Imation Defender Collection

1,179 views
1,119 views

Published on

Published in: Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
1,179
On SlideShare
0
From Embeds
0
Number of Embeds
4
Actions
Shares
0
Downloads
30
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide
  • Keith, is it OK to add Encryptx here? We added it since Imation’s been talking about it openly.
  • Finance/Banking Data Breach Laws – 45 States FTC Red Flag Statutes Enforcement delayed until June 1, 2010 All organizations subject to the legislation must develop and implement a formal, written and revisable "Identity Theft Prevention Program" (Program) to detect, prevent and mitigate identity theft All financial institutions (a state or national bank, a state or federal savings and loan association, a mutual savings bank, a state or federal credit union, or any other entity that holds a “transaction account” belonging to a consumer) Solutions include encryption and multiple-factor authentication Healthcare HITECH ACT of 2009 - Mandatory new regulatory requirements Encryption required on all DAR devices for providers and business associates Feb. 2010 Must meet NIST standards Public notification for an unsecured data breach of > 500 individuals Civil and federal penalties but safe harbor for encrypted data Patient right to receive a copy of records electronically 15 million in Healthcare, 60% touch Patient Healthcare Information
  • Imation Defender Collection

    1. 1. DEFENDER COLLECTION INTRODUCTION April 22, 2010
    2. 2. TABLE OF CONTENTS Introduction Market Situation Defender Portfolio Summary Portfolio Details Q & A 03 07 14 23 32
    3. 3. INTRODUCTION
    4. 4. PRESENTERS Keith G. Schwartz Director of Global Strategic Growth and Public Sector Jason J. Elles Imation Global Brand Manager
    5. 5. KEY TAKEAWAYS <ul><li>Need for data-at-rest security solutions is rapidly growing </li></ul><ul><li>As the data storage industry leader, Imation is uniquely positioned to extend its offerings into secure storage solutions </li></ul><ul><li>Our new secure data storage product portfolio: </li></ul><ul><ul><li>Meets the most advanced global data encryption standards </li></ul></ul><ul><ul><li>Will be industry’s broadest </li></ul></ul><ul><ul><li>Offers solutions from enterprise to personal use </li></ul></ul>
    6. 6. IMATION CORP OVERVIEW <ul><li>Leading global marketer and developer of branded products that enable people to store, protect and enrich their experiences with digital information </li></ul><ul><li>Technology leadership, global distribution reach, and customer relationships make us a preferred partner for leading companies worldwide </li></ul><ul><li>Broad portfolio of data storage products, consumer electronics and accessories </li></ul><ul><li>Global market share leader in recordable optical media and data storage tape </li></ul><ul><li>’ 09 revenue $1.65 billion, >1,200 employees, serving more than 100 countries </li></ul>
    7. 7. MARKET SITUATION
    8. 8. MARKET SITUATION - SUMMARY DATA GROWTH The growth of digital information has rapidly surpassed expectations INCREASED DATA MOBILITY The importance of data has increased its access and mobility requirements making it more difficult to secure and protect INCREASED DATA BREACHES As data and its mobility grow, the amount of data breaches and data exposure has also grown REGULATIONS INCREASING Increased data exposure has resulted in increased regulations and reporting requirements globally COST OF DATA BREACHES GROWS Increased reporting requirements and increased data breaches results in increased breach costs 1 Source: IDC – The Diverse and Exploding Universe – March 2008 2 Source: Identity Theft Resource Center – 2009 Data Breach Stats January 6, 2010 3 Source: Ponemon Institute – Fourth Annual U.S. Cost of Data Breach Study January 2009 1 U.S. 2009 > 220 Million Records Exposed 2 > 498 Breaches 2 U.S. 2009 $6.6 Million 3 Average org. cost of data breach over 4 years $202 per record 3
