SlideShare a Scribd company logo
Simon Cuthbert, Director
Introducing Security Guardian
• ‘Enterprise Level’ USB solutions
• All very good but all very similar solutions
• Most are encrypted
• Some have central management capability
• BUT…What Happens When the Device is Lost or Stolen?
• All these solutions rely on being plugged into a 3rd party
internet connect PC/Laptop to be managed
• If the device is not plugged in it…
• Can not be traced
• Can not be managed
• No verifiable audit trail
INTRODUCTION - USB Technology in use Today
3
• 561 Million USB Flash Drives will be sold between 2014 and 2018
• Forrsights Survey 2014
• More than 30% have lost a USB drive containing confidential
information
• 77% have lost a laptop, tablet or mobile with sensitive data
• 63% of IT managers lack visibility of mobile data within their
organisation
• 84% use personal emails to send sensitive information
• 50% use public cloud services to send sensitive files
• Wall Street Journal Aug 2014 5000 interviews
INTRODUCTION - Don’t Forget the Insider Threat!
4
People Lose Stuff!
More than 30% have lost a USB drive containing confidential information
77% have lost a laptop, tablet or mobile with sensitive data
* Wall Street Journal Aug 2014 5000 interviews
5
THE DETAILS - Human Error!
6
THE DETAILS - Human Error!
7
THE DETAILS - Human Error!
8
• Encryption
• Many end users turn off encryption on their device due to it
slowing down operation
• Data Stored in Cloud
• Many users will download a piece of sensitive information from
the Cloud but then store it locally to save time when it is
needed again
• Responsibility for security management should to be
taken away from the End User
THE DETAILS - People Just Want to Get On With Life!
9
Proposed EU Data Protection 2016
10
Have to be able to prove:
Network security procedures
Device encryption
THE DETAILS - Proposed EU Data Protection 2016
11
Remote delete requests
Recovered % deleted
• iOS 317 43%
• Android 193 57%
• Blackberry 170 61%
THE DETAILS - Deleting/Overwriting Data
12
• Mobile Data Tracking &
Management Specialist
• Manufactures of Security Guardian
SOLUTIONS - What is Security Guardian?
13
15
• Cloud based or On-Premise
Management & user interface
• Location via GPS, GSM & RFID
• Geofencing
• Time controlled access
• Over The Air configuration
• Remote turn On and Off
• Remote data destruct
• Verifiable audit trail and
reporting
SOLUTIONS - Management console
16
Thank you
Simon Cuthbert, Director – ExactTrak Ltd
Simon.cuthbert@exactTrak.com
LinkedIn: Simon Cuthbert +44 (0) 7710 253340 Twitter: @exactTrak

More Related Content

What's hot

Primend praktiline konverents - Samsung Cloud. Management. Security
Primend praktiline konverents - Samsung Cloud. Management. SecurityPrimend praktiline konverents - Samsung Cloud. Management. Security
Primend praktiline konverents - Samsung Cloud. Management. Security
Primend
 
Computing on the Move - Mobile Security
Computing on the Move - Mobile SecurityComputing on the Move - Mobile Security
Computing on the Move - Mobile Security
AVG Technologies AU
 
Datashur Presentation pin flash drive - Kingfin
Datashur Presentation pin flash drive - KingfinDatashur Presentation pin flash drive - Kingfin
Datashur Presentation pin flash drive - Kingfin
Kingfin Enterprises Limited
 
Achieving Secure BYOD in Government Agencies
Achieving Secure BYOD in Government AgenciesAchieving Secure BYOD in Government Agencies
Achieving Secure BYOD in Government Agencies
Proofpoint
 
Privacy and technology
Privacy and technologyPrivacy and technology
Privacy and technology
Izuho Niwa
 
Profile securitarian
Profile   securitarianProfile   securitarian
Profile securitarian
Rupesh Verma
 
Gary Davis (Intel) Wearables: Panacea or Pandora's Box? A Security Perspective
Gary Davis (Intel) Wearables: Panacea or Pandora's Box? A Security Perspective Gary Davis (Intel) Wearables: Panacea or Pandora's Box? A Security Perspective
Gary Davis (Intel) Wearables: Panacea or Pandora's Box? A Security Perspective
AugmentedWorldExpo
 
Cs tations-pps xversion
Cs tations-pps xversionCs tations-pps xversion
Cs tations-pps xversion
Jitendar
 
Top 10 Things to Secure on iOS and Android to Protect Corporate Information
Top 10 Things to Secure on iOS and Android to Protect Corporate InformationTop 10 Things to Secure on iOS and Android to Protect Corporate Information
Top 10 Things to Secure on iOS and Android to Protect Corporate Information
Lumension
 
Mobile security and what it means to you bb
Mobile security and what it means to you bbMobile security and what it means to you bb
Mobile security and what it means to you bb
technosyah
 
Seven Simple Steps to Online Security
Seven Simple Steps to Online SecuritySeven Simple Steps to Online Security
Seven Simple Steps to Online Security
Conn Ó Muíneacháin
 
Developing secure mobile apps by Alexandru Catariov Endava
Developing secure mobile apps by Alexandru Catariov EndavaDeveloping secure mobile apps by Alexandru Catariov Endava
Developing secure mobile apps by Alexandru Catariov Endava
Moldova ICT Summit
 
Bitzer Mobile TiECON 2013 Pitch Indus Khaitan
Bitzer Mobile TiECON 2013 Pitch Indus KhaitanBitzer Mobile TiECON 2013 Pitch Indus Khaitan
Bitzer Mobile TiECON 2013 Pitch Indus Khaitan
Indus Khaitan
 
Ubiquitous computing
Ubiquitous computingUbiquitous computing
Ubiquitous computing
Ankit Bahuguna
 
Challenges posed by iot
Challenges posed by iotChallenges posed by iot
Challenges posed by iot
musfirahahmed
 
Security Issues in Internet of Things
Security Issues in Internet of ThingsSecurity Issues in Internet of Things
Security Issues in Internet of Things
Lohith Haravu Chandrashekar
 
Mobile Security
Mobile SecurityMobile Security
Mobile Security
Indus Khaitan
 
Trends in Mobile Device Data and Artifacts
Trends in Mobile Device Data and ArtifactsTrends in Mobile Device Data and Artifacts
Trends in Mobile Device Data and Artifacts
Cellebrite
 
Adam w. mosher - geo tagging - atlseccon2011
Adam w. mosher - geo tagging - atlseccon2011Adam w. mosher - geo tagging - atlseccon2011
Adam w. mosher - geo tagging - atlseccon2011
Atlantic Security Conference
 
Hack the World: IT/IOT/ICS SCADA OSINT
Hack the World: IT/IOT/ICS SCADA OSINT Hack the World: IT/IOT/ICS SCADA OSINT
Hack the World: IT/IOT/ICS SCADA OSINT
DefCamp
 

What's hot (20)

Primend praktiline konverents - Samsung Cloud. Management. Security
Primend praktiline konverents - Samsung Cloud. Management. SecurityPrimend praktiline konverents - Samsung Cloud. Management. Security
Primend praktiline konverents - Samsung Cloud. Management. Security
 
Computing on the Move - Mobile Security
Computing on the Move - Mobile SecurityComputing on the Move - Mobile Security
Computing on the Move - Mobile Security
 
Datashur Presentation pin flash drive - Kingfin
Datashur Presentation pin flash drive - KingfinDatashur Presentation pin flash drive - Kingfin
Datashur Presentation pin flash drive - Kingfin
 
Achieving Secure BYOD in Government Agencies
Achieving Secure BYOD in Government AgenciesAchieving Secure BYOD in Government Agencies
Achieving Secure BYOD in Government Agencies
 
Privacy and technology
Privacy and technologyPrivacy and technology
Privacy and technology
 
Profile securitarian
Profile   securitarianProfile   securitarian
Profile securitarian
 
Gary Davis (Intel) Wearables: Panacea or Pandora's Box? A Security Perspective
Gary Davis (Intel) Wearables: Panacea or Pandora's Box? A Security Perspective Gary Davis (Intel) Wearables: Panacea or Pandora's Box? A Security Perspective
Gary Davis (Intel) Wearables: Panacea or Pandora's Box? A Security Perspective
 
Cs tations-pps xversion
Cs tations-pps xversionCs tations-pps xversion
Cs tations-pps xversion
 
Top 10 Things to Secure on iOS and Android to Protect Corporate Information
Top 10 Things to Secure on iOS and Android to Protect Corporate InformationTop 10 Things to Secure on iOS and Android to Protect Corporate Information
Top 10 Things to Secure on iOS and Android to Protect Corporate Information
 
Mobile security and what it means to you bb
Mobile security and what it means to you bbMobile security and what it means to you bb
Mobile security and what it means to you bb
 
Seven Simple Steps to Online Security
Seven Simple Steps to Online SecuritySeven Simple Steps to Online Security
Seven Simple Steps to Online Security
 
Developing secure mobile apps by Alexandru Catariov Endava
Developing secure mobile apps by Alexandru Catariov EndavaDeveloping secure mobile apps by Alexandru Catariov Endava
Developing secure mobile apps by Alexandru Catariov Endava
 
Bitzer Mobile TiECON 2013 Pitch Indus Khaitan
Bitzer Mobile TiECON 2013 Pitch Indus KhaitanBitzer Mobile TiECON 2013 Pitch Indus Khaitan
Bitzer Mobile TiECON 2013 Pitch Indus Khaitan
 
Ubiquitous computing
Ubiquitous computingUbiquitous computing
Ubiquitous computing
 
Challenges posed by iot
Challenges posed by iotChallenges posed by iot
Challenges posed by iot
 
Security Issues in Internet of Things
Security Issues in Internet of ThingsSecurity Issues in Internet of Things
Security Issues in Internet of Things
 
Mobile Security
Mobile SecurityMobile Security
Mobile Security
 
Trends in Mobile Device Data and Artifacts
Trends in Mobile Device Data and ArtifactsTrends in Mobile Device Data and Artifacts
Trends in Mobile Device Data and Artifacts
 
Adam w. mosher - geo tagging - atlseccon2011
Adam w. mosher - geo tagging - atlseccon2011Adam w. mosher - geo tagging - atlseccon2011
Adam w. mosher - geo tagging - atlseccon2011
 
Hack the World: IT/IOT/ICS SCADA OSINT
Hack the World: IT/IOT/ICS SCADA OSINT Hack the World: IT/IOT/ICS SCADA OSINT
Hack the World: IT/IOT/ICS SCADA OSINT
 

Viewers also liked

мбоу ооп ооо
мбоу ооп  ооомбоу ооп  ооо
мбоу ооп ооо
olegkorobko
 
Beykoz belediyesi sunum
Beykoz belediyesi sunumBeykoz belediyesi sunum
Beykoz belediyesi sunum
Cuneyt Budak
 
DM_CLUB_MEMBER
DM_CLUB_MEMBERDM_CLUB_MEMBER
DM_CLUB_MEMBERParag Shah
 
You n me debby puspita sari
You n me debby puspita sariYou n me debby puspita sari
You n me debby puspita saridebbypuspitasari
 
Project 2_Design Process_Research Analysis.pdf
Project 2_Design Process_Research  Analysis.pdfProject 2_Design Process_Research  Analysis.pdf
Project 2_Design Process_Research Analysis.pdf
Foo Zhi Fung
 
50 erros de português
50 erros de português50 erros de português
50 erros de português
Julio Guimarães
 
л. н. толстой
л. н. толстойл. н. толстой
л. н. толстой
olegkorobko
 
екологічний урок маденов1
екологічний урок маденов1екологічний урок маденов1
екологічний урок маденов1
Gymnasiya10
 
Xoxo ir presentation may 7 2015
Xoxo ir presentation may 7 2015Xoxo ir presentation may 7 2015
Xoxo ir presentation may 7 2015
XOGroup
 
Вивчення шляхів реалізації самоосвітньої компетенції вчителів
Вивчення шляхів реалізації самоосвітньої компетенції вчителівВивчення шляхів реалізації самоосвітньої компетенції вчителів
Вивчення шляхів реалізації самоосвітньої компетенції вчителів
nata-galuch
 
Vuoden urheilija 1947 2013
Vuoden urheilija 1947 2013Vuoden urheilija 1947 2013
Vuoden urheilija 1947 2013Kalle Virtapohja
 
