Watchful-Corporate-Overview-Q1-16

21
User-friendly information management «NAME» Watchful Software

Transcript of Watchful-Corporate-Overview-Q1-16

Page 1: Watchful-Corporate-Overview-Q1-16

User-friendly information management

«NAME»Watchful Software

Page 2: Watchful-Corporate-Overview-Q1-16

Not if, but when

© Copyright www.watchfulsoftware.com. 2016 All Rights Reserved. 2Monday, February 6, 2017

Page 3: Watchful-Corporate-Overview-Q1-16

Your Exposure

EmployeeEmail Sent/Day

# ofEmployees

TotalEmail/Day

TotalEmail/Year

SensitiveData - 10%

34 500 17,000 3,825,000 382,500

34 1,000 34,000 7,650,000 765,000

34 5,000 170,000 38,250,000 3,825,000

34 10,000 340,000 76,500,000 7,650,000

34 15,000 510,000 114,750,000 11,475,000

34 25,000 850,000 191,250,000 19,125,000

34 50,000 1,700,000 382,500,000 38,250,000

EmployeeEmail Sent/Day

2015 2016 2017 2018 2019

Average Number of Emails Sent/Received

122 123 124 125 126

Average Number of Emails Received

88 90 92 94 96

Average Number of legitimate Emails

76 76 76 76 77

Average Number of Spam Emails

12 14 16 18 19

Average Number of Emails Sent

34 33 32 31 30

Corporate Assets(email only)

© Copyright www.watchfulsoftware.com. 2016 All Rights Reserved. 3

Source: THE RADICATI GROUP, INC.

Monday, February 6, 2017

Page 4: Watchful-Corporate-Overview-Q1-16

Policy-driven Classification

data is truly sensitive?

should have access to it?

is the data to be handled?

should the classification change?

What

Who

How

When

should the data be protected?Where

© Copyright www.watchfulsoftware.com. 2016 All Rights Reserved. 4Monday, February 6, 2017

Page 5: Watchful-Corporate-Overview-Q1-16

1 Policy-Driven Data Classification & Labeling

2 Role-Based Access Control Policies

3 Dynamic Watermarking and Tagging

4 Complementing the Enterprise Security “Puzzle”

5 Comprehensive Audit Trails

Why RightsWATCH

© Copyright www.watchfulsoftware.com. 2016 All Rights Reserved. 5Monday, February 6, 2017

Page 6: Watchful-Corporate-Overview-Q1-16

Legacy Data

Bulk and automatic classificationof existing data that resides on

the corporate network

Data Loss Prevention

Applying data-centric policies to files and emails to educate

and prevent going against corporate policies

Data Analytics

Comprehensive audit trail forforensic analysis, together with

enhancing SIEM tools for reporting

Data Classification & Labelling

Identify and classify sensitivedata via impact-free userexperience

Rights Management

Enforcing role-based accesscontrol policies over files,anywhere

Mobile Devices

Support for BYOD and the ability to classify and protect sensitivedata on top of MDM

RightsWATCH and the Enterprise Security “Puzzle”

© Copyright www.watchfulsoftware.com. 2016 All Rights Reserved. 6Monday, February 6, 2017

Page 7: Watchful-Corporate-Overview-Q1-16

By taking decisions out of users' hands

Having forensics capabilities for tracking

Classifies legacy files

Familiar workflow with no extra steps

Flexible re-classification

Less time in training

ImprovedCompliance

IncreasedSecurity

DecreasedCosts

IncreasedProductivity

Fewer insider threat incidents

Increased visibility with audit trail

Protection extended to mobile

Cost of damage to your brand

Cost of responding to incidents and auditing

Cost of training to increase user awareness

What’s in it for you?

© Copyright www.watchfulsoftware.com. 2016 All Rights Reserved. 7Monday, February 6, 2017

Page 8: Watchful-Corporate-Overview-Q1-16

Watchful Software Rankedas a “Technology Leader”by KuppingerCole

Watchful provides an easy-to-use solution that supports secure sharing of common document types in a way that most end-users want to work.

Leadership Compass Report on Secure Information Sharing, KuppingerCole, 2015

Watchful Software offers DLP and IRM's 'greatest hits' withone easy payment

We like Watchful's focus on taking the end user out of the equation, as well as its ability to offer granular data-access policies through role-based access controls and recent support for Mac OS and mobile devices.

451 Research's Market Insight Service, The 451 Group, 2014

What our technological partnerssay about us

The Watchful classification and policy management extensions to the RMS server and the Microsoft Office client applications are well integrated, and provide several important features for both end-users and IT administrators to help speed adoption, facilitate deployment, and protect an ever-wider array of data in the enterprise.

Dan Plastina, Microsoft’s Rights Management Services GroupManager

What the industry is saying

© Copyright www.watchfulsoftware.com. 2016 All Rights Reserved. 8Monday, February 6, 2017

Page 9: Watchful-Corporate-Overview-Q1-16

1 Data Classification & Labelling

2 Legacy Data

3 Data Loss Prevention

4 Rights Management

5 Mobile Devices

6 Data Analytics

© Copyright www.watchfulsoftware.com. 2016 All Rights Reserved. 9

Product Demo

Monday, February 6, 2017

Page 10: Watchful-Corporate-Overview-Q1-16

Intelligent Time Access (ITA) for automatic filere-classification

Data Classification & Labelling

© Copyright www.watchfulsoftware.com. 2016 All Rights Reserved. 10Monday, February 6, 2017

Page 11: Watchful-Corporate-Overview-Q1-16

Legacy Data

11© Copyright www.watchfulsoftware.com. 2016 All Rights Reserved.

