SlideShare ist ein Scribd-Unternehmen logo
1 von 29
Wer, was, wo: Inhalteschützen und unberechtigteZugriffeverhindern
©AvePoint, Inc. All rights reserved. Confidential and proprietary information of AvePoint, Inc. No part of this may be reproduced, stored in a retrieval
system, or transmitted in any form or by any means, without the prior written consent of AvePoint, Inc.
- Wer?
- Was?
Was ist Compliance
Risiko Management
- Wo?
- Live Demo
©AvePoint, Inc. All rights reserved. Confidential and proprietary information of AvePoint, Inc. No part of this may be reproduced, stored in a retrieval
system, or transmitted in any form or by any means, without the prior written consent of AvePoint, Inc.
Wer?
©AvePoint, Inc. All rights reserved. Confidential and proprietary information of AvePoint, Inc. No part of this may be reproduced, stored in a retrieval
system, or transmitted in any form or by any means, without the prior written consent of AvePoint, Inc.
Technologien
Dienstleistungen
Lösungen Partner
CommunitySupport
©AvePoint, Inc. All rights reserved. Confidential and proprietary information of AvePoint, Inc. No part of this may be reproduced, stored in a retrieval
system, or transmitted in any form or by any means, without the prior written consent of AvePoint, Inc.
Dennis.Hobmaier@
avepoint.com
www.AvePoint.de
T +49 89-2190989-66
M +49 174 1771935
@DHobmaier
©AvePoint, Inc. All rights reserved. Confidential and proprietary information of AvePoint, Inc. No part of this may be reproduced, stored in a retrieval
system, or transmitted in any form or by any means, without the prior written consent of AvePoint, Inc.
Was?
©AvePoint, Inc. All rights reserved. Confidential and proprietary information of AvePoint, Inc. No part of this may be reproduced, stored in a retrieval
system, or transmitted in any form or by any means, without the prior written consent of AvePoint, Inc.
• Überwachen
• Kontrollieren
• Überprüfen
• Strikt
• Streng
• Genau
• Korrekt
• Konsequent
©AvePoint, Inc. All rights reserved. Confidential and proprietary information of AvePoint, Inc. No part of this may be reproduced, stored in a retrieval
system, or transmitted in any form or by any means, without the prior written consent of AvePoint, Inc.
Compliance Richtlinie erstellen
©AvePoint, Inc. All rights reserved. Confidential and proprietary information of AvePoint, Inc. No part of this may be reproduced, stored in a retrieval
system, or transmitted in any form or by any means, without the prior written consent of AvePoint, Inc.
©AvePoint, Inc. All rights reserved. Confidential and proprietary information of AvePoint, Inc. No part of this may be reproduced, stored in a retrieval
system, or transmitted in any form or by any means, without the prior written consent of AvePoint, Inc.
• Compliance = Einhaltung
• Z.B.: Bundesdatenschutzgesetz (BDSG)
• Firewall
• Antivirus
• DLP (Data Leakage Prevention)
• Neue Gefahren von innen
• Datenabfluss von innen
©AvePoint, Inc. All rights reserved. Confidential and proprietary information of AvePoint, Inc. No part of this may be reproduced, stored in a retrieval
system, or transmitted in any form or by any means, without the prior written consent of AvePoint, Inc.
Hacker
80%
70%
60%
50%
40%
30%
20%
10%
0%
Versehent-
lich durch
Mitarbeiter
Versehent-
lich durch 3rd
party Tool
Absichtlich
durch
Mitarbeiter
Absichtlich
durch 3rd
party Tool
Source: HCCA;, “Data Privacy: How Big a Compliance Challenge?”; January 2011
8%
61%
41%
30%
13%
©AvePoint, Inc. All rights reserved. Confidential and proprietary information of AvePoint, Inc. No part of this may be reproduced, stored in a retrieval
system, or transmitted in any form or by any means, without the prior written consent of AvePoint, Inc.
• Compliance
• Data Security (CISO/CSO, IA, IRM)
• Records Management Officers
• Chief Privacy Officer
• 508 Coordinator
• Recht / Legal
• Datenschutzbeauftragter
• Business Users
• CEO
• Public Relations
• Social Media
• Personalabteilung
• IT
• CIO
• SharePoint Administratoren
©AvePoint, Inc. All rights reserved. Confidential and proprietary information of AvePoint, Inc. No part of this may be reproduced, stored in a retrieval
system, or transmitted in any form or by any means, without the prior written consent of AvePoint, Inc.
• Benutzerakzeptanz
• Erkennen
• Handeln
• Datenwachstum
©AvePoint, Inc. All rights reserved. Confidential and proprietary information of AvePoint, Inc. No part of this may be reproduced, stored in a retrieval
system, or transmitted in any form or by any means, without the prior written consent of AvePoint, Inc.
Transparenz/
Zusammenarbeit
Datensicherheit/
Verwaltung
©AvePoint, Inc. All rights reserved. Confidential and proprietary information of AvePoint, Inc. No part of this may be reproduced, stored in a retrieval
system, or transmitted in any form or by any means, without the prior written consent of AvePoint, Inc.
Risiko Management
©AvePoint, Inc. All rights reserved. Confidential and proprietary information of AvePoint, Inc. No part of this may be reproduced, stored in a retrieval
system, or transmitted in any form or by any means, without the prior written consent of AvePoint, Inc.
• Verlust von Datensätzen
• Durschnittlich 3,67 Mio € pro Unternehmen*
• Durschnittlich 151 € pro verlorenen Datensatz*
• Automatisiert Non-Compliant Inhalte erkennen
• Mögliche Geldstrafen reduzieren
• Compliance Guardian unterstützt
• Bestandteil der gesamten Compliance Strategie
• Reduziert das Risiko möglicher Strafen oder reduziert zumindest deren Höhe
http://www.symantec.com/content/en/us/about/media/pdfs/b-cost-of-a-data-breach-germany-report-2013.en-us.pdf?om_ext_cid=biz_socmed_twitter_facebook_marketwire_linkedin_2013Jun_worldwide_CostofaDataBreach
©AvePoint, Inc. All rights reserved. Confidential and proprietary information of AvePoint, Inc. No part of this may be reproduced, stored in a retrieval
system, or transmitted in any form or by any means, without the prior written consent of AvePoint, Inc.
“Vision” ist mehr als man sehen kann…
Bekanntes
Risiko
Risiko
ignorieren
“Never in all history have we harnessed
such formidable technology. Every
scientific advancement known to man has
been incorporated into its design. The
operational controls are sound and
foolproof!”
E.J. Smith, Captain of the Titanic
©AvePoint, Inc. All rights reserved. Confidential and proprietary information of AvePoint, Inc. No part of this may be reproduced, stored in a retrieval
system, or transmitted in any form or by any means, without the prior written consent of AvePoint, Inc.
Anhand definierter Regeln
• Inhalte von Dokumenten
• Elemente, Objekte, komplexe Szenarien durchsuchbar
Flexibel erweiterbar
Verschiedene Quellen
• SharePoint
• Dateifreigaben
• Webseiten
• Sharepoint Social (Yammer)
• Cloud
©AvePoint, Inc. All rights reserved. Confidential and proprietary information of AvePoint, Inc. No part of this may be reproduced, stored in a retrieval
system, or transmitted in any form or by any means, without the prior written consent of AvePoint, Inc.
Automatisierte Erkennung
Reporting
Personalisierbare Meldungen
Dokumente mit Metadaten anreichern
• Vertraulich
• Streng geheim
Aktionen
• Blocken / Löschen
• Quarantäne
• Editieren/Überschreiben
• Verschlüsseln
©AvePoint, Inc. All rights reserved. Confidential and proprietary information of AvePoint, Inc. No part of this may be reproduced, stored in a retrieval
system, or transmitted in any form or by any means, without the prior written consent of AvePoint, Inc.
Wo?
©AvePoint, Inc. All rights reserved. Confidential and proprietary information of AvePoint, Inc. No part of this may be reproduced, stored in a retrieval
system, or transmitted in any form or by any means, without the prior written consent of AvePoint, Inc.
• Bring Your Own Device (BYOD)
• Trusted Devices
• 2-Factor Authentisierung
• Trusted Users
• GPS Fetches
• Trusted Locations
• Als App
©AvePoint, Inc. All rights reserved. Confidential and proprietary information of AvePoint, Inc. No part of this may be reproduced, stored in a retrieval
system, or transmitted in any form or by any means, without the prior written consent of AvePoint, Inc.
Live Demo
©AvePoint, Inc. All rights reserved. Confidential and proprietary information of AvePoint, Inc. No part of this may be reproduced, stored in a retrieval
system, or transmitted in any form or by any means, without the prior written consent of AvePoint, Inc.
Perimeter Screenshots
©AvePoint, Inc. All rights reserved. Confidential and proprietary information of AvePoint, Inc. No part of this may be reproduced, stored in a retrieval
system, or transmitted in any form or by any means, without the prior written consent of AvePoint, Inc.
• iOS
• Android
• Bald: Windows Phone
©AvePoint, Inc. All rights reserved. Confidential and proprietary information of AvePoint, Inc. No part of this may be reproduced, stored in a retrieval
system, or transmitted in any form or by any means, without the prior written consent of AvePoint, Inc.
©AvePoint, Inc. All rights reserved. Confidential and proprietary information of AvePoint, Inc. No part of this may be reproduced, stored in a retrieval
system, or transmitted in any form or by any means, without the prior written consent of AvePoint, Inc.
Erstellung einer Compliance
Richtlinie. Koordination mit den
verschiedenen Abteilungen.
©AvePoint, Inc. All rights reserved. Confidential and proprietary information of AvePoint, Inc. No part of this may be reproduced, stored in a retrieval
system, or transmitted in any form or by any means, without the prior written consent of AvePoint, Inc.
©AvePoint, Inc. All rights reserved. Confidential and proprietary information of AvePoint, Inc. No part of this may be reproduced, stored in a retrieval
system, or transmitted in any form or by any means, without the prior written consent of AvePoint, Inc.
SalesDE@avepoint.com
AvePoint.deDE: +49 89 2190989-0
AvePoint_de
Fragen und Antworten

Weitere ähnliche Inhalte

Was ist angesagt?

How to Best Develop Requirements for SharePoint Projects
How to Best Develop Requirements for SharePoint ProjectsHow to Best Develop Requirements for SharePoint Projects
How to Best Develop Requirements for SharePoint ProjectsDux Raymond Sy
 
Fast Track Project Management Success w/ #Office365 Project Online
Fast Track Project Management Success w/ #Office365 Project OnlineFast Track Project Management Success w/ #Office365 Project Online
Fast Track Project Management Success w/ #Office365 Project OnlineDux Raymond Sy
 
How to Utilize the Right Project Management Solution
How to Utilize the Right Project Management SolutionHow to Utilize the Right Project Management Solution
How to Utilize the Right Project Management SolutionDux Raymond Sy
 
How to Ensure that SharePoint Governance Delivers Business Value
How to Ensure that SharePoint Governance Delivers Business ValueHow to Ensure that SharePoint Governance Delivers Business Value
How to Ensure that SharePoint Governance Delivers Business ValueDux Raymond Sy
 
How to Inspire, Transform and Drive Purposeful Collaboration #spshnl
How to Inspire, Transform and Drive Purposeful Collaboration #spshnlHow to Inspire, Transform and Drive Purposeful Collaboration #spshnl
How to Inspire, Transform and Drive Purposeful Collaboration #spshnlDux Raymond Sy
 
How to Effectively Prepare Your Organization's SharePoint Journey Into the Cloud
How to Effectively Prepare Your Organization's SharePoint Journey Into the CloudHow to Effectively Prepare Your Organization's SharePoint Journey Into the Cloud
How to Effectively Prepare Your Organization's SharePoint Journey Into the CloudDux Raymond Sy
 
Fast Track Project Management Success with Project Online
Fast Track Project Management Success with Project OnlineFast Track Project Management Success with Project Online
Fast Track Project Management Success with Project OnlineAvePoint
 
Achieving Built-in Governance with AvePoint
Achieving Built-in Governance with AvePointAchieving Built-in Governance with AvePoint
Achieving Built-in Governance with AvePointAvePoint
 
Splunk Forum Frankfurt - 15th Nov 2017 - Building SOC with Splunk
Splunk Forum Frankfurt - 15th Nov 2017 - Building SOC with SplunkSplunk Forum Frankfurt - 15th Nov 2017 - Building SOC with Splunk
Splunk Forum Frankfurt - 15th Nov 2017 - Building SOC with SplunkSplunk
 
SplunkLive Melbourne Enterprise Security & User Behavior Analytics
SplunkLive Melbourne Enterprise Security & User Behavior AnalyticsSplunkLive Melbourne Enterprise Security & User Behavior Analytics
SplunkLive Melbourne Enterprise Security & User Behavior AnalyticsGabrielle Knowles
 
SplunkLive Melbourne Machine Learning & Analytics
SplunkLive Melbourne Machine Learning & AnalyticsSplunkLive Melbourne Machine Learning & Analytics
SplunkLive Melbourne Machine Learning & AnalyticsGabrielle Knowles
 
SplunkLive! Paris 2018: Integrating Metrics and Logs
SplunkLive! Paris 2018: Integrating Metrics and LogsSplunkLive! Paris 2018: Integrating Metrics and Logs
SplunkLive! Paris 2018: Integrating Metrics and LogsSplunk
 
lastline-breach-detection-platform-datasheet
lastline-breach-detection-platform-datasheetlastline-breach-detection-platform-datasheet
lastline-breach-detection-platform-datasheetSerhat Cakmakoglu
 
