Preview only show first 10 pages with watermark. For full document please download

Similar Pages

   EMBED


Share

Transcript

Automating policy enforcement to prevent endpoint data loss IBM Data Security Services for endpoint data protection—endpoint data loss prevention solution Protecting your business value from growing data losses Today, global business trends in worker mobility, data sharing and collaboration, driven by new technologies, contribute to strong growth in some of the world’s most profitable companies. But, increased growth comes with increased risk and cost to companies as associated data losses, misuse and business-process compromises become a growing problem. Highlights Publicly embarrassing corporate expertise and proven data losses and dramatic data enforcement of data protection methodologies to deploy, privacy breaches as well as rising policy support and manage a complete information-related crime—such as integrated security solution corporate IP theft and online identity- ■ Facilitate policy-based ■ Automate discovery of sensitive content to protect business value ■ Consistently enforce required corporate and regulatory based fraud—demonstrate the ■ Benefit from lower total cost of security strategy and technology. To deployments using an extensible address these incidents, companies platform and scalable solutions now need to protect their critical data security policies while raising user awareness and voluntary compliance of policies ■ Leverage market-leading limitations of traditional information ownership and accelerated at the “point-of-use”—employee ■ Ensure optimized protection PCs, laptops, USB-attached storage through professional security devices and other endpoint devices. services, managed security IBM offers an endpoint data loss services and support desk prevention solution that represents endpoint data loss prevention an evolutionary combination of technologies, services technologies and services to help companies discover and classify internal hard disk or different externally sensitive data, monitor data usage attached media to protect data on lost and control and block high-risk or stolen devices. And, it allows you activities. IBM Data Security Services to perform forensics for investigative ensure that your organization benefits purposes. Ultimately, endpoint security application controls and block from the latest endpoint data loss reduces the risk of data loss more unauthorized behavior prevention technologies—to detect directly than security at any other point. and mitigate the risks associated with • Discover sensitive data at rest across endpoints including laptops, desktops, file servers and more • Monitor data usage, configure • Define and deliver reliable management and support services sharing sensitive data while enhancing Delivering end-to-end integrated collaboration and business agility. security solutions for endpoint IBM Data Security Services data protection address the challenges associated Reducing risk—and enhancing business Data generates new value when with deploying a comprehensive processes—through the endpoint it is used. Although usage creates solution by managing cost and Unprotected endpoint devices are risk, appropriate manipulation scope, accelerating implementation, like open doors into your sensitive increases the value contribution leveraging IBM information security information. You need to guard the of an organization’s most valuable expertise and eliminating the need data on those devices—whether asset—data. for additional headcount. You need to protect data in every IBM can create a security frame- Enabling endpoint data loss prevention stage of its lifecycle—from creation work to help secure your information as part of a holistic solution and modification to distribution and throughout the extended enterprise. The IBM approach to data loss preven- archiving. And you have to secure data IBM also provides application tion is to disperse control across three no matter what form it takes or where it integration for ease-of-compliance main areas of the IT environment. is stored. Endpoint data loss prevention reporting and policy administration. By dispersing encryption, content enables you to make information more The resulting solution ensures that inspection, user monitoring and access readily accessible to authorized users, you can collaborate while mitigating control management functionalities to help ensure consistent collaboration risk associated with data transfer throughout the infrastructure, IBM can while encouraging and enforcing the and usage. help identify and deploy mitigating the data is at rest, in use or in motion. responsible use of corporate data to controls for greater data protection improve compliance with regulations IBM designs endpoint data loss across the extended enterprise at a and policies. prevention solutions with your needs lower total cost. in mind to: Endpoint data security gives you wide coverage in terms of geo- IBM data loss prevention solutions • Establish an enterprise data are designed to help you achieve graphical range, modification of end loss prevention framework for your company goals while protecting user behavior and visibility into data your organization against sophisticated and complex IT usage. It offers strong preventative control without interfering with business processes. Endpoint data loss prevention enables you to encrypt sensitive data files on the endpoint • Deploy market-leading technology using a proven implementation methodology • Translate and enforce corporate data classification and management policies and privileged user threats that can lead to the loss of business value. • Assess the risk associated with the sharing of sensitive data and define effective data security policies • Implement automated data security policies uniformly across the enterprise • Build out and deploy preventative warnings and justifications enforced by policies to train and deter end users before they take risky actions • Deploy alert and block controls and audit collections of high-risk behavior, ultimately preventing costly and Figure 1: The IBM approach to data loss prevention disperses control across three main damaging data loss incidents areas in the IT environment. IBM partners with Verdasys Inc., Leveraging endpoint technology to solution can transparently encrypt data combining professional and managed address a broad set of information files and/or e-mail to bring information security services with comprehensive security risks transfer into compliance automatically. technology to provide an integrated IBM’s data-centric approach to end- The IBM endpoint security process is endpoint data loss prevention solution. point security is specifically designed designed to: This partnership ensures that every to prevent data from leaving the enterprise through three possible paths of exit—via devices, applications or step of the solution lifecycle is backed • Establish a secure virtual perimeter around an enterprise network connections. In cases where • Discover and classify sensitive data corporate policy or regulations require • Gain visibility to how sensitive data encryption of all mobile data, the by both proven experience and marketleading technology. Reducing your management headache is used by employees, contractors, and optimizing your technology partners and outsourcers investment IBM uses Verdasys Digital DATA-CENTRIC SECURITY Where and What is Sensitive Data DISCOVERY Desktops Servers Storage CLASSIFICATION Tagging CONTENT Similarity Keyword Dictionary CONTEXT Server Application File Type User Guardian technology to power What is the User Doing With it? UNSTRUCTURED DATA Read Write Move Print Burn Copy/Paste Upload Where is the Data Going? Devices ALERT Detection WARN Awareness Applications Networks STRUCTURED DATA View Delete Modify Apply Risk Appropriate Policy and Actions PROMPT Intent ENCRYPT Protection BLOCK Prevention Email MASK Need to Know solution. An integrated framework and multi-function unified agent enables companies to intelligently and adaptively address the broadest set of information risk challenges in today’s highly collaborative and mobile business environment. CONTINUOUS AUDIT LOGGING Figure 2: IBM Data Security Services uses proven technology and services to secure data throughout its lifecycle. its endpoint data loss prevention Digital Guardian Integrated Data Security Platform drives on laptops, desktops, or external devices and CDs/DVD. Add-On Modules Application Logging and Dynamic Masking Adaptive E-Mail Encryption Adaptive File Encryption File encryption eliminates the need Adaptive Content Inspection for multiple encryption tools to consistently enforce data security Multi-Function Agents Desktop Agents Windows, Linux Central Management Server Trust Verification Agent Win, Linux, Citrix, Unix policy, reduce the risk of data loss Server Agents Win, Linux, Citrix Digital Guardian Server and Management Console (Windows) from stolen laptops and increase regulatory compliance. • E-mail Encryption—Provides patented, policy-driven encryption of e-mail content and attachments, operates transparently and includes automatic key management. Integrated e-mail Figure 3: Verdasys Digital Guardian Integrated Data Security Platform encryption enforces security policy on Digital Guardian ensures that data, printing, and CD subsystems, offering network and Web mail systems both applications and usage of information complete visibility into data activity, on- or offline. This eliminates the need are governed, controlled, audited location and movement. for separate mail encryption tools, and, when necessary, automatically encrypted across infrastructure and while enforcing consistent security • Policy Enforcement—Protect your policies across the enterprise and business process boundaries through data through configurable policies beyond to your partners, suppliers, the following capabilities: delivered from the central server. contractors and outsourcers. Policies can vary from broad to • Actionable Data Discovery and discrete and enable full control • Trust Verification Agents (TVA)— Classification—Data classification over data usage at the “point of Establish a secure community of trust polices are created and enforced by use” both on- and offline. Rules are between the data owner, provider and hardened and invisible endpoint subsets of policies and warn users user. It helps ensure that sensitive data agents. Context-based classification of impending high-risk activities is accessed only by trusted machines allows you to discover and classify and policy violations before action and is subject to corporate security files based on source application, is taken, giving users the ability policies. TVA creates a “virtual” server, path, file type and user to alter their behavior without network access control solution across identity. Content-based classification interrupting business processes. your extended enterprise without allows you to discover and classify Rules can also block user actions requiring the redefinition of networks files based on keyword or entity outright when policy violations are and servers. The community-of-trust content pattern matching and repeated or severe. Administrators solution enables organizations to document similarity. are automatically alerted to policy enforce data security policy across violations, and all activities offshore locations, suppliers and are logged. outsource providers. • Monitoring Data Movement and User Activity—Agents utilize integrated context and content monitoring • File Encryption—Delivers automatic, • Application Logging and Masking— to record all user activity related policy-driven encryption of sensitive Enforces field-level access control to system operations that interact files located on or copied to local through data masking and meets with the file, networking, clipboard, and environmental information audit logging for legacy (3270 for individual or group activity. with you to define your data loss terminal emulators), client server Efficiently move through aggregated prevention policies and deployment and Web- based applications. It log and audit information to focus on priorities for implementation and saves millions of dollars in recoding meaningful data, reducing the cost testing. IBM will also utilize a number costs while extending data security and time of analyzing information of predefined rules and policies to to applications that lack the native and creating effective forensic reports. help accelerate solution deployment data access and logging capabilities • • Create your Policy Design by working regulatory requirements through throughout large enterprises. necessary to protect data and ensure The IBM endpoint data loss prevention regulatory compliance. solution can help prevent the loss of • Implement all components of sensitive information, applications and a solution in your environment Reporting for Audit and Decision processes essential to maintaining successfully by providing the Support—Provides comprehensive market value, proprietary assets, following Implementation Services: reporting capabilities that include intellectual property and the reputation aggregated views of enterprise data and process integrity of your global usage, trend reporting, group or enterprise. individual reporting, data-at-rest • Implementation planning and project management • Solution architecture and design reports, compliance reports and Deploying your endpoint data loss operational reports. All report types prevention solution—IBM understands offer high-level views and granular data security at the enterprise level. • Testing of primary components details. The reporting engine includes Our consultants and specialists have • an easy query interface for the experience with a wide range of creation of custom reports. Digital industry solutions and IT architectures Guardian’s actionable reporting to help you adopt an endpoint data loss offers visibility into the state of data prevention solution. Our professional • Project documentation risk across the entire organization. support services can help you: • Help desk deployment assistance Drill-down capabilities offer visibility to data movement and usage at an • Installation of primary components Pilot deployments to test in your live environment • Product roll-out of controls to all endpoints • Technical training and • Conduct a Requirements and Planning transfer skills individual level. Compliance reports Workshop to help you define your include predefined data usage environment, business, compliance reports for PCI, HIPAA, GLB and and IT requirements, prepare for • Provide a single point of contact SOX regulations. implementation of controls and help for your support needs with a global • Project close-out and hand-off you develop an all encompassing Support Desk—which will provide approach for planning and imple- support for all Verdasys products Generates aggregated case reports menting a data loss prevention licensed and deployed in the that include data usage from across solution. solution with escalation to Verdasys • eDiscovery and Forensic Reporting— the enterprise including: offline, contractor and partner activities. for break/fix or insolvable issues. • Assess and discover sensitive data The IBM support desk will own and It can drill down through your case and user actions associated with this help manage, track and resolve reports to discover file, network, data on endpoint devices through a problems related to the data loss classification, user activity, time Discovery Assessment. prevention solution. Ongoing endpoint data loss prevention Why IBM and Verdasys? support a comprehensive solution with IBM Managed Security Services Together IBM and Verdasys combine to protect your market value at less IBM provides ongoing managed their technology, experience and risk than your internal staff and most services to help you manage your expertise to deliver a complete end- other service providers. solution: point data loss prevention solution. • Ongoing remediation and policy Verdasys software is designed to For more information identify and mitigate the risk of To learn more about IBM Data enforcement for day-to-day sharing critical information across Security Services for endpoint operational support from an IBM the extended enterprise through data loss prevention, contact your hosting center that runs and manages automated discovery, classification IBM representative or visit: your deployed data loss prevention and monitoring of sensitive data solution. Our services include: utilizing an optimized mix of context • Policy design, implementation and content analysis. Verdasys and enforcement software enables the creation and • Implementation, configuration management of centrally defined data and maintenance of server and security rules that automatically enforce endpoint agent components corporate security policies at the end- • Single point of contact for support desk point, helping prevent unauthorized use of data through control and block activities and preventing data loss • Ongoing monitoring, response and through CD burning, copying/pasting, reporting for day-to-day monitoring printing, writing to USB drives, network and response to critical events and transfers, file sharing and use of policy violations. IBM will deliver unapproved applications periodic reports on policy compliance, enforcement status and end-user With IBM Global Services’ experience, violations. In the case of a serious global reach and scale, you can event, based on defined procedures confidently deploy Verdasys’ best-in- and service level agreements, IBM class software. IBM solutions, powered will escalate the issues. IBM would by Verdasys, provide you with an end- then propose adjustments and to-end integrated endpoint data loss refinements to your policy to help prevention solution to manage your accommodate new requirements and information security through its entire minimize false positives. lifecycle—creation through ongoing management. IBM combines refined methods and extensive skills to help you realize With IBM and Verdasys, the full value of your technology knowledgeable practitioners, investment. Our services are designed proven methodologies and to help optimize productivity, manage- innovative software and services ability and cost-effectiveness within help you rapidly implement and your IT organization. ibm.com/services © Copyright IBM Corporation 2008 IBM Corporation New Orchard Road Armonk, NY 10504 U.S.A. Produced in the United States of America 04-08 All Rights Reserved. IBM, the IBM logo and ibm.com are trademarks or registered trademarks of International Business Machines Corporation in the United States, other countries, or both Verdasys, and the Verdasys logo are registered trademarks of Verdasys Incorporated. Other company, product and service names may be trademarks or service marks of others. References in this publication to IBM products or services do not imply that IBM intends to make them available in all countries in which IBM operates. References in this publication to IBM products or services do not imply that IBM intends to make them available in all countries in which IBM operates. SEDO3004-USEN-00