Protecting the Confidentiality and Integrity of
1 / 1

Protecting the Confidentiality and Integrity of

Author : tatyana-admore | Published Date : 2025-06-16

Description: Protecting the Confidentiality and Integrity of Corporate and Client Data When in the Hands of a Mobile Workforce Mobile Protection for Trustmark Insurance Topics External Internal Approach External Protection Protection of data on a

Presentation Embed Code

Download Presentation

Download Presentation The PPT/PDF document "Protecting the Confidentiality and Integrity of" is the property of its rightful owner. Permission is granted to download and print the materials on this website for personal, non-commercial use only, and to display it on your personal computer provided you do not modify the materials and that you retain all copyright notices contained in the materials. By downloading content from our website, you accept the terms of this agreement.

Transcript:Protecting the Confidentiality and Integrity of:
Protecting the Confidentiality and Integrity of Corporate and Client Data When in the Hands of a Mobile Workforce Mobile Protection for Trustmark Insurance Topics External / Internal Approach External Protection – Protection of data on a device that has the potential to be externalized – Products: MDM, MDP Internal Protection – Protection of data before it is moved to a device – Products: DLP, SIEM Proposed Approach and Tools Market Classification of Tools Laptops Data Smart Phones Monitoring and Compliance Notes: Data Loss Prevention products are sometimes referred to as Data Leak Prevention Mobile Data Protection is sometime referred to as Endpoint Protection because they can protect both internal and external Mobile Data Protection Mobile data protection (MDP) is a category of products for securing data on movable storage systems - laptops, smartphones, and removable media. Provides common protection policies across multiple platforms Provides auditable proof that data is protected. Should entail minimal support costs Should provide FIPS-140 certified encryption* *Federal Information Processing Standards, issued by NSIT Mobile Device Management Mobile Device Management (MDM) is a category of applications for managing smartphones. Includes the following functionality: Software Distribution — The ability to manage and support mobile application including deploy, install, update, delete or block. Policy Management — Development, control and operations of enterprise mobile policy. Inventory Management — Beyond basic inventory management, this includes provisioning and support. Security Management — The enforcement of standard device security, authentication and encryption. Service Management — Rating of telecom services. Data Loss Protection Data loss protection (DLP) is a category of tools that protects data as it leaves the network (sometimes referred to as “Content-Aware” DLP). Includes the following functionality: Enables the dynamic application of policy based on the classification of content Can be applied to data in rest (storage), data in use (during an operation), and data in transit (across a network) Can dynamically apply policies , such as log, report, classify, relocate, tag , or encrypt protections. Helps organizations develop, educate and enforce better business practices concerning the handling and transmission of sensitive data. Designed to: Protect customer information, HIPPA privacy, and intellectual property Stop data leaks to media Provide device and port control when protected data is passed to laptops, USB drives, CDs, etc. Provide endpoint auditing and discovery – where’s my data? SIEM – Security Information and Event Management Security Information and Event Management (SIEM) is a category of tools

Download Document

Here is the link to download the presentation.
"Protecting the Confidentiality and Integrity of"The content belongs to its owner. You may download and print it for personal use, without modification, and keep all copyright notices. By downloading, you agree to these terms.

Related Presentations

Confidentiality Protecting and Preserving Protecting the Confidentiality of Justice-Involved Youth Integrity Safer lawns and Homes The Role of Confidentiality in the CONFIDENTIALITY Academic Integrity and Plagiarism The Gospel and Integrity TOPIC LATTICE-BASED ACCESS-CONTROL MODELS Integrity God extols personal integrity as a virtue (Job 2:3, 27:5, 31:6; Psa. 7:8, 25:21, MORPHEE Plus besoin de cachets avec le thé Morphée Privacy and Confidentiality of Health Information Establishing and Supporting Confidentiality and Boundaries