Global security intelligence. YoUR DAtA UnDeR siege: DeFenD it with encryption. #enterprisesec kaspersky.com/enterprise



Similar documents
YOUR DATA UNDER SIEGE. DEFEND IT WITH ENCRYPTION.

Kaspersky Lab s Full Disk Encryption Technology

BEST PRACTICE GUIDE TO ENCRYPTION.

BEST PRACTICES. Encryption.

Navigating Endpoint Encryption Technologies

Securing Corporate Data and Making Life Easier for the IT Admin Benefits of Pre Boot Network Authentication Technology

Encryption Buyers Guide

BEST PRACTICE GUIDE MOBILE DEVICE MANAGEMENT AND MOBILE SECURITY.

Full Drive Encryption Security Problem Definition - Encryption Engine

TOP FIVE RECOMMENDATIONS FOR ENCRYPTING LAPTOP DATA A BEST PRACTICES GUIDE

TOP 10 TIPS FOR EDUCATING EMPLOYEES ABOUT CYBERSECURITY

IT & DATA SECURITY BREACH PREVENTION A PRACTICAL GUIDE. Part I: Reducing Employee and Application Risks

How Endpoint Encryption Works

Protecting Your Business from Costly Data Theft: Why Hardware-Based Encryption Is the Answer

Service Overview CloudCare Online Backup

SafeNet Data Encryption and Control. Securing data over its lifecycle, wherever it resides from the data center to endpoints and into the cloud

SafeNet Data Encryption and Control. Securing data over its lifecycle, wherever it resides from the data center to endpoints and into the cloud

Five Truths. About Enterprise Data Protection THE BEST WAY TO SECURE YOUR DATA AND YOUR BUSINESS DEFENDING THE DATA CMYK

Deciphering the Safe Harbor on Breach Notification: The Data Encryption Story

Feature List for Kaspersky Security for Mobile

White Paper: Whole Disk Encryption

Information Security Policy September 2009 Newman University IT Services. Information Security Policy

Information Security Policies. Version 6.1

Deciphering the Code: A Simple Guide to Encryption

The Virtualization Practice

The True Story of Data-At-Rest Encryption & the Cloud

Websense Data Security Suite and Cyber-Ark Inter-Business Vault. The Power of Integration

The virtual safe: A user-focused approach to data encryption

A practical guide to IT security

SecureD Technical Overview

How Drive Encryption Works

Proven LANDesk Solutions

Network Security. Intertech Associates, Inc.

White paper. Why Encrypt? Securing without compromising communications

Making Endpoint Encryption Work in the Real World

Small businesses: What you need to know about cyber security

Removable Media Best Practices

Driving Company Security is Challenging. Centralized Management Makes it Simple.

How To Use Attix5 Pro For A Fraction Of The Cost Of A Backup

Working Together Managing and Securing Enterprise Mobility WHITE PAPER. Larry Klimczyk Digital Defence P:

Managing BitLocker With SafeGuard Enterprise

Technical Safeguards is the third area of safeguard defined by the HIPAA Security Rule. The technical safeguards are intended to create policies and

9 Steps to Data Security

Striking the Right Balance for

WHAT YOU NEED TO KNOW ABOUT CYBER SECURITY

The Encryption Anywhere Data Protection Platform

Best Practices in Data Protection Survey of U.S. IT & IT Security Practitioners

Only 8% of corporate laptop data is actually backed up to corporate servers. Pixius Advantage Outsourcing Managed Services

The 12 Essentials of PCI Compliance How it Differs from HIPPA Compliance Understand & Implement Effective PCI Data Security Standard Compliance

Whitepaper Enhancing BitLocker Deployment and Management with SimplySecure. Addressing the Concerns of the IT Professional Rob Weber February 2015

Disk Encryption. Aaron Howard IT Security Office

MAXIMUM PROTECTION, MINIMUM DOWNTIME

Comprehensive Endpoint Security

Small and Midsize Business Protection Guide

University of Liverpool

USB Portable Storage Device: Security Problem Definition Summary

Guidelines on use of encryption to protect person identifiable and sensitive information

Addressing the Data Protection Requirements of the HITECH Act

10 BENEFITS THAT ONLY AN INTEGRATED PLATFORM SECURITY SOLUTION CAN BRING

Extending Enterprise Security Beyond The Perimeter

CHOOSING THE RIGHT PORTABLE SECURITY DEVICE. A guideline to help your organization chose the Best Secure USB device

For Managing Central Deployment, Policy Management, Hot Revocation, Audit Facilities, and Safe Central Recovery.

Going Beyond Basic Full Disk Encryption: Are You Really Covered? A PGP Corporation White Paper

Samsung SED Security in Collaboration with Wave Systems

For your eyes only - Encryption and DLP Erkko Skantz

DriveLock and Windows 7

Protecting Data at Rest

More Expenses. Only this time the Telegraph will have to pay them after their recent data breech

Full Disk Encryption Drives & Management Software. The Ultimate Security Solution For Data At Rest

Securing Data Stored On Tape With Encryption: How To Choose the Right Encryption Key Management Solution

Client side. DESlock + Data Encryption

Safeguarding Data Using Encryption. Matthew Scholl & Andrew Regenscheid Computer Security Division, ITL, NIST

Protecting Data at Rest What to Consider When Selecting a Solution for Disk, Removable Media, and File Encryption

USB Portable Storage Device: Security Problem Definition Summary

CuTTIng ComplexITy simplifying security

Understanding Northwestern University s contract with Symantec. Symantec Solutions for Cost Reduction & Optimization

Emerging threats for the healthcare industry: The BYOD. By Luca Sambucci

YOUR DATA UNDER SIEGE. PROTECTION IN THE AGE OF BYODS. With Kaspersky, now you can. kaspersky.com/business Be Ready for What s Next

RSA Solution Brief RSA. Encryption and Key Management Suite. RSA Solution Brief

MCTS Guide to Microsoft Windows 7. Chapter 7 Windows 7 Security Features

Small businesses: What you need to know about cyber security

Using BitLocker As Part Of A Customer Data Protection Program: Part 1

How To Audit Health And Care Professions Council Security Arrangements

ProtectV. Securing Sensitive Data in Virtual and Cloud Environments. Executive Summary

Cybersecurity Tips for Startups and Small Businesses

Your Customers Want Secure Access

nwstor Storage Security Solution 1. Executive Summary 2. Need for Data Security 3. Solution: nwstor isav Storage Security Appliances 4.

CONTENTS. Windows To Go: Empower And Secure The Mobile Workforce

Best Practices for Protecting Laptop Data

Data Protection Simple. Compliant. Secure. CONTACT US Call: Visit:

Data Protection Act Guidance on the use of cloud computing

A Guide to Managing Microsoft BitLocker in the Enterprise

SecureAge SecureDs Data Breach Prevention Solution

Managed Encryption Service

INFORMATION TECHNOLOGY SECURITY STANDARDS

Kaspersky Security for Mobile

Mobile Data Security Essentials for Your Changing, Growing Workforce

ONLINE AND MOBILE BANKING, YOUR RISKS COVERED

Enterprise Backup and Recovery Solution.

Adopt a unified, holistic approach to a broad range of data security challenges with IBM Data Security Services.

Transcription:

Global security intelligence YoUR DAtA UnDeR siege: DeFenD it with encryption #enterprisesec kaspersky.com/enterprise

Contents Your Data Under Siege: Defend it with Encryption 3 Steps Taken to Minimise Risk 5 Full Disk Encryption (FDE) 6 File Level Encryption (FLE) 8 About Kaspersky Lab 11 2

Your Data Under Siege: Defend it with Encryption Keeping pace with the business demands of the enterprise can be a daunting task for IT Managers. Continually asked to do more with less, you re under pressure to implement new technologies to improve productivity and efficiency and cut costs all while facing a growing threat from cybercrime. As if that s not enough, your workforce has become mobile leaving the protective confines of the enterprise. A mobile workforce can make an IT department feel as if it s under siege. According to the Ponemon Institute, 62 per cent of enterprise employees are mobile and by 2015, that figure is expected to rise to 85 per cent. As the workforce becomes more mobile, so does proprietary enterprise information, increasing the risk of data loss or theft. The robust perimeter security you put in place to protect enterprise systems and networks is no longer effective; data is no longer safe as it moves around the globe. No wonder 80 per cent of enterprise IT professionals believe that laptops and other data-bearing mobile devices pose a significant threat to enterprise networks and systems. 1 According to a study conducted by Intel, 5 to 10 per cent of all laptops will be lost or stolen within their life span. Think about how much of your workforce is already mobile and consider this: an average of 63 per cent of them use mobile devices to access and use data in the enterprise. An average of 50 per cent use them to access regulated data. 63 per cent of mobile data-bearing devices that are lost or stolen contain sensitive or confidential information. A laptop is stolen every 53 seconds. 63 per cent of breaches occur as a result of the use of mobile devices, including theft and unauthorised use in the workplace. 2 The explosion in enterprise mobility means your proprietary corporate data is at substantial risk. If your response to device loss or theft is to consider the cost of replacing the hardware, you re focusing on the wrong problem. Ponemon research suggests that the average cost of a lost or stolen laptop is $49,246, with only two per cent accounting for hardware replacement costs. Eighty per cent of the cost goes to cleaning up the data leakage mess, regardless of the size of the business. Kaspersky research has found that the average cost to the enterprise of a single serious data breach is $649 000. 3 1 & 2. Ponemon Institute, 2013 State of the Endpoint, December 2012 3. Kaspersky Lab, Global Corporate IT Security Risks: 2013, May 2013 3

Encryption is among the most promising technologies for reducing the risk of critical data leakage, but it s at its most effective when incorporated into a comprehensive security system for corporate IT infrastructure Nikolay Grebennikov, CTO, Kaspersky Lab Factor in the ever-increasing range of government fines for data breaches, reputational damage and lost customer loyalty, and it s easy to see how the cost of losing a laptop spreads well beyond hardware replacement. In an increasingly mobile world, enterprise intellectual property, sensitive data, and networks and systems are no longer protected by perimeter security alone. If a device is lost or stolen, the data on that device is vulnerable to theft as well, making the device a primary target for criminals. How do you protect mobile data from theft, even if the device is stolen? The simple answer is: Encryption! Encryption is the process of encoding information in such a way that only authorised users can read it. In an encryption scheme, information (plaintext) is encrypted using an encryption algorithm, turning it into unreadable ciphertext. This process usually takes place with an encryption key, which specifies how data is to be encoded. Unauthorised users may be able to see the ciphertext, but will not be able to discern anything about the original data. Authorised users, on the other hand, can decode the ciphertext using a decryption algorithm that usually requires a secret decryption key to which only they have access. An encryption scheme usually needs a key-generation algorithm to randomly produce keys. Gartner suggests that the cost of a data breach from a lost or stolen laptop can be 70 times greater than the cost of enterprise-wide encryption, 4 yet Kaspersky research has found that 35 per cent of enterprises are exposing their data to unauthorised access by failing to use encryption technologies. 5 Whatever the reasons driving them, enterprises must protect their data, intellectual property and reputation. Enterprises of all functions and sectors are increasingly turning to encryption as both a pre-emptive information security measure and regulatory compliance strategy. There are two types of encryption that can be deployed, either independently or together: full disk encryption (FDE) and file level encryption (FLE). Kaspersky research has found that 40 per cent of enterprises are implementing FLE, with 39 per cent opting for FDE; some 33 per cent of enterprises have adopted encryption for removable media. 4. gartner analyst John Girard, interview with Fierce Mobile IT, October 25, 2012. http://www.fiercemobileit.com/ story/laptop-data-breach-can-cost-70-times-more-firm-wide-encryption/2012-10-25, October 25, 2012 5. Kaspersky Lab and B2B International, Global IT Risk Report: 2013, May 2013 4

Steps Taken to Minimise Risk Kaspersky research shows that enterprises are increasingly turning to encryption as part of an effective, pre-emptive data loss prevention strategy. Anti-Malware protection (Anti-virus, Anti-spyware) 71% 4% Regular patch/software update management 54% -9% Implementing levels of access to different IT systems by privilege Network structures (e.g. separation of mission-critical networks from other networks) Application control (i.e. only allowing approved programs to run on devices) Policy for dealing with IT security at remote branches/offices Device control (i.e. control of peripherals able to be connected to devices) 52% 4% 50% 3% 45% N/A 44% 4% 41% N/A Anti-malware agent for mobile devices 40% N/A File and folder encryption 40% N/A Encryption of all stored data (i.e. full-disk encryption) 39% 2% Separate security policy for notebooks/laptops 38% 3% Separate security policy for removable devices (e.g. USBs) 37% 0% Encryption of business communications 37% -1% Auditing/verifying the IT security of third party suppliers 36% 0% Client Management (PC Life Cycle Management) 34% -1% Encryption of data on removable devices 33% 2% Separate security policy for smartphones/tablets 32% 0% Mobile device management (MDM) 31% -2% N/A issues are new for 2013 Chart shows % of organisations that have fully implemented different security measures Significantly lower YOY Significantly higher YOY 5

Full Disk Encryption (FDE) Full disk encryption (FDE) technology is one of the most effective ways any enterprise can protect its data from theft or loss. Regardless of what happens to a device, FDE allows organisations to ensure that all sensitive data is completely unreadable and useless to criminals or prying eyes. FDE encrypts data at rest (i.e. all the data on the hard drive) from boot-up to the operating system and other installed hard drives. Essentially, every single file (including temporary files) on every single sector on the disk is encrypted. Only authenticated users can access the system, using a password, token or a combination of these. This technology can also be applied to removable media, such as USB drives. FDE supports a variety of setups and can be managed and monitored by systems administrators. FDE uses a pre-boot scheme to operate. This means it can protect data within seconds of the power button being pressed on any device. The software encrypts all selected drives and installs an authorisation module in the boot environment. When a computer is started up, the operating system will automatically load in an encrypted environment, so encryption is enforced with almost no impact on the performance of the computer. All encryption and decryption activity runs routinely and transparently to the end user, regardless of the software being used. Read/write operations run in this fully protected environment. Everything on the hard drive is secured, from swap space to system, page, hibernation and temporary files, which can often contain important confidential data. In the event of password loss, information can still be decrypted using private keys known only to the system administrator. FDE-enabled mobile devices can significantly reduce the risk of data breach caused by loss or theft. FDE functionality is included in Kaspersky Endpoint Security for Business. Systems administrators can manage it centrally from the Kaspersky Security Center management console. Endpoint Security Full Disk Encryption Authentication Operating System System Files Encryption 6

Full disk encryption brings numerous benefits to IT security: Enable enforced encryption of sensitive data: FDE removes the decision to encrypt from the end user. All files on the hard drive are automatically encrypted and password protected, including temporary files, which often contain sensitive data. There is no opportunity for end-user override. Security: FDE prevents unauthorised data access by using a login/password mechanism. When the correct login/password is presented, the system retrieves the key required to decrypt files on the hard drive. This adds an extra layer of security because data can be rendered useless immediately following the destruction of the cryptography key. Centralised key management: Encryption keys can be stored in a central location accessible only to the security administrator. Centralised encryption management: FDE systems allow all functions to be managed from a central location within the enterprise. This includes functions such as decryption key management; access control to mobile devices, lockouts, if necessary, reporting, and recovery of lost passwords. Simplicity and flexibility: FDE systems allow end-user transparency and fully automated functionality. Following successful authorisation, the encryption/decryption process takes place transparently and has no impact on user experience. Centralised data recovery: In case of lost password or damage to the data carrier, data can still be recovered and decrypted using a special centrally managed emergency recovery procedure. While FDE does provide ample protection for data on lost or stolen devices, it does not protect data in transit data as it is being shared between devices electronically, such as email. For this reason, many enterprises often implement file level encryption. 7

File Level Encryption (FLE) Using FLE, individual files or directories are encrypted by the file system itself. This is in contrast to full disk encryption, which encrypts the entire partition or disk in which the file system resides. FLE doesn t encrypt all the information on the hard drive or portable media device as FDE does File level encryption (FLE) enables the encryption of data in specific files and folders on any given device. This makes selected information unreadable to unauthorised viewers, regardless of where it s stored. FLE allows system administrators to automatically encrypt files based on attributes such as location and file type. Using FLE, individual files or directories are encrypted by the file system itself. This is in contrast to full disk encryption, which encrypts the entire partition or disk in which the file system resides. FLE doesn t encrypt all the information on the hard drive or portable media device as FDE does. It does, however, allow administrators to choose which data should (or should not) be encrypted, using rules that are easily implemented through a user-friendly software interface. FLE technology allows system administrators to fully customise which files should be encrypted. This can be done manually or automatically; some solutions provide specially pre-configured tools that enable files to be encrypted easily, quickly and reliably. Granular information access policies are easily applied. For example, administrators may wish to automatically enforce encryption for financial spreadsheets but not more general ones. Encryption rules can be customised to decide what should be encrypted and when, as in the examples below: Files on local hard drives: Administrators could create lists of files to encrypt by name, extension or directory. Files on portable media: Create a default encryption policy to enforce encryption for all portable media devices. Apply the same rules to every device, or go granular and create different rules for different devices. Choose what to encrypt: FLE supports the application of different encryption rules for different situations. For example, you can choose to encrypt all files on portable devices, or new files only. You could also enable portable encryption mode to work on encrypted files being used on PCs that don t have Kaspersky Endpoint Security for Business installed. Application files: Automatically encrypt any files that are created or changed by any application. Self-extracted encrypted archives: Files added to self-extracted encrypted archives that could be decrypted with a password on PCs that don t have Kaspersky Endpoint Security installed. 8

File encryption is transparent, meaning that anyone with access to the file system can view the names (and possibly other metadata) for the encrypted files and folders, including files and folders within encrypted folders if they are not protected through OS access control features. File/folder encryption is used on all types of storage for end-user devices Access File Kaspersky Endpoint Security www Security Center www Encrypted Encrypted Encrypted Files on Hard Drive Portable Media Self-extracted archive Administrator File encryption involves encrypting individual files on any storage medium, only permitting access to encrypted data once the correct authentication has been provided. Folder encryption involves the application of the same principles to individual folders rather than specific files. File encryption is transparent, meaning that anyone with access to the file system can view the names (and possibly other metadata) for the encrypted files and folders, including files and folders within encrypted folders if they are not protected through OS access control features. File/folder encryption is used on all types of storage for end-user devices. File encryption is implemented via a driver-based solution with a special crypto module that intercepts all file access operations. When any user attempts to access an encrypted file (or a file located in an encrypted folder), FLE software checks that the user has been authenticated or opens a password dialogue box in the case of a self-extracted encrypted archive. Once authenticated, the software automatically decrypts the chosen file. Because FLE decrypts a single file at a time, performance impact is minimal. File/folder encryption is most commonly used on user data files, such as word processing documents and spreadsheets. FLE solutions can t encrypt OS execution or hibernation files. FLE delivers many benefits to IT security: Flexibility: What and where to encrypt custom rules (files, extensions and directories) can be created and applied to different use cases and requirements. Portable media support: Create special encryption rules for all portable media devices connected to the PC/laptop. Apply the same rules across the board or choose custom options for each unique device. Transparent software encryption: Encrypt data that is created or changed by any other software operating on the hard drive. Define access rights to encrypted files on a perapplication basis or allow ciphertext-only access to encrypted files. Central management: All FLE functions can be managed from a central location, including functions such as rules management, rights management and key management. 9

Protect your data simply and securely with Kaspersky Encryption Technology Deployment, Management and Policy Enforcement Full Disk File/Folder Level Removable and Internal Devices Administered Through a Single Management Console. File/Folder Full Disk Removable Device Summary There s no need for today s mobile workforce to bring additional challenges as you attempt to secure enterprise data. Encryption is a logical way to secure data on vulnerable mobile devices, but can bring additional management and resource challenges. One simple way to avoid this is to implement encryption as part of a single security platform that combines fully integrated technologies and tools, such as robust anti-malware, control tools, systems management, mobile device management and encryption, into one easily managed solution. This enables complete visibility of the risks across all enterprise devices, delivered at one cost and managed from one console. Kaspersky Endpoint Security for Business (KESB) delivers robust data protection across all devices from one console, driving down complexity and reducing the risks to your enterprise. In addition, the Kaspersky Security Network, together with our world-renowned Threat Research and Global Research and Analysis Teams (GReAT), gives us the broadest view of millions of threats from every corner of the world. This intelligence allows us to see and often predict security incidents, helping enterprises achieve better protection and a more pro-active stance on IT security. We focus our efforts on solving global IT security challenges from critical infrastructure protection, enterprise mobility and secure virtualization to fraud prevention and security intelligence services. Kaspersky never stops anticipating and preventing IT security threats - reducing enterprise risk today and in the increasingly complex future. 10

About Kaspersky Lab Kaspersky Lab is the world s largest privately held vendor of endpoint protection solutions. The company is ranked among the world s top four vendors of security solutions for endpoint users*. Throughout its more than 16-year history Kaspersky Lab has remained an innovator in IT security and provides effective digital security solutions for large enterprises, SMBs and consumers. Kaspersky Lab, with its holding company registered in the United Kingdom, currently operates in almost 200 countries and territories across the globe, providing protection for over 300 million users worldwide. Learn more at kaspersky.com/enterprise * the company was rated fourth in the IDC rating Worldwide Endpoint Security Revenue by Vendor, 2012. The rating was published in the IDC report Worldwide Endpoint Security 2013 2017 Forecast and 2012 Vendor Shares (IDC #242618, August 2013). The report ranked software vendors according to earnings from sales of endpoint security solutions in 2012.