Loading presentation...

Present Remotely

Send the link below via email or IM

Copy

Present to your audience

Start remote presentation

  • Invited audience members will follow you as you navigate and present
  • People invited to a presentation do not need a Prezi account
  • This link expires 10 minutes after you close the presentation
  • A maximum of 30 users can follow your presentation
  • Learn more about this feature in our knowledge base article

Do you really want to delete this prezi?

Neither you, nor the coeditors you shared it with will be able to recover it again.

DeleteCancel

Make your likes visible on Facebook?

Connect your Facebook account to Prezi and let your likes appear on your timeline.
You can change this under Settings & Account at any time.

No, thanks

What is the Key to Keeping your Data Secured

No description
by

Leonid Belkind

on 20 March 2016

Comments (0)

Please log in to add your comment.

Report abuse

Transcript of What is the Key to Keeping your Data Secured

WHAT IS THE
KEY TO KEEPING YOUR DATA SECURED
?

66%
of employees use a file-sharing app to store & share business data
The Dangerous Secrets Your IT Department Should Know About – Skydox – June 2012

89%
of organizations allow connecting smartphones to the business
18
months is the average period for an enterprise to double its amount of data
Check Point Software Technologies – The Impact of Mobile Devices on Information Security – Jan 2012


MOBILE DATA PROTECTION MARKET
IDC Report - 2013


50%
of business proccesses are stored on files
CHECK POINT
CAPSULE DOCS
Seamless and Unified Experience

Security follows the document

Advanced Auditing & Filtering

Strong Security

SINGLE MODULAR SOLUTION
CHECK POINT SOFTWARE TECHNOLOGIES
DOCUMENT SECURITY
BY
TM
World Wide Leader

Mobile Information Protection
In
Check Point

SOFTWARE TECHNOLOGIES LTD.
Reduce Total Cost of Ownership through
Unified Management, Moniroting and Administration:
A New Simple Way to Protect and Share Business Documents
Encapsulate Business Processes for Mobile Devices
Encapsulate Business processes for Mobile devices
Keep your data secured on Mobile Devices by using Document Security

Use Remote Access Capabilities:
Single Sign On
Secure sync of e-mail, calendar and contacts
Access to business applications
Only Authenticated Users Access the Business Container


Only business data is managed

Use Emails Securely
Use Documents Securely

Set Access Rights to Data
Classify Document
Encrypt Data
A new simple way to protect and share
business documents
Restricted
Content Aware policy:
Automatic protection based on document content
On the Organization perimeter / On the Endpoint machine
Seamless and Unified Experience
From Any Platform of choice
Windows
Mac
Android
iOS
Web
Simple Classification Model requiring Minimal User Interaction
100% transparent experience with default protection settings
Security Follows the Document
Store Anywhere:
Share in Any way:
Enterprise File Sharing and Sync
SharePoint
Network Shares
Enterprise File Sharing and Sync
Email
Removable Media
BYOC (Dropbox, Google Drive)
SharePoint
Advanced Auditing and Filtering
Denied access report
Document Audit Trail
Easy tracking of documents -
Nhollida@cpandl.com
Removed Protection
from "Purchasing Ideas.xlsx"
Strong Security
STRONGEST ALGORITHMS
AES256
Keys are rotated on a monthly basis to provide
Maximal Cryptographic Strength
RSA2048
Nhollida@cpandl.com was
denied access
to "Budget approval - 2014.docx"
Also, User Audit Trail and Advanced Administrative audits
Flexible Deployment model:
On Premise
Cloud
Full transcript