Data Vault Security Sentry


Published on

Data Vault Security 'Sentry' is a 24/7 insurance policy that is active anywhere in the world where there is a mobile phone signal. There are some outdated tools that go part of the way to achieving what 'Sentry' does but they rely on the laptop being connected to the internet, claiming that a stolen laptop is soon connected to the web. For Data Vault Security soon isn't good enough. The data could well be long compromised by then.

Data Vault Security 'Sentry' starts tracing and locating the laptop as soon as it is turned on and deleting the data before the boot sequence is completed.

What is ‘Sentry’?
Laptop sales have now overtaken desktops as the world becomes ever more mobile and high speed internet access encourages an increase in home working.

At the same time PDAs and mobile phones are getting more powerful, cheaper and increasingly used in business as mini PCs and for sending and receiving information.

Whatever procedures an individual or organisation may have in place regarding data security it is inevitable that valuable and sensitive data will be stored on those devices and that data will be mobile. If the laptop is lost or worse stolen can you be absolutely sure that the data will not be compromised?

Statistics on how many laptops, PDAs and Mobiles phone are being stolen or lost per year differ widely. It is reported that some 4,973 laptops were left in London taxis alone during a six month period.

When a laptop goes missing just how confident can its owner be that the data on it will not be compromised? Data Vault Security ‘Sentry’ is an ingenious layer of insurance that helps an individual or organisation reach a level of confidence that when the hardware has disappeared, the real value, the information, is safely dealt with.

Using either GSM or internet communications methods ‘Sentry’ is able to securely delete predefined data contained on the laptop’s hard disk and send a comprehensive report back to the operator confirming its success. Our ‘Sentry’ can locate and destroy all types of data from client records, e-mail and contact files, word processor or spreadsheet documents or even cookies. The value of this data is often not considered until there is the possibility that somebody else has it.

Data Vault Security ‘Sentry’ is a 24/7 insurance policy that is active anywhere in the world where there is a mobile phone signal. There are some outdated tools that go part of the way to achieving what ‘Sentry’ does but they rely on the laptop being connected to the internet, claiming that a stolen laptop is “soon connected to the web”. For Data Vault Security soon isn’t good enough. The data could well be long compromised by then.

Data Vault Security ‘Sentry’ starts tracing and locating the laptop as soon as it is turned on and deleting the data before the boot sequence is completed.

Many high profile cases have resulted in dreadful negative publicity and in some cases have breached the personal security of individuals. Data Vault Security ‘Sentry’ can turn this on its head and allow an individual or organisation affected by laptop theft to be reassured its personal/customers/stakeholder/employees data is secure and furthermore that effective measures were taken to protect the information and turn a negative into a positive.

How does Data Vault Security ‘Sentry’ work?
Data Vault Security ‘Sentry’ allows organisations and individuals to ensure the secure deletion of data and files on any PC, Laptop, PDA or Mobile phone that is lost or stolen utilising either the GSM Network, Internet or RFID.

As soon as you realise your device is stolen, either notify your ‘Sentry’ operator or login to the Data Vault Security ‘Sentry’ Control Panel. Upon receiving a secure decommission message all data and critical system files on the lost or stolen device will be destroyed using US Department of Defence Standard disk erasur

Published in: Technology, Business
1 Comment
  • Thanks for your security information slide share.
    Hope will get more slides from you.
    likely if you need of any scam awareness help follow here:
    Are you sure you want to  Yes  No
    Your message goes here
  • Be the first to like this

No Downloads
Total Views
On Slideshare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide

Data Vault Security Sentry

  1. 1. ‘Sentry’<br />
  2. 2. Information Leakage and Loss <br />Data Loss, Theft and Leakage happen in a number of environments and for a number of reasons. To combat many of these, ‘Sentry’ performs quickly and effectively in: <br /><ul><li>Panic Situations </li></ul> Loss or theft of a mobile computer where its whereabouts are unknown.<br /><ul><li>Critical Situations </li></ul> Internal staff theft - widely perceived to be a major source of sensitive data leakage. <br /><ul><li>Controlled Situations </li></ul> Employment Termination <br /> All too often when an employee leaves a position, for whatever reason, they take the employer’s data with them. <br /> Computer Replacement Programmes<br /> When an organisation / person replaces its computers they are often dispatched with inadequate or no measures taken to cleanse them of data. <br />
  3. 3. What is ‘Sentry’ <br />‘Sentry’ is a simple but effective tool that securely eradicates computer data <br />that may be at risk of moving <br />out of its owner’s control. <br />
  4. 4. Mobile Data – Panic Application<br /><ul><li>Your device is missing, lost or stolen.
  5. 5. It contains gigabytes of information some of which is inevitably sensitive.
  6. 6. Whatever security tools are installed none provide any information to help manage the situation.
  7. 7. ‘Sentry’ works quickly, instructing the device to self-destruct & proving it has done so, allowing effective crisis management. </li></li></ul><li>Mobile Data – Critical Application<br /><ul><li>When an organisation suspects that an employee is acting against its interests it needs to respond quickly.
  8. 8. Most organisations accept that employees remove information and pass it to unwanted sources.
  9. 9. Equally employees store an organisation’s information at a third party site for use post employment.
  10. 10. ‘Sentry’ can be used in-house to quickly shut down a rogue employee.</li></li></ul><li>Mobile Data – Controlled Application<br />Employment Termination<br /><ul><li>When an employee leaves or is removed from position the organisation must ensure that any information on his/her computer is erased before it is compromised.</li></ul>Computer Replacement Programme<br /><ul><li>As organisations replace and renew their computers they need to take adequate measures to make sure the information on the computer is erased before it is dispatched. </li></ul> ‘Sentry’ can be used in-house to perform an unrecoverable delete on all desktops and laptops in just a couple of minutes.<br />
  11. 11. What makes ‘Sentry’ so effective?<br /><ul><li>‘Sentry’ is an invisible application that waits for an instruction to destroy the data contents on the computer it is protecting.
  12. 12. It eliminates human error by having no user interaction, there are no passwords to enter or programmes to start, ‘Sentry’ is always working when the computer is.
  13. 13. ‘Sentry’ needs no hardware other than its host computer.
  14. 14. No restrictions, ‘Sentry’ protects all data regardless of its location on the device.
  15. 15. ‘Sentry’ is a hosted service meaning there is no expensive infrastructure to install or maintain. </li></li></ul><li>Why ‘Sentry’ over traditional security tools?<br />Password,<br />2a4n5d7y<br />*****************<br />‘Sentry’ is not meant to replace existing data protection strategies or tools and acts as a powerful layer in a complete data protection strategy. <br /><ul><li>Currently accepted tools such as encryption, require user intervention, either to enter complicated passwords or insert external plug in hardware.
  16. 16. End users often render these tools useless by recording the password and storing it or the plug in device, with the laptop, stripping the tool of its functionality.</li></ul>Protected data is good, NO data is best.<br />‘Sentry’ deletes ALL data, protected or not.<br />
  17. 17. The ‘Sentry’ Process<br />Data Vault Security ‘Sentry’ <br />Issues Self Destruct Command <br />To Required Computer.<br />Authorised Internal ‘Sentry’ Operator <br />or Data Vault Security is asked to destroy a particular device.<br />Device receives ‘Sentry’<br />delete Instruction and<br />shuts down.<br />Whatever the circumstance, Panic, Critical or Controlled ‘Sentry’ works in the same way. <br />The authorised operator identifies the relevant device through the ‘Sentry’ service and quickly issues a request to erase all sensitive data. <br />When the command reaches the device the data is eradicated and the proof is delivered to the relevant parties almost immediately. <br />
  18. 18. How does ‘Sentry’ work?<br />COMMUNICATION CHANNELS<br /><ul><li>Mobile Broadband
  19. 19. All Other Broadband
  20. 20. WI-FI / WI-MAX
  21. 21. Intranet
  22. 22. Extranet</li></ul>‘Sentry’ <br />Client’s Device<br />Hosted <br />‘Sentry’ service<br /><ul><li>‘Sentry’ uses whichever communications channels an organisation uses to deliver the decommission instruction to the device.
  23. 23. Whichever channel reaches the device first will trigger ‘Sentry’ and the data will be deleted.
  24. 24. For mobile workers ‘Sentry’ uses the worldwide mobile broadband infrastructure as standard as well as the internet, meaning that a lost device can be contacted almost anywhere on earth. </li></li></ul><li>Unrecoverable Data Deletion<br /><ul><li>All selected data is deleted to the US Department of Defence 5220(M) standard which means it is effectively unrecoverable to all but the most sophisticated security organisations.
  25. 25. ‘Sentry’ finishes the job by rendering the operating system inactive, leaving the device completely useless.</li></li></ul><li>Data Vault Security ‘Sentry’ Audit Trail<br /><ul><li>Traditional tools require a leap of faith that the data is safe because there is no information about the device – it is simply missing.
  26. 26. The ‘Sentry’ comprehensive decommission report proves that the data cannot be compromised and that the measures taken to achieve this have succeeded.
  27. 27. The report shows a list of ALL files deleted, when, and very importantly, whether any were accessed in the time that the device was missing and unreached by ‘Sentry’.
  28. 28. Culprit Identification and Device Location are also available.</li></li></ul><li>Summary of Benefits at a Glance<br /><ul><li>‘Sentry’ uses and will always use the fastest communications methods available to communicate with a computer, whatever the reason for the decommission.
  29. 29. ‘Sentry’ gives control to its users. No need to notify police or other authorities.
  30. 30. After purchase ‘Sentry’ is free to use – there are NO additional costs.
  31. 31. ‘Sentry’ is always active when its host computer is. When it receives a decommission instruction ‘Sentry’ works quickly to leave the computer risk free.
  32. 32. On a typical computer ‘Sentry’ can destroy 500 MB of data made up of more than 4500 documents (2380 Word docs, 2127 Spreadsheets and several hundred emails) in 103 seconds, too fast for the data to be seriously compromised.
  33. 33. ‘Sentry’ can be integrated with Data Vault Security ‘Backup’ for ultimate protection.</li></li></ul><li>‘Sentry’ Wi-Fi / RFID integration<br /><ul><li>‘Sentry’ can be triggered by a location based RFID/Wi-FI system to destroy the data on a computer that leaves an authorised zone in a building or compound, for example a hospital.
  34. 34. Where appropriate ‘Sentry’ can be set to simply inform the user of a potential breach and compromise situation by text message or e-mail and await instruction to delete the data if necessary. </li></li></ul><li>‘Sentry’ ticks all the boxes<br /><ul><li>‘Sentry’s integrated volume encryption or Full Disk Encryption integration make efforts to get round ‘Sentry’ extremely difficult.
  35. 35. ‘Sentry’ integrates with leading data back up tools to provide an excellent route back to productivity in the shortest time possible.
  36. 36. ‘Sentry’ can be used as a proactive tool, for example with its device vacation functionality that searches for the device in designated downtimes such as user holidays.
  37. 37. ‘Sentry’ is a low cost insurance layer to help an individual or organisation keep its data for its own use only.</li></li></ul><li>the data security specialists…<br />
  1. A particular slide catching your eye?

    Clipping is a handy way to collect important slides you want to go back to later.