why high-technology is · high-technology is not enough for true why information security....
TRANSCRIPT
![Page 1: WHY High-Technology is · High-Technology is NOT ENOUGH for True WHY Information Security. information is constantly being created, shared, protected, manipulated and managed](https://reader033.vdocuments.mx/reader033/viewer/2022060213/5f052c577e708231d411a349/html5/thumbnails/1.jpg)
High-Technology is NOT ENOUGH for True Information SecurityWHY
![Page 2: WHY High-Technology is · High-Technology is NOT ENOUGH for True WHY Information Security. information is constantly being created, shared, protected, manipulated and managed](https://reader033.vdocuments.mx/reader033/viewer/2022060213/5f052c577e708231d411a349/html5/thumbnails/2.jpg)
information is constantly being created, shared, protected, manipulated and managed.
IN TODAY’S WORLD,
![Page 3: WHY High-Technology is · High-Technology is NOT ENOUGH for True WHY Information Security. information is constantly being created, shared, protected, manipulated and managed](https://reader033.vdocuments.mx/reader033/viewer/2022060213/5f052c577e708231d411a349/html5/thumbnails/3.jpg)
We’ve all seen this first-hand IN DIFFERENT WAYS
![Page 4: WHY High-Technology is · High-Technology is NOT ENOUGH for True WHY Information Security. information is constantly being created, shared, protected, manipulated and managed](https://reader033.vdocuments.mx/reader033/viewer/2022060213/5f052c577e708231d411a349/html5/thumbnails/4.jpg)
SUCH AS HOW WE INTERACT
ON SOCIAL MEDIA
RUN OUR BUSINESSES,
OR EVEN MANAGE OUR FINANCES.
![Page 5: WHY High-Technology is · High-Technology is NOT ENOUGH for True WHY Information Security. information is constantly being created, shared, protected, manipulated and managed](https://reader033.vdocuments.mx/reader033/viewer/2022060213/5f052c577e708231d411a349/html5/thumbnails/5.jpg)
JUST AS TECHNOLOGY HAS PLAYED A LARGE ROLE in creating a deluge of data, it also plays a role in securing this data.
![Page 6: WHY High-Technology is · High-Technology is NOT ENOUGH for True WHY Information Security. information is constantly being created, shared, protected, manipulated and managed](https://reader033.vdocuments.mx/reader033/viewer/2022060213/5f052c577e708231d411a349/html5/thumbnails/6.jpg)
But technology, when used singularly,
IS NOT ENOUGH TO ENSURE INFORMATION SECURITY.
![Page 7: WHY High-Technology is · High-Technology is NOT ENOUGH for True WHY Information Security. information is constantly being created, shared, protected, manipulated and managed](https://reader033.vdocuments.mx/reader033/viewer/2022060213/5f052c577e708231d411a349/html5/thumbnails/7.jpg)
IN FACT, TECHNOLOGY is just one piece of the larger information governance puzzle. “It costs around 20 cents to BUY 1GB of storage, however, it costs around $3,500 to REVIEW 1GB of storage.”
“Email ROI Calculator” AIIM
![Page 8: WHY High-Technology is · High-Technology is NOT ENOUGH for True WHY Information Security. information is constantly being created, shared, protected, manipulated and managed](https://reader033.vdocuments.mx/reader033/viewer/2022060213/5f052c577e708231d411a349/html5/thumbnails/8.jpg)
Viewpointe has paved the way in this field,
helping over 1,500 customers
safely manage more than 130 billion items.
![Page 9: WHY High-Technology is · High-Technology is NOT ENOUGH for True WHY Information Security. information is constantly being created, shared, protected, manipulated and managed](https://reader033.vdocuments.mx/reader033/viewer/2022060213/5f052c577e708231d411a349/html5/thumbnails/9.jpg)
We know how important considerations like authentication and threat detection are to achieving
TRUE SECURITY
![Page 10: WHY High-Technology is · High-Technology is NOT ENOUGH for True WHY Information Security. information is constantly being created, shared, protected, manipulated and managed](https://reader033.vdocuments.mx/reader033/viewer/2022060213/5f052c577e708231d411a349/html5/thumbnails/10.jpg)
four layers of security.
