Stop Data from Going for a (Thumb) Drive

275 views

Published on

View these 20/20 webcast slides where SC Magazine's editor talks with Chris Merritt about the challenges associated with these pervasive storage devices, and what steps your company can take to prevent the misuse - whether inadvertent or malicious - of data transfer.

In this session, you will learn how to safely use thumb drives and other portable storage devices:
• Prevent data loss or theft
• Grant or deny USB access in less than a minute
• Gain visibility into device usage within the organization
• Provide users with a simple way to encrypt USB sticks
• Roll out a new removable device security regime appropriately
• Create and enforce security policies regarding the use of removable storage devices

0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
275
On SlideShare
0
From Embeds
0
Number of Embeds
3
Actions
Shares
0
Downloads
0
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Stop Data from Going for a (Thumb) Drive

  1. 1. Stop Data from Goingfor a (Thumb) DriveChris MerrittDirector of Solution Marketing, Lumension
  2. 2.  Multiple Layers of Security Controls– Redundancy in caseFailure or Exploitation– Covers People, Processand Technical Controls– Seeks to Delay AttackDefense-in-Depth
  3. 3.  Average Cost of Data Breach is $204 / Record Intangible Assets Constitute 80% of Corporate ValueCost of a Data Breach
  4. 4. GPN Market Cap Impact$53.27$41.25$12.02
  5. 5. Defense-in-Depth at the Endpoint
  6. 6. Source:2013 State of the Endpoint Report:QUANTUM OF SECURITYhttp://www.lumension.com/2013
  7. 7. Links:http://www.lumension.com/2013-Data-Privacy-Day.aspxhttp://www.lumension.com/Resources/Resource-Center/be-aware-of-what-you-share.aspx
  8. 8. Source = 2013 DBIR from Verizon
  9. 9. AVControl the BadDevice ControlControl the FlowHD and Media EncryptionControl the DataApplication ControlControl the GrayPatch and Configuration ManagementControl the Vulnerability LandscapeSuccessful risk mitigationstarts with a solid vulnerabilitymanagement foundation,augmented by additionallayered defenses whichincludes port / device controland data encryption.Defense-in-Depth Strategy .
  10. 10. Get a Quote (and more)http://www.lumension.com/endpoint-management-security-suite/buy-now.aspx#5• Free Security Scanner Tools» Vulnerability Scanner – discover all OS andapplication vulnerabilities on your network» Application Scanner – discover all the appsbeing used in your network» Device Scanner – discover all the devicesbeing used in your networkhttp://www.lumension.com/special-offer/premium-security-tools.aspx• Lumension® EndpointManagement and Security Suite» Online Demo Video:http://www.lumension.com/Resources/Demo-Center/Data-Protection.aspx» Free Trial (virtual or download):http://www.lumension.com/endpoint-management-security-suite/free-trial.aspx

×