Top Banner
Customer Spotlight: Deploying a Data Protection Program in less than 120 Days Michael Ring, Jabil Mark Stevens, Digital Guardian
27

Customer Spotlight:Deploying a Data Protection Program in less than 120 Days

Jul 18, 2015

Download

Technology

Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Customer Spotlight:Deploying a Data Protection Program in less than 120 Days

Customer Spotlight:Deploying a Data Protection Program in less than 120 DaysMichael Ring, JabilMark Stevens, Digital Guardian

Page 2: Customer Spotlight:Deploying a Data Protection Program in less than 120 Days

Agenda

Introduction

Deploying a Data Protection Program in < 120 Days

• Mike Ring, Jabil

Digital Guardian Overview

• Mark Stevens, Digital Guardian

Live Q&A with Mike and Mark

Page 3: Customer Spotlight:Deploying a Data Protection Program in less than 120 Days

About Mike Ring

Senior IT Manager, Threat and

Solution Architect

15 years’ experience in InfoSec

Page 4: Customer Spotlight:Deploying a Data Protection Program in less than 120 Days

Jabil

Global manufacturing services company 180,000+ employees 90 plants in 23 countries $17.2B revenue in 2013

Proven Manufacturing SolutionsGlobal Expertise. Intelligent Supply Chain Design.

Page 5: Customer Spotlight:Deploying a Data Protection Program in less than 120 Days

Jabil’s Security Situation

Data protection was in catch up mode

Lacked basic processes

“IP could be anything”

Security could be a competitive advantage

Page 6: Customer Spotlight:Deploying a Data Protection Program in less than 120 Days

Jabil’s IT Environment

Cloud-based IT environment since 2010

No standardization

Had budget but not headcount to accelerate

security maturity

Page 7: Customer Spotlight:Deploying a Data Protection Program in less than 120 Days

Security Objectives

52,000 devices at one level of security, needed to get to higher level

Protect:• IP: Jabil’s and customers’• Pricing data• Employee data

Quickly build a program focused on agility and collaboration

Page 8: Customer Spotlight:Deploying a Data Protection Program in less than 120 Days

Jabil’s Solution

Three key security technologies

• Web Proxy• Single Sign-on• Data Protection

Had to be 100% managed service

Web

ProxySSO

Data Protection

Page 9: Customer Spotlight:Deploying a Data Protection Program in less than 120 Days

Why DG Managed Security Program

InfoSec can govern, not administer

Unique context-awareness

Capabilities beyond just DLP

Very fast ramp

Time to value

Page 10: Customer Spotlight:Deploying a Data Protection Program in less than 120 Days

Getting the CIO on Board

Prior successful rapid deployments

Application usage collection was major value-add

Able to reconcile license usage and reduce costs

Page 11: Customer Spotlight:Deploying a Data Protection Program in less than 120 Days

Implementing Digital Guardian

3,000 agents deployed in dev environment

49,000 agents deployed next

May June July August

Initial

Engagement

3,000Agents Deployed

in Development

49,000Agents Deployed

in Monitor Mode

Fast Forward Framework

Page 12: Customer Spotlight:Deploying a Data Protection Program in less than 120 Days

Results

Gained immediate visibility into all data access and usage

Saw data getting copied to USB drives

Used egress reports to drive adoption

Page 13: Customer Spotlight:Deploying a Data Protection Program in less than 120 Days

What’s Next?

Using visibility to drive classification and policy making

Transition to operational plan

Roll out DG controls to mitigate top data risks

DG for advanced threat detection and forensic analysis

Page 14: Customer Spotlight:Deploying a Data Protection Program in less than 120 Days

About Mark Stevens

VP, Global Services & Support

Driving customer success

20 year tech industry veteran• IBM, BMC, Progress, Lotus

Page 15: Customer Spotlight:Deploying a Data Protection Program in less than 120 Days

Data-Centric Security Recap

“In this new reality, traditional perimeter-based approaches to security are insufficient. S&R pros must take a data-centric approach that ensures security travels with the data regardless of user population, location, or even hosting model.”

The Future Of Data Security: A Zero Trust Approach

John Kindervag, Heidi Shey, and Kelley Mak, June 5, 2014

Confidential 14

Page 16: Customer Spotlight:Deploying a Data Protection Program in less than 120 Days

Data Security That Starts at the Source

15

Page 17: Customer Spotlight:Deploying a Data Protection Program in less than 120 Days

Patented, Proven Endpoint Agent

16

Page 18: Customer Spotlight:Deploying a Data Protection Program in less than 120 Days

Automatic Sensitive Data Classification

17

Page 19: Customer Spotlight:Deploying a Data Protection Program in less than 120 Days

STOP Data Theft From Insiders and Outsiders

18

Page 20: Customer Spotlight:Deploying a Data Protection Program in less than 120 Days

Protect Your Data From Insider Threats

Confidential 19

Page 21: Customer Spotlight:Deploying a Data Protection Program in less than 120 Days

Protect Your Data for the Best Defense from Outsider Threats

Confidential 20

Page 22: Customer Spotlight:Deploying a Data Protection Program in less than 120 Days

Flexible Deployment Models

Confidential 21

Infrastructure hosted in your

environment

Self-administration

Policies, rules and reports

managed by you

Engage with Digital Guardian

Pro Services as needed

Infrastructure hosted in Digital

Guardian private cloud

Administered by Digital

Guardian Pro Services

Access to policies, rules, and

reports

Weekly status meetings

Infrastructure hosted in your

environment

Administered remotely by

Digital Guardian Pro Services

Data remains within your IT

environment

Option 1

On PremiseOption 2

Managed ServiceOption 3

HybridManaged Service On Premise

“By selecting the managed service deployment option, we were able to be up and running in a matter of weeks. The

added visibility into how our confidential data is being used is invaluable.”

CISO, Regional Bank

Page 23: Customer Spotlight:Deploying a Data Protection Program in less than 120 Days

22

Page 24: Customer Spotlight:Deploying a Data Protection Program in less than 120 Days

23

Page 25: Customer Spotlight:Deploying a Data Protection Program in less than 120 Days

24

Page 26: Customer Spotlight:Deploying a Data Protection Program in less than 120 Days

Questions?