Problem statement
Threat of Data theft or exposure from
lost, stolen, or inappropriate
decommissioned laptops.
2
What is security?
“In the real world, security involves processes. It
involves preventative technologies, but also
detection and reaction processes, and an entire
forensic system to hunt down and prosecute
the guilty. Security is not a product; it itself is a
process…..”
Bruce Shneiner (Secrets and Lies, Wiley and Sons, Inc.)
3
Challenges to achieving laptop security
• Cost
• User negligence/sabotage of security
measures
• Increased value of information
• Increase in access to computers =increased
hackers not limited by time and space
4
A Perspective on Laptop Theft and
Data Loss
• Laptop theft and data loss are escalating concerns for companies of
all sizes - from Fortune 500 level to small-to-medium sized
businesses - and according to the FBI, 97% of stolen laptops are
never recovered.
• As employees become increasingly more mobile and rely on
multiple mobile devices from laptops, smartphones and iPads to
conduct business, crimes associated with these devices are also on
the rise. Malicious insiders as well as outside culprits are
increasingly becoming more innovative and inventive in finding
ways to steal valuable information and proprietary data from
company and employee mobile devices and laptops that don't have
appropriate endpoint security.
Source: http://www.bizjournals.com/losangeles/prnewswire/press_releases/California/2011/11/07/LA00777
Los Angeles Business: Awareness Technologies Security Advisory: Top tips to prevent laptop theft (Nov 7, 2011)
6
Myths on data security
The field of data security is rife with mistaken beliefs which
cause people to design ineffective security solutions. Here are
some of the most prevalent security myths:
Myth: Hackers cause most security breaches.
• In fact, 80% of data loss is to caused by insiders.
Myth: Encryption makes your data secure.
• In fact, encryption is only one approach to securing data.
Security also requires access control, data integrity, system
availability, and auditing.
Myth: Firewalls make your data secure.
• In fact, 40% of Internet break-ins occur in spite of a firewall
being in place.
http://Data Security Challenges:Oracle9i Security
Overview
To design an effective security solution you must understand the security requirements scope of
current threats to your data.
7
Four Elements of an Effective Data Loss
Prevention Strategy
Effective Data
Loss
Prevention
Strategy (DLP)
Control User
Environment
by restricting
data exit
points
Protect
confidential
and sensitive
information
Classify
intellectual
property and
sensitive
business data
Prevent
leakage of
personal
identifiable
information
• Control devices, applications,
email and web usage
• Ensure security policy
compliance
• Full disk, removable
storage and file
encryption
• Email encryption
• Comprehensive coverage
of personally identifiable
information types
• Continuously assess, audit,
report and enforce on
endpoint and gateway
• Empower knowledge
workers to classify
sensitive business data
• Apply classification to
existing documents and
data sets
Source: Sophos / Utimaco Data Loss Prevention by Peter Szendröi, SOPHOS
Nordics(Jan 20, 2010) page 10
8
Top IT Security Solutions Organizations
are using
Source: Harris Interactive: IT Security Final Report
July 2011
9
Agreement with Statement about
currently available IT security Solutions
Source: Harris Interactive: IT Security Final Report
July 2011
10
Overall Cascadia Lab’s Summary
comparison
" [McAfee 8.7i]
provides only
basic device
control and
was slow in
our
performance
testing. "
" [Sophos 9.0]
combines ease
of use with
excellent
performance
and very good
support. It's
the only
product in the
group to
integrate data
loss prevention
capabilities"
" [Symantec
11] delivered a
solid
experience
from the start
and provides
robust policy
management
and reporting.
Tech support,
however, was
very
disappointing"
" [Trend Micro
10] has too
many
confusing
components,
making for
difficult
installation and
policy
management.
"
http://www.sophos.com/en-us/security-news-
trends/security-trends/enterprise-review.aspx -
comparison
12
Comparison of key solution providers
in the market today by category
Source: Cascadia Labs: Comparative Review of Endpoint Security for
Enterprises Comparative review Link
13
SC Magazine Awards 2011
Best Mobile/Portable Device Security
• Good Technology for Good for Enterprise
• IronKey for IronKey Enterprise
• McAfee for McAfee Enterprise Mobility Management (McAfee EMM)
• Sophos for Sophos SafeGuard Enterprise
• Symantec for Symantec Endpoint Protection Mobile Edition
Best Endpoint/UTM Security
• Check Point Software Technologies for Check Point UTM-1
• McAfee for McAfee Total Protection for Endpoint, Enterprise Edition
• SonicWALL for SonicWALL E-Class Network Security Appliance (NSA) E8500
• Sophos for Sophos Endpoint Security and Data Protection
• Symantec for Symantec Endpoint Protection 11.0
SC Awards 2011
14
Sophos as a solution
Component Details
Management Center Implements and enforces a common, organization-wide security policy framework with a central point of
management control in mixed IT environments.
