SlideShare uma empresa Scribd logo
1 de 18
Egress Switch Overview



www.egress.com             ©2008 Egress© Egress Software Technologies Ltd. All rights reserved
                                       Software Technologies Ltd. All rights reserved. Proprietary and confidential.
The Need to Share Information


                                •   Sharing information outside your organisation is common
                                •   Some shared information is considered “sensitive”
                                •   How does the recipient handle sensitive information?
                                •   Is there a risk and how is it measured?

  What information?                       Who receives it?                                   How is it sent?
  •   Business Plans                      •   Accountants                                    •   CD/DVD
  •   Customer Data                       •   Auditors                                       •   Cloud Storage
  •   Financial Records                   •   Board of Directors                             •   Email attachments
  •   Intellectual Property               •   Business Partners                              •   FTP sites
  •   New Product Information             •   Contractors                                    •   Regular mail
  •   Spreadsheets                        •   Government Agencies                            •   USB sticks
  •   Tax Information                     •   Marketing Firms                                •   Web File Transfer
                                          •   Outsourced Providers

www.egress.com                                             ©2008 Egress© Egress Software Technologies Ltd. All rights reserved
                                                                       Software Technologies Ltd. All rights reserved. Proprietary and confidential.
                                                                                                                                                       2
Typical Challenges Sharing Information




  • Solutions are often difficult to use:
     – Difficult to create and share secure information (Sender)
     – Difficult to receive secure information (Recipient)
  • Solutions often don’t provide the level of visibility that today’s audit
    requirements demand
  • Solutions often don’t provide the control that we need (embargo or
    revoke data)



www.egress.com                        ©2008 Egress© Egress Software Technologies Ltd. All rights reserved                  3
                                                  Software Technologies Ltd. All rights reserved. Proprietary and confidential.
3rd Party Data Breach Trend



                                                       The disk, which was mislaid by the courier firm,
                                                        contained personal details on about 2,000 staff


                                                                                                  British Council staff data lost
                                                                                                                  January 2009
One year on from the HMRC data breach incident, the government has
 revealed that it has suffered an average of one data breach per week
                                since then

HMRC data loss recalled one year on
November 2008
                                      36% of data breaches reported are from 3rd party incidents

                                                                           2009 Annual Study: UK Cost of a Data Breach
                                                                                                         February 2011

www.egress.com                                           ©2008 Egress© Egress Software Technologies Ltd. All rights reserved
                                                                     Software Technologies Ltd. All rights reserved. Proprietary and confidential.   4
Information Commissioners Office



        April 2010 - ICO gained power to fine organisations up to £500K
        for a data breach




        "Any organisation which processes personal information must ensure that adequate
        safeguards are in place to keep that information secure."

From April 2010, the ICO will carry out audits to investigate organisations which it believes are
failing to properly protect private data.
   www.egress.com                               ©2008 Egress© Egress Software Technologies Ltd. All rights reserved
                                                            Software Technologies Ltd. All rights reserved. Proprietary and confidential.   5
What is Egress Switch?



•   Protection that stays with your information, no matter where it goes
•   An enabler to safely share any type of data with anyone
•   Simple to deploy and manage
•   Easy for end user to operate
•   Easy to obtain and cost effective to use with a SaaS business model
•   Innovative new data security product from a strong and growing company




www.egress.com                       ©2008 Egress© Egress Software Technologies Ltd. All rights reserved                  6
                                                 Software Technologies Ltd. All rights reserved. Proprietary and confidential.
Why Egress Switch?


Benefits                                                    Differentiators
• Retain control of information at all times                •    Supports single user to Enterprise business
    Exceeds limitations of current generation file          •    No complex infrastructure or trust
    encryption                                                   relationships required
• Full audit trail of who, when, where                      •    Supports impromptu sending of secure files
    information is accessed                                 •    Works with any media type or exchange
    Satisfies emerging audit requirements                        method
                                                            •    Real-time control (change or revoke access)
• Simple end user experience
                                                                 and audit collection
    Designed around sharing workflow, hides                 •    AES 256-bit encryption with FIPS 140-2
    security steps                                               certified libraries
• Cost effective SaaS model                                 •    CCTM certified for UK Government
    No infrastructure required, start with users            •    Cross platform unified solution
    who share sensitive info
• Highly Scalable
    Integrates with existing business processes and
www.egress.com                                        ©2008 Egress© Egress Software Technologies Ltd. All rights reserved                  7
                                                                  Software Technologies Ltd. All rights reserved. Proprietary and confidential.
Solution Overview




