customer spotlight
play

Customer Spotlight: Deploying a Data Protection Program in less - PowerPoint PPT Presentation

Customer Spotlight: Deploying a Data Protection Program in less than 120 Days Michael Ring, Jabil Mark Stevens, Digital Guardian Agenda Introduction Deploying a Data Protection Program in < 120 Days Mike Ring, Jabil Digital


  1. Customer Spotlight: Deploying a Data Protection Program in less than 120 Days Michael Ring, Jabil Mark Stevens, Digital Guardian

  2. Agenda  Introduction  Deploying a Data Protection Program in < 120 Days Mike Ring, Jabil •  Digital Guardian Overview Mark Stevens, Digital Guardian •  Live Q&A with Mike and Mark

  3. About Mike Ring  Senior IT Manager, Threat and Solution Architect  15 years’ experience in InfoSec

  4. Jabil Proven Manufacturing Solutions Global Expertise. Intelligent Supply Chain Design.  Global manufacturing services company  180,000+ employees  90 plants in 23 countries  $17.2B revenue in 2013

  5. Jabil’s Security Situation  Data protection was in catch up mode  Lacked basic processes  “IP could be anything”  Security could be a competitive advantage

  6. Jabil’s I T Environm ent  Cloud-based IT environment since 2010  No standardization  Had budget but not headcount to accelerate security maturity

  7. Security Objectives  52,000 devices at one level of security, needed to get to higher level  Protect: IP: Jabil’s and customers’ • Pricing data • Employee data •  Quickly build a program focused on agility and collaboration

  8. Jabil’s Solution  Three key security technologies Web Web Proxy SSO • Proxy Single Sign-on • Data Protection •  Had to be 100% managed service Data Protection

  9. W hy DG Managed Security Program  InfoSec can govern, not administer  Unique context-awareness  Capabilities beyond just DLP  Very fast ramp  Time to value

  10. Getting the CI O on Board  Prior successful rapid deployments  Application usage collection was major value-add  Able to reconcile license usage and reduce costs

  11. I m plem enting Digital Guardian  3,000 agents deployed in dev environment  49,000 agents deployed next June July August May 3,000 49,000 Initial Engagement Agents Deployed Agents Deployed in Development in Monitor Mode Fast Forward Framework

  12. Results  Gained immediate visibility into all data access and usage  Saw data getting copied to USB drives  Used egress reports to drive adoption

  13. W hat’s Next?  Using visibility to drive classification and policy making  Transition to operational plan  Roll out DG controls to mitigate top data risks  DG for advanced threat detection and forensic analysis

  14. About Mark Stevens VP, Global Services & Support  Driving customer success  20 year tech industry veteran  IBM, BMC, Progress, Lotus •

  15. Data-Centric Security Recap “In this new reality, traditional perimeter-based approaches to security are insufficient. S&R pros must take a dat ata-ce centric c ap appro roac ach that at e ensu sure res se s securi rity t trav ravels s with t the dat ata a re regard ardless ss of use ser p r populat ation, locat ation, or e r even host sting m model.” The Future Of Data Security: A Zero Trust Approach John Kindervag, Heidi Shey, and Kelley Mak, June 5, 2014 Confidential 14

  16. Data Security That Starts at the Source 15

  17. Patented, Proven Endpoint Agent 16

  18. Automatic Sensitive Data Classification 17

  19. STOP Data Theft From Insiders and Outsiders 18

  20. Protect Your Data From Insider Threats Confidential 19

  21. Protect Your Data for the Best Defense from Outsider Threats Confidential 20

  22. Flexible Deployment Models “By selecting the managed service deployment option, we were able to be up and running in a matter of weeks. The added visibility into how our confidential data is being used is invaluable.” CISO, Regional Bank Option 3 Option 1 Option 2 Hybrid On Premise Managed Service Managed Service On Premise Infrastructure hosted in Infrastructure hosted in your   Infrastructure hosted in  Verdasys private cloud environment. your environment Administered by Verdasys Administered remotely by   Self-administration  Pro Services Verdasys Pro Services Policies, rules and reports  Access to policies, rules, and Data remains within your IT managed by you   reports environment. Engage with Verdasys Pro  Weekly status meetings  Services as needed Confidential 21

  23. 22

  24. 23

  25. 24

  26. Questions?

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend