Origin Storage Ltd Security Product Overview 2013.

Slides:



Advertisements
Similar presentations
Speaker Name, Title Windows 8 Pro: For Small Business.
Advertisements

Security for Mobile Devices
Origin Storage Ltd Company Overview About Us Founded in September 2001, with its head office in Basingstoke - since then it has grown to have 2.
 What Is Desktop Virtualization?  How Does Application Virtualization Help?  How does V3 Systems help?  Getting Started AGENDA.
Which server is right for you? Get in Contact with us
Windows Deployment Services WDS for Large Scale Enterprises and Small IT Shops Presented By: Ryan Drown Systems Administrator for Krannert.
Dell Compellent and SafeNet KeySecure
Windows 8: Windows To Go Overview Zvezdan PavkovicTanya Koval Senior ConsultantArchitect WCL333.
Don’t Let Anybody Slip into Your Network! Using the Login People Multi-Factor Authentication Server Means No Tokens, No OTP, No SMS, No Certificates MICROSOFT.
Mobile Mobile OS and Application Team: Kwok Tak Chi Law Tsz Hin So Ting Wai.
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
Introducing TakeCharge SyncedTool The most secure, agile hosted file-sharing platform for business.
8/10/2015Windows 71 George South. 8/10/2015Windows Windows Vista Windows Vista was released in January 2007 some five years after Windows XP Vista.
ENCRYPTION Coffee Hour for August HISTORY OF ENCRYPTION Scytale Ciphers – paper wrapped around rod, receiver needed same size rod to get the message.
Origin Storage Ltd Company Overview About Us  Founded in September 2001, with its head office in Basingstoke - since then it has grown to have.
Confidential Computer Systems Group HD Lock for Toshiba Notebook August 3rd, 2006.
©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone Endpoint Security Current portfolio and looking forward October 2010.
Office 365: Efficient Cloud Solutions Wednesday March 12, 9AM Chaz Vossburg / Gabe Laushbaugh.
Built on the Powerful Microsoft Azure Platform, Nimble Schedule Streamlines and Automates Scheduling with Cloud-Based Mobile Services MICROSOFT AZURE ISV.
1 Managed Security. 2 Managed Security provides a comprehensive suite of security services to manage and protect your network assets –Managed Firewall.
1. Windows Vista Enterprise And Mid-Market User Scenarios 2. Customer Profiling And Segmentation Tools 3. Windows Vista Business Value And Infrastructure.
Virtualization Lab 3 – Virtualization Fall 2012 CSCI 6303 Principles of I.T.
Trusted Computing BY: Sam Ranjbari Billy J. Garcia.
Week #7 Objectives: Secure Windows 7 Desktop
TRUSTPORT PRODUCT PORTFOLIO Marcela Parolkova Sales Director.
Copyright © 2011 EMC Corporation. All Rights Reserved. MODULE – 6 VIRTUALIZED DATA CENTER – DESKTOP AND APPLICATION 1.
Please Note: Information contained in this document is considered LENOVO CONFIDENTIAL For Lenovo Internal Use Only Do Not Copy or Distribute!! For Lenovo.
Communicate with All Workers Involved in the Process of Delivering High-Quality Health Care by Choosing Dossier365 on the Azure Platform MICROSOFT AZURE.
One Platform, One Solution: eToken TMS 5.1 Customer Presentation November 2009.
Mobilise Your Business in Days with Crimson Tide’s mpro5 Enterprise Solution on Microsoft Azure! MICROSOFT AZURE ISV PROFILE: CRIMSON TIDE Crimson Tide.
| © 2007 Lenovo Utimaco SafeGuard Easy March 2007.
Securely Synchronize and Share Enterprise Files across Desktops, Web, and Mobile with EasiShare on the Powerful Microsoft Azure Cloud Platform MICROSOFT.
Virtual Classes Provides an Innovative App for Education that Stimulates Engagement and Sharing Content and Experiences in Office 365 MICROSOFT OFFICE.
WINDOWS 10 BUSINESS. Windows 10 for SMB Best platform for modern business Affordable and innovative devices Simple to setup and manage Enterprise-quality.
MidVision Enables Clients to Rent IBM WebSphere for Development, Test, and Peak Production Workloads in the Cloud on Microsoft Azure MICROSOFT AZURE ISV.
