SlideShare a Scribd company logo
Knowledge management framework
on a leading Data Security Start-up
Data security and EFSS (Enterprise file secure sharing) ADITH DEV AKKARA
E-02
15020441017
The Company
Like drop box with EFSS (enterprise file sharing and security)
End to end data security and sharing
Having control over your data consumption and sharing
Presence
 1 technology office in Pune
 Multiple marketing offices all over the world
Industry practices
There was no solution for end to end back up with built in
sharing controls and at source de – duplication of data.
Companies relied on drop box or similar applications for
sharing data
No control on consumption of data and re sharing of data at
all end points (PC or Mobile)
Data could be shared from source to certain nodes, after
which control on sharing and consumption of data was lost.
The Company improvised
Have a centralised vault controlled by the company
Company controls the sharing and consumption of data, at all
end nodes
Company Improvised (Contd.)
 User has to use company specific software for consumption and sharing
of data
 Use encryptions to store – first encrypt then store policy
 Encryption techniques used are proprietary with minimum bandwidth
consumption at source and destination.
Results
 Adaptive algorithms are used in client software that continuously
monitors the CPU, memory and network utilization on the device and
accordingly controls the speed of backup.
 Therefore when user is actively working on the device, the software
ensures that it does not hamper the user productivity
Results
Because of global de-duplication across all users and devices
the amount of storage required on the server is highly reduced
Policy-based file-level and folder-level encryption of data on
Windows endpoints to protect it
THANK YOU
Adith Dev Akkara
E-02, 15020441017
SYMBIOSIS INSTITUTE OF MANAGEMENT
STUDIES

More Related Content

What's hot

Data Security
Data SecurityData Security
Data Security
Mark Waltzer
 
what is data security full ppt
what is data security full pptwhat is data security full ppt
what is data security full ppt
Shahbaz Khan
 
Sensitive Data Exposure
Sensitive Data ExposureSensitive Data Exposure
Sensitive Data Exposure
abodiford
 
Brochure Imperva Vormetric
Brochure Imperva VormetricBrochure Imperva Vormetric
Brochure Imperva Vormetric
Michelle Guerrero Montalvo
 
Inbound Data Protection
Inbound Data ProtectionInbound Data Protection
Inbound Data Protection
Seclore
 
Data Security For Insurance Solutions
Data Security For Insurance SolutionsData Security For Insurance Solutions
Data Security For Insurance Solutions
Seclore
 
Secure Islands Case Study - Financial Firm Implements Enhanced DLP
Secure Islands Case Study - Financial Firm Implements Enhanced DLPSecure Islands Case Study - Financial Firm Implements Enhanced DLP
Secure Islands Case Study - Financial Firm Implements Enhanced DLP
Secure Islands - Data Security Policy
 
DLP Solutions Protection | Seclore
DLP Solutions Protection |  SecloreDLP Solutions Protection |  Seclore
DLP Solutions Protection | Seclore
Seclore
 
Brochure Imperva Securesphere Vormetric Encryption
Brochure Imperva Securesphere Vormetric EncryptionBrochure Imperva Securesphere Vormetric Encryption
Brochure Imperva Securesphere Vormetric Encryption
Michelle Guerrero Montalvo
 
Insider Threat Protection | Seclore
Insider Threat Protection | SecloreInsider Threat Protection | Seclore
Insider Threat Protection | Seclore
Seclore
 
IQProtector Suite
IQProtector SuiteIQProtector Suite
Compliance regulations with Data Centric Security | Seclore
Compliance regulations with Data Centric Security | SecloreCompliance regulations with Data Centric Security | Seclore
Compliance regulations with Data Centric Security | Seclore
Seclore
 
Benefits of automating data protection | Seclore
Benefits of automating data protection | SecloreBenefits of automating data protection | Seclore
Benefits of automating data protection | Seclore
Seclore
 
Data Governance Solutions With Seclore and Stash
Data Governance Solutions With Seclore and StashData Governance Solutions With Seclore and Stash
Data Governance Solutions With Seclore and Stash
Seclore
 
Application Data Security | Seclore
Application Data Security | SecloreApplication Data Security | Seclore
Application Data Security | Seclore
Seclore
 
One click protection in microsoft office
One click protection in microsoft officeOne click protection in microsoft office
One click protection in microsoft office
Seclore
 
