SlideShare une entreprise Scribd logo
1  sur  14
Steal This Data!
Email Is the #1 Channel For Lost Data…
What Can You Do About It?
•   Your Presenter: Allan Cole
•   What Is DLP?
•   Why Do You Need it?
•   Regulations You Face
•   Case Study
•   How To Evaluate DLP
•   Why GalaxyTech
•   Next Steps




Let’s Talk - Agenda
• 15 years of information security, privacy and education
  experience

• Specializes in risk assessment, gap analysis, policy content
  development, awareness training, strategy development and
  implementation.

• Senior Security Architect/Manager for McAfee Inc. for 11
  Years. Designed and lead the implementation of complex
  security solutions for the financial, governmental, and
  healthcare business sectors.




Who Is Allan Cole?
Data loss prevention (DLP) solution is a system that is designed
to detect potential data breach / data ex-filtration transmissions
and prevent them by monitoring, detecting & blocking sensitive
data while in-use (endpoint actions), in-motion (network traffic),
and at-rest (data storage) .




What Is DLP?
• Regulatory Compliance
• Acceptable Use
• Intellectual Property Protection




Why Do You Need DLP?
• Regulatory Compliance
  • HIPAA, GLBA, PCIDSS, SOX Regulations
  • Scan for sensitive information and block infractions
  • Secure business partner communication




Regulatory
Compliance
• Acceptable Use
  • Block offensive content
  • Enforce messaging policy (attachment size, etc)
  • Add legal disclaimers to outgoing mails




Acceptable Use
• Intellectual Property Protection
  • Block messages containing confidential data
  • Prevent email communication with competitor




Intellectual Property
Protection
• HIPAA- Health Insurance Portability and Accountability
  Act
• GLBA- Gramm, Leach, Bliley Act
• PCIDSS- Payment Card Industry Data Security Standards
• SOX- Sarbanes – Oxley Act of 2002




Regulations You Face
Customer Profile
Printing company servicing small business to fortune 500
corporations.
Challenges
The company was being sued by an employee that had been
receiving emails with nudity embedded in the content of the
email. These emails were being sent by another employee
repeatedly and they had no solution to prevent this context from
entering their environment. As a part of the legal settlement they
to had to implement countermeasures to provide this from
happens in the future.


Case Study:
The Problem
Solution
Galaxytech recommend Cisco’s Ironport email security
appliance with DLP and image analysis to ensure their
acceptable use policy was being enforced.




Case Study:
The Solution
Things to think about when evaluating a DLP solution
• The solution must be able to discover and protect confidential data wherever
  it is stored or used
• The solution must monitor all data usage and prevent confidential data from
  exiting any network gateway or endpoint
• Accuracy is critical
• Automate policy enforcement
• Visibility and control over encrypted data
• Safeguard employee privacy
• Proven global scale and architecture




How To Evaluate DLP
Why GalaxyTech ?
• Let’s Review Your Needs
  • Pre Call Form
  • Conference Call With Director of Engineering
• Proof Of Concept




Next Steps

Contenu connexe

Tendances

The journey to Private AI, where Privacy-Preserving ML meets DLT
The journey to Private AI,  where Privacy-Preserving ML meets DLTThe journey to Private AI,  where Privacy-Preserving ML meets DLT
The journey to Private AI, where Privacy-Preserving ML meets DLTOmid Mogharian
 
Top Ten IT Legal Issues for the Enterprise
Top Ten IT Legal Issues for the EnterpriseTop Ten IT Legal Issues for the Enterprise
Top Ten IT Legal Issues for the EnterpriseHawley Troxell
 
Developing a privacy compliance program
Developing a privacy compliance programDeveloping a privacy compliance program
Developing a privacy compliance programRaoul Miller
 
Siskinds | Incident Response Plan
Siskinds | Incident Response PlanSiskinds | Incident Response Plan
Siskinds | Incident Response PlanNext Dimension Inc.
 
Privacy by design for peerlyst meetup
Privacy by design for peerlyst meetupPrivacy by design for peerlyst meetup
Privacy by design for peerlyst meetupIshay Tentser
 
GDPR project board deck (example)
GDPR project board deck (example)GDPR project board deck (example)
GDPR project board deck (example)Tommy Vandepitte
 
Next Dimension: How to create a Cybersecurity Strategy
Next Dimension: How to create a Cybersecurity StrategyNext Dimension: How to create a Cybersecurity Strategy
Next Dimension: How to create a Cybersecurity StrategyNext Dimension Inc.
 
C:\fakepath\wg xcs data_lossprevention
C:\fakepath\wg xcs data_losspreventionC:\fakepath\wg xcs data_lossprevention
C:\fakepath\wg xcs data_losspreventionYustinus Simon
 
Eight principles of consumer data privacy
Eight principles of consumer data privacyEight principles of consumer data privacy
Eight principles of consumer data privacySolix Technologies, Inc
 
Big Data Meets Privacy:De-identification Maturity Model for Benchmarking and ...
Big Data Meets Privacy:De-identification Maturity Model for Benchmarking and ...Big Data Meets Privacy:De-identification Maturity Model for Benchmarking and ...
Big Data Meets Privacy:De-identification Maturity Model for Benchmarking and ...Khaled El Emam
 
TrustArc Webinar: Challenges & Risks Of Data Graveyards
TrustArc Webinar: Challenges & Risks Of Data GraveyardsTrustArc Webinar: Challenges & Risks Of Data Graveyards
TrustArc Webinar: Challenges & Risks Of Data GraveyardsTrustArc
 
Privacy in Computer Vision
Privacy in Computer Vision Privacy in Computer Vision
Privacy in Computer Vision Omid Mogharian
 
How To Eliminate Security Exposures in Office 365 Webinar
How To Eliminate Security Exposures in Office 365 WebinarHow To Eliminate Security Exposures in Office 365 Webinar
How To Eliminate Security Exposures in Office 365 WebinarConcept Searching, Inc
 
Managing Data Breach Communication on The Social Web
Managing Data Breach Communication on The Social WebManaging Data Breach Communication on The Social Web
Managing Data Breach Communication on The Social WebBoyd Neil
 
Ethics and Security of Cloud Computing for Lawyers
Ethics and Security of Cloud Computing for LawyersEthics and Security of Cloud Computing for Lawyers
Ethics and Security of Cloud Computing for LawyersRobert Ambrogi
 
Logikcull Webinar: Preventing the #1 Litigation Risk
Logikcull Webinar: Preventing the #1 Litigation Risk Logikcull Webinar: Preventing the #1 Litigation Risk
Logikcull Webinar: Preventing the #1 Litigation Risk Logikcull.com
 

Tendances (20)

The journey to Private AI, where Privacy-Preserving ML meets DLT
The journey to Private AI,  where Privacy-Preserving ML meets DLTThe journey to Private AI,  where Privacy-Preserving ML meets DLT
The journey to Private AI, where Privacy-Preserving ML meets DLT
 
Top Ten IT Legal Issues for the Enterprise
Top Ten IT Legal Issues for the EnterpriseTop Ten IT Legal Issues for the Enterprise
Top Ten IT Legal Issues for the Enterprise
 
Developing a privacy compliance program
Developing a privacy compliance programDeveloping a privacy compliance program
Developing a privacy compliance program
 
Data lake protection ft 3119 -ver1.0
Data lake protection   ft 3119 -ver1.0Data lake protection   ft 3119 -ver1.0
Data lake protection ft 3119 -ver1.0
 
Siskinds | Incident Response Plan
Siskinds | Incident Response PlanSiskinds | Incident Response Plan
Siskinds | Incident Response Plan
 
Privacy by design for peerlyst meetup
Privacy by design for peerlyst meetupPrivacy by design for peerlyst meetup
Privacy by design for peerlyst meetup
 
GDPR project board deck (example)
GDPR project board deck (example)GDPR project board deck (example)
GDPR project board deck (example)
 
Next Dimension: How to create a Cybersecurity Strategy
Next Dimension: How to create a Cybersecurity StrategyNext Dimension: How to create a Cybersecurity Strategy
Next Dimension: How to create a Cybersecurity Strategy
 
C:\fakepath\wg xcs data_lossprevention
C:\fakepath\wg xcs data_losspreventionC:\fakepath\wg xcs data_lossprevention
C:\fakepath\wg xcs data_lossprevention
 
Eight principles of consumer data privacy
Eight principles of consumer data privacyEight principles of consumer data privacy
Eight principles of consumer data privacy
 
Data Security
Data SecurityData Security
Data Security
 
Big Data Meets Privacy:De-identification Maturity Model for Benchmarking and ...
Big Data Meets Privacy:De-identification Maturity Model for Benchmarking and ...Big Data Meets Privacy:De-identification Maturity Model for Benchmarking and ...
Big Data Meets Privacy:De-identification Maturity Model for Benchmarking and ...
 
TrustArc Webinar: Challenges & Risks Of Data Graveyards
TrustArc Webinar: Challenges & Risks Of Data GraveyardsTrustArc Webinar: Challenges & Risks Of Data Graveyards
TrustArc Webinar: Challenges & Risks Of Data Graveyards
 
Privacy in Computer Vision
Privacy in Computer Vision Privacy in Computer Vision
Privacy in Computer Vision
 
How To Eliminate Security Exposures in Office 365 Webinar
How To Eliminate Security Exposures in Office 365 WebinarHow To Eliminate Security Exposures in Office 365 Webinar
How To Eliminate Security Exposures in Office 365 Webinar
 
Legal Services
Legal ServicesLegal Services
Legal Services
 
IoT_Implemented
IoT_ImplementedIoT_Implemented
IoT_Implemented
 
Managing Data Breach Communication on The Social Web
Managing Data Breach Communication on The Social WebManaging Data Breach Communication on The Social Web
Managing Data Breach Communication on The Social Web
 
Ethics and Security of Cloud Computing for Lawyers
Ethics and Security of Cloud Computing for LawyersEthics and Security of Cloud Computing for Lawyers
Ethics and Security of Cloud Computing for Lawyers
 
Logikcull Webinar: Preventing the #1 Litigation Risk
Logikcull Webinar: Preventing the #1 Litigation Risk Logikcull Webinar: Preventing the #1 Litigation Risk
Logikcull Webinar: Preventing the #1 Litigation Risk
 

