Symantec Data Loss Prevention 9

9,119 views

Published on

Symantec Data Loss Prevention. Las tendencias mundiales nos muestran que el mayor porcentaje de perdida y robo de datos responde a la falta de visibilidad y el error en el manejo de los mismos. Conozca como prevenirse.

0 Comments
12 Likes
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total views
9,119
On SlideShare
0
From Embeds
0
Number of Embeds
34
Actions
Shares
0
Downloads
0
Comments
0
Likes
12
Embeds 0
No embeds

No notes for slide
  • Objective of Slide:Define measurable risk reductionGive three Customer resultsProblemSolutionBenefitScriptHere are three examples of Customers who use the Data Loss Prevention solution to protect their confidential data. Across industries, organizations turn to Symantec to reduce their level of data loss risk. In fact, 1 in 3 FORTUNE 100 Customers are a Symantec Data Loss Prevention Customers. Here are three Customers, from three different industries, who reduced their risk of data loss after implementing our solution:1. A leading healthcare provider needed to protect over 1 million patient records and demonstrate compliance with HIPAA (Health Insurance Portability and Accountability Act). They are using Symantec Data Loss Prevention to block Protected Health Information (PHI) from leaving their organization via email or USBs. Within one year of deploying the solution, they saw a 70% reduction in the number of data loss incidents as a result of automated policy enforcement. (Sharp HealthCare)2. A F100 Financial Services company needed to maintain their brand reputation, and protect their confidential company and customer data. They are using Symantec Data Loss Prevention to automatically send email notifications to their employees when they violate corporate data security policies. Since deploying the solution, they’ve reduced their data loss risk by 80% due to employee education. (New York Life)3. A Global Manufacturing company needed to protect their intellectual property, such as CAD diagrams, to prevent overseas competitors from stealing their product designs. They are using Symantec Data Loss Prevention’s advanced detection technology to fingerprint all of their confidential design documents and accurately detect matches against data being sent, stored or copied. As a result of the solution, they have seen a 98% reduction in unauthorized sharing of design specs. (Caterpillar)Are you experiencing similar challenges?Across industries we’ve helped organizations to safeguard their confidential information. As I mentioned 1 in 3 F100 is a Symantec DLP Customer, in fact within the F100:9 of the top 10commercial and investment banks6 of the top 10insurance companies4 of the top 5 healthcare providers4 of the top 5 credit card companies6 topenergy and utilities companies8 topmanufacturing companies12 toptechnology companies13 topretail brands14 toppublic sector organizations… are Symantec Data Loss Prevention Customers[Click]
  • Objective of SlideDemonstrate market leadership.Communicate how global companies across industries are using Symantec Data Loss Prevention.Customize the text in the grey boxes as needed:25% of the FORTUNE 100 8 of the top 10 commercial and investment banks (Citigroup, BofA, JPMorganChase, MorganStanley, Goldman Sachs, PNC Bank, Charles Schwab, Barclays) 6 of the top 10 insurance companies (AIG, Allstate, Prudential, NY Life, The Hartford, and Progressive) 4 of the top 5 healthcare providers (UHG, Aetna, CIGNA, Humana) 4 of the top 5 credit card companies (Visa, Mastercard, Discover, AMEX)6 top energy and utilities companies (Southern, Waste Management, Xcel Energy, DTE Energy, Pinnacle West Capital, World Fuel Services) 8 top manufacturing companies (Nikon, Alliance One International, Pitney Bowes, Honeywell, CAT, Dow Corning, CHS, Northrup-Grumman) 12 top technology companies (Cisco, Finisar, NetApp, Tech Data Corp, Xerox, Cadence, Motorola, Verisign, Google, Sony, Qualcomm, Symantec!)13 top retail brands (Big Lots, Blockbuster, Cabela’s, CarMax, CVS, Dollar General, eBay/PayPal, Mary Kay, McDonald’s, Nordstrom, Retail Ventures, Safeway, United Rentals) 14 top public sector organizations (Career Education, DeVry, NYC DOE, Education Management, San Jacinto College, University of Nebraska, University of Rochester, William Rainey Harper College, DLA, DoD, FDIC, NHS, Office of Director of National Intelligence, US Army) ScriptWe are the choice of global market leaders. We have customers across various industries: healthcare, insurance, retail, financial services, manufacturing and high tech.1st column: DLP continues to gain momentum in the heath care industry where PCI compliance and HIPAA are key drivers (we have 4 of the top 5 healthcare providers – United HealthGroup, Aetna, CIGNA, Humana)2nd column: Symantec Data Loss Prevention dominates the insurance industry with 6 top insurance companies – AIG, Allstate, Prudential, New York Life, The Hartford and Progressive). 