Email Security Solutions | Seclore
Email Security Solutions | SecloreEmail Security Solutions | Seclore
Email Security Solutions | Seclore
Seclore
 
Seclore For Spirion Data Classification | Seclore
Seclore For Spirion Data Classification | SecloreSeclore For Spirion Data Classification | Seclore
Seclore For Spirion Data Classification | Seclore
Seclore
 
Seclore Decrypter For Email
Seclore Decrypter For EmailSeclore Decrypter For Email
Seclore Decrypter For Email
Seclore
 

What's hot (19)

Data Security
Data SecurityData Security
Data Security
 
what is data security full ppt
what is data security full pptwhat is data security full ppt
what is data security full ppt
 
Sensitive Data Exposure
Sensitive Data ExposureSensitive Data Exposure
Sensitive Data Exposure
 
Brochure Imperva Vormetric
Brochure Imperva VormetricBrochure Imperva Vormetric
Brochure Imperva Vormetric
 
Inbound Data Protection
Inbound Data ProtectionInbound Data Protection
Inbound Data Protection
 
Data Security For Insurance Solutions
Data Security For Insurance SolutionsData Security For Insurance Solutions
Data Security For Insurance Solutions
 
Secure Islands Case Study - Financial Firm Implements Enhanced DLP
Secure Islands Case Study - Financial Firm Implements Enhanced DLPSecure Islands Case Study - Financial Firm Implements Enhanced DLP
Secure Islands Case Study - Financial Firm Implements Enhanced DLP
 
DLP Solutions Protection | Seclore
DLP Solutions Protection |  SecloreDLP Solutions Protection |  Seclore
DLP Solutions Protection | Seclore
 
Brochure Imperva Securesphere Vormetric Encryption
Brochure Imperva Securesphere Vormetric EncryptionBrochure Imperva Securesphere Vormetric Encryption
Brochure Imperva Securesphere Vormetric Encryption
 
Insider Threat Protection | Seclore
Insider Threat Protection | SecloreInsider Threat Protection | Seclore
Insider Threat Protection | Seclore
 
IQProtector Suite
IQProtector SuiteIQProtector Suite
IQProtector Suite
 
Compliance regulations with Data Centric Security | Seclore
Compliance regulations with Data Centric Security | SecloreCompliance regulations with Data Centric Security | Seclore
Compliance regulations with Data Centric Security | Seclore
 
Benefits of automating data protection | Seclore
Benefits of automating data protection | SecloreBenefits of automating data protection | Seclore
Benefits of automating data protection | Seclore
 
Data Governance Solutions With Seclore and Stash
Data Governance Solutions With Seclore and StashData Governance Solutions With Seclore and Stash
Data Governance Solutions With Seclore and Stash
 
Application Data Security | Seclore
Application Data Security | SecloreApplication Data Security | Seclore
Application Data Security | Seclore
 
One click protection in microsoft office
One click protection in microsoft officeOne click protection in microsoft office
One click protection in microsoft office
 
Email Security Solutions | Seclore
Email Security Solutions | SecloreEmail Security Solutions | Seclore
Email Security Solutions | Seclore
 
Seclore For Spirion Data Classification | Seclore
Seclore For Spirion Data Classification | SecloreSeclore For Spirion Data Classification | Seclore
Seclore For Spirion Data Classification | Seclore
 
Seclore Decrypter For Email
Seclore Decrypter For EmailSeclore Decrypter For Email
Seclore Decrypter For Email
 

Viewers also liked

Day session3 vision_adelphi
Day  session3 vision_adelphiDay  session3 vision_adelphi
Day session3 vision_adelphi
know4drr
 
Using A Km Framework To Evaluate An Erp System Implementation
Using A Km Framework To Evaluate An Erp System ImplementationUsing A Km Framework To Evaluate An Erp System Implementation
Using A Km Framework To Evaluate An Erp System Implementation
Donovan Mulder
 
A KM Framework to support a multinational network
A KM Framework to support a multinational networkA KM Framework to support a multinational network
A KM Framework to support a multinational network
Patrice Chalon
 
Refugees in Jordan
Refugees in JordanRefugees in Jordan
Refugees in Jordan
Addison Burns
 
