1 Proprietary & Confidential. 2 When Not Controlling Info... Proprietary & Confidential High costs...
-
Upload
camron-short -
Category
Documents
-
view
219 -
download
0
Transcript of 1 Proprietary & Confidential. 2 When Not Controlling Info... Proprietary & Confidential High costs...
![Page 1: 1 Proprietary & Confidential. 2 When Not Controlling Info... Proprietary & Confidential High costs when loosing… Financial documents M&A info (UBS.](https://reader035.fdocuments.in/reader035/viewer/2022062500/56649f035503460f94c17305/html5/thumbnails/1.jpg)
1
Classification and Protection Management
for Encryption and E-DRM
Adding “Business Value” to Encryption
Proprietary & Confidential
Aki Eldar - CEO
![Page 2: 1 Proprietary & Confidential. 2 When Not Controlling Info... Proprietary & Confidential High costs when loosing… Financial documents M&A info (UBS.](https://reader035.fdocuments.in/reader035/viewer/2022062500/56649f035503460f94c17305/html5/thumbnails/2.jpg)
2
When Not Controlling Info...
Proprietary & Confidential
High costs when loosing… Financial documents M&A info (UBS & GM incident) Government IP Customer info
Reduced shared price due to lack of market confidence (Wikileaks and BOFA)
Regulatory fines due to non-compliance
Impact to organization brand
Reduced competitive advantage
Julian Assange
![Page 3: 1 Proprietary & Confidential. 2 When Not Controlling Info... Proprietary & Confidential High costs when loosing… Financial documents M&A info (UBS.](https://reader035.fdocuments.in/reader035/viewer/2022062500/56649f035503460f94c17305/html5/thumbnails/3.jpg)
3
Info in De-Perimeterized Age
How do we control our sensitive info? Perimeter
Security?
Where we have…• Too many locations• Too many exits• Too many devices• Cloud is here!
The Answer…
![Page 4: 1 Proprietary & Confidential. 2 When Not Controlling Info... Proprietary & Confidential High costs when loosing… Financial documents M&A info (UBS.](https://reader035.fdocuments.in/reader035/viewer/2022062500/56649f035503460f94c17305/html5/thumbnails/4.jpg)
4
Secure Islands’ IQProtector
![Page 5: 1 Proprietary & Confidential. 2 When Not Controlling Info... Proprietary & Confidential High costs when loosing… Financial documents M&A info (UBS.](https://reader035.fdocuments.in/reader035/viewer/2022062500/56649f035503460f94c17305/html5/thumbnails/5.jpg)
5
User-Driven & System-Driven Classification
Immediate Protection from Any
Source including Cloud & In-Premise
Apps
Assimilate Encryption to any
Business & IT Processes
without Integration
Automatic Policy Generator
Analyze Access & Usage Anomalies
Manage the Entire Info Lifecycle from
Creation, to Collaboration, and
Storage
IQProtector:Encryption & E-DRM
ERP
The Solution:
Adding “Business Value” to Encryption
![Page 6: 1 Proprietary & Confidential. 2 When Not Controlling Info... Proprietary & Confidential High costs when loosing… Financial documents M&A info (UBS.](https://reader035.fdocuments.in/reader035/viewer/2022062500/56649f035503460f94c17305/html5/thumbnails/6.jpg)
6
6
![Page 7: 1 Proprietary & Confidential. 2 When Not Controlling Info... Proprietary & Confidential High costs when loosing… Financial documents M&A info (UBS.](https://reader035.fdocuments.in/reader035/viewer/2022062500/56649f035503460f94c17305/html5/thumbnails/7.jpg)
7
Policy Driven Compartmentalization• Finance – construction of a “Chinese Wall”between corporate-advisory data and brokeringdepartments• Legal – compartmentalization based on dealsor litigation• Enterprise – compartmentalization of sensitivedata (like HR, salaries, M&A, legal, andfinancial) and intellectual property from ITpersonnel, and others• Government and Defense – establishingcompartmentalized information policies basedon security clearance levels• Manufacturing & Automobile - Safeguarding critical research, engineering and manufacturing IP
Automatic File & Email Encryption• Secure collaboration among partners andcustomers•Complementing or replacing device encryptionsuch as laptop/desktops or DVD/CD and USBmemory sticks•Automatic folder encryption
Policy Driven Protection based on Classification • Enforce corporation classification policies •Enforce government classification policies •Enforce automatic, user, and system recommendation classification based on content, context, and identity
Application Data Protection • Protecting sensitive information derived from
CRM, Billing systems, and other LOB application in reports or rendered data within application
•Salesforce.com and other SaaS – including pre-defined settings and policies for Salesforce.com to simplify policy definition
Why Customers Choose Us
![Page 8: 1 Proprietary & Confidential. 2 When Not Controlling Info... Proprietary & Confidential High costs when loosing… Financial documents M&A info (UBS.](https://reader035.fdocuments.in/reader035/viewer/2022062500/56649f035503460f94c17305/html5/thumbnails/8.jpg)
8
Why Secure Islands?
• The “missing link” solution in data protection encryption and E-DRM
• Fortune 100 references• Proven technology
Proprietary & Confidential