SlideShare a Scribd company logo
SYMANTEC: SOLUTION OVERVIEW SERIES
Symantec Data Loss Prevention
Iftikhar Ali Iqbal
https://www.linkedin.com/in/iftikhariqbal/
Valid till May 2016
Agenda
Company Overview1
Solution Portfolio2
Features, Architecture, Design and Licensing4
SYMANTEC: Data Loss Prevention
Look and Feel5
Symantec Data Loss Prevention3
OVERVIEW: SYMANTEC
SYMANTEC: Data Loss Prevention
OVERVIEW: SYMANTEC
• Founded in 1982
• Headquartered in California, United States
• Fortune 500 company
• Provides Software and Services
• Focus is on Consumer Security and Enterprise Security
• 2014 Revenue:
– $6.7 billion (ended March 28, 2014)
– Information Security: $4.2 billion
• 2014 Market Share:
– Largest security software vendor by revenue and market share (17.2%)
(Gartner) - http://www.gartner.com/newsroom/id/3062017
SYMANTEC: Data Loss Prevention
OVERVIEW: THE SPLIT
• On 1st October 2015, Symantec’s Information Management
business now operates as a separate privately held company
Veritas Technologies Corporation
• Solutions:
– Backup and Recovery
– Archiving
– High-Availability
– Disaster Recovery
• Separate operations, partner programs, support, etc.
SYMANTEC: Data Loss Prevention
OVERVIEW: AREAS OF FOCUS
• Solutions to Protect against:
– Malware and Spam
– Advanced Persistent Threats and Cyber Attacks
– Identity Theft and Loss of Confidential Information
• Solutions to Manage:
– Governance, Risk and Compliance
– Client, Asset, Server and Mobility
• Services:
– Product Support
– Cyber Security
– Education
SYMANTEC: Data Loss Prevention
SYMANTEC: PORTFOLIO
SYMANTEC: Data Loss Prevention
PORTFOLIO: NUTSHELL
Cyber Security Services
• Monitoring , Incident Response, Simulation, Adversary Threat Intelligence
Threat Protection
ENDPOINTS DATA CENTER GATEWAY
• Threat Prevention, Detection, Forensics & Resolution
• Device, Email, Server, Virtual & Cloud Workloads
• Available On-premise and Cloud
Unified Security Analytics Platform
• Big data security analytics; available to customers in self-service mode
Telemetry
Incident
Management
Protection
Engines
Global
Intelligence
Threat
Analytics
Information Protection
DATA ACCESS
• Identity and Data Loss Protection
• Cloud-based Key Management
• Cloud Security Broker
Users
Data
Apps
Cloud
Devices
Network
Data Center
SYMANTEC: Data Loss Prevention
SYMANTEC: Data Loss Prevention
SYMANTEC: DATA LOSS PREVENTION
Introduction, Components and Features
DATA LOSS PREVENTION: INTRODUCTION
SYMANTEC: Data Loss Prevention
Locate where your sensitive information
resides across your cloud, mobile, network,
endpoint and storage systems
Discover
Understand how your sensitive information
is being used, including what data is being
handled and by whom
Monitor
Stop sensitive information from being
leaked or stolen by enforcing data loss
policies and educating employees
Protect
Where does your
confidential data live?
How is it being used?
How do you prevent
data loss?
DATA LOSS PREVENTION: COMPONENTS
SYMANTEC: Data Loss Prevention
DLP Enforce Platform
DLP for Endpoint
DLP for Network
DLP for Storage
DLP for Mobile
DLP for Cloud
DATA LOSS PREVENTION: COMPONENTS
SYMANTEC: Data Loss Prevention
DLP Enforce Platform
- Management Platform
- Build and Deploy Policies
- Automate Enforcement
- Measure Risk Reduction
- Demonstrate Compliance
- Workflow Remediation
DATA LOSS PREVENTION: COMPONENTS
SYMANTEC: Data Loss Prevention
DLP for Endpoint
- DLP Endpoint Discover
- DLP Agent
- Detects Sensitive Data
- Collect Data on Activity
- Send Incidents to Endpoint Server
- DLP Endpoint Prevent
- DLP Agent (Same as above)
- Prevents Sensitive Data Leaving
- Detects Data Transfers:
• Application Monitoring
• Local Drives
• CD/DVD
• Clipboard
• Email/SMTP
• eSATA
• FTP
• HTTP/HTTPS
• IM
• Network Shares
• Print/Fax
• USB
DATA LOSS PREVENTION: COMPONENTS
SYMANTEC: Data Loss Prevention
DLP for Network
- DLP Network Monitor
- Capture & Analyze Traffic
- SPAN/TAP
- Define Protocols
- SMTP, FTP, HTTP, Various IM
- Custom Protocols
- DLP Network Prevent for Email
- Outbound Email Traffic
- SMTP-Compliant MTA
- Monitor, Analyze, Block, Redirect
or Modify
- DLP Network Prevent for Web
- ICAP-Compliant Proxy Servers
- HTTP, HTTPS or FTP Content
- Proxy Rejects Requests or remove
HTML content
DATA LOSS PREVENTION: COMPONENTS
SYMANTEC: Data Loss Prevention
DLP for Storage
- DLP Network Discover
- Scans Data Repositories
- Cloud Storage (Box Enterprise)
- Networked File Shares
- Databases
- Document Repositories
- Integrate with Veritas Data Insight
- DLP Network Protect
- Removes Exposed Data
- Quarantine and Restore
- Visual Tags/Marker File
- Enforce Access Control
DATA LOSS PREVENTION: COMPONENTS
SYMANTEC: Data Loss Prevention
DLP for Mobile
- DLP Mobile Email Monitor
- Microsoft ActiveSync
- Emails Sent
- Information Downloaded
- Databases
- Document Repositories
- DLP Mobile Prevent
- Monitor and Prevent Web &
Application Communications
- VPN Profile (ex, MDM)
- HTTP, HTTPS or FTP Traffic
DATA LOSS PREVENTION: COMPONENTS
SYMANTEC: Data Loss Prevention
DLP for Cloud
- DLP Cloud Service for Email
- Symantec Cloud
- Monitor & Block
- Microsoft Office 365
- Gmail for Business
- Symantec Email Security.Cloud
- Email Delivery
- Antispam & Anti-malware
- DLP Prevent for Microsoft Office 365
- Azure/Rackspace/AWS
- Monitor & Block
- Symantec Email Security.Cloud
- Email Delivery
DLP Management Server (Enforce) is on-premise
- DLP Cloud Storage (Box Enterprise)
- Scan Box cloud storage
- Scan files, folders + shared links
- Quarantine and/or visual tags
DATA LOSS PREVENTION: UNIFED CONTENT-AWARE SOLUTION
SYMANTEC: Data Loss Prevention
Unified
Management
Box
Office 365
iOS
Email
Web
FTP
IM
USB
Hard Drives
Removable Storage
Network Shares
Print/Fax
Cloud & Web Apps
File Servers
Exchange, Lotus
SharePoint
Databases
Web Servers
DATA LOSS PREVENTION: WITH SYMANTEC ENCRYPTION
SYMANTEC: Data Loss Prevention
DLP scans internal file shares
and can automatically
encrypt sensitive,
unprotected files.
Additionally, DLP can read
and detect sensitive
information previously
encrypted using Symantec
File Share Encryption
FILE SHARE ENCRYPTION
Email is scanned by DLP
before it leaves the
organization. If sensitive
content is found, email is
redirected to Symantec
Gateway Email Encryption
before being sent.
GATEWAY EMAIL
ENCRYPTION
DLP monitors what files and
folders are being sent to
removable devices and can
automatically encrypt
sensitive information before
being transferred.
REMOVABLE MEDIA
SYMANTEC: Data Loss Prevention
SYMANTEC: DATA LOSS PREVENTION
Detection, Policy, Incident Response and Risk Reduction
DATA LOSS PREVENTION: CONTENT DETECTION TECHNOLOGIES
DESCRIBED DATA
Non-indexable data
Lexicons
Data Identifiers
Described Content
Matching
STRUCTURED DATA CUSTOMER DATA
Credit card, Government IDs, Pricing
Partial row matching
Near perfect accuracy
Exact Data
Matching
UNSTRUCTURED DATA IP
Designs, Source Code, Financials
Derivative match
Near perfect accuracy
Indexed Document
Matching
UNSTRUCTURED DATA IP
Designs, Source Code, Financials
Derivative match
Very High Accuracy
Vector Machine
Learning
SYMANTEC: Data Loss Prevention
DATA LOSS PREVENTION: CONTENT DETECTION TECHNOLOGIES (ADD-ON)
• Symantec DLP Form Recognition
– Protect data stored in images of handwritten and typed forms such as tax
returns, insurance claims, patient forms or any form that might contain PII
– Works with Network Monitor, Network Prevent for Email, Network
Prevent for Web, Network Discover and Network Protect
SYMANTEC: Data Loss Prevention
DATA LOSS PREVENTION: CONTENT DETECTION TECHNOLOGIES (ADD-ON)
• Symantec DLP Form Recognition
– Protect data stored in images of handwritten and typed forms such as tax
returns, insurance claims, patient forms or any form that might contain PII
– Works with Network Monitor, Network Prevent for Email, Network
Prevent for Web, Network Discover and Network Protect
SYMANTEC: Data Loss Prevention
DATA LOSS PREVENTION: POLICIES
Content
Credit Cards
SSNs
Intellectual
Property
Context
Who?
What?
Where?
Action
Notify
Justify
Encrypt
Prevent
Notification
User
Manager
Security
Escalate
ResponseDetection
SYMANTEC: Data Loss Prevention
DATA LOSS PREVENTION: INCIDENT RESPONSE
Right Automation | Resolution, Enforcement, Notification
Right Person | Route Incidents to Right Responder
Right Order | High Severity of Incidents First
Right Information | 5-Second Test
Right Action | 1-Click Response
Right Metrics | Prove Results to Execs and Auditors
SYMANTEC: Data Loss Prevention
Sanjay V. Well Meaning Insider
Assistant Controller | Manufacturing Company
SITUATION: Copying sensitive data to removable storage devices
ActionProblem
Sanjay copies pre-
released financial data
to removable media
DLP Response
Endpoint agent
analyzes content
based on policies
Monitor, record or
notify
Automatically encrypt
files using SEE
Result
Automatically encrypt
content
Higher visibility into
where data is going
Change users’
behavior
Competitive Advantage
Lightweight agent Trusted devices
Group based policies Automatic encryption
DATA LOSS PREVENTION: USE CASE
Detection and
Response
SYMANTEC: Data Loss Prevention
Action
DATA LOSS PREVENTION: USE CASE
Detection and
Response
Problem
Betty attempts to
email confidential
employee data
without knowing it
DLP Response
Network: DLP inspects
content and context
for policy match as
email leaves server
Endpoint: DLP
inspects the mail
when user hits “send”
Network: Monitor,
notify user, encrypt or
block
Endpoint: Display pop-
up, justify, block
email, remove content
Result
Help users understand
and justify risk
transparently
Block or encrypt data
in some cases
Symantec Advantage
Detection High-performance
Off Network Coverage Flexible Response
Betty G. Well Meaning Insider
Asst. HR Manager | Midwestern Insurance Company
SITUATION: Sending sensitive data over email
SYMANTEC: Data Loss Prevention
DATA LOSS PREVENTION: RISK REDUCTION
SYMANTEC: Data Loss Prevention
Remediation
Notification
Prevention
IncidentsPerWeek
1000
800
600
400
200
0 Risk Reduction Over Time
Visibility
SYMANTEC: Data Loss Prevention
SYMANTEC: DATA LOSS PREVENTION
Architecture, Design and System Requirements
DATA LOSS PREVENTION: ARCHITECTURE
SYMANTEC: Data Loss Prevention
*Symantec Operated Cloud - **Customer Operated Cloud
• All DLP components are software (not appliances or hardware hosts)
• Agents protect endpoints on and off network
• Network detection servers typically reside in DMZ
DATA LOSS PREVENTION: PHYSICAL/VIRTUAL
SYMANTEC: Data Loss Prevention
DATA LOSS PREVENTION: MANAGEMENT PLATFORM
SYMANTEC: Data Loss Prevention
DATA LOSS PREVENTION: NETWORK DISCOVER/PROTECT
SYMANTEC: Data Loss Prevention
DATA LOSS PREVENTION: CLOUD STORAGE
SYMANTEC: Data Loss Prevention
DATA LOSS PREVENTION: ENDPOINT PREVENT
SYMANTEC: Data Loss Prevention
Agent inspects
data to internal
drives, USB,
CD/DVD,
supported email
clients / IM clients
/ browsers, FTP,
print/fax,
clipboard,
network shares,
and applications.
Agent sends
incident data to
Endpoint Server.
Note that agent
functions and
stores incidents
when
disconnected.
On reconnection,
it sends incidents
to Endpoint
Server.
Any blocking,
onscreen
notification, or
FlexResponse
rules are initiated
locally.
Endpoint Agents
(on or off network)
Endpoint Server
DATA LOSS PREVENTION: ENDPOINT DISCOVER
SYMANTEC: Data Loss Prevention
Agent inspects
files on internal
drives for policy
violations,
optionally
quarantines files
or executes
custom
FlexResponse
rules.
Agent sends
incident data to
Endpoint Server.
Agent functions
when
disconnected
from network,
storing incident
data until
reconnection.
Endpoint Agents
(On or off network)
Endpoint Server
DATA LOSS PREVENTION: NETWORK MONITOR
SYMANTEC: Data Loss Prevention
DATA LOSS PREVENTION: NETWORK PREVENT FOR EMAIL
SYMANTEC: Data Loss Prevention
DATA LOSS PREVENTION: NETWORK PREVENT FOR WEB
SYMANTEC: Data Loss Prevention
DATA LOSS PREVENTION: MOBILE EMAIL MONITOR
SYMANTEC: Data Loss Prevention
DATA LOSS PREVENTION: MOBILE PREVENT FOR WEB
SYMANTEC: Data Loss Prevention
DMZCorporate Network
VPN
DLP Mobile
Prevent for
Web Server
Web
Proxy
DLP
Enforce
DLP Mobile Prevent for Web
routes mobile traffic through
corporate VPN to DLP at all times.
Active Sync
Exchange
= components
target prospects
likely already have
DATA LOSS PREVENTION: DLP FOR CLOUD EMAIL
SYMANTEC: Data Loss Prevention
DATA LOSS PREVENTION: CLOUD SERVICE FOR EMAIL
SYMANTEC: Data Loss Prevention
Internet
Secured Corporate LAN
Email
Corporate User
Policies /
Incidents
SMTP / TLS
Enforce Platform
(14.0.1 or higher)
Office 365 Cloud
Microsoft Cloud
Symantec Email Security.cloud
Exchange
DLP Cloud Service for Email
(Cloudfire)
Symantec Cloud
DLP Storage
DLP Network
DLP Endpoint
DLP Mobile
Safeguard Service Plan
(A/V, A/S, Encryption, etc)
DATA LOSS PREVENTION: CLOUD PREVENT FOR O365
SYMANTEC: Data Loss Prevention
DATA LOSS PREVENTION: SYSTEM REQUIREMENTS (SMALL/MED)
SYMANTEC: Data Loss Prevention
Enforce Server Network Monitor Detection Servers
CPU 2 x 3.0 GHz CPU 2 x 3.0 GHz CPU 2 x 3.0 GHz CPU
RAM 6–8 GB 6–8 GB 6–8 GB
Disk 500 GB, RAID 1+0 or RAID 5 140 GB 140 GB
NICs 1 copper or fiber 1 Gb/100 Mb
Ethernet
1 copper or fiber 1 Gb/100 Mb
Ethernet
1 copper or fiber 1 Gb/100 Mb
Ethernet
OS Microsoft Windows Server, Red Hat Linux
• Pre-Services Engagement Activity is a must
• System Requirements and Compatibility Guide Available
• Performance Sizing Guides Available
Single Server Deployment
CPU 2 x 2.2 GHz 8-core CPU
RAM 64 GB
Disk 3 TB, RAID 5 configuration
NICs 1 copper or fiber 1 Gb Ethernet NIC (if using Network Monitor than 2)
OS Microsoft Windows Server, Red Hat Linux
SYMANTEC: Data Loss Prevention
SYMANTEC: DATA LOSS PREVENTION
Licensing and Packaging
DATA LOSS PREVENTION: LICENSING
• DLP 14.5 is licensed per ”managed user” or “managed device”
• DLP requires Oracle Standard Edition One or Standard Edition
• Customers may use their own Oracle site license if their Oracle
license agreement allows them to create a separate database
instance for Symantec DLP and they are entitled to a version of
Oracle supported by Symantec DLP.
• Symantec resells Oracle Standard Edition One and Standard
Edition licenses on a per Processor basis only for DLP
• Symantec resells VERITAS Data Insight and Data Insight Portal
SYMANTEC: Data Loss Prevention
DATA LOSS PREVENTION: PACKAGING (INDIVIDUAL)
Endpoint Discover
Endpoint Prevent
Network Discover
Network Protect
Network Monitor
Prevent for Email
Prevent for Web
Cloud Storage for Box
Email Prevent for O365
Service for Email
Mobile
(Email Monitor and Web
Prevent)
SYMANTEC: Data Loss Prevention
DATA LOSS PREVENTION: PACKAGING (ADD-ON/RESELL)
SYMANTEC: Data Loss Prevention
Symantec DLP
Form Recognition
Veritas Data Insight
Veritas Data Insight
Self-service Portal
Oracle
DATA LOSS PREVENTION: PACKAGING (SUITE)
SYMANTEC: Data Loss Prevention
Symantec DLP Enforce Platform
ENDPOINT
Endpoint
Prevent/Discover
Mobile
Network Monitor
Network Prevent
for Web/Email
NETWORK
SYMANTEC DLP ENTERPRISE SUITE
STORAGE
Network Protect
Network Discover
Purchased separately:
Form Recognition, Cloud Prevent for Microsoft Office 365 Exchange, Cloud Storage, Veritas Data
Insight, Veritas Data Insight Self-Service Portal, Oracle, or all the DLP Cloud Service offerings.
DATA LOSS PREVENTION: PACKAGING (SUITE)
SYMANTEC: Data Loss Prevention
Symantec DLP Enforce Platform
SYMANTEC DLP DISCOVER SUITE
STORAGE
Network Protect
Network Discover
SYMANTEC: Data Loss Prevention
SYMANTEC: DATA LOSS PREVENTION
Look and Feel
Thank you!
Copyright © 2015 Symantec Corporation. All rights reserved. Symantec and the Symantec Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in
the U.S. and other countries. Other names may be trademarks of their respective owners.
This document is provided for informational purposes only and is not intended as advertising. All warranties relating to the information in this document, either express or implied,
are disclaimed to the maximum extent allowed by law. The information in this document is subject to change without notice.
Thank you!
Iftikhar Ali Iqbal
https://www.linkedin.com/in/iftikhariqbal/
SYMANTEC: Data Loss Prevention
SYMANTEC: Data Loss Prevention
SYMANTEC: DATA LOSS PREVENTION
Appendix
Cloud File Sync and Share
SYMANTEC: Data Loss Prev
• Endpoint Prevent now monitors and
prevents users from syncing sensitive
files from their desktop to cloud
storage sites
• Applications monitored by default
include:
– Box
– Dropbox
– Google Drive
– Hightail
– iCloud
– Microsoft OneDrive
BenefitsFeatures
• Reduces risk of sensitive data loss
• Prevents sensitive information from
being sync’d to cloud storage sites
• Improves end-user awareness and
education of security policies
Improved Endpoint Agent for Mac OS
SYMANTEC: Data Loss Prev
• Endpoint Prevent now monitors and
prevents confidential data transfer
between Mac endpoints and removable
storage devices
– Save as and File copy operations
supported
• Endpoint Prevent now monitors and
prevents confidential data uploads using
browsers on Mac endpoints
– Safari, Chrome and Firefox browsers
supported
• VMware Fusion 7 support monitors data
in use on a virtual Windows machine
and prevents unauthorized file transfer
BenefitsFeatures
• Reduces risk of sensitive data loss Mac
endpoints
• Prevents data loss from Mac endpoints
• Enables BYOD
Improved Endpoint Agent for Windows
SYMANTEC: Data Loss Prev
• Chrome support monitors and
prevents users from transmitting from
Chrome browsers
• Microsoft Hyper-V support protects
data in use on virtual Windows
machines residing on a Hyper-V Server
• Media Transfer Protocol (MTP)
support monitors and prevents data
transfer between Windows desktops
and mobile devices using MTP.
BenefitsFeatures
• Reduces risk of sensitive data loss
• Prevents data loss to mobile devices
• Enables BYOD
How Data Insight Works
59SYMC DLP 12 Eval Workshop (Demo) Presentation
Network Discover
Network Protect
Enforce
Corporate LAN
Data Insight
Windows File Server,
NAS Filer, or SharePoint
Data Insight
retrieves file
access information
and usage history.
Enforce receives
Discover
incidents, queries
Data Insight,
populates
incidents with file
access data and
usage history.
Network Discover
scans target and
identifies
confidential files.
Efficient Incident Workflow
First Responders
Core IRT
Incident
Response
Procedures
Human Resources
Escalation Team
Extended Team
Legal Business Unit A
HR Policy
Violation
Suspected
Theft
Broken
Business
Process
Fan-out Response Structure
Escalation Team
Core IRT
First Responder Team
Extended Team Incident
Response
Procedures
Business Unit A Business Unit B Business Unit C
Critical Incidents
Fan-in Response Structure
Data
Flow
Direction
• The right information, to the right person, in the right order
60SYMC DLP 12 Eval Workshop (Demo) Presentation

More Related Content

What's hot

Data loss prevention (dlp)
Data loss prevention (dlp)Data loss prevention (dlp)
Data loss prevention (dlp)
Hussein Al-Sanabani
 
Introducing Data Loss Prevention 14
Introducing Data Loss Prevention 14Introducing Data Loss Prevention 14
Introducing Data Loss Prevention 14
Symantec
 
Data Leakage Prevention (DLP)
Data Leakage Prevention (DLP)Data Leakage Prevention (DLP)
Data Leakage Prevention (DLP)
Network Intelligence India
 
Symantec Data Loss Prevention 11
Symantec Data Loss Prevention 11Symantec Data Loss Prevention 11
Symantec Data Loss Prevention 11
Symantec
 
Data Loss Prevention: Challenges, Impacts & Effective Strategies
Data Loss Prevention: Challenges, Impacts & Effective StrategiesData Loss Prevention: Challenges, Impacts & Effective Strategies
Data Loss Prevention: Challenges, Impacts & Effective Strategies
Seccuris Inc.
 
Dlp notes
Dlp notesDlp notes
Dlp notes
anuepcet
 
Best Practices for Implementing Data Loss Prevention (DLP)
Best Practices for Implementing Data Loss Prevention (DLP)Best Practices for Implementing Data Loss Prevention (DLP)
Best Practices for Implementing Data Loss Prevention (DLP)
Sarfaraz Chougule
 
Technology Overview - Symantec Endpoint Protection (SEP)
Technology Overview - Symantec Endpoint Protection (SEP)Technology Overview - Symantec Endpoint Protection (SEP)
Technology Overview - Symantec Endpoint Protection (SEP)
Iftikhar Ali Iqbal
 
Data Leakage Prevention
Data Leakage Prevention Data Leakage Prevention
Data Leakage Prevention
Dhananjay Aloorkar
 
Microsoft Azure Information Protection
Microsoft Azure Information Protection Microsoft Azure Information Protection
Microsoft Azure Information Protection
Syed Sabhi Haider
 
Overview of Data Loss Prevention Policies in Office 365
Overview of Data Loss Prevention Policies in Office 365Overview of Data Loss Prevention Policies in Office 365
Overview of Data Loss Prevention Policies in Office 365
Dock 365
 
CIA Triad in Data Governance, Information Security, and Privacy: Its Role and...
CIA Triad in Data Governance, Information Security, and Privacy: Its Role and...CIA Triad in Data Governance, Information Security, and Privacy: Its Role and...
CIA Triad in Data Governance, Information Security, and Privacy: Its Role and...
PECB
 
IBM Qradar & resilient
IBM Qradar & resilientIBM Qradar & resilient
IBM Qradar & resilient
Prime Infoserv
 
cyber-security-reference-architecture
cyber-security-reference-architecturecyber-security-reference-architecture
cyber-security-reference-architecture
Birendra Negi ☁️
 
Azure Information Protection
Azure Information ProtectionAzure Information Protection
Azure Information Protection
Robert Crane
 
Data Loss Prevention (DLP) - Fundamental Concept - Eryk
Data Loss Prevention (DLP) - Fundamental Concept - ErykData Loss Prevention (DLP) - Fundamental Concept - Eryk
Data Loss Prevention (DLP) - Fundamental Concept - Eryk
Eryk Budi Pratama
 
IBM QRadar Security Intelligence Overview
IBM QRadar Security Intelligence OverviewIBM QRadar Security Intelligence Overview
IBM QRadar Security Intelligence Overview
Camilo Fandiño Gómez
 
Azure information protection
Azure information protectionAzure information protection
Azure information protection
Kjetil Lund-Paulsen
 
Breakdown of Microsoft Purview Solutions
Breakdown of Microsoft Purview SolutionsBreakdown of Microsoft Purview Solutions
Breakdown of Microsoft Purview Solutions
Drew Madelung
 
SIEM Primer:
SIEM Primer:SIEM Primer:
SIEM Primer:
Anton Chuvakin
 

What's hot (20)

Data loss prevention (dlp)
Data loss prevention (dlp)Data loss prevention (dlp)
Data loss prevention (dlp)
 
Introducing Data Loss Prevention 14
Introducing Data Loss Prevention 14Introducing Data Loss Prevention 14
Introducing Data Loss Prevention 14
 
Data Leakage Prevention (DLP)
Data Leakage Prevention (DLP)Data Leakage Prevention (DLP)
Data Leakage Prevention (DLP)
 
Symantec Data Loss Prevention 11
Symantec Data Loss Prevention 11Symantec Data Loss Prevention 11
Symantec Data Loss Prevention 11
 
Data Loss Prevention: Challenges, Impacts & Effective Strategies
Data Loss Prevention: Challenges, Impacts & Effective StrategiesData Loss Prevention: Challenges, Impacts & Effective Strategies
Data Loss Prevention: Challenges, Impacts & Effective Strategies
 
Dlp notes
Dlp notesDlp notes
Dlp notes
 
Best Practices for Implementing Data Loss Prevention (DLP)
Best Practices for Implementing Data Loss Prevention (DLP)Best Practices for Implementing Data Loss Prevention (DLP)
Best Practices for Implementing Data Loss Prevention (DLP)
 
Technology Overview - Symantec Endpoint Protection (SEP)
Technology Overview - Symantec Endpoint Protection (SEP)Technology Overview - Symantec Endpoint Protection (SEP)
Technology Overview - Symantec Endpoint Protection (SEP)
 
Data Leakage Prevention
Data Leakage Prevention Data Leakage Prevention
Data Leakage Prevention
 
Microsoft Azure Information Protection
Microsoft Azure Information Protection Microsoft Azure Information Protection
Microsoft Azure Information Protection
 
Overview of Data Loss Prevention Policies in Office 365
Overview of Data Loss Prevention Policies in Office 365Overview of Data Loss Prevention Policies in Office 365
Overview of Data Loss Prevention Policies in Office 365
 
CIA Triad in Data Governance, Information Security, and Privacy: Its Role and...
CIA Triad in Data Governance, Information Security, and Privacy: Its Role and...CIA Triad in Data Governance, Information Security, and Privacy: Its Role and...
CIA Triad in Data Governance, Information Security, and Privacy: Its Role and...
 
IBM Qradar & resilient
IBM Qradar & resilientIBM Qradar & resilient
IBM Qradar & resilient
 
cyber-security-reference-architecture
cyber-security-reference-architecturecyber-security-reference-architecture
cyber-security-reference-architecture
 
Azure Information Protection
Azure Information ProtectionAzure Information Protection
Azure Information Protection
 
Data Loss Prevention (DLP) - Fundamental Concept - Eryk
Data Loss Prevention (DLP) - Fundamental Concept - ErykData Loss Prevention (DLP) - Fundamental Concept - Eryk
Data Loss Prevention (DLP) - Fundamental Concept - Eryk
 
IBM QRadar Security Intelligence Overview
IBM QRadar Security Intelligence OverviewIBM QRadar Security Intelligence Overview
IBM QRadar Security Intelligence Overview
 
Azure information protection
Azure information protectionAzure information protection
Azure information protection
 
Breakdown of Microsoft Purview Solutions
Breakdown of Microsoft Purview SolutionsBreakdown of Microsoft Purview Solutions
Breakdown of Microsoft Purview Solutions
 
SIEM Primer:
SIEM Primer:SIEM Primer:
SIEM Primer:
 

Similar to Technology Overview - Symantec Data Loss Prevention (DLP)

Guardium Data Activiy Monitor For C- Level Executives
Guardium Data Activiy Monitor For C- Level ExecutivesGuardium Data Activiy Monitor For C- Level Executives
Guardium Data Activiy Monitor For C- Level Executives
Camilo Fandiño Gómez
 
B2 - The History of Content Security: Part 2 - Adam Levithan
B2 - The History of Content Security: Part 2 - Adam LevithanB2 - The History of Content Security: Part 2 - Adam Levithan
B2 - The History of Content Security: Part 2 - Adam Levithan
SPS Paris
 
Xylos Clients Day - Public cloud and security go hand in hand, if you approac...
Xylos Clients Day - Public cloud and security go hand in hand, if you approac...Xylos Clients Day - Public cloud and security go hand in hand, if you approac...
Xylos Clients Day - Public cloud and security go hand in hand, if you approac...
Karim Vaes
 
Information protection and compliance
Information protection and complianceInformation protection and compliance
Information protection and compliance
Dean Iacovelli
 
Content is King - Symantec
Content is King - SymantecContent is King - Symantec
Content is King - Symantec
Harry Gunns
 
Information Security
Information SecurityInformation Security
Information SecurityMohit8780
 
Explore Top Data Loss Prevention Tools | Fortify with DLP Software
Explore Top Data Loss Prevention Tools | Fortify with DLP SoftwareExplore Top Data Loss Prevention Tools | Fortify with DLP Software
Explore Top Data Loss Prevention Tools | Fortify with DLP Software
Konverge Technologies Pvt. Ltd.
 
Securing your Organization with Microsoft 365
Securing your Organization with Microsoft 365Securing your Organization with Microsoft 365
Securing your Organization with Microsoft 365
Ravikumar Sathyamurthy
 
Power Saturday 2019 E1 - Office 365 security
Power Saturday 2019 E1 - Office 365 securityPower Saturday 2019 E1 - Office 365 security
Power Saturday 2019 E1 - Office 365 security
PowerSaturdayParis
 
dlp-sales-play-sales-customer-deck-2022.pptx
dlp-sales-play-sales-customer-deck-2022.pptxdlp-sales-play-sales-customer-deck-2022.pptx
dlp-sales-play-sales-customer-deck-2022.pptx
alex hincapie
 
Hackers, Cyber Crime and Espionage
Hackers, Cyber Crime and EspionageHackers, Cyber Crime and Espionage
Hackers, Cyber Crime and Espionage
Imperva
 
Microsoft Enterprise Mobility and Security EMS
Microsoft Enterprise Mobility and Security EMSMicrosoft Enterprise Mobility and Security EMS
Microsoft Enterprise Mobility and Security EMS
David J Rosenthal
 
Blueprint for Security Architecture & Strategy.pdf
Blueprint for Security Architecture & Strategy.pdfBlueprint for Security Architecture & Strategy.pdf
Blueprint for Security Architecture & Strategy.pdf
Fetri Miftach
 
Primend praktiline konverents - Office 365 turvalisus
Primend praktiline konverents - Office 365 turvalisusPrimend praktiline konverents - Office 365 turvalisus
Primend praktiline konverents - Office 365 turvalisus
Primend
 
(Slides) What's Yours Is Mine: How Employess Are Putting Your Sensitive Data ...
(Slides) What's Yours Is Mine: How Employess Are Putting Your Sensitive Data ...(Slides) What's Yours Is Mine: How Employess Are Putting Your Sensitive Data ...
(Slides) What's Yours Is Mine: How Employess Are Putting Your Sensitive Data ...
infoLock Technologies
 
Importance of Identity Management in Security - Microsoft Tech Tour @Towson
Importance of Identity Management in Security - Microsoft Tech Tour @TowsonImportance of Identity Management in Security - Microsoft Tech Tour @Towson
Importance of Identity Management in Security - Microsoft Tech Tour @Towson
Adam Levithan
 
Gestión de identidad
Gestión de identidadGestión de identidad
Gestión de identidad
Plain Concepts
 
Ibm ofa ottawa_ how_secure_is_your_data_eric_offenberg
Ibm ofa ottawa_ how_secure_is_your_data_eric_offenbergIbm ofa ottawa_ how_secure_is_your_data_eric_offenberg
Ibm ofa ottawa_ how_secure_is_your_data_eric_offenberg
dawnrk
 
Ibm ofa ottawa_ how_secure_is_your_data_eric_offenberg
Ibm ofa ottawa_ how_secure_is_your_data_eric_offenbergIbm ofa ottawa_ how_secure_is_your_data_eric_offenberg
Ibm ofa ottawa_ how_secure_is_your_data_eric_offenberg
dawnrk
 

Similar to Technology Overview - Symantec Data Loss Prevention (DLP) (20)

Guardium Data Activiy Monitor For C- Level Executives
Guardium Data Activiy Monitor For C- Level ExecutivesGuardium Data Activiy Monitor For C- Level Executives
Guardium Data Activiy Monitor For C- Level Executives
 
B2 - The History of Content Security: Part 2 - Adam Levithan
B2 - The History of Content Security: Part 2 - Adam LevithanB2 - The History of Content Security: Part 2 - Adam Levithan
B2 - The History of Content Security: Part 2 - Adam Levithan
 
Xylos Clients Day - Public cloud and security go hand in hand, if you approac...
Xylos Clients Day - Public cloud and security go hand in hand, if you approac...Xylos Clients Day - Public cloud and security go hand in hand, if you approac...
Xylos Clients Day - Public cloud and security go hand in hand, if you approac...
 
Information protection and compliance
Information protection and complianceInformation protection and compliance
Information protection and compliance
 
Content is King - Symantec
Content is King - SymantecContent is King - Symantec
Content is King - Symantec
 
Information Security
Information SecurityInformation Security
Information Security
 
Explore Top Data Loss Prevention Tools | Fortify with DLP Software
Explore Top Data Loss Prevention Tools | Fortify with DLP SoftwareExplore Top Data Loss Prevention Tools | Fortify with DLP Software
Explore Top Data Loss Prevention Tools | Fortify with DLP Software
 
Securing your Organization with Microsoft 365
Securing your Organization with Microsoft 365Securing your Organization with Microsoft 365
Securing your Organization with Microsoft 365
 
Power Saturday 2019 E1 - Office 365 security
Power Saturday 2019 E1 - Office 365 securityPower Saturday 2019 E1 - Office 365 security
Power Saturday 2019 E1 - Office 365 security
 
dlp-sales-play-sales-customer-deck-2022.pptx
dlp-sales-play-sales-customer-deck-2022.pptxdlp-sales-play-sales-customer-deck-2022.pptx
dlp-sales-play-sales-customer-deck-2022.pptx
 
Hackers, Cyber Crime and Espionage
Hackers, Cyber Crime and EspionageHackers, Cyber Crime and Espionage
Hackers, Cyber Crime and Espionage
 
Microsoft Enterprise Mobility and Security EMS
Microsoft Enterprise Mobility and Security EMSMicrosoft Enterprise Mobility and Security EMS
Microsoft Enterprise Mobility and Security EMS
 
BREACHED: Data Centric Security for SAP
BREACHED: Data Centric Security for SAPBREACHED: Data Centric Security for SAP
BREACHED: Data Centric Security for SAP
 
Blueprint for Security Architecture & Strategy.pdf
Blueprint for Security Architecture & Strategy.pdfBlueprint for Security Architecture & Strategy.pdf
Blueprint for Security Architecture & Strategy.pdf
 
Primend praktiline konverents - Office 365 turvalisus
Primend praktiline konverents - Office 365 turvalisusPrimend praktiline konverents - Office 365 turvalisus
Primend praktiline konverents - Office 365 turvalisus
 
(Slides) What's Yours Is Mine: How Employess Are Putting Your Sensitive Data ...
(Slides) What's Yours Is Mine: How Employess Are Putting Your Sensitive Data ...(Slides) What's Yours Is Mine: How Employess Are Putting Your Sensitive Data ...
(Slides) What's Yours Is Mine: How Employess Are Putting Your Sensitive Data ...
 
Importance of Identity Management in Security - Microsoft Tech Tour @Towson
Importance of Identity Management in Security - Microsoft Tech Tour @TowsonImportance of Identity Management in Security - Microsoft Tech Tour @Towson
Importance of Identity Management in Security - Microsoft Tech Tour @Towson
 
Gestión de identidad
Gestión de identidadGestión de identidad
Gestión de identidad
 
Ibm ofa ottawa_ how_secure_is_your_data_eric_offenberg
Ibm ofa ottawa_ how_secure_is_your_data_eric_offenbergIbm ofa ottawa_ how_secure_is_your_data_eric_offenberg
Ibm ofa ottawa_ how_secure_is_your_data_eric_offenberg
 
Ibm ofa ottawa_ how_secure_is_your_data_eric_offenberg
Ibm ofa ottawa_ how_secure_is_your_data_eric_offenbergIbm ofa ottawa_ how_secure_is_your_data_eric_offenberg
Ibm ofa ottawa_ how_secure_is_your_data_eric_offenberg
 

More from Iftikhar Ali Iqbal

McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB) - POC Report
McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB) - POC ReportMcAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB) - POC Report
McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB) - POC Report
Iftikhar Ali Iqbal
 
McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB) - POC Docu...
McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB) - POC Docu...McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB) - POC Docu...
McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB) - POC Docu...
Iftikhar Ali Iqbal
 
McAfee - McAfee Application Control (MAC) - Whitelisting - Techbook
McAfee - McAfee Application Control (MAC) - Whitelisting - TechbookMcAfee - McAfee Application Control (MAC) - Whitelisting - Techbook
McAfee - McAfee Application Control (MAC) - Whitelisting - Techbook
Iftikhar Ali Iqbal
 
McAfee - McAfee Application Control (MAC) - Whitelisting - Proposal
McAfee - McAfee Application Control (MAC) - Whitelisting - ProposalMcAfee - McAfee Application Control (MAC) - Whitelisting - Proposal
McAfee - McAfee Application Control (MAC) - Whitelisting - Proposal
Iftikhar Ali Iqbal
 
McAfee - McAfee Application Control (MAC) - Whitelisting
McAfee - McAfee Application Control (MAC) - WhitelistingMcAfee - McAfee Application Control (MAC) - Whitelisting
McAfee - McAfee Application Control (MAC) - Whitelisting
Iftikhar Ali Iqbal
 
McAfee - McAfee Active Response (MAR) - Endpoint Detection & Response (EDR)
McAfee - McAfee Active Response (MAR) - Endpoint Detection & Response (EDR)McAfee - McAfee Active Response (MAR) - Endpoint Detection & Response (EDR)
McAfee - McAfee Active Response (MAR) - Endpoint Detection & Response (EDR)
Iftikhar Ali Iqbal
 
McAfee - Enterprise Security Manager (ESM) - SIEM
McAfee - Enterprise Security Manager (ESM) - SIEMMcAfee - Enterprise Security Manager (ESM) - SIEM
McAfee - Enterprise Security Manager (ESM) - SIEM
Iftikhar Ali Iqbal
 
McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB)
McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB)McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB)
McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB)
Iftikhar Ali Iqbal
 
McAfee - Portfolio Overview
McAfee - Portfolio OverviewMcAfee - Portfolio Overview
McAfee - Portfolio Overview
Iftikhar Ali Iqbal
 
Symantec Data Loss Prevention - Technical Proposal (General)
Symantec Data Loss Prevention - Technical Proposal (General)Symantec Data Loss Prevention - Technical Proposal (General)
Symantec Data Loss Prevention - Technical Proposal (General)
Iftikhar Ali Iqbal
 
Technology Overview - Validation & ID Protection (VIP)
Technology Overview - Validation & ID Protection (VIP)Technology Overview - Validation & ID Protection (VIP)
Technology Overview - Validation & ID Protection (VIP)
Iftikhar Ali Iqbal
 
Technology Overview - Symantec IT Management Suite (ITMS)
Technology Overview - Symantec IT Management Suite (ITMS)Technology Overview - Symantec IT Management Suite (ITMS)
Technology Overview - Symantec IT Management Suite (ITMS)
Iftikhar Ali Iqbal
 
Symantec Endpoint Encryption - Proof Of Concept Document
Symantec Endpoint Encryption - Proof Of Concept DocumentSymantec Endpoint Encryption - Proof Of Concept Document
Symantec Endpoint Encryption - Proof Of Concept Document
Iftikhar Ali Iqbal
 
Symantec Messaging Gateway - Technical Proposal (General)
Symantec Messaging Gateway - Technical Proposal (General)Symantec Messaging Gateway - Technical Proposal (General)
Symantec Messaging Gateway - Technical Proposal (General)
Iftikhar Ali Iqbal
 
Symantec Endpoint Protection vs Sophos Endpoint Protection (Competitive Analy...
Symantec Endpoint Protection vs Sophos Endpoint Protection (Competitive Analy...Symantec Endpoint Protection vs Sophos Endpoint Protection (Competitive Analy...
Symantec Endpoint Protection vs Sophos Endpoint Protection (Competitive Analy...
Iftikhar Ali Iqbal
 
Symantec Portfolio - Sales Play
Symantec Portfolio - Sales PlaySymantec Portfolio - Sales Play
Symantec Portfolio - Sales Play
Iftikhar Ali Iqbal
 

More from Iftikhar Ali Iqbal (16)

McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB) - POC Report
McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB) - POC ReportMcAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB) - POC Report
McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB) - POC Report
 
McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB) - POC Docu...
McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB) - POC Docu...McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB) - POC Docu...
McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB) - POC Docu...
 
McAfee - McAfee Application Control (MAC) - Whitelisting - Techbook
McAfee - McAfee Application Control (MAC) - Whitelisting - TechbookMcAfee - McAfee Application Control (MAC) - Whitelisting - Techbook
McAfee - McAfee Application Control (MAC) - Whitelisting - Techbook
 
McAfee - McAfee Application Control (MAC) - Whitelisting - Proposal
McAfee - McAfee Application Control (MAC) - Whitelisting - ProposalMcAfee - McAfee Application Control (MAC) - Whitelisting - Proposal
McAfee - McAfee Application Control (MAC) - Whitelisting - Proposal
 
McAfee - McAfee Application Control (MAC) - Whitelisting
McAfee - McAfee Application Control (MAC) - WhitelistingMcAfee - McAfee Application Control (MAC) - Whitelisting
McAfee - McAfee Application Control (MAC) - Whitelisting
 
McAfee - McAfee Active Response (MAR) - Endpoint Detection & Response (EDR)
McAfee - McAfee Active Response (MAR) - Endpoint Detection & Response (EDR)McAfee - McAfee Active Response (MAR) - Endpoint Detection & Response (EDR)
McAfee - McAfee Active Response (MAR) - Endpoint Detection & Response (EDR)
 
McAfee - Enterprise Security Manager (ESM) - SIEM
McAfee - Enterprise Security Manager (ESM) - SIEMMcAfee - Enterprise Security Manager (ESM) - SIEM
McAfee - Enterprise Security Manager (ESM) - SIEM
 
McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB)
McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB)McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB)
McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB)
 
McAfee - Portfolio Overview
McAfee - Portfolio OverviewMcAfee - Portfolio Overview
McAfee - Portfolio Overview
 
Symantec Data Loss Prevention - Technical Proposal (General)
Symantec Data Loss Prevention - Technical Proposal (General)Symantec Data Loss Prevention - Technical Proposal (General)
Symantec Data Loss Prevention - Technical Proposal (General)
 
Technology Overview - Validation & ID Protection (VIP)
Technology Overview - Validation & ID Protection (VIP)Technology Overview - Validation & ID Protection (VIP)
Technology Overview - Validation & ID Protection (VIP)
 
Technology Overview - Symantec IT Management Suite (ITMS)
Technology Overview - Symantec IT Management Suite (ITMS)Technology Overview - Symantec IT Management Suite (ITMS)
Technology Overview - Symantec IT Management Suite (ITMS)
 
Symantec Endpoint Encryption - Proof Of Concept Document
Symantec Endpoint Encryption - Proof Of Concept DocumentSymantec Endpoint Encryption - Proof Of Concept Document
Symantec Endpoint Encryption - Proof Of Concept Document
 
Symantec Messaging Gateway - Technical Proposal (General)
Symantec Messaging Gateway - Technical Proposal (General)Symantec Messaging Gateway - Technical Proposal (General)
Symantec Messaging Gateway - Technical Proposal (General)
 
Symantec Endpoint Protection vs Sophos Endpoint Protection (Competitive Analy...
Symantec Endpoint Protection vs Sophos Endpoint Protection (Competitive Analy...Symantec Endpoint Protection vs Sophos Endpoint Protection (Competitive Analy...
Symantec Endpoint Protection vs Sophos Endpoint Protection (Competitive Analy...
 
Symantec Portfolio - Sales Play
Symantec Portfolio - Sales PlaySymantec Portfolio - Sales Play
Symantec Portfolio - Sales Play
 

Recently uploaded

PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 

Recently uploaded (20)

PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 

Technology Overview - Symantec Data Loss Prevention (DLP)

