Customer Spotlight: Deploying a Data Protection Program in less than 120 Days Michael Ring, Jabil Mark Stevens, Digital Guardian
Agenda Introduction Deploying a Data Protection Program in < 120 Days Mike Ring, Jabil • Digital Guardian Overview Mark Stevens, Digital Guardian • Live Q&A with Mike and Mark
About Mike Ring Senior IT Manager, Threat and Solution Architect 15 years’ experience in InfoSec
Jabil Proven Manufacturing Solutions Global Expertise. Intelligent Supply Chain Design. Global manufacturing services company 180,000+ employees 90 plants in 23 countries $17.2B revenue in 2013
Jabil’s Security Situation Data protection was in catch up mode Lacked basic processes “IP could be anything” Security could be a competitive advantage
Jabil’s I T Environm ent Cloud-based IT environment since 2010 No standardization Had budget but not headcount to accelerate security maturity
Security Objectives 52,000 devices at one level of security, needed to get to higher level Protect: IP: Jabil’s and customers’ • Pricing data • Employee data • Quickly build a program focused on agility and collaboration
Jabil’s Solution Three key security technologies Web Web Proxy SSO • Proxy Single Sign-on • Data Protection • Had to be 100% managed service Data Protection
W hy DG Managed Security Program InfoSec can govern, not administer Unique context-awareness Capabilities beyond just DLP Very fast ramp Time to value
Getting the CI O on Board Prior successful rapid deployments Application usage collection was major value-add Able to reconcile license usage and reduce costs
I m plem enting Digital Guardian 3,000 agents deployed in dev environment 49,000 agents deployed next June July August May 3,000 49,000 Initial Engagement Agents Deployed Agents Deployed in Development in Monitor Mode Fast Forward Framework
Results Gained immediate visibility into all data access and usage Saw data getting copied to USB drives Used egress reports to drive adoption
W hat’s Next? Using visibility to drive classification and policy making Transition to operational plan Roll out DG controls to mitigate top data risks DG for advanced threat detection and forensic analysis
About Mark Stevens VP, Global Services & Support Driving customer success 20 year tech industry veteran IBM, BMC, Progress, Lotus •
Data-Centric Security Recap “In this new reality, traditional perimeter-based approaches to security are insufficient. S&R pros must take a dat ata-ce centric c ap appro roac ach that at e ensu sure res se s securi rity t trav ravels s with t the dat ata a re regard ardless ss of use ser p r populat ation, locat ation, or e r even host sting m model.” The Future Of Data Security: A Zero Trust Approach John Kindervag, Heidi Shey, and Kelley Mak, June 5, 2014 Confidential 14
Data Security That Starts at the Source 15
Patented, Proven Endpoint Agent 16
Automatic Sensitive Data Classification 17
STOP Data Theft From Insiders and Outsiders 18
Protect Your Data From Insider Threats Confidential 19
Protect Your Data for the Best Defense from Outsider Threats Confidential 20
Flexible Deployment Models “By selecting the managed service deployment option, we were able to be up and running in a matter of weeks. The added visibility into how our confidential data is being used is invaluable.” CISO, Regional Bank Option 3 Option 1 Option 2 Hybrid On Premise Managed Service Managed Service On Premise Infrastructure hosted in Infrastructure hosted in your Infrastructure hosted in Verdasys private cloud environment. your environment Administered by Verdasys Administered remotely by Self-administration Pro Services Verdasys Pro Services Policies, rules and reports Access to policies, rules, and Data remains within your IT managed by you reports environment. Engage with Verdasys Pro Weekly status meetings Services as needed Confidential 21
22
23
24
Questions?
Recommend
More recommend