SlideShare a Scribd company logo
1 of 41
Endpoint security
Presented by : Sonu Yadav
Content
S.NO TOPIC
01 What is Endpoint?
02 Why are Endpoint Targeted?
03 What is endpoint security?
04 What are the types of endpoint security?
05 Solutions of Endpoint Security
What is Endpoint?
 An Endpoint can be defined as any remote computing device that receives
incoming communications and send outgoing messages to the networks.
 An endpoint is also known as “Doorway” or “Gateway” of the network.
Example of endpoint
include
Desktops
Laptops
Smartphones
Tablets
Servers
Workstation
IOT(internet of things)
Why are Endpoint Targeted?
 Endpoint attacks are primarily aimed at accessing corporate network using
endpoints as the “Doorway” or “Gateway”
 The increase in BYOD (bring your own device) policies, in addition to threats
targeting mobile device access and networks.
What is Endpoint Security?
 It is the practice of securing end-user device like laptops , Desktops,Mobile Devices
etc… from exploitation by malicious user or cybercriminals
 Endpoint security protects these ‘Doorway’ or ‘Gateway’ from Threats posed by
Cyber attacks.
What are the types of endpoint security?
 Internet-of-Things (IoT) security
 Network access control (NAC)
 Data loss prevention (DLP)
 Insider threat protection
 Data classification
 Uniform Resource Locator (URL) filtering
 Browser isolation
 Cloud perimeter security
 Endpoint encryption
 Sandboxing
 Secure email gateways
Solutions of Endpoint
Security
EDR(endpoint
Detection
response)
MDR(Managed
Detection Response)
NDR(Network
Detection Response)
XDR(Extended
Detection Response )
EDR(endpoint
Detection
response)
MDR(Managed
Detection
Response)
NDR(Network
Detection
Response)
XDR(Extended
Detection
Response )
Without MDR
Organisation
Cyber
Attack
Advance
Threat
Lack of skilled staff
and security tools
The team cannot
identify
Data breaches
and lost of assets
Has
Lead to
With MDR
Organisation
MDR Advance
Threat
Lack of skilled staff
and security tools
The team cannot
identify
Data and assets
are protected
Has
Run into
Active Threat
Hunting Threat intel
Real time Threat
response
Continuous
Monitoring
Data Lost/Leak Prevention
Presented by :
Sonu Yadav
Content
S.N
O
Topic
01 What is Data Loss prevention ?
02 What is data leak ?
03 Difference between data leak and a data Breach
04 Features
05 Why to use
06 Working
07 software available for DLP
What Is Data Loss Prevention?
 Data loss prevention (DLP) is a method of detecting and preventing potential
data breaches or unwanted destruction of sensitive data by monitoring, detecting
and blocking sensitive data.
What is a Data Leak?
 A data leak is an overlooked exposure of sensitive data either electronically or
physically.
 Data leaks could occur on the internal or via physical devices such as external
hard drives or laptops.
 If a cybercriminal locates a data leak, they can use the information to harm
themselves for a data breach attack.
Difference Between a Data Leak and a
Data Breach
 A data breach is the outcome of a planned cyber attack, but a data leak is the
accidental exposure of sensitive data by a business.
 Cybercriminals do not create data leaks, they discover them and then use them
to launch data breach attacks.
 Data leaks tend to result from poor security practices.
 A business can also be impacted if any of its vendors have a data leak
DLP
Features Why to use Working
Features
E-mail client
Attachment on
browser
Attachment on
application
HDD
Pen drive
Network Drive
Share point
Cloud Storage
01) Monitoring
system
02) USB Blocking
03) Browser restriction
04) File based & Extension
based restriction
05) Remote Login
Why to use
Data Visibility
Data protection
Enhancement
Confidentiality
Secure Access
Authencation Integrity
Data
Classification
Working
L
A
N W A N
AGENT
Software agent they
will be install in your
machine on fixed
port
FIX Port:-
Notification
Video, Pic
File
Remote
Update
L
A
N
W
A
N
Installing agent on
Wan devices
Mapping The
public IP
Sending log
information to
server
List of the Best Data Loss Prevention
Software solutions by company
 Palo alto
 Endpoint Protector By CoSoSys
 NinjaOne Backup
 Symantec DLP
 McAfee DLP
 Forcepoint DLP
 SecureTrust Data Loss Prevention
 Digital Guardian
 Trend Micro IDLP
 Sophos
 Code42
 Check Point
 Safetica
Email security
Content
S.NO TOPIC
01 What is E-mail Security
02 Why E-mail Security Important
03 Types of E-mail Threats
04 The benefits of E-mail Security
05 E-mail Security Requirements
06 How can we Secure E-mail
07 E-mail Security tool’s
What Is E-mail security
 Email security includes the techniques and technologies used to protect email
accounts and communications.
 Email is a critical component of organizational communication because it enables
users to communicate quickly, easily, and with a variety of devices.
 Email security is important because email contains sensitive information, is used by
everyone in the organization, and is therefore one of a company’s largest targets
for attacks.
Why is email security important?
 Email has been a primary communication tool in the workplace for more than
two decades.
 More than 333 billion emails are sent and received daily worldwide—and
employees get an average of 120 emails a day.
 Cybercrime cost more than $4.1 billion in 2020, with business email compromise
causing the most damage, according to the FBI’s Internet Crime Complaint
Center (IC3). The consequences can be severe, leading to significant financial,
data, and reputational losses.
Types of Email Threats
Data exfiltration
Malware
Spam
Impersonation
Phishing
The benefits of email security
Enhance
productivity
Ensure compliance
with data protection
laws
Protect a company’s
brand, reputation,
and bottom line
Email Security Requirements
• Protection from Discloser
Confidentiality
• Sender of Message
Authencation
• Protection From modification
Integrity
• Protection From denial by Sender
Non-Repudiction
Basic Phase of E-mail
Sender SMPTP
Receiver
SMTP
Server
Receiver
internet Pull
Encrypted Phase of E-mail
How can we secure e-mail ?
Spam filter
Email encryption
Antivirus protection
Secure email gateway (SEG)
Multi-factor authentication (MFA)
Employee education
Email Security Tools
Easydmarc
PEP
Europeanmx
Sonicwall
Cisco
Cisco
1. Easydmarc
Powerful Standards
Application.
Alert Your
Employees.
Protect Data. Reach the Inbox. Know Senders.
Features:
2. PEP
Peer-to-peer and end-to-
end email encryption.
Automatic protection of
emails from being read or
modified.
Seamless use on your
laptop, desktop, tablet,
mobile with PEP sync.
Protection rating at a
glance using traffic lights.
Free and open source
software.
Features:
3. Europeanmx
In- and outbound spam
and virus filtering.
Email archiving
according.
Email queuing on
failure.
Reputation protection.
Features:
4. Sonicwall
The Inbound Spooling feature
allows users to hold mail when
all the customer’s receivers are
unavailable.
Phishing protection and email
fraud.
Scan malicious URLs at the
time-of-click for advanced
threats.
Prevent email fraud through
powerful email authentication
policies, including DMARC.
Features:
5. Cisco
Automatically blocks links it
considers to be unsafe, which
protects from emails even
when they look genuine.
The reporting and logging on
offer are reliable, bring you
insights into your email
security.
Active spam filtering, which will
ensure you only get the emails
you want in your inbox.
Data loss protection, with
methods that ensure your
emails, are protected with
encryption.
Features:
6. Proofpoint
The software protects against email
threats, effective spam protection,
dominant URL defense, and content
filtering.
Proofpoint’s user console is modern,
providing granular controls and
improved threat reporting.
It’s an ideal solution for companies and
MSPs, with easy set-up and competitive
pricing.
Great tool for teams using Office 365, as
it offers Azure Active Directory Sync,
meaning implementation is seamless,
and new users are automatically added.
Features:
PGP( pretty good services)
 Widely used
 freely available
 Using digital signature
 PGP incorporated tool for developing a public key trust model & public key
certificate management
 PGP provides confidentiality & authentication services that can be used for
electronic mail & file storage application
Thanks you
sonukumaryadav9614@gmail.com
sonuky07

More Related Content

Similar to brif enpoint.pptx

Cyber security
Cyber securityCyber security
Cyber securityAkdu095
 
Cloud_security.pptx
Cloud_security.pptxCloud_security.pptx
Cloud_security.pptxSofiyaKhan49
 
Cybersecurity - Poland.pdf
Cybersecurity - Poland.pdfCybersecurity - Poland.pdf
Cybersecurity - Poland.pdfPavelVtek3
 
Keep Up with the Demands of IT Security on a Nonprofit Budget
Keep Up with the Demands of IT Security on a Nonprofit BudgetKeep Up with the Demands of IT Security on a Nonprofit Budget
Keep Up with the Demands of IT Security on a Nonprofit BudgetBVU
 
Just-How-Secure-is-your-Remote-Workforce-Infinity-Group-Ebook.pdf
Just-How-Secure-is-your-Remote-Workforce-Infinity-Group-Ebook.pdfJust-How-Secure-is-your-Remote-Workforce-Infinity-Group-Ebook.pdf
Just-How-Secure-is-your-Remote-Workforce-Infinity-Group-Ebook.pdfInfinityGroup5
 
ITS 833 – INFORMATION GOVERNANCEChapter 11 – Information Gov.docx
ITS 833 – INFORMATION GOVERNANCEChapter 11 – Information Gov.docxITS 833 – INFORMATION GOVERNANCEChapter 11 – Information Gov.docx
ITS 833 – INFORMATION GOVERNANCEChapter 11 – Information Gov.docxdonnajames55
 
IT security in 2021: Why Ransomware Is Still The Biggest Threat
IT security in 2021: Why Ransomware Is Still The Biggest ThreatIT security in 2021: Why Ransomware Is Still The Biggest Threat
IT security in 2021: Why Ransomware Is Still The Biggest ThreatETech 7
 
Cybersecurity Interview Questions and Answers.pdf
Cybersecurity Interview Questions and Answers.pdfCybersecurity Interview Questions and Answers.pdf
Cybersecurity Interview Questions and Answers.pdfJazmine Brown
 
Type of Security Threats and its Prevention
Type of Security Threats and its PreventionType of Security Threats and its Prevention
Type of Security Threats and its Preventionijsrd.com
 
COMPUTER AND NETWORK SECURITY.pptx
COMPUTER AND NETWORK SECURITY.pptxCOMPUTER AND NETWORK SECURITY.pptx
COMPUTER AND NETWORK SECURITY.pptxDebmalyaSingha
 
Basic Home Computer Network And Computer Network Security...
Basic Home Computer Network And Computer Network Security...Basic Home Computer Network And Computer Network Security...
Basic Home Computer Network And Computer Network Security...Jennifer Letterman
 
"Evolving Cybersecurity Strategies" - Threat protection and incident managment
"Evolving Cybersecurity Strategies" - Threat protection and incident managment"Evolving Cybersecurity Strategies" - Threat protection and incident managment
"Evolving Cybersecurity Strategies" - Threat protection and incident managmentDean Iacovelli
 
IT Insecurity - Understanding the Threat of Modern Cyberattacks - DWCNZ 2024
IT Insecurity - Understanding the Threat of Modern Cyberattacks - DWCNZ 2024IT Insecurity - Understanding the Threat of Modern Cyberattacks - DWCNZ 2024
IT Insecurity - Understanding the Threat of Modern Cyberattacks - DWCNZ 2024Michael Noel
 
Cyber Security Services for Business.pdf
Cyber Security Services for Business.pdfCyber Security Services for Business.pdf
Cyber Security Services for Business.pdfVograce
 
E-Commerce Privacy and Security System
E-Commerce Privacy and Security SystemE-Commerce Privacy and Security System
E-Commerce Privacy and Security SystemIJERA Editor
 
E-Commerce Privacy and Security System
E-Commerce Privacy and Security SystemE-Commerce Privacy and Security System
E-Commerce Privacy and Security SystemIJERA Editor
 
Cyber Privacy & Password Protection
Cyber Privacy & Password ProtectionCyber Privacy & Password Protection
Cyber Privacy & Password ProtectionNikhil D
 

Similar to brif enpoint.pptx (20)

Cyber security
Cyber securityCyber security
Cyber security
 
Secure remote work
Secure remote workSecure remote work
Secure remote work
 
Cloud_security.pptx
Cloud_security.pptxCloud_security.pptx
Cloud_security.pptx
 
Cybersecurity - Poland.pdf
Cybersecurity - Poland.pdfCybersecurity - Poland.pdf
Cybersecurity - Poland.pdf
 
Itc chapter # 11
Itc   chapter # 11Itc   chapter # 11
Itc chapter # 11
 
Keep Up with the Demands of IT Security on a Nonprofit Budget
Keep Up with the Demands of IT Security on a Nonprofit BudgetKeep Up with the Demands of IT Security on a Nonprofit Budget
Keep Up with the Demands of IT Security on a Nonprofit Budget
 
Just-How-Secure-is-your-Remote-Workforce-Infinity-Group-Ebook.pdf
Just-How-Secure-is-your-Remote-Workforce-Infinity-Group-Ebook.pdfJust-How-Secure-is-your-Remote-Workforce-Infinity-Group-Ebook.pdf
Just-How-Secure-is-your-Remote-Workforce-Infinity-Group-Ebook.pdf
 
ITS 833 – INFORMATION GOVERNANCEChapter 11 – Information Gov.docx
ITS 833 – INFORMATION GOVERNANCEChapter 11 – Information Gov.docxITS 833 – INFORMATION GOVERNANCEChapter 11 – Information Gov.docx
ITS 833 – INFORMATION GOVERNANCEChapter 11 – Information Gov.docx
 
What every executive needs to know about information technology security
What every executive needs to know about information technology securityWhat every executive needs to know about information technology security
What every executive needs to know about information technology security
 
IT security in 2021: Why Ransomware Is Still The Biggest Threat
IT security in 2021: Why Ransomware Is Still The Biggest ThreatIT security in 2021: Why Ransomware Is Still The Biggest Threat
IT security in 2021: Why Ransomware Is Still The Biggest Threat
 
Cybersecurity Interview Questions and Answers.pdf
Cybersecurity Interview Questions and Answers.pdfCybersecurity Interview Questions and Answers.pdf
Cybersecurity Interview Questions and Answers.pdf
 
Type of Security Threats and its Prevention
Type of Security Threats and its PreventionType of Security Threats and its Prevention
Type of Security Threats and its Prevention
 
COMPUTER AND NETWORK SECURITY.pptx
COMPUTER AND NETWORK SECURITY.pptxCOMPUTER AND NETWORK SECURITY.pptx
COMPUTER AND NETWORK SECURITY.pptx
 
Basic Home Computer Network And Computer Network Security...
Basic Home Computer Network And Computer Network Security...Basic Home Computer Network And Computer Network Security...
Basic Home Computer Network And Computer Network Security...
 
"Evolving Cybersecurity Strategies" - Threat protection and incident managment
"Evolving Cybersecurity Strategies" - Threat protection and incident managment"Evolving Cybersecurity Strategies" - Threat protection and incident managment
"Evolving Cybersecurity Strategies" - Threat protection and incident managment
 
IT Insecurity - Understanding the Threat of Modern Cyberattacks - DWCNZ 2024
IT Insecurity - Understanding the Threat of Modern Cyberattacks - DWCNZ 2024IT Insecurity - Understanding the Threat of Modern Cyberattacks - DWCNZ 2024
IT Insecurity - Understanding the Threat of Modern Cyberattacks - DWCNZ 2024
 
Cyber Security Services for Business.pdf
Cyber Security Services for Business.pdfCyber Security Services for Business.pdf
Cyber Security Services for Business.pdf
 
E-Commerce Privacy and Security System
E-Commerce Privacy and Security SystemE-Commerce Privacy and Security System
E-Commerce Privacy and Security System
 
E-Commerce Privacy and Security System
E-Commerce Privacy and Security SystemE-Commerce Privacy and Security System
E-Commerce Privacy and Security System
 
Cyber Privacy & Password Protection
Cyber Privacy & Password ProtectionCyber Privacy & Password Protection
Cyber Privacy & Password Protection
 

Recently uploaded

Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 

Recently uploaded (20)

Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 

brif enpoint.pptx

  • 2. Content S.NO TOPIC 01 What is Endpoint? 02 Why are Endpoint Targeted? 03 What is endpoint security? 04 What are the types of endpoint security? 05 Solutions of Endpoint Security
  • 3. What is Endpoint?  An Endpoint can be defined as any remote computing device that receives incoming communications and send outgoing messages to the networks.  An endpoint is also known as “Doorway” or “Gateway” of the network.
  • 5. Why are Endpoint Targeted?  Endpoint attacks are primarily aimed at accessing corporate network using endpoints as the “Doorway” or “Gateway”  The increase in BYOD (bring your own device) policies, in addition to threats targeting mobile device access and networks.
  • 6. What is Endpoint Security?  It is the practice of securing end-user device like laptops , Desktops,Mobile Devices etc… from exploitation by malicious user or cybercriminals  Endpoint security protects these ‘Doorway’ or ‘Gateway’ from Threats posed by Cyber attacks.
  • 7. What are the types of endpoint security?  Internet-of-Things (IoT) security  Network access control (NAC)  Data loss prevention (DLP)  Insider threat protection  Data classification  Uniform Resource Locator (URL) filtering  Browser isolation  Cloud perimeter security  Endpoint encryption  Sandboxing  Secure email gateways
  • 8. Solutions of Endpoint Security EDR(endpoint Detection response) MDR(Managed Detection Response) NDR(Network Detection Response) XDR(Extended Detection Response )
  • 10. Without MDR Organisation Cyber Attack Advance Threat Lack of skilled staff and security tools The team cannot identify Data breaches and lost of assets Has Lead to With MDR Organisation MDR Advance Threat Lack of skilled staff and security tools The team cannot identify Data and assets are protected Has Run into Active Threat Hunting Threat intel Real time Threat response Continuous Monitoring
  • 12. Content S.N O Topic 01 What is Data Loss prevention ? 02 What is data leak ? 03 Difference between data leak and a data Breach 04 Features 05 Why to use 06 Working 07 software available for DLP
  • 13. What Is Data Loss Prevention?  Data loss prevention (DLP) is a method of detecting and preventing potential data breaches or unwanted destruction of sensitive data by monitoring, detecting and blocking sensitive data.
  • 14. What is a Data Leak?  A data leak is an overlooked exposure of sensitive data either electronically or physically.  Data leaks could occur on the internal or via physical devices such as external hard drives or laptops.  If a cybercriminal locates a data leak, they can use the information to harm themselves for a data breach attack.
  • 15. Difference Between a Data Leak and a Data Breach  A data breach is the outcome of a planned cyber attack, but a data leak is the accidental exposure of sensitive data by a business.  Cybercriminals do not create data leaks, they discover them and then use them to launch data breach attacks.  Data leaks tend to result from poor security practices.  A business can also be impacted if any of its vendors have a data leak
  • 16. DLP Features Why to use Working
  • 17. Features E-mail client Attachment on browser Attachment on application HDD Pen drive Network Drive Share point Cloud Storage 01) Monitoring system 02) USB Blocking 03) Browser restriction 04) File based & Extension based restriction 05) Remote Login
  • 18. Why to use Data Visibility Data protection Enhancement Confidentiality Secure Access Authencation Integrity Data Classification
  • 20. AGENT Software agent they will be install in your machine on fixed port FIX Port:- Notification Video, Pic File Remote Update L A N
  • 21. W A N Installing agent on Wan devices Mapping The public IP Sending log information to server
  • 22. List of the Best Data Loss Prevention Software solutions by company  Palo alto  Endpoint Protector By CoSoSys  NinjaOne Backup  Symantec DLP  McAfee DLP  Forcepoint DLP  SecureTrust Data Loss Prevention  Digital Guardian  Trend Micro IDLP  Sophos  Code42  Check Point  Safetica
  • 24. Content S.NO TOPIC 01 What is E-mail Security 02 Why E-mail Security Important 03 Types of E-mail Threats 04 The benefits of E-mail Security 05 E-mail Security Requirements 06 How can we Secure E-mail 07 E-mail Security tool’s
  • 25. What Is E-mail security  Email security includes the techniques and technologies used to protect email accounts and communications.  Email is a critical component of organizational communication because it enables users to communicate quickly, easily, and with a variety of devices.  Email security is important because email contains sensitive information, is used by everyone in the organization, and is therefore one of a company’s largest targets for attacks.
  • 26. Why is email security important?  Email has been a primary communication tool in the workplace for more than two decades.  More than 333 billion emails are sent and received daily worldwide—and employees get an average of 120 emails a day.  Cybercrime cost more than $4.1 billion in 2020, with business email compromise causing the most damage, according to the FBI’s Internet Crime Complaint Center (IC3). The consequences can be severe, leading to significant financial, data, and reputational losses.
  • 27. Types of Email Threats Data exfiltration Malware Spam Impersonation Phishing
  • 28. The benefits of email security Enhance productivity Ensure compliance with data protection laws Protect a company’s brand, reputation, and bottom line
  • 29. Email Security Requirements • Protection from Discloser Confidentiality • Sender of Message Authencation • Protection From modification Integrity • Protection From denial by Sender Non-Repudiction
  • 30. Basic Phase of E-mail Sender SMPTP Receiver SMTP Server Receiver internet Pull Encrypted Phase of E-mail
  • 31. How can we secure e-mail ? Spam filter Email encryption Antivirus protection Secure email gateway (SEG) Multi-factor authentication (MFA) Employee education
  • 33. 1. Easydmarc Powerful Standards Application. Alert Your Employees. Protect Data. Reach the Inbox. Know Senders. Features:
  • 34. 2. PEP Peer-to-peer and end-to- end email encryption. Automatic protection of emails from being read or modified. Seamless use on your laptop, desktop, tablet, mobile with PEP sync. Protection rating at a glance using traffic lights. Free and open source software. Features:
  • 35. 3. Europeanmx In- and outbound spam and virus filtering. Email archiving according. Email queuing on failure. Reputation protection. Features:
  • 36. 4. Sonicwall The Inbound Spooling feature allows users to hold mail when all the customer’s receivers are unavailable. Phishing protection and email fraud. Scan malicious URLs at the time-of-click for advanced threats. Prevent email fraud through powerful email authentication policies, including DMARC. Features:
  • 37. 5. Cisco Automatically blocks links it considers to be unsafe, which protects from emails even when they look genuine. The reporting and logging on offer are reliable, bring you insights into your email security. Active spam filtering, which will ensure you only get the emails you want in your inbox. Data loss protection, with methods that ensure your emails, are protected with encryption. Features:
  • 38. 6. Proofpoint The software protects against email threats, effective spam protection, dominant URL defense, and content filtering. Proofpoint’s user console is modern, providing granular controls and improved threat reporting. It’s an ideal solution for companies and MSPs, with easy set-up and competitive pricing. Great tool for teams using Office 365, as it offers Azure Active Directory Sync, meaning implementation is seamless, and new users are automatically added. Features:
  • 39. PGP( pretty good services)  Widely used  freely available  Using digital signature  PGP incorporated tool for developing a public key trust model & public key certificate management  PGP provides confidentiality & authentication services that can be used for electronic mail & file storage application
  • 40.