SlideShare une entreprise Scribd logo
1  sur  10
Télécharger pour lire hors ligne
Data Loss Prevention
                 DLP System




Monitorium
Monitorium
•  Protects confidential information and documents from
   theft or accidental loss through internet transmission
•  Monitors and analyzes content of outgoing IP traffic
•  Detects and blocks security violating traffic
•  Can limit corporate network users’ access to Internet
   resources

•  Different and complimentary to firewall and antivirus:
   –  Protects “content”, not PC hardware or internal network
   –  Protects against internal threats
Network installation
System characteristics
•  Deep Packet Inspection (DPI) bases Level 7 network analysis
   system
•  Supported protocols: HTTP, FTP, TELNET, SMTP/POP/IMAP
•  Applications:
    –  Webmail (Yandex, Mail.ru, Gmail, Rambler)
    –  IM (ICQ, Jabber, gtalk, mail.ru agent)
•  File formats:
    –  txt, rtf, Microsoft Office (.doc, .xls, .docx, .xlsx), pdf, html,
       XML, ps, zip, gz, 7z, rar, tar, bzip
•  Content analysis: linguistic, regular expressions, dictionaries,
   fingerprints, keyword matching, window hashing, stat. analysis
•  Supported languages: Russian, English
Analyzed information

•  Message sender address: MAC / IP address
•  Message receiver address: IP address, hostname
•  Message headers:
    –  Page url (www address, domain/host name)
    –  email address
    –  ICQ user name
•  Message content:
    –  Search queries
    –  Blog, forum, social network posts
    –  Email texts
    –  IM chat texts
    –  Content of attached documents and archives
Interface: Event monitor
Security rules
Reports and statistics
Advantages of Trafica DLP system
•    Real time protection and alerts
•    Full content analysis
•    Multiple monitoring points
•    Easy network installation
•    Detailed reports engine
•    Full text incidents archive search
•    Designed to be used by non-technical staff
Trafica LLC
•    Founded 2008
•    Central office in Moscow
•    15 people
•    Email: info@trafica.ru

Contenu connexe

En vedette

ancestry-bigdatasummit-april2013
ancestry-bigdatasummit-april2013ancestry-bigdatasummit-april2013
ancestry-bigdatasummit-april2013
Leonid Zhukov
 
Social Networks: from Micromotives to Macrobehavior
Social Networks: from Micromotives to MacrobehaviorSocial Networks: from Micromotives to Macrobehavior
Social Networks: from Micromotives to Macrobehavior
Leonid Zhukov
 
Business of Big Data
Business of Big DataBusiness of Big Data
Business of Big Data
Leonid Zhukov
 
socialnetworkszhukov
socialnetworkszhukovsocialnetworkszhukov
socialnetworkszhukov
Leonid Zhukov
 

En vedette (13)

Революция Больших Данных
Революция Больших ДанныхРеволюция Больших Данных
Революция Больших Данных
 
Инфорамционные каскады
Инфорамционные каскадыИнфорамционные каскады
Инфорамционные каскады
 
Social Networks
Social NetworksSocial Networks
Social Networks
 
ancestry-bigdatasummit-april2013
ancestry-bigdatasummit-april2013ancestry-bigdatasummit-april2013
ancestry-bigdatasummit-april2013
 
Social Network Analysis
Social Network AnalysisSocial Network Analysis
Social Network Analysis
 
Data Scientists
 Data Scientists Data Scientists
Data Scientists
 
Большие Данные
Большие ДанныеБольшие Данные
Большие Данные
 
Social Networks: from Micromotives to Macrobehavior
Social Networks: from Micromotives to MacrobehaviorSocial Networks: from Micromotives to Macrobehavior
Social Networks: from Micromotives to Macrobehavior
 
Information cascades
Information cascadesInformation cascades
Information cascades
 
Business of Big Data
Business of Big DataBusiness of Big Data
Business of Big Data
 
Big Data at Ancestry.com
Big Data at Ancestry.comBig Data at Ancestry.com
Big Data at Ancestry.com
 
socialnetworkszhukov
socialnetworkszhukovsocialnetworkszhukov
socialnetworkszhukov
 
Numerical Linear Algebra for Data and Link Analysis.
Numerical Linear Algebra for Data and Link Analysis.Numerical Linear Algebra for Data and Link Analysis.
Numerical Linear Algebra for Data and Link Analysis.
 

Similaire à Monitorium DLP

CyberoamNGFWTechSheet
CyberoamNGFWTechSheetCyberoamNGFWTechSheet
CyberoamNGFWTechSheet
Maliha Ali
 
CyberoamNGFWTechSheet
CyberoamNGFWTechSheetCyberoamNGFWTechSheet
CyberoamNGFWTechSheet
Baqar kazmi
 
CyberoamNGFWTechSheet
CyberoamNGFWTechSheetCyberoamNGFWTechSheet
CyberoamNGFWTechSheet
Maliha Ali
 
CyberoamNGFWTechSheet
CyberoamNGFWTechSheetCyberoamNGFWTechSheet
CyberoamNGFWTechSheet
bakar kazmi
 
