CHECO Jared Owensby – Technical Paul Herbka – Pricing & Purchasing South Seas Corporation.

Slides:



Advertisements
Similar presentations
Introducing FailSafeSolutions Online Backup Software.
Advertisements

© 2012 All rights reserved to Ceedo. Enhanced Mobility with Tighter Security.
Meraki Mobile Device Management
Enterprise Mobility Platform Microsoft Differentiation Managed Mobile Productivity Layered Protection Hybrid Solutions Office 365DynamicsWorkday.
Windows 8: Windows To Go Overview Zvezdan PavkovicTanya Koval Senior ConsultantArchitect WCL333.
A Technical Overview of Microsoft Forefront Client Security (FCS) Howard Chow Microsoft MVP.
Defense-in-Depth Against Malicious Software Jeff Alexander IT Pro Evangelist Microsoft Australia
Using Cryptographic ICs For Security and Product Management Misconceptions about security Network and system security Key Management The Business of Security.
Mobile Mobile OS and Application Team: Kwok Tak Chi Law Tsz Hin So Ting Wai.
Plan Build Custom Image (Drivers, Apps, Updates) New Hardware In-Place (Refresh) WipeReimage New Windows Version or Major Image Revision.
Script Kiddies; CybercrimeCyber-espionage; Cyber-warfare CybercriminalsState sponsored actions; Unlimited resources Attacks on fortune 500All sectors.
Data Encryption Overview South Seas Corporation Jared Owensby.
Cyber Security and Key Management Models Smart Grid Networks The Network System Key Management and Utilization Why Hardware Security Christopher Gorog,
Information Security in Real Business
Firewall 2 * Essential Network Security Book Slides. IT352 | Network Security |Najwa AlGhamdi 1.
MCTS Guide to Microsoft Windows Server 2008 Network Infrastructure Configuration Chapter 11 Managing and Monitoring a Windows Server 2008 Network.
MDOP 2010: Diagnostic and Recovery Toolset (DaRT) Speaker Fabrizio Grossi
Guide to Operating System Security Chapter 2 Viruses, Worms, and Malicious Software.
PKI-Enabled Applications That work! Linda Pruss Office of Campus Information Security
Page Copyright Giritech A/S an – Excitor company.
©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone Endpoint Security Current portfolio and looking forward October 2010.
Chapter 4: Operating Systems and File Management 1 Operating Systems and File Management Chapter 4.
Security SIG August 19, 2010 Justin C. Klein Keane
Windows 2003 and 802.1x Secure Wireless Deployments.
November 2009 Network Disaster Recovery October 2014.
Introduction to Active Directory December 10th, pm Daniels 407.
Hands-On Microsoft Windows Server 2008 Chapter 1 Introduction to Windows Server 2008.
1 Objectives Windows Firewalls with Advanced Security Bit-Lock Update and maintain your clients using Windows Server Update Service Microsoft Baseline.
VPN for Sales Nokia FireWall-1 Products Complete Integrated Solution including: –CheckPoint FireWall-1 enterprise security suite –Interfaces installed.
Chapter Three OPERATING SYSTEMS.
Your Interactive Guide to the Digital World Discovering Computers 2012.
PROJECT PAPER ON BLUEFIRE MOBILE SECURITY. BY PONNURU VENKATA DINESH KUMAR STUDENT ID # A0815 PROFESSOR – VICKY HSU CS-426.
IT Essentials 1 v4.0 Chapters 4 & 5 JEOPARDY RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands.
ITE 1 Chapter 5. Chapter 5 is a Large Chapter It has a great deal of useful information about operating systems. You will find this VERY helpful when.
Hands-On Microsoft Windows Server Security Enhancements in Windows Server 2008 Windows Server 2008 was created to emphasize security –Reduced attack.
CIS 460 – Network Design Seminar Network Security Scanner Tool GFI LANguard.
Software 1. Software is divided into parts System software Operating system Utility software Application software 2.
Configuring Directory Certificate Services Lesson 13.
…. PrePlanPrepareMigratePost Pre- Deployment PlanPrepareMigrate Post- Deployment First Mailbox.
5 SYSTEM SOFTWARE CHAPTER
1 Objectives Windows Firewalls with Advanced Security Bit-Lock Update and maintain your clients using Windows Server Update Service Microsoft Baseline.
IP Security IP sec IPsec is short for Internet Protocol Security. It was originally created as a part of IPv6, but has been retrofitted into IPv4. It.
One Platform, One Solution: eToken TMS 5.1 Customer Presentation November 2009.
OS Troubleshooting Written by: Tim Keyser Georgia CTAE Resource Network 2010.
Microsoft Management Seminar Series SMS 2003 Change Management.
HalFILE 2.1 Network Protection & Disaster Recovery.
Managing Applications, Services, Folders, and Libraries Lesson 4.
Security SIG August 19, 2010 Justin C. Klein Keane
Be Microsoft’s first and best customer Enabling world-class and predictable customer, client, and partner experience Protecting Microsoft’s physical and.
Backup Exec System Recovery. 2 Outline Introduction Challenges Solution Implementation Results Recommendations Q & A.
Endpoint Encryption Methodologies Ed Underwood Dell Data Protection.
Why EMS? What benefit does EMS provide O365 customers Manage Mobile Productivity Increase IT ProductivitySimplify app delivery and deployment LOB Apps.
Digital Disruption, Alfresco, and Digital Signatures Brian LaPointe VP Sales, Americas CoSign by ARX.
Virtual PC 2007 Virtualization for Fermi Desktops KTF
Sandia is a multiprogram laboratory operated by Sandia Corporation, a Lockheed Martin Company, for the United States Department of Energy’s National Nuclear.
Full Disk Encryption.
SmartCenter for Pointsec - MI
IBM System x Systems Management Made Easy ibm
2016 Citrix presentation.
Forefront Security ISA
Malcolm Days Mark Miners James Farnhill
Unit 2 Computer Systems HND in Computing and Systems Development
What is an Operating System?
IBM System x Systems Management Made Easy ibm
CHECO Jared Owensby – Technical Paul Herbka – Pricing & Purchasing
Implementing Client Security on Windows 2000 and Windows XP Level 150
SCCM in hybrid world Predrag Jelesijević Microsoft 7/6/ :17 AM
SBS 2008 – One year on David Overton
IT Management, Simplified
IT Management, Simplified
Presentation transcript:

CHECO Jared Owensby – Technical Paul Herbka – Pricing & Purchasing South Seas Corporation

Agenda  Utimaco SafeGuard Enterprise SafeGuard Enterprise SGN vs. SGE SGN vs. SGE SGN Device Encryption SGN Device Encryption SGN Configuration Protection SGN Configuration Protection SGN Polices SGN Polices Two Factor Two Factor  Deployment Strategies  Pricing and Purchase Info.

SGN vs. SGE  SGN  Networked Based  SQL  IIS  Real time policy implementation  AD Integration  Typically Larger Deployments  SGE (SafeGuard Easy)  Standalone  Policy changes are made with a change file  No AD Integration  Typically Smaller Deployments

Utimaco SafeGuard Enterprise (SGN)  Full Disk Encryption  File Based Encryption for Removable Media  Configuration Protection  Central Management  Real Time Policy Implementation  Network Based

Improved Management Console and policy creation

Users and Computers

Policy Creation, Authentication

Encryption, Policies

General Settings, Policies

Policy Groups

SGN Device Encryption  Volume Based Encryption for hard disk drives  File Based Encryption and Volume Based Encryption for Removable Media

SGN Data Exchange

SGN Configuration Protection   Port Control   White Lists   Customizable Policies   Centrally Managed with the use of Management Console

SGN Configuration Protection

Security Officers

Reports

Power On Authentication (POA)

TOKENS!!!  SGN can utilize Certificates generated by Microsoft CA and import them to Aladdin eTokens or RSA SID 800’s for authentication at POA  SGN has the ability to initialize tokens from the management console

Deployment Strategies…  Baby Steps!!!!  Isolate environmental differences OS OS Machine Types Machine Types Patch level Patch level Images Images Software Software Location Location  Follow Best Practices Back Up Data Back Up Data Run CHKDSK Run CHKDSK Run DEFRAG Run DEFRAG Close Anti Virus Close Anti Virus Sector Based Write Access Sector Based Write Access 3 rd Party Software and Custom Apps 3 rd Party Software and Custom Apps

Questions???

Pricing and Purchasing  South Seas Corporation – Sole Provider off the State Contract for Utimaco  Price per Seat = $44.50  Includes support through 12/31/2010  FDE, Removable Media, Port Control, etc.  Questions on Pricing?  Options – Paul Herbka 

Pricing and Purchasing  Options ***If you need MAC or Linux encryption ***If you need MAC or Linux encryption – Check Point FDE is your best Option! Parity Pricing ($44.50 per Bundle - pending) Parity Pricing ($44.50 per Bundle - pending) Support and Deployment Experience Support and Deployment Experience Level One Support Level One Support Purchase Through South Seas Corporation Purchase Through South Seas Corporation Paul Herbka Paul Herbka

Questions???