SlideShare une entreprise Scribd logo
1  sur  21
User-friendly
information
management
«NAME»
Watchful Software
Not if, but when
© Copyright www.watchfulsoftware.com. 2016 All Rights Reserved. 2Monday, February 6, 2017
Your Exposure
Employee
Email Sent/Day
# of
Employees
Total
Email/Day
Total
Email/Year
Sensitive
Data - 10%
34 500 17,000 3,825,000 382,500
34 1,000 34,000 7,650,000 765,000
34 5,000 170,000 38,250,000 3,825,000
34 10,000 340,000 76,500,000 7,650,000
34 15,000 510,000 114,750,000 11,475,000
34 25,000 850,000 191,250,000 19,125,000
34 50,000 1,700,000 382,500,000 38,250,000
Employee
Email Sent/Day
2015 2016 2017 2018 2019
Average Number of
Emails Sent/Received
122 123 124 125 126
Average Number of
Emails Received
88 90 92 94 96
Average Number of
legitimate Emails
76 76 76 76 77
Average Number of
Spam Emails
12 14 16 18 19
Average Number of
Emails Sent
34 33 32 31 30
Corporate Assets
(email only)
© Copyright www.watchfulsoftware.com. 2016 All Rights Reserved. 3
Source: THE RADICATI GROUP, INC.
Monday, February 6, 2017
Policy-driven Classification
data is truly sensitive?
should have access to it?
is the data to be handled?
should the classification change?
What
Who
How
When
should the data be protected?Where
© Copyright www.watchfulsoftware.com. 2016 All Rights Reserved. 4Monday, February 6, 2017
1 Policy-Driven Data Classification & Labeling
2 Role-Based Access Control Policies
3 DynamicWatermarking andTagging
4 Complementing the Enterprise Security “Puzzle”
5 Comprehensive AuditTrails
Why RightsWATCH
© Copyright www.watchfulsoftware.com. 2016 All Rights Reserved. 5Monday, February 6, 2017
Legacy Data
Bulk and automatic classification
of existing data that resides on
the corporate network
Data Loss Prevention
Applying data-centric policies
to files and emails to educate
and prevent going against
corporate policies
Data Analytics
Comprehensive audit trail for
forensic analysis, together with
enhancing SIEM tools for reporting
Data Classification & Labelling
Identify and classify sensitive
data via impact-free user
experience
Rights Management
Enforcing role-based access
control policies over files,
anywhere
Mobile Devices
Support for BYOD and the ability
to classify and protect sensitive
data on top of MDM
RightsWATCH and the Enterprise Security “Puzzle”
© Copyright www.watchfulsoftware.com. 2016 All Rights Reserved. 6Monday, February 6, 2017
By taking decisions out of users' hands
Having forensics capabilities for tracking
Classifies legacy files
Familiar workflow with no extra steps
Flexible re-classification
Less time in training
Improved
Compliance
Increased
Security
Decreased
Costs
Increased
Productivity
Fewer insider threat incidents
Increased visibility with audit trail
Protection extended to mobile
Cost of damage to your brand
Cost of responding to incidents and auditing
Cost of training to increase user awareness
What’s in it for you?
© Copyright www.watchfulsoftware.com. 2016 All Rights Reserved. 7Monday, February 6, 2017
Watchful Software Ranked
as a “Technology Leader”
by KuppingerCole
Watchful provides an easy-to-use
solution that supports secure
sharing of common document types
in a way that most end-users want
to work.
Leadership Compass Report on
Secure Information Sharing,
KuppingerCole, 2015
Watchful Software offers DLP and
IRM's 'greatest hits' with
one easy payment
We like Watchful's focus on taking
the end user out of the equation, as
well as its ability to offer granular
data-access policies through role-
based access controls and recent
support for Mac OS and mobile
devices.
451 Research's Market Insight
Service, The 451 Group, 2014
What our technological partners
say about us
The Watchful classification and
policy management extensions to
the RMS server and the Microsoft
Office client applications are well
integrated, and provide several
important features for both end-
users and IT administrators to help
speed adoption, facilitate
deployment, and protect an ever-
wider array of data in the enterprise.
Dan Plastina, Microsoft’s Rights
Management Services Group
Manager
“
“
“
“
“
“
What the industry is saying
© Copyright www.watchfulsoftware.com. 2016 All Rights Reserved. 8Monday, February 6, 2017
1 Data Classification & Labelling
2 Legacy Data
3 Data Loss Prevention
4 Rights Management
5 Mobile Devices
6 Data Analytics
© Copyright www.watchfulsoftware.com. 2016 All Rights Reserved. 9
Product Demo
Monday, February 6, 2017
Intelligent Time
Access (ITA) for
automatic file
re-classification
Data Classification & Labelling
© Copyright www.watchfulsoftware.com. 2016 All Rights Reserved. 10Monday, February 6, 2017
Legacy Data
11© Copyright www.watchfulsoftware.com. 2016 All Rights Reserved.
RightsWATCH Global Protector Client
The user right clicks the file/folder and
selects the classification to be applied to the
file(s). Corporately defined policy rules can
overwrite user decisions and choices
RightsWATCH Global Protector Server
Automatic classification of files. Corporately
defined policy rules are applied on every file
type the Global Protector finds in the process
of scanning corporate repositories
RightsWATCH Global Protector Web
Software componente installed on an IIS web
server. MS Office files are classified when
exported/downloaded from the web server,
being the process completely “transparent”
to the end user.
Monday, February 6, 2017
Warning Rule
Trigger a “warning” to the user
performing an action
Blocking Rule
Trigger a “blocking” action and prevent
the user from doing what he/she was
hoping to accomplish
Data Loss Prevention
12© Copyright www.watchfulsoftware.com. 2016 All Rights Reserved.
Tagging for DLP
The data asset is tagged at the metadata
layer to enhance the efficiency and
effectiveness of the DLP policies
Monday, February 6, 2017
Rights Management
13
User is informed if any of the recipients
will be unable to open the rights
protected email and can act upon it
© Copyright www.watchfulsoftware.com. 2016 All Rights Reserved.
Ignore
Ignore the warning and send the email
anyway
Remove
Remove the recipient(s) from the
recipients list, and then send the email
Classify as Public
Downgrade the classification level of
the email being sent so that all
recipients are able to open and read it
Monday, February 6, 2017
Single Sign-on and PIN Authentication
Automatic App Configuration
AppTunnel Integration
Secure Data Removal
Device Pinning
Classify Data
Enforce RBAC policies
Remote KillAccess On-demand
Mobile Devices
14
MDM
+
Manage the device
Manage the data on the device
© Copyright www.watchfulsoftware.com. 2016 All Rights Reserved.Monday, February 6, 2017
ComprehensiveAuditTrails
InformationTracking for ForensicAnalysis
Event Correlation
Dashboards, KPIs, Alarms and Reports
RightsWATCH server
stores the logs in SQL
Database
A SIEM is “fed” by
RightWATCH‘s database
for knowledge generation
Metrics/KPIs
Reports
Alarms
DataAnalytics
15© Copyright www.watchfulsoftware.com. 2016 All Rights Reserved.Monday, February 6, 2017
User-friendly
information
management
«NAME»
Watchful Software
1 The InsiderThreat
2 Secure Information Sharing
3 Policy-driven Classification
Back-up Slides
© Copyright www.watchfulsoftware.com. 2016 All Rights Reserved. 17Monday, February 6, 2017
Well Meaning Insider
Accidental disclosure
(e.g., via the internet)
Malicious code
Improper or accidental disposal of
records or portable equipment
Malicious Insider
Disgruntled employee
Profit-seeking employee
A former employee
8 Internal devices
5 Internal network 6 7
4 Internal firewall
3 DMZ(s)
2 Stateful application firewall
1 Security router
Layer Security-enterprise architecture
Host-based IDS Host-based FW Host-based AV
Network Intrusion
Detection (IDS)
Network Access ControlWeb Proxy
DNSVPN
The InsiderThreat
© Copyright www.watchfulsoftware.com. 2016 All Rights Reserved. 18Monday, February 6, 2017
1 Can I enforce corporate policies?
2 Can I allow it via any media?
3 Can I have a zero extra click environment to achieve it?
4 Can I not need to onboard “externals” into my systems?
5 Can I not require “externals” to own a license nor software?
6 Can I then know who did what, when and how?
Secure
Information
Sharing
Pain Points
© Copyright www.watchfulsoftware.com. 2016 All Rights Reserved. 19Monday, February 6, 2017
Secure Information Sharing with RightsWATCH
1
Enforces corporate policies and not rely on users to know,
understand, reason with or be willing to apply policies to data
2
Allows data to be shared via any media and still uphold
corporate policies
3
Does not impact on users workflows, as it does not demand
users to click on any extra buttons, pop-ups, or combo boxes
4
Does not require enterprises to onboard, nor manage “external
users” identities'
5
Delivers a comprehensive audit trail that enables leveraging
SIEM tools to do data analytics
© Copyright www.watchfulsoftware.com. 2016 All Rights Reserved. 20Monday, February 6, 2017
1
RightsWATCH implements a Multilevel Security Model to classify information –
Company/Scope/Level
2
RightsWATCH classifies the information into your specific levels of classification according to user
roles
3
RightsWATCH classifies legacy files, current files and emails, via a policy driven and/or user driven
fashion
4
RightsWATCH enforces corporate security policy rules, which can be triggered based on content and
context
5
RightsWATCH marks and tags appropriately with tailored headers, footers, watermarks, disclaimers,
tags, to protect the organization
6
Relieves the user from the workload and overhead of having to know, understand and apply
corporate policies
Policy-driven Classification
© Copyright www.watchfulsoftware.com. 2016 All Rights Reserved. 21Monday, February 6, 2017

Contenu connexe

Tendances

netskope-casb-for-microsoft-365.pdf
netskope-casb-for-microsoft-365.pdfnetskope-casb-for-microsoft-365.pdf
netskope-casb-for-microsoft-365.pdf
test888649
 
Ciso Platform Webcast: Shadow Data Exposed
Ciso Platform Webcast: Shadow Data ExposedCiso Platform Webcast: Shadow Data Exposed
Ciso Platform Webcast: Shadow Data Exposed
Elastica Inc.
 

Tendances (20)

netskope-casb-for-microsoft-365.pdf
netskope-casb-for-microsoft-365.pdfnetskope-casb-for-microsoft-365.pdf
netskope-casb-for-microsoft-365.pdf
 
Atelier Technique - Symantec - #ACSS2019
Atelier Technique - Symantec - #ACSS2019Atelier Technique - Symantec - #ACSS2019
Atelier Technique - Symantec - #ACSS2019
 
Ciso Platform Webcast: Shadow Data Exposed
Ciso Platform Webcast: Shadow Data ExposedCiso Platform Webcast: Shadow Data Exposed
Ciso Platform Webcast: Shadow Data Exposed
 
Gartner presentation risq dec 2016 jie zhang
Gartner presentation risq dec 2016 jie zhangGartner presentation risq dec 2016 jie zhang
Gartner presentation risq dec 2016 jie zhang
 
RightsWATCH Secure Collaboration with Azure RMS
RightsWATCH Secure Collaboration with Azure RMSRightsWATCH Secure Collaboration with Azure RMS
RightsWATCH Secure Collaboration with Azure RMS
 
How to Rapidly Identify Assets at Risk to WannaCry Ransomware
How to Rapidly Identify Assets at Risk to WannaCry RansomwareHow to Rapidly Identify Assets at Risk to WannaCry Ransomware
How to Rapidly Identify Assets at Risk to WannaCry Ransomware
 
What's Hot In IT - Cybersecurity
What's Hot In IT - CybersecurityWhat's Hot In IT - Cybersecurity
What's Hot In IT - Cybersecurity
 
10 Good Reasons: NetApp for Data Protection
10 Good Reasons: NetApp for Data Protection10 Good Reasons: NetApp for Data Protection
10 Good Reasons: NetApp for Data Protection
 
2016 Trends in Security
2016 Trends in Security 2016 Trends in Security
2016 Trends in Security
 
7 Experts on Implementing Azure Sentinel
7 Experts on Implementing Azure Sentinel7 Experts on Implementing Azure Sentinel
7 Experts on Implementing Azure Sentinel
 
Protecting your Data in Google Apps
Protecting your Data in Google AppsProtecting your Data in Google Apps
Protecting your Data in Google Apps
 
How to Extend Security and Compliance Within Box
How to Extend Security and Compliance Within BoxHow to Extend Security and Compliance Within Box
How to Extend Security and Compliance Within Box
 
Microsoft Security Intelligence Report vol. 21
Microsoft Security Intelligence Report vol. 21Microsoft Security Intelligence Report vol. 21
Microsoft Security Intelligence Report vol. 21
 
Google peter logli & jake shea
Google   peter logli & jake sheaGoogle   peter logli & jake shea
Google peter logli & jake shea
 
Forrester Research: Securing the Cloud When Users are Left to Their Own Devices
Forrester Research: Securing the Cloud When Users are Left to Their Own DevicesForrester Research: Securing the Cloud When Users are Left to Their Own Devices
Forrester Research: Securing the Cloud When Users are Left to Their Own Devices
 
Cure for the Common Cloud: How Healthcare can Safely Enable the Cloud
Cure for the Common Cloud: How Healthcare can Safely Enable the CloudCure for the Common Cloud: How Healthcare can Safely Enable the Cloud
Cure for the Common Cloud: How Healthcare can Safely Enable the Cloud
 
How classification augments data loss prevention
How classification augments data loss preventionHow classification augments data loss prevention
How classification augments data loss prevention
 
Cloud Security for Dummies Webinar — The Identity Edition
Cloud Security for Dummies Webinar — The Identity EditionCloud Security for Dummies Webinar — The Identity Edition
Cloud Security for Dummies Webinar — The Identity Edition
 
Quantifying Cloud Risk for Your Corporate Leadership
Quantifying Cloud Risk for Your Corporate LeadershipQuantifying Cloud Risk for Your Corporate Leadership
Quantifying Cloud Risk for Your Corporate Leadership
 
The Razor's Edge: Enabling Cloud While Mitigating the Risk of a Cloud Data Br...
The Razor's Edge: Enabling Cloud While Mitigating the Risk of a Cloud Data Br...The Razor's Edge: Enabling Cloud While Mitigating the Risk of a Cloud Data Br...
The Razor's Edge: Enabling Cloud While Mitigating the Risk of a Cloud Data Br...
 

