4 Insider Risk Blindsports: What You Need to Know and How to Prevent Them

13
4 Insider Access Blind Spots What You Need to Know and How to Prevent Them Chris Merritt Director of Solution Marketing source: http://www.livearts-fringe.org/blog/images//blindspot1.j

description

Endpoints operated by your end users present a tremendous risk to your organization. From being the entry point for infectious malware, to leaking sensitive corporate information, trusted insiders play a critical role in your organization’s overall security posture. During this presentation, we’ll discuss the four blind spots that you need to consider in 2014 and how you can take proactive measures to prevent them. • Personal Clouds • Email • Mobile Devices • Removable Devices / Media

Transcript of 4 Insider Risk Blindsports: What You Need to Know and How to Prevent Them

Page 1: 4 Insider Risk Blindsports: What You Need to Know and How to Prevent Them

4 Insider Access Blind Spots

What You Need to Know and How to Prevent Them

Chris MerrittDirector of Solution Marketing source: http://www.livearts-fringe.org/blog/images//blindspot1.jpg

Page 2: 4 Insider Risk Blindsports: What You Need to Know and How to Prevent Them

Introduction

2

• Traditional Focus on Perimeter• Evolving Towards Endpoint

Protection• Four “Blindspots” to Consider

» Cloud-based Personal Storage

» Email Attachments / Links

» Mobile Device Storage

» Removable Devices / Media Storage

Page 3: 4 Insider Risk Blindsports: What You Need to Know and How to Prevent Them

Cloud-based Personal Storage

3

Data101001010101010010100100101010101100001010100010101011

Page 4: 4 Insider Risk Blindsports: What You Need to Know and How to Prevent Them

Cloud-based Personal Storage

4

Malware

Page 5: 4 Insider Risk Blindsports: What You Need to Know and How to Prevent Them

Email with Attachments / Links

5

Data101001010101010010100100101010101100001010100010101011

Page 6: 4 Insider Risk Blindsports: What You Need to Know and How to Prevent Them

Email with Attachments / Links

6

Malware

Page 7: 4 Insider Risk Blindsports: What You Need to Know and How to Prevent Them

Mobile Device Storage

7

Data101001010101010010100100101010101100001010100010101011

Page 8: 4 Insider Risk Blindsports: What You Need to Know and How to Prevent Them

Mobile Device Storage

8

Malware

Page 9: 4 Insider Risk Blindsports: What You Need to Know and How to Prevent Them

Removable Devices / Media Storage

9

Data101001010101010010100100101010101100001010100010101011

Page 10: 4 Insider Risk Blindsports: What You Need to Know and How to Prevent Them

Removable Devices / Media Storage

10

Malware

Page 11: 4 Insider Risk Blindsports: What You Need to Know and How to Prevent Them

Conclusion

11

Data101001010101010010100100101010101100001010100010101011

Malware

Page 12: 4 Insider Risk Blindsports: What You Need to Know and How to Prevent Them

More Information

Free Security Scanner Tools» Application Scanner – discover all the apps

being used in your network» Device Scanner – discover all the devices

being used in your network

https://www.lumension.com/resources/premium-security-tools.aspx

Whitepapers» SC Magazine Security Brief - Under the Radar

https://www.lumension.com/resources/free-content/SC-Magazine-Security-Brief--Under-the-Radar.aspx

» Data Privacy Day 2014 Resource Center

https://www.lumension.com/2014-Data-Privacy-Day.aspx

» 2014 Data Protection Maturity Trends webcast

https://www.lumension.com/resources/ webinars/2014-Data-Protection-Maturity-Trends.aspx

12

Get a Free Trial ofLumension Application Controlhttps://www.lumension.com/application-control-software/free-trial.aspx

Page 13: 4 Insider Risk Blindsports: What You Need to Know and How to Prevent Them

Global Headquarters8660 East Hartford Drive

Suite 300

Scottsdale, AZ 85255

1.888.725.7828

[email protected]