![Page 1: A Data-Centric Approach to Endpoint Security€¦ · on emerging market trends, company and product strategies, differentiated vendor messaging and positioning, and meeting enterprise](https://reader033.vdocument.in/reader033/viewer/2022060406/5f0f803b7e708231d4447980/html5/thumbnails/1.jpg)
A Data-Centric Approach to Endpoint Security
September 28, 2017
Eric Ogren Senior Analyst, Security 451 Research
Bill Bradley Director of Product Marketing Digital Guardian
![Page 2: A Data-Centric Approach to Endpoint Security€¦ · on emerging market trends, company and product strategies, differentiated vendor messaging and positioning, and meeting enterprise](https://reader033.vdocument.in/reader033/viewer/2022060406/5f0f803b7e708231d4447980/html5/thumbnails/2.jpg)
About Eric Ogren • Eric Ogren is a Senior Analyst with the Information Security
team. Eric has extensive experience in software development, technology marketing, and as a security industry analyst.
• Eric contributes pragmatic perspectives for security clients on emerging market trends, company and product strategies, differentiated vendor messaging and positioning, and meeting enterprise solution purchase criteria.
• Prior to joining 451 Research, Eric held marketing leadership positions with security vendors such as RSA Security and OKENA, and technology vendors such as Digital Equipment.
2
Eric Ogren Senior Analyst, Security
![Page 3: A Data-Centric Approach to Endpoint Security€¦ · on emerging market trends, company and product strategies, differentiated vendor messaging and positioning, and meeting enterprise](https://reader033.vdocument.in/reader033/viewer/2022060406/5f0f803b7e708231d4447980/html5/thumbnails/3.jpg)
About Bill Bradley
§ Leads Product Marketing Data Loss Prevention
§ 20 Years of Marketing & Sales Experience • Field Sales, Competitive Analysis,
Product Marketing & Management
§ Previously at Rapid7 and General Electric
3
Bill Bradley Director, Product Marke6ng
![Page 4: A Data-Centric Approach to Endpoint Security€¦ · on emerging market trends, company and product strategies, differentiated vendor messaging and positioning, and meeting enterprise](https://reader033.vdocument.in/reader033/viewer/2022060406/5f0f803b7e708231d4447980/html5/thumbnails/4.jpg)
Basic structure for today’s conversation
4
Transforming security with the infrastructure
State of enterprise security
Evolving to data-centric approaches
The information security debt
![Page 5: A Data-Centric Approach to Endpoint Security€¦ · on emerging market trends, company and product strategies, differentiated vendor messaging and positioning, and meeting enterprise](https://reader033.vdocument.in/reader033/viewer/2022060406/5f0f803b7e708231d4447980/html5/thumbnails/5.jpg)
INFORMATION SECURITY: ORGANIZATIONAL DYNAMICS 2017
Q11. How many full time employees (FTEs) does your IT organization currently employ? Q12. How many full time employees (FTEs) does your organization currently employ that are dedicated to information security tasks?
Average Size and Ratio of Security Team – By Company Size Information Security Respondents
5 Source: 451 Research, Voice of the Enterprise: Information Security, Organizational Dynamics 2017
Average Number of Employees in Information Security Average Ratio of Security Employees to IT employees
14.1%
7.6%
11.1%
0.0%
5.0%
10.0%
15.0%
20.0%
25.0%
1-999 employees 1,000-9,999 employees
10,000+ employees
5 9
54
0
10
20
30
40
50
60
1-999 employees 1,000-9,999 employees
10,000+ employees
![Page 6: A Data-Centric Approach to Endpoint Security€¦ · on emerging market trends, company and product strategies, differentiated vendor messaging and positioning, and meeting enterprise](https://reader033.vdocument.in/reader033/viewer/2022060406/5f0f803b7e708231d4447980/html5/thumbnails/6.jpg)
INFORMATION SECURITY: ORGANIZATIONAL DYNAMICS 2017
Source: 451 Research, Voice of the Enterprise: Information Security, Organizational Dynamics 2017
6
Average Ratio of Security Employees to IT employees – By Industry Information Security Respondents
14.7%
14.2%
11.9%
10.8%
10.8%
10.7%
10.5%
9.7%
6.1%
4.1%
8.0%
Services
B2B Software, IT and Computer Services
Retail
Healthcare
Govt/Educ
Manufacturing
Finance
Telecommunications
Communications, Media and Publishing
Utilities
Other
Mean
![Page 7: A Data-Centric Approach to Endpoint Security€¦ · on emerging market trends, company and product strategies, differentiated vendor messaging and positioning, and meeting enterprise](https://reader033.vdocument.in/reader033/viewer/2022060406/5f0f803b7e708231d4447980/html5/thumbnails/7.jpg)
INFORMATION SECURITY: ORGANIZATIONAL DYNAMICS 2017
Source: 451 Research, Voice of the Enterprise: Information Security, Organizational Dynamics 2017
Q40. Who does the head of Information Security report to?
7
Information Security Reporting Chain Respondents with a Single Information Security Executive Leader in Their Organizations
46.6%
21.9%
5.2%
5.2%
4.4%
3.3%
3.8%
9.6%
43.2%
20.1%
8.3%
7.9%
7.0%
4.8%
2.6%
6.1%
CIO, Head of Information Technology
CEO
CTO
Board of Directors
COO
CFO
Chief Risk Officer
Other
Percent of Sample Q2 2016 (n=479)
Q2 2017 (n=229)
![Page 8: A Data-Centric Approach to Endpoint Security€¦ · on emerging market trends, company and product strategies, differentiated vendor messaging and positioning, and meeting enterprise](https://reader033.vdocument.in/reader033/viewer/2022060406/5f0f803b7e708231d4447980/html5/thumbnails/8.jpg)
How did we get here? It all starts with your business
8
Your Business
![Page 9: A Data-Centric Approach to Endpoint Security€¦ · on emerging market trends, company and product strategies, differentiated vendor messaging and positioning, and meeting enterprise](https://reader033.vdocument.in/reader033/viewer/2022060406/5f0f803b7e708231d4447980/html5/thumbnails/9.jpg)
How did we get here? Need to bolt on security!
9
Your Business
![Page 10: A Data-Centric Approach to Endpoint Security€¦ · on emerging market trends, company and product strategies, differentiated vendor messaging and positioning, and meeting enterprise](https://reader033.vdocument.in/reader033/viewer/2022060406/5f0f803b7e708231d4447980/html5/thumbnails/10.jpg)
How did we get here? New threats? New products!
10
Your Business
![Page 11: A Data-Centric Approach to Endpoint Security€¦ · on emerging market trends, company and product strategies, differentiated vendor messaging and positioning, and meeting enterprise](https://reader033.vdocument.in/reader033/viewer/2022060406/5f0f803b7e708231d4447980/html5/thumbnails/11.jpg)
We’re catching on to the problems with this picture
11
An attack can go anywhere once inside security defenses
Security teams get bogged down managing all those products and all the data they produce
Security teams get isolated from the rest of IT and special skills keep us isolated
![Page 12: A Data-Centric Approach to Endpoint Security€¦ · on emerging market trends, company and product strategies, differentiated vendor messaging and positioning, and meeting enterprise](https://reader033.vdocument.in/reader033/viewer/2022060406/5f0f803b7e708231d4447980/html5/thumbnails/12.jpg)
INFORMATION SECURITY: ORGANIZATIONAL DYNAMICS 2017
Source: 451 Research, Voice of the Enterprise: Information Security, Organizational Dynamics 2017
Q3. What were your top general information security concerns during the last 90 days? Please select all that apply.
12
Top Information Security Concerns – Past 90 Days Information Security Respondents
52.5%
49.1%
31.7%
19.8%
19.6%
7.3%
Hackers/Crackers with Malicious Intent
Compliance
Internal Audit Deficiencies Based on Findings
Preventing/Detecting Insider Espionage
Cyber-Warfare
Other
Percent of Sample
n = 495
![Page 13: A Data-Centric Approach to Endpoint Security€¦ · on emerging market trends, company and product strategies, differentiated vendor messaging and positioning, and meeting enterprise](https://reader033.vdocument.in/reader033/viewer/2022060406/5f0f803b7e708231d4447980/html5/thumbnails/13.jpg)
INFORMATION SECURITY: ORGANIZATIONAL DYNAMICS 2017
Source: 451 Research, Voice of the Enterprise: Information Security, Organizational Dynamics 2017
Q2. For the top information security projects currently being implemented within your organization, what was the key determinant in their approval?
13
Reasons for Implementing Security Projects Information Security Respondents
21.6%
21.4%
11.1%
9.9%
9.1%
8.9%
8.7%
5.5%
3.8%
Risk Assessment
Compliance Requirement
Business Requirement
Championed by a Senior Leader (e.g., Sacred Cow)
Driven by Due Diligence (e.g., Customer Requirement)
Audit Response
Reputational/Brand Risk
Return on Investment (ROI)
Other
Percent of Sample
n = 495
![Page 14: A Data-Centric Approach to Endpoint Security€¦ · on emerging market trends, company and product strategies, differentiated vendor messaging and positioning, and meeting enterprise](https://reader033.vdocument.in/reader033/viewer/2022060406/5f0f803b7e708231d4447980/html5/thumbnails/14.jpg)
INFORMATION SECURITY: ORGANIZATIONAL DYNAMICS 2017
Source: 451 Research, Voice of the Enterprise: Information Security, Organizational Dynamics 2017
Q1. What are your organization’s top information security pain points? Please select up to three.
14
Top Security Pain Points Information Security Respondents
34.1%
21.0%
20.6%
20.4%
19.0%
18.4%
17.2%
17.0%
16.6%
16.0%
14.7%
12.1%
11.9%
11.7%
11.5%
9.3%
4.6%
User Behavior
Organizational Politics/Lack of Attention to Information Security
Staffing Information Security
Lack of Budget
Security Awareness Training (Ineffectiveness or Difficulty)
Accurate, Timely Monitoring of Security Events
Endpoint Security
Malicious Software (Malware)
Cloud Security
Application Security
Data Loss/Theft
Mobile Security
Ransomware
Third-Party/Supplier Security
Keeping Up with New Technology
Firewall/Edge Network Security
Other
Percent of Sample
n = 495
![Page 15: A Data-Centric Approach to Endpoint Security€¦ · on emerging market trends, company and product strategies, differentiated vendor messaging and positioning, and meeting enterprise](https://reader033.vdocument.in/reader033/viewer/2022060406/5f0f803b7e708231d4447980/html5/thumbnails/15.jpg)
INFORMATION SECURITY: ORGANIZATIONAL DYNAMICS 2017
Source: 451 Research, Voice of the Enterprise: Information Security, Organizational Dynamics 2017
Q44. Which of the following metrics does your organization use/track for information security staff? Please select all that apply.
15
Metrics To Manage Security Information Security Respondents
53.0%
42.8%
44.9%
34.2%
34.4%
31.2%
32.4%
21.9%
2.2%
47.5%
39.0%
34.4%
34.2%
32.3%
29.2%
28.3%
21.9%
4.0%
Security Incidents Resolved
Tickets Resolved (e.g., ‘Trouble Tickets’)
Audit Issues Resolved
Application Availability (e.g., Uptime/Downtime)
Project Completion
Time to Recovery/Restore from an Outage
Lack of Data Breaches
We Don’t Use Metrics
Other
Percent of Sample Q2 2016 (n=837)
Q2 2017 (n=421)
![Page 16: A Data-Centric Approach to Endpoint Security€¦ · on emerging market trends, company and product strategies, differentiated vendor messaging and positioning, and meeting enterprise](https://reader033.vdocument.in/reader033/viewer/2022060406/5f0f803b7e708231d4447980/html5/thumbnails/16.jpg)
INFORMATION SECURITY: ORGANIZATIONAL DYNAMICS 2017
Q16. What’s the status of the use of security analytics in your information security program? Q17. What has been the key benefit of your use of security analytics?
