尊敬的 微信汇率:1円 ≈ 0.046239 元 支付宝汇率:1円 ≈ 0.04633元 [退出登录]
SlideShare a Scribd company logo
Customer Spotlight:
Deploying a Data Protection Program
in less than 120 Days
Michael Ring, Jabil
Mark Stevens, Digital Guardian
Agenda
 Introduction
 Deploying a Data Protection Program in < 120 Days
• Mike Ring, Jabil
 Digital Guardian Overview
• Mark Stevens, Digital Guardian
 Live Q&A with Mike and Mark
About Mike Ring
 Senior IT Manager, Threat and
Solution Architect
 15 years’ experience in InfoSec
Jabil
 Global manufacturing services company
 180,000+ employees
 90 plants in 23 countries
 $17.2B revenue in 2013
Proven Manufacturing Solutions
Global Expertise. Intelligent Supply Chain Design.
Jabil’s Security Situation
 Data protection was in catch up mode
 Lacked basic processes
 “IP could be anything”
 Security could be a competitive advantage
Jabil’s IT Environment
 Cloud-based IT environment since 2010
 No standardization
 Had budget but not headcount to accelerate
security maturity
Security Objectives
 52,000 devices at one level of security,
needed to get to higher level
 Protect:
• IP: Jabil’s and customers’
• Pricing data
• Employee data
 Quickly build a program focused on agility
and collaboration
Jabil’s Solution
 Three key security technologies
• Web Proxy
• Single Sign-on
• Data Protection
 Had to be 100% managed service
Web
Proxy
SSO
Data Protection
Why DG Managed Security Program
 InfoSec can govern, not administer
 Unique context-awareness
 Capabilities beyond just DLP
 Very fast ramp
 Time to value
Getting the CIO on Board
 Prior successful rapid deployments
 Application usage collection was major value-add
 Able to reconcile license usage and reduce costs
Implementing Digital Guardian
 3,000 agents deployed in dev environment
 49,000 agents deployed next
May June July August
Initial
Engagement
3,000
Agents Deployed
in Development
49,000
Agents Deployed
in Monitor Mode
Fast Forward Framework
Results
 Gained immediate visibility into all data access and usage
 Saw data getting copied to USB drives
 Used egress reports to drive adoption
What’s Next?
 Using visibility to drive classification and policy making
 Transition to operational plan
 Roll out DG controls to mitigate top data risks
 DG for advanced threat detection and forensic analysis
About Mark Stevens
 VP, Global Services & Support
 Driving customer success
 20 year tech industry veteran
• IBM, BMC, Progress, Lotus
Data-Centric Security Recap
“In this new reality, traditional perimeter-based approaches to
security are insufficient. S&R pros must take a data-centric approach
that ensures security travels with the data regardless of user
population, location, or even hosting model.”
The Future Of Data Security: A Zero Trust Approach
John Kindervag, Heidi Shey, and Kelley Mak, June 5, 2014
Confidential 14
Data Security That Starts at the Source
15
Patented, Proven Endpoint Agent
16
Automatic Sensitive Data Classification
17
STOP Data Theft From Insiders and Outsiders
18
Protect Your Data From Insider Threats
Confidential 19
Protect Your Data for the Best Defense from
Outsider Threats
Confidential 20
Flexible Deployment Models
Confidential 21
 Infrastructure hosted in your
environment
 Self-administration
 Policies, rules and reports
managed by you
 Engage with Digital Guardian
Pro Services as needed
 Infrastructure hosted in Digital
Guardian private cloud
 Administered by Digital
Guardian Pro Services
 Access to policies, rules, and
reports
 Weekly status meetings
 Infrastructure hosted in your
environment
 Administered remotely by
Digital Guardian Pro Services
 Data remains within your IT
environment
Option 1
On Premise
Option 2
Managed Service
Option 3
Hybrid
Managed Service On Premise
“By selecting the managed service deployment option, we were able to be up and running in a matter of weeks. The
added visibility into how our confidential data is being used is invaluable.”
CISO, Regional Bank
22
23
24
Questions?
Interested in learning more about
Jabil’s data protection program?
Watch the webinar on demand:
http://bit.ly/1yCK9cT

More Related Content

What's hot

Symantec Data Loss Prevention 11
Symantec Data Loss Prevention 11Symantec Data Loss Prevention 11
Symantec Data Loss Prevention 11
Symantec
 
