why high-technology is · high-technology is not enough for true why information security....

27
High-Technology is NOT ENOUGH for True Information Security WHY

Upload: others

Post on 11-Jun-2020

1 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: WHY High-Technology is · High-Technology is NOT ENOUGH for True WHY Information Security. information is constantly being created, shared, protected, manipulated and managed

High-Technology is NOT ENOUGH for True Information SecurityWHY

Page 2: WHY High-Technology is · High-Technology is NOT ENOUGH for True WHY Information Security. information is constantly being created, shared, protected, manipulated and managed

information is constantly being created, shared, protected, manipulated and managed.

IN TODAY’S WORLD,

Page 3: WHY High-Technology is · High-Technology is NOT ENOUGH for True WHY Information Security. information is constantly being created, shared, protected, manipulated and managed

We’ve all seen this first-hand IN DIFFERENT WAYS

Page 4: WHY High-Technology is · High-Technology is NOT ENOUGH for True WHY Information Security. information is constantly being created, shared, protected, manipulated and managed

SUCH AS HOW WE INTERACT

ON SOCIAL MEDIA

RUN OUR BUSINESSES,

OR EVEN MANAGE OUR FINANCES.

Page 5: WHY High-Technology is · High-Technology is NOT ENOUGH for True WHY Information Security. information is constantly being created, shared, protected, manipulated and managed

JUST AS TECHNOLOGY HAS PLAYED A LARGE ROLE in creating a deluge of data, it also plays a role in securing this data.

Page 6: WHY High-Technology is · High-Technology is NOT ENOUGH for True WHY Information Security. information is constantly being created, shared, protected, manipulated and managed

But technology, when used singularly,

IS NOT ENOUGH TO ENSURE INFORMATION SECURITY.

Page 7: WHY High-Technology is · High-Technology is NOT ENOUGH for True WHY Information Security. information is constantly being created, shared, protected, manipulated and managed

IN FACT, TECHNOLOGY is just one piece of the larger information governance puzzle. “It costs around 20 cents to BUY 1GB of storage, however, it costs around $3,500 to REVIEW 1GB of storage.”

“Email ROI Calculator” AIIM

Page 8: WHY High-Technology is · High-Technology is NOT ENOUGH for True WHY Information Security. information is constantly being created, shared, protected, manipulated and managed

Viewpointe has paved the way in this field,

helping over 1,500 customers

safely manage more than 130 billion items.

Page 9: WHY High-Technology is · High-Technology is NOT ENOUGH for True WHY Information Security. information is constantly being created, shared, protected, manipulated and managed

We know how important considerations like authentication and threat detection are to achieving

TRUE SECURITY

Page 10: WHY High-Technology is · High-Technology is NOT ENOUGH for True WHY Information Security. information is constantly being created, shared, protected, manipulated and managed

four layers of security.

VIEWPOINTE OFFERS

TO PUT THIS INTO PRACTICE,

Page 11: WHY High-Technology is · High-Technology is NOT ENOUGH for True WHY Information Security. information is constantly being created, shared, protected, manipulated and managed

PROCESS PROCEDURE& GOVERNANCE

Page 12: WHY High-Technology is · High-Technology is NOT ENOUGH for True WHY Information Security. information is constantly being created, shared, protected, manipulated and managed

THIS INCLUDES EVERYTHING FROM audits, to best practices, to reporting and compliance.5,000 SLA Measurements Tracked and Reported

150+ Audit Examinations AnnuallyViewpointe maintains extensive compliance processes based on best practices, receiving SOC 2 compliance review of security, availability, processing, confidentiality, and privacy practices, and we are audited by FFIEC and most of our customers each year.

Page 13: WHY High-Technology is · High-Technology is NOT ENOUGH for True WHY Information Security. information is constantly being created, shared, protected, manipulated and managed

TECHNOLOGY-BASED

SECURITY

Page 14: WHY High-Technology is · High-Technology is NOT ENOUGH for True WHY Information Security. information is constantly being created, shared, protected, manipulated and managed

that the technology you employ is highly available, privately managed and allows for privileged access.

