Investor Presentaiton
Executive Summary
Improving Financial Health
Data
Employees
Social - Data Security - Multi-layered approach
Supply Chain
Environment
Governance
Policies & Data tables
Appendix
Protecting our perimeter
We have a defence-in-depth approach to protecting our critical data assets,
which provides multiple layers of control and protection
Perimeter scanning
Scanning the perimeter for open access and scanning
applications for cyber risks and regulatory compliance
Firewall and Proxy Services
Blocks unauthorised access while permitting outward
communication
Intrusion Prevention System (IPS)
Examines network traffic flows to detect and prevent
vulnerability exploitation
Web Application Firewall (WAF)
Filters, monitors, and blocks HTTP traffic to and from web
applications
Cloud based scanning
Scanning the cloud environments for inappropriate
configurations for cyber risks
Server protection
Antivirus, host security,
continuous reporting
O I
23
43
Experian Public
experian.View entire presentation