Self defending data webinar (feb13)
Upcoming SlideShare
Loading in...5
×
 

Self defending data webinar (feb13)

on

  • 267 views

Covata USA offers a line of security solutions that implement "self-defending data". These products include: Secure Envelopes, the Covata Server and the COvata SDK.

Covata USA offers a line of security solutions that implement "self-defending data". These products include: Secure Envelopes, the Covata Server and the COvata SDK.

Statistics

Views

Total Views
267
Views on SlideShare
262
Embed Views
5

Actions

Likes
0
Downloads
1
Comments
0

2 Embeds 5

http://www.linkedin.com 4
http://t.co 1

Accessibility

Categories

Upload Details

Uploaded via as Microsoft PowerPoint

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment

Self defending data webinar (feb13) Self defending data webinar (feb13) Presentation Transcript

  • Is Your Data “Self Defending”? Vic Winkler CTO Covata.COM Reston, Virginia Vic.Winkler@Covata.COM© Cocoon Data Holdings Limited 2012. All rights reserved.
  • Facts and Questions Problems • Networks and end-user devices are frequently hacked • This means that your information is at risk • Managing security takes expertise and that’s expensive What are you doing about it? Are you sending your sensitive information into the world, defenseless? Are you invested in heavy solutions like PKI that are expensive and have limitations?© Cocoon Data Holdings Limited 2012. All rights reserved.
  • Self Defending Data: It’s Not • Disk encryption There is a unique key for each self defending data object – versus a single key for the disk • PKI Self defending data is far simpler in concept and elegant in implementation, this translates to savings and greater agility and sharing (ad-hoc relationships are encouraged!) • Public-Private Key Cryptography Users know nothing about keys or mechanisms – the data itself handles all that But, is it real?© Cocoon Data Holdings Limited 2012. All rights reserved.
  • What is: Self Defending Data? • It doesn’t let you access it unless you meet it’s requirements • It doesn’t care if the computer or network are hacked • The originator of self defending data can specify business rules that must be met for you to access it • Every access to self defending data is audited, regardless • The originator can revoke permissions anytime …at the granularity of each recipient • It doesn’t care how many copies there are – they all behave the same way© Cocoon Data Holdings Limited 2012. All rights reserved.