SlideShare a Scribd company logo
1 of 38
Symantec Data Loss Prevention Las tendencias mundiales nos muestran que el mayor porcentaje de perdida y robo de datos responde a la falta de visibilidad y el error en el manejo de los mismos. Conozca como prevenirse. Ariel Beliera, Account Systems EngineerFrancisco Della Paolera, Corporate Business Manager Symantec South of Latin-American Region Vontu: Now Part of Symantec
2 Key Questions Facing Today’s CISO What are the challenges?  What is Data Loss Prevention (DLP)?  Why Symantec DLP and how does it work? Why customers choose Symantec DLP?
3 CORPORATIONSWITHOUT WALLS DATA EXPLOSION THE ROLEOF SECURITY The Vanishing Perimeter The Office is “Anywhere” Outsourcing and Offshoring  Data is Everywhere Structured Data, Unstructured Content IP, Customer, and Classified Data Risk and Compliance Business Enabler Limited Budget Security for a Wide Open World CONFIDENTIAL
Do You Know… How best  to prevent its loss? How is it being used? Where is your confidential data? 4
What is Data Loss Prevention? DISCOVER PROTECT MONITOR DATA LOSS PREVENTION (DLP) 5
Key DLP Requirements DISCOVER PROTECT MONITOR ,[object Object]
Create inventory of sensitive data
Manage data clean up
Understand how data is being used
Understand content and context
Gain enterprise-wide visibility
Gain visibility into policy violations
Proactively secure data
Prevent confidential data lossMANAGE ,[object Object]
Define unified policy across enterprise
Detect content accurately6
MONITOR DISCOVER PROTECT 2 3 4 ,[object Object]
Run scan to find sensitive data on network & endpoint data
Inspect data being sent
Monitor network & endpoint events
Block, remove or encrypt
Quarantine or copy files
Notify employee & managerMANAGE 5 ,[object Object],1 ,[object Object],MANAGE How It Works 7
How Is Symantec DLP Different? 8
Complete Coverage DISCOVER Manage data            clean up Find data wherever  it is stored Create inventory of sensitive data Find more data in more places Scalable system for inventory Automated and scalable remediation ,[object Object]
High performance, parallel scans
Flexible deployment options
Targeted scanning
Automatic identification of data owners
Systematic re-scanning
Broadest file server coverage
Distributed laptops and desktops
All SQL databases natively
Major document repositories
Key email servers
Internal and external web sites9
Complete Coverage MONITOR Gain enterprise-wide visibility Understand how                    data is being used Understand content and context Broadest network and endpoint event coverage Only unified network and endpoint solution Proven scalability ,[object Object]
Maximum visibility

More Related Content

What's hot

Data Loss Threats and Mitigations
Data Loss Threats and MitigationsData Loss Threats and Mitigations
Data Loss Threats and MitigationsApril Mardock CISSP
 
Symantec Data Loss Prevention 11
Symantec Data Loss Prevention 11Symantec Data Loss Prevention 11
Symantec Data Loss Prevention 11Symantec
 
Introducing Data Loss Prevention 14
Introducing Data Loss Prevention 14Introducing Data Loss Prevention 14
Introducing Data Loss Prevention 14Symantec
 
Overview of Data Loss Prevention (DLP) Technology
Overview of Data Loss Prevention (DLP) TechnologyOverview of Data Loss Prevention (DLP) Technology
Overview of Data Loss Prevention (DLP) TechnologyLiwei Ren任力偉
 
Symantec Data Loss Prevention - Technical Proposal (General)
Symantec Data Loss Prevention - Technical Proposal (General)Symantec Data Loss Prevention - Technical Proposal (General)
Symantec Data Loss Prevention - Technical Proposal (General)Iftikhar Ali Iqbal
 
DLP Data leak prevention
DLP Data leak preventionDLP Data leak prevention
DLP Data leak preventionAriel Evans
 
Endpoint Protection
Endpoint ProtectionEndpoint Protection
Endpoint ProtectionSophos
 
Microsoft 365 Enterprise Security with E5 Overview
Microsoft 365 Enterprise Security with E5 OverviewMicrosoft 365 Enterprise Security with E5 Overview
Microsoft 365 Enterprise Security with E5 OverviewDavid J Rosenthal
 
Cybersecurity roadmap : Global healthcare security architecture
Cybersecurity roadmap : Global healthcare security architectureCybersecurity roadmap : Global healthcare security architecture
Cybersecurity roadmap : Global healthcare security architecturePriyanka Aash
 
Security architecture
Security architectureSecurity architecture
Security architectureDuncan Unwin
 
Best Practices for Implementing Data Loss Prevention (DLP)
Best Practices for Implementing Data Loss Prevention (DLP)Best Practices for Implementing Data Loss Prevention (DLP)
Best Practices for Implementing Data Loss Prevention (DLP)Sarfaraz Chougule
 
Data Loss Prevention: Challenges, Impacts & Effective Strategies
Data Loss Prevention: Challenges, Impacts & Effective StrategiesData Loss Prevention: Challenges, Impacts & Effective Strategies
Data Loss Prevention: Challenges, Impacts & Effective StrategiesSeccuris Inc.
 
