Upload
cloudcomputing
View
1.263
Download
1
Embed Size (px)
Citation preview
© Pawaa Software 1Control Protection Freedom
OCC Bangalore PresentationPrakash Baskaran
© Pawaa Software 2Control Protection Freedom
Industry Pain Points
Index
Recent Data Leak News
© Pawaa Software 3
Recent Data Leak News
© Pawaa Software 4
Recent Data Leak News
© Pawaa Software 5
Recent Data Leak News
© Pawaa Software 6
Recent Data Leak News
© Pawaa Software 7
Recent Data Leak News
© Pawaa Software 8
Defences everywhere
� Network Level
� Firewalls
� Content filters
� Email filters
� IDS, IPS, UTM
� Network controls
© Pawaa Software 9
� Customers
� Suppliers & vendors
� Partners & Consultants
� Remote Employees but data leaks continue.. VPN/WEB
� Desktop Level
� Anti-virus
� Identity Mgmt
� Access controls
� Device locks
� Encryption
� Offline activities at endpoints
� Clipboard and screenshots
� Privilege abuse
� Removable media
� Local configuration changes
Traditional Approaches Not Enough
Source of Data Leak: Insiders
© Pawaa Software 10
Source: Ponemon Institute
� 87% of insider attacks involved authorized
persons using legitimate commands.
-US Secret Service
� Through 2008, insiders will account for
majority of financial losses from computers
- Gartner
� Local configuration changes
� Logs without context
� Too many point solutions
� User Intents not deciphered
Insider risk management
needs to start with Endpoint
Monitoring.
Impacts of Data Leak
© Pawaa Software 11
Drivers: DLP converging with GRC
Common thread
between all these
Key Driver
© Pawaa Software 12
between all these
regulations is to
protect information
and control
endpoints!
© Pawaa Software 13Control Protection Freedom
Pawaa Innovations & Product Portfolio
Index
Defences everywhere
� Network Level
� Firewalls
� Content filters
� Email filters
� IDS, IPS, UTM
� Network DLP
© Pawaa Software 14
Pawaa Protects..
� Web Applications
� Customers
� Suppliers & vendors
� Partners & Consultants
� Remote Employees
� Desktop Level
� Anti-virus
� Access controls
� Device locks
� Encryption
� Host based DLP
Traditional Browser & Files
Traditional Web Browsers
Can trust but cannot verify.Problems
� Trusted users access information on Un-
trusted computers
� No visibility beyond typical user
authentication
� Simple user activities cause data leaks
© Pawaa Software 15
Files at Desktop
Can easily walk away
� Simple user activities cause data leaks
� Clipboard
� Save as
� No audit trails available and compliance is
tricky
� Files downloaded from web application
through typical browsers can easily “walk
away”
Sharing Data over the Web
Only covers this scenario:
� Trusted user, only using…
� Fully trusted machine, as long as…
� Under org’s full control, only within..
� Intranet environment
Many common situations where you must
share sensitive data within a context that is
not so “locked down”
These use cases are often vital to a business
being able to operate and compete!
Traditional DLP Products
© Pawaa Software 16
� Intranet environment
But what about…
� Cloud/ SaaS /ASP
� Franchises and branches
� Extranets
� Shared computers
� Mobile staff with no VPN access
being able to operate and compete!
Only Pawaa has the technology for sharing
sensitive information:
� Over the browser, even in…
� Non-intranet situations, even with…
� Unknown computers to
� Protect information accessed
Other Key Issues
� Agent can be disabled
� Agent must be pre-installed on machine
before protection starts
� Huge logs � practically unusable
Solves these serious protection issues
Traditional DLP Products
© Pawaa Software 17
� Huge logs � practically unusable
� Proving compliance = pull logs from
multiple products and correlate them
� Pre-classify data (very time consuming)
� Agent must run all the time
� 24x7 monitoring intrudes on user privacy
Solves these serious workload issues
Solves these serious usability issues
Our Innovative Approach
� Implements as a browser wrapper
� Downloaded once, 1st time user tries to
access sensitive data
� Works on un-trusted computers
accessing in multiple types of
authentification
� Un-hackable (up to 4 keys)
� Patented file format “wrapper”, works with
any native format
� Preset IRM policies are auto-applied to any
file created/downloaded
© Pawaa Software 18
authentification
� Agent is the conduit -- so data not
available if the agent is “disabled”
� Only log relevant into, so easy to detect
suspicious activity
� IRM enforces who, where, when and how
the file can be consumed
� File can only be consumed after policies are
enforced
� Even for files already created:
� Policies can be modified
� Content itself can be updated
Jointly protect against unauthorized access and unauthorized use
Demonstration
For this demonstration…
Non “locked down” scenario
• No Intranet, no VPN
© Pawaa Software 19
• No Intranet, no VPN
• Everything is accessing web apps via a browser
• Machine unknown to the enterprise
PawaaWEBB has been deployed for the web application that
needs protection
Demonstration
Demonstration
© Pawaa Software 20
Demonstration
• PawaaWEBB – deploys as a browser wrapper
• Acts as the required conduit – no access if not running
• To access a secure URL – user downloads & installs once
� Instant protection
� No army of install engineers
Demonstration
Desktop Client
Only required while accessing secure URLs
• Users – minimizes machine “overhead” (agent not
running all the time)
• Admins – logs capture relevant activity (not logging
Demonstration
© Pawaa Software 21
Demonstration• Admins – logs capture relevant activity (not logging
“all activity for all users all the time”)
Authentication
Goes beyond just username and password
• Communicates with server
• Can work with many authentication methods (i.e., AD,
SAML, OpenID, etc.)
