1 The future of Data Protection David Chow. 2 3.

Slides:



Advertisements
Similar presentations
Strategic Business Solutions : Solutions, Strategies, Success The SalesStrat Solution.
Advertisements

COMPREHENSIVE APPROACH TO INFORMATION SECURITY IN ADVANCED COMPANIES.
© 2007 IBM Corporation Enterprise Content Management Integrating Content, Process, and Connectivity for Competitive Advantage Malcolm Holden October 2007.
Joey Yep Technical Marketing, Seagate CSS Creating a Competitive Advantage with Cloud.
1 © Aberdeen Group 2013 – Not For Distribution ™ Meeting the Rising Challenge of Modern Networks.
1 ZIXCORP The BYOD Tug-of-War: Security versus Privacy Neil Farquharson January, 2015.
CONDO MANAGER The Leader in Association Accounting and Management Software Mailing Address: P.O. Box Charlotte, North Carolina Web Site
Don’t Let Anybody Slip into Your Network! Using the Login People Multi-Factor Authentication Server Means No Tokens, No OTP, No SMS, No Certificates MICROSOFT.
Iron Mountain’s Continuity Service ©2006 Iron Mountain Incorporated. All rights reserved. Iron Mountain and the design of the mountain are registered.
Sophos / Utimaco Data Loss Prevention Peter Szendröi, SOPHOS Nordics Jan 20, 2010.
With the Help of the Microsoft Azure Platform, Devbridge Group Provides Powerful, Flexible, and Scalable Responsive Web Solutions MICROSOFT AZURE ISV PROFILE:
Barracuda Networks Confidential1 Barracuda Backup Service Integrated Local & Offsite Data Backup.
Microsoft Premier Support for Partners Capitalize on cloud potential Receive and deliver end-to-end cloud support Ease customers’ transition to the cloud.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Confidential 1 MAP Value Proposition.
Company Overview DATASTOR in Education By: Mike Ehring.
Treasury in the Cloud Bob Stark – Vice President, Strategy September 17, 2014.
Cloud Computing! Aber sicher ?!? Ralf Schnell Customer Solutions Architect Principal Cloud Strategist
[Name / Title] [Date] Effective Threat Protection Strategies.
Findly Leads the World in Talent Innovation with Its Enterprise-Cloud for Global Talent Acquisition COMPANY PROFILE: FINDLY Findly is a SaaS ISV founded.
MOBILE DEVICE SECURITY. WHAT IS MOBILE DEVICE SECURITY? Mobile Devices  Smartphones  Laptops  Tablets  USB Memory  Portable Media Player  Handheld.
What Keeps You Awake at Night Compliance Corporate Governance Critical Infrastructure Are there regulatory risks? Do employees respect and adhere to internal.
1. Windows Vista Enterprise And Mid-Market User Scenarios 2. Customer Profiling And Segmentation Tools 3. Windows Vista Business Value And Infrastructure.
1 Solving the records management problem A cloud-computing approach to archiving Amanda Kleha Product Marketing, Google May 20, 2008.
©2011 Quest Software, Inc. All rights reserved. Patrick Hunter EMEA IDAM Team Lead 7 th February 2012 Creating simple, effective and lasting IDAM solutions.
Adra Match BALANCER: Balance Sheet Reconciliation Software Powered by the Microsoft Azure Cloud MICROSOFT AZURE ISV PROFILE: ADRA MATCH Adra Match develops.
Kevin Casady Hanna Short BJ Rollinson.  Centralized and Structured collection of data stored in a computer system  An electronic filing system  Easy.
 INADEQUATE SECURITY POLICIES ›Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA.
10/8/20151 Mobile Apps and QAD Stephen McHugh Broom Street Software 03-17,2013.
1 The Benefits of an SOA in the Contact Center Brian Garr Program Director, IBM Speech Solutions.
Project 2003 Presentation Ben Howard 15 th July 2003.
Ali Pabrai, CISSP, CSCS ecfirst, chairman & ceo Preparing for a HIPAA Security Audit.
Mobilise Your Business in Days with Crimson Tide’s mpro5 Enterprise Solution on Microsoft Azure! MICROSOFT AZURE ISV PROFILE: CRIMSON TIDE Crimson Tide.
Securely Synchronize and Share Enterprise Files across Desktops, Web, and Mobile with EasiShare on the Powerful Microsoft Azure Cloud Platform MICROSOFT.
Revolutionized, Automated Cash and Gratuity Management for the Hospitality Industry, Thanks to Microsoft Azure MICROSOFT AZURE APP BUILDER PROFILE: Evention.
© 2014 IBM Corporation Does your Cloud have a Silver Lining ? The adoption of Cloud in Grid Operations of Electric Distribution Utilities Kieran McLoughlin.
The Experts in Exchange Migration™ MIGRATING TO EXCHANGE OR OFFICE 365 TechSummit – Phoenix 2015.
ORCALE CORPORATION:-Company profile Oracle Corporation was founded in the year 1977 and is the world’s largest s/w company and the leading supplier for.
SAM for SQL Workloads Presenter Name.
Microsoft and Symantec
Computer Security By Duncan Hall.
Alliance Key Manager for Windows Azure Puts Encryption Key Management and Data Breach Security at Your Fingertips COMPANY PROFILE: TOWNSEND SECURITY Townsend.
Data Center Management Microsoft System Center. Objective: Drive Cost of Data Center Management 78% Maintenance 22% New Issue:Issue: 78% of IT budgets.
What’s New Data Loss Prevention 14. Information is Everywhere Brings Productivity, Agility, Convenience ……and Problems Copyright © 2015 Symantec Corporation.
Flight is a SaaS Solution that Accelerates the Secure Transfer of Large Files and Data Sets Into and Out of Microsoft Azure Blob Storage MICROSOFT AZURE.
45 minutes south of the Twin Cities on Interstate 35 Population approximately 25,000.
INNOVATE THROUGH MOTIVATION Mobile Computing & Your Business KEVIN KIRKPATRICK – OWNER, MSP INC LOGO.
Zentera Guardia Fabric ™ Securely Connects Client-Server Apps between Microsoft Azure, Enterprise Datacenters & Other Public Clouds MICROSOFT AZURE ISV.
Why EMS? What benefit does EMS provide O365 customers Manage Mobile Productivity Increase IT ProductivitySimplify app delivery and deployment LOB Apps.
Enterprise Mobility Suite: Simplify security, stay productive Protect data and empower workers Unsecured company data can cost millions in lost research,
Sponsored by: 1 The State of Corporate A Survey of IT Professionals October 2013.
ProcessFrame QMS Is a Quality Management System that Supports ISO 9001:2015 Standard and Runs on the Microsoft Azure Cloud Platform MICROSOFT AZURE ISV.
©2015 Check Point Software Technologies Ltd. 1 [Restricted] ONLY for designated groups and individuals CHECK POINT MOBILE THREAT PREVENTION.
AEO COMPLIANCE PROGRAM Authorized Economic Operator Requirements.
MICROSOFT AZURE APP BUILDER PROFILE: RAVERUS LTD. Raverus is a customer-driven company engaged in providing software applications designed to improve and.
Managed IT Services JND Consulting Group LLC
WELCOME TO A WORLD OF SHARING. Collaboration as a Service Service-minded vision based on cloud collaboration With a vision rooted in the belief that progress.
Call-Center Agents, Customers Communicate More Conveniently with SMS Chat App COMPANY PROFILE: EARLY CONNECT Early Connect is a regional SaaS ISV founded.
ABOUT COMPANY Janbask is one among the fastest growing IT Services and consulting company. We provide various solutions for strategy, consulting and implement.
The time to address enterprise mobility is now
Blue Ribbon BUSINESS TRAVEL INTERNATIONAL
Hybrid Management and Security
Free Cloud Management Portal for Microsoft Azure Empowers Enterprise Users to Govern Their Cloud Spending and Optimize Cloud Usage and Planning MICROSOFT.
Wonderware Online Cost-Effective SaaS Solution Powered by the Microsoft Azure Cloud Platform Delivers Industrial Insights to Users and OEMs MICROSOFT AZURE.
BOMGAR REMOTE SUPPORT Karl Lankford
COMPREHENSIVE APPROACH TO INFORMATION SECURITY IN ADVANCED COMPANIES
Voice Analytics on Microsoft Azure Allows Various Customers to Get the Most Out of Conversations with Clients Through Efficient Content Analysis MICROSOFT.
MyCloudIT Enables Partners to Drive Their Cloud Profitability Using CSP-Enabled Desktop Hosting Automation with Microsoft Azure and Office 365 MICROSOFT.
MICROSOFT AZURE ISV PROFILE: ONEBE
OU BATTLECARD: Oracle Identity Management Training
Presentation transcript:

1 The future of Data Protection David Chow

2

3

4

5

What to learn ? 6 Overtaking is decided much more by the better line and later brake point than the acceleration and top speed of a car Excellent Brakes – or more abstract: excellent security – makes a Formula 1 car better than its peers

Translated to the business 7 Businesses are today under huge pressure to drive faster increasing their risk at the same time In our data driven industries - > the risk for the business is the risk of the data Best-in-class security is needed Good data protection makes a business drive faster and overtake their competition

Case 1: Technology changes increase the risk 8 Mobile Devices Software as a Service platforms Virtualization

Case 2: Employee behaviour has changed 9

Where do data leakages occur? Source: IDG, Study Results from Data Leakage Business Survey, February % 12% 20%

Who wants Free WiFi ? 11 Details of online activity are easily captured and can be replicated to get into the account. e.g. FreeWiFi$0Hl($I0{ EOEBEEEJEBCACACACACACACACACACACA($I`HTTP/ OKServer: Apache-Coyote/1.1Server: Betex HTTP ServerSet- Cookie: JSESSIONID=C49D0B7439D67452D3D2FFBC3223AB5D; Path=/Set-Cookie: betexPtk=betexLocale%3Den%7EbetexRegion%3DGBR%7Ebet exCurrency%3DGBP%7EbetexTi meZone%3DEurope%2FLondon; Domain=.betfair.com; Expires=Sat, 21-Jan :44:13 GMT; Path=/Set-Cookie: betexPtkSess=betexRegionSessionCookie%3DGBR%7EbetexL ocaleSessionCookie%3Den%7Eb etexSkin%3Dstandard%7EbetexTimeZoneSessionCookie%3DE urope%2FLondon%7EbetexCurre ncySessionCookie%3DGBP%7EbetexBrand%3Dbetfair; Domain=.betfair.com;

Case 3: Sloppiness + underestimated data value million data records lost on 2 unprotected CDs Per data record: Names, addresses, bank details, familiy status, insurance status, tax details Estimated value per record for criminals: 60 GBP p.r. Estimated value of the package: 1.5bn GBP Estimated productivity loss at banks: 2-3bn GBP Estimated cost for prevention: GBP Official result of the investigation: „loss of data was entirely avoidable“, „serious flaws in security management, processes, poor communication and low morale“ – a „muddle-through culture“

Recession times are risky Tech staff admit they'd steal secrets if laid off Most IT staff would steal sensitive company information, including CEO's passwords and customer details, if they were laid off, according to a new survey from Cyber-Ark. A staggering 88 percent of IT administrators admitted they would take corporate secrets, if they were made redundant.

Case 4: Professional industry espionage 14

Lets structure the different cases 15 Employee underestimates data value High marketability and monetization of PII data „Risk increasing“ technologies for data sharing „Risk denying“ behaviour of employees handling data

A model for Data Security 16

Data Security is always optimization 17

What do we provide ? 18 Better end user acceptance: -Transparency for the enduser - Easy Data sharing - Single sign-on -Easy recovery processes Simplicity = Consistency = Better security - One management console for -Synchronisation with AD -Fast and easy initial encryption -Transparent keyrings - Quick reports Expert support: -Local 1st Level support -Best in class partners and services

Raising the optimization curve 19 Better end user acceptance: -Transparency for the enduser - Easy Data sharing - Single sign-on -Easy recovery processes Simplicity = Consistency = Better security - One management console for -Synchronisation with AD -Fast and easy initial encryption -Transparent keyrings - Quick reports Expert support: -Local 1st Level support -Best in class partners and services

The Sophos advantage 20 True Value Generation for our customer Better end user acceptance Simplicity = Better security Expert support => We allow our customers to drive their business faster

21 Rule No. 1 – protect data everywhere Deploy on all devices Don´t forget removable media Think about servers and SaaS All users and all computers sync‘ed from the directory One Management console One Reporting and Auditing

Rule No. 2 – Simplicity is better Security 22 $ Least investment Best security Reduces operational complexities of security Minimizes training requirements, eliminates need for deep internal security expertise Ensures high quality and responsive support/service Makes security manageable, ensures consistency Comprehensive capabilities, without conflicting agents Ensures compliance across the enterprise delivers Simplicity

Digital nomads combining work and fun Sophos technologies BehaviorContent EnforcementAuthorization Rule No. 3 – Security solutions acting in concert

Rule No. 4 – Analyze for weak links Example: Encryption is only secure if your key is secure

Sophos Data Protection pushes your racing line 25

26 Any questions ?