Quick Thoughts on PGP Use Cases for KMIP 1 Michael Allen Sr. Technical Director.

Slides:



Advertisements
Similar presentations
Smart Identity Protection That Works for You and Your Users 2 Petri Ala-Annala Senior Principal, CISSP-ISSAP, CISA, CISM.
Advertisements

Preface Demo A Quick Thank You How Did We Do It?
Controlled Language in action for MT Johann Roturier May 2009.
Name COUNTRY 10 th Name COUNTRY 10 th Cheung Yee Man Hong Kong Cheung Yee Man Hong Kong.
Symantec Education Skills Assessment SESA 3.0 Feature Showcase
*significant capabilities highlighted.
IT Analytics for Symantec Endpoint Protection
‘Changing environment – changing security’ - Cyber-threat challenges today – Budapest, September 17-18, Industry and the fight against cybercrime.
Online Shopping Self-Defense
© 2010 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered.
1 Online Self-Defense: Avoiding Scams Chau Mai December 5, 2013.
© 2014 Microsoft Corporation. All rights reserved.
Mokala Christele Wasseu Toutou Frederique Maraise Awah Vanessa Injeh.
Threat Intelligence Use in Information Security: History, Theory and Practice Tim Gallo Cyber Security Field Engineering 1.
Translation in the Community LRC Localisation in the Cloud Jason Rickard Principal Product Manager, Community.
Empower People Around the World with a $25 Loan Design Skills Color Typography Layout Creativity Technical Skills Tool Use Layers Color Optimization.
1 Getting Beyond Standalone Antivirus to Advanced Threat Protection Eric Schwake Sr. Product Marketing
Symantec Tech Symposium Randy Cochran, Vice Present Channel Sales – Americas August 17, 2009.
Backup Modernization with NetBackup Appliances
Click to edit Master title style Click to edit Master subtitle style.
The Changing Face of Endpoint Security K Varadarajan Regional Manager, Enterprise Sales, Symantec Security Conference 2010_Bangalore.
*significant capabilities highlighted.
Symantec De-Duplication Solutions Complete Protection for your Information Driven Enterprise Richard Hobkirk Sr. Pre-Sales Consultant.
Symantec Vision and Strategy for the Information-Centric Enterprise Muhamed Bavçiç Senior Technology Consultant SEE.
1 When Cloud Networking meets Cloud Computing: Software-Defined Networking (SDN) Customer Application Faan DeSwardt Infrastructure Architecture Manager.
GPS 2011 Slide - 1 COMPETITIVE STRATEGIES APAC Discussion.
Linda Mitchell Evaluating Community Post-Editing - Bridging the Gap between Translation Studies and Social Informatics Linda Mitchell PhD student.
Практические аспекты аутсорсинга ИБ Алексей Чередниченко Ведущий консультант, Symantec Services Group 28 апреля 2009.
GPS 2011 Slide - 1 THE CERTIFICATION REVOLUTION HOW IT INDUSTRY CERTIFICATION HAS REVOLUTIONIZED THE AMERICAN SCHOOL SYSTEM Denise Spence, Dunbar High.
President’s Forum and WSML 2012 INDSTRAT 02 Mobile Market Dynamics Brian Duckering, Deborah Clark, Evan Quinn “A Day in the Life of Mobile” 1.
Symantec Managed Security Services The Power To Protect Duncan Evans Director, Cyber Security Services 1.
Cassio Goldschmidt June 29 th, Introduction 2.
1 Safely Using Shared Computers Amanda Grady December 2013.
President’s Forum and WSML 2012 Mobile Market Dynamics Deborah Clark, Dawn Davis, Brian Duckering, Marie Pettersson 1 “A Day in the Life of a Mobile Family”
Five Easy Steps to Successful CC Evaluations Wesley H. Higaki International Common Criteria Conference September 2008.
Type presentation name here in slide master © 2007 SDL. Company Confidential. Forward-looking information is based upon multiple assumptions and uncertainties.
GPS 2011 Slide - 1 MS CERT KIT Microworld Nova. GPS 2011 Slide - 2 Presentation of Microworld Nova The MS Cert Kit MS Cert Kit presentation The backend.
The current state of Cybersecurity Targeted and In Your Pocket Dale “Dr. Z” Zabriskie CISSP CCSK Symantec Evangelist.
President’s Forum and WSML 2012 SYMSTRAT 03: Enterprise Sales Conversations for Virtualization Todd Zambrovitz with guest appearance by Kevin Fiedler 1.
WLAN Auditing Tools and Techniques Todd Kendall, Principal Security Consultant September 2007.
Click to add Presentation Title Arial 32, 5 line max title space line 3, title space line 4, title space line 5 Presenter Title Organization Insert your.
Innovation From the Ground Up Fred Hollowood, Martin Roche.
Type presentation name here in slide master © 2007 SDL. Company Confidential. Forward-looking information is based upon multiple assumptions and uncertainties.
Installation of Storage Foundation for Windows High Availability 5.1 SP2 1 Daniel Schnack Principle Technical Support Engineer.
1 APJ Curriculum Paths for Partners Specialization Accelerates Shirley Hoon APJ Partner Enablement Partner Enablement Oct
Copy to Tape TOI. 2 Copy to Tape TOI Agenda Overview1 Technical Feature Implementation2 Q&A3.
Shared Engineering Services APJ Ghostdetect ver 1.0 for SPC Donghyun Seo Dec 12, 2008.
Upstate NY Storage & High Availability User Group October 23, 2009.
FY16 Q3 Enterprise West QBR
KMIP v.Next PGP Support 1 Michael Allen Sr. Technical Director, Symantec.
Optimized Synthetics 1 OpenStorage Optimized Synthetics.
Type presentation name here in slide master © 2007 SDL. Company Confidential. Forward-looking information is based upon multiple assumptions and uncertainties.
Partner Proctored Assessment Registration Process Ajit Jha 1 Partner Assessment.
OST Virtual Synthetics 1. Synthetics Overvier Definitions – Catalog – Image – Extent Process Overview (today) – Extent map derivation – Read agenda –
Cyber Security in the Post-AV Era Amit Mital Chief Technology Officer General Manager, Emerging Endpoints Business Unit.
Editing Tons of Text? RegEx to the Rescue! Eric Cressey Senior UX Content Writer Symantec Corporation.
APIs related to NBU AIR Feature 1 OST APIs Related to NBU AIR Feature.
Maximize Profits Through Stronger Security Brook Chelmo Product Marketing
Copyright © 2012, Oracle and/or its affiliates. All rights reserved. Oracle Proprietary and Confidential. 1.
MIX 09 4/17/2018 4:41 PM © 2009 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered.
Using Parallelspace TEAM Models to Design and Create Custom Profiles
Parallelspace PowerPoint Template for ArchiMate® 2.1 version 1.1
Parallelspace PowerPoint Template for ArchiMate® 2.1 version 2.0
1 Topic Title First slide 2 line 3 line 4 line
Automation in an XML Authoring Environment
ე ვ ი ო Ш Е Т И О А С Д Ф К Ж З В Н М W Y U I O S D Z X C V B N M
Presenter Name Title Organization.
1 Session Title 2 line 3 line 4 line
1 Topic Title First slide 2 line 3 line 4 line
Presentation transcript:

Quick Thoughts on PGP Use Cases for KMIP 1 Michael Allen Sr. Technical Director

PGP Keys Are Different Beasts From X.509 Certificates Quick Thoughts on PGP Use Cases for KMIP 2

Common Use Cases: Registration Enroll me and create for me a key. Give me a copy of that key, including the private portion. Enroll me but, here, I have my own key. I only want you to have the public portion. Please sign it with whatever key you think is authoritative and give me back a signed copy. I'm a stranger to you but I want you to have my public key so that other users in your organization can encrypt things to me. I'm a stranger to you but I signed this other key that you manage. Here's a copy of the signed version of that key. Please remember that I signed it. Quick Thoughts on PGP Use Cases for KMIP 3

Common Use Cases: Searching Do you have any kind of key for ? Do you have an key for ? Do you have any kind of key that matches key ID 0x ? Do you have an key for key ID 0x ? I'm trying to encrypt something to group. Do you have a key for that group? Quick Thoughts on PGP Use Cases for KMIP 4

Common Use Cases: Trust and Encryption Actions Is this certificate / key "OK"? (I.e. Should I trust it?) I have encrypted copies of a data encryption key (symmetric) encrypted to keys 0x , 0x90ABCDEF, and 0x Can you decrypt any one of them for me to give me back the bare DEK? Quick Thoughts on PGP Use Cases for KMIP 5

Thank you! Copyright © 2011 Symantec Corporation. All rights reserved. Symantec and the Symantec Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners. This document is provided for informational purposes only and is not intended as advertising. All warranties relating to the information in this document, either express or implied, are disclaimed to the maximum extent allowed by law. The information in this document is subject to change without notice. Quick Thoughts on PGP Use Cases for KMIP 6 Michael Allen