CITYLITCV
CITYLITCVCITYLITCV
CITYLITCV
R.Fraser Fraser
 
ArtcraftHealth_Clinical_MM
ArtcraftHealth_Clinical_MMArtcraftHealth_Clinical_MM
ArtcraftHealth_Clinical_MM
Marty Mason, MBA MS
 
Enterprise Archecture for Knowledge Management
Enterprise Archecture for Knowledge ManagementEnterprise Archecture for Knowledge Management
Enterprise Archecture for Knowledge Management
Peter Stinson
 
KM Implementation Framework for Special Library
KM Implementation Framework for Special LibraryKM Implementation Framework for Special Library
KM Implementation Framework for Special Library
Alwi Yunus
 
Syrian Refugees in United Nations High Commissioner for Refugees
Syrian Refugees in United Nations High Commissioner for RefugeesSyrian Refugees in United Nations High Commissioner for Refugees
Syrian Refugees in United Nations High Commissioner for Refugees
Addison Burns
 
Knowledge Management framework in ITES/BPO Industry
Knowledge Management framework in ITES/BPO IndustryKnowledge Management framework in ITES/BPO Industry
Knowledge Management framework in ITES/BPO Industry
Vishal Singh
 
Framework of-knowledge-management-study
Framework of-knowledge-management-studyFramework of-knowledge-management-study
Framework of-knowledge-management-study
Ijcem Journal
 
Body Parts Lesson Plan
Body Parts Lesson PlanBody Parts Lesson Plan
Body Parts Lesson Plan
Addison Burns
 
KM Framework
KM FrameworkKM Framework
Planning, Evaluation & Knowledge Management Framework
Planning, Evaluation & Knowledge Management FrameworkPlanning, Evaluation & Knowledge Management Framework
Planning, Evaluation & Knowledge Management Framework
Australian Federation of AIDS Organisations
 
Protected Area Network Knowledge Management Framework (Needs Assessment and A...
Protected Area Network Knowledge Management Framework (Needs Assessment and A...Protected Area Network Knowledge Management Framework (Needs Assessment and A...
Protected Area Network Knowledge Management Framework (Needs Assessment and A...
John Mauremootoo
 

Viewers also liked (15)

Day session3 vision_adelphi
Day  session3 vision_adelphiDay  session3 vision_adelphi
Day session3 vision_adelphi
 
Using A Km Framework To Evaluate An Erp System Implementation
Using A Km Framework To Evaluate An Erp System ImplementationUsing A Km Framework To Evaluate An Erp System Implementation
Using A Km Framework To Evaluate An Erp System Implementation
 
A KM Framework to support a multinational network
A KM Framework to support a multinational networkA KM Framework to support a multinational network
A KM Framework to support a multinational network
 
Refugees in Jordan
Refugees in JordanRefugees in Jordan
Refugees in Jordan
 
CITYLITCV
CITYLITCVCITYLITCV
CITYLITCV
 
ArtcraftHealth_Clinical_MM
ArtcraftHealth_Clinical_MMArtcraftHealth_Clinical_MM
ArtcraftHealth_Clinical_MM
 
Enterprise Archecture for Knowledge Management
Enterprise Archecture for Knowledge ManagementEnterprise Archecture for Knowledge Management
Enterprise Archecture for Knowledge Management
 
KM Implementation Framework for Special Library
KM Implementation Framework for Special LibraryKM Implementation Framework for Special Library
KM Implementation Framework for Special Library
 
Syrian Refugees in United Nations High Commissioner for Refugees
Syrian Refugees in United Nations High Commissioner for RefugeesSyrian Refugees in United Nations High Commissioner for Refugees
Syrian Refugees in United Nations High Commissioner for Refugees
 
Knowledge Management framework in ITES/BPO Industry
Knowledge Management framework in ITES/BPO IndustryKnowledge Management framework in ITES/BPO Industry
Knowledge Management framework in ITES/BPO Industry
 
Framework of-knowledge-management-study
Framework of-knowledge-management-studyFramework of-knowledge-management-study
Framework of-knowledge-management-study
 
Body Parts Lesson Plan
Body Parts Lesson PlanBody Parts Lesson Plan
Body Parts Lesson Plan
 
KM Framework
KM FrameworkKM Framework
KM Framework
 
Planning, Evaluation & Knowledge Management Framework
Planning, Evaluation & Knowledge Management FrameworkPlanning, Evaluation & Knowledge Management Framework
Planning, Evaluation & Knowledge Management Framework
 
Protected Area Network Knowledge Management Framework (Needs Assessment and A...
Protected Area Network Knowledge Management Framework (Needs Assessment and A...Protected Area Network Knowledge Management Framework (Needs Assessment and A...
Protected Area Network Knowledge Management Framework (Needs Assessment and A...
 