• Updates all policies
• Rechecks components for tampering – config files, DLLs,
registry entries, etc.
Demonstration
© Pawaa Software 22
registry entries, etc.
PawaaWEBB Screenshots
© Pawaa Software 23
PawaaWEBB Screenshots
© Pawaa Software 24
File Download Local File System Monitoring
Application Monitoring Hardware Monitoring Network Monitoring
PawaaFILE Conversion
Demonstration
© Pawaa Software 25
“View Policy” – Selected Highlights
Can monitor individual fields (detect, alert, block)
Can monitor click behavior within the browser
“View Policy” – Selected Highlights
Configure upload/download permissions by URL
© Pawaa Software 26
Configure upload/download permissions by URL
(including allowable file types)
Data masking within the browser views
Demonstration
© Pawaa Software 27
� Patented file format “wrapper”, works
with any native format
� Un-hackable, but not just encrypting…
� Pre-set IRM policies are auto-applied to
any file created/downloaded
� IRM enforces every aspect of consuming
the file
PawaaFILE wraps around any native format
Demonstration
© Pawaa Software 28
Displayed as a .paw file format
Logo can carry client branding
PawaaFILE Screenshots
© Pawaa Software 29
� File checks with server, when opened
� This allows updates to be applied, even on files
“in the wild”
� IRM policy changes
� Even content can be updated
Demonstration
© Pawaa Software 30
“HotDoc” Examples
John and Eric (mobile salesmen)
download the confidential price
list to their notebooks
John Eric
© Pawaa Software 31
Later: 1) headquarters updates the price list and 2) Eric quits.
Admin makes both changes on the server
When John next opens the
document, the price list
content is auto-updated
Eric can’t use
the file, in
any way
Server Console
� Only log relevant info, so easy to perform
detection, forensics, and audits
� Even capture activity on files “in the
wild”
Demonstration
© Pawaa Software 32
wild”
© Pawaa Software 33Control Protection Freedom
Solutions with PawaaWEBB & PawaaFILE
Index
Integration with Cloud Applications
Advantages of Cloud based Applications
� No Hardware
� No Software
� Huge cost savings
PawaaWEBB & PawaaFILE Integration
� Complete audit trail on user behavior
© Pawaa Software 34
� Complete audit trail on user behavior
� Control and security for the
downloaded files and reports.
� Control over the user desktop and user
activities such as print, screenshot,
clipboard and other activities.
� Fills the missing web and file security
for cloud applications
Integration with Open Source Apps
Advantages of Open Source Applications
� Open Source Software benefits
� Widely popular
PawaaWEBB & PawaaFILE Integration
� Complete audit trail on user behavior
© Pawaa Software 35
� Complete audit trail on user behavior
� Control and security for the
downloaded files and reports.
� Control over the user desktop and user
activities such as print, screenshot,
clipboard and other activities.
� Increases the adoption of Open source
software and adoption of Pawaa
products.
Integration with Smart Cards
PawaaFILE with Proximity Cards
� Can eliminate the need for authentication
� Will open only the files that are authorized
for the card holder
� Can carry the file policies on the card
� Will open .paw files faster and enforce the
policies quicker
© Pawaa Software 36
policies quicker
� Ideal for hospital and clinical environments
PawaaFILE On Smart Health Cards
� Only authorized users can open the files
� Privacy, confidentiality and security
guaranteed.
Hot Doc Feature of PawaaFILE
PawaaFILE Solutions
� PawaaFILE knows the source, knows the
user and so can automatically update the
contents.
� Applications: Credit card statements,
mutual fund statements, bank account
statements, telephone or utility
© Pawaa Software 37
statements, telephone or utility
statements
� Eliminates the need for the user to
frequently visit the web site to download
� Ensures constant interaction with the bank
and the customer
� Customized ads for the users
� Increases the brand identity of the owner
PawaaDOCS – SaaS application
© Pawaa Software 38