SlideShare a Scribd company logo
1 of 25
Download to read offline
dlp.comodo.com
www.mydlp.com
mydlp@mydlp.com
twitter.com/mydlp
Comodo MyDLP Technical Presentation
2014
Ant Karaduman
History
 Started operations in 1998
 Started offering SSL Certificates in 2002
 Over 3 millions of digital certificates up to date
Leadership
 One of the two world's largest and most secure SSL certificate authorities
 Leader in security and identity management (87 patents)
 Founding member of CA-B Forum, a leader in web browser technologies
 Leader in secure online trade with Home SSL standard
 Have severals labs and R&D Centers on digital security, cryptography and
anti-malware analysis all over the world
Clients
 Over 300.000 enteprise customers in 100 countries
 Financial, assurance and medical institutions
 Hunderds of universities and public sector entities
 Thousands of online trading businesses
 Over 35 million PCs
 More than 7,000 business partners
Facts
 %60 gross income increase between 2007-2010
 More than 1000 worlwide employees.
About US
Clients and Partners
Enterprise Security PartnersOnline Business Security
 Perform content inspection of data and execute responses, ranging from simple notification to
active blocking based on policy settings
 Many holes and exit points are available for data leakage
Data Loss Prevention (DLP)
Risks of Data Loss
Cost of Data Loss
Comodo MyDLP Background
How data is marked and identified
Predefined policies and data types
Social security numbers, National Identification Numbers etc.
Prescribed in PCI, HIPAA, SOX, GLBA, etc. (Bank account numbers, Credit card numbers)
All can be used as it is or customized for client needs.
Information Discovery
Deals with information, not file or data stream
Using another file type or storing in a compressed archive does not effect information.
Context – aware.
Browses through several resources and trains itself.
Can train itself using SQL servers and storages.
Matches structured (SSN, CC etc.) and unstructured data (source code, user defined documents etc.)
(Fingerprints data by using one-way hash methods)
Three levels of DLP security
Data in Motion
Web Rule: Data transfers over HTTP,
HTTPS by Comodo MyDLP ICAP
server and inspected.
Mail Rule: All mails are inspected using
Comodo MyDLP as a content filter.
API Rule: You can use Comodo MyDLP
API to integrate with your in-house
applications.
Three levels of DLP security
Data at Rest
Endpoint Discovery Rule: Data which resides at
workstations, notebooks and host computers etc. are
traced and inspected.
Remote Storage Discovery Rule: Data which resides at file
servers, network storages, MS Windows shares, web
servers etc. are traced and inspected.
10
Three levels of DLP security
Data at Endpoints
Removable Storage Rule: Data transferred from endpoints
are intercepted and inspected.
Printer Rule: If a user tries to print out a document,
printout process is intercepted and document will be
inspected.
Screenshot Rule: Screenshot attempts for sensitive
applications will be controlled.
Removable Storage Encryption Rule: Enables you to
automatically encrypt devices and use them transparently.
11
Three levels of DLP security
Data at Endpoints
USB Plugin / Plugout Detection : Detect and/or block when
users plugin or out USB devices even if it is allowed to
work or not.
Removable Storage Inbound Rules: Detect when users
copy files FROM an USB flash drive (even if the drive is
allowed to be used), create a copy of the file if needed.
CD / DVD Rules : Detect even USB installed CD/DVD
drives, make them read only or block them entirely
Floppy Rules : Detect even USB installed floppy drives,
make them read only or block them entirely.
Comodo myDLP Licensing
 Fully fledged data leakage prevention solution
 Requires no extra licenses such as, Oracle Windows
Server etc.
 Physical and Virtual Options Available
– Windows Clients Supported
– XP, Vista,7, 8, Server 2003, Server 2008, Server
2012
– Mac and Linux support coming soon.
 Licensing
– 1 Year, 2 Year, 3 Year Licensing
– All Features Included
– Updates Included
Integration and Network Protection
 Should be integrated
with mail server to
protect SMTP traffic.
 Supports all popular
mail servers.
 Should be integrated
with directory server to
use directory users &
groups in policies .
 Does not require any
agent installation.
 Should intercept Web traffic
to protect it.
 Can be integrated with your
proxy server using ICAP
protocol OR built-in Squid
