210 likes | 501 Views
When Encryption Isn't Enough …. Kamal Sharma – Technical Consultant kamal_s@trendmicro.com. Agenda. The Impact Encryption Modules Think Again DPL and SPN Summary. The Impact of Data Loss. * Ponemon Institute. Cost: $6.3M per breach * Loss of customers/business Brand damage
E N D
When Encryption Isn't Enough … Kamal Sharma – Technical Consultant kamal_s@trendmicro.com
Agenda • The Impact • Encryption Modules • Think Again • DPL and SPN • Summary
The Impact of Data Loss * Ponemon Institute Cost: $6.3M per breach* Loss of customers/business Brand damage Stock price decrease Regulatory fines Legal defense Notification and compensation Public relations & security response
Trend Micro Encryption Solutions Securing Enterprise Data Email Identify-Based Encryption (IBE) at gateway, desktop and hosted Endpoint Software and hardware full disk encryption, file/folder encryption, removable media encryption, device control Cloud SecureCloud encrypts Private/Public Cloud Data New! CD/DVD Gateway Email Encryption USB
Trend Micro Endpoint EncryptionProtection Modules Management Console Software Full Disk Encryption Encrypted USBs (Hardware) Endpoint Encryption PolicyServer Module Endpoint Encryption DataArmor Module KeyArmor Self-Encrypting Drives (SED) File/Folder & Removable Media Encryption Endpoint Encryption DriveArmor Module Endpoint Encryption FileArmor Module
Criminal Threats: • Come from many sources, spam, spyware, malicious sites and employee downloads • Hackers: • Compromise web-based applications to access databases • Insider Threats: • Malicious and accidental breaches of private data and intellectual property • Lost and stolen laptops Think Your Data is Secure? Think Again External Attacks Organizational Data Internal Threats! 59% of all data loss originates from the INSIDE* * Source: datalossdb.org 6
1 2 3 4 5 6 The Importance of Endpoint Protection Top Threat Vectors of Concern … USB USB Corporate email Email on the public Internet Email on the public Internet WiFi WiFi CD / DVD CD / DVD Many of these concerns can ONLY be addressed via endpoint intelligence PDA PDA Bluetooth / infrared Bluetooth / infrared Printer Most Concerned Least Concerned Source: Market Research International 7
Endpoint Trend Miro DLP Solution Data Discover * Network Monitor Discover, Monitor and Protect DLP Policy Management, Policy, Workflow & Reporting DLP Management Server * Data discovery bundled into Endpoint offering
Trend Micro DLP Solution • DLP Management Server • Centralized Management • Policy • Visibility • Workflow • DLP Endpoint • Discover DLP Agent • Monitor • User Self-Remediation • Protect • DLP Network Monitor • Monitor • Report Form factor: software/virtual/ hardware appliance File Repositories Document Management Systems Internet Firewall Gateway Desktop Laptop Form factor: software appliance Form factor: software Trend Micro Confidential 7/16/2014 9
Monitor Protect ACME Customer Privacy Protection Employees of ACME are expectedto protect sensitive informationcontaining customer information such as names, account numbers,social security numbers etc. Please report any …Call the helpdesk or email. Discover Management Server • TMDLP Management Server • Centralized Management • Policy • Workflow • Reporting Trend Micro DLP for Endpoint Product Components • TMDLP for Endpoint • Intelligent • Fingerprint, Regex, Keyword, Meta-data • Small Footprint • Invisible • Independent • Robust Educate/Self Remediation Endpoint
Fingerprinting Technology for Unstructured Data Protection • Fast • Small • Accurate • Language independent 11
Data Security + Content SecurityOn-Premise + Cloud-based Solutions + • Email Reputation • Web Reputation • File Reputation • With Global Threat Feedback 12
Thank You Learn more: www.trendmicro.com/us/home/enterprise