SlideShare a Scribd company logo
Introducing	
  Data	
  Loss	
  Preven3on	
  14	
  
Cheryl	
  Tang 	
   	
   	
  	
  	
  	
  Kedar	
  Apte	
  
Sr.	
  Product	
  Marke/ng	
  Manager 	
  	
  	
  	
  	
  Sr.	
  Product	
  Manager	
  
Objec3ves	
  
•  This	
  presenta/on	
  is	
  intended	
  to	
  provide	
  you	
  with	
  an	
  
understanding	
  of:	
  
–  Customer	
  challenges	
  related	
  to	
  data	
  in	
  the	
  cloud	
  
–  Key	
  benefits	
  and	
  features	
  of	
  “DLP	
  for	
  Cloud”	
  offerings	
  and	
  DLP	
  14	
  
–  Where	
  and	
  how	
  to	
  iden/fy	
  “DLP	
  for	
  Cloud”	
  opportuni/es	
  
–  How	
  “DLP	
  for	
  Cloud”	
  offerings	
  are	
  licensed	
  
•  What	
  we	
  won’t	
  cover	
  in	
  this	
  session	
  
–  Compe//on	
  
–  Objec/on	
  Handling	
  
Agenda	
  
1	
  
Market	
  Overview	
  and	
  Customer	
  
Challenges	
  
2	
   DLP	
  for	
  Cloud	
  
3	
   Addi/onal	
  Enhancements	
  in	
  DLP	
  14	
  
4	
   Resources	
  
Copyright	
  ©	
  2014	
  Symantec	
  Corpora/on	
  
3	
  
Symantec	
  Enterprise	
  Security	
  |	
  PRODUCT	
  STRATEGY	
  
Copyright	
  ©	
  2015	
  Symantec	
  Corpora/on	
  
4	
  
Informa3on	
  is	
  Everywhere	
  
Brings	
  Produc3vity,	
  Agility,	
  Convenience	
  ……and	
  Problems	
  
	
  
	
  
Copyright	
  ©	
  2015	
  Symantec	
  Corpora/on	
  
5	
  
Cloud	
   Mobile	
   BYOD	
  
Your	
  security	
  slows	
  me	
  
down	
  
I	
  expect	
  an	
  insanely	
  great	
  
user	
  experience	
  
You	
  don’t	
  own	
  the	
  device	
  
I	
  will	
  use	
  the	
  device	
  I	
  want	
  
You	
  can’t	
  lock	
  my	
  device	
  
down	
  
You	
  don’t	
  own	
  the	
  app	
  	
  
You	
  can’t	
  say	
  no	
  
You	
  don’t	
  own	
  the	
  
infrastructure	
  
..and	
  the	
  Cloud	
  is	
  a	
  Risky	
  Place	
  for	
  Work	
  Data	
  
Copyright	
  ©	
  2015	
  Symantec	
  Corpora/on	
  
6	
  
Informa3on	
  Protec3on	
  for	
  the	
  Cloud	
  
Copyright	
  ©	
  2015	
  Symantec	
  Corpora/on	
  
7	
  
Customer	
  Challenges	
  
•  No	
  visibility	
  to	
  what	
  data	
  is	
  in	
  the	
  cloud	
  
–  “I	
  know	
  my	
  users	
  are	
  crea0ng	
  and	
  storing	
  data	
  in	
  the	
  cloud,	
  
but	
  I	
  have	
  no	
  idea	
  if	
  that	
  data	
  is	
  sensi0ve	
  and	
  who	
  is	
  
accessing	
  the	
  sensi0ve	
  data.”	
  
–  “My	
  users	
  are	
  syncing	
  sensi0ve	
  files	
  to	
  cloud	
  storage	
  sites.”	
  
•  No	
  controls	
  over	
  what	
  data	
  can	
  be	
  stored/shared	
  in	
  
the	
  cloud	
  
–  “How	
  do	
  I	
  control	
  sensi0ve	
  data	
  from	
  leaking	
  to	
  the	
  cloud?”	
  
–  “We	
  want	
  to	
  alert/educate	
  users	
  that	
  they’re	
  puEng	
  
sensi0ve	
  files	
  in	
  the	
  cloud	
  puts	
  the	
  company	
  at	
  risk.”	
  	
  
•  Security	
  and	
  compliance	
  concerns	
  holding	
  back	
  cloud	
  
adop/on	
  
–  “We	
  want	
  to	
  move	
  to	
  the	
  cloud,	
  but	
  we’re	
  worried	
  about	
  
losing	
  visibility	
  and	
  control	
  over	
  sensi0ve	
  corporate	
  data.”	
  	
  
–  “Moving	
  our	
  data	
  to	
  cloud	
  compromises	
  our	
  compliance	
  
requirements	
  and	
  puts	
  us	
  at	
  risk	
  for	
  security	
  breaches.”	
  
Copyright	
  ©	
  2014	
  Symantec	
  Corpora/on	
  
8	
  
What’s	
  New	
  in	
  Data	
  Loss	
  Preven3on	
  14	
  
Copyright	
  ©	
  2015	
  Symantec	
  Corpora/on	
  
9	
  
Unified	
  
Management	
  Extending	
  Data	
  Protec3on	
  for	
  the	
  Cloud	
  
Box	
  
Office	
  365	
  
iOS	
  
Android	
  
Email	
  
Web	
  
FTP	
  
IM	
  
USB	
  
Hard	
  Drives	
  
Removable	
  Storage	
  
Network	
  Shares	
  
Print/Fax	
  
Cloud	
  &	
  Web	
  Apps	
  
File	
  Servers	
  
Exchange,	
  Lotus	
  
SharePoint	
  
Databases	
  
Web	
  Servers	
  
Dozens	
  of	
  New	
  Features	
  in	
  DLP	
  14!	
  
Copyright	
  ©	
  2015	
  Symantec	
  Corpora/on	
  
10	
  
14	
  
VMware	
  Fusion	
  &	
  Hyper-­‐V	
  support	
  
Exchange	
  2013	
  
Connector	
  
Removeable	
  storage	
  for	
  Mac	
  
Browser-­‐based	
  uploads	
  for	
  Mac	
  
Cloud	
  Storage	
  for	
  Box	
  
Media	
  Transfer	
  Protocol	
  
(MTP)	
  support	
  
Disable	
  print	
  screen	
  
Auditor	
  role	
  for	
  DLP	
  policy	
  
management	
  	
  
Clipboard	
  paste	
  
monitoring	
  
PDF	
  custom	
  metadata	
  tags	
  
Enhanced	
  Indexed	
  Document	
  
Matching	
  (IDM)	
  algorithms	
  
Enhanced	
  SharePoint	
  
Connector	
  
Cloud	
  Prevent	
  for	
  Microsoh	
  Office	
  365	
  
Improved	
  keyword	
  
matching	
  performance	
  
Modernized	
  Enforce	
  console	
  
Mul/-­‐language	
  support	
  for	
  
Endpoint	
  pop-­‐ups	
  
Remote	
  Index	
  Data	
  
Matching	
  (IDM)	
  Indexer	
  
Amazon	
  Web	
  Services	
  
support	
  
Improved	
  Exact	
  Data	
  
Matching	
  technology	
  
40+	
  new	
  interna/onal	
  data	
  iden/fiers	
  
Cloud	
  file	
  sync	
  and	
  share	
  
(Endpoint	
  Prevent)	
  
Agenda	
  
1	
  
Market	
  Overview	
  &	
  Customer	
  
Challenges	
  
2	
   DLP	
  for	
  Cloud	
  
3	
   Addi/onal	
  Enhancements	
  
4	
   Resources	
  
Copyright	
  ©	
  2014	
  Symantec	
  Corpora/on	
  
11	
  
DLP	
  for	
  Cloud	
  
What	
  it	
  is	
  
•  Two	
  new	
  DLP	
  products	
  
–  Symantec	
  DLP	
  Cloud	
  Storage	
  (DLP	
  
14.0)	
  
–  Symantec	
  DLP	
  Cloud	
  Prevent	
  for	
  
Microsoh	
  Office	
  365	
  (DLP	
  12.5)	
  
•  Provide	
  discovery,	
  monitoring	
  and	
  
remedia/on	
  capabili/es	
  for	
  cloud-­‐
based	
  storage	
  and	
  email	
  
•  An	
  opportunity	
  for	
  you	
  to	
  make	
  
money	
  –	
  addi/onal	
  licensing	
  
required	
  
Benefits	
  
•  Enables	
  customers	
  to	
  take	
  
advantage	
  of	
  the	
  cloud	
  with	
  control	
  
and	
  visibility	
  
•  Protects	
  data	
  regardless	
  of	
  it’s	
  on-­‐
premise	
  or	
  in	
  the	
  cloud	
  
