SlideShare a Scribd company logo
1 of 27
Beef up your data security with
certified data erasure solutions
Constantin Buda
Presentation Agenda
1. Why protect your data?
2. Blancco’s expert credentials
3. What do you need to erase today?
4. Blancco’s certified data erasure
solutions
5. Discussion/Demo
Why protect your data?
• Background:
• New advancement in technologies
• Where is the data stored?
• Explosion of social media
• Increase use of smartphones
Why protect your data?
• What data should be protected?
• Who is responsable for data loss?
• What data should be erased?
• Certified versus non-certified
Blancco’s expert
credentials
Who are we to speak?
Who arewe tospeak? Why Blancco
canclaim to bethe globalleader
• Certified data erasure
software
• Blancco has over 10
years experience with
both public and
private sector
organisations
• Millions of licenses
used worldwide with
tens of thousands of
assets erased daily
BLANCCO IS THE MOST CERTIFIED
AND RECOMMENDED PROVIDER
Half of the Fortune Global Top 10
companies use Blancco
Five biggest banks out of ten trust
on Blancco
Over third oftoppharmaceutical /
chemical companies runBlancco
What do youneed oterase today
Blancco’s secure data erasure
• Blancco uses software-based
overwriting that destroys all
electronic data.
• Overwriting goes beyond file
deletion commands which only
removes direct pointers to the
actual files.
• Physical destruction, which render
the disk unusable, data erasure
removes all data while leaving the
hard drive operable.
Blancco solutions
ERASURE CLIENT SOFTWARE
Desktops, Laptops, Servers and Storage Equipment
Blancco solutions
Blancco File Shredder
Blancco LUN Eraser
• A datacenter has many hard drives
• All of these hard drives can be grouped
together into one big „cloud“ for easier
handling.
• However, now we can only see one
giant „logical“ unit instead of all of the
individual hard drives.
• The Blancco LUN Eraser can be used to
overwrite any detected drive including
IDE, SCSI, FC, and iSCSI.
Nobody can tell exactly which physical hard
drives belong to a particular LUN, but with
Blancco, we know that they are all securely
overwritten.
LUN 1
LUN 2
LUN 3
LUN 4
LUN 5
LUN 6
• Instead of rebuilding and configuring a LUN
structure, the Blancco LUN Eraser allows the
reuse of an existing structure.
• This solution is designed to run in an
operating active environment by the
administrator/technician. No reboot or
downtime is necessary.
•All international erasure standards are
supported
•Blancco automatically generates an erasure
report
Benefits
Blancco LUN
Blancco Mobile
• Increased amount of data stored on
mobile/smartphones
• Smartphone market is incrasing
• Eventually all phones will become
smartphones
• More of your data/privacy is exposed
Benefits
• One solution for several
hundred mobile devices
• One unified reporting &
sending to MC
• Unified process model for
saving time and labor costs
• Only data is erased. Mobile
phone restored to factory
state!
Supported phone OS
Blancco Mobile
Blancco software is used to provide
you with thefollowing benefits:
• Increased data security. Assuring
regulatory compliance
• Minimized environmental impact
• Creation of alternative revenue streams
• Reduced costs with faster, cheaper and
improved processing of IT assets
Auditing
What should asecure data erasure
policy contain?
3 CRITERIAS FOR DATA ERASURE:
• ERASURE
– Certifications
– 18 supported data erasure standards
• REPORTING
– Erasure reports from every erasure
– Justice for IT Manager
• AUDITING
– Erasure process must be supervised –
internal checks
– All reports to one database
Thanks for your time!
Please feel free to ask questions and comment on Blancco and data erasure.
You can also learn more at www.blancco.com or
www.dataerasure.com
Constantin Buda
Manager East Europe
Blancco Oy Ltd
Mobile: +358 440 334 556
Email: constantin.buda@blancco.com

More Related Content

What's hot

Information security in the starbucks generation
Information security in the starbucks generationInformation security in the starbucks generation
Information security in the starbucks generationTony Lauro
 
What we learned from MISA Ontario 2020 Infosec
What we learned from MISA Ontario 2020 InfosecWhat we learned from MISA Ontario 2020 Infosec
What we learned from MISA Ontario 2020 InfosecGENIANS, INC.
 
