SlideShare a Scribd company logo
1 of 8
Do you have control of your
       most sensitive data?
Information Security is Being Compromised…

“Take heed of Lockheed… the attackers are really smart and
their exploits are highly sophisticated” Art Coviello - RSA
The Rules Have Changed…Dramatically

 Hacker sophistication                                                          Potential
                                                                                vulnerabilities
 Monetization of security breaches
 Data is everywhere

      A day in the life of a Company Executive…                                11pm
                                                                                  Laptop in Hotel
                                                             6pm                  – catch up on
                                                                                  day’s work.
                                                              Phone – a few
                                                                                  Comment on
                                            2pm               important phone
                                                                                  Facebook.
                                              Desktop – work  calls and emails
                             8am                              at airport
                                              on M&A
          5am                  iPad – catch   proposal and a
            Home PC –          up on emails   few key emails
            final iterations   on the train
            to Board                            How many times was this executive’s
            presentation
                                              information security potentially compromised?



      At the end of the day, what are we trying to protect?
What Does Rune Information Security Do?
  We don’t secure every potential vulnerability – we
  secure what you care about
  If it absolutely must be kept secret, we secure it
  unconditionally
  User-defined security, not policy-based



Empowering users to secure their most sensitive data
themselves…
   • You select it, we secure it!
   • Making encryption-based security easier for the user
User-Defined Security: 3 simple steps

1. Select the data you want to secure




                                            2. Encrypt message
                                               (file or folder)



      3. Send encrypted message that only
         selected recipients who can
         un-encrypt and read
Unconditional Security: The Vema-Cipher Platform

 Encryption for those that need security in addition
 to compliance
   Personal information
   Business intelligence
   Proprietary information
 Secures your data locally or in the cloud
   No matter where data is stored… You control exactly who can read
    your message
 Defends your data as it moves though hostile
 environments
 Innovative yet proven approach to data security
   Standards based compliance coupled with unbreakable encryption
• Secure:
    •   Proven, unbreakable
        Vernam cipher
    •   VC-Key™ creates a
                                                  Compliance
        completely random                          FIPS 140-2
        message – immune to
        brute-force attacks
    •   Stops man-in-the-middle
        attacks
• Compliance:
    •   FIPS 140-2 standards-
        based encryption
                                  Simple to Use                    Secure
• Simple to use: 3 steps           3 Easy Steps                 Vernam Cipher
    •   Set your audience
    •   Select your message or
        document
    •   Click to encrypt or
        decrypt
For More Information Contact Us
 Rune Information Security
  Rob Levey, VP North America
  Phone: +1 978-996-2758
  Email: robert.levey@rune.sg
  Web: www.rune.sg

More Related Content

Viewers also liked (6)

Hasil Survei Tim BETA-UFO ke Lokasi Crop Circle
Hasil Survei Tim BETA-UFO ke Lokasi Crop CircleHasil Survei Tim BETA-UFO ke Lokasi Crop Circle
Hasil Survei Tim BETA-UFO ke Lokasi Crop Circle
 
University of The Future 2012
University of The Future 2012University of The Future 2012
University of The Future 2012
 
Redefining Your Online Marketing Campaign
Redefining Your Online Marketing CampaignRedefining Your Online Marketing Campaign
Redefining Your Online Marketing Campaign
 
Light & Sound
Light & SoundLight & Sound
Light & Sound
 
El celre 86
El celre 86El celre 86
El celre 86
 
Soc345 lect10 rural_america1
Soc345 lect10 rural_america1Soc345 lect10 rural_america1
Soc345 lect10 rural_america1
 

Similar to Does your Data have Super-Powers?

Anti Whaling Hardening Up Your Net Presence
Anti   Whaling   Hardening Up Your Net PresenceAnti   Whaling   Hardening Up Your Net Presence
Anti Whaling Hardening Up Your Net Presence
gueste0b5fe
 
Anti Whaling Hardening Up Your Net Presence
Anti   Whaling   Hardening Up Your Net PresenceAnti   Whaling   Hardening Up Your Net Presence
Anti Whaling Hardening Up Your Net Presence
Engineers Australia
 
Rune - Empowering User-based Security
Rune  - Empowering User-based SecurityRune  - Empowering User-based Security
Rune - Empowering User-based Security
Rob Levey
 