SplunkLive Canberra Enterprise Security & User Behavior Analytics
SplunkLive Canberra Enterprise Security & User Behavior AnalyticsSplunkLive Canberra Enterprise Security & User Behavior Analytics
SplunkLive Canberra Enterprise Security & User Behavior AnalyticsGabrielle Knowles
 
SplunkLive Perth Enterprise Security & User Behavior Analytics
SplunkLive Perth Enterprise Security & User Behavior AnalyticsSplunkLive Perth Enterprise Security & User Behavior Analytics
SplunkLive Perth Enterprise Security & User Behavior AnalyticsGabrielle Knowles
 
SplunkLive Sydney Machine Learning & Analytics
SplunkLive Sydney Machine Learning & AnalyticsSplunkLive Sydney Machine Learning & Analytics
SplunkLive Sydney Machine Learning & AnalyticsSplunk
 

Was ist angesagt? (17)

How to Best Develop Requirements for SharePoint Projects
How to Best Develop Requirements for SharePoint ProjectsHow to Best Develop Requirements for SharePoint Projects
How to Best Develop Requirements for SharePoint Projects
 
Fast Track Project Management Success w/ #Office365 Project Online
Fast Track Project Management Success w/ #Office365 Project OnlineFast Track Project Management Success w/ #Office365 Project Online
Fast Track Project Management Success w/ #Office365 Project Online
 
How to Utilize the Right Project Management Solution
How to Utilize the Right Project Management SolutionHow to Utilize the Right Project Management Solution
How to Utilize the Right Project Management Solution
 
AvePoint Overview 14042016 with New Sig
AvePoint Overview 14042016 with New SigAvePoint Overview 14042016 with New Sig
AvePoint Overview 14042016 with New Sig
 
How to Ensure that SharePoint Governance Delivers Business Value
How to Ensure that SharePoint Governance Delivers Business ValueHow to Ensure that SharePoint Governance Delivers Business Value
How to Ensure that SharePoint Governance Delivers Business Value
 
How to Inspire, Transform and Drive Purposeful Collaboration #spshnl
How to Inspire, Transform and Drive Purposeful Collaboration #spshnlHow to Inspire, Transform and Drive Purposeful Collaboration #spshnl
How to Inspire, Transform and Drive Purposeful Collaboration #spshnl
 
How to Effectively Prepare Your Organization's SharePoint Journey Into the Cloud
How to Effectively Prepare Your Organization's SharePoint Journey Into the CloudHow to Effectively Prepare Your Organization's SharePoint Journey Into the Cloud
How to Effectively Prepare Your Organization's SharePoint Journey Into the Cloud
 
Fast Track Project Management Success with Project Online
Fast Track Project Management Success with Project OnlineFast Track Project Management Success with Project Online
Fast Track Project Management Success with Project Online
 
Achieving Built-in Governance with AvePoint
Achieving Built-in Governance with AvePointAchieving Built-in Governance with AvePoint
Achieving Built-in Governance with AvePoint
 
Splunk Forum Frankfurt - 15th Nov 2017 - Building SOC with Splunk
Splunk Forum Frankfurt - 15th Nov 2017 - Building SOC with SplunkSplunk Forum Frankfurt - 15th Nov 2017 - Building SOC with Splunk
Splunk Forum Frankfurt - 15th Nov 2017 - Building SOC with Splunk
 
SplunkLive Melbourne Enterprise Security & User Behavior Analytics
SplunkLive Melbourne Enterprise Security & User Behavior AnalyticsSplunkLive Melbourne Enterprise Security & User Behavior Analytics
SplunkLive Melbourne Enterprise Security & User Behavior Analytics
 
SplunkLive Melbourne Machine Learning & Analytics
SplunkLive Melbourne Machine Learning & AnalyticsSplunkLive Melbourne Machine Learning & Analytics
SplunkLive Melbourne Machine Learning & Analytics
 
SplunkLive! Paris 2018: Integrating Metrics and Logs
SplunkLive! Paris 2018: Integrating Metrics and LogsSplunkLive! Paris 2018: Integrating Metrics and Logs
SplunkLive! Paris 2018: Integrating Metrics and Logs
 
lastline-breach-detection-platform-datasheet
lastline-breach-detection-platform-datasheetlastline-breach-detection-platform-datasheet
lastline-breach-detection-platform-datasheet
 
SplunkLive Canberra Enterprise Security & User Behavior Analytics
SplunkLive Canberra Enterprise Security & User Behavior AnalyticsSplunkLive Canberra Enterprise Security & User Behavior Analytics
SplunkLive Canberra Enterprise Security & User Behavior Analytics
 
SplunkLive Perth Enterprise Security & User Behavior Analytics
SplunkLive Perth Enterprise Security & User Behavior AnalyticsSplunkLive Perth Enterprise Security & User Behavior Analytics
SplunkLive Perth Enterprise Security & User Behavior Analytics
 
SplunkLive Sydney Machine Learning & Analytics
SplunkLive Sydney Machine Learning & AnalyticsSplunkLive Sydney Machine Learning & Analytics
SplunkLive Sydney Machine Learning & Analytics
 

Andere mochten auch

SharePoint Governance - Jetzt mit Struktur
SharePoint Governance - Jetzt mit StrukturSharePoint Governance - Jetzt mit Struktur
SharePoint Governance - Jetzt mit StrukturDennis Hobmaier
 
Migration und ihre Tücken @ShareConf
Migration und ihre Tücken @ShareConfMigration und ihre Tücken @ShareConf
Migration und ihre Tücken @ShareConfDennis Hobmaier
 
Migration von SharePoint mit Hilfe von AvePoint auf Version 2013 oder in die ...
Migration von SharePoint mit Hilfe von AvePoint auf Version 2013 oder in die ...Migration von SharePoint mit Hilfe von AvePoint auf Version 2013 oder in die ...
Migration von SharePoint mit Hilfe von AvePoint auf Version 2013 oder in die ...Dennis Hobmaier
 
Migration und ihre Tücken – Welche Anpassungen gibt es?
Migration und ihre Tücken – Welche Anpassungen gibt es?Migration und ihre Tücken – Welche Anpassungen gibt es?
Migration und ihre Tücken – Welche Anpassungen gibt es?Dennis Hobmaier
 
SharePoint Governance - Jetzt mit Struktur @CollabDays
SharePoint Governance - Jetzt mit Struktur @CollabDaysSharePoint Governance - Jetzt mit Struktur @CollabDays
SharePoint Governance - Jetzt mit Struktur @CollabDaysDennis Hobmaier
 
Collaboration mit SharePoint - erfolgreiche Zusammenarbeit als Gemeinschaftsp...
Collaboration mit SharePoint - erfolgreiche Zusammenarbeit als Gemeinschaftsp...Collaboration mit SharePoint - erfolgreiche Zusammenarbeit als Gemeinschaftsp...
Collaboration mit SharePoint - erfolgreiche Zusammenarbeit als Gemeinschaftsp...Dennis Hobmaier
 
Don't Suck at SharePoint - Avoid the common mistakes
Don't Suck at SharePoint - Avoid the common mistakesDon't Suck at SharePoint - Avoid the common mistakes
Don't Suck at SharePoint - Avoid the common mistakesBenjamin Niaulin
 

Andere mochten auch (7)

SharePoint Governance - Jetzt mit Struktur
SharePoint Governance - Jetzt mit StrukturSharePoint Governance - Jetzt mit Struktur
SharePoint Governance - Jetzt mit Struktur
 
Migration und ihre Tücken @ShareConf
Migration und ihre Tücken @ShareConfMigration und ihre Tücken @ShareConf
Migration und ihre Tücken @ShareConf
 
Migration von SharePoint mit Hilfe von AvePoint auf Version 2013 oder in die ...
Migration von SharePoint mit Hilfe von AvePoint auf Version 2013 oder in die ...Migration von SharePoint mit Hilfe von AvePoint auf Version 2013 oder in die ...
Migration von SharePoint mit Hilfe von AvePoint auf Version 2013 oder in die ...
 
Migration und ihre Tücken – Welche Anpassungen gibt es?
Migration und ihre Tücken – Welche Anpassungen gibt es?Migration und ihre Tücken – Welche Anpassungen gibt es?
Migration und ihre Tücken – Welche Anpassungen gibt es?
 
SharePoint Governance - Jetzt mit Struktur @CollabDays
SharePoint Governance - Jetzt mit Struktur @CollabDaysSharePoint Governance - Jetzt mit Struktur @CollabDays
SharePoint Governance - Jetzt mit Struktur @CollabDays
 
Collaboration mit SharePoint - erfolgreiche Zusammenarbeit als Gemeinschaftsp...
Collaboration mit SharePoint - erfolgreiche Zusammenarbeit als Gemeinschaftsp...Collaboration mit SharePoint - erfolgreiche Zusammenarbeit als Gemeinschaftsp...
Collaboration mit SharePoint - erfolgreiche Zusammenarbeit als Gemeinschaftsp...
 
Don't Suck at SharePoint - Avoid the common mistakes
Don't Suck at SharePoint - Avoid the common mistakesDon't Suck at SharePoint - Avoid the common mistakes
Don't Suck at SharePoint - Avoid the common mistakes
 

Ähnlich wie Wer, was, wo: Inhalte schützen und unberechtigte Zugriffe verhindern

Initiation à la conformité dans Office365
Initiation à la conformité dans Office365Initiation à la conformité dans Office365
Initiation à la conformité dans Office3652SeeU
 
How to Choose the Right Solution for Project Management Success #spsnyc
How to Choose the Right Solution for Project Management Success #spsnycHow to Choose the Right Solution for Project Management Success #spsnyc
How to Choose the Right Solution for Project Management Success #spsnycDux Raymond Sy
 
Beyond the hype: Management and Governance for Office 365
Beyond the hype: Management and Governance for Office 365Beyond the hype: Management and Governance for Office 365
Beyond the hype: Management and Governance for Office 365Roberto Vazquez Delgado
 
O365con14 - the 4 major steps to migrate content from any on-premise source i...
O365con14 - the 4 major steps to migrate content from any on-premise source i...O365con14 - the 4 major steps to migrate content from any on-premise source i...
O365con14 - the 4 major steps to migrate content from any on-premise source i...NCCOMMS
 
Beyond SharePoint Deployment: How Can IT Inspire, Motivate, and Drive Sustain...
Beyond SharePoint Deployment: How Can IT Inspire, Motivate, and Drive Sustain...Beyond SharePoint Deployment: How Can IT Inspire, Motivate, and Drive Sustain...
Beyond SharePoint Deployment: How Can IT Inspire, Motivate, and Drive Sustain...AvePoint
 
Five ways to smash barriers to SharePoint adoption
Five ways to smash barriers to SharePoint adoptionFive ways to smash barriers to SharePoint adoption
Five ways to smash barriers to SharePoint adoptionGonzalo Marcos Ansoain
 
Five ways to smash barriers to SharePoint adoption
Five ways to smash barriers to SharePoint adoptionFive ways to smash barriers to SharePoint adoption
Five ways to smash barriers to SharePoint adoptionGonzalo Marcos
 
SharePoint Saturday @ Firenze - Building Effective Business Collaboration Pla...
SharePoint Saturday @ Firenze - Building Effective Business Collaboration Pla...SharePoint Saturday @ Firenze - Building Effective Business Collaboration Pla...
SharePoint Saturday @ Firenze - Building Effective Business Collaboration Pla...Gonzalo Marcos
 
SharePoint Saturday @ Firenze - Building Effective Business Collaboration Pla...
SharePoint Saturday @ Firenze - Building Effective Business Collaboration Pla...SharePoint Saturday @ Firenze - Building Effective Business Collaboration Pla...
SharePoint Saturday @ Firenze - Building Effective Business Collaboration Pla...Gonzalo Marcos Ansoain
 
Building effective business collaboration platforms
Building effective business collaboration platformsBuilding effective business collaboration platforms
Building effective business collaboration platformsGonzalo Marcos Ansoain
 
AvePoint: Migration as Easy as 1, 2, 3
AvePoint: Migration as Easy as 1, 2, 3AvePoint: Migration as Easy as 1, 2, 3
AvePoint: Migration as Easy as 1, 2, 3AvePoint
 
[Sy] How to Develop Your Office 365 Information Governance Strategy in 4 Steps
[Sy] How to Develop Your Office 365 Information Governance Strategy in 4 Steps[Sy] How to Develop Your Office 365 Information Governance Strategy in 4 Steps
[Sy] How to Develop Your Office 365 Information Governance Strategy in 4 StepsEuropean Collaboration Summit
 
CUE - Les différences entre On-Premises et le Cloud pour SharePoint (Azure IA...
CUE - Les différences entre On-Premises et le Cloud pour SharePoint (Azure IA...CUE - Les différences entre On-Premises et le Cloud pour SharePoint (Azure IA...
CUE - Les différences entre On-Premises et le Cloud pour SharePoint (Azure IA...Benoit Jester
 
Putting on your Design Bootstraps, Intro to Responsive Design in SharePoint
Putting on your Design Bootstraps, Intro to Responsive Design in SharePointPutting on your Design Bootstraps, Intro to Responsive Design in SharePoint
Putting on your Design Bootstraps, Intro to Responsive Design in SharePointD'arce Hess
 
