SlideShare ist ein Scribd-Unternehmen logo
1 von 16
‘Sentry’
Information Leakage and Loss		 Data Loss, Theft and Leakage happen in a number of environments and for a number of reasons. To combat many of these, ‘Sentry’ performs quickly and effectively in:  ,[object Object],		Loss or theft of a mobile computer where its whereabouts are unknown. ,[object Object],	Internal staff theft - widely perceived to be a major source of sensitive data leakage.  ,[object Object],	Employment Termination  	All too often when an employee leaves a position, for whatever reason, they take the 	employer’s  data with them.  	Computer Replacement Programmes 	When an organisation / person replaces its computers they are often dispatched with 	inadequate or no measures taken to cleanse them of data.
What is ‘Sentry’ 	 ‘Sentry’ is a simple but effective tool that securely eradicates computer data  that may be at risk of moving  out of its owner’s control.
Mobile Data – Panic Application ,[object Object]
It contains gigabytes of information some of which is inevitably sensitive.
Whatever security tools are installed none provide any information to help manage the situation.
‘Sentry’ works quickly, instructing the device to self-destruct & proving it has done so, allowing effective crisis management. ,[object Object]
Most organisations accept that employees remove information and pass it to unwanted sources.
Equally employees store an organisation’s information at a third party site for use post employment.
‘Sentry’ can be used in-house to quickly shut down a rogue employee.,[object Object]
What makes ‘Sentry’ so effective? ,[object Object]
It eliminates human error by having no user interaction, there are no passwords to enter or programmes to start, ‘Sentry’ is always working when the computer is.
‘Sentry’ needs no hardware other than its host computer.
No restrictions, ‘Sentry’ protects all data regardless of its location on the device.
‘Sentry’ is a hosted service meaning there is no expensive infrastructure to install or maintain. ,[object Object]
End users often render these tools useless by recording the password and storing it or the plug in device, with the laptop, stripping the tool of its functionality.Protected data is good, NO data is best. ‘Sentry’ deletes ALL data, protected or not.

Weitere ähnliche Inhalte

Andere mochten auch

Edisi 6 Des Aceh
Edisi 6 Des AcehEdisi 6 Des Aceh
Edisi 6 Des Acehepaper
 
Cortex hair english
Cortex hair   englishCortex hair   english
Cortex hair englishingig
 
Edisi 6 Aceh
Edisi 6 AcehEdisi 6 Aceh
Edisi 6 Acehepaper
 
Binder17 mar 10
Binder17 mar 10Binder17 mar 10
Binder17 mar 10epaper
 
City Of Dania Beach Water Supply Report Mar 19, 2010
City Of Dania Beach Water Supply Report   Mar 19, 2010City Of Dania Beach Water Supply Report   Mar 19, 2010
City Of Dania Beach Water Supply Report Mar 19, 2010city of dania beach
 
Meeting with investors of january 2013 (1)
Meeting with investors of january 2013 (1)Meeting with investors of january 2013 (1)
Meeting with investors of january 2013 (1)TIM RI
 
Results presentation 1 q13
Results presentation 1 q13Results presentation 1 q13
Results presentation 1 q13TIM RI
 
Hit Emotional Hot Buttons With Content
Hit Emotional Hot Buttons With ContentHit Emotional Hot Buttons With Content
Hit Emotional Hot Buttons With ContentGenoo
 
Dania Jai Alai Proposed Plans & Agreement
Dania Jai Alai Proposed Plans & AgreementDania Jai Alai Proposed Plans & Agreement
Dania Jai Alai Proposed Plans & Agreementcity of dania beach
 
TP Bardotti Gabriela
TP Bardotti GabrielaTP Bardotti Gabriela
TP Bardotti GabrielaGabi Bardotti
 
Edisi 19 Maret Nusantara
Edisi 19 Maret NusantaraEdisi 19 Maret Nusantara
Edisi 19 Maret Nusantaraepaper
 
Conference Call 4Q11
Conference Call 4Q11Conference Call 4Q11
Conference Call 4Q11TIM RI
 

Andere mochten auch (17)

Edisi 6 Des Aceh
Edisi 6 Des AcehEdisi 6 Des Aceh
Edisi 6 Des Aceh
 
Cortex hair english
Cortex hair   englishCortex hair   english
Cortex hair english
 
Edisi 6 Aceh
Edisi 6 AcehEdisi 6 Aceh
Edisi 6 Aceh
 
Binder17 mar 10
Binder17 mar 10Binder17 mar 10
Binder17 mar 10
 
What We Do
What We DoWhat We Do
What We Do
 
City Of Dania Beach Water Supply Report Mar 19, 2010
City Of Dania Beach Water Supply Report   Mar 19, 2010City Of Dania Beach Water Supply Report   Mar 19, 2010
City Of Dania Beach Water Supply Report Mar 19, 2010
 
Attention Wizard
Attention WizardAttention Wizard
Attention Wizard
 
Meeting with investors of january 2013 (1)
Meeting with investors of january 2013 (1)Meeting with investors of january 2013 (1)
Meeting with investors of january 2013 (1)
 
Results presentation 1 q13
Results presentation 1 q13Results presentation 1 q13
Results presentation 1 q13
 
Pat rules english
Pat rules englishPat rules english
Pat rules english
 
Hit Emotional Hot Buttons With Content
Hit Emotional Hot Buttons With ContentHit Emotional Hot Buttons With Content
Hit Emotional Hot Buttons With Content
 
Dania Jai Alai Proposed Plans & Agreement
Dania Jai Alai Proposed Plans & AgreementDania Jai Alai Proposed Plans & Agreement
Dania Jai Alai Proposed Plans & Agreement
 
TP Bardotti Gabriela
TP Bardotti GabrielaTP Bardotti Gabriela
TP Bardotti Gabriela
 
WED- Gift Basket
WED- Gift BasketWED- Gift Basket
WED- Gift Basket
 
Edisi 19 Maret Nusantara
Edisi 19 Maret NusantaraEdisi 19 Maret Nusantara
Edisi 19 Maret Nusantara
 
Conference Call 4Q11
Conference Call 4Q11Conference Call 4Q11
Conference Call 4Q11
 
14des
14des14des
14des
 

Kürzlich hochgeladen

What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 

Kürzlich hochgeladen (20)

E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 

Data Vault Security Sentry

  • 2.
  • 3. What is ‘Sentry’ ‘Sentry’ is a simple but effective tool that securely eradicates computer data that may be at risk of moving out of its owner’s control.
  • 4.
  • 5. It contains gigabytes of information some of which is inevitably sensitive.
  • 6. Whatever security tools are installed none provide any information to help manage the situation.
  • 7.
  • 8. Most organisations accept that employees remove information and pass it to unwanted sources.
  • 9. Equally employees store an organisation’s information at a third party site for use post employment.
  • 10.
  • 11.
  • 12. It eliminates human error by having no user interaction, there are no passwords to enter or programmes to start, ‘Sentry’ is always working when the computer is.
  • 13. ‘Sentry’ needs no hardware other than its host computer.
  • 14. No restrictions, ‘Sentry’ protects all data regardless of its location on the device.
  • 15.
  • 16. End users often render these tools useless by recording the password and storing it or the plug in device, with the laptop, stripping the tool of its functionality.Protected data is good, NO data is best. ‘Sentry’ deletes ALL data, protected or not.
  • 17. The ‘Sentry’ Process Data Vault Security ‘Sentry’ Issues Self Destruct Command To Required Computer. Authorised Internal ‘Sentry’ Operator or Data Vault Security is asked to destroy a particular device. Device receives ‘Sentry’ delete Instruction and shuts down. Whatever the circumstance, Panic, Critical or Controlled ‘Sentry’ works in the same way. The authorised operator identifies the relevant device through the ‘Sentry’ service and quickly issues a request to erase all sensitive data. When the command reaches the device the data is eradicated and the proof is delivered to the relevant parties almost immediately.
  • 18.
  • 22.
  • 23. Whichever channel reaches the device first will trigger ‘Sentry’ and the data will be deleted.
  • 24.
  • 25.
  • 26. The ‘Sentry’ comprehensive decommission report proves that the data cannot be compromised and that the measures taken to achieve this have succeeded.
  • 27. The report shows a list of ALL files deleted, when, and very importantly, whether any were accessed in the time that the device was missing and unreached by ‘Sentry’.
  • 28.
  • 29. ‘Sentry’ gives control to its users. No need to notify police or other authorities.
  • 30. After purchase ‘Sentry’ is free to use – there are NO additional costs.
  • 31. ‘Sentry’ is always active when its host computer is. When it receives a decommission instruction ‘Sentry’ works quickly to leave the computer risk free.
  • 32. On a typical computer ‘Sentry’ can destroy 500 MB of data made up of more than 4500 documents (2380 Word docs, 2127 Spreadsheets and several hundred emails) in 103 seconds, too fast for the data to be seriously compromised.
  • 33.
  • 34.
  • 35. ‘Sentry’ integrates with leading data back up tools to provide an excellent route back to productivity in the shortest time possible.
  • 36. ‘Sentry’ can be used as a proactive tool, for example with its device vacation functionality that searches for the device in designated downtimes such as user holidays.
  • 37.