Top Banner
Information & Identity Protection Overview 1 Information & Identity Protection Data Loss Prevention, Encryption, User Authentication
15

Information and Identity Protection - Data Loss Prevention, Encryption, User Authentication

Nov 02, 2014

Download

Technology

Symantec APJ

 
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Information and Identity Protection - Data Loss Prevention, Encryption, User Authentication

Information & Identity Protection Overview 1

Information & Identity Protection

Data Loss Prevention, Encryption, User Authentication

Page 2: Information and Identity Protection - Data Loss Prevention, Encryption, User Authentication

Agenda

2

People and Information-Centric Security1

Symantec’s Information & Identity Protection Suite2

Next Steps3

Information & Identity Protection Overview

Page 3: Information and Identity Protection - Data Loss Prevention, Encryption, User Authentication

Data Breaches are Top of Mind

3Information & Identity Protection Overview

Page 4: Information and Identity Protection - Data Loss Prevention, Encryption, User Authentication

Evolving to Information-Centric Security

Information & Identity Protection Overview 4

• Collaborative apps and social media

• Information explosion• Virtual infrastructure and cloud• Mobile workforce

• WikiLeaks• Hacker Collectives• LulzSec• Anonymous• State-sponsored, targeted attacks

NEW BUSINESS TRENDS NEW THREATS

Information-Centric

People & Information-Centric

System-Centric

Page 5: Information and Identity Protection - Data Loss Prevention, Encryption, User Authentication

As companies focus on securing their data, security professionals increasingly recognize that access control and information management are key components of data security. Proper management and control of user accounts, access permissions, and privileges is one of the most effective avenues to ensuring that data doesn’t walk out the door. Often, you must demonstrate controls around segregation of duties, privileged access, and stronger authentication for Internet-facing applications to meet regulatory requirements.

Khalid Kark

CISO Advisor, Forrester

5Information & Identity Protection Overview

Page 6: Information and Identity Protection - Data Loss Prevention, Encryption, User Authentication

• How to enforce data policies?• How to prevent breach?PROTECTION

AWARENESS

Key Components of Information-Centric Security

IDENTITY

6

• Where is the sensitive data?• How is it being used?

• Who should have access to sensitive data?

Information & Identity Protection Overview

Page 7: Information and Identity Protection - Data Loss Prevention, Encryption, User Authentication

Reducing Risk with Information and Identity Protection

AWARENESSIDENTITY PROTECTION

RISK

DLPAuthentication Encryption

Passwords

Heuristics

Two Factor

Biometric

Network

Endpoint

Storage

+

+

Email

Endpoint

Storage

+

+

7Information & Identity Protection Overview

Page 8: Information and Identity Protection - Data Loss Prevention, Encryption, User Authentication

IDENTITY

• How to enforce data policies?• How to prevent breach?

PROTECTION

AWARENESS

Information & Identity Protection Solution Portfolio Map

8

• Where is the sensitive data?• How is it being used?

• Who should have access to that data?

Endpoint DLPNetwork DLPStorage DLP

Shared Storage Encryption

Endpoint Encryption

Email Encryption

Information & Identity Protection Overview

User Authentication

Behavior Two-Factor PKI

Page 9: Information and Identity Protection - Data Loss Prevention, Encryption, User Authentication

Information & Identity Protection Overview 9

Information & Identity Protection Solutions

Page 10: Information and Identity Protection - Data Loss Prevention, Encryption, User Authentication

Symantec User Authentication Products

10

Symantec™ Management Platform

Risk-Based

• Machine and configuration registered

• Risk score determined by machine, access pattern

Tokens & Mobile Certificate

• Cloud based infrastructure

• Certificates for devices and people

• Multiple form factors

• Over 700 handsets supported

Symantec™ VIP/PKI Authentication Services

Information & Identity Protection Overview

Page 11: Information and Identity Protection - Data Loss Prevention, Encryption, User Authentication

Symantec Encryption Products

11

Storage

• PGP™ NetShare Encryption

• PGP™ Command Line Encryption

Endpoint Email

PGP™ Universal Server

Information & Identity Protection Overview

Symantec™ Management Platform

• PGP™ Whole Disk Encryption

• Symantec Endpoint Encryption™ Removable Storage

• PGP™ Gateway Email Encryption

• PGP™ BlackBerry/iOS Encryption

• PGP™ Desktop Email Encryption

Page 12: Information and Identity Protection - Data Loss Prevention, Encryption, User Authentication

Symantec Data Loss Prevention Products

12

Symantec™ Data Loss Prevention Enforce Platform

Information & Identity Protection Overview

Symantec™ Management Platform

Storage• Symantec™

Data Loss Prevention Network Discover

• Symantec™ Data Loss Prevention Data Insight

• Symantec™ Data Loss Prevention Network Protect

Endpoint Network• Symantec™

Data Loss Prevention Endpoint Discover

• Symantec™ Data Loss Prevention Endpoint Prevent

• Symantec™ Data Loss Prevention Network Monitor

• Symantec™ Data Loss Prevention Network Prevent

Page 13: Information and Identity Protection - Data Loss Prevention, Encryption, User Authentication

Defense-In-Depth: Encryption + Data Loss Prevention

13

Information & Identity Protection Overview

Page 14: Information and Identity Protection - Data Loss Prevention, Encryption, User Authentication

Protects data across laptops, mobile devices,

servers, and email communications

Identifies sensitive information requiring

protection across endpoints, network, and

storage

Strong authentication for people and their

devices

The Symantec Advantage

Integrated Encryption Broad DLP Flexible User

Authentication

Information & Identity Protection Overview 14

Page 15: Information and Identity Protection - Data Loss Prevention, Encryption, User Authentication

Thank you!

Copyright © 2011 Symantec Corporation. All rights reserved. Symantec and the Symantec Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners.

This document is provided for informational purposes only and is not intended as advertising. All warranties relating to the information in this document, either express or implied, are disclaimed to the maximum extent allowed by law. The information in this document is subject to change without notice.

Thank you!

Information & Identity Protection Overview 15

For more information, download:Whitepaper: Data Protection Strategies