SlideShare a Scribd company logo
Customer Spotlight:
Deploying a Data Protection Program
in less than 120 Days
Michael Ring, Jabil
Mark Stevens, Digital Guardian
Agenda
 Introduction
 Deploying a Data Protection Program in < 120 Days
• Mike Ring, Jabil
 Digital Guardian Overview
• Mark Stevens, Digital Guardian
 Live Q&A with Mike and Mark
About Mike Ring
 Senior IT Manager, Threat and
Solution Architect
 15 years’ experience in InfoSec
Jabil
 Global manufacturing services company
 180,000+ employees
 90 plants in 23 countries
 $17.2B revenue in 2013
Proven Manufacturing Solutions
Global Expertise. Intelligent Supply Chain Design.
Jabil’s Security Situation
 Data protection was in catch up mode
 Lacked basic processes
 “IP could be anything”
 Security could be a competitive advantage
Jabil’s IT Environment
 Cloud-based IT environment since 2010
 No standardization
 Had budget but not headcount to accelerate
security maturity
Security Objectives
 52,000 devices at one level of security,
needed to get to higher level
 Protect:
• IP: Jabil’s and customers’
• Pricing data
• Employee data
 Quickly build a program focused on agility
and collaboration
Jabil’s Solution
 Three key security technologies
• Web Proxy
• Single Sign-on
• Data Protection
 Had to be 100% managed service
Web
Proxy
SSO
Data Protection
Why DG Managed Security Program
 InfoSec can govern, not administer
 Unique context-awareness
 Capabilities beyond just DLP
 Very fast ramp
 Time to value
Getting the CIO on Board
 Prior successful rapid deployments
 Application usage collection was major value-add
 Able to reconcile license usage and reduce costs
Implementing Digital Guardian
 3,000 agents deployed in dev environment
 49,000 agents deployed next
May June July August
Initial
Engagement
3,000
Agents Deployed
in Development
49,000
Agents Deployed
in Monitor Mode
Fast Forward Framework
Results
 Gained immediate visibility into all data access and usage
 Saw data getting copied to USB drives
 Used egress reports to drive adoption
What’s Next?
 Using visibility to drive classification and policy making
 Transition to operational plan
 Roll out DG controls to mitigate top data risks
 DG for advanced threat detection and forensic analysis
About Mark Stevens
 VP, Global Services & Support
 Driving customer success
 20 year tech industry veteran
• IBM, BMC, Progress, Lotus
Data-Centric Security Recap
“In this new reality, traditional perimeter-based approaches to
security are insufficient. S&R pros must take a data-centric approach
that ensures security travels with the data regardless of user
population, location, or even hosting model.”
The Future Of Data Security: A Zero Trust Approach
John Kindervag, Heidi Shey, and Kelley Mak, June 5, 2014
Confidential 14
Data Security That Starts at the Source
15
Patented, Proven Endpoint Agent
16
Automatic Sensitive Data Classification
17
STOP Data Theft From Insiders and Outsiders
18
Protect Your Data From Insider Threats
Confidential 19
Protect Your Data for the Best Defense from
Outsider Threats
Confidential 20
Flexible Deployment Models
Confidential 21
 Infrastructure hosted in your
environment
 Self-administration
 Policies, rules and reports
managed by you
 Engage with Digital Guardian
Pro Services as needed
 Infrastructure hosted in Digital
Guardian private cloud
 Administered by Digital
Guardian Pro Services
 Access to policies, rules, and
reports
 Weekly status meetings
 Infrastructure hosted in your
environment
 Administered remotely by
Digital Guardian Pro Services
 Data remains within your IT
environment
Option 1
On Premise
Option 2
Managed Service
Option 3
Hybrid
Managed Service On Premise
“By selecting the managed service deployment option, we were able to be up and running in a matter of weeks. The
added visibility into how our confidential data is being used is invaluable.”
CISO, Regional Bank
22
23
24
Questions?
Interested in learning more about
Jabil’s data protection program?
Watch the webinar on demand:
http://bit.ly/1yCK9cT

More Related Content

PPTX
The CISO’s Guide to Data Loss Prevention
Digital Guardian
 
PPT
How Network Data Loss Prevention is Implemented
Jerry Paul Acosta
 
PDF
McAfee Total Protection for Data Loss Prevention (DLP)
Trustmarque
 
PPT
Shariyaz abdeen data leakage prevention presentation
Shariyaz Abdeen
 
PDF
The Definitive Guide to Data Loss Prevention
Digital Guardian
 
PPT
DLP
saurabh.sood
 
PPTX
Data Loss Prevention from Symantec
Arrow ECS UK
 
PDF
Be Aware Webinar Symantec-Maxímice su prevención hacia la fuga de la información
Symantec LATAM
 
The CISO’s Guide to Data Loss Prevention
Digital Guardian
 
How Network Data Loss Prevention is Implemented
Jerry Paul Acosta
 
McAfee Total Protection for Data Loss Prevention (DLP)
Trustmarque
 
Shariyaz abdeen data leakage prevention presentation
Shariyaz Abdeen
 
The Definitive Guide to Data Loss Prevention
Digital Guardian
 
Data Loss Prevention from Symantec
Arrow ECS UK
 
Be Aware Webinar Symantec-Maxímice su prevención hacia la fuga de la información
Symantec LATAM
 

What's hot (20)

PDF
Symantec Data Loss Prevention 11
Symantec
 
PPTX
Data Security: Why You Need Data Loss Prevention & How to Justify It
Marc Crudgington, MBA
 
PDF
Data Leakage Prevention (DLP)
Network Intelligence India
 
PPT
Data Leakage Presentation
Mike Spaulding
 
PPTX
Symantec Data Loss Prevention 9
Ariel Martin Beliera
 
PPTX
Information Leakage & DLP
Yun Lu
 
PDF
Dlp notes
anuepcet
 
PPTX
Data Leakage Prevention
Dhananjay Aloorkar
 
PPTX
The 3 Phased Approach to Data Leakage Prevention (DLP)
Kirsty Donovan
 
PDF
DLP Executive Overview
Kim Jensen
 
PPT
5 Myths About Data Loss Prevention
Gary Bahadur
 
PDF
ISSA DLP Presentation - Oxford Consulting Group
aengelbert
 
PPTX
Information and Identity Protection - Data Loss Prevention, Encryption, User ...
Symantec APJ
 
PPTX
Data Loss Prevention
dj1arry
 
PPT
apsec 7 Golden Rules Data Leakage Prevention / DLP
andreasschuster
 
DOCX
Symantec Data Loss Prevention - Technical Proposal (General)
Iftikhar Ali Iqbal
 
PDF
Symantec DLP for Tablet
Symantec
 
PPTX
Enterprise API Security & Data Loss Prevention - Intel
Intel - API Security & Tokenization
 
PPTX
Alex Hanway - Securing the Breach: Using a Holistic Data Protection Framework
centralohioissa
 
PPTX
Big Data Security Analytics (BDSA) with Randy Franklin
Sridhar Karnam
 
Symantec Data Loss Prevention 11
Symantec
 
Data Security: Why You Need Data Loss Prevention & How to Justify It
Marc Crudgington, MBA
 
Data Leakage Prevention (DLP)
Network Intelligence India
 
Data Leakage Presentation
Mike Spaulding
 
Symantec Data Loss Prevention 9
Ariel Martin Beliera
 
Information Leakage & DLP
Yun Lu
 
Dlp notes
anuepcet
 
Data Leakage Prevention
Dhananjay Aloorkar
 
The 3 Phased Approach to Data Leakage Prevention (DLP)
Kirsty Donovan
 
DLP Executive Overview
Kim Jensen
 
5 Myths About Data Loss Prevention
Gary Bahadur
 
ISSA DLP Presentation - Oxford Consulting Group
aengelbert
 
Information and Identity Protection - Data Loss Prevention, Encryption, User ...
Symantec APJ
 
Data Loss Prevention
dj1arry
 
apsec 7 Golden Rules Data Leakage Prevention / DLP
andreasschuster
 
Symantec Data Loss Prevention - Technical Proposal (General)
Iftikhar Ali Iqbal
 
Symantec DLP for Tablet
Symantec
 
Enterprise API Security & Data Loss Prevention - Intel
Intel - API Security & Tokenization
 
