SlideShare a Scribd company logo
1 of 27
Download to read offline
.
Intel Security Confidential
1
Preventing Data Breaches
.
Intel Security Confidential
2
Agenda Slide
.
Intel Security Confidential
3
Drawing Boardroom Attention
68%
of data breaches
required public
disclosures1
.
Intel Security Confidential
4
Impacting Company Bottom Line
Costly fines Loss of customers
and revenue
Damaged
reputation
$3.79M is the average cost
of a data breach1
.
Intel Security Confidential
5
Understanding Data Exfiltration
Who wants the data?
Breaches are initiated by:
How are thieves
getting data out?
Where is data being
taken from?
57%
43%External
actors Internal
actors
2/3
of breaches occur on
traditional networks
1/3
occur in cloud
infrastructures
60%
Electronic
means
40%
Physical
means
.
Intel Security Confidential
6
Top Data Protection Challenges
Rising success rate of
malware intrusions
Keeping up with
regulatory compliance
Lack of visibility and
control of data
Both a technical problem and a
business problem to overcome
.
Intel Security Confidential
7
Challenge:
Rising success rate of
malware intrusions
Desired Outcome:
Stay out of the
headlines
.
Intel Security Confidential
8
Comprehensive Portfolio
Extensive, effective, and integrated
Cloud
DLP
File
Encryption
Device
Control
Disk
Encryption
Common
Policy,
Console
and Keys
.
Intel Security Confidential
9
Breath Of Components
Data-in-Motion
Data-at-Rest
Data-in-Use
Data Types Data Loss Vectors Solution
DLP Prevent
DLP Monitor
DLP Discover
Drive Encryption
DLP Endpoint
File and removable
Media Encryption
Device Control
Email/IM Web Post Network Traffic Cloud
Desktop/LaptopDatabase
Removable/Devices Cloud AppsEmail/IM
File Share
File & Clipboard
Cloud Storage
101101100110101001
011001101010011011
1011011001101001
.
Intel Security Confidential
10
Gartner Magic Quadrant for Enterprise
Data Loss Prevention (DLP)
7 Consecutive Years as a Leader
Gartner Magic Quadrant for Mobile Data
Protection (Encryption)
8 Consecutive Years as a Leader
Award Winning Technology
.
Intel Security Confidential
11
Proactive Data Protection
McAfee Threat
Intelligence
Exchange Server
McAfee Data Loss
Prevention
Endpoint
Data
Exchange
Layer
DLPE Identifies
new process
(ProcessA.exe)
starts running
1 DLPE post TIE
request for
ProcessA.exe
reputation
2 TIE performs
reputation
lookup for
ProcessA.exe
3 TIE post reply:
ProcessA.exe
Most Likely
Malicious
4 5 DLPE start
monitoring
ProcessA.exe for
Any/Sensitive file
access
.
Intel Security Confidential
12
Challenge:
Keeping up with
regulatory
compliance
Desired Outcome:
Meet Regulatory
Compliance
.
Intel Security Confidential
13
Achieve Compliance Effortlessly
Flexible, reusable rule sets reduce time, effort and cost
North America
Policies
Europe
Policies
John Moved from US to Germany
PCI
ePO with built-in
DLP policies
Europe
Policies
Marketing
ruleset
HR
ruleset
.
Intel Security Confidential
14
BlockRequest
Justification
Report
Reduce Risks By Coaching
McAfee DLP & Encryption
~75% Reduction
in Employee Risky Behavior
.
Intel Security Confidential
15
[McAfee DLP provides]
bite-sized education
opportunities …
DLP has an enormous
impact on the business
and security culture …
Global print/digital media company
The biggest benefit
[of McAfee DLP Endpoint]
is raising awareness when
the notification pops up …
US-based chemical company
Customer Validation
Real-time feedback via educational popups
.
Intel Security Confidential
16
40% of data loss occurs via lost or stolen hardware
A Laptop is Stolen every
53 seconds
(1,600 per day)1
.
Intel Security Confidential
17
Safe Harbor
Full Disk Encryption Locks Down Lost Data
McAfee
ePO
“FileVault”“BitLocker” “McAfee Drive
Encryption”
Audit physical thefts to avoid
fines and public disclosure
requirements
.
Intel Security Confidential
18
ReportBlock Encrypt
File Encryption Protects Against USB Access
McAfee DLP & Encryption
.
Intel Security Confidential
19
Challenge:
Disappearing
corporate
perimeters
Desired Outcome:
Visibility and control
of sensitive data in
risky places
.
Intel Security Confidential
20
McAfee
EPO
ePO Centralized Management
Automation of monitoring, reporting, and auditing reduces costs!
Single consolidated source for policy management, incident response, and reporting
McAfee DLP (Network & Endpoint) McAfee Endpoint Encryption McAfee ESM
.
Intel Security Confidential
21
Challenge:
It’s both a technical
problem and a
business problem
Desired Outcome:
Work with a trusted
partner to help with data
protection strategy
.
Intel Security Confidential
22
Guidance from Data Protection Professionals
• Define success metrics
• Addresses People, Process, and
Technology components
• Integrate with existing infrastructure
• Achieve security and risk management
program data collection and analysis
objectives
• Create effective information protection
policies, without months of trial and error
Compliance
Governance
Classification
Remediation
Awareness
Discovery
Policies
Risk
Assessment
Data
Protection
.
Intel Security Confidential
23
Finance/Banking
Merrill Lynch
Bank of the West
Kleberg First National Bank
Davidson Bank
Royal Bank of Canada
Federal (GHE)
Apollo Group
Texas Tech University – Health
Science Center (TTUHSC)
NASA
Indian Army
FAA (Federal Aviation Administration)
Manufacturing/
Pharmaceutical
Bayer
General Motors
Kimberly-Clark
Actavis
3M
Healthcare
Kaiser Permanente
Boston Scientific
Health Net
Presence Health
Children’s Hospital of
Philadelphia
Retail
Wal-Mart
Rooms To Go
Tractor Supply
Freeman Decorating Co.
Tricot
High Tech
Oracle
Telstra
DocuSign
Juniper Networks
Applied Materials
Customer Success
.
Intel Security Confidential
24
Intel Security Can Help!
Stop data breaches and avoid being the next data breach headline
Achieve and/or show proof of regulatory compliance
Gain visibility and central control of sensitive data on different
devices and locations, including the cloud
Engage professional services to help you with data protection
strategy
.
Intel Security Confidential
25
Next Step
Schedule a POC with local data protection specialists
Ask about these Jumpstart packages
Essential Services for
McAfee Host Data Loss
Prevention
Essential Services for
McAfee Network Data
Loss Prevention
Essential Services for
McAfee Endpoint
Encryption for PCs
.
Intel Security Confidential
27
TDL
Comprehensive and Integrated SuitesCDA
CDB
Endpoint
Assistant App
ePO Deep
Command
File & Removable
Media Protection
Management of
Native Encryption
Drive Encryption
DLP Endpoint &
Device Control
CDE
DLP Prevent
DLP Monitor
DLP Discover
DLP Endpoint &
Device Control

More Related Content

What's hot

Netpluz DDoS Mitigation - Managed Cyber Security
Netpluz DDoS Mitigation - Managed Cyber Security Netpluz DDoS Mitigation - Managed Cyber Security
Netpluz DDoS Mitigation - Managed Cyber Security Netpluz Asia Pte Ltd
 
You are Doing IT Security Wrong - Understanding the Threat of Modern Cyber-at...
You are Doing IT Security Wrong - Understanding the Threat of Modern Cyber-at...You are Doing IT Security Wrong - Understanding the Threat of Modern Cyber-at...
You are Doing IT Security Wrong - Understanding the Threat of Modern Cyber-at...Michael Noel
 
ICION 2016 - Cyber Security Governance
ICION 2016 - Cyber Security GovernanceICION 2016 - Cyber Security Governance
ICION 2016 - Cyber Security GovernanceCharles Lim
 
VAPT- A Service on Eucalyptus Cloud
VAPT- A Service on Eucalyptus CloudVAPT- A Service on Eucalyptus Cloud
VAPT- A Service on Eucalyptus CloudSwapna Shetye
 
How Network Data Loss Prevention is Implemented
How Network Data Loss Prevention is ImplementedHow Network Data Loss Prevention is Implemented
How Network Data Loss Prevention is ImplementedJerry Paul Acosta
 
Healthcare IT Security Threats & Ways to Defend Them
Healthcare IT Security Threats & Ways to Defend ThemHealthcare IT Security Threats & Ways to Defend Them
Healthcare IT Security Threats & Ways to Defend ThemCheapSSLsecurity
 
Data Loss Prevention: Challenges, Impacts & Effective Strategies
Data Loss Prevention: Challenges, Impacts & Effective StrategiesData Loss Prevention: Challenges, Impacts & Effective Strategies
Data Loss Prevention: Challenges, Impacts & Effective StrategiesSeccuris Inc.
 
Chapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamananChapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamanannewbie2019
 
Tsc2021 cyber-issues
Tsc2021 cyber-issuesTsc2021 cyber-issues
Tsc2021 cyber-issuesErnest Staats
 
Netpluz Managed SOC - MSS Service
Netpluz Managed SOC - MSS Service Netpluz Managed SOC - MSS Service
Netpluz Managed SOC - MSS Service Netpluz Asia Pte Ltd
 
Cyber Security for Digital-Era
Cyber Security for Digital-EraCyber Security for Digital-Era
Cyber Security for Digital-EraJK Tech
 
Proactive incident response
Proactive incident responseProactive incident response
Proactive incident responseBrian Honan
 
Information Technology Security Basics
Information Technology Security BasicsInformation Technology Security Basics
Information Technology Security BasicsMohan Jadhav
 
Put Analytics And Automation At The Core Of Security – Joseph Blankenship – S...
Put Analytics And Automation At The Core Of Security – Joseph Blankenship – S...Put Analytics And Automation At The Core Of Security – Joseph Blankenship – S...
Put Analytics And Automation At The Core Of Security – Joseph Blankenship – S...Core Security
 
