Showing posts with label security. Show all posts
Showing posts with label security. Show all posts

Wednesday, August 16, 2017

Collavate DLP Offers Security to Encompass all Levels of G Suite

Affordable Data Loss Prevention Solutions for Google Drive Tools Now Available

San Jose, CA, August 16, 2017 - According to Gartner CISO, a security and risk assessment organization, data loss prevention is a top priority of businesses today. As corporate data has an increasingly high risk of being targeted and breached, Collavate DLP (Data Loss Prevention) has stepped up to offer Google Drive security protection for all Google Drive users.

“With online communication more prevalent than ever and corporate applications being so popular, it is imperative to keep the information within the applications from getting into the wrong hands,” stated a Collavate DLP representative. “Google Drive security has been limited and costly in the past because it was only available for the more expensive G Suite Enterprise. We are pleased to introduce Collavate DLP which can be used with G Suite Basic and G Suite Business as well.”

Google Drive is a popular tool that many businesses use for real-time collaboration and data storage. However, since Drive lacks data loss prevention tools, the breach of information can easily devastate a business.

Until now, Google Drive users have been forced to go with the elite, most expensive collaboration package (G Suite Enterprise) if they wished to invoke Google Drive security measures. Collavate DLP now makes it possible to have data loss prevention services with any Google Drive platform, including G Suite Basic and G Suite Business.

It is estimated that the cost of cybercrime worldwide will top two trillion dollars by 2019, triple the estimated cost reported in 2015. Gartner CISO has identified risks imposed by point-of-sale devices, flash drive, mobile devices, file servers, databases, PCs and virtual servers. Potential access points include wirelines, wireless devices, VPNs and other similar avenues. Source codes, documents of product design, financial documents, customer data and other top-security data are all at risk of being breached.

It is increasingly imperative to have Google Drive security in place because the use of the collaboration tool often includes storage of critical information such as medical records, social security numbers, and credit card information. In many cases, just one breach may cripple a company.  Furthermore, upstanding businesses desire to be trustworthy with their employee and customer information.

Collavate DLP provides security detection in real-time, a key feature. The program also predefines keywords in files in order to monitor activity on viewing trends, another important measure. Rule setting and regular expressions are also defined for even stronger security.

All Google Drive suite editions, even SMB’s, are eligible to take advantage of Collavate DLP. Introducing Collavate DLP to the market serves as a welcome relief to collaborators who are aware of the the importance of cybersecurity.

To find out more about the services offered or to purchase, visit the Collavate DLP website.

PR Contact:
Claire Lin
claire@collavate.com

About Collavate Inc.
Collavate is a cutting-edge enterprise social network with workflow management capabilities. Completely integrated with Google Drive, Collavate allows you to assign deadlines, share ideas, and review documents—all through a secure platform. Implement Collavate’s free seven-day trial from the G Suite Marketplace.

Contact:
Claire Lin
Collavate Inc
San Jose, CA 95129
+1 (650) 515-3733
claire@collavate.com
http://www.collavate.com

Saturday, August 30, 2014

Global Technology Solutions provider Netswitch launches product to Maximize Network Security for all Businesses and Company COO and Chief Security Officer Launches eBook

When a computer virus infected the network at Crouse and Associates in San Francisco, the insurance services company ground to a halt during a weeklong outage — costing a significant amount of time and money to resolve.

San Francisco, CA, August 31, 2014 - When a computer virus infected the network at Crouse and Associates in San Francisco, the insurance services company ground to a halt during a weeklong outage — costing a significant amount of time and money to resolve. The company does not have a large IT staff or a chief information security officer, it can’t afford to employ security experts and it doesn’t have the time or expertise to wade through the complicated Internet security landscape filled with intimidating terminology like “botnets,” “kill-chains,” “application firewalls” and “advanced persistent threats.”

So the busy company left it all up to global technology solutions provider Netswitch and its innovative MADROC® Integrated Security Platform that maximizes network security for more than 2,500 global businesses, large and small. MADROC® provides complete intrusion detection and prevention along with event management and immediate alerting and remediation — complete peace of mind within a monthly subscription plan.

The future is very clear: Cyber-crime is growing rapidly and as security gets better, the criminals get smarter. To respond to this real problem, Netswitch has revolutionized the way IT security is delivered — controlling and monitoring a heterogeneous mix of IT technology from top to bottom at every touch point; a true Defense in Depth security strategy. A MADROC® subscription includes all engineering, configuration, tuning, licenses and maintenance, along with a dedicated Security Operations Control Center providing support around the clock, with 15 minute response and immediate remediation.

“Netswitch is applying technology to important security and social issues that I care deeply about,” said Ken Chrisman, Board Member of Netwitch. “This is an important opportunity to use technology to protect personal information and doctor/patient confidentiality. I believe MADROC® is poised to revolutionize the personal information security space with enhanced security protection through advanced behavioral analytics while leveraging the cloud to manage the massive data being generated.”

For more information go to http://www.netswitch.net/.

MADROC® Integrated Security Platform Customer Testimonial:

Pam Quilici, executive vice president of Crouse and Associates

“We chose MADROC® to ensure that our network will be secure and that we are protected from similar attacks in the future,” said Pam Quilici, executive vice president of Crouse and Associates. “Netswitch has been a trusted supplier of IT services for years. We love the way the MADROC® service is designed and we know we can always count on Netswitch for the smartest and most professionally responsive support.”

Shane Isaaks, the CIO of the Peninsula Hotel Group and Hongkong and Shanghai Hotels Group:  (See detailed information on this case study below)

"We have used Netswitch Security Services and their experts for years to insure that the Peninsula Hotels are protected against data breaches and other security threats. Their new MADROC program is revolutionary in that it combines all levels of protection in a single service package that is amazingly affordable. We are looking forward to a threat-free future."

e-Book Breach Launches
In addition to the launch of MADROC® Integrated Security Platform, Netswitch COO and Chief Security Officer Steve King has launched an eBook called “Breach” that describes the current state of data breaches, and what you can do to protect your company.

Excerpt from eBook Breach: We have seen the trends in cyber-crime and malware attacks. With these attacks evolving at such an astounding pace, your organization needs security solutions today that address head-on every attack vector from the surface to the core, aka Defense in Depth. We believe that the principle of Defense in Depth should be the foundation strategy for any and all business security policies and approaches. Defense in Depth is the coordinated use of multiple security countermeasures to protect the integrity of the information assets in an enterprise. The strategy is based on the military principle that it is more difficult for an enemy to defeat a complex and multi-layered defense system than to penetrate a single barrier.

In terms of computer network defense, Defense in Depth measures should not only prevent security breaches, but will also buy an organization time to detect and respond to an attack, thereby reducing and mitigating the consequences of a breach.

“I wrote this book because I wanted to help business leaders sort through all of the jargon and arcane references in the data security world so that they could understand both the actual threats, the dangers of doing nothing and the easiest, simplest and lowest cost ways to insure against the inevitable data breaches that will occur in the future,” said King.  “One of the many dangers in doing nothing is that it will invite the government (both) to insert themselves into the process of "protecting consumer personal information". The costs of compliance with Sarbanes-Oxley have risen more than 60% over the last 10 years and have had significant unintended consequences in area like IPOs and increased compensation for lawyers, auditors and run-away consulting fees. It would be much worse with a Federal Security Compliance Act.”

NOTE:  On Tuesday, August 26th the first of many bills to come is on Jerry Brown's desk imposing government rules and protection legislation on businesses (who do not do it themselves) to insure against the loss of consumer and personal information and to offer one year free credit access to consumers whose financial information has been compromised.
The book is complimentary and can be downloaded at http://www.netswitch.net/ebook-breach-by-steve-king/.

Background on Steve King, Chief Operating Officer, COO and Chief Security Officer and eBook Author

After college, Steve turned down an offer to be a copy-writer on the Hoover Vacuum account for Hoefer-Dieterich and Brown to pursue a career in IT, but never lost sight of the future impact of consumerization on Information Technology. Steve subsequently logged over 30 years of computer industry experience in sales and marketing, software engineering, product development and professional services. Steve also has extensive market experience in Information Security Management Internet, Digital Media, Business Intelligence, Document Management, eCommerce, and Business Process Reengineering.

Steve has managed product development with UNIX, Windows and Java platforms, founded three software and services startups and raised $32m in venture capital. Steve has held a variety of executive management positions in development, sales, and marketing  for ConnectandSell, Whittman-Hart, marchFIRST, the Cambridge Systems Group, Memorex, Health Application Systems, Endymion Systems, Blackhawk Systems Group and IBM.

He has also led digital marketing engagements for Abercrombie & Fitch, Tommy Bahama, REI, Harley Davidson and wrote a best-selling business book on Retail Web Marketing.

As a co-founder of the Cambridge Systems Group, Steve led the marketing effort for ACF2, which would become the leading Enterprise Data Security product for IBM mainframe computers. As a direct result, Steve is now known as the God-father of Information Security. Over the years, Steve has been issued multiple engineering patents encompassing contextual semantic search technologies, web-enabled multimedia audio transfers, imaging capture and database smart query processing.

Steve studied toward a B. S. in Mathematical Probability and Statistics from the University of California at Berkeley with a Minor in Journalism and studied Social Justice Law at the Santa Clara University School of Law.

Contact:
Marci Bracco Cain
Chatterbox
Carmel, CA 93923
831-747-7455
http://www.netswitch.net