Presentation is loading. Please wait.

Presentation is loading. Please wait.

SecureAge Technology and its Security Solution

Similar presentations


Presentation on theme: "SecureAge Technology and its Security Solution"— Presentation transcript:

1 SecureAge Technology and its Security Solution
December 2012

2 Contents Company Overview Solution Overview SecureAge SecureData?
SecureAge Secure SecureAge SecureFile SecureAge Management Server Secure Cloud Storage - LockCube

3 Company Overview What do we do?

4 We Secure Information Assets
Founded in 2003 to meet the unique requirements of our customers Founder 17 years of Research and Development experience since 1996 Expertise Data Encryption Cloud Data Security Security Digital Signature Core Solutions SecureData Secure SecureFile SecureAge Management Server SecureAge has its root in R&D since 1996. Vast insight to industry, trends, and technologies Always practical innovation, never too conceptual and abstract The company was started by collaborating with our customers in solution development and solving their ‘unique’ requirements Pioneering spirit right at the start Foresight to market trends and needs We continue to offer collaboration with our customers to meet their enterprise security needs Developing solutions that fix information security ‘loopholes’

5 Our Passion Develop end-to-end solutions to prevent and shield enterprises from information data breach. Our Beliefs: Information security is about protecting the information or the data. Protecting your assets anytime, anywhere. Ensuring our customers using information security blissfully. Solving information security problems by developing end-to-end solutions that prevent, protect against, and shield enterprises from information data breach We believe Information Security is about protecting the information or the data It’s great to protect the ‘safe’ that keeps the valuable assets, but we think it’s even greater if assets are protected anytime, anywhere We want to see our enterprise customers enjoy information security without being inconvenient by it

6 Our Expertise A renown security solution provider for the governments and militaries in Asia. Extensive knowledge in information security technologies. A wealth of experience in information security projects. A forerunner in the innovation of information security technology. Well known security solution provider for the Singapore government and military Deep knowledge of information security technologies Rich experience in information security projects Solutions are tested and proven robust

7 Our Credentials Government Commercial
A renown security solution provider for Asia Pacific government and military All Ministries & Statutory Board of Singapore Government Singapore Military Hong Kong Government Government Corporations in Singapore Investment Technology Temasek Holdings Regional Corporations Japan Malaysia Hong Kong Commercial

8 Solution Overview What are we good at?

9 Core Solutions SecureAge Security Solution SecureData
Secure SecureFile LockCube SecureAge Mgt Server SecureData Mitigate APT & Malware Last layer of data defense against intruders & insiders Data Breach Prevention SecureAge Security Solution

10 Why SecureAge Security Solution?
Intensively tested, reviewed and approved by the governments. Over 20,000 successful deployment across militaries and governments. Fulfill the various regulatory compliances / guidelines in US and the Asia Pacific Region. Easy to use without any user’s intervention or training. Fast and easy to configure and setup.

11 SecureAge SecureData

12 What is SecureData? SecureData Protects your data In use At rest
Creation Access Manipulation At rest Local Drive Network Drive Removable Media On cloud storage In motion Over network Over Internet SecureData

13 Basic SecureData Features
A Fully Encrypted Environment Policy & log server for centralized control PKI based support for 2FA & secure file sharing End-to-End data on-the-move encryption Policy based encryption for all storage devices Encrypt all user data & temporary files , system page file Transparent Data / File Encryption

14 The Ultimate in Application and Data Control
Automatically encrypts user data files in all storage media, at rest and on the move. SecureData Ensures only trusted application can be executed. Defines and binds data to be accessed by only authorized applications. Provides detailed logs on blocked application execution or abnormal user data access activities. Protects data from data leakage, APT and malwares.

15 3P Data Encryption Proactive Pervasive
Automatic data encryption No user involvement & training Pervasive Data stays encrypted in all storage devices No plain data anywhere Persistent Encryption at rest and on-the-move Only plain data in memory

16 3P Data Encryption Network
End-to-end Data Protection - Protects data at work, at rest and in motion. Network Hackers and insiders Cannot see your files!!

17 3P Data Encryption Network
End-to-end Data Protection - Protects data at work, at rest and in motion. Network Hackers and insiders Cannot see your files!!

18 Application Whitelisting
Integrated Defense Combine Encryption with Application Control Application Whitelisting 3P Data Encryption Application Binding Rootkit Anti-malware Disabler Zero-day Attack Complete Data Access Control

19 SecureData for Cloud Computing
Remote Desktop / Citrix in Cloud or Data Center Encrypts all user data Multiple-key support: different key for each user User key stored in smart card, USB token or soft token Secure Remote Cloud Storage Remote cloud storage for data backup or data sharing Data encrypted before leaving user machine Cloud operator has no access to user data content! Generic Cloud Computing Data encryption runs in VM that hosts the application Data files & DB are stored in network/cloud storage Data files & DB are protected in storage and over network

20 Similarities: SecureData vs Full Disk Encryption (FDE)
Data-at-rest encryption No plain data files created Block-by-Block encryption/decryption On-the-Fly Encryption / Decryption Data files, temporary files, system page files Encrypt All User Data Files on Local Disk Tweakable block cipher with AES Password or RSA key encryption Standard Cryptographic Support On-the-Fly Encryption / Decryption Data-at-rest encryption No plain data files created Block-by-Block encryption/decryption Encrypt All User Data Files on local disk Data files, temporary files, system page files Standard Cryptographic Support Tweakable block cipher with AES Password or RSA key encryption