3rd column: 12 top retail brands are Symantec DLP customers and they too need to protect pricing and promotion information as well as credit card information for PCI compliance and brand protection4th column: Symantec Data Loss Prevention also dominates the financial services industry with 8 of the top 11 commercial and investment banks. 5th column: Symantec DLP customers include 10 top technology companies who need to protect Intellectual Property including source code and pricing information. We also have manufacturing customers who have purchased DLP primarily to also protect IP. Caterpillar for example needed to protect manufacturing and design documents from competition. NetApp needed to protect proprietary source code from misuse as development expands to India and China, while also defining shareable, open source code. Motorola shared with us that they had to protect their phone designs as there was a 90 day window from when a phone was launched until competitive solutions were on the market. [Click] In fact, we have been positioned as a leader in the Gartner MQ for the last 3 consecutive years. (Note this can not be printed or mentioned in a public recording) . We have the most experts dedicated to Data Loss Prevention. One in four FORTUNE 100 companies is a Symantec DLP customer.
  • Objective of SlideDemonstrate market leadership.Communicate how global companies across industries are using Symantec Data Loss Prevention.Customize the text in the grey boxes as needed:25% of the FORTUNE 100 8 of the top 10 commercial and investment banks (Citigroup, BofA, JPMorganChase, MorganStanley, Goldman Sachs, PNC Bank, Charles Schwab, Barclays) 6 of the top 10 insurance companies (AIG, Allstate, Prudential, NY Life, The Hartford, and Progressive) 4 of the top 5 healthcare providers (UHG, Aetna, CIGNA, Humana) 4 of the top 5 credit card companies (Visa, Mastercard, Discover, AMEX)6 top energy and utilities companies (Southern, Waste Management, Xcel Energy, DTE Energy, Pinnacle West Capital, World Fuel Services) 8 top manufacturing companies (Nikon, Alliance One International, Pitney Bowes, Honeywell, CAT, Dow Corning, CHS, Northrup-Grumman) 12 top technology companies (Cisco, Finisar, NetApp, Tech Data Corp, Xerox, Cadence, Motorola, Verisign, Google, Sony, Qualcomm, Symantec!)13 top retail brands (Big Lots, Blockbuster, Cabela’s, CarMax, CVS, Dollar General, eBay/PayPal, Mary Kay, McDonald’s, Nordstrom, Retail Ventures, Safeway, United Rentals) 14 top public sector organizations (Career Education, DeVry, NYC DOE, Education Management, San Jacinto College, University of Nebraska, University of Rochester, William Rainey Harper College, DLA, DoD, FDIC, NHS, Office of Director of National Intelligence, US Army) ScriptWe are the choice of global market leaders. We have customers across various industries: healthcare, insurance, retail, financial services, manufacturing and high tech.1st column: DLP continues to gain momentum in the heath care industry where PCI compliance and HIPAA are key drivers (we have 4 of the top 5 healthcare providers – United HealthGroup, Aetna, CIGNA, Humana)2nd column: Symantec Data Loss Prevention dominates the insurance industry with 6 top insurance companies – AIG, Allstate, Prudential, New York Life, The Hartford and Progressive). 3rd column: 12 top retail brands are Symantec DLP customers and they too need to protect pricing and promotion information as well as credit card information for PCI compliance and brand protection4th column: Symantec Data Loss Prevention also dominates the financial services industry with 8 of the top 11 commercial and investment banks. 5th column: Symantec DLP customers include 10 top technology companies who need to protect Intellectual Property including source code and pricing information. We also have manufacturing customers who have purchased DLP primarily to also protect IP. Caterpillar for example needed to protect manufacturing and design documents from competition. NetApp needed to protect proprietary source code from misuse as development expands to India and China, while also defining shareable, open source code. Motorola shared with us that they had to protect their phone designs as there was a 90 day window from when a phone was launched until competitive solutions were on the market. [Click] In fact, we have been positioned as a leader in the Gartner MQ for the last 3 consecutive years. (Note this can not be printed or mentioned in a public recording) . We have the most experts dedicated to Data Loss Prevention. One in four FORTUNE 100 companies is a Symantec DLP customer.
