Download presentation
Presentation is loading. Please wait.
Published byBelinda Ryan Modified over 6 years ago
1
Companies are blind to what happens to their data
2
Maturity and experience
11 years of Software development More than 2,100 customers woRldwide Represented in 42 countries 1,55 Million CLIENTS WORLDWIDE 167,000 workstations = biggest installation EgoSecure has been in business for over 10 years and has an impressive list of global customers
3
The extent of the challenge
About 700 laptops a week are reported stolen or lost at Charles de Gaulle airport in Paris On average, 17,000 USB sticks were found at British laundries since 2010 At TalkTalk around credit and debit card details were stolen, 15,656 bank account numbers and sort codes were accessed, and around 15,000 dates of birth were also accessed (2015) Theft of construction plans and data of employees in South Korean nuclear power plant and publishing on the internet in the end of 2014. Espionage at the chancellery - employee brings spyware "Regin" on private USB stick to the Chancellery Hackers stop work at German Bundestag completely in 2015 Data leakage affects everyone and is much more widespread than people realise
4
Two biggest threats: Data breach & data loss
Typically caused by Via one of these means Unwanted leakage of corporate data Negligent insider Malicious insider Malicious outsider External devices e.g. USB e.g. External HDD Cloud file sharing e.g. Dropbox E.g. OneDrive Collaboration tools e.g. e.g. Skype Malware Compromised machines The most commonly deployed tool when it comes to employees and data protection is TRUST
5
Visibility is key EgoSecure operates on the principle that you need to understand your environment to make meaningful and appropriate decisions on data security
6
Actionable intelligence
Device classes e.g. USB devices, external drives Are they approved devices Encrypted, unencrypted Is data leaving in encrypted/unencrypted form What/how/by whom File categories e.g. Documents, spreadsheets Are they commercially sensitive Which employees Should they have access to this information Should they be copying this information With EgoSecure Insight organisations can quickly and easily determine how data is leaving their corporate boundaries
7
Comprehensive data security
Profiles for on/off network Single, easy to use management console Ability to detect and remediate Control Device control Connection control Application control Secure Full disk encryption File & folder encryption Protect Anti-virus/ malware Manage Inventory Green IT PW Manager Secure Erase EgoSecure provides the necessary capabilities to secure, protect, control and manage your security estate
8
EgoSecure provides end-to-end data protection
On all data paths EgoSecure provides end-to-end data protection
9
All-in-one dashboard
10
IntellAct – the ability to react in real-time
With IntellAct administrators have a rules engine at their fingertips that provides the ability to react to a variety of security scenarios
11
EgoSecure capabilities
Egosecure provides the necessary capabilities to secure, protect, control and manage your security estate
12
EgoSecure and GDPR The GDPR has been described as being the most significant regulatory framework to affect companies since the Sarbanes-Oxley Act. With a stated objective to “give citizens back control of their personal data, and to simplify the regulatory environment for business” it will impact every single European individual who has shared their personal data with an organisation, and every single organisation that holds information on any European individual. ooOOoo The GDPR will apply in the UK from 25 May 2018 The government has confirmed that the UK’s decision to leave the EU will not affect the commencement of the GDPR
13
GDPR articles mapping Articles 5, 25 & 32 – privileged user access control Processor and any person … who has access to personal data shall not process them except on instructions from the controller… EgoSecure Access Control and Application Control makes sure that no one can get unauthorised access to applications, devices or specific file types. Article 32 - prevent attacks USE data encryption If you store critical data in cloud storage, , network drive, local HDD or USB Device, it needs to be protected by encryption. EgoSecure protects these data storage devices by implementing Cloud Encryption, Device Encryption,Folder Encryption, HDD Encryption, Mail Encryption, Network Folder Encryption, etc... Article 33 - notification of a personal data breach to the supervisory authority […] In the case of a personal data breach, the controller shall without undue delay and, where feasible, not later than 72 hours after having become aware of it, notify the personal data breach to the supervisory authority… EgoSecure Audit and Insight modules monitor data transfer in real time. It sends notification of specific behaviors, automatically to a designated authority. Article 34 – communication of a personal data breach to the data subject […] shall not be required if … data affected by the personal data breach, in particular those that render the data unintelligible to any person who is not authorised to access it, such as encryption. EgoSecure Audit and Insight modules monitor data transfer in real time. It sends notification by specific behaviors, automatically to a designated authority.
14
. . . WITH US YOU CAN FEEL SAFER, FASTER
EgoSecure UK LTD Abbey House Arlington Business Park Theale Berkshire RG7 4SA Phone Mail
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.