SlideShare a Scribd company logo
OCC Bangalore Presentation
            Prakash Baskaran
          prakash@pawaa.com




Control       Protection
           © Pawaa Software    Freedom   1
Industry Pain Points


                                             Index


  Control          Protection
                © Pawaa Software   Freedom           2
Recent Data Leak News




                    © Pawaa Software   3
Recent Data Leak News




                    © Pawaa Software   4
Recent Data Leak News




                    © Pawaa Software   5
Recent Data Leak News




                    © Pawaa Software   6
Recent Data Leak News




                    © Pawaa Software   7
Recent Data Leak News




                    © Pawaa Software   8
Defences everywhere

                                                      Network Level
                                                      Firewalls
                                                      Content filters
                                                      Email filters
                                                      IDS, IPS, UTM
                                                      Network controls

                                                      Desktop Level
                                                      Anti-virus
                                                      Identity Mgmt
                                                      Access controls
          Customers                                   Device locks
          Suppliers & vendors                         Encryption
          Partners & Consultants
VPN/WEB   Remote Employees
                                       but data leaks continue..
                                   © Pawaa Software                      9
Source of Data Leak: Insiders

                                                                Traditional Approaches Not Enough
                                                                   Offline activities at endpoints
                                                                   Clipboard and screenshots
                                                                   Privilege abuse
                                                                   Removable media
                                                                   Local configuration changes
                                                                   Logs without context
                                    Source: Ponemon Institute
                                                                   Too many point solutions
   87% of insider attacks involved authorized
                                                                   User Intents not deciphered
   persons using legitimate commands.
                              -US Secret Service
                                                                  Insider risk management
   Through 2008, insiders will account for
   majority of financial losses from computers                   needs to start with Endpoint
                                       - Gartner                         Monitoring.

                                       © Pawaa Software                                              10
Impacts of Data Leak




                       © Pawaa Software   11
Drivers: DLP converging with GRC



                                            Key Driver


                                          Common thread
                                         between all these
                                          regulations is to
                                        protect information
                                            and control
                                            endpoints!




                     © Pawaa Software                         12
Pawaa Innovations & Product Portfolio


                                            Index


  Control         Protection
               © Pawaa Software   Freedom           13
Defences everywhere

                                                          Network Level
                                                          Firewalls
                                                          Content filters
                                                          Email filters
                                                          IDS, IPS, UTM
                                                          Network DLP

                                                          Desktop Level
                                                          Anti-virus
                                                          Access controls
                                                          Device locks
      Web Applications
                                                          Encryption
         Customers
                                                          Host based DLP
         Suppliers & vendors
         Partners & Consultants
         Remote Employees
                                                     Pawaa Protects..
                                  © Pawaa Software                          14
Traditional Browser & Files

   Traditional Web Browsers
   Can trust but cannot verify.
                                                     Problems
                                       Trusted users access information on Un-
                                       trusted computers
                                       No visibility beyond typical user
                                       authentication
                                       Simple user activities cause data leaks
         Files at Desktop
       Can easily walk away
                                             Clipboard
                                             Print
                                             Save as
                                       No audit trails available and compliance is
                                       tricky
                                       Files downloaded from web application
                                       through typical browsers can easily “walk
                                       away”


                                  © Pawaa Software                                   15
Sharing Data over the Web

          Traditional DLP Products


 Only covers this scenario:                              Many common situations where you must
        Trusted user, only using…                        share sensitive data within a context that is
        Fully trusted machine, as long as…               not so “locked down”
        Under org’s full control, only within..          These use cases are often vital to a business
        Intranet environment                             being able to operate and compete!


 But what about…                                         Only Pawaa has the technology for sharing
       Cloud/ SaaS /ASP                                  sensitive information:
       Franchises and branches                             Over the browser, even in…
       Extranets                                           Non-intranet situations, even with…
       Shared computers
                                                           Unknown computers to
       Mobile staff with no VPN access
                                                           Protect information accessed




                                              © Pawaa Software                                           16
Other Key Issues

       Traditional DLP Products



   Agent can be disabled
   Agent must be pre-installed on machine            Solves these serious protection issues
   before protection starts
   Huge logs    practically unusable
   Proving compliance = pull logs from               Solves these serious workload issues
   multiple products and correlate them
   Pre-classify data (very time consuming)
   Agent must run all the time                       Solves these serious usability issues
   24x7 monitoring intrudes on user privacy




                                          © Pawaa Software                                    17
Our Innovative Approach


   Implements as a browser wrapper                      Un-hackable (up to 4 keys)
   Downloaded once, 1st time user tries to              Patented file format “wrapper”, works with
   access sensitive data                                any native format
   Works on un-trusted computers                        Preset IRM policies are auto-applied to any
   accessing in multiple types of                       file created/downloaded
   authentification
                                                        IRM enforces who, where, when and how
   Agent is the conduit -- so data not                  the file can be consumed
   available if the agent is “disabled”
                                                        File can only be consumed after policies are
   Only log relevant into, so easy to detect            enforced
   suspicious activity
                                                        Even for files already created:
                                                              Policies can be modified
                                                              Content itself can be updated

         Jointly protect against unauthorized access and unauthorized use

                                           © Pawaa Software                                            18
Demonstration



                          For this demonstration…

       Non “locked down” scenario
           • No Intranet, no VPN
           • Everything is accessing web apps via a browser
           • Machine unknown to the enterprise

       PawaaWEBB has been deployed for the web application that
       needs protection




                              © Pawaa Software                    19
Demonstration




                         Demonstration
     • PawaaWEBB – deploys as a browser wrapper
     • Acts as the required conduit – no access if not running
     • To access a secure URL – user downloads & installs once
           Instant protection
           No army of install engineers




                                    © Pawaa Software             20
Demonstration


                                Desktop Client
            Only required while accessing secure URLs
            • Users – minimizes machine “overhead” (agent not
              running all the time)

                Demonstration
            • Admins – logs capture relevant activity (not logging
              “all activity for all users all the time”)




                           © Pawaa Software                          21
Demonstration
                                   Authentication
          Goes beyond just username and password
          • Communicates with server
          • Can work with many authentication methods (i.e., AD,
            SAML, OpenID, etc.)
          • Updates all policies
          • Rechecks components for tampering – config files, DLLs,
            registry entries, etc.




                               © Pawaa Software                       22
PawaaWEBB Screenshots




                  © Pawaa Software   23
PawaaWEBB Screenshots




    File Download                        PawaaFILE Conversion             Local File System Monitoring


                Application Monitoring                          Hardware Monitoring    Network Monitoring




                                         © Pawaa Software                                                24
Demonstration




                © Pawaa Software   25
“View Policy” – Selected Highlights
               Can monitor individual fields (detect, alert, block)
               Can monitor click behavior within the browser




                       “View Policy” – Selected Highlights
               Configure upload/download permissions by URL
               (including allowable file types)
               Data masking within the browser views




© Pawaa Software                                                  26
Demonstration




                                   Patented file format “wrapper”, works
                                   with any native format
                                   Un-hackable, but not just encrypting…
                                   Pre-set IRM policies are auto-applied to
                                   any file created/downloaded
                                   IRM enforces every aspect of consuming
                                   the file



                © Pawaa Software                                              27
Demonstration




                PawaaFILE wraps around any native format
                Displayed as a .paw file format
                Logo can carry client branding




                      © Pawaa Software                     28
PawaaFILE Screenshots




                    © Pawaa Software   29
Demonstration
                File checks with server, when opened
                This allows updates to be applied, even on files
                “in the wild”
                    IRM policy changes
                    Even content can be updated




                         © Pawaa Software                          30
“HotDoc” Examples

 John and Eric (mobile salesmen)
 download the confidential price
 list to their notebooks


                                             John                 Eric


           Later: 1) headquarters updates the price list and 2) Eric quits.
           Admin makes both changes on the server



                  When John next opens the                                Eric can’t use
                  document, the price list                                the file, in
                  content is auto-updated                                 any way




                                      © Pawaa Software                                     31
Demonstration


                            Server Console
                                   Only log relevant info, so easy to perform
                                   detection, forensics, and audits
                                   Even capture activity on files “in the
                                   wild”




                © Pawaa Software                                                32
Solutions with PawaaWEBB & PawaaFILE


                                           Index


  Control        Protection
              © Pawaa Software   Freedom           33
Integration with Cloud Applications

                         Advantages of Cloud based Applications

                               No Hardware
                               No Software
                               Huge cost savings

                         PawaaWEBB & PawaaFILE Integration

                             Complete audit trail on user behavior
                             Control and security for the
                             downloaded files and reports.
                             Control over the user desktop and user
                             activities such as print, screenshot,
                             clipboard and other activities.
                             Fills the missing web and file security
                             for cloud applications


                         © Pawaa Software                              34
Integration with Open Source Apps

                        Advantages of Open Source Applications

                              Open Source Software benefits
                              Widely popular

                        PawaaWEBB & PawaaFILE Integration

                            Complete audit trail on user behavior
                            Control and security for the
                            downloaded files and reports.
                            Control over the user desktop and user
                            activities such as print, screenshot,
                            clipboard and other activities.
                            Increases the adoption of Open source
                            software and adoption of Pawaa
                            products.

                        © Pawaa Software                             35
Integration with Smart Cards

                         PawaaFILE with Proximity Cards

                             Can eliminate the need for authentication
                             Will open only the files that are authorized
                             for the card holder
                             Can carry the file policies on the card
                             Will open .paw files faster and enforce the
                             policies quicker
                             Ideal for hospital and clinical environments

                         PawaaFILE On Smart Health Cards

                             Only authorized users can open the files
                             Privacy, confidentiality and security
                             guaranteed.



                         © Pawaa Software                                   36
Hot Doc Feature of PawaaFILE

                        PawaaFILE Solutions

                            PawaaFILE knows the source, knows the
                            user and so can automatically update the
                            contents.
                            Applications: Credit card statements,
                            mutual fund statements, bank account
                            statements, telephone or utility
                            statements
                            Eliminates the need for the user to
                            frequently visit the web site to download
                            Ensures constant interaction with the bank
                            and the customer
                            Customized ads for the users
                            Increases the brand identity of the owner


                        © Pawaa Software                                 37
PawaaDOCS – SaaS application




                       © Pawaa Software   38
Thank you.
             Prakash Baskaran
           prakash@pawaa.com




Control        Protection
            © Pawaa Software    Freedom   39

More Related Content

What's hot

Hh 2012-mberman-sds2
Hh 2012-mberman-sds2Hh 2012-mberman-sds2
Hh 2012-mberman-sds2
Michael Berman
 
HTLV - DSS @Vilnius 2010
HTLV - DSS @Vilnius 2010HTLV - DSS @Vilnius 2010
HTLV - DSS @Vilnius 2010
Andris Soroka
 
Refense Security Risk Briefing July 2009
Refense   Security Risk Briefing   July 2009Refense   Security Risk Briefing   July 2009
Refense Security Risk Briefing July 2009
apompliano
 
Preventing The Next Data Breach Through Log Management
Preventing The Next Data Breach Through Log ManagementPreventing The Next Data Breach Through Log Management
Preventing The Next Data Breach Through Log Management
Novell
 
Mobile Security
Mobile Security Mobile Security
Mobile Security
Fresh Digital Group
 
Hp Fortify Pillar
Hp Fortify PillarHp Fortify Pillar
Hp Fortify Pillar
Ed Wong
 
Gigamon U - Eye Of The Fire, Network Malware Control System
Gigamon U - Eye Of The Fire, Network Malware Control SystemGigamon U - Eye Of The Fire, Network Malware Control System
Gigamon U - Eye Of The Fire, Network Malware Control System
Grant Swanson
 
RSA 2010 Kevin Rowney
RSA 2010 Kevin RowneyRSA 2010 Kevin Rowney
RSA 2010 Kevin Rowney
Symantec
 
Mitigating Risk for the Mobile Worker: Novell ZENworks Endpoint Security Mana...
Mitigating Risk for the Mobile Worker: Novell ZENworks Endpoint Security Mana...Mitigating Risk for the Mobile Worker: Novell ZENworks Endpoint Security Mana...
Mitigating Risk for the Mobile Worker: Novell ZENworks Endpoint Security Mana...
Novell
 
Cloud Security: Perception Vs. Reality
Cloud Security: Perception Vs. RealityCloud Security: Perception Vs. Reality
Cloud Security: Perception Vs. Reality
Internap
 
BYOD - Ruckus way. Right way.
BYOD - Ruckus way. Right way.BYOD - Ruckus way. Right way.
BYOD - Ruckus way. Right way.
Michal Jarski
 
Gtb Dlp & Irm Solution Product And Deployment Overview
Gtb Dlp & Irm Solution   Product And Deployment OverviewGtb Dlp & Irm Solution   Product And Deployment Overview
Gtb Dlp & Irm Solution Product And Deployment Overview
gtbsalesindia
 
2012 Data Center Security
2012 Data Center Security2012 Data Center Security
2012 Data Center Security
Szymon Dowgwillowicz-Nowicki
 
Nebezpecny Internet Novejsi Verze
Nebezpecny Internet Novejsi VerzeNebezpecny Internet Novejsi Verze
Nebezpecny Internet Novejsi Verze
TUESDAY Business Network
 
Data Leakage Prevention
Data Leakage PreventionData Leakage Prevention
Advanced infrastructure as foundation for e-democracy solutions - Daniel Dani...
Advanced infrastructure as foundation for e-democracy solutions - Daniel Dani...Advanced infrastructure as foundation for e-democracy solutions - Daniel Dani...
Advanced infrastructure as foundation for e-democracy solutions - Daniel Dani...
e-Democracy Conference
 
Architecting Secure Web Systems
Architecting Secure Web SystemsArchitecting Secure Web Systems
Architecting Secure Web Systems
InnoTech
 

What's hot (17)

Hh 2012-mberman-sds2
Hh 2012-mberman-sds2Hh 2012-mberman-sds2
Hh 2012-mberman-sds2
 
HTLV - DSS @Vilnius 2010
HTLV - DSS @Vilnius 2010HTLV - DSS @Vilnius 2010
HTLV - DSS @Vilnius 2010
 
Refense Security Risk Briefing July 2009
Refense   Security Risk Briefing   July 2009Refense   Security Risk Briefing   July 2009
Refense Security Risk Briefing July 2009
 
Preventing The Next Data Breach Through Log Management
Preventing The Next Data Breach Through Log ManagementPreventing The Next Data Breach Through Log Management
Preventing The Next Data Breach Through Log Management
 
Mobile Security
Mobile Security Mobile Security
Mobile Security
 
Hp Fortify Pillar
Hp Fortify PillarHp Fortify Pillar
Hp Fortify Pillar
 
Gigamon U - Eye Of The Fire, Network Malware Control System
Gigamon U - Eye Of The Fire, Network Malware Control SystemGigamon U - Eye Of The Fire, Network Malware Control System
Gigamon U - Eye Of The Fire, Network Malware Control System
 
RSA 2010 Kevin Rowney
RSA 2010 Kevin RowneyRSA 2010 Kevin Rowney
RSA 2010 Kevin Rowney
 
Mitigating Risk for the Mobile Worker: Novell ZENworks Endpoint Security Mana...
Mitigating Risk for the Mobile Worker: Novell ZENworks Endpoint Security Mana...Mitigating Risk for the Mobile Worker: Novell ZENworks Endpoint Security Mana...
Mitigating Risk for the Mobile Worker: Novell ZENworks Endpoint Security Mana...
 
Cloud Security: Perception Vs. Reality
Cloud Security: Perception Vs. RealityCloud Security: Perception Vs. Reality
Cloud Security: Perception Vs. Reality
 
BYOD - Ruckus way. Right way.
BYOD - Ruckus way. Right way.BYOD - Ruckus way. Right way.
BYOD - Ruckus way. Right way.
 
Gtb Dlp & Irm Solution Product And Deployment Overview
Gtb Dlp & Irm Solution   Product And Deployment OverviewGtb Dlp & Irm Solution   Product And Deployment Overview
Gtb Dlp & Irm Solution Product And Deployment Overview
 
2012 Data Center Security
2012 Data Center Security2012 Data Center Security
2012 Data Center Security
 
Nebezpecny Internet Novejsi Verze
Nebezpecny Internet Novejsi VerzeNebezpecny Internet Novejsi Verze
Nebezpecny Internet Novejsi Verze
 
Data Leakage Prevention
Data Leakage PreventionData Leakage Prevention
Data Leakage Prevention
 
Advanced infrastructure as foundation for e-democracy solutions - Daniel Dani...
Advanced infrastructure as foundation for e-democracy solutions - Daniel Dani...Advanced infrastructure as foundation for e-democracy solutions - Daniel Dani...
Advanced infrastructure as foundation for e-democracy solutions - Daniel Dani...
 
Architecting Secure Web Systems
Architecting Secure Web SystemsArchitecting Secure Web Systems
Architecting Secure Web Systems
 

Similar to Pawaa OCC Presentation

Bulding Soc In Changing Threat Landscapefinal
Bulding Soc In Changing Threat LandscapefinalBulding Soc In Changing Threat Landscapefinal
Bulding Soc In Changing Threat Landscapefinal
Mahmoud Yassin
 
S series presentation
S series presentationS series presentation
S series presentation
Sergey Marunich
 
Enterprise API Security & Data Loss Prevention - Intel
Enterprise API Security & Data Loss Prevention - IntelEnterprise API Security & Data Loss Prevention - Intel
Enterprise API Security & Data Loss Prevention - Intel
Intel - API Security & Tokenization
 
RSA 2012 Virtualization Security February 2012
RSA 2012 Virtualization Security February 2012RSA 2012 Virtualization Security February 2012
RSA 2012 Virtualization Security February 2012
Symantec
 
Real-Time Protection From Every Malware Infection
Real-Time Protection From Every Malware InfectionReal-Time Protection From Every Malware Infection
Real-Time Protection From Every Malware Infection
Webroot
 
Symantec Endpoint Protection 12
Symantec Endpoint Protection 12Symantec Endpoint Protection 12
Symantec Endpoint Protection 12
Symantec
 
CYBER INTELLIGENCE & RESPONSE TECHNOLOGY
CYBER INTELLIGENCE & RESPONSE TECHNOLOGYCYBER INTELLIGENCE & RESPONSE TECHNOLOGY
CYBER INTELLIGENCE & RESPONSE TECHNOLOGY
jmical
 
Data Access Network for Monitoring and Troubleshooting
Data Access Network for Monitoring and TroubleshootingData Access Network for Monitoring and Troubleshooting
Data Access Network for Monitoring and Troubleshooting
Grant Swanson
 
Sådan undgår du misbrug af kundedata og fortrolig information
Sådan undgår du misbrug af kundedata og fortrolig informationSådan undgår du misbrug af kundedata og fortrolig information
Sådan undgår du misbrug af kundedata og fortrolig information
IBM Danmark
 
Vfm palo alto next generation firewall
Vfm palo alto next generation firewallVfm palo alto next generation firewall
Vfm palo alto next generation firewall
vfmindia
 
Introducing New Kaspersky Endpoint Security for Business - ENGLISH
Introducing New Kaspersky Endpoint Security for Business - ENGLISHIntroducing New Kaspersky Endpoint Security for Business - ENGLISH
Introducing New Kaspersky Endpoint Security for Business - ENGLISH
Kirill Kertsenbaum
 
Retail IT 2013: Data Security & PCI Compliance Briefing
Retail IT 2013: Data Security & PCI Compliance BriefingRetail IT 2013: Data Security & PCI Compliance Briefing
Retail IT 2013: Data Security & PCI Compliance Briefing
Kaseya
 
DirectAccess
DirectAccessDirectAccess
DirectAccess
Digicomp Academy AG
 
Endpoint Protection
Endpoint ProtectionEndpoint Protection
Endpoint Protection
Sophos
 
Network penetration testing
Network penetration testingNetwork penetration testing
Network penetration testing
Imaginea
 
Sccm 2012 overview - chris_estonina
Sccm 2012 overview - chris_estoninaSccm 2012 overview - chris_estonina
Sccm 2012 overview - chris_estonina
Microsoft Singapore
 
Panda Cloud Protection - protectie maxima, costuri reduse
Panda Cloud Protection - protectie maxima, costuri redusePanda Cloud Protection - protectie maxima, costuri reduse
Panda Cloud Protection - protectie maxima, costuri reduse
IDG Romania
 
Microsoft System Center 2012 Delivering better IT Management
Microsoft System Center 2012 Delivering better IT ManagementMicrosoft System Center 2012 Delivering better IT Management
Microsoft System Center 2012 Delivering better IT Management
Intergen
 
QualysGuard InfoDay 2012 - Secure Digital Vault for Qualys
QualysGuard InfoDay 2012 - Secure Digital Vault for QualysQualysGuard InfoDay 2012 - Secure Digital Vault for Qualys
QualysGuard InfoDay 2012 - Secure Digital Vault for Qualys
Risk Analysis Consultants, s.r.o.
 
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
Amazon Web Services
 

Similar to Pawaa OCC Presentation (20)

Bulding Soc In Changing Threat Landscapefinal
Bulding Soc In Changing Threat LandscapefinalBulding Soc In Changing Threat Landscapefinal
Bulding Soc In Changing Threat Landscapefinal
 
S series presentation
S series presentationS series presentation
S series presentation
 
Enterprise API Security & Data Loss Prevention - Intel
Enterprise API Security & Data Loss Prevention - IntelEnterprise API Security & Data Loss Prevention - Intel
Enterprise API Security & Data Loss Prevention - Intel
 
RSA 2012 Virtualization Security February 2012
RSA 2012 Virtualization Security February 2012RSA 2012 Virtualization Security February 2012
RSA 2012 Virtualization Security February 2012
 
Real-Time Protection From Every Malware Infection
Real-Time Protection From Every Malware InfectionReal-Time Protection From Every Malware Infection
Real-Time Protection From Every Malware Infection
 
Symantec Endpoint Protection 12
Symantec Endpoint Protection 12Symantec Endpoint Protection 12
Symantec Endpoint Protection 12
 
CYBER INTELLIGENCE & RESPONSE TECHNOLOGY
CYBER INTELLIGENCE & RESPONSE TECHNOLOGYCYBER INTELLIGENCE & RESPONSE TECHNOLOGY
CYBER INTELLIGENCE & RESPONSE TECHNOLOGY
 
Data Access Network for Monitoring and Troubleshooting
Data Access Network for Monitoring and TroubleshootingData Access Network for Monitoring and Troubleshooting
Data Access Network for Monitoring and Troubleshooting
 
Sådan undgår du misbrug af kundedata og fortrolig information
Sådan undgår du misbrug af kundedata og fortrolig informationSådan undgår du misbrug af kundedata og fortrolig information
Sådan undgår du misbrug af kundedata og fortrolig information
 
Vfm palo alto next generation firewall
Vfm palo alto next generation firewallVfm palo alto next generation firewall
Vfm palo alto next generation firewall
 
Introducing New Kaspersky Endpoint Security for Business - ENGLISH
Introducing New Kaspersky Endpoint Security for Business - ENGLISHIntroducing New Kaspersky Endpoint Security for Business - ENGLISH
Introducing New Kaspersky Endpoint Security for Business - ENGLISH
 
Retail IT 2013: Data Security & PCI Compliance Briefing
Retail IT 2013: Data Security & PCI Compliance BriefingRetail IT 2013: Data Security & PCI Compliance Briefing
Retail IT 2013: Data Security & PCI Compliance Briefing
 
DirectAccess
DirectAccessDirectAccess
DirectAccess
 
Endpoint Protection
Endpoint ProtectionEndpoint Protection
Endpoint Protection
 
Network penetration testing
Network penetration testingNetwork penetration testing
Network penetration testing
 
Sccm 2012 overview - chris_estonina
Sccm 2012 overview - chris_estoninaSccm 2012 overview - chris_estonina
Sccm 2012 overview - chris_estonina
 
Panda Cloud Protection - protectie maxima, costuri reduse
Panda Cloud Protection - protectie maxima, costuri redusePanda Cloud Protection - protectie maxima, costuri reduse
Panda Cloud Protection - protectie maxima, costuri reduse
 
Microsoft System Center 2012 Delivering better IT Management
Microsoft System Center 2012 Delivering better IT ManagementMicrosoft System Center 2012 Delivering better IT Management
Microsoft System Center 2012 Delivering better IT Management
 
QualysGuard InfoDay 2012 - Secure Digital Vault for Qualys
QualysGuard InfoDay 2012 - Secure Digital Vault for QualysQualysGuard InfoDay 2012 - Secure Digital Vault for Qualys
QualysGuard InfoDay 2012 - Secure Digital Vault for Qualys
 
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
 

Recently uploaded

ikea_woodgreen_petscharity_cat-alogue_digital.pdf
ikea_woodgreen_petscharity_cat-alogue_digital.pdfikea_woodgreen_petscharity_cat-alogue_digital.pdf
ikea_woodgreen_petscharity_cat-alogue_digital.pdf
agatadrynko
 
Part 2 Deep Dive: Navigating the 2024 Slowdown
Part 2 Deep Dive: Navigating the 2024 SlowdownPart 2 Deep Dive: Navigating the 2024 Slowdown
Part 2 Deep Dive: Navigating the 2024 Slowdown
jeffkluth1
 
Income Tax exemption for Start up : Section 80 IAC
Income Tax  exemption for Start up : Section 80 IACIncome Tax  exemption for Start up : Section 80 IAC
Income Tax exemption for Start up : Section 80 IAC
CA Dr. Prithvi Ranjan Parhi
 
Top mailing list providers in the USA.pptx
Top mailing list providers in the USA.pptxTop mailing list providers in the USA.pptx
Top mailing list providers in the USA.pptx
JeremyPeirce1
 
ikea_woodgreen_petscharity_dog-alogue_digital.pdf
ikea_woodgreen_petscharity_dog-alogue_digital.pdfikea_woodgreen_petscharity_dog-alogue_digital.pdf
ikea_woodgreen_petscharity_dog-alogue_digital.pdf
agatadrynko
 
Understanding User Needs and Satisfying Them
Understanding User Needs and Satisfying ThemUnderstanding User Needs and Satisfying Them
Understanding User Needs and Satisfying Them
Aggregage
 
Authentically Social by Corey Perlman - EO Puerto Rico
Authentically Social by Corey Perlman - EO Puerto RicoAuthentically Social by Corey Perlman - EO Puerto Rico
Authentically Social by Corey Perlman - EO Puerto Rico
Corey Perlman, Social Media Speaker and Consultant
 
2022 Vintage Roman Numerals Men Rings
2022 Vintage Roman  Numerals  Men  Rings2022 Vintage Roman  Numerals  Men  Rings
2022 Vintage Roman Numerals Men Rings
aragme
 
Creative Web Design Company in Singapore
Creative Web Design Company in SingaporeCreative Web Design Company in Singapore
Creative Web Design Company in Singapore
techboxsqauremedia
 
Call 8867766396 Satta Matka Dpboss Matka Guessing Satta batta Matka 420 Satta...
Call 8867766396 Satta Matka Dpboss Matka Guessing Satta batta Matka 420 Satta...Call 8867766396 Satta Matka Dpboss Matka Guessing Satta batta Matka 420 Satta...
Call 8867766396 Satta Matka Dpboss Matka Guessing Satta batta Matka 420 Satta...
bosssp10
 
