lions, tigers, and phi, oh my! the latest in data loss prevention in the cloud
TRANSCRIPT
![Page 1: Lions, Tigers, and PHI, Oh My! The latest in data loss prevention in the cloud](https://reader033.vdocuments.us/reader033/viewer/2022042908/58ef77d31a28ab201b8b457f/html5/thumbnails/1.jpg)
Netskope RoadmapLions, Tigers, and PHI, Oh My!A webinar about the latest in data loss prevention in the cloud
John KindervagVice President & Principal Analyst
Forrester
Rajneesh ChopraVice President, Product
ManagementNetskope
![Page 2: Lions, Tigers, and PHI, Oh My! The latest in data loss prevention in the cloud](https://reader033.vdocuments.us/reader033/viewer/2022042908/58ef77d31a28ab201b8b457f/html5/thumbnails/2.jpg)
2© 2015 Netskope. Company Confidential
Leader in cloud security and governance• Find, understand and secure
all cloud apps. Sanctioned by IT or not
• Surgical visibility and control + noise-cancelling DLP
• Working with Fortune 500 enterprises from financial services, healthcare and retail
About Netskope
![Page 3: Lions, Tigers, and PHI, Oh My! The latest in data loss prevention in the cloud](https://reader033.vdocuments.us/reader033/viewer/2022042908/58ef77d31a28ab201b8b457f/html5/thumbnails/3.jpg)
© 2015 Forrester Research, Inc. Reproduction Prohibited 3
Yesterday’s data
![Page 4: Lions, Tigers, and PHI, Oh My! The latest in data loss prevention in the cloud](https://reader033.vdocuments.us/reader033/viewer/2022042908/58ef77d31a28ab201b8b457f/html5/thumbnails/4.jpg)
© 2015 Forrester Research, Inc. Reproduction Prohibited 4
Today’s data
![Page 5: Lions, Tigers, and PHI, Oh My! The latest in data loss prevention in the cloud](https://reader033.vdocuments.us/reader033/viewer/2022042908/58ef77d31a28ab201b8b457f/html5/thumbnails/5.jpg)
© 2015 Forrester Research, Inc. Reproduction Prohibited 5
And sometimes you store big data in the cloud
![Page 6: Lions, Tigers, and PHI, Oh My! The latest in data loss prevention in the cloud](https://reader033.vdocuments.us/reader033/viewer/2022042908/58ef77d31a28ab201b8b457f/html5/thumbnails/6.jpg)
© 2015 Forrester Research, Inc. Reproduction Prohibited 6
Selling (Worldwide Cvvs, Worldwide Fullz, UK, Usa Logins Worldwide Dumps, UK, Usa Paypal, Ebay Accounts...)
![Page 7: Lions, Tigers, and PHI, Oh My! The latest in data loss prevention in the cloud](https://reader033.vdocuments.us/reader033/viewer/2022042908/58ef77d31a28ab201b8b457f/html5/thumbnails/7.jpg)
Everything else2. . . they won’t steal it.
Two types of data
1Data that someone wants to steal
![Page 8: Lions, Tigers, and PHI, Oh My! The latest in data loss prevention in the cloud](https://reader033.vdocuments.us/reader033/viewer/2022042908/58ef77d31a28ab201b8b457f/html5/thumbnails/8.jpg)
Remember the four P’s
• PCI• PHI• PII• IP
3P + IP = TD
![Page 9: Lions, Tigers, and PHI, Oh My! The latest in data loss prevention in the cloud](https://reader033.vdocuments.us/reader033/viewer/2022042908/58ef77d31a28ab201b8b457f/html5/thumbnails/9.jpg)
Two Effective Metrics
1. Have your networks or systems been infiltrated by malicious actors?
2. Has your toxic data been exfiltrated from your networks or systems into the hands of malicious actors?
Intrusion
Breach
![Page 10: Lions, Tigers, and PHI, Oh My! The latest in data loss prevention in the cloud](https://reader033.vdocuments.us/reader033/viewer/2022042908/58ef77d31a28ab201b8b457f/html5/thumbnails/10.jpg)
10© 2015 Netskope. All Rights Reserved.
Data access patterns have evolved – almost completely
![Page 11: Lions, Tigers, and PHI, Oh My! The latest in data loss prevention in the cloud](https://reader033.vdocuments.us/reader033/viewer/2022042908/58ef77d31a28ab201b8b457f/html5/thumbnails/11.jpg)
The Perimeter is GONE!
![Page 12: Lions, Tigers, and PHI, Oh My! The latest in data loss prevention in the cloud](https://reader033.vdocuments.us/reader033/viewer/2022042908/58ef77d31a28ab201b8b457f/html5/thumbnails/12.jpg)
Transactions Use Multiple Platforms
June 2014 “Three Forcing Functions That Will Extend Your Data Center’s Network Services Beyond Its Walls”
![Page 13: Lions, Tigers, and PHI, Oh My! The latest in data loss prevention in the cloud](https://reader033.vdocuments.us/reader033/viewer/2022042908/58ef77d31a28ab201b8b457f/html5/thumbnails/13.jpg)
13© 2015 Netskope. All Rights Reserved.
DLP solutions have been tuned over and over again
![Page 14: Lions, Tigers, and PHI, Oh My! The latest in data loss prevention in the cloud](https://reader033.vdocuments.us/reader033/viewer/2022042908/58ef77d31a28ab201b8b457f/html5/thumbnails/14.jpg)
14© 2015 Netskope. All Rights Reserved.
DLP inspection remains firmly on-premises
![Page 15: Lions, Tigers, and PHI, Oh My! The latest in data loss prevention in the cloud](https://reader033.vdocuments.us/reader033/viewer/2022042908/58ef77d31a28ab201b8b457f/html5/thumbnails/15.jpg)
WE NEED A NEW WAY OF THINKING
We need a newway of thinking about trust and
DLP
![Page 16: Lions, Tigers, and PHI, Oh My! The latest in data loss prevention in the cloud](https://reader033.vdocuments.us/reader033/viewer/2022042908/58ef77d31a28ab201b8b457f/html5/thumbnails/16.jpg)
Data security and control framework
DissectData intelligence Data analytics
DefineData discovery Data classification
DefendAccess Inspect Dispose KillZero Trust
![Page 17: Lions, Tigers, and PHI, Oh My! The latest in data loss prevention in the cloud](https://reader033.vdocuments.us/reader033/viewer/2022042908/58ef77d31a28ab201b8b457f/html5/thumbnails/17.jpg)
© 2015 Forrester Research, Inc. Reproduction Prohibited 17
Zero Trust is . . .
A new model of information security that identifies the fundamental problem as a broken trust model where users and traffic inside the network are trusted, and those external to the network are untrusted.
![Page 18: Lions, Tigers, and PHI, Oh My! The latest in data loss prevention in the cloud](https://reader033.vdocuments.us/reader033/viewer/2022042908/58ef77d31a28ab201b8b457f/html5/thumbnails/18.jpg)
Core concepts of Zero Trust
Verify and secure all resources regardless of location
![Page 19: Lions, Tigers, and PHI, Oh My! The latest in data loss prevention in the cloud](https://reader033.vdocuments.us/reader033/viewer/2022042908/58ef77d31a28ab201b8b457f/html5/thumbnails/19.jpg)
Core concepts of Zero Trust
Verify and secure all resources regardless of location
Limit and strictly enforce access control
![Page 20: Lions, Tigers, and PHI, Oh My! The latest in data loss prevention in the cloud](https://reader033.vdocuments.us/reader033/viewer/2022042908/58ef77d31a28ab201b8b457f/html5/thumbnails/20.jpg)
Core concepts of Zero Trust
Verify and secure all resources regardless of location
Limit and strictly enforce access control
Inspect and log all traffic
![Page 21: Lions, Tigers, and PHI, Oh My! The latest in data loss prevention in the cloud](https://reader033.vdocuments.us/reader033/viewer/2022042908/58ef77d31a28ab201b8b457f/html5/thumbnails/21.jpg)
Two Effective Metrics
1. Have your networks or systems been infiltrated by malicious actors?
2. Has your toxic data been exfiltrated from your networks or systems into the hands of malicious actors?
Intrusion
Breach
Stop Data Exfil
![Page 22: Lions, Tigers, and PHI, Oh My! The latest in data loss prevention in the cloud](https://reader033.vdocuments.us/reader033/viewer/2022042908/58ef77d31a28ab201b8b457f/html5/thumbnails/22.jpg)
Data security and control framework
DissectData intelligence Data analytics
DefendAccess
DefineData discovery Data classification
Inspect Dispose Kill
![Page 23: Lions, Tigers, and PHI, Oh My! The latest in data loss prevention in the cloud](https://reader033.vdocuments.us/reader033/viewer/2022042908/58ef77d31a28ab201b8b457f/html5/thumbnails/23.jpg)
The DLP Maturity Grid
Discover Classify Consolidate Design Enforce
Cloud
![Page 24: Lions, Tigers, and PHI, Oh My! The latest in data loss prevention in the cloud](https://reader033.vdocuments.us/reader033/viewer/2022042908/58ef77d31a28ab201b8b457f/html5/thumbnails/24.jpg)
Data security and control framework
DissectData intelligence Data analytics
DefendAccess
DefineData discovery Data classification
Inspect Dispose Kill
![Page 25: Lions, Tigers, and PHI, Oh My! The latest in data loss prevention in the cloud](https://reader033.vdocuments.us/reader033/viewer/2022042908/58ef77d31a28ab201b8b457f/html5/thumbnails/25.jpg)
Killing Data = Abstracting Data via
Data Masking• Test Data
Tokenization• Credit Cards
• SSNEncryption
• Toxic Data
• Intellectual Property
![Page 26: Lions, Tigers, and PHI, Oh My! The latest in data loss prevention in the cloud](https://reader033.vdocuments.us/reader033/viewer/2022042908/58ef77d31a28ab201b8b457f/html5/thumbnails/26.jpg)
CORP
SaaS
D
IaaS
DPaaS
D
D
SP
D
Private
D
INTERNET
›Use Zero Trust Network Architectural concepts in your cloud
›Stop Data Exfil›Killing Data is Effective DLP
Zero Trust Cloud Protection
![Page 27: Lions, Tigers, and PHI, Oh My! The latest in data loss prevention in the cloud](https://reader033.vdocuments.us/reader033/viewer/2022042908/58ef77d31a28ab201b8b457f/html5/thumbnails/27.jpg)
© 2015 Forrester Research, Inc. Reproduction Prohibited 27
Purpose-built apps
Most cloudapps
![Page 28: Lions, Tigers, and PHI, Oh My! The latest in data loss prevention in the cloud](https://reader033.vdocuments.us/reader033/viewer/2022042908/58ef77d31a28ab201b8b457f/html5/thumbnails/28.jpg)
© 2015 Netskope. All Rights Reserved. Confidential 28
All cloud apps (800+ per enterprise)
All users have access
Any content
Data Loss Any activity
• Restrict to risky apps• Restrict to app category
• Restrict to users/groups• Restrict to location• Restrict to device
• Restrict to certain activities
• Restrict to content type• Restrict to fingerprinted
or exact match
Take a layered approach to address problem
![Page 29: Lions, Tigers, and PHI, Oh My! The latest in data loss prevention in the cloud](https://reader033.vdocuments.us/reader033/viewer/2022042908/58ef77d31a28ab201b8b457f/html5/thumbnails/29.jpg)
© 2015 Netskope. All Rights Reserved. Confidential 29
All cloud apps (800+ per enterprise)
All users have access
Any content
Data Loss Any activity
Result: Much lower surface area for risk
Reduced content footprint
Reduced app
footprint
Reduced user
footprint
Reduced activity footprint‘Quarantine
PII data uploadedby finance team in NYC to risky cloud
storage apps’
Result• Fewer false positives • Improved accuracy• More reliable Cloud DLP
![Page 30: Lions, Tigers, and PHI, Oh My! The latest in data loss prevention in the cloud](https://reader033.vdocuments.us/reader033/viewer/2022042908/58ef77d31a28ab201b8b457f/html5/thumbnails/30.jpg)
© 2015 Netskope. All Rights Reserved. 30
Fingerprinting and Exact Match
Benefits• Full coverage. Apply policies for data in motion or data at rest
• Improved accuracy. Detect even if excerpts of the sensitive data leaks with minimal misclassifications.
• Easy policy enforcement. No policy tuning needed – use the original content to translate into the policy.
Organize sensitive data in a CSV
Generate an Exact Match
hash
Augment any DLP Rule with Exact
match
Fingerprinting
Exact Match
Identify sensitive documents
Fingerprint the assets
Apply Fingerprint
policy
![Page 31: Lions, Tigers, and PHI, Oh My! The latest in data loss prevention in the cloud](https://reader033.vdocuments.us/reader033/viewer/2022042908/58ef77d31a28ab201b8b457f/html5/thumbnails/31.jpg)
© 2015 Netskope. All Rights Reserved. 31
Fingerprinting Use Case
1. Bob wants to steal a company confidential design document
2. So, Bob copy pastes parts of this
design document into Gmail and sends it out.
![Page 32: Lions, Tigers, and PHI, Oh My! The latest in data loss prevention in the cloud](https://reader033.vdocuments.us/reader033/viewer/2022042908/58ef77d31a28ab201b8b457f/html5/thumbnails/32.jpg)
© 2015 Netskope. All Rights Reserved. 32
Through DLP file fingerprinting organizations can detect confidential information leak even if it is copy pasted.
• Can be applied to any file type: • Zip files• Encrypted files• Password protected• Renamed files• Extension changes • ... It doesn’t matter
![Page 33: Lions, Tigers, and PHI, Oh My! The latest in data loss prevention in the cloud](https://reader033.vdocuments.us/reader033/viewer/2022042908/58ef77d31a28ab201b8b457f/html5/thumbnails/33.jpg)
© 2014 Netskope. All Rights Reserved. 33
Exact Match Use Case
• General DLP rule looking for SSNs is generating a large number of false positives
• Apply an Exact Match to ensure coupon codes as defined are not detected
• Result is more accurate detection with fewer false positives
SSN# 578049324Coupon Code 123456789
![Page 34: Lions, Tigers, and PHI, Oh My! The latest in data loss prevention in the cloud](https://reader033.vdocuments.us/reader033/viewer/2022042908/58ef77d31a28ab201b8b457f/html5/thumbnails/34.jpg)
© 2015 Netskope. All Rights Reserved. 34
Fingerprinting and Exact Match - DLP landscape
• All enterprise class DLP vendors boast fingerprinting and exact match capabilities. But they do not see cloud application context
• Only CASB vendors see cloud application context – most often for sanctioned apps only
• Netskope is the only CASB vendor that supports Fingerprinting and Exact Match across all cloud applications complete with deep, contextual data
![Page 35: Lions, Tigers, and PHI, Oh My! The latest in data loss prevention in the cloud](https://reader033.vdocuments.us/reader033/viewer/2022042908/58ef77d31a28ab201b8b457f/html5/thumbnails/35.jpg)
35© 2015 Netskope. Company Confidential
Summary
• Much has changed since we started doing DLP
• The cloud is the perhaps the most disruptive change
• DLP in the cloud requires a different approach, but many of our previous learnings still apply
• Use of contextual information and techniques like fingerprinting and exact match make DLP for cloud targeted and less onerous from an administrative point of view.
![Page 36: Lions, Tigers, and PHI, Oh My! The latest in data loss prevention in the cloud](https://reader033.vdocuments.us/reader033/viewer/2022042908/58ef77d31a28ab201b8b457f/html5/thumbnails/36.jpg)
Questions? Thank you!