View
803
Download
1
Category
Tags:
Preview:
DESCRIPTION
Citation preview
Information & Identity Protection Overview 1
Information & Identity Protection
Data Loss Prevention, Encryption, User Authentication
Agenda
2
People and Information-Centric Security1
Symantec’s Information & Identity Protection Suite2
Next Steps3
Information & Identity Protection Overview
Data Breaches are Top of Mind
3Information & Identity Protection Overview
Evolving to Information-Centric Security
Information & Identity Protection Overview 4
• Collaborative apps and social media
• Information explosion• Virtual infrastructure and cloud• Mobile workforce
• WikiLeaks• Hacker Collectives• LulzSec• Anonymous• State-sponsored, targeted attacks
NEW BUSINESS TRENDS NEW THREATS
Information-Centric
People & Information-Centric
System-Centric
As companies focus on securing their data, security professionals increasingly recognize that access control and information management are key components of data security. Proper management and control of user accounts, access permissions, and privileges is one of the most effective avenues to ensuring that data doesn’t walk out the door. Often, you must demonstrate controls around segregation of duties, privileged access, and stronger authentication for Internet-facing applications to meet regulatory requirements.
Khalid Kark
CISO Advisor, Forrester
5Information & Identity Protection Overview
• How to enforce data policies?• How to prevent breach?PROTECTION
AWARENESS
Key Components of Information-Centric Security
IDENTITY
6
• Where is the sensitive data?• How is it being used?
• Who should have access to sensitive data?
Information & Identity Protection Overview
Reducing Risk with Information and Identity Protection
AWARENESSIDENTITY PROTECTION
RISK
DLPAuthentication Encryption
Passwords
Heuristics
Two Factor
Biometric
Network
Endpoint
Storage
+
+
Endpoint
Storage
+
+
7Information & Identity Protection Overview
IDENTITY
• How to enforce data policies?• How to prevent breach?
PROTECTION
AWARENESS
Information & Identity Protection Solution Portfolio Map
8
• Where is the sensitive data?• How is it being used?
• Who should have access to that data?
Endpoint DLPNetwork DLPStorage DLP
Shared Storage Encryption
Endpoint Encryption
Email Encryption
Information & Identity Protection Overview
User Authentication
Behavior Two-Factor PKI
Information & Identity Protection Overview 9
Information & Identity Protection Solutions
Symantec User Authentication Products
10
Symantec™ Management Platform
Risk-Based
• Machine and configuration registered
• Risk score determined by machine, access pattern
Tokens & Mobile Certificate
• Cloud based infrastructure
• Certificates for devices and people
• Multiple form factors
• Over 700 handsets supported
Symantec™ VIP/PKI Authentication Services
Information & Identity Protection Overview
Symantec Encryption Products
11
Storage
• PGP™ NetShare Encryption
• PGP™ Command Line Encryption
Endpoint Email
PGP™ Universal Server
Information & Identity Protection Overview
Symantec™ Management Platform
• PGP™ Whole Disk Encryption
• Symantec Endpoint Encryption™ Removable Storage
• PGP™ Gateway Email Encryption
• PGP™ BlackBerry/iOS Encryption
• PGP™ Desktop Email Encryption
Symantec Data Loss Prevention Products
12
Symantec™ Data Loss Prevention Enforce Platform
Information & Identity Protection Overview
Symantec™ Management Platform
Storage• Symantec™
Data Loss Prevention Network Discover
• Symantec™ Data Loss Prevention Data Insight
• Symantec™ Data Loss Prevention Network Protect
Endpoint Network• Symantec™
Data Loss Prevention Endpoint Discover
• Symantec™ Data Loss Prevention Endpoint Prevent
• Symantec™ Data Loss Prevention Network Monitor
• Symantec™ Data Loss Prevention Network Prevent
Defense-In-Depth: Encryption + Data Loss Prevention
13
Information & Identity Protection Overview
Protects data across laptops, mobile devices,
servers, and email communications
Identifies sensitive information requiring
protection across endpoints, network, and
storage
Strong authentication for people and their
devices
The Symantec Advantage
Integrated Encryption Broad DLP Flexible User
Authentication
Information & Identity Protection Overview 14
Thank you!
Copyright © 2011 Symantec Corporation. All rights reserved. Symantec and the Symantec Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners.
This document is provided for informational purposes only and is not intended as advertising. All warranties relating to the information in this document, either express or implied, are disclaimed to the maximum extent allowed by law. The information in this document is subject to change without notice.
Thank you!
Information & Identity Protection Overview 15
For more information, download:Whitepaper: Data Protection Strategies
Recommended