Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

Stop Data from Going for a (Thumb) Drive

281 views

Published on

View these 20/20 webcast slides where SC Magazine's editor talks with Chris Merritt about the challenges associated with these pervasive storage devices, and what steps your company can take to prevent the misuse - whether inadvertent or malicious - of data transfer.

In this session, you will learn how to safely use thumb drives and other portable storage devices:
• Prevent data loss or theft
• Grant or deny USB access in less than a minute
• Gain visibility into device usage within the organization
• Provide users with a simple way to encrypt USB sticks
• Roll out a new removable device security regime appropriately
• Create and enforce security policies regarding the use of removable storage devices

  • Be the first to comment

  • Be the first to like this

Stop Data from Going for a (Thumb) Drive

  1. 1. Stop Data from Goingfor a (Thumb) DriveChris MerrittDirector of Solution Marketing, Lumension
  2. 2.  Multiple Layers of Security Controls– Redundancy in caseFailure or Exploitation– Covers People, Processand Technical Controls– Seeks to Delay AttackDefense-in-Depth
  3. 3.  Average Cost of Data Breach is $204 / Record Intangible Assets Constitute 80% of Corporate ValueCost of a Data Breach
  4. 4. GPN Market Cap Impact$53.27$41.25$12.02
  5. 5. Defense-in-Depth at the Endpoint
  6. 6. Source:2013 State of the Endpoint Report:QUANTUM OF SECURITYhttp://www.lumension.com/2013
  7. 7. Links:http://www.lumension.com/2013-Data-Privacy-Day.aspxhttp://www.lumension.com/Resources/Resource-Center/be-aware-of-what-you-share.aspx
  8. 8. Source = 2013 DBIR from Verizon
  9. 9. AVControl the BadDevice ControlControl the FlowHD and Media EncryptionControl the DataApplication ControlControl the GrayPatch and Configuration ManagementControl the Vulnerability LandscapeSuccessful risk mitigationstarts with a solid vulnerabilitymanagement foundation,augmented by additionallayered defenses whichincludes port / device controland data encryption.Defense-in-Depth Strategy .
  10. 10. Get a Quote (and more)http://www.lumension.com/endpoint-management-security-suite/buy-now.aspx#5• Free Security Scanner Tools» Vulnerability Scanner – discover all OS andapplication vulnerabilities on your network» Application Scanner – discover all the appsbeing used in your network» Device Scanner – discover all the devicesbeing used in your networkhttp://www.lumension.com/special-offer/premium-security-tools.aspx• Lumension® EndpointManagement and Security Suite» Online Demo Video:http://www.lumension.com/Resources/Demo-Center/Data-Protection.aspx» Free Trial (virtual or download):http://www.lumension.com/endpoint-management-security-suite/free-trial.aspx

×