Alena Reinaldo Cristel Randy

Slides:



Advertisements
Similar presentations
Establishing an OU Hierarchy for Managing and Securing Clients Base design on business and IT needs Split hierarchy Separate user and computer OUs Simplifies.
Advertisements

Multi-screen Rich Media Ads. Spark Flow is… …an all-in-one platform for the dynamic multi-screen rich media advertising ecosystem. A cloud- based solution.
Persistent Protection Using E-DRM Technology Jason Fasoo 06/18/2008.
Mohan Atreya Sr. Product Manager RSA Corporation SIA311 Marcio Mello Sr. Program Manager Lead Microsoft Corporation.
Introducing Windows Server 2012 R2 Work Folders:
Patterns & practices Symposium 2013 Windows Azure Active Directory Vittorio
Kerberos Authenticating Over an Insecure Network.
4/17/2017 © 2014 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks.
Introducing TakeCharge SyncedTool The most secure, agile hosted file-sharing platform for business.
STANFORD UNIVERSITY INFORMATION TECHNOLOGY SERVICES Windows Encryption File System (EFS) Tech Briefing July 18 th 2008
NFC Inventory Android App
 background and intro  client deployment  system Architecture and server deployment  behind the scenes  data protection and security  multi-server.
Chapter 2 Information Security Overview The Executive Guide to Information Security manual.
1 Network Admission Control to WLAN at WIT Presented by: Aidan McGrath B.Sc. M.A.
>>APMG 8119: DIGITAL ENTERPRISE. Copyright ??  Copyright is a exclusive right that gives the right to owner for ownership, transfer or sell to others.
Your storage on the ground; Your files in the cloud.
Wireless Network Security. What is a Wireless Network Wireless networks serve as the transport mechanism between devices and among devices and the traditional.
Unified Cloud Storage Group 9 Navneet Joshi Apoorva Gupta Gurinder Pal Singh.
Idaho Cybersecurity Task Force Department of Administration 16 Sep 2015.
 background and intro  client deployment  system Architecture and server deployment  behind the scenes  data protection and security  multi-server.
Deepnet Unified Authentication for Outlook Anywhere.
1 Network and E-commerce Security Nungky Awang Chandra Fasilkom Mercu Buana University.
National Computational Science National Center for Supercomputing Applications National Computational Science GSI Online Credential Retrieval Requirements.
Computer Security By Duncan Hall.
1 #UPAugusta Today’s Topics What are Deadly IT Sins? Know them. Fear them. Fix them. #UPAugusta201 6.
UNCLASSIFIED Matthew Bruce, Senior Solutions Consultant, Adobe Using Logic, Strategy, and DRM to Protect and Manage Content.
By: Matt Winkeler.  PCI – Payment Card Industry  DSS – Data Security Standard  PAN – Primary Account Number.
The eCSG Mobile App Mario Torrisi INFN – Division of Catania 24 June 2013 Webinar on the eCSG 1.
Introduction The State of Security Laptops Flash Drives Data Storage Smart Cards Internet Login Wifi and Internet.
REMI Database Antall Fernandes. REMI ● A relational database to facilitate data - metadata organization of various research studies. ● Interface into.
Real Time Decisions Are you who you say you are? Do you belong here?
Lan Zhou, Vijay Varadharajan, and Michael Hitchens
Migrating SharePoint Add-ins from Azure ACS to Azure AD
Smartcrypt Data Discovery
0_kit End to End encryption in your app
Recommending a Security Strategy
Information Protection
Power BI Security Best Practices
Fastdroid Produced by : Firas Abdalhaq Mohammad Amour Supervised by : Dr. Raed Alqadi.
Product Datasheet AppSense DataNow 4.1
Cyber Attacks on Businesses 43% of cyber attacks target small business Only 14% of small business rate their ability to mitigate cyber risk highly.
THE STEPS TO MANAGE THE GRID
Advanced Security Architecture System Engineer Cisco: practice-questions.html.
Introduction to Soonr by ….
2018 Real Cisco Dumps IT-Dumps
Who Uses Encryption? Module 7 Section 3.
Chapter 7 STRENGTH OF ENCRYPTION & Public Key Infrastructure
What is IPTV? Internet Protocol television (IPTV)
Digital Rights Management (DRM)
Challenge-Response Authentication
Encryption in Office 365 Shobhit Sahay Technical Product Manager
An Introduction to Cloud Computing
PREPARED BY: RIDDHI PATEL (09CE085)
Future Requirements of WIS Centres
1/3/2019 1:47 PM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS.
To help manage your network storage .
ACS Deployment Scenarios
AD FS Integration Active Directory Federation Services (AD FS) 7.4
Wireless Access Points
Install AD Certificate Services
Encrypted Database Final Presentation
Group Policy Overview Group Policy 5.1
Simple Solution. Brighter Futures.
Process flow Kindly note: This presentation is automated – please do not click any of your mouse buttons or keyboard keys.
Unit 8 Network Security.
Mobile Printing Product Overview.
Cloud Storage-as-a-Service and Course Reflection
Protection Mechanisms in Security Management
St. Louis Day of Dot Net 2011 Building Web Parts for an Office 365 SharePoint Site Becky Bertram Independent SharePoint Consultant SharePoint MVP, MCSD.NET,
Getting Started With LastPass Enterprise
Presentation transcript:

Alena Reinaldo Cristel Randy Data Leak Prevention Alena Reinaldo Cristel Randy

Enterprise use public clouds Data at rest vulnerable to leaks The number of data breaches is the last 5 years is huge. It includes goverments, retail, credit agencies, movie studios, etc. Encryption of data at rest How to ensure sharing?

Enforcing authorization policies: Magen key server Policy server id server Authentication Authorization User device Encryption Decryption Public cloud File access

Problem Two days ago magen was pushing temporary unencrypted files to the cloud before serving to the user

New flow of interaction Magen key server Policy server id server Authentication Authorization User device Public cloud File access Encryption Decryption

Demo 1. Encryption 7. Decryption Reinaldo’s laptop [Magen Agent] Alena’s laptop [Magen Agent] 3. Upload 6. Download Dropbox 4. Share 2. Encrypt Asset 5. Retrieve key Key Server Policy Server Ingestion Server 3. Push key 4. Retrieve key

DropBox Empty

Create and Publish Encrypted File

Dropbox with Shared File

Shared File is Encrypted at Rest

Share Link

Link Received

Magen Local Agent

Magen Assets Repository

Download Asset to Magen Agent

Asset added to Magen Repo

View Asset without Decrypt

Decrypt Asset and View