Download presentation
Presentation is loading. Please wait.
Published byNoemi Cheaney Modified over 10 years ago
1
COMPREHENSIVE APPROACH TO INFORMATION SECURITY IN ADVANCED COMPANIES
2
SecureTower provides: Protection against deliberate theft or accidental data leakage Operational, reputation and legal risk management Retrospective incident investigation Filing the companys business communications
3
CONTROLLED DATA LEAK CHANNELS Sensitive data can leave the premises of a company in the following ways messages in AIM, Skype, MSN, Windows Live Messenger, Google Talk and other messengers e-mails (including attachments thereto) files transferred over FTP, HTTP, HTTPS, or via instant messengers chat messages, posts in blogs, forums, social networks Skype voice messages and calls external devices (USB flash, removable drives), CD/DVD, printers
4
HOW SECURETOWER WORKS Combination of different methods of information control (linguistic, statistical, attributive, digital fingerprints etc.) and a possibility to create multi-component security policies allow increasing the efficiency of information security service It is not enough to just detect an incident. It is vital to promptly react to it. Once an incident is detected, the specialist responsible for information security will immediately receive an e-mail notification with a description of the incident.
5
OPERATIONAL RISK MANAGEMENT SecureTower manages your operational risks by detecting misuse of working hours and corporate resources SecureTower enables you to mitigate your operational risks and optimize business processes in your company
10
FILING YOUR BUSINESS COMMUNICATIONS All intercepted traffic is analyzed and stored in a database. The program creates an archive to keep records of all companys business processes and events. This allows for retrospective investigation of any data leakage incidents. Referring to a single message, you can access the complete history of users correspondence.
11
CONTROL OVER MOBILE WORKSTATIONS SecureTower provides full control of portable workstations (laptops, netbooks), which leave the corporate network. All information flows on remote mobile workstations will be recorded and transferred to the security office at next connection to the companys network.
12
WORK IN REMOTE OFFICIES One more important feature is centralized system customization and management across multiple geographically distributed offices. Subject to customer's requirements and hardware performance, SecureTower allows monitoring data leaks and staff activity either by using remote access to several resources or by gathering all captured information for analysis into a common centralized storage.
13
ENTITLEMENT MANAGEMENT SecureTower features a flexible system of access control, which allows tailoring access rights to the system functionality according to the structure and hierarchy of the organization. Thus, a manager may be entitled to monitor only his subordinates activities, or a security officer may be granted access only to incident records.
14
SECURETOWER DEPLOYMENT The installation and configuration of SecureTower is performed in a centralized manner from a single console. The system does not require any changes in the existing network structure or purchasing additional costly equipment. To set up SecureTower, you do not need to invite numerous technical experts or bear expenses on deployment and consulting. Even in a large network, just a few hours will be enough for SecureTower installation and configuration. After initial setup the system is ready-to-use. You only need to adjust SecureTower in accordance with your security policies by creating new rules in addition to the default ones. You can quickly and easily assess SecureTower efficiency even during the free trial period.
15
WHY SECURETOWER Control of all major potential data leakage channels. DLP functionality, risk management tools and a means of personnel control all combined in a single solution. Low Total Cost of Ownership of the system, absence of huge extra costs of deployment and consulting. The usage of SecureTower does not demand any special technical knowledge or any supplementary training. The solution is easy-to-use not only for information technology or security specialists, but also for the companys executives.
16
WHY DO YOU NEED SECURETOWER Interception of all traffic, analysis for compliance with security policies and filing companys business communications Leakage control of personal and confidential data, notification of security office if necessary Operational, reputation and legal risk management Evaluation of employees efficacy, optimization of business processes.
17
GOING GLOBAL WITH SECURITY Take a step towards information security of your business with Falcongaze company
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.