• Like
  • Save
Egress Switch Introduction
Upcoming SlideShare
Loading in...5
×
 

Egress Switch Introduction

on

  • 277 views

 

Statistics

Views

Total Views
277
Views on SlideShare
277
Embed Views
0

Actions

Likes
0
Downloads
0
Comments
0

0 Embeds 0

No embeds

Accessibility

Categories

Upload Details

Uploaded via as Microsoft PowerPoint

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment
  • Having over 20 years experience in delivering data security products, the Egress team set about developing a solution to one of the toughest challenges business face today – exchanging information securely. Sharing sensitive or confidential information is very common in most organisations, being sent both internally and externally with clients, suppliers and other 3rd parties What is classed as confidential data is dependant on each organisation, however there seems to be a number of areas that usually come to mind, such as finance & accounts depts dealing with payroll and tax information, HR dealing with staff details, issues and wages, Legal areas who work with a number of contracts, mergers & acquisitions....... The list goes onThe most common way of sending information is probably via e-mail (inc attachments), although, as some files are too large to go out via e-mail, large file transfer systems or protocols are sometimes used.
  • ll organisations that deal with this type of data are regulated by the ICO. The ICO are there to enforce that organisations comply with the DPA and have adequate security measures in place to secure this type of data (both at rest and in transit). If a data breach occurs and these measures have not been taken, the ICO then have the power to fine firms up to £½ Million.
  • Egress Switch is a new generation of data security software that makes sharing information safe and easy. Designed to protect and control data at all times, Egress Switch supports information sent via email, burned to a CD or DVD, or even uploaded to the internet using FTP or HTTPS.Egress Switch also provides an extensive audit trail showing who, where, and when information has been accessed. This real time identity based protection enables businesses to extend their visibility over what actually happens to corporate information, while offering the ability to instantly revoke data that is either mishandled or suspected lost/stolen.

