Johannesburg, 12 May 2015
In light of the Protection of Personal Information (POPI) Act signed into law by the South African president in November 2013, South African government agencies have started implementing the necessary technologies to support their information security defence strategy. Government agencies deal with highly confidential information on a daily basis, such as identity documents, banking details, and other confidential personal and company information. Leakage of such confidential information, whether external or internal, can therefore be catastrophic to both individual citizens and the government itself.
One South African government agency (hereon referred to as "the client") approached AVeS to help them monitor and internally manage their network and data security. The client required an enterprise-wide, integrated ICT risk, vulnerability monitoring and reporting software tool to mitigate both known and unknown exposures of classified or sensitive information.
The client was proactive in addressing IT risks with its existing technology framework. Information security risks were, however, left vulnerable to internal data leakages where staff could potentially leak confidential or sensitive information.
Due to the organisation's large user base (12 000 users) and level of information sensitivity within its databases, the client needed a technology product that could fully mitigate its information security threats. Based on the client's requirements, AVeS established the need for a full package installation of IP-guard, the world's leading IP management software.
AVeS used IP-guard as the key software tool to address this client's business requirements and implemented all 14 modules of the product within the client's environment. IP-guard's award-winning computer security software helps organisations protect data security, manage Internet usage and simplify IT systems management. It also enables them to avoid costly loss of data leaks, regulate users' Internet and PC activity, and effectively manage IT systems. The 14 modules of IP-guard are illustrated below.
With IP-guard, the client was able to identify key risk areas and implement controls to monitor and minimise security risks associated with their IT environment. Furthermore, a proactive information security approach was possible due to the implementation of predefined policies that triggered early alerts of possible information risks and data leakages.
Share