DLP customer presentation

477
-1

Published on

Published in: Technology, Business
0 Comments
1 Like
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total Views
477
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
0
Comments
0
Likes
1
Embeds 0
No embeds

No notes for slide

DLP customer presentation

  1. 1. Check Point MakesDLP WorkApril 22, 2010 ©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone
  2. 2. Agenda1 What is Data Loss?2 Key Challenges of DLP3 Introducing Check Point DLP4 Summary Check Point DLP Makes data loss prevention work ©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | 2 2
  3. 3. Data Loss Prevention What is DLP? John.Stevens@yahoo.com Corporate Strategy Green World Strategy Plan 2010 Company document uploaded E-mail sent to the wrong to an external website. recipient, intentionally or by mistake. Data breaches have happened to all of us ©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | 3 3
  4. 4. Data Breaches—Headline Examples Brand Damage Compliance Liabilities Costly Fines ©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | 4 4
  5. 5. It’s Not Just AboutRegulatory Compliance Compliance Security► Customer data ► Intellectual property► Corporate data ► Strategic plans► Patient data ► Internal data Chief Compliance Chief Security Officer Officer ©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | 5 5
  6. 6. DLP Has Not Yet Been Solved! Technology IT Staff Challenge Challenge Computers can not Burden of incident reliably understand handling human content and Exposure to context sensitive data ©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | 6 6
  7. 7. Check Point Makes DLP Work Data Loss Prevention Alert An email that you have just sent has been quarantined. Confidential ‘John’ <john@greenworld.com> John.Stevens@yahoo.com data sent to the John.Stevens@yahoo.com Corporate Strategy Reason: attached document contains wrong recipient! confidential internal data Green World Strategy Plan 2010 User prompted John, to take action The message is being held until further action. Let’s review the corporate strategy in our Send , Discard , or Review Issue User remediates morning meeting. ©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | 7 7
  8. 8. Introducing Check PointData Loss Prevention Check Point Combines Technology NEW! and Processes to Make DLP Work John.Stevens@yahoo.com Prevent Corporate Strategy Move from detection Green World Strategy Plan 2010 to prevention Data Loss Prevention Alert John, An email that you have just sent has been Let’sreview the corporate strategy quarantined. in Educate our morning meeting. Users on corporate Reason: attached document contains confidential internal data data policies The message is being held until further action. Enforce Send , Discard , or Review Issue Data loss business processes ©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | 8 8
  9. 9. Check Point Solves the DLP Challenge New UserCheck™ Technology Technology Challenge Empowers users to remediate incidents in real time IT Staff Challenge Educates users on DLP policies without involving IT staff ©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | 9 9
  10. 10. How Does Check Point DLP Work? MultiSpect™ Detection Engine Simple Rule-based Policy Management Full Network Enforcement ©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | 10 10
  11. 11. New MultiSpect™ Technology Correlates data from multiple MultiSpect Detection Engine sources using open language Item Name Social Job Title Gross Pay No. 250+ Data Types 600+ File Formats Security Detects more than 600 file formats Number 1 John Smith 987-65-4320 CEO $200,000 2 Kevin Brian 987-65-4221 VP R&D $150,000 Over 250 pre-defined 3 Margret 769-65-7522 VP $153,000 White Marketing content data types 4 Bob Johns 342-62-3323 CFO $140,000 5 Mike Riddle 777-43-4324 COO $180,000 Detect and recognize proprietary forms and templates ©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | 11 11
  12. 12. Simple Rule-based Policy Management Easily Define Policy to Detect, Prevent or Ask User ©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | 12 12
  13. 13. Unified Control and Deployment Centralized Management Data Loss Prevention For Unified Control Across the Entire Security Infrastructure ©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | 13 13
  14. 14. Ease-of-Deployment Network-based Software Blade Dedicated Appliance Inline Solution On Existing Gateways or Be Up and Running Open Servers DLP-1 Day-1! ©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | 14 14
  15. 15. Check Point DLP At-A-Glance Move from Detection to Prevention Proactively block intentional and unintentional data loss Inline network-based Software Blade running on any existing Check Point gateway Supporting HTTP, SMTP and FTP protocols UserCheck notification using either thin agent or a returning email to the user Scaling from hundred to thousands of users ©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | 15 15
  16. 16. Check Point DLP Summary Check Point combines technology and processes to make DLP work Prevent Data Breaches Move from detection to prevention Enforce Data Policies Across the entire network Educate and Alert Users Without involving IT staff ©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | 16 16
  17. 17. Thank You! ©2010 Check Point Software Technologies Ltd. | [Restricted] ONLY for designated groups and individuals
  18. 18. Check Point DLP in Detail Check Point DLP User Scenarios Key DLP Technologies ©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | 18 18
  19. 19. Check Point DLP at Work Scenario 1: Block Web upload of proprietary Prevent information Scenario 2: Filter communications of confidential information based on Enforce policy exception Scenario 3: Ask user to confirm and remediate Alert, Ask potential breach and Educate ©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | 20 20
