SlideShare una empresa de Scribd logo
1 de 10
Edit Presentation Name Here
Seamless FileSecurity &Compliance.
Anywhere.
The Challenge: How To Protect & Control Data
In A World With No Boundaries?
July 2014
Organization /
Employee
Control Your Confidential Data,
No Matter Where It Travels
Gmail
Cloud Storage
& Applications
Multiple Devices
iPads, Tablets,
Mobile devices
Cyber
Criminals/
Threats
Board & Management
Consultants
Internal Employees
External Partners
Business Associates
www.covertix.com
Network Perimeter
What do we do?
Covertix provides noninvasive file protection &
control beyond the perimeters of the enterprise.
• Protection of all proprietary, confidential and
regulated information
• Transparent to the enduser andnon-disruptive
tothe business
• Protection of file level datawith internal and
external parties, anywhere.
www.covertix.com
Targeted Industries
• Healthcare
• Legal
• Construction
• Educational
• Banking & Financial
• Insurance
• Manufacturing
• Energy & Utilities
www.covertix.com
Protecting Regulated Data
• UseCase: ExternalCollaborators
• Details: A publicly traded enterprise needed to share
regulated financial data with their external audit firm.
The organization needed to ensure the original and
replicated data would stay protected internally and
externally at all times.
• The Benefits: Covertix’s sticky copy feature ensures
the company’s IT policy travels with copied/pasted
data into any new file. The new files are protected by
the original policy, no matter where the data travels
or is stored. Access to the original or replicated data
can be revoked at any time, no matter where the data
is located.
• Product: SmartCipher Collaborator
www.covertix.com
Controlling Intellectual Property
• Use Case: Protecting against internal or external cyber
threats.
• Details: A large defense company needed to protect
its corporate intellectual property found in their
proprietary design files. Based on the company’s IT
policy, files containing intellectual property were only
viewable on specific IP addresses and only during
normal business hours. Virtual machines could not
access the design files thus ensuring the company’s
IP stayed protected from internal and external
threats.
• The Benefits: Blocked any type of cyber espionage
from removing highly sensitive intellectual property
from the office.
• Product: SmartCipher Enterprise
www.covertix.com
Non-Secured Devices
• UseCase: External Board Members
• Details: A large public financial institution was
emailing its board members copies of highly
regulated data prior to quarterly board meetings to
non secured devices. The organization wanted to
share and collaborate on the data in a secured
manner without enforcing their security solutions on
the board member’s private devices.
• The Benefits: The regulated data never left the
financial institution while at the same time allowing
board members to access the protected documents
on a web reader. This was a simple and effective
manner to control highly regulated data while
providing a secure method to transport, view and
annotate on any non secured device.
• Product: SmartCipher Mobility
www.covertix.com
Covertix Products
• SmartCipher Enterprise – File control and
protection within the enterprise
• SmartCipher Collaborator – File control and
protection with external collaborators
• SmartCipher Mobility – Document
collaboration on any device
• SmartCipher Cloud - File control and
protection in the public or private cloud
www.covertix.com
Available Integrations
And More…
www.covertix.com
Edit Presentation Name Here
Seamless FileSecurity &Compliance.
Anywhere.
Thank You
2014
FileSecurity & Compliance.
Anywhere.
Forrester Briefing
Contact: info@covertix.com
Website: www.covertix.com

Más contenido relacionado

Destacado

Digipak and Poster planning
Digipak and Poster planningDigipak and Poster planning
Digipak and Poster planningSanNahar
 
José Viña - Envejecimiento a nivel celular y orgánico. Envejecer es normal
José Viña - Envejecimiento a nivel celular y orgánico. Envejecer es normalJosé Viña - Envejecimiento a nivel celular y orgánico. Envejecer es normal
José Viña - Envejecimiento a nivel celular y orgánico. Envejecer es normalFundación Ramón Areces
 
Reproducción sexual y asexual
Reproducción sexual y asexualReproducción sexual y asexual
Reproducción sexual y asexual1999804
 
Human presence detection based room light controller using pir2.pptx [repaired]
Human presence detection based room light controller using pir2.pptx [repaired]Human presence detection based room light controller using pir2.pptx [repaired]
Human presence detection based room light controller using pir2.pptx [repaired]nikhilsinghia
 
Io t40systems @ mesa graz april 2016
Io t40systems @ mesa graz april 2016Io t40systems @ mesa graz april 2016
Io t40systems @ mesa graz april 2016Michael Klemen
 
Web技術の現状と将来 (Open Source Conference 2011 Kyoto)
Web技術の現状と将来 (Open Source Conference 2011 Kyoto) Web技術の現状と将来 (Open Source Conference 2011 Kyoto)
Web技術の現状と将来 (Open Source Conference 2011 Kyoto) Rikkyo University
 

Destacado (8)

Digipak and Poster planning
Digipak and Poster planningDigipak and Poster planning
Digipak and Poster planning
 
José Viña - Envejecimiento a nivel celular y orgánico. Envejecer es normal
José Viña - Envejecimiento a nivel celular y orgánico. Envejecer es normalJosé Viña - Envejecimiento a nivel celular y orgánico. Envejecer es normal
José Viña - Envejecimiento a nivel celular y orgánico. Envejecer es normal
 
RELIGIÓN Y REINO
RELIGIÓN Y REINORELIGIÓN Y REINO
RELIGIÓN Y REINO
 
Reproducción sexual y asexual
Reproducción sexual y asexualReproducción sexual y asexual
Reproducción sexual y asexual
 
biaya konsep
biaya konsepbiaya konsep
biaya konsep
 
Human presence detection based room light controller using pir2.pptx [repaired]
Human presence detection based room light controller using pir2.pptx [repaired]Human presence detection based room light controller using pir2.pptx [repaired]
Human presence detection based room light controller using pir2.pptx [repaired]
 
Io t40systems @ mesa graz april 2016
Io t40systems @ mesa graz april 2016Io t40systems @ mesa graz april 2016
Io t40systems @ mesa graz april 2016
 
Web技術の現状と将来 (Open Source Conference 2011 Kyoto)
Web技術の現状と将来 (Open Source Conference 2011 Kyoto) Web技術の現状と将来 (Open Source Conference 2011 Kyoto)
Web技術の現状と将来 (Open Source Conference 2011 Kyoto)
 

Último

Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 

Último (20)

Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 

Control and Protect Confidential Data With Internal and External Parties

  • 1. Edit Presentation Name Here Seamless FileSecurity &Compliance. Anywhere. The Challenge: How To Protect & Control Data In A World With No Boundaries? July 2014
  • 2. Organization / Employee Control Your Confidential Data, No Matter Where It Travels Gmail Cloud Storage & Applications Multiple Devices iPads, Tablets, Mobile devices Cyber Criminals/ Threats Board & Management Consultants Internal Employees External Partners Business Associates www.covertix.com Network Perimeter
  • 3. What do we do? Covertix provides noninvasive file protection & control beyond the perimeters of the enterprise. • Protection of all proprietary, confidential and regulated information • Transparent to the enduser andnon-disruptive tothe business • Protection of file level datawith internal and external parties, anywhere. www.covertix.com
  • 4. Targeted Industries • Healthcare • Legal • Construction • Educational • Banking & Financial • Insurance • Manufacturing • Energy & Utilities www.covertix.com
  • 5. Protecting Regulated Data • UseCase: ExternalCollaborators • Details: A publicly traded enterprise needed to share regulated financial data with their external audit firm. The organization needed to ensure the original and replicated data would stay protected internally and externally at all times. • The Benefits: Covertix’s sticky copy feature ensures the company’s IT policy travels with copied/pasted data into any new file. The new files are protected by the original policy, no matter where the data travels or is stored. Access to the original or replicated data can be revoked at any time, no matter where the data is located. • Product: SmartCipher Collaborator www.covertix.com
  • 6. Controlling Intellectual Property • Use Case: Protecting against internal or external cyber threats. • Details: A large defense company needed to protect its corporate intellectual property found in their proprietary design files. Based on the company’s IT policy, files containing intellectual property were only viewable on specific IP addresses and only during normal business hours. Virtual machines could not access the design files thus ensuring the company’s IP stayed protected from internal and external threats. • The Benefits: Blocked any type of cyber espionage from removing highly sensitive intellectual property from the office. • Product: SmartCipher Enterprise www.covertix.com
  • 7. Non-Secured Devices • UseCase: External Board Members • Details: A large public financial institution was emailing its board members copies of highly regulated data prior to quarterly board meetings to non secured devices. The organization wanted to share and collaborate on the data in a secured manner without enforcing their security solutions on the board member’s private devices. • The Benefits: The regulated data never left the financial institution while at the same time allowing board members to access the protected documents on a web reader. This was a simple and effective manner to control highly regulated data while providing a secure method to transport, view and annotate on any non secured device. • Product: SmartCipher Mobility www.covertix.com
  • 8. Covertix Products • SmartCipher Enterprise – File control and protection within the enterprise • SmartCipher Collaborator – File control and protection with external collaborators • SmartCipher Mobility – Document collaboration on any device • SmartCipher Cloud - File control and protection in the public or private cloud www.covertix.com
  • 10. Edit Presentation Name Here Seamless FileSecurity &Compliance. Anywhere. Thank You 2014 FileSecurity & Compliance. Anywhere. Forrester Briefing Contact: info@covertix.com Website: www.covertix.com