Forcepoint Dynamic Data Protection
Forcepoint Dynamic Data ProtectionForcepoint Dynamic Data Protection
Forcepoint Dynamic Data ProtectionMarketingArrowECS_CZ
 
PaloAlto Enterprise Security Solution
PaloAlto Enterprise Security SolutionPaloAlto Enterprise Security Solution
PaloAlto Enterprise Security SolutionPrime Infoserv
 
Cyber threat intelligence ppt
Cyber threat intelligence pptCyber threat intelligence ppt
Cyber threat intelligence pptKumar Gaurav
 
Introduction to Network Security
Introduction to Network SecurityIntroduction to Network Security
Introduction to Network SecurityJohn Ely Masculino
 
Risk Management and Security in Strategic Planning
Risk Management and Security in Strategic PlanningRisk Management and Security in Strategic Planning
Risk Management and Security in Strategic PlanningKeyaan Williams
 

What's hot (20)

Data Loss Threats and Mitigations
Data Loss Threats and MitigationsData Loss Threats and Mitigations
Data Loss Threats and Mitigations
 
DLP
DLPDLP
DLP
 
Symantec Data Loss Prevention 11
Symantec Data Loss Prevention 11Symantec Data Loss Prevention 11
Symantec Data Loss Prevention 11
 
Introducing Data Loss Prevention 14
Introducing Data Loss Prevention 14Introducing Data Loss Prevention 14
Introducing Data Loss Prevention 14
 
Overview of Data Loss Prevention (DLP) Technology
Overview of Data Loss Prevention (DLP) TechnologyOverview of Data Loss Prevention (DLP) Technology
Overview of Data Loss Prevention (DLP) Technology
 
Symantec Data Loss Prevention - Technical Proposal (General)
Symantec Data Loss Prevention - Technical Proposal (General)Symantec Data Loss Prevention - Technical Proposal (General)
Symantec Data Loss Prevention - Technical Proposal (General)
 
Data Leakage Prevention (DLP)
Data Leakage Prevention (DLP)Data Leakage Prevention (DLP)
Data Leakage Prevention (DLP)
 
Dlp notes
Dlp notesDlp notes
Dlp notes
 
DLP Data leak prevention
DLP Data leak preventionDLP Data leak prevention
DLP Data leak prevention
 
Endpoint Protection
Endpoint ProtectionEndpoint Protection
Endpoint Protection
 
Microsoft 365 Enterprise Security with E5 Overview
Microsoft 365 Enterprise Security with E5 OverviewMicrosoft 365 Enterprise Security with E5 Overview
Microsoft 365 Enterprise Security with E5 Overview
 
Cybersecurity roadmap : Global healthcare security architecture
Cybersecurity roadmap : Global healthcare security architectureCybersecurity roadmap : Global healthcare security architecture
Cybersecurity roadmap : Global healthcare security architecture
 
Security architecture
Security architectureSecurity architecture
Security architecture
 
Best Practices for Implementing Data Loss Prevention (DLP)
Best Practices for Implementing Data Loss Prevention (DLP)Best Practices for Implementing Data Loss Prevention (DLP)
Best Practices for Implementing Data Loss Prevention (DLP)
 
Data Loss Prevention: Challenges, Impacts & Effective Strategies
Data Loss Prevention: Challenges, Impacts & Effective StrategiesData Loss Prevention: Challenges, Impacts & Effective Strategies
Data Loss Prevention: Challenges, Impacts & Effective Strategies
 
Forcepoint Dynamic Data Protection
Forcepoint Dynamic Data ProtectionForcepoint Dynamic Data Protection
Forcepoint Dynamic Data Protection
 
PaloAlto Enterprise Security Solution
PaloAlto Enterprise Security SolutionPaloAlto Enterprise Security Solution
PaloAlto Enterprise Security Solution
 
Cyber threat intelligence ppt
Cyber threat intelligence pptCyber threat intelligence ppt
Cyber threat intelligence ppt
 
Introduction to Network Security
Introduction to Network SecurityIntroduction to Network Security
Introduction to Network Security
 
Risk Management and Security in Strategic Planning
Risk Management and Security in Strategic PlanningRisk Management and Security in Strategic Planning
Risk Management and Security in Strategic Planning
 

Viewers also liked

SolarWinds IT Security Survey - February 2013
SolarWinds IT Security Survey - February 2013SolarWinds IT Security Survey - February 2013
SolarWinds IT Security Survey - February 2013SolarWinds
 
Symantec DLP Certificate 2015
Symantec DLP Certificate 2015Symantec DLP Certificate 2015
Symantec DLP Certificate 2015Elizabeth L
 
DSS ITSEC 2013 Conference 07.11.2013 - For your eyes only - Symantec PGP Re-L...
DSS ITSEC 2013 Conference 07.11.2013 - For your eyes only - Symantec PGP Re-L...DSS ITSEC 2013 Conference 07.11.2013 - For your eyes only - Symantec PGP Re-L...
DSS ITSEC 2013 Conference 07.11.2013 - For your eyes only - Symantec PGP Re-L...Andris Soroka
 
Be Aware Webinar – INTEGRANDO O SYMANTEC DATA LOSS PREVENTION COM APLICAÇÕES ...
Be Aware Webinar – INTEGRANDO O SYMANTEC DATA LOSS PREVENTION COM APLICAÇÕES ...Be Aware Webinar – INTEGRANDO O SYMANTEC DATA LOSS PREVENTION COM APLICAÇÕES ...
Be Aware Webinar – INTEGRANDO O SYMANTEC DATA LOSS PREVENTION COM APLICAÇÕES ...Symantec Brasil
 
Symantec AntiSpam Complete Overview (PowerPoint)
Symantec AntiSpam Complete Overview (PowerPoint)Symantec AntiSpam Complete Overview (PowerPoint)
Symantec AntiSpam Complete Overview (PowerPoint)webhostingguy
 
Data Leakage Prevention (DLP)
Data Leakage Prevention (DLP)Data Leakage Prevention (DLP)
Data Leakage Prevention (DLP)Haris Tahir
 
