Securing Corporate Data and Making Life Easier for the IT Admin Benefits of Pre Boot Network Authentication Technology



Similar documents
A Guide to Managing Microsoft BitLocker in the Enterprise

Protecting Personally Identifiable Information (PII) Data Encryption for the Emergency Services Sector (ESS)

Protecting Student and Institutional Privacy Data Encryption for Education

How to use the Alertsec Service to Achieve HIPAA Compliance for Your Organization

Kaspersky Lab s Full Disk Encryption Technology

Encryption as a Cloud Service provides the lowest TCO

What Consumers Believe About Cloud File Sharing & Why That s a Warning to IT Pros

CHOOSING THE RIGHT PORTABLE SECURITY DEVICE. A guideline to help your organization chose the Best Secure USB device

YOUR DATA UNDER SIEGE. DEFEND IT WITH ENCRYPTION.

BEST PRACTICES. Encryption.

Two factor strong authentication. Complex solution for two factor strong authentication

Navigating Endpoint Encryption Technologies

DriveLock and Windows 7

Global security intelligence. YoUR DAtA UnDeR siege: DeFenD it with encryption. #enterprisesec kaspersky.com/enterprise

Chapter 1 Scenario 1: Acme Corporation

For your eyes only - Encryption and DLP Erkko Skantz

Convenience and security

The 12 Essentials of PCI Compliance How it Differs from HIPPA Compliance Understand & Implement Effective PCI Data Security Standard Compliance

BEST PRACTICE GUIDE TO ENCRYPTION.

The True Story of Data-At-Rest Encryption & the Cloud

Choosing an SSO Solution Ten Smart Questions

PGP Whole Disk Encryption Implementation

SafeNet Data Encryption and Control. Securing data over its lifecycle, wherever it resides from the data center to endpoints and into the cloud

SafeNet Data Encryption and Control. Securing data over its lifecycle, wherever it resides from the data center to endpoints and into the cloud

Using BitLocker As Part Of A Customer Data Protection Program: Part 1

Driving Company Security is Challenging. Centralized Management Makes it Simple.

IDENTITY & ACCESS. Privileged Identity Management. controlling access without compromising convenience

Data Encryption Demystified: Seven Common Misconceptions and the Solutions That Dispel Them

Innovative Secure Boot System (SBS) with a smartcard.

Full Disk Encryption Drives & Management Software. The Ultimate Security Solution For Data At Rest

New Drive Technologies Enable Strong Data Protection Strategies: Managing Self-Encrypting Drives in the Enterprise

A Comprehensive Plan to Simplify Endpoint Encryption

Protecting Your Data On The Network, Cloud And Virtual Servers

Entrust Secure Web Portal Solution. Livio Merlo Security Consultant September 25th, 2003

Mobile Data Security Essentials for Your Changing, Growing Workforce

SecureD Technical Overview

Oracle Enterprise Single Sign-on Technical Guide An Oracle White Paper June 2009

SecureDoc for Mac v6.1. User Manual

7 VITAL FACTS ABOUT HEALTHCARE BREACHES.

HIPAA Security Alert

How Cloud Computing Can Accelerate Endpoint Encryption:

How Endpoint Encryption Works

Securing Virtual Desktop Infrastructures with Strong Authentication

McAfee Endpoint Encryption (SafeBoot) User Documentation

The Impact of HIPAA and HITECH

etoken Single Sign-On 3.0

DriveLock and Windows 8

PGP Whole Disk Encryption Training

Sample Data Security Policies

Pointsec Enterprise Encryption and Access Control for Laptops and Workstations

Top Five Ways to Protect Your Network. A MainNerve Whitepaper

Real World Healthcare Security Exposures. Brian Selfridge, Partner, Meditology Services

ScoMIS Encryption Service

Check Point FDE integration with Digipass Key devices

Endpoint Virtualization for Healthcare Providers

Internet threats: steps to security for your small business

Protecting personally identifiable information: What data is at risk and what you can do about it

Enterprise Data Protection

More Expenses. Only this time the Telegraph will have to pay them after their recent data breech

