1 CREDANT Confidential. 1 NLIT 2009. 2 2 CREDANT Company Overview 2007 Data Security Leadership Quadrant 2007 & 2008: #1 Fastest Growing Private (Security)

Slides:



Advertisements
Similar presentations
Copyright line. Configuring Server Roles in Windows 2008 Exam Objectives New Roles in 2008 New Roles in 2008 Read-Only Domain Controllers (RODCs) Read-Only.
Advertisements

1 Proofpoint, Inc. Proprietary and Confidential ©2010 Proofpoint Protection/Privacy Offering Proofpoint Privacy Accurately detect ePHI in s Integrated.
| Copyright © 2009 Juniper Networks, Inc. | 1 WX Client Rajoo Nagar PLM, WABU.
Govern the Flow of Data: Moving from Chaos to Control
Local Data Protection (LDP) A Case Study Laptop Data Encryption Eric V. Leighninger Chief Security Architect Allstate Insurance Company June 20, 2008 ©2008.
©2010 Check Point Software Technologies Ltd. | [Restricted] ONLY for designated groups and individuals Visions for 2010 Anna Russell & Andy Clark.
©2013 Check Point Software Technologies Ltd. | [Unrestricted] For everyone Best Practices to Secure the Mobile Enterprise Macy Torrey
Tasks in Setting Up a Hard Disk
Service Access Management Tool Tour: Contract Number
Copyright © 2012 AirWatch, LLC. All rights reserved. Proprietary & Confidential. Mobile Content Strategies and Deployment Best Practices.
2  Industry trends and challenges  Windows Server 2012: Modern workstyle, enabled  Access from virtually anywhere, any device  Full Windows experience.
2  Industry trends and challenges  Windows Server 2012: Modern workstyle, enabled  Access from virtually anywhere, any device  Full Windows experience.
Page 1 / 18 Internet Traffic Monitor IM Page 2 / 18 Outline Product Overview Product Features Product Application Web UI.
LeadManager™- Internet Marketing Lead Management Solution May, 2009.
Identity & Security. Today's IT Security challenges Rising Internal Attacks 75% of companies report insiders responsible for breaches Growing headcount.
Avoid data leakage, espionage, sabotage and other reputation and business risks without losing employee performance and mobility.
Steve Jordan Director. Industry Solutions 05/05/14 Managing Chaos: Data Movement in 2014.
GW Introduction to Google Drive Security and Smart Sharing Practices.
Managed Infrastructure. 2 ©2015 EarthLink. All rights reserved. IT resources are under pressure… is it time to rethink the IT staffing model? Sources:
15 Tactical Improvements to IT Security Virtual Keyboard, Two Factor Authentication, Active Confirmation and FAA Access to CPS Online Ganesh Reddy.
Data Security for Healthcare Facilities Debbie Abbott Health Information Consultant Resolutions (Int) Pty Ltd.
Guide to Massachusetts Data Privacy Laws & Steps you can take towards Compliance.
Using Cryptographic ICs For Security and Product Management Misconceptions about security Network and system security Key Management The Business of Security.
Sophos / Utimaco Data Loss Prevention Peter Szendröi, SOPHOS Nordics Jan 20, 2010.
Data Encryption Overview South Seas Corporation Jared Owensby.
Security Management IACT 918 July 2004 Gene Awyzio SITACS University of Wollongong.
Creating a Secured and Trusted Information Sphere in Different Markets Giuseppe Contino.
Contact Center Security Strategies Grant Sainsbury Practice Director, Dimension Data.
Windows XP Professional Deployment and Support Microsoft IT Shares Its Experiences Published: May 2002 (Revised October 2004)
Presented by Manager, MIS.  GRIDCo’s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to GRIDCo’s.
©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone Endpoint Security Current portfolio and looking forward October 2010.
Security SIG August 19, 2010 Justin C. Klein Keane
New Data Regulation Law 201 CMR TJX Video.
Week #10 Objectives: Remote Access and Mobile Computing Configure Mobile Computer and Device Settings Configure Remote Desktop and Remote Assistance for.
Mobility Without Vulnerability: Secure and Enable Your Mobile Users, Apps, and Devices David Clapp – Intuitive.
IT-Partners Limited © 2011 IT Partners Limited Y OUR IT SOLUTION P ARTNERS Managing Director Confidential Data Loss Prevention Sunny Ho 1.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 IT Essentials PC Hardware and Software 4.1 Instructional Resource Chapter.
Hands-On Microsoft Windows Server 2008 Chapter 1 Introduction to Windows Server 2008.
1 Managed Security. 2 Managed Security provides a comprehensive suite of security services to manage and protect your network assets –Managed Firewall.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.1 ISP Responsibility Working at a Small-to-Medium Business or ISP – Chapter 8.
MOBILE DEVICE SECURITY. WHAT IS MOBILE DEVICE SECURITY? Mobile Devices  Smartphones  Laptops  Tablets  USB Memory  Portable Media Player  Handheld.
PROJECT PAPER ON BLUEFIRE MOBILE SECURITY. BY PONNURU VENKATA DINESH KUMAR STUDENT ID # A0815 PROFESSOR – VICKY HSU CS-426.
Week #7 Objectives: Secure Windows 7 Desktop
Module 8 Configuring Mobile Computing and Remote Access in Windows® 7.
What is Driving the Virtual Desktop? VMware View 4: Built for Desktops VMware View 4: Deployment References…Q&A Agenda.
PRIVACY, SECURITY & ID THEFT PREVENTION - TIPS FOR THE VIGILANT BUSINESS - SMALL BUSINESS & ECONOMIC DEVELOPMENT FORUM October 21, WITH THANKS TO.
Unit 6b System Security Procedures and Standards Component 8 Installation and Maintenance of Health IT Systems This material was developed by Duke University,
Emerging Security Trends & Technologies Presented by Santhosh Koratt Head Consulting & Compliance SecureSynergy Pvt.Ltd.
CHECO Jared Owensby – Technical Paul Herbka – Pricing & Purchasing South Seas Corporation.
Core 3: Communication Systems. Network software includes the Network Operating Software (NOS) and also network based applications such as those running.
Microsoft Management Seminar Series SMS 2003 Change Management.
Building a Fully Trusted Authentication Environment
Agency Introduction to DDM Dell Desktop Manager (DDM) Implementation.
About Softex Mission Statement: “To provide innovative security software products and solutions for computing devices” Softex was founded in 1992 by IBM.
Chapter 3 Pre-Incident Preparation Spring Incident Response & Computer Forensics.
BYOD: An IT Security Perspective. What is BYOD? Bring your own device - refers to the policy of permitting employees to bring personally owned mobile.
©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. Securing Your Data in Endpoint and Mobile Environments Frank Suijten Security.
Computer Security Sample security policy Dr Alexei Vernitski.
Mobile Security Solution Solution Overview Check Point Mobile Threat Prevention is an innovative approach to mobile security that detects and stops advanced.
Data-Tech Guardian Endpoint Security Suite. Guardian Endpoint Security Suite secures All Things Mobile TM from one management console.
Best-in-class enterprise backup for the mobile enterprise Prepared for [Insert customer name] [Date}
Phase 4: Manage Deployment
Understanding The Cloud
Working at a Small-to-Medium Business or ISP – Chapter 8
Customized Solutions to your needs
Skyhigh Enables Enterprises to Use Productivity Tools of Microsoft Office 365 While Meeting Their Security, Compliance & Governance Requirements Partner.
CHECO Jared Owensby – Technical Paul Herbka – Pricing & Purchasing
Contact Center Security Strategies
Designing IIS Security (IIS – Internet Information Service)
Presentation transcript:

1 CREDANT Confidential. 1 NLIT 2009

2 2 CREDANT Company Overview 2007 Data Security Leadership Quadrant 2007 & 2008: #1 Fastest Growing Private (Security) Company Testergebnis: 8.6 Very Good Founded - September 17, 2001 To enable customers to manage security of data on any device – PDA, PC, MAC, USB Product Line - CREDANT Mobile Guardian (CMG) Data-centric, policy based, centrally managed data protection solution that "Protects What Matters"- your critical information US-Based Company Code developed in Addison TX. Cisco Systems & Intel Capital are key investors Accomplishments More than 775 customers, 7 million endpoints Solution recognized by leading industry experts INC 500 Fastest Growing Security Company 2007 & 2008 CREDANT Confidential. Subject to NDA

3 Agenda The Business Problem Centralized vs. Decentralized Management Compliance with Federal Desktop Core Configuration (FDCC) Supporting Imaging Across Platforms Managing Shared PCs Authentication Support Roadmap Encryption Solution Issues

4 CREDANT Confidential. Subject to NDA 4 The Business Problem Employee Contractor Partner Research Data Intellectual Property Purchasing Information Social Security Numbers SBU or Classified Government Information Airport Internet Cafe Home Office Site Transit Critical enterprise data resides on numerous endpoint devices and the storage capacity and criticality of information continues to increase Test Data

5 The Business Justification – Encryption Cost Assume 1000 employees/contractors Assume 250 use laptops that need protection The ratio of machines that need protection and that dont need protection will vary but the business justification is the same Cost after discounts = $75/laptop Internal labor/training costs to implement = $50/laptop Total = $125/laptop x 250 laptops = $31,250 Just to be safe – double that to $62,500 to implement Data-at-Rest encryption solution (DAR) CREDANT Confidential. Subject to NDA 5

6 The Business Justification – Breach Cost Assume 10,000 personnel records lost A 200GB HD can hold 2,000, KB records Cost to change each bank/credit card account $15/record = $150,000 Cost per individual for a year of credit monitoring service $60/individual = $600,000 TOTAL = $750,000 Does not include any legal fees, or the cost of security implemented after the fact DoE data breaches carry risk that cannot be monetized 6

7 Management Choices De-centralized Encryption Keys created on devices Usually only one key per device User may control keys, lockout may be catastrophic Administrative Accounts per-device Creates additional management overhead Requires change in maintenance operations Device-centric No differentiation of data types or users No data-usage controls Compliance may be hard to demonstrate No management of device status at time of loss Best only for use in very small deployments Typically fewer than 20 devices Un-managed environments No Usage Controls Single key

8 8 Management Choices Automatically detect users added to Enterprise directory and create encryption keys and policies. Detect media devices automatically. Encrypt and enforce encryption policies. Manage keys for hardware-based encryption. Control data usage outside the enterprise. Manage and Audit – show device state at time of loss. Adapt to changing regulations. Securely Automate key escrow. Operate and Support – reduce administrative costs. Centralize key escrow and access control (forensics). Detect Encrypt & Enforce Manage & Audit Operate & Support Reduce Risk Ensure Operational Efficiency Gain Workforce Productivity A centrally managed solution integrates with the Enterprise directory, providing enforcement of encryption policies and reducing management effort and cost. CREDANT Confidential. Subject to NDA Centralized Management

9 FDCC Compliance Users cannot have administrative rights on the PC Impacts removable media support most User cannot mount volumes Users cannot install software Users file system rights should be restricted Incompatible with some encryption solutions Pagefile must still be encrypted Solution must be able to run outside of user privileges Ports and protocols are managed/restricted Encryption solutions must have flexible network settings Automated Patching and Scanning Systems deployed Encryption solution must not prevent malware detection remediation IDS solutions are likely in use Must be compatible with deployed IDS(s)

10 Imaging is Now the Standard Way to Deploy This can be problematic if the DAR solution encrypts or generates keys for the image at install time All devices may end up with same key Changing the key requires decryption/re-encrypt Encrypted images cannot be changed The encrypted volume is not editable Can add considerable time to imaging process Requires unecessary encryption of an empty drive Some solutions do not support standard imaging processes Especially true if images are deployed to hard drives with different geometries

11 Shared PCs Multiple Users per Device Create Management and Security Issues Will users share boot passwords? If not, then pre-boot accounts must be managed for each user Does data access need to be controlled across users? Does User A need to be prevented from seeing User Bs data All users of the device may end up with same key Pooled-devices may need to be wiped/re-imaged between users Is Audit required to track system access? Can you show who used which PC and when?

12 Authentication Support Many organizations have multiple authentication types UID/Password Tokens Smartcards (HSPD-12m PIV) Mixed-mode authentication Are these supported by the DAR solution? What does it take to get a new authentication type supported? Do code updates may require decryption/re-encryption? What tools need to be used to upgrade? Can users switch between authentication types? eg: UID/Password or CryptoCard and still access data on the PC Temporary access while a token/smartcard is being re-issued Does data access need to be controlled across users? Does User A need to be prevented from seeing User Bs data? Can this be tied to the encryption solution? All users of the device may end up with same key Pooled-devices may need to be wiped/re-imaged between users

13 CREDANT Confidential. Subject to NDA 13 CREDANT Confidential Roadmap Full Disk Encryption No User Data Privacy Patch management issues System compatibility problems Operational & performance issues Dead-end Technology Now theres a Better Way: Full Data Encryption technology to solve current and future problems Intelligent Encryption benefits: User Cannot Choose – All Data Protected User Encrypted Data Privacy Single Console for all Management Broad ALL mobile platforms PC, USB Media, Handhelds Avoid compatibility & operational impacts Single agent can grow with future needs In the past there were two options in data protection… File/Folder Encryption User Chooses Files to encrypt

14 CREDANT Confidential. Subject to NDA 14 Management Across Platforms Full Compliance Reporting Low Operational Impact Transparent to End-users All Solutions Managed within One Console

15 Contact Information: Eric Hay Director, Federal Field Engineering Ofc: Comments/Questions/Discussion Reduce the Risk of Data Compromise!