1 / 15

Data Security Tools

Data Security Tools. Rodney Buike IT Pro Advisor, Microsoft Canada Rodney.Buike@Microsoft.com Http://blogs.technet.com/canitpro. Facts. Laptop adoption is on the rise and expected to replace desktops 750,000 notebooks reported stolen in 2006

pierce
Download Presentation

Data Security Tools

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Data Security Tools Rodney Buike IT Pro Advisor, Microsoft Canada Rodney.Buike@Microsoft.com Http://blogs.technet.com/canitpro

  2. Facts • Laptop adoption is on the rise and expected to replace desktops • 750,000 notebooks reported stolen in 2006 • Up to 80% of corporate data stored on local drives

  3. Data intentionally compromised Thief steals asset based on value of data Loss due tocarelessness Information Protection Threats Internal threats are just as prevalent as external threats Targeted Accidental Intentional Insider access to unauthorized data Offline attack on lost/stolen laptop System disposal or repurposing without data wipe System physically lost in transit Theft of branch office server (high value and volume of data) Theft of executive or government laptop Direct attacks with specialized hardware

  4. How do I adress these issues? Security Guidance Data Encryption Toolkit Malware Removal Kit Vista Security Technologies

  5. Security Guidance

  6. Data Encryption Toolkit • The Executive Overview - business and regulatory perspective of how mobile data is at risk • The Security Analysis - in-depth review of how EFS and BitLocker address the unique risks associated with data on mobile PCs. • The Planning and Implementation Guide - how to plan for, configure, deploy, and operate EFS and BitLocker in your organization. • The Microsoft Encrypting File System Assistant - a software tool you can use to centrally control EFS settings on all your PCs

  7. EFS Assistant demo Configure and Run EFS Assistant

  8. Malware Removal Kit • Guidance for IT professionals who want information and recommendations to remove and limit malware that infects computers • Guidance on creating an incident response plan • How to determine if a system has malware • Step by step on building WinPE based clean up disk

  9. Malware Removal Kit demo Build and Run Malware Removal Tool

  10. User Account Control

  11. Designed specifically to prevent a thief who boots another Operating System or runs a hacking tool from breaking Windows file and system protections Provides data protection on your Windows client systems, even when the system is in unauthorized hands or is running a different or exploiting Operating Ssystem Uses a v1.2 TPM or USB flash drive for key storage BitLocker™ Drive Encryption BitLocker

  12. BitLocker & UAC demo Configuring Policy Settings

  13. Other Tools • GPO Accelerator • Microsoft Security Assessment Tool • Microsoft Baseline Security Analyzer 2.1 • Best Practices Analyzers • Exchange • SQL • ISA • SBS 2003

  14. Resources • http://www.microsoft.ca/security • http://blogs.technet.com/canitpro • http://blogs.technet.com/cdnitmanagers

More Related