Page 1 of 38 Lenovo Confidential Lenovo Confidential Lenovo Confidential Lenovo Confidential Lenovo Confidential Please Note: Information contained in.
Lesson 18: Configuring Security for Mobile Devices MOAC : Configuring Windows 8.1.
About Softex Mission Statement: “To provide innovative security software products and solutions for computing devices” Softex was founded in 1992 by IBM.
Tekla Model Sharing and Microsoft Azure Create Secure and Seamless Collaboration Environment for Construction Projects, Locally and Globally MICROSOFT.
Zentera Guardia Fabric ™ Securely Connects Client-Server Apps between Microsoft Azure, Enterprise Datacenters & Other Public Clouds MICROSOFT AZURE ISV.
Powered by the Microsoft Azure Platform, Truck Tin Helps Your Sales Consultants Improve Efficiency, Information Sharing, Client Relations MICROSOFT AZURE.
©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. Securing Your Data in Endpoint and Mobile Environments Frank Suijten Security.
History of Windows Operating System. Windows 1.0 Debuted in 1985 First version of Windows that was set up to use bitmap displays and mouse pointing devices.
John Samuels October, Why Now?  Vista Problems  New Features  >4GB Memory Support  Experience.
Office 365 is cloud- based productivity, hosted by Microsoft. Business-class Gain large, 50GB mailboxes that can send messages up to 25MB in size,
Sniper Corporation. Sniper Corporation is an IT security solution company that has introduced security products for the comprehensive protection related.
MICROSOFT AZURE APP BUILDER PROFILE: RAVERUS LTD. Raverus is a customer-driven company engaged in providing software applications designed to improve and.
Get2Modern A plan for Windows XP & Office 2003 EOS migration in SMB Microsoft Confidential. NDA required.
Data-Tech Guardian Endpoint Security Suite. Guardian Endpoint Security Suite secures All Things Mobile TM from one management console.
Simplest and most cost effective for SMBs Optimized & supported for specific hardware One-stop shop for hardware, OS, and CALs Lets partner focus on higher-margin.
The BEST Citrix/Microsoft RDS alternative
Device Maintenance and Management, Parental Control, and Theft Protection for Home Users Made Easy with Remo MORE and Power of Azure MICROSOFT AZURE APP.
Office 365 is cloud-based productivity, hosted by Microsoft.
Customer Guide to Limited-Time Offer
Vidcoding Introduces Scalable Video and TV Encoding in the Cloud at an Affordable Price by Utilizing the Processing Power of Azure Batch MICROSOFT AZURE.
Laplink PCmover.
Customized Solutions to your needs
IWRITER 365 Offers Seamless, Easy-to-Use Solution for Using, Designing, Managing, and Sharing All Your Company Templates in Microsoft Office 365 OFFICE.
With IvSign, Office 365 Users Can Digitally Sign Word Documents in the Cloud from Any Device Without Having to Install Any Digital Certificates OFFICE.
File Manager for Microsoft Office 365, SharePoint, and OneDrive: Extensible Via Custom Connectors in Enterprise Deployments, Ideal for End Users OFFICE.
Data Security for Microsoft Azure
CloneManager® Helps Users Harness the Power of Microsoft Azure to Clone and Migrate Systems into the Cloud Cost-Effectively and Securely MICROSOFT AZURE.
MyCloudIT Enables Partners to Drive Their Cloud Profitability Using CSP-Enabled Desktop Hosting Automation with Microsoft Azure and Office 365 MICROSOFT.
BluVault Provides Secure and Cost-Effective Cloud Endpoint Backup and Recovery Using Power of Microsoft OneDrive Business and Microsoft Azure OFFICE 365.
MICROSOFT AZURE ISV PROFILE: ONEBE
DATS International Portfolio.
Only Windows 10 Pro devices
IT Management, Simplified
IT Management, Simplified
What is an operating system An operating system is the most important software that runs on a computer. It manages the computer's memory and processes,
Presentation transcript:

Origin Storage Ltd Security Product Overview 2013

About Us  Founded in September 2001, with its head office in Basingstoke - since then it has grown to have 2 offices in Europe and 3 across the UK.  Core area of business is the manufacturing and distribution of third party matched hard drives solutions for OEM Servers, Notebooks & Desktops.  Have been supplying Dell with their legacy spares across EMEA for the past decade – in FY 2011 this business grew by 80% in the UK. Products from award winning manufacturers F or more than a decade now Origin Storage has been an established provider to many of the IT industries leading Resellers. At the heart of our success lies a dedicated team of industry experts with a wealth of knowledge in storage and data security. That knowledge and the confidence to constantly evolve ourselves, has seen our business branch out in to new and exciting areas in the storage arena. Our strong business relationships allow us to continually expand and seek fresh, innovative new products to add to the IT market place.

Encryption Summary Why Use Encrypted devices at all? Mobile work forces are an important part of any modern day corporate environment, allowing employees to work where and when they choose. Many organisations issue laptops in preference to standard desktop PCs in order to facilitate the Mobile Workforce, but by doing this without utilising modern encryption techniques, they are also jeopardising the security of sensitive and confidential information in areas outside of their control. Products with hardware based cryptographic chips manage the encryption keys and perform the encrypting/decrypting routines. This means that your PCs processor will not be slowed down and the products run more securely than any software based encryption system. The Advanced Encryption Standard (AES) is a symmetric-key encryption standard adopted by the U.S. Government. The AES ciphers have been analysed extensively and are now used worldwide as the default standard for encrypting data. Federal Information Processing Standard 140-2(FIPS 140-2) is a standard that describes US Federal government requirements that IT products should meet for Sensitive, but unclassified data. FIPS certification has become a widely used method for organisations and their associated regulators to determine if an encrypted product is suitable for use by themselves and/or members. Why Hardware Encryption?Do I Need 128 Bit Or 256 Bit? What Is AES? What Is FIPS 140-2? This will depend largely on the type of data to be secured and any regulatory requirements you must conform to. To secure general company documents a 128 Bit device may be suitable however if you are securing financial information, 3rd party details, medical history or classified data then a 256 Bit device would meet your requirements. Origin Storage are members of the TCG Group

Physical USB 2.0USB GB, 1 TB, 2 TB (SATA) 128 GB, 256 GB (SSD) 500 GB, 1 TB, 1.5 TB (SATA) 128 GB, 256 GB (SSD) Security Password Length Password Length Numeric OnlyAlpha Numeric Single-Factor Authentication Optional RFID Two-Factor Authentication 256-bit AES Ease of Use Languages English, French, German, Spanish (separate Firmware required for each language) Languages English, French, German, Spanish (user selectable) PIN Encrypted Hard Drives Touch screen PIN protected USB portable hard drives DataLocker Encrypted Hard Drives DataLocker DL3 DataLocker DL2 FIPS Certified DataLocker external hard drives are ideal for mobile users who require high-capacity, secure portable storage. Also available with SSD!  No software required  Platform independent (PC, MAC, Linux)  High Capacity (Up to 2TB) Also Available with RFID New MAC Specific DL3 model available!

Wave Product Portfolio Secure Removable Storage Designed for ultra secure ultra portable affordable storage The DataLocker SecureDisk combines AES 256-bit encryption and disc burning functionality, all self-contained on a recordable CD or DVD. SecureDisk offers built-in software for disc burning and government strength FIPS AES 256-bit encryption.  FIPS Level I Validated  TAA Compliant, RoHS, CE  Windows® 2000, XP, Vista, Windows®7 & 8, Server 2000, Server 2003, Server 2008 SecureDisk Available in packs of 10 or 100 FormatRecording Speed Capacity CD-R52x700MB DVD-R52x4.7GB Sentry is a secure USB flash drive that utilises DataLocker’s certified and proven technology. This next generation, smart USB drive combines 100% hardware encryption with the ability to connect to a remote management system. A USB drive has never been so secure while still taking advantage of the agility of portable storage.  FIPS Level II Validated  AES-256 bit in CBC-mode  Fully compatible with Windows 7 & 8, Vista, XP, Server 2008, 2003, Mac OS X 10.5.x or later, Linux Kernel 2.6 or later Available in 4, 8, 16, 32 & 64GB Encrypted CD’s & DVD’s Sentry Key Secure Encrypted Flash Drives

Wave Product Portfolio FACT Under new UK legislation if an organisation loses personal data, they can be find up to £500,000 SATA/SSD Encrypted HDD’s SED’s are the most secure, highest performing option for protecting data in laptops Specifications Micron C400 SED. Hardware-based data encryption with no loss of SSD performance in accordance with industry standards. Capacities: 128GB, 256GB, 512GB Compliance: TCG Opal Encryption: 256-bit AES Read Performance: Up to 500 MB/s Write Performance: up to 175 MB/s for 128GB up to 260 MB/s for 256GB, 512GB Capacities: 500GB Compliance: FIPS 140-2, OPAL II Encryption: 256-bit AES Spin Speed: 5400RPM Interface: SATA 6-Gb/s NCQ Seagate® Momentus Thin. Hardware based encryption eliminates any performance impact, because encryption takes place on the fly. Specifications EnigmaSED Self-Encrypting Hard Drives Using a combination of the latest in hardware and software encryption technology, Enigma SED is a complete start to finish upgrade kit which will convert a standard notebook into a fully hardware encrypted notebook with pre-boot authentication.  Zero impact on system performance  Always-on AES encryption means all of your data is protected all of the time.  We supply everything you need right out of the box Powered by SSD