  • 1. SYMANTEC: SOLUTION OVERVIEW SERIES Symantec Data Loss Prevention Iftikhar Ali Iqbal https://www.linkedin.com/in/iftikhariqbal/ Valid till May 2016
  • 2. Agenda Company Overview1 Solution Portfolio2 Features, Architecture, Design and Licensing4 SYMANTEC: Data Loss Prevention Look and Feel5 Symantec Data Loss Prevention3
  • 4. OVERVIEW: SYMANTEC • Founded in 1982 • Headquartered in California, United States • Fortune 500 company • Provides Software and Services • Focus is on Consumer Security and Enterprise Security • 2014 Revenue: – $6.7 billion (ended March 28, 2014) – Information Security: $4.2 billion • 2014 Market Share: – Largest security software vendor by revenue and market share (17.2%) (Gartner) - http://www.gartner.com/newsroom/id/3062017 SYMANTEC: Data Loss Prevention
  • 5. OVERVIEW: THE SPLIT • On 1st October 2015, Symantec’s Information Management business now operates as a separate privately held company Veritas Technologies Corporation • Solutions: – Backup and Recovery – Archiving – High-Availability – Disaster Recovery • Separate operations, partner programs, support, etc. SYMANTEC: Data Loss Prevention
  • 6. OVERVIEW: AREAS OF FOCUS • Solutions to Protect against: – Malware and Spam – Advanced Persistent Threats and Cyber Attacks – Identity Theft and Loss of Confidential Information • Solutions to Manage: – Governance, Risk and Compliance – Client, Asset, Server and Mobility • Services: – Product Support – Cyber Security – Education SYMANTEC: Data Loss Prevention
  • 8. PORTFOLIO: NUTSHELL Cyber Security Services • Monitoring , Incident Response, Simulation, Adversary Threat Intelligence Threat Protection ENDPOINTS DATA CENTER GATEWAY • Threat Prevention, Detection, Forensics & Resolution • Device, Email, Server, Virtual & Cloud Workloads • Available On-premise and Cloud Unified Security Analytics Platform • Big data security analytics; available to customers in self-service mode Telemetry Incident Management Protection Engines Global Intelligence Threat Analytics Information Protection DATA ACCESS • Identity and Data Loss Protection • Cloud-based Key Management • Cloud Security Broker Users Data Apps Cloud Devices Network Data Center SYMANTEC: Data Loss Prevention
  • 9. SYMANTEC: Data Loss Prevention SYMANTEC: DATA LOSS PREVENTION Introduction, Components and Features
  • 10. DATA LOSS PREVENTION: INTRODUCTION SYMANTEC: Data Loss Prevention Locate where your sensitive information resides across your cloud, mobile, network, endpoint and storage systems Discover Understand how your sensitive information is being used, including what data is being handled and by whom Monitor Stop sensitive information from being leaked or stolen by enforcing data loss policies and educating employees Protect Where does your confidential data live? How is it being used? How do you prevent data loss?
  • 11. DATA LOSS PREVENTION: COMPONENTS SYMANTEC: Data Loss Prevention DLP Enforce Platform DLP for Endpoint DLP for Network DLP for Storage DLP for Mobile DLP for Cloud
  • 12. DATA LOSS PREVENTION: COMPONENTS SYMANTEC: Data Loss Prevention DLP Enforce Platform - Management Platform - Build and Deploy Policies - Automate Enforcement - Measure Risk Reduction - Demonstrate Compliance - Workflow Remediation
  • 13. DATA LOSS PREVENTION: COMPONENTS SYMANTEC: Data Loss Prevention DLP for Endpoint - DLP Endpoint Discover - DLP Agent - Detects Sensitive Data - Collect Data on Activity - Send Incidents to Endpoint Server - DLP Endpoint Prevent - DLP Agent (Same as above) - Prevents Sensitive Data Leaving - Detects Data Transfers: • Application Monitoring • Local Drives • CD/DVD • Clipboard • Email/SMTP • eSATA • FTP • HTTP/HTTPS • IM • Network Shares • Print/Fax • USB
  • 14. DATA LOSS PREVENTION: COMPONENTS SYMANTEC: Data Loss Prevention DLP for Network - DLP Network Monitor - Capture & Analyze Traffic - SPAN/TAP - Define Protocols - SMTP, FTP, HTTP, Various IM - Custom Protocols - DLP Network Prevent for Email - Outbound Email Traffic - SMTP-Compliant MTA - Monitor, Analyze, Block, Redirect or Modify - DLP Network Prevent for Web - ICAP-Compliant Proxy Servers - HTTP, HTTPS or FTP Content - Proxy Rejects Requests or remove HTML content
  • 15. DATA LOSS PREVENTION: COMPONENTS SYMANTEC: Data Loss Prevention DLP for Storage - DLP Network Discover - Scans Data Repositories - Cloud Storage (Box Enterprise) - Networked File Shares - Databases - Document Repositories - Integrate with Veritas Data Insight - DLP Network Protect - Removes Exposed Data - Quarantine and Restore - Visual Tags/Marker File - Enforce Access Control
  • 16. DATA LOSS PREVENTION: COMPONENTS SYMANTEC: Data Loss Prevention DLP for Mobile - DLP Mobile Email Monitor - Microsoft ActiveSync - Emails Sent - Information Downloaded - Databases - Document Repositories - DLP Mobile Prevent - Monitor and Prevent Web & Application Communications - VPN Profile (ex, MDM) - HTTP, HTTPS or FTP Traffic
  • 17. DATA LOSS PREVENTION: COMPONENTS SYMANTEC: Data Loss Prevention DLP for Cloud - DLP Cloud Service for Email - Symantec Cloud - Monitor & Block - Microsoft Office 365 - Gmail for Business - Symantec Email Security.Cloud - Email Delivery - Antispam & Anti-malware - DLP Prevent for Microsoft Office 365 - Azure/Rackspace/AWS - Monitor & Block - Symantec Email Security.Cloud - Email Delivery DLP Management Server (Enforce) is on-premise - DLP Cloud Storage (Box Enterprise) - Scan Box cloud storage - Scan files, folders + shared links - Quarantine and/or visual tags
  • 18. DATA LOSS PREVENTION: UNIFED CONTENT-AWARE SOLUTION SYMANTEC: Data Loss Prevention Unified Management Box Office 365 iOS Email Web FTP IM USB Hard Drives Removable Storage Network Shares Print/Fax Cloud & Web Apps File Servers Exchange, Lotus SharePoint Databases Web Servers
  • 19. DATA LOSS PREVENTION: WITH SYMANTEC ENCRYPTION SYMANTEC: Data Loss Prevention DLP scans internal file shares and can automatically encrypt sensitive, unprotected files. Additionally, DLP can read and detect sensitive information previously encrypted using Symantec File Share Encryption FILE SHARE ENCRYPTION Email is scanned by DLP before it leaves the organization. If sensitive content is found, email is redirected to Symantec Gateway Email Encryption before being sent. GATEWAY EMAIL ENCRYPTION DLP monitors what files and folders are being sent to removable devices and can automatically encrypt sensitive information before being transferred. REMOVABLE MEDIA
  • 20. SYMANTEC: Data Loss Prevention SYMANTEC: DATA LOSS PREVENTION Detection, Policy, Incident Response and Risk Reduction
  • 21. DATA LOSS PREVENTION: CONTENT DETECTION TECHNOLOGIES DESCRIBED DATA Non-indexable data Lexicons Data Identifiers Described Content Matching STRUCTURED DATA CUSTOMER DATA Credit card, Government IDs, Pricing Partial row matching Near perfect accuracy Exact Data Matching UNSTRUCTURED DATA IP Designs, Source Code, Financials Derivative match Near perfect accuracy Indexed Document Matching UNSTRUCTURED DATA IP Designs, Source Code, Financials Derivative match Very High Accuracy Vector Machine Learning SYMANTEC: Data Loss Prevention
  • 22. DATA LOSS PREVENTION: CONTENT DETECTION TECHNOLOGIES (ADD-ON) • Symantec DLP Form Recognition – Protect data stored in images of handwritten and typed forms such as tax returns, insurance claims, patient forms or any form that might contain PII – Works with Network Monitor, Network Prevent for Email, Network Prevent for Web, Network Discover and Network Protect SYMANTEC: Data Loss Prevention
  • 23. DATA LOSS PREVENTION: CONTENT DETECTION TECHNOLOGIES (ADD-ON) • Symantec DLP Form Recognition – Protect data stored in images of handwritten and typed forms such as tax returns, insurance claims, patient forms or any form that might contain PII – Works with Network Monitor, Network Prevent for Email, Network Prevent for Web, Network Discover and Network Protect SYMANTEC: Data Loss Prevention
  • 24. DATA LOSS PREVENTION: POLICIES Content Credit Cards SSNs Intellectual Property Context Who? What? Where? Action Notify Justify Encrypt Prevent Notification User Manager Security Escalate ResponseDetection SYMANTEC: Data Loss Prevention
  • 25. DATA LOSS PREVENTION: INCIDENT RESPONSE Right Automation | Resolution, Enforcement, Notification Right Person | Route Incidents to Right Responder Right Order | High Severity of Incidents First Right Information | 5-Second Test Right Action | 1-Click Response Right Metrics | Prove Results to Execs and Auditors SYMANTEC: Data Loss Prevention
  • 26. Sanjay V. Well Meaning Insider Assistant Controller | Manufacturing Company SITUATION: Copying sensitive data to removable storage devices ActionProblem Sanjay copies pre- released financial data to removable media DLP Response Endpoint agent analyzes content based on policies Monitor, record or notify Automatically encrypt files using SEE Result Automatically encrypt content Higher visibility into where data is going Change users’ behavior Competitive Advantage Lightweight agent Trusted devices Group based policies Automatic encryption DATA LOSS PREVENTION: USE CASE Detection and Response SYMANTEC: Data Loss Prevention
