Despite a limited budget, Jabil's small security team was under pressure from Senior Management to mature their security program - FAST! Michael Ring, IT Security Architect at Jabil shares how they deployed their solution to over 40,000 users in less than 120 days.
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Customer Spotlight:Deploying a Data Protection Program in less than 120 Days
1. Customer Spotlight:
Deploying a Data Protection Program
in less than 120 Days
Michael Ring, Jabil
Mark Stevens, Digital Guardian
2. Agenda
Introduction
Deploying a Data Protection Program in < 120 Days
• Mike Ring, Jabil
Digital Guardian Overview
• Mark Stevens, Digital Guardian
Live Q&A with Mike and Mark
3. About Mike Ring
Senior IT Manager, Threat and
Solution Architect
15 years’ experience in InfoSec
4. Jabil
Global manufacturing services company
180,000+ employees
90 plants in 23 countries
$17.2B revenue in 2013
Proven Manufacturing Solutions
Global Expertise. Intelligent Supply Chain Design.
5. Jabil’s Security Situation
Data protection was in catch up mode
Lacked basic processes
“IP could be anything”
Security could be a competitive advantage
6. Jabil’s IT Environment
Cloud-based IT environment since 2010
No standardization
Had budget but not headcount to accelerate
security maturity
7. Security Objectives
52,000 devices at one level of security,
needed to get to higher level
Protect:
• IP: Jabil’s and customers’
• Pricing data
• Employee data
Quickly build a program focused on agility
and collaboration
8. Jabil’s Solution
Three key security technologies
• Web Proxy
• Single Sign-on
• Data Protection
Had to be 100% managed service
Web
Proxy
SSO
Data Protection
9. Why DG Managed Security Program
InfoSec can govern, not administer
Unique context-awareness
Capabilities beyond just DLP
Very fast ramp
Time to value
10. Getting the CIO on Board
Prior successful rapid deployments
Application usage collection was major value-add
Able to reconcile license usage and reduce costs
11. Implementing Digital Guardian
3,000 agents deployed in dev environment
49,000 agents deployed next
May June July August
Initial
Engagement
3,000
Agents Deployed
in Development
49,000
Agents Deployed
in Monitor Mode
Fast Forward Framework
12. Results
Gained immediate visibility into all data access and usage
Saw data getting copied to USB drives
Used egress reports to drive adoption
13. What’s Next?
Using visibility to drive classification and policy making
Transition to operational plan
Roll out DG controls to mitigate top data risks
DG for advanced threat detection and forensic analysis
14. About Mark Stevens
VP, Global Services & Support
Driving customer success
20 year tech industry veteran
• IBM, BMC, Progress, Lotus
15. Data-Centric Security Recap
“In this new reality, traditional perimeter-based approaches to
security are insufficient. S&R pros must take a data-centric approach
that ensures security travels with the data regardless of user
population, location, or even hosting model.”
The Future Of Data Security: A Zero Trust Approach
John Kindervag, Heidi Shey, and Kelley Mak, June 5, 2014
Confidential 14
21. Protect Your Data for the Best Defense from
Outsider Threats
Confidential 20
22. Flexible Deployment Models
Confidential 21
Infrastructure hosted in your
environment
Self-administration
Policies, rules and reports
managed by you
Engage with Digital Guardian
Pro Services as needed
Infrastructure hosted in Digital
Guardian private cloud
Administered by Digital
Guardian Pro Services
Access to policies, rules, and
reports
Weekly status meetings
Infrastructure hosted in your
environment
Administered remotely by
Digital Guardian Pro Services
Data remains within your IT
environment
Option 1
On Premise
Option 2
Managed Service
Option 3
Hybrid
Managed Service On Premise
“By selecting the managed service deployment option, we were able to be up and running in a matter of weeks. The
added visibility into how our confidential data is being used is invaluable.”
CISO, Regional Bank