Similar to In data security

10 Risky Employee Practices - Security solutions
10 Risky Employee Practices - Security solutions10 Risky Employee Practices - Security solutions
10 Risky Employee Practices - Security solutions
Fuji Xerox Singapore
 
CSE_Instructor_Materials_Chapter7.pptx
CSE_Instructor_Materials_Chapter7.pptxCSE_Instructor_Materials_Chapter7.pptx
CSE_Instructor_Materials_Chapter7.pptx
Mohammad512578
 
Security Plan for Small Networks/Offices
Security Plan for Small Networks/Offices Security Plan for Small Networks/Offices
Security Plan for Small Networks/Offices
Ajay Jassi
 
The connection beyond non stop encryption
The connection   beyond non stop encryptionThe connection   beyond non stop encryption
The connection beyond non stop encryption
Bloombase
 
Document Centralization, SOFTCAMP MAXEON FX_ENG
Document Centralization, SOFTCAMP MAXEON FX_ENGDocument Centralization, SOFTCAMP MAXEON FX_ENG
Document Centralization, SOFTCAMP MAXEON FX_ENG
Softcamp Co., Ltd.
 
INTRODUCTION
INTRODUCTIONINTRODUCTION
INTRODUCTION
Dheeraj Kumar Singh
 
Webinar: Endpoint Backup is not Enough - You Need an End-user Data Strategy
Webinar: Endpoint Backup is not Enough - You Need an End-user Data StrategyWebinar: Endpoint Backup is not Enough - You Need an End-user Data Strategy
Webinar: Endpoint Backup is not Enough - You Need an End-user Data Strategy
Storage Switzerland
 
Make the Upgrade: Data protection in the cloud
Make the Upgrade: Data protection in the cloudMake the Upgrade: Data protection in the cloud
Make the Upgrade: Data protection in the cloud
Erik Von Schlehenried
 
BH SA A4 Brochure
BH SA A4 BrochureBH SA A4 Brochure
BH SA A4 Brochure
Amit Parbhucharan
 
Protect Your Sensitive Data with Gemalto Guidebook
Protect Your Sensitive Data with Gemalto Guidebook Protect Your Sensitive Data with Gemalto Guidebook
Protect Your Sensitive Data with Gemalto Guidebook
Exclusive Networks ME
 
Jms secure data presentation
Jms secure data  presentationJms secure data  presentation
Jms secure data presentation
JMS Secure Data
 
Windows 10: Security Focus (part II)
Windows 10: Security Focus (part II)Windows 10: Security Focus (part II)
Windows 10: Security Focus (part II)
Juan Ignacio Oller Aznar
 
Gerenciamento de dispositivos móveis com Intune e SCCM
Gerenciamento de dispositivos móveis com Intune e SCCMGerenciamento de dispositivos móveis com Intune e SCCM
Gerenciamento de dispositivos móveis com Intune e SCCM
Guilherme Maia
 
How Organizations can Secure Their Database From External Attacks
How Organizations can Secure Their Database From External AttacksHow Organizations can Secure Their Database From External Attacks
How Organizations can Secure Their Database From External Attacks
Emmanuel Oshogwe Akpeokhai
 
CIS Control Solution Guide
CIS Control Solution Guide CIS Control Solution Guide
CIS Control Solution Guide
Lauren Bell
 
Secure deduplication-evault-endpoint-protection
Secure deduplication-evault-endpoint-protectionSecure deduplication-evault-endpoint-protection
Secure deduplication-evault-endpoint-protection
Inka Traktman
 
Encrypt-Everything-eB.pdf
Encrypt-Everything-eB.pdfEncrypt-Everything-eB.pdf
Encrypt-Everything-eB.pdf
alexguzman510050
 
DG_Architecture_Training.pptx
DG_Architecture_Training.pptxDG_Architecture_Training.pptx
DG_Architecture_Training.pptx
TranVu383073
 
Data Fabrics.pptx
Data Fabrics.pptxData Fabrics.pptx
Data Fabrics.pptx
TanishqVarma1
 
Deployment websese
Deployment webseseDeployment websese
Deployment websese
thanglx
 

Similar to In data security (20)

10 Risky Employee Practices - Security solutions
10 Risky Employee Practices - Security solutions10 Risky Employee Practices - Security solutions
10 Risky Employee Practices - Security solutions
 
CSE_Instructor_Materials_Chapter7.pptx
CSE_Instructor_Materials_Chapter7.pptxCSE_Instructor_Materials_Chapter7.pptx
CSE_Instructor_Materials_Chapter7.pptx
 
Security Plan for Small Networks/Offices
Security Plan for Small Networks/Offices Security Plan for Small Networks/Offices
Security Plan for Small Networks/Offices
 
The connection beyond non stop encryption
The connection   beyond non stop encryptionThe connection   beyond non stop encryption
The connection beyond non stop encryption
 
Document Centralization, SOFTCAMP MAXEON FX_ENG
Document Centralization, SOFTCAMP MAXEON FX_ENGDocument Centralization, SOFTCAMP MAXEON FX_ENG
Document Centralization, SOFTCAMP MAXEON FX_ENG
 
INTRODUCTION
INTRODUCTIONINTRODUCTION
INTRODUCTION
 
Webinar: Endpoint Backup is not Enough - You Need an End-user Data Strategy
Webinar: Endpoint Backup is not Enough - You Need an End-user Data StrategyWebinar: Endpoint Backup is not Enough - You Need an End-user Data Strategy
Webinar: Endpoint Backup is not Enough - You Need an End-user Data Strategy
 
Make the Upgrade: Data protection in the cloud
Make the Upgrade: Data protection in the cloudMake the Upgrade: Data protection in the cloud
Make the Upgrade: Data protection in the cloud
 
BH SA A4 Brochure
BH SA A4 BrochureBH SA A4 Brochure
BH SA A4 Brochure
 
Protect Your Sensitive Data with Gemalto Guidebook
Protect Your Sensitive Data with Gemalto Guidebook Protect Your Sensitive Data with Gemalto Guidebook
Protect Your Sensitive Data with Gemalto Guidebook
 
Jms secure data presentation
Jms secure data  presentationJms secure data  presentation
Jms secure data presentation
 
Windows 10: Security Focus (part II)
Windows 10: Security Focus (part II)Windows 10: Security Focus (part II)
Windows 10: Security Focus (part II)
 
Gerenciamento de dispositivos móveis com Intune e SCCM
Gerenciamento de dispositivos móveis com Intune e SCCMGerenciamento de dispositivos móveis com Intune e SCCM
Gerenciamento de dispositivos móveis com Intune e SCCM
 
How Organizations can Secure Their Database From External Attacks
How Organizations can Secure Their Database From External AttacksHow Organizations can Secure Their Database From External Attacks
How Organizations can Secure Their Database From External Attacks
 
CIS Control Solution Guide
CIS Control Solution Guide CIS Control Solution Guide
CIS Control Solution Guide
 
Secure deduplication-evault-endpoint-protection
Secure deduplication-evault-endpoint-protectionSecure deduplication-evault-endpoint-protection
Secure deduplication-evault-endpoint-protection
 
Encrypt-Everything-eB.pdf
Encrypt-Everything-eB.pdfEncrypt-Everything-eB.pdf
Encrypt-Everything-eB.pdf
 
DG_Architecture_Training.pptx
DG_Architecture_Training.pptxDG_Architecture_Training.pptx
DG_Architecture_Training.pptx
 
Data Fabrics.pptx
Data Fabrics.pptxData Fabrics.pptx
Data Fabrics.pptx
 
Deployment websese
Deployment webseseDeployment websese
Deployment websese
 

Recently uploaded

A presentation that explain the Power BI Licensing
A presentation that explain the Power BI LicensingA presentation that explain the Power BI Licensing
A presentation that explain the Power BI Licensing
AlessioFois2
 
University of New South Wales degree offer diploma Transcript
University of New South Wales degree offer diploma TranscriptUniversity of New South Wales degree offer diploma Transcript
University of New South Wales degree offer diploma Transcript
soxrziqu
 
Intelligence supported media monitoring in veterinary medicine
Intelligence supported media monitoring in veterinary medicineIntelligence supported media monitoring in veterinary medicine
Intelligence supported media monitoring in veterinary medicine
AndrzejJarynowski
 
Analysis insight about a Flyball dog competition team's performance
Analysis insight about a Flyball dog competition team's performanceAnalysis insight about a Flyball dog competition team's performance
Analysis insight about a Flyball dog competition team's performance
roli9797
 
办(uts毕业证书)悉尼科技大学毕业证学历证书原版一模一样
办(uts毕业证书)悉尼科技大学毕业证学历证书原版一模一样办(uts毕业证书)悉尼科技大学毕业证学历证书原版一模一样
办(uts毕业证书)悉尼科技大学毕业证学历证书原版一模一样
apvysm8
 
The Building Blocks of QuestDB, a Time Series Database
The Building Blocks of QuestDB, a Time Series DatabaseThe Building Blocks of QuestDB, a Time Series Database
The Building Blocks of QuestDB, a Time Series Database
javier ramirez
 
Predictably Improve Your B2B Tech Company's Performance by Leveraging Data
Predictably Improve Your B2B Tech Company's Performance by Leveraging DataPredictably Improve Your B2B Tech Company's Performance by Leveraging Data
Predictably Improve Your B2B Tech Company's Performance by Leveraging Data
Kiwi Creative
 
ViewShift: Hassle-free Dynamic Policy Enforcement for Every Data Lake
ViewShift: Hassle-free Dynamic Policy Enforcement for Every Data LakeViewShift: Hassle-free Dynamic Policy Enforcement for Every Data Lake
ViewShift: Hassle-free Dynamic Policy Enforcement for Every Data Lake
Walaa Eldin Moustafa
 
Challenges of Nation Building-1.pptx with more important
Challenges of Nation Building-1.pptx with more importantChallenges of Nation Building-1.pptx with more important
Challenges of Nation Building-1.pptx with more important
Sm321
 
Experts live - Improving user adoption with AI
Experts live - Improving user adoption with AIExperts live - Improving user adoption with AI
Experts live - Improving user adoption with AI
jitskeb
 
4th Modern Marketing Reckoner by MMA Global India & Group M: 60+ experts on W...
4th Modern Marketing Reckoner by MMA Global India & Group M: 60+ experts on W...4th Modern Marketing Reckoner by MMA Global India & Group M: 60+ experts on W...
4th Modern Marketing Reckoner by MMA Global India & Group M: 60+ experts on W...
Social Samosa
 
06-12-2024-BudapestDataForum-BuildingReal-timePipelineswithFLaNK AIM
06-12-2024-BudapestDataForum-BuildingReal-timePipelineswithFLaNK AIM06-12-2024-BudapestDataForum-BuildingReal-timePipelineswithFLaNK AIM
06-12-2024-BudapestDataForum-BuildingReal-timePipelineswithFLaNK AIM
Timothy Spann
 
原版制作(unimelb毕业证书)墨尔本大学毕业证Offer一模一样
原版制作(unimelb毕业证书)墨尔本大学毕业证Offer一模一样原版制作(unimelb毕业证书)墨尔本大学毕业证Offer一模一样
原版制作(unimelb毕业证书)墨尔本大学毕业证Offer一模一样
ihavuls
 
DATA COMMS-NETWORKS YR2 lecture 08 NAT & CLOUD.docx
DATA COMMS-NETWORKS YR2 lecture 08 NAT & CLOUD.docxDATA COMMS-NETWORKS YR2 lecture 08 NAT & CLOUD.docx
DATA COMMS-NETWORKS YR2 lecture 08 NAT & CLOUD.docx
SaffaIbrahim1
 
Population Growth in Bataan: The effects of population growth around rural pl...
Population Growth in Bataan: The effects of population growth around rural pl...Population Growth in Bataan: The effects of population growth around rural pl...
Population Growth in Bataan: The effects of population growth around rural pl...
Bill641377
 
Everything you wanted to know about LIHTC
Everything you wanted to know about LIHTCEverything you wanted to know about LIHTC
Everything you wanted to know about LIHTC
Roger Valdez
 
Global Situational Awareness of A.I. and where its headed
Global Situational Awareness of A.I. and where its headedGlobal Situational Awareness of A.I. and where its headed
Global Situational Awareness of A.I. and where its headed
vikram sood
 
Open Source Contributions to Postgres: The Basics POSETTE 2024
Open Source Contributions to Postgres: The Basics POSETTE 2024Open Source Contributions to Postgres: The Basics POSETTE 2024
Open Source Contributions to Postgres: The Basics POSETTE 2024
ElizabethGarrettChri
 
在线办理(英国UCA毕业证书)创意艺术大学毕业证在读证明一模一样
在线办理(英国UCA毕业证书)创意艺术大学毕业证在读证明一模一样在线办理(英国UCA毕业证书)创意艺术大学毕业证在读证明一模一样
在线办理(英国UCA毕业证书)创意艺术大学毕业证在读证明一模一样
v7oacc3l
 
一比一原版(Unimelb毕业证书)墨尔本大学毕业证如何办理
一比一原版(Unimelb毕业证书)墨尔本大学毕业证如何办理一比一原版(Unimelb毕业证书)墨尔本大学毕业证如何办理
一比一原版(Unimelb毕业证书)墨尔本大学毕业证如何办理
xclpvhuk
 

Recently uploaded (20)

A presentation that explain the Power BI Licensing
A presentation that explain the Power BI LicensingA presentation that explain the Power BI Licensing
A presentation that explain the Power BI Licensing
 
University of New South Wales degree offer diploma Transcript
University of New South Wales degree offer diploma TranscriptUniversity of New South Wales degree offer diploma Transcript
University of New South Wales degree offer diploma Transcript
 
Intelligence supported media monitoring in veterinary medicine
Intelligence supported media monitoring in veterinary medicineIntelligence supported media monitoring in veterinary medicine
Intelligence supported media monitoring in veterinary medicine
 
Analysis insight about a Flyball dog competition team's performance
Analysis insight about a Flyball dog competition team's performanceAnalysis insight about a Flyball dog competition team's performance
Analysis insight about a Flyball dog competition team's performance
 
办(uts毕业证书)悉尼科技大学毕业证学历证书原版一模一样
办(uts毕业证书)悉尼科技大学毕业证学历证书原版一模一样办(uts毕业证书)悉尼科技大学毕业证学历证书原版一模一样
办(uts毕业证书)悉尼科技大学毕业证学历证书原版一模一样
 
The Building Blocks of QuestDB, a Time Series Database
The Building Blocks of QuestDB, a Time Series DatabaseThe Building Blocks of QuestDB, a Time Series Database
The Building Blocks of QuestDB, a Time Series Database
 
Predictably Improve Your B2B Tech Company's Performance by Leveraging Data
Predictably Improve Your B2B Tech Company's Performance by Leveraging DataPredictably Improve Your B2B Tech Company's Performance by Leveraging Data
Predictably Improve Your B2B Tech Company's Performance by Leveraging Data
 
ViewShift: Hassle-free Dynamic Policy Enforcement for Every Data Lake
ViewShift: Hassle-free Dynamic Policy Enforcement for Every Data LakeViewShift: Hassle-free Dynamic Policy Enforcement for Every Data Lake
ViewShift: Hassle-free Dynamic Policy Enforcement for Every Data Lake
 
Challenges of Nation Building-1.pptx with more important
Challenges of Nation Building-1.pptx with more importantChallenges of Nation Building-1.pptx with more important
Challenges of Nation Building-1.pptx with more important
 
Experts live - Improving user adoption with AI
Experts live - Improving user adoption with AIExperts live - Improving user adoption with AI
Experts live - Improving user adoption with AI
 
4th Modern Marketing Reckoner by MMA Global India & Group M: 60+ experts on W...
4th Modern Marketing Reckoner by MMA Global India & Group M: 60+ experts on W...4th Modern Marketing Reckoner by MMA Global India & Group M: 60+ experts on W...
4th Modern Marketing Reckoner by MMA Global India & Group M: 60+ experts on W...
 
