Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
SlideShare a Scribd company logo
DATA SECURITYYour Security beginshere!
The CompanyDATA SECURITYis formed by professionals with over 15 years of experience in information security and computer forensics international market.We are ready to offer training and consulting solutions appropriate to the volume of your business.
CurrentScenarioCompanies lose millions of dollars in damage to computers every year. .
Hours of unavailability take consumer confidence.
Virtual threats become more sophisticated, often causing damage to businesses and home users.Suchincidentsthreatenyours ...Information, an ESSENTIAL asset for the business, which requires adequate protection to add value for people, processes and technology.The information can exist in several forms: Printed.Writed.Electronicallystored. .Spoked in conversations, etc.
To protect your information…There is information security, which aims to protect the information of the various threats that surround it, ensuring:Its use onlybyauthorizedpersons (Confidentiality);They are reliableandnotcorrupted (Integrity); andThe assurancethatcanbeusedwhennecessary (Availability).
Information SecurityDATASECURITYpresents various services, such as:Incident ResponseWe operate from consulting to full outsourcing services of monitoring your environment in search of irregularities related to information security.RiskAnalysisThe scope of our consultancy can include analyses in business, people, technologies, systems, incident response, continuity and availability, compliance, policies and procedures, and other items relevant to your company.
Information SecurityDATASECURITYpresents various services, such as: GAP Analysis ISO 27000 and PCI-DSSWe conducted an analysis of your company in relation to prescriptive as the family ISO 27000 and PCI-DSS, allowing you to diagnose the most critical points of information security.Penetration TestOur analysis allows to recognize vulnerabilities in your network perimeter and assessing their risks, and also provide subsidies for corrections and preventive measures.
Information SecurityDATASECURITYpresents various services, such as:   Business ContinuityPlanWe assist in planning focused on creating a set of strategies and action plans to ensure that essential services are properly identified and preserved after a disaster, going up the return to normal operation.Security PolicyWe formulate or re-formulate your security policy showing possibles problems and gaps in their items and we can do a awareness campaign with your employees.
But if there is something wrong?Exists the Computer Forensics, that makes it possible to investigate devices such as computers, cell phones and other media to determine the cause of an incident and the possible culprits. We have procedures for:Collection, preservation and analysis of evidence; Production of the expert report; Aid in possible disputes.
Computer ForensicsDATASECURITYpresents various services, such as:Investigation of mobile devices Research on mobile phones and smartphones allows a quick view of equipment usage through registration information as text messages, call history, photographs, list of phones, among other features.Corporate FraudInvestigation of several illicit in enterprises, be they authored by employees, partners or customers.
Computer ForensicsDATASECURITYpresents various services, such as:Digital CrimeWe work in the investigation of crimes such as fraud, tax evasion, counterfeiting (piracy) and other crimes that require the use of computational resources of expertise.Storage MediaThis investigative process, those information found in these devices and the data that was retrieved even after their elimination.
But, if I want to learn?Rely on our courses that allow you to train it for more than 300 hours in various technical and management training in information security and electronic crimes investigation! Practical courses with the vision of internationally renowned professionals in information security!
DataSecurity Courses

More Related Content

Data Security - English

  • 2. The CompanyDATA SECURITYis formed by professionals with over 15 years of experience in information security and computer forensics international market.We are ready to offer training and consulting solutions appropriate to the volume of your business.
  • 3. CurrentScenarioCompanies lose millions of dollars in damage to computers every year. .
  • 4. Hours of unavailability take consumer confidence.
  • 5. Virtual threats become more sophisticated, often causing damage to businesses and home users.Suchincidentsthreatenyours ...Information, an ESSENTIAL asset for the business, which requires adequate protection to add value for people, processes and technology.The information can exist in several forms: Printed.Writed.Electronicallystored. .Spoked in conversations, etc.
  • 6. To protect your information…There is information security, which aims to protect the information of the various threats that surround it, ensuring:Its use onlybyauthorizedpersons (Confidentiality);They are reliableandnotcorrupted (Integrity); andThe assurancethatcanbeusedwhennecessary (Availability).
  • 7. Information SecurityDATASECURITYpresents various services, such as:Incident ResponseWe operate from consulting to full outsourcing services of monitoring your environment in search of irregularities related to information security.RiskAnalysisThe scope of our consultancy can include analyses in business, people, technologies, systems, incident response, continuity and availability, compliance, policies and procedures, and other items relevant to your company.
  • 8. Information SecurityDATASECURITYpresents various services, such as: GAP Analysis ISO 27000 and PCI-DSSWe conducted an analysis of your company in relation to prescriptive as the family ISO 27000 and PCI-DSS, allowing you to diagnose the most critical points of information security.Penetration TestOur analysis allows to recognize vulnerabilities in your network perimeter and assessing their risks, and also provide subsidies for corrections and preventive measures.
  • 9. Information SecurityDATASECURITYpresents various services, such as: Business ContinuityPlanWe assist in planning focused on creating a set of strategies and action plans to ensure that essential services are properly identified and preserved after a disaster, going up the return to normal operation.Security PolicyWe formulate or re-formulate your security policy showing possibles problems and gaps in their items and we can do a awareness campaign with your employees.
  • 10. But if there is something wrong?Exists the Computer Forensics, that makes it possible to investigate devices such as computers, cell phones and other media to determine the cause of an incident and the possible culprits. We have procedures for:Collection, preservation and analysis of evidence; Production of the expert report; Aid in possible disputes.
  • 11. Computer ForensicsDATASECURITYpresents various services, such as:Investigation of mobile devices Research on mobile phones and smartphones allows a quick view of equipment usage through registration information as text messages, call history, photographs, list of phones, among other features.Corporate FraudInvestigation of several illicit in enterprises, be they authored by employees, partners or customers.
  • 12. Computer ForensicsDATASECURITYpresents various services, such as:Digital CrimeWe work in the investigation of crimes such as fraud, tax evasion, counterfeiting (piracy) and other crimes that require the use of computational resources of expertise.Storage MediaThis investigative process, those information found in these devices and the data that was retrieved even after their elimination.
  • 13. But, if I want to learn?Rely on our courses that allow you to train it for more than 300 hours in various technical and management training in information security and electronic crimes investigation! Practical courses with the vision of internationally renowned professionals in information security!
  • 15. Head Office DATA SECURITY:Rua Eça de Queiroz, 682 – Vila Mariana CEP: 04011-033 - São Paulo - BrasilTelephone:55-11-5011-7807E-mail:datasecurity@datasecurity.com.brDATA SECURITY on Internet:www.datasecurity.com.br© Copyright 2006-2011 Data Security Allrightsreserved