5
Best Practices to Secure Data from Modification: Eliminating the Risk to Online Content Page 1 Ρ GreenTec ϭϭϳϮϬ Sunrise salleLJ Driǀe Suite >>-Ϭϭ Reston s ϮϬϭϵϭ ǁǁǁ'reendec-hScom ǁǁǁ'reendec-Mediacom ĞƐƚ WƌĂĐƚŝĐĞƐ ŝŶ ^ĞĐƵƌŝŶŐ ĂƚĂ ĨƌŽŵ DŽĚŝĨŝĐĂƚŝŽŶ ůŝŵŝŶĂƚŝŶŐ ƚŚĞ ZŝƐŬ ƚŽ KŶůŝŶĞ ŽŶƚĞŶƚ

GreenTec USA – Secure Survivable Data and Systems Read ...greentec-usa.com/wp/GreenTec-WORM-Whitepaper.pdf · disk dri#es for a sensiti#e +o#ernment 'genc"* We are no) offering

  • Upload
    others

  • View
    1

  • Download
    0

Embed Size (px)

Citation preview

Page 1: GreenTec USA – Secure Survivable Data and Systems Read ...greentec-usa.com/wp/GreenTec-WORM-Whitepaper.pdf · disk dri#es for a sensiti#e +o#ernment 'genc"* We are no) offering

Best Practices to Secure Data from Modification: Eliminating the Risk to Online Content

Page 1

GreenTec™

���� Sunrise !alle" Dri#e$ Suite %%- �

Reston$ !' � �(�

)))*+reen,ec--S'*com

)))*+reen,ec-Media*com

���������������� ������������������������

���������� �� �� � �� ������ �������

Page 2: GreenTec USA – Secure Survivable Data and Systems Read ...greentec-usa.com/wp/GreenTec-WORM-Whitepaper.pdf · disk dri#es for a sensiti#e +o#ernment 'genc"* We are no) offering

Best Practices to Secure Data from Modification: Eliminating the Risk to Online Content

Page 2

ntil recentl"$ true Read-Only disk dri#es that

could reall" protect "our data )ere not pre#iousl"

a#ailable*

G����T�-U�A de#eloped true Read-Only high-

speed$ high-densit" WORM (Write Once$ Read Man")

disk dri#es for a sensiti#e +o#ernment 'genc"*

We are no) offering these WORM disks to other

+o#ernment 'gencies and select Organizations to

protect #aluable data assets*

,he WORM disk dri#es protect data from accidental or intentional modification$ alteration$

deletion or re-formatting )ith capacities ranging from 3 Terabytes up to Multiple Petabytes*

Protection is performed at the ph"sical disk le#el$ and is embedded in the disk dri#e itself$ so it

does not matter )hat operating s"stem or access controls are placed on the disk$ the data

cannot be modified*

,he WORM disk )orks )ith "our existing )orkstations$ laptops and ser#ers and is a#ailable in

both internal and external disk #ersions for all standard computer s"stems and supports all file

formats*

,he GreenTec WORM is a superior inexpensive solution for Read-Only storage requirements

)ith applications in protection of:

• Video Surveillance

• Intelligence Collections

• Law Enforcement

• Chain-of-Custody

• Cyber-Attack Protection

• Medical Records

• Personnel Records

• Corporate Records

• Legal Documents

• Compliance Reports

• Financial Records & Transactions

• Contract & Business Records

• SEC, SOX, Dodd-Frank Retention

• eMail Repositories

• Backup and Archives

• Secure Audit Log-files and Data

• Video, Audio & Music Libraries

• Training Materials

• Web Site Protection

• Disgruntled Employee Attacks

• Secure Data Protection

,he WORM technolog" pro#ides a #er" cost-effecti#e defensi#e capabilit" for securel"

protecting sensiti#e data )ith simplicit" and is eas" to use for "our organization*

In addition to WORM disks$ +reen,ec--S' pro#ides ad#anced modular high-performance

energ"-sa#ing ser#ers and traditional storage s"stems for all of "our processing$ storage$ #ideo

and secure cloud needs*

Page 3: GreenTec USA – Secure Survivable Data and Systems Read ...greentec-usa.com/wp/GreenTec-WORM-Whitepaper.pdf · disk dri#es for a sensiti#e +o#ernment 'genc"* We are no) offering

Best Practices to Secure Data from Modification: Eliminating the Risk to Online Content

