Sophos Safeguard Enterprise: A Solution for Data Protection Presented by: W3(cube) 1 Problem statement Threat of Data theft or exposure from lost, stolen, or inappropriate decommissioned laptops. 2 What is security? “In the real world, security involves processes. It involves preventative technologies, but also detection and reaction processes, and an entire forensic system to hunt down and prosecute the guilty. Security is not a product; it itself is a process…..” Bruce Shneiner (Secrets and Lies, Wiley and Sons, Inc.) 3 Challenges to achieving laptop security • Cost • User negligence/sabotage of security measures • Increased value of information • Increase in access to computers =increased hackers not limited by time and space 4 The Threat to Data is Real!! 5 A Perspective on Laptop Theft and Data Loss • Laptop theft and data loss are escalating concerns for companies of all sizes - from Fortune 500 level to small-to-medium sized businesses - and according to the FBI, 97% of stolen laptops are never recovered. • As employees become increasingly more mobile and rely on multiple mobile devices from laptops, smartphones and iPads to conduct business, crimes associated with these devices are also on the rise. Malicious insiders as well as outside culprits are increasingly becoming more innovative and inventive in finding ways to steal valuable information and proprietary data from company and employee mobile devices and laptops that don't have appropriate endpoint security. Source: http://www.bizjournals.com/losangeles/prnewswire/press_releases/California/2011/11/07/LA00777 Los Angeles Business: Awareness Technologies Security Advisory: Top tips to prevent laptop theft (Nov 7, 2011) 6 Myths on data security The field of data security is rife with mistaken beliefs which cause people to design ineffective security solutions. Here are some of the most prevalent security myths: Myth: Hackers cause most security breaches. • In fact, 80% of data loss is to caused by insiders. Myth: Encryption makes your data secure. • In fact, encryption is only one approach to securing data. Security also requires access control, data integrity, system availability, and auditing. Myth: Firewalls make your data secure. • In fact, 40% of Internet break-ins occur in spite of a firewall being in place. To design an effective security solution you must understand the security requirements scope of current threats to your data. http://Data Security Challenges:Oracle9i Security Overview 7 Four Elements of an Effective Data Loss Prevention Strategy • Empower knowledge workers to classify sensitive business data • Apply classification to existing documents and data sets Control User Environment by restricting data exit points Classify intellectual property and sensitive business data • Comprehensive coverage of personally identifiable information types • Continuously assess, audit, report and enforce on endpoint and gateway Effective Data Loss Prevention Strategy (DLP) Prevent leakage of personal identifiable information • Control devices, applications, email and web usage • Ensure security policy compliance Protect confidential and sensitive information • Full disk, removable storage and file encryption • Email encryption 8 Source: Sophos / Utimaco Data Loss Prevention by Peter Szendröi, SOPHOS Nordics(Jan 20, 2010) page 10 Top IT Security Solutions Organizations are using Source: Harris Interactive: IT Security Final Report July 2011 9 Agreement with Statement about currently available IT security Solutions Source: Harris Interactive: IT Security Final Report July 2011 10 Solution Sophos Safeguard Enterprise 11 Overall Cascadia Lab’s Summary comparison " [Sophos 9.0] combines ease of use with " [McAfee 8.7i] excellent provides only performance basic device and very good control and support. It's was slow in the only our product in the performance group to testing. " integrate data loss prevention http://www.sophos.com/en-us/security-newstrends/security-trends/enterprise-review.aspx -capabilities" comparison " [Symantec 11] delivered a solid experience from the start and provides robust policy management and reporting. Tech support, however, was very disappointing" " [Trend Micro 10] has too many confusing components, making for difficult installation and policy management. " 12 Comparison of key solution providers in the market today by category Source: Cascadia Labs: Comparative Review of Endpoint Security for Enterprises Comparative review Link 13 SC Magazine Awards 2011 Best Mobile/Portable Device Security • Good Technology for Good for Enterprise • IronKey for IronKey Enterprise • McAfee for McAfee Enterprise Mobility Management (McAfee EMM) • Sophos for Sophos SafeGuard Enterprise • Symantec for Symantec Endpoint Protection Mobile Edition Best Endpoint/UTM Security • Check Point Software Technologies for Check Point UTM-1 • McAfee for McAfee Total Protection for Endpoint, Enterprise Edition • SonicWALL for SonicWALL E-Class Network Security Appliance (NSA) E8500 • Sophos for Sophos Endpoint Security and Data Protection • Symantec for Symantec Endpoint Protection 11.0 SC Awards 2011 14 Sophos as a solution Sophos is a series of software based components that comprise and entire suite Component Details Management Center Implements and enforces a common, organization-wide security policy framework with a central point of management control in mixed IT environments. Device Encryption •Transparent full-disk encryption (30% faster than competitors) •Can run & manage Opal, BitLocker, Windows 7, Vista, XP and virtual desktops from one central management console •Fast initial encryption algorithm •Recovery options when helpdesk can not be reached •Enables pre-boot user authentication •Provides single sign-on (SSO) for encryption and operating system Data Exchange •Easy user sharing of encrypted data across organization • Secure file and email attachment sharing •Centralizes key management •Offers removable media white listing for easier encryption management Configuration Protection •Detects and restricts use of devices plugged into the computer by type, model, or even serial number •Monitors traffic •Blocks or allows use of PC ports •Easy to use reporting and audit functionality Partner Connect •Ease of administration with help of cross-platform management console •Assures compliance with centralized log reports for audit & legal requirements •Provides full transparency to data protection across the enterprise •Features key back-up and emergency mechanisms for easy recovery. Disadvantages • It lacks the granular reporting capabilities some administrators will demand. • Firewall requires a little customizing before deployment. • Purchase of bundled suite and ability to choose vendors for different services 15 Case Study – Financial & Legal – Company spotlight & Problem Statement Raymond James Financial Raymond James needed robust data control and a centralized view of the risks and threats that were impacting its infrastructure. Choosing Sophos led to simple but comprehensive data and threat protection, improved IT efficiency and a lower TCO http://www.sophos.com/en-us/yourneeds/case-studies/financial.aspx 16 Case Study – Government Company spotlight & Problem Statement InTact InTACT deployed Sophos Anti-Virus (part of Endpoint Security and Control) on more than 10,000 computers in the Australian Capital Territory's government departments, agencies and hospitals. Technical excellence and low resource usage were deciding factors in choosing Sophos. http://www.sophos.com/en-us/yourneeds/case-studies/government.aspx 17 SC Magazine Awards 2011 Best Mobile/Portable Device Security • Good Technology for Good for Enterprise • IronKey for IronKey Enterprise • McAfee for McAfee Enterprise Mobility Management (McAfee EMM) • Sophos for Sophos SafeGuard Enterprise • Symantec for Symantec Endpoint Protection Mobile Edition Best Endpoint/UTM Security • Check Point Software Technologies for Check Point UTM-1 • McAfee for McAfee Total Protection for Endpoint, Enterprise Edition • SonicWALL for SonicWALL E-Class Network Security Appliance (NSA) E8500 • Sophos for Sophos Endpoint Security and Data Protection • Symantec for Symantec Endpoint Protection 11.0 SC Awards 2011 18 Analysis of Total Cost of Ownership (TCO) • 9 companies interviewed in-depth and costs analyzed: • • • • • • • • • Amica Life Insurance Lincoln Public Schools AW Chestern British Services Company Central Ohio Primary Care Physicians US Healthcare Provider CGh Medical Center Germany Company Escabia County School District 19 Sample Vendor Vs. Sophos: Cost Savings Analysis Over a 5 Year Period • Total cost for sample company =$1.3M • Total cost for Sophos = $880K *Analysis shows significant savings of $420K can be experienced for switching to and managing Sophos end point and security over a 5 Year period Source: Business Trends “A Strategic Overview Featuring Gartner Content” Featuring: A Buyers Guide to End Point Protection Programs (May 2009) 20 * The costs were calculated based on licensing, infrastructure and operational data provided by the companies interviewed Sample Vendor Vs. Sophos: Extent of Cost Category to Total Cost • Represents largest cost at of the TCO *Analysis shows significant savings of $420K can be experienced by switching to and managing Sophos end point and security over a 5 Year period Source: Business Trends “A Strategic Overview Featuring Gartner Content” Featuring: A Buyers Guide to End Point Protection Programs (May 2009) 21 * The costs were calculated based on licensing, infrastructure and operational data provided by the companies interviewed Snapshot of Voice of the Sophos End Point Security Customer “The high volume of calls to our IT department with McAfee was one of the key reasons we switched to Sophos” – Head of Global System& Security Solutions, German Company “Sophos was the only tool that did not care if clients are Macs or PCs, It was the only cross platform solution at the time” – Director of Technology Lincoln Public Schools “Sophos has saved me a lot of time with their administrative tools. The deployment is easier and I’ve been impressed with the client removal tool, it removes Symantec very well” – IT Manager CGH Medical Center McAfee proved to be more expensive from the point of view that it charged for every module. When we reviewed Sophos it was al part of one purchase and the price was less than for McAfee” – Technical Services Manager, British Services Company “The Sophos Console provides a snapshot of what’s going on at a glance. Symantec is definitely not easy to use. We need to see at a glance if there is something wrong” - Technical & Operations Security Administrator US Health Care Provider Sophos offers a cost effective, easy to deploy/use, flexible with proven data loss prevention capabilities Source: Business Trends “A Strategic Overview Featuring Gartner Content” Featuring: A Buyers Guide to End Point Protection Programs (May 2009) 22 In Closing…. Sophos, Simply Secure Back up Slides An organization’s risk of threat of Data theft or exposure from lost, stolen, or inappropriately decommissioned laptops is greatly reduced with Sophos end point security protection. However, Organizations must remain proactive and vigilant and constantly review products & services to meet increasingly sophisticated threats of data theft. Diagram Source: Sophos / Utimaco Data Loss Prevention by Peter Szendröi, SOPHOS Nordics(Jan 20, 2010) page 2 23