Protecting Data at Rest Through Encryption CIO Summit November 30, 2007.

Slides:



Advertisements
Similar presentations
Computer and Mobile Device Equipment Security Brief May 29, 2008 Presented by: Kevin G. Sutton, Chief, Information Technology Unit.
Advertisements

CANHEIT | On the EDGE | June 15-18, 2008 | University of Calgary Collaborative Computing on an Institutional Level Steve Breeck, Harold Esche, Bill Richardson.
Avoid data leakage, espionage, sabotage and other reputation and business risks without losing employee performance and mobility.
Personal Data Protection and Security Measures Justin Law IT Services - Information Security Team 25 & 27 November 2013.
GRAD 521, Research Data Management Winter 2014 – Lecture 7 Amanda L. Whitmire, Asst. Professor.
Secure Transit & Storage HOW TO SECURELY STORE & SEND CONFIDENTIAL DATA by The UTHSC Information Security Team.
Information Systems Services Protecting Data – Keeping Safe Kevin Darley, IT Security Co-ordinator 8 th November 2012.
Data Storage and Security Best Practices for storing and securing your data The goal of data storage is to ensure that your research data are in a safe.
Protection of personal mobile computer devices Information Security Isaac Fernandes, mci12009 Sofia Nunes, mci12014.
Data Security for Healthcare Facilities Debbie Abbott Health Information Consultant Resolutions (Int) Pty Ltd.
Avoid data leakage, espionage, sabotage and other reputation and business risks without losing employee performance and mobility. Simplify authentication.
Ohio Digital Government Summit Laptop Disk Encryption Colorado’s Approach Presented to: Ohio Digital Government Summit October 16, 2007.
Network and Server Basics. 6/1/20152 Learning Objectives After viewing this presentation, you will be able to: Understand the benefits of a client/server.
Barracuda Backup Service Data Backup and Disaster Recovery.
The Ultimate Backup Solution.
Personal Data Protection and Security Measures Justin Law IT Services - Information Security Team 18, 20 & 25 March 2015.
Data Encryption Overview South Seas Corporation Jared Owensby.
Saving Your Business from a Data Loss Randy Clark.
Complete Data Protection from [INSERT SOFTWARE NAME] Insert logo.
©2011 Kingston Technology Corporation. All rights reserved. All trademarks and registered trademarks are the property of their respective owners. Best.
Sybase Confidential Propriety.iAnywhere ConfidentialiAnywhere Confidential Proprietary.Sybase Confidential Propriety. Addressing the Challenges of Device.
New Data Regulation Law 201 CMR TJX Video.
1 Managed Security. 2 Managed Security provides a comprehensive suite of security services to manage and protect your network assets –Managed Firewall.
Information Security Decision- Making Tool What kind of data do I have and how do I protect it appropriately? Continue Information Security decision making.
1.1 System Performance Security Module 1 Version 5.
Client-Server & Peer-to-Peer Networks
INTEROP 2014 Mobile Issues in the Network. Mobile Issues Data loss – Hardware theft or failure – Data corruption Data theft – Hardware theft – Spyware,
Mobile Device Management Central Management of Wintel Laptop Software and Hardware in a Secure Environment.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco PublicNew CCNA Jianxin Tang IT 1 V4.0 Ch4. Basics of Preventive Maintenance.
Continuous Backup for Business CrashPlan PRO offers a paradigm of backup that includes a single solution for on-site and off-site backups that is more.
Chapter 2 Securing Network Server and User Workstations.
Cyber Security Awareness Month Protecting Your Laptop’s Data Off-Campus Safe Computing Part 1.
Enveloc ®, Inc. The Importance of Data Backup Enveloc, Inc. USA Technology & Research Park 775 N. University Blvd. Suite 110 Mobile, AL
Sponsored by the U.S. Department of Defense © 2008 by Carnegie Mellon University page 1 Pittsburgh, PA The Implications of a Single Mobile Computing.
Backup Exec System Recovery. 2 Outline Introduction Challenges Solution Implementation Results Recommendations Q & A.
Endpoint Encryption Methodologies Ed Underwood Dell Data Protection.
©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. Securing Your Data in Endpoint and Mobile Environments Frank Suijten Security.
Network and Server Basics. Learning Objectives After viewing this presentation, you will be able to: Understand the benefits of a client/server network.
WHAT ARE BACKUPS? Backups are the last line of defense against hardware failure, floods or fires the damage caused by a security breach or just accidental.
UNM Encryption Services in Development
Cloud Storage Service with Proven Military Grade Security
Slide Template for Module 4 Data Storage, Backup, and Security
DATA SECURITY FOR MEDICAL RESEARCH
Backup, Archive & Recovery
Utilize Internal Data via Mobile Business Apps
Client-Server & Peer-to-Peer Networks
Tim Carter Sales Director Sybase Confidential Propriety.
Customized Solutions to your needs
Presented by, K.K.Radhika.
Investigation Myths and Facts
A Modern Intranet Integration that Extends the Value of Your Microsoft Office 365 Deployment, Boosts Productivity, and Enhances Collaboration OFFICE 365.
Tim Carter Sales Director Sybase Confidential Propriety.
Computer Security Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Veeam Backup Repository
What Features Should Workforce Automation Have? Workforce Automation Workforce automation solution plays a key role in aligning your people. Know what.
Fix All Your Issues at Trezor Support Phone Number
The Ultimate Backup Solution.
With IvSign, Office 365 Users Can Digitally Sign Word Documents in the Cloud from Any Device Without Having to Install Any Digital Certificates OFFICE.
Cloud vs Local: Better Data Storage Device
Quick Sales Guide Acronis Backup Cloud Powered by Acronis – local and cloud backup and recovery service to solve your customers’ data protection challenges.
Back Up and Recovery Sue Kayton October 2015.
MICROSOFT AZURE ISV PROFILE: ONEBE
12 STEPS TO A GDPR AWARE NETWORK
The Ultimate Backup Solution.
IS4680 Security Auditing for Compliance
Cloud Computing LegalRun Solutions Why It’s Right for You!
Introduction to the PACS Security
G061 - Network Security.
Cloud Computing for Wireless Networks
Presentation transcript:

Protecting Data at Rest Through Encryption CIO Summit November 30, 2007

Topics Portable devices and data security issue Portable devices and data security issue What we did What we did Why we did it that way Why we did it that way Benefits of collaboration Benefits of collaboration Services offered Services offered

What’s the problem? Data on small portable devices Data on small portable devices –Laptops –USB drives, CDs, DVDs, portable hard disks Easy to lose and steal Easy to lose and steal Often hold confidential or sensitive data Often hold confidential or sensitive data Loss or theft can cost big $ Loss or theft can cost big $ Have to assume if data is gone it could be used illicitly. Have to assume if data is gone it could be used illicitly.

Addressing the Problem Protect “data at rest” Protect “data at rest” –If a device is lost or stolen, must know, with certainty, the data can not be read –Does not address other problems like data in transit –Requires more than authentication and authorization controls Provide other controls, including user education Provide other controls, including user education

What We Did Established enterprise-wide standards requiring encryption of laptop computers and removable storage devices Established enterprise-wide standards requiring encryption of laptop computers and removable storage devices Worked together to test products and select a common solution Worked together to test products and select a common solution Providing centralized services so many departments use the same server, support, recovery, etc. Providing centralized services so many departments use the same server, support, recovery, etc.

Laptop Encryption Full disk, pre-boot, AES 256, centrally managed, remotely supportable Full disk, pre-boot, AES 256, centrally managed, remotely supportable Server handles key management, distributes software, provides recovery services and logs activities Server handles key management, distributes software, provides recovery services and logs activities If a laptop is lost or stolen, a log will show the laptop was encrypted If a laptop is lost or stolen, a log will show the laptop was encrypted

Encryption Software The interdepartmental evaluation team selected SecureDoc software from WinMagic Corporation because: The interdepartmental evaluation team selected SecureDoc software from WinMagic Corporation because: –Meets all requirements –Provides flexible and simple management –Has remote support and recovery features –Includes features to encrypt portable media –Coincidentally: already used at one dept.

DAS-ITE Encryption Services Offering two services to customers: Offering two services to customers: –Infrastructure Use of a central encryption server Use of a central encryption server Use of communications links to reach server both locally and remotely Use of communications links to reach server both locally and remotely Key management, backup, disaster recovery, hardware and software maintenance, etc. Key management, backup, disaster recovery, hardware and software maintenance, etc. –“Full Service” Above services plus Level 1 user support Above services plus Level 1 user support

Local Government Opportunities Purchase off state contract Purchase off state contract –$58.50 per laptop for 3 years –Includes software maintenance and updates –Includes removable storage encryption Use DAS-ITE encryption services Use DAS-ITE encryption services –Infrastructure only –Full Service

For More Information Contact: Greg Fay