ISO 27001
DBTRONIX and ISO 27001
Learn how to use DBTRONIX to streamline and automate ISO 27001 compliance.
Introduction
DBTRONIX quickly and accurately classifies sensitive, regulated information stored in on-premises and cloud data stores. Our classification engine prioritizes scans based on risk & exposure to give you actionable results quickly, no matter how much data you have.
Developed and published by the International Organization for Standardization and the International Electrotechnical Commission, the primary pillar of the ISO 27000 series is ISO 27001 which outlines best practices, methodologies, and implementation of information security management in an organization.
The hallmark focus of ISO 27001 is to protect the confidentiality, integrity and availability of an organization’s data. Most often, companies start by discovering and identifying potential security problems through an exercise such as a risk assessment, and then define what needs to be done to prevent and remediate existing problems. Ultimately, the core philosophy of ISO 27001 is based on managing risks: identify the risks and then systematically treat them.
DBTRONIX helps meet ISO 27001 standards and regulations as a fully integrated solution focused on protecting enterprise data wherever it lives: on-premises and in the cloud.
A.6:
Organization of Information Security
DatAdvantage
Data Audit & Protection
DatAdvantage maps who can (and who does) access data across file and email systems, shows where users have too much access, and safely automates changes to access control lists and groups.
Visualize risk, lock down sensitive data, and get full visibility and control across your on-premises and cloud-based data stores on a unified platform.
DatAlert
DatAlert detects suspicious activity and prevents data breaches across platforms, visualizes risk, and prioritizes investigation.
Visualize risk, lock down sensitive data, and get full visibility and control across your on-premises and cloud-based data stores on a unified platform.
DBTRONIX Edge
DBTRONIX Edge analyzes perimeter devices like DNS, VPN, and Web Proxy – applying blended context to activity and alerts in your core data stores.
DataPrivilege
DataPrivilege gives business users the power to review and manage permissions, groups, and access certification, while automatically enforcing business rules.
6.1.1 Information security roles and responsibilities. Control. All informatiozn security responsibilities shall be defined & allocated.
6.1.2 Segregation of duties. Control. Conflicting duties and areas of responsibility shall be segregated to reduce opportunities for unauthorized or unintentional modification or misuse of the organization’s assets.
6.1.4 Contact with special interest groups. Control. Appropriate contacts with special interest groups or other specialist security forums and professional associations shall be maintained.
6.2.1 Mobile device policy. Control. A policy and supporting security measures shall be adopted to manage the risks introduced by using mobile devices.
6.2.2 Teleworking. Control. A policy and supporting measures shall be implemented to protect information accessed, processed or stored at teleworking sites.
Contact Us
We are here to help. Call us and speak with a secure erase specialist who will answer any questions you might have