Clearswift Overview Rise of new collaboration tools grow businesses At T-Mobile we make use of Facebook, for example, to aid our graduate recruitment process. As an organization, we need to ensure that as such technologies develop we fully understand the potential and the impact on our business Head of HR Operations, T-Mobile “ “ There is no doubt that the emergence of Web 2.0 technologies… is changing the way that all organizations do business…. Creates new risks and business impacts Malware and hygiene Data leakage Compliance risks Employee productivity What if you could embrace collaboration and… Stay in control of intellectual property and customer sensitive data? Stop dangerous security threats and malware? Monitor and log communications for compliance and productivity? Reduce the cost of securing collaboration? With Clearswift you can collaborate more • • • • • With Clearswift’s MIMEsweeper we can configure flexible and tailor-made policies that fit our company. I don't know any other product that can do the same with such little effort." “ “ Less costs – hardware, licensing, resources and support Less risks Fewer products to manage Less time in training Less time on the phone with support About Clearswift We’re different because we start by understanding content 20+ years helping companies collaborate confidently Trusted by over 17,000 organizations Used by 40% of the Global Fortune 500 97% of customers would recommend us to a peer Clearswift Email & Web Appliance Designed for the job • Secure and resilient platform – optimized OS tuned for high throughput performance – hardened Linux kernel – Builtin Kaspersky AV • Easy installation and deployment – 7-step ‘Getting Started’ deployment & installation guide – pre-loaded and configured ‘default’ policy • Easy to use & manage – 100% web user interface – simple to use policy model – Automation to reduce admin effort Deployment platforms 1) HW Appliance 2) SW Appliance 3) Virtual Appliance y HyperV • Customers can re-use existing hardware to save buying a new devices • Customer can virtualize all or part of their solution • Customers can mix and match deployments to suit them Key features – common policy console: mail & web • Easily create, change and enforce policies across e-mail and web • Automatically updates policy to any ‘peered’ appliances – up to 9 Email and 9 Web (18 in total) • Simplifies policy enforcement at remote appliance locations World class spam detection • TRUSTmanager – global reputation network – Rejects 70-80% of all traffic before it reaches your gateway • SpamLogic – delivers in total 99.6% accuracy rate – comprehensive arsenal of defences Easy to understand email policy • Build rules appropriate to the direction of email Superior web security without compromise MIMEsweeper content engine – True binary signature file identification – Recursive decomposition – Lexical analysis/templates – Granular policy based on user – Comprehensive data leakage controls URL filtering from the leading vendor – 40 categories more than 18 million web sites – Important component for policy and reporting Anti-virus from Kaspersky – Viruses, worms, Trojans and malicious code Anti-spyware from Sunbelt Software – Signature based detection and prevention – Spyware “call home” prevention – Tracking Cookie detection/removal Data leakage templates • Predefined regular expressions for PII (Personally Identifiable Information) and PCl (Personal Credit Information) – National insurance number – Credit card numbers – Social security number • Benefits – Easy to use (simply add to route) – No configuration errors Time based policy In the example for the ‘Everyone to Shopping’ route shown previously – The green area defines when access to this route is allowed – The White area defines when it is blocked – The orange area defines a period with 60 minutes browse time quota – On Saturday the Blue are defines a period with 30 minutes time quota Interactive graphical reporting High-level analysis reports Investigative reports • • • • • • • • • • • • • • Top N blocked sites Top N blocked users Top Users by # Request Top Users by Bandwidth Top Internet Sites by # Request Top Internet Sites by Bandwidth Top Categories by # Request Top Categories by Bandwidth Top Sites for a Category by # Requests Top Sites for a Category by Bandwidth Top N blocked sites Top N blocked machines Top machines by number of requests Machines visiting particular site Report options • • • Scheduled Reports Export Reports (PDF, CSV, email) Interactive drill downs for more detail Interactive drill down Personalized user feedback Block Pages – policy violations Progress Pages – informative feedback when downloading large files HTTP error Pages – reason why a request can not be delivered Administrators and power users may also receive the following notifications – Email alerts to administrator – Email scheduled reports – Email Infected Machine Digests Acceptable use policy page • Configurable ‘Acceptable Internet Usage Policy’ page • On or off setting • When ‘on’ may be set to display at browser startup or every ## hours Fully conjoined policy updating • Bi-directional Common Policy Console • Policy changes replicated between peered Web and Email appliances • Up to 18 appliances (9 Web + 9 Email) in any one peer group cluster Policy Web Appliance Email Appliance HTTPS content scanning and analysis • • • • Cost option Full content scanning of HTTPS/SSL encrypted data Detects any malware or data leakage in encrypted traffic Flexible deployment i.e., create specific routes NOT to be scanned, e.g., “Financial” • Also provides policy based certificate checking for added protection CONTENTSafe Appliance Data leakage - the stealth threat to business The penalties can be significant In 2006 the United States Veteran’s Administration lost the names and social security numbers of 27 million living exsoldiers stored on an employee’s laptop computer stolen from a home office. This resulted in huge penalty costs and reputation damage for the VA and the US federal government Source: www.usa.gov/veteransinfo/#FAQs Cost isn’t be measured in dollars alone In December 2006 retailer TJX announced that information from 45 million credit and debit cards from transactions in 2003 was stolen by hackers from its computer systems. The company couldn’t determine the extent of the breach or what customer information may have been compromised, nor could it quantify the financial impact of the breach. One credit union sent The TJX Companies an invoice for $590,000 to cover the monetary costs and reputational damage that the financial institution says it incurred as a result of the data breach. Sources: www.computerworld.com/action/article.do?com mand=viewArticleBasic&articleId=295516&sour ce=rss_topic82 Compliance legislation Sarbanes-Oxley SEC rules • • Safeguards on public accounting firms that audit public companies Gramm-Leach-Bliley Act (GLBA) • Rules for privacy and security of customer information • • Payment Card Industry (PCI) • Requires credit card information to be securely sent and stored Payment Card Industry (PCI) • Requires credit card information to be securely sent and stored EU Data Protection Directive • Sets standards for protecting personal data within the European Union FSA • Wide range of rule-making, investigatory and enforcement powers in order to meet four statutory objectives; market confidence, public awareness, consumer protection and the reduction of financial crime. Record retention of trader-broker communication for 3 years Records stored in unalterable format, serialized and indexed for easy retrieval Brokerages must duplicate messages and associated indexes NASD rules • • Enforce policy correspondence for codes of conduct Identify correspondence to be reviewed and record supervisory activity Health Insurance Portability and Accountability Act (HIPAA) • • Protect patient healthcare information to ensure privacy and confidentiality when electronically stored, maintained, or transmitted Penalties of up to $250,000 in fines and jail time of up to 10 years. 81% of companies surveyed admit to data breaches occurring over previous 12 months 39% involve confidential business information 27% involve personal information about customers 14% involve intellectual property (including software source code) 10% involve personal information about employees Source: Ponemon Institute Source: www.breachblog.com What is the scale of the problem? University Health Care (2) University of Akron (2) University of Arizona (1) University of California (3) University of Cincinnati (1) University of Colorado (1) Providence Alaska Medical Center (1) (1) Capital Downingtown IKON Memorial State 1st Source of Office Health Tennessee Hospital Solutions Area (2)(1) (1) School (1) University ofBank Florida (3)(1) District Prudential plc (1) Caremark Dudley Illinois Memorial State A.J. Falciani ofEye Group Utah University (1) Center Realty (2) of Hospitals (1)(1)(1) (2) University of Georgia Purdue Pharma (1) Carmel Duke Illinois Merrill State ABC Phones School of Lynch Tools Unified Virginia Works (1) of (1) School Law (1) (1) (1)District University of Glamorgan (1) (1) Purdue University (1) Carnegie Duke Indiana Microsoft State ABN Amro University of State West (1) Mellon University Virginia (2) University (1)(1) (1) University ofMortgage Illinois (1)(1) Queen Mary's Sidcup Hospital Cascade E.On Indiana Middle State Academy (1) of Tennessee University-Purdue Wisconsin Healthcare Hearing State Centres (2) Community University (1) (1)(1)(1)Fort University of Iowa (2) University Queens University of Charlotte Castlecroft East Wayne Milwaukee State ACAPTennessee Street Security (1) ofCounty Medical Corporation (1) State (2) Practice (1) (1)(1)(1) University Kansas (1)University Quest Diagnostics (1) Catalina Eastern Indianapolis MLSGear.com State Administaff University Connecticut Conservancy Power (1) College and State Divers Light at University Brockport (1) (1) University of(1) Maryland (1) R.E. Moulton (1) Catholic Eastern Insecure Modesto State Administrative University Sales Healthcare Discard City Schools and Systems of (37) New Marketing West (1) York Inc (1) (1) (1) (NE) (1) University of Massachusetts (1) Recovery (1) CBIZ Eastern InterActive Monroe Staten AdobeBenefits Island Systems Community School University and District (1)Insurance College Marketing (1) Hospital (1) (1)Group (1) (1) University ofFinancial Miami (1) Rent-a-Center (1) Centocor Ebay Interbank Monroe Stedman's Advance (1) County Auto (1) FX (1) (1) Parts (1) (1) University of Michigan (1) Rentway (1) Central Edgewood Internal Montana Stock Advanced and Bank Revenue State Options Medical Independent ofUniversity the Service Solutions Partners UAEPhysicians School (1) (2) (1)(1) (1) District University of Minnesota (1) (1) Republic of Korea (1) Central Edmonton International Montgomery Stockport AffiliatedCollection Computer Primary Catholic Brokerage WardBureau Care (1) School Services Dallas (1) District (1) (1) (1) (1) University of Nevada (1)Trust Robotic Industries Association (1) Central EDS International Monthly Stokes Affordable Corporation County Connecticut (1) Realty Market Schools (1) (1) State Place (1) University (1) (1) University of New Hampshire (1) Roman Catholic Diocese of Providence Central Electronic Intrusion Moore Stolen AgilentComputer Stephens Technologies Piedmont (20) Data Systems Consulting (32) Community (1) (2) at (1)College (1)(1) University of North Carolina Charlotte (1) Roses Only (1) Charter Elliot Invision Moraine Stolen Alaska Health Device Air Communications HR Park Group Staffing System Technical (18) (1) Group (1) College (1) (1) (1) University of South Carolina (2) Royal Bank ofTexas Scotland Chilean Emotive Iowa MTV Stolen Alliance State Networks Documents Government Boots (1)ofUniversity (1) (3) (1) (1)(1) (2) University System Royal Bolton Hospital Chipotle Employee Iron National Stolen AlliedMountain Irish Laptop Mexican Guard Fraud Bank (2) (105) Bureau (1) (21) Grill (1) (1) University of Toledo (2)(1) Royal Perth Hospital (1) Chrysler Employee Isle National Stolen Altman of Wight Tape Weil Heart Corporation Mistake (6) (1) NHS Lung PCT (56) and (1) (1) University of Utah (2) Blood Institute (1) Russells Hall Hospital (1) (1) Chrysler Employee IVAX National Stryker American (1)Corporation Institutes Financial Airlines Theft (2)(1) of (1)(1) Health University of Virginia (1) S and Famous Brands Citibank Fallon J. Nationwide SunGard American LohrKCommunity Vineyards Student Higher Express Education Loan (1) Health (1) Society Corporation Plan (1) (1)(1) (1) University ofBuilding Wisconsin (1)(1) S and K Menswear (1) Citizens Family J.C. NatWest Super Americhoice Penney 8Video Advice Worldwide (1) (1) (1)(1) (1) Unknown (3) (1) Saks Incorporated (1) (1) Citizens Ferris Jobs.ie Naval Sweetbay Anheuser-Busch State Surface forSupermarket Responsible University Warfare Companies Center (1) Government (1) Dahlgren (1) update (1) Salem Associates (1) Network Fidelity Johns Nestle Swimwear Antioch Hopkins Waters Investments University (1) Boutique North Hospital (1) (1) America (1) (1) USinternetworking Inc. (3) SalesForce.com (2) City Fidelity Johnson Nevada Sydney Aon of Consulting Columbus National West Department andLLC Johnson Area (1) Information (1) Health of(2) Public Service Services Safety (1)(1) (1) UT-Battelle (1) Salt Lake Community College (1) City First Joliet Nevada Systematic Applera of Calgary Township Gary State Corporation Automation (1) Savings Democratic High (1) Schools (1) Inc Party (6) (1) (1) UTUIA (1) Sandown Health Centre (1) (1)(1) City First Kansas New T. Arapahoe Rowe of Magnus England Minneola State Price Community Financial University School (1)(FL) ofCollege (1) Law (1) VA Medical Center (2)(1) Scarborough & Tweed (1) District City Foreign Keller New Target Archive ofMexico Independent Corporation San and America Francisco Commonwealth State (1)University (1) School (1) Office (1) (1) (1) Verified Identity Pass (1) Schering Plough (1) City Franklin Kellogg New TD ARCO Ameritrade of South Yuma (1) Community University Wales (1) (1) Government (1) Federal Credit (1) Union Verisign (1) SearsHomeCenter.com (1)(1) City Fresno (1) New TD Arizona Bank University York County Board Financial University of (1)(1) New Regents Group (1)York (1) (1) Verizon Wireless SearsRoomForKids.com (1) Clovis Front KimsCrafts NHS TD Arizona Canada Trust Range Unified State (12) (1) Trust Mortgage School University (1) District (1) (1) (1) Vertical Web Media (1) SearsShowPlace.com (1) CNET Full King NHTI Tel Art.com Sell Spectrum County (1) Networks (1) (1) (1) Transportation Lending (1) (1) Department (1) VFS Global Select Medical Corporation (1) DLP solutions: Costly and Complex? ROI investing in DLP 30 25 20 Sec. Level • A total DLP solution need to install a DLP agent in endpoints, servers and in the Gateway • Installing agents in the PC and notebooks is costly, intrusive and requires the training of the users and a heavy previous consultancy • But… is it really required? According with the last reports most of the data leaks happends through the gateway. • A DLP solution deployed in the gateway is protecting against more than 60-70% of the data leaks but it has a cost several times lower than an endpoint DLP solution. 15 Sec 10 5 0 0 1 2 3 4 5 6 $ 7 8 9 10 11 12 Where and what information is lost? What types of Data Leak? Where’s the Data Leaked? 2 in 3 losses (>66%) via Email or Web Source: Ponemon Institute based upon publicly reported leaks Introduction - Clearswift Data Loss Prevention (DLP) today ……………………………………………………......….……………….………………………………………………………..……………….. ……………………………………………………......….……………….………………………………………………………..……………….. Clearswift already offers Multiple protocols || Common policy and management || Bi-directional protection || DLP & Boundary hygiene ……………………………………………………......….……………….………………………………………………………..……………….. ……………………………………………………......….……………….………………………………………………………..……………….. ……………………………………………………......….……………….………………………………………………………..……………….. ……………………………………………………......….……………….………………………………………………………..……………….. MIMEsweeper DLP includes: • • • • • • Enhanced deep content inspection True file/data type recognition Lexical analysis Managed & User defined lists for HIPAA, SOX, SEC, Stock Trading Profanity, harassment, paedophilia control Image control • • • • • • Templates to detect PII and PCI data Lexical expressions and scripts IPR protection Whole document checksum controls (SMTP) Sender, recipient, direction, size, file-type And more…. ……………………………………………………......….……………….………………………………………………………..……………….. ……………………………………………………......….……………….………………………………………………………..……………….. What is Clearswift CONTENTsafe™? • • • • • An extension to MIMEsweeper’s data loss prevention capabilities Designed to allow ‘line of business’ staff to easily identify and protect their highly confidential information Providing a central repository for protected document checksums With the checksums used to deliver policy driven security control over documented information and all of its constituent parts Integrates with any MIMEsweeper e-mail or web* gateway security solution * MIMEsweeper Web & Email appliances by mid-2009 What additional data loss capabilities does CONTENTsafe™ provide? • Universal identification of sensitive content • Protocol agnostic content detection • Mapping of individual user network locations for sensitive information • Creation of checksums with a guaranteed 150 character match rate • Automatic scanning of file & document locations for new documents & changes to existing documents • Document protection expiry rules & dates • Granular roles based user access & user delegation • Multi-language and multi-byte character support • White-listing to minimize false positives How does CONTENTsafe™ work? User Mail / Web Appliance 101101 001001 101110 Data Creator 101101 001001 101110 Match Status CONTENTSafe Appliance What file types are protected by CONTENTsafe™? • Uses MIMEsweeper deep content inspection so can extract documents from zip, tar, TNEF etc. • Able to checksum/fingerprint content from: – CDA, HTML, Ichitaro, MS Excel, Outlook file attachment, MS PowerPoint, MS Project, MS Word, Open document text, Open document spreadsheet, Open document presentation, Open document formula, Open document drawing, Open document master, PDF, PEM message if not encrypted, PGP message if not encrypted, RTF encoded HTML, text, XML, Script What is the performance of CONTENTsafe? • A single CONTENTsafe appliance is designed to protect up to 500,000 documents • A single CONTENTsafe appliance is able to process 1 million email queries per day with negligible impact on e-mail throughput • The average time to check a message from SMTP is less than 50ms + any network latency * These results were obtained via simulation as part of the ongoing development testing How is CONTENTsafe™ available? Hardened 64bit Linux appliance 500,000 document capacity Individual user areas Document registration via: • Network locations, • Uploaded documents • Pasting text fragments • Whole document detection • Document extract detection • Document extract white-listing Violation alerting Global & User Management/Auditing/Reporting Business roles administration Clearswift Overview Questions?