•  Easily	
  and	
  quickly	
  extends	
  current	
  
data	
  loss	
  policies	
  and	
  workflows	
  to	
  
cloud	
  apps	
  
Copyright	
  ©	
  2014	
  Symantec	
  Corpora/on	
  
12	
  
DLP	
  Cloud	
  Storage	
  
Features	
  
•  Scan	
  Box	
  Business	
  and	
  Enterprise	
  
Accounts	
  to	
  discover	
  and	
  tag	
  
sensi/ve	
  informa/on	
  in	
  Box	
  
•  Enable	
  user	
  self-­‐remedia/on	
  from	
  
Box	
  (visual	
  tags)	
  and	
  the	
  DLP	
  Self-­‐
Service	
  Portal	
  
•  Seamlessly	
  integrates	
  with	
  Box	
  and	
  
your	
  current	
  DLP	
  system	
  
Benefits	
  
•  Provides	
  visibility	
  into	
  the	
  sensi/ve	
  
files	
  that	
  users	
  are	
  storing	
  and	
  
sharing	
  on	
  Box	
  
•  Quickly	
  and	
  easily	
  extends	
  current	
  
data	
  loss	
  policies	
  and	
  workflows	
  to	
  
Box	
  
Copyright	
  ©	
  2014	
  Symantec	
  Corpora/on	
  
13	
  
New	
  in	
  
DLP	
  14!	
  
DLP	
  Cloud	
  Storage:	
  Incident	
  List	
  
DLP	
  14.0	
  	
  Differences	
  Training:	
  Storage	
  
14	
  
DLP	
  Cloud	
  Storage:	
  Incident	
  Details	
  
DLP	
  14.0	
  	
  Differences	
  Training:	
  Storage	
  
15	
  
File	
  Loca3on	
  indicates	
  the	
  
Username	
  and	
  the	
  file	
  loca3on	
  in	
  
the	
  users	
  Box	
  account	
  
DLP	
  Cloud	
  Storage:	
  Incident	
  Details	
  
DLP	
  14.0	
  	
  Differences	
  Training:	
  Storage	
  
16	
  
Collaborators	
  and	
  their	
  roles	
  are	
  
listed	
  in	
  the	
  incident	
  
DLP	
  Cloud	
  Storage:	
  Incident	
  Details	
  
DLP	
  14.0	
  	
  Differences	
  Training:	
  Storage	
  
17	
  
Shared	
  link	
  informa3on	
  lists	
  
permissions	
  assigned	
  to	
  the	
  link	
  
DLP	
  Cloud	
  Storage:	
  Visual	
  Tags	
  in	
  Box	
  
Copyright	
  ©	
  2014	
  Symantec	
  Corpora/on	
  
18	
  
Sensi3ve	
  files	
  are	
  automa3cally	
  
tagged	
  in	
  Box	
  
DLP	
  Cloud	
  Prevent	
  for	
  Microso[	
  Office	
  365	
  
•  Monitors	
  and	
  protects	
  confiden/al	
  
email	
  sent	
  from	
  your	
  Microsoh-­‐hosted	
  
instance	
  of	
  Exchange	
  Online	
  
•  Seamlessly	
  integrates	
  with	
  Exchange	
  
Online	
  and	
  your	
  current	
  Symantec	
  DLP	
  
system	
  
•  Ensures	
  email	
  delivery	
  via	
  Symantec	
  
Email	
  Security.cloud	
  
Benefits	
  Features	
  
•  Lowers	
  total	
  cost	
  of	
  ownership	
  by	
  
reducing	
  on-­‐premises	
  servers	
  and	
  
overhead	
  
•  Delivers	
  faster	
  /me	
  to	
  value	
  than	
  on-­‐
premises	
  solu/ons	
  by	
  leveraging	
  IaaS	
  
•  Quickly	
  and	
  easily	
  extends	
  current	
  data	
  
loss	
  policies	
  and	
  workflows	
  to	
  Exchange	
  
Online	
  
Iden3fying	
  DLP	
  for	
  Cloud	
  Opportuni3es	
  
DLP	
  Installed	
  Base	
  
•  Upsell	
  Cloud	
  Storage	
  and/or	
  Cloud	
  Prevent	
  to	
  address	
  cloud	
  
security	
  and	
  compliance	
  concerns	
  
–  Gain	
  visibility	
  into	
  your	
  sensi/ve	
  data	
  in	
  the	
  cloud	
  
–  Implement	
  controls	
  for	
  sensi/ve	
  data	
  stored	
  and	
  accessed	
  by	
  cloud	
  apps	
  
–  Accelerate	
  cloud	
  storage	
  and	
  cloud	
  email	
  adop/on	
  with	
  monitoring	
  and	
  
protec/on	
  capabili/es	
  
•  Key	
  Buyers	
  
–  CIO	
  
–  CISO	
  
–  VP	
  or	
  Director	
  of	
  Info	
  Sec	
  
Copyright	
  ©	
  2014	
  Symantec	
  Corpora/on	
  
20	
  
“How	
  do	
  you	
  determine	
  if	
  
sensi1ve	
  data	
  is	
  in	
  the	
  
cloud?”	
  
Discovery	
  Ques3ons	
  
Copyright	
  ©	
  2014	
  Symantec	
  Corpora/on	
  
21	
  
What	
  to	
  Ask	
   What	
  to	
  Listen/Probe	
  For	
  
“How	
  do	
  you	
  monitor	
  and	
  
protect	
  cloud	
  apps	
  and	
  data	
  
that	
  LOB	
  has	
  implemented	
  
outside	
  of	
  IT?”	
  
-­‐  Shadow	
  IT	
  concerns	
  
-­‐  Concerns	
  about	
  risky	
  employee	
  behavior	
  
(“stop	
  stupid”)	
  
-­‐  Lack	
  of	
  visibility	
  into	
  what	
  sensi/ve	
  data	
  is	
  
stored	
  and	
  shared	
  in	
  cloud	
  apps	
  
-­‐  No	
  visibility	
  into	
  what	
  sensi/ve	
  data	
  is	
  stored	
  
and	
  shared	
  in	
  the	
  cloud	
  
-­‐  Challenges	
  geqng	
  cloud	
  data	
  under	
  control	
  
-­‐  Difficulty	
  changing	
  risky	
  employee	
  behavior	
  
(“stop	
  stupid”)	
  	
  
-­‐  Security	
  and	
  compliance	
  as	
  a	
  barrier	
  for	
  cloud	
  
adop/on	
  
-­‐  Increased	
  use/adop/on	
  of	
  cloud	
  apps	
  by	
  LOB	
  
-­‐  Poten/al	
  penal/es/fines	
  related	
  to	
  breached	
  
data	
  or	
  lack	
  of	
  compliance	
  
“How	
  concerned	
  are	
  you	
  
about	
  data	
  loss	
  from	
  cloud	
  
storage	
  and	
  email?”	
  
Pricing	
  
•  Upside	
  for	
  YOU	
  
–  Cloud	
  Storage	
  and	
  Cloud	
  Prevent	
  require	
  addi/onal	
  licenses	
  
Copyright	
  ©	
  2014	
  Symantec	
  Corpora/on	
  
22	
  
Product	
  SKU	
   MSRP	
   Meter	
   License	
  Type	
   SYMC	
  Buying	
  Program	
  
Perpetual	
   Subscrip3on	
   EXP	
   REW	
   ACAD	
  GOV	
   VPA	
  XGEO	
  FLEX	
   XSP	
  
DLP	
  Cloud	
  Storage	
  14	
   	
  $27.50	
  (USD)	
  	
  
Managed	
  
User	
  
12	
  month	
   P P P P P P P P
DLP	
  Cloud	
  Prevent	
  for	
  Microsoh	
  
Office	
  365	
  Exchange	
  14	
  
	
  $10.99	
  (USD)	
  
Managed	
  
User	
  
12	
  month	
   P P P P P P P P
Agenda	
  
1	
   Symantec	
  Informa/on	
  Protec/on	
  
2	
   DLP	
  for	
  Cloud	
  
3	
   Addi/onal	
  Enhancements	
  in	
  DLP	
  14	
  
4	
   Resources	
  
Copyright	
  ©	
  2014	
  Symantec	
  Corpora/on	
  
23	
  
Cloud	
  File	
  Sync	
  and	
  Share	
  
Copyright	
  ©	
  2014	
  Symantec	
  Corpora/on	
  
24	
  
•  Endpoint	
  Prevent	
  now	
  monitors	
  and	
  
prevents	
  users	
  from	
  syncing	
  sensi/ve	
  
files	
  from	
  their	
  desktop	
  to	
  cloud	
  
storage	
  sites	
  
•  Applica/ons	
  monitored	
  by	
  default	
  
include:	
  
–  Box	
  
–  Dropbox	
  
–  Google	
  Drive	
  
–  Hightail	
  
–  iCloud	
  
–  Microsoh	
  OneDrive	
  
Benefits	
  Features	
  
•  Reduces	
  risk	
  of	
  sensi/ve	
  data	
  loss	
  
•  Prevents	
  sensi/ve	
  informa/on	
  from	
  
being	
  sync’d	
  to	
  cloud	
  storage	
  sites	
  
•  Improves	
  end-­‐user	
  awareness	
  and	
  
educa/on	
  of	
  security	
  policies	
  
Improved	
  Endpoint	
  Agent	
  for	
  Mac	
  OS	
  
Copyright	
  ©	
  2014	
  Symantec	
  Corpora/on	
  
25	
  
•  Endpoint	
  Prevent	
  now	
  monitors	
  and	
  
prevents	
  confiden/al	
  data	
  transfer	
  
between	
  Mac	
  endpoints	
  and	
  removable	
  
storage	
  devices	
  
–  Save	
  as	
  and	
  File	
  copy	
  opera/ons	
  
supported	
  
•  Endpoint	
  Prevent	
  now	
  monitors	
  and	
  
prevents	
  confiden/al	
  data	
  uploads	
  using	
  
browsers	
  on	
  Mac	
  endpoints	
  
–  Safari,	
  Chrome	
  and	
  Firefox	
  browsers	
  
supported	
  
•  VMware	
  Fusion	
  7	
  support	
  monitors	
  data	
  
in	
  use	
  on	
  a	
  virtual	
  Windows	
  machine	
  
and	
  prevents	
  unauthorized	
  file	
  transfer	
  
Benefits	
  Features	
  
•  Reduces	
  risk	
  of	
  sensi/ve	
  data	
  loss	
  Mac	
  
endpoints	
  
•  Prevents	
  data	
  loss	
  from	
  Mac	
  endpoints	
  
•  Enables	
  BYOD	
  
Improved	
  Endpoint	
  Agent	
  for	
  Windows	
  
Copyright	
  ©	
  2014	
  Symantec	
  Corpora/on	
  
26	
  
•  Chrome	
  support	
  monitors	
  and	
  
prevents	
  users	
  from	
  transmiqng	
  from	
  
Chrome	
  browsers	
  
•  Microso[	
  Hyper-­‐V	
  support	
  protects	
  
data	
  in	
  use	
  on	
  virtual	
  Windows	
  
machines	
  residing	
  on	
  a	
  Hyper-­‐V	
  Server	
  
•  Media	
  Transfer	
  Protocol	
  (MTP)	
  
support	
  monitors	
  and	
  prevents	
  data	
  
transfer	
  between	
  Windows	
  desktops	
  
and	
  mobile	
  devices	
  using	
  MTP.	
  
Benefits	
  Features	
  
•  Reduces	
  risk	
  of	
  sensi/ve	
  data	
  loss	
  
•  Prevents	
  data	
  loss	
  to	
  mobile	
  devices	
  	
  
•  Enables	
  BYOD	
  
Improved	
  Content	
  Detec3on	
  Technologies	
  
Copyright	
  ©	
  2014	
  Symantec	
  Corpora/on	
  
27	
  
•  Improved	
  keyword	
  matching	
  
technology	
  
•  Exact	
  Data	
  Matching	
  (EDM)	
  now	
  
supports	
  larger	
  indexes	
  (6	
  billion	
  cells)	
  
and	
  provides	
  an	
  enhanced	
  algorithm	
  
– Previously	
  supported	
  2	
  billion	
  cells	
  
(3x	
  increase)	
  
•  Enhanced	
  indexed	
  data	
  matching	
  
•  New	
  Remote	
  Indexed	
  Document	
  
Matching	
  Indexer	
  allows	
  data	
  owners	
  
to	
  directly	
  fingerprint	
  documents	
  
Benefits	
  Features	
  
•  Up	
  to	
  7x	
  faster	
  matching	
  and	
  
significantly	
  beter	
  performance	
  with	
  
added	
  keyword	
  rules	
  
•  Provides	
  faster	
  detec/on	
  and	
  improved	
  
accuracy	
  for	
  extremely	
  large	
  structured	
  
data	
  sources	
  (e.g.	
  databases)	
  
•  Up	
  to	
  50x	
  smaller	
  indices	
  with	
  faster	
  
matching	
  and	
  no	
  loss	
  of	
  accuracy	
  
•  Reduces	
  data	
  moved	
  across	
  network,	
  
improves	
  security	
  and	
  fans-­‐out	
  
fingerprin/ng	
  policy	
  
Key	
  Takeaways	
  
Copyright	
  ©	
  2014	
  Symantec	
  Corpora/on	
  
28	
  
1	
   DLP	
  14	
  extends	
  data	
  protec3on	
  for	
  cloud	
  storage	
  and	
  email	
  
DLP	
  Cloud	
  Storage	
  scans,	
  discovers	
  and	
  tags	
  sensi/ve	
  informa/on	
  
in	
  Box	
  	
  
DLP	
  Cloud	
  Prevent	
  for	
  Microso[	
  Office	
  365	
  monitors	
  and	
  
protects	
  confiden/al	
  email	
  sent	
  from	
  Exchange	
  Online	
  
Endpoint	
  Prevent	
  now	
  monitors	
  and	
  prevents	
  users	
  from	
  syncing	
  
sensi/ve	
  files	
  to	
  cloud	
  storage	
  sites	
  with	
  a	
  new	
  Cloud	
  File	
  Sync	
  
and	
  Share	
  feature	
  
2	
  
3	
  
4	
  
Agenda	
  
1	
   Symantec	
  Informa/on	
  Protec/on	
  
2	
   DLP	
  for	
  Cloud	
  
3	
   Addi/onal	
  Enhancements	
  in	
  DLP	
  14	
  
4	
   Resources	
  
Copyright	
  ©	
  2014	
  Symantec	
  Corpora/on	
  
29	
  
Sales	
  Tools	
  and	
  Resources	
  
•  DLP	
  14	
  sales	
  training	
  
•  What’s	
  New/Reasons	
  to	
  Upgrade	
  datasheet	
  
•  DLP	
  for	
  Cloud	
  datasheet	
  
•  Updated	
  DLP	
  datasheet	
  
•  Updated	
  DLP	
  first	
  mee/ng	
  deck	
  
•  Updated	
  SYMC	
  vs.	
  WebSense	
  batlecard	
  
•  Updated	
  SYMC	
  vs.	
  RSA	
  batlecard	
  
•  Updated	
  SYMC	
  vs.	
  McAfee	
  batlecard	
  
•  Updated	
  DLP	
  Xcel	
  course	
  
Copyright	
  ©	
  2014	
  Symantec	
  Corpora/on	
  
30	
  
&	
  Q	
   A	
  
Copyright	
  ©	
  2014	
  Symantec	
  Corpora/on	
   31	
  
Thank	
  you!	
  
SYMANTEC	
  PROPRIETARY/CONFIDENTIAL	
  –	
  INTERNAL	
  USE	
  ONLY	
  
Copyright	
  ©	
  2014	
  Symantec	
  Corpora/on.	
  All	
  rights	
  reserved.	
  
Cheryl	
  Tang,	
  Kedar	
  Apte	
  

More Related Content

What's hot

Symantec Data Loss Prevention 11
Symantec Data Loss Prevention 11Symantec Data Loss Prevention 11
Symantec Data Loss Prevention 11
Symantec
 
DLP
DLPDLP
Data loss prevention (dlp)
Data loss prevention (dlp)Data loss prevention (dlp)
Data loss prevention (dlp)
Hussein Al-Sanabani
 
Overview of Data Loss Prevention (DLP) Technology
Overview of Data Loss Prevention (DLP) TechnologyOverview of Data Loss Prevention (DLP) Technology
Overview of Data Loss Prevention (DLP) Technology
Liwei Ren任力偉
 
Data Loss Threats and Mitigations
Data Loss Threats and MitigationsData Loss Threats and Mitigations
Data Loss Threats and Mitigations
April Mardock CISSP
 
Data Security Explained
Data Security ExplainedData Security Explained
Data Security Explained
Happiest Minds Technologies
 
Shariyaz abdeen data leakage prevention presentation
Shariyaz abdeen   data leakage prevention presentationShariyaz abdeen   data leakage prevention presentation
Shariyaz abdeen data leakage prevention presentation
Shariyaz Abdeen
 
Data Leakage Prevention (DLP)
Data Leakage Prevention (DLP)Data Leakage Prevention (DLP)
Data Leakage Prevention (DLP)
Network Intelligence India
 
Symantec Data Loss Prevention 9
Symantec Data Loss Prevention 9Symantec Data Loss Prevention 9
Symantec Data Loss Prevention 9
Ariel Martin Beliera
 