Page 3

Organizations toda" ha#e demanding needs to ensure that their sensiti#e data is

protected*

Considerable damage could be done if critical or sensiti#e files are deleted or

altered either accidentall" or intentionall"*

'll t"pes of records must be protected to a#oid a disaster$ fraud$ loss$ business

interruption$ dispute or legal actions b" ensuring the integrit" of "our data*

Your email$ forms$ documents$ pictures$ #ideo$ audio$ transactions$ reports$

audits$ certifications and other files need to be protected*

• L�w�E��������� – V�d�� ��d �ud�� d����� �v�d��c� c����c����

• ��pl����Ch��-���C ����y – �� ��r ��d��� ��d �r�� p�r� pr�c�dur�

• M���l�R����� – P������ & D�c��r ��f�r������, pr�c�dur� , pr� cr�p���� ,

�� ur��c�, ��d�c�� �����, r�p�r� , b����� ��f�r������

• ��������l�R����� – P�yr���, u��� r� �urc� , �� ur��c�, p�rf�r���c�

r�v��w , r� u�� , f�r�

• C��p������R����� – ��rp�r��� f���� , �������c�u�� pr�p�r�y, ��v����ry,

D�AA �ud�� , P�A�B �ud��

• C��pl����R�p���� – S�� r�p�r���, S�rb��� -�x��y, D�dd-Fr��� r�c�rd

r�������� c��p����c�, HIPAA, D�AA r�qu�r����� , �ud��

• F����l�R������&�T��������� - Acc�u����, ��x� , b��� &, v��d�r

r�c�rd

• Lb������– V�d��, Aud��, B��� , Mu �c, D�cu���� , F��� , �������

• L���l��� ����� – ��� �r�����, ���������, �������c�u�� pr�p�r�y

• C�������&�� ������R����� – Ar������ , c���r�c� p�p�rw�r�,

purc� � , pr�p� �� , ��������� r�p�r�

� �

Page 4: GreenTec USA – Secure Survivable Data and Systems Read ...greentec-usa.com/wp/GreenTec-WORM-Whitepaper.pdf · disk dri#es for a sensiti#e +o#ernment 'genc"* We are no) offering

Best Practices to Secure Data from Modification: Eliminating the Risk to Online Content

Page 4

E#er" organization has repositories* ,he" could be collections of documents$

records$ pictures$ #ideos or other data* Repositories ha#e different priorities to

an organization*

You ha#e mission critical repositories that "ou )ould be paral"zed )ithout* ,hink

of the impact if someone deleted all of "our files right no)* What )ould "ou do?

'n example of this is "our eMail )hich is the life-line of business operations$

)ithout )hich )e could not operate in toda"’s )orld* Our dail" )orkflo) is

dri#en b" eMail$ IM$ Facebook$ ,)itter and others*

What )ould happen if "our organization lost the eMail files for e#er"bod" for last

)eek$ or last month or "ear? ,he ans)er is likel" that there )ould be a significant

impact on operations*

'n ounce of pre#ention is )orth a pound of cure* WORM disks are light)eight

and eas" to use* Protect "our organization’s data through pre#ention*

,"pical repositor" data that needs protection includes:

• �M���, Tw����r, IM

• D�cu���� , F�r� , App��c����� , ����r�c� , L���, M�d�c��

• F��� B�c�up ��d Arc�v�

• Aud�� F��� ��d D��� F���

• V�d�� & Aud�� L�br�r��

• Tr����� M���r���

A���������Rh������v�,�� �h������Th��C��p������I���ll�������

�"GreenTec platforms are empirical verification that Moore’s 1st and 2nd laws of computing are in full force and effect."��Ref: http://corporateintelligencer*blogspot*com/�

Page 5: GreenTec USA – Secure Survivable Data and Systems Read ...greentec-usa.com/wp/GreenTec-WORM-Whitepaper.pdf · disk dri#es for a sensiti#e +o#ernment 'genc"* We are no) offering

Best Practices to Secure Data from Modification: Eliminating the Risk to Online Content

Page 5

What’s the damage to your organization if your web site is hacked and data is

changed?

If a hacker penetrates "our )eb site’s defenses and attempts to modif" "our )eb

data that is on protected WORM disks$ the attack simpl" fails* ,he hacker is

surprised to find out that no matter )hat he does$ "our data can not be altered or

deleted*

,he same holds true for "our internal compan" files and indi#idual files$ if the" are

on WORM$ the" are protected*

What if one of your employees decides he is upset with his salary review and

wants to get back at the company by deleting important company files?

You’re protected )ith WORM disks* Nothing he can do )ill modif" or delete "our

data*

With WORM$ "ou’re protected against malicious attacks:�

• H�c��r c����� ��d�fy d��� �� y�ur w�b ���

• S�p� ��c���d cyb�r-����c� �� y�ur d��� f��� �r� �w�r��d

• D� ru����d ��p��y�� �r� pr�v����d fr�� d������ y�ur f���

• Acc�d����� �r �����������, d�������, ��d�f�c����� �r r�-f�r������ �f y�ur

d��� w��� ��� ucc��d

It’s eas" to protect "our data )ith the WORM* For additional information$ email

to info@greentec-usa*com or call (� 3) 88 -833�*