Officer, Information Securi...Key Data Privacy Roles Explained: Data Protection Officer, Information Securi...
Key Data Privacy Roles Explained: Data Protection Officer, Information Securi...
PECB
 
Introduction to virtualisation
Introduction to virtualisationIntroduction to virtualisation
Introduction to virtualisation
sagaroceanic11
 

What's hot (20)

Nozomi Networks Q1_2018 Company Introduction
Nozomi Networks Q1_2018 Company IntroductionNozomi Networks Q1_2018 Company Introduction
Nozomi Networks Q1_2018 Company Introduction
 
Information security
Information securityInformation security
Information security
 
3 Modern Security - Secure identities to reach zero trust with AAD
3   Modern Security - Secure identities to reach zero trust with AAD3   Modern Security - Secure identities to reach zero trust with AAD
3 Modern Security - Secure identities to reach zero trust with AAD
 
Best Practices for Configuring Your OSSIM Installation
Best Practices for Configuring Your OSSIM InstallationBest Practices for Configuring Your OSSIM Installation
Best Practices for Configuring Your OSSIM Installation
 
Threat Modeling to Reduce Software Security Risk
Threat Modeling to Reduce Software Security RiskThreat Modeling to Reduce Software Security Risk
Threat Modeling to Reduce Software Security Risk
 
Key Data Privacy Roles Explained: Data Protection Officer, Information Securi...
Key Data Privacy Roles Explained: Data Protection Officer, Information Securi...Key Data Privacy Roles Explained: Data Protection Officer, Information Securi...
Key Data Privacy Roles Explained: Data Protection Officer, Information Securi...
 
Threat Activity Groups - Dragos
Threat Activity Groups - Dragos Threat Activity Groups - Dragos
Threat Activity Groups - Dragos
 
MITRE ATT&CK Framework
MITRE ATT&CK FrameworkMITRE ATT&CK Framework
MITRE ATT&CK Framework
 
Microsoft Information Protection.pptx
Microsoft Information Protection.pptxMicrosoft Information Protection.pptx
Microsoft Information Protection.pptx
 
Cissp- Security and Risk Management
Cissp- Security and Risk ManagementCissp- Security and Risk Management
Cissp- Security and Risk Management
 
IBM Security Strategy Overview
IBM Security Strategy OverviewIBM Security Strategy Overview
IBM Security Strategy Overview
 
Computer security overview
Computer security overviewComputer security overview
Computer security overview
 
SIEM Architecture
SIEM ArchitectureSIEM Architecture
SIEM Architecture
 
Microsoft Information Protection demystified Albert Hoitingh
Microsoft Information Protection demystified Albert HoitinghMicrosoft Information Protection demystified Albert Hoitingh
Microsoft Information Protection demystified Albert Hoitingh
 
Structure of iso 27001
Structure of iso 27001Structure of iso 27001
Structure of iso 27001
 
Introduction to information security
Introduction to information securityIntroduction to information security
Introduction to information security
 
Basic introduction to iso27001
Basic introduction to iso27001Basic introduction to iso27001
Basic introduction to iso27001
 
Modern Data Architecture for a Data Lake with Informatica and Hortonworks Dat...
Modern Data Architecture for a Data Lake with Informatica and Hortonworks Dat...Modern Data Architecture for a Data Lake with Informatica and Hortonworks Dat...
Modern Data Architecture for a Data Lake with Informatica and Hortonworks Dat...
 
Introduction to virtualisation
Introduction to virtualisationIntroduction to virtualisation
Introduction to virtualisation
 
Agile security
Agile securityAgile security
Agile security
 

Similar to Secure Your Data with Fidelis Network® for DLP

dlp-sales-play-sales-customer-deck-2022.pptx
dlp-sales-play-sales-customer-deck-2022.pptxdlp-sales-play-sales-customer-deck-2022.pptx
dlp-sales-play-sales-customer-deck-2022.pptx
alex hincapie
 
Cryptographie avancée et Logical Data Fabric : Accélérez le partage et la mig...
Cryptographie avancée et Logical Data Fabric : Accélérez le partage et la mig...Cryptographie avancée et Logical Data Fabric : Accélérez le partage et la mig...
Cryptographie avancée et Logical Data Fabric : Accélérez le partage et la mig...
Denodo
 
