Watchful-Corporate-Overview-Q1-16
-
Upload
ravindran-vasu -
Category
Documents
-
view
43 -
download
0
Transcript of Watchful-Corporate-Overview-Q1-16
User-friendly information management
«NAME»Watchful Software
Not if, but when
© Copyright www.watchfulsoftware.com. 2016 All Rights Reserved. 2Monday, February 6, 2017
Your Exposure
EmployeeEmail Sent/Day
# ofEmployees
TotalEmail/Day
TotalEmail/Year
SensitiveData - 10%
34 500 17,000 3,825,000 382,500
34 1,000 34,000 7,650,000 765,000
34 5,000 170,000 38,250,000 3,825,000
34 10,000 340,000 76,500,000 7,650,000
34 15,000 510,000 114,750,000 11,475,000
34 25,000 850,000 191,250,000 19,125,000
34 50,000 1,700,000 382,500,000 38,250,000
EmployeeEmail Sent/Day
2015 2016 2017 2018 2019
Average Number of Emails Sent/Received
122 123 124 125 126
Average Number of Emails Received
88 90 92 94 96
Average Number of legitimate Emails
76 76 76 76 77
Average Number of Spam Emails
12 14 16 18 19
Average Number of Emails Sent
34 33 32 31 30
Corporate Assets(email only)
© Copyright www.watchfulsoftware.com. 2016 All Rights Reserved. 3
Source: THE RADICATI GROUP, INC.
Monday, February 6, 2017
Policy-driven Classification
data is truly sensitive?
should have access to it?
is the data to be handled?
should the classification change?
What
Who
How
When
should the data be protected?Where
© Copyright www.watchfulsoftware.com. 2016 All Rights Reserved. 4Monday, February 6, 2017
1 Policy-Driven Data Classification & Labeling
2 Role-Based Access Control Policies
3 Dynamic Watermarking and Tagging
4 Complementing the Enterprise Security “Puzzle”
5 Comprehensive Audit Trails
Why RightsWATCH
© Copyright www.watchfulsoftware.com. 2016 All Rights Reserved. 5Monday, February 6, 2017
Legacy Data
Bulk and automatic classificationof existing data that resides on
the corporate network
Data Loss Prevention
Applying data-centric policies to files and emails to educate
and prevent going against corporate policies
Data Analytics
Comprehensive audit trail forforensic analysis, together with
enhancing SIEM tools for reporting
Data Classification & Labelling
Identify and classify sensitivedata via impact-free userexperience
Rights Management
Enforcing role-based accesscontrol policies over files,anywhere
Mobile Devices
Support for BYOD and the ability to classify and protect sensitivedata on top of MDM
RightsWATCH and the Enterprise Security “Puzzle”
© Copyright www.watchfulsoftware.com. 2016 All Rights Reserved. 6Monday, February 6, 2017
By taking decisions out of users' hands
Having forensics capabilities for tracking
Classifies legacy files
Familiar workflow with no extra steps
Flexible re-classification
Less time in training
ImprovedCompliance
IncreasedSecurity
DecreasedCosts
IncreasedProductivity
Fewer insider threat incidents
Increased visibility with audit trail
Protection extended to mobile
Cost of damage to your brand
Cost of responding to incidents and auditing
Cost of training to increase user awareness
What’s in it for you?
© Copyright www.watchfulsoftware.com. 2016 All Rights Reserved. 7Monday, February 6, 2017
Watchful Software Rankedas a “Technology Leader”by KuppingerCole
Watchful provides an easy-to-use solution that supports secure sharing of common document types in a way that most end-users want to work.
Leadership Compass Report on Secure Information Sharing, KuppingerCole, 2015
Watchful Software offers DLP and IRM's 'greatest hits' withone easy payment
We like Watchful's focus on taking the end user out of the equation, as well as its ability to offer granular data-access policies through role-based access controls and recent support for Mac OS and mobile devices.
451 Research's Market Insight Service, The 451 Group, 2014
What our technological partnerssay about us
The Watchful classification and policy management extensions to the RMS server and the Microsoft Office client applications are well integrated, and provide several important features for both end-users and IT administrators to help speed adoption, facilitate deployment, and protect an ever-wider array of data in the enterprise.
Dan Plastina, Microsoft’s Rights Management Services GroupManager
“
“
“
“
“
“
What the industry is saying
© Copyright www.watchfulsoftware.com. 2016 All Rights Reserved. 8Monday, February 6, 2017
1 Data Classification & Labelling
2 Legacy Data
3 Data Loss Prevention
4 Rights Management
5 Mobile Devices
6 Data Analytics
© Copyright www.watchfulsoftware.com. 2016 All Rights Reserved. 9
Product Demo
Monday, February 6, 2017
Intelligent Time Access (ITA) for automatic filere-classification
Data Classification & Labelling
© Copyright www.watchfulsoftware.com. 2016 All Rights Reserved. 10Monday, February 6, 2017
Legacy Data
11© Copyright www.watchfulsoftware.com. 2016 All Rights Reserved.
RightsWATCH Global Protector Client
The user right clicks the file/folder and selects the classification to be applied to the file(s). Corporately defined policy rules can overwrite user decisions and choices
RightsWATCH Global Protector Server
Automatic classification of files. Corporately defined policy rules are applied on every file type the Global Protector finds in the processof scanning corporate repositories
RightsWATCH Global Protector Web
Software componente installed on an IIS web server. MS Office files are classified when exported/downloaded from the web server, being the process completely “transparent” to the end user.
Monday, February 6, 2017
Warning Rule
Trigger a “warning” to the user performing an action
Blocking Rule
Trigger a “blocking” action and prevent the user from doing what he/she was hoping to accomplish
Data Loss Prevention
12© Copyright www.watchfulsoftware.com. 2016 All Rights Reserved.
Tagging for DLP
The data asset is tagged at the metadata layer to enhance the efficiency and effectiveness of the DLP policies
Monday, February 6, 2017
Rights Management
13
User is informed if any of the recipients will be unable to open the rights protected email and can act upon it
© Copyright www.watchfulsoftware.com. 2016 All Rights Reserved.
Ignore
Ignore the warning and send the email anyway
Remove
Remove the recipient(s) from the recipients list, and then send the email
Classify as Public
Downgrade the classification level of the email being sent so that all recipients are able to open and read it
Monday, February 6, 2017
Single Sign-on and PIN Authentication
Automatic App Configuration
AppTunnel Integration
Secure Data Removal
Device Pinning
Classify Data
Enforce RBAC policies
Remote Kill Access On-demand
Mobile Devices
14
MDM
+
Manage the device
Manage the data on the device
© Copyright www.watchfulsoftware.com. 2016 All Rights Reserved.Monday, February 6, 2017
Comprehensive Audit Trails
Information Tracking for Forensic Analysis
Event Correlation
Dashboards, KPIs, Alarms and Reports
RightsWATCH server stores the logs in SQL Database
A SIEM is “fed” by RightWATCH‘s databasefor knowledge generation
Metrics/KPIs
Reports
Alarms
Data Analytics
15© Copyright www.watchfulsoftware.com. 2016 All Rights Reserved.Monday, February 6, 2017
User-friendly information management
«NAME»Watchful Software
1 The Insider Threat
2 Secure Information Sharing
3 Policy-driven Classification
Back-up Slides
© Copyright www.watchfulsoftware.com. 2016 All Rights Reserved. 17Monday, February 6, 2017
Well Meaning Insider
Accidental disclosure(e.g., via the internet)
Malicious code
Improper or accidental disposal of records or portable equipment
Malicious Insider
Disgruntled employee
Profit-seeking employee
A former employee
8 Internal devices
5 Internal network 6 7
4 Internal firewall
3 DMZ(s)
2 Stateful application firewall
1 Security router
Layer Security-enterprise architecture
Host-based IDS Host-based FW Host-based AV
Network Intrusion Detection (IDS)
Network Access ControlWeb Proxy
DNSVPN
The Insider Threat
© Copyright www.watchfulsoftware.com. 2016 All Rights Reserved. 18Monday, February 6, 2017
1 Can I enforce corporate policies?
2 Can I allow it via any media?
3 Can I have a zero extra click environment to achieve it?
4 Can I not need to onboard “externals” into my systems?
5 Can I not require “externals” to own a license nor software?
6 Can I then know who did what, when and how?
SecureInformation
Sharing
Pain Points
© Copyright www.watchfulsoftware.com. 2016 All Rights Reserved. 19Monday, February 6, 2017
Secure Information Sharing with RightsWATCH
1Enforces corporate policies and not rely on users to know, understand, reason with or be willing to apply policies to data
2Allows data to be shared via any media and still uphold corporate policies
3Does not impact on users workflows, as it does not demand users to click on any extra buttons, pop-ups, or combo boxes
4Does not require enterprises to onboard, nor manage “external users” identities'
5Delivers a comprehensive audit trail that enables leveraging SIEM tools to do data analytics
© Copyright www.watchfulsoftware.com. 2016 All Rights Reserved. 20Monday, February 6, 2017
1RightsWATCH implements a Multilevel Security Model to classify information –Company/Scope/Level
2RightsWATCH classifies the information into your specific levels of classification according to user roles
3RightsWATCH classifies legacy files, current files and emails, via a policy driven and/or user driven fashion
4RightsWATCH enforces corporate security policy rules, which can be triggered based on content andcontext
5RightsWATCH marks and tags appropriately with tailored headers, footers, watermarks, disclaimers, tags, to protect the organization
6Relieves the user from the workload and overhead of having to know, understand and apply corporate policies
Policy-driven Classification
© Copyright www.watchfulsoftware.com. 2016 All Rights Reserved. 21Monday, February 6, 2017