SlideShare ist ein Scribd-Unternehmen logo
1 von 19
Downloaden Sie, um offline zu lesen
Protect Data Efectively
with :
- Endpoint Encryption
- Data Leak Prevention (DLP)
Adi Saputra
What is encryption ?
Encryption is the process of encoding a message or
information in such a way that only authorized
parties can access it and those who are not
authorized cannot.
Encryption does not itself prevent interference,
but denies the intelligible content to a would-be
interceptor.
source : wikipedia
What is data leak prevention ?
Data leak prevention (DLP) is software detects
potential data breaches and prevents them by
monitoring, detecting and blocking sensitive data
while in-use, in-motion, and at-rest.
Also known as data lost prevention or content
monitoring & fltering.
source : wikipedia
Why need data encryption or
data leak prevention ?
source : breachlevelindex
source : Ponemon Institute, Cost of data breach 2017
Why need data encryption or
data leak prevention ?
Why need data encryption or
data leak prevention ?
Our Product
Endpoint Encryption
“A simple-to-use and powerfull encryption
application for organizations of all sizes”
 Safely encrypt hard drives, removable media, fles and email
 Independent Standard Validation FIPS 140-2 level 1 for acceptable
regulations & compliances
 Multiple algorithm (AES, SHA, RSA, DES, Blowfsh) for assured
security
 Hybrid-cloud based management server for full remote control of
endpoint encryption keys and security policy
 Fully compatible with Microsoft Windows 10, 8, 8.1 for UEFI and GPT
support for Trusted Platform Module
Storage Encryption
 Full Disk encryption
 Optical and Removable Media encryption
Content Encryption
 File & Folder encryption
 Text & Clipboard encryption
 “Go” Portable encryption
 Outlook plugin for Email & attachment
 Encrypted Archives & Virtual Disk encryption
Wipe Encryption
 DESlock+ Shredder
Key Management
 Use Encryption Key & Password
 Key Transfer & Backup
“A simple-to-use and powerfull encryption
application for organizations of all sizes”
License Method
 Subscription 1,2,3 years
 Based on Device
Product Available
 Standard Edition (Without Full Disk Encryption)
 Pro Edition (Include Full Disk Encryption)
“A simple-to-use and powerfull encryption
application for organizations of all sizes”
Our Product
Data Leak Prevention
“An easy-to-use solution to protects you from
expensive data leaks and necessary personal costs”
Mitigates risk of fnancial loss caused by human factor, such as:
✔
Industrial espionage, human failure, lost/stolen laptop or external drive
✔
Covers all standard channels – e-mails, external storage, copy&paste, upload, printing,
mobile devices
✔
Analyzes user’s behavior, making incidents or breach attempts predictable
Safetica provides full context and detailed evidence
Analyzing attempted data leaks, communication with competition, suspicious behavior,
job searches, illegal and risky activities
Safetica also saves money!
Unproductive staf activities,
personal printing, idle and illegal
software, energy consumption
Safetica also helps to...
fulfll ISO family 27 00x (ISMS), Act
protecting personal information
and other Compliances
 Logs employee computer activity and safely stores
the logs on your server
 Tracks employee activity on devices that aren’t
connected to your company network
“An easy-to-use solution to protects you from
expensive data leaks and necessary personal costs”
 Defne and manage data policies painlessly
 Stop risky sharing and data theft
 Encrypt fles for more security
“An easy-to-use solution to protects you from
expensive data leaks and necessary personal costs”
 Keeps watch over your employees to ensure they are
doing their job
 Evaluates their activity, blocks undesirable activities
and informs management about problems incurred
“An easy-to-use solution to protects you from
expensive data leaks and necessary personal costs”
Product Available
 Auditor (Without Data Leak Prevention)
 DLP (Include Data Leak Prevention)
“An easy-to-use solution to protects you from
expensive data leaks and necessary personal costs”
License Method
 Subscription 1,2,3 years
 Based on Device
Conclusion
- Encryption is Part of DLP
- Encryption allowing data outside
- DLP stopping data getting outside
Protect data effectively with endpoint encryption & data leak prevention

Weitere ähnliche Inhalte

Was ist angesagt?

Compliance regulations with Data Centric Security | Seclore
Compliance regulations with Data Centric Security | SecloreCompliance regulations with Data Centric Security | Seclore
Compliance regulations with Data Centric Security | SecloreSeclore
 
Linux mail-server-firewall-dealers-thinclient-antivirus-cloud-computing
Linux mail-server-firewall-dealers-thinclient-antivirus-cloud-computingLinux mail-server-firewall-dealers-thinclient-antivirus-cloud-computing
Linux mail-server-firewall-dealers-thinclient-antivirus-cloud-computingSeo Tss
 
Security architecture principles isys 0575general att
Security architecture principles isys 0575general attSecurity architecture principles isys 0575general att
Security architecture principles isys 0575general attSHIVA101531
 
Information security principles
Information security principlesInformation security principles
Information security principlesDan Morrill
 
Residency research makeup project acme enterprise scenario resi
Residency research makeup project acme enterprise scenario resiResidency research makeup project acme enterprise scenario resi
Residency research makeup project acme enterprise scenario resiSHIVA101531
 
The-Enterprise-Immune-System-Using-Machine-Learning-for-Next-Generation-Cyber...
The-Enterprise-Immune-System-Using-Machine-Learning-for-Next-Generation-Cyber...The-Enterprise-Immune-System-Using-Machine-Learning-for-Next-Generation-Cyber...
The-Enterprise-Immune-System-Using-Machine-Learning-for-Next-Generation-Cyber...Amazon Web Services
 
Five Essential Enterprise Architecture Practices to Create the Security-Aware...
Five Essential Enterprise Architecture Practices to Create the Security-Aware...Five Essential Enterprise Architecture Practices to Create the Security-Aware...
Five Essential Enterprise Architecture Practices to Create the Security-Aware...UBM_Design_Central
 
Perimeter Protection Solutions
Perimeter Protection SolutionsPerimeter Protection Solutions
Perimeter Protection SolutionsThe TNS Group
 
McAfee Total Protection for Data Loss Prevention (DLP)
McAfee Total Protection for Data Loss Prevention (DLP)McAfee Total Protection for Data Loss Prevention (DLP)
McAfee Total Protection for Data Loss Prevention (DLP)Trustmarque
 
Big Data Security Intelligence and Analytics for Advanced Threat Protection
Big Data Security Intelligence and Analytics for Advanced Threat ProtectionBig Data Security Intelligence and Analytics for Advanced Threat Protection
Big Data Security Intelligence and Analytics for Advanced Threat ProtectionBlue Coat
 
Top reasons why Endpoint Security should move to Cloud | Sysfore
Top reasons why Endpoint Security should move to Cloud | SysforeTop reasons why Endpoint Security should move to Cloud | Sysfore
Top reasons why Endpoint Security should move to Cloud | SysforeSysfore Technologies
 
IDC Security 2014, Endpoint Security in Depth
IDC Security 2014, Endpoint Security in DepthIDC Security 2014, Endpoint Security in Depth
IDC Security 2014, Endpoint Security in DepthKen Tulegenov
 
Build cost effective Security Data Lake + SIEM
Build cost effective Security Data Lake + SIEMBuild cost effective Security Data Lake + SIEM
Build cost effective Security Data Lake + SIEMRasool Irfan
 

Was ist angesagt? (20)

Compliance regulations with Data Centric Security | Seclore
Compliance regulations with Data Centric Security | SecloreCompliance regulations with Data Centric Security | Seclore
Compliance regulations with Data Centric Security | Seclore
 
Linux mail-server-firewall-dealers-thinclient-antivirus-cloud-computing
Linux mail-server-firewall-dealers-thinclient-antivirus-cloud-computingLinux mail-server-firewall-dealers-thinclient-antivirus-cloud-computing
Linux mail-server-firewall-dealers-thinclient-antivirus-cloud-computing
 
