Upload
others
View
1
Download
0
Embed Size (px)
Citation preview
Best Practices to Secure Data from Modification: Eliminating the Risk to Online Content
Page 1
�
GreenTec™
���� Sunrise !alle" Dri#e$ Suite %%- �
Reston$ !' � �(�
)))*+reen,ec--S'*com
)))*+reen,ec-Media*com
���������������� ������������������������
���������� �� �� � �� ������ �������
Best Practices to Secure Data from Modification: Eliminating the Risk to Online Content
Page 2
�
ntil recentl"$ true Read-Only disk dri#es that
could reall" protect "our data )ere not pre#iousl"
a#ailable*
G����T�-U�A de#eloped true Read-Only high-
speed$ high-densit" WORM (Write Once$ Read Man")
disk dri#es for a sensiti#e +o#ernment 'genc"*
We are no) offering these WORM disks to other
+o#ernment 'gencies and select Organizations to
protect #aluable data assets*
,he WORM disk dri#es protect data from accidental or intentional modification$ alteration$
deletion or re-formatting )ith capacities ranging from 3 Terabytes up to Multiple Petabytes*
Protection is performed at the ph"sical disk le#el$ and is embedded in the disk dri#e itself$ so it
does not matter )hat operating s"stem or access controls are placed on the disk$ the data
cannot be modified*
,he WORM disk )orks )ith "our existing )orkstations$ laptops and ser#ers and is a#ailable in
both internal and external disk #ersions for all standard computer s"stems and supports all file
formats*
,he GreenTec WORM is a superior inexpensive solution for Read-Only storage requirements
)ith applications in protection of:
• Video Surveillance
• Intelligence Collections
• Law Enforcement
• Chain-of-Custody
• Cyber-Attack Protection
• Medical Records
• Personnel Records
• Corporate Records
• Legal Documents
• Compliance Reports
• Financial Records & Transactions
• Contract & Business Records
• SEC, SOX, Dodd-Frank Retention
• eMail Repositories
• Backup and Archives
• Secure Audit Log-files and Data
• Video, Audio & Music Libraries
• Training Materials
• Web Site Protection
• Disgruntled Employee Attacks
• Secure Data Protection
,he WORM technolog" pro#ides a #er" cost-effecti#e defensi#e capabilit" for securel"
protecting sensiti#e data )ith simplicit" and is eas" to use for "our organization*
In addition to WORM disks$ +reen,ec--S' pro#ides ad#anced modular high-performance
energ"-sa#ing ser#ers and traditional storage s"stems for all of "our processing$ storage$ #ideo
and secure cloud needs*
Best Practices to Secure Data from Modification: Eliminating the Risk to Online Content
Page 3
�
�
Organizations toda" ha#e demanding needs to ensure that their sensiti#e data is
protected*
Considerable damage could be done if critical or sensiti#e files are deleted or
altered either accidentall" or intentionall"*
'll t"pes of records must be protected to a#oid a disaster$ fraud$ loss$ business
interruption$ dispute or legal actions b" ensuring the integrit" of "our data*
Your email$ forms$ documents$ pictures$ #ideo$ audio$ transactions$ reports$
audits$ certifications and other files need to be protected*
�
• L�w�E��������� – V�d�� ��d �ud�� d����� �v�d��c� c����c����
• ��pl����Ch��-���C ����y – �� ��r ��d��� ��d �r�� p�r� pr�c�dur�
• M���l�R����� – P������ & D�c��r ��f�r������, pr�c�dur� , pr� cr�p���� ,
�� ur��c�, ��d�c�� �����, r�p�r� , b����� ��f�r������
• ��������l�R����� – P�yr���, u��� r� �urc� , �� ur��c�, p�rf�r���c�
r�v��w , r� u�� , f�r�
• C��p������R����� – ��rp�r��� f���� , �������c�u�� pr�p�r�y, ��v����ry,
D�AA �ud�� , P�A�B �ud��
• C��pl����R�p���� – S�� r�p�r���, S�rb��� -�x��y, D�dd-Fr��� r�c�rd
r�������� c��p����c�, HIPAA, D�AA r�qu�r����� , �ud��
• F����l�R������&�T��������� - Acc�u����, ��x� , b��� &, v��d�r
r�c�rd
• Lb������– V�d��, Aud��, B��� , Mu �c, D�cu���� , F��� , �������
• L���l��� ����� – ��� �r�����, ���������, �������c�u�� pr�p�r�y
• C�������&�� ������R����� – Ar������ , c���r�c� p�p�rw�r�,
purc� � , pr�p� �� , ��������� r�p�r�
�
� �
Best Practices to Secure Data from Modification: Eliminating the Risk to Online Content
Page 4
�
E#er" organization has repositories* ,he" could be collections of documents$
records$ pictures$ #ideos or other data* Repositories ha#e different priorities to
an organization*
You ha#e mission critical repositories that "ou )ould be paral"zed )ithout* ,hink
of the impact if someone deleted all of "our files right no)* What )ould "ou do?
'n example of this is "our eMail )hich is the life-line of business operations$
)ithout )hich )e could not operate in toda"’s )orld* Our dail" )orkflo) is
dri#en b" eMail$ IM$ Facebook$ ,)itter and others*
What )ould happen if "our organization lost the eMail files for e#er"bod" for last
)eek$ or last month or "ear? ,he ans)er is likel" that there )ould be a significant
impact on operations*
'n ounce of pre#ention is )orth a pound of cure* WORM disks are light)eight
and eas" to use* Protect "our organization’s data through pre#ention*
,"pical repositor" data that needs protection includes:
• �M���, Tw����r, IM
• D�cu���� , F�r� , App��c����� , ����r�c� , L���, M�d�c��
• F��� B�c�up ��d Arc�v�
• Aud�� F��� ��d D��� F���
• V�d�� & Aud�� L�br�r��
• Tr����� M���r���
A���������Rh������v�,�� �h������Th��C��p������I���ll�������
�"GreenTec platforms are empirical verification that Moore’s 1st and 2nd laws of computing are in full force and effect."��Ref: http://corporateintelligencer*blogspot*com/�
Best Practices to Secure Data from Modification: Eliminating the Risk to Online Content
Page 5
�
�
What’s the damage to your organization if your web site is hacked and data is
changed?
If a hacker penetrates "our )eb site’s defenses and attempts to modif" "our )eb
data that is on protected WORM disks$ the attack simpl" fails* ,he hacker is
surprised to find out that no matter )hat he does$ "our data can not be altered or
deleted*
,he same holds true for "our internal compan" files and indi#idual files$ if the" are
on WORM$ the" are protected*
What if one of your employees decides he is upset with his salary review and
wants to get back at the company by deleting important company files?
You’re protected )ith WORM disks* Nothing he can do )ill modif" or delete "our
data*
With WORM$ "ou’re protected against malicious attacks:�
• H�c��r c����� ��d�fy d��� �� y�ur w�b ���
• S�p� ��c���d cyb�r-����c� �� y�ur d��� f��� �r� �w�r��d
• D� ru����d ��p��y�� �r� pr�v����d fr�� d������ y�ur f���
• Acc�d����� �r �����������, d�������, ��d�f�c����� �r r�-f�r������ �f y�ur
d��� w��� ��� ucc��d
It’s eas" to protect "our data )ith the WORM* For additional information$ email
to info@greentec-usa*com or call (� 3) 88 -833�*