End User Devices Security Guidance: Apple OS X 10.10

STRONGER AUTHENTICATION for CA SiteMinder

TOP FIVE RECOMMENDATIONS FOR ENCRYPTING LAPTOP DATA A BEST PRACTICES GUIDE

HOW TO REALLY IMPLEMENT HIPAA. Presented by: Melissa Skaggs Provider Resources Group

Addressing the Data Protection Requirements of the HITECH Act

e-governance Password Management Guidelines Draft 0.1

Enabling Fast and Secure Clinician Workflows with One-Touch Desktop Roaming W H I T E P A P E R

White Paper. Anywhere, Any Device File Access with IT in Control. Enterprise File Serving 2.0

Are You in Control? MaaS360 Control Service. Services > Overview MaaS360 Control Overview

Protecting Your Business from Costly Data Theft: Why Hardware-Based Encryption Is the Answer

SUBJECT: SECURITY OF ELECTRONIC MEDICAL RECORDS COMPLIANCE WITH THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA)

Privacy 101. A Brief Guide

White paper Security Solutions Advanced Theft Protection (ATP) Notebooks

Health Insurance Portability and Accountability Act (HIPAA) and Health Information Technology for Economic and Clinical Health Act (HITECH)

Remote Access Securing Your Employees Out of the Office

SecureAge SecureDs Data Breach Prevention Solution

Encrypting Personal Health Information on Mobile Devices

Enterprise Solution for Remote Desktop Services System Administration Server Management Server Management (Continued)...

Firmware security features in HP Compaq business notebooks

Disk Encryption. Aaron Howard IT Security Office

For Managing Central Deployment, Policy Management, Hot Revocation, Audit Facilities, and Safe Central Recovery.

Preemptive security solutions for healthcare

Information Security It s Everyone s Responsibility

Endpoint Security VPN for Mac

Card Management System Integration Made Easy: Tools for Enrollment and Management of Certificates. September 2006

ZENworks 11 Support Pack 4 Full Disk Encryption Agent Reference. May 2016

McAfee EETech for Mac 6.2 User Guide

Enterprise Single Sign-On City Hospital Cures Password Pain. Stephen Furstenau Operations and Support Director Imprivata, Inc.

Two-factor authentication Free portable encryption for USB drive Hardware disk encryption Face recognition logon

Strong Authentication. Securing Identities and Enabling Business

Permeo Technologies WHITE PAPER. HIPAA Compliancy and Secure Remote Access: Challenges and Solutions

Mobility, Security and Trusted Identities: It s Right In The Palm of Your Hands. Ian Wills Country Manager, Entrust Datacard

Guidance End User Devices Security Guidance: Apple OS X 10.9

Solutions for Health Insurance Portability and Accountability Act (HIPAA) Compliance

Copyright Giritech A/S. Secure Mobile Access

Frequently Asked Questions (FAQs) SIPRNet Hardware Token

Intel Enhanced Data Security Assessment Form

Protecting Data-at-Rest with SecureZIP for DLP

9 Steps to Data Security

Data Protection Act Bring your own device (BYOD)

Sygate Secure Enterprise and Alcatel

Transcription:

20140115 Securing Corporate Data and Making Life Easier for the IT Admin Benefits of Pre Boot Network Authentication Technology

TABLE OF CONTENTS What s at risk for your organization? 2 Is your business secure? 3 What is pre-boot network authentication (PBNA)? 4 Cranking security up a notch 4 Benefits of PBNA 5 How WinMagic can help 6 Benefits of Pre Boot Network Authentication Technology 1

Since 2013, more than 660 million records have been compromised in data breaches What s at risk for your organization? Every company, regardless of size, has confidential information that needs to be protected. With data breach incidents happening on an almost weekly basis, organizations must take the necessary precautions to ensure their data is secure. But how many organizations are truly making efforts to keep their data safe? Imagine two employees have their laptops stolen out of the back of their cars. These laptops contain the personal information of over 800,000 end customers. Now the company has to ask itself; Is the data on that laptop secure? Is it password protected? More importantly, is it encrypted? If the answer was no to any of those questions, as a business, can they afford what will come next? Is it a mass customer exodus? A class action lawsuit? A criminal investigation for violation of local data protection laws and regulations? This list goes on. The scary part about the previous scenario is that it was real and it was what some consider a small data breach. What if it was the information of 2 million customers? Can your business afford that? Since 2013, more than 660 million records have been compromised in data breaches according to The Privacy Rights Clearinghouse Chronology of Data Breaches (www. privacyrights.org, December 2013). It s a staggering number; more than a half a billion records and those are only the breaches that have been made public. Now, more than ever, securing information has become part of the cost of doing business. While passwords, biometrics, smart cards and other tokens have added a huge level of security, the fact is they can be cracked and once they are, the data is exposed. Benefits of Pre Boot Network Authentication Technology 2

Is your business secure? Often, IT departments are faced with a number of challenges as it relates to security how do we keep costs low, while ensuring IT administrators are efficient and end user experiences are unaffected all while keeping corporate data secure? The fact that governments around the world have or are implementing specific data privacy legislation only adds to the impetus for business data security measures to fall in line. Whether it s the European Union s Data Protection Directive, the United States Health Insurance Portability and Accountability Act (HIPAA), Health Information Technology for Economic and Clinical Health Act (HITECH), Payment Card Industry (PCI) Data Security Standard, the U.K. s Data Protection Act or Canada s Personal Information Protection and Electronic Documents Act (PIPEDA), there s very little flexibility for businesses not to adhere to these policies. For businesses that are determining the best way to deploy a solution that will secure all access points for information, there are a number of things they have to consider: Can they fully encrypt every device that connects to the network regardless of the operating system? Can the solution be centrally managed by an IT administrative team? Can removable media such as USB Drives, SD cards etc. be encrypted? Can sensitive files and folders on endpoints or servers be protected with an additional layer of security? Can policies be enforced on devices to ensure the right user is getting access to the right information and nothing more than what they need? Can pre-boot authentication be enabled to add an extra layer of security? Can IT easily manage the system and are there effective and efficient ways to support end users for things such as password recovery? Can you separate system from security administration in order to reduce the risk in case of malicious administrators? Benefits of Pre Boot Network Authentication Technology 3

An administrator could remotely lock out an employee that just left the company without having direct access to his/her device While this is a small list, it s critical and by no means complete. It s why full disk encryption (FDE) is so important these days. Many businesses may already use encryption in their organization but data security can be enhanced by adding a new layer to their FDE solution, preboot network authentication (PBNA). What is Pre-boot network authentication (PBNA)? What is PBNA? Pre-boot networking provides a means for authenticating encrypted devices to the network before the operating system ever loads. Simply put, it means that before any data on a device is decrypted and a user granted access, the user must input credentials (a password) that are verified by a network connected server and then allow the user to log-on to a device and start the operating system (OS) log-in process. It means data is never exposed until the user credentials are verified before the standard OS log-in process. Cranking security up a notch Why is PBNA important? As good as standard device encryption is, it s fallible; there s always a risk regardless of the solution deployed. Instead of relying solely on user credentials stored locally on a given device which can be out of date, the authentication process leverages the most current policies available from the severs managing user access. So if necessary, an administrator could remotely lock out an employee that just left the company without having direct access to his/her device. That said, PBNA offers much more than just end point security. It enables businesses to manage groups and really control how, what, when and where users access information via policy controls. For example, in a hospital, a typical work terminal has more than one person logging onto a system on any given day. PBNA enables the IT administrators to take advantage of Active Directory server settings that set different access policies for different users. Nurses would need access to limited views of all patient data in a particular ward. Doctors would need detailed patient data on only their patients. If a pediatric nurse moves to the obstetrics ward, a simple Active Directory change by the administrators would mean the nurse could seamlessly log into the right part of the IT network at the hospital without any interruptions. How would this be controlled? Using PBNA would mean that when the user turns on the terminal and tries to log-on, their credentials would be vetted against existing Active Directory policies which will then grant the user appropriate access to the system. Benefits of Pre Boot Network Authentication Technology 4

Benefits of PBNA The aforementioned example is a very simplified version of how this would work, but the benefits of PBNA are significant and can be summed up into three categories: 1. Total cost of ownership is reduced 2. IT admin and end-user experience is seamless and non-invasive 3. Enhanced security for the organization Lower total cost of ownership Organizations spend an average of $70 to stage and provision a single device for employee usage (Ponemon Study - The TCO for Full Disk Encryption, July 2012). In the hospital example mentioned, IT administrators using PBNA no longer have to go from terminal to terminal in the obstetrics ward to grant access to the nurse, thereby greatly reducing time and costs. With a simple change in Active Directory from the IT administrator s desk, the nurse is granted access to all the new terminals seamlessly and quickly. Efforts on password resets are also greatly minimized as PBNA allows administrators to conduct these activities at their desk through the use of Active Directory. End users are able to call their administrators at their desks and within a few minutes, have their passwords reset through remote prompts from their IT administrators and gain access to their laptops/desktops. A typical process that would ve taken 20 minutes can now be reduced to 5 minutes. (Ponemon Study - The TCO for Full Disk Encryption, July 2012). Not only is the complexity of provisioning users and policies and solving support issues greatly reduced; there is also a huge cost saving as IT administrators become more efficient and spend less time provisioning systems individually and solving everyday issues such as password resets. Seamless end-user experience IT admins are not the only ones that can benefit from PBNA. With auto boot activated, end users can access any approved systems using only one password. Once they are in, they will be able to utilize all authorized programs with virtually no impact to the speed and performance to their work station. Enhanced security One of the most notable benefits of PBNA is the increased security it offers. When using the standard boot process for a PC, protection is reduced to what is provided by basic Windows security. If that s all the system relies on, it means the data encryption key has already been exposed in the computer s memory and is therefore vulnerable to attack. PBNA avoids this type of issue by authenticating the computer before the operating system is booted and before the encryption key is vulnerable. Additionally, PBNA also offers policy protection. It gives IT Admins the ability to set up management guidelines surrounding device data protection in the pre-boot environment. System updates and policies can be installed without risking security due to requirements to skip authentication on reboots. Benefits of Pre Boot Network Authentication Technology 5

How WinMagic can help WinMagic s SecureDoc is a highly secure, yet flexible data security solution that enables businesses to comply with privacy and security regulations by protecting sensitive data residing in laptops, desktops, servers and on removable media. Easily deployed, SecureDoc maintains end user productivity and ensures maximum security and transparency in regular work flow while allowing businesses to deal with the heterogeneous nature of their IT environment. SecureDoc places all security-related management under one centralized enterprise server including policies, password rules, and the manageability of encryption across PC, Mac and Linux platforms alike. SecureDoc is the only data encryption and management solution that allows for pre-boot network authentication through its PBConnex feature. PBConnex utilizes network based resources to authenticate users, enforce access controls, and manage end point devices before the operating system loads. This unique and ground-breaking approach to Full Disk Encryption (FDE) management results in significant cost savings for organizations by streamlining both IT management and end user functionality. PBConnex enables users the convenience of auto-boot with the security of pre-boot authentication. WinMagic is the first FDE vendor to integrate secure network support into the pre-boot environment. If you would like to learn more about WinMagic Inc., SecureDoc and PBConnex, please visit www.winmagic.com. Benefits of Pre Boot Network Authentication Technology 6

WinMagic provides the world s most secure, manageable and easy-to-use data encryption solutions. With a full complement of professional and customer services, WinMagic supports over 5 million SecureDoc users in approximately 84 countries. We can protect you too. For more information on SecureDoc Enterprise Server contact sales@winmagic.com or visit our website to access a number of valuable resources: PRODUCT PAGE http://www.winmagic.com/products WHITE PAPERS http://www.winmagic.com/resource-centre/white-papers CONTACT SOCIAL MEDIA WinMagic Inc. Phone: 905. 502. 7000 Fax: 905. 502. 7001 http://blog.winmagic.com/ Toll Free: 888. 879. 5879 sales@winmagic.com www.winmagic.com http://www.facebook.com/winmagicinc http://www.linkedin.com/company/winmagic http://twitter.com/winmagic http://www.youtube.com/user/winmagicinc WANT TO TRY OUR SOFTWARE? CLICK HERE TO REQUEST A FREE EVALUATION Benefits of Pre Boot Network Authentication Technology 7