En vedette

Estefanía guzmán diapositivas
Estefanía guzmán diapositivasEstefanía guzmán diapositivas
Estefanía guzmán diapositivasPatty Guartazaca
 
20131030 OECD - Competition and value distribution along the food chain. Span...
20131030 OECD - Competition and value distribution along the food chain. Span...20131030 OECD - Competition and value distribution along the food chain. Span...
20131030 OECD - Competition and value distribution along the food chain. Span...FIAB
 
Generacion de computadoras
Generacion de computadorasGeneracion de computadoras
Generacion de computadorasDaita Emoxa
 
Interacción o looping scratch
Interacción o looping   scratchInteracción o looping   scratch
Interacción o looping scratchJuan Alarcon
 
White t shirt party at Cafe des Arts, Nairobi, Kenya
White t shirt party at Cafe des Arts, Nairobi, KenyaWhite t shirt party at Cafe des Arts, Nairobi, Kenya
White t shirt party at Cafe des Arts, Nairobi, KenyaAkinyi Adongo
 
Literacias via dispositivos & info basica cedep-paranoá-df30ago2014-v4
Literacias via dispositivos & info basica cedep-paranoá-df30ago2014-v4Literacias via dispositivos & info basica cedep-paranoá-df30ago2014-v4
Literacias via dispositivos & info basica cedep-paranoá-df30ago2014-v4Benedito Medeiros Neto
 
Lead to-Revenue Best Practices - Driving Pipeline Growth Across the Enterprise
Lead to-Revenue Best Practices - Driving Pipeline Growth Across the EnterpriseLead to-Revenue Best Practices - Driving Pipeline Growth Across the Enterprise
Lead to-Revenue Best Practices - Driving Pipeline Growth Across the EnterpriseMarketoEnterpriseContent
 
Curso Electromagnetismo II
Curso Electromagnetismo IICurso Electromagnetismo II
Curso Electromagnetismo IIrafarrc
 
Phyllosphere agricultura moderna
Phyllosphere agricultura modernaPhyllosphere agricultura moderna
Phyllosphere agricultura modernaCamacho & Meuer
 
MDI - Mandevian Knights
MDI - Mandevian KnightsMDI - Mandevian Knights
MDI - Mandevian KnightsDirecti Group
 
Informe visita al IGAC
Informe visita al IGACInforme visita al IGAC
Informe visita al IGACSergio AkaMosh
 
Elaboración de mapas para publicaciones científicas y documentos de divulgación
Elaboración de mapas para publicaciones científicas y documentos de divulgaciónElaboración de mapas para publicaciones científicas y documentos de divulgación
Elaboración de mapas para publicaciones científicas y documentos de divulgaciónÁngel M. Felicísimo
 
NEW MEDIA IN SPORT (Mobile World Congress 2011)
NEW MEDIA IN SPORT (Mobile World Congress 2011)NEW MEDIA IN SPORT (Mobile World Congress 2011)
NEW MEDIA IN SPORT (Mobile World Congress 2011)Miguel Angel Morcuende
 
El mentoring y la responsabilidad social universitaria
El mentoring y la responsabilidad social universitariaEl mentoring y la responsabilidad social universitaria
El mentoring y la responsabilidad social universitariaLuis Otero
 
Ch. 4 Skin And Body Membranes
Ch. 4   Skin And Body MembranesCh. 4   Skin And Body Membranes
Ch. 4 Skin And Body MembranesWesley McCammon
 

En vedette (20)

Estefanía guzmán diapositivas
Estefanía guzmán diapositivasEstefanía guzmán diapositivas
Estefanía guzmán diapositivas
 
20131030 OECD - Competition and value distribution along the food chain. Span...
20131030 OECD - Competition and value distribution along the food chain. Span...20131030 OECD - Competition and value distribution along the food chain. Span...
20131030 OECD - Competition and value distribution along the food chain. Span...
 
Cross concept 2
Cross concept 2Cross concept 2
Cross concept 2
 
Generacion de computadoras
Generacion de computadorasGeneracion de computadoras
Generacion de computadoras
 
Interacción o looping scratch
Interacción o looping   scratchInteracción o looping   scratch
Interacción o looping scratch
 
InnovArte en KunArte
InnovArte en KunArteInnovArte en KunArte
InnovArte en KunArte
 
White t shirt party at Cafe des Arts, Nairobi, Kenya
White t shirt party at Cafe des Arts, Nairobi, KenyaWhite t shirt party at Cafe des Arts, Nairobi, Kenya
White t shirt party at Cafe des Arts, Nairobi, Kenya
 
Literacias via dispositivos & info basica cedep-paranoá-df30ago2014-v4
Literacias via dispositivos & info basica cedep-paranoá-df30ago2014-v4Literacias via dispositivos & info basica cedep-paranoá-df30ago2014-v4
Literacias via dispositivos & info basica cedep-paranoá-df30ago2014-v4
 
Frases del papa francisco
Frases del papa franciscoFrases del papa francisco
Frases del papa francisco
 
Construyendo la Propuesta de Investigación
Construyendo la Propuesta de Investigación Construyendo la Propuesta de Investigación
Construyendo la Propuesta de Investigación
 
Instituto superior tecnologico privado
Instituto superior tecnologico privadoInstituto superior tecnologico privado
Instituto superior tecnologico privado
 
Lead to-Revenue Best Practices - Driving Pipeline Growth Across the Enterprise
Lead to-Revenue Best Practices - Driving Pipeline Growth Across the EnterpriseLead to-Revenue Best Practices - Driving Pipeline Growth Across the Enterprise
Lead to-Revenue Best Practices - Driving Pipeline Growth Across the Enterprise
 
Curso Electromagnetismo II
Curso Electromagnetismo IICurso Electromagnetismo II
Curso Electromagnetismo II
 
Phyllosphere agricultura moderna
Phyllosphere agricultura modernaPhyllosphere agricultura moderna
Phyllosphere agricultura moderna
 
MDI - Mandevian Knights
MDI - Mandevian KnightsMDI - Mandevian Knights
MDI - Mandevian Knights
 
Informe visita al IGAC
Informe visita al IGACInforme visita al IGAC
Informe visita al IGAC
 
Elaboración de mapas para publicaciones científicas y documentos de divulgación
Elaboración de mapas para publicaciones científicas y documentos de divulgaciónElaboración de mapas para publicaciones científicas y documentos de divulgación
Elaboración de mapas para publicaciones científicas y documentos de divulgación
 
NEW MEDIA IN SPORT (Mobile World Congress 2011)
NEW MEDIA IN SPORT (Mobile World Congress 2011)NEW MEDIA IN SPORT (Mobile World Congress 2011)
NEW MEDIA IN SPORT (Mobile World Congress 2011)
 
El mentoring y la responsabilidad social universitaria
El mentoring y la responsabilidad social universitariaEl mentoring y la responsabilidad social universitaria
El mentoring y la responsabilidad social universitaria
 
Ch. 4 Skin And Body Membranes
Ch. 4   Skin And Body MembranesCh. 4   Skin And Body Membranes
Ch. 4 Skin And Body Membranes
 

Similaire à Steal This Data - Email Security and DLP

GDPR solutions (JS Event 28/2/18) | Greenlight Computers
GDPR solutions (JS Event 28/2/18) | Greenlight Computers GDPR solutions (JS Event 28/2/18) | Greenlight Computers
GDPR solutions (JS Event 28/2/18) | Greenlight Computers Gary Dodson
 
Ciso round table on effective implementation of dlp & data security
Ciso round table on effective implementation of dlp & data securityCiso round table on effective implementation of dlp & data security
Ciso round table on effective implementation of dlp & data securityPriyanka Aash
 
DSS.LV - Principles Of Data Protection - March2015 By Arturs Filatovs
DSS.LV - Principles Of Data Protection - March2015 By Arturs FilatovsDSS.LV - Principles Of Data Protection - March2015 By Arturs Filatovs
DSS.LV - Principles Of Data Protection - March2015 By Arturs FilatovsAndris Soroka
 
Aligning Application Security to Compliance
Aligning Application Security to ComplianceAligning Application Security to Compliance
Aligning Application Security to ComplianceSecurity Innovation
 
Navigating the Complexities of Ediscovery_ Best Practices and Trends with LDM...
Navigating the Complexities of Ediscovery_ Best Practices and Trends with LDM...Navigating the Complexities of Ediscovery_ Best Practices and Trends with LDM...
Navigating the Complexities of Ediscovery_ Best Practices and Trends with LDM...LDM Global
 
Data Loss Prevention from Symantec
Data Loss Prevention from SymantecData Loss Prevention from Symantec
Data Loss Prevention from SymantecArrow ECS UK
 
Dlp Methodology
Dlp MethodologyDlp Methodology
Dlp Methodologytbeckwith
 
FINTECH, CYBERSECURITY AND BUSINESS READINESS
FINTECH, CYBERSECURITY AND BUSINESS READINESS FINTECH, CYBERSECURITY AND BUSINESS READINESS
FINTECH, CYBERSECURITY AND BUSINESS READINESS Andrew_Goss
 
William A. Tanenbaum Association of Benefit Administrators April 2015
William A. Tanenbaum  Association of Benefit Administrators April 2015William A. Tanenbaum  Association of Benefit Administrators April 2015
William A. Tanenbaum Association of Benefit Administrators April 2015William Tanenbaum
 
Leveraging Generative AI & Best practices
Leveraging Generative AI & Best practicesLeveraging Generative AI & Best practices
Leveraging Generative AI & Best practicesDianaGray10
 
Data Loss Prevention (DLP) - Fundamental Concept - Eryk
Data Loss Prevention (DLP) - Fundamental Concept - ErykData Loss Prevention (DLP) - Fundamental Concept - Eryk
Data Loss Prevention (DLP) - Fundamental Concept - ErykEryk Budi Pratama
 
Learning about Security and Compliance in Office 365
Learning about Security and Compliance in Office 365Learning about Security and Compliance in Office 365
Learning about Security and Compliance in Office 365Aptera Inc
 
The EU General Protection Regulation and how Oracle can help
The EU General Protection Regulation and how Oracle can help The EU General Protection Regulation and how Oracle can help
The EU General Protection Regulation and how Oracle can help Niklas Hjorthen
 
Data Loss Prevention in O365
Data Loss Prevention in O365Data Loss Prevention in O365
Data Loss Prevention in O365Don Daubert
 
The Definitive Guide to Data Loss Prevention
The Definitive Guide to Data Loss PreventionThe Definitive Guide to Data Loss Prevention
The Definitive Guide to Data Loss PreventionDigital Guardian
 
Improve IT Security and Compliance with Mainframe Data in Splunk
Improve IT Security and Compliance with Mainframe Data in SplunkImprove IT Security and Compliance with Mainframe Data in Splunk
Improve IT Security and Compliance with Mainframe Data in SplunkPrecisely
 
Encryption and Masking for Sensitive Apache Spark Analytics Addressing CCPA a...
Encryption and Masking for Sensitive Apache Spark Analytics Addressing CCPA a...Encryption and Masking for Sensitive Apache Spark Analytics Addressing CCPA a...
Encryption and Masking for Sensitive Apache Spark Analytics Addressing CCPA a...Databricks
 
Chief Data Officer Agenda Webinar: How CDOs Should Work with Lawyers
Chief Data Officer Agenda Webinar: How CDOs Should Work with LawyersChief Data Officer Agenda Webinar: How CDOs Should Work with Lawyers
Chief Data Officer Agenda Webinar: How CDOs Should Work with LawyersDATAVERSITY
 

Similaire à Steal This Data - Email Security and DLP (20)

BREACHED: Data Centric Security for SAP
BREACHED: Data Centric Security for SAPBREACHED: Data Centric Security for SAP
BREACHED: Data Centric Security for SAP
 
GDPR solutions (JS Event 28/2/18) | Greenlight Computers
GDPR solutions (JS Event 28/2/18) | Greenlight Computers GDPR solutions (JS Event 28/2/18) | Greenlight Computers
GDPR solutions (JS Event 28/2/18) | Greenlight Computers
 
Ciso round table on effective implementation of dlp & data security
Ciso round table on effective implementation of dlp & data securityCiso round table on effective implementation of dlp & data security
Ciso round table on effective implementation of dlp & data security
 
Data Security Explained
Data Security ExplainedData Security Explained
Data Security Explained
 
DSS.LV - Principles Of Data Protection - March2015 By Arturs Filatovs
DSS.LV - Principles Of Data Protection - March2015 By Arturs FilatovsDSS.LV - Principles Of Data Protection - March2015 By Arturs Filatovs
DSS.LV - Principles Of Data Protection - March2015 By Arturs Filatovs
 
Aligning Application Security to Compliance
Aligning Application Security to ComplianceAligning Application Security to Compliance
Aligning Application Security to Compliance
 
Navigating the Complexities of Ediscovery_ Best Practices and Trends with LDM...
Navigating the Complexities of Ediscovery_ Best Practices and Trends with LDM...Navigating the Complexities of Ediscovery_ Best Practices and Trends with LDM...
Navigating the Complexities of Ediscovery_ Best Practices and Trends with LDM...
 
Data Loss Prevention from Symantec
Data Loss Prevention from SymantecData Loss Prevention from Symantec
Data Loss Prevention from Symantec
 
Dlp Methodology
Dlp MethodologyDlp Methodology
Dlp Methodology
 
FINTECH, CYBERSECURITY AND BUSINESS READINESS
FINTECH, CYBERSECURITY AND BUSINESS READINESS FINTECH, CYBERSECURITY AND BUSINESS READINESS
FINTECH, CYBERSECURITY AND BUSINESS READINESS
 
William A. Tanenbaum Association of Benefit Administrators April 2015
William A. Tanenbaum  Association of Benefit Administrators April 2015William A. Tanenbaum  Association of Benefit Administrators April 2015
William A. Tanenbaum Association of Benefit Administrators April 2015
 
Leveraging Generative AI & Best practices
Leveraging Generative AI & Best practicesLeveraging Generative AI & Best practices
Leveraging Generative AI & Best practices
 
Data Loss Prevention (DLP) - Fundamental Concept - Eryk
Data Loss Prevention (DLP) - Fundamental Concept - ErykData Loss Prevention (DLP) - Fundamental Concept - Eryk
Data Loss Prevention (DLP) - Fundamental Concept - Eryk
 
Learning about Security and Compliance in Office 365
Learning about Security and Compliance in Office 365Learning about Security and Compliance in Office 365
Learning about Security and Compliance in Office 365
 
The EU General Protection Regulation and how Oracle can help
The EU General Protection Regulation and how Oracle can help The EU General Protection Regulation and how Oracle can help
The EU General Protection Regulation and how Oracle can help
 
Data Loss Prevention in O365
Data Loss Prevention in O365Data Loss Prevention in O365
Data Loss Prevention in O365
 
The Definitive Guide to Data Loss Prevention
The Definitive Guide to Data Loss PreventionThe Definitive Guide to Data Loss Prevention
The Definitive Guide to Data Loss Prevention
 
Improve IT Security and Compliance with Mainframe Data in Splunk
Improve IT Security and Compliance with Mainframe Data in SplunkImprove IT Security and Compliance with Mainframe Data in Splunk
Improve IT Security and Compliance with Mainframe Data in Splunk
 
Encryption and Masking for Sensitive Apache Spark Analytics Addressing CCPA a...
Encryption and Masking for Sensitive Apache Spark Analytics Addressing CCPA a...Encryption and Masking for Sensitive Apache Spark Analytics Addressing CCPA a...
Encryption and Masking for Sensitive Apache Spark Analytics Addressing CCPA a...
 
