This is the top of the page.
Displaying present location in the site.
  1. Home
  2. Solutions & Services
  3. Public Safety Solutions & Services
  4. Information Management
  5. Information Security
Main content starts here.

Information Security

User Management & Control System

Computer systems have shown themselves to be extremely vulnerable. Data often gets leaked when mobile devices are lost. Meanwhile, back at the office, criminal groups attempt to hack into systems to obtain valuable information. And through all this, organizations have to defend themselves against daily assault by attacks from viruses, worms and Trojan horses.

To protect information in the enterprise, NEC's user management and control system ensures that only legitimate users have access to the data and that access is further managed so that information is only available based on access privileges.

User access control relies on an authentication platform guided by the principle of information being distributed on a need-to-know basis. Access is granted based on role, not individuals.

PC & Network Protection

At the PC level, NEC's information security platform ensures patches are up-to-date and all PCs are armed with anti-virus and anti-spam ware solutions. On network side, NEC provides intrusion detection at the server level and the network level. NEC's solutions are also able to anticipate and respond to distributed denial of service attacks.

To enhance security, NEC is able to provide centralized management of network mapping, instead of the traditional approach of individual router management.

Information Protection at the Enterprise

At the enterprise level, NEC provides thin clients which are more secure than traditional workstations because patches are performed centrally. NEC also has solutions for secure email distribution that classifies outgoing emails. Emails with sensitive data have a two-stage delivery process so that approval has to be given before that email can be sent out.

Enterprises frequently need to distribute very large files to individuals but they need to do this in a way that does not compromise security. Email is not practical because of size while USB sticks are handy but not secure. NEC offers a secure information exchange site that allows individuals to exchange large files using a secure centralized repository instead.

Information Protection at the PC Level

On the PC, NEC has solutions to ensure that data residing on devices is not wrongfully distributed, whether accidentally or deliberately. Portable devices such as laptops are typical weak points in the enterprise because of their mobility and portability.

The InfoCage PC Security system encrypts the hard drive so that if it falls into the wrong hands, the information cannot be accessed without a password. USB flash drives are particularly vulnerable as these are small and easy to hide. InfoCage is able to restrict the use of external storage media so that only previously qualified external storage devices can access the data. Finally, all actions are logged so that in the event of a leak, administrators are able to trace the source of the leak.

NEC's Policy Receipt Client ensures that enterprise PCs have policies that can be pushed down to individual workstations. These policies determine what features of the PC that can be accessed. Finally, Files Access Control Management automatically scans the PC and encrypts individual files for another level of security.

Top of this page