En vedette

En vedette (15)

Las plantas
Las plantasLas plantas
Las plantas
 
Every one of us is a leader
Every one of us is a leaderEvery one of us is a leader
Every one of us is a leader
 
「今どきのUXを実現するためのRAD Studio新機能活用テクニック」
「今どきのUXを実現するためのRAD Studio新機能活用テクニック」「今どきのUXを実現するためのRAD Studio新機能活用テクニック」
「今どきのUXを実現するためのRAD Studio新機能活用テクニック」
 
Escuelas economicas
Escuelas economicasEscuelas economicas
Escuelas economicas
 
「今どきのUXを実現するためのRAD Studio新機能活用テクニック」
「今どきのUXを実現するためのRAD Studio新機能活用テクニック」「今どきのUXを実現するためのRAD Studio新機能活用テクニック」
「今どきのUXを実現するためのRAD Studio新機能活用テクニック」
 
Compartim converses dossier (1)
Compartim converses dossier (1)Compartim converses dossier (1)
Compartim converses dossier (1)
 
DelphiでWin/Macクロスコンパイル
DelphiでWin/MacクロスコンパイルDelphiでWin/Macクロスコンパイル
DelphiでWin/Macクロスコンパイル
 
DynamoDBとはとは
DynamoDBとはとはDynamoDBとはとは
DynamoDBとはとは
 
Introduction to Reliability Centered Maintenance
Introduction to Reliability Centered MaintenanceIntroduction to Reliability Centered Maintenance
Introduction to Reliability Centered Maintenance
 
Webセミナー「RAD Studio 10.1 Berlin Update 2 Anniversary Edition 新機能ガイド」
Webセミナー「RAD Studio 10.1 Berlin Update 2 Anniversary Edition 新機能ガイド」Webセミナー「RAD Studio 10.1 Berlin Update 2 Anniversary Edition 新機能ガイド」
Webセミナー「RAD Studio 10.1 Berlin Update 2 Anniversary Edition 新機能ガイド」
 
Introduction to Digital Marketing
Introduction to Digital MarketingIntroduction to Digital Marketing
Introduction to Digital Marketing
 
psiquiatria cuadro comparativo
psiquiatria cuadro comparativopsiquiatria cuadro comparativo
psiquiatria cuadro comparativo
 
Maní (Arachis hypogaea)
Maní (Arachis hypogaea)Maní (Arachis hypogaea)
Maní (Arachis hypogaea)
 
Continuous delivery w projekcie open source - Marcin Stachniuk
Continuous delivery w projekcie open source - Marcin StachniukContinuous delivery w projekcie open source - Marcin Stachniuk
Continuous delivery w projekcie open source - Marcin Stachniuk
 
Artrogriposis múltiple congénita.
Artrogriposis múltiple congénita.Artrogriposis múltiple congénita.
Artrogriposis múltiple congénita.
 

Similaire à Watchful-Corporate-Overview-Q1-16

Similaire à Watchful-Corporate-Overview-Q1-16 (20)

Watchful Corporate Overview
Watchful Corporate OverviewWatchful Corporate Overview
Watchful Corporate Overview
 
How classification changes the way you look into corporate data
How classification changes the way you look into corporate dataHow classification changes the way you look into corporate data
How classification changes the way you look into corporate data
 
B2 - The History of Content Security: Part 2 - Adam Levithan
B2 - The History of Content Security: Part 2 - Adam LevithanB2 - The History of Content Security: Part 2 - Adam Levithan
B2 - The History of Content Security: Part 2 - Adam Levithan
 
Cybersecurity in Shared Services Organizations
Cybersecurity in Shared Services OrganizationsCybersecurity in Shared Services Organizations
Cybersecurity in Shared Services Organizations
 
eBook: 5 Steps to Secure Cloud Data Governance
eBook: 5 Steps to Secure Cloud Data GovernanceeBook: 5 Steps to Secure Cloud Data Governance
eBook: 5 Steps to Secure Cloud Data Governance
 
Personium - Open Source PDS envisioning the Web of MyData
Personium - Open Source PDS envisioning the Web of MyDataPersonium - Open Source PDS envisioning the Web of MyData
Personium - Open Source PDS envisioning the Web of MyData
 
[IGNITE2018] [BRK2495] What’s new in Microsoft Information Protection solutio...
[IGNITE2018] [BRK2495] What’s new in Microsoft Information Protection solutio...[IGNITE2018] [BRK2495] What’s new in Microsoft Information Protection solutio...
[IGNITE2018] [BRK2495] What’s new in Microsoft Information Protection solutio...
 
Soluzioni per la sicurezza aziendale di hp
Soluzioni per la sicurezza aziendale di hpSoluzioni per la sicurezza aziendale di hp
Soluzioni per la sicurezza aziendale di hp
 
A Secure Journey to Cloud with Microsoft 365
A Secure Journey to Cloud with Microsoft 365A Secure Journey to Cloud with Microsoft 365
A Secure Journey to Cloud with Microsoft 365
 
Protect your data in / with the Cloud
Protect your data in / with the CloudProtect your data in / with the Cloud
Protect your data in / with the Cloud
 
Importance of Identity Management in Security - Microsoft Tech Tour @Towson
Importance of Identity Management in Security - Microsoft Tech Tour @TowsonImportance of Identity Management in Security - Microsoft Tech Tour @Towson
Importance of Identity Management in Security - Microsoft Tech Tour @Towson
 
