Encryption and Data Protection

Only a few years ago, data encryption was relatively unknown to most computer users. They realized that governments and corporations used this protection, but why did they need it?

Most people only had a desktop computer and connected mostly using a phone modem. Interactions with the Internet were relatively brief and their computers only left home (or the office) when going to the repair shop.

Today, more folks are using laptops as well as smart phones, net books and other mobile devices often containing a lot of personal information as do the USB drives and thumb drives we used to store and transfer data. Because they are portable, they are at greater risk for loss or theft.

Definitive Strategic Consulting offers a range of professional services for solutions addressing Payment Card Industry Data Security Standard (PCI DSS) compliance. The proposed consulting services enables organization to reduce the time and cost needed deploy a chosen encryption solution and to reduce risk to its business.

Our consultants will provide both business analysis and technology subject matter expertise. Our consultants have substantial experience with PCI DSS compliance projects, including project management, gap analysis and implementing data masking, encryption solutions.

The following phases are provided for the solution architecture.

  • Project Framework
  • Training Workshops
  • Blueprint
  • Proof of Concept

Our consultants can be engaged to assist with the remediation of encryption gaps within your environment. We work with your team to resolve security risks for your environment. Remediation for encryption maybe as simple as configuration changes within software and updated policies for staff. The consultants will review your current infrastructure and resources capabilities to fill the encryption gaps. We then have access to both commercial and open source products to extend your internal capabilities if necessary.

Our consultants can be engaged for providing expertise to organizations looking to select an encryption product for their environment. We can take your businesses and organizational requirements for a technology and adapt them with the security requirements for encryption. We present a document that can be used as a tender for vendor submissions, with our consultants reviewing the quality and consistency of their responses.

Some of our encryption solutions includes:

  • Email Service Encryption: If you are sending out emails from a local email provider, odds are that you are not or might not even have the ability to send out secure or encrypted emails. Simply put, if you are not paying for your email service, it is not secure!! Our encrypted email solution is one of the only sure ways of knowing you are sending emails safely and securely. The encrypted email service will run in the background searching for items like confidential records and fully encrypt the email before it is sent out.
  • Desktop Encryption: Our managed and monitored encryption service will ensure data saved on the local hard drive of your office computers or mobile devices are safe and secure. Encryption is required to ensure compliance to a growing list of government and industry mandates. Our encryption solution is both cloud-based requiring no hardware or software infrastructure to purchase, install or support, or tokenized versions. The solutions are based on client needs. Our encryption solution runs continuously in the background looking for and encrypting all various file types that may contain protected data. Our encryption solution can also control Log-in and Log-out times on your network computers. This ensures that after office hours, your protected data is not accessible. Complimentary to the Log-in Log-out feature is a robust logging system. With this you can easily monitor and audit who has logged into what workstation at what time and for how long.
  • USB encryption: USB devices that contain controlled data can be a serious vulnerability for any business. Small external devises like external hard drives and flash drives are ideal for transporting, backing up and sharing business data. However these portable devices, although convenient, often get misplaced or carried off by an employee. Fortunately, we offer solutions to this potential threat of a data breach. Our encryption solutions can now ensure data security on these USB devices by deploying a cloud managed tool that allows an administrator to determine who may write data to what device(s), under what conditions and most importantly who is permitted to read that data.