Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

Customer Spotlight: Deploying a Data Protection Program in less than 120 Days


Published on

Despite a limited budget, Jabil's small security team was under pressure from Senior Management to mature their security program - FAST! Michael Ring, IT Security Architect at Jabil shares how they deployed their solution to over 40,000 users in less than 120 days.

Published in: Technology
  • Be the first to comment

Customer Spotlight: Deploying a Data Protection Program in less than 120 Days

  1. 1. Customer Spotlight: Deploying a Data Protection Program in less than 120 Days Michael Ring, Jabil Mark Stevens, Digital Guardian
  2. 2. Agenda  Introduction  Deploying a Data Protection Program in < 120 Days • Mike Ring, Jabil  Digital Guardian Overview • Mark Stevens, Digital Guardian  Live Q&A with Mike and Mark
  3. 3. About Mike Ring  Senior IT Manager, Threat and Solution Architect  15 years’ experience in InfoSec
  4. 4. Jabil  Global manufacturing services company  180,000+ employees  90 plants in 23 countries  $17.2B revenue in 2013 Proven Manufacturing Solutions Global Expertise. Intelligent Supply Chain Design.
  5. 5. Jabil’s Security Situation  Data protection was in catch up mode  Lacked basic processes  “IP could be anything”  Security could be a competitive advantage
  6. 6. Jabil’s IT Environment  Cloud-based IT environment since 2010  No standardization  Had budget but not headcount to accelerate security maturity
  7. 7. Security Objectives  52,000 devices at one level of security, needed to get to higher level  Protect: • IP: Jabil’s and customers’ • Pricing data • Employee data  Quickly build a program focused on agility and collaboration
  8. 8. Jabil’s Solution  Three key security technologies • Web Proxy • Single Sign-on • Data Protection  Had to be 100% managed service Web Proxy SSO Data Protection
  9. 9. Why DG Managed Security Program  InfoSec can govern, not administer  Unique context-awareness  Capabilities beyond just DLP  Very fast ramp  Time to value
  10. 10. Getting the CIO on Board  Prior successful rapid deployments  Application usage collection was major value-add  Able to reconcile license usage and reduce costs
  11. 11. Implementing Digital Guardian  3,000 agents deployed in dev environment  49,000 agents deployed next May June July August Initial Engagement 3,000 Agents Deployed in Development 49,000 Agents Deployed in Monitor Mode Fast Forward Framework
  12. 12. Results  Gained immediate visibility into all data access and usage  Saw data getting copied to USB drives  Used egress reports to drive adoption
  13. 13. What’s Next?  Using visibility to drive classification and policy making  Transition to operational plan  Roll out DG controls to mitigate top data risks  DG for advanced threat detection and forensic analysis
  14. 14. About Mark Stevens  VP, Global Services & Support  Driving customer success  20 year tech industry veteran • IBM, BMC, Progress, Lotus
  15. 15. Data-Centric Security Recap “In this new reality, traditional perimeter-based approaches to security are insufficient. S&R pros must take a data-centric approach that ensures security travels with the data regardless of user population, location, or even hosting model.” The Future Of Data Security: A Zero Trust Approach John Kindervag, Heidi Shey, and Kelley Mak, June 5, 2014 Confidential 14
  16. 16. Data Security That Starts at the Source 15
  17. 17. Patented, Proven Endpoint Agent 16
  18. 18. Automatic Sensitive Data Classification 17
  19. 19. STOP Data Theft From Insiders and Outsiders 18
  20. 20. Protect Your Data From Insider Threats Confidential 19
  21. 21. Protect Your Data for the Best Defense from Outsider Threats Confidential 20
  22. 22. Flexible Deployment Models Confidential 21  Infrastructure hosted in your environment  Self-administration  Policies, rules and reports managed by you  Engage with Digital Guardian Pro Services as needed  Infrastructure hosted in Digital Guardian private cloud  Administered by Digital Guardian Pro Services  Access to policies, rules, and reports  Weekly status meetings  Infrastructure hosted in your environment  Administered remotely by Digital Guardian Pro Services  Data remains within your IT environment Option 1 On Premise Option 2 Managed Service Option 3 Hybrid Managed Service On Premise “By selecting the managed service deployment option, we were able to be up and running in a matter of weeks. The added visibility into how our confidential data is being used is invaluable.” CISO, Regional Bank
  23. 23. 22
  24. 24. 23
  25. 25. 24
  26. 26. Questions?
  27. 27. Interested in learning more about Jabil’s data protection program? Watch the webinar on demand: