We think you have liked this presentation. If you wish to download it, please recommend it to your friends in any social system. Share buttons are a little bit lower. Thank you!
Presentation is loading. Please wait.
Published byBrodie Carden
Modified about 1 year ago
1 © Jetico, Inc. Oy Military-Standard Data Protection Software Customer Challenges with Classified Data Spills
2 © Jetico, Inc. Oy About Us >Located in Otaniemi Science Park, Espoo, Finland >Established in 1995 >Crew of 13 persons >Most notable for developing U.S. DoD-Approved, BCWipe data wiping software >Profitable throughout company history 80% of the revenues from USA in last fiscal year
3 © Jetico, Inc. Oy 15,000+ customers in over 100 countries >Trusted by Military, Police and Government agencies, all of the top 10 U.S. Defense Contractors and many National Laboratories >Jetico’s customers need solutions to protect their highly sensitive information or mission-critical data Preventing costly data leakage Encryption of stored data Cleaning up classified data spills Sharing workstations without sharing classified data Sanitization for computer disposal, decommission or reuse Clearing untrusted data (malware) off classified systems Compliance with security and privacy laws
4 © Jetico, Inc. Oy Challenge: Classified Data Spills >“Classified Spills (also known as contaminations or classified message incidents) occur when classified data is introduced to an unclassified computer system or to a system accredited at a lower classification than the data.” >“Hard drives involved in a classified spill should be wiped using an NSA or NIAP-approved product” - DSS ISFO Process Manual for C&A of Classified Systems under NISPOM (March 1, 2010)
5 © Jetico, Inc. Oy Solution: Cleaning Up with BCWipe >BCWipe to surgically clear selected data files >BCWipe Total WipeOut to erase entire hard drives
6 © Jetico, Inc. Oy “BCWipe works very well in our lab and does exactly what it’s supposed to do. Beyond using it myself, I have recommended BCWipe to our customers for clearing a disk of contaminated files or responding to a data spillage event.” - Frank T., Principal Engineer, Data Domain Solution: Cleaning Up with BCWipe “Your product is listed as the one to use in cases where we need to wipe deleted files from a computer. Our operation was to install your software, do a wipe of deleted files and then use the control panel to remove said software, before going on to the next affected computer…” - Information Assurance Officer
7 © Jetico, Inc. Oy BCWipe Innovations >New Transparent Wiping feature in BCWipe 4.0 securely wipes deleted or temp files automatically on the fly “With BCWipe's Transparent Wiping running in the background, I will always be working in a totally clean environment.” - Bruce Schneier, Security Expert
© Jetico, Inc. Oy Join Jetico! Phone:
w w w. b y t w a r e. c o m NATIVE VIRUS DETECTION FOR THE iSERIES powered by McAfee Executive Presentation.
Merlin RAMCo Inc Initial Security Education.
Copyright © 2003 Pearson Education, Inc. Slide 11-1.
Share Your PC Get Started. Sharing a computer used to mean that others could see your private files, install software you didn't want, or change your.
Overview of local security issues in Campus Grid environments Bruce Beckles University of Cambridge Computing Service.
Information Security Office Riverside County Information Security Office.
1 of 4 Elements of the Treaty Establishes an ITAR-free environment for the US Government, Australian Government and accredited US and Australian companies.
Linux Re-Visited A new look at the Linux Operating System.
Copyright 2006 Mid-City Offices Systems. Busy people… How would your business be affected, if you suddenly lost all of your computer data? Rush through.
The. of and a to in is you that it he for.
View and manage corporate files from within Baan and ERP LN. Allows you to access the files on the network from within Baan maintain sessions!
Spyware is a type of malware that can be installed on computers, and which collects small pieces of information about users without their knowledge. The.
1 Kaspersky CCleaner VerbAce WinRar. 2 About VerbAce 2008 Freeware VerbAce 2008 freeware is a translation software with a Arabic-English-Arabic dictionary.
National Safety Compliance, Inc. …because safety is never an accident… Presentation works best if displayed on a computer with an active internet connection.
Windows XP Tutorial Securing Windows. Introduction This presentation will guide you through basic security principles for Windows XP.
WHAT MAKES UP A COMPUTER BY SABRINA & BETH. MOTHERBOARD On the Computer, the Motherboard is where all the different parts are connected too work the computer.
State of New Jersey Office of the State Comptroller Disposition of Excess and Surplus Computer Equipment.
The Web Wizards Guide to Freeware/Shareware Chapter Two Downloading and Installing Software.
Using H.E.L.P. on a Network Report Solutions Inc. 435 West Broadway Centralia, IL
Local Data Protection (LDP) A Case Study Laptop Data Encryption Eric V. Leighninger Chief Security Architect Allstate Insurance Company June 20, 2008 ©2008.
Insert your company logo here (on slide master). Insert your company logo here (on slide master) Developed by the Department of Communications, Information.
1 PCI Compliance Training University of Nevada, Reno Presented by The Controllers Office.
© 2011 Verdasys, Inc. All Rights Reserved. CONFIDENTIAL AND PROPRIETARY - DO NOT REPRODUCE. Enterprise Information Protection When DLP is Not Enough? Graham.
1 CREDANT Confidential. 1 NLIT CREDANT Company Overview 2007 Data Security Leadership Quadrant 2007 & 2008: #1 Fastest Growing Private (Security)
Copyright 2002, Computer Associates International, Inc CA Products for z/VM – Old Dogs with New Tricks Yvonne DeMeritt Sr. Sustaining Engineer CA.
Dolch Words the of and to a in that is was.
ENCRYPTSTICK AFFILIATE PROGRAM James D. Nardell Encrypt-Stick.com Affiliate Management Team
Data Protection Policy Compliance using Notebook Hard Disk Drive Encryption.
Laptop 101 Campus Training Mac Version. Introduction Learning Objectives After completing this course the participant will be able to: 1. Successfully.
© 2016 SlidePlayer.com Inc. All rights reserved.