1 / 20

The Cryptzone Group

The Cryptzone Group. Magnus Kjerrman, Vice President partners EMEA – Asia Daniel Samuelsson, Solutions Engineer . How it started?. ……………………………………. Company secrets stay secret!. What do we do ?. ……………………………………. We are technology innovators in Data Leak Prevention

tobias
Download Presentation

The Cryptzone Group

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. The Cryptzone Group Magnus Kjerrman, Vice President partners EMEA – Asia Daniel Samuelsson, Solutions Engineer

  2. How it started? …………………………………….. Company secrets stay secret!

  3. Whatdowedo? …………………………………….. We are technology innovators in Data Leak Prevention A company with two areas of expertise Cryptzone – Content encryption and information securityAppgate– Security for role-based access control We offer comprehensive range of solutions for secure information management

  4. Where are we? …………………………………….. We have around 500,000 end-usersacross the world.Our solutions are used daily in over30 countries.We have a extensive network of technologyand channel partners around the globe.

  5. Itstartedwitha eMail …………………………………….. Did you know that: There is 1.3 billion email users according to Radicati Group. 210 billion mail is sent every day – 70% spam or virus This means that approximately 1 million mail is sent every second Did you know that: There is 1.3 billion email users according to Radicati Group. 210 billion mail is sent every day – 70% spam or virus This means that approximately 1 million mail issentevery second

  6. Itstartedwitha eMail …………………………………….. Did you know that: A mail sent from a company in Norway to the insurance company IF right across the street. Norway – USA – Germany – The Netherlands – England –Norway

  7. It started with a eMail …………………………………….. Did you know that: 2 billion USB flash drives was sold last year according to gadgetophilia 60% of all USB flash drives is: Lost, stolen or misplaced Did you know that: 2 billion USB flash drives was sold last year according to gadgetophilia. 60% of all USB flash drives is: Lost, stolen or misplaced 3 USB flash drives is found at Arlanda every day!

  8. It started with a eMail …………………………………….. Did you know that: 2 billion USB flash drives was sold last year according to gadgetophilia 60% of all USB flash drives is: Lost, stolen or misplaced Did you know that: 2 billion USB flash drives was sold last year according to gadgetophilia. 60% of all USB flash drives is: Lost, stolen or misplaced Over 20 USB flash drives is found at Arlanda every week!

  9. Ett axplock av nöjda kunder ……………………………………..

  10. “We've looked at several solutions, but Cryptzone DLP products, with Simplicity for installation, use and central management were certainly the most appealing for us. Other important factors that have affected our decision is the quality of supply, support and customer relations, where Cryptzone has strongly lived up to our demands.” .. Peter Johansson, Information Security Manager, City of Malmö

  11. SEP – Simple Encryption Platform …………………………………….. Client Applications Server Management Console Document Security Global Object Synchronization: Policies Licenses Shared Secrets Encryption Keys EPM Stealth Keys Passwords Templates Standard SQL database platform One way synchronization with directories:. Active Directory Lotus Domino LDAP Custom directory files Basic Management: Role based administration User rights management Policy design and administration Auditing and incident reporting Education management Help Desk / Lost password Recovery Intellectual Property: EPM - Enterprise Protection Method Resource/ License Management DCR - Data Content Reporting Secured eCollaboration Secured eFile ……..……………………...…. Outbound Compliance ……..……………………...…. Secured eMail Secured eControl ……..……………………...…. ……..……………………...…. ……..……………………...…. Endpoint Security Secured eGuard Secured eDisk Secured eUSB Existing infrastructure integration such as Microsoft RMS and content management solutions

  12. Two User Environments ......................................... From Small Businesses to Large Enterprises • Desktop • Client software is installed on each desktop • Same Client application for Desktop & Enterprise • Local security policy but no centralized control • Perfect fit for small businesses or departments Enterprise • Client software is installed on each desktop and server software is installed on the server • Service based platform can operate in a shared server environment • Management Console with Active Directory one-way synchronized infrastructure view Leverages your current investment in AD • Maintain Regulatory Compliance with user rights, system access configuration, and management • Easy enforcement of company-wide security policies • Intelligent SEP Client automatically reports real-time events for audit trail and log reporting for eDiscovery requirements SEP