Module5 desktop-laptop-security-b
Module5 desktop-laptop-security-bModule5 desktop-laptop-security-b
Module5 desktop-laptop-security-b
BbAOC
 
10. hddn-datalekaje-hs-01
10. hddn-datalekaje-hs-0110. hddn-datalekaje-hs-01
10. hddn-datalekaje-hs-01
Hans W. Flisnes
 
Lecture 12 -_internet_security
Lecture 12 -_internet_securityLecture 12 -_internet_security
Lecture 12 -_internet_security
Serious_SamSoul
 
OmniSpotlight 05-2014
OmniSpotlight 05-2014OmniSpotlight 05-2014
OmniSpotlight 05-2014
Anita Lösch
 
Encrytpion information security last stand
Encrytpion information security last standEncrytpion information security last stand
Encrytpion information security last stand
George Delikouras
 

Similar to Does your Data have Super-Powers? (20)

Anti Whaling Hardening Up Your Net Presence
Anti   Whaling   Hardening Up Your Net PresenceAnti   Whaling   Hardening Up Your Net Presence
Anti Whaling Hardening Up Your Net Presence
 
Anti Whaling Hardening Up Your Net Presence
Anti   Whaling   Hardening Up Your Net PresenceAnti   Whaling   Hardening Up Your Net Presence
Anti Whaling Hardening Up Your Net Presence
 
Don’t Sweat the Small Stuff – Protect What Matters Most - Interop 2014
Don’t Sweat the Small Stuff – Protect What Matters Most - Interop 2014 Don’t Sweat the Small Stuff – Protect What Matters Most - Interop 2014
Don’t Sweat the Small Stuff – Protect What Matters Most - Interop 2014
 
Homeland Security - strengthening the weakest link
Homeland Security - strengthening the weakest linkHomeland Security - strengthening the weakest link
Homeland Security - strengthening the weakest link
 
The New frontiers in Information Security
The New frontiers in Information SecurityThe New frontiers in Information Security
The New frontiers in Information Security
 
Rune - Empowering User-based Security
Rune  - Empowering User-based SecurityRune  - Empowering User-based Security
Rune - Empowering User-based Security
 
Module5 desktop-laptop-security-b
Module5 desktop-laptop-security-bModule5 desktop-laptop-security-b
Module5 desktop-laptop-security-b
 
10. hddn-datalekaje-hs-01
10. hddn-datalekaje-hs-0110. hddn-datalekaje-hs-01
10. hddn-datalekaje-hs-01
 
Security Threats in E-Commerce
Security Threats in E-CommerceSecurity Threats in E-Commerce
Security Threats in E-Commerce
 
3 Tips to Stay Safe Online in 2017
3 Tips to Stay Safe Online in 20173 Tips to Stay Safe Online in 2017
3 Tips to Stay Safe Online in 2017
 
[CLASS 2014] Palestra Técnica - Michael Firstenberg
[CLASS 2014] Palestra Técnica - Michael Firstenberg[CLASS 2014] Palestra Técnica - Michael Firstenberg
[CLASS 2014] Palestra Técnica - Michael Firstenberg
 
Weaponizing the Nokia N900 -- TakeDownCon, Dallas, 2011
Weaponizing the Nokia N900 -- TakeDownCon, Dallas, 2011Weaponizing the Nokia N900 -- TakeDownCon, Dallas, 2011
Weaponizing the Nokia N900 -- TakeDownCon, Dallas, 2011
 
Securing Devices at Home
Securing Devices at HomeSecuring Devices at Home
Securing Devices at Home
 
Lecture 12 -_internet_security
Lecture 12 -_internet_securityLecture 12 -_internet_security
Lecture 12 -_internet_security
 
report-final
report-finalreport-final
report-final
 
Cyber security
Cyber securityCyber security
Cyber security
 
Lec21 security
Lec21 securityLec21 security
Lec21 security
 
Physician Office Presentation
Physician Office PresentationPhysician Office Presentation
Physician Office Presentation
 
OmniSpotlight 05-2014
OmniSpotlight 05-2014OmniSpotlight 05-2014
OmniSpotlight 05-2014
 
Encrytpion information security last stand
Encrytpion information security last standEncrytpion information security last stand
Encrytpion information security last stand
 

More from Rob Levey

How secure is your data?
How secure is your data?How secure is your data?
How secure is your data?
Rob Levey
 
Unleash the power of your people mar2012
Unleash the power of your people mar2012Unleash the power of your people mar2012
Unleash the power of your people mar2012
Rob Levey
 
How to say NO to outrageous Preservation Requests
How to say NO to outrageous Preservation RequestsHow to say NO to outrageous Preservation Requests
How to say NO to outrageous Preservation Requests
Rob Levey
 
Annual Performance Reviews
Annual Performance ReviewsAnnual Performance Reviews
Annual Performance Reviews
Rob Levey
 
Using Power Maps for Sales Success
Using Power Maps for Sales SuccessUsing Power Maps for Sales Success
Using Power Maps for Sales Success
Rob Levey
 
Catelas 360 degree Partner Assessments
Catelas 360 degree Partner Assessments Catelas 360 degree Partner Assessments
Catelas 360 degree Partner Assessments
Rob Levey
 
Are you spending too much on Legal settlement costs?
Are you spending too much on Legal settlement costs?Are you spending too much on Legal settlement costs?
Are you spending too much on Legal settlement costs?
Rob Levey
 
Catelas Investigations & Litigation
Catelas Investigations & LitigationCatelas Investigations & Litigation
Catelas Investigations & Litigation
Rob Levey
 
Catelas - Conducting cost effective Internal Investigations
Catelas  -  Conducting cost effective Internal InvestigationsCatelas  -  Conducting cost effective Internal Investigations
Catelas - Conducting cost effective Internal Investigations
Rob Levey
 
Catelas Early Case Assessment Trap
Catelas Early Case Assessment TrapCatelas Early Case Assessment Trap
Catelas Early Case Assessment Trap
Rob Levey
 
Collaborative Selling
Collaborative SellingCollaborative Selling
Collaborative Selling
Rob Levey
 
Early Case Analytics
Early Case AnalyticsEarly Case Analytics
Early Case Analytics
Rob Levey
 
Catelas Visual Identification for eDiscovery
Catelas Visual Identification for eDiscoveryCatelas Visual Identification for eDiscovery
Catelas Visual Identification for eDiscovery
Rob Levey
 
Collaboration webinar
Collaboration webinar Collaboration webinar
Collaboration webinar
Rob Levey
 
How corrupt is your International Business?
How corrupt is your International Business?How corrupt is your International Business?
How corrupt is your International Business?
Rob Levey
 
Unleash the power of your people
Unleash the power of your peopleUnleash the power of your people
Unleash the power of your people
Rob Levey
 
CRM Tools Suck
CRM Tools SuckCRM Tools Suck
CRM Tools Suck
Rob Levey
 
Catelas Security & Investigations
Catelas Security & InvestigationsCatelas Security & Investigations
Catelas Security & Investigations
Rob Levey
 

More from Rob Levey (20)

How secure is your data?
How secure is your data?How secure is your data?
How secure is your data?
 
Unleash the power of your people mar2012
Unleash the power of your people mar2012Unleash the power of your people mar2012
Unleash the power of your people mar2012
 
How to say NO to outrageous Preservation Requests
How to say NO to outrageous Preservation RequestsHow to say NO to outrageous Preservation Requests
How to say NO to outrageous Preservation Requests
 
Annual Performance Reviews
Annual Performance ReviewsAnnual Performance Reviews
Annual Performance Reviews
 
Using Power Maps for Sales Success
Using Power Maps for Sales SuccessUsing Power Maps for Sales Success
Using Power Maps for Sales Success
 
Catelas 360 degree Partner Assessments
Catelas 360 degree Partner Assessments Catelas 360 degree Partner Assessments
Catelas 360 degree Partner Assessments
 
Are you spending too much on Legal settlement costs?
Are you spending too much on Legal settlement costs?Are you spending too much on Legal settlement costs?
Are you spending too much on Legal settlement costs?
 
Catelas Investigations & Litigation
Catelas Investigations & LitigationCatelas Investigations & Litigation
Catelas Investigations & Litigation
 
Catelas - Conducting cost effective Internal Investigations
Catelas  -  Conducting cost effective Internal InvestigationsCatelas  -  Conducting cost effective Internal Investigations
Catelas - Conducting cost effective Internal Investigations
 
Catelas Early Case Assessment Trap
Catelas Early Case Assessment TrapCatelas Early Case Assessment Trap
Catelas Early Case Assessment Trap
 
Collaborative Selