Data Breaches, Social Media, and Symantec

Last week I had an excellent opportunity to learn from Symantec’s Director of Product Marketing – David Dorosin – about both Targeted Attacks on Intellectual Property and how Symantec is providing new tools to help address the challenges of these attacks. This conversation was of special interest to me as it provided an opportunity for me to see how leading security vendors are beginning to address the data breach challenges associated with unconventional unstructured data emanating from social media.

Data Breach Challenges and Social Media

Last week I had an excellent opportunity to learn from Symantec’s Director of Product Marketing – David Dorosin – about both Targeted Attacks on Intellectual Property and how Symantec is providing new tools to help address the challenges of these attacks. This conversation was of special interest to me as it provided an opportunity for me to see how leading security vendors are beginning to address the data breach challenges associated with unconventional unstructured data emanating from social media.

As part of the discussion with Mr. Dorosin, he kindly shared the following information points – information points that may be useful as you consider data security.

Targeted Attacks on Intellectual Property

The anatomy of a breach typically follows a four step sequence:

• Incursion
• Discovery
• Capture
• Exfiltration

This four step sequence usually can be categorized into either mass attack or targeted attack approaches.

Mass Attack Characteristics

• Incursion – Generic social engineering By-chance infection.
• Discovery – Typically no discovery, assumes content is in a predefined and predictable location.
• Capture – Predefined specific data/data which matches a predefined pattern such as a credit card number.
• Exfiltration – Information sent to dump site often with little protection and dump site serves as long term storage.

Targeted Attack Characteristics

• Incursion – Handcrafted and personalized methods of delivery.
• Discovery – Examination of infected resource, monitoring of user to determine other accessible resources, and network enumeration.
• Capture – Manual analysis and inspection of the data.
• Exfiltration – Information sent directly back to attacker and not stored in known location for extended period.

To address the challenges associated with data breaches from targeted attacks, it seems reasonable for organizations to have a stepped approach that may include but not be limited to:

• The Development and Enforcement of IT Policies
• The Protection of Information
• The Management of Systems
• The Protection of the Infrastructure

In translating the elements of this stepped approach for addressing targeted attacks into practical offerings, Symantec is announcing today as series of security suites designed specifically to meet the challenges associated with data breaches. These offerings include:

• Control Compliance Suite 10.0 (The Development and Enforcement of IT Policies)
• Data Loss Prevention Suite 10.5 (The Protection of Information)
• IT Management Suite 7.0 (The Management of Systems)
• Symantec Protection Center and Symantec Protection Suite (The Protection of the Infrastructure)

Of special interest to individuals and organizations charged with data breaches associated with social media, the Data Loss Prevention Suite 10.5 provides some key capabilities worth considering. These capabilities include but are not limited to:

• Visibility and Control of Unstructured Data
• Protection for Social Media Sites (Examples: Twitter, LinkedIn, YouTube, etc.)
• Protection for Private Clouds (Example: Citrix)

Specifics of this new Data Loss Prevention Suite offering can be seen in today’s press release (13.4.2010) from Symatec – the release is provided below for your use/consideration.

Symantec Helps Businesses Prevent Data Loss in Evolving IT Environments

Symantec Finds Social Media to be a Top Concerns of CIOs

LAS VEGAS – Symantec Vision 2010 – April 13, 2010 – Symantec Corp. (Nasdaq: SYMC) today announced an updated version of Symantec Data Loss Prevention designed to help businesses prevent data leaks in their changing IT environments. Symantec Data Loss Prevention 10.5, the latest version of Symantec’s market leading data security suite, enables the use of social media while guarding against data loss, protects information in private clouds and helps organizations take ownership of unstructured data, such as documents, spreadsheets and email.

“Information is today’s most critical business asset and traditional boundaries for it no longer exist,” said Rich Dandliker, director of product management, Symantec. “Constantly evolving IT environments drive the need for new data protections. To protect information, Symantec must go where the data goes.”

Helping Businesses Go Social

Social media is being increasingly used in business for collaboration and communication. Yet in Symantec’s 2010 State of Enterprise Security study, Symantec learned that 84 percent of CIOs and CISOs considered social networking sites to be a serious threat to their security. To enable the use of social media while addressing this threat, Symantec Data Loss Prevention has enhanced compatibility with Web 2.0 sites – such as Twitter, YouTube, MySpace, Facebook, LinkedIn, and Meebo – to stop the flow of sensitive data. Symantec Data Loss Prevention also minimizes IT support costs by providing a more transparent Web experience for end-users that seamlessly prevents data exposure without confusing the user with broken links or error messages.

Secure Private Clouds

Companies are increasingly turning to private clouds to help them cut server and storage costs. However, security is a chief concern with clouds, even when they live inside the corporate firewall. For example, organizations need to prevent sensitive information from being inappropriately transferred to unmanaged laptops and desktops, which could happen with remote employees or outsourced employees who need access to confidential data. To combat this, Symantec added new endpoint event coverage for workstations running virtualized applications and desktops, including Citrix XenApp and Citrix XenDesktop.

