19
Copyright © 2016 Forcepoint. All rights reserved. Analýza chování uživatelů Víte, kteří interní uživatelé představují bezpečnostní riziko pro vaše data a proč? Vladimír Špička Miroslav Bajgar Account Manager Sales Engineer FORCEPOINT FORCEPOINT

Forcepoint - Analýza chování uživatelů

Embed Size (px)

Citation preview

Page 1: Forcepoint - Analýza chování uživatelů

Copyright © 2016 Forcepoint. All rights reserved.

Analýza chování uživatelů

Víte, kteří interní uživatelé představují

bezpečnostní riziko pro vaše data a proč?

Vladimír Špička Miroslav Bajgar Account Manager Sales Engineer

FORCEPOINT FORCEPOINT

Page 2: Forcepoint - Analýza chování uživatelů

Copyright © 2016 Forcepoint. All rights reserved. | 2

PROTECTING WHAT’S

MOST IMPORTANT TO YOU

• Safeguarding users, data and networks

• Against insider threats & advanced attacks –

in the cloud, on the road, in the office

• Beyond simplifying compliance:

enabling better decision-making

to streamline security and business

Page 3: Forcepoint - Analýza chování uživatelů

Copyright © 2016 Forcepoint. All rights reserved. | 3

Commercial

Agility with

Content Security & DLP

Cloud / On-Premise / Hybrid

Pioneer on

Cyber Frontlines with

Financial Resources

Deep Understanding of Threat Detection

Networking

Innovator with

Advanced Evasion Prevention

Security at Scale

UNIQUE NEW COMPANY, OFFERING A NEW APPROACH

Page 4: Forcepoint - Analýza chování uživatelů

Copyright © 2016 Forcepoint. All rights reserved. | 4

Headquarters, Austin, TX

Engineering & Operations

Cloud Data Center

Sales & Support

>20,000 customers

155 countries

2,200 employees

44 offices

4,000 partners

380 patents &

patent applications

20 Data Centers

Security Labs (zero day, APT)

AMERICAS EMEA APAC

FOLLOW

THE SUN

SUPPORT

GLOBAL SCALE TO SUPPORT YOU

Page 5: Forcepoint - Analýza chování uživatelů

Copyright © 2016 Forcepoint. All rights reserved. | 5

A UNIFIED PLATFORM FOR SECURITY SOLUTIONS

Web & Email Security with advanced threat protection

Insider Threat Detection & DLP with automated user behavior monitoring

Security for Office 365

Shadow IT Discovery

Threat Protection for Linux Cloud App Farms

Next-Generation Firewalls for highly distributed organizations

THREATSEEKER INTELLIGENCE CLOUD

Page 6: Forcepoint - Analýza chování uživatelů

Copyright © 2016 Forcepoint. All rights reserved. | 6

A UNIFIED PLATFORM FOR SECURITY SOLUTIONS

Web & Email Security with advanced threat protection

Insider Threat Detection & DLP with automated user behavior monitoring

Security for Office 365

Shadow IT Discovery

Threat Protection for Linux Cloud App Farms

Next-Generation Firewalls for highly distributed organizations

THREATSEEKER INTELLIGENCE CLOUD

Page 7: Forcepoint - Analýza chování uživatelů

Copyright © 2016 Forcepoint. All rights reserved.

SureView® Insider Threat

Miroslav Bajgar

Page 8: Forcepoint - Analýza chování uživatelů

Worldwide Sales Conference 2016, Proprietary & Confidential | 8

INSIDER THREAT AND DATA – WHY SHOULD YOU CARE

• Leader in Insider Threat

• Leader in DLP

• Created a new Market

Monitor Data Human Behavior + Complete Data

Protection

Page 9: Forcepoint - Analýza chování uživatelů

Copyright © 2016 Forcepoint. All rights reserved. | 9

INSIDER THREAT MARKET LEADER

Proven effective, scalable & stable

Trusted

Supported

Every challenge met

Retail Manufacturing Energy Financial Government

US Government & Fortune 500 customers

Developed by information protection experts

Designed from the ground up

as an insider threat solution

Over 1 Million endpoints protected

Page 10: Forcepoint - Analýza chování uživatelů

Copyright © 2016 Forcepoint. All rights reserved. | 10

VISIBILITY IS AT THE CRUX OF THE ISSUE

The digital revolution has obfuscated visibility

Organizations cannot manage threats they cannot see

Industrial Age Digital Age

Restoring Visibility

TECHNOLOGY

VISIBILITY

Need technology that collects & analyzes, pinpoints

riskiest users restoring visibility into risky behaviors

Page 11: Forcepoint - Analýza chování uživatelů

Worldwide Sales Conference 2016, Proprietary & Confidential | 11

Ah-Mr. Snowden

CYBER THREATS INDICATORS

Abnormal after hours access by a

contractor in Hawaii

Huge transfers of data to USB Abnormal account usage across 20-

25 peer accounts all linked to

Snowden’s IP address

Abnormal Administrator account

activity

Unusual lateral movement on the

network

Page 12: Forcepoint - Analýza chování uživatelů

Copyright © 2016 Forcepoint. All rights reserved. | 12

SUREVIEW INSIDER THREAT ARCHITECTURE

Application

General

Clipboard Email File Keyboard Logon Printer Process System Info Video Web Web URL Webmail

(Gmail, Yahoo,

Outlook)

Page 13: Forcepoint - Analýza chování uživatelů

Copyright © 2016 Forcepoint. All rights reserved. | 13

SUREVIEW INSIDER THREAT COMMAND CENTER

Organization 30 Day Risks

Top Daily Risks

Top Riskiest People

Page 14: Forcepoint - Analýza chování uživatelů

Copyright © 2016 Forcepoint. All rights reserved. | 14

COMMAND CENTER

30 Day History

Risk Score Activities

Filters

Activities

Page 15: Forcepoint - Analýza chování uživatelů

Copyright © 2016 Forcepoint. All rights reserved. | 15

VIDEO REPLAY

Page 16: Forcepoint - Analýza chování uživatelů

Copyright © 2016 Forcepoint. All rights reserved. | 16

KEY PROBLEMS SUREVIEW INSIDER THREAT SOLVES

Page 17: Forcepoint - Analýza chování uživatelů

Copyright © 2016 Forcepoint. All rights reserved. | 17

Worldwide Sales Conference 2016, Proprietary & Confidential | 17

SureView® Insider Threat

DLP finds

risky data

behavior

DLP

restricts

user

actions

DLP

alerts

SureView

Insider

Threat

SureVIew

Insider

Threat

verifies

insider

COMPLETE

DATA

PROTECTION

Data Loss Monitoring & Protection (DLP)

Breach is

contained

before

damage is

done

INSIDER THREAT + AP-DATA

Page 18: Forcepoint - Analýza chování uživatelů

Copyright © 2016 Forcepoint. All rights reserved. | 18

Worldwide Sales Conference 2016, Proprietary & Confidential | 18

Establish a baseline of typical user behavior

Identify potentially anomalous behaviors

User-based behavioral models

DLP Data Monitoring and Protection Data classification

Data exfiltration controls across IT infrastructure

Incident-based behavioral model

Monitor and protect IP and PII everywhere

Insider Threat Behavioral Audit

Insider Threat Focused Investigation

Comprehensive, chronicled collection from multiple data sources

including AP-DATA

All the details, insight and complete context of user actions

Video replay of user activity

Detect and deter insider threats

INSIDER THREAT + AP-DATA

Page 19: Forcepoint - Analýza chování uživatelů

Copyright © 2016 Forcepoint. All rights reserved. | 19 Copyright © 2016 Forcepoint. All rights reserved. | 19

Děkujeme za pozornost.