Cloud Storage Service with Proven Military Grade Security

Slides:



Advertisements
Similar presentations
Creating HIPAA-Compliant Medical Data Applications with Amazon Web Services Presented by, Tulika Srivastava Purdue University.
Advertisements

Backing up Your Computer Jamie Leben IT-Works Computer Services Copyright 2010.
Backup and Disaster Recovery (BDR) A LOGICAL Alternative to costly Hosted BDR ELLEGENT SYSTEMS, Inc.
11 BACKING UP AND RESTORING DATA Chapter 4. Chapter 4: BACKING UP AND RESTORING DATA2 CHAPTER OVERVIEW Describe the various types of hardware used to.
Barracuda Backup Service Data Backup and Disaster Recovery.
The Ultimate Backup Solution.
May 25, 2010 MozyPro Scalable Business Backup. Protect, organize and enrich most valuable information. Our Mission:
®® Microsoft Windows 7 for Power Users Tutorial 10 Backing Up and Restoring Files.
Barracuda Networks Confidential1 Barracuda Backup Service Integrated Local & Offsite Data Backup.
Mobility Methods for document access while away from the office.
New Data Regulation Law 201 CMR TJX Video.
Your storage on the ground; Your files in the cloud.
Data Security GCSE ICT.
1 Managed Security. 2 Managed Security provides a comprehensive suite of security services to manage and protect your network assets –Managed Firewall.
Presented By: MICHAEL HOFFMAN President & CEO - Bolt Data Systems June 16, 2010 Data Backup for the Shared Platform.
LAN / WAN Business Proposal. What is a LAN or WAN? A LAN is a Local Area Network it usually connects all computers in one building or several building.
Chapter Fourteen Windows XP Professional Fault Tolerance.
INTEROP 2014 Mobile Issues in the Network. Mobile Issues Data loss – Hardware theft or failure – Data corruption Data theft – Hardware theft – Spyware,
Maintaining File Services. Shadow Copies of Shared Folders Automatically retains copies of files on a server from specific points in time Prevents administrators.
Hosted File Backup Ensure that your data is kept safe with our cloud based data back-up service.
Cloud Computing Characteristics A service provided by large internet-based specialised data centres that offers storage, processing and computer resources.
Preventing Common Causes of loss. Common Causes of Loss of Data Accidental Erasure – close a file and don’t save it, – write over the original file when.
Lesson 3 Data Storage. Objectives Define data storage Identify the difference between short-term and long-term data storage Understand cloud storage and.
Continuous Backup for Business CrashPlan PRO offers a paradigm of backup that includes a single solution for on-site and off-site backups that is more.
Cloud Computing Project By:Jessica, Fadiah, and Bill.
Presented by: Reem Alshahrani. Outlines What is Virtualization Virtual environment components Advantages Security Challenges in virtualized environments.
The Ultimate Backup Solution.
Protecting Your Data With Just Get Backup, LLC. Agenda How important is your data – Acknowledging worst-case scenarios. Understanding that data backup.
Cloud Archive By: Kimberly Nolan. What it is?  The goal of a cloud archiving service is to provide a data storage (ex. Google drive and SkyDrive) as.
Novell iFolder Novell Academy QuickTrain. What is iFolder? Novell iFolder lets users’ files follow them anywhere A simple and secure way to access, organize.
Best-in-class enterprise backup for the mobile enterprise Prepared for [Insert customer name] [Date}
Network and Server Basics. Learning Objectives After viewing this presentation, you will be able to: Understand the benefits of a client/server network.
WHAT ARE BACKUPS? Backups are the last line of defense against hardware failure, floods or fires the damage caused by a security breach or just accidental.
Backup and Disaster Dr Stuart Petch CeG IT/IS Manager
Protecting Data at Rest Through Encryption CIO Summit November 30, 2007.
Dial-In Number: 1 (631) Webinar ID: FHC Tech Talk Automation and Efficiency Series Talk #1 Carbonite automated backup.
File-System Management
Barracuda Backup Easy Cloud-Connected Backup Version 5.4 | July 2014.
Barracuda SSL VPN Remote, Authenticated Access to Applications and Data Version 2.6 | July 2014.
Open-E Data Storage Software (DSS V6)
Slide Template for Module 4 Data Storage, Backup, and Security
SecureAge Technology and its Security Solution
SecureAge SecureData – A Proactive Solution against APT and Malwares
The importance of computer backups
Chapter 6: Securing the Cloud
Office 365 is cloud-based productivity, hosted by Microsoft.
Port Knocking Benjamin DiYanni.
BEST CLOUD COMPUTING PLATFORM Skype : mukesh.k.bansal.
Backup, Archive & Recovery
Utilize Internal Data via Mobile Business Apps
Maintaining Windows Server 2008 File Services
Cloud Computing By: Vanika Jennings.
People used to install software on their computers
Amazon Storage- S3 and Glacier
Customized Solutions to your needs
Presented by, K.K.Radhika.
Store, Share, Sync and Collaborate
CLOUD COMPUTING Presented By:- EduTechlearners
LO2: Understand Computer Software
The Ultimate Backup Solution.
+Vonus: An Intuitive, Cloud-Based Point-of-Sale Solution That’s Powered by Microsoft Office 365 with Tools to Increase Sales Using Social Media OFFICE.
Hybrid Storage Competitive Sales Guide INTERNAL ONLY
12 STEPS TO A GDPR AWARE NETWORK
The Ultimate Backup Solution.
DriveHQ Online Backup Easy, secure, automatic
Backup and restoration of data, redundancy
Lesson 3 Data Storage.
ONLINE SECURE DATA SERVICE
AWS S3 Cloud Backup Licensing per system Starting at $79 per year.
Presentation transcript:

Cloud Storage Service with Proven Military Grade Security SecureAge Technology December 2012

Contents Data Security in the Cloud The Best Secure Cloud Storage – LockCube Why LockCube?

Data Security in the Cloud

On-line Backup IDC report Disaster happen, not if but when Over 90 per cent of companies fail within one year of a significant data loss Disaster happen, not if but when From minor power outages to catastrophic fire or flood Malicious tampering, computer failure, hardware theft, malware, or hacking Accidentally deleting a file Traditional Backup Time-consuming, complex, and expensive Ongoing maintenance of applications, software, and hardware Need automated backup to remote cloud storage

How Data Move in Cloud? Network Cloud Server Hackers and insiders can see your data!! Network

Cloud Security Problem Malware risk Network risk Application risk … Standard security risks You don’t control your application and data anymore… Can you stop service provider looking at your data? Insider attacks What are the Security Problems in the Cloud? Well, actually all the security problems that one currently faces in the enterprise network is still relevant in the cloud. In particular, we still need to ensure that we have malware protection, network security protection, application protection, etc for the cloud environment. What is different, however, is about data security. Specifically, once we moved our application and data to the cloud, we no longer control them anymore. They will be located in 3rd party data center, and accessed by people that we do not know. These people will have all the privilege of an insider and they can have direct access to our application and data. The question then is whether you can prevent these insiders from attacking your system and data? Or more generally, can you stop the cloud service provider from looking at your data stored in their data center? Data Security top the list of major concerns that hinder Cloud Computing Adoption !!

Data Security Risk: Insider Attacks Direct machine access Someone can access your application and data storage directly Directory mounting The data directory could be access from internal network directly Network sniffing Data travel from storage to application can be easily intercepted on the local networks Steal backup data How safe is your backup data on tapes or other storage devices? VM cloning Your machine (VM) & storage can be duplicated and analyzed remotely In this slides, we list down some of the insider attacks that could happen at the service provider data center.

Data Protection by Point Solution Full Disk Encryption - provided by most cloud storage providers. Limited Protection Meaningless in the cloud Easily Compromised Not effective - cannot scale to Cloud Pre-boot authentication has no meaning Full disk encryption has no protection when server is running Data access from mounted drive is plain Remote storage on the cloud is not protected RDP client remote drive not protected

Full Disk Encryption Network Full Disk Encryption is like bank vault with the door wide open. Data, once travels out of this bank vault, becomes unprotected and vulnerable to attack. Hackers and insiders Can see your files!! Network

The Best Secure Cloud Storage

What is LockCube? Affordable Cloud Storage Service. Fast and secure backup of voluminous files. Supports high speed network. Network

What Can LockCube Do? Scheduled Smart Backup Versioning Backup Files Restore Files SecureDrive Share Files Direct Access

Back Up Any Types of Files Back up any files securely No more worries over data loss or data leakage. Incremental Backup Back up only changes made to the files. Reduce uploading time significantly. Network

Anytime, Anywhere and Any Devices Network

Manual Backup Backup manually by specifying the location of folder.

Scheduled Backup Set the backup date and time via LockCube in-built scheduler.

Smart Versioning Backup voluminous files with unlimited versioning. Fast recovery of corrupted or accidentally deleted files.

Restore Data Restore any files securely Salvage all data when disaster strikes. No more worries over critical data loss or business continuity. Network

Direct Access to LockCube Drive

Web Access

Secure File Sharing Share file securely with one another Only intended recipients can decrypt the file. Network

SecureDrive An encryption utility – a value-added service for LockCube users Provides a hassle-free file backup of 50GB or more Provides immediate file restoration for disaster recovery

SecureDrive Rapid data backup via removable media with LockCube Team’s help Files are automatically encrypted when copied to removable media LockCube Team cannot view the encrypted file when performing backup The LockCube Team Removable media like USB flash drive and external hard drive

SecureDrive Prompt data restoration via removable media with LockCube Team’s help LockCube Team cannot view the encrypted files when performing restoration Files get automatically decrypted when copied back to computer or file server The LockCube Team Removable media like USB flash drive and external hard drive

Access via Mobile Devices Access any file from your smart phone or tablet PC. Files remain protected when your smart phone or tablet PC is lost. Support Android and iOS.

Scalable and Affordable Dynamic scaling of storage space. Pay only for what you use. Unlimited storage size.

Free 5 GB Storage Plan - Perpetual

Why LockCube?

Proven Military Grade Security Automatic file level encryption Data remains encrypted at rest Data is secured as it resides at the LockCube storage. Only user key can access. in motion Data is secured as it travels over the Internet. Hackers and Insiders Cannot see your file!! SSL/TLS Internet SSL/TLS SSL/TLS SSL/TLS SSL/TLS

File Level Encryption How the same files appear to others Encrypted file appears normal with proper SecureData key

Military Grade Security for Consumers and SMEs PKI based Secure File Sharing Random Session Key for Each File Smart Card & USB Token Support XTS-AES* On-the-fly Encryption

Security Technologies LockCube Cloud Storage System Appliance Technology SecureData SSL VPN 256-bit SSL/TLS Tunnel Very high performance Flexible Data Access Easy-to-use Interface File-level Data Encryption Password & PKI User Key 2FA Authentication support Fully Harden & Robust Appliance High Availability High Performance Fully Redundant Storage System

LockCube Vs Other Cloud Storage Other Cloud Storage Providers File level encryption Full disk encryption User’s encryption key is not stored in the server Encryption key is stored in the server Genuine protection of data in motion via encryption Claim to protect users’ data via SSL

Advantages of End-to-End Encryption Remove the weakest security link in data storage and data movement Drastically reduce the potential attack vectors Remove weakest security link in data storage and data movement Minimize the number of potential attack vectors A uniform security policy to protect data anywhere Data level encryption allows for fine grain control based on data type, processes, and users Lower cost with single encryption solution & policy ! Remote centralized key control Uniform security policy on data encryption

Benefits of Cloud Storage Security Fast and Secure Backup In-File Delta Technology allows fast and seamless backup of large volume data Limitless capacity. Great for Backup Access cloud storage as local drive Can access from anywhere, anytime Easy to Use Pay for only the storage space that you use No single point of failure. Affordable & Highly Available Full SSL/TLS network protection Support sophisticated 2FA user authentication Data transparently encrypted with users’ keys Complete Security

Conclusion End-to-end data encryption can help protect your data in the cloud Cloud – the future of computing and storage Cloud helps enterprises to save money and reduce effort for managing their IT Infrastructure Without proper protection, data in the cloud is vulnerable to many attacks! With the right technology: Complete Data Security in the cloud is possible

Thank You Questions and Answers