Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
Risk Scoring: Identify the most risky data by combining content, usage and access information
Gives business units the information they need to directly address hot spots
Data Owner Remediation: Identify data owners and notify them that they need to fix their exposed sensitive data
Reduces the time to achieve measurable risk reduction by involving data owners in the clean up effort
Symantec Data Loss Prevention 11
4
Describe
Fingerprint
How do I identify relevant keywords? How do I avoid false positives? How do I tune policies?
What if I cant access all confidential docs? How do I account for new docs? How do I protect the endpoint?
Symantec Proprietary & Confidential - This information is not a commitment, promise or legal obligation to deliver any material, code or functionality
Learn
Describe Fingerprint
Learns by positive and negative examples Automates keyword identification and enables easier tuning Improves accuracy, reduces false positives Detects new content without having to fingerprint it first
Symantec Proprietary & Confidential - This information is not a commitment, promise or legal obligation to deliver any material, code or functionality
Risk Scoring: Identify the most risky data by combining content, usage and access information
Gives business units the information they need to directly address hot spots
Data Owner Remediation: Identify data owners and notify them that they need to fix their exposed sensitive data
Reduces the time to achieve measurable risk reduction by involving data owners in the clean up effort
Symantec Data Loss Prevention 11
7
Risk Scoring: Identify the most risky data by combining content, usage and access information
Gives business units the information they need to directly address hot spots
Data Owner Remediation: Identify data owners and notify them that they need to fix their exposed sensitive data
Reduces the time to achieve measurable risk reduction by involving data owners in the clean up effort
Symantec Data Loss Prevention 11
9
Re-scan
Report
Alert data owners; advise them via email about how to protect their data
Symantec Data Loss Prevention 11
10
Endpoint
Symantec Data Loss Prevention Endpoint Discover
Network
Symantec Data Loss Prevention Network Monitor
Management Platform
Symantec Data Loss Prevention Enforce Platform
11
Trusted Devices assures that sensitive data can only be copied to approved storage devices Application File Access Control ensures user drive applications such as iTunes, Skype and WebEx cannot access sensitive data FlexResponse can automatically apply encryption or Enterprise Rights Management to sensitive data
Summary
Symantec Data Loss Prevention 11 simplifies the detection and protection of enterprises most valuable information
Symantec Data Loss Prevention 11 is the result of our broad customer experience
13
v3
v4
v5
v6
v7
v8
v9
v10
v11
Network: Monitor Network: Prevent Storage: Discover Storage: Protect Endpoint: Monitor & Prevent Endpoint: Discover
Customer focused innovation One third of the F100 Acknowledged DLP leader
Symantec Data Loss Prevention 11
Symantec Proprietary & Confidential - This information is not a commitment, promise or legal obligation to deliver any material, code or functionality
Thank you!
Copyright 2010 Symantec Corporation. All rights reserved. Symantec and the Symantec Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners. This document is provided for informational purposes only and is not intended as advertising. All warranties relating to the information in this document, either express or implied, are disclaimed to the maximum extent allowed by law. The information in this document is subject to change without notice.
15