SlideShare une entreprise Scribd logo
1  sur  16
Télécharger pour lire hors ligne
RETHINK
CYBERSECURITY
Vladimír Špička
Miroslav Bajgar
DIGITAL
ACTIVITY
“BAD”“GOOD”
THE TRADITIONAL APPROACH TO
CYBERSECURITY
‣ Trusting static policies in a dynamic environment
‣ Decide what is good or bad at a single
point in time
‣ Configure your defenses to stop the bad from
entering and allow the good to pass through
THREAT CENTRIC
Necessary but insufficient
A LACK
OF CONTEXT
EASY TO CLASSIFY EASY TO CLASSIFYHARD TO CLASSIFY
“BAD”“GOOD”
A NEW PARADIGM: HUMAN-CENTRIC
CYBERSECURITY
BEHAVIOR CENTRIC
DIGITAL
ACTIVITY
‣ Detect individuals interacting with system that
post the greatest potential user risk
‣ Rapidly and anonymously understand potential
risky behavior and context around it
‣ Decide what is good or bad based on how users
interact with your most valuable data
‣ Continuously revisit your decisions as you and
our machines learn
PROVIDE CONTEXT
TO MAKE OPTIMAL
SECURITY DECISIONS
Risk-adaptive security
DATAPEOPLE
FOCUS ON THE TRUE CONSTANTS
PEOPLE DATA
Understanding the intersection
of people, critical data and IP
over networks of different
trust levels.
THE HUMAN POINT
Forcepoint
Web & Email
Security
Forcepoint
Data Guard
Forcepoint
NGFW
Forcepoint
CASB
Forcepoint
Insider Threat
Forcepoint
DLP
Gartner Magic Quadrant
Leader in Enterprise DLP
9 consecutive times.
Forcepoint
UEBA
The leader in actionable
insights based on
risk-adaptive scoring.
FORCEPOINT COMMERCIAL PORTFOLIO
Copyright © 2018 Forcepoint. | 6
Protect the important data
wherever it resides
Overwhelming
Administrators
Frustrating Users
Mistaking
CURRENT MISSION FOR MODERN SECURITY ORGANIZATIONS
without
for
Copyright © 2018 Forcepoint. | 7
GRADUATED ENFORCEMENT BASED ON RISK
For policies governing compliance use-cases or highly sensitive information,
“Block All” can be the action plan for all risk levels.
For policies where additional context can help inform decisions, additional
granularity is now available.
Copyright © 2017 Forcepoint. | 8
DYNAMIC DATA PROTECTION PROVIDES AUTOMATED ENFORCEMENT
DATA SOURCES ANALYTIC ENGINE AND INSIGHTS POLICY ENFORCEMENT⟩ ⟩
Forcepoint
Endpoint
OR
Forcepoint DLP
Any Data Source
Copyright © 2018 Forcepoint. | 9
STATIC VS DYNAMIC POLICIES IN ACTION
STATIC POLICIES BASED ON PRE-DEFINED RULES
Traditional
DLP Policy
Policy: block files from being copied
to USB drives, alert gets sent to IT
Kate is giving a presentation to senior leadership and tries
to copy her slides to a USB stick
The admin needs to track down the alert
Thousands of alerts come in overwhelming the
security admin team
The security team turns off the DLP policy because
there are too many false positives
Kate is frustrated because simple tasks are blocked
Kate will find another way to solve her problem
The data protection system becomes ineffective
ADMINISTRATOR IMPACTSUSER IMPACTS
Kate, PhD
Research Chemist
Copyright © 2018 Forcepoint. | 10
STATIC VS DYNAMIC POLICIES IN ACTION
ACTIONS VARY BASED ON THE RISK LEVEL OF PEOPLE AND THE VALUE OF DATA
Medium
Risk Group
Policy: Rather than just create an alert, take action
and notify the administrator
High
Risk Group
Policy: observe Kate’s every user & machine detail
and block all data transfers or copies anywhere
She gets a supplier’s query about an order
she doesn’t remember placing and then logs
into the supplier’s website to check on it
Kate begins to bulk copy files to
her local machine at off hours.
Low
Risk Group
Policy: encrypt fingerprinted files to USB drives but
allow others to be copied.
Kate is giving a presentation to senior
leadership and tries to copy her slides to
a USB stick
Kate begins accessing highly sensitive
drug formula data and attempts to copy
it off the corporate network
Kate, PhD
Research Chemist
Copyright © 2018 Forcepoint. | 11
INSIGHT INTO INTENT
An employee tries to print customer’s
credit card data and the DLP solution
blocks it.
Is this employee a risk?
Copyright © 2018 Forcepoint. | 12
INSIGHT INTO INTENT
What if your employee….
tries to print customer’s credit card
data and your DLP solution blocks it,
but then…
tries to upload it to Google Drive and
your CASB solution blocks it, but then…
tries to copy it to USB, and your DLP
solution blocks it, but then…
tries to send it to a personal email
address, and your DLP solution blocks
it, but then…
tries to FTP it outside the organization,
and your DLP solution blocks it…
tries to send it to upload it to Dropbox,
and your CASB solution blocks it, but
then…
Is this employee a risk? How would you know?
Copyright © 2018 Forcepoint. | 13
INSIGHT INTO INTENT
Let’s try that again, but with Forcepoint’s Dynamic Data Protection….
Your employee tries to print customer’s credit
card data and your DLP solution blocks it, but
then…
tries to upload it to Google Drive and your
DLP solution blocks it, but then…
tries to copy it to USB, and your DLP solution
blocks it, but then…
tries to send it to a personal email address,
and your DLP solution blocks it, but then…
tries to FTP it outside the organization, and
your DLP solution blocks it…
tries to send it to upload it to Dropbox, and
your CASB solution blocks it, but then…
Employee
Risk
Copyright © 2018 Forcepoint. | 14
INSIGHT INTO INTENT
Once High Risk is identified,
Security Team has options
1) Initiate an investigation
2) Adjust policies and
implement protective
measures
Copyright © 2017 Forcepoint. | 16
BENEFITS OF DYNAMIC DATA PROTECTION
Intelligent DLP
Increased
Productivity
Detect and Respond to High-Impact Events in a
Shorter Amount of Time.
Provide greater flexibility in policies, and adapt
enforcement based on calculated risk.
Proactive Security
Management
Reduce the amount of DLP alerts that need to be
triaged, transition DLP from broad to individual
policies.
Copyright © 2017 Forcepoint. | 17
FORCEPOINT DYNAMIC DATA PROTECTION
THANK YOU!
LEARN MORE AT forcepoint.com/dataprotection

Contenu connexe

Tendances

Data Loss Prevention
Data Loss PreventionData Loss Prevention
Data Loss Prevention
Reza Kopaee
 
Cybersecurity Incident Management Powerpoint Presentation Slides
Cybersecurity Incident Management Powerpoint Presentation SlidesCybersecurity Incident Management Powerpoint Presentation Slides
Cybersecurity Incident Management Powerpoint Presentation Slides
SlideTeam
 

Tendances (20)

Data Loss Prevention
Data Loss PreventionData Loss Prevention
Data Loss Prevention
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Cybersecurity Insiders Webinar - Zero Trust: Best Practices for Securing the...
Cybersecurity Insiders Webinar  - Zero Trust: Best Practices for Securing the...Cybersecurity Insiders Webinar  - Zero Trust: Best Practices for Securing the...
Cybersecurity Insiders Webinar - Zero Trust: Best Practices for Securing the...
 
Brochure forcepoint dlp_en
Brochure forcepoint dlp_enBrochure forcepoint dlp_en
Brochure forcepoint dlp_en
 
Symantec Data Loss Prevention 9
Symantec Data Loss Prevention 9Symantec Data Loss Prevention 9
Symantec Data Loss Prevention 9
 
FireEye Solutions
FireEye SolutionsFireEye Solutions
FireEye Solutions
 
Cybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for ExecutivesCybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for Executives
 
Threat modelling(system + enterprise)
Threat modelling(system + enterprise)Threat modelling(system + enterprise)
Threat modelling(system + enterprise)
 
Network Architecture Review Checklist
Network Architecture Review ChecklistNetwork Architecture Review Checklist
Network Architecture Review Checklist
 
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...
 
Cybersecurity Incident Management Powerpoint Presentation Slides
Cybersecurity Incident Management Powerpoint Presentation SlidesCybersecurity Incident Management Powerpoint Presentation Slides
Cybersecurity Incident Management Powerpoint Presentation Slides
 
Introduction to Cybersecurity
Introduction to CybersecurityIntroduction to Cybersecurity
Introduction to Cybersecurity
 
Overview of Data Loss Prevention (DLP) Technology
Overview of Data Loss Prevention (DLP) TechnologyOverview of Data Loss Prevention (DLP) Technology
Overview of Data Loss Prevention (DLP) Technology
 
Security Operation Center Fundamental
Security Operation Center FundamentalSecurity Operation Center Fundamental
Security Operation Center Fundamental
 
Zero Trust Model
Zero Trust ModelZero Trust Model
Zero Trust Model
 
Vulnerability Management
Vulnerability ManagementVulnerability Management
Vulnerability Management
 
Cyber Security PPT - 2023.pptx
Cyber Security PPT - 2023.pptxCyber Security PPT - 2023.pptx
Cyber Security PPT - 2023.pptx
 
Fortinet
FortinetFortinet
Fortinet
 
Patch and Vulnerability Management
Patch and Vulnerability ManagementPatch and Vulnerability Management
Patch and Vulnerability Management
 
Cyber Security Standards Compliance
Cyber Security Standards ComplianceCyber Security Standards Compliance
Cyber Security Standards Compliance
 

Similaire à Forcepoint Dynamic Data Protection

Data Loss Prevention from Symantec
Data Loss Prevention from SymantecData Loss Prevention from Symantec
Data Loss Prevention from Symantec
Arrow ECS UK
 
Introduction to the Current Threat Landscape
Introduction to the Current Threat LandscapeIntroduction to the Current Threat Landscape
Introduction to the Current Threat Landscape
Melbourne IT
 
The Cloud Beckons, But is it Safe?
The Cloud Beckons, But is it Safe?The Cloud Beckons, But is it Safe?
The Cloud Beckons, But is it Safe?
NTEN
 

Similaire à Forcepoint Dynamic Data Protection (20)

The Cloud 9 - Threat & Solutions 2016 by Bobby Dominguez
The Cloud 9 - Threat & Solutions 2016 by Bobby DominguezThe Cloud 9 - Threat & Solutions 2016 by Bobby Dominguez
The Cloud 9 - Threat & Solutions 2016 by Bobby Dominguez
 
Data Loss Prevention from Symantec
Data Loss Prevention from SymantecData Loss Prevention from Symantec
Data Loss Prevention from Symantec
 
Law Firm & Legal Department Security & Practice In The Real World
Law Firm & Legal Department Security & Practice In The Real WorldLaw Firm & Legal Department Security & Practice In The Real World
Law Firm & Legal Department Security & Practice In The Real World
 
The Definitive Guide to Data Loss Prevention
The Definitive Guide to Data Loss PreventionThe Definitive Guide to Data Loss Prevention
The Definitive Guide to Data Loss Prevention
 
Cultivate a stronger corporate culture to enhance cybersecurity
Cultivate a stronger corporate culture to enhance cybersecurityCultivate a stronger corporate culture to enhance cybersecurity
Cultivate a stronger corporate culture to enhance cybersecurity
 
10 Tips to Strengthen Your Insider Threat Program
10 Tips to Strengthen Your Insider Threat Program 10 Tips to Strengthen Your Insider Threat Program
10 Tips to Strengthen Your Insider Threat Program
 
(Slides) What's Yours Is Mine: How Employess Are Putting Your Sensitive Data ...
(Slides) What's Yours Is Mine: How Employess Are Putting Your Sensitive Data ...(Slides) What's Yours Is Mine: How Employess Are Putting Your Sensitive Data ...
(Slides) What's Yours Is Mine: How Employess Are Putting Your Sensitive Data ...
 
For Public_ Cybersecurity_ Frameworks, Fundamentals, and Foundations 2023.pdf
For Public_ Cybersecurity_ Frameworks, Fundamentals, and Foundations 2023.pdfFor Public_ Cybersecurity_ Frameworks, Fundamentals, and Foundations 2023.pdf
For Public_ Cybersecurity_ Frameworks, Fundamentals, and Foundations 2023.pdf
 
Introduction to the Current Threat Landscape
Introduction to the Current Threat LandscapeIntroduction to the Current Threat Landscape
Introduction to the Current Threat Landscape
 
Team black
Team blackTeam black
Team black
 
232 a7d01
232 a7d01232 a7d01
232 a7d01
 
Webinar: Endpoint Backup is not Enough - You Need an End-user Data Strategy
Webinar: Endpoint Backup is not Enough - You Need an End-user Data StrategyWebinar: Endpoint Backup is not Enough - You Need an End-user Data Strategy
Webinar: Endpoint Backup is not Enough - You Need an End-user Data Strategy
 
Why isn't infosec working? Did you turn it off and back on again?
Why isn't infosec working? Did you turn it off and back on again?Why isn't infosec working? Did you turn it off and back on again?
Why isn't infosec working? Did you turn it off and back on again?
 
Data-centric Security: Using Information Protection and Control (IPC) Tools t...
Data-centric Security: Using Information Protection and Control (IPC) Tools t...Data-centric Security: Using Information Protection and Control (IPC) Tools t...
Data-centric Security: Using Information Protection and Control (IPC) Tools t...
 
Cloudsourcing2013
Cloudsourcing2013Cloudsourcing2013
Cloudsourcing2013
 
Cloud Security - Idealware
Cloud Security - IdealwareCloud Security - Idealware
Cloud Security - Idealware
 
Behind the Curtain: Exposing Advanced Threats
Behind the Curtain: Exposing Advanced ThreatsBehind the Curtain: Exposing Advanced Threats
Behind the Curtain: Exposing Advanced Threats
 
A New Technical and Practical Approach on Securing Cyberspace and Cloud Compu...
A New Technical and Practical Approach on Securing Cyberspace and Cloud Compu...A New Technical and Practical Approach on Securing Cyberspace and Cloud Compu...
A New Technical and Practical Approach on Securing Cyberspace and Cloud Compu...
 
Cybersecurity…real world solutions
Cybersecurity…real world solutions Cybersecurity…real world solutions
Cybersecurity…real world solutions
 
The Cloud Beckons, But is it Safe?
The Cloud Beckons, But is it Safe?The Cloud Beckons, But is it Safe?
The Cloud Beckons, But is it Safe?
 

Plus de MarketingArrowECS_CZ

Plus de MarketingArrowECS_CZ (20)

INFINIDAT InfiniGuard - 20220330.pdf
INFINIDAT InfiniGuard - 20220330.pdfINFINIDAT InfiniGuard - 20220330.pdf
INFINIDAT InfiniGuard - 20220330.pdf
 
Využijte svou Oracle databázi na maximum!
Využijte svou Oracle databázi na maximum!Využijte svou Oracle databázi na maximum!
Využijte svou Oracle databázi na maximum!
 
Jak konsolidovat Vaše databáze s využitím Cloud služeb?
Jak konsolidovat Vaše databáze s využitím Cloud služeb?Jak konsolidovat Vaše databáze s využitím Cloud služeb?
Jak konsolidovat Vaše databáze s využitím Cloud služeb?
 
Chráníte správně svoje data?
Chráníte správně svoje data?Chráníte správně svoje data?
Chráníte správně svoje data?
 
Oracle databáze – Konsolidovaná Data Management Platforma
Oracle databáze – Konsolidovaná Data Management PlatformaOracle databáze – Konsolidovaná Data Management Platforma
Oracle databáze – Konsolidovaná Data Management Platforma
 
Nové vlastnosti Oracle Database Appliance
Nové vlastnosti Oracle Database ApplianceNové vlastnosti Oracle Database Appliance
Nové vlastnosti Oracle Database Appliance
 
Infinidat InfiniGuard
Infinidat InfiniGuardInfinidat InfiniGuard
Infinidat InfiniGuard
 
Infinidat InfiniBox
Infinidat InfiniBoxInfinidat InfiniBox
Infinidat InfiniBox
 
Novinky ve světě Oracle DB a koncept konvergované databáze
Novinky ve světě Oracle DB a koncept konvergované databázeNovinky ve světě Oracle DB a koncept konvergované databáze
Novinky ve světě Oracle DB a koncept konvergované databáze
 
Základy licencování Oracle software
Základy licencování Oracle softwareZáklady licencování Oracle software
Základy licencování Oracle software
 
Garance 100% dostupnosti dat! Kdo z vás to má?
Garance 100% dostupnosti dat! Kdo z vás to má?Garance 100% dostupnosti dat! Kdo z vás to má?
Garance 100% dostupnosti dat! Kdo z vás to má?
 
Využijte svou Oracle databázi naplno
Využijte svou Oracle databázi naplnoVyužijte svou Oracle databázi naplno
Využijte svou Oracle databázi naplno
 
Oracle Data Protection - 2. část
Oracle Data Protection - 2. částOracle Data Protection - 2. část
Oracle Data Protection - 2. část
 
Oracle Data Protection - 1. část
Oracle Data Protection - 1. částOracle Data Protection - 1. část
Oracle Data Protection - 1. část
 
Benefity Oracle Cloudu (4/4): Storage
Benefity Oracle Cloudu (4/4): StorageBenefity Oracle Cloudu (4/4): Storage
Benefity Oracle Cloudu (4/4): Storage
 
Benefity Oracle Cloudu (3/4): Compute
Benefity Oracle Cloudu (3/4): ComputeBenefity Oracle Cloudu (3/4): Compute
Benefity Oracle Cloudu (3/4): Compute
 
InfiniBox z pohledu zákazníka
InfiniBox z pohledu zákazníkaInfiniBox z pohledu zákazníka
InfiniBox z pohledu zákazníka
 
Exadata z pohledu zákazníka a novinky generace X8M - 2. část
Exadata z pohledu zákazníka a novinky generace X8M - 2. částExadata z pohledu zákazníka a novinky generace X8M - 2. část
Exadata z pohledu zákazníka a novinky generace X8M - 2. část
 
Exadata z pohledu zákazníka a novinky generace X8M - 1. část
Exadata z pohledu zákazníka a novinky generace X8M - 1. částExadata z pohledu zákazníka a novinky generace X8M - 1. část
Exadata z pohledu zákazníka a novinky generace X8M - 1. část
 
Úvod do Oracle Cloud infrastruktury
Úvod do Oracle Cloud infrastrukturyÚvod do Oracle Cloud infrastruktury
Úvod do Oracle Cloud infrastruktury
 

Dernier

Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 

Dernier (20)

Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 

Forcepoint Dynamic Data Protection

  • 2. DIGITAL ACTIVITY “BAD”“GOOD” THE TRADITIONAL APPROACH TO CYBERSECURITY ‣ Trusting static policies in a dynamic environment ‣ Decide what is good or bad at a single point in time ‣ Configure your defenses to stop the bad from entering and allow the good to pass through THREAT CENTRIC Necessary but insufficient A LACK OF CONTEXT EASY TO CLASSIFY EASY TO CLASSIFYHARD TO CLASSIFY
  • 3. “BAD”“GOOD” A NEW PARADIGM: HUMAN-CENTRIC CYBERSECURITY BEHAVIOR CENTRIC DIGITAL ACTIVITY ‣ Detect individuals interacting with system that post the greatest potential user risk ‣ Rapidly and anonymously understand potential risky behavior and context around it ‣ Decide what is good or bad based on how users interact with your most valuable data ‣ Continuously revisit your decisions as you and our machines learn PROVIDE CONTEXT TO MAKE OPTIMAL SECURITY DECISIONS Risk-adaptive security
  • 4. DATAPEOPLE FOCUS ON THE TRUE CONSTANTS PEOPLE DATA Understanding the intersection of people, critical data and IP over networks of different trust levels. THE HUMAN POINT
  • 5. Forcepoint Web & Email Security Forcepoint Data Guard Forcepoint NGFW Forcepoint CASB Forcepoint Insider Threat Forcepoint DLP Gartner Magic Quadrant Leader in Enterprise DLP 9 consecutive times. Forcepoint UEBA The leader in actionable insights based on risk-adaptive scoring. FORCEPOINT COMMERCIAL PORTFOLIO
  • 6. Copyright © 2018 Forcepoint. | 6 Protect the important data wherever it resides Overwhelming Administrators Frustrating Users Mistaking CURRENT MISSION FOR MODERN SECURITY ORGANIZATIONS without for
  • 7. Copyright © 2018 Forcepoint. | 7 GRADUATED ENFORCEMENT BASED ON RISK For policies governing compliance use-cases or highly sensitive information, “Block All” can be the action plan for all risk levels. For policies where additional context can help inform decisions, additional granularity is now available.
  • 8. Copyright © 2017 Forcepoint. | 8 DYNAMIC DATA PROTECTION PROVIDES AUTOMATED ENFORCEMENT DATA SOURCES ANALYTIC ENGINE AND INSIGHTS POLICY ENFORCEMENT⟩ ⟩ Forcepoint Endpoint OR Forcepoint DLP Any Data Source
  • 9. Copyright © 2018 Forcepoint. | 9 STATIC VS DYNAMIC POLICIES IN ACTION STATIC POLICIES BASED ON PRE-DEFINED RULES Traditional DLP Policy Policy: block files from being copied to USB drives, alert gets sent to IT Kate is giving a presentation to senior leadership and tries to copy her slides to a USB stick The admin needs to track down the alert Thousands of alerts come in overwhelming the security admin team The security team turns off the DLP policy because there are too many false positives Kate is frustrated because simple tasks are blocked Kate will find another way to solve her problem The data protection system becomes ineffective ADMINISTRATOR IMPACTSUSER IMPACTS Kate, PhD Research Chemist
  • 10. Copyright © 2018 Forcepoint. | 10 STATIC VS DYNAMIC POLICIES IN ACTION ACTIONS VARY BASED ON THE RISK LEVEL OF PEOPLE AND THE VALUE OF DATA Medium Risk Group Policy: Rather than just create an alert, take action and notify the administrator High Risk Group Policy: observe Kate’s every user & machine detail and block all data transfers or copies anywhere She gets a supplier’s query about an order she doesn’t remember placing and then logs into the supplier’s website to check on it Kate begins to bulk copy files to her local machine at off hours. Low Risk Group Policy: encrypt fingerprinted files to USB drives but allow others to be copied. Kate is giving a presentation to senior leadership and tries to copy her slides to a USB stick Kate begins accessing highly sensitive drug formula data and attempts to copy it off the corporate network Kate, PhD Research Chemist
  • 11. Copyright © 2018 Forcepoint. | 11 INSIGHT INTO INTENT An employee tries to print customer’s credit card data and the DLP solution blocks it. Is this employee a risk?
  • 12. Copyright © 2018 Forcepoint. | 12 INSIGHT INTO INTENT What if your employee…. tries to print customer’s credit card data and your DLP solution blocks it, but then… tries to upload it to Google Drive and your CASB solution blocks it, but then… tries to copy it to USB, and your DLP solution blocks it, but then… tries to send it to a personal email address, and your DLP solution blocks it, but then… tries to FTP it outside the organization, and your DLP solution blocks it… tries to send it to upload it to Dropbox, and your CASB solution blocks it, but then… Is this employee a risk? How would you know?
  • 13. Copyright © 2018 Forcepoint. | 13 INSIGHT INTO INTENT Let’s try that again, but with Forcepoint’s Dynamic Data Protection…. Your employee tries to print customer’s credit card data and your DLP solution blocks it, but then… tries to upload it to Google Drive and your DLP solution blocks it, but then… tries to copy it to USB, and your DLP solution blocks it, but then… tries to send it to a personal email address, and your DLP solution blocks it, but then… tries to FTP it outside the organization, and your DLP solution blocks it… tries to send it to upload it to Dropbox, and your CASB solution blocks it, but then… Employee Risk
  • 14. Copyright © 2018 Forcepoint. | 14 INSIGHT INTO INTENT Once High Risk is identified, Security Team has options 1) Initiate an investigation 2) Adjust policies and implement protective measures
  • 15. Copyright © 2017 Forcepoint. | 16 BENEFITS OF DYNAMIC DATA PROTECTION Intelligent DLP Increased Productivity Detect and Respond to High-Impact Events in a Shorter Amount of Time. Provide greater flexibility in policies, and adapt enforcement based on calculated risk. Proactive Security Management Reduce the amount of DLP alerts that need to be triaged, transition DLP from broad to individual policies.
  • 16. Copyright © 2017 Forcepoint. | 17 FORCEPOINT DYNAMIC DATA PROTECTION THANK YOU! LEARN MORE AT forcepoint.com/dataprotection