cloud visibility & cloud data loss prevention approaches
TRANSCRIPT
© 2015 CipherCloud | All rights reserved. 1© 2014 CipherCloud | All rights reserved.
© 2015 CipherCloud | All rights reserved
Cloud Visibility and Data Loss PreventionSteps to managing Shadow IT and lowering the risk of data loss in the cloud
© 2015 CipherCloud | All rights reserved. 2
Agenda
Trends and Challenges
• Mobile, Cloud, Social
• No visibility, unknown risks
Cloud Visibility and DLP Steps
① Cloud application inventory
• Block risky clouds
② Cloud application consolidation
• Using cloud security risk scoring and intelligence
③ Compliance scanning and monitoring
• Proactive data discovery in sanctioned clouds
Solution Overview
About CipherCloud
© 2015 CipherCloud | All rights reserved. 4
IT must play catch-up with users and business lines “bring your own” trend
Seeing user activity across cloud applications
Measuring the risk profile of cloud applications
Understanding what factors make cloud applications risky
Converting user activity and cloud risk factors into actionable intelligence
Trends Transforming Enterprises
Mobile Cloud Social
90% use publicnetworks for work access
100+ cloud apps per enterprise
15+ passwords peremployee
Key concerns
50% of Users BYOD
67% LOB SanctionBYOA
75% of Users want to BYOI
© 2015 CipherCloud | All rights reserved. 5© 2015 CipherCloud | All rights reserved. 5
Apps and People on the Move = No Visibility, Unknown Risks
? ?User adopted and mission critical applications increasingly reside outside the enterprise
narrowing visibility and introducing unknown cloud computing risks
On-siteapplications
IT Staff
4
Home-based Users
SaaS
Mobile Users
IaaS/PaaS
© 2015 CipherCloud | All rights reserved. 7© 2015 CipherCloud | All rights reserved. 7
Step 1: Cloud Application Inventory
Challenge
• Easy for users to adopt multiple cloud applications
• IT can’t see who is doing what
What applications are used?
How many users access each app?
What is the level of activity?
• Maintain security of sensitive logs
• Block high risk clouds
• Aggregates log analysis across all locations and devices
Multiple log formats from multiple sources
Continuous and automated scheduling of log scans
• Logs files never leave enterprise
• Discovers all cloud applications
• Tracks relevant user and activity patterns
• Generate blocking scripts
CipherCloud Approach
© 2015 CipherCloud | All rights reserved. 8© 2015 CipherCloud | All rights reserved. 8
Step 2: Cloud Application Consolidation
Challenge
• Measure and compare cloud application risk
Across all cloud applications and application categories
Content sharing, collaboration, CRM, IT Infrastructure etc.
• Establish cloud security risk metrics suitable for your industry and governance policy
• Consolidate users onto low risk clouds
• Dashboards enables aggregate analysis
• Accurate risk scores for thousands of applications
• Transparent, standards aligned methodology
• Supports cloud app selection, consolidation
• Adjust risk weightings for specific risk factors across:
Security
Privacy
Environment
Compliance
CipherCloud Approach
© 2015 CipherCloud | All rights reserved. 9© 2015 CipherCloud | All rights reserved. 9
Step 3: Compliance Scanning and Monitoring
Challenge
• Limited visibility into data flows, sharing
• Policy violations
• No consistent monitoring of user activity
• Corporate Data Loss Prevention controls don’t address cloud data
• Preserve user experience
• One platform across apps for cloud DLP, UAM and anomaly detection
© 2015 CipherCloud | All rights reserved. 10© 2015 CipherCloud | All rights reserved. 10
CipherCloud Approach
• Proactive data discovery for multiple clouds
• Scanning for cloud data compliance violations
• Notify, Delete, Quarantine or Encrypt
• Granular visibility into all user activity
Tracking of all object types, users, IPs, files
• Integration with corporate Data Loss Prevention
• Flexible anomaly detection
Alerts on unusual behavior
Thresholds for downloads, logins, work hours and more
• Intuitive dashboards with easy drill-down
• Works seamlessly in background
© 2015 CipherCloud | All rights reserved. 12
Cloud Storage and Collaboration –Highlights
Data loss prevention (DLP) tailored for file sharing platforms• Configurable DLP policy controls
• Flexible range of enforcement actions
• Integrates with enterprise DLP systems
Cloud Malware protection• Scan triggered on uploads, deletes infected files
Seamless integration• No impact on usability or features
• Scanning happens seamlessly in the background
• Works with all desktop & mobile clients
Real-time and on-demand scanning• Allows for easy on-boarding, or periodic
scanning of specific folders
Cloud Data Protection• Policy based encryption with customer managed keys
Detailed, granular reporting• Configurable dashboards
• Easy drill-down on users, content, and policy violations
© 2015 CipherCloud | All rights reserved. 13
CRM –Highlights
Proactive discovery of sensitive data• On-demand queries for any organization
• Understands all types of objects and data in CRM
Extends corporate policies to the cloud• Built-in scanning engine with advanced policies for
HIPAA/HITECH, GLBA, PCI, ABA, SWIFT, NDC codes
• Integrates with enterprise DLP systems including Symantec and RSA
Advanced controls with intuitive dashboards• Easy configuration of policies
• Comprehensive dashboard views of all scans
• Direct drill-down to violation sources in CRM
• Exportable data in multiple formats
© 2015 CipherCloud | All rights reserved. 14© 2015 CipherCloud | All rights reserved. 14
CipherCloud Platform ArchitectureCloud Discovery, Compliance Scanning and User Activity Monitoring
HTTPS
Enterprise Boundary
Detailed Usage Analytics -
Dashboards and Reports
Discover and Monitor
Unified Management and Visibility
ManagementReportingDashboards
Cloud Discovery(FW, Web Proxy)
User Activity Monitoring
Browser
CipherCloud Discovery, UAM and DLP Platform
Scalable, Big Data Infrastructure
Web Proxy
Mobile Users and
Devices
InternalUsers
Cloud Apps
CloudSource™Knowledge
Base
ComplianceScanning/DLP
Unified Policyand
Administration
Risk Profiling &Scoring
AnomalyDetection
Policy Enforcement
Measure, Detect and Enforce
CipherCloudRisk Intelligence Lab™
Opt. ExternalDLP (via ICAP)
© 2015 CipherCloud | All rights reserved. 15
How CipherCloud is Different
The only vendor to put it all together• Cloud Application and Data Discovery, Protection, DLP, Monitoring and
Anomaly Detection
Technology leader in cloud encryption and tokenization• Multiple patents including Searchable Strong Encryption
Seamless integration for major cloud applications• Transparent to users, preservers functionality
Market leader in an important new space• 100+ customers in banking, financial services, healthcare, pharma, hi-tech
• Far more customers than all other vendors – combined
© 2015 CipherCloud | All rights reserved. 16
सঘसळઑগथଏथఒਅਮ ਏইঋ ਏইঋਮદਮ सਅঋ ણयধતટਝઅस ଚଥগਹ ਇय
ਏইঋअਪरਙਮউਮ થઍमণଳअঋଆଡ. सਝयধતଥकઅ ਏইঋसਝఊર ଛઅগ
agencies are want to do, is remaining tight lipped about its efforts, but considering the far flung and CIA and its control operatives
Comprehensive Cloud Information Protection
PROTECT
© 2015 CipherCloud | All rights reserved. 17
500+ Employees
Company
3.0+ MillionActive Users
13 Industries
25 Countries
7 Languages
P 13 Patents
About CipherCloud
Solutions
Cloud Discovery
Cloud DLP
Strong Encryption
Tokenization
Activity Monitoring
Anomaly Detection
Customers
5 out of 10Top US Banks
3 out of 5Top Health Providers
Top 2 GlobalTelecomm Company
40% of GlobalMail Delivery
Largest USMedia Company
3 out of 5Top Pharmaceuticals
© 2015 CipherCloud | All rights reserved. 18
More Information
Watch this On-demand Webinar :
http://pages.ciphercloud.com/Webinar2015-02-05PracticalApproachestoCloudVisibilityandDataLossPrevention_OnDemand.html?Slideshare
For additional information :
• Website: www.ciphercloud.com
• Twitter: @ciphercloud
• Email: [email protected]
• LinkedIn: www.linkedin.com/company/ciphercloud
• Phone: +1 855-5CIPHER
David BermanCloud Discovery and DLP
Twitter: @berman_david
Cloud Adoption and Risk Report
2014 North American and European Trends