Take Ownership of Unstructured Data

Businesses are also drowning in unstructured data – such as documents, spreadsheets, and emails – which continues to grow exponentially every year. The key challenge for organizations is determining what information is stored in unstructured files and who is responsible for the data. To help companies solve this mounting problem, Symantec recently introduced Symantec Data Insight that is now integrated into Symantec Data Loss Prevention. With Data Insight, organizations can discover where their most critical information lives, monitor its usage and protect it by automatically inferring data ownership to speed up the incident remediation and data clean-up process.

Expanded Interest in Data Loss Prevention

Interest in data loss prevention is high with 89 percent of organizations at least considering a DLP solution, according to Symantec’s 2010 State of Enterprise Security study. New buying centers are emerging in organizations that do not have complex data security requirements and are interested in preventing the loss of specific information, such as customer data, through common endpoint gaps, such as email, Web and USB. To support these new buyers, Symantec now offers Symantec Data Loss Prevention Standard Edition, which provides leading data loss prevention technology to protect against this specific type of endpoint data loss.

Availability

Symantec Data Loss Prevention 10.5, with new support for Windows 7 64-bit, Symantec Data Loss Prevention Data Insight, and Symantec Data Loss Prevention Standard Edition are now available.

Have a Request?

If you have information or offering requests that you would like to ask us about, please let us know and we will make our response to you a priority.

ComplexDiscovery is an online publication that highlights data and legal discovery insight and intelligence ranging from original research to aggregated news for use by business, information technology, and legal professionals. The highly targeted publication seeks to increase the collective understanding of readers regarding data and legal discovery information and issues and to provide an objective resource for considering trends, technologies, and services related to electronically stored information.

ComplexDiscovery OÜ is a technology marketing firm providing strategic planning and tactical execution expertise in support of data and legal discovery organizations. Registered as a private limited company in the European Union country of Estonia, one of the most digitally advanced countries in the world, ComplexDiscovery OÜ operates virtually worldwide to deliver marketing consulting and services.

A (Brand) New Approach? Considering the Framework and Structure of eDiscovery Offerings

Today’s eDiscovery providers may benefit from the lessons learned in the creation of the Sgt. Pepper’s Lonely Hearts Club Band album by creating a concept for branding and packaging their offerings within that brand in a connected, theme-based way that represents the offerings’ promise and capability in a way that is easy to understand and remember.

This fictionalized branding approach was developed from the intellectual exercise of trying to figure out a reasonable and memorable way to descriptively highlight the promise and capabilities of offerings typically delivered by full-service eDiscovery providers. It may not be completely comprehensive or fully normalized. However, the hope of sharing this branding example is that it might help those involved in the branding and communication of eDiscovery provider services and solutions.

eDiscovery Mergers, Acquisitions, and Investments in 2020

Since beginning to track the number of publicly highlighted merger, acquisition,...

Relativity Acquires VerQu

According to Relativity CEO Mike Gamson, "It's imperative that the legal...

eDiscovery Mergers, Acquisitions, and Investments in Q4 2020

From Nuix and DISCO to Exterro and AccessData, the following findings,...

DISCO Closes Funding Round of $100 Million

According to DISCO CEO Kiwi Camara, “Legaltech is booming now, and...

A New Era in eDiscovery? Framing Market Growth Through the Lens of Six Eras

There are many excellent resources for considering chronological and historiographical approaches...

An eDiscovery Market Size Mashup: 2020-2025 Worldwide Software and Services Overview

While the Compound Annual Growth Rate (CAGR) for worldwide eDiscovery software...

Resetting the Baseline? eDiscovery Market Size Adjustments for 2020

An unanticipated pandemeconomic-driven retraction in eDiscovery spending during 2020 has resulted...

Home or Away? New eDiscovery Collection Market Sizing and Pricing Considerations

One of the key home (onsite) or away (remote) decisions that...

Five Great Reads on eDiscovery for December 2020

May the peace and joy of the holiday season be with...

Five Great Reads on eDiscovery for November 2020

From market sizing and cyber law to industry investments and customer...

Five Great Reads on eDiscovery for October 2020

From business confidence and captive ALSPs to digital republics and mass...

Five Great Reads on eDiscovery for September 2020

From cloud forensics and cyber defense to social media and surveys,...

Only a Matter of Time? HaystackID Launches New Service for Data Breach Discovery and Review

According to HaystackID's Chief Innovation Officer and President of Global Investigations,...

It’s a Match! Focusing on the Total Cost of eDiscovery Review with ReviewRight Match

As a leader in remote legal document review, HaystackID provides clients...

From Proactive Detection to Data Breach Reviews: Sensitive Data Discovery and Extraction with Ascema

A steady rise in the number of sensitive data discovery requirements...

A Running List: Top 100+ eDiscovery Providers

Based on a compilation of research from analyst firms and industry...

Not So Outstanding? eDiscovery Operational Metrics in the Winter of 2021

In the winter of 2021, eDiscovery Business Confidence Survey more...

A Lifting of the Fog? Winter 2021 eDiscovery Business Confidence Survey Results

This is the twenty-first quarterly eDiscovery Business Confidence Survey conducted by...

High Five? An Aggregate Overview of Five Semi-Annual eDiscovery Pricing Surveys

As we are in the midst of a pandemic that has...

Balancing Relevance and Reality? Winter 2021 eDiscovery Pricing Survey Results

Based on the complexity of data and legal discovery, it is...