Security Analytics Information Security Respondents
16 Source: 451 Research, Voice of the Enterprise: Information Security, Organizational Dynamics 2017
38.7%
34.7%
26.5%
In Use
Planned for the Next 12 Months
Not In Plan
Percent of Sample
n = 426
24.5%
23.9%
14.5%
13.8%
11.3%
6.3%
2.5%
3.1%
Better Able To Detect and Address External Attacks
Better Anomaly Detection on Our Network
Improved Incident Response/Forensics Evidence Data Capture
We’re Detecting Security Incidents Not Previously Captured
Better Ability To Understand and Respond to Anomalous User Behavior
Better Able To Detect and Address Internal Attacks
No Benefit
Other
Percent of Sample
n = 159
Security Analytics Status Key Benefit of Security Analytics
![Page 17: A Data-Centric Approach to Endpoint Security€¦ · on emerging market trends, company and product strategies, differentiated vendor messaging and positioning, and meeting enterprise](https://reader033.vdocument.in/reader033/viewer/2022060406/5f0f803b7e708231d4447980/html5/thumbnails/17.jpg)
Security analytics dimensions
17
Data
Business Network
User
![Page 18: A Data-Centric Approach to Endpoint Security€¦ · on emerging market trends, company and product strategies, differentiated vendor messaging and positioning, and meeting enterprise](https://reader033.vdocument.in/reader033/viewer/2022060406/5f0f803b7e708231d4447980/html5/thumbnails/18.jpg)
What are CISOs doing about it?
18
Consolidating product portfolios
Investing in security analytics
Shifting attention to operations
![Page 19: A Data-Centric Approach to Endpoint Security€¦ · on emerging market trends, company and product strategies, differentiated vendor messaging and positioning, and meeting enterprise](https://reader033.vdocument.in/reader033/viewer/2022060406/5f0f803b7e708231d4447980/html5/thumbnails/19.jpg)
INFORMATION SECURITY: ORGANIZATIONAL DYNAMICS 2017
Source: 451 Research, Voice of the Enterprise: Information Security, Organizational Dynamics 2017
Q15. What are the key reasons for increasing information security focused staff? Please select all that apply.
19
Staff Increase Reasons Respondents with Increasing Security Staff
49.6%
49.1%
44.2%
25.3%
9.0%
10.5%
7.2%
48.7%
45.1%
40.0%
25.1%
7.7%
7.7%
12.3%
Significant Project(s) Driving Additional Demand
New Skills Are Required
Overall Business Growth
IT Organizational Changes (e.g., Restructuring teams)
Company Merger/Acquisition
Information Security Functions being In-Sourced from a Third-Party Provider or Managed Security Service Provider (MSSP)
Other
Percent of Sample Q2 2016 (n=391)
Q2 2017 (n=195)
![Page 20: A Data-Centric Approach to Endpoint Security€¦ · on emerging market trends, company and product strategies, differentiated vendor messaging and positioning, and meeting enterprise](https://reader033.vdocument.in/reader033/viewer/2022060406/5f0f803b7e708231d4447980/html5/thumbnails/20.jpg)
20
Thank You!
