1 / 13

Colin Robbins Chief Technology Officer

Sharing Sensitive Data Is No Longer A Choice. The ability to share ?security' related information across Government departments lies at the heart of the National Security StrategiesAt the strategic level of Military command, data sharing enables better cross-government planning and more effective

callia
Télécharger la présentation

Colin Robbins Chief Technology Officer

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


    1. Colin Robbins Chief Technology Officer The Microsoft Forefront UAG (Unified Access Gateway) provides a general framework to allow authenticated remote clients to securely access application data behind a corporate firewall over a web connection. Nexor Watchman for UAG is a filter that plugs into Microsoft Forefront UAG to enhance the security model by scanning data returned in a web request to check it is conformant to a security policy. This presentation will describe and demonstrate how this solution can be used in defence environments to enable the sharing of confidential data between domains in both traditional web client / server models and cloud environments, while maintain control to help prevent WikiLeaks. The Microsoft Forefront UAG (Unified Access Gateway) provides a general framework to allow authenticated remote clients to securely access application data behind a corporate firewall over a web connection. Nexor Watchman for UAG is a filter that plugs into Microsoft Forefront UAG to enhance the security model by scanning data returned in a web request to check it is conformant to a security policy. This presentation will describe and demonstrate how this solution can be used in defence environments to enable the sharing of confidential data between domains in both traditional web client / server models and cloud environments, while maintain control to help prevent WikiLeaks.

    2. Sharing Sensitive Data Is No Longer A Choice The ability to share ‘security’ related information across Government departments lies at the heart of the National Security Strategies At the strategic level of Military command, data sharing enables better cross-government planning and more effective management and direction of campaigns At a tactical level, data sharing facilitates collaborative planning and assists all echelons to achieve situational awareness; the key to effective decision making  But insecure sharing can have consequences…

    4. Causes of Data Loss Defending 1 is about defense in depth and knowing your network. Nexor is undertaking some ground breaking research in this area, but this is a story for another day. Today, we are focusing on helping prevent accidents and trying to stop the malicious, but not hi-tec attacks leaks. If you not protected from the script kiddy, fire your IT security people.Defending 1 is about defense in depth and knowing your network. Nexor is undertaking some ground breaking research in this area, but this is a story for another day. Today, we are focusing on helping prevent accidents and trying to stop the malicious, but not hi-tec attacks leaks. If you not protected from the script kiddy, fire your IT security people.

    5. Prevention All about People / Process / Technology (Product) This community has good process, and good training for people, so technology in a good position to help.All about People / Process / Technology (Product) This community has good process, and good training for people, so technology in a good position to help.

    6. What Is Data Guarding? Ensuring the secure transfer of appropriate data between separate networks Key part of a DLP solution, but additionally: Data at Rest Discovery Client technologies Encryption technologies One specific bit of technology…One specific bit of technology…

    7. Architectural Model Open model applies to any data transfers: Email File transfer Copy to USB stick Mobile access device Printer Web services

    8. Nexor Watchman for UAG Microsoft Forefront Unified Access Gateway: Allows access based on authentication and application authorization models The addition of Nexor Watchman: Enables access based on document content Enables access based on document protective marking Controls access based on network location

    9. Video Demonstration

    10. Protecting the Cloud

    11. Cloud Protection (simplified model) Stress “simplified model” – fully expect classified network will be separated into several sub-components, firewalls etc.Stress “simplified model” – fully expect classified network will be separated into several sub-components, firewalls etc.

    12. Summary Data Loss Prevention is multi-faceted This community is well placed to protect itself: Robust policy and procedures This enables technology solutions: Demonstrated technology can be used to protect classified asserts, while enabling data sharing for legitimate business purposes

More Related