SAM05_Barber PW (7-9-15)
SAM05_Barber PW (7-9-15)SAM05_Barber PW (7-9-15)
SAM05_Barber PW (7-9-15)Norm Barber
 
Information Security vs IT - Key Roles & Responsibilities
Information Security vs IT - Key Roles & ResponsibilitiesInformation Security vs IT - Key Roles & Responsibilities
Information Security vs IT - Key Roles & ResponsibilitiesKroll
 

What's hot (20)

Brochure forcepoint dlp_en
Brochure forcepoint dlp_enBrochure forcepoint dlp_en
Brochure forcepoint dlp_en
 
Netpluz DDoS Mitigation - Managed Cyber Security
Netpluz DDoS Mitigation - Managed Cyber Security Netpluz DDoS Mitigation - Managed Cyber Security
Netpluz DDoS Mitigation - Managed Cyber Security
 
Topic11
Topic11Topic11
Topic11
 
You are Doing IT Security Wrong - Understanding the Threat of Modern Cyber-at...
You are Doing IT Security Wrong - Understanding the Threat of Modern Cyber-at...You are Doing IT Security Wrong - Understanding the Threat of Modern Cyber-at...
You are Doing IT Security Wrong - Understanding the Threat of Modern Cyber-at...
 
ICION 2016 - Cyber Security Governance
ICION 2016 - Cyber Security GovernanceICION 2016 - Cyber Security Governance
ICION 2016 - Cyber Security Governance
 
VAPT- A Service on Eucalyptus Cloud
VAPT- A Service on Eucalyptus CloudVAPT- A Service on Eucalyptus Cloud
VAPT- A Service on Eucalyptus Cloud
 
How Network Data Loss Prevention is Implemented
How Network Data Loss Prevention is ImplementedHow Network Data Loss Prevention is Implemented
How Network Data Loss Prevention is Implemented
 
Healthcare IT Security Threats & Ways to Defend Them
Healthcare IT Security Threats & Ways to Defend ThemHealthcare IT Security Threats & Ways to Defend Them
Healthcare IT Security Threats & Ways to Defend Them
 
Data Loss Prevention: Challenges, Impacts & Effective Strategies
Data Loss Prevention: Challenges, Impacts & Effective StrategiesData Loss Prevention: Challenges, Impacts & Effective Strategies
Data Loss Prevention: Challenges, Impacts & Effective Strategies
 
Chapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamananChapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamanan
 
Tsc2021 cyber-issues
Tsc2021 cyber-issuesTsc2021 cyber-issues
Tsc2021 cyber-issues
 
SME Cyber Insurance
SME Cyber Insurance SME Cyber Insurance
SME Cyber Insurance
 
Netpluz Managed SOC - MSS Service
Netpluz Managed SOC - MSS Service Netpluz Managed SOC - MSS Service
Netpluz Managed SOC - MSS Service
 
Cyber Security for Digital-Era
Cyber Security for Digital-EraCyber Security for Digital-Era
Cyber Security for Digital-Era
 
Proactive incident response
Proactive incident responseProactive incident response
Proactive incident response
 
Information Technology Security Basics
Information Technology Security BasicsInformation Technology Security Basics
Information Technology Security Basics
 
SD-WAN - comSpark 2019
SD-WAN - comSpark 2019SD-WAN - comSpark 2019
SD-WAN - comSpark 2019
 
Put Analytics And Automation At The Core Of Security – Joseph Blankenship – S...
Put Analytics And Automation At The Core Of Security – Joseph Blankenship – S...Put Analytics And Automation At The Core Of Security – Joseph Blankenship – S...
Put Analytics And Automation At The Core Of Security – Joseph Blankenship – S...
 
SAM05_Barber PW (7-9-15)
SAM05_Barber PW (7-9-15)SAM05_Barber PW (7-9-15)
SAM05_Barber PW (7-9-15)
 
Information Security vs IT - Key Roles & Responsibilities
Information Security vs IT - Key Roles & ResponsibilitiesInformation Security vs IT - Key Roles & Responsibilities
Information Security vs IT - Key Roles & Responsibilities
 

Viewers also liked

RETAILING CLASS FOR STUDENT
RETAILING CLASS FOR STUDENTRETAILING CLASS FOR STUDENT
RETAILING CLASS FOR STUDENTKank Hari
 
Unit 3 communities and interactions
Unit 3 communities and interactionsUnit 3 communities and interactions
Unit 3 communities and interactionsArnulfo Garcia
 
069. SUPERHIK OPET NAPADA
069. SUPERHIK OPET NAPADA069. SUPERHIK OPET NAPADA
069. SUPERHIK OPET NAPADATompa *
 
7-key-elements-your-site-needs-to get-vc-funding
7-key-elements-your-site-needs-to get-vc-funding7-key-elements-your-site-needs-to get-vc-funding
7-key-elements-your-site-needs-to get-vc-fundingCristiane Namiuti
 
Dell SecureWorks Sale Meeting Presentation
Dell SecureWorks Sale Meeting PresentationDell SecureWorks Sale Meeting Presentation
Dell SecureWorks Sale Meeting PresentationErwin Carrow
 
Smitha project
Smitha projectSmitha project
Smitha projectsmitharajr
 
Solid phase oligonucleotide synthesis
Solid phase oligonucleotide synthesisSolid phase oligonucleotide synthesis
Solid phase oligonucleotide synthesisgrachea aeryndhien
 
Impact of recession on Advertising industry
Impact of recession on Advertising industryImpact of recession on Advertising industry
Impact of recession on Advertising industryNaman Sharma
 
Tang 06 alcohols, aldehydes, ketones 2015
Tang 06   alcohols, aldehydes, ketones 2015Tang 06   alcohols, aldehydes, ketones 2015
Tang 06 alcohols, aldehydes, ketones 2015mrtangextrahelp
 
ARIM Technologies Brochure - Managed Security Services
ARIM Technologies Brochure - Managed Security ServicesARIM Technologies Brochure - Managed Security Services
ARIM Technologies Brochure - Managed Security ServicesARIM Technologies
 
Marketplace Sites Begin To Dominate E-Commerce Market In Indonesia
Marketplace Sites Begin To Dominate E-Commerce Market In Indonesia Marketplace Sites Begin To Dominate E-Commerce Market In Indonesia
Marketplace Sites Begin To Dominate E-Commerce Market In Indonesia Irsyad Ramli
 
0804. VATRENO PODNE
0804. VATRENO PODNE0804. VATRENO PODNE
0804. VATRENO PODNETompa *
 
0656. POBEDA VUKA SAMOTNJAKA
0656. POBEDA VUKA SAMOTNJAKA0656. POBEDA VUKA SAMOTNJAKA
0656. POBEDA VUKA SAMOTNJAKATompa *
 

Viewers also liked (20)

RETAILING CLASS FOR STUDENT
RETAILING CLASS FOR STUDENTRETAILING CLASS FOR STUDENT
RETAILING CLASS FOR STUDENT
 
PROXÉMIA
PROXÉMIAPROXÉMIA
PROXÉMIA
 
Unit 3 communities and interactions
Unit 3 communities and interactionsUnit 3 communities and interactions
Unit 3 communities and interactions
 
069. SUPERHIK OPET NAPADA
069. SUPERHIK OPET NAPADA069. SUPERHIK OPET NAPADA
069. SUPERHIK OPET NAPADA
 
7-key-elements-your-site-needs-to get-vc-funding
7-key-elements-your-site-needs-to get-vc-funding7-key-elements-your-site-needs-to get-vc-funding
7-key-elements-your-site-needs-to get-vc-funding
 
Dell SecureWorks Sale Meeting Presentation
Dell SecureWorks Sale Meeting PresentationDell SecureWorks Sale Meeting Presentation
Dell SecureWorks Sale Meeting Presentation
 
Smitha project
Smitha projectSmitha project
Smitha project
 
Solid phase oligonucleotide synthesis
Solid phase oligonucleotide synthesisSolid phase oligonucleotide synthesis
Solid phase oligonucleotide synthesis
 
Carbohydrates
CarbohydratesCarbohydrates
Carbohydrates
 
Diagrammes e p_h
Diagrammes e p_hDiagrammes e p_h
Diagrammes e p_h
 
Impact of recession on Advertising industry
Impact of recession on Advertising industryImpact of recession on Advertising industry
Impact of recession on Advertising industry
 
Culture
CultureCulture
Culture
 
Carbohydrates
CarbohydratesCarbohydrates
Carbohydrates
 
Pregnancy
PregnancyPregnancy
Pregnancy
 
Tang 06 alcohols, aldehydes, ketones 2015
Tang 06   alcohols, aldehydes, ketones 2015Tang 06   alcohols, aldehydes, ketones 2015
Tang 06 alcohols, aldehydes, ketones 2015
 
ARIM Technologies Brochure - Managed Security Services
ARIM Technologies Brochure - Managed Security ServicesARIM Technologies Brochure - Managed Security Services
ARIM Technologies Brochure - Managed Security Services
 
Marketplace Sites Begin To Dominate E-Commerce Market In Indonesia
Marketplace Sites Begin To Dominate E-Commerce Market In Indonesia Marketplace Sites Begin To Dominate E-Commerce Market In Indonesia
Marketplace Sites Begin To Dominate E-Commerce Market In Indonesia
 
Carbohydrates
Carbohydrates Carbohydrates
Carbohydrates
 
0804. VATRENO PODNE
0804. VATRENO PODNE0804. VATRENO PODNE
0804. VATRENO PODNE
 
0656. POBEDA VUKA SAMOTNJAKA
0656. POBEDA VUKA SAMOTNJAKA0656. POBEDA VUKA SAMOTNJAKA
0656. POBEDA VUKA SAMOTNJAKA
 

Similar to Preventing Data Breaches

MT50 Data is the new currency: Protect it!
MT50 Data is the new currency: Protect it!MT50 Data is the new currency: Protect it!
MT50 Data is the new currency: Protect it!Dell EMC World
 
SegurançA Da InformaçãO Faat V1 4
SegurançA Da InformaçãO Faat V1 4SegurançA Da InformaçãO Faat V1 4
SegurançA Da InformaçãO Faat V1 4Rodrigo Piovesana
 
MT54 Better security is better business
MT54 Better security is better businessMT54 Better security is better business
MT54 Better security is better businessDell EMC World
 
Cyber security within Organisations: A sneaky peak of current status, trends,...
Cyber security within Organisations: A sneaky peak of current status, trends,...Cyber security within Organisations: A sneaky peak of current status, trends,...
Cyber security within Organisations: A sneaky peak of current status, trends,...Marco Casassa Mont
 
Protecting health and life science organizations from breaches and ransomware
Protecting health and life science organizations from breaches and ransomwareProtecting health and life science organizations from breaches and ransomware
Protecting health and life science organizations from breaches and ransomwareCloudera, Inc.
 
The Definitive Guide to Data Loss Prevention
The Definitive Guide to Data Loss PreventionThe Definitive Guide to Data Loss Prevention
The Definitive Guide to Data Loss PreventionDigital Guardian
 
data-leakage-prevention
 data-leakage-prevention data-leakage-prevention
data-leakage-preventionanuepcet
 
Life After Compliance march 2010 v2
Life After Compliance march 2010 v2Life After Compliance march 2010 v2
Life After Compliance march 2010 v2SafeNet
 
Data Loss Prevention from Symantec
Data Loss Prevention from SymantecData Loss Prevention from Symantec
Data Loss Prevention from SymantecArrow ECS UK
 
CYBER SECURITY WHAT IS IT AND WHAT YOU NEED TO KNOW.pdf
CYBER SECURITY WHAT IS IT AND WHAT YOU NEED TO KNOW.pdfCYBER SECURITY WHAT IS IT AND WHAT YOU NEED TO KNOW.pdf
CYBER SECURITY WHAT IS IT AND WHAT YOU NEED TO KNOW.pdfJenna Murray
 
Meetup presenation 06192013
Meetup presenation 06192013 Meetup presenation 06192013
Meetup presenation 06192013 Sqrrl
 
Denis Hackett M.Sc. - IDC Presentation Sept 2014 Croke Park Sept25 - Denis Ha...
Denis Hackett M.Sc. - IDC Presentation Sept 2014 Croke Park Sept25 - Denis Ha...Denis Hackett M.Sc. - IDC Presentation Sept 2014 Croke Park Sept25 - Denis Ha...
Denis Hackett M.Sc. - IDC Presentation Sept 2014 Croke Park Sept25 - Denis Ha...Education & Training Boards
 
Secure Your High Risk Data
 Secure Your High Risk Data  Secure Your High Risk Data
Secure Your High Risk Data Naveed Ahmed
 
Cisco Connected Factory - Security
Cisco Connected Factory - SecurityCisco Connected Factory - Security
Cisco Connected Factory - SecurityConnected Futures
 
626 Information leakage and Data Loss Prevention Tools
626 Information leakage and Data Loss Prevention Tools626 Information leakage and Data Loss Prevention Tools
626 Information leakage and Data Loss Prevention ToolsSplitty
 

Similar to Preventing Data Breaches (20)

MT50 Data is the new currency: Protect it!
MT50 Data is the new currency: Protect it!MT50 Data is the new currency: Protect it!
MT50 Data is the new currency: Protect it!
 
Symantec Data Loss Prevention 9
Symantec Data Loss Prevention 9Symantec Data Loss Prevention 9
Symantec Data Loss Prevention 9
 
SegurançA Da InformaçãO Faat V1 4
SegurançA Da InformaçãO Faat V1 4SegurançA Da InformaçãO Faat V1 4
SegurançA Da InformaçãO Faat V1 4
 
MT54 Better security is better business
MT54 Better security is better businessMT54 Better security is better business
MT54 Better security is better business
 
Cyber security within Organisations: A sneaky peak of current status, trends,...
Cyber security within Organisations: A sneaky peak of current status, trends,...Cyber security within Organisations: A sneaky peak of current status, trends,...
Cyber security within Organisations: A sneaky peak of current status, trends,...
 
Protecting health and life science organizations from breaches and ransomware
Protecting health and life science organizations from breaches and ransomwareProtecting health and life science organizations from breaches and ransomware
Protecting health and life science organizations from breaches and ransomware
 
The Definitive Guide to Data Loss Prevention
The Definitive Guide to Data Loss PreventionThe Definitive Guide to Data Loss Prevention
The Definitive Guide to Data Loss Prevention
 
data-leakage-prevention
 data-leakage-prevention data-leakage-prevention
data-leakage-prevention
 
Dlp notes
Dlp notesDlp notes
Dlp notes
 
Life After Compliance march 2010 v2
Life After Compliance march 2010 v2Life After Compliance march 2010 v2
Life After Compliance march 2010 v2
 
Data Loss Prevention from Symantec
Data Loss Prevention from SymantecData Loss Prevention from Symantec
Data Loss Prevention from Symantec
 
CYBER SECURITY WHAT IS IT AND WHAT YOU NEED TO KNOW.pdf
CYBER SECURITY WHAT IS IT AND WHAT YOU NEED TO KNOW.pdfCYBER SECURITY WHAT IS IT AND WHAT YOU NEED TO KNOW.pdf
CYBER SECURITY WHAT IS IT AND WHAT YOU NEED TO KNOW.pdf
 
Meetup presenation 06192013
Meetup presenation 06192013 Meetup presenation 06192013
Meetup presenation 06192013
 
Denis Hackett M.Sc. - IDC Presentation Sept 2014 Croke Park Sept25 - Denis Ha...
Denis Hackett M.Sc. - IDC Presentation Sept 2014 Croke Park Sept25 - Denis Ha...Denis Hackett M.Sc. - IDC Presentation Sept 2014 Croke Park Sept25 - Denis Ha...
Denis Hackett M.Sc. - IDC Presentation Sept 2014 Croke Park Sept25 - Denis Ha...
 
Secure Your High Risk Data
 Secure Your High Risk Data  Secure Your High Risk Data
Secure Your High Risk Data
 
Cisco Connected Factory - Security
Cisco Connected Factory - SecurityCisco Connected Factory - Security
Cisco Connected Factory - Security
 
MEDS
MEDSMEDS
MEDS
 
Information Security Seminar
Information Security SeminarInformation Security Seminar
Information Security Seminar
 
626 Information leakage and Data Loss Prevention Tools
626 Information leakage and Data Loss Prevention Tools626 Information leakage and Data Loss Prevention Tools
626 Information leakage and Data Loss Prevention Tools
 
Perimeter Security is Failing
Perimeter Security is FailingPerimeter Security is Failing
Perimeter Security is Failing
 

More from xband

Talos threat-intelligence
Talos threat-intelligenceTalos threat-intelligence
Talos threat-intelligencexband
 
Data Center Server security
Data Center Server securityData Center Server security
Data Center Server securityxband
 
Complete Endpoint protection
Complete Endpoint protectionComplete Endpoint protection
Complete Endpoint protectionxband
 
Advanced Threat Defense Intel Security
Advanced Threat Defense  Intel SecurityAdvanced Threat Defense  Intel Security
Advanced Threat Defense Intel Securityxband
 
Security Transformation Services
Security Transformation ServicesSecurity Transformation Services
Security Transformation Servicesxband
 
Security Operations and Response
Security Operations and ResponseSecurity Operations and Response
Security Operations and Responsexband
 
Information Risk and Protection
Information Risk and ProtectionInformation Risk and Protection
Information Risk and Protectionxband
 
IBM Security Strategy Overview
IBM Security Strategy OverviewIBM Security Strategy Overview
IBM Security Strategy Overviewxband
 
API Connect Presentation
API Connect PresentationAPI Connect Presentation
API Connect Presentationxband
 
Verizon Data Breach Investigation Report
Verizon Data Breach Investigation ReportVerizon Data Breach Investigation Report
Verizon Data Breach Investigation Reportxband
 
Big Fix Q-Radar Ahmed Sharaf - EmbeddedSecurity.net
Big Fix Q-Radar Ahmed Sharaf - EmbeddedSecurity.netBig Fix Q-Radar Ahmed Sharaf - EmbeddedSecurity.net
Big Fix Q-Radar Ahmed Sharaf - EmbeddedSecurity.netxband
 
Bridging the Data Security Gap
Bridging the Data Security GapBridging the Data Security Gap
Bridging the Data Security Gapxband
 
Hipaa Omnibus Final-Rule-eResource
Hipaa Omnibus Final-Rule-eResourceHipaa Omnibus Final-Rule-eResource
Hipaa Omnibus Final-Rule-eResourcexband
 
The Total Economic Impact™ Of Cisco Data Virtualization
The Total Economic Impact™ Of Cisco Data VirtualizationThe Total Economic Impact™ Of Cisco Data Virtualization
The Total Economic Impact™ Of Cisco Data Virtualizationxband
 
Assessing the Business Value of SDN Datacenter Security Solutions
Assessing the Business Value of SDN Datacenter Security SolutionsAssessing the Business Value of SDN Datacenter Security Solutions
Assessing the Business Value of SDN Datacenter Security Solutionsxband
 
Big Data, Little Data, and Everything in Between
Big Data, Little Data, and Everything in BetweenBig Data, Little Data, and Everything in Between
Big Data, Little Data, and Everything in Betweenxband
 
2015 cost of data breach study global analysis
2015 cost of data breach study global analysis2015 cost of data breach study global analysis
2015 cost of data breach study global analysisxband
 
Charles la trobe_college_learning_without_limits
Charles la trobe_college_learning_without_limitsCharles la trobe_college_learning_without_limits
Charles la trobe_college_learning_without_limitsxband
 
Fujitsu spain revolutionizing_public_administration
Fujitsu spain revolutionizing_public_administrationFujitsu spain revolutionizing_public_administration
Fujitsu spain revolutionizing_public_administrationxband
 
