LOSS PREVENTION
LARRY
DATA
THE MOST IMPORTANT ASSET
OF AN ORGANIZATION
DATA
MANAGE.
DATACONTROL. PROTECT.
SENSITIVE
IMPORTANT
SAFE
SENSITIVE
IMPORTANT
SAFE
THE
STEAL
BABY
DLPDATA LOSS
PREVENTION
ENSURES CRITICAL INFORMATION
ARE KEPT SAFELY AT THE
CORPORATE NETWORK AND
HELPS ADMINISTRATOR
CONTROL THE DATA WHAT
END-USERS WISH TO TRANSFER…
“
DO WE NEED DLP?
WHY
CORPORATE IMAGE.
COMPLIANCE.
AVOID COSTLY PENALTIES.
WHAT DATA DO
YOU HAVE?
WHO IS
ACCESSING YOUR
DATA?
HOW TO RESPOND
TO DATA LEAKAGE
EVENTS?
IDENTIFICATION OF SENSITIVE DATA
CREDIT CARD NO.
SOCIAL SECURITY
SENSITIVE BUSINESS
PLANS
FINANCIAL RECORDS
EMPLOYEE DATA
BUSINESS PLANS
MARKETING MATERIALS
WEBSITE
NEWSLETTERS
DISCOVER
MONITOR
DETECTION/PREVENTION
NOTIFICATION
ACTION
PROTECT
FOR EXAMPLE:
AN EMPLOYEE TRIES TO SEND AN
EMAIL WITH SOCIAL SECURITY
PREVENT FROM SENDING
NOTIFY USER FOR VIOLATION
QUARANTINE EMAIL
SEND THROUGH SECURE GATEWAY
PROJECT
CONSIDERATIONS
• BUDGET
• IN-HOUSE OR OUTSOURCE
• PROJECT TEAM
• POLICY CREATION & MGMT.
• INCIDENT WORKFLOW & CASE MGMT.
CHOOSING PRODUCT
• MARKET PRESENCE
• TOTAL COST OF OWNERSHIP
• SCALABILITY
• EASY OF USE
• NETWORK INFRASTRUCTURE COMPATIBILITY
• PROOF OF CONCEPT
DLP
MARKET
LEADER
CONCLUSION

Data Loss Prevention

Editor's Notes

  • #10 DLP systems assist with inventorying the sensitive information possessed by an organization. In many cases, an enterprise simply doesn’t know where sensitive information exists. DLP tools can help ferret out hidden stores of data lurking on endpoint hard drives, in e-mail records and at other locations. DISCOVER What data do you have? What is the value of your data? Your obligations for protecting the data? MONITOR Where your data resides? Who is accessing your data? Where your data is going? PROTECTS How you protect your data? Your protection gaps and risks? How to respond to data leakage events?
  • #11 DLP systems assist with inventorying the sensitive information possessed by an organization. In many cases, an enterprise simply doesn’t know where sensitive information exists. DLP tools can help ferret out hidden stores of data lurking on endpoint hard drives, in e-mail records and at other locations. DISCOVER What data do you have? What is the value of your data? Your obligations for protecting the data? MONITOR Where your data resides? Who is accessing your data? Where your data is going? PROTECTS How you protect your data? Your protection gaps and risks? How to respond to data leakage events?
  • #12 DATA IN MOTION- AS IT MOVES THROUGH THE NETWORK DATA AT REST – BECOMES STORED DATA DATA IN USE – AS IT BEING USED
  • #13 DLP systems assist with inventorying the sensitive information possessed by an organization. In many cases, an enterprise simply doesn’t know where sensitive information exists. DLP tools can help ferret out hidden stores of data lurking on endpoint hard drives, in e-mail records and at other locations. DISCOVER What data do you have? What is the value of your data? Your obligations for protecting the data? MONITOR Where your data resides? Who is accessing your data? Where your data is going? PROTECTS How you protect your data? Your protection gaps and risks? How to respond to data leakage events?
  • #14 DLP systems assist with inventorying the sensitive information possessed by an organization. In many cases, an enterprise simply doesn’t know where sensitive information exists. DLP tools can help ferret out hidden stores of data lurking on endpoint hard drives, in e-mail records and at other locations. DISCOVER What data do you have? What is the value of your data? Your obligations for protecting the data? MONITOR Where your data resides? Who is accessing your data? Where your data is going? PROTECTS How you protect your data? Your protection gaps and risks? How to respond to data leakage events?
  • #15 DLP systems assist with inventorying the sensitive information possessed by an organization. In many cases, an enterprise simply doesn’t know where sensitive information exists. DLP tools can help ferret out hidden stores of data lurking on endpoint hard drives, in e-mail records and at other locations. DISCOVER What data do you have? What is the value of your data? Your obligations for protecting the data? MONITOR Where your data resides? Who is accessing your data? Where your data is going? PROTECTS How you protect your data? Your protection gaps and risks? How to respond to data leakage events?
  • #16 DLP systems assist with inventorying the sensitive information possessed by an organization. In many cases, an enterprise simply doesn’t know where sensitive information exists. DLP tools can help ferret out hidden stores of data lurking on endpoint hard drives, in e-mail records and at other locations. DISCOVER What data do you have? What is the value of your data? Your obligations for protecting the data? MONITOR Where your data resides? Who is accessing your data? Where your data is going? PROTECTS How you protect your data? Your protection gaps and risks? How to respond to data leakage events?
  • #17 DLP systems assist with inventorying the sensitive information possessed by an organization. In many cases, an enterprise simply doesn’t know where sensitive information exists. DLP tools can help ferret out hidden stores of data lurking on endpoint hard drives, in e-mail records and at other locations. DISCOVER What data do you have? What is the value of your data? Your obligations for protecting the data? MONITOR Where your data resides? Who is accessing your data? Where your data is going? PROTECTS How you protect your data? Your protection gaps and risks? How to respond to data leakage events?