Into the Breach: Preventing Data Theft Strong Bear LLC Palisade, Colorado June 2010.

Slides:



Advertisements
Similar presentations
Symantec 2004 Pulse of IT Security in Canada Volume II Survey shows Increases in Concern and Spending for IT Security Andrew Bisson Director, Planning.
Advertisements

w w w. b y t w a r e. c o m NATIVE VIRUS DETECTION FOR THE iSERIES powered by McAfee Executive Presentation.
Mobile Security George Bailey Information Security Ivy Tech Community College of Indiana Tech Day 2006, Columbus, IN.
Darton College Information Systems Use Policies. Introduction Dartons Information Systems are critical resources. The Information Systems Use Policies.
Information Security Office
Laptop Security in the current IT world W3 group.
Eight Strategies to Reduce Your Risk in the Event of A Data Breach Sheryl Falk December 10, 2013.
©2010 Check Point Software Technologies Ltd. | [Restricted] ONLY for designated groups and individuals Visions for 2010 Anna Russell & Andy Clark.
SDS Rv Confidential.
©2013 Check Point Software Technologies Ltd. | [Unrestricted] For everyone Best Practices to Secure the Mobile Enterprise Macy Torrey
ACT User Meeting June Your entitlements window Entitlements, roles and v1 security overview Problems with v1 security Tasks, jobs and v2 security.
Mobile device security Practical advice on how to keep your mobile device and the data on it safe.
INADEQUATE SECURITY POLICIES Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA standards.
Copyright Critical Software S.A All Rights Reserved. COTS based approach for the Multilevel Security Problem Bernardo Patrão.
EgoSecure – Im Secure EgoSecure Endpoint Product Presentation.
Meganet Corporation VME Office Meganet Corporation Meganet Corporation is a leading worldwide provider of data security to Governments, Military,
Outpost Office Firewall Product presentation. What is Outpost Office Firewall? Software firewall solution designed especially to meet small and medium.
Red Flags Rule BAS Forum August 18, What is the Red Flags Rule? Requires implementation of a written Identity Theft Prevention Program designed.
Copyright © 2012, Big I Advantage®, Inc., and Swiss Re Corporate Solutions. All rights reserved. (Ed. 08/12 -1) E&O RISK MANAGEMENT: MEETING THE CHALLENGE.
Rodney Buike IT Pro Advisor, Microsoft Canada
Introduction to ikhlas ikhlas is an affordable and effective Online Accounting Solution that is currently available in Brunei.
Digital Investigations of Any Kind ONE COMPANY Cyber Intelligence Response Technology (CIRT)
CYBER & Product Liability & Professional Indemnity
7 Effective Habits when using the Internet Philip O’Kane 1.
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Mr C Johnston ICT Teacher
Viruses,Hacking and Backups By Grace Mackay 8K Viruses Hacking and Hackers Backups.
Security Controls – What Works
Security strategy. What is security strategy? How an organisation plans to protect and respond to security attacks on their information technology assets.
FIT3105 Security and Identity Management Lecture 1.
Security Management IACT 918 July 2004 Gene Awyzio SITACS University of Wollongong.
Sensitive Data Accessibility Financial Management College of Education Michigan State University.
Brian Bradley.  Data is any type of stored digital information.  Security is about the protection of assets.  Prevention: measures taken to protect.
ACCEPTABLE An acceptable use policy (AUP), also known as an acceptable usage policy or fair use policy, is a set of rules applied by the owner or manager.
Kaspersky Open Space Security: Release 2 World-class security solution for your business.
Norman Endpoint Protection Advanced security made easy.
New Data Regulation Law 201 CMR TJX Video.
Information Security Information Technology and Computing Services Information Technology and Computing Services
Information Security 2013 Roadshow. Roadshow Outline  Why We Care About Information Security  Safe Computing Recognize a Secure Web Site (HTTPS) How.
Security Imperatives in a New Workplace Partnering to Protect Digital Information in the 21st Century Presented by Michael Ferris, Alaska Enterprise Solutions.
Component 4: Introduction to Information and Computer Science Unit 8: Security Lecture 2 This material was developed by Oregon Health & Science University,
Information Security. What is Information Security? A. The quality of being secure B. To protect the confidentiality, integrity, and availability of information.
Information Security 2013 Roadshow. Roadshow Outline  Why We Care About Information Security  Safe Computing Recognize a Secure Web Site (HTTPS) How.
Utility Programs Lesson Objective: Understanding the functions of an operating system. Learning Outcome: Answer some basic questions on operating systems.
PLUG IT IN 7 Protecting Your Information Assets. 1.How to Protect Your Assets: The Basics 2.Behavioral Actions to Protect Your Information Assets 3.Computer-Based.
Chapter 12 by Lisa Reeves Bertin Securing Information in a Network.
 INADEQUATE SECURITY POLICIES ›Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA.
Computer Threats Cybercrimes are criminal acts conducted through the use of computers by cybercriminals. © 2009 Prentice-Hall, Inc. 1.
Protecting Your Business! SBA Ft. Lauderdale November 15, 2006 Gregory Levine, Sr. Director Marketing.
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
IP Security IP sec IPsec is short for Internet Protocol Security. It was originally created as a part of IPv6, but has been retrofitted into IPv4. It.
Pedigree: Network-wide Protection Against Enterprise Data Leaks Team: Nick Feamster, Assistant Professor, School of CS Anirudh Ramachandran, PhD candidate,
Topic 5: Basic Security.
Have the Time? Steps to Deal with Cybercrime HFTP Annual Conference Bellevue, Washington October 23, 2015 Presented by: John D. Daum, CPA Scott Perry (Just.
Introduction TO Network Administration
BUFFERZONE Advanced Endpoint Security Data Connectors-Charlotte January 2016 Company Confidential.
W elcome to our Presentation. Presentation Topic Virus.
Safe’n’Sec IT security solutions for enterprises of any size.
Global Mobile Anti-malware Market WEBSITE Single User License: US$ 2500 No of Pages: 55 Corporate User License: US$
Physical Security Concerns for LAN Management By: Derek McQuillen.
Kevin Watson and Ammar Ammar IT Asset Visibility.
Advanced Endpoint Security Data Connectors-Charlotte January 2016
Section II Terms Emily Stepp.
Fuel Cap Reinvented Fueloyal Presents Smart Fuelcap
Business Risks of Insecure Networks
Computer Security Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Security software for today’s enterprise marketplace
G061 - Network Security.
Presentation transcript:

Into the Breach: Preventing Data Theft Strong Bear LLC Palisade, Colorado June 2010

Data Theft – A Real Security Threat Sensitive laptops stolen from Fla. health insurance provider February 11, 2010 Thief steals 57 hard drives from BlueCross BlueShield of Tennessee February 10, 2010 Missing Army external hard drive could affect 60,000 November 16, 2009 Average total cost per data theft incident in 2009: $7.3 million.

Student Loan Data Missing Student Loan Company: Data On 3.3M People Stolen By STEVE KARNOWSKI, Associated Press Writer March 26,2010 A company that guarantees federal student loans said Friday that personal data on about 3.3 million people nationwide has been stolen from its headquarters in Minnesota. Educational Credit Management Corp. said the data included names, addresses, Social Security numbers and dates of birth of borrowers, but no financial or bank account information. The data was on "portable media" that was stolen sometime last weekend, ECMC said in a statement. Company spokesman Paul Kelash wouldn't specify what was taken, citing the ongoing investigation, but said there were no indications of any misuse of the data.

DOD lifts ban on USB drives Department again allows use of removable media By Kevin McCaneyKevin McCaney Feb 18, 2010 The Defense Department has lifted its 15-month-old ban on USB drives and other portable media, a restriction that had made life difficult for DOD personnel. The ban was issued in November 2008 by the U.S. Strategic Command after a virus, a variation of the SillyFDC worm, was found to be spreading through military networks by copying itself from one removable drive to another. The ban covered all forms of USB flash media, such as thumb drives, memory sticks and cards, and camera memory cards, as well as some other removable media. gcn.com/Articles/2010/02/18/DOD-lifts-USB-drive-ban.aspx

About Strong Bear A technology development company based in Palisade, Colorado (outside Grand Junction) Developer of Device Detection System (DDS), a security software product that monitors and reports all drive activity IN REAL TIME on all devices that are connected to an organizations network. Strong Bear is seeking an asset sale of its Device Detection System technology.

Device Detection Systems (DDS) DDS is a client-server security software application that: –Protects proprietary company data from theft, loss and intrusion through a removable media device. DDS is scalable and easily integrated into the existing PC environment. –DDS will not interfere with anti-virus, firewall, or spyware protection software. DDS runs on OS platforms Windows XP and above. –DDS has been tested on all Windows Server software.

DDS Client and Server DDS is transparently downloaded to all client workstations. Its operation is invisible to the user. The server software monitors media devices attached or removed at client workstations.

DDS Alerts When an unregistered device is detected by the client monitoring software an alarm is generated by the server. DDS logs the intrusion of this unauthorized device and reports it IN REAL TIME to the IT department.

DDS PC Tracker DDS can track lost or stolen computers and notify the IT department when that computer connects to the internet.

DDS Threat Prevention Monitors all media devices attached to a computer such as hard drives, flash drives, cell phones, digital cameras, etc. Tracks file activity on media devices. Creates history file of all client activity. History file may be used to comply with Sarbanes- Oxley Act (SOX.) Can be saved in customizable formats. Tracks lost or stolen client computers and laptops.

DDS Market Readiness DDS is market-ready. Product manual written. DDS code has been internally tested. DDS has an estimated 12-month head start. DDS is patent-pending.

Security Market: Multi-billion and Growing Gartner Group estimated that the global market for security software was $14.5 billion in –Gartner also estimated that it will grow to $16.3 billion in 2010 based on 13% predicted increase. Source: percent/article/149366/ percent/article/149366/ –Gartner also predicts that security spending will rise more than 5% in 2010: Source: than-5-in-2010/ than-5-in-2010/ IDC believes the worldwide IT security market will grow to $37.8 billion by 2013: –Source: Spending-Surge/story.xhtml?story_id=013000YEXFZ7http:// Spending-Surge/story.xhtml?story_id=013000YEXFZ7 Forrester predicts that 40% of companies will increase their IT security spending in 2010: –Source: Increase-for-Enterprises-SMBs / Increase-for-Enterprises-SMBs / Strongest vertical market: Government

Endpoint Protection Magic Quadrant Gartner Group defines all PC security as Endpoint Protection. DDS will help niche players advance one quadrant.

DDS is Different Symantec Endpoint Protection offers a complete package of anti-virus and spyware protection. Symantec also closes off USB ports and drives. No part of this package is similar to DDS since DDS does not close off ports or drives, but instead monitors them and reports any access as it occurs IN REAL TIME. Sophos Safeguard provides data encryption for PCs. DDS DOES NOT ENCRYPT DATA but will operate seamlessly with Safeguard to monitor all media devices attached to the PC.

DDS is Different McAfee Device Control protects company data by defining security policies which dictate what data can be transferred to removable media and what cannot. DDS tracks the media devices and pinpoints users who have accessed this data. Panda Security for Business offers a complete anti- virus protection. DDS in addition tracks the media devices attached to a workstation for even better layered security.

DDS is Different Microsoft Forefront is identity management software. This product only allows properly identified users access to a computer system. DDS gives additional security tracking by logging all removable devices attached to the client computer even if the user is pre-authorized. Esets Smart Security provides extensive anti-virus protection. DDS augments that protection by monitoring removable media devices and alerting the network admin when an unauthorized device is used, which could potentially infect the network.

DDS is Different CA HIPS provides intrusion detection and prevention in a software suite. DDS augments this by continuous tracking of removable media. eEyes Blink anti-virus is breaking new ground with their new methods of virus detection. DDS provides intrusion detection to this service by alerting network authorities of unauthorized media devices used by authorized clients.

Management Team Suzan Bernhard – CEO –Co-Owner, Strong Bear LLC, Palisade CO –Owner, Tax Etc. Inc., Tucson AZ –Manager, Executive Tax Office, Tucson, AZ –Industrial Real Estate Broker, Robert A. Polachek Co., Milwaukee, WI –Teacher, Continuing Education and Advanced Tax Preparation, H & R Block, Tucson AZ –Teacher, Business English, Roosevelt University BA, MA in Sociology, Roosevelt University, Chicago, IL Rodney Roberts – CTO –Co-Owner, Strong Bear LLC, Palisade CO –IT Manager, Endovascular Technologies, Menlo Park, CA –Civil Engineer, Polydyne Engineering, AK; Alaska Engineers & Surveyors, AK; M&R Surveying, AK Ron Gardner – Chief Engineer –Teacher, Computer Programming, IntelliTec Colleges –Software Engineer, Ametek/Dixon, Grand Junction CO; Ada Business Computers. Ada OK; Jarman Technologies L.L.C, Pauls Valley OK

Asset Offering Strong Bear intends to sell its patent-pending technology as part of a strategy to monetize its IP portfolio and find the right vehicle for its solution to be represented in the market.

Contact Robert Ferri Principal Nagle-Ferri 555 Florida Street Suite 220 San Francisco, CA (415) Karla Trippe President Trippe & Company Westmoor Drive 4 th Floor Westminster, CO (970)