Jaime Blasco - Fighting Advanced Persistent Threat (APT) with Open Source Too...
Jaime Blasco - Fighting Advanced Persistent Threat (APT) with Open Source Too...Jaime Blasco - Fighting Advanced Persistent Threat (APT) with Open Source Too...
Jaime Blasco - Fighting Advanced Persistent Threat (APT) with Open Source Too...
RootedCON
 

Similaire à Monitorium DLP (20)

Cyberscout Corporate Security
Cyberscout   Corporate SecurityCyberscout   Corporate Security
Cyberscout Corporate Security
 
Cs Wif I System Overview 2009
Cs Wif I System Overview 2009Cs Wif I System Overview 2009
Cs Wif I System Overview 2009
 
UTM Cyberoam
UTM Cyberoam UTM Cyberoam
UTM Cyberoam
 
Network Situational Awareness with d00gle
Network Situational Awareness with d00gleNetwork Situational Awareness with d00gle
Network Situational Awareness with d00gle
 
CyberoamNGFWTechSheet
CyberoamNGFWTechSheetCyberoamNGFWTechSheet
CyberoamNGFWTechSheet
 
CyberoamNGFWTechSheet
CyberoamNGFWTechSheetCyberoamNGFWTechSheet
CyberoamNGFWTechSheet
 
CyberoamNGFWTechSheet
CyberoamNGFWTechSheetCyberoamNGFWTechSheet
CyberoamNGFWTechSheet
 
CyberoamNGFWTechSheet
CyberoamNGFWTechSheetCyberoamNGFWTechSheet
CyberoamNGFWTechSheet
 
CyberoamNGFWTechSheet
CyberoamNGFWTechSheetCyberoamNGFWTechSheet
CyberoamNGFWTechSheet
 
Jaime Blasco - Fighting Advanced Persistent Threat (APT) with Open Source Too...
Jaime Blasco - Fighting Advanced Persistent Threat (APT) with Open Source Too...Jaime Blasco - Fighting Advanced Persistent Threat (APT) with Open Source Too...
Jaime Blasco - Fighting Advanced Persistent Threat (APT) with Open Source Too...
 
Internet .ppt
Internet .pptInternet .ppt
Internet .ppt
 
An Introduction To World Wide Web
An Introduction To World Wide WebAn Introduction To World Wide Web
An Introduction To World Wide Web
 
Continuous Automated Red Teaming (CART) - Bikash Barai
Continuous Automated Red Teaming (CART) - Bikash BaraiContinuous Automated Red Teaming (CART) - Bikash Barai
Continuous Automated Red Teaming (CART) - Bikash Barai
 
Fs Ch 19
Fs Ch 19Fs Ch 19
Fs Ch 19
 
Fs Ch 19
Fs Ch 19Fs Ch 19
Fs Ch 19
 
Security chapter6
Security chapter6Security chapter6
Security chapter6
 
Presentation1
Presentation1Presentation1
Presentation1
 
Cryto Party at CCU
Cryto Party at CCUCryto Party at CCU
Cryto Party at CCU
 
Privacy on the Internet - Init6 InfoSec August Meeting
Privacy on the Internet - Init6 InfoSec August MeetingPrivacy on the Internet - Init6 InfoSec August Meeting
Privacy on the Internet - Init6 InfoSec August Meeting
 
Agata overview
Agata overviewAgata overview
Agata overview
 

Dernier

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Dernier (20)

Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 

Monitorium DLP

  • 1. Data Loss Prevention DLP System Monitorium
  • 2. Monitorium •  Protects confidential information and documents from theft or accidental loss through internet transmission •  Monitors and analyzes content of outgoing IP traffic •  Detects and blocks security violating traffic •  Can limit corporate network users’ access to Internet resources •  Different and complimentary to firewall and antivirus: –  Protects “content”, not PC hardware or internal network –  Protects against internal threats
  • 4. System characteristics •  Deep Packet Inspection (DPI) bases Level 7 network analysis system •  Supported protocols: HTTP, FTP, TELNET, SMTP/POP/IMAP •  Applications: –  Webmail (Yandex, Mail.ru, Gmail, Rambler) –  IM (ICQ, Jabber, gtalk, mail.ru agent) •  File formats: –  txt, rtf, Microsoft Office (.doc, .xls, .docx, .xlsx), pdf, html, XML, ps, zip, gz, 7z, rar, tar, bzip •  Content analysis: linguistic, regular expressions, dictionaries, fingerprints, keyword matching, window hashing, stat. analysis •  Supported languages: Russian, English
  • 5. Analyzed information •  Message sender address: MAC / IP address •  Message receiver address: IP address, hostname •  Message headers: –  Page url (www address, domain/host name) –  email address –  ICQ user name •  Message content: –  Search queries –  Blog, forum, social network posts –  Email texts –  IM chat texts –  Content of attached documents and archives
  • 9. Advantages of Trafica DLP system •  Real time protection and alerts •  Full content analysis •  Multiple monitoring points •  Easy network installation •  Detailed reports engine •  Full text incidents archive search •  Designed to be used by non-technical staff
  • 10. Trafica LLC •  Founded 2008 •  Central office in Moscow •  15 people •  Email: info@trafica.ru