ARMORINO Portable Privacy Platform. µcrypt www.armorino.net µcrypt Armorino Information always has a value that constantly growing under pressure of new.

Slides:



Advertisements
Similar presentations
Creating HIPAA-Compliant Medical Data Applications with Amazon Web Services Presented by, Tulika Srivastava Purdue University.
Advertisements

Darton College Information Systems Use Policies. Introduction Dartons Information Systems are critical resources. The Information Systems Use Policies.
©2013 Check Point Software Technologies Ltd. | [Unrestricted] For everyone Best Practices to Secure the Mobile Enterprise Macy Torrey
Avoid data leakage, espionage, sabotage and other reputation and business risks without losing employee performance and mobility.
Invasion of Smart Phones in Clinical Areas Chrissy Kyak Privacy Officer University of Maryland Upper Chesapeake Health.
Data Security for Healthcare Facilities Debbie Abbott Health Information Consultant Resolutions (Int) Pty Ltd.
Personal Data Protection and Security Measures Justin Law IT Services - Information Security Team 18, 20 & 25 March 2015.
Lesson 14-Desktop Protection. Overview Protect against malicious code. Use the Internet. Protect against physical tampering.
Iron Key and Portable Drive Security Zakary Littlefield.
You can run that from a USB Drive ? Portable Applications: the good, the bad and the ugly Jeff Gimbel © 2007.
What is it? CLOUD COMPUTING.  Connects to the cloud via the Internet  Does computing tasks, or  Runs applications, or  Stores Data THE AVERAGE CLOUD.
Back Up and Recovery Sue Kayton February 2013.
Presented by Manager, MIS.  GRIDCo’s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to GRIDCo’s.
C AMBRIDGE N ATIONALS - BP2 How Information and data can be stored on portable devices.
Chapter 19 Security Transparencies. 2 Chapter 19 - Objectives Scope of database security. Why database security is a serious concern for an organization.
New Data Regulation Law 201 CMR TJX Video.
Copyright Security-Assessment.com 2004 New Technology Enforcement Strategies by Peter Benson.
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
Security Measures Using IS to secure data. Security Equipment, Hardware Biometrics –Authentication based on what you are (Biometrics) –Biometrics, human.
E-business Security Dana Vasiloaica Institute of Technology Sligo 22 April 2006.
Chapter 10: Authentication Guide to Computer Network Security.
eScan Total Security Suite with Cloud Security
Information Security Decision- Making Tool What kind of data do I have and how do I protect it appropriately? Continue Information Security decision making.
Information Security Technological Security Implementation and Privacy Protection.
Elite Networking & Consulting Presents: Everything You Wanted To Know About Data Insurance* * But Were Afraid To Ask Elite Networking & Consulting, LLC,
Adam Leidigh Brandon Pyle Bernardo Ruiz Daniel Nakamura Arianna Campos.
Chapter 7: Using Windows Servers to Share Information.
MOBILE DEVICE SECURITY. WHAT IS MOBILE DEVICE SECURITY? Mobile Devices  Smartphones  Laptops  Tablets  USB Memory  Portable Media Player  Handheld.
Virtual Private Network (VPN). ©2001 Check Point Software Technologies Ltd. - Proprietary & Confidential “ If saving money is wrong, I don’t want.
1.1 System Performance Security Module 1 Version 5.
Csci5233 Computer Security1 Bishop: Chapter 27 System Security.
TRUSTPORT PRODUCT PORTFOLIO Marcela Parolkova Sales Director.
E-Commerce Security Technologies : Theft of credit card numbers Denial of service attacks (System not availability ) Consumer privacy (Confidentiality.
DIGITAL SECURITY PART 2 TOOLS. phising  Internet criminals can steal your personal and banking information without you ever noticing – they can do it.
Cloud Computing Characteristics A service provided by large internet-based specialised data centres that offers storage, processing and computer resources.
| nectar.org.au NECTAR TRAINING Module 5 The Research Cloud Lifecycle.
Types of Electronic Infection
“TK8 Safe” – Easy-to-use, secure password manager Download a free trial copy: Product Info Highlights TK8 Safe is a perfect password manager.
Chapter 9: SHARING FILE SYSTEM RESOURCES1 CHAPTER OVERVIEW  Create and manage file system shares and work with share permissions.  Use NTFS file system.
Computer security By Isabelle Cooper.
What is it? CLOUD COMPUTING.  Connects to the cloud via the Internet  Does computing tasks, or  Runs applications, or  Stores Data THE AVERAGE CLOUD.
©2001 Check Point Software Technologies Ltd. - Proprietary & Confidential outline What is a VPN? What is a VPN?  Types of VPN.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
Introduction TO Network Administration
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Security and Ethics Safeguards and Codes of Conduct.
Computer Systems Networking. What is a Network A network can be described as a number of computers that are interconnected, allowing the sharing of data.
“Lines of Defense” against Malware.. Prevention: Keep Malware off your computer. Limit Damage: Stop Malware that gets onto your computer from doing any.
1 TCS Confidential. 2 Objective : In this session we will be able to learn:  What is Cloud Computing?  Characteristics  Cloud Flavors  Cloud Deployment.
I NTRODUCTION TO N ETWORK A DMINISTRATION. W HAT IS A N ETWORK ? A network is a group of computers connected to each other to share information. Networks.
Cloud Archive By: Kimberly Nolan. What it is?  The goal of a cloud archiving service is to provide a data storage (ex. Google drive and SkyDrive) as.
©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. Securing Your Data in Endpoint and Mobile Environments Frank Suijten Security.
Kaspersky Small Office Security INTRODUCING New for 2014!
Billy Ripple Dr. Oblitey COSC  File-Sharing ◦ What is it? ◦ Uses ◦ History ◦ Types ◦ Dangers  Case Study  Summary  Works Cited.
Product Training 1 JetFlash Software Application.
Computer Security Sample security policy Dr Alexei Vernitski.
Sniper Corporation. Sniper Corporation is an IT security solution company that has introduced security products for the comprehensive protection related.
 client  client/server network  communication hardware  extranet  firewall  hacker  Internet  intranet  local area network (LAN)  Network 
LESSON 12 Business Internet. Electronic business, or e-business, is the application of information and communication technologies (ICT) in support of.
Novell iFolder Novell Academy QuickTrain. What is iFolder? Novell iFolder lets users’ files follow them anywhere A simple and secure way to access, organize.
Handling Personal Data & Security of Information Paula Trim, Information Officer, Children’s Strategic Services, Mon – Thurs 9:15-2:15.
NOTE: To change the image on this slide, select the picture and delete it. Then click the Pictures icon in the placeholder to insert your own image. CLOUD.
Network and Server Basics. Learning Objectives After viewing this presentation, you will be able to: Understand the benefits of a client/server network.
WHAT ARE BACKUPS? Backups are the last line of defense against hardware failure, floods or fires the damage caused by a security breach or just accidental.
Chapter 7: Using Windows Servers
The importance of computer backups
RBS Remote Business Support System
Part 3.
Revision PowerPoint By Nicole Davidson.
Presentation transcript:

ARMORINO Portable Privacy Platform

µcrypt µcrypt Armorino Information always has a value that constantly growing under pressure of new data processing and storing technologies. We do feel this every day, dont you? We going to answer all of your questions concerning your private security!

µcrypt µcrypt What is Armorino? In terms of hardware, Armorino is an USB flash-drive with transparent AES-256 based encryption algorithm implementation that supports authentication via password with hardware limitation of the number of failed authentication attempts. Functionally, Armorino is protected portable office that allows you to safely perform day-by-day job at any workplace. Armorino ensures confidentiality and reliability of storing and transferring of your critical data, security of the financial and other significant transactions, makes possible to improve the convenience and security of the corporate resources and social networks day-by-day access. Data Armoring Innovations for portable protecting of your privacy

µcrypt µcrypt Armorino vs. Usual Flash drive FunctionalityUsual flash drive ARMORINO Transparent hardware based AES-256 implementation ̶+ Hardware based access control ̶+ Reliable Windows authentication ̶ 2-factor Reliable Digital Signature keys storage Password in fileInternal memory Local storage (folder, drives) encryption Password onlyRandom key Cryptographic subsystems integration (Windows CNG and Mozilla PKCS#11) ̶+ Additional virtual media emulation ̶+ Secure and convenient Internet browsing ̶+ Hardware based antivirus protection ̶+ Automatic secure protection for portable software ̶+ Backup to secured storage in Internet Password onlyRandom key

µcrypt µcrypt ARMORINO ARMORINO INFORMATION PROTECTION Have you felt the need to protect personal data against any attacks? Armorino provides reliable protection and maximum availability of your personal data. Have you worried about protection reliability and do not wish to accept any compromises? Armorino has implemented hardware, transparent encryption, according to international standard AES-256 that approves in the U.S. to protect CLASSIFIED data and documents. The encryption key is created directly on the device and never leaves internal protected storage! There is the password authentication is provided to access the key, but the number of unsuccessful attempts is limited, so passwords can not be a bust!

