How do you ‘check the locks’ of your data security? It all starts with shoring up your processes and workflows. In these webinar slides we outline tips and tricks for managing your documents as they enter into and within your workflows – with security in mind.
Want to follow along with the webinar replay? Download it here for free: http://info.aiim.org/workflow-and-process-security
29. Underwri(en by: Presented by:
1. Inventory of Authorized and Unauthorized Devices 11. Secure ConfiguraQon for Network Devices such as Firewalls,
Routers and Switches
2. Inventory of Authorized and Unauthorized Sooware 12. Boundary Defense
3. Secure ConfiguraQons – Hardware and Sooware on Mobile
Devices, Laptops, WorkstaQons and Servers
13. Data ProtecQon
4. ConQnuous Vulnerability Assessment and RemediaQon
14. Controlled Access Based on the Need to Know
5. Controlled Use of Administrator Privileges
15. Wireless Access Control
6. Maintenance, Monitoring, and Analysis of Audit Logs
16. Account Monitoring and Control
7. Email and Web Browser ProtecQons
17. Security Skills Assessment and Training
8. Malware Defenses
18. ApplicaQon Sooware Security
9. LimitaQon and Control of Network Ports, Protocols, and Services 19. Incident Response and Management
10. Data Recovery Capability 20. PenetraQon Tests and Red Team Exercises
CIS Top 20 Cri(cal Security Controls
SANS Institute CIS (Center for Internet Security)
30. Underwri(en by: Presented by:
• Scan to / Print from Desktop & Mobile:
• Email, folder, file, FTP, SFTP, image, OCR
• Editable / Searchable Office Apps, PDF
• Secure / Encrypted PDF
• Windows, iOS, Android, Blackberry, Kindle
Fire, WiFi Direct, Google Cloud Print 2.0
• Integrate with 3rd Party Applica(ons
• Scan to / Print from Cloud Apps
• Google Drive, OneDrive, DropBox,
Evernote, Box, & more
The Challenge of “App”lifica(on in the Workplace
33. Underwri(en by: Presented by:
• Focus on digital content
• End-users are consuming
technology differently
• Devices used as “on-ramps” to
digital workflows
• Secure scan & capture
increasingly important
KEY Takeaways for the Changing Environment