SlideShare une entreprise Scribd logo
1  sur  33
©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone
Check Point Makes
DLP Work
April 22, 2010
2
2
©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone |
Check Point DLP
Makes data loss prevention work
Agenda
1 What is Data Loss?
2 Key Challenges of DLP
3 Introducing Check Point DLP
4 Summary
3
3
©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone |
Data Loss Prevention
What is DLP?
John.Stevens@yahoo.com
Corporate Strategy
Green World Strategy Plan 2010
E-mail sent to the wrong
recipient, intentionally or by
mistake.
Data breaches have happened to all of us
Company document uploaded
to an external website.
4
4
©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone |
Data Breaches—Headline Examples
Brand Damage
Compliance
Liabilities
Costly Fines
5
5
©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone |
It’s Not Just About
Regulatory Compliance
Chief Compliance
Officer
Chief Security
Officer
Compliance
►Customer data
►Corporate data
►Patient data
Security
►Intellectual property
►Strategic plans
►Internal data
6
6
©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone |
DLP Has Not Yet Been Solved!
Technology
Challenge
Computers can not
reliably understand
human content and
context
IT Staff
Challenge
Burden of incident
handling
Exposure to
sensitive data
7
7
©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone |
Check Point Makes DLP Work
John.Stevens@yahoo.com
Corporate Strategy
John,
Let’s review the corporate strategy in our
morning meeting.
Green World Strategy Plan 2010
‘John’ <john@greenworld.com>
John.Stevens@yahoo.com
Confidential
data sent to the
wrong recipient!
Data Loss Prevention Alert
An email that you have just sent has been
quarantined.
Reason: attached document contains
confidential internal data
The message is being held until further action.
Send , Discard , or Review Issue
User prompted
to take action
User remediates
8
8
©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone |
John,
Let’s review the corporate strategy in
our morning meeting.
Green World Strategy Plan 2010
John.Stevens@yahoo.com
Corporate Strategy
Data Loss Prevention Alert
An email that you have just sent has been
quarantined.
Reason: attached document contains
confidential internal data
The message is being held until further
action.
Send , Discard , or Review Issue
Introducing Check Point
Data Loss Prevention
Educate
Users on corporate
data policies
Enforce
Data loss
business processes
Prevent
Move from detection
to prevention
Check Point Combines Technology
and Processes to Make DLP Work
NEW!
9
9
©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone |
Check Point Solves the DLP Challenge
Technology Challenge
Empowers users to remediate
incidents in real time
IT Staff Challenge
Educates users on DLP policies
without involving IT staff
New UserCheck™ Technology
10
10
©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone |
How Does Check Point DLP Work?
Simple Rule-based Policy Management
MultiSpect™ Detection Engine
Full Network Enforcement
11
11
©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone |
Item
No.
Name Social
Security
Number
Job Title Gross Pay
1 John Smith 987-65-4320 CEO $200,000
2 Kevin Brian 987-65-4221 VP R&D $150,000
3 Margret
White
769-65-7522 VP
Marketing
$153,000
4 Bob Johns 342-62-3323 CFO $140,000
5 Mike Riddle 777-43-4324 COO $180,000
Correlates data from multiple
sources using open language
New MultiSpect™ Technology
MultiSpect Detection Engine
Detects more than 600 file formats
600+ File Formats
250+ Data Types
Over 250 pre-defined
content data types
Detect and recognize proprietary
forms and templates
12
12
©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone |
Simple Rule-based Policy Management
Easily Define Policy to Detect, Prevent or Ask User
13
13
©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone |
Unified Control and Deployment
Centralized Management
For Unified Control
Across the Entire
Security Infrastructure
Data Loss Prevention
14
14
©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone |
Ease-of-Deployment
Dedicated Appliance
Software Blade
Network-based
Inline Solution
On Existing Gateways or
Open Servers
Be Up and Running
Day-1!
DLP-1
15
15
©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone |
Check Point DLP At-A-Glance
Move from Detection to Prevention
Scaling from hundred to thousands
of users
Supporting HTTP, SMTP and FTP protocols
Inline network-based Software Blade
running on any existing Check Point gateway
UserCheck notification using either thin agent or
a returning email to the user
Proactively block intentional and
unintentional data loss
16
16
©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone |
Check Point DLP Summary
Check Point combines technology
and processes to make DLP work
Prevent Data Breaches
Move from detection to prevention
Enforce Data Policies
Across the entire network
Educate and Alert Users
Without involving IT staff
©2010 Check Point Software Technologies Ltd. | [Restricted] ONLY for designated groups and individuals
Thank You!
18
18
©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone |
Check Point DLP in Detail
Check Point DLP User Scenarios
Key DLP Technologies
20
20
©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone |
Check Point DLP at Work
Block Web upload of proprietary
information
Ask user to confirm and remediate
potential breach
Filter communications of
confidential information based on
policy exception
Scenario 1:
Prevent
Scenario 3:
Alert, Ask
and Educate
Scenario 2:
Enforce
21
21
©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone |
Jenn@gmail.com
jsimmons@dlpdemo.com
Code subroutine to work on from home
Preemptively Prevent Data Breaches
Web Upload of Proprietary Information
Software
Developer
Developer
uploads
source code
to file share
to work on
from home
Rights to
files posted
to file-
sharing sites
transfer to
host site
Check Point
DLP blocks
upload and
notifies user
http://mywebuploads.com
22
22
©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone |
Corporate VP sends
M&A contract to
attorney
Filter Based on Corporate
Data Policies
Policy Exception Allows Email to
Pre-selected Recipients
Corporate
Development
VP
jcraicg@mylawyer.com
M&A letter of intent for review
ProjectAtlantisLoI.pdf
Hi James,
We have revised the terms of the acquisition. Attached
is the Letter of Intent for your review.
Thanks,
David
Data Loss Prevention Alert
An email that you have just sent has been
identified as containing sensitive information.
An email that you have just sent has been
allowed based on DLP policy exception.
For additional details, please refer to the
Corporate Data Security Policy
Alert notifies
user of data
policy
23
23
©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone |
Alert, Ask and Educate Users
Check Point Brings User Remediation to DLP
Chief
Financial
Officer
Greg.Smith@ernstyoung.com
Preliminary Financial Statement
Preliminary_financials.pdf
Greg,
Sending you the Q1 preliminary financials for audit.
Thanks,
Matt Gerhart
Chief Financial Officer
ACME Corp.
mattg@acmecorp.com
Company CFO sends
preliminary financial
statement to external
auditor
Check Point Data Loss Prevention Reconsider sending this email (Prelimi… Fri 4/2/2010 3:45 PM
Rachel Greene PCI Audit Status Fri 4/2/2010 1:23 PM
Tom Peters Sales Planning Meeting Thu 3/2/2010 9:45 AM
mattg@dlpdemo.com
Reconsider sending this email (Preli…
Preliminary Financial Statement
The attached message, sent by you, is addressed to an external email
address. The Check Point Data Loss Prevention System determined that it
may contain confidential information.
Email’s attachment Preliminary_financials.pdf appears to contain
financial records. The message is being held until further action.
Send, Discard, or Review Issue
Alert asks owner
of sensitive data
to confirm
communication
Preliminary Financial Statement
mattg@acmecorp.com
Hi,
This information is OK to send to
our outside auditor.
Thanks, Matt
User provides
an explanation
of his request
to send
24
24
©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone |
MultiSpect™ Detection Engine
UserCheck™ provides User
Remediation
Key Technologies
Align DLP Rules to Your Policies
and Processes
25
25
©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone |
Data Loss Prevention Alert
An email that you have just sent
has been quarantined.
Reason: attached document
contains confidential internal
data
The message is being held until
further action.
Send , Discard , or Review Issue
2. User
alert
1. Mail sent or
document
uploaded
3. User
remediation
UserCheck Provides User Remediation
Non-disruptive Real-time Educational
26
26
©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone |
Align With Your Business Processes
Examples
► Spreadsheets with over
500 rows
► More than 5 financial terms
► External recipients in BCC
► More than 10 company
names
► Profanity
Adapts to Your Processes and Environment
Suspicious
Communications
Identify unconventional
business communication
behavior
27
27
©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone |
Multi-data Correlation Prevents Potential Violations
MultiSpect™ Detection Engine
Correlates a
combination of
data types
Prevents sending sensitive data to
wrong recipients
28
28
©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone |
Forms/Partial
Forms
► Recognize
sensitive forms
and templates
Examples
► HR forms / salary / offers
► Financial docs
► Patient records
► Insurance forms
► Bank forms
MultiSpect Form Detection
Insurance claim.pdf
Detect and Recognize Your Proprietary Forms
29
29
©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone |
MultiSpect Open Scripting Language
Custom Data Type
► Open Scripting
Language
► Create completely new
data types
► Enhance existing data
types
► Flexibly tailor DLP to
your environment
Extended Data Type Creation
30
30
©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone |
DLP-1 Appliance Specifications
DLP-1 2571 DLP-1 9571
Performance
Number of users 1,000 5,000
Messages/Hour 70K 350K
Throughput 700 Mbps 2.5 Gbps
Specifications
Storage 500 GB 2 x 1 TB (RAID 1)
NICs 6 Copper 1GbE 10 Copper 1GbE
Optional Bypass card
4 ports - 2 segments
(pre-packaged appliance)
4 ports - 2 segments
(orderable as accessory)
Price
Price year 1
Without bypass card - $14,990
With bypass card- $15,990
$49,990
Add bypass card - $4,995
Annual price year 2+ $7,000 $12,000
31
31
©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone |
Check Point DLP Software Blade
CPSB-DLP-500 CPSB-DLP-1500 CPSB-DLP-U
Recommended Users
(depending on
configuration)*
Up to 500 500-1,500 1,500+
Messages/Hour 5,000-15,000
15,000-
50,000
50,000-
250,000
Max Throughput 700 Mbps 1.5 Gbps 2.5 Gbps
Annual Price $3,000 $7,000 $12,000
32
32
©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone |
DLP-1 9571 Appliances—Accessories
Model Price
Field Replaceable 4-Port, Copper, Bypass Card (for DLP-1
9571, PWR-1 907x, IPS-1)
$4,995
Check Point Replacement parts Kit including one Hard-Drive, one
Power Supply, and one Fan (For DLP-1 9571)
$3,900
Check Point Lights-Out-Management card (for DLP-1 9571,
PWR-1 907x, IPS-1))
$2,500
33
33
©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone |
Check Point DLP Summary
Check Point combines technology
and processes to make DLP work
Prevent Data Breaches
Move from detection to prevention
Enforce Data Policies
Across the entire network
Educate and Alert Users
Without involving IT staff
©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone
Akshay Kumar Sharma
9810387393/9312932966
Thank You!