  13. Secured eMail ......................................... Secured eMail – End Point Security for eMail Encryption Best Practice • Proactive management platform and intelligent client synchronizes: • Security policies • Stealth encryption keys • User and system access rights • Password & helpdesk recovery passwords • Intuitive interface and workflows • Empowerment for internal/external users • Audit trail of all end user actions • Integration with Active Directory Security Methodology • System SKG Patented encryption technology • Strongest methodology available • Automatic authentication – key management • System generates dynamic one-time keys for each content element • System access protection – one password • FIPS certified AES256 encryption algorithm Features • Regulatory Compliance – Sarbanes Oxley, GLB Act, HIPAA HITECH, FTC Red Flag Rules • Fully integrated into Microsoft Outlook and Lotus Notes • End to End messaging – virtual channel • Send to anyone capability – any client app or web based email • Receivers can download a full Reader and reply back secured for free • Receivers can activate a Reader Lite with zero footprint • Ease of use – Press “Send secured” or Send with Secured eControl policy • Centralized policy based email encryption • Archive encrypted and compressed SEP

  14. Secured eControl ......................................... Integrates with Secured eMail for enforced actions Best Practice • Policy Designer delivers content filtering policies to provide intelligence to the client to: • Remove high risk content • Blocks outbound content • Convert content to appropriate format • Apply content rights management • Automatically send to Secured eMail • Intuitive interface and workflows • Empowerment for internal/external users • Data at Rest Classifications • Audit trail of all end user actions Security Methodology • Strong regular expression techniques for content filtering • Importation of dictionary terms and list • Robust content filtering techniques for multiple protocols and over 370 content types • Lightspeed scanning for improved performance Features • Regulatory Compliance – Sarbanes Oxley, GLB Act, HIPAA HITECH, FTC Red Flag Rules • Always-on risk alerts for policy violations • 15 Pre-packaged content security policies • Custom creation of security policy settings and editing • Allow for transparent process • Different rules for internal and external communications • Educate user on Regulatory Compliance or corporate policy • Metadata Monitoring and Cleaning SEP

  15. Secured eFile .......................................... Encrypt Network Files/Folders for automatic authentication Best Practice • Proactive management platform and intelligent client synchronizes: • Security policies • Stealth encryption keys • User and system access rights • Password & helpdesk recovery passwords • Intuitive interface and workflows • Empowerment for internal/external users • Audit trail of all end user actions • Integration with Active Directory Security Methodology • EPM (Enterprise Protection Method) • Document creator can add/remove access rights • Manage access to documents – Manager, Contributor and Reader levels • System access protection – one password • FIPS certified AES256 encryption algorithm Features • Regulatory Compliance – Sarbanes Oxley, GLB Act, HIPAA HITECH, FTC Red Flag Rules • EPM Stealth Key Technology which allows Automatic authentication & Key Management • End users can secure data and add access rights to AD users and groups • Create Secured Groups that can collaborate and share secured content without passwords • Secured file(s)/folder(s) can be placed on any media or device including network shared drives, FTP servers, DVDs, etc. • Share data with customers and partners • Free Reader • Self-Extracting option • Recovery password and Help Desk tools • All secured data is automatically compressed SEP

  16. Secured eCollaboration …......................................... Secure Microsoft Documents with automatic authentication Best Practice • Proactive management platform and intelligent client synchronizes: • Security policies • Stealth encryption keys • User and system access rights • Password & helpdesk recovery passwords • Intuitive interface and workflows • Empowerment for internal/external users • Audit trail of all end user actions • Integration with Active Directory Security Methodology • EPM (Enterprise Protection Method) • Document creator can add/remove access rights • Manage access to documents – Manager, Contributor and Reader levels • System access protection – one password • FIPS certified AES256 encryption algorithm Features • Regulatory Compliance – Sarbanes Oxley, GLB Act, HIPAA HITECH, FTC Red Flag Rules • User work flow doesn’t change • Simple to use – one click encryption • Supports full “versioning”, “checkin”, & “checkout” • Document icon shown visually as encrypted • Secure documents can travel and rest secured on any media or device including network shared drives, FTP servers, DVDs, etc. • EPM Stealth Key Technology and Automatic authentication/Key management • End users can secure data and add access rights to AD users and groups • Share data with customers and partners • Free Reader • Self-Extracting option SEP