Lions, Tigers, and PHI, Oh My! The latest in data loss prevention in the cloud.
Lions, Tigers, and PHI, Oh My! The latest in data loss prevention in the cloud.Lions, Tigers, and PHI, Oh My! The latest in data loss prevention in the cloud.
Lions, Tigers, and PHI, Oh My! The latest in data loss prevention in the cloud.Netskope
 
Symantec Endpoint Protection 12
Symantec Endpoint Protection 12Symantec Endpoint Protection 12
Symantec Endpoint Protection 12Symantec
 
Shariyaz abdeen data leakage prevention presentation
Shariyaz abdeen   data leakage prevention presentationShariyaz abdeen   data leakage prevention presentation
Shariyaz abdeen data leakage prevention presentationShariyaz Abdeen
 
Symantec and ForeScout Delivering a Unified Cyber Security Solution
Symantec and ForeScout Delivering a Unified Cyber Security SolutionSymantec and ForeScout Delivering a Unified Cyber Security Solution
Symantec and ForeScout Delivering a Unified Cyber Security SolutionDLT Solutions
 
apsec 7 Golden Rules Data Leakage Prevention / DLP
apsec 7 Golden Rules Data Leakage Prevention / DLPapsec 7 Golden Rules Data Leakage Prevention / DLP
apsec 7 Golden Rules Data Leakage Prevention / DLPandreasschuster
 
Symantec Endpoint Protection Enterprise Edition Best Practices Guidelines
Symantec Endpoint Protection Enterprise Edition Best Practices GuidelinesSymantec Endpoint Protection Enterprise Edition Best Practices Guidelines
Symantec Endpoint Protection Enterprise Edition Best Practices GuidelinesSree Harsha Boyapati
 

Viewers also liked (13)

SolarWinds IT Security Survey - February 2013
SolarWinds IT Security Survey - February 2013SolarWinds IT Security Survey - February 2013
SolarWinds IT Security Survey - February 2013
 
Symantec DLP Certificate 2015
Symantec DLP Certificate 2015Symantec DLP Certificate 2015
Symantec DLP Certificate 2015
 
DSS ITSEC 2013 Conference 07.11.2013 - For your eyes only - Symantec PGP Re-L...
DSS ITSEC 2013 Conference 07.11.2013 - For your eyes only - Symantec PGP Re-L...DSS ITSEC 2013 Conference 07.11.2013 - For your eyes only - Symantec PGP Re-L...
DSS ITSEC 2013 Conference 07.11.2013 - For your eyes only - Symantec PGP Re-L...
 
Be Aware Webinar – INTEGRANDO O SYMANTEC DATA LOSS PREVENTION COM APLICAÇÕES ...
Be Aware Webinar – INTEGRANDO O SYMANTEC DATA LOSS PREVENTION COM APLICAÇÕES ...Be Aware Webinar – INTEGRANDO O SYMANTEC DATA LOSS PREVENTION COM APLICAÇÕES ...
Be Aware Webinar – INTEGRANDO O SYMANTEC DATA LOSS PREVENTION COM APLICAÇÕES ...
 
Symantec AntiSpam Complete Overview (PowerPoint)
Symantec AntiSpam Complete Overview (PowerPoint)Symantec AntiSpam Complete Overview (PowerPoint)
Symantec AntiSpam Complete Overview (PowerPoint)
 
Data Leakage Prevention (DLP)
Data Leakage Prevention (DLP)Data Leakage Prevention (DLP)
Data Leakage Prevention (DLP)
 
Lions, Tigers, and PHI, Oh My! The latest in data loss prevention in the cloud.
Lions, Tigers, and PHI, Oh My! The latest in data loss prevention in the cloud.Lions, Tigers, and PHI, Oh My! The latest in data loss prevention in the cloud.
Lions, Tigers, and PHI, Oh My! The latest in data loss prevention in the cloud.
 
Symantec Endpoint Protection 12
Symantec Endpoint Protection 12Symantec Endpoint Protection 12
Symantec Endpoint Protection 12
 
Shariyaz abdeen data leakage prevention presentation
Shariyaz abdeen   data leakage prevention presentationShariyaz abdeen   data leakage prevention presentation
Shariyaz abdeen data leakage prevention presentation
 
Symantec and ForeScout Delivering a Unified Cyber Security Solution
Symantec and ForeScout Delivering a Unified Cyber Security SolutionSymantec and ForeScout Delivering a Unified Cyber Security Solution
Symantec and ForeScout Delivering a Unified Cyber Security Solution
 
apsec 7 Golden Rules Data Leakage Prevention / DLP
apsec 7 Golden Rules Data Leakage Prevention / DLPapsec 7 Golden Rules Data Leakage Prevention / DLP
apsec 7 Golden Rules Data Leakage Prevention / DLP
 
Symantec Endpoint Protection Enterprise Edition Best Practices Guidelines
Symantec Endpoint Protection Enterprise Edition Best Practices GuidelinesSymantec Endpoint Protection Enterprise Edition Best Practices Guidelines
Symantec Endpoint Protection Enterprise Edition Best Practices Guidelines
 
Project management
Project managementProject management
Project management
 

Similar to Symantec Data Loss Prevention 9

Threat Ready Data: Protect Data from the Inside and the Outside
Threat Ready Data: Protect Data from the Inside and the OutsideThreat Ready Data: Protect Data from the Inside and the Outside
Threat Ready Data: Protect Data from the Inside and the OutsideDLT Solutions
 
Protect your sensitive data against data leaks with Safetica DLP
Protect your sensitive data against data leaks with Safetica DLPProtect your sensitive data against data leaks with Safetica DLP
Protect your sensitive data against data leaks with Safetica DLPAdi Saputra
 
(Slides) What's Yours Is Mine: How Employess Are Putting Your Sensitive Data ...
(Slides) What's Yours Is Mine: How Employess Are Putting Your Sensitive Data ...(Slides) What's Yours Is Mine: How Employess Are Putting Your Sensitive Data ...
(Slides) What's Yours Is Mine: How Employess Are Putting Your Sensitive Data ...infoLock Technologies
 
Ibm ofa ottawa_ how_secure_is_your_data_eric_offenberg
Ibm ofa ottawa_ how_secure_is_your_data_eric_offenbergIbm ofa ottawa_ how_secure_is_your_data_eric_offenberg
Ibm ofa ottawa_ how_secure_is_your_data_eric_offenbergdawnrk
 
Ibm ofa ottawa_ how_secure_is_your_data_eric_offenberg
Ibm ofa ottawa_ how_secure_is_your_data_eric_offenbergIbm ofa ottawa_ how_secure_is_your_data_eric_offenberg
Ibm ofa ottawa_ how_secure_is_your_data_eric_offenbergdawnrk
 
Encryption and Key Management: Ensuring Compliance, Privacy, and Minimizing t...
Encryption and Key Management: Ensuring Compliance, Privacy, and Minimizing t...Encryption and Key Management: Ensuring Compliance, Privacy, and Minimizing t...
Encryption and Key Management: Ensuring Compliance, Privacy, and Minimizing t...IBM Security
 
Life After Compliance march 2010 v2
Life After Compliance march 2010 v2Life After Compliance march 2010 v2
Life After Compliance march 2010 v2SafeNet
 
Preventing Data Breaches
Preventing Data BreachesPreventing Data Breaches
Preventing Data Breachesxband
 
Bridging the Gap Between Your Security Defenses and Critical Data
Bridging the Gap Between Your Security Defenses and Critical DataBridging the Gap Between Your Security Defenses and Critical Data
Bridging the Gap Between Your Security Defenses and Critical DataIBM Security
 
The Definitive Guide to Data Loss Prevention
The Definitive Guide to Data Loss PreventionThe Definitive Guide to Data Loss Prevention
The Definitive Guide to Data Loss PreventionDigital Guardian
 
Data security in a big data environment sweden
Data security in a big data environment   swedenData security in a big data environment   sweden
Data security in a big data environment swedenIBM Sverige
 
Be Aware Webinar Symantec-Maxímice su prevención hacia la fuga de la información
Be Aware Webinar Symantec-Maxímice su prevención hacia la fuga de la informaciónBe Aware Webinar Symantec-Maxímice su prevención hacia la fuga de la información
Be Aware Webinar Symantec-Maxímice su prevención hacia la fuga de la informaciónSymantec LATAM
 
Content is King - Symantec
Content is King - SymantecContent is King - Symantec
Content is King - SymantecHarry Gunns
 
Addressing the cyber kill chain
Addressing the cyber kill chainAddressing the cyber kill chain
Addressing the cyber kill chainSymantec Brasil
 
Symantec Webinar Part 5 of 6 GDPR Compliance, the Operational Impact of Cross...
Symantec Webinar Part 5 of 6 GDPR Compliance, the Operational Impact of Cross...Symantec Webinar Part 5 of 6 GDPR Compliance, the Operational Impact of Cross...
Symantec Webinar Part 5 of 6 GDPR Compliance, the Operational Impact of Cross...Symantec
 
Information security trends and concerns
Information security trends and concernsInformation security trends and concerns
Information security trends and concernsJohn Napier
 
Symantec Webinar Part 1 of 6 The Four Stages of GDPR Readiness
Symantec Webinar Part 1 of 6 The Four Stages of GDPR ReadinessSymantec Webinar Part 1 of 6 The Four Stages of GDPR Readiness
Symantec Webinar Part 1 of 6 The Four Stages of GDPR ReadinessSymantec
 

Similar to Symantec Data Loss Prevention 9 (20)

Threat Ready Data: Protect Data from the Inside and the Outside
Threat Ready Data: Protect Data from the Inside and the OutsideThreat Ready Data: Protect Data from the Inside and the Outside
Threat Ready Data: Protect Data from the Inside and the Outside
 
Protect your sensitive data against data leaks with Safetica DLP
Protect your sensitive data against data leaks with Safetica DLPProtect your sensitive data against data leaks with Safetica DLP
Protect your sensitive data against data leaks with Safetica DLP
 
(Slides) What's Yours Is Mine: How Employess Are Putting Your Sensitive Data ...
(Slides) What's Yours Is Mine: How Employess Are Putting Your Sensitive Data ...(Slides) What's Yours Is Mine: How Employess Are Putting Your Sensitive Data ...
(Slides) What's Yours Is Mine: How Employess Are Putting Your Sensitive Data ...
 
Ibm ofa ottawa_ how_secure_is_your_data_eric_offenberg
Ibm ofa ottawa_ how_secure_is_your_data_eric_offenbergIbm ofa ottawa_ how_secure_is_your_data_eric_offenberg
Ibm ofa ottawa_ how_secure_is_your_data_eric_offenberg
 
Ibm ofa ottawa_ how_secure_is_your_data_eric_offenberg
Ibm ofa ottawa_ how_secure_is_your_data_eric_offenbergIbm ofa ottawa_ how_secure_is_your_data_eric_offenberg
Ibm ofa ottawa_ how_secure_is_your_data_eric_offenberg
 
Encryption and Key Management: Ensuring Compliance, Privacy, and Minimizing t...
Encryption and Key Management: Ensuring Compliance, Privacy, and Minimizing t...Encryption and Key Management: Ensuring Compliance, Privacy, and Minimizing t...
Encryption and Key Management: Ensuring Compliance, Privacy, and Minimizing t...
 
Life After Compliance march 2010 v2
Life After Compliance march 2010 v2Life After Compliance march 2010 v2
Life After Compliance march 2010 v2
 
Preventing Data Breaches
Preventing Data BreachesPreventing Data Breaches
Preventing Data Breaches
 
Bridging the Gap Between Your Security Defenses and Critical Data
Bridging the Gap Between Your Security Defenses and Critical DataBridging the Gap Between Your Security Defenses and Critical Data
Bridging the Gap Between Your Security Defenses and Critical Data
 
BREACHED: Data Centric Security for SAP
BREACHED: Data Centric Security for SAPBREACHED: Data Centric Security for SAP
BREACHED: Data Centric Security for SAP
 
The Definitive Guide to Data Loss Prevention
The Definitive Guide to Data Loss PreventionThe Definitive Guide to Data Loss Prevention
The Definitive Guide to Data Loss Prevention
 
Data security in a big data environment sweden
Data security in a big data environment   swedenData security in a big data environment   sweden
Data security in a big data environment sweden
 
Be Aware Webinar Symantec-Maxímice su prevención hacia la fuga de la información
Be Aware Webinar Symantec-Maxímice su prevención hacia la fuga de la informaciónBe Aware Webinar Symantec-Maxímice su prevención hacia la fuga de la información
Be Aware Webinar Symantec-Maxímice su prevención hacia la fuga de la información
 
Content is King - Symantec
Content is King - SymantecContent is King - Symantec
Content is King - Symantec
 
Addressing the cyber kill chain
Addressing the cyber kill chainAddressing the cyber kill chain
Addressing the cyber kill chain
 
Perimeter Security is Failing
Perimeter Security is FailingPerimeter Security is Failing
Perimeter Security is Failing
 
Symantec Webinar Part 5 of 6 GDPR Compliance, the Operational Impact of Cross...
Symantec Webinar Part 5 of 6 GDPR Compliance, the Operational Impact of Cross...Symantec Webinar Part 5 of 6 GDPR Compliance, the Operational Impact of Cross...
Symantec Webinar Part 5 of 6 GDPR Compliance, the Operational Impact of Cross...
 
Information security trends and concerns
Information security trends and concernsInformation security trends and concerns
Information security trends and concerns
 
Information security for small business
Information security for small businessInformation security for small business
Information security for small business
 
Symantec Webinar Part 1 of 6 The Four Stages of GDPR Readiness
Symantec Webinar Part 1 of 6 The Four Stages of GDPR ReadinessSymantec Webinar Part 1 of 6 The Four Stages of GDPR Readiness
Symantec Webinar Part 1 of 6 The Four Stages of GDPR Readiness
 

Symantec Data Loss Prevention 9

  • 1. Symantec Data Loss Prevention Las tendencias mundiales nos muestran que el mayor porcentaje de perdida y robo de datos responde a la falta de visibilidad y el error en el manejo de los mismos. Conozca como prevenirse. Ariel Beliera, Account Systems EngineerFrancisco Della Paolera, Corporate Business Manager Symantec South of Latin-American Region Vontu: Now Part of Symantec
  • 2. 2 Key Questions Facing Today’s CISO What are the challenges? What is Data Loss Prevention (DLP)? Why Symantec DLP and how does it work? Why customers choose Symantec DLP?
  • 3. 3 CORPORATIONSWITHOUT WALLS DATA EXPLOSION THE ROLEOF SECURITY The Vanishing Perimeter The Office is “Anywhere” Outsourcing and Offshoring Data is Everywhere Structured Data, Unstructured Content IP, Customer, and Classified Data Risk and Compliance Business Enabler Limited Budget Security for a Wide Open World CONFIDENTIAL
  • 4. Do You Know… How best to prevent its loss? How is it being used? Where is your confidential data? 4
  • 5. What is Data Loss Prevention? DISCOVER PROTECT MONITOR DATA LOSS PREVENTION (DLP) 5
  • 6.
  • 7. Create inventory of sensitive data
  • 9. Understand how data is being used
  • 12. Gain visibility into policy violations
  • 14.
  • 15. Define unified policy across enterprise
  • 17.
  • 18. Run scan to find sensitive data on network & endpoint data
  • 20. Monitor network & endpoint events
  • 23.
  • 24. How Is Symantec DLP Different? 8
  • 25.
  • 33. All SQL databases natively
  • 36. Internal and external web sites9
  • 37.
  • 41. Monitor online and offline users
  • 48.
  • 49. Active blocking at the endpoint
  • 52. Automatically quarantine, copy, remove data in violation of policy
  • 57.
  • 62. Trend and risk reporting
  • 64. Structured data in databases and tabular format
  • 66. Describe content using keywords and lexicons12
  • 67.
  • 74. Protect brand & customers
  • 75.
  • 76. Symantec DLP Architecture MTA or Proxy NETWORKPROTECT DISCOVER STORAGE NETWORKPREVENT ENFORCEPLATFORM MONITOR NETWORK MANAGEMENTPLATFORM ENDPOINTPREVENT SPAN Port or Tap DISCOVER ENDPOINT DMZ SECURED CORPORATE LAN Disconnected 15
  • 77. Continuous Risk Reduction Baseline 1000 Remediation 800 Notification 600 Incidents Per Week 400 Prevention 200 0 Risk Reduction Over Time 16
  • 78. Gartner Magic Quadrant for Content-Aware Data Loss Prevention Symantec positioned in the leaders quadrant in the Gartner Magic Quadrant for Content-Aware Data Loss Prevention, 2009 This Magic Quadrant graphic was published by Gartner, Inc. as part of a larger research note and should be evaluated in the context of the entire report. The Gartner report is available upon request from Symantec. The Magic Quadrant is copyrighted June 2009 by Gartner, Inc. and is reused with permission. The Magic Quadrant is a graphical representation of a marketplace at and for a specific time period. It depicts Gartner’s analysis of how certain vendors measure against criteria for that marketplace, as defined by Gartner. Gartner does not endorse any vendor, product or service depicted in the Magic Quadrant, and does not advise technology users to select only those vendors placed in the “Leaders” quadrant. The Magic Quadrant is intended solely as a research tool, and is not meant to be a specific guide to action. Gartner disclaims all warranties, express or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose. Source: Magic Quadrant for Content-Aware Data Loss Prevention; by Eric Ouellet, Paul E. Proctor; June 22, 2009 17
  • 79. Why Symantec DLP is the Safe Choice Measurable Risk Reduction Complete Coverage Only Unified Data Loss Prevention Solution Global Market Leader 18
  • 80. Next Steps Evaluation Workshop & Demo Evaluation Customer Reference Checks 19
  • 81. Thank You! Ariel Beliera Ariel_Beliera@symantec.com +5491167151656 © 2008 Symantec Corporation. All rights reserved.   THIS DOCUMENT IS PROVIDED FOR INFORMATIONAL PURPOSES ONLY AND IS NOT INTENDED AS ADVERTISING. ALL WARRANTIES RELATING TO THE INFORMATION IN THIS DOCUMENT, EITHER EXPRESS OR IMPLIED, ARE DISCLAIMED TO THE MAXIMUM EXTENT ALLOWED BY LAW. THE INFORMATION IN THIS DOCUMENT IS SUBJECT TO CHANGE WITHOUT NOTICE. 20
  • 83. The Shift in Data Security Threat Insider vs. The Hacker Inadvertent vs. Malicious Breaches since 2005: 1380 and counting > 318M records 96% of leaks are due to faulty processes or oversight 1% malicious Other 1% manager approved 50% of leakage is due to business process 46% of leakage is due to employee oversight Hacker 48% Insider 52% Data compiled from industry sources including EPIC.org and PerkinsCoie.com. Source: Symantec Data Loss Prevention Risk Assessment findings. 22 Symantec Confidential - Do Not Copy or Distribute
  • 84. Impact of Data Loss £47 per Consumer Record in UK 318 Million Records Breached Since 2005 $600 Billion IP Theft a Year Globally Cross Industry…. 23 Symantec Confidential - Do Not Copy or Distribute
  • 85. 318 million personal records have been exposed by data breaches since 20051 85% of security execs claimed at least one reportable security breach involving data loss in the last year2 52% of Chief Information Security Officers believe data leakage to be a top driver of their security spending3 65% increase in spending on Data Loss Prevention since 06, as the number one most promising new security technology4 Top of Mind for Chief Information Security Officers 24 Growing Concern
  • 86. What is Data Loss Prevention? How best to prevent its loss? How is it being used? Where is your confidential data? DISCOVER PROTECT MONITOR DATA LOSS PREVENTION (DLP) 25
