RSA Customer Profiles: RSA Data Loss Prevention - Israel
Transcription
RSA Customer Profiles: RSA Data Loss Prevention - Israel
RSA Customer Profiles: RSA® Data Loss Prevention (DLP) RSA® Data Loss Prevention (DLP) case studies by region North America Array Services BECU (Boeing Employees’ Credit Union) EMC Global Security Lockheed Martin Microsoft PREMIER Bankcard Regional Healthcare Provider State Government Agency U.S.-Based Federal Agency South America Tivit Click for industry index RSA® Data Loss Prevention (DLP) case studies by industry Click for region index Banking and Financial Services Services BECU (Boeing Employees’ Credit Union) Array Services PREMIER Bankcard Technology Government EMC Global Security State Government Agency Microsoft U.S.-Based Federal Agency Tivit Healthcare Regional Healthcare Provider Manufacturing Lockheed Martin ARRAY SERVICES Professional Services Firm Boosts Security with RSA Technologies AT-A-GLANCE Key Requirements –– One security platform for monitoring and reporting of all SSAE 16 controls to support PCI DSS and HIPAA –– Flexibility to cope with heterogeneous technical infrastructure –– Ability to identify and mitigate risks and threats in real time Solution –– R SA enVision® SIEM collects, analyzes, and prioritizes security events from across the enterprise IT infrastructure –– R SA® Data Loss Prevention (DLP) Suite automatically identifies, monitors, and blocks sensitive information from leaving the organization –– R SA Professional Services provided customization services Results –– Able to prove continuous compliance with industry regulations –– Automated security practices enable the Security Operations Center to focus on higher-valued tasks –– Improved security posture positions Array Services more competitively CUSTOMER PROFILE “If our customers can’t trust us they won’t do business with us – so having security systems that we can place our own trust in is essential. This is where RSA’s technologies, and the insightful support from its team, have been so important. We have total confidence in the security technologies we have deployed.” KEITH SWINGLE, IT DIRECTOR, ARRAY SERVICES Array Services Group Inc. comprises four separate companies, all based on a single campus in central Minnesota. CareCall, ProSource, JCC Medical, and JCC Financial offer solutions focused on customer service, revenue cycle management, and debt recovery and collections, respectively. The Group’s customer base is spread across a wide range of industries, including healthcare and financial services. KEY REQUIREMENTS As a provider of critical professional services that touch upon a number of business areas and processes for its customers, Array Services Group Inc. often handles sensitive data. This includes personally identifiable information (PII) and credit card information that are covered by strict industry regulations like the Healthcare Information Portability and Accountability Act (HIPAA) and the Payment Card Industry Data Security Standard (PCI DSS). In order to provide its customers with additional peace of mind, Array Services also wanted to demonstrate its alignment with Statement on Standards for Attestation Engagements (SSAE 16) attestation requirements. This required the organization to show it could aggregate logs and correlate events across its entire IT environment – a significant undertaking given that these systems include a heterogeneous mix of Linux and Windows systems. “We needed a solution that could handle the diversity of our technical ecosystem and create a centralized point of reference for all our security and compliance obligations,” summarizes Keith Swingle, Director of Information Technology, Array Services. “By implementing such a solution, we hoped to attract new customers as well as provide our existing client base with an added layer of protection against risk.” SOLUTION Having successfully used RSA® SecurID® hardware tokens to provide approximately 100 employees with remote access to its VPN for over seven years, Array Services Group naturally considered RSA – The Security Division of EMC – to provide its new SIEM and DLP capabilities. “The RSA enVision platform proved to be the best fit for our organization, as it met our requirements around functionality and ease-of-use. The fact that it integrated smoothly with our heterogeneous infrastructure was also a crucial factor that made the RSA solution stand out from the competition.” BRENT BENSON, SENIOR SYSTEM ADMINISTRATOR, ARRAY SERVICES GROUP INC. “We investigated the RSA enVision security information and event management (SIEM) platform, and compared it against a number of other options,” says Swingle. “It proved to be the best fit for our organization, as it met our requirements around functionality and ease-of-use. The fact that it integrated smoothly with our heterogeneous infrastructure was also a crucial factor that made the RSA solution stand out from the competition.” Implementation of the RSA enVision platform was undertaken with support from RSA Professional Services. The teams worked together to configure the technology in line with the organization’s specific needs. This meant not only creating a centralized repository for all log and event information from across the three corporate environments, but also developing a specially tailored and intuitive interface from which each business environment can be viewed. Once the solution was installed and configured, the Array Services Group team was interested to see how RSA could help them better meet some of their other security responsibilities. Brent Benson, Senior System Administrator, Array Services Group Inc. explains: “We operate in the collections and recovery space, which means we handle a lot of PII on behalf of our clients. As well as stopping unauthorized individuals from accessing this data, it’s equally important that we don’t allow it to leave our network unsecured – for example in an email or on a USB stick. This is where RSA’s DLP solution came in.” It was with this in mind that Array Services ran a proof of concept of the RSA Data Loss Prevention (DLP) Suite, covering Array’s network egress points and approximately 300 end points. “We created our own set of policies to determine how potential breaches are dealt with,” says Benson. “For example, if someone sends an email containing sensitive information, we can either stop it immediately, re-route it to the individual’s manager, or let it go through while notifying the individual so they can modify their behavior next time.” The team also uses RSA DLP Datacenter to identify where sensitive data is located across the organization. “Often knowledge of where documents are kept is lost as people move on, so without spending many man-hours physically searching for it, it’s hard for us to know where sensitive information might be held,” reflects Benson. The outcome of the 30-day RSA DLP proof of concept was eye-opening, as Keith Swingle, IT Director, Array Services, recalls: “I still remember the reaction we received when we reported the risk areas that the DLP solution had brought to light. It made us aware of the scale of the risk we faced, but at the same time it gave us the tools we needed to mitigate it.” RESULTS Since deploying the RSA enVision platform, Array Services Group is able to show that it has significant and meaningful controls in place to align with PCI DSS, HIPAA, and many other government and industry requirements as documented by their current SSAE 16 attestation. “Some regulations require an organization to prove compliance at the time of audit and then may not be checked again. However, we can now show our customers at any time that we have strong measures in place to protect their business-critical data,” says Swingle. “This peace of mind is important to ensure that existing customers stay with us and that new ones feel they can depend on us.” page 2 The addition of the RSA DLP Suite has also made a significant impact. The team is now able to gain detailed insight into the location and flow of sensitive data across its business units, at the push of a button. “We used to rely on time-consuming manual scanning for at-risk PII data,” Swingle continues. “Now we can deploy our grid-computing network of up to 300 PCs to carry out DLP activities on a massive scale, covering terabytes of data automatically.” Swingle and Benson sum up the benefits of the two solutions as being able to offer the strongest available security for their customers’ data along with enhanced auditing and reporting for management. They conclude: “At the end of the day, if our customers can’t trust us they won’t do business with us – so having security technology that we can place our own trust in is essential. This is where RSA’s technologies, and the reliable and insightful support from its team, have been so important. We have total confidence in the technologies we have deployed and are already considering adding more complementary RSA solutions – such as the RSA Archer™ GRC Platform – to our environment.” CONTACT US To learn more about how RSA products, services, and solutions help solve your business and IT challenges contact your local representative or authorized reseller – or visit us at www.RSA.com www.rsa.com ©2012 EMC Corporation. All rights reserved. EMC, the EMC logo, RSA, the RSA logo, Archer, enVision, and SecurID are trademarks or registered trademarks of EMC Corporation in the United States and/or other countries. All other trademarks referenced are the property of their respective owners. ARRAY CP 0212 BECU (BOEING EMPLOYEES’ CREDIT UNION) Fourth largest US credit union sets standard for secure growth with virtualization “With more opportunity for virtualization and more reliable automated security monitoring, we’re able to accelerate our IT team’s productivity. Time spent on managing our environment has been cut by about 33 percent.” AT-A-GLANCE RANDALL JARRELL, INFORMATION PROTECTION ANALYST, BECU Key Requirements –– Create ability to discover, monitor and secure sensitive data in virtual desktops –– Collect logs and generate reports to ensure compliance –– Ensure sensitive data is not lost through data leakage Solution –– Security Information and Event Management (SIEM) platform collects and correlates security and compliance events –– User actions monitored and flagged when they attempt unauthorized actions –– Both platforms integrated smoothly with each other and the VMware virtual environment Results –– Time saving of 33 percent enables IT team to focus on innovative projects rather than system management –– System is now compliant with stringent auditor requirements –– Capability to build extensive, secure virtual environment supports business growth strategy CUSTOMER PROFILE Governed by a volunteer Board of Directors, BECU is a not-for-profit credit union owned by its members. Earnings are returned to the members in the form of better rates and fewer fees. With more than 650,000 members and more than $8.9 billion in assets, BECU is the largest credit union in Washington and one of the top five financial cooperatives in the country. BECU currently operates over 40 locations in the Puget Sound region. All Washington state residents and students attending Washington colleges and universities are eligible to join. KEY REQUIREMENTS Successful business growth requires a robust IT infrastructure and BECU was committed to ensuring its resources were as strong as possible in all respects, particularly with regards to security. BECU must meet requirements set by the NCUA. The NCUA requires reference to log archiving and management. To do this BECU needed to discover, monitor and secure sensitive data on both physical and virtual desktops. Randy Jarrell, Information Protection Analyst, BECU, explains: “Our strategy is to increase IT efficiency by virtualizing both servers and desktops. As well as being simpler to manage, virtualization will enable remote working and support our business continuity plan. With RSA we can roll out our virtualization strategy securely.” In addition to monitoring and alerting to security breaches from incoming threats, BECU wanted to ensure sensitive data was not lost through data leakage. “When arranging mortgages for our members or helping law enforcement with fraud investigations, for example, a lot of sensitive data is shared and we need to make sure it doesn’t go anywhere it shouldn’t,” says Jarrell. SOLUTION To meet these challenges, BECU knew it needed to deploy an integrated security information and event management (SIEM) solution and Data Loss Prevention (DLP) platform that would perform well with its VMware virtual environment. “We always try to stay ahead of the game when it comes to compliance, and working with RSA on this project means that we remain ahead of the curve. The auditors have been impressed with the detailed reports and logs we’re able to produce on demand now.” RANDALL JARRELL, INFORMATION PROTECTION ANALYST, BECU Having worked with RSA, The Security Division of EMC, before, the credit union chose to run a 30-day test of the RSA enVision® SIEM platform. “We liked the fact that the solution enabled us to sort and store log information from many different devices,” comments Jarrell. “We can collect and correlate security and compliance events across virtual and physical environments.” Following the successful trial, the platform was deployed across 1,000 devices, handling about 5,000 events every second. The credit union quickly wrote correlation rules that fit with its own security requirements, so that the system sends alerts when deviations from baseline levels or patterns of malicious activity are detected. Shortly after this SIEM deployment, BECU also deployed the RSA DLP Suite. Users are informed if they attempt unauthorized activity, educating about information security and helping them take immediate corrective action to protect sensitive data. The solution also enables BECU to discover sensitive information on virtual desktops, enforcing a single data security policy across both physical and virtual environments. Integrating the two solutions was carried out quickly and smoothly. Jarrell recalls: “It was a single box, so all we needed to do was point it at an IP address and the DLP platform started sending its logs to the SIEM platform.” In this way, BECU was not only enforcing a cohesive security policy, but generating cohesive reports and logs as well. RESULTS “We always try to stay ahead of the game when it comes to compliance, and working with RSA on this project means that we remain ahead of the curve,” says Jarrell. “The auditors have been impressed with the detailed reports and logs we’re able to produce on demand now.” CONTACT US To learn more about how RSA products, services, and solutions help solve your business and IT challenges contact your local representative or authorized reseller – or visit us at www.RSA.com At the same time, the scalability and reliability of the integrated virtual solution means that the credit union’s IT resources are now able to support its strategic business goals. The amount of data it has processed and recorded so far this year has been compressed into just 500GB, which is relatively small for an organization of BECU’s size, leaving plenty of room for growth. Meanwhile, call center workers are able to work from home using virtual desktops, making them just as productive but offering them greater flexibility and creating a back-up working model for business continuity. The ability to view and report on activity across the corporate infrastructure now means BECU can identify broken processes, clean up data scattered across its Sharepoint files and apply stronger encryption tools where necessary. “With more opportunity for virtualization and more reliable automated security monitoring, we’re able to accelerate our IT team’s productivity too,” Jarrell points out. “Time spent on managing our environment has been cut by about 33 percent. This is the equivalent of taking one person from full-time monitoring of the security platform and putting them on projects that drive the business forward instead.” www.rsa.com ©2010 EMC Corporation. All rights reserved. EMC, RSA, RSA Security, the RSA logo, RSA enVision and RSA Data Loss Prevention Suite are the property of EMC Corporation in the United States and/or other countries. All other trademarks referenced are the property of their respective owners. BECU CP 0910 EMC GLOBAL SECURITY Secure virtualized environment bolsters EMC’s industry-leading reputation AT-A-GLANCE Key Requirements –– Accurate, real-time fraud/threat detection with minimal impact to user experience –– Secure, centralized access management of remote data centers worldwide –– Automated log collection, analysis, and reporting –– 24 x 365 anti-fraud cybercrime operations Solution –– Platform that connects remote data centers to centralized fraud/threat management tools –– System that operates over existing Internet connection using virtualization –– Role-based access management, backed by anti-fraud response Results –– Secure access to the isolated data centers from within the corporate EMC network, while maintaining isolation and audit trails –– Achieved security-policy requirements while adding industryleading service to EMC portfolio CUSTOMER PROFILE “We have built a secure, common platform that enables our administrators to manage EMC’s remote data centers spread around the globe using virtual desktops. The solution we have developed, the Secure Management Infrastructure, uses cutting-edge technologies from RSA and VMware to allow us to accelerate the development of new products by reducing the go-to-market time when a business unit needs to leverage a non-traditional (SaaS, cloud, or managed service) data center. It has repeatedly proven its value.” DAVE MARTIN, SENIOR DIRECTOR, GLOBAL SECURITY ORGANIZATION The EMC Global Security Organization (GSO) oversees information security, risk management, and workforce protection practices for all of EMC. Their charter is to ensure that best-practice security operations are in place to protect both corporate and customer information. They also ensure that security policies and compliance programs are enforced. The Secured Business Services (SBS) department of GSO was developed as part of the company’s commitment to secure EMC’s and RSA’s externally hosted or customer-facing products or applications. SBS is comprised of product specialists and security practitioners focused on the unique needs of those EMC business units needing to provide outsourced services (SaaS) to customers. KEY REQUIREMENTS EMC has grown into a world-leading enterprise through astute strategic insight, development of market-leading technologies, and the acquisition of companies with complementary technologies. Since 1993, EMC has acquired more than 45 companies, including Legato, RSA, and VMware. However, these new acquisitions, combined with emerging technologies such as SaaS and cloud, complicate the traditional data-center-operation model by moving out of direct IT control. To maintain best-practice IT policy, access to production servers or systems must come from a dedicated network, use two-factor authentication, and be completely auditable. With internal EMC data centers, GSO ensures these requirements are met through standardized security controls. In the past, remote data center access was accomplished via complete network segregation, achieved using duplicate networking devices and requiring each user or administrator to have another PC available for that purpose only. Since the PCs were not connected, data transfers between the two environments were commonly performed manually with a USB stick or CD-ROM. This compromised internal EMC security policy because there was no audit trail. Because of this and similar issues it became obvious that the same processes used for internal administration could not be used externally without major changes that would result in disruption for legacy IT servers. SOLUTION GSO tasked the SBS group to develop a solution that would leverage EMC’s and Cisco’s comprehensive set of technologies and expertise. SBS’s task requirements were defined as follows: –– Develop a self-contained environment comprised of standard IT and security tools. –– Ensure that centralized auditing, logging, monitoring, and event escalations are in place for audit compliance and production resiliency. –– Ensure that customer transactions using the front end of a remote data center are not adversely impacted by management traffic on the back end. –– Ensure isolation is maintained between customer, administration, and corporate data. SBS developed a blueprint that focused on virtualization technologies to create an environment that would provide access to an external data center. SBS also felt it was equally important to extend the virtualized concept to other use cases within EMC such as private clouds and Professional Services. By breaking down these requirements, SBS identified the technical challenges it believed could be overcome by applying its own expertise and utilizing the technologies within the EMC products: –– Development of a private networked environment that would be secure and low-cost –– Creation of virtual hosted applications and services for internal businesses and users –– Deployment of automated self-configured clients in virtualized user-pool environments SBS then developed a ground-breaking infrastructure that provides secure management access to the data centers. It is based on EMC CLARiiON storage, VMware virtualization, RSA security solutions, and Cisco VPN technologies. The Secure Management Infrastructure was achieved by implementing VMware ESX servers to host multiple security and IT applications on virtual servers and the deployment of VMware View virtual desktop. The virtualized desktop environment is accessible from the EMC corporate network while providing secure access using site-tosite VPN tunnels and firewalls to provide separation to the data centers. Now EMC users and administrators can securely access the remote data centers through virtualized desktops and from a position of centralized security administration. Additional EMC security technologies were deployed to ensure security across the areas of authentication, security event incident management, and data loss prevention. To ensure proper credentialing and to meet compliance/audit controls, users are only allowed access to predesignated data centers using RSA® SecurID®. page 2 The RSA Data Loss Prevention (DLP) Suite was also implemented to ensure that the network traffic between the external RSA data center and EMC internal sites is monitored. RSA DLP Suite provides a policy-based approach to classifying and securing sensitive data as well as enforcing controls and delivering reporting and auditing capabilities. RSA enVision® captures security information and events from the security appliances and allows for automated escalations. It collects transactional data from the data centers locally, compresses it, and can forward it directly to the corporate Critical Incident Response Team (CIRT). “The Secure Management Infrastructure covers any new use case. If a new business unit comes online, for example, or a data center, we can build a virtual desktop and provide an IP address to the employees within that unit. They can securely access the production network while still using the corporate network.” JIM WEAVER, MANAGER, SECURE BUSINESS SERVICES, GLOBAL SECURITY ORGANIZATION The EMC® Celerra® gateway is used for network attached storage (NAS). A CLARiiON® CX-class SAN is the storage for the Celerra NAS gateway and the VMware ESX server which contains the virtual appliances and desktops. RESULTS The most immediate and striking benefit was the virtualization technologies inherent to the Secure Management Infrastructure. It was developed using core EMC components and combined with Cisco ASA VPN and firewall technology. This technology is the foundation for rapidly deploying many IT tools and management platforms in a ‘bolt-on’ fashion. Examples include management servers for web-application firewalls, intrusion detection, and authentication services. Jim Weaver, Manager, Secure Business Services, Global Security Organization, said: “One of the largest challenges was keeping the RSA Hosted Operations production activities – which are both critical to the business and commonly handle sensitive data – separate from the internal corporate network. The Secure Management Infrastructure not only achieved this goal, it also significantly decreased the complexity and cost of the solution.” The SMI is now a proven model that not only showcases EMC technologies but also the technical knowledge and expertise within the EMC GSO and SBS organizations. More importantly the SMI can be replicated to provide a solution set for other companies facing the same issues. In short, another industry-leading service has been brought into the EMC fold. CONTACT US To learn more about how RSA products, services, and solutions help solve your business and IT challenges contact your local representative or authorized reseller – or visit us at www.RSA.com The development of the Secure Management Infrastructure has ensured that EMC has met its overarching objectives, chiefly, securely connecting external data centers and centralizing the administration of firewalls, web-application firewalls, and other security systems. The SMI has delivered on more than just security. As Jim Weaver, also, points out: “One of the issues we face, as do other companies, and with regard to mergers and acquisitions, is how do we secure operational access to new resources and not add to the risk? The SMI is the answer – it enables both IT and the business to quickly adapt to market and business changes while still ensuring that security-policy requirements are met.” Adding to the enhanced security toolsets and scalability, the Secure Management Infrastructure provides flexibility, reliability, and efficiency. It lowers costs by centralizing management, administration, and resources and improves business agility by enabling fast provisioning of new services. As well as delivering a highly available and secure method to access remote data centers, the infrastructure provides the ability to audit and centralize accounting which is a core requirement for ISO, PCI, and SAS/70 certifications. www.rsa.com ©2003-2009 EMC Corporation. EMC, the EMC logo, RSA, the RSA logo, enVision, and SecurID are trademarks or registered trademarks of EMC Corporation in the United States and/or other countries. All other trademarks mentioned herein are the property of their respective owners. EMCSBS CP 0911 LOCKHEED MARTIN Stellar cloud innovation AT-A-GLANCE Key Requirements –– Continuously advance technology to stay ahead of rapidly advancing threats –– Continue to deliver innovative technology solutions without compromising on security –– Develop flexible cloud offering for public-sector organizations Solution –– Starfire Mission Ready Cloud built-in collaboration with Virtual Computing Environment (VCE) –– Adaptable solution offers full range of RSA® security technologies and LM Cyber Security Alliance partner capabilities –– Flexible model means customers can tailor their solution to specific requirements Results –– Customers benefit from simpler, more cost-effective cloud-service implementation –– Scalable and flexible, the infrastructure can adapt to business growth and unexpected threats CUSTOMER PROFILE “The integrated, mission-focused secure cloud solution accelerates affordable development, deployment, innovation, and performance of cloud implementations while reducing infrastructure costs and risks.” CURT AUBLEY, VICE-PRESIDENT, NEXGEN CYBER SECURITY & INNOVATION, LOCKHEED MARTIN INFORMATION SYSTEMS & GLOBAL SOLUTIONS Headquartered in Bethesda, Maryland, Lockheed Martin is a global security company that employs 132,000 people worldwide. It is principally engaged in the research, design, development, manufacture, integration, and sustainment of advanced technology systems, products, and services. Lockheed Martin is the largest provider of information technology services and solutions to the U.S. government and is a leading provider of cyber security solutions. The Corporation’s 2010 sales from continuing operations were $45.8 billion. KEY REQUIREMENTS As a leader in the technology field, Lockheed Martin strives to stay at the forefront of innovation and high quality when developing new products and services for its customers. A key element of ensuring high-quality products is keeping them secure, so in 2009 Lockheed Martin launched the Lockheed Martin Cyber Security Alliance to address cybersecurity challenges through collaboration and innovation. This alliance is committed to identifying areas where it can add value for its customers, and cloud computing is a key focus. “Our customers want to harness the benefits inherent in cloud computing – such as reduced operating costs and enhanced flexibility – without compromising compliance and security