SlideShare ist ein Scribd-Unternehmen logo
1 von 34
如何因應新版個資法  保護資料安全 林秉忠 Websense  技術經理
Websense  公司簡介
市場領導者  : Websense®  簡介 ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Gartner/Forrester Magic Quadrant for  Content Monitoring and Filtering and Data Loss Prevention
[object Object],Websense Is The DLP Market Leader
The need of DLP –  台灣個人資料保護法
個資法修正案規範了什麼 ?
The need of DLP – 個資洩漏層出不窮
個資外洩 – 我們面臨的挑戰 ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],在管理風險及確保法規遵循、避免資料外洩、確認企業流程 的同時,確保企業流程不致中斷 © 2010 Websense, Inc. All rights reserved.
我該如何選擇  ? 問題 我該先安內  ( 管理使用者 )  還是壤外  ( 防止駭客攻擊 ) ? 問題 我該封鎖管道 (USB/Web?) 還是監控內容  ?
市場上號稱可協助個資法規的產品 內部使用者 外部使用者 內容 管道 Web FW IPS Anti-Malware Firewall DB  加密 DB  稽核 流量側錄 NAC 周邊控管 DRM 文管系統 垃圾郵件 郵件側錄 檔案加密 Data Loss  Prevention 網頁過濾
碰到資安問題時我們可採取的措施 ,[object Object],[object Object],[object Object]
市場上號稱可協助個資法規的產品 內部使用者 外部使用者 內容 管道 Web FW IPS Anti-Malware Firewall DB  加密 DB  稽核 流量側錄 NAC 周邊控管 DRM 文管系統 垃圾郵件 郵件側錄 檔案加密 Data Loss  Prevention 網頁過濾
DLP  專案如何規劃  ?
Websense Data Security Solutions 導入實務探討–該如何規劃  DLP  專案  ? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],© 2009 Websense, Inc. All rights reserved. Best Practice Websense  支援端點及網路兩種架構 建議初期由網路開始佈署  分析使用者行為 第二階段再於進行控管的主機佈署代理程式
Websense Data Security Solutions 導入實務探討 – 設計的考量 ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
DLP  如何運作  ?
機密內容防護策略 ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
目前的資料流程 客戶個資 內部檔案分享 ( 智財、行銷企劃 ) USB, Copy&Paste, Print ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],內部入口網站 ( 內部資料 ) 資料特徵學習 PreciseID  掃描並 學習企業機密內容 網路事件 http/s, SMTP, IM, FTP .. 光碟燒錄 行為稽核及阻擋 內建規則庫 SOX 、 PCI 、 PIPEA 、 HIPPA 法規範本、檔案類型、 關鍵字等  600+ Database Websense  DSS 0x5BD41 0x190C1 0x93005 Fingerprint Creation 0xB6751 0xB61C1 0x37CB2 0x5BD41 0x190C1 0x93005 0x590A9 0xA0001 0x5BD41 0x190C1 0x93005 Fingerprint Creation
PreciseID  如何學習及比對資料相似度 0x9678A 0x59A06 Detect: 0x1678A 0x461BD 0x66A1A 0x6678A 0x4D181 0xB678A 01011100110100110000101100 100100 1000111 01110101011010110110011 0111101 Database Record or Document Algorithmic Conversion One-way Mathematical  Representation Fingerprint: Extract Fingerprint Storage & Indexing Real-Time Fingerprint  Comparison Outbound Content (E-mail, Web, Fax, Print, etc.) Extract Algorithmic Conversion 01011100110100110000101100 100100 One-way Mathematical  Representation 0xB6751 0xB61C1 0x37CB2 0x5BD41 0x190C1 0x93005 0x590A9 0xA0001 0xB6751 0xB61C1 0x37CB2 0x5BD41 0x190C1 0x93005 0x590A9 0xA0001 0x5BD41 0x190C1 0x93005 Fingerprint Creation
