Kamal Sharma – Technical Consultant [email protected]

13
Copyright 2009 Trend Micro Inc. 1 Kamal Sharma – Technical Consultant [email protected] When Encryption Isn't Enough …

description

When Encryption Isn't Enough …. Kamal Sharma – Technical Consultant [email protected]. Agenda. The Impact Encryption Modules Think Again DPL and SPN Summary. The Impact of Data Loss. * Ponemon Institute. Cost: $6.3M per breach * Loss of customers/business Brand damage - PowerPoint PPT Presentation

Transcript of Kamal Sharma – Technical Consultant [email protected]

Page 1: Kamal Sharma – Technical Consultant kamal_s@trendmicro.com

Copyright 2009 Trend Micro Inc.1

Kamal Sharma – Technical Consultant

[email protected]

When Encryption Isn't Enough …

Page 2: Kamal Sharma – Technical Consultant kamal_s@trendmicro.com

Copyright 2009 Trend Micro Inc.

Agenda

The ImpactEncryption ModulesThink AgainDPL and SPNSummary

Page 3: Kamal Sharma – Technical Consultant kamal_s@trendmicro.com

Copyright 2009 Trend Micro Inc.

The Impact of Data Loss

• Cost: $6.3M per breach*

• Loss of customers/business

• Brand damage

• Stock price decrease

• Regulatory fines

• Legal defense

• Notification and compensation

• Public relations & security response* Ponemon Institute

Page 4: Kamal Sharma – Technical Consultant kamal_s@trendmicro.com

Copyright 2009 Trend Micro Inc.Classification 04/22/23 4

Trend Micro Encryption Solutions Securing Enterprise Data

Gateway Email Encryption

EndpointSoftware and hardware full disk encryption, file/folder encryption, removable media encryption, device control

EmailIdentify-Based Encryption (IBE) at gateway, desktop and hosted

USB

CD/DVD

New!

CloudSecureCloud encrypts Private/Public Cloud Data

Page 5: Kamal Sharma – Technical Consultant kamal_s@trendmicro.com

Copyright 2009 Trend Micro Inc.

Trend Micro Endpoint EncryptionProtection Modules

Trend Micro Confidential 04/22/23 5

Endpoint Encryption PolicyServer Module

Endpoint Encryption DataArmor Module

Endpoint Encryption DriveArmor Module

Endpoint Encryption FileArmor Module

Management Console

Self-Encrypting Drives (SED)

File/Folder & Removable Media Encryption

Software Full Disk Encryption

KeyArmor

Encrypted USBs (Hardware)

Page 6: Kamal Sharma – Technical Consultant kamal_s@trendmicro.com

Copyright 2009 Trend Micro Inc.

6

External Attacks

OrganizationalData

* Source: datalossdb.org

Think Your Data is Secure? Think Again

Internal Threats! 59% of all data loss originates from the INSIDE*

Criminal Threats:

•Come from many sources, spam, spyware, malicious sites and employee downloads

Hackers: •Compromise web-based applications to access databases

Insider Threats: •Malicious and accidental breaches of private data and intellectual property•Lost and stolen laptops

Page 7: Kamal Sharma – Technical Consultant kamal_s@trendmicro.com

Copyright 2009 Trend Micro Inc.

7

USB

Corporate email

Email on the public Internet

USB

Email on the public Internet

WiFi

CD / DVD

PDA

Bluetooth / infrared

Printer

Many of these concerns can ONLY be addressed via endpoint intelligence

1 2 3 4 5 6

Source: Market Research International

CD / DVD

PDA

WiFi

Bluetooth / infrared

The Importance of Endpoint Protection

Top Threat Vectors of Concern …

Most ConcernedLeast Concerned

Page 8: Kamal Sharma – Technical Consultant kamal_s@trendmicro.com

Copyright 2009 Trend Micro Inc.8

Trend Miro DLP Solution

DLP Management ServerManagement, Policy, Workflow & Reporting

DLP PolicyDiscover, Monitor and Protect

Endpoint Network Monitor

Data Discover *

* Data discovery bundled into Endpoint offering

Page 9: Kamal Sharma – Technical Consultant kamal_s@trendmicro.com

Copyright 2009 Trend Micro Inc.9

Trend Micro DLP Solution

Trend Micro Confidential 04/22/23 9

Internet Firewall Gateway

Document Management Systems

File Repositories

Desktop

LaptopDLP Network Monitor•Monitor•Report

DLP Agent

DLP Endpoint• Discover• Monitor• User Self-Remediation• Protect

DLP Management Server• Centralized Management• Policy• Visibility• Workflow

Form factor: software

Form factor: software appliance

Form factor: software/virtual/

hardware appliance

Page 10: Kamal Sharma – Technical Consultant kamal_s@trendmicro.com

Copyright 2009 Trend Micro Inc.

Monitor

ACME Customer Privacy ProtectionEmployees of ACME are expectedto protect sensitive informationcontaining customer information such as names, account numbers,social security numbers etc. Please report any …Call the helpdesk or email.

Protect

Educate/Self Remediation

DiscoverTMDLP for Endpoint• Intelligent

– Fingerprint, Regex, Keyword, Meta-data

• Small Footprint• Invisible• Independent• Robust

Endpoint

Trend Micro DLP for Endpoint Product Components

TMDLP Management Server• Centralized Management• Policy• Workflow• Reporting

Management Server

Page 11: Kamal Sharma – Technical Consultant kamal_s@trendmicro.com

Copyright 2009 Trend Micro Inc.

11

Fingerprinting Technology for Unstructured Data Protection

• Fast

• Small

• Accurate

• Language independent

Page 12: Kamal Sharma – Technical Consultant kamal_s@trendmicro.com

Copyright 2009 Trend Micro Inc.

Data Security + Content SecurityOn-Premise + Cloud-based Solutions

• Email Reputation

• Web Reputation

• File Reputation

With Global Threat Feedback

12

+

Page 13: Kamal Sharma – Technical Consultant kamal_s@trendmicro.com

Copyright 2009 Trend Micro Inc.

Thank You

Learn more: www.trendmicro.com/us/home/enterprise