Download presentation
Presentation is loading. Please wait.
Published byMarsha Hamilton Modified over 9 years ago
1
Company Confidential - Internal Use Only 1 Rob MacIntosh West Coast Sales Director Utimaco Safeware, Inc Endpoint Encryption: Evolution and Trends in Data Security
2
Copyright © Utimaco Safeware, Inc 2 Agenda Data theft and loss Analysis of Full Disk Encryption solutions Software OS HDD-based Chipset Q&A
3
Copyright © Utimaco Safeware, Inc 3 Data Security Business Drivers. Securing… Data Security 1. Intellectual Property 2. Compliance3. Brand 4. Critical Infrastructure 5. National Security
4
Copyright © Utimaco Safeware, Inc 4 Data Loss Or Theft Is Expensive Recent Surveys Say… Data Is The Target Top 3 threats (CSI Survey, 10/08) Laptop Theft Cost of Lost/Stolen record (Ponemon Institute, 02/09) $202 Avg. intellectual property loss (CERIAS, Purdue Univ. 01/09) $4.6m / Company Malware, Botnets, Cyber crime / warfare, VoIP/mobile device threats (Georgia Tech InfoSec Center, 10/08) “All Data Driven!”
5
Copyright © Utimaco Safeware, Inc 5 Compliance Regs. Mandate Data Security Protection Of Confidential and/or Private Data Federal GLBA, HIPAA, PCI States: 44/50 require “Reasonable measures” CA: Breach notification (personal, medical). Encryption exempt OR: Similar to CA (personal). Fines for delayed disclose WA: Similar to CA States (“Specific measures”) NV: Encrypt PII data in transit outside the enterprise MA: Encrypt all personal information Canada PIPEDA: Protect personal info. – collected, used, disclosed. Technologies: e.g., passwords, encryption
6
Copyright © Utimaco Safeware, Inc 6 Data Breach Headlines to be Avoided TJX -In store communications intercepted? -Data for 94 million customers lost -Reported on October 24, 2007 Source: www.msnbc.com 245 Million Data Records of U.S. Residents Exposed Since 2005 Source: www.privacyrights.org
7
Copyright © Utimaco Safeware, Inc 7 Data Security Is Top Issue On The Agenda 68% Of Firms Consider It To Be Very Important Source: Forrester Research - The State Of Enterprise IT Security: 2008 To 2009
8
Copyright © Utimaco Safeware, Inc 8 Full Disk Encryption Is A Top Initiative Top Client Security Tech. For Near-Term Pilot Or Adoption Source: Forrester Research - The State Of Enterprise IT Security: 2008 To 2009
9
Copyright © Utimaco Safeware, Inc 9 Laptop Theft/Fraud No. 3 Concern – 42% CSI Computer Crime & Security Survey (October 2008 )
10
Copyright © Utimaco Safeware, Inc 10 Loss of Private, Confidential Information 2008 Data Breach Investigations Report -- Verizon Business
11
Copyright © Utimaco Safeware, Inc 11 Data Security Solution Requirements Utimaco Customer Surveys…Encryption, And More… 1.Define security roles and responsibilities 2.Enforce consistent polices 3.Provide transparent security to end-users 4.Enable secure data sharing and recovery 5.Allow easy deployment and administration 6.Facilitate quick, on-demand audits
12
Copyright © Utimaco Safeware, Inc 12 Full Disk Encryption (FDE) For Laptops, Desktops and Servers Encrypts and secures all data on HDD Enforces pre-boot authentication for users Secure protection: Power-off, hibernation Confidentiality of IP Protection of privacy Compliance w/ policy & regulations
13
Copyright © Utimaco Safeware, Inc 13 FDE Requirements Protect all data on HDD Integrate into existing IT environment (e.g., tokens) Easy roll-out across enterprise Emergency procedures -- forgotten passwords, lost tokens Transparent encryption, minimal end-user training Easy central management Logging, reporting and audit
14
Copyright © Utimaco Safeware, Inc 14 Existing and Emerging FDE Solutions S/W based Early 1990s e.g. Utimaco / SafeGuard O/S based November 2006 e.g. Microsoft / BitLocker™ Drive Encryption Self-encrypting HDDs 2006 e.g. Seagate Momentus 5400 FDE.2 PC board Chipset-based Not yet released
15
Copyright © Utimaco Safeware, Inc 15 Software-based FDE Full / partial HDD encryption, independent of file system Multi-user support Mature (millions of seats worldwide) Enterprise class manageability, data/password recovery Wide platform support (OS, h/w) Additional s/w solution required on PC
16
Copyright © Utimaco Safeware, Inc 16 OS-based FDE -- BitLocker Fully encrypts Windows OS volume on HDD Verifies integrity of early boot components, config. Data Bundled in Windows Vista™ Enterprise & Ultimate H/w & S/w upgrade (compatible TPM, BIOS) for wide rollout Narrow management, password-reset capabilities
17
Copyright © Utimaco Safeware, Inc 17 Self-Encrypting HDDs – e.g., Seagate, Hitachi Data encrypted by the HDD Encryption keys stored in HDD chip Fast encryption Secure – h/w based. Key not stored in RAM On-the-fly drive erasure for fast, thorough erasing Limited key- and user-management Requires HDD h/w upgrade for full rollout
18
Copyright © Utimaco Safeware, Inc 18 PC-Board Chipset based FDE Data encrypted by the chipset when written to HDD Fast encryption Secure – h/w based. Key not stored in RAM Limited key- and user-management Requires major h/w upgrade for full rollout
19
Copyright © Utimaco Safeware, Inc 19 Full Disk Encryption Requirements v functionality S/WOSChipsetHDD Secure all data on HDD Integrate into existing IT environment -- e.g. tokens Easy roll-out across network Emergency procedures -- recover passwords, lost tokens Transparent encryption – minimal end-user training Secure & easy central management Logging, reporting and audit Secure data on other media No major h/w upgrade
20
Copyright © Utimaco Safeware, Inc 20 Sample Enterprise Scenario: 500 PCs Achieving full data encryption in mixed environments Desktops, laptops with 3 OS versions Win 2000 (on desktop PCs) Win Vista Business (for all laptop users) Win Vista Ultimate (mgmt laptops) Differing PC h/w configs. 4 types of HDDs (incl. Seagate, Hitachi, Samsung) 7 chipset types (incl. Intel, AMD)
21
Copyright © Utimaco Safeware, Inc 21 Challenges with Emerging Solutions 1.Emergency procedures – password recovery, lost tokens 2.Integrate w/ existing IT environment: AD, PKI, tokens 3.Central Administration & key management Using existing definitions (e.g. users, keys, roles) Separation of duties 4.Limited logs and reports for audits 5.Securing data stored on other media: encryption of Removable media (incl. USB sticks, CD/DVD) Files stored on servers, Emails
22
Copyright © Utimaco Safeware, Inc 22 Encryption Solutions Survey Enterprise-class Management is Required Source: Ponemon Institute 2007 Annual Study: U.S. Enterprises Encryption Trends
23
Copyright © Utimaco Safeware, Inc 23 File Share Security Admins. Internet Local Users Removable Media Central Management Server Partners, Customers Remote Users Email EncryptionLANDMZInternet Edge & Beyond Data Loss/Theft From a Porous Infrastructure Personal, Medical, Financial, Intellectual Property, Non-public Data Email gateway Email Gateway Data Thieves
24
Copyright © Utimaco Safeware, Inc 24 Thank you. Q & A Rob MacIntosh robert.macintosh@utimaco.com 480-726-0020
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.