Sophos Safeguard Enterprise: your key for Data Protection

advertisement
Sophos Safeguard Enterprise: A
Solution for Data Protection
Presented by: W3(cube)
1
Problem statement
Threat of Data theft or exposure from
lost, stolen, or inappropriate
decommissioned laptops.
2
What is security?
“In the real world, security involves processes. It
involves preventative technologies, but also
detection and reaction processes, and an entire
forensic system to hunt down and prosecute
the guilty. Security is not a product; it itself is a
process…..”
Bruce Shneiner (Secrets and Lies, Wiley and Sons, Inc.)
3
Challenges to achieving laptop security
• Cost
• User negligence/sabotage of security
measures
• Increased value of information
• Increase in access to computers =increased
hackers not limited by time and space
4
The Threat to Data is Real!!
5
A Perspective on Laptop Theft and
Data Loss
• Laptop theft and data loss are escalating concerns for companies of
all sizes - from Fortune 500 level to small-to-medium sized
businesses - and according to the FBI, 97% of stolen laptops are
never recovered.
• As employees become increasingly more mobile and rely on
multiple mobile devices from laptops, smartphones and iPads to
conduct business, crimes associated with these devices are also on
the rise. Malicious insiders as well as outside culprits are
increasingly becoming more innovative and inventive in finding
ways to steal valuable information and proprietary data from
company and employee mobile devices and laptops that don't have
appropriate endpoint security.
Source: http://www.bizjournals.com/losangeles/prnewswire/press_releases/California/2011/11/07/LA00777
Los Angeles Business: Awareness Technologies Security Advisory: Top tips to prevent laptop theft (Nov 7, 2011)
6
Myths on data security
The field of data security is rife with mistaken beliefs which
cause people to design ineffective security solutions. Here are
some of the most prevalent security myths:
Myth: Hackers cause most security breaches.
• In fact, 80% of data loss is to caused by insiders.
Myth: Encryption makes your data secure.
• In fact, encryption is only one approach to securing data.
Security also requires access control, data integrity, system
availability, and auditing.
Myth: Firewalls make your data secure.
• In fact, 40% of Internet break-ins occur in spite of a firewall
being in place.
To design an effective security solution you must understand the security requirements scope of
current threats to your data.
http://Data Security Challenges:Oracle9i Security
Overview
7
Four Elements of an Effective Data Loss
Prevention Strategy
• Empower knowledge
workers to classify
sensitive business data
• Apply classification to
existing documents and
data sets
Control User
Environment
by restricting
data exit
points
Classify
intellectual
property and
sensitive
business data
• Comprehensive coverage
of personally identifiable
information types
• Continuously assess, audit,
report and enforce on
endpoint and gateway
Effective Data
Loss
Prevention
Strategy (DLP)
Prevent
leakage of
personal
identifiable
information
• Control devices, applications,
email and web usage
• Ensure security policy
compliance
Protect
confidential
and sensitive
information
• Full disk, removable
storage and file
encryption
• Email encryption
8
Source: Sophos / Utimaco Data Loss Prevention by Peter Szendröi, SOPHOS
Nordics(Jan 20, 2010) page 10
Top IT Security Solutions Organizations
are using
Source: Harris Interactive: IT Security Final Report
July 2011
9
Agreement with Statement about
currently available IT security Solutions
Source: Harris Interactive: IT Security Final Report
July 2011
10
Solution
Sophos Safeguard Enterprise
11
Overall Cascadia Lab’s Summary
comparison
" [Sophos 9.0]
combines ease
of use with
" [McAfee 8.7i]
excellent
provides only
performance
basic device
and very good
control and
support. It's
was slow in
the only
our
product in the
performance
group to
testing. "
integrate data
loss prevention
http://www.sophos.com/en-us/security-newstrends/security-trends/enterprise-review.aspx -capabilities"
comparison
" [Symantec
11] delivered a
solid
experience
from the start
and provides
robust policy
management
and reporting.
Tech support,
however, was
very
disappointing"
" [Trend Micro
10] has too
many
confusing
components,
making for
difficult
installation and
policy
management.
"
12
Comparison of key solution providers
in the market today by category
Source: Cascadia Labs: Comparative Review of Endpoint Security for
Enterprises Comparative review Link
13
SC Magazine Awards 2011
Best Mobile/Portable Device Security
• Good Technology for Good for Enterprise
• IronKey for IronKey Enterprise
• McAfee for McAfee Enterprise Mobility Management (McAfee EMM)
• Sophos for Sophos SafeGuard Enterprise
• Symantec for Symantec Endpoint Protection Mobile Edition
Best Endpoint/UTM Security
• Check Point Software Technologies for Check Point UTM-1
• McAfee for McAfee Total Protection for Endpoint, Enterprise Edition
• SonicWALL for SonicWALL E-Class Network Security Appliance (NSA) E8500
• Sophos for Sophos Endpoint Security and Data Protection
• Symantec for Symantec Endpoint Protection 11.0
SC Awards 2011
14
Sophos as a solution
Sophos is a series of software based components that comprise and entire suite
Component
Details
Management Center
Implements and enforces a common, organization-wide security policy framework with a central point of
management control in mixed IT environments.