    9. 9. DATA GROWTH By 2011, the digital universe will be 10 times the size it was in 2006 Approximately 70% of the digital universe is created by individuals, but enterprises are responsible for the security, privacy, reliability and compliance of 85% Source: IDC – The Diverse and Exploding Universe – March 2008
    10. 10. INCREASED DATA MOBILITY 75% of the U.S. Workforce will be Mobile by 2011 The portable data defense solutions market is growing at 35% Source: IDC – January 2008
    11. 11. INCREASED DATA BREACHES In 2009, U.S. companies experienced 498 data breaches exposing 222,477,043 records 35% of the records breached were in the government/military segment And that’s just reported breaches! Source: Identity Theft Resource Center – 2009 Data Breach Stats January 6, 2010 Govt./ Military
    12. 12. REGULATIONS INCREASING <ul><li>40% of the WW Digital Universe will be Subject to Security in 2010 </li></ul><ul><li>20% of the WW Digital Universe will be Subject to Compliance/Regulations in 2010 </li></ul><ul><li>Data Breach Reporting Laws in 45 States </li></ul>Source: Scott&Scottllp – State Data Breach Notification Laws - October 2009
    13. 13. COST OF DATA BREACH GROWS A verage cost per record exposed grows to $202 Average cost per data breach grows to $6,655,758 Source: Ponemon Institute – Fourth Annual U.S. Cost of Data Breach Study January 2009
    14. 14. PORTFOLIO SUMMARY
    15. 15. A BETTER MODEL <ul><li>Most offerings come from companies focused on either Storage or Security . </li></ul><ul><li>Imation has supplemented its foundation as a storage company with key partnerships in security to create a broad, unique, secure storage Defender Collection portfolio </li></ul>+
    16. 16. DEFENDER COLLECTION: A Natural Extension <ul><li>DataGuard rf™ Tape Tracking System </li></ul><ul><ul><li>Enhanced tape-location tracking system </li></ul></ul><ul><li>DataGuard Transport and Storage Case </li></ul><ul><ul><li>Enhanced physical protection for tape </li></ul></ul><ul><ul><li>GPS solution available in Europe </li></ul></ul><ul><li>Imation Secure Scan </li></ul><ul><ul><li>Allows data center managers to secure existing tape libraries </li></ul></ul><ul><ul><li>Only LTO scanning product that locks tape cartridges for in-transit protection </li></ul></ul>
    17. 17. <ul><li>Physical Security </li></ul><ul><li>Encryption </li></ul><ul><li>Authentication </li></ul><ul><li>Malware Protection </li></ul><ul><li>Management </li></ul>OUR SECURITY ELEMENTS
    18. 18. FIPS BASICS <ul><li>The Federal Information Processing Standardization (FIPS) 140-2 U.S. government security standard that specifies requirements for cryptography modules </li></ul><ul><li>FIPS is required by law for U.S. government purchases </li></ul><ul><li>Strictly enforced in Canada </li></ul><ul><li>Gaining international recognition in Asia and Europe </li></ul><ul><li>Being adopted within regulated industries (e.g. Financial, Healthcare) </li></ul>FIPS 140-2 Level 1 The lowest level, imposes very limited requirements; loosely, all components must be &quot;production-grade&quot; and various egregious kinds of insecurity must be absent FIPS 140-2 Level 3 Adds requirements for physical tamper-resistance and identity-based authentication, and for a physical or logical separation between the interfaces by which &quot;critical security parameters&quot; enter and leave the module, and its other interfaces FIPS 140-2 Level 2 Adds requirements for physical tamper-evidence and role-based authentication. FIPS 140-2 Level 4 Makes the physical security requirements more stringent, and requires robustness against environmental attacks . Level 4 is currently not being utilized in the market Description of FIPS 140-2 Four Levels