Genian NAC Overview
Genian NAC Overview Genian NAC Overview
Genian NAC Overview GENIANS, INC.
 
kaspersky presentation for palette business solution June 2016 v1.0.
kaspersky presentation for palette business solution June 2016 v1.0.kaspersky presentation for palette business solution June 2016 v1.0.
kaspersky presentation for palette business solution June 2016 v1.0.Onwubiko Emmanuel
 
R1 - Slides
R1 - SlidesR1 - Slides
R1 - SlidesezSec
 
ESET: Delivering Benefits to Enterprises
ESET: Delivering Benefits to EnterprisesESET: Delivering Benefits to Enterprises
ESET: Delivering Benefits to EnterprisesESET
 
The Motives, Means and Methods of Cyber-Adversaries
The Motives, Means and Methods of Cyber-AdversariesThe Motives, Means and Methods of Cyber-Adversaries
The Motives, Means and Methods of Cyber-AdversariesKaspersky
 
CONFidence 2017: Cryptography used for jihadism, from Internet to software (J...
CONFidence 2017: Cryptography used for jihadism, from Internet to software (J...CONFidence 2017: Cryptography used for jihadism, from Internet to software (J...
CONFidence 2017: Cryptography used for jihadism, from Internet to software (J...PROIDEA
 

What's hot (10)

Information security in the starbucks generation
Information security in the starbucks generationInformation security in the starbucks generation
Information security in the starbucks generation
 
What we learned from MISA Ontario 2020 Infosec
What we learned from MISA Ontario 2020 InfosecWhat we learned from MISA Ontario 2020 Infosec
What we learned from MISA Ontario 2020 Infosec
 
Genian NAC Overview
Genian NAC Overview Genian NAC Overview
Genian NAC Overview
 
Read me!
Read me!Read me!
Read me!
 
kaspersky presentation for palette business solution June 2016 v1.0.
kaspersky presentation for palette business solution June 2016 v1.0.kaspersky presentation for palette business solution June 2016 v1.0.
kaspersky presentation for palette business solution June 2016 v1.0.
 
R1 - Slides
R1 - SlidesR1 - Slides
R1 - Slides
 
ESET: Delivering Benefits to Enterprises
ESET: Delivering Benefits to EnterprisesESET: Delivering Benefits to Enterprises
ESET: Delivering Benefits to Enterprises
 
The Motives, Means and Methods of Cyber-Adversaries
The Motives, Means and Methods of Cyber-AdversariesThe Motives, Means and Methods of Cyber-Adversaries
The Motives, Means and Methods of Cyber-Adversaries
 
CONFidence 2017: Cryptography used for jihadism, from Internet to software (J...
CONFidence 2017: Cryptography used for jihadism, from Internet to software (J...CONFidence 2017: Cryptography used for jihadism, from Internet to software (J...
CONFidence 2017: Cryptography used for jihadism, from Internet to software (J...
 
Loc jack presentation
Loc jack presentationLoc jack presentation
Loc jack presentation
 

Similar to Blancco - 11nov2011

Blancco Removable Media Eraser
Blancco Removable Media EraserBlancco Removable Media Eraser
Blancco Removable Media EraserJemma Elliott
 
Blancco Mobile Device Eraser
Blancco Mobile Device EraserBlancco Mobile Device Eraser
Blancco Mobile Device EraserJemma Elliott
 
Data Sanitization: What, Why, When and How?
Data Sanitization: What, Why, When and How?Data Sanitization: What, Why, When and How?
Data Sanitization: What, Why, When and How?Baltimax
 