Device Encryption •Transparent full-disk encryption (30% faster than competitors)
•Can run & manage Opal, BitLocker, Windows 7, Vista, XP and virtual desktops from one central
management console
•Fast initial encryption algorithm
•Recovery options when helpdesk can not be reached
•Enables pre-boot user authentication
•Provides single sign-on (SSO) for encryption and operating system
Data Exchange •Easy user sharing of encrypted data across organization
• Secure file and email attachment sharing
•Centralizes key management
•Offers removable media white listing for easier encryption management
Configuration Protection •Detects and restricts use of devices plugged into the computer by type, model, or even serial number
•Monitors traffic
•Blocks or allows use of PC ports
•Easy to use reporting and audit functionality
Partner Connect •Ease of administration with help of cross-platform management console
•Assures compliance with centralized log reports for audit & legal requirements
•Provides full transparency to data protection across the enterprise
•Features key back-up and emergency mechanisms for easy recovery.
Disadvantages
• It lacks the granular reporting capabilities some administrators will demand.
• Firewall requires a little customizing before deployment.
• Purchase of bundled suite and ability to choose vendors for different services
Sophos is a series of software based components that comprise and entire suite
15
Case Study – Financial & Legal –
Company spotlight & Problem Statement
Raymond James Financial
Raymond James needed robust data control and a centralized view of the risks and threats that were impacting its infrastructure. Choosing
Sophos led to simple but comprehensive data and threat protection, improved IT efficiency and a lower TCO
http://www.sophos.com/en-us/your-
needs/case-studies/financial.aspx
16
Case Study – Government
Company spotlight & Problem Statement
InTact
InTACT deployed Sophos Anti-Virus (part of Endpoint Security and Control) on more than 10,000 computers in the Australian Capital Territory's
government departments, agencies and hospitals. Technical excellence and low resource usage were deciding factors in choosing Sophos.
http://www.sophos.com/en-us/your-
needs/case-studies/government.aspx
17
SC Magazine Awards 2011
Best Mobile/Portable Device Security
• Good Technology for Good for Enterprise
• IronKey for IronKey Enterprise
• McAfee for McAfee Enterprise Mobility Management (McAfee EMM)
• Sophos for Sophos SafeGuard Enterprise
• Symantec for Symantec Endpoint Protection Mobile Edition
Best Endpoint/UTM Security
• Check Point Software Technologies for Check Point UTM-1
• McAfee for McAfee Total Protection for Endpoint, Enterprise Edition
• SonicWALL for SonicWALL E-Class Network Security Appliance (NSA) E8500
• Sophos for Sophos Endpoint Security and Data Protection
• Symantec for Symantec Endpoint Protection 11.0
SC Awards 2011
18
Analysis of Total Cost of Ownership
(TCO)
• 9 companies interviewed in-depth and costs analyzed:
• Amica Life Insurance
• Lincoln Public Schools
• AW Chestern
• British Services Company
• Central Ohio Primary Care Physicians
• US Healthcare Provider
• CGh Medical Center
• Germany Company
• Escabia County School District
19
Sample Vendor Vs. Sophos: Cost Savings
Analysis Over a 5 Year Period
Source: Business Trends “A Strategic Overview Featuring Gartner Content” Featuring: A Buyers Guide to End Point Protection Programs (May 2009)
* The costs were calculated based on licensing, infrastructure and operational data provided by the companies interviewed
*Analysis shows significant savings of $420K can be experienced for switching to and managing
Sophos end point and security over a 5 Year period
• Total cost for Sophos =
$880K
• Total cost for sample
company =$1.3M
20
Sample Vendor Vs. Sophos: Extent of
Cost Category to Total Cost
Source: Business Trends “A Strategic Overview Featuring Gartner Content” Featuring: A Buyers Guide to End Point Protection Programs (May 2009)
* The costs were calculated based on licensing, infrastructure and operational data provided by the companies interviewed
*Analysis shows significant savings of $420K can be experienced by switching to and managing
Sophos end point and security over a 5 Year period
• Represents largest cost at
of the TCO
21
Snapshot of Voice of the Sophos End
Point Security Customer
Source: Business Trends “A Strategic Overview Featuring Gartner Content” Featuring: A Buyers Guide to End Point Protection Programs (May 2009)
Sophos offers a cost effective, easy to deploy/use, flexible with proven data loss
prevention capabilities
“Sophos was the only tool
that did not care if clients
are Macs or PCs, It was the
only cross platform solution
at the time” – Director of
Technology Lincoln Public
Schools
“Sophos has saved me a lot of time
with their administrative tools. The
deployment is easier and I’ve been
impressed with the client removal tool,
it removes Symantec very well” – IT
Manager CGH Medical Center
“The high volume of calls to our IT
department with McAfee was one
of the key reasons we switched to
Sophos” – Head of Global
System& Security Solutions,
German Company
McAfee proved to be more
expensive from the point of
view that it charged for every
module. When we reviewed
Sophos it was al part of one
purchase and the price was less
than for McAfee” – Technical
Services Manager, British
Services Company
“The Sophos Console provides a
snapshot of what’s going on at
a glance. Symantec is definitely
not easy to use. We need to
see at a glance if there is
something wrong” - Technical
& Operations Security
Administrator US Health Care
Provider
22
Back up Slides
Diagram Source: Sophos / Utimaco Data Loss Prevention by Peter Szendröi,
SOPHOS Nordics(Jan 20, 2010) page 2
In Closing…. Sophos, Simply Secure
An organization’s risk of threat of Data theft or exposure from lost, stolen, or inappropriately
decommissioned laptops is greatly reduced with Sophos end point security protection. However,
Organizations must remain proactive and vigilant and constantly review products & services to
meet increasingly sophisticated threats of data theft.
23