07.01.2015 Views

Information Security beyond the Endpoint

Information Security beyond the Endpoint

Information Security beyond the Endpoint

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

A Pioneer in <strong>Information</strong> Assurance<br />

In a world where information needs to be accessible from anywhere and at any time,<br />

digital data carriers are of growing importance. The density of data stored on endpoint<br />

devices such as Hard Disk Drives, USB-Sticks, SD-Cards, DVD or Blu-Ray has grown<br />

exponentially over <strong>the</strong> past decade.<br />

<strong>Information</strong> security at <strong>the</strong> endpoint plays a major role in today’s IT world – and endpoint<br />

devices can be a source of major vulnerability for corporate IT. In recent years, governments<br />

around <strong>the</strong> world have enacted legislation that requires protective measures for various types<br />

of confidential personal information. Violations of <strong>the</strong>se information security laws are no longer<br />

treated as trivial offenses, but are punished with significant fines. In many cases, <strong>the</strong> most<br />

costly punishment is <strong>the</strong> damage to a company’s reputation that results from a data security<br />

breach.<br />

Much of <strong>the</strong> information handled within organizations is considered to be corporate intellectual<br />

property such as patents, business plans or financial statements. Even though this data is not<br />

directly affected by customer confidentiality laws, a security breach can still have disastrous<br />

consequences – what if competitive secrets fall into <strong>the</strong> hands of <strong>the</strong> competition After all,<br />

knowledge is power – and companies need to be able to control <strong>the</strong>ir privileged information.<br />

Network<br />

<strong>Security</strong><br />

Access<br />

Control<br />

<br />

1

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!