White paper Security Solutions Advanced Theft Protection (ATP) Notebooks



Similar documents
Keep Data Secure with Intelligent Client-Side Protection for Lost or Stolen Laptops

HIPAA Security Alert

Kaspersky Lab s Full Disk Encryption Technology

GUIDE TO MANAGING DATA BREACHES

Securing Corporate Data and Making Life Easier for the IT Admin Benefits of Pre Boot Network Authentication Technology

Computrace Agent Quick Reference and Best Practices Guide

CHOOSING THE RIGHT PORTABLE SECURITY DEVICE. A guideline to help your organization chose the Best Secure USB device

HIPAA Security. assistance with implementation of the. security standards. This series aims to

HIPAA Security COMPLIANCE Checklist For Employers

Ten Questions Your Board Should be asking about Cyber Security. Eric M. Wright, Shareholder

A practical guide to IT security

Protecting Your Business from Costly Data Theft: Why Hardware-Based Encryption Is the Answer

VMware vcloud Air HIPAA Matrix

WHITE PAPER KEEPING CLIENT AND EMPLOYEE DATA SECURE DRIVES REVENUE AND BUILDS TRUST PROTECTING THE PROTECTOR

Service Description Laptop Tracking & Recovery Service and Remote Data Delete Service

SecureD Technical Overview

Sharpen your document and data security HP Security solutions for imaging and printing

Information Security

The Business Case for Security Information Management

AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE

Information Security Policy September 2009 Newman University IT Services. Information Security Policy

Guidance on the Use of Portable Storage Devices 1

Intel Cyber Security Briefing: Trends, Solutions, and Opportunities. Matthew Rosenquist, Cyber Security Strategist, Intel Corp

Newcastle University Information Security Procedures Version 3

Enterprise Data Protection

Solid-State Drives with Self-Encryption: Solidly Secure

Full Disk Encryption Drives & Management Software. The Ultimate Security Solution For Data At Rest

ACE Advantage PRIVACY & NETWORK SECURITY

HELPFUL TIPS: MOBILE DEVICE SECURITY

VMware Mirage Web Manager Guide

Data breach! cyber and privacy risks. Brian Wright Michael Guidry Lloyd Guidry LLC

MANAGED FILE TRANSFER: 10 STEPS TO SOX COMPLIANCE

Service Description Dell ProSupport Laptop Tracking & Recovery Service and Remote Data Delete Service

Deterring Identity Theft. The Federal Trade Commission estimates that as many as 9 million Americans have their identities stolen each year.

NIST CYBERSECURITY FRAMEWORK COMPLIANCE WITH OBSERVEIT

Kaseya White Paper. Endpoint Security. Fighting Cyber Crime with Automated, Centralized Management.

Management of Hardware Passwords in Think PCs.

Privileged. Account Management. Accounts Discovery, Password Protection & Management. Overview. Privileged. Accounts Discovery

Privacy Rights Clearing House

The potential legal consequences of a personal data breach

Islington ICT Physical Security of Information Policy A council-wide information technology policy. Version 0.7 June 2014

IBM Data Security Services for endpoint data protection endpoint encryption solution

Kenmore State High School Student Laptop Charter

Exhibit to Data Center Services Service Component Provider Master Services Agreement

Small businesses: What you need to know about cyber security

Ensuring HIPAA Compliance with Pros 4 Technology Online Backup and Archiving Services

How To Protect Your Data From Being Hacked

Ixion Group Policy & Procedure. Remote Working

Privacy Liability & Data Breach Management Nikos Georgopoulos Cyber Risks Advisor cyrm October 2014

SB 1386 / AB 1298 California State Senate Bill 1386 / Assembly Bill 1298

Service Schedule for Business Lite powered by Microsoft Office 365

How to Respond When Sensitive Customer and Employee Data is Breached, Stolen or Compromised

Workflow Templates Library

Information Security Policies. Version 6.1

NovaTech NERC CIP Compliance Document and Product Description Updated June 2015

FACT SHEET: Ransomware and HIPAA

RSA Solution Brief. RSA SecurID Authentication in Action: Securing Privileged User Access. RSA Solution Brief

Cloud Security Who do you trust?