Alex Hanway - Securing the Breach: Using a Holistic Data Protection Framework
centralohioissa
 
Big Data Security Analytics (BDSA) with Randy Franklin
Sridhar Karnam
 
Ad

Similar to Customer Spotlight: Deploying a Data Protection Program in less than 120 Days (20)

PDF
05.05.2021-webinar-presentation-experts-series-How-to-Switch-to-a-Better-DLP.pdf
ngvson
 
PPTX
DG_Architecture_Training.pptx
TranVu383073
 
PDF
A data-centric program
at MicroFocus Italy ❖✔
 
PPTX
UNCOVER DATA SECURITY BLIND SPOTS IN YOUR CLOUD, BIG DATA & DEVOPS ENVIRONMENT
Ulf Mattsson
 
PDF
Trust in a Digital World
itnewsafrica
 
PDF
IBM Security - 2015 - Client References Guide
Francisco González Jiménez
 
PDF
Encrypt-Everything-eB.pdf
alexguzman510050
 
PPTX
ISACA Houston - Practical data privacy and de-identification techniques
Ulf Mattsson
 
PDF
Understanding Data Loss Prevention
Raid Data Recovery
 
PDF
Best Practices for Implementing Data Loss Prevention (DLP)
Sarfaraz Chougule
 
PPT
Arrow ECS IBM Partner Jam - Security Update - Vicki Cooper - IBM
Arrow ECS UK
 
PDF
Emerging Trends in Information Security and Privacy
lgcdcpas
 
PDF
Symantec Webinar Part 1 of 6 The Four Stages of GDPR Readiness
Symantec
 
PDF
Engineered Systems - nejlepší cesta, jak zabezpečit váš dataAccelerate Cloud
MarketingArrowECS_CZ
 
PPTX
Webinar - Case Study: ProtectWise enhances network security with DataStax alw...
DataStax
 
PDF
MT50 Data is the new currency: Protect it!
Dell EMC World
 
PDF
Delivering Modern Data Protection for VMware Environments
Paula Koziol
 
PDF
finalreportsoarnew (1).pdf
Firozkumar2
 
PDF
finalreportsoarnew.pdf
Firozkumar2
 
PDF
Eyes Wide Shut: Cybersecurity Smoke & Mirrors...
STASH | Datacentric Security
 
05.05.2021-webinar-presentation-experts-series-How-to-Switch-to-a-Better-DLP.pdf
ngvson
 
DG_Architecture_Training.pptx
TranVu383073
 
A data-centric program
at MicroFocus Italy ❖✔
 
UNCOVER DATA SECURITY BLIND SPOTS IN YOUR CLOUD, BIG DATA & DEVOPS ENVIRONMENT
Ulf Mattsson
 
Trust in a Digital World
itnewsafrica
 
IBM Security - 2015 - Client References Guide
Francisco González Jiménez
 
Encrypt-Everything-eB.pdf
alexguzman510050
 
ISACA Houston - Practical data privacy and de-identification techniques
Ulf Mattsson
 
Understanding Data Loss Prevention
Raid Data Recovery
 
Best Practices for Implementing Data Loss Prevention (DLP)
Sarfaraz Chougule
 
Arrow ECS IBM Partner Jam - Security Update - Vicki Cooper - IBM
Arrow ECS UK
 
Emerging Trends in Information Security and Privacy
lgcdcpas
 
Symantec Webinar Part 1 of 6 The Four Stages of GDPR Readiness
Symantec
 
Engineered Systems - nejlepší cesta, jak zabezpečit váš dataAccelerate Cloud
MarketingArrowECS_CZ
 
Webinar - Case Study: ProtectWise enhances network security with DataStax alw...
DataStax
 
MT50 Data is the new currency: Protect it!
Dell EMC World
 
Delivering Modern Data Protection for VMware Environments
Paula Koziol
 
finalreportsoarnew (1).pdf
Firozkumar2
 
finalreportsoarnew.pdf
Firozkumar2
 
Eyes Wide Shut: Cybersecurity Smoke & Mirrors...
STASH | Datacentric Security
 
Ad

Recently uploaded (20)

PDF
Test Bank, Solutions for Java How to Program, An Objects-Natural Approach, 12...
famaw19526
 
PPTX
ChatGPT's Deck on The Enduring Legacy of Fax Machines
Greg Swan
 
PDF
solutions_manual_-_materials___processing_in_manufacturing__demargo_.pdf
AbdullahSani29
 
PDF
How-Cloud-Computing-Impacts-Businesses-in-2025-and-Beyond.pdf
Artjoker Software Development Company
 
PDF
This slide provides an overview Technology
mineshkharadi333
 
PDF
The Evolution of KM Roles (Presented at Knowledge Summit Dublin 2025)
Enterprise Knowledge
 
PDF
Enable Enterprise-Ready Security on IBM i Systems.pdf
Precisely
 
PDF
BLW VOCATIONAL TRAINING SUMMER INTERNSHIP REPORT
codernjn73
 
PDF
Why Your AI & Cybersecurity Hiring Still Misses the Mark in 2025
Virtual Employee Pvt. Ltd.
 
PDF
Security features in Dell, HP, and Lenovo PC systems: A research-based compar...
Principled Technologies
 
PPTX
Comunidade Salesforce São Paulo - Desmistificando o Omnistudio (Vlocity)
Francisco Vieira Júnior
 
PDF
agentic-ai-and-the-future-of-autonomous-systems.pdf
siddharthnetsavvies
 
PDF
Event Presentation Google Cloud Next Extended 2025
minhtrietgect
 
PDF
Shreyas_Phanse_Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
SHREYAS PHANSE
 
PDF
AI Unleashed - Shaping the Future -Starting Today - AIOUG Yatra 2025 - For Co...
Sandesh Rao
 
PDF
Revolutionize Operations with Intelligent IoT Monitoring and Control
Rejig Digital
 
PDF
Google I/O Extended 2025 Baku - all ppts
HusseinMalikMammadli
 
PDF
Using Anchore and DefectDojo to Stand Up Your DevSecOps Function
Anchore
 
PDF
Building High-Performance Oracle Teams: Strategic Staffing for Database Manag...
SMACT Works
 
PPTX
The-Ethical-Hackers-Imperative-Safeguarding-the-Digital-Frontier.pptx
sujalchauhan1305
 
Test Bank, Solutions for Java How to Program, An Objects-Natural Approach, 12...
famaw19526
 
ChatGPT's Deck on The Enduring Legacy of Fax Machines
Greg Swan
 
solutions_manual_-_materials___processing_in_manufacturing__demargo_.pdf
AbdullahSani29
 
How-Cloud-Computing-Impacts-Businesses-in-2025-and-Beyond.pdf
Artjoker Software Development Company
 
This slide provides an overview Technology
mineshkharadi333
 
The Evolution of KM Roles (Presented at Knowledge Summit Dublin 2025)
Enterprise Knowledge
 
Enable Enterprise-Ready Security on IBM i Systems.pdf
Precisely
 
BLW VOCATIONAL TRAINING SUMMER INTERNSHIP REPORT
codernjn73
 
Why Your AI & Cybersecurity Hiring Still Misses the Mark in 2025
Virtual Employee Pvt. Ltd.
 
Security features in Dell, HP, and Lenovo PC systems: A research-based compar...
Principled Technologies
 
Comunidade Salesforce São Paulo - Desmistificando o Omnistudio (Vlocity)
Francisco Vieira Júnior
 
agentic-ai-and-the-future-of-autonomous-systems.pdf
siddharthnetsavvies
 
Event Presentation Google Cloud Next Extended 2025
minhtrietgect
 
Shreyas_Phanse_Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
SHREYAS PHANSE
 
AI Unleashed - Shaping the Future -Starting Today - AIOUG Yatra 2025 - For Co...
Sandesh Rao
 
Revolutionize Operations with Intelligent IoT Monitoring and Control
Rejig Digital
 
Google I/O Extended 2025 Baku - all ppts
HusseinMalikMammadli
 
Using Anchore and DefectDojo to Stand Up Your DevSecOps Function
Anchore
 
Building High-Performance Oracle Teams: Strategic Staffing for Database Manag...
SMACT Works
 
The-Ethical-Hackers-Imperative-Safeguarding-the-Digital-Frontier.pptx
sujalchauhan1305
 

Customer Spotlight: Deploying a Data Protection Program in less than 120 Days

  • 1. Customer Spotlight: Deploying a Data Protection Program in less than 120 Days Michael Ring, Jabil Mark Stevens, Digital Guardian
  • 2. Agenda  Introduction  Deploying a Data Protection Program in < 120 Days • Mike Ring, Jabil  Digital Guardian Overview • Mark Stevens, Digital Guardian  Live Q&A with Mike and Mark
  • 3. About Mike Ring  Senior IT Manager, Threat and Solution Architect  15 years’ experience in InfoSec
  • 4. Jabil  Global manufacturing services company  180,000+ employees  90 plants in 23 countries  $17.2B revenue in 2013 Proven Manufacturing Solutions Global Expertise. Intelligent Supply Chain Design.
  • 5. Jabil’s Security Situation  Data protection was in catch up mode  Lacked basic processes  “IP could be anything”  Security could be a competitive advantage
  • 6. Jabil’s IT Environment  Cloud-based IT environment since 2010  No standardization  Had budget but not headcount to accelerate security maturity
  • 7. Security Objectives  52,000 devices at one level of security, needed to get to higher level  Protect: • IP: Jabil’s and customers’ • Pricing data • Employee data  Quickly build a program focused on agility and collaboration
  • 8. Jabil’s Solution  Three key security technologies • Web Proxy • Single Sign-on • Data Protection  Had to be 100% managed service Web Proxy SSO Data Protection
  • 9. Why DG Managed Security Program  InfoSec can govern, not administer  Unique context-awareness  Capabilities beyond just DLP  Very fast ramp  Time to value
  • 10. Getting the CIO on Board  Prior successful rapid deployments  Application usage collection was major value-add  Able to reconcile license usage and reduce costs
  • 11. Implementing Digital Guardian  3,000 agents deployed in dev environment  49,000 agents deployed next May June July August Initial Engagement 3,000 Agents Deployed in Development 49,000 Agents Deployed in Monitor Mode Fast Forward Framework
  • 12. Results  Gained immediate visibility into all data access and usage  Saw data getting copied to USB drives  Used egress reports to drive adoption
  • 13. What’s Next?  Using visibility to drive classification and policy making  Transition to operational plan  Roll out DG controls to mitigate top data risks  DG for advanced threat detection and forensic analysis
  • 14. About Mark Stevens  VP, Global Services & Support  Driving customer success  20 year tech industry veteran • IBM, BMC, Progress, Lotus
  • 15. Data-Centric Security Recap “In this new reality, traditional perimeter-based approaches to security are insufficient. S&R pros must take a data-centric approach that ensures security travels with the data regardless of user population, location, or even hosting model.” The Future Of Data Security: A Zero Trust Approach John Kindervag, Heidi Shey, and Kelley Mak, June 5, 2014 Confidential 14
  • 16. Data Security That Starts at the Source 15
  • 18. Automatic Sensitive Data Classification 17
  • 19. STOP Data Theft From Insiders and Outsiders 18
  • 20. Protect Your Data From Insider Threats Confidential 19
  • 21. Protect Your Data for the Best Defense from Outsider Threats Confidential 20
  • 22. Flexible Deployment Models Confidential 21  Infrastructure hosted in your environment  Self-administration  Policies, rules and reports managed by you  Engage with Digital Guardian Pro Services as needed  Infrastructure hosted in Digital Guardian private cloud  Administered by Digital Guardian Pro Services  Access to policies, rules, and reports  Weekly status meetings  Infrastructure hosted in your environment  Administered remotely by Digital Guardian Pro Services  Data remains within your IT environment Option 1 On Premise Option 2 Managed Service Option 3 Hybrid Managed Service On Premise “By selecting the managed service deployment option, we were able to be up and running in a matter of weeks. The added visibility into how our confidential data is being used is invaluable.” CISO, Regional Bank
  • 23. 22
  • 24. 23
  • 25. 24
  • 27. Interested in learning more about Jabil’s data protection program? Watch the webinar on demand: http://bit.ly/1yCK9cT