1 / 13

Kamal Sharma – Technical Consultant kamal_s@trendmicro.com

When Encryption Isn't Enough …. Kamal Sharma – Technical Consultant kamal_s@trendmicro.com. Agenda. The Impact Encryption Modules Think Again DPL and SPN Summary. The Impact of Data Loss. * Ponemon Institute. Cost: $6.3M per breach * Loss of customers/business Brand damage

fred
Download Presentation

Kamal Sharma – Technical Consultant kamal_s@trendmicro.com

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. When Encryption Isn't Enough … Kamal Sharma – Technical Consultant kamal_s@trendmicro.com

  2. Agenda • The Impact • Encryption Modules • Think Again • DPL and SPN • Summary

  3. The Impact of Data Loss * Ponemon Institute Cost: $6.3M per breach* Loss of customers/business Brand damage Stock price decrease Regulatory fines Legal defense Notification and compensation Public relations & security response

  4. Trend Micro Encryption Solutions Securing Enterprise Data Email Identify-Based Encryption (IBE) at gateway, desktop and hosted Endpoint Software and hardware full disk encryption, file/folder encryption, removable media encryption, device control Cloud SecureCloud encrypts Private/Public Cloud Data New! CD/DVD Gateway Email Encryption USB

  5. Trend Micro Endpoint EncryptionProtection Modules Management Console Software Full Disk Encryption Encrypted USBs (Hardware) Endpoint Encryption PolicyServer Module Endpoint Encryption DataArmor Module KeyArmor Self-Encrypting Drives (SED) File/Folder & Removable Media Encryption Endpoint Encryption DriveArmor Module Endpoint Encryption FileArmor Module

  6. Criminal Threats: • Come from many sources, spam, spyware, malicious sites and employee downloads • Hackers: • Compromise web-based applications to access databases • Insider Threats: • Malicious and accidental breaches of private data and intellectual property • Lost and stolen laptops Think Your Data is Secure? Think Again External Attacks Organizational Data Internal Threats! 59% of all data loss originates from the INSIDE* * Source: datalossdb.org 6

  7. 1 2 3 4 5 6 The Importance of Endpoint Protection Top Threat Vectors of Concern … USB USB Corporate email Email on the public Internet Email on the public Internet WiFi WiFi CD / DVD CD / DVD Many of these concerns can ONLY be addressed via endpoint intelligence PDA PDA Bluetooth / infrared Bluetooth / infrared Printer Most Concerned Least Concerned Source: Market Research International 7

  8. Endpoint Trend Miro DLP Solution Data Discover * Network Monitor Discover, Monitor and Protect DLP Policy Management, Policy, Workflow & Reporting DLP Management Server * Data discovery bundled into Endpoint offering

  9. Trend Micro DLP Solution • DLP Management Server • Centralized Management • Policy • Visibility • Workflow • DLP Endpoint • Discover DLP Agent • Monitor • User Self-Remediation • Protect • DLP Network Monitor • Monitor • Report Form factor: software/virtual/ hardware appliance File Repositories Document Management Systems Internet Firewall Gateway Desktop Laptop Form factor: software appliance Form factor: software Trend Micro Confidential 7/16/2014 9

  10. Monitor Protect ACME Customer Privacy Protection Employees of ACME are expectedto protect sensitive informationcontaining customer information such as names, account numbers,social security numbers etc. Please report any …Call the helpdesk or email. Discover Management Server • TMDLP Management Server • Centralized Management • Policy • Workflow • Reporting Trend Micro DLP for Endpoint Product Components • TMDLP for Endpoint • Intelligent • Fingerprint, Regex, Keyword, Meta-data • Small Footprint • Invisible • Independent • Robust Educate/Self Remediation Endpoint

  11. Fingerprinting Technology for Unstructured Data Protection • Fast • Small • Accurate • Language independent 11

  12. Data Security + Content SecurityOn-Premise + Cloud-based Solutions + • Email Reputation • Web Reputation • File Reputation • With Global Threat Feedback 12

  13. Thank You Learn more: www.trendmicro.com/us/home/enterprise

More Related