Your SlideShare is downloading. ×
0
Preventing Employee Data Breaches Caused by Unsecure File Transfers
Preventing Employee Data Breaches Caused by Unsecure File Transfers
Preventing Employee Data Breaches Caused by Unsecure File Transfers
Preventing Employee Data Breaches Caused by Unsecure File Transfers
Preventing Employee Data Breaches Caused by Unsecure File Transfers
Preventing Employee Data Breaches Caused by Unsecure File Transfers
Preventing Employee Data Breaches Caused by Unsecure File Transfers
Preventing Employee Data Breaches Caused by Unsecure File Transfers
Preventing Employee Data Breaches Caused by Unsecure File Transfers
Preventing Employee Data Breaches Caused by Unsecure File Transfers
Preventing Employee Data Breaches Caused by Unsecure File Transfers
Preventing Employee Data Breaches Caused by Unsecure File Transfers
Preventing Employee Data Breaches Caused by Unsecure File Transfers
Preventing Employee Data Breaches Caused by Unsecure File Transfers
Preventing Employee Data Breaches Caused by Unsecure File Transfers
Preventing Employee Data Breaches Caused by Unsecure File Transfers
Preventing Employee Data Breaches Caused by Unsecure File Transfers
Preventing Employee Data Breaches Caused by Unsecure File Transfers
Preventing Employee Data Breaches Caused by Unsecure File Transfers
Preventing Employee Data Breaches Caused by Unsecure File Transfers
Preventing Employee Data Breaches Caused by Unsecure File Transfers
Preventing Employee Data Breaches Caused by Unsecure File Transfers
Preventing Employee Data Breaches Caused by Unsecure File Transfers
Preventing Employee Data Breaches Caused by Unsecure File Transfers
Preventing Employee Data Breaches Caused by Unsecure File Transfers
Preventing Employee Data Breaches Caused by Unsecure File Transfers
Preventing Employee Data Breaches Caused by Unsecure File Transfers
Preventing Employee Data Breaches Caused by Unsecure File Transfers
Preventing Employee Data Breaches Caused by Unsecure File Transfers
Preventing Employee Data Breaches Caused by Unsecure File Transfers
Preventing Employee Data Breaches Caused by Unsecure File Transfers
Preventing Employee Data Breaches Caused by Unsecure File Transfers
Preventing Employee Data Breaches Caused by Unsecure File Transfers
Preventing Employee Data Breaches Caused by Unsecure File Transfers
Preventing Employee Data Breaches Caused by Unsecure File Transfers
Preventing Employee Data Breaches Caused by Unsecure File Transfers
Preventing Employee Data Breaches Caused by Unsecure File Transfers
Preventing Employee Data Breaches Caused by Unsecure File Transfers
Preventing Employee Data Breaches Caused by Unsecure File Transfers
Preventing Employee Data Breaches Caused by Unsecure File Transfers
Preventing Employee Data Breaches Caused by Unsecure File Transfers
Preventing Employee Data Breaches Caused by Unsecure File Transfers
Preventing Employee Data Breaches Caused by Unsecure File Transfers
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×
Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Text the download link to your phone
Standard text messaging rates apply

Preventing Employee Data Breaches Caused by Unsecure File Transfers

360

Published on

The majority of all corporate data breaches are caused inadvertently by well-meaning employees exchanging files with customers, vendors, and partners. Ad hoc file transfer security has become a …

The majority of all corporate data breaches are caused inadvertently by well-meaning employees exchanging files with customers, vendors, and partners. Ad hoc file transfer security has become a critical concern for Information Security departments at leading companies.

Published in: Technology
0 Comments
1 Like
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total Views
360
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
14
Comments
0
Likes
1
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide

Transcript

  • 1. Preventing Employee Data Breaches Caused by Unsecure File Transfers<br />Thursday, September 29, 20112:00 PM EDT / 11:00 AM PDT<br />Presenter:<br />Mark Eaton, Director of Sales<br />
  • 2. Questions?<br />Use the chat feature to the right of your screen<br />
  • 3. Corporate Data is More Vulnerable Than Ever <br />
  • 4. Agenda<br />Top 5 Security and Compliance Challenges<br />How to Prevent Employee Data Breaches<br />How Biscom Delivery Server Works<br />The Importance of Not Putting Files in the DMZ <br />Auditing and Reporting<br />Q&A<br />
  • 5. Reason for Data Leaks<br />November 2009 Study<br />
  • 6. “How well protected do you feel your company is against each of the following types of data leaks?”<br />November 2009 Study<br />
  • 7. Poll<br />
  • 8. 5<br />Compliance and Security Challenges from End-user Behavior<br />
  • 9. 1. Email<br />
  • 10. Impact of using email for large file transfer<br />of email contains attachments<br />95%<br />of email bandwidth is for attachments<br />1<br />/<br />3<br />19%<br />of email attachments are greater than 5MB <br />is the average savings for every 10% reduction in email storagein a SAN-enabled Exchange environment<br />$53,000<br />Data by: Osterman Research White Paper – Jan. 2009» Download the whitepaper at www.biscomds.com<br />
  • 11. 2. File Transfer Protocol<br />
  • 12. 3. Overnight Delivery<br />
  • 13. 4. File Sharing Sites<br />
  • 14. 5. Lack of Tracking<br />
  • 15. Is your enterprise sending sensitive information securely?<br />
  • 16. How to Prevent Employee Data Breaches<br />
  • 17. = Secure File Transfer<br />
  • 18. Secure File Transfer Selection Criteria<br />Intuitive – no training required<br />Self registration for external users<br />Easy deployment/minimum IT support<br />Flexible Deployment: Leverage existing infrastructure<br />Integrate with Active Directory/LDAP for centralized user management<br />Transaction logging for auditing and reporting<br />Secure data both in transit and at rest<br />Allow you to meet state and federal data protection mandates<br />
  • 19. How Biscom’s Secure File Transfer Works<br />
  • 20. Three steps to deliver files securely<br />Your senders collect documents and files, and create a package in BDS<br />Your company – Internal Senders<br />External Recipient<br />
  • 21. Three steps to deliver files securely<br />Your senders collect documents and files, and create a package in BDS<br />Your sender addresses the package and a notification email goes out to your recipients<br />Your company – Internal Senders<br />External Recipient<br />
  • 22. Three steps to deliver files securely<br />Your senders collect documents and files, and create a package in BDS<br />Your sender addresses the package and a notification email goes out to your recipients<br />Recipients click the embedded link, authenticate, and download their files<br />Your company – Internal Senders<br />External Recipient<br />
  • 23. Simple User Interface<br />
  • 24. Customizable and Brandable<br />
  • 25. External users can self register accounts<br />
  • 26. Users are assigned roles<br />Recipientscan receive and reply to secure deliveries<br />Senderscan create secure deliveries<br />Reportersview transactions and audit information<br />Compliance Users can download files for auditing and compliance purposes<br />Administratorscontrol system configuration and user management<br />
  • 27. Simply choose recipients & upload files<br />
  • 28. Delivery options available<br />Upload files<br />Select from global address book<br />Enter delivery options<br />Enter secure and notification messages<br />
  • 29. Outlook Add-in<br />BDS Options<br />Uses existing compose message form<br />Can view file upload status<br />Drag and drop files<br />Secure message<br />
  • 30. Recipients receive an email notification containing an embedded link<br />Automatic embedded link<br />
  • 31. View the secure message and download files<br />Delivery meta-data<br />Files to download<br />
  • 32. Administrator Can Track & Audit Files Sent<br />
  • 33. SharePoint Integration<br />
  • 34. Send File Directly From SharePoint<br />
  • 35. Why Enterprises Select Biscom<br />
  • 36. 1. We’ve focused on mission-critical, Enterpriseproduction solutions for more than 25 years<br />
  • 37. 2. Integration with existing infrastructure and applications <br /><ul><li>VMware
  • 38. Autonomy iManage
  • 39. SharePoint
  • 40. Outlook
  • 41. Automation modules
  • 42. Extensive API set</li></li></ul><li>3. Flexible deployment options:<br />VMware Appliance<br />Server<br />Amazon Cloud<br />
  • 43. Do not store your data in the DMZ<br />Public-facing, no data stored<br />Business logic, no data stored<br />Data layer<br />
  • 44. 4. Extensive reporting and auditing capabilities<br />
  • 45. 5. Establish layer of Data Governance<br />Exclusions: competitors, personal email addresses<br />Inclusions: restrict inbound deliveries to specific domains<br />File type filters: business-only files <br />
  • 46. 6. Total Cost of Ownership (TCO)<br />Perpetual software license with a one time cost<br />Bundled pricing for enterprise features<br />Use existing storage, web server, database at no additional cost<br />Buy what you need today: no costly upgrade, trade-in or installation fees<br />Scalable: go from 100 users to 5000 users with a simple license upgrade<br />TCO: Costs 30-50% less over 3-5 years vs. annual license offerings<br />
  • 47. Questions?<br />We value your feedback, please complete the brief survey after the webinar<br />Visit our website for:<br /><ul><li> Whitepapers
  • 48. Case Studies
  • 49. Schedule a demo
  • 50. and more</li></ul>‘Data at Risk’ Newsletter:<br />Subscribe here:<br />www.biscomds.com/newsletter<br />

×