SlideShare a Scribd company logo
1 of 14
Download to read offline
SSI Data Protection Solutions




O:99 Staff FoldersolaSSI CorpSSI Data Protection Solutions v0.1.ppt
SSI
Security Software International                      Content
                                  1.   Understanding Data Protection

                                  2.   What is Data Leakage Prevention?

                                  3.   How SSI can help – Protecting Data throughout its cycle
                                       - SSI Capabilities & Solutions

                                  4.   Summary – Partnerships - Contacts
SSI
Security Software International                Understanding Data Protection
                                  Did you know?
                                  The impact of security breaches on well Established
                                  brands in recent years has resulted in huge financial
                                  losses, meaning:

                                   IP losses of $4.6B worldwide in 2008
                                   Data losses worldwide reportedly topped $1 trillion in 2008
                                   Two in three Australian organizations experienced a serious data
                                    breach in the last twelve months
                                   Over 900 flash drives collected by dry cleaner in ANZ in 2008
                                   12000 laptops/week lost in US airports



                                  Sources:
                                   January 2009 MacAfee findings for Davos World Economic Forum
                                   www.ponemon.org
                                     www.ironkey.com
SSI
Security Software International       What is Data Leakage Prevention?
                                  •   Data Leakage Prevention (DLP) is a computer security term referring
                                      to systems that identify, monitor, and protect data in use (e.g.,
                                      endpoint actions), data in motion (e.g., network actions), and data at
                                      rest (e.g., data storage).

                                  •   Regulatory compliance - Data Mandatory Disclosure Law
                                           HIPAA in health and benefits,
                                           GLBA and BASEL II in finance
                                           Payment Card Industry DSS standards.


                                  In the US, UK and EU Data Mandatory Disclosure Law required
                                  an organization to inform their customers of any loss of their
                                  personal information. The right to data privacy is heavily
                                  regulated and rigidly enforced particularly in Europe. However,
                                  as we speak, the Australian Law Reform Commission is looking
                                  at some 300 changes to Federal privacy laws, which includes
                                  data disclosure.
SSI
Security Software International         Data Leakage - compelling examples
                                  •   2007 NAB Melbourne: 598 names and account numbers of 397
                                      people sent to wrong addresses.


                                  •   2007 HSBC Sydney: More than 100 HSBC Australian customers had
                                      their banking details, names and home addresses as well as other
                                      personal financial information exposed.


                                  •   In 2008, an Australian Pharmaceutical Company was getting
                                      complaints of adverse patient reactions from geography they had
                                      minuscule sales. Counterfeit drugs were being manufactured and sold
                                      in that geography under the same brand name.




                                  Sources
                                   Information Age October/November 2009
SSI
Security Software International
                                       Data Leakage Prevention –
                                                      It does not apply to me!
                                  Very few organizations take into account the threat from the average
                                  employee leaking data. Denial kicks in and “it does not apply to me”, becomes
                                  the preferred answer.


                                  Well consider these 2 questions:


                                  1. Assuming that most of your employees in your
                                     organization including yourself use laptops and/or
                                     PDAs, what kind of data is stored on these and what is
                                     its value?

                                  2.   How do you monitor what users are doing with
                                       sensitive data and how do you control what users can
                                       install or introduce onto their computers, for example
                                       iPod, iPhone or USB devices?
SSI
Security Software International                How SSI can help
                                  Data Leakage will become an ever-larger concern, especially with the
                                  increasing use of mobile technologies.
                                  Many countries have introduced strict disclosure laws, or will soon do so.
                                  Then ask yourself this question, are you ready for it?


                                  At SSI, we are passionate about sharing our experience and
                                  expertise by helping businesses better understand and address:

                                   What data is most sensitive to their business and where it
                                    resides?
                                   What are the origin and nature of their risks?
                                   How to select the appropriate controls based on policy and
                                    risk?
                                   How to manage security centrally?
                                   How to conduct audit security to constantly improve?
SSI
Security Software International
                                  Protecting Data throughout its Cycle


                                                 E-Card               Servers

                                         Personalization                        Archiving

                                    Document                                        Workstations
                                    Management    Data in         Data at
                                                   Use             Rest
                                                                                      Laptops
                                     E-Payment
                                                                                     Smartphones
                                                                                      / PDA
                                      E-Business
                                         Processes          Data in
                                                            Motion                USB Device

                                                   E-Mail               Firewire-Device
                                                             CD/DVD
SSI
Security Software International
                                      Data Protection
                                                  CryptoServer-HSM
                                                    PCI Compliance
           Products


                                             Network Access Control (NAC)
                                               Full Disk Encryption (FDE)
                                  Encryption Devices-Enterprise USB Policy Management
                                            Data Leakage Prevention (DLP)

Solutions                                           Data Protection

                                                   Lifecycle / Support
           Consulting Services




                                                   Quality Assurance
                                                    Implementation
                                                  Project Management
                                                  Solution Architecture
                                                        Design
                                                   Audit/Assessment
SSI
Security Software International               SSI Data Protection Solutions
                                  SSI advise on the following full suite of Enterprise Data
                                     Protection Solutions:

                                   PCI DSS Compliance (Policy development & implementation to
                                    ensure secure management of credit card data and network
                                    access control).

                                   Full disk encryption (FDE), device encryption-hardware
                                    encrypted USB flash drives - FIPS 140-2 Level 3

                                   Managed Service Policies covering: who can use drives, how
                                    drives can be used and how the data on drives is protected.

                                   Network Access Control (NAC)

                                   Highest level of data and business processes security with a
                                    tamper-resistant Hardware Security Module (HSM) - FIPS 140-2
                                    Level 4
SSI
Security Software International




                                              Data
                                           Protection
                                               Application
                                                 Control


                                   SSI Solutions
                                                               Device
                                  Anti-Malware
                                                               Control



                                         DLP                  NAC

                                                 Encryption
SSI
Security Software International                Summary
                                  Remember
                                  Today organizations must underscore the importance of
                                  security on the company’s reputation.

                                  But after all, by marketing your Data-IP Protection, don’t
                                  you think it will help your organizations to find new
                                  business?

                                  “According to Bank of America, they have successfully managed
                                  itself as a bank that values its clients privacy and security. They have
                                  come up with innovative ways to increase revenue through consumer
                                  security such as offering two factors authentication tokens for a small
                                  fee. For companies in such Industries data protection is an absolute
                                  necessity just for both their internal users and their customers.’

                                  Sources: Information Age October/November 2009
SSI
Security Software International
SSI
Security Software International




                                        SSI Pacific New Zealand
                                        Level 16, Vodafone on the
                                        Quay
                                        157 Lambton Quay,
                                        Wellington 6140
         SSI Pacific Australia          New Zealand
                                                                    SSI Pacific Hong Kong
         Level 27, 101 Collins Street   Tel: + (64) 4 460 5263      Levels 25 & 30, Bank of China
         Melbourne, VIC                 Fax: + (64) 4 460 5252      Tower
         Tel: + (61) 3 9 653 9163                                   1 Garden Road, CENTRAL
         Fax: + (61) 3 9 653 9307                                   Hong Kong, China
                                                                    Tel: +852 (2251) 8795
                                                                    Fax: +852 (2251) 1618

More Related Content

What's hot

Good Security Whitepaper
Good Security WhitepaperGood Security Whitepaper
Good Security Whitepapergenasun
 
FROM STRATEGY TO ACTION - Vasil Tsvimitidze
FROM STRATEGY TO ACTION - Vasil Tsvimitidze FROM STRATEGY TO ACTION - Vasil Tsvimitidze
FROM STRATEGY TO ACTION - Vasil Tsvimitidze DataExchangeAgency
 
The Accidental Cloud: Privacy and Security Issues in a BYOD World
The Accidental Cloud: Privacy and Security Issues in a BYOD WorldThe Accidental Cloud: Privacy and Security Issues in a BYOD World
The Accidental Cloud: Privacy and Security Issues in a BYOD Worldmkeane
 
Electronic data & record management
Electronic data & record managementElectronic data & record management
Electronic data & record managementGreenLeafInst
 
Data protection guide
Data protection guideData protection guide
Data protection guidepetertran
 
Under Lock And Key
Under Lock And KeyUnder Lock And Key
Under Lock And KeyYarko Petriw
 
Tailored Interactions
Tailored InteractionsTailored Interactions
Tailored InteractionsSimon King
 
Wk online trust solutions overview january 2012
Wk online trust solutions overview january 2012Wk online trust solutions overview january 2012
Wk online trust solutions overview january 2012Creus Moreira Carlos
 
Protecting the Information Infrastructure
Protecting the Information InfrastructureProtecting the Information Infrastructure
Protecting the Information InfrastructureJay McLaughlin
 
Strong Authentication: Securing Identities and Enabling Business
Strong Authentication: Securing Identities and Enabling BusinessStrong Authentication: Securing Identities and Enabling Business
Strong Authentication: Securing Identities and Enabling BusinessSafeNet
 
Externalization Trend
Externalization TrendExternalization Trend
Externalization TrendNigel Green
 
Jennings it security overview 1 2
Jennings it security overview 1 2Jennings it security overview 1 2
Jennings it security overview 1 2Donald Jennings
 
ILTA Mobile Security Gap
ILTA Mobile Security GapILTA Mobile Security Gap
ILTA Mobile Security GapGes Ray
 
Varonis - DSS @VILNIUS 2010
Varonis - DSS @VILNIUS 2010Varonis - DSS @VILNIUS 2010
Varonis - DSS @VILNIUS 2010Andris Soroka
 
TITUS Metadata Security for SharePoint - Moray Council Case Study
TITUS Metadata Security for SharePoint -  Moray Council Case StudyTITUS Metadata Security for SharePoint -  Moray Council Case Study
TITUS Metadata Security for SharePoint - Moray Council Case StudyClever Consulting
 

What's hot (20)

Good Security Whitepaper
Good Security WhitepaperGood Security Whitepaper
Good Security Whitepaper
 
FROM STRATEGY TO ACTION - Vasil Tsvimitidze
FROM STRATEGY TO ACTION - Vasil Tsvimitidze FROM STRATEGY TO ACTION - Vasil Tsvimitidze
FROM STRATEGY TO ACTION - Vasil Tsvimitidze
 
The Accidental Cloud: Privacy and Security Issues in a BYOD World
The Accidental Cloud: Privacy and Security Issues in a BYOD WorldThe Accidental Cloud: Privacy and Security Issues in a BYOD World
The Accidental Cloud: Privacy and Security Issues in a BYOD World
 
Electronic data & record management
Electronic data & record managementElectronic data & record management
Electronic data & record management
 
Data protection guide
Data protection guideData protection guide
Data protection guide
 
Under Lock And Key
Under Lock And KeyUnder Lock And Key
Under Lock And Key
 
Tailored Interactions
Tailored InteractionsTailored Interactions
Tailored Interactions
 
Wk online trust solutions overview january 2012
Wk online trust solutions overview january 2012Wk online trust solutions overview january 2012
Wk online trust solutions overview january 2012
 
18 Tips of IRM - Making IRM Work for You
18 Tips of IRM - Making IRM Work for You18 Tips of IRM - Making IRM Work for You
18 Tips of IRM - Making IRM Work for You
 
Protecting the Information Infrastructure
Protecting the Information InfrastructureProtecting the Information Infrastructure
Protecting the Information Infrastructure
 
White Paper: Mobile Security
White Paper: Mobile SecurityWhite Paper: Mobile Security
White Paper: Mobile Security
 
Strong Authentication: Securing Identities and Enabling Business
Strong Authentication: Securing Identities and Enabling BusinessStrong Authentication: Securing Identities and Enabling Business
Strong Authentication: Securing Identities and Enabling Business
 
Externalization Trend
Externalization TrendExternalization Trend
Externalization Trend
 
Jennings it security overview 1 2
Jennings it security overview 1 2Jennings it security overview 1 2
Jennings it security overview 1 2
 
Dr K Subramanian
Dr K SubramanianDr K Subramanian
Dr K Subramanian
 
ILTA Mobile Security Gap
ILTA Mobile Security GapILTA Mobile Security Gap
ILTA Mobile Security Gap
 
Wk White Paper
Wk White PaperWk White Paper
Wk White Paper
 
Varonis - DSS @VILNIUS 2010
Varonis - DSS @VILNIUS 2010Varonis - DSS @VILNIUS 2010
Varonis - DSS @VILNIUS 2010
 
Sw keynote
Sw keynoteSw keynote
Sw keynote
 
TITUS Metadata Security for SharePoint - Moray Council Case Study
TITUS Metadata Security for SharePoint -  Moray Council Case StudyTITUS Metadata Security for SharePoint -  Moray Council Case Study
TITUS Metadata Security for SharePoint - Moray Council Case Study
 

Similar to SSI Data Protection Solutions

PCTY 2012, IBM Security and Strategy v. Fabio Panada
PCTY 2012, IBM Security and Strategy v. Fabio PanadaPCTY 2012, IBM Security and Strategy v. Fabio Panada
PCTY 2012, IBM Security and Strategy v. Fabio PanadaIBM Danmark
 
Sans Tech Paper Hardware Vs Software Encryption
Sans Tech Paper   Hardware Vs Software EncryptionSans Tech Paper   Hardware Vs Software Encryption
Sans Tech Paper Hardware Vs Software Encryptionharshadthakar
 
Proven Practices to Protect Critical Data - DarkReading VTS Deck
Proven Practices to Protect Critical Data - DarkReading VTS DeckProven Practices to Protect Critical Data - DarkReading VTS Deck
Proven Practices to Protect Critical Data - DarkReading VTS DeckNetIQ
 
3 guiding priciples to improve data security
3 guiding priciples to improve data security3 guiding priciples to improve data security
3 guiding priciples to improve data securityKeith Braswell
 
IRJET- An Approach Towards Data Security in Organizations by Avoiding Data Br...
IRJET- An Approach Towards Data Security in Organizations by Avoiding Data Br...IRJET- An Approach Towards Data Security in Organizations by Avoiding Data Br...
IRJET- An Approach Towards Data Security in Organizations by Avoiding Data Br...IRJET Journal
 
Strategic Information Management Through Data Classification
Strategic Information Management Through Data ClassificationStrategic Information Management Through Data Classification
Strategic Information Management Through Data ClassificationBooz Allen Hamilton
 
Information Security vs. Data Governance vs. Data Protection: What Is the Rea...
Information Security vs. Data Governance vs. Data Protection: What Is the Rea...Information Security vs. Data Governance vs. Data Protection: What Is the Rea...
Information Security vs. Data Governance vs. Data Protection: What Is the Rea...PECB
 
Kevin Wharram Security Summit
Kevin Wharram Security SummitKevin Wharram Security Summit
Kevin Wharram Security SummitKevin Wharram
 
Five_Big_Data_Security_Pitfalls
Five_Big_Data_Security_PitfallsFive_Big_Data_Security_Pitfalls
Five_Big_Data_Security_PitfallsLaris Orman
 
Bridging the Data Security Gap
Bridging the Data Security GapBridging the Data Security Gap
Bridging the Data Security Gapxband
 
IT Security Presentation - IIMC 2014 Conference
IT Security Presentation - IIMC 2014 ConferenceIT Security Presentation - IIMC 2014 Conference
IT Security Presentation - IIMC 2014 ConferenceJeff Lemmermann
 
Encryption and Key Management: Ensuring Compliance, Privacy, and Minimizing t...
Encryption and Key Management: Ensuring Compliance, Privacy, and Minimizing t...Encryption and Key Management: Ensuring Compliance, Privacy, and Minimizing t...
Encryption and Key Management: Ensuring Compliance, Privacy, and Minimizing t...IBM Security
 
Opteamix_whitepaper_Data Masking Strategy.pdf
Opteamix_whitepaper_Data Masking Strategy.pdfOpteamix_whitepaper_Data Masking Strategy.pdf
Opteamix_whitepaper_Data Masking Strategy.pdfOpteamix LLC
 
White Paper - Killing the Shadow Systems
White Paper - Killing the Shadow SystemsWhite Paper - Killing the Shadow Systems
White Paper - Killing the Shadow SystemsNewton Day Uploads
 
Leading Practices in Information Security & Privacy
Leading Practices in Information Security & PrivacyLeading Practices in Information Security & Privacy
Leading Practices in Information Security & PrivacyDonny Shimamoto
 
Classification-HowToBoostInformationProtection
Classification-HowToBoostInformationProtectionClassification-HowToBoostInformationProtection
Classification-HowToBoostInformationProtectionGianmarco Ferri
 
Information security: importance of having defined policy & process
Information security: importance of having defined policy & processInformation security: importance of having defined policy & process
Information security: importance of having defined policy & processInformation Technology Society Nepal
 

Similar to SSI Data Protection Solutions (20)

PCTY 2012, IBM Security and Strategy v. Fabio Panada
PCTY 2012, IBM Security and Strategy v. Fabio PanadaPCTY 2012, IBM Security and Strategy v. Fabio Panada
PCTY 2012, IBM Security and Strategy v. Fabio Panada
 
Sans Tech Paper Hardware Vs Software Encryption
Sans Tech Paper   Hardware Vs Software EncryptionSans Tech Paper   Hardware Vs Software Encryption
Sans Tech Paper Hardware Vs Software Encryption
 
Proven Practices to Protect Critical Data - DarkReading VTS Deck
Proven Practices to Protect Critical Data - DarkReading VTS DeckProven Practices to Protect Critical Data - DarkReading VTS Deck
Proven Practices to Protect Critical Data - DarkReading VTS Deck
 
3 guiding priciples to improve data security
3 guiding priciples to improve data security3 guiding priciples to improve data security
3 guiding priciples to improve data security
 
IRJET- An Approach Towards Data Security in Organizations by Avoiding Data Br...
IRJET- An Approach Towards Data Security in Organizations by Avoiding Data Br...IRJET- An Approach Towards Data Security in Organizations by Avoiding Data Br...
IRJET- An Approach Towards Data Security in Organizations by Avoiding Data Br...
 
Strategic Information Management Through Data Classification
Strategic Information Management Through Data ClassificationStrategic Information Management Through Data Classification
Strategic Information Management Through Data Classification
 
Information Security vs. Data Governance vs. Data Protection: What Is the Rea...
Information Security vs. Data Governance vs. Data Protection: What Is the Rea...Information Security vs. Data Governance vs. Data Protection: What Is the Rea...
Information Security vs. Data Governance vs. Data Protection: What Is the Rea...
 
