Sentry. Information Leakage and Loss Data Loss, Theft and Leakage happen in a number of environments and for a number of reasons. To combat many of these,

Slides:



Advertisements
Similar presentations
Data Security Breach Code of Practice. Data Security Concerns Exponential growth in personal data holdings Increased outsourcing 3 rd countries cloud.
Advertisements

Presented By Krypto Security Software, LLC. What is BackStopp is a simple but effective tool to help an organization protect its mobile data in the event.
For Developmental Services Financial Group (DSFG)
INADEQUATE SECURITY POLICIES Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA standards.
Secure portal communications
Electronic Records Management Kevin Callaghan, Director Division of Records Management Tre Hargett, Secretary of State.
AmadeusCybersecurity: the essentials12 th November 2014 Alex van Someren Family Office Forum 12 th November 2014, Zurich Cybersecurity: the essentials.
Welcome to RAI, the future of collaborative Project Risk Management Overview of Project Risk and Issue Management RAI for the Project Manager RAI for the.
Guide to Massachusetts Data Privacy Laws & Steps you can take towards Compliance.
GLOBRIN Business Continuity Workshop TECHNOLOGY & INFORMATION 13 th November 2013 Graham Jack.
HIPAA Security Standards What’s happening in your office?
Security strategy. What is security strategy? How an organisation plans to protect and respond to security attacks on their information technology assets.
Security Management IACT 918 July 2004 Gene Awyzio SITACS University of Wollongong.
Security Management IACT 418/918 Autumn 2005 Gene Awyzio SITACS University of Wollongong.
Term 2, 2011 Week 3. CONTENTS Network security Security threats – Accidental threats – Deliberate threats – Power surge Usernames and passwords Firewalls.
Presented by Manager, MIS.  GRIDCo’s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to GRIDCo’s.
1 ZIXCORP The Criticality of Security Dena Bauckman Director Product Management April 2015.
New Data Regulation Law 201 CMR TJX Video.
1 Networks, advantages & types of What is a network? Two or more computers that are interconnected so they can exchange data, information & resources.
UNIT 3C Security of Information. SECURITY OF INFORMATION Firms use passwords to prevent unauthorised access to computer files. They should be made up.
1 Managed Security. 2 Managed Security provides a comprehensive suite of security services to manage and protect your network assets –Managed Firewall.
Confidential Crisis Management Innovations, LLC. CMI CrisisPad TM Product Overview Copyright © 2011, Crisis Management Innovations, LLC. All Rights Reserved.
Protecting ICT Systems
Elite Networking & Consulting Presents: Everything You Wanted To Know About Data Insurance* * But Were Afraid To Ask Elite Networking & Consulting, LLC,
what is contacts? In-contacts is an online contacts database designed from the ground up to be compatible with modern business needs.
ESCCO Data Security Training David Dixon September 2014.
1.1 System Performance Security Module 1 Version 5.
Managing and Securing Endpoints Bruce Hotte Chief Information Officer Jeff Swan Network Supervisor  The definition of “endpoint” used to be simple: a.
PLUG IT IN 7 Protecting Your Information Assets. 1.How to Protect Your Assets: The Basics 2.Behavioral Actions to Protect Your Information Assets 3.Computer-Based.
TEMPLATE DESIGN © Android Data Confidentiality Alex Mayer University of Houston Abstract Employees are increasingly relying.
Mobile Device Management Central Management of Wintel Laptop Software and Hardware in a Secure Environment.
EFFECT OF CORPORATE IT POLICIES ON OTHERWISE PRIVILEGED COMMUNICATIONS Prepared by Joel P. Hoxie of Snell & Wilmer November 2010 Presented by: Jon Barton.
 INADEQUATE SECURITY POLICIES ›Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA.
ISO27001 Introduction to Information Security. Who has day-to-day responsibility? All of us! Why Information Security? Control risk, limit liability What.
Information Systems Security Operational Control for Information Security.
Leveraging Technology to Protect & Grow Your Business… Could Your Business Survive a Disaster? Presented by Dan Jenkins, Vice President, eAgency Systems.
PRIVACY, SECURITY & ID THEFT PREVENTION - TIPS FOR THE VIGILANT BUSINESS - SMALL BUSINESS & ECONOMIC DEVELOPMENT FORUM October 21, WITH THANKS TO.
System Security Chapter no 16. Computer Security Computer security is concerned with taking care of hardware, Software and data The cost of creating data.
ANDROID DATA CONFIDENTIALITY Tips and tools for keeping corporate confidential information confidential on Android Mobile Devices. Alex Mayer University.
Management Plan Goran Smajlagic S English 2100.
SECURITY OF DATA By: ADRIAN PERHAM. Issues of privacy; Threats to IT systems; Data integrity; Standard clerical procedures; Security measures taken to.
Joel Rosenblatt Director, Computer and Network Security September 10, 2013.
Site Security Policy Case 01/19/ : Information Assurance Policy Douglas Hines, Jr.
Cyber Security Awareness Month Protecting Your Laptop’s Data Off-Campus Safe Computing Part 1.
Cmpe 471: Personnel and Legal Issues. Personnel Crime is a human issue not a technological one Hiring On-going management Unauthorised access Redundancy.
ISO/IEC 27001:2013 Annex A.8 Asset management
Web Server.
CHAPTER 2 Laws of Security. Introduction Laws of security enable user make the judgment about the security of a system. Some of the “laws” are not really.
Privacy Act United States Army (Managerial Training)
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
 Face to face  Oral  Written  Visual  Electronic Communication in Administration 2.
Introduction: Introduction: As technology advances, we have cheaper and easier ways to stay connected to the world around us. We are able to order almost.
1 Outline of this module By the end of this module, you will be able to: – Understand what is meant by “identity crime”; – Name the different types of.
Learning Intention Security of Information. Why protect files? To prevent unauthorised access to confidential information To prevent virus/corruption.
Information Management and the Departing Employee.
Computer Security Sample security policy Dr Alexei Vernitski.
Secure Services Shared Hosted MS Exchange 2010.
HIPAA Training. What information is considered PHI (Protected Health Information)  Dates- Birthdays, Dates of Admission and Discharge, Date of Death.
SemiCorp Inc. Presented by Danu Hunskunatai GGU ID #
EAST AFRICAN DATA HANDLERS DATA SECURITY/MOBILITY
Electronic Records Management
Privacy of Client Data.
Cyber Attacks on Businesses 43% of cyber attacks target small business Only 14% of small business rate their ability to mitigate cyber risk highly.
Cybersecurity Awareness
Data Protection Scenarios
File Stream and Team Drives
Digital $$ Quiz Test your knowledge.
Preparing for GDPR Sharing experiences of the process and using the British Canoeing Toolkit bit.ly/BCGDPRToolkit
LO2 - Be Able to Design IT Systems to Meet Business Needs
Personal Mobile Device Acceptable Use Policy Training Slideshow
Presentation transcript:

Sentry

Information Leakage and Loss Data Loss, Theft and Leakage happen in a number of environments and for a number of reasons. To combat many of these, Sentry performs quickly and effectively in: Panic Situations Loss or theft of a mobile computer where its whereabouts are unknown. Critical Situations Internal staff theft - widely perceived to be a major source of sensitive data leakage. Controlled Situations Employment Termination All too often when an employee leaves a position, for whatever reason, they take the employers data with them. Computer Replacement Programmes When an organisation / person replaces its computers they are often dispatched with inadequate or no measures taken to cleanse them of data.

What is Sentry Sentry is a simple but effective tool that securely eradicates computer data that may be at risk of moving out of its owners control.

Mobile Data – Panic Application Your device is missing, lost or stolen. It contains gigabytes of information some of which is inevitably sensitive. Whatever security tools are installed none provide any information to help manage the situation. Sentry works quickly, instructing the device to self-destruct & proving it has done so, allowing effective crisis management.

Mobile Data – Critical Application When an organisation suspects that an employee is acting against its interests it needs to respond quickly. Most organisations accept that employees remove information and pass it to unwanted sources. Equally employees store an organisations information at a third party site for use post employment. Sentry can be used in-house to quickly shut down a rogue employee.

Mobile Data – Controlled Application Employment Termination When an employee leaves or is removed from position the organisation must ensure that any information on his/her computer is erased before it is compromised. Computer Replacement Programme As organisations replace and renew their computers they need to take adequate measures to make sure the information on the computer is erased before it is dispatched. Sentry can be used in-house to perform an unrecoverable delete on all desktops and laptops in just a couple of minutes.

Sentry is an invisible application that waits for an instruction to destroy the data contents on the computer it is protecting. It eliminates human error by having no user interaction, there are no passwords to enter or programmes to start, Sentry is always working when the computer is. Sentry needs no hardware other than its host computer. No restrictions, Sentry protects all data regardless of its location on the device. Sentry is a hosted service meaning there is no expensive infrastructure to install or maintain. What makes Sentry so effective?

Password, 2a4n5d7y Why Sentry over traditional security tools? ***************** Sentry is not meant to replace existing data protection strategies or tools and acts as a powerful layer in a complete data protection strategy. Currently accepted tools such as encryption, require user intervention, either to enter complicated passwords or insert external plug in hardware. End users often render these tools useless by recording the password and storing it or the plug in device, with the laptop, stripping the tool of its functionality. Protected data is good, NO data is best. Sentry deletes ALL data, protected or not.

Whatever the circumstance, Panic, Critical or Controlled Sentry works in the same way. The authorised operator identifies the relevant device through the Sentry service and quickly issues a request to erase all sensitive data. When the command reaches the device the data is eradicated and the proof is delivered to the relevant parties almost immediately. Authorised Internal Sentry Operator or Data Vault Security is asked to destroy a particular device. Data Vault Security Sentry Issues Self Destruct Command To Required Computer. The Sentry Process Device receives Sentry delete Instruction and shuts down.

Hosted Sentry service How does Sentry work? Sentry uses whichever communications channels an organisation uses to deliver the decommission instruction to the device. Whichever channel reaches the device first will trigger Sentry and the data will be deleted. For mobile workers Sentry uses the worldwide mobile broadband infrastructure as standard as well as the internet, meaning that a lost device can be contacted almost anywhere on earth. Sentry Clients Device Mobile Broadband All Other Broadband WI-FI / WI-MAX Intranet Extranet

Unrecoverable Data Deletion All selected data is deleted to the US Department of Defence 5220(M) standard which means it is effectively unrecoverable to all but the most sophisticated security organisations. Sentry finishes the job by rendering the operating system inactive, leaving the device completely useless.

Data Vault Security Sentry Audit Trail Traditional tools require a leap of faith that the data is safe because there is no information about the device – it is simply missing. The Sentry comprehensive decommission report proves that the data cannot be compromised and that the measures taken to achieve this have succeeded. The report shows a list of ALL files deleted, when, and very importantly, whether any were accessed in the time that the device was missing and unreached by Sentry. Culprit Identification and Device Location are also available.

Summary of Benefits at a Glance Sentry uses and will always use the fastest communications methods available to communicate with a computer, whatever the reason for the decommission. Sentry gives control to its users. No need to notify police or other authorities. After purchase Sentry is free to use – there are NO additional costs. Sentry is always active when its host computer is. When it receives a decommission instruction Sentry works quickly to leave the computer risk free. On a typical computer Sentry can destroy 500 MB of data made up of more than 4500 documents (2380 Word docs, 2127 Spreadsheets and several hundred s) in 103 seconds, too fast for the data to be seriously compromised. Sentry can be integrated with Data Vault Security Backup for ultimate protection.

Sentry Wi-Fi / RFID integration Sentry can be triggered by a location based RFID/Wi-FI system to destroy the data on a computer that leaves an authorised zone in a building or compound, for example a hospital. Where appropriate Sentry can be set to simply inform the user of a potential breach and compromise situation by text message or e- mail and await instruction to delete the data if necessary.

Sentry ticks all the boxes Sentrys integrated volume encryption or Full Disk Encryption integration make efforts to get round Sentry extremely difficult. Sentry integrates with leading data back up tools to provide an excellent route back to productivity in the shortest time possible. Sentry can be used as a proactive tool, for example with its device vacation functionality that searches for the device in designated downtimes such as user holidays. Sentry is a low cost insurance layer to help an individual or organisation keep its data for its own use only.

the data security specialists…