© Copyright 2008 by Themis Software Ltd. All intellectual property rights are reserved and protected by international copy protection and trademark laws.

Slides:



Advertisements
Similar presentations
Professional Services Overview
Advertisements

Identity & Security. Today's IT Security challenges Rising Internal Attacks 75% of companies report insiders responsible for breaches Growing headcount.
Westbrook Technologies from Document Management’s Role in HIPAA.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential 14854_10_2008_c1 1 Holistic Approach to Information Security Greg Carter, Cisco Security.
Chapter 10 Accounting Information Systems and Internal Controls
Chapter 7 Control and AIS Copyright © 2012 Pearson Education, Inc. publishing as Prentice Hall 7-1.
Control and Accounting Information Systems
FLAXEM SYSTEM ENTERPRISES
Technology Applications in the Age of Integrity Integrity Forum 2006 Tony Murphy Vice President, Worldwide Sales ACL Services Ltd.
Click to start. Next Generation Business Industries and Platinum Safety introduce.
“High Performing Financial Institutions and the Keys to Success in an Uncertain Environment”
Data Security for Healthcare Facilities Debbie Abbott Health Information Consultant Resolutions (Int) Pty Ltd.
Tax Risk Management Keeping Up with the Ever-Changing World of Corporate Tax March 27, 2007 Tax Services Bryan Slone March 27, 2007.
Chapter © 2009 Pearson Education, Inc. Publishing as Prentice Hall.
Sarbanes-Oxley Compliance Process Automation
Security Controls – What Works
Chapter 7 Control and AIS Copyright © 2012 Pearson Education, Inc. publishing as Prentice Hall 7-1.
Symantec Vision and Strategy for the Information-Centric Enterprise Muhamed Bavçiç Senior Technology Consultant SEE.
© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company All rights reserved. Security Policies and Implementation Issues.
ECM Base Compliance Input Messaging & Alert Compliance dashboard Compliance Monitoring Internal & External Audit Tracking Access Control Compliance & Financial.
Software Asset Management
1 Business Continuity and Compliance Working Together Kristy Justice, AVP WaMu Card Services 08/19/2008.
1 Managed Security. 2 Managed Security provides a comprehensive suite of security services to manage and protect your network assets –Managed Firewall.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Adam Leidigh Brandon Pyle Bernardo Ruiz Daniel Nakamura Arianna Campos.
© 2014 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license.
Presenting The Broker-Dealer Certification Tool The Compliance Department Inc. Broker Dealer Compliance Consultants Compliance SCORE Powered by Keane BRMS.
Evolving IT Framework Standards (Compliance and IT)
Chapter 3 Internal Controls.
1. Windows Vista Enterprise And Mid-Market User Scenarios 2. Customer Profiling And Segmentation Tools 3. Windows Vista Business Value And Infrastructure.
SESSION IV. M I S MIS refers broadly to a computer-based system that provides managers with the tools for organizing, evaluating and efficiently running.
GRC - Governance, Risk MANAGEMENT, and Compliance
Implementation Issues of Sarbanes-Oxley CASE Presentation September 23, 2004 By Denise Farnan.
1 Secure Commonwealth Panel Health and Medical Subpanel Debbie Condrey - Chief Information Officer Virginia Department of Health December 16, 2013 Virginia.
Security Professional Services. Security Assessments Vulnerability Assessment IT Security Assessment Firewall Migration Custom Professional Security Services.
OVERVIEW OF INFORMATION SYSTEM (IS) AUDITING NORHAFIZAH BINTI ABDUL MUDALIP YAP YONG TECK TAN YUAN JUE TAY QIU JIE GROUP MEMBER:
1 Today’s Presentation Sarbanes Oxley and Financial Reporting An NSTAR Perspective.
Electronic Records Management: A Checklist for Success Jesse Wilkins April 15, 2009.
1 Information Technology (IT) Auditing & Control Instructor: Dr. Princely Ifinedo Cape Breton University (CBU)
LeToia Crozier, Esq., CHC Vice President, Compliance & Regulatory Affairs Corey Wilson Director of Technical Services & Security Officer Interactive Think.
Put your company logo here Confidential Data Upgrade from 8.x to 9.0.
IT Strategy for Business © Oxford University Press 2008 All rights reserved Chapter 12 IT Security Strategies.
IT Governance: COBIT, ISO17799 & ITIL. Introduction COBIT ITIL ISO17799Others.
Ali Pabrai, CISSP, CSCS ecfirst, chairman & ceo Preparing for a HIPAA Security Audit.
Cloud Computing Project By:Jessica, Fadiah, and Bill.
IT Security Policy Framework ● Policies ● Standards ● Procedures ● Guidelines.
Chapter 9: Introduction to Internal Control Systems
Kenneth Cole Gets Serious About Sarbanes-Oxley Sarbanes-Oxley Group E: TonyMohammadLeo.
Powering Network Rail with the Oracle Business Intelligence Platform
Chapter 1 McGraw-Hill/Irwin Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved.
Data Center Management Microsoft System Center. Objective: Drive Cost of Data Center Management 78% Maintenance 22% New Issue:Issue: 78% of IT budgets.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Ellis Paul Technical Solution Specialist – System Center Microsoft UK Operations Manager Overview.
Introducing Novell ® Identity Manager 4 Insert Presenter's Name (16pt) Insert Presenter's Title (14pt) Insert Company/ (14pt)
Sicherheitsaspekte beim Betrieb von IT-Systemen Christian Leichtfried, BDE Smart Energy IBM Austria December 2011.
Current risk and compliance priorities for law firms PETER SCOTT CONSULTING.
Operational Resilience DR’s Big Data Dilemma September 16, 2015 Datalink IT Resiliency Practice.
Lecture 5 Control and AIS Copyright © 2012 Pearson Education 7-1.
Devices 10 billion Internet- connected devices by 2016 People 1 billion+ people use social media services today Cloud 30 % of data will live in or pass.
Network and Server Basics. Learning Objectives After viewing this presentation, you will be able to: Understand the benefits of a client/server network.
Information Security and Privacy in HRIS
Risk Management Dr. Clive Vlieland-Boddy. Managements Responsibilities Strategy – Hopefully sustainable! Control – Hopefully maximising profits! Risk.
Unit 4: Impact of the Use of IT on Business Systems
Internal Control Principles
Customer Guide to Limited-Time Offer
Chapter 9 Control, security and audit
Managed Content Services
Agenda The current Windows XP and Windows XP Desktop situation
Microsoft Data Insights Summit
Presentation transcript:

© Copyright 2008 by Themis Software Ltd. All intellectual property rights are reserved and protected by international copy protection and trademark laws. Introducing Themis Software Ltd July 2008

© Copyright 2008 by Themis Software Ltd. All intellectual property rights are reserved and protected by international copy protection and trademark laws. Agenda Introduction Themis Software Ltd overview Today’s business environment challenges Themis what it delivers Closure

© Copyright 2008 by Themis Software Ltd. All intellectual property rights are reserved and protected by international copy protection and trademark laws. Themis Software Limited Launched as a company in January Former employees of the police intelligence & computer crimes divisions, finance, IT securities & services market places. Offices in both the UK & Denmark. Privately funded by independent investors. A modular suite of highly innovative software tools to assist business’s in the challenge of monitoring & managing their use of IT & IT users. A single end to end solution with no head to head competitors. Product Roadmap to continually deliver enhanced & additional solutions. Currently sold through Partners & end users.

© Copyright 2008 by Themis Software Ltd. All intellectual property rights are reserved and protected by international copy protection and trademark laws. Today’s Business Environment & Challenges Increasing regulations & compliance requirements. Privacy lawsuits over loss of personal information. Increasing attacks on information infrastructure. Increased likelihood of attacks from employees within an organisation. Ever increasing competitive environment. Speed at which new & improved technology is introduced. Pressure to raise worker productivity/ company competitiveness.

© Copyright 2008 by Themis Software Ltd. All intellectual property rights are reserved and protected by international copy protection and trademark laws. The biggest threat to a Companies IT comes from within it’s own organisation Most insider threats/incidents are triggered from a negative event in the workplace. Most if not all these incidents are planned. Most incidents are by employees with existing disciplinary issues.

© Copyright 2008 by Themis Software Ltd. All intellectual property rights are reserved and protected by international copy protection and trademark laws. The biggest threat to a Companies IT comes from within it’s own organisation Some sobering facts from a recent survey carried out in corporate businesses across Europe & the United States: More than 51% admitted to connecting their own devices & or gadgets to their work PC. One in five (21%) let family & friends use company PC’s & laptops to connect to the internet. Around 60% admit to storing personal data on their work PC. 62% admitted to having a very limited knowledge if IT Security. 5% admitted to accessing areas of their companies IT systems that they know they should not have.

© Copyright 2008 by Themis Software Ltd. All intellectual property rights are reserved and protected by international copy protection and trademark laws. The biggest threat to a Companies IT comes from within it’s own organisation Some sobering facts from a recent survey carried out in corporate businesses across Europe & the US: Where Incidents were reported: Only 17% involved individuals with administrator access. 30% of the incidents took place at the home of the employee using remote access to his/her companies corporate network. 87% of the attacks used very simple user commands requiring little or no advanced knowledge.

© Copyright 2008 by Themis Software Ltd. All intellectual property rights are reserved and protected by international copy protection and trademark laws. Themis Software – What is it & what does it deliver? Agent based application that sits on every workstation & server. Requires no dedicated infrastructure (Server) to run. Solutions run in either stand alone or across a companies network (WAN/LAN). Single view of entire Companies IT estate through one administrative console. Monitors & Reports on a companies entire IT estate & user behavior. Provides companies a detailed audit trail of all IT & user activity. Tracks activity from USB devices, PDA’s to Servers to external printing devices. Standard or bespoke reporting – available in exportable format (XML).

© Copyright 2008 by Themis Software Ltd. All intellectual property rights are reserved and protected by international copy protection and trademark laws. Themis Software – Advantages: Single integrated platform. Simple to deploy. Single view across whole enterprise - Intuitive Administrators Console. Detailed multi level discovery. Enterprise wide solution. Monitors users activity as well as assets. No dedicated infrastructure required to run. Modular Applications. Runs silently in the background. Little or no footprint. Excellent standard & or bespoke reporting.

© Copyright 2008 by Themis Software Ltd. All intellectual property rights are reserved and protected by international copy protection and trademark laws. Themis Software – Business Benefits: Business Benefits: Assists in improving user/employee productivity. Ready, available & reliable audit trail where disciplinary procedures are necessary. Significantly reduces misappropriate use of key company/sensitive data. Greatly assists where both internal & external regulatory compliance is required. IT Benefits: Assists in maintaining a level of IT Compliance. Guards against inappropriate use of company assets. Illegal software. Use of PC & laptops for personal use. Monitors & reports on peak internet usage. Ensures high level of return on IT investment. Identifies under utilised hardware & or software assets. Enables significant reduction in IT support costs through better management & reporting. Assists in IT budget preparation. “Enabling you to drive IT rather than IT driving you.”

© Copyright 2008 by Themis Software Ltd. All intellectual property rights are reserved and protected by international copy protection and trademark laws. Themis Software – enabling Regulatory Compliance What type of Compliance are we talking about here? Software Licensing Compliance. HIPPA. Sarbanes Oxley (SOX). COBIT

© Copyright 2008 by Themis Software Ltd. All intellectual property rights are reserved and protected by international copy protection and trademark laws. Themis Software – enabling Regulatory Compliance What are they & what do they deliver? Software Compliance (FAST & BSA) - Ensures that an organisation have purchased the appropriate/required license for what they have deployed on their IT estate. HIPAA - Health Insurance Portability & Accountability Act - Enacted by the U.S. Congress in 1996 & became effective July 1, This act is a grouping of regulations that work to combat waste, fraud, and abuse in health care delivery & health insurance. Established to improve the effectiveness & efficiency of the health care system, portability & continuity of health insurance coverage in the group and individual markets, as well as the ability to provide consequences to those that do not apply with the regulations explicitly stated within the Act. SOX - was signed into law on July 30, 2002 by President Bush. Sarbanes-Oxley is considered the most significant change to federal securities laws in the United States since the New Deal. It’s name comes from it’s inventors - Senator Paul Sarbanes & Representative Michael G. Oxley & came as result of a series of corporate financial scandals. Knowing that ensuring the accuracy and integrity of a company’s financial data takes more than sound accounting practices, these Sarbanes-Oxley auditing firms are requiring that data security processes and practices be addressed before signing off on the SOX audit. So what is being suggested by the SOX auditing firms? - In many cases, COBIT.

© Copyright 2008 by Themis Software Ltd. All intellectual property rights are reserved and protected by international copy protection and trademark laws. Themis Software – enabling Regulatory Compliance What are they & what do they deliver? COBIT - stands for Control Objectives for Information and related Technology has been developed by the Information Systems Audit and Control Foundation (ISACF) to address the need for management & control of information and information technology (IT). Technology is a vital part of business processes and, as such, management needs to have an appreciation for and a basic understanding of the risks and constraints to IT. COBIT looks at IT from the business perspective and places IT as part of the evaluation for meeting a business objective with the goal to identify how IT can best contribute to the achievement of the business objective. COBIT provides the process and structure that IT management can use to assess, manage and minimise risk across every aspect of an organisation. ************** Regulatory compliance is now a standard requisite within all G8 countries *******************

© Copyright 2008 by Themis Software Ltd. All intellectual property rights are reserved and protected by international copy protection and trademark laws. How does Themis Software – assist in enabling Regulatory Compliance Themis Compliance Manager: Themis Compliance Manager assists in ensuring that a companies IT systems are fit for purpose. Looks at all areas of a business where IT is used and determines how it is being used. It looks at what functions IT is being used for in that particular department & by who. It’s effectiveness and how it maps into the rest of the companies IT solutions. Each area is graded by: It’s importance to that department. It’s overall importance to the business as a whole. It’s effectiveness. How often it is used and for how long. Reliability. Security. Age Documentation Support Information recorded then determines that area of the businesses use of IT, how it integrates/dovetails into the rest of the business and it’s fit for purpose.

© Copyright 2008 by Themis Software Ltd. All intellectual property rights are reserved and protected by international copy protection and trademark laws. Discovery Manager Dashboard

© Copyright 2008 by Themis Software Ltd. All intellectual property rights are reserved and protected by international copy protection and trademark laws. How does Themis Software – assist in enabling Regulatory Compliance

© Copyright 2008 by Themis Software Ltd. All intellectual property rights are reserved and protected by international copy protection and trademark laws. How does Themis Software – assist in enabling Regulatory Compliance? A simplified explanation would be: (1)Sarbanes Oxley is the regulation to enforce compliance. (2)COBIT is the IT framework to achieve compliance. (3) The Themis SIM Compliance Module provides data to use in the I.T. Governance & compliance requisites.

© Copyright 2008 by Themis Software Ltd. All intellectual property rights are reserved and protected by international copy protection and trademark laws. Demonstration of Themis SIM Solution