SlideShare une entreprise Scribd logo
1  sur  15
Simon Cuthbert, Director
Introducing Security Guardian
• ‘Enterprise Level’ USB solutions
• All very good but all very similar solutions
• Most are encrypted
• Some have central management capability
• BUT…What Happens When the Device is Lost or Stolen?
• All these solutions rely on being plugged into a 3rd party
internet connect PC/Laptop to be managed
• If the device is not plugged in it…
• Can not be traced
• Can not be managed
• No verifiable audit trail
INTRODUCTION - USB Technology in use Today
3
• 561 Million USB Flash Drives will be sold between 2014 and 2018
• Forrsights Survey 2014
• More than 30% have lost a USB drive containing confidential
information
• 77% have lost a laptop, tablet or mobile with sensitive data
• 63% of IT managers lack visibility of mobile data within their
organisation
• 84% use personal emails to send sensitive information
• 50% use public cloud services to send sensitive files
• Wall Street Journal Aug 2014 5000 interviews
INTRODUCTION - Don’t Forget the Insider Threat!
4
People Lose Stuff!
More than 30% have lost a USB drive containing confidential information
77% have lost a laptop, tablet or mobile with sensitive data
* Wall Street Journal Aug 2014 5000 interviews
5
THE DETAILS - Human Error!
6
THE DETAILS - Human Error!
7
THE DETAILS - Human Error!
8
• Encryption
• Many end users turn off encryption on their device due to it
slowing down operation
• Data Stored in Cloud
• Many users will download a piece of sensitive information from
the Cloud but then store it locally to save time when it is
needed again
• Responsibility for security management should to be
taken away from the End User
THE DETAILS - People Just Want to Get On With Life!
9
Proposed EU Data Protection 2016
10
Have to be able to prove:
Network security procedures
Device encryption
THE DETAILS - Proposed EU Data Protection 2016
11
Remote delete requests
Recovered % deleted
• iOS 317 43%
• Android 193 57%
• Blackberry 170 61%
THE DETAILS - Deleting/Overwriting Data
12
• Mobile Data Tracking &
Management Specialist
• Manufactures of Security Guardian
SOLUTIONS - What is Security Guardian?
13
15
• Cloud based or On-Premise
Management & user interface
• Location via GPS, GSM & RFID
• Geofencing
• Time controlled access
• Over The Air configuration
• Remote turn On and Off
• Remote data destruct
• Verifiable audit trail and
reporting
SOLUTIONS - Management console
16
Thank you
Simon Cuthbert, Director – ExactTrak Ltd
Simon.cuthbert@exactTrak.com
LinkedIn: Simon Cuthbert +44 (0) 7710 253340 Twitter: @exactTrak

Contenu connexe

Tendances

Primend praktiline konverents - Samsung Cloud. Management. Security
Primend praktiline konverents - Samsung Cloud. Management. SecurityPrimend praktiline konverents - Samsung Cloud. Management. Security
Primend praktiline konverents - Samsung Cloud. Management. SecurityPrimend
 
Computing on the Move - Mobile Security
Computing on the Move - Mobile SecurityComputing on the Move - Mobile Security
Computing on the Move - Mobile SecurityAVG Technologies AU
 
Achieving Secure BYOD in Government Agencies
Achieving Secure BYOD in Government AgenciesAchieving Secure BYOD in Government Agencies
Achieving Secure BYOD in Government AgenciesProofpoint
 
Privacy and technology
Privacy and technologyPrivacy and technology
Privacy and technologyIzuho Niwa
 
Profile securitarian
Profile   securitarianProfile   securitarian
Profile securitarianRupesh Verma
 
Gary Davis (Intel) Wearables: Panacea or Pandora's Box? A Security Perspective
Gary Davis (Intel) Wearables: Panacea or Pandora's Box? A Security Perspective Gary Davis (Intel) Wearables: Panacea or Pandora's Box? A Security Perspective
Gary Davis (Intel) Wearables: Panacea or Pandora's Box? A Security Perspective AugmentedWorldExpo
 
