Professional Documents
Culture Documents
Safend General Nov Presentation 2010 NOTES
Safend General Nov Presentation 2010 NOTES
Leakage Prevention
A
d
Agenda
Who is Safend?
Endpoint Security
An imperative for all organizations
Summary
Securing your Endpoints
Ab t S
f d
About
Safend
Company facts
Established in 2003
Headquartered
q
in Israel with fully
y owned
subsidiary in the US
65 employees in Israel and the US and Europe
Products
P
d t available
il bl th
through
h channels
h
l and
d
partners
Visionaryy senior management
g
with extensive
experience in enterprise security
Strong VC backing
y
FISMA
Compliance
Protector 3.3
Safend Reporter
Safend Encryptor: Full
Hard Disk Encryption
Hardware
Management;
Network DLP
g
;
integration;
1200 Customers
2010
2011+
DRM Integration
Remote Stun
SaaS
2009
2008
Protector 3.1
Anti-Network
Anti
Network Bridging,
Bridging
PS/2 Keylogger Protection
2006
First release of
Safend Protector
2004
2005
Safend Protector
available through
resellers internationally
2003
Company founded
2007
Protector 3.2
File Type Control,
Media & Content
Monitoring and Tracking
Offline File Transfers
700 Customers
y
FISMA
Compliance
Protector 3.3
Safend Reporter
Safend Encryptor: Full
Hard Disk Encryption
Hardware
Management;
Network DLP
g
;
integration;
1200 Customers
2010
2011+
DRM Integration
Remote Stun
SaaS
2009
2008
Protector 3.1
Anti-Network
Anti
Network Bridging,
Bridging
PS/2 Keylogger Protection
2006
First release of
Safend Protector
2004
2005
Safend Protector
available through
resellers internationally
2003
Company founded
2007
Protector 3.2
File Type Control,
Media & Content
Monitoring and Tracking
Offline File Transfers
700 Customers
Why Safend?
Advanced Technology
Control all your data protection measures with a single management server,
single management console and a single lightweight agent
Partnership with leading hardware encrypted device vendors
Operational friendly deployment and management
Best of breed port and device control
Hard disk encryption is completely transparent and does not change end user
experience and common IT procedures
Comprehensive and enforceable removable media encryption
Full control over sensitive data both inside and outside organizational network
Track file transfers from encrypted devices even on non-corporate computers
Why Safend ?
Sa
e d Data
ata Protection
otect o Su
te features
eatu es a
d be
e ts
Safend
Suite
and
benefits:
Internal hard disk and external storage encryption
Robust port and device control
protector
encryptor
inspector
discoverer
Why Safend?
Strong partnerships
Enterprise Resellers
Partnership with leading hardware
encrypted
t d device
d i vendors
d
Complementing Enterprise DLP Vendors
Fidelis Security
Major Partnerships
Lenovo
Utimaco
Credant
Fujitsu
Websense
Workshare
RSA
- Proprietary & Confidential -
Why Safend?
Advanced technology
World class leadership team
Strong partnerships
Analysts endorsements
Industry recognition
In 2010Info Security Excellence Award
In 2009
Received five stars and Best Buy
y
in SC Magazines 2009 Group Test
Recipient of the Frost and Sullivan
Technology Innovation Award
Recipient
R i i t off the
th Info
I f Security
S
it
Products Guides Tomorrows
Technology Today Award
- -Proprietary
Proprietary & Confidential
Confidential - -
Company Mission
To become the market leader for endpoint Data
Protection and Leakage Prevention solutions for
enterprise protection and regulatory compliance.
Gil Sever, CEO
Industry analysts report that up to 70% of a companys confidential data
resides on corporate endpoints. Protecting that data is a prime concern
f
for
our customers. Safends
S f d endpoint
d i
D
Data
P
Protection
i
and
d Leakage
L k
Prevention solutions provide the tools our customers need to protect their
corporate assets without sacrificing their productivity - Steve Petracca,
VP and
d General
G
l Manager
M
f Lenovos
for
L
Software
S ft
& Peripherals
P i h
l Business
B i
Unit
Source:
The Case for Outbound Content Management, 2010 Osterman Research, Inc. 2010
Source:
Th Case
The
C
for
f Outbound
O tb
d Content
C t t Management,
M
t 2010 Osterman
O t
Research,
R
h Inc.
I
2010
M
Mac,
iP
iPads
d and
d iPhones
iPh
Enterprise Desktop Alliance conducted a survey of IT administrators, which
revealed that:
S
Security
it Survey
S
Common Risks and Mistakes Employees Make
Misuse of corporate computers:
44 % of employees share work devices with others without supervision.
Unauthorized physical and network access:
39 % of IT professionals said they have dealt with an employee accessing
unauthorized parts of a company's network or facility. Average number of
devices in use: 7
Remote worker security:
46 % of employees admitted to transferring files between work and personal
computers when working from home.
Source:
Cisco Systems,
y
, Inc. 2008,, Data Leakage
g Worldwide: Common Risks and Mistakes Employees
p y
Make
http://www.cisco.com/en/US/solutions/collateral/ns170/ns896/ns895/white_paper_c11-499060.pdf
$6.75 million
$204
Customer Costs
Brand damage
Loss of existing
customers
Recruiting new
customers
Incremental Costs
30%
54%
16%
Productivity Costs
Source: 5th annual "Cost of a Data Breach" study by the Ponemon Institute
Lost employee
p y
productivity
E t di Security
S
it to
t the
th Endpoints
E d i t
Extending
With increased mobility,
y, connectivity
y and p
productivity
y comes increased
vulnerability and risk
Perimeter Security technologies such as web security, firewalls and DLP Gateways do
not apply
pp y to multiple
p channels that are used outside the organization,
g
, including
g email,,
web (HTTP, HTTPS), FTP, external storage devices, CD/DVD burners, PDA devices,
file repositories, print screen, local and network printers, and many other channels that
need to be monitored and controlled to avoid leakage of sensitive data.
USB,
S WiFi, FireWire, Bluetooth and other protocols make it easy to connect
unauthorized external devices, leaving endpoints wide open to:
Data Leakage & Theft
E t
i P
t ti
Enterprise
Penetration
Introduction of Malware
Removable media with sensitive information can also easily
be lost or misplaced by company employees
employees, exposing organizations to irreparable data
loss and tight legal scrutiny
The loss and theft of laptop is a common occurrence.
C
Compliance
li
Requirements
R
i
t
protector
encryptor
inspector
discoverer
Content Aware
Application Control
Data Leakage Prevention
Through:
safenddiscoverer safendreporter
safendauditor
Data Classification
Data Fingerprinting
safenddiscoverer
f ddi
safendreporter
safendauditor
R l b
d managementt
Role
based
By administrative action or by Organizational Unit
Scalable architecture
A single management server can manage more than 75,000 endpoints
Built-in support for N+1 server clustering
S f d Data
Safend
D t Protection
P t ti Suite
S it Full
F ll Audit
A dit Trail
T il
Provides full visibility into:
Device connection and data transfer
events
protector
encryptor
inspector
discoverer
S f d Data
Safend
D t Protection
P t ti Suite
S it What
Wh t is
i New
N
?
Removable Storage anti
Malware
Smartphone and iPad Selective
Synchronization Control
Mac OS/X Port Device Control
Manage hardware encrypted
devices from Kingston and
SafeStick
protector
encryptor
inspector
discoverer
M
l
C
l-R
bl Storage
S
D i
Malware
Control
Removable
Devices
File Type Control Inbound File Protection
Prevent Stuxnet,
Stuxnet Conficker like attacks and other removable storage execution zero day
attacks
M A
Mac
Agentt
Port and Device Control
Selectively allow removable storage devices, log transfers.
Next steps
Removable Storage Encryption for Mac and Windows
Data Discovery
Content inspection
M
H d
E
t d Devices
D i
Manage
Hardware
Encrypted
Associate Devices and Users
Using implicit information from users usage and explicit
administrator
d i i t t associations
i ti
tto di
display
l d
detailed
t il d user,
machine and device logs.
Remote Wipe lost devices
When user leaves organization or loses device
S f d Inspector
I
t
Safend
Content Aware Application
Control
Data Leakage Prevention
Through:
protector
encryptor
discoverer
Printers
safendinspector
safend
inspector
O t off the
th box
b predefined
d fi d
Out
classifications and Policies
Interactive Message
g Center for
user education
C t tA
li ti C
t l
Content
Aware A
Application
Control
Allow all applications to run
while selectively blocking
access to sensitive content.
protector
Skype calls OK
encryptor
Skype chat OK
Skype file transfer OK
discoverer
safendinspector
safend
inspector
C t tA
li ti C
t l
Content
Aware A
Application
Control
Allow all applications to run
while selectively blocking
access to sensitive content.
protector
encryptor
discoverer
safendinspector
safend
inspector
P d fi d Classifications
Cl
ifi ti
d Policies
P li i
Predefined
and
PHI - UK Health & HIPAA
PCI (CC#)
PII (SSN, NINO, 29 other
countries)
Acceptable Use (racial,
sexual violence - English)
sexual,
protector
encryptor
discoverer
safendinspector
safend
inspector
Software IP
Schematics IP
EU/US Export Regulations
SOX sensitive financial
data
Pre-classified data and
metadata
- Proprietary & Confidential -
Cl
ifi ti methods
th d
Classification
Data Content
Regular Expressions
Mathematical verifiers
protector
encryptor
Heuristic Verifiers
Predefined classifications reusable
discoverer
safendinspector
safend
inspector
Data Fingerprinting
Map set of files as sensitive
without pointing to specific
text using originating
application
Use partial match to file as
indication of sensitivity
S f d Discoverer
Di
Safend
Endpoint Discovery
On all endpoints with
installed agent
protector
encryptor
As a professional service
inspector
discoverer
Policy Edit
Safend Protector
Key Features
Prevents data leakage and penetration
via endpoints
Detects and restricts any devices
Enforces granular policies over physical,
wireless and removable storage devices via
real-time analysis of low-level port traffic
Tamper-resistant
Centrally
y managed
g & seamlessly
y integrates
g
with Active Directory
Ensures regulatory compliance
Easy to use and scalable
safendprotector
safend
protector
encryptor
inspector
discoverer
Safend Protector
Security Features
Port Device & Storage Control
Port,
Allow, block or restrict the usage of any and all computer ports
Granular identification and approval of devices
U3 & A
Autorun
t
Control
C t l
Turns U3 USB drives into regular USB drives while attached to endpoints
Safend Protector
Track offline usage of Removable Storage
Extends visibility beyond the organization boundaries
Track file transfers from/to
corporate computers (offline)
Encrypted devices on non
non-corporate
Audit user actions for legitimate use of corporate date
Policyy
Global setting - Read/Write
Logs
Collected the next time the
device connects to the network
Available in File Logs
g
Safend Protector
CD/DVD Media White Lists
Allows white-listing of CD/DVD
Software Installation CDs
Approved content
CDs scanned to be virus-free
S f d Protector
Safend
P t t in
i Action
A ti
S f d Protector
Safend
P t t in
i Action
A ti
S f d Protector
Safend
P t t in
i Action
A ti
S f d Protector
Safend
P t t in
i Action
A ti
S f d Protector
Safend
P t t in
i Action
A ti
A non-permitted
d i connected
device
t d
to the endpoint
S f d Reporter
R
t
Safend
Key
y Features
Report on Security incidents
by Users
by Organizational Units
protector
encryptor
inspector
discoverer
Recurrence Reports
Safend Reporter
What it is
Why is it Valuable
Reports on irregular or
Suspicious behavior
Safend Reporter
Displays
Security
incidents in a
clean easy
clean,
easy-toto
use dashboard
format
Allows
Customization
of incident types
yp
to report on
Allows Admins
to slice, dice,
drill across
information
Reports
p
Safend Encryptor:
Key Features
Encrypts all data on laptops and
desktops Total Data Encryption
True SSO (Single Sign On) technology
protector
safendencryptor
discoverer
Safend Encryptor:
Completely Transparent
True SSO Technology:
to end users
protector
safendencryptor
p
pp
to help-desk
/ support
to user authentication
to patch management
to software distribution systems
inspector
discoverer
Tamper
p Resistant
The agent includes multi-tiered anti-tampering
capabilities to guarantee permanent control over
enterprise endpoints
Certifications:
Common Criteria EAL2 certified
FIPS 140
2 certified
ifi d
140-2
protector
encryptor
inspector
discoverer
protector
encryptor
inspector
discoverer
Examples of
Encryptor specific
ser er logs
server
drill-down
d
ill d
reports
t
display specific
endpoints
Displays endpoint
encryption complete
on time and date
Can be set to display
only
l active
ti
endpoints
Encryption process
takes place transparently
y
in background
Detailed
D t il d endpoint
d i t
status is displayed
in the Clients World
Thank You!
www safend com
www.safend.com
Name
Title
E il Address
Email
Add
Telephone #
- Proprietary & Confidential -
Additional Slides
Certifications
RSA Secured
Certifications
Microsoft WHQL Certification
Microsofts Windows Hardware Quality Labs testing process (WHQL) submits third-party products to
analysis which assesses the products for compatibility with Windows operating systems. By
completing this process
process, Safend solutions are designated as Windows compatible - offering a reliable
and consistent interoperability with the Windows operating systems. Microsoft requires all products
earning the Windows logo to maintain the following characteristics: all components must install and
uninstall properly and not interfere with other system components, each component must interoperate
well with other system components, and all components must function normally after the operating
system is upgraded to Windows XP or any later version of the operating systems for which the system
or component carries the logo
logo.
The compatibility with Windows operating systems insures a secure and hassle-free user experience
for Safend Protector customers.
For more information on Microsoft WHQL, visit: http://www.microsoft.com/whdc/whql/default.mspx
Check Point OPSEC Certification
OPSEC (Open Platform for Security) is the industry's open, multi-vendor security framework recognized worldwide as the standard for interoperability. Safend's solutions have successfully fulfilled
the stringent interoperability and lab testing required to achieve OPSEC certification, guaranteeing
integration and interoperability with Check Point's Secure Virtual Network Architecture.
For more information on Check Point OPSEC, visit:
http://www opsec com/solutions/partners/safend html
http://www.opsec.com/solutions/partners/safend.html
Ready for IBM Tivoli
software Tivoli software from IBM is a world-class leader in IBM Service Management software,
enables an IT organization to reduce the total cost of ownership and improve service levels of the IT
infrastructure. Tivoli systems management software helps traditional enterprises and e-businesses
worldwide
ld id manage security,
it storage,
t
performance
f
and
d availability,
il bilit and
d configuration
fi
ti and
d operations.
ti
The Safend Protector Tivoli Configuration Manager SPD File enables to you to distribute Safend
Protector Client v3.X to Tivoli endpoints using Tivoli Configuration Manager 4.2.3, both products are
now validated to work together improving the productivity of the IT staff and the overall compliance
posture of the organization. Read More
D t L
Data
Leakage
k
and
dT
Targeted
t d Attacks
Att k
A Clear and Present Danger
D t L
Data
Leakage
k
and
dT
Targeted
t d Attacks
Att k
A Clear and Present Danger
S f d Competitive
Safend
C
titi Overview
O
i
- Suite
S it
Unified DLP
Management
Yes
No
Partial
Partial
Partial
NO
Partial
No
No
Single DLP
Client
Yes
No
No
No
No
No
No
No
No
Yes
Basic
Basic
No
Yes
Basic
Media
Encryption
Yes
Yes
No
Yes
Basic
Hard Disk
Encryption
Yes
Yes
No
No
Basic
Content
p
Inspection
Yes
No
Yes
No
No
Basic
Yes
No
Partial
Partial
Partial
NO
No
Yes
No
No
No
No
No
No
Yes
Partial
Partial
Yes
Yes
No
No
No
No
Basic
No
Transparent PKI\Biometric
token support
Yes
No
No
No
No
Partial
No
Yes
Hard
Hard
Hard
Hard
Low
Hard
Partial
Yes
Basic
Basic
Yes
No
Single
g DLP Client
Enforce Encryption on any
Type of External storage
Device(HD, CD\DVD, Flash)
Fully Transparent Single
Sign On Authentication
Yes
No
Equal Employment
Opportunity Commission
US Navy
CA Mental Health
White House
Communications
Agency
State Department
- -Proprietary
Proprietary & Confidential
Confidential - -
CA Sonoma County
LA County Probation
Department
APAC
Ministry of Home
Affairs Singapore
Australian Department of
V t
Veterans
Affairs
Aff i
Ministry of justice UK
The Swiss Army
The Norwegian Army
Australian Attorney
Generals Department
European Office
of Aerospace R & D
Ministere De
L'Interieur
Australian
Federal
P li
Police
Reserve Bank of New
Zealand
Australian Department of
Prime Minister and Cabinet
N
New
Z
Zealand
l d Department
D
t
t off Internal
I t
l Affairs
Aff i
S l t dS
Selected
Safend
f d Healthcare
H lth
Customers
C t
S l t dS
Selected
Safend
f d Financial
Fi
i l Sector
S t Customers
C t
(Japan)
(Spain)
- -Proprietary
Proprietary & Confidential
Confidential - -
- -Proprietary
Proprietary & Confidential
Confidential - -
- -Proprietary
Proprietary & Confidential
Confidential - -
Case Study
Healthcare: Firmley Hospital NHS
The Company
Frimley Park Hospital is a 720 bed NHS Foundation Trust employing
approximately 3,500 staff and serving a catchment population of over
400,000.
The Challenge:
incorporate differing requirements across different areas of the business
where unusual or complex medical devices are in use.
The organization required a solution, which could be deployed within the
short
h t ti
timeframes
f
required
i db
by th
the new mandates,
d t
which
hi h was easy tto
manage and deploy and would not impact on the productivity of medical
staff and administrators.
Safends
Safend
s Solution:
flexibility and granularity of the Safend solution, with a phased roll-out of
the policies on a by department basis. This ensured that a consistent
machine-based policy could be implemented on most PCs with the
y for unusual medical equipment
q p
occasional custom machine-based p
policy
and custom user-based policies layered on top to address individual
needs.
The end result is that the Trust has an endpoint and mobile data security
system that is largely invisible to the user but which provides full
assurance that it has satisfied
f
its obligations in securing mobile data.
- Proprietary & Confidential -
Case Study
Government: Caerphilly County Borough Council
The Company
Caerphilly County Borough Council is the 4th largest
Local Authority in Wales and employs around 9,000
people.
p
p The Council delivers a wide range
g of services to
the 171,000 people living in the Caerphilly County
The Challenge:
Following many high profile cases regarding data
loss of USB devices throughout UK, and Caerphilly
CBC wanted to minimize these risks to the Authority
and ensure that their staff and the public were
protected from similar incidents
incidents.
To be able to identify the unique serial number held
within the removable device media.
Safends
Safend
s Solution:
In September 2008 the Authority implemented a full
lock down policy, allowing only encrypted, unique
serial numbered, Caerphilly CBC branded USB pen
di
drives
to b
be accessed
db
by approved
d staff
ff.
- Proprietary & Confidential -
Case Study
Government: Navy Mine Warfare Training Center
The Company
The only training center that trains sailors for
shipboard mine counter measures.
The Challenge:
To ensure the integrity and security of the sensitive
data used for instruction
Seamlessly control data access via portable devices
without impeding on instructors abilities to access
data for teaching purposes.
Safends
Safend
s Solution:
Deploying 350 licenses of Safend Protector to guard
against data leakage on nearly 850 ports throughout
the Navy Mine Warfare Training Center
C
Comprehensive
h
i S
Security
it off WiFi
WiFi, Fi
FireWire
Wi and
d
game ports
Case Study
Healthcare: LA County Department of Mental Health
The Company
The Los Angeles County Department of Mental
Health (DMH) serves approximately one-quarter of a
million residents each yyear, making
g it the largest
g
mental health service system in the nation.
The Challenge:
Protection from leakage
g of the Department of Mental
Health sensitive and personal client data for
thousands of residents.
Appropriately allow the safe use of USB memory
sticks while blocking dangerous file types
types.
Safends Solution:
Seamless deployment of Safend Auditor and
Protector to over 4,000
4 000 machines at its 130 locations
across LA County
Enforce protection policies to ensure that the data
being saved was authorized, encrypted and
approved
d tto access our corporate
t ports
t
- Proprietary & Confidential -
Safend
Safend was the clear choice to
manage DMHs thousands of
endpoints. We chose Safend
because its auditing and alerting
capabilities
biliti were superior
i to
t
other products we tested.
Additionally, Safend offers a
tamper proof agent that is
unbeatable,
- DMHs Departmental Security
Officer Jeff Zito
Case Study
Financial Ombudsman Service
The Company
A leading UK-based professional services company
The Challenge:
Protection from leakage of client bank account,
insurance policy, personal health information.
A solution that blocks input/output devices as a
security defense against system outages
outages.
Appropriately allow the safe use of USB memory
sticks while blocking dangerous file types.
Safends
Safend
s Solution:
Seamless deployment of Safend Auditor and
Protector to over 1,000 machines
Transparent
p
encryption
yp
of data transferred to
removable media devices
Protection of data from the threat of hardware
keylogger devices.
Safend
Safend Protector
Protectors
s interface is
straight-forward and well
presented Those benefits
combined with the fact that we
h
have
nott experienced
i
d any
security breaches since the
deployment means the project
can be considered a complete
success.
- William Knock, Infrastructure
Developer
att Financial
Fi
i l Ombudsman
O b d
Service
Case Study
Healthcare: Baptist Memorial Hospital
The Company
C
A leading private healthcare provider
The Challenge:
Establish company-wide data storage
policies to protect against data leakage
Achieve compliance with HIPAA
Eliminate the use of unauthorized USB
devices
Safends Solution:
C
Case
St
Study
d
Technology: Roke
The Company
A leading technology research and
development center
The Challenge:
Lack of visibility and control of data loss
via removable devices.
Threat of security breach from 1,200
unmonitored devices.
Enforcement of unique
q security
yp
policies
by device type.
Safends Solution:
Enhanced auditing and visibility into
user activity for regulatory compliance.
Real-time usage updates by device.
Policy control adjusted by domain
domain,
computer, or user.
Case Study
Finance: Winterthur Swiss Life Insurance
p y
The Company
A leading Swiss insurance company
The Challenge:
g
Gain control over the numerous amount of storage
devices connecting to corporate endpoints (mobile
workforce)
Enable easy deployment and management
Provide localized end user interface for
Winterthur's Japanese office
Achieve compliance with strict Japanese data
privacy standards
Safends Solution:
Allows easy deployment of Safend Protector and
policies using Active Directory
Device control only whitelisted devices
Localized end-user messages (Japanese)
Achieves regulatory compliance
- Proprietary & Confidential -
Wh t is
What
i being
b i
said
id about
b t Safend
S f d
Safend was chosen because of its comprehensive integrated suite of endpoint
security tools
tools, including reporting
reporting, port control and disk and media
encryption. The other major criterion for the selection was the need for a
centralised solution with minimal management overheads and the need for a
system
that was largely
to the user.
y
g y transparent
p
- Jonathan Spinks, Head of IT, Firmley Park NHS,
To our surprise, we didn't find many competitors in this particular space that
would give us the flexible and granular control we desired "
- Gilbert Mendoza, network administrator for Pechanga Resort & Casino
To our surprise, we didn't find many competitors in this particular space that would
give us the flexible and granular control we desired "
- Gilbert Mendoza, network administrator for Pechanga Resort & Casino
Safends products actually accomplish more than we expected. The product is
robust, helping us in our proactive quest to identify potential problems.
