Tip:
Highlight text to annotate it
X
Throughout the lifecycle of managing your IT assets -- from acquisition through disposal
-- you need a strategy for protecting your data, preventing breaches, responding to audits
promptly, and quickly resolving problems. We're Brass Valley and we offer you a solution.
It's our Managed Data Security Platform. We call it "your other firewall."
You know how a firewall keeps the bad guys from getting in? Well, the "other firewall"
keeps sensitive information from getting out -- both when it's out of production, and after
you've disposed of the equipment that contains the data.
By implementing and refining our "other firewall" over the past decade, we've helped companies
drastically improve the security of their IT Management process. And we've found six
blind spots nearly all of them share. The first blind spot is the lack of process
control -- Clients often tell us, "We don't really know what we own or where to find it
or who owns it." Does this sound like you? You can experience this problem anywhere from
the receiving dock when new product arrives all the way through the decommissioning process.
Solid process control is the solution -- and it's part of what you'll get in our "other
firewall." Blind Spot #2: Asset Database Management -- Many
clients have an asset-management tool but lack standard nomenclatures, which makes reconciliation
efforts very difficult. Our system enforces standards and conventions in database management
to ensure the consistent use of serial numbers, model numbers, brand names and other information
crucial to controlling your assets throughout their lifecycles -- and beyond.
Blind Spot #3: Embedded Data -- Embedded data is hidden data. For example, it took most
people years to realize their copier had a hard drive containing some of their most sensitive
information. Embedded data is found on switches, phones, faxes, PDA's, medical equipment and
the list is growing. Embedded data can remain in the equipment's memory after you dispose
of it, which can create legal problems for you in the future. You and other IT asset
owners aren't the only ones who can't find or manage embedded data. Even most IT Asset
Disposition providers don't know where it is. We do -- and we know how eliminate it.
Blind spot #4: Inadequate "chain-of-custody" documentation -- Can you prove if your IT
equipment was properly secured after decommissioning, what information was on the equipment, that
the data was destroyed, and where it went after you disposed of it? Without strong documentation
addressing these questions, you may be unable to prove the "chain of custody" for your equipment,
and that can mean trouble. You maintain liability for data even after it has left your possession.
So you need to have the documentation that will be admissible and effective if you have
to go to court. Our "other firewall" protects you from this danger.
Blind spot #5: Insufficient or non-existent indemnification -- Companies routinely accept
a certificate of insurance and/or a letter of indemnification from their ITAD/ITAM providers
without ever seeing a copy of the vendor's insurance policy or understanding what is
really needed for effective indemnification. Because of this, most industry indemnification
presents a dangerous blind spot -- that is, insufficient insurance coverage. The "other
firewall" gives you the coverage you need. Blind Spot #6 is accelerated breach-response
capability -- When you have experienced an audit or data breach you need to act very
quickly to limit the damage. Most companies don't have easy access to the most critical
information required to produce in an audit or defend them in court after a data breach.
Many don't even have a response plan in place. The "other firewall" protects you from this
risk by guaranteeing your immediate access to all your crucial asset-management data
plus step by step action to engage our insurance platform of protection.
For more than ten years, Brass Valley has helped some of the most security-conscious
companies in the world protect their off-network data.
If your business has to protect sensitive information, and you want a partner who can
help you eliminate your blind spots, contact us at BrassValley.com/contact to get the "other
firewall: for prevention and protection if and when something goes wrong.