MANAGED FILE TRANSFER: 10 STEPS TO HIPAA/HITECH COMPLIANCE

How To Protect Yourself From Cyber Threats

Physical Security Policy

How-To Guide: Cyber Security. Content Provided by

Sample Employee Agreement for Business Use of Employee-Owned Personal Computing Devices (Including Wearables 1 )

HIPAA: Understanding The Omnibus Rule and Keeping Your Business Compliant

DATA BREACH COVERAGE

ISO COMPLIANCE WITH OBSERVEIT

Health Insurance Portability and Accountability Act (HIPAA) and Health Information Technology for Economic and Clinical Health Act (HITECH)

HIPAA Security. 2 Security Standards: Administrative Safeguards. Security Topics

EMC Symmetrix Data at Rest Encryption

Supplier IT Security Guide

MAXIMUM PROTECTION, MINIMUM DOWNTIME

Samsung SED Security in Collaboration with Wave Systems

Full Drive Encryption Security Problem Definition - Encryption Engine

ICT SECURITY POLICY. Strategic Aim To continue to develop and ensure effective leadership, governance and management throughout the organisation

Cyber Security. An Executive Imperative for Business Owners. 77 Westport Plaza, St. Louis, MO p f

DATA AND PAYMENT SECURITY PART 1

Small businesses: What you need to know about cyber security

Global security intelligence. YoUR DAtA UnDeR siege: DeFenD it with encryption. #enterprisesec kaspersky.com/enterprise

Is Drupal secure? A high-level perspective on web vulnerabilities, Drupal s solutions, and how to maintain site security

Cyber Security Response to Physical Security Breaches

Service Schedule for BT Business Lite Web Hosting and Business Lite powered by Microsoft Office 365

Healthcare Compliance Solutions

Data Access Request Service

Ensuring HIPAA Compliance with AcclaimVault Online Backup and Archiving Services

Tameside Metropolitan Borough Council ICT Security Policy for Schools. Adopted by:

EMC VMAX3 DATA AT REST ENCRYPTION

Directed Circuits Meet Today s Security Challenges in Enterprise Remote Monitoring. A White Paper from the Experts in Business-Critical Continuity TM

Section 5 Identify Theft Red Flags and Address Discrepancy Procedures Index

Data Protection Breach Management Policy

Transcription:

White paper Security Solutions Advanced Theft Protection (ATP) Notebooks Contents Introduction 2 Approaching the Challenge 4 Fujitsu s Offering Advanced Theft Protection (ATP) 5 Fujitsu is taken the lead to deliver secure IT 7 Page 1 of 8

Introduction Advanced Theft Protection: The story behind Laptops Make Easy Targets Increased portability means increased convenience - and increased risk of loss or theft. Laptops are easy targets: they are designed to be portable, and thus disappear at an alarming rate. This problem will likely worsen over time as laptop use increases and thieves become more sophisticated in their methods. A stolen laptop can quickly be fenced, or sold, for cash. The proliferation of portable devices in the last decade has made it far easier for criminals to acquire sensitive information such as banking or medical details. Criminals have been known to destroy a company s or an individual s reputation for profit, spite or sport. Countless high profile organizations have faced the humiliation of informing tens of thousands of clients that a device, such as an employee s laptop, has been lost or stolen and that their personal information may have been compromised. While encryption helps to protect data, organizations that do not have a technique for swift recovery can never truly ensure their clients confidentiality. When a computer has been lost or stolen, there is a very real possibility that the data stored on it will be compromised whether the data has been encrypted or not. The victim must live with the anxiety of never knowing how or when the data will be exploited or for what unscrupulous purposes. Organisational Drift To ensure regulatory compliance, IT professionals must be able to protect data, track hardware and software, provide auditing capabilities and maintain historical records. Yet mobile assets can be the most difficult to track: a Gartner study suggests that most organizations are only able to locate about 60% of their mobile assets, which raises the following questions: Where are the other 40%? Who is using them? What information resides on them? Not all missing assets are a result of theft. As much as 10 to 15% of missing computers can be attributed to drift within an organisation. Assets are taken out of service (broken or obsolete or are handed down internally to junior employees). Regardless of why devices go missing, most are very likely to contain sensitive or confidential data information for which the organisation is responsible and liable. In cases like these, a remote data delete software product (see next section) can be efficient and effective; it should also provide proof that the data has been deleted. Lifecycle Management Even the simple retirement of old hardware (through obsolescence or end-of-lease), requires sensitive data to be removed before it is repurposed internally, sent for recycling or returned to the leasing agency. Numerous examples exist in the media of sensitive information being found on refurbished computers. Deleting and overwriting data remotely for lifecycle management serves as a blunt but effective reminder to the user that the computer is overdue to be returned to the IT department. Using built-in messaging capabilities, like those available through Computrace by Absolute Software, IT can also send pre-defined alerts to target machines, reminding users to return their overdue computers. Data Encryption = A First Step of Securing Data But a False Sense of Security Data encryption solutions are powerful tools but they are a lot like prison walls: they prevent most common breaches, but are powerless to stop a criminal in possession of keys to the gates. Given that Gartner estimates that 70% of security breaches occur as a result of internal sources, encryption may only be effective in as little as 30% of all incidents. Encrypting data is therefore a necessary first step toward data security but hardly a guarantee that data is secure or that data will not be compromised. Data Protection with Remote Data Delete Tools Government legislation exists in numerous jurisdictions mandating that any security breach that is reasonably believed to have compromised personal information must be publicly reported. By remotely deleting sensitive data on missing computers, an organisation can avoid potentially damaging publicity or litigation. Remote data delete software like Computrace provides this capability and can remove data at the file, directory and/or operating system (OS) level. Computrace utilises an algorithm to delete data that deletes and overwrites the data seven times to ensure that it is permanently erased. Laptop Theft Affects Everyone Since early 2005, more than 150 million personal records have been exposed 1. 85% of organisations surveyed reported they have had a data breach event 2. 47% of computer security professionals surveyed reported a laptop theft over the past 12 months 3. More than 50% of malicious corporate network penetrations are now conducted through lost or stolen mobile devices 4. 1 Bates & Pell 2 Privacy Rights Clearinghouse, A Chronology of Data Breaches, April 9th 2007 3 Scott and Scott LLP and Ponemon Institute LLC, May 15th 2007 4 FBI & CSI s annual Computer Crime and Security Survey, 2006 Page 2 of 8

Today s computing assets contain more sensitive and valuable information than ever before making each computer a potential liability without proper protection. Governments, businesses and educational institutions risk costly legal battles and public relations nightmares even if only one laptop goes missing. Encrypting data on laptop computers helps promote laptop security, but: Encrypted data is not necessarily secure data. Page 3 of 8

Approaching the Challenge The Layered Approach Single point solutions such as encryption alone are no longer sufficient to adequately protect an enterprise from all points of attack. IT departments getting by with minimal compliance protection expose themselves to unnecessary risks and potential liability. Multi-layered security strategies, which provide the below capabilities, are therefore necessary. Asset Tracking The ability to track physical location and asset information for every mobile device connected to an internal network or the Internet, and provide dynamic reporting to help achieve regulatory compliance. Data Encryption The ability to protect mobile data from unauthorised parties. Remote Data Delete The ability to remotely delete sensitive information from a compromised device through centrally issued commands. Remote Lock Down The ability to remotely (via client notification) or automatically (via client-side intelligence) lock down a system quickly in case of loss, theft, or suspicious circumstances. Audit Logs The ability to produce defensible records that can verify what confidential information was lost or stolen, what data was removed through a remote data delete, and the last known location of the mobile asset. Theft Recovery After the system has been reported stolen to the local law enforcement institutions, the services of a Theft Recovery Team to locate a stolen laptop and assist law enforcement in retrieving the stolen hardware. Page 4 of 8

Fujitsu s Offering Advanced Theft Protection (ATP) Fujitsu recognized the necessity for layered security and offers an ultimate solution to cover security needs of all kinds. Using a modular approach, Advanced Theft Protection responds precisely to the different requirements of large enterprises as well as small and medium-sized business. Fujitsu s ATP, together with Computrace by Absolute Software, is fulfilling the need for real security. Offering #I Absolute Track Lost or drifting assets challenge productivity; and are particularly challenging in small companies with a lower number of notebooks which are relatively expensive to replace. Helping to limit organizational drift and locate missing computers faster, Absolute Track tracks hardware and detects its location as soon as the device is connected to the Internet or Intranet. Embedded in the BIOS firmware of Fujitsu computers, the Computrace Agent provides tamper-resistant defense that works even if the Operating System is reimaged or a new hard-drive is installed. In addition, Absolute Track provides you the functionalities to monitor and manage your IT assets. Offering #2 Computrace Data Protection Computrace Data Protection extends the features of Absolute Track with data deletion and device freeze functionality. Data on systems that are missing, stolen, or at the end of lease or life can be deleted remotely. After deletion a log file is created to meet compliance with corporate or governmental regulations Offering #3 Computrace One Computrace One extends the features of Computrace Data Protection with Theft Recovery and Geofencing. If a system is reported stolen to the police and to the Absolute Customer Center, the Absolute Theft Recovery Team will work with local law enforcement authorities to detect and recover the system. Page 5 of 8

Advanced Theft Protection 5 steps 1. Add Fujitsu Advanced Theft Protection to your order 2. Subscribe the registration page by Absolute Software 3. Download agent from the Absolute Customer Centre, install and activate the agent on your notebook If system gets lost or stolen 4. Call service or report the incident online at the Absolute Customer Center 5. Theft trigger will be activated and defined recovery tasks are executed Safe computing: What do you need? For the Remote Lock down feature a notebook with Computrace enabled BIOS. Buy the full security solution service brought to you by Fujitsu Install Computrace Agent Page 6 of 8

Fujitsu is taking the lead to deliver secure IT What is Computrace by Absolute Software? Offers managed computer theft recovery, data protection and IT asset tracking and management Allows customers to centrally track and manage mobile devices via a web-based interface The Absolute Customer Center Provides 100% accurate inventories for remote and mobile devices, on or off the network Easily tracks device s physical location and monitors changes in asset information Enables customers to remotely delete sensitive data on target computers and produce a log of deleted files to prove regulatory compliance Facilitates the industry leading computer theft recovery capabilities of the Absolute Theft Recovery Team Tracks computer using a small software agent that is rapidly deployable, and, embedded in the firmware of many Fujitsu computers, highly tamper resistant What does the Computrace Agent do, exactly? The Computrace Agent that powers Absolute Software solutions is embedded in the firmware of Fujitsu clients or it can be installed by the customer. Embedded in the firmware of a computer, the stealthy Computrace Agent is capable of surviving operating system re-installations, as well as hard-drive reformats, replacements and re-imaging. The Agent can be activated by customers when they purchase a subscription with terms ranging from one to four years. Persistence Ensures Effectiveness Employing a self-healing technology called persistence, the Computrace Agent essentially rebuilds the agent software installation, even if the agent service is deleted. The software is designed to be removed only by an authorized user with the correct password. This self-healing feature will repair a Computrace installation in newly formatted or installed operating systems as well as freshly imaged systems. The agent is also very difficult to detect, as it runs as a non-descript service, and is not listed as an application. As well, the product does not show up on the programs menu listing or as a system tray icon. Page 7 of 8

Fujitsu Advanced Theft Protection Detection of potential loss or theft situations can take place locally or remotely. For example, detection can occur via a remote connection to the theft management server over the Internet. Hardware-based detection and trigger mechanisms include: Timeframe rendezvous requirement the system can be disabled if the notebook does not periodically rendezvous with the Absolute Customer Center within the IT-specified time interval. Notification from the central server after being notified of the notebook s loss or theft, IT flags the notebook in the Absolute Customer Center. The next time the system connects to the Internet, the notebook contacts and synchronizes with the central server. When ATP receives notification from the server that the notebook has been flagged as stolen, ATP disables the PC so that it cannot boot up and blocks access to the data on it. A key benefit of the ATP hardware-based detection mechanisms is that the timer can work even if a network connection is not available. ATP with Computrace can also integrate with existing encryption solutions PBA. Local and remote responses IT can respond to potential theft locally and automatically (based on predefined criteria), or remotely. Local timer expiry can trigger PC disable Let s have a look at an example: A research scientist s notebook might contain highly sensitive data about a new invention. In this case, IT has defined the triggers on the scientist s notebook to require that the scientist log in daily. During a family event, the scientist takes time off and does not log in for two days. Based on locally stored policy for the rendezvous with the server, the timer expiry threshold is reached, the notebook enters theft mode, and disables itself. Even if the notebook is removed from the lab while the user is away, the notebook has secured itself until the scientist returns and reactivates the system. Easy reactivation and full system recovery To speed up recovery when a notebook is being returned to service, ATP with Computrace makes it easy to reactivate a notebook. The user or IT administrator simply enters a strong one-time token in the reactivation screen the only screen available after a lockdown. This resets the timer and allows the system to boot to its normal working state. With ATP with Computrace, IT has a simple, inexpensive way to restore a notebook without compromising sensitive data or the system s other security features. Contact FUJITSU Technology Solutions E-mail: wps.info@ts.fujitsu.com Website: http://ts.fujitsu.com 2014-02-07 CE EN Page 8 of 8 All rights reserved, including intellectual property rights. Technical data subject to modifications and delivery subject to availability. Any liability that the data and illustrations are complete, actual or correct is excluded. Designations may be trademarks and/ or copyrights of the respective manufacturer, the use of which by third parties for their own purposes may infringe the rights of such owner. For further information see: http://ts.fujitsu.com/terms_of_use.html Copyright Fujitsu Technology Solutions GmbH 2014