DOC PREVIEW
NU MSIT 458 - Sophos Safeguard Enterprise - A Solution for Data Protection

This preview shows page 1-2-22-23 out of 23 pages.

Save
View full document
View full document
Premium Document
Do you want full access? Go Premium and unlock all 23 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 23 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 23 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 23 pages.
Access to all documents
Download any document
Ad free experience
Premium Document
Do you want full access? Go Premium and unlock all 23 pages.
Access to all documents
Download any document
Ad free experience

Unformatted text preview:

Sophos Safeguard Enterprise: A Solution for Data ProtectionProblem statementWhat is security?Challenges to achieving laptop securityThe Threat to Data is Real!!A Perspective on Laptop Theft and Data LossMyths on data securitySlide 8Top IT Security Solutions Organizations are usingAgreement with Statement about currently available IT security SolutionsSolutionOverall Cascadia Lab’s Summary comparisonComparison of key solution providers in the market today by categorySC Magazine Awards 2011Sophos as a solutionCase Study – Financial & Legal –Case Study – GovernmentSlide 18Analysis of Total Cost of Ownership (TCO)Sample Vendor Vs. Sophos: Cost Savings Analysis Over a 5 Year PeriodSample Vendor Vs. Sophos: Extent of Cost Category to Total CostSnapshot of Voice of the Sophos End Point Security CustomerBack up SlidesSophos Safeguard Enterprise: A Solution for Data ProtectionPresented by: W3(cube)1Problem statementThreat of Data theft or exposure from lost, stolen, or inappropriate decommissioned laptops.2What is security?“In the real world, security involves processes. It involves preventative technologies, but also detection and reaction processes, and an entire forensic system to hunt down and prosecute the guilty. Security is not a product; it itself is a process…..” Bruce Shneiner (Secrets and Lies, Wiley and Sons, Inc.)3Challenges to achieving laptop security•Cost•User negligence/sabotage of security measures•Increased value of information•Increase in access to computers =increased hackers not limited by time and space4The Threat to Data is Real!! 5A Perspective on Laptop Theft and Data Loss•Laptop theft and data loss are escalating concerns for companies of all sizes - from Fortune 500 level to small-to-medium sized businesses - and according to the FBI, 97% of stolen laptops are never recovered.•As employees become increasingly more mobile and rely on multiple mobile devices from laptops, smartphones and iPads to conduct business, crimes associated with these devices are also on the rise. Malicious insiders as well as outside culprits are increasingly becoming more innovative and inventive in finding ways to steal valuable information and proprietary data from company and employee mobile devices and laptops that don't have appropriate endpoint security. Source: http://www.bizjournals.com/losangeles/prnewswire/press_releases/California/2011/11/07/LA00777Los Angeles Business: Awareness Technologies Security Advisory: Top tips to prevent laptop theft (Nov 7, 2011)6Myths on data securityThe field of data security is rife with mistaken beliefs which cause people to design ineffective security solutions. Here are some of the most prevalent security myths:Myth: Hackers cause most security breaches. •In fact, 80% of data loss is to caused by insiders.Myth: Encryption makes your data secure. •In fact, encryption is only one approach to securing data. Security also requires access control, data integrity, system availability, and auditing.Myth: Firewalls make your data secure. •In fact, 40% of Internet break-ins occur in spite of a firewall being in place.http://Data Security Challenges:Oracle9i Security OverviewTo design an effective security solution you must understand the security requirements scope of current threats to your data.7Four Elements of an Effective Data Loss Prevention StrategyEffective Data Loss Prevention Strategy (DLP)Control User Environment by restricting data exit pointsProtect confidential and sensitive informationClassify intellectual property and sensitive business dataPrevent leakage of personal identifiable information•Control devices, applications, email and web usage•Ensure security policy compliance•Full disk, removable storage and file encryption•Email encryption•Comprehensive coverage of personally identifiable information types•Continuously assess, audit, report and enforce on endpoint and gateway•Empower knowledge workers to classify sensitive business data•Apply classification to existing documents and data setsSource: Sophos / Utimaco Data Loss Prevention by Peter Szendröi, SOPHOS Nordics(Jan 20, 2010) page 108Top IT Security Solutions Organizations are using Source: Harris Interactive: IT Security Final Report July 20119Agreement with Statement about currently available IT security SolutionsSource: Harris Interactive: IT Security Final Report July 201110SolutionSophos Safeguard Enterprise11Overall Cascadia Lab’s Summary comparison" [McAfee 8.7i] provides only basic device control and was slow in our performance testing. "" [Sophos 9.0] combines ease of use with excellent performance and very good support. It's the only product in the group to integrate data loss prevention capabilities"" [Symantec 11] delivered a solid experience from the start and provides robust policy management and reporting. Tech support, however, was very disappointing"" [Trend Micro 10] has too many confusing components, making for difficult installation and policy management. "http://www.sophos.com/en-us/security-news-trends/security-trends/enterprise-review.aspx - comparison12Comparison of key solution providers in the market today by categorySource: Cascadia Labs: Comparative Review of Endpoint Security for Enterprises Comparative review Link 13SC Magazine Awards 2011Best Mobile/Portable Device Security•Good Technology for Good for Enterprise•IronKey for IronKey Enterprise•McAfee for McAfee Enterprise Mobility Management (McAfee EMM)•Sophos for Sophos SafeGuard Enterprise•Symantec for Symantec Endpoint Protection Mobile EditionBest Endpoint/UTM Security•Check Point Software Technologies for Check Point UTM-1•McAfee for McAfee Total Protection for Endpoint, Enterprise Edition•SonicWALL for SonicWALL E-Class Network Security Appliance (NSA) E8500•Sophos for Sophos Endpoint Security and Data Protection•Symantec for Symantec Endpoint Protection 11.0SC Awards 201114Sophos as a solutionComponent DetailsManagement CenterImplements and enforces a common, organization-wide security policy framework with a central point of management control in mixed IT environments.Device Encryption•Transparent full-disk encryption (30% faster than competitors)•Can run & manage Opal, BitLocker, Windows 7, Vista, XP and virtual desktops from one central management console•Fast initial encryption algorithm•Recovery options when helpdesk can not be reached•Enables pre-boot user authentication•Provides single sign-on


View Full Document

NU MSIT 458 - Sophos Safeguard Enterprise - A Solution for Data Protection

Documents in this Course
Snort

Snort

25 pages

Hacked

Hacked

23 pages

Hacked

Hacked

6 pages

Firewalls

Firewalls

52 pages

Load more
Download Sophos Safeguard Enterprise - A Solution for Data Protection
Our administrator received your request to download this document. We will send you the file to your email shortly.
Loading Unlocking...
Login

Join to view Sophos Safeguard Enterprise - A Solution for Data Protection and access 3M+ class-specific study document.

or
We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view Sophos Safeguard Enterprise - A Solution for Data Protection 2 2 and access 3M+ class-specific study document.

or

By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?