one pager egosecure data protection - bechtle

14
EgoSecure Data Protection Do you know which company data leaves your company unprotected and on which end devices? Can you ensure that only authorized persons use, copy and store confidential data? And can you proactively prevent valuable data from leaving the company or being used by unauthorized persons? Practice shows time and again: In many companies, data is not sufficiently protected, because with increase networking and IT complexity, the number of weak points also increases. Secure endpoints - Secure data - Increased user productivity Challenge: Increasing data theft and data loss 1 Study on economic protection in industry, bitkom, (13.09.2018) https:// www.bitkom.org/Presse/Presseinformation/Attacken-auf-deutsche-Indust- rie-verursachten-43-Milliarden-Euro-Schaden.html [03.07.2019] What is Matrix42 EgoSecure Data Protection? Matrix42 EgoSecure Data Protection is a holistic solution that combines interface control, data encryption and behavior-based automation of countermeasures. The solution protects your data at the endpoint against unauthorized access and automates the initiation of defensive measures for proactive protection against data loss or data theft. The Insight Analysis monitoring tool can be used to analyze behavior. On the basis of this analysis, anomalies can then be quickly detected and measures taken in real time. In addition, applications and devices can be classified according to company policies and the execution or use of non shared applications or devices can be blocked in real time. One Pager In the past two years, 7 out of 10 industrial companies have been victims of sabotage, data theft or industrial espionage. This resulted in a loss of 43.4 billion euros. One third of the companies (32 percent) had their IT or telecommunications equipment stolen. Almost a quarter (23 percent) have lost sensitive digital data. 1 Particularly vulnerable to an attack or unintentional loss of data are end devices, which are often operated by inadequately trained IT security staff. Insight Analysis - Incidents Dashboard Have you heard? EgoSecure Data Protection SaaS is now available. With the cloud solution, you benefit from, among other things: • minimum implementation times, • always the latest version of the application and • maximum availability (all you need is internet access).

Upload: others

Post on 28-Dec-2021

4 views

Category:

Documents


0 download

TRANSCRIPT

EgoSecure Data Protection

Do you know which company data leaves your company unprotected and on which end devices? Can you ensure that only authorized persons use, copy and store confidential data? And can you proactively prevent valuable data from leaving the company or being used by unauthorized persons? Practice shows time and again: In many companies, data is not sufficiently protected, because with increase networking and IT complexity, the number of weak points also increases.

Secure endpoints - Secure data - Increased user productivity

Challenge:Increasing data theft and data loss

1 Study on economic protection in industry, bitkom, (13.09.2018) https://www.bitkom.org/Presse/Presseinformation/Attacken-auf-deutsche-Indust-rie-verursachten-43-Milliarden-Euro-Schaden.html [03.07.2019]

What is Matrix42 EgoSecure Data Protection?Matrix42 EgoSecure Data Protection is a holistic solution that combines interface control, data encryption and behavior-based automation of countermeasures. The solution protects your data at the endpoint against unauthorized access and automates the initiation of defensive measures for proactive protection against data loss or data theft. The Insight Analysis monitoring tool can be used to analyze behavior. On the basis of this analysis, anomalies can then be quickly detected and measures taken in real time. In addition, applications and devices can be classified according to company policies and the execution or use of non shared applications or devices can be blocked in real time.

One Pager

In the past two years, 7 out of 10 industrial companies have been victims of sabotage, data theft or industrial espionage. This resulted in a loss of 43.4 billion euros. One third of the companies (32 percent) had their IT or telecommunications equipment stolen. Almost a quarter (23 percent) have lost sensitive digital data.1 Particularly vulnerable to an attack or unintentional loss of data are end devices, which are often operated by inadequately trained IT security staff.

Insight Analysis - Incidents Dashboard

Have you heard?EgoSecure Data Protection SaaS is now available. With the cloud solution, youbenefit from, among other things:• minimum implementation times, • always the latest version of the application and• maximum availability (all you need is internet

access).