RightsWATCH Global Protector Client

The user right clicks the file/folder and selects the classification to be applied to the file(s). Corporately defined policy rules can overwrite user decisions and choices

RightsWATCH Global Protector Server

Automatic classification of files. Corporately defined policy rules are applied on every file type the Global Protector finds in the processof scanning corporate repositories

RightsWATCH Global Protector Web

Software componente installed on an IIS web server. MS Office files are classified when exported/downloaded from the web server, being the process completely “transparent” to the end user.

Monday, February 6, 2017

Page 12: Watchful-Corporate-Overview-Q1-16

Warning Rule

Trigger a “warning” to the user performing an action

Blocking Rule

Trigger a “blocking” action and prevent the user from doing what he/she was hoping to accomplish

Data Loss Prevention

12© Copyright www.watchfulsoftware.com. 2016 All Rights Reserved.

Tagging for DLP

The data asset is tagged at the metadata layer to enhance the efficiency and effectiveness of the DLP policies

Monday, February 6, 2017

Page 13: Watchful-Corporate-Overview-Q1-16

Rights Management

13

User is informed if any of the recipients will be unable to open the rights protected email and can act upon it

© Copyright www.watchfulsoftware.com. 2016 All Rights Reserved.

Ignore

Ignore the warning and send the email anyway

Remove

Remove the recipient(s) from the recipients list, and then send the email

Classify as Public

Downgrade the classification level of the email being sent so that all recipients are able to open and read it

Monday, February 6, 2017

Page 14: Watchful-Corporate-Overview-Q1-16

Single Sign-on and PIN Authentication

Automatic App Configuration

AppTunnel Integration

Secure Data Removal

Device Pinning

Classify Data

Enforce RBAC policies

Remote Kill Access On-demand

Mobile Devices

14

MDM

+

Manage the device

Manage the data on the device

© Copyright www.watchfulsoftware.com. 2016 All Rights Reserved.Monday, February 6, 2017

Page 15: Watchful-Corporate-Overview-Q1-16

Comprehensive Audit Trails

Information Tracking for Forensic Analysis

Event Correlation

Dashboards, KPIs, Alarms and Reports

RightsWATCH server stores the logs in SQL Database

A SIEM is “fed” by RightWATCH‘s databasefor knowledge generation

Metrics/KPIs

Reports

Alarms

Data Analytics

15© Copyright www.watchfulsoftware.com. 2016 All Rights Reserved.Monday, February 6, 2017

Page 16: Watchful-Corporate-Overview-Q1-16

User-friendly information management

«NAME»Watchful Software

Page 17: Watchful-Corporate-Overview-Q1-16

1 The Insider Threat

2 Secure Information Sharing

3 Policy-driven Classification

Back-up Slides

© Copyright www.watchfulsoftware.com. 2016 All Rights Reserved. 17Monday, February 6, 2017

Page 18: Watchful-Corporate-Overview-Q1-16

Well Meaning Insider

Accidental disclosure(e.g., via the internet)

Malicious code

Improper or accidental disposal of records or portable equipment

Malicious Insider

Disgruntled employee

Profit-seeking employee

A former employee

8 Internal devices

5 Internal network 6 7

4 Internal firewall

3 DMZ(s)

2 Stateful application firewall

1 Security router

Layer Security-enterprise architecture

Host-based IDS Host-based FW Host-based AV

Network Intrusion Detection (IDS)

Network Access ControlWeb Proxy

DNSVPN

The Insider Threat

© Copyright www.watchfulsoftware.com. 2016 All Rights Reserved. 18Monday, February 6, 2017

Page 19: Watchful-Corporate-Overview-Q1-16

1 Can I enforce corporate policies?

2 Can I allow it via any media?

3 Can I have a zero extra click environment to achieve it?

4 Can I not need to onboard “externals” into my systems?

5 Can I not require “externals” to own a license nor software?

6 Can I then know who did what, when and how?

SecureInformation

Sharing

Pain Points

© Copyright www.watchfulsoftware.com. 2016 All Rights Reserved. 19Monday, February 6, 2017

Page 20: Watchful-Corporate-Overview-Q1-16

Secure Information Sharing with RightsWATCH

1Enforces corporate policies and not rely on users to know, understand, reason with or be willing to apply policies to data

2Allows data to be shared via any media and still uphold corporate policies

3Does not impact on users workflows, as it does not demand users to click on any extra buttons, pop-ups, or combo boxes

4Does not require enterprises to onboard, nor manage “external users” identities'

5Delivers a comprehensive audit trail that enables leveraging SIEM tools to do data analytics

© Copyright www.watchfulsoftware.com. 2016 All Rights Reserved. 20Monday, February 6, 2017

Page 21: Watchful-Corporate-Overview-Q1-16

1RightsWATCH implements a Multilevel Security Model to classify information –Company/Scope/Level

2RightsWATCH classifies the information into your specific levels of classification according to user roles

3RightsWATCH classifies legacy files, current files and emails, via a policy driven and/or user driven fashion

4RightsWATCH enforces corporate security policy rules, which can be triggered based on content andcontext

5RightsWATCH marks and tags appropriately with tailored headers, footers, watermarks, disclaimers, tags, to protect the organization

6Relieves the user from the workload and overhead of having to know, understand and apply corporate policies

Policy-driven Classification

© Copyright www.watchfulsoftware.com. 2016 All Rights Reserved. 21Monday, February 6, 2017