Cs tations-pps xversion
Cs tations-pps xversionCs tations-pps xversion
Cs tations-pps xversionJitendar
 
Top 10 Things to Secure on iOS and Android to Protect Corporate Information
Top 10 Things to Secure on iOS and Android to Protect Corporate InformationTop 10 Things to Secure on iOS and Android to Protect Corporate Information
Top 10 Things to Secure on iOS and Android to Protect Corporate InformationLumension
 
Mobile security and what it means to you bb
Mobile security and what it means to you bbMobile security and what it means to you bb
Mobile security and what it means to you bbtechnosyah
 
Seven Simple Steps to Online Security
Seven Simple Steps to Online SecuritySeven Simple Steps to Online Security
Seven Simple Steps to Online SecurityConn Ó Muíneacháin
 
Developing secure mobile apps by Alexandru Catariov Endava
Developing secure mobile apps by Alexandru Catariov EndavaDeveloping secure mobile apps by Alexandru Catariov Endava
Developing secure mobile apps by Alexandru Catariov EndavaMoldova ICT Summit
 
Bitzer Mobile TiECON 2013 Pitch Indus Khaitan
Bitzer Mobile TiECON 2013 Pitch Indus KhaitanBitzer Mobile TiECON 2013 Pitch Indus Khaitan
Bitzer Mobile TiECON 2013 Pitch Indus KhaitanIndus Khaitan
 
Challenges posed by iot
Challenges posed by iotChallenges posed by iot
Challenges posed by iotmusfirahahmed
 
Trends in Mobile Device Data and Artifacts
Trends in Mobile Device Data and ArtifactsTrends in Mobile Device Data and Artifacts
Trends in Mobile Device Data and ArtifactsCellebrite
 
Hack the World: IT/IOT/ICS SCADA OSINT
Hack the World: IT/IOT/ICS SCADA OSINT Hack the World: IT/IOT/ICS SCADA OSINT
Hack the World: IT/IOT/ICS SCADA OSINT DefCamp
 

Tendances (20)

Primend praktiline konverents - Samsung Cloud. Management. Security
Primend praktiline konverents - Samsung Cloud. Management. SecurityPrimend praktiline konverents - Samsung Cloud. Management. Security
Primend praktiline konverents - Samsung Cloud. Management. Security
 
Computing on the Move - Mobile Security
Computing on the Move - Mobile SecurityComputing on the Move - Mobile Security
Computing on the Move - Mobile Security
 
Datashur Presentation pin flash drive - Kingfin
Datashur Presentation pin flash drive - KingfinDatashur Presentation pin flash drive - Kingfin
Datashur Presentation pin flash drive - Kingfin
 
Achieving Secure BYOD in Government Agencies
Achieving Secure BYOD in Government AgenciesAchieving Secure BYOD in Government Agencies
Achieving Secure BYOD in Government Agencies
 
Privacy and technology
Privacy and technologyPrivacy and technology
Privacy and technology
 
Profile securitarian
Profile   securitarianProfile   securitarian
Profile securitarian
 
Gary Davis (Intel) Wearables: Panacea or Pandora's Box? A Security Perspective
Gary Davis (Intel) Wearables: Panacea or Pandora's Box? A Security Perspective Gary Davis (Intel) Wearables: Panacea or Pandora's Box? A Security Perspective
Gary Davis (Intel) Wearables: Panacea or Pandora's Box? A Security Perspective
 
Cs tations-pps xversion
Cs tations-pps xversionCs tations-pps xversion
Cs tations-pps xversion
 
Top 10 Things to Secure on iOS and Android to Protect Corporate Information
Top 10 Things to Secure on iOS and Android to Protect Corporate InformationTop 10 Things to Secure on iOS and Android to Protect Corporate Information
Top 10 Things to Secure on iOS and Android to Protect Corporate Information
 
Mobile security and what it means to you bb
Mobile security and what it means to you bbMobile security and what it means to you bb
Mobile security and what it means to you bb
 
Seven Simple Steps to Online Security
Seven Simple Steps to Online SecuritySeven Simple Steps to Online Security
Seven Simple Steps to Online Security
 
Developing secure mobile apps by Alexandru Catariov Endava
Developing secure mobile apps by Alexandru Catariov EndavaDeveloping secure mobile apps by Alexandru Catariov Endava
Developing secure mobile apps by Alexandru Catariov Endava
 
Bitzer Mobile TiECON 2013 Pitch Indus Khaitan
Bitzer Mobile TiECON 2013 Pitch Indus KhaitanBitzer Mobile TiECON 2013 Pitch Indus Khaitan
Bitzer Mobile TiECON 2013 Pitch Indus Khaitan
 
Ubiquitous computing
Ubiquitous computingUbiquitous computing
Ubiquitous computing
 
Challenges posed by iot
Challenges posed by iotChallenges posed by iot
Challenges posed by iot
 
Security Issues in Internet of Things
Security Issues in Internet of ThingsSecurity Issues in Internet of Things
Security Issues in Internet of Things
 
Mobile Security
Mobile SecurityMobile Security
Mobile Security
 
Trends in Mobile Device Data and Artifacts
Trends in Mobile Device Data and ArtifactsTrends in Mobile Device Data and Artifacts
Trends in Mobile Device Data and Artifacts
 
Adam w. mosher - geo tagging - atlseccon2011
Adam w. mosher - geo tagging - atlseccon2011Adam w. mosher - geo tagging - atlseccon2011
Adam w. mosher - geo tagging - atlseccon2011
 
Hack the World: IT/IOT/ICS SCADA OSINT
Hack the World: IT/IOT/ICS SCADA OSINT Hack the World: IT/IOT/ICS SCADA OSINT
Hack the World: IT/IOT/ICS SCADA OSINT
 

En vedette

мбоу ооп ооо
мбоу ооп  ооомбоу ооп  ооо
мбоу ооп оооolegkorobko
 
Beykoz belediyesi sunum
Beykoz belediyesi sunumBeykoz belediyesi sunum
Beykoz belediyesi sunumCuneyt Budak
 
DM_CLUB_MEMBER
DM_CLUB_MEMBERDM_CLUB_MEMBER
DM_CLUB_MEMBERParag Shah
 
You n me debby puspita sari
You n me debby puspita sariYou n me debby puspita sari
You n me debby puspita saridebbypuspitasari
 
Project 2_Design Process_Research Analysis.pdf
Project 2_Design Process_Research  Analysis.pdfProject 2_Design Process_Research  Analysis.pdf
Project 2_Design Process_Research Analysis.pdfFoo Zhi Fung
 
л. н. толстой
л. н. толстойл. н. толстой
л. н. толстойolegkorobko
 
екологічний урок маденов1
екологічний урок маденов1екологічний урок маденов1
екологічний урок маденов1Gymnasiya10
 
Xoxo ir presentation may 7 2015
Xoxo ir presentation may 7 2015Xoxo ir presentation may 7 2015
Xoxo ir presentation may 7 2015XOGroup
 
Вивчення шляхів реалізації самоосвітньої компетенції вчителів
Вивчення шляхів реалізації самоосвітньої компетенції вчителівВивчення шляхів реалізації самоосвітньої компетенції вчителів
Вивчення шляхів реалізації самоосвітньої компетенції вчителівnata-galuch
 
Vuoden urheilija 1947 2013
Vuoden urheilija 1947 2013Vuoden urheilija 1947 2013
Vuoden urheilija 1947 2013Kalle Virtapohja
 
MAXIMO 6.2 BASICS OVERVIEW
MAXIMO 6.2 BASICS OVERVIEWMAXIMO 6.2 BASICS OVERVIEW
MAXIMO 6.2 BASICS OVERVIEWRAKESH SINGH
 
convoy-leader-training-handbook_8aug03
convoy-leader-training-handbook_8aug03convoy-leader-training-handbook_8aug03
convoy-leader-training-handbook_8aug03Kevin Parrish
 
The Shocking True Cost Of A Bad Hire
The Shocking True Cost Of A Bad HireThe Shocking True Cost Of A Bad Hire
The Shocking True Cost Of A Bad HireExecutives Online
 
оноре де бальзак
оноре де бальзаконоре де бальзак
оноре де бальзакolegkorobko
 
З досвіду роботи Галич Н.В.
З досвіду роботи Галич Н.В.З досвіду роботи Галич Н.В.
З досвіду роботи Галич Н.В.nata-galuch
 
XOXO IR Presentation Q3 2014
XOXO IR Presentation Q3 2014XOXO IR Presentation Q3 2014
XOXO IR Presentation Q3 2014XOGroup
 
Nodokļu atlaides ziedotājiem
Nodokļu atlaides ziedotājiemNodokļu atlaides ziedotājiem
Nodokļu atlaides ziedotājiemZane Ruģēna
 

En vedette (20)

мбоу ооп ооо
мбоу ооп  ооомбоу ооп  ооо
мбоу ооп ооо
 
Beykoz belediyesi sunum
Beykoz belediyesi sunumBeykoz belediyesi sunum
Beykoz belediyesi sunum
 
DM_CLUB_MEMBER
DM_CLUB_MEMBERDM_CLUB_MEMBER
DM_CLUB_MEMBER
 
You n me debby puspita sari
You n me debby puspita sariYou n me debby puspita sari
You n me debby puspita sari
 
Project 2_Design Process_Research Analysis.pdf
Project 2_Design Process_Research  Analysis.pdfProject 2_Design Process_Research  Analysis.pdf
Project 2_Design Process_Research Analysis.pdf
 
50 erros de português
50 erros de português50 erros de português
50 erros de português
 
л. н. толстой
л. н. толстойл. н. толстой
л. н. толстой
 
екологічний урок маденов1
екологічний урок маденов1екологічний урок маденов1
екологічний урок маденов1
 
Xoxo ir presentation may 7 2015
Xoxo ir presentation may 7 2015Xoxo ir presentation may 7 2015
Xoxo ir presentation may 7 2015
 
Вивчення шляхів реалізації самоосвітньої компетенції вчителів
Вивчення шляхів реалізації самоосвітньої компетенції вчителівВивчення шляхів реалізації самоосвітньої компетенції вчителів
Вивчення шляхів реалізації самоосвітньої компетенції вчителів
 
Vuoden urheilija 1947 2013
Vuoden urheilija 1947 2013Vuoden urheilija 1947 2013
Vuoden urheilija 1947 2013
 
Comm tech final project
Comm tech final projectComm tech final project
Comm tech final project
 
MAXIMO 6.2 BASICS OVERVIEW
MAXIMO 6.2 BASICS OVERVIEWMAXIMO 6.2 BASICS OVERVIEW
MAXIMO 6.2 BASICS OVERVIEW
 
convoy-leader-training-handbook_8aug03
convoy-leader-training-handbook_8aug03convoy-leader-training-handbook_8aug03
convoy-leader-training-handbook_8aug03
 
The Shocking True Cost Of A Bad Hire
The Shocking True Cost Of A Bad HireThe Shocking True Cost Of A Bad Hire
The Shocking True Cost Of A Bad Hire
 
оноре де бальзак
оноре де бальзаконоре де бальзак
оноре де бальзак
 
ქანდაკება
ქანდაკებაქანდაკება
ქანდაკება
 
З досвіду роботи Галич Н.В.
З досвіду роботи Галич Н.В.З досвіду роботи Галич Н.В.
З досвіду роботи Галич Н.В.
 
XOXO IR Presentation Q3 2014
XOXO IR Presentation Q3 2014XOXO IR Presentation Q3 2014
XOXO IR Presentation Q3 2014
 
Nodokļu atlaides ziedotājiem
Nodokļu atlaides ziedotājiemNodokļu atlaides ziedotājiem
Nodokļu atlaides ziedotājiem
 

Similaire à Introducing Security Guardian from ExactTrak

SE-4060, Securing the Mobile World, by Norman Shaw and John Pragnell
SE-4060, Securing the Mobile World, by Norman Shaw and John PragnellSE-4060, Securing the Mobile World, by Norman Shaw and John Pragnell
SE-4060, Securing the Mobile World, by Norman Shaw and John PragnellAMD Developer Central
 
Smartphone security
Smartphone securitySmartphone security
Smartphone securityMike Brannon
 
Mobile Solutions and Privacy – Not One at the Expense of the Other
 Mobile Solutions and Privacy – Not One at the Expense of the Other Mobile Solutions and Privacy – Not One at the Expense of the Other
Mobile Solutions and Privacy – Not One at the Expense of the Otherbradley_g
 
ISC(2) Security Briefing Part 3 - Enabling Secure BYOD with CASBs
ISC(2) Security Briefing Part 3 - Enabling Secure BYOD with CASBsISC(2) Security Briefing Part 3 - Enabling Secure BYOD with CASBs
ISC(2) Security Briefing Part 3 - Enabling Secure BYOD with CASBsBitglass
 
Mobile security blunders and what you can do about them
Mobile security blunders and what you can do about themMobile security blunders and what you can do about them
Mobile security blunders and what you can do about themBen Rothke
 
6 essentials for secure BYOD in healthcare
6 essentials for secure BYOD in healthcare6 essentials for secure BYOD in healthcare
6 essentials for secure BYOD in healthcareBitglass
 
Pete Wassell (Augmate Corportation) Security in the Enterprise Smart Glasses
Pete Wassell (Augmate Corportation) Security in the Enterprise Smart GlassesPete Wassell (Augmate Corportation) Security in the Enterprise Smart Glasses
Pete Wassell (Augmate Corportation) Security in the Enterprise Smart GlassesAugmentedWorldExpo
 
Aisha visram presentacion bmobilew 2015 rev 2
Aisha visram presentacion bmobilew 2015 rev 2Aisha visram presentacion bmobilew 2015 rev 2
Aisha visram presentacion bmobilew 2015 rev 2Aisha Visram
 
Privacy and Security in the Internet of Things
Privacy and Security in the Internet of ThingsPrivacy and Security in the Internet of Things
Privacy and Security in the Internet of ThingsJeff Katz
 
Internet of Things Security
Internet of Things SecurityInternet of Things Security
Internet of Things SecurityThom. Poole
 
How to Manage the Great BlackBerry Migration
How to Manage the Great BlackBerry MigrationHow to Manage the Great BlackBerry Migration
How to Manage the Great BlackBerry MigrationTroy C. Fulton
 
Session810 ken huang
Session810 ken huangSession810 ken huang
Session810 ken huangKen Huang
 
How to Secure Your iOs Device and Keep Client Data Safe
How to Secure Your iOs Device and Keep Client Data SafeHow to Secure Your iOs Device and Keep Client Data Safe
How to Secure Your iOs Device and Keep Client Data SafeRocket Matter, LLC
 
Spikes Security Isla Isolation
Spikes Security Isla IsolationSpikes Security Isla Isolation
Spikes Security Isla IsolationCybryx
 
Empowering Students with Mobility and BYOD Technology
Empowering Students with Mobility and BYOD TechnologyEmpowering Students with Mobility and BYOD Technology
Empowering Students with Mobility and BYOD TechnologyBettShow
 
Preparing for Mobile Device Management & Bring your Own Device
Preparing for Mobile Device Management & Bring your Own DevicePreparing for Mobile Device Management & Bring your Own Device
Preparing for Mobile Device Management & Bring your Own DeviceWaterstons Ltd
 
ch07-Security.pptx
ch07-Security.pptxch07-Security.pptx
ch07-Security.pptxLuckySaigon1
 
2016 Public Safety Vision Strategy Direction - Avaya
2016 Public Safety Vision Strategy Direction - Avaya2016 Public Safety Vision Strategy Direction - Avaya
2016 Public Safety Vision Strategy Direction - AvayaMark Fletcher, ENP
 

Similaire à Introducing Security Guardian from ExactTrak (20)

SE-4060, Securing the Mobile World, by Norman Shaw and John Pragnell
SE-4060, Securing the Mobile World, by Norman Shaw and John PragnellSE-4060, Securing the Mobile World, by Norman Shaw and John Pragnell
SE-4060, Securing the Mobile World, by Norman Shaw and John Pragnell
 
OWASP Mobile TOP 10 2014
OWASP Mobile TOP 10 2014OWASP Mobile TOP 10 2014
OWASP Mobile TOP 10 2014
 
Smartphone security
Smartphone securitySmartphone security
Smartphone security
 
Mobile Solutions and Privacy – Not One at the Expense of the Other
 Mobile Solutions and Privacy – Not One at the Expense of the Other Mobile Solutions and Privacy – Not One at the Expense of the Other
Mobile Solutions and Privacy – Not One at the Expense of the Other
 
3 steps security
3 steps security3 steps security
3 steps security
 
ISC(2) Security Briefing Part 3 - Enabling Secure BYOD with CASBs
ISC(2) Security Briefing Part 3 - Enabling Secure BYOD with CASBsISC(2) Security Briefing Part 3 - Enabling Secure BYOD with CASBs
ISC(2) Security Briefing Part 3 - Enabling Secure BYOD with CASBs
 
Mobile security blunders and what you can do about them
Mobile security blunders and what you can do about themMobile security blunders and what you can do about them
Mobile security blunders and what you can do about them
 
6 essentials for secure BYOD in healthcare
6 essentials for secure BYOD in healthcare6 essentials for secure BYOD in healthcare
6 essentials for secure BYOD in healthcare
 
Pete Wassell (Augmate Corportation) Security in the Enterprise Smart Glasses
Pete Wassell (Augmate Corportation) Security in the Enterprise Smart GlassesPete Wassell (Augmate Corportation) Security in the Enterprise Smart Glasses
Pete Wassell (Augmate Corportation) Security in the Enterprise Smart Glasses
 
Aisha visram presentacion bmobilew 2015 rev 2
Aisha visram presentacion bmobilew 2015 rev 2Aisha visram presentacion bmobilew 2015 rev 2
Aisha visram presentacion bmobilew 2015 rev 2
 
Privacy and Security in the Internet of Things
Privacy and Security in the Internet of ThingsPrivacy and Security in the Internet of Things
Privacy and Security in the Internet of Things
 
Internet of Things Security
Internet of Things SecurityInternet of Things Security
Internet of Things Security
 
How to Manage the Great BlackBerry Migration
How to Manage the Great BlackBerry MigrationHow to Manage the Great BlackBerry Migration
How to Manage the Great BlackBerry Migration
 
Session810 ken huang
Session810 ken huangSession810 ken huang
Session810 ken huang
 
How to Secure Your iOs Device and Keep Client Data Safe
How to Secure Your iOs Device and Keep Client Data SafeHow to Secure Your iOs Device and Keep Client Data Safe
How to Secure Your iOs Device and Keep Client Data Safe
 
Spikes Security Isla Isolation
Spikes Security Isla IsolationSpikes Security Isla Isolation
Spikes Security Isla Isolation
 
Empowering Students with Mobility and BYOD Technology
Empowering Students with Mobility and BYOD TechnologyEmpowering Students with Mobility and BYOD Technology
Empowering Students with Mobility and BYOD Technology
 
Preparing for Mobile Device Management & Bring your Own Device
Preparing for Mobile Device Management & Bring your Own DevicePreparing for Mobile Device Management & Bring your Own Device
Preparing for Mobile Device Management & Bring your Own Device
 
ch07-Security.pptx
ch07-Security.pptxch07-Security.pptx
ch07-Security.pptx
 
2016 Public Safety Vision Strategy Direction - Avaya
2016 Public Safety Vision Strategy Direction - Avaya2016 Public Safety Vision Strategy Direction - Avaya
2016 Public Safety Vision Strategy Direction - Avaya
 

Dernier

How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 

Dernier (20)

How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 

Introducing Security Guardian from ExactTrak

  • 2. • ‘Enterprise Level’ USB solutions • All very good but all very similar solutions • Most are encrypted • Some have central management capability • BUT…What Happens When the Device is Lost or Stolen? • All these solutions rely on being plugged into a 3rd party internet connect PC/Laptop to be managed • If the device is not plugged in it… • Can not be traced • Can not be managed • No verifiable audit trail INTRODUCTION - USB Technology in use Today 3
  • 3. • 561 Million USB Flash Drives will be sold between 2014 and 2018 • Forrsights Survey 2014 • More than 30% have lost a USB drive containing confidential information • 77% have lost a laptop, tablet or mobile with sensitive data • 63% of IT managers lack visibility of mobile data within their organisation • 84% use personal emails to send sensitive information • 50% use public cloud services to send sensitive files • Wall Street Journal Aug 2014 5000 interviews INTRODUCTION - Don’t Forget the Insider Threat! 4
  • 4. People Lose Stuff! More than 30% have lost a USB drive containing confidential information 77% have lost a laptop, tablet or mobile with sensitive data * Wall Street Journal Aug 2014 5000 interviews 5
  • 5. THE DETAILS - Human Error! 6
  • 6. THE DETAILS - Human Error! 7
  • 7. THE DETAILS - Human Error! 8
  • 8. • Encryption • Many end users turn off encryption on their device due to it slowing down operation • Data Stored in Cloud • Many users will download a piece of sensitive information from the Cloud but then store it locally to save time when it is needed again • Responsibility for security management should to be taken away from the End User THE DETAILS - People Just Want to Get On With Life! 9
  • 9. Proposed EU Data Protection 2016 10
  • 10. Have to be able to prove: Network security procedures Device encryption THE DETAILS - Proposed EU Data Protection 2016 11
  • 11. Remote delete requests Recovered % deleted • iOS 317 43% • Android 193 57% • Blackberry 170 61% THE DETAILS - Deleting/Overwriting Data 12
  • 12. • Mobile Data Tracking & Management Specialist • Manufactures of Security Guardian SOLUTIONS - What is Security Guardian? 13
  • 13. 15
  • 14. • Cloud based or On-Premise Management & user interface • Location via GPS, GSM & RFID • Geofencing • Time controlled access • Over The Air configuration • Remote turn On and Off • Remote data destruct • Verifiable audit trail and reporting SOLUTIONS - Management console 16
  • 15. Thank you Simon Cuthbert, Director – ExactTrak Ltd Simon.cuthbert@exactTrak.com LinkedIn: Simon Cuthbert +44 (0) 7710 253340 Twitter: @exactTrak

Notes de l'éditeur

  1. The proposed EU Data Protection revisions for 2016 state that ‘Encryption alone is not enough’. Meaning that there needs to be greater control of mobile data in transit and a means of greater management should data be potentially lost or stolen with a full verifiable audit trail.
  2. Figures come from a global financial services company and cover two years. These figures only relate to product that were subsequently found / recovered. In essence there is only a 50% chance that remote data is detected with current technology. It has to get better.