Symantec Endpoint Encryption Deployment Best Practices and Roadmap



Similar documents
White Paper: Whole Disk Encryption

Securing the endpoint and your data

How Drive Encryption Works

How Endpoint Encryption Works

What s New with Enterprise Vault 11? Symantec Enterprise Vault 11 - What's New?

Your is outsourced to the Cloud and Mobile, Are You protecting it with Encryption? Wolf Schreiner

Altiris Client Management Suite

Samsung SED Security in Collaboration with Wave Systems

Gain Complete Data Protection with SanDisk Self-Encrypting SSDs and Wave Systems

Navigating Endpoint Encryption Technologies

SafeGuard Enterprise 6.10 Peter Skondro

Symantec Mobile Management 7.1

Athena Mobile Device Management from Symantec

More enhanced features.

Symantec Mobile Management 7.1

For your eyes only - Encryption and DLP Erkko Skantz

Kaseya IT Automation Framework

Instant Recovery for VMware

Endpoint Management and Mobility Solutions from Symantec. Adapting traditional IT operations for new end-user environments

White Paper. Keeping Your Private Data Secure

Managing BitLocker Encryption

Symantec Desktop and Laptop Option 7.6

Symantec Mobile Management Suite

A Guide to Managing Microsoft BitLocker in the Enterprise

Symantec Drive Encryption for Windows

efolder White Paper: HIPAA Compliance

Symantec Mobile Management for Configuration Manager 7.2

Symantec Mobile Management 7.2

IBM Endpoint Manager for Server Automation

Symantec Encryption Desktop Version 10.3 for Windows Maintenance Pack Release Notes

Disk Encryption. Aaron Howard IT Security Office

PGP Desktop Version 10.2 for Mac OS X Maintenance Pack Release Notes

Sophos SafeGuard Disk Encryption, Sophos SafeGuard Easy Demo guide

IBM Tivoli Endpoint Manager for Lifecycle Management

IBM Tivoli Endpoint Manager for Lifecycle Management

Symantec Client Management Suite 7.5 powered by Altiris

Symantec Enterprise Vault.cloud Giovanni Alberici

Secure Your Mobile Workplace

Symantec Backup Exec 2010

How To Use Attix5 Pro For A Fraction Of The Cost Of A Backup

PGP Desktop Version 10.2 for Windows Maintenance Pack Release Notes

Sophos SafeGuard Native Device Encryption for Mac Administrator help. Product version: 7

IBM Tivoli Endpoint Manager for Security and Compliance

Symantec Client Management Suite 8.0

WhitePaper. Private Cloud Computing Essentials

Sophos SafeGuard Disk Encryption for Mac Startup guide

Symantec NetBackup Appliances

What s New in Ghost Solution Suite 3.0

FDE Performance Comparison. Hardware Versus Software Full Drive Encryption

Sophos Disk Encryption License migration guide. Product version: 5.61 Document date: June 2012

SecureDoc for Mac v6.1. User Manual

IBM Cognos TM1 on Cloud Solution scalability with rapid time to value

IBM Tivoli Endpoint Manager for Security and Compliance

Data Security Using TCG Self-Encrypting Drive Technology

Backup Exec System Recovery Management Solution 2010 FAQ

Device Lifecycle Management

Managing Remote and Mobile Workers Adam Licata, Enterprise Mobility SE, TSO Brian Sheedy, Sr. Principal TEC, Endpoint Management

An Oracle White Paper August Higher Security, Greater Access with Oracle Desktop Virtualization

Goverlan Remote Control

Oracle Enterprise Single Sign-on Technical Guide An Oracle White Paper June 2009

PGP Whole Disk Encryption Training

ACER ProShield. Table of Contents

Where are Organizations Today? The Cloud. The Current and Future State of IT When, Where, and How To Leverage the Cloud. The Cloud and the Players

Williamson County Technology Services Technology Project Questionnaire for Vendor (To be filled out withprospective solution provider)

WINDOWS SERVER SMALL BUSINESS SOLUTIONS. Name: Marko Drev

The Most Complete Data Protection Platform for MSPs

Table of Contents Release Notes 2013/04/08. Introduction in OS Deployment Manager. in Security Manager Known issues

Managing BitLocker With SafeGuard Enterprise

Securing OS Legacy Systems Alexander Rau

Yale Software Library

Attix5 Pro Overview. V7.x. An overview of the Attix5 Pro product suite.

Securing Corporate Data and Making Life Easier for the IT Admin Benefits of Pre Boot Network Authentication Technology

Encryption Buyers Guide

SafeGuard Easy startup guide. Product version: 7

Altiris Business Unit Review. Greg Butterfield Group President, Altiris Business Unit

Data Sheet: Archiving Altiris Client Management Suite 7.0 from Symantec Deploy, manage, secure, and troubleshoot

ORACLE VIRTUAL DESKTOP INFRASTRUCTURE

IBM Endpoint Manager for Lifecycle Management

Risk and threats everywhere, all the time

Security.cloud Configuring DLP on to your flow and applying security to your hosted deployment

Symantec DLP Overview. Jonathan Jesse ITS Partners

Simplify Your Windows Server Migration

The Impact of HIPAA and HITECH

Symantec IT Management Suite 7.5 powered by Altiris

Altiris IT Management Suite 7.1 from Symantec

State of Wisconsin DET File Transfer Protocol Service Offering Definition (FTP & SFTP)

Transcription:

Symantec Endpoint Encryption Deployment Best Practices and Roadmap Jon Allen Baylor University Chief Information Security Officer & Assistant Vice President Rene Kolga Symantec Principle Product Manager Encryption Whole Disk Encryption 1

Baylor University Waco, Texas Chartered in 1845 Largest Baptist University in the world 15,000 Students 2,500 Full Time Employees Over 7,000 Baylor owned computers 2

Agenda 1 2 3 4 Background Deployment Lessons Learned The Future Q&A

Background

Reasons for Encryption 0010101001010010011010101010110101010100100100001 0010010100101011001010100101001001101010101011010 1010100100100001001001010010101100101001001000 ENCRYPTION Offices have now become mobile Laptops are the standard Large percentage of data losses involve laptop theft/loss 46 states have enacted privacy legislation requiring notification if breached data is not encrypted Migration from using SSN did not eliminate old stores of information

2013 The Year of the Mega Breach The total number of breaches in 2013 was 62% greater than in 2012 8 of the breaches reported in 2013 exposed over 10 Million Identities Roughly 552 Million Identities were breached in 2013 The loss of a laptop continues to be the leading cause of a data breach

Types of Encryption: Overview 0010101001010010011010101010110101010100100100001 0010010100101011001010100101001001101010101011010 1010100100100001001001010010101100101001001000 Manual Tools that allow users to manually encrypt and decrypt files and folders Automatic (Folder Level) Tools that allow users to define folders or virtual drives that are automatically encrypted Whole Disk Boot time software that provides real-time encryption/decryption below the OS level. Encrypts the entire volume or disk

Why Symantec Drive Encryption Cross Platform (Mac, Windows, Linux) Centralized platform Proven encryption technology

Deployment

Implementation 0010101001010010011010101010110101010100100100001 0010010100101011001010100101001001101010101011010 1010100100100001001001010010101100101001001000 Installation Manual vs. Automatic Setting up central server Backup to an SFTP server, offsite rotation for server backup Runs great as a VM (1 CPU core, 2 GM ram) Internal Q/A procedure Working SED into our system workflow Only disk encryption, not mail for most users

Data We re Concerned About 0010101001010010011010101010110101010100100100001001001010010101100101 0100101001001101010101011010101010010010000100100101001010110010100100 10001001010010011010101010010100100110101010100101001001101010100010 Texas Privacy Legislation SSN, CC#, Driver s License, Bank Accounts FERPA Records PCI (Payment Card Industry) Texas HB 300 and HIPAA

Risks to Success 0010101001010010011010101010110101010100100100001 0010010100101011001010100101001001101010101011010 1010100100100001001001010010101100101001001000 Workstation Configuration Backups Screensavers Hibernation vs. Standby Authentication Method Single Sign-on Unified authentication Separate Credentials Administrative Tasks Handling forgotten passphrases Updating SED versions Forensics\E-Discovery System deployment

The Apple Challenge 0010101001010010011010101010110101010100100100001 0010010100101011001010100101001001101010101011010 1010100100100001001001010010101100101001001000 Apple will change the EFI in even minor patches Means patching must be managed to prevent bricking New hardware generally requires latest OS Security patches only available for latest major release of an OS

Public Relations 0010101001010010011010101010110101010100100100001 0010010100101011001010100101001001101010101011010 1010100100100001001001010010101100101001001000 Administration Buy-in Thorough testing to up front Respond quickly to concerns Exhaustively test new versions do not feel compelled to upgrade until testing is complete

Lessons Learned

Today 0010101001010010011010101010110101010100100100001 0010010100101011001010100101001001101010101011010 1010100100100001001001010010101100101001001000 Over 1400 clients deployed Of those over 90% are laptops Require all faculty/staff laptops be encrypted Include both Mac and Linux installations ½ FTE dedicated to Symantec Drive Encryption rollout and maintenance

In Retrospect 0010101001010010011010101010110101010100100100001 0010010100101011001010100101001001101010101011010 1010100100100001001001010010101100101001001000 Do we think we made the right choice? Whole disk Symantec Drive Encryption What would we have done differently More resources QA resources Deployment resources More realistic timelines Make sure users understand the why of encryption

The Future 0010101001010010011010101010110101010100100100001 0010010100101011001010100101001001101010101011010 1010100100100001001001010010101100101001001000 Encryption included with software OS (FileVault v2, BitLocker) Databases ( Oracle and MSSQL) Federal Privacy Legislation Opal v2 for managing hardware encryption

Symantec Encryption Portfolio Update Rene Kolga Principle Product Manager Whole Disk Encryption 19

Agenda 1 Current Portfolio 2 Encryption Trends 3 Symantec s Encryption Strategy 4 What s Coming 5 A Sneak Peak Whole Disk Encryption SYMANTEC VISION 2014 20

Safe Harbor Statement Any information regarding pre-release Symantec offerings, future updates or other planned modifications is subject to ongoing evaluation by Symantec and therefore subject to change. This information is provided without warranty of any kind, express or implied. Customers who purchase Symantec offerings should make their purchase decision based upon features that are currently available. Whole Disk Encryption SYMANTEC VISION 2014 21

Symantec Encryption Portfolio Endpoint Encryption Email Encryption File & Folder Encryption @ E N C R Y P T I O N E N C R Y P T I O N E N C R Y P T I O N Renders data-at-rest inaccessible to unauthorized parties on devices such as laptops, removable media, desktops Protects email in transit and at-rest from unauthorized parties Protects individual files in transit and at-rest from unauthorized parties, allowing secure collaboration Endpoint Management Renders data-at-rest inaccessible to unauthorized parties on devices such as laptops, removable media, desktops Whole Disk Encryption SYMANTEC VISION 2014 22

Encryption Trends Convergence of Endpoint Security Solutions Native OS Encryption E N C R Y P T I O N E N C R Y P T I O N E N C R Y P T I O N E N C R Y P T I O N Tablets Tablets Self-Encrypting Drives Whole Disk Encryption SYMANTEC VISION 2014

Encryption Strategy Enable customers to seamlessly protect sensitive information, wherever it resides, with Symantec Encryption E N C R Y P T I O N E N C R Y P T I O N E N C R Y P T I O N E N C R Y P T I O N Single Endpoint Encryption Offering 3rd Party Encryption Management Encryption Center of Excellence Next Generation Encryption Whole Disk Encryption SYMANTEC VISION 2014 24

Darwin 2 nd Half CY14 (Projected) The endpoint combination you ve been waiting for Drive Encryption Endpoint Encryption v11 Removable Storage Drive Encryption Removable Storage Encryption Management Encryption Management Whole Disk Encryption SYMANTEC VISION 2014 25

More Anticipated Highlights from Darwin Robust customizable reporting and extensive out-of-box reporting A simpler user experience by eliminating the need for enrollment Support for multi-user endpoints and non-ad environments Roughly doubling endpoint scalability Removable media encryption support Streamlined server architecture to allow faster innovation and engineering Whole Disk Encryption SYMANTEC VISION 2014 26

A Glance at Reporting Out of the box reports And customizable reporting Whole Disk Encryption SYMANTEC VISION 2014 27

Hercules 1 st Half of CY15 (Projected) More robust management capabilities and easy migrations BitLocker FileVault Opal v2 Old Client No need to decrypt and re-encrypt systems New Client SYMANTEC VISION 2014 28

More Anticipated Highlights from Hercules Managing Self-encrypting Drives (Opal v2) Managing Windows BitLocker and Mac OSX FileVault Policy-based pre-boot bypass Tablet support w/out keyboard Additional PIV/CAC card support Whole Disk Encryption SYMANTEC VISION 2014 29

A Sneak Peak Demo Whole Disk Encryption SYMANTEC VISION 2014 30

Thank you! --Symantec Encryption Team-- Copyright 2014 Symantec Corporation. All rights reserved. Symantec and the Symantec Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners. This document is provided for informational purposes only and is not intended as advertising. All warranties relating to the information in this document, either express or implied, are disclaimed to the maximum extent allowed by law. The information in this document is subject to change without notice. Whole Disk Encryption 31