  • Symantec Data Loss Prevention 9

    1. 1. Symantec Data Loss Prevention Las tendencias mundiales nos muestran que el mayor porcentaje de perdida y robo de datos responde a la falta de visibilidad y el error en el manejo de los mismos. Conozca como prevenirse.<br />Ariel Beliera, Account Systems EngineerFrancisco Della Paolera, Corporate Business Manager<br />Symantec South of Latin-American Region<br />Vontu: Now Part of Symantec<br />
    2. 2. 2<br />Key Questions Facing Today’s CISO<br />What are the challenges? <br />What is Data Loss Prevention (DLP)? <br />Why Symantec DLP and how does it work?<br />Why customers choose Symantec DLP?<br />
    3. 3. 3<br />CORPORATIONSWITHOUT WALLS<br />DATA EXPLOSION<br />THE ROLEOF SECURITY<br />The Vanishing Perimeter<br />The Office is “Anywhere”<br />Outsourcing and Offshoring <br />Data is Everywhere<br />Structured Data, Unstructured Content<br />IP, Customer, and Classified Data<br />Risk and Compliance<br />Business Enabler<br />Limited Budget<br />Security for a Wide Open World<br />CONFIDENTIAL<br />
    4. 4. Do You Know…<br />How best to<br />prevent its loss?<br />How is it being used?<br />Where is your<br />confidential data?<br />4<br />
    5. 5. What is Data Loss Prevention?<br />DISCOVER<br />PROTECT<br />MONITOR<br />DATA LOSS PREVENTION (DLP)<br />5<br />
    6. 6. Key DLP Requirements<br />DISCOVER<br />PROTECT<br />MONITOR<br /><ul><li>Find data wherever it is stored
    7. 7. Create inventory of sensitive data
    8. 8. Manage data clean up
    9. 9. Understand how data is being used
    10. 10. Understand content and context
    11. 11. Gain enterprise-wide visibility
    12. 12. Gain visibility into policy violations
    13. 13. Proactively secure data
    14. 14. Prevent confidential data loss</li></ul>MANAGE<br /><ul><li>Remediate and report on incidents
    15. 15. Define unified policy across enterprise
    16. 16. Detect content accurately</li></ul>6<br />
    17. 17. MONITOR<br />DISCOVER<br />PROTECT<br />2<br />3<br />4<br /><ul><li>Identify scan targets
    18. 18. Run scan to find sensitive data on network & endpoint data
    19. 19. Inspect data being sent
    20. 20. Monitor network & endpoint events
    21. 21. Block, remove or encrypt
    22. 22. Quarantine or copy files
    23. 23. Notify employee & manager</li></ul>MANAGE<br />5<br /><ul><li>Remediate and report on risk reduction</li></ul>1<br /><ul><li>Enable or customize policy templates</li></ul>MANAGE<br />How It Works<br />7<br />
    24. 24. How Is Symantec DLP Different?<br />8<br />
    25. 25. Complete Coverage<br />DISCOVER<br />Manage data clean up<br />Find data wherever <br />it is stored<br />Create inventory of sensitive data<br />Find more data in more places<br />Scalable system for inventory<br />Automated and scalable remediation<br /><ul><li>Fastest way to inventory data
    26. 26. High performance, parallel scans
    27. 27. Flexible deployment options
    28. 28. Targeted scanning
    29. 29. Automatic identification of data owners
    30. 30. Systematic re-scanning
    31. 31. Broadest file server coverage
    32. 32. Distributed laptops and desktops
    33. 33. All SQL databases natively
    34. 34. Major document repositories
    35. 35. Key email servers
    36. 36. Internal and external web sites</li></ul>9<br />
    37. 37. Complete Coverage<br />MONITOR<br />Gain enterprise-wide visibility<br />Understand how data is being used<br />Understand content and context<br />Broadest network and endpoint event coverage<br />Only unified network and endpoint solution<br />Proven scalability<br /><ul><li>Largest distributed deployments
    38. 38. Maximum visibility
    39. 39. Continuous coverage
    40. 40. Highest detection accuracy
    41. 41. Monitor online and offline users
    42. 42. Monitor unmanaged devices
    43. 43. Email, Web, IM
    44. 44. FTP, PTP, TCP
    45. 45. Removable Media
    46. 46. Print/Fax
    47. 47. Copy/Paste</li></ul>10<br />
    48. 48. Complete Coverage<br />PROTECT<br />Proactively secure data<br />Prevent confidential data loss<br />Enforce confidential data policies<br />Proven ability to block policy violations<br />Automated response to ensure policy compliance<br />11<br />Proven solution to change employee behavior<br /><ul><li>Active blocking at the network
    49. 49. Active blocking at the endpoint
    50. 50. Conditional encryption
    51. 51. Selective web content removal
    52. 52. Automatically quarantine, copy, remove data in violation of policy
    53. 53. Automated encryption
    54. 54. Broadest scan coverage
    55. 55. Real-time notification
    56. 56. On-screen pop-ups
    57. 57. “Ransom note” in place of relocated file</li></li></ul><li>Complete Coverage<br />MANAGE<br />Detect content accurately<br />Define unified policy across enterprise<br />Remediate and report on incidents<br />“Define once, enforce everywhere”<br />Easy to use<br />Accuracy enables blocking and lowest TCO<br /><ul><li>Single management console
    58. 58. Pre-defined and customizable policies
    59. 59. Over 20 response actions
    60. 60. Automatic incident prioritization
    61. 61. 5-second incident triage
    62. 62. Trend and risk reporting
    63. 63. Analyze content and context
    64. 64. Structured data in databases and tabular format
    65. 65. Unstructured content in documents
    66. 66. Describe content using keywords and lexicons</li></ul>12<br />
    67. 67. Measurable Risk Reduction<br />70%<br />98%<br />80%<br /><ul><li>Protect Patient Data
    68. 68. HIPAA Compliance
    69. 69. Automate protection
    70. 70. Intellectual Property
    71. 71. Competitive advantage
    72. 72. Detection technology
    73. 73. Financial & Customer data
    74. 74. Protect brand & customers
    75. 75. Employee education</li></li></ul><li>Global Market Leader<br />14<br />Positioned as a Leaderin the Gartner MQ<br />Most experts dedicated to DLP<br />More than 5 million employees covered<br />9 of the top 10commercial and I-banks<br />9 of the top 10insurance companies<br />7 of the top 10healthcare providers<br />4 of the top 5credit card companies<br />27 toptechnology companies<br />22 topretail brands<br />14 topbusiness services companies<br />14 topmanufacturing companies<br />13 topenergy and utility companies<br />1 in 3FORTUNE 100companies is a Symantec DLP customer<br />
    76. 76. Symantec DLP Architecture<br />MTA or Proxy<br />NETWORKPROTECT<br />DISCOVER<br />STORAGE<br />NETWORKPREVENT<br />ENFORCEPLATFORM<br />MONITOR<br />NETWORK<br />MANAGEMENTPLATFORM<br />ENDPOINTPREVENT<br />SPAN Port or Tap<br />DISCOVER<br />ENDPOINT<br />DMZ<br />SECURED CORPORATE LAN<br />Disconnected<br />15<br />
    77. 77. Continuous Risk Reduction<br />Baseline<br />1000<br />Remediation<br />800<br />Notification<br />600<br />Incidents Per Week<br />400<br />Prevention<br />200<br />0<br />Risk Reduction Over Time<br />16<br />
    78. 78. Gartner Magic Quadrant for Content-Aware Data Loss Prevention<br />Symantec positioned in the leaders quadrant in the Gartner Magic Quadrant for Content-Aware Data Loss Prevention, 2009<br />This Magic Quadrant graphic was published by Gartner, Inc. as part of a larger research note and should be evaluated in the context of the entire report. The Gartner report is available upon request from Symantec. The Magic Quadrant is copyrighted June 2009 by Gartner, Inc. and is reused with permission. The Magic Quadrant is a graphical representation of a marketplace at and for a specific time period. It depicts Gartner’s analysis of how certain vendors measure against criteria for that marketplace, as defined by Gartner. Gartner does not endorse any vendor, product or service depicted in the Magic Quadrant, and does not advise technology users to select only those vendors placed in the “Leaders” quadrant. The Magic Quadrant is intended solely as a research tool, and is not meant to be a specific guide to action. Gartner disclaims all warranties, express or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose. <br />Source: Magic Quadrant for Content-Aware Data Loss Prevention; by Eric Ouellet, Paul E. Proctor; June 22, 2009<br />17<br />
    79. 79. Why Symantec DLP is the Safe Choice<br />Measurable Risk Reduction<br />Complete Coverage<br />Only Unified Data Loss Prevention Solution<br /> Global Market Leader<br />18<br />
    80. 80. Next Steps<br />Evaluation Workshop & Demo<br />Evaluation<br />Customer Reference Checks<br />19<br />
    81. 81. Thank You!<br />Ariel Beliera<br />Ariel_Beliera@symantec.com<br />+5491167151656<br />© 2008 Symantec Corporation. All rights reserved.  <br />THIS DOCUMENT IS PROVIDED FOR INFORMATIONAL PURPOSES ONLY AND IS NOT INTENDED AS ADVERTISING. ALL WARRANTIES RELATING TO THE INFORMATION IN THIS DOCUMENT, EITHER EXPRESS OR IMPLIED, ARE DISCLAIMED TO THE MAXIMUM EXTENT ALLOWED BY LAW. THE INFORMATION IN THIS DOCUMENT IS SUBJECT TO CHANGE WITHOUT NOTICE. <br />20<br />
    82. 82. Appendix<br />21<br />
    83. 83. The Shift in Data Security Threat<br />Insider vs. The Hacker<br />Inadvertent vs. Malicious<br />Breaches since 2005:<br />1380 and counting<br />&gt; 318M records<br />96% of leaks are due to faulty processes or oversight<br />1% malicious<br />Other<br />1% manager approved<br />50%<br />of leakage is due to business process<br />46%<br />of leakage is due to employee oversight<br />Hacker <br />48%<br />Insider<br />52%<br />Data compiled from industry sources including EPIC.org and PerkinsCoie.com. <br />Source: Symantec Data Loss Prevention Risk Assessment findings.<br />22<br />Symantec Confidential - Do Not Copy or Distribute<br />
    84. 84. Impact of Data Loss<br />£47 per Consumer Record in UK <br />318 Million Records Breached Since 2005<br />$600 Billion IP Theft a Year Globally<br />Cross Industry…. <br />23<br />Symantec Confidential - Do Not Copy or Distribute<br />
    85. 85. 318<br />million personal records have been exposed by data breaches since 20051<br />85%<br />of security execs claimed at least one reportable security breach involving data loss in the last year2<br />52%<br />of Chief Information Security Officers believe data leakage to<br />be a top driver of their security spending3<br />65%<br />increase in spending on Data Loss Prevention since 06, as the number one most promising new security technology4<br />Top of Mind for Chief Information Security Officers<br />24<br />Growing Concern<br />
    86. 86. What is Data Loss Prevention?<br />How best to<br />prevent its loss?<br />How is it being used?<br />Where is your<br />confidential data?<br />DISCOVER<br />PROTECT<br />MONITOR<br />DATA LOSS PREVENTION (DLP)<br />25<br />
    87. 87. Data Loss Prevention Drivers<br />Customer Data<br />Social Security Numbers<br />Credit Card Numbers<br />Protected Health Info<br />Corporate Data<br />Financials<br />Mergers and Acquisitions<br />Employee Data<br />Intellectual Property<br />Source Code<br />Design Documents<br />Pricing<br />Confidential Data Types<br />1:400 messages contains confidential data<br />1:50 network files is wrongly exposed<br />The Risk<br />The Risk<br />4:5 companies lost dataon laptops<br />1:2 companies lost dataon USB drives<br />26<br />