Device Encryption
•Transparent full-disk encryption (30% faster than competitors)
•Can run & manage Opal, BitLocker, Windows 7, Vista, XP and virtual desktops from one central
management console
•Fast initial encryption algorithm
•Recovery options when helpdesk can not be reached
•Enables pre-boot user authentication
•Provides single sign-on (SSO) for encryption and operating system
Data Exchange
•Easy user sharing of encrypted data across organization
• Secure file and email attachment sharing
•Centralizes key management
•Offers removable media white listing for easier encryption management
Configuration Protection
•Detects and restricts use of devices plugged into the computer by type, model, or even serial number
•Monitors traffic
•Blocks or allows use of PC ports
•Easy to use reporting and audit functionality
Partner Connect
•Ease of administration with help of cross-platform management console
•Assures compliance with centralized log reports for audit & legal requirements
•Provides full transparency to data protection across the enterprise
•Features key back-up and emergency mechanisms for easy recovery.
Disadvantages
• It lacks the granular reporting capabilities some administrators will demand.
• Firewall requires a little customizing before deployment.
• Purchase of bundled suite and ability to choose vendors for different services
15
Case Study – Financial & Legal –
Company spotlight & Problem Statement
Raymond James Financial
Raymond James needed robust data control and a centralized view of the risks and threats that were impacting its infrastructure. Choosing
Sophos led to simple but comprehensive data and threat protection, improved IT efficiency and a lower TCO
http://www.sophos.com/en-us/yourneeds/case-studies/financial.aspx
16
Case Study – Government
Company spotlight & Problem Statement
InTact
InTACT deployed Sophos Anti-Virus (part of Endpoint Security and Control) on more than 10,000 computers in the Australian Capital Territory's
government departments, agencies and hospitals. Technical excellence and low resource usage were deciding factors in choosing Sophos.
http://www.sophos.com/en-us/yourneeds/case-studies/government.aspx
17
SC Magazine Awards 2011
Best Mobile/Portable Device Security
• Good Technology for Good for Enterprise
• IronKey for IronKey Enterprise
• McAfee for McAfee Enterprise Mobility Management (McAfee EMM)
• Sophos for Sophos SafeGuard Enterprise
• Symantec for Symantec Endpoint Protection Mobile Edition
Best Endpoint/UTM Security
• Check Point Software Technologies for Check Point UTM-1
• McAfee for McAfee Total Protection for Endpoint, Enterprise Edition
• SonicWALL for SonicWALL E-Class Network Security Appliance (NSA) E8500
• Sophos for Sophos Endpoint Security and Data Protection
• Symantec for Symantec Endpoint Protection 11.0
SC Awards 2011
18
Analysis of Total Cost of Ownership
(TCO)
• 9 companies interviewed in-depth and costs analyzed:
•
•
•
•
•
•
•
•
•
Amica Life Insurance
Lincoln Public Schools
AW Chestern
British Services Company
Central Ohio Primary Care Physicians
US Healthcare Provider
CGh Medical Center
Germany Company
Escabia County School District
19
Sample Vendor Vs. Sophos: Cost Savings
Analysis Over a 5 Year Period
• Total cost for sample
company =$1.3M
• Total cost for Sophos =
$880K
*Analysis shows significant savings of $420K can be experienced for switching to and managing
Sophos end point and security over a 5 Year period
Source: Business Trends “A Strategic Overview Featuring Gartner Content” Featuring: A Buyers Guide to End Point Protection Programs (May 2009) 20
* The costs were calculated based on licensing, infrastructure and operational data provided by the companies interviewed
Sample Vendor Vs. Sophos: Extent of
Cost Category to Total Cost
• Represents largest cost at
of the TCO
*Analysis shows significant savings of $420K can be experienced by switching to and managing
Sophos end point and security over a 5 Year period
Source: Business Trends “A Strategic Overview Featuring Gartner Content” Featuring: A Buyers Guide to End Point Protection Programs (May 2009) 21
* The costs were calculated based on licensing, infrastructure and operational data provided by the companies interviewed
Snapshot of Voice of the Sophos End
Point Security Customer
“The high volume of calls to our IT
department with McAfee was one
of the key reasons we switched to
Sophos” – Head of Global
System& Security Solutions,
German Company
“Sophos was the only tool
that did not care if clients
are Macs or PCs, It was the
only cross platform solution
at the time” – Director of
Technology Lincoln Public
Schools
“Sophos has saved me a lot of time
with their administrative tools. The
deployment is easier and I’ve been
impressed with the client removal tool,
it removes Symantec very well” – IT
Manager CGH Medical Center
McAfee proved to be more
expensive from the point of
view that it charged for every
module. When we reviewed
Sophos it was al part of one
purchase and the price was less
than for McAfee” – Technical
Services Manager, British
Services Company
“The Sophos Console provides a
snapshot of what’s going on at
a glance. Symantec is definitely
not easy to use. We need to
see at a glance if there is
something wrong” - Technical
& Operations Security
Administrator US Health Care
Provider
Sophos offers a cost effective, easy to deploy/use, flexible with proven data loss
prevention capabilities
Source: Business Trends “A Strategic Overview Featuring Gartner Content” Featuring: A Buyers Guide to End Point Protection Programs (May 2009)
22
In Closing…. Sophos, Simply Secure
Back up Slides
An organization’s risk of threat of Data theft or exposure from lost, stolen, or inappropriately
decommissioned laptops is greatly reduced with Sophos end point security protection. However,
Organizations must remain proactive and vigilant and constantly review products & services to
meet increasingly sophisticated threats of data theft.
Diagram Source: Sophos / Utimaco Data Loss Prevention by Peter Szendröi,
SOPHOS Nordics(Jan 20, 2010) page 2
23
Download