2014 All Rights Reserved ecfirst An ecfirst Case Study: Encryption
TABLE OF CONTENTS EXECUTIVE SUMMARY... 4 MCAFEE TOTAL PROTECTION... 6 PRODUCT OVERVIEW... 6 STRENGTHS... 6 FEATURES... 6 REFERENCES... 8 SOPHOS SAFEGUARD ENTERPRISE... 9 PRODUCT OVERVIEW... 9 WHY SOPHOS?... 9 STRENGTHS... 10 FEATURES... 10 BENEFITS... 11 REFERENCES... 11 CHECK POINT FULL DISK ENCRYPTION... 12 PRODUCT OVERVIEW... 12 STRENGTHS... 12 FEATURES... 12 BENEFITS... 13 HIPAA SAFEGUARDS... 13 REFERENCES... 14 SYMANTEC DRIVE ENCRYPTION... 15 PRODUCT OVERVIEW... 15 FEATURES:... 15 BENEFITS:... 16 REFERENCES... 16 REGARDING THE GARTNER... 17 2014 All Rights Reserved ecfirst 2
COMPARISON OF GARTNER, CHECK POINT SOFTWARE, MCAFEE, SYMANTEC WITH SOPHOS SAFEGUARD ENCRYPTION... 17 COMPARISON MATRIX... 18 2014 All Rights Reserved ecfirst 3
EXECUTIVE SUMMARY Sensitive data is constantly at risk of loss, theft, and exposure. Many times, the data simply walks right out the front door on a laptop or USB device. Companies that suffer such a data loss risk serious consequences, including regulatory penalties, public disclosure, brand damage, customer distrust, and financial losses. According to a recent Ponemon Institute report, seven percent of all corporate laptops will be lost or stolen sometime during their useful life. In addition, the rapid proliferation of mobile devices with large storage capacities and oftentimes Internet access is opening up even more channels for data loss or theft, so protecting sensitive, proprietary, and personally identifiable information must be a top priority Encryption is a way to enhance the security of a message or file by scrambling the contents so that it can be read only by someone who has the right encryption key to unscramble it. For example, if you purchase something from a website, the information for the transaction (such as your address, phone number, and credit card number) is usually encrypted to help keep it safe. In this case study comparatively analyzes the following industry for encryption Protection. McAfee Total Protection Sophos Safeguard Encryption Check Point Software Technologies Symantec Drive Encryption About McAfee McAfee, a wholly owned subsidiary of Intel Corporation (NASDAQ: INTC), empowers businesses, the public sector, and home users to safely experience the benefits of the Internet. The company delivers proactive and proven security solutions and services for systems, networks, and mobile devices around the world. With its visionary Security Connected strategy, innovative approach to hardware-enhanced security, and unique global threat intelligence network, McAfee is relentlessly focused on keeping its customers safe. 2014 All Rights Reserved ecfirst 4
About Sophos Sophos is a developer and vendor of security software and hardware, providing endpoint, encryption, email, web, mobile and network security as well as Unified Threat Management products. Sophos is largely focused on providing security to organizations and businesses. Sophos Labs is the company's global network of threat analysis centres. About Check Point Software Technologies Check Point Software Technologies Ltd. (www.checkpoint.com), the worldwide leader in securing the Internet, provides customers with uncompromised protection against all types of threats, reduces security complexity and lowers total cost of ownership. Check Point is the only vendor to go beyond technology and define security as a business process. Check Point 3D Security uniquely combines policy, people and enforcement for greater protection of information assets and helps organizations implement a blueprint for security that aligns with business needs. About Symantec Encryption Symantec s encryption solutions enable organizations to deliver data protection with centralized policy management through the optional use of Encryption Management Server. Its solutions provide standards-based technology, centralized policy management, compliance-based reporting, and universal management for customer s encryption products. Symantec Drive Encryption provides organizations with comprehensive, high performance full disk encryption for all data (user files, swap files, system files, hidden files, etc.) on desktops, laptops, and removable media. This full disk encryption software protects data from unauthorized access, providing strong security for intellectual property, customer, and partner data. Protected systems can be centrally managed by Symantec Encryption Management Server simplifying deployment, policy creation, distribution, and reporting. 2014 All Rights Reserved ecfirst 5
MCAFEE TOTAL PROTECTION Product Overview To secure your confidential data, McAfee Total Protection for Data provides comprehensive, multilayer data protection. It uses strong encryption, authentication, data loss prevention, and policy-driven security controls to prevent unauthorized access and transfer of your sensitive information anywhere, anytime. McAfee's integration of SafeBoot MDP into its Total Protection suites and McAfee epolicy Orchestrator (epo) management architecture is among the most successful by an EPP vendor. Platform support is provided for Windows XP through Windows 8 except RT, and for Mac OS X. Strengths The Endpoint Encryption Go (EEGO) utility performs a thorough analysis on systems to determine which encryption technologies will be used, and will predict and prevent installation failures as well as future problems. EEGO will monitor status of BitLocker-enabled PCs. Gartner Magic Quadrant for Mobile Data Protection. McAfee has been positioned as a Leader in the Gartner Magic. Quadrant for Mobile Data Protection for six consecutive years and is placed in the highest position for ability to execute and completeness of vision. Gartner Magic Quadrant for Content-Aware Data Loss Prevention McAfee has been positioned as a Leader in the Gartner Magic Quadrant for Content-Aware Data Loss Prevention for three consecutive years. Features Enterprise-grade full-disk encryption. Automatically encrypt entire devices without requiring enduser action or training, or impacting system resources Enjoy strong, military-grade encryption Identify and verify authorized users using strong multifactor authentication 2014 All Rights Reserved ecfirst 6
Removable media encryption Automatic, on-the-fly encryption for virtually any mobile storage device, company-issued or not Access encrypted data anywhere without the need for any software Persistent file and folder encryption Keep files and folders secure wherever they are saved, including on local hard disks, file servers, removable media and even as email attachments Device control Monitor and regulate how employees transfer data to removable media even when they are not connected to the corporate network Data loss prevention Control how users send, access and print sensitive data at the end point, through applications and onto storage devices, email webmail, peer- to peer applications, IM, Skype, HTTP, FTP, Wifi, USB, CD, DVD, Printers, Fax and removable storage. Stop confidential data loss initiated by Trojans, worms, and file-sharing applications that hijack employee credentials Protect all data, formats, and derivatives, even when data is modified, copied, pasted, compressed, or encrypted without disrupting day-to-day activities Centralized management console Use McAfee epo infrastructure management to specify detailed content-based filtering, monitoring, and blocking of unauthorized access to confidential data Manage full-disk, file and folder, and removable media encryption; control policy and patch management; recover lost passwords; and demonstrate regulatory compliance Synchronize security policies with Microsoft Active Directory, Novell NDS, PKI, and others 2014 All Rights Reserved ecfirst 7
References Prove devices are encrypted with extensive auditing capabilities Log data transactions to record such information as sender, recipient, timestamp, data evidence, date and time of last successful login, date and time last update received, and whether the encryption was successful or not http://www.arrowecs.ae/fms/15697.ds_total_protection.pdf http://www.gartner.com/technology/reprints.do?id=1-1h1ro5g&ct=130710&st=sb 2014 All Rights Reserved ecfirst 8
SOPHOS SAFEGUARD ENTERPRISE Product Overview Sophos SafeGuard Enterprise protects data at the highest points of risk by providing full disk encryption for PCs and MACs (laptops, desktops), encryption of all types of removable media, and port control of physical and wireless ports onpcs for data leak prevention. The complementary technologies offered in the integrated solution are designed to greatly increase overall data security across the enterprise in the most cost-effective manner. Provides Encryption and data protection without compromise. Ensures productivity by securing sensitive data wherever it is stored: laptops, USB devices, network shares or even in the cloud. Makes regulatory compliance easier with policy enforcement and reporting. Manages all devices in the organization from one place, including hard disks encrypted with BitLocker or FileVault 2 and Opal self-encrypting drives. Save time using the central console for data protection policy definition and management. The solution includes a single centralized management console. SafeGuard provides centralized security policy control, audit and log consolidation, key management and easy-to-use recovery tools to provide consistent data security for PCs and mobile devices in mixed device and OS environments. Why Sophos? Sophos SafeGuard Enterprise s encryption technology provides fast and secure encryption whenever built-in operating system encryption is not available or applicable. Encryption of files, folders or devices is completely transparent and integrates in the management center alongside all other devices. Uses internationally recognized encryption standards for full hard-disk encryption Allows multiple users to share encrypted computers without sharing their passwords 2014 All Rights Reserved ecfirst 9
Encrypts data in the background so that protection doesn t impact your users Offers a fast initial encryption option that encrypts only the parts of your hard drives with data, saving you significant time when encrypting large disks Stops unauthorized users from reading lost or stolen media Ensures fast and secure authentication using biometric fingerprint and cryptographic token support Quicker than ever with support for new generation i5 and i7 Intel processor Strengths Seat sales and revenue were strong and show growth from 2012. The improved competitive awareness of Sophos evidenced in inquiries and RFP reviews is significant, since unlike its main EPP competitors, Sophos does not have a consumer market public presence to help drive visibility. FIPS level support for BitLocker with recovery features that support TPMs and PINs is included in the main MDP product or can be purchased stand-alone for a price point comparable to a calculated share of MDOP fees. Sophos guarantees that backed-up and recovered files from FDE, as well as file-based protected systems, will not be converted to clear text, nor will they have their keys exposed when the operation is performed with supported backup and recovery vendors. Sophos MDP integrates content-aware DLP to filter data written to external devices at no extra charge. Features Uses internationally recognized encryption standards for full harddisk encryption. Allows multiple users to share encrypted computers without sharing their passwords. Encrypts data in the background so that protection doesn t impact your users. Offers a fast initial encryption option that encrypts only the parts of your hard drives with data, saving you significant time when encrypting large disks. 2014 All Rights Reserved ecfirst 10
Benefits Manages storing, sharing, exchanging and retiring of keys from the central console. Enables easy data access and recovery during an emergency for example, if a user's PC crashes. Allows secure and quick access to encrypted disks or files on other systems via automated key reassignments in the console References https://www.sophos.com/en-us/security-news-trends/whitepapers.aspx http://www.sophos.com/enus/medialibrary/pdfs/factsheets/sophossafeguardenterprisedsna.pdf http://www.gartner.com/technology/reprints.do?id=1-1h1ro5g&ct=130710&st=sb http://www.sophos.com/medialibrary/pdfs/factsheets/sophoshipaahitechc omplianceforhealthcareorganizationssbna.pdf http://www.sophos.com/en-us/support/resource-centers/data.aspx 2014 All Rights Reserved ecfirst 11
CHECK POINT FULL DISK ENCRYPTION Product Overview The Check Point Full Disk Encryption Software Blade provides automatic security for all information on endpoint hard drives, including user data, operating system files and temporary and erased files. For maximum data protection, multi-factor pre-boot authentication ensures user identity, while encryption prevents data loss from theft. Strengths Check Point has a legacy position in remote access for workstations and smaller devices, and sells MDP successfully into its customer base. Seat shares contribute substantially to the overall MDP market size. UEFI is fully supported for Windows 8, and retroactive support is being added to accommodate enterprise buyers who intend to downgrade to Windows 7. Check Point provides comprehensive guidance, alternate encryption and local partner assistance in foreign countries with prohibitive crypto regulations, such as China and Russia. Several long-term forensic partnerships provide extensive choices for recovery and investigative analysis, even on locked or wiped systems. Removable media encryption can enforce password retry limits, provides a business/personal dual-persona experience, and integrates with the optional Check Point User Check to enable data loss prevention (DLP) filtering rules Features Full Disk Encryption Pre-Boot Authentication Single-console, Intuitive User Interface Secure Remote Help Central Management 2014 All Rights Reserved ecfirst 12
Integrated into Check Point Software Blade Architecture Benefits Protects from unauthorized access if laptops are lost, stolen or left after the user logged off the device. Highly scalable, rapid deployments from a leader in the Gartner Magic Quadrant for mobile data protection. Integration with Check Point Software Blade Architecture for a single-console, centrally-managed endpoint solution. HIPAA Safeguards Encryption and decryption (addressable) Check Point Full Disk Encryption delivers the highest level of data security by providing a strong, full-disk encryption solution for PCs and laptops as well as access control. Check Point Full Disk Encryption Pointsec enables the secure exchange of sensitive data by ensuring the integrity and authenticity of data. Check Point's remote access solutions, VPN-1 and Connectra, provide strong encryption for data during transmission over open networks using standards-based encryption protocols. VPN-1 supports SSL- and IPSec-encrypted communication protocols. Connectra supports SSL- and TLS-encrypted communication protocols. In addition, both products support the MD5 and SHA-1 protocols to ensure the integrity of secure transmissions involving cardholder data. UTM-1 Edge, which provides Wi-Fi access as part of the solution, employs IPSec-over-WLAN encryption and enables the regular rotation of WEP keys. It supplements WEP, WPA, and WPA with inspection by Check Point's firewall, intrusion prevention, and antivirus technologies. Users who use IPSec over WLAN rather than WEP can be granted higher access rights, as well. 2014 All Rights Reserved ecfirst 13
Check Point VARs, SIs, and business partners can provide consulting services to deploy Check Point solutions within an organization to enable the secure exchange of data. References http://www.checkpoint.com/products/full-disk-encryption/index.html http://www.healthitoutcomes.com/doc/check-point-full-disk-encryption-0001 http://www.checkpoint.com/solutions/compliance/hipaa/implementationtables/164312a2iv.html- http://www.checkpoint.com/solutions/compliance/hipaa/implementation.html http://www.checkpoint.com/press/2013/100813-gartner-magic-quadrant-mobileprotection.html 2014 All Rights Reserved ecfirst 14
SYMANTEC DRIVE ENCRYPTION Product Overview Symantec acquired two MDP companies in 1H10: PGP and GuardianEdge. PGP Whole Disk Encryption (PGP WDE) has been rebranded as Symantec Drive Encryption (SDE) while the latter continues as Symantec Endpoint Encryption Full Disk (SEE-FD) edition. Platform support is provided via Symantec Drive Encryption, for Windows XP through 8 except RT, and for Mac OS X and Linux. Symantec Mobile Management is a separate product supporting consumer smartphones and tablets. Additional support is provided for Intel AES-NI and vpro, TPM and TCG Opal SEDs. Symantec is certified to FIPS 140-2 Level 1 in software, and was awarded CC EAL2 and CC EAL4+. Strengths Symantec's reputation, global reach and installed base continue to push sales forward. Sales were healthy for 2012 but not the highest among established EPP players. Symantec tied for second place among peer rankings as a competitive threat. The optional Symantec Mobile Encryption for ios facilitates the sending and receiving of PGP-encrypted email on iphones and ipads. Policy-compatible encryption can be enforced on files sent to email using Symantec DLP, and external shared storage, such as cloud systems, using Symantec File Share Encryption for additional fees Features: Encryption Management Server - Reduce complexity and costs by automating policies and managing multiple encryption solutions including key management from one central location. 2014 All Rights Reserved ecfirst 15
Symantec Encryption Solution - Implement multiple encryption solutions to create a more complete security solution and better handle compliance regulations. Email and Mobile Encryption - A suite of email encryption solutions for desktop, gateway, and mobile email including the ipad, iphone, and ipod touch. Centrally managed email encryption to protect communications with customers and partners without the need for client software or affecting the end-user experience. File Share Encryption - Encrypt files and folders before they're sent to the cloud. In the cloud, they remain encrypted so only the authorized users can gain access. Drive Encryption - Provides organizations with full disk encryption for all data (user files, swap files, system files, hidden files, etc.) on desktops, laptops, and removable media. Benefits: Endpoint Encryption Removable Storage Edition - Provides policy-controlled encryption of data on removable media and provides organizations with a safe harbor from data breach notification if removable media is lost or stolen. Management Center- Implements and enforces a common, organization-wide security policy framework, providing you with a central point of management control in mixed IT environments. Device Encryption - Transparently encrypts data on laptops, desktops and external media, protecting your users against unauthorized access, loss or theft of data. Encryption for Cloud Storage - Encrypts files uploaded to cloud storage services from managed computers. We also include readers for opening these files on ios and Android devices. References http://www.symantec.com/drive-encryption?fid=encryption http://www.symantec.com/content/en/us/enterprise/white_papers/b-howdrive-encryption-works_wp_21275920.pdf 2014 All Rights Reserved ecfirst 16
http://www.symantec.com/content/en/us/enterprise/fact_sheets/bencryption-solutions-for-endpoints.pdf http://www.symantec.com/user-authentication REGARDING THE GARTNER According to Gartner, vendors named Leaders "have products that work well for Gartner clients in small and large deployments. They have longterm road maps that follow and/or influence Gartner's vision of the developing needs of buyers in the market. Leaders make their competitors' sales staffs nervous, and force competitors' technical staffs to follow their lead. Their MDP products are well-known to clients and are frequently found on RFP shortlists." Check Point Software Technologies has offered MDP since 2007, through the acquisition of Pointsec. Platform support is provided for Windows XP through 8 except RT, and for Mac OS X and Linux. A policy-compatible encrypted container with VPN is available for consumer smartphones and tablets. Check Point is FIPS 140-2 certified to Level 1 in software, and was awarded CC EAL4. Additional support is provided for TCG Opal SEDs and TPM Comparison of Gartner, Check Point Software, McAfee, Symantec with Sophos Safeguard Encryption SafeGuard Enterprise comes with our industry-leading encryption technology that provides fast and secure encryption whenever built-in operating system encryption is not available or applicable. Encryption of files, folders or devices is completely transparent and integrates in the management center alongside all other devices. Sophos Safeguard Encryption is best as it gives the following benefits: Uses our single console to manage full-disk encryption, removable- media encryption, file-share encryption and cloudstorage encryption Provides up-to-date security status for all your devices. Get reporting and auditing that lets you monitor and ensure compliance with internal policies and external regulations 2014 All Rights Reserved ecfirst 17
Manages all devices in the organization from one place, including hard disks encrypted withbitlocker or FileVault 2 and Opal self-encrypting drives Proven encryption technology certified by organizations across the world (FIPS, CC EAL4 and more) Manage devices and data in the single Management Center Flexible recovery options for keys, data and forgotten passwords Recommendation Without respect to the existing computing / networking environment at an organization, ecfirst recommends Sophos Safeguard Encryption is best for encryption when compared to these above three encryption Products. Comparison Matrix Name Check Point Full Disk Encryption McAfee Total Protection Symantec Endpoint Encryption Sophos SafeGuard Enterprise Whole Disk Partition File Swap Hibernation File Yes Yes? Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Each sector on disk is encrypted. 2014 All Rights Reserved ecfirst 18
Corporate Office 295 NE Venture Drive Waukee, IA 50263 Toll Free: 877.899.9974 x17 Phone: 515.987.4044 x17 Fax: 515.978.2323 www.ecfirst.com 2014 All Rights Reserved ecfirst 19