SlideShare a Scribd company logo
1 of 54
Download to read offline
Innovations in cyber security technologies

Arturs Filatovs
Business Development
Manager
March 2014
Arrow ECS RoadShow Baltics

Symantec Encryption ā€“
Building A
Digital Fortress
Arturs Filatovs business card

More then 5 years experience in delivering Innovative
IT Security Solutions to Baltic states
Knowledge of more then 25 different IT Security
Solutions
Specialization - Mobile IT Security
Lets move our hands ā€“ who is here today?

CISO

Director, Desktop Ops

Director, Network Ops

Helpdesk Manager
Todays To do list

ā€œData Security Solutionsā€ role in Baltics
Technology vs. Time
Encryptionā€™s role in security
Don't be scared ā€“ Encrypt everything
Build Digital fortress with Symantec Tech
ā€œData Security Solutionsā€ business card

Specialization ā€“ IT Security
IT Security services (consulting,
audit, pen-testing, market analysis,
system testing and integration,
training and technical support)
Solutions and experience portfolio
with more than 20 different
technologies ā€“ cyber-security global
market leaders from more than 10
countries
Trusted services provider for
banks,
insurance
companies,
government and private companies
(critical infrastructure etc.)
Role of DSS in Cyber-security
Development in Baltics
Cyber-Security Awareness Raising
Technology and knowledge transfer
Most Innovative Portfolio
Trusted Advisor to its Customers
Cybersecurity Awareness Raising

Own organized conference ā€œDSS ITSECā€
5th annual event this year
More than 400 visitors and more than 250 online
live streaming watchers from LV, EE, LT
4 parallel sessions with more than 40
international speakers, including Microsoft, Oracle,
Symantec, IBM, Samsung and many more ā€“
everything free of charge
Participation in other events & sponsorship
CERT & ISACA conferences
RIGA COMM exhibition & conferences
Roadshows and events in Latvia / Lithuania /
Estonia (f.i. Vilnius Innovation Forum, Devcon,
ITSEC HeadLight, SFK, business associations)
Participation in cyber security discussions,
preparations, seminaries, publications etc.

strategy
Innovations ā€“ technology & knowledge transfer

Innovative Technology Transfer
Number of unique projects done with
different technology global leadership
vendors
Knowledge transfer (own employees,
customers ā€“ both from private & public,
other IT companies)
Areas include:
Endpoint Security
Network Security
Security Management
Application Security
Mobile Security
Data Security
Cyber-security
Security Intelligence
Our portfolio is most innovative in Baltics!
Some just basic ideas
Lets Start
Time line

PAST
NOW
Technology is everywhere

AND NOW SERIOUSLY
PC era to MOBILE era

PC era

Mobile era
Consolidation of IT in 21st Century

We are at point where
functionality of desktop collides
with mobility of mobile device.

Mobile IT
Technology development over time
IT Must Evolve To Meet New Demands

InformationCentric
System-Centric

ā€¢ Collaborative Apps and Social
Media
ā€¢ Transactional Apps

ā€¢ Unstructured data

ā€¢ Structured Data

ā€¢ Distributed information

ā€¢ Centralized information

ā€¢ People are the new perimeter

ā€¢ Perimeter-based security

ā€¢ Virtual Infrastructure and Cloud

ā€¢ On-premise infrastructure
Endpoints: The Borderless Enterprise

Field

Data Center

Headquarters

Field Offices

Point
of Sale

Point
of Sale

$262 Million: Estimated cost of
the Heartland Payment Systems
breach1
1Based

Global Internet Security Threat Report, Trends for 2008

Customer email
stored on mobile
phone

12,000 Laptops lost
in United States
airports every week2

Trojans, malware, unauthorized 1 in 10 people have lost a laptop, smart
software
phone, or USB drive with corporate
information on it3

on 130,000,000 records lost (Datalossdb.org) and $202 per record (Ponemon Institute)

3Symantec

Corporate data
copied onto USB
drive

2http://www.darkreading.com/security/encryption/showArticle.jhtml?articleID=211201139
Cloud is taking us much higherā€¦
Choose the right cloud smart way..
Passwords?
When we have to change our password...
Some questions?

Who from you are using encryption?
What will happen if data will be lost/stolen?
Who will be responsible?
When you are sending confidential data via post, how
do you secure it?
Encryption beginnings ā€“ Sparta/ Greeks/ Rome

Greek generals used Scytel to encrypt and decrypt
messages (Symmetric encryption)
In what our organizations believe today

SSL/ TLS/ VPN/ HTTPS ā€“ this is only
data in motion using x.509
What we use for document security

E-Signatures ā€“ Limited functionality for
document encryption data at rest/ data in motion
Not User friendly (smart cards, Card readers,
USB tokens ā€¦ )
Separate solutions less security
NSA did ā€œgreat workā€¦ā€

Hmmm....NSA?
Cyber criminals don't sleep
Encryption threats by Ponemon Institute

Our Users are our weakest link
Mobility - Potential For Data Loss

47% of corporate
data resides on
mobile devices

43% of employees
lost a device with
company data

32% of employees didnā€™t report the loss or theft in a timely fashion
Our users weakest link

1 in 10

people have lost a laptop,
smart phone, or USB drive with
corporate information on it*

32%

of employees didnā€™t report the
loss or theft in a timely fashion*
*Symantec Global Internet Security Threat Report
Data protection priorities Ponemon
Concerns from customer side

Hardware-based encryption is
faster and itā€™s an option on Dell
and other PCs.
Why do I need encryption if I
have
DLP
or
Endpoint
monitoring?
We are going to wait for our
Windows 7 rollout in our
environment and use Bit locker
How to recover encrypted
info?
Master key is security risk for
us.
Encryption is not a rocket science
Encryption is easy
Centralized key administration is solution
Products

Tasks Objectives

Don't be scared ā€“ Encrypt everything

Keep data secure
Meet compliance objectives
Protect data at rest

Protect the business
Control costs and liabilities

Protect data in motion

Protect data in use

Endpoint Data
Protection

File and Server
Protection

Email
Protection

ā€¢ PGP Whole Disk
Encryption

ā€¢ PGP NetShare

ā€¢ PGP Desktop Email

ā€¢ PGP Command Line

ā€¢ PGP Gateway Email

ā€¢ SEE FDE
ā€¢ SEE RSE

ā€¢ PGP PDF Messenger

ā€¢ PGP Portable

ā€¢ PGP Support Package
for BlackBerry

ā€¢ SEE Device Control

ā€¢ PGP Mobile

Management
ā€¢ PGP Universal Server
ā€¢ PGP Key Management
Server
Oh Boy do we

got solution for you!
Build Digital fortress with Symantec
Full Disk Encryption (FDE)
ā€¢ PGPĀ® Whole Disk Encryption
ā€¢ Symantec Endpoint Encryption (EE) FDE

Device and Media Encryption
ā€¢ PGP Portable
ā€¢ SEE Removable Storage Edition (RSE)
ā€¢ SEE Device Control

FTP/Batch and Backups
ā€¢ PGPĀ® Command Line

Management
Central Management of
Encryption Applications
PGPĀ® Universal ā„¢ Server

File/Folder/Shared Server Encryption
ā€¢ PGPĀ® NetShare

Gateway Email Encryption
ā€¢ PGPĀ® Gateway Email

End-End Email and IM Encryption

Key Management

PGPĀ® Key Management
Server (KMS)

ā€¢ PGPĀ® Desktop Email

Smartphone Solutions
ā€¢ PGPĀ® Mobile
ā€¢ PGPĀ® Support Package for BlackBerryĀ®
42
Full Disk Encryption

Full disk encryption for desktops, laptops, and
WindowsĀ® servers. Supports WindowsĀ®, Mac
OSĀ® X, and LinuxĀ® platforms
ā€¢ Encrypts desktops, laptops, and USB-attached drives
ā€¢ Protects against personal computer loss,
theft, compromise and improper disposal
ā€¢ Reduces risk of loss of
PII (Personally Identifiable Information)
and other sensitive data
ā€¢ Supports Windows, Mac OS X, and Linux

PGP Whole Disk Encryption; SEE Full Disk
Encryption

43
Removable Media Protection

Removable Storage Encryption
ā€¢ Secure portable data at rest
ā€“ Enforce mandatory removable

storage encryption policies
ā€“ Access and re-encrypt data from any
PC or Mac

Centralized ā€“ Integrated
Management Console

Policies

Auditing

ā€¢ Granular file- and folder-based

encryption

ā€“ Allow encrypted and unencrypted

data on user devices
ā€“ Enforce policy-controlled exemptions
by file type and device
SEE Removable Storage Encryption

Removable
Media
Encryption
PGPĀ® Email Protection

PGPĀ® Desktop Email

PGP Universalā„¢
Gateway Email
PGPĀ®Ā®PDF Messenger
PGP Viewer for iOS

PGPĀ® Support Package
for BlackBerryĀ®

Desktop-based Email Encryption
ā€¢ Automatic end-to-end email encryption

Gateway-based Email Encryption
ā€¢ Clientless email encryption

Encrypted Email Viewer App for iOS
ā€¢ Decrypts and views messages
ā€¢ Verifies digital signatures

Encryption for BlackBerry Email
ā€¢ Native client access to encrypted email

Encryption for Windows Mobile Devices
PGPĀ®

Mobile

Symantec Encryption - Confidential

ā€¢ Encrypted Email
ā€¢ Encrypted Files and Folders

45
File/Folder Encryption

Distributed file protection
Shared file protection
User file protection

Protect individual files and folders
Protect shared files and folders
Protect transferred files and folders

PGP NetShare, PGP Command Line
46
PGPĀ® File and Server Protection

PGPĀ® NetShare

PGPĀ® Command
Line

Shared File Protection
ā€¢ Protect data exchanged between users via shared
network folders

Scriptable Encryption
ā€¢ Integrate encryption into data transfer, data
distribution and data backup processes
PGP or Symantec Endpoint Encryption?
Products

Exceptions
Customer Need

Default Play

Existing
SEE/GE
Customer

DAR U.S.
Fed
SmartBuy

Active Directory +
MSFT Stack

PGP Whole Disk Encryption
PGP Portable

SEE Removable Storage Encryption

SEE Device Control

Endpoint Encryption

SEE Full Disk Encryption
SEE Device Control

PGP Desktop Email
Email Encryption

PGP Gateway Email
PGP Mobile
PGP Support Package for BlackBerry

Server / File Encryption
Management

PGP NetShare
PGP Command Line
PGP Universal Server and PGP Key Management Server (KMS)

ā€¢ Symantecā€™s strategic direction for Endpoint Encryption is to ā€œconvergeā€ the solutions into a single offering.
ā€¢ In the interim, Symantec will provide full support for both Endpoint Encryption technologies.
Selling Symantec Encryption Products

48
Defense-In-Depth: Encryption + DLP

Network DLP / Gateway Encryption
ā€¢ Automatically encrypt emails containing sensitive data
ā€¢ Notify employees in real time/context about encryption policies and tools

Storage DLP / File-Based Encryption
ā€¢ Discover where confidential data files are stored and automatically apply
encryption
ā€¢ Ease the burden to IT staff with near transparence to users

Endpoint DLP / Removable Storage Encryption
ā€¢ Target high risk users by discovering what laptops contain sensitive data
ā€¢ Protect AND enable the business by targeting encryption efforts to
sensitive data moving to USB devices
DLP + PGP Universal Gateway Email
5 Email encrypted and sent

1 Receive email

MTA or Proxy

PGP Universal Server

4 Violation detected - re-route
to encryption server
2 Check email content
for encryption policy
violations

3 No violation - email sent

Key Benefits:
ā€¢ Automate gateway encryption; ease burden on end users
ā€¢ Enforce and report on encryption policies
Complete Encryption Platform
Takeaway

Technology lifecycle from 3-6 year to 6-12 months
Encryption will help you sleep tight
Donā€™t be scared to encrypt all type of data
Centralized key management is important
One encryption solution for different type of date
Select DSS as your trusted security advisor ā€“ we
work with Symantec (PGP) more than 5 years already!!
Think security first

www.dss.lv
info@dss.lv
+371 27194080 / +371 29162784
Think security first

More Related Content

What's hot

DataLockerOverview vs 3.9 Final_120715
DataLockerOverview vs 3.9 Final_120715DataLockerOverview vs 3.9 Final_120715
DataLockerOverview vs 3.9 Final_120715
Patrick Eyberg
Ā 
Jms secure data presentation
Jms secure data  presentationJms secure data  presentation
Jms secure data presentation
JMS Secure Data
Ā 
Cloud Security & Control: A Multi-Layer Approach to Secure Cloud Computing
Cloud Security & Control: A Multi-Layer Approach to Secure Cloud ComputingCloud Security & Control: A Multi-Layer Approach to Secure Cloud Computing
Cloud Security & Control: A Multi-Layer Approach to Secure Cloud Computing
OpSource
Ā 

