100 likes | 238 Views
HD Lock for Toshiba Notebook. August 3rd, 2006. Toshiba Mobile Notebook Technology. Toshiba Security Service Menu. Secure Mobile Computing by design. Protection with Access and Data Security. Physical Protection. Data File Encryption. NB Access. Cable Locks Movement Alert*
E N D
HD Lock for Toshiba Notebook August 3rd, 2006
Toshiba Mobile Notebook Technology Toshiba Security Service Menu Secure Mobile Computing by design Protection with Access and Data Security Physical Protection Data File Encryption NB Access • Cable Locks • Movement Alert* • Chassis Durability Design HDD,* LCD* • Two-Factor USB Token • Fingerprint Authentication* • BIOS Password* • HDD Password* • Two-Factor USB Token HDD Data Encryption • Embedded TCG-compliant security chip for Data Encryption* *Available on select Toshiba notebook models
What is HD Lock Toshiba Notebooks What is HDLock for Toshiba Notebooks: • Protects notebooks and Tablet PC’s from unauthorized access to HDD data if they are unattended, lost or stolen – it is not a physical theft solution! • Uses powerful 128-Bit AES encryption algorithm and two-factor authentication. Note: AES is the U.S. Govt standard • Uses a unique USB A-Key and user defined password for log-in and HDD access. (two-factor – what you know and what you have) • Available recovery portal for lost A-Keys and passwords • Optimized for Toshiba notebooks that run Windows XP and Tablet Edition – Tecra, Portege, and Satellite • Toshiba Power Saver settings • Hibernation mode support
Target Market (Key Vertical) Target Markets: • Any Company that has mobile or remote employees with proprietary and confidential data stored on a notebook HDD • Company’s that must be in compliance to new privacy and security legislation • Health Insurance Portability and Accountability Act of 1996 (HIPAA) • Sarbanes-Oxley Financial and Accounting Disclosure Information Act of 2002 • State and local privacy regulations for the protection and permitted disclosure of personal consumer data • Key Verticals: • Healthcare and Medical • Financial • HR • Legal • Government Services • Education
Why HD Lock for Toshiba Notebooks (Q&A from customers) • Why we choose USB Token type of security • IDC reported USB Token Market will grow 55.1%(CAGR) between 2003 and 2008 (has Overview PPT) • USB Token is image as Key itself • Two factor authentication such as ATM Card and Security Password are needed • Why we choose Authenex HD Lock • HD Lock is Encryption product, and not only access key to Notebook • Easy to Use & Easy to Maintain • Authenex has worked with TAIS/CSE engineer group to support Toshiba Notebook • feature such as Hibernation mode, Power Saver setting, etc. • Gartner also recommend Authenex (has Overview PPT)
Why HD Lock for Toshiba Notebooks (Q&A from customers) • If I lost Key / forgot password • You will be receiving 32 character code after you are able to answer 3 questions • You must finish registration process and create your own 3 questions right after the installation • Do I need USB Token (HD Lock) to be plugged in the Notebook all the time. • Yes and No • This is customer configuration set to change (Toshiba feature) • What is the difference between TPM and HD Lock for Toshiba Notebooks • Use HD Lock or TPM, but not both together • TPM, customer will choose which file/folder to encryptIn other word, it is difficult to manage by IS organization. • TPM will have more feature with next generation OS, Longhorn • It is true that nobody is using TPM yet (Gartner stated same thing.) • HD Lock will encrypt all data/folder except Program File & OS
Why HD Lock for Toshiba Notebooks (Q&A from customers) • What is the difference between HD Lock and Entire HDD Encryption • There are many Entire HDD company in the USA, such as PointSec, SafeBoot, WinMagic, Ultimaco, PC Guardian • Entire HDD Encryption does encrypt everything including OS.Sometimes dangerous to encrypt OS, and need to have SI know how to support • One HD Lock Token can be used with another Notebook • No, one Token support one Notebook
USB Token Market (IDC)USB Token Security growth is 55.1% in 2003-2008
Authenticate the User to the Organizationfrom Gartner Use of legacy hardware or software tokens as remote access authentication tools hasawaited an easier, lowercost replacement for many years. Mobile-oriented approachesinclude token generators that can be downloaded and run on PDAs, and the receipt ofone-time passwords (OTPs) and tokens through phones and pagers. In addition, there are vendors that will allow users to choose their authentication factorsfrom among multiple interfaces, depending on which is expedient. Examples of vendorsinclude: • Aladdin Knowledge Systems (OTP token) • Authenex (OTP token) • Entrust (OTP over SMS) • RSA Security (OTP token, OTP token on phone) • Secure Computing (OTP token)•