SlideShare una empresa de Scribd logo
1 de 29
GTB DLP Suit
                 Content-aware
                 Security Suite
True DLP for Data Protection

        Uzi Yair May 2012
AGENDA


•   Who we are?
•   What is DLP?
•   Why say we are next generation?
•   Enterprise configuration?
•   How to prevent your data loss?
Who we are?

• Founded: 2005
• Ownership: Private and self funded
• Headquarter: Newport Beach, CA
    – Development in Kiev, Ukraine
    – International Office in Tel Aviv, Taipei, Kuala Lumpur, Tokyo, Kiev
• Security Segment: Data Loss Prevention + EDRM (IRM)
• Target verticals: Financial Institutions, Government, High Tech,
  Healthcare
• Channel Partners: UK, Poland, Slovenia, Turkey, Italy, France,
  Russia, Kenya, Taiwan, Philippines, Singapore, Japan, South
  Korea, Malaysia, Mexico, Romania
• Named Accounts:
    –   Apple Computer
    –   American Greetings
    –   E2V Semi Conductor
    –   Citgo Oil Company
Who we are?


“GTB has primarily focused its efforts on
developing a product with strong
detection capabilities, and continues to
improve the overall user experience. It
has also achieved notable client wins in
the past 12 months, thereby increasing
its overall market presence. “
Gartner DLP MQ 2O11
Awards
What is DLP?
                                           Who sent my data, and…
                                           to who?
                                                         HTTP(S)
   Desktops                                              FTP
   Laptops                     Data in Motion            SMTP
   Network Shares                                        IM
   (NTFS, NFS…)                                          RDP
   SharePoint                                            VNC
   Databases (via ODBC)                                  SSL
                                                         Network Printer
Where is my data?
                                   DATA                  Too many to list here



         Data at Rest                                    Data in Use

                            Cut / Copy
                            Paste                     Set access rights for
                            Print                     data usage
                            Print Screen
                            Access Files
                            Removable Media
What is DLP?
      DLP Answers 5 questions:
                            Desktops
                            Laptops
Where is my data?           Network Shares (NTFS, NFS…)
                            SharePoint
                            Databases

                            Trusted users
                            Intruders
Who is sending my data?     Spyware
                            Viruses

                            PII
                            PHI
What data is sent?          Source Code
                            Intel. Property


                            IP address
Who received my data?       Email destination
                            Geographic location

                            Cut / Copy
                            Paste
                            Print
How do I protect my data?   Print Screen
                            Access Files
                            Removable media
Why is GTB next generation DLP?


                   GTB Inspector for Network




                         GTB Central
  GTB Endpoint                                 GTB eDiscovery
                          Console
    Protector                                    to find your
                         control and
for endpoint end                               sensitive Data at
  device control         monitor all                  Rest
                          behavior


                            GTB IRM
                   Full content-aware Rights
                     Management System
Why is GTB Next Generation DLP?
                                         HTTP(S)
                                         FTP
                                         SMTP
                                         IM
                       Data in Motion    Network Printer
                                         SSL
Desktops                                 RDP
Laptops                                  VNC
Network Shares                           SSH
                                         Webmail
(NTFS, NFS…)                             TCP on all ports
SharePoint                 DATA
Databases (via ODBC)

    Data at Rest                              Data in Use

                                        Cut / Copy
                                        Paste
                                        Print
                                        Print Screen
                                        Access Files
                                        Removable Media
Data Protection Architecture
How to prevent your data loss?


      Support multi-language content
                                                    MTA and Smart Host
                filtering
                                                    Integration with any
            Supports all file types
                                                       external proxy

       Scan ports 0 to 65,535on all                Enforces content-based
              TCP channels                             policies based

            Integrates with SEIM               Alerts violators, Managers


      Scalable with Load Balancing                  SSL Content Filtering

       Redacts text from emails in
                                                       Educates users
                real-time

       Seamless integration with             Quarantines email with user
       email Encryption gateways                    remediation

                                                                   Enforcement
                             Quaranti   Severity
      Log          Block
                               ne        Block
                                                       Pass          actions
How to prevent your data loss?
How to specify/fingerprint files ?