Beyond Diagnostics & Erasure – The Future of Ultra-Efficient Mobile Device Pr...
Beyond Diagnostics & Erasure – The Future of Ultra-Efficient Mobile Device Pr...Beyond Diagnostics & Erasure – The Future of Ultra-Efficient Mobile Device Pr...
Beyond Diagnostics & Erasure – The Future of Ultra-Efficient Mobile Device Pr...Blancco
 
Blancco Bytes- Product Updates for ITADs
Blancco Bytes- Product Updates for ITADsBlancco Bytes- Product Updates for ITADs
Blancco Bytes- Product Updates for ITADsBlancco
 
Blancco Drive Eraser
Blancco Drive EraserBlancco Drive Eraser
Blancco Drive EraserJemma Elliott
 
An Introduction to Live Environment and Cloud Eraser
An Introduction to Live Environment and Cloud EraserAn Introduction to Live Environment and Cloud Eraser
An Introduction to Live Environment and Cloud EraserBlancco
 
Absolute Software & Lojack – 2014 Overview
Absolute Software & Lojack – 2014 OverviewAbsolute Software & Lojack – 2014 Overview
Absolute Software & Lojack – 2014 OverviewAbsolute LoJack
 
KMBS_SECURITY_WHITEPAPER_BRO_nochart_June2014
KMBS_SECURITY_WHITEPAPER_BRO_nochart_June2014KMBS_SECURITY_WHITEPAPER_BRO_nochart_June2014
KMBS_SECURITY_WHITEPAPER_BRO_nochart_June2014Randy Brown
 
TDC2016SP - Trilha Linux Embarcado
TDC2016SP - Trilha Linux EmbarcadoTDC2016SP - Trilha Linux Embarcado
TDC2016SP - Trilha Linux Embarcadotdc-globalcode
 
Blancco Drive Eraser - product sheet
Blancco Drive Eraser - product sheetBlancco Drive Eraser - product sheet
Blancco Drive Eraser - product sheetChristophe Elut
 
Fundamentals of Security White Paper
Fundamentals of Security White PaperFundamentals of Security White Paper
Fundamentals of Security White PaperAdrian Boucek
 
Secure information sharing - the external user dilemma
Secure information sharing - the external user dilemmaSecure information sharing - the external user dilemma
Secure information sharing - the external user dilemmaWatchful Software
 
Training Guide Idea Pad V2
Training Guide   Idea Pad V2Training Guide   Idea Pad V2
Training Guide Idea Pad V2lunarfall
 
Blancco Mobile Diagnostics
Blancco Mobile DiagnosticsBlancco Mobile Diagnostics
Blancco Mobile DiagnosticsJemma Elliott
 
Summer project- Jack Fletcher
Summer project- Jack Fletcher Summer project- Jack Fletcher
Summer project- Jack Fletcher Jack Fletcher
 
Toronto Event- How to Protect Data Throughout Its Lifecycle
Toronto Event- How to Protect Data Throughout Its Lifecycle Toronto Event- How to Protect Data Throughout Its Lifecycle
Toronto Event- How to Protect Data Throughout Its Lifecycle Blancco
 
Market Study on Mobile Authentication
Market Study on Mobile AuthenticationMarket Study on Mobile Authentication
Market Study on Mobile AuthenticationFIDO Alliance
 

Similar to Blancco - 11nov2011 (20)

Blancco Removable Media Eraser
Blancco Removable Media EraserBlancco Removable Media Eraser
Blancco Removable Media Eraser
 
Blancco Mobile Device Eraser
Blancco Mobile Device EraserBlancco Mobile Device Eraser
Blancco Mobile Device Eraser
 
Data Sanitization: What, Why, When and How?
Data Sanitization: What, Why, When and How?Data Sanitization: What, Why, When and How?
Data Sanitization: What, Why, When and How?
 
Beyond Diagnostics & Erasure – The Future of Ultra-Efficient Mobile Device Pr...
Beyond Diagnostics & Erasure – The Future of Ultra-Efficient Mobile Device Pr...Beyond Diagnostics & Erasure – The Future of Ultra-Efficient Mobile Device Pr...
Beyond Diagnostics & Erasure – The Future of Ultra-Efficient Mobile Device Pr...
 
Blancco Bytes- Product Updates for ITADs
Blancco Bytes- Product Updates for ITADsBlancco Bytes- Product Updates for ITADs
Blancco Bytes- Product Updates for ITADs
 
Blancco Lun Eraser
Blancco Lun EraserBlancco Lun Eraser
Blancco Lun Eraser
 
Blancco Drive Eraser
Blancco Drive EraserBlancco Drive Eraser
Blancco Drive Eraser
 
An Introduction to Live Environment and Cloud Eraser
An Introduction to Live Environment and Cloud EraserAn Introduction to Live Environment and Cloud Eraser
An Introduction to Live Environment and Cloud Eraser
 
Absolute Software & Lojack – 2014 Overview
Absolute Software & Lojack – 2014 OverviewAbsolute Software & Lojack – 2014 Overview
Absolute Software & Lojack – 2014 Overview
 
KMBS_SECURITY_WHITEPAPER_BRO_nochart_June2014
KMBS_SECURITY_WHITEPAPER_BRO_nochart_June2014KMBS_SECURITY_WHITEPAPER_BRO_nochart_June2014
KMBS_SECURITY_WHITEPAPER_BRO_nochart_June2014
 
TDC2016SP - Trilha Linux Embarcado
TDC2016SP - Trilha Linux EmbarcadoTDC2016SP - Trilha Linux Embarcado
TDC2016SP - Trilha Linux Embarcado
 
Blancco Drive Eraser - product sheet
Blancco Drive Eraser - product sheetBlancco Drive Eraser - product sheet
Blancco Drive Eraser - product sheet
 
Fundamentals of Security White Paper
Fundamentals of Security White PaperFundamentals of Security White Paper
Fundamentals of Security White Paper
 
Secure information sharing - the external user dilemma
Secure information sharing - the external user dilemmaSecure information sharing - the external user dilemma
Secure information sharing - the external user dilemma
 
Training Guide Idea Pad V2
Training Guide   Idea Pad V2Training Guide   Idea Pad V2
Training Guide Idea Pad V2
 
iot_basic_1.pptx
iot_basic_1.pptxiot_basic_1.pptx
iot_basic_1.pptx
 
Blancco Mobile Diagnostics
Blancco Mobile DiagnosticsBlancco Mobile Diagnostics
Blancco Mobile Diagnostics
 
Summer project- Jack Fletcher
Summer project- Jack Fletcher Summer project- Jack Fletcher
Summer project- Jack Fletcher
 
Toronto Event- How to Protect Data Throughout Its Lifecycle
Toronto Event- How to Protect Data Throughout Its Lifecycle Toronto Event- How to Protect Data Throughout Its Lifecycle
Toronto Event- How to Protect Data Throughout Its Lifecycle
 
Market Study on Mobile Authentication
Market Study on Mobile AuthenticationMarket Study on Mobile Authentication
Market Study on Mobile Authentication
 

More from Agora Group

How to Digitally Transform and Stay Competitive with a Zero-code Digital Busi...
How to Digitally Transform and Stay Competitive with a Zero-code Digital Busi...How to Digitally Transform and Stay Competitive with a Zero-code Digital Busi...
How to Digitally Transform and Stay Competitive with a Zero-code Digital Busi...Agora Group
 
Microservicii reutilizabile in arhitecturi bazate pe procese
Microservicii reutilizabile in arhitecturi bazate pe proceseMicroservicii reutilizabile in arhitecturi bazate pe procese
Microservicii reutilizabile in arhitecturi bazate pe proceseAgora Group
 
The role of BPM in Paradigms Shift
The role of BPM in Paradigms ShiftThe role of BPM in Paradigms Shift
The role of BPM in Paradigms ShiftAgora Group
 
Prezentare Ensight_BPM-20171004
Prezentare Ensight_BPM-20171004Prezentare Ensight_BPM-20171004
Prezentare Ensight_BPM-20171004Agora Group
 
Curs Digital Forensics
Curs Digital ForensicsCurs Digital Forensics
Curs Digital ForensicsAgora Group
 
The next generation of Companies management: state of the art in BPM
The next generation of Companies management: state of the art in BPMThe next generation of Companies management: state of the art in BPM
The next generation of Companies management: state of the art in BPMAgora Group
 
Speed Dialing the Enterprise
Speed Dialing the EnterpriseSpeed Dialing the Enterprise
Speed Dialing the EnterpriseAgora Group
 
Arhitectura proceselor în Sistemul Informațional de Sănătate
Arhitectura proceselor în Sistemul Informațional de SănătateArhitectura proceselor în Sistemul Informațional de Sănătate
Arhitectura proceselor în Sistemul Informațional de SănătateAgora Group
 
IBM’s Smarter Process Reinvent Business
IBM’s Smarter Process Reinvent BusinessIBM’s Smarter Process Reinvent Business
IBM’s Smarter Process Reinvent BusinessAgora Group
 
eHealth 2014_Radu Dop
eHealth 2014_Radu DopeHealth 2014_Radu Dop
eHealth 2014_Radu DopAgora Group
 
Importanța registrelor pentru pacienți
Importanța registrelor pentru paciențiImportanța registrelor pentru pacienți
Importanța registrelor pentru paciențiAgora Group
 
CYBERCRIME AND THE HEALTHCARE INDUSTRY: Sistemul de sănătate, noua țintă a at...
CYBERCRIME AND THE HEALTHCARE INDUSTRY: Sistemul de sănătate, noua țintă a at...CYBERCRIME AND THE HEALTHCARE INDUSTRY: Sistemul de sănătate, noua țintă a at...
CYBERCRIME AND THE HEALTHCARE INDUSTRY: Sistemul de sănătate, noua țintă a at...Agora Group
 
Perspective naționale și internaționale ale informaticii și standardelor medi...
Perspective naționale și internaționale ale informaticii și standardelor medi...Perspective naționale și internaționale ale informaticii și standardelor medi...
Perspective naționale și internaționale ale informaticii și standardelor medi...Agora Group
 
UTI_Dosarul electronic de sanatate
UTI_Dosarul electronic de sanatateUTI_Dosarul electronic de sanatate
UTI_Dosarul electronic de sanatateAgora Group
 
Class IT - Enemy inside the wire
Class IT - Enemy inside the wireClass IT - Enemy inside the wire
Class IT - Enemy inside the wireAgora Group
 
Infologica - auditarea aplicatiilor mobile
Infologica - auditarea aplicatiilor mobileInfologica - auditarea aplicatiilor mobile
Infologica - auditarea aplicatiilor mobileAgora Group
 
Agora Securitate yugo neumorni
Agora Securitate yugo neumorniAgora Securitate yugo neumorni
Agora Securitate yugo neumorniAgora Group
 
Security threats in the LAN
Security threats in the LANSecurity threats in the LAN
Security threats in the LANAgora Group
 

More from Agora Group (20)

How to Digitally Transform and Stay Competitive with a Zero-code Digital Busi...
How to Digitally Transform and Stay Competitive with a Zero-code Digital Busi...How to Digitally Transform and Stay Competitive with a Zero-code Digital Busi...
How to Digitally Transform and Stay Competitive with a Zero-code Digital Busi...
 
Microservicii reutilizabile in arhitecturi bazate pe procese
Microservicii reutilizabile in arhitecturi bazate pe proceseMicroservicii reutilizabile in arhitecturi bazate pe procese
Microservicii reutilizabile in arhitecturi bazate pe procese
 
The role of BPM in Paradigms Shift
The role of BPM in Paradigms ShiftThe role of BPM in Paradigms Shift
The role of BPM in Paradigms Shift
 
Prezentare Ensight_BPM-20171004
Prezentare Ensight_BPM-20171004Prezentare Ensight_BPM-20171004
Prezentare Ensight_BPM-20171004
 
Curs OSINT
Curs OSINTCurs OSINT
Curs OSINT
 
Curs Digital Forensics
Curs Digital ForensicsCurs Digital Forensics
Curs Digital Forensics
 
The next generation of Companies management: state of the art in BPM
The next generation of Companies management: state of the art in BPMThe next generation of Companies management: state of the art in BPM
The next generation of Companies management: state of the art in BPM
 
Speed Dialing the Enterprise
Speed Dialing the EnterpriseSpeed Dialing the Enterprise
Speed Dialing the Enterprise
 
ABPMP Romania
ABPMP RomaniaABPMP Romania
ABPMP Romania
 
Arhitectura proceselor în Sistemul Informațional de Sănătate
Arhitectura proceselor în Sistemul Informațional de SănătateArhitectura proceselor în Sistemul Informațional de Sănătate
Arhitectura proceselor în Sistemul Informațional de Sănătate
 
IBM’s Smarter Process Reinvent Business
IBM’s Smarter Process Reinvent BusinessIBM’s Smarter Process Reinvent Business
IBM’s Smarter Process Reinvent Business
 
eHealth 2014_Radu Dop
eHealth 2014_Radu DopeHealth 2014_Radu Dop
eHealth 2014_Radu Dop
 
Importanța registrelor pentru pacienți
Importanța registrelor pentru paciențiImportanța registrelor pentru pacienți
Importanța registrelor pentru pacienți
 
CYBERCRIME AND THE HEALTHCARE INDUSTRY: Sistemul de sănătate, noua țintă a at...
CYBERCRIME AND THE HEALTHCARE INDUSTRY: Sistemul de sănătate, noua țintă a at...CYBERCRIME AND THE HEALTHCARE INDUSTRY: Sistemul de sănătate, noua țintă a at...
CYBERCRIME AND THE HEALTHCARE INDUSTRY: Sistemul de sănătate, noua țintă a at...
 
Perspective naționale și internaționale ale informaticii și standardelor medi...
Perspective naționale și internaționale ale informaticii și standardelor medi...Perspective naționale și internaționale ale informaticii și standardelor medi...
Perspective naționale și internaționale ale informaticii și standardelor medi...
 
UTI_Dosarul electronic de sanatate
UTI_Dosarul electronic de sanatateUTI_Dosarul electronic de sanatate
UTI_Dosarul electronic de sanatate
 
Class IT - Enemy inside the wire
Class IT - Enemy inside the wireClass IT - Enemy inside the wire
Class IT - Enemy inside the wire
 
Infologica - auditarea aplicatiilor mobile
Infologica - auditarea aplicatiilor mobileInfologica - auditarea aplicatiilor mobile
Infologica - auditarea aplicatiilor mobile
 
Agora Securitate yugo neumorni
Agora Securitate yugo neumorniAgora Securitate yugo neumorni
Agora Securitate yugo neumorni
 
Security threats in the LAN
Security threats in the LANSecurity threats in the LAN
Security threats in the LAN
 

Recently uploaded

unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 

Recently uploaded (20)

unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 

Blancco - 11nov2011

  • 1. Beef up your data security with certified data erasure solutions Constantin Buda
  • 2. Presentation Agenda 1. Why protect your data? 2. Blancco’s expert credentials 3. What do you need to erase today? 4. Blancco’s certified data erasure solutions 5. Discussion/Demo
  • 3. Why protect your data? • Background: • New advancement in technologies • Where is the data stored? • Explosion of social media • Increase use of smartphones
  • 4. Why protect your data? • What data should be protected? • Who is responsable for data loss? • What data should be erased? • Certified versus non-certified
  • 6. Who arewe tospeak? Why Blancco canclaim to bethe globalleader • Certified data erasure software • Blancco has over 10 years experience with both public and private sector organisations • Millions of licenses used worldwide with tens of thousands of assets erased daily BLANCCO IS THE MOST CERTIFIED AND RECOMMENDED PROVIDER
  • 7.
  • 8. Half of the Fortune Global Top 10 companies use Blancco
  • 9. Five biggest banks out of ten trust on Blancco
  • 10. Over third oftoppharmaceutical / chemical companies runBlancco
  • 11. What do youneed oterase today
  • 12. Blancco’s secure data erasure • Blancco uses software-based overwriting that destroys all electronic data. • Overwriting goes beyond file deletion commands which only removes direct pointers to the actual files. • Physical destruction, which render the disk unusable, data erasure removes all data while leaving the hard drive operable.
  • 13. Blancco solutions ERASURE CLIENT SOFTWARE Desktops, Laptops, Servers and Storage Equipment
  • 16. Blancco LUN Eraser • A datacenter has many hard drives • All of these hard drives can be grouped together into one big „cloud“ for easier handling. • However, now we can only see one giant „logical“ unit instead of all of the individual hard drives. • The Blancco LUN Eraser can be used to overwrite any detected drive including IDE, SCSI, FC, and iSCSI.
  • 17. Nobody can tell exactly which physical hard drives belong to a particular LUN, but with Blancco, we know that they are all securely overwritten. LUN 1 LUN 2 LUN 3 LUN 4 LUN 5 LUN 6
  • 18. • Instead of rebuilding and configuring a LUN structure, the Blancco LUN Eraser allows the reuse of an existing structure. • This solution is designed to run in an operating active environment by the administrator/technician. No reboot or downtime is necessary. •All international erasure standards are supported •Blancco automatically generates an erasure report Benefits
  • 20. Blancco Mobile • Increased amount of data stored on mobile/smartphones • Smartphone market is incrasing • Eventually all phones will become smartphones • More of your data/privacy is exposed
  • 21. Benefits • One solution for several hundred mobile devices • One unified reporting & sending to MC • Unified process model for saving time and labor costs • Only data is erased. Mobile phone restored to factory state!
  • 24. Blancco software is used to provide you with thefollowing benefits: • Increased data security. Assuring regulatory compliance • Minimized environmental impact • Creation of alternative revenue streams • Reduced costs with faster, cheaper and improved processing of IT assets
  • 26. What should asecure data erasure policy contain? 3 CRITERIAS FOR DATA ERASURE: • ERASURE – Certifications – 18 supported data erasure standards • REPORTING – Erasure reports from every erasure – Justice for IT Manager • AUDITING – Erasure process must be supervised – internal checks – All reports to one database
  • 27. Thanks for your time! Please feel free to ask questions and comment on Blancco and data erasure. You can also learn more at www.blancco.com or www.dataerasure.com Constantin Buda Manager East Europe Blancco Oy Ltd Mobile: +358 440 334 556 Email: constantin.buda@blancco.com

