Confidential Computer Systems Group HD Lock for Toshiba Notebook August 3rd, 2006.

Slides:



Advertisements
Similar presentations
User Authentication on Mobile Devices Google Two Factor Authentication OTP (One Time Password)
Advertisements

Installation & User Guide
Voice and Data Encryption over mobile networks July 2012 IN-NOVA TECNOLOGIC IN-ARG SA MESH VOIP.
Creating HIPAA-Compliant Medical Data Applications with Amazon Web Services Presented by, Tulika Srivastava Purdue University.
McAfee One Time Password
Share Your PC Get Started. Sharing a computer used to mean that others could see your private files, install software you didn't want, or change your.
Encryption – First line of defense Plamen Martinov Director of Systems and Security.
EToken PRO Anywhere. Agenda  eToken PRO Anywhere Overview  Market background and target markets  Identifying the opportunity  Implementation and Pricing.
Personal Data Protection and Security Measures Justin Law IT Services - Information Security Team 25 & 27 November 2013.
© 2009 Lenovo Security at the Endpoint Henry Ramos.
1 Electronic Information Security – What Researchers Need to Know University of California Office of the President Office of Research May 2005.
For further information computersecurity.wlu.ca
Securing. Agenda  Hard Drive Encryption  User Account Permissions  Root Level Access  Firewall Protection  Malware Protection.
15 Tactical Improvements to IT Security Virtual Keyboard, Two Factor Authentication, Active Confirmation and FAA Access to CPS Online Ganesh Reddy.
Data Security for Healthcare Facilities Debbie Abbott Health Information Consultant Resolutions (Int) Pty Ltd.
Guide to Massachusetts Data Privacy Laws & Steps you can take towards Compliance.
eToken Virtual and MobilePASS
Next Generation Two Factor Authentication. Laptop Home / Other Business PC Hotel / Cyber Café / Airport Smart Phone / Blackberry 21 st Century Remote.
Portable encryption technologies at Sandia Jeremy Baca Cyber Security Technologies Department Sandia National Labs Sandia is a multiprogram laboratory.
Understand Virtualized Clients Windows Operating System Fundamentals LESSON 2.4.
Network and Server Basics. 6/1/20152 Learning Objectives After viewing this presentation, you will be able to: Understand the benefits of a client/server.
Mobile Mobile OS and Application Team: Kwok Tak Chi Law Tsz Hin So Ting Wai.
Personal Data Protection and Security Measures Justin Law IT Services - Information Security Team 18, 20 & 25 March 2015.
Data Encryption Overview South Seas Corporation Jared Owensby.
About PKI Key Stores Dartmouth College PKI Lab. Key Store Defined Protected “vault” to hold user’s private key with their copy of their x.509 certificate.
Securing Data Storage Protecting Data at Rest Advanced Systems Group Dell Computer Asia Ltd.
Security Awareness: Applying Practical Security in Your World
Chapter 9 Information Systems Controls for System Reliability— Part 2: Confidentiality and Privacy Copyright © 2012 Pearson Education, Inc. publishing.
Security Computing Practices Plamen Martinov Chief Information Security Officer.
Secure Your Future Now ….. Logical Access Control and Data Security Brought to you by Support & Maintenance by DCS Global Info.
EToken TMS 5.0 CA June 09. eToken TMS 5.0 Agenda  The challenge: Authenticator life-cycle management  eToken TMS (Token Management System)  eToken.
11-01: Get Started with SCP Supply Chain Platform Training Presentation Updated April 2009.
Learning Outcomes At the end of this lesson, students should be able to: State the types of system software – Operating system – Utility system Describe.
RIVERA SÁNCHEZ-1 CSE 5810 User Authentication in Mobile Healthcare Applications Yaira K. Rivera Sánchez Computer Science & Engineering Department University.
Access and Identity Management System (AIMS) Federal Student Aid PESC Fall 2009 Data Summit October 20, 2009 Balu Balasubramanyam.
VeriSign® Identity Protection (VIP) Overview. 2 2 VeriSign Confidential Trust on the Internet is More Compelling Than Ever 1.5 billion Internet users.
USBK Overview Ver:1.0, 8 February USB Sticks 350 million USB Sticks are in use worldwide 155 million USB sticks were sold in 2008 and sales reached.
Secure Online USB Login System. Everything is going online Social Interactions Banking Transactions Meetings Businesses... including all sorts of crimes.
Your Interactive Guide to the Digital World Discovering Computers 2012.
Brad Allen Windows Client Technical Specialist Microsoft Corporation.
© NeoAccel, Inc. TWO FACTOR AUTHENTICATION Corporate Presentation.
Week #7 Objectives: Secure Windows 7 Desktop
Windows 7 for Information Workers NetCom SME: Neil Masih.
Environment for Information Security n Distributed computing n Decentralization of IS function n Outsourcing.
“TK8 Safe” – Easy-to-use, secure password manager Download a free trial copy: Product Info Highlights TK8 Safe is a perfect password manager.
Chapter 11 Privacy and Secrets. Chapter Outline Privacy and Regulation What to do about passwords Random Number generation Cryptography Secrets in Memory.
Setting up/Managing Bank Personnel Intuit Financial Services University Business Financial Solutions Certification.
| © 2007 Lenovo Utimaco SafeGuard Easy March 2007.
Jordan Shropshire MIS Seminar Spring 2005 Technology Presentation: Microsoft Longhorn.
I NTRODUCTION TO N ETWORK A DMINISTRATION. W HAT IS A N ETWORK ? A network is a group of computers connected to each other to share information. Networks.
Adxstudio Portals Training
About Softex Mission Statement: “To provide innovative security software products and solutions for computing devices” Softex was founded in 1992 by IBM.
August Video Management Software ViconNet Enterprise Video Management Software Hybrid DVR Kollector Strike Kollector Force Plug & Play NVR HDExpress.
Introduction: Introduction: As technology advances, we have cheaper and easier ways to stay connected to the world around us. We are able to order almost.
I NTRODUCTION TO N ETWORK A DMINISTRATION. W HAT IS A N ETWORK ? A network is a group of computers connected to each other to share information. Networks.
©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. Securing Your Data in Endpoint and Mobile Environments Frank Suijten Security.
Product Training 1 JetFlash Software Application.
The Payment Card Industry Data Security Standard (PCI DSS) is a proprietary information security standard for organizations that handle branded credit.
Data-Tech Guardian Endpoint Security Suite. Guardian Endpoint Security Suite secures All Things Mobile TM from one management console.
Information Technology Security Office of the Vice President for Information Technology New Employee Orientation II.
A l a d d I n. c o m Strong Authentication and Beyond Budai László, IT Biztonságtechnikai tanácsadó.
Network and Server Basics. Learning Objectives After viewing this presentation, you will be able to: Understand the benefits of a client/server network.
Security Issues in Information Technology
CLOUDENTIFY.
Protecting PHI & PII 12/30/2017 6:45 AM
DATA SECURITY FOR MEDICAL RESEARCH
How to Bypass Windows 8 Password without Reset Disk
The bios.
Presentation transcript:

Confidential Computer Systems Group HD Lock for Toshiba Notebook August 3rd, 2006

Computer Systems Group Toshiba Security Service Menu Toshiba Mobile Notebook Technology Secure Mobile Computing by design *Available on select Toshiba notebook models Data File Encryption Protection with Access and Data Security Two-Factor USB Token Fingerprint Authentication* BIOS Password* HDD Password* Two-Factor USB Token HDD Data Encryption Embedded TCG- compliant security chip for Data Encryption* Physical Protection Cable Locks Movement Alert* Chassis Durability Design HDD,* LCD* NB Access

Computer Systems Group What is HD Lock Toshiba Notebooks What is HDLock for Toshiba Notebooks: Protects notebooks and Tablet PC’s from unauthorized access to HDD data if they are unattended, lost or stolen – it is not a physical theft solution! Uses powerful 128-Bit AES encryption algorithm and two-factor authentication. Note: AES is the U.S. Govt standard Uses a unique USB A-Key and user defined password for log-in and HDD access. (two-factor – what you know and what you have) Available recovery portal for lost A-Keys and passwords Optimized for Toshiba notebooks that run Windows XP and Tablet Edition – Tecra, Portege, and Satellite –Toshiba Power Saver settings –Hibernation mode support

Computer Systems Group Target Market (Key Vertical) Target Markets: Any Company that has mobile or remote employees with proprietary and confidential data stored on a notebook HDD Company’s that must be in compliance to new privacy and security legislation Health Insurance Portability and Accountability Act of 1996 (HIPAA) Sarbanes-Oxley Financial and Accounting Disclosure Information Act of 2002 State and local privacy regulations for the protection and permitted disclosure of personal consumer data Key Verticals: Healthcare and Medical Financial HR Legal Government Services Education

Computer Systems Group Why HD Lock for Toshiba Notebooks (Q&A from customers ) Why we choose USB Token type of security –IDC reported USB Token Market will grow 55.1%(CAGR) between 2003 and 2008 (has Overview PPT) –USB Token is image as Key itself –Two factor authentication such as ATM Card and Security Password are needed Why we choose Authenex HD Lock –HD Lock is Encryption product, and not only access key to Notebook –Easy to Use & Easy to Maintain –Authenex has worked with TAIS/CSE engineer group to support Toshiba Notebook –feature such as Hibernation mode, Power Saver setting, etc. –Gartner also recommend Authenex (has Overview PPT)

Computer Systems Group Why HD Lock for Toshiba Notebooks (Q&A from customers) If I lost Key / forgot password –You will be receiving 32 character code after you are able to answer 3 questions –You must finish registration process and create your own 3 questions right after the installation Do I need USB Token (HD Lock) to be plugged in the Notebook all the time. –Yes and No –This is customer configuration set to change (Toshiba feature) What is the difference between TPM and HD Lock for Toshiba Notebooks –Use HD Lock or TPM, but not both together –TPM, customer will choose which file/folder to encrypt In other word, it is difficult to manage by IS organization. –TPM will have more feature with next generation OS, Longhorn –It is true that nobody is using TPM yet (Gartner stated same thing.) –HD Lock will encrypt all data/folder except Program File & OS

Computer Systems Group Why HD Lock for Toshiba Notebooks (Q&A from customers) What is the difference between HD Lock and Entire HDD Encryption –There are many Entire HDD company in the USA, such as PointSec, SafeBoot, WinMagic, Ultimaco, PC Guardian –Entire HDD Encryption does encrypt everything including OS. Sometimes dangerous to encrypt OS, and need to have SI know how to support One HD Lock Token can be used with another Notebook –No, one Token support one Notebook

Computer Systems Group Is your Notebook Safe?

Computer Systems Group USB Token Market (IDC) USB Token Security growth is 55.1% in

Computer Systems Group Authenticate the User to the Organization from Gartner Use of legacy hardware or software tokens as remote access authentication tools has awaited an easier, lowercost replacement for many years. Mobile-oriented approaches include token generators that can be downloaded and run on PDAs, and the receipt of one-time passwords (OTPs) and tokens through phones and pagers. In addition, there are vendors that will allow users to choose their authentication factors from among multiple interfaces, depending on which is expedient. Examples of vendors include: Aladdin Knowledge Systems (OTP token) Authenex (OTP token) Entrust (OTP over SMS) RSA Security (OTP token, OTP token on phone) Secure Computing (OTP token)