Más contenido relacionado La actualidad más candente (17) Similar a Egress Switch Introduction (20) Egress Switch Introduction1. Egress Switch Overview
www.egress.com ©2008 Egress© Egress Software Technologies Ltd. All rights reserved
Software Technologies Ltd. All rights reserved. Proprietary and confidential.
2. The Need to Share Information
• Sharing information outside your organisation is common
• Some shared information is considered “sensitive”
• How does the recipient handle sensitive information?
• Is there a risk and how is it measured?
What information? Who receives it? How is it sent?
• Business Plans • Accountants • CD/DVD
• Customer Data • Auditors • Cloud Storage
• Financial Records • Board of Directors • Email attachments
• Intellectual Property • Business Partners • FTP sites
• New Product Information • Contractors • Regular mail
• Spreadsheets • Government Agencies • USB sticks
• Tax Information • Marketing Firms • Web File Transfer
• Outsourced Providers
www.egress.com ©2008 Egress© Egress Software Technologies Ltd. All rights reserved
Software Technologies Ltd. All rights reserved. Proprietary and confidential.
2
3. Typical Challenges Sharing Information
• Solutions are often difficult to use:
– Difficult to create and share secure information (Sender)
– Difficult to receive secure information (Recipient)
• Solutions often don’t provide the level of visibility that today’s audit
requirements demand
• Solutions often don’t provide the control that we need (embargo or
revoke data)
www.egress.com ©2008 Egress© Egress Software Technologies Ltd. All rights reserved 3
Software Technologies Ltd. All rights reserved. Proprietary and confidential.
4. 3rd Party Data Breach Trend
The disk, which was mislaid by the courier firm,
contained personal details on about 2,000 staff
British Council staff data lost
January 2009
One year on from the HMRC data breach incident, the government has
revealed that it has suffered an average of one data breach per week
since then
HMRC data loss recalled one year on
November 2008
36% of data breaches reported are from 3rd party incidents
2009 Annual Study: UK Cost of a Data Breach
February 2011
www.egress.com ©2008 Egress© Egress Software Technologies Ltd. All rights reserved
Software Technologies Ltd. All rights reserved. Proprietary and confidential. 4
5. Information Commissioners Office
April 2010 - ICO gained power to fine organisations up to £500K
for a data breach
"Any organisation which processes personal information must ensure that adequate
safeguards are in place to keep that information secure."
From April 2010, the ICO will carry out audits to investigate organisations which it believes are
failing to properly protect private data.
www.egress.com ©2008 Egress© Egress Software Technologies Ltd. All rights reserved
Software Technologies Ltd. All rights reserved. Proprietary and confidential. 5
6. What is Egress Switch?
• Protection that stays with your information, no matter where it goes
• An enabler to safely share any type of data with anyone
• Simple to deploy and manage
• Easy for end user to operate
• Easy to obtain and cost effective to use with a SaaS business model
• Innovative new data security product from a strong and growing company
www.egress.com ©2008 Egress© Egress Software Technologies Ltd. All rights reserved 6
Software Technologies Ltd. All rights reserved. Proprietary and confidential.
7. Why Egress Switch?
Benefits Differentiators
• Retain control of information at all times • Supports single user to Enterprise business
Exceeds limitations of current generation file • No complex infrastructure or trust
encryption relationships required
• Full audit trail of who, when, where • Supports impromptu sending of secure files
information is accessed • Works with any media type or exchange
Satisfies emerging audit requirements method
• Real-time control (change or revoke access)
• Simple end user experience
and audit collection
Designed around sharing workflow, hides • AES 256-bit encryption with FIPS 140-2
security steps certified libraries
• Cost effective SaaS model • CCTM certified for UK Government
No infrastructure required, start with users • Cross platform unified solution
who share sensitive info
• Highly Scalable
Integrates with existing business processes and
www.egress.com ©2008 Egress© Egress Software Technologies Ltd. All rights reserved 7
Software Technologies Ltd. All rights reserved. Proprietary and confidential.
8. Solution Overview
Create Secure 1
Package
• Drag & Drop interface
Set Access and 2
• Any file, any media
• Send to recipient
Security Parameters
• Select recipient(s)
Recipient 3
• Real-time changes Gains Access
• Cloud-based policy store • Receives package and
authenticates
• Local enforcement
All delivered in a Software as a Service (SaaS) model
www.egress.com ©2008 Egress© Egress Software Technologies Ltd. All rights reserved 8
Software Technologies Ltd. All rights reserved. Proprietary and confidential.
9. Next Generation Collaboration Software
Information Owner
– Creates secure package
– Sets access and security parameters
– Sends secure package
– Tracks activity of secure package
Information Recipient
– Opens packages they are authorised to view
– Requests access for other packages
Switch Server
– Holds all security settings,
can be changed at any time
– Keeps complete audit trail
of successful and failed access
– Does not store any secure packages
www.egress.com ©2008 Egress© Egress Software Technologies Ltd. All rights reserved 9
Software Technologies Ltd. All rights reserved. Proprietary and confidential.
10. Secure Email
• Transparently encrypt email message body including
attachments
• Transparently encrypt email attachments
• MS Outlook 2003/2007/2010 Add-in for seamless integration
• Supports policy notes and disclaimers
• Policy controls can enforce encryption based on content,
recipient, and type of information
• Size restrictions can offer other transport mechanisms
• Zero footprint web access client for remote workers and
shared machine access
www.egress.com ©2008 Egress© Egress Software Technologies Ltd. All rights reserved 10
Software Technologies Ltd. All rights reserved. Proprietary and confidential.
11. Internet Server & Cloud Storage
• Integration with FTP(s), HTTP(s) and cloud storage
• Egress hosted cloud storage available as part of subscription
• Transparent integration with collaboration tools like MS
SharePoint
• Built in FTP(s),HTTP(s) client and upload manager
• Integrates with 3rd party storage providers
• Data files are encrypted and compressed to streamline
workflow
www.egress.com ©2008 Egress© Egress Software Technologies Ltd. All rights reserved 11
Software Technologies Ltd. All rights reserved. Proprietary and confidential.
12. Physical Media
• Transparently encrypt data stored on removable media
• Integrated CD/DVD/Blue-ray burning application
• Real-time access control of physical media (CD/DVD, USB etc)
• Integration with Endpoint security products
www.egress.com ©2008 Egress© Egress Software Technologies Ltd. All rights reserved 12
Software Technologies Ltd. All rights reserved. Proprietary and confidential.
13. Mobile Support
• Access secure email from any mobile device (iphone, Android,
Win Mobile 7, Blackberry etc) via optimised web client
• Manage package security and access requests on the move
• App for streamlined package access on Blackberry devices
www.egress.com ©2008 Egress© Egress Software Technologies Ltd. All rights reserved 13
Software Technologies Ltd. All rights reserved. Proprietary and confidential.
14. Auditing & Alerts
• Detailed auditing & alerts of data lifecycle and user actions
• Client & web based Package Library enables real-time
management of all secured information
• Secure delivery reports
• Geographic tracking of information in real-time
• Role based audit access
www.egress.com ©2008 Egress© Egress Software Technologies Ltd. All rights reserved 14
Software Technologies Ltd. All rights reserved. Proprietary and confidential.
15. Policy Engine
• Centrally administered user policies
• Configure advisory and enforced usage policies
• Policies can be configured based on:
- Data type, content & location
- Recipient
- Size of data
- Media type
- Encryption algorithm and compression
• Fully configurable user UI and end user experience
www.egress.com ©2008 Egress© Egress Software Technologies Ltd. All rights reserved 15
Software Technologies Ltd. All rights reserved. Proprietary and confidential.
16. Recipient Experience
• Simple ‘one-time’ sign up process
• Free of charge for recipients and sending data back to paying
subscribers
• Simple click-once application streamlines recipient experience
• Transparent access to data received by any transport mechanism
• Zero footprint web based client
www.egress.com ©2008 Egress© Egress Software Technologies Ltd. All rights reserved 16
Software Technologies Ltd. All rights reserved. Proprietary and confidential.
17. Switch Fusion
• Automate the sending of encrypted email for mass mail processes
• Batch process the sending of sensitive information (e.g Bank
Statements, transaction records etc direct from a 3rd party DB)
• Scheduled backup of sensitive information
• Automatically upload files to secure FTP/Cloud storage servers
• Integrate with complex back end systems
www.egress.com ©2008 Egress© Egress Software Technologies Ltd. All rights reserved 17
Software Technologies Ltd. All rights reserved. Proprietary and confidential.
18. Egress Switch Features Summary
• Transparently encrypt email attachments
• Encrypt information onto CD/DVD and USB removable media
• Upload information securely to the internet (HTTP(s), FTP(s), MS
Sharepoint etc)
• Control who can access the information you send
• Immediately revoke access to data/files even after they have been sent
• View a full audit of who, where & when information has been accessed
www.egress.com ©2008 Egress© Egress Software Technologies Ltd. All rights reserved 18
Software Technologies Ltd. All rights reserved. Proprietary and confidential.
Notas del editor Having over 20 years experience in delivering data security products, the Egress team set about developing a solution to one of the toughest challenges business face today – exchanging information securely. Sharing sensitive or confidential information is very common in most organisations, being sent both internally and externally with clients, suppliers and other 3rd parties What is classed as confidential data is dependant on each organisation, however there seems to be a number of areas that usually come to mind, such as finance & accounts depts dealing with payroll and tax information, HR dealing with staff details, issues and wages, Legal areas who work with a number of contracts, mergers & acquisitions....... The list goes onThe most common way of sending information is probably via e-mail (inc attachments), although, as some files are too large to go out via e-mail, large file transfer systems or protocols are sometimes used. ll organisations that deal with this type of data are regulated by the ICO. The ICO are there to enforce that organisations comply with the DPA and have adequate security measures in place to secure this type of data (both at rest and in transit). If a data breach occurs and these measures have not been taken, the ICO then have the power to fine firms up to £½ Million. Egress Switch is a new generation of data security software that makes sharing information safe and easy. Designed to protect and control data at all times, Egress Switch supports information sent via email, burned to a CD or DVD, or even uploaded to the internet using FTP or HTTPS.Egress Switch also provides an extensive audit trail showing who, where, and when information has been accessed. This real time identity based protection enables businesses to extend their visibility over what actually happens to corporate information, while offering the ability to instantly revoke data that is either mishandled or suspected lost/stolen.