Allstate Insurance Company s Local Data Protection (LDP) Project



Similar documents
Understanding Northwestern University s contract with Symantec. Symantec Solutions for Cost Reduction & Optimization

Chapter 1 Scenario 1: Acme Corporation

Full Disk Encryption Drives & Management Software. The Ultimate Security Solution For Data At Rest

Securing Corporate Data and Making Life Easier for the IT Admin Benefits of Pre Boot Network Authentication Technology

2009 NASCIO Recognition Awards Nomination. A. Title: Sensitive Data Protection with Endpoint Encryption. Category: Information Security and Privacy

IBM Data Security Services for endpoint data protection endpoint encryption solution

PC Power Management FAQ

ManageEngine Desktop Central Training

Red Hat VDI. David Simmons

The Encryption Anywhere Data Protection Platform

Learning Objectives. Chapter 1: Networking with Microsoft Windows 2000 Server. Basic Network Concepts. Learning Objectives (continued)

Kaspersky Lab s Full Disk Encryption Technology

Security Considerations for DirectAccess Deployments. Whitepaper

Innovative Secure Boot System (SBS) with a smartcard.

24/7 Monitoring Pro-Active Support High Availability Hardware & Software Helpdesk. itg CloudBase

I. Introduction. An SHI International Corp White Paper IT Outlaw: Making VDI Friendly

ScoMIS Encryption Service

S E A h a w k C r y p t o M i l l CryptoMill Technologies Ltd.

1. System Requirements

How to use the Alertsec Service to Achieve HIPAA Compliance for Your Organization

VDI can reduce costs, simplify systems and provide a less frustrating experience for users.

Full disk encryption with Sophos Safeguard Enterprise With Two-Factor authentication of Users Using SecurAccess by SecurEnvoy

Contingency Access to Enterprise Encrypted Data

Enterprise Key Management: A Strategic Approach ENTERPRISE KEY MANAGEMENT A SRATEGIC APPROACH. White Paper February

ScoMIS Encryption Service

WebArrow: System Overview and Architecture Namzak Labs White Paper,

s Software as a Service (SaaS) offering: T-Suite Making your hard costs soft

Library Recovery Center

REDCENTRIC MANAGED BACKUP SERVICE SERVICE DEFINITION

SyAM Software Management Utilities. Creating Templates

WARNING!!: Before installing Truecrypt encryption software on your

CHOOSING THE RIGHT PORTABLE SECURITY DEVICE. A guideline to help your organization chose the Best Secure USB device

Overview. Timeline Cloud Features and Technology

Installing the software

Kaseya IT Automation Framework

Division of Administration (DOA) Desktop Support

DriveLock and Windows 7

Citrix XenDesktop Backups with Xen & Now by SEP

Hosting services. Managed hosting delivering your applications anywhere, 24x7 Ensuring the right experience, security and availability.

Evergreen Solutions Lowering the cost of EHR ownership

Citrix XenServer Backups with Xen & Now by SEP

ORACLE DATABASE 10G ENTERPRISE EDITION

FDE Performance Comparison. Hardware Versus Software Full Drive Encryption

Navigating Endpoint Encryption Technologies

Disk-to-Disk-to-Offsite Backups for SMBs with Retrospect

Guidelines on use of encryption to protect person identifiable and sensitive information

INTRODUCTION ADVANTAGES OF RUNNING ORACLE 11G ON WINDOWS. Edward Whalen, Performance Tuning Corporation

Using BitLocker As Part Of A Customer Data Protection Program: Part 1

Odyssey Access Client FIPS Edition

Comprehensive Endpoint Security

Supplier Information Security Addendum for GE Restricted Data

RSA Authentication Agent 7.2 for Microsoft Windows Installation and Administration Guide

SecureDoc for Mac v6.1. User Manual

EnCase Forensic Product Overview

ZENworks 11 Support Pack 4 Full Disk Encryption Agent Reference. May 2016

ThinkPad USB Portable Secure Hard Drive User Guide

Intel Enhanced Data Security Assessment Form

WinMagic Data Security Enterprise Full Disk Encryption Solutions

Best Practice Document Hints and Tips

Lumension Endpoint Management and Security Suite (LEMSS): Patch and Remediation

Whitepaper Enhancing BitLocker Deployment and Management with SimplySecure. Addressing the Concerns of the IT Professional Rob Weber February 2015

Assessing the Security of Hardware-Based vs. Software-Based Encryption on USB Flash Drives

Using WMI Scripts with BitDefender Client Security

Virtualization Support - Real Backups of Virtual Environments

Symantec Desktop and Laptop Option 7.6

Full Drive Encryption Security Problem Definition - Encryption Engine

Backup and Recovery FAQs

Symantec Enterprise Vault.cloud Overview

DPMS2 McAfee Endpoint Encryption New Installation

How to enable Disk Encryption on a laptop

Only 8% of corporate laptop data is actually backed up to corporate servers. Pixius Advantage Outsourcing Managed Services

2.6.1 Creating an Acronis account Subscription to Acronis Cloud Creating bootable rescue media... 12

Security Management. Keeping the IT Security Administrator Busy

Central Agency for Information Technology

Goverlan Remote Control

Two-factor authentication Free portable encryption for USB drive Hardware disk encryption Face recognition logon

Storage Guardian Remote Backup Restore and Archive Services

SafeGuard Enterprise Administrator help. Product version: 6.1

Server-Hosted Virtual Desktop Infrastructure (VDI)

USER-MANAGED FILE SERVER BACKUP:

Information Technology Services

The Danwood Group Professional Services Offering DANWOOD

Protezione dei dati. Luca Bin. EMEA Sales Engineer Version 6.1 July 2015

How to Turn the Promise of the Cloud into an Operational Reality

Transcription:

Allstate Insurance Company s Local Data Protection (LDP) Project A Case Study Laptop Encryption Eric V. Leighninger Chief Security Architect Allstate Insurance Company

PD1 Agenda Allstate and information security A snapshot view Laptop encryption goals, expectations, priorities Technology acquisition Vendor selection process Vender solution deployment Lessons learned

Slide 2 PD1 As with the rest of this template, this is a suggested agenda that may or may not fit your situation. Please feel free to make changes as you see fit, including adding and changing pages - this is only a template. In general, the idea is to educate folks on the technology challenge you faced, how you addressed it, and the business benefits the project ultimately delivered - or failed to deliver, as the case may be. Keep in mind that people can learn a lot by hearing what went wrong with your project, so don't be afraid to mix the bad with the good. Paul Desmond, 9/28/2006

PD2 Allstate A Snapshot Allstate Insurance Company Founded in 1931 as part of Sears, Roebuck & Co, and became a publicly traded company in 1993 Nation s largest publicly held personal lines insurer with nearly 40,000 employees Providing personal financial services and managing risk for our customers Providing insurance and financial products to more than 17 million households More than 14,000 agents and financial specialists, and their licensed sales professionals Over 1,000 exclusive financial specialists who provide life insurance and financial products

Slide 3 PD2 As with all labels in this template, please replace these with your own. i.e.: Manufacturing company 2,000 employess Offices in 23 states Conservative with respect to technology; low tolerance for risk Paul Desmond, 9/28/2006

Allstate s Vision for Information Security Aligned with corporate and technology strategy Security solutions prioritized based upon risk Operational excellence

Local Data Protection - Goals Reduce risk of exposure Minimize recovery and support costs Ensure compliance Enable productivity and ease of Use Leverage investment in existing IT infrastructure

Local Data Protection Priorities Policy holder and applicant data Employee data PHI Credit card numbers Confidential data Financial information pre earnings release Communications to competitors, partners and suppliers Source code Competitive sensitive information

Local Data Protection Multiple Facets Full disk encryption Laptops Desktops Encryption of removable media USB-enabled Devices Flash Drives, ipods, Bluetooth Devices, Thumb Drives, Hard Disks CD/DVD Writers Password and PIN controls Blackberry Other PDA Devices Standards and guidelines for encryption

Laptop Full Disk Encryption Evaluation Step 1: Using the local data protection goals and solution selection criteria Performed paper analysis of top Gartner Magic Quadrant full disk encryption vendors Interviewed vendors regarding respective product functionality Step 2: Performed hands-on product evaluation per our technology evaluation process at Allstate for candidate vendor Pointsec Step 3: Based on in-house evaluation results Allstate purchased the following Pointsec products: Pointsec for PC [now Check Point Endpoint Security Full Disk Encryption] Pointsec Media Encryption (PME) [now Check Point Endpoint Security Media Encryption] webrh

Encryption Solution Selection Criteria Selection Criteria Strong approved cryptography algorithms (AES) Strong approved cryptography algorithms (AES) Encrypts entire disk (all disk sectors) Encrypts entire disk (all disk sectors) Strong Key (min 128 bits) storage & exchange methods Strong Key (min 128 bits) storage & exchange methods Meet Federal Standards Ability to control data viewing privileges Meet Federal Standards Ability to control data viewing privileges of administrators and Contingent workers. of administrators and Contingent workers. Separation of administrator s ability to access or manage encryption keys. Separation of administrator s ability to access or manage encryption keys. Storage of encrypted keys separately from the encrypted data. Storage of encrypted keys separately from the encrypted data. Audit & Reporting Capabilities Audit & Reporting Capabilities Mandatory access control feature Mandatory access control feature Central Management (GUI) Central Management (GUI) Low performance degradation Low performance degradation Encryption should take approximately 10 GB per hour regardless of amount of information Encryption should take approximately 10 GB per hour regardless of amount of information on the hard drive on the hard drive 1-3% noticeable system performance degradation after disk is fully encrypted 1-3% noticeable system performance degradation after disk is fully encrypted Key Recovery (primary (onsite), remote (offsite) and DR) Key Recovery (primary (onsite), remote (offsite) and DR) Interoperability with current Enterprise software Interoperability with current Enterprise software Support removable media Support removable media Fast robust, reliable initial encryption Fast robust, reliable initial encryption Ease of Implementation ( SMS Package) Ease of Implementation ( SMS Package) Guaranteed installation Guaranteed installation User may not un-install without Administrator approval User may not un-install without Administrator approval Lowers total cost of ownership (configure and forget) Lowers total cost of ownership (configure and forget) Architected cryptographically secure Infrastructure Architected cryptographically secure Infrastructure Integration into current environment easily Integration into current environment easily Throttled background encryption service Throttled background encryption service Low priority process Low priority process Allows other applications priority to access processor Allows other applications priority to access processor Fault tolerant Fault tolerant User may shut down during encryption process User may shut down during encryption process Power outage does not effect encryption process Power outage does not effect encryption process Suspend, hibernation, mouse support Suspend, hibernation, mouse support

Laptop Full Disk Encryption Solution Rationale Pointsec for PC provided the following advantages to Allstate: Strong security model Leveraged our current SMS infrastructure for deployment and management Supported Allstate s current Image and Break-Fix processes Did not require alteration or replacement of key Windows components: Windows Master Boot Record and the Windows GINA Size of installed base of users Attractive product TCO

Pointsec Security Model

Pointsec Full Disk Encryption Features Pointsec for PC is a Full Disk Encryption (FDE) product operating on a Full Volume Encryption (FVE) principle, therefore ensuring that all data stored on the laptop is encrypted Encryption is done at the Window s Filter Driver level and is seamless to the applications running on the laptop Any access to the laptop from a network connection will see the data in clear text Initial encryption of the hard drive averages about 15GB/hour and is done in the background as the user performs normal activity This process can be interrupted and will restart where it left off Pointsec will throttle the resources needed for initial encryption based on available CPU Additional overhead once the volumes are encrypted is negligible When a laptop goes into sleep mode or standby, initial volume encryption will stop

Pointsec Installation Model

Pointsec Installation Key Considerations Pointsec administration requires the set up of the centralized file server as well as the creation of profiles for user configuration MSI installation, 10MB package Management of files will be in a flat hierarchy file share environment Each machine will act as an intelligent client that stores and gathers information to and from a centralized location while being transparent to the end user Unique key for each device that s created automatically at installation Information transferred between the client and the file share server is encapsulated in very small files which are approximately 10k-40K in size, and encrypted with the specified algorithm Administrators will be capable of managing security settings, update software versions, and view user logs from the central location To ensure recovery information is available to Help desk staff, it is essential that this directory be regularly backed up

Laptop Full Disk Encryption Deployment A pilot was completed successfully for over 60 users from Information Security, Internal Audit, Treasury & Planning, Privacy, Protection, Enterprise Technology, Enterprise Infrastructure, and Senior Officer Group The following Pointsec products were purchased by Allstate: Pointsec for PC, Pointsec Media Encryption (PME), and webrh Final pre-deployment enterprise testing was conducted to test product enhancements and updates requested by Allstate Allstate Claims organization was the first production rollout group

Laptop Full Disk Encryption Deployment Full disk encryption was first deployed to approximately 10,000 laptops in areas within the company identified as handling high value data Claims Executive Agency Law & Regulation Finance & Treasury HR Litigation Investments Full disk encryption is in the process of being deployed to all Allstate owned and managed laptops running latest base image, approximately18,500 laptops Laptops running earlier base image and Desktops, an approximate total of 70,000 machines, will be addressed this year

Laptop Full Disk Encryption Timeline

Lessons Learned Timely and beneficial technology Laptop encryption capability has provided increased assurance and has reduced the risk associated with laptop loss or compromise Three suggestions Establish clear data protection goals, criteria and policies particularly for encryption and key management Establish a communications plan for systematic and smooth deployment of encryption software Do your homework on vendor capabilities versus organizational needs Most significant lesson: Rapid pilot to production deployments are possible when requirements are clear and there is clear alignment of technology strategy and management objectives