Transcription
The InformationCentric SecurityLifecycleRich MogullSecurosis, L.L.C.
MainframeKRInternet IInternet IIOWTJailENFortressZoneecurosis.com
But what about theinformation?ecurosis.com
sis.com
NetworkInformationUserApplicationHostecurosis.com
The InformationCentric SecurityLifecycleecurosis.com
CreateClassifyAssign RightsShareCMP (DLP)EncryptionLogical ControlsApplication SecurityStoreUseAccess ControlsEncryptionRights ManagementContent DiscoveryActivity Monitoringand EnforcementRights ManagementLogical ControlsApplication SecurityArchiveDestroyEncryptionAsset ManagementCrypto-ShreddingSecure DeletionContent Discoveryecurosis.com
ILM and SecurityCreateCreationand UseUseDestroyDispositionecurosis.com
Create Content is classified as it’s created throughcontent analysis or based on labeling ofdata elements. Rights are assigned, based on centralpolicies. Mandatory and discretionary policies.ecurosis.com
Create ssifyNone*None*Assign RightsLabel SecurityEnterprise DRMNote- Classification is expected to emerge fromDLP/CMPecurosis.com
Label sitiveecurosis.com
Content AnalysisPartial Document MatchingDatabase FingerprintingStatisticalExact File MatchingCategoriesConceptual (?:(? Visa 4\d{3}) (? Mastercard 5[1-5]\d{2}) (? Discover 6011) (? DinersClub (?:3[68]\d{2}) (?:30[0-5]\d)) (? AmericanExpress 3[47]\d{2}))([ -]?)(?(DinersClub)(?:\d{6}\1\d{4}) (?(AmericanExpress)(?:\d{6}\1\d{5}) (?:\d{4}\1\d{4}\1\d{4}))) Rulesecurosis.com
Store We use access controls, encryption, andrights management to protect data instorage. Content Discovery helps find unprotectedsensitive data that slipped through the gaps.ecurosis.com
Store ss ControlsDBMS Access ControlsAdministrator Separation ofDutiesFile System Access ControlsDocument ManagementSystem Access ControlsEncryptionField Level EncryptionApplication Level EncryptionFile/Media Encryption*Media EncryptionFile EncryptionDistributed EncryptionRights ManagementLabel/Row Level SecurityEnterprise DRMContent DiscoveryDatabase-Specific DiscoveryToolsDLP/CMF Content DiscoveryStorage/Data ClassificationToolsecurosis.com
AccessControlsEncryptionDRMecurosis.com
Encryption plication/DatabaseMediaecurosis.com
Remote ScanningContent Discoveryecurosis.com
Use Monitor and protect information duringuse. Includes business applications andproductivity applications. Heavy use of content-aware technologies.ecurosis.com
Use ty Monitoring andEnforcementDatabase Activity MonitoringApplication ActivityMonitoringEndpoint Activity MonitoringFile Activity MonitoringPortable Device ControlEndpoint DLPRights ManagementLabel SecurityEnterprise DRMLogical ControlsObject (Row) Level SecurityStructural ControlsApplication LogicApplication SecurityImplemented At Application Layerecurosis.com
Two Sides Of InformationCentric SecurityData CenterProductivityecurosis.com
CMPAdvanced ContentAnalysisReal-Time DRMCMP to ADMPBridgesManaged andUnmanaged SystemsCMPecurosis.com
ADMPAdaptive AuthenticationApplication NACActivity MonitoringAnti-ExploitationTransaction AuthenticationSession SecurityApplication Virtualizationecurosis.com
Cross-DomainInformation 56Customer ReportCustomer ReportCustomer retention grew13% YoY. Customer138-56-8375 held returnvalue while.Customer retention grew13% YoY. Customer138-56-8375 held returnvalue tFirstSSNasdfasdasdadsadsadsasdasd2007 2008 2009 2010ecurosis.com
Share Securely exchange information, inside andoutside of the enterprise. A mixture of content-aware technologiesand encryption for secure exchange.ecurosis.com
Share DLPDatabase Activity Monitoring Network/Endpoint CMP/DLPEncryptionNetwork EncryptionApplication Level Encryption*Only When Data Elements Not OtherwiseEncryptedLogical ControlsApplication Security(With DLP Feature)Email EncryptionFile EncryptionNetwork EncryptionObject (Row) Level SecurityStructural ControlsImplemented At Application Layerecurosis.com
Inter-OrganizationEncryption vs. DRMecurosis.com
Archive Protect information in archival storage. Encryption and asset managementecurosis.com
Archive cryptionField-Level EncryptionTape EncryptionStorage Encryption(Multiple Options)Asset ManagementAsset ManagementAsset Managementecurosis.com
Tape Encryption OptionsIn-lineDriveSoftwareecurosis.com
Destroy Ensure data is not recoverable at end of life Content discovery to ensure dangerousdata isn’t hiding where it shouldn’t be.ecurosis.com
Destroy ypto-ShreddingEnterprise Key ManagementEnterprise Key ManagementSecure DeletionDisk/Free Space WipingDisk/Free Space WipingPhysical DestructionPhysical DestructionPhysical DestructionContent DiscoveryDLP/CMF Content DiscoveryStorage/Data ClassificationDatabase-Specific DiscoveryToolsToolsEnterprise SearchE-Discoveryecurosis.com
CreateClassifyAssign RightsShareCMP (DLP)EncryptionLogical ControlsApplication SecurityStoreUseAccess ControlsEncryptionRights ManagementContent DiscoveryActivity Monitoringand EnforcementRights ManagementLogical ControlsApplication SecurityArchiveDestroyEncryptionAsset ManagementCrypto-ShreddingSecure DeletionContent Discoveryecurosis.com
Rich MogullSecurosis, : securosisSkype: rmogull
Database Activity Monitoring Application Activity Monitoring Endpoint Activity Monitoring File Activity Monitoring Portable Device Control . Database-Specific Discovery Tools DLP/CMF Content Discovery Storage/Data Classification Tools Enterprise Search E-Discovery y. ecurosis.com Create Destroy Store Share Archive Use