For IT departments• Reduced complexity due to clear application and device

control• Transparent overview of all data movements and possible

weak points • Higher data protection with less work at the same time

through automation • Easy installation and configuration of the software in a few

hours• Fast implementation of data protection guidelines e.g. data

storage in the cloud• No additional effort for the support team

For companies• Easy integration into existing IT

infrastructure and low hardware requirements

• Compliance with GDPR requirements (Articles 25, 30, 32, 33, 34)

• Consideration of the minimum standards of the BSI

• Data access only by authorized persons • Passing on and storage of data only in

defined ways • Reliable support with excellent SLA

compliance • Works council and data protection compliant

behaviour analysis and auditing

Your Benefits

3 Reasons to choose EgoSecure Data Protection

Safety that creates joy Matrix42 EgoSecure Data Protection protects your business without changing the way you work. Users don‘t notice anything and IT doesn‘t need any extra training. This is well received by the users and relieves the support and IT teams. Everything runs as before, but on a higher security level.

Making IT security transparentThe Insight Analysis monitoring tool collects all data movements in the network and prepares them graphically. Secure Audit makes the data flows visible in detail, shows possible weaknesses in the protection settings and enables forensic information to be determined. IntellAct evaluates the facts collected by Insight Analysis and can automatically trigger appropriate protective measures.

For end users• Users don‘t have to change their habits • No user training required • Automatic encryption and decryption of files on all devices

without the need for end-user intervention

www.matrix42.com+49 69 66773-8220

One Pager - EgoSecure Data Protection

All-round protection of your endpointsWith Matrix42 EgoSecure Data Protection, you have all the defensive tools you need to protect your endpoints at your fingertips. Data is automatically encrypted against unauthorized use. Insecure access and applications are automatically blocked. And through the transparent display of all dataflows in your company, you can detect anomalies and weaknesses and initiate behavior-based countermeasures.

2

1

3

EgoSecure Data Protection

Access Control• Control and governance of access to external devices

and client environment interfaces • Access permission to cloud services • Control of all data transmission paths • Control of network connections (e.g. WLAN, anti-

bridging, USB network adapters) • BadUSB protective measures• File filter for blocking certain data formats • Whitelisting of external devices• Revision security according to Basel II, Sarbanes-Oxley,

PCI conformity

Functions Secure Audit • Verification of all traffic to and from each endpoint in real

time • Traceability of the data flow according to EU-DSGVO

article 30, 33 • Protection against misuse and anonymization of audit

data (according to personnel/works council conformity)

Application Control • Black- and whitelisting of applications, Java applets and

DLL files • End-user invisible control over which programs can be

started• Protection against execution of unwanted applications,

e.g. insufficiently licensed applications, key generators and pirated copies

• Supports the prevention of malware outbreaks through blocking

• Simulation mode (demo mode)

Fact Sheet

Insight Analysis• Monitoring of all data movements in the corporate

network • Collects facts about the data protection situation in the

network • Visualization of all data protection-relevant processes in

a clear dashboard • Cumulative display of results (user data is anonymized) • Automated reporting and email delivery

IntellAct Automation• Evaluates data from Insight Analysis and Secure Audit

and triggers pre-defined protection measures based on a set of rules

• Possibility of comparison with normal values to automatically detect anomalies or critical situations and trigger protective reaction

• Integration with Matrix42 Workflow Studio

Encryption• Transparent on-the-fly encryption (without loss of productivity) • Encryption types: general, group encryption, individual encryption,

unencrypted• Encryption algorithms: AES-256 or Triple DES-192 (again encrypted with up

to RSA-4096) • Protection of personal data according to EU-DSGVO article 32 • Decryption and encryption via agent, depending on defined company

policies e.g. decryption only possible if the file is located on the company device

• Extensive policy model

Cloud and Network-Share • Encryption of folders and files

in cloud storage (e.g. OneDrive, GoogleDrive, Dropbox) or on any network share

• Encryption keys are never stored in the cloud or on the network share at any time

Modules and add-ons available for purchase

Data Loss & Leakage Prevention • Protect against theft and unauthorized

disclosure of highly sensitive data with pre-defined search patterns, whether on the endpoint, external devices, in the cloud or on the file server

• Predefined, common search patterns for national & international number codes like insurance numbers, password IDs, IBAN & Swift, credit card numbers etc.

• Blocks the use of data or performs actions such as moving files to a secure location/quarantine or deleting them

• Detailed logging of finds • Global, group-specific or individual rule

assignment

Fact Sheet - Matrix42 EgoSecure Data Protection

NextGen Antivirus • Virus protection against known and unknown threats • Proven high detection rate• Detects even advanced malware through certified Next

Generation Antivirus (NGAV) and Application Communication Control

Permanent Encryption• Persistent encryption of files on any

data carrier • Access to files is only possible for

authorized users. Decryption at the target device via password entry, PKI token or EgoSecure agent.

• Encryption status remains independent of the target disk

• Generates an encrypted data package that can be sent as an e-mail attachment or made available via a web upload

Full Disk Encryption (FDE)• Encryption of the entire hard disk • Encryption algorithms: AES-256,

Triple DES-192 or BlowFish-448 • Windows 10 build upgrade support • Password protected emergency

recovery file for recovery of inaccessible hard disks

Local Folder • Protection of dedicated files and folder structures • Targeted authorization for individual persons, even

when sharing devices• Reliable protection of sensitive data also towards

employees with admin rights - e.g. IT employees

Preboot Authentication (PBA)• Operating systems can only be

started after executing the Preboot Authentication (PBA).

• Support of EgoSecure Full Disk Encryption; as well as Microsoft BitLocker

• Multi-User/Multi-Smartcard support • challenge response • Linux-based, BIOS-based and UE-

FI-based

Automated Endpoint Detection & Response with Post-Infection Protection• Blocks malware outbreaks at kernel level in real time• Reduces the time from infestation to neutralization through

automation (dwell-time)• Generates a single alert for each incident, reducing the number of

alerts to a minimum• Detects any non legitimate communicating application and blocks

real-time data communication• Analysis function which uses collected data to proactively detect

and prevent attacks as well as root cause analysis (threat hunting)

www.matrix42.com+49 69 66773-8220

Removable Device • File-level encryption • Encrypts data on mobile data carriers, such as USB sticks,

external hard disks, etc. • Unlimited data size, e.g. also encryption of terabyte large

disks

Transparency for more security

Companies often lack the manpower to perform regular scans of their network and device infrastructure. They need visibility and overview to identify vulnerabilities and data leaks in a timely manner. This is also important in connection with the requirements of the GDPR.

Create transparency with Matrix42 EgoSecure Data Protection – Insight Analysis & IntellAct

Detect weak points and data leaks at the push of a button and in advance!With the Insight Analysis monitoring solution, you get a visualization of all data flows and interfaces. Information on data movements, data accesses and data carriers used in your network are collected and made available in an informative dashboard. These facts make it easier for you to assess your current protection needs.

Only who understands what happens to the data in an organization can make the right decisions.

One Pager

MATRIX42 EGOSECURE DATA PROTECTION - INSIGHT ANALYSIS & INTELLACT

Insight Analysis - Dashboard

Challenge:Full transparency: Knowing what really happens in your network

Insight Analysis provides answers to the following questions, among others: > Which mobile devices are used in the network? • How often are they used? • What data is written to it? • Do the devices cause a security risk?> How much unencrypted data went where? • What was that data? • When did this happen?> Who has access to confidential data?> Who accesses which cloud services?

Automate your data security!IntellAct is the ideal complement to Insight Analysis and goes one step further. IntellAct evaluates the facts and automatically triggers protective measures based on previously defined rules. In addition, it offers a comparison option with the normal values in order to automatically detect anomalies or critical situations and trigger the corresponding protective reaction.

Matrix42 EgoSecure Data Protection enables you to get an overview of network activities and initiate automated measures with the modules Insight Analysis and IntellAct.

For IT departments• Transparent overview of all data movements and possible

weak points• Reduced complexity due to clear application and device

control• Higher data protection with less work at the same time

thanks to automation• Easy installation and configuration of the software in a few

hours• Fast implementation of data protection guidelines, e.g.

data storage in the cloud• No extra effort for the support team

For end users • Users don‘t have to change their habits • No user training required• Automatically encryption and decryption of files on all

devices without the need for end-user intervention

Your Benefits

3 reasons for Matrix42 EgoSecure Data Protection

For companies• Around-the-clock protection through

automation• Compliance with GDPR requirements

(Articles 25,30,32,33,34)• Data access by authorized persons only• Cost efficiency through simple integration

into the existing IT infrastructure and low hardware requirements

• Consideration of the minimum standards of the BSI

• Passing on and storage of data only in defined ways

• Reliable support with excellent SLA compliance

• Workers council and data protection compliant behaviour analysis and auditing

www.matrix42.com+49 69 66773-8220

Visually presented out-of-the-box reportsYou don‘t have to worry about the graphic formatting. In cooperation with numerous references, powerful graphic reports and visualisations have been created. The reports are rich in content and interactive, i.e. if you are interested in more information, just click on the graphic and you will see additional details.

1

2

3 Security that creates joyMatrix42 EgoSecure Data Protection protects your business without changing the way you work. Usersdon‘t notice anything and IT doesn‘t need any extra training. This is well received by the users and relievesthe support and IT teams. Everything runs as before, but on a higher security level.

Simple, swift and meaningful Facts create transparency. See for yourself! Your effort will be limited to a minimum. Install the solution within the framework of a test position. Let the solution run for a while and collect data. Take a look at the results in the form of meaningful graphical reports.

One Pager: Matrix42 EgoSecure Data Protection – Insight Analysis & IntellAct

Automated EDRNGAV and EDR for reliable protection of your data, before and after the infection in real time

What is Matrix42 EDR?

WHAT BENEFITS DOES THE SOLUTION PROVIDE?

• Reduced expenditure for IT security teams, since alert fatigue is reduced to a minimum and the endpoints are protected without requiring any manual steps.

• Security for your company’s two most important assets: data and employee productivity.

• No damage to the company’s image due to data loss or ransomware, since the effects of an attack are blocked in real time.

Benefits for IT Departments

Benefits for end users

Three reasons why you should use this solution:

The Challenge: 70% of malware goes undetected by antivirus software

Thanks to sophisticated technologies, Automated EDR prevents harmful activities from being executed right where they emerge – directly at the endpoint.

Automated EDR protects against malware and zero-day exploits before (next-gen antivirus) and after (EDR) the infection. Even if your system is infested, the attempt to manipulate or extract your data is prevented in real time without placing the productivity of your end users at risk.

Automated EDR uses a system-centric approach, whereas traditional providers work in a file-centric way. This means threats can be detected in cases where the origin cannot be attributed to a file.

1

2

3

Did you know that, according to a study, around 70% of modern malware goes undiscovered by conventional as well as by next-generation antivirus solutions? The result: Specific error messages reach the Service Desk little by little and only then do you realize that malware has broken out, that you’ve been infested, and that you have to do everything to contain possible consequences – from data theft to encryption? Matrix42 Automated EDR (Endpoint Detection & Response) not only reduces the number of alerts to a minimum, it also stops the effects of malware after the infection – automatically, and in real time. In this way, we’re able to optimally protect your company’s two most important assets at all times: your data and the productivity of your employees!

Matrix42 Automated EDR firstly detects and blocks modern malware before infection (pre-infection prevention) thanks to the NGAV solution, which relies on machine learning and artificial intelligence. Secondly, the key added value of the solution is that it even blocks the consequences of an outbreak after an infection (post-infection protection) via an automated EDR process in real time. Your data is therefore protected from being smuggled or manipulated without you having to manually intervene and with-out restricting the end user’s productivity. This lets you step back and analyze the infestation at a time that’s convenient for you, and initiate measures without worrying about the consequences of the infestation in the meantime.

• 17x higher detection rate for zero-day attacks than other manufacturers (NGAV).• Detects attempts on the part of malware to manipulate or steal data and

automatically blocks it at the moment the attempt is executed.• Permanently reduces the number of alerts and uses automation to shorten

the time it takes to make the infections harmless.

• Employee productivity is not limited by the security measures, since they are implemented without the involvement of the end user.

• Users themselves experience none of the consequences of a malware outbreak.

Benefits for Companies

Because approx. 70% of malware attacks go undetected by antivirus and similar solutions

Because around 70% of all attacks originate on end devices.

Because threats are also detected if the origin is not a file.

www.matrix42.com+49 69 667738-220

Automated EDRFunctions

Automated Endpoint Detection and Response

Next-Gen Antivirus

www.matrix42.com+49 69 667738-220

The lightweight agent (collector) supports conventional 32 and 64-bit servers and desktop operating systems such as Windows, MacOS, and Linux. It is also ideal for supporting virtual desktop infrastructure (VDI) environments such as, for example, VMware and Citrix.

• Windows XP SP2/SP3, 7, 8, 8.1, and 10• Windows Servers 2003 R2 SP2, 2008 R2 SP2, 2012,

2012 R2, and 2016• Mac OS Mavericks (10.9), Yosemite (10.10), El Capitan (10.11),

Sierra (10.12), and High Sierra (10.13.1) +• Red Hat Enterprise Linux, CentOS 6.8, 7.2, and 7.3, 64-bit• VDI environments: VMware Horizons 6 and Citrix XenDesktop 7

• Recognizes the outbreak of malware at the endpoint on the operating system level and automatically blocks the attempt to manipulate or steal data in real time.

• Uses automation to reduce the dwell time from infection up until when the attempt is made harmless.

• Generates a single alert for each incident and therefore reduces the number of alerts to a minimum.

• Next-generation antivirus, which uses machine learning and artificial intelligence to detect “zero day exploits” as well and makes them harmless.

• Stops malware before infection (pre-infection).

Step 1:The collector filters threats with the integrat-ed next-gen antivirus.

Here’s how it works!

Communication Control• Recognizes every legitimate and illegitimate communicating

application by manufacturer, product, and version and records the user’s activities.

• Communication guidelines for applications can be configured as needed.

Threat Hunting and Incident Response• Analysis function using the collected data, which makes it

possible to proactively recognize and prevent attacks and to close gateways via a root cause analysis.

• Sets up security guidelines relating to a newly discovered weakness.

Virtual Patching

Step 2:The collector gathers OS metadata directly on the endpoint.

Step 3: When a connection is estab-lished or a file is changed, the collector sends a snapshot of the request to the core, en-riched with the corresponding OS metadata.

Step 4:The core uses our special technology to analyze the OS metadata together with the request and triggers the corresponding guidelines.

Step 5: Illegitimate requests are blocked during the execution attempt. Only approved requests go through.

INFECTION PREVENTION POST-INFECTION PROTECTION

PlatformAutomated Endpoint Security essentially consists of the following components: • Collector (agent), which collects information at the endpoint • Core, or the solution’s “brain,” which analyzes all information and makes decisions on this basis • Aggregator, which brings together all the information • Central manager, which presents all of the information in the web interface.

Supported systems

www.matrix42.com 1

Achieving GDPR Compliance and how Matrix42 solutions can help

Workspace Management

Solution Paper

Solution Paper - Achieving GDPR Compliance

The General Data Protection Regulation (GDPR, germ. EU-DSGVO) was passed by the EU Parliament in December 2015 and came into force on 25 May 2018. The aim of the new regulation is to provide optimum protection for natural persons and their personal data, while at the same time ensuring the free but regulated movement of data. Both companies within and certain companies outside the EU are obliged to comply with the regulations of the GDPR. Violations are punishable by a maximum possible fine of either 20 million euros or up to 4% of the total worldwide annual turnover of the previous financial year. The fine is intended to be as dissuasive as possible, which is why the higher of the two amounts is chosen.

GDPR in a nutshell

Did you know?Fines of up to 20 million Euros or up to 4% of the total worldwide annual turnover are likely.

2

www.matrix42.com

What does the General Data Protection Regulation (GDPR) imply for IT departments?

Although the GDPR is based on existing data protection regulations of the EU member states, nevertheless, it implies some changes and also innovations. For IT departments, this means the obligation to compile a record of processing activities for the documentation of all processes that handle personal data (documentation obligation). Since such a record is not yet available in many companies, the documentation obligation is often associated with high efforts.

In addition, accountability obliges responsible data processors to demonstrate compliance with data protection (verification obligation) and makes them fully liable. Topics such as the use of private and non IT-managed devices for business purposes (BYOD) or shadow IT therefore always pose a risk of violating data protection policies and must be completely eliminated or integrated into device management (e.g. via Unified Endpoint Management).

Adequate risk management and risk assessment are also required to ensure data protection compliance. This means a high initial effort for the IT department to evaluate the existing security standards and to maintain an appropriate level of protection.

Also new is the tightening of employee data protection, which is also covered by the GDPR. As a rule of thumb, only urgently required data may be stored without consent. Therefore, the employee‘s consent should always be requested.

Documentationobligation

Verificationobligation &

accountability

Risk management &

assessment

Employee data protection

3

How Matrix42 makes your IT compliantMatrix42 Workspace Management opens up many possibilities for IT organizations to make their IT and IT processes GDPR-compliant.

Documentation / Accountability / Verification• Create and document processes properly with the Matrix42 Workflow

Studio via drag and drop.• Assign, document and revoke access rights to applications with Matrix42

Endpoint Security, MyWorkspace and Software Asset Management.• Keep track of all company assets and their usage, as well as the assignment

of rights via Matrix42 Unified Endpoint Management. • Documentation of external process operators (e.g. SaaS providers) by

mapping all relevant data within Matrix42 Contract Management (part of Matrix42 Software Asset Management).

• Regular requests to update data through Matrix42 Service Catalog and Workflow Studio to ensure it is up to date, and to audit information on a regular basis.

Risk Evaluation• Mapping of all relevant information and the risk level of individual

providers/applications within Matrix42 Contract Management. • Automatic request for risk assessment by process operators via a form in

the Service Catalog.• Set up alerts to proactively remind you of deadlines using Matrix42

Workflow Studio.• Securing sensitive data using encryption (Matrix42 Endpoint Security).• Real-time protection against data loss or theft caused by cyber attacks

using automated post-infection protection (Matrix42 Automated EDR).

Employee-related data• Obtain employee consent to the IT policies for processing employee-

related data on all managed devices with Matrix42 Unified Endpoint Management and the Matrix42 Service Catalog.

Solution Paper - Achieving GDPR Compliance4

Unified Endpoint Management• Device management for mobile, physical, and

hybrid devices over a central interface and the entire device lifecycle - from deployment to decommissioning.

• Device-independent software distribution and software management including 3rd party patch management to avoid security gaps, due to outdated software.

Endpoint Security Management• Enables automatic encryption of sensitive data.• Provides comprehensive access and application

control and analysis capabilities.• Blocking of malware before infection with Next Gen

Antivirus.• Real-time protection against the consequences of

a malware outbreak even after infection (e.g. data theft or encryption).

Service Management• Modular, web-based complete solution for creating,

managing, and adapting processes in IT and other departments.

• The solution includes an ITIL-certified service desk and service catalog.

Software Asset Management• Transparency across all license models and -types,

assets, and contracts in order to save costs and be auditable at all times.

• Enables proactive planning and optimization of software and hardware expenses.

MyWorkspace• Identity and access management for secure

and location-independent access to enterprise applications from any device.

SolutionBuilder • Integrated, intuitive tool for creating, configuring,

and customizing applications and processes.• Enables even users without any programming

knowledge to create, extend and automate applications and business processes.

Workflow Studio• Graphical tool for creating and adapting IT-

supported processes. This includes workflows for approval processes, provisioning tasks, and change management workflows.

www.matrix42.com

With its modular, holistic workspace management portfolio, Matrix42 automates and standardizes all technical, organizational and commercial processes and the role-related provision and administration of IT workspaces with software and IT services.

Matrix42 in a nutshell

5

Locations About Matrix42

Headquarter Germany

Matrix42 AG

Elbinger Straße 7

60487 Frankfurt am Main

Germany

Phone: +49 69 66773-8220

Fax: +49 69 66778-8657

[email protected]

Further offices abroad can be found

on our website.

www.matrix42.com

Matrix42 helps organizations digitize and secure the workspace environment of their employees. The software for digital workspace experience managesdevices, applications, processes and services simple, secure and compliant. The innovative software supports the integration of physical, virtual, mobile and cloudbased workspace environments seamlessly into existing infrastructures.

Matrix42 AG is headquartered in Frankfurt am Main, Germany, and distributes and implements software solutions with regional and global partners.

Web

vers

ion-

Solu

tion-

Pape

r-Ach

ievi

ng.G

DPR

-Com

plia

nce-

EN-2

0190

7-v