Customer Spotlight: Deploying a Data Protection Program in less - - PowerPoint PPT Presentation

customer spotlight
SMART_READER_LITE
LIVE PREVIEW

Customer Spotlight: Deploying a Data Protection Program in less - - PowerPoint PPT Presentation

Customer Spotlight: Deploying a Data Protection Program in less than 120 Days Michael Ring, Jabil Mark Stevens, Digital Guardian Agenda Introduction Deploying a Data Protection Program in < 120 Days Mike Ring, Jabil Digital


slide-1
SLIDE 1

Customer Spotlight:

Deploying a Data Protection Program in less than 120 Days

Michael Ring, Jabil Mark Stevens, Digital Guardian

slide-2
SLIDE 2

Agenda

  • Introduction
  • Deploying a Data Protection Program in < 120 Days
  • Mike Ring, Jabil
  • Digital Guardian Overview
  • Mark Stevens, Digital Guardian
  • Live Q&A with Mike and Mark
slide-3
SLIDE 3

About Mike Ring

  • Senior IT Manager, Threat and

Solution Architect

  • 15 years’ experience in InfoSec
slide-4
SLIDE 4

Jabil

  • Global manufacturing services company
  • 180,000+ employees
  • 90 plants in 23 countries
  • $17.2B revenue in 2013

Proven Manufacturing Solutions

Global Expertise. Intelligent Supply Chain Design.

slide-5
SLIDE 5

Jabil’s Security Situation

  • Data protection was in catch up mode
  • Lacked basic processes
  • “IP could be anything”
  • Security could be a competitive advantage
slide-6
SLIDE 6

Jabil’s I T Environm ent

  • Cloud-based IT environment since 2010
  • No standardization
  • Had budget but not headcount to

accelerate security maturity

slide-7
SLIDE 7

Security Objectives

  • 52,000 devices at one level of

security, needed to get to higher level

  • Protect:
  • IP: Jabil’s and customers’
  • Pricing data
  • Employee data
  • Quickly build a program focused on

agility and collaboration

slide-8
SLIDE 8

Jabil’s Solution

  • Three key security technologies
  • Web Proxy
  • Single Sign-on
  • Data Protection
  • Had to be 100% managed service

Web Proxy SSO

Data Protection

slide-9
SLIDE 9

W hy DG Managed Security Program

  • InfoSec can govern, not administer
  • Unique context-awareness
  • Capabilities beyond just DLP
  • Very fast ramp
  • Time to value
slide-10
SLIDE 10

Getting the CI O on Board

  • Prior successful rapid deployments
  • Application usage collection was major value-add
  • Able to reconcile license usage and reduce costs
slide-11
SLIDE 11

I m plem enting Digital Guardian

  • 3,000 agents deployed in dev environment
  • 49,000 agents deployed next

May June July August

Initial Engagement

3,000

Agents Deployed in Development

49,000

Agents Deployed in Monitor Mode

Fast Forward Framework

slide-12
SLIDE 12

Results

  • Gained immediate visibility into all data access and usage
  • Saw data getting copied to USB drives
  • Used egress reports to drive adoption
slide-13
SLIDE 13

W hat’s Next?

  • Using visibility to drive classification and policy making
  • Transition to operational plan
  • Roll out DG controls to mitigate top data risks
  • DG for advanced threat detection and forensic analysis
slide-14
SLIDE 14

About Mark Stevens

  • VP, Global Services & Support
  • Driving customer success
  • 20 year tech industry veteran
  • IBM, BMC, Progress, Lotus
slide-15
SLIDE 15

Data-Centric Security Recap

“In this new reality, traditional perimeter-based approaches to security are insufficient. S&R pros must take a dat ata-ce centric c ap appro roac ach that at e ensu sure res se s securi rity t trav ravels s with t the dat ata a re regard ardless ss

  • f use

ser p r populat ation, locat ation, or e r even host sting m model.”

The Future Of Data Security: A Zero Trust Approach John Kindervag, Heidi Shey, and Kelley Mak, June 5, 2014

Confidential 14

slide-16
SLIDE 16

Data Security That Starts at the Source

15

slide-17
SLIDE 17

Patented, Proven Endpoint Agent

16

slide-18
SLIDE 18

Automatic Sensitive Data Classification

17

slide-19
SLIDE 19

STOP Data Theft From Insiders and Outsiders

18

slide-20
SLIDE 20

Protect Your Data From Insider Threats

Confidential 19

slide-21
SLIDE 21

Protect Your Data for the Best Defense from Outsider Threats

Confidential 20

slide-22
SLIDE 22

Flexible Deployment Models

Confidential 21

  • Infrastructure hosted in

your environment

  • Self-administration
  • Policies, rules and reports

managed by you

  • Engage with Verdasys Pro

Services as needed

  • Infrastructure hosted in

Verdasys private cloud

  • Administered by Verdasys

Pro Services

  • Access to policies, rules, and

reports

  • Weekly status meetings
  • Infrastructure hosted in your

environment.

  • Administered remotely by

Verdasys Pro Services

  • Data remains within your IT

environment.

Option 1

On Premise

Option 2

Managed Service

Option 3

Hybrid

Managed Service On Premise

“By selecting the managed service deployment option, we were able to be up and running in a matter of

  • weeks. The added visibility into how our confidential data is being used is invaluable.”

CISO, Regional Bank

slide-23
SLIDE 23

22

slide-24
SLIDE 24

23

slide-25
SLIDE 25

24

slide-26
SLIDE 26

Questions?