Top Banner
© 2012 SECUDE IT Security, LLC END-POINT DATA ENCRYPTION Enabling Compliance through Smart End Point Encryption
26

END-POINT DATA ENCRYPTION - Shield Technology...Competitive Summary Folder Encryption Software Full Disk Encryption Hardware Full Disk Encryption Hybrid Full Disk Encryption Hybrid

Oct 06, 2020

Download

Documents

dariahiddleston
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: END-POINT DATA ENCRYPTION - Shield Technology...Competitive Summary Folder Encryption Software Full Disk Encryption Hardware Full Disk Encryption Hybrid Full Disk Encryption Hybrid

© 2012 SECUDE IT Security, LLC

END-POINT DATA ENCRYPTION

Enabling Compliance through Smart End Point Encryption

Page 2: END-POINT DATA ENCRYPTION - Shield Technology...Competitive Summary Folder Encryption Software Full Disk Encryption Hardware Full Disk Encryption Hybrid Full Disk Encryption Hybrid

AgendaAgenda

� About SECUDE� Solution Portfolio

� FinallySecure Enterprise� SecureFolder Enterprise

� Case Studies� Customers

© 2012 SECUDE IT Security, LLC

� Customers

8/20/20132

Page 3: END-POINT DATA ENCRYPTION - Shield Technology...Competitive Summary Folder Encryption Software Full Disk Encryption Hardware Full Disk Encryption Hybrid Full Disk Encryption Hybrid

About SECUDEAbout SECUDE

� Facts & Figures� 1,000,000+ licensed users� 15 years in business� Privately held

� Corporate Milestones� 1996: Founded by SAP AG and Fraunhofer Research Institute

© 2012 SECUDE IT Security, LLC

� 2005: Purchased Full Disk Encryption Technology� 2006: First hybrid Full Disk Encryption in partnership with Seagate� 2010: SAP announced acquisition of part of SECUDE IP� 2011: SECUDE focuses on Data Protection business

8/20/20133

Page 4: END-POINT DATA ENCRYPTION - Shield Technology...Competitive Summary Folder Encryption Software Full Disk Encryption Hardware Full Disk Encryption Hybrid Full Disk Encryption Hybrid

SECUDE ExperienceSECUDE Experience

GovernmentGovernment Global Enterprises

Global Enterprises

© 2012 SECUDE IT Security, LLC

Mid-sizeMid-size System Integrators

System Integrators

8/20/20134

Page 5: END-POINT DATA ENCRYPTION - Shield Technology...Competitive Summary Folder Encryption Software Full Disk Encryption Hardware Full Disk Encryption Hybrid Full Disk Encryption Hybrid

Solution PortfolioSolution Portfolio

Central Management• Emergency Recovery• Helpdesk• User & Device Management

• Shared Work Groups• Access Control Policies• Compliance Reporting & Auditing

© 2012 SECUDE IT Security, LLC 8/20/20135

Full Disk Encryption

File & Folder Encryption

FinallySecure™ Enterprise

SecureFolder Enterprise

Page 6: END-POINT DATA ENCRYPTION - Shield Technology...Competitive Summary Folder Encryption Software Full Disk Encryption Hardware Full Disk Encryption Hybrid Full Disk Encryption Hybrid

Drivers for End Point EncryptionDrivers for End Point Encryption

Compliance RequirementsCompliance Requirements

Brand ReputationBrand Reputation

© 2012 SECUDE IT Security, LLC

Brand ReputationBrand Reputation

Data Loss IncidentsData Loss Incidents

8/20/20136

Page 7: END-POINT DATA ENCRYPTION - Shield Technology...Competitive Summary Folder Encryption Software Full Disk Encryption Hardware Full Disk Encryption Hybrid Full Disk Encryption Hybrid

Incidents do happen!Incidents do happen!

© 2012 SECUDE IT Security, LLC 8/20/20137

Page 8: END-POINT DATA ENCRYPTION - Shield Technology...Competitive Summary Folder Encryption Software Full Disk Encryption Hardware Full Disk Encryption Hybrid Full Disk Encryption Hybrid

Competitive SummaryCompetitive Summary

Folder Encryption

Software Full Disk Encryption

Hardware Full Disk Encryption

Hybrid Full Disk Encryption

Hybrid FDE+ Folder

Complete Power-off Protection � � � � �

Data-in-use/transit Protection � � � � �

No User Training required � � � � �

Rapid Deployment � � � � �

© 2012 SECUDE IT Security, LLC 8/20/20138

Protection against Admin Access � � � � �

Highest User Productivity � � � � �

Highest Level of Compliance � � � � �

Integration into Management Infra. � � � � �

Competitors • Symantec• Sophos• McAfee

• McAfee• Symantec• Sophos• …

• WinMagic• TrendMicro• Sophos• Symantec

• SECUDE • SECUDE

Page 9: END-POINT DATA ENCRYPTION - Shield Technology...Competitive Summary Folder Encryption Software Full Disk Encryption Hardware Full Disk Encryption Hybrid Full Disk Encryption Hybrid