21 Differences: SecureData vs Full Disk Encryption
Granularity FDE encrypts disk volumes SecureData encrypts individual data files, excluding OS Storage Encryption FDE only encrypts local hard disk SecureData encrypts all data files on local hard disk, removable media, rdp drives, network drives, and cloud Policy Based Data Protection FDE does not provide data level protection SecureData supports policy-based file level protection with full data access audit log End-to-End Protection FDE only provides data-at-rest encryption support SecureData ensures end-to-end encryption for data files transferred or accessed via network, with full audit logs PKI Capability FDE has limited support for PKI SecureData has full PKI support: certs from AD, LDAP, PKCS#11 support for smart card, USB token, TPM & HSM User authentication FDE uses pre-boot authentication SecureData authenticates user via PKCS#11 or profile password

22 SecureAge SecureEmail

23 What is SecureAge SecureEmail?
Signs Secure Benefits Protects ’s confidentiality. Protects ’s authenticity. Protects user’s privacy. Complies with CPTRM guidelines. Encrypts

24 Secure Email over Network
Laptop Hackers and insiders Cannot see your s!! Servers Tablet PC Network Smart Phone Desktop

25 Policy-based Security Control
Intuitive labelling. Similar to how paper documents are classified. Controls how each labelled should be handled when transmitted, stored, forwarded and replied to.

26 Policy-based Security Control
Greatest Benefit: Almost no user training is required!

27 Other Key Features Advanced Cryptographic Algorithm Support
Automated Sending Agent S/MIME Support Digital Rights Management Supports Various Platforms Smart Card and USB Token

28 Secure Email Comparison (1)
Can I use default client S/MIME solution? Yes. But … Key Management What happen when user certificate expire? How about s encrypted with old keys? How well does it support smart card & USB token? Policy Based Security Does it support labelling? Can you define security policy? Advanced Features Does it support compression? Does it support 256-bit AES or SHA-2?

29 Secure Email Comparison (2)
Why is SecureAge Secure better than PGP? Based on S/MIME Standard Interoperable with standard software with S/MIME support Support commonly available smart card & USB token Policy Based Security Support classification label Support enterprise security policy based on label Advanced Features Support compression that drastically reduce size Leverage on advanced PKI capabilities like LDAP, AD, CRL and OCSP support

30 Secure Email Comparison (3)
How does it compare with appliance solution? Appliance solutions do not provide end-to-end encryption Appliance solutions only encrypt sent to external party System admin can view all internal s Insider can sniff network traffic to obtain sensitive content s are readable in lost laptop or handheld device

31 SecureAge SecureFile

32 What is SecureAge SecureFile?
No one can tamper the document. Ensures non- repudiation. Impersonation is impossible Ensures that only the intended recipients are privy to the content. Benefits SecureFile Signs document Encrypts document

33 Key Features Chain Signing Wipe File SecureAge COM API
Allows more than one authorized user to add his/her digital signature. Chain Signing Ensures that confidential files that are erased from the computer hard disk can never be recovered. Wipe File Allows developers to add security features or build their own applications on SecureAge platform. SecureAge COM API

34 SecureAge Management Server

35 What is a SecureAge Management Server?
Centrally controls large-scale SecureAge software deployment. Centrally manages the security configurations and policies for multiple SecureAge users. Centrally manages SecureAge user’s key and certificates. Centrally manages the audit logs.

36 SecureAge Management Server Components
Key Management Server Manages and controls the creation, management, revocation, backup and recovery of digital certificates and encryption keys for multiple SecureAge users. Role-based Policy Server Configures and manages individual user’s access rights to data and application based on their functional role. Log Server Provides detailed logs of user’s data and application access activities for easy forensic investigation when unusual activities are found.

37 Flexible Key Management
Key Generation Generates and manages user’s keys. Unlimited Key History Allows access to unlimited key history so that all archive s and data can still be decrypted even if the encryption keys are renewed. Centralized Key Escrow Backs up and recovers keys and key history when the users lost their keys or left the organization.

38 Secure Cloud Storage

39 What Can LockCube Do? Scheduled Smart Backup Versioning Backup Files
Restore Files SecureDrive Share Files Direct Access

40 Back Up Any Types of Files
Back up any files securely No more worries over data loss or data leakage. Incremental Backup Back up only changes made to the files. Reduce uploading time significantly. Network

41 Restore Data Restore any files securely
Salvage all data when disaster strikes. No more worries over critical data loss or business continuity. Network

42 Secure File Sharing Share file securely with one another
Only intended recipients can decrypt the file. Network

43 Access via Mobile Devices
Access any file from your smart phone or tablet PC. Files remain protected when your smart phone or tablet PC is lost. Support Android and iOS.

44 Why LockCube? Proven Military Grade Security
Automatic file level encryption Data remains encrypted at rest Data is secured as it resides at the LockCube storage. Only user key can access. in motion Data is secured as it travels over the Internet. Hackers and Insiders Cannot see your file!! SSL/TLS Internet SSL/TLS SSL/TLS SSL/TLS SSL/TLS

45 Scalable and Affordable
Dynamic scaling of storage space. Pay only for what you use. Unlimited storage size.

46 Thank You Questions and Answers


Download ppt "SecureAge Technology and its Security Solution"

Similar presentations


Ads by Google