Presentation is loading. Please wait.

Presentation is loading. Please wait.

PGP Solutions and Strategy Bernhard van der Feen BDM security products

Similar presentations


Presentation on theme: "PGP Solutions and Strategy Bernhard van der Feen BDM security products"— Presentation transcript:

1 PGP Solutions and Strategy Bernhard van der Feen BDM security products Bernhard_vander_feen@nai.com

2 PGP Security Mission To be the world leader in technology for ensuring privacy and securing business over the Internet Privacy isn’t just about keeping people from the “outside” from getting into your network. The traditional “perimeter” has become very fuzzy in today’s business world. Companies are connected to their suppliers, partners, and so forth, and many companies give these partners access to their internal infrastructure in order to conduct business. So, our focus is on permitting companies to maintain the privacy of the data/information that needs to be kept private, and to securely do business over the Internet, without the distinction between “insiders” and “outsiders”. Our technology permits companies to ensure privacy without regard to

3 Policy Organization Asset classification Personnel Physical/Environm.
Building the need for security, Generic Security Subjects Policy Organization Asset classification Personnel Physical/Environm. Comm./Operations Access Development & Maint. Business continuity Compliance

4 PGP Market Opportunity
Privacy Risk Assessment Firewall & VPN

5 Risk Assessment CyberCop Scanner COVERT eWeek Editor’s Choice Award
Largest library of vulnerabilities (over 800) COVERT In-depth Assessment, Analysis and Response to Security Threats Developed First Cure for February DDOS Attacks Trusted center of excellence

6 PGP Market Opportunity
Privacy Risk Assessment Firewall & VPN

7 The privacy problem… Source of Security Threat
Experienced a security breach or corporate espionage in past year Source of Security Threat Authorized Employees % Unauthorized Employees 24% Former Employees % Hackers, terrorists % Competitors % Based on a survey by PriceWaterhouseCoopers and Information Week

8 The four suspect controls: Attraction of your business
Building the need for security, Manage the risk, manage the suspect... The four suspect controls: Attraction of your business Effort to attack Chance to be Identified Result of being Identified

9 Complete Corporate Privacy
Cyber Cop Scanner Desktop PGPmail & PGPdisk Laptop PGP Distributed FW Internet Gateway Firewalls & VPNs

10 Complete Corporate Privacy
PGPwireless PGPmail & PGPdisk Laptop PGP Distributed FW PGPnet VPN client Cyber Cop Scanner Desktop PGPmail & PGPdisk Laptop PGP Distributed FW Internet PGP e-Business Server Gateway Firewalls & VPN

11 PGP Distributed Firewall
World’s First Corporate Desktop Firewall Enterprise-class Personal Firewall, Centrally Managed PGPadmin secure lockdown of policy Automated policy updates from LDAP servers Comprehensive Personal Network Security Personal Network Security – Firewall, IDS, & VPN Includes Personal Data Security , File & Disk Encryption Seamless integration for superior ease of use

12 Example: e-Business Server
Before Corporate Network CAD Server Extra Firewall ($$) Extra Firewall ($$) Leased Line Connection ($$) CAD Server DMZ Corporate Network After Internet Firewall Internet Firewall Internet CAD Server w/ PGP e-Business Server DMZ CAD Server w/ PGP e-Business Server

13 Health Insurance Portability and Accountability Act (HIPAA)
Government mandated secure electronic communications Industry must comply by end of 2002 Improved security and confidentiality Reduced administrative costs Criminal penalties for non-compliance The HIPAA goals are brief but very broad. HIPAA was basically born out of a cost reduction/EDI initiative. So, the question becomes, how do you reduce costs? One obvious way is to remove the paper processing, and the reduce the human effort involved. So, to reduce paper, that means you must move processing to an electronic medium. This then begs the question that if you put sensitive information in your computer systems, how do you protect the information? This then leads to a technology discussion. So, what began as a cost reduction initiative, quickly leads into a technology discussion. So, the HIPAA goals are to reduce costs, improve security and confidentiality, and to use more electronic communications.

14 PGP Helps Fulfill HIPAA Goals
PGP e-Business Server PGP Desktop Security PGP VPN e-ppliances

15 Privacy - 3 Things to Remember
PGP Security products help provide Privacy in storage Privacy during transit Access control to information

16 PGP Market Opportunity
Privacy Risk Assessment Firewall & VPN

17 PGP e-ppliance Strategy
Carrier Class Corporate and Service Providers PGP 1000 (Gigabit) Medium – Large Corporate PGP 300 / 310 / 320 PGP 150 PGP 100 Small Corporate PGP 75 Branch Offices PGP 50 PGP 10 SOHO PGP 5 Highly penetrated traditional firewall market New GROWTH market segments

18 PGP Market Opportunity
Privacy Risk Assessment Firewall & VPN

19 NAI Labs Over 100 advanced security researchers Federally-funded
$18 Million in contracts YTD $11.7 announced in Q3 – Navy and Air Force Successful technology transfer to commercial products

20 Proven Product Success
Product awards from independent evaluators Gauntlet “Firewall Product of the Year” Award, Network Magazine, April 2000 CyberCop Scanner, PC Week Editor’s Choice Award, January 2000 PGP VPN Editor’s Choice Award, Computer Reseller News, February 14, 2000 PGP 7.0 MacWorld Editor’s Choice Award for Best Utility of 2000, January 2001

21 Competitive Differentiation
Most comprehensive privacy solutions, covering desktop to mainframe Uniquely situated to benefit from HIPAA and other vertical opportunities Complete line of firewall eppliances, covering fastest growing segments Leader in risk assessment analysis through COVERT NAI LABS : advanced security research

22 Questions & Answers


Download ppt "PGP Solutions and Strategy Bernhard van der Feen BDM security products"

Similar presentations


Ads by Google