SlideShare a Scribd company logo
1 of 24
Boldon James | Public
Date
Keeping you secure,
compliant and in control
Presentation to
Boldon James | Public
Boldon James
Over 30 years experience in data security software
Market leader – best-of-breed mentality and broadest
data classification coverage of any vendor
Proven technology platform and integrations –
35+ best-of-breed technology partners
Owned by QinetiQ Plc – $2bn defence & security
technology business
Core focus on customer and technical support
About
2
Boldon James | Public
Our time line
3
1985
Incorporated
1989
Launch Enterprise
Mail (Commercial
X.400 Messaging)
1990
Launch
Enterprise
Mail in US
market
1993
Launch Enterprise Mail in
NATO Defence Market Place
(STANAG 4406 messaging)
1996
Partnered with
Microsoft on US
DoD Defence
Messaging System
2001
SAFEmail
launched to
worldwide
defence
market
2001
Microsoft OEM of
Boldon James
Masterkey LDAP
Address Book
2005
Appointed
Microsoft Global
Go-To-Market
Partner (Defence &
Secure Messaging)
2006
Delivered
SAFEmail to
UK MoD (DII)
2007
Acquisition
by QinetiQ
Plc
2009
Classifier
enterprise data
classification
solution launched
2011
Classifier
launched
in US
2016
Digital Guardian
OEM agreement,
launch in Latin
America
2017
Offices opened
in France and
Germany
2018
Partnerships signed
with Seclore and
PKWARE
Boldon James | Public
Global organizations trust us
4
Finance Pharma/Biotech Manufacturing Defence Utilities Other
Boldon James | Public
Strategic partnerships with leading vendors
OEM OEM
OEM
5
OEM
Boldon James | Public
• Partner for 20+ years
• Global ‘Go to Market Partner’
• Leading the way for O365 Support
• AIP Integration
• Broadest Platform Support in the Market
Microsoft
Strategic Partner
6
Boldon James | Public
Why data
classification?
7
Boldon James | Public
Compliance is driving adoption
You’re facing increasingly complex challenges through new
regulations all of which mandate data classification.
• General Data Protection Regulation (GDPR)
• Controlled Unclassified Information (CUI)
• National Institute of Standards and Technology (NIST)
• The Health Insurance Portability and Accountability
Act (HIPAA)
• New York Department of Financial Services
(NYDFS – 23 NYCRR 500)
• Information Security Management Systems
(ISMS – ISO27001)
• International Traffic in Arms Regulations (ITAR)
HIPAA NYDFS
NIST
GDPR ISMS
ISO27001
CUI
ITAR
8
Boldon James | Public
Achieve compliance; then achieve business value
76% of global security decision-makers say they are implementing, expanding implementation or planning to
implement data classification in the next 12 months.
Forrester, Jan 2018
Demonstrates
compliance
Creates a
security culture
Facilitates safer
collaboration
Increases
business value
Reduces data
management costs
Drives technology
ecosystem
Business value of data classification
9
Boldon James | Public
Data breach costs
10
76% of global security decision-
makers say they are
implementing, expanding
implementation or planning to
implement data classification in
the next 12 months.
Forrester, Jan 2017
Likelihood of a recurring
data breach in next 2 years 28%
The average time to identify
a breach in 2017 was
191
days
Average cost of a single
sensitive data breach in 2017 $3.62m
Boldon James | Public
Impact of human error
11
“Organizations treat
users as they are the
problem, when they
should be part of
the solution”
Security Awareness
Lab, 2017
Percentage of data breach
incidents caused by human error
(ICO)
62%
Percentage of the worst data
breaches caused by human error
(ICO)
80%
Number of records exposed in
2017 as a result of human error
1.9bn
Boldon James | Public
lassifier - Taking Classification Beyond Security
BUSINESS
CATEGORIZATION
DATA
RETENTION
SECURITY
LABEL
POLICY
DATA HANDLING
LABELS
ENFORCE GRANULAR
security policy and controls
INCREASE
user awareness
IMPROVE
operational effectiveness
OPTIMIZE
security technologies
REDUCE
business risk
Retention Codes
PII
Finance
Legal Instruction
NON-BUSINESS
GENERAL BUSINESS
INTERNAL ONLY
CONFIDENTIAL
NB
GB
IO
C
Metadata
INCREASE BUSINESS VALUE
Boldon James | Public
Involving the user to ensure
correct identifier is placed
onto information and ensure
appropriate handling
Visual Markings
Metadata
Classifier - Engaging users in data classification
Handling Rules
Boldon James | Public
What analysts say
14
“When you know where the data is and how important it is
to the organization, you know how to treat it. Classification
information can be leveraged across the technical
operational environment to create efficiencies…If you are
not leveraging data classification, you are working too hard.”
Renee Murphy
Principal Analyst
Boldon James | Public
What analysts say
“If you don’t know what you have,
where it is, and why you have it, you
can’t expect to apply the appropriate
policies and controls to protect it.”
“Focus on controls that broadly address the
problem, such as implementing people-centric
security and data classification. These controls
are the foundation upon which additional
controls can be built.”
15
Boldon James | Public
Where classification fits into the process
1.DISCOVER
Gain better visibility of
security risks around
unstructured data
2.CLASSIFY
Determine sensitive
data value and build a
security focused
culture
3.PROTECT
Enforce controls and
proactive data loss
prevention
4.MONITOR
Highlight anomalous user
behaviour and inform
policy management
16
Boldon James | Public
lassifier - Enabling the right blend of classification
Prescribed
Automatically applied
User cannot modify
Recommended
Default automatically applied
User can modify
Suggested
Default automatically applied
User must endorse
Manual
User selected
User Driven
Classification
Every organisation is unique and their
classification approach must reflect that and be
tailorable for each business area and data type
Automatic
Classification
Boldon James | Public
Not all data classification solutions are the same:
For a best-of-breed solution with sole focus of providing class-
leading data classification while delivering true business value,
Boldon James is the partner of choice.
18
Boldon James | Public
Product overview
19
Boldon James | Public
lassifier – protecting data across the lifecycle
DATA-IN-USE DATA-IN-TRANSIT
DATA-AT-REST
Email Classifier
OWA Classifier
Notes Classifier
Mobile Classifier
Mobile Filter
Exchange Classifier
Communicate
SharePoint Classifier
Box Classifier
Office Classifier
Mac Classifier
CAD Classifier
for AutoCAD
&
CAD Classifier
for Draftsight
Create & Edit Power Classifier
for Files
Store
F F
F
Collaborate
DATA GOVERNANCE & PROTECTION
= Foundation Suite Product
F
DATA-IN-REST
MANAGEMENT & MONITORING
F
F
File Classifier
Classifier
Reporting
Classifier
Administration
F
F
Boldon James | Public
Delivering value across your business
21
The widest range of classification products
OFFICE CLASSIFIER
full MS Office suite including
Visio & Project
FILE CLASSIFIER
supports any file format
NOTES CLASSIFIER
support for latest
Notes versions
CAD CLASSIFIER
unique product
EXCHANGE CLASSIFIER
unique product
MOBILE CLASSIFIER
coverage across all OS
OWA CLASSIFIER
coverage extends
from on-premise
to Office365 cloud
MAC CLASSIFIER
coverage for Word,
Excel and PowerPoint
SHAREPOINT
CLASSIFIER
coverage for
SharePoint Online
BOX CLASSIFIER
coverage for files
shared via Box
CITRIX READY
Boldon James | Public
lassifier – all you need to get protected!
22
Office
Classifier
DOCUMENTS
Power Classifier
for Files
FILES
File Classifier Notes Classifier
MESSAGES
Email Classifier
F F
F
= Foundation Suite Product
F
MANAGEMENT
F
Classifier
Administration
F
F
FOUNDATION SUITE
F
MAC
Classifier
Boldon James | Public
Data Governance & Protection
23
Policy
Management
Rule
Configuration
System
Configuration
System
Status
Reporting
& Analytics
Classifier Administration Classifier Management Agent Classifier Reporting
Classifier for McAfee ePO & DXL
System
Status
DATA-IN-USE DATA-AT-REST DATA-IN-MOTION
Rule Configuration Reporting & Analytics
Policy Management System Configuration System Status
MANAGEMENT & MONITORING
Boldon James | Public
Robust and extensible architecture
Data Loss
Prevention
(DLP, Email Filtering,
Email Guards)
File Classification Plug-In Framework
Productivity tools Collaboration platforms Specialist Applications
Information
Management Tools
Enterprise
Knowledge Stores
Analytics Tools
Classifier
Administration
Classifier Power
Administration
Power Classifier
for Files
Classifier-Enabled Products
Classifier
Platform
Administrator
File classification Raw Audit
Data
Add-in modules Add-in modules Structured
Audit Data
Data Protection
(RMS, Encryption etc)
Data Governance
(Discovery, GRC)
Data Sharing
(Cloud, CASB)
Data Retention
(Archiving, Document &
Records Mgmt)
Data Monitoring
(SIEM, UEBA)
Data Mobility
(MDM, Citrix)
Optimising Security, Governance and Data Management Technologies
Classification Metadata & APIs
Discovery Agents
-
-
-
-
-
-
-
-
-
-
-
-
Custom scripts
Identity Management
-
-
-
-
-
-
-
-
-
-
-
-
Databases
-
-
-
-
-
-
-
-
-
-
-
-
Directories
SIEM Tools
-
-
-
-
-
-
-
-
-
-
-
-
McAfee ePO
Common Platform Components
Classifier
Reporting
Configuration & Policy
Add-in modules

More Related Content

Similar to Boldon James Overview (Boldon James Branded).pptx

Microsoft Information Protection: Your Security and Compliance Framework
Microsoft Information Protection: Your Security and Compliance FrameworkMicrosoft Information Protection: Your Security and Compliance Framework
Microsoft Information Protection: Your Security and Compliance FrameworkAlistair Pugin
 
Big Data LDN 2017: Applied AI for GDPR
Big Data LDN 2017: Applied AI for GDPRBig Data LDN 2017: Applied AI for GDPR
Big Data LDN 2017: Applied AI for GDPRMatt Stubbs
 
A Real World Case Study for Implementing an Enterprise Scale Data Fabric
A Real World Case Study for Implementing an Enterprise Scale Data FabricA Real World Case Study for Implementing an Enterprise Scale Data Fabric
A Real World Case Study for Implementing an Enterprise Scale Data FabricNeo4j
 
Build a Winning Data Strategy in 2022.pdf
Build a Winning Data Strategy in 2022.pdfBuild a Winning Data Strategy in 2022.pdf
Build a Winning Data Strategy in 2022.pdfAvinashBatham
 
M365 Virtual Marthon: Protecting your Teamwork across Microsoft 365
M365 Virtual Marthon: Protecting your Teamwork across Microsoft 365M365 Virtual Marthon: Protecting your Teamwork across Microsoft 365
M365 Virtual Marthon: Protecting your Teamwork across Microsoft 365Joanne Klein
 
HPE Security Keynote from Istanbul 20th Jan 2016
HPE Security Keynote from Istanbul 20th Jan 2016HPE Security Keynote from Istanbul 20th Jan 2016
HPE Security Keynote from Istanbul 20th Jan 2016SteveAtHPE
 
One name unify them all
One name unify them allOne name unify them all
One name unify them allBizTalk360
 
Bridging the Data Security Gap
Bridging the Data Security GapBridging the Data Security Gap
Bridging the Data Security Gapxband
 
Cloud Storage and Security: Solving Compliance Challenges
Cloud Storage and Security: Solving Compliance ChallengesCloud Storage and Security: Solving Compliance Challenges
Cloud Storage and Security: Solving Compliance ChallengesEric Vanderburg
 
GDPR Compliance Made Easy with Data Virtualization
GDPR Compliance Made Easy with Data VirtualizationGDPR Compliance Made Easy with Data Virtualization
GDPR Compliance Made Easy with Data VirtualizationDenodo
 
Your Data is Waiting. What are the Top 5 Trends for Data in 2022? (ASEAN)
Your Data is Waiting. What are the Top 5 Trends for Data in 2022? (ASEAN)Your Data is Waiting. What are the Top 5 Trends for Data in 2022? (ASEAN)
Your Data is Waiting. What are the Top 5 Trends for Data in 2022? (ASEAN)Denodo
 
Microsoft Office 365 Security and Compliance
Microsoft Office 365 Security and ComplianceMicrosoft Office 365 Security and Compliance
Microsoft Office 365 Security and ComplianceDavid J Rosenthal
 
Mobility Security - A Business-Centric Approach
Mobility Security - A Business-Centric ApproachMobility Security - A Business-Centric Approach
Mobility Security - A Business-Centric ApproachOmar Khawaja
 
Information protection and compliance
Information protection and complianceInformation protection and compliance
Information protection and complianceDean Iacovelli
 
7 Experts on Implementing Microsoft 365 Defender
7 Experts on Implementing Microsoft 365 Defender7 Experts on Implementing Microsoft 365 Defender
7 Experts on Implementing Microsoft 365 DefenderMighty Guides, Inc.
 

Similar to Boldon James Overview (Boldon James Branded).pptx (20)

Wp security-data-safe
Wp security-data-safeWp security-data-safe
Wp security-data-safe
 
Microsoft Information Protection: Your Security and Compliance Framework
Microsoft Information Protection: Your Security and Compliance FrameworkMicrosoft Information Protection: Your Security and Compliance Framework
Microsoft Information Protection: Your Security and Compliance Framework
 
Microsoft 365 Compliance
Microsoft 365 ComplianceMicrosoft 365 Compliance
Microsoft 365 Compliance
 
Big Data LDN 2017: Applied AI for GDPR
Big Data LDN 2017: Applied AI for GDPRBig Data LDN 2017: Applied AI for GDPR
Big Data LDN 2017: Applied AI for GDPR
 
A Real World Case Study for Implementing an Enterprise Scale Data Fabric
A Real World Case Study for Implementing an Enterprise Scale Data FabricA Real World Case Study for Implementing an Enterprise Scale Data Fabric
A Real World Case Study for Implementing an Enterprise Scale Data Fabric
 
Brochure forcepoint dlp_en
Brochure forcepoint dlp_enBrochure forcepoint dlp_en
Brochure forcepoint dlp_en
 
Build a Winning Data Strategy in 2022.pdf
Build a Winning Data Strategy in 2022.pdfBuild a Winning Data Strategy in 2022.pdf
Build a Winning Data Strategy in 2022.pdf
 
M365 Virtual Marthon: Protecting your Teamwork across Microsoft 365
M365 Virtual Marthon: Protecting your Teamwork across Microsoft 365M365 Virtual Marthon: Protecting your Teamwork across Microsoft 365
M365 Virtual Marthon: Protecting your Teamwork across Microsoft 365
 
HPE Security Keynote from Istanbul 20th Jan 2016
HPE Security Keynote from Istanbul 20th Jan 2016HPE Security Keynote from Istanbul 20th Jan 2016
HPE Security Keynote from Istanbul 20th Jan 2016
 
One name unify them all
One name unify them allOne name unify them all
One name unify them all
 
Bridging the Data Security Gap
Bridging the Data Security GapBridging the Data Security Gap
Bridging the Data Security Gap
 
Cloud Storage and Security: Solving Compliance Challenges
Cloud Storage and Security: Solving Compliance ChallengesCloud Storage and Security: Solving Compliance Challenges
Cloud Storage and Security: Solving Compliance Challenges
 
MEDS
MEDSMEDS
MEDS
 
GDPR Compliance Made Easy with Data Virtualization
GDPR Compliance Made Easy with Data VirtualizationGDPR Compliance Made Easy with Data Virtualization
GDPR Compliance Made Easy with Data Virtualization
 
Your Data is Waiting. What are the Top 5 Trends for Data in 2022? (ASEAN)
Your Data is Waiting. What are the Top 5 Trends for Data in 2022? (ASEAN)Your Data is Waiting. What are the Top 5 Trends for Data in 2022? (ASEAN)
Your Data is Waiting. What are the Top 5 Trends for Data in 2022? (ASEAN)
 
Microsoft Office 365 Security and Compliance
Microsoft Office 365 Security and ComplianceMicrosoft Office 365 Security and Compliance
Microsoft Office 365 Security and Compliance
 
Mobility Security - A Business-Centric Approach
Mobility Security - A Business-Centric ApproachMobility Security - A Business-Centric Approach
Mobility Security - A Business-Centric Approach
 
18 Tips for Data Classification - Data Sheet by Secure Islands
18 Tips for Data Classification - Data Sheet by Secure Islands18 Tips for Data Classification - Data Sheet by Secure Islands
18 Tips for Data Classification - Data Sheet by Secure Islands
 
Information protection and compliance
Information protection and complianceInformation protection and compliance
Information protection and compliance
 
7 Experts on Implementing Microsoft 365 Defender
7 Experts on Implementing Microsoft 365 Defender7 Experts on Implementing Microsoft 365 Defender
7 Experts on Implementing Microsoft 365 Defender
 

Recently uploaded

Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 

Recently uploaded (20)

Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 

Boldon James Overview (Boldon James Branded).pptx

  • 1. Boldon James | Public Date Keeping you secure, compliant and in control Presentation to
  • 2. Boldon James | Public Boldon James Over 30 years experience in data security software Market leader – best-of-breed mentality and broadest data classification coverage of any vendor Proven technology platform and integrations – 35+ best-of-breed technology partners Owned by QinetiQ Plc – $2bn defence & security technology business Core focus on customer and technical support About 2
  • 3. Boldon James | Public Our time line 3 1985 Incorporated 1989 Launch Enterprise Mail (Commercial X.400 Messaging) 1990 Launch Enterprise Mail in US market 1993 Launch Enterprise Mail in NATO Defence Market Place (STANAG 4406 messaging) 1996 Partnered with Microsoft on US DoD Defence Messaging System 2001 SAFEmail launched to worldwide defence market 2001 Microsoft OEM of Boldon James Masterkey LDAP Address Book 2005 Appointed Microsoft Global Go-To-Market Partner (Defence & Secure Messaging) 2006 Delivered SAFEmail to UK MoD (DII) 2007 Acquisition by QinetiQ Plc 2009 Classifier enterprise data classification solution launched 2011 Classifier launched in US 2016 Digital Guardian OEM agreement, launch in Latin America 2017 Offices opened in France and Germany 2018 Partnerships signed with Seclore and PKWARE
  • 4. Boldon James | Public Global organizations trust us 4 Finance Pharma/Biotech Manufacturing Defence Utilities Other
  • 5. Boldon James | Public Strategic partnerships with leading vendors OEM OEM OEM 5 OEM
  • 6. Boldon James | Public • Partner for 20+ years • Global ‘Go to Market Partner’ • Leading the way for O365 Support • AIP Integration • Broadest Platform Support in the Market Microsoft Strategic Partner 6
  • 7. Boldon James | Public Why data classification? 7
  • 8. Boldon James | Public Compliance is driving adoption You’re facing increasingly complex challenges through new regulations all of which mandate data classification. • General Data Protection Regulation (GDPR) • Controlled Unclassified Information (CUI) • National Institute of Standards and Technology (NIST) • The Health Insurance Portability and Accountability Act (HIPAA) • New York Department of Financial Services (NYDFS – 23 NYCRR 500) • Information Security Management Systems (ISMS – ISO27001) • International Traffic in Arms Regulations (ITAR) HIPAA NYDFS NIST GDPR ISMS ISO27001 CUI ITAR 8
  • 9. Boldon James | Public Achieve compliance; then achieve business value 76% of global security decision-makers say they are implementing, expanding implementation or planning to implement data classification in the next 12 months. Forrester, Jan 2018 Demonstrates compliance Creates a security culture Facilitates safer collaboration Increases business value Reduces data management costs Drives technology ecosystem Business value of data classification 9
  • 10. Boldon James | Public Data breach costs 10 76% of global security decision- makers say they are implementing, expanding implementation or planning to implement data classification in the next 12 months. Forrester, Jan 2017 Likelihood of a recurring data breach in next 2 years 28% The average time to identify a breach in 2017 was 191 days Average cost of a single sensitive data breach in 2017 $3.62m
  • 11. Boldon James | Public Impact of human error 11 “Organizations treat users as they are the problem, when they should be part of the solution” Security Awareness Lab, 2017 Percentage of data breach incidents caused by human error (ICO) 62% Percentage of the worst data breaches caused by human error (ICO) 80% Number of records exposed in 2017 as a result of human error 1.9bn
  • 12. Boldon James | Public lassifier - Taking Classification Beyond Security BUSINESS CATEGORIZATION DATA RETENTION SECURITY LABEL POLICY DATA HANDLING LABELS ENFORCE GRANULAR security policy and controls INCREASE user awareness IMPROVE operational effectiveness OPTIMIZE security technologies REDUCE business risk Retention Codes PII Finance Legal Instruction NON-BUSINESS GENERAL BUSINESS INTERNAL ONLY CONFIDENTIAL NB GB IO C Metadata INCREASE BUSINESS VALUE
  • 13. Boldon James | Public Involving the user to ensure correct identifier is placed onto information and ensure appropriate handling Visual Markings Metadata Classifier - Engaging users in data classification Handling Rules
  • 14. Boldon James | Public What analysts say 14 “When you know where the data is and how important it is to the organization, you know how to treat it. Classification information can be leveraged across the technical operational environment to create efficiencies…If you are not leveraging data classification, you are working too hard.” Renee Murphy Principal Analyst
  • 15. Boldon James | Public What analysts say “If you don’t know what you have, where it is, and why you have it, you can’t expect to apply the appropriate policies and controls to protect it.” “Focus on controls that broadly address the problem, such as implementing people-centric security and data classification. These controls are the foundation upon which additional controls can be built.” 15
  • 16. Boldon James | Public Where classification fits into the process 1.DISCOVER Gain better visibility of security risks around unstructured data 2.CLASSIFY Determine sensitive data value and build a security focused culture 3.PROTECT Enforce controls and proactive data loss prevention 4.MONITOR Highlight anomalous user behaviour and inform policy management 16
  • 17. Boldon James | Public lassifier - Enabling the right blend of classification Prescribed Automatically applied User cannot modify Recommended Default automatically applied User can modify Suggested Default automatically applied User must endorse Manual User selected User Driven Classification Every organisation is unique and their classification approach must reflect that and be tailorable for each business area and data type Automatic Classification
  • 18. Boldon James | Public Not all data classification solutions are the same: For a best-of-breed solution with sole focus of providing class- leading data classification while delivering true business value, Boldon James is the partner of choice. 18
  • 19. Boldon James | Public Product overview 19
  • 20. Boldon James | Public lassifier – protecting data across the lifecycle DATA-IN-USE DATA-IN-TRANSIT DATA-AT-REST Email Classifier OWA Classifier Notes Classifier Mobile Classifier Mobile Filter Exchange Classifier Communicate SharePoint Classifier Box Classifier Office Classifier Mac Classifier CAD Classifier for AutoCAD & CAD Classifier for Draftsight Create & Edit Power Classifier for Files Store F F F Collaborate DATA GOVERNANCE & PROTECTION = Foundation Suite Product F DATA-IN-REST MANAGEMENT & MONITORING F F File Classifier Classifier Reporting Classifier Administration F F
  • 21. Boldon James | Public Delivering value across your business 21 The widest range of classification products OFFICE CLASSIFIER full MS Office suite including Visio & Project FILE CLASSIFIER supports any file format NOTES CLASSIFIER support for latest Notes versions CAD CLASSIFIER unique product EXCHANGE CLASSIFIER unique product MOBILE CLASSIFIER coverage across all OS OWA CLASSIFIER coverage extends from on-premise to Office365 cloud MAC CLASSIFIER coverage for Word, Excel and PowerPoint SHAREPOINT CLASSIFIER coverage for SharePoint Online BOX CLASSIFIER coverage for files shared via Box CITRIX READY
  • 22. Boldon James | Public lassifier – all you need to get protected! 22 Office Classifier DOCUMENTS Power Classifier for Files FILES File Classifier Notes Classifier MESSAGES Email Classifier F F F = Foundation Suite Product F MANAGEMENT F Classifier Administration F F FOUNDATION SUITE F MAC Classifier
  • 23. Boldon James | Public Data Governance & Protection 23 Policy Management Rule Configuration System Configuration System Status Reporting & Analytics Classifier Administration Classifier Management Agent Classifier Reporting Classifier for McAfee ePO & DXL System Status DATA-IN-USE DATA-AT-REST DATA-IN-MOTION Rule Configuration Reporting & Analytics Policy Management System Configuration System Status MANAGEMENT & MONITORING
  • 24. Boldon James | Public Robust and extensible architecture Data Loss Prevention (DLP, Email Filtering, Email Guards) File Classification Plug-In Framework Productivity tools Collaboration platforms Specialist Applications Information Management Tools Enterprise Knowledge Stores Analytics Tools Classifier Administration Classifier Power Administration Power Classifier for Files Classifier-Enabled Products Classifier Platform Administrator File classification Raw Audit Data Add-in modules Add-in modules Structured Audit Data Data Protection (RMS, Encryption etc) Data Governance (Discovery, GRC) Data Sharing (Cloud, CASB) Data Retention (Archiving, Document & Records Mgmt) Data Monitoring (SIEM, UEBA) Data Mobility (MDM, Citrix) Optimising Security, Governance and Data Management Technologies Classification Metadata & APIs Discovery Agents - - - - - - - - - - - - Custom scripts Identity Management - - - - - - - - - - - - Databases - - - - - - - - - - - - Directories SIEM Tools - - - - - - - - - - - - McAfee ePO Common Platform Components Classifier Reporting Configuration & Policy Add-in modules

Editor's Notes

  1. EMEA use with banner to add client name or logo (in corner) – click to add customer or partner logo
  2. For us in low contrast presentation situations….