archive-lv.com


Web directory, archive
Search archive-lv.com:


Find domain in archive system:
archive-lv.com » LV » D » DSS.LV

Total: 207

Choose link from "Titles, links and description words view":

Or switch to "Titles and links view".
  • Symantec - Data Security Solutions
    security assets Specialization of DSS for many years has been transfer of innovations to local pan Baltic market Symantec Symantec helps consumers and organizations secure and manage their information driven world Learn about the company read what media and analysts have to say about Symantec or find positions open in our team Whole Disk Encription Encryprtion platform Email encryption File Share Encryption Backup and mainframe encryption List of manufacturers AirTight

    Original URL path: http://dss.lv/en/razotaji/symantec/25/ (2013-11-15)
    Open archived version from archive


  • Services/solutions - Data Security Solutions
    the computer performs when it is switched on A boot loader or a bootstrap loader is a short computer program that loads the main operating sys tem for the computer The boot loader first looks at a boot record or partition table which is the logical area zero or starting point of the disk drive Drive encryption modifies the zero point area of the drive A computer protected with Symantec Drive Encryption presents a modified pre boot environment Figure 1 to the user This modified pre boot screen prompts the user for authentication credentials in the form of a passphrase typically a longer password often resembling a sentence At this point the computer may ask for additional credentials such as a smart card token or other two factorauthentication This full disk encryption software protects data from unauthorized access providing strong security for intellectual property customer and partner data Protected systems can be centrally managed by Symantec Encryption Management Server simplifying deployment policy creation distribution and reporting After the user enters valid authentication credentials the operating system continues to load as normal and the user can access thecomputer Drive encryption software also provides the ability to encrypt removable storage media such as USB drives When you insert an encryptedUSB drive into a computer system it prompts for passphrase and upon successful authentication you can use the USB drive Drive Encryption behind scenes File System basics During the boot process the system initializes the computer s file systems When a user requests access to a file i e creates opens or deletes a file the request is sent to the operating system input output I O manager which forwards the request to the file system manager The file system manager processes data in blocks Life with Encryption Business as Usual Most drive encryption software operates in conjunction with the file system architecture It filters I O operations for one or more file systemsor file system volumes When a drive is encrypted with drive encryption for the first time it converts unencrypted drive blocks into encrypted blocks one at a time Drive Encryp tion allows users to continue working as normal during this initial encryption process by varying the amount CPU powerassigned to the initial encryption process When a user accesses a file Drive Encryption decrypts the data in memory before it is presented for viewing If the user makes any changesto the file the data is encrypted in memory and written back to the relevant disk drive block just as it would be without encryption Decrypted data is never available on the disk The encryption decryption process happens at such a speed that it appears completely transparent to the user Whole Disk Encryption Recovery The most common cause for data recovery is a lost or forgotten passphrase Therefore drive encryption software must include a recovery function There are several ways to access an encrypted system in case of a forgotten passphrase with Symantec Drive Encryption including local self recovery a recovery token

    Original URL path: http://dss.lv/en/pakalpojumi/data-security/whole-disk-encription/30/ (2013-11-15)
    Open archived version from archive

  • Services/solutions - Data Security Solutions
    for users policies keys recovery and audit trails Ability to scale to multiple applications disk encryption à mail encryption à file folder etc Multiple recovery methods including user self recovery Compatibility with EnCase Forensics Suite Dynamic policy updates to clients Flexible architecture supporting high availability failover and disaster recovery needs The solution has a lockout feature to prevent brute force attacks Support for removable media forced and voluntary encryption ENDPOINT Complete data protection for all endpoints laptops desktops USB drives optical media and smart phones Drive Encryption Provides organizations with full disk encryption for all data user files swap files system files hidden files etc on desktops laptops and removable media EMAIL A comprehensive suite of email encryption products from desktop to gateway to mobile devices Gateway Email Encryption Provides centrally managed standards based email encryption to secure email communications with customers and partners without the need for client software Desktop Email Encryption End to end email encryption that automatically encrypts and decrypts email as it is sent and received on desktops and or laptops without affecting the end user email experience FILES Protection for files from team collaboration to server processes to external transfer Command Line Enables organizations to quickly and easily integrate encryption into batch processes scripts and applications to ensure the security of corporate data at rest or in transit File Share Encryption Allows users to automatically and transparently encrypt individual files and folders on a file server enabling secure sharing of protected documents spreadsheets graphics files and more MANAGEMENT Reduce complexity and cost through consolidated administration including encryption key management and policy rollout Encryption Management Server Provides organizations with a single console to manage multiple Symantec encryption applications BUNDLES Combine encryption solutions to create a more secure user environment and better address regulatory and privacy compliance

    Original URL path: http://dss.lv/en/pakalpojumi/data-security/encryprtion-platform/31/ (2013-11-15)
    Open archived version from archive


  • Services/solutions - Data Security Solutions
    Research 74 percent of an organization s intellectual property resides in an email or attachment Email is accessed everywhere from various endpoints networks and environments By utilizing desktop gateway and mobile encryption solutions your data can be protected wherever it goes and wherever it resides even the cloud Official webpage With Symantec Encryption Management Server enterprises can centrally manage policy and security practices across the company from a single web based console reducing management costs and hassles Flexible Delivery Options to Match Your Needs Not every organization is the same organizations may combine Symantec email encryption solutions to address different information protection requirements The encryption solutions for email allow simple seamless integration with partners existing standards based email encryption solutions such as OpenPGP and S MIME If recipients don t have their own email encryption solutions messages can be pushed via secure password protected PDF or users can pull their email via secure Web system to retrieve and respond to emails Desktop Email Encryption Automatically encrypts decrypts digitally signs and verifies messages according to individual or centrally managed policies Email is encrypted immediately at the client ensuring communications are secure before hitting internal networks or stored in the cloud Compatible

    Original URL path: http://dss.lv/en/pakalpojumi/data-security/email-encryption/32/ (2013-11-15)
    Open archived version from archive

  • Services/solutions - Data Security Solutions
    stored and shared in this way is secure and only accessible to authorized users if they are to be used as true productivity tools File Share Encryption protects data on PCs and enables teams to securely share documents on internal and cloud based file servers by automatically and transparently encrypting files and folders based on either manual or centralized policy This approach ensures only authorized users can read or modify files fulfilling partner and regulatory requirements for information partitioning and security File Share Encryption extends file server access controls to include strong end to end encryption allowing content owners or administrators to specify access rights for specific groups individuals applications or file locations Persistent File Encryption on Desktops Laptops Network and Cloud Servers With File Share Encryption authorized users can save and share encrypted files with no change to their applications or business practices Administrators are able to set encryption policy so content such as documents spreadsheets presentations video and audio are automatically encrypted when produced from selected applications or sent to specific folders Once encrypted files and folders can be moved without jeopardizing their encrypted status ensuring only authorized users have access to sensitive data Confidently Access Your Data Anywhere With Your Mobile Device File Share Encryption for iOS enables mobile users by allowing them to securely access encrypted files directly from cloud based file servers Users tap the File Viewer application on their mobile device and access their files as they normally would Symantec File Viewer can be downloaded for free from the Apple App Store Key Features Allows users to transparently read write and share encrypted files across their organization internally and in the cloud By embedding encryption into the file or folder it can be moved without losing its protection ensuring authorized access only by those

    Original URL path: http://dss.lv/en/pakalpojumi/data-security/file-share-encryption/33/ (2013-11-15)
    Open archived version from archive