Chief Data Officer Agenda Webinar: How CDOs Should Work with Lawyers
Chief Data Officer Agenda Webinar: How CDOs Should Work with LawyersChief Data Officer Agenda Webinar: How CDOs Should Work with Lawyers
Chief Data Officer Agenda Webinar: How CDOs Should Work with Lawyers
 

Dernier

08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfhans926745
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 

Dernier (20)

08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 

Steal This Data - Email Security and DLP

  • 1. Steal This Data! Email Is the #1 Channel For Lost Data… What Can You Do About It?
  • 2. Your Presenter: Allan Cole • What Is DLP? • Why Do You Need it? • Regulations You Face • Case Study • How To Evaluate DLP • Why GalaxyTech • Next Steps Let’s Talk - Agenda
  • 3. • 15 years of information security, privacy and education experience • Specializes in risk assessment, gap analysis, policy content development, awareness training, strategy development and implementation. • Senior Security Architect/Manager for McAfee Inc. for 11 Years. Designed and lead the implementation of complex security solutions for the financial, governmental, and healthcare business sectors. Who Is Allan Cole?
  • 4. Data loss prevention (DLP) solution is a system that is designed to detect potential data breach / data ex-filtration transmissions and prevent them by monitoring, detecting & blocking sensitive data while in-use (endpoint actions), in-motion (network traffic), and at-rest (data storage) . What Is DLP?
  • 5. • Regulatory Compliance • Acceptable Use • Intellectual Property Protection Why Do You Need DLP?
  • 6. • Regulatory Compliance • HIPAA, GLBA, PCIDSS, SOX Regulations • Scan for sensitive information and block infractions • Secure business partner communication Regulatory Compliance
  • 7. • Acceptable Use • Block offensive content • Enforce messaging policy (attachment size, etc) • Add legal disclaimers to outgoing mails Acceptable Use
  • 8. • Intellectual Property Protection • Block messages containing confidential data • Prevent email communication with competitor Intellectual Property Protection
  • 9. • HIPAA- Health Insurance Portability and Accountability Act • GLBA- Gramm, Leach, Bliley Act • PCIDSS- Payment Card Industry Data Security Standards • SOX- Sarbanes – Oxley Act of 2002 Regulations You Face
  • 10. Customer Profile Printing company servicing small business to fortune 500 corporations. Challenges The company was being sued by an employee that had been receiving emails with nudity embedded in the content of the email. These emails were being sent by another employee repeatedly and they had no solution to prevent this context from entering their environment. As a part of the legal settlement they to had to implement countermeasures to provide this from happens in the future. Case Study: The Problem
  • 11. Solution Galaxytech recommend Cisco’s Ironport email security appliance with DLP and image analysis to ensure their acceptable use policy was being enforced. Case Study: The Solution
  • 12. Things to think about when evaluating a DLP solution • The solution must be able to discover and protect confidential data wherever it is stored or used • The solution must monitor all data usage and prevent confidential data from exiting any network gateway or endpoint • Accuracy is critical • Automate policy enforcement • Visibility and control over encrypted data • Safeguard employee privacy • Proven global scale and architecture How To Evaluate DLP
  • 14. • Let’s Review Your Needs • Pre Call Form • Conference Call With Director of Engineering • Proof Of Concept Next Steps

