SlideShare ist ein Scribd-Unternehmen logo
1 von 27
Protecting PII in the EU
GTB Data Leak Prevention




                       March 27, 2012
                       Oxford, UK
Security Breach Statistics - (2005 -2011):

           479,072,533                 Confidential records stolen/lost

            Over $150                  Cost per breached record

           1 in 75 emails              Contain secure content

            2 of 50 files              Exposed files on the network

           $0.10 to $25                Price of a valid credit card w/ CVV

           $10 - $1,000                Price for bank account credentials
    Sources: epic.org, Ponemon llc., Privacy Rights Clearinghouse
5/3/2012                            Copyright GTB Technologies, Inc.         2
All time largest reported incidents
  records              date                                organizations            Known Cost
130,000,000   January 20, 2009       Heartland Payment Systems                      $68 mill
94,000,000    January 17, 2007       TJX Companies Inc.                             $64 mill
90,000,000    June 1, 1984           TRW, Sears Roebuck                             Unknown
77,000,000    April 26, 2011         Sony Corporation                               $173 mill
76,000,000    October 5, 2009        National Archives and Records Administration   unknown
40,000,000    June 19, 2005          CardSystems, Visa, MasterCard, American Express unknown
32,000,000    December 14, 2009      RockYou Inc.                                   unknown
26,500,000    May 22, 2006           U.S. Department of Veterans Affairs            $20 mill
25,000,000    November 20, 2007      HM Revenue and Customs, TNT                    unknown
24,600,000    May 2, 2011            Sony Online Entertainment, Sony Corporation    unknown


Source: http://datalossdb.org/

 5/3/2012                         Copyright GTB Technologies, Inc.                         3
EU Electronic Communications Guidance
                   Section 16: Offences and Penalties
 Failure to comply with certain provisions of the Regulations are criminal offences:
• Data Security and Data Breaches
• Unsolicited Marketing Communications
• Requirements specified in Information and Enforcement Notices issued by the
     Commissioner Requirements imposed by the Commissioner’s authorised officers.

The offences attract a fine of up to €5,000 – per message in the case of unsolicited marketing –
when prosecuted by the Commissioner in the District Court.
Unsolicited marketing offences may be prosecuted on indictment and attract fines of up to
€250,000 in the case of a company and €50,000 in the case of an individual. A data security
offence may similarly be prosecuted on indictment and attract the same level of Penalty.



Source: http://www.dataprotection.ie/documents/guidance/Electronic_Communications_Guidance.pdf


     5/3/2012                          Copyright GTB Technologies, Inc.                          4
Defining DLP

A DLP system performs real-time data
classification on Data at Rest and Data
in Motion and automatically enforces
security policies including PREVENTION.




5/3/2012      Copyright GTB Technologies, Inc.   5
DLP answers 4 questions:

    1. Where is my       2. Who is sending            3. What data is   4. Who is receiving
        data?                my data?                   being sent?         my data?

•   Desktops         •   Trusted users            •   PII               • IP address
•   Laptops          •   Intruders                •   PHI               • Email destination
•   File shares      •   Spyware                  •   Source code       • Geographic
•   SharePoint       •   Viruses                  •   Intel. Property     location




5/3/2012                         Copyright GTB Technologies, Inc.                             6
The 8 use-cases for Network DLP

 1. Control a broken          2. Demonstrate               3. Automate Email      4. Detect or Block
  business process              Compliance                     Encryption         encrypted content
                                                                                 Should I allow
                          I have no way of              How do I automate
Who is sending, what                                                             encrypted data to
                          enforcing EU data loss        encrypting emails
data and to whom?                                                                leave without
                          compliance regulation         which require it?
                                                                                 content inspection?


                                                          7. Detect/Block TCP       8. Employees’
 5. Severity Blocking        6. Visibility to SSL
                                                        from non-trusted users        Education
                                                        How do I detect          My employees are
Some breaches are so      I have no visibility to       transmissions from       not complying with
severe that I prefer to   SSL in general and            non-trusted users        the Written
altogether block them!    HTTPS in particular!          (Malware/Viruses/Troj    Information Security
                                                        ans)                     Policy (WISP)




  5/3/2012                            Copyright GTB Technologies, Inc.                            7
Where is my data?




5/3/2012        Copyright GTB Technologies, Inc.   8
Who is sending my data?




5/3/2012           Copyright GTB Technologies, Inc.   9
What data is being sent?


                                 a




5/3/2012           Copyright GTB Technologies, Inc.   10
Who is receiving my data?




5/3/2012           Copyright GTB Technologies, Inc.   11
The problem of protecting PII – Avoid false positives

Last Name              Email             Phone         Salary        SSN      Bank Account      Credit Card

Abel         abelr@proxyconn.com      9495550002 224491.19       001010003 12345678000000002 371230000000004

Abelson      Hal_Abelson@proxyconn.com 9495550003 80721.60       001010004 123000000003      6011120000000000

Abourezk     James_Abourezk@uci.edu   9495550004 84170.59        001010005 123000000004      5312340000000010

Abrams       CAbrams@microsoft.com    9495550005 248851.63       001010006 12345678000000005 4123400000000014

Ace          Jane-Ace@msn.com         9495550006 81827.08        001010007 123000000006      371230000000012

Acton        john_acton@uci.edu       9495550007 38145.58        001010008 12000000007       6011120000000018

Adams        adamsa@yahoo.com         9495550008 97567.90        001010009 1234000000008     5512340000000026

Adams        dadams@ucla.edu          9495550009 27973.57        001010010 1000000009        4123400000000022

Adams        HAdams@ucla.edu          9495550010 168487.07       001010011 123456000000010   371230000000020

        5/3/2012                          Copyright GTB Technologies, Inc.                            12
Solution: Fingerprint your PII




5/3/2012      Copyright GTB Technologies, Inc.   13
GTB DLP
Live Demo
 www.gttb.com


  GTB DLP Suite-Confidential
Essential Elements of DLP

1.   Detection accuracy
2.   Resiliency to data manipulation
3.   Comprehensive protocol support
4.   File format independence
5.   Performance – no network degradation
6.   Security
7.   Detection of encrypted content
8.   User remediation

                   GTB DLP Suite-Confidential
Detection Engine Accuracy
Would you enforce blocking if you don’t trust the event is true?



  Imprecise Algorithms
  •Data Pattern engine
  •Bayesian analysis
  •Statistical analysis
  •Others




                              GTB DLP Suite-Confidential
Detection Accuracy (continued)
     Would you enforce blocking if you don’t trust the event is true?



Precise Algorithms

•Whole file hash
•Cyclical hashes
•Rolling hashes
•Watermarking/tagging
•Recursive Transitional Gaps (GTB proprietary)


                        GTB DLP Suite-Confidential
Un-structured Data Fingerprinting
Structured Data Fingerprinting - 100% accuracy!
Resiliency to Data Manipulation

•Data extracting – copy and paste
     Imprecise Algorithms
•File format conversion
•Compression
•File embedding
•File extension changes
•Re-typing – secure text is re-typed
•Data representation change (069-44-4321 – 069,44,4321)



                       GTB DLP Suite-Confidential
File format and protocol independence

 •SMTP, HTTP and FTP are most commonly used
    Imprecise Algorithms
 •HTTP Server, HTTP Tunnel, NNTP, IM, POP3, MS
 Networks, SSL and unknown protocols
 •Secure data may reside in any file format




                     GTB DLP Suite-Confidential
Performance & Security

• Make sure all packets are scanned without
  Imprecise Algorithms
  network degradation
• Make sure the solution is secure
• Choose a solution that does not copy
  secure content in order to protect it




                  GTB DLP Suite-Confidential
What data must be protected?
      Personal identifiable information (PII)

• Credit card number
•   Social security number
•   Customer name
•   Address
•   Telephone numbers
•   Account numbers/Member numbers/Tax ID’s
•   PIN or password
•   Username & password
•   Drivers license number
•   Date of birth
Enterprise class DLP




     GTB DLP Suite-Confidential
Network DLP configuration - OOL
                           •Log
    Enforcement            •Encrypt
    Actions
                           •Quarantine
                           •Severity Block


                                             Mirror port switch




           Scans all TCP channels on all 65,535 ports

5/3/2012                CopyrightDLP Suite-Confidential
                           GTB GTB Technologies, Inc.             Slide 25
Secure mail integration




       GTB DLP Suite-Confidential
HTTPS visibility




5/3/2012     CopyrightDLP Suite-Confidential
                GTB GTB Technologies, Inc.     Slide 27

Weitere ähnliche Inhalte

Ähnlich wie GTB - Protecting PII in the EU

GTB DLP Suite Presentation
GTB DLP Suite PresentationGTB DLP Suite Presentation
GTB DLP Suite Presentation
gtbsalesindia
 
Gtb Dlp Suite Presentation
Gtb Dlp Suite PresentationGtb Dlp Suite Presentation
Gtb Dlp Suite Presentation
gtbsalesindia
 
Gtb Dlp & Irm Solution Product And Deployment Overview
Gtb Dlp & Irm Solution   Product And Deployment OverviewGtb Dlp & Irm Solution   Product And Deployment Overview
Gtb Dlp & Irm Solution Product And Deployment Overview
gtbsalesindia
 
dlp-sales-play-sales-customer-deck-2022.pptx
dlp-sales-play-sales-customer-deck-2022.pptxdlp-sales-play-sales-customer-deck-2022.pptx
dlp-sales-play-sales-customer-deck-2022.pptx
alex hincapie
 
SCB 2013 DLP, công nghệ, và phương pháp triển khai
SCB 2013  DLP, công nghệ, và phương pháp triển khaiSCB 2013  DLP, công nghệ, và phương pháp triển khai
SCB 2013 DLP, công nghệ, và phương pháp triển khai
Security Bootcamp
 
Security in the News
Security in the NewsSecurity in the News
Security in the News
James Sutter
 

Ähnlich wie GTB - Protecting PII in the EU (20)

GTB DLP Suite Presentation
GTB DLP Suite PresentationGTB DLP Suite Presentation
GTB DLP Suite Presentation
 
Gtb Dlp Suite Presentation
Gtb Dlp Suite PresentationGtb Dlp Suite Presentation
Gtb Dlp Suite Presentation
 
Privacy Preserved Data Augmentation using Enterprise Data Fabric
Privacy Preserved Data Augmentation using Enterprise Data FabricPrivacy Preserved Data Augmentation using Enterprise Data Fabric
Privacy Preserved Data Augmentation using Enterprise Data Fabric
 
Gtb Dlp & Irm Solution Product And Deployment Overview
Gtb Dlp & Irm Solution   Product And Deployment OverviewGtb Dlp & Irm Solution   Product And Deployment Overview
Gtb Dlp & Irm Solution Product And Deployment Overview
 
dlp-sales-play-sales-customer-deck-2022.pptx
dlp-sales-play-sales-customer-deck-2022.pptxdlp-sales-play-sales-customer-deck-2022.pptx
dlp-sales-play-sales-customer-deck-2022.pptx
 
SCB 2013 DLP, công nghệ, và phương pháp triển khai
SCB 2013  DLP, công nghệ, và phương pháp triển khaiSCB 2013  DLP, công nghệ, và phương pháp triển khai
SCB 2013 DLP, công nghệ, và phương pháp triển khai
 
Dean carey - data loss-prevention - atlseccon2011
Dean carey - data loss-prevention - atlseccon2011Dean carey - data loss-prevention - atlseccon2011
Dean carey - data loss-prevention - atlseccon2011
 
Encryption and Key Management: Ensuring Compliance, Privacy, and Minimizing t...
Encryption and Key Management: Ensuring Compliance, Privacy, and Minimizing t...Encryption and Key Management: Ensuring Compliance, Privacy, and Minimizing t...
Encryption and Key Management: Ensuring Compliance, Privacy, and Minimizing t...
 
Lessons in privacy engineering from a nation scale identity system - connect id
Lessons in privacy engineering from a nation scale identity system - connect idLessons in privacy engineering from a nation scale identity system - connect id
Lessons in privacy engineering from a nation scale identity system - connect id
 
Refugees on Rails Berlin - #2 Tech Talk on Security
Refugees on Rails Berlin - #2 Tech Talk on SecurityRefugees on Rails Berlin - #2 Tech Talk on Security
Refugees on Rails Berlin - #2 Tech Talk on Security
 
IT Security Presentation - IIMC 2014 Conference
IT Security Presentation - IIMC 2014 ConferenceIT Security Presentation - IIMC 2014 Conference
IT Security Presentation - IIMC 2014 Conference
 
Security in the News
Security in the NewsSecurity in the News
Security in the News
 
Smart Defense: Strategic Approach to fight contemporary Security, Privacy & A...
Smart Defense: Strategic Approach to fight contemporary Security, Privacy & A...Smart Defense: Strategic Approach to fight contemporary Security, Privacy & A...
Smart Defense: Strategic Approach to fight contemporary Security, Privacy & A...
 