Creative Web Design Company in Singapore
Creative Web Design Company in SingaporeCreative Web Design Company in Singapore
Creative Web Design Company in Singapore
techboxsqauremedia
 
Zodiac Signs and Food Preferences_ What Your Sign Says About Your Taste
Zodiac Signs and Food Preferences_ What Your Sign Says About Your TasteZodiac Signs and Food Preferences_ What Your Sign Says About Your Taste
Zodiac Signs and Food Preferences_ What Your Sign Says About Your Taste
my Pandit
 
How MJ Global Leads the Packaging Industry.pdf
How MJ Global Leads the Packaging Industry.pdfHow MJ Global Leads the Packaging Industry.pdf
How MJ Global Leads the Packaging Industry.pdf
MJ Global
 
The Influence of Marketing Strategy and Market Competition on Business Perfor...
The Influence of Marketing Strategy and Market Competition on Business Perfor...The Influence of Marketing Strategy and Market Competition on Business Perfor...
The Influence of Marketing Strategy and Market Competition on Business Perfor...
Adam Smith
 
Taurus Zodiac Sign: Unveiling the Traits, Dates, and Horoscope Insights of th...
Taurus Zodiac Sign: Unveiling the Traits, Dates, and Horoscope Insights of th...Taurus Zodiac Sign: Unveiling the Traits, Dates, and Horoscope Insights of th...
Taurus Zodiac Sign: Unveiling the Traits, Dates, and Horoscope Insights of th...
my Pandit
 
Event Report - SAP Sapphire 2024 Orlando - lots of innovation and old challenges
Event Report - SAP Sapphire 2024 Orlando - lots of innovation and old challengesEvent Report - SAP Sapphire 2024 Orlando - lots of innovation and old challenges
Event Report - SAP Sapphire 2024 Orlando - lots of innovation and old challenges
Holger Mueller
 
Best Forex Brokers Comparison in INDIA 2024
Best Forex Brokers Comparison in INDIA 2024Best Forex Brokers Comparison in INDIA 2024
Best Forex Brokers Comparison in INDIA 2024
Top Forex Brokers Review
 
2024-6-01-IMPACTSilver-Corp-Presentation.pdf
2024-6-01-IMPACTSilver-Corp-Presentation.pdf2024-6-01-IMPACTSilver-Corp-Presentation.pdf
2024-6-01-IMPACTSilver-Corp-Presentation.pdf
hartfordclub1
 
一比一原版新西兰奥塔哥大学毕业证(otago毕业证)如何办理
一比一原版新西兰奥塔哥大学毕业证(otago毕业证)如何办理一比一原版新西兰奥塔哥大学毕业证(otago毕业证)如何办理
一比一原版新西兰奥塔哥大学毕业证(otago毕业证)如何办理
taqyea
 
amptalk_RecruitingDeck_english_2024.06.05
amptalk_RecruitingDeck_english_2024.06.05amptalk_RecruitingDeck_english_2024.06.05
amptalk_RecruitingDeck_english_2024.06.05
marketing317746
 

Recently uploaded (20)

ikea_woodgreen_petscharity_cat-alogue_digital.pdf
ikea_woodgreen_petscharity_cat-alogue_digital.pdfikea_woodgreen_petscharity_cat-alogue_digital.pdf
ikea_woodgreen_petscharity_cat-alogue_digital.pdf
 
Part 2 Deep Dive: Navigating the 2024 Slowdown
Part 2 Deep Dive: Navigating the 2024 SlowdownPart 2 Deep Dive: Navigating the 2024 Slowdown
Part 2 Deep Dive: Navigating the 2024 Slowdown
 
Income Tax exemption for Start up : Section 80 IAC
Income Tax  exemption for Start up : Section 80 IACIncome Tax  exemption for Start up : Section 80 IAC
Income Tax exemption for Start up : Section 80 IAC
 
Top mailing list providers in the USA.pptx
Top mailing list providers in the USA.pptxTop mailing list providers in the USA.pptx
Top mailing list providers in the USA.pptx
 
ikea_woodgreen_petscharity_dog-alogue_digital.pdf
ikea_woodgreen_petscharity_dog-alogue_digital.pdfikea_woodgreen_petscharity_dog-alogue_digital.pdf
ikea_woodgreen_petscharity_dog-alogue_digital.pdf
 
Understanding User Needs and Satisfying Them
Understanding User Needs and Satisfying ThemUnderstanding User Needs and Satisfying Them
Understanding User Needs and Satisfying Them
 
Authentically Social by Corey Perlman - EO Puerto Rico
Authentically Social by Corey Perlman - EO Puerto RicoAuthentically Social by Corey Perlman - EO Puerto Rico
Authentically Social by Corey Perlman - EO Puerto Rico
 
2022 Vintage Roman Numerals Men Rings
2022 Vintage Roman  Numerals  Men  Rings2022 Vintage Roman  Numerals  Men  Rings
2022 Vintage Roman Numerals Men Rings
 
Creative Web Design Company in Singapore
Creative Web Design Company in SingaporeCreative Web Design Company in Singapore
Creative Web Design Company in Singapore
 
Call 8867766396 Satta Matka Dpboss Matka Guessing Satta batta Matka 420 Satta...
Call 8867766396 Satta Matka Dpboss Matka Guessing Satta batta Matka 420 Satta...Call 8867766396 Satta Matka Dpboss Matka Guessing Satta batta Matka 420 Satta...
Call 8867766396 Satta Matka Dpboss Matka Guessing Satta batta Matka 420 Satta...
 
Creative Web Design Company in Singapore
Creative Web Design Company in SingaporeCreative Web Design Company in Singapore
Creative Web Design Company in Singapore
 
Zodiac Signs and Food Preferences_ What Your Sign Says About Your Taste
Zodiac Signs and Food Preferences_ What Your Sign Says About Your TasteZodiac Signs and Food Preferences_ What Your Sign Says About Your Taste
Zodiac Signs and Food Preferences_ What Your Sign Says About Your Taste
 
How MJ Global Leads the Packaging Industry.pdf
How MJ Global Leads the Packaging Industry.pdfHow MJ Global Leads the Packaging Industry.pdf
How MJ Global Leads the Packaging Industry.pdf
 
The Influence of Marketing Strategy and Market Competition on Business Perfor...
The Influence of Marketing Strategy and Market Competition on Business Perfor...The Influence of Marketing Strategy and Market Competition on Business Perfor...
The Influence of Marketing Strategy and Market Competition on Business Perfor...
 
Taurus Zodiac Sign: Unveiling the Traits, Dates, and Horoscope Insights of th...
Taurus Zodiac Sign: Unveiling the Traits, Dates, and Horoscope Insights of th...Taurus Zodiac Sign: Unveiling the Traits, Dates, and Horoscope Insights of th...
Taurus Zodiac Sign: Unveiling the Traits, Dates, and Horoscope Insights of th...
 
Event Report - SAP Sapphire 2024 Orlando - lots of innovation and old challenges
Event Report - SAP Sapphire 2024 Orlando - lots of innovation and old challengesEvent Report - SAP Sapphire 2024 Orlando - lots of innovation and old challenges
Event Report - SAP Sapphire 2024 Orlando - lots of innovation and old challenges
 
Best Forex Brokers Comparison in INDIA 2024
Best Forex Brokers Comparison in INDIA 2024Best Forex Brokers Comparison in INDIA 2024
Best Forex Brokers Comparison in INDIA 2024
 
2024-6-01-IMPACTSilver-Corp-Presentation.pdf
2024-6-01-IMPACTSilver-Corp-Presentation.pdf2024-6-01-IMPACTSilver-Corp-Presentation.pdf
2024-6-01-IMPACTSilver-Corp-Presentation.pdf
 
一比一原版新西兰奥塔哥大学毕业证(otago毕业证)如何办理
一比一原版新西兰奥塔哥大学毕业证(otago毕业证)如何办理一比一原版新西兰奥塔哥大学毕业证(otago毕业证)如何办理
一比一原版新西兰奥塔哥大学毕业证(otago毕业证)如何办理
 
amptalk_RecruitingDeck_english_2024.06.05
amptalk_RecruitingDeck_english_2024.06.05amptalk_RecruitingDeck_english_2024.06.05
amptalk_RecruitingDeck_english_2024.06.05
 

Pawaa OCC Presentation

  • 1. OCC Bangalore Presentation Prakash Baskaran prakash@pawaa.com Control Protection © Pawaa Software Freedom 1
  • 2. Industry Pain Points Index Control Protection © Pawaa Software Freedom 2
  • 3. Recent Data Leak News © Pawaa Software 3
  • 4. Recent Data Leak News © Pawaa Software 4
  • 5. Recent Data Leak News © Pawaa Software 5
  • 6. Recent Data Leak News © Pawaa Software 6
  • 7. Recent Data Leak News © Pawaa Software 7
  • 8. Recent Data Leak News © Pawaa Software 8
  • 9. Defences everywhere Network Level Firewalls Content filters Email filters IDS, IPS, UTM Network controls Desktop Level Anti-virus Identity Mgmt Access controls Customers Device locks Suppliers & vendors Encryption Partners & Consultants VPN/WEB Remote Employees but data leaks continue.. © Pawaa Software 9
  • 10. Source of Data Leak: Insiders Traditional Approaches Not Enough Offline activities at endpoints Clipboard and screenshots Privilege abuse Removable media Local configuration changes Logs without context Source: Ponemon Institute Too many point solutions 87% of insider attacks involved authorized User Intents not deciphered persons using legitimate commands. -US Secret Service Insider risk management Through 2008, insiders will account for majority of financial losses from computers needs to start with Endpoint - Gartner Monitoring. © Pawaa Software 10
  • 11. Impacts of Data Leak © Pawaa Software 11
  • 12. Drivers: DLP converging with GRC Key Driver Common thread between all these regulations is to protect information and control endpoints! © Pawaa Software 12
  • 13. Pawaa Innovations & Product Portfolio Index Control Protection © Pawaa Software Freedom 13
  • 14. Defences everywhere Network Level Firewalls Content filters Email filters IDS, IPS, UTM Network DLP Desktop Level Anti-virus Access controls Device locks Web Applications Encryption Customers Host based DLP Suppliers & vendors Partners & Consultants Remote Employees Pawaa Protects.. © Pawaa Software 14
  • 15. Traditional Browser & Files Traditional Web Browsers Can trust but cannot verify. Problems Trusted users access information on Un- trusted computers No visibility beyond typical user authentication Simple user activities cause data leaks Files at Desktop Can easily walk away Clipboard Print Save as No audit trails available and compliance is tricky Files downloaded from web application through typical browsers can easily “walk away” © Pawaa Software 15
  • 16. Sharing Data over the Web Traditional DLP Products Only covers this scenario: Many common situations where you must Trusted user, only using… share sensitive data within a context that is Fully trusted machine, as long as… not so “locked down” Under org’s full control, only within.. These use cases are often vital to a business Intranet environment being able to operate and compete! But what about… Only Pawaa has the technology for sharing Cloud/ SaaS /ASP sensitive information: Franchises and branches Over the browser, even in… Extranets Non-intranet situations, even with… Shared computers Unknown computers to Mobile staff with no VPN access Protect information accessed © Pawaa Software 16
  • 17. Other Key Issues Traditional DLP Products Agent can be disabled Agent must be pre-installed on machine Solves these serious protection issues before protection starts Huge logs practically unusable Proving compliance = pull logs from Solves these serious workload issues multiple products and correlate them Pre-classify data (very time consuming) Agent must run all the time Solves these serious usability issues 24x7 monitoring intrudes on user privacy © Pawaa Software 17
  • 18. Our Innovative Approach Implements as a browser wrapper Un-hackable (up to 4 keys) Downloaded once, 1st time user tries to Patented file format “wrapper”, works with access sensitive data any native format Works on un-trusted computers Preset IRM policies are auto-applied to any accessing in multiple types of file created/downloaded authentification IRM enforces who, where, when and how Agent is the conduit -- so data not the file can be consumed available if the agent is “disabled” File can only be consumed after policies are Only log relevant into, so easy to detect enforced suspicious activity Even for files already created: Policies can be modified Content itself can be updated Jointly protect against unauthorized access and unauthorized use © Pawaa Software 18
  • 19. Demonstration For this demonstration… Non “locked down” scenario • No Intranet, no VPN • Everything is accessing web apps via a browser • Machine unknown to the enterprise PawaaWEBB has been deployed for the web application that needs protection © Pawaa Software 19
  • 20. Demonstration Demonstration • PawaaWEBB – deploys as a browser wrapper • Acts as the required conduit – no access if not running • To access a secure URL – user downloads & installs once Instant protection No army of install engineers © Pawaa Software 20
  • 21. Demonstration Desktop Client Only required while accessing secure URLs • Users – minimizes machine “overhead” (agent not running all the time) Demonstration • Admins – logs capture relevant activity (not logging “all activity for all users all the time”) © Pawaa Software 21
  • 22. Demonstration Authentication Goes beyond just username and password • Communicates with server • Can work with many authentication methods (i.e., AD, SAML, OpenID, etc.) • Updates all policies • Rechecks components for tampering – config files, DLLs, registry entries, etc. © Pawaa Software 22
  • 23. PawaaWEBB Screenshots © Pawaa Software 23
  • 24. PawaaWEBB Screenshots File Download PawaaFILE Conversion Local File System Monitoring Application Monitoring Hardware Monitoring Network Monitoring © Pawaa Software 24
  • 25. Demonstration © Pawaa Software 25
  • 26. “View Policy” – Selected Highlights Can monitor individual fields (detect, alert, block) Can monitor click behavior within the browser “View Policy” – Selected Highlights Configure upload/download permissions by URL (including allowable file types) Data masking within the browser views © Pawaa Software 26
  • 27. Demonstration Patented file format “wrapper”, works with any native format Un-hackable, but not just encrypting… Pre-set IRM policies are auto-applied to any file created/downloaded IRM enforces every aspect of consuming the file © Pawaa Software 27
  • 28. Demonstration PawaaFILE wraps around any native format Displayed as a .paw file format Logo can carry client branding © Pawaa Software 28
  • 29. PawaaFILE Screenshots © Pawaa Software 29
  • 30. Demonstration File checks with server, when opened This allows updates to be applied, even on files “in the wild” IRM policy changes Even content can be updated © Pawaa Software 30
  • 31. “HotDoc” Examples John and Eric (mobile salesmen) download the confidential price list to their notebooks John Eric Later: 1) headquarters updates the price list and 2) Eric quits. Admin makes both changes on the server When John next opens the Eric can’t use document, the price list the file, in content is auto-updated any way © Pawaa Software 31
  • 32. Demonstration Server Console Only log relevant info, so easy to perform detection, forensics, and audits Even capture activity on files “in the wild” © Pawaa Software 32
  • 33. Solutions with PawaaWEBB & PawaaFILE Index Control Protection © Pawaa Software Freedom 33
  • 34. Integration with Cloud Applications Advantages of Cloud based Applications No Hardware No Software Huge cost savings PawaaWEBB & PawaaFILE Integration Complete audit trail on user behavior Control and security for the downloaded files and reports. Control over the user desktop and user activities such as print, screenshot, clipboard and other activities. Fills the missing web and file security for cloud applications © Pawaa Software 34
  • 35. Integration with Open Source Apps Advantages of Open Source Applications Open Source Software benefits Widely popular PawaaWEBB & PawaaFILE Integration Complete audit trail on user behavior Control and security for the downloaded files and reports. Control over the user desktop and user activities such as print, screenshot, clipboard and other activities. Increases the adoption of Open source software and adoption of Pawaa products. © Pawaa Software 35
  • 36. Integration with Smart Cards PawaaFILE with Proximity Cards Can eliminate the need for authentication Will open only the files that are authorized for the card holder Can carry the file policies on the card Will open .paw files faster and enforce the policies quicker Ideal for hospital and clinical environments PawaaFILE On Smart Health Cards Only authorized users can open the files Privacy, confidentiality and security guaranteed. © Pawaa Software 36
  • 37. Hot Doc Feature of PawaaFILE PawaaFILE Solutions PawaaFILE knows the source, knows the user and so can automatically update the contents. Applications: Credit card statements, mutual fund statements, bank account statements, telephone or utility statements Eliminates the need for the user to frequently visit the web site to download Ensures constant interaction with the bank and the customer Customized ads for the users Increases the brand identity of the owner © Pawaa Software 37
  • 38. PawaaDOCS – SaaS application © Pawaa Software 38
  • 39. Thank you. Prakash Baskaran prakash@pawaa.com Control Protection © Pawaa Software Freedom 39