18
tection from internal threats: lution of DLP or Who sets trends

Protection from internal threats: Evolution of DLP or Who sets trends

Embed Size (px)

Citation preview

Page 1: Protection from internal threats: Evolution of DLP or Who sets trends

Protection from internal threats:Evolution of DLP or Who sets trends

Page 2: Protection from internal threats: Evolution of DLP or Who sets trends

EARLY DLP

Tasks that DLPs were designed to address:

Control of maximum number of communication channels

Corporate data leakage prevention

Archiving business communications

Incidents management

Page 3: Protection from internal threats: Evolution of DLP or Who sets trends

DEVELOPMENT OF DLP

Email messages, including encrypted ones FTP/FTPS, HTTP/HTTPS file transfer Skype, Viber, ICQ and other IMmessages and files

Messages in social networks, blogs, forums, chats

External devices, СD/DVD,printers

Audio monitoring

Page 4: Protection from internal threats: Evolution of DLP or Who sets trends

USER ACTIVITY MONITORING SYSTEMS

Control of work hours

Logging user actions

Application activity monitoring

Reporting

Page 5: Protection from internal threats: Evolution of DLP or Who sets trends

THE EMERGENCE OF COMPREHENSIVE INSIDER THREAT PROTECTION SYSTEMS

ConventionalDLP system

User ActivityMonitoring

System

User ActivityMonitoring

System

ConventionalDLP system

Page 6: Protection from internal threats: Evolution of DLP or Who sets trends

REQUIREMENTS TO COMPREHENSIVE INSIDER THREAT PROTECTION SYSTEMS

can control the maximum number of data transmission channels

are easily integrated into any network with no need to change infrastructure

operate on gateway level and on endpoints both

are modularized

are easily installed and configured, show high performance along with inconsiderable impact on endpoint operation

are user-friendly and easy to interact with

Market needs solutions that:

Page 7: Protection from internal threats: Evolution of DLP or Who sets trends

AN INTEGRATED APPROACH TO PROTECTION FROM INTERNAL THREATS

Information flows control and data leak protection

Work processes control

Operational risk management

Reputational risk management

Page 8: Protection from internal threats: Evolution of DLP or Who sets trends

SHIFT OF TRENDS

Page 9: Protection from internal threats: Evolution of DLP or Who sets trends
Page 10: Protection from internal threats: Evolution of DLP or Who sets trends

TOP 7 REASONS FOR DISMISSAL IN 2014

According to Falcongaze Analytics Center

Misuse of work hoursand internet — 37 %

Corruption and bribery — 21 %

Comments on management boardand corporate policy — 17 %

Search for new job — 11 %

Violation of corporate rules — 6 %

Negligent treatmentof confidential data — 4 %

Industrial espionage — 4 %

Page 11: Protection from internal threats: Evolution of DLP or Who sets trends

USER ACTIVITY STATISTICS

Page 12: Protection from internal threats: Evolution of DLP or Who sets trends

WORK HOURS MONITORING

Page 13: Protection from internal threats: Evolution of DLP or Who sets trends

INFORMATION ON VISITED SITES

Page 14: Protection from internal threats: Evolution of DLP or Who sets trends

USER RELATIONS GRAPH ANALYZER

Page 15: Protection from internal threats: Evolution of DLP or Who sets trends

USE OF APPLICATIONS ANALYSIS

Page 16: Protection from internal threats: Evolution of DLP or Who sets trends

REPORTING

Page 17: Protection from internal threats: Evolution of DLP or Who sets trends

CURRENT TRENDS

Fast introduction

Deployment in high complexity networks

Flexibility — several ways to intercept traffic

Comprehensive tool for information and economic security

Usability

Modularity

Low TCO

Page 18: Protection from internal threats: Evolution of DLP or Who sets trends

Thank you