  • 27. Action DATA LOSS PREVENTION: USE CASE Detection and Response Problem Betty attempts to email confidential employee data without knowing it DLP Response Network: DLP inspects content and context for policy match as email leaves server Endpoint: DLP inspects the mail when user hits “send” Network: Monitor, notify user, encrypt or block Endpoint: Display pop- up, justify, block email, remove content Result Help users understand and justify risk transparently Block or encrypt data in some cases Symantec Advantage Detection High-performance Off Network Coverage Flexible Response Betty G. Well Meaning Insider Asst. HR Manager | Midwestern Insurance Company SITUATION: Sending sensitive data over email SYMANTEC: Data Loss Prevention
  • 28. DATA LOSS PREVENTION: RISK REDUCTION SYMANTEC: Data Loss Prevention Remediation Notification Prevention IncidentsPerWeek 1000 800 600 400 200 0 Risk Reduction Over Time Visibility
  • 29. SYMANTEC: Data Loss Prevention SYMANTEC: DATA LOSS PREVENTION Architecture, Design and System Requirements
  • 30. DATA LOSS PREVENTION: ARCHITECTURE SYMANTEC: Data Loss Prevention *Symantec Operated Cloud - **Customer Operated Cloud • All DLP components are software (not appliances or hardware hosts) • Agents protect endpoints on and off network • Network detection servers typically reside in DMZ
  • 31. DATA LOSS PREVENTION: PHYSICAL/VIRTUAL SYMANTEC: Data Loss Prevention
  • 32. DATA LOSS PREVENTION: MANAGEMENT PLATFORM SYMANTEC: Data Loss Prevention
  • 33. DATA LOSS PREVENTION: NETWORK DISCOVER/PROTECT SYMANTEC: Data Loss Prevention
  • 34. DATA LOSS PREVENTION: CLOUD STORAGE SYMANTEC: Data Loss Prevention
  • 35. DATA LOSS PREVENTION: ENDPOINT PREVENT SYMANTEC: Data Loss Prevention Agent inspects data to internal drives, USB, CD/DVD, supported email clients / IM clients / browsers, FTP, print/fax, clipboard, network shares, and applications. Agent sends incident data to Endpoint Server. Note that agent functions and stores incidents when disconnected. On reconnection, it sends incidents to Endpoint Server. Any blocking, onscreen notification, or FlexResponse rules are initiated locally. Endpoint Agents (on or off network) Endpoint Server
  • 36. DATA LOSS PREVENTION: ENDPOINT DISCOVER SYMANTEC: Data Loss Prevention Agent inspects files on internal drives for policy violations, optionally quarantines files or executes custom FlexResponse rules. Agent sends incident data to Endpoint Server. Agent functions when disconnected from network, storing incident data until reconnection. Endpoint Agents (On or off network) Endpoint Server
  • 37. DATA LOSS PREVENTION: NETWORK MONITOR SYMANTEC: Data Loss Prevention
  • 38. DATA LOSS PREVENTION: NETWORK PREVENT FOR EMAIL SYMANTEC: Data Loss Prevention
  • 39. DATA LOSS PREVENTION: NETWORK PREVENT FOR WEB SYMANTEC: Data Loss Prevention
  • 40. DATA LOSS PREVENTION: MOBILE EMAIL MONITOR SYMANTEC: Data Loss Prevention
  • 41. DATA LOSS PREVENTION: MOBILE PREVENT FOR WEB SYMANTEC: Data Loss Prevention DMZCorporate Network VPN DLP Mobile Prevent for Web Server Web Proxy DLP Enforce DLP Mobile Prevent for Web routes mobile traffic through corporate VPN to DLP at all times. Active Sync Exchange = components target prospects likely already have
  • 42. DATA LOSS PREVENTION: DLP FOR CLOUD EMAIL SYMANTEC: Data Loss Prevention
  • 43. DATA LOSS PREVENTION: CLOUD SERVICE FOR EMAIL SYMANTEC: Data Loss Prevention Internet Secured Corporate LAN Email Corporate User Policies / Incidents SMTP / TLS Enforce Platform (14.0.1 or higher) Office 365 Cloud Microsoft Cloud Symantec Email Security.cloud Exchange DLP Cloud Service for Email (Cloudfire) Symantec Cloud DLP Storage DLP Network DLP Endpoint DLP Mobile Safeguard Service Plan (A/V, A/S, Encryption, etc)
  • 44. DATA LOSS PREVENTION: CLOUD PREVENT FOR O365 SYMANTEC: Data Loss Prevention
  • 45. DATA LOSS PREVENTION: SYSTEM REQUIREMENTS (SMALL/MED) SYMANTEC: Data Loss Prevention Enforce Server Network Monitor Detection Servers CPU 2 x 3.0 GHz CPU 2 x 3.0 GHz CPU 2 x 3.0 GHz CPU RAM 6–8 GB 6–8 GB 6–8 GB Disk 500 GB, RAID 1+0 or RAID 5 140 GB 140 GB NICs 1 copper or fiber 1 Gb/100 Mb Ethernet 1 copper or fiber 1 Gb/100 Mb Ethernet 1 copper or fiber 1 Gb/100 Mb Ethernet OS Microsoft Windows Server, Red Hat Linux • Pre-Services Engagement Activity is a must • System Requirements and Compatibility Guide Available • Performance Sizing Guides Available Single Server Deployment CPU 2 x 2.2 GHz 8-core CPU RAM 64 GB Disk 3 TB, RAID 5 configuration NICs 1 copper or fiber 1 Gb Ethernet NIC (if using Network Monitor than 2) OS Microsoft Windows Server, Red Hat Linux
  • 46. SYMANTEC: Data Loss Prevention SYMANTEC: DATA LOSS PREVENTION Licensing and Packaging
  • 47. DATA LOSS PREVENTION: LICENSING • DLP 14.5 is licensed per ”managed user” or “managed device” • DLP requires Oracle Standard Edition One or Standard Edition • Customers may use their own Oracle site license if their Oracle license agreement allows them to create a separate database instance for Symantec DLP and they are entitled to a version of Oracle supported by Symantec DLP. • Symantec resells Oracle Standard Edition One and Standard Edition licenses on a per Processor basis only for DLP • Symantec resells VERITAS Data Insight and Data Insight Portal SYMANTEC: Data Loss Prevention
  • 48. DATA LOSS PREVENTION: PACKAGING (INDIVIDUAL) Endpoint Discover Endpoint Prevent Network Discover Network Protect Network Monitor Prevent for Email Prevent for Web Cloud Storage for Box Email Prevent for O365 Service for Email Mobile (Email Monitor and Web Prevent) SYMANTEC: Data Loss Prevention
  • 49. DATA LOSS PREVENTION: PACKAGING (ADD-ON/RESELL) SYMANTEC: Data Loss Prevention Symantec DLP Form Recognition Veritas Data Insight Veritas Data Insight Self-service Portal Oracle
  • 50. DATA LOSS PREVENTION: PACKAGING (SUITE) SYMANTEC: Data Loss Prevention Symantec DLP Enforce Platform ENDPOINT Endpoint Prevent/Discover Mobile Network Monitor Network Prevent for Web/Email NETWORK SYMANTEC DLP ENTERPRISE SUITE STORAGE Network Protect Network Discover Purchased separately: Form Recognition, Cloud Prevent for Microsoft Office 365 Exchange, Cloud Storage, Veritas Data Insight, Veritas Data Insight Self-Service Portal, Oracle, or all the DLP Cloud Service offerings.
  • 51. DATA LOSS PREVENTION: PACKAGING (SUITE) SYMANTEC: Data Loss Prevention Symantec DLP Enforce Platform SYMANTEC DLP DISCOVER SUITE STORAGE Network Protect Network Discover
  • 52. SYMANTEC: Data Loss Prevention SYMANTEC: DATA LOSS PREVENTION Look and Feel
  • 53. Thank you! Copyright © 2015 Symantec Corporation. All rights reserved. Symantec and the Symantec Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners. This document is provided for informational purposes only and is not intended as advertising. All warranties relating to the information in this document, either express or implied, are disclaimed to the maximum extent allowed by law. The information in this document is subject to change without notice. Thank you! Iftikhar Ali Iqbal https://www.linkedin.com/in/iftikhariqbal/ SYMANTEC: Data Loss Prevention
  • 54. SYMANTEC: Data Loss Prevention SYMANTEC: DATA LOSS PREVENTION Appendix
  • 55. Cloud File Sync and Share SYMANTEC: Data Loss Prev • Endpoint Prevent now monitors and prevents users from syncing sensitive files from their desktop to cloud storage sites • Applications monitored by default include: – Box – Dropbox – Google Drive – Hightail – iCloud – Microsoft OneDrive BenefitsFeatures • Reduces risk of sensitive data loss • Prevents sensitive information from being sync’d to cloud storage sites • Improves end-user awareness and education of security policies
  • 56. Improved Endpoint Agent for Mac OS SYMANTEC: Data Loss Prev • Endpoint Prevent now monitors and prevents confidential data transfer between Mac endpoints and removable storage devices – Save as and File copy operations supported • Endpoint Prevent now monitors and prevents confidential data uploads using browsers on Mac endpoints – Safari, Chrome and Firefox browsers supported • VMware Fusion 7 support monitors data in use on a virtual Windows machine and prevents unauthorized file transfer BenefitsFeatures • Reduces risk of sensitive data loss Mac endpoints • Prevents data loss from Mac endpoints • Enables BYOD
  • 57. Improved Endpoint Agent for Windows SYMANTEC: Data Loss Prev • Chrome support monitors and prevents users from transmitting from Chrome browsers • Microsoft Hyper-V support protects data in use on virtual Windows machines residing on a Hyper-V Server • Media Transfer Protocol (MTP) support monitors and prevents data transfer between Windows desktops and mobile devices using MTP. BenefitsFeatures • Reduces risk of sensitive data loss • Prevents data loss to mobile devices • Enables BYOD
  • 58. How Data Insight Works 59SYMC DLP 12 Eval Workshop (Demo) Presentation Network Discover Network Protect Enforce Corporate LAN Data Insight Windows File Server, NAS Filer, or SharePoint Data Insight retrieves file access information and usage history. Enforce receives Discover incidents, queries Data Insight, populates incidents with file access data and usage history. Network Discover scans target and identifies confidential files.
  • 59. Efficient Incident Workflow First Responders Core IRT Incident Response Procedures Human Resources Escalation Team Extended Team Legal Business Unit A HR Policy Violation Suspected Theft Broken Business Process Fan-out Response Structure Escalation Team Core IRT First Responder Team Extended Team Incident Response Procedures Business Unit A Business Unit B Business Unit C Critical Incidents Fan-in Response Structure Data Flow Direction • The right information, to the right person, in the right order 60SYMC DLP 12 Eval Workshop (Demo) Presentation