We think you have liked this presentation. If you wish to download it, please recommend it to your friends in any social system. Share buttons are a little bit lower. Thank you!
Presentation is loading. Please wait.
Published byBrodie Carden
Modified about 1 year ago
1 © Jetico, Inc. Oy Military-Standard Data Protection Software Customer Challenges with Classified Data Spills
2 © Jetico, Inc. Oy About Us >Located in Otaniemi Science Park, Espoo, Finland >Established in 1995 >Crew of 13 persons >Most notable for developing U.S. DoD-Approved, BCWipe data wiping software >Profitable throughout company history 80% of the revenues from USA in last fiscal year
3 © Jetico, Inc. Oy 15,000+ customers in over 100 countries >Trusted by Military, Police and Government agencies, all of the top 10 U.S. Defense Contractors and many National Laboratories >Jetico’s customers need solutions to protect their highly sensitive information or mission-critical data Preventing costly data leakage Encryption of stored data Cleaning up classified data spills Sharing workstations without sharing classified data Sanitization for computer disposal, decommission or reuse Clearing untrusted data (malware) off classified systems Compliance with security and privacy laws
4 © Jetico, Inc. Oy Challenge: Classified Data Spills >“Classified Spills (also known as contaminations or classified message incidents) occur when classified data is introduced to an unclassified computer system or to a system accredited at a lower classification than the data.” >“Hard drives involved in a classified spill should be wiped using an NSA or NIAP-approved product” - DSS ISFO Process Manual for C&A of Classified Systems under NISPOM (March 1, 2010)
5 © Jetico, Inc. Oy Solution: Cleaning Up with BCWipe >BCWipe to surgically clear selected data files >BCWipe Total WipeOut to erase entire hard drives
6 © Jetico, Inc. Oy “BCWipe works very well in our lab and does exactly what it’s supposed to do. Beyond using it myself, I have recommended BCWipe to our customers for clearing a disk of contaminated files or responding to a data spillage event.” - Frank T., Principal Engineer, Data Domain Solution: Cleaning Up with BCWipe “Your product is listed as the one to use in cases where we need to wipe deleted files from a computer. Our operation was to install your software, do a wipe of deleted files and then use the control panel to remove said software, before going on to the next affected computer…” - Information Assurance Officer
7 © Jetico, Inc. Oy BCWipe Innovations >New Transparent Wiping feature in BCWipe 4.0 securely wipes deleted or temp files automatically on the fly “With BCWipe's Transparent Wiping running in the background, I will always be working in a totally clean environment.” - Bruce Schneier, Security Expert
© Jetico, Inc. Oy Join Jetico! firstname.lastname@example.org Phone: 1.202.742.2901 www.jetico.com
Managing a “Data Spill” Corrie Velez Technical Security Orlando, Florida March 14, 2012.
Managing a “Data Spill” Presented by: Randy Riley Lockheed Martin Missiles and Fire Control Florida Industrial Security Working Group (FISWG) 2015 Fall.
This presentation will take a look at to prevent your information from being discovered by and investigator.
PRIVACY, SECURITY & ID THEFT PREVENTION - TIPS FOR THE VIGILANT BUSINESS - SMALL BUSINESS & ECONOMIC DEVELOPMENT FORUM October 21, WITH THANKS TO.
How to Manage a Contamination Incident Defense Security Service Carolyn Shugart Information Technology Specialist Standards & Quality Branch.
Personal Data Protection and Security Measures Justin Law IT Services - Information Security Team 18, 20 & 25 March 2015.
Max Secure Software founded in Jan 2003 develops innovative privacy, security, protection and performance solutions for Internet users. The company is.
Copyright © 2012, Big I Advantage®, Inc., and Swiss Re Corporate Solutions. All rights reserved. (Ed. 08/12 -1) E&O RISK MANAGEMENT: MEETING THE CHALLENGE.
Lesson 46: Using Information From the Web copy and paste information from a Web site print a Web page download information from a Web site customize Web.
Personal Data Protection and Security Measures Justin Law IT Services - Information Security Team 25 & 27 November 2013.
DEFENSE SECURITY SERVICE DSS Role in International Security.
Steve Garner Ag Communications Services IT Manager.
POSITIONING STATEMENT For people who operate shared computers with Genuine Windows XP, the Shared Computer Toolkit is an affordable, integrated, and easy-to-use.
1. Intro What is PremiumAV? Antivirus engine Features of PremiumAV. Classification of PremiumAV. PremiumAV LAB Re-Branding or Private Label Why Re- Branding.
Data-Tech Guardian Endpoint Security Suite. Guardian Endpoint Security Suite secures All Things Mobile TM from one management console.
Part 2 of Evil Lurking in Websites Data Security at the University of Wisconsin Oshkosh.
Forensics Jeff Wang Code Mentor: John Zhu (IT Support)
Privacy and Information Management ICT Guidelines.
Guide to Massachusetts Data Privacy Laws & Steps you can take towards Compliance.
Gordon Hughes Feb T13 Change Request re Security Erase Gordon Hughes, UCSD Formerly Seagate (until 1997) PI.
Installing and Troubleshooting Hardware Device and Drivers Chapter 6 powered by dj.
Microsoft Office Outlook 2013 Microsoft Office Outlook 2013 Courseware # 3252 Lesson 6: Organizing Information.
Administrative Inquiries Charles Duchesne, DSS Corrie Velez, Lockheed Martin Jennifer Rossignol, Lockheed Martin Florida Industrial Security Working Group.
Apple Technical White Paper Presented By : Rajhesh Babu.
© 2012 The McGraw-Hill Companies, Inc. All rights reserved. 1 Third Edition Chapter 5 Windows XP Professional McGraw-Hill.
Module 6: Designing Security for Network Hosts. Overview Creating a Security Plan for Network Hosts Creating a Design for the Security of Network Hosts.
Configuring Data Protection Chapter 12 powered by dj.
Share Your PC Get Started. Sharing a computer used to mean that others could see your private files, install software you didn't want, or change your.
1st Choice Document Destruction, Inc (a member of the NAID Association) is proud to be an exclusive distributor for “The Guardian” Hard Drive Destroyer.
The Problem YOU are responsible for confidential, mission- critical data... but.
INADEQUATE SECURITY POLICIES ›Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA.
Mel Pless, Sr. Director, Solutions Consulting Guidance Software, Inc. Let’s Get Right To The Endpoint Leveraging Endpoint Data to Expose,
A Feature-Based of IT Automation using kaseya’s agent procedure called the wiping of unallocated disk space using cipher.exe Developed By: Estuardo Fernandez.
Understanding secure data erasure and end-of-lifecycle IT asset management.
The traditional perimeter is rapidly eroding IT needs continuous data protection that work across ‘classic ‘boundaries’ Consumerization of IT Users.
1 Preparing a System Security Plan. 2 Overview Define a Security Plan Pitfalls to avoid Required Documents Contents of the SSP The profile Certification.
Activu-Powered Video Wall Prominently Featured during President Obama’s Visit to the National Cybersecurity and Communications Integration Center On January.
© CCI Learning Solutions Inc. 1 Lesson 5: Basic Troubleshooting Techniques Computer performance Care of the computer Working with hardware Basic maintenance.
Active KillDisk © v3.0 Active Data Security Solutions.
PLUG IT IN 7 Protecting Your Information Assets. 1.How to Protect Your Assets: The Basics 2.Behavioral Actions to Protect Your Information Assets 3.Computer-Based.
NETWORK SECURITY Definitions and Preventions Toby Wilson.
Palm Creek RV and Golf Resort December 07, 2011 Garth Vanstone.
System Restore BCIS 3680 & BCIS Better Safe than Sorry Before installing programs used in this course (NetBeans, MySQL, etc.), it’s highly recommended.
SOCIETY & COMPUTERS POWERPOINT. WHO USES COMPUTERS? ALMOST EVERYONE! Even if someone does not own a single electronic device, they are using technology.
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Copyright © 2006 by The McGraw-Hill Companies,
CLOUD AND SECURITY: A LEGISLATOR'S PERSPECTIVE 6/7/2013.
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
McGraw-Hill/Irwin© 2006 The McGraw-Hill Companies, Inc. All rights reserved. 5-1.
© 2017 SlidePlayer.com Inc. All rights reserved.