Top Banner
Rune – Does Your Data Have Superpowers?
15
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Rune  - Empowering User-based Security

Rune – Does Your Data Have Superpowers?

Page 2: Rune  - Empowering User-based Security

Information Security Is Compromised – We need a hero

Read the news everyday:Easily identify passwords through brute force

24 seconds to break a NTLM login password http://

www.zdnet.com/blog/hardware/cheap-gpus-are-rendering-strong-passwords-useless/13125

World’s first commercial quantum computer Rapidly compromises all PKI based internet transactions http://venturebeat.com/2011/05/27/first-quantum-computer-sold/

RSA – Secure ID compromised Math-based token encryption compromised http://www.pcworld.com/businesscenter/article/229553/after_hack_rsa_offer

s_to_replace_secureid_tokens.html

Citi massive credit cards breached for the 2nd time http://www.wired.com/threatlevel/2011/06/citibank-hacked/

LulzSec New kind of hacking group that is exposing vulnerabilities http://www.guardian.co.uk/technology/2011/jun/14/us-politics-hacking-senat

e-lulzsec

Page 3: Rune  - Empowering User-based Security

Why is the Vema-Cipher Platform Different?

Data-centric Encrypted information easily moves across any

infrastructure even public internet

Can be used in combination with math-based solutions like RSA SecureID®

Second tier of encryption in the event RSA or other math-based cipher ‘seed values’ are compromised

Two encryption modes: Variable-Strength Free math based cipher: Standards based PKI and AES Keys Paid Vernam cipher: VC-Pad™

First Vernam Encryption Product of it’s kind A One-time pad ‘wrapped’ in a standards based AES 256

encryption The VC-Pad™ is an encryption key based on random

numbers that are not mathematically derived

Page 4: Rune  - Empowering User-based Security

The Vema-Cipher Value: Unconditional Security

Encryption for those that need security in addition to compliance

Personal information Business intelligence Proprietary information

Secures your data locally or in the cloud No matter where data is stored… You control exactly who

can read your message

Defends your data as it moves though hostile environmentsInnovative yet proven approach to data security

Standards based compliance coupled with unbreakable encryption

Page 5: Rune  - Empowering User-based Security

ComplianceFIPS 140-2

SecureVernam Cipher

Simple to Use

3 Easy Steps

• Secure:• Proven, unbreakable

Vernam cipher• VC-Key™ creates a

completely random message – immune to brute-force attacks

• Stops man-in-the-middle attacks

• Compliance:• FIPS 140-2 standards-

based encryption

• Simple to use: 3 steps• Set your audience• Select your message or

document• Click to encrypt or

decrypt

Page 6: Rune  - Empowering User-based Security

Historical “Vernam” issues addressed

Utilizes modern dense storage devices Addresses requirement for 1 to 1 VC-Pad™ to data ratio

Random number generators are readily available No longer difficult to generate Proven TRNG products from Comscire, ID Quantique e.g. Pass NIST’s die hard test for cryptographically secure random

numbers

Multiple methods for VC-Pad™ exchange Physical – For enhanced security policies Electronic – Much more secure than current, standard PKI solutions

VC-Pad™ can be physically secured VC-Pad™ can be on external hard drives with strong defense

mechanisms (Biometric, GPS, e.g.)

VC-Pad™ are not reused Tracks where you are at in the VC-Pad™ random mass Delete when it makes sense – Doesn’t affect integrity of cipher-text

Page 7: Rune  - Empowering User-based Security

Rune Delivers

Veri-Cipher Platform Open source, standards-based crypto engine Supports Vernam encryption Integrate into many different applications

Deadbolt Application to secure your data

Locksmith Made up of Agent(s) and Vault(s) System to make “Vernam” VC-Pad™ System to manage standards based keys and VC-Pad™

Page 8: Rune  - Empowering User-based Security

3 clicks or lessVernam and standards-based encryptionEasy key and VC-Pad™ managementOnly deploy to those that need to knowMinimal to no IT department overheadRune can manufacture VC-Pad™ or customers can purchase Locksmith & Vault appliancesto manufacture freely

Page 9: Rune  - Empowering User-based Security

Deadbolt Application: How it Works

Simple floating tool-barEasily set your target audience: 1 person or many

Select text or file and click 1 button to encryptEncrypted text or file is created

The encrypted file is ready to send or store

Page 10: Rune  - Empowering User-based Security

Locksmith System made up of Agents and a VaultCollects random numbersCreates VC-Pads™ for unbreakable encryptionProduces VC-Pad™ on USB devices or optical storageIntegrates automatically with VaultUse one or many to speed up production times

Page 11: Rune  - Empowering User-based Security

Maintain control of systemCreates an escrow of asymmetric keys and symmetric VC-Pad™Standards based approach (OASIS)Manage users, groups, permissions, keys & VC-Pads™ that are deployedAdd users to groupsEasily re-key devices for data retrieval

Page 12: Rune  - Empowering User-based Security

Software Packages

Deadbolt LT is a free open-source version of the software that provides asymmetric encryption onlyDeadbolt can be purchased as a stand-alone product for personal use

Rune manufactures VC-Pads™ Can use stronger symmetric encryption for personal

archival or small group communications

Locksmith Systems are sold in various packages for larger group communications

Includes Deadbolt, Agent(s) and Vault(s) Allow users to manufacture own VC-Pads™

Page 13: Rune  - Empowering User-based Security

Locksmith Systems

Locksmith UP (Ultra Portable) All systems in highly portable laptop form factor – Supports

up to 50 users – Custom solutions available

Locksmith 100 2 Agents, 1 Vault 100, 100 USB Tokens, Supports 100 Users

Locksmith 250 5 Agents, 1 Vault 250, 250 USB Tokens, Supports 250 Users

Locksmith 500 10 Agents, 1 Vault 500, 500 USB Tokens, Supports 500

Users

Larger than 500 please discuss solution with your sales representative

Page 14: Rune  - Empowering User-based Security

Rune = Unconditional Security

Executive teams communicate with confidence in open SharePoint platformsFinance teams collaborate effectively and inside-information leaks are preventedFinancial institutions securely transmit sensitive informationLegal teams communicate securely with clientsM&A teams negotiate deals in total privacy R&D teams out-perform competitors by protecting critical IPGovernment & Military teams keep operational directives secure

Page 15: Rune  - Empowering User-based Security

Contact Us

Rune Information Security Company Pte Ltd1 Raffles PlaceOne Raffles PlaceLevel 24-00Singapore 048616PH: +65 6408-0575Email: [email protected]: www.rune.sg