  • 87. Data Loss Prevention Drivers Customer Data Social Security Numbers Credit Card Numbers Protected Health Info Corporate Data Financials Mergers and Acquisitions Employee Data Intellectual Property Source Code Design Documents Pricing Confidential Data Types 1:400 messages contains confidential data 1:50 network files is wrongly exposed The Risk The Risk 4:5 companies lost dataon laptops 1:2 companies lost dataon USB drives 26
  • 88. Symantec Data Loss Prevention PROTECT MANAGE DISCOVER MONITOR Endpoint Network Storage Symantec Data Loss Prevention Endpoint Discover Symantec Data Loss Prevention Network Monitor Symantec Data Loss Prevention Network Monitor Symantec Data Loss Prevention Endpoint Discover Symantec Data Loss Prevention Network Discover Symantec Data Loss Prevention Network Discover Symantec Data Loss Prevention Network Protect Symantec Data Loss Prevention Endpoint Prevent Symantec Data Loss Prevention Network Prevent Symantec Data Loss Prevention Network Prevent Symantec Data Loss Prevention Network Protect Symantec Data Loss Prevention Endpoint Prevent Symantec Data Loss Prevention Endpoint Prevent Management Platform Symantec Data Loss Prevention Enforce Platform
  • 89. Network Symantec Data Loss Prevention Network Monitor Symantec Data Loss Prevention Network Prevent Symantec Data Loss Prevention Endpoint Storage Symantec Data Loss Prevention Endpoint Discover Symantec Data Loss Prevention Network Discover Symantec Data Loss Prevention Endpoint Prevent Symantec Data Loss Prevention Network Protect Management Platform Symantec Data Loss Prevention Enforce Platform
  • 90. DLP Complements Symantec Solutions Symantec Data Loss Prevention Complementary Symantec Solutions Network Symantec DLP Network Prevent Symantec DLP Network Monitor Symantec Brightmail Gateway* Symantec IM Manager Endpoint Symantec DLP Endpoint Prevent Symantec DLP Endpoint Discover Symantec Management Console Symantec Endpoint Encryption Symantec Network Acess Control Symantec Endpoint Protection Storage Symantec Backup Exec System Recovery Symantec DLP Network Protect Symantec DLPNetwork Discover SymantecVeritas Netbackup SymantecEnterprise Vault SymantecBackup Exec ManagementPlatform Symantec DLP Enforce Platform Symantec Control Compliance Suite Symantec Security InformationManager** Symantec Enterprise Security Manager 29 *Formerly known as Symantec Mail Security 8300 ** In the process of being incorporated into Symantec Control Compliance Suite
  • 91.
  • 98. Asian
  • 108. PHI
  • 109. PII
  • 116. SSNs
  • 118. KeywordsLocation Unstructured + + Language Described Storage Container 30
  • 119. Symantec DLP TrueMatch™ Detection IDMIndexed Document Matching EDMExact Data Matching DCMDescribed Content Matching Structured DataCustomer Data Unstructured DataIntellectual Property Described Data • Non-indexable data• Lexicons• Data identifiers • Designs/Source/Financials• Derivative & passage match• Near perfect accuracy • Customer/Employee/Pricing • Partial row matching • Near perfect accuracy • 5M+ docs per server • 300M+ rows per server 31 31
  • 120. Complete Coverage: Discover Find data wherever it is stored File servers Distributed machines Document and email repositories Web content and applications Databases Create inventory of sensitive data Scheduled scanning Incremental scanning “Out of compliance” scan mode Manage data clean up Incident match count File details (date, owner) Access control information Data owner look up 32 32 32
  • 121. Complete Coverage: Monitor Understand how data is being used Network protocol coverage Endpoint event coverage Content- and context-aware detection Automated sender/manager notification Monitor on the network Standard hardware Signature-based protocol recognition Gigabit monitoring without “sampling” or dropped packets Queue incidents Monitor at the endpoint Online and offline Unmanaged devices and OSes On-screen pop up notification
  • 122. Complete Coverage: Protect Proactively secure stored data Relocate data to an encrypted location Automatically quarantine, copy, or remove data Broadest scan target coverage Prevent confidential data loss Real-time blocking on network and endpoint Conditionally quarantine/route emails for encryption Selectively remove content from web postings Certified ICAP integration with leading web proxies Support for all SMTP compliant MTAs Enforce confidential data policies Real-time email notifications Seamless interaction with Web 2.0 sites On-screen pop-up notification on the endpoint “Ransom note” in place of relocated stored data 34
  • 123. Complete Coverage: Manage Universal DLP Policy “Define once, enforce everywhere” 60+ pre-built policy templates Custom detection and response rules Accurate TrueMatch Detection Content and context, enterprise scale Comprehensive EDM, IDM, and DCM Automated Remediation and Workflow Automated action and response “5 second incident triage” “One-click response” Comprehensive Reporting 40+ pre-configured reports Business unit risk assessment Scalable and Secure Management Distributed architecture with high-availability Advanced security design 35 35 35
  • 124. Symantec DLP Success Model Focus Target High-Risk Data and Identify Exposure Communicate Manage Risk, Deliver Results Design Prepare Data Loss Policy, Remediation and Risk Reduction Blueprint ACCUMULATED KNOWLEDGE Implement Protect and Prevent: Engage Users
  • 126.
  • 127. Most experts dedicated to DLP
  • 128. 30% of the FORTUNE 100
  • 129. 9 of the top 10 commercial and universal banks
  • 130. 9 of the top 10 insurance companies
  • 131. 7 of the top 10 healthcare providers
  • 132. 4 of the top 5 credit card companies

Editor's Notes

  1. Objective of Slide:Define measurable risk reductionGive three Customer resultsProblemSolutionBenefitScriptHere are three examples of Customers who use the Data Loss Prevention solution to protect their confidential data. Across industries, organizations turn to Symantec to reduce their level of data loss risk. In fact, 1 in 3 FORTUNE 100 Customers are a Symantec Data Loss Prevention Customers. Here are three Customers, from three different industries, who reduced their risk of data loss after implementing our solution:1. A leading healthcare provider needed to protect over 1 million patient records and demonstrate compliance with HIPAA (Health Insurance Portability and Accountability Act). They are using Symantec Data Loss Prevention to block Protected Health Information (PHI) from leaving their organization via email or USBs. Within one year of deploying the solution, they saw a 70% reduction in the number of data loss incidents as a result of automated policy enforcement. (Sharp HealthCare)2. A F100 Financial Services company needed to maintain their brand reputation, and protect their confidential company and customer data. They are using Symantec Data Loss Prevention to automatically send email notifications to their employees when they violate corporate data security policies. Since deploying the solution, they’ve reduced their data loss risk by 80% due to employee education. (New York Life)3. A Global Manufacturing company needed to protect their intellectual property, such as CAD diagrams, to prevent overseas competitors from stealing their product designs. They are using Symantec Data Loss Prevention’s advanced detection technology to fingerprint all of their confidential design documents and accurately detect matches against data being sent, stored or copied. As a result of the solution, they have seen a 98% reduction in unauthorized sharing of design specs. (Caterpillar)Are you experiencing similar challenges?Across industries we’ve helped organizations to safeguard their confidential information. As I mentioned 1 in 3 F100 is a Symantec DLP Customer, in fact within the F100:9 of the top 10commercial and investment banks6 of the top 10insurance companies4 of the top 5 healthcare providers4 of the top 5 credit card companies6 topenergy and utilities companies8 topmanufacturing companies12 toptechnology companies13 topretail brands14 toppublic sector organizations… are Symantec Data Loss Prevention Customers[Click]
  2. Objective of SlideDemonstrate market leadership.Communicate how global companies across industries are using Symantec Data Loss Prevention.Customize the text in the grey boxes as needed:25% of the FORTUNE 100 8 of the top 10 commercial and investment banks (Citigroup, BofA, JPMorganChase, MorganStanley, Goldman Sachs, PNC Bank, Charles Schwab, Barclays) 6 of the top 10 insurance companies (AIG, Allstate, Prudential, NY Life, The Hartford, and Progressive) 4 of the top 5 healthcare providers (UHG, Aetna, CIGNA, Humana) 4 of the top 5 credit card companies (Visa, Mastercard, Discover, AMEX)6 top energy and utilities companies (Southern, Waste Management, Xcel Energy, DTE Energy, Pinnacle West Capital, World Fuel Services) 8 top manufacturing companies (Nikon, Alliance One International, Pitney Bowes, Honeywell, CAT, Dow Corning, CHS, Northrup-Grumman) 12 top technology companies (Cisco, Finisar, NetApp, Tech Data Corp, Xerox, Cadence, Motorola, Verisign, Google, Sony, Qualcomm, Symantec!)13 top retail brands (Big Lots, Blockbuster, Cabela’s, CarMax, CVS, Dollar General, eBay/PayPal, Mary Kay, McDonald’s, Nordstrom, Retail Ventures, Safeway, United Rentals) 14 top public sector organizations (Career Education, DeVry, NYC DOE, Education Management, San Jacinto College, University of Nebraska, University of Rochester, William Rainey Harper College, DLA, DoD, FDIC, NHS, Office of Director of National Intelligence, US Army) ScriptWe are the choice of global market leaders. We have customers across various industries: healthcare, insurance, retail, financial services, manufacturing and high tech.1st column: DLP continues to gain momentum in the heath care industry where PCI compliance and HIPAA are key drivers (we have 4 of the top 5 healthcare providers – United HealthGroup, Aetna, CIGNA, Humana)2nd column: Symantec Data Loss Prevention dominates the insurance industry with 6 top insurance companies – AIG, Allstate, Prudential, New York Life, The Hartford and Progressive). 3rd column: 12 top retail brands are Symantec DLP customers and they too need to protect pricing and promotion information as well as credit card information for PCI compliance and brand protection4th column: Symantec Data Loss Prevention also dominates the financial services industry with 8 of the top 11 commercial and investment banks. 5th column: Symantec DLP customers include 10 top technology companies who need to protect Intellectual Property including source code and pricing information. We also have manufacturing customers who have purchased DLP primarily to also protect IP. Caterpillar for example needed to protect manufacturing and design documents from competition. NetApp needed to protect proprietary source code from misuse as development expands to India and China, while also defining shareable, open source code. Motorola shared with us that they had to protect their phone designs as there was a 90 day window from when a phone was launched until competitive solutions were on the market. [Click] In fact, we have been positioned as a leader in the Gartner MQ for the last 3 consecutive years. (Note this can not be printed or mentioned in a public recording) . We have the most experts dedicated to Data Loss Prevention. One in four FORTUNE 100 companies is a Symantec DLP customer.
  3. Objective of SlideDemonstrate market leadership.Communicate how global companies across industries are using Symantec Data Loss Prevention.Customize the text in the grey boxes as needed:25% of the FORTUNE 100 8 of the top 10 commercial and investment banks (Citigroup, BofA, JPMorganChase, MorganStanley, Goldman Sachs, PNC Bank, Charles Schwab, Barclays) 6 of the top 10 insurance companies (AIG, Allstate, Prudential, NY Life, The Hartford, and Progressive) 4 of the top 5 healthcare providers (UHG, Aetna, CIGNA, Humana) 4 of the top 5 credit card companies (Visa, Mastercard, Discover, AMEX)6 top energy and utilities companies (Southern, Waste Management, Xcel Energy, DTE Energy, Pinnacle West Capital, World Fuel Services) 8 top manufacturing companies (Nikon, Alliance One International, Pitney Bowes, Honeywell, CAT, Dow Corning, CHS, Northrup-Grumman) 12 top technology companies (Cisco, Finisar, NetApp, Tech Data Corp, Xerox, Cadence, Motorola, Verisign, Google, Sony, Qualcomm, Symantec!)13 top retail brands (Big Lots, Blockbuster, Cabela’s, CarMax, CVS, Dollar General, eBay/PayPal, Mary Kay, McDonald’s, Nordstrom, Retail Ventures, Safeway, United Rentals) 14 top public sector organizations (Career Education, DeVry, NYC DOE, Education Management, San Jacinto College, University of Nebraska, University of Rochester, William Rainey Harper College, DLA, DoD, FDIC, NHS, Office of Director of National Intelligence, US Army) ScriptWe are the choice of global market leaders. We have customers across various industries: healthcare, insurance, retail, financial services, manufacturing and high tech.1st column: DLP continues to gain momentum in the heath care industry where PCI compliance and HIPAA are key drivers (we have 4 of the top 5 healthcare providers – United HealthGroup, Aetna, CIGNA, Humana)2nd column: Symantec Data Loss Prevention dominates the insurance industry with 6 top insurance companies – AIG, Allstate, Prudential, New York Life, The Hartford and Progressive). 3rd column: 12 top retail brands are Symantec DLP customers and they too need to protect pricing and promotion information as well as credit card information for PCI compliance and brand protection4th column: Symantec Data Loss Prevention also dominates the financial services industry with 8 of the top 11 commercial and investment banks. 5th column: Symantec DLP customers include 10 top technology companies who need to protect Intellectual Property including source code and pricing information. We also have manufacturing customers who have purchased DLP primarily to also protect IP. Caterpillar for example needed to protect manufacturing and design documents from competition. NetApp needed to protect proprietary source code from misuse as development expands to India and China, while also defining shareable, open source code. Motorola shared with us that they had to protect their phone designs as there was a 90 day window from when a phone was launched until competitive solutions were on the market. [Click] In fact, we have been positioned as a leader in the Gartner MQ for the last 3 consecutive years. (Note this can not be printed or mentioned in a public recording) . We have the most experts dedicated to Data Loss Prevention. One in four FORTUNE 100 companies is a Symantec DLP customer.