Websense  如何防護病患個資外洩 客戶名稱 身分證字號 聯絡電話 行動電話 出生日期 楊宗尾 N100145XXX (02)2325-58XX 0912-3456XX 1951/5/23 林幼佳 X100058XXX (02)2266-55XX 0987-6543XX 1923/9/15 潘欲聞 L200552XXX (02)2325-58XX 0912-3456XX 1953/5/11 梨會騎 N101290XXX (02)2266-55XX 0987-6543XX 1954/3/22 服窮音 L101832XXX (02)2325-58XX 0912-3456XX 1955/1/25 陶金銀 L121942XXX (02)2266-55XX 0987-6543XX 1962/12/2 利精 B120231XXX (02)2325-58XX 0912-3456XX 1961/6/20 王痣平 L200547XXX (02)2266-55XX 0987-6543XX 1938/12/23 小胖 B120897XXX (02)2325-58XX 0912-3456XX 1965/10/9 張與 B200002XXX (02)2266-55XX 0987-6543XX 1932/2/1 林稚齡 B200720XXX (02)2325-58XX 0912-3456XX 1927/7/16 蔡一零 L100580XXX (02)2266-55XX 0987-6543XX 1943/9/23 李啟龍 L200473XXX (02)2325-58XX 0912-3456XX 1950/4/12
Who 人資單位 客服單位 財務人員 會計人員 法務單位 業務人員 行銷單位 技術支援單位 工程研發 What 程式碼 Source Code 事業計畫 合併計畫 病患個資、病例 員工個資 財報 客戶個資 技術文件 競爭比較資訊 Where 競爭對手 網路硬碟 部落格網站 客戶 對案 間諜軟體網站 會計事務所夥伴 媒體 Web Mail  網站 How FTP  檔案傳輸 IM  即時訊息 P2P  檔案交換 網路印表機 Email Web 誰 傳了什麼 到哪裡 如何送 ( 人員解析 / AD 帳號 整合 ) ( 文件內容自然語言 比對 ) ( 網址 /IP 分類庫整 合,目的地感知 ) ( 支援完整的資料 通道 ) Websense DSS 政策管理邏輯,可對任何項目製定白名單或黑名單 What 隨身碟
Websense DSS  偵測功能說明
Websense DSS  偵測功能說明 ,[object Object],[object Object],Desktop Laptop Database File Server Email HTTP FTP IM Print Custom Channels Block Encrypt Quarantine Notify Remediate
情境  A 使用者上傳機密檔案 ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],原始資料出處
情境  A 使用者上傳機密檔案
Example Incident Detail User zips up passwords file File of system  passwords Passwords.zip sent via email to Yahoo Group © 2010 Websense, Inc. All rights reserved. Incident Intercepted by Websense Partners wishing to transact business
結論
總結 :  Websense Data Security Suite  ,[object Object],© 2010 Websense & Docutek Solutions, All Rights Reserved. Websense DLP  解決方案的特色 分權的事件稽核機制與報表 :  讓稽核、管理者快速安全處理事件 PresiceID TM   智慧內容識別技術 :  高速、不因各種改變而逃避稽核 提供 1100+ 政策範本精靈 : 支援各國、各產業法規遵循範本  彈性  Endpoint  機制 : 同時控管應用程式間與外接儲存裝置 完整「管道」涵蓋率 : 郵件 ,  上網 ,  印表 , IM, USB, FTP 彈性阻擋與隔離選擇 :  稽核 ( 監控  ),  阻擋 ,  隔離 ,  導正
Planning of the implementation
Websense Data Security Solutions 導入實務探討 –  政策設計
Websense Data Security Solutions 導入實務探討–該如何規劃  DLP  專案  ? Confidential documents PCI DSS HIPAA GLBA, EU DPA Sarbox Customer data 機密分級 建立指紋資料庫 稽核 | 保護 Databases File servers 報表 檢討 | 修正 Compliance IT Risk Management Fingerprints Known locations Throughout the enterprise Confidential Data File, Record Removal Change file permissions Status, Inventory Assign to data owners Tombstones Ransom Notes > Chmod +r –w -x Encryption User Desktops  Web Email IM 0x5BD41 0x190C1 0x93005
導入  DLP  的優點 ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Any Questions? v7 Architecture Architecture-

