Preventing Employee Data Breaches Caused by Unsecure File Transfers

Embed Size (px)

DESCRIPTION

The majority of all corporate data breaches are caused inadvertently by well-meaning employees exchanging files with customers, vendors, and partners. Ad hoc file transfer security has become a critical concern for Information Security departments at leading companies.

Citation preview

  • 1. Preventing Employee Data Breaches Caused by Unsecure File Transfers
    Thursday, September 29, 20112:00 PM EDT / 11:00 AM PDT
    Presenter:
    Mark Eaton, Director of Sales

2. Questions?
Use the chat feature to the right of your screen
3. Corporate Data is More Vulnerable Than Ever
4. Agenda
Top 5 Security and Compliance Challenges
How to Prevent Employee Data Breaches
How Biscom Delivery Server Works
The Importance of Not Putting Files in the DMZ
Auditing and Reporting
Q&A
5. Reason for Data Leaks
November 2009 Study
6. How well protected do you feel your company is against each of the following types of data leaks?
November 2009 Study
7. Poll
8. 5
Compliance and Security Challenges from End-user Behavior
9. 1. Email
10. Impact of using email for large file transfer
of email contains attachments
95%
of email bandwidth is for attachments
1
/
3
19%
of email attachments are greater than 5MB
is the average savings for every 10% reduction in email storagein a SAN-enabled Exchange environment
$53,000
Data by: Osterman Research White Paper Jan. 2009 Download the whitepaper at www.biscomds.com
11. 2. File Transfer Protocol
12. 3. Overnight Delivery
13. 4. File Sharing Sites
14. 5. Lack of Tracking
15. Is your enterprise sending sensitive information securely?
16. How to Prevent Employee Data Breaches
17. = Secure File Transfer
18. Secure File Transfer Selection Criteria
Intuitive no training required
Self registration for external users
Easy deployment/minimum IT support
Flexible Deployment:Leverage existing infrastructure
Integrate with Active Directory/LDAP for centralized user management
Transaction logging for auditing and reporting
Secure data both in transit and at rest
Allow you to meet state and federal data protection mandates
19. How Biscoms Secure File Transfer Works
20. Three steps to deliver files securely
Your senders collect documents and files, and create a package in BDS
Your company Internal Senders
External Recipient
21. Three steps to deliver files securely
Your senders collect documents and files, and create a package in BDS
Your sender addresses the package and a notification email goes out to your recipients
Your company Internal Senders
External Recipient
22. Three steps to deliver files securely
Your senders collect documents and files, and create a package in BDS
Your sender addresses the package and a notification email goes out to your recipients
Recipients click the embedded link, authenticate, and download their files
Your company Internal Senders
External Recipient
23. Simple User Interface
24. Customizable and Brandable
25. External users can self register accounts
26. Users are assigned roles
Recipientscan receive and reply to secure deliveries
Senderscan create secure deliveries
Reportersview transactions and audit information
Compliance Users can download files for auditing and compliance purposes
Administratorscontrol system configuration and user management
27. Simply choose recipients & upload files
28. Delivery options available
Upload files
Select from global address book
Enter delivery options
Enter secure and notification messages
29. Outlook Add-in
BDS Options
Uses existing compose message form
Can view file upload status
Drag and drop files
Secure message
30. Recipients receive an email notification containing an embedded link
Automatic embedded link
31. View the secure message and download files
Delivery meta-data
Files to download
32. Administrator Can Track & Audit Files Sent
33. SharePoint Integration
34. Send File Directly From SharePoint
35. Why Enterprises Select Biscom
36. 1. Weve focused on mission-critical, Enterpriseproduction solutions for more than 25 years
37. 2. Integration with existing infrastructure and applications

  • VMware

38. Autonomy iManage 39. SharePoint 40. Outlook 41. Automation modules 42. Extensive API set