SafeGuard Enterprise 6



Similar documents
Infrastruktur Sicherheit mit Checkpoint

For your eyes only - Encryption and DLP Erkko Skantz

Managing BitLocker With SafeGuard Enterprise

Securing Corporate Data and Making Life Easier for the IT Admin Benefits of Pre Boot Network Authentication Technology

IBM Data Security Services for endpoint data protection endpoint encryption solution

Kaspersky Lab s Full Disk Encryption Technology

The Essential Security Checklist. for Enterprise Endpoint Backup

Did you know your security solution can help with PCI compliance too?

Driving Company Security is Challenging. Centralized Management Makes it Simple.

Analyzing Security for Retailers An analysis of what retailers can do to improve their network security

SafeGuard Enterprise Web Helpdesk. Product version: 6 Document date: February 2012

Security Management. Keeping the IT Security Administrator Busy

Citrix Enterprise Mobility more than just device management (MDM)

Checklist for HIPAA/HITECH Compliance Best Practices for Healthcare Information Security

SafeGuard Enterprise Web Helpdesk

Global security intelligence. YoUR DAtA UnDeR siege: DeFenD it with encryption. #enterprisesec kaspersky.com/enterprise

Protecting Your Data On The Network, Cloud And Virtual Servers

10 Hidden IT Risks That Might Threaten Your Business

Building a Business Case:

Using BitLocker As Part Of A Customer Data Protection Program: Part 1

IBM Security. Alle Risiken im Blick und bessere Compliance Kumulierte und intelligente Security Alerts mit QRadar Security Intelligence

EndUser Protection. Peter Skondro. Sophos

SecureD Technical Overview

White Paper. Anywhere, Any Device File Access with IT in Control. Enterprise File Serving 2.0

Do "standard tools" meet your needs when it comes to providing security for mobile PCs and data media?

Vs Encryption Suites

A Websense Research Brief Prevent Data Loss and Comply with Payment Card Industry Data Security Standards

IDENTITY & ACCESS. Privileged Identity Management. controlling access without compromising convenience

Computer Security at Columbia College. Barak Zahavy April 2010

YOUR DATA UNDER SIEGE. DEFEND IT WITH ENCRYPTION.

DriveLock and Windows 8

DriveLock and Windows 7

NETWORK SERVICES WITH SOME CREDIT UNIONS PROCESSING 800,000 TRANSACTIONS ANNUALLY AND MOVING OVER 500 MILLION, SYSTEM UPTIME IS CRITICAL.

SafeGuard Enterprise Web Helpdesk. Product version: 6.1

Cloud Backup and Recovery for Endpoint Devices

Kelvin Wee CISA, CISM, CISSP Principal Consultant (DLP Specialist) Asia Pacific and Japan

Protecting personally identifiable information: What data is at risk and what you can do about it

Powered by. FSS Buyer s Guide Why a File Sync & Sharing Solution is Critical for Your Business

Conquering PCI DSS Compliance

Microsoft Nano Server «Tuva» Rinon Belegu

WHITE PAPER KEEPING CLIENT AND EMPLOYEE DATA SECURE DRIVES REVENUE AND BUILDS TRUST PROTECTING THE PROTECTOR

EXECUTIVE SUMMARY Cloud Backup for Endpoint Devices

The Ministry of Information & Communication Technology MICT

How Endpoint Encryption Works

SafeNet Data Encryption and Control. Securing data over its lifecycle, wherever it resides from the data center to endpoints and into the cloud

SafeNet Data Encryption and Control. Securing data over its lifecycle, wherever it resides from the data center to endpoints and into the cloud

CSG & Cyberoam Endpoint Data Protection. Ubiquitous USBs - Leaving Millions on the Table

Originator: Chris Parkin Date: 4 March 2015 Approved by: Senior Management Team Type: Policy. Computer Security Policy

Gain Complete Data Protection with SanDisk Self-Encrypting SSDs and Wave Systems

Enterprise Security Solutions

PCI Data Security Standards (DSS)

Encryption Buyers Guide

Komplettschutz für den Mittelstand

10 Hidden IT Risks That Might Threaten Your Law Firm

FileDrawer An Enterprise File Sharing and Synchronization (EFSS) solution.

HIPAA: MANAGING ACCESS TO SYSTEMS STORING ephi WITH SECRET SERVER

Innovative Secure Boot System (SBS) with a smartcard.

Version: 2.0. Effective From: 28/11/2014

The Cloud App Visibility Blindspot

Nine Steps to Smart Security for Small Businesses

etoken Single Sign-On 3.0

Senaca Shield Presents 10 Top Tip For Small Business Cyber Security

Mobilize SharePoint Securely: Top 5 Enterprise Requirements

Bryan Hadzik Network Consulting Services, inc. Endpoint Security Data At Rest

Full Disk Encryption Drives & Management Software. The Ultimate Security Solution For Data At Rest

White Paper. Data Security. The Top Threat Facing Enterprises Today

Navigating Endpoint Encryption Technologies

Five Truths. About Enterprise Data Protection THE BEST WAY TO SECURE YOUR DATA AND YOUR BUSINESS DEFENDING THE DATA CMYK

SafeGuard Enterprise User help. Product version: 6.1

Sichere bewegliche Arbeitskräfte Trend Micro Safe Mobile Workforce

SecureAge SecureDs Data Breach Prevention Solution

BYOD AND ME. How cell phone hacking effects your business.! Richard Rigby CEO Wraith Intelligence

Secure Cross Border File Protection & Sharing for Enterprise Product Brief CRYPTOMILL INC

Die neuen Sophos Suiten - Alles in einer Lizenz

Betreibt viele der größten Rechenzentren, ermöglicht kleine Unternehmen auf der ganzen Welt, und bietet Unternehmen

Plugging the Leaks: Best Practices in Endpoint Security

Understanding Northwestern University s contract with Symantec. Symantec Solutions for Cost Reduction & Optimization

10 Hidden IT Risks That Threaten Your Practice

Transcription:

SafeGuard Enterprise 6

Komplette Sicherheit von Sophos

Security everywhere Protecting every part of your business Endpoint Network Web Mobile Email Data

Wer ist Sophos? 350 300 250 200 100.000 Kunden, mehr als 150 Millionen User Skalierbare Lösungen für Endpoint, Verschlüsselung, Gateway und Mobile 1.800+ Mitarbeiter, davon 500 in DACH Direktes Supportmodell für Geschäftskunden 150 100 50 0 4

Sophos Support 24/7 Support direkt vom Hersteller ist Standard Premium/Platin Support mit SLAs, persönlichem Ansprechpartner und Reaktionszeiten bis 1 Stunde Support von Sophos Mitarbeitern an Sophos-Standorten Deutschsprachiger Support Mo.-Fr., 8-18 Uhr Reporting aller Supportcenter weltweit in eine Support-Datenbank Mitarbeiter werden auf Produkte und Plattform geschult Keine Privatkunden, alle Ressourcen ausschließlich für Geschäftskunden

SafeGuard Enterprise 6

SafeGuard Enterprise

How Sophos will help SafeGuard Enterprise 6 protects your data everywhere 1. Full disk encryption Lost and stolen laptops are still threat #1 of loosing data 2. Removable media encryption and port control Lost memory sticks are the second biggest threat for large incidents (i.e. >1 million records lost) 3. Encryption for file shares and cloud storages Accidental incidents by insiders can cause the most harm Administrators are under latent suspicion of being able to leak confidential information 8

Quelle: Simon Travaglia (Autor) / Peter Abrams (Illustrator), Plan Nine Publishing

Discover your sensitive data! Where is your data vulnerable? IT has access to all corporate data Backups are in plain No PCI compliance Network traffic can be sniffed IT can access local data, too Devices and data can be lost Files on servers: Customer Salary and other Impact personal data Staff evaluations What is the price of a Financial data leak? Analyses - Reputation, Correspondence brand and image Customer data - Informing Business plans persons (incl. finding Research out and project whom data to etc. inform) - Fines and lawsuits - Knowhow made public Files on PCs, laptops, removable media: How do you monitor and control network admin access Temporary to files sensitive data? Local (offline) copies of server data

SafeGuard Enterprise

SafeGuard Management Center Zentralisierte Verwaltung für alle Funktionsmodule Bereitstellung von Sicherheitsrichtlinien für Verschlüsselung, Authentifizierung, Berechtigungen Zentrales Schlüsselmanagement und Recovery Anbindung an Active Directory Zentrale Protokollierung und Logging Rollenbasierte Benutzerverwaltung 4-Augen Prinzip

SafeGuard Management Center

SafeGuard Management Center

SafeGuard Enterprise

Mobile workers = data on the move More workers are mobile, businesses are buying more laptops They re easy lose and attractive to thieves Physical security isn t always a priority 86% lost of IT practitioners say someone in their organization has had a laptop or stolen Source: Ponemon Institute

Device Encryption Encrypts laptops, desktops and self encrypting drives Secures all data on PCs Fast initial and on-going encryption Secure service accounts for administrators Single sign-on Central administration and automated deployment Flexible and centralized emergency data recovery

Device Encryption Einfache und transparente Verschlüsselung von Festplatten Graphische Power On Authentication Single-Sign-On Mehrbenutzerfähigkeit in der Pre-Boot Umgebung USB, Smart-Cards und Fingerprint OPAL Support Diverse Notfall Prozeduren Challenge / Response Local Self Help WinPE Unterstützung. Service und Pre-Boot Accounts

Device Encryption Challenge / Response

SafeGuard Enterprise

Is your data being moved to devices? They take data everywhere If they re lost can you be sure they re secure? You probably can t ban removable media People will plug them in anywhere

