Mobile Encryption Group Discussion and Written Project – CDI East 2006 Rick Smith Rick Wanner

Slides:



Advertisements
Similar presentations
Local Data Protection (LDP) A Case Study Laptop Data Encryption Eric V. Leighninger Chief Security Architect Allstate Insurance Company June 20, 2008 ©2008.
Advertisements

1 CREDANT Confidential. 1 NLIT CREDANT Company Overview 2007 Data Security Leadership Quadrant 2007 & 2008: #1 Fastest Growing Private (Security)
Encryption Jack Roberts, PPD, RAL, STFC. Why? Government reaction to high profile data losses. STFC General Notices 30 th January, 1 st February 2008.
Security for Mobile Devices
Microsoft ® Official Course First Look Clinic Overview of Windows 8 By Ragowo Riantory, S.Kom, MCP.
2  Industry trends and challenges  Windows Server 2012: Modern workstyle, enabled  Access from virtually anywhere, any device  Full Windows experience.
Rodney Buike IT Pro Advisor, Microsoft Canada
The System Center Family Microsoft. Mobile Device Manager 2008.
Microsoft Windows Server 2008 Software Deployment Chris Rutherford EKU Technology: CEN/CET.
WCL317 Disclaimer The information in this presentation relates to a pre-released product which may be substantially modified before it’s commercially.
11© 2011 Hitachi Data Systems. All rights reserved. HITACHI DATA DISCOVERY FOR MICROSOFT® SHAREPOINT ® SOLUTION SCALING YOUR SHAREPOINT ENVIRONMENT PRESENTER.
Welcome Thank you for taking our training. Collection 6292: Installing and Configuring Windows 7 Client Course – at
Data Encryption Overview South Seas Corporation Jared Owensby.
Trend Micro Data-at-Rest Solution SecureDoc Solution Presentation Derek Tsang Michael Desjardins Steven Pomerenk October 12, 2010.
PKI-Enabled Applications That work! Linda Pruss Office of Campus Information Security
Microsoft ® Application Virtualization 4.5 Infrastructure Planning and Design Series.
Chapter 8 Operating Systems and Utility Programs By: James Granahan.
Windows XP Professional Deployment and Support Microsoft IT Shares Its Experiences Published: May 2002 (Revised October 2004)
STANFORD UNIVERSITY INFORMATION TECHNOLOGY SERVICES Windows Encryption File System (EFS) Tech Briefing July 18 th 2008
Account Reset Console Delegated and secure self password resets Joe Vachon Sales Engineer.
Ran Oelgiesser, Sr. Product Manager Praveen Vijayaraghavan, Program Manager (Virtual PC) Yigal Edery, Group Program Manager (MED-V)
Page Copyright Giritech A/S an – Excitor company.
©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone Endpoint Security Current portfolio and looking forward October 2010.
Microsoft ® Application Virtualization 4.6 Infrastructure Planning and Design Published: September 2008 Updated: February 2010.
Security SIG August 19, 2010 Justin C. Klein Keane
Established in 1999 Headquartered in Boulder, CO Citrix Service Provider Primary Data Center in Denver, CO Secondary DC geographically positioned MSFT.
Chapter 7 Installing and Using Windows XP Professional.
CYBER FORENSICS PRESENTER: JACO VENTER. CYBER FORENSICS - AGENDA Dealing with electronic evidence – Non or Cyber Experts Forensic Imaging / Forensic Application.
Senior Design – Spring 2009 Richard Gory Focus: Networking & Web.
Windows Server 2003 Terminal Server. Windows Terminal Server Rapid access to data and applications from anywhere LAN Data Wireless LAN VPN Applications.
© Paradigm Publishing Inc. 4-1 Chapter 4 System Software.
Chapter-4 Windows 2000 Professional Win2K Professional provides a very usable interface and was designed for use in the desktop PC. Microsoft server system.
Windows 8 Starter Guide and Educational Apps Rica Young If you have a question during the webinar, please type it in the chat window, preface it with ???,
Microsoft ® Official Course Module 8 Securing Windows 8 Desktops.
PPD Computing “Business Continuity” Windows and Mac Kevin Dunford May 17 th 2012.
1. Windows Vista Enterprise And Mid-Market User Scenarios 2. Customer Profiling And Segmentation Tools 3. Windows Vista Business Value And Infrastructure.
Chapter 4 System Software.
IT Essentials 1 v4.0 Chapters 4 & 5 JEOPARDY RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands.
Hands-On Microsoft Windows Server Security Enhancements in Windows Server 2008 Windows Server 2008 was created to emphasize security –Reduced attack.
SafeNet Protects Data at Rest
Normalized Endpoint Computing Research Team Results PSU Technology Solution Mat B. & Alice S.
AMSI Hosting Options User Panel Discussion Presented by Brian Torney Session 107 Advantages of Self Hosting.
Windows XP Professional Features ©Richard L. Goldman February 5, 2003.
Name Company A Day in the Life… A Demonstration of Application Delivery.
SAM for Virtualizatio n Presenter Name. Virtualization: a key priority for business decision makers Technavio forecasts that the global virtualization.
Windows XP Professional Features ©Richard L. Goldman February 5, 2003.
1 Introduction to Microsoft Windows 2000 Windows 2000 Overview Windows 2000 Architecture Overview Windows 2000 Directory Services Overview Logging On to.
Infrascale Company Overview. About Infrascale Los Angeles, CA Venture backed Managed Service Providers 12 global data centers Eversync Solutions.
One Platform, One Solution: eToken TMS 5.1 Customer Presentation November 2009.
Module 15 Managing Windows Server® 2008 Backup and Restore.
Agenda Master Expert Associat e Microsoft Certified Solutions Master (MCSM) Microsoft Certified Solutions Expert (MCSE) Microsoft Certified Solutions.
DC-B312 BitLocker Improvements in Windows 8 MBAM 2.0 Investment Areas and Key New Features Deploying MBAM 2.0MBAM 2.0 End User Experience.
Lessons learned during Sandia’s encryption implementation NLIT 2009 May 2008 Sam Jones Matt Snitchler Desktop Technology Development Sandia is a multiprogram.
User Manager Pro Suite continued… All-in-One Security, Management & Reporting.
Security SIG August 19, 2010 Justin C. Klein Keane
Copyright © 2007 Heathkit Company, Inc. All Rights Reserved PC Fundamentals Presentation 14 – Windows Security.
Windows Terminal Services for Remote PVSS Access Peter Chochula ALICE DCS Workshop 21 June 2004 Colmar.
Windows Vista Configuration MCTS : Installing and Upgrading.
Data-Tech Guardian Endpoint Security Suite. Guardian Endpoint Security Suite secures All Things Mobile TM from one management console.
How to Forgot Laptop Password Windows 10 without Reset Disk?
Full Disk Encryption.
UNM Encryption Services in Development
SmartCenter for Pointsec - MI
Chapter Objectives In this chapter, you will learn:
Quick Sales Guide Acronis Backup Cloud Powered by Acronis – local and cloud backup and recovery service to solve your customers’ data protection challenges.
Bethesda Cybersecurity Club
IT Management, Simplified
What is an operating system An operating system is the most important software that runs on a computer. It manages the computer's memory and processes,
Bethesda Cybersecurity Club
Presentation transcript:

Mobile Encryption Group Discussion and Written Project – CDI East 2006 Rick Smith Rick Wanner

2 June 2014 Agenda Encryption Options Evaluation Criteria Recommendations SDLC Conclusions

2 June 2014 Encryption Options Full-disk Encryption Hardware-based Encryption –Seagate Virtual Disk Encryption File Encryption –EFS in Microsoft Windows XP/2003

2 June 2014 Evaluation Criteria Operating Systems Supported Ease of Deployment Transparent to User Centralized Management Ease of Management Strength of Encryption Key Management and Recovery Audit Logging Cost

2 June 2014 Solution Recommendations SafeBoot –Device Encryption for PC/Laptop Windows Mobile VDisk –Management console Web Based User self-service pasword resets –AES-256 PointSec –Versions for PC PocketPC Removable Media –Management console No user self-service –FIPS compliant

2 June 2014 System Development Life Cycle Documents investigation to date Need to continue with in-house testing of –Key recovery/escrow and password reset –Management console usability –Impact on users Implementation and deployment to follow Need to consider including desktops and servers

2 June 2014 Conclusions Recommendations –SafeBoot –PointSec Implementation starting with high value laptops and mobile devices Policy development also required to support - need to start now