1 / 33

Check Point Makes DLP Work

Check Point Makes DLP Work. April 22 , 2010. Agenda. 1. 2. 3. 4. What is Data Loss?. Key Challenges of DLP. Introducing Check Point DLP. Summary. Check Point DLP Makes data loss prevention work. Data Loss Prevention. Data breaches have happened to all of us. What is DLP?.

vartan
Download Presentation

Check Point Makes DLP Work

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Check Point Makes DLP Work April 22, 2010

  2. Agenda 1 2 3 4 What is Data Loss? Key Challenges of DLP Introducing Check Point DLP Summary Check Point DLP Makes data loss prevention work

  3. Data Loss Prevention Data breaches have happened to all of us What is DLP? John.Stevens@yahoo.com Corporate Strategy Green World Strategy Plan 2010 Company document uploaded to an external website. E-mail sent to the wrong recipient, intentionally or by mistake.

  4. Data Breaches—Headline Examples Brand Damage Compliance Liabilities Costly Fines

  5. It’s Not Just About Regulatory Compliance Compliance Security • Customer data • Corporate data • Patient data • Intellectual property • Strategic plans • Internal data Chief Compliance Officer Chief Security Officer

  6. DLP Has Not Yet Been Solved! Technology IT Staff Challenge Challenge Burden of incident handling Computers can not reliably understand human content and context Exposure to sensitive data

  7. Check Point Makes DLP Work Data Loss Prevention Alert An email that you have just sent has been quarantined. Reason: attached document contains confidential internal data The message is being held until further action. Send ,Discard , or Review Issue Confidential data sent to the wrong recipient! User prompted to take action User remediates ‘John’ <john@greenworld.com> John.Stevens@yahoo.com John.Stevens@yahoo.com Corporate Strategy Green World Strategy Plan 2010 John, Let’s review the corporate strategy in our morning meeting.

  8. Introducing Check Point Data Loss Prevention Prevent Move from detection to prevention Data Loss Prevention Alert An email that you have just sent has been quarantined. Reason: attached document contains confidential internal data The message is being held until further action. Send ,Discard , or Review Issue Educate Users on corporate data policies Enforce Data loss business processes Check Point Combines Technology and Processes to Make DLP Work NEW! John.Stevens@yahoo.com Corporate Strategy Green World Strategy Plan 2010 John, Let’s review the corporate strategy in our morning meeting.

  9. Check Point Solves the DLP Challenge TechnologyChallenge Empowers users to remediate incidents in real time IT Staff Challenge Educates users on DLP policies without involving IT staff New UserCheck™ Technology

  10. How Does Check Point DLP Work? MultiSpect™ Detection Engine Simple Rule-based Policy Management Full Network Enforcement

  11. New MultiSpect™ Technology 600+ File Formats 250+ Data Types Correlates data from multiple sources using open language Detects more than 600 file formats Over 250 pre-defined content data types Detect and recognize proprietary forms and templates MultiSpect Detection Engine

  12. Simple Rule-based Policy Management Easily Define Policy to Detect, Prevent or Ask User

  13. Unified Control and Deployment For Unified Control Across the Entire Security Infrastructure Centralized Management Data Loss Prevention

  14. Ease-of-Deployment On Existing Gateways or Open Servers Be Up and Running Day-1! DLP-1 Dedicated Appliance Software Blade Network-based Inline Solution

  15. Check Point DLP At-A-Glance Scaling from hundred to thousandsof users Supporting HTTP, SMTP and FTP protocols Move from Detection to Prevention Inline network-based Software Bladerunning on any existing Check Point gateway UserCheck notification using either thin agent or a returning email to the user Proactively block intentional and unintentional data loss

  16. Check Point DLP Summary Enforce Data PoliciesAcross the entire network Educate and Alert UsersWithout involving IT staff Prevent Data BreachesMove from detection to prevention Check Point combines technology and processes to make DLP work

  17. Thank You!

  18. Check Point DLP in Detail Check Point DLP User Scenarios Key DLP Technologies

  19. Check Point DLP at Work Filter communications of confidential information based on policy exception Block Web upload of proprietary information Ask user to confirm and remediate potential breach Scenario 1: Prevent Scenario 2: Enforce Scenario 3: Alert, Ask and Educate

  20. Preemptively Prevent Data Breaches Developer uploads source code to file share to work on from home Rights to files posted to file-sharing sites transfer to host site Check Point DLP blocks upload and notifies user Web Upload of Proprietary Information http://mywebuploads.com Software Developer Jenn@gmail.com jsimmons@dlpdemo.com Code subroutine to work on from home

  21. Filter Based on Corporate Data Policies Data Loss Prevention Alert An email that you have just sent has been identified as containing sensitive information. An email that you have just sent has been allowed based on DLP policy exception. For additional details, please refer to the Corporate Data Security Policy jcraicg@mylawyer.com M&A letter of intent for review Corporate VP sends M&A contract to attorney Alert notifies user of data policy ProjectAtlantisLoI.pdf Policy Exception Allows Email to Pre-selected Recipients Hi James, We have revised the terms of the acquisition. Attached is the Letter of Intent for your review. Thanks,David Corporate Development VP

  22. Alert, Ask and Educate Users Company CFO sends preliminary financial statement to external auditor Alert asks owner of sensitive data to confirm communication User provides an explanation of his request to send Check Point Brings User Remediation to DLP Greg.Smith@ernstyoung.com mattg@dlpdemo.com Preliminary Financial Statement Reconsider sending this email (Preli… Preliminary_financials.pdf Preliminary Financial Statement The attached message, sent by you, is addressed to an external email address. The Check Point Data Loss Prevention System determined that it may contain confidential information. Email’s attachment Preliminary_financials.pdf appears to contain financial records. The message is being held until further action. Send, Discard, or Review Issue Greg, Sending you the Q1 preliminary financials for audit. Thanks, Matt Gerhart Chief Financial Officer ACME Corp. mattg@acmecorp.com Check Point Data Loss Prevention Reconsider sending this email (Prelimi… Fri 4/2/2010 3:45 PM Rachel Greene Fri 4/2/2010 1:23 PM PCI Audit Status Thu 3/2/2010 9:45 AM Tom Peters Sales Planning Meeting Preliminary Financial Statement mattg@acmecorp.com Chief Financial Officer Hi, This information is OK to send to our outside auditor. Thanks, Matt

  23. Key Technologies UserCheck™ provides User Remediation Align DLP Rules to Your Policies and Processes MultiSpect™ Detection Engine

  24. UserCheck Provides User Remediation Data Loss Prevention Alert An email that you have just sent has been quarantined. Reason: attached document contains confidential internal data The message is being held until further action. Send ,Discard , or Review Issue 2. User alert 1. Mail sent or document uploaded 3. User remediation Real-time Educational Non-disruptive

  25. Align With Your Business Processes Suspicious Communications Examples • Spreadsheets with over 500 rows • More than 5 financial terms • External recipients in BCC • More than 10 company names • Profanity Adapts to Your Processes and Environment Identify unconventional business communication behavior

  26. MultiSpect™ Detection Engine Multi-data Correlation Prevents Potential Violations Prevents sending sensitive data to wrong recipients Correlates a combination of data types

  27. MultiSpect Form Detection • Forms/Partial Forms • Recognize sensitive forms and templates Detect and Recognize Your Proprietary Forms • Examples • HR forms / salary / offers • Financial docs • Patient records • Insurance forms • Bank forms Insurance claim.pdf

  28. MultiSpect Open Scripting Language Custom Data Type • Open Scripting Language Extended Data Type Creation • Create completely new data types • Enhance existing data types • Flexibly tailor DLP to your environment

  29. DLP-1 Appliance Specifications

  30. Check Point DLP Software Blade

  31. DLP-1 9571 Appliances—Accessories

  32. Check Point DLP Summary Enforce Data PoliciesAcross the entire network Educate and Alert UsersWithout involving IT staff Prevent Data BreachesMove from detection to prevention Check Point combines technology and processes to make DLP work

  33. Thank You!

More Related