- Gene Peters, Director of Information Services, Philadelphia Stock Exchange
Safend
Safend Protector allows us to encrypt our confidential data and securely transport it
within our corporate network as well as outside the enterprise.
- Lenny Goodman, Director of Desktop Management for Baptist Memorial Health Care
Corporation.
After testing several products, we chose Safend Protector because of its flexible,
intuitive policies and its ironclad control over the various protocols and devices in
today's
today
s market such as USB, wireless, and removable media.
media.
-Ilan Cohen, CSO at Bank Hapoalim
- Proprietary & Confidential -
S
Security
it B
Breaches
h
EMEA
memory stick was believed to have
been lost in Edinburgh around
Christmas at Lothian and Borders
Police's headquarters. The stick
contains 750 entries on vehicles of
interest' to police, along with other
intelligence
intelligence
-- SC Magazine
A
A flash drive found in a library
computer center in Sweden contained
classified NATO information -theregister.co.uk
S
Security
it B
Breaches
h
EMEA
Security Breaches
US
A Kaiser Permanente hospital
located in a Los Angeles suburb has
fired 15 employees and reprimanded
eight others for improperly accessing
the personal medical records of
Nadya Suleman, the California
woman who gave birth to octuplets
in January.
-- Network World
Security Breaches
US
S
Security
it Breaches
B
h
APAC
9 memory sticks have been stolen from 5 Hong Kong hospitals. The devices
h ld th
hold
the personall iinformation
f
ti off 3,000
3 000 patients
ti t " -- thestandard.co.hk 2008
A
A former contract worker for Dai Nippon stole 9 million pieces of private data on
customers from 43 clients."
S
Security
it Breaches
B
h
APAC
S
Security
it B
Breaches
h
Government/Military
S
Security
it B
Breaches
h
Government/Military
S
Security
it Breaches
B
h
Education
A
A flash drive containing 7,000
student SSNs was stolen from
an employee at the University of
Cincinnati --Cincinnati Enquirer
S
Security
it Breaches
B
h
Education
Security
S
it Breaches
B
h
Finance
Talvest
T
l
t Mutual
M t l Funds
F d lost
l t a backup
b k
computer drive containing data of about
470,000 investors including names,
account numbers and SSNs
SSNs
--ITWorldCanada.com
Security
S
it Breaches
B
h
Finance
Security Breaches
Healthcare/Pharmaceuticals
The Georgia Department of
Community Health lost a CD
containing names, SSNs, and
addresses of 2.9
2 9 Million people on
Medicaid -- MSNBC
The
The California Department of Health Care
Services has notified nearly 30,000
individuals of a breach stemming from the
loss of a compact disk that may not have
been encrypted. - Healthcare Information Security
- Proprietary & Confidential -
Security Breaches
Healthcare/Pharmaceuticals
Security Breaches
Business
Security Breaches
Business
Security Breaches
Web, Email
Email systems
systems, file transfer systems,
systems instant messaging systems,
systems blogs,
blogs wikis,
wikis
Web tools, thumbdrives and other tools can be used to send confidential
information in violation of corporate policy, common sense and the law.
The result is that trade secrets
secrets, designs,
designs proprietary processes and other
knowledge assets can all be compromised if not adequately protected.
For example:
In 2008, Social Security numbers and names of 198 Marshall University
(Charleston, WV) students were posted to the Internet.
In 2008, an employee of Ivy Tech Community College (Bloomington, IN)
intended to send student information to a single employee, but inadvertently sent
an invitation to view the file to a much larger list.
2008 Osterman
O t
Research,
R
h Inc.
I
Why
Wh Your
Y
Organization
O
i ti Needs
N d to
t Implement
I l
t DLP
Security Breaches
Web, Email
In Januaryy 2009,, an employee
p y of p
public relations firm Ketchum used Twitter to
post some very unflattering comments about the city of Memphis shortly before
presenting to the worldwide communications group at FedEx Memphis largest
employer. An employee of FedEx discovered the tweet, responded to the
tweeter,
and then copied FedExs senior managers, the management of FedExs
communication department and the powers that be at Ketchum.