Egress Switch Introduction Egress Switch Introduction Presentation Transcript

  • Egress Switch Overviewwww.egress.com ©2008 Egress© Egress Software Technologies Ltd. All rights reserved Software Technologies Ltd. All rights reserved. Proprietary and confidential.
  • The Need to Share Information • Sharing information outside your organisation is common • Some shared information is considered “sensitive” • How does the recipient handle sensitive information? • Is there a risk and how is it measured? What information? Who receives it? How is it sent? • Business Plans • Accountants • CD/DVD • Customer Data • Auditors • Cloud Storage • Financial Records • Board of Directors • Email attachments • Intellectual Property • Business Partners • FTP sites • New Product Information • Contractors • Regular mail • Spreadsheets • Government Agencies • USB sticks • Tax Information • Marketing Firms • Web File Transfer • Outsourced Providerswww.egress.com ©2008 Egress© Egress Software Technologies Ltd. All rights reserved Software Technologies Ltd. All rights reserved. Proprietary and confidential. 2
  • Typical Challenges Sharing Information • Solutions are often difficult to use: – Difficult to create and share secure information (Sender) – Difficult to receive secure information (Recipient) • Solutions often don’t provide the level of visibility that today’s audit requirements demand • Solutions often don’t provide the control that we need (embargo or revoke data)www.egress.com ©2008 Egress© Egress Software Technologies Ltd. All rights reserved 3 Software Technologies Ltd. All rights reserved. Proprietary and confidential.
  • 3rd Party Data Breach Trend The disk, which was mislaid by the courier firm, contained personal details on about 2,000 staff British Council staff data lost January 2009One year on from the HMRC data breach incident, the government has revealed that it has suffered an average of one data breach per week since thenHMRC data loss recalled one year onNovember 2008 36% of data breaches reported are from 3rd party incidents 2009 Annual Study: UK Cost of a Data Breach February 2011www.egress.com ©2008 Egress© Egress Software Technologies Ltd. All rights reserved Software Technologies Ltd. All rights reserved. Proprietary and confidential. 4
  • Information Commissioners Office April 2010 - ICO gained power to fine organisations up to £500K for a data breach "Any organisation which processes personal information must ensure that adequate safeguards are in place to keep that information secure."From April 2010, the ICO will carry out audits to investigate organisations which it believes arefailing to properly protect private data. www.egress.com ©2008 Egress© Egress Software Technologies Ltd. All rights reserved Software Technologies Ltd. All rights reserved. Proprietary and confidential. 5
  • What is Egress Switch?• Protection that stays with your information, no matter where it goes• An enabler to safely share any type of data with anyone• Simple to deploy and manage• Easy for end user to operate• Easy to obtain and cost effective to use with a SaaS business model• Innovative new data security product from a strong and growing companywww.egress.com ©2008 Egress© Egress Software Technologies Ltd. All rights reserved 6 Software Technologies Ltd. All rights reserved. Proprietary and confidential.
  • Why Egress Switch?Benefits Differentiators• Retain control of information at all times • Supports single user to Enterprise business Exceeds limitations of current generation file • No complex infrastructure or trust encryption relationships required• Full audit trail of who, when, where • Supports impromptu sending of secure files information is accessed • Works with any media type or exchange Satisfies emerging audit requirements method • Real-time control (change or revoke access)• Simple end user experience and audit collection Designed around sharing workflow, hides • AES 256-bit encryption with FIPS 140-2 security steps certified libraries• Cost effective SaaS model • CCTM certified for UK Government No infrastructure required, start with users • Cross platform unified solution who share sensitive info• Highly Scalable Integrates with existing business processes andwww.egress.com ©2008 Egress© Egress Software Technologies Ltd. All rights reserved 7 Software Technologies Ltd. All rights reserved. Proprietary and confidential.
  • Solution Overview Create Secure 1 Package • Drag & Drop interface Set Access and 2 • Any file, any media • Send to recipient Security Parameters • Select recipient(s) Recipient 3 • Real-time changes Gains Access • Cloud-based policy store • Receives package and authenticates • Local enforcement All delivered in a Software as a Service (SaaS) modelwww.egress.com ©2008 Egress© Egress Software Technologies Ltd. All rights reserved 8 Software Technologies Ltd. All rights reserved. Proprietary and confidential.
  • Next Generation Collaboration SoftwareInformation Owner– Creates secure package– Sets access and security parameters– Sends secure package– Tracks activity of secure packageInformation Recipient– Opens packages they are authorised to view– Requests access for other packagesSwitch Server– Holds all security settings, can be changed at any time– Keeps complete audit trail of successful and failed access– Does not store any secure packages www.egress.com ©2008 Egress© Egress Software Technologies Ltd. All rights reserved 9 Software Technologies Ltd. All rights reserved. Proprietary and confidential.
  • Secure Email • Transparently encrypt email message body including attachments • Transparently encrypt email attachments • MS Outlook 2003/2007/2010 Add-in for seamless integration • Supports policy notes and disclaimers • Policy controls can enforce encryption based on content, recipient, and type of information • Size restrictions can offer other transport mechanisms • Zero footprint web access client for remote workers and shared machine accesswww.egress.com ©2008 Egress© Egress Software Technologies Ltd. All rights reserved 10 Software Technologies Ltd. All rights reserved. Proprietary and confidential.
  • Internet Server & Cloud Storage • Integration with FTP(s), HTTP(s) and cloud storage • Egress hosted cloud storage available as part of subscription • Transparent integration with collaboration tools like MS SharePoint • Built in FTP(s),HTTP(s) client and upload manager • Integrates with 3rd party storage providers • Data files are encrypted and compressed to streamline workflowwww.egress.com ©2008 Egress© Egress Software Technologies Ltd. All rights reserved 11 Software Technologies Ltd. All rights reserved. Proprietary and confidential.
  • Physical Media • Transparently encrypt data stored on removable media • Integrated CD/DVD/Blue-ray burning application • Real-time access control of physical media (CD/DVD, USB etc) • Integration with Endpoint security productswww.egress.com ©2008 Egress© Egress Software Technologies Ltd. All rights reserved 12 Software Technologies Ltd. All rights reserved. Proprietary and confidential.
  • Mobile Support • Access secure email from any mobile device (iphone, Android, Win Mobile 7, Blackberry etc) via optimised web client • Manage package security and access requests on the move • App for streamlined package access on Blackberry deviceswww.egress.com ©2008 Egress© Egress Software Technologies Ltd. All rights reserved 13 Software Technologies Ltd. All rights reserved. Proprietary and confidential.
  • Auditing & Alerts • Detailed auditing & alerts of data lifecycle and user actions • Client & web based Package Library enables real-time management of all secured information • Secure delivery reports • Geographic tracking of information in real-time • Role based audit accesswww.egress.com ©2008 Egress© Egress Software Technologies Ltd. All rights reserved 14 Software Technologies Ltd. All rights reserved. Proprietary and confidential.
  • Policy Engine • Centrally administered user policies • Configure advisory and enforced usage policies • Policies can be configured based on: - Data type, content & location - Recipient - Size of data - Media type - Encryption algorithm and compression • Fully configurable user UI and end user experiencewww.egress.com ©2008 Egress© Egress Software Technologies Ltd. All rights reserved 15 Software Technologies Ltd. All rights reserved. Proprietary and confidential.
  • Recipient Experience • Simple ‘one-time’ sign up process • Free of charge for recipients and sending data back to paying subscribers • Simple click-once application streamlines recipient experience • Transparent access to data received by any transport mechanism • Zero footprint web based clientwww.egress.com ©2008 Egress© Egress Software Technologies Ltd. All rights reserved 16 Software Technologies Ltd. All rights reserved. Proprietary and confidential.
  • Switch Fusion • Automate the sending of encrypted email for mass mail processes • Batch process the sending of sensitive information (e.g Bank Statements, transaction records etc direct from a 3rd party DB) • Scheduled backup of sensitive information • Automatically upload files to secure FTP/Cloud storage servers • Integrate with complex back end systemswww.egress.com ©2008 Egress© Egress Software Technologies Ltd. All rights reserved 17 Software Technologies Ltd. All rights reserved. Proprietary and confidential.
  • Egress Switch Features Summary • Transparently encrypt email attachments • Encrypt information onto CD/DVD and USB removable media • Upload information securely to the internet (HTTP(s), FTP(s), MS Sharepoint etc) • Control who can access the information you send • Immediately revoke access to data/files even after they have been sent • View a full audit of who, where & when information has been accessedwww.egress.com ©2008 Egress© Egress Software Technologies Ltd. All rights reserved 18 Software Technologies Ltd. All rights reserved. Proprietary and confidential.