Full Disk Encryption Drives & Management Software. The Ultimate Security Solution For Data At Rest



Similar documents
Samsung SED Security in Collaboration with Wave Systems

Protecting Your Business from Costly Data Theft: Why Hardware-Based Encryption Is the Answer

Navigating Endpoint Encryption Technologies

Gain Complete Data Protection with SanDisk Self-Encrypting SSDs and Wave Systems

Disk Encryption. Aaron Howard IT Security Office

Securing Corporate Data and Making Life Easier for the IT Admin Benefits of Pre Boot Network Authentication Technology

1. System Requirements

Whitepaper Enhancing BitLocker Deployment and Management with SimplySecure. Addressing the Concerns of the IT Professional Rob Weber February 2015

Aegis Padlock for business

EMBASSY Remote Administration Server (ERAS) BitLocker Deployment Guide

SecureD Technical Overview

FDE Performance Comparison. Hardware Versus Software Full Drive Encryption

Kaspersky Lab s Full Disk Encryption Technology

ACER ProShield. Table of Contents

A Comprehensive Plan to Simplify Endpoint Encryption

05.0 Application Development

BANKING SECURITY and COMPLIANCE

Security Overview for Windows Vista. Bob McCoy, MCSE, CISSP/ISSAP Technical Account Manager Microsoft Corporation

Factory-Installed, Standards-Based Hardware Security. Steven K. Sprague President & CEO, Wave Systems Corp.

How Cloud Computing Can Accelerate Endpoint Encryption:

Comprehensive Endpoint Security

EmulexSecure 8Gb/s HBA Architecture Frequently Asked Questions

New Drive Technologies Enable Strong Data Protection Strategies: Managing Self-Encrypting Drives in the Enterprise

Cloud and EVault Endpoint Protection Your best friend in Data Protection

Using BitLocker As Part Of A Customer Data Protection Program: Part 1

Enterprise Data Protection

Allstate Insurance Company s Local Data Protection (LDP) Project


Data Security Using TCG Self-Encrypting Drive Technology

Presentation for : The New England Board of Higher Education. Hot Topics in IT Security and Data Privacy

White paper Security Solutions Advanced Theft Protection (ATP) Notebooks

Keep Your Data Secure: Fighting Back With Flash

Hardware versus Software

Bryan Hadzik Network Consulting Services, inc. Endpoint Security Data At Rest

Assuria Auditor The Configuration Assurance, Vulnerability Assessment, Change Detection and Policy Compliance Reporting Solution for Enterprise

Solving the Online File-Sharing Problem Replacing Rogue Tools with the Right Tools

nwstor Storage Security Solution 1. Executive Summary 2. Need for Data Security 3. Solution: nwstor isav Storage Security Appliances 4.

YOUR DATA UNDER SIEGE. DEFEND IT WITH ENCRYPTION.

How to use the Alertsec Service to Achieve HIPAA Compliance for Your Organization

Did security go out the door with your mobile workforce? Help protect your data and brand, and maintain compliance from the outside

TOP FIVE RECOMMENDATIONS FOR ENCRYPTING LAPTOP DATA A BEST PRACTICES GUIDE

EMBASSY Remote Administration Server (ERAS) Administrator Manual

Solid-State Drives with Self-Encryption: Solidly Secure

Cloud Security Case Study Amazon Web Services. Ugo Piazzalunga Technical Manager, IT Security

Management of Hardware Passwords in Think PCs.

FileCloud Security FAQ

MCTS Guide to Microsoft Windows 7. Chapter 7 Windows 7 Security Features

Global security intelligence. YoUR DAtA UnDeR siege: DeFenD it with encryption. #enterprisesec kaspersky.com/enterprise

efolder White Paper: HIPAA Compliance

BitLocker Drive Encryption Hardware Enhanced Data Protection. Shon Eizenhoefer, Program Manager Microsoft Corporation

RSA Solution Brief RSA. Encryption and Key Management Suite. RSA Solution Brief

Canon imagerunner Hard Disk Drive Data Security Options. Data Encryption and Overwrite

Full Drive Encryption Security Problem Definition - Encryption Engine

Innovative Secure Boot System (SBS) with a smartcard.

Securing Data on Portable Media.

Security Architecture Whitepaper

CS 356 Lecture 25 and 26 Operating System Security. Spring 2013

Using Data Encryption to Achieve HIPAA Safe Harbor in the Cloud

BitLocker Encryption for non-tpm laptops

Secure Endpoint Management. Presented by Kinette Crain and Brad Lewis

CONTENTS. Windows To Go: Empower And Secure The Mobile Workforce

A Guide to Managing Microsoft BitLocker in the Enterprise

The Impact of HIPAA and HITECH

PCI Data Security Standards (DSS)

Security Controls What Works. Southside Virginia Community College: Security Awareness

Security Trends and Client Approaches

Managing BitLocker Encryption

Pointsec Enterprise Encryption and Access Control for Laptops and Workstations

Data Encryption Demystified: Seven Common Misconceptions and the Solutions That Dispel Them

ABC of Storage Security. M. Granata NetApp System Engineer

Complying with PCI Data Security

CHOOSING THE RIGHT PORTABLE SECURITY DEVICE. A guideline to help your organization chose the Best Secure USB device

PROVIDING IT SOLUTIONS FOR THE HEALTHCARE INDUSTRY

IBM Data Security Services for endpoint data protection endpoint encryption solution

Managing Privileged Identities in the Cloud. How Privileged Identity Management Evolved to a Service Platform

PGP Whole Disk Encryption Training

Protecting Data at Rest What to Consider When Selecting a Solution for Disk, Removable Media, and File Encryption

Best Practices for Protecting Laptop Data

Recipe for Mobile Data Security: TPM, Bitlocker, Windows Vista and Active Directory

Preemptive security solutions for healthcare

PCI DSS COMPLIANCE DATA

Security Solutions Advanced Theft Protection Notebooks

Securing SharePoint 101. Rob Rachwald Imperva

HIPAA: MANAGING ACCESS TO SYSTEMS STORING ephi WITH SECRET SERVER

For Managing Central Deployment, Policy Management, Hot Revocation, Audit Facilities, and Safe Central Recovery.

FileDrawer An Enterprise File Sharing and Synchronization (EFSS) solution.

WHITE PAPER WHY ORGANIZATIONS NEED LTO-6 TECHNOLOGY TODAY

Introduction to BitLocker FVE

University of Illinois at Chicago Health Sciences Colleges Information Technology Group Security Policies Summary

Protecting Student and Institutional Privacy Data Encryption for Education

Keep Data Secure with Intelligent Client-Side Protection for Lost or Stolen Laptops

Insert Partner logo here. Financial Mobility Balancing Security and Success

Protecting Data at Rest

Analyzing Security for Retailers An analysis of what retailers can do to improve their network security

SecureAge SecureDs Data Breach Prevention Solution

Centralized Self-service Password Reset: From the Web and Windows Desktop

USER-MANAGED FILE SERVER BACKUP:

Dedicated IT Support. BEFORE You Need It. Save Time, Money and Headache.

MySQL Security: Best Practices

Do "standard tools" meet your needs when it comes to providing security for mobile PCs and data media?

Transcription:

Full Disk Encryption Drives & Management Software The Ultimate Security Solution For Data At Rest

Agenda Introduction Information Security Challenges Dell Simplifies Security Trusted Drive Technology Seagate Momentus 5400 FDE.2 Disc Drives Wave Systems EMBASSY Trusted Drive Manager and Remote Administration Server

Information Security The need for data protection at the endpoint Virtually all companies are vulnerable to loss of data Data is the company, and increasingly, data can be put anywhere The client device is becoming the main threat vector for security Diverse mobile workforce Users need real-time access to data, sometimes sensitive data Variety of users with access to critical data that cannot be exposed Lost information on client devices Laptop thefts have become an epidemic Increased mobility leads to increased risk of loss or theft of devices

Information Security Broad set of information security challenges Maintaining regulatory compliance Compliance is a mandate, whether you want to do it or not Safekeeping of customer data Loss of data could expose personal information of thousands, or even millions, of customers, placing them at risk for identity theft Ensuring internal security policies Organizational check and balance against maintaining compliance Protecting corporate intellectual property Fundamental requirement of management s job

Regulatory Compliance Navigating the sea of regulations and standards Regulations and standards on the rise Personal Privacy HIPAA Gramm-Leach-Bliley CA SB 1386 PCI Corporate Governance Sarbanes-Oxley J-SOX, Euro SOX International Trade MiFID Source: Gartner, Inc. Hype Cycle for Regulations and Related Standards 2007 by French Caldwell et al, January 15, 2007

Regulatory Compliance A closer look at data protection legislation State Sample of State Notice of Breach Laws Law Potential Safe harbor for encrypted data Arkansas A.C.A. 4-110-105, SB 1167 Yes California Cal. Civ. Code 1798.82, SB 1368 Yes Connecticut Conn. Gen Stat. 36A701(b) Yes Illinois 815 Ill. Comp. Stat. 530/I Yes Minnesota Minn. Stat 325E.61, HF 2121 Yes Nevada Nev. Rev. Stat. 603 A.220, SB 347 Yes New York N.Y. Gen Bus. Law 899-aaA-4254, A-3492 Yes Many states have potential safe harbor rules for Notice of Breach laws Proving your data was encrypted, at the time the device was stolen, can avoid the need for your organization to publicly disclose the breach For general information only. Always consult an attorney for advice regarding compliance with these laws

Analyst Quotes Encryption of all sensitive information on notebooks should be considered mandatory Gartner, Inc. Windows Vista BitLocker: Good, but Not Great by Jeffrey Wheatman and Neil MacDonald, January 5, 2007 Companies should select systems that provide centralized policy management, comprehensive reporting and automated policy enforcement. Aberdeen, 2006 Given that encryption everywhere will shortly become a reality, the issue then becomes one of managing the encryption infrastructure The 451 Group, Dec 2006

Why Don t Organizations Encrypt? The primary reasons cited for not encrypting sensitive or confidential information according to the survey: System Performance 69% Complexity 44% Cost 25% FDE software places a heavy processing burden on the hard drive and CPU Installation and maintenance can be a complex and time consuming process The true cost is in the IT resources required to maintain the solution * Ponemon Institute s 2005 National Encryption Survey

Dell Data Protection: Different Constituents, Different Needs C Level Executive Compliance Compliance Compliance User Easy Fast Invisible IT Staff Secure Low Cost Manageable

Dell Simplifies Data Security 1 st in the industry to deliver a managed end-to-end hardware encrypting solution Performance By integrating the encryption process on the drive controller itself, there is no performance penalty for the end user Ease of Use Easy to set up, always turned on, and easy to provide audit reporting for compliance purposes Strength of security By placing the encryption keys in the hardware, the keys simply do not exist outside of the hard drive Lower ownership costs Integration with Active Directory limits on-going management costs

Dell Data Security Solution For Mobile Users Dell Latitude or Precision Notebook Seagate Momentus 5400 FDE.2 HDD Wave Trusted Drive Manager Wave Embassy Remote Administration Server Implementation of Dell s Security Best Practices The World s Most Secure Commercial Notebook

Evolution of Data Protection: Migration to Hardware History has shown that technology optimization naturally migrates from software applications to hardware in core computing functions. Data protection is no different. Application Layer Software FDE OS Integration Vista BitLocker / EFS Hardware Integration Hardware Encrypting Drives Fast, Simple, Low Cost!

Seagate Momentus 5400 FDE.2 Disc Drives Protecting Your Data Where It Lives Industry Leading Storage 80GB & 120GB 2.5 Disc Drive Perpendicular recording technology SATA 1.5 Gb/s Momentus 5400 FDE.2 Drive Solution for lost or stolen notebooks High performance encryption Strong hardware security ideal closed cryptographic storage system Instant Cryptographic Erase DriveTrust Technology Hardware encryption AES 128 bit Integrated access control Protected storage partitions

The Trusted Drive Solution Wave Software Delivers Strong pre-boot access control Simple user interface Advanced administrative controls Centralized remote management Activity logs for auditing and compliance validation Seagate DriveTrust Technology Embassy Trusted Drive Manager Embassy Remote Administration Server

EMBASSY Trusted Drive Manager Life Cycle Management of FDE Drives Initialize DriveTrust functions User management Add user Delete user Unlock drive Security Policy Management Lock enable/disable Instant cryptographic erase Backup/recovery passwords Reset drive Pre-boot authentication Remote/Automated functions Remote management/initialization Recovery agent Conformance checking / logging

Simple User Experience Drive is locked at power up FDE Drive Authentication Screen Authentication screen is displayed User selects their User ID and enters Password Drive unlocks and Windows boots normally Benefit: User interface is easy, simple, and invisible when unlocked

EMBASSY Remote Admin Server Centralized management and policy control Integration with identity, policy, and management infrastructures Active Directory Group Policy Objects Zero Touch remote management GUI Scripts ERAS Server Engine MIB ERAS Supports FDE drives and TPMs Enterprise WMI Infrastructure Audit and transaction logs for compliance Organizational Unit Organizational Unit Organizational Unit Organizational Unit

Simplify Solution Deployment ERAS Software Configuration Bundle On-Site Training + Wave ERAS server = Simplified Deployment of Hardware Encryption Solution Configuration and Training package includes 20 User license of Wave Embassy Remote Administration Server One day on-site training & support from a Wave engineer Benefit: Configuration of 20 clients Training to install & configure the Trusted Drive Manager and ERAS software for additional clients Instructions for ordering additional software licenses from Dell Guidelines on how to get software support from Wave Systems In as little as 2 to 4 weeks, you will have a centrally managed, end-to-end hardware encryption solution

How do I get it? Dell notebooks, with Seagate FDE drives and Wave s EMBASSY Trusted Drive Manager, are currently available on Dell Latitude D531, D630, ATG, D830 and Precision Mobile M4300 and M6300 models. The Wave Embassy Remote Administration Server software, and ERAS Software Configuration Bundle, are available today from your Dell account team. Customer kits will be made available in January 2008.