Notes de l'éditeur

  1. Email is the #1 channel for lost data in the enterprise, and the most widely used! Email is essential to every aspect of business. It is a constant balancing act for security professionals to 1) make email usable and 2) make email secure.With the rise of regulations in almost every industry, each business has to resolve the challenge of securing email effectively and affordably. This webinar will go through Email Data Loss Prevention strategies that are you can implement today without slowing down your network or adding to your management overhead.Lets Talk - AgendaWhat is DLP?Why Do You Need DLP?Regulations You FaceCase Study: IronPort and DLPHow To Evaluate DLPWhy Galaxy TechnologiesNext Steps
  2. Allan Cole is an information security, privacy and compliance professional. Allan has over 15 years of information security, privacy and education experience, assisting organizations of all sizes with their information security, privacy and regulatory compliance programs. He specializes in risk assessment, gap analysis, policy content development, awareness training, strategy development and implementation. Prior to coming to Galaxytech, Allan was an independent security consultant to several companies and organizations. Recently, he was performing cyber security awareness training for companies and professionals where he taught information security and privacy policies, standards and procedures.  Prior to being an independent security consultant, Allan was an Senior Security Architect/Manager for McAfee Inc. for 11 Years. There he designed and lead the implementation of complex security solutions for the financial, governmental, and healthcare business sectors. Allan also assisted in the development of McAfee’s best practices for performing security policies gap analysis, risk assessment and aligning policy to business objectives.
  3. In data leakage incidents, sensitive data is disclosed to unauthorized personnel either by malicious intent or inadvertent mistake. Such sensitive data can come in the form of private or company information, intellectual property (IP), financial or patient information, credit-card data, and other information depending on the business and the industry.A comprehensive DLP solution covers data in-use (endpoint), in-motion (network traffic/email) and at rest (data storage). This webinar will focus on data in-motion specifically email transmission.
  4. HIPAA- Health Insurance Portability and Accountability Act – Governs the data transmission and storage of healthcare recordsGLBA- Gramm, Leach, Bliley Act – Many companies collect personal information from their customers, including names, addresses, and phone numbers; bank and credit card account numbers; income and credit histories; and Social Security numbers. The Gramm-Leach-Bliley (GLB) Act requires companies defined under the law as “financial institutions” to ensure the security and confidentiality of this type of information. As part of its implementation of the GLB Act, the Federal Trade Commission (FTC) issued the Safeguards Rule, which requires financial institutions under FTC jurisdiction to have measures in place to keep customer information secure. But safeguarding customer information isn’t just the law. It also makes good business sense. When you show customers you care about the security of their personal information, you increase their confidence in your company. The Rule is available at www.ftc.gov/privacy/privacyinitiatives/safeguards_lr.html.PCI- Payment Card Industry Data Security Standards- PCIDSS applies to just about every industry, e-commerce, retail, Financial/Insurance, Utilities, any one that handle cardholder information for the major debit, credit, prepaid, e-purse, ATM, and POS cards.SOX – Sarbanes-Oxley Act of 2002- is a United States federal law that set new or enhanced standards for all U.S. public company boards, management and public accounting firms.
  5. This is an example of DLP being used to enforce acceptable use policy. They fired the offending employee but still had to implement countermeasures to ensure this wouldn’t happen again as a part of the legal settlement. Galaxytech recommended implementing Cisco Email Security Appliance with DLP and image analysis. Simply put, the company is under the following risks for not tackling the issue of inappropriate content in the workplace:Legal liability imposed by laws and regulationsLoss of reputation and brand imageDecreased user productivityAbuse of corporate networksIn order to deal with pornography and a host of other issues companies typically implement a set of rules called Acceptable Use Policy (AUP). IronPort Image Analysis helps companies enforce AUP by identifying illicit images in the corporate email network. The benefits from this solution include:Identifying policy offendersEducating suspects about company policies and local lawsAvoiding legal liability by displaying best efforts to prevent and correct harassmentPreserving company brand image
  6. This is an example of DLP being used to enforce acceptable use policy. They fired the offending employee but still had to implement countermeasures to ensure this wouldn’t happen again as a part of the legal settlement. Galaxytech recommended implementing Cisco Email Security Appliance with DLP and image analysis. Simply put, the company is under the following risks for not tackling the issue of inappropriate content in the workplace:Legal liability imposed by laws and regulationsLoss of reputation and brand imageDecreased user productivityAbuse of corporate networksIn order to deal with pornography and a host of other issues companies typically implement a set of rules called Acceptable Use Policy (AUP). IronPort Image Analysis helps companies enforce AUP by identifying illicit images in the corporate email network. The benefits from this solution include:Identifying policy offendersEducating suspects about company policies and local lawsAvoiding legal liability by displaying best efforts to prevent and correct harassmentPreserving company brand image
  7. The solution must be able to discover and protect confidential data wherever it is stored or used Statistics show that 1 in 50 files stored on desktops and shared file servers contains confidential data that violates both internal policy and regulatory compliance. What’s more, most companies are not equipped to identify and quarantine this sensitive information. Because stored data is one click away from being data usage, it creates auditing risks and can lead to potential loss of intellectual property. A comprehensive solution that effectively lowers your risk must enable you to accurately discover exposed confidential data stored on file servers, document and email repositories, web sites, relational databases or other data repositories. Once this data is identified, the solution should enable you to protect it by automatically applying data protection policies through integration with data classification, storage tiering, archiving, data encryption and digital rights management (DRM) systems. These capabilities are at the forefront of breach prevention because they can protect confidential information before it has a chance to be transmitted. The solution must monitor all data usage and prevent confidential data from exiting any network gateway or endpointPreventing confidential data from being transmitted outside your organization first requires comprehensive monitoring of multiple exit and endpoints. Email is only part of the problem. Research shows that 50 percent of incidents occur via Internet protocols other than email, such as instant messaging or blogs. Yet some content monitoring solutions only screen email, leaving other Internet protocols uncovered. Storage devices such as USB drives, CD/DVDs and iPods® also provide easily accessible endpoints to which confidential data can be copied. In addition, it’s not enough simply to monitor security violations; the key is to prevent sensitive data from being transmitted by blocking it, in effect closing the door before the proverbial horse is out of the barn. A solution that effectively reduces your risk of data loss across all business processes must combine comprehensive monitoring with prevention. It should accurately monitor and prevent security violations for all data types and all network protocols, including email (SMTP), instant messaging (AOL, MSN, Yahoo), secure Web (HTTP over SSL), FTP, P2P, and generic TCP sessions over any port. An effective Data Loss Prevention solution should also discover and inventory confidential data stored on laptops and desktops and prioritize high risk endpoints for additional protection, and monitor and prevent confidential data from being copied to USB, burnt to CD/DVD, downloaded to local drives, attached to network transmissions, or encrypted or concealed using high risk applications. In addition, make sure your solution can stop transmissions that violate security, acceptable use, and privacy policies before they leave the network. Some organizations elect to begin with monitoring, then take the next step to prevention. However, even if your plan is to phase in prevention capabilities over time, your software vendor should offer both monitoring and prevention today, giving you the flexibility to expand according to your timeline, not the vendor’s timeline.Accuracy is criticalIt is essential to accurately detect every single security policy violation, whenever, wherever, and however it occurs. Most content monitoring solutions only yield approximate identifications which can actually increase your internal costs and risk. Inaccurate detection results in frequent false alarms that cause you to waste time sifting through false positives. It can also have a far worse impact—increased risk from continuing to allow confidential data to flow undetected out through the network. To achieve the highest level of accuracy, your software solution must keep false negatives low to reduce the risk of a data breach. It must also keep false positives low to minimize review time, enable automated enforcement and protect employee privacy. Advanced detection technology is an important element in detection accuracy, but it’s not the only element. The highest level of accuracy in Data Loss Prevention requires three dimensions: content, context and scale.The ability to screen all content types (structured and unstructured data) comprehensively protects all of the organization’s digital assets. For example, consider the structural differences between customer data and intellectual property. Customer data is characterized by a high volume of records with similarly-formatted data elements, whereas intellectual property is often represented by unique files that require entirely different detection technology. The next element is the ability to find the content in any context and automatically assess which contexts present greater risks of data loss. For example, manufacturing specifications sent to a partner is considered a part of an essential business process. However, that same content sent to a competitor is considered data loss. Context may include individuals (senders, recipients, file owners, Window users), location (protocols, file shares, endpoint machines), language (Western and Asian languages), encryption, file format, or media. Finally, the third element to the accuracy solution is the ability to achieve highest accuracy at enterprise scale. The detection technology should deliver at scale across throughput, protected information, and network architecture.Automate policy enforcementAs confidential information breaches are identified, it is incumbent on the security team and others to take corrective action. However, implementing remediation policies without the ability to automate their enforcement can create a tremendous burden for security and human resource teams to manage. For example, without automated policy enforcement it is estimated that teams responsible for alerting offenders and managing remediation would experience an increase of 2-5 times their normal workload. The organization would also experience lower levels of risk reduction as a result of “human” enforcement and inconsistent response that may not always match the severity of the breach. A best-in-class solution should employ intelligent, highly-productive incident response capabilities that enable you to automate policy enforcement with flexibility. For example, by utilizing contemporary technologies such as analytics and workflow, the system should calculate incident severity and automatically deliver the appropriate level of enforcement. By varying the level of response—such as remediate, notify, or prevent—you can better initiate behavioral change, support compliance, and mitigate future risk. Finally, your solution should deliver out-of-the-box industry best practices for incident response and remediation workflow, notification, blocking, quarantine, and encryption. These templates reduce configuration time and put years of experience from other companies to work for you immediately. Safeguard employee privacyThe process of monitoring internal data and employee communications carries with it the responsibility of safeguarding employee privacy. An effective data loss prevention solution can be seen by employees as a powerful tool for maintaining market leadership. It can protect irreplaceable research and development effort, valuable intellectual property, and trade secrets. It can also give employees the added assurance of brand protection by potentially saving the organization from an embarrassing incident. However, if not managed correctly it can also create an environment of employee mistrust—or worse; expose the organization to fines and lawsuits for privacy violations. For example, some solutions violate United States and European Union regulations by collecting all traffic. Others don’t provide role-based access controls to determine which monitors can see what data. Without the appropriate safeguards built into their software, these solutions potentially expose your organization to violations. An effective solution needs to balance the requirement for corporate protection with the need for employee privacy. It should deliver on the following three requirements of Global Employee Privacy Protection: Targeted, policy-based monitoring that allows you to define specific attributes of confidential data Highly accurate detection technology that finds targeted data while at the same time minimizing the risk of false positives Role-based controls that limit viewing of quarantined data to only those individuals who are approved to see it. Proven global scale and architectureTo work effectively, a data loss prevention solution must operate without diminishing system performance or preventing workers from doing their jobs. If yours is a multi-billion dollar international organization, your solution may need to monitor millions of messages per day, dozens of exit points, hundreds of thousands of users, gigabit network speeds, and billions of data records in a single deployment. Solutions that do not scale can cause both false positives and false negatives that drain valuable resources. They can also increase your total cost of ownership by requiring significant investment in hardware. One of the key questions to ask potential providers is, “Is your solution proven in production at FORTUNE 100 customers?” If it can successfully perform in these environments, chances are it is a strong enterprise-scale application. Also, ask about integration partnerships with best-in-class security infrastructure vendors such as Bluecoat, Cisco Ironport, PGP, Ironport, McAfee and Network Appliance. Since these systems control encryption, network access, and communications gateways, interoperability with these systems is critical to delivering high performance.