    19. 19. OUR DIFFERENTIATION <ul><li>Broadest Industry Portfolio: </li></ul><ul><ul><li>Optical Products - CD/DVD </li></ul></ul><ul><ul><li>USB Flash Drives </li></ul></ul><ul><ul><li>External Hard Disk Drives </li></ul></ul><ul><ul><li>Management Software </li></ul></ul><ul><li>Global Government-Validated Encryption </li></ul><ul><li>Multiple Authentication Methods </li></ul><ul><ul><li>Password (hardware rules) </li></ul></ul><ul><ul><li>Biometric + Password </li></ul></ul><ul><ul><li>CAC/PIV + Biometric (3-factor) </li></ul></ul><ul><li>Multi-user Solutions </li></ul>
    20. 20. TARGET MARKETS <ul><li>Global Governments </li></ul><ul><li>Unites States </li></ul><ul><li>Canada </li></ul><ul><li>European </li></ul><ul><li>APAC & Japan </li></ul><ul><li>Military & Intelligence </li></ul><ul><li>Department of Defense </li></ul><ul><li>Global Military Organizations </li></ul><ul><li>Global Intelligence Community </li></ul><ul><li>Enterprise/SMB Customers </li></ul><ul><li>Banking/Financial </li></ul><ul><li>Medical/Healthcare </li></ul><ul><li>Law Firms </li></ul><ul><li>Other Regulated Industries </li></ul>
    21. 21. PORTFOLIO SUMMARY SOHO/SMB Consumer Enterprise Large Enterprise Government/Financial Services TARGET MARKETS Secure Storage Managed Secure Storage Managed Secure Storage & Strong Authentications Managed Secure Storage & Strong Authentications with SmartCard FUNCTIONALITY Defender F100 & F150 Features: FIPS 140-2 L3 Cap design Defender F50 Features: FIPS 140-2 L1 Pivot design Defender H100 & H200 +Bio Features: FIPS 140-2 L3 Defender F200 +Bio Features: FIPS 140-2 L3 Defender Optical Features: FIPS 140-2 L1 Available: May ‘10 Available: May ‘10 Available: June ‘10 Available: May/June ‘10 Available: June ‘10
    22. 22. SECURE PORTABLE STORAGE Defender F50 Pivot Flash Drive Defender F100 Flash Drive Defender F150 Flash Drive Defender F200 Biometric Flash Drive Defender H100 Hard Drive Defender H200 Biometric Hard Drive Defender Optical Media ● ● ● ● ● 256-bit AES Hardware Encryption Password Authentication Biometric Authentication Multiple User Accounts ● ● ● ● ● ● ● ● ● ● ● ● ● ● Optional Central Management ● ● ● ● ● ● ● 256-bit AES Software Encryption ● ●
    23. 23. PORTFOLIO DETAILS
    24. 24. DEFENDER OPTICAL <ul><li>Key Features: </li></ul><ul><li>FIPS 140-2 Level 1 Validated </li></ul><ul><li>AES 256-bit Software Encryption </li></ul><ul><li>Integrated Password Recovery Option </li></ul><ul><li>Printable Formats: CD-R, DVD-R, BD-R </li></ul><ul><li>Two-year Limited Warranty </li></ul>Availability: March 2010 (OEM Branded) May/June 2010 (Imation Branded) Suggested Price $2.10 - $7.50
    25. 25. DEFENDER F50 <ul><li>Key Features: </li></ul><ul><li>FIPS 140-2 Level 1 Validated </li></ul><ul><li>AES 256-bit Software Encryption </li></ul><ul><li>One-factor Authentication </li></ul><ul><li>Pivot Design – never lose cap </li></ul><ul><li>Capacities: 2GB, 4GB, 8GB, 16GB </li></ul><ul><li>Five-year Limited Warranty </li></ul><ul><li>Optional </li></ul><ul><li>Central Management Software </li></ul>Availability: April 2010 Suggested Price TBD
    26. 26. DEFENDER F100 & F150 Availability: April 2010 Suggested Price $54.00 - $299.00 Defender F150 Metal Enclosure Defender F100 Plastic Enclosure <ul><li>Key Features: </li></ul><ul><li>FIPS 140-2 Level 3 Validated </li></ul><ul><li>AES 256-bit Hardware Encryption </li></ul><ul><li>One-factor Authentication </li></ul><ul><li>Tamper-resistant, Waterproof and Dustproof Plastic or Metal Enclosure </li></ul><ul><li>Capacities: 1GB, 2GB, 4GB, 8GB, 16GB, 32GB </li></ul><ul><li>Five-year Limited Warranty </li></ul><ul><li>Optional </li></ul><ul><li>Antivirus Software </li></ul><ul><li>Central Management Software </li></ul>
