Upload
marketingarrowecscz
View
215
Download
0
Embed Size (px)
Citation preview
Copyright © 2016 Forcepoint. All rights reserved.
Analýza chování uživatelů
Víte, kteří interní uživatelé představují
bezpečnostní riziko pro vaše data a proč?
Vladimír Špička Miroslav Bajgar Account Manager Sales Engineer
FORCEPOINT FORCEPOINT
Copyright © 2016 Forcepoint. All rights reserved. | 2
PROTECTING WHAT’S
MOST IMPORTANT TO YOU
• Safeguarding users, data and networks
• Against insider threats & advanced attacks –
in the cloud, on the road, in the office
• Beyond simplifying compliance:
enabling better decision-making
to streamline security and business
Copyright © 2016 Forcepoint. All rights reserved. | 3
Commercial
Agility with
Content Security & DLP
Cloud / On-Premise / Hybrid
Pioneer on
Cyber Frontlines with
Financial Resources
Deep Understanding of Threat Detection
Networking
Innovator with
Advanced Evasion Prevention
Security at Scale
UNIQUE NEW COMPANY, OFFERING A NEW APPROACH
Copyright © 2016 Forcepoint. All rights reserved. | 4
Headquarters, Austin, TX
Engineering & Operations
Cloud Data Center
Sales & Support
>20,000 customers
155 countries
2,200 employees
44 offices
4,000 partners
380 patents &
patent applications
20 Data Centers
Security Labs (zero day, APT)
AMERICAS EMEA APAC
FOLLOW
THE SUN
SUPPORT
GLOBAL SCALE TO SUPPORT YOU
Copyright © 2016 Forcepoint. All rights reserved. | 5
A UNIFIED PLATFORM FOR SECURITY SOLUTIONS
Web & Email Security with advanced threat protection
Insider Threat Detection & DLP with automated user behavior monitoring
Security for Office 365
Shadow IT Discovery
Threat Protection for Linux Cloud App Farms
Next-Generation Firewalls for highly distributed organizations
THREATSEEKER INTELLIGENCE CLOUD
Copyright © 2016 Forcepoint. All rights reserved. | 6
A UNIFIED PLATFORM FOR SECURITY SOLUTIONS
Web & Email Security with advanced threat protection
Insider Threat Detection & DLP with automated user behavior monitoring
Security for Office 365
Shadow IT Discovery
Threat Protection for Linux Cloud App Farms
Next-Generation Firewalls for highly distributed organizations
THREATSEEKER INTELLIGENCE CLOUD
Copyright © 2016 Forcepoint. All rights reserved.
SureView® Insider Threat
Miroslav Bajgar
Worldwide Sales Conference 2016, Proprietary & Confidential | 8
INSIDER THREAT AND DATA – WHY SHOULD YOU CARE
• Leader in Insider Threat
• Leader in DLP
• Created a new Market
Monitor Data Human Behavior + Complete Data
Protection
Copyright © 2016 Forcepoint. All rights reserved. | 9
INSIDER THREAT MARKET LEADER
Proven effective, scalable & stable
Trusted
Supported
Every challenge met
Retail Manufacturing Energy Financial Government
US Government & Fortune 500 customers
Developed by information protection experts
Designed from the ground up
as an insider threat solution
Over 1 Million endpoints protected
Copyright © 2016 Forcepoint. All rights reserved. | 10
VISIBILITY IS AT THE CRUX OF THE ISSUE
The digital revolution has obfuscated visibility
Organizations cannot manage threats they cannot see
Industrial Age Digital Age
Restoring Visibility
TECHNOLOGY
VISIBILITY
Need technology that collects & analyzes, pinpoints
riskiest users restoring visibility into risky behaviors
Worldwide Sales Conference 2016, Proprietary & Confidential | 11
Ah-Mr. Snowden
CYBER THREATS INDICATORS
Abnormal after hours access by a
contractor in Hawaii
Huge transfers of data to USB Abnormal account usage across 20-
25 peer accounts all linked to
Snowden’s IP address
Abnormal Administrator account
activity
Unusual lateral movement on the
network
Copyright © 2016 Forcepoint. All rights reserved. | 12
SUREVIEW INSIDER THREAT ARCHITECTURE
Application
General
Clipboard Email File Keyboard Logon Printer Process System Info Video Web Web URL Webmail
(Gmail, Yahoo,
Outlook)
Copyright © 2016 Forcepoint. All rights reserved. | 13
SUREVIEW INSIDER THREAT COMMAND CENTER
Organization 30 Day Risks
Top Daily Risks
Top Riskiest People
Copyright © 2016 Forcepoint. All rights reserved. | 14
COMMAND CENTER
30 Day History
Risk Score Activities
Filters
Activities
Copyright © 2016 Forcepoint. All rights reserved. | 15
VIDEO REPLAY
Copyright © 2016 Forcepoint. All rights reserved. | 16
KEY PROBLEMS SUREVIEW INSIDER THREAT SOLVES
Copyright © 2016 Forcepoint. All rights reserved. | 17
Worldwide Sales Conference 2016, Proprietary & Confidential | 17
SureView® Insider Threat
DLP finds
risky data
behavior
DLP
restricts
user
actions
DLP
alerts
SureView
Insider
Threat
SureVIew
Insider
Threat
verifies
insider
COMPLETE
DATA
PROTECTION
Data Loss Monitoring & Protection (DLP)
Breach is
contained
before
damage is
done
INSIDER THREAT + AP-DATA
Copyright © 2016 Forcepoint. All rights reserved. | 18
Worldwide Sales Conference 2016, Proprietary & Confidential | 18
Establish a baseline of typical user behavior
Identify potentially anomalous behaviors
User-based behavioral models
DLP Data Monitoring and Protection Data classification
Data exfiltration controls across IT infrastructure
Incident-based behavioral model
Monitor and protect IP and PII everywhere
Insider Threat Behavioral Audit
Insider Threat Focused Investigation
Comprehensive, chronicled collection from multiple data sources
including AP-DATA
All the details, insight and complete context of user actions
Video replay of user activity
Detect and deter insider threats
INSIDER THREAT + AP-DATA
Copyright © 2016 Forcepoint. All rights reserved. | 19 Copyright © 2016 Forcepoint. All rights reserved. | 19
Děkujeme za pozornost.