Zero Trust and Data Security
Zero Trust and Data SecurityZero Trust and Data Security
Zero Trust and Data Security
Career Communications Group
 

Similar to Secure Your Data with Fidelis Network® for DLP (20)

Extending Your Network Cloud Security to AWS
Extending Your Network Cloud Security to AWSExtending Your Network Cloud Security to AWS
Extending Your Network Cloud Security to AWS
 
You can't detect what you can't see illuminating the entire kill chain
You can't detect what you can't see   illuminating the entire kill chainYou can't detect what you can't see   illuminating the entire kill chain
You can't detect what you can't see illuminating the entire kill chain
 
Fighting cyber fraud with hadoop
Fighting cyber fraud with hadoopFighting cyber fraud with hadoop
Fighting cyber fraud with hadoop
 
dlp-sales-play-sales-customer-deck-2022.pptx
dlp-sales-play-sales-customer-deck-2022.pptxdlp-sales-play-sales-customer-deck-2022.pptx
dlp-sales-play-sales-customer-deck-2022.pptx
 
Electronic Data Discovery
Electronic Data DiscoveryElectronic Data Discovery
Electronic Data Discovery
 
DG_Architecture_Training.pptx
DG_Architecture_Training.pptxDG_Architecture_Training.pptx
DG_Architecture_Training.pptx
 
Kripta Key Product Key Management System.pdf
Kripta Key Product Key Management System.pdfKripta Key Product Key Management System.pdf
Kripta Key Product Key Management System.pdf
 
Cryptographie avancée et Logical Data Fabric : Accélérez le partage et la mig...
Cryptographie avancée et Logical Data Fabric : Accélérez le partage et la mig...Cryptographie avancée et Logical Data Fabric : Accélérez le partage et la mig...
Cryptographie avancée et Logical Data Fabric : Accélérez le partage et la mig...
 
Cloud Security
Cloud SecurityCloud Security
Cloud Security
 
Cloud Security
Cloud SecurityCloud Security
Cloud Security
 
PLNOG19 - Gaweł Mikołajczyk & Michał Garcarz - SOC, studium ciężkich przypadków
PLNOG19 - Gaweł Mikołajczyk & Michał Garcarz - SOC, studium ciężkich przypadkówPLNOG19 - Gaweł Mikołajczyk & Michał Garcarz - SOC, studium ciężkich przypadków
PLNOG19 - Gaweł Mikołajczyk & Michał Garcarz - SOC, studium ciężkich przypadków
 
Get Started with Cloudera’s Cyber Solution
Get Started with Cloudera’s Cyber SolutionGet Started with Cloudera’s Cyber Solution
Get Started with Cloudera’s Cyber Solution
 
CONFidence2015: Real World Threat Hunting - Martin Nystrom
CONFidence2015: Real World Threat Hunting - Martin NystromCONFidence2015: Real World Threat Hunting - Martin Nystrom
CONFidence2015: Real World Threat Hunting - Martin Nystrom
 
Preparing for the Cybersecurity Renaissance
Preparing for the Cybersecurity RenaissancePreparing for the Cybersecurity Renaissance
Preparing for the Cybersecurity Renaissance
 
01-Chapter 01-Introduction to CASB and Netskope.pptx
01-Chapter 01-Introduction to CASB and Netskope.pptx01-Chapter 01-Introduction to CASB and Netskope.pptx
01-Chapter 01-Introduction to CASB and Netskope.pptx
 
Strengthen Cloud Security
Strengthen Cloud SecurityStrengthen Cloud Security
Strengthen Cloud Security
 
Zero Trust and Data Security
Zero Trust and Data SecurityZero Trust and Data Security
Zero Trust and Data Security
 
From SIEM to SA: The Path Forward
From SIEM to SA: The Path ForwardFrom SIEM to SA: The Path Forward
From SIEM to SA: The Path Forward
 
Operational Security Intelligence
Operational Security IntelligenceOperational Security Intelligence
Operational Security Intelligence
 
How to Overcome Network Access Control Limitations for Better Network Security
How to Overcome Network Access Control Limitations for Better Network SecurityHow to Overcome Network Access Control Limitations for Better Network Security
How to Overcome Network Access Control Limitations for Better Network Security
 

More from Fidelis Cybersecurity

More from Fidelis Cybersecurity (13)

Putting Cyber Attackers on the Defensive
Putting Cyber Attackers on the DefensivePutting Cyber Attackers on the Defensive
Putting Cyber Attackers on the Defensive
 
Threat intelligence Primary Tradecraft and Research
Threat intelligence Primary Tradecraft and ResearchThreat intelligence Primary Tradecraft and Research
Threat intelligence Primary Tradecraft and Research
 
Extend Network Visibility and Secure Applications and Data in Azure
Extend Network Visibility and Secure Applications and Data in AzureExtend Network Visibility and Secure Applications and Data in Azure
Extend Network Visibility and Secure Applications and Data in Azure
 
Hunting for cyber threats targeting weapon systems
Hunting for cyber threats targeting weapon systemsHunting for cyber threats targeting weapon systems
Hunting for cyber threats targeting weapon systems
 
Insider Threats Part 2: Preventing Data Exfiltration with Fidelis Elevate
Insider Threats Part 2: Preventing Data Exfiltration with Fidelis ElevateInsider Threats Part 2: Preventing Data Exfiltration with Fidelis Elevate
Insider Threats Part 2: Preventing Data Exfiltration with Fidelis Elevate
 
Game Changing Cyber Defensive Strategies for 2019
Game Changing Cyber Defensive Strategies for 2019Game Changing Cyber Defensive Strategies for 2019
Game Changing Cyber Defensive Strategies for 2019
 
Part 1: Identifying Insider Threats with Fidelis EDR Technology
Part 1: Identifying  Insider Threats with Fidelis EDR Technology Part 1: Identifying  Insider Threats with Fidelis EDR Technology
Part 1: Identifying Insider Threats with Fidelis EDR Technology
 
The State of Threat Detection 2019
The State of Threat Detection 2019The State of Threat Detection 2019
The State of Threat Detection 2019
 
Critical Capabilities for MDR Services - What to Know Before You Buy
Critical Capabilities for MDR Services - What to Know Before You BuyCritical Capabilities for MDR Services - What to Know Before You Buy
Critical Capabilities for MDR Services - What to Know Before You Buy
 
Capture the Flag Exercise Using Active Deception Defense
Capture the Flag Exercise Using Active Deception DefenseCapture the Flag Exercise Using Active Deception Defense
Capture the Flag Exercise Using Active Deception Defense
 
Fidelis - Live Demonstration of Deception Solution
Fidelis - Live Demonstration of Deception SolutionFidelis - Live Demonstration of Deception Solution
Fidelis - Live Demonstration of Deception Solution
 
Cybersecurity Operations: Examining the State of the SOC
Cybersecurity Operations: Examining the State of the SOCCybersecurity Operations: Examining the State of the SOC
Cybersecurity Operations: Examining the State of the SOC
 
Applying intelligent deception to detect sophisticated cyber attacks
Applying intelligent deception to detect sophisticated cyber attacksApplying intelligent deception to detect sophisticated cyber attacks
Applying intelligent deception to detect sophisticated cyber attacks
 

Recently uploaded

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Recently uploaded (20)

HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024
 

Secure Your Data with Fidelis Network® for DLP

  • 1. Live Demonstration – Ensure Data Protection with Fidelis Network®
  • 2. © Fidelis Cybersecurity Agenda Introductions Fidelis Overview Integrated DLP vs Enterprise DLP Metadata for Detection & Response Visibility, DSI, Content & Context Network DLP Demonstration Questions & Answers Kevin Harvey, CISSP Senior Principle Security Engineer Federal/DoD Fidelis Cybersecurity Tom Clare Product/Technical Marketing Fidelis Cybersecurity 2
  • 3. © Fidelis Cybersecurity Leader inAutomated Detection & Response 3 GLOBAL PRESENCE • Established 2002 • HQ in Washington, DC • Fortune 100 & DoD enterprise proven • 12 of the Fortune 50 • 24 of the Fortune 100 • Backed by Marlin Equity Partners PATENTED INNOVATION • Fidelis Elevate Platform • Network Detection and Response • Endpoint Detection and Response (EDR) • Data Loss Prevention (DLP) • Deception • Discovery and Classification of Data and Assets • Gartner Cool Vendor 2017 for Deception • Gartner Visionary 2017 for DLP
  • 4. © Fidelis Cybersecurity Automate Detection and Response with The Fidelis Elevate™ Platform 4 Accuracy. Clarity. Certainty. • Gain threat visibility into networks, endpoints and cloud environments • See north-south traffic, lateral movement, and traffic going in and out of your network • Automate detection and response to reduce exposure and risk to data • Respond to threats at the endpoint • Mitigate data leakage and exfiltration • Reduce dwell time with an active post- breach defense
  • 5. © Fidelis Cybersecurity Fidelis Network DLP Leadership Rated 4.9 for Network DLP (1-5 scale, 5 the highest rating) “Fidelis Network is one of the most fully featured network DLP products in the enterprise DLP market and operates at speeds of 20 Gbps and above. The strength of this product is its wide range of deployment and throughput options, as well as port and protocol independence, and no reliance on a proxy architecture.” ”Fidelis Network covers a number of DLP detection methods and can also analyze metadata content. Fidelis Network has additional features to better determine malicious content, such as payload analysis and sandboxing of files.” “Fidelis Network CommandPost (K2) is feature-rich, with advanced configuration options, logical event tracking and alert options. Fidelis also offers the capability to split ownership on rules, which can be valuable for change control management of authoring and editing of DLP rules, particularly in very large organizations.” Gartner: Critical Capabilities for Enterprise DLP, Published 10 April 2017 - ID G00308328
  • 6. © Fidelis Cybersecurity Shift to Integrated DLP Solutions By 2022, 60% of organizations will involve line-of-business owners when crafting their data loss prevention (DLP) strategy, up from 15% today. By 2020, 85% of organizations will implement at least one form of integrated DLP, up from 50% today. By 2022, a majority of DLP market revenue will be driven by integrated DLP products, as opposed to enterprise DLP systems. 6 Source - Magic Quadrant for Enterprise Data Loss Prevention, Published 16 February 2017 - ID G00300911 Authors - Brian Reed, Deborah Kish
  • 7. © Fidelis Cybersecurity Integrated DLP 7 Endpoint EDR Network NTA CASB SWG w/ICAP SEG Cloud Platform SaaS Apps Native DLP Features Integrated DLP Compliance IP Data Protection Sensitive Data Use Monitoring Integrated DLP
  • 8. © Fidelis Cybersecurity Analyst Perspective 8 Network Endpoint Cloud Platform SaaS Apps Web, Email & Cloud Gateways Operating Systems Compliance for Data-in-Motion, Final DLP Pass IP Data Protection in Use, On/Off Networks First Pass DLP First Pass DLP First Pass DLP Encryption TLS Encrypted Traffic Visibility Application Conflicts, Feature Parity, Control Factor 28% of 2018 Workload, Trending Down (44% in 2013) 59% of 2018 Workload, Trending Up SWG + ICAP CASB API & Proxy, MTA, Limited Vis. Not Always MS OS and Files NTA Visibility Metadata All Ports & Protocols EDR Visibility Metadata Policy Control & Scripts TAPs coming soon…MS Azure first, then AWS tbd Uniformity Challenge TLS at SWG Data Migration to Cloud DLP needs content & context to determine risk and threats.
  • 9. © Fidelis Cybersecurity DLP + Detection & Response 9 Endpoint EDR Network NTA CASB SWG w/ICAP SEG Cloud Platform SaaS Apps Native DLP Features Integrated DLP Network DLP w/Email & Web Sensors Deep Session Inspection (DSI) Sand Boxing & Payload Analysis ML Anomaly Detection & Threat Intelligence Threat Prevention & Detection Real-time & Retrospective Analysis Metadata
  • 10. © Fidelis Cybersecurity Metadata – Fidelis Collector Have I seen this document of interest on the network before? Query: Search all network sessions for the past three months for my document of interest based on hash, title, author, create date or other attributes. Who else has sent or received this document of interest? Query: Search all network sessions for the past three months for my document of interest based on hash, title, author, create date or other attributes. What other data has this user sent? Query: Map out all data from this user, what was sent and where it went. Where has the phrase “Tractor Beam” been seen on the network within the last month? Tag sessions containing phrase or keywords of interest. Query: Search for tagged sessions. What documents contain specific header/footer text? Query: List all network sessions in the last 30 days that contained a document with a header/footer that contains specific text. 10
