Simple and Secure Approach to Discovery at the Desktop.

Slides:



Advertisements
Similar presentations
GCSE ICT Networks & Security..
Advertisements

NSFdeposit.com Telephone Checks. NSFdeposit.com Telephone Checks New Automated On-line Payment System One time sign-up; intelligent engine Unique file.
Choose and Book Archive New functionality from November 2012.
Welcome to the Award Winning Easiest to Use & Most Advanced View, Manage, and Control Security, Access Control, Video, Energy & Lighting Systems, & Critical.
Automated Payment System. Benefits There is minimal training needed No expensive equipment necessary You can maintain your existing banking relationship.
1 © Copyright 2013 EMC Corporation. All rights reserved. Online File Synchronization and Sharing for the Enterprise.
Backup and Disaster Recovery (BDR) A LOGICAL Alternative to costly Hosted BDR ELLEGENT SYSTEMS, Inc.
Current Security Threats WMO CBS ET-CTS Toulouse, France May 2008 Allan Darling, NOAA’s National Weather Service WMO CBS ET-CTS Toulouse, France.
Data Security for Healthcare Facilities Debbie Abbott Health Information Consultant Resolutions (Int) Pty Ltd.
Hackers They can u Read the data files u Run the application programs u Modify some files which may cause damages Individuals who gain unauthorized access.
Security Management IACT 918 July 2004 Gene Awyzio SITACS University of Wollongong.
Security Management IACT 418/918 Autumn 2005 Gene Awyzio SITACS University of Wollongong.
Wonga example Register Question- What risks do you think businesses face due to IT developments?
Small Business Security By Donatas Sumyla. Content Introduction Tools Symantec Corp. Company Overview Symantec.com Microsoft Company Overview Small Business.
Term 2, 2011 Week 3. CONTENTS Network security Security threats – Accidental threats – Deliberate threats – Power surge Usernames and passwords Firewalls.
Electronic Customer Portal System. Reducing Risks – Increasing Efficiency – Lowering Costs Secure Internet based Communication Gateway direct to your.
SHARESYNCPage 1 of 2 ShareSync is a business-grade file sync and share service Sync files across devices Share files and folders easily and securely Business-grade.
 background and intro  client deployment  system Architecture and server deployment  behind the scenes  data protection and security  multi-server.
Data Security GCSE ICT.
Viruses & Security Threats Unit 1 – Understanding Computer Systems JMW 2012.
Network Security in a Business Setting By: Brian Haumschild.
Chapter 11 Security and Privacy: Computers and the Internet.
November 10, 2010 Washington, D.C.. Agenda Secure Component tool Secure Component tool Contacts and Messaging Contacts and Messaging Workspaces Workspaces.
1 Objectives Windows Firewalls with Advanced Security Bit-Lock Update and maintain your clients using Windows Server Update Service Microsoft Baseline.
Classroom User Training June 29, 2005 Presented by:
About Dynamic Sites (Front End / Back End Implementations) by Janssen & Associates Affordable Website Solutions for Individuals and Small Businesses.
what is contacts? In-contacts is an online contacts database designed from the ground up to be compatible with modern business needs.
INTERNET PRIVACY Marketing companies The cookie leak security hole in the HTML messages The Web Bug Can we trust the privacy.
XHTML Introductory1 Linking and Publishing Basic Web Pages Chapter 3.
Managing and Securing Endpoints Bruce Hotte Chief Information Officer Jeff Swan Network Supervisor  The definition of “endpoint” used to be simple: a.
Security and backups GCSE ICT.
The way Archiving should be!.  Many organisations have either no archiving policy or is severely fragmented.  Archiving is considered as just another.
©2006, CSA Creating and Managing Your COS Expertise Profile Managing Your CV and Promoting Your Work ® Resources for Research, Worldwide.
Configuring and Troubleshooting Identity and Access Solutions with Windows Server® 2008 Active Directory®
ARE YOU BEING SAFE? What you need to know about technology safety Shenea Haynes Digital Citizenship Project ED 505.
COMP3121 E-Commerce Technologies Richard Henson University of Worcester November 2011.
What is and How Does it Work?  Electronic mail ( ) is the most popular use of the Internet. It is a fast and inexpensive way of sending messages.
Starter How many methods of keeping data secure can you think of… Username and Password Biometrics Digital Signature Encryption Access Levels Physical.
نظام الإحصاء الإلكتروني e-Statistics System Information Technology & Centralized Statistical Systems Department Dubai Statistics Center.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
CPT 123 Internet Skills Class Notes Internet Security Session A.
 background and intro  client deployment  system Architecture and server deployment  behind the scenes  data protection and security  multi-server.
Physical ways of keeping your system secure. Unit 7 – Assignment 2. (Task1) By, Rachel Fiveash.
Deepnet Unified Authentication for Outlook Anywhere.
Your Database Solution Jason King. Benefits of a Database Centralized information Searchable Save space from multiple orders from one client.
1 Objectives Windows Firewalls with Advanced Security Bit-Lock Update and maintain your clients using Windows Server Update Service Microsoft Baseline.
Module 7 Planning and Deploying Messaging Compliance.
Encryption and Hacking By Steph Garrihy. What is Encryption? Encryption is when data is scrambled by software using a preset key so that anyone viewing.
McGraw-Hill/Irwin The Interactive Computing Series © 2002 The McGraw-Hill Companies, Inc. All rights reserved. Microsoft Access 2002 Using Access Tools.
What is hacking? Hacking is the use of a computer and its files with out being allowed by the owner. Hacking is used to find out peoples passwords and.
Firewall firewalls Is a program on your computer to protect your computer from all types of threats and if you have a server and you wasn’t to protect.
A user guide to accessing, reviewing and contributing to the Online Registry System.
Visual Basic for Application - Microsoft Access 2003 Finishing the application.
MANAGING RISK. CYBER CRIME The use of the internet and developments in IT bring with it a risk of cyber crime. Credit card details are stolen, hackers.
Step 1of 11 Admin Demonstrations Click Here to Start.
Directory Services CS5493/7493. Directory Services Directory services represent a technological breakthrough by integrating into a single management tool:
Offices and factories in the future. Now, IT has affected the offices and factories. Indeed, your work table is not the table in office. It should be the.
GCSE Computing: A451 Computer Systems & Programming Topic 3 Software System Software (2) Utility Software.
ELISTING How to use eListing to conveniently and quickly file your personal property listing online. DEPARTMENT OF ASSESSMENTS King County To navigate.
Computer Security Sample security policy Dr Alexei Vernitski.
M2 Encryption techniques Gladys Nzita-Mak. What is encryption? Encryption is the method of having information such as text being converted into a format.
ID8 TEAM 2012 Caroline Amaba Ryan Gavin Mike Hegadorn Greg McLeod John Scire Nirmal Rajan.
Primary/secondary data sources Health and safety Security of Data Data Protection Act.
How to Make Yourself More Secure Using Public Computers and Free Public Wi-Fi.
Network and Server Basics. Learning Objectives After viewing this presentation, you will be able to: Understand the benefits of a client/server network.
8 – Protecting Data and Security
Internet Business Associate v2.0
Chapter 6 Application Hardening
Common Methods Used to Commit Computer Crimes
Microsoft Dumps
Presentation transcript:

Simple and Secure Approach to Discovery at the Desktop

Today’s Discovery Challenges?

Agenda How Hard Can it Be? Why Data Discovery Needs to be Secure Data on the Desktop Local Versus Server Based Indexes The Art of Index Encryption But What about Speed Degradation Single-Click tm Federated Search Real Time Federated Searching To Sum Up

How Hard Can it Be? For the user as simple as unlocking a door For the unauthorised user, as unfulfilling as opening an empty box.

Why Data Discovery Needs to be Secure Stop unauthorised access Prevent data theft Allow a complete index & search solution to be deployed Give total piece of mind to the data & content owners

We all do it! But should it be there? A secure discovery tools should – Discover & Index Desktop Files Discover & Index File Servers Discover in ‘real time’ data in transit Encrypt the complete index (where applicable) Users should be trained to use file servers & or DM Servers Desktops are insecure Data on The Desktop

Local Versus Server Indexes Why should you have to choose? A secure local index to maintain local s & off line files A secure server index to allow online access to file servers with a secure search to access back office data sources. All indexes should be encrypted, password protected All files should be transmitted encrypted. They are your business after all!!! Both indexes and other data should be accessible with a ‘Single Click Search’ tm If you have to choose, Then it is not a choice!

The Art of Index Encryption Keys should be unique Applications should allow authorised access only Server based files should be transmitted in an encrypted format, and deleted by the client application Desktop: each user should have a unique index Server: Should be behind a firewall. It is not art. Just common sense.

But What About Speed Degradation There should be none Security != bad performance No Security == lost & stolen information To compromise on security is to pass your details to others.

Personal Data Company Data Secure Personal Index Secure Company Index Internet Data Single-Click tm Federated Search

Real Time Federated Searching Static data is indexed, and continuously updated. Databases and production systems are queried in real- time, which means results are always up-to-date. Search results from both static indexes and live systems are collated on the fly and returned to the user a a single result set. A secure data discovery tool will provide a full search result

To Sum Up All indexes and transferred data should be encrypted. Security profiles should be used to verify access rights. Users should only see results they have permission to see. Index & Search Server must not send any information to any other systems. Discovery tools should be able to discover data in transit Images should be fully indexed and searchable We Believe: