‘Sentry’. Information Leakage and Loss . Data Loss, Theft and Leakage happen in a number of environments and for a number of reasons. To combat many of these, ‘Sentry’ performs quickly and effectively in: Panic Situations
Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.
Data Loss, Theft and Leakage happen in a number of environments and for a number of reasons. To combat many of these, ‘Sentry’ performs quickly and effectively in:
Loss or theft of a mobile computer where its whereabouts are unknown.
Internal staff theft - widely perceived to be a major source of sensitive data leakage.
All too often when an employee leaves a position, for whatever reason, they take the employer’s data with them.
Computer Replacement Programmes
When an organisation / person replaces its computers they are often dispatched with inadequate or no measures taken to cleanse them of data.
‘Sentry’ is a simple but effective tool that securely eradicates computer data
that may be at risk of moving
out of its owner’s control.
Data Vault Security ‘Sentry’
Issues Self Destruct Command
To Required Computer.
Authorised Internal ‘Sentry’ Operator
or Data Vault Security is asked to destroy a particular device.
Device receives ‘Sentry’
delete Instruction and
Whatever the circumstance, Panic, Critical or Controlled ‘Sentry’ works in the same way.
The authorised operator identifies the relevant device through the ‘Sentry’ service and quickly issues a request to erase all sensitive data.
When the command reaches the device the data is eradicated and the proof is delivered to the relevant parties almost immediately.