Presentation is loading. Please wait.

Presentation is loading. Please wait.

The Cryptzone Group Magnus Kjerrman, Vice President partners EMEA – Asia Daniel Samuelsson, Solutions Engineer.

Similar presentations


Presentation on theme: "The Cryptzone Group Magnus Kjerrman, Vice President partners EMEA – Asia Daniel Samuelsson, Solutions Engineer."— Presentation transcript:

1 The Cryptzone Group Magnus Kjerrman, Vice President partners EMEA – Asia Daniel Samuelsson, Solutions Engineer

2 How it started? …………………………………….. Company secrets stay secret!

3 What do we do? …………………………………….. We are technology innovators in Data Leak Prevention A company with two areas of expertise Cryptzone – Content encryption and information security Appgate – Security for role-based access control We offer comprehensive range of solutions for secure information management

4 Where are we? …………………………………….. We have around 500,000 end-users across the world. Our solutions are used daily in over 30 countries. We have a extensive network of technology and channel partners around the globe.

5 It started with a eMail …………………………………….. Did you know that: There is 1.3 billion email users according to Radicati Group. 210 billion mail is sent every day – 70% spam or virus This means that approximately 1 million mail is sent every second Did you know that: There is 1.3 billion email users according to Radicati Group. 210 billion mail is sent every day – 70% spam or virus This means that approximately 1 million mail is sent every second

6 It started with a eMail …………………………………….. Did you know that: A mail sent from a company in Norway to the insurance company IF right across the street. Norway – USA – Germany – The Netherlands – England – Norway

7 It started with a eMail …………………………………….. Did you know that: 2 billion USB flash drives was sold last year according to gadgetophilia 60% of all USB flash drives is: Lost, stolen or misplaced Did you know that: 2 billion USB flash drives was sold last year according to gadgetophilia. 60% of all USB flash drives is: Lost, stolen or misplaced 3 USB flash drives is found at Arlanda every day!

8 It started with a eMail …………………………………….. Did you know that: 2 billion USB flash drives was sold last year according to gadgetophilia 60% of all USB flash drives is: Lost, stolen or misplaced Did you know that: 2 billion USB flash drives was sold last year according to gadgetophilia. 60% of all USB flash drives is: Lost, stolen or misplaced Over 20 USB flash drives is found at Arlanda every week!

9 Ett axplock av nöjda kunder ……………………………………..

10 “We've looked at several solutions, but Cryptzone DLP products, with Simplicity for installation, use and central management were certainly the most appealing for us. Other important factors that have affected our decision is the quality of supply, support and customer relations, where Cryptzone has strongly lived up to our demands.”.. Peter Johansson, Information Security Manager, City of Malmö

11 Server Global Object Synchronization: Policies Licenses Shared Secrets Encryption Keys EPM Stealth Keys Passwords Templates Standard SQL database platform One way synchronization with directories:. Active Directory Lotus Domino LDAP Custom directory files ……..……………………...…. Management Console Basic Management: Role based administration User rights management Policy design and administration Auditing and incident reporting Education management Help Desk / Lost password Recovery Intellectual Property: EPM - Enterprise Protection Method Resource/ License Management DCR - Data Content Reporting ……..……………………...…. Client Applications ……..……………………...…. Document Security ……..……………………...…. Outbound Compliance Endpoint Security Secured eFile Secured eMail Secured eGuard Secured eCollaboration Secured eControl Secured eDisk Secured eUSB Existing infrastructure integration such as Microsoft RMS and content management solutions SEP – Simple Encryption Platform ……………………………………..

12 ......................................... Two User Environments From Small Businesses to Large Enterprises Enterprise Client software is installed on each desktop and server software is installed on the server Service based platform can operate in a shared server environment Management Console with Active Directory one-way synchronized infrastructure view Leverages your current investment in AD Maintain Regulatory Compliance with user rights, system access configuration, and management Easy enforcement of company-wide security policies Intelligent SEP Client automatically reports real-time events for audit trail and log reporting for eDiscovery requirements Desktop Client software is installed on each desktop Same Client application for Desktop & Enterprise Local security policy but no centralized control Perfect fit for small businesses or departments SEP

13 Best Practice Proactive management platform and intelligent client synchronizes: Security policies Stealth encryption keys User and system access rights Password & helpdesk recovery passwords Intuitive interface and workflows Empowerment for internal/external users Audit trail of all end user actions Integration with Active Directory Security Methodology System SKG Patented encryption technology Strongest methodology available Automatic authentication – key management System generates dynamic one-time keys for each content element System access protection – one password FIPS certified AES256 encryption algorithm Features Regulatory Compliance – Sarbanes Oxley, GLB Act, HIPAA HITECH, FTC Red Flag Rules Fully integrated into Microsoft Outlook and Lotus Notes End to End messaging – virtual channel Send to anyone capability – any client app or web based email Receivers can download a full Reader and reply back secured for free Receivers can activate a Reader Lite with zero footprint Ease of use – Press “Send secured” or Send with Secured eControl policy Centralized policy based email encryption Archive encrypted and compressed......................................... Secured eMail – End Point Security for eMail Encryption Secured eMail SEP

14 Best Practice Policy Designer delivers content filtering policies to provide intelligence to the client to: Remove high risk content Blocks outbound content Convert content to appropriate format Apply content rights management Automatically send to Secured eMail Intuitive interface and workflows Empowerment for internal/external users Data at Rest Classifications Audit trail of all end user actions Security Methodology Strong regular expression techniques for content filtering Importation of dictionary terms and list Robust content filtering techniques for multiple protocols and over 370 content types Lightspeed scanning for improved performance Features Regulatory Compliance – Sarbanes Oxley, GLB Act, HIPAA HITECH, FTC Red Flag Rules Always-on risk alerts for policy violations 15 Pre-packaged content security policies Custom creation of security policy settings and editing Allow for transparent process Different rules for internal and external communications Educate user on Regulatory Compliance or corporate policy Metadata Monitoring and Cleaning Integrates with Secured eMail for enforced actions Secured eControl SEP.........................................

15 .......................................... Best Practice Proactive management platform and intelligent client synchronizes: Security policies Stealth encryption keys User and system access rights Password & helpdesk recovery passwords Intuitive interface and workflows Empowerment for internal/external users Audit trail of all end user actions Integration with Active Directory Security Methodology EPM (Enterprise Protection Method) Document creator can add/remove access rights Manage access to documents – Manager, Contributor and Reader levels System access protection – one password FIPS certified AES256 encryption algorithm Features Regulatory Compliance – Sarbanes Oxley, GLB Act, HIPAA HITECH, FTC Red Flag Rules EPM Stealth Key Technology which allows Automatic authentication & Key Management End users can secure data and add access rights to AD users and groups Create Secured Groups that can collaborate and share secured content without passwords Secured file(s)/folder(s) can be placed on any media or device including network shared drives, FTP servers, DVDs, etc. Share data with customers and partners Free Reader Self-Extracting option Recovery password and Help Desk tools All secured data is automatically compressed Encrypt Network Files/Folders for automatic authentication Secured eFile SEP

16 Best Practice Proactive management platform and intelligent client synchronizes: Security policies Stealth encryption keys User and system access rights Password & helpdesk recovery passwords Intuitive interface and workflows Empowerment for internal/external users Audit trail of all end user actions Integration with Active Directory Security Methodology EPM (Enterprise Protection Method) Document creator can add/remove access rights Manage access to documents – Manager, Contributor and Reader levels System access protection – one password FIPS certified AES256 encryption algorithm Features Regulatory Compliance – Sarbanes Oxley, GLB Act, HIPAA HITECH, FTC Red Flag Rules User work flow doesn’t change Simple to use – one click encryption Supports full “versioning”, “checkin”, & “checkout” Document icon shown visually as encrypted Secure documents can travel and rest secured on any media or device including network shared drives, FTP servers, DVDs, etc. EPM Stealth Key Technology and Automatic authentication/Key management End users can secure data and add access rights to AD users and groups Share data with customers and partners Free Reader Self-Extracting option …......................................... Secure Microsoft Documents with automatic authentication Secured eCollaboration SEP

17 ........................................ Best Practice Proactive management platform and intelligent client synchronizes: Security policies Stealth encryption keys User and system access rights Password & helpdesk recovery passwords Intuitive interface and workflows – no training Audit trail of all end user actions Lost flash drive – Kill Pill support Integration with Active Directory Security Methodology EPM (Enterprise Protection Method) FIPS certified AES256 encryption algorithm Brute force protection and Automatic Data Compression up to 5:1 Zero Footprint Deployment Enforced synchronization of portable device Features Distributed or Zero Footprint Deployment Regulatory Compliance – Sarbanes Oxley, GLB Act, HIPAA HITECH, FTC Red Flag Rules Security Policy – whole drive or partial encryption Security Policy based enforced encryption Fastest encryption – 16 GB in one minute Encryption.exe is portable, use on any computer in the world – no license required! Secured workflow - work in a “secured vault” – create, edit, delete Unlimited Passwords Help Desk Lost Password Recovery Support DCR – Data Content Reporting Inventory list of all secured USB flash drives & what user that owns it Monitor all content on every secured USB flash drive in the organization by manufacturer Automatic data audit reporting – by user, access, actions and files eUSB – Encrypts ANY USB flash drive in the market today! Secured eUSB SEP

18 …..................................... Best Practice Proactive management platform and intelligent client synchronizes: Security policies Encryption keys User and system access rights Password & helpdesk recovery passwords Single Sign-on to Windows – ‘User ID-Password’ Pre-Boot Authentication to OS Two-Factor Authentication Multiple User Authentication Integrated and managed through AD/ADAM Security Methodology Encryption Algorithms - DES, 3DES, IDEA, AES- 128,AES-192, AES-256 Security Certifications Common Criteria EAL-4 FIPS 140-2 Level 2 validated Features Encrypt Laptops, Desktops, and Servers Single license – client or management Regulatory Compliance – Sarbanes Oxley, GLB Act, HIPAA HITECH, FTC Red Flag Rules Also removable media encryption - Portable Hard drives; USB drives Port Control – read/write permissions Supports most tokens and smart cards Transparent to the user during deployment No noticeable performance loss anytime Hibernation support - forced authentication Helpdesk challenge/response for user password recovery Proven Award-Winning Solution - Five Star Review from SC Magazine RapidRecovery™ Tools to recover files on non- bootable systems to ensure performance of help desk Support Level Agreements (SLA) Whole Drive Encryption – Enterprise Management Secured eDisk SEP

19 …..................................... Best Practice Proactive management platform and intelligent client synchronizes: Security policies Real Time notifications and alerts Adoptive policy for end user request Educational interface to advise end user of corporate policy Monitor user environment to development control policy Comprehensive control policy including up to 30 portable device types, CD/DVD, Floppy Disc Control Read and Read/Write permission Security Methodology End User configuration based upon how people work: Attached to the Enterprise Not attached to the Enterprise – Traveling/Home VPN – Remote Office/Home Office Harden agent – Can’t be compromised Features Monitor mode – Review audit and log file activities and monitor the usage of portable devices & what is done by the users Real time notifications Comprehensive web based reporting Control Mode – Actively protect enterprise data by enforcing security policy Online (Enterprise) offline, or VPN Adaptive policy based on location Control access to portable devices and control read/write permissions per a specific device or media, class level, or vendor Control read and write rights Customize client notifications Content filtering and regular expression File size and file type content restriction Removable storage file backup End Point Security - Control, monitor and log endpoint access Secured eGuard SEP

20 www.cryptzone.com


Download ppt "The Cryptzone Group Magnus Kjerrman, Vice President partners EMEA – Asia Daniel Samuelsson, Solutions Engineer."

Similar presentations


Ads by Google