We think you have liked this presentation. If you wish to download it, please recommend it to your friends in any social system. Share buttons are a little bit lower. Thank you!
Presentation is loading. Please wait.
Published byAngel Thrash
Modified about 1 year ago
© 2009 Lenovo Security at the Endpoint Henry Ramos
© 2009 Lenovo Agenda Why Secure Endpoints? Types of Encryption today What else can we do?
© 2009 Lenovo California Senate Bill /sb_1386_bill_ _chaptered.html “would require a state agency, or a person or business that conducts business in California, that owns or licenses computerized data that includes personal information, as defined, to disclose in specified ways, any breach of the security of the data, as defined, to any resident of California whose unencrypted personal information was, or is reasonably believed to have been, acquired by an unauthorized person. “ This means you are covered if the personal information is encrypted.
© 2009 Lenovo Types of Encryption Today Software –3 rd Party Encryption –Microsoft Bit-Locker –File and Folder vs Full Disk Hardware Pros and Cons
© 2009 Lenovo What Else? Port control Asset Recovery New Technology available today –Hardware Password Manger –Intel Anti Theft Protection –Constant Connect
© 2009 Lenovo ThinkPad Gives Strong IT Security Control of Ports At Hardware Level Limits use of I/O ports at a hardware level via BIOS to prevent information leaks ThinkPad System PCI Express 2 nd IDE Controller USB Controller Cardbus Controller Network Controller
© 2009 Lenovo Lenovo Systems Are First PCs to Support Remote Hardware Password Management What is Hardware Password Manager (HPM)? –Active directory-based central management of BIOS/HDD passwords –Supports management of both user and supervisor passwords –Supports ThinkCentre M58/M58p PCs, Montevina-based ThinkPad systems, and follow-on ThinkCentre and ThinkPad offerings What are the benefits of HPM? –More secure and less costly than software solutions –Central management and easy recovery of HDD password –Enables management of full-encrypting hard drives
© 2009 Lenovo Computrace Complete Provides the Ultimate Tracking and Loss Prevention Solution Track lost or stolen computers Manage computing assets & inventory Remotely delete data
© 2009 Lenovo *AT-p is activated and managed on Montevina vPro ThinkPads by Computrace® Data Protection™ Intel AT-p Edition Intel Anti-Theft Protection (AT-p)* Enhances Lenovo ThinkPads with CompuTrace
© 2009 Lenovo Constant Secure v1.0 (Available 2Q09) Remote Disable: Use SMS text with WWAN for theft protection –Exclusive Lenovo offering –Use your mobile phone to lock your system if stolen –Disable function is built into Montevina ThinkPads –Requires: Montevina ThinkPad with activated Ericson WWAN card Paid data plan for PC that supports GSM SMS text messaging Failsafe Anti-Theft feature provides robust system protection, theft deterrence and file retrieval –WWAN card not required –Provides multiple theft deterrent features via software from Phoenix –Track and locate a system, retrieve files, disable system –Less expensive than CompuTrace Lock Command via SMS
© 2009 Lenovo Thank You
Share Your PC Get Started. Sharing a computer used to mean that others could see your private files, install software you didn't want, or change your.
ENCRYPTSTICK AFFILIATE PROGRAM James D. Nardell Encrypt-Stick.com Affiliate Management Team
Working with the Internet 2 Information Technology Working with the Internet This presentation will explore: Internet workings & uses facilities.
Presentation for 04/2011. Crystal Gears® (CG as short) is a new next generation desktop digital recording system like no other before. By widely compatible.
Boston Springfield Albany Enter Presentation Title Here Presenter Name © 2009 Wolf & Company, P.C. Presentation date Location 1 Boston Springfield Albany.
Powerful and convenient management for Windows Mobile ® 6.1 devices in an enterprise environment. These features include: Centralized, over-the-air device.
Andy Vittles – Hewlett Packard :- Telco Channel, 2008 Customer Presentation HP Compaq Commercial Notebooks NDA Customers only.
© Aladdin Knowledge Systems 2006 Aladdin eToken Overview Bill Dolan Regional Manager – Northeast
ARMORINO Portable Privacy Platform. µcrypt µcrypt Armorino Information always has a value that constantly growing under pressure of new.
Overview Business Risk Secure MFP Program Device Security Access Security Document Security End of Life Security.
Data Protection Policy Compliance using Notebook Hard Disk Drive Encryption.
“Official” binary from Google Supported by Google Google branding Automatic updates Browser used in Google Chrome OS Code released under BSD license as.
Department of Information Systems Brigham and Womens Hospital Laptop Encryption Catherine McGoldrick Schroeder Corp. Mgr, BWH IS Management & Planning.
MHRA Inspection Information Management and Technology.
Privacy and Information Security Training ( ) Privacy and Information Security Training Vanderbilt University Medical Center Information.
©2013 Check Point Software Technologies Ltd. | [Unrestricted] For everyone Best Practices to Secure the Mobile Enterprise Macy Torrey
Understanding the benefits and the risks. Presented by Corey Nachreiner, CISSP BYOD - Bring Your Own Device or Bring Your Own Danger?
Technology Made Easy!! Telnet and Voice over internet Protocol(VOIP) By: Nicolette Johnson Peta-Lee Richards.
Field TDM Deck Optimize and Secure Your Core Infrastructure for Midsize Businesses.
ANNUAL SECURITY AWARENESS TRAINING – 2011 UMW Information Technology Security Program Annual Security Awareness Training for UMW Faculty and Staff.
KILLARA HIGH SCHOOL Digital Education Revolution Year 9 Laptops.
A product of. About Us Al-Shaymaa (Private) Limited is a subsidiary of Al-Shaymaa FZE, UAE, an investment group. What makes Al-Shaymaa (Private) Limited.
Surviving the PCI Self -Assessment James Placer, CISSP West Michigan Cisco Users Group Leadership Board.
Are you Safe at Work? A look into Safety at the Workplace and Internet Security Presented by Sheila Gee.
I MPACT VAN BYOD EN M OBIELE DEVICES OP UW HUIDIGE DESKTOP EN CLIENT ARCHITECTUUR.
1 CREDANT Confidential. 1 NLIT CREDANT Company Overview 2007 Data Security Leadership Quadrant 2007 & 2008: #1 Fastest Growing Private (Security)
Software Bundle ViPNet Secure Remote Access Arrangement using ViPNet Mobile © Infotecs.
LEXIM Legal Consultants Pvt. Ltd. Introduction Law Office Manager is about maintaining, managing and retrieving data related to your or your clients.
Introduction to Access Control. Access control systems allow the free movement of authorized personnel while restricting unauthorized intrusion. A device.
© 2016 SlidePlayer.com Inc. All rights reserved.