Presentation is loading. Please wait.

Presentation is loading. Please wait.

My First Template.

Similar presentations


Presentation on theme: "My First Template."— Presentation transcript:

1 My First Template

2 My First Template Before we start talking about who we are, let’s talk first about what you want, and why you want it. It’s not terribly complicated – you want to protect your data – your employee data, your customer’s data, your intellectual property. You want to prevent data from getting into the wrong hands and want to show local, state and federal legislation that you have implemented the right processes and procedures in case it does. And in today’s world – this is tough. We love this quote because it isn’t whether or not you will be breached – the question is when have you been breached and how many times? Are you aware of a situation within your organization where you have been exfiltrated? With so much money being spent on security, why do breaches continue to happen? Well, we will show you that traditional security methods aren’t enough. Firewalls, encryption, and control access – to name a few - provide a level of protection, but we will show you how you can add another layer that can reduce the impact when in fact you are breach. The increasing sophistication of hackers and the skillsets they possess to break into organizations is undeniable. To ensure sensitive data remains safe and out of the grip of criminal hackers, organizations need to rethink how and where they are investing their security budgets. It is also important to note that compliance doesn’t mean security!!! It is now imperative for businesses to focus on being proactive to minimize the potentially devastating effect of a data breach or a compromise. Potential questions to ask here: Are you classifying your data? What security programs are you currently using?

3 My First Template Include data end-of-life (erasure) with auditable reporting into your cloud security eco system. As we transition to Cloud Computing, our traditional methods of securing data are challenged by cloud-based architectures. Elasticity, multi-tenancy, new physical and logical architectures, and abstracted controls require new data security strategies. With many cloud deployments we are also transferring data to external — or even public — environments, in ways that would have been unthinkable only a few years ago. The Data Security Lifecycle is different from Information Lifecycle Management, reflecting the different needs of the security audience. The Data Security Lifecycle consists of these six phases.

4 My First Template However, encryption isn’t enough. Data erasure provides another layer to data security around your network, physical assets and applications. Because if the data is erased, it can’t be stolen. Encryption can prevent unauthorized access, however – it has gaps. Most of it is based on drive encryption – which is unlocked when the system is being operated. Key management is always a challenge and some employees are actually ordered to unlock encryption when traveling. Although we do support encryption in our software, we highly recommend that you provide an added layer of security via data erasure.

5

6 My First Template So when should you absolutely use data erasure? These are some of the most common ways – although it is important for us to do a thorough analysis of your current infrastructure to determine gaps and how erasure could fill those gaps. The Global Databerg Report found that only 15 percent of organizational data was business critical. The other 85 percent was either redundant, obsolete, trivial, or considered dark data. - See more at:

7

8

9

10 My First Template We have 18 global certifications.
In addition to our formal certifications, Blancco Data Eraser solutions help organizations stay compliant by satisfying certain portions of a number of regulations, laws and guidelines. These include, but are not limited to: Health Insurance Portability and Accountability Act (HIPPA) International Organization for Standardization (ISO 27001) Payment Card Industry Data Security (PCI DSS) North American Electric Utilities (NERC CIP) Sarbanes-Oxley Act (Sarbox, SOX) General Data Protection Regulation (GDPR) The Gramm-Leach-Bliley Act (GLB) Electronic Fund Transfer Act, Regulation E (EFT) Children's Online Privacy Protection Act (COPPA) Federal Rules of Civil Procedure (FRCP) Federal Information Security Management Act (FISMA) National Institute of Standards and Technology (NIST ) Health Information Technology for Economic and Clinical Health (HITECH) Patient Safety and Quality Improvement Act (PSQIA, Patient Safety Rule) Massachusetts 201 CMR 17 (Mass Data Protection Law) Personal Information Protection and Electronic Documents Act (PIPED Act, PIPEDA)—Canada Law on the Protection of Personal Data Held by Private Parties—Mexico

11


Download ppt "My First Template."

Similar presentations


Ads by Google