![Page 21: A Data-Centric Approach to Endpoint Security€¦ · on emerging market trends, company and product strategies, differentiated vendor messaging and positioning, and meeting enterprise](https://reader033.vdocument.in/reader033/viewer/2022060406/5f0f803b7e708231d4447980/html5/thumbnails/21.jpg)
Smart Consolidation on the Endpoint Digital Guardian for Data Protection
![Page 22: A Data-Centric Approach to Endpoint Security€¦ · on emerging market trends, company and product strategies, differentiated vendor messaging and positioning, and meeting enterprise](https://reader033.vdocument.in/reader033/viewer/2022060406/5f0f803b7e708231d4447980/html5/thumbnails/22.jpg)
Triad of Roles
22
Incident Responder
Threat Hunter
InfoSec Analyst
![Page 23: A Data-Centric Approach to Endpoint Security€¦ · on emerging market trends, company and product strategies, differentiated vendor messaging and positioning, and meeting enterprise](https://reader033.vdocument.in/reader033/viewer/2022060406/5f0f803b7e708231d4447980/html5/thumbnails/23.jpg)
Triad of Needs
23
Response Threat
Data
![Page 24: A Data-Centric Approach to Endpoint Security€¦ · on emerging market trends, company and product strategies, differentiated vendor messaging and positioning, and meeting enterprise](https://reader033.vdocument.in/reader033/viewer/2022060406/5f0f803b7e708231d4447980/html5/thumbnails/24.jpg)
Myriad Solutions at the Endpoint
24
![Page 25: A Data-Centric Approach to Endpoint Security€¦ · on emerging market trends, company and product strategies, differentiated vendor messaging and positioning, and meeting enterprise](https://reader033.vdocument.in/reader033/viewer/2022060406/5f0f803b7e708231d4447980/html5/thumbnails/25.jpg)
Myriad Solutions at the Endpoint
25
![Page 26: A Data-Centric Approach to Endpoint Security€¦ · on emerging market trends, company and product strategies, differentiated vendor messaging and positioning, and meeting enterprise](https://reader033.vdocument.in/reader033/viewer/2022060406/5f0f803b7e708231d4447980/html5/thumbnails/26.jpg)
Myriad Solutions at the Endpoint
26
![Page 27: A Data-Centric Approach to Endpoint Security€¦ · on emerging market trends, company and product strategies, differentiated vendor messaging and positioning, and meeting enterprise](https://reader033.vdocument.in/reader033/viewer/2022060406/5f0f803b7e708231d4447980/html5/thumbnails/27.jpg)
27
WELCOME TO
The Convergence of DLP & EDR
DETECT THREATS STOP DATA THEFT
From Insiders & Outside Attackers
Ransomware, Malware and Non-Malware
Based
![Page 28: A Data-Centric Approach to Endpoint Security€¦ · on emerging market trends, company and product strategies, differentiated vendor messaging and positioning, and meeting enterprise](https://reader033.vdocument.in/reader033/viewer/2022060406/5f0f803b7e708231d4447980/html5/thumbnails/28.jpg)
28
WELCOME TO
The Convergence of DLP & EDR
DETECT THREATS STOP DATA THEFT
From Insiders & Outside Attackers
Ransomware, Malware and Non-Malware
Based
![Page 29: A Data-Centric Approach to Endpoint Security€¦ · on emerging market trends, company and product strategies, differentiated vendor messaging and positioning, and meeting enterprise](https://reader033.vdocument.in/reader033/viewer/2022060406/5f0f803b7e708231d4447980/html5/thumbnails/29.jpg)
29
WELCOME TO
The Convergence of DLP & EDR
DETECT THREATS STOP DATA THEFT
From Insiders & Outside Attackers
Ransomware, Malware and Non-Malware
Based
![Page 30: A Data-Centric Approach to Endpoint Security€¦ · on emerging market trends, company and product strategies, differentiated vendor messaging and positioning, and meeting enterprise](https://reader033.vdocument.in/reader033/viewer/2022060406/5f0f803b7e708231d4447980/html5/thumbnails/30.jpg)
Data Discovery
The Digital Guardian Data Protection Platform
Confidential 30
DG Appliance
DG Agent(s)
Data Classifica7on
Data Loss Preven7on
Endpoint Detec7on & Response
SOLU
TIONS
DIGITAL
GUAR
DIAN PLA
TFORM
Cloud Data Protec7on
DG Analy7cs & Repor7ng Cloud DG Management Console
![Page 31: A Data-Centric Approach to Endpoint Security€¦ · on emerging market trends, company and product strategies, differentiated vendor messaging and positioning, and meeting enterprise](https://reader033.vdocument.in/reader033/viewer/2022060406/5f0f803b7e708231d4447980/html5/thumbnails/31.jpg)
Endpoint
Storage
Cloud
Network
Visibility to All Threats – One Console
31
![Page 32: A Data-Centric Approach to Endpoint Security€¦ · on emerging market trends, company and product strategies, differentiated vendor messaging and positioning, and meeting enterprise](https://reader033.vdocument.in/reader033/viewer/2022060406/5f0f803b7e708231d4447980/html5/thumbnails/32.jpg)
Endpoint
Storage
Cloud
Network
Visibility to All Threats – One Console
32
Data Events
User Events
System Events
![Page 33: A Data-Centric Approach to Endpoint Security€¦ · on emerging market trends, company and product strategies, differentiated vendor messaging and positioning, and meeting enterprise](https://reader033.vdocument.in/reader033/viewer/2022060406/5f0f803b7e708231d4447980/html5/thumbnails/33.jpg)
Endpoint
Storage
Cloud
Network
Visibility to All Threats – One Console
33
Data Events
User Events
System Events
Combining system, user and data insights provides the
visibility to protect against ALL THREATS.
![Page 34: A Data-Centric Approach to Endpoint Security€¦ · on emerging market trends, company and product strategies, differentiated vendor messaging and positioning, and meeting enterprise](https://reader033.vdocument.in/reader033/viewer/2022060406/5f0f803b7e708231d4447980/html5/thumbnails/34.jpg)
Enable Your Security Team
34
![Page 35: A Data-Centric Approach to Endpoint Security€¦ · on emerging market trends, company and product strategies, differentiated vendor messaging and positioning, and meeting enterprise](https://reader033.vdocument.in/reader033/viewer/2022060406/5f0f803b7e708231d4447980/html5/thumbnails/35.jpg)
Enable Your InfoSec Analysts
35
![Page 36: A Data-Centric Approach to Endpoint Security€¦ · on emerging market trends, company and product strategies, differentiated vendor messaging and positioning, and meeting enterprise](https://reader033.vdocument.in/reader033/viewer/2022060406/5f0f803b7e708231d4447980/html5/thumbnails/36.jpg)
Enable Your Incident Responders
36
![Page 37: A Data-Centric Approach to Endpoint Security€¦ · on emerging market trends, company and product strategies, differentiated vendor messaging and positioning, and meeting enterprise](https://reader033.vdocument.in/reader033/viewer/2022060406/5f0f803b7e708231d4447980/html5/thumbnails/37.jpg)
Enable Your Threat Hunters
37
![Page 38: A Data-Centric Approach to Endpoint Security€¦ · on emerging market trends, company and product strategies, differentiated vendor messaging and positioning, and meeting enterprise](https://reader033.vdocument.in/reader033/viewer/2022060406/5f0f803b7e708231d4447980/html5/thumbnails/38.jpg)
So What?
38
![Page 39: A Data-Centric Approach to Endpoint Security€¦ · on emerging market trends, company and product strategies, differentiated vendor messaging and positioning, and meeting enterprise](https://reader033.vdocument.in/reader033/viewer/2022060406/5f0f803b7e708231d4447980/html5/thumbnails/39.jpg)
Enable Business Growth
39
![Page 40: A Data-Centric Approach to Endpoint Security€¦ · on emerging market trends, company and product strategies, differentiated vendor messaging and positioning, and meeting enterprise](https://reader033.vdocument.in/reader033/viewer/2022060406/5f0f803b7e708231d4447980/html5/thumbnails/40.jpg)
Questions
40
![Page 41: A Data-Centric Approach to Endpoint Security€¦ · on emerging market trends, company and product strategies, differentiated vendor messaging and positioning, and meeting enterprise](https://reader033.vdocument.in/reader033/viewer/2022060406/5f0f803b7e708231d4447980/html5/thumbnails/41.jpg)
Register today for our upcoming webinar:
Insights from the Gartner 2017 Magic Quadrant for Enterprise DLP
October 26, 2017 1PM ET
41