    27. 27. DEFENDER F200 + BIO Availability: June 2010 Suggested Price $99.00 - $349.00 <ul><li>Key Features: </li></ul><ul><li>FIPS 140-2 Pending Level 3 Validation </li></ul><ul><li>AES 256-bit Hardware Encryption </li></ul><ul><li>Two-factor Authentication </li></ul><ul><li>Biometric (fingerprint) Identification </li></ul><ul><li>Tamper-resistant, Waterproof and Dustproof Metal Enclosure </li></ul><ul><li>Capacities: 1GB, 2GB, 4GB, 8GB, 16GB, 32GB </li></ul><ul><li>Five-year Limited Warranty </li></ul><ul><li>Optional </li></ul><ul><li>Antivirus Software </li></ul><ul><li>Central Management Software </li></ul>
    28. 28. DEFENDER H100 Availability: June 2010 Suggested Price TBD <ul><li>Key Features: </li></ul><ul><li>FIPS 140-2 Pending Level 3 Validation </li></ul><ul><li>AES 256-bit Hardware Encryption </li></ul><ul><li>One-factor Authentication </li></ul><ul><li>Tamper-resistant Metal Enclosure </li></ul><ul><li>Capacities: 250GB, 320GB, 500GB </li></ul><ul><li>Five-year Limited Warranty </li></ul><ul><li>Optional </li></ul><ul><li>Antivirus Software </li></ul><ul><li>Central Management Software </li></ul>
    29. 29. DEFENDER H200 + Bio Availability: June 2010 Suggested Price TBD <ul><li>Key Features: </li></ul><ul><li>FIPS 140-2 Pending Level 3 Validation </li></ul><ul><li>AES 256-bit Hardware Encryption </li></ul><ul><li>Two-factor Authentication </li></ul><ul><li>Biometric (fingerprint) Identification </li></ul><ul><li>Tamper-resistant Metal Enclosure </li></ul><ul><li>Capacities: 250GB, 320GB, 500GB </li></ul><ul><li>Five-year Limited Warranty </li></ul><ul><li>Optional </li></ul><ul><li>Antivirus Software </li></ul><ul><li>Central Management Software </li></ul>
    30. 30. DEFENDER SOFTWARE SUITE <ul><li>Access Standard </li></ul><ul><li>Access Enterprise </li></ul><ul><ul><li>Security policies </li></ul></ul><ul><ul><li>Device provisioning </li></ul></ul><ul><ul><li>Custom software images </li></ul></ul><ul><ul><li>Key management (user rescue) </li></ul></ul><ul><ul><li>Administrative data recovery </li></ul></ul><ul><ul><li>Updating </li></ul></ul><ul><ul><li>Reporting and auditing </li></ul></ul><ul><ul><li>MXI, Imation, McAfee brands only </li></ul></ul><ul><li>Malware – AntiVirus Scanning </li></ul><ul><li>Access Identity </li></ul><ul><ul><li>Same as Access Enterprise but includes digital identity capabilities </li></ul></ul>
    31. 31. PORTFOLIO DIRECTION <ul><li>Defender F175 Pivot Flash Drive </li></ul><ul><li>Secure Mobile Desktop </li></ul><ul><li>Product Extension </li></ul><ul><ul><li>Secure Solid State Drives </li></ul></ul><ul><ul><li>Secure Removable Hard Disk Systems (RDX) </li></ul></ul><ul><li>Enhanced Features </li></ul><ul><ul><li>Integrating Digital Identity Capabilities </li></ul></ul><ul><ul><ul><li>RSA Soft Tokens </li></ul></ul></ul><ul><ul><ul><li>Digital Certificates </li></ul></ul></ul><ul><ul><li>Integrating SmartCard Technology </li></ul></ul>
    32. 32. KEY TAKEAWAYS <ul><li>Need for data-at-rest security solutions is rapidly growing </li></ul><ul><li>As the data storage industry leader, Imation is uniquely positioned to extend its offerings into secure storage solutions </li></ul><ul><li>Our new secure data storage product portfolio: </li></ul><ul><ul><li>Meets the most advanced global data encryption standards </li></ul></ul><ul><ul><li>Will be industry’s broadest </li></ul></ul><ul><ul><li>Offers solutions from enterprise to personal use </li></ul></ul>
    33. 33. THANK YOU Keith G. Schwartz Director of Global Strategic Growth and Public Sector Jason J. Elles Imation Global Brand Manager

    ×