1 Proprietary & Confidential. 2 When Not Controlling Info... Proprietary & Confidential  High costs when loosing…  Financial documents  M&A info (UBS.

Slides:



Advertisements
Similar presentations
The traditional perimeter is rapidly eroding IT needs continuous data protection that work across ‘classic ‘boundaries’ Consumerization of IT Users.
Advertisements

Steve Jordan Director. Industry Solutions 05/05/14 Managing Chaos: Data Movement in 2014.
© 2012 Citrix | Confidential – Do Not Distribute BYOD Champion Presentation CIO How-To Kit: Bring-Your-Own Devices © 2014.
Persistent Protection Using E-DRM Technology Jason Fasoo 06/18/2008.
Information Security Policies Larry Conrad September 29, 2009.
Advantages of IT Security Prof. Uldis Sukovskis, CISA Riga Information Technology Institute Secure information exchange in Electronic media Baltic IT&T.
Sophos / Utimaco Data Loss Prevention Peter Szendröi, SOPHOS Nordics Jan 20, 2010.
Security, Continuity & Compliance Gordon McKenzie Business Development Director, Syan Limited.
Chapter 9 Information Systems Controls for System Reliability— Part 2: Confidentiality and Privacy Copyright © 2012 Pearson Education, Inc. publishing.
1 © Copyright 2007 EMC Corporation. All rights reserved. EMC Documentum Information Rights Management EMC Content Management and Archiving.
© 2012 McGladrey LLP. All Rights Reserved.© 2014 McGladrey LLP. All Rights Reserved. © 2012 McGladrey LLP. All Rights Reserved. © 2013 McGladrey LLP. All.
What is the problem we are trying to solve? Users want to work anywhere on any device IT needs to retain control and manage risk.
© 2011 Autodesk Securing AutoCAD IP in the era of WikiLeaks Presenter: Rahul Kopikar Co-Founder, Seclore Technology.
Clinton Ho Program Manager Microsoft Corporation SESSION CODE: SIA311.
Information Security Decision- Making Tool What kind of data do I have and how do I protect it appropriately? Continue Information Security decision making.
RSA Security Validating Users and Devices to Protect Network Assets Endpoint Solutions for Cisco Environments.
Copyright © 2012, Oracle and/or its affiliates. All rights reserved. Insert Information Protection Policy Classification from Slide 13 1 John Caulfield.
INFORMATION SECURITY THE NEXT GENERATION 13 th World Electronics Forum Israel Christopher Joscelyne Board Member & Membership Chairman AEEMA November 2007.
Looking to Build a Secure Enterprise Mobile Application? Here’s How! Mush Hakhinian Chief Security Architect Intralinks Mush Hakhinian Chief Security Architect.
Social Media Jeevan Kaur, Michael Mai, Jing Jiang.
What Keeps You Awake at Night Compliance Corporate Governance Critical Infrastructure Are there regulatory risks? Do employees respect and adhere to internal.
General Counsel Online How Technology is Reshaping the Corporate Law Office Corporate Counsel Technology Institute Widener University School of Law Name:George.
Dell Connected Security Solutions Simplify & unify.
Keep Your Information Safe! Josh Heller Sr. Product Manager Microsoft Corporation SIA206.
Archiving s. How to Manage Auto-Archive in Outlook Your Microsoft Outlook mailbox grows as you create and receive items. To manage the space.
Perimeters and Unicorns: Two Things That Only Exist in IT Fairyland Gary Paluch, CISSP, Sr. Sales Engineer.
Instructional & Information Technology Services Fall, Activities and Updates Teresa Macklin Information Security Officer Information Security.
Chapter 5 Network Security
BEN ROBINSON, ACCOUNT EXECUTIVE, PALO ALTO NETWORKS SAFELY ENABLE YOUR SAAS APPLICATIONS.
Access and Information Protection Product Overview Andrew McMurray Technical Evangelist – Windows
Security Version 6.1 | August Need for Complete Security Stop threats at the perimeter High volume spam, phishing, viruses and.
© 2009 WatchGuard Technologies WatchGuard XCS Data Loss Prevention Ensuring Privacy & Security of Outbound Content.
Develop your Legal Practice using “Cloud” applications, but … Make sure your data is safe! Tuesday 17 November 2015 The Law Society, London Allan Carton,
Engineering and Management of Secure Computer Networks School of Engineering © Steve Woodhead 2009 Corporate Governance and Information Security (InfoSec)
Providing access to your data: Handling sensitive data Robert R. Downs, PhD NASA Socioeconomic Data and Applications Center (SEDAC) Center for International.
Keep Your Information Safe! Josh Heller Sr. Product Manager Microsoft Corporation SIA206.
Enterprise Mobility Suite: Simplify security, stay productive Protect data and empower workers Unsecured company data can cost millions in lost research,
Identity Awareness and Data Loss Prevention Effective DLP David Miller Sr. Director, Security Products October 15, 2009.
Cloud, big data, and mobility Your phone today probably meets the minimum requirements to run Windows Server 2003 Transformational change up.
Total Enterprise Mobility Comprehensive Management and Security
1 1 IronKey Features Mapped to Market Segments. 2 2 IronKey Solutions Data protection for compliance Consolidate strong authentication Disaster recovery.
Pioneers in secure data storage devices. Users have become more accustomed to using multiple devices, are increasingly mobile, and are now used to storing.
Azure Information Protection
Cloud adoption NECOOST Advisory | June 2017.
“Introduction to Azure Security Center”
Sales Infinite CRM Software Solution
92% of the world’s data was created in the past 2 years
Deployment Planning Services
Protect sensitive information with Office 365 DLP
9/4/2018 6:45 PM Secure your Office 365 environment with best practices recommended for political campaigns Ethan Chumley Campaign Technology Advisor Civic.
Information Protection
IWRITER 365 Offers Seamless, Easy-to-Use Solution for Using, Designing, Managing, and Sharing All Your Company Templates in Microsoft Office 365 OFFICE.
Smart Org Charts in Microsoft Office 365: Securely Create, Collaborate, Edit, and Share Org Charts in PowerPoint and Online with OrgWeaver Software OFFICE.
SAP Dynamic Authorization Management by NextLabs
Company Overview & Strategy
Microsoft Ignite NZ October 2016 SKYCITY, Auckland
Azure Information Protection
O365 Data Compliance Control of sensitive data is key to cloud adoption Addressing Legal and Regulatory Data Compliance requirements is now a critical.
Azure Information Protection
Access and Information Protection Product Overview October 2013
BluVault Provides Secure and Cost-Effective Cloud Endpoint Backup and Recovery Using Power of Microsoft OneDrive Business and Microsoft Azure OFFICE 365.
Tap into a new market with Office 365 Government
EDRMS Rollout – Steps to Implementation
4/9/ :42 PM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
System Center Marketing
Web Information Systems Engineering (WISE)
Microsoft Data Insights Summit
Presentation transcript:

1 Proprietary & Confidential

2 When Not Controlling Info... Proprietary & Confidential  High costs when loosing…  Financial documents  M&A info (UBS & GM incident)  Government  IP  Customer info  Reduced shared price due to lack of market confidence (Wikileaks and BOFA)  Regulatory fines due to non-compliance  Impact to organization brand  Reduced competitive advantage  Julian Assange

3 Info in De-Perimeterized Age How do we control our sensitive info? Perimeter Security? Where we have… Too many locations Too many exits Too many devices Cloud is here!

4 Secure Islands’ IQProtector

5 The Solution: Adding “Business Value” to Encryption

6 6

7 Policy Driven Compartmentalization Finance – construction of a “Chinese Wall” between corporate-advisory data and brokering departments Legal – compartmentalization based on deals or litigation Enterprise – compartmentalization of sensitive data (like HR, salaries, M&A, legal, and financial) and intellectual property from IT personnel, and others Government and Defense – establishing compartmentalized information policies based on security clearance levels Manufacturing & Automobile - Safeguarding critical research, engineering and manufacturing IP Automatic File & Encryption Secure collaboration among partners and customers Complementing or replacing device encryption such as laptop/desktops or DVD/CD and USB memory sticks Automatic folder encryption Policy Driven Protection based on Classification Enforce corporation classification policies Enforce government classification policies Enforce automatic, user, and system recommendation classification based on content, context, and identity Application Data Protection Protecting sensitive information derived from CRM, Billing systems, and other LOB application in reports or rendered data within application Salesforce.com and other SaaS – including pre- defined settings and policies for Salesforce.com to simplify policy definition Why Customers Choose Us

8 Why Secure Islands? The “missing link” solution in data protection encryption and E-DRM Fortune 100 references Proven technology Proprietary & Confidential