DATA SECURITY
It’s your Data – Are you sure it’s Safe?
Never Sacrifice Security | Keep your Data Safe
INTRODUCTION
Data is information processed and stored
in form of text, images audio clips and
software programs.
Data is secured in computer in binary
format which is bunch of 1 and 0.
Data stored in computer can be
transferred to other devices with the help
of networks.
 We provide Advanced Email Security, Advanced
Threat Protection, Data Loss Prevention and
Endpoint Protection to keep your data secure.
 Data Loss Prevention (DLP is a strategy to be sure
that end users are not able to send crucial and
ultrasensitive information outside the companies
network.
 DLP follow business rules that states any
unauthorized user has access to the data whose
leakage can cause security threat for company.
PRINCIPLES OF DATA PROTECTION
TYPES OF DATA SECURITY AND IMPORTANCE
 Network Layer Security
 IPSec Protocol
 Email Security
Data Security is crucial not only for business but
also for personal computers or laptops. Business
data, client information, personal files, detail of
bank account and other types of sensitive
information can be difficult to replace if it falls in the
hands of hacker.
KEY CONCEPTS OF DATA SECURITY
 Availability
 Integrity
 Confidentiality
AVAILABILITY
 Data should be accessible
anywhere and anytime.
 Only the authorised users should
have access to data.
 Tracking of data access is crucial
as to who has access to what type
of data.
INTEGRITY
 Data should be encrypted and locked by
cipher.
 Check the access control of data to various
users.
 Need of verification system to analyse
whether report request are from users who
are authorised to have data access.
 Checking that the data transfer is being
received by the authorised receiver.
CONFIDENTIALITY
 Sensitive data should be accessible to
accurate people who have legitimate right to
use the data.
 Protecting database whether external or
internal from unauthorized breaches.
 there should be a report as to what persons
have access to what type of data and how
they have use it.
 Legally crucial data must be kept under
very tight security so that company don't
has to face litigation process.
CONTACT US
Address : SCO 365-366, Sector 35(B)
Chandigarh-160022
Email id : fore@foresolutions.net
Visit www.foresolutions.net

Data security

  • 1.
    DATA SECURITY It’s yourData – Are you sure it’s Safe? Never Sacrifice Security | Keep your Data Safe
  • 2.
    INTRODUCTION Data is informationprocessed and stored in form of text, images audio clips and software programs. Data is secured in computer in binary format which is bunch of 1 and 0. Data stored in computer can be transferred to other devices with the help of networks.
  • 3.
     We provideAdvanced Email Security, Advanced Threat Protection, Data Loss Prevention and Endpoint Protection to keep your data secure.  Data Loss Prevention (DLP is a strategy to be sure that end users are not able to send crucial and ultrasensitive information outside the companies network.  DLP follow business rules that states any unauthorized user has access to the data whose leakage can cause security threat for company.
  • 4.
  • 5.
    TYPES OF DATASECURITY AND IMPORTANCE  Network Layer Security  IPSec Protocol  Email Security Data Security is crucial not only for business but also for personal computers or laptops. Business data, client information, personal files, detail of bank account and other types of sensitive information can be difficult to replace if it falls in the hands of hacker.
  • 6.
    KEY CONCEPTS OFDATA SECURITY  Availability  Integrity  Confidentiality
  • 7.
    AVAILABILITY  Data shouldbe accessible anywhere and anytime.  Only the authorised users should have access to data.  Tracking of data access is crucial as to who has access to what type of data.
  • 8.
    INTEGRITY  Data shouldbe encrypted and locked by cipher.  Check the access control of data to various users.  Need of verification system to analyse whether report request are from users who are authorised to have data access.  Checking that the data transfer is being received by the authorised receiver.
  • 9.
    CONFIDENTIALITY  Sensitive datashould be accessible to accurate people who have legitimate right to use the data.  Protecting database whether external or internal from unauthorized breaches.  there should be a report as to what persons have access to what type of data and how they have use it.  Legally crucial data must be kept under very tight security so that company don't has to face litigation process.
  • 10.
    CONTACT US Address :SCO 365-366, Sector 35(B) Chandigarh-160022 Email id : fore@foresolutions.net Visit www.foresolutions.net