Secure Your Future Now ….. Logical Access Control and Data Security Brought to you by Support & Maintenance by DCS Global Info.

Slides:



Advertisements
Similar presentations
Copyright line. Configuring Server Roles in Windows 2008 Exam Objectives New Roles in 2008 New Roles in 2008 Read-Only Domain Controllers (RODCs) Read-Only.
Advertisements

Digital Certificate Installation & User Guide For Class-2 Certificates.
Installation & User Guide
Beyond Compliance: Advanced SmartGrid Authentication Paul Miller Uniloc.
INADEQUATE SECURITY POLICIES Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA standards.
Meganet Corporation VME Office Meganet Corporation Meganet Corporation is a leading worldwide provider of data security to Governments, Military,
Managing User, Computer and Group Accounts
Digital Certificate Installation & User Guide For Class-2 Certificates.
Digital Certificate Installation & User Guide For Class-2 Certificates.
 Physical Logical Access  Physical and Logical Access  Total SSO and Password Automation  Disk/Data Encryption  Centralized management system  Biometric.
EToken PRO Anywhere. Agenda  eToken PRO Anywhere Overview  Market background and target markets  Identifying the opportunity  Implementation and Pricing.
SECURITY IN E-COMMERCE VARNA FREE UNIVERSITY Prof. Teodora Bakardjieva.
Security Security comes in three forms. 1.Encryption – making data and information transmitted by one person unintelligible to anyone other than the intended.
15 Tactical Improvements to IT Security Virtual Keyboard, Two Factor Authentication, Active Confirmation and FAA Access to CPS Online Ganesh Reddy.
ACG 6415 SPRING 2012 KRISTIN DONOVAN & BETH WILDMAN IT Security Frameworks.
Guide to Massachusetts Data Privacy Laws & Steps you can take towards Compliance.
PRODUCT FOCUS 4/14/14 – 4/25/14 INTRODUCTION Our Product Focus for the next two weeks is Microsoft Office 365. Office 365 is Microsoft’s most successful.
Security Controls – What Works
Polytechnic University of Tirana Faculty of Information Technology Computer Engineering Department Identification of on-line users and Digital Signature.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Securing Data Storage Protecting Data at Rest Advanced Systems Group Dell Computer Asia Ltd.
Security Awareness: Applying Practical Security in Your World
MAGNET ™ Sales Manual Storage Assets Real-Time Networks Projects
Peace Out, Passwords Identity and Access Management for the rest of us.
Account Reset Console Delegated and secure self password resets Joe Vachon Sales Engineer.
Confidential Computer Systems Group HD Lock for Toshiba Notebook August 3rd, 2006.
Large-Scale, Cost-Effective, Progressive Authentication and Identify Management Solutions Enabling Security, Efficiency and Collaboration through Technology.
Digital Certificate Installation & User Guide For Class - 2 Certificates.
Dr. John P. Abraham Professor UTPA.  Particularly attacks university computers  Primarily originating from Korea, China, India, Japan, Iran and Taiwan.
PASSWORD MANAGEMENT MADE EASY A Project Play Date - September 26, 2008 Beth Carpenter, Library Services Manager, Outagamie Waupaca Library System.
RIVERA SÁNCHEZ-1 CSE 5810 User Authentication in Mobile Healthcare Applications Yaira K. Rivera Sánchez Computer Science & Engineering Department University.
Chapter 10: Authentication Guide to Computer Network Security.
Security Squad Keeping your Equipment and Information Safe Security Squad Keeping your Equipment and Information Safe Security Squad Video Series, Part.
McGraw-Hill/Irwin © 2006 The McGraw-Hill Companies, Inc. All rights reserved. BUSINESS DRIVEN TECHNOLOGY Chapter Twelve: Integrating the Organization from.
Microsoft ® Official Course Module 8 Securing Windows 8 Desktops.
Week #7 Objectives: Secure Windows 7 Desktop
CIS 450 – Network Security Chapter 8 – Password Security.
Configuring Encryption and Advanced Auditing
Installing SIGNZ on a stand- alone machine. These slides will guide you through the installation of the SIGNZ ‘server’ and ‘client’ components on one machine.
Technology as enabler for electronic benefit transfer – Case of Micro ATM, BC, Aadhaar Authentication System November 29,
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
Physical ways of keeping your system secure. Unit 7 – Assignment 2. (Task1) By, Rachel Fiveash.
“TK8 Safe” – Easy-to-use, secure password manager Download a free trial copy: Product Info Highlights TK8 Safe is a perfect password manager.
Federal Acquisition Service U.S. General Services Administration eOffer/eMod Training eOffer/eMod Training Keonia Cobbins Systems Development Office of.
Lecture 7 Page 1 CS 236, Spring 2008 Challenge/Response Authentication Authentication by what questions you can answer correctly –Again, by what you know.
| © 2007 Lenovo Utimaco SafeGuard Easy March 2007.
“The FIDO Alliance Today”
Database Security. Multi-user database systems like Oracle include security to control how the database is accessed and used for example security Mechanisms:
Database security Diego Abella. Database security Global connection increase database security problems. Database security is the system, processes, and.
Windows 2000 Security Yingzi Jin. Introduction n Active Directory n Group Policy n Encrypting File System.
Chapter 4- Part3. 2 Implementing User Profiles A local user profile is automatically created at the local computer when you log on with an account for.
Understand Encryption LESSON 2.5_A Security Fundamentals.
About Softex Mission Statement: “To provide innovative security software products and solutions for computing devices” Softex was founded in 1992 by IBM.
Biometrics and Security Colin Soutar, CTO Bioscrypt Inc. 10th CACR Information Security Workshop May 8th, 2002.
CSCE 201 Identification and Authentication Fall 2015.
Computer Security Sample security policy Dr Alexei Vernitski.
© ExplorNet’s Centers for Quality Teaching and Learning 1 Explain the importance of security and encryption. Objective Course Weight 2%
Commercial Card Expense Reporting (CCER) The Trustees of Roanoke College An internet solution Accessed via Wells Fargo’s secure Commercial Electronic Office.
MarketsandMarkets Presents Hardware Encryption Market worth $ Billion by 2018
Security Issues in Information Technology
DATA SECURITY FOR MEDICAL RESEARCH
Presented by, K.K.Radhika.
Open, Manage, and Reconcile
Installation & User Guide
Digital Signatures and Forms
Installation & User Guide
Two factor Authentication
Google for Education offering
G061 - Network Security.
Presentation transcript:

Secure Your Future Now ….. Logical Access Control and Data Security Brought to you by Support & Maintenance by DCS Global Info

Secure Your Future Now ….. What is Logical Access Control ? Logical access controls are tools used for identification, authentication, authorization, and accountability in computer information systems. Why deploy Logical Access Control? Companies have many types of resources like information which could be data critical in nature pertaining to financial, medical, homeland security manufacturing and research. They need to ensure that only the intended people can access to these critical pieces of information. What is Data Security? Data Security is about keeping data from being accessed by unauthorized users and from being corrupted and lost. FAQs

Secure Your Future Now ….. How do I ensure Data Security? There are several ways to ensure security of critical data. Some of the key steps that should be followed are: 1.Using strong and multiple passwords 2.Encrypting data. 3.Back up data. 4.Carry out a security audit 5.Educating users in the importance of data security FAQs

Secure Your Future Now ….. FAQs Does Softex offer me both Logical Access Control and Data Security products? YES

Secure Your Future Now ….. How old is Softex ? Has its products gained acceptance in the market? HOMELAND SECURITY e GOVERNANCE OEM BANKING & FINANCE AUTOMOBILE I T TOYOTA MOTOR CO, JAPAN TOYOTA MOTOR CO, JAPAN BORDER SECURITY FORCE, MINISTRY OF HOME, INDIA PUJAB EXCISE, GOVT.OF PUNJAB, INDIA PUJAB EXCISE, GOVT.OF PUNJAB, INDIA BROWN BROTHERS HARRIMAN, USA ACCENTURE, WIPRO, NIIT, INDIA HEWLETT PACKARD, LENOVO USA For nearly 20 years Softex has been providing security solutions and has customers in most of the verticals About Softex

Secure Your Future Now ….. Which of Softex’s products will offer me Logical Access Control and Data Security? Softex has two products namely OmniPass and SecureDrive. Both these products provide Logical Access Control as well as Data Security but through different processes. Products

Secure Your Future Now ….. Without a proper logical access control anyone can access applications Result: Data stands to be compromised and stolen About OmniPass

Secure Your Future Now ….. Installing OmniPass authorizes a registered user to access applications and debars all others About OmniPass

Secure Your Future Now ….. Users tend to forget their passwords specially when they have different passwords for different applications OmniPass stores all your passwords into one single entity which allows you to access all your applications securely with ease FORGOT PASSWORD About OmniPass

Secure Your Future Now ….. SecureDrive enhances data security by locking down the hard drive. This is a very special hard drive called a “SELF ENCRYPTING DRIVE” or SED. SEDs automatically encrypt and decrypt data in the hard drive “on the fly”. The process is completely transparent to the user. SecureDrive has been designed to provide a “lock” on the SED thereby ensuring that only the registered user can access the computer. How does SecureDrive protect my data? About SecureDrive

Secure Your Future Now ….. How does the SED work? An SED has two keys 1.User Authentication Key 2.Data decryption Key When a user starts up his computer, he will be asked to authenticate his identity which is done by the User authentication key. Once authorized the data decryption key will decrypt the entire drive and gives access to the Windows operating system. What is then the role of SecureDrive? SecureDrive provides a lock on the authentication key and ensures that only the registered user can access the key. About SecureDrive

Secure Your Future Now ….. How does SecureDrive provide a lock? Like in OmniPass where the user’s passwords are securely stored in an entity SecureDrive also stores these passwords securely so that no once else use the passwords to access the drive. What is this entity that is being mentioned? The entity is in the form of a biometric fingerprint or digital certificate in a USB token or a One Time Password. So does both OmniPass and SecureDrive work with biometrics, tokens etc. Yes Softex has designed its products to work with various types of authentication devices separately as well as in conjunction with each other. About SecureDrive

Secure Your Future Now ….. Are these SEDs readily available in the market? Yes all major hard drives manufacturers like Seagate and Toshiba sell SEDs. In fact by 2017 all hard drives will be by default SEDs Will SecureDrive work on normal hard drives? No as mentioned before SecureDrive only works with Self Encrypting Drives Are SEDs very expensive? No SEDs are only slightly higher in prices and their prices are expected to be on par with normal drives in the coming years About SecureDrive

Secure Your Future Now ….. How can I evaluate Softex’s products? There are two ways to evaluate our products: 1. Softex’s engineering team can set up an online WEBEX session to demonstrate the features and functionalities of OmniPass and SecureDrive. 2. Evaluation licenses can be uploaded for you to evaluate these products at your site Are these solutions just out-of-the-box or can they be customized? Softex understands that every customer could have a specific need which may not be addressed by our off-the-shelf solutions. Softex will customize these products to suit the varied needs of customers. Product Evaluation

Secure Your Future Now ….. A Softex Presentation 2013