Weitere ähnliche Inhalte

Was ist angesagt?

做好开源软件安全管理 帮您移开IoT认证的挡路石
做好开源软件安全管理 帮您移开IoT认证的挡路石做好开源软件安全管理 帮您移开IoT认证的挡路石
做好开源软件安全管理 帮您移开IoT认证的挡路石
Onward Security
 
導入零負擔,個資防護及訊息保全大揭密
導入零負擔,個資防護及訊息保全大揭密導入零負擔,個資防護及訊息保全大揭密
導入零負擔,個資防護及訊息保全大揭密
OFMKT
 
香港六合彩
香港六合彩香港六合彩
香港六合彩
香港六合彩
 
云安全防护的战略思考
云安全防护的战略思考云安全防护的战略思考
云安全防护的战略思考
drewz lin
 
資訊安全入門
資訊安全入門資訊安全入門
資訊安全入門
Tyler Chen
 

Was ist angesagt? (18)

ClouDoc intro_chn_20170308
ClouDoc intro_chn_20170308ClouDoc intro_chn_20170308
ClouDoc intro_chn_20170308
 
網路安全防護
網路安全防護網路安全防護
網路安全防護
 
20170427行政院資通安全處:「資通安全管理法」草案
20170427行政院資通安全處:「資通安全管理法」草案20170427行政院資通安全處:「資通安全管理法」草案
20170427行政院資通安全處:「資通安全管理法」草案
 
做好开源软件安全管理 帮您移开IoT认证的挡路石
做好开源软件安全管理 帮您移开IoT认证的挡路石做好开源软件安全管理 帮您移开IoT认证的挡路石
做好开源软件安全管理 帮您移开IoT认证的挡路石
 
漢杰科技 營業秘密保護與鑑識作業 2015
漢杰科技 營業秘密保護與鑑識作業 2015漢杰科技 營業秘密保護與鑑識作業 2015
漢杰科技 營業秘密保護與鑑識作業 2015
 
试验
试验试验
试验
 
滲透測試資訊安全顧問服務
滲透測試資訊安全顧問服務滲透測試資訊安全顧問服務
滲透測試資訊安全顧問服務
 
壹點通行銷同步雲 雲端服務說明會簡報
壹點通行銷同步雲  雲端服務說明會簡報壹點通行銷同步雲  雲端服務說明會簡報
壹點通行銷同步雲 雲端服務說明會簡報
 
導入零負擔,個資防護及訊息保全大揭密
導入零負擔,個資防護及訊息保全大揭密導入零負擔,個資防護及訊息保全大揭密
導入零負擔,個資防護及訊息保全大揭密
 
零壹科技 個人資料管理系統 (PIMS) WorkShop
零壹科技 個人資料管理系統 (PIMS) WorkShop零壹科技 個人資料管理系統 (PIMS) WorkShop
零壹科技 個人資料管理系統 (PIMS) WorkShop
 
歐盟Gdpr 個資法輔導規劃專案例入
歐盟Gdpr 個資法輔導規劃專案例入歐盟Gdpr 個資法輔導規劃專案例入
歐盟Gdpr 個資法輔導規劃專案例入
 
黃健瑋(解決方案架構師):Microsoft 365 資安快易通
黃健瑋(解決方案架構師):Microsoft 365 資安快易通黃健瑋(解決方案架構師):Microsoft 365 資安快易通
黃健瑋(解決方案架構師):Microsoft 365 資安快易通
 
香港六合彩
香港六合彩香港六合彩
香港六合彩
 
[筆記] GDPR 與 ePrivacy 法案對線上廣告生態圈的影響
[筆記] GDPR 與 ePrivacy 法案對線上廣告生態圈的影響[筆記] GDPR 與 ePrivacy 法案對線上廣告生態圈的影響
[筆記] GDPR 與 ePrivacy 法案對線上廣告生態圈的影響
 
云安全防护的战略思考
云安全防护的战略思考云安全防护的战略思考
云安全防护的战略思考
 
資訊安全入門
資訊安全入門資訊安全入門
資訊安全入門
 
Rsa2012 下一代安全的战略思考-绿盟科技赵粮
Rsa2012 下一代安全的战略思考-绿盟科技赵粮Rsa2012 下一代安全的战略思考-绿盟科技赵粮
Rsa2012 下一代安全的战略思考-绿盟科技赵粮
 
12 個讓您安全使用網際網路的秘訣
12 個讓您安全使用網際網路的秘訣12 個讓您安全使用網際網路的秘訣
12 個讓您安全使用網際網路的秘訣
 

Ähnlich wie 機密圖檔與敏感資料庫資料防洩漏方案

数据库加密实现数据安全
数据库加密实现数据安全数据库加密实现数据安全
数据库加密实现数据安全
wensheng wei
 
From Principle to Practice
From Principle to PracticeFrom Principle to Practice
From Principle to Practice
Jordan Pan
 