Data Exchange Encrypts removable devices without impacting users Share data inside/ outside organization Restricts data sharing to specific teams Portable application for use anywhere Mix encrypted and non-encrypted data File Tracking White/blacklisting of devices

SafeGuard Portable Ver- und Entschlüsselung auf externen Rechnern

SafeGuard Data Exchange Transparente Ver- und Entschlüsselung mit installiertem SafeGuard Client

SGN DX improvements File Tracking Logging of file access events on removable media Dedicated SO role to audit such events with File Tracking Viewer Don t ask again for media that shall stay in plain

SafeGuard Enterprise

So many ways to connect What devices are being attached to computers? Data can often be synced to personal mobile devices Do you know which devices are good ones?

Configuration Protection Vermeidung von Datenlecks Kontrolle über alle vorhanden Schnittstellen USB, FireWire, SD, PCMCIA, WiFi, Bluetooth,IrDA,etc. Reglementierung anhand von: Gerätetyp, Gerätemodell, Seriennummer Temporäre Deaktivierung per Challenge/Response Überwachung des Datenstroms in Echtzeit Freigabe über Whitelisting Unterscheidung von Lese- oder Schreibzugriffen Dateitypen-Kontrolle

SafeGuard Enterprise

Discover your sensitive data! Where is your data vulnerable? IT has access to all corporate data Backups are in plain No PCI compliance Network traffic can be sniffed IT can access local data, too Devices and data can be lost Files on servers: Customer Salary and other Impact personal data Staff evaluations What is the price of a Financial data leak? Analyses - Reputation, Correspondence brand and image Customer data - Informing Business plans persons (incl. finding Research out and project whom data to etc. inform) - Fines and lawsuits - Knowhow made public Files on PCs, laptops, removable media: How do you monitor and control network admin access Temporary to files sensitive data? Local (offline) copies of server data

Business scenarios Who has access to your sensitive data System Admins In addition to maintaining the network, system administrators have access to all the files and folders External/ Outsourced IT IT has access to everything. You don t want external staff to have access to your company confidential documents Consultants You have consultants working on projects and you do not want to give them access to your sensitive data

Encryption for File Shares Protects documents on network file shares Encrypts network file shares for user groups Unnoticed by users Intelligent persistent encryption Central key and policy management Recovery Protection against administrators 34

Encryption for network shares Use file and folder encryption to protect important company data How we do it Central key and policy management Transparent filter driver encrypts LAN traffic and data at rest Customer Value SafeGuard Management Ensure compliance and protect your brand by avoiding data breaches, fines and loss of customers Better Unnoticed by users Persistent encryption AES-NI performance Controlled access with the ability to share sensitive information online securely 35

SafeGuard Enterprise

Access your data anywhere How cloud computing changed our habits Good: Better:

Dropbox has more than 45 million users saving one billion files every 3 days. [Dropbox press release, November 18 th, 2011]

Whom to target Distributed firms Collaboration is the key for increasing productivity Cloud is the key for improving collaboration Example firms: multi-nationals, creative agencies Mobile workforce Need access to data on the go Use multiple devices laptops, smart phones, tablets Examples: sales, employees working from home Consulting firms Centralized access to data from customer sites Example firms: Accenture, IBM, McKinsey

Cloudy approach to data protection Cloud storage means access from anywhere A useful tool to help users be productive How do you know if your business data is in the cloud? The cloud is everywhere and nowhere, so where s your data? The danger of cloud services eternal beta

Using cloud storage in enterprises Where is your data vulnerable? Cloud providers have access to documents Cloud is location-less Cross border, potentially stored on another continent Cloud providers legally can be forced to disclose No PCI compliance Makes documents mobile Cloud is already in place, but typically not under control Customer Impact Typical use cases: Data exchange (avoid memory stick): between home and work, between laptop and PC Have data available online on mobile devices What is the price of a leak? - Reputation, brand and image - Damage reparation costs - Informing persons (incl. finding out whom to inform) - Fines and lawsuits - Knowhow made public FTP replacement How are you protecting your data that being stored in the cloud today? What happens if a cloud provider has a data breach?

Encryption for Cloud Storage Protects documents stored in the cloud Encrypts cloud folders transparently Central key and policy management Protects documents that leave your perimeter Share data inside/outside organization Portable application for use anywhere Work at home with your data, too Exchange your data with mobile devices

Encryption for the cloud Compliance for your data in the cloud How we do it Central key and policy management Transparent filter driver encrypts sync folders and cloud Better You stay in control Keys Recovery Exchange your data with mobile devices Customer Value Regain control of your data, which otherwise leaks in existing infrastructures to the cloud while keeping users productive and allowing them to use modern tools Tell password: ***** Enable secure mobile workforce SafeGuard Management 45

SafeGuard Enterprise

Fragen? Vielen Dank für Ihre Aufmerksamkeit!