In this PPT we learn about endpoint security and endpoint devices and about why endpoint security is important in 20th century and how you can safe your organization from outside threats and malicious activity , ransomeware, malware etc its very important to secure your endpoint.....
2. Content
S.NO TOPIC
01 What is Endpoint?
02 Why are Endpoint Targeted?
03 What is endpoint security?
04 What are the types of endpoint security?
05 Solutions of Endpoint Security
3. What is Endpoint?
An Endpoint can be defined as any remote computing device that receives
incoming communications and send outgoing messages to the networks.
An endpoint is also known as Doorway or Gateway of the network.
5. Why are Endpoint Targeted?
Endpoint attacks are primarily aimed at accessing corporate network using
endpoints as the Doorway or Gateway
The increase in BYOD (bring your own device) policies, in addition to threats
targeting mobile device access and networks.
6. What is Endpoint Security?
It is the practice of securing end-user device like laptops , Desktops,Mobile Devices
etc from exploitation by malicious user or cybercriminals
Endpoint security protects these Doorway or Gateway from Threats posed by
Cyber attacks.
7. What are the types of endpoint security?
Internet-of-Things (IoT) security
Network access control (NAC)
Data loss prevention (DLP)
Insider threat protection
Data classification
Uniform Resource Locator (URL) filtering
Browser isolation
Cloud perimeter security
Endpoint encryption
Sandboxing
Secure email gateways
10. Without MDR
Organisation
Cyber
Attack
Advance
Threat
Lack of skilled staff
and security tools
The team cannot
identify
Data breaches
and lost of assets
Has
Lead to
With MDR
Organisation
MDR Advance
Threat
Lack of skilled staff
and security tools
The team cannot
identify
Data and assets
are protected
Has
Run into
Active Threat
Hunting Threat intel
Real time Threat
response
Continuous
Monitoring
12. Content
S.N
O
Topic
01 What is Data Loss prevention ?
02 What is data leak ?
03 Difference between data leak and a data Breach
04 Features
05 Why to use
06 Working
07 software available for DLP
13. What Is Data Loss Prevention?
Data loss prevention (DLP) is a method of detecting and preventing potential
data breaches or unwanted destruction of sensitive data by monitoring, detecting
and blocking sensitive data.
14. What is a Data Leak?
A data leak is an overlooked exposure of sensitive data either electronically or
physically.
Data leaks could occur on the internal or via physical devices such as external
hard drives or laptops.
If a cybercriminal locates a data leak, they can use the information to harm
themselves for a data breach attack.
15. Difference Between a Data Leak and a
Data Breach
A data breach is the outcome of a planned cyber attack, but a data leak is the
accidental exposure of sensitive data by a business.
Cybercriminals do not create data leaks, they discover them and then use them
to launch data breach attacks.
Data leaks tend to result from poor security practices.
A business can also be impacted if any of its vendors have a data leak
17. Features
E-mail client
Attachment on
browser
Attachment on
application
HDD
Pen drive
Network Drive
Share point
Cloud Storage
01) Monitoring
system
02) USB Blocking
03) Browser restriction
04) File based & Extension
based restriction
05) Remote Login
18. Why to use
Data Visibility
Data protection
Enhancement
Confidentiality
Secure Access
Authencation Integrity
Data
Classification
22. List of the Best Data Loss Prevention
Software solutions by company
Palo alto
Endpoint Protector By CoSoSys
NinjaOne Backup
Symantec DLP
McAfee DLP
Forcepoint DLP
SecureTrust Data Loss Prevention
Digital Guardian
Trend Micro IDLP
Sophos
Code42
Check Point
Safetica
24. Content
S.NO TOPIC
01 What is E-mail Security
02 Why E-mail Security Important
03 Types of E-mail Threats
04 The benefits of E-mail Security
05 E-mail Security Requirements
06 How can we Secure E-mail
07 E-mail Security tools
25. What Is E-mail security
Email security includes the techniques and technologies used to protect email
accounts and communications.
Email is a critical component of organizational communication because it enables
users to communicate quickly, easily, and with a variety of devices.
Email security is important because email contains sensitive information, is used by
everyone in the organization, and is therefore one of a companys largest targets
for attacks.
26. Why is email security important?
Email has been a primary communication tool in the workplace for more than
two decades.
More than 333 billion emails are sent and received daily worldwideand
employees get an average of 120 emails a day.
Cybercrime cost more than $4.1 billion in 2020, with business email compromise
causing the most damage, according to the FBIs Internet Crime Complaint
Center (IC3). The consequences can be severe, leading to significant financial,
data, and reputational losses.
27. Types of Email Threats
Data exfiltration
Malware
Spam
Impersonation
Phishing
28. The benefits of email security
Enhance
productivity
Ensure compliance
with data protection
laws
Protect a companys
brand, reputation,
and bottom line
29. Email Security Requirements
Protection from Discloser
Confidentiality
Sender of Message
Authencation
Protection From modification
Integrity
Protection From denial by Sender
Non-Repudiction
30. Basic Phase of E-mail
Sender SMPTP
Receiver
SMTP
Server
Receiver
internet Pull
Encrypted Phase of E-mail
31. How can we secure e-mail ?
Spam filter
Email encryption
Antivirus protection
Secure email gateway (SEG)
Multi-factor authentication (MFA)
Employee education
34. 2. PEP
Peer-to-peer and end-to-
end email encryption.
Automatic protection of
emails from being read or
modified.
Seamless use on your
laptop, desktop, tablet,
mobile with PEP sync.
Protection rating at a
glance using traffic lights.
Free and open source
software.
Features:
35. 3. Europeanmx
In- and outbound spam
and virus filtering.
Email archiving
according.
Email queuing on
failure.
Reputation protection.
Features:
36. 4. Sonicwall
The Inbound Spooling feature
allows users to hold mail when
all the customers receivers are
unavailable.
Phishing protection and email
fraud.
Scan malicious URLs at the
time-of-click for advanced
threats.
Prevent email fraud through
powerful email authentication
policies, including DMARC.
Features:
37. 5. Cisco
Automatically blocks links it
considers to be unsafe, which
protects from emails even
when they look genuine.
The reporting and logging on
offer are reliable, bring you
insights into your email
security.
Active spam filtering, which will
ensure you only get the emails
you want in your inbox.
Data loss protection, with
methods that ensure your
emails, are protected with
encryption.
Features:
38. 6. Proofpoint
The software protects against email
threats, effective spam protection,
dominant URL defense, and content
filtering.
Proofpoints user console is modern,
providing granular controls and
improved threat reporting.
Its an ideal solution for companies and
MSPs, with easy set-up and competitive
pricing.
Great tool for teams using Office 365, as
it offers Azure Active Directory Sync,
meaning implementation is seamless,
and new users are automatically added.
Features:
39. PGP( pretty good services)
Widely used
freely available
Using digital signature
PGP incorporated tool for developing a public key trust model & public key
certificate management
PGP provides confidentiality & authentication services that can be used for
electronic mail & file storage application