  17. Secured eUSB ........................................ eUSB– Encrypts ANY USB flash drive in the market today! Best Practice • Proactive management platform and intelligent client synchronizes: • Security policies • Stealth encryption keys • User and system access rights • Password & helpdesk recovery passwords • Intuitive interface and workflows – no training • Audit trail of all end user actions • Lost flash drive – Kill Pill support • Integration with Active Directory Security Methodology • EPM (Enterprise Protection Method) • FIPS certified AES256 encryption algorithm • Brute force protection and Automatic Data Compression up to 5:1 • Zero Footprint Deployment • Enforced synchronization of portable device Features • Distributed or Zero Footprint Deployment • Regulatory Compliance – Sarbanes Oxley, GLB Act, HIPAA HITECH, FTC Red Flag Rules • Security Policy – whole drive or partial encryption • Security Policy based enforced encryption • Fastest encryption – 16 GB in one minute • Encryption .exe is portable, use on any computer in the world – no license required! • Secured workflow - work in a “secured vault” – create, edit, delete • Unlimited Passwords • Help Desk Lost Password Recovery Support • DCR – Data Content Reporting • Inventory list of all secured USB flash drives & what user that owns it • Monitor all content on every secured USB flash drive in the organization by manufacturer • Automatic data audit reporting – by user, access, actions and files SEP

  18. Secured eDisk …..................................... Whole Drive Encryption – Enterprise Management Best Practice • Proactive management platform and intelligent client synchronizes: • Security policies • Encryption keys • User and system access rights • Password & helpdesk recovery passwords • Single Sign-on to Windows – ‘User ID-Password’ • Pre-Boot Authentication to OS • Two-Factor Authentication • Multiple User Authentication • Integrated and managed through AD/ADAM Security Methodology • Encryption Algorithms - DES, 3DES, IDEA, AES-128,AES-192, AES-256 • Security Certifications • Common Criteria EAL-4 • FIPS 140-2 Level 2 validated Features • Encrypt Laptops, Desktops, and Servers • Single license – client or management • Regulatory Compliance – Sarbanes Oxley, GLB Act, HIPAA HITECH, FTC Red Flag Rules • Also removable media encryption - Portable Hard drives; USB drives • Port Control – read/write permissions • Supports most tokens and smart cards • Transparent to the user during deployment • No noticeable performance loss anytime • Hibernation support - forced authentication • Helpdesk challenge/response for user password recovery • Proven Award-Winning Solution - Five Star Review from SC Magazine • RapidRecovery™ Tools to recover files on non-bootable systems to ensure performance of help desk Support Level Agreements (SLA) SEP

  19. Secured eGuard …..................................... End Point Security - Control, monitor and log endpoint access Best Practice • Proactive management platform and intelligent client synchronizes: • Security policies • Real Time notifications and alerts • Adoptive policy for end user request • Educational interface to advise end user of corporate policy • Monitor user environment to development control policy • Comprehensive control policy including up to 30 portable device types, CD/DVD, Floppy Disc • Control Read and Read/Write permission Security Methodology • End User configuration based upon how people work: • Attached to the Enterprise • Not attached to the Enterprise – Traveling/Home • VPN – Remote Office/Home Office • Harden agent – Can’t be compromised Features • Monitor mode – Review audit and log file activities and monitor the usage of portable devices & what is done by the users • Real time notifications • Comprehensive web based reporting • Control Mode – Actively protect enterprise data by enforcing security policy • Online (Enterprise) offline, or VPN • Adaptive policy based on location • Control access to portable devices and control read/write permissions per a specific device or media, class level, or vendor • Control read and write rights • Customize client notifications • Content filtering and regular expression • File size and file type content restriction • Removable storage file backup SEP

  20. www.cryptzone.com

More Related