Iter supercomputing beyond_horizon
Iter supercomputing beyond_horizonIter supercomputing beyond_horizon
Iter supercomputing beyond_horizonxband
 

More from xband (20)

Talos threat-intelligence
Talos threat-intelligenceTalos threat-intelligence
Talos threat-intelligence
 
Data Center Server security
Data Center Server securityData Center Server security
Data Center Server security
 
Complete Endpoint protection
Complete Endpoint protectionComplete Endpoint protection
Complete Endpoint protection
 
Advanced Threat Defense Intel Security
Advanced Threat Defense  Intel SecurityAdvanced Threat Defense  Intel Security
Advanced Threat Defense Intel Security
 
Security Transformation Services
Security Transformation ServicesSecurity Transformation Services
Security Transformation Services
 
Security Operations and Response
Security Operations and ResponseSecurity Operations and Response
Security Operations and Response
 
Information Risk and Protection
Information Risk and ProtectionInformation Risk and Protection
Information Risk and Protection
 
IBM Security Strategy Overview
IBM Security Strategy OverviewIBM Security Strategy Overview
IBM Security Strategy Overview
 
API Connect Presentation
API Connect PresentationAPI Connect Presentation
API Connect Presentation
 
Verizon Data Breach Investigation Report
Verizon Data Breach Investigation ReportVerizon Data Breach Investigation Report
Verizon Data Breach Investigation Report
 
Big Fix Q-Radar Ahmed Sharaf - EmbeddedSecurity.net
Big Fix Q-Radar Ahmed Sharaf - EmbeddedSecurity.netBig Fix Q-Radar Ahmed Sharaf - EmbeddedSecurity.net
Big Fix Q-Radar Ahmed Sharaf - EmbeddedSecurity.net
 
Bridging the Data Security Gap
Bridging the Data Security GapBridging the Data Security Gap
Bridging the Data Security Gap
 
Hipaa Omnibus Final-Rule-eResource
Hipaa Omnibus Final-Rule-eResourceHipaa Omnibus Final-Rule-eResource
Hipaa Omnibus Final-Rule-eResource
 
The Total Economic Impact™ Of Cisco Data Virtualization
The Total Economic Impact™ Of Cisco Data VirtualizationThe Total Economic Impact™ Of Cisco Data Virtualization
The Total Economic Impact™ Of Cisco Data Virtualization
 
Assessing the Business Value of SDN Datacenter Security Solutions
Assessing the Business Value of SDN Datacenter Security SolutionsAssessing the Business Value of SDN Datacenter Security Solutions
Assessing the Business Value of SDN Datacenter Security Solutions
 
Big Data, Little Data, and Everything in Between
Big Data, Little Data, and Everything in BetweenBig Data, Little Data, and Everything in Between
Big Data, Little Data, and Everything in Between
 
2015 cost of data breach study global analysis
2015 cost of data breach study global analysis2015 cost of data breach study global analysis
2015 cost of data breach study global analysis
 
Charles la trobe_college_learning_without_limits
Charles la trobe_college_learning_without_limitsCharles la trobe_college_learning_without_limits
Charles la trobe_college_learning_without_limits
 
Fujitsu spain revolutionizing_public_administration
Fujitsu spain revolutionizing_public_administrationFujitsu spain revolutionizing_public_administration
Fujitsu spain revolutionizing_public_administration
 
Iter supercomputing beyond_horizon
Iter supercomputing beyond_horizonIter supercomputing beyond_horizon
Iter supercomputing beyond_horizon
 

Recently uploaded

Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilV3cube
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 

Recently uploaded (20)

Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 

Preventing Data Breaches

  • 3. . Intel Security Confidential 3 Drawing Boardroom Attention 68% of data breaches required public disclosures1
  • 4. . Intel Security Confidential 4 Impacting Company Bottom Line Costly fines Loss of customers and revenue Damaged reputation $3.79M is the average cost of a data breach1
  • 5. . Intel Security Confidential 5 Understanding Data Exfiltration Who wants the data? Breaches are initiated by: How are thieves getting data out? Where is data being taken from? 57% 43%External actors Internal actors 2/3 of breaches occur on traditional networks 1/3 occur in cloud infrastructures 60% Electronic means 40% Physical means
  • 6. . Intel Security Confidential 6 Top Data Protection Challenges Rising success rate of malware intrusions Keeping up with regulatory compliance Lack of visibility and control of data Both a technical problem and a business problem to overcome
  • 7. . Intel Security Confidential 7 Challenge: Rising success rate of malware intrusions Desired Outcome: Stay out of the headlines
  • 8. . Intel Security Confidential 8 Comprehensive Portfolio Extensive, effective, and integrated Cloud DLP File Encryption Device Control Disk Encryption Common Policy, Console and Keys
  • 9. . Intel Security Confidential 9 Breath Of Components Data-in-Motion Data-at-Rest Data-in-Use Data Types Data Loss Vectors Solution DLP Prevent DLP Monitor DLP Discover Drive Encryption DLP Endpoint File and removable Media Encryption Device Control Email/IM Web Post Network Traffic Cloud Desktop/LaptopDatabase Removable/Devices Cloud AppsEmail/IM File Share File & Clipboard Cloud Storage 101101100110101001 011001101010011011 1011011001101001
  • 10. . Intel Security Confidential 10 Gartner Magic Quadrant for Enterprise Data Loss Prevention (DLP) 7 Consecutive Years as a Leader Gartner Magic Quadrant for Mobile Data Protection (Encryption) 8 Consecutive Years as a Leader Award Winning Technology
  • 11. . Intel Security Confidential 11 Proactive Data Protection McAfee Threat Intelligence Exchange Server McAfee Data Loss Prevention Endpoint Data Exchange Layer DLPE Identifies new process (ProcessA.exe) starts running 1 DLPE post TIE request for ProcessA.exe reputation 2 TIE performs reputation lookup for ProcessA.exe 3 TIE post reply: ProcessA.exe Most Likely Malicious 4 5 DLPE start monitoring ProcessA.exe for Any/Sensitive file access
  • 12. . Intel Security Confidential 12 Challenge: Keeping up with regulatory compliance Desired Outcome: Meet Regulatory Compliance
  • 13. . Intel Security Confidential 13 Achieve Compliance Effortlessly Flexible, reusable rule sets reduce time, effort and cost North America Policies Europe Policies John Moved from US to Germany PCI ePO with built-in DLP policies Europe Policies Marketing ruleset HR ruleset
  • 14. . Intel Security Confidential 14 BlockRequest Justification Report Reduce Risks By Coaching McAfee DLP & Encryption ~75% Reduction in Employee Risky Behavior
  • 15. . Intel Security Confidential 15 [McAfee DLP provides] bite-sized education opportunities … DLP has an enormous impact on the business and security culture … Global print/digital media company The biggest benefit [of McAfee DLP Endpoint] is raising awareness when the notification pops up … US-based chemical company Customer Validation Real-time feedback via educational popups
  • 16. . Intel Security Confidential 16 40% of data loss occurs via lost or stolen hardware A Laptop is Stolen every 53 seconds (1,600 per day)1
  • 17. . Intel Security Confidential 17 Safe Harbor Full Disk Encryption Locks Down Lost Data McAfee ePO “FileVault”“BitLocker” “McAfee Drive Encryption” Audit physical thefts to avoid fines and public disclosure requirements
  • 18. . Intel Security Confidential 18 ReportBlock Encrypt File Encryption Protects Against USB Access McAfee DLP & Encryption
  • 19. . Intel Security Confidential 19 Challenge: Disappearing corporate perimeters Desired Outcome: Visibility and control of sensitive data in risky places
  • 20. . Intel Security Confidential 20 McAfee EPO ePO Centralized Management Automation of monitoring, reporting, and auditing reduces costs! Single consolidated source for policy management, incident response, and reporting McAfee DLP (Network & Endpoint) McAfee Endpoint Encryption McAfee ESM
  • 21. . Intel Security Confidential 21 Challenge: It’s both a technical problem and a business problem Desired Outcome: Work with a trusted partner to help with data protection strategy
  • 22. . Intel Security Confidential 22 Guidance from Data Protection Professionals • Define success metrics • Addresses People, Process, and Technology components • Integrate with existing infrastructure • Achieve security and risk management program data collection and analysis objectives • Create effective information protection policies, without months of trial and error Compliance Governance Classification Remediation Awareness Discovery Policies Risk Assessment Data Protection
  • 23. . Intel Security Confidential 23 Finance/Banking Merrill Lynch Bank of the West Kleberg First National Bank Davidson Bank Royal Bank of Canada Federal (GHE) Apollo Group Texas Tech University – Health Science Center (TTUHSC) NASA Indian Army FAA (Federal Aviation Administration) Manufacturing/ Pharmaceutical Bayer General Motors Kimberly-Clark Actavis 3M Healthcare Kaiser Permanente Boston Scientific Health Net Presence Health Children’s Hospital of Philadelphia Retail Wal-Mart Rooms To Go Tractor Supply Freeman Decorating Co. Tricot High Tech Oracle Telstra DocuSign Juniper Networks Applied Materials Customer Success
  • 24. . Intel Security Confidential 24 Intel Security Can Help! Stop data breaches and avoid being the next data breach headline Achieve and/or show proof of regulatory compliance Gain visibility and central control of sensitive data on different devices and locations, including the cloud Engage professional services to help you with data protection strategy
  • 25. . Intel Security Confidential 25 Next Step Schedule a POC with local data protection specialists Ask about these Jumpstart packages Essential Services for McAfee Host Data Loss Prevention Essential Services for McAfee Network Data Loss Prevention Essential Services for McAfee Endpoint Encryption for PCs
  • 26.
  • 27. . Intel Security Confidential 27 TDL Comprehensive and Integrated SuitesCDA CDB Endpoint Assistant App ePO Deep Command File & Removable Media Protection Management of Native Encryption Drive Encryption DLP Endpoint & Device Control CDE DLP Prevent DLP Monitor DLP Discover DLP Endpoint & Device Control