requirements,” says Curt Aubley, Vice-President, NexGen Cyber Security & Innovation, Lockheed Martin Information Systems & Global Solutions. Aubley and his teams were eager to develop a solution that would enable customers to make use of the cloud while remaining compliant with regulations from Consensus Audit Guidelines (CAG) industry best practices to Sarbanes-Oxley to the Health Insurance Portability and Accountability Act. They needed to ensure that the solution was modular and adaptable as well so that it could be refined to identify and combat security threats now and in the future. SOLUTION “Our customers want to harness the benefits inherent in cloud computing – such as reduced operating costs and enhanced flexibility – without compromising compliance and security requirements.” CURT AUBLEY, VICE-PRESIDENT, NEXGEN CYBER SECURITY & INNOVATION, LOCKHEED MARTIN INFORMATION SYSTEMS & GLOBAL SOLUTIONS Having identified the opportunity to develop a new secure-cloud solution for its customers, Lockheed Martin worked with the Virtual Computing Environment (VCE) – a collaboration of Cisco, EMC, and VMware – to design and build it. The solution it developed is Starfire Mission Ready Cloud™ – a secure, mission-ready, turnkey private-cloud offering for federal, state, and local government agencies as well as private- sector organizations. It incorporates VCE’s Vblock™ technology and RSA products to provide a trusted environment that addresses concerns of data security, privacy, and enhanced performance to meet the cloud-computing objectives of all Lockheed Martin’s customers. Customers are able to tailor all aspects of the solution – including security capabilities – to meet their particular needs. To support this feature, Lockheed Martin chose to build in a range of security technologies across its virtual and physical infrastructures from RSA, The Security Division of EMC. These include the RSA® Data Loss Prevention Suite, the RSA enVision® platform for security information and event management (SIEM), and RSA SecurID® two-factor authentication. Those needing governance, risk, and compliance (GRC) capabilities can incorporate RSA Archer™ technologies. “We carry out continuous evaluation of hundreds of different technology offerings,” explains Christopher Kachigian, Cyber Architect Sr. Staff. “This ensures that when we develop modular solutions like this, we know that every component is the best available and our customers are getting the most effective solutions.” RESULTS CONTACT US To learn more about how RSA products, services, and solutions help solve your business and IT challenges contact your local representative or authorized reseller – or visit us at www.RSA.com Aubley comments: “The value-added, secure cloud-enabling capabilities that are being offered through this new solution will help to further protect and defend our customers’ critical operations and services while reducing infrastructure costs and risks.” Starfire is scalable and measurable, combining Lockheed Martin mission-focused cloud management and cyber-security solutions with VCE’s pre-integrated technologies from Cisco, EMC, and VMware to deliver a highly secure computing platform that can scale as organizations’ demands for IT grow. Kachigian adds: “By incorporating RSA technologies into the mix, we know we’re offering our customers industry-leading security features as well as benefitting from the wider partnership with EMC.” The Starfire offering has already generated significant interest among organizations in all fields of government. As roll-out to these customers gets underway, the team at Lockheed Martin is already planning further additions to the portfolio in order to continue enhancing the customer experience. www.rsa.com ©2011 EMC Corporation. EMC, the EMC logo, RSA, the RSA logo, Archer, enVision, and SecurID are trademarks or registered trademarks of EMC Corporation in the U.S. and/or other countries. All other trademarks referenced are the property of their respective owners. LOCK CP 0211 MICROSOFT Data loss prevention suite helps technology leader discover sensitive data AT-A-GLANCE Key Requirements –– Regulated data discovery integrated with policy and process –– Compliance with Payment Card Industry (PCI) and Sarbanes-Oxley regulations –– Securing intellectual property such as source code, strategic plans, and operational information Solution –– RSA DLP Datacenter with distributed architecture and scanning capabilities –– Enables scanning of all data stored across enterprise Results –– Rapid scans of 12TB of file system data and 120,000 SharePoint Sites make continuous content discovery a reality –– False positive rate of less than one percent ensures recorded incidents are genuine “Content identification is not one of those problems that you can simply throw a lot of hardware at and get the kind of performance you need. The unparalleled accuracy and unique features of RSA® DLP Datacenter made it the only viable choice for discovering all our sensitive content.” OLAV OPEDAL, SECURITY PROGRAM MANAGER, MICROSOFT KEY REQUIREMENTS For global corporation Microsoft, the biggest challenge in preventing data breaches and complying with privacy regulations isn’t so much a technical data-protection issue, but dealing with content sprawl. “Before we could do anything, we knew we had to locate our sensitive information and measure compliance to the policies already in place,” explains Olav Opedal, Security Program Manager at Microsoft. “The problem was, we had approximately 30,000 file shares containing nearly 12 terabytes of data and more than 120,000 SharePoint sites needing to be scanned and analyzed. How do you get that done in a short time frame and without causing enormous disruption to your business operations and IT resources? This was the impetus behind our Information Classification and Data Handling project.” As part of the security initiative, Microsoft had to tackle the Payment Card Industry (PCI) Data Security Standard and meet Sarbanes-Oxley’s stringent rules on securing financial information. It also had to consider intellectual-property security. “Source code, strategic plans, operational information, and other kinds of sensitive business information are all types of intellectual property that we needed to secure,” asserts Opedal. “Of course, some kinds of information are more sensitive than others. Customer data, source code, and corporate financial data were clearly the most important for us. This is why rather than trying to secure our information according to the specific regulation, we took the approach of classifying all data in our managed IT space into one of three categories: High Business Impact, Moderate Business Impact, or Low Business Impact.” The question for Microsoft became how to gain a better understanding of the risks posed by its information-storage and data-handling practices. “We built a risk model,” explains Opedal, “the purpose of which was to quantify the level of risk from our data. We decided to start with HBI – which encompasses all of the most important intellectual property and information regulated under PCI and SOX – then move on to target other areas. To execute our HBI strategy, we needed a way to scan any managed space where sensitive data could be stored to ascertain the nature of what we had out there. This was a content-discovery challenge. That’s where RSA DLP Datacenter came in.” CUSTOMER PROFILE SOLUTION The parameters Microsoft developed for its Information Classification and Data Handling project dictated the stringent criteria for judging content-discovery solutions. With enormous data loads and thousands of locations to scan, enterprise scalability, performance, and accuracy were all top considerations. Management and operations were also at the head of the list. “The unparalleled accuracy and unique features of RSA DLP Datacenter made it the only viable choice for discovering all our sensitive content.” OLAV OPEDAL, SECURITY PROGRAM MANAGER, MICROSOFT Microsoft executives needed to know that they could handle security threats and incidents quickly and securely, and be able to document remediation efforts in order to maintain audit-compliance trails. “Content identification is not one of those problems that you can simply throw a lot of hardware at and get the kind of performance you need,” observes Opedal. “The unparalleled accuracy and unique features of RSA DLP Datacenter – such as incremental processing – made it the only viable choice for discovering all our sensitive content.” Microsoft implemented RSA DLP Datacenter, which takes a revolutionary approach to content discovery with its distributed architecture and scanning capabilities, enabling them to scan all data stored across their full set of file shares and SharePoint sites. To boost scanning performance, Opedal opted to use the product’s Grid Processing capability, enabling him to specify a set of servers at each location to process the scan. The servers are automatically provisioned and automatically load balance the contentanalysis work for fastest processing. Microsoft is also leveraging the patent-pending incremental scanning technology for ongoing scans. This enables them to regularly scan and analyze files and directories that are new, modified, moved, or renamed. “We really needed the performance, scalability, and highly precise content-detection capabilities that only RSA DLP Datacenter could provide,” says Opedal. “Grid processing and incremental scanning were essential for Microsoft given the volume of data that we store. Also, RSA DLP Datacenter generates matched files with an accuracy rate consistently at or above 98 percent.” RESULTS CONTACT US To learn more about