SlideShare ist ein Scribd-Unternehmen logo
1 von 15
Downloaden Sie, um offline zu lesen
Symantec Data Loss Prevention 11
December 14, 2010
Unstructured Data: Trends and Observations
• It’s growing
    – Over 60% per year (IDC)
• It’s spread out
    – Distributed file servers, the cloud, self service groupware sites
• It contains an organization’s intellectual property
    – Source code, designs, strategy, financials
• It’s increasingly targeted by thieves
    – Hydraq – a small infection, but targeted highest value IP
    – Malicious insiders – steal IP for financial gain and career advancement
    – Malicious outsiders – steal product designs for counterfeit



Symantec Data Loss Prevention 11                                                2
The Challenges Protecting Intellectual Property (IP)
• It’s hard to define
    – The differences between sensitive and non-sensitive data are often subtle
• It’s hard to find
    – It’s intermingled with large volumes of low value data
• It’s often very vulnerable – permissions are “loose”
    – Users create new data repositories and inadvertently grant broad access
• Users don’t understand the risk of data leaks
    – Data security is not their primary mission




Symantec Data Loss Prevention 11                                                3
Data Loss Prevention 11 – What’s New
• Symantec Data Loss Prevention 11 simplifies the detection and protection
  of enterprises’ most valuable information

            Vector Machine Learning: Reduce the time and expertise
            required to develop policies to protect unstructured data and IP
        • Requires less effort and expertise than describing content; requires a smaller
          sample than fingerprinting

           Risk Scoring: Identify the most risky data by combining content,
           usage and access information
        • Gives business units the information they need to directly address “hot spots”

           Data Owner Remediation: Identify data owners and notify them
           that they need to fix their exposed sensitive data
        • Reduces the time to achieve measurable risk reduction by involving data
          owners in the clean up effort

Symantec Data Loss Prevention 11                                                           4
Detecting Unstructured Data: The Challenge Today




                               Describe                                                         Fingerprint




      • How do I identify relevant                                                • What if I can’t access all
      keywords?                                                                     confidential docs?
      •How do I avoid false positives?                                            • How do I account for new docs?
      • How do I tune policies?                                                   • How do I protect the endpoint?



Symantec Data Loss Prevention 11                                                                                                                   5
Symantec Proprietary & Confidential - This information is not a commitment, promise or legal obligation to deliver any material, code or functionality
Vector Machine Learning: Finds Sensitive Data



                                                                  Learn

                               Describe                                                          Fingerprint




              •   Learns by positive and negative examples
              •   Automates keyword identification and enables easier tuning
              •   Improves accuracy, reduces false positives
              •   Detects new content without having to fingerprint it first



Symantec Data Loss Prevention 11                                                                                                                   6
Symantec Proprietary & Confidential - This information is not a commitment, promise or legal obligation to deliver any material, code or functionality
Data Loss Prevention 11 – What’s New
• Symantec Data Loss Prevention 11 simplifies the detection and protection
  of enterprises’ most valuable information

            Vector Machine Learning: Reduce the time and expertise
            required to develop policies to protect unstructured data and IP
        • Requires less effort and expertise than describing content; requires a smaller
          sample than fingerprinting

           Risk Scoring: Identify the most risky data by combining content,
           usage and access information
        • Gives business units the information they need to directly address “hot spots”

           Data Owner Remediation: Identify data owners and notify them
           that they need to fix their exposed sensitive data
        • Reduces the time to achieve measurable risk reduction by involving data
          owners in the clean up effort

Symantec Data Loss Prevention 11                                                           7
Risk Scoring – Identifies Data at Greatest Risk
Find and fix the most risky data

• Highlights the
  most risky
  folders
• Score is based
  on incident
  type, severity
  and folder
  accessibility
• Tells the
  organization
  where to focus
  initial data clean
  up and lock
  down efforts




Symantec Data Loss Prevention 11                  8
Data Loss Prevention 11 – What’s New
• Symantec Data Loss Prevention 11 simplifies the detection and protection
  of enterprises’ most valuable information

            Vector Machine Learning: Reduce the time and expertise
            required to develop policies to protect unstructured data and IP
        • Requires less effort and expertise than describing content; requires a smaller
          sample than fingerprinting

