Wer, was, wo: Inhalte schützen und unberechtigte Zugriffe verhindern

305 views

Published on

Der Einsatz von Collaboration Platforms wie Microsoft SharePoint stellt Unternehmen vor neue Herausforderungen und Anforderungen auch im Bereich Compliance: Das Vernetzen von Mitarbeitern weltweit, der Zugriff auf Dokumente von intern und extern sowie die stetig wachsende Datenmenge erhöhen das Risiko von Verstößen gegen Datenschutzrichtlinien und von ungewollten Zugriffen auf vertrauliche Informationen.
In diesem Webinar lernen Sie mithilfe technischer Unterstützung:
• Multifaktor-Authentifizierung und Geofencing: trusted users, trusted devices, trusted locations
• Automatisiertes Klassifizieren und Taggen von Inhalten
• Data Leakage Prevention

0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
305
On SlideShare
0
From Embeds
0
Number of Embeds
3
Actions
Shares
0
Downloads
0
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide
  • the Society of Corporate Compliance and Ethics and Health Care Compliance Association fielded a survey in January 2011. The purpose was to both identify compliance officers’ areas of responsibility as well as their assessment of the
    risk. The survey was completed by 518 compliance professionals.

    Fears of an accidental breach far outweigh fears of an intentional
    breach. Respondents were asked how likely they felt that
    data would be released through hacking attacks, intentional
    breaches by employees and third party vendors, and accidental
    breaches by employees and vendors. In general the feeling
    was that accidental breaches were far more likely. Just 8% felt
    that it was somewhat or very likely a hacker would gain access
    to the system, When it came to breaches by employees, 61%
    thought an accidental breach was somewhat or very likely, but
    just 30% thought the same of an intentional breach. Likewise
    41% thought an accidental breach by a third party vendor was
    somewhat or very likely but only 13% thought an intentional
    breach was somewhat or very likely.

    “Employees are able to access corporate information anywhere, at any time. It is essential for companies to put the proper information protection policies and procedures in place to counterbalance these new realities.”

    Francis deSouza, group president, Enterprise Products and Services, Symantec Corp
  • Auswertung und grafische Charts erstellen
    Manuell Metadaten zu vertraulichen Dokumenten hinzufügen
    Automatisch Metadaten zu vertraulichen Dokumenten hinzufügen
    Automatisch Aktionen ausführen, wenn vertrauliche Dokumente erkannt werden, z.B. von der Quarantäne bis zum Löschen
  • Wer, was, wo: Inhalte schützen und unberechtigte Zugriffe verhindern

    1. 1. Wer, was, wo: Inhalteschützen und unberechtigteZugriffeverhindern
    2. 2. ©AvePoint, Inc. All rights reserved. Confidential and proprietary information of AvePoint, Inc. No part of this may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, without the prior written consent of AvePoint, Inc. - Wer? - Was? Was ist Compliance Risiko Management - Wo? - Live Demo
    3. 3. ©AvePoint, Inc. All rights reserved. Confidential and proprietary information of AvePoint, Inc. No part of this may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, without the prior written consent of AvePoint, Inc. Wer?
    4. 4. ©AvePoint, Inc. All rights reserved. Confidential and proprietary information of AvePoint, Inc. No part of this may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, without the prior written consent of AvePoint, Inc. Technologien Dienstleistungen Lösungen Partner CommunitySupport
    5. 5. ©AvePoint, Inc. All rights reserved. Confidential and proprietary information of AvePoint, Inc. No part of this may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, without the prior written consent of AvePoint, Inc. Dennis.Hobmaier@ avepoint.com www.AvePoint.de T +49 89-2190989-66 M +49 174 1771935 @DHobmaier
    6. 6. ©AvePoint, Inc. All rights reserved. Confidential and proprietary information of AvePoint, Inc. No part of this may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, without the prior written consent of AvePoint, Inc. Was?
    7. 7. ©AvePoint, Inc. All rights reserved. Confidential and proprietary information of AvePoint, Inc. No part of this may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, without the prior written consent of AvePoint, Inc. • Überwachen • Kontrollieren • Überprüfen • Strikt • Streng • Genau • Korrekt • Konsequent
    8. 8. ©AvePoint, Inc. All rights reserved. Confidential and proprietary information of AvePoint, Inc. No part of this may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, without the prior written consent of AvePoint, Inc. Compliance Richtlinie erstellen
    9. 9. ©AvePoint, Inc. All rights reserved. Confidential and proprietary information of AvePoint, Inc. No part of this may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, without the prior written consent of AvePoint, Inc.
    10. 10. ©AvePoint, Inc. All rights reserved. Confidential and proprietary information of AvePoint, Inc. No part of this may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, without the prior written consent of AvePoint, Inc. • Compliance = Einhaltung • Z.B.: Bundesdatenschutzgesetz (BDSG) • Firewall • Antivirus • DLP (Data Leakage Prevention) • Neue Gefahren von innen • Datenabfluss von innen
    11. 11. ©AvePoint, Inc. All rights reserved. Confidential and proprietary information of AvePoint, Inc. No part of this may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, without the prior written consent of AvePoint, Inc. Hacker 80% 70% 60% 50% 40% 30% 20% 10% 0% Versehent- lich durch Mitarbeiter Versehent- lich durch 3rd party Tool Absichtlich durch Mitarbeiter Absichtlich durch 3rd party Tool Source: HCCA;, “Data Privacy: How Big a Compliance Challenge?”; January 2011 8% 61% 41% 30% 13%
    12. 12. ©AvePoint, Inc. All rights reserved. Confidential and proprietary information of AvePoint, Inc. No part of this may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, without the prior written consent of AvePoint, Inc. • Compliance • Data Security (CISO/CSO, IA, IRM) • Records Management Officers • Chief Privacy Officer • 508 Coordinator • Recht / Legal • Datenschutzbeauftragter • Business Users • CEO • Public Relations • Social Media • Personalabteilung • IT • CIO • SharePoint Administratoren
    13. 13. ©AvePoint, Inc. All rights reserved. Confidential and proprietary information of AvePoint, Inc. No part of this may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, without the prior written consent of AvePoint, Inc. • Benutzerakzeptanz • Erkennen • Handeln • Datenwachstum
    14. 14. ©AvePoint, Inc. All rights reserved. Confidential and proprietary information of AvePoint, Inc. No part of this may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, without the prior written consent of AvePoint, Inc. Transparenz/ Zusammenarbeit Datensicherheit/ Verwaltung
    15. 15. ©AvePoint, Inc. All rights reserved. Confidential and proprietary information of AvePoint, Inc. No part of this may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, without the prior written consent of AvePoint, Inc. Risiko Management
    16. 16. ©AvePoint, Inc. All rights reserved. Confidential and proprietary information of AvePoint, Inc. No part of this may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, without the prior written consent of AvePoint, Inc. • Verlust von Datensätzen • Durschnittlich 3,67 Mio € pro Unternehmen* • Durschnittlich 151 € pro verlorenen Datensatz* • Automatisiert Non-Compliant Inhalte erkennen • Mögliche Geldstrafen reduzieren • Compliance Guardian unterstützt • Bestandteil der gesamten Compliance Strategie • Reduziert das Risiko möglicher Strafen oder reduziert zumindest deren Höhe http://www.symantec.com/content/en/us/about/media/pdfs/b-cost-of-a-data-breach-germany-report-2013.en-us.pdf?om_ext_cid=biz_socmed_twitter_facebook_marketwire_linkedin_2013Jun_worldwide_CostofaDataBreach
    17. 17. ©AvePoint, Inc. All rights reserved. Confidential and proprietary information of AvePoint, Inc. No part of this may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, without the prior written consent of AvePoint, Inc. “Vision” ist mehr als man sehen kann… Bekanntes Risiko Risiko ignorieren “Never in all history have we harnessed such formidable technology. Every scientific advancement known to man has been incorporated into its design. The operational controls are sound and foolproof!” E.J. Smith, Captain of the Titanic
    18. 18. ©AvePoint, Inc. All rights reserved. Confidential and proprietary information of AvePoint, Inc. No part of this may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, without the prior written consent of AvePoint, Inc. Anhand definierter Regeln • Inhalte von Dokumenten • Elemente, Objekte, komplexe Szenarien durchsuchbar Flexibel erweiterbar Verschiedene Quellen • SharePoint • Dateifreigaben • Webseiten • Sharepoint Social (Yammer) • Cloud
    19. 19. ©AvePoint, Inc. All rights reserved. Confidential and proprietary information of AvePoint, Inc. No part of this may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, without the prior written consent of AvePoint, Inc. Automatisierte Erkennung Reporting Personalisierbare Meldungen Dokumente mit Metadaten anreichern • Vertraulich • Streng geheim Aktionen • Blocken / Löschen • Quarantäne • Editieren/Überschreiben • Verschlüsseln
    20. 20. ©AvePoint, Inc. All rights reserved. Confidential and proprietary information of AvePoint, Inc. No part of this may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, without the prior written consent of AvePoint, Inc. Wo?
    21. 21. ©AvePoint, Inc. All rights reserved. Confidential and proprietary information of AvePoint, Inc. No part of this may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, without the prior written consent of AvePoint, Inc. • Bring Your Own Device (BYOD) • Trusted Devices • 2-Factor Authentisierung • Trusted Users • GPS Fetches • Trusted Locations • Als App
    22. 22. ©AvePoint, Inc. All rights reserved. Confidential and proprietary information of AvePoint, Inc. No part of this may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, without the prior written consent of AvePoint, Inc. Live Demo
    23. 23. ©AvePoint, Inc. All rights reserved. Confidential and proprietary information of AvePoint, Inc. No part of this may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, without the prior written consent of AvePoint, Inc. Perimeter Screenshots
    24. 24. ©AvePoint, Inc. All rights reserved. Confidential and proprietary information of AvePoint, Inc. No part of this may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, without the prior written consent of AvePoint, Inc. • iOS • Android • Bald: Windows Phone
    25. 25. ©AvePoint, Inc. All rights reserved. Confidential and proprietary information of AvePoint, Inc. No part of this may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, without the prior written consent of AvePoint, Inc.
    26. 26. ©AvePoint, Inc. All rights reserved. Confidential and proprietary information of AvePoint, Inc. No part of this may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, without the prior written consent of AvePoint, Inc. Erstellung einer Compliance Richtlinie. Koordination mit den verschiedenen Abteilungen.
    27. 27. ©AvePoint, Inc. All rights reserved. Confidential and proprietary information of AvePoint, Inc. No part of this may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, without the prior written consent of AvePoint, Inc.
    28. 28. ©AvePoint, Inc. All rights reserved. Confidential and proprietary information of AvePoint, Inc. No part of this may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, without the prior written consent of AvePoint, Inc. SalesDE@avepoint.com AvePoint.deDE: +49 89 2190989-0 AvePoint_de
    29. 29. Fragen und Antworten

    ×