S E A h a w k C r y p t o M i l l CryptoMill Technologies Ltd. www.cryptomill.com



Similar documents
Secure Cross Border File Protection & Sharing for Enterprise Product Brief CRYPTOMILL INC

1. System Requirements

Symantec Backup Exec.cloud

Navigating Endpoint Encryption Technologies

NetWrix USB Blocker Version 3.6 Quick Start Guide

Activatiecode voor NovaBackup Professional voor 3 pc. Omschrijving NovaBACKUP Professional 14.1

Samsung SED Security in Collaboration with Wave Systems

Determining Your Computer Resources

Protecting Your Data On The Network, Cloud And Virtual Servers

Disk Encryption. Aaron Howard IT Security Office

Firmware security features in HP Compaq business notebooks

How To Set Up Safetica Insight 9 (Safetica) For A Safetrica Management Service (Sms) For An Ipad Or Ipad (Smb) (Sbc) (For A Safetaica) (

Release Notes: NovaBACKUP 17.3

Online Backup by Mozy. Common Questions

AD Self-Service Suite for Active Directory

How to enable Disk Encryption on a laptop

Full Drive Encryption with Samsung Solid State Drives

Management of Hardware Passwords in Think PCs.

How Endpoint Encryption Works

NetWrix USB Blocker. Version 3.6 Administrator Guide

PRODUCT GUIDE. N u c l e u s D a t a R e c o v e r y. C o m P riv a t e L i m i t e d

Endpoint protection for physical and virtual desktops

Service Overview CloudCare Online Backup

How To Use Attix5 Pro For A Fraction Of The Cost Of A Backup

EasyLock. User Manual. Intuitive Encryption Application for portable Storage Devices

Comodo Disk Encryption

Acronis True Image 2015 REVIEWERS GUIDE

CompleteView Pop Up Monitor User s Manual. Version 3.8

Kaseya IT Automation Framework

Data Protection Simple. Compliant. Secure. CONTACT US Call: Visit:

Major upgrade versions. To see which features each version of Windows 7 has, go to Microsoft's Compare Windows page.

Getting Started with Symantec Endpoint Protection

efolder BDR for Veeam Cloud Connection Guide

Implementing Disk Encryption on System x Servers with IBM Security Key Lifecycle Manager Solution Guide

EMC DATA DOMAIN ENCRYPTION A Detailed Review

C6 Easy Imaging Total Computer Backup. User Guide

How To Install Sedar On A Workstation

Endpoint protection for physical and virtual desktops

Guidelines on use of encryption to protect person identifiable and sensitive information

DESLock+ Basic Setup Guide Version 1.20, rev: June 9th 2014

SP Widget. Users Manual

ZENworks 11 Support Pack 4 Full Disk Encryption Agent Reference. May 2016

DESlock+ Basic Setup Guide ENTERPRISE SERVER ESSENTIAL/STANDARD/PRO

Oracle Enterprise Single Sign-on Technical Guide An Oracle White Paper June 2009

Check Point FDE integration with Digipass Key devices

Acronis Backup & Recovery 11

Gain Complete Data Protection with SanDisk Self-Encrypting SSDs and Wave Systems

How do I Check if My Computer is Compatible with Windows 7

ScoMIS Encryption Service

Why Endpoint Encryption Can Fail to Deliver

Apptix Online Backup by Mozy

Protecting Your Business from Costly Data Theft: Why Hardware-Based Encryption Is the Answer

Total Backup Recovery 7

Securing Corporate Data and Making Life Easier for the IT Admin Benefits of Pre Boot Network Authentication Technology

Acronis True Image 10 Home Reviewer s Guide

OdysseyTM. removable hard disk storage system. secure. fast. expandable.

Release Notes: NovaBACKUP v16.0

Securing Data on Portable Media.

ScoMIS Encryption Service

formerly Help Desk Authority Upgrade Guide

CompleteView Alarm Client User s Manual. Version 3.8

System Requirements. NovaBACKUP Copyright 2013 NovaStor

Comparing Free Virtualization Products

Acronis Backup & Recovery 11.5 Quick Start Guide

Understanding and Configuring Password Manager for Maximum Benefits

Full Disk Encryption Agent Reference

VERITAS Backup Exec 9.1 for Windows Servers Quick Installation Guide

Kaspersky Lab s Full Disk Encryption Technology

DriveLock and Windows 7

System Requirements NovaBACKUP 15.0

PGP Universal Server 2.5 SmartLine DeviceLock 6.2

ORACLE VIRTUAL DESKTOP INFRASTRUCTURE

Understanding Northwestern University s contract with Symantec. Symantec Solutions for Cost Reduction & Optimization

Symantec Backup Exec 11d for Windows Servers New Encryption Capabilities

Total Backup Recovery 7

TotalShredder USB. User s Guide

CompleteView Alarm Client User Manual. CompleteView Version 4.3

Symantec Backup Exec TM 11d for Windows Servers. Quick Installation Guide

Fuji Synapse PACS Installation Instructions Radiology Specialists of Denver, P.C.

Upgrading Client Security and Policy Manager in 4 easy steps

Client side. DESlock + Data Encryption

InstaFile. Complete Document management System

efolder White Paper: HIPAA Compliance

Whitepaper Enhancing BitLocker Deployment and Management with SimplySecure. Addressing the Concerns of the IT Professional Rob Weber February 2015

Release Notes: NovaBACKUP v16.1

SELF SERVICE RESET PASSWORD MANAGEMENT ADMINISTRATOR'S GUIDE

SmoothWall Virtual Appliance

Data Sheet: Endpoint Security Symantec Endpoint Protection The next generation of antivirus technology from Symantec

Managing Cloud Computing Risk

Transcription:

SEAhawk CryptoMill CryptoMill Technologies Ltd. www.cryptomill.com

OVERVIEW S EAhawk is an endpoint and removable storage security solution for desktop PCs and laptops running the Microsoft Windows operating system. Device agnostic, SEAhawk is a policy-based solution with Zero-Overhead Key Management, providing protection for data at rest and in motion. Key features of SEAhawk include Intelligent Device Access Management, Private Virtual Disk, Email File Protection and Self- Encrypting Drive Management. Highlights Data Protection and Trust Boundaries using strong encryption Policy-based control of removable storage media Secure data sharing with colleagues Facilitates secure data backup and recovery in case of disaster SEAhawk combines Intelligent Device Access Management and Data Encryption in a single, seamless security solution for all storage devices. CryptoMill Enterprise Security

FEATURES Features Trust Boundaries Information is secured and accessed only within organizational perimeters. Intelligent Device Access Management Prevents copying of sensitive data to unencrypted USB drives and removable media. Private Virtual Disks Area defined on the hard drive for encrypted storage. Management of Self Encrypting HDDs User Management, Secure Erase, Password / Access Recovery. Software FDE (Full Disk Encryption) Baseline, foolproof data protection. Email File Protector Point and Click File Encryption. Benefits Mitigates internal data breaches intentional or accidental. USB drives, iphones, Blackberrys and other storage devices can be used safely. User Data Privacy. Protects against loss or theft of PC. Complete data protection with zero performance impact. Complete protection for your system drive. Keep your information safe while sending it to authorized third parties or clients. Trust Boundaries A Trust Boundary is a set of Enterprise PCs and storage which may share protected data. Examples of Trust Boundaries: Entire enterprise (simplest case) Business Units / Project Teams Executive / General Staff Groups which must legally be separated Trust Boundaries transcend geography and network topology. Protected media cannot be decrypted outside of the Trust Boundary even if the sharing password is disclosed. SEAhawk Trust Boundaries prevent internal data breaches to unauthorized parties and insider data leaks to competitors. Intelligent Device Access Management SEAhawk employs Intelligent Device Access Management on access to removable storage devices like USB flash drives, ipod s and CD/DVD. Based on SEAhawk policy settings, a user s ability to use these devices can be restricted to Read-Only or Blocked access. Intelligent Device Access Management distinguishes between secure media and non-secure media. As a result, a user s SEAhawk policy can be set to permit full read/ write access to secure media, while only

FEATURES allowing read access to non-secure media or, blocking it completely. Private Virtual Disks SEAhawk provides the option of using secure Virtual Disks encrypted containers that store sensitive user data; this provides loss and theft protection. SEAhawk Virtual Disks: appear to the operating system just like regular hard disks are secured using strong stan dardsbased encryption (AES) for maximum protection can be easily backed up and recovered without the need for additional security are securely bound to the organization Management of Self Encrypting Drives (SEDs) Nothing is easier for a user than to accept that everything on their computer is encrypted. They don t have to worry about which part of the hard drive is secure, and which part is not. There is no conscious decision as to whether a document is sensitive enough to be encrypted or not. Everything on the Disk is encrypted! By the virtue of Full Disk Encryption, encryption is mandatory and enforceability comes naturally. The future of FDE is to have it done in the hardware. Self Encrypting Drives provide all the benefits of Software FDE with none of its drawbacks. Encryption is done within the drive itself and does not impact your CPU. The encryption key that is contained within the drive is never released to the CPU or the Operating System. That, coupled with the fact that this hardware solution is much more resilient to attack, makes it a very secure solution. While these SEDs are looking to be an excellent solution, there is one piece that s missing in order to make it viable in the market Management. It really isn t much of a solution if a user forgets his or her password and cannot access their data. Who takes care of the key management and access recovery? With CryptoMill software, you never have to worry. SEAhawk integrates with all types of SEDs currently on the market and provides seamless setup, multiple user support, centralized access recovery and much more! Data Protection can be this easy. Software FDE (Full Disk Encryption) To support legacy devices that do not contain Self Encrypting Drives, CryptoMill offers software FDE to completely protect your system drive. It features the same Zero Overhead Key Management, bullet- proof Access Recovery and robust software encryption to keep your data safe. Secure Erase In the past, data was destroyed by overwriting every part of the storage medium with zeros, or random data patterns. This was called wiping the storage medium. This process was very time consuming. Secure erase works by erasing the key used to access encrypted data. All data is encrypted with a key. If you possess the key, you can decrypt the data. Throw away the key, and it s practically impossible to get to the data. Wiping (or destroying) the encryption key is the best way to destroy encrypted data. It s fast (literally takes seconds!) and safe, as it works on the same encryption principles that

FEATURES protect your data in the first place. CryptoMill SEAhawk s Management Console lets you easily erase data from a central location. Your IT staff can easily select one or more fully encrypted computers to be secure erased. The next time any of those computers reboot or power-up, the data will be securely erased in seconds. All without anyone having to physically touch the machines. Email File Protection The E-mail File Protector provides convenient, easy protection for E-mail file attachments. File encryption is as easy as Point and Click. Simply right click on a file and select encrypt for email. The user is then asked for a password to protect the file with. The file is then encrypted and can be attached to an email to send to a contact. Should the receiving party not have SEAhawk installed, they can still decrypt the file using the stand alone File Decryptor application available through a free web download. Management Console (centralized media recovery) Over-the-phone secure challenge / response recovery Easy for Users Authentication is provided using the user s Windows credentials (single sign-on option). Data protection runs transparently no extra user action required Management CryptoMill s centralized Management Console is extremely easy to use and intuitive, ensuring that both administrative and help desk staff spend less time managing and configuring software, and more time doing what s important. Workstations and laptops can be managed confidently and securely, so there is a high ROI based on less time required to manage a SEAhawk for Workstations secured environment. Decrypting an encrypted file is just as easy; right click the file and select Decrypt File. Upon entering the right password, the file is decrypted and is ready for use. Enterprise Data Accessibility The Enterprise will always have access to its protected data. Even in the event of employee termination/absence, or forgotten passwords, access to encrypted media can be recovered through:

BENEFITS Compliance Today s organizations are facing the growing challenge of regulatory compliance. Throughout the world, governments are enacting legislation to regulate information management and security. At the root of these laws are the concepts of: data integrity, security, identity management and authorization. They are forced into the world of constantly changing information management requirements to comply with regulations and industry standards, such as the Sarbanes-Oxley Act, HIPAA, various countries privacy laws and others. Growing your business should be your number one concern, not whether your data is in jeopardy. Get compliant, get SEAhawk, and get back to business. Reputation Your corporate reputation is a prized, highly vulnerable asset and it needs to be protected. Security Breaches are one of the leading causes of reputation risk. Failure to comply with regulations poses the biggest threat to reputation. Maintaining a good reputation strengthens market position and increases shareholder value. With SEAhawk for Workstations, your corporate endpoints and your reputation are protected.

SPECIFICATIONS Product Specifications SEAhawk provides data protection for: Supplementary (non-boot) drives full disk encryption. Virtual Disks virtual disks are fully encrypted. Storage options: Direct-attached storage (DAS) PATA, SATA, SCSI, SAS, USB, Firewire (IEEE 1394) IP-based storage: iscsi SEAhawk Virtual Disks on local storage, or on network file servers. Encryption Ciphers: AES (256-bit, or 128-bit) CBC mode Triple DES (3DES) CBC mode These values may be subject to workstation memory and processing limitations. Server System Requirements SAMS has the following system requirements: Microsoft Windows Server 2003 SP2-866 megahertz (MHz) or faster 32-bit (x86) processor - 256 megabyte (MB) RAM (32-bit) - 200 MB available hard disk space Microsoft Windows Server 2008 R2-1 gigahertz (GHz) or faster processor - 1 gigabyte (GB) RAM - 200 MB available hard disk space Workstation System Requirements SEAhawk has the following system requirements: Microsoft Windows XP (Home, Professional) - 866 megahertz (MHz) or faster 32-bit (x86) processor - 128 megabyte (MB) RAM (32-bit) - 100 MB available hard disk space Microsoft Windows Vista (Home Premium, Business, Ultimate) - 1 gigahertz (GHz) or faster processor - 1 gigabyte (GB) RAM - 100 MB available hard disk space Microsoft Windows 7 (Home Premium, Professional, Ultimate) - 1 gigahertz (GHz) or faster processor - 1 gigabyte (GB) RAM - 100 MB available hard disk space Microsoft Windows 8-1 gigahertz (GHz) or faster processor - 1 gigabyte (GB) (32-bit) or 2 GB (64-bit) RAM - 100 MB available hard disk space SEAhawk for Workstations requires a temporary connection to a CryptoMill Site Active Management Server (SAMS). Microsoft Windows 2012 R2-1.4 gigahertz (GHz) or faster processor - 2 gigabyte (GB) (64-bit) RAM - 200 MB available hard disk space

CryptoMill CryptoMill Technologies provides innovative data security solutions for enterprises, professionals and individuals. YOUTUBE LOGO SPECS PRINT Loss or theft of information can have a devastating impact on businesses and main red reputations. CryptoMill s SEAhawk is an PMS 1795C C0 M96 Y90 K2 endpoint and removable storage device protection solution that provides comprehensive white black WHITE C0 M0 Y0 K0 security for data within your organization. SEAhawk not only provides advanced virtual storage disks with robust encryption for mission critical and sensitive data but also prevents unauthorized access to storage media containing the data. All SEAhawk enabled computer systems have their data protected by encryption using government-grade encryption. gradient bottom PMS 1815C C13 M96 Y81 K54 BLACK C100 M100 Y100 K100 Contact CryptoMill Technologies Ltd. Suite 2000, 372 Bay Street, Toronto, Ontario, Canada, M5H 2W9 Toll free: (855) 441 4333 T: (416) 241 4333 F: (416) 241 4333 E: info@cryptomill.com Mailing Address: P.O. Box 9, 31 Adelaide St. E., Toronto, Ontario, M5C 2H8 Sales Contact E: sales@cryptomill.com connect with us YouTube: http://www.youtube.com/user/cryptomilltech on light backgrounds on dark backgrounds standard standard Facebook: https://www.facebook.com/ CryptomillTechnologies no gradients no gradients Twitter: https://twitter.com/cryptomill watermark watermark LinkedIn: http://www.linkedin.com/company/cryptomilltechnologies stacked logo (for sharing only) stacked logo (for sharing only) CryptoMill Technologies Ltd. www.cryptomill.com While this information is presented in good faith and believed to be accurate, CryptoMill Technologies disclaims the implied warranties of merchantability and fitness for a particular purpose and makes no express warranties except as may be stated in its written agreement with and for its customer. In no event is CryptoMill liable to anyone for any indirect, special or consequential damages. The information and specifications in this document are subject to change without notice. Printed in Canada Copyright 2014 CryptoMill Technologies Ltd.