           Create Secure          1
              Package
     • Drag & Drop interface
                                           Set Access and                   2
     • Any file, any media
     • Send to recipient
                                         Security Parameters
                                      • Select recipient(s)
                                                                                            Recipient                        3
                                      • Real-time changes                                  Gains Access
                                      • Cloud-based policy store                • Receives package and
                                                                                  authenticates
                                                                                • Local enforcement
                         All delivered in a Software as a Service (SaaS) model

www.egress.com                                          ©2008 Egress© Egress Software Technologies Ltd. All rights reserved                  8
                                                                    Software Technologies Ltd. All rights reserved. Proprietary and confidential.
Next Generation Collaboration Software



Information Owner
–   Creates secure package
–   Sets access and security parameters
–   Sends secure package
–   Tracks activity of secure package

Information Recipient
– Opens packages they are authorised to view
– Requests access for other packages

Switch Server
– Holds all security settings,
  can be changed at any time
– Keeps complete audit trail
  of successful and failed access
– Does not store any secure packages


     www.egress.com                            ©2008 Egress© Egress Software Technologies Ltd. All rights reserved                  9
                                                           Software Technologies Ltd. All rights reserved. Proprietary and confidential.
Secure Email




    •   Transparently encrypt email message body including
        attachments
    •   Transparently encrypt email attachments
    •   MS Outlook 2003/2007/2010 Add-in for seamless integration
    •   Supports policy notes and disclaimers
    •   Policy controls can enforce encryption based on content,
        recipient, and type of information
    •   Size restrictions can offer other transport mechanisms
    •   Zero footprint web access client for remote workers and
        shared machine access
www.egress.com                             ©2008 Egress© Egress Software Technologies Ltd. All rights reserved                10
                                                       Software Technologies Ltd. All rights reserved. Proprietary and confidential.
Internet Server & Cloud Storage




    •   Integration with FTP(s), HTTP(s) and cloud storage
    •   Egress hosted cloud storage available as part of subscription
    •   Transparent integration with collaboration tools like MS
        SharePoint
    •   Built in FTP(s),HTTP(s) client and upload manager
    •   Integrates with 3rd party storage providers
    •   Data files are encrypted and compressed to streamline
        workflow



www.egress.com                                ©2008 Egress© Egress Software Technologies Ltd. All rights reserved                11
                                                          Software Technologies Ltd. All rights reserved. Proprietary and confidential.
Physical Media




    •   Transparently encrypt data stored on removable media
    •   Integrated CD/DVD/Blue-ray burning application
    •   Real-time access control of physical media (CD/DVD, USB etc)
    •   Integration with Endpoint security products




www.egress.com                              ©2008 Egress© Egress Software Technologies Ltd. All rights reserved                12
                                                        Software Technologies Ltd. All rights reserved. Proprietary and confidential.
Mobile Support




    •   Access secure email from any mobile device (iphone, Android,
        Win Mobile 7, Blackberry etc) via optimised web client
    •   Manage package security and access requests on the move
    •   App for streamlined package access on Blackberry devices




www.egress.com                              ©2008 Egress© Egress Software Technologies Ltd. All rights reserved                13
                                                        Software Technologies Ltd. All rights reserved. Proprietary and confidential.
Auditing & Alerts




    •   Detailed auditing & alerts of data lifecycle and user actions
    •   Client & web based Package Library enables real-time
        management of all secured information
    •   Secure delivery reports
    •   Geographic tracking of information in real-time
    •   Role based audit access




www.egress.com                                 ©2008 Egress© Egress Software Technologies Ltd. All rights reserved                14
                                                           Software Technologies Ltd. All rights reserved. Proprietary and confidential.
Policy Engine




    •   Centrally administered user policies
    •   Configure advisory and enforced usage policies
    •   Policies can be configured based on:
        - Data type, content & location
        - Recipient
        - Size of data
        - Media type
        - Encryption algorithm and compression
    •   Fully configurable user UI and end user experience


www.egress.com                               ©2008 Egress© Egress Software Technologies Ltd. All rights reserved                15
                                                         Software Technologies Ltd. All rights reserved. Proprietary and confidential.
Recipient Experience




    •   Simple ‘one-time’ sign up process
    •   Free of charge for recipients and sending data back to paying
        subscribers
    •   Simple click-once application streamlines recipient experience
    •   Transparent access to data received by any transport mechanism
    •   Zero footprint web based client




www.egress.com                             ©2008 Egress© Egress Software Technologies Ltd. All rights reserved                16
                                                       Software Technologies Ltd. All rights reserved. Proprietary and confidential.
Switch Fusion




    •   Automate the sending of encrypted email for mass mail processes
    •   Batch process the sending of sensitive information (e.g Bank
        Statements, transaction records etc direct from a 3rd party DB)
    •   Scheduled backup of sensitive information
    •   Automatically upload files to secure FTP/Cloud storage servers
    •   Integrate with complex back end systems




www.egress.com                              ©2008 Egress© Egress Software Technologies Ltd. All rights reserved                17
                                                        Software Technologies Ltd. All rights reserved. Proprietary and confidential.
Egress Switch Features Summary




    •   Transparently encrypt email attachments
    •   Encrypt information onto CD/DVD and USB removable media
    •   Upload information securely to the internet (HTTP(s), FTP(s), MS
        Sharepoint etc)
    •   Control who can access the information you send
    •   Immediately revoke access to data/files even after they have been sent
    •   View a full audit of who, where & when information has been accessed




www.egress.com                               ©2008 Egress© Egress Software Technologies Ltd. All rights reserved                18
                                                         Software Technologies Ltd. All rights reserved. Proprietary and confidential.

Mais conteúdo relacionado

Mais procurados

Talk IT_ Oracle_김상엽_110822
Talk IT_ Oracle_김상엽_110822Talk IT_ Oracle_김상엽_110822
Talk IT_ Oracle_김상엽_110822Cana Ko
 
Security 2 Q 07[1]
Security 2 Q 07[1]Security 2 Q 07[1]
Security 2 Q 07[1]Sharpe Smith
 
Security For Business: Are You And Your Customers Safe
Security For Business:  Are You And Your Customers SafeSecurity For Business:  Are You And Your Customers Safe
Security For Business: Are You And Your Customers Safewoodsy01
 
Julius Clark is Making Criminal Hackers Miserable
Julius Clark is Making Criminal Hackers MiserableJulius Clark is Making Criminal Hackers Miserable
Julius Clark is Making Criminal Hackers MiserableJulius Clark, CISSP, CISA
 
Wk online trust solutions overview january 2012
Wk online trust solutions overview january 2012Wk online trust solutions overview january 2012
Wk online trust solutions overview january 2012Creus Moreira Carlos
 
Mobile Solutions and Privacy – Not One at the Expense of the Other
 Mobile Solutions and Privacy – Not One at the Expense of the Other Mobile Solutions and Privacy – Not One at the Expense of the Other
Mobile Solutions and Privacy – Not One at the Expense of the Otherbradley_g
 
Enlightened Privacy – by Design for a Smarter Grid
Enlightened Privacy – by Design for a Smarter GridEnlightened Privacy – by Design for a Smarter Grid
Enlightened Privacy – by Design for a Smarter Gridbradley_g
 
IoT Agent Design Principles
IoT Agent Design PrinciplesIoT Agent Design Principles
IoT Agent Design Principlesardexateam
 
Internet & iot security
Internet & iot securityInternet & iot security
Internet & iot securityUsman Anjum
 
General Version 9 21 09
General Version 9 21 09General Version 9 21 09
General Version 9 21 09tverbeck
 
Securing your digital world cybersecurity for sb es
Securing your digital world   cybersecurity for sb esSecuring your digital world   cybersecurity for sb es
Securing your digital world cybersecurity for sb esSonny Hashmi
 
Winn Solutions Digital Brochure 2010
Winn Solutions Digital Brochure 2010Winn Solutions Digital Brochure 2010
Winn Solutions Digital Brochure 2010winnsolutions
 

Mais procurados (17)

OWF12/Java Michael hirt
OWF12/Java Michael hirtOWF12/Java Michael hirt
OWF12/Java Michael hirt
 
Talk IT_ Oracle_김상엽_110822
Talk IT_ Oracle_김상엽_110822Talk IT_ Oracle_김상엽_110822
Talk IT_ Oracle_김상엽_110822
 