  • 11. © Fidelis Cybersecurity Key Requirements OfA Network DLP Solution • Conduct session-level (not packet-level) inspection of network traffic across all 65,535 network ports • Provide network visibility into protocols, channels, and applications in use • Be able to extract enterprise human-readable content and related metadata contained in the session and any attachments and compressed files for analysis • Provide multiple sophisticated content analysis technologies to detect sensitive and/or protected information • Policy engine with rules to determine network sessions that violate policy • Ability to prevent network sessions violating policy across all 65,535 ports. 11
  • 12. © Fidelis Cybersecurity Fidelis Network® 12 Gain visibility into CONTENT over ALL PORTS & PROTOCOLS to DETECT threats and PREVENT data loss.
  • 13. © Fidelis Cybersecurity Fidelis Network® See Deeper into Applications and Content Flowing Over the Network • Patented Deep Session Inspection® as well as Deep Packet Inspection - across all ports and protocols • Capture and store all meta data traffic that is searchable by threat hunters or automated analytics • Automatically decode and analyze traffic to detect and prevent threats as well as unauthorized data transfers Automate Threat Detection and Mitigate Data Theft • Real-time network analysis to uncover initial compromise, suspicious hosts, malware, compromised host • Retroactive analysis against stored meta data based on indicators derived from threat intelligence, machine learning, sandbox results, and Fidelis research • Confirm and stop data theft by content inspection of all outgoing network activity 13
  • 14. © Fidelis Cybersecurity Fidelis Network® Eliminate Alert Fatigue • Automatically validate, correlate, and consolidate network alerts against every endpoint in your network • Suspicious network data, rich content, and files analyzed by multiple defenses, security analytics and rules are included as pre-staged evidence – in one view Respond Faster to Breaches • Gain more context around an investigation with real-time and retrospective analysis across the kill chain to ensure a faster, more effective response Prevent Threats and Data Leakage • Gateway and internal sensor locations allow for the dropping of sessions • Mail sensor allows you to quarantine, drop, re-route and remove attachments • Web sensor enables you to redirect web pages and drop sessions 14
  • 15. © Fidelis Cybersecurity Deep Content Decoding and Analysis Deep, Recursive Content Decoding and Analysis Detects content-level threats that are invisible to other network security systems Able to apply threat intelligence over a larger detection surface 15 Network Packets Session Buffers (RAM) Content Buffers (RAM) Content Buffers (RAM) Non-Selectively “Exploding” Recursively Embedded Content Objects in RAM Session Reassembly Content Decoders and Analyzers Content Decoders and Analyzers Protocol and Application Decoders and Analyzers
  • 16. © Fidelis Cybersecurity Configuration, Investigation, Analysis, Response, Integration Deep Session Inspection® Metadata and Tags D E E P S E S S I O N I N S P E C T I O N ® Content Analysis, Malware Detection Deep Content Decoding Protocol and Application Decoding Full Session Reassembly Real-Time Threat Detection Network Non- Selective Network Memory Fidelis K2 FidelisCollector Fidelis Sensors 16
  • 17. © Fidelis Cybersecurity Deep Content Visibility Visibility into Deeply Embedded Network Content (Inbound and Outbound) 17 PDF DeflateText Malware ExcelText ZIP PPT MIME HTTP Text Gmail Malicious Inbound Content Classified Sensitive Outbound Content
  • 18. © Fidelis Cybersecurity Comprehensive Data Protection Across Different Types of Traffic 18 Fidelis Network Direct Sensor Fidelis Network Mail Sensor Fidelis Network Internal Sensor Fidelis Network Web Sensor Gateway sensor, all port visibility Datacenter sensor, handles SMB, DB transactions Enables graceful quarantine, prevention of email traffic Web traffic only, traffic fed from Proxy via ICAP
  • 19. © Fidelis Cybersecurity Automated Endpoint Validation & Response (With Fidelis Network® Integration) • Highlight the importance of an alert with endpoint activity validation • Automatically prioritize important alerts • Answer critical analytic questions ahead of time (compared to non-validated alerts) • Be certain that the alerts you are looking at are actionable • Automate response with playbooks and rapid, surgical remediation capabilities 19
  • 21. © Fidelis Cybersecurity Questions and Next Steps • Review the Product Web Page & Videos https://www.fidelissecurity.com/products/network • Request a Demonstration • Network: https://www.fidelissecurity.com/products/network/demo • Elevate: www.fidelissecurity.com/products/security-operations-platform/demo • Free Elevate Assessment www.fidelissecurity.com/fidelis-elevate-security-assessment 21