Contenu connexe

Tendances

Securing Your Data for Your Journey to the Cloud
Securing Your Data for Your Journey to the CloudSecuring Your Data for Your Journey to the Cloud
Securing Your Data for Your Journey to the CloudLiwei Ren任力偉
 
Data Loss Prevention from Symantec
Data Loss Prevention from SymantecData Loss Prevention from Symantec
Data Loss Prevention from SymantecArrow ECS UK
 
Shariyaz abdeen data leakage prevention presentation
Shariyaz abdeen   data leakage prevention presentationShariyaz abdeen   data leakage prevention presentation
Shariyaz abdeen data leakage prevention presentationShariyaz Abdeen
 
2010 za con_stephen_kreusch
2010 za con_stephen_kreusch2010 za con_stephen_kreusch
2010 za con_stephen_kreuschJohan Klerk
 
Data Leakage Presentation
Data Leakage PresentationData Leakage Presentation
Data Leakage PresentationMike Spaulding
 
DLP Data leak prevention
DLP Data leak preventionDLP Data leak prevention
DLP Data leak preventionAriel Evans
 
Ciso round table on effective implementation of dlp & data security
Ciso round table on effective implementation of dlp & data securityCiso round table on effective implementation of dlp & data security
Ciso round table on effective implementation of dlp & data securityPriyanka Aash
 
ISSA DLP Presentation - Oxford Consulting Group
ISSA DLP Presentation - Oxford Consulting GroupISSA DLP Presentation - Oxford Consulting Group
ISSA DLP Presentation - Oxford Consulting Groupaengelbert
 
Information Leakage & DLP
Information Leakage & DLPInformation Leakage & DLP
Information Leakage & DLPYun Lu
 
DLP 101: Help identify and plug information leaks
 DLP 101: Help identify and plug information leaks DLP 101: Help identify and plug information leaks
DLP 101: Help identify and plug information leaksAbhishek Sood
 
Data Security: Why You Need Data Loss Prevention & How to Justify It
Data Security: Why You Need Data Loss Prevention & How to Justify ItData Security: Why You Need Data Loss Prevention & How to Justify It
Data Security: Why You Need Data Loss Prevention & How to Justify ItMarc Crudgington, MBA
 
DLP Executive Overview
DLP Executive OverviewDLP Executive Overview
DLP Executive OverviewKim Jensen
 
apsec 7 Golden Rules Data Leakage Prevention / DLP
apsec 7 Golden Rules Data Leakage Prevention / DLPapsec 7 Golden Rules Data Leakage Prevention / DLP
apsec 7 Golden Rules Data Leakage Prevention / DLPandreasschuster
 
Data Loss Prevention: Challenges, Impacts & Effective Strategies
Data Loss Prevention: Challenges, Impacts & Effective StrategiesData Loss Prevention: Challenges, Impacts & Effective Strategies
Data Loss Prevention: Challenges, Impacts & Effective StrategiesSeccuris Inc.
 
