39
© Pawaa Software 1 Control Protection Freedom OCC Bangalore Presentation Prakash Baskaran [email protected]

Pawaa OCC Presentation

Embed Size (px)

Citation preview

Page 1: Pawaa OCC Presentation

© Pawaa Software 1Control Protection Freedom

OCC Bangalore PresentationPrakash Baskaran

[email protected]

Page 2: Pawaa OCC Presentation

© Pawaa Software 2Control Protection Freedom

Industry Pain Points

Index

Page 3: Pawaa OCC Presentation

Recent Data Leak News

© Pawaa Software 3

Page 4: Pawaa OCC Presentation

Recent Data Leak News

© Pawaa Software 4

Page 5: Pawaa OCC Presentation

Recent Data Leak News

© Pawaa Software 5

Page 6: Pawaa OCC Presentation

Recent Data Leak News

© Pawaa Software 6

Page 7: Pawaa OCC Presentation

Recent Data Leak News

© Pawaa Software 7

Page 8: Pawaa OCC Presentation

Recent Data Leak News

© Pawaa Software 8

Page 9: Pawaa OCC Presentation

Defences everywhere

� Network Level

� Firewalls

� Content filters

� Email filters

� IDS, IPS, UTM

� Network controls

© Pawaa Software 9

� Customers

� Suppliers & vendors

� Partners & Consultants

� Remote Employees but data leaks continue.. VPN/WEB

� Desktop Level

� Anti-virus

� Identity Mgmt

� Access controls

� Device locks

� Encryption

Page 10: Pawaa OCC Presentation

� Offline activities at endpoints

� Clipboard and screenshots

� Privilege abuse

� Removable media

� Local configuration changes

Traditional Approaches Not Enough

Source of Data Leak: Insiders

© Pawaa Software 10

Source: Ponemon Institute

� 87% of insider attacks involved authorized

persons using legitimate commands.

-US Secret Service

� Through 2008, insiders will account for

majority of financial losses from computers

- Gartner

� Local configuration changes

� Logs without context

� Too many point solutions

� User Intents not deciphered

Insider risk management

needs to start with Endpoint

Monitoring.

Page 11: Pawaa OCC Presentation

Impacts of Data Leak

© Pawaa Software 11

Page 12: Pawaa OCC Presentation

Drivers: DLP converging with GRC

Common thread

between all these

Key Driver

© Pawaa Software 12

between all these

regulations is to

protect information

and control

endpoints!

Page 13: Pawaa OCC Presentation

© Pawaa Software 13Control Protection Freedom

Pawaa Innovations & Product Portfolio

Index

Page 14: Pawaa OCC Presentation

Defences everywhere

� Network Level

� Firewalls

� Content filters

� Email filters

� IDS, IPS, UTM

� Network DLP

© Pawaa Software 14

Pawaa Protects..

� Web Applications

� Customers

� Suppliers & vendors

� Partners & Consultants

� Remote Employees

� Desktop Level

� Anti-virus

� Access controls

� Device locks

� Encryption

� Host based DLP

Page 15: Pawaa OCC Presentation

Traditional Browser & Files

Traditional Web Browsers

Can trust but cannot verify.Problems

� Trusted users access information on Un-

trusted computers

� No visibility beyond typical user

authentication

� Simple user activities cause data leaks

© Pawaa Software 15

Files at Desktop

Can easily walk away

� Simple user activities cause data leaks

� Clipboard

� Print

� Save as

� No audit trails available and compliance is

tricky

� Files downloaded from web application

through typical browsers can easily “walk

away”

Page 16: Pawaa OCC Presentation

Sharing Data over the Web

Only covers this scenario:

� Trusted user, only using…

� Fully trusted machine, as long as…

� Under org’s full control, only within..

� Intranet environment

Many common situations where you must

share sensitive data within a context that is

not so “locked down”

These use cases are often vital to a business

being able to operate and compete!

Traditional DLP Products

© Pawaa Software 16

� Intranet environment

But what about…

� Cloud/ SaaS /ASP

� Franchises and branches

� Extranets

� Shared computers

� Mobile staff with no VPN access

being able to operate and compete!

Only Pawaa has the technology for sharing

sensitive information:

� Over the browser, even in…

� Non-intranet situations, even with…

� Unknown computers to

� Protect information accessed

Page 17: Pawaa OCC Presentation

Other Key Issues

� Agent can be disabled

� Agent must be pre-installed on machine

before protection starts

� Huge logs � practically unusable

Solves these serious protection issues

Traditional DLP Products

© Pawaa Software 17

� Huge logs � practically unusable

� Proving compliance = pull logs from

multiple products and correlate them

� Pre-classify data (very time consuming)

� Agent must run all the time

� 24x7 monitoring intrudes on user privacy

Solves these serious workload issues

Solves these serious usability issues

Page 18: Pawaa OCC Presentation

Our Innovative Approach

� Implements as a browser wrapper

� Downloaded once, 1st time user tries to

access sensitive data

� Works on un-trusted computers

accessing in multiple types of

authentification

� Un-hackable (up to 4 keys)

� Patented file format “wrapper”, works with

any native format

� Preset IRM policies are auto-applied to any

file created/downloaded

© Pawaa Software 18

authentification

� Agent is the conduit -- so data not

available if the agent is “disabled”

� Only log relevant into, so easy to detect

suspicious activity

� IRM enforces who, where, when and how

the file can be consumed

� File can only be consumed after policies are

enforced

� Even for files already created:

� Policies can be modified

� Content itself can be updated

Jointly protect against unauthorized access and unauthorized use

Page 19: Pawaa OCC Presentation

Demonstration

For this demonstration…

Non “locked down” scenario

• No Intranet, no VPN

© Pawaa Software 19

• No Intranet, no VPN

• Everything is accessing web apps via a browser

• Machine unknown to the enterprise

PawaaWEBB has been deployed for the web application that

needs protection

Page 20: Pawaa OCC Presentation

Demonstration

Demonstration

© Pawaa Software 20

Demonstration

• PawaaWEBB – deploys as a browser wrapper

• Acts as the required conduit – no access if not running

• To access a secure URL – user downloads & installs once

� Instant protection

� No army of install engineers

Page 21: Pawaa OCC Presentation

Demonstration

Desktop Client

Only required while accessing secure URLs

• Users – minimizes machine “overhead” (agent not

running all the time)

• Admins – logs capture relevant activity (not logging

Demonstration

© Pawaa Software 21

Demonstration• Admins – logs capture relevant activity (not logging

“all activity for all users all the time”)

Page 22: Pawaa OCC Presentation

Authentication

Goes beyond just username and password

• Communicates with server

• Can work with many authentication methods (i.e., AD,

SAML, OpenID, etc.)

• Updates all policies

• Rechecks components for tampering – config files, DLLs,

registry entries, etc.

Demonstration

© Pawaa Software 22

registry entries, etc.

Page 23: Pawaa OCC Presentation

PawaaWEBB Screenshots

© Pawaa Software 23

Page 24: Pawaa OCC Presentation

PawaaWEBB Screenshots

© Pawaa Software 24

File Download Local File System Monitoring

Application Monitoring Hardware Monitoring Network Monitoring

PawaaFILE Conversion

Page 25: Pawaa OCC Presentation

Demonstration

© Pawaa Software 25

Page 26: Pawaa OCC Presentation

“View Policy” – Selected Highlights

Can monitor individual fields (detect, alert, block)

Can monitor click behavior within the browser

“View Policy” – Selected Highlights

Configure upload/download permissions by URL

© Pawaa Software 26

Configure upload/download permissions by URL

(including allowable file types)

Data masking within the browser views

Page 27: Pawaa OCC Presentation

Demonstration

© Pawaa Software 27

� Patented file format “wrapper”, works

with any native format

� Un-hackable, but not just encrypting…

� Pre-set IRM policies are auto-applied to

any file created/downloaded

� IRM enforces every aspect of consuming

the file

Page 28: Pawaa OCC Presentation

PawaaFILE wraps around any native format

Demonstration

© Pawaa Software 28

Displayed as a .paw file format

Logo can carry client branding

Page 29: Pawaa OCC Presentation

PawaaFILE Screenshots

© Pawaa Software 29

Page 30: Pawaa OCC Presentation

� File checks with server, when opened

� This allows updates to be applied, even on files

“in the wild”

� IRM policy changes

� Even content can be updated

Demonstration

© Pawaa Software 30

Page 31: Pawaa OCC Presentation

“HotDoc” Examples

John and Eric (mobile salesmen)

download the confidential price

list to their notebooks

John Eric

© Pawaa Software 31

Later: 1) headquarters updates the price list and 2) Eric quits.

Admin makes both changes on the server

When John next opens the

document, the price list

content is auto-updated

Eric can’t use

the file, in

any way

Page 32: Pawaa OCC Presentation

Server Console

� Only log relevant info, so easy to perform

detection, forensics, and audits

� Even capture activity on files “in the

wild”

Demonstration

© Pawaa Software 32

wild”

Page 33: Pawaa OCC Presentation

© Pawaa Software 33Control Protection Freedom

Solutions with PawaaWEBB & PawaaFILE

Index

Page 34: Pawaa OCC Presentation

Integration with Cloud Applications

Advantages of Cloud based Applications

� No Hardware

� No Software

� Huge cost savings

PawaaWEBB & PawaaFILE Integration

� Complete audit trail on user behavior

© Pawaa Software 34

� Complete audit trail on user behavior

� Control and security for the

downloaded files and reports.

� Control over the user desktop and user

activities such as print, screenshot,

clipboard and other activities.

� Fills the missing web and file security

for cloud applications

Page 35: Pawaa OCC Presentation

Integration with Open Source Apps

Advantages of Open Source Applications

� Open Source Software benefits

� Widely popular

PawaaWEBB & PawaaFILE Integration

� Complete audit trail on user behavior

© Pawaa Software 35

� Complete audit trail on user behavior

� Control and security for the

downloaded files and reports.

� Control over the user desktop and user

activities such as print, screenshot,

clipboard and other activities.

� Increases the adoption of Open source

software and adoption of Pawaa

products.

Page 36: Pawaa OCC Presentation

Integration with Smart Cards

PawaaFILE with Proximity Cards

� Can eliminate the need for authentication

� Will open only the files that are authorized

for the card holder

� Can carry the file policies on the card

� Will open .paw files faster and enforce the

policies quicker

© Pawaa Software 36

policies quicker

� Ideal for hospital and clinical environments

PawaaFILE On Smart Health Cards

� Only authorized users can open the files

� Privacy, confidentiality and security

guaranteed.

Page 37: Pawaa OCC Presentation

Hot Doc Feature of PawaaFILE

PawaaFILE Solutions

� PawaaFILE knows the source, knows the

user and so can automatically update the

contents.

� Applications: Credit card statements,

mutual fund statements, bank account

statements, telephone or utility

© Pawaa Software 37

statements, telephone or utility

statements

� Eliminates the need for the user to

frequently visit the web site to download

� Ensures constant interaction with the bank

and the customer

� Customized ads for the users

� Increases the brand identity of the owner

Page 38: Pawaa OCC Presentation

PawaaDOCS – SaaS application

© Pawaa Software 38

Page 39: Pawaa OCC Presentation

© Pawaa Software 39Control Protection Freedom

Thank you.Prakash Baskaran

[email protected]