Dama - Protecting Sensitive Data on a Database
Dama - Protecting Sensitive Data on a DatabaseDama - Protecting Sensitive Data on a Database
Dama - Protecting Sensitive Data on a Database
 
Psdot 13 robust data leakage and email filtering system
Psdot 13 robust data leakage and email filtering systemPsdot 13 robust data leakage and email filtering system
Psdot 13 robust data leakage and email filtering system
 
What i learned at the infosecurity isaca north america expo and conference 2019
What i learned at the infosecurity isaca north america expo and conference 2019What i learned at the infosecurity isaca north america expo and conference 2019
What i learned at the infosecurity isaca north america expo and conference 2019
 
dev.privacy: GDPR in a nutshell - Evan Tedeschi - Codemotion Amsterdam 2018
dev.privacy: GDPR in a nutshell - Evan Tedeschi - Codemotion Amsterdam 2018dev.privacy: GDPR in a nutshell - Evan Tedeschi - Codemotion Amsterdam 2018
dev.privacy: GDPR in a nutshell - Evan Tedeschi - Codemotion Amsterdam 2018
 
Data Protection, Humans and Common Sense
Data Protection, Humans and Common SenseData Protection, Humans and Common Sense
Data Protection, Humans and Common Sense
 
ISACA Houston - Practical data privacy and de-identification techniques
ISACA Houston  - Practical data privacy and de-identification techniquesISACA Houston  - Practical data privacy and de-identification techniques
ISACA Houston - Practical data privacy and de-identification techniques
 
Cybersecurity…real world solutions
Cybersecurity…real world solutions Cybersecurity…real world solutions
Cybersecurity…real world solutions
 

Kürzlich hochgeladen

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Kürzlich hochgeladen (20)

MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 

GTB - Protecting PII in the EU

  • 1. Protecting PII in the EU GTB Data Leak Prevention March 27, 2012 Oxford, UK
  • 2. Security Breach Statistics - (2005 -2011): 479,072,533 Confidential records stolen/lost Over $150 Cost per breached record 1 in 75 emails Contain secure content 2 of 50 files Exposed files on the network $0.10 to $25 Price of a valid credit card w/ CVV $10 - $1,000 Price for bank account credentials Sources: epic.org, Ponemon llc., Privacy Rights Clearinghouse 5/3/2012 Copyright GTB Technologies, Inc. 2
  • 3. All time largest reported incidents records date organizations Known Cost 130,000,000 January 20, 2009 Heartland Payment Systems $68 mill 94,000,000 January 17, 2007 TJX Companies Inc. $64 mill 90,000,000 June 1, 1984 TRW, Sears Roebuck Unknown 77,000,000 April 26, 2011 Sony Corporation $173 mill 76,000,000 October 5, 2009 National Archives and Records Administration unknown 40,000,000 June 19, 2005 CardSystems, Visa, MasterCard, American Express unknown 32,000,000 December 14, 2009 RockYou Inc. unknown 26,500,000 May 22, 2006 U.S. Department of Veterans Affairs $20 mill 25,000,000 November 20, 2007 HM Revenue and Customs, TNT unknown 24,600,000 May 2, 2011 Sony Online Entertainment, Sony Corporation unknown Source: http://datalossdb.org/ 5/3/2012 Copyright GTB Technologies, Inc. 3
  • 4. EU Electronic Communications Guidance Section 16: Offences and Penalties Failure to comply with certain provisions of the Regulations are criminal offences: • Data Security and Data Breaches • Unsolicited Marketing Communications • Requirements specified in Information and Enforcement Notices issued by the Commissioner Requirements imposed by the Commissioner’s authorised officers. The offences attract a fine of up to €5,000 – per message in the case of unsolicited marketing – when prosecuted by the Commissioner in the District Court. Unsolicited marketing offences may be prosecuted on indictment and attract fines of up to €250,000 in the case of a company and €50,000 in the case of an individual. A data security offence may similarly be prosecuted on indictment and attract the same level of Penalty. Source: http://www.dataprotection.ie/documents/guidance/Electronic_Communications_Guidance.pdf 5/3/2012 Copyright GTB Technologies, Inc. 4
  • 5. Defining DLP A DLP system performs real-time data classification on Data at Rest and Data in Motion and automatically enforces security policies including PREVENTION. 5/3/2012 Copyright GTB Technologies, Inc. 5
  • 6. DLP answers 4 questions: 1. Where is my 2. Who is sending 3. What data is 4. Who is receiving data? my data? being sent? my data? • Desktops • Trusted users • PII • IP address • Laptops • Intruders • PHI • Email destination • File shares • Spyware • Source code • Geographic • SharePoint • Viruses • Intel. Property location 5/3/2012 Copyright GTB Technologies, Inc. 6
  • 7. The 8 use-cases for Network DLP 1. Control a broken 2. Demonstrate 3. Automate Email 4. Detect or Block business process Compliance Encryption encrypted content Should I allow I have no way of How do I automate Who is sending, what encrypted data to enforcing EU data loss encrypting emails data and to whom? leave without compliance regulation which require it? content inspection? 7. Detect/Block TCP 8. Employees’ 5. Severity Blocking 6. Visibility to SSL from non-trusted users Education How do I detect My employees are Some breaches are so I have no visibility to transmissions from not complying with severe that I prefer to SSL in general and non-trusted users the Written altogether block them! HTTPS in particular! (Malware/Viruses/Troj Information Security ans) Policy (WISP) 5/3/2012 Copyright GTB Technologies, Inc. 7
  • 8. Where is my data? 5/3/2012 Copyright GTB Technologies, Inc. 8
  • 9. Who is sending my data? 5/3/2012 Copyright GTB Technologies, Inc. 9
  • 10. What data is being sent? a 5/3/2012 Copyright GTB Technologies, Inc. 10
  • 11. Who is receiving my data? 5/3/2012 Copyright GTB Technologies, Inc. 11
  • 12. The problem of protecting PII – Avoid false positives Last Name Email Phone Salary SSN Bank Account Credit Card Abel abelr@proxyconn.com 9495550002 224491.19 001010003 12345678000000002 371230000000004 Abelson Hal_Abelson@proxyconn.com 9495550003 80721.60 001010004 123000000003 6011120000000000 Abourezk James_Abourezk@uci.edu 9495550004 84170.59 001010005 123000000004 5312340000000010 Abrams CAbrams@microsoft.com 9495550005 248851.63 001010006 12345678000000005 4123400000000014 Ace Jane-Ace@msn.com 9495550006 81827.08 001010007 123000000006 371230000000012 Acton john_acton@uci.edu 9495550007 38145.58 001010008 12000000007 6011120000000018 Adams adamsa@yahoo.com 9495550008 97567.90 001010009 1234000000008 5512340000000026 Adams dadams@ucla.edu 9495550009 27973.57 001010010 1000000009 4123400000000022 Adams HAdams@ucla.edu 9495550010 168487.07 001010011 123456000000010 371230000000020 5/3/2012 Copyright GTB Technologies, Inc. 12
  • 13. Solution: Fingerprint your PII 5/3/2012 Copyright GTB Technologies, Inc. 13
  • 14. GTB DLP Live Demo www.gttb.com GTB DLP Suite-Confidential
  • 15. Essential Elements of DLP 1. Detection accuracy 2. Resiliency to data manipulation 3. Comprehensive protocol support 4. File format independence 5. Performance – no network degradation 6. Security 7. Detection of encrypted content 8. User remediation GTB DLP Suite-Confidential
  • 16. Detection Engine Accuracy Would you enforce blocking if you don’t trust the event is true? Imprecise Algorithms •Data Pattern engine •Bayesian analysis •Statistical analysis •Others GTB DLP Suite-Confidential
  • 17. Detection Accuracy (continued) Would you enforce blocking if you don’t trust the event is true? Precise Algorithms •Whole file hash •Cyclical hashes •Rolling hashes •Watermarking/tagging •Recursive Transitional Gaps (GTB proprietary) GTB DLP Suite-Confidential
  • 19. Structured Data Fingerprinting - 100% accuracy!
  • 20. Resiliency to Data Manipulation •Data extracting – copy and paste Imprecise Algorithms •File format conversion •Compression •File embedding •File extension changes •Re-typing – secure text is re-typed •Data representation change (069-44-4321 – 069,44,4321) GTB DLP Suite-Confidential
  • 21. File format and protocol independence •SMTP, HTTP and FTP are most commonly used Imprecise Algorithms •HTTP Server, HTTP Tunnel, NNTP, IM, POP3, MS Networks, SSL and unknown protocols •Secure data may reside in any file format GTB DLP Suite-Confidential
  • 22. Performance & Security • Make sure all packets are scanned without Imprecise Algorithms network degradation • Make sure the solution is secure • Choose a solution that does not copy secure content in order to protect it GTB DLP Suite-Confidential
  • 23. What data must be protected? Personal identifiable information (PII) • Credit card number • Social security number • Customer name • Address • Telephone numbers • Account numbers/Member numbers/Tax ID’s • PIN or password • Username & password • Drivers license number • Date of birth
  • 24. Enterprise class DLP GTB DLP Suite-Confidential
  • 25. Network DLP configuration - OOL •Log Enforcement •Encrypt Actions •Quarantine •Severity Block Mirror port switch Scans all TCP channels on all 65,535 ports 5/3/2012 CopyrightDLP Suite-Confidential GTB GTB Technologies, Inc. Slide 25
  • 26. Secure mail integration GTB DLP Suite-Confidential
  • 27. HTTPS visibility 5/3/2012 CopyrightDLP Suite-Confidential GTB GTB Technologies, Inc. Slide 27