+852 - 2155 8000

info@dbtronix.com.hk

  1. Home
  2. /
  3. ISO27001

+852 - 2155 8000

info@dbtronix.com.hk

  1. Home
  2. /
  3. ISO27001

ISO 27001

DBTRONIX and ISO 27001

Learn how to use DBTRONIX to streamline and automate ISO 27001 compliance.

Introduction

DBTRONIX quickly and accurately classifies sensitive, regulated information stored in on-premises and cloud data stores. Our classification engine prioritizes scans based on risk & exposure to give you actionable results quickly, no matter how much data you have.

Developed and published by the International Organization for Standardization and the International Electrotechnical Commission, the primary pillar of the ISO 27000 series is ISO 27001 which outlines best practices, methodologies, and implementation of information security management in an organization.

The hallmark focus of ISO 27001 is to protect the confidentiality, integrity and availability of an organization’s data. Most often, companies start by discovering and identifying potential security problems through an exercise such as a risk assessment, and then define what needs to be done to prevent and remediate existing problems. Ultimately, the core philosophy of ISO 27001 is based on managing risks: identify the risks and then systematically treat them.

DBTRONIX helps meet ISO 27001 standards and regulations as a fully integrated solution focused on protecting enterprise data wherever it lives: on-premises and in the cloud.

A.6:

Organization of Information Security

DatAdvantage

Data Audit & Protection

DatAdvantage maps who can (and who does) access data across file and email systems, shows where users have too much access, and safely automates changes to access control lists and groups.

Visualize risk, lock down sensitive data, and get full visibility and control across your on-premises and cloud-based data stores on a unified platform.

DatAlert

Security Analytics

DatAlert detects suspicious activity and prevents data breaches across platforms, visualizes risk, and prioritizes investigation.

Visualize risk, lock down sensitive data, and get full visibility and control across your on-premises and cloud-based data stores on a unified platform.

DBTRONIX Edge

Perimeter Telemetry

DBTRONIX Edge analyzes perimeter devices like DNS, VPN, and Web Proxy – applying blended context to activity and alerts in your core data stores.

DataPrivilege

Data Access Governance

DataPrivilege gives business users the power to review and manage permissions, groups, and access certification, while automatically enforcing business rules.

6.1.1 Information security roles and responsibilities. Control. All informatiozn security responsibilities shall be defined & allocated.

DBTRONIX significantly reduces the risk of data loss and misuse by enabling organizations to manage access to data, empower data owners to grant and revoke access directly, and automatically repair and maintain file system permissions so that organizations are less vulnerable to internal and external threats, more compliant, and consistently following a least privilege model.

6.1.2 Segregation of duties. Control. Conflicting duties and areas of responsibility shall be segregated to reduce opportunities for unauthorized or unintentional modification or misuse of the organization’s assets.

DBTRONIX helps limit access controls and reporting to each user’s scope. Data owners will only see (and manage access to) the shares they are responsible for in the UI. A security operator will be able to see reports and track triggered alerts, but won’t be able to administer the network.

6.1.4 Contact with special interest groups. Control. Appropriate contacts with special interest groups or other specialist security forums and professional associations shall be maintained.

DBTRONIX has expert security researchers, engineers, technical support, professional services, and security specialists available via office hours, online courses, webinars, in-person events, and customer communities.

6.2.1 Mobile device policy. Control. A policy and supporting security measures shall be adopted to manage the risks introduced by using mobile devices.

DBTRONIX Edge monitors remote access of your data and applies analytics to detect abnormal logins or access from foreign locations to your company. With DBTRONIX, you’ll be able to distinguish between a remote login from a known user from a hacker trying to infiltrate your network using stolen credentials.

6.2.2 Teleworking. Control. A policy and supporting measures shall be implemented to protect information accessed, processed or stored at teleworking sites.

DBTRONIX DatAdvantage monitors your primary data stores even as they are access by remote users and you will get alerts if a user tries to copy sensitive files from those data stores. Enforcing a policy that requires users to access important data through the VPN or the Sharepoint site keeps their activity protected by DBTRONIX and protects your data from data breaches.

Contact Us

We are here to help. Call us and speak with a secure erase specialist who will answer any questions you might have

WhatsApp