Šifrované USB disky Jakub Mazal COMGUARD a.s..

Slides:



Advertisements
Similar presentations
Powerful and convenient management for Windows Mobile ® 6.1 devices in an enterprise environment. These features include: Centralized, over-the-air device.
Advertisements

Sophos Mobile Control. Tablets on the rise 2 Trends 3 75% of 157 polled companies encourage employee owned smart phones and tablets to access corporate.
Protect your data Enable your users Unify Your Environment DevicesAppsData Help organizations enable their users to be productive on the devices they.
Data Encryption Overview South Seas Corporation Jared Owensby.
Protect your data Enable your users Unify Your Environment DevicesAppsData Help organizations enable their users to be productive on the devices they.
Apple Technical White Paper Presented By : Rajhesh Babu.
Introducing Quick Heal Endpoint Security 5.3. “Quick Heal Endpoint Security 5.3 is designed to provide simple, intuitive centralized management and control.
©2011 Kingston Technology Corporation. All rights reserved. All trademarks and registered trademarks are the property of their respective owners. Best.
Kaspersky Open Space Security: Release 2 World-class security solution for your business.
Customized solutions. Keep It Secure Contents  Protection objectives  Endpoint and server software  Protection.
Empower Enterprise Mobility Jasbir Gill Azure Mobility.
New Data Regulation Law 201 CMR TJX Video.
Windows Vista: Volume Activation 2.0
1 Managed Security. 2 Managed Security provides a comprehensive suite of security services to manage and protect your network assets –Managed Firewall.
USBK Overview Ver:1.0, 8 February USB Sticks 350 million USB Sticks are in use worldwide 155 million USB sticks were sold in 2008 and sales reached.
IMATION MOBILE SECURITY. MACRO TRENDS Mobile Workers Compliance Regulations + Modern Worker Behavior + IT Landscape.
Chapter-4 Windows 2000 Professional Win2K Professional provides a very usable interface and was designed for use in the desktop PC. Microsoft server system.
IGEL UMS Product Marketing Manager October 2011 Florian Spatz Universal Management Suite.
Introducing Quick Heal Endpoint Security 5.2. “Quick Heal Endpoint Security 5.2 is designed to provide simple, intuitive centralized management and control.
Randy Diddel A+ Certified Technician Apple Certified Associate-Mac Integration OS X ITIL Foundations v3 Mac Team Technical Support Analyst II UNM IT Workstation.
PROJECT PAPER ON BLUEFIRE MOBILE SECURITY. BY PONNURU VENKATA DINESH KUMAR STUDENT ID # A0815 PROFESSOR – VICKY HSU CS-426.
1. Windows Vista Enterprise And Mid-Market User Scenarios 2. Customer Profiling And Segmentation Tools 3. Windows Vista Business Value And Infrastructure.
Tim Vander Kooi Systems
TRUSTPORT PRODUCT PORTFOLIO Marcela Parolkova Sales Director.
INTEROP 2014 Mobile Issues in the Network. Mobile Issues Data loss – Hardware theft or failure – Data corruption Data theft – Hardware theft – Spyware,
Chapter 13 Users, Groups Profiles and Policies. Learning Objectives Understand Windows XP Professional user accounts Understand the different types of.
“Lines of Defense” against Malware.. Prevention: Keep Malware off your computer. Limit Damage: Stop Malware that gets onto your computer from doing any.
Protect your data Enable your users Unify Your Environment DevicesAppsData Help organizations enable their users to be productive on the devices they.
Why EMS? What benefit does EMS provide O365 customers Manage Mobile Productivity Increase IT ProductivitySimplify app delivery and deployment LOB Apps.
Kaspersky Small Office Security INTRODUCING New for 2014!
LANDesk Software Confidential Data Analytics LANDESK Day 5. March 2014 Jan Pisarik Technical Presales Manager.
1 1 IronKey Features Mapped to Market Segments. 2 2 IronKey Solutions Data protection for compliance Consolidate strong authentication Disaster recovery.
How to Upgrade Bitdefender 2017 on Your PC?
Chapter 3: SYSTEM SOFTWARE
DataLocker’s motto is “Simply Secure”
HPE StoreEver LTO5 Focus on your business, Not File Storage:
Better, Safer, Faster – Security by ESET and...
Protect Manage Optimize Why LastPass Enterprise? Protect Manage Optimize.
Chapter 5 Electronic Commerce | Security Threats - Solution
DATA SECURITY FOR MEDICAL RESEARCH
TRUSTED | PROTECTED | SECURED
Cloud-First, Modern Windows Management and Security
Customized Solutions to your needs
Computer Virus and Antivirus
Chapter 5 Electronic Commerce | Security Threats - Solution
Contact Norton Antivirus | Norton Antivirus Support UK
 Security is a must today. If your device is not secure with updated antivirus then it is surely vulnerable to the attacks of dangerous viruses, spyware.
Advantages of Hardware Encryption at the dawn of the GDPR
Skyhigh Enables Enterprises to Use Productivity Tools of Microsoft Office 365 While Meeting Their Security, Compliance & Governance Requirements Partner.
With IvSign, Office 365 Users Can Digitally Sign Word Documents in the Cloud from Any Device Without Having to Install Any Digital Certificates OFFICE.
Quick Sales Guide Acronis Backup Cloud Powered by Acronis – local and cloud backup and recovery service to solve your customers’ data protection challenges.
Design Unit 26 Design a small or home office network
Special Promo Valid Until
11/23/2018 3:03 PM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
BluVault Provides Secure and Cost-Effective Cloud Endpoint Backup and Recovery Using Power of Microsoft OneDrive Business and Microsoft Azure OFFICE 365.
Microsoft Azure, RightsWATCH Help Users Keep Sensitive Information Safe from Security Breaches Resulting from Accidental or Malicious Disclosure MICROSOFT.
Office 365 and Microsoft Project Integrations for HULAK Project Management Software Enable Teams to Remain Productive and Within Budget OFFICE 365 APP.
Bethesda Cybersecurity Club
K!M SAA LOGICAL SECURITY Strong Adaptive Authentication
Securing Windows 7 Lesson 10.
Increase and Improve your PC management with Windows Intune
We provide FREE On-site Diagnosis
Cybersecurity and Cyberhygiene
Special Promo Valid Until
Special Promo Valid Until
Features Overview.
IT Management, Simplified
IT Management, Simplified
Bethesda Cybersecurity Club
Presentation transcript:

Šifrované USB disky Jakub Mazal COMGUARD a.s.

Cesty k Data loss prevention a jejich cena Encryption Training Endpoint Security Manual controls Asset management Data loss prevention Ponemum Instistute, 2015. Table 1: Data Loss prevention controls and activities.

Šifrování - cesta jak nejlevněji zabezpečit data Šifrování zabezpečují vhodná opatření, která zajistí důvěrnost a bezpečnost přenášených dat. Vyžadováno heslo k přístupu k datům. About half of data breaches are malicious, so IT departments can encrypt data at every point of entry protect the personal data that they collect and store. Byl USB disk chránený? ?

Šifrování digitálních médií chrání data v pohybu Zaměstnanec přistupuje k citlivým datům Zhruba polovina úniků dat jsou způsobena interně, což může být ochráněno preventivním školením a dodržováním politik. Policy Data Encrypted USB Security Endpoint Training employees Productive Zaměstnanci mají přístup k datům i na cestách Data jsou chráněna šifrováním USB disk je jednoduchá na používání a nepotřebuje složitá školení Kontrola periferií koncového stroje

Možnosti politiky, které by měly organizace zvážit Zakázat USB Porty + Ultimate Security + Splněny normy - Omezení flexibility - Náklady na jiné způsoby bezpečného přesunu dat Vynutit šifrování + Flexibilita + Data jsou zabezpečena - Investice do Hardware Locking down USB ports also prevent use of other USB peripherals: keyboard, mouse, phone charging, etc VPN

Šifrovaná USB jsou kompatibilní s endpoint security Prostřednictvím správy koncových bodů mohou společnosti povolit pouze schválená USB zařízení, aby zajistily, že uživatelé budou vždy využívat šifrování. White List Vendor ID Product ID Serial Numbers

Encrypted DataTraveler Line-Up Locker+ G3 Vault Privacy 3.0 2000 4000G2 USB 3.0 Locker+ G3 Vault Privacy 3.0 2000 4000G2 Encryption Hardware Encryption AES 256-Bit Hardware Encryption Feature USBtoCloud™ Software XTS Block Cipher Mode OS independent FIPS n/a FIPS 197 FIPS 140-2 Level 3 Capacities 8GB-64GB 4GB-64GB 16GB-64GB Anti-Virus Available through USBtoCloud™ Anti-Virus SKUs Available

AES 256-Bit Hardware Encryption Encrypted IronKey Line-Up D300 S1000 D300 S1000 Encryption AES 256-Bit Hardware Encryption Feature IronKey EMS support XTS Block Cipher Mode XTS, CryptoChip FIPS FIPS 140-2 Level 3 Capacities 4GB-128GB