Wave Software The Trusted Computing Company — Helping Redefine Cyber Security Wave Wave Systems is a leading provider of client and server management software for hardware-based digital encryption security, enabling organisations to know who is connecting to their critical IT infrastructure, protect corporate data, and strengthen the boundaries of their networks. Wave’s core products are based around the Trusted Platform Module (TPM), a standards- based security chip that’s built into most of your laptop and desktop computers. In fact, it has shipped in more than 600 million laptop and desktop computers from Acer, Dell, HP, Lenovo, Panasonic, Samsung and Toshiba. Wave Mobility Pro — Tablet Edition (Windows 8) SED’s are the safest, fastest and most cost effective way to protect sensitive data resting on your endpoints. Wave solutions deliver drive initialisation, user management, drive locking, user recovery and crypto erase for all OPAL-based, proprietary and solid-state SED’s. Self-Encrypted Drives (SED’s) Windows 8 tablets are the first generation of devices that allow full-scale computing and enterprise management of a mobile device. This is the best of both worlds for the enterprise and the user. Not only can the user do more computing and be more productive, but the enterprise can be assured that their data is secure. (Origin’s Enigma SED’s use this technology to allow seamless upgrade from a standard HDD to a fully encrypted SED)  Wave Authentication  Wave Encryption  Scrambls Enterprise Console Scrambls wins ‘Best Content Security’ - SC Magazine

Wave Software Simplified encryption and authentication software from Wave Authentication The award winning Safend Data Protection Suite provides complete endpoint data protection without compromising productivity. Each component within the Safend Data Protection Suite can be implemented stand alone or in combination and compliments your existing security infrastructure.  EMBASSY Security Centre  EMBASSY Remote Admin  Wave 802.1x Security  Wave Direct Access  VPN Certification Encryption Device Health Data Loss Protection The traditional forms of authentication are all just variations on one thing: user identification. With more and more people bringing their own devices (BYOD) to work, the Wave approach lets you confirm the identity of both user and device, which gives you a much-needed additional level of security.  ERAS for SED  Wave for BitLocker®  Safend Encryptor  Safend Protector  Wave Endpoint Monitor (WEM)  (WEM incl TPM Mgmnt, WSKS)  Safend Protector  Safend Inspector  Safend Reporter  Safend Discoverer Wave’s Safend Encryptor encrypts drives that can’t do the job themselves, and does it automatically. Your organisation may be legally required to encrypt sensitive data and while Self-encrypting hard drives are the future, many companies can’t get there overnight. Wave provides automated turn-key management for Microsoft BitLocker® Detect attacks before its too late with Wave Endpoint Monitor. Antivirus software can’t detect rootkits and other malware; The Wave alternative is to work with the Trusted Platform Modules (TPMs), or security chips, embedded in your devices, which can alert you to a problem before you even know it exists. Wave Systems are part of the TCG Group

Chameleon Like a Key for your computer, lock your important files away with Chameleon Unlimited Encrypted Data The Chameleon is not a flash storage drive, like a key for your computer, the Chameleon protects your information with full AES-256 encryption, the same standard used by the US government and many Fortune 500 companies. Plug in the Chameleon to access your files. Unplug it to secure them. No passwords to remember or hide. The Chameleon guards your data from key- loggers, malware, and hackers even if Windows is not password protected.  Full AES-256 Encryption  All data stays in the PC  Automatically Encrypt * Specific models only Key Management Chameleon Keys are available for single users (Personal) or for larger scale deployment with Chameleon Pro. Chameleon Pro includes two types of devices: Masters and Users. Users devices provide all of the core Chameleon security features (encrypted drives, individual file encryption, etc.). Master devices offer the same features in addition to being able to manage Users. A Master device can be used to initiate a migration process to retire a User device or migrate the old User key to a new User key.

Independence Key Keep your data safe on your PC and Cloud Maximum Security, Total Freedom Keep your data safe on your PC and Cloud. Safely share all kind of data and information with friends, colleagues, relatives etc. thanks to hardware association with other users. Enjoy fast and encrypted backups by simply using the product’s USB host. Take advantage of the revolutionary Security Cap, that enables total information recovery in case of theft, loss or amnesia. Associate with other users! Create your own private and restricted network. You may share any kind of restricted information, even through unsafe channels, without worrying about other people intercepting your data. You can perform the association both physically and remotely with a few clicks and you will be protected without slow and boring VPNs Cloud Protection The use of Cloud services, such as those provided by Dropbox, Amazon, Sugarsync, Wuala, Skydrive, etc. is made totally safe and protected. You can create an entirely encrypted disk that synchronizes by differences with your Cloud space, which means synchronizing only what you modify for a maximum saving in bandwidth and execution times. Obviously, you can also upload single encrypted files. A completely different world for safe Cloud usage! : Association & Sharing  Security Cap  Secure Cloud Data  Association & Sharing  Easy & Fast  Pass-Through

For more information speak to your account manager or visit Origin Storage Limited 2-3 The Rutherford Centre Basingstoke Hampshire RG24 8PB T E. Thank You for your time Why not read our full product guide online at or request a free copy by ing us at Product Guide 2013