What's hot (20)

ESET: Delivering Benefits to Enterprises
ESET: Delivering Benefits to EnterprisesESET: Delivering Benefits to Enterprises
ESET: Delivering Benefits to Enterprises
Ā 
DataLockerOverview vs 3.9 Final_120715
DataLockerOverview vs 3.9 Final_120715DataLockerOverview vs 3.9 Final_120715
DataLockerOverview vs 3.9 Final_120715
Ā 
Secure Email Communications from Symantec
Secure Email Communications from SymantecSecure Email Communications from Symantec
Secure Email Communications from Symantec
Ā 
ESET: Delivering Benefits to Medium and Large Businesses
ESET: Delivering Benefits to Medium and Large BusinessesESET: Delivering Benefits to Medium and Large Businesses
ESET: Delivering Benefits to Medium and Large Businesses
Ā 
SafeNet DataSecure vs. Native SQL Server Encryption
SafeNet DataSecure vs. Native SQL Server EncryptionSafeNet DataSecure vs. Native SQL Server Encryption
SafeNet DataSecure vs. Native SQL Server Encryption
Ā 
MT 68 Hunting for the Threat: When You Donā€™t Know If Youā€™ve Been Breached
MT 68 Hunting for the Threat: When You Donā€™t Know If Youā€™ve Been Breached MT 68 Hunting for the Threat: When You Donā€™t Know If Youā€™ve Been Breached
MT 68 Hunting for the Threat: When You Donā€™t Know If Youā€™ve Been Breached
Ā 
PCI Compliance Evolved
PCI Compliance EvolvedPCI Compliance Evolved
PCI Compliance Evolved
Ā 
ESET is introducing its brand new product ESET Secure Authentication
ESET is introducing its brand new product ESET Secure AuthenticationESET is introducing its brand new product ESET Secure Authentication
ESET is introducing its brand new product ESET Secure Authentication
Ā 
Make the Upgrade: Data protection in the cloud
Make the Upgrade: Data protection in the cloudMake the Upgrade: Data protection in the cloud
Make the Upgrade: Data protection in the cloud
Ā 
Jms secure data presentation
Jms secure data  presentationJms secure data  presentation
Jms secure data presentation
Ā 
Technology Overview - Symantec IT Management Suite (ITMS)
Technology Overview - Symantec IT Management Suite (ITMS)Technology Overview - Symantec IT Management Suite (ITMS)
Technology Overview - Symantec IT Management Suite (ITMS)
Ā 
ESET: #DoMore With Our Comprehensive Range of Business Products
ESET: #DoMore With Our Comprehensive Range of Business ProductsESET: #DoMore With Our Comprehensive Range of Business Products
ESET: #DoMore With Our Comprehensive Range of Business Products
Ā 
Infowatch endpoint security
Infowatch endpoint securityInfowatch endpoint security
Infowatch endpoint security
Ā 
8 WAYS TO PROTECT THE DATA IN YOUR OFFICE: #4 Secure your office IoT
8 WAYS TO PROTECT THE DATA IN YOUR OFFICE: #4 Secure your office IoT8 WAYS TO PROTECT THE DATA IN YOUR OFFICE: #4 Secure your office IoT
8 WAYS TO PROTECT THE DATA IN YOUR OFFICE: #4 Secure your office IoT
Ā 
Protect Your Sensitive Data with Gemalto Guidebook
Protect Your Sensitive Data with Gemalto Guidebook Protect Your Sensitive Data with Gemalto Guidebook
Protect Your Sensitive Data with Gemalto Guidebook
Ā 
SafeNet - Data Protection Company
SafeNet - Data Protection CompanySafeNet - Data Protection Company
SafeNet - Data Protection Company
Ā 
Zero footprint guest memory introspection from xen
Zero footprint guest memory introspection from xenZero footprint guest memory introspection from xen
Zero footprint guest memory introspection from xen
Ā 
Cloud Security & Control: A Multi-Layer Approach to Secure Cloud Computing
Cloud Security & Control: A Multi-Layer Approach to Secure Cloud ComputingCloud Security & Control: A Multi-Layer Approach to Secure Cloud Computing
Cloud Security & Control: A Multi-Layer Approach to Secure Cloud Computing
Ā 
SafeNet Enterprise Key and Crypto Management
SafeNet Enterprise Key and Crypto ManagementSafeNet Enterprise Key and Crypto Management
SafeNet Enterprise Key and Crypto Management
Ā 
Mudhrastec corporate brochur
Mudhrastec corporate brochur Mudhrastec corporate brochur
Mudhrastec corporate brochur
Ā 

Viewers also liked

2014 - Digital Era Seminary #1 - Agnese Bobovica - Datu drosiba veselibas nozare
2014 - Digital Era Seminary #1 - Agnese Bobovica - Datu drosiba veselibas nozare2014 - Digital Era Seminary #1 - Agnese Bobovica - Datu drosiba veselibas nozare
2014 - Digital Era Seminary #1 - Agnese Bobovica - Datu drosiba veselibas nozare
Andris Soroka
Ā 
2014 - Digital Era Seminary #1 - Arnis Puksts - Izmainas ES personas datu regula
2014 - Digital Era Seminary #1 - Arnis Puksts - Izmainas ES personas datu regula2014 - Digital Era Seminary #1 - Arnis Puksts - Izmainas ES personas datu regula
2014 - Digital Era Seminary #1 - Arnis Puksts - Izmainas ES personas datu regula
Andris Soroka
Ā 
2014 - Digital Era Seminary #1 - Ivo Krievs - Datu drosiba darba vieta
2014 - Digital Era Seminary #1 - Ivo Krievs - Datu drosiba darba vieta2014 - Digital Era Seminary #1 - Ivo Krievs - Datu drosiba darba vieta
2014 - Digital Era Seminary #1 - Ivo Krievs - Datu drosiba darba vieta
Andris Soroka
Ā 
2014 - Digital Era Seminary #1 - Sintija Deruma - Informacijas drosibas profe...
2014 - Digital Era Seminary #1 - Sintija Deruma - Informacijas drosibas profe...2014 - Digital Era Seminary #1 - Sintija Deruma - Informacijas drosibas profe...
2014 - Digital Era Seminary #1 - Sintija Deruma - Informacijas drosibas profe...
Andris Soroka
Ā 
Digitālā Ēra 2016 - Ivo Krievs - Likumiskās intereses kā personas datu apstrā...
Digitālā Ēra 2016 - Ivo Krievs - Likumiskās intereses kā personas datu apstrā...Digitālā Ēra 2016 - Ivo Krievs - Likumiskās intereses kā personas datu apstrā...
Digitālā Ēra 2016 - Ivo Krievs - Likumiskās intereses kā personas datu apstrā...
Andris Soroka
Ā 