Information and Identity Protection - Data Loss Prevention, Encryption, User ...
Information and Identity Protection - Data Loss Prevention, Encryption, User ...Information and Identity Protection - Data Loss Prevention, Encryption, User ...
Information and Identity Protection - Data Loss Prevention, Encryption, User ...Symantec APJ
 

Tendances (20)

Securing Your Data for Your Journey to the Cloud
Securing Your Data for Your Journey to the CloudSecuring Your Data for Your Journey to the Cloud
Securing Your Data for Your Journey to the Cloud
 
Enterprise API Security & Data Loss Prevention - Intel
Enterprise API Security & Data Loss Prevention - IntelEnterprise API Security & Data Loss Prevention - Intel
Enterprise API Security & Data Loss Prevention - Intel
 
Data Loss Prevention from Symantec
Data Loss Prevention from SymantecData Loss Prevention from Symantec
Data Loss Prevention from Symantec
 
Dlp notes
Dlp notesDlp notes
Dlp notes
 
Shariyaz abdeen data leakage prevention presentation
Shariyaz abdeen   data leakage prevention presentationShariyaz abdeen   data leakage prevention presentation
Shariyaz abdeen data leakage prevention presentation
 
Data Leakage Prevention
Data Leakage Prevention Data Leakage Prevention
Data Leakage Prevention
 
2010 za con_stephen_kreusch
2010 za con_stephen_kreusch2010 za con_stephen_kreusch
2010 za con_stephen_kreusch
 
Data Leakage Presentation
Data Leakage PresentationData Leakage Presentation
Data Leakage Presentation
 
DLP Data leak prevention
DLP Data leak preventionDLP Data leak prevention
DLP Data leak prevention
 
Ciso round table on effective implementation of dlp & data security
Ciso round table on effective implementation of dlp & data securityCiso round table on effective implementation of dlp & data security
Ciso round table on effective implementation of dlp & data security
 
ISSA DLP Presentation - Oxford Consulting Group
ISSA DLP Presentation - Oxford Consulting GroupISSA DLP Presentation - Oxford Consulting Group
ISSA DLP Presentation - Oxford Consulting Group
 
Information Leakage & DLP
Information Leakage & DLPInformation Leakage & DLP
Information Leakage & DLP
 
DLP 101: Help identify and plug information leaks
 DLP 101: Help identify and plug information leaks DLP 101: Help identify and plug information leaks
DLP 101: Help identify and plug information leaks
 
Data Security: Why You Need Data Loss Prevention & How to Justify It
Data Security: Why You Need Data Loss Prevention & How to Justify ItData Security: Why You Need Data Loss Prevention & How to Justify It
Data Security: Why You Need Data Loss Prevention & How to Justify It
 
DLP Executive Overview
DLP Executive OverviewDLP Executive Overview
DLP Executive Overview
 
Data Leakage Prevention - K. K. Mookhey
Data Leakage Prevention - K. K. MookheyData Leakage Prevention - K. K. Mookhey
Data Leakage Prevention - K. K. Mookhey
 
apsec 7 Golden Rules Data Leakage Prevention / DLP
apsec 7 Golden Rules Data Leakage Prevention / DLPapsec 7 Golden Rules Data Leakage Prevention / DLP
apsec 7 Golden Rules Data Leakage Prevention / DLP
 
DLP
DLPDLP
DLP
 
Data Loss Prevention: Challenges, Impacts & Effective Strategies
Data Loss Prevention: Challenges, Impacts & Effective StrategiesData Loss Prevention: Challenges, Impacts & Effective Strategies
Data Loss Prevention: Challenges, Impacts & Effective Strategies
 
Information and Identity Protection - Data Loss Prevention, Encryption, User ...
Information and Identity Protection - Data Loss Prevention, Encryption, User ...Information and Identity Protection - Data Loss Prevention, Encryption, User ...
Information and Identity Protection - Data Loss Prevention, Encryption, User ...
 

Similaire à Check Point Makes DLP Work

Check Point: Defining Your Security blueprint
Check Point: Defining Your Security blueprint Check Point: Defining Your Security blueprint
Check Point: Defining Your Security blueprint Group of company MUK
 
New work style in modern enterprise
New work style in modern enterprise New work style in modern enterprise
New work style in modern enterprise ebuc
 
Microsoft Cloud Solutions for Nonprofits
Microsoft Cloud Solutions for NonprofitsMicrosoft Cloud Solutions for Nonprofits
Microsoft Cloud Solutions for NonprofitsTechSoup
 
Safely Enabling Office 365
Safely Enabling Office 365Safely Enabling Office 365
Safely Enabling Office 365HammerNJ
 
Microsoft Cloud Solutions Webinar April 2022
Microsoft Cloud Solutions Webinar April 2022Microsoft Cloud Solutions Webinar April 2022
Microsoft Cloud Solutions Webinar April 2022TechSoup
 
Performing One Audit Using Zero Trust Principles
Performing One Audit Using Zero Trust PrinciplesPerforming One Audit Using Zero Trust Principles
Performing One Audit Using Zero Trust PrinciplesControlCase
 
Detección y mitigación de amenazas con Check Point
Detección y mitigación de amenazas con Check PointDetección y mitigación de amenazas con Check Point
Detección y mitigación de amenazas con Check PointNextel S.A.
 
