Transcript

© 2015 CipherCloud | All rights reserved. 1© 2014 CipherCloud | All rights reserved.

© 2015 CipherCloud | All rights reserved

Cloud Visibility and Data Loss PreventionSteps to managing Shadow IT and lowering the risk of data loss in the cloud

© 2015 CipherCloud | All rights reserved. 2

Agenda

Trends and Challenges

• Mobile, Cloud, Social

• No visibility, unknown risks

Cloud Visibility and DLP Steps

① Cloud application inventory

• Block risky clouds

② Cloud application consolidation

• Using cloud security risk scoring and intelligence

③ Compliance scanning and monitoring

• Proactive data discovery in sanctioned clouds

Solution Overview

About CipherCloud

© 2015 CipherCloud | All rights reserved. 3

Trends and

Challenges

© 2015 CipherCloud | All rights reserved. 4

IT must play catch-up with users and business lines “bring your own” trend

Seeing user activity across cloud applications

Measuring the risk profile of cloud applications

Understanding what factors make cloud applications risky

Converting user activity and cloud risk factors into actionable intelligence

Trends Transforming Enterprises

Mobile Cloud Social

90% use publicnetworks for work access

100+ cloud apps per enterprise

15+ passwords peremployee

Key concerns

50% of Users BYOD

67% LOB SanctionBYOA

75% of Users want to BYOI

© 2015 CipherCloud | All rights reserved. 6

Cloud Visibility and DLP

Approaches

© 2015 CipherCloud | All rights reserved. 7© 2015 CipherCloud | All rights reserved. 7

Step 1: Cloud Application Inventory

Challenge

• Easy for users to adopt multiple cloud applications

• IT can’t see who is doing what

What applications are used?

How many users access each app?

What is the level of activity?

• Maintain security of sensitive logs

• Block high risk clouds

• Aggregates log analysis across all locations and devices

Multiple log formats from multiple sources

Continuous and automated scheduling of log scans

• Logs files never leave enterprise

• Discovers all cloud applications

• Tracks relevant user and activity patterns

• Generate blocking scripts

CipherCloud Approach

© 2015 CipherCloud | All rights reserved. 8© 2015 CipherCloud | All rights reserved. 8

Step 2: Cloud Application Consolidation

Challenge

• Measure and compare cloud application risk

Across all cloud applications and application categories

Content sharing, collaboration, CRM, IT Infrastructure etc.

• Establish cloud security risk metrics suitable for your industry and governance policy

• Consolidate users onto low risk clouds

• Dashboards enables aggregate analysis

• Accurate risk scores for thousands of applications

• Transparent, standards aligned methodology

• Supports cloud app selection, consolidation

• Adjust risk weightings for specific risk factors across:

Security

Privacy

Environment

Compliance

CipherCloud Approach

© 2015 CipherCloud | All rights reserved. 9© 2015 CipherCloud | All rights reserved. 9

Step 3: Compliance Scanning and Monitoring

Challenge

• Limited visibility into data flows, sharing

• Policy violations

• No consistent monitoring of user activity

• Corporate Data Loss Prevention controls don’t address cloud data

• Preserve user experience

• One platform across apps for cloud DLP, UAM and anomaly detection

© 2015 CipherCloud | All rights reserved. 10© 2015 CipherCloud | All rights reserved. 10

CipherCloud Approach

• Proactive data discovery for multiple clouds

• Scanning for cloud data compliance violations

• Notify, Delete, Quarantine or Encrypt

• Granular visibility into all user activity

Tracking of all object types, users, IPs, files

• Integration with corporate Data Loss Prevention

• Flexible anomaly detection

Alerts on unusual behavior

Thresholds for downloads, logins, work hours and more

• Intuitive dashboards with easy drill-down

• Works seamlessly in background

© 2015 CipherCloud | All rights reserved. 11

Solution Overview

© 2015 CipherCloud | All rights reserved. 12

Cloud Storage and Collaboration –Highlights

Data loss prevention (DLP) tailored for file sharing platforms• Configurable DLP policy controls

• Flexible range of enforcement actions

• Integrates with enterprise DLP systems

Cloud Malware protection• Scan triggered on uploads, deletes infected files

Seamless integration• No impact on usability or features

• Scanning happens seamlessly in the background

• Works with all desktop & mobile clients

Real-time and on-demand scanning• Allows for easy on-boarding, or periodic

scanning of specific folders

Cloud Data Protection• Policy based encryption with customer managed keys

Detailed, granular reporting• Configurable dashboards

• Easy drill-down on users, content, and policy violations

© 2015 CipherCloud | All rights reserved. 13

CRM –Highlights

Proactive discovery of sensitive data• On-demand queries for any organization

• Understands all types of objects and data in CRM

Extends corporate policies to the cloud• Built-in scanning engine with advanced policies for

HIPAA/HITECH, GLBA, PCI, ABA, SWIFT, NDC codes

• Integrates with enterprise DLP systems including Symantec and RSA

Advanced controls with intuitive dashboards• Easy configuration of policies

• Comprehensive dashboard views of all scans

• Direct drill-down to violation sources in CRM

• Exportable data in multiple formats

© 2015 CipherCloud | All rights reserved. 14© 2015 CipherCloud | All rights reserved. 14

CipherCloud Platform ArchitectureCloud Discovery, Compliance Scanning and User Activity Monitoring

HTTPS

Enterprise Boundary

Detailed Usage Analytics -

Dashboards and Reports

Discover and Monitor

Unified Management and Visibility

ManagementReportingDashboards

Cloud Discovery(FW, Web Proxy)

User Activity Monitoring

Browser

CipherCloud Discovery, UAM and DLP Platform

Scalable, Big Data Infrastructure

Web Proxy

Mobile Users and

Devices

InternalUsers

Cloud Apps

CloudSource™Knowledge

Base

ComplianceScanning/DLP

Unified Policyand

Administration

Risk Profiling &Scoring

AnomalyDetection

Policy Enforcement

Measure, Detect and Enforce

CipherCloudRisk Intelligence Lab™

Opt. ExternalDLP (via ICAP)

© 2015 CipherCloud | All rights reserved. 15

How CipherCloud is Different

The only vendor to put it all together• Cloud Application and Data Discovery, Protection, DLP, Monitoring and

Anomaly Detection

Technology leader in cloud encryption and tokenization• Multiple patents including Searchable Strong Encryption

Seamless integration for major cloud applications• Transparent to users, preservers functionality

Market leader in an important new space• 100+ customers in banking, financial services, healthcare, pharma, hi-tech

• Far more customers than all other vendors – combined

© 2015 CipherCloud | All rights reserved. 16

सঘसळઑগथଏथఒਅਮ ਏইঋ ਏইঋਮદਮ सਅঋ ણयধતટਝઅस ଚଥগਹ ਇय

ਏইঋअਪरਙਮউਮ થઍमণଳअঋଆଡ. सਝयধતଥकઅ ਏইঋसਝఊર ଛઅগ

agencies are want to do, is remaining tight lipped about its efforts, but considering the far flung and CIA and its control operatives

Comprehensive Cloud Information Protection

PROTECT

© 2015 CipherCloud | All rights reserved. 17

500+ Employees

Company

3.0+ MillionActive Users

13 Industries

25 Countries

7 Languages

P 13 Patents

About CipherCloud

Solutions

Cloud Discovery

Cloud DLP

Strong Encryption

Tokenization

Activity Monitoring

Anomaly Detection

Customers

5 out of 10Top US Banks

3 out of 5Top Health Providers

Top 2 GlobalTelecomm Company

40% of GlobalMail Delivery

Largest USMedia Company

3 out of 5Top Pharmaceuticals

© 2015 CipherCloud | All rights reserved. 18

More Information

Watch this On-demand Webinar :

http://pages.ciphercloud.com/Webinar2015-02-05PracticalApproachestoCloudVisibilityandDataLossPrevention_OnDemand.html?Slideshare

For additional information :

• Website: www.ciphercloud.com

• Twitter: @ciphercloud

• Email: [email protected]

• LinkedIn: www.linkedin.com/company/ciphercloud

• Phone: +1 855-5CIPHER

David BermanCloud Discovery and DLP

[email protected]

Twitter: @berman_david

Cloud Adoption and Risk Report

2014 North American and European Trends


Recommended