COMPREHENSIVE APPROACH TO INFORMATION SECURITY IN ADVANCED COMPANIES

17
COMPREHENSIVE APPROACH TO INFORMATION SECURITY IN ADVANCED COMPANIES

description

COMPREHENSIVE APPROACH TO INFORMATION SECURITY IN ADVANCED COMPANIES. SecureTower provides :. Protection against deliberate theft or accidental data leakage. Operational, reputation and legal risk management. Filing the company’s business communications. Retrospective incident investigation. - PowerPoint PPT Presentation

Transcript of COMPREHENSIVE APPROACH TO INFORMATION SECURITY IN ADVANCED COMPANIES

Page 1: COMPREHENSIVE APPROACH TO INFORMATION SECURITY IN ADVANCED COMPANIES

COMPREHENSIVE APPROACH TO INFORMATION SECURITY IN ADVANCED COMPANIES

Page 2: COMPREHENSIVE APPROACH TO INFORMATION SECURITY IN ADVANCED COMPANIES

SecureTower provides:

Protection against deliberate theft oraccidental data leakage

Operational, reputation and legal risk management

Retrospective incident investigation

Filing the company’s business communications

Page 3: COMPREHENSIVE APPROACH TO INFORMATION SECURITY IN ADVANCED COMPANIES

CONTROLLED DATA LEAK CHANNELS

Sensitive data can leave the premises of a company in the following ways

messages in AIM, Skype, MSN, Windows Live

Messenger, Google Talk and other messengers

e-mails (including attachments

thereto)

files transferred over FTP, HTTP, HTTPS,

or via instant messengers

chat messages, posts in blogs, forums, social

networks

Skype voice

messages and calls

external devices(USB flash,

removable drives), CD/DVD, printers

Page 4: COMPREHENSIVE APPROACH TO INFORMATION SECURITY IN ADVANCED COMPANIES

HOW SECURETOWER WORKS

Combination of different methods of information control (linguistic, statistical, attributive, digital fingerprints etc.) and a possibility to create multi-component security policies allow increasing the efficiency of information security service

It is not enough to just detect an incident. It is vital to promptly react to it. Once an incident is detected, the specialist responsible for information security will immediately receive an e-mail notification with a description of the incident.

Page 5: COMPREHENSIVE APPROACH TO INFORMATION SECURITY IN ADVANCED COMPANIES

OPERATIONAL RISK MANAGEMENT

SecureTower manages your operational risks by detecting misuse of working hours and corporate resources

SecureTower enables you to mitigate your operational risks and optimize business processes in your company

Page 6: COMPREHENSIVE APPROACH TO INFORMATION SECURITY IN ADVANCED COMPANIES
Page 7: COMPREHENSIVE APPROACH TO INFORMATION SECURITY IN ADVANCED COMPANIES
Page 8: COMPREHENSIVE APPROACH TO INFORMATION SECURITY IN ADVANCED COMPANIES
Page 9: COMPREHENSIVE APPROACH TO INFORMATION SECURITY IN ADVANCED COMPANIES
Page 10: COMPREHENSIVE APPROACH TO INFORMATION SECURITY IN ADVANCED COMPANIES

FILING YOUR BUSINESS COMMUNICATIONS

All intercepted traffic is analyzed and stored in a database.

The program creates an archive to keep records of all company’s business processes and events.

This allows for retrospective investigation of any data leakage incidents. Referring to a single message, you can access the complete history of users’ correspondence.

Page 11: COMPREHENSIVE APPROACH TO INFORMATION SECURITY IN ADVANCED COMPANIES

CONTROL OVER MOBILE WORKSTATIONS

SecureTower provides full control of portable workstations (laptops, netbooks), which leave the corporate network.

All information flows on remote mobile workstations will be recorded and transferred to the security office at next connection to the company’s network.

Page 12: COMPREHENSIVE APPROACH TO INFORMATION SECURITY IN ADVANCED COMPANIES

WORK IN REMOTE OFFICIES

One more important feature is centralized system customization and management across multiple geographically distributed offices.

Subject to customer's requirements and hardware performance, SecureTower allows monitoring data leaks and staff activity either by using remote access to several resources or by gathering all captured information for analysis into a common centralized storage.

Page 13: COMPREHENSIVE APPROACH TO INFORMATION SECURITY IN ADVANCED COMPANIES

ENTITLEMENT MANAGEMENT

SecureTower features a flexible system of access control, which allows tailoring access rights to the system’ functionality according to the structure and hierarchy of the organization.

Thus, a manager may be entitled to monitor only his subordinates’ activities, or a security officer may be granted access only to incident records.

Page 14: COMPREHENSIVE APPROACH TO INFORMATION SECURITY IN ADVANCED COMPANIES

SECURETOWER DEPLOYMENT

The installation and configuration of SecureTower is performed in a centralized manner from a single console. The system does not require any changes in the existing network structure or purchasing additional costly equipment.

To set up SecureTower, you do not need to invite numerous technical experts or bear expenses on deployment and consulting.

Even in a large network, just a few hours will be enough for SecureTower installation and configuration.

After initial setup the system is ready-to-use. You only need to adjust SecureTower in accordance with your security policies by creating new rules in addition to the default ones.

You can quickly and easily assess SecureTower efficiency even during the free trial period.

Page 15: COMPREHENSIVE APPROACH TO INFORMATION SECURITY IN ADVANCED COMPANIES

WHY SECURETOWER

Control of all major potential data leakage channels.

DLP functionality, risk management tools and a means of personnel control all combined in a single solution.

Low Total Cost of Ownership of the system, absence of huge extra costs of deployment and consulting.

The usage of SecureTower does not demand any special technical knowledge or any supplementary training.

The solution is easy-to-use not only for information technology or security specialists, but also for the company’s executives.

Page 16: COMPREHENSIVE APPROACH TO INFORMATION SECURITY IN ADVANCED COMPANIES

WHY DO YOU NEED SECURETOWER

Interception of all traffic, analysis for compliance with security policies and filing company’s business communications

Leakage control of personal and confidential data, notification of security office if necessary

Operational, reputation and legal risk management

Evaluation of employees efficacy, optimization of business processes.

Page 17: COMPREHENSIVE APPROACH TO INFORMATION SECURITY IN ADVANCED COMPANIES

GOING GLOBAL WITH SECURITY

Take a step towards information security of your business with Falcongaze company