Solution apc 4.0
Solution apc 4.0Solution apc 4.0
Solution apc 4.0
ahnlabchina
 
22
2222
22
42qu
 
分会场三以更加敏锐的洞察力来保护您的非结构化数据:介绍Data insight
分会场三以更加敏锐的洞察力来保护您的非结构化数据:介绍Data insight分会场三以更加敏锐的洞察力来保护您的非结构化数据:介绍Data insight
分会场三以更加敏锐的洞察力来保护您的非结构化数据:介绍Data insight
ITband
 

Ähnlich wie 機密圖檔與敏感資料庫資料防洩漏方案 (20)

Emc keynote 1130 1200
Emc keynote 1130 1200Emc keynote 1130 1200
Emc keynote 1130 1200
 
数据库加密实现数据安全
数据库加密实现数据安全数据库加密实现数据安全
数据库加密实现数据安全
 
賽門鐵克端點安全教戰守則 - Symantec Endpoint Protection 及 Symantec Critical System Protec...
賽門鐵克端點安全教戰守則 - Symantec Endpoint Protection 及 Symantec Critical System Protec...賽門鐵克端點安全教戰守則 - Symantec Endpoint Protection 及 Symantec Critical System Protec...
賽門鐵克端點安全教戰守則 - Symantec Endpoint Protection 及 Symantec Critical System Protec...
 
Forensics 101 的副本
Forensics 101 的副本Forensics 101 的副本
Forensics 101 的副本
 
赛诺朗基全局事件管理
赛诺朗基全局事件管理赛诺朗基全局事件管理
赛诺朗基全局事件管理
 
铺开业务看应用防护
铺开业务看应用防护铺开业务看应用防护
铺开业务看应用防护
 
Spirent_securityLab-服務介紹_2022.pdf
Spirent_securityLab-服務介紹_2022.pdfSpirent_securityLab-服務介紹_2022.pdf
Spirent_securityLab-服務介紹_2022.pdf
 
PowerFL meets Pulsar: A Novel Communication Framework for Privacy-Preserving ...
PowerFL meets Pulsar: A Novel Communication Framework for Privacy-Preserving ...PowerFL meets Pulsar: A Novel Communication Framework for Privacy-Preserving ...
PowerFL meets Pulsar: A Novel Communication Framework for Privacy-Preserving ...
 
From Principle to Practice
From Principle to PracticeFrom Principle to Practice
From Principle to Practice
 
Mocha Bsm
Mocha BsmMocha Bsm
Mocha Bsm
 
云计算时代的新安全挑战与机会
云计算时代的新安全挑战与机会云计算时代的新安全挑战与机会
云计算时代的新安全挑战与机会
 
Sec.3 遠端安全連線解決方案-array adonis
Sec.3 遠端安全連線解決方案-array adonisSec.3 遠端安全連線解決方案-array adonis
Sec.3 遠端安全連線解決方案-array adonis
 
Solution apc 4.0
Solution apc 4.0Solution apc 4.0
Solution apc 4.0
 
22
2222
22
 
Modernising Data Architecture for Data Driven Insights (Chinese)
Modernising Data Architecture for Data Driven Insights (Chinese)Modernising Data Architecture for Data Driven Insights (Chinese)
Modernising Data Architecture for Data Driven Insights (Chinese)
 
Chinese Uses of Big Data Cloud Security 漫步在雲端資安新戰場
Chinese Uses of Big Data Cloud Security 漫步在雲端資安新戰場 Chinese Uses of Big Data Cloud Security 漫步在雲端資安新戰場
Chinese Uses of Big Data Cloud Security 漫步在雲端資安新戰場
 
11/14王團研究室—安全大師王團論毒 in台中
11/14王團研究室—安全大師王團論毒 in台中11/14王團研究室—安全大師王團論毒 in台中
11/14王團研究室—安全大師王團論毒 in台中
 
洞悉檔案傳輸困境 掌握解決方案
洞悉檔案傳輸困境 掌握解決方案洞悉檔案傳輸困境 掌握解決方案
洞悉檔案傳輸困境 掌握解決方案
 
分会场三以更加敏锐的洞察力来保护您的非结构化数据:介绍Data insight
分会场三以更加敏锐的洞察力来保护您的非结构化数据:介绍Data insight分会场三以更加敏锐的洞察力来保护您的非结构化数据:介绍Data insight
分会场三以更加敏锐的洞察力来保护您的非结构化数据:介绍Data insight
 
12.AISWare_DataOS_大数据操作系统_V4.3_ 产品白皮书.pdf
12.AISWare_DataOS_大数据操作系统_V4.3_ 产品白皮书.pdf12.AISWare_DataOS_大数据操作系统_V4.3_ 产品白皮书.pdf
12.AISWare_DataOS_大数据操作系统_V4.3_ 产品白皮书.pdf
 

Mehr von 道成資訊股份有限公司

Mehr von 道成資訊股份有限公司 (20)

Google 搜尋技巧
Google 搜尋技巧Google 搜尋技巧
Google 搜尋技巧
 
台中市東興國小-網路捷安客
台中市東興國小-網路捷安客台中市東興國小-網路捷安客
台中市東興國小-網路捷安客
 
社群行銷 台中市工商發展投資策進會
社群行銷 台中市工商發展投資策進會社群行銷 台中市工商發展投資策進會
社群行銷 台中市工商發展投資策進會
 
雲端科技for 台中IMC
雲端科技for  台中IMC雲端科技for  台中IMC
雲端科技for 台中IMC
 
雲端科技for食科協會
雲端科技for食科協會雲端科技for食科協會
雲端科技for食科協會
 
企經會雲端知識蒐集達人-2012-0510
企經會雲端知識蒐集達人-2012-0510企經會雲端知識蒐集達人-2012-0510
企經會雲端知識蒐集達人-2012-0510
 
雲端科技-台中東南扶輪社演講
雲端科技-台中東南扶輪社演講雲端科技-台中東南扶輪社演講
雲端科技-台中東南扶輪社演講
 
2012-01-12資訊人員價值提升
2012-01-12資訊人員價值提升2012-01-12資訊人員價值提升
2012-01-12資訊人員價值提升
 
雲端生活應用-省都扶輪社演講
雲端生活應用-省都扶輪社演講雲端生活應用-省都扶輪社演講
雲端生活應用-省都扶輪社演講
 
2011 12-15-i phone教學(修正)
2011 12-15-i phone教學(修正)2011 12-15-i phone教學(修正)
2011 12-15-i phone教學(修正)
 
資安事件案例與資安地圖-NEC1207
資安事件案例與資安地圖-NEC1207資安事件案例與資安地圖-NEC1207
資安事件案例與資安地圖-NEC1207
 
Google搜尋技巧-1022
Google搜尋技巧-1022Google搜尋技巧-1022
Google搜尋技巧-1022
 
Iphone開發研討會
Iphone開發研討會Iphone開發研討會
Iphone開發研討會
 
從電腦上傳相片到 Picasa
從電腦上傳相片到 Picasa從電腦上傳相片到 Picasa
從電腦上傳相片到 Picasa
 
資訊科技新應用-0825 研討會講義
資訊科技新應用-0825 研討會講義資訊科技新應用-0825 研討會講義
資訊科技新應用-0825 研討會講義
 
Google 地方資訊申請步驟
Google 地方資訊申請步驟Google 地方資訊申請步驟
Google 地方資訊申請步驟
 
Iphone 手機上傳picasa
Iphone 手機上傳picasaIphone 手機上傳picasa
Iphone 手機上傳picasa
 
Googl+申請步驟
Googl+申請步驟Googl+申請步驟
Googl+申請步驟
 
雲端知識蒐集-扶輪社演講
雲端知識蒐集-扶輪社演講雲端知識蒐集-扶輪社演講
雲端知識蒐集-扶輪社演講
 
雲端知識蒐集達人-0928
雲端知識蒐集達人-0928雲端知識蒐集達人-0928
雲端知識蒐集達人-0928
 

機密圖檔與敏感資料庫資料防洩漏方案

  • 1. 如何因應新版個資法 保護資料安全 林秉忠 Websense 技術經理
  • 3.
  • 4. Gartner/Forrester Magic Quadrant for Content Monitoring and Filtering and Data Loss Prevention
  • 5.
  • 6. The need of DLP – 台灣個人資料保護法
  • 8. The need of DLP – 個資洩漏層出不窮
  • 9.
  • 10. 我該如何選擇 ? 問題 我該先安內 ( 管理使用者 ) 還是壤外 ( 防止駭客攻擊 ) ? 問題 我該封鎖管道 (USB/Web?) 還是監控內容 ?
  • 11. 市場上號稱可協助個資法規的產品 內部使用者 外部使用者 內容 管道 Web FW IPS Anti-Malware Firewall DB 加密 DB 稽核 流量側錄 NAC 周邊控管 DRM 文管系統 垃圾郵件 郵件側錄 檔案加密 Data Loss Prevention 網頁過濾
  • 12.
  • 13. 市場上號稱可協助個資法規的產品 內部使用者 外部使用者 內容 管道 Web FW IPS Anti-Malware Firewall DB 加密 DB 稽核 流量側錄 NAC 周邊控管 DRM 文管系統 垃圾郵件 郵件側錄 檔案加密 Data Loss Prevention 網頁過濾
  • 15.
  • 16.
  • 18.
  • 19.
  • 20. PreciseID 如何學習及比對資料相似度 0x9678A 0x59A06 Detect: 0x1678A 0x461BD 0x66A1A 0x6678A 0x4D181 0xB678A 01011100110100110000101100 100100 1000111 01110101011010110110011 0111101 Database Record or Document Algorithmic Conversion One-way Mathematical Representation Fingerprint: Extract Fingerprint Storage & Indexing Real-Time Fingerprint Comparison Outbound Content (E-mail, Web, Fax, Print, etc.) Extract Algorithmic Conversion 01011100110100110000101100 100100 One-way Mathematical Representation 0xB6751 0xB61C1 0x37CB2 0x5BD41 0x190C1 0x93005 0x590A9 0xA0001 0xB6751 0xB61C1 0x37CB2 0x5BD41 0x190C1 0x93005 0x590A9 0xA0001 0x5BD41 0x190C1 0x93005 Fingerprint Creation
  • 21. Websense 如何防護病患個資外洩 客戶名稱 身分證字號 聯絡電話 行動電話 出生日期 楊宗尾 N100145XXX (02)2325-58XX 0912-3456XX 1951/5/23 林幼佳 X100058XXX (02)2266-55XX 0987-6543XX 1923/9/15 潘欲聞 L200552XXX (02)2325-58XX 0912-3456XX 1953/5/11 梨會騎 N101290XXX (02)2266-55XX 0987-6543XX 1954/3/22 服窮音 L101832XXX (02)2325-58XX 0912-3456XX 1955/1/25 陶金銀 L121942XXX (02)2266-55XX 0987-6543XX 1962/12/2 利精 B120231XXX (02)2325-58XX 0912-3456XX 1961/6/20 王痣平 L200547XXX (02)2266-55XX 0987-6543XX 1938/12/23 小胖 B120897XXX (02)2325-58XX 0912-3456XX 1965/10/9 張與 B200002XXX (02)2266-55XX 0987-6543XX 1932/2/1 林稚齡 B200720XXX (02)2325-58XX 0912-3456XX 1927/7/16 蔡一零 L100580XXX (02)2266-55XX 0987-6543XX 1943/9/23 李啟龍 L200473XXX (02)2325-58XX 0912-3456XX 1950/4/12
  • 22. Who 人資單位 客服單位 財務人員 會計人員 法務單位 業務人員 行銷單位 技術支援單位 工程研發 What 程式碼 Source Code 事業計畫 合併計畫 病患個資、病例 員工個資 財報 客戶個資 技術文件 競爭比較資訊 Where 競爭對手 網路硬碟 部落格網站 客戶 對案 間諜軟體網站 會計事務所夥伴 媒體 Web Mail 網站 How FTP 檔案傳輸 IM 即時訊息 P2P 檔案交換 網路印表機 Email Web 誰 傳了什麼 到哪裡 如何送 ( 人員解析 / AD 帳號 整合 ) ( 文件內容自然語言 比對 ) ( 網址 /IP 分類庫整 合,目的地感知 ) ( 支援完整的資料 通道 ) Websense DSS 政策管理邏輯,可對任何項目製定白名單或黑名單 What 隨身碟
  • 23. Websense DSS 偵測功能說明
  • 24.
  • 25.
  • 26. 情境 A 使用者上傳機密檔案
  • 27. Example Incident Detail User zips up passwords file File of system passwords Passwords.zip sent via email to Yahoo Group © 2010 Websense, Inc. All rights reserved. Incident Intercepted by Websense Partners wishing to transact business
  • 29.
  • 30. Planning of the implementation
  • 31. Websense Data Security Solutions 導入實務探討 – 政策設計
  • 32. Websense Data Security Solutions 導入實務探討–該如何規劃 DLP 專案 ? Confidential documents PCI DSS HIPAA GLBA, EU DPA Sarbox Customer data 機密分級 建立指紋資料庫 稽核 | 保護 Databases File servers 報表 檢討 | 修正 Compliance IT Risk Management Fingerprints Known locations Throughout the enterprise Confidential Data File, Record Removal Change file permissions Status, Inventory Assign to data owners Tombstones Ransom Notes > Chmod +r –w -x Encryption User Desktops Web Email IM 0x5BD41 0x190C1 0x93005
  • 33.
  • 34. Any Questions? v7 Architecture Architecture-

Hinweis der Redaktion

  1. For more information on this Corporate Presentation Toolkit please direct your questions to the following people: Main presentation deck and content: csaunders@websense.com Financial information, analyst or case study content: rzarkos@websense.com Product messaging and positioning: dmeizlik@websense.com Use and sales cycle: jsharer@websense.com
  2. I’d like to say a few words about Websense in case you are not familiar with our company. Over the last year, Websense has achieved a number of milestones. Websense is the global market share leader in Web Filtering according to leading IT market research firms such as IDC. Today, more than 24 thousand customers, representing over 19 million protected users, have come to rely on Websense technology for managing their employee computing resources. Websense also had its best year financially in 2004. In fact, our annual billings have grown by 35% year over year for the last 2 years. Forbes recently recognized Websense as one of the fastest growing technology companies for 2005. And most importantly, Websense remains committed to product research and development. This focus on R&D enables our products to win awards like the 2004 PC Magazine Editor’s Choice.
  3. Websense provides fundamentally solid CMF/DLP functions for data in motion (network) and at rest (discovery) in the same appliance. The company uses advanced detection techniques, including partial document match, data fingerprinting and statistical analysis to detect character replacements. Competitive differentiators include network printing analysis and watermarking as a response, offered through a partnership with SourceMedia (formerly Thomson Media). The ability to offer end users self-remediation for quarantined e-mails, such as encrypt and forward, can reduce operation costs. The product is internationalized to be able to detect content in double-byte character sets — a capability that is already in use in Japan — but the user interface is not localized. Websense acquired PortAuthority in January 2007 after a strategic partnership in 2006 and has announced that it intends to integrate the two companies' technologies in 2007. Before the acquisition, PortAuthority provided host functions through a partnership with Safend. The integration with Websense technology will likely involve integrating content awareness capabilities into the Websense Client Policy Manager host agent. Given the stability of its host based technology, Websense should be well-positioned to provide a comprehensive solution for data in motion, at rest and endpoint.
  4. Websense provides fundamentally solid CMF/DLP functions for data in motion (network) and at rest (discovery) in the same appliance. The company uses advanced detection techniques, including partial document match, data fingerprinting and statistical analysis to detect character replacements. Competitive differentiators include network printing analysis and watermarking as a response, offered through a partnership with SourceMedia (formerly Thomson Media). The ability to offer end users self-remediation for quarantined e-mails, such as encrypt and forward, can reduce operation costs. The product is internationalized to be able to detect content in double-byte character sets — a capability that is already in use in Japan — but the user interface is not localized. Websense acquired PortAuthority in January 2007 after a strategic partnership in 2006 and has announced that it intends to integrate the two companies' technologies in 2007. Before the acquisition, PortAuthority provided host functions through a partnership with Safend. The integration with Websense technology will likely involve integrating content awareness capabilities into the Websense Client Policy Manager host agent. Given the stability of its host based technology, Websense should be well-positioned to provide a comprehensive solution for data in motion, at rest and endpoint.
  5. To ensure uninterrupted business operations, more and more customers must overcome the challenges of data security. There are several distinct areas of focus: Managing Compliance and Risks – Many business are now required to meet specific compliances. Data loss (accidental or targeted) can often result in non-compliance, fines and lawsuits. Of course, non-compliance can disrupt business operations having negative impact to the bottom line. Visibility – The first thing business must understand is the type of data stored in the network and end-points along with what type of communication methods are considered valid. The fact that data is stored and accessed from databases, document repositories, file share, end-user file systems, portable storage devices, etc… makes visibility to such information very complex. Securing Business Processes – Inability to implement controls to protect against accidental data loss and targeted attacks aimed at stealing sensitive data challenges businesses to establish and meet their business processes. Aside from business impact, loss of sensitive data can also adversely effect the company brand and reputation.
  6. Key Points: Whenever the PortAuthority Server receives a message from messaging server or application, the PortAuthority Server (via its fingerprint engine) creates a real-time fingerprint of that message and its associated attachments in memory. That real-time fingerprint is compared against the existing database of known fingerprints looking for any full or partial matches. This fingerprint library can be created through an automatic fingerprinting process that updates on a regular basis or when records are added, modified or deleted.
  7. Here’s a great example why locking down the infrastructure is not a great idea. When you first put in data loss prevention solutions you find interesting things like this. Now this is an real life incident that triggered off one of the 800 or so built in policies that are built in, come ready made if you like, into our data loss prevention module. What we see here is a file of passwords for a good many systems which was zipped and encrypted by a user who then went on to send the zipped file to yahoo mail. Now that incident, quite frankly, at first blush looks quite malicious. Somebody is sending the passwords to your systems to a yahoo mail account and they are obscuring it by zipping the file so maybe they don’t want anybody to see what they are doing. The reason why we like this example is that it is very illustrative of a few concepts. The most important concept is, do you know who caused this problem? Not as you might think the person who actually sent the email, this was inadvertently caused by the IT organization and policies that created this. The company in question had a policy that you couldn’t have distribution lists in the email system with external people on them, since that might allow data to leak. They also had another policy to rotate the passwords every 30 days, which is a great way to encourage sticky notes and password leakage but that was the policy. However this person had to get the passwords to all the [CLICK] business partners who needed these passwords to gain access to all the back end systems so they could conduct business with them. The couldn’t use their own email system because the IT policy forbade external email addresses, so to prove the point that business will find a way, the enterprising employee was using yahoo mail, created a distribution list to circumvent this restriction and send the passwords to all his business partners. They were doing this for a couple of years before we put our [CLICK] system in and found this going on. So it’s very illustrative and shows how IT security policies that say lock things down can create opportunity for people to work around these restrictions to get their jobs done and in doing so create some pretty significant risks for their organizations. It also shows that once you transact in this open manner, the IT department could lock down web mail and the employee would find another way, maybe as Facebook or LinkedIn friends or similar and use that as a distribution mechanism. So the morale is we really need to be able to get a hold of the CONTENT that is transiting our networks here.
  8. DLP methodology and available solutions have implemented some or all features of this process. This process is normally discussed in the context of network scanning for confidential data, but as highlighted previously, user mobility and privileged access to confidential data, combined with the need for timely and accurate scanning for this data - makes a strong case for executing the discovery process with a local software agent, where possible: Identify: a sound DLP discovery project requires prior knowledge of the data important to your organization, whether it is source code, formulas, CAD drawings or customer data. This type of data is usually created and stored in known locations. Other types of data like healthcare, credit card data may be stored within these known locations or they may be stored in bits and pieces, in the form of files or emails throughout the enterprise. Regardless, if any of these data types are unsecured, a breach could be devastating w/o proper controls. Fingerprint: take a snapshot of the business confidential data; at minimum, this is a hash of the bits, but more sophisticated technology is needed for accurate detection of files Discover: run a network scan and if needed, use endpoint software agents to run local scans of all confidential data Network-based: widest coverage and providing best overall visibility into multiple data stores, finding confidential data in often unexpected places Agent-based: scalable since individual discovery jobs on endpoints run independently of each other and report results back to a centralized server once completed; Report: Business policies for data protection as well as industry regulations mandate current inventory, knowledge of where sensitive data resides. This requires compliance reporting. Even without specific regulations or policies, need for risk management in the area of business data is needed. Trending across top violators and most frequent violations important to help prioritize remediation tasks Remediate: Ultimately, it is the responsibility of the data owner to set the policies and controls for how data is created, stored, used and even secured. In many cases, a compliance report concludes the automated discovery process and requires handoff to data owners, who then use their own tools or techniques to further secure the data. This can be complicated across numerous instances of confidential data storage. need, benefits, our features/functions, differentiation, etc. of our discovery product.  Built a methodology for discovery, data id, data scan, data remediation planning, data enforcement.  Call out the steps along the way, like fingerprinting via ODBC, automated scanning, distributed deployment and endpoint for parallel scanning, the need for recurring scans, flexibility of enforcement w/ tombstoning and ransom notes, etc.
  9. v7 Architecture header Architecture-