1 © Jetico, Inc. Oy Military-Standard Data Protection Software Customer Challenges with Classified Data Spills.

Slides:



Advertisements
Similar presentations
Max Secure Software founded in Jan 2003 develops innovative privacy, security, protection and performance solutions for Internet users. The company is.
Advertisements

Copyright © 2012, Big I Advantage®, Inc., and Swiss Re Corporate Solutions. All rights reserved. (Ed. 08/12 -1) E&O RISK MANAGEMENT: MEETING THE CHALLENGE.
Share Your PC Get Started. Sharing a computer used to mean that others could see your private files, install software you didn't want, or change your.
How to Manage a Contamination Incident Defense Security Service Carolyn Shugart Information Technology Specialist Standards & Quality Branch.
Managing a “Data Spill” Corrie Velez Technical Security Orlando, Florida March 14, 2012.
Understanding secure data erasure and end-of-lifecycle IT asset management.
Personal Data Protection and Security Measures Justin Law IT Services - Information Security Team 25 & 27 November 2013.
This presentation will take a look at to prevent your information from being discovered by and investigator.
1. Intro What is PremiumAV? Antivirus engine Features of PremiumAV. Classification of PremiumAV. PremiumAV LAB Re-Branding or Private Label Why Re- Branding.
Steve Garner Ag Communications Services IT Manager.
Part 2 of Evil Lurking in Websites Data Security at the University of Wisconsin Oshkosh.
Guide to Massachusetts Data Privacy Laws & Steps you can take towards Compliance.
Personal Data Protection and Security Measures Justin Law IT Services - Information Security Team 18, 20 & 25 March 2015.
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Copyright © 2006 by The McGraw-Hill Companies,
You can run that from a USB Drive ? Portable Applications: the good, the bad and the ugly Jeff Gimbel © 2007.
Apple Technical White Paper Presented By : Rajhesh Babu.
1st Choice Document Destruction, Inc (a member of the NAID Association) is proud to be an exclusive distributor for “The Guardian” Hard Drive Destroyer.
Gordon Hughes Feb T13 Change Request re Security Erase Gordon Hughes, UCSD Formerly Seagate (until 1997) PI.
Lesson 46: Using Information From the Web copy and paste information from a Web site print a Web page download information from a Web site customize Web.
A Feature-Based of IT Automation using kaseya’s agent procedure called the wiping of unallocated disk space using cipher.exe Developed By: Estuardo Fernandez.
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 14: Problem Recovery.
Installing and Troubleshooting Hardware Device and Drivers Chapter 6 powered by dj.
OPERATION SYSTEM (WINDOWS) VIRUS REMOVAL. COMPUTER VIRUS - Type of malware that, when executed, replicates by inserting copies of itself (possibly modified)
CLOUD AND SECURITY: A LEGISLATOR'S PERSPECTIVE 6/7/2013.
© 2012 The McGraw-Hill Companies, Inc. All rights reserved. 1 Third Edition Chapter 5 Windows XP Professional McGraw-Hill.
POSITIONING STATEMENT For people who operate shared computers with Genuine Windows XP, the Shared Computer Toolkit is an affordable, integrated, and easy-to-use.
Active KillDisk © v3.0 Active Data Security Solutions.
Ways to organize electronic files Witness fitness By: Simran and Navneet.
PLUG IT IN 7 Protecting Your Information Assets. 1.How to Protect Your Assets: The Basics 2.Behavioral Actions to Protect Your Information Assets 3.Computer-Based.
 INADEQUATE SECURITY POLICIES ›Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA.
Privacy and Information Management ICT Guidelines.
© CCI Learning Solutions Inc. 1 Lesson 5: Basic Troubleshooting Techniques Computer performance Care of the computer Working with hardware Basic maintenance.
PRIVACY, SECURITY & ID THEFT PREVENTION - TIPS FOR THE VIGILANT BUSINESS - SMALL BUSINESS & ECONOMIC DEVELOPMENT FORUM October 21, WITH THANKS TO.
Computer Security By Rachel Gaines. Computers are used for work, play, and everything in between. So here’s how to keep it fun and protected.
DEFENSE SECURITY SERVICE DSS Role in International Security.
Microsoft Office Outlook 2013 Microsoft Office Outlook 2013 Courseware # 3252 Lesson 6: Organizing Information.
Configuring Data Protection Chapter 12 powered by dj.
Module 6: Designing Security for Network Hosts
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
SMARTPHONE FORENSICS 101 General Overview of Smartphone Investigations.
Administrative Inquiries
Forensics Jeff Wang Code Mentor: John Zhu (IT Support)
The Problem YOU are responsible for confidential, mission- critical data... but.
Palm Creek RV and Golf Resort December 07, 2011 Garth Vanstone.
Managing a “Data Spill”
Society & Computers PowerPoint
System Restore BCIS 3680 & BCIS Better Safe than Sorry  Before installing programs used in this course (NetBeans, MySQL, etc.), it’s highly recommended.
About Us AVG is a global security software maker protecting 98 million active users in 170 countries from the ever-growing incidence of Web threats, viruses,
NETWORK SECURITY Definitions and Preventions Toby Wilson.
Data-Tech Guardian Endpoint Security Suite. Guardian Endpoint Security Suite secures All Things Mobile TM from one management console.
Dell Compellent and SafeNet KeySecure
Lesson 22: Configuring System Recovery
Microsoft 365 Get help with regulatory compliance
Malware aka- malicious software By: Ken Fogel
Domain 2 – Asset Security
How does Norton Warns of Safety Threats?. Norton antivirus is security software that is used widely across the globe for the protection of the devices.
How to Fix Outlook "Not Responding" Issue?
How to Resolve Blue Screen Error Display on your HP Computer?
Immediate help for your Avast related issue Call us Now (Toll-Free)
Steps to Fix QuickBooks Error Code QuickBooks is world’s leading accounting software, trusted by millions of business owners in managing their.
 Security is a must today. If your device is not secure with updated antivirus then it is surely vulnerable to the attacks of dangerous viruses, spyware.
Mcafee updates Mcafee antivirus uses a database of known virus definitions to identify malware and other threats on your computer system. So it is important.
HQMC ISC BRIEF FEBRUARY 6, 2007
Protecting Your Information Assets
Computers: Tools for an Information Age
Each month you need to do these:
Bethesda Cybersecurity Club
Solutions to Secure File Deletion
NPHS 1510 Federal and International
Presentation transcript:

1 © Jetico, Inc. Oy Military-Standard Data Protection Software Customer Challenges with Classified Data Spills

2 © Jetico, Inc. Oy About Us >Located in Otaniemi Science Park, Espoo, Finland >Established in 1995 >Crew of 13 persons >Most notable for developing U.S. DoD-Approved, BCWipe data wiping software >Profitable throughout company history 80% of the revenues from USA in last fiscal year

3 © Jetico, Inc. Oy 15,000+ customers in over 100 countries >Trusted by Military, Police and Government agencies, all of the top 10 U.S. Defense Contractors and many National Laboratories >Jetico’s customers need solutions to protect their highly sensitive information or mission-critical data Preventing costly data leakage Encryption of stored data Cleaning up classified data spills Sharing workstations without sharing classified data Sanitization for computer disposal, decommission or reuse Clearing untrusted data (malware) off classified systems Compliance with security and privacy laws

4 © Jetico, Inc. Oy Challenge: Classified Data Spills >“Classified Spills (also known as contaminations or classified message incidents) occur when classified data is introduced to an unclassified computer system or to a system accredited at a lower classification than the data.” >“Hard drives involved in a classified spill should be wiped using an NSA or NIAP-approved product” - DSS ISFO Process Manual for C&A of Classified Systems under NISPOM (March 1, 2010)

5 © Jetico, Inc. Oy Solution: Cleaning Up with BCWipe >BCWipe to surgically clear selected data files >BCWipe Total WipeOut to erase entire hard drives

6 © Jetico, Inc. Oy “BCWipe works very well in our lab and does exactly what it’s supposed to do. Beyond using it myself, I have recommended BCWipe to our customers for clearing a disk of contaminated files or responding to a data spillage event.” - Frank T., Principal Engineer, Data Domain Solution: Cleaning Up with BCWipe “Your product is listed as the one to use in cases where we need to wipe deleted files from a computer. Our operation was to install your software, do a wipe of deleted files and then use the control panel to remove said software, before going on to the next affected computer…” - Information Assurance Officer

7 © Jetico, Inc. Oy BCWipe Innovations >New Transparent Wiping feature in BCWipe 4.0 securely wipes deleted or temp files automatically on the fly “With BCWipe's Transparent Wiping running in the background, I will always be working in a totally clean environment.” - Bruce Schneier, Security Expert

© Jetico, Inc. Oy Join Jetico! Phone: