WinMagic Data Security Enterprise Full Disk Encryption Solutions
|
|
|
- Lewis Floyd
- 10 years ago
- Views:
Transcription
1 WinMagic Data Security Enterprise Full Disk Encryption Solutions 23 Differentiating Features January Matheson Blvd. West, Suite 201 Mississauga, ON, Canada L5R 3L7 Tel: (905) Fax: (905) Web:
2 (This page left intentionally blank.)
3 Corporate Profile... 5 SecureDoc... 7 SecureDoc... 7 SecureDoc Enterprise Server... 7 Compartmental SecureDoc... 7 SecureDoc PDA... 7 SecureDoc: All Inclusive Protection... 7 SecureDoc Features... 9 Design and Architecture... 9 Pre-Boot Authentication... 9 Flexible Key Labeling... 9 No Master Password Vulnerability... 9 Transparent Operation and Thorough Encryption... 9 Supports PKI (Public Key Infrastructure) Starting at Pre-boot Time... 9 Integrates with USB Tokens and Smart cards... 9 Increased Compatibility... 9 Encrypts Removable Drives... 9 Protected Multi-Users for Shared Computers... 9 Fully Customizable Text and Color Screen at Boot Login... 9 Single Sign On... 9 Password Rules...10 Secure Screen Saver...10 Disk Lock...10 Enterprise Version...10 Algorithms Used Unique Features of SecureDoc Common Questions in considering Full Disk Encryption Prerequisite Criteria...13 Page 3 of 16
4 (This page left intentionally blank.)
5 Corporate Profile WinMagic s mission is to become the world leader in full-disk encryption through high standards and strong ethics. Our worldwide award-winning products fulfill the requirements of even the most security conscious users by focusing on concrete policy-driven security features, while simultaneously offering unparalleled flexibility and ease of use. WinMagic s sole purpose is to meet the marketplace demand for solutions that eliminate data at rest problems. WinMagic Inc. commenced its operations in It is now operating through direct and/or indirect channel support in over 43 countries. WinMagic has been supporting the AES algorithm since its adoption. It is able to provide seamless integration with single- or multi-factor authentication technology right at pre-boot. SecureDoc addresses data security needs of today s increasinglymobile workforce, by making it simple to protect all information on desktops, laptops, removable media, and PDA s. WinMagic Inc. provides the world s most secure full disk encryption software represented by the SecureDoc product suite including: SecureDoc, SecureDoc Enterprise Server, Compartmental SecureDoc, SecureDoc PDA, and SecureDoc Personal Edition. Its SecureDoc line of products ensures protection of sensitive information stored on desktops, laptops, and other mobile devices by employing authentication from password to hardware token, biometrics, and PKI commencing right at pre-boot time. WinMagic's world wide award winning products fulfill the requirements of even the most security conscious users by focusing on concrete policy driven security features, while still offering unparalleled flexibility that also incorporates the Unicode Standard. Utilizing Public Key Cryptographic Standard PKCS #11 (Cryptographic Token Interface Standard) from the ground up for extreme adaptability, the SecureDoc line has earned an impressive list of validations including NIST Cryptographic Module Validation, FIPS Level 2, FIPS Level 1 & 2, and is scheduled to achieve the Common Criteria Evaluation Assurance Level 4 (EAL-4) certification in early Consistently delivering originality and advancement over the last 10 years, WinMagic offers support for Trusted Platform Module - TPM v1.1 and v1.2, and biometric support for pre-boot authentication. WinMagic s competitive advantage resides not only in the robustness of our full-disk encryption solution, but equally in our ability to customize our products to fit into our customer base s IT infrastructure and comply with their respective corporate governance with regard to privacy and security. As an example, WinMagic took on the challenge of a two year old project at the National Security Agency (NSA) that was doomed to failure, and provided an appropriate solution within 6 months. After the FORTEZZA card project with the NSA, WinMagic has been offering smartcard and PKI integration at pre-boot since WinMagic is proud of to be a global leader in hard disk and removable media encryption technology. SecureDoc is certified, authenticated, implemented, and used by the most sensitive Government offices including the NSA, IRS, SSA, US State Department, NIST, Homeland Security, DoD. Our SecureDoc Disk Encryption software uses state-of-the-art AES 256-bit encryption to fully encrypt every aspect of the hard disk, and removable media, including the boot record, operating system, user data, software applications, paging/swap files, temporary files, offline folders of an application, the recycle bin, deleted but not erased files, and disk sectors that are not fully written (slack space). It is designed to be an "install-and-forget" solution which, once installed, is fully transparent to the user. As a thought leader and innovator, we are proud of our leading edge record of accomplishments and capabilities: Page 5 of 16
6 1) The only disk encryption certified by the National Security Agency (NSA) for SECRET data for US government agencies (for the FORTEZZA based SecureDoc), see 2) The only disk encryption software to have FIPS level 1&2, see with the crypto module validation AES (256-bit) encryption algorithm with certificate number 1 by NIST 3) The only disk encryption to support DoD Common Access Card Smartcard, and even pass the PKI enable interoperability test at Defense Information Systems Agency's (DISA) Joint Interoperability Test Command (JITC), see 4) The first and only disk encryption to be used for HSPD 12, FIPS 201 (at State Department). 5) The first organization to provide support for: Hibernation Imaging software such as Ghost Windows 2000, Windows VISTA SQL database for centralized management through the introduction of WinMagic s SecureDoc Enterprise Server causing others to stop advertising master password as a feature due to its vulnerability. SecureDoc simply represents the most robust full-disk encryption solution available today in that it is the fastest to encrypt the hard drive while taking into consideration intentional or unintentional power interruptions, bad sectors, and a potential need for the Windows OS to conduct pre-fetch (defrag). Page 6 of 16
7 SecureDoc SecureDoc: A commercially available full-disk encryption software application designed specifically to run transparently with Windows Vista/2000/XP/2003. While thoroughly encrypting all residual data, temporary files, paging files, and hidden partitions, SecureDoc utilizes the AES 256-bit encryption algorithm to encrypt the entire hard-drive where every byte is encrypted. It is superior to other encryption products and technologies in its robustness and reliability. It offers many exciting new features including the ability to run disk utility applications like ghost on drives that may or may not have bad sectors. SecureDoc WinMagic's SecureDoc encryption software addresses the needs of organizations increasing mobile workforce by ensuring protection of sensitive information stored on desktops and laptops by employing authentication from password to hardware token, biometrics, and PKI commencing right at pre-boot time. SecureDoc presents a user-friendly solution, providing solid security for PCs and laptops alike by utilizing Public Key Cryptographic Standards PKCS-11. SecureDoc has achieved validations for Common Criteria, FIPS Level 2, and FIPS Level 1 & 2. SecureDoc Enterprise Server The SecureDoc Enterprise Server lets administrators install, encrypt, and configure user machines centrally. It enables secure, yet flexible creation, distribution of key and key files as well as assignment of access privileges to users. The administrators can customize password rules for the entire network, as well as recover lost passwords through a secure one-time challenge and response online engine. Most importantly: the unique design of the SecureDoc Enterprise Server's Key file management eliminates all the vulnerabilities associated with the "Master Password" concept so commonly used by other encryption software. Compartmental SecureDoc Compartmental SecureDoc offers an affordable software-based solution to create compartments on a computer, which are also enforced by encryption. Based on WinMagic's SecureDoc Disk encryption software, Compartmental SecureDoc offers all the features of SecureDoc and in addition, offers a viable solution for laptop computers. With Compartmental SecureDoc, a laptop computer can be a Compartmental Computer, functioning as a Multi-Level Security System. It offers AES 256-bit encryption for USB/FireWire External Drives, pocket drives, flash cards, PCMCIA Drives, Zip, Jazz, etc. - thus providing a full range of protection for virtually all forms of storage devices. SecureDoc PDA SecureDoc PDA addresses the needs of an organization's increasingly mobile workforce, with more and more data to protect than ever. SecureDoc PDA utilizes the versatility and security of WinMagic's award-winning SecureDoc functionality, offering strong encryption through the 256-bit AES encryption algorithm. The encryption process takes place transparently in the background, invisible to PDA users. SecureDoc: All Inclusive Protection SecureDoc addresses the needs of organizations increasingly mobile workforce, with more and more data to protect than ever. Comprehensive and flexible, SecureDoc has earned validations such as Common Criteria, FIPS level 2; its FORTEZZA-based version is the only disk encryption software certified by the NSA to protect SECRET data for US government agencies. Page 7 of 16
8 (This page left intentionally blank.) Page 8 of 16
9 SecureDoc Features Design and Architecture Utilizing Public Key Cryptographic Standards PKCS-11 from the ground up, WinMagic designs its Disk Encryption product with security and flexibility unparalleled in the industry. Pre-Boot Authentication SecureDoc integrates with popular third-party tokens and Public Key Infrastructure (PKI) commencing at pre-boot time. SecureDoc provides the upgrade path from a password-only solution to enterprise-wide token-based PKI integration. Flexible Key Labeling Versatile key labeling is provided so the users can share encrypted files, disks, and removable media. No Master Password Vulnerability Unique centralized key management without using the comprising master Password concept. Transparent Operation and Thorough Encryption After installing SecureDoc, the encryption process is transparent. This means the computer user does not need to worry about the encryption process because it takes place automatically in the background. Supports PKI (Public Key Infrastructure) Starting at Pre-boot Time SecureDoc works seamlessly with virtually all PKI suppliers e.g. CyberTrust, CA, Digital Signature Trust, Entrust, Identrus, Microsoft, RSA Verisign, and other PKI vendors. Users need only one token to work with all applications. Integrates with USB Tokens and Smart cards SecureDoc offers dual and triple factor authentication for ultimate security and protection (password, tokens, and biometrics). It works with ActivCard, Aladdin, Datakey, Eutron, Kobil, Rainbow, and other industry leading suppliers of tokens. Increased Compatibility SecureDoc is compatible with Windows 2000/XP and 2003 operating systems. Integrates and works seamlessly with most antivirus software, boot manager utilities such as BootMagic and System Commander. Disk imaging software such as PowerQuest DriveImage can image an encrypted disk. Encrypts Removable Drives Easily encrypts floppy, Zip, Jazz drives, USB, PCMCIA, memory sticks, Firewall drives as well as flash drives such as IBM MicroDrive PC-card. Protected Multi-Users for Shared Computers An unlimited number of users can be issued individual keys to access a single computer. Users can easily choose the method of securing their computer utilizing a password-only and/or token integration. Fully Customizable Text and Color Screen at Boot Login Users can choose the language, text, and color (foreground/background) of their preference. Single Sign On Users can be configured to sign into Windows operating system with only one password. Page 9 of 16
10 Password Rules Users can set up personal passwords with appropriate expiry dates conform to in-house security policies and practices. Secure Screen Saver SecureDoc screen saver protects against CD-ROM attacks. In the event the user prefers to leave his/her computer running but unattended the token is simply removed thereby locking it down. To activate the computer, the token is reinserted and access is restored. Disk Lock Disk Lock precludes unauthorized copying of data to floppy disks. Enterprise Version For enterprise wide deployment of SecureDoc, - Central Administration allows silent installation, installs and set up user s PC s through the network without any administration on the client PCs. - Central Database lets the administrator manage users and keys. The central administrator has access to all PCs, guaranteed to be able to recover data in case the employee leaves the company. - Remote one-time password key recovery allows user to log on to use the PC if the user forgets the password. Help desk can issue an one-time key unlock password on a challenge-response way so an attacker would not be able to access the PC even if the attacker intercepts all transmitted data. Algorithms Used For encryption, the Advanced Encryption Standard (AES) 256-bit, encryption algorithm is used. The hashing algorithm used is SHA-2. Page 10 of 16
11 23 Unique Features of SecureDoc The following list describes 23 features that distinguish WinMagic s SecureDoc from its competition. Centralized Management with Standard DBMS Enterprise class DBMS Communication with Client PCs Unlimited Profiles Centralized Administration SecureDoc Enterprise Server (SES) uses Microsoft SQL Server as its data repository. This ensures our enterprise customers have a scalable DBMS that supports distributed computing, backup functionality, replication and clustering. SES communicates with client-pc's via LAN, over the Internet, intermittent network or even if users do not have network access at all. SecureDoc Enterprise Server (SES) provides centralized administration for client's machines It provides several schemes of centralized deployment, import of user's data from an LDAP directory or Active Directory Service or PKI, remote control of client through encrypted communication, on-line password recovery via Web and more. Strong Biometric Support Support for biometrics devices all at pre-boot. WinMagic s SecureDoc is the only product to support biometrics at pre-boot. It has been used by the U.S. Department of State in HSPD-12, FIPS 201 compliant projects. Strong Access Control with Multifactor Authentication via passwords and Hardware Tokens Trusted Platform Module(TPM) Support Interoperability with imaging software Virus Recovery Compatible with various boot managers Pre-boot support for smartcards, USB crypto tokens and PKI. As hardware tokens are gaining popularity, authentication and SSO become more important. WinMagic has delivered smartcard and PKI integration with SecureDoc since 2001 (e.g. to the New Zealand govt.). SecureDoc supports TPM security chip at boot time. The TPM chip is embedded in newer laptops. SecureDoc interoperates with Ghost, Drive Image, Rapid Deploy, BootWorks, Rapid Restore and Rescue & Recovery. This significantly enhances the deployment capabilities within large organizations. User is able to recover data even if the disk is infected by viruses. The recovery software works as if the disk is not encrypted. SecureDoc is compatible with various boot managers. These include Boot Magic, Boot-US and Windows boot manager. SecureDoc supports systems that have multiple operating systems (multi-boot). Compatible with Partitioning Software Managers. Compatible with VMWARE Supports Hibernation Mode Please note that SecureDoc supports unlimited number of partitions. SecureDoc operates with partitioning software such as Partition Magic. Encrypted disk partitions can be resized; partitions can be added or deleted as if the disk is not encrypted. SecureDoc works with VMWare "out of the box". SecureDoc protects data in hibernation mode. Page 11 of 16
12 Supports removable media SecureDoc supports removable media (USB memory sticks, SD cards, ZIP, JAZ, etc.): Administrators can configure SecureDoc in order to: Disable all removable media access Allow read-only access if the removable media is not encrypted Allow access only if the removable media is encrypted (with pre-defined keys etc.). Power Out Protection Robust capabilities that allow the initial encryption (conversion) to be interrupted by a power outage without data loss. Large Disk Support Support disks of larger than 2,000 Giga bytes and unlimited number of partitions. Furthermore, different partitions can be encrypted with different keys, e.g. for sharing. Magneto Drive Support Support for encryption of Magneto Optical drives. Even though the removable Magneto Optical drives are most popular in Asia, the technology to support drives with sector sizes different than 512 bytes show the thoroughness and the modularity of the SecureDoc software design. Support for RAID controllers SecureDoc can be used in a server environment with RAID controllers. Full Disk Encryption Encryption of the entire disk, not only partitions. A test at Network Computing showed that users can add partitions and SecureDoc automatically encrypts them. Compartmental Encryption Version Divides the disk into compartments, encrypted by different cryptographic keys. The separation is so strong that a virus in one compartment will not affect the other compartments. Robust encryption User can run any defragmentation tool during the initial encryption conversion. Support of SHA-2 WinMagic has used the more advanced SHA-2 with SecureDoc V4 since early 2005 FIPS Level 2 (Certificate # 698) WinMagic is the only Software Encryption vendor on the planet to offer this level of protection regarding disk encryption. Unicode Standard Support The Unicode Standard is an industry wide standard designed to allow text and symbols from all of the writing systems of the world to be consistently represented by computers. WinMagic s comprehensive support for Unicode, a global language standard, will allow customers to centrally maintain and manage implementations of SecureDoc in virtually every modern language in a single database. Supports Microsoft Windows Vista Immediately available to early adopters, SecureDoc is uniquely positioned to compliment Windows Vista Home Basic, Windows Vista Home Premium, Windows Vista Business, and Windows Vista Ultimate. The same purity of design that prevents hackers from bypassing the encryption level while simplifying integration with single or multi-factor authentication through tokens, biometrics, and PKI technology has allowed WinMagic to deliver full Vista support to customers in just one week. It is this competitive advantage that will allow WinMagic to fully support Windows Vista today, and as Windows Vista evolves. Supports Removable Media encrypting full CD / DVD SecureDoc encrypts CD/DVD automatically when data is written to it. Downloadable versions of DiskViewer and ContainerViewer allows non-securedoc users and non- SecureDoc encrypted endpoint devices to read encrypted external hard rives, UBS thumb drives, and CD s / DVD s. Page 12 of 16
13 Common Questions in considering Full Disk Encryption Prerequisite Criteria Robustness Q. Can your encryption software recover during the hard drive encryption process (converting) if it were to be interrupted by either intentional or unintentional power failures? A. At WinMagic, we believe that an full disk encryption product should be able to recover from any type of interruption. Our SecureDoc product was tested using a typical laptop (IBM T43 with 1.86ghz processor and 1.50gb of RAM) and passed our interruption test, including power interruption. During initial encryption, the laptop was put in Standby mode, Shutdown mode, Sleep mode, Turned off, and the battery and power supply where disconnected. The test resulted in no lost of data or system crashes. Once the computer system came back up, the SecureDoc encryption process continued right where it left off. Q. Given that hard drives will be encrypted during every day use, could you please describe the conditions under which you stress tested your full disk encryption software? A. SecureDoc has been stressed tested with a variety of computers including laptops/desktops containing common hard drives sold into the corporate and commercial market segment today. The conditions that were used are similar to the conditions that exist for the average user such as creating MS Word documents, accessing large graphic files, Internet access, accessing/writing s, copying files, compressing/decompressing files using various compression tools available today. SecureDoc has passed our stressed testing with negligible derogation to the speed of the device. Q. If the hard drive contains bad sectors, how does your full disk encryption software handle them? A. If SecureDoc detects that there are bad sectors on the hard drive, we will skip over them and continue with the encryption. Some of our competitors require that you use a 3 rd party tools in order to mark the bad sectors before their encryption solution can begin, or they simply fail the encryption process. Q. Does the hard drive need to be defragmented before I distribute and execute your full disk encryption software? A. SecureDoc encrypts the hard drive on a sector by sector level. Due to our encryption process, we do not require that the drive be defragmented before the encryption process begins. Some of our competitors require that in order to gain optimal performance during encryption with their product, you need to defragment the hard drive. This process can be quite cumbersome to mandate to a fleet of notebooks, desktops, and other mobile devices across a LAN or WAN when they may or may not be connected, adding time and complexity to the security solution that our customer are looking to implement in encrypting their machines. Page 13 of 16
14 Speed Q. What are the average size hard drives that we are seeing today on desk-tops and notebooks? Could you indicate the average speed to reliably and fully encrypt these hard drives? A. Given our deployment of over 1.5 million licenses over 9 years, we have seen that the average hard drive size for desk tops and notebooks are now approaching anywhere between 60GB - 320GB depending on laptop or desktop. This includes both internal and external hard drives. SecureDoc can encrypt a hard drive at a minimal rate of 20GB/hour depending on processor. With Dual Core processors becoming the standard in most laptops and desktops, our encryption time can be anticipated to be faster, for example 50 GB per hour. Some of our competitors have been benchmarked to take over twice the amount of time to encrypt a hard drive. Page 14 of 16
15 (This page left intentionally blank.) Page 15 of 16
16 200 Matheson Blvd. West, Suite 201 Mississauga, ON, Canada L5R 3L7 Tel: (905) Fax: (905) Web: WinMagic Inc. is headquartered in Mississauga, ON (Toronto) Canada and is now operating through direct and indirect channel support in over 43 countries. For more information concerning its products or services, please visit or call , or Copyright 2007 WinMagic Inc. All rights reserved. This document is for informational purpose only. WinMagic Inc. makes NO WARRANTIES, expressed or implied, in this document. All specification stated herein are subject to change without notice. All other brand or product names are trademarks or registered trademarks of their respective owners. Page 16 of 16
WinMagic Data Security. Enterprise Full Disk Encryption Solutions
Knowing You re Protected WinMagic Data Security Enterprise Full Disk Encryption Solutions WinMagic Inc. November 2006 Copyright 2006 WinMagic Inc. All rights reserved. This document is for informational
Comprehensive Endpoint Security
Comprehensive Endpoint Security Protecting Data-at-Rest Compliance with data and security regulations Joseph Belsanti Director, Marketing WinMagic Inc. Agenda Key Messages Company Snapshot Evaluation Criteria
Innovative Secure Boot System (SBS) with a smartcard.
Managed Security Services Desktop Security Services Secure Notebook Desktop Security Services. Secure Notebook. Today s business environment demands mobility, and the notebook computer has become an indispensable
Encryption Solution for Data-at-Rest
Encryption Solution May 3, 2007 WinMagic Inc. 200 Matheson Blvd. West, Suite 201 Mississauga, ON, Canada L5R 3L7 Tel: (905) 502-7000 Fax: (905) 502-7001 Web: www.winmagic.com E-mail: [email protected]
SecureDoc for Mac v6.1. User Manual
SecureDoc for Mac v6.1 User Manual Copyright 1997-2012 by WinMagic Inc. All rights reserved. Printed in Canada Many products, software and technologies are subject to export control for both Canada and
A+ Guide to Software: Managing, Maintaining, and Troubleshooting, 5e. Chapter 3 Installing Windows
: Managing, Maintaining, and Troubleshooting, 5e Chapter 3 Installing Windows Objectives How to plan a Windows installation How to install Windows Vista How to install Windows XP How to install Windows
DriveLock and Windows 7
Why alone is not enough CenterTools Software GmbH 2011 Copyright Information in this document, including URL and other Internet Web site references, is subject to change without notice. Unless otherwise
Enova X-Wall LX Frequently Asked Questions
Enova X-Wall LX Frequently Asked Questions Q: What is X-Wall LX? A: X-Wall LX is the third generation of Enova real-time hard drive cryptographic gateway ASIC (Application Specific Integrated Circuit)
Disk Encryption. Aaron Howard IT Security Office
Disk Encryption Aaron Howard IT Security Office Types of Disk Encryption? Folder Encryption Volume or Full Disk Encryption OS / Boot Volume Data Volume Managed or Unmanaged Key Backup and Data Assurance
CRYPTAS it-security GmbH
Winmagic SecureDoc Enterprise Server 4.3.1 Common functionality CRYPTAS it-security GmbH Modecenterstrasse 22/B2 A-1030 Wien www.cryptas.com Knowlegde Guide Vienna, December 2007 Winmagic SecureDoc Enterprise
www.rohos.com Two-factor authentication Free portable encryption for USB drive Hardware disk encryption Face recognition logon
Two-factor authentication Free portable encryption for USB drive Hardware disk encryption Face recognition logon Secure Windows and Mac login by USB key www.rohos.com Rohos Logon Key Secure two-factor
DriveLock and Windows 8
Why alone is not enough CenterTools Software GmbH 2013 Copyright Information in this document, including URL and other Internet Web site references, is subject to change without notice. Unless otherwise
ACER ProShield. Table of Contents
ACER ProShield Table of Contents Revision History... 3 Legal Notices... 4 Executive Summary... 5 Introduction... 5 Protection against unauthorized access... 6 Why ACER ProShield... 7 ACER ProShield...
Understanding Northwestern University s contract with Symantec. Symantec Solutions for Cost Reduction & Optimization
Understanding Northwestern University s contract with Symantec Symantec Solutions for Cost Reduction & Optimization Chris Hagelin and Shane Scholes Symantec Account Manager and Symantec Sales Engineer
Do "standard tools" meet your needs when it comes to providing security for mobile PCs and data media?
Product Insight Do "standard tools" meet your needs when it comes to providing security for mobile PCs and data media? Author Version Document Information Utimaco Product Management Device Security 4.30.00
SecureAge SecureDs Data Breach Prevention Solution
SecureAge SecureDs Data Breach Prevention Solution In recent years, major cases of data loss and data leaks are reported almost every week. These include high profile cases like US government losing personal
Firmware security features in HP Compaq business notebooks
HP ProtectTools Firmware security features in HP Compaq business notebooks Embedded security overview... 2 Basics of protection... 2 Protecting against unauthorized access user authentication... 3 Pre-boot
1. System Requirements
BounceBack Data Transfer 14.2 User Guide This guide presents you with information on how to use BounceBack Data Transfer 14.2. Contents 1. System Requirements 2. Attaching Your New Hard Drive To The Data
Securing Corporate Data and Making Life Easier for the IT Admin Benefits of Pre Boot Network Authentication Technology
20140115 Securing Corporate Data and Making Life Easier for the IT Admin Benefits of Pre Boot Network Authentication Technology TABLE OF CONTENTS What s at risk for your organization? 2 Is your business
Secure Data Exchange Solution
Secure Data Exchange Solution I. CONTENTS I. CONTENTS... 1 II. INTRODUCTION... 2 OVERVIEW... 2 COPYRIGHTS AND TRADEMARKS... 2 III. SECURE DOCUMENT EXCHANGE SOLUTIONS... 3 INTRODUCTION... 3 Certificates
proudly presents WinMagic s SecureDoc
Sumpfstrasse 32 6300 Zug Switzerland www.insinova.ch proudly presents WinMagic s SecureDoc Jens Albrecht, Dipl. El.-Ing. FH CEO Last modified 29. September 2010 Agenda insinova + WinMagic, References SecureDoc
Technical Note. Installing Micron SEDs in Windows 8 and 10. Introduction. TN-FD-28: Installing Micron SEDs in Windows 8 and 10.
Technical Note Installing Micron SEDs in Windows 8 and 10 TN-FD-28: Installing Micron SEDs in Windows 8 and 10 Introduction Introduction Self-encrypting drives (SEDs) can provide an effective way of protecting
How Drive Encryption Works
WHITE PAPER: HOW DRIVE ENCRYPTION WORKS........................................ How Drive Encryption Works Who should read this paper Security and IT administrators Content Introduction to Drive Encryption.........................................................................................
How Endpoint Encryption Works
WHITE PAPER: HOW ENDPOINT ENCRYPTION WORKS........................................ How Endpoint Encryption Works Who should read this paper Security and IT administrators Content Introduction to Endpoint
Navigating Endpoint Encryption Technologies
Navigating Endpoint Encryption Technologies Whitepaper November 2010 THIS WHITE PAPER IS FOR INFORMATIONAL PURPOSES ONLY, AND MAY CONTAIN TYPOGRAPHICAL ERRORS AND TECHNICAL INACCURACIES. THE CONTENT IS
Total Backup Recovery 7
7 TM 7 Enhance business functionality and productivity with guaranteed protection from 7 Server 7 Server is a total backup and recovery solution for Windows. With support for all operating systems, 7 Server
How to Encrypt your Windows 7 SDS Machine with Bitlocker
How to Encrypt your Windows 7 SDS Machine with Bitlocker ************************************ IMPORTANT ******************************************* Before encrypting your SDS Windows 7 Machine it is highly
Total Backup Recovery 7
7 TM 7 Automat backup and restore management for all networked laptops & workstations from a centralized administrating console 7 Advanced Workstation assures that critical business information is well
Security Overview for Windows Vista. Bob McCoy, MCSE, CISSP/ISSAP Technical Account Manager Microsoft Corporation
Security Overview for Windows Vista Bob McCoy, MCSE, CISSP/ISSAP Technical Account Manager Microsoft Corporation Agenda User and group changes Encryption changes Audit changes User rights New and modified
SecureDoc Disk Encryption Cryptographic Engine
SecureDoc Disk Encryption Cryptographic Engine FIPS 140-2 Non-Proprietary Security Policy Abstract: This document specifies Security Policy enforced by SecureDoc Cryptographic Engine compliant with the
Using BitLocker As Part Of A Customer Data Protection Program: Part 1
Using BitLocker As Part Of A Customer Data Protection Program: Part 1 Tech Tip by Philip Cox Source: searchsecuritychannel.com As an information security consultant, one of my jobs is to help my clients
Managed Portable Security Devices
Managed Portable Security Devices www.mxisecurity.com MXI Security leads the way in providing superior managed portable security solutions designed to meet the highest security and privacy standards of
Client side. DESlock + Data Encryption
Data Encryption DESlock + is a simple-to-use encryption application for companies large and small. Take advantage of the optimized setup that speeds up the time to adoption for admins. The client side
1 Introduction to Microsoft Enterprise Desktop Virtualization (MED-V)... 3 1.1 Terminology... 4 1.2 Key Capabilities... 4
MED-V v1 Contents 1 Introduction to Microsoft Enterprise Desktop Virtualization (MED-V)... 3 1.1 Terminology... 4 1.2 Key Capabilities... 4 2 High-level Architecture... 6 2.1 System Requirements for MED-V
White Paper: Whole Disk Encryption
How Whole Disk Encryption Works White Paper: Whole Disk Encryption How Whole Disk Encryption Works Contents Introduction to Whole Disk Encryption.....................................................................
User Manual. Copyright Rogev LTD
User Manual Copyright Rogev LTD Introduction Thank you for choosing FIXER1. This User's Guide is provided to you to familiar yourself with the program. You can find a complete list of all the program's
Assessing the Security of Hardware-Based vs. Software-Based Encryption on USB Flash Drives
Assessing the Security of Hardware-Based vs. Software-Based Encryption on USB Flash Drives Main Line / Date / Etc. June May 2008 2nd Line 80-11-01583 xx-xx-xxxx Revision 1.0 Tagline Here Table of Contents
Allstate Insurance Company s Local Data Protection (LDP) Project
Allstate Insurance Company s Local Data Protection (LDP) Project A Case Study Laptop Encryption Eric V. Leighninger Chief Security Architect Allstate Insurance Company PD1 Agenda Allstate and information
Odyssey Access Client FIPS Edition
Odyssey Access Client FIPS Edition Data Sheet Published Date July 2015 Product Overview The need today is greater than ever to ensure that systems are securely configured. Government agencies and secure
Yale Software Library
e/ Yale Software Library http://www.yale.edu/its/software/ For assistance contact the ITS Help Desk 432-9000 or [email protected] Installation PGP Desktop for Windows Operating Systems Preparing your computer:
2.6.1 Creating an Acronis account... 11 2.6.2 Subscription to Acronis Cloud... 11. 3 Creating bootable rescue media... 12
USER'S GUIDE Table of contents 1 Introduction...3 1.1 What is Acronis True Image 2015?... 3 1.2 New in this version... 3 1.3 System requirements... 4 1.4 Install, update or remove Acronis True Image 2015...
Secure USB Flash Drive. Biometric & Professional Drives
Secure USB Flash Drive Biometric & Professional Drives I. CONTENTS II. INTRODUCTION... 2 OVERVIEW... 2 COPYRIGHTS AND TRADEMARKS... 2 III. SECURE FLASH DRIVE... 3 DESCRIPTION... 3 IV. MODULES OF SECURE
Pointsec Enterprise Encryption and Access Control for Laptops and Workstations
Pointsec Enterprise Encryption and Access Control for Laptops and Workstations Overview of PC Security Since computer security has become increasingly important, almost all of the focus has been on securing
nwstor Storage Security Solution 1. Executive Summary 2. Need for Data Security 3. Solution: nwstor isav Storage Security Appliances 4.
CONTENTS 1. Executive Summary 2. Need for Data Security 3. Solution: nwstor isav Storage Security Appliances 4. Conclusion 1. EXECUTIVE SUMMARY The advantages of networked data storage technologies such
CipherShare Features and Benefits
CipherShare s and CipherShare s and Security End-to-end Encryption Need-to-Know: Challenge / Response Authentication Transitive Trust Consistent Security Password and Key Recovery Temporary Application
Check Point FDE integration with Digipass Key devices
INTEGRATION GUIDE Check Point FDE integration with Digipass Key devices 1 VASCO Data Security Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document
ZENworks 11 Support Pack 4 Full Disk Encryption Agent Reference. May 2016
ZENworks 11 Support Pack 4 Full Disk Encryption Agent Reference May 2016 Legal Notice For information about legal notices, trademarks, disclaimers, warranties, export and other use restrictions, U.S. Government
2007 Microsoft Office System Document Encryption
2007 Microsoft Office System Document Encryption June 2007 Table of Contents Introduction 1 Benefits of Document Encryption 2 Microsoft 2007 Office system Document Encryption Improvements 5 End-User Microsoft
Gain Complete Data Protection with SanDisk Self-Encrypting SSDs and Wave Systems
Gain Complete Data Protection with SanDisk Self-Encrypting SSDs and Wave Systems Built-in Security to Protect Sensitive Data without Sacrificing Performance What is an SED? A self-encrypting drive performs
Managing BitLocker Encryption
Managing BitLocker Encryption WWW.CREDANT.COM Introduction Organizations are facing a data security crisis. Despite decades of investment in security, breaches of sensitive information continue to dominate
etoken TMS (Token Management System) Frequently Asked Questions
etoken TMS (Token Management System) Frequently Asked Questions Make your strong authentication solution a reality with etoken TMS (Token Management System). etoken TMS provides you with full solution
Symantec Backup Exec.cloud
Automatic, continuous, and secure protection that backs up data to the cloud, or via a hybrid approach combining on-premise and cloud-based backup. Data Sheet: Symantec.cloud Only 21 percent of SMBs are
The Encryption Anywhere Data Protection Platform
The Encryption Anywhere Data Protection Platform A Technical White Paper 5 December 2005 475 Brannan Street, Suite 400, San Francisco CA 94107-5421 800-440-0419 415-683-2200 Fax 415-683-2349 For more information,
Card Management System Integration Made Easy: Tools for Enrollment and Management of Certificates. September 2006
Card Management System Integration Made Easy: Tools for Enrollment and Management of Certificates September 2006 Copyright 2006 Entrust. All rights reserved. www.entrust.com Entrust is a registered trademark
Total Backup Recovery 7
7 TM 7 Simplify and automate backup and recovery manageability while maintaining business continuity 7 Advanced Server is FarStone s next generation backup and recovery utility to protect your business
Activatiecode voor NovaBackup Professional voor 3 pc. Omschrijving NovaBACKUP Professional 14.1
Talen English Korte omschrijving Activatiecode voor NovaBackup Professional voor 3 pc. Omschrijving NovaBACKUP Professional 14.1 Windows Backup Software for Laptops, PCs, and Workstations Easy to install,
Introducing. Markus Erlacher Technical Solution Professional Microsoft Switzerland
Introducing Markus Erlacher Technical Solution Professional Microsoft Switzerland Overarching Release Principles Strong emphasis on hardware, driver and application compatibility Goal to support Windows
Protecting Data at Rest
Protecting Data at Rest What to Consider When Selecting a Solution for Hard Drive Encryption Authors: Daniel Nilsson & Jeff Sherwood April 18, 2011 Content Overview... 3 Approaches to data at rest protection...
HP ProtectTools User Guide
HP ProtectTools User Guide Copyright 2007 Hewlett-Packard Development Company, L.P. Microsoft and Windows are U.S. registered trademarks of Microsoft Corporation. Intel is a trademark or registered trademark
BACKUP SECURITY GUIDELINE
Section: Information Security Revised: December 2004 Guideline: Description: Backup Security Guidelines: are recommended processes, models, or actions to assist with implementing procedures with respect
Sophos SafeGuard Disk Encryption, Sophos SafeGuard Easy Demo guide
Sophos SafeGuard Disk Encryption, Sophos SafeGuard Easy Demo guide Product version: 5.60 Document date: April 2011 Contents 1 Introduction...3 2 Requirements...5 3 The demo configuration package...6 4
Encrypting the Private Files on Your Computer Presentation by Eric Moore, CUGG June 12, 2010
Encrypting the Private Files on Your Computer Presentation by Eric Moore, CUGG June 12, 2010 I. File Encryption Basics A. Encryption replaces data within a file with ciphertext which resembles random data
Securing Data on Portable Media. www.roxio.com
Securing Data on Portable Media www.roxio.com Contents 2 Contents 3 Introduction 4 1 The Importance of Data Security 5 2 Roxio Secure 5 Security Means Strong Encryption 6 Policy Control of Encryption 7
Installing and Upgrading to Windows 7
Installing and Upgrading to Windows 7 Before you can install Windows 7 or upgrade to it, you first need to decide which version of 7 you will use. Then, you should check the computer s hardware to make
Yiwo Tech Development Co., Ltd. EaseUS Todo Backup. Reliable Backup & Recovery Solution. EaseUS Todo Backup Solution Guide. All Rights Reserved Page 1
EaseUS Todo Backup Reliable Backup & Recovery Solution EaseUS Todo Backup Solution Guide. All Rights Reserved Page 1 Part 1 Overview EaseUS Todo Backup Solution Guide. All Rights Reserved Page 2 Introduction
OVERVIEW. IQmedia Networks Technical Brief
IQmedia Networks Technical Brief From enterprise-sized corporations, to simple home-based businesses, all companies have information that is important to their success and that needs to be protected. Data
Total Backup Recovery
Total Backup Recovery Ultimate Backup & Recovery Solution for Businesses & Organizations Total Backup Recovery 7 Series is a total backup and recovery solution for businesses and organizations. The series
HP ProtectTools Embedded Security Guide
HP ProtectTools Embedded Security Guide Document Part Number: 364876-001 May 2004 This guide provides instructions for using the software that allows you to configure settings for the HP ProtectTools Embedded
A Nemaris Company. Formal Privacy & Security Assessment For Surgimap version 2.2.6 and higher
A Nemaris Company Formal Privacy & Security Assessment For Surgimap version 2.2.6 and higher 306 East 15 th Street Suite 1R, New York, New York 10003 Application Name Surgimap Vendor Nemaris Inc. Version
Chapter 12: Windows XP, Vista, and 7
Chapter 12: Windows XP, Vista, and 7 Complete CompTIA A+ Guide to PCs, 6e To distinguish between the Windows XP, Vista, and 7 operating systems To install, configure, and troubleshoot Windows XP, Vista,
Online Transaction Processing in SQL Server 2008
Online Transaction Processing in SQL Server 2008 White Paper Published: August 2007 Updated: July 2008 Summary: Microsoft SQL Server 2008 provides a database platform that is optimized for today s applications,
CHOOSING THE RIGHT PORTABLE SECURITY DEVICE. A guideline to help your organization chose the Best Secure USB device
CHOOSING THE RIGHT PORTABLE SECURITY DEVICE A guideline to help your organization chose the Best Secure USB device Introduction USB devices are widely used and convenient because of their small size, huge
Certification Report
Certification Report EAL 4 Evaluation of SecureDoc Disk Encryption Version 4.3C Issued by: Communications Security Establishment Certification Body Canadian Common Criteria Evaluation and Certification
Introducing etoken. What is etoken?
Introducing etoken Nirit Bear September 2002 What is etoken? Small & portable reader-less Smartcard Standard USB connectivity Logical and physical protection Tamper evident (vs. tamper proof) Water resistant
System Security Policy Management: Advanced Audit Tasks
System Security Policy Management: Advanced Audit Tasks White Paper October 6, 2005 2005 Altiris Inc. All rights reserved. ABOUT ALTIRIS Altiris, Inc. is a pioneer of IT lifecycle management software that
Chapter 8 Types of Utility Programs and Operating Systems. Discovering Computers 2012. Your Interactive Guide to the Digital World
Chapter 8 Types of Utility Programs and Operating Systems Discovering Computers 2012 Your Interactive Guide to the Digital World Objectives Overview Define system software and identify the two types of
Introduction to BitLocker FVE
Introduction to BitLocker FVE (Understanding the Steps Required to enable BitLocker) Exploration of Windows 7 Advanced Forensic Topics Day 3 What is BitLocker? BitLocker Drive Encryption is a full disk
How To Use Attix5 Pro For A Fraction Of The Cost Of A Backup
Service Overview Business Cloud Backup Techgate s Business Cloud Backup service is a secure, fully automated set and forget solution, powered by Attix5, and is ideal for organisations with limited in-house
ProtectDrive. User Manual Revision: B00
ProtectDrive User Manual Revision: B00 THIS PAGE INTENTIONALLY LEFT BLANK ProtectDrive User Manual Preface Preface Copyright All intellectual property is copyright. All trademarks and product names used
Quick Start Guide for VMware and Windows 7
PROPALMS VDI Version 2.1 Quick Start Guide for VMware and Windows 7 Rev. 1.1 Published: JULY-2011 1999-2011 Propalms Ltd. All rights reserved. The information contained in this document represents the
Whitepaper Enhancing BitLocker Deployment and Management with SimplySecure. Addressing the Concerns of the IT Professional Rob Weber February 2015
Whitepaper Enhancing BitLocker Deployment and Management with SimplySecure Addressing the Concerns of the IT Professional Rob Weber February 2015 Page 2 Table of Contents What is BitLocker?... 3 What is
Optimized data protection through one console for physical and virtual systems, including VMware and Hyper-V virtual systems
Symantec Backup Exec 12.5 for Windows Small Business Server Premium and Standard Editions Comprehensive data protection and system recovery for Microsoft Windows Small Business Server Overview Symantec
The Benefits of an Industry Standard Platform for Enterprise Sign-On
white paper The Benefits of an Industry Standard Platform for Enterprise Sign-On The need for scalable solutions to the growing concerns about enterprise security and regulatory compliance can be addressed
SecureD Technical Overview
WHITEPAPER: SecureD Technical Overview WHITEPAPER: SecureD Technical Overview CONTENTS section page 1 The Challenge to Protect Data at Rest 3 2 Hardware Data Encryption Provides Maximum Security 3 3 SecureD
Oracle Enterprise Single Sign-on Technical Guide An Oracle White Paper June 2009
Oracle Enterprise Single Sign-on Technical Guide An Oracle White Paper June 2009 EXECUTIVE OVERVIEW Enterprises these days generally have Microsoft Windows desktop users accessing diverse enterprise applications
Kaseya IT Automation Framework
Kaseya Kaseya IT Automation Framework An Integrated solution designed for reducing complexity while increasing productivity for IT Professionals and Managed Service Providers. The powerful, web-based automation
EMC DATA DOMAIN ENCRYPTION A Detailed Review
White Paper EMC DATA DOMAIN ENCRYPTION A Detailed Review Abstract The proliferation of publicized data loss, coupled with new governance and compliance regulations, is driving the need for customers to
S E A h a w k C r y p t o M i l l CryptoMill Technologies Ltd. www.cryptomill.com
SEAhawk CryptoMill CryptoMill Technologies Ltd. www.cryptomill.com OVERVIEW S EAhawk is an endpoint and removable storage security solution for desktop PCs and laptops running the Microsoft Windows operating
