or call 1300-AQUION
Encryption and Data Loss Prevention (DLP)
Encrypting data is the last line of protection against data being accessed by unauthorised users.
Effective enterprise encryption solutions require key management and escrow; policy adherence; deployment, and ongoing management strategies.
Aquion provides sophisticated centrally managed and deployed encryption solutions for data in motion and at rest. Aquion is a Symantec Gold Encryption Specialist partner and Townsend Security's Australia and New Zealand partner.
Aquion provides solutions for file, email, disk, laptop, end point, USB, mobile devices and servers. Encrypted secure FTP and back up transfers are available for IBM zSeries, IBM iSeries, UNIX and Windows servers.
Securing emails via encryption ensures that only those authorized can read the content. Email can be secured at every point in the send and store process. Corporations using secure email require an effective process to access and audit encrypted emails in case of suspected fraud or employee mobility. Management of the keys that are used to access the emails is also a process that must be addressed for effective secure messaging in the business context.
Methods for encrypting emails range from client software to gateway appliances. Email encryption can be automated to ensure that there is no user involvement . Given that there are a number of protocols in use for encryption, Aquion's offers secure messaging solutions that address the needs for different keys (PGP and X.509 S/MIME), certificates, protocols and the delivery to anybody, anywhere, regardless of whether they only have a browser.
Do you carry the details of your business (and possibly personal) life around with you in the form of data on a laptop?
Annually millions of laptops are lost or stolen globally. Laptop encryption ensures your laptop and removable media data is inaccessible to anyone but authorised users.
Aquion's laptop encryption for the enterprise provides a supporting management process and tools for deployment, management, auditing and disk recovery due to employee changes.
Large Data files are stored on servers; written to tape or disk for backup or archival; and may be transported over the internet via FTP. These files have the potential to be lost, stolen or intercepted. If these files contain sensitive data Aquion's automated encryption solutions easily encrypt and decrypt the data, protecting when in transit and at rest.
Where large numbers of large files are backed up or transferred, automation of the process decreases the incidence of errors and time taken. Automated encryption functions are provided by Command Line tools which reside on servers - from Windows through UNIX to mainframes.
Using a special Software Development Kit (SDK) scripting is relatively simple. Key management and key escrow are critical factors to consider a swell as archival and retrieval factors.
Control of access to documents on network file shares can be problematic and difficult to manage on an ongoing basis. For example, methods are required to ensure only HR and line managers can see sensitive personnel records, and even then a line manager should only see the records for the staff that they manage.
PGP's solution to the protection of network files is the ability to encrypt documents and only give read/write access to authorized individuals. Network File Encryption using PGP Netshare can also provide a means of protecting credit card data held in spreadsheets or other documents on file servers to meet the requirements of PCI-DSS.
Your connection device into networks (end point) is permeable (eg laptops, desktop or other device) unless protected. The entry of malware into corporate networks is possible via end point devices. Data leaks and the theft of corporate intellectual property from endpoints are also fact. Aquion's EndPoint security and management solutions from Symantec and GFI enable organisations to ensure that only approved end points of the correct configuration are used on the network, and that organisational policies regarding the end point can be adhered to with minimum end user impact.
Enterprise encryption requires centralised management of policy, keys, operation and audit. Many encryption methods require the use of keys specific to individual users, the corporation or for auditing purposes to enable enterprise access. These keys (e.g. PGP or X.509 S/MIME) require generation, distribution, revocation, storage and management. A Public Key Infrastructure (PKI) is the products and policies required to provide effective organizational key management. Some organizations choose to buy PKI as a service from a trusted third party while others run one or many PKI to meet strategic key management and encryption requirements.
Please leave your details and Aquion will contact you