Independent Software Assessments
Independent Software AssessmentsIndependent Software Assessments
Independent Software AssessmentsDCG Software Value
 
eFolder Partner Chat Webinar – "How We Minimized Risk": An eFolder and OpenDN...
eFolder Partner Chat Webinar – "How We Minimized Risk": An eFolder and OpenDN...eFolder Partner Chat Webinar – "How We Minimized Risk": An eFolder and OpenDN...
eFolder Partner Chat Webinar – "How We Minimized Risk": An eFolder and OpenDN...eFolder
 
DotComGuy MSP Presentation
DotComGuy MSP PresentationDotComGuy MSP Presentation
DotComGuy MSP PresentationDotComGuy
 
Check point sandblast threat-emulation-customer-success-presentation
Check point sandblast threat-emulation-customer-success-presentationCheck point sandblast threat-emulation-customer-success-presentation
Check point sandblast threat-emulation-customer-success-presentationNattira Panbun
 
Meeting your Compliance objectives with ease and without incurring a high cost
 Meeting your Compliance objectives with ease and without incurring a high cost  Meeting your Compliance objectives with ease and without incurring a high cost
Meeting your Compliance objectives with ease and without incurring a high cost Mithi Software Technologies Pvt Ltd
 
Security Management in the Cloud
Security Management in the CloudSecurity Management in the Cloud
Security Management in the CloudGaryArdito
 
Laser App Conference 2017 - Sid Yenamandra, Entreda
Laser App Conference 2017 - Sid Yenamandra, EntredaLaser App Conference 2017 - Sid Yenamandra, Entreda
Laser App Conference 2017 - Sid Yenamandra, EntredaLaser App Software
 
Didiet Cybersecurity Consultant Portfolio - English
Didiet Cybersecurity Consultant Portfolio - EnglishDidiet Cybersecurity Consultant Portfolio - English
Didiet Cybersecurity Consultant Portfolio - EnglishDidiet Kusumadihardja
 
Lync Business Value With UC And Lync
Lync Business Value With UC And LyncLync Business Value With UC And Lync
Lync Business Value With UC And Lyncteknologik
 

Similaire à Check Point Makes DLP Work (20)

Check Point: Defining Your Security blueprint
Check Point: Defining Your Security blueprint Check Point: Defining Your Security blueprint
Check Point: Defining Your Security blueprint
 
New work style in modern enterprise
New work style in modern enterprise New work style in modern enterprise
New work style in modern enterprise
 
Microsoft Cloud Solutions for Nonprofits
Microsoft Cloud Solutions for NonprofitsMicrosoft Cloud Solutions for Nonprofits
Microsoft Cloud Solutions for Nonprofits
 
Optix company profile
Optix company profileOptix company profile
Optix company profile
 
AdeyemiOlaleye_updated
AdeyemiOlaleye_updatedAdeyemiOlaleye_updated
AdeyemiOlaleye_updated
 
Safely Enabling Office 365
Safely Enabling Office 365Safely Enabling Office 365
Safely Enabling Office 365
 
Microsoft Cloud Solutions Webinar April 2022
Microsoft Cloud Solutions Webinar April 2022Microsoft Cloud Solutions Webinar April 2022
Microsoft Cloud Solutions Webinar April 2022
 
Performing One Audit Using Zero Trust Principles
Performing One Audit Using Zero Trust PrinciplesPerforming One Audit Using Zero Trust Principles
Performing One Audit Using Zero Trust Principles
 
Detección y mitigación de amenazas con Check Point
Detección y mitigación de amenazas con Check PointDetección y mitigación de amenazas con Check Point
Detección y mitigación de amenazas con Check Point
 
Independent Software Assessments
Independent Software AssessmentsIndependent Software Assessments
Independent Software Assessments
 
eFolder Partner Chat Webinar – "How We Minimized Risk": An eFolder and OpenDN...
eFolder Partner Chat Webinar – "How We Minimized Risk": An eFolder and OpenDN...eFolder Partner Chat Webinar – "How We Minimized Risk": An eFolder and OpenDN...
eFolder Partner Chat Webinar – "How We Minimized Risk": An eFolder and OpenDN...
 
Policy for PDO
Policy for PDOPolicy for PDO
Policy for PDO
 
DotComGuy MSP Presentation
DotComGuy MSP PresentationDotComGuy MSP Presentation
DotComGuy MSP Presentation
 
Check point sandblast threat-emulation-customer-success-presentation
Check point sandblast threat-emulation-customer-success-presentationCheck point sandblast threat-emulation-customer-success-presentation
Check point sandblast threat-emulation-customer-success-presentation
 
Meeting your Compliance objectives with ease and without incurring a high cost
 Meeting your Compliance objectives with ease and without incurring a high cost  Meeting your Compliance objectives with ease and without incurring a high cost
Meeting your Compliance objectives with ease and without incurring a high cost
 
Security Management in the Cloud
Security Management in the CloudSecurity Management in the Cloud
Security Management in the Cloud
 
NG-Brochure
NG-BrochureNG-Brochure
NG-Brochure
 
Laser App Conference 2017 - Sid Yenamandra, Entreda
Laser App Conference 2017 - Sid Yenamandra, EntredaLaser App Conference 2017 - Sid Yenamandra, Entreda
Laser App Conference 2017 - Sid Yenamandra, Entreda
 
Didiet Cybersecurity Consultant Portfolio - English
Didiet Cybersecurity Consultant Portfolio - EnglishDidiet Cybersecurity Consultant Portfolio - English
Didiet Cybersecurity Consultant Portfolio - English
 
Lync Business Value With UC And Lync
Lync Business Value With UC And LyncLync Business Value With UC And Lync
Lync Business Value With UC And Lync
 

Plus de Medley India Infosolution Pvt Ltd

Plus de Medley India Infosolution Pvt Ltd (18)

Cashing in on better wi fi within the retail environment
Cashing in on better wi fi within the retail environmentCashing in on better wi fi within the retail environment
Cashing in on better wi fi within the retail environment
 
MMPL corporate overview mail
MMPL corporate overview mailMMPL corporate overview mail
MMPL corporate overview mail
 
Ruckus brief customer_Medley
Ruckus brief customer_MedleyRuckus brief customer_Medley
Ruckus brief customer_Medley
 
Mmpl panasonic Video Conferencing overview
Mmpl panasonic Video Conferencing overviewMmpl panasonic Video Conferencing overview
Mmpl panasonic Video Conferencing overview
 
Education slides_MMPL
Education slides_MMPLEducation slides_MMPL
Education slides_MMPL
 
7982 overview
7982 overview7982 overview
7982 overview
 
Propalms network case studies
Propalms network case studiesPropalms network case studies
Propalms network case studies
 
Mmpl education overview_ver1
Mmpl education overview_ver1Mmpl education overview_ver1
Mmpl education overview_ver1
 
Ruckus Corporate Overview
Ruckus Corporate OverviewRuckus Corporate Overview
Ruckus Corporate Overview
 
Secure Wireless for Higher education
Secure Wireless for Higher educationSecure Wireless for Higher education
Secure Wireless for Higher education
 
XTM moving security forward
XTM moving security forwardXTM moving security forward
XTM moving security forward
 
LG LED Projector
LG LED ProjectorLG LED Projector
LG LED Projector
 
LG display soltuion for retail segment
LG display soltuion for retail segmentLG display soltuion for retail segment
LG display soltuion for retail segment
 
Swiftpage for ACT presentation
Swiftpage for ACT presentationSwiftpage for ACT presentation
Swiftpage for ACT presentation
 
Swiftpage empowering E marketing
Swiftpage empowering E marketingSwiftpage empowering E marketing
Swiftpage empowering E marketing
 
Watch guard reputation enabled defense
Watch guard reputation enabled defenseWatch guard reputation enabled defense
Watch guard reputation enabled defense
 
MMPL Education overview
MMPL Education overviewMMPL Education overview
MMPL Education overview
 
MMPL Watchguard overview
MMPL Watchguard overviewMMPL Watchguard overview
MMPL Watchguard overview
 

Dernier

Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 

Dernier (20)

Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 

Check Point Makes DLP Work

  • 1. ©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone Check Point Makes DLP Work April 22, 2010
  • 2. 2 2 ©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | Check Point DLP Makes data loss prevention work Agenda 1 What is Data Loss? 2 Key Challenges of DLP 3 Introducing Check Point DLP 4 Summary
  • 3. 3 3 ©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | Data Loss Prevention What is DLP? John.Stevens@yahoo.com Corporate Strategy Green World Strategy Plan 2010 E-mail sent to the wrong recipient, intentionally or by mistake. Data breaches have happened to all of us Company document uploaded to an external website.
  • 4. 4 4 ©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | Data Breaches—Headline Examples Brand Damage Compliance Liabilities Costly Fines
  • 5. 5 5 ©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | It’s Not Just About Regulatory Compliance Chief Compliance Officer Chief Security Officer Compliance ►Customer data ►Corporate data ►Patient data Security ►Intellectual property ►Strategic plans ►Internal data
  • 6. 6 6 ©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | DLP Has Not Yet Been Solved! Technology Challenge Computers can not reliably understand human content and context IT Staff Challenge Burden of incident handling Exposure to sensitive data
  • 7. 7 7 ©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | Check Point Makes DLP Work John.Stevens@yahoo.com Corporate Strategy John, Let’s review the corporate strategy in our morning meeting. Green World Strategy Plan 2010 ‘John’ <john@greenworld.com> John.Stevens@yahoo.com Confidential data sent to the wrong recipient! Data Loss Prevention Alert An email that you have just sent has been quarantined. Reason: attached document contains confidential internal data The message is being held until further action. Send , Discard , or Review Issue User prompted to take action User remediates
  • 8. 8 8 ©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | John, Let’s review the corporate strategy in our morning meeting. Green World Strategy Plan 2010 John.Stevens@yahoo.com Corporate Strategy Data Loss Prevention Alert An email that you have just sent has been quarantined. Reason: attached document contains confidential internal data The message is being held until further action. Send , Discard , or Review Issue Introducing Check Point Data Loss Prevention Educate Users on corporate data policies Enforce Data loss business processes Prevent Move from detection to prevention Check Point Combines Technology and Processes to Make DLP Work NEW!
  • 9. 9 9 ©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | Check Point Solves the DLP Challenge Technology Challenge Empowers users to remediate incidents in real time IT Staff Challenge Educates users on DLP policies without involving IT staff New UserCheck™ Technology
  • 10. 10 10 ©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | How Does Check Point DLP Work? Simple Rule-based Policy Management MultiSpect™ Detection Engine Full Network Enforcement
  • 11. 11 11 ©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | Item No. Name Social Security Number Job Title Gross Pay 1 John Smith 987-65-4320 CEO $200,000 2 Kevin Brian 987-65-4221 VP R&D $150,000 3 Margret White 769-65-7522 VP Marketing $153,000 4 Bob Johns 342-62-3323 CFO $140,000 5 Mike Riddle 777-43-4324 COO $180,000 Correlates data from multiple sources using open language New MultiSpect™ Technology MultiSpect Detection Engine Detects more than 600 file formats 600+ File Formats 250+ Data Types Over 250 pre-defined content data types Detect and recognize proprietary forms and templates
  • 12. 12 12 ©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | Simple Rule-based Policy Management Easily Define Policy to Detect, Prevent or Ask User
  • 13. 13 13 ©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | Unified Control and Deployment Centralized Management For Unified Control Across the Entire Security Infrastructure Data Loss Prevention
  • 14. 14 14 ©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | Ease-of-Deployment Dedicated Appliance Software Blade Network-based Inline Solution On Existing Gateways or Open Servers Be Up and Running Day-1! DLP-1
  • 15. 15 15 ©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | Check Point DLP At-A-Glance Move from Detection to Prevention Scaling from hundred to thousands of users Supporting HTTP, SMTP and FTP protocols Inline network-based Software Blade running on any existing Check Point gateway UserCheck notification using either thin agent or a returning email to the user Proactively block intentional and unintentional data loss
  • 16. 16 16 ©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | Check Point DLP Summary Check Point combines technology and processes to make DLP work Prevent Data Breaches Move from detection to prevention Enforce Data Policies Across the entire network Educate and Alert Users Without involving IT staff
  • 17. ©2010 Check Point Software Technologies Ltd. | [Restricted] ONLY for designated groups and individuals Thank You!
  • 18. 18 18 ©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | Check Point DLP in Detail Check Point DLP User Scenarios Key DLP Technologies
  • 19. 20 20 ©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | Check Point DLP at Work Block Web upload of proprietary information Ask user to confirm and remediate potential breach Filter communications of confidential information based on policy exception Scenario 1: Prevent Scenario 3: Alert, Ask and Educate Scenario 2: Enforce
  • 20. 21 21 ©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | Jenn@gmail.com jsimmons@dlpdemo.com Code subroutine to work on from home Preemptively Prevent Data Breaches Web Upload of Proprietary Information Software Developer Developer uploads source code to file share to work on from home Rights to files posted to file- sharing sites transfer to host site Check Point DLP blocks upload and notifies user http://mywebuploads.com
  • 21. 22 22 ©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | Corporate VP sends M&A contract to attorney Filter Based on Corporate Data Policies Policy Exception Allows Email to Pre-selected Recipients Corporate Development VP jcraicg@mylawyer.com M&A letter of intent for review ProjectAtlantisLoI.pdf Hi James, We have revised the terms of the acquisition. Attached is the Letter of Intent for your review. Thanks, David Data Loss Prevention Alert An email that you have just sent has been identified as containing sensitive information. An email that you have just sent has been allowed based on DLP policy exception. For additional details, please refer to the Corporate Data Security Policy Alert notifies user of data policy
  • 22. 23 23 ©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | Alert, Ask and Educate Users Check Point Brings User Remediation to DLP Chief Financial Officer Greg.Smith@ernstyoung.com Preliminary Financial Statement Preliminary_financials.pdf Greg, Sending you the Q1 preliminary financials for audit. Thanks, Matt Gerhart Chief Financial Officer ACME Corp. mattg@acmecorp.com Company CFO sends preliminary financial statement to external auditor Check Point Data Loss Prevention Reconsider sending this email (Prelimi… Fri 4/2/2010 3:45 PM Rachel Greene PCI Audit Status Fri 4/2/2010 1:23 PM Tom Peters Sales Planning Meeting Thu 3/2/2010 9:45 AM mattg@dlpdemo.com Reconsider sending this email (Preli… Preliminary Financial Statement The attached message, sent by you, is addressed to an external email address. The Check Point Data Loss Prevention System determined that it may contain confidential information. Email’s attachment Preliminary_financials.pdf appears to contain financial records. The message is being held until further action. Send, Discard, or Review Issue Alert asks owner of sensitive data to confirm communication Preliminary Financial Statement mattg@acmecorp.com Hi, This information is OK to send to our outside auditor. Thanks, Matt User provides an explanation of his request to send
  • 23. 24 24 ©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | MultiSpect™ Detection Engine UserCheck™ provides User Remediation Key Technologies Align DLP Rules to Your Policies and Processes
  • 24. 25 25 ©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | Data Loss Prevention Alert An email that you have just sent has been quarantined. Reason: attached document contains confidential internal data The message is being held until further action. Send , Discard , or Review Issue 2. User alert 1. Mail sent or document uploaded 3. User remediation UserCheck Provides User Remediation Non-disruptive Real-time Educational
  • 25. 26 26 ©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | Align With Your Business Processes Examples ► Spreadsheets with over 500 rows ► More than 5 financial terms ► External recipients in BCC ► More than 10 company names ► Profanity Adapts to Your Processes and Environment Suspicious Communications Identify unconventional business communication behavior
  • 26. 27 27 ©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | Multi-data Correlation Prevents Potential Violations MultiSpect™ Detection Engine Correlates a combination of data types Prevents sending sensitive data to wrong recipients
  • 27. 28 28 ©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | Forms/Partial Forms ► Recognize sensitive forms and templates Examples ► HR forms / salary / offers ► Financial docs ► Patient records ► Insurance forms ► Bank forms MultiSpect Form Detection Insurance claim.pdf Detect and Recognize Your Proprietary Forms
  • 28. 29 29 ©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | MultiSpect Open Scripting Language Custom Data Type ► Open Scripting Language ► Create completely new data types ► Enhance existing data types ► Flexibly tailor DLP to your environment Extended Data Type Creation
  • 29. 30 30 ©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | DLP-1 Appliance Specifications DLP-1 2571 DLP-1 9571 Performance Number of users 1,000 5,000 Messages/Hour 70K 350K Throughput 700 Mbps 2.5 Gbps Specifications Storage 500 GB 2 x 1 TB (RAID 1) NICs 6 Copper 1GbE 10 Copper 1GbE Optional Bypass card 4 ports - 2 segments (pre-packaged appliance) 4 ports - 2 segments (orderable as accessory) Price Price year 1 Without bypass card - $14,990 With bypass card- $15,990 $49,990 Add bypass card - $4,995 Annual price year 2+ $7,000 $12,000
  • 30. 31 31 ©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | Check Point DLP Software Blade CPSB-DLP-500 CPSB-DLP-1500 CPSB-DLP-U Recommended Users (depending on configuration)* Up to 500 500-1,500 1,500+ Messages/Hour 5,000-15,000 15,000- 50,000 50,000- 250,000 Max Throughput 700 Mbps 1.5 Gbps 2.5 Gbps Annual Price $3,000 $7,000 $12,000
  • 31. 32 32 ©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | DLP-1 9571 Appliances—Accessories Model Price Field Replaceable 4-Port, Copper, Bypass Card (for DLP-1 9571, PWR-1 907x, IPS-1) $4,995 Check Point Replacement parts Kit including one Hard-Drive, one Power Supply, and one Fan (For DLP-1 9571) $3,900 Check Point Lights-Out-Management card (for DLP-1 9571, PWR-1 907x, IPS-1)) $2,500
  • 32. 33 33 ©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | Check Point DLP Summary Check Point combines technology and processes to make DLP work Prevent Data Breaches Move from detection to prevention Enforce Data Policies Across the entire network Educate and Alert Users Without involving IT staff
  • 33. ©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone Akshay Kumar Sharma 9810387393/9312932966 Thank You!