SlideShare a Scribd company logo
1 of 46
Download to read offline
Be Aware Webinar # 50:
Maximice su Prevención Hacia la Fuga de Información
Nueva Versión Symantec DLP v14.5
Jairo Pantoja Moncayo
CISSP, CISM, CGEIT, CRISC, ABCP, ISO27001 LA, PCIP, AWSP, CobIT Found. Sec+
Senior SE, Symantec MCLAC Region
June 8, 2016
Safe Harbor Disclaimer
This information is about pre-release software. Any
unreleased update to the product or other planned
modification is subject to ongoing evaluation by Symantec
and therefore subject to change. This information is
provided without warranty of any kind, express or
implied. Customers who purchase Symantec products
should make their purchase decision based upon features
that are currently available.
2
Symantec DLP 14.5 Differences Training: Detection, Storage, Platform and Reporting
Symantec Enterprise Security | ESTRATEGIA DE SOLUCIONES
3
Protección de Amenazas
ENDPOINTS DATA CENTER GATEWAYS
• Protección contra Amenazas Avanzadas a través de los Puntos de Control
• Forensia incluida y Remediación dentro de cada Punto de Control
• Protección Integrada para servidores Físicos, Virtuales y en la Nube
• Administración en la nube para Endpoints, Datacenter y Gateways
Plataforma Unificada de Seguridad
Colección de
Registros y
Telemetría
Administración
Unificada de
Incidentes y Hub
Integración en Línea
de Inteligencia
Procesable
Evaluación
comparativa
Regional e
Industrial
Análisis de
Amenazas y
Comportamiento
Protección de Información
DATOS IDENTIDADES
• Protección integral para Datos e Identidades
• Cloud Security Broker para Aplicaciones en la Nube y
Moviles
• Análisis de Usuarios y Comportamiento
• Cifrado y Administración de llaves en la Nube
Users
Data
Apps
Cloud
Endpoints
Gateways
Data
Center
Servicios de Ciber Seguridad
Monitoreo, Respuesta a Incidentes, Simulación, Inteligencia contra Amenazas
Copyright © 2015 Symantec Corporation
Agenda
1 Panorama Actual
2 Desafíos
3 DLP v14.5
Copyright © 2014 Symantec Corporation
4
Agenda
1 Panorama Actual
2 Desafíos
3 DLP v14.5
Copyright © 2014 Symantec Corporation
5
Copyright 2016, Symantec CorporationInforme sobre las Amenazas a la Seguridad en Internet 2016 - Volumen 21
Fugas de Datos 2015
Reporte ISTR v.21
6
Copyright 2016, Symantec CorporationInforme sobre las Amenazas a la Seguridad en Internet 2016 - Volumen 21
232
93
552
348
429
0
100
200
300
400
500
600
2011 2012 2013 2014 2015
MILLONES
7
Total de Registros Expuestos, 2015
+23%
500
+30%
ESTIMADO
Copyright 2016, Symantec CorporationInforme sobre las Amenazas a la Seguridad en Internet 2016 - Volumen 21
Megafugas 2015
8
Tendencias, retos y lo que está en juego
Agenda
1 Panorama Actual
2 Desafíos
3 DLP v14.5
Copyright © 2014 Symantec Corporation
10
11
Seguridad de la Información y Cumplimiento
regulatorio…..
• Sudeban (Venezuela)
• Resol. JB 3066:2014 (Ecuador)
• Circular 042 SF (Colombia)
• Ley 1581 Protección de datos (Colombia) -DI
• Ley LFPDPPP (México) -DI
• Ley 19.628 Protección de datos (Chile)
Algunas Amenazas
Copyright © 2014 Symantec Corporation
12
Source: APT1: Exposing one of China’s Cyber Espionage Units,
Mandiant®, 2013
A corporate
black eye
Agenda
1 Panorama Actual
2 Desafíos
3 DLP v14.5
Copyright © 2014 Symantec Corporation
13
Symantec Data Loss Prevention -Generalidades
2016 Gartner Magic Quadrant for Enterprise Data Loss Prevention:
9 Años líder indiscutible del Mercado
This Magic Quadrant graphic was published by Gartner, Inc. as part of a larger
research note and should be evaluated in the context of the entire report. The
Gartner report is available upon request from Symantec. Gartner does not
endorse any vendor, product or service depicted in our research publications,
and does not advise technology users to select only those vendors with the
highest ratings or other designation. Gartner research publications consist of the
opinions of Gartner's research organization and should not be construed as
statements of fact. Gartner disclaims all warranties, expressed or implied, with
respect to this research, including any warranties of merchantability or fitness for
a particular purpose
Source: Magic Quadrant for Enterprise Data Loss
Prevention, Brian Reed, Neil Wynne 28 January
2016, Gartner, Inc.
Copyright © 2016 Symantec Corporation
16
DATA LOSS PREVENTION (DLP)
DESCUBRIR PROTEGERMONITOREAR
¿Cómo la protejo?¿Cómo esta siendo
utilizada?
¿Dónde esta la
información
confidencial?
Symantec - DLP
Copyright © 2016 Symantec Corporation
17
Symantec - DLP
Evitar que personas maliciosas roben propiedad intelectual valiosa.
Educar y proteger a empleados.
Evitar la fuga o pérdida de datos confidenciales.
Cumplir con las leyes globales de privacidad.
Proteger su reputación.
Capacidad de Detección en DLP
Copyright © 2015 Symantec Corporation
18
Unified
ManagementExtending Data Protection for the Cloud
Box
Office 365
iOS
Android
Email
Web
FTP
IM
USB
Hard Drives
Removable Storage
Network Shares
Print/Fax
Cloud & Web Apps
File Servers
Exchange, Lotus
SharePoint
Databases
Web Servers
Tecnologías en la detección de archivos
Described
Content Matching
Indexed Document
Matching IDM
Vector Learning
Machine
DATOS DESCRITO
Datos No Indexables
Léxicos
Data identifiers
DATOS ESTRUCTURADOS
Datos de Clientes / Empleados
/ Personas
Partial row matching
Precisión casi perfecta
DATOS NO ESTRUCTURADOS
PROPIEDAD INTELECTUAL
Diseños / código fuente /
Finanzas
Derivative match
Precisión casi perfecta
300M+ docs por servidor 5M+ docs por servidor
Exact Data Matching
DATOS NO ESTRUCTURADOS
PROPIEDAD INTELECTUAL
Diseños / código fuente /
Finanzas
Derivative match
Precisión perfecta
DLP Nueva Versión 14.5
DLP 14.5 Algunas Novedades
• Principales Características:
– Cloud Storage: Cuarentena de Incidentes en Box.
– Enforce Platform : Importar, Exportar y Clonar Políticas, Soporte de Red Hat Enterprise Linux 7.1,
correlacionamiento entre Incidentes en Network Prevent con un usuario final.
– Detection: Nueva tecnología de Detección: Reconocimiento de Formatos, nuevos data
identifiers.
– Endpoint: Monitoreo de operaciones en Box con Cloud Storage: Save As en documentos de
Office, Soporte en Windows 10 (HTTP and FTP aplicaciones de almacenamiento), Monitoreo
complete en Safari, Chrome y Firefox para endpointsMac, Monitoreo de Outlook 2011 en
endpointsMac, Monitoreo de carpetas compartidas en endpoints Mac, Clipboard (Paste) en
Mac, entre otras.
21
Symantec DLP 14.5 Differences Training: Detection, Storage, Platform and Reporting
Nuevo Método de Detección: Form Recognition
Resúmen y Casos de Uso
• Las organizaciones nos solicitan constantemente la necesidad de proteger información
que se encuentra diligenciada a mano en formatos pre-establecidos escaneados y que
en su mayoría, contiene Información de Datos Personales.
x ej: Formatos de regístros de visitas, registros médicos, encuestas, bitácoras…
• Nueva Tecnología de reconocimiento de imágenes.
• Se pueden habilitar todas las capacidades de detección y prevención de DLP.
23
Symantec DLP 14.5 Differences Training: Detection, Storage, Platform and Reporting
Ejemplo
The algorithm looks
for “key-points” or
“regions” and
analyses the images
being detected
against those
previously indexed.
It is not based on
Optical Character
Recognition.
24
Symantec DLP 14.5 Differences Training: Detection, Storage, Platform and Reporting
Arquitectura básica
25
Symantec DLP 14.5 Differences Training: Detection, Storage, Platform and Reporting
Form
Recognition
Engine
Capacidades Adicionales en los Incidentes
Filled sections are highlighted.
Confidence and Fill Score results.
Additional improvements have
been made in XML Export, Web
Archive and to the Reporting and
Update API.
26
Symantec DLP 14.5 Differences Training: Detection, Storage, Platform and Reporting
Controls to Zoom and Rotate the
image.
Demostración
28
Copyright © 2016 Symantec Corporation
Nuevos Identificadores de Datos (DI)
Nuevos Identificadores de Datos Disponibles
International Securities Identification Number (ISIN)
Mobile Identity Numbers - IMEI Number
Japanese My Number – Corporate
Japanese My Number - Personal
Australian Company Number Mexico CLABE Number
Australian Passport Number New Zealand Ministry of Health Number (NHI)
Australian Tax File Number South Korea Resident Registration Number
Colombian Addresses Spanish DNI ID
Colombian Cell Phone Number Ley 1581 Datos
Personales
Turkey Citizenship Number / Turkish Identification Number
Colombian Personal Identification Number Ley 1581 Drug Enforcement Agency (DEA) Number
Colombian Tax Identification Number Ley 1581 National Provider Identifier (NPI)
Finland National ID Number Washington State Driver’s License Number
30
Symantec DLP 14.5 Differences Training: Detection, Storage, Platform and Reporting
Mejoras en la Manipulación de Políticas y Reglas
Resúmen y Casos de Uso
• Exportar, Importar y clonar políticas
• Dentro del mismo Enforce Server o entre diferentes Consolas Enforce
– Estrategias de Recuperación ante desastres
– Minimizar la administración
– Asistencia en la resolución de problemas disponible
Symantec DLP 14.5 Differences Training: Storage, Platform and Reporting
32
Nuevas Opciones disponibles en la GUI
Policies are imported
one at a time.
All the existent policies can be exported. XML files are contained in a Zip file
[ENFORCEHOSTNAME]-policies-DATE-TIME.ZIP.
Policies can be exported individually as an XML file
[ENFORCEHOSTNAME]-[POLICYNAME]-DATE-TIME.XML.
Symantec DLP 14.5 Differences Training: Storage, Platform and Reporting
33
Prevención contra fugas en Nube Box ®
Overview
• Cloud Sync was first introduced in DLP 14.
• Improvements and new features (for Box ®)
– Identity aware protection, allowing organizations to use cloud applications through Enterprise
accounts.
– Prevent upload of corporate sensitive information to personal Box account through Sync and Office
clients by applying detection policies.
– Identity based ignore filtering is applicable to Box only and not for other cloud storage applications.
35
Symantec DLP 14.5 Differences Training: Detection, Storage, Platform and Reporting
Requirements and Prerequisites
• Below applications should be installed on endpoint
– Box Sync.
– MS office.
– Box for Office Add-in.
• Supported Versions of Office
– Office 2016 (x86, x64).
– Office 2013 (x86, x64).
– Office 2010 (x86, x64).
36
Symantec DLP 14.5 Differences Training: Detection, Storage, Platform and Reporting
Configuración
Enable Cloud Storage channel
under Configured Applications.
Accounts or domains whose
content will be ignored by DLP
Agent for Box operations.
37
Symantec DLP 14.5 Differences Training: Detection, Storage, Platform and Reporting
Ejemplo Prevención de Fuga - Excel
When the user clicks on
Share, this windows is
displayed before
triggering the upload
operation. Quarantine location.
Box for Office ribbon.
38
Symantec DLP 14.5 Differences Training: Detection, Storage, Platform and Reporting
Ejemplo Prevención de Fuga Office
Corporate accounts or domains
can be excluded from detection
at Agent Configuration level.
Box for Office user logged with
an enterprise account.
39
Symantec DLP 14.5 Differences Training: Detection, Storage, Platform and Reporting
Ejemplo Prevención de Fuga - Outlook
40
Symantec DLP 14.5 Differences Training: Detection, Storage, Platform and Reporting
Incidentes
Symantec DLP 14.5 Differences Training: Storage, Platform and Reporting
41
Demostración
43Copyright © 2016 Symantec Corporation
Notas Finales
Resúmen
• Mejoras Disponibles en DLP v14.5
– New Form Recognition detection technology.
– IDMv3 improving index and detection performance and extending support to Endpoint (Windows
and Mac).
– New detection rule to protect email based on the number and size of attachments.
– Endpoint Cloud Sync identity-based usability and protection.
– New international data identifiers.
– Out-of-the-Box quarantine response rule for Cloud Storage.
– New Policy Export and Import process.
– Improved IP Address to Username resolution configuration.
– Red Hat Enterprise Linux 7.1 and 7.2 support.
45
Symantec DLP 14.5 Differences Training: Detection, Storage, Platform and Reporting
Thank you!
Copyright © 2016 Symantec Corporation. All rights reserved. Symantec and the Symantec Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be
trademarks of their respective owners.
This document is provided for informational purposes only and is not intended as advertising. All warranties relating to the information in this document, either express or implied, are disclaimed to the maximum extent allowed by
law. The information in this document is subject to change without notice.
Jairo Pantoja
Jairo_pantoja@symantec.com

More Related Content

What's hot

ISSA DLP Presentation - Oxford Consulting Group
ISSA DLP Presentation - Oxford Consulting GroupISSA DLP Presentation - Oxford Consulting Group
ISSA DLP Presentation - Oxford Consulting Groupaengelbert
 
Information Leakage & DLP
Information Leakage & DLPInformation Leakage & DLP
Information Leakage & DLPYun Lu
 
5 Myths About Data Loss Prevention
5 Myths About Data Loss Prevention5 Myths About Data Loss Prevention
5 Myths About Data Loss PreventionGary Bahadur
 
Technology Overview - Symantec Data Loss Prevention (DLP)
Technology Overview - Symantec Data Loss Prevention (DLP)Technology Overview - Symantec Data Loss Prevention (DLP)
Technology Overview - Symantec Data Loss Prevention (DLP)Iftikhar Ali Iqbal
 
McAfee Total Protection for Data Loss Prevention (DLP)
McAfee Total Protection for Data Loss Prevention (DLP)McAfee Total Protection for Data Loss Prevention (DLP)
McAfee Total Protection for Data Loss Prevention (DLP)Trustmarque
 
Symantec DLP for Tablet
Symantec DLP for TabletSymantec DLP for Tablet
Symantec DLP for TabletSymantec
 
Data Loss Prevention: Challenges, Impacts & Effective Strategies
Data Loss Prevention: Challenges, Impacts & Effective StrategiesData Loss Prevention: Challenges, Impacts & Effective Strategies
Data Loss Prevention: Challenges, Impacts & Effective StrategiesSeccuris Inc.
 
Data Security: Why You Need Data Loss Prevention & How to Justify It
Data Security: Why You Need Data Loss Prevention & How to Justify ItData Security: Why You Need Data Loss Prevention & How to Justify It
Data Security: Why You Need Data Loss Prevention & How to Justify ItMarc Crudgington, MBA
 
The Definitive Guide to Data Loss Prevention
The Definitive Guide to Data Loss PreventionThe Definitive Guide to Data Loss Prevention
The Definitive Guide to Data Loss PreventionDigital Guardian
 
DLP Data leak prevention
DLP Data leak preventionDLP Data leak prevention
DLP Data leak preventionAriel Evans
 
Customer Spotlight: Deploying a Data Protection Program in less than 120 Days
Customer Spotlight:Deploying a Data Protection Program in less than 120 DaysCustomer Spotlight:Deploying a Data Protection Program in less than 120 Days
Customer Spotlight: Deploying a Data Protection Program in less than 120 DaysDigital Guardian
 
Protecting Intellectual Property and Data Loss Prevention (DLP)
Protecting Intellectual Property and Data Loss Prevention (DLP)Protecting Intellectual Property and Data Loss Prevention (DLP)
Protecting Intellectual Property and Data Loss Prevention (DLP)Arpin Consulting
 
DLP 101: Help identify and plug information leaks
 DLP 101: Help identify and plug information leaks DLP 101: Help identify and plug information leaks
DLP 101: Help identify and plug information leaksAbhishek Sood
 
Data Leakage Presentation
Data Leakage PresentationData Leakage Presentation
Data Leakage PresentationMike Spaulding
 

What's hot (20)

Data Leakage Prevention
Data Leakage Prevention Data Leakage Prevention
Data Leakage Prevention
 
ISSA DLP Presentation - Oxford Consulting Group
ISSA DLP Presentation - Oxford Consulting GroupISSA DLP Presentation - Oxford Consulting Group
ISSA DLP Presentation - Oxford Consulting Group
 
Symantec Data Loss Prevention 9
Symantec Data Loss Prevention 9Symantec Data Loss Prevention 9
Symantec Data Loss Prevention 9
 
Information Leakage & DLP
Information Leakage & DLPInformation Leakage & DLP
Information Leakage & DLP
 
5 Myths About Data Loss Prevention
5 Myths About Data Loss Prevention5 Myths About Data Loss Prevention
5 Myths About Data Loss Prevention
 
Dlp notes
Dlp notesDlp notes
Dlp notes
 
DLP
DLPDLP
DLP
 
Enterprise API Security & Data Loss Prevention - Intel
Enterprise API Security & Data Loss Prevention - IntelEnterprise API Security & Data Loss Prevention - Intel
Enterprise API Security & Data Loss Prevention - Intel
 
Technology Overview - Symantec Data Loss Prevention (DLP)
Technology Overview - Symantec Data Loss Prevention (DLP)Technology Overview - Symantec Data Loss Prevention (DLP)
Technology Overview - Symantec Data Loss Prevention (DLP)
 
McAfee Total Protection for Data Loss Prevention (DLP)
McAfee Total Protection for Data Loss Prevention (DLP)McAfee Total Protection for Data Loss Prevention (DLP)
McAfee Total Protection for Data Loss Prevention (DLP)
 
Symantec DLP for Tablet
Symantec DLP for TabletSymantec DLP for Tablet
Symantec DLP for Tablet
 
Data Loss Prevention: Challenges, Impacts & Effective Strategies
Data Loss Prevention: Challenges, Impacts & Effective StrategiesData Loss Prevention: Challenges, Impacts & Effective Strategies
Data Loss Prevention: Challenges, Impacts & Effective Strategies
 
Data Security: Why You Need Data Loss Prevention & How to Justify It
Data Security: Why You Need Data Loss Prevention & How to Justify ItData Security: Why You Need Data Loss Prevention & How to Justify It
Data Security: Why You Need Data Loss Prevention & How to Justify It
 
Data Leakage Prevention (DLP)
Data Leakage Prevention (DLP)Data Leakage Prevention (DLP)
Data Leakage Prevention (DLP)
 
The Definitive Guide to Data Loss Prevention
The Definitive Guide to Data Loss PreventionThe Definitive Guide to Data Loss Prevention
The Definitive Guide to Data Loss Prevention
 
DLP Data leak prevention
DLP Data leak preventionDLP Data leak prevention
DLP Data leak prevention
 
Customer Spotlight: Deploying a Data Protection Program in less than 120 Days
Customer Spotlight:Deploying a Data Protection Program in less than 120 DaysCustomer Spotlight:Deploying a Data Protection Program in less than 120 Days
Customer Spotlight: Deploying a Data Protection Program in less than 120 Days
 
Protecting Intellectual Property and Data Loss Prevention (DLP)
Protecting Intellectual Property and Data Loss Prevention (DLP)Protecting Intellectual Property and Data Loss Prevention (DLP)
Protecting Intellectual Property and Data Loss Prevention (DLP)
 
DLP 101: Help identify and plug information leaks
 DLP 101: Help identify and plug information leaks DLP 101: Help identify and plug information leaks
DLP 101: Help identify and plug information leaks
 
Data Leakage Presentation
Data Leakage PresentationData Leakage Presentation
Data Leakage Presentation
 

Viewers also liked (17)

Doc1
Doc1Doc1
Doc1
 
Aprendizaje autonomo
Aprendizaje autonomoAprendizaje autonomo
Aprendizaje autonomo
 
151121 e openstack-api-nfv
151121 e openstack-api-nfv151121 e openstack-api-nfv
151121 e openstack-api-nfv
 
ÉTICA Y TECNOLOGIA
ÉTICA Y TECNOLOGIAÉTICA Y TECNOLOGIA
ÉTICA Y TECNOLOGIA
 
Power software
Power softwarePower software
Power software
 
Pm
PmPm
Pm
 
Stephanie Crothers resume 2016 (cst)
Stephanie Crothers resume 2016 (cst)Stephanie Crothers resume 2016 (cst)
Stephanie Crothers resume 2016 (cst)
 
You Were In An Accident...What Now? by Daniel Lieber
You Were In An Accident...What Now? by Daniel LieberYou Were In An Accident...What Now? by Daniel Lieber
You Were In An Accident...What Now? by Daniel Lieber
 
CV_Gervano_Fernandes
CV_Gervano_FernandesCV_Gervano_Fernandes
CV_Gervano_Fernandes
 
Docker para maiores
Docker para maioresDocker para maiores
Docker para maiores
 
Hinduism
HinduismHinduism
Hinduism
 
Types of music videos
Types of music videosTypes of music videos
Types of music videos
 
T.tecnologia
T.tecnologiaT.tecnologia
T.tecnologia
 
Νέα Σελίδα
Νέα ΣελίδαΝέα Σελίδα
Νέα Σελίδα
 
Pėsčiųjų pareigos
Pėsčiųjų pareigosPėsčiųjų pareigos
Pėsčiųjų pareigos
 
resume
resumeresume
resume
 
Pentrich uprising 1817
Pentrich uprising 1817Pentrich uprising 1817
Pentrich uprising 1817
 

Similar to Be Aware Webinar Symantec-Maxímice su prevención hacia la fuga de la información

David valovcin big data - big risk
David valovcin big data - big riskDavid valovcin big data - big risk
David valovcin big data - big riskIBM Sverige
 
Security Analytics & Security Intelligence-as-a-Service
Security Analytics & Security Intelligence-as-a-ServiceSecurity Analytics & Security Intelligence-as-a-Service
Security Analytics & Security Intelligence-as-a-ServiceMarco Casassa Mont
 
Isaca atlanta - practical data security and privacy
Isaca atlanta - practical data security and privacyIsaca atlanta - practical data security and privacy
Isaca atlanta - practical data security and privacyUlf Mattsson
 
ISSA Atlanta - Emerging application and data protection for multi cloud
ISSA Atlanta - Emerging application and data protection for multi cloudISSA Atlanta - Emerging application and data protection for multi cloud
ISSA Atlanta - Emerging application and data protection for multi cloudUlf Mattsson
 
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...Symantec
 
Symantec Data Loss Prevention - Technical Proposal (General)
Symantec Data Loss Prevention - Technical Proposal (General)Symantec Data Loss Prevention - Technical Proposal (General)
Symantec Data Loss Prevention - Technical Proposal (General)Iftikhar Ali Iqbal
 
Avoiding the Data Compliance "Hot Seat"
Avoiding the Data Compliance "Hot Seat"Avoiding the Data Compliance "Hot Seat"
Avoiding the Data Compliance "Hot Seat"IBM Security
 
BMC - Response to the SolarWinds Breach/Malware
BMC - Response to the SolarWinds Breach/MalwareBMC - Response to the SolarWinds Breach/Malware
BMC - Response to the SolarWinds Breach/MalwareMike Rizzo
 
Cyber Risk Management in 2017: Challenges & Recommendations
Cyber Risk Management in 2017: Challenges & RecommendationsCyber Risk Management in 2017: Challenges & Recommendations
Cyber Risk Management in 2017: Challenges & RecommendationsUlf Mattsson
 
Splunk conf2014 - Operationalizing Advanced Threat Defense
Splunk conf2014 - Operationalizing Advanced Threat DefenseSplunk conf2014 - Operationalizing Advanced Threat Defense
Splunk conf2014 - Operationalizing Advanced Threat DefenseSplunk
 
Microsoft 365 | Modern workplace
Microsoft 365 | Modern workplaceMicrosoft 365 | Modern workplace
Microsoft 365 | Modern workplaceSiddick Elaheebocus
 
Splunk Discovery: Warsaw 2018 - Solve Your Security Challenges with Splunk En...
Splunk Discovery: Warsaw 2018 - Solve Your Security Challenges with Splunk En...Splunk Discovery: Warsaw 2018 - Solve Your Security Challenges with Splunk En...
Splunk Discovery: Warsaw 2018 - Solve Your Security Challenges with Splunk En...Splunk
 
Security Intelligence: Finding and Stopping Attackers with Big Data Analytics
Security Intelligence: Finding and Stopping Attackers with Big Data AnalyticsSecurity Intelligence: Finding and Stopping Attackers with Big Data Analytics
Security Intelligence: Finding and Stopping Attackers with Big Data AnalyticsIBM Security
 
Ibm ofa ottawa_ how_secure_is_your_data_eric_offenberg
Ibm ofa ottawa_ how_secure_is_your_data_eric_offenbergIbm ofa ottawa_ how_secure_is_your_data_eric_offenberg
Ibm ofa ottawa_ how_secure_is_your_data_eric_offenbergdawnrk
 
Ibm ofa ottawa_ how_secure_is_your_data_eric_offenberg
Ibm ofa ottawa_ how_secure_is_your_data_eric_offenbergIbm ofa ottawa_ how_secure_is_your_data_eric_offenberg
Ibm ofa ottawa_ how_secure_is_your_data_eric_offenbergdawnrk
 
IBM Relay 2015: Securing the Future
IBM Relay 2015: Securing the Future IBM Relay 2015: Securing the Future
IBM Relay 2015: Securing the Future IBM
 
PPT-Splunk-LegacySIEM-101_FINAL
PPT-Splunk-LegacySIEM-101_FINALPPT-Splunk-LegacySIEM-101_FINAL
PPT-Splunk-LegacySIEM-101_FINALRisi Avila
 
Splunk for Enterprise Security Featuring User Behavior Analytics
Splunk for Enterprise Security Featuring User Behavior Analytics Splunk for Enterprise Security Featuring User Behavior Analytics
Splunk for Enterprise Security Featuring User Behavior Analytics Splunk
 
Symantec Webinar Part 5 of 6 GDPR Compliance, the Operational Impact of Cross...
Symantec Webinar Part 5 of 6 GDPR Compliance, the Operational Impact of Cross...Symantec Webinar Part 5 of 6 GDPR Compliance, the Operational Impact of Cross...
Symantec Webinar Part 5 of 6 GDPR Compliance, the Operational Impact of Cross...Symantec
 

Similar to Be Aware Webinar Symantec-Maxímice su prevención hacia la fuga de la información (20)

David valovcin big data - big risk
David valovcin big data - big riskDavid valovcin big data - big risk
David valovcin big data - big risk
 
Security Analytics & Security Intelligence-as-a-Service
Security Analytics & Security Intelligence-as-a-ServiceSecurity Analytics & Security Intelligence-as-a-Service
Security Analytics & Security Intelligence-as-a-Service
 
Isaca atlanta - practical data security and privacy
Isaca atlanta - practical data security and privacyIsaca atlanta - practical data security and privacy
Isaca atlanta - practical data security and privacy
 
ISSA Atlanta - Emerging application and data protection for multi cloud
ISSA Atlanta - Emerging application and data protection for multi cloudISSA Atlanta - Emerging application and data protection for multi cloud
ISSA Atlanta - Emerging application and data protection for multi cloud
 
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
 
Symantec Data Loss Prevention - Technical Proposal (General)
Symantec Data Loss Prevention - Technical Proposal (General)Symantec Data Loss Prevention - Technical Proposal (General)
Symantec Data Loss Prevention - Technical Proposal (General)
 
Avoiding the Data Compliance "Hot Seat"
Avoiding the Data Compliance "Hot Seat"Avoiding the Data Compliance "Hot Seat"
Avoiding the Data Compliance "Hot Seat"
 
BMC - Response to the SolarWinds Breach/Malware
BMC - Response to the SolarWinds Breach/MalwareBMC - Response to the SolarWinds Breach/Malware
BMC - Response to the SolarWinds Breach/Malware
 
MEDS
MEDSMEDS
MEDS
 
Cyber Risk Management in 2017: Challenges & Recommendations
Cyber Risk Management in 2017: Challenges & RecommendationsCyber Risk Management in 2017: Challenges & Recommendations
Cyber Risk Management in 2017: Challenges & Recommendations
 
Splunk conf2014 - Operationalizing Advanced Threat Defense
Splunk conf2014 - Operationalizing Advanced Threat DefenseSplunk conf2014 - Operationalizing Advanced Threat Defense
Splunk conf2014 - Operationalizing Advanced Threat Defense
 
Microsoft 365 | Modern workplace
Microsoft 365 | Modern workplaceMicrosoft 365 | Modern workplace
Microsoft 365 | Modern workplace
 
Splunk Discovery: Warsaw 2018 - Solve Your Security Challenges with Splunk En...
Splunk Discovery: Warsaw 2018 - Solve Your Security Challenges with Splunk En...Splunk Discovery: Warsaw 2018 - Solve Your Security Challenges with Splunk En...
Splunk Discovery: Warsaw 2018 - Solve Your Security Challenges with Splunk En...
 
Security Intelligence: Finding and Stopping Attackers with Big Data Analytics
Security Intelligence: Finding and Stopping Attackers with Big Data AnalyticsSecurity Intelligence: Finding and Stopping Attackers with Big Data Analytics
Security Intelligence: Finding and Stopping Attackers with Big Data Analytics
 
Ibm ofa ottawa_ how_secure_is_your_data_eric_offenberg
Ibm ofa ottawa_ how_secure_is_your_data_eric_offenbergIbm ofa ottawa_ how_secure_is_your_data_eric_offenberg
Ibm ofa ottawa_ how_secure_is_your_data_eric_offenberg
 
Ibm ofa ottawa_ how_secure_is_your_data_eric_offenberg
Ibm ofa ottawa_ how_secure_is_your_data_eric_offenbergIbm ofa ottawa_ how_secure_is_your_data_eric_offenberg
Ibm ofa ottawa_ how_secure_is_your_data_eric_offenberg
 
IBM Relay 2015: Securing the Future
IBM Relay 2015: Securing the Future IBM Relay 2015: Securing the Future
IBM Relay 2015: Securing the Future
 
PPT-Splunk-LegacySIEM-101_FINAL
PPT-Splunk-LegacySIEM-101_FINALPPT-Splunk-LegacySIEM-101_FINAL
PPT-Splunk-LegacySIEM-101_FINAL
 
Splunk for Enterprise Security Featuring User Behavior Analytics
Splunk for Enterprise Security Featuring User Behavior Analytics Splunk for Enterprise Security Featuring User Behavior Analytics
Splunk for Enterprise Security Featuring User Behavior Analytics
 
Symantec Webinar Part 5 of 6 GDPR Compliance, the Operational Impact of Cross...
Symantec Webinar Part 5 of 6 GDPR Compliance, the Operational Impact of Cross...Symantec Webinar Part 5 of 6 GDPR Compliance, the Operational Impact of Cross...
Symantec Webinar Part 5 of 6 GDPR Compliance, the Operational Impact of Cross...
 

More from Symantec LATAM

Creando una estrategia de Gobierno y Protección de Datos
Creando una estrategia de Gobierno y Protección de DatosCreando una estrategia de Gobierno y Protección de Datos
Creando una estrategia de Gobierno y Protección de DatosSymantec LATAM
 
Be Aware Webinar Symantec - Amenazas durante el mes de Mayo 2016
Be Aware Webinar Symantec - Amenazas durante el mes de Mayo 2016Be Aware Webinar Symantec - Amenazas durante el mes de Mayo 2016
Be Aware Webinar Symantec - Amenazas durante el mes de Mayo 2016Symantec LATAM
 
Be Aware Webinar Symantec - En Cybersecuridad, no se olvide el eslabón más débil
Be Aware Webinar Symantec - En Cybersecuridad, no se olvide el eslabón más débilBe Aware Webinar Symantec - En Cybersecuridad, no se olvide el eslabón más débil
Be Aware Webinar Symantec - En Cybersecuridad, no se olvide el eslabón más débilSymantec LATAM
 
Be Aware Webinar - Informe sobre las Amenazas a la Seguridad en Internet de 2...
Be Aware Webinar - Informe sobre las Amenazas a la Seguridad en Internet de 2...Be Aware Webinar - Informe sobre las Amenazas a la Seguridad en Internet de 2...
Be Aware Webinar - Informe sobre las Amenazas a la Seguridad en Internet de 2...Symantec LATAM
 
Be Aware Webinar - Una mirada profunda a advance threat protection
Be Aware Webinar - Una mirada profunda a advance threat protectionBe Aware Webinar - Una mirada profunda a advance threat protection
Be Aware Webinar - Una mirada profunda a advance threat protectionSymantec LATAM
 
Be aware webinar - Cifrado o encriptacion salvaguardando los datos personales
Be aware webinar - Cifrado o encriptacion salvaguardando los datos personalesBe aware webinar - Cifrado o encriptacion salvaguardando los datos personales
Be aware webinar - Cifrado o encriptacion salvaguardando los datos personalesSymantec LATAM
 
Be Aware Webinar - la seguridad del email sigue siendo necesaria
Be Aware Webinar - la seguridad del email sigue siendo necesariaBe Aware Webinar - la seguridad del email sigue siendo necesaria
Be Aware Webinar - la seguridad del email sigue siendo necesariaSymantec LATAM
 
Be Aware Webinar - Consideraciones más importantes para cumplir con pci
Be Aware Webinar - Consideraciones más importantes para cumplir con pciBe Aware Webinar - Consideraciones más importantes para cumplir con pci
Be Aware Webinar - Consideraciones más importantes para cumplir con pciSymantec LATAM
 
Be Aware Webinar - Uniendo fuerzas: administre y proteja al punto final
Be Aware Webinar -  Uniendo fuerzas: administre y proteja al punto finalBe Aware Webinar -  Uniendo fuerzas: administre y proteja al punto final
Be Aware Webinar - Uniendo fuerzas: administre y proteja al punto finalSymantec LATAM
 
Be Aware Webinar - Su seguridad ha sido vulnerada ahora qué
Be Aware Webinar - Su seguridad ha sido vulnerada ahora quéBe Aware Webinar - Su seguridad ha sido vulnerada ahora qué
Be Aware Webinar - Su seguridad ha sido vulnerada ahora quéSymantec LATAM
 
Be Aware Webinar - Alineando su estrategia de seguridad visibilidad_y_cumplim...
Be Aware Webinar - Alineando su estrategia de seguridad visibilidad_y_cumplim...Be Aware Webinar - Alineando su estrategia de seguridad visibilidad_y_cumplim...
Be Aware Webinar - Alineando su estrategia de seguridad visibilidad_y_cumplim...Symantec LATAM
 
