Investor Presentaiton slide image

Investor Presentaiton

Executive Summary Improving Financial Health Data Employees Social - Data Security - Multi-layered approach Supply Chain Environment Governance Policies & Data tables Appendix Protecting our perimeter We have a defence-in-depth approach to protecting our critical data assets, which provides multiple layers of control and protection Perimeter scanning Scanning the perimeter for open access and scanning applications for cyber risks and regulatory compliance Firewall and Proxy Services Blocks unauthorised access while permitting outward communication Intrusion Prevention System (IPS) Examines network traffic flows to detect and prevent vulnerability exploitation Web Application Firewall (WAF) Filters, monitors, and blocks HTTP traffic to and from web applications Cloud based scanning Scanning the cloud environments for inappropriate configurations for cyber risks Server protection Antivirus, host security, continuous reporting O I 23 43 Experian Public experian.
View entire presentation