06-12-2024-BudapestDataForum-BuildingReal-timePipelineswithFLaNK AIM
06-12-2024-BudapestDataForum-BuildingReal-timePipelineswithFLaNK AIM06-12-2024-BudapestDataForum-BuildingReal-timePipelineswithFLaNK AIM
06-12-2024-BudapestDataForum-BuildingReal-timePipelineswithFLaNK AIM
 
原版制作(unimelb毕业证书)墨尔本大学毕业证Offer一模一样
原版制作(unimelb毕业证书)墨尔本大学毕业证Offer一模一样原版制作(unimelb毕业证书)墨尔本大学毕业证Offer一模一样
原版制作(unimelb毕业证书)墨尔本大学毕业证Offer一模一样
 
DATA COMMS-NETWORKS YR2 lecture 08 NAT & CLOUD.docx
DATA COMMS-NETWORKS YR2 lecture 08 NAT & CLOUD.docxDATA COMMS-NETWORKS YR2 lecture 08 NAT & CLOUD.docx
DATA COMMS-NETWORKS YR2 lecture 08 NAT & CLOUD.docx
 
Population Growth in Bataan: The effects of population growth around rural pl...
Population Growth in Bataan: The effects of population growth around rural pl...Population Growth in Bataan: The effects of population growth around rural pl...
Population Growth in Bataan: The effects of population growth around rural pl...
 
Everything you wanted to know about LIHTC
Everything you wanted to know about LIHTCEverything you wanted to know about LIHTC
Everything you wanted to know about LIHTC
 
Global Situational Awareness of A.I. and where its headed
Global Situational Awareness of A.I. and where its headedGlobal Situational Awareness of A.I. and where its headed
Global Situational Awareness of A.I. and where its headed
 
Open Source Contributions to Postgres: The Basics POSETTE 2024
Open Source Contributions to Postgres: The Basics POSETTE 2024Open Source Contributions to Postgres: The Basics POSETTE 2024
Open Source Contributions to Postgres: The Basics POSETTE 2024
 
在线办理(英国UCA毕业证书)创意艺术大学毕业证在读证明一模一样
在线办理(英国UCA毕业证书)创意艺术大学毕业证在读证明一模一样在线办理(英国UCA毕业证书)创意艺术大学毕业证在读证明一模一样
在线办理(英国UCA毕业证书)创意艺术大学毕业证在读证明一模一样
 
一比一原版(Unimelb毕业证书)墨尔本大学毕业证如何办理
一比一原版(Unimelb毕业证书)墨尔本大学毕业证如何办理一比一原版(Unimelb毕业证书)墨尔本大学毕业证如何办理
一比一原版(Unimelb毕业证书)墨尔本大学毕业证如何办理
 

In data security

  • 1. Knowledge management framework on a leading Data Security Start-up Data security and EFSS (Enterprise file secure sharing) ADITH DEV AKKARA E-02 15020441017
  • 2. The Company Like drop box with EFSS (enterprise file sharing and security) End to end data security and sharing Having control over your data consumption and sharing
  • 3. Presence  1 technology office in Pune  Multiple marketing offices all over the world
  • 4. Industry practices There was no solution for end to end back up with built in sharing controls and at source de – duplication of data. Companies relied on drop box or similar applications for sharing data No control on consumption of data and re sharing of data at all end points (PC or Mobile) Data could be shared from source to certain nodes, after which control on sharing and consumption of data was lost.
  • 5. The Company improvised Have a centralised vault controlled by the company Company controls the sharing and consumption of data, at all end nodes
  • 6. Company Improvised (Contd.)  User has to use company specific software for consumption and sharing of data  Use encryptions to store – first encrypt then store policy  Encryption techniques used are proprietary with minimum bandwidth consumption at source and destination.
  • 7. Results  Adaptive algorithms are used in client software that continuously monitors the CPU, memory and network utilization on the device and accordingly controls the speed of backup.  Therefore when user is actively working on the device, the software ensures that it does not hamper the user productivity
  • 8. Results Because of global de-duplication across all users and devices the amount of storage required on the server is highly reduced Policy-based file-level and folder-level encryption of data on Windows endpoints to protect it
  • 9. THANK YOU Adith Dev Akkara E-02, 15020441017 SYMBIOSIS INSTITUTE OF MANAGEMENT STUDIES