Improving Cloud Visibility, Accountability & Security
Improving Cloud Visibility, Accountability & SecurityImproving Cloud Visibility, Accountability & Security
Improving Cloud Visibility, Accountability & Security
 
Stratégies de croissance via la mobilité (ems)
Stratégies de croissance via la mobilité (ems)Stratégies de croissance via la mobilité (ems)
Stratégies de croissance via la mobilité (ems)
 
Splunk Discovery Day Dubai 2017 - Security Keynote
Splunk Discovery Day Dubai 2017 - Security KeynoteSplunk Discovery Day Dubai 2017 - Security Keynote
Splunk Discovery Day Dubai 2017 - Security Keynote
 
Agility, Business Continuity & Security in a Digital World: Can we have it all?
Agility, Business Continuity & Security in a Digital World: Can we have it all?Agility, Business Continuity & Security in a Digital World: Can we have it all?
Agility, Business Continuity & Security in a Digital World: Can we have it all?
 
Microsoft Teams in the Modern Workplace
Microsoft Teams in the Modern WorkplaceMicrosoft Teams in the Modern Workplace
Microsoft Teams in the Modern Workplace
 
Data Protection & Shadow IT in a cloud era
Data Protection & Shadow IT in a cloud eraData Protection & Shadow IT in a cloud era
Data Protection & Shadow IT in a cloud era
 
The BYOD Security Battleground
The BYOD Security BattlegroundThe BYOD Security Battleground
The BYOD Security Battleground
 
One name unify them all
One name unify them allOne name unify them all
One name unify them all
 
Microsoft 365 Enterprise Security with E5 Overview
Microsoft 365 Enterprise Security with E5 OverviewMicrosoft 365 Enterprise Security with E5 Overview
Microsoft 365 Enterprise Security with E5 Overview
 

Plus de Ravindran Vasu (7)

elevatorpitchstartupawards-140409072128-phpapp02
elevatorpitchstartupawards-140409072128-phpapp02elevatorpitchstartupawards-140409072128-phpapp02
elevatorpitchstartupawards-140409072128-phpapp02
 
GTB Data Leakage Prevention Use Cases 2014
GTB Data Leakage Prevention Use Cases 2014GTB Data Leakage Prevention Use Cases 2014
GTB Data Leakage Prevention Use Cases 2014
 
GTB Technologies Datasheet 2014
GTB Technologies Datasheet 2014GTB Technologies Datasheet 2014
GTB Technologies Datasheet 2014
 
GTB DLP Brochure
GTB DLP BrochureGTB DLP Brochure
GTB DLP Brochure
 
GTB IRM - Business Use Cases - 2013
GTB IRM - Business Use Cases - 2013GTB IRM - Business Use Cases - 2013
GTB IRM - Business Use Cases - 2013
 
GTB IRM - How it Works - 2013
GTB IRM - How it Works - 2013GTB IRM - How it Works - 2013
GTB IRM - How it Works - 2013
 
GTB IRM - Usage Rights Matrix
GTB IRM - Usage Rights MatrixGTB IRM - Usage Rights Matrix
GTB IRM - Usage Rights Matrix
 

Watchful-Corporate-Overview-Q1-16

  • 2. Not if, but when © Copyright www.watchfulsoftware.com. 2016 All Rights Reserved. 2Monday, February 6, 2017
  • 3. Your Exposure Employee Email Sent/Day # of Employees Total Email/Day Total Email/Year Sensitive Data - 10% 34 500 17,000 3,825,000 382,500 34 1,000 34,000 7,650,000 765,000 34 5,000 170,000 38,250,000 3,825,000 34 10,000 340,000 76,500,000 7,650,000 34 15,000 510,000 114,750,000 11,475,000 34 25,000 850,000 191,250,000 19,125,000 34 50,000 1,700,000 382,500,000 38,250,000 Employee Email Sent/Day 2015 2016 2017 2018 2019 Average Number of Emails Sent/Received 122 123 124 125 126 Average Number of Emails Received 88 90 92 94 96 Average Number of legitimate Emails 76 76 76 76 77 Average Number of Spam Emails 12 14 16 18 19 Average Number of Emails Sent 34 33 32 31 30 Corporate Assets (email only) © Copyright www.watchfulsoftware.com. 2016 All Rights Reserved. 3 Source: THE RADICATI GROUP, INC. Monday, February 6, 2017
  • 4. Policy-driven Classification data is truly sensitive? should have access to it? is the data to be handled? should the classification change? What Who How When should the data be protected?Where © Copyright www.watchfulsoftware.com. 2016 All Rights Reserved. 4Monday, February 6, 2017
  • 5. 1 Policy-Driven Data Classification & Labeling 2 Role-Based Access Control Policies 3 DynamicWatermarking andTagging 4 Complementing the Enterprise Security “Puzzle” 5 Comprehensive AuditTrails Why RightsWATCH © Copyright www.watchfulsoftware.com. 2016 All Rights Reserved. 5Monday, February 6, 2017
  • 6. Legacy Data Bulk and automatic classification of existing data that resides on the corporate network Data Loss Prevention Applying data-centric policies to files and emails to educate and prevent going against corporate policies Data Analytics Comprehensive audit trail for forensic analysis, together with enhancing SIEM tools for reporting Data Classification & Labelling Identify and classify sensitive data via impact-free user experience Rights Management Enforcing role-based access control policies over files, anywhere Mobile Devices Support for BYOD and the ability to classify and protect sensitive data on top of MDM RightsWATCH and the Enterprise Security “Puzzle” © Copyright www.watchfulsoftware.com. 2016 All Rights Reserved. 6Monday, February 6, 2017
  • 7. By taking decisions out of users' hands Having forensics capabilities for tracking Classifies legacy files Familiar workflow with no extra steps Flexible re-classification Less time in training Improved Compliance Increased Security Decreased Costs Increased Productivity Fewer insider threat incidents Increased visibility with audit trail Protection extended to mobile Cost of damage to your brand Cost of responding to incidents and auditing Cost of training to increase user awareness What’s in it for you? © Copyright www.watchfulsoftware.com. 2016 All Rights Reserved. 7Monday, February 6, 2017
  • 8. Watchful Software Ranked as a “Technology Leader” by KuppingerCole Watchful provides an easy-to-use solution that supports secure sharing of common document types in a way that most end-users want to work. Leadership Compass Report on Secure Information Sharing, KuppingerCole, 2015 Watchful Software offers DLP and IRM's 'greatest hits' with one easy payment We like Watchful's focus on taking the end user out of the equation, as well as its ability to offer granular data-access policies through role- based access controls and recent support for Mac OS and mobile devices. 451 Research's Market Insight Service, The 451 Group, 2014 What our technological partners say about us The Watchful classification and policy management extensions to the RMS server and the Microsoft Office client applications are well integrated, and provide several important features for both end- users and IT administrators to help speed adoption, facilitate deployment, and protect an ever- wider array of data in the enterprise. Dan Plastina, Microsoft’s Rights Management Services Group Manager “ “ “ “ “ “ What the industry is saying © Copyright www.watchfulsoftware.com. 2016 All Rights Reserved. 8Monday, February 6, 2017
  • 9. 1 Data Classification & Labelling 2 Legacy Data 3 Data Loss Prevention 4 Rights Management 5 Mobile Devices 6 Data Analytics © Copyright www.watchfulsoftware.com. 2016 All Rights Reserved. 9 Product Demo Monday, February 6, 2017
  • 10. Intelligent Time Access (ITA) for automatic file re-classification Data Classification & Labelling © Copyright www.watchfulsoftware.com. 2016 All Rights Reserved. 10Monday, February 6, 2017
  • 11. Legacy Data 11© Copyright www.watchfulsoftware.com. 2016 All Rights Reserved. RightsWATCH Global Protector Client The user right clicks the file/folder and selects the classification to be applied to the file(s). Corporately defined policy rules can overwrite user decisions and choices RightsWATCH Global Protector Server Automatic classification of files. Corporately defined policy rules are applied on every file type the Global Protector finds in the process of scanning corporate repositories RightsWATCH Global Protector Web Software componente installed on an IIS web server. MS Office files are classified when exported/downloaded from the web server, being the process completely “transparent” to the end user. Monday, February 6, 2017
  • 12. Warning Rule Trigger a “warning” to the user performing an action Blocking Rule Trigger a “blocking” action and prevent the user from doing what he/she was hoping to accomplish Data Loss Prevention 12© Copyright www.watchfulsoftware.com. 2016 All Rights Reserved. Tagging for DLP The data asset is tagged at the metadata layer to enhance the efficiency and effectiveness of the DLP policies Monday, February 6, 2017
  • 13. Rights Management 13 User is informed if any of the recipients will be unable to open the rights protected email and can act upon it © Copyright www.watchfulsoftware.com. 2016 All Rights Reserved. Ignore Ignore the warning and send the email anyway Remove Remove the recipient(s) from the recipients list, and then send the email Classify as Public Downgrade the classification level of the email being sent so that all recipients are able to open and read it Monday, February 6, 2017
  • 14. Single Sign-on and PIN Authentication Automatic App Configuration AppTunnel Integration Secure Data Removal Device Pinning Classify Data Enforce RBAC policies Remote KillAccess On-demand Mobile Devices 14 MDM + Manage the device Manage the data on the device © Copyright www.watchfulsoftware.com. 2016 All Rights Reserved.Monday, February 6, 2017
  • 15. ComprehensiveAuditTrails InformationTracking for ForensicAnalysis Event Correlation Dashboards, KPIs, Alarms and Reports RightsWATCH server stores the logs in SQL Database A SIEM is “fed” by RightWATCH‘s database for knowledge generation Metrics/KPIs Reports Alarms DataAnalytics 15© Copyright www.watchfulsoftware.com. 2016 All Rights Reserved.Monday, February 6, 2017
  • 17. 1 The InsiderThreat 2 Secure Information Sharing 3 Policy-driven Classification Back-up Slides © Copyright www.watchfulsoftware.com. 2016 All Rights Reserved. 17Monday, February 6, 2017
  • 18. Well Meaning Insider Accidental disclosure (e.g., via the internet) Malicious code Improper or accidental disposal of records or portable equipment Malicious Insider Disgruntled employee Profit-seeking employee A former employee 8 Internal devices 5 Internal network 6 7 4 Internal firewall 3 DMZ(s) 2 Stateful application firewall 1 Security router Layer Security-enterprise architecture Host-based IDS Host-based FW Host-based AV Network Intrusion Detection (IDS) Network Access ControlWeb Proxy DNSVPN The InsiderThreat © Copyright www.watchfulsoftware.com. 2016 All Rights Reserved. 18Monday, February 6, 2017
  • 19. 1 Can I enforce corporate policies? 2 Can I allow it via any media? 3 Can I have a zero extra click environment to achieve it? 4 Can I not need to onboard “externals” into my systems? 5 Can I not require “externals” to own a license nor software? 6 Can I then know who did what, when and how? Secure Information Sharing Pain Points © Copyright www.watchfulsoftware.com. 2016 All Rights Reserved. 19Monday, February 6, 2017
  • 20. Secure Information Sharing with RightsWATCH 1 Enforces corporate policies and not rely on users to know, understand, reason with or be willing to apply policies to data 2 Allows data to be shared via any media and still uphold corporate policies 3 Does not impact on users workflows, as it does not demand users to click on any extra buttons, pop-ups, or combo boxes 4 Does not require enterprises to onboard, nor manage “external users” identities' 5 Delivers a comprehensive audit trail that enables leveraging SIEM tools to do data analytics © Copyright www.watchfulsoftware.com. 2016 All Rights Reserved. 20Monday, February 6, 2017
  • 21. 1 RightsWATCH implements a Multilevel Security Model to classify information – Company/Scope/Level 2 RightsWATCH classifies the information into your specific levels of classification according to user roles 3 RightsWATCH classifies legacy files, current files and emails, via a policy driven and/or user driven fashion 4 RightsWATCH enforces corporate security policy rules, which can be triggered based on content and context 5 RightsWATCH marks and tags appropriately with tailored headers, footers, watermarks, disclaimers, tags, to protect the organization 6 Relieves the user from the workload and overhead of having to know, understand and apply corporate policies Policy-driven Classification © Copyright www.watchfulsoftware.com. 2016 All Rights Reserved. 21Monday, February 6, 2017