Data Security: Why You Need Data Loss Prevention & How to Justify It
Data Security: Why You Need Data Loss Prevention & How to Justify ItData Security: Why You Need Data Loss Prevention & How to Justify It
Data Security: Why You Need Data Loss Prevention & How to Justify It
Marc Crudgington, MBA
 
Data Leakage Prevention (DLP)
Data Leakage Prevention (DLP)Data Leakage Prevention (DLP)
Data Leakage Prevention (DLP)
Network Intelligence India
 
Data Leakage Presentation
Data Leakage PresentationData Leakage Presentation
Data Leakage Presentation
Mike Spaulding
 
Symantec Data Loss Prevention 9
Symantec Data Loss Prevention 9Symantec Data Loss Prevention 9
Symantec Data Loss Prevention 9
Ariel Martin Beliera
 
Information Leakage & DLP
Information Leakage & DLPInformation Leakage & DLP
Information Leakage & DLP
Yun Lu
 
Dlp notes
Dlp notesDlp notes
Dlp notes
anuepcet
 
Data Leakage Prevention
Data Leakage Prevention Data Leakage Prevention
Data Leakage Prevention
Dhananjay Aloorkar
 
The 3 Phased Approach to Data Leakage Prevention (DLP)
The 3 Phased Approach to Data Leakage Prevention (DLP)The 3 Phased Approach to Data Leakage Prevention (DLP)
The 3 Phased Approach to Data Leakage Prevention (DLP)
Kirsty Donovan
 
DLP Executive Overview
DLP Executive OverviewDLP Executive Overview
DLP Executive Overview
Kim Jensen
 
5 Myths About Data Loss Prevention
5 Myths About Data Loss Prevention5 Myths About Data Loss Prevention
5 Myths About Data Loss Prevention
Gary Bahadur
 
ISSA DLP Presentation - Oxford Consulting Group
ISSA DLP Presentation - Oxford Consulting GroupISSA DLP Presentation - Oxford Consulting Group
ISSA DLP Presentation - Oxford Consulting Group
aengelbert
 
Information and Identity Protection - Data Loss Prevention, Encryption, User ...
Information and Identity Protection - Data Loss Prevention, Encryption, User ...Information and Identity Protection - Data Loss Prevention, Encryption, User ...
Information and Identity Protection - Data Loss Prevention, Encryption, User ...
Symantec APJ
 
Data Loss Prevention
Data Loss PreventionData Loss Prevention
Data Loss Prevention
dj1arry
 
apsec 7 Golden Rules Data Leakage Prevention / DLP
apsec 7 Golden Rules Data Leakage Prevention / DLPapsec 7 Golden Rules Data Leakage Prevention / DLP
apsec 7 Golden Rules Data Leakage Prevention / DLP
andreasschuster
 
Symantec Data Loss Prevention - Technical Proposal (General)
Symantec Data Loss Prevention - Technical Proposal (General)Symantec Data Loss Prevention - Technical Proposal (General)
Symantec Data Loss Prevention - Technical Proposal (General)
Iftikhar Ali Iqbal
 
Symantec DLP for Tablet
Symantec DLP for TabletSymantec DLP for Tablet
Symantec DLP for Tablet
Symantec
 
Enterprise API Security & Data Loss Prevention - Intel
Enterprise API Security & Data Loss Prevention - IntelEnterprise API Security & Data Loss Prevention - Intel
Enterprise API Security & Data Loss Prevention - Intel
Intel - API Security & Tokenization
 
Alex Hanway - Securing the Breach: Using a Holistic Data Protection Framework
Alex Hanway - Securing the Breach: Using a Holistic Data Protection FrameworkAlex Hanway - Securing the Breach: Using a Holistic Data Protection Framework
Alex Hanway - Securing the Breach: Using a Holistic Data Protection Framework
centralohioissa
 
Big Data Security Analytics (BDSA) with Randy Franklin
Big Data Security Analytics (BDSA) with Randy FranklinBig Data Security Analytics (BDSA) with Randy Franklin
Big Data Security Analytics (BDSA) with Randy Franklin
Sridhar Karnam
 

What's hot (20)

Symantec Data Loss Prevention 11
Symantec Data Loss Prevention 11Symantec Data Loss Prevention 11
Symantec Data Loss Prevention 11
 
Data Security: Why You Need Data Loss Prevention & How to Justify It
Data Security: Why You Need Data Loss Prevention & How to Justify ItData Security: Why You Need Data Loss Prevention & How to Justify It
Data Security: Why You Need Data Loss Prevention & How to Justify It
 
Data Leakage Prevention (DLP)
Data Leakage Prevention (DLP)Data Leakage Prevention (DLP)
Data Leakage Prevention (DLP)
 
Data Leakage Presentation
Data Leakage PresentationData Leakage Presentation
Data Leakage Presentation
 
Symantec Data Loss Prevention 9
Symantec Data Loss Prevention 9Symantec Data Loss Prevention 9
Symantec Data Loss Prevention 9
 
Information Leakage & DLP
Information Leakage & DLPInformation Leakage & DLP
Information Leakage & DLP
 
Dlp notes
Dlp notesDlp notes
Dlp notes
 
Data Leakage Prevention
Data Leakage Prevention Data Leakage Prevention
Data Leakage Prevention
 
The 3 Phased Approach to Data Leakage Prevention (DLP)
The 3 Phased Approach to Data Leakage Prevention (DLP)The 3 Phased Approach to Data Leakage Prevention (DLP)
The 3 Phased Approach to Data Leakage Prevention (DLP)
 
DLP Executive Overview
DLP Executive OverviewDLP Executive Overview
DLP Executive Overview
 
5 Myths About Data Loss Prevention
5 Myths About Data Loss Prevention5 Myths About Data Loss Prevention
5 Myths About Data Loss Prevention
 
ISSA DLP Presentation - Oxford Consulting Group
ISSA DLP Presentation - Oxford Consulting GroupISSA DLP Presentation - Oxford Consulting Group
ISSA DLP Presentation - Oxford Consulting Group
 
Information and Identity Protection - Data Loss Prevention, Encryption, User ...
Information and Identity Protection - Data Loss Prevention, Encryption, User ...Information and Identity Protection - Data Loss Prevention, Encryption, User ...
Information and Identity Protection - Data Loss Prevention, Encryption, User ...
 
Data Loss Prevention
Data Loss PreventionData Loss Prevention
Data Loss Prevention
 
apsec 7 Golden Rules Data Leakage Prevention / DLP
apsec 7 Golden Rules Data Leakage Prevention / DLPapsec 7 Golden Rules Data Leakage Prevention / DLP
apsec 7 Golden Rules Data Leakage Prevention / DLP
 
Symantec Data Loss Prevention - Technical Proposal (General)
Symantec Data Loss Prevention - Technical Proposal (General)Symantec Data Loss Prevention - Technical Proposal (General)
Symantec Data Loss Prevention - Technical Proposal (General)
 
Symantec DLP for Tablet
Symantec DLP for TabletSymantec DLP for Tablet
Symantec DLP for Tablet
 
Enterprise API Security & Data Loss Prevention - Intel
Enterprise API Security & Data Loss Prevention - IntelEnterprise API Security & Data Loss Prevention - Intel
Enterprise API Security & Data Loss Prevention - Intel
 
Alex Hanway - Securing the Breach: Using a Holistic Data Protection Framework
Alex Hanway - Securing the Breach: Using a Holistic Data Protection FrameworkAlex Hanway - Securing the Breach: Using a Holistic Data Protection Framework
Alex Hanway - Securing the Breach: Using a Holistic Data Protection Framework
 
Big Data Security Analytics (BDSA) with Randy Franklin
Big Data Security Analytics (BDSA) with Randy FranklinBig Data Security Analytics (BDSA) with Randy Franklin
Big Data Security Analytics (BDSA) with Randy Franklin
 

Similar to Customer Spotlight: Deploying a Data Protection Program in less than 120 Days

BREACHED: Data Centric Security for SAP
BREACHED: Data Centric Security for SAPBREACHED: Data Centric Security for SAP
BREACHED: Data Centric Security for SAP
UL Transaction Security
 
Cyber Security in the market place: HP CTO Day
Cyber Security in the market place: HP CTO DayCyber Security in the market place: HP CTO Day
Cyber Security in the market place: HP CTO Day
Symantec
 
CYBER-i Corporate Dossier
CYBER-i Corporate Dossier  CYBER-i Corporate Dossier
CYBER-i Corporate Dossier
AGC Networks Ltd
 
IDC DCIM Webinar - How to Take Control of Chaos in a Lights-Out Data Center
IDC DCIM Webinar - How to Take Control of Chaos in a Lights-Out Data CenterIDC DCIM Webinar - How to Take Control of Chaos in a Lights-Out Data Center
IDC DCIM Webinar - How to Take Control of Chaos in a Lights-Out Data Center
Sunbird DCIM
 
Where data security and value of data meet in the cloud ulf mattsson
Where data security and value of data meet in the cloud   ulf mattssonWhere data security and value of data meet in the cloud   ulf mattsson
Where data security and value of data meet in the cloud ulf mattsson
Ulf Mattsson
 
Top 5 Cybersecurity Trends in 2021 and Beyond
Top 5 Cybersecurity Trends in 2021 and BeyondTop 5 Cybersecurity Trends in 2021 and Beyond
Top 5 Cybersecurity Trends in 2021 and Beyond
Nandita Nityanandam
 
Empowering the Data Driven Business with Modern Business Intelligence
Empowering the Data Driven Business with Modern Business IntelligenceEmpowering the Data Driven Business with Modern Business Intelligence
Empowering the Data Driven Business with Modern Business Intelligence
DATAVERSITY
 
Protect your hybrid workforce across the attack chain
Protect your hybrid workforce across the attack chainProtect your hybrid workforce across the attack chain
Protect your hybrid workforce across the attack chain
David J Rosenthal
 
Shield db data security
Shield db   data securityShield db   data security
Shield db data security
Mousumi Manna
 
Shield db data security
Shield db   data securityShield db   data security
Shield db data security
Tapan Biswas
 
Shield db data security
Shield db   data securityShield db   data security
Shield db data security
Mousumi Manna
 
MCGlobalTech Service Presentation
MCGlobalTech Service PresentationMCGlobalTech Service Presentation
MCGlobalTech Service Presentation
William McBorrough
 
Dell Software: An Opportunity for Channel Partners
Dell Software: An Opportunity for Channel Partners Dell Software: An Opportunity for Channel Partners
Dell Software: An Opportunity for Channel Partners
Dell World
 
Advanced threat protection and big data
Advanced threat protection and big dataAdvanced threat protection and big data
Advanced threat protection and big data
Peter Wood
 
Collibra Data Citizen '19 - Bridging Data Privacy with Data Governance
Collibra Data Citizen '19 - Bridging Data Privacy with Data Governance Collibra Data Citizen '19 - Bridging Data Privacy with Data Governance
Collibra Data Citizen '19 - Bridging Data Privacy with Data Governance
BigID Inc
 
Cloud Security: A Business-Centric Approach in 12 Steps
Cloud Security: A Business-Centric Approach in 12 StepsCloud Security: A Business-Centric Approach in 12 Steps
Cloud Security: A Business-Centric Approach in 12 Steps
Omar Khawaja
 
10 Security Essentials Every CxO Should Know
10 Security Essentials Every CxO Should Know10 Security Essentials Every CxO Should Know
10 Security Essentials Every CxO Should Know
IBM Security
 
Embracing the Risk and Opportunity of AI & Cloud.pptx
Embracing the Risk and Opportunity of AI & Cloud.pptxEmbracing the Risk and Opportunity of AI & Cloud.pptx
Embracing the Risk and Opportunity of AI & Cloud.pptx
Symptai Consulting Limited
 
Big Data: Trends, Applications and Potentials
Big Data: Trends, Applications and PotentialsBig Data: Trends, Applications and Potentials
Big Data: Trends, Applications and Potentials
Charles Mok
 
Dell Software: An Opportunity For Channel Partners
Dell Software: An Opportunity For Channel PartnersDell Software: An Opportunity For Channel Partners
Dell Software: An Opportunity For Channel Partners
Dell World
 

Similar to Customer Spotlight: Deploying a Data Protection Program in less than 120 Days (20)

BREACHED: Data Centric Security for SAP
BREACHED: Data Centric Security for SAPBREACHED: Data Centric Security for SAP
BREACHED: Data Centric Security for SAP
 
Cyber Security in the market place: HP CTO Day
Cyber Security in the market place: HP CTO DayCyber Security in the market place: HP CTO Day
Cyber Security in the market place: HP CTO Day
 
CYBER-i Corporate Dossier
CYBER-i Corporate Dossier  CYBER-i Corporate Dossier
CYBER-i Corporate Dossier
 
