SlideShare a Scribd company logo
1 of 4
Download to read offline
Garantire la confidenzialità delle
    informazioni: la soluzione PGP per
    l'Encryption

    Antonio Forzieri – CISSP, CISA, CISM
    Principal Consultant, Technical Sales Organization

Symantec Black Market – 11 Novembre 2010 – East End Studios   1
PGP® Encryption Platform
una soluzione alle sfide del dato



                    PGP® Encryption Solutions                                        3rd Party Solutions

 Disk and          File                       Mobile                       Commercial    Commercial     Custom
                                Email                         Mainframe
  Device                                      Devices                       Hardware      Software    Applications




         Key Lifecycle                         Key Storage                  Authentication            Auditing
                                                                                                      Reporting
                                                                                                       Logging
                                           Policy Management

                                 Automated Operations and Provisioning

                                            PGP® Encryption Platform

                                                 Existing Infrastructure




Symantec Black Market – 11 Novembre 2010 – East End Studios                                                    2
Architettura PGP
una soluzione centralizzata

         PGP Universal Server™
                                                                           Future Products
          Central Management of
                                                                           • Leverage PGP® Encryption Platform
          Encryption Applications

                                                                      Smartphone solutions
                                                                      • PGP® Mobile
                                                                      • PGP® Support Package for BlackBerry®
                                                              PGP® Command Line
                                                              • Secure FTP/Batch & Backups

                                                  PGP® Portable
                                                  • USB Device & Media Encryption
                                                  PGP® Whole Disk Encryption
                                                  • Laptop & Disk Security

                                   PGP® Desktop Email
                                   • Email, File, Disk, & IM Encryption         Il prodotto utilizza il PGP
                          PGP® NetShare                                          SDK, un maturo modulo
                          • Shared Server Storage Security                         crittografico validato
                                                                                         FIPS-140-2
             PGP Universal Gateway Email
             • User-transparent, Gateway Email Encryption
Symantec Black Market – 11 Novembre 2010 – East End Studios                                               3
Architettura PGP
 un caso reale


                                                                                            Logs / Monitoring
                                                                                          SYSLOG (Port 514)
                                                                                            SNMP (Port 161)
                                                    PGP Universal Cluster (444)
                                                    Directory Integration (636)
                                                                                              FTP or SCP Backups
                                                                                                    (Port 21 or 22)


                                                                                    Admin UI (9000)


                          N                             444
                                                                                    N                    PGP Desktop Policy
                   443    L
 External Client                                                                    L                    WDE, USB, Logging,
                          B                                                             443              Key Mgmt, Port 443
                                                                                    B
Remote User –                              636                  636
Allows for Logs,                                                                                         Use Cases:
Sync Policy, and                                                                                         Existing WDE / Migrated
Enrollments                                                                                              New WDE
                                                                                                         WDE Users “In the Wild”
                                                                                    Administrator
                                                          Mail System               Daily Status
                                                                                    Email
                                                                            Admin
         External               DMZ                  Internal



 Symantec Black Market – 11 Novembre 2010 – East End Studios                                                                  4

More Related Content

Similar to Garantire la confidenzialità delle informazioni: la soluzione PGP per l'Encryption

Using Hard Disk Encryption and Novell SecureLogin
Using Hard Disk Encryption and Novell SecureLoginUsing Hard Disk Encryption and Novell SecureLogin
Using Hard Disk Encryption and Novell SecureLoginNovell
 
Intoto Linley Tech Utm Architecture Presentation
Intoto Linley Tech Utm Architecture PresentationIntoto Linley Tech Utm Architecture Presentation
Intoto Linley Tech Utm Architecture Presentationsaddepalli
 
HTLV - DSS @Vilnius 2010
HTLV - DSS @Vilnius 2010HTLV - DSS @Vilnius 2010
HTLV - DSS @Vilnius 2010Andris Soroka
 
Symantec Deepens Encryption Offerings
Symantec Deepens Encryption OfferingsSymantec Deepens Encryption Offerings
Symantec Deepens Encryption OfferingsSymantec
 
Splunk as a_big_data_platform_for_developers_spring_one2gx
Splunk as a_big_data_platform_for_developers_spring_one2gxSplunk as a_big_data_platform_for_developers_spring_one2gx
Splunk as a_big_data_platform_for_developers_spring_one2gxDamien Dallimore
 
Clavister security for virtualized environment
Clavister security for virtualized environmentClavister security for virtualized environment
Clavister security for virtualized environmentnicolasotira
 
Gtb Dlp Suite Presentation
Gtb Dlp Suite PresentationGtb Dlp Suite Presentation
Gtb Dlp Suite Presentationgtbsalesindia
 
NetSafe_Fortinet - 13martie2012
NetSafe_Fortinet - 13martie2012NetSafe_Fortinet - 13martie2012
NetSafe_Fortinet - 13martie2012Agora Group
 
Lecture 8 mail security
Lecture 8 mail securityLecture 8 mail security
Lecture 8 mail securityrajakhurram
 
Securing Your Endpoints Using Novell ZENworks Endpoint Security Management
Securing Your Endpoints Using Novell ZENworks Endpoint Security ManagementSecuring Your Endpoints Using Novell ZENworks Endpoint Security Management
Securing Your Endpoints Using Novell ZENworks Endpoint Security ManagementNovell
 
GTB DLP - Content Aware Security Suite
GTB DLP - Content Aware Security SuiteGTB DLP - Content Aware Security Suite
GTB DLP - Content Aware Security SuiteVCW Security Ltd
 
Moving Security Model From Content to Context
Moving Security Model From Content to ContextMoving Security Model From Content to Context
Moving Security Model From Content to ContextPaolo Passeri
 
CELC_Цифровые медиа и Физическая безопасность
CELC_Цифровые медиа и Физическая безопасностьCELC_Цифровые медиа и Физическая безопасность
CELC_Цифровые медиа и Физическая безопасностьCisco Russia
 
GTB DLP Suite Presentation
GTB DLP Suite PresentationGTB DLP Suite Presentation
GTB DLP Suite Presentationgtbsalesindia
 
NetSafe - 11nov2011
NetSafe - 11nov2011NetSafe - 11nov2011
NetSafe - 11nov2011Agora Group
 
8 Authentication Security Protocols
8 Authentication Security Protocols8 Authentication Security Protocols
8 Authentication Security Protocolsguestfbf635
 
Nagios Conference 2011 - Mike Weber - Training: Choosing Nagios Plugins To Use
Nagios Conference 2011 - Mike Weber  - Training: Choosing Nagios Plugins To UseNagios Conference 2011 - Mike Weber  - Training: Choosing Nagios Plugins To Use
Nagios Conference 2011 - Mike Weber - Training: Choosing Nagios Plugins To UseNagios
 

Similar to Garantire la confidenzialità delle informazioni: la soluzione PGP per l'Encryption (20)

Using Hard Disk Encryption and Novell SecureLogin
Using Hard Disk Encryption and Novell SecureLoginUsing Hard Disk Encryption and Novell SecureLogin
Using Hard Disk Encryption and Novell SecureLogin
 
Intoto Linley Tech Utm Architecture Presentation
Intoto Linley Tech Utm Architecture PresentationIntoto Linley Tech Utm Architecture Presentation
Intoto Linley Tech Utm Architecture Presentation
 
HTLV - DSS @Vilnius 2010
HTLV - DSS @Vilnius 2010HTLV - DSS @Vilnius 2010
HTLV - DSS @Vilnius 2010
 
Monetizing the Enterprise: Borderless Networks
Monetizing the Enterprise: Borderless NetworksMonetizing the Enterprise: Borderless Networks
Monetizing the Enterprise: Borderless Networks
 
Symantec Deepens Encryption Offerings
Symantec Deepens Encryption OfferingsSymantec Deepens Encryption Offerings
Symantec Deepens Encryption Offerings
 
Splunk as a_big_data_platform_for_developers_spring_one2gx
Splunk as a_big_data_platform_for_developers_spring_one2gxSplunk as a_big_data_platform_for_developers_spring_one2gx
Splunk as a_big_data_platform_for_developers_spring_one2gx
 
Clavister security for virtualized environment
Clavister security for virtualized environmentClavister security for virtualized environment
Clavister security for virtualized environment
 
Gtb Dlp Suite Presentation
Gtb Dlp Suite PresentationGtb Dlp Suite Presentation
Gtb Dlp Suite Presentation
 
NetSafe_Fortinet - 13martie2012
NetSafe_Fortinet - 13martie2012NetSafe_Fortinet - 13martie2012
NetSafe_Fortinet - 13martie2012
 
Lecture 8 mail security
Lecture 8 mail securityLecture 8 mail security
Lecture 8 mail security
 
Securing Your Endpoints Using Novell ZENworks Endpoint Security Management
Securing Your Endpoints Using Novell ZENworks Endpoint Security ManagementSecuring Your Endpoints Using Novell ZENworks Endpoint Security Management
Securing Your Endpoints Using Novell ZENworks Endpoint Security Management
 
GTB DLP - Content Aware Security Suite
GTB DLP - Content Aware Security SuiteGTB DLP - Content Aware Security Suite
GTB DLP - Content Aware Security Suite
 
Moving Security Model From Content to Context
Moving Security Model From Content to ContextMoving Security Model From Content to Context
Moving Security Model From Content to Context
 
E Convergence Solutions
E Convergence SolutionsE Convergence Solutions
E Convergence Solutions
 
CELC_Цифровые медиа и Физическая безопасность
CELC_Цифровые медиа и Физическая безопасностьCELC_Цифровые медиа и Физическая безопасность
CELC_Цифровые медиа и Физическая безопасность
 
GTB DLP Suite Presentation
GTB DLP Suite PresentationGTB DLP Suite Presentation
GTB DLP Suite Presentation
 
NetSafe - 11nov2011
NetSafe - 11nov2011NetSafe - 11nov2011
NetSafe - 11nov2011
 
8 Authentication Security Protocols
8 Authentication Security Protocols8 Authentication Security Protocols
8 Authentication Security Protocols
 
Scop 11nov2011
Scop   11nov2011Scop   11nov2011
Scop 11nov2011
 
Nagios Conference 2011 - Mike Weber - Training: Choosing Nagios Plugins To Use
Nagios Conference 2011 - Mike Weber  - Training: Choosing Nagios Plugins To UseNagios Conference 2011 - Mike Weber  - Training: Choosing Nagios Plugins To Use
Nagios Conference 2011 - Mike Weber - Training: Choosing Nagios Plugins To Use
 

More from Symantec Italia

Il Cloud a difesa della mail e del web
Il Cloud a difesa della mail e del webIl Cloud a difesa della mail e del web
Il Cloud a difesa della mail e del webSymantec Italia
 
Spam and Phishing Report - Marzo 2010
Spam and Phishing Report - Marzo 2010Spam and Phishing Report - Marzo 2010
Spam and Phishing Report - Marzo 2010Symantec Italia
 
Backup Exec 2010: la matrice di prodotto
Backup Exec 2010: la matrice di prodottoBackup Exec 2010: la matrice di prodotto
Backup Exec 2010: la matrice di prodottoSymantec Italia
 
Symantec Backup Exec 2010 per Windows Small Business Server
Symantec Backup Exec 2010 per Windows Small Business ServerSymantec Backup Exec 2010 per Windows Small Business Server
Symantec Backup Exec 2010 per Windows Small Business ServerSymantec Italia
 
Backup Exec 2010. Domande frequenti
Backup Exec 2010. Domande frequentiBackup Exec 2010. Domande frequenti
Backup Exec 2010. Domande frequentiSymantec Italia
 
Symantec Backup Exec 2010
Symantec Backup Exec 2010Symantec Backup Exec 2010
Symantec Backup Exec 2010Symantec Italia
 
Phishing Report Gennaio 2010
Phishing Report Gennaio 2010Phishing Report Gennaio 2010
Phishing Report Gennaio 2010Symantec Italia
 
Spam Report Gennaio 2010
Spam Report Gennaio 2010Spam Report Gennaio 2010
Spam Report Gennaio 2010Symantec Italia
 
Storage: le Tendenze per il 2010
Storage: le Tendenze per il 2010Storage: le Tendenze per il 2010
Storage: le Tendenze per il 2010Symantec Italia
 
Sicurezza Internet: tendenze e previsioni 2010
Sicurezza Internet: tendenze e previsioni 2010Sicurezza Internet: tendenze e previsioni 2010
Sicurezza Internet: tendenze e previsioni 2010Symantec Italia
 
Symantec Backup Exec System Recovery 2010
Symantec Backup Exec System Recovery 2010Symantec Backup Exec System Recovery 2010
Symantec Backup Exec System Recovery 2010Symantec Italia
 
Phishing Report Novembre 2009
Phishing Report Novembre 2009Phishing Report Novembre 2009
Phishing Report Novembre 2009Symantec Italia
 
Report on Rogue Security Software: a summary
Report on Rogue Security Software: a summaryReport on Rogue Security Software: a summary
Report on Rogue Security Software: a summarySymantec Italia
 
Report on Rogue Security Software
Report on Rogue Security SoftwareReport on Rogue Security Software
Report on Rogue Security SoftwareSymantec Italia
 
Smb Disaster Preparedness Survey Italia
Smb Disaster Preparedness Survey ItaliaSmb Disaster Preparedness Survey Italia
Smb Disaster Preparedness Survey ItaliaSymantec Italia
 
I primi dieci vantaggi di Symantec Protection Suite e i primi dieci motivi pe...
I primi dieci vantaggi di Symantec Protection Suite e i primi dieci motivi pe...I primi dieci vantaggi di Symantec Protection Suite e i primi dieci motivi pe...
I primi dieci vantaggi di Symantec Protection Suite e i primi dieci motivi pe...Symantec Italia
 
Symantec Endpoint Protection: la tecnologia Antivirus Symantec di nuova gener...
Symantec Endpoint Protection: la tecnologia Antivirus Symantec di nuova gener...Symantec Endpoint Protection: la tecnologia Antivirus Symantec di nuova gener...
Symantec Endpoint Protection: la tecnologia Antivirus Symantec di nuova gener...Symantec Italia
 
Symantec Internet Security Threat Report, Volume XIV
Symantec Internet Security Threat Report, Volume XIVSymantec Internet Security Threat Report, Volume XIV
Symantec Internet Security Threat Report, Volume XIVSymantec Italia
 
Symantec Backup Exec 12.5 for Windows Server e Symantec Backup Exec System Re...
Symantec Backup Exec 12.5 for Windows Server e Symantec Backup Exec System Re...Symantec Backup Exec 12.5 for Windows Server e Symantec Backup Exec System Re...
Symantec Backup Exec 12.5 for Windows Server e Symantec Backup Exec System Re...Symantec Italia
 

More from Symantec Italia (20)

Il Cloud a difesa della mail e del web
Il Cloud a difesa della mail e del webIl Cloud a difesa della mail e del web
Il Cloud a difesa della mail e del web
 
Duqu: il nuovo Stuxnet?
Duqu: il nuovo Stuxnet?Duqu: il nuovo Stuxnet?
Duqu: il nuovo Stuxnet?
 
Spam and Phishing Report - Marzo 2010
Spam and Phishing Report - Marzo 2010Spam and Phishing Report - Marzo 2010
Spam and Phishing Report - Marzo 2010
 
Backup Exec 2010: la matrice di prodotto
Backup Exec 2010: la matrice di prodottoBackup Exec 2010: la matrice di prodotto
Backup Exec 2010: la matrice di prodotto
 
Symantec Backup Exec 2010 per Windows Small Business Server
Symantec Backup Exec 2010 per Windows Small Business ServerSymantec Backup Exec 2010 per Windows Small Business Server
Symantec Backup Exec 2010 per Windows Small Business Server
 
Backup Exec 2010. Domande frequenti
Backup Exec 2010. Domande frequentiBackup Exec 2010. Domande frequenti
Backup Exec 2010. Domande frequenti
 
Symantec Backup Exec 2010
Symantec Backup Exec 2010Symantec Backup Exec 2010
Symantec Backup Exec 2010
 
Phishing Report Gennaio 2010
Phishing Report Gennaio 2010Phishing Report Gennaio 2010
Phishing Report Gennaio 2010
 
Spam Report Gennaio 2010
Spam Report Gennaio 2010Spam Report Gennaio 2010
Spam Report Gennaio 2010
 
Storage: le Tendenze per il 2010
Storage: le Tendenze per il 2010Storage: le Tendenze per il 2010
Storage: le Tendenze per il 2010
 
Sicurezza Internet: tendenze e previsioni 2010
Sicurezza Internet: tendenze e previsioni 2010Sicurezza Internet: tendenze e previsioni 2010
Sicurezza Internet: tendenze e previsioni 2010
 
Symantec Backup Exec System Recovery 2010
Symantec Backup Exec System Recovery 2010Symantec Backup Exec System Recovery 2010
Symantec Backup Exec System Recovery 2010
 
Phishing Report Novembre 2009
Phishing Report Novembre 2009Phishing Report Novembre 2009
Phishing Report Novembre 2009
 
Report on Rogue Security Software: a summary
Report on Rogue Security Software: a summaryReport on Rogue Security Software: a summary
Report on Rogue Security Software: a summary
 
Report on Rogue Security Software
Report on Rogue Security SoftwareReport on Rogue Security Software
Report on Rogue Security Software
 
Smb Disaster Preparedness Survey Italia
Smb Disaster Preparedness Survey ItaliaSmb Disaster Preparedness Survey Italia
Smb Disaster Preparedness Survey Italia
 
I primi dieci vantaggi di Symantec Protection Suite e i primi dieci motivi pe...
I primi dieci vantaggi di Symantec Protection Suite e i primi dieci motivi pe...I primi dieci vantaggi di Symantec Protection Suite e i primi dieci motivi pe...
I primi dieci vantaggi di Symantec Protection Suite e i primi dieci motivi pe...
 
Symantec Endpoint Protection: la tecnologia Antivirus Symantec di nuova gener...
Symantec Endpoint Protection: la tecnologia Antivirus Symantec di nuova gener...Symantec Endpoint Protection: la tecnologia Antivirus Symantec di nuova gener...
Symantec Endpoint Protection: la tecnologia Antivirus Symantec di nuova gener...
 
Symantec Internet Security Threat Report, Volume XIV
Symantec Internet Security Threat Report, Volume XIVSymantec Internet Security Threat Report, Volume XIV
Symantec Internet Security Threat Report, Volume XIV
 
Symantec Backup Exec 12.5 for Windows Server e Symantec Backup Exec System Re...
Symantec Backup Exec 12.5 for Windows Server e Symantec Backup Exec System Re...Symantec Backup Exec 12.5 for Windows Server e Symantec Backup Exec System Re...
Symantec Backup Exec 12.5 for Windows Server e Symantec Backup Exec System Re...
 

Garantire la confidenzialità delle informazioni: la soluzione PGP per l'Encryption

  • 1. Garantire la confidenzialità delle informazioni: la soluzione PGP per l'Encryption Antonio Forzieri – CISSP, CISA, CISM Principal Consultant, Technical Sales Organization Symantec Black Market – 11 Novembre 2010 – East End Studios 1
  • 2. PGP® Encryption Platform una soluzione alle sfide del dato PGP® Encryption Solutions 3rd Party Solutions Disk and File Mobile Commercial Commercial Custom Email Mainframe Device Devices Hardware Software Applications Key Lifecycle Key Storage Authentication Auditing Reporting Logging Policy Management Automated Operations and Provisioning PGP® Encryption Platform Existing Infrastructure Symantec Black Market – 11 Novembre 2010 – East End Studios 2
  • 3. Architettura PGP una soluzione centralizzata PGP Universal Server™ Future Products Central Management of • Leverage PGP® Encryption Platform Encryption Applications Smartphone solutions • PGP® Mobile • PGP® Support Package for BlackBerry® PGP® Command Line • Secure FTP/Batch & Backups PGP® Portable • USB Device & Media Encryption PGP® Whole Disk Encryption • Laptop & Disk Security PGP® Desktop Email • Email, File, Disk, & IM Encryption Il prodotto utilizza il PGP PGP® NetShare SDK, un maturo modulo • Shared Server Storage Security crittografico validato FIPS-140-2 PGP Universal Gateway Email • User-transparent, Gateway Email Encryption Symantec Black Market – 11 Novembre 2010 – East End Studios 3
  • 4. Architettura PGP un caso reale Logs / Monitoring SYSLOG (Port 514) SNMP (Port 161) PGP Universal Cluster (444) Directory Integration (636) FTP or SCP Backups (Port 21 or 22) Admin UI (9000) N 444 N PGP Desktop Policy 443 L External Client L WDE, USB, Logging, B 443 Key Mgmt, Port 443 B Remote User – 636 636 Allows for Logs, Use Cases: Sync Policy, and Existing WDE / Migrated Enrollments New WDE WDE Users “In the Wild” Administrator Mail System Daily Status Email Admin External DMZ Internal Symantec Black Market – 11 Novembre 2010 – East End Studios 4