Security 2 Q 07[1]
Security 2 Q 07[1]Security 2 Q 07[1]
Security 2 Q 07[1]
 
Security For Business: Are You And Your Customers Safe
Security For Business:  Are You And Your Customers SafeSecurity For Business:  Are You And Your Customers Safe
Security For Business: Are You And Your Customers Safe
 
Information Security for Small Business
Information Security for Small BusinessInformation Security for Small Business
Information Security for Small Business
 
Julius Clark is Making Criminal Hackers Miserable
Julius Clark is Making Criminal Hackers MiserableJulius Clark is Making Criminal Hackers Miserable
Julius Clark is Making Criminal Hackers Miserable
 
Wk online trust solutions overview january 2012
Wk online trust solutions overview january 2012Wk online trust solutions overview january 2012
Wk online trust solutions overview january 2012
 
Mobile Solutions and Privacy – Not One at the Expense of the Other
 Mobile Solutions and Privacy – Not One at the Expense of the Other Mobile Solutions and Privacy – Not One at the Expense of the Other
Mobile Solutions and Privacy – Not One at the Expense of the Other
 
Dean carey - data loss-prevention - atlseccon2011
Dean carey - data loss-prevention - atlseccon2011Dean carey - data loss-prevention - atlseccon2011
Dean carey - data loss-prevention - atlseccon2011
 
Enlightened Privacy – by Design for a Smarter Grid
Enlightened Privacy – by Design for a Smarter GridEnlightened Privacy – by Design for a Smarter Grid
Enlightened Privacy – by Design for a Smarter Grid
 
IoT Agent Design Principles
IoT Agent Design PrinciplesIoT Agent Design Principles
IoT Agent Design Principles
 
Sw keynote
Sw keynoteSw keynote
Sw keynote
 
Internet & iot security
Internet & iot securityInternet & iot security
Internet & iot security
 
General Version 9 21 09
General Version 9 21 09General Version 9 21 09
General Version 9 21 09
 
Securing your digital world cybersecurity for sb es
Securing your digital world   cybersecurity for sb esSecuring your digital world   cybersecurity for sb es
Securing your digital world cybersecurity for sb es
 
Protecting Data on Laptops
Protecting Data on LaptopsProtecting Data on Laptops
Protecting Data on Laptops
 
Winn Solutions Digital Brochure 2010
Winn Solutions Digital Brochure 2010Winn Solutions Digital Brochure 2010
Winn Solutions Digital Brochure 2010
 

Semelhante a Egress Switch Introduction

Cyber security event
Cyber security eventCyber security event
Cyber security eventTryzens
 
James Mesney_"Datameer's Big Data Analytics Platform"_April 9th_Data Enthusia...
James Mesney_"Datameer's Big Data Analytics Platform"_April 9th_Data Enthusia...James Mesney_"Datameer's Big Data Analytics Platform"_April 9th_Data Enthusia...
James Mesney_"Datameer's Big Data Analytics Platform"_April 9th_Data Enthusia...Dataconomy Media
 
Document%20 Safer%20 Introduction
Document%20 Safer%20 IntroductionDocument%20 Safer%20 Introduction
Document%20 Safer%20 Introductionerry wardhana
 
Preventing The Next Data Breach Through Log Management
Preventing The Next Data Breach Through Log ManagementPreventing The Next Data Breach Through Log Management
Preventing The Next Data Breach Through Log ManagementNovell
 
DSS ITSEC CONFERENCE - Spector360 as productivity and security tool - Riga NO...
DSS ITSEC CONFERENCE - Spector360 as productivity and security tool - Riga NO...DSS ITSEC CONFERENCE - Spector360 as productivity and security tool - Riga NO...
DSS ITSEC CONFERENCE - Spector360 as productivity and security tool - Riga NO...Andris Soroka
 
Mark Carlile, EMEA Enterprise Lead at Airwatch - Mobile content strategies an...
Mark Carlile, EMEA Enterprise Lead at Airwatch - Mobile content strategies an...Mark Carlile, EMEA Enterprise Lead at Airwatch - Mobile content strategies an...
Mark Carlile, EMEA Enterprise Lead at Airwatch - Mobile content strategies an...Global Business Events
 
110307 cloud security requirements gourley
110307 cloud security requirements gourley110307 cloud security requirements gourley
110307 cloud security requirements gourleyGovCloud Network
 
The security story behind critical industrial networks
The security story behind critical industrial networks The security story behind critical industrial networks
The security story behind critical industrial networks odix (ODI LTD)
 
Extending security in the cloud network box - v4
Extending security in the cloud   network box - v4Extending security in the cloud   network box - v4
Extending security in the cloud network box - v4Valencell, Inc.
 
Self defending data webinar (feb13)
Self defending data webinar (feb13)Self defending data webinar (feb13)
Self defending data webinar (feb13)Vic Winkler
 
Cryptographie avancée et Logical Data Fabric : Accélérez le partage et la mig...
Cryptographie avancée et Logical Data Fabric : Accélérez le partage et la mig...Cryptographie avancée et Logical Data Fabric : Accélérez le partage et la mig...
Cryptographie avancée et Logical Data Fabric : Accélérez le partage et la mig...Denodo
 
Oracle Open World Preso on Cloud Economics
Oracle Open World Preso on Cloud EconomicsOracle Open World Preso on Cloud Economics
Oracle Open World Preso on Cloud EconomicsRon Batra
 
Logical Data Fabric and Industry-Focused Solutions by IQZ Systems
Logical Data Fabric and Industry-Focused Solutions by IQZ SystemsLogical Data Fabric and Industry-Focused Solutions by IQZ Systems
Logical Data Fabric and Industry-Focused Solutions by IQZ SystemsDenodo
 
Protect your Database with Data Masking & Enforced Version Control
Protect your Database with Data Masking & Enforced Version Control	Protect your Database with Data Masking & Enforced Version Control
Protect your Database with Data Masking & Enforced Version Control DBmaestro - Database DevOps
 
Ppt security-database-overview-11g r2
Ppt security-database-overview-11g r2Ppt security-database-overview-11g r2
Ppt security-database-overview-11g r2Oracle BH
 
IoT Security: Debunking the "We Aren't THAT Connected" Myth
IoT Security: Debunking the "We Aren't THAT Connected" MythIoT Security: Debunking the "We Aren't THAT Connected" Myth
IoT Security: Debunking the "We Aren't THAT Connected" MythSecurity Innovation
 
Data Con LA 2019 - Securing IoT Data with Pervasive Encryption by Eysha Shirr...
Data Con LA 2019 - Securing IoT Data with Pervasive Encryption by Eysha Shirr...Data Con LA 2019 - Securing IoT Data with Pervasive Encryption by Eysha Shirr...
Data Con LA 2019 - Securing IoT Data with Pervasive Encryption by Eysha Shirr...Data Con LA
 

Semelhante a Egress Switch Introduction (20)

Cyber security event
Cyber security eventCyber security event
Cyber security event
 
James Mesney_"Datameer's Big Data Analytics Platform"_April 9th_Data Enthusia...
James Mesney_"Datameer's Big Data Analytics Platform"_April 9th_Data Enthusia...James Mesney_"Datameer's Big Data Analytics Platform"_April 9th_Data Enthusia...
James Mesney_"Datameer's Big Data Analytics Platform"_April 9th_Data Enthusia...
 
Document%20 Safer%20 Introduction
Document%20 Safer%20 IntroductionDocument%20 Safer%20 Introduction
Document%20 Safer%20 Introduction
 
Preventing The Next Data Breach Through Log Management
Preventing The Next Data Breach Through Log ManagementPreventing The Next Data Breach Through Log Management
Preventing The Next Data Breach Through Log Management
 
DSS ITSEC CONFERENCE - Spector360 as productivity and security tool - Riga NO...
DSS ITSEC CONFERENCE - Spector360 as productivity and security tool - Riga NO...DSS ITSEC CONFERENCE - Spector360 as productivity and security tool - Riga NO...
DSS ITSEC CONFERENCE - Spector360 as productivity and security tool - Riga NO...
 
Mark Carlile, EMEA Enterprise Lead at Airwatch - Mobile content strategies an...
Mark Carlile, EMEA Enterprise Lead at Airwatch - Mobile content strategies an...Mark Carlile, EMEA Enterprise Lead at Airwatch - Mobile content strategies an...
Mark Carlile, EMEA Enterprise Lead at Airwatch - Mobile content strategies an...
 
110307 cloud security requirements gourley
110307 cloud security requirements gourley110307 cloud security requirements gourley
110307 cloud security requirements gourley
 
The security story behind critical industrial networks
The security story behind critical industrial networks The security story behind critical industrial networks
The security story behind critical industrial networks
 
Extending security in the cloud network box - v4
Extending security in the cloud   network box - v4Extending security in the cloud   network box - v4
Extending security in the cloud network box - v4
 
Bird&Bird
Bird&BirdBird&Bird
Bird&Bird
 
Self defending data webinar (feb13)
Self defending data webinar (feb13)Self defending data webinar (feb13)
Self defending data webinar (feb13)
 
Cryptographie avancée et Logical Data Fabric : Accélérez le partage et la mig...
Cryptographie avancée et Logical Data Fabric : Accélérez le partage et la mig...Cryptographie avancée et Logical Data Fabric : Accélérez le partage et la mig...
Cryptographie avancée et Logical Data Fabric : Accélérez le partage et la mig...
 
Oracle Open World Preso on Cloud Economics
Oracle Open World Preso on Cloud EconomicsOracle Open World Preso on Cloud Economics
Oracle Open World Preso on Cloud Economics
 
Oow con7393
Oow con7393Oow con7393
Oow con7393
 
Logical Data Fabric and Industry-Focused Solutions by IQZ Systems
Logical Data Fabric and Industry-Focused Solutions by IQZ SystemsLogical Data Fabric and Industry-Focused Solutions by IQZ Systems
Logical Data Fabric and Industry-Focused Solutions by IQZ Systems
 
Protect your Database with Data Masking & Enforced Version Control
Protect your Database with Data Masking & Enforced Version Control	Protect your Database with Data Masking & Enforced Version Control
Protect your Database with Data Masking & Enforced Version Control
 
On Demand Cloud Services Coury
On Demand Cloud Services   CouryOn Demand Cloud Services   Coury
On Demand Cloud Services Coury
 
Ppt security-database-overview-11g r2
Ppt security-database-overview-11g r2Ppt security-database-overview-11g r2
Ppt security-database-overview-11g r2
 
IoT Security: Debunking the "We Aren't THAT Connected" Myth
IoT Security: Debunking the "We Aren't THAT Connected" MythIoT Security: Debunking the "We Aren't THAT Connected" Myth
IoT Security: Debunking the "We Aren't THAT Connected" Myth
 
Data Con LA 2019 - Securing IoT Data with Pervasive Encryption by Eysha Shirr...
Data Con LA 2019 - Securing IoT Data with Pervasive Encryption by Eysha Shirr...Data Con LA 2019 - Securing IoT Data with Pervasive Encryption by Eysha Shirr...
Data Con LA 2019 - Securing IoT Data with Pervasive Encryption by Eysha Shirr...
 

Egress Switch Introduction

  • 1. Egress Switch Overview www.egress.com ©2008 Egress© Egress Software Technologies Ltd. All rights reserved Software Technologies Ltd. All rights reserved. Proprietary and confidential.
  • 2. The Need to Share Information • Sharing information outside your organisation is common • Some shared information is considered “sensitive” • How does the recipient handle sensitive information? • Is there a risk and how is it measured? What information? Who receives it? How is it sent? • Business Plans • Accountants • CD/DVD • Customer Data • Auditors • Cloud Storage • Financial Records • Board of Directors • Email attachments • Intellectual Property • Business Partners • FTP sites • New Product Information • Contractors • Regular mail • Spreadsheets • Government Agencies • USB sticks • Tax Information • Marketing Firms • Web File Transfer • Outsourced Providers www.egress.com ©2008 Egress© Egress Software Technologies Ltd. All rights reserved Software Technologies Ltd. All rights reserved. Proprietary and confidential. 2
  • 3. Typical Challenges Sharing Information • Solutions are often difficult to use: – Difficult to create and share secure information (Sender) – Difficult to receive secure information (Recipient) • Solutions often don’t provide the level of visibility that today’s audit requirements demand • Solutions often don’t provide the control that we need (embargo or revoke data) www.egress.com ©2008 Egress© Egress Software Technologies Ltd. All rights reserved 3 Software Technologies Ltd. All rights reserved. Proprietary and confidential.
  • 4. 3rd Party Data Breach Trend The disk, which was mislaid by the courier firm, contained personal details on about 2,000 staff British Council staff data lost January 2009 One year on from the HMRC data breach incident, the government has revealed that it has suffered an average of one data breach per week since then HMRC data loss recalled one year on November 2008 36% of data breaches reported are from 3rd party incidents 2009 Annual Study: UK Cost of a Data Breach February 2011 www.egress.com ©2008 Egress© Egress Software Technologies Ltd. All rights reserved Software Technologies Ltd. All rights reserved. Proprietary and confidential. 4
  • 5. Information Commissioners Office April 2010 - ICO gained power to fine organisations up to £500K for a data breach "Any organisation which processes personal information must ensure that adequate safeguards are in place to keep that information secure." From April 2010, the ICO will carry out audits to investigate organisations which it believes are failing to properly protect private data. www.egress.com ©2008 Egress© Egress Software Technologies Ltd. All rights reserved Software Technologies Ltd. All rights reserved. Proprietary and confidential. 5
  • 6. What is Egress Switch? • Protection that stays with your information, no matter where it goes • An enabler to safely share any type of data with anyone • Simple to deploy and manage • Easy for end user to operate • Easy to obtain and cost effective to use with a SaaS business model • Innovative new data security product from a strong and growing company www.egress.com ©2008 Egress© Egress Software Technologies Ltd. All rights reserved 6 Software Technologies Ltd. All rights reserved. Proprietary and confidential.
  • 7. Why Egress Switch? Benefits Differentiators • Retain control of information at all times • Supports single user to Enterprise business Exceeds limitations of current generation file • No complex infrastructure or trust encryption relationships required • Full audit trail of who, when, where • Supports impromptu sending of secure files information is accessed • Works with any media type or exchange Satisfies emerging audit requirements method • Real-time control (change or revoke access) • Simple end user experience and audit collection Designed around sharing workflow, hides • AES 256-bit encryption with FIPS 140-2 security steps certified libraries • Cost effective SaaS model • CCTM certified for UK Government No infrastructure required, start with users • Cross platform unified solution who share sensitive info • Highly Scalable Integrates with existing business processes and www.egress.com ©2008 Egress© Egress Software Technologies Ltd. All rights reserved 7 Software Technologies Ltd. All rights reserved. Proprietary and confidential.
  • 8. Solution Overview Create Secure 1 Package • Drag & Drop interface Set Access and 2 • Any file, any media • Send to recipient Security Parameters • Select recipient(s) Recipient 3 • Real-time changes Gains Access • Cloud-based policy store • Receives package and authenticates • Local enforcement All delivered in a Software as a Service (SaaS) model www.egress.com ©2008 Egress© Egress Software Technologies Ltd. All rights reserved 8 Software Technologies Ltd. All rights reserved. Proprietary and confidential.
  • 9. Next Generation Collaboration Software Information Owner – Creates secure package – Sets access and security parameters – Sends secure package – Tracks activity of secure package Information Recipient – Opens packages they are authorised to view – Requests access for other packages Switch Server – Holds all security settings, can be changed at any time – Keeps complete audit trail of successful and failed access – Does not store any secure packages www.egress.com ©2008 Egress© Egress Software Technologies Ltd. All rights reserved 9 Software Technologies Ltd. All rights reserved. Proprietary and confidential.
  • 10. Secure Email • Transparently encrypt email message body including attachments • Transparently encrypt email attachments • MS Outlook 2003/2007/2010 Add-in for seamless integration • Supports policy notes and disclaimers • Policy controls can enforce encryption based on content, recipient, and type of information • Size restrictions can offer other transport mechanisms • Zero footprint web access client for remote workers and shared machine access www.egress.com ©2008 Egress© Egress Software Technologies Ltd. All rights reserved 10 Software Technologies Ltd. All rights reserved. Proprietary and confidential.
  • 11. Internet Server & Cloud Storage • Integration with FTP(s), HTTP(s) and cloud storage • Egress hosted cloud storage available as part of subscription • Transparent integration with collaboration tools like MS SharePoint • Built in FTP(s),HTTP(s) client and upload manager • Integrates with 3rd party storage providers • Data files are encrypted and compressed to streamline workflow www.egress.com ©2008 Egress© Egress Software Technologies Ltd. All rights reserved 11 Software Technologies Ltd. All rights reserved. Proprietary and confidential.
  • 12. Physical Media • Transparently encrypt data stored on removable media • Integrated CD/DVD/Blue-ray burning application • Real-time access control of physical media (CD/DVD, USB etc) • Integration with Endpoint security products www.egress.com ©2008 Egress© Egress Software Technologies Ltd. All rights reserved 12 Software Technologies Ltd. All rights reserved. Proprietary and confidential.
  • 13. Mobile Support • Access secure email from any mobile device (iphone, Android, Win Mobile 7, Blackberry etc) via optimised web client • Manage package security and access requests on the move • App for streamlined package access on Blackberry devices www.egress.com ©2008 Egress© Egress Software Technologies Ltd. All rights reserved 13 Software Technologies Ltd. All rights reserved. Proprietary and confidential.
  • 14. Auditing & Alerts • Detailed auditing & alerts of data lifecycle and user actions • Client & web based Package Library enables real-time management of all secured information • Secure delivery reports • Geographic tracking of information in real-time • Role based audit access www.egress.com ©2008 Egress© Egress Software Technologies Ltd. All rights reserved 14 Software Technologies Ltd. All rights reserved. Proprietary and confidential.
  • 15. Policy Engine • Centrally administered user policies • Configure advisory and enforced usage policies • Policies can be configured based on: - Data type, content & location - Recipient - Size of data - Media type - Encryption algorithm and compression • Fully configurable user UI and end user experience www.egress.com ©2008 Egress© Egress Software Technologies Ltd. All rights reserved 15 Software Technologies Ltd. All rights reserved. Proprietary and confidential.
  • 16. Recipient Experience • Simple ‘one-time’ sign up process • Free of charge for recipients and sending data back to paying subscribers • Simple click-once application streamlines recipient experience • Transparent access to data received by any transport mechanism • Zero footprint web based client www.egress.com ©2008 Egress© Egress Software Technologies Ltd. All rights reserved 16 Software Technologies Ltd. All rights reserved. Proprietary and confidential.
  • 17. Switch Fusion • Automate the sending of encrypted email for mass mail processes • Batch process the sending of sensitive information (e.g Bank Statements, transaction records etc direct from a 3rd party DB) • Scheduled backup of sensitive information • Automatically upload files to secure FTP/Cloud storage servers • Integrate with complex back end systems www.egress.com ©2008 Egress© Egress Software Technologies Ltd. All rights reserved 17 Software Technologies Ltd. All rights reserved. Proprietary and confidential.
  • 18. Egress Switch Features Summary • Transparently encrypt email attachments • Encrypt information onto CD/DVD and USB removable media • Upload information securely to the internet (HTTP(s), FTP(s), MS Sharepoint etc) • Control who can access the information you send • Immediately revoke access to data/files even after they have been sent • View a full audit of who, where & when information has been accessed www.egress.com ©2008 Egress© Egress Software Technologies Ltd. All rights reserved 18 Software Technologies Ltd. All rights reserved. Proprietary and confidential.

Notas do Editor

  1. Having over 20 years experience in delivering data security products, the Egress team set about developing a solution to one of the toughest challenges business face today – exchanging information securely. Sharing sensitive or confidential information is very common in most organisations, being sent both internally and externally with clients, suppliers and other 3rd parties What is classed as confidential data is dependant on each organisation, however there seems to be a number of areas that usually come to mind, such as finance & accounts depts dealing with payroll and tax information, HR dealing with staff details, issues and wages, Legal areas who work with a number of contracts, mergers & acquisitions....... The list goes onThe most common way of sending information is probably via e-mail (inc attachments), although, as some files are too large to go out via e-mail, large file transfer systems or protocols are sometimes used.
  2. ll organisations that deal with this type of data are regulated by the ICO. The ICO are there to enforce that organisations comply with the DPA and have adequate security measures in place to secure this type of data (both at rest and in transit). If a data breach occurs and these measures have not been taken, the ICO then have the power to fine firms up to £½ Million.
  3. Egress Switch is a new generation of data security software that makes sharing information safe and easy. Designed to protect and control data at all times, Egress Switch supports information sent via email, burned to a CD or DVD, or even uploaded to the internet using FTP or HTTPS.Egress Switch also provides an extensive audit trail showing who, where, and when information has been accessed. This real time identity based protection enables businesses to extend their visibility over what actually happens to corporate information, while offering the ability to instantly revoke data that is either mishandled or suspected lost/stolen.