  • Services/solutions - Data Security Solutions
    transfer and email protocols have no built in security For organizations that need to securely exchange large volumes of information PGP Command Line from Symantec can protect business critical data easily and with little impact on existing systems Command Line can also be used to protect large volumes of information stored on servers from unauthorized access Industry leading data encryption Command Line secures data in automated processes helping organizations comply with regulations and protect privacy and confidentiality Available on many platforms Command Line secures mission critical data across the enterprise Unlike alternative solutions Command Line helps protect data at rest in motion and in use with support for digital signatures to generate audit trails Flexible integration in new and legacy processes Command Line can be integrated in virtually any automated process The life cycle of existing business applications can be extended by adding security with little impact on the application itself New applications benefit from leveraging an established proven cryptographic standard using a straightforward interface Central management Command Line is a PGP Encryption Platform from Symantec enabled application The PGP Encryption Platform provides a strategic enterprise encryption framework for shared user management policy and provisioning automated across multiple integrated encryption applications Command Line leverages keys managed by PGP Universal Server from Symantec expediting deployment and systems management Command Line can be used in combination with other PGP encryption solutions to provide multiple layers of security Key Features Command line based scriptable encryption which operates on 35 different platforms from laptops to servers to mainframes Integrates with most existing scripting tools such as Shell Scripts Perl and Windows batch files Over 300 encryption operations available encrypt decrypt wipe self decrypting archive creation and more Can allocate and manage keys as well as interact with keyservers to support uploading and downloading of keys from keyservers plus searching for keys over LDAP Key Benefits Easily add encryption to existing operational scripts and applications such as backup procedures end to end file transfers and lock box based data access Automate labor and time intensive encryption activities such as file server encryption and ftp file transfers Simplify true end to end file transfer protection Easily protect files not only in transit but also at rest on sending and receiving file servers Usage scenarios Command Line is easily integrated into script driven business processes Once deployed Command Line automatically encrypts and decrypts data on the fly File transfer security Provides encryption for file transfer between internal systems suppliers and customers Email encryption Encrypts emails in automated processes using the OpenPGP or S MIME standard Faster transmissions Compresses data to save transfer time and bandwidth Secure file deletion Securely and permanently eliminates all traces of sensitive files from a disk Fast and flexible deployment Command Line is a flexible security application that easily integrates with most commercial and home grown data transfer and processing systems Secure data exchange with any recipient Provides multiple options for protecting data to ensure secure transmissions regardless of the technical capabilities of

    Original URL path: http://dss.lv/en/pakalpojumi/data-security/backup-and-mainframe-encryption/34/ (2013-11-15)
    Open archived version from archive

  • Varonis - Data Security Solutions
    globe to help companies of all sizes protect their IT security assets Specialization of DSS for many years has been transfer of innovations to local pan Baltic market Varonis The Varonis Data Governance suite helps organizations manage and protect their unstructured and semi structured data the documents spreadsheets presentations media files and other business data in file servers NAS devices SharePoint and Exchange These critical data assets are massive and growing rapidly According to industry analysts 80 of organizational data is unstructured Unstructured data will grow by 650 in the next five years Even though these assets are growing and important critical questions about them can t be answered without Metadata Framework technology Who has access to them Who should and shouldn t have access to them Who uses them Who abuses their access Who owns them Which are sensitive and exposed to risk The Varonis Data Governance Suite helps answer these urgent questions aligns critical business assets with their proper owners and empowers them with intelligence to make decisions about access controls and appropriate use that are then executed without IT intervention Unstructured Data Risk Management List of manufacturers AirTight Networks BalaBit Vasco Cellcrypt Centrify ForeScout IMB Security Systems

    Original URL path: http://dss.lv/en/razotaji/varonis/26/ (2013-11-15)
    Open archived version from archive

  • Services/solutions - Data Security Solutions
    critical data Varonis offers a comprehensive and effective solution for data governance using a scalable and extensible metadata framework THE CHELLANGE Unstructured data in organizations is exploding and out of control It encompasses all distinct files documents images spreadsheets videos and audio files stored on servers NAS devices and in semi structured repositories like SharePoint Managing and protecting this data presents enormous challenges Permissions Determining who has access to a data set which folders a user or group can access and identifying excess unneeded permissions Access Auditing IT can t answer questions like Who accessed or deleted my data Data Ownership IT can t reliably identify business owners of data sets and has even less ability to involve data owners in the governance process Operational Manual permissions and group changes are unreliable Business users and data owners are unable to effectively make decisions about data access High Risk Stale excess permissions are rarely revoked Data is open to global access groups with no reliable way of remediating access without impacting the business THE SOLUTION The Varonis Data Governance Suite provides Actionable intelligence about your data Workflow that directly involves business users and data owners Automation that reduces the burden on your organization s IT resource Varonis DataPrivilege DataPrivilege automates data governance by providing a framework for users and data owners to be directly involved in the access review and authorization workflows A configurable web interface for data owners business users and IT administrators automates data access requests owner and IT authorization of changes automated entitlement reviews and business data policy automation e g ethical walls A complete audit trail ensures that data governance policies are in place and being adhered to Benefits Automated entitlement reviews provided to data owners with recommendations for access removal generated by DatAdvantage Access control workflow

    Original URL path: http://dss.lv/en/pakalpojumi/network-security/unstructured-data-risk-management/40/ (2013-11-15)
    Open archived version from archive


archive-lv.com, 2017-08-21