Cifrado de Datos - PGP Corporation


Published on

Presentación de Alvaro Freyre de PGP en Technology Day 2010, el 16 de marzo. San José, Costa Rica.

Published in: Technology
  • Be the first to comment

  • Be the first to like this

No Downloads
Total views
On SlideShare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide
  • Solutions fall into 3 categoriesData at Rest:WDEComprehensive disk encryption for securing all files on desktops, laptops, or removable mediaMobile computers emerging as the industry standard but the portable nature of these devices increases the possibility of loss or theftWDE Locks down the entire contents of a laptop, desktop, external drive, or USB flash drive, including boot sectors, system, and swap files. Avaiable for mac osxVery transparent to the userNetshare:NetShare enables teams to securely share documents on file serversAutomatically and transparently encrypts the files for fine-grained group accessWhy?This approach ensures that only authorized users can read or modify filesfulfill partner and regulatory requirements for information partitioning and securityData in MotionDTEIt enables organizations to automaticallysecure email communications from the sender’s email client to the recipient’s—and at all points in between—Encryption is automatic and transparently enforced based on user- or corporate-defined policies MobileNot only is data at risk on desktops/laptops and usb devices, but the data used by a mobile device or in its removable storage card may contain intellectual property or customers’ personal data.PGP also has data encryption for smartphonesPGP Mobile can encrypt individual files, entire data volumes, archives, or directoriesPGP Mobile supports the following smartphone operatingsystems: Windows Mobile 5 Pocket PC Phone Edition andWindows Mobile 6 ProfessionalPGP for Blackberry also encryptions emailGateway Email: which encrypts data at the gateway…. and ensures data is protected from unauthorized access in transit over the public Internet and at rest on a recipient’s mail server. Allows you deliver messages securely to external users that lack an email encryption solutionProvides multiple, flexible secure delivery options for secure Web-mail using PGP Universal Web Messenger, encrypted PDF messages using PDF Messenger, and standards-based OpenPGP and S/MIME message formats. Data in UseCommand Lineprovides a new set of software tools for organizations that need to encrypt large amounts of batch information or secure backup processesenables users to insert encryption and digital-signing functionality into existing automation scripts to ensure information is transmitted, stored, or backed up using strong PGP encryption.
  • Cifrado de Datos - PGP Corporation

    1. 1. Technology DayCosta Rica<br />PGP Corporation<br />Alvaro FreyreRegional Manager, Latin America<br />March 2010<br />
    2. 2. ¿Cuánto vale su identidad?<br />“La identidad de Andrea fue robada, pero se la devolvieron”<br />
    3. 3. La creciente amenaza sobre el correo electrónico.<br />2 millones / segundo.<br />541 millones confían en el correo electrónico para negocios.<br />Usuarios corporativos envian reciben promedio 133 / dia.<br />36% compañías no tienen políticas de seguridad sobre el correo o la mensajería instantanea.<br />CORREO ELECTRONICO = CARTA POSTAL<br />Sources: Radicati Group, Osterman Research<br />
    4. 4. Reglas Globales & Regionales<br />Regulaciones Globales<br />PCI DSS<br />Basel II<br />Sarbanes Oxley<br />Requerimientos Únicos por País<br />CO Circular 52<br />VE Normativa Bancaria<br />EEUU CASB 1386<br />¿Conocen sus Regulaciones Locales?<br />
    5. 5. PCI DSS<br />12 REGLAS<br /># 3: Proteger datos almacenados<br /># 4: Encriptar comunicaciones de información sensible por la red pública<br /># 7: Restringir el acceso a la información en base a la “Necesidad de Saber<br />Whitepaper PGP : Requerimientos para cumplir con “Payment Card Industry Data Security Standard” (PCI DSS)<br />
    6. 6. Forrester Research<br />El cambio a la seguridad céntrica en los datos<br />La propuesta de valor de la plataforma<br />
    7. 7. 7<br />Market Drivers<br />Cost of Data Breach<br />Data breach and risk management<br />Compliance<br />=<br /><ul><li>Costs grew to $204/record or $6.7m per breach
    8. 8. Lost business now accounts for 69% of breach losses</li></ul>=<br />Fourth annual report by The Ponemon Institute© & PGP Corporation (Feb 2010)<br />Where is your data in the physical world?<br />Sensitive Data Everywhere <br />Increasing broad distribution of data, driven by mobile devices and widely available broadband<br />=<br />USB Drives<br />Laptops<br />Smart Phones<br />Where is your data in the cloud?<br />Emergence of cloud computing and centralized data centers expand data distribution beyond the physical world<br />=<br />Cloud Provider Data Centers<br />Google Docs<br />Backup<br />
    9. 9. Una aproximación más estratégica <br />Instalar<br />Distribuir<br />Configurar<br />Monitorear<br />Integración<br />Política<br />Enrolamiento<br />Entrenamiento<br /><ul><li>Gestión de cambios
    10. 10. Hardware
    11. 11. Llaves de configuración
    12. 12. Clustering
    13. 13. Redundancia
    14. 14. Enrolamiento interno
    15. 15. Enrolamiento externo
    16. 16. Distribución del instalador
    17. 17. LDAP
    18. 18. Configuración para recuperación
    19. 19. Perfiles de usuarios
    20. 20. Logging
    21. 21. SNMP
    22. 22. Entrenamiento de usuarios
    23. 23. Entrenamiento del administrador
    24. 24. Entrenamiento de la Mesa de Ayuda
    25. 25. Soporte del Fábrica
    26. 26. Configuración de políticas</li></ul>Costo, Esfuerzo y Tiempo ($)<br />
    27. 27. Una aproximación más estratégica<br />Apl #1<br />Install<br />Install<br />Install<br />Install<br />Rollout<br />Rollout<br />Rollout<br />Rollout<br />Configure<br />Configure<br />Configure<br />Configure<br />Monitoring<br />Integration<br />Monitoring<br />Integration<br />Monitoring<br />Integration<br />Monitoring<br />Integration<br />Apl #2<br />Policy<br />Policy<br />Policy<br />Policy<br />Apl #4<br />Apl #3<br />Apl #3<br />Enrollment<br />Enrollment<br />Enrollment<br />Enrollment<br />Apl #2<br />Training<br />Training<br />Training<br />Training<br />Apl #1<br />Apl #4<br />Instalar una sola vez<br />Costo, Esfuerzo y Tiempo ($)<br />
    28. 28. 10<br />Productos Independientes<br />Acelerando el Tiempo de Instalación<br />Tiempo<br />Para<br />Instalar<br />PGP®<br />Encryption<br />Platform<br />1era2da 3era4ta5ta<br /># de Aplicaciones Instaladas<br />
    29. 29. 11<br />Las Soluciones de PGP<br />Datos en uso. Automatización y gestión<br />Datos en <br />Tránsito<br />Datos almacenados<br />PGP® Whole Disk Encryption (Full Disk)<br />PGP® Netshare<br />PGP® Endpoint<br />PGP® Desktop Email<br />PGP® Mobile<br />PGP Universal™ Gateway Email<br />PGP® PDF Messenger<br />PGP® Support Package for Blackberry®<br />PGP® Command Line<br />PGP® Software Development Kit<br />PGP Universal™ Server<br />
    30. 30. Preguntas <br />?Porque?<br />?Cuantas Laptops tienen?<br />?Executivos?<br />?Presupuesto?<br />?Evaluation? <br />?Outsourcing?<br />?Blackberries? <br />?Que pasa si no hacen nada?<br />
    31. 31. 13<br />Customer Case Studies<br /><ul><li>Citibank
    32. 32. Barclays
    33. 33. Intel
    34. 34. IBM
    35. 35. Microsoft
    36. 36. HSBC
    37. 37. Gob Colombia
    38. 38. GobMexico
    39. 39. Grupo AVAL
    40. 40. H & R Block
    41. 41. Triple S</li></li></ul><li>Trusted Data Protection PGP Products<br />Identity/Authentication<br /><ul><li>Deep capability from Chosen Acquisition
    42. 42. SSL
    43. 43. Root Certificates
    44. 44. Private Clouds
    45. 45. PKI as a Service (PKI-aaS)</li></ul> Encryption<br /><ul><li>Whole Disc Encryption
    46. 46. Email Encryption (desktop and GW)
    47. 47. File Encryption - NetShare
    48. 48. Mobile; Endpoint & Portable (USB)
    49. 49. Command Line (automation)</li></ul>IntegratedPolicy Layer<br />Our full compliment of Trust Models <br /><ul><li>Our Broad Encryption Solutions
    50. 50. Open Key Management Capabilities
    51. 51. Extensive policy, management and provisioning capabilities of our universal server
    52. 52. Leveraging content awareness through partnerships
    53. 53. TRUSTED DATA PROTECTION</li></ul>POLICY ENGINE<br />Data<br /> Content Awareness<br /><ul><li>Broad partnerships with DLP vendors
    54. 54. Discovery
    55. 55. Content Inspection
    56. 56. Classification
    57. 57. Context
    58. 58. “Open DLP Framework”
    59. 59. Policy Management</li></ul>Key Management<br /><ul><li>Large scale provisioning and encryption management platform
    60. 60. Key Management  Open Key Management</li></ul>14<br />
    61. 61. 15<br />Customer Revenue Contribution over Time<br /><ul><li>Our Broad Solutions drive increasing revenue streams as customer data protection strategies evolve – Identity solutions and hybrid delivery models increase these revenue streams
    62. 62. Universal Server expands customer ability to scale PGP deployments broadly across enterprise</li></li></ul><li>16<br />World’s Largest Company Singularly Focused on Trusted Data Protection<br />POLICY ENGINE<br />Data<br />Q&A<br />Thank You<br />16<br />