Dean carey - data loss-prevention - atlseccon2011
Dean carey - data loss-prevention - atlseccon2011Dean carey - data loss-prevention - atlseccon2011
Dean carey - data loss-prevention - atlseccon2011
 
Kevin Wharram Security Summit
Kevin Wharram Security SummitKevin Wharram Security Summit
Kevin Wharram Security Summit
 
Five_Big_Data_Security_Pitfalls
Five_Big_Data_Security_PitfallsFive_Big_Data_Security_Pitfalls
Five_Big_Data_Security_Pitfalls
 
Bridging the Data Security Gap
Bridging the Data Security GapBridging the Data Security Gap
Bridging the Data Security Gap
 
IT Security Presentation - IIMC 2014 Conference
IT Security Presentation - IIMC 2014 ConferenceIT Security Presentation - IIMC 2014 Conference
IT Security Presentation - IIMC 2014 Conference
 
Encryption and Key Management: Ensuring Compliance, Privacy, and Minimizing t...
Encryption and Key Management: Ensuring Compliance, Privacy, and Minimizing t...Encryption and Key Management: Ensuring Compliance, Privacy, and Minimizing t...
Encryption and Key Management: Ensuring Compliance, Privacy, and Minimizing t...
 
Opteamix_whitepaper_Data Masking Strategy.pdf
Opteamix_whitepaper_Data Masking Strategy.pdfOpteamix_whitepaper_Data Masking Strategy.pdf
Opteamix_whitepaper_Data Masking Strategy.pdf
 
White Paper - Killing the Shadow Systems
White Paper - Killing the Shadow SystemsWhite Paper - Killing the Shadow Systems
White Paper - Killing the Shadow Systems
 
Leading Practices in Information Security & Privacy
Leading Practices in Information Security & PrivacyLeading Practices in Information Security & Privacy
Leading Practices in Information Security & Privacy
 
Data leakage prevention EN Final
Data leakage prevention EN FinalData leakage prevention EN Final
Data leakage prevention EN Final
 
Classification-HowToBoostInformationProtection
Classification-HowToBoostInformationProtectionClassification-HowToBoostInformationProtection
Classification-HowToBoostInformationProtection
 
Big Data for Security
Big Data for SecurityBig Data for Security
Big Data for Security
 
Information security: importance of having defined policy & process
Information security: importance of having defined policy & processInformation security: importance of having defined policy & process
Information security: importance of having defined policy & process
 

