Kamal Sharma – Technical Consultant [email protected]
description
Transcript of Kamal Sharma – Technical Consultant [email protected]
Copyright 2009 Trend Micro Inc.1
Kamal Sharma – Technical Consultant
When Encryption Isn't Enough …
Copyright 2009 Trend Micro Inc.
Agenda
The ImpactEncryption ModulesThink AgainDPL and SPNSummary
Copyright 2009 Trend Micro Inc.
The Impact of Data Loss
• Cost: $6.3M per breach*
• Loss of customers/business
• Brand damage
• Stock price decrease
• Regulatory fines
• Legal defense
• Notification and compensation
• Public relations & security response* Ponemon Institute
Copyright 2009 Trend Micro Inc.Classification 04/22/23 4
Trend Micro Encryption Solutions Securing Enterprise Data
Gateway Email Encryption
EndpointSoftware and hardware full disk encryption, file/folder encryption, removable media encryption, device control
EmailIdentify-Based Encryption (IBE) at gateway, desktop and hosted
USB
CD/DVD
New!
CloudSecureCloud encrypts Private/Public Cloud Data
Copyright 2009 Trend Micro Inc.
Trend Micro Endpoint EncryptionProtection Modules
Trend Micro Confidential 04/22/23 5
Endpoint Encryption PolicyServer Module
Endpoint Encryption DataArmor Module
Endpoint Encryption DriveArmor Module
Endpoint Encryption FileArmor Module
Management Console
Self-Encrypting Drives (SED)
File/Folder & Removable Media Encryption
Software Full Disk Encryption
KeyArmor
Encrypted USBs (Hardware)
Copyright 2009 Trend Micro Inc.
6
External Attacks
OrganizationalData
* Source: datalossdb.org
Think Your Data is Secure? Think Again
Internal Threats! 59% of all data loss originates from the INSIDE*
Criminal Threats:
•Come from many sources, spam, spyware, malicious sites and employee downloads
Hackers: •Compromise web-based applications to access databases
Insider Threats: •Malicious and accidental breaches of private data and intellectual property•Lost and stolen laptops
Copyright 2009 Trend Micro Inc.
7
USB
Corporate email
Email on the public Internet
USB
Email on the public Internet
WiFi
CD / DVD
PDA
Bluetooth / infrared
Printer
Many of these concerns can ONLY be addressed via endpoint intelligence
1 2 3 4 5 6
Source: Market Research International
CD / DVD
PDA
WiFi
Bluetooth / infrared
The Importance of Endpoint Protection
Top Threat Vectors of Concern …
Most ConcernedLeast Concerned
Copyright 2009 Trend Micro Inc.8
Trend Miro DLP Solution
DLP Management ServerManagement, Policy, Workflow & Reporting
DLP PolicyDiscover, Monitor and Protect
Endpoint Network Monitor
Data Discover *
* Data discovery bundled into Endpoint offering
Copyright 2009 Trend Micro Inc.9
Trend Micro DLP Solution
Trend Micro Confidential 04/22/23 9
Internet Firewall Gateway
Document Management Systems
File Repositories
Desktop
LaptopDLP Network Monitor•Monitor•Report
DLP Agent
DLP Endpoint• Discover• Monitor• User Self-Remediation• Protect
DLP Management Server• Centralized Management• Policy• Visibility• Workflow
Form factor: software
Form factor: software appliance
Form factor: software/virtual/
hardware appliance
Copyright 2009 Trend Micro Inc.
Monitor
ACME Customer Privacy ProtectionEmployees of ACME are expectedto protect sensitive informationcontaining customer information such as names, account numbers,social security numbers etc. Please report any …Call the helpdesk or email.
Protect
Educate/Self Remediation
DiscoverTMDLP for Endpoint• Intelligent
– Fingerprint, Regex, Keyword, Meta-data
• Small Footprint• Invisible• Independent• Robust
Endpoint
Trend Micro DLP for Endpoint Product Components
TMDLP Management Server• Centralized Management• Policy• Workflow• Reporting
Management Server
Copyright 2009 Trend Micro Inc.
11
Fingerprinting Technology for Unstructured Data Protection
• Fast
• Small
• Accurate
• Language independent
Copyright 2009 Trend Micro Inc.
Data Security + Content SecurityOn-Premise + Cloud-based Solutions
• Email Reputation
• Web Reputation
• File Reputation
With Global Threat Feedback
12
+
Copyright 2009 Trend Micro Inc.
Thank You
Learn more: www.trendmicro.com/us/home/enterprise