Viewers also liked (18)

2014 - DSS - Mobile devices & security overview
2014 - DSS - Mobile devices & security overview2014 - DSS - Mobile devices & security overview
2014 - DSS - Mobile devices & security overview
Ā 
2015 - The Cloud for Managers @ Riga Business School - DSS - Cloud risks and ...
2015 - The Cloud for Managers @ Riga Business School - DSS - Cloud risks and ...2015 - The Cloud for Managers @ Riga Business School - DSS - Cloud risks and ...
2015 - The Cloud for Managers @ Riga Business School - DSS - Cloud risks and ...
Ā 
2014 - Digital Era Seminary #1 - Agnese Bobovica - Datu drosiba veselibas nozare
2014 - Digital Era Seminary #1 - Agnese Bobovica - Datu drosiba veselibas nozare2014 - Digital Era Seminary #1 - Agnese Bobovica - Datu drosiba veselibas nozare
2014 - Digital Era Seminary #1 - Agnese Bobovica - Datu drosiba veselibas nozare
Ā 
2014 - Digital Era Seminary #1 - Arnis Puksts - Izmainas ES personas datu regula
2014 - Digital Era Seminary #1 - Arnis Puksts - Izmainas ES personas datu regula2014 - Digital Era Seminary #1 - Arnis Puksts - Izmainas ES personas datu regula
2014 - Digital Era Seminary #1 - Arnis Puksts - Izmainas ES personas datu regula
Ā 
2014 - Digital Era Seminary #1 - Ivo Krievs - Datu drosiba darba vieta
2014 - Digital Era Seminary #1 - Ivo Krievs - Datu drosiba darba vieta2014 - Digital Era Seminary #1 - Ivo Krievs - Datu drosiba darba vieta
2014 - Digital Era Seminary #1 - Ivo Krievs - Datu drosiba darba vieta
Ā 
DSS @SFK International Conference - March 2014 - Quantifying Business Value o...
DSS @SFK International Conference - March 2014 - Quantifying Business Value o...DSS @SFK International Conference - March 2014 - Quantifying Business Value o...
DSS @SFK International Conference - March 2014 - Quantifying Business Value o...
Ā 
DSS ITSEC 2013 Conference 07.11.2013 - ISACA LATVIA IVO IVANOVS
DSS ITSEC 2013 Conference 07.11.2013  - ISACA LATVIA IVO IVANOVSDSS ITSEC 2013 Conference 07.11.2013  - ISACA LATVIA IVO IVANOVS
DSS ITSEC 2013 Conference 07.11.2013 - ISACA LATVIA IVO IVANOVS
Ā 
DSS ITSEC 2013 Conference 07.11.2013 - HeadTechnology - IT security trends 2014
DSS ITSEC 2013 Conference 07.11.2013  - HeadTechnology - IT security trends 2014DSS ITSEC 2013 Conference 07.11.2013  - HeadTechnology - IT security trends 2014
DSS ITSEC 2013 Conference 07.11.2013 - HeadTechnology - IT security trends 2014
Ā 
2015 Data Security Solutions @SFK - Working and living in digital work of future
2015 Data Security Solutions @SFK - Working and living in digital work of future2015 Data Security Solutions @SFK - Working and living in digital work of future
2015 Data Security Solutions @SFK - Working and living in digital work of future
Ā 
2015 - Data Security Solutions @Dienas Bizness Exigen IBM - Business Data Pro...
2015 - Data Security Solutions @Dienas Bizness Exigen IBM - Business Data Pro...2015 - Data Security Solutions @Dienas Bizness Exigen IBM - Business Data Pro...
2015 - Data Security Solutions @Dienas Bizness Exigen IBM - Business Data Pro...
Ā 
2014 - Digital Era Seminary #1 - Sintija Deruma - Informacijas drosibas profe...
2014 - Digital Era Seminary #1 - Sintija Deruma - Informacijas drosibas profe...2014 - Digital Era Seminary #1 - Sintija Deruma - Informacijas drosibas profe...
2014 - Digital Era Seminary #1 - Sintija Deruma - Informacijas drosibas profe...
Ā 
Digitālā Ēra 2016 - Ivo Krievs - Likumiskās intereses kā personas datu apstrā...
Digitālā Ēra 2016 - Ivo Krievs - Likumiskās intereses kā personas datu apstrā...Digitālā Ēra 2016 - Ivo Krievs - Likumiskās intereses kā personas datu apstrā...
Digitālā Ēra 2016 - Ivo Krievs - Likumiskās intereses kā personas datu apstrā...
Ā 
Symantec Solutions
Symantec SolutionsSymantec Solutions
Symantec Solutions
Ā 
Mobile Management
Mobile ManagementMobile Management
Mobile Management
Ā 
Symantec 2011 Encryption Flash Poll Global Results
Symantec 2011 Encryption Flash Poll Global ResultsSymantec 2011 Encryption Flash Poll Global Results
Symantec 2011 Encryption Flash Poll Global Results
Ā 
Why you need to secure mobile apps - now
Why you need to secure mobile apps - nowWhy you need to secure mobile apps - now
Why you need to secure mobile apps - now
Ā 
WWW.DSS.LV - Data Protection Basics 2015 - DeviceLock
WWW.DSS.LV - Data Protection Basics 2015 - DeviceLock WWW.DSS.LV - Data Protection Basics 2015 - DeviceLock
WWW.DSS.LV - Data Protection Basics 2015 - DeviceLock
Ā 
Symantec Data Insight for Storage
Symantec Data Insight for StorageSymantec Data Insight for Storage
Symantec Data Insight for Storage
Ā 

Similar to DSS Symantec PGP Encryption Fortress 2014 - ArrowECS - RoadShow Baltics

Smart Cards & Devices Forum 2013 - Protecting enterprise sensitive informatio...
Smart Cards & Devices Forum 2013 - Protecting enterprise sensitive informatio...Smart Cards & Devices Forum 2013 - Protecting enterprise sensitive informatio...
Smart Cards & Devices Forum 2013 - Protecting enterprise sensitive informatio...
OKsystem
Ā 
What i learned at gartner summit 2019
What i learned at gartner summit 2019What i learned at gartner summit 2019
What i learned at gartner summit 2019
Ulf Mattsson
Ā 
Information Security
Information SecurityInformation Security
Information Security
Mohit8780
Ā 
Trend micro data protection
Trend micro data protectionTrend micro data protection
Trend micro data protection
Andrew Wong
Ā 

Similar to DSS Symantec PGP Encryption Fortress 2014 - ArrowECS - RoadShow Baltics (20)

Secure channels main deck
Secure channels main deckSecure channels main deck
Secure channels main deck
Ā 
Smart Cards & Devices Forum 2013 - Protecting enterprise sensitive informatio...
Smart Cards & Devices Forum 2013 - Protecting enterprise sensitive informatio...Smart Cards & Devices Forum 2013 - Protecting enterprise sensitive informatio...
Smart Cards & Devices Forum 2013 - Protecting enterprise sensitive informatio...
Ā 
Dell sonicwall connected security
Dell sonicwall connected securityDell sonicwall connected security
Dell sonicwall connected security
Ā 
Hardwar based Security of Systems
Hardwar based Security of SystemsHardwar based Security of Systems
Hardwar based Security of Systems
Ā 
Cyber security event
Cyber security eventCyber security event
Cyber security event
Ā 
Come gestire l'encryption dei dati con SKLM
Come gestire l'encryption dei dati con SKLMCome gestire l'encryption dei dati con SKLM
Come gestire l'encryption dei dati con SKLM
Ā 
What i learned at gartner summit 2019
What i learned at gartner summit 2019What i learned at gartner summit 2019
What i learned at gartner summit 2019
Ā 
IBM Share Conference 2010, Boston, Ulf Mattsson
IBM Share Conference 2010, Boston, Ulf MattssonIBM Share Conference 2010, Boston, Ulf Mattsson
IBM Share Conference 2010, Boston, Ulf Mattsson
Ā 
M I Dentity 3 G 040111
M I Dentity 3 G 040111M I Dentity 3 G 040111
M I Dentity 3 G 040111
Ā 
Safend General Presentation 2010
Safend General Presentation 2010Safend General Presentation 2010
Safend General Presentation 2010
Ā 
Cloud_security.pptx
Cloud_security.pptxCloud_security.pptx
Cloud_security.pptx
Ā 
Efficiency, effectiveness, productivity: Dell Connected Security in action
Efficiency, effectiveness, productivity: Dell Connected Security in actionEfficiency, effectiveness, productivity: Dell Connected Security in action
Efficiency, effectiveness, productivity: Dell Connected Security in action
Ā 
Nordic IT Security 2014 agenda
Nordic IT Security 2014 agendaNordic IT Security 2014 agenda
Nordic IT Security 2014 agenda
Ā 
Information Security
Information SecurityInformation Security
Information Security
Ā 
Dart Key ENG
Dart Key ENGDart Key ENG
Dart Key ENG
Ā 
The day when 3rd party security providers disappear into cloud bright talk se...
The day when 3rd party security providers disappear into cloud bright talk se...The day when 3rd party security providers disappear into cloud bright talk se...
The day when 3rd party security providers disappear into cloud bright talk se...
Ā 
Trend micro data protection
Trend micro data protectionTrend micro data protection
Trend micro data protection
Ā 
DSS ITSEC 2013 Conference 07.11.2013 - For your eyes only - Symantec PGP Re-L...
DSS ITSEC 2013 Conference 07.11.2013 - For your eyes only - Symantec PGP Re-L...DSS ITSEC 2013 Conference 07.11.2013 - For your eyes only - Symantec PGP Re-L...
DSS ITSEC 2013 Conference 07.11.2013 - For your eyes only - Symantec PGP Re-L...
Ā 
apsec 7 Golden Rules Data Leakage Prevention / DLP
apsec 7 Golden Rules Data Leakage Prevention / DLPapsec 7 Golden Rules Data Leakage Prevention / DLP
apsec 7 Golden Rules Data Leakage Prevention / DLP
Ā 
Developing Interoperable Components for an Open IoT Foundation
Developing Interoperable Components for an Open IoT Foundation Developing Interoperable Components for an Open IoT Foundation
Developing Interoperable Components for an Open IoT Foundation
Ā 

More from Andris Soroka

More from Andris Soroka (20)

