Publicidad

dataProtection_p3.ppt

8 de Feb de 2023
Publicidad

Más contenido relacionado

Publicidad

dataProtection_p3.ppt

  1. Sophos Safeguard Enterprise: A Solution for Data Protection Presented by: W3(cube) 1
  2. Problem statement Threat of Data theft or exposure from lost, stolen, or inappropriate decommissioned laptops. 2
  3. What is security? “In the real world, security involves processes. It involves preventative technologies, but also detection and reaction processes, and an entire forensic system to hunt down and prosecute the guilty. Security is not a product; it itself is a process…..” Bruce Shneiner (Secrets and Lies, Wiley and Sons, Inc.) 3
  4. Challenges to achieving laptop security • Cost • User negligence/sabotage of security measures • Increased value of information • Increase in access to computers =increased hackers not limited by time and space 4
  5. The Threat to Data is Real!! 5
  6. A Perspective on Laptop Theft and Data Loss • Laptop theft and data loss are escalating concerns for companies of all sizes - from Fortune 500 level to small-to-medium sized businesses - and according to the FBI, 97% of stolen laptops are never recovered. • As employees become increasingly more mobile and rely on multiple mobile devices from laptops, smartphones and iPads to conduct business, crimes associated with these devices are also on the rise. Malicious insiders as well as outside culprits are increasingly becoming more innovative and inventive in finding ways to steal valuable information and proprietary data from company and employee mobile devices and laptops that don't have appropriate endpoint security. Source: http://www.bizjournals.com/losangeles/prnewswire/press_releases/California/2011/11/07/LA00777 Los Angeles Business: Awareness Technologies Security Advisory: Top tips to prevent laptop theft (Nov 7, 2011) 6
  7. Myths on data security The field of data security is rife with mistaken beliefs which cause people to design ineffective security solutions. Here are some of the most prevalent security myths: Myth: Hackers cause most security breaches. • In fact, 80% of data loss is to caused by insiders. Myth: Encryption makes your data secure. • In fact, encryption is only one approach to securing data. Security also requires access control, data integrity, system availability, and auditing. Myth: Firewalls make your data secure. • In fact, 40% of Internet break-ins occur in spite of a firewall being in place. http://Data Security Challenges:Oracle9i Security Overview To design an effective security solution you must understand the security requirements scope of current threats to your data. 7
  8. Four Elements of an Effective Data Loss Prevention Strategy Effective Data Loss Prevention Strategy (DLP) Control User Environment by restricting data exit points Protect confidential and sensitive information Classify intellectual property and sensitive business data Prevent leakage of personal identifiable information • Control devices, applications, email and web usage • Ensure security policy compliance • Full disk, removable storage and file encryption • Email encryption • Comprehensive coverage of personally identifiable information types • Continuously assess, audit, report and enforce on endpoint and gateway • Empower knowledge workers to classify sensitive business data • Apply classification to existing documents and data sets Source: Sophos / Utimaco Data Loss Prevention by Peter Szendröi, SOPHOS Nordics(Jan 20, 2010) page 10 8
  9. Top IT Security Solutions Organizations are using Source: Harris Interactive: IT Security Final Report July 2011 9
  10. Agreement with Statement about currently available IT security Solutions Source: Harris Interactive: IT Security Final Report July 2011 10
  11. Solution Sophos Safeguard Enterprise 11
  12. Overall Cascadia Lab’s Summary comparison " [McAfee 8.7i] provides only basic device control and was slow in our performance testing. " " [Sophos 9.0] combines ease of use with excellent performance and very good support. It's the only product in the group to integrate data loss prevention capabilities" " [Symantec 11] delivered a solid experience from the start and provides robust policy management and reporting. Tech support, however, was very disappointing" " [Trend Micro 10] has too many confusing components, making for difficult installation and policy management. " http://www.sophos.com/en-us/security-news- trends/security-trends/enterprise-review.aspx - comparison 12
  13. Comparison of key solution providers in the market today by category Source: Cascadia Labs: Comparative Review of Endpoint Security for Enterprises Comparative review Link 13
  14. SC Magazine Awards 2011 Best Mobile/Portable Device Security • Good Technology for Good for Enterprise • IronKey for IronKey Enterprise • McAfee for McAfee Enterprise Mobility Management (McAfee EMM) • Sophos for Sophos SafeGuard Enterprise • Symantec for Symantec Endpoint Protection Mobile Edition Best Endpoint/UTM Security • Check Point Software Technologies for Check Point UTM-1 • McAfee for McAfee Total Protection for Endpoint, Enterprise Edition • SonicWALL for SonicWALL E-Class Network Security Appliance (NSA) E8500 • Sophos for Sophos Endpoint Security and Data Protection • Symantec for Symantec Endpoint Protection 11.0 SC Awards 2011 14
  15. Sophos as a solution Component Details Management Center Implements and enforces a common, organization-wide security policy framework with a central point of management control in mixed IT environments. Device Encryption •Transparent full-disk encryption (30% faster than competitors) •Can run & manage Opal, BitLocker, Windows 7, Vista, XP and virtual desktops from one central management console •Fast initial encryption algorithm •Recovery options when helpdesk can not be reached •Enables pre-boot user authentication •Provides single sign-on (SSO) for encryption and operating system Data Exchange •Easy user sharing of encrypted data across organization • Secure file and email attachment sharing •Centralizes key management •Offers removable media white listing for easier encryption management Configuration Protection •Detects and restricts use of devices plugged into the computer by type, model, or even serial number •Monitors traffic •Blocks or allows use of PC ports •Easy to use reporting and audit functionality Partner Connect •Ease of administration with help of cross-platform management console •Assures compliance with centralized log reports for audit & legal requirements •Provides full transparency to data protection across the enterprise •Features key back-up and emergency mechanisms for easy recovery. Disadvantages • It lacks the granular reporting capabilities some administrators will demand. • Firewall requires a little customizing before deployment. • Purchase of bundled suite and ability to choose vendors for different services Sophos is a series of software based components that comprise and entire suite 15
  16. Case Study – Financial & Legal – Company spotlight & Problem Statement Raymond James Financial Raymond James needed robust data control and a centralized view of the risks and threats that were impacting its infrastructure. Choosing Sophos led to simple but comprehensive data and threat protection, improved IT efficiency and a lower TCO http://www.sophos.com/en-us/your- needs/case-studies/financial.aspx 16
  17. Case Study – Government Company spotlight & Problem Statement InTact InTACT deployed Sophos Anti-Virus (part of Endpoint Security and Control) on more than 10,000 computers in the Australian Capital Territory's government departments, agencies and hospitals. Technical excellence and low resource usage were deciding factors in choosing Sophos. http://www.sophos.com/en-us/your- needs/case-studies/government.aspx 17
  18. SC Magazine Awards 2011 Best Mobile/Portable Device Security • Good Technology for Good for Enterprise • IronKey for IronKey Enterprise • McAfee for McAfee Enterprise Mobility Management (McAfee EMM) • Sophos for Sophos SafeGuard Enterprise • Symantec for Symantec Endpoint Protection Mobile Edition Best Endpoint/UTM Security • Check Point Software Technologies for Check Point UTM-1 • McAfee for McAfee Total Protection for Endpoint, Enterprise Edition • SonicWALL for SonicWALL E-Class Network Security Appliance (NSA) E8500 • Sophos for Sophos Endpoint Security and Data Protection • Symantec for Symantec Endpoint Protection 11.0 SC Awards 2011 18
  19. Analysis of Total Cost of Ownership (TCO) • 9 companies interviewed in-depth and costs analyzed: • Amica Life Insurance • Lincoln Public Schools • AW Chestern • British Services Company • Central Ohio Primary Care Physicians • US Healthcare Provider • CGh Medical Center • Germany Company • Escabia County School District 19
  20. Sample Vendor Vs. Sophos: Cost Savings Analysis Over a 5 Year Period Source: Business Trends “A Strategic Overview Featuring Gartner Content” Featuring: A Buyers Guide to End Point Protection Programs (May 2009) * The costs were calculated based on licensing, infrastructure and operational data provided by the companies interviewed *Analysis shows significant savings of $420K can be experienced for switching to and managing Sophos end point and security over a 5 Year period • Total cost for Sophos = $880K • Total cost for sample company =$1.3M 20
  21. Sample Vendor Vs. Sophos: Extent of Cost Category to Total Cost Source: Business Trends “A Strategic Overview Featuring Gartner Content” Featuring: A Buyers Guide to End Point Protection Programs (May 2009) * The costs were calculated based on licensing, infrastructure and operational data provided by the companies interviewed *Analysis shows significant savings of $420K can be experienced by switching to and managing Sophos end point and security over a 5 Year period • Represents largest cost at of the TCO 21
  22. Snapshot of Voice of the Sophos End Point Security Customer Source: Business Trends “A Strategic Overview Featuring Gartner Content” Featuring: A Buyers Guide to End Point Protection Programs (May 2009) Sophos offers a cost effective, easy to deploy/use, flexible with proven data loss prevention capabilities “Sophos was the only tool that did not care if clients are Macs or PCs, It was the only cross platform solution at the time” – Director of Technology Lincoln Public Schools “Sophos has saved me a lot of time with their administrative tools. The deployment is easier and I’ve been impressed with the client removal tool, it removes Symantec very well” – IT Manager CGH Medical Center “The high volume of calls to our IT department with McAfee was one of the key reasons we switched to Sophos” – Head of Global System& Security Solutions, German Company McAfee proved to be more expensive from the point of view that it charged for every module. When we reviewed Sophos it was al part of one purchase and the price was less than for McAfee” – Technical Services Manager, British Services Company “The Sophos Console provides a snapshot of what’s going on at a glance. Symantec is definitely not easy to use. We need to see at a glance if there is something wrong” - Technical & Operations Security Administrator US Health Care Provider 22
  23. Back up Slides Diagram Source: Sophos / Utimaco Data Loss Prevention by Peter Szendröi, SOPHOS Nordics(Jan 20, 2010) page 2 In Closing…. Sophos, Simply Secure An organization’s risk of threat of Data theft or exposure from lost, stolen, or inappropriately decommissioned laptops is greatly reduced with Sophos end point security protection. However, Organizations must remain proactive and vigilant and constantly review products & services to meet increasingly sophisticated threats of data theft. 23
Publicidad