how RSA products, services, and solutions help solve your business and IT challenges contact your local representative or authorized reseller – or visit us at www.RSA.com As a result, Opedal and his team were able to scan 12TB of file system data and 120,000 SharePoint sites in a matter of nine days while still maintaining the highest levels of precision. Ongoing incremental scans of just the new, modified, moved, or renamed data across those same 120,000 SharePoint sites takes less than five percent of the time it took for the original scan, making continuous content discovery a reality. Further, with DLP Datacenter, Microsoft is keeping the costs of its information-security operations as low as possible. In planning the data-discovery project, the team set a baseline that a single compliance officer or security advisor could handle approximately 250 incidents per day. “The false positive rate is lower than 1 percent, so we know that the incidents our compliance staff have to review are genuine,” explains Opedal. “Without RSA DLP Datacenter, we’d have to hire and train a lot more staff and face a far higher total cost of ownership. RSA DLP Datacenter has given us a better understanding of the location of our high-impact business information, and enables us to protect against the proliferation of that data – something of paramount importance for all of us here at Microsoft.” www.rsa.com ©2008 EMC Corporation. EMC, the EMC logo, RSA, and the RSA logo are trademarks or registered trademarks of EMC Corporation in the United States and/or other countries. All other trademarks mentioned herein are the property of their respective owners. MICRO CP 1208 PREMIER BANKCARD Financial services company gains bird’s eye view on 3.5 million customer records “We can now accelerate our drive to have a single view on all sensitive customer and company data, which in turn significantly galvanizes our security strategies and quickens our steps in meeting security policy objectives.” AT-A-GLANCE CHUCK CINCO, MANAGING OFFICER FOR INFORMATION SECURITY, PREMIER BANKCARD Key requirements –– Comprehensive view of external threats, sensitive data, and use of corporate infrastructure –– Classifying sensitive data and responding to it in a timely manner –– Easy-to-use tools for dashboarding, compliance reporting, and forensic analysis Solution –– Identify and classify sensitive data across the network and in the data center –– Create the foundation of a data-loss-management program –– Integrate across 400 devices Results –– Reduced IT complexity which helps IT become more responsive –– Ability to quickly identify compliance and security gaps and automate responses to incidents –– Reliable, integrated view of regulated data and systems CUSTOMER PROFILE PREMIER Bankcard is a sister organization of First PREMIER Bank, South Dakota. It is the tenth largest issuer of VISA and MasterCard credit cards in the United States. It serves more than 3.5 million customers nationwide and was the first financial organization in the world to be certified to the ISO 27001 standard, the only internationally recognized information-security standard. KEY REQUIREMENTS Several years ago the IT department, which manages technology for both PREMIER Bank and PREMIER Bankcard, purchased RSA enVision®, a platform that provides collection, alerting, and analysis of log data across multiple network devices. This was particularly important within the context of securely handling personally identifiable information (PII) on behalf of their customers as well as their own mission-critical information. The platform enabled the two organizations to consolidate log information and provide a central repository for data aggregation. As such, it allowed the business to minimize its exposure to data compliance breaches and to ensure that IT added more value to the business. PREMIER Bankcard also had a technology that was used to classify and identify sensitive data on the network, which in turn helped it meet security policy objectives. However, the product license was coming to an end. As a result, it wanted to take the opportunity to create a comprehensive view of data usage in order to strengthen security policies. SOLUTION The organization began exploring the market for a suitable solution and decided on the RSA Data Loss Prevention (DLP) Suite from RSA, The Security Division of EMC. The suite enables organizations to discover and classify their sensitive data, educate end users to ensure data is handled appropriately, report on risk reduction, and meet security-policy objectives. “We now have a multi-layered view of all activities, enabling us to really prioritize our activities and provide a bird’s eye view on all sensitive customer and company data.” CHUCK CINCO, MANAGING OFFICER FOR INFORMATION SECURITY, PREMIER BANKCARD Essentially, it wanted to create a security policy that would be well-understood across the company and be able to enforce it with few or no manual steps. As a result, the company leveraged the technology in the data center and across the network. This enabled it to identify sensitive data and helps to enforce policies across file shares, databases, storage systems, other data repositories, corporate email systems, web-based email, instant messaging, and web-based protocols. It then took its first integration steps. Chuck Cinco said: “To date, we’ve put over 400 devices into these systems and have built a security operations dashboard that allows us a single view of most of our information-security technologies. However, this is just first the step, and we will deepen the integration as we move forward.” RESULTS PREMIER Bankcard now has a comprehensive monitoring capability which it is leveraging to reduce risk. Audits have become easier, while audit fees, tools, and training documentation have been reduced. The company also has clear, harmonized controls that are mapped to regulations, workflows that streamline and automate compliance processes, and regulated data discovery that integrates with policy and process. Given that the company now has in place non-compliance triggers that provide immediate and automated notification of data alerts, it is planning to integrate other technologies into its data-collection and reporting platform. CONTACT US To learn more about how RSA products, services, and solutions help solve your business and IT challenges contact your local representative or authorized reseller – or visit us at www.RSA.com www.rsa.com The company is now expanding this capability into other areas such as telecoms, which is greatly simplifying some of its processes. Automated collection of event and incident management data has saved a lot of time, while reports and dashboards now provide business-relevant views. “We now have a multi-layered view of all activities, enabling us to really prioritize our activities and provide a bird’s eye view on all sensitive customer and company data,” added Chuck Cinco. ©2011 EMC Corporation. EMC, RSA, the RSA logo, and enVision are trademarks or registered trademarks of EMC Corporation in the U.S. and/or other countries. All other trademarks mentioned are the property of their respective owners. PREM CP 0311 REGIONAL HEALTHCARE PROVIDER Regional hospital operator increases the health of its corporate network AT-A-GLANCE Business Challenge –– Maintain the security and high availability of a large and complex corporate network, holding sensitive information –– Improve visibility of the traffic traveling over the network, enabling the organization to move from a reactive to a proactive security stance –– Maintain Health Insurance Portability and Accountability Act (HIPAA) compliance Solution –– Evaluated the performance of the top three Data Loss Prevention (DLP) solutions on the market “By deploying RSA Data Loss Prevention we have been able to take control of the information that is shared across our large and complex corporate network. Using the solution’s easy-touse interface we have accelerated the process of identifying when there is a risk to sensitive information and our ability to develop a proactive, targeted response that minimizes disruption to other users.” INFORMATION SYSTEMS PROJECT MANAGER, REGIONAL HEALTHCARE PROVIDER This regional healthcare provider operates a multi-hospital medical network in its local area. Its medical centers help improve the health of thousands of people each day. BUSINESS CHALLENGE This regional healthcare provider manages a large and complex IT infrastructure spanning multiple hospitals and medical centers across the state it operates in. Results A Metropolitan Area Network (MAN), managed by the organization, connects these separate and geographically dispersed sites. Thousands of employees and medical students use the network to get online or send internal messages. Traffic from a range of applications, including Facebook, Twitter, Yammer, Google, corporate email and instant messenger systems, and cloud services, travels over the network. –– Able to identify potential issues early, so that they can be dealt with before they become a major problem The already challenging task of managing this network is further complicated by the fact that it has grown sporadically and organically, as the separate sites have joined together over the years. The network is made up of heterogeneous technologies that result in complicated, interconnected IT issues, and potential vulnerabilities. –– Now fully deployed a best-practice DLP solution to collect information regarding traffic on the corporate network –– Now fully prepared to swiftly comply with any existing or new pieces of legislation –– Better able to act as technology advisors to the rest of the organization CUSTOMER PROFILE Due to the nature of the traffic passing over the network – often carrying sensitive Personally Identifiable Information (PII) – the organization cannot afford security threats or data loss. Also, since the MAN connects healthcare sites, maintaining a high level of patient care relies on its high availability. To this end, the organization wanted to improve its visibility of traffic on the network so that it could proactively identify and address vulnerabilities, ensuring that sensitive information is not exposed or unprotected at any point, and that high availability is maintained. SOLUTION In line with President Obama’s Health Care Reform Bill, which aims to deliver a tidal wave of healthcare Information Technology innovation, the regional healthcare provider was keen to find an IT solution that would help it gain further visibility into the traffic on its network. Armed with this extra insight, it would then be able to move from a reactive to a more proactive position – identifying and solving potential issues before they become a major problem. “By having this best-practice approach in place, we are able to act as advisors to the rest of the organization. We can recommend the best technologies to have in place for any given situation and we can ensure they run efficiently and are fully compliant.” INFORMATION SYSTEMS PROJECT MANAGER, REGIONAL HEALTHCARE PROVIDER The organization decided to evaluate the performance of the top three Data Loss Prevention solutions on the market. During the 30-day pilot, it set up each technology to capture information regarding the same network traffic. Analyzing the results, it found that the solution from RSA, The Security Division of EMC, returned the fewest false positives. An Information Systems Project Manager at the organization comments: “We were very impressed by the results returned by the RSA solution – the false positives were low. But more than that, it had an intuitive and user-friendly interface, which would make it easy for us to encourage users to adopt the technology.” RSA® Data Loss Prevention (DLP) Network provides complete data loss prevention for sensitive information in transit. It identifies and enforces policies for sensitive data transmitted through corporate email (SMTP), webmail, instant messaging, FTP, web-based tools (HTTP or HTTPS), or any generic TCP/ IP products. It took just a few weeks for the organization to deploy the technology and it is now up and running collecting valuable information regarding the data moving across its network. Over the next few months, the organization will focus on analyzing this data, from which it will establish a raft of security policies. RESULTS Thanks to its new Data Loss Prevention solution, the regional healthcare provider has a complete view across its network of relevant threats and potential vulnerabilities. This enables it to identify potential issues early on, so that necessary remediation actions can be prioritized and tracked. It is enabling the organization to take a proactive stance, rather than a reactive one. CONTACT US To learn more about how RSA products, services, and solutions help solve your business and IT challenges contact your local representative or authorized reseller – or visit us at www.RSA.com The healthcare provider is now able to deal with incidents swiftly and with minimum impact to the network users. This also makes it much easier for hospitals to maintain high network availability, since it now has insight into when and where additional bandwidth is required, for example. This additional insight also means that the organization is fully prepared and able to swiftly comply with any existing or new pieces of legislation, such as the Health Insurance Portability and Accountability Act (HIPAA). “By having this best-practice approach in place, we are able to act as advisors to the rest of the organization. We can recommend the best technologies to have in place for any given situation and we can ensure they run efficiently and are fully compliant,” concludes the Information Systems Project Manager. “We are now looking to deploy DLP Datacenter and Endpoint to extend this visibility across our entire IT infrastructure.” www.rsa.com ©2011 EMC Corporation. EMC, the EMC logo, RSA, and the RSA logo are trademarks or registered trademarks of EMC Corporation in the U.S. and/or other countries. All other trademarks mentioned are the property of their respective owners. REGHC CP 1211 STATE GOVERNMENT AGENCY Government Organization Protects the Public with RSA® Data Loss Prevention and RSA Archer® AT-A-GLANCE Key Requirements –– Keep sensitive personal and financial data pertaining to state residents from being shared externally or accessed by unauthorized individuals –– Manage data vulnerabilities across fragmented IT environments, tracking data at rest, in motion, and on end-point devices –– Actively educate employees to increase awareness of dataprotection requirements when they put sensitive data at risk Solution –– RSA Data Loss Prevention (DLP) identifies at-risk sensitive data in the datacenter, network, and on endpoint devices and alerts users when protective measures are needed to enforce controls to protect data –– Analysts can view the security risk posture of the entire infrastructure from one central control panel –– Feeds from RSA DLP are managed by RSA Archer eGRC Suite to automate mitigation workflows Results –– Users are now more regularly encrypting their sensitive files before transmitting them, and are aware of their role in keeping sensitive data protected –– Management and IT analysts have an enhanced, comprehensive view of data risk and its business implication –– Risks are identified more quickly and accurately than before, and can be dealt with faster CUSTOMER PROFILE “We chose RSA as a partner to assist in our objective to prevent data loss. RSA provided support for a broad range of technologies that integrated well with solutions we had previously implemented within our security operations. One solution to cover data at rest, in motion, and in use on endpoint devices was a significant requirement.” CISO, STATE GOVERNMENT AGENCY This government agency is responsible for supporting the needs of millions of state residents on a daily basis, many of whom belong to vulnerable groups such as children and the elderly. The organization handles sensitive personal data about state residents – including Personally Identifiable Information (PII), financial information, and Protected Health Information (PHI) – and is responsible for administering significant volumes of funds totaling tens of billions of dollars per year. KEY REQUIREMENTS Any government organization exists to serve its citizens. As well as delivering lifeenhancing services, the state agency has an obligation to keep safe any personally identifiable information (PII) that it holds about its constituents, in order to protect them from identity theft and fraud. However, the larger the volume of personal and financial data held, the greater the risk. With thousands of projects being managed across the organization’s various departments, and a large number of employees, the agency needed a better way to track and protect employee and customer confidential data. Other government organizations have fallen victim to ID theft attacks, so this agency took proactive steps to ensure that sensitive information was not accessible to unauthorized individuals, and that files were transmitted appropriately by the organization’s personnel. The organization’s fragmented IT environment presented significant challenges. The merging of a number of different organizations left duplicate and disparate technologies managed by numerous groups across the organization. With some environments being hosted in outsourced data centers, the organization needed a data loss prevention (DLP) solution that would work across a highly complex IT infrastructure. “As well as putting more stringent controls in place to keep sensitive data from leaving the organization, we wanted to better educate our employees about the potential impact of their actions on their clients’ security,” explains the CISO. “They’re focused on getting their jobs done, meaning they sometimes don’t think about the potential risk they are introducing when transmitting sensitive data. We needed to train them to think about the security implications of what they do.” SOLUTION “We’re also very excited about the possibility of integrating RSA Archer and DLP with RSA NetWitness to add even more value to the organization and make our risk-management workflows even more effective.” CISO, STATE GOVERNMENT AGENCY The organization looked at a number of DLP solutions. Starting with a shortlist of 10 vendors, it whittled down the options through a series of questionnaires, use-case evaluations, and product-viability assessments until just one was left. “We chose RSA because it provided support for the broad range of technologies that we already had in place, as well as offering one solution to cover data at rest, in motion, and in use on endpoint devices,” says the CISO. “We knew it would give our analysts comprehensive visibility of the location and flow of sensitive data across our extensive, state-wide IT environment, all at once. It would also enable them to assess risk based on parameters we set ourselves.” This integrated visibility was essential to help the agency keep tabs on the entire infrastructure. After piloting RSA DLP in its data center, across its network, and on end-point devices, the agency began its full-scale deployment with RSA DLP Network to actively monitor email and other internet traffic for unsecured files and PII data. Any risks are flagged immediately to the sender, helping educate users about the risks they are creating while ensuring any data they transmit is appropriately encrypted – either by the user or automatically by the DLP solution. “We saw an immediate impact after implementing this solution, as employees started to encrypt their emails much more regularly. This showed that the educational aspect of the RSA DLP solution was having the desired effect,” the CISO recalls. The pilot also uncovered a large number of files that had not been accessed for a long time – years, in some cases – and identified where files were duplicated across the system. “With RSA DLP we can assess the criticality of a file based on our own criteria, move it to a secure site, and protect it appropriately,” adds the CISO. The results of this pilot exercise were shared with the agency’s senior management, who quickly approved a wider-than-planned roll-out for the RSA solution. With RSA DLP Network in place, the agency is integrating its feeds into the Risk Remediation Manager On Demand Application of the RSA Archer eGRC Suite, which runs a standard workflow to respond to and deal with each incident. “When alerted to a new risk by RSA DLP, the RSA Archer module sends an email to the appropriate manager, asking them to confirm whether the data at risk is relevant for HIPAA or any other regulations, then routes it to the appropriate remediation team,” the CISO explains. “This automated process is much quicker and more reliable than we could have achieved before.” RESULTS As a next step, the organization plans to fully implement RSA DLP Endpoint to protect data on employees’ PCs. It is also looking into further integrating the DLP and RSA Archer solutions so that whenever DLP identifies a ‘dead’ file, it is automatically dealt with through a workflow held and managed within the RSA Archer eGRC Suite. “We’re also very excited about the possibility of integrating RSA Archer and DLP with RSA NetWitness® to add even more value to the organization and make our Security Operations Center and risk-management workflows even more effective,” says the CISO. page 2 Despite its big plans for future developments, the agency is already able to point to some significant benefits from its new risk-governance model. “The two solutions work very well together. DLP identifies the risks, and RSA Archer puts the business context around them,” the CISO reflects. “This has led to an overall increase in the understanding of risk by all stakeholders within the organization – the IT analysts, senior management, and our thousands of business users. By being able to show specific risks and their implications for the organization to individual employees and management, we’ve succeeded in getting everyone to take their role in risk mitigation seriously.” CONTACT US To learn more about how RSA products, services, and solutions help solve your business and IT challenges contact your local representative or authorized reseller – or visit us at www.emc.com/rsa. www.emc.com/rsa ©2012 EMC Corporation. All rights reserved. EMC, the EMC logo, RSA, the RSA logo, Archer, and NetWitness are the property of EMC Corporation in the United States and/or other countries. All other trademarks referenced are the property of their respective owners. STATEGOV CP 0113 TIVIT Brazilian IT Outsourcing Company Reinforces Security Compliance with RSA AT-A-GLANCE Key Requirements –– Reinforce the security of internal data and remote access processes –– Ensure compliance with industry standards, such as those set by the PCI DSS –– Extend use of flexible, remote working among employees Solution –– R SA® Data Loss Prevention Network identifies and protects sensitive and regulated data being sent out of the organization via email and other network traffic –– R SA SecurID® delivers two-factor authentication to enhance security when employees access systems remotely –– Local RSA Professional Services team provided tailored support, with deployment completed in just three days Results –– More insight and control over the security of sensitive data leaving the network –– Able to demonstrate full compliance with security standards to customers in any industry –– Enhanced expertise in IT security, with this incorporated into service portfolio CUSTOMER PROFILE “Implementing RSA Data Loss Prevention and RSA SecurID has helped us accelerate our efforts towards ensuring compliance with our customers’ security demands and regulations, such as PCI DSS. As well as ensuring our own operations are secure, this provides extra reassurance to our clients and partners, many of whom operate in industries where these regulations apply.” SELMA APARECIDA MALAGUTI AGUILERA, CORPORATE IT AND COMPLIANCE, TIVIT Based in Sao Paulo, TIVIT provides integrated IT, application systems, and business process outsourcing (BPO) services to clients in Brazil and the rest of the world. With an extensive portfolio of services and a consultative approach to assisting clients, it delivers solutions to organizations in the finance, manufacturing, healthcare, professional services, and utilities sectors. KEY REQUIREMENTS IT security is a key concern for TIVIT and its clients, many of whom operate in industries where specific data protection regulations, such as the Payment Card Industry Data Security Standard (PCI DSS) apply. With this in mind, TIVIT is committed to enhancing its internal systems and working environment to ensure full compliance with regulatory requirements. As part of its efforts, it identified the need for enhanced insight into the information that was being shared on its network to help identify potential risks more readily. In addition, as a client-centric organization, TIVIT aimed to enhance its employees’ ability to work flexibly on-site at clients’ offices. It wanted to further secure the process of establishing a remote connection to its servers by introducing multi-factor authentication. Selma Aparecida Malaguti Aguilera from TIVIT’s Corporate IT and Compliance department explains: “As an organization, we understand the need for a comprehensive approach to ensuring the security of our operations, taking into account the IT systems used to access and share data, the behavior of our employees when handling sensitive information, and how good practices are enforced. The work we do has a fundamental impact on the IT security of our clients’ organizations. It is crucial, therefore, to ensure the thoroughness of our own approach to data protection.” SOLUTION After assessing network-monitoring solutions from RSA and its competitors, TIVIT commissioned Proof-of-Concept (PoC) trials of RSA Data Loss Prevention (DLP) Network and a competitor’s offering to better determine their suitability for its requirements. It also undertook a broader evaluation of the overall strength of their security offerings. “With the security solutions in place, we are in a better position both to serve our existing clients and pursue new business opportunities. Demonstrating the strength of our internal security measures has enhanced our reputation as an IT partner, and the development of our relationship with RSA offers the potential for us to develop related services in the future.” SELMA APARECIDA MALAGUTI AGUILERA, CORPORATE IT AND COMPLIANCE, TIVIT Following its evaluation, TIVIT chose to implement RSA DLP, based on its performance during the PoC and taking into account the strength of RSA’s full product range and its broader position within the security marketplace. In particular, TIVIT selected RSA for its proven experience of deploying DLP globally and the better cost-benefit ratio it offered. TIVIT enlisted the support of a local RSA Professional Services team to support the deployment. This proceeded smoothly, taking just three days to roll the solution out to about 3,000 users across the company’s network. It also deployed 1,300 RSA SecurID hardware tokens to enhance the log-in process for employees when accessing its systems remotely or connecting to its wireless network. As part of its support for the project, the RSA team helped ensure that TIVIT was fully briefed on how to use the new solutions. It conducted knowledge-transfer sessions with specialists at the company, enabling them to share their learnings within the organization. RESULTS Following the implementation, TIVIT is able to maintain a much stronger position on security and compliance. By using RSA DLP Network to provide full visibility into the information that is sent across its network, it is easier for administrators to identify potential data-protection risks and enforce security best practices among employees. For example, DLP can highlight if a user is detected sharing unencrypted financial or personally identifiable information, allowing administrators to take corrective action if necessary. TIVIT has used DLP to create security rules to identify sensitive internal data, such as credit card numbers and data which is covered by TIVIT´s classified-information policy, and improve the way this is handled. CONTACT US To learn more about how RSA products, services, and solutions help solve your business and IT challenges contact your local representative or authorized reseller – or visit us at www.emc.com/rsa. With a greater understanding of how its network is used, TIVIT can develop more effective security policies and provide more targeted advice to users on how to ensure information is kept safe. In the event of an incident, DLP allows TIVIT’s administrators to take control of the situation faster and quickly identify any issues that need to be resolved. By using RSA SecurID to enhance security when employees connect to its network, TIVIT has further minimized the risk of sensitive information being accessed without permission. The deployment has reinforced its compliance with data-security regulations such as the PCI DSS. Aguilera comments: “With the DLP and SecurID solutions in place, we are more confident than ever that the data on our systems is secure. By deploying these technologies, we’ve been able to send a clear message to our clients and partners that we take the security of our information seriously and share their priorities when it comes to ensuring compliance with industry data-protection requirements.” As well as enhancing TIVIT’s reputation among its client base, the success of the relationship with RSA has also presented an opportunity to potentially add security services to its offering. With the security of its own systems ensured, TIVIT is now considering partnering with RSA to further extend the benefits of RSA solutions to its clients. www.emc.com/rsa ©2012 EMC Corporation. All rights reserved. EMC, the EMC logo, RSA, the RSA logo, and SecurID are trademarks or registered trademarks of EMC Corporation in the United States and/or other countries. All other trademarks referenced are the property of their respective owners. TIVIT CP 0312 U.S.-BASED FEDERAL AGENCY Federal agency establishes comprehensive protection for sensitive data with RSA solution suite AT-A-GLANCE Key Requirements –– The agency needed a means of accurately identifying data-security risks –– It aimed to put in place effective tools for managing and responding to alerts, in accordance with existing policies –– It wanted to control access to data in web applications as well as standalone files Solution –– R SA® Data Loss Prevention (DLP) supports real-time, automated identification and alerting of vulnerable information, with high accuracy –– RSA Archer® supports organizational response and planning around data security with powerful management and reporting tools –– RSA Access Manager provides a central point for authorizing single sign-in access to RSA DLP and RSA Archer Results –– All three RSA solutions work in conjunction to support the identification, tracking, management, and prevention of data-security risks –– RSA DLP provides real-time insights into risk across the organization, with customized, automated responses and reporting, which reduces admin overhead –– RSA Archer provides a single dashboard for detailed tracking of specific incidents, through to providing global insight into security trends CUSTOMER PROFILE “It was important that the tools to support this federal agency’s datasecurity efforts could be adapted to meet the complex needs of the organization, and that it could trust them to provide consistently accurate and effective protection. The close integration among RSA’s solutions is a unique, industry-leading approach to identifying, managing, and responding to data-security risks.” BRIAN KAFENBAUM, MANAGING PARTNER, PHOENIX DATA SECURITY This U.S.-based federal agency has extensive operations across the country, with local teams supported by central management. As with other government organizations, the agency prioritizes the security of employee data, including personally identifiable information (PII), and must ensure it meets the requirements of a number of data-protection regulations. Given the complexity of its operations, it is important that both local and central teams have accurate insight into the organization’s security position and the tools to effectively manage the resources devoted to support this. KEY REQUIREMENTS This federal agency was looking to replace its existing legacy data loss prevention system after experiencing several operational, technical and compliance challenges; including false positive rates, manual reporting and lack of user certificate authentication. Besides having a more accurate solution to monitor and alert security personnel to potentially vulnerable data, such as unencrypted PII, the agency aimed to put in place a framework of tools to assist staff at all levels to respond effectively to incidents and gain a better insight into the data-protection issues facing the organization. The agency had already established a range of security policies, and it was important that these tools could be adapted to work within its existing procedures, avoiding the high cost and inconvenience incurred if staff needed to change their working processes to fit with the technology. The agency worked with Phoenix Data Security, its long-standing advisor on IT-security planning, to determine the solutions that could best support its requirements. Brian Kafenbaum, Managing Partner at Phoenix, explains its objectives: “The complexity of the agency’s operations required a solution that could seamlessly support the efforts of security and management staff across the entire organization. The volume of potential risks that the staff needs to manage meant that support from automated processes was key to an efficient, coordinated approach.” SOLUTION The agency decided to implement an integrated selection of three solutions from RSA – The Security Division of EMC – based on the advanced level of maturity demonstrated by RSA’s offering, which the agency saw as leading the rest of the industry. Kafenbaum adds: “The agency was also reassured by the close integration among all three RSA solutions, and their ability to work in concert to support an efficient and effective response to the challenge of protecting sensitive data.” “The reliability of RSA DLP makes it possible for security staff to set automated response protocols for certain types of alerts. This will help reduce admin overheads by reducing the need to manually respond to incidents. RSA DLP’s automated reporting capabilities have also enabled the organization to reduce the resources it previously had to devote to manually producing reports, helping reduce costs. Reports can now be run in real-time, rather than on a monthly basis.” BRIAN KAFENBAUM, MANAGING PARTNER, PHOENIX DATA SECURITY CONTACT US To learn more about how RSA products, services, and solutions help solve your business and IT challenges contact your local representative or authorized reseller – or visit us at www.emc.com/rsa. The organization purchased RSA DLP Datacenter, Network, and Endpoint and began a phased roll-out starting with the Datacenter module, with Phoenix Data Security supporting the deployment. As part of this, Phoenix worked with technical experts from RSA Professional Services to fast track the project integration with a custom RSA Archer application modeled on the agency’s existing internal business processes. With the integration, the insights and alerts created within RSA DLP are automatically channeled into RSA Archer to support an effective management response. As the primary management tool for the intelligence generated by RSA DLP, RSA Archer has been rolled out to both general and security managers across the organization. Besides providing an all-in-one platform for tracking and responding to individual incidents, this also supports resourcing and top-level business decisions by providing managers with real-time insights into security trends and projects that staff are currently working on. To ensure consistency and control over what information can be accessed through software applications, the agency also deployed RSA Access Manager. This provides a single portal for authorizing access to RSA DLP and RSA Archer, supporting the Common Access Cards (CACs) that employees require to gain access to computers and applications. RESULTS With RSA DLP, staff now have powerful tools for identifying and resolving potential risk points where confidential data or PII may be exposed, such as in departmental file shares or Microsoft SharePoint Enterprise, where sensitive information types are not authorized to reside. The security team has also used these insights to improve staff training and development. A key benefit over the agency’s previous solution is the accuracy of RSA DLP, which operates with a lower than five percent false positive rate. Kafenbaum comments: “The reliability of RSA DLP makes it possible for security staff to set automated response protocols for certain types of alerts. This will help reduce admin overheads by reducing the need to manually respond to incidents. RSA DLP’s automated reporting capabilities have also enabled the organization to reduce the resources it previously had to devote to manually producing reports, helping reduce costs. Reports can now be run in real-time, rather than on a monthly basis.” Besides protecting standalone files with RSA DLP, the agency uses RSA Access Manager to enable a single sign-in process for RSA DLP and RSA Archer, reinforcing the two-factor CAC-based authentication it already has in place to secure computer terminals. RSA Archer is used by security personnel to effectively respond to the risk alerts generated by RSA DLP. The adaptability of the solution has allowed the security team to map the response process on the organization’s established security policies, ensuring it is consistent and familiar to staff. RSA Archer is also used by managers around the agency to gain an up-to-date insight into security trends affecting the organization and how these are being responded to. This supports more effective decision-making around security planning, policy development, and resourcing issues. www.emc.com/rsa ©2013 EMC Corporation. All rights reserved. EMC, the EMC logo, RSA, the RSA logo, and Archer are the property of EMC Corporation in the United States and/or other countries. All other trademarks referenced are the property of their respective owners. h11838 USFED CP 0513 H12158