       Controls granularity of detection
                 size in bytes
Customized Policy definitions for
     protecting PII and PHI
Detailed Events Data Forensics
Management Log




        Complete Auditing
How to prevent data loss at the
         Endpoints?


   USB Drives

   iPod, other mp3 players

   CD/DVD

   Firewire

   SD cards

   Floppy drives

   Bluetooth

   Wi-Fi

   Other I/O devices
How to prevent data loss?


                            Endpoint Protector access control


   Active Directory rules                 File rules            Device rules

Entire domain rules             File group rules        Bus type

Group rules                     File type rules         Device type

Computer rules                                          Device drive name

Individual user rules                                   Volume number
How to prevent data loss?


    Endpoint Protector Enforcement actions

BLOCK
LOG
SHADOW
ENCRYPT


            Endpoint Protector reporting
Built in Table reports
Built in Crystal reports
Central Console reports
How to prevent your data loss?



                    Features                                Benefits

  Agent Based solution                      Scans thousands of computers at same
                                            time with no performance degradation

  High performance                          Network friendly
  Protects all file formats (binary/text)   Secures all content including Source
                                            Code, Audio, Video and text files
  Protects database records & fields        Ensures regulatory compliance
  Virtually zero false positive rate        Highest precision
  Insures absence of violations             No false negatives
  Automatic or manual discovery             Non-stop data protection
  Customized data type definition           Discovers data unique to your business
  Unattended operation                      Maintenance free
How to prevent your data loss?]




                                            Different Rights
                             Various            View            Edit          Print     Copy/Paste      Time        Location
                             Users                                                                      Limit

                              USER 1                                                                                Office
                              USER 2                                                                    1-5
                                                                                                        Jan
Usage Rights Matrix
                              USER 3

                              USER 4                                                                                Office
     Examples of protected files                                               Representative form of Usage Rights Matrix


                                                                                                                … & other
                                                                                                                combinations


               View only           View & Edit only
                                                      Seclore Policy Server (PS) only
                                                               View & Distribute          View & Print only
How to prevent data loss?




Unified policies for Network, eDiscovery Endpoint and IRM
GTB Enterprise DLP Suite Solution Matrix
                                                                           GTB         GTB        GTB Rights     GTB      GTB DLP
Feature
                                                                        Inspector   eDiscovery   Management    Endpoint    Suite

Real-time network traffic inspection                                       √                                                √
Sensitive data-at-rest discovery                                                        √            √                      √
Removable devices inspection                                                                         √            √         √
Blocking leakage of the sensitive data                                     √                         √            √         √
Pattern-based inspection                                                   √            √            √            √         √

Structured data inspection (Recursive Transitional Gaps ™ Technology)      √            √            √            √         √

Unstructured data inspection (Recursive Transitional Gaps™
Technology)
                                                                           √            √            √            √         √

SSL/TLS Inspection                                                         √                                                √
Email notification and alerting                                            √            √                         √         √
Active Directory integration                                               √            √            √            √         √
Security data encryption                                                   √            √            √            √         √
Information usage policies support                                                      √            √                      √
Audit of the usage of the information                                                   √            √                      √
Email Encryption                                                           √                                                √
Data classification                                                                     √            √                      √

Antiphishing, Antivirus, spam and malware detection                        √                                                √

Web Filtering                                                              √                                                √
Easy deployment and maintenace                                             √            √                         √         √
Centralized reporting (GTB Central Console)                                √            √                         √         √
The competition?
Others?
Feature / Functionality                                        GTB                                  Websense
Channel coverage -       ability to BLOCK
HTTP Server                                                      √                                        No
HTTP/HTTPS                                                       √                                        √
HTTP Tunnel                                                      √                                        No
FTP                                                              √                                        No
FTP Server                                                       √                                        No
IM                                                               √                                        No
P2P                                                              √                                        No
SMTP Mail                                                        √                                        √
SSL                                                              √                                        No
Unknown Protocols                                                √                                        No
Webmail                                                          √                                        √
SSH                                                              √                                        No
Telenet                                                          √                                        No
SFTP, SSMTP                                                      √                                        No
POP3                                                             √                                        No
Printing                                                         √                                        √
Fingeprinting                                                    √                                        √
Central Policy Console                                           √                                        √
                                            Voltage, Zix, Sophos, Secureworks, Secure
Email Encryption support                    Computing, PostX, Tumbleweed, Symantec, Front Voltage
                                            bridge, Exchange, Positini,Perimeter
Smart Host                                                      √                        unknown
SEIM integration                                                √                                          √
Workflow                                                        √                                          √
ICAP support                                                    √                                          √
                                            TMG, Blue Coat, Ironport, Squid,Webroot,
Proxy support                                                                            TMG, Blue Coat, Squid
                                            Mcafee, others
Endpoint protection                                             √                                          √
eDiscovery                                                      √                                          √
When will you start?




High accuracy of detection and a full range of defense capabilities

              Flexible data manipulation detection

The largest set of protocol support and file format independence

  High efficiency and without interrupting the network status

                 Encryption is no longer an issue

      Comprehensive policy framework for data protection
We are ready when you are!
Live Product Demo
True DLP for Data Protection

Más contenido relacionado

La actualidad más candente

Introducing Data Loss Prevention 14
Introducing Data Loss Prevention 14Introducing Data Loss Prevention 14
Introducing Data Loss Prevention 14Symantec
 
Data Loss Prevention (DLP) - Fundamental Concept - Eryk
Data Loss Prevention (DLP) - Fundamental Concept - ErykData Loss Prevention (DLP) - Fundamental Concept - Eryk
Data Loss Prevention (DLP) - Fundamental Concept - ErykEryk Budi Pratama
 
Microsoft Office 365 Security and Compliance
Microsoft Office 365 Security and ComplianceMicrosoft Office 365 Security and Compliance
Microsoft Office 365 Security and ComplianceDavid J Rosenthal
 
Technology Overview - Symantec Data Loss Prevention (DLP)
Technology Overview - Symantec Data Loss Prevention (DLP)Technology Overview - Symantec Data Loss Prevention (DLP)
Technology Overview - Symantec Data Loss Prevention (DLP)Iftikhar Ali Iqbal
 
Microsoft Information Protection: Your Security and Compliance Framework
Microsoft Information Protection: Your Security and Compliance FrameworkMicrosoft Information Protection: Your Security and Compliance Framework
Microsoft Information Protection: Your Security and Compliance FrameworkAlistair Pugin
 
Protéger ses données avec de la DLP
Protéger ses données avec de la DLPProtéger ses données avec de la DLP
Protéger ses données avec de la DLPMarc Rousselet
 
Microsoft Azure Information Protection
Microsoft Azure Information Protection Microsoft Azure Information Protection
Microsoft Azure Information Protection Syed Sabhi Haider
 
Cyber threat intelligence ppt
Cyber threat intelligence pptCyber threat intelligence ppt
Cyber threat intelligence pptKumar Gaurav
 
Azure Information Protection
Azure Information ProtectionAzure Information Protection
Azure Information ProtectionRobert Crane
 
Data Loss Prevention from Symantec
Data Loss Prevention from SymantecData Loss Prevention from Symantec
Data Loss Prevention from SymantecArrow ECS UK
 
ATTACKers Think in Graphs: Building Graphs for Threat Intelligence
ATTACKers Think in Graphs: Building Graphs for Threat IntelligenceATTACKers Think in Graphs: Building Graphs for Threat Intelligence
ATTACKers Think in Graphs: Building Graphs for Threat IntelligenceMITRE - ATT&CKcon
 
