Endpoint & Media Encryption
|
|
|
- Edwina Jacobs
- 10 years ago
- Views:
Transcription
1 Endpoint & Media Encryption Bill Kyrouz, Senior Applications Manager Bingham McCutchen LLP ILTA Boston City Rep (CR) Tim Golden, Principal Architect Enterprise Architecture & IT Governance McGuireWoods LLP
2
3 201CMR17 (Massachusetts Data Security Regulations) Personal information, a Massachusetts resident's first name and last name or first initial and last name in combination with any one or more of the following data elements that relate to such resident: (a) Social Security number; (b) driver's license number or state-issued identification card number; or (c) financial account number, or credit or debit card number, with or without any required security code, access code, personal identification number or password, that would permit access to a resident s financial account; provided, however, that Personal information shall not include information that is lawfully obtained from publicly available information, or from federal, state or local government records lawfully made available to the general public. [201 CMR 17.02]
4 201CMR17 (Massachusetts Data Security Regulations) (a) Social Security number; (b) driver's license number or stateissued identification card number; or (c) financial account number, or credit or debit card number These need to be protected while: Stored on laptops or portable media Transmitted over public networks such as the Internet Transmitted wirelessly
5 but as a law firm, we answer to higher authorities: Attorney-Client Privilege Securing our client s Intellectual Property & Competitive Intelligence We have a great deal of data that is treated as sensitive and in need of encryption in a variety of media...
6 The only safe assumption that a company can make to avoid the consequences of a data breach and disclosure is to assume that a mobile device contains sensitive data. It is impractical to attempt to classify either the devices or the information on them, encrypting some devices but not others. Gartner, 2009 Oops. Oklahoma Department of Human Services (DHS), 2009
7 Laptop & Portable Media Help Forming Your Shortlist General Services Administration Data at Rest Encryption Awardees ( Office of Management and Budget, US Department of Defense and GSA teamed up to identify products government agencies could use to protect sensitive, unclassified data residing on government laptops, other mobile computing devices and removable storage media devices [Warning this is getting dated!] SANS What Works program ( 5.2 Mobile Data Protection and Storage Encryption
8 Selecting Encryption Solutions Full Disk Encryption VS File & Folder Encryption
9 Selecting Encryption Solutions System Performance End User Experience
10 Selecting Encryption Solutions Encryption Management Capabilities
11 Selecting Encryption Solutions Now Patching Now Patching Now Patching Password:?? Maintenance Windows
12 Laptop & Portable Media A sample playing field Checkpoint (PointSec) Credant Mobile Guardian McAfee SafeBoot Mobile Armor Data Armor SPYRUS Talisman Symantec Endpoint Encryption Utimaco PGP (now Symantec) GuardianEdge (now Symantec) Microsoft Bitlocker Secure Computing Fiberlink Info Security Corp Secret Agent SafeNet ProtectDrive WinMagic SecurDoc SecurStar DriveCrypt 7-zip FreeOTFE TrueCrypt Encryption Solutions SkyLOCK Dekart Private Disk Beachhead Solutions BOLD items are in Gartner s leaders quadrant for endpoint data protection
13 ILTA Survey Results TrueCrypt Symantec PGP Other Credant Bitlocker N/A 0% 5% 10% 15% 20% 25%
14 Laptop & Portable Media RFP/Issues to consider Encrypt all our user s data Robust encryption algorithm(s) User friendly (read: seamless) Easy Deployment Removable drive encryption Minimal (or no noticeable) performance hit No interference with shared computers No conflicts with our existing environment Ease of management (PW resets, etc.) & integration with Active Directory No interference with our desktop deployment or desktop/laptop maintenance procedures (Dell OMCI, WoL, etc.)
15 Laptop & Portable Media Bill & Tim s Shortlist Checkpoint PointSec Credant Mobile Guardian Trend Micro Mobile Armor Data Armor Symantec Endpoint Encryption (formerly Guardian Edge) Sophos Utimaco SafeGuard TrueCrypt BOLD items are in Gartner s leaders quadrant for endpoint data protection
16 Your endpoint encryption charter has made it through the finance committee! We adjusted your budget to $0.
17 Laptop & Portable Media Low or No Budget Options Some regulations take the size of the organization into consideration: [You must maintain physical and technical security safeguards] that are appropriate to (a) the size, scope and type of business of the person obligated to safeguard the personal information under such comprehensive information security program (201 CMR 17.03) Inexpensive viable options may include: MS BitLocker TrueCrypt But take note: Commercial software is available to access a Bitlocker encrypted file
18 How to deploy? Start with IT Use a Risk Based Approach Eventually Hit Everyone
19 Handheld Devices This is a non negotiable cost of doing business. Encryption may exempt you from security disclosure laws in the event of loss or theft of a device.
20 One Policy to Rule Them All Bingham s requirements: - Messages Policy Enforcement - Device Encryption Policy Enforcement - Lockout Policy Enforcement Password Complexity Policy Enforcement - Remote PWD Reset Policy Enforcement - Remote Wipe Policy Enforcement - Transport Encryption Policy Enforcement - Wipe on Bad PWD [10 strikes and you re out] System - Works with existing Bingham technologies (m)
21 Reach Bill on Twitter Reach Tim on Twitter
22
23 Secure File Transfer Internal server, appliance or virtual appliance SFTP Accellion SFT Biscom BDS AllardSoft Filetransfer Pros/Cons Windows vs Non-windows.. important features... subscription model versus not... hardware versus software versus virtual appliance...
24 Secure File Transfer Hosted Solutions (limit 2GB) sendthisfile.com free for files up to 2GB optional features include dedicated server, dedicated bandwidth No anti-virus What to look for: SSL protected interface (it s not a given!) anti-virus
25 Is this you?
26 Better (and free!) alternatives KeePass Password Safe (Demo)
EnCase Forensic Product Overview
GUIDANCE SOFTWARE EnCase Forensic EnCase Forensic Product Overview The Standard in Digital Investigations GUIDANCE SOFTWARE EnCase Forensic EnCase Forensic Version 7 The mission of Guidance Software has
USG Data at Rest Encryption/Protection
USG Data at Rest Encryption/Protection Briefing g for the Symantec y Government Symposium Preventing Data Loss Panel Session 31 July 2008 UNCLASSIFIED 8/5/2008 UNCLASSIFIED//FOR OFFICIAL USE ONLY - ACQUISITION
Windows Hard Disk Encryption
Windows Hard Disk Encryption Usage Analysis September 2010 Windows Hard Disk Encryption Usage Analysis Introduction This is the first OPSWAT usage report for hard disk encryption products. Because Microsoft
= AUDIO. The Importance of Mobile Device Management in HIT. An Important Reminder. Mission of OFMQ 12/9/2015
The Importance of Mobile Device Management in HIT Mario Cruz OFMQ Chief Information Officer An Important Reminder For audio, you must use your phone: Step 1: Call (866) 906 0123. Step 2: Enter code 2071585#.
Vs Encryption Suites
Vs Encryption Suites Introduction Data at Rest The phrase "Data at Rest" refers to any type of data, stored in the form of electronic documents (spreadsheets, text documents, etc.) and located on laptops,
How To Use Encase On A Computer Or A Hard Drive (For A Computer)
EnCase Version 7.10.01 Release Notes October 3, 2014 EnCase Version 7.10.01 Thank you for using Guidance Software products. The Release Notes for this version of EnCase contain important information regarding
Encryption as a Cloud Service provides the lowest TCO
Encryption as a Cloud Service provides the lowest TCO Alertsec offer Full Disk Encryption at half the total cost of ownership of on-premise solutions Contents Executive Summary... 3 The Costs of Encryption...
Protecting Personal Information: The Massachusetts Data Security Regulation (201 CMR 17.00)
Protecting Personal Information: The Massachusetts Data Security Regulation (201 CMR 17.00) May 15, 2009 LLP US Information Security Framework Historically industry-specific HIPAA Fair Credit Reporting
Just EnCase. Presented By Larry Russell CalCPA State Technology Committee May 18, 2012
Just EnCase Presented By Larry Russell CalCPA State Technology Committee May 18, 2012 What is e-discovery Electronically Stored Information (ESI) Discover or Monitor for Fraudulent Activity Tools used
Using End User Device Encryption to Protect Sensitive Information
Using End User Device Encryption to Protect Sensitive Information April 29, 2015 Mel Jackob, CISSP, GSEC, eplace Solutions, Inc. William Ewy, CIPP/US, eplace Solutions, Inc. William Ewy, BSEE, CIPP/US
Disk Encryption. Aaron Howard IT Security Office
Disk Encryption Aaron Howard IT Security Office Types of Disk Encryption? Folder Encryption Volume or Full Disk Encryption OS / Boot Volume Data Volume Managed or Unmanaged Key Backup and Data Assurance
Security Industry Market Share Analysis
Security Industry Market Share Analysis September 2011 Introduction The Research OPSWAT releases quarterly market share reports for several sectors of the security industry. This quarter s report includes
PGP Whole Disk Encryption Implementation
PGP Whole Disk Encryption Implementation Educause National Conference October 29, 2008 Gale Fritsche Tim Foley Lehigh University Library and Technology Services Lehigh Overview Founded in 1865. Private
THE EXECUTIVE GUIDE TO DATA LOSS PREVENTION. Technology Overview, Business Justification, and Resource Requirements
THE EXECUTIVE GUIDE TO DATA LOSS PREVENTION Technology Overview, Business Justification, and Resource Requirements Introduction to Data Loss Prevention Intelligent Protection for Digital Assets Although
GUIDANCE SOFTWARE EnCase Portable. EnCase Portable. A Data Collection and Triage Solution that Anyone can Use
GUIDANCE SOFTWARE EnCase Portable EnCase Portable A Data Collection and Triage Solution that Anyone can Use TM GUIDANCE SOFTWARE EnCase Portable EnCase Portable Who Can Use EnCase Portable Police Officers
Symantec Drive Encryption for Windows
Symantec Drive Encryption for Windows Technical Note 10.3 Released January 2014. Legal Notice Copyright (c) 2014 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo, the Checkmark Logo,
Allstate Insurance Company s Local Data Protection (LDP) Project
Allstate Insurance Company s Local Data Protection (LDP) Project A Case Study Laptop Encryption Eric V. Leighninger Chief Security Architect Allstate Insurance Company PD1 Agenda Allstate and information
SafeNet Data Encryption and Control. Securing data over its lifecycle, wherever it resides from the data center to endpoints and into the cloud
SafeNet Data Encryption and Control Securing data over its lifecycle, wherever it resides from the data center to endpoints and into the cloud Ensure Data Protection with Data Encryption and Control Across
SafeNet Data Encryption and Control. Securing data over its lifecycle, wherever it resides from the data center to endpoints and into the cloud
SafeNet Data Encryption and Control Securing data over its lifecycle, wherever it resides from the data center to endpoints and into the cloud Ensure Data Protection with Data Encryption and Control Across
Bullseye. Evaluation Copy. Enterprise Data Protection
Bullseye Enterprise Data Protection A Bullseye Report by Bloor Research Author : Nigel Stanley Publish date : April 2008 Having Enterprise Data Protection as an objective is a worthy goal for any organisation
Vendor Landscape: Endpoint Encryption
Vendor Landscape: Endpoint Encryption Encryption from beginning to end(point) Introduction The Endpoint Encryption market is evolving alongside the data it protects by expanding its mobile encryption capabilities.
Wellesley College Written Information Security Program
Wellesley College Written Information Security Program Introduction and Purpose Wellesley College developed this Written Information Security Program (the Program ) to protect Personal Information, as
Encryption Made Simple for Lawyers
Encryption Made Simple for Lawyers By David G. Ries, Esq. and John W. Simek Encryption is a topic that most attorneys don t want to touch with a 10-foot pole, but it is becoming a more and more important
Compatibility with Encryption Products
Technical Brief Compatibility with Encryption Products Overview The purpose of this document is to describe the integration between Persystent Suite 4.5 and disk encryption products such as McAfee Endpoint
PGP Whole Disk Encryption Training
PGP Whole Disk Encryption Training Agenda WDE Overview Licensing Universal Server & Client Basics Installation Password Recovery OS Maintenance Support Questions 2 Whole Disk Encryption Protects against:
Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006
Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006 April 2013 Hologic and the Hologic Logo are trademarks or registered trademarks of Hologic, Inc. Microsoft, Active Directory,
Encryption Buyers Guide
Encryption Buyers Guide Today your organization faces the dual challenges of keeping data safe without affecting user productivity. Encryption is one of the most effective ways to protect information from
Industrial Security for Process Automation
Industrial Security for Process Automation SPACe 2012 Siemens Process Automation Conference Why is Industrial Security so important? Industrial security is all about protecting automation systems and critical
2014 All Rights Reserved ecfirst. An ecfirst Case Study: Encryption
2014 All Rights Reserved ecfirst An ecfirst Case Study: Encryption TABLE OF CONTENTS EXECUTIVE SUMMARY... 4 MCAFEE TOTAL PROTECTION... 6 PRODUCT OVERVIEW... 6 STRENGTHS... 6 FEATURES... 6 REFERENCES...
Guidelines on use of encryption to protect person identifiable and sensitive information
Guidelines on use of encryption to protect person identifiable and sensitive information 1. Introduction David Nicholson, NHS Chief Executive, has directed that there should be no transfers of unencrypted
Written Information Security Plan (WISP) for. HR Knowledge, Inc. This document has been approved for general distribution.
Written Information Security Plan (WISP) for HR Knowledge, Inc. This document has been approved for general distribution. Last modified January 01, 2014 Written Information Security Policy (WISP) for HR
Information Security Policy
Information Security Policy Steve R. Hutchens, CISSP EDS, Global Leader, Homeland Security Agenda Security Architecture Threats and Vulnerabilities Design Considerations Information Security Policy Current
micros MICROS Systems, Inc. Enterprise Information Security Policy (MEIP) August, 2013 Revision 8.0 MICROS Systems, Inc. Version 8.
micros MICROS Systems, Inc. Enterprise Information Security Policy (MEIP) Revision 8.0 August, 2013 1 Table of Contents Overview /Standards: I. Information Security Policy/Standards Preface...5 I.1 Purpose....5
Bryan Hadzik Network Consulting Services, inc. Endpoint Security Data At Rest
Bryan Hadzik Network Consulting Services, inc. Endpoint Security Data At Rest Look back on 2010 Agenda Incident types Inside Job? Source of Risk Role of Encryption Some Conclusions 2010 A Year In Review
Global Endpoint Security Market 2015-2019
Brochure More information from http://www.researchandmarkets.com/reports/3097865/ Global Endpoint Security Market 2015-2019 Description: About Endpoint Security Endpoint security is a methodology that
Endpoint protection for physical and virtual desktops
datasheet Trend Micro officescan Endpoint protection for physical and virtual desktops In the bring-your-own-device (BYOD) environment, protecting your endpoints against ever-evolving threats has become
Required Software Product List
Symantec ($3.2 million, 35% weight) AdVantage AdvisorMail AntiVirus (Endpoint Protection) AntiVirus Enterprise Edition App Center Application HA Arellia Application Control Solution Arellia Endpoint Security
SafeGuard Easy upgrade guide. Product version: 7
SafeGuard Easy upgrade guide Product version: 7 Document date: December 2014 Contents 1 About this guide...3 2 Check the system requirements...4 3 Download installers...5 4 About upgrading...6 4.1 Upgrade
Data Storage for Research. Michael Pinch
Data Storage for Research Michael Pinch Intro Data storage is a world full of tradeoffs Read vs Write Speed Availability vs Security Cost vs Speed This presentation is to talk about the different types
McAfee Endpoint Encryption for Files and Folders. Best Practices. For EEFF product version 4.0.0
McAfee Endpoint Encryption for Files and Folders Best Practices For EEFF product version 4.0.0 McAfee, Inc. McAfee, Inc., 2821 Mission College Blvd., Santa Clara, CA 95054, USA Tel: (+1) 888.847.8766 Internet:
SafeGuard Enterprise upgrade guide. Product version: 6.1
SafeGuard Enterprise upgrade guide Product version: 6.1 Document date: February 2014 Contents 1 About this guide...3 2 Check the system requirements...4 3 Download installers...5 4 About upgrading...6
Quick Install Guide. Lumension Endpoint Management and Security Suite 7.1
Quick Install Guide Lumension Endpoint Management and Security Suite 7.1 Lumension Endpoint Management and Security Suite - 2 - Notices Version Information Lumension Endpoint Management and Security Suite
Building A Secure Microsoft Exchange Continuity Appliance
Building A Secure Microsoft Exchange Continuity Appliance Teneros, Inc. 215 Castro Street, 3rd Floor Mountain View, California 94041-1203 USA p 650.641.7400 f 650.641.7401 ON AVAILABLE ACCESSIBLE Building
SECURING YOUR SMALL BUSINESS. Principles of information security and risk management
SECURING YOUR SMALL BUSINESS Principles of information security and risk management The challenge Information is one of the most valuable assets of any organization public or private, large or small and
Administering Windows Server 2012
Administering Windows Server 2012 Course Summary Configuring and Troubleshooting Domain Name System Maintaining Active Directory Domain Services Managing User and Service Accounts Implementing a Group
2009 NASCIO Recognition Awards Nomination. A. Title: Sensitive Data Protection with Endpoint Encryption. Category: Information Security and Privacy
2009 NASCIO Recognition Awards Nomination A. Title: Sensitive Data Protection with Endpoint Encryption Category: Information Security and Privacy State: Ohio B. Executive Summary Protecting the confidentiality
How To Protect Your Data From Harm With Safenet
SafeNet Information Security Government Solutions Disk & File Encryption Database & Application Encryption Network & WAN Encryption Identity & Access Management Application & Transaction Security Information
Managing BitLocker With SafeGuard Enterprise
Managing BitLocker With SafeGuard Enterprise How Sophos provides one unified solution to manage device encryption, compliance and Microsoft BitLocker By Robert Zeh, Product Manager Full-disk encryption
SecureAge SecureDs Data Breach Prevention Solution
SecureAge SecureDs Data Breach Prevention Solution In recent years, major cases of data loss and data leaks are reported almost every week. These include high profile cases like US government losing personal
Sophos Deployment Packager user guide. Product version: 1.2
Sophos Deployment Packager user guide Product version: 1.2 Document date: September 2014 Contents 1 About this guide...3 2 About Deployment Packager...4 2.1 Deployment Packager known issues and limitations...4
Confidence in a Connected World. MEEC Symantec Product Availability. John Lally MD Education Account Executive 204-401-7342 John_Lally@symantec.
Confidence in a Connected World MEEC Symantec Product Availability John Lally MD Education Account Executive 204-401-7342 [email protected] 1 Agenda New threats means advanced security tactics SEP
Symantec Endpoint Encryption Deployment Best Practices and Roadmap
Symantec Endpoint Encryption Deployment Best Practices and Roadmap Jon Allen Baylor University Chief Information Security Officer & Assistant Vice President Rene Kolga Symantec Principle Product Manager
Malware and Other Malicious Threats
21 August Thailand Securing Your Endpoints from Malware and Other Malicious Threats Steven Scheurmann Sales Leader, Tivoli Endpoint Management Products, built on BigFix, IBM Software Group, Asia Pacific
Data Security Considerations for Research
Data Security Considerations for Research Institutional Review Board Annual Education May 8, 2012 1 PRIVACY vs. SECURITY What s the Difference?: PRIVACY Refers to WHAT is protected Health information about
SECURING ENTERPRISE NETWORK 3 LAYER APPROACH FOR BYOD
SECURING ENTERPRISE NETWORK 3 LAYER APPROACH FOR BYOD www.wipro.com Table of Contents Executive Summary 03 Introduction 03 Challanges 04 Solution 05 Three Layered Approach to secure BYOD 06 Conclusion
PGP Product Update Juha Ropponen
PGP Product Update Juha Ropponen Arrow ECS Finland Oy 1 Symantec Encryption tuoteperhe uudet nimet PGP Universal Server = Encryption Management Server Whole Disk Encryption = Drive Encryption Netshare
Sophos SafeGuard Native Device Encryption for Mac Administrator help. Product version: 7
Sophos SafeGuard Native Device Encryption for Mac Administrator help Product version: 7 Document date: December 2014 Contents 1 About SafeGuard Native Device Encryption for Mac...3 1.1 About this document...3
Small and Midsize Business Protection Guide
P r o t e c t i o n G u i d e : C l o s e t h e P r o t e c t i o n G a p Small and Midsize Business Protection Guide Close the protection gap and safeguard your business future Confidence in a connected
A Practical Guide to Understanding and Complying with Massachusetts Data Security Regulations. February 2010
A Practical Guide to Understanding and Complying with Massachusetts Data Security Regulations February 2010 Table of Contents Background... 1 Are You Required to Comply?... 1 What You Need to Do...2 Reference
Enterprise Security Critical Standards Summary
Enterprise Security Critical Standards Summary The following is a summary of key points in the Orange County Government Board of County Commissioners (OCGBCC) security standards. It is necessary for vendors
Belmont Savings Bank. Are there Hackers at the gate? 2013 Wolf & Company, P.C.
Belmont Savings Bank Are there Hackers at the gate? 2013 Wolf & Company, P.C. MEMBER OF PKF NORTH AMERICA, AN ASSOCIATION OF LEGALLY INDEPENDENT FIRMS 2013 Wolf & Company, P.C. About Wolf & Company, P.C.
Are You in Control? MaaS360 Control Service. Services > Overview MaaS360 Control Overview
Services > Overview MaaS360 Control Overview Control Over Endpoints Ensure that patches and security software on laptops and distributed PCs are always up to date. Restart applications automatically. Block
Endpoint protection for physical and virtual desktops
datasheet Trend Micro officescan Endpoint protection for physical and virtual desktops In the bring-your-own-device (BYOD) environment, protecting your endpoints against ever-evolving threats has become
Bitdefender GravityZone Sales Presentation
6 March 2014 Page 1 Bitdefender GravityZone Sales Presentation 1 Page 2 Bitdefender at a Glance The #1 Anti-Malware Security Technology in the world First security software vendor to receive top recommendations
The Encryption Anywhere Data Protection Platform
The Encryption Anywhere Data Protection Platform A Technical White Paper 5 December 2005 475 Brannan Street, Suite 400, San Francisco CA 94107-5421 800-440-0419 415-683-2200 Fax 415-683-2349 For more information,
Microsoft Software Update Services and Managed Symantec Anti-virus. Michael Satut TSS/Crown IT Support [email protected]
Microsoft Software Update Services and Managed Symantec Anti-virus Michael Satut TSS/Crown IT Support [email protected] Introduction The recent increase in virus and worm activity has created the
Apps. Devices. Users. Data. Deploying and managing applications across platforms is difficult.
Users Devices Apps Data Users expect to be able to work in any location and have access to all their work resources. The explosion of devices is eroding the standards-based approach to corporate IT. Deploying
Required Software Product List
Symantec ($3.2 million, 35% weight) AdVantage AdvisorMail AntiVirus (Endpoint Protection) AntiVirus Enterprise Edition App Center Application HA Asset Management Suite Backup Exec Certificate Intelligence
Virtualization: Benefits & Pitfalls. Matt Liebowitz, Kraft Kennedy Tim Garner, Aderant Mike Lombardi, Vertigrate Sergey Polak, Ropes & Gray LLP
Virtualization: Benefits & Pitfalls Matt Liebowitz, Kraft Kennedy Tim Garner, Aderant Mike Lombardi, Vertigrate Sergey Polak, Ropes & Gray LLP Who are we? Matt Liebowitz High level virtualization benefits/pitfalls
Global security intelligence. YoUR DAtA UnDeR siege: DeFenD it with encryption. #enterprisesec kaspersky.com/enterprise
Global security intelligence YoUR DAtA UnDeR siege: DeFenD it with encryption #enterprisesec kaspersky.com/enterprise Contents Your Data Under Siege: Defend it with Encryption 3 Steps Taken to Minimise
Managing BitLocker Encryption
Managing BitLocker Encryption WWW.CREDANT.COM Introduction Organizations are facing a data security crisis. Despite decades of investment in security, breaches of sensitive information continue to dominate
Keeping Data Safe. Patients, Research Subjects, and You
Keeping Data Safe Patients, Research Subjects, and You How do hackers access a system Hackers Lurking in Vents and Soda Machines By NICOLE PERLROTH APRIL 7, 2014 New York Times SAN FRANCISCO They came