DT Locker+G3: Snadná ochrana citlivých dat Hardware encryption – the best in personal security to keep data safe. Easy-to-use – no application installation Superior password protection Complex password Locks after 10 attempts Now with USBtoCloud Software, featuring file backup to Google Drive, Amazon S3, Microsoft OneDrive, Dropbox, Box, OneDrive for Business or ShareFile. Anti-Virus available through USBtoCloud™ Durable Metal casing USB 3.0, compatible with USB 2.0 Works interchangeably with Mac and Windows systems** 5 Year Warranty 8 - 64GB capacities Customizable co-logo program USB 3.0 Read* Write* 8GB 80MB/s 10MB/s 16GB 135MB/s 20MB/s 32GB 40MB/s 64GB *Based on Internal Testing ** USBtoCloud works with Windows only 9

Common Features for the DT4000G2 & DTVP30 FIPS 140-2 Level 3 FIPS 197 100% 256-bit AES hardware based encryption in XTS block cipher mode. Lockout after 10 incorrect password entries wiping keys and formatting the drive. Enforced complex password with minimum password length. Hardware based authentication Digitally Signed Firmware Wear-leveling: Under extreme drive usage (writing 80% drive capacity each and every day) drive endurance would exceed 10 years of use! TAA Compliant 5 Year warranty with free global technical support Rugged, waterproof metal casing Customizable drives and features available including dual password, serialization, co-logo, custom profiles, custom password requirements, and more. *Password complexity: 3 of the following 4: upper-case letter, lower-case letter, number, special character:!@#$%...

DataTraveler Vault Privacy 3.0 with ESET Anti-Virus NOD 32® AV Engine provided by ESET Powerful antivirus utility that prevents viruses, Trojans and other malware from spreading via USB. Easy to deploy, factory pre-activated solution Automatically loads when user successfully authenticates the drive System tray icon notifies users of threat USB 3.0, backwards compatible with USB 2.0 4GB – 64GB capacities ESET: Windows (XP, Vista, 7, 8) compatible Part Number: DTVP30AV/xxGB

DataTraveler 4000G2: FIPS 140-2 Level 3 100% hardware encryption 256-bit AES Hardware encryption XTS block cipher mode FIPS 140-2 Level 3 Validated Certificate #2307 USB 3.0, backwards compatible with USB 2.0 Locks and reformats after 10 intrusion attempts Enforced complex password User selectable read only mode Protection against spreading viruses Rugged waterproof metal casing Windows, Mac & Linux OS support Customization and Co-Logo program 5 Year Warranty 4 - 64GB capacities Management ready SKU : DT4000G2DM DT4000G2 will phase out in Q3 as FIPS drives moves to Ironkey USB 3.0 Read* Write* 4GB 80MB/s 12MB/s 8GB 165MB/s 22MB/s 16GB 32GB 250MB/s 40MB/s 64GB 85MB/s * USB 2.0 speeds: 30MB/s read, 20MB/s write (4GB: 30MB/s read, 12MB/s write)

Vault Privacy 3.0: Strong Security for Enterprise 100% hardware encryption 256-bit AES Hardware encryption XTS block cipher mode Locks and reformats after 10 intrusion attempts Enforced complex password User selectable read only mode Protection against spreading viruses FIPS-197 USB 3.0, backwards compatible with USB 2.0 Rugged waterproof metal casing Windows, Mac & Linux OS support Customization and Co-Logo program 5 Year Warranty 4 - 64GB capacities Anti-Virus SKU : DTVP30AV Management Ready SKU : DTVP30DM USB 3.0 Read* Write* 4GB 80MB/s 12MB/s 8GB 165MB/s 22MB/s 16GB 32GB 250MB/s 40MB/s 64GB 85MB/s * USB 2.0 speeds: 30MB/s read, 20MB/s write (4GB: 30MB/s read, 12MB/s write)

SafeConsole Management Software Secure USB Management allows an organization to quickly and easily establish a command center to inventory, audit and control their secure USB storage devices. Remote Password Reset Password Policy Device Audit Device State Management Geolocation and Geofencing Kingston management ready SKUs support the latest SafeConsole Management software from DataLocker. The drives can function without the use of SafeConsole helping purchasing decisions.