Safeguard your enterprise against ransomware
Safeguard your enterprise against ransomwareSafeguard your enterprise against ransomware
Safeguard your enterprise against ransomware
 
Security architecture principles isys 0575general att
Security architecture principles isys 0575general attSecurity architecture principles isys 0575general att
Security architecture principles isys 0575general att
 
Information security principles
Information security principlesInformation security principles
Information security principles
 
002.itsecurity bcp v1
002.itsecurity bcp v1002.itsecurity bcp v1
002.itsecurity bcp v1
 
Residency research makeup project acme enterprise scenario resi
Residency research makeup project acme enterprise scenario resiResidency research makeup project acme enterprise scenario resi
Residency research makeup project acme enterprise scenario resi
 
The-Enterprise-Immune-System-Using-Machine-Learning-for-Next-Generation-Cyber...
The-Enterprise-Immune-System-Using-Machine-Learning-for-Next-Generation-Cyber...The-Enterprise-Immune-System-Using-Machine-Learning-for-Next-Generation-Cyber...
The-Enterprise-Immune-System-Using-Machine-Learning-for-Next-Generation-Cyber...
 
Is Antivirus (AV) Dead or Just Missing in Action
Is Antivirus (AV) Dead or Just Missing in Action Is Antivirus (AV) Dead or Just Missing in Action
Is Antivirus (AV) Dead or Just Missing in Action
 
Five Essential Enterprise Architecture Practices to Create the Security-Aware...
Five Essential Enterprise Architecture Practices to Create the Security-Aware...Five Essential Enterprise Architecture Practices to Create the Security-Aware...
Five Essential Enterprise Architecture Practices to Create the Security-Aware...
 
Perimeter Protection Solutions
Perimeter Protection SolutionsPerimeter Protection Solutions
Perimeter Protection Solutions
 
McAfee Total Protection for Data Loss Prevention (DLP)
McAfee Total Protection for Data Loss Prevention (DLP)McAfee Total Protection for Data Loss Prevention (DLP)
McAfee Total Protection for Data Loss Prevention (DLP)
 
Cyber tooth briefing
Cyber tooth briefingCyber tooth briefing
Cyber tooth briefing
 
Big Data Security Intelligence and Analytics for Advanced Threat Protection
Big Data Security Intelligence and Analytics for Advanced Threat ProtectionBig Data Security Intelligence and Analytics for Advanced Threat Protection
Big Data Security Intelligence and Analytics for Advanced Threat Protection
 
Cobit 2
Cobit 2Cobit 2
Cobit 2
 
Top reasons why Endpoint Security should move to Cloud | Sysfore
Top reasons why Endpoint Security should move to Cloud | SysforeTop reasons why Endpoint Security should move to Cloud | Sysfore
Top reasons why Endpoint Security should move to Cloud | Sysfore
 
Sophos intercept-x
Sophos intercept-xSophos intercept-x
Sophos intercept-x
 
IDC Security 2014, Endpoint Security in Depth
IDC Security 2014, Endpoint Security in DepthIDC Security 2014, Endpoint Security in Depth
IDC Security 2014, Endpoint Security in Depth
 
SOC Cyber Security
SOC Cyber SecuritySOC Cyber Security
SOC Cyber Security
 
Build cost effective Security Data Lake + SIEM
Build cost effective Security Data Lake + SIEMBuild cost effective Security Data Lake + SIEM
Build cost effective Security Data Lake + SIEM
 

Ähnlich wie Protect data effectively with endpoint encryption & data leak prevention

DLP 101: Help identify and plug information leaks
 DLP 101: Help identify and plug information leaks DLP 101: Help identify and plug information leaks
DLP 101: Help identify and plug information leaksAbhishek Sood
 
Infowatch endpoint security
Infowatch endpoint securityInfowatch endpoint security
Infowatch endpoint securityhassan latifi
 
Managed Security Infographic
Managed Security InfographicManaged Security Infographic
Managed Security InfographicThe TNS Group
 
Data protection and security
Data protection and securityData protection and security
Data protection and securitynazar60
 
Endpoint Security Solutions
Endpoint Security SolutionsEndpoint Security Solutions
Endpoint Security SolutionsThe TNS Group
 
Digital Guardian and CDM
Digital Guardian and CDMDigital Guardian and CDM
Digital Guardian and CDMGreg Cranley
 
Introduction to Security (Hardware, Software, Data & Policies)
Introduction to Security (Hardware, Software, Data & Policies)Introduction to Security (Hardware, Software, Data & Policies)
Introduction to Security (Hardware, Software, Data & Policies)Amr Salah
 
10 Risky Employee Practices - Security solutions
10 Risky Employee Practices - Security solutions10 Risky Employee Practices - Security solutions
10 Risky Employee Practices - Security solutionsFuji Xerox Singapore
 
Protect Your Digital Assets with Managed Endpoint Security Solutions
Protect Your Digital Assets with Managed Endpoint Security SolutionsProtect Your Digital Assets with Managed Endpoint Security Solutions
Protect Your Digital Assets with Managed Endpoint Security SolutionsMohanERP1
 
Strategies for Data Leakage Prevention
Strategies for Data Leakage PreventionStrategies for Data Leakage Prevention
Strategies for Data Leakage PreventionIRJET Journal
 

Ähnlich wie Protect data effectively with endpoint encryption & data leak prevention (20)

DLP 101: Help identify and plug information leaks
 DLP 101: Help identify and plug information leaks DLP 101: Help identify and plug information leaks
DLP 101: Help identify and plug information leaks
 
Reveelium Smart Predictive Analytics - Datasheet EN
Reveelium Smart Predictive Analytics - Datasheet ENReveelium Smart Predictive Analytics - Datasheet EN
Reveelium Smart Predictive Analytics - Datasheet EN
 
Infowatch endpoint security
Infowatch endpoint securityInfowatch endpoint security
Infowatch endpoint security
 
Data security
Data securityData security
Data security
 
Managed Security Infographic
Managed Security InfographicManaged Security Infographic
Managed Security Infographic
 
Safeguard Your Business
Safeguard Your BusinessSafeguard Your Business
Safeguard Your Business
 
Data protection and security
Data protection and securityData protection and security
Data protection and security
 
Data Leakage Prevention
Data Leakage Prevention Data Leakage Prevention
Data Leakage Prevention
 
Cyber tooth
Cyber toothCyber tooth
Cyber tooth
 
Search Inform DLP
Search Inform DLPSearch Inform DLP
Search Inform DLP
 
Endpoint Security Solutions
Endpoint Security SolutionsEndpoint Security Solutions
Endpoint Security Solutions
 
Digital Guardian and CDM
Digital Guardian and CDMDigital Guardian and CDM
Digital Guardian and CDM
 
Introduction to Security (Hardware, Software, Data & Policies)
Introduction to Security (Hardware, Software, Data & Policies)Introduction to Security (Hardware, Software, Data & Policies)
Introduction to Security (Hardware, Software, Data & Policies)
 
Can You Tell Me About Some Effective Ways to Prevent Data Leakage?
Can You Tell Me About Some Effective Ways to Prevent Data Leakage?Can You Tell Me About Some Effective Ways to Prevent Data Leakage?
Can You Tell Me About Some Effective Ways to Prevent Data Leakage?
 
Basics of IT security
Basics of IT securityBasics of IT security
Basics of IT security
 
10 Risky Employee Practices - Security solutions
10 Risky Employee Practices - Security solutions10 Risky Employee Practices - Security solutions
10 Risky Employee Practices - Security solutions
 
Protect Your Digital Assets with Managed Endpoint Security Solutions
Protect Your Digital Assets with Managed Endpoint Security SolutionsProtect Your Digital Assets with Managed Endpoint Security Solutions
Protect Your Digital Assets with Managed Endpoint Security Solutions
 
What are the Different Types of Endpoint Security Solutions-converted.pdf
What are the Different Types of Endpoint Security Solutions-converted.pdfWhat are the Different Types of Endpoint Security Solutions-converted.pdf
What are the Different Types of Endpoint Security Solutions-converted.pdf
 
Windows 10: Security Focus (part II)
Windows 10: Security Focus (part II)Windows 10: Security Focus (part II)
Windows 10: Security Focus (part II)
 
Strategies for Data Leakage Prevention
Strategies for Data Leakage PreventionStrategies for Data Leakage Prevention
Strategies for Data Leakage Prevention
 

Mehr von Adi Saputra

Chapter 2, keamanan email
Chapter 2, keamanan emailChapter 2, keamanan email
Chapter 2, keamanan emailAdi Saputra
 
Chapter 1, Transformasi antivirus
Chapter 1, Transformasi antivirusChapter 1, Transformasi antivirus
Chapter 1, Transformasi antivirusAdi Saputra
 
Uncover security incidents with ESET Enterprise Inspector
Uncover security incidents with ESET Enterprise InspectorUncover security incidents with ESET Enterprise Inspector
Uncover security incidents with ESET Enterprise InspectorAdi Saputra
 
Protect your company from zero-day with ESET Dynamic Threat Defense
Protect your company from zero-day with ESET Dynamic Threat DefenseProtect your company from zero-day with ESET Dynamic Threat Defense
Protect your company from zero-day with ESET Dynamic Threat DefenseAdi Saputra
 
IT security for busines
IT security for businesIT security for busines
IT security for businesAdi Saputra
 
Pencegahan Enkripsi Ransomware dengan FSRM Windows
Pencegahan Enkripsi Ransomware dengan FSRM WindowsPencegahan Enkripsi Ransomware dengan FSRM Windows
Pencegahan Enkripsi Ransomware dengan FSRM WindowsAdi Saputra
 
Protect your sensitive data against data leaks with Safetica DLP
Protect your sensitive data against data leaks with Safetica DLPProtect your sensitive data against data leaks with Safetica DLP
Protect your sensitive data against data leaks with Safetica DLPAdi Saputra
 
Identify Security Risk in your company with Safetica Auditor
Identify Security Risk in your company with Safetica AuditorIdentify Security Risk in your company with Safetica Auditor
Identify Security Risk in your company with Safetica AuditorAdi Saputra
 

Mehr von Adi Saputra (8)

Chapter 2, keamanan email
Chapter 2, keamanan emailChapter 2, keamanan email
Chapter 2, keamanan email
 
Chapter 1, Transformasi antivirus
Chapter 1, Transformasi antivirusChapter 1, Transformasi antivirus
Chapter 1, Transformasi antivirus
 
Uncover security incidents with ESET Enterprise Inspector
Uncover security incidents with ESET Enterprise InspectorUncover security incidents with ESET Enterprise Inspector
Uncover security incidents with ESET Enterprise Inspector
 
Protect your company from zero-day with ESET Dynamic Threat Defense
Protect your company from zero-day with ESET Dynamic Threat DefenseProtect your company from zero-day with ESET Dynamic Threat Defense
Protect your company from zero-day with ESET Dynamic Threat Defense
 
IT security for busines
IT security for businesIT security for busines
IT security for busines
 
Pencegahan Enkripsi Ransomware dengan FSRM Windows
Pencegahan Enkripsi Ransomware dengan FSRM WindowsPencegahan Enkripsi Ransomware dengan FSRM Windows
Pencegahan Enkripsi Ransomware dengan FSRM Windows
 
Protect your sensitive data against data leaks with Safetica DLP
Protect your sensitive data against data leaks with Safetica DLPProtect your sensitive data against data leaks with Safetica DLP
Protect your sensitive data against data leaks with Safetica DLP
 
Identify Security Risk in your company with Safetica Auditor
Identify Security Risk in your company with Safetica AuditorIdentify Security Risk in your company with Safetica Auditor
Identify Security Risk in your company with Safetica Auditor
 

Kürzlich hochgeladen

Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
What is Artificial Intelligence?????????
What is Artificial Intelligence?????????What is Artificial Intelligence?????????
What is Artificial Intelligence?????????blackmambaettijean
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 

Kürzlich hochgeladen (20)

Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
What is Artificial Intelligence?????????
What is Artificial Intelligence?????????What is Artificial Intelligence?????????
What is Artificial Intelligence?????????
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 

Protect data effectively with endpoint encryption & data leak prevention

  • 1.
  • 2. Protect Data Efectively with : - Endpoint Encryption - Data Leak Prevention (DLP) Adi Saputra
  • 3. What is encryption ? Encryption is the process of encoding a message or information in such a way that only authorized parties can access it and those who are not authorized cannot. Encryption does not itself prevent interference, but denies the intelligible content to a would-be interceptor. source : wikipedia
  • 4. What is data leak prevention ? Data leak prevention (DLP) is software detects potential data breaches and prevents them by monitoring, detecting and blocking sensitive data while in-use, in-motion, and at-rest. Also known as data lost prevention or content monitoring & fltering. source : wikipedia
  • 5. Why need data encryption or data leak prevention ? source : breachlevelindex
  • 6. source : Ponemon Institute, Cost of data breach 2017 Why need data encryption or data leak prevention ?
  • 7. Why need data encryption or data leak prevention ?
  • 9. “A simple-to-use and powerfull encryption application for organizations of all sizes”  Safely encrypt hard drives, removable media, fles and email  Independent Standard Validation FIPS 140-2 level 1 for acceptable regulations & compliances  Multiple algorithm (AES, SHA, RSA, DES, Blowfsh) for assured security  Hybrid-cloud based management server for full remote control of endpoint encryption keys and security policy  Fully compatible with Microsoft Windows 10, 8, 8.1 for UEFI and GPT support for Trusted Platform Module
  • 10. Storage Encryption  Full Disk encryption  Optical and Removable Media encryption Content Encryption  File & Folder encryption  Text & Clipboard encryption  “Go” Portable encryption  Outlook plugin for Email & attachment  Encrypted Archives & Virtual Disk encryption Wipe Encryption  DESlock+ Shredder Key Management  Use Encryption Key & Password  Key Transfer & Backup “A simple-to-use and powerfull encryption application for organizations of all sizes”
  • 11. License Method  Subscription 1,2,3 years  Based on Device Product Available  Standard Edition (Without Full Disk Encryption)  Pro Edition (Include Full Disk Encryption) “A simple-to-use and powerfull encryption application for organizations of all sizes”
  • 12. Our Product Data Leak Prevention
  • 13. “An easy-to-use solution to protects you from expensive data leaks and necessary personal costs” Mitigates risk of fnancial loss caused by human factor, such as: ✔ Industrial espionage, human failure, lost/stolen laptop or external drive ✔ Covers all standard channels – e-mails, external storage, copy&paste, upload, printing, mobile devices ✔ Analyzes user’s behavior, making incidents or breach attempts predictable Safetica provides full context and detailed evidence Analyzing attempted data leaks, communication with competition, suspicious behavior, job searches, illegal and risky activities Safetica also saves money! Unproductive staf activities, personal printing, idle and illegal software, energy consumption Safetica also helps to... fulfll ISO family 27 00x (ISMS), Act protecting personal information and other Compliances
  • 14.  Logs employee computer activity and safely stores the logs on your server  Tracks employee activity on devices that aren’t connected to your company network “An easy-to-use solution to protects you from expensive data leaks and necessary personal costs”
  • 15.  Defne and manage data policies painlessly  Stop risky sharing and data theft  Encrypt fles for more security “An easy-to-use solution to protects you from expensive data leaks and necessary personal costs”
  • 16.  Keeps watch over your employees to ensure they are doing their job  Evaluates their activity, blocks undesirable activities and informs management about problems incurred “An easy-to-use solution to protects you from expensive data leaks and necessary personal costs”
  • 17. Product Available  Auditor (Without Data Leak Prevention)  DLP (Include Data Leak Prevention) “An easy-to-use solution to protects you from expensive data leaks and necessary personal costs” License Method  Subscription 1,2,3 years  Based on Device
  • 18. Conclusion - Encryption is Part of DLP - Encryption allowing data outside - DLP stopping data getting outside