130 likes | 302 Views
Sharing Sensitive Data Is No Longer A Choice. The ability to share ?security' related information across Government departments lies at the heart of the National Security StrategiesAt the strategic level of Military command, data sharing enables better cross-government planning and more effective
E N D
1. Colin RobbinsChief Technology Officer The Microsoft Forefront UAG (Unified Access Gateway) provides a general framework to allow authenticated remote clients to securely access application data behind a corporate firewall over a web connection. Nexor Watchman for UAG is a filter that plugs into Microsoft Forefront UAG to enhance the security model by scanning data returned in a web request to check it is conformant to a security policy.
This presentation will describe and demonstrate how this solution can be used in defence environments to enable the sharing of confidential data between domains in both traditional web client / server models and cloud environments, while maintain control to help prevent WikiLeaks.
The Microsoft Forefront UAG (Unified Access Gateway) provides a general framework to allow authenticated remote clients to securely access application data behind a corporate firewall over a web connection. Nexor Watchman for UAG is a filter that plugs into Microsoft Forefront UAG to enhance the security model by scanning data returned in a web request to check it is conformant to a security policy.
This presentation will describe and demonstrate how this solution can be used in defence environments to enable the sharing of confidential data between domains in both traditional web client / server models and cloud environments, while maintain control to help prevent WikiLeaks.
2. Sharing Sensitive Data Is No Longer A Choice The ability to share ‘security’ related information across Government departments lies at the heart of the National Security Strategies
At the strategic level of Military command, data sharing enables better cross-government planning and more effective management and direction of campaigns
At a tactical level, data sharing facilitates collaborative planning and assists all echelons to achieve situational awareness; the key to effective decision making
But insecure sharing can have consequences…
4. Causes of Data Loss Defending 1 is about defense in depth and knowing your network. Nexor is undertaking some ground breaking research in this area, but this is a story for another day.
Today, we are focusing on helping prevent accidents and trying to stop the malicious, but not hi-tec attacks leaks.
If you not protected from the script kiddy, fire your IT security people.Defending 1 is about defense in depth and knowing your network. Nexor is undertaking some ground breaking research in this area, but this is a story for another day.
Today, we are focusing on helping prevent accidents and trying to stop the malicious, but not hi-tec attacks leaks.
If you not protected from the script kiddy, fire your IT security people.
5. Prevention All about People / Process / Technology (Product)
This community has good process, and good training for people, so technology in a good position to help.All about People / Process / Technology (Product)
This community has good process, and good training for people, so technology in a good position to help.
6. What Is Data Guarding? Ensuring the secure transfer of appropriate data
between separate networks
Key part of a DLP solution, but additionally:
Data at Rest
Discovery
Client technologies
Encryption technologies
One specific bit of technology…One specific bit of technology…
7. Architectural Model Open model applies to any data transfers:
Email
File transfer
Copy to USB stick
Mobile access device
Printer
Web services
8. Nexor Watchman for UAG Microsoft Forefront Unified Access Gateway:
Allows access based on authentication and application authorization models
The addition of Nexor Watchman:
Enables access based on document content
Enables access based on document protective marking
Controls access based on network location
9. Video Demonstration
10. Protecting the Cloud
11. Cloud Protection (simplified model) Stress “simplified model” – fully expect classified network will be separated into several sub-components, firewalls etc.Stress “simplified model” – fully expect classified network will be separated into several sub-components, firewalls etc.
12. Summary Data Loss Prevention is multi-faceted
This community is well placed to protect itself:
Robust policy and procedures
This enables technology solutions:
Demonstrated technology can be used to protect classified asserts, while enabling data sharing for legitimate business purposes