µcrypt µcrypt ARMORINO MULTIFACTOR AUTHENTICATION Do you have a few permanent jobs or computers in use and, therefore, Windows accounts? Tired to remember and apply unique password for each of Windows account? Concerned about security? Armorino allows you to achieve the maximum level of protection for all accounts with applying a single password only - access password of Armorino. The device actually becomes your authentication key for Windows. ARMORINO

µcrypt µcrypt ARMORINO PORTABLE WORKPLACE Your laptop is small, but inconvenient for work or big and heavy? Is there any need to carry laptop with you? But you wish to carry all your usual software environment and your actual data? Armorino gives you the opportunity to have a user-friendly portable software environment just in the shirt pocket and use it in any office and home PC or any computer in public areas. ARMORINO

µcrypt µcrypt ARMORINO SECURE INTERNET COMMUNICATIONS Don`t you tired to remember many passwords to access all your accounts on Facebook, Twitter and other web-services and mailboxes? Have you worried that your passwords and private data with the history of correspondence can be stored on your PC? Use the portable version of web-browser, mail client and Voice / IM- clients onboard private partition of Armorino. All your private data will be encrypted and stored exclusively in private partition with no way to access without your permission! ARMORINO

µcrypt µcrypt ARMORINO SECURED VIRTUAL DISKS Do you work with the private or sensitive data? Want you make sure that this data is safe enough? Armorino allows you to build and manage the local encrypted disks or/and folders to protect the data. It will be possible to access these encrypted storages with Armorino only. ARMORINO

µcrypt µcrypt ARMORINO DIGITAL ELECTRONIC SIGNATURE Do you use a digital electronic signature but your private key is stored on usual USB-flash memory stick, CD-ROM or floppy disk? Your digital signature key will not be busted in case of theft or loss of Armorino device! You have more than one key and you don`t want to remember multiple passwords and carry several key media? You can keep many keys just in one Armorino safely! ARMORINO

µcrypt µcrypt ARMORINO HIDDEN STORAGE Are you worry that your secret keys can be copied by malicious software or intruder? Armorino stores keys in hidden partition and does not store key information as the files! ARMORINO

µcrypt µcrypt ARMORINO VIRTUAL MEDIA Do you use outdated software that requires the use of certain media (floppy, CD-ROM or Flash / HDD) to store critical information? Databases? Catalogues? You can make images of these medias and store them to the private partition of single Armorino and mount these images on your demand to be used as virtual drive. ARMORINO

µcrypt µcrypt ARMORINO SAFE UPDATES Do you want to always use the latest version of the software, but you worry about identity while downloading online? Armorino Software Updates always performs test of its authenticity. ARMORINO

µcrypt µcrypt ARMORINO VIRUS PREVENTION Do you think how to protect your data and software from viruses and malicious software during the session on not trusted PC? Simply switch to the read only mode. It helps to prevent any virus intrusion to your data. Armorino management software partition is always switched to read-only mode. ARMORINO

µcrypt µcrypt CLOUD SECURE DATA STORAGES Thinking about 100% guarantee backup for your Armorino partitions or any folders on your PC? Concerning about encryption? Do you share the same set of documents with you colleagues due to cooperation? Thinking about mobile, secured and guaranteed access to your data? ARMORINO Owing to automatic backup creation function, Armorino allows you to safe your own mobility within advantage of privacy and highest level of theft and lost protection. You can store backups both on your own corporate servers (FTP, SFTP, WebDAV protocols) or by using clouds known as: Amazon S3, CloudFiles, Google Docs, SkyDrive as well as Tahoe-LAFS system! All of the above mentioned ways imply that your data will be encrypted directly on the local workstation by means of Armorino. You will be able to access stored data with Armorino device only!

µcrypt µcrypt Armorino Editions FunctionalityPersonal Edition Enterprise Edition Base functionality with AES-256 implementation and access control ++ Centralized and flexible setup of corporate security policy ̶+ Remote reset of the blocked password by the means of dynamic one-time password ̶+ Encrypted data storage in dedicated server located in the Internet ++ Storing the encrypted data on geographically distributed servers in the Internet ̶+

Thank you for your attention Q? Contacts: Sales and distributors inquiries Product information Technical support Question to developer? © Microcrypt Technologies Ltd.,