Vericept Protect Solution - PowerPoint PPT Presentation

1 / 12
About This Presentation
Title:

Vericept Protect Solution

Description:

Classify and control outbound email and attachments ... Dashboards. Protection. Encryption. Quarantine. Blocking. Data at Rest. File Shares. User Desktops ... – PowerPoint PPT presentation

Number of Views:95
Avg rating:3.0/5.0
Slides: 13
Provided by: kgre6
Category:

less

Transcript and Presenter's Notes

Title: Vericept Protect Solution


1
Vericept Protect Solution
Define
Enforce
Identify
2
Agenda
  • Solution overview
  • Vericept Protect
  • The Data Protection Challenge
  • Protect Features
  • Advantages and Unique Value

3
Vericept Protect Secure Email
  • Combines in one product
  • Vericept's Intelligent Content Analysis Engine
  • Fully featured Mail Transfer Agent
  • Entrusts Entelligent Messaging Server (EMS)
  • Classify and control outbound email and
    attachments
  • Message blocking / quarantine
  • Automatic Email Encryption powered by Entrust?
  • Fix broken business practices
  • Train users with Email Self-Compliance?

4
Key DLP Challenges
Define Which data is sensitive?
Enforce How to implement controls?
Identify Where is it stored? Where is it going?
  • Data at Rest
  • File Shares
  • User Desktops
  • PCI
  • Credit Card Numbers
  • Social Security Numbers
  • Personal Information
  • Magnetic Stripe Data
  • Training
  • Self Remediation
  • Intellectual Property
  • Source Code
  • Patents and trade secrets
  • Research and Development
  • Data in Use
  • Removable Media
  • Mobile Devices
  • Notification
  • Email Alerts
  • Risk Reports
  • Dashboards
  • Confidential Data
  • Financial Information
  • Executive communications
  • Merger and acquisitions
  • Customer and Employee information
  • Protection
  • Encryption
  • Quarantine
  • Blocking
  • Data in Motion
  • FTP
  • IM / Chat
  • Email / Web Mail
  • Generic TCP

5
Control without Impeding Business
  • Automatic Email
  • Encryption
  • Email
  • Self-Compliance?
  • Email Quarantine
  • Email Block

Monitor
Report
Analysis
Action
Unencrypted
PHI/NPI
Encrypted Sent
Compliance Violation
Policy Violation
Train Sender
Legal Documents Product Business
Plans Customer List

Sender Decision
Policy Violation
Release Reject
Policy Violation
6
Complementary with Entrusts EMS
  • Encryption policy is set based on content!
  • Email body and attachments
  • Encryption does not rely on user judgment
  • Eases possible fears over encrypting email
  • Enables Enterprises to monitor, then set
    encryption policy
  • Enables enterprises to selectively encrypt only
    sensitive data

7
Scalable Message Control
  • Vericept Protect email Control Gateway
  • Single email Control Gateway supports 90 emails /
    sec
  • Multiple servers scale linearly
  • Available in a 1U Dell server

Highly scalable and redundant system
  • Entrust Entelligent Messaging Server (EMS)
  • Single EMS server supports 200,000 emails/8 hr
    day
  • Dual servers scale to 350,000 emails/8 hr day
  • 1U IBM server

8
Unique Value
  • The Only to offer Email Self-Compliance? to
    address broken business processes and train users
  • The Best (most accurate and comprehensive)
    content detection and classification in the
    industry
  • Able to handle unstructured data like no other
  • The Only solution with
  • Embedded Message Transfer Agent
  • Embedded Encryption at no additional cost
  • The ability to scan email already encrypted at
    the user desktop

9
Highly Interoperable
Supports Any
Mail Server with SMTP
Mail Client, including web-mail
Any
Standards-compliantS/MIME or PGP
Mail Client
Mail Server
RIM Blackberry
CertificateAuthority
10
Automatic Encryption
  • Encrypts automatically without user involvement
  • Determines which messages need to be encrypted
    based on policy and categories
  • Highly interoperable any email client, webmail,
    S/MIME or Open PGP

Vericept Encryption
11
Why Vericept?
  • Accuracy
  • Strongest Data Detection Suite
  • Identify data leakage others miss
  • Get to root cause of Data Loss
  • Inadvertent Data Loss ? Identify Broken Business
    Processes
  • Malicious Data Loss ? Identify user, not just
    an IP address
  • Customized for your Content
  • Every Enterprise has unique content, typically IP
  • Simple tools that allow you to create custom
    classifiers to find and protect your unique
    sensitive content

12
Vericept Protect Product Overview Prevent Data
Leakage for Data in Motion
Boston Office Reservoir Place 1601 Trapelo
Road Suite 140 Waltham, MA 02451 Denver
Office 555 Seventeenth Street Suite 1500 Denver,
CO 80202
www.vericept.com
Write a Comment
User Comments (0)
About PowerShow.com