140 likes | 306 Views
Sharing Confidential Data and Preventing WikiLeaks. Colin Robbins Chief Technology Officer. Sharing Sensitive Data Is No Longer A Choice. The ability to share ‘security’ related information across Government departments lies at the heart of the National Security Strategies
E N D
Sharing Confidential Data and Preventing WikiLeaks Colin RobbinsChief Technology Officer
Sharing Sensitive Data Is No Longer A Choice • The ability to share ‘security’ related information across Government departments lies at the heart of the National Security Strategies • At the strategic level of Military command, data sharing enables better cross-government planning and more effective management and direction of campaigns • At a tactical level, data sharing facilitates collaborative planning and assists all echelons to achieve situational awareness; the key to effective decision making • But insecure sharing can have consequences…
Causes of Data Loss (Symantec, CESG IA 10, London, Sept 2010) Focus of this presentation is 2 and 3
What Is Data Guarding? • Ensuring the secure transfer of appropriate data • between separate networks • Key part of a DLP solution, but additionally: • Data at Rest • Discovery • Client technologies • Encryption technologies
Architectural Model • Open model applies to any data transfers: • Email • File transfer • Copy to USB stick • Mobile access device • Printer • Web services Policy DecisionPoint DataTransmission Data Capture Policy EnforcementPoint Data Out Data in Rejected
Nexor Watchman for UAG • Microsoft Forefront Unified Access Gateway: • Allows access based on authentication and application authorization models • The addition of Nexor Watchman: • Enables access based on document content • Enables access based on document protective marking • Controls access based on network location
Cloud Protection (simplified model) SAAS, e.g., Microsoft Business Productivity Online Suite ClassifiedNetwork Guard Watchman UAG
Summary • Data Loss Prevention is multi-faceted • This community is well placed to protect itself: • Robust policy and procedures • This enables technology solutions: • Demonstrated technology can be used to protect classified asserts, while enabling data sharing for legitimate business purposes
For more information on Nexor Watchman for UAG: • www.nexor.com • Or come to our table for a CD • Solution White Paper • Full Video Colin RobbinsChief Technology Officer Tel: +44 115 952 0500colin.robbins@nexor.com