    88. 88. Symantec Data Loss Prevention<br />PROTECT<br />MANAGE<br />DISCOVER<br />MONITOR<br />Endpoint<br />Network<br />Storage<br />Symantec Data Loss Prevention Endpoint Discover<br />Symantec Data Loss Prevention Network Monitor<br />Symantec Data Loss Prevention Network Monitor<br />Symantec Data Loss Prevention Endpoint Discover<br />Symantec Data Loss Prevention Network Discover<br />Symantec Data Loss Prevention Network Discover<br />Symantec Data Loss Prevention Network Protect<br />Symantec Data Loss Prevention Endpoint Prevent<br />Symantec Data Loss Prevention Network Prevent<br />Symantec Data Loss Prevention Network Prevent<br />Symantec Data Loss Prevention Network Protect<br />Symantec Data Loss Prevention Endpoint Prevent<br />Symantec Data Loss Prevention Endpoint Prevent<br />Management Platform<br />Symantec Data Loss Prevention Enforce Platform<br />
    89. 89. Network<br />Symantec Data Loss Prevention Network Monitor<br />Symantec Data Loss Prevention Network Prevent<br />Symantec Data Loss Prevention<br />Endpoint<br />Storage<br />Symantec Data Loss Prevention Endpoint Discover<br />Symantec Data Loss Prevention Network Discover<br />Symantec Data Loss Prevention Endpoint Prevent<br />Symantec Data Loss Prevention Network Protect<br />Management Platform<br />Symantec Data Loss Prevention Enforce Platform<br />
    90. 90. DLP Complements Symantec Solutions<br />Symantec Data Loss Prevention<br />Complementary Symantec Solutions<br />Network<br />Symantec DLP Network Prevent<br />Symantec DLP Network Monitor<br />Symantec Brightmail Gateway*<br />Symantec IM Manager<br />Endpoint<br />Symantec DLP Endpoint Prevent<br />Symantec DLP Endpoint Discover<br />Symantec Management Console<br />Symantec Endpoint Encryption<br />Symantec Network Acess Control<br />Symantec Endpoint Protection<br />Storage<br />Symantec Backup Exec System Recovery<br />Symantec DLP Network Protect<br />Symantec DLPNetwork Discover<br />SymantecVeritas Netbackup<br />SymantecEnterprise Vault<br />SymantecBackup Exec<br />ManagementPlatform<br />Symantec DLP Enforce Platform<br />Symantec Control Compliance Suite<br />Symantec Security InformationManager**<br />Symantec Enterprise Security Manager<br />29<br />*Formerly known as Symantec Mail Security 8300<br />** In the process of being incorporated into Symantec Control Compliance Suite<br />
    91. 91. Accurate Detection <br />Network<br />Scale<br />Content<br />Context<br />Structured<br />People<br />Volume<br /><ul><li>Departments
    92. 92. Partners
    93. 93. Contractors
    94. 94. Country
    95. 95. Department
    96. 96. Branch office
    97. 97. European
    98. 98. Asian
    99. 99. Document type
    100. 100. Network protocol
    101. 101. Encrypted
    102. 102. Billions of records
    103. 103. Millions of documents
    104. 104. <100ms latency
    105. 105. Gb+ throughput
    106. 106. Scan TBs per day
    107. 107. 1000’s of endpoints
    108. 108. PHI
    109. 109. PII
    110. 110. Inventory
    111. 111. Design documents
    112. 112. Source code
    113. 113. Media files
    114. 114. Financial results
    115. 115. Credit Cards
    116. 116. SSNs
    117. 117. Dictionaries
    118. 118. Keywords</li></ul>Location<br />Unstructured<br />+<br />+<br />Language<br />Described<br />Storage<br />Container<br />30<br />
    119. 119. Symantec DLP TrueMatch™ Detection<br />IDMIndexed Document Matching<br />EDMExact Data Matching<br />DCMDescribed Content Matching<br />Structured DataCustomer Data<br />Unstructured DataIntellectual Property<br />Described Data<br />• Non-indexable data• Lexicons• Data identifiers<br />• Designs/Source/Financials• Derivative & passage match• Near perfect accuracy<br />• Customer/Employee/Pricing • Partial row matching • Near perfect accuracy<br />• 5M+ docs per server<br />• 300M+ rows per server<br />31<br />31<br />
    120. 120. Complete Coverage: Discover<br />Find data wherever it is stored<br />File servers<br />Distributed machines<br />Document and email repositories<br />Web content and applications<br />Databases<br />Create inventory of sensitive data<br />Scheduled scanning<br />Incremental scanning<br />“Out of compliance” scan mode<br />Manage data clean up<br />Incident match count<br />File details (date, owner)<br />Access control information<br />Data owner look up<br />32<br />32<br />32<br />
    121. 121. Complete Coverage: Monitor<br />Understand how data is being used<br />Network protocol coverage<br />Endpoint event coverage<br />Content- and context-aware detection<br />Automated sender/manager notification<br />Monitor on the network<br />Standard hardware<br />Signature-based protocol recognition<br />Gigabit monitoring without “sampling” or dropped packets<br />Queue incidents<br />Monitor at the endpoint<br />Online and offline<br />Unmanaged devices and OSes<br />On-screen pop up notification<br />
    122. 122. Complete Coverage: Protect<br />Proactively secure stored data<br />Relocate data to an encrypted location<br />Automatically quarantine, copy, or remove data<br />Broadest scan target coverage<br />Prevent confidential data loss<br />Real-time blocking on network and endpoint<br />Conditionally quarantine/route emails for encryption<br />Selectively remove content from web postings<br />Certified ICAP integration with leading web proxies<br />Support for all SMTP compliant MTAs<br />Enforce confidential data policies<br />Real-time email notifications<br />Seamless interaction with Web 2.0 sites<br />On-screen pop-up notification on the endpoint<br />“Ransom note” in place of relocated stored data<br />34<br />
    123. 123. Complete Coverage: Manage<br />Universal DLP Policy<br />“Define once, enforce everywhere”<br />60+ pre-built policy templates<br />Custom detection and response rules<br />Accurate TrueMatch Detection<br />Content and context, enterprise scale<br />Comprehensive EDM, IDM, and DCM<br />Automated Remediation and Workflow<br />Automated action and response<br />“5 second incident triage” <br />“One-click response”<br />Comprehensive Reporting<br />40+ pre-configured reports<br />Business unit risk assessment<br />Scalable and Secure Management<br />Distributed architecture with high-availability<br />Advanced security design<br />35<br />35<br />35<br />
    124. 124. Symantec DLP Success Model<br />Focus<br />Target High-Risk Data and Identify Exposure <br />Communicate<br />Manage Risk, <br />Deliver Results<br />Design<br />Prepare Data Loss Policy,<br />Remediation and <br />Risk Reduction Blueprint<br />ACCUMULATED KNOWLEDGE <br />Implement<br />Protect and Prevent: <br />Engage Users <br />
    125. 125. Successful DLP Workflow<br />37<br />
    126. 126. Global Market Leader<br />38<br /><ul><li> Positioned as a leader in the Gartner MQ
    127. 127. Most experts dedicated to DLP
    128. 128. 30% of the FORTUNE 100
    129. 129. 9 of the top 10 commercial and universal banks
    130. 130. 9 of the top 10 insurance companies
    131. 131. 7 of the top 10 healthcare providers
    132. 132. 4 of the top 5 credit card companies</li>

    ×