IDC DCIM Webinar - How to Take Control of Chaos in a Lights-Out Data Center
IDC DCIM Webinar - How to Take Control of Chaos in a Lights-Out Data CenterIDC DCIM Webinar - How to Take Control of Chaos in a Lights-Out Data Center
IDC DCIM Webinar - How to Take Control of Chaos in a Lights-Out Data Center
 
Where data security and value of data meet in the cloud ulf mattsson
Where data security and value of data meet in the cloud   ulf mattssonWhere data security and value of data meet in the cloud   ulf mattsson
Where data security and value of data meet in the cloud ulf mattsson
 
Top 5 Cybersecurity Trends in 2021 and Beyond
Top 5 Cybersecurity Trends in 2021 and BeyondTop 5 Cybersecurity Trends in 2021 and Beyond
Top 5 Cybersecurity Trends in 2021 and Beyond
 
Empowering the Data Driven Business with Modern Business Intelligence
Empowering the Data Driven Business with Modern Business IntelligenceEmpowering the Data Driven Business with Modern Business Intelligence
Empowering the Data Driven Business with Modern Business Intelligence
 
Protect your hybrid workforce across the attack chain
Protect your hybrid workforce across the attack chainProtect your hybrid workforce across the attack chain
Protect your hybrid workforce across the attack chain
 
Shield db data security
Shield db   data securityShield db   data security
Shield db data security
 
Shield db data security
Shield db   data securityShield db   data security
Shield db data security
 
Shield db data security
Shield db   data securityShield db   data security
Shield db data security
 
MCGlobalTech Service Presentation
MCGlobalTech Service PresentationMCGlobalTech Service Presentation
MCGlobalTech Service Presentation
 
Dell Software: An Opportunity for Channel Partners
Dell Software: An Opportunity for Channel Partners Dell Software: An Opportunity for Channel Partners
Dell Software: An Opportunity for Channel Partners
 
Advanced threat protection and big data
Advanced threat protection and big dataAdvanced threat protection and big data
Advanced threat protection and big data
 
Collibra Data Citizen '19 - Bridging Data Privacy with Data Governance
Collibra Data Citizen '19 - Bridging Data Privacy with Data Governance Collibra Data Citizen '19 - Bridging Data Privacy with Data Governance
Collibra Data Citizen '19 - Bridging Data Privacy with Data Governance
 
Cloud Security: A Business-Centric Approach in 12 Steps
Cloud Security: A Business-Centric Approach in 12 StepsCloud Security: A Business-Centric Approach in 12 Steps
Cloud Security: A Business-Centric Approach in 12 Steps
 
10 Security Essentials Every CxO Should Know
10 Security Essentials Every CxO Should Know10 Security Essentials Every CxO Should Know
10 Security Essentials Every CxO Should Know
 
Embracing the Risk and Opportunity of AI & Cloud.pptx
Embracing the Risk and Opportunity of AI & Cloud.pptxEmbracing the Risk and Opportunity of AI & Cloud.pptx
Embracing the Risk and Opportunity of AI & Cloud.pptx
 
Big Data: Trends, Applications and Potentials
Big Data: Trends, Applications and PotentialsBig Data: Trends, Applications and Potentials
Big Data: Trends, Applications and Potentials
 
Dell Software: An Opportunity For Channel Partners
Dell Software: An Opportunity For Channel PartnersDell Software: An Opportunity For Channel Partners
Dell Software: An Opportunity For Channel Partners
 

Recently uploaded

Getting the Most Out of ScyllaDB Monitoring: ShareChat's Tips
Getting the Most Out of ScyllaDB Monitoring: ShareChat's TipsGetting the Most Out of ScyllaDB Monitoring: ShareChat's Tips
Getting the Most Out of ScyllaDB Monitoring: ShareChat's Tips
ScyllaDB
 
So You've Lost Quorum: Lessons From Accidental Downtime
So You've Lost Quorum: Lessons From Accidental DowntimeSo You've Lost Quorum: Lessons From Accidental Downtime
So You've Lost Quorum: Lessons From Accidental Downtime
ScyllaDB
 
ScyllaDB Tablets: Rethinking Replication
ScyllaDB Tablets: Rethinking ReplicationScyllaDB Tablets: Rethinking Replication
ScyllaDB Tablets: Rethinking Replication
ScyllaDB
 
Call Girls Chennai ☎️ +91-7426014248 😍 Chennai Call Girl Beauty Girls Chennai...
Call Girls Chennai ☎️ +91-7426014248 😍 Chennai Call Girl Beauty Girls Chennai...Call Girls Chennai ☎️ +91-7426014248 😍 Chennai Call Girl Beauty Girls Chennai...
Call Girls Chennai ☎️ +91-7426014248 😍 Chennai Call Girl Beauty Girls Chennai...
anilsa9823
 
Poznań ACE event - 19.06.2024 Team 24 Wrapup slidedeck
Poznań ACE event - 19.06.2024 Team 24 Wrapup slidedeckPoznań ACE event - 19.06.2024 Team 24 Wrapup slidedeck
Poznań ACE event - 19.06.2024 Team 24 Wrapup slidedeck
FilipTomaszewski5
 
Guidelines for Effective Data Visualization
Guidelines for Effective Data VisualizationGuidelines for Effective Data Visualization
Guidelines for Effective Data Visualization
UmmeSalmaM1
 
ScyllaDB Real-Time Event Processing with CDC
ScyllaDB Real-Time Event Processing with CDCScyllaDB Real-Time Event Processing with CDC
ScyllaDB Real-Time Event Processing with CDC
ScyllaDB
 
Multivendor cloud production with VSF TR-11 - there and back again
Multivendor cloud production with VSF TR-11 - there and back againMultivendor cloud production with VSF TR-11 - there and back again
Multivendor cloud production with VSF TR-11 - there and back again
Kieran Kunhya
 
ScyllaDB Kubernetes Operator Goes Global
ScyllaDB Kubernetes Operator Goes GlobalScyllaDB Kubernetes Operator Goes Global
ScyllaDB Kubernetes Operator Goes Global
ScyllaDB
 
QR Secure: A Hybrid Approach Using Machine Learning and Security Validation F...
QR Secure: A Hybrid Approach Using Machine Learning and Security Validation F...QR Secure: A Hybrid Approach Using Machine Learning and Security Validation F...
QR Secure: A Hybrid Approach Using Machine Learning and Security Validation F...
AlexanderRichford
 
QA or the Highway - Component Testing: Bridging the gap between frontend appl...
QA or the Highway - Component Testing: Bridging the gap between frontend appl...QA or the Highway - Component Testing: Bridging the gap between frontend appl...
QA or the Highway - Component Testing: Bridging the gap between frontend appl...
zjhamm304
 
Day 4 - Excel Automation and Data Manipulation
Day 4 - Excel Automation and Data ManipulationDay 4 - Excel Automation and Data Manipulation
Day 4 - Excel Automation and Data Manipulation
UiPathCommunity
 
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
DanBrown980551
 
Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving
 
CTO Insights: Steering a High-Stakes Database Migration
CTO Insights: Steering a High-Stakes Database MigrationCTO Insights: Steering a High-Stakes Database Migration
CTO Insights: Steering a High-Stakes Database Migration
ScyllaDB
 
Cyber Recovery Wargame
Cyber Recovery WargameCyber Recovery Wargame
Cyber Recovery Wargame
Databarracks
 
Introduction to ThousandEyes AMER Webinar
Introduction  to ThousandEyes AMER WebinarIntroduction  to ThousandEyes AMER Webinar
Introduction to ThousandEyes AMER Webinar
ThousandEyes
 
Must Know Postgres Extension for DBA and Developer during Migration
Must Know Postgres Extension for DBA and Developer during MigrationMust Know Postgres Extension for DBA and Developer during Migration
Must Know Postgres Extension for DBA and Developer during Migration
Mydbops
 
A Deep Dive into ScyllaDB's Architecture
A Deep Dive into ScyllaDB's ArchitectureA Deep Dive into ScyllaDB's Architecture
A Deep Dive into ScyllaDB's Architecture
ScyllaDB
 
PRODUCT LISTING OPTIMIZATION PRESENTATION.pptx
PRODUCT LISTING OPTIMIZATION PRESENTATION.pptxPRODUCT LISTING OPTIMIZATION PRESENTATION.pptx
PRODUCT LISTING OPTIMIZATION PRESENTATION.pptx
christinelarrosa
 

Recently uploaded (20)

Getting the Most Out of ScyllaDB Monitoring: ShareChat's Tips
Getting the Most Out of ScyllaDB Monitoring: ShareChat's TipsGetting the Most Out of ScyllaDB Monitoring: ShareChat's Tips
Getting the Most Out of ScyllaDB Monitoring: ShareChat's Tips
 
So You've Lost Quorum: Lessons From Accidental Downtime
So You've Lost Quorum: Lessons From Accidental DowntimeSo You've Lost Quorum: Lessons From Accidental Downtime
So You've Lost Quorum: Lessons From Accidental Downtime
 
ScyllaDB Tablets: Rethinking Replication
ScyllaDB Tablets: Rethinking ReplicationScyllaDB Tablets: Rethinking Replication
ScyllaDB Tablets: Rethinking Replication
 
Call Girls Chennai ☎️ +91-7426014248 😍 Chennai Call Girl Beauty Girls Chennai...
Call Girls Chennai ☎️ +91-7426014248 😍 Chennai Call Girl Beauty Girls Chennai...Call Girls Chennai ☎️ +91-7426014248 😍 Chennai Call Girl Beauty Girls Chennai...
Call Girls Chennai ☎️ +91-7426014248 😍 Chennai Call Girl Beauty Girls Chennai...
 
Poznań ACE event - 19.06.2024 Team 24 Wrapup slidedeck
Poznań ACE event - 19.06.2024 Team 24 Wrapup slidedeckPoznań ACE event - 19.06.2024 Team 24 Wrapup slidedeck
Poznań ACE event - 19.06.2024 Team 24 Wrapup slidedeck
 
Guidelines for Effective Data Visualization
Guidelines for Effective Data VisualizationGuidelines for Effective Data Visualization
Guidelines for Effective Data Visualization
 
ScyllaDB Real-Time Event Processing with CDC
ScyllaDB Real-Time Event Processing with CDCScyllaDB Real-Time Event Processing with CDC
ScyllaDB Real-Time Event Processing with CDC
 
Multivendor cloud production with VSF TR-11 - there and back again
Multivendor cloud production with VSF TR-11 - there and back againMultivendor cloud production with VSF TR-11 - there and back again
Multivendor cloud production with VSF TR-11 - there and back again
 
ScyllaDB Kubernetes Operator Goes Global
ScyllaDB Kubernetes Operator Goes GlobalScyllaDB Kubernetes Operator Goes Global
ScyllaDB Kubernetes Operator Goes Global
 
QR Secure: A Hybrid Approach Using Machine Learning and Security Validation F...
QR Secure: A Hybrid Approach Using Machine Learning and Security Validation F...QR Secure: A Hybrid Approach Using Machine Learning and Security Validation F...
QR Secure: A Hybrid Approach Using Machine Learning and Security Validation F...
 
QA or the Highway - Component Testing: Bridging the gap between frontend appl...
QA or the Highway - Component Testing: Bridging the gap between frontend appl...QA or the Highway - Component Testing: Bridging the gap between frontend appl...
QA or the Highway - Component Testing: Bridging the gap between frontend appl...
 
Day 4 - Excel Automation and Data Manipulation
Day 4 - Excel Automation and Data ManipulationDay 4 - Excel Automation and Data Manipulation
Day 4 - Excel Automation and Data Manipulation
 
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
 
Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024
 
CTO Insights: Steering a High-Stakes Database Migration
CTO Insights: Steering a High-Stakes Database MigrationCTO Insights: Steering a High-Stakes Database Migration
CTO Insights: Steering a High-Stakes Database Migration
 
Cyber Recovery Wargame
Cyber Recovery WargameCyber Recovery Wargame
Cyber Recovery Wargame
 
Introduction to ThousandEyes AMER Webinar
Introduction  to ThousandEyes AMER WebinarIntroduction  to ThousandEyes AMER Webinar
Introduction to ThousandEyes AMER Webinar
 
Must Know Postgres Extension for DBA and Developer during Migration
Must Know Postgres Extension for DBA and Developer during MigrationMust Know Postgres Extension for DBA and Developer during Migration
Must Know Postgres Extension for DBA and Developer during Migration
 
A Deep Dive into ScyllaDB's Architecture
A Deep Dive into ScyllaDB's ArchitectureA Deep Dive into ScyllaDB's Architecture
A Deep Dive into ScyllaDB's Architecture
 
PRODUCT LISTING OPTIMIZATION PRESENTATION.pptx
PRODUCT LISTING OPTIMIZATION PRESENTATION.pptxPRODUCT LISTING OPTIMIZATION PRESENTATION.pptx
PRODUCT LISTING OPTIMIZATION PRESENTATION.pptx
 

Customer Spotlight: Deploying a Data Protection Program in less than 120 Days

  • 1. Customer Spotlight: Deploying a Data Protection Program in less than 120 Days Michael Ring, Jabil Mark Stevens, Digital Guardian
  • 2. Agenda  Introduction  Deploying a Data Protection Program in < 120 Days • Mike Ring, Jabil  Digital Guardian Overview • Mark Stevens, Digital Guardian  Live Q&A with Mike and Mark
  • 3. About Mike Ring  Senior IT Manager, Threat and Solution Architect  15 years’ experience in InfoSec
  • 4. Jabil  Global manufacturing services company  180,000+ employees  90 plants in 23 countries  $17.2B revenue in 2013 Proven Manufacturing Solutions Global Expertise. Intelligent Supply Chain Design.
  • 5. Jabil’s Security Situation  Data protection was in catch up mode  Lacked basic processes  “IP could be anything”  Security could be a competitive advantage
  • 6. Jabil’s IT Environment  Cloud-based IT environment since 2010  No standardization  Had budget but not headcount to accelerate security maturity
  • 7. Security Objectives  52,000 devices at one level of security, needed to get to higher level  Protect: • IP: Jabil’s and customers’ • Pricing data • Employee data  Quickly build a program focused on agility and collaboration
  • 8. Jabil’s Solution  Three key security technologies • Web Proxy • Single Sign-on • Data Protection  Had to be 100% managed service Web Proxy SSO Data Protection
  • 9. Why DG Managed Security Program  InfoSec can govern, not administer  Unique context-awareness  Capabilities beyond just DLP  Very fast ramp  Time to value
  • 10. Getting the CIO on Board  Prior successful rapid deployments  Application usage collection was major value-add  Able to reconcile license usage and reduce costs
  • 11. Implementing Digital Guardian  3,000 agents deployed in dev environment  49,000 agents deployed next May June July August Initial Engagement 3,000 Agents Deployed in Development 49,000 Agents Deployed in Monitor Mode Fast Forward Framework
  • 12. Results  Gained immediate visibility into all data access and usage  Saw data getting copied to USB drives  Used egress reports to drive adoption
  • 13. What’s Next?  Using visibility to drive classification and policy making  Transition to operational plan  Roll out DG controls to mitigate top data risks  DG for advanced threat detection and forensic analysis
  • 14. About Mark Stevens  VP, Global Services & Support  Driving customer success  20 year tech industry veteran • IBM, BMC, Progress, Lotus
  • 15. Data-Centric Security Recap “In this new reality, traditional perimeter-based approaches to security are insufficient. S&R pros must take a data-centric approach that ensures security travels with the data regardless of user population, location, or even hosting model.” The Future Of Data Security: A Zero Trust Approach John Kindervag, Heidi Shey, and Kelley Mak, June 5, 2014 Confidential 14
  • 16. Data Security That Starts at the Source 15
  • 18. Automatic Sensitive Data Classification 17
  • 19. STOP Data Theft From Insiders and Outsiders 18
  • 20. Protect Your Data From Insider Threats Confidential 19
  • 21. Protect Your Data for the Best Defense from Outsider Threats Confidential 20
  • 22. Flexible Deployment Models Confidential 21  Infrastructure hosted in your environment  Self-administration  Policies, rules and reports managed by you  Engage with Digital Guardian Pro Services as needed  Infrastructure hosted in Digital Guardian private cloud  Administered by Digital Guardian Pro Services  Access to policies, rules, and reports  Weekly status meetings  Infrastructure hosted in your environment  Administered remotely by Digital Guardian Pro Services  Data remains within your IT environment Option 1 On Premise Option 2 Managed Service Option 3 Hybrid Managed Service On Premise “By selecting the managed service deployment option, we were able to be up and running in a matter of weeks. The added visibility into how our confidential data is being used is invaluable.” CISO, Regional Bank
  • 23. 22
  • 24. 23
  • 25. 24
  • 27. Interested in learning more about Jabil’s data protection program? Watch the webinar on demand: http://bit.ly/1yCK9cT
  翻译: