Question : Why do F1 cars have the biggest brakes ? Answer : Because they need to go the fastest.

Slides:



Advertisements
Similar presentations
Unified Communications Bill Palmer ADNET Technologies, Inc.
Advertisements

!! Are we under attack !! Consumer devices continue to invade *Corporate enterprise – just wanting to plug in* Mobile Device Management.
Copyright © 2012 AirWatch, LLC. All rights reserved. Proprietary & Confidential. Mobile Content Strategies and Deployment Best Practices.
INADEQUATE SECURITY POLICIES Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA standards.
Mobile Devices: Know the RISKS. Take the STEPS. PROTECT AND SECURE Health Information.
Copyright © 2012, Big I Advantage®, Inc., and Swiss Re Corporate Solutions. All rights reserved. (Ed. 08/12 -1) E&O RISK MANAGEMENT: MEETING THE CHALLENGE.
Information Rights Management (IRM): Enhancing Security of IBM FileNet.
© 2009 VMware Inc. All rights reserved VMware Horizon Mobile Intro - NetHope Deepak Puri Director Mobile Business Development +1 (415)
BP5- METHODS BY WHICH PERSONAL DATA CAN BE PROTECTED Data Protection.
1 © Copyright 2013 EMC Corporation. All rights reserved. Online File Synchronization and Sharing for the Enterprise.
Network and Server Basics. 6/1/20152 Learning Objectives After viewing this presentation, you will be able to: Understand the benefits of a client/server.
| Copyright© 2010 Microsoft Corporation the future of productivity Kurt DelBene President, Microsoft Office Division.
E-business Infrastructure
1 SharePoint Momentum 17K+ Customers, 100M Licenses Leader in Gartner ® Magic Quadrants, Forrester Wave TM Continued Platform and Application Innovation.
1 Enterprise Security Your Information Security and Privacy Responsibilities © 2008 Providence Health & Services This information may be replicated for.
1 © Copyright 2007 EMC Corporation. All rights reserved. EMC Documentum Information Rights Management EMC Content Management and Archiving.
Symantec Vision and Strategy for the Information-Centric Enterprise Muhamed Bavçiç Senior Technology Consultant SEE.
© 2011 Autodesk Securing AutoCAD IP in the era of WikiLeaks Presenter: Rahul Kopikar Co-Founder, Seclore Technology.
Barracuda Networks Steve Scheidegger Commercial Account Manager
Solution Briefing Business Productivity in Action Keynote.
Sybase Confidential Propriety.iAnywhere ConfidentialiAnywhere Confidential Proprietary.Sybase Confidential Propriety. Addressing the Challenges of Device.
New Data Regulation Law 201 CMR TJX Video.
©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties Building Your Security Strategy with 3D.
AnyShare File Synchronization and Sharing for Enterprise
CISB113 Fundamentals of Information Systems Telecommunications & Network.
©Kwan Sai Kit, All Rights Reserved Windows Small Business Server 2003 Features.
Creating an Effective Policy Central Missouri Chapter Jesse Wilkins April 16, 2009.
 INADEQUATE SECURITY POLICIES ›Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA.
Secure Data Sharing What is it Where is it What is the Risk – Strategic > What Policy should be enforced > How can the process be Audited > Ongoing Process.
Archiving s. How to Manage Auto-Archive in Outlook Your Microsoft Outlook mailbox grows as you create and receive items. To manage the space.
Organizational Information So what… Structured 20% Unstructured 80%
Secure outsourcing: Possibility or oxymoron ?? Vishal Gupta CEO.
Configuring Data Protection Chapter 12 powered by dj.
Purpose Intended Audience and Presenter Contents Proposed Presentation Length Intended audience is all distributor partners and VARs This would be presented.
Enterprise Data Strategy
Security Version 6.1 | August Need for Complete Security Stop threats at the perimeter High volume spam, phishing, viruses and.
Security fundamentals Topic 10 Securing the network perimeter.
1st Technology Spontaneous and encrypted multimedia connections between users with dynamic IP addresses or ports, and visitors connecting through tunneled.
What’s New Data Loss Prevention 14. Information is Everywhere Brings Productivity, Agility, Convenience ……and Problems Copyright © 2015 Symantec Corporation.
One Drive for Business: More Than a File Share Erica Toelle
BYOD: An IT Security Perspective. What is BYOD? Bring your own device - refers to the policy of permitting employees to bring personally owned mobile.
Enw / Name. What is a on-line / paper based data capture form Can you give an example where each are used? Automated data capture systems are used around.
1 1 Advanced Cyber Security Event - Introduction 11 th May 2016 Matt Locker.
Secure Services Shared Hosted MS Exchange 2010.
Your Office 365 Journey Prepare, Migrate, and Operate with Barracuda
BizSmart Lunch & Learn Webinar Information Security and Protecting your business With the increased risk of some sort of cyber- attack over the past few.
SemiCorp Inc. Presented by Danu Hunskunatai GGU ID #
Securing Information Wherever it Goes Trends in Enterprise Digital Rights Management.
Your data, protected and under control wherever they go SealPath Enterprise – IRM
Security fundamentals
Your Office 365 Journey Prepare, Migrate, and Operate with Barracuda
Secure your complete data lifecycle using Azure Information Protection
Letsignit, an Automated Signature Solution for Microsoft Office 365 and Microsoft Exchange, Provides Efficiency in Branding and Customization OFFICE.
Virtual Private Networks (VPN)
Secure your complete data lifecycle using Azure Information Protection
Store, Share, Sync and Collaborate
Understanding best practices in classifying sensitive data
Quick Comparison of workspaces
IT Management, Simplified
Skyhigh Enables Enterprises to Use Productivity Tools of Microsoft Office 365 While Meeting Their Security, Compliance & Governance Requirements Partner.
11/16/2018 © 2014 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks.
Searchable. Secure. Simple.
Encryption in Office 365 Shobhit Sahay Technical Product Manager
Module 7 Questions Prepared by Mr O Seguna next.
Letsignit, an Automated Signature Solution for Microsoft Office 365 and Microsoft Exchange, Provides Efficiency in Branding and Customization OFFICE.
Introduction To Computing BBA & MBA
Microsoft Data Insights Summit
COMPLETE BUSINESS TEXTING SOLUTION
Personal Mobile Device Acceptable Use Policy Training Slideshow
Security in SharePoint and Teams with DLP, IRM, and AIP
Presentation transcript:

Question : Why do F1 cars have the biggest brakes ? Answer : Because they need to go the fastest.

Protect Infrastructure or protect information ?? Lessons from Wikileaks Presentation at NullCon 2011, Goa Vishal Gupta Seclore

TELEMARKETER Information exchange in the collaborative world Information is exchanged between Employees of the organisation Enterprise CUSTOMERS VENDORS Information is exchanged between employees & vendors & employees & customers Competitors What happens if an employee with privileged access leaves to join a competitor ? What happens if information shared with a vendor is lost by the vendor ? VPN SSL UTM Firewall … Firewalls

The compromise... Increasing risks of systems and data Decreasing availability of systems and data Data Center Enterprise + Partners Enterprise The world Decreasing control and protection over data

Underlying Issues Share it = It becomes his (also) Ownership and usage cannot be separated Shared once = Shared forever Impossible to recall information Out of the firewall = Free for all Technology & processes are only applicable within

The Result

Create Store Transmit & collaborate UseArchive & Backup Delete DLP Anti-virus Anti-… Hard disk encryption SSL UTM Application security IDM DLPVaultsDigital shredders DesktopsLaptops Heterogeneous policies … Heterogeneous infrastructure Mobile devices Removable media Content Management Online workspaces Remote desktops Information lifecycle … Shared folders Removable media Instant Messaging DesktopsLaptops Mobile devices Archive Backup Document retention Security NTFS

Unstructured information security Option 1 : Control Distribution... Security Collaboration

Unstructured information security Option 2 : Control Usage... Security Collaboration Right Location Right Time Right Action Right Person

WHO can use the information People & groups within and outside of the organization can be defined as rightful users of the information WHAT can each person do Individual actions like reading, editing, printing, distributing, copy-pasting, screen grabbing etc. can be controlled WHEN can he use it Information usage can be time based e.g. can only be used by Mr. A till 28th Sept OR only for the 2 days WHERE can he use it from Information can be linked to locations e.g. only 3rd floor office by private/public IP addresses IRM systems allow enterprises to define, implement & audit information usage policies. A policy defines : Information Rights Management Policies are persistent with data, dynamic & audit-able

Lessons from Wikileaks Content is King security supposed to be like s security 1 Thou shall focus on protecting the information …because no wall is too high 3 Thou shall listen to dad & not watch TV beyond 7 pm 2

About … Seclore is a high growth information security product company focused on providing Security without compromising collaboration Seclores flagship product Seclore FileSecure is used by More than 1 million users & some of the largest enterprises

Contact Vishal Gupta