1 / 11

Enterprise Encryption and Key Management Strategy -Vormetric

Understand the importance of a long term enterprise encryption and key management strategy over the short term fix of an ad hoc encryption to address any data security concerns. This presentation is based on the whitepaper on Enterprise Encryption from Vormetric and ESG. Register to download the whitepaper http://enterprise-encryption.vormetric.com/EMAILPTNRESGWhitepaper.html

Download Presentation

Enterprise Encryption and Key Management Strategy -Vormetric

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.


Presentation Transcript

  1. Enterprise Encryption and Key Management Strategy THE TIME IS NOW Vormetric Contact: Name: Tina Stewart Email: Tina-Stewart@vormetric.com Download ESG Whitepaper • (send traffic to a registration page on Vormetric • site for whitepaper download)

  2. Overview “ “ “ “ Large organizations need an enterprise encryption strategy. This should include central command and control, distributed policy enforcement, tiered administration, and an enterprise-class key management service. i Vormetric is the leader in enterprise encryptionandkey management. OurData Securitysolution encrypts any file, any database, any application, anywhere. In this presentation we share key insights from EGS’s whitepaper on:Enterprise Encryption and Key Management Strategy The Time Is Now, By Jon Oltsik This ESG white paper was commissioned by Vormetric, Inc. and is distributed under license from ESG.

  3. The Time is Now • Your Business Data is Everywhere and Accessed by Everyone • Ad hoc Data Security =increased risk and business exposure • Large organizations need an enterprise encryption strategy • Central Command and Control • Distributed Policy Enforcement • Tiered Administration • Enterprise-class key management service

  4. Drivers of Enterprise-Class Data Security Solutions • Regulatory Compliance State, industry and international privacy regulations require or recommend encryption for data security. • Publically Disclosed Breaches • Intellectual Property Protection 126 breaches and 1.5Million personal records reported in 2012 alone. Including well known names – Arizona State University and Zappos.com. • Advanced Persistent Threats (APTs) resulting in IP theft are forcing enterprises to aggressively respond with data encryption technologies.

  5. Top Investment: Data Encryption Which of the following security technology products/solutions has your organization purchased in response to APTs? (Percent of respondents, N=95, multiple responses accepted) 54% Data encryption technologies Web gateway for blocking suspicious URLs and web based content Application firewalls Specific technology defenses designed to detect and prevent APT attacks Database security technologies Managed security services DLP (data loss prevention) technologies New types of user authentication/access controls Endpoint white-list/black-list enforcement technologies Third-party penetration testing service from specialty firm 49% 44% 44% 43% 39% 35% 31% 24% 21% 20% 40% 0% 10% 30% 50% 60% Source: Enterprise Strategy Group,2012

  6. Data Security Growing Pains Each tool has its own administration and key management ! Source: enterprise Strategy Group, 2012

  7. Data Security Growing Pains Risk Issue Cost ! All of these issues create operational overhead and increased risk.

  8. Considerations for Enterprise Strategy • Transparent Encryption must fit into existing infrastructure and processes without altering or affecting existing systems and application. • Provides Executive Visibility • Owned by the security team CISO’s should be able to assess risk across the enterprise at all times and keep executive management informed. Key Management responsibilities must reside with specific, trained staff dedicated to this function.

  9. Key Enterprise Architectural Features 1 Central Command & Control 2 Distributed Policy Enforcement 1 2 3 Tiered Administration 4 Enterprise-class Key Management 3 4

  10. The Bigger Truth – The Time is Now. “ One of your most valuable assets, sensitive data, faces an increasing level of risk … ESG highly recommends that CISOs develop an enterprise encryption strategy as soon as possible. “ “ i 3 4 2 1 1 2 3 4 • DEFINE • the idealencryption • solution for your needs ASSESS what you have in place today • IDENTIFY • gaps in your current • implementations AUGMENT current ad hoc solutions

  11. Enterprise Encryption and Key Management Strategy Vormetric Contact: THE TIME IS NOW Tina Stewart Tina-Stewart@vormetric.com Download ESG Whitepaper @Vormetric Click - to - tweet Click - to - tweet

More Related