Avoid data leakage, espionage, sabotage and other reputation and business risks without losing employee performance and mobility.

Slides:



Advertisements
Similar presentations
ControlSphere is a computer security and automation solution designed to protect user data and automate most of authentication tasks for the user at work.
Advertisements

COMPREHENSIVE APPROACH TO INFORMATION SECURITY IN ADVANCED COMPANIES.
 Physical Logical Access  Physical and Logical Access  Total SSO and Password Automation  Disk/Data Encryption  Centralized management system  Biometric.
Personal Data Protection and Security Measures Justin Law IT Services - Information Security Team 25 & 27 November 2013.
1 © Copyright 2013 EMC Corporation. All rights reserved. Online File Synchronization and Sharing for the Enterprise.
Module 6: Configuring Windows XP Professional to Operate in a Microsoft Network.
11 CONFIGURING AND MANAGING SHARED FOLDER SECURITY Chapter 8.
Avoid data leakage, espionage, sabotage and other reputation and business risks without losing employee performance and mobility. Simplify authentication.
Security Issues and Challenges in Cloud Computing
Network and Server Basics. 6/1/20152 Learning Objectives After viewing this presentation, you will be able to: Understand the benefits of a client/server.
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 9: Planning and Managing Certificate Services.
Personal Data Protection and Security Measures Justin Law IT Services - Information Security Team 18, 20 & 25 March 2015.
Microsoft Passport Waldemar Swiercz.
1 of 2 This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS DOCUMENT. © 2007 Microsoft Corporation.
Remote Networking Architectures
Barracuda Networks Confidential1 Barracuda Backup Service Integrated Local & Offsite Data Backup.
1 Integrating ISA Server and Exchange Server. 2 How works.
1 Chapter Overview Creating User and Computer Objects Maintaining User Accounts Creating User Profiles.
Cloud Computing How secure is it? Author: Marziyeh Arabnejad Revised/Edited: James Childress April 2014 Tandy School of Computer Science.
Sybase Confidential Propriety.iAnywhere ConfidentialiAnywhere Confidential Proprietary.Sybase Confidential Propriety. Addressing the Challenges of Device.
Security Measures Using IS to secure data. Security Equipment, Hardware Biometrics –Authentication based on what you are (Biometrics) –Biometrics, human.
Overview of Access and Information Protection
Elite Networking & Consulting Presents: Everything You Wanted To Know About Data Insurance* * But Were Afraid To Ask Elite Networking & Consulting, LLC,
PROJECT PAPER ON BLUEFIRE MOBILE SECURITY. BY PONNURU VENKATA DINESH KUMAR STUDENT ID # A0815 PROFESSOR – VICKY HSU CS-426.
Hands-On Microsoft Windows Server 2008 Chapter 1 Introduction to Windows Server 2008.
Microsoft ® Official Course Module 8 Securing Windows 8 Desktops.
MCSE Guide to Microsoft Exchange Server 2003 Administration Chapter Four Configuring Outlook and Outlook Web Access.
©Kwan Sai Kit, All Rights Reserved Windows Small Business Server 2003 Features.
1.1 System Performance Security Module 1 Version 5.
Hands-On Microsoft Windows Server Security Enhancements in Windows Server 2008 Windows Server 2008 was created to emphasize security –Reduced attack.
Week #7 Objectives: Secure Windows 7 Desktop
© Aladdin Knowledge Systems 2006 Aladdin eToken Overview April 2006 ®
 INADEQUATE SECURITY POLICIES ›Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA.
PIN-on-Card New contact-less smart card with integrated PIN pad for secure user verification at unparalleled cost effectiveness.
Chapter 13 Users, Groups Profiles and Policies. Learning Objectives Understand Windows XP Professional user accounts Understand the different types of.
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
One Platform, One Solution: eToken TMS 5.1 Customer Presentation November 2009.
Module 11: Securing a Microsoft ASP.NET Web Application.
Chapter 2 Securing Network Server and User Workstations.
Module 3: Planning Administrative Access. Overview Determining the Appropriate Administrative Model Designing Administrative Group Strategies Planning.
Chapter 12: How Private are Web Interactions?. Why we care? How much of your personal info was released to the Internet each time you view a Web page?
Module 10: Windows Firewall and Caching Fundamentals.
WebCCTV 1 Contents Introduction Getting Started Connecting the WebCCTV NVR to a local network Connecting the WebCCTV NVR to the Internet Restoring the.
Introduction TO Network Administration
Computer Security By Duncan Hall.
May 25 – June 15, Technical Overview Bruce Cowper IT Pro Advisor Microsoft Canada Damir Bersinic IT Pro Advisor Microsoft.
1 Chapter 13: RADIUS in Remote Access Designs Designs That Include RADIUS Essential RADIUS Design Concepts Data Protection in RADIUS Designs RADIUS Design.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
What’s New Data Loss Prevention 14. Information is Everywhere Brings Productivity, Agility, Convenience ……and Problems Copyright © 2015 Symantec Corporation.
MCSE Guide to Microsoft Exchange Server 2003 Administration Chapter One Introduction to Exchange Server 2003.
VPN. CONFIDENTIAL Agenda Introduction Types of VPN What are VPN Tokens Types of VPN Tokens RSA How tokens Work How does a user login to VPN using VPN.
Security risks in a network. Remote access  When you connect a computer to a network it is visible to all other computers on the network. When you connect.
Computer Security Sample security policy Dr Alexei Vernitski.
By the end of this lesson you will be able to: 1. Determine the preventive support measures that are in place at your school.
Labs. Session 1 Lab: Installing and Configuring Windows 7 Exercise 1: Migrating Settings by Using Windows Easy Transfer Exercise 2: Configuring a Reference.
Network and Server Basics. Learning Objectives After viewing this presentation, you will be able to: Understand the benefits of a client/server network.
Introduction to Barracuda IM Firewall
BEST CLOUD COMPUTING PLATFORM Skype : mukesh.k.bansal.
Configuring Windows Firewall with Advanced Security
Tim Carter Sales Director Sybase Confidential Propriety.
UNIT 19 Data Security 2.
Tim Carter Sales Director Sybase Confidential Propriety.
COMPREHENSIVE APPROACH TO INFORMATION SECURITY IN ADVANCED COMPANIES
CERN Certificates platform Emmanuel Ormancey / Anatoly Gladkov
Virtual Private Network
Getting Started.
Encryption in Office 365 Shobhit Sahay Technical Product Manager
Getting Started.
Designing IIS Security (IIS – Internet Information Service)
IT Office hours – 1 Data Sharing 101
Presentation transcript:

Avoid data leakage, espionage, sabotage and other reputation and business risks without losing employee performance and mobility.

 Employees can send confidential data out unintentionally or maliciously.

 By leaving the company, practitioners or employees can take sensitive data with them.

 Employees can lose their portable computers or storage devices. They can also be stolen.

 Competitors can spy or bribe company staff to steal inner data.

 Computer viruses or malicious software can delete or export the data.

 A hacker can steal company data over the Internet using exploits or security holes.

or ControlSphere DLP encrypts a portion of local, network or removable (flash) drive. This is a secure storage for confidential data. This storage is visible for programs started with DLP system only and inaccessible for programs started as usual. or

Both program types run side-by-side on the same user desktop. But they behave and access data differently. For easier recognition, all programs started with the DLP environment are marked with a “ ” prefix in their captions.

Employees can export, backup, restore and exchange their secure data through encrypted data containers, leaving the convenience of an unsecure approach in place. Data inside the containers is inaccessible outside of the DLP environment. This way the data never leaves the secure DLP environment of a company. ? ? ? ? ? ? ? ? ? ?

 Internet Explorer can be used under the DLP environment. Allowed WEB site list is configured by administrator.  ControlSphere Password Manager can prevent users from accessing same locations (URLs) outside of the DLP environment.  Internet Explorer can be used under the DLP environment. Allowed WEB site list is configured by administrator.  ControlSphere Password Manager can prevent users from accessing same locations (URLs) outside of the DLP environment.

ControlSphere for Smartcards can be used in combination with ControlSphere DLP. It uses smartcards or USB tokens (reader-less smartcards) as a secure storage for... ControlSphere for Smartcards can be used in combination with ControlSphere DLP. It uses smartcards or USB tokens (reader-less smartcards) as a secure storage for...

 Smartcard/token + PIN replaces all other authentication requests.  Users do not have to remember or even know their Windows account and all other user name/password combinations for all Windows programs and WEB sites.  Administrative policy may prevent users from viewing and changing some or all data stored on their devices.  Smartcard/token + PIN replaces all other authentication requests.  Users do not have to remember or even know their Windows account and all other user name/password combinations for all Windows programs and WEB sites.  Administrative policy may prevent users from viewing and changing some or all data stored on their devices.

 Logon to Windows securely  Encrypt your files, local, removable and remote storage  Authenticate to all Windows programs and WEB sites automatically, without typing any passwords (Single-Sign-On approach)  Remotely control smartcard usage and data via unified ControlSphere TMS/DLP server  And much more…  Logon to Windows securely  Encrypt your files, local, removable and remote storage  Authenticate to all Windows programs and WEB sites automatically, without typing any passwords (Single-Sign-On approach)  Remotely control smartcard usage and data via unified ControlSphere TMS/DLP server  And much more…

Password Manager (SSO) extends and, if necessary, automates all password requests across the system. WEB Win 32 Win 64

Administrator can centrally lock one or more password records on user smartcards for sole use with the DLP environment. The actual passwords will be hidden from users. In this case only DLP-enabled program instances will get access to the required credentials (i.e. access passwords). Administrator can centrally lock one or more password records on user smartcards for sole use with the DLP environment. The actual passwords will be hidden from users. In this case only DLP-enabled program instances will get access to the required credentials (i.e. access passwords).

ControlSphere DLP is a client-server solution capable of authorizing users inside and outside of company firewall. TMS/DLP Server runs on standard Microsoft IIS. Users access to their secure data, maintenance and password reset functions are controlled remotely by using encrypted HTTP connectivity.

 Secure Systems creates modular and practical security and process automation products.  We do not only sell them as they are, but offer custom combined solutions perfectly matching customer needs.  DLP solutions can be additionally adapted to existing customer environment and combined with Single Sign On approach of ControlSphere.  We design, develop and deploy specific solutions together with our customers or their system integrators.  Everything is possible... this is our motto.  Secure Systems creates modular and practical security and process automation products.  We do not only sell them as they are, but offer custom combined solutions perfectly matching customer needs.  DLP solutions can be additionally adapted to existing customer environment and combined with Single Sign On approach of ControlSphere.  We design, develop and deploy specific solutions together with our customers or their system integrators.  Everything is possible... this is our motto.