Comm tech final project
Comm tech final projectComm tech final project
Comm tech final project
CatherineGordon8
 
MAXIMO 6.2 BASICS OVERVIEW
MAXIMO 6.2 BASICS OVERVIEWMAXIMO 6.2 BASICS OVERVIEW
MAXIMO 6.2 BASICS OVERVIEW
RAKESH SINGH
 
convoy-leader-training-handbook_8aug03
convoy-leader-training-handbook_8aug03convoy-leader-training-handbook_8aug03
convoy-leader-training-handbook_8aug03
Kevin Parrish
 
The Shocking True Cost Of A Bad Hire
The Shocking True Cost Of A Bad HireThe Shocking True Cost Of A Bad Hire
The Shocking True Cost Of A Bad Hire
Executives Online
 
оноре де бальзак
оноре де бальзаконоре де бальзак
оноре де бальзак
olegkorobko
 
ქანდაკება
ქანდაკებაქანდაკება
ქანდაკება
Nino Mchedlishvili
 
З досвіду роботи Галич Н.В.
З досвіду роботи Галич Н.В.З досвіду роботи Галич Н.В.
З досвіду роботи Галич Н.В.
nata-galuch
 
XOXO IR Presentation Q3 2014
XOXO IR Presentation Q3 2014XOXO IR Presentation Q3 2014
XOXO IR Presentation Q3 2014
XOGroup
 
Nodokļu atlaides ziedotājiem
Nodokļu atlaides ziedotājiemNodokļu atlaides ziedotājiem
Nodokļu atlaides ziedotājiemZane Ruģēna
 

Viewers also liked (20)

мбоу ооп ооо
мбоу ооп  ооомбоу ооп  ооо
мбоу ооп ооо
 
Beykoz belediyesi sunum
Beykoz belediyesi sunumBeykoz belediyesi sunum
Beykoz belediyesi sunum
 
DM_CLUB_MEMBER
DM_CLUB_MEMBERDM_CLUB_MEMBER
DM_CLUB_MEMBER
 
You n me debby puspita sari
You n me debby puspita sariYou n me debby puspita sari
You n me debby puspita sari
 
Project 2_Design Process_Research Analysis.pdf
Project 2_Design Process_Research  Analysis.pdfProject 2_Design Process_Research  Analysis.pdf
Project 2_Design Process_Research Analysis.pdf
 
50 erros de português
50 erros de português50 erros de português
50 erros de português
 
л. н. толстой
л. н. толстойл. н. толстой
л. н. толстой
 
екологічний урок маденов1
екологічний урок маденов1екологічний урок маденов1
екологічний урок маденов1
 
Xoxo ir presentation may 7 2015
Xoxo ir presentation may 7 2015Xoxo ir presentation may 7 2015
Xoxo ir presentation may 7 2015
 
Вивчення шляхів реалізації самоосвітньої компетенції вчителів
Вивчення шляхів реалізації самоосвітньої компетенції вчителівВивчення шляхів реалізації самоосвітньої компетенції вчителів
Вивчення шляхів реалізації самоосвітньої компетенції вчителів
 
Vuoden urheilija 1947 2013
Vuoden urheilija 1947 2013Vuoden urheilija 1947 2013
Vuoden urheilija 1947 2013
 
Comm tech final project
Comm tech final projectComm tech final project
Comm tech final project
 
MAXIMO 6.2 BASICS OVERVIEW
MAXIMO 6.2 BASICS OVERVIEWMAXIMO 6.2 BASICS OVERVIEW
MAXIMO 6.2 BASICS OVERVIEW
 
convoy-leader-training-handbook_8aug03
convoy-leader-training-handbook_8aug03convoy-leader-training-handbook_8aug03
convoy-leader-training-handbook_8aug03
 
The Shocking True Cost Of A Bad Hire
The Shocking True Cost Of A Bad HireThe Shocking True Cost Of A Bad Hire
The Shocking True Cost Of A Bad Hire
 
оноре де бальзак
оноре де бальзаконоре де бальзак
оноре де бальзак
 
ქანდაკება
ქანდაკებაქანდაკება
ქანდაკება
 
З досвіду роботи Галич Н.В.
З досвіду роботи Галич Н.В.З досвіду роботи Галич Н.В.
З досвіду роботи Галич Н.В.
 
XOXO IR Presentation Q3 2014
XOXO IR Presentation Q3 2014XOXO IR Presentation Q3 2014
XOXO IR Presentation Q3 2014
 
Nodokļu atlaides ziedotājiem
Nodokļu atlaides ziedotājiemNodokļu atlaides ziedotājiem
Nodokļu atlaides ziedotājiem
 

Similar to Introducing Security Guardian from ExactTrak

SE-4060, Securing the Mobile World, by Norman Shaw and John Pragnell
SE-4060, Securing the Mobile World, by Norman Shaw and John PragnellSE-4060, Securing the Mobile World, by Norman Shaw and John Pragnell
SE-4060, Securing the Mobile World, by Norman Shaw and John Pragnell
AMD Developer Central
 
OWASP Mobile TOP 10 2014
OWASP Mobile TOP 10 2014OWASP Mobile TOP 10 2014
OWASP Mobile TOP 10 2014
Islam Azeddine Mennouchi
 
Smartphone security
Smartphone securitySmartphone security
Smartphone security
Mike Brannon
 
Mobile Solutions and Privacy – Not One at the Expense of the Other
 Mobile Solutions and Privacy – Not One at the Expense of the Other Mobile Solutions and Privacy – Not One at the Expense of the Other
Mobile Solutions and Privacy – Not One at the Expense of the Other
bradley_g
 
3 steps security
3 steps security3 steps security
3 steps security
brightfire-slides
 
ISC(2) Security Briefing Part 3 - Enabling Secure BYOD with CASBs
ISC(2) Security Briefing Part 3 - Enabling Secure BYOD with CASBsISC(2) Security Briefing Part 3 - Enabling Secure BYOD with CASBs
ISC(2) Security Briefing Part 3 - Enabling Secure BYOD with CASBs
Bitglass
 
Mobile security blunders and what you can do about them
Mobile security blunders and what you can do about themMobile security blunders and what you can do about them
Mobile security blunders and what you can do about them
Ben Rothke
 
6 essentials for secure BYOD in healthcare
6 essentials for secure BYOD in healthcare6 essentials for secure BYOD in healthcare
6 essentials for secure BYOD in healthcare
Bitglass
 
Pete Wassell (Augmate Corportation) Security in the Enterprise Smart Glasses
Pete Wassell (Augmate Corportation) Security in the Enterprise Smart GlassesPete Wassell (Augmate Corportation) Security in the Enterprise Smart Glasses
Pete Wassell (Augmate Corportation) Security in the Enterprise Smart Glasses
AugmentedWorldExpo
 
Aisha visram presentacion bmobilew 2015 rev 2
Aisha visram presentacion bmobilew 2015 rev 2Aisha visram presentacion bmobilew 2015 rev 2
Aisha visram presentacion bmobilew 2015 rev 2
Aisha Visram
 
Privacy and Security in the Internet of Things
Privacy and Security in the Internet of ThingsPrivacy and Security in the Internet of Things
Privacy and Security in the Internet of Things
Jeff Katz
 
Internet of Things Security
Internet of Things SecurityInternet of Things Security
Internet of Things Security
Thom. Poole
 
How to Manage the Great BlackBerry Migration
How to Manage the Great BlackBerry MigrationHow to Manage the Great BlackBerry Migration
How to Manage the Great BlackBerry Migration
Troy C. Fulton
 
Session810 ken huang
Session810 ken huangSession810 ken huang
Session810 ken huang
Ken Huang
 
How to Secure Your iOs Device and Keep Client Data Safe
How to Secure Your iOs Device and Keep Client Data SafeHow to Secure Your iOs Device and Keep Client Data Safe
How to Secure Your iOs Device and Keep Client Data Safe
Rocket Matter, LLC
 
Spikes Security Isla Isolation
Spikes Security Isla IsolationSpikes Security Isla Isolation
Spikes Security Isla Isolation
Cybryx
 
Empowering Students with Mobility and BYOD Technology
Empowering Students with Mobility and BYOD TechnologyEmpowering Students with Mobility and BYOD Technology
Empowering Students with Mobility and BYOD Technology
BettShow
 
Preparing for Mobile Device Management & Bring your Own Device
Preparing for Mobile Device Management & Bring your Own DevicePreparing for Mobile Device Management & Bring your Own Device
Preparing for Mobile Device Management & Bring your Own Device
Waterstons Ltd
 
ch07-Security.pptx
ch07-Security.pptxch07-Security.pptx
ch07-Security.pptx
LuckySaigon1
 
2016 Public Safety Vision Strategy Direction - Avaya
2016 Public Safety Vision Strategy Direction - Avaya2016 Public Safety Vision Strategy Direction - Avaya
2016 Public Safety Vision Strategy Direction - Avaya
Mark Fletcher, ENP
 

Similar to Introducing Security Guardian from ExactTrak (20)

SE-4060, Securing the Mobile World, by Norman Shaw and John Pragnell
SE-4060, Securing the Mobile World, by Norman Shaw and John PragnellSE-4060, Securing the Mobile World, by Norman Shaw and John Pragnell
SE-4060, Securing the Mobile World, by Norman Shaw and John Pragnell
 
OWASP Mobile TOP 10 2014
OWASP Mobile TOP 10 2014OWASP Mobile TOP 10 2014
OWASP Mobile TOP 10 2014
 
Smartphone security
Smartphone securitySmartphone security
Smartphone security
 
Mobile Solutions and Privacy – Not One at the Expense of the Other
 Mobile Solutions and Privacy – Not One at the Expense of the Other Mobile Solutions and Privacy – Not One at the Expense of the Other
Mobile Solutions and Privacy – Not One at the Expense of the Other
 
3 steps security
3 steps security3 steps security
3 steps security
 
ISC(2) Security Briefing Part 3 - Enabling Secure BYOD with CASBs
ISC(2) Security Briefing Part 3 - Enabling Secure BYOD with CASBsISC(2) Security Briefing Part 3 - Enabling Secure BYOD with CASBs
ISC(2) Security Briefing Part 3 - Enabling Secure BYOD with CASBs
 
Mobile security blunders and what you can do about them
Mobile security blunders and what you can do about themMobile security blunders and what you can do about them
Mobile security blunders and what you can do about them
 
6 essentials for secure BYOD in healthcare
6 essentials for secure BYOD in healthcare6 essentials for secure BYOD in healthcare
6 essentials for secure BYOD in healthcare
 
Pete Wassell (Augmate Corportation) Security in the Enterprise Smart Glasses
Pete Wassell (Augmate Corportation) Security in the Enterprise Smart GlassesPete Wassell (Augmate Corportation) Security in the Enterprise Smart Glasses
Pete Wassell (Augmate Corportation) Security in the Enterprise Smart Glasses
 
Aisha visram presentacion bmobilew 2015 rev 2
Aisha visram presentacion bmobilew 2015 rev 2Aisha visram presentacion bmobilew 2015 rev 2
Aisha visram presentacion bmobilew 2015 rev 2
 
Privacy and Security in the Internet of Things
Privacy and Security in the Internet of ThingsPrivacy and Security in the Internet of Things
Privacy and Security in the Internet of Things
 
Internet of Things Security
Internet of Things SecurityInternet of Things Security
Internet of Things Security
 
How to Manage the Great BlackBerry Migration
How to Manage the Great BlackBerry MigrationHow to Manage the Great BlackBerry Migration
How to Manage the Great BlackBerry Migration
 
Session810 ken huang
Session810 ken huangSession810 ken huang
Session810 ken huang
 
How to Secure Your iOs Device and Keep Client Data Safe
How to Secure Your iOs Device and Keep Client Data SafeHow to Secure Your iOs Device and Keep Client Data Safe
How to Secure Your iOs Device and Keep Client Data Safe
 
Spikes Security Isla Isolation
Spikes Security Isla IsolationSpikes Security Isla Isolation
Spikes Security Isla Isolation
 
Empowering Students with Mobility and BYOD Technology
Empowering Students with Mobility and BYOD TechnologyEmpowering Students with Mobility and BYOD Technology
Empowering Students with Mobility and BYOD Technology
 
Preparing for Mobile Device Management & Bring your Own Device
Preparing for Mobile Device Management & Bring your Own DevicePreparing for Mobile Device Management & Bring your Own Device
Preparing for Mobile Device Management & Bring your Own Device
 
ch07-Security.pptx
ch07-Security.pptxch07-Security.pptx
ch07-Security.pptx
 
2016 Public Safety Vision Strategy Direction - Avaya
2016 Public Safety Vision Strategy Direction - Avaya2016 Public Safety Vision Strategy Direction - Avaya
2016 Public Safety Vision Strategy Direction - Avaya
 

Recently uploaded

Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
Mariano Tinti
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
Edge AI and Vision Alliance
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
panagenda
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxOcean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
SitimaJohn
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
Pixlogix Infotech
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
Zilliz
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Tosin Akinosho
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
tolgahangng
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Safe Software
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
Zilliz
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
Brandon Minnick, MBA
 
UI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentationUI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentation
Wouter Lemaire
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
Zilliz
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
Tomaz Bratanic
 

Recently uploaded (20)

Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxOcean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
 
UI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentationUI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentation
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
 

Introducing Security Guardian from ExactTrak

  • 2. • ‘Enterprise Level’ USB solutions • All very good but all very similar solutions • Most are encrypted • Some have central management capability • BUT…What Happens When the Device is Lost or Stolen? • All these solutions rely on being plugged into a 3rd party internet connect PC/Laptop to be managed • If the device is not plugged in it… • Can not be traced • Can not be managed • No verifiable audit trail INTRODUCTION - USB Technology in use Today 3
  • 3. • 561 Million USB Flash Drives will be sold between 2014 and 2018 • Forrsights Survey 2014 • More than 30% have lost a USB drive containing confidential information • 77% have lost a laptop, tablet or mobile with sensitive data • 63% of IT managers lack visibility of mobile data within their organisation • 84% use personal emails to send sensitive information • 50% use public cloud services to send sensitive files • Wall Street Journal Aug 2014 5000 interviews INTRODUCTION - Don’t Forget the Insider Threat! 4
  • 4. People Lose Stuff! More than 30% have lost a USB drive containing confidential information 77% have lost a laptop, tablet or mobile with sensitive data * Wall Street Journal Aug 2014 5000 interviews 5
  • 5. THE DETAILS - Human Error! 6
  • 6. THE DETAILS - Human Error! 7
  • 7. THE DETAILS - Human Error! 8
  • 8. • Encryption • Many end users turn off encryption on their device due to it slowing down operation • Data Stored in Cloud • Many users will download a piece of sensitive information from the Cloud but then store it locally to save time when it is needed again • Responsibility for security management should to be taken away from the End User THE DETAILS - People Just Want to Get On With Life! 9
  • 9. Proposed EU Data Protection 2016 10
  • 10. Have to be able to prove: Network security procedures Device encryption THE DETAILS - Proposed EU Data Protection 2016 11
  • 11. Remote delete requests Recovered % deleted • iOS 317 43% • Android 193 57% • Blackberry 170 61% THE DETAILS - Deleting/Overwriting Data 12
  • 12. • Mobile Data Tracking & Management Specialist • Manufactures of Security Guardian SOLUTIONS - What is Security Guardian? 13
  • 13. 15
  • 14. • Cloud based or On-Premise Management & user interface • Location via GPS, GSM & RFID • Geofencing • Time controlled access • Over The Air configuration • Remote turn On and Off • Remote data destruct • Verifiable audit trail and reporting SOLUTIONS - Management console 16
  • 15. Thank you Simon Cuthbert, Director – ExactTrak Ltd Simon.cuthbert@exactTrak.com LinkedIn: Simon Cuthbert +44 (0) 7710 253340 Twitter: @exactTrak

Editor's Notes

  1. The proposed EU Data Protection revisions for 2016 state that ‘Encryption alone is not enough’. Meaning that there needs to be greater control of mobile data in transit and a means of greater management should data be potentially lost or stolen with a full verifiable audit trail.
  2. Figures come from a global financial services company and cover two years. These figures only relate to product that were subsequently found / recovered. In essence there is only a 50% chance that remote data is detected with current technology. It has to get better.