1 / 23

Sophos Safeguard Enterprise: A Solution for Data Protection

Sophos Safeguard Enterprise: A Solution for Data Protection. Presented by: W3(cube). Problem statement. Threat of Data theft or exposure from lost, stolen, or inappropriate decommissioned laptops. What is security?.

daxia
Download Presentation

Sophos Safeguard Enterprise: A Solution for Data Protection

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Sophos Safeguard Enterprise: A Solution for Data Protection Presented by: W3(cube)

  2. Problem statement Threat of Data theft or exposure from lost, stolen, or inappropriate decommissioned laptops.

  3. What is security? “In the real world, security involves processes. It involves preventative technologies, but also detection and reaction processes, and an entire forensic system to hunt down and prosecute the guilty. Security is not a product; it itself is a process…..” Bruce Shneiner (Secrets and Lies, Wiley and Sons, Inc.)

  4. Challenges to achieving laptop security • Cost • User negligence/sabotage of security measures • Increased value of information • Increase in access to computers =increased hackers not limited by time and space

  5. The Threat to Data is Real!!

  6. A Perspective on Laptop Theft and Data Loss • Laptop theft and data loss are escalating concerns for companies of all sizes - from Fortune 500 level to small-to-medium sized businesses - and according to the FBI, 97% of stolen laptops are never recovered. • As employees become increasingly more mobile and rely on multiple mobile devices from laptops, smartphones and iPads to conduct business, crimes associated with these devices are also on the rise. Malicious insiders as well as outside culprits are increasingly becoming more innovative and inventive in finding ways to steal valuable information and proprietary data from company and employee mobile devices and laptops that don't have appropriate endpoint security. Source: http://www.bizjournals.com/losangeles/prnewswire/press_releases/California/2011/11/07/LA00777 Los Angeles Business: Awareness Technologies Security Advisory: Top tips to prevent laptop theft (Nov 7, 2011)

  7. Myths on data security The field of data security is rife with mistaken beliefs which cause people to design ineffective security solutions. Here are some of the most prevalent security myths: Myth: Hackers cause most security breaches. • In fact, 80% of data loss is to caused by insiders. Myth: Encryption makes your data secure. • In fact, encryption is only one approach to securing data. Security also requires access control, data integrity, system availability, and auditing. Myth: Firewalls make your data secure. • In fact, 40% of Internet break-ins occur in spite of a firewall being in place. To design an effective security solution you must understand the security requirements scope of current threats to your data. http://Data Security Challenges:Oracle9i Security Overview

  8. Four Elements of an Effective Data Loss Prevention Strategy • Control devices, applications, email and web usage • Ensure security policy compliance Control User Environment by restricting data exit points • Empower knowledge workers to classify sensitive business data • Apply classification to existing documents and data sets Effective Data Loss Prevention Strategy (DLP) Classify intellectual property and sensitive business data Protect confidential and sensitive information • Full disk, removable storage and file encryption • Email encryption Prevent leakage of personal identifiable information • Comprehensive coverage of personally identifiable information types • Continuously assess, audit, report and enforce on endpoint and gateway Source: Sophos / Utimaco Data Loss Prevention by Peter Szendröi, SOPHOS Nordics(Jan 20, 2010) page 10

  9. Top IT Security Solutions Organizations are using Source: Harris Interactive: IT Security Final Report July 2011

  10. Agreement with Statement about currently available IT security Solutions Source: Harris Interactive: IT Security Final Report July 2011

  11. Solution Sophos Safeguard Enterprise

  12. Overall Cascadia Lab’s Summary comparison http://www.sophos.com/en-us/security-news-trends/security-trends/enterprise-review.aspx - comparison

  13. Comparison of key solution providers in the market today by category Source: Cascadia Labs: Comparative Review of Endpoint Security for Enterprises Comparative review Link

  14. SC Magazine Awards 2011 Best Mobile/Portable Device Security • Good Technology for Good for Enterprise • IronKey for IronKey Enterprise • McAfee for McAfee Enterprise Mobility Management (McAfee EMM) • Sophos for Sophos SafeGuard Enterprise • Symantec for Symantec Endpoint Protection Mobile Edition Best Endpoint/UTM Security • Check Point Software Technologies for Check Point UTM-1 • McAfee for McAfee Total Protection for Endpoint, Enterprise Edition • SonicWALL for SonicWALL E-Class Network Security Appliance (NSA) E8500 • Sophos for Sophos Endpoint Security and Data Protection • Symantec for Symantec Endpoint Protection 11.0 SC Awards 2011

  15. Sophos as a solution Sophos is a series of software based components that comprise and entire suite

  16. Case Study – Financial & Legal – http://www.sophos.com/en-us/your-needs/case-studies/financial.aspx

  17. Case Study – Government http://www.sophos.com/en-us/your-needs/case-studies/government.aspx

  18. SC Magazine Awards 2011 Best Mobile/Portable Device Security • Good Technology for Good for Enterprise • IronKey for IronKey Enterprise • McAfee for McAfee Enterprise Mobility Management (McAfee EMM) • Sophos for Sophos SafeGuard Enterprise • Symantec for Symantec Endpoint Protection Mobile Edition Best Endpoint/UTM Security • Check Point Software Technologies for Check Point UTM-1 • McAfee for McAfee Total Protection for Endpoint, Enterprise Edition • SonicWALL for SonicWALL E-Class Network Security Appliance (NSA) E8500 • Sophos for Sophos Endpoint Security and Data Protection • Symantec for Symantec Endpoint Protection 11.0 SC Awards 2011

  19. Analysis of Total Cost of Ownership (TCO) • 9 companies interviewed in-depth and costs analyzed: • Amica Life Insurance • Lincoln Public Schools • AW Chestern • British Services Company • Central Ohio Primary Care Physicians • US Healthcare Provider • CGh Medical Center • Germany Company • Escabia County School District

  20. Sample Vendor Vs. Sophos: Cost Savings Analysis Over a 5 Year Period • Total cost for sample company =$1.3M • Total cost for Sophos = $880K *Analysis shows significant savings of $420K can be experienced for switching to and managing Sophos end point and security over a 5 Year period Source: Business Trends “A Strategic Overview Featuring Gartner Content” Featuring: A Buyers Guide to End Point Protection Programs (May 2009) *The costs were calculated based on licensing, infrastructure and operational data provided by the companies interviewed

  21. Sample Vendor Vs. Sophos: Extent of Cost Category to Total Cost • Represents largest cost at of the TCO *Analysis shows significant savings of $420K can be experienced by switching to and managing Sophos end point and security over a 5 Year period Source: Business Trends “A Strategic Overview Featuring Gartner Content” Featuring: A Buyers Guide to End Point Protection Programs (May 2009) *The costs were calculated based on licensing, infrastructure and operational data provided by the companies interviewed

  22. Snapshot of Voice of the Sophos End Point Security Customer “The high volume of calls to our IT department with McAfee was one of the key reasons we switched to Sophos” – Head of Global System& Security Solutions, German Company “Sophos has saved me a lot of time with their administrative tools. The deployment is easier and I’ve been impressed with the client removal tool, it removes Symantec very well” – IT Manager CGH Medical Center “The Sophos Console provides a snapshot of what’s going on at a glance. Symantec is definitely not easy to use. We need to see at a glance if there is something wrong” - Technical & Operations Security Administrator US Health Care Provider McAfee proved to be more expensive from the point of view that it charged for every module. When we reviewed Sophos it was al part of one purchase and the price was less than for McAfee” – Technical Services Manager, British Services Company “Sophos was the only tool that did not care if clients are Macs or PCs, It was the only cross platform solution at the time” – Director of Technology Lincoln Public Schools Sophos offers a cost effective, easy to deploy/use, flexible with proven data loss prevention capabilities Source: Business Trends “A Strategic Overview Featuring Gartner Content” Featuring: A Buyers Guide to End Point Protection Programs (May 2009)

  23. In Closing…. Sophos, Simply Secure Back up Slides An organization’s risk of threat of Data theft or exposure from lost, stolen, or inappropriately decommissioned laptops is greatly reduced with Sophos end point security protection. However, Organizations must remain proactive and vigilant and constantly review products & services to meet increasingly sophisticated threats of data theft. Diagram Source: Sophos / Utimaco Data Loss Prevention by Peter Szendröi, SOPHOS Nordics(Jan 20, 2010) page 2

More Related