SafeConsole Management Software

DataTraveler 2000: Keypad Drive 100% hardware encryption 256-bit AES Hardware encryption XTS block cipher mode OS independent Locks and reformats after 10 intrusion attempts Auto-Lock feature, when the drive is removed from a device User selectable read only mode Protection against spreading viruses FIPS-197 Certified USB 3.0, backwards compatible with USB 2.0 Rugged waterproof metal casing 16 - 64GB capacities Android OS is used on the majority of devices USB 3.0 Read* Write* 16GB 120MB/s 20MB/s 32GB 135MB/s 40MB/s 64GB * USB 2.0 speeds: 30MB/s read, 20MB/s write

IronKey

IronKey S250, D250 100% hardware encryption 256-bit AES Hardware encryption CBC mode FIPS 140-2 Level 3 Validated Certificate #2018 USB 2.0 S250 – SLC Nand, Up to 31MB/sec read; 24MB/sec write D250 – MLC Nand, Up to 29MB/sec read; 13MB/sec write After 10 failed attempts the drive can self-destruct or reset, depending on user selection User selectable read only mode Protection against spreading viruses Rugged waterproof Metal casing Windows, Mac & Linux OS support 5 Year Warranty 2 - 64GB capacities Available in Basic and Enterprise SKUs Capacity Basic S250 Enterprise S250 Basic D250 Enterprise D250 2GB IKS250B/2GB IKS250E/2GB IKD250B/2GB IKD250E/2GB 4GB IKS250B/4GB IKS250E/4GB IKD250B/4GB IKD250E/4GB 8GB IKS250B/8GB IKS250E/8GB IKD250B/8GB IKD250E/8GB 16GB IKS250B/16GB IKS250E/16GB IKD250B/16GB IKD250E/16GB 32GB IKS250B/32GB IKS250E/32GB IKD250B/32GB IKD250E/32GB 64GB n/a IKD250B/64GB IKD250E/64GB

IronKey S1000 100% hardware encryption 256-bit AES Hardware encryption XTS block cipher mode FIPS 140-2 Level 3 Validated Certificate #2320 USB 3.0, backwards compatible with USB 2.0 After 10 failed attempts the drive can self-destruct or reset, depending on user selection User selectable read only mode Protection against spreading viruses Rugged waterproof Anodized Aluminum casing Windows, Mac & Linux OS support 5 Year Warranty 4 - 128GB capacities Max Read: 400 MB/second; Max Write: 300 MB/second Available in Basic and Enterprise SKUs Capacity Basic S1000 Enterprise S1000 4GB IKS1000B/4GB IKS1000E/4GB 8GB IKS1000B/8GB IKS1000E/8GB 16GB IKS1000B/16GB IKS1000E/16GB 32GB IKS1000B/32GB IKS1000E/32GB 64GB IKS1000B/64GB IKS1000E/64GB 128GB IKS1000B/128GB IKS1000E/128GB

IronKey D300 Federal Information Processing Standards 100% hardware encryption 256-bit AES Hardware encryption XTS block cipher mode FIPS 140-2 Level 3 Validated (certificate 2731) Durable, waterproof metal casing with additional Epoxy to provide the strongest physical protection. Locks and reformats after 10 intrusion attempts Enforced complex password Digitally Signed Firmware (Immune to BadUSB) USB 3.0/2.0; Windows, Mac & Linux OS support Customization and Co-Logo program 4 - 128GB capacities, 5 Year Warranty Forced Management SKU : IKD300M launching late-Sept Requires IronKey EMS license (sold by DataLocker) USB 3.0 Read* Write* 4GB 80MB/s 12MB/s 8GB 165MB/s 22MB/s 16GB 32GB 250MB/s 40MB/s 64GB 85MB/s 128GB The D300 will replace the IronKey x250 and DT4000G2 Federal Information Processing Standards * USB 2.0 speeds: 30MB/s read, 20MB/s write (4GB: 30MB/s read, 12MB/s write)

Basic and Enterprise Drives Stand alone drives. Secure Backup Self-destruct or reset (if previously enabled) after 10 failed consecutive password attempts Basic S1000 drives can be upgraded to Enterprise drives. Non-Managed Enterprise Must also purchase Enterprise Management Service (EMS) from DataLocker. An Advanced Platform for the Secure Enterprise that quickly and easily allows you protect data by administering usage and encryption policies, password restrictions, and more from a central console. Monitor Ironkey Entreprise drives in the field with a powerful, flexible asset tracking system. Fast, Flexible Deployment Create a Virtual Command Center Leverage Existing Virtualization Platform Ensure Compromised Drives Don’t Compromise Data Forced Managed

Ironkey EMS

Jakub Mazal| jakub.mazal@comguard.cz | www.comguard.cz Děkuji za pozornost Jakub Mazal| jakub.mazal@comguard.cz | www.comguard.cz Dotazy? @comguard_ict