Endpoint Protection Solutions
Business changes are placing tremendous demands on IT. New technologies are being adopted by IT as a response to these pressures – but these trends pose critical and dangerous malware risks to the organization.
Adacom enables customers to embrace new technologies and feel confident that they’re protected against the threats of tomorrow’s IT trends.
Endpoint security is a holistic security approach assuming the independence and self-responsibility of every single endpoint client, (ie PC, laptop, iPad, smartphone) for its own security. During earlier years, endpoint security was presumed unnecessary since there were very few mobile devices and laptops connected externally to the network and very limited access to the network available resources from them. However, as remote users increase, the collaboration between different companies and networks increase, the use of mobile devices increase and the data trafficking increases exponentially so do the threads increase for all these endpoints either from out-of-network connections or from inside the network threads.
Recent research and statistics show that up to 70% of threads occur from users and clients inside the network and endpoint security is the only logical solution to address it. A variant of the endpoint security is the on-demand securing of a device. Another look at endpoint security should include computer level tools that provide administrative control over the use of memory devices. Controlling the use of memory sticks, SD cards and other flash drive type memory devices is top priority in most organizations lately. Endpoint security also includes the protection of a business’s network from employee memory devices that may unknowingly contain malware.
Endpoint Encryption Solutions
The number of data that reside on laptops grow every day. The new way of working, with the majority of the employees being most of the times out of the office, or even travelling around the world, increases the risk of stolen or lost computers that contain GB of data, among which a lot of confidential information reside. In order to ensure that these data will not end up to unauthorized users and trying to immunize the company’s intellectual property, it is mandatory to implement encryption solutions that will cover both internal and external storage devices, such as the disk where the operating system resides as well as the usb sticks and drives that are connected to the machine.
There are even cases where the need for Endpoint Encryption is part of a regulation, a governance guide or a standard like PCI-DSS.
Some of the key benefits are summarized below:
- Organizations Protect and prevent their information from accidental data loss and assure protection for desktops and laptops against unauthorized access
- Meet government directives and regulations and by having full audit trail
- Provides scalable, centralized management for easy deployment and administration
- Offers boot protection, pre-boot authentication, and pre-boot event logging and supports Single Sign-On (SSO) to avoid the need to remember and enter multiple passwords
Other endpoint encryption solutions can even include more advanced technics so that after their integration with DLP solutions, to provide the automation of encryption of confidential data when they are copied to external usb devices.
Data Loss Prevention (DLP) Solutions
Data Loss Prevention (DLP) simplifies the discovery and detection of sensitive data and protects against its deliberate, unauthorized or accidental loss.
Through a transparent security program, organizations can protect their intellectual property, comply with regulation and standards and raise their overall security posture, without affecting users’ privacy.
- Discover: find out where the sensitive data is used (servers, desktops, laptops, databases, storage arrays, file shares).
- Monitor: find out how the sensitive data is used
- Protect: prevent leakage through email and Internet use.
- Manage: enforce unified security policies
A DLP solution delivers a unified solution to discover, monitor and protect confidential data wherever it is stored or used. The solution automates the enforcement of policies designed to prevent the unauthorized loss of information. It scans emails and attachments for confidential information and, based on criteria established by the organization’s risk and audit group, issues the user with a warning and reports the incident or blocks the suspicious message from leaving the organization.
By implementing a DLP solution, organizations reduce both their risk profile and internal and external threats to customer data.
ADACOM experienced experts can assist organizations throughout the entire lifecycle of an enterprise-wide DLP program, by providing customized consulting, delivery and support services.
Data Security Solutions
Information security has been a necessity ever since people realized that information assets had value. In modern times, computer systems allow for the storage and processing of large volumes of data that present rich targets to organized crime, foreign intelligence and opportunists. This is exactly the problem faced by organizations that conduct electronic financial transactions, in particular, credit card transactions. Customer credit card data has become a major target globally with well-resourced organized crime syndicates and freelancers eager to meet demand by hacking into the databases and computer networks of major businesses, particularly in the retail sector, to extract credit card data for financial gain. A simple internet search returns hundreds of rows of consumer credit card data offered as a sample of vast databases of stolen records.
To combat this threat, the five major credit card brands have introduced various schemes requiring their partners to implement information security controls. The most recent evolution being the Payment Card Industry Data Security Standard (PCI DSS). Complying with the PCI DSS is a requirement for any organization that processes, transmits or stores credit card data. In fact the scope can even include third parties that provide service that could impact on another organization’s credit card processing systems.
Data encryption and control solutions focus on sensitive data, providing persistent protection throughout its lifecycle, wherever it resides. Information is protected at every moment—when it is created by an employee on a company laptop, shared with a business partner by e-mail, stored in an enterprise database, processed by an application, and accessed by a field employee on a mobile device. Data encryption and control solutions cover data center protection for databases, applications, and mainframes as well as endpoint protection for files and full disk encryption.
Modern Data Security solutions provide a unified platform with data encryption and granular access control capabilities that can be applied to databases, applications, mainframe environments, and individual files. By providing centralized management of keys, policies, and essential functions, data security solutions simplify administration, help ensure compliance, and maximize security.
Security Information and Event Management (SIEM) Solutions
As the volume and the importance of security log data in an organization grows, it becomes crucial to store it in a compressed format and have better ways of archiving and analyzing it. Regulations such as the Sarbanes-Oxley Act have emboldened auditors to require that log data be kept longer in case it is needed for a future investigation.
Security information and event management (SIEM) systems help organizations, store, correlate and analyze security log data from many different information systems. This data may prove valuable as part of a network security organization’s immediate response to an attack, making it possible to see, for example, all the virtual private network connections that were active when a behind-the-firewall server came under attack. An example is a case of an incident discovered after the fact, such as the theft of credit card numbers, the system could produce reports for police and regulators from the archived log data.
An important factor when choosing a SIEM solution is the available integration with a broad array of third party security and network products, including firewalls and routers, for the highest level of visibility and protection. A modern SIEM solution collects and combines network activity data, security events, logs, vulnerability data, and external threat data into a powerful system that intelligently normalizes, correlates, and prioritizes. The result is in improving remediation and response times, and greatly enhancing the effectiveness of IT security administrators. A SIEM solution enables the security administrators of an organization to focus on actionable information ,such as security events, rather than struggle to interpret millions of daily logs generated by network security appliances, routers, switches, servers, and applications. This is achieved by the SIEM solution by using advanced surveillance techniques and forensics analysis to deliver situational awareness of both internal and external threats including suspicious content, instant messaging file transfers, traffic from undesirable geographies, data theft, and malicious worm infections.
Email & Web Security Solutions
Although today the ways of communication have been evolved, email remains at the top of preference in and between organizations. Due to its simplicity and popularity, the risks related to email infrastructure are increasing every day. Both the availability as well as the security of the email are today’s priorities so there is need for implementing solutions that protect from spam, viruses and other more sophisticated attacks, while on the same time offer encryption mechanisms in order to secure the emails when leaving the organization.
On the other hand, due to the spread of social networks and untrusted web sites, organizations need solutions that provide the appropriate mechanisms to control employee’s activities in order to enhance their productivity and also protect the organization by web pages with malicious code.
The balance between functionality and security both for email and web security policies need great attention and fine tuning, which Adacom can deliver due to its methodical approach based on customer’s needs and best practices.