We think you have liked this presentation. If you wish to download it, please recommend it to your friends in any social system. Share buttons are a little bit lower. Thank you!
Presentation is loading. Please wait.
Published byAngel Thrash
Modified over 2 years ago
© 2009 Lenovo Security at the Endpoint Henry Ramos
© 2009 Lenovo Agenda Why Secure Endpoints? Types of Encryption today What else can we do?
© 2009 Lenovo California Senate Bill 1386 http://info.sen.ca.gov/pub/01-02/bill/sen/sb_1351- 1400/sb_1386_bill_20020926_chaptered.html “would require a state agency, or a person or business that conducts business in California, that owns or licenses computerized data that includes personal information, as defined, to disclose in specified ways, any breach of the security of the data, as defined, to any resident of California whose unencrypted personal information was, or is reasonably believed to have been, acquired by an unauthorized person. “ This means you are covered if the personal information is encrypted.
© 2009 Lenovo Types of Encryption Today Software –3 rd Party Encryption –Microsoft Bit-Locker –File and Folder vs Full Disk Hardware Pros and Cons
© 2009 Lenovo What Else? Port control Asset Recovery New Technology available today –Hardware Password Manger –Intel Anti Theft Protection –Constant Connect
© 2009 Lenovo ThinkPad Gives Strong IT Security Control of Ports At Hardware Level Limits use of I/O ports at a hardware level via BIOS to prevent information leaks ThinkPad System PCI Express 2 nd IDE Controller USB Controller Cardbus Controller Network Controller
© 2009 Lenovo Lenovo Systems Are First PCs to Support Remote Hardware Password Management What is Hardware Password Manager (HPM)? –Active directory-based central management of BIOS/HDD passwords –Supports management of both user and supervisor passwords –Supports ThinkCentre M58/M58p PCs, Montevina-based ThinkPad systems, and follow-on ThinkCentre and ThinkPad offerings What are the benefits of HPM? –More secure and less costly than software solutions –Central management and easy recovery of HDD password –Enables management of full-encrypting hard drives
© 2009 Lenovo Computrace Complete Provides the Ultimate Tracking and Loss Prevention Solution Track lost or stolen computers Manage computing assets & inventory Remotely delete data
© 2009 Lenovo *AT-p is activated and managed on Montevina vPro ThinkPads by Computrace® Data Protection™ Intel AT-p Edition Intel Anti-Theft Protection (AT-p)* Enhances Lenovo ThinkPads with CompuTrace
© 2009 Lenovo Constant Secure v1.0 (Available 2Q09) Remote Disable: Use SMS text with WWAN for theft protection –Exclusive Lenovo offering –Use your mobile phone to lock your system if stolen –Disable function is built into Montevina ThinkPads –Requires: Montevina ThinkPad with activated Ericson WWAN card Paid data plan for PC that supports GSM SMS text messaging Failsafe Anti-Theft feature provides robust system protection, theft deterrence and file retrieval –WWAN card not required –Provides multiple theft deterrent features via software from Phoenix –Track and locate a system, retrieve files, disable system –Less expensive than CompuTrace Lock Command via SMS
© 2009 Lenovo Thank You
This document is the intellectual property of Acer Inc. and may not be used, reproduced, modified, or re-utilized in any way without permission by Acer.
©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. Securing Your Data in Endpoint and Mobile Environments Frank Suijten Security.
LOGO Server. Contents Introduction 1 Problem Definition 2 Proposed Solution 3 Architecture Diagram 4 Server Technology 5 Hardware and Software.
Data-Tech Guardian Endpoint Security Suite. Guardian Endpoint Security Suite secures All Things Mobile TM from one management console.
This presentation will take a look at to prevent your information from being discovered by and investigator.
Powerful and convenient management for Windows Mobile ® 6.1 devices in an enterprise environment. These features include: Centralized, over-the-air device.
Managing and Securing Endpoints Bruce Hotte Chief Information Officer Jeff Swan Network Supervisor The definition of “endpoint” used to be simple: a.
Click to edit Master title style Click to edit Master text styles –Second level Third level –Fourth level »Fifth level June 10 th, 2009Event details (title,
Network and Server Basics. 6/1/20152 Learning Objectives After viewing this presentation, you will be able to: Understand the benefits of a client/server.
Max Secure Software founded in Jan 2003 develops innovative privacy, security, protection and performance solutions for Internet users. The company is.
Mobile Device Management: Do You Know Whos Accessing Your Network? Umesh Shah, Dir. Channel Marketing.
Confidential Computer Systems Group HD Lock for Toshiba Notebook August 3rd, 2006.
© Boardworks Ltd of 16 Keeping Data Safe. © Boardworks Ltd of 16 Teacher’s notes included in the Notes Page Flash activity. These activities.
Treat it like it’s yours: best practices for handling student transcript data Bob Hughes Application Support Manager North Orange County CCD CCCTran Steering.
The State of Computer & Data Security in Corporations Independent Survey.
Protecting Data at Rest Through Encryption CIO Summit November 30, 2007.
© 2013 Toshiba Corporation B2B PC Training Mailer - Toshiba Device Access Control.
Network and Server Basics. Learning Objectives After viewing this presentation, you will be able to: Understand the benefits of a client/server network.
© 2017 SlidePlayer.com Inc. All rights reserved.