WSO2's API Vision: Unifying Control, Empowering Developers
Does your Data have Super-Powers?
1. Do you have control of your
most sensitive data?
2. Information Security is Being Compromised…
“Take heed of Lockheed… the attackers are really smart and
their exploits are highly sophisticated” Art Coviello - RSA
3. The Rules Have Changed…Dramatically
Hacker sophistication Potential
vulnerabilities
Monetization of security breaches
Data is everywhere
A day in the life of a Company Executive… 11pm
Laptop in Hotel
6pm – catch up on
day’s work.
Phone – a few
Comment on
2pm important phone
Facebook.
Desktop – work calls and emails
8am at airport
on M&A
5am iPad – catch proposal and a
Home PC – up on emails few key emails
final iterations on the train
to Board How many times was this executive’s
presentation
information security potentially compromised?
At the end of the day, what are we trying to protect?
4. What Does Rune Information Security Do?
We don’t secure every potential vulnerability – we
secure what you care about
If it absolutely must be kept secret, we secure it
unconditionally
User-defined security, not policy-based
Empowering users to secure their most sensitive data
themselves…
• You select it, we secure it!
• Making encryption-based security easier for the user
5. User-Defined Security: 3 simple steps
1. Select the data you want to secure
2. Encrypt message
(file or folder)
3. Send encrypted message that only
selected recipients who can
un-encrypt and read
6. Unconditional Security: The Vema-Cipher Platform
Encryption for those that need security in addition
to compliance
Personal information
Business intelligence
Proprietary information
Secures your data locally or in the cloud
No matter where data is stored… You control exactly who can read
your message
Defends your data as it moves though hostile
environments
Innovative yet proven approach to data security
Standards based compliance coupled with unbreakable encryption
7. • Secure:
• Proven, unbreakable
Vernam cipher
• VC-Key™ creates a
Compliance
completely random FIPS 140-2
message – immune to
brute-force attacks
• Stops man-in-the-middle
attacks
• Compliance:
• FIPS 140-2 standards-
based encryption
Simple to Use Secure
• Simple to use: 3 steps 3 Easy Steps Vernam Cipher
• Set your audience
• Select your message or
document
• Click to encrypt or
decrypt
8. For More Information Contact Us
Rune Information Security
Rob Levey, VP North America
Phone: +1 978-996-2758
Email: robert.levey@rune.sg
Web: www.rune.sg