Making Data at Rest Encryption Easy
|
|
- Coleen Melton
- 8 years ago
- Views:
Transcription
1 Making Data at Rest Encryption Easy MM/DD/YYYY Jason Cox Client Security Products Lead Seagate Technology
2 What is SED? Self Encrypting Drive Basics The storage device LOCKS when it powers OFF. The storage device remains LOCKED when it is powered back ON. Authentication UNLOCKS the storage device. The storage device Reads and Writes data normally while drive is unlocked The plaintext data sent to the device is encrypted before being written The encrypted data read from the device is decrypted before being returned Benefits Always encrypting at line speed (no performance impact) Auto locking on power off Retirement, disposal, end of life Authentication Key Management Service Write Read Here is the unencrypted text #&% 100% performance encryption engine in the drive 2
3 Needs & Solutions Customer Needs SED Solutions Government-Grade Security FIPS Certified SED FIPS Drives Data-At-Rest Protection TCG-Compliant Security Requires TCG Host Controller & Key Management System SED Drives Easy Disposal & Repurposing Instant Secure Erase Quick & Simple Data Encryption Key Erasure Crypto-Erase & Sanitize Features Security Foundation 3
4 Why SEDs? There s stuff on your laptop that has value, and makes loss/theft costly to you or your company. It costs you or your company time or money to replace time or money to do damage control. Your company could lose business. You could lose your job, or have your identity stolen. PLUS, regulatory compliance requirements! ie HIPAA, other new data privacy and breach notification legislation in the US and abroad 4
5 Types of Information What is this stuff? Personal (important to you): Identifying info, banking info, browser histories (banks, social networking sites, etc.), cookies, cached account names/passwords, other auto-fill form info, personal Corporate (important to your company): product road maps, product schematics, design documents, customer and supplier info, , employee records, consumer data, source code What about on a drive in a data center? All of the above and possibly way more. 5
6 Cost Is this really something to worry about? IBM estimates that 50,000 drives are retired from data centers daily 1 90% of drives returned for warranty contain readable data 1 Companies are generating more data Accessed by or stored on more devices Data Loss is expensive Data breaches cost more than $6M on average per incident 2 Lost/stolen laptops and mobile data-bearing devices cost $258 per record 2 (20% more per record than a general data breach) Average consumer out-of-pocket cost due to identity fraud increased to $631 per incident Annual Cost of a Data Breach: US Study, Ponemon Institute (sponsored by Symantec), March
7 End of Life Cryptographic Erase What do you do about the stuff when you re done with it? Overwrite Degauss Physical destruction SEDs provide for near-instantaneous cryptographic erase Destroying the media encryption key makes the encrypted data unrecoverable Near instantaneous Can affect retired or otherwise unreachable portions of the storage device 7
8 In The Time It Takes To Process This Slide The Information on Eight 3.0TB Hard Drives Could Have Been Cryptographically Erased 8
9 Standards Storage Interfaces: Incits Technical Committees T10 SCSI Storage Interfaces T13 AT Attachment (ATA) Security Subsystem Management: Trusted Computing Group Specifications Trusted Storage Core Specification Storage Interface Interactions Opal SSC Enterprise SSC Security Assurance: Federal Information Processing Standards (FIPS) FIPS 197 Advanced Encryption Standard FIPS Security Requirements for Cryptographic Modules 9
10 Benefits of Standards Simplifies Procurement Cross-vendor compatibility Standard interface Simplifies Software Development Common capabilities Common interface Assurance of security capabilities NIST/FIPS validated security functionality Standardization is the process of developing and implementing technical standards. The goals of standardization can be to help with compatibility, interoperability, safety, repeatability, or quality. -Wikipedia, Standardization 10
11 TCG Storage Specifications General Documents Core Spec SIIS T10 (SCSI) T10 (ATA) Specific Documents Opal SSC Enterprise SSC Supporting Documents Opal App Note Enterprise App Note 11
12 SSC Overviews Opal Main Motivation Provide a solution to address current market needs: Stolen/lost laptop data leakage. End of life / disposal. Features Simple PIN-based authentication. Provide encryption and locking. Pre-OS boot authentication mechanisms. Enterprise Main Motivation Provide a solution to address current market needs: Minimize the time to bring devices online in a data center environment. Protect confidentiality of stored user data after device leaves owner s control End of life / disposal Features Simple PIN-based authentication. Provide encryption and locking 12
13 FIPS Government Grade Security Joint Effort Between NIST & CSEC FIPS is the Current Standard Segmented Into 4 Levels (Level 2 is Tamper Evident Physical Security) Accepted by Federal Agencies for the Protection of Sensitive Information Cryptography Must Be FIPS Validated Unvalidated Cryptography Viewed as No Protection Plain Text by Federal Agencies 13
14 What are the Benefits of FIPS? Generates New Business Opportunity / Expanded Markets Government, Health Care, Finance, etc. Product Testing Conducted in a Rigorous & Standard Manner Accepted / Validated Cryptographic Algorithms & Best Security Practices 14
15 Benefits of Standards (Revisited) Simplifies Procurement Cross-vendor compatibility Standard interface Simplifies Software Development Common capabilities Common interface Assurance of security capabilities NIST/FIPS validated security functionality Standardization is the process of developing and implementing technical standards. The goals of standardization can be to help with compatibility, interoperability, safety, repeatability, or quality. -Wikipedia, Standardization 15
16 IT Deployment Drive is Manufactured (and encrypting from the factory) Ships to OEM OEM configures system Ships to end user IT installs corporate OS image IT installs security management software* Software detects Opal SED Software installation activates SED functionality Software installs MBR shadow (pre-os boot authentication) Software configures authentication and locking ranges Including SW-managed TPM integration SECURITY IS NOW ENABLED DRIVE WILL LOCK ON POWER LOSS IF THE DRIVE IS STOLEN, THE DATA IS PROTECTED AT END OF LIFE, DRIVE CAN BE REPURPOSED WITH SECURE ERASE *This could be part of the OS, rather than a separate software application 16
17 In the Data Center Drive is Manufactured (and encrypting from the factory) Ships to OEM OEM integrates into SED management storage system Ships to customer SysAdmin installs new volume / storage system in data center SysAdmin initializes new system (authentication key, locking configurations) SECURITY IS NOW ENABLED DRIVE WILL LOCK ON POWER LOSS IF THE DRIVE IS LOST OR STOLEN, THE DATA IS PROTECTED AT END OF LIFE, DRIVE CAN BE REPURPOSED WITH SECURE ERASE 17
18 End of Life (Revisited) Need to Easily Refurbish / Repurpose Drives? Solution Cryptographic Erase Performs Instant Secure Erase Authentication Keys Return to Default Settings Benefits Instantaneous Erase For Secure Disposal Instantaneous Global Reset to Repurpose Drive to Default Settings 18
19 Conclusion Standardized solutions Interoperable Scalable Transparent Multiple vendor support (hardware and software) Ease of integration IT Policy: all future drive purchases to be SEDs Protect data throughout storage device life cycle Reduce disposal costs 19
20 Questions? 20
21 Thank You! Thanks to contributors and attendees! 21
Seagate Instant Secure Erase Deployment Options
Technology Paper Seagate Instant Secure Erase Introduction When hard drives are retired and moved outside the data centre into the hands of others, the data on those drives is put at significant risk.
More informationPerceptions about Self-Encrypting Drives: A Study of IT Practitioners
Perceptions about Self-Encrypting Drives: A Study of IT Practitioners Executive Summary Sponsored by Trusted Computing Group Independently conducted by Ponemon Institute LLC Publication Date: April 2011
More informationSolid-State Drives with Self-Encryption: Solidly Secure
Solid-State Drives with Self-Encryption: Solidly Secure 09/22/2011 Michael Willett Storage Security Strategist SAMSUNG SOLID STATE DRIVES Solid-State Drives SSD ADVANTAGES SOLID STATE DRIVES Save $$ on
More informationData Security Using TCG Self-Encrypting Drive Technology
Data Security Using TCG Self-Encrypting Drive Technology June 11, 2013 2:00PM EDT Copyright 2013 Trusted Computing Group 1 Copyright 2013 Trusted Computing Group 2 Tom Coughlin, Founder, Coughlin Associates.
More informationTrusted Computing Basics: Self-Encrypting Drives
09/21/2011 Trusted Computing Basics: Self-Encrypting Drives Ryan C. Getek, Ph.D. CISSP-ISSEP Secure Storage Lead, Trusted Computing Division, NCSC Jason Cox Client Security Products Lead, Seagate Technology
More informationNew Drive Technologies Enable Strong Data Protection Strategies: Managing Self-Encrypting Drives in the Enterprise
New Drive Technologies Enable Strong Data Protection Strategies: Managing Self-Encrypting Drives in the Enterprise Contents Addressing Common Encryption Issues... 2 Always-On Encryption... 2 Timesavings...
More informationSeagate Secure Technology
Seagate Secure Technology Marketing Bulletin Frequently Asked Questions What is the value of a self-encrypting drive (SED)? SEDs ensure user data can be quickly deleted (erased) using standard drive commands,
More informationSolid State Drives (SSD) with Self Encryption: Solidly Secure Michael Willett Storage Security Strategist Independent Consultant
Solid State Drives (SSD) with Self Encryption: Solidly Secure Michael Willett Storage Security Strategist Independent Consultant Flash Memory Summit 2014 Santa Clara, CA 1 The Problem 2005-2013: over 864,108,052
More informationSecureD Technical Overview
WHITEPAPER: SecureD Technical Overview WHITEPAPER: SecureD Technical Overview CONTENTS section page 1 The Challenge to Protect Data at Rest 3 2 Hardware Data Encryption Provides Maximum Security 3 3 SecureD
More informationSamsung SED Security in Collaboration with Wave Systems
Samsung SED Security in Collaboration with Wave Systems Safeguarding sensitive data with enhanced performance, robust security, and manageability Samsung Super-speed Drive Secure sensitive data economically
More informationAdvances in Storage Security Standards Jason Cox Intel Corporation
Advances in Storage Security Standards Jason Cox Intel Corporation Objectives Overview of Trusted Computing Group (TCG) Storage Work Group Review of TCG Document types and Goals Describe recent specifications
More informationFrequently Asked Questions: EMC Isilon Data at Rest Encryption Solution
1 Frequently Asked Questions: EMC Isilon Data at Rest Encryption Solution Table of Contents What s New? Target Customers Customer Benefits Competitive Positioning Technical Sales Questions General Sales
More informationSecurity for Disk Drive Data at Rest Disk Drive Opportunities?
Security for Disk Drive Data at Rest Disk Drive Opportunities?, CMRR gfhughes@ucsd.edu, 858-534-5317 Protect data where it lies In the disk drives where it resides Why not evolve the ATA password system
More informationEncrypted SSDs: Self-Encryption Versus Software Solutions
Encrypted SSDs: Self-Encryption Versus Software Solutions Michael Willett Storage Security Strategist and VP Marketing Bright Plaza Flash Memory Summit 2015 Santa Clara, CA 1 The Problem 2005-2013: over
More informationXTREMIO DATA AT REST ENCRYPTION
White Paper XTREMIO DATA AT REST ENCRYPTION Abstract Data at Rest Encryption is a mandatory requirement in various industries that host private or sensitive data. This white paper introduces and explains
More informationSafeguarding Data Using Encryption. Matthew Scholl & Andrew Regenscheid Computer Security Division, ITL, NIST
Safeguarding Data Using Encryption Matthew Scholl & Andrew Regenscheid Computer Security Division, ITL, NIST What is Cryptography? Cryptography: The discipline that embodies principles, means, and methods
More informationBitLocker Drive Encryption Hardware Enhanced Data Protection. Shon Eizenhoefer, Program Manager Microsoft Corporation
BitLocker Drive Encryption Hardware Enhanced Data Protection Shon Eizenhoefer, Program Manager Microsoft Corporation Agenda Security Background BitLocker Drive Encryption TPM Overview Building a BitLocker
More informationImplementing Stored-Data Encryption (with a bias for self-encrypting drives) Presenter: Michael Willett SAMSUNG Author: Michael Willett, Samsung
(with a bias for self-encrypting drives) Presenter: Michael Willett SAMSUNG Author: Michael Willett, Samsung SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA unless
More informationImplementing Disk Encryption on System x Servers with IBM Security Key Lifecycle Manager Solution Guide
Implementing Disk Encryption on System x Servers with IBM Security Key Lifecycle Manager Solution Guide Securing sensitive client and company data is becoming an IT task of paramount importance. Often
More informationTechnical Note. Installing Micron SEDs in Windows 8 and 10. Introduction. TN-FD-28: Installing Micron SEDs in Windows 8 and 10.
Technical Note Installing Micron SEDs in Windows 8 and 10 TN-FD-28: Installing Micron SEDs in Windows 8 and 10 Introduction Introduction Self-encrypting drives (SEDs) can provide an effective way of protecting
More informationIntel RAID Premium Features
Intel RAID Premium Features Description and use Revision 1.0 August, 2010 Enterprise Platforms and Services Division - Marketing Revision History Intel RAID Premium Features Revision History Date Revision
More informationKaspersky Lab s Full Disk Encryption Technology
Kaspersky Lab s Full Disk Encryption Technology In the US alone, an estimated 12,000 laptops are lost or stolen each week. According to the Ponemon Institute, a laptop is stolen every 53 seconds; more
More informationKeep Your Data Secure: Fighting Back With Flash
Keep Your Data Secure: Fighting Back With Flash CONTENTS: Executive Summary...1 Data Encryption: Ensuring Peace of Mind...2 Enhanced Encryption and Device Decommission in the Enterprise...3 Freeing Up
More informationNavigating Endpoint Encryption Technologies
Navigating Endpoint Encryption Technologies Whitepaper November 2010 THIS WHITE PAPER IS FOR INFORMATIONAL PURPOSES ONLY, AND MAY CONTAIN TYPOGRAPHICAL ERRORS AND TECHNICAL INACCURACIES. THE CONTENT IS
More informationQuickSpecs. SATA (Serial ATA) Hard Drives for HP Workstations. Introduction. SATA (Serial ATA) Hard Drives for HP Workstations.
Overview Introduction Commercial grade SATA 7200 rpm drives are our standard high bandwidth hard drive storage option. Storage capacities for the 7200 rpm drives range up to a massive 4.0TB. This enables
More informationPenetration Testing Windows Vista TM BitLocker TM
Penetration Testing BitLocker TM Drive Encryption Douglas MacIver Penetration Engineer System Integrity Group, Corporation Hack In The Box 2006/09/21 2006 Corporation. All rights reserved. Trustworthy
More informationCloud & Security. Dr Debabrata Nayak Debu.nayak@huawei.com
Cloud & Security Dr Debabrata Nayak Debu.nayak@huawei.com AGENDA General description of cloud Cloud Framework Top issues in cloud Cloud Security trend Cloud Security Infrastructure Cloud Security Advantages
More informationBypassing Self- Encrypting Drives (SED) in Enterprise Environments. Daniel Boteanu Kevvie Fowler November 12 th, 2015
Bypassing Self- Encrypting Drives (SED) in Enterprise Environments Daniel Boteanu Kevvie Fowler November 12 th, 2015 Who are we? Daniel Boteanu Forensic Technology and ediscovery, KPMG Canada M.Eng., M.Sc.
More informationConsumerization of Trusted Computing. Dr. Michael Willett Samsung
Consumerization of Trusted Computing Dr. Michael Willett Samsung ABSTRACT: Consumerization of Trusted Computing State, Federal, and international legislation mandate the use of strong security measures
More informationDell Compellent 6.5 SED Reference Architecture and Best Practices
Dell Compellent 6.5 SED Reference Architecture and Best Practices Dell Storage Technical Solutions May 2014 A Dell Reference Architecture Revisions Date May 2014 Description Initial release THIS WHITE
More informationIntel RAID Controller Premium Feature Key Training
Intel RAID Controller Premium Feature Key Training AXXRPFKSNSH Snapshot Recovery AXXRPFKDE Self Encrypting Drive (SED) AXXRPFKSSD SSD Cache with Fastpath Note: Graphics for this training is based on RAID
More informationBBM Protected: Secure enterprise- GrAde MoBIle MeSSAGING
BBM Protected: Secure ENTERPRISE- GRADE mobile messaging All the benefits of BBM with the security of enterprise-grade encryption BBM Protected allows employees to take advantage of the speed, reliability
More informationFactory-Installed, Standards-Based Hardware Security. Steven K. Sprague President & CEO, Wave Systems Corp.
Factory-Installed, Standards-Based Hardware Security Steven K. Sprague President & CEO, Wave Systems Corp. The challenge We are having a little problem with identity and data theft. It is time to reduce
More informationFull Disk Encryption Drives & Management Software. The Ultimate Security Solution For Data At Rest
Full Disk Encryption Drives & Management Software The Ultimate Security Solution For Data At Rest Agenda Introduction Information Security Challenges Dell Simplifies Security Trusted Drive Technology Seagate
More informationSelf-Encrypting Hard Disk Drives in the Data Center
Technology Paper Self-Encrypting Hard Disk Introduction At least 35 U.S. states now have data privacy laws that state if you encrypt data-at-rest, you don t have to report breaches of that data. U.S. Congressional
More informationEncrypted Storage: Self-Encryption versus Software Solutions. Dr. Michael Willett Storage Security Strategist
Encrypted Storage: Self-Encryption versus Software Solutions PRESENTATION TITLE GOES HERE Dr. Michael Willett Storage Security Strategist Independent Consultant ABSTRACT The Trusted Computing Group has
More informationProtecting Your Business from Costly Data Theft: Why Hardware-Based Encryption Is the Answer
Protecting Your Business from Costly Data Theft: Why Hardware-Based Encryption Is the Answer The Data Breach Epidemic Continues.. 1 Data Encryption Choices for Businesses................... 2 The Hardware
More informationEnova X-Wall LX Frequently Asked Questions
Enova X-Wall LX Frequently Asked Questions Q: What is X-Wall LX? A: X-Wall LX is the third generation of Enova real-time hard drive cryptographic gateway ASIC (Application Specific Integrated Circuit)
More informationDATA BREACH LAW UPDATE Global Trends Legal Complexities
DATA BREACH LAW UPDATE Global Trends Legal Complexities Moderator: Lucy L. Thomson Livingston PLLC Panelists: Thomas Smedinghoff Edwards Wildman Eric Hibbard Hitachi Data Systems Robert Thibadeau Wave
More informationGlobal security intelligence. YoUR DAtA UnDeR siege: DeFenD it with encryption. #enterprisesec kaspersky.com/enterprise
Global security intelligence YoUR DAtA UnDeR siege: DeFenD it with encryption #enterprisesec kaspersky.com/enterprise Contents Your Data Under Siege: Defend it with Encryption 3 Steps Taken to Minimise
More informationEfficient Key Management for Oracle Database 11g Release 2 Using Hardware Security Modules
Efficient Key Management for Oracle Database 11g Release 2 Using Hardware Security Modules WHITE PAPER Thales e-security www.thalesesec.com/oracle TABLE OF CONTENT Introduction...3 Oracle Database 11g
More informationCentrally Managing Access to Self-Encrypting Drives in Lenovo System x Servers
Front cover Centrally Managing Access to Self-Encrypting Drives in Lenovo System x Servers Using IBM Security Key Lifecycle Manager Understand self-encrypting drive technology and centralized key management
More informationFunctional diagram: Secure encrypted data. totally encrypted. XOR encryption. RFID token. fingerprint reader. 128 bit AES in ECB mode Security HDD
Secure encrypted data Encryption Access Control XOR encryption RFID token 128 bit AES in ECB mode Security HDD fingerprint reader enter password by keyboard 256 bit AES in CBC mode 1-2-3-4-5-6-7-8 PIN
More informationHardware versus Software
Sponsored by Seagate Hardware versus Software A Usability Comparison of Software-Based Encryption with Seagate DriveTrust Hardware-Based Encryption A SANS Whitepaper September 2007 Written by: J.D. Hietala
More informationAddressing the Data Protection Requirements of the HITECH Act
Addressing the Data Protection Requirements of the HITECH Act Simplifying data protection for healthcare industry compliance with endpoint encryption Trend Micro, Incorporated A Trend Micro White Paper
More informationRSA Solution Brief RSA. Encryption and Key Management Suite. RSA Solution Brief
RSA Encryption and Key Management Suite The threat of experiencing a data breach has never been greater. According to the Identity Theft Resource Center, since the beginning of 2008, the personal information
More informationEmulexSecure 8Gb/s HBA Architecture Frequently Asked Questions
EmulexSecure 8Gb/s HBA Architecture Frequently Asked Questions Security and Encryption Overview... 2 1. What is encryption?... 2 2. What is the AES encryption standard?... 2 3. What is key management?...
More informationAn examination of information security issues, methods and securing data with LTO-4 tape drive encryption Introduction
Silverton Consulting, Inc. StorInt Briefing An examination of information security issues, methods and securing data with LTO-4 tape drive encryption Introduction Each month many companies, big or small,
More informationSelf-encrypting drives (SED): helping prevent data loss, theft, and misplacement
Self-encrypting drives (SED): helping prevent data loss, theft, and misplacement White paper Version: 1.0 Updated: Abstract: This white paper introduces Infortrend self-encrypting drive technology, or
More informationHP ProtectTools Embedded Security Guide
HP ProtectTools Embedded Security Guide Document Part Number: 364876-001 May 2004 This guide provides instructions for using the software that allows you to configure settings for the HP ProtectTools Embedded
More informationSelf-Encrypting Drives for Servers, NAS and SAN Arrays
Technology Paper Self-Encrypting Drives for Overview This paper discusses the challenge of securing data on hard drives that will inevitably leave the owner s control. It introduces selfencrypting drives
More informationACER ProShield. Table of Contents
ACER ProShield Table of Contents Revision History... 3 Legal Notices... 4 Executive Summary... 5 Introduction... 5 Protection against unauthorized access... 6 Why ACER ProShield... 7 ACER ProShield...
More informationEMC VMAX3 DATA AT REST ENCRYPTION
EMC VMAX3 DATA AT REST ENCRYPTION ABSTRACT In the interconnected world, data and intellectual property is the highest value currency which can be held by corporations. From recent newsworthy examples,
More informationUsing BitLocker As Part Of A Customer Data Protection Program: Part 1
Using BitLocker As Part Of A Customer Data Protection Program: Part 1 Tech Tip by Philip Cox Source: searchsecuritychannel.com As an information security consultant, one of my jobs is to help my clients
More informationDisk Encryption. Aaron Howard IT Security Office
Disk Encryption Aaron Howard IT Security Office Types of Disk Encryption? Folder Encryption Volume or Full Disk Encryption OS / Boot Volume Data Volume Managed or Unmanaged Key Backup and Data Assurance
More informationHardening Private Keys with Less Hassle, Less Cost and More Security: A Case Study in Authentication. An InformationWeek Webcast Sponsored by
Hardening Private Keys with Less Hassle, Less Cost and More Security: A Case Study in Authentication An InformationWeek Webcast Sponsored by Featured Speakers Kirk Laughlin, Contributing Editor, InformationWeek
More informationWhitepaper Enhancing BitLocker Deployment and Management with SimplySecure. Addressing the Concerns of the IT Professional Rob Weber February 2015
Whitepaper Enhancing BitLocker Deployment and Management with SimplySecure Addressing the Concerns of the IT Professional Rob Weber February 2015 Page 2 Table of Contents What is BitLocker?... 3 What is
More informationCOMMONWEALTH OF PENNSYLVANIA DEPARTMENT S OF PUBLIC WELFARE, INSURANCE AND AGING
COMMONWEALTH OF PENNSYLVANIA DEPARTMENT S OF PUBLIC WELFARE, INSURANCE AND AGING INFORMATION TECHNOLOGY STANDARD Name Of Standard: Mobile Device Standard Domain: Security Date Issued: 09/07/2012 Date Revised:
More informationMobile Device Security and Encryption Standard and Guidelines
Mobile Device Security and Encryption Standard and Guidelines University Mobile Computing and Device best practices are currently defined as follows: 1) The use of any sensitive or private data on mobile
More informationPractical Storage Security With Key Management. Russ Fellows, Evaluator Group
Practical Storage Security With Key Management Russ Fellows, Evaluator Group SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA unless otherwise noted. Member companies
More informationSolid Security: The Rise of Self-Encrypting. Solid State Drives. Thomas Coughlin
Self-Encrypting PRESENTATION TITLE GOES HERE Solid State Drives Thomas Coughlin Marketing Chair, SNIA Solid State Storage Initiative President, Coughlin Associates About the Presenter Tom Coughlin, Marketing
More informationApproved By: Agency Name Management
Policy Title: Effective Date: Revision Date: Approval(s): LASO: CSO: Agency Head: Media Protection Policy Every 2 years or as needed Purpose: The intent of the Media Protection Policy is to ensure the
More informationSecure SSL, Fast SSL
Citrix NetScaler and Thales nshield work together to protect encryption keys and accelerate SSL traffic With growing use of cloud-based, virtual, and multi-tenant services, customers want to utilize virtual
More informationBBM Protected Secure mobile
BBM Protected Secure mobile messaging All the benefits of BBM with the security of enterprise-grade encryption BBM Protected allows employees to take advantage of the speed, reliability and privacy of
More informationThe Encryption Technology of Automatic Teller Machine Networks
Software Engineering 4C03 Winter 2005 The Encryption Technology of Automatic Teller Machine Networks Researcher: Shun Wong Last revised: April 2nd, 2005 1 Introduction ATM also known as Automatic Teller
More informationFull Drive Encryption Security Problem Definition - Encryption Engine
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 Full Drive Encryption Security Problem Definition - Encryption Engine Introduction for the FDE Collaborative Protection Profiles
More informationTechnical Safeguards is the third area of safeguard defined by the HIPAA Security Rule. The technical safeguards are intended to create policies and
Technical Safeguards is the third area of safeguard defined by the HIPAA Security Rule. The technical safeguards are intended to create policies and procedures to govern who has access to electronic protected
More informationYOUR DATA UNDER SIEGE. DEFEND IT WITH ENCRYPTION.
YOUR DATA UNDER SIEGE. DEFEND IT WITH ENCRYPTION. With Kaspersky, now you can. kaspersky.com/business Be Ready for What s Next Your Data Under Siege. Defend it with Encryption. 1.0 Keeping up with the
More informationU.S. Federal Information Processing Standard (FIPS) and Secure File Transfer
IPSWITCH FILE TRANSFER WHITE PAPER U.S. Federal Information Processing Standard (FIPS) and Secure File Transfer www.ipswitchft.com FIPS 140-2 is a standard first published in 2001 by the U.S. National
More informationResearch Information Security Guideline
Research Information Security Guideline Introduction This document provides general information security guidelines when working with research data. The items in this guideline are divided into two different
More informationEncryption. From the Real World
HIPAA Safe Harbor Requirement Encryption Lessons Learned From the Real World Larry.Yob@AscensionHealth.org Scott.Aschenbach@StJohn.org Breach 45 CFR Parts 160 and 164 Breach Notification for Unsecured
More informationRemoving the complexity from information protection
Removing the complexity from information protection How encryption can add value to your business July 2009 With data breaches widespread, no organisation can afford to be complacent, but most data losses
More informationBYOD. and Mobile Device Security. Shirley Erp, CISSP CISA November 28, 2012
BYOD and Mobile Device Security Shirley Erp, CISSP CISA November 28, 2012 Session is currently being recorded, and will be available on our website at http://www.utsystem.edu/compliance/swcacademy.html.
More informationCommercially Proven Trusted Computing Solutions RSA 2010
Commercially Proven Trusted Computing Solutions RSA 2010 Hardware Self-Encrypting Drives (SEDs) Unique Security Features Encryption below the file system Hardware root-of-trust for encryption Tamper resistant
More informationKey Management Best Practices
White Paper Key Management Best Practices Data encryption is a fundamental component of strategies to address security threats and satisfy regulatory mandates. While encryption is not in itself difficult
More informationEncryption Key Management for Microsoft SQL Server 2008/2014
White Paper 0x8c1a3291 0x56de5791 0x450a0ad2 axd8c447ae 8820572 0x5f8a153d 0x19df c2fe97 0xd61b5228 0xf32 4856 0x3fe63453 0xa3bdff82 0x30e571cf 0x36e0045b 0xad22db6a 0x100daa87 0x48df 0x5ef8189b 0x255ba12
More informationInnovations in Digital Signature. Rethinking Digital Signatures
Innovations in Digital Signature Rethinking Digital Signatures Agenda 2 Rethinking the Digital Signature Benefits Implementation & cost issues A New Implementation Models Network-attached signature appliance
More informationEnterprise Key Management: A Strategic Approach ENTERPRISE KEY MANAGEMENT A SRATEGIC APPROACH. White Paper February 2010 www.alvandsolutions.
Enterprise Key Management: A Strategic Approach ENTERPRISE KEY MANAGEMENT A SRATEGIC APPROACH White Paper February 2010 www.alvandsolutions.com Overview Today s increasing security threats and regulatory
More informationMore Expenses. Only this time the Telegraph will have to pay them after their recent data breech
More Expenses Only this time the Telegraph will have to pay them after their recent data breech What is an Identity? Wiki Definition Digital identity refers to the aspect of digital technology that is
More informationMySQL Security: Best Practices
MySQL Security: Best Practices Sastry Vedantam sastry.vedantam@oracle.com Safe Harbor Statement The following is intended to outline our general product direction. It is intended for information purposes
More informationAegis Padlock for business
Aegis Padlock for business Problem: Securing private information is critical for individuals and mandatory for business. Mobile users need to protect their personal information from identity theft. Businesses
More informationAlliance AES Key Management
Alliance AES Key Management Solution Brief www.patownsend.com Patrick Townsend Security Solutions Criteria for selecting a key management solution for the System i Key Management is as important to your
More informationEMC Symmetrix Data at Rest Encryption
Detailed Review Abstract This white paper provides a detailed description of EMC Symmetrix Data at Rest Encryption features and operations. March 2011 Copyright 2010, 2011 EMC Corporation. All rights reserved.
More informationHow Cloud Computing Can Accelerate Endpoint Encryption:
How Cloud Computing Can Accelerate Endpoint Encryption: Managing Self-Encrypting Drives in the Cloud Executive Summary Cloud computing is transforming IT for businesses of all sizes, but not without significant
More informationSecuring Data on Portable Media. www.roxio.com
Securing Data on Portable Media www.roxio.com Contents 2 Contents 3 Introduction 4 1 The Importance of Data Security 5 2 Roxio Secure 5 Security Means Strong Encryption 6 Policy Control of Encryption 7
More informationSecuring Corporate Data and Making Life Easier for the IT Admin Benefits of Pre Boot Network Authentication Technology
20140115 Securing Corporate Data and Making Life Easier for the IT Admin Benefits of Pre Boot Network Authentication Technology TABLE OF CONTENTS What s at risk for your organization? 2 Is your business
More informationData Protection: From PKI to Virtualization & Cloud
Data Protection: From PKI to Virtualization & Cloud Raymond Yeung CISSP, CISA Senior Regional Director, HK/TW, ASEAN & A/NZ SafeNet Inc. Agenda What is PKI? And Value? Traditional PKI Usage Cloud Security
More informationOpal SSDs Integrated with TPMs
Opal SSDs Integrated with TPMs August 21, 2012 Robert Thibadeau, Ph.D. U.S. Army SSDs Must be Opal s We also Studied using the TPM (Trusted Platform Module) with an Opal SSD (Self-Encrypting Drive) 2 Security
More informationHealthcare Compliance Solutions
Privacy Compliance Healthcare Compliance Solutions Trust and privacy are essential for building meaningful human relationships. Let Protected Trust be your Safe Harbor The U.S. Department of Health and
More informationTOP FIVE RECOMMENDATIONS FOR ENCRYPTING LAPTOP DATA A BEST PRACTICES GUIDE
TOP FIVE RECOMMENDATIONS FOR ENCRYPTING LAPTOP DATA A BEST PRACTICES GUIDE TODAY S HIGHLY MOBILE WORKFORCE IS PLACING NEW DEMANDS ON IT TEAMS WHEN PROTECTING LAPTOP DATA To guard this corporate data at
More informationTPM. (Trusted Platform Module) Installation Guide V3.3.0. for Windows Vista
TPM (Trusted Platform Module) Installation Guide V3.3.0 for Windows Vista Table of contents 1 Introduction 1.1 Convention... 4 1.2 TPM - An Overview... 5 2 Using TPM for the first time 2.1 Enabling TPM...
More informationDeciphering the Safe Harbor on Breach Notification: The Data Encryption Story
Deciphering the Safe Harbor on Breach Notification: The Data Encryption Story Healthcare organizations planning to protect themselves from breach notification should implement data encryption in their
More informationEndpoint Security for Mobile Devices. 2012 NIST/OCR HIPAA Security Rule Conference June 6, 2012. David Shepherd, CISSP www.lmi.org dshepherd@lmi.
Endpoint Security for Mobile Devices 2012 NIST/OCR HIPAA Security Rule Conference June 6, 2012 David Shepherd, CISSP www.lmi.org dshepherd@lmi.org Disclaimer The information contained in this presentation
More informationSecurity Overview for Windows Vista. Bob McCoy, MCSE, CISSP/ISSAP Technical Account Manager Microsoft Corporation
Security Overview for Windows Vista Bob McCoy, MCSE, CISSP/ISSAP Technical Account Manager Microsoft Corporation Agenda User and group changes Encryption changes Audit changes User rights New and modified
More informationA Comprehensive Plan to Simplify Endpoint Encryption
A Comprehensive Plan to Simplify Endpoint Encryption Managing SEDs, BitLocker, and FileVault Together from the Cloud Executive Summary Encryption is an essential component of any information security plan.
More informationTPM. (Trusted Platform Module) Installation Guide V2.1
TPM (Trusted Platform Module) Installation Guide V2.1 Table of contents 1 Introduction 1.1 Convention... 4 1.2 TPM - An Overview... 5 2 Using TPM for the first time 2.1 Enabling TPM... 6 2.2 Installing
More informationWhite paper Security Solutions Advanced Theft Protection (ATP) Notebooks
White paper Security Solutions Advanced Theft Protection (ATP) Notebooks Contents Introduction 2 Approaching the Challenge 4 Fujitsu s Offering Advanced Theft Protection (ATP) 5 Fujitsu is taken the lead
More informationUsing Data Encryption to Achieve HIPAA Safe Harbor in the Cloud
Using Data Encryption to Achieve HIPAA Safe Harbor in the Cloud 1 Contents The Obligation to Protect Patient Data in the Cloud................................................... Complying with the HIPAA
More information