slide1 n.
Download
Skip this Video
Loading SlideShow in 5 Seconds..
The Cryptzone Group PowerPoint Presentation
Download Presentation
The Cryptzone Group

Loading in 2 Seconds...

play fullscreen
1 / 20

The Cryptzone Group - PowerPoint PPT Presentation


  • 103 Views
  • Uploaded on

The Cryptzone Group. Magnus Kjerrman, Vice President partners EMEA – Asia Daniel Samuelsson, Solutions Engineer . How it started?. ……………………………………. Company secrets stay secret!. What do we do ?. ……………………………………. We are technology innovators in Data Leak Prevention

loader
I am the owner, or an agent authorized to act on behalf of the owner, of the copyrighted work described.
capcha
Download Presentation

PowerPoint Slideshow about 'The Cryptzone Group' - tobias


An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.


- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript
slide1

The Cryptzone Group

Magnus Kjerrman, Vice President partners EMEA – Asia

Daniel Samuelsson, Solutions Engineer

slide2

How it started?

……………………………………..

Company secrets stay secret!

slide3

Whatdowedo?

……………………………………..

We are technology innovators in Data Leak Prevention

A company with two areas of expertise

Cryptzone – Content encryption and information securityAppgate– Security for role-based access control

We offer comprehensive range of solutions for secure information management

slide4

Where are we?

……………………………………..

We have around 500,000 end-usersacross the world.Our solutions are used daily in over30 countries.We have a extensive network of technologyand channel partners around the globe.

slide5

Itstartedwitha eMail

……………………………………..

Did you know that:

There is 1.3 billion email users according to Radicati Group. 210 billion mail is sent every day – 70% spam or virus

This means that approximately 1 million mail is sent every second

Did you know that:

There is 1.3 billion email users according to Radicati Group. 210 billion mail is sent every day – 70% spam or virus

This means that approximately 1 million mail issentevery second

slide6

Itstartedwitha eMail

……………………………………..

Did you know that:

A mail sent from a company in Norway to the insurance company IF right across the street.

Norway – USA – Germany – The Netherlands – England –Norway

slide7

It started with a eMail

……………………………………..

Did you know that:

2 billion USB flash drives was sold last year according to gadgetophilia

60% of all USB flash drives is: Lost, stolen or misplaced

Did you know that:

2 billion USB flash drives was sold last year according to gadgetophilia.

60% of all USB flash drives is: Lost, stolen or misplaced

3 USB flash drives is found at Arlanda every day!

slide8

It started with a eMail

……………………………………..

Did you know that:

2 billion USB flash drives was sold last year according to gadgetophilia

60% of all USB flash drives is: Lost, stolen or misplaced

Did you know that:

2 billion USB flash drives was sold last year according to gadgetophilia.

60% of all USB flash drives is: Lost, stolen or misplaced

Over 20 USB flash drives is found at Arlanda every week!

slide9

Ett axplock av nöjda kunder

……………………………………..

slide10

“We've looked at several solutions, but Cryptzone DLP products, with Simplicity

for installation, use and central management were certainly the most appealing for us.

Other important factors that have affected our decision is the quality of supply, support

and customer relations, where Cryptzone has strongly lived up to our demands.”

.. Peter Johansson, Information Security Manager, City of Malmö

slide11

SEP – Simple Encryption Platform

……………………………………..

Client Applications

Server

Management Console

Document Security

Global Object Synchronization:

Policies

Licenses

Shared Secrets

Encryption Keys

EPM Stealth Keys

Passwords

Templates

Standard SQL database platform

One way synchronization with directories:.

Active Directory

Lotus Domino

LDAP

Custom directory files

Basic Management:

Role based administration

User rights management

Policy design and administration

Auditing and incident reporting

Education management

Help Desk / Lost password Recovery

Intellectual Property:

EPM - Enterprise Protection Method

Resource/ License Management

DCR - Data Content Reporting

Secured

eCollaboration

Secured

eFile

……..……………………...….

Outbound Compliance

……..……………………...….

Secured

eMail

Secured

eControl

……..……………………...….

……..……………………...….

……..……………………...….

Endpoint Security

Secured

eGuard

Secured

eDisk

Secured

eUSB

Existing infrastructure integration such as Microsoft RMS and content management solutions

slide12

Two User Environments

.........................................

From Small Businesses to Large Enterprises

  • Desktop
  • Client software is installed on each desktop
  • Same Client application for Desktop & Enterprise
  • Local security policy but no centralized control
  • Perfect fit for small businesses or departments

Enterprise

  • Client software is installed on each desktop and server software is installed on the server
  • Service based platform can operate in a shared server environment
  • Management Console with Active Directory one-way synchronized infrastructure view Leverages your current investment in AD
  • Maintain Regulatory Compliance with user rights, system access configuration, and management
  • Easy enforcement of company-wide security policies
  • Intelligent SEP Client automatically reports real-time events for audit trail and log reporting for eDiscovery requirements

SEP

slide13

Secured eMail

.........................................

Secured eMail – End Point Security for eMail Encryption

Best Practice

  • Proactive management platform and intelligent client synchronizes:
    • Security policies
    • Stealth encryption keys
    • User and system access rights
    • Password & helpdesk recovery passwords
  • Intuitive interface and workflows
  • Empowerment for internal/external users
  • Audit trail of all end user actions
  • Integration with Active Directory

Security Methodology

  • System SKG Patented encryption technology
  • Strongest methodology available
    • Automatic authentication – key management
    • System generates dynamic one-time keys for each content element
  • System access protection – one password
  • FIPS certified AES256 encryption algorithm

Features

  • Regulatory Compliance – Sarbanes Oxley, GLB Act, HIPAA HITECH, FTC Red Flag Rules
  • Fully integrated into Microsoft Outlook and Lotus Notes
  • End to End messaging – virtual channel
  • Send to anyone capability – any client app or web based email
    • Receivers can download a full Reader and reply back secured for free
    • Receivers can activate a Reader Lite with zero footprint
  • Ease of use – Press “Send secured” or Send with Secured eControl policy
  • Centralized policy based email encryption
  • Archive encrypted and compressed

SEP

slide14

Secured eControl

.........................................

Integrates with Secured eMail for enforced actions

Best Practice

  • Policy Designer delivers content filtering policies to provide intelligence to the client to:
    • Remove high risk content
    • Blocks outbound content
    • Convert content to appropriate format
    • Apply content rights management
    • Automatically send to Secured eMail
  • Intuitive interface and workflows
  • Empowerment for internal/external users
  • Data at Rest Classifications
  • Audit trail of all end user actions

Security Methodology

  • Strong regular expression techniques for content filtering
  • Importation of dictionary terms and list
  • Robust content filtering techniques for multiple protocols and over 370 content types
  • Lightspeed scanning for improved performance

Features

  • Regulatory Compliance – Sarbanes Oxley, GLB Act, HIPAA HITECH, FTC Red Flag Rules
  • Always-on risk alerts for policy violations
  • 15 Pre-packaged content security policies
  • Custom creation of security policy settings and editing
  • Allow for transparent process
  • Different rules for internal and external communications
  • Educate user on Regulatory Compliance or corporate policy
  • Metadata Monitoring and Cleaning

SEP

slide15

Secured eFile

..........................................

Encrypt Network Files/Folders for automatic authentication

Best Practice

  • Proactive management platform and intelligent client synchronizes:
    • Security policies
    • Stealth encryption keys
    • User and system access rights
    • Password & helpdesk recovery passwords
  • Intuitive interface and workflows
  • Empowerment for internal/external users
  • Audit trail of all end user actions
  • Integration with Active Directory

Security Methodology

  • EPM (Enterprise Protection Method)
  • Document creator can add/remove access rights
  • Manage access to documents – Manager, Contributor and Reader levels
  • System access protection – one password
  • FIPS certified AES256 encryption algorithm

Features

  • Regulatory Compliance – Sarbanes Oxley, GLB Act, HIPAA HITECH, FTC Red Flag Rules
  • EPM Stealth Key Technology which allows Automatic authentication & Key Management
  • End users can secure data and add access rights to AD users and groups
  • Create Secured Groups that can collaborate and share secured content without passwords
  • Secured file(s)/folder(s) can be placed on any media or device including network shared drives, FTP servers, DVDs, etc.
  • Share data with customers and partners
    • Free Reader
    • Self-Extracting option
  • Recovery password and Help Desk tools
  • All secured data is automatically compressed

SEP

slide16

Secured eCollaboration

….........................................

Secure Microsoft Documents with automatic authentication

Best Practice

  • Proactive management platform and intelligent client synchronizes:
    • Security policies
    • Stealth encryption keys
    • User and system access rights
    • Password & helpdesk recovery passwords
  • Intuitive interface and workflows
  • Empowerment for internal/external users
  • Audit trail of all end user actions
  • Integration with Active Directory

Security Methodology

  • EPM (Enterprise Protection Method)
  • Document creator can add/remove access rights
  • Manage access to documents – Manager, Contributor and Reader levels
  • System access protection – one password
  • FIPS certified AES256 encryption algorithm

Features

  • Regulatory Compliance – Sarbanes Oxley, GLB Act, HIPAA HITECH, FTC Red Flag Rules
  • User work flow doesn’t change
  • Simple to use – one click encryption
  • Supports full “versioning”, “checkin”, & “checkout”
  • Document icon shown visually as encrypted
  • Secure documents can travel and rest secured on any media or device including network shared drives, FTP servers, DVDs, etc.
  • EPM Stealth Key Technology and Automatic authentication/Key management
  • End users can secure data and add access rights to AD users and groups
  • Share data with customers and partners
    • Free Reader
    • Self-Extracting option

SEP

slide17

Secured eUSB

........................................

eUSB– Encrypts ANY USB flash drive in the market today!

Best Practice

  • Proactive management platform and intelligent client synchronizes:
    • Security policies
    • Stealth encryption keys
    • User and system access rights
    • Password & helpdesk recovery passwords
  • Intuitive interface and workflows – no training
  • Audit trail of all end user actions
  • Lost flash drive – Kill Pill support
  • Integration with Active Directory

Security Methodology

  • EPM (Enterprise Protection Method)
  • FIPS certified AES256 encryption algorithm
  • Brute force protection and Automatic Data Compression up to 5:1
  • Zero Footprint Deployment
  • Enforced synchronization of portable device

Features

  • Distributed or Zero Footprint Deployment
  • Regulatory Compliance – Sarbanes Oxley, GLB Act, HIPAA HITECH, FTC Red Flag Rules
  • Security Policy – whole drive or partial encryption
  • Security Policy based enforced encryption
  • Fastest encryption – 16 GB in one minute
  • Encryption .exe is portable, use on any computer in the world – no license required!
  • Secured workflow - work in a “secured vault” – create, edit, delete
  • Unlimited Passwords
  • Help Desk Lost Password Recovery Support
  • DCR – Data Content Reporting
    • Inventory list of all secured USB flash drives & what user that owns it
    • Monitor all content on every secured USB flash drive in the organization by manufacturer
    • Automatic data audit reporting – by user, access, actions and files

SEP

slide18

Secured eDisk

….....................................

Whole Drive Encryption – Enterprise Management

Best Practice

  • Proactive management platform and intelligent client synchronizes:
    • Security policies
    • Encryption keys
    • User and system access rights
    • Password & helpdesk recovery passwords
  • Single Sign-on to Windows – ‘User ID-Password’
  • Pre-Boot Authentication to OS
  • Two-Factor Authentication
  • Multiple User Authentication
  • Integrated and managed through AD/ADAM

Security Methodology

  • Encryption Algorithms - DES, 3DES, IDEA, AES-128,AES-192, AES-256
  • Security Certifications
    • Common Criteria EAL-4
    • FIPS 140-2 Level 2 validated

Features

  • Encrypt Laptops, Desktops, and Servers
  • Single license – client or management
  • Regulatory Compliance – Sarbanes Oxley, GLB Act, HIPAA HITECH, FTC Red Flag Rules
  • Also removable media encryption - Portable Hard drives; USB drives
  • Port Control – read/write permissions
  • Supports most tokens and smart cards
  • Transparent to the user during deployment
  • No noticeable performance loss anytime
  • Hibernation support - forced authentication
  • Helpdesk challenge/response for user password recovery
  • Proven Award-Winning Solution - Five Star Review from SC Magazine
  • RapidRecovery™ Tools to recover files on non-bootable systems to ensure performance of help desk Support Level Agreements (SLA)

SEP

slide19

Secured eGuard

….....................................

End Point Security - Control, monitor and log endpoint access

Best Practice

  • Proactive management platform and intelligent client synchronizes:
    • Security policies
    • Real Time notifications and alerts
    • Adoptive policy for end user request
  • Educational interface to advise end user of corporate policy
  • Monitor user environment to development control policy
  • Comprehensive control policy including up to 30 portable device types, CD/DVD, Floppy Disc
  • Control Read and Read/Write permission

Security Methodology

  • End User configuration based upon how people work:
    • Attached to the Enterprise
    • Not attached to the Enterprise – Traveling/Home
    • VPN – Remote Office/Home Office
  • Harden agent – Can’t be compromised

Features

  • Monitor mode – Review audit and log file activities and monitor the usage of portable devices & what is done by the users
    • Real time notifications
    • Comprehensive web based reporting
  • Control Mode – Actively protect enterprise data by enforcing security policy
    • Online (Enterprise) offline, or VPN
    • Adaptive policy based on location
    • Control access to portable devices and control read/write permissions per a specific device or media, class level, or vendor
    • Control read and write rights
    • Customize client notifications
    • Content filtering and regular expression
    • File size and file type content restriction
    • Removable storage file backup

SEP