Effiziente Verwaltung und Nutzung verschlüsselter Umgebungen Platinum Partner Schweiz.

Slides:



Advertisements
Similar presentations
McAfee One Time Password
Advertisements

Security for Mobile Devices
2  Industry trends and challenges  Windows Server 2012: Modern workstyle, enabled  Access from virtually anywhere, any device  Full Windows experience.
Avoid data leakage, espionage, sabotage and other reputation and business risks without losing employee performance and mobility.
John Whaley Founder and CTO MokaFive Desktop Complexity Challenge System rollouts/ updates/ upgrades Application management PC/Mac/ BYOC Mobility & Remote.
Securing. Agenda  Hard Drive Encryption  User Account Permissions  Root Level Access  Firewall Protection  Malware Protection.
Building on the Foundation of Windows Vista: Introduction to Windows 7: Security and Management Dan Stolts IT Pro Evangelist Microsoft
WCL317 Disclaimer The information in this presentation relates to a pre-released product which may be substantially modified before it’s commercially.
Building and Deploying Safe and Secure Android Apps for Enterprise Presented by Technology Consulting Group at Endeavour Software Technologies.
Windows 8: Windows To Go Overview Zvezdan PavkovicTanya Koval Senior ConsultantArchitect WCL333.
Don’t Let Anybody Slip into Your Network! Using the Login People Multi-Factor Authentication Server Means No Tokens, No OTP, No SMS, No Certificates MICROSOFT.
Avoid data leakage, espionage, sabotage and other reputation and business risks without losing employee performance and mobility. Simplify authentication.
1 COMPANY CONFIDENTIAL Product Profiles Software/Services/Mobile Computers/Printers/Scanners.
Script Kiddies; CybercrimeCyber-espionage; Cyber-warfare CybercriminalsState sponsored actions; Unlimited resources Attacks on fortune 500All sectors.
Data Encryption Overview South Seas Corporation Jared Owensby.
Trend Micro Data-at-Rest Solution SecureDoc Solution Presentation Derek Tsang Michael Desjardins Steven Pomerenk October 12, 2010.
Netop Remote Control Trusted. Secure. Experienced.
Windows Server 2012 R2 Capabilities for BYOD Scenario Yuri Diogenes Senior Knowledge Engineer Data Center, Devices & Enterprise Client – CSI Team’s Page:
Barracuda Networks Confidential1 Barracuda Backup Service Integrated Local & Offsite Data Backup.
Full Packaged Product (FPP) OEM – PC Preinstall Volume Licensing.
Demi Albuz SENIOR PRODUCT MARKETING MANAGER Samim Erdogan PRINCIPAL ENGINEERING MANAGER Thomas Willingham TECHNICAL PRODUCT MANAGER.
©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone Endpoint Security Current portfolio and looking forward October 2010.
Sr. Manager Global Business Solutions Carlos Capó Master Macs in Business Easily integrate Macs into a Microsoft Shop.
Empower Enterprise Mobility Jasbir Gill Azure Mobility.
Windows ® Powered NAS. Agenda Windows Powered NAS Windows Powered NAS Key Technologies in Windows Powered NAS Key Technologies in Windows Powered NAS.
Windows Vista: Volume Activation 2.0
1 Managed Security. 2 Managed Security provides a comprehensive suite of security services to manage and protect your network assets –Managed Firewall.
IMATION MOBILE SECURITY. MACRO TRENDS Mobile Workers Compliance Regulations + Modern Worker Behavior + IT Landscape.
Delivering the Optimized Desktop Presented by Danny Beck, Leon Booth and Jeff Johnson.
1. Windows Vista Enterprise And Mid-Market User Scenarios 2. Customer Profiling And Segmentation Tools 3. Windows Vista Business Value And Infrastructure.
Week #7 Objectives: Secure Windows 7 Desktop
© Aladdin Knowledge Systems 2006 Aladdin eToken Overview April 2006 ®
Rapid Endpoint Data Protection on Microsoft Azure [Insert customer name] [Date}
BRING YOUR OWN DEVICE. BYOD AND THE IMPACT ON IT SECURITY BYOD and pressure employees put on IT organization to supply or allow consumer mobility devices.
XPand your capabilities with Citrix ® MetaFrame XP ™ for Windows ®, Feature Release 2.
Delivering Security for Mobile Device and Mobile Application Management INSERT MSP LOGO HERE.
Security considerations for mobile devices in GoRTT
Chapter 13 Users, Groups Profiles and Policies. Learning Objectives Understand Windows XP Professional user accounts Understand the different types of.
SAM for Virtualizatio n Presenter Name. Virtualization: a key priority for business decision makers Technavio forecasts that the global virtualization.
PCIT313. Today’s challenges Deliver applications to mobile platforms (BYOD) Respond to dynamic business requirements for IT: Seasonal/temporary workers.
Empowering people-centric IT Unified device management Access and information protection Desktop Virtualization Hybrid Identity.
One Platform, One Solution: eToken TMS 5.1 Customer Presentation November 2009.
1 Evolution and Revolution: Windows 7 and Desktop Virtualization How to Accelerate Migration to Windows 7 Miguel Sian, Sr. Enterprise Solutions Consultant.
Alessandro Cardoso Microsoft MVP | Readify National Manager |
DC-B312 BitLocker Improvements in Windows 8 MBAM 2.0 Investment Areas and Key New Features Deploying MBAM 2.0MBAM 2.0 End User Experience.
Securely Synchronize and Share Enterprise Files across Desktops, Web, and Mobile with EasiShare on the Powerful Microsoft Azure Cloud Platform MICROSOFT.
CHECO Jared Owensby – Technical Paul Herbka – Pricing & Purchasing South Seas Corporation.
Enabling Secure Always-On Connectivity [Name] Microsoft Corporation.
Lessons learned during Sandia’s encryption implementation NLIT 2009 May 2008 Sam Jones Matt Snitchler Desktop Technology Development Sandia is a multiprogram.
Building a Fully Trusted Authentication Environment
Microsoft Virtual Academy Preparing for the Windows 8.1 MCSA Module 5: Managing Devices & Resource Access.
About Softex Mission Statement: “To provide innovative security software products and solutions for computing devices” Softex was founded in 1992 by IBM.
User and Device Management
IT Pro Day MDMC Daniel von Büren V-TSP / Senior Consultant / CTO, redtoo ag Modern Device Management through the Cloud.
Flight is a SaaS Solution that Accelerates the Secure Transfer of Large Files and Data Sets Into and Out of Microsoft Azure Blob Storage MICROSOFT AZURE.
Windows for the Enterprise Boris Ulík Technology Solutions Professional Microsoft Slovakia.
What is BitLocker and How Does It Work? Steve Lamb IT Pro Evangelist, Microsoft Ltd
Why EMS? What benefit does EMS provide O365 customers Manage Mobile Productivity Increase IT ProductivitySimplify app delivery and deployment LOB Apps.
©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. Securing Your Data in Endpoint and Mobile Environments Frank Suijten Security.
Total Enterprise Mobility Comprehensive Management and Security
Managing Devices in the Enterprise: From EMS zero to Hero in only 60 minutes Ken Goossens Herman Arnedo Mahr.
HUB International: Software & Common Applications
UNM Encryption Services in Development
The time to address enterprise mobility is now
BOMGAR REMOTE SUPPORT Karl Lankford
CHECO Jared Owensby – Technical Paul Herbka – Pricing & Purchasing
System Center Marketing
IT Management, Simplified
IT Management, Simplified
Microsoft Virtual Academy
Presentation transcript:

Effiziente Verwaltung und Nutzung verschlüsselter Umgebungen Platinum Partner Schweiz

I.Herausforderung Datensicherheit für Unternehmen II.Verwaltung verschlüsselter Umgebungen und Alleinstellungsmerkmale III.Der Markt / Markttendenz IV.Bitlocker & SecureDoc V.Kosteneinsparungspotentiale VI.Informationen zu WinMagic VII.Live Demo

 Data breaches a common occurrence today  More than 660 million records compromised since 2013  Windows continues its dominance as business OS  IT faces increased risk with mixed environments & BYOD  Only takes one lost or stolen unsecured device to ruin reputation

 Data privacy regulations are forcing adoption: Health Insurance Portability & Accountability Act (HIPPA – US) Personal Information & Electronic Documents Act (PIPEDA – CDN) Data Protection Act (UK) PCI Data Security Standard (PCI DSS – Global)  The challenge with FDE: keep costs and IT complexity low

As employees become more mobile and the data they access can rest anywhere, it is becoming increasingly difficult for IT to ensure the security of that data. InformationWeek 2013 Mobile Security Survey 78% 28% 39% Primary Security Concern: Lost or Stolen Devices Require Hardware or Software Encryption Have MDM systems with Remote Wipe

Complicated Expensive, Bitlocker is for free Customer experience Affects performance

© 2013 WinMagic. All rights reserved. 7 SSD - SED OPAL (OSA) Optimal world:Flexible, Future Proof, OS support, no changes to existing processes Bitlocker File Vault II Hardware Vendors e.g. UEFI (Win 8)

Strong industry validation Global computing leaders, including HP and Lenovo, choose WinMagic to secure their customers’ most important asset – their data. One console, any platform Centrally manage and secure corporate data, no matter where it resides. Overcome challenges of pre-boot authentication Streamline IT management while providing a simplistic end user experience to accessing secured information. Unparalleled self- encrypting drive management Easily deploy and manage SEDs for maximum performance and data security.

Easy Integration into accounts with multiple devices Full Mobile Device Management (MDM) support and tracking from a single console Support for Windows, Linux, Android, OS X (FileVault2), iOS Devices will be secure and compliant Satisfying requirements for IT Management and End Users Centralized Management

Approaching cost parity with standard HDDs Fast encryption & system performance Demand & Supply are Increasing Best of both hardware & software Opal SED Support

SSD – SED - eDrive Hardware Encryption OEM’s Built In Encryption

Pre-installed on all HP Business PCs & Laptops Seamless upgrade with SecureDoc for HP OEM Relationships First to market with Win8 & UEFI Support Deep integration with ThinkVantage Tools

Pre-boot network authentication Enables authenticated users to boot their device without a local key file and validate credentials before ever accessing the operating system. PBConnex SES Active Directory User

© 2013 WinMagic. All rights reserved. 14 SSD - SED OPAL (OSA) Optimal world:Flexible, Future Proof, OS support, no changes to existing processes Bitlocker File Vault II Hardware Vendors e.g. UEFI (Win 8)

© 2013 WinMagic. All rights reserved. 15 SSD - SED OPAL (OSA) HP Drive Encryption File Vault II OEM’s Flexible between Bitlocker, WinMagic SW based or OPAL, optional e- Drive)

Value Best Benefits Best TCO Highest Level of Security Better OK Extending the Protection Maximizing Value Minimum Compliance at least Key Backup SEDs + Bitlocker +/or BitlockerBitlocker

Choose your pre-boot preference – SecureDoc pre-boot with PBConnex or Standard BitLocker pre-boot with SecureDoc enhancements Standard BitLocker TPM protection options Manage Conversion Options – BitLocker defaults to AES 128-bit Set BitLocker policy on supported devices or leverage SED or SecureDoc encryption

SES BitLocker Management Microsoft BitLocker Administration and Monitoring (MBAM) With SecureDoc Pre-bootWith BitLocker Pre-bootBitLocker Unique user authentication at pre-boot  Pre-boot network user authentication (AD)  Multifactor authentication - Tokens, smartcards, biometrics  Secure network auto unlock  Offline self help password recovery option  Challenge and response password recovery  Customizable Pre-boot Screen 

SES BitLocker Management Microsoft BitLocker Administration and Monitoring (MBAM) With SecureDoc Pre-bootWith BitLocker Pre-bootBitLocker Single Sign on  Password Synchronization  Policy driven removable media encryption with key management  Policy driven File and Folder encryption with key management  Challenge and response pwd recovery for removeable media encryption  Port Control 

SES BitLocker Management Microsoft BitLocker Administration and Monitoring (MBAM) With SecureDoc Pre-bootWith BitLocker Pre-bootBitLocker Client pre-boot login auditing  BitLocker Recovery key access auditing 

SES BitLocker Management Microsoft BitLocker Administration and Monitoring (MBAM) With SecureDoc Pre-bootWith BitLocker Pre-bootBitLocker Single location to configure BitLocker policies (No need to configure GPO)  Automatic TPM Provisioning  Ability to secure and manage OS that do not support BitLocker  Supports Self Encrypting drives (TCG OPAL drives)  Supports Self Encrypting Drives (E-Drive)  Supports importing of standalone BitLocker enabled machines into centralized management  Silent deployment with no user interaction 

Best BitLocker Management solution in market today Better IT administration with pre-boot network authentication Multiple users on single system Support for multi-factor pre-boot authentication TPM activation support Best BitLocker Management solution in market today Better IT administration with pre-boot network authentication Multiple users on single system Support for multi-factor pre-boot authentication TPM activation support

Cost of FDE solutions only a fraction of overall administration costs The Value of FDE outweighs costs by 4 to 20x depending on the region There is no ‘free’ encryption once administration costs are factored in TCO of Encryption PBConnex™ Reduce TCO of overall IT administration significantly Cut password reset time by 75% Cut PC staging time by 75% Savings of up to $240,000 per year in an 8,000 seat environment PBConnex

HeadquartersFoundedCustomersCertifications Toronto, Canada1997Over 84 countries

2002 Received first ever NIST certification for AES 2006 First full-disk encryption to receive FIPS Level 1 & 2 validations Introduced first FDE solution that offers Pre-Boot Networking (PBConnex) PBConnex PBConnex

© 2013 WinMagic. All rights reserved. 26 Georg Gann Director Enterprise Sales CEE, Benelux Jens Albrecht CEO, Security Engineer

27 Connect with Us Web -