Putting on Your Design Bootstraps: Intro to Responsive Design and SharePoint
Putting on Your Design Bootstraps: Intro to Responsive Design and SharePointPutting on Your Design Bootstraps: Intro to Responsive Design and SharePoint
Putting on Your Design Bootstraps: Intro to Responsive Design and SharePointAvePoint
 
18 May 2017 - Vuzion Love Cloud
18 May 2017 - Vuzion Love Cloud18 May 2017 - Vuzion Love Cloud
18 May 2017 - Vuzion Love CloudVuzion
 
SPTechCon Lightning Talk
SPTechCon Lightning TalkSPTechCon Lightning Talk
SPTechCon Lightning TalkAvePoint
 

Ähnlich wie Wer, was, wo: Inhalte schützen und unberechtigte Zugriffe verhindern (18)

Initiation à la conformité dans Office365
Initiation à la conformité dans Office365Initiation à la conformité dans Office365
Initiation à la conformité dans Office365
 
How to Choose the Right Solution for Project Management Success #spsnyc
How to Choose the Right Solution for Project Management Success #spsnycHow to Choose the Right Solution for Project Management Success #spsnyc
How to Choose the Right Solution for Project Management Success #spsnyc
 
Beyond the hype: Management and Governance for Office 365
Beyond the hype: Management and Governance for Office 365Beyond the hype: Management and Governance for Office 365
Beyond the hype: Management and Governance for Office 365
 
O365con14 - the 4 major steps to migrate content from any on-premise source i...
O365con14 - the 4 major steps to migrate content from any on-premise source i...O365con14 - the 4 major steps to migrate content from any on-premise source i...
O365con14 - the 4 major steps to migrate content from any on-premise source i...
 
You’re In the Cloud. Great! Now What?
You’re In the Cloud. Great! Now What?You’re In the Cloud. Great! Now What?
You’re In the Cloud. Great! Now What?
 
Beyond SharePoint Deployment: How Can IT Inspire, Motivate, and Drive Sustain...
Beyond SharePoint Deployment: How Can IT Inspire, Motivate, and Drive Sustain...Beyond SharePoint Deployment: How Can IT Inspire, Motivate, and Drive Sustain...
Beyond SharePoint Deployment: How Can IT Inspire, Motivate, and Drive Sustain...
 
Five ways to smash barriers to SharePoint adoption
Five ways to smash barriers to SharePoint adoptionFive ways to smash barriers to SharePoint adoption
Five ways to smash barriers to SharePoint adoption
 
Five ways to smash barriers to SharePoint adoption
Five ways to smash barriers to SharePoint adoptionFive ways to smash barriers to SharePoint adoption
Five ways to smash barriers to SharePoint adoption
 
SharePoint Saturday @ Firenze - Building Effective Business Collaboration Pla...
SharePoint Saturday @ Firenze - Building Effective Business Collaboration Pla...SharePoint Saturday @ Firenze - Building Effective Business Collaboration Pla...
SharePoint Saturday @ Firenze - Building Effective Business Collaboration Pla...
 
SharePoint Saturday @ Firenze - Building Effective Business Collaboration Pla...
SharePoint Saturday @ Firenze - Building Effective Business Collaboration Pla...SharePoint Saturday @ Firenze - Building Effective Business Collaboration Pla...
SharePoint Saturday @ Firenze - Building Effective Business Collaboration Pla...
 
Building effective business collaboration platforms
Building effective business collaboration platformsBuilding effective business collaboration platforms
Building effective business collaboration platforms
 
AvePoint: Migration as Easy as 1, 2, 3
AvePoint: Migration as Easy as 1, 2, 3AvePoint: Migration as Easy as 1, 2, 3
AvePoint: Migration as Easy as 1, 2, 3
 
[Sy] How to Develop Your Office 365 Information Governance Strategy in 4 Steps
[Sy] How to Develop Your Office 365 Information Governance Strategy in 4 Steps[Sy] How to Develop Your Office 365 Information Governance Strategy in 4 Steps
[Sy] How to Develop Your Office 365 Information Governance Strategy in 4 Steps
 
CUE - Les différences entre On-Premises et le Cloud pour SharePoint (Azure IA...
CUE - Les différences entre On-Premises et le Cloud pour SharePoint (Azure IA...CUE - Les différences entre On-Premises et le Cloud pour SharePoint (Azure IA...
CUE - Les différences entre On-Premises et le Cloud pour SharePoint (Azure IA...
 
Putting on your Design Bootstraps, Intro to Responsive Design in SharePoint
Putting on your Design Bootstraps, Intro to Responsive Design in SharePointPutting on your Design Bootstraps, Intro to Responsive Design in SharePoint
Putting on your Design Bootstraps, Intro to Responsive Design in SharePoint
 
Putting on Your Design Bootstraps: Intro to Responsive Design and SharePoint
Putting on Your Design Bootstraps: Intro to Responsive Design and SharePointPutting on Your Design Bootstraps: Intro to Responsive Design and SharePoint
Putting on Your Design Bootstraps: Intro to Responsive Design and SharePoint
 
18 May 2017 - Vuzion Love Cloud
18 May 2017 - Vuzion Love Cloud18 May 2017 - Vuzion Love Cloud
18 May 2017 - Vuzion Love Cloud
 
SPTechCon Lightning Talk
SPTechCon Lightning TalkSPTechCon Lightning Talk
SPTechCon Lightning Talk
 

Kürzlich hochgeladen

Introduction to Prompt Engineering (Focusing on ChatGPT)
Introduction to Prompt Engineering (Focusing on ChatGPT)Introduction to Prompt Engineering (Focusing on ChatGPT)
Introduction to Prompt Engineering (Focusing on ChatGPT)Chameera Dedduwage
 
George Lever - eCommerce Day Chile 2024
George Lever -  eCommerce Day Chile 2024George Lever -  eCommerce Day Chile 2024
George Lever - eCommerce Day Chile 2024eCommerce Institute
 
ANCHORING SCRIPT FOR A CULTURAL EVENT.docx
ANCHORING SCRIPT FOR A CULTURAL EVENT.docxANCHORING SCRIPT FOR A CULTURAL EVENT.docx
ANCHORING SCRIPT FOR A CULTURAL EVENT.docxNikitaBankoti2
 
WhatsApp 📞 9892124323 ✅Call Girls In Juhu ( Mumbai )
WhatsApp 📞 9892124323 ✅Call Girls In Juhu ( Mumbai )WhatsApp 📞 9892124323 ✅Call Girls In Juhu ( Mumbai )
WhatsApp 📞 9892124323 ✅Call Girls In Juhu ( Mumbai )Pooja Nehwal
 
VVIP Call Girls Nalasopara : 9892124323, Call Girls in Nalasopara Services
VVIP Call Girls Nalasopara : 9892124323, Call Girls in Nalasopara ServicesVVIP Call Girls Nalasopara : 9892124323, Call Girls in Nalasopara Services
VVIP Call Girls Nalasopara : 9892124323, Call Girls in Nalasopara ServicesPooja Nehwal
 
Thirunelveli call girls Tamil escorts 7877702510
Thirunelveli call girls Tamil escorts 7877702510Thirunelveli call girls Tamil escorts 7877702510
Thirunelveli call girls Tamil escorts 7877702510Vipesco
 
Open Source Strategy in Logistics 2015_Henrik Hankedvz-d-nl-log-conference.pdf
Open Source Strategy in Logistics 2015_Henrik Hankedvz-d-nl-log-conference.pdfOpen Source Strategy in Logistics 2015_Henrik Hankedvz-d-nl-log-conference.pdf
Open Source Strategy in Logistics 2015_Henrik Hankedvz-d-nl-log-conference.pdfhenrik385807
 
Exploring protein-protein interactions by Weak Affinity Chromatography (WAC) ...
Exploring protein-protein interactions by Weak Affinity Chromatography (WAC) ...Exploring protein-protein interactions by Weak Affinity Chromatography (WAC) ...
Exploring protein-protein interactions by Weak Affinity Chromatography (WAC) ...Salam Al-Karadaghi
 
BDSM⚡Call Girls in Sector 93 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 93 Noida Escorts >༒8448380779 Escort ServiceBDSM⚡Call Girls in Sector 93 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 93 Noida Escorts >༒8448380779 Escort ServiceDelhi Call girls
 
Night 7k Call Girls Noida Sector 128 Call Me: 8448380779
Night 7k Call Girls Noida Sector 128 Call Me: 8448380779Night 7k Call Girls Noida Sector 128 Call Me: 8448380779
Night 7k Call Girls Noida Sector 128 Call Me: 8448380779Delhi Call girls
 
Presentation on Engagement in Book Clubs
Presentation on Engagement in Book ClubsPresentation on Engagement in Book Clubs
Presentation on Engagement in Book Clubssamaasim06
 
Microsoft Copilot AI for Everyone - created by AI
Microsoft Copilot AI for Everyone - created by AIMicrosoft Copilot AI for Everyone - created by AI
Microsoft Copilot AI for Everyone - created by AITatiana Gurgel
 
Mohammad_Alnahdi_Oral_Presentation_Assignment.pptx
Mohammad_Alnahdi_Oral_Presentation_Assignment.pptxMohammad_Alnahdi_Oral_Presentation_Assignment.pptx
Mohammad_Alnahdi_Oral_Presentation_Assignment.pptxmohammadalnahdi22
 
Call Girls in Sarojini Nagar Market Delhi 💯 Call Us 🔝8264348440🔝
Call Girls in Sarojini Nagar Market Delhi 💯 Call Us 🔝8264348440🔝Call Girls in Sarojini Nagar Market Delhi 💯 Call Us 🔝8264348440🔝
Call Girls in Sarojini Nagar Market Delhi 💯 Call Us 🔝8264348440🔝soniya singh
 
CTAC 2024 Valencia - Henrik Hanke - Reduce to the max - slideshare.pdf
CTAC 2024 Valencia - Henrik Hanke - Reduce to the max - slideshare.pdfCTAC 2024 Valencia - Henrik Hanke - Reduce to the max - slideshare.pdf
CTAC 2024 Valencia - Henrik Hanke - Reduce to the max - slideshare.pdfhenrik385807
 
SaaStr Workshop Wednesday w: Jason Lemkin, SaaStr
SaaStr Workshop Wednesday w: Jason Lemkin, SaaStrSaaStr Workshop Wednesday w: Jason Lemkin, SaaStr
SaaStr Workshop Wednesday w: Jason Lemkin, SaaStrsaastr
 
Call Girl Number in Khar Mumbai📲 9892124323 💞 Full Night Enjoy
Call Girl Number in Khar Mumbai📲 9892124323 💞 Full Night EnjoyCall Girl Number in Khar Mumbai📲 9892124323 💞 Full Night Enjoy
Call Girl Number in Khar Mumbai📲 9892124323 💞 Full Night EnjoyPooja Nehwal
 
Mathematics of Finance Presentation.pptx
Mathematics of Finance Presentation.pptxMathematics of Finance Presentation.pptx
Mathematics of Finance Presentation.pptxMoumonDas2
 
Russian Call Girls in Kolkata Vaishnavi 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Vaishnavi 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Vaishnavi 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Vaishnavi 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
Governance and Nation-Building in Nigeria: Some Reflections on Options for Po...
Governance and Nation-Building in Nigeria: Some Reflections on Options for Po...Governance and Nation-Building in Nigeria: Some Reflections on Options for Po...
Governance and Nation-Building in Nigeria: Some Reflections on Options for Po...Kayode Fayemi
 

Kürzlich hochgeladen (20)

Introduction to Prompt Engineering (Focusing on ChatGPT)
Introduction to Prompt Engineering (Focusing on ChatGPT)Introduction to Prompt Engineering (Focusing on ChatGPT)
Introduction to Prompt Engineering (Focusing on ChatGPT)
 
George Lever - eCommerce Day Chile 2024
George Lever -  eCommerce Day Chile 2024George Lever -  eCommerce Day Chile 2024
George Lever - eCommerce Day Chile 2024
 
ANCHORING SCRIPT FOR A CULTURAL EVENT.docx
ANCHORING SCRIPT FOR A CULTURAL EVENT.docxANCHORING SCRIPT FOR A CULTURAL EVENT.docx
ANCHORING SCRIPT FOR A CULTURAL EVENT.docx
 
WhatsApp 📞 9892124323 ✅Call Girls In Juhu ( Mumbai )
WhatsApp 📞 9892124323 ✅Call Girls In Juhu ( Mumbai )WhatsApp 📞 9892124323 ✅Call Girls In Juhu ( Mumbai )
WhatsApp 📞 9892124323 ✅Call Girls In Juhu ( Mumbai )
 
VVIP Call Girls Nalasopara : 9892124323, Call Girls in Nalasopara Services
VVIP Call Girls Nalasopara : 9892124323, Call Girls in Nalasopara ServicesVVIP Call Girls Nalasopara : 9892124323, Call Girls in Nalasopara Services
VVIP Call Girls Nalasopara : 9892124323, Call Girls in Nalasopara Services
 
Thirunelveli call girls Tamil escorts 7877702510
Thirunelveli call girls Tamil escorts 7877702510Thirunelveli call girls Tamil escorts 7877702510
Thirunelveli call girls Tamil escorts 7877702510
 
Open Source Strategy in Logistics 2015_Henrik Hankedvz-d-nl-log-conference.pdf
Open Source Strategy in Logistics 2015_Henrik Hankedvz-d-nl-log-conference.pdfOpen Source Strategy in Logistics 2015_Henrik Hankedvz-d-nl-log-conference.pdf
Open Source Strategy in Logistics 2015_Henrik Hankedvz-d-nl-log-conference.pdf
 
Exploring protein-protein interactions by Weak Affinity Chromatography (WAC) ...
Exploring protein-protein interactions by Weak Affinity Chromatography (WAC) ...Exploring protein-protein interactions by Weak Affinity Chromatography (WAC) ...
Exploring protein-protein interactions by Weak Affinity Chromatography (WAC) ...
 
BDSM⚡Call Girls in Sector 93 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 93 Noida Escorts >༒8448380779 Escort ServiceBDSM⚡Call Girls in Sector 93 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 93 Noida Escorts >༒8448380779 Escort Service
 
Night 7k Call Girls Noida Sector 128 Call Me: 8448380779
Night 7k Call Girls Noida Sector 128 Call Me: 8448380779Night 7k Call Girls Noida Sector 128 Call Me: 8448380779
Night 7k Call Girls Noida Sector 128 Call Me: 8448380779
 
Presentation on Engagement in Book Clubs
Presentation on Engagement in Book ClubsPresentation on Engagement in Book Clubs
Presentation on Engagement in Book Clubs
 
Microsoft Copilot AI for Everyone - created by AI
Microsoft Copilot AI for Everyone - created by AIMicrosoft Copilot AI for Everyone - created by AI
Microsoft Copilot AI for Everyone - created by AI
 
Mohammad_Alnahdi_Oral_Presentation_Assignment.pptx
Mohammad_Alnahdi_Oral_Presentation_Assignment.pptxMohammad_Alnahdi_Oral_Presentation_Assignment.pptx
Mohammad_Alnahdi_Oral_Presentation_Assignment.pptx
 
Call Girls in Sarojini Nagar Market Delhi 💯 Call Us 🔝8264348440🔝
Call Girls in Sarojini Nagar Market Delhi 💯 Call Us 🔝8264348440🔝Call Girls in Sarojini Nagar Market Delhi 💯 Call Us 🔝8264348440🔝
Call Girls in Sarojini Nagar Market Delhi 💯 Call Us 🔝8264348440🔝
 
CTAC 2024 Valencia - Henrik Hanke - Reduce to the max - slideshare.pdf
CTAC 2024 Valencia - Henrik Hanke - Reduce to the max - slideshare.pdfCTAC 2024 Valencia - Henrik Hanke - Reduce to the max - slideshare.pdf
CTAC 2024 Valencia - Henrik Hanke - Reduce to the max - slideshare.pdf
 
SaaStr Workshop Wednesday w: Jason Lemkin, SaaStr
SaaStr Workshop Wednesday w: Jason Lemkin, SaaStrSaaStr Workshop Wednesday w: Jason Lemkin, SaaStr
SaaStr Workshop Wednesday w: Jason Lemkin, SaaStr
 
Call Girl Number in Khar Mumbai📲 9892124323 💞 Full Night Enjoy
Call Girl Number in Khar Mumbai📲 9892124323 💞 Full Night EnjoyCall Girl Number in Khar Mumbai📲 9892124323 💞 Full Night Enjoy
Call Girl Number in Khar Mumbai📲 9892124323 💞 Full Night Enjoy
 
Mathematics of Finance Presentation.pptx
Mathematics of Finance Presentation.pptxMathematics of Finance Presentation.pptx
Mathematics of Finance Presentation.pptx
 
Russian Call Girls in Kolkata Vaishnavi 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Vaishnavi 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Vaishnavi 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Vaishnavi 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
Governance and Nation-Building in Nigeria: Some Reflections on Options for Po...
Governance and Nation-Building in Nigeria: Some Reflections on Options for Po...Governance and Nation-Building in Nigeria: Some Reflections on Options for Po...
Governance and Nation-Building in Nigeria: Some Reflections on Options for Po...
 

Wer, was, wo: Inhalte schützen und unberechtigte Zugriffe verhindern

  • 1. Wer, was, wo: Inhalteschützen und unberechtigteZugriffeverhindern
  • 2. ©AvePoint, Inc. All rights reserved. Confidential and proprietary information of AvePoint, Inc. No part of this may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, without the prior written consent of AvePoint, Inc. - Wer? - Was? Was ist Compliance Risiko Management - Wo? - Live Demo
  • 3. ©AvePoint, Inc. All rights reserved. Confidential and proprietary information of AvePoint, Inc. No part of this may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, without the prior written consent of AvePoint, Inc. Wer?
  • 4. ©AvePoint, Inc. All rights reserved. Confidential and proprietary information of AvePoint, Inc. No part of this may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, without the prior written consent of AvePoint, Inc. Technologien Dienstleistungen Lösungen Partner CommunitySupport
  • 5. ©AvePoint, Inc. All rights reserved. Confidential and proprietary information of AvePoint, Inc. No part of this may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, without the prior written consent of AvePoint, Inc. Dennis.Hobmaier@ avepoint.com www.AvePoint.de T +49 89-2190989-66 M +49 174 1771935 @DHobmaier
  • 6. ©AvePoint, Inc. All rights reserved. Confidential and proprietary information of AvePoint, Inc. No part of this may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, without the prior written consent of AvePoint, Inc. Was?
  • 7. ©AvePoint, Inc. All rights reserved. Confidential and proprietary information of AvePoint, Inc. No part of this may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, without the prior written consent of AvePoint, Inc. • Überwachen • Kontrollieren • Überprüfen • Strikt • Streng • Genau • Korrekt • Konsequent
  • 8. ©AvePoint, Inc. All rights reserved. Confidential and proprietary information of AvePoint, Inc. No part of this may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, without the prior written consent of AvePoint, Inc. Compliance Richtlinie erstellen
  • 9. ©AvePoint, Inc. All rights reserved. Confidential and proprietary information of AvePoint, Inc. No part of this may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, without the prior written consent of AvePoint, Inc.
  • 10. ©AvePoint, Inc. All rights reserved. Confidential and proprietary information of AvePoint, Inc. No part of this may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, without the prior written consent of AvePoint, Inc. • Compliance = Einhaltung • Z.B.: Bundesdatenschutzgesetz (BDSG) • Firewall • Antivirus • DLP (Data Leakage Prevention) • Neue Gefahren von innen • Datenabfluss von innen
  • 11. ©AvePoint, Inc. All rights reserved. Confidential and proprietary information of AvePoint, Inc. No part of this may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, without the prior written consent of AvePoint, Inc. Hacker 80% 70% 60% 50% 40% 30% 20% 10% 0% Versehent- lich durch Mitarbeiter Versehent- lich durch 3rd party Tool Absichtlich durch Mitarbeiter Absichtlich durch 3rd party Tool Source: HCCA;, “Data Privacy: How Big a Compliance Challenge?”; January 2011 8% 61% 41% 30% 13%
  • 12. ©AvePoint, Inc. All rights reserved. Confidential and proprietary information of AvePoint, Inc. No part of this may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, without the prior written consent of AvePoint, Inc. • Compliance • Data Security (CISO/CSO, IA, IRM) • Records Management Officers • Chief Privacy Officer • 508 Coordinator • Recht / Legal • Datenschutzbeauftragter • Business Users • CEO • Public Relations • Social Media • Personalabteilung • IT • CIO • SharePoint Administratoren
  • 13. ©AvePoint, Inc. All rights reserved. Confidential and proprietary information of AvePoint, Inc. No part of this may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, without the prior written consent of AvePoint, Inc. • Benutzerakzeptanz • Erkennen • Handeln • Datenwachstum
  • 14. ©AvePoint, Inc. All rights reserved. Confidential and proprietary information of AvePoint, Inc. No part of this may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, without the prior written consent of AvePoint, Inc. Transparenz/ Zusammenarbeit Datensicherheit/ Verwaltung
  • 15. ©AvePoint, Inc. All rights reserved. Confidential and proprietary information of AvePoint, Inc. No part of this may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, without the prior written consent of AvePoint, Inc. Risiko Management
  • 16. ©AvePoint, Inc. All rights reserved. Confidential and proprietary information of AvePoint, Inc. No part of this may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, without the prior written consent of AvePoint, Inc. • Verlust von Datensätzen • Durschnittlich 3,67 Mio € pro Unternehmen* • Durschnittlich 151 € pro verlorenen Datensatz* • Automatisiert Non-Compliant Inhalte erkennen • Mögliche Geldstrafen reduzieren • Compliance Guardian unterstützt • Bestandteil der gesamten Compliance Strategie • Reduziert das Risiko möglicher Strafen oder reduziert zumindest deren Höhe http://www.symantec.com/content/en/us/about/media/pdfs/b-cost-of-a-data-breach-germany-report-2013.en-us.pdf?om_ext_cid=biz_socmed_twitter_facebook_marketwire_linkedin_2013Jun_worldwide_CostofaDataBreach
  • 17. ©AvePoint, Inc. All rights reserved. Confidential and proprietary information of AvePoint, Inc. No part of this may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, without the prior written consent of AvePoint, Inc. “Vision” ist mehr als man sehen kann… Bekanntes Risiko Risiko ignorieren “Never in all history have we harnessed such formidable technology. Every scientific advancement known to man has been incorporated into its design. The operational controls are sound and foolproof!” E.J. Smith, Captain of the Titanic
  • 18. ©AvePoint, Inc. All rights reserved. Confidential and proprietary information of AvePoint, Inc. No part of this may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, without the prior written consent of AvePoint, Inc. Anhand definierter Regeln • Inhalte von Dokumenten • Elemente, Objekte, komplexe Szenarien durchsuchbar Flexibel erweiterbar Verschiedene Quellen • SharePoint • Dateifreigaben • Webseiten • Sharepoint Social (Yammer) • Cloud
  • 19. ©AvePoint, Inc. All rights reserved. Confidential and proprietary information of AvePoint, Inc. No part of this may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, without the prior written consent of AvePoint, Inc. Automatisierte Erkennung Reporting Personalisierbare Meldungen Dokumente mit Metadaten anreichern • Vertraulich • Streng geheim Aktionen • Blocken / Löschen • Quarantäne • Editieren/Überschreiben • Verschlüsseln
  • 20. ©AvePoint, Inc. All rights reserved. Confidential and proprietary information of AvePoint, Inc. No part of this may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, without the prior written consent of AvePoint, Inc. Wo?
  • 21. ©AvePoint, Inc. All rights reserved. Confidential and proprietary information of AvePoint, Inc. No part of this may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, without the prior written consent of AvePoint, Inc. • Bring Your Own Device (BYOD) • Trusted Devices • 2-Factor Authentisierung • Trusted Users • GPS Fetches • Trusted Locations • Als App
  • 22. ©AvePoint, Inc. All rights reserved. Confidential and proprietary information of AvePoint, Inc. No part of this may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, without the prior written consent of AvePoint, Inc. Live Demo
  • 23. ©AvePoint, Inc. All rights reserved. Confidential and proprietary information of AvePoint, Inc. No part of this may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, without the prior written consent of AvePoint, Inc. Perimeter Screenshots
  • 24. ©AvePoint, Inc. All rights reserved. Confidential and proprietary information of AvePoint, Inc. No part of this may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, without the prior written consent of AvePoint, Inc. • iOS • Android • Bald: Windows Phone
  • 25. ©AvePoint, Inc. All rights reserved. Confidential and proprietary information of AvePoint, Inc. No part of this may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, without the prior written consent of AvePoint, Inc.
  • 26. ©AvePoint, Inc. All rights reserved. Confidential and proprietary information of AvePoint, Inc. No part of this may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, without the prior written consent of AvePoint, Inc. Erstellung einer Compliance Richtlinie. Koordination mit den verschiedenen Abteilungen.
  • 27. ©AvePoint, Inc. All rights reserved. Confidential and proprietary information of AvePoint, Inc. No part of this may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, without the prior written consent of AvePoint, Inc.
  • 28. ©AvePoint, Inc. All rights reserved. Confidential and proprietary information of AvePoint, Inc. No part of this may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, without the prior written consent of AvePoint, Inc. SalesDE@avepoint.com AvePoint.deDE: +49 89 2190989-0 AvePoint_de

Hinweis der Redaktion

  1. the Society of Corporate Compliance and Ethics and Health Care Compliance Association fielded a survey in January 2011. The purpose was to both identify compliance officers’ areas of responsibility as well as their assessment of the risk. The survey was completed by 518 compliance professionals. Fears of an accidental breach far outweigh fears of an intentional breach. Respondents were asked how likely they felt that data would be released through hacking attacks, intentional breaches by employees and third party vendors, and accidental breaches by employees and vendors. In general the feeling was that accidental breaches were far more likely. Just 8% felt that it was somewhat or very likely a hacker would gain access to the system, When it came to breaches by employees, 61% thought an accidental breach was somewhat or very likely, but just 30% thought the same of an intentional breach. Likewise 41% thought an accidental breach by a third party vendor was somewhat or very likely but only 13% thought an intentional breach was somewhat or very likely. “Employees are able to access corporate information anywhere, at any time. It is essential for companies to put the proper information protection policies and procedures in place to counterbalance these new realities.” Francis deSouza, group president, Enterprise Products and Services, Symantec Corp
  2. Auswertung und grafische Charts erstellen Manuell Metadaten zu vertraulichen Dokumenten hinzufügen Automatisch Metadaten zu vertraulichen Dokumenten hinzufügen Automatisch Aktionen ausführen, wenn vertrauliche Dokumente erkannt werden, z.B. von der Quarantäne bis zum Löschen