           Risk Scoring: Identify the most risky data by combining content,
           usage and access information
        • Gives business units the information they need to directly address “hot spots”

           Data Owner Remediation: Identify data owners and notify them
           that they need to fix their exposed sensitive data
        • Reduces the time to achieve measurable risk reduction by involving data
          owners in the clean up effort

Symantec Data Loss Prevention 11                                                           9
Data Owner Remediation – Creates Security Awareness
Educating data owners is the key to reducing risk
                                    Discover data, and track usage with Data Insight
• Automatically notifies
  data owners that their
  sensitive files are
  potentially at risk
                                   Re-scan                                    Report

• Reduces the time to
  achieve measurable
  risk reduction by
  involving data owners
  in the clean up effort



                                             Alert data owners; advise
                                             them via email about how to protect their data

Symantec Data Loss Prevention 11                                                         10
Symantec Data Loss Prevention – Products

                Storage                   Endpoint                 Network
                Symantec™
            Data Loss Prevention            Symantec™                Symantec™
             Network Discover           Data Loss Prevention     Data Loss Prevention
                                         Endpoint Discover        Network Monitor
                Symantec™
            Data Loss Prevention
                Data Insight
                                            Symantec™                Symantec™
                Symantec™               Data Loss Prevention     Data Loss Prevention
            Data Loss Prevention         Endpoint Prevent         Network Prevent
             Network Protect




                                   Management Platform
                        Symantec™ Data Loss Prevention Enforce Platform



Symantec Data Loss Prevention 11                                                        11
Data Loss Prevention for Endpoint Enhancements
• Flexibility to use a applications and storage devices while
  protecting sensitive data
• Automatically apply encryption or Enterprise Rights
  Management (ERM)

                                Endpoint

                         Trusted Devices assures that sensitive data can only be
                         copied to approved storage devices
                         Application File Access Control ensures user drive
                         applications such as iTunes, Skype and WebEx cannot access
                         sensitive data
                         FlexResponse can automatically apply encryption or
                         Enterprise Rights Management to sensitive data


 Symantec Data Loss Prevention 11
Summary
• Symantec Data Loss Prevention 11 simplifies the detection and
  protection of enterprises’ most valuable information
• Vector Machine Learning is unique to Symantec
    – Streamlines policy implementation, particularly for distributed IP
• Risk Scoring prioritizes data at risk
    – Quickly identifies where to start data clean up efforts
• Data Owner Remediation educates users about risk
    – Reduces the time and effort to achieve risk reduction
• Symantec Data Loss Prevention 11 is the result of our broad
  customer experience



Symantec Data Loss Prevention 11                                           13
Symantec DLP Innovation Timeline
         2004               2005               2006              2007             2008            2009             2010            2011
          v3           v4             v5             v6            v7          v8             v9              v10              v11
           Network: Monitor

                                Network: Prevent

                                               Storage: Discover

                                                              Storage: Protect

                                                                           Endpoint: Monitor & Prevent

                                                                                                Endpoint: Discover

      • Customer focused innovation                                                                                 DLP Open Platform
      • One third of the F100
                                                                                                                        DLP Data Insight
      • Acknowledged DLP leader
                                                                                                                                  VML

    Symantec Data Loss Prevention 11                                                                                                                     14
Symantec Proprietary & Confidential - This information is not a commitment, promise or legal obligation to deliver any material, code or functionality
Thank you!




    Copyright © 2010 Symantec Corporation. All rights reserved. Symantec and the Symantec Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in
    the U.S. and other countries. Other names may be trademarks of their respective owners.

    This document is provided for informational purposes only and is not intended as advertising. All warranties relating to the information in this document, either express or implied,
    are disclaimed to the maximum extent allowed by law. The information in this document is subject to change without notice.


Symantec Data Loss Prevention 11                                                                                                                                                            15

Weitere ähnliche Inhalte

Was ist angesagt?

Was ist angesagt? (20)

DLP Data leak prevention
DLP Data leak preventionDLP Data leak prevention
DLP Data leak prevention
 
Data Leakage Prevention
Data Leakage Prevention Data Leakage Prevention
Data Leakage Prevention
 
Data loss prevention (dlp)
Data loss prevention (dlp)Data loss prevention (dlp)
Data loss prevention (dlp)
 
Technology Overview - Symantec Data Loss Prevention (DLP)
Technology Overview - Symantec Data Loss Prevention (DLP)Technology Overview - Symantec Data Loss Prevention (DLP)
Technology Overview - Symantec Data Loss Prevention (DLP)
 
Best Practices for Implementing Data Loss Prevention (DLP)
Best Practices for Implementing Data Loss Prevention (DLP)Best Practices for Implementing Data Loss Prevention (DLP)
Best Practices for Implementing Data Loss Prevention (DLP)
 
Data Loss Prevention: Challenges, Impacts & Effective Strategies
Data Loss Prevention: Challenges, Impacts & Effective StrategiesData Loss Prevention: Challenges, Impacts & Effective Strategies
Data Loss Prevention: Challenges, Impacts & Effective Strategies
 
Symantec Data Loss Prevention 9
Symantec Data Loss Prevention 9Symantec Data Loss Prevention 9
Symantec Data Loss Prevention 9
 
Overview of Data Loss Prevention (DLP) Technology
Overview of Data Loss Prevention (DLP) TechnologyOverview of Data Loss Prevention (DLP) Technology
Overview of Data Loss Prevention (DLP) Technology
 
Data Loss Threats and Mitigations
Data Loss Threats and MitigationsData Loss Threats and Mitigations
Data Loss Threats and Mitigations
 
Dlp notes
Dlp notesDlp notes
Dlp notes
 
Personal Data Protection in Indonesia
Personal Data Protection in IndonesiaPersonal Data Protection in Indonesia
Personal Data Protection in Indonesia
 
Forcepoint Dynamic Data Protection
Forcepoint Dynamic Data ProtectionForcepoint Dynamic Data Protection
Forcepoint Dynamic Data Protection
 
Cyber Threat Intelligence Integration Center -- ONDI
Cyber Threat Intelligence Integration Center -- ONDICyber Threat Intelligence Integration Center -- ONDI
Cyber Threat Intelligence Integration Center -- ONDI
 
Data classification-policy
Data classification-policyData classification-policy
Data classification-policy
 
trellix-dlp-buyers-guide.pdf
trellix-dlp-buyers-guide.pdftrellix-dlp-buyers-guide.pdf
trellix-dlp-buyers-guide.pdf
 
Cyber Security Maturity Assessment
 Cyber Security Maturity Assessment Cyber Security Maturity Assessment
Cyber Security Maturity Assessment
 
DLP Systems: Models, Architecture and Algorithms
DLP Systems: Models, Architecture and AlgorithmsDLP Systems: Models, Architecture and Algorithms
DLP Systems: Models, Architecture and Algorithms
 
Cyber Security Needs and Challenges
Cyber Security Needs and ChallengesCyber Security Needs and Challenges
Cyber Security Needs and Challenges
 
Workshop Trend Micro
Workshop Trend MicroWorkshop Trend Micro
Workshop Trend Micro
 
Forcepoint Corporate Presentation_Short.pptx
Forcepoint Corporate Presentation_Short.pptxForcepoint Corporate Presentation_Short.pptx
Forcepoint Corporate Presentation_Short.pptx
 

Andere mochten auch

Information Leakage & DLP
Information Leakage & DLPInformation Leakage & DLP
Information Leakage & DLP
Yun Lu
 
Intrusion detection system ppt
Intrusion detection system pptIntrusion detection system ppt
Intrusion detection system ppt
Sheetal Verma
 

Andere mochten auch (16)

Data Loss Prevention: Brainstorming
Data Loss Prevention: BrainstormingData Loss Prevention: Brainstorming
Data Loss Prevention: Brainstorming
 
Information Leakage - A knowledge Based Approach
Information Leakage - A knowledge Based ApproachInformation Leakage - A knowledge Based Approach
Information Leakage - A knowledge Based Approach
 
2014_서버용 자료유출방지 솔루션_시온
2014_서버용 자료유출방지 솔루션_시온2014_서버용 자료유출방지 솔루션_시온
2014_서버용 자료유출방지 솔루션_시온
 
Lions, Tigers, and PHI, Oh My! The latest in data loss prevention in the cloud.
Lions, Tigers, and PHI, Oh My! The latest in data loss prevention in the cloud.Lions, Tigers, and PHI, Oh My! The latest in data loss prevention in the cloud.
Lions, Tigers, and PHI, Oh My! The latest in data loss prevention in the cloud.
 