VIEWPOINTE OFFERS
TO PUT THIS INTO PRACTICE,
![Page 11: WHY High-Technology is · High-Technology is NOT ENOUGH for True WHY Information Security. information is constantly being created, shared, protected, manipulated and managed](https://reader033.vdocuments.mx/reader033/viewer/2022060213/5f052c577e708231d411a349/html5/thumbnails/11.jpg)
PROCESS PROCEDURE& GOVERNANCE
![Page 12: WHY High-Technology is · High-Technology is NOT ENOUGH for True WHY Information Security. information is constantly being created, shared, protected, manipulated and managed](https://reader033.vdocuments.mx/reader033/viewer/2022060213/5f052c577e708231d411a349/html5/thumbnails/12.jpg)
THIS INCLUDES EVERYTHING FROM audits, to best practices, to reporting and compliance.5,000 SLA Measurements Tracked and Reported
150+ Audit Examinations AnnuallyViewpointe maintains extensive compliance processes based on best practices, receiving SOC 2 compliance review of security, availability, processing, confidentiality, and privacy practices, and we are audited by FFIEC and most of our customers each year.
![Page 13: WHY High-Technology is · High-Technology is NOT ENOUGH for True WHY Information Security. information is constantly being created, shared, protected, manipulated and managed](https://reader033.vdocuments.mx/reader033/viewer/2022060213/5f052c577e708231d411a349/html5/thumbnails/13.jpg)
TECHNOLOGY-BASED
SECURITY
![Page 14: WHY High-Technology is · High-Technology is NOT ENOUGH for True WHY Information Security. information is constantly being created, shared, protected, manipulated and managed](https://reader033.vdocuments.mx/reader033/viewer/2022060213/5f052c577e708231d411a349/html5/thumbnails/14.jpg)
that the technology you employ is highly available, privately managed and allows for privileged access.
YOU NEED TO KNOW
![Page 15: WHY High-Technology is · High-Technology is NOT ENOUGH for True WHY Information Security. information is constantly being created, shared, protected, manipulated and managed](https://reader033.vdocuments.mx/reader033/viewer/2022060213/5f052c577e708231d411a349/html5/thumbnails/15.jpg)
Both the assigned Primary and Alternate Site house 100% of a customer’s content and are provisioned for full production load.
Viewpointe leverages geographically dispersed Tier 3+ Data Centers
Viewpointe completes Almost 50 Successful Disaster Recovery Tests annually
![Page 16: WHY High-Technology is · High-Technology is NOT ENOUGH for True WHY Information Security. information is constantly being created, shared, protected, manipulated and managed](https://reader033.vdocuments.mx/reader033/viewer/2022060213/5f052c577e708231d411a349/html5/thumbnails/16.jpg)
NETWORKSECURITY
![Page 17: WHY High-Technology is · High-Technology is NOT ENOUGH for True WHY Information Security. information is constantly being created, shared, protected, manipulated and managed](https://reader033.vdocuments.mx/reader033/viewer/2022060213/5f052c577e708231d411a349/html5/thumbnails/17.jpg)
We implement elements like
Viewpointe leverages the TLS 1.2 standard and AES-256 encryption to protect customer data.
CUSTOMER-SPECIFIC NETWORK CONNECTIVITY AND COMBINED DATA-IN-TRANSIT AND DATA-AT-REST ENCRYPTION TO SAFE-GUARD ALL DATA
![Page 18: WHY High-Technology is · High-Technology is NOT ENOUGH for True WHY Information Security. information is constantly being created, shared, protected, manipulated and managed](https://reader033.vdocuments.mx/reader033/viewer/2022060213/5f052c577e708231d411a349/html5/thumbnails/18.jpg)
To maintain network detection and monitoring at
Viewpointe network detection, system monitoring and managed services provide ongoing protection against service and data threats.
