SlideShare uses cookies to improve functionality and performance, and to provide you with relevant advertising. If you continue browsing the site, you agree to the use of cookies on this website. See our User Agreement and Privacy Policy.
SlideShare uses cookies to improve functionality and performance, and to provide you with relevant advertising. If you continue browsing the site, you agree to the use of cookies on this website. See our Privacy Policy and User Agreement for details.
Successfully reported this slideshow.
Activate your 14 day free trial to unlock unlimited reading.
4.
Download
Documents
Email
SYNC WITH OTHER
SYSTEMS
5.
DLP – an answer ?
CATEGORIES OF DLP
• NETWORK AKA DATA IN MOTION
• STORAGE AKA DATA AT REST
• ENDPOINT AKA DATA IN USE
6.
… NOT REALLY
1. IT’S CUMBERSOME FOR END USERS
2. NOT DESIGNED FOR COLABORATION
3. COMPLEX ENTREPRISE-WIDE DEPLOYMENT
4. NOT 100% RELIABLE (FALSE POSITIVES)
7.
DLP IS TRANSMISSION CONTROL
NOT DESIGNED TO ALLOW SECURED DATA SHARING AND
COLLABORATION WHILE PREVENTING DOCUMENT LEAKAGE
WHAT HAPPENS BEYOND ENTREPRISE BOUNDARIES?
8.
Passwords ?
• Password security which uses RC4 128bit encryption or 128-bit
AES Adobe 8 Generation technology
• Public Key Infrastructure (PKI) encryption
9.
WE NEED A NEW APPROACH
“How can we assure that only authorized people read classified
data?”
“How can we assure the recipients do not share unauthorized data
”
“How can we guarantee that data is not manipulated,
unintentionally or fraudulently?”
10.
DATA CENTRIC PROTECTION
If we cannot protect the data, why not let the data protect
itself?
11.
Information Rights
Management
Security
Control
13.
How does it work?
3/ The server monitors who can
access the file and how."
1/ You create
your document
as usual"
2/ Send it through
a protection engine"
And in 3 clicks you’ve got a
doc ready to share securely!"
15.
Once your
recipient gets it"
Adobe PDF
Reader"
He opens it
with his or her
usual tools"
Microsoft
Office"
16.
1/ Checks if it’s
the right version"
Adobe PDF
Reader"
Microsoft
Office"
17.
1/ Checks if it’s
the right version"
2/ If the recipient
has permission"
Adobe PDF
Reader"
Microsoft
Office"
18.
‣ Revocation
‣ Cut/Paste
‣ Edit
‣ Print
‣ ..."
Adobe PDF
Reader"
1/ Checks if it’s
the right version"
2/ If the recipient
has permission"
3/ And if yes,
what he can do."
Microsoft
Office"
19.
‣ Revocation
‣ Cut/Paste
‣ Edit
‣ Print
‣ ..."
Adobe PDF
Reader"
1/ Checks if it’s
the right version"
2/ If the recipient
has permission"
3/ And if yes,
what he can do."
Microsoft
Office"
20.
‣ Revocation
‣ Cut/Paste
‣ Edit
‣ Print
‣ ..."
Adobe PDF
Reader"
1/ Checks if it’s
the right version"
2/ If the recipient
has permission"
3/ And if yes,
what he can do."
Microsoft
Office"