Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

Introducing Security Guardian from ExactTrak

The slideshow will give you an overview of the capabilities of Security Guardian from ExactTrak

Related Books

Free with a 30 day trial from Scribd

See all

Related Audiobooks

Free with a 30 day trial from Scribd

See all
  • Be the first to comment

  • Be the first to like this

Introducing Security Guardian from ExactTrak

  1. 1. Simon Cuthbert, Director Introducing Security Guardian
  2. 2. • ‘Enterprise Level’ USB solutions • All very good but all very similar solutions • Most are encrypted • Some have central management capability • BUT…What Happens When the Device is Lost or Stolen? • All these solutions rely on being plugged into a 3rd party internet connect PC/Laptop to be managed • If the device is not plugged in it… • Can not be traced • Can not be managed • No verifiable audit trail INTRODUCTION - USB Technology in use Today 3
  3. 3. • 561 Million USB Flash Drives will be sold between 2014 and 2018 • Forrsights Survey 2014 • More than 30% have lost a USB drive containing confidential information • 77% have lost a laptop, tablet or mobile with sensitive data • 63% of IT managers lack visibility of mobile data within their organisation • 84% use personal emails to send sensitive information • 50% use public cloud services to send sensitive files • Wall Street Journal Aug 2014 5000 interviews INTRODUCTION - Don’t Forget the Insider Threat! 4
  4. 4. People Lose Stuff! More than 30% have lost a USB drive containing confidential information 77% have lost a laptop, tablet or mobile with sensitive data * Wall Street Journal Aug 2014 5000 interviews 5
  5. 5. THE DETAILS - Human Error! 6
  6. 6. THE DETAILS - Human Error! 7
  7. 7. THE DETAILS - Human Error! 8
  8. 8. • Encryption • Many end users turn off encryption on their device due to it slowing down operation • Data Stored in Cloud • Many users will download a piece of sensitive information from the Cloud but then store it locally to save time when it is needed again • Responsibility for security management should to be taken away from the End User THE DETAILS - People Just Want to Get On With Life! 9
  9. 9. Proposed EU Data Protection 2016 10
  10. 10. Have to be able to prove: Network security procedures Device encryption THE DETAILS - Proposed EU Data Protection 2016 11
  11. 11. Remote delete requests Recovered % deleted • iOS 317 43% • Android 193 57% • Blackberry 170 61% THE DETAILS - Deleting/Overwriting Data 12
  12. 12. • Mobile Data Tracking & Management Specialist • Manufactures of Security Guardian SOLUTIONS - What is Security Guardian? 13
  13. 13. 15
  14. 14. • Cloud based or On-Premise Management & user interface • Location via GPS, GSM & RFID • Geofencing • Time controlled access • Over The Air configuration • Remote turn On and Off • Remote data destruct • Verifiable audit trail and reporting SOLUTIONS - Management console 16
  15. 15. Thank you Simon Cuthbert, Director – ExactTrak Ltd Simon.cuthbert@exactTrak.com LinkedIn: Simon Cuthbert +44 (0) 7710 253340 Twitter: @exactTrak

    Be the first to comment

    Login to see the comments

The slideshow will give you an overview of the capabilities of Security Guardian from ExactTrak

Views

Total views

257

On Slideshare

0

From embeds

0

Number of embeds

3

Actions

Downloads

4

Shares

0

Comments

0

Likes

0

×