Notes de l'éditeur

  1. If recent history teaches us anything it is that confidential information is not secure in its traditional form and access to information is not controlled at all. So it’s not a question of if your sensitive is going to be leaked, but rather, when it will. We have been witnessing several situations like this in recent times… Other examples: NSA G20 Sony HSBC ...
  2. In 2015, the number of business emails sent and received per user per day totals 122 emails per day. This figure continues to show growth and is expected to average 126 messages sent and received per business user by the end of 2019. In 2015, having an average of about 34 emails sent by employee each day, an average organization of 5k employees sends each year over 38 million emails. Assuming that ONLY 10% of these emails are sensitive in nature, this means that your organization’s exposure (on emails only) is almost 4 million emails each year! http://www.radicati.com/wp/wp-content/uploads/2015/03/Email-Statistics-Report-2015-2019-Executive-Summary.pdf
  3. RightsWATCH is centered on allowing organizations to control and protect their sensitive and confidential information, and to protect against information leakage, by dynamically applying the defined IPC (Information Control Policy) to all types of unstructured information (emails, documents, spreadsheets, presentations, etc.) as that information is created. To successfully implement a policy-driven classification process, your organization must answer a few questions…
  4. how RightWATCH addresses and complements every major security topic/needs of any organization: Data Classification & Labelling: all sensitive data must be classified and labelled accordingly This means that it’s put into its appropriate category depending on it’s criteria This could be based on Content, Context and Metadata Once if falls into a classification, it’s labelled appropriately with headers, footers, watermarks, legal jargon, etc. to protect the organization It should also have its metadata tagged to allow tracking and forensics 2. Legacy Data: this is addressed by RW’s Global Protector feature Global Protector feature has information security policy rules embedded. Thus, companies can use Global Protector classification legacy files according to the defined content, context and metadata aware policy rules established by the corporation. 3. Data Loss Prevention: By deploying RightsWATCH together with a DLP, enterprises will enhance the broad, effective application of protection and governance policies across the entire enterprise IT ecosystem, and throughout all the phases of the data life cycle. 4. Rights Management: RightsWATCH’s policy driven engine allows a company to set up different policy rules to be applied only to designated users or groups of users. Thus, enterprises are able to segregate and decide to which individual users or Active Directory (AD) group of users the policies are to be applied. - Role-based policy rules (RBPR) applicability allows a corporation to “escape” the limitations of a “one-type-fits-all” approach to policy rules. Leveraging RBPR will have the appropriate policy rules applied to the data depending on the organizational unit, project and/or department to which the user belongs. 5. Mobile Devices: RW keeps sensitive information safe in a BYOD world, by extending Information Protection & Control to Smartphones and Tablets such as iPhone, iPad, Android, and BlackBerry platforms 6. Data Analytics: Enterprises running RightsWATCH and SIEM tools are able to leverage them to correlate events and generate dashboards, alarms and reports, knowing in real time who is doing what, when, and how with classified information.
  5. Start with Increased Security and go clockwise. Give examples of features related to each topic, for example: Increased Security: - Protection extended to mobile (addressing the BYOD paradigm and supporting MDM software) Improved Compliance: - Also covers legacy files (with the Global Protector capability) Increased Productivity: - Flexible re-classification (using ITA, for example) Decreased Costs: - Cost of auditing (refer to the Monit console capability)
  6. Explain the data classification process (automatic & user-driven) and the labelling (marks & tags) capabilities of RightsWATCH. Refer the consistent interface of RightsWATCH across all platforms (oulook, office, pdf…) ITA gives the possibility of automatic file re-classification: -> ITA allows automatic update of the classification of Microsoft Office files after a specified date in the future 1. The IT Manager defines the allowed options and permissions for any given level, scope and user role, according to corporate policies 2. The user is able to define the ITA time frame for a given file, according to corporate policies -> ITA is particularly interesting in situations in which classification levels are related to projects/initiatives that have an expiration date and/or whose sensitivity decreases/increases after a specific day in the future -> ITA applies only to and from non-RMS encrypted levels of classification
  7. The User/company has unclassified legacy data files in his/her desktop, shared network drive, or cloud based drive Existing legacy files need to be classified according to the company’s defined information security policy GP Web is an HTTP(s) proxy that enables to automatic classify files, based on the defined content, context and metadata aware policy rules. The RW GP Web is a software component that is installed on an IIS - Internet Information Services web server, and operates independently of any agent and/or plug-in (COM Add-on) running on the endpoint. With the RW GP Web, MS Office files are classified when “leaving” (i.e. being exported/downloaded from) the web server, being the process completely “transparent” to the end user.
  8. Warning Policy Rule: An alert is shown for user educational and training purposes. The user will be able to save the file or send the email Blocking Policy Rule: An alert is shown to the user and, independently of the chosen classification level, the file won’t be able to be saved or the email won’t be sent Tagging for DLP: Uniting RightsWATCH and DLP, enables enterprises to have mechanisms to discover information, monitor its flow and protect it to prevent exfiltration (intentional or inadvertent), to ensure compliance with information security and access policies, and to maintain an audit trail for control and compliance. Combining RightsWATCH classification with a Data Loss Protection system allows enterprises to: Remind users of information management policies as the information is created; Enforce the policies – tag, watermark, append headers, add metadata – before the data leaves the endpoint; Track where what type of unstructured data is being created, and by whom; Streamline information classification and protection across the extended enterprise (BYOD).
  9. Option 1) Remove the recipient(s) from the recipients list, and then send the email Option 2) Downgrade the classification level of the email being sent so that all recipients are able to open and read it Option 3) Ignore the warning and send the email anyway
  10. MDM solutions allows IT to leverage existing enterprise resources such as email, content repository, security certs and identity management, and enables the use of both corporate owner or employees devices in the enterprise. Single Sign-on and PIN Authentication - Users need only enter a single secure password (or PIN) to gain access to all MDM enabled apps. Automatic App Configuration for Users – Distribute mail login and server URL information centrally via MDM. When RightsWATCH is first deployed, users are not required to enter complicated email configuration information. AppTunnel Integration – Secure, app specific VPN connectivity over SSL that is invisible to the user Secure Data Removal - If a phone is lost or stolen, the app and all its data can be selectively wiped Device Pinning – Only allow corporate users to log on to an App on a device that is authorized by the MDM.
  11. The RightsWATCH monitoring interface will continue to exist and be available, except for the “Dashboard” TAB which is in a phase out process until the end of 2015, after which will no longer be supported by Watchful Software RightsWATCH delivers a manual on how to integrate booth tools and a configuration file that allows for the SYS Admin to have predefined metrics and analytics being shown in the SIEM interface Splunk® is able to understand and reason over the logged events from RightsWATCH Splunk® leads the market in providing tools to search, monitor, and analyze machine-generated big dat Enterprises running RightsWATCH and Splunk® are able to leverage Splunk® to correlate events and generate dashboards, alarms and reports, knowing in real time who is doing what, when, and how with classified information. Further support for other SIEM tools, such as ArcSight (from HP), QRadar (IBM), PowerBI (Microsoft), etc… is already planned for future releases
  12. Answers: 1) It can enforce corporate policies and not rely on users to know, understand, reason with or be willing to apply policies to data 2) It allows data to be shared via any media and still uphold corporate policies 3) It does not impact on users workflows, as it does not demand users to click on any extra buttons, pop-ups, or combo boxes 4) It does not require enterprises to onboard, nor manage “external users” identities 5) It does not require “external users” to have to buy or install any RightsWATCH proprietary software 6) It delivers a comprehensive audit trail that enables leveraging SIEM tools to do data analytics