Editor's Notes

  1. The new legislation will clarify which law applies to a company active in several Member States. Data can be collected in Germany, stored in India and processed in the United States.
  2. EU data security rules will be strengthened and made more consistent, under new legislation being drawn up by the EU Justice Commissioner, Viviane Reding. Her proposals cover the full range of internet-based activities, from cloud computing and social media to banking and finance. They even include the consideration of establishing a “right to be forgotten” online. Viviane Reding Vice-President of the European Commission EU Justice Commissioner Your data, your rights: Safeguarding your privacy in a connected world Privacy Platform "The Review of the EU Data Protection Framework" Brussels, 16 March 2011 Directive 2002/58/EC is concerning the processing of personal data and the protection of privacy in the electronic communications sector. In mid-November 2011, the European Commission will publish the new version of its Data Protection Directive, the legislation on which the Data Protection Act is based, and among the new measures will be instructions on data processing. This will install a 'mandatory data breach disclosure' law covering every organization in the public and private sectors. Data Protection Directive will include a ‘binding safe processor rule', whereby data owners will not be liable for loss at the hands of a cloud provider. Peoples’ rights need to be built on four pillars: The first is the “right to be forgotten”: The burden of proof should be on data controllers – those who process your personal data. They must prove that they need to keep the data rather than individuals having to prove that collecting their data is not necessary. The second pillar is "transparency". It is a fundamental condition for exercising control over personal data and for building trust in the Internet. Individuals must be informed about which data is collected and for what purposes. They need to know how it might be used by third parties. They must know their rights and which authority to address if those rights are violated. They must be told about the risks related to the processing of their personal data so that they don't loose control over their data or that their data is not misused. The third pillar is "privacy by default". Privacy settings often require considerable operational effort in order to be put in place. Such settings are not a reliable indication of consumers' consent. This needs to be changed. The "privacy by default" rule will also be helpful in cases of unfair, unexpected or unreasonable processing of data – such as when data is used for purposes other than for what an individual had initially given his or her consent or permission or when the data being collected is irrelevant. "Privacy by default" rules would prevent the collection of such data through, for example, software applications. The use of data for any other purposes than those specified should only be allowed with the explicit consent of the user or if another reason for lawful processing exists. The fourth principle is "protection regardless of data location". It means that homogeneous privacy standards for European citizens should apply independently of the area of the world in which their data is being processed. They should apply whatever the geographical location of the service provider and whatever technical means used to provide the service. There should be no exceptions for third countries' service providers controlling our citizens' data. Any company operating in the EU market or any online product that is targeted at EU consumers must comply with EU rules. For example, a US-based social network company that has millions of active users in Europe needs to comply with EU rules. To enforce the EU law, national privacy watchdogs shall be endowed with powers to investigate and engage in legal proceedings against non-EU data controllers whose services target EU consumers. Stakeholders at a recent public consultation on data protection asked me to make clear that our data protection rules also apply to data retention. Storage of data is already included in the broad definition of "processing" but the general public is unaware that processing includes storing / retention. One of the grounds for data retention is law enforcement. This brings me to the role of the police and judicial cooperation in criminal matters and the data protection rules that should be applied in this area to eliminate any potential gaps and inconsistencies and to ensure a high level of protection.
  3. Blancco is the most certified and recommended provider meeting 16 of the most respected standards including certifaction, reccommendation or approval by; NATO – The North Atlantic Treaty Organisation DoD – USA Department of Defense NSTL – National Security Testing Lab TUV – Rheinland CESG – Communications Electronic Security Group INFOSEC – The Defence INFOSEC Product Co-Operation Group of the UK AIVD – Netherlands National Communication Security Agency NSM – The Norwegian National Security Authority AWB – The Polish Internal Security Agency RITEA – Blancco is certified by Japan’s Refurbished information Technology Equipment Association ORNISS- Blancco is included on teh Romanian NSA security cathalogue NBU- Czech NSA reccomends Blancco -Last year Blancco applied for Common Criteria testing and certification. Common Criteria certification EAL3+ -CC is also known as ISO 15408
  4. Blancco uses software-based overwriting that completely destroys all electronic data on a hard drive or other digital media. Permanent data erasure goes beyond basic file deletion commands which only removes direct pointers to the actual files and makes data recovery possible with common software tools. Unlike degaussing and physical destruction, which render the disk unusable, data erasure removes all information while leaving the hard drive operable, preserving the assets and the environment.
  5. Blancco sales will consult on finding the best solution that fits with the customers needs, type of hardware and process. Typically licenses are sold on an enterprise/organisational basis with options for time, data volume, hardware units and number of seats/workstations available. Comprehensive service package available. Management console it enebles you to gather, manage and audit your reports. Furthermore you can export, import, sort the reports. It is a great tool to control your entire erasure process.
  6. I am proud to tell you that Blancco offers you this security option for your data erasure processes.