FinallySecure Enterprise

© 2012 SECUDE IT Security, LLC

FinallySecure EnterpriseHybrid Full Disk Encryption

8/20/20139

Page 10: END-POINT DATA ENCRYPTION - Shield Technology...Competitive Summary Folder Encryption Software Full Disk Encryption Hardware Full Disk Encryption Hybrid Full Disk Encryption Hybrid

ComplianceCompliance

State of the Art EncryptionState of the Art Encryption

Compliance ReportingCompliance Reporting

© 2012 SECUDE IT Security, LLC

Compliance ReportingCompliance Reporting

FIPS 140-2FIPS 140-2

8/20/201310

Page 11: END-POINT DATA ENCRYPTION - Shield Technology...Competitive Summary Folder Encryption Software Full Disk Encryption Hardware Full Disk Encryption Hybrid Full Disk Encryption Hybrid

FlexibilityFlexibility

End Point Management IntegrationEnd Point Management Integration

Configurable Level of Configurable Level of

© 2012 SECUDE IT Security, LLC

Configurable Level of SecurityConfigurable Level of Security

Automatic Hardware DetectionAutomatic Hardware Detection

8/20/201311

Page 12: END-POINT DATA ENCRYPTION - Shield Technology...Competitive Summary Folder Encryption Software Full Disk Encryption Hardware Full Disk Encryption Hybrid Full Disk Encryption Hybrid

ProductivityProductivity

Highest PerformanceHighest Performance

Virtually TransparentVirtually Transparent

© 2012 SECUDE IT Security, LLC

Virtually TransparentVirtually Transparent

Offline HelpdeskOffline Helpdesk

8/20/201312

Page 13: END-POINT DATA ENCRYPTION - Shield Technology...Competitive Summary Folder Encryption Software Full Disk Encryption Hardware Full Disk Encryption Hybrid Full Disk Encryption Hybrid

Full Disk Encryption Competitive AdvantagesFull Disk Encryption Competitive Advantages

� Performance/Features� Takes less time to initially encrypt drive� Better run-time performance� External Media Encryption built-in� Selected for Novell’s ZENworks product offering

� Deployment� AD/LDAP Integration; no separate credentials or complicated sync

required

FinallySecure™Enterprise

© 2012 SECUDE IT Security, LLC

required� Single Sign-On without GINA replacement� Ability to suspend pre-boot for painless patch deployment� Support for automatic user capturing to ease deployment

� Management� Support standalone mode; no backend required� Optional central management through web-based console, scripting

engine or development API� Compliance at lowest possible cost

8/20/201313

Page 14: END-POINT DATA ENCRYPTION - Shield Technology...Competitive Summary Folder Encryption Software Full Disk Encryption Hardware Full Disk Encryption Hybrid Full Disk Encryption Hybrid

SummarySummary

FinallySecure™ Enterprise enables Enterprises to be

© 2012 SECUDE IT Security, LLC 8/20/201314

FinallySecure™ Enterprise enables Enterprises to be compliant at the lowest possible cost.

Page 15: END-POINT DATA ENCRYPTION - Shield Technology...Competitive Summary Folder Encryption Software Full Disk Encryption Hardware Full Disk Encryption Hybrid Full Disk Encryption Hybrid

Pre-Boot AuthenticationPre-Boot Authentication

© 2012 SECUDE IT Security, LLC 8/20/201315

Page 16: END-POINT DATA ENCRYPTION - Shield Technology...Competitive Summary Folder Encryption Software Full Disk Encryption Hardware Full Disk Encryption Hybrid Full Disk Encryption Hybrid

Challenge/Response HelpdeskChallenge/Response Helpdesk

© 2012 SECUDE IT Security, LLC 8/20/201316

Page 17: END-POINT DATA ENCRYPTION - Shield Technology...Competitive Summary Folder Encryption Software Full Disk Encryption Hardware Full Disk Encryption Hybrid Full Disk Encryption Hybrid

ReportingReporting

© 2012 SECUDE IT Security, LLC 8/20/201317

Page 18: END-POINT DATA ENCRYPTION - Shield Technology...Competitive Summary Folder Encryption Software Full Disk Encryption Hardware Full Disk Encryption Hybrid Full Disk Encryption Hybrid

SecureFolder Enterprise

© 2012 SECUDE IT Security, LLC

SecureFolder EnterpriseShared Folder Encryption

8/20/201318

Page 19: END-POINT DATA ENCRYPTION - Shield Technology...Competitive Summary Folder Encryption Software Full Disk Encryption Hardware Full Disk Encryption Hybrid Full Disk Encryption Hybrid

SecureFolder EnterpriseSecureFolder Enterprise

Local and Shared Folder EncryptionLocal and Shared Folder Encryption

Multi-User AccessMulti-User Access

© 2012 SECUDE IT Security, LLC 8/20/201319

Single- and Multi-Factor AuthenticationSingle- and Multi-Factor Authentication

IDM IntegrationIDM Integration

LDAP & Standalone ModeLDAP & Standalone Mode

Page 20: END-POINT DATA ENCRYPTION - Shield Technology...Competitive Summary Folder Encryption Software Full Disk Encryption Hardware Full Disk Encryption Hybrid Full Disk Encryption Hybrid

Local Folder EncryptionLocal Folder Encryption

© 2012 SECUDE IT Security, LLC 8/20/201320

Page 21: END-POINT DATA ENCRYPTION - Shield Technology...Competitive Summary Folder Encryption Software Full Disk Encryption Hardware Full Disk Encryption Hybrid Full Disk Encryption Hybrid

Network Folder EncryptionNetwork Folder Encryption

© 2012 SECUDE IT Security, LLC 8/20/201321

Page 22: END-POINT DATA ENCRYPTION - Shield Technology...Competitive Summary Folder Encryption Software Full Disk Encryption Hardware Full Disk Encryption Hybrid Full Disk Encryption Hybrid

Intuitive User InterfaceIntuitive User Interface

© 2012 SECUDE IT Security, LLC 8/20/201322

Page 23: END-POINT DATA ENCRYPTION - Shield Technology...Competitive Summary Folder Encryption Software Full Disk Encryption Hardware Full Disk Encryption Hybrid Full Disk Encryption Hybrid

Competitive AdvantagesCompetitive Advantages

� Support for Distributed File System� Full LDAP/AD Integration� Transparent to end users and data processing workflows� Optional multi-factor authentication� Enterprise API for integration into existing IDM systems� Ability to run in standalone mode

© 2012 SECUDE IT Security, LLC

� Ability to run in standalone mode� Optional web-based management console available

8/20/201323

Page 24: END-POINT DATA ENCRYPTION - Shield Technology...Competitive Summary Folder Encryption Software Full Disk Encryption Hardware Full Disk Encryption Hybrid Full Disk Encryption Hybrid

Questions?Questions?

© 2012 SECUDE IT Security, LLC 8/20/201324

Page 25: END-POINT DATA ENCRYPTION - Shield Technology...Competitive Summary Folder Encryption Software Full Disk Encryption Hardware Full Disk Encryption Hybrid Full Disk Encryption Hybrid

Copyright InformationCopyright Information

SECUDE AG © 2012 All rights reserved.

All product and service names mentioned are the trademarks of theirrespective companies. No part of this publication may be reproduced ortransmitted in any form or for any purpose without the express writtenpermission of SECUDE AG. The information contained herein may be

© 2012 SECUDE IT Security, LLC

permission of SECUDE AG. The information contained herein may bechanged without prior notice.

Microsoft, Windows, and Active Directory are the brand names or registeredtrademarks of Microsoft Corporation in the United States. ACE/Server, RSA,and SecurID are brand names or registered trademarks of RSA Security Inc.

8/20/201325

Page 26: END-POINT DATA ENCRYPTION - Shield Technology...Competitive Summary Folder Encryption Software Full Disk Encryption Hardware Full Disk Encryption Hybrid Full Disk Encryption Hybrid

SECUDE vs. CynapsProSECUDE vs. CynapsPro

� SECUDE� Web-based Management Console (FinallySecure Management

Console)� Full Disk Encryption (FinallySecure Enterprise)

� Limited External Media Encryption

� Shared Folder Encryption (SecureFolder Enterprise)

� CynapsPro (SECUDE-branded OEM)

© 2012 SECUDE IT Security, LLC

� CynapsPro (SECUDE-branded OEM)� Windows-based Management Console� Full featured Device/Interface Control (DevicePro)� Full featured External Media Encryption (CryptionPro)� Full features Application Control (ApplicationPro)� Full Disk Encryption (FinallySecure Enterprise)

8/20/201326