SlideShare a Scribd company logo
1 of 16
‘Sentry’
Information Leakage and Loss		 Data Loss, Theft and Leakage happen in a number of environments and for a number of reasons. To combat many of these, ‘Sentry’ performs quickly and effectively in:  ,[object Object],		Loss or theft of a mobile computer where its whereabouts are unknown. ,[object Object],	Internal staff theft - widely perceived to be a major source of sensitive data leakage.  ,[object Object],	Employment Termination  	All too often when an employee leaves a position, for whatever reason, they take the 	employer’s  data with them.  	Computer Replacement Programmes 	When an organisation / person replaces its computers they are often dispatched with 	inadequate or no measures taken to cleanse them of data.
What is ‘Sentry’ 	 ‘Sentry’ is a simple but effective tool that securely eradicates computer data  that may be at risk of moving  out of its owner’s control.
Mobile Data – Panic Application ,[object Object]
It contains gigabytes of information some of which is inevitably sensitive.
Whatever security tools are installed none provide any information to help manage the situation.
‘Sentry’ works quickly, instructing the device to self-destruct & proving it has done so, allowing effective crisis management. ,[object Object]
Most organisations accept that employees remove information and pass it to unwanted sources.
Equally employees store an organisation’s information at a third party site for use post employment.
‘Sentry’ can be used in-house to quickly shut down a rogue employee.,[object Object]
What makes ‘Sentry’ so effective? ,[object Object]
It eliminates human error by having no user interaction, there are no passwords to enter or programmes to start, ‘Sentry’ is always working when the computer is.
‘Sentry’ needs no hardware other than its host computer.
No restrictions, ‘Sentry’ protects all data regardless of its location on the device.
‘Sentry’ is a hosted service meaning there is no expensive infrastructure to install or maintain. ,[object Object]
End users often render these tools useless by recording the password and storing it or the plug in device, with the laptop, stripping the tool of its functionality.Protected data is good, NO data is best. ‘Sentry’ deletes ALL data, protected or not.

More Related Content

Viewers also liked

Edisi 6 Des Aceh
Edisi 6 Des AcehEdisi 6 Des Aceh
Edisi 6 Des Aceh
epaper
 
Edisi 6 Aceh
Edisi 6 AcehEdisi 6 Aceh
Edisi 6 Aceh
epaper
 
Binder17 mar 10
Binder17 mar 10Binder17 mar 10
Binder17 mar 10
epaper
 
City Of Dania Beach Water Supply Report Mar 19, 2010
City Of Dania Beach Water Supply Report   Mar 19, 2010City Of Dania Beach Water Supply Report   Mar 19, 2010
City Of Dania Beach Water Supply Report Mar 19, 2010
city of dania beach
 
Meeting with investors of january 2013 (1)
Meeting with investors of january 2013 (1)Meeting with investors of january 2013 (1)
Meeting with investors of january 2013 (1)
TIM RI
 
Results presentation 1 q13
Results presentation 1 q13Results presentation 1 q13
Results presentation 1 q13
TIM RI
 
TP Bardotti Gabriela
TP Bardotti GabrielaTP Bardotti Gabriela
TP Bardotti Gabriela
Gabi Bardotti
 
Edisi 19 Maret Nusantara
Edisi 19 Maret NusantaraEdisi 19 Maret Nusantara
Edisi 19 Maret Nusantara
epaper
 
Conference Call 4Q11
Conference Call 4Q11Conference Call 4Q11
Conference Call 4Q11
TIM RI
 

Viewers also liked (17)

Edisi 6 Des Aceh
Edisi 6 Des AcehEdisi 6 Des Aceh
Edisi 6 Des Aceh
 
Cortex hair english
Cortex hair   englishCortex hair   english
Cortex hair english
 
Edisi 6 Aceh
Edisi 6 AcehEdisi 6 Aceh
Edisi 6 Aceh
 
Binder17 mar 10
Binder17 mar 10Binder17 mar 10
Binder17 mar 10
 
What We Do
What We DoWhat We Do
What We Do
 
City Of Dania Beach Water Supply Report Mar 19, 2010
City Of Dania Beach Water Supply Report   Mar 19, 2010City Of Dania Beach Water Supply Report   Mar 19, 2010
City Of Dania Beach Water Supply Report Mar 19, 2010
 