YOU NEED TO KNOW

Page 15: WHY High-Technology is · High-Technology is NOT ENOUGH for True WHY Information Security. information is constantly being created, shared, protected, manipulated and managed

Both the assigned Primary and Alternate Site house 100% of a customer’s content and are provisioned for full production load.

Viewpointe leverages geographically dispersed Tier 3+ Data Centers

Viewpointe completes Almost 50 Successful Disaster Recovery Tests annually

Page 16: WHY High-Technology is · High-Technology is NOT ENOUGH for True WHY Information Security. information is constantly being created, shared, protected, manipulated and managed

NETWORKSECURITY

Page 17: WHY High-Technology is · High-Technology is NOT ENOUGH for True WHY Information Security. information is constantly being created, shared, protected, manipulated and managed

We implement elements like

Viewpointe leverages the TLS 1.2 standard and AES-256 encryption to protect customer data.

CUSTOMER-SPECIFIC NETWORK CONNECTIVITY AND COMBINED DATA-IN-TRANSIT AND DATA-AT-REST ENCRYPTION TO SAFE-GUARD ALL DATA

Page 18: WHY High-Technology is · High-Technology is NOT ENOUGH for True WHY Information Security. information is constantly being created, shared, protected, manipulated and managed

To maintain network detection and monitoring at

Viewpointe network detection, system monitoring and managed services provide ongoing protection against service and data threats.

peak performance,

Page 19: WHY High-Technology is · High-Technology is NOT ENOUGH for True WHY Information Security. information is constantly being created, shared, protected, manipulated and managed

PHYSICALSECURITY

Page 20: WHY High-Technology is · High-Technology is NOT ENOUGH for True WHY Information Security. information is constantly being created, shared, protected, manipulated and managed

This final level is about PEOPLE AND PLACES

Page 21: WHY High-Technology is · High-Technology is NOT ENOUGH for True WHY Information Security. information is constantly being created, shared, protected, manipulated and managed

Geographically diverse data centers and support staff limits impact from natural disasters.

24x7 site security, IT security and operational monitoring provides rapid response to availability or security threats.

THINK: 24/7

Page 22: WHY High-Technology is · High-Technology is NOT ENOUGH for True WHY Information Security. information is constantly being created, shared, protected, manipulated and managed

BUT TECHNOLOGY ALONE WON’T SOLVE YOUR SECURITY PROBLEMS.

IT’S A TOUGH FACT TO FACE,

Page 23: WHY High-Technology is · High-Technology is NOT ENOUGH for True WHY Information Security. information is constantly being created, shared, protected, manipulated and managed

NAÏVE BELIEFS that cloud providers are totally responsible for their customers’ security discourages organizations from ensuring their employees use cloud services appropriately.” As a result Gartner predicts,

“THROUGH 2020, 95% OF CLOUD SECURITY FAILURES WILL BE THE CUSTOMER’S FAULT.”

“Clouds Are Secure: Are You Using Them Securely?” | 22 September 2015 G00281279 | Analyst(s): Jay Heiser

Page 24: WHY High-Technology is · High-Technology is NOT ENOUGH for True WHY Information Security. information is constantly being created, shared, protected, manipulated and managed

is NOT about denying the possibility of a security breach.

BEING PREPARED

Page 25: WHY High-Technology is · High-Technology is NOT ENOUGH for True WHY Information Security. information is constantly being created, shared, protected, manipulated and managed

Instead, it’s about having a breadth of safeguards in place to

react quickly, limit damage and constantly improve.

Page 26: WHY High-Technology is · High-Technology is NOT ENOUGH for True WHY Information Security. information is constantly being created, shared, protected, manipulated and managed

That’s how we help settle

OVER $6 TRILLION IN TRANSACTIONS AND LOAD

over 14 billion documents annually.

Page 27: WHY High-Technology is · High-Technology is NOT ENOUGH for True WHY Information Security. information is constantly being created, shared, protected, manipulated and managed

Learn more about how Viewpointe can help you create a private, purpose-built, proven solution.

viewpointe.com/our-services