  20. 20. Preemptively Prevent Data Breaches Web Upload of Proprietary Information http://mywebuploads.com Developer Software Rights to uploads Check Point Developer Jenn@gmail.com files posted source code DLP blocks jsimmons@dlpdemo.com to filefile- to share upload and sharing sites to work on notifies user Code subroutine to work on from home transfer to from home host site ©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | 21 21
  21. 21. Filter Based on CorporateData Policies Policy Exception Allows Email to Pre-selected Recipients Data Loss Prevention Alert jcraicg@mylawyer.com An email that you haveof intent for review M&A letter just sent has been identified as containing sensitive information. ProjectAtlantisLoI.pdf Alert notifies Hi James, user of data An email that you have just sent has been Corporate We have revised the terms of policy exception. Attached allowed based on DLP the acquisition. policy Development is the Letter of Intent for your review. VP Thanks, David For additional details, please refer to the Corporate Data Security Policy Corporate VP sends M&A contract to attorney ©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | 22 22
  22. 22. Alert, Ask and Educate Users Check Point Brings User Remediation to DLP mattg@dlpdemo.com Greg.Smith@ernstyoung.com Reconsider sending this email (Preli… Preliminary Financial Statement Preliminary Financial Statement Preliminary_financials.pdf The Preliminary Financial Statement sending this email (Prelimi… Greg, Point Data Loss Prevention attached message, sent by you, is addressed to an external email Check Reconsider Fri 4/2/2010 3:45 PM mattg@acmecorp.com PCI Audit Status address. The Check Point Data Loss Prevention System determined that it SendingGreenethe Q1 preliminary financials Rachel may contain confidential information.for audit. you Fri 4/2/2010 1:23 PM Tom Peters Sales Planning Meeting Thu 3/2/2010 9:45 AM Chief Thanks, Email’s attachment Preliminary_financials.pdf appears to contain Financial Matt Gerhart financial records. The message is being held until further action. Chief Financial Officer Officer ACME Corp. mattg@acmecorp.com Send, Discard, or Review Issue User provides Hi, This information is OK to send to Alert asks owner an explanation our outside auditor. Company CFO sends data of sensitive preliminaryofto confirm his request Thanks, Matt financial to send statement to external communication auditor ©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | 23 23
  23. 23. Key Technologies UserCheck™ provides User Remediation Align DLP Rules to Your Policies and Processes MultiSpect™ Detection Engine ©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | 24 24
  24. 24. UserCheck Provides User Remediation 1. Mail sent or 2. User 3. User document alert remediation uploaded Data Loss Prevention Alert An email that you have just sent has been quarantined. Reason: attached document contains confidential internal data The message is being held until further action. Send , Discard , or Review Issue Non-disruptive Real-time Educational ©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | 25 25
  25. 25. Align With Your Business Processes Adapts to Your Processes and Environment Examples ► Spreadsheets with over Suspicious 500 rows Communications ► More than 5 financial terms ► External recipients in BCC ► More than 10 company names Identify unconventional business communication behavior ► Profanity ©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | 26 26
  26. 26. MultiSpect™ Detection Engine Multi-data Correlation Prevents Potential Violations Correlates a combination of data types Prevents sending sensitive data to wrong recipients ©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | 27 27
  27. 27. MultiSpect Form Detection Detect and Recognize Your Proprietary Forms Forms/Partial Examples Forms Insurance claim.pdf ► HR forms / salary / offers ► Financial docs ► Patient records ► Insurance forms ► Recognize ► Bank forms sensitive forms and templates ©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | 28 28
  28. 28. MultiSpect Open Scripting Language Extended Data Type Creation Custom Data Type ► Create completely new data types ► Enhance existing data types ► Flexibly tailor DLP to ► OpenScripting your environment Language ©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | 29 29
  29. 29. DLP-1 Appliance Specifications DLP-1 2571 DLP-1 9571 Performance Number of users 1,000 5,000 Messages/Hour 70K 350K Throughput 700 Mbps 2.5 Gbps Specifications Storage 500 GB 2 x 1 TB (RAID 1) NICs 6 Copper 1GbE 10 Copper 1GbE 4 ports - 2 segments 4 ports - 2 segmentsOptional Bypass card (pre-packaged appliance) (orderable as accessory) Price Without bypass card - $14,990 $49,990 Price year 1 With bypass card- $15,990 Add bypass card - $4,995Annual price year 2+ $7,000 $12,000 ©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | 30 30
  30. 30. Check Point DLP Software Blade CPSB-DLP-500 CPSB-DLP-1500 CPSB-DLP-U Recommended Users (depending on Up to 500 500-1,500 1,500+ configuration)* 15,000- 50,000- Messages/Hour 5,000-15,000 50,000 250,000 Max Throughput 700 Mbps 1.5 Gbps 2.5 Gbps Annual Price $3,000 $7,000 $12,000 ©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | 31 31
  31. 31. DLP-1 9571 Appliances—Accessories Model Price Field Replaceable 4-Port, Copper, Bypass Card (for DLP-1 $4,995 9571, PWR-1 907x, IPS-1) Check Point Replacement parts Kit including one Hard-Drive, one $3,900 Power Supply, and one Fan (For DLP-1 9571) Check Point Lights-Out-Management card (for DLP-1 9571, $2,500 PWR-1 907x, IPS-1)) ©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | 32 32
  32. 32. Check Point DLP Summary Check Point combines technology and processes to make DLP work Prevent Data Breaches Move from detection to prevention Enforce Data Policies Across the entire network Educate and Alert Users Without involving IT staff ©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | 33 33
  33. 33. Akshay Kumar Sharma9810387393/9312932966Thank You! ©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone

×