Learn How to Detect, Prevent, and Replace the Use of USB Drives

1,227 views

Published on

Stop Data Walking Out the Door: Learn how to detect, prevent and replace the use of USB drives

This webinar addresses the issue of rising internal data breaches, and the risk of USB thumb drives. IT professionals have an obligation to protect their companies from damage, whether it’s lost IP, lawsuits or fines. This webinar demonstrates how using SolarWinds LEM and SolarWinds Serv-U® safely detects, prevents, and replaces the use of USB thumb drives.

Other information found in this webinar:
o Insider abuse, data loss, and the ramifications
o Best practices for protecting sensitive data
o How SolarWinds technology (SolarWinds LEM and SolarWinds Serv-U®) can help protect against USB devices and ensure secure file sharing and collaboration

Published in: Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
1,227
On SlideShare
0
From Embeds
0
Number of Embeds
4
Actions
Shares
0
Downloads
0
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Learn How to Detect, Prevent, and Replace the Use of USB Drives

  1. 1. SolarWinds® Webinar Stop Data From Walking Out the Door! © 2013 SOLARWINDS WORLDWIDE, LLC. ALL RIGHTS RESERVED.
  2. 2. Agenda » Risks of Insecure File Transfer » Data Breach Impact » Steps to Protect Sensitive Data »Q&A © 2013 SOLARWINDS WORLDWIDE, LLC. ALL RIGHTS RESERVED.
  3. 3. Bad News: Internal Data Breaches are on the Rise! According to the Ponemon Institute: © 2013 SOLARWINDS WORLDWIDE, LLC. ALL RIGHTS RESERVED.
  4. 4. USB Drives Come With Risks “Taking Files Home” Confidential Data Leaves the Building! No Tracking! End User at Work Virus Enters the Building! USB Thumb Drive “Sharing Files With Other People” Drive Stolen or Borrowed! End User at Work © 2013 SOLARWINDS WORLDWIDE, LLC. ALL RIGHTS RESERVED.
  5. 5. Data Breach from a USB Storage Device is a Real Threat October 2013: Student data from Denver elementary schools at risk after thumb drive was stolen from a school nurse’s car. Source: denver.cbslocal.com, CBS Denver, Oct. 17, 2013. June 2013: Thousands of patient records compromised when Nebraska doctor lost thumb drive he’d been wearing on a lanyard around his neck. Source: www.journalstar.com, Lincoln Journal Star, June 30, 2013. April 2013: Investment regulator loses portable device containing personal information belonging to clients of multiple investment firms. Source: www.journalstar.com, Lincoln Journal Star, June 30, 2013. © 2013 SOLARWINDS WORLDWIDE, LLC. ALL RIGHTS RESERVED.
  6. 6. Impact of a Data Breach The loss or leakage of sensitive data can result in serious damage to an organization, including:         Loss of Intellectual property Loss of private customer data Compliance violations Damage to corporate reputation/brand Loss of customer loyalty Loss of future business opportunities Lawsuits Financial and criminal penalties © 2013 SOLARWINDS WORLDWIDE, LLC. ALL RIGHTS RESERVED.
  7. 7. Good News: You Can Do Something About It! Source: 2012 Data Breach Investigations Report, Verizon © 2013 SOLARWINDS WORLDWIDE, LLC. ALL RIGHTS RESERVED.
  8. 8. Best News: SolarWinds Can Help! Protect your organization from data loss and breaches with a simple 3-step approach utilizing SolarWinds Log & Event Manager and SolarWinds Serv-U® Managed File Transfer. Step 1: Use LEM’s USB Defender technology to block unauthorized USB storage devices Step 2: Deploy Serv-U to provide a secure, managed alternative to risky USB file sharing Step 3: Rest easy with LEM’s real-time monitoring, threat detection, and automated remediation © 2013 SOLARWINDS WORLDWIDE, LLC. ALL RIGHTS RESERVED.
  9. 9. How SolarWinds Log & Event Manager (LEM) Can Help © 2013 SOLARWINDS WORLDWIDE, LLC. ALL RIGHTS RESERVED.
  10. 10. SolarWinds Log & Event Manager: Powerful USB Defense SolarWinds Log & Event Manager (LEM) includes built-in USB-Defender® technology to protect sensitive data from hitching a ride out the door on a removable storage device. With LEM’s USB defense, you can:  Detect USB storage devices in real-time  Automatically or manually eject USB devices  Create whitelists to block unauthorized USB usage  Monitor what files or processes are accessed  Detach devices even when systems are offline  Use built-in reporting to audit USB usage over time © 2013 SOLARWINDS WORLDWIDE, LLC. ALL RIGHTS RESERVED.
  11. 11. Around-the-Clock USB Defense With LEM’s USB Defender technology, you can take automated actions to block the usage, so you can be confident your data is safe 24x7, even while you sleep! LEM’s automated actions include the ability to:  Automatically eject USB devices  Quarantine workstations  Shutdown machines  Disable user accounts © 2013 SOLARWINDS WORLDWIDE, LLC. ALL RIGHTS RESERVED.
  12. 12. Allowing Only Authorized USB Access: Step 1 Step 1: Create a user-defined group in the LEM console and enable USB Defender on the systems you want to authorize USB access. © 2013 SOLARWINDS WORLDWIDE, LLC. ALL RIGHTS RESERVED.
  13. 13. Allowing Only Authorized USB Access: Step 2 Step 2: Add the group of “authorized” devices to SolarWinds LEM rules and set up Active Response rules to detach unauthorized USB devices. LEM’s powerful correlation rules alert you in real time when unauthorized USB devices try to access your network. © 2013 SOLARWINDS WORLDWIDE, LLC. ALL RIGHTS RESERVED.
  14. 14. How SolarWinds Serv-U Managed File Transfer (MFT) Can Help © 2013 SOLARWINDS WORLDWIDE, LLC. ALL RIGHTS RESERVED.
  15. 15. SolarWinds Serv-U MFT Server: SIMPLE & SECURE File Sharing SolarWinds Serv-U MFT Server provides secure file sharing you can deploy in your own datacenter, so you don’t have to worry about company data flying around in the cloud or walking out the door on a USB device. With Serv-U, you can:  Enable users to securely share files  Leverage existing infrastructure  Apply your own security policy  Eliminate the need for risky USB devices  Replace unreliable or insecure cloud storage © 2013 SOLARWINDS WORLDWIDE, LLC. ALL RIGHTS RESERVED.
  16. 16. Satisfy USB Use Cases with Serv-U “Taking Files Home” 1) File Copied to Serv-U End User at Work Serv-U MFT Server 2) File Copied from Serv-U (and Edited) 3) Edited File Copied to Serv-U 4) Edited File Copied from Serv-U End User at Home “Sharing Files With Other People” 1) File Copied to Serv-U End User at Work © 2013 SOLARWINDS WORLDWIDE, LLC. ALL RIGHTS RESERVED. Serv-U MFT Server 2) File Copied from Serv-U Other End Users
  17. 17. Simple & Secure “Anywhere” File Access With Serv-U’s “Web Client”, end-users can securely access work files from anywhere. © 2013 SOLARWINDS WORLDWIDE, LLC. ALL RIGHTS RESERVED.
  18. 18. How Serv-U File Sharing Works © 2013 SOLARWINDS WORLDWIDE, LLC. ALL RIGHTS RESERVED.
  19. 19. Easy-to-Use File Sharing Interface Serv-U provides an easy-to-use interface for sending and requesting files, along with advanced options like file retention, password protection, and notifications. © 2013 SOLARWINDS WORLDWIDE, LLC. ALL RIGHTS RESERVED.
  20. 20. The Result: Effective File Sharing with Minimal Risks DLP* Stops Confidential Data from Leaving “Taking Files Home” Serv-U MFT Server 1) File Copied to Drive End User at Work 4) Edited File Copied from Drive AV* Stops Viruses and Malware from Entering 2) File Copied from Drive (and Edited) Serv-U logs let admins and auditors know who took what 3) Edited File Copied to Drive End User at Home “Sharing Files With Other People” 1) File Copied to Drive End User at Work * Serv-U works with your existing DLP and AV software © 2013 SOLARWINDS WORLDWIDE, LLC. ALL RIGHTS RESERVED. Serv-U MFT Server Serv-U logs show bad login attempts and locked IPs 2) File Copied from Serv-U Access denied – and IP automatically locked out Other End Users Unauthorized Person
  21. 21. Additional Resources SolarWinds Log & Event Manager – Product Info and Online Demo http://www.solarwinds.com/log-event-manager.aspx SolarWinds Serv-U Managed File Transfer (MFT) Server – Product Info and Online Demo http://www.solarwinds.com/serv-u-managed-file-transfer-server.aspx SolarWinds Security Portfolio – Learn More about All of SolarWinds Security Products http://www.solarwinds.com/security SolarWinds Security: Helping Protect Your Sensitive Data © 2013 SOLARWINDS WORLDWIDE, LLC. ALL RIGHTS RESERVED.
  22. 22. Thank You! The SOLARWINDS and SOLARWINDS & Design marks are the exclusive property of SolarWinds Worldwide, LLC, are registered with the U.S. Patent and Trademark Office, and may be registered or pending registration in other countries. All other SolarWinds trademarks, service marks, and logos may be common law marks, registered or pending registration in the United States or in other countries. All other trademarks mentioned herein are used for identification purposes only and may be or are trademarks or registered trademarks of their respective companies. © 2013 SOLARWINDS WORLDWIDE, LLC. ALL RIGHTS RESERVED.

×