Vericept Edge Product Overview - PowerPoint PPT Presentation

1 / 17
About This Presentation
Title:

Vericept Edge Product Overview

Description:

Vericept Edge Product Overview – PowerPoint PPT presentation

Number of Views:32
Avg rating:3.0/5.0
Slides: 18
Provided by: kgre6
Category:

less

Transcript and Presenter's Notes

Title: Vericept Edge Product Overview


1
Vericept Edge Product Overview
Prevent Data Leakage on User Endpoints
Paul Pilotte Product Management Marketing
Manager Vericept Corporation ppilotte_at_vericept.com
617.460.7610
2
Data Leakage Risks at the Edge
3
Vericept Edge Addresses
4
Vericept Edge Addresses
5
Vericept Edge Product Overview
  • Find Identify IP Sensitive Data
  • Control Device Usage
  • - by system, user, device
  • - allow only encrypted USB drives
  • Enforce Content Policies for Access Saving to
  • - USB drives, CDs, DVDs, iPods
  • Windows XP 2000
  • Monitoring policy actions enforced when
    disconnected from the network

Administration Policy Mgmt Reporting
Vericept Edge Web Portal
Vericept Edge Server
Laptops
Desktops
Vericept Edge Client
USB Media Drives iPod
6
Define Sensitive Data
Define Sensitive Data
Enforce Control Compliance
Identify Sensitive Data
Compliance Customer Employee Data
  • Same high accuracy DLP categories used for
    Monitor, Discover, Protect
  • Customize for unstructured content important to
    your businesses

7
Identify Sensitive Data
Define Sensitive Data
Enforce Control Compliance
Identify Sensitive Data
Content Detection Suite
Exact Data Match
Full Partial Document Match
Contextual Linguistics
Rules RegEx Keywords
Concept Modeling
Topical Classifiers
Data Identification Methods

Data
Information

Un-Structured Data
Structured Data
  • Identify presence and movement of sensitive data
  • Identify leaky business processes

8
Enforce with Device Control
Define Sensitive Data
Enforce Control Compliance
Identify Sensitive Data
Policy Enforcement
  • Eliminate USB data leakage of IP customer data
  • Enforce corporate policies on media usage

9
Enforce with Content Control
Define Sensitive Data
Enforce Control Compliance
Identify Sensitive Data
Policy Enforcement
  • Enforce data-centric security policies

10
Business Process Integration
Define Sensitive Data
Enforce Control Compliance
Identify Sensitive Data
  • Select by category, group, open/save action
  • Customize alerts with html

11
Edge Policy Wizards
  • Flexible policy controls lowers cost burden of
    content enforcement
  • Tailor unique controls for each business unit or
    user group
  • Select appropriate control action for each
    content category
  • Easy to refine / update policy controls over time

by User Group
by Category
Policy action rules
12
Edge Dashboards
13
Edge Reports
  • Streamline reporting and content violation
    reviews
  • Dashboards Report modules customizable for
    flexibility
  • Extensive file metadata reported
  • Fast searching/sorting of violations with quick
    single-click sort

Date/Time
Filename
MD5 hash
Owner
Size
Path
Categories
14
Edge Event Tally Reports
  • Support Audit Process with event tally reports
  • Show content violations over time
  • Trends show if corrective actions are working to
    abate risks

Click to drill into detailed report
15
Edge Product Packaging
  • Edge-VIS Visibility Version
  • Content
  • Report on sensitive data stored on Windows
    PCs/laptops
  • Device
  • Track removable drive media usage
  • User
  • Track user logon/logoff
  • Edge-CON Controls Version
  • Device Control
  • Enforce controls on media/drive usage by system,
    user, group
  • Allow only protected USB devices to be used
  • Content-Aware Control
  • Enforce controls on content access saves
  • Flexible policy actions
  • Configurable alerts
  • Requires interoperability testing of
    customers PC image(s)

16
Vericept Edge Differentiators
  • Accurate Content Detection
  • Complete Data Detection Suite
  • Identify unstructured data leakage others miss
  • Customize Detection of your business IP
    content
  • Content Aware Blocking and Controls
  • Control access saves based on accurate content
    detection
  • Flexible policy controls
  • Customizable alerts justification
  • Device Controls Layer
  • Solution for USB data leakage problem
  • Configurable controls to permit USB access with
    auditing
  • Same Content Policies on Network Edge Solutions
  • Partnerships allowing customers to take action
  • Roadmap for classification driven file
    auto-encryption

17
Vericept Edge Product Overview Prevent Data
Leakage on User Endpoints
Boston Office Reservoir Place 1601 Trapelo
Road Suite 140 Waltham, MA 02451 Denver
Office 555 Seventeenth Street Suite 1500 Denver,
CO 80202
www.vericept.com
Write a Comment
User Comments (0)
About PowerShow.com