Digitala Era 2017 - TransactPro - Normunds Aizstrauts - Maksājumu un finansu ...
Digitala Era 2017 - TransactPro - Normunds Aizstrauts - Maksājumu un finansu ...Digitala Era 2017 - TransactPro - Normunds Aizstrauts - Maksājumu un finansu ...
Digitala Era 2017 - TransactPro - Normunds Aizstrauts - Maksājumu un finansu ...
Ā 
Digitala Era 2017 - Datu Valsts Inspekcija - Lauris Linabergs - Vispārīgā dau...
Digitala Era 2017 - Datu Valsts Inspekcija - Lauris Linabergs - Vispārīgā dau...Digitala Era 2017 - Datu Valsts Inspekcija - Lauris Linabergs - Vispārīgā dau...
Digitala Era 2017 - Datu Valsts Inspekcija - Lauris Linabergs - Vispārīgā dau...
Ā 
Digitala Era 2017 - PMLP - Vilnis VÄ«toliņŔ - Gaisa kuÄ£u pasažieru datu apstrā...
Digitala Era 2017 - PMLP - Vilnis VÄ«toliņŔ - Gaisa kuÄ£u pasažieru datu apstrā...Digitala Era 2017 - PMLP - Vilnis VÄ«toliņŔ - Gaisa kuÄ£u pasažieru datu apstrā...
Digitala Era 2017 - PMLP - Vilnis VÄ«toliņŔ - Gaisa kuÄ£u pasažieru datu apstrā...
Ā 
Digitala Era 2017 - BOD LAW - LÄ«va Aleksejeva - LIELIE DATI un personas datu ...
Digitala Era 2017 - BOD LAW - LÄ«va Aleksejeva - LIELIE DATI un personas datu ...Digitala Era 2017 - BOD LAW - LÄ«va Aleksejeva - LIELIE DATI un personas datu ...
Digitala Era 2017 - BOD LAW - LÄ«va Aleksejeva - LIELIE DATI un personas datu ...
Ā 
Digitala Era 2017 - Spridzans Law Office - Anna Vladimirova Krykova - Mobilo ...
Digitala Era 2017 - Spridzans Law Office - Anna Vladimirova Krykova - Mobilo ...Digitala Era 2017 - Spridzans Law Office - Anna Vladimirova Krykova - Mobilo ...
Digitala Era 2017 - Spridzans Law Office - Anna Vladimirova Krykova - Mobilo ...
Ā 
Digitala Era 2017 - ZAB ā€œBULLETā€ - Ivo Krievs - Vai uz valsti attiecināmi cit...
Digitala Era 2017 - ZAB ā€œBULLETā€ - Ivo Krievs - Vai uz valsti attiecināmi cit...Digitala Era 2017 - ZAB ā€œBULLETā€ - Ivo Krievs - Vai uz valsti attiecināmi cit...
Digitala Era 2017 - ZAB ā€œBULLETā€ - Ivo Krievs - Vai uz valsti attiecināmi cit...
Ā 
Digitala Era 2017 - LSPDSA - Arnis Puksts - Datu aizsardzības speciālists (DPO)
Digitala Era 2017 - LSPDSA - Arnis Puksts - Datu aizsardzības speciālists (DPO)Digitala Era 2017 - LSPDSA - Arnis Puksts - Datu aizsardzības speciālists (DPO)
Digitala Era 2017 - LSPDSA - Arnis Puksts - Datu aizsardzības speciālists (DPO)
Ā 
Digitala Era 2017 - IIZI - Lauris KļaviņŔ - GDPR - Kādus izdevumus un riskus ...
Digitala Era 2017 - IIZI - Lauris KļaviņŔ - GDPR - Kādus izdevumus un riskus ...Digitala Era 2017 - IIZI - Lauris KļaviņŔ - GDPR - Kādus izdevumus un riskus ...
Digitala Era 2017 - IIZI - Lauris KļaviņŔ - GDPR - Kādus izdevumus un riskus ...
Ā 
Digitala Era 2017 - E-Risinajumi - Māris Ruķers - Vai ar vienu datu aizsardzī...
Digitala Era 2017 - E-Risinajumi - Māris Ruķers - Vai ar vienu datu aizsardzī...Digitala Era 2017 - E-Risinajumi - Māris Ruķers - Vai ar vienu datu aizsardzī...
Digitala Era 2017 - E-Risinajumi - Māris Ruķers - Vai ar vienu datu aizsardzī...
Ā 
Digitala Era 2017 - Gints PuŔkundzis - Personas datu apstrādes līgumi
Digitala Era 2017 - Gints PuŔkundzis - Personas datu apstrādes līgumi Digitala Era 2017 - Gints PuŔkundzis - Personas datu apstrādes līgumi
Digitala Era 2017 - Gints PuŔkundzis - Personas datu apstrādes līgumi
Ā 
Digitala Era 2017 - DatuAizsardziba.LV - Agnese Boboviča - Datu aizsardzības ...
Digitala Era 2017 - DatuAizsardziba.LV - Agnese Boboviča - Datu aizsardzības ...Digitala Era 2017 - DatuAizsardziba.LV - Agnese Boboviča - Datu aizsardzības ...
Digitala Era 2017 - DatuAizsardziba.LV - Agnese Boboviča - Datu aizsardzības ...
Ā 
Digitala Era 2017 - NotAKey - Janis Graubins - Mobile technologies for single...
Digitala Era 2017 - NotAKey - Janis Graubins - Mobile technologies for single...Digitala Era 2017 - NotAKey - Janis Graubins - Mobile technologies for single...
Digitala Era 2017 - NotAKey - Janis Graubins - Mobile technologies for single...
Ā 
Digitala Era 2017 - Hermitage Solutions - Gatis KauŔs - Clearswift - Komunikā...
Digitala Era 2017 - Hermitage Solutions - Gatis KauŔs - Clearswift - Komunikā...Digitala Era 2017 - Hermitage Solutions - Gatis KauŔs - Clearswift - Komunikā...
Digitala Era 2017 - Hermitage Solutions - Gatis KauŔs - Clearswift - Komunikā...
Ā 
Digitala Era 2017 - Digital Mind - Leons Mednis - eDiscovery risinājums GDPR ...
Digitala Era 2017 - Digital Mind - Leons Mednis - eDiscovery risinājums GDPR ...Digitala Era 2017 - Digital Mind - Leons Mednis - eDiscovery risinājums GDPR ...
Digitala Era 2017 - Digital Mind - Leons Mednis - eDiscovery risinājums GDPR ...
Ā 
Digitala Era 2017 - ALSO - Artjoms KrÅ«miņŔ - Personas datu regulas (EU GDPR) ...
Digitala Era 2017 - ALSO - Artjoms KrÅ«miņŔ - Personas datu regulas (EU GDPR) ...Digitala Era 2017 - ALSO - Artjoms KrÅ«miņŔ - Personas datu regulas (EU GDPR) ...
Digitala Era 2017 - ALSO - Artjoms KrÅ«miņŔ - Personas datu regulas (EU GDPR) ...
Ā 
Digitala Era 2017 - ZAB Skopiņa & Azanda - Jūlija Terjuhana - Tiesības uz dat...
Digitala Era 2017 - ZAB Skopiņa & Azanda - Jūlija Terjuhana - Tiesības uz dat...Digitala Era 2017 - ZAB Skopiņa & Azanda - Jūlija Terjuhana - Tiesības uz dat...
Digitala Era 2017 - ZAB Skopiņa & Azanda - Jūlija Terjuhana - Tiesības uz dat...
Ā 
Digitala Era 2017 - IT Centrs - Agris Krusts - Latvijas iedzīvotāju digitālo ...
Digitala Era 2017 - IT Centrs - Agris Krusts - Latvijas iedzīvotāju digitālo ...Digitala Era 2017 - IT Centrs - Agris Krusts - Latvijas iedzīvotāju digitālo ...
Digitala Era 2017 - IT Centrs - Agris Krusts - Latvijas iedzīvotāju digitālo ...
Ā 
Digitala Era 2017 - DSS.LV - Arturs Filatovs - Datu Aizsardzības Tehnoloģiskā...
Digitala Era 2017 - DSS.LV - Arturs Filatovs - Datu Aizsardzības Tehnoloģiskā...Digitala Era 2017 - DSS.LV - Arturs Filatovs - Datu Aizsardzības Tehnoloģiskā...
Digitala Era 2017 - DSS.LV - Arturs Filatovs - Datu Aizsardzības Tehnoloģiskā...
Ā 
Digitala Era 2017 - DSS.LV - Arturs Filatovs - Mobilitāte un Personas Datu Dr...
Digitala Era 2017 - DSS.LV - Arturs Filatovs - Mobilitāte un Personas Datu Dr...Digitala Era 2017 - DSS.LV - Arturs Filatovs - Mobilitāte un Personas Datu Dr...
Digitala Era 2017 - DSS.LV - Arturs Filatovs - Mobilitāte un Personas Datu Dr...
Ā 
Digitala Era 2017 - DSS.LV - Andris Soroka - Personas datu regulas tehnoloģis...
Digitala Era 2017 - DSS.LV - Andris Soroka - Personas datu regulas tehnoloģis...Digitala Era 2017 - DSS.LV - Andris Soroka - Personas datu regulas tehnoloģis...
Digitala Era 2017 - DSS.LV - Andris Soroka - Personas datu regulas tehnoloģis...
Ā 

Recently uploaded

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(ā˜Žļø+971_581248768%)**%*]'#abortion pills for sale in dubai@
Ā 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
Ā 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
Ā 

Recently uploaded (20)

Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
Ā 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Ā 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Ā 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
Ā 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
Ā 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
Ā 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
Ā 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
Ā 
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Ā 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
Ā 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Ā 
A Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusA Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source Milvus
Ā 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Ā 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
Ā 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
Ā 
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu SubbuApidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Ā 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
Ā 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Ā 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
Ā 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Ā 

DSS Symantec PGP Encryption Fortress 2014 - ArrowECS - RoadShow Baltics

  • 1. Innovations in cyber security technologies Arturs Filatovs Business Development Manager March 2014 Arrow ECS RoadShow Baltics Symantec Encryption ā€“ Building A Digital Fortress
  • 2. Arturs Filatovs business card More then 5 years experience in delivering Innovative IT Security Solutions to Baltic states Knowledge of more then 25 different IT Security Solutions Specialization - Mobile IT Security
  • 3. Lets move our hands ā€“ who is here today? CISO Director, Desktop Ops Director, Network Ops Helpdesk Manager
  • 4. Todays To do list ā€œData Security Solutionsā€ role in Baltics Technology vs. Time Encryptionā€™s role in security Don't be scared ā€“ Encrypt everything Build Digital fortress with Symantec Tech
  • 5. ā€œData Security Solutionsā€ business card Specialization ā€“ IT Security IT Security services (consulting, audit, pen-testing, market analysis, system testing and integration, training and technical support) Solutions and experience portfolio with more than 20 different technologies ā€“ cyber-security global market leaders from more than 10 countries Trusted services provider for banks, insurance companies, government and private companies (critical infrastructure etc.)
  • 6. Role of DSS in Cyber-security Development in Baltics Cyber-Security Awareness Raising Technology and knowledge transfer Most Innovative Portfolio Trusted Advisor to its Customers
  • 7. Cybersecurity Awareness Raising Own organized conference ā€œDSS ITSECā€ 5th annual event this year More than 400 visitors and more than 250 online live streaming watchers from LV, EE, LT 4 parallel sessions with more than 40 international speakers, including Microsoft, Oracle, Symantec, IBM, Samsung and many more ā€“ everything free of charge Participation in other events & sponsorship CERT & ISACA conferences RIGA COMM exhibition & conferences Roadshows and events in Latvia / Lithuania / Estonia (f.i. Vilnius Innovation Forum, Devcon, ITSEC HeadLight, SFK, business associations) Participation in cyber security discussions, preparations, seminaries, publications etc. strategy
  • 8. Innovations ā€“ technology & knowledge transfer Innovative Technology Transfer Number of unique projects done with different technology global leadership vendors Knowledge transfer (own employees, customers ā€“ both from private & public, other IT companies) Areas include: Endpoint Security Network Security Security Management Application Security Mobile Security Data Security Cyber-security Security Intelligence
  • 9. Our portfolio is most innovative in Baltics!
  • 11.
  • 12.
  • 16. PC era to MOBILE era PC era Mobile era
  • 17. Consolidation of IT in 21st Century We are at point where functionality of desktop collides with mobility of mobile device. Mobile IT
  • 19. IT Must Evolve To Meet New Demands InformationCentric System-Centric ā€¢ Collaborative Apps and Social Media ā€¢ Transactional Apps ā€¢ Unstructured data ā€¢ Structured Data ā€¢ Distributed information ā€¢ Centralized information ā€¢ People are the new perimeter ā€¢ Perimeter-based security ā€¢ Virtual Infrastructure and Cloud ā€¢ On-premise infrastructure
  • 20. Endpoints: The Borderless Enterprise Field Data Center Headquarters Field Offices Point of Sale Point of Sale $262 Million: Estimated cost of the Heartland Payment Systems breach1 1Based Global Internet Security Threat Report, Trends for 2008 Customer email stored on mobile phone 12,000 Laptops lost in United States airports every week2 Trojans, malware, unauthorized 1 in 10 people have lost a laptop, smart software phone, or USB drive with corporate information on it3 on 130,000,000 records lost (Datalossdb.org) and $202 per record (Ponemon Institute) 3Symantec Corporate data copied onto USB drive 2http://www.darkreading.com/security/encryption/showArticle.jhtml?articleID=211201139
  • 21. Cloud is taking us much higherā€¦
  • 22. Choose the right cloud smart way..
  • 24. When we have to change our password...
  • 25. Some questions? Who from you are using encryption? What will happen if data will be lost/stolen? Who will be responsible? When you are sending confidential data via post, how do you secure it?
  • 26. Encryption beginnings ā€“ Sparta/ Greeks/ Rome Greek generals used Scytel to encrypt and decrypt messages (Symmetric encryption)
  • 27. In what our organizations believe today SSL/ TLS/ VPN/ HTTPS ā€“ this is only data in motion using x.509
  • 28. What we use for document security E-Signatures ā€“ Limited functionality for document encryption data at rest/ data in motion Not User friendly (smart cards, Card readers, USB tokens ā€¦ )
  • 30. NSA did ā€œgreat workā€¦ā€ Hmmm....NSA?
  • 32. Encryption threats by Ponemon Institute Our Users are our weakest link
  • 33. Mobility - Potential For Data Loss 47% of corporate data resides on mobile devices 43% of employees lost a device with company data 32% of employees didnā€™t report the loss or theft in a timely fashion
  • 34. Our users weakest link 1 in 10 people have lost a laptop, smart phone, or USB drive with corporate information on it* 32% of employees didnā€™t report the loss or theft in a timely fashion* *Symantec Global Internet Security Threat Report
  • 36. Concerns from customer side Hardware-based encryption is faster and itā€™s an option on Dell and other PCs. Why do I need encryption if I have DLP or Endpoint monitoring? We are going to wait for our Windows 7 rollout in our environment and use Bit locker How to recover encrypted info? Master key is security risk for us.
  • 37. Encryption is not a rocket science
  • 40. Products Tasks Objectives Don't be scared ā€“ Encrypt everything Keep data secure Meet compliance objectives Protect data at rest Protect the business Control costs and liabilities Protect data in motion Protect data in use Endpoint Data Protection File and Server Protection Email Protection ā€¢ PGP Whole Disk Encryption ā€¢ PGP NetShare ā€¢ PGP Desktop Email ā€¢ PGP Command Line ā€¢ PGP Gateway Email ā€¢ SEE FDE ā€¢ SEE RSE ā€¢ PGP PDF Messenger ā€¢ PGP Portable ā€¢ PGP Support Package for BlackBerry ā€¢ SEE Device Control ā€¢ PGP Mobile Management ā€¢ PGP Universal Server ā€¢ PGP Key Management Server
  • 41. Oh Boy do we got solution for you!
  • 42. Build Digital fortress with Symantec Full Disk Encryption (FDE) ā€¢ PGPĀ® Whole Disk Encryption ā€¢ Symantec Endpoint Encryption (EE) FDE Device and Media Encryption ā€¢ PGP Portable ā€¢ SEE Removable Storage Edition (RSE) ā€¢ SEE Device Control FTP/Batch and Backups ā€¢ PGPĀ® Command Line Management Central Management of Encryption Applications PGPĀ® Universal ā„¢ Server File/Folder/Shared Server Encryption ā€¢ PGPĀ® NetShare Gateway Email Encryption ā€¢ PGPĀ® Gateway Email End-End Email and IM Encryption Key Management PGPĀ® Key Management Server (KMS) ā€¢ PGPĀ® Desktop Email Smartphone Solutions ā€¢ PGPĀ® Mobile ā€¢ PGPĀ® Support Package for BlackBerryĀ® 42
  • 43. Full Disk Encryption Full disk encryption for desktops, laptops, and WindowsĀ® servers. Supports WindowsĀ®, Mac OSĀ® X, and LinuxĀ® platforms ā€¢ Encrypts desktops, laptops, and USB-attached drives ā€¢ Protects against personal computer loss, theft, compromise and improper disposal ā€¢ Reduces risk of loss of PII (Personally Identifiable Information) and other sensitive data ā€¢ Supports Windows, Mac OS X, and Linux PGP Whole Disk Encryption; SEE Full Disk Encryption 43
  • 44. Removable Media Protection Removable Storage Encryption ā€¢ Secure portable data at rest ā€“ Enforce mandatory removable storage encryption policies ā€“ Access and re-encrypt data from any PC or Mac Centralized ā€“ Integrated Management Console Policies Auditing ā€¢ Granular file- and folder-based encryption ā€“ Allow encrypted and unencrypted data on user devices ā€“ Enforce policy-controlled exemptions by file type and device SEE Removable Storage Encryption Removable Media Encryption
  • 45. PGPĀ® Email Protection PGPĀ® Desktop Email PGP Universalā„¢ Gateway Email PGPĀ®Ā®PDF Messenger PGP Viewer for iOS PGPĀ® Support Package for BlackBerryĀ® Desktop-based Email Encryption ā€¢ Automatic end-to-end email encryption Gateway-based Email Encryption ā€¢ Clientless email encryption Encrypted Email Viewer App for iOS ā€¢ Decrypts and views messages ā€¢ Verifies digital signatures Encryption for BlackBerry Email ā€¢ Native client access to encrypted email Encryption for Windows Mobile Devices PGPĀ® Mobile Symantec Encryption - Confidential ā€¢ Encrypted Email ā€¢ Encrypted Files and Folders 45
  • 46. File/Folder Encryption Distributed file protection Shared file protection User file protection Protect individual files and folders Protect shared files and folders Protect transferred files and folders PGP NetShare, PGP Command Line 46
  • 47. PGPĀ® File and Server Protection PGPĀ® NetShare PGPĀ® Command Line Shared File Protection ā€¢ Protect data exchanged between users via shared network folders Scriptable Encryption ā€¢ Integrate encryption into data transfer, data distribution and data backup processes
  • 48. PGP or Symantec Endpoint Encryption? Products Exceptions Customer Need Default Play Existing SEE/GE Customer DAR U.S. Fed SmartBuy Active Directory + MSFT Stack PGP Whole Disk Encryption PGP Portable SEE Removable Storage Encryption SEE Device Control Endpoint Encryption SEE Full Disk Encryption SEE Device Control PGP Desktop Email Email Encryption PGP Gateway Email PGP Mobile PGP Support Package for BlackBerry Server / File Encryption Management PGP NetShare PGP Command Line PGP Universal Server and PGP Key Management Server (KMS) ā€¢ Symantecā€™s strategic direction for Endpoint Encryption is to ā€œconvergeā€ the solutions into a single offering. ā€¢ In the interim, Symantec will provide full support for both Endpoint Encryption technologies. Selling Symantec Encryption Products 48
  • 49. Defense-In-Depth: Encryption + DLP Network DLP / Gateway Encryption ā€¢ Automatically encrypt emails containing sensitive data ā€¢ Notify employees in real time/context about encryption policies and tools Storage DLP / File-Based Encryption ā€¢ Discover where confidential data files are stored and automatically apply encryption ā€¢ Ease the burden to IT staff with near transparence to users Endpoint DLP / Removable Storage Encryption ā€¢ Target high risk users by discovering what laptops contain sensitive data ā€¢ Protect AND enable the business by targeting encryption efforts to sensitive data moving to USB devices
  • 50. DLP + PGP Universal Gateway Email 5 Email encrypted and sent 1 Receive email MTA or Proxy PGP Universal Server 4 Violation detected - re-route to encryption server 2 Check email content for encryption policy violations 3 No violation - email sent Key Benefits: ā€¢ Automate gateway encryption; ease burden on end users ā€¢ Enforce and report on encryption policies
  • 52. Takeaway Technology lifecycle from 3-6 year to 6-12 months Encryption will help you sleep tight Donā€™t be scared to encrypt all type of data Centralized key management is important One encryption solution for different type of date Select DSS as your trusted security advisor ā€“ we work with Symantec (PGP) more than 5 years already!!