27
High-Technology is NOT ENOUGH for True Information Security WHY

Why High-Technology is Not Enough for True Information Security

Embed Size (px)

Citation preview

High-Technology is NOT ENOUGH for True Information SecurityWHY

information is constantly being created, shared, protected, manipulated and managed.

IN TODAY’S WORLD,

We’ve all seen this first-hand IN DIFFERENT WAYS

SUCH AS HOW WE INTERACT

ON SOCIAL MEDIA

RUN OUR BUSINESSES,

OR EVEN MANAGE OUR FINANCES.

JUST AS TECHNOLOGY HAS PLAYED A LARGE ROLE in creating a deluge of data, it also plays a role in securing this data.

But technology, when used singularly,

IS NOT ENOUGH TO ENSURE INFORMATION SECURITY.

IN FACT, TECHNOLOGY is just one piece of the larger information governance puzzle. “It costs around 20 cents to BUY 1GB of storage, however, it costs around $3,500 to REVIEW 1GB of storage.”

“Email ROI Calculator” AIIM

Viewpointe has paved the way in this field,

helping over 1,500 customers

safely manage more than 134 billion items.

We know how important considerations like authentication and threat detection are to achieving

TRUE SECURITY

four layers of security.

VIEWPOINTE OFFERS

TO PUT THIS INTO PRACTICE,

PROCESS PROCEDURE& GOVERNANCE

THIS INCLUDES EVERYTHING FROM audits, to best practices, to reporting and compliance.4,600+ SLA Measurements Tracked and Reported

107 Audit Examinations AnnuallyViewpointe maintains extensive audit processes based on best practices, receiving SOC 2 compliance review of security, availability, processing, confidentiality, and privacy practices, and we are audited by FFIEC and most of our customers each year.

TECHNOLOGY-BASED

SECURITY

that the technology you employ is highly available, privately managed and allows for privileged access.

YOU NEED TO KNOW

Both the assigned Primary and Alternate Site house 100% of a customer’s content and are provisioned for production load.

Viewpointe leverages geographically dispersed Tier 3+ Data Centers

Viewpointe completes 47 Successful Disaster Recovery Tests annually

NETWORKSECURITY

We implement elements like

Viewpointe leverages the TLS 1.2 standard SSL/TLS and (AES)-256 encryption to protect customer data.

CUSTOMER-SPECIFIC NETWORK CONNECTIVITY AND COMBINED DATA-IN-MOTION AND DATA-AT-REST ENCRYPTION TO SAFE-GUARD ALL DATA

To ensure your network detection and monitoring are always at

Viewpointe network detection, system monitoring and managed services provide ongoing protection against service and data threats.

peak performance,

PHYSICALSECURITY

This final level is about PEOPLE AND PLACES

site security, staff background checks, biometric access controls and geographically diverse data centers.

THINK: 24/7

BUT TECHNOLOGY ALONE WON’T SOLVE YOUR SECURITY PROBLEMS.

IT’S A TOUGH FACT TO FACE,

NAÏVE BELIEFS that cloud providers are totally responsible for their customers’ security discourages organizations from ensuring their employees use cloud services appropriately.” As a result Gartner predicts,

“THROUGH 2020, 95% OF CLOUD SECURITY FAILURES WILL BE THE CUSTOMER’S FAULT.”

“Clouds Are Secure: Are You Using Them Securely?” | 22 September 2015 G00281279 | Analyst(s): Jay Heiser

is NOT about denying the possibility of a security breach.

BEING PREPARED

Instead, it’s about having a breadth of safeguards in place to

react quickly, limit damage and constantly improve.

That’s how we help settle

OVER $4 TRILLION IN TRANSACTIONS AND LOAD

over 170 billion documents annually.

To learn more about how Viewpointe can help you create a private, purpose-built, proven solution, visit www.viewpointe.com/presentations.