Attention Wizard
Attention WizardAttention Wizard
Attention Wizard
 
Meeting with investors of january 2013 (1)
Meeting with investors of january 2013 (1)Meeting with investors of january 2013 (1)
Meeting with investors of january 2013 (1)
 
Results presentation 1 q13
Results presentation 1 q13Results presentation 1 q13
Results presentation 1 q13
 
Pat rules english
Pat rules englishPat rules english
Pat rules english
 
Hit Emotional Hot Buttons With Content
Hit Emotional Hot Buttons With ContentHit Emotional Hot Buttons With Content
Hit Emotional Hot Buttons With Content
 
Dania Jai Alai Proposed Plans & Agreement
Dania Jai Alai Proposed Plans & AgreementDania Jai Alai Proposed Plans & Agreement
Dania Jai Alai Proposed Plans & Agreement
 
TP Bardotti Gabriela
TP Bardotti GabrielaTP Bardotti Gabriela
TP Bardotti Gabriela
 
WED- Gift Basket
WED- Gift BasketWED- Gift Basket
WED- Gift Basket
 
Edisi 19 Maret Nusantara
Edisi 19 Maret NusantaraEdisi 19 Maret Nusantara
Edisi 19 Maret Nusantara
 
Conference Call 4Q11
Conference Call 4Q11Conference Call 4Q11
Conference Call 4Q11
 
14des
14des14des
14des
 

Recently uploaded

Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Recently uploaded (20)

Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 

Data Vault Security Sentry

  • 2.
  • 3. What is ‘Sentry’ ‘Sentry’ is a simple but effective tool that securely eradicates computer data that may be at risk of moving out of its owner’s control.
  • 4.
  • 5. It contains gigabytes of information some of which is inevitably sensitive.
  • 6. Whatever security tools are installed none provide any information to help manage the situation.
  • 7.
  • 8. Most organisations accept that employees remove information and pass it to unwanted sources.
  • 9. Equally employees store an organisation’s information at a third party site for use post employment.
  • 10.
  • 11.
  • 12. It eliminates human error by having no user interaction, there are no passwords to enter or programmes to start, ‘Sentry’ is always working when the computer is.
  • 13. ‘Sentry’ needs no hardware other than its host computer.
  • 14. No restrictions, ‘Sentry’ protects all data regardless of its location on the device.
  • 15.
  • 16. End users often render these tools useless by recording the password and storing it or the plug in device, with the laptop, stripping the tool of its functionality.Protected data is good, NO data is best. ‘Sentry’ deletes ALL data, protected or not.
  • 17. The ‘Sentry’ Process Data Vault Security ‘Sentry’ Issues Self Destruct Command To Required Computer. Authorised Internal ‘Sentry’ Operator or Data Vault Security is asked to destroy a particular device. Device receives ‘Sentry’ delete Instruction and shuts down. Whatever the circumstance, Panic, Critical or Controlled ‘Sentry’ works in the same way. The authorised operator identifies the relevant device through the ‘Sentry’ service and quickly issues a request to erase all sensitive data. When the command reaches the device the data is eradicated and the proof is delivered to the relevant parties almost immediately.
  • 18.
  • 22.
  • 23. Whichever channel reaches the device first will trigger ‘Sentry’ and the data will be deleted.
  • 24.
  • 25.
  • 26. The ‘Sentry’ comprehensive decommission report proves that the data cannot be compromised and that the measures taken to achieve this have succeeded.
  • 27. The report shows a list of ALL files deleted, when, and very importantly, whether any were accessed in the time that the device was missing and unreached by ‘Sentry’.
  • 28.
  • 29. ‘Sentry’ gives control to its users. No need to notify police or other authorities.
  • 30. After purchase ‘Sentry’ is free to use – there are NO additional costs.
  • 31. ‘Sentry’ is always active when its host computer is. When it receives a decommission instruction ‘Sentry’ works quickly to leave the computer risk free.
  • 32. On a typical computer ‘Sentry’ can destroy 500 MB of data made up of more than 4500 documents (2380 Word docs, 2127 Spreadsheets and several hundred emails) in 103 seconds, too fast for the data to be seriously compromised.
  • 33.
  • 34.
  • 35. ‘Sentry’ integrates with leading data back up tools to provide an excellent route back to productivity in the shortest time possible.
  • 36. ‘Sentry’ can be used as a proactive tool, for example with its device vacation functionality that searches for the device in designated downtimes such as user holidays.
  • 37.