During April 2010, a Microsoft Excel worksheet that contained the names of
10,006 individuals, their occupations and other information was emailed to a
j
journalist
li t b
by someone iin th
the G
Gwentt (W
(Wales)
l ) police
li d
department.
t
t N
Nearly
l 900 off the
th
individuals identified in the worksheet had a criminal record.
During March 2010,
2010 a gubernatorial candidate in Massachusetts sent a
fundraising email to members of the states Senate and House in violation of
Massachusetts campaign finance laws
2010 Osterman Research, Inc. The Case for Outbound Content Management
Regulatory Fines
A ti N
Anti
Network
t
kB
Bridging
id i
R
Removable
bl Device
D i and
d Media
M di Encryption
E
ti
AES with 256 bit key length
encryption
Streamlined Wizard
E
t data
d t copied
i d tto removable
bl
Encrypts
storage devices, such as USB flash
drives, SD cards, external hard
drives, and CD/DVDs.
Encryption is transparent to users
within the corporate network
M d t the
th encryption
ti off data
d t
Mandates
transferred to external hard drives,
removable storage and media.
Data
D
t is
i iinaccessible
ibl outside
t id the
th
corporate network unless permitted
by the Safend Protector
administrator
Before
After
Bradesco - Brazil
Banco Davivenda -Colombia
Banco Banesco Panama
Banco Banesco Venezuela
Source: BankersAlmanac.com, except * Source: bank annual report, ** Source: bank data
I
l Ports
P
Internal
Monitor and alert on changes to internal computer
configurations
P t t against
Protect
i t
Connecting additional hard disks to extract data
Connecting network cards and other hardware
Logs/Alerts
/
in Client
C
Logs
Connect/disconnect
Port = Internal
- Proprietary & Confidential -
Compatibility in clients
Novell user login
External Database
Connect to existing Microsoft SQL database
Benefits
Re-use existing infrastructures
High performance
Scalabilityy (e.g.
( g database cluster))
Connect to reporting tools
Database
(Internal / External)
Logs
Policies/
Configuration
Setup
Connect to database during install
M i t
Maintenance
Key/Configuration backup supported
Log
g backup
p Administrator responsibility
p
y
- Proprietary & Confidential -
Management
Server
Safend Protector
File Type Control
Prevents
Data Leakage (Write)
Virus/Malware (Read)
I
i t Content
C t t (Read)
(R d)
Inappropriate
Category
SampleExtensions
PublishedDocuments
PDF,PS
Images
JPG, JPES,GIF,BMP
JPG,JPES,GIF,BMP
WebPages
MicrosoftOffice
Text&ProgramCode
Multimedia
CompressedArchives
CD/DVDImageFiles
Executables
PGPEncryption
ComputerAidedDesign
(CAD)
MicrosoftOutlook
Databases
FrameMaker
HTML,
HTM,MHT,HLP,CHM
DOC,DOCX,PPT,PPTX,
XLS
TXT,CPP,C,H,GCC,
JAVA
WAV,WMA,MP3,
MPG AVI
MPG,AVI
ZIP,ARJ,RAR,GZIP,JAR,
CAB
ISO,NRG
EXE DLL COM OCX
EXE,DLL,COM,OCX,
SYS
PGP
,
DWG,DXF
PST,DBX
MDB,ACCDB
MIF,BOOK,FM
Safend Protector
File Type Control
I
Inspection
ti Policy
P li Data
D t Channel
Ch
l Safend
S f d
Di
Discovery
Policy
P li
Cl
Classification
ifi ti
S f d Auditor
Safend
A dit
Key Features
Find out whos connecting what
devices and WiFi networks to
every endpoint
Identify and manage endpoint
vulnerabilities
protector
encryptor
inspector
discoverer
auditor
Computers to Audit
St 1a:
Step
1 Optionally
O ti
ll Refine
R fi your Search
S
h
Devices to detect
St 2:
Step
2 Run
R S
Scan tto G
Generate
t Report
R
t
Connection Summary