SlideShare una empresa de Scribd logo
1 de 4
Descargar para leer sin conexión
In the summer of 2015, a Symantec employee unintentionally violated
policy when he configured his work email to auto-forward to his
personal account. A coworker later emailed him a snippet of source
code—another policy violation, compounded by the fact that the code
was being diverted outside the company.
Neither employee had malicious intent, but their shortcuts could have
exposed our most valuable asset—our source code—to any number of
bad actors around the world.
Fortunately, Symantec Data Loss Prevention (DLP) was on the job. It
alerted our Security Operations Center that someone was emailing
source code. An incident-response team sprang into action,
investigating the activity and shutting it down before any damage
was done.
If we hadn’t been using Symantec DLP we may not have learned of the
violations for months, if ever. That’s why we’ve made it a major part of
our protection strategy. It alerts our security team whenever sensitive
information is emailed, saved to a thumb drive, or otherwise moved
around the network in a suspicious way, thus enabling us to take
immediate action and make sure no policies are being violated.
Symantec Data Loss Prevention:
From Adoption to Maturity
Symantec Data Loss Prevention: From Adoption to Maturity is written to inform CIOs, CTOs, CISOs, and other senior managers about our journey
to help secure our data. In this paper we explain the challenges we faced, how we solved them, and the lessons we learned that might be of value to
you. We also describe our best practices and the experiences of our IT staffers as they developed and installed one of the most robust solutions for
data loss prevention in the industry.
CustomerONE | p. 2
Symantec Data Loss Prevention: From Adoption to Maturity
Data Loss Prevention—Getting It Right
Every company has information it needs to keep secure. Whether
that’s source code, customer data, or personally identifying information,
there’s a heavy price to pay if confidential files escape your network.
Part of the answer involves keeping bad actors out, but if hackers
do sneak into your network (maybe by stealing an employee’s logon
credentials) you need to be sure they can’t slip any information out.
We need to be sure too. That’s where we rely on Symantec DLP.
“Our key priority is to safeguard Symantec’s most critical assets:
source code, customer data, and our employees’ personally identifiable
information,” says Tim Fitzgerald, our chief security officer. “A broad
and creative deployment of Symantec DLP is one of the most powerful
tools we have to help us achieve this.”
The product is highly customizable, so you’ll want to fine-tune it to
meet your own company’s specific needs. That step can take some
time—we worked for two years to get our own strategy just right—but
as you’ll see, our results have been well worth the effort.
History
Symantec acquired its Data Loss Prevention product in 2007. Because
the company’s primary goal was to strengthen our product portfolio,
the idea of implementing it internally was only a secondary priority.
At the time our IT staff was outsourcing some of its infrastructure
efforts to a third party. When we asked the vendor to set up Symantec
DLP for us, our initial focus was to use it to protect our network and
endpoints, and not so much to keep tabs on our source code.
We re-evaluated in 2012. That’s when we brought our IT operations in-
house to be managed internally. At that point we decided to make full
use of Symantec DLP’s capabilities by installing it as a key part of our
source-code protection strategy.
Navigating the Learning Curve
When we implemented Symantec DLP we had the right idea, but we
discovered there was a bit of a learning curve. We as a company had
extensive knowledge about how to fine-tune Symantec DLP, but our
IT teams, who were new to the product, created rules that were overly
broad and not as well thought out.
“We treated it like antivirus software—just turn it on and let it work,” Tim
says. “In hindsight, that’s not what Data Loss Prevention is. It’s a very
sophisticated hunting tool, but if you don’t tell it what to hunt for it finds
everything and becomes unusable.”
That’s also the top complaint we get from customers. They’ll set up
broad rules for everything from credit-card numbers to Social Security
numbers, and end up with such an avalanche of alerts that they give
up and turn off the rules entirely.
Here’s how to avoid that: Before you begin, your executive staff and
security practitioners need to have an in-depth conversation about
risk management. Figure out what data you need to protect and what
you think the threats are, and then bring in your engineers to craft the
appropriate policies.
We did it backward. We had our engineers create policies, and
when we got too many alerts we’d dial the rules back and try again,
a method of trial and error that played out for more than a year.
If we had strategized first, we could have gotten up to speed in a
matter of months.
In parallel with creating and testing our policies, we developed a way
to secretly mark our source code so Symantec DLP could track how
it was being moved around. The process involved overcoming a few
technical challenges.
First, we had tens of millions of lines of code to watermark. We also
had to track down where all of our code was; we hadn’t given our
developers great tools to store their code in a single area, so a lot of
them saved their work on laptops and other unsecured devices.
So we undertook an ambitious effort. First we consolidated about
750 source-code repositories around the world and migrated
their contents to two centrally managed systems. Then we used
proprietary technology to watermark our code. (For more information
read our companion CustomerONE story: “Source Code Security the
Symantec Way.”)
Strategic Overview
Tracking your information involves five steps:
1.	 Decide what information you want to track
2.	 Tag it with a watermark or other secret identifier
3.	Create rules so you’re alerted when someone moves
watermarked information under unusual circumstances
4.	 Ensure the alerts are evaluated and acted upon immediately
5.	 Refine the rules to minimize false positives
CustomerONE | p. 3
Symantec Data Loss Prevention: From Adoption to Maturity
Fine-Tuning Our Alerts
Once our code was watermarked and secured, we created rules for
the DLP software to use to detect suspicious activity.
Customers seem surprised when we tell them how time-consuming
this step is. Tim Deese, a Symantec engineer who helped run our DLP
effort, explains it this way: “Suppose you want to track activity around
Social Security numbers,” he says. “If you just create a policy to detect
nine-digit numbers, then every nine-digit number—product numbers,
ZIP codes, even some phone numbers—will trigger an alert.”
In this case, you’d have to analyze every alert, determine which were
false positives and tweak your rule to keep them from getting flagged.
Then you’d have to let the new rule run for a period of time and then
spend another week or so re-examining the results, continuing the
cycle until you’ve gotten it just right. In the meantime you have to do the
same for all of your other rules.
“It’s a fair amount of work,” Tim Deese says. “The process is simple but
it’s just a large volume of data. And you have to analyze it in great detail
to make sure you’re not excluding genuine threats.”
You may also have to deal with conflicting corporate demands. One
business unit might want a rule loosened, even if it creates more alerts,
and another unit might want the same rule more focused. That can
lead to administrative back-and-forth that slows the process down.
So what’s the lesson for you? Two things: First, set up rules only
for your more critical information; and second, have a clear hierarchy
for approving policies, so the process of tweaking rules and policies
doesn’t get hung up in bureaucratic wrangling.
Responding Appropriately to Alerts
There’s no point receiving an alert if the alert is never acted upon. We
had that problem when we were outsourcing our DLP monitoring to
the third party. Since we hadn’t developed clear policies, there were
times when alerts got ignored because we and the vendor each
thought the other would investigate.
We solved that by assigning all monitoring responsibilities to
our Security Operations Center in Virginia. Today when staffers
there receive an alert they know they’re the ones responsible for
investigating. If they think a particular activity could be malicious
they escalate the matter along a clearly defined hierarchy. And
if an alert doesn’t rise to that level, as with our employee who
was forwarding work emails to a personal account, they handle it
according to internal policy.
You’ll need a similar process. Know who in your company should
receive the data alerts, and then have a clear process that outlines
when they escalate those alerts and to whom.
We’ll be happy to help you strategize.
Staffing Challenges
Tim Deese joined our support department in 2006. When we acquired
the Data Loss Prevention product the following year he volunteered to
get trained on it, a decision that he jokes gave him job security for life.
“It’s the truth. It’s a hot market, even two to three years after DLP
exploded in the market,” he says. “When customers buy our software
and look around for help setting it up, there aren’t many people. It’s
definitely a challenge.”
If staffing is an issue for you, there are two ways we can provide the
expertise you’ll need: consulting services and education.
Tim is now a member of our Symantec consulting organization.
He works with enterprise customers to help them set up their DLP
installations for maximum value.
He and our team of information-protection consultants can guide you
in designing, implementing, and running DLP solutions. They can also
help you build successful DLP programs.
Alternatively, we can train your staff to become your own in-house
experts. It’s a moderately intensive process, but by the end your staff
can handle most of the issues you might encounter.
“In three to six months they become pretty proficient at managing their
own deployment,” Tim says.
(To learn more about consulting services and education, visit
symantec.com/services)
Best Practices
Keep in mind that Data Loss Prevention is just one piece of your
overall data-protection strategy. Danny Graves, a senior Symantec
information-security analyst, recommends the following best practices
as well:
•	 Impose strong authentication and password controls
•	 Manage all policies centrally to ensure consistency
•	If you have engineering labs, make sure developers use secure
centralized repositories, not their own individual solutions
CustomerONE | p. 4
Symantec Data Loss Prevention: From Adoption to Maturity
•	 Use strong encryption
•	 Maintain an agile patch-management system
•	Make sure endpoint protection is updated and turned on for
everyone on the network
“Most of these are no-brainers,” Danny says, “but they’re easy to forget
or overlook.”
Our Next Steps
In 2016, we’ll be going to market with a new cloud-based Data Loss
Prevention service. We’ll provide the hardware, maintenance and
service, freeing customers from having to manage infrastructure and
physical security.
“That’s a big step forward for us,” says Linda Park, a Symantec
product-marketing manager. “This is where the industry and market
are headed.”
Even with cloud services, however, customers would still need their
own staffers to respond to incidents.
Also in the works: a solution to provide what CSO Tim Fitzgerald
describes as the holy grail of source-code protection: prevention. It’s
one thing to detect when source code is being moved inappropriately—
the next step is disallow the movement.
That’s exactly where we’re headed.
The biggest challenge in prevention is finding a balance between
blocking suspicious actions and impeding our staff’s legitimate work.
Symantec is close to a solution, which we expect to roll out in 2016.
Stay tuned.
Learn More with an Executive Briefing
This brief was intended to give you a broad look at how we
use Symantec Data Loss Prevention internally. Your Symantec
representative can show you how to adapt our blueprint to make your
own DLP journey even smoother.
If you’d like even more in-depth experience, visit our Executive Briefing
Centers at our U.S. headquarters in Mountain View, California, or in
Reading, U.K.
Executive briefings provide you an exclusive opportunity to learn
how Symantec solutions can protect your business and network
environments. We’ll customize the briefing to meet your specific
goals, and we’ll also give you a sneak peek at new technologies and
challenges on the horizon.
customer_one@symantec.com
CustomerONE Team
350 Ellis Street
Mountain View, CA 94043
800-745-6054
Symantec’s CustomerONE team can facilitate discussions between
you and our IT security practitioners to help you address your
security questions and concerns. Please contact us directly or
through your Symantec sales team.
Copyright © 2016 Symantec Corp. All rights reserved. Symantec, the Symantec Logo, and the Checkmark Logo are trademarks or registered trademarks of Symantec Corp. or its affiliates in the U.S. and other
countries. Other names may be trademarks of their respective owners.
This document is provided for informational purposes only and is not intended as advertising. All warranties relating to the information in this document, either express or implied, are disclaimed to the
maximum extent allowed by law. The information in this document is subject to change without notice.
SYMANTEC SOLUTIONS AND
PRODUCTS IN THIS PAPER
Data Loss Prevention: DLP discovers where data is stored
across your cloud, mobile, and on-premises environments;
monitors how it’s being used on and off your corporate network;
and protects it from being leaked or stolen

Más contenido relacionado

La actualidad más candente

Security Intelligence: Finding and Stopping Attackers with Big Data Analytics
Security Intelligence: Finding and Stopping Attackers with Big Data AnalyticsSecurity Intelligence: Finding and Stopping Attackers with Big Data Analytics
Security Intelligence: Finding and Stopping Attackers with Big Data AnalyticsIBM Security
 
Jason Harrell - Compliance and Security: Building a Cybersecurity Risk Manage...
Jason Harrell - Compliance and Security: Building a Cybersecurity Risk Manage...Jason Harrell - Compliance and Security: Building a Cybersecurity Risk Manage...
Jason Harrell - Compliance and Security: Building a Cybersecurity Risk Manage...centralohioissa
 
Endpoint Detection and Response for Dummies
Endpoint Detection and Response for DummiesEndpoint Detection and Response for Dummies
Endpoint Detection and Response for DummiesLiberteks
 
Art Hathaway - Artificial Intelligence - Real Threat Prevention
Art Hathaway - Artificial Intelligence - Real Threat PreventionArt Hathaway - Artificial Intelligence - Real Threat Prevention
Art Hathaway - Artificial Intelligence - Real Threat Preventioncentralohioissa
 
Lisa Guess - Embracing the Cloud
Lisa Guess - Embracing the CloudLisa Guess - Embracing the Cloud
Lisa Guess - Embracing the Cloudcentralohioissa
 
DATA BREACH LITIGATION HOW TO AVOID IT AND BE BETTER PREPARED
DATA BREACH LITIGATION HOW TO AVOID IT AND BE BETTER PREPAREDDATA BREACH LITIGATION HOW TO AVOID IT AND BE BETTER PREPARED
DATA BREACH LITIGATION HOW TO AVOID IT AND BE BETTER PREPAREDPriyanka Aash
 
Bil Harmer - Myths of Cloud Security Debunked!
Bil Harmer - Myths of Cloud Security Debunked!Bil Harmer - Myths of Cloud Security Debunked!
Bil Harmer - Myths of Cloud Security Debunked!centralohioissa
 
DTS Solution - Cyber Security Services Portfolio
DTS Solution - Cyber Security Services PortfolioDTS Solution - Cyber Security Services Portfolio
DTS Solution - Cyber Security Services PortfolioShah Sheikh
 
Avoiding data breach using security intelligence and big data to stay out of ...
Avoiding data breach using security intelligence and big data to stay out of ...Avoiding data breach using security intelligence and big data to stay out of ...
Avoiding data breach using security intelligence and big data to stay out of ...IBM Security
 
Cyber Security For Organization Proposal Powerpoint Presentation Slides
Cyber Security For Organization Proposal Powerpoint Presentation SlidesCyber Security For Organization Proposal Powerpoint Presentation Slides
Cyber Security For Organization Proposal Powerpoint Presentation SlidesSlideTeam
 
Jack Nichelson - Information Security Metrics - Practical Security Metrics
Jack Nichelson - Information Security Metrics - Practical Security MetricsJack Nichelson - Information Security Metrics - Practical Security Metrics
Jack Nichelson - Information Security Metrics - Practical Security Metricscentralohioissa
 
Jake Williams - Navigating the FDA Recommendations on Medical Device Security...
Jake Williams - Navigating the FDA Recommendations on Medical Device Security...Jake Williams - Navigating the FDA Recommendations on Medical Device Security...
Jake Williams - Navigating the FDA Recommendations on Medical Device Security...centralohioissa
 
Data Loss Prevention: Challenges, Impacts & Effective Strategies
Data Loss Prevention: Challenges, Impacts & Effective StrategiesData Loss Prevention: Challenges, Impacts & Effective Strategies
Data Loss Prevention: Challenges, Impacts & Effective StrategiesSeccuris Inc.
 
Cloud Security - Idealware
Cloud Security - IdealwareCloud Security - Idealware
Cloud Security - IdealwareIdealware
 
Securing The Reality of Multiple Cloud Apps: Pandora's Story
Securing The Reality of Multiple Cloud Apps: Pandora's StorySecuring The Reality of Multiple Cloud Apps: Pandora's Story
Securing The Reality of Multiple Cloud Apps: Pandora's StoryCloudLock
 
Ransomware Has Evolved And So Should Your Company
Ransomware Has Evolved And So Should Your CompanyRansomware Has Evolved And So Should Your Company
Ransomware Has Evolved And So Should Your CompanyVeriato
 
Cyber Risk Management in 2017 - Challenges & Recommendations
Cyber Risk Management in 2017 - Challenges & RecommendationsCyber Risk Management in 2017 - Challenges & Recommendations
Cyber Risk Management in 2017 - Challenges & RecommendationsUlf Mattsson
 
How to Recover from a Ransomware Disaster
How to Recover from a Ransomware DisasterHow to Recover from a Ransomware Disaster
How to Recover from a Ransomware DisasterSpanning Cloud Apps
 
The Cloud Beckons, But is it Safe?
The Cloud Beckons, But is it Safe?The Cloud Beckons, But is it Safe?
The Cloud Beckons, But is it Safe?NTEN
 

La actualidad más candente (20)

Security Intelligence: Finding and Stopping Attackers with Big Data Analytics
Security Intelligence: Finding and Stopping Attackers with Big Data AnalyticsSecurity Intelligence: Finding and Stopping Attackers with Big Data Analytics
Security Intelligence: Finding and Stopping Attackers with Big Data Analytics
 
Jason Harrell - Compliance and Security: Building a Cybersecurity Risk Manage...
Jason Harrell - Compliance and Security: Building a Cybersecurity Risk Manage...Jason Harrell - Compliance and Security: Building a Cybersecurity Risk Manage...
Jason Harrell - Compliance and Security: Building a Cybersecurity Risk Manage...
 
Symantec Data Loss Prevention 9
Symantec Data Loss Prevention 9Symantec Data Loss Prevention 9
Symantec Data Loss Prevention 9
 
Endpoint Detection and Response for Dummies
Endpoint Detection and Response for DummiesEndpoint Detection and Response for Dummies
Endpoint Detection and Response for Dummies
 
Art Hathaway - Artificial Intelligence - Real Threat Prevention
Art Hathaway - Artificial Intelligence - Real Threat PreventionArt Hathaway - Artificial Intelligence - Real Threat Prevention
Art Hathaway - Artificial Intelligence - Real Threat Prevention
 
Lisa Guess - Embracing the Cloud
Lisa Guess - Embracing the CloudLisa Guess - Embracing the Cloud
Lisa Guess - Embracing the Cloud
 
DATA BREACH LITIGATION HOW TO AVOID IT AND BE BETTER PREPARED
DATA BREACH LITIGATION HOW TO AVOID IT AND BE BETTER PREPAREDDATA BREACH LITIGATION HOW TO AVOID IT AND BE BETTER PREPARED
DATA BREACH LITIGATION HOW TO AVOID IT AND BE BETTER PREPARED
 
Bil Harmer - Myths of Cloud Security Debunked!
Bil Harmer - Myths of Cloud Security Debunked!Bil Harmer - Myths of Cloud Security Debunked!
Bil Harmer - Myths of Cloud Security Debunked!
 
DTS Solution - Cyber Security Services Portfolio
DTS Solution - Cyber Security Services PortfolioDTS Solution - Cyber Security Services Portfolio
DTS Solution - Cyber Security Services Portfolio
 
Avoiding data breach using security intelligence and big data to stay out of ...
Avoiding data breach using security intelligence and big data to stay out of ...Avoiding data breach using security intelligence and big data to stay out of ...
Avoiding data breach using security intelligence and big data to stay out of ...
 
Cyber Security For Organization Proposal Powerpoint Presentation Slides
Cyber Security For Organization Proposal Powerpoint Presentation SlidesCyber Security For Organization Proposal Powerpoint Presentation Slides
Cyber Security For Organization Proposal Powerpoint Presentation Slides
 
Jack Nichelson - Information Security Metrics - Practical Security Metrics
Jack Nichelson - Information Security Metrics - Practical Security MetricsJack Nichelson - Information Security Metrics - Practical Security Metrics
Jack Nichelson - Information Security Metrics - Practical Security Metrics
 
Jake Williams - Navigating the FDA Recommendations on Medical Device Security...
Jake Williams - Navigating the FDA Recommendations on Medical Device Security...Jake Williams - Navigating the FDA Recommendations on Medical Device Security...
Jake Williams - Navigating the FDA Recommendations on Medical Device Security...
 
Data Loss Prevention: Challenges, Impacts & Effective Strategies
Data Loss Prevention: Challenges, Impacts & Effective StrategiesData Loss Prevention: Challenges, Impacts & Effective Strategies
Data Loss Prevention: Challenges, Impacts & Effective Strategies
 
Cloud Security - Idealware
Cloud Security - IdealwareCloud Security - Idealware
Cloud Security - Idealware
 
Securing The Reality of Multiple Cloud Apps: Pandora's Story
Securing The Reality of Multiple Cloud Apps: Pandora's StorySecuring The Reality of Multiple Cloud Apps: Pandora's Story
Securing The Reality of Multiple Cloud Apps: Pandora's Story
 
Ransomware Has Evolved And So Should Your Company
Ransomware Has Evolved And So Should Your CompanyRansomware Has Evolved And So Should Your Company
Ransomware Has Evolved And So Should Your Company
 
Cyber Risk Management in 2017 - Challenges & Recommendations
Cyber Risk Management in 2017 - Challenges & RecommendationsCyber Risk Management in 2017 - Challenges & Recommendations
Cyber Risk Management in 2017 - Challenges & Recommendations
 
How to Recover from a Ransomware Disaster
How to Recover from a Ransomware DisasterHow to Recover from a Ransomware Disaster
How to Recover from a Ransomware Disaster
 
The Cloud Beckons, But is it Safe?
The Cloud Beckons, But is it Safe?The Cloud Beckons, But is it Safe?
The Cloud Beckons, But is it Safe?
 

Similar a Symantec Data Loss Prevention- From Adoption to Maturity

Source Code Security the Symantec Way
Source Code Security the Symantec WaySource Code Security the Symantec Way
Source Code Security the Symantec WaySymantec
 
Cultivate a stronger corporate culture to enhance cybersecurity
Cultivate a stronger corporate culture to enhance cybersecurityCultivate a stronger corporate culture to enhance cybersecurity
Cultivate a stronger corporate culture to enhance cybersecurityDavid X Martin
 
Microsoft DATA Protection To Put secure.
Microsoft DATA Protection To Put secure.Microsoft DATA Protection To Put secure.
Microsoft DATA Protection To Put secure.jayceewong1
 
Protecting the Core of Your Network
Protecting the Core of Your Network Protecting the Core of Your Network
Protecting the Core of Your Network Mighty Guides, Inc.
 
10 Tips for CIOS Data Security in the Cloud
10 Tips for CIOS Data Security in the Cloud10 Tips for CIOS Data Security in the Cloud
10 Tips for CIOS Data Security in the CloudIron Mountain
 
Tech Talent Meetup Hacking Security Event Recap
Tech Talent Meetup Hacking Security Event RecapTech Talent Meetup Hacking Security Event Recap
Tech Talent Meetup Hacking Security Event RecapDominic Vogel
 
trellix-dlp-buyers-guide.pdf
trellix-dlp-buyers-guide.pdftrellix-dlp-buyers-guide.pdf
trellix-dlp-buyers-guide.pdfLaLaBlaGhvgT
 
EXTERNAL - Whitepaper - 5 Steps to Weather the Zero Hour
EXTERNAL - Whitepaper - 5 Steps to Weather the Zero HourEXTERNAL - Whitepaper - 5 Steps to Weather the Zero Hour
EXTERNAL - Whitepaper - 5 Steps to Weather the Zero HourYasser Mohammed
 
Edith Turuka: Cyber-Security, An Eye Opener to the Society
Edith Turuka: Cyber-Security, An Eye Opener to the SocietyEdith Turuka: Cyber-Security, An Eye Opener to the Society
Edith Turuka: Cyber-Security, An Eye Opener to the SocietyHamisi Kibonde
 
Cybersecurity risk assessments help organizations identify.pdf
Cybersecurity risk assessments help organizations identify.pdfCybersecurity risk assessments help organizations identify.pdf
Cybersecurity risk assessments help organizations identify.pdfTheWalkerGroup1
 
6 Biggest Cyber Security Risks and How You Can Fight Back
6 Biggest Cyber Security Risks and How You Can Fight Back6 Biggest Cyber Security Risks and How You Can Fight Back
6 Biggest Cyber Security Risks and How You Can Fight BackMTG IT Professionals
 
Security Transformation
Security TransformationSecurity Transformation
Security TransformationFaisal Yahya
 
secureit-cloudsecurity-151130141528-lva1-app6892.pdf
secureit-cloudsecurity-151130141528-lva1-app6892.pdfsecureit-cloudsecurity-151130141528-lva1-app6892.pdf
secureit-cloudsecurity-151130141528-lva1-app6892.pdfYounesChafi1
 
Cyber Security for the Small Business Experience
Cyber Security for the Small Business ExperienceCyber Security for the Small Business Experience
Cyber Security for the Small Business ExperienceNational Retail Federation
 
Responding to a Data Breach, Communications Guidelines for Merchants
Responding to a Data Breach, Communications Guidelines for MerchantsResponding to a Data Breach, Communications Guidelines for Merchants
Responding to a Data Breach, Communications Guidelines for Merchants- Mark - Fullbright
 

Similar a Symantec Data Loss Prevention- From Adoption to Maturity (20)

Cyber Security and Data Protection
Cyber Security and Data ProtectionCyber Security and Data Protection
Cyber Security and Data Protection
 
Source Code Security the Symantec Way
Source Code Security the Symantec WaySource Code Security the Symantec Way
Source Code Security the Symantec Way
 
Cultivate a stronger corporate culture to enhance cybersecurity
Cultivate a stronger corporate culture to enhance cybersecurityCultivate a stronger corporate culture to enhance cybersecurity
Cultivate a stronger corporate culture to enhance cybersecurity
 
Microsoft DATA Protection To Put secure.
Microsoft DATA Protection To Put secure.Microsoft DATA Protection To Put secure.
Microsoft DATA Protection To Put secure.
 
Protecting the Core of Your Network
Protecting the Core of Your Network Protecting the Core of Your Network
Protecting the Core of Your Network
 
10 Tips for CIOS Data Security in the Cloud
10 Tips for CIOS Data Security in the Cloud10 Tips for CIOS Data Security in the Cloud
10 Tips for CIOS Data Security in the Cloud
 
Tech Talent Meetup Hacking Security Event Recap
Tech Talent Meetup Hacking Security Event RecapTech Talent Meetup Hacking Security Event Recap
Tech Talent Meetup Hacking Security Event Recap
 
trellix-dlp-buyers-guide.pdf
trellix-dlp-buyers-guide.pdftrellix-dlp-buyers-guide.pdf
trellix-dlp-buyers-guide.pdf
 
EXTERNAL - Whitepaper - 5 Steps to Weather the Zero Hour
EXTERNAL - Whitepaper - 5 Steps to Weather the Zero HourEXTERNAL - Whitepaper - 5 Steps to Weather the Zero Hour
EXTERNAL - Whitepaper - 5 Steps to Weather the Zero Hour
 
Fy17 sec shadow_it-e_book_final_032417
Fy17 sec shadow_it-e_book_final_032417Fy17 sec shadow_it-e_book_final_032417
Fy17 sec shadow_it-e_book_final_032417
 
Big Data Dectives
Big Data DectivesBig Data Dectives
Big Data Dectives
 
Edith Turuka: Cyber-Security, An Eye Opener to the Society
Edith Turuka: Cyber-Security, An Eye Opener to the SocietyEdith Turuka: Cyber-Security, An Eye Opener to the Society
Edith Turuka: Cyber-Security, An Eye Opener to the Society
 
Cybersecurity risk assessments help organizations identify.pdf
Cybersecurity risk assessments help organizations identify.pdfCybersecurity risk assessments help organizations identify.pdf
Cybersecurity risk assessments help organizations identify.pdf
 
6 Biggest Cyber Security Risks and How You Can Fight Back
6 Biggest Cyber Security Risks and How You Can Fight Back6 Biggest Cyber Security Risks and How You Can Fight Back
6 Biggest Cyber Security Risks and How You Can Fight Back
 
Security Transformation
Security TransformationSecurity Transformation
Security Transformation
 
secureit-cloudsecurity-151130141528-lva1-app6892.pdf
secureit-cloudsecurity-151130141528-lva1-app6892.pdfsecureit-cloudsecurity-151130141528-lva1-app6892.pdf
secureit-cloudsecurity-151130141528-lva1-app6892.pdf
 
Robust Software Solutions.pptx
Robust Software Solutions.pptxRobust Software Solutions.pptx
Robust Software Solutions.pptx
 
Cloud & Sécurité
Cloud & SécuritéCloud & Sécurité
Cloud & Sécurité
 
Cyber Security for the Small Business Experience
Cyber Security for the Small Business ExperienceCyber Security for the Small Business Experience
Cyber Security for the Small Business Experience
 
Responding to a Data Breach, Communications Guidelines for Merchants
Responding to a Data Breach, Communications Guidelines for MerchantsResponding to a Data Breach, Communications Guidelines for Merchants
Responding to a Data Breach, Communications Guidelines for Merchants
 

Más de Symantec

Symantec Enterprise Security Products are now part of Broadcom
Symantec Enterprise Security Products are now part of BroadcomSymantec Enterprise Security Products are now part of Broadcom
Symantec Enterprise Security Products are now part of BroadcomSymantec
 
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...Symantec
 
Symantec Webinar | National Cyber Security Awareness Month: Protect IT
Symantec Webinar | National Cyber Security Awareness Month: Protect ITSymantec Webinar | National Cyber Security Awareness Month: Protect IT
Symantec Webinar | National Cyber Security Awareness Month: Protect ITSymantec
 
Symantec Webinar | National Cyber Security Awareness Month: Secure IT
Symantec Webinar | National Cyber Security Awareness Month: Secure ITSymantec Webinar | National Cyber Security Awareness Month: Secure IT
Symantec Webinar | National Cyber Security Awareness Month: Secure ITSymantec
 
Symantec Webinar | National Cyber Security Awareness Month - Own IT
Symantec Webinar | National Cyber Security Awareness Month - Own ITSymantec Webinar | National Cyber Security Awareness Month - Own IT
Symantec Webinar | National Cyber Security Awareness Month - Own ITSymantec
 
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)Symantec
 
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CKSymantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CKSymantec
 
Symantec Mobile Security Webinar
Symantec Mobile Security WebinarSymantec Mobile Security Webinar
Symantec Mobile Security WebinarSymantec
 
Symantec Webinar Cloud Security Threat Report
Symantec Webinar Cloud Security Threat ReportSymantec Webinar Cloud Security Threat Report
Symantec Webinar Cloud Security Threat ReportSymantec
 
Symantec Cloud Security Threat Report
Symantec Cloud Security Threat ReportSymantec Cloud Security Threat Report
Symantec Cloud Security Threat ReportSymantec
 
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...Symantec
 
Symantec Webinar | Tips for Successful CASB Projects
Symantec Webinar |  Tips for Successful CASB ProjectsSymantec Webinar |  Tips for Successful CASB Projects
Symantec Webinar | Tips for Successful CASB ProjectsSymantec
 
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?Symantec
 
Symantec Webinar: GDPR 1 Year On
Symantec Webinar: GDPR 1 Year OnSymantec Webinar: GDPR 1 Year On
Symantec Webinar: GDPR 1 Year OnSymantec
 
Symantec ISTR 24 Webcast 2019
Symantec ISTR 24 Webcast 2019Symantec ISTR 24 Webcast 2019
Symantec ISTR 24 Webcast 2019Symantec
 
Symantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front LinesSymantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front LinesSymantec
 
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...Symantec
 
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...Symantec
 
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy BearSymantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy BearSymantec
 
GDPR Breach Notification Demystifying What the Regulators Want
GDPR Breach Notification Demystifying What the Regulators WantGDPR Breach Notification Demystifying What the Regulators Want
GDPR Breach Notification Demystifying What the Regulators WantSymantec
 

Más de Symantec (20)

Symantec Enterprise Security Products are now part of Broadcom
Symantec Enterprise Security Products are now part of BroadcomSymantec Enterprise Security Products are now part of Broadcom
Symantec Enterprise Security Products are now part of Broadcom
 
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
 
Symantec Webinar | National Cyber Security Awareness Month: Protect IT
Symantec Webinar | National Cyber Security Awareness Month: Protect ITSymantec Webinar | National Cyber Security Awareness Month: Protect IT
Symantec Webinar | National Cyber Security Awareness Month: Protect IT
 
Symantec Webinar | National Cyber Security Awareness Month: Secure IT
Symantec Webinar | National Cyber Security Awareness Month: Secure ITSymantec Webinar | National Cyber Security Awareness Month: Secure IT
Symantec Webinar | National Cyber Security Awareness Month: Secure IT
 
Symantec Webinar | National Cyber Security Awareness Month - Own IT
Symantec Webinar | National Cyber Security Awareness Month - Own ITSymantec Webinar | National Cyber Security Awareness Month - Own IT
Symantec Webinar | National Cyber Security Awareness Month - Own IT
 
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
 
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CKSymantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
 
Symantec Mobile Security Webinar
Symantec Mobile Security WebinarSymantec Mobile Security Webinar
Symantec Mobile Security Webinar
 
Symantec Webinar Cloud Security Threat Report
Symantec Webinar Cloud Security Threat ReportSymantec Webinar Cloud Security Threat Report
Symantec Webinar Cloud Security Threat Report
 
Symantec Cloud Security Threat Report
Symantec Cloud Security Threat ReportSymantec Cloud Security Threat Report
Symantec Cloud Security Threat Report
 
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
 
Symantec Webinar | Tips for Successful CASB Projects
Symantec Webinar |  Tips for Successful CASB ProjectsSymantec Webinar |  Tips for Successful CASB Projects
Symantec Webinar | Tips for Successful CASB Projects
 
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
 
Symantec Webinar: GDPR 1 Year On
Symantec Webinar: GDPR 1 Year OnSymantec Webinar: GDPR 1 Year On
Symantec Webinar: GDPR 1 Year On
 
Symantec ISTR 24 Webcast 2019
Symantec ISTR 24 Webcast 2019Symantec ISTR 24 Webcast 2019
Symantec ISTR 24 Webcast 2019
 
Symantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front LinesSymantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front Lines
 
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
 
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
 
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy BearSymantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
 
GDPR Breach Notification Demystifying What the Regulators Want
GDPR Breach Notification Demystifying What the Regulators WantGDPR Breach Notification Demystifying What the Regulators Want
GDPR Breach Notification Demystifying What the Regulators Want
 

Último

Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DaySri Ambati
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 

Último (20)

Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 

Symantec Data Loss Prevention- From Adoption to Maturity

  • 1. In the summer of 2015, a Symantec employee unintentionally violated policy when he configured his work email to auto-forward to his personal account. A coworker later emailed him a snippet of source code—another policy violation, compounded by the fact that the code was being diverted outside the company. Neither employee had malicious intent, but their shortcuts could have exposed our most valuable asset—our source code—to any number of bad actors around the world. Fortunately, Symantec Data Loss Prevention (DLP) was on the job. It alerted our Security Operations Center that someone was emailing source code. An incident-response team sprang into action, investigating the activity and shutting it down before any damage was done. If we hadn’t been using Symantec DLP we may not have learned of the violations for months, if ever. That’s why we’ve made it a major part of our protection strategy. It alerts our security team whenever sensitive information is emailed, saved to a thumb drive, or otherwise moved around the network in a suspicious way, thus enabling us to take immediate action and make sure no policies are being violated. Symantec Data Loss Prevention: From Adoption to Maturity Symantec Data Loss Prevention: From Adoption to Maturity is written to inform CIOs, CTOs, CISOs, and other senior managers about our journey to help secure our data. In this paper we explain the challenges we faced, how we solved them, and the lessons we learned that might be of value to you. We also describe our best practices and the experiences of our IT staffers as they developed and installed one of the most robust solutions for data loss prevention in the industry.
  • 2. CustomerONE | p. 2 Symantec Data Loss Prevention: From Adoption to Maturity Data Loss Prevention—Getting It Right Every company has information it needs to keep secure. Whether that’s source code, customer data, or personally identifying information, there’s a heavy price to pay if confidential files escape your network. Part of the answer involves keeping bad actors out, but if hackers do sneak into your network (maybe by stealing an employee’s logon credentials) you need to be sure they can’t slip any information out. We need to be sure too. That’s where we rely on Symantec DLP. “Our key priority is to safeguard Symantec’s most critical assets: source code, customer data, and our employees’ personally identifiable information,” says Tim Fitzgerald, our chief security officer. “A broad and creative deployment of Symantec DLP is one of the most powerful tools we have to help us achieve this.” The product is highly customizable, so you’ll want to fine-tune it to meet your own company’s specific needs. That step can take some time—we worked for two years to get our own strategy just right—but as you’ll see, our results have been well worth the effort. History Symantec acquired its Data Loss Prevention product in 2007. Because the company’s primary goal was to strengthen our product portfolio, the idea of implementing it internally was only a secondary priority. At the time our IT staff was outsourcing some of its infrastructure efforts to a third party. When we asked the vendor to set up Symantec DLP for us, our initial focus was to use it to protect our network and endpoints, and not so much to keep tabs on our source code. We re-evaluated in 2012. That’s when we brought our IT operations in- house to be managed internally. At that point we decided to make full use of Symantec DLP’s capabilities by installing it as a key part of our source-code protection strategy. Navigating the Learning Curve When we implemented Symantec DLP we had the right idea, but we discovered there was a bit of a learning curve. We as a company had extensive knowledge about how to fine-tune Symantec DLP, but our IT teams, who were new to the product, created rules that were overly broad and not as well thought out. “We treated it like antivirus software—just turn it on and let it work,” Tim says. “In hindsight, that’s not what Data Loss Prevention is. It’s a very sophisticated hunting tool, but if you don’t tell it what to hunt for it finds everything and becomes unusable.” That’s also the top complaint we get from customers. They’ll set up broad rules for everything from credit-card numbers to Social Security numbers, and end up with such an avalanche of alerts that they give up and turn off the rules entirely. Here’s how to avoid that: Before you begin, your executive staff and security practitioners need to have an in-depth conversation about risk management. Figure out what data you need to protect and what you think the threats are, and then bring in your engineers to craft the appropriate policies. We did it backward. We had our engineers create policies, and when we got too many alerts we’d dial the rules back and try again, a method of trial and error that played out for more than a year. If we had strategized first, we could have gotten up to speed in a matter of months. In parallel with creating and testing our policies, we developed a way to secretly mark our source code so Symantec DLP could track how it was being moved around. The process involved overcoming a few technical challenges. First, we had tens of millions of lines of code to watermark. We also had to track down where all of our code was; we hadn’t given our developers great tools to store their code in a single area, so a lot of them saved their work on laptops and other unsecured devices. So we undertook an ambitious effort. First we consolidated about 750 source-code repositories around the world and migrated their contents to two centrally managed systems. Then we used proprietary technology to watermark our code. (For more information read our companion CustomerONE story: “Source Code Security the Symantec Way.”) Strategic Overview Tracking your information involves five steps: 1. Decide what information you want to track 2. Tag it with a watermark or other secret identifier 3. Create rules so you’re alerted when someone moves watermarked information under unusual circumstances 4. Ensure the alerts are evaluated and acted upon immediately 5. Refine the rules to minimize false positives
  • 3. CustomerONE | p. 3 Symantec Data Loss Prevention: From Adoption to Maturity Fine-Tuning Our Alerts Once our code was watermarked and secured, we created rules for the DLP software to use to detect suspicious activity. Customers seem surprised when we tell them how time-consuming this step is. Tim Deese, a Symantec engineer who helped run our DLP effort, explains it this way: “Suppose you want to track activity around Social Security numbers,” he says. “If you just create a policy to detect nine-digit numbers, then every nine-digit number—product numbers, ZIP codes, even some phone numbers—will trigger an alert.” In this case, you’d have to analyze every alert, determine which were false positives and tweak your rule to keep them from getting flagged. Then you’d have to let the new rule run for a period of time and then spend another week or so re-examining the results, continuing the cycle until you’ve gotten it just right. In the meantime you have to do the same for all of your other rules. “It’s a fair amount of work,” Tim Deese says. “The process is simple but it’s just a large volume of data. And you have to analyze it in great detail to make sure you’re not excluding genuine threats.” You may also have to deal with conflicting corporate demands. One business unit might want a rule loosened, even if it creates more alerts, and another unit might want the same rule more focused. That can lead to administrative back-and-forth that slows the process down. So what’s the lesson for you? Two things: First, set up rules only for your more critical information; and second, have a clear hierarchy for approving policies, so the process of tweaking rules and policies doesn’t get hung up in bureaucratic wrangling. Responding Appropriately to Alerts There’s no point receiving an alert if the alert is never acted upon. We had that problem when we were outsourcing our DLP monitoring to the third party. Since we hadn’t developed clear policies, there were times when alerts got ignored because we and the vendor each thought the other would investigate. We solved that by assigning all monitoring responsibilities to our Security Operations Center in Virginia. Today when staffers there receive an alert they know they’re the ones responsible for investigating. If they think a particular activity could be malicious they escalate the matter along a clearly defined hierarchy. And if an alert doesn’t rise to that level, as with our employee who was forwarding work emails to a personal account, they handle it according to internal policy. You’ll need a similar process. Know who in your company should receive the data alerts, and then have a clear process that outlines when they escalate those alerts and to whom. We’ll be happy to help you strategize. Staffing Challenges Tim Deese joined our support department in 2006. When we acquired the Data Loss Prevention product the following year he volunteered to get trained on it, a decision that he jokes gave him job security for life. “It’s the truth. It’s a hot market, even two to three years after DLP exploded in the market,” he says. “When customers buy our software and look around for help setting it up, there aren’t many people. It’s definitely a challenge.” If staffing is an issue for you, there are two ways we can provide the expertise you’ll need: consulting services and education. Tim is now a member of our Symantec consulting organization. He works with enterprise customers to help them set up their DLP installations for maximum value. He and our team of information-protection consultants can guide you in designing, implementing, and running DLP solutions. They can also help you build successful DLP programs. Alternatively, we can train your staff to become your own in-house experts. It’s a moderately intensive process, but by the end your staff can handle most of the issues you might encounter. “In three to six months they become pretty proficient at managing their own deployment,” Tim says. (To learn more about consulting services and education, visit symantec.com/services) Best Practices Keep in mind that Data Loss Prevention is just one piece of your overall data-protection strategy. Danny Graves, a senior Symantec information-security analyst, recommends the following best practices as well: • Impose strong authentication and password controls • Manage all policies centrally to ensure consistency • If you have engineering labs, make sure developers use secure centralized repositories, not their own individual solutions
  • 4. CustomerONE | p. 4 Symantec Data Loss Prevention: From Adoption to Maturity • Use strong encryption • Maintain an agile patch-management system • Make sure endpoint protection is updated and turned on for everyone on the network “Most of these are no-brainers,” Danny says, “but they’re easy to forget or overlook.” Our Next Steps In 2016, we’ll be going to market with a new cloud-based Data Loss Prevention service. We’ll provide the hardware, maintenance and service, freeing customers from having to manage infrastructure and physical security. “That’s a big step forward for us,” says Linda Park, a Symantec product-marketing manager. “This is where the industry and market are headed.” Even with cloud services, however, customers would still need their own staffers to respond to incidents. Also in the works: a solution to provide what CSO Tim Fitzgerald describes as the holy grail of source-code protection: prevention. It’s one thing to detect when source code is being moved inappropriately— the next step is disallow the movement. That’s exactly where we’re headed. The biggest challenge in prevention is finding a balance between blocking suspicious actions and impeding our staff’s legitimate work. Symantec is close to a solution, which we expect to roll out in 2016. Stay tuned. Learn More with an Executive Briefing This brief was intended to give you a broad look at how we use Symantec Data Loss Prevention internally. Your Symantec representative can show you how to adapt our blueprint to make your own DLP journey even smoother. If you’d like even more in-depth experience, visit our Executive Briefing Centers at our U.S. headquarters in Mountain View, California, or in Reading, U.K. Executive briefings provide you an exclusive opportunity to learn how Symantec solutions can protect your business and network environments. We’ll customize the briefing to meet your specific goals, and we’ll also give you a sneak peek at new technologies and challenges on the horizon. customer_one@symantec.com CustomerONE Team 350 Ellis Street Mountain View, CA 94043 800-745-6054 Symantec’s CustomerONE team can facilitate discussions between you and our IT security practitioners to help you address your security questions and concerns. Please contact us directly or through your Symantec sales team. Copyright © 2016 Symantec Corp. All rights reserved. Symantec, the Symantec Logo, and the Checkmark Logo are trademarks or registered trademarks of Symantec Corp. or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners. This document is provided for informational purposes only and is not intended as advertising. All warranties relating to the information in this document, either express or implied, are disclaimed to the maximum extent allowed by law. The information in this document is subject to change without notice. SYMANTEC SOLUTIONS AND PRODUCTS IN THIS PAPER Data Loss Prevention: DLP discovers where data is stored across your cloud, mobile, and on-premises environments; monitors how it’s being used on and off your corporate network; and protects it from being leaked or stolen