Forcepoint Dynamic Data Protection
Forcepoint Dynamic Data ProtectionForcepoint Dynamic Data Protection
Forcepoint Dynamic Data Protection
MarketingArrowECS_CZ
 
Data Leakage Prevention
Data Leakage Prevention Data Leakage Prevention
Data Leakage Prevention
Dhananjay Aloorkar
 
Best Practices for Implementing Data Loss Prevention (DLP)
Best Practices for Implementing Data Loss Prevention (DLP)Best Practices for Implementing Data Loss Prevention (DLP)
Best Practices for Implementing Data Loss Prevention (DLP)
Sarfaraz Chougule
 
DLP Systems: Models, Architecture and Algorithms
DLP Systems: Models, Architecture and AlgorithmsDLP Systems: Models, Architecture and Algorithms
DLP Systems: Models, Architecture and Algorithms
Liwei Ren任力偉
 
Metrics, Risk Management & DLP
Metrics, Risk Management & DLPMetrics, Risk Management & DLP
Metrics, Risk Management & DLP
Robert Kloots
 
The Insider Threat
The Insider ThreatThe Insider Threat
The Insider Threat
PECB
 
Data classification-policy
Data classification-policyData classification-policy
Data classification-policy
Coi Xay
 
Privacy-ready Data Protection Program Implementation
Privacy-ready Data Protection Program ImplementationPrivacy-ready Data Protection Program Implementation
Privacy-ready Data Protection Program Implementation
Eryk Budi Pratama
 
Top 10 Best Practices for Implementing Data Classification
Top 10 Best Practices for Implementing Data ClassificationTop 10 Best Practices for Implementing Data Classification
Top 10 Best Practices for Implementing Data Classification
Watchful Software
 
Personal Data Protection in Indonesia
Personal Data Protection in IndonesiaPersonal Data Protection in Indonesia
Personal Data Protection in Indonesia
Eryk Budi Pratama
 
DATA LOSS PREVENTION OVERVIEW
DATA LOSS PREVENTION OVERVIEWDATA LOSS PREVENTION OVERVIEW
DATA LOSS PREVENTION OVERVIEW
Sylvain Martinez
 

What's hot (20)

Symantec Data Loss Prevention 11
Symantec Data Loss Prevention 11Symantec Data Loss Prevention 11
Symantec Data Loss Prevention 11
 
DLP
DLPDLP
DLP
 
Data loss prevention (dlp)
Data loss prevention (dlp)Data loss prevention (dlp)
Data loss prevention (dlp)
 
Overview of Data Loss Prevention (DLP) Technology
Overview of Data Loss Prevention (DLP) TechnologyOverview of Data Loss Prevention (DLP) Technology
Overview of Data Loss Prevention (DLP) Technology
 
Data Loss Threats and Mitigations
Data Loss Threats and MitigationsData Loss Threats and Mitigations
Data Loss Threats and Mitigations
 
Data Security Explained
Data Security ExplainedData Security Explained
Data Security Explained
 
Shariyaz abdeen data leakage prevention presentation
Shariyaz abdeen   data leakage prevention presentationShariyaz abdeen   data leakage prevention presentation
Shariyaz abdeen data leakage prevention presentation
 
Data Leakage Prevention (DLP)
Data Leakage Prevention (DLP)Data Leakage Prevention (DLP)
Data Leakage Prevention (DLP)
 
Symantec Data Loss Prevention 9
Symantec Data Loss Prevention 9Symantec Data Loss Prevention 9
Symantec Data Loss Prevention 9
 
Forcepoint Dynamic Data Protection
Forcepoint Dynamic Data ProtectionForcepoint Dynamic Data Protection
Forcepoint Dynamic Data Protection
 
Data Leakage Prevention
Data Leakage Prevention Data Leakage Prevention
Data Leakage Prevention
 
Best Practices for Implementing Data Loss Prevention (DLP)
Best Practices for Implementing Data Loss Prevention (DLP)Best Practices for Implementing Data Loss Prevention (DLP)
Best Practices for Implementing Data Loss Prevention (DLP)
 
DLP Systems: Models, Architecture and Algorithms
DLP Systems: Models, Architecture and AlgorithmsDLP Systems: Models, Architecture and Algorithms
DLP Systems: Models, Architecture and Algorithms
 
Metrics, Risk Management & DLP
Metrics, Risk Management & DLPMetrics, Risk Management & DLP
Metrics, Risk Management & DLP
 
The Insider Threat
The Insider ThreatThe Insider Threat
The Insider Threat
 
Data classification-policy
Data classification-policyData classification-policy
Data classification-policy
 
Privacy-ready Data Protection Program Implementation
Privacy-ready Data Protection Program ImplementationPrivacy-ready Data Protection Program Implementation
Privacy-ready Data Protection Program Implementation
 
Top 10 Best Practices for Implementing Data Classification
Top 10 Best Practices for Implementing Data ClassificationTop 10 Best Practices for Implementing Data Classification
Top 10 Best Practices for Implementing Data Classification
 
Personal Data Protection in Indonesia
Personal Data Protection in IndonesiaPersonal Data Protection in Indonesia
Personal Data Protection in Indonesia
 
DATA LOSS PREVENTION OVERVIEW
DATA LOSS PREVENTION OVERVIEWDATA LOSS PREVENTION OVERVIEW
DATA LOSS PREVENTION OVERVIEW
 

Similar to Introducing Data Loss Prevention 14

Celera Networks on Cloud Computing
Celera Networks on Cloud Computing Celera Networks on Cloud Computing
Celera Networks on Cloud Computing
CeleraNetworks
 
Bridging the Cloud Sign-On Gap
Bridging the Cloud Sign-On GapBridging the Cloud Sign-On Gap
Bridging the Cloud Sign-On GapOracleIDM
 
Taking Control of SharePoint in the Cloud
Taking Control of SharePoint in the CloudTaking Control of SharePoint in the Cloud
Taking Control of SharePoint in the Cloud
SherWeb
 
Secure Your Cloud Migration - Secureworld 2019 Charlotte
Secure Your Cloud Migration - Secureworld 2019 CharlotteSecure Your Cloud Migration - Secureworld 2019 Charlotte
Secure Your Cloud Migration - Secureworld 2019 Charlotte
Mike Brannon
 
Govern and Protect Your End User Information
Govern and Protect Your End User InformationGovern and Protect Your End User Information
Govern and Protect Your End User Information
Denodo
 
Cloud computing web 2.0 By Joanna Hendricks BMT 580
Cloud computing web 2.0  By Joanna Hendricks BMT 580Cloud computing web 2.0  By Joanna Hendricks BMT 580
Cloud computing web 2.0 By Joanna Hendricks BMT 580Joanna Hendricks
 
How secured and safe is Cloud?
How secured and safe is Cloud?How secured and safe is Cloud?
How secured and safe is Cloud?
IRJET Journal
 
Approaches for WebLogic Server in the Cloud (OpenWorld, September 2014)
Approaches for WebLogic Server in the Cloud (OpenWorld, September 2014)Approaches for WebLogic Server in the Cloud (OpenWorld, September 2014)
Approaches for WebLogic Server in the Cloud (OpenWorld, September 2014)
jeckels
 
Security Issues for Cloud Applications
Security Issues for Cloud ApplicationsSecurity Issues for Cloud Applications
Security Issues for Cloud ApplicationsGuillermo Remache
 
Shedding Light on Shadow IT for File Sharing
Shedding Light on Shadow IT for File SharingShedding Light on Shadow IT for File Sharing
Shedding Light on Shadow IT for File SharingCipherCloud
 
SECURING THE CLOUD DATA LAKES
SECURING THE CLOUD DATA LAKESSECURING THE CLOUD DATA LAKES
SECURING THE CLOUD DATA LAKES
Happiest Minds Technologies
 
Geting cloud architecture right the first time linthicum interop fall 2013
Geting cloud architecture right the first time linthicum interop fall 2013Geting cloud architecture right the first time linthicum interop fall 2013
Geting cloud architecture right the first time linthicum interop fall 2013David Linthicum
 
Auditing in the Cloud
Auditing in the CloudAuditing in the Cloud
Auditing in the Cloud
tcarrucan
 
What You Need to Know About SaaS Application Data Protection
What You Need to Know About SaaS Application Data ProtectionWhat You Need to Know About SaaS Application Data Protection
What You Need to Know About SaaS Application Data Protection
Spanning Cloud Apps
 
Welcome to Cloud Computing
Welcome to Cloud ComputingWelcome to Cloud Computing
Welcome to Cloud Computing
imogokate
 
Chapter 3 cloud computing and intro parrallel computing
Chapter 3 cloud computing and intro parrallel computingChapter 3 cloud computing and intro parrallel computing
Chapter 3 cloud computing and intro parrallel computing
Praveen M Jigajinni
 
M365 Virtual Marthon: Protecting your Teamwork across Microsoft 365
M365 Virtual Marthon: Protecting your Teamwork across Microsoft 365M365 Virtual Marthon: Protecting your Teamwork across Microsoft 365
M365 Virtual Marthon: Protecting your Teamwork across Microsoft 365
Joanne Klein
 
The 5 Biggest Data Myths in Telco: Exposed
The 5 Biggest Data Myths in Telco: ExposedThe 5 Biggest Data Myths in Telco: Exposed
The 5 Biggest Data Myths in Telco: Exposed
Cloudera, Inc.
 
Xylos Clients Day - Public cloud and security go hand in hand, if you approac...
Xylos Clients Day - Public cloud and security go hand in hand, if you approac...Xylos Clients Day - Public cloud and security go hand in hand, if you approac...
Xylos Clients Day - Public cloud and security go hand in hand, if you approac...
Karim Vaes
 
Cloud computing seminar report
Cloud computing seminar reportCloud computing seminar report
Cloud computing seminar report
shafzonly
 

Similar to Introducing Data Loss Prevention 14 (20)

Celera Networks on Cloud Computing
Celera Networks on Cloud Computing Celera Networks on Cloud Computing
Celera Networks on Cloud Computing
 
Bridging the Cloud Sign-On Gap
Bridging the Cloud Sign-On GapBridging the Cloud Sign-On Gap
Bridging the Cloud Sign-On Gap
 
Taking Control of SharePoint in the Cloud
Taking Control of SharePoint in the CloudTaking Control of SharePoint in the Cloud
Taking Control of SharePoint in the Cloud
 
Secure Your Cloud Migration - Secureworld 2019 Charlotte
Secure Your Cloud Migration - Secureworld 2019 CharlotteSecure Your Cloud Migration - Secureworld 2019 Charlotte
Secure Your Cloud Migration - Secureworld 2019 Charlotte
 
Govern and Protect Your End User Information
Govern and Protect Your End User InformationGovern and Protect Your End User Information
Govern and Protect Your End User Information
 
Cloud computing web 2.0 By Joanna Hendricks BMT 580
Cloud computing web 2.0  By Joanna Hendricks BMT 580Cloud computing web 2.0  By Joanna Hendricks BMT 580
Cloud computing web 2.0 By Joanna Hendricks BMT 580
 
How secured and safe is Cloud?
How secured and safe is Cloud?How secured and safe is Cloud?
How secured and safe is Cloud?
 
Approaches for WebLogic Server in the Cloud (OpenWorld, September 2014)
Approaches for WebLogic Server in the Cloud (OpenWorld, September 2014)Approaches for WebLogic Server in the Cloud (OpenWorld, September 2014)
Approaches for WebLogic Server in the Cloud (OpenWorld, September 2014)
 
Security Issues for Cloud Applications
Security Issues for Cloud ApplicationsSecurity Issues for Cloud Applications
Security Issues for Cloud Applications
 
Shedding Light on Shadow IT for File Sharing
Shedding Light on Shadow IT for File SharingShedding Light on Shadow IT for File Sharing
Shedding Light on Shadow IT for File Sharing
 
SECURING THE CLOUD DATA LAKES
SECURING THE CLOUD DATA LAKESSECURING THE CLOUD DATA LAKES
SECURING THE CLOUD DATA LAKES
 
Geting cloud architecture right the first time linthicum interop fall 2013
Geting cloud architecture right the first time linthicum interop fall 2013Geting cloud architecture right the first time linthicum interop fall 2013
Geting cloud architecture right the first time linthicum interop fall 2013
 
Auditing in the Cloud
Auditing in the CloudAuditing in the Cloud
Auditing in the Cloud
 
What You Need to Know About SaaS Application Data Protection
What You Need to Know About SaaS Application Data ProtectionWhat You Need to Know About SaaS Application Data Protection
What You Need to Know About SaaS Application Data Protection
 
Welcome to Cloud Computing
Welcome to Cloud ComputingWelcome to Cloud Computing
Welcome to Cloud Computing
 
Chapter 3 cloud computing and intro parrallel computing
Chapter 3 cloud computing and intro parrallel computingChapter 3 cloud computing and intro parrallel computing
Chapter 3 cloud computing and intro parrallel computing
 
M365 Virtual Marthon: Protecting your Teamwork across Microsoft 365
M365 Virtual Marthon: Protecting your Teamwork across Microsoft 365M365 Virtual Marthon: Protecting your Teamwork across Microsoft 365
M365 Virtual Marthon: Protecting your Teamwork across Microsoft 365
 
The 5 Biggest Data Myths in Telco: Exposed
The 5 Biggest Data Myths in Telco: ExposedThe 5 Biggest Data Myths in Telco: Exposed
The 5 Biggest Data Myths in Telco: Exposed
 
Xylos Clients Day - Public cloud and security go hand in hand, if you approac...
Xylos Clients Day - Public cloud and security go hand in hand, if you approac...Xylos Clients Day - Public cloud and security go hand in hand, if you approac...
Xylos Clients Day - Public cloud and security go hand in hand, if you approac...
 
Cloud computing seminar report
Cloud computing seminar reportCloud computing seminar report
Cloud computing seminar report
 

More from Symantec

Symantec Enterprise Security Products are now part of Broadcom
Symantec Enterprise Security Products are now part of BroadcomSymantec Enterprise Security Products are now part of Broadcom
Symantec Enterprise Security Products are now part of Broadcom
Symantec
 
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
Symantec
 
Symantec Webinar | National Cyber Security Awareness Month: Protect IT
Symantec Webinar | National Cyber Security Awareness Month: Protect ITSymantec Webinar | National Cyber Security Awareness Month: Protect IT
Symantec Webinar | National Cyber Security Awareness Month: Protect IT
Symantec
 
Symantec Webinar | National Cyber Security Awareness Month: Secure IT
Symantec Webinar | National Cyber Security Awareness Month: Secure ITSymantec Webinar | National Cyber Security Awareness Month: Secure IT
Symantec Webinar | National Cyber Security Awareness Month: Secure IT
Symantec
 
Symantec Webinar | National Cyber Security Awareness Month - Own IT
Symantec Webinar | National Cyber Security Awareness Month - Own ITSymantec Webinar | National Cyber Security Awareness Month - Own IT
Symantec Webinar | National Cyber Security Awareness Month - Own IT
Symantec
 
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
Symantec
 
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CKSymantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Symantec
 
Symantec Mobile Security Webinar
Symantec Mobile Security WebinarSymantec Mobile Security Webinar
Symantec Mobile Security Webinar
Symantec
 
Symantec Webinar Cloud Security Threat Report
Symantec Webinar Cloud Security Threat ReportSymantec Webinar Cloud Security Threat Report
Symantec Webinar Cloud Security Threat Report
Symantec
 
Symantec Cloud Security Threat Report
Symantec Cloud Security Threat ReportSymantec Cloud Security Threat Report
Symantec Cloud Security Threat Report
Symantec
 
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec
 
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec
 
Symantec Webinar | Tips for Successful CASB Projects
Symantec Webinar |  Tips for Successful CASB ProjectsSymantec Webinar |  Tips for Successful CASB Projects
Symantec Webinar | Tips for Successful CASB Projects
Symantec
 
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec
 
Symantec Webinar: GDPR 1 Year On
Symantec Webinar: GDPR 1 Year OnSymantec Webinar: GDPR 1 Year On
Symantec Webinar: GDPR 1 Year On
Symantec
 
Symantec ISTR 24 Webcast 2019
Symantec ISTR 24 Webcast 2019Symantec ISTR 24 Webcast 2019
Symantec ISTR 24 Webcast 2019
Symantec
 
Symantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front LinesSymantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec
 
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec
 
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec
 
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy BearSymantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
Symantec
 

More from Symantec (20)

Symantec Enterprise Security Products are now part of Broadcom
Symantec Enterprise Security Products are now part of BroadcomSymantec Enterprise Security Products are now part of Broadcom
Symantec Enterprise Security Products are now part of Broadcom
 
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
 
Symantec Webinar | National Cyber Security Awareness Month: Protect IT
Symantec Webinar | National Cyber Security Awareness Month: Protect ITSymantec Webinar | National Cyber Security Awareness Month: Protect IT
Symantec Webinar | National Cyber Security Awareness Month: Protect IT
 
Symantec Webinar | National Cyber Security Awareness Month: Secure IT
Symantec Webinar | National Cyber Security Awareness Month: Secure ITSymantec Webinar | National Cyber Security Awareness Month: Secure IT
Symantec Webinar | National Cyber Security Awareness Month: Secure IT
 
Symantec Webinar | National Cyber Security Awareness Month - Own IT
Symantec Webinar | National Cyber Security Awareness Month - Own ITSymantec Webinar | National Cyber Security Awareness Month - Own IT
Symantec Webinar | National Cyber Security Awareness Month - Own IT
 
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
 
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CKSymantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
 
Symantec Mobile Security Webinar
Symantec Mobile Security WebinarSymantec Mobile Security Webinar
Symantec Mobile Security Webinar
 
Symantec Webinar Cloud Security Threat Report
Symantec Webinar Cloud Security Threat ReportSymantec Webinar Cloud Security Threat Report
Symantec Webinar Cloud Security Threat Report
 
Symantec Cloud Security Threat Report
Symantec Cloud Security Threat ReportSymantec Cloud Security Threat Report
Symantec Cloud Security Threat Report
 
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
 
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
 
Symantec Webinar | Tips for Successful CASB Projects
Symantec Webinar |  Tips for Successful CASB ProjectsSymantec Webinar |  Tips for Successful CASB Projects
Symantec Webinar | Tips for Successful CASB Projects
 
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
 
Symantec Webinar: GDPR 1 Year On
Symantec Webinar: GDPR 1 Year OnSymantec Webinar: GDPR 1 Year On
Symantec Webinar: GDPR 1 Year On
 
Symantec ISTR 24 Webcast 2019
Symantec ISTR 24 Webcast 2019Symantec ISTR 24 Webcast 2019
Symantec ISTR 24 Webcast 2019
 
Symantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front LinesSymantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front Lines
 
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
 
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
 
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy BearSymantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
 

Recently uploaded

Understanding Globus Data Transfers with NetSage
Understanding Globus Data Transfers with NetSageUnderstanding Globus Data Transfers with NetSage
Understanding Globus Data Transfers with NetSage
Globus
 
Dominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdf
Dominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdfDominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdf
Dominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdf
AMB-Review
 
Enterprise Resource Planning System in Telangana
Enterprise Resource Planning System in TelanganaEnterprise Resource Planning System in Telangana
Enterprise Resource Planning System in Telangana
NYGGS Automation Suite
 
A Comprehensive Look at Generative AI in Retail App Testing.pdf
A Comprehensive Look at Generative AI in Retail App Testing.pdfA Comprehensive Look at Generative AI in Retail App Testing.pdf
A Comprehensive Look at Generative AI in Retail App Testing.pdf
kalichargn70th171
 
Globus Compute Introduction - GlobusWorld 2024
Globus Compute Introduction - GlobusWorld 2024Globus Compute Introduction - GlobusWorld 2024
Globus Compute Introduction - GlobusWorld 2024
Globus
 
2024 RoOUG Security model for the cloud.pptx
2024 RoOUG Security model for the cloud.pptx2024 RoOUG Security model for the cloud.pptx
2024 RoOUG Security model for the cloud.pptx
Georgi Kodinov
 
Cyaniclab : Software Development Agency Portfolio.pdf
Cyaniclab : Software Development Agency Portfolio.pdfCyaniclab : Software Development Agency Portfolio.pdf
Cyaniclab : Software Development Agency Portfolio.pdf
Cyanic lab
 
SOCRadar Research Team: Latest Activities of IntelBroker
SOCRadar Research Team: Latest Activities of IntelBrokerSOCRadar Research Team: Latest Activities of IntelBroker
SOCRadar Research Team: Latest Activities of IntelBroker
SOCRadar
 
Custom Healthcare Software for Managing Chronic Conditions and Remote Patient...
Custom Healthcare Software for Managing Chronic Conditions and Remote Patient...Custom Healthcare Software for Managing Chronic Conditions and Remote Patient...
Custom Healthcare Software for Managing Chronic Conditions and Remote Patient...
Mind IT Systems
 
Navigating the Metaverse: A Journey into Virtual Evolution"
Navigating the Metaverse: A Journey into Virtual Evolution"Navigating the Metaverse: A Journey into Virtual Evolution"
Navigating the Metaverse: A Journey into Virtual Evolution"
Donna Lenk
 
Enhancing Research Orchestration Capabilities at ORNL.pdf
Enhancing Research Orchestration Capabilities at ORNL.pdfEnhancing Research Orchestration Capabilities at ORNL.pdf
Enhancing Research Orchestration Capabilities at ORNL.pdf
Globus
 
Corporate Management | Session 3 of 3 | Tendenci AMS
Corporate Management | Session 3 of 3 | Tendenci AMSCorporate Management | Session 3 of 3 | Tendenci AMS
Corporate Management | Session 3 of 3 | Tendenci AMS
Tendenci - The Open Source AMS (Association Management Software)
 
TROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERROR
TROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERRORTROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERROR
TROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERROR
Tier1 app
 
BoxLang: Review our Visionary Licenses of 2024
BoxLang: Review our Visionary Licenses of 2024BoxLang: Review our Visionary Licenses of 2024
BoxLang: Review our Visionary Licenses of 2024
Ortus Solutions, Corp
 
Large Language Models and the End of Programming
Large Language Models and the End of ProgrammingLarge Language Models and the End of Programming
Large Language Models and the End of Programming
Matt Welsh
 
top nidhi software solution freedownload
top nidhi software solution freedownloadtop nidhi software solution freedownload
top nidhi software solution freedownload
vrstrong314
 
Vitthal Shirke Microservices Resume Montevideo
Vitthal Shirke Microservices Resume MontevideoVitthal Shirke Microservices Resume Montevideo
Vitthal Shirke Microservices Resume Montevideo
Vitthal Shirke
 
Accelerate Enterprise Software Engineering with Platformless
Accelerate Enterprise Software Engineering with PlatformlessAccelerate Enterprise Software Engineering with Platformless
Accelerate Enterprise Software Engineering with Platformless
WSO2
 
Cracking the code review at SpringIO 2024
Cracking the code review at SpringIO 2024Cracking the code review at SpringIO 2024
Cracking the code review at SpringIO 2024
Paco van Beckhoven
 
Using IESVE for Room Loads Analysis - Australia & New Zealand
Using IESVE for Room Loads Analysis - Australia & New ZealandUsing IESVE for Room Loads Analysis - Australia & New Zealand
Using IESVE for Room Loads Analysis - Australia & New Zealand
IES VE
 

Recently uploaded (20)

Understanding Globus Data Transfers with NetSage
Understanding Globus Data Transfers with NetSageUnderstanding Globus Data Transfers with NetSage
Understanding Globus Data Transfers with NetSage
 
Dominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdf
Dominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdfDominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdf
Dominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdf
 
Enterprise Resource Planning System in Telangana
Enterprise Resource Planning System in TelanganaEnterprise Resource Planning System in Telangana
Enterprise Resource Planning System in Telangana
 
A Comprehensive Look at Generative AI in Retail App Testing.pdf
A Comprehensive Look at Generative AI in Retail App Testing.pdfA Comprehensive Look at Generative AI in Retail App Testing.pdf
A Comprehensive Look at Generative AI in Retail App Testing.pdf
 
Globus Compute Introduction - GlobusWorld 2024
Globus Compute Introduction - GlobusWorld 2024Globus Compute Introduction - GlobusWorld 2024
Globus Compute Introduction - GlobusWorld 2024
 
2024 RoOUG Security model for the cloud.pptx
2024 RoOUG Security model for the cloud.pptx2024 RoOUG Security model for the cloud.pptx
2024 RoOUG Security model for the cloud.pptx
 
Cyaniclab : Software Development Agency Portfolio.pdf
Cyaniclab : Software Development Agency Portfolio.pdfCyaniclab : Software Development Agency Portfolio.pdf
Cyaniclab : Software Development Agency Portfolio.pdf
 
SOCRadar Research Team: Latest Activities of IntelBroker
SOCRadar Research Team: Latest Activities of IntelBrokerSOCRadar Research Team: Latest Activities of IntelBroker
SOCRadar Research Team: Latest Activities of IntelBroker
 
Custom Healthcare Software for Managing Chronic Conditions and Remote Patient...
Custom Healthcare Software for Managing Chronic Conditions and Remote Patient...Custom Healthcare Software for Managing Chronic Conditions and Remote Patient...
Custom Healthcare Software for Managing Chronic Conditions and Remote Patient...
 
Navigating the Metaverse: A Journey into Virtual Evolution"
Navigating the Metaverse: A Journey into Virtual Evolution"Navigating the Metaverse: A Journey into Virtual Evolution"
Navigating the Metaverse: A Journey into Virtual Evolution"
 
Enhancing Research Orchestration Capabilities at ORNL.pdf
Enhancing Research Orchestration Capabilities at ORNL.pdfEnhancing Research Orchestration Capabilities at ORNL.pdf
Enhancing Research Orchestration Capabilities at ORNL.pdf
 
Corporate Management | Session 3 of 3 | Tendenci AMS
Corporate Management | Session 3 of 3 | Tendenci AMSCorporate Management | Session 3 of 3 | Tendenci AMS
Corporate Management | Session 3 of 3 | Tendenci AMS
 
TROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERROR
TROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERRORTROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERROR
TROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERROR
 
BoxLang: Review our Visionary Licenses of 2024
BoxLang: Review our Visionary Licenses of 2024BoxLang: Review our Visionary Licenses of 2024
BoxLang: Review our Visionary Licenses of 2024
 
Large Language Models and the End of Programming
Large Language Models and the End of ProgrammingLarge Language Models and the End of Programming
Large Language Models and the End of Programming
 
top nidhi software solution freedownload
top nidhi software solution freedownloadtop nidhi software solution freedownload
top nidhi software solution freedownload
 
Vitthal Shirke Microservices Resume Montevideo
Vitthal Shirke Microservices Resume MontevideoVitthal Shirke Microservices Resume Montevideo
Vitthal Shirke Microservices Resume Montevideo
 
Accelerate Enterprise Software Engineering with Platformless
Accelerate Enterprise Software Engineering with PlatformlessAccelerate Enterprise Software Engineering with Platformless
Accelerate Enterprise Software Engineering with Platformless
 
Cracking the code review at SpringIO 2024
Cracking the code review at SpringIO 2024Cracking the code review at SpringIO 2024
Cracking the code review at SpringIO 2024
 
Using IESVE for Room Loads Analysis - Australia & New Zealand
Using IESVE for Room Loads Analysis - Australia & New ZealandUsing IESVE for Room Loads Analysis - Australia & New Zealand
Using IESVE for Room Loads Analysis - Australia & New Zealand
 

Introducing Data Loss Prevention 14

  • 1. Introducing  Data  Loss  Preven3on  14   Cheryl  Tang            Kedar  Apte   Sr.  Product  Marke/ng  Manager          Sr.  Product  Manager  
  • 2. Objec3ves   •  This  presenta/on  is  intended  to  provide  you  with  an   understanding  of:   –  Customer  challenges  related  to  data  in  the  cloud   –  Key  benefits  and  features  of  “DLP  for  Cloud”  offerings  and  DLP  14   –  Where  and  how  to  iden/fy  “DLP  for  Cloud”  opportuni/es   –  How  “DLP  for  Cloud”  offerings  are  licensed   •  What  we  won’t  cover  in  this  session   –  Compe//on   –  Objec/on  Handling  
  • 3. Agenda   1   Market  Overview  and  Customer   Challenges   2   DLP  for  Cloud   3   Addi/onal  Enhancements  in  DLP  14   4   Resources   Copyright  ©  2014  Symantec  Corpora/on   3  
  • 4. Symantec  Enterprise  Security  |  PRODUCT  STRATEGY   Copyright  ©  2015  Symantec  Corpora/on   4  
  • 5. Informa3on  is  Everywhere   Brings  Produc3vity,  Agility,  Convenience  ……and  Problems       Copyright  ©  2015  Symantec  Corpora/on   5   Cloud   Mobile   BYOD   Your  security  slows  me   down   I  expect  an  insanely  great   user  experience   You  don’t  own  the  device   I  will  use  the  device  I  want   You  can’t  lock  my  device   down   You  don’t  own  the  app     You  can’t  say  no   You  don’t  own  the   infrastructure  
  • 6. ..and  the  Cloud  is  a  Risky  Place  for  Work  Data   Copyright  ©  2015  Symantec  Corpora/on   6  
  • 7. Informa3on  Protec3on  for  the  Cloud   Copyright  ©  2015  Symantec  Corpora/on   7  
  • 8. Customer  Challenges   •  No  visibility  to  what  data  is  in  the  cloud   –  “I  know  my  users  are  crea0ng  and  storing  data  in  the  cloud,   but  I  have  no  idea  if  that  data  is  sensi0ve  and  who  is   accessing  the  sensi0ve  data.”   –  “My  users  are  syncing  sensi0ve  files  to  cloud  storage  sites.”   •  No  controls  over  what  data  can  be  stored/shared  in   the  cloud   –  “How  do  I  control  sensi0ve  data  from  leaking  to  the  cloud?”   –  “We  want  to  alert/educate  users  that  they’re  puEng   sensi0ve  files  in  the  cloud  puts  the  company  at  risk.”     •  Security  and  compliance  concerns  holding  back  cloud   adop/on   –  “We  want  to  move  to  the  cloud,  but  we’re  worried  about   losing  visibility  and  control  over  sensi0ve  corporate  data.”     –  “Moving  our  data  to  cloud  compromises  our  compliance   requirements  and  puts  us  at  risk  for  security  breaches.”   Copyright  ©  2014  Symantec  Corpora/on   8  
  • 9. What’s  New  in  Data  Loss  Preven3on  14   Copyright  ©  2015  Symantec  Corpora/on   9   Unified   Management  Extending  Data  Protec3on  for  the  Cloud   Box   Office  365   iOS   Android   Email   Web   FTP   IM   USB   Hard  Drives   Removable  Storage   Network  Shares   Print/Fax   Cloud  &  Web  Apps   File  Servers   Exchange,  Lotus   SharePoint   Databases   Web  Servers  
  • 10. Dozens  of  New  Features  in  DLP  14!   Copyright  ©  2015  Symantec  Corpora/on   10   14   VMware  Fusion  &  Hyper-­‐V  support   Exchange  2013   Connector   Removeable  storage  for  Mac   Browser-­‐based  uploads  for  Mac   Cloud  Storage  for  Box   Media  Transfer  Protocol   (MTP)  support   Disable  print  screen   Auditor  role  for  DLP  policy   management     Clipboard  paste   monitoring   PDF  custom  metadata  tags   Enhanced  Indexed  Document   Matching  (IDM)  algorithms   Enhanced  SharePoint   Connector   Cloud  Prevent  for  Microsoh  Office  365   Improved  keyword   matching  performance   Modernized  Enforce  console   Mul/-­‐language  support  for   Endpoint  pop-­‐ups   Remote  Index  Data   Matching  (IDM)  Indexer   Amazon  Web  Services   support   Improved  Exact  Data   Matching  technology   40+  new  interna/onal  data  iden/fiers   Cloud  file  sync  and  share   (Endpoint  Prevent)  
  • 11. Agenda   1   Market  Overview  &  Customer   Challenges   2   DLP  for  Cloud   3   Addi/onal  Enhancements   4   Resources   Copyright  ©  2014  Symantec  Corpora/on   11  
  • 12. DLP  for  Cloud   What  it  is   •  Two  new  DLP  products   –  Symantec  DLP  Cloud  Storage  (DLP   14.0)   –  Symantec  DLP  Cloud  Prevent  for   Microsoh  Office  365  (DLP  12.5)   •  Provide  discovery,  monitoring  and   remedia/on  capabili/es  for  cloud-­‐ based  storage  and  email   •  An  opportunity  for  you  to  make   money  –  addi/onal  licensing   required   Benefits   •  Enables  customers  to  take   advantage  of  the  cloud  with  control   and  visibility   •  Protects  data  regardless  of  it’s  on-­‐ premise  or  in  the  cloud   •  Easily  and  quickly  extends  current   data  loss  policies  and  workflows  to   cloud  apps   Copyright  ©  2014  Symantec  Corpora/on   12  
  • 13. DLP  Cloud  Storage   Features   •  Scan  Box  Business  and  Enterprise   Accounts  to  discover  and  tag   sensi/ve  informa/on  in  Box   •  Enable  user  self-­‐remedia/on  from   Box  (visual  tags)  and  the  DLP  Self-­‐ Service  Portal   •  Seamlessly  integrates  with  Box  and   your  current  DLP  system   Benefits   •  Provides  visibility  into  the  sensi/ve   files  that  users  are  storing  and   sharing  on  Box   •  Quickly  and  easily  extends  current   data  loss  policies  and  workflows  to   Box   Copyright  ©  2014  Symantec  Corpora/on   13   New  in   DLP  14!  
  • 14. DLP  Cloud  Storage:  Incident  List   DLP  14.0    Differences  Training:  Storage   14  
  • 15. DLP  Cloud  Storage:  Incident  Details   DLP  14.0    Differences  Training:  Storage   15   File  Loca3on  indicates  the   Username  and  the  file  loca3on  in   the  users  Box  account  
  • 16. DLP  Cloud  Storage:  Incident  Details   DLP  14.0    Differences  Training:  Storage   16   Collaborators  and  their  roles  are   listed  in  the  incident  
  • 17. DLP  Cloud  Storage:  Incident  Details   DLP  14.0    Differences  Training:  Storage   17   Shared  link  informa3on  lists   permissions  assigned  to  the  link  
  • 18. DLP  Cloud  Storage:  Visual  Tags  in  Box   Copyright  ©  2014  Symantec  Corpora/on   18   Sensi3ve  files  are  automa3cally   tagged  in  Box  
  • 19. DLP  Cloud  Prevent  for  Microso[  Office  365   •  Monitors  and  protects  confiden/al   email  sent  from  your  Microsoh-­‐hosted   instance  of  Exchange  Online   •  Seamlessly  integrates  with  Exchange   Online  and  your  current  Symantec  DLP   system   •  Ensures  email  delivery  via  Symantec   Email  Security.cloud   Benefits  Features   •  Lowers  total  cost  of  ownership  by   reducing  on-­‐premises  servers  and   overhead   •  Delivers  faster  /me  to  value  than  on-­‐ premises  solu/ons  by  leveraging  IaaS   •  Quickly  and  easily  extends  current  data   loss  policies  and  workflows  to  Exchange   Online  
  • 20. Iden3fying  DLP  for  Cloud  Opportuni3es   DLP  Installed  Base   •  Upsell  Cloud  Storage  and/or  Cloud  Prevent  to  address  cloud   security  and  compliance  concerns   –  Gain  visibility  into  your  sensi/ve  data  in  the  cloud   –  Implement  controls  for  sensi/ve  data  stored  and  accessed  by  cloud  apps   –  Accelerate  cloud  storage  and  cloud  email  adop/on  with  monitoring  and   protec/on  capabili/es   •  Key  Buyers   –  CIO   –  CISO   –  VP  or  Director  of  Info  Sec   Copyright  ©  2014  Symantec  Corpora/on   20  
  • 21. “How  do  you  determine  if   sensi1ve  data  is  in  the   cloud?”   Discovery  Ques3ons   Copyright  ©  2014  Symantec  Corpora/on   21   What  to  Ask   What  to  Listen/Probe  For   “How  do  you  monitor  and   protect  cloud  apps  and  data   that  LOB  has  implemented   outside  of  IT?”   -­‐  Shadow  IT  concerns   -­‐  Concerns  about  risky  employee  behavior   (“stop  stupid”)   -­‐  Lack  of  visibility  into  what  sensi/ve  data  is   stored  and  shared  in  cloud  apps   -­‐  No  visibility  into  what  sensi/ve  data  is  stored   and  shared  in  the  cloud   -­‐  Challenges  geqng  cloud  data  under  control   -­‐  Difficulty  changing  risky  employee  behavior   (“stop  stupid”)     -­‐  Security  and  compliance  as  a  barrier  for  cloud   adop/on   -­‐  Increased  use/adop/on  of  cloud  apps  by  LOB   -­‐  Poten/al  penal/es/fines  related  to  breached   data  or  lack  of  compliance   “How  concerned  are  you   about  data  loss  from  cloud   storage  and  email?”  
  • 22. Pricing   •  Upside  for  YOU   –  Cloud  Storage  and  Cloud  Prevent  require  addi/onal  licenses   Copyright  ©  2014  Symantec  Corpora/on   22   Product  SKU   MSRP   Meter   License  Type   SYMC  Buying  Program   Perpetual   Subscrip3on   EXP   REW   ACAD  GOV   VPA  XGEO  FLEX   XSP   DLP  Cloud  Storage  14    $27.50  (USD)     Managed   User   12  month   P P P P P P P P DLP  Cloud  Prevent  for  Microsoh   Office  365  Exchange  14    $10.99  (USD)   Managed   User   12  month   P P P P P P P P
  • 23. Agenda   1   Symantec  Informa/on  Protec/on   2   DLP  for  Cloud   3   Addi/onal  Enhancements  in  DLP  14   4   Resources   Copyright  ©  2014  Symantec  Corpora/on   23  
  • 24. Cloud  File  Sync  and  Share   Copyright  ©  2014  Symantec  Corpora/on   24   •  Endpoint  Prevent  now  monitors  and   prevents  users  from  syncing  sensi/ve   files  from  their  desktop  to  cloud   storage  sites   •  Applica/ons  monitored  by  default   include:   –  Box   –  Dropbox   –  Google  Drive   –  Hightail   –  iCloud   –  Microsoh  OneDrive   Benefits  Features   •  Reduces  risk  of  sensi/ve  data  loss   •  Prevents  sensi/ve  informa/on  from   being  sync’d  to  cloud  storage  sites   •  Improves  end-­‐user  awareness  and   educa/on  of  security  policies  
  • 25. Improved  Endpoint  Agent  for  Mac  OS   Copyright  ©  2014  Symantec  Corpora/on   25   •  Endpoint  Prevent  now  monitors  and   prevents  confiden/al  data  transfer   between  Mac  endpoints  and  removable   storage  devices   –  Save  as  and  File  copy  opera/ons   supported   •  Endpoint  Prevent  now  monitors  and   prevents  confiden/al  data  uploads  using   browsers  on  Mac  endpoints   –  Safari,  Chrome  and  Firefox  browsers   supported   •  VMware  Fusion  7  support  monitors  data   in  use  on  a  virtual  Windows  machine   and  prevents  unauthorized  file  transfer   Benefits  Features   •  Reduces  risk  of  sensi/ve  data  loss  Mac   endpoints   •  Prevents  data  loss  from  Mac  endpoints   •  Enables  BYOD  
  • 26. Improved  Endpoint  Agent  for  Windows   Copyright  ©  2014  Symantec  Corpora/on   26   •  Chrome  support  monitors  and   prevents  users  from  transmiqng  from   Chrome  browsers   •  Microso[  Hyper-­‐V  support  protects   data  in  use  on  virtual  Windows   machines  residing  on  a  Hyper-­‐V  Server   •  Media  Transfer  Protocol  (MTP)   support  monitors  and  prevents  data   transfer  between  Windows  desktops   and  mobile  devices  using  MTP.   Benefits  Features   •  Reduces  risk  of  sensi/ve  data  loss   •  Prevents  data  loss  to  mobile  devices     •  Enables  BYOD  
  • 27. Improved  Content  Detec3on  Technologies   Copyright  ©  2014  Symantec  Corpora/on   27   •  Improved  keyword  matching   technology   •  Exact  Data  Matching  (EDM)  now   supports  larger  indexes  (6  billion  cells)   and  provides  an  enhanced  algorithm   – Previously  supported  2  billion  cells   (3x  increase)   •  Enhanced  indexed  data  matching   •  New  Remote  Indexed  Document   Matching  Indexer  allows  data  owners   to  directly  fingerprint  documents   Benefits  Features   •  Up  to  7x  faster  matching  and   significantly  beter  performance  with   added  keyword  rules   •  Provides  faster  detec/on  and  improved   accuracy  for  extremely  large  structured   data  sources  (e.g.  databases)   •  Up  to  50x  smaller  indices  with  faster   matching  and  no  loss  of  accuracy   •  Reduces  data  moved  across  network,   improves  security  and  fans-­‐out   fingerprin/ng  policy  
  • 28. Key  Takeaways   Copyright  ©  2014  Symantec  Corpora/on   28   1   DLP  14  extends  data  protec3on  for  cloud  storage  and  email   DLP  Cloud  Storage  scans,  discovers  and  tags  sensi/ve  informa/on   in  Box     DLP  Cloud  Prevent  for  Microso[  Office  365  monitors  and   protects  confiden/al  email  sent  from  Exchange  Online   Endpoint  Prevent  now  monitors  and  prevents  users  from  syncing   sensi/ve  files  to  cloud  storage  sites  with  a  new  Cloud  File  Sync   and  Share  feature   2   3   4  
  • 29. Agenda   1   Symantec  Informa/on  Protec/on   2   DLP  for  Cloud   3   Addi/onal  Enhancements  in  DLP  14   4   Resources   Copyright  ©  2014  Symantec  Corpora/on   29  
  • 30. Sales  Tools  and  Resources   •  DLP  14  sales  training   •  What’s  New/Reasons  to  Upgrade  datasheet   •  DLP  for  Cloud  datasheet   •  Updated  DLP  datasheet   •  Updated  DLP  first  mee/ng  deck   •  Updated  SYMC  vs.  WebSense  batlecard   •  Updated  SYMC  vs.  RSA  batlecard   •  Updated  SYMC  vs.  McAfee  batlecard   •  Updated  DLP  Xcel  course   Copyright  ©  2014  Symantec  Corpora/on   30  
  • 31. &  Q   A   Copyright  ©  2014  Symantec  Corpora/on   31  
  • 32. Thank  you!   SYMANTEC  PROPRIETARY/CONFIDENTIAL  –  INTERNAL  USE  ONLY   Copyright  ©  2014  Symantec  Corpora/on.  All  rights  reserved.   Cheryl  Tang,  Kedar  Apte