Presentation is loading. Please wait.

Presentation is loading. Please wait.

White Paper: Enterprise Encryption and Key Management Strategy 1 Vormetric Contact: Name: Tina Stewart (send traffic.

Similar presentations


Presentation on theme: "White Paper: Enterprise Encryption and Key Management Strategy 1 Vormetric Contact: Name: Tina Stewart (send traffic."— Presentation transcript:

1 White Paper: Enterprise Encryption and Key Management Strategy 1 Vormetric Contact: Name: Tina Stewart Email: Tina-Stewart@vormetric.com (send traffic to a registration page on Vormetric site for whitepaper download) THE TIME IS NOW Enterprise Encryption and Key Management Strategy Download ESG Whitepaper

2 White Paper: Enterprise Encryption and Key Management Strategy 2 In this presentation we share key insights from EGS’s whitepaper on: Enterprise Encryption and Key Management Strategy The Time Is Now, Enterprise Encryption and Key Management Strategy The Time Is Now, By Jon Oltsik Vormetric is the leader in enterprise encryption and key management. Our Data Security solution encrypts any file, any database, any application, anywhere.encryptionkey managementData Security This ESG white paper was commissioned by Vormetric, Inc. and is distributed under license from ESG. Overview “ “ Large organizations need an enterprise encryption strategy. This should include central command and control, distributed policy enforcement, tiered administration, and an enterprise-class key management service. i i “ “

3 White Paper: Enterprise Encryption and Key Management Strategy 3 The Time is Now Your Business Data is Everywhere and Accessed by Everyone Ad hoc Data Security = increased risk and business exposure Large organizations need an enterprise encryption strategy – Central Command and Control – Distributed Policy Enforcement – Tiered Administration – Enterprise-class key management service

4 White Paper: Enterprise Encryption and Key Management Strategy 4 Drivers of Enterprise-Class Data Security Solutions State, industry and international privacy regulations require or recommend encryption for data security. Regulatory Compliance Advanced Persistent Threats (APTs) resulting in IP theft are forcing enterprises to aggressively respond with data encryption technologies. Intellectual Property Protection 126 breaches and 1.5Million personal records reported in 2012 alone. Including well known names – Arizona State University and Zappos.com. Publically Disclosed Breaches

5 White Paper: Enterprise Encryption and Key Management Strategy 5 Top Investment: Data Encryption Which of the following security technology products/solutions has your organization purchased in response to APTs? (Percent of respondents, N=95, multiple responses accepted) Data encryption technologies Web gateway for blocking suspicious URLs and web based content Application firewalls Specific technology defenses designed to detect and prevent APT attacks Database security technologies Managed security services DLP (data loss prevention) technologies New types of user authentication/access controls Endpoint white-list/black-list enforcement technologies Third-party penetration testing service from specialty firm 0%10% 20% 30% 40% 50%60% 54% 49% 44% 43% 39% 35% 31% 24% 21% Source: Enterprise Strategy Group,2012

6 White Paper: Enterprise Encryption and Key Management Strategy 6 Data Security Growing Pains Source: enterprise Strategy Group, 2012 Each tool has its own administration and key management ! !

7 White Paper: Enterprise Encryption and Key Management Strategy 7 Lack of standards Redundancy- processes, tools, licenses, training High risk of data loss or a security breach. No central command and control Redundancy- processes, tools, licenses, training No central view for risk management or measurement of KPIs. Increased security risk. Multiple key management systems Redundancy- processes, training Encryption keys exposure. Organizational misalignment Additional/ unfamiliar tasks for functional IT staff Human intervention increases security risks. Issue Cost Risk Data Security Growing Pains All of these issues create operational overhead and increased risk. ! !

8 White Paper: Enterprise Encryption and Key Management Strategy Provides Executive Visibility 8 Encryption must fit into existing infrastructure and processes without altering or affecting existing systems and application. Transparent Key Management responsibilities must reside with specific, trained staff dedicated to this function. Owned by the security team CISO’s should be able to assess risk across the enterprise at all times and keep executive management informed. Considerations for Enterprise Strategy

9 White Paper: Enterprise Encryption and Key Management Strategy 9 Key Enterprise Architectural Features Central Command & Control Distributed Policy Enforcement Tiered Administration Enterprise-class Key Management 1 2 3 4 1 2 3 4

10 White Paper: Enterprise Encryption and Key Management Strategy 10 The Bigger Truth – The Time is Now. DEFINE the ideal encryption solution for your needs ASSESS what you have in place today IDENTIFY gaps in your current implementations AUGMENT current ad hoc solutions 1 23 4 “ One of your most valuable assets, sensitive data, faces an increasing level of risk … ESG highly recommends that CISOs develop an enterprise encryption strategy as soon as possible. i i “ “ 1 2 34

11 White Paper: Enterprise Encryption and Key Management Strategy 11 Vormetric Contact: Tina Stewart Tina-Stewart@vormetric.com THE TIME IS NOW Enterprise Encryption and Key Management Strategy Download ESG Whitepaper @Vormetric Click - to - tweet


Download ppt "White Paper: Enterprise Encryption and Key Management Strategy 1 Vormetric Contact: Name: Tina Stewart (send traffic."

Similar presentations


Ads by Google