1 / 10

DATA SECURITY

DATA SECURITY

Download Presentation

DATA SECURITY

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Data security It’s your Data – Are you sure it’s Safe? Never Sacrifice Security | Keep your Data Safe

  2. introduction • Data is information that has been stored in the form of Digitalization. • Data Security is the practice of keeping data protected from unauthorized access. • Data Security is also known as System Data Security, Information Security or Computer Security.

  3. Secure your data with our advanced solutions for Advanced Email Security, Advanced Threat Protection, Data Loss Prevention and Endpoint Protection. • Data Loss Prevention solutions ensure that organization does not lose any critical data due to intentional or inadvertent acts of employees sending out data outside company’s network. DLP solution is used for detecting/monitoring data loss at endpoint, cloud or at network level.

  4. PRINCIPLES OF DATA PROTECTION

  5. Types of Data Security and importance • Network Layer Security • IPSec Protocol • Email Security Data Security software protects computer/network from online threats when connected to the internet. The data security software may also protect other areas such as programs or operating-system for an entire application. Its goal is to recognize rules and actions to apply against strikes on internet security.

  6. key concepts of data security • Availability • Integrity • Confidentiality

  7. Availability • Data needs to be available at all necessary times. • Data needs to be available to only the appropriate users. • Need to be able to track who has access to and who has accessed what data.

  8. Integrity • Need to ensure that the data has been edited by an authorized source. • Need to confirm that users accessing the system are who they say they are. • Need to verify that all report requests are from authorized users. • Need to verify that any outbound data is going to the expected receiver.

  9. Confidentiality • Need to ensure that confidential data is only available to correct people. • Need to ensure that entire database is security from external and internal system breaches. • Need to provide for reporting on who has accessed what data and what they have done with it. • Mission critical and Legal sensitive data must be highly security at the potential risk of lost business and litigation.

  10. Contact Us Contact No : 9216510306 Address : SCO 365, Sector 35(B) Chandigarh-160022 Email id : fore@foresolutions.net Website : www.foresolutions.net

More Related