Preventing Employee Data Breaches Caused by Unsecure File Transfers

560 views

Published on

The majority of all corporate data breaches are caused inadvertently by well-meaning employees exchanging files with customers, vendors, and partners. Ad hoc file transfer security has become a critical concern for Information Security departments at leading companies.

Published in: Technology
0 Comments
1 Like
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total views
560
On SlideShare
0
From Embeds
0
Number of Embeds
1
Actions
Shares
0
Downloads
15
Comments
0
Likes
1
Embeds 0
No embeds

No notes for slide

Preventing Employee Data Breaches Caused by Unsecure File Transfers

  1. 1. Preventing Employee Data Breaches Caused by Unsecure File Transfers<br />Thursday, September 29, 20112:00 PM EDT / 11:00 AM PDT<br />Presenter:<br />Mark Eaton, Director of Sales<br />
  2. 2. Questions?<br />Use the chat feature to the right of your screen<br />
  3. 3. Corporate Data is More Vulnerable Than Ever <br />
  4. 4. Agenda<br />Top 5 Security and Compliance Challenges<br />How to Prevent Employee Data Breaches<br />How Biscom Delivery Server Works<br />The Importance of Not Putting Files in the DMZ <br />Auditing and Reporting<br />Q&A<br />
  5. 5. Reason for Data Leaks<br />November 2009 Study<br />
  6. 6. “How well protected do you feel your company is against each of the following types of data leaks?”<br />November 2009 Study<br />
  7. 7. Poll<br />
  8. 8. 5<br />Compliance and Security Challenges from End-user Behavior<br />
  9. 9. 1. Email<br />
  10. 10. Impact of using email for large file transfer<br />of email contains attachments<br />95%<br />of email bandwidth is for attachments<br />1<br />/<br />3<br />19%<br />of email attachments are greater than 5MB <br />is the average savings for every 10% reduction in email storagein a SAN-enabled Exchange environment<br />$53,000<br />Data by: Osterman Research White Paper – Jan. 2009» Download the whitepaper at www.biscomds.com<br />
  11. 11. 2. File Transfer Protocol<br />
  12. 12. 3. Overnight Delivery<br />
  13. 13. 4. File Sharing Sites<br />
  14. 14. 5. Lack of Tracking<br />
  15. 15. Is your enterprise sending sensitive information securely?<br />
  16. 16. How to Prevent Employee Data Breaches<br />
  17. 17. = Secure File Transfer<br />
  18. 18. Secure File Transfer Selection Criteria<br />Intuitive – no training required<br />Self registration for external users<br />Easy deployment/minimum IT support<br />Flexible Deployment: Leverage existing infrastructure<br />Integrate with Active Directory/LDAP for centralized user management<br />Transaction logging for auditing and reporting<br />Secure data both in transit and at rest<br />Allow you to meet state and federal data protection mandates<br />
  19. 19. How Biscom’s Secure File Transfer Works<br />
  20. 20. Three steps to deliver files securely<br />Your senders collect documents and files, and create a package in BDS<br />Your company – Internal Senders<br />External Recipient<br />
  21. 21. Three steps to deliver files securely<br />Your senders collect documents and files, and create a package in BDS<br />Your sender addresses the package and a notification email goes out to your recipients<br />Your company – Internal Senders<br />External Recipient<br />
  22. 22. Three steps to deliver files securely<br />Your senders collect documents and files, and create a package in BDS<br />Your sender addresses the package and a notification email goes out to your recipients<br />Recipients click the embedded link, authenticate, and download their files<br />Your company – Internal Senders<br />External Recipient<br />
  23. 23. Simple User Interface<br />
  24. 24. Customizable and Brandable<br />
  25. 25. External users can self register accounts<br />
  26. 26. Users are assigned roles<br />Recipientscan receive and reply to secure deliveries<br />Senderscan create secure deliveries<br />Reportersview transactions and audit information<br />Compliance Users can download files for auditing and compliance purposes<br />Administratorscontrol system configuration and user management<br />
  27. 27. Simply choose recipients & upload files<br />
  28. 28. Delivery options available<br />Upload files<br />Select from global address book<br />Enter delivery options<br />Enter secure and notification messages<br />
  29. 29. Outlook Add-in<br />BDS Options<br />Uses existing compose message form<br />Can view file upload status<br />Drag and drop files<br />Secure message<br />
  30. 30. Recipients receive an email notification containing an embedded link<br />Automatic embedded link<br />
  31. 31. View the secure message and download files<br />Delivery meta-data<br />Files to download<br />
  32. 32. Administrator Can Track & Audit Files Sent<br />
  33. 33. SharePoint Integration<br />
  34. 34. Send File Directly From SharePoint<br />
  35. 35. Why Enterprises Select Biscom<br />
  36. 36. 1. We’ve focused on mission-critical, Enterpriseproduction solutions for more than 25 years<br />
  37. 37. 2. Integration with existing infrastructure and applications <br /><ul><li>VMware
  38. 38. Autonomy iManage
  39. 39. SharePoint
  40. 40. Outlook
  41. 41. Automation modules
  42. 42. Extensive API set</li></li></ul><li>3. Flexible deployment options:<br />VMware Appliance<br />Server<br />Amazon Cloud<br />
  43. 43. Do not store your data in the DMZ<br />Public-facing, no data stored<br />Business logic, no data stored<br />Data layer<br />
  44. 44. 4. Extensive reporting and auditing capabilities<br />
  45. 45. 5. Establish layer of Data Governance<br />Exclusions: competitors, personal email addresses<br />Inclusions: restrict inbound deliveries to specific domains<br />File type filters: business-only files <br />
  46. 46. 6. Total Cost of Ownership (TCO)<br />Perpetual software license with a one time cost<br />Bundled pricing for enterprise features<br />Use existing storage, web server, database at no additional cost<br />Buy what you need today: no costly upgrade, trade-in or installation fees<br />Scalable: go from 100 users to 5000 users with a simple license upgrade<br />TCO: Costs 30-50% less over 3-5 years vs. annual license offerings<br />
  47. 47. Questions?<br />We value your feedback, please complete the brief survey after the webinar<br />Visit our website for:<br /><ul><li> Whitepapers
  48. 48. Case Studies
  49. 49. Schedule a demo
  50. 50. and more</li></ul>‘Data at Risk’ Newsletter:<br />Subscribe here:<br />www.biscomds.com/newsletter<br />

×