DLP Executive Overview
DLP Executive OverviewDLP Executive Overview
DLP Executive OverviewKim Jensen
 
DLP Data leak prevention
DLP Data leak preventionDLP Data leak prevention
DLP Data leak preventionAriel Evans
 
Overview of Data Loss Prevention Policies in Office 365
Overview of Data Loss Prevention Policies in Office 365Overview of Data Loss Prevention Policies in Office 365
Overview of Data Loss Prevention Policies in Office 365Dock 365
 
Cybersecurity for dummies
Cybersecurity for dummiesCybersecurity for dummies
Cybersecurity for dummiesPaulo R
 
MITRE ATT&CKcon 2018: ATT&CK as a Teacher, Travis Smith, Tripwire
MITRE ATT&CKcon 2018: ATT&CK as a Teacher, Travis Smith, TripwireMITRE ATT&CKcon 2018: ATT&CK as a Teacher, Travis Smith, Tripwire
MITRE ATT&CKcon 2018: ATT&CK as a Teacher, Travis Smith, TripwireMITRE - ATT&CKcon
 

La actualidad más candente (20)

Introducing Data Loss Prevention 14
Introducing Data Loss Prevention 14Introducing Data Loss Prevention 14
Introducing Data Loss Prevention 14
 
Data Loss Prevention (DLP) - Fundamental Concept - Eryk
Data Loss Prevention (DLP) - Fundamental Concept - ErykData Loss Prevention (DLP) - Fundamental Concept - Eryk
Data Loss Prevention (DLP) - Fundamental Concept - Eryk
 
Microsoft Office 365 Security and Compliance
Microsoft Office 365 Security and ComplianceMicrosoft Office 365 Security and Compliance
Microsoft Office 365 Security and Compliance
 
Technology Overview - Symantec Data Loss Prevention (DLP)
Technology Overview - Symantec Data Loss Prevention (DLP)Technology Overview - Symantec Data Loss Prevention (DLP)
Technology Overview - Symantec Data Loss Prevention (DLP)
 
Microsoft Information Protection: Your Security and Compliance Framework
Microsoft Information Protection: Your Security and Compliance FrameworkMicrosoft Information Protection: Your Security and Compliance Framework
Microsoft Information Protection: Your Security and Compliance Framework
 
Protéger ses données avec de la DLP
Protéger ses données avec de la DLPProtéger ses données avec de la DLP
Protéger ses données avec de la DLP
 
Microsoft Azure Information Protection
Microsoft Azure Information Protection Microsoft Azure Information Protection
Microsoft Azure Information Protection
 
Cyber threat intelligence ppt
Cyber threat intelligence pptCyber threat intelligence ppt
Cyber threat intelligence ppt
 
Azure information protection
Azure information protectionAzure information protection
Azure information protection
 
Azure Information Protection
Azure Information ProtectionAzure Information Protection
Azure Information Protection
 
Data Loss Prevention from Symantec
Data Loss Prevention from SymantecData Loss Prevention from Symantec
Data Loss Prevention from Symantec
 
ATTACKers Think in Graphs: Building Graphs for Threat Intelligence
ATTACKers Think in Graphs: Building Graphs for Threat IntelligenceATTACKers Think in Graphs: Building Graphs for Threat Intelligence
ATTACKers Think in Graphs: Building Graphs for Threat Intelligence
 
Data loss prevention (dlp)
Data loss prevention (dlp)Data loss prevention (dlp)
Data loss prevention (dlp)
 
DLP Executive Overview
DLP Executive OverviewDLP Executive Overview
DLP Executive Overview
 
DLP Data leak prevention
DLP Data leak preventionDLP Data leak prevention
DLP Data leak prevention
 
DLP
DLPDLP
DLP
 
FireEye Portfolio
FireEye PortfolioFireEye Portfolio
FireEye Portfolio
 
Overview of Data Loss Prevention Policies in Office 365
Overview of Data Loss Prevention Policies in Office 365Overview of Data Loss Prevention Policies in Office 365
Overview of Data Loss Prevention Policies in Office 365
 
Cybersecurity for dummies
Cybersecurity for dummiesCybersecurity for dummies
Cybersecurity for dummies
 
MITRE ATT&CKcon 2018: ATT&CK as a Teacher, Travis Smith, Tripwire
MITRE ATT&CKcon 2018: ATT&CK as a Teacher, Travis Smith, TripwireMITRE ATT&CKcon 2018: ATT&CK as a Teacher, Travis Smith, Tripwire
MITRE ATT&CKcon 2018: ATT&CK as a Teacher, Travis Smith, Tripwire
 

Similar a True DLP for Data Protection

Gtb Product Technical Present
Gtb Product Technical PresentGtb Product Technical Present
Gtb Product Technical Presentgtbsalesindia
 
Solving the Really Big Tech Problems with IoT
 Solving the Really Big Tech Problems with IoT Solving the Really Big Tech Problems with IoT
Solving the Really Big Tech Problems with IoTEric Kavanagh
 
Gtb Technology Review Can Your Dlp Provider Protect You From The Cloud
Gtb Technology Review   Can Your Dlp Provider Protect You From The CloudGtb Technology Review   Can Your Dlp Provider Protect You From The Cloud
Gtb Technology Review Can Your Dlp Provider Protect You From The Cloudgtbsalesindia
 
Risk Factory: PCI Shrink to Fit
Risk Factory: PCI Shrink to FitRisk Factory: PCI Shrink to Fit
Risk Factory: PCI Shrink to FitRisk Crew
 
Insights Into Modern Day Threat Protection
Insights Into Modern Day Threat ProtectionInsights Into Modern Day Threat Protection
Insights Into Modern Day Threat ProtectionAbhinav Biswas
 
Microsoft Platform Security Briefing
Microsoft Platform Security BriefingMicrosoft Platform Security Briefing
Microsoft Platform Security Briefingtechnext1
 
Security Delivery Platform: Best practices
Security Delivery Platform: Best practicesSecurity Delivery Platform: Best practices
Security Delivery Platform: Best practicesMihajlo Prerad
 
Risk Factory: Database Security: Oxymoron?
Risk Factory: Database Security: Oxymoron? Risk Factory: Database Security: Oxymoron?
Risk Factory: Database Security: Oxymoron? Risk Crew
 
dlp-sales-play-sales-customer-deck-2022.pptx
dlp-sales-play-sales-customer-deck-2022.pptxdlp-sales-play-sales-customer-deck-2022.pptx
dlp-sales-play-sales-customer-deck-2022.pptxalex hincapie
 
Risk Factory: Beyond Data Leakage
Risk Factory: Beyond Data LeakageRisk Factory: Beyond Data Leakage
Risk Factory: Beyond Data LeakageRisk Crew
 
Using Hard Disk Encryption and Novell SecureLogin
Using Hard Disk Encryption and Novell SecureLoginUsing Hard Disk Encryption and Novell SecureLogin
Using Hard Disk Encryption and Novell SecureLoginNovell
 
Microsoft IoT Security @ Xpand:X:ED Meetup Sydney Feb 2016
Microsoft IoT Security @ Xpand:X:ED Meetup Sydney Feb 2016Microsoft IoT Security @ Xpand:X:ED Meetup Sydney Feb 2016
Microsoft IoT Security @ Xpand:X:ED Meetup Sydney Feb 2016David Glover
 
Utilisation du cloud dans les systèmes intelligent
Utilisation du cloud dans les systèmes intelligentUtilisation du cloud dans les systèmes intelligent
Utilisation du cloud dans les systèmes intelligentMicrosoft Technet France
 
How a Cloud Computing Provider Reached the Holy Grail of Visibility
How a Cloud Computing Provider Reached the Holy Grail of VisibilityHow a Cloud Computing Provider Reached the Holy Grail of Visibility
How a Cloud Computing Provider Reached the Holy Grail of Visibilityeladgotfrid
 
Modern Cyber Threat Protection techniques for Enterprises
Modern Cyber Threat Protection techniques for EnterprisesModern Cyber Threat Protection techniques for Enterprises
Modern Cyber Threat Protection techniques for EnterprisesAbhinav Biswas
 
AD_FTKX_BRO_ENG_19Nov2014
AD_FTKX_BRO_ENG_19Nov2014AD_FTKX_BRO_ENG_19Nov2014
AD_FTKX_BRO_ENG_19Nov2014Leonard Cibelli
 

Similar a True DLP for Data Protection (20)

Gtb Product Technical Present
Gtb Product Technical PresentGtb Product Technical Present
Gtb Product Technical Present
 
Vormetric - Gherkin Event
Vormetric - Gherkin EventVormetric - Gherkin Event
Vormetric - Gherkin Event
 
Introduction
IntroductionIntroduction
Introduction
 
Solving the Really Big Tech Problems with IoT
 Solving the Really Big Tech Problems with IoT Solving the Really Big Tech Problems with IoT
Solving the Really Big Tech Problems with IoT
 
Gtb Technology Review Can Your Dlp Provider Protect You From The Cloud
Gtb Technology Review   Can Your Dlp Provider Protect You From The CloudGtb Technology Review   Can Your Dlp Provider Protect You From The Cloud
Gtb Technology Review Can Your Dlp Provider Protect You From The Cloud
 
Risk Factory: PCI Shrink to Fit
Risk Factory: PCI Shrink to FitRisk Factory: PCI Shrink to Fit
Risk Factory: PCI Shrink to Fit
 
2012 Data Center Security
2012 Data Center Security2012 Data Center Security
2012 Data Center Security
 
Insights Into Modern Day Threat Protection
Insights Into Modern Day Threat ProtectionInsights Into Modern Day Threat Protection
Insights Into Modern Day Threat Protection
 
Microsoft Platform Security Briefing
Microsoft Platform Security BriefingMicrosoft Platform Security Briefing
Microsoft Platform Security Briefing
 
Security Delivery Platform: Best practices
Security Delivery Platform: Best practicesSecurity Delivery Platform: Best practices
Security Delivery Platform: Best practices
 
Risk Factory: Database Security: Oxymoron?
Risk Factory: Database Security: Oxymoron? Risk Factory: Database Security: Oxymoron?
Risk Factory: Database Security: Oxymoron?
 
dlp-sales-play-sales-customer-deck-2022.pptx
dlp-sales-play-sales-customer-deck-2022.pptxdlp-sales-play-sales-customer-deck-2022.pptx
dlp-sales-play-sales-customer-deck-2022.pptx
 
Risk Factory: Beyond Data Leakage
Risk Factory: Beyond Data LeakageRisk Factory: Beyond Data Leakage
Risk Factory: Beyond Data Leakage
 
Using Hard Disk Encryption and Novell SecureLogin
Using Hard Disk Encryption and Novell SecureLoginUsing Hard Disk Encryption and Novell SecureLogin
Using Hard Disk Encryption and Novell SecureLogin
 
Microsoft IoT Security @ Xpand:X:ED Meetup Sydney Feb 2016
Microsoft IoT Security @ Xpand:X:ED Meetup Sydney Feb 2016Microsoft IoT Security @ Xpand:X:ED Meetup Sydney Feb 2016
Microsoft IoT Security @ Xpand:X:ED Meetup Sydney Feb 2016
 
Cloud desktop for byod
Cloud desktop for byodCloud desktop for byod
Cloud desktop for byod
 
Utilisation du cloud dans les systèmes intelligent
Utilisation du cloud dans les systèmes intelligentUtilisation du cloud dans les systèmes intelligent
Utilisation du cloud dans les systèmes intelligent
 
How a Cloud Computing Provider Reached the Holy Grail of Visibility
How a Cloud Computing Provider Reached the Holy Grail of VisibilityHow a Cloud Computing Provider Reached the Holy Grail of Visibility
How a Cloud Computing Provider Reached the Holy Grail of Visibility
 
Modern Cyber Threat Protection techniques for Enterprises
Modern Cyber Threat Protection techniques for EnterprisesModern Cyber Threat Protection techniques for Enterprises
Modern Cyber Threat Protection techniques for Enterprises
 
AD_FTKX_BRO_ENG_19Nov2014
AD_FTKX_BRO_ENG_19Nov2014AD_FTKX_BRO_ENG_19Nov2014
AD_FTKX_BRO_ENG_19Nov2014
 

Último

Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilV3cube
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 

Último (20)

Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 

True DLP for Data Protection

  • 1. GTB DLP Suit Content-aware Security Suite True DLP for Data Protection Uzi Yair May 2012
  • 2. AGENDA • Who we are? • What is DLP? • Why say we are next generation? • Enterprise configuration? • How to prevent your data loss?
  • 3. Who we are? • Founded: 2005 • Ownership: Private and self funded • Headquarter: Newport Beach, CA – Development in Kiev, Ukraine – International Office in Tel Aviv, Taipei, Kuala Lumpur, Tokyo, Kiev • Security Segment: Data Loss Prevention + EDRM (IRM) • Target verticals: Financial Institutions, Government, High Tech, Healthcare • Channel Partners: UK, Poland, Slovenia, Turkey, Italy, France, Russia, Kenya, Taiwan, Philippines, Singapore, Japan, South Korea, Malaysia, Mexico, Romania • Named Accounts: – Apple Computer – American Greetings – E2V Semi Conductor – Citgo Oil Company
  • 4. Who we are? “GTB has primarily focused its efforts on developing a product with strong detection capabilities, and continues to improve the overall user experience. It has also achieved notable client wins in the past 12 months, thereby increasing its overall market presence. “ Gartner DLP MQ 2O11
  • 6. What is DLP? Who sent my data, and… to who? HTTP(S) Desktops FTP Laptops Data in Motion SMTP Network Shares IM (NTFS, NFS…) RDP SharePoint VNC Databases (via ODBC) SSL Network Printer Where is my data? DATA Too many to list here Data at Rest Data in Use Cut / Copy Paste Set access rights for Print data usage Print Screen Access Files Removable Media
  • 7. What is DLP? DLP Answers 5 questions: Desktops Laptops Where is my data? Network Shares (NTFS, NFS…) SharePoint Databases Trusted users Intruders Who is sending my data? Spyware Viruses PII PHI What data is sent? Source Code Intel. Property IP address Who received my data? Email destination Geographic location Cut / Copy Paste Print How do I protect my data? Print Screen Access Files Removable media
  • 8. Why is GTB next generation DLP? GTB Inspector for Network GTB Central GTB Endpoint GTB eDiscovery Console Protector to find your control and for endpoint end sensitive Data at device control monitor all Rest behavior GTB IRM Full content-aware Rights Management System
  • 9. Why is GTB Next Generation DLP? HTTP(S) FTP SMTP IM Data in Motion Network Printer SSL Desktops RDP Laptops VNC Network Shares SSH Webmail (NTFS, NFS…) TCP on all ports SharePoint DATA Databases (via ODBC) Data at Rest Data in Use Cut / Copy Paste Print Print Screen Access Files Removable Media
  • 11. How to prevent your data loss? Support multi-language content MTA and Smart Host filtering Integration with any Supports all file types external proxy Scan ports 0 to 65,535on all Enforces content-based TCP channels policies based Integrates with SEIM Alerts violators, Managers Scalable with Load Balancing SSL Content Filtering Redacts text from emails in Educates users real-time Seamless integration with Quarantines email with user email Encryption gateways remediation Enforcement Quaranti Severity Log Block ne Block Pass actions
  • 12. How to prevent your data loss?
  • 13. How to specify/fingerprint files ? Controls granularity of detection size in bytes
  • 14. Customized Policy definitions for protecting PII and PHI
  • 15. Detailed Events Data Forensics
  • 16. Management Log Complete Auditing
  • 17. How to prevent data loss at the Endpoints? USB Drives iPod, other mp3 players CD/DVD Firewire SD cards Floppy drives Bluetooth Wi-Fi Other I/O devices
  • 18. How to prevent data loss? Endpoint Protector access control Active Directory rules File rules Device rules Entire domain rules File group rules Bus type Group rules File type rules Device type Computer rules Device drive name Individual user rules Volume number
  • 19. How to prevent data loss? Endpoint Protector Enforcement actions BLOCK LOG SHADOW ENCRYPT Endpoint Protector reporting Built in Table reports Built in Crystal reports Central Console reports
  • 20. How to prevent your data loss? Features Benefits Agent Based solution Scans thousands of computers at same time with no performance degradation High performance Network friendly Protects all file formats (binary/text) Secures all content including Source Code, Audio, Video and text files Protects database records & fields Ensures regulatory compliance Virtually zero false positive rate Highest precision Insures absence of violations No false negatives Automatic or manual discovery Non-stop data protection Customized data type definition Discovers data unique to your business Unattended operation Maintenance free
  • 21. How to prevent your data loss?] Different Rights Various View Edit Print Copy/Paste Time Location Users Limit USER 1 Office USER 2 1-5 Jan Usage Rights Matrix USER 3 USER 4 Office Examples of protected files Representative form of Usage Rights Matrix … & other combinations View only View & Edit only Seclore Policy Server (PS) only View & Distribute View & Print only
  • 22. How to prevent data loss? Unified policies for Network, eDiscovery Endpoint and IRM
  • 23. GTB Enterprise DLP Suite Solution Matrix GTB GTB GTB Rights GTB GTB DLP Feature Inspector eDiscovery Management Endpoint Suite Real-time network traffic inspection √ √ Sensitive data-at-rest discovery √ √ √ Removable devices inspection √ √ √ Blocking leakage of the sensitive data √ √ √ √ Pattern-based inspection √ √ √ √ √ Structured data inspection (Recursive Transitional Gaps ™ Technology) √ √ √ √ √ Unstructured data inspection (Recursive Transitional Gaps™ Technology) √ √ √ √ √ SSL/TLS Inspection √ √ Email notification and alerting √ √ √ √ Active Directory integration √ √ √ √ √ Security data encryption √ √ √ √ √ Information usage policies support √ √ √ Audit of the usage of the information √ √ √ Email Encryption √ √ Data classification √ √ √ Antiphishing, Antivirus, spam and malware detection √ √ Web Filtering √ √ Easy deployment and maintenace √ √ √ √ Centralized reporting (GTB Central Console) √ √ √ √
  • 25. Others? Feature / Functionality GTB Websense Channel coverage - ability to BLOCK HTTP Server √ No HTTP/HTTPS √ √ HTTP Tunnel √ No FTP √ No FTP Server √ No IM √ No P2P √ No SMTP Mail √ √ SSL √ No Unknown Protocols √ No Webmail √ √ SSH √ No Telenet √ No SFTP, SSMTP √ No POP3 √ No Printing √ √ Fingeprinting √ √ Central Policy Console √ √ Voltage, Zix, Sophos, Secureworks, Secure Email Encryption support Computing, PostX, Tumbleweed, Symantec, Front Voltage bridge, Exchange, Positini,Perimeter Smart Host √ unknown SEIM integration √ √ Workflow √ √ ICAP support √ √ TMG, Blue Coat, Ironport, Squid,Webroot, Proxy support TMG, Blue Coat, Squid Mcafee, others Endpoint protection √ √ eDiscovery √ √
  • 26. When will you start? High accuracy of detection and a full range of defense capabilities Flexible data manipulation detection The largest set of protocol support and file format independence High efficiency and without interrupting the network status Encryption is no longer an issue Comprehensive policy framework for data protection
  • 27. We are ready when you are!