Protecting sensitive data throughout its lifecycle

Slides:



Advertisements
Similar presentations
Unified Communications Bill Palmer ADNET Technologies, Inc.
Advertisements

© 2007 IBM Corporation Enterprise Content Management Integrating Content, Process, and Connectivity for Competitive Advantage Malcolm Holden October 2007.
HIPAA Security Rule Overview and Compliance Program Presented by: Lennox Ramkissoon, CISSP The People’s Hospital HIPAA Security Manager The Hospital June.
Microsoft Confidential Solution Overview: Foxit Software Corporation’s PDF Security Suite.
General Business Secure Information Sharing in SharePoint 2010 Antonio Maio Senior Product Manager, Titus Inc.
Security Controls – What Works
Sophos / Utimaco Data Loss Prevention Peter Szendröi, SOPHOS Nordics Jan 20, 2010.
© Copyright Lumension Security Lumension Security PatchLink Enterprise Reporting™ 6.4 Overview and What’s New.
Compliance in Office 365 Edge Pereira Sandy Millar From Avanade Australia OSS304.
Symantec Vision and Strategy for the Information-Centric Enterprise Muhamed Bavçiç Senior Technology Consultant SEE.
Click to add text © 2010 IBM Corporation OpenPages Solution Overview Mark Dinning Principal Solutions Consultant.
Exchange 2010 Overview Name Title Group. What You Tell Us Communication overload Globally distributed customers and partners High cost of communications.
Office 365: Efficient Cloud Solutions Wednesday March 12, 9AM Chaz Vossburg / Gabe Laushbaugh.
Enterprise Content Management In Microsoft Office SharePoint Server 2007 Lionel Moyal Intervate Solutions
Clinton Ho Program Manager Microsoft Corporation SESSION CODE: SIA311.
Why Information Governance….instead of Records & Information Management? Angela Fares, RHIA, CRM, CISA, CGEIT, CRISC, CISM or
May 30 th – 31 st, 2006 Sheraton Ottawa. Microsoft Certificate Lifecycle Manager Saleem Kanji Technology Solutions Professional - Windows Server Microsoft.
1 Secure Services. 2 Secure is a hosted application that provides users with enterprise-grade business features including calendaring, contacts.
Copyright © 2006 CyberRAVE LLC. All rights reserved. 1 Virtual Private Network Service Grid A Fixed-to-Mobile Secure Communications Framework Managed Security.
What Keeps You Awake at Night Compliance Corporate Governance Critical Infrastructure Are there regulatory risks? Do employees respect and adhere to internal.
Security Professional Services. Security Assessments Vulnerability Assessment IT Security Assessment Firewall Migration Custom Professional Security Services.
ISO17799 Maturity. Confidentiality Confidentiality relates to the protection of sensitive data from unauthorized use and distribution. Examples include:
© Egress Software Technologies Ltd. All rights reserved Secure information sharing an update on Egress Switch Michelle Chuvas, Egress Software.
Secure . is a means of exchanging digital messages from an author to one or more recipients – it is instant with no delay or postal costs.
What’s New Data Loss Prevention 14. Information is Everywhere Brings Productivity, Agility, Convenience ……and Problems Copyright © 2015 Symantec Corporation.
Cyber Risk Management Solutions Fall 2015 Thomas Compliance Associates, Inc
Accurate  Consistent  Compliant Contact: i4i the structured content company the structured content company.
Secure Services Shared Hosted MS Exchange 2010.
CLOSE THE SECURITY GAP WITH IT SOLUTIONS FROM COMPUTACENTER AND CISCO AUGUST 2014.
Pioneers in secure data storage devices. Users have become more accustomed to using multiple devices, are increasingly mobile, and are now used to storing.
Database Encryption Market to Global Analysis and Forecasts by Types, End User and Deployment Type No of Pages: 150 Publishing Date: Feb 2017 Single.
OFFICE 365 APP BUILDER PROFILE: Druva
Verizon Intelligent Track and Trace: Serialization and Cold Chain
Your Office 365 Journey Prepare, Migrate, and Operate with Barracuda
Wallpaper only – on screen during welcome and chat
Encrypted from CDS Office Technologies
Segmap Solutions Mapping segments.
What Does GDPR mean for you
A Winning Combination !! and Good afternoon…
Customer Relationship Management (CRM) An introduction and workshop
92% of the world’s data was created in the past 2 years
Microsoft 365 Get help with regulatory compliance
Current ‘Hot Topics’ in Information Security Governance Auditing
9/4/2018 6:45 PM Secure your Office 365 environment with best practices recommended for political campaigns Ethan Chumley Campaign Technology Advisor Civic.
Speaker’s Name, SAP Month 00, 2017
Understanding best practices in classifying sensitive data
HOSTED BY IN PARTNERSHIP WITH SUPPORTED BY Barcelona iCapital 2015.
Data Loss Prevention in O365:The Basics
Information Security: Risk Management or Business Enablement?
Introduction to Soonr by ….
11/16/2018 © 2014 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks.
Searchable. Secure. Simple.
Blockchain technology at Change Healthcare
BluVault Provides Secure and Cost-Effective Cloud Endpoint Backup and Recovery Using Power of Microsoft OneDrive Business and Microsoft Azure OFFICE 365.
Collaborative Business Solutions
Adobe Acrobat Target Markets
Microsoft Azure, RightsWATCH Help Users Keep Sensitive Information Safe from Security Breaches Resulting from Accidental or Malicious Disclosure MICROSOFT.
Presentation to the INTOSAI Working Group on IT Audit Systems assurance and data analytics for continued audit quality and improved efficiency of audits.
Project Information Management Jiwei Ma
Enterprise Program Management Office
E-Lock ProSigner ProSigner means “Professional Signer” signifying the software that can apply legally enforceable Advanced electronic signatures to electronic.
IN THE PAST, THE FIREWALL WAS THE SECURITY PERIMETER devicesdata users apps On-premises.
4/9/ :42 PM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
Presented By DAN RICHARDS
Microsoft Data Insights Summit
Protect data in core business applications
Make it real: Help your customers comply with the GDPR
Contract Management Software from ContraxAware Simplify Your Contract Management Process.
OU BATTLECARD: Oracle Identity Management Training
Security in SharePoint and Teams with DLP, IRM, and AIP
Presentation transcript:

Protecting sensitive data throughout its lifecycle An introduction to Egress Switch Egress Software Technologies <<Date>> 2017

Today’s presentation Agenda The Egress Switch platform and USPs The market challenge Market focus and customers Agenda The market challenge The Egress Switch encryption services platform Key USPs Market focus Customers Appendix – supporting information

Where we are now: The market challenge

Businesses today are driven by two things: The market challenge Businesses today are driven by two things: In the face of increased competition and budgetary cuts, organisations need to cut operational costs and demonstrate greater efficiency. In response to a new and existing regulatory data protection laws, organisations need to implement comprehensive processes and systems in order to demonstrate compliance. 3

These drivers force different types of behaviour: A change in behaviour These drivers force different types of behaviour: To save money and drive efficiency they: Outsource Adopt digital file sharing Remote working To meet DP compliance requirements they invest in: New processes New reporting New forms of data protection 3

Fine and reputational loss: The consequences As a result of these operational changes, businesses are exposed to heightened risk: Risk of a data breach: Cloud – where does my data reside, how is it being shared, who has access? Digital File Sharing – the accidental send, sensitive data shared in clear text Remote working – no centralised device management, inadequate security Fine and reputational loss: Regulatory compliance – additional scrutiny of DP processes, mandatory notification of a data breach, fine, reputational loss 3

The Egress Switch data security services

Which is why the Switch platform delivers: Egress Switch At Egress we recognise that the drive to efficiency and cost savings heighten the cyber / data security risk. Which is why the Switch platform delivers: A set of security products and features designed to maintain privacy and mitigate the risk of a data breach Protection of digital information through out its lifecycle Flexibility to cater for data stored and shared from the cloud Centralised control and security of data stored and shared via a mobile device Switch also recognises that cost saving and efficiency behaviours are intrinsically linked to compliance. Our solutions are designed to meet the risks posed by these different behaviours, helping prevent a breach, a fine or reputational loss. 3

Egress Switch: Encryption services

Egress Switch: Service lines Switch Email and Document Classifier Policy control in MS Outlook, Word, Excel and PowerPoint Integrated DLP to prevent accidental or malicious release of content Customisable classification labels and headers/footers Interact, recommend and enforce classification Classification in MS Office 365 / hosted Office environments

Egress Switch: Service lines Switch Threat Protection Prevent the miss-sending (fat finger) of sensitive emails to the incorrect recipients Detect miss-typed addresses Suggest additional recipients in context of historical interactions Avoid accidental send of mass mail via To/CC Self-learn in discovery mode or feed via historical email Integrate with existing email platforms including MS Exchange, Office 365 and Google G-Suite

Egress Switch: Service lines Switch Secure Email & File Transfer The only UK Government Certified (CPA) email encryption product Control recipient access Revoke access in real-time Outlook integration Unlimited file transfer capability Sophisticated reporting and auditing FREE FOR RECIPIENTS TO USE

Egress Switch: Service lines Switch Secure Workspace A secure collaborative alternative to the likes of Box, Dropbox and Huddle Sync, share and collaborate on files of unlimited size Integration with MS Outlook Sophisticated role-based access and permissions management enable closed and open communities Share individual files/folders as well as workspaces Editable branding PDF annotation No infrastructure required FREE FOR THIRD PARTIES TO USE

Egress Switch: Service lines Switch Secure Managed File Transfer Schedule bulk file transfer with automated progress notifications for both sender and recipient Integrate bulk file transfer into existing systems and business processes Enforce centralised data sharing security policies Sophisticated reporting and auditing Reduce operational costs and enhance efficiency

Egress Switch: Service lines Switch Secure Web Form A simple mechanism for third parties to securely share sensitive data Customise branding to meet corporate guidelines Share files of any size and format Apply security permissions and access control as required Sophisticated reporting and auditing FREE FOR THIRD PARTIES TO USE

Egress Switch: Service lines Switch Secure Vault Designed to ensure compliance and business continuity through e-discovery and analytics Archive data in encrypted and clear text form Able to search encrypted emails and files Integrates with any existing email platform, including the ability to import existing archive data Infinitely scalable and resilient architecture Mailbox and journal archiving for MS Office 365, MS Exchange and Domino Integrates with any SMTP or IMAP mail platform

Market focus and customers

Vertical focus Switch for Government Used by over 350 organisations across Government (UK and US) (Local, Central, NHS and Blue Light) The first and only email and file encryption solution to achieve NCSC CPA certification to OFFICIAL and OFFICIAL SENSITIVE Selected as one of only 30 suppliers under the Cyber Security Supplier to Government Scheme Approved supplier under the G-Cloud 9 Framework Listed in the NATO Information Assurance Product Catalogue

Switch for Private Healthcare Vertical focus Switch for Private Healthcare Used by the largest private healthcare organisations in the UK Responding to the British Medical Association’s mandate that sensitive shared data is encrypted Helping organisations comply with the NHS Information Governance Mandate

Switch for Banking and Insurance Services Vertical focus Switch for Banking and Insurance Services Used by banking organisations across the UK and Europe including the European Bank for Reconstruction and Development (64 member nations) Insurance firms that include Direct Line and Swinton Insurance Helping organisations comply with the Financial Conduct Authority’s (FCA) guidance on data security

Switch for the ‘Third Sector’ Vertical focus Switch for the ‘Third Sector’ Flexible encryption services used across the third sector: The UK’s largest charities Over 300 education customers Social services organisations across the UK Multi service housing associations

About Egress Software Technologies The leading provider of data security services designed to protect shared information throughout its lifecycle Formed in 2007 Revenue growth: 100% year on year. 1500+ customers split across Banking and Insurance Services, Government, Healthcare, Industry Regulators, Non for Profit, Professional Services and Utilities International focus UK Mainland Europe North America

Thank you for your time E: info@egress.com T: +44 (0) 2076248500 W: www.egress.com Twitter: @EgressSwitch