3.x can be used.
 MyDLP Endpoint
Protection
 MyDLP Printer
Protection
 MyDLP Endpoint
Discovery
 MyDLP Management
Console
 MyDLP Network
Protection
 MyDLP Information
Discovery
Comodo MyDLP - Enterprise Edition
Comodo MyDLP - Web Integration Options
On Client
Manual proxy configuration to port 3128 of Comodo MyDLP.
Active Directory proxy enforcement
On Network
Using ICAP protocol if there's a proxy in place or if the
firewall supports ICAP.
via the built-in proxy.
*Note that Comodo MyDLP needs to be on the traffic path to be able to intercept
HTTP/HTTPS traffic.
*Comodo MyDLP SSL certificates needs to be installed in all clients so that the intercepted
traffic is trusted by the client
16
Information Discovery
MyDLP can crawl through your data stores, file servers, web servers and MySQL servers
to learn your sensitive data from them. Saves your time and keeps itself always up-to-
date.
If a sensitive information appears is in a place where it shouldn’t be, MyDLP finds out,
remediates and reports.
17
Endpoint and Printer Protection
 MyDLP will protect all kind of removable storage devices
connected to your computers through USB (1.0, 1.1, 2.0, 3.0),
Firewire (400, 800, 1600, 3200 and S types) and more.
 MyDLP can whitelist your removable storage devices so that
only the devices you approve can be used in your network.
 MyDLP can encrypt all files copied to your removable devices
so data on them can be accesible only in your network
 MyDLP support all printer models and all connection
ports.
 Does not require print server or any other agent
installation.
 If a sensitive information appears is in a place where it
shouldn’t be, MyDLP finds out, remediates and reports.
on endpoints too…
Management Console
Predefined and customizable ready to use policies
User roles with hierarchical authority scopes
Automatically revisions policies. You can turn back to any state at any time.
 Advanced incident log searching including full text searches.
19
in other words….
who moves
which information
in which way
from which source
to which
destination
who can
access
confidential
information
MyDLP
automatically
detects
confidential
information
during
data
transfer
…
…and prevents data leakage.
Community
Thousands of users all around the world.
MyDLP has thousands of Enterprise Edition
and Community Edition users all around the
world.
Market presence on almost all sectors with
MyDLP Enterprise Edition
including Finance, Defense Industry,
Government, Engineering, Military,
Health and Education.
 Q: How can I intercept web traffic (gmail etc.) in my network?
 A: For HTTP/HTTPS (web) traffic, you need to forward the traffic to MyDLP. Thus, you can
either configure a proxy on the client machines or use the ICAP to forward the traffic from another
proxy/firewall or use the built-in proxy in MyDLP and forward the traffic from a firewall directly
(even by PBR)
 Q: How can I intercept SMTP traffic?
 A: You should forward the SMTP traffic from your email server to MyDLP. This is done by
using "Send Connectors". Look at the installation guide for a detailed instruction.
 Q: I'm unsure about how to forward the traffic in my network, can you help me?
 A: Our system engineers have extensive experience on such deployments. They will support you
through your tests and tailor a deployment scenario for your network based on your topology.
Contact your Comodo representative for getting in contact with your system engineer.
FAQ
 Q:I've installed the endpoint client by web rules do not work
 A: Web rules are not enforced via endpoint client, they are enforced by forwarding your traffic to
MyDLP from the network (see the first question)
 Q: I've a feature request, who sould I contact?
 A: Reach your system engineer, he/she will forward the request to the developer teams and
keep you informed. Every feature request is evaluated and responded within days, not weeks.
 Q: MyDLP is running very slow, what should I do?
 A: Remember that the instructions on installation guide about the hardware requirements are
minimums. Depending on your specific usage, hardware requirements may vary as well. For
example, if you intent to use the "Quarantine,Archive" actions a lot, than you should rememberthat
a shadow copy of files is going to be kept at MyDLP, which will greatly increase the HDD sizes
needed. Check the underlying Linux' RAM&CPUusages and upgrade as necessary. If this didn't
solve your needs, consult with your system engineer.
FAQ cont...
25
Questions

More Related Content

What's hot

How to Plan for Performance and Scale for Multiplayer Games
How to Plan for Performance and Scale for Multiplayer GamesHow to Plan for Performance and Scale for Multiplayer Games
How to Plan for Performance and Scale for Multiplayer GamesCloudflare
 
Pxosys Webinar Amplify your Security
Pxosys Webinar Amplify your SecurityPxosys Webinar Amplify your Security
Pxosys Webinar Amplify your Security🏆Ruben Cocheno💭
 
Cisco umbrella youtube
Cisco umbrella youtubeCisco umbrella youtube
Cisco umbrella youtubeDhruv Sharma
 
Enterprise VPN: What you need to know
Enterprise VPN: What you need to knowEnterprise VPN: What you need to know
Enterprise VPN: What you need to knowfrancisdinha
 
2 what is the best firewall (sizing)
2 what is the best firewall (sizing)2 what is the best firewall (sizing)
2 what is the best firewall (sizing)Mostafa El Lathy
 
eMagic : A Complete Datacenter Management Suite
eMagic : A Complete Datacenter Management SuiteeMagic : A Complete Datacenter Management Suite
eMagic : A Complete Datacenter Management SuiteRaj Gire
 
The Day We Infected Ourselves with Ransomware
The Day We Infected Ourselves with RansomwareThe Day We Infected Ourselves with Ransomware
The Day We Infected Ourselves with RansomwareGodfrey Nolan
 
Developers Focus on Security-Minded Tooling - Quintis Venter
Developers Focus on Security-Minded Tooling - Quintis Venter �Developers Focus on Security-Minded Tooling - Quintis Venter �
Developers Focus on Security-Minded Tooling - Quintis Venter Thoughtworks
 
Dragnet overview
Dragnet overviewDragnet overview
Dragnet overviewdragnetNZ
 
Multi domain security-management_technical_presentation
Multi domain security-management_technical_presentationMulti domain security-management_technical_presentation
Multi domain security-management_technical_presentationdavebrosnan
 
Advanced Security Automation Made Simple
Advanced Security Automation Made SimpleAdvanced Security Automation Made Simple
Advanced Security Automation Made SimpleMark Nunnikhoven
 

What's hot (13)

How to Plan for Performance and Scale for Multiplayer Games
How to Plan for Performance and Scale for Multiplayer GamesHow to Plan for Performance and Scale for Multiplayer Games
How to Plan for Performance and Scale for Multiplayer Games
 
LAN Security
LAN Security LAN Security
LAN Security
 
Pxosys Webinar Amplify your Security
Pxosys Webinar Amplify your SecurityPxosys Webinar Amplify your Security
Pxosys Webinar Amplify your Security
 
Cisco umbrella youtube
Cisco umbrella youtubeCisco umbrella youtube
Cisco umbrella youtube
 
Enterprise VPN: What you need to know
Enterprise VPN: What you need to knowEnterprise VPN: What you need to know
Enterprise VPN: What you need to know
 
2 what is the best firewall (sizing)
2 what is the best firewall (sizing)2 what is the best firewall (sizing)
2 what is the best firewall (sizing)
 
eMagic : A Complete Datacenter Management Suite
eMagic : A Complete Datacenter Management SuiteeMagic : A Complete Datacenter Management Suite
eMagic : A Complete Datacenter Management Suite
 
The Day We Infected Ourselves with Ransomware
The Day We Infected Ourselves with RansomwareThe Day We Infected Ourselves with Ransomware
The Day We Infected Ourselves with Ransomware
 
Developers Focus on Security-Minded Tooling - Quintis Venter
Developers Focus on Security-Minded Tooling - Quintis Venter �Developers Focus on Security-Minded Tooling - Quintis Venter �
Developers Focus on Security-Minded Tooling - Quintis Venter
 
Dragnet overview
Dragnet overviewDragnet overview
Dragnet overview
 
Attacking VPN's
Attacking VPN'sAttacking VPN's
Attacking VPN's
 
Multi domain security-management_technical_presentation
Multi domain security-management_technical_presentationMulti domain security-management_technical_presentation
Multi domain security-management_technical_presentation
 
Advanced Security Automation Made Simple
Advanced Security Automation Made SimpleAdvanced Security Automation Made Simple
Advanced Security Automation Made Simple
 

Similar to Comodo my dlp_techpresentation_060615_v3

Start Up Austin 2017: Security Crash Course and Best Pratices
Start Up Austin 2017: Security Crash Course and Best PraticesStart Up Austin 2017: Security Crash Course and Best Pratices
Start Up Austin 2017: Security Crash Course and Best PraticesAmazon Web Services
 
Operations: Security Crash Course — Best Practices for Securing your Company
Operations: Security Crash Course — Best Practices for Securing your CompanyOperations: Security Crash Course — Best Practices for Securing your Company
Operations: Security Crash Course — Best Practices for Securing your CompanyAmazon Web Services
 
Corporate Security Issues and countering them using Unified Threat Management...
Corporate Security Issues and countering them using Unified Threat Management...Corporate Security Issues and countering them using Unified Threat Management...
Corporate Security Issues and countering them using Unified Threat Management...Rishabh Dangwal
 
SecureTower General Info
SecureTower General InfoSecureTower General Info
SecureTower General InfoAnton Lishchuk
 
DG_Architecture_Training.pptx
DG_Architecture_Training.pptxDG_Architecture_Training.pptx
DG_Architecture_Training.pptxTranVu383073
 
Next Dimension and Cisco | Solutions for PIPEDA Compliance
Next Dimension and Cisco | Solutions for PIPEDA ComplianceNext Dimension and Cisco | Solutions for PIPEDA Compliance
Next Dimension and Cisco | Solutions for PIPEDA ComplianceNext Dimension Inc.
 
A Deep Dive in the World of IT Networking (Part 2)
A Deep Dive in the World of IT Networking (Part 2)A Deep Dive in the World of IT Networking (Part 2)
A Deep Dive in the World of IT Networking (Part 2)Tuan Yang
 
Security Delivery Platform: Best practices
Security Delivery Platform: Best practicesSecurity Delivery Platform: Best practices
Security Delivery Platform: Best practicesMihajlo Prerad
 
Network security monitoring elastic webinar - 16 june 2021
Network security monitoring   elastic webinar - 16 june 2021Network security monitoring   elastic webinar - 16 june 2021
Network security monitoring elastic webinar - 16 june 2021Mouaz Alnouri
 
8 Ocak 2015 SOME Etkinligi - A10 Networks - Accelerating and Securing Applica...
8 Ocak 2015 SOME Etkinligi - A10 Networks - Accelerating and Securing Applica...8 Ocak 2015 SOME Etkinligi - A10 Networks - Accelerating and Securing Applica...
8 Ocak 2015 SOME Etkinligi - A10 Networks - Accelerating and Securing Applica...BGA Cyber Security
 
TechWiseTV Workshop: Encrypted Traffic Analytics
TechWiseTV Workshop: Encrypted Traffic Analytics TechWiseTV Workshop: Encrypted Traffic Analytics
TechWiseTV Workshop: Encrypted Traffic Analytics Robb Boyd
 
Desktop interview qestions & answer
Desktop interview qestions & answerDesktop interview qestions & answer
Desktop interview qestions & answermandarshetye45
 
Protecting location privacy in sensor networks against a global eavesdropper
Protecting location privacy in sensor networks against a global eavesdropperProtecting location privacy in sensor networks against a global eavesdropper
Protecting location privacy in sensor networks against a global eavesdropperShakas Technologies
 
Protecting location privacy in sensor networks against a global eavesdropper
Protecting location privacy in sensor networks against a global eavesdropperProtecting location privacy in sensor networks against a global eavesdropper
Protecting location privacy in sensor networks against a global eavesdropperShakas Technologies
 
DDoS Falcon_Tech_Specs-Haltdos
DDoS Falcon_Tech_Specs-HaltdosDDoS Falcon_Tech_Specs-Haltdos
DDoS Falcon_Tech_Specs-HaltdosHaltdos
 
Implementing an improved security for collin’s database and telecommuters
Implementing an improved security for collin’s database and telecommutersImplementing an improved security for collin’s database and telecommuters
Implementing an improved security for collin’s database and telecommutersRishabh Gupta
 

Similar to Comodo my dlp_techpresentation_060615_v3 (20)

Start Up Austin 2017: Security Crash Course and Best Pratices
Start Up Austin 2017: Security Crash Course and Best PraticesStart Up Austin 2017: Security Crash Course and Best Pratices
Start Up Austin 2017: Security Crash Course and Best Pratices
 
Operations: Security Crash Course — Best Practices for Securing your Company
Operations: Security Crash Course — Best Practices for Securing your CompanyOperations: Security Crash Course — Best Practices for Securing your Company
Operations: Security Crash Course — Best Practices for Securing your Company
 
Operations: Security
Operations: SecurityOperations: Security
Operations: Security
 
Corporate Security Issues and countering them using Unified Threat Management...
Corporate Security Issues and countering them using Unified Threat Management...Corporate Security Issues and countering them using Unified Threat Management...
Corporate Security Issues and countering them using Unified Threat Management...
 
SecureTower General Info
SecureTower General InfoSecureTower General Info
SecureTower General Info
 
DG_Architecture_Training.pptx
DG_Architecture_Training.pptxDG_Architecture_Training.pptx
DG_Architecture_Training.pptx
 
Next Dimension and Cisco | Solutions for PIPEDA Compliance
Next Dimension and Cisco | Solutions for PIPEDA ComplianceNext Dimension and Cisco | Solutions for PIPEDA Compliance
Next Dimension and Cisco | Solutions for PIPEDA Compliance
 
Network Monitoring Tools
Network Monitoring ToolsNetwork Monitoring Tools
Network Monitoring Tools
 
A Deep Dive in the World of IT Networking (Part 2)
A Deep Dive in the World of IT Networking (Part 2)A Deep Dive in the World of IT Networking (Part 2)
A Deep Dive in the World of IT Networking (Part 2)
 
Security Delivery Platform: Best practices
Security Delivery Platform: Best practicesSecurity Delivery Platform: Best practices
Security Delivery Platform: Best practices
 
Network security monitoring elastic webinar - 16 june 2021
Network security monitoring   elastic webinar - 16 june 2021Network security monitoring   elastic webinar - 16 june 2021
Network security monitoring elastic webinar - 16 june 2021
 
8 Ocak 2015 SOME Etkinligi - A10 Networks - Accelerating and Securing Applica...
8 Ocak 2015 SOME Etkinligi - A10 Networks - Accelerating and Securing Applica...8 Ocak 2015 SOME Etkinligi - A10 Networks - Accelerating and Securing Applica...
8 Ocak 2015 SOME Etkinligi - A10 Networks - Accelerating and Securing Applica...
 
TechWiseTV Workshop: Encrypted Traffic Analytics
TechWiseTV Workshop: Encrypted Traffic Analytics TechWiseTV Workshop: Encrypted Traffic Analytics
TechWiseTV Workshop: Encrypted Traffic Analytics
 
Desktop interview qestions & answer
Desktop interview qestions & answerDesktop interview qestions & answer
Desktop interview qestions & answer
 
Protecting location privacy in sensor networks against a global eavesdropper
Protecting location privacy in sensor networks against a global eavesdropperProtecting location privacy in sensor networks against a global eavesdropper
Protecting location privacy in sensor networks against a global eavesdropper
 
Protecting location privacy in sensor networks against a global eavesdropper
Protecting location privacy in sensor networks against a global eavesdropperProtecting location privacy in sensor networks against a global eavesdropper
Protecting location privacy in sensor networks against a global eavesdropper
 
DDoS Falcon_Tech_Specs-Haltdos
DDoS Falcon_Tech_Specs-HaltdosDDoS Falcon_Tech_Specs-Haltdos
DDoS Falcon_Tech_Specs-Haltdos
 
Implementing an improved security for collin’s database and telecommuters
Implementing an improved security for collin’s database and telecommutersImplementing an improved security for collin’s database and telecommuters
Implementing an improved security for collin’s database and telecommuters
 
Internship msc cs
Internship msc csInternship msc cs
Internship msc cs
 
Day4
Day4Day4
Day4
 

More from Truong Minh Yen

Southeast Asia Digital 2015
Southeast Asia Digital 2015Southeast Asia Digital 2015
Southeast Asia Digital 2015Truong Minh Yen
 
2014 asia pacific digital overview
2014 asia pacific digital overview2014 asia pacific digital overview
2014 asia pacific digital overviewTruong Minh Yen
 
Security_prediction_2014
Security_prediction_2014Security_prediction_2014
Security_prediction_2014Truong Minh Yen
 
Product presentation retail_2013_eng
Product presentation retail_2013_engProduct presentation retail_2013_eng
Product presentation retail_2013_engTruong Minh Yen
 
Panda security corporate_presentation_2012
Panda security corporate_presentation_2012Panda security corporate_presentation_2012
Panda security corporate_presentation_2012Truong Minh Yen
 

More from Truong Minh Yen (9)

Sitram brand book
Sitram brand bookSitram brand book
Sitram brand book
 
Sach trang 2017
Sach trang 2017Sach trang 2017
Sach trang 2017
 
Comodo 2017 report
Comodo 2017 reportComodo 2017 report
Comodo 2017 report
 
Comodo_Vietnam_Overview
Comodo_Vietnam_OverviewComodo_Vietnam_Overview
Comodo_Vietnam_Overview
 
Southeast Asia Digital 2015
Southeast Asia Digital 2015Southeast Asia Digital 2015
Southeast Asia Digital 2015
 
2014 asia pacific digital overview
2014 asia pacific digital overview2014 asia pacific digital overview
2014 asia pacific digital overview
 
Security_prediction_2014
Security_prediction_2014Security_prediction_2014
Security_prediction_2014
 
Product presentation retail_2013_eng
Product presentation retail_2013_engProduct presentation retail_2013_eng
Product presentation retail_2013_eng
 
Panda security corporate_presentation_2012
Panda security corporate_presentation_2012Panda security corporate_presentation_2012
Panda security corporate_presentation_2012
 

Recently uploaded

Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...OnePlan Solutions
 
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataAdobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataBradBedford3
 
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...gurkirankumar98700
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...MyIntelliSource, Inc.
 
Implementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with AzureImplementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with AzureDinusha Kumarasiri
 
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEBATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEOrtus Solutions, Corp
 
why an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfwhy an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfjoe51371421
 
Engage Usergroup 2024 - The Good The Bad_The Ugly
Engage Usergroup 2024 - The Good The Bad_The UglyEngage Usergroup 2024 - The Good The Bad_The Ugly
Engage Usergroup 2024 - The Good The Bad_The UglyFrank van der Linden
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...MyIntelliSource, Inc.
 
What is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWhat is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWave PLM
 
buds n tech IT solutions
buds n  tech IT                solutionsbuds n  tech IT                solutions
buds n tech IT solutionsmonugehlot87
 
What are the features of Vehicle Tracking System?
What are the features of Vehicle Tracking System?What are the features of Vehicle Tracking System?
What are the features of Vehicle Tracking System?Watsoo Telematics
 
XpertSolvers: Your Partner in Building Innovative Software Solutions
XpertSolvers: Your Partner in Building Innovative Software SolutionsXpertSolvers: Your Partner in Building Innovative Software Solutions
XpertSolvers: Your Partner in Building Innovative Software SolutionsMehedi Hasan Shohan
 
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...soniya singh
 
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideBuilding Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideChristina Lin
 
Cloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackCloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackVICTOR MAESTRE RAMIREZ
 
chapter--4-software-project-planning.ppt
chapter--4-software-project-planning.pptchapter--4-software-project-planning.ppt
chapter--4-software-project-planning.pptkotipi9215
 
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样umasea
 
What is Binary Language? Computer Number Systems
What is Binary Language?  Computer Number SystemsWhat is Binary Language?  Computer Number Systems
What is Binary Language? Computer Number SystemsJheuzeDellosa
 

Recently uploaded (20)

Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...
 
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataAdobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
 
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
 
Implementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with AzureImplementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with Azure
 
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEBATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
 
why an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfwhy an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdf
 
Engage Usergroup 2024 - The Good The Bad_The Ugly
Engage Usergroup 2024 - The Good The Bad_The UglyEngage Usergroup 2024 - The Good The Bad_The Ugly
Engage Usergroup 2024 - The Good The Bad_The Ugly
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
 
What is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWhat is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need It
 
buds n tech IT solutions
buds n  tech IT                solutionsbuds n  tech IT                solutions
buds n tech IT solutions
 
What are the features of Vehicle Tracking System?
What are the features of Vehicle Tracking System?What are the features of Vehicle Tracking System?
What are the features of Vehicle Tracking System?
 
Call Girls In Mukherjee Nagar 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
Call Girls In Mukherjee Nagar 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...Call Girls In Mukherjee Nagar 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
Call Girls In Mukherjee Nagar 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
 
XpertSolvers: Your Partner in Building Innovative Software Solutions
XpertSolvers: Your Partner in Building Innovative Software SolutionsXpertSolvers: Your Partner in Building Innovative Software Solutions
XpertSolvers: Your Partner in Building Innovative Software Solutions
 
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
 
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideBuilding Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
 
Cloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackCloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStack
 
chapter--4-software-project-planning.ppt
chapter--4-software-project-planning.pptchapter--4-software-project-planning.ppt
chapter--4-software-project-planning.ppt
 
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
 
What is Binary Language? Computer Number Systems
What is Binary Language?  Computer Number SystemsWhat is Binary Language?  Computer Number Systems
What is Binary Language? Computer Number Systems
 

Comodo my dlp_techpresentation_060615_v3

  • 2. History  Started operations in 1998  Started offering SSL Certificates in 2002  Over 3 millions of digital certificates up to date Leadership  One of the two world's largest and most secure SSL certificate authorities  Leader in security and identity management (87 patents)  Founding member of CA-B Forum, a leader in web browser technologies  Leader in secure online trade with Home SSL standard  Have severals labs and R&D Centers on digital security, cryptography and anti-malware analysis all over the world Clients  Over 300.000 enteprise customers in 100 countries  Financial, assurance and medical institutions  Hunderds of universities and public sector entities  Thousands of online trading businesses  Over 35 million PCs  More than 7,000 business partners Facts  %60 gross income increase between 2007-2010  More than 1000 worlwide employees. About US
  • 3. Clients and Partners Enterprise Security PartnersOnline Business Security
  • 4.  Perform content inspection of data and execute responses, ranging from simple notification to active blocking based on policy settings  Many holes and exit points are available for data leakage Data Loss Prevention (DLP)
  • 7. Comodo MyDLP Background How data is marked and identified Predefined policies and data types Social security numbers, National Identification Numbers etc. Prescribed in PCI, HIPAA, SOX, GLBA, etc. (Bank account numbers, Credit card numbers) All can be used as it is or customized for client needs. Information Discovery Deals with information, not file or data stream Using another file type or storing in a compressed archive does not effect information. Context – aware. Browses through several resources and trains itself. Can train itself using SQL servers and storages. Matches structured (SSN, CC etc.) and unstructured data (source code, user defined documents etc.) (Fingerprints data by using one-way hash methods)
  • 8. Three levels of DLP security Data in Motion Web Rule: Data transfers over HTTP, HTTPS by Comodo MyDLP ICAP server and inspected. Mail Rule: All mails are inspected using Comodo MyDLP as a content filter. API Rule: You can use Comodo MyDLP API to integrate with your in-house applications.
  • 9. Three levels of DLP security Data at Rest Endpoint Discovery Rule: Data which resides at workstations, notebooks and host computers etc. are traced and inspected. Remote Storage Discovery Rule: Data which resides at file servers, network storages, MS Windows shares, web servers etc. are traced and inspected.
  • 10. 10 Three levels of DLP security Data at Endpoints Removable Storage Rule: Data transferred from endpoints are intercepted and inspected. Printer Rule: If a user tries to print out a document, printout process is intercepted and document will be inspected. Screenshot Rule: Screenshot attempts for sensitive applications will be controlled. Removable Storage Encryption Rule: Enables you to automatically encrypt devices and use them transparently.
  • 11. 11 Three levels of DLP security Data at Endpoints USB Plugin / Plugout Detection : Detect and/or block when users plugin or out USB devices even if it is allowed to work or not. Removable Storage Inbound Rules: Detect when users copy files FROM an USB flash drive (even if the drive is allowed to be used), create a copy of the file if needed. CD / DVD Rules : Detect even USB installed CD/DVD drives, make them read only or block them entirely Floppy Rules : Detect even USB installed floppy drives, make them read only or block them entirely.
  • 12. Comodo myDLP Licensing  Fully fledged data leakage prevention solution  Requires no extra licenses such as, Oracle Windows Server etc.  Physical and Virtual Options Available – Windows Clients Supported – XP, Vista,7, 8, Server 2003, Server 2008, Server 2012 – Mac and Linux support coming soon.  Licensing – 1 Year, 2 Year, 3 Year Licensing – All Features Included – Updates Included
  • 13. Integration and Network Protection  Should be integrated with mail server to protect SMTP traffic.  Supports all popular mail servers.  Should be integrated with directory server to use directory users & groups in policies .  Does not require any agent installation.  Should intercept Web traffic to protect it.  Can be integrated with your proxy server using ICAP protocol OR built-in Squid 3.x can be used.
  • 14.  MyDLP Endpoint Protection  MyDLP Printer Protection  MyDLP Endpoint Discovery  MyDLP Management Console  MyDLP Network Protection  MyDLP Information Discovery Comodo MyDLP - Enterprise Edition
  • 15. Comodo MyDLP - Web Integration Options On Client Manual proxy configuration to port 3128 of Comodo MyDLP. Active Directory proxy enforcement On Network Using ICAP protocol if there's a proxy in place or if the firewall supports ICAP. via the built-in proxy. *Note that Comodo MyDLP needs to be on the traffic path to be able to intercept HTTP/HTTPS traffic. *Comodo MyDLP SSL certificates needs to be installed in all clients so that the intercepted traffic is trusted by the client
  • 16. 16 Information Discovery MyDLP can crawl through your data stores, file servers, web servers and MySQL servers to learn your sensitive data from them. Saves your time and keeps itself always up-to- date. If a sensitive information appears is in a place where it shouldn’t be, MyDLP finds out, remediates and reports.
  • 17. 17 Endpoint and Printer Protection  MyDLP will protect all kind of removable storage devices connected to your computers through USB (1.0, 1.1, 2.0, 3.0), Firewire (400, 800, 1600, 3200 and S types) and more.  MyDLP can whitelist your removable storage devices so that only the devices you approve can be used in your network.  MyDLP can encrypt all files copied to your removable devices so data on them can be accesible only in your network  MyDLP support all printer models and all connection ports.  Does not require print server or any other agent installation.  If a sensitive information appears is in a place where it shouldn’t be, MyDLP finds out, remediates and reports. on endpoints too…
  • 18. Management Console Predefined and customizable ready to use policies User roles with hierarchical authority scopes Automatically revisions policies. You can turn back to any state at any time.  Advanced incident log searching including full text searches.
  • 20. who moves which information in which way from which source to which destination who can access confidential information
  • 22. Community Thousands of users all around the world. MyDLP has thousands of Enterprise Edition and Community Edition users all around the world. Market presence on almost all sectors with MyDLP Enterprise Edition including Finance, Defense Industry, Government, Engineering, Military, Health and Education.
  • 23.  Q: How can I intercept web traffic (gmail etc.) in my network?  A: For HTTP/HTTPS (web) traffic, you need to forward the traffic to MyDLP. Thus, you can either configure a proxy on the client machines or use the ICAP to forward the traffic from another proxy/firewall or use the built-in proxy in MyDLP and forward the traffic from a firewall directly (even by PBR)  Q: How can I intercept SMTP traffic?  A: You should forward the SMTP traffic from your email server to MyDLP. This is done by using "Send Connectors". Look at the installation guide for a detailed instruction.  Q: I'm unsure about how to forward the traffic in my network, can you help me?  A: Our system engineers have extensive experience on such deployments. They will support you through your tests and tailor a deployment scenario for your network based on your topology. Contact your Comodo representative for getting in contact with your system engineer. FAQ
  • 24.  Q:I've installed the endpoint client by web rules do not work  A: Web rules are not enforced via endpoint client, they are enforced by forwarding your traffic to MyDLP from the network (see the first question)  Q: I've a feature request, who sould I contact?  A: Reach your system engineer, he/she will forward the request to the developer teams and keep you informed. Every feature request is evaluated and responded within days, not weeks.  Q: MyDLP is running very slow, what should I do?  A: Remember that the instructions on installation guide about the hardware requirements are minimums. Depending on your specific usage, hardware requirements may vary as well. For example, if you intent to use the "Quarantine,Archive" actions a lot, than you should rememberthat a shadow copy of files is going to be kept at MyDLP, which will greatly increase the HDD sizes needed. Check the underlying Linux' RAM&CPUusages and upgrade as necessary. If this didn't solve your needs, consult with your system engineer. FAQ cont...