data leak prevention and compliance for the Financial Services industry

Similar documents
data leak prevention and compliance for the Healthcare and Medical Services industries

Enterprise Simply Trustworthy?

Enterprise Mobility Management

SECURITY THAT FOLLOWS YOUR FILES ANYWHERE

BULLETPROOF365 SECURING YOUR IT. Bulletproof365.com

BULLETPROOF365 SECURING YOUR IT. Bulletproof365.com

The Mobile Risk Management Company. Overview of Fixmo and Mobile Risk Management (MRM) Solutions

Sarbanes-Oxley Act (SOX)

Multi-Platform Enterprise Mobility Management. Perfectly balancing end-user and corporate needs

SARBANES-OXLEY (SOX) ACT

Secure Messaging is far more than traditional encryption.

Oracle Database Vault

Compliance in 5 Steps

Complete document security

Cisco Start. IT solutions designed to propel your business

Make security part of your client systems refresh

MaaS360 Secure Productivity Suite

Cybersecurity Conference Presentation North Bay Business Journal. September 27, 2016

Keep the Door Open for Users and Closed to Hackers

white paper SMS Authentication: 10 Things to Know Before You Buy

White Paper. Enabling Mobile Users and Staying Compliant. How Healthcare Organizations Manage Both

Datasheet. Only Workspaces delivers the features users want and the control that IT needs.

White Paper. How to Write an MSSP RFP

Evolved Backup and Recovery for the Enterprise

Securing Your Most Sensitive Data

CipherCloud CASB+ Connector for ServiceNow

The Device Has Left the Building

hidglobal.com HID ActivOne USER FRIENDLY STRONG AUTHENTICATION

Cognizant Cloud Security Solution

GLBA. The Gramm-Leach-Bliley Act

Bringing cyber to the Board of Directors & C-level and keeping it there. Dirk Lybaert, Proximus September 9 th 2016

Microsoft Office 365 TM & Zix Encryption

Modern Database Architectures Demand Modern Data Security Measures

DIGITAL TRUST AT THE CORE

Disk Encryption Buyers Guide

Single Sign-On. Introduction

PKI is Alive and Well: The Symantec Managed PKI Service

BUILDING SECURITY INTO YOUR DATA CENTER MODERNIZATION STRATEGY

Cipherpost Pro is far more than traditional encryption.

Dissecting NIST Digital Identity Guidelines

Mobile Data Security Essentials for Your Changing, Growing Workforce

Microsoft 365 Security & Compliance For Small- and Mid-Sized Businesses

Governance, Risk, and Compliance: A Practical Guide to Points of Entry

Cirius Secure Messaging Single Sign-On

Ο ρόλος της τεχνολογίας στο ταξίδι της συμμόρφωσης με τον Γενικό Κανονισμό. Αντιγόνη Παπανικολάου & Νίκος Αναστόπουλος

SOLUTION BRIEF RSA SECURID SUITE ACCELERATE BUSINESS WHILE MANAGING IDENTITY RISK

The Dropbox Problem: It s Worse than You Think

PROFESSIONAL SERVICES (Solution Brief)

CCISO Blueprint v1. EC-Council

Sales Training for DataMotion Products. March, 2014

AUTOMATE THE DEPLOYMENT OF SECURE DEVELOPER VPCs

Secure Messaging Buyer s Guide

SIMPLIFY MULTI-PLATFORM ENTERPRISE MOBILITY MANAGEMENT

Run the business. Not the risks.

Oracle bakes security into its DNA

Advanced encryption and message control to complement and enhance your security investment in ZixDLP.

A Practical Step-by-Step Guide to Managing Cloud Access in your Organization

Single Sign-On. Introduction. Feature Sheet

Auditing Bring Your Own Devices (BYOD) Risks. Shannon Buckley

Data Loss Prevention Whitepaper. When Mobile Device Management Isn t Enough. Your Device Here. Good supports hundreds of devices.

High Availability For Private Clouds

JUNIPER NETWORKS PRODUCT BULLETIN

BIG DATA INDUSTRY PAPER

The Pervasive Encryption Imperative. IBM Competitive Project Office Mark Moore Senior Software Engineer

Identity Management as a Service

USE CASE FINANCIAL SERVICES

Implementing Your BYOD Mobility Strategy An IT Checklist and Guide

Optimizing Pulse Secure Access Suite with Pulse Secure Virtual Application Delivery Controller solution

Overview. Business value

Keys to a more secure data environment

Have breaches declined since the massive Heartland Payments leak in 2008? What proportion of breaches are the result of hacking?

SIEMLESS THREAT DETECTION FOR AWS

Five Reasons It s Time For Secure Single Sign-On

Service. Sentry Cyber Security Gain protection against sophisticated and persistent security threats through our layered cyber defense solution

Bring Your Own Device. Peter Silva Technical Marketing Manager

Putting security first for critical online brand assets. cscdigitalbrand.services

74% 2014 SIEM Efficiency Report. Hunting out IT changes with SIEM

HIPAA Regulatory Compliance

Enhancing Security With SQL Server How to balance the risks and rewards of using big data

efax Corporate for Independent Agent Offices

DATA SHEET RISK & CYBERSECURITY PRACTICE EMPOWERING CUSTOMERS TO TAKE COMMAND OF THEIR EVOLVING RISK & CYBERSECURITY POSTURE

SOC 3 for Security and Availability

PAYMENT CARD INDUSTRY DATA SECURITY STANDARD (PCI DSS)

Business White Paper IDENTITY AND SECURITY. Access Manager. Novell. Comprehensive Access Management for the Enterprise

Secure your. printing and imaging. fleet. HP JetAdvantage Security Manager helps protect your

What can the OnBase Cloud do for you? lbmctech.com

Virtual Machine Encryption Security & Compliance in the Cloud

Securing Office 365 with MobileIron

What is Penetration Testing?

Managing Privacy Risk & Compliance in Financial Services. Brett Hamilton Advisory Solutions Consultant ServiceNow

A HOLISTIC APPROACH TO IDENTITY AND AUTHENTICATION. Establish Create Use Manage

hidglobal.com Still Going Strong SECURITY TOKENS FROM HID GLOBAL

Mobilize your corporate content and apps

THALES DATA THREAT REPORT

Securing Mainframe File Transfers and TN3270

PROTECTION FOR WORKSTATIONS, SERVERS, AND TERMINAL DEVICES ENDPOINT SECURITY NETWORK SECURITY I ENDPOINT SECURITY I DATA SECURITY

Secure Data Acquisition, Communication, and Processing for Your IoT Solutions

FOR FINANCIAL SERVICES ORGANIZATIONS

RHM Presentation. Maas 360 Mobile device management

COMPTIA CLO-001 EXAM QUESTIONS & ANSWERS

Transcription:

ecrypt ne data leak prevention and compliance for the Financial Services industry ecrypt one data leak prevention and compliance for the Financial Services industry 1 ecryptinc.com/ecrypt-one sales@ecryptinc.com 1.866.204.6703

With Ecrypt One financial services providers are able to remain competitive while maintaining security and compliance by default. table of contents. email is the centerpiece. 3 the most effective trade in the market. 4 the name is one. ecrypt one. 5 ecrypt one editions. 7 our service. 8 what s next? 9 ecrypt one data leak prevention and compliance for the Financial Services industry 2

email is the centerpiece of the enterprise information system Email is the centerpiece of an organization s information system. Almost every role in a modern financial organization relies fully on their email system, with its messaging, calendaring and file sharing. For most organizations, their work revolves around the information flow of their email system. They have full trust, and reliance on the services provided by the email system. The same email systems that let information flow so freely can also be detrimental and allow undesirable information to flow just as freely. Social engineering is the easiest way to get a virus behind the firewall just send someone an enticing email with a viral payload. As a result, sensitive information can flow outside with the same ease as well. Numerous add-on and afterthought products exist that attempt to solve the issues that email brings to organizations. Some are effective while some are easily thwarted. The result is a hodgepodge of bolted together parts that leave the IT administrator hoping it might be good enough. The design of Enterprise email systems needs to be revisited. It needs Newthink on the information flow, one that incorporates information security and privacy as core requirements. It needs to be a system that is simple and trustworthy. ecrypt one data leak prevention and compliance for the Financial Services industry 3

the most effective trade in the market. Modern financial institutions are facing a dilemma. One side of the coin sees clients demanding the convenience of more virtual access, however, that s a huge threat to security. The other side of the coin shows security regulators are tightening the belt. Conventional security s ineffective patchwork of add-on solutions show that the total cost of ownership seems to hit the bottom line harder than the threats they are supposed to defend against. These same current systems contribute to the difficulty in maintaining compliance, which impedes business development. "This is really a slap in the face of the American financial services system. Honestly, this is a crisis point." Gartner security analyst Avivah Litan about JPMorgan Chase hack The effects of a breach can be devastating. Not only is an organization harmed financially, reputation and trust are also compromised in an industry where these are valued with such importance. Our approach is to optimize the system, placing people at the heart of our solutions and making technology work harder. By considering each challenge as a part of a complete business problem, we can solve the dilemma in a cost effective and efficient way, lowering the total cost of ownership and expediting a return on security investment. A recent study found that financial institutions realize the highest abnormal churn as a result of a data breach 1. Another reported that financial services companies realize the highest average losses across all industries 2. 1 Ponemon Institute s 2014 Cost of a Data Breach Study: United States (2014) 2 Deloitte Center for Financial Services Transforming cyber security New approaches for an evolving threat landscape (2014) ecrypt one data leak prevention and compliance for the Financial Services industry 4

the name is one. ecrypt one. Ecrypt One addresses the need for an information security solution that focuses on the financial industry s increasing regulatory pressures, necessity to adopt new technologies, and the importance of remaining competitive. Ecrypt One is a security-first full service email system, designed to meet the risk tolerance levels of the most demanding and security-conscious organizations. ROSI Ecrypt One s smart engineering and ease of use provide a quicker Return On Security Investment and lower total cost of ownership. Reinforcing Security Policies Ecrypt One uses technological means to prevent leaks caused by human factors such as failure to follow policies, judgment errors and criminal intent. Productivity Extremely transparent and seamless implementation and deployment, low latency, and excellent human factors interface for efficient workflow experiences. Ecrypt One optimizes operations and reduces overhead through simplicity of deployment, use and ongoing management. Allows firms to remain competitive and agile by embracing modern methods of doing business, such as virtualization and BYOD, while operating securely within a closed system. Integrates seamlessly into existing workflows, eliminating learning curves. ecrypt one data leak prevention and compliance for the Financial Services industry 5

Secure Visitor Access Point The visitor access point is a completely secure email interaction portal. It enables organizations to communicate securely with external parties, such as business associates and patients, without compromising security and privacy. Role Based Access Controls Provides agencies with absolute ability to control and limit access to the system, preventing the unauthorized access to, and distribution, of data. Compliance Ecrypt One provides a comprehensive compliance toolset including full, easy-to-manage audit and reporting capabilities. HIPAA compliant, it exceeds current regulations keeping you ahead of the curve and frequent changes. The system demonstrates compliance with acts, standards and regulations, including the Sarbanes-Oxley Act (SOX); Gramm-Leach-Bliley Act (GLB) Act; Personal Information Protection and Electronic Documents Act (PIPED Act, or PIPEDA); and the European Union Data Protection Directive. Seamless Integration Ecrypt One easily conforms and integrates into existing network enterprise equipment. The use of open standards where possible, ensures the highest levels of interoperability, availability and compatibility, with existing and future enterprise infrastructures. ecrypt one data leak prevention and compliance for the Financial Services industry 6

ecrypt one. editions. Ecrypt One Ecrypt One Ecrypt One Email MI Gov. Multiple server support with Encrypted Link Multiple server support with Variable Crypto Encrypted Link Ecrypt One Light IMAP/SMTP protocols (pull) ActiveSync protocol (push) Contacts and Calendar synchronization Web Mail and Visitor Access Portal Embeddable Web Mail and Visitor Access Portal Standard Content Filtering Custom Content Filtering Rules Engine for Information Rights Management Cryptographic Key Storage Windows Keystore Ecrypt Encrypted Keystore Hardware Encrypted Keystore compatibility Custom Keystore plug-in support Data Encryption AES data encryption AES, Blowfish and Elliptic Curve encryption Custom encryption plug-in support Authentication Two-factor authentication via SMS Two-factor authentication via email Google Authenticator integration Smartcard authentication integration Biometric authentication support Custom two-factor authentication support Security Outlook Public Key integration (PGP) Public Key security services Standards and Compliance Basic auditing and reporting Enhanced, extensible auditing and reporting FIPS compliance mode Government Cloud hosting option Security standards compliance Mobility ios, Android, Windows Phone, and BlackBerry OS compatibility Mobile Device Management system integration MDM PKI security support ecrypt one data leak prevention and compliance for the Financial Services industry 7

our service. We will work alongside your management and technical teams to ensure the solution is fine tuned to meet your unique needs and that installation is undisruptive to your operations. Once you are up and running, our support staff will be available should you need any assistance with using or managing the system. Discovery Phase This includes assembling a comprehensive understanding of an enterprises current system infrastructure. We will explore both technology and operational needs to gain a 360 understanding of the business purpose for the security deployment. We will work with you to define system requirements, outlining what will need to be added, removed or changed in the existing technical infrastructure. Customization Phase This is where the system is tailored to meet all your enterprise needs in a fully bespoke solution. This includes tasks like applying your security policies to core system rules, and branding of user facing interfaces. Implementation Phase Our engineers will work with IT on installation, integration into your existing infrastructure, and system orientation. Service specialists will work with other necessary departments on deployment, and orientation of relevant employees. Post-Sale Included in our service are unlimited access to help desk assistance, and product updates. Added Benefit Options We also offer complimentary technologies - through trusted partnerships - to optimize your system for things like data integrity assurance and user authentication. We can, of course, also integrate with your existing solutions already in place. ecrypt one data leak prevention and compliance for the Financial Services industry 8

what s next? Let s talk about your security and innovation initiatives, and how our solution might fit in. 1.866.204.6703 sales@ecryptinc.com Visit our website for more information about Ecrypt One, and the other great products in our portfolio. ecryptinc.com/ecrypt-one Share and socialize - check out our other informative content: twitter.com/ecrypt facebook.com/ecrypt linkedin.com/company/ecrypt-technologies-inc vimeo.com/ecrypt ecrypt one data leak prevention and compliance for the Financial Services industry 9

About Ecrypt Technologies Ecrypt Technologies, Inc. is a high technology security solutions portfolio provider that assists corporate entities, governments and individuals protect their organizations against both physical and cyber-attacks through its offering of the most technically-advanced, cost-effective and reliable software, tools and systems. ecryptinc.com info@ecryptinc.com 866.204.6703 Copyright 2015 Ecrypt Technologies Inc. All Rights Reserved. Ecrypt, the Ecrypt Logo, the Graph Logos, Ecrypt One, and Ecrypt One Logos are trademarks or registered trademarks of Ecrypt Technologies Inc. Other names may be trademarks of their respective owners. NO WARRANTY. Ecrypt makes this document available AS-IS, and makes no warranty as to its accuracy or use. The information contained in this document may include inaccuracies or typographical errors, and may not reflect the most current developments, and Ecrypt does not represent, warrant or guarantee that it is complete, accurate, or upto-date, nor does Ecrypt offer any certification or guarantee with respect to any opinions expressed herein or any references provided. Changing circumstances may change the accuracy of the content herein. Opinions presented in this document reflect judgment at the time of publication and are subject to change. Any use of the information contained in this document is at the risk of the user. Ecrypt assumes no responsibility for errors, omissions, or damages resulting from the use of or reliance on the information herein. Ecrypt reserves the right to make changes at any time without prior notice. No part of this publication without the express written permission of Ecrypt Technologies, ecryptinc.com/eontact ecrypt one data leak prevention and compliance for the Financial Services industry 10