Information Leakage & DLP
Information Leakage & DLPInformation Leakage & DLP
Information Leakage & DLP
 
PACE-IT, Security+3.8: Vulnerability Scanning vs Pen Testing
PACE-IT, Security+3.8: Vulnerability Scanning vs Pen TestingPACE-IT, Security+3.8: Vulnerability Scanning vs Pen Testing
PACE-IT, Security+3.8: Vulnerability Scanning vs Pen Testing
 
Data Leakage Presentation
Data Leakage PresentationData Leakage Presentation
Data Leakage Presentation
 
Intrusion prevention systems
Intrusion prevention systemsIntrusion prevention systems
Intrusion prevention systems
 
"Disaster Risk Reducion DRR
"Disaster Risk Reducion DRR "Disaster Risk Reducion DRR
"Disaster Risk Reducion DRR
 
Classical Encryption Techniques in Network Security
Classical Encryption Techniques in Network SecurityClassical Encryption Techniques in Network Security
Classical Encryption Techniques in Network Security
 
Ceph Introduction 2017
Ceph Introduction 2017  Ceph Introduction 2017
Ceph Introduction 2017
 
Intrusion detection and prevention system
Intrusion detection and prevention systemIntrusion detection and prevention system
Intrusion detection and prevention system
 
Intrusion detection system ppt
Intrusion detection system pptIntrusion detection system ppt
Intrusion detection system ppt
 
Intrusion detection system
Intrusion detection system Intrusion detection system
Intrusion detection system
 
Data Leakage Prevention
Data Leakage PreventionData Leakage Prevention
Data Leakage Prevention
 
Project management
Project managementProject management
Project management
 

Ähnlich wie Symantec Data Loss Prevention 11

Trend micro data protection
Trend micro data protectionTrend micro data protection
Trend micro data protection
Andrew Wong
 
Internet Security Threat Report (ISTR) Vol. 16
Internet Security Threat Report (ISTR) Vol. 16Internet Security Threat Report (ISTR) Vol. 16
Internet Security Threat Report (ISTR) Vol. 16
Symantec APJ
 
Information and Identity Protection - Data Loss Prevention, Encryption, User ...
Information and Identity Protection - Data Loss Prevention, Encryption, User ...Information and Identity Protection - Data Loss Prevention, Encryption, User ...
Information and Identity Protection - Data Loss Prevention, Encryption, User ...
Symantec APJ
 
Identity theft and data responsibilities
Identity theft and data responsibilitiesIdentity theft and data responsibilities
Identity theft and data responsibilities
Peter Henley
 

Ähnlich wie Symantec Data Loss Prevention 11 (20)

Symantec - Data Governance in the Cloud
Symantec - Data Governance in the CloudSymantec - Data Governance in the Cloud
Symantec - Data Governance in the Cloud
 
RSA 2010 Kevin Rowney
RSA 2010 Kevin RowneyRSA 2010 Kevin Rowney
RSA 2010 Kevin Rowney
 
Symantec Data Insight
Symantec Data InsightSymantec Data Insight
Symantec Data Insight
 
Trend micro data protection
Trend micro data protectionTrend micro data protection
Trend micro data protection
 
Symantec DLP for Tablet
Symantec DLP for TabletSymantec DLP for Tablet
Symantec DLP for Tablet
 
Data security in the cloud
Data security in the cloud Data security in the cloud
Data security in the cloud
 
Symantec Introduces New Security Solutions to Counter Advanced Persistent Thr...
Symantec Introduces New Security Solutions to Counter Advanced Persistent Thr...Symantec Introduces New Security Solutions to Counter Advanced Persistent Thr...
Symantec Introduces New Security Solutions to Counter Advanced Persistent Thr...
 
Internet Security Threat Report (ISTR) Vol. 16
Internet Security Threat Report (ISTR) Vol. 16Internet Security Threat Report (ISTR) Vol. 16
Internet Security Threat Report (ISTR) Vol. 16
 
Information and Identity Protection - Data Loss Prevention, Encryption, User ...
Information and Identity Protection - Data Loss Prevention, Encryption, User ...Information and Identity Protection - Data Loss Prevention, Encryption, User ...
Information and Identity Protection - Data Loss Prevention, Encryption, User ...
 
Cloud Security Checklist and Planning Guide Summary
Cloud Security Checklist and Planning Guide Summary Cloud Security Checklist and Planning Guide Summary
Cloud Security Checklist and Planning Guide Summary
 
(Slides) What's Yours Is Mine: How Employess Are Putting Your Sensitive Data ...
(Slides) What's Yours Is Mine: How Employess Are Putting Your Sensitive Data ...(Slides) What's Yours Is Mine: How Employess Are Putting Your Sensitive Data ...
(Slides) What's Yours Is Mine: How Employess Are Putting Your Sensitive Data ...
 
Be Aware Webinar Symantec-Maxímice su prevención hacia la fuga de la información
Be Aware Webinar Symantec-Maxímice su prevención hacia la fuga de la informaciónBe Aware Webinar Symantec-Maxímice su prevención hacia la fuga de la información
Be Aware Webinar Symantec-Maxímice su prevención hacia la fuga de la información
 
Symantec Data Insight 3.0
Symantec Data Insight 3.0Symantec Data Insight 3.0
Symantec Data Insight 3.0
 
Compete To Win: Don’t Just Be Compliant – Be Secure!
Compete To Win: Don’t Just Be Compliant – Be Secure!Compete To Win: Don’t Just Be Compliant – Be Secure!
Compete To Win: Don’t Just Be Compliant – Be Secure!
 
Security For Free
Security For FreeSecurity For Free
Security For Free
 
Zenith Infotech Mirror Cloud Presentation. 112211
Zenith Infotech    Mirror Cloud Presentation. 112211Zenith Infotech    Mirror Cloud Presentation. 112211
Zenith Infotech Mirror Cloud Presentation. 112211
 
Atlanta ISSA 2010 Enterprise Data Protection Ulf Mattsson
Atlanta ISSA  2010 Enterprise Data Protection   Ulf MattssonAtlanta ISSA  2010 Enterprise Data Protection   Ulf Mattsson
Atlanta ISSA 2010 Enterprise Data Protection Ulf Mattsson
 
Identity theft and data responsibilities
Identity theft and data responsibilitiesIdentity theft and data responsibilities
Identity theft and data responsibilities
 
Guardium Data Activiy Monitor For C- Level Executives
Guardium Data Activiy Monitor For C- Level ExecutivesGuardium Data Activiy Monitor For C- Level Executives
Guardium Data Activiy Monitor For C- Level Executives
 
EV9 & NBU5000
EV9 & NBU5000EV9 & NBU5000
EV9 & NBU5000
 

Mehr von Symantec

Mehr von Symantec (20)

Symantec Enterprise Security Products are now part of Broadcom
Symantec Enterprise Security Products are now part of BroadcomSymantec Enterprise Security Products are now part of Broadcom
Symantec Enterprise Security Products are now part of Broadcom
 
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
 
Symantec Webinar | National Cyber Security Awareness Month: Protect IT
Symantec Webinar | National Cyber Security Awareness Month: Protect ITSymantec Webinar | National Cyber Security Awareness Month: Protect IT
Symantec Webinar | National Cyber Security Awareness Month: Protect IT
 
Symantec Webinar | National Cyber Security Awareness Month: Secure IT
Symantec Webinar | National Cyber Security Awareness Month: Secure ITSymantec Webinar | National Cyber Security Awareness Month: Secure IT
Symantec Webinar | National Cyber Security Awareness Month: Secure IT
 
Symantec Webinar | National Cyber Security Awareness Month - Own IT
Symantec Webinar | National Cyber Security Awareness Month - Own ITSymantec Webinar | National Cyber Security Awareness Month - Own IT
Symantec Webinar | National Cyber Security Awareness Month - Own IT
 
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
 
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CKSymantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
 
Symantec Mobile Security Webinar
Symantec Mobile Security WebinarSymantec Mobile Security Webinar
Symantec Mobile Security Webinar
 
Symantec Webinar Cloud Security Threat Report
Symantec Webinar Cloud Security Threat ReportSymantec Webinar Cloud Security Threat Report
Symantec Webinar Cloud Security Threat Report
 
Symantec Cloud Security Threat Report
Symantec Cloud Security Threat ReportSymantec Cloud Security Threat Report
Symantec Cloud Security Threat Report
 
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
 
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
 
Symantec Webinar | Tips for Successful CASB Projects
Symantec Webinar |  Tips for Successful CASB ProjectsSymantec Webinar |  Tips for Successful CASB Projects
Symantec Webinar | Tips for Successful CASB Projects
 
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
 
Symantec Webinar: GDPR 1 Year On
Symantec Webinar: GDPR 1 Year OnSymantec Webinar: GDPR 1 Year On
Symantec Webinar: GDPR 1 Year On
 
Symantec ISTR 24 Webcast 2019
Symantec ISTR 24 Webcast 2019Symantec ISTR 24 Webcast 2019
Symantec ISTR 24 Webcast 2019
 
Symantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front LinesSymantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front Lines
 
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
 
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
 
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy BearSymantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
 

Kürzlich hochgeladen

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 

Kürzlich hochgeladen (20)

Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 

Symantec Data Loss Prevention 11

  • 1. Symantec Data Loss Prevention 11 December 14, 2010
  • 2. Unstructured Data: Trends and Observations • It’s growing – Over 60% per year (IDC) • It’s spread out – Distributed file servers, the cloud, self service groupware sites • It contains an organization’s intellectual property – Source code, designs, strategy, financials • It’s increasingly targeted by thieves – Hydraq – a small infection, but targeted highest value IP – Malicious insiders – steal IP for financial gain and career advancement – Malicious outsiders – steal product designs for counterfeit Symantec Data Loss Prevention 11 2
  • 3. The Challenges Protecting Intellectual Property (IP) • It’s hard to define – The differences between sensitive and non-sensitive data are often subtle • It’s hard to find – It’s intermingled with large volumes of low value data • It’s often very vulnerable – permissions are “loose” – Users create new data repositories and inadvertently grant broad access • Users don’t understand the risk of data leaks – Data security is not their primary mission Symantec Data Loss Prevention 11 3
  • 4. Data Loss Prevention 11 – What’s New • Symantec Data Loss Prevention 11 simplifies the detection and protection of enterprises’ most valuable information Vector Machine Learning: Reduce the time and expertise required to develop policies to protect unstructured data and IP • Requires less effort and expertise than describing content; requires a smaller sample than fingerprinting Risk Scoring: Identify the most risky data by combining content, usage and access information • Gives business units the information they need to directly address “hot spots” Data Owner Remediation: Identify data owners and notify them that they need to fix their exposed sensitive data • Reduces the time to achieve measurable risk reduction by involving data owners in the clean up effort Symantec Data Loss Prevention 11 4
  • 5. Detecting Unstructured Data: The Challenge Today Describe Fingerprint • How do I identify relevant • What if I can’t access all keywords? confidential docs? •How do I avoid false positives? • How do I account for new docs? • How do I tune policies? • How do I protect the endpoint? Symantec Data Loss Prevention 11 5 Symantec Proprietary & Confidential - This information is not a commitment, promise or legal obligation to deliver any material, code or functionality
  • 6. Vector Machine Learning: Finds Sensitive Data Learn Describe Fingerprint • Learns by positive and negative examples • Automates keyword identification and enables easier tuning • Improves accuracy, reduces false positives • Detects new content without having to fingerprint it first Symantec Data Loss Prevention 11 6 Symantec Proprietary & Confidential - This information is not a commitment, promise or legal obligation to deliver any material, code or functionality
  • 7. Data Loss Prevention 11 – What’s New • Symantec Data Loss Prevention 11 simplifies the detection and protection of enterprises’ most valuable information Vector Machine Learning: Reduce the time and expertise required to develop policies to protect unstructured data and IP • Requires less effort and expertise than describing content; requires a smaller sample than fingerprinting Risk Scoring: Identify the most risky data by combining content, usage and access information • Gives business units the information they need to directly address “hot spots” Data Owner Remediation: Identify data owners and notify them that they need to fix their exposed sensitive data • Reduces the time to achieve measurable risk reduction by involving data owners in the clean up effort Symantec Data Loss Prevention 11 7
  • 8. Risk Scoring – Identifies Data at Greatest Risk Find and fix the most risky data • Highlights the most risky folders • Score is based on incident type, severity and folder accessibility • Tells the organization where to focus initial data clean up and lock down efforts Symantec Data Loss Prevention 11 8
  • 9. Data Loss Prevention 11 – What’s New • Symantec Data Loss Prevention 11 simplifies the detection and protection of enterprises’ most valuable information Vector Machine Learning: Reduce the time and expertise required to develop policies to protect unstructured data and IP • Requires less effort and expertise than describing content; requires a smaller sample than fingerprinting Risk Scoring: Identify the most risky data by combining content, usage and access information • Gives business units the information they need to directly address “hot spots” Data Owner Remediation: Identify data owners and notify them that they need to fix their exposed sensitive data • Reduces the time to achieve measurable risk reduction by involving data owners in the clean up effort Symantec Data Loss Prevention 11 9
  • 10. Data Owner Remediation – Creates Security Awareness Educating data owners is the key to reducing risk Discover data, and track usage with Data Insight • Automatically notifies data owners that their sensitive files are potentially at risk Re-scan Report • Reduces the time to achieve measurable risk reduction by involving data owners in the clean up effort Alert data owners; advise them via email about how to protect their data Symantec Data Loss Prevention 11 10
  • 11. Symantec Data Loss Prevention – Products Storage Endpoint Network Symantec™ Data Loss Prevention Symantec™ Symantec™ Network Discover Data Loss Prevention Data Loss Prevention Endpoint Discover Network Monitor Symantec™ Data Loss Prevention Data Insight Symantec™ Symantec™ Symantec™ Data Loss Prevention Data Loss Prevention Data Loss Prevention Endpoint Prevent Network Prevent Network Protect Management Platform Symantec™ Data Loss Prevention Enforce Platform Symantec Data Loss Prevention 11 11
  • 12. Data Loss Prevention for Endpoint Enhancements • Flexibility to use a applications and storage devices while protecting sensitive data • Automatically apply encryption or Enterprise Rights Management (ERM) Endpoint Trusted Devices assures that sensitive data can only be copied to approved storage devices Application File Access Control ensures user drive applications such as iTunes, Skype and WebEx cannot access sensitive data FlexResponse can automatically apply encryption or Enterprise Rights Management to sensitive data Symantec Data Loss Prevention 11
  • 13. Summary • Symantec Data Loss Prevention 11 simplifies the detection and protection of enterprises’ most valuable information • Vector Machine Learning is unique to Symantec – Streamlines policy implementation, particularly for distributed IP • Risk Scoring prioritizes data at risk – Quickly identifies where to start data clean up efforts • Data Owner Remediation educates users about risk – Reduces the time and effort to achieve risk reduction • Symantec Data Loss Prevention 11 is the result of our broad customer experience Symantec Data Loss Prevention 11 13
  • 14. Symantec DLP Innovation Timeline 2004 2005 2006 2007 2008 2009 2010 2011 v3 v4 v5 v6 v7 v8 v9 v10 v11 Network: Monitor Network: Prevent Storage: Discover Storage: Protect Endpoint: Monitor & Prevent Endpoint: Discover • Customer focused innovation DLP Open Platform • One third of the F100 DLP Data Insight • Acknowledged DLP leader VML Symantec Data Loss Prevention 11 14 Symantec Proprietary & Confidential - This information is not a commitment, promise or legal obligation to deliver any material, code or functionality
  • 15. Thank you! Copyright © 2010 Symantec Corporation. All rights reserved. Symantec and the Symantec Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners. This document is provided for informational purposes only and is not intended as advertising. All warranties relating to the information in this document, either express or implied, are disclaimed to the maximum extent allowed by law. The information in this document is subject to change without notice. Symantec Data Loss Prevention 11 15