Be Aware Webinar - Como symantec puede ayudar cuando existe una brecha de se...
 Be Aware Webinar - Como symantec puede ayudar cuando existe una brecha de se... Be Aware Webinar - Como symantec puede ayudar cuando existe una brecha de se...
Be Aware Webinar - Como symantec puede ayudar cuando existe una brecha de se...Symantec LATAM
 
Be Aware Webinar - Kill the password
Be Aware Webinar - Kill the passwordBe Aware Webinar - Kill the password
Be Aware Webinar - Kill the passwordSymantec LATAM
 
Be Aware Webinar - Asegure office 365
Be Aware Webinar - Asegure office 365Be Aware Webinar - Asegure office 365
Be Aware Webinar - Asegure office 365Symantec LATAM
 
Symantec - Innovación Hacker: del espionaje industrial por drones a estímulos...
Symantec - Innovación Hacker: del espionaje industrial por drones a estímulos...Symantec - Innovación Hacker: del espionaje industrial por drones a estímulos...
Symantec - Innovación Hacker: del espionaje industrial por drones a estímulos...Symantec LATAM
 
Be Aware Webinar - El Beneficio de Utilizar Inteligencia Contra Amenazas
Be Aware Webinar - El Beneficio de Utilizar Inteligencia Contra AmenazasBe Aware Webinar - El Beneficio de Utilizar Inteligencia Contra Amenazas
Be Aware Webinar - El Beneficio de Utilizar Inteligencia Contra AmenazasSymantec LATAM
 
Be Aware Webinar - Integrando la prevención de pérdidad de datos con las apli...
Be Aware Webinar - Integrando la prevención de pérdidad de datos con las apli...Be Aware Webinar - Integrando la prevención de pérdidad de datos con las apli...
Be Aware Webinar - Integrando la prevención de pérdidad de datos con las apli...Symantec LATAM
 
Be Aware Webinar - Asegurando los pos en retail
Be Aware Webinar - Asegurando los pos en retailBe Aware Webinar - Asegurando los pos en retail
Be Aware Webinar - Asegurando los pos en retailSymantec LATAM
 
Be Aware Webinar - Cómo hacerle frente a las nuevas amenazas persistentes ava...
Be Aware Webinar - Cómo hacerle frente a las nuevas amenazas persistentes ava...Be Aware Webinar - Cómo hacerle frente a las nuevas amenazas persistentes ava...
Be Aware Webinar - Cómo hacerle frente a las nuevas amenazas persistentes ava...Symantec LATAM
 

More from Symantec LATAM (20)

Creando una estrategia de Gobierno y Protección de Datos
Creando una estrategia de Gobierno y Protección de DatosCreando una estrategia de Gobierno y Protección de Datos
Creando una estrategia de Gobierno y Protección de Datos
 
Customer Super Care
Customer Super CareCustomer Super Care
Customer Super Care
 
Be Aware Webinar Symantec - Amenazas durante el mes de Mayo 2016
Be Aware Webinar Symantec - Amenazas durante el mes de Mayo 2016Be Aware Webinar Symantec - Amenazas durante el mes de Mayo 2016
Be Aware Webinar Symantec - Amenazas durante el mes de Mayo 2016
 
Be Aware Webinar Symantec - En Cybersecuridad, no se olvide el eslabón más débil
Be Aware Webinar Symantec - En Cybersecuridad, no se olvide el eslabón más débilBe Aware Webinar Symantec - En Cybersecuridad, no se olvide el eslabón más débil
Be Aware Webinar Symantec - En Cybersecuridad, no se olvide el eslabón más débil
 
Be Aware Webinar - Informe sobre las Amenazas a la Seguridad en Internet de 2...
Be Aware Webinar - Informe sobre las Amenazas a la Seguridad en Internet de 2...Be Aware Webinar - Informe sobre las Amenazas a la Seguridad en Internet de 2...
Be Aware Webinar - Informe sobre las Amenazas a la Seguridad en Internet de 2...
 
Be Aware Webinar - Una mirada profunda a advance threat protection
Be Aware Webinar - Una mirada profunda a advance threat protectionBe Aware Webinar - Una mirada profunda a advance threat protection
Be Aware Webinar - Una mirada profunda a advance threat protection
 
Be aware webinar - Cifrado o encriptacion salvaguardando los datos personales
Be aware webinar - Cifrado o encriptacion salvaguardando los datos personalesBe aware webinar - Cifrado o encriptacion salvaguardando los datos personales
Be aware webinar - Cifrado o encriptacion salvaguardando los datos personales
 
Be Aware Webinar - la seguridad del email sigue siendo necesaria
Be Aware Webinar - la seguridad del email sigue siendo necesariaBe Aware Webinar - la seguridad del email sigue siendo necesaria
Be Aware Webinar - la seguridad del email sigue siendo necesaria
 
Be Aware Webinar - Consideraciones más importantes para cumplir con pci
Be Aware Webinar - Consideraciones más importantes para cumplir con pciBe Aware Webinar - Consideraciones más importantes para cumplir con pci
Be Aware Webinar - Consideraciones más importantes para cumplir con pci
 
Be Aware Webinar - Uniendo fuerzas: administre y proteja al punto final
Be Aware Webinar -  Uniendo fuerzas: administre y proteja al punto finalBe Aware Webinar -  Uniendo fuerzas: administre y proteja al punto final
Be Aware Webinar - Uniendo fuerzas: administre y proteja al punto final
 
Be Aware Webinar - Su seguridad ha sido vulnerada ahora qué
Be Aware Webinar - Su seguridad ha sido vulnerada ahora quéBe Aware Webinar - Su seguridad ha sido vulnerada ahora qué
Be Aware Webinar - Su seguridad ha sido vulnerada ahora qué
 
Be Aware Webinar - Alineando su estrategia de seguridad visibilidad_y_cumplim...
Be Aware Webinar - Alineando su estrategia de seguridad visibilidad_y_cumplim...Be Aware Webinar - Alineando su estrategia de seguridad visibilidad_y_cumplim...
Be Aware Webinar - Alineando su estrategia de seguridad visibilidad_y_cumplim...
 
Be Aware Webinar - Como symantec puede ayudar cuando existe una brecha de se...
 Be Aware Webinar - Como symantec puede ayudar cuando existe una brecha de se... Be Aware Webinar - Como symantec puede ayudar cuando existe una brecha de se...
Be Aware Webinar - Como symantec puede ayudar cuando existe una brecha de se...
 
Be Aware Webinar - Kill the password
Be Aware Webinar - Kill the passwordBe Aware Webinar - Kill the password
Be Aware Webinar - Kill the password
 
Be Aware Webinar - Asegure office 365
Be Aware Webinar - Asegure office 365Be Aware Webinar - Asegure office 365
Be Aware Webinar - Asegure office 365
 
Symantec - Innovación Hacker: del espionaje industrial por drones a estímulos...
Symantec - Innovación Hacker: del espionaje industrial por drones a estímulos...Symantec - Innovación Hacker: del espionaje industrial por drones a estímulos...
Symantec - Innovación Hacker: del espionaje industrial por drones a estímulos...
 
Be Aware Webinar - El Beneficio de Utilizar Inteligencia Contra Amenazas
Be Aware Webinar - El Beneficio de Utilizar Inteligencia Contra AmenazasBe Aware Webinar - El Beneficio de Utilizar Inteligencia Contra Amenazas
Be Aware Webinar - El Beneficio de Utilizar Inteligencia Contra Amenazas
 
Be Aware Webinar - Integrando la prevención de pérdidad de datos con las apli...
Be Aware Webinar - Integrando la prevención de pérdidad de datos con las apli...Be Aware Webinar - Integrando la prevención de pérdidad de datos con las apli...
Be Aware Webinar - Integrando la prevención de pérdidad de datos con las apli...
 
Be Aware Webinar - Asegurando los pos en retail
Be Aware Webinar - Asegurando los pos en retailBe Aware Webinar - Asegurando los pos en retail
Be Aware Webinar - Asegurando los pos en retail
 
Be Aware Webinar - Cómo hacerle frente a las nuevas amenazas persistentes ava...
Be Aware Webinar - Cómo hacerle frente a las nuevas amenazas persistentes ava...Be Aware Webinar - Cómo hacerle frente a las nuevas amenazas persistentes ava...
Be Aware Webinar - Cómo hacerle frente a las nuevas amenazas persistentes ava...
 

Recently uploaded

Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Hyundai Motor Group
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetEnjoy Anytime
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 

Recently uploaded (20)

Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 

Be Aware Webinar Symantec-Maxímice su prevención hacia la fuga de la información

  • 1. Be Aware Webinar # 50: Maximice su Prevención Hacia la Fuga de Información Nueva Versión Symantec DLP v14.5 Jairo Pantoja Moncayo CISSP, CISM, CGEIT, CRISC, ABCP, ISO27001 LA, PCIP, AWSP, CobIT Found. Sec+ Senior SE, Symantec MCLAC Region June 8, 2016
  • 2. Safe Harbor Disclaimer This information is about pre-release software. Any unreleased update to the product or other planned modification is subject to ongoing evaluation by Symantec and therefore subject to change. This information is provided without warranty of any kind, express or implied. Customers who purchase Symantec products should make their purchase decision based upon features that are currently available. 2 Symantec DLP 14.5 Differences Training: Detection, Storage, Platform and Reporting
  • 3. Symantec Enterprise Security | ESTRATEGIA DE SOLUCIONES 3 Protección de Amenazas ENDPOINTS DATA CENTER GATEWAYS • Protección contra Amenazas Avanzadas a través de los Puntos de Control • Forensia incluida y Remediación dentro de cada Punto de Control • Protección Integrada para servidores Físicos, Virtuales y en la Nube • Administración en la nube para Endpoints, Datacenter y Gateways Plataforma Unificada de Seguridad Colección de Registros y Telemetría Administración Unificada de Incidentes y Hub Integración en Línea de Inteligencia Procesable Evaluación comparativa Regional e Industrial Análisis de Amenazas y Comportamiento Protección de Información DATOS IDENTIDADES • Protección integral para Datos e Identidades • Cloud Security Broker para Aplicaciones en la Nube y Moviles • Análisis de Usuarios y Comportamiento • Cifrado y Administración de llaves en la Nube Users Data Apps Cloud Endpoints Gateways Data Center Servicios de Ciber Seguridad Monitoreo, Respuesta a Incidentes, Simulación, Inteligencia contra Amenazas Copyright © 2015 Symantec Corporation
  • 4. Agenda 1 Panorama Actual 2 Desafíos 3 DLP v14.5 Copyright © 2014 Symantec Corporation 4
  • 5. Agenda 1 Panorama Actual 2 Desafíos 3 DLP v14.5 Copyright © 2014 Symantec Corporation 5
  • 6. Copyright 2016, Symantec CorporationInforme sobre las Amenazas a la Seguridad en Internet 2016 - Volumen 21 Fugas de Datos 2015 Reporte ISTR v.21 6
  • 7. Copyright 2016, Symantec CorporationInforme sobre las Amenazas a la Seguridad en Internet 2016 - Volumen 21 232 93 552 348 429 0 100 200 300 400 500 600 2011 2012 2013 2014 2015 MILLONES 7 Total de Registros Expuestos, 2015 +23% 500 +30% ESTIMADO
  • 8. Copyright 2016, Symantec CorporationInforme sobre las Amenazas a la Seguridad en Internet 2016 - Volumen 21 Megafugas 2015 8
  • 9. Tendencias, retos y lo que está en juego
  • 10. Agenda 1 Panorama Actual 2 Desafíos 3 DLP v14.5 Copyright © 2014 Symantec Corporation 10
  • 11. 11 Seguridad de la Información y Cumplimiento regulatorio….. • Sudeban (Venezuela) • Resol. JB 3066:2014 (Ecuador) • Circular 042 SF (Colombia) • Ley 1581 Protección de datos (Colombia) -DI • Ley LFPDPPP (México) -DI • Ley 19.628 Protección de datos (Chile)
  • 12. Algunas Amenazas Copyright © 2014 Symantec Corporation 12 Source: APT1: Exposing one of China’s Cyber Espionage Units, Mandiant®, 2013 A corporate black eye
  • 13. Agenda 1 Panorama Actual 2 Desafíos 3 DLP v14.5 Copyright © 2014 Symantec Corporation 13
  • 14. Symantec Data Loss Prevention -Generalidades
  • 15. 2016 Gartner Magic Quadrant for Enterprise Data Loss Prevention: 9 Años líder indiscutible del Mercado This Magic Quadrant graphic was published by Gartner, Inc. as part of a larger research note and should be evaluated in the context of the entire report. The Gartner report is available upon request from Symantec. Gartner does not endorse any vendor, product or service depicted in our research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner's research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose Source: Magic Quadrant for Enterprise Data Loss Prevention, Brian Reed, Neil Wynne 28 January 2016, Gartner, Inc.
  • 16. Copyright © 2016 Symantec Corporation 16 DATA LOSS PREVENTION (DLP) DESCUBRIR PROTEGERMONITOREAR ¿Cómo la protejo?¿Cómo esta siendo utilizada? ¿Dónde esta la información confidencial? Symantec - DLP
  • 17. Copyright © 2016 Symantec Corporation 17 Symantec - DLP Evitar que personas maliciosas roben propiedad intelectual valiosa. Educar y proteger a empleados. Evitar la fuga o pérdida de datos confidenciales. Cumplir con las leyes globales de privacidad. Proteger su reputación.
  • 18. Capacidad de Detección en DLP Copyright © 2015 Symantec Corporation 18 Unified ManagementExtending Data Protection for the Cloud Box Office 365 iOS Android Email Web FTP IM USB Hard Drives Removable Storage Network Shares Print/Fax Cloud & Web Apps File Servers Exchange, Lotus SharePoint Databases Web Servers
  • 19. Tecnologías en la detección de archivos Described Content Matching Indexed Document Matching IDM Vector Learning Machine DATOS DESCRITO Datos No Indexables Léxicos Data identifiers DATOS ESTRUCTURADOS Datos de Clientes / Empleados / Personas Partial row matching Precisión casi perfecta DATOS NO ESTRUCTURADOS PROPIEDAD INTELECTUAL Diseños / código fuente / Finanzas Derivative match Precisión casi perfecta 300M+ docs por servidor 5M+ docs por servidor Exact Data Matching DATOS NO ESTRUCTURADOS PROPIEDAD INTELECTUAL Diseños / código fuente / Finanzas Derivative match Precisión perfecta
  • 21. DLP 14.5 Algunas Novedades • Principales Características: – Cloud Storage: Cuarentena de Incidentes en Box. – Enforce Platform : Importar, Exportar y Clonar Políticas, Soporte de Red Hat Enterprise Linux 7.1, correlacionamiento entre Incidentes en Network Prevent con un usuario final. – Detection: Nueva tecnología de Detección: Reconocimiento de Formatos, nuevos data identifiers. – Endpoint: Monitoreo de operaciones en Box con Cloud Storage: Save As en documentos de Office, Soporte en Windows 10 (HTTP and FTP aplicaciones de almacenamiento), Monitoreo complete en Safari, Chrome y Firefox para endpointsMac, Monitoreo de Outlook 2011 en endpointsMac, Monitoreo de carpetas compartidas en endpoints Mac, Clipboard (Paste) en Mac, entre otras. 21 Symantec DLP 14.5 Differences Training: Detection, Storage, Platform and Reporting
  • 22. Nuevo Método de Detección: Form Recognition
  • 23. Resúmen y Casos de Uso • Las organizaciones nos solicitan constantemente la necesidad de proteger información que se encuentra diligenciada a mano en formatos pre-establecidos escaneados y que en su mayoría, contiene Información de Datos Personales. x ej: Formatos de regístros de visitas, registros médicos, encuestas, bitácoras… • Nueva Tecnología de reconocimiento de imágenes. • Se pueden habilitar todas las capacidades de detección y prevención de DLP. 23 Symantec DLP 14.5 Differences Training: Detection, Storage, Platform and Reporting
  • 24. Ejemplo The algorithm looks for “key-points” or “regions” and analyses the images being detected against those previously indexed. It is not based on Optical Character Recognition. 24 Symantec DLP 14.5 Differences Training: Detection, Storage, Platform and Reporting
  • 25. Arquitectura básica 25 Symantec DLP 14.5 Differences Training: Detection, Storage, Platform and Reporting Form Recognition Engine
  • 26. Capacidades Adicionales en los Incidentes Filled sections are highlighted. Confidence and Fill Score results. Additional improvements have been made in XML Export, Web Archive and to the Reporting and Update API. 26 Symantec DLP 14.5 Differences Training: Detection, Storage, Platform and Reporting Controls to Zoom and Rotate the image.
  • 28. 28 Copyright © 2016 Symantec Corporation
  • 30. Nuevos Identificadores de Datos Disponibles International Securities Identification Number (ISIN) Mobile Identity Numbers - IMEI Number Japanese My Number – Corporate Japanese My Number - Personal Australian Company Number Mexico CLABE Number Australian Passport Number New Zealand Ministry of Health Number (NHI) Australian Tax File Number South Korea Resident Registration Number Colombian Addresses Spanish DNI ID Colombian Cell Phone Number Ley 1581 Datos Personales Turkey Citizenship Number / Turkish Identification Number Colombian Personal Identification Number Ley 1581 Drug Enforcement Agency (DEA) Number Colombian Tax Identification Number Ley 1581 National Provider Identifier (NPI) Finland National ID Number Washington State Driver’s License Number 30 Symantec DLP 14.5 Differences Training: Detection, Storage, Platform and Reporting
  • 31. Mejoras en la Manipulación de Políticas y Reglas
  • 32. Resúmen y Casos de Uso • Exportar, Importar y clonar políticas • Dentro del mismo Enforce Server o entre diferentes Consolas Enforce – Estrategias de Recuperación ante desastres – Minimizar la administración – Asistencia en la resolución de problemas disponible Symantec DLP 14.5 Differences Training: Storage, Platform and Reporting 32
  • 33. Nuevas Opciones disponibles en la GUI Policies are imported one at a time. All the existent policies can be exported. XML files are contained in a Zip file [ENFORCEHOSTNAME]-policies-DATE-TIME.ZIP. Policies can be exported individually as an XML file [ENFORCEHOSTNAME]-[POLICYNAME]-DATE-TIME.XML. Symantec DLP 14.5 Differences Training: Storage, Platform and Reporting 33
  • 34. Prevención contra fugas en Nube Box ®
  • 35. Overview • Cloud Sync was first introduced in DLP 14. • Improvements and new features (for Box ®) – Identity aware protection, allowing organizations to use cloud applications through Enterprise accounts. – Prevent upload of corporate sensitive information to personal Box account through Sync and Office clients by applying detection policies. – Identity based ignore filtering is applicable to Box only and not for other cloud storage applications. 35 Symantec DLP 14.5 Differences Training: Detection, Storage, Platform and Reporting
  • 36. Requirements and Prerequisites • Below applications should be installed on endpoint – Box Sync. – MS office. – Box for Office Add-in. • Supported Versions of Office – Office 2016 (x86, x64). – Office 2013 (x86, x64). – Office 2010 (x86, x64). 36 Symantec DLP 14.5 Differences Training: Detection, Storage, Platform and Reporting
  • 37. Configuración Enable Cloud Storage channel under Configured Applications. Accounts or domains whose content will be ignored by DLP Agent for Box operations. 37 Symantec DLP 14.5 Differences Training: Detection, Storage, Platform and Reporting
  • 38. Ejemplo Prevención de Fuga - Excel When the user clicks on Share, this windows is displayed before triggering the upload operation. Quarantine location. Box for Office ribbon. 38 Symantec DLP 14.5 Differences Training: Detection, Storage, Platform and Reporting
  • 39. Ejemplo Prevención de Fuga Office Corporate accounts or domains can be excluded from detection at Agent Configuration level. Box for Office user logged with an enterprise account. 39 Symantec DLP 14.5 Differences Training: Detection, Storage, Platform and Reporting
  • 40. Ejemplo Prevención de Fuga - Outlook 40 Symantec DLP 14.5 Differences Training: Detection, Storage, Platform and Reporting
  • 41. Incidentes Symantec DLP 14.5 Differences Training: Storage, Platform and Reporting 41
  • 43. 43Copyright © 2016 Symantec Corporation
  • 45. Resúmen • Mejoras Disponibles en DLP v14.5 – New Form Recognition detection technology. – IDMv3 improving index and detection performance and extending support to Endpoint (Windows and Mac). – New detection rule to protect email based on the number and size of attachments. – Endpoint Cloud Sync identity-based usability and protection. – New international data identifiers. – Out-of-the-Box quarantine response rule for Cloud Storage. – New Policy Export and Import process. – Improved IP Address to Username resolution configuration. – Red Hat Enterprise Linux 7.1 and 7.2 support. 45 Symantec DLP 14.5 Differences Training: Detection, Storage, Platform and Reporting
  • 46. Thank you! Copyright © 2016 Symantec Corporation. All rights reserved. Symantec and the Symantec Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners. This document is provided for informational purposes only and is not intended as advertising. All warranties relating to the information in this document, either express or implied, are disclaimed to the maximum extent allowed by law. The information in this document is subject to change without notice. Jairo Pantoja Jairo_pantoja@symantec.com