DATA SECURITY

Data Leakage Prevention (DLP)

Data leakage prevention solutions have been developed to prevent an organization’s confidential data from leaking outside the organization. Data is detected, monitored and protected in the medium where it is stored (such as file servers), transmitted (such as e-mail, instant messenger, and ftp) and used (such as user personal computers and USB flash drives). Several “deep content analysis” techniques are used to detect and protect data. DLP solutions can also work integrated with content filtering solutions.

Our partner in the field

forcepoint_bg-e1456412258739forcepoint-e1456412515658

Data Classification

It is becoming increasingly difficult to control data that grows in size day by day. Organizational data that come in many different formats and is available in many different media must first be structurally classified according to the needs of the organization and its criticality level must be defined. Necessary precautions can then be taken to protect critical data according to this basis.

This need can be met by data classification solutions. These solutions make it easier to determine data categories and implement organizational policies. Classification solutions are critical for prevention of data leakage.

Our partner in the field

Encryption, Tokenization and HSM

There are several precautions taken to prevent unauthorized access to data. However, there is still the possibility of unauthorized access. Data must be protected against this possibility even when it is acquired illegally. Encryption and tokenization technologies are used for this purpose.

HSMs are devices designed to enhance security of encryption operations and provide medium fit for storing sensitive information. In addition, they are also used in database encryption, document signing, online banking, EFT transactions, root key protection, etc. These devices are capable of implementing a large number of digital signatures per second. Therefore, they are used for both performance and security in transactions such as electronic invoicing and electronic document creation. These devices are preferred for compliance with criteria such as PCI and SOX.

Our partner in the field

gemalto_brand_fullcol_bwgemalto_brand_fullcol_hr

Credit Card and Sensitive Information Discovery

Credit card information is the primary sensitive information required to be protected in accordance with the PCI DSS standard. However, precautions to protect sensitive information are essential to not comply with this standard only, but also preserve organizational reputation and avoid exposure to card theft. Credit card and sensitive information discovery solutions will scan all files, shared areas, e-mails, databases and storages in your system, discover where sensitive information such as credit card and Turkish I.D. Numbers are located and guide you toward appropriate precautions.

Our partner in the field

Data Governance

Data Governance solution provides full visibility and control over your unstructured data, wherever it lives. It shows you where the sensitive data exists along with where it’s overexposed, who is accessing it, and how to lock it down. This solution uses machine learning and bi-directional cluster analysis to pinpoint users that have access to files they don’t need to do their job. It’s your single interface for managing permissions and security groups. It is also possible to make folder-based classification with data governance solution.

Our partner in the field