peak performance,
![Page 19: WHY High-Technology is · High-Technology is NOT ENOUGH for True WHY Information Security. information is constantly being created, shared, protected, manipulated and managed](https://reader033.vdocuments.mx/reader033/viewer/2022060213/5f052c577e708231d411a349/html5/thumbnails/19.jpg)
PHYSICALSECURITY
![Page 20: WHY High-Technology is · High-Technology is NOT ENOUGH for True WHY Information Security. information is constantly being created, shared, protected, manipulated and managed](https://reader033.vdocuments.mx/reader033/viewer/2022060213/5f052c577e708231d411a349/html5/thumbnails/20.jpg)
This final level is about PEOPLE AND PLACES
![Page 21: WHY High-Technology is · High-Technology is NOT ENOUGH for True WHY Information Security. information is constantly being created, shared, protected, manipulated and managed](https://reader033.vdocuments.mx/reader033/viewer/2022060213/5f052c577e708231d411a349/html5/thumbnails/21.jpg)
Geographically diverse data centers and support staff limits impact from natural disasters.
24x7 site security, IT security and operational monitoring provides rapid response to availability or security threats.
THINK: 24/7
![Page 22: WHY High-Technology is · High-Technology is NOT ENOUGH for True WHY Information Security. information is constantly being created, shared, protected, manipulated and managed](https://reader033.vdocuments.mx/reader033/viewer/2022060213/5f052c577e708231d411a349/html5/thumbnails/22.jpg)
BUT TECHNOLOGY ALONE WON’T SOLVE YOUR SECURITY PROBLEMS.
IT’S A TOUGH FACT TO FACE,
![Page 23: WHY High-Technology is · High-Technology is NOT ENOUGH for True WHY Information Security. information is constantly being created, shared, protected, manipulated and managed](https://reader033.vdocuments.mx/reader033/viewer/2022060213/5f052c577e708231d411a349/html5/thumbnails/23.jpg)
NAÏVE BELIEFS that cloud providers are totally responsible for their customers’ security discourages organizations from ensuring their employees use cloud services appropriately.” As a result Gartner predicts,
“THROUGH 2020, 95% OF CLOUD SECURITY FAILURES WILL BE THE CUSTOMER’S FAULT.”
“Clouds Are Secure: Are You Using Them Securely?” | 22 September 2015 G00281279 | Analyst(s): Jay Heiser
![Page 24: WHY High-Technology is · High-Technology is NOT ENOUGH for True WHY Information Security. information is constantly being created, shared, protected, manipulated and managed](https://reader033.vdocuments.mx/reader033/viewer/2022060213/5f052c577e708231d411a349/html5/thumbnails/24.jpg)
is NOT about denying the possibility of a security breach.
BEING PREPARED
![Page 25: WHY High-Technology is · High-Technology is NOT ENOUGH for True WHY Information Security. information is constantly being created, shared, protected, manipulated and managed](https://reader033.vdocuments.mx/reader033/viewer/2022060213/5f052c577e708231d411a349/html5/thumbnails/25.jpg)
Instead, it’s about having a breadth of safeguards in place to
react quickly, limit damage and constantly improve.
![Page 26: WHY High-Technology is · High-Technology is NOT ENOUGH for True WHY Information Security. information is constantly being created, shared, protected, manipulated and managed](https://reader033.vdocuments.mx/reader033/viewer/2022060213/5f052c577e708231d411a349/html5/thumbnails/26.jpg)
That’s how we help settle
OVER $6 TRILLION IN TRANSACTIONS AND LOAD
over 14 billion documents annually.
![Page 27: WHY High-Technology is · High-Technology is NOT ENOUGH for True WHY Information Security. information is constantly being created, shared, protected, manipulated and managed](https://reader033.vdocuments.mx/reader033/viewer/2022060213/5f052c577e708231d411a349/html5/thumbnails/27.jpg)
Learn more about how Viewpointe can help you create a private, purpose-built, proven solution.
viewpointe.com/our-services