SSI Data Protection Solutions

  • 1. SSI Data Protection Solutions O:99 Staff FoldersolaSSI CorpSSI Data Protection Solutions v0.1.ppt
  • 2. SSI Security Software International Content 1. Understanding Data Protection 2. What is Data Leakage Prevention? 3. How SSI can help – Protecting Data throughout its cycle - SSI Capabilities & Solutions 4. Summary – Partnerships - Contacts
  • 3. SSI Security Software International Understanding Data Protection Did you know? The impact of security breaches on well Established brands in recent years has resulted in huge financial losses, meaning:  IP losses of $4.6B worldwide in 2008  Data losses worldwide reportedly topped $1 trillion in 2008  Two in three Australian organizations experienced a serious data breach in the last twelve months  Over 900 flash drives collected by dry cleaner in ANZ in 2008  12000 laptops/week lost in US airports Sources:  January 2009 MacAfee findings for Davos World Economic Forum  www.ponemon.org  www.ironkey.com
  • 4. SSI Security Software International What is Data Leakage Prevention? • Data Leakage Prevention (DLP) is a computer security term referring to systems that identify, monitor, and protect data in use (e.g., endpoint actions), data in motion (e.g., network actions), and data at rest (e.g., data storage). • Regulatory compliance - Data Mandatory Disclosure Law HIPAA in health and benefits, GLBA and BASEL II in finance Payment Card Industry DSS standards. In the US, UK and EU Data Mandatory Disclosure Law required an organization to inform their customers of any loss of their personal information. The right to data privacy is heavily regulated and rigidly enforced particularly in Europe. However, as we speak, the Australian Law Reform Commission is looking at some 300 changes to Federal privacy laws, which includes data disclosure.
  • 5. SSI Security Software International Data Leakage - compelling examples • 2007 NAB Melbourne: 598 names and account numbers of 397 people sent to wrong addresses. • 2007 HSBC Sydney: More than 100 HSBC Australian customers had their banking details, names and home addresses as well as other personal financial information exposed. • In 2008, an Australian Pharmaceutical Company was getting complaints of adverse patient reactions from geography they had minuscule sales. Counterfeit drugs were being manufactured and sold in that geography under the same brand name. Sources  Information Age October/November 2009
  • 6. SSI Security Software International Data Leakage Prevention – It does not apply to me! Very few organizations take into account the threat from the average employee leaking data. Denial kicks in and “it does not apply to me”, becomes the preferred answer. Well consider these 2 questions: 1. Assuming that most of your employees in your organization including yourself use laptops and/or PDAs, what kind of data is stored on these and what is its value? 2. How do you monitor what users are doing with sensitive data and how do you control what users can install or introduce onto their computers, for example iPod, iPhone or USB devices?
  • 7. SSI Security Software International How SSI can help Data Leakage will become an ever-larger concern, especially with the increasing use of mobile technologies. Many countries have introduced strict disclosure laws, or will soon do so. Then ask yourself this question, are you ready for it? At SSI, we are passionate about sharing our experience and expertise by helping businesses better understand and address:  What data is most sensitive to their business and where it resides?  What are the origin and nature of their risks?  How to select the appropriate controls based on policy and risk?  How to manage security centrally?  How to conduct audit security to constantly improve?
  • 8. SSI Security Software International Protecting Data throughout its Cycle E-Card Servers Personalization Archiving Document Workstations Management Data in Data at Use Rest Laptops E-Payment Smartphones / PDA E-Business Processes Data in Motion USB Device E-Mail Firewire-Device CD/DVD
  • 9. SSI Security Software International Data Protection CryptoServer-HSM PCI Compliance Products Network Access Control (NAC) Full Disk Encryption (FDE) Encryption Devices-Enterprise USB Policy Management Data Leakage Prevention (DLP) Solutions Data Protection Lifecycle / Support Consulting Services Quality Assurance Implementation Project Management Solution Architecture Design Audit/Assessment
  • 10. SSI Security Software International SSI Data Protection Solutions SSI advise on the following full suite of Enterprise Data Protection Solutions:  PCI DSS Compliance (Policy development & implementation to ensure secure management of credit card data and network access control).  Full disk encryption (FDE), device encryption-hardware encrypted USB flash drives - FIPS 140-2 Level 3  Managed Service Policies covering: who can use drives, how drives can be used and how the data on drives is protected.  Network Access Control (NAC)  Highest level of data and business processes security with a tamper-resistant Hardware Security Module (HSM) - FIPS 140-2 Level 4
  • 11. SSI Security Software International Data Protection Application Control SSI Solutions Device Anti-Malware Control DLP NAC Encryption
  • 12. SSI Security Software International Summary Remember Today organizations must underscore the importance of security on the company’s reputation. But after all, by marketing your Data-IP Protection, don’t you think it will help your organizations to find new business? “According to Bank of America, they have successfully managed itself as a bank that values its clients privacy and security. They have come up with innovative ways to increase revenue through consumer security such as offering two factors authentication tokens for a small fee. For companies in such Industries data protection is an absolute necessity just for both their internal users and their customers.’ Sources: Information Age October/November 2009
  • 14. SSI Security Software International SSI Pacific New Zealand Level 16, Vodafone on the Quay 157 Lambton Quay, Wellington 6140 SSI Pacific Australia New Zealand SSI Pacific Hong Kong Level 27, 101 Collins Street Tel: + (64) 4 460 5263 Levels 25 & 30, Bank of China Melbourne, VIC Fax: + (64) 4 460 5252 Tower Tel: + (61) 3 9 653 9163 1 Garden Road, CENTRAL Fax: + (61) 3 9 653 9307 Hong Kong, China Tel: +852 (2251) 8795 Fax: +852 (2251) 1618