Control and Protect Confidential Data With Internal and External Parties

Joseph Data
Joseph DataMascot at Covertix
Edit Presentation Name Here
Seamless FileSecurity &Compliance.
Anywhere.
The Challenge: How To Protect & Control Data
In A World With No Boundaries?
July 2014
Organization /
Employee
Control Your Confidential Data,
No Matter Where It Travels
Gmail
Cloud Storage
& Applications
Multiple Devices
iPads, Tablets,
Mobile devices
Cyber
Criminals/
Threats
Board & Management
Consultants
Internal Employees
External Partners
Business Associates
www.covertix.com
Network Perimeter
What do we do?
Covertix provides noninvasive file protection &
control beyond the perimeters of the enterprise.
• Protection of all proprietary, confidential and
regulated information
• Transparent to the enduser andnon-disruptive
tothe business
• Protection of file level datawith internal and
external parties, anywhere.
www.covertix.com
Targeted Industries
• Healthcare
• Legal
• Construction
• Educational
• Banking & Financial
• Insurance
• Manufacturing
• Energy & Utilities
www.covertix.com
Protecting Regulated Data
• UseCase: ExternalCollaborators
• Details: A publicly traded enterprise needed to share
regulated financial data with their external audit firm.
The organization needed to ensure the original and
replicated data would stay protected internally and
externally at all times.
• The Benefits: Covertix’s sticky copy feature ensures
the company’s IT policy travels with copied/pasted
data into any new file. The new files are protected by
the original policy, no matter where the data travels
or is stored. Access to the original or replicated data
can be revoked at any time, no matter where the data
is located.
• Product: SmartCipher Collaborator
www.covertix.com
Controlling Intellectual Property
• Use Case: Protecting against internal or external cyber
threats.
• Details: A large defense company needed to protect
its corporate intellectual property found in their
proprietary design files. Based on the company’s IT
policy, files containing intellectual property were only
viewable on specific IP addresses and only during
normal business hours. Virtual machines could not
access the design files thus ensuring the company’s
IP stayed protected from internal and external
threats.
• The Benefits: Blocked any type of cyber espionage
from removing highly sensitive intellectual property
from the office.
• Product: SmartCipher Enterprise
www.covertix.com
Non-Secured Devices
• UseCase: External Board Members
• Details: A large public financial institution was
emailing its board members copies of highly
regulated data prior to quarterly board meetings to
non secured devices. The organization wanted to
share and collaborate on the data in a secured
manner without enforcing their security solutions on
the board member’s private devices.
• The Benefits: The regulated data never left the
financial institution while at the same time allowing
board members to access the protected documents
on a web reader. This was a simple and effective
manner to control highly regulated data while
providing a secure method to transport, view and
annotate on any non secured device.
• Product: SmartCipher Mobility
www.covertix.com
Covertix Products
• SmartCipher Enterprise – File control and
protection within the enterprise
• SmartCipher Collaborator – File control and
protection with external collaborators
• SmartCipher Mobility – Document
collaboration on any device
• SmartCipher Cloud - File control and
protection in the public or private cloud
www.covertix.com
Available Integrations
And More…
www.covertix.com
Edit Presentation Name Here
Seamless FileSecurity &Compliance.
Anywhere.
Thank You
2014
FileSecurity & Compliance.
Anywhere.
Forrester Briefing
Contact: info@covertix.com
Website: www.covertix.com
1 of 10

Recommended

Information security management v2010 by
Information security management v2010Information security management v2010
Information security management v2010joevest
2.4K views53 slides
EL SEGUNDO HOMBRE O POSTRER ADÁN by
EL SEGUNDO HOMBRE O POSTRER ADÁNEL SEGUNDO HOMBRE O POSTRER ADÁN
EL SEGUNDO HOMBRE O POSTRER ADÁNMinisterio Apostólico Kadosh
243 views12 slides
Het muzikale netwerk 2.0 & 3.0 by
Het muzikale netwerk 2.0 & 3.0Het muzikale netwerk 2.0 & 3.0
Het muzikale netwerk 2.0 & 3.0Stijn Bannier
413 views27 slides
Presentación1 by
Presentación1Presentación1
Presentación1gabriela gomez
213 views16 slides
Omi+ maint en by
Omi+ maint enOmi+ maint en
Omi+ maint enmulkalheloa2
1.6K views29 slides
INFOGRAFICA Rainbow Methodology by
INFOGRAFICA Rainbow MethodologyINFOGRAFICA Rainbow Methodology
INFOGRAFICA Rainbow MethodologyMaria Rita Fiasco
104 views3 slides

More Related Content

Viewers also liked

Digipak and Poster planning by
Digipak and Poster planningDigipak and Poster planning
Digipak and Poster planningSanNahar
136 views3 slides
José Viña - Envejecimiento a nivel celular y orgánico. Envejecer es normal by
José Viña - Envejecimiento a nivel celular y orgánico. Envejecer es normalJosé Viña - Envejecimiento a nivel celular y orgánico. Envejecer es normal
José Viña - Envejecimiento a nivel celular y orgánico. Envejecer es normalFundación Ramón Areces
810 views73 slides
RELIGIÓN Y REINO by
RELIGIÓN Y REINORELIGIÓN Y REINO
RELIGIÓN Y REINOMinisterio Apostólico Kadosh
624 views11 slides
Reproducción sexual y asexual by
Reproducción sexual y asexualReproducción sexual y asexual
Reproducción sexual y asexual1999804
3.6K views44 slides
biaya konsep by
biaya konsepbiaya konsep
biaya konsepFajar Sandy
536 views43 slides
Human presence detection based room light controller using pir2.pptx [repaired] by
Human presence detection based room light controller using pir2.pptx [repaired]Human presence detection based room light controller using pir2.pptx [repaired]
Human presence detection based room light controller using pir2.pptx [repaired]nikhilsinghia
3.4K views17 slides

Viewers also liked(8)

Digipak and Poster planning by SanNahar
Digipak and Poster planningDigipak and Poster planning
Digipak and Poster planning
SanNahar136 views
José Viña - Envejecimiento a nivel celular y orgánico. Envejecer es normal by Fundación Ramón Areces
José Viña - Envejecimiento a nivel celular y orgánico. Envejecer es normalJosé Viña - Envejecimiento a nivel celular y orgánico. Envejecer es normal
José Viña - Envejecimiento a nivel celular y orgánico. Envejecer es normal
Reproducción sexual y asexual by 1999804
Reproducción sexual y asexualReproducción sexual y asexual
Reproducción sexual y asexual
19998043.6K views
Human presence detection based room light controller using pir2.pptx [repaired] by nikhilsinghia
Human presence detection based room light controller using pir2.pptx [repaired]Human presence detection based room light controller using pir2.pptx [repaired]
Human presence detection based room light controller using pir2.pptx [repaired]
nikhilsinghia3.4K views
Io t40systems @ mesa graz april 2016 by Michael Klemen
Io t40systems @ mesa graz april 2016Io t40systems @ mesa graz april 2016
Io t40systems @ mesa graz april 2016
Michael Klemen194 views
Web技術の現状と将来 (Open Source Conference 2011 Kyoto) by Rikkyo University
Web技術の現状と将来 (Open Source Conference 2011 Kyoto) Web技術の現状と将来 (Open Source Conference 2011 Kyoto)
Web技術の現状と将来 (Open Source Conference 2011 Kyoto)
Rikkyo University593 views

Recently uploaded

Info Session November 2023.pdf by
Info Session November 2023.pdfInfo Session November 2023.pdf
Info Session November 2023.pdfAleksandraKoprivica4
12 views15 slides
Scaling Knowledge Graph Architectures with AI by
Scaling Knowledge Graph Architectures with AIScaling Knowledge Graph Architectures with AI
Scaling Knowledge Graph Architectures with AIEnterprise Knowledge
30 views15 slides
Zero to Automated in Under a Year by
Zero to Automated in Under a YearZero to Automated in Under a Year
Zero to Automated in Under a YearNetwork Automation Forum
15 views23 slides
Automating a World-Class Technology Conference; Behind the Scenes of CiscoLive by
Automating a World-Class Technology Conference; Behind the Scenes of CiscoLiveAutomating a World-Class Technology Conference; Behind the Scenes of CiscoLive
Automating a World-Class Technology Conference; Behind the Scenes of CiscoLiveNetwork Automation Forum
31 views35 slides
Business Analyst Series 2023 - Week 3 Session 5 by
Business Analyst Series 2023 -  Week 3 Session 5Business Analyst Series 2023 -  Week 3 Session 5
Business Analyst Series 2023 - Week 3 Session 5DianaGray10
248 views20 slides
Case Study Copenhagen Energy and Business Central.pdf by
Case Study Copenhagen Energy and Business Central.pdfCase Study Copenhagen Energy and Business Central.pdf
Case Study Copenhagen Energy and Business Central.pdfAitana
16 views3 slides

Recently uploaded(20)

Automating a World-Class Technology Conference; Behind the Scenes of CiscoLive by Network Automation Forum
Automating a World-Class Technology Conference; Behind the Scenes of CiscoLiveAutomating a World-Class Technology Conference; Behind the Scenes of CiscoLive
Automating a World-Class Technology Conference; Behind the Scenes of CiscoLive
Business Analyst Series 2023 - Week 3 Session 5 by DianaGray10
Business Analyst Series 2023 -  Week 3 Session 5Business Analyst Series 2023 -  Week 3 Session 5
Business Analyst Series 2023 - Week 3 Session 5
DianaGray10248 views
Case Study Copenhagen Energy and Business Central.pdf by Aitana
Case Study Copenhagen Energy and Business Central.pdfCase Study Copenhagen Energy and Business Central.pdf
Case Study Copenhagen Energy and Business Central.pdf
Aitana16 views
AMAZON PRODUCT RESEARCH.pdf by JerikkLaureta
AMAZON PRODUCT RESEARCH.pdfAMAZON PRODUCT RESEARCH.pdf
AMAZON PRODUCT RESEARCH.pdf
JerikkLaureta26 views
GDG Cloud Southlake 28 Brad Taylor and Shawn Augenstein Old Problems in the N... by James Anderson
GDG Cloud Southlake 28 Brad Taylor and Shawn Augenstein Old Problems in the N...GDG Cloud Southlake 28 Brad Taylor and Shawn Augenstein Old Problems in the N...
GDG Cloud Southlake 28 Brad Taylor and Shawn Augenstein Old Problems in the N...
James Anderson85 views
The details of description: Techniques, tips, and tangents on alternative tex... by BookNet Canada
The details of description: Techniques, tips, and tangents on alternative tex...The details of description: Techniques, tips, and tangents on alternative tex...
The details of description: Techniques, tips, and tangents on alternative tex...
BookNet Canada127 views
PharoJS - Zürich Smalltalk Group Meetup November 2023 by Noury Bouraqadi
PharoJS - Zürich Smalltalk Group Meetup November 2023PharoJS - Zürich Smalltalk Group Meetup November 2023
PharoJS - Zürich Smalltalk Group Meetup November 2023
Noury Bouraqadi127 views
Voice Logger - Telephony Integration Solution at Aegis by Nirmal Sharma
Voice Logger - Telephony Integration Solution at AegisVoice Logger - Telephony Integration Solution at Aegis
Voice Logger - Telephony Integration Solution at Aegis
Nirmal Sharma39 views
iSAQB Software Architecture Gathering 2023: How Process Orchestration Increas... by Bernd Ruecker
iSAQB Software Architecture Gathering 2023: How Process Orchestration Increas...iSAQB Software Architecture Gathering 2023: How Process Orchestration Increas...
iSAQB Software Architecture Gathering 2023: How Process Orchestration Increas...
Bernd Ruecker37 views
HTTP headers that make your website go faster - devs.gent November 2023 by Thijs Feryn
HTTP headers that make your website go faster - devs.gent November 2023HTTP headers that make your website go faster - devs.gent November 2023
HTTP headers that make your website go faster - devs.gent November 2023
Thijs Feryn22 views
Special_edition_innovator_2023.pdf by WillDavies22
Special_edition_innovator_2023.pdfSpecial_edition_innovator_2023.pdf
Special_edition_innovator_2023.pdf
WillDavies2217 views

Control and Protect Confidential Data With Internal and External Parties

  • 1. Edit Presentation Name Here Seamless FileSecurity &Compliance. Anywhere. The Challenge: How To Protect & Control Data In A World With No Boundaries? July 2014
  • 2. Organization / Employee Control Your Confidential Data, No Matter Where It Travels Gmail Cloud Storage & Applications Multiple Devices iPads, Tablets, Mobile devices Cyber Criminals/ Threats Board & Management Consultants Internal Employees External Partners Business Associates www.covertix.com Network Perimeter
  • 3. What do we do? Covertix provides noninvasive file protection & control beyond the perimeters of the enterprise. • Protection of all proprietary, confidential and regulated information • Transparent to the enduser andnon-disruptive tothe business • Protection of file level datawith internal and external parties, anywhere. www.covertix.com
  • 4. Targeted Industries • Healthcare • Legal • Construction • Educational • Banking & Financial • Insurance • Manufacturing • Energy & Utilities www.covertix.com
  • 5. Protecting Regulated Data • UseCase: ExternalCollaborators • Details: A publicly traded enterprise needed to share regulated financial data with their external audit firm. The organization needed to ensure the original and replicated data would stay protected internally and externally at all times. • The Benefits: Covertix’s sticky copy feature ensures the company’s IT policy travels with copied/pasted data into any new file. The new files are protected by the original policy, no matter where the data travels or is stored. Access to the original or replicated data can be revoked at any time, no matter where the data is located. • Product: SmartCipher Collaborator www.covertix.com
  • 6. Controlling Intellectual Property • Use Case: Protecting against internal or external cyber threats. • Details: A large defense company needed to protect its corporate intellectual property found in their proprietary design files. Based on the company’s IT policy, files containing intellectual property were only viewable on specific IP addresses and only during normal business hours. Virtual machines could not access the design files thus ensuring the company’s IP stayed protected from internal and external threats. • The Benefits: Blocked any type of cyber espionage from removing highly sensitive intellectual property from the office. • Product: SmartCipher Enterprise www.covertix.com
  • 7. Non-Secured Devices • UseCase: External Board Members • Details: A large public financial institution was emailing its board members copies of highly regulated data prior to quarterly board meetings to non secured devices. The organization wanted to share and collaborate on the data in a secured manner without enforcing their security solutions on the board member’s private devices. • The Benefits: The regulated data never left the financial institution while at the same time allowing board members to access the protected documents on a web reader. This was a simple and effective manner to control highly regulated data while providing a secure method to transport, view and annotate on any non secured device. • Product: SmartCipher Mobility www.covertix.com
  • 8. Covertix Products • SmartCipher Enterprise – File control and protection within the enterprise • SmartCipher Collaborator – File control and protection with external collaborators • SmartCipher Mobility – Document collaboration on any device • SmartCipher Cloud - File control and protection in the public or private cloud www.covertix.com
  • 10. Edit Presentation Name Here Seamless FileSecurity &Compliance. Anywhere. Thank You 2014 FileSecurity & Compliance. Anywhere. Forrester Briefing Contact: info@covertix.com Website: www.covertix.com