Proactive controls to mitigate IT security risk

Similar documents
Cryptzone Group AB (publ) The Simple Encryption Platform An Overview. Created 2011 For technical questions

Protecting Your Data On The Network, Cloud And Virtual Servers

Athena Mobile Device Management from Symantec

Symantec Mobile Management 7.1

Research Information Security Guideline

Symantec Mobile Management 7.1

Proven LANDesk Solutions

Symantec Mobile Management for Configuration Manager 7.2

Secured Global Communication version 4.6

SafeNet Data Encryption and Control. Securing data over its lifecycle, wherever it resides from the data center to endpoints and into the cloud

SafeNet Data Encryption and Control. Securing data over its lifecycle, wherever it resides from the data center to endpoints and into the cloud

The User is Evolving. July 12, 2011

Music to your ears. Get hosted communication and collaboration solutions that work in perfect harmony with your business. Vodacom Power to you

IBM Data Security Services for endpoint data protection endpoint encryption solution

Enterprise Data Protection

Symantec Mobile Management 7.2

McAfee Enterprise Mobility Management Versus Microsoft Exchange ActiveSync

RSA Solution Brief. RSA SecurID Authentication in Action: Securing Privileged User Access. RSA Solution Brief

Ensuring the security of your mobile business intelligence

The ForeScout Difference

How To Achieve Pca Compliance With Redhat Enterprise Linux

Secure Document Sharing & Online Workspaces for Financial Institutions

Five Truths. About Enterprise Data Protection THE BEST WAY TO SECURE YOUR DATA AND YOUR BUSINESS DEFENDING THE DATA CMYK

Securing the mobile enterprise with IBM Security solutions

Symantec Mobile Management Suite

Encryption Buyers Guide

RSA SecurID Two-factor Authentication

Best Practices for Protecting Laptop Data

ForeScout MDM Enterprise

Simplifying Desktop Mgmt With Novell ZENworks

IRONKEY CASE STUDIES. Healthcare Solutions

Protecting Your Roaming Workforce With Cloud-Based Security

WHITEPAPER. Addressing Them with Secure Network Access Control. Executive Summary... An Evolving Network Environment... 2

Mobile Device Management

Symantec Mobile Management 7.2

Secured Enterprise eprivacy Suite

SA Series SSL VPN Virtual Appliances

How To Secure Your Mobile Devices

Cisco Mobile Collaboration Management Service

RSA Solution Brief RSA. Encryption and Key Management Suite. RSA Solution Brief

Reducing the cost and complexity of endpoint management

Need to be PCI DSS compliant and reduce the risk of fraud?

Secure Authentication Managed Service Portfolio

WHITEPAPER. Addressing Them with Adaptive Network Security. Executive Summary... An Evolving Network Environment Adaptive Network Security...

Healthcare IT Compliance Service. Services > Overview MaaS360 Healthcare IT Compliance Service

Samsung SED Security in Collaboration with Wave Systems

SECURING TODAY S MOBILE WORKFORCE

How To Support Bring Your Own Device (Byod)

Guidelines. London School of Economics & Political Science. Remote Access and Mobile Working Guidelines. Information Management and Technology

Mobile Data Security Essentials for Your Changing, Growing Workforce

Endpoint Security More secure. Less complex. Less costs... More control.

How to use the Alertsec Service to Achieve HIPAA Compliance for Your Organization

Are You in Control? MaaS360 Control Service. Services > Overview MaaS360 Control Overview

An Oracle White Paper August Higher Security, Greater Access with Oracle Desktop Virtualization

Payment Card Industry Data Security Standard

An Overview of Samsung KNOX Active Directory and Group Policy Features

Encryption Made Simple

10 BEST PRACTICES FOR MOBILE DEVICE MANAGEMENT (MDM)

The Panoptix Building Efficiency Solution: Ensuring a Secure Delivery of Building Efficiency

Sybase Afaria. Comprehensive Management and Security for the Mobile Enterprise PRODUCT BROCHURE.

Sygate Secure Enterprise and Alcatel

Introducing KASPERSKY ENDPOINT SECURITY FOR BUSINESS.! Guyton Thorne! Sr. Manager System Engineering!

Small and Midsize Business Protection Guide

Protecting personally identifiable information: What data is at risk and what you can do about it

Driving Company Security is Challenging. Centralized Management Makes it Simple.

Mobile Workforce. Connect, Protect, and Manage Mobile Devices and Users with Junos Pulse and the Junos Pulse Mobile Security Suite.

Deciphering the Safe Harbor on Breach Notification: The Data Encryption Story

How To Buy Nitro Security

A Symantec Connect Document. A Total Cost of Ownership Viewpoint

Copyright 2013, 3CX Ltd.

Cloud Backup and Recovery for Endpoint Devices

BEST PRACTICE GUIDE MOBILE DEVICE MANAGEMENT AND MOBILE SECURITY.

RETAIL COMMUNICATIONS

Your Company Data, Their Personal Device What Could Go Wrong?

Comparing Alternatives for Business-Grade File Sharing. intermedia.net CALL US US ON THE WEB

Symantec Encryption Solutions for , Powered by PGP Technology

Encryption Made Simple

Best Practices for Enterprise Mobile Printing

Why Digital Certificates Are Essential for Managing Mobile Devices

How To Manage A Mobile Device Management (Mdm) Solution

Data Sheet: Endpoint Security Symantec Network Access Control Comprehensive Endpoint Enforcement

Does your Citrix or Terminal Server environment have an Achilles heel?

Cloud Computing Security: Public vs. Private Cloud Computing

Client side. DESlock + Data Encryption

White Paper. McAfee Cloud Single Sign On Reviewer s Guide

Building an Effective Mobile Device Management Strategy for a User-centric Mobile Enterprise

When your users take devices outside the corporate environment, these web security policies and defenses within your network no longer work.

Securing Virtual Desktop Infrastructures with Strong Authentication

Data Sheet: Endpoint Security Symantec Protection Suite Enterprise Edition Trusted protection for endpoints and messaging environments

Beyond passwords: Protect the mobile enterprise with smarter security solutions

PCI Data Security Standards (DSS)

11 Best Practices for Mobile Device Management (MDM)

EasiShare Whitepaper - Empowering Your Mobile Workforce

Endpoint Management and Mobility Solutions from Symantec. Adapting traditional IT operations for new end-user environments

When Data Loss Prevention Is Not Enough:

EXECUTIVE SUMMARY Cloud Backup for Endpoint Devices

Complete Patch Management

Did you know your security solution can help with PCI compliance too?

Transcription:

Proactive controls to mitigate IT security risk Policy Compliance Content Security Secure Access Endpoint Security Information security risk mitigation Empowering people to work securely

The Cryptzone Group Cryptzone offers proactive user-friendly solutions and services that mitigate IT security risk. Our innovative products empower people to work securely wherever, whenever and however they want. Whether at home or work, or even on the move, Cryptzone delivers familiar business applications in a unified and secure working environment. By reducing complexity and providing a simple common user experience, the burden on IT administrators is reduced, business continuity maintained and workers become more productive. Headquartered in Sweden and listed on The First North stock exchange, Cryptzone has offices around the world. Customers include Fortune 500 companies, government and defense organizations, financial institutions, and companies in a wide range of other market segments. Professional services & technical support The Cryptzone professional services and support teams work with customers to ensure the success of each project. Having developed a collaborative approach to service delivery, our highly skilled sales and technical personnel are able to ensure customers optimize the on-going value of their IT security investment in Cryptzone products. That s why more than 95% of Cryptzone customers choose to stay with us year after year. Cryptzone is a global IT security vendor with international customers. Follow the sun support structures enable us to provide world-class support 24/7 365. In addition, we offer Security-as-a-Service for organizations that choose to adopt effective and affordable cloud computing services. Our world-wide network of trusted partners is able to assist customers with the evaluation, deployment and training options around the Cryptzone solution portfolio. What we do Optimize security, governance and compliance efforts to reduce risk and meet regulatory requirements. Deploy effective IT security solutions to protect sensitive and confidential information. Maximize the business value of IT security investments in a rapidly changing commercial and regulatory environment.

There are risks and costs to a program of action. But they are far less than the longrange risks and costs of comfortable inaction. John F. Kennedy IT security risk mitigation The strategic importance of information security has increased during the 21st century. Issues of data protection, privacy and confidentiality of information are of paramount importance. Today technology risks have the ability to impact reputation, equity value and can even threaten an organization s very existence. The management of regulatory compliance and information security therefore requires active board level oversight. It is vital that board members and senior management teams understand the IT security risks facing their organizations and the risk mitigation strategies they can adopt to counter them. Cryptzone s approach IT security initiatives must be in line with corporate risk objectives and add value to the business in order to support an organization s ultimate strategic objectives. The Cryptzone Group brings together the people, processes and technology in order to mitigate information security risks identified in four key areas: Policy Compliance Content Security People An organization s first line of defense for strengthening security is its users. Creating a security aware culture, where everyone shares responsibility for protecting information assets, reduces the likelihood of human error, which is a major factor in many security incidents. Cryptzone software helps you better manage the human side of IT security risk mitigation. Processes An effective security policy and work flow process can only be effective if those processes are adhered to by everyone. Use Cryptzone solutions to communicate, monitor and enforce your security policies and processes Technology Security threats are becoming more sophisticated and more difficult to detect and intercept. At Cryptzone we have developed ground breaking technical controls for IT security risk mitigation. Our award winning technologies offer policy based security and technical controls that address the challenges of an increasingly demanding world. Implement Cryptzone software in your IT environment or get selected services provided in a cloud based infrastructure. Secure Access Endpoint Security

Policy Compliance Assure total governance across the enterprise The human factor Out-of-date, poorly communicated, unenforced policies, procedures and guidelines put your organization at risk of non-compliance with legislative and regulatory obligations. Policy life-cycle management User awareness & education Measure & monitor understanding Corporate communications Risk management reporting How do you ensure your people read, understand and comply with corporate expectations? Effective automation Cryptzone provides practical, automated policy management tools to measure, monitor and manage policy compliance at all levels within your organization. Automated delivery of your elearning and communication program ensures users understand why policies exist, as well as their responsibilities. Communicate & enforce Cut cost, inefficiency and the administrative burden of tracking who has received, read and agreed to policies. Monitor & measure Mitigate risk by raising policy awareness and improving user comprehension. Prove regulatory compliance Give managers and auditors access to accurate reports to help identify & address non-compliance. It is reassuring for the business to know that we can produce evidence of policy compliance at the click of a button. Head of Compliance, International Bank

@ Content Security Empower end users to protect information Protecting data Data protection has become a legal obligation of concern to both IT and business managers. As the demand for mobile connectivity and collaborative working has increased, so has the need to protect sensitive information. How do you ensure that information is secured no matter where it is stored or being transmitted? Unified encryption management Encrypt files and folders Encrypt emails and attachments Secure collaboration for Microsoft SharePoint USB flash drive encryption Data loss prevention Collaboration is key Cryptzone content security solutions empower people to store information securely and collaborate safely with both internal and external parties. No matter whether data is in use, in transit, or stored in a variety of remote locations, Cryptzone has the tools to secure it. Empower users to secure files, folders and documents in Microsoft SharePoint, email messages and USB flash drives. Enable your users to easily assign access rights to internal or external collaboration partners without having to manage encryption keys. Cryptzone s unique Enterprise Protection Method (EPM) technology provides automatic authentication and encryption keys for your users. Send secured emails to any recipient no matter what email application, web site or device. This includes Outlook, Lotus Notes, Gmail, Hotmail, Mac, PC, iphone, ipad, Blackberry, Android and Windows Phone. The recipient can simply and easily read and reply back securely from any device with access to the Internet. Cryptzone content security offerings are also available as SaaS solutions. We observed a priority need to encrypt our emails, files & folders and USB flash drives. IT Coordinator, Construction Company

Secure Access Securely connect from any device and any location New working patterns The growth of enterprise collaboration as well as flexible and mobile working practices has resulted in the collapse of the traditional network. Workers require the same level of access to business applications, data and services whether internal or external to the corporate network. Is your organization under pressure to provide unified access to network resources & to maintain security? A different approach Cryptzone solutions allow seamless controlled policybased connectivity and ease of use, whatever the location or mode of connection. Secure mobile working Securely connect users from any device and any location. Using policy-based solutions, Cryptzone can determine whether a user is on a trusted device in a trusted location, an untrusted device in an untrusted location or any mixture of the two and deploy access rights accordingly. Cost-effective authentication SMS, mobile device and token authentication is supported. Cryptzone s One Time Password authentication removes the need for expensive tokens to authenticate users. Low maintenance overhead Dynamic security policies ensure access is automatically assigned without user or administrator intervention, enabling centralized configuration. Emergency response A plan to minimize business disruption reduces the potential impact on worker productivity and customer service. Secure remote access is a simple and costeffective way for office staff to work as normal in the event of an emergency. Cryptzone provides a 90 day emergency unlimited user licence for when an unpredictable event occurs and more users require remote access. Network access management Mobile access (Apple, Windows, Android) SSL/SSH VPN Document access control Business continuity/disaster recovery Internal network segmentation One Time Password support We can now offer our employees a more flexible approach to working without worrying about whether our data is at risk. IT Director, Healthcare

Endpoint Security Data protection and loss prevention for endpoints Regulatory compliance The use of PCs, laptops and mobile devices has dramatically risen in recent years. While the increased storage capacity of these devices has improved accessibility to information and improved worker efficiency, it exposes organizations to a greater risk of data loss, regulatory fines and brand damage. Do you know where your data is and how it is being used? Known or unknown threat Given the speed and regularity with which new security threats are introduced, reliance on malware detection alone is no longer acceptable. Cryptzone s application whitelisting technology controls which applications are allowed to run on a device or system, so it no longer matters if a threat is known or unknown. Authorized access Cryptzone s portfolio of encryption products prevents unauthorized access to devices and data whether at rest or in motion. Secure your hardware with transparent, centrally managed full hard disk encryption. Monitor and control data movement to peripheral devices with port control. Ensure data stored on a device is only accessible to authorized users with USB flash drive encryption. Track and report the movement of and access to data. Issue a Lock Out or Kill Pill command to lost or stolen flash drives in order to mitigate risk. Device, media & port control USB flash drive encryption File & folder encryption Full disk encryption Application whitelisting Innovative technology allows us to centrally manage security policies and authorize the use of removable media. Chief Technology Officer, International Finance

Empowering people to work securely Solution portfolio Policy Compliance Content Security Secure Access Endpoint Security Product Netconsent Compliance Suite Netconsent Assessor Netconsent Informer Secured email * Secured efile * Secured ecollaboration * Secured eusb * Secured econtrol Appgate Security Server Appgate for Mobile Devices Appgate Satellites Cryptzone OTP Mindterm Secured eusb * Secured edevice Secured edisk SE46 Application Control Appgate Device Firewall Description Policy management system Automated business communication Electronic announcements on a need-to-know basis Policy controlled email encryption Centrally controlled file security and encryption Add on for Microsoft SharePoint file encryption Centrally managed USB encryption deployment tool Policy enforcement and data detection Appliance for role based access control Secure access for ipad, iphone and Android Secure virtual network One time password Java implementation of the SSH2 client Centrally managed USB encryption deployment tool Port & device control Hard disk encryption Application white listing Endpoint firewall * The solution is also available as SaaS (Security-as-a-Service). International Headquarters: Cryptzone Group AB Drakegatan 7, SE-412 50 Gothenburg, Sweden Office Locations: Cryptzone UK Ltd. Sentinel House, Harvest Crescent, Fleet, Hampshire, GU51 2UZ. UK Partner information: For more information go to www.cryptzone.com/partners Tel: +46 (0)31 773 86 00 Fax: +46 (0)31 773 86 01 Tel: +44 (0)370 013 1600 Fax: +44 (0)370 013 1601 info@cryptzone.com sales@cryptzone.com support@cryptzone.com For other regions visit www.cryptzone.com Cryptzone US Inc. 185 Alewife Brook Parkway, Suite 410, Cambridge MA 02138, USA Tel: +1.949.279.6177 Fax: +1.212.898.1190 Copyright 2011, Cryptzone Group. All rights reserved. Cryptzone, The Cryptzone Logo, AppGate, NETconsent and SE46 are trademarks of Cryptzone Group, or its affiliates. This brochure is an independent publication and has not been authorized, sponsored, or otherwise approved by Apple Inc. Microsoft is a registered trademark of Microsoft Corporation in the United States and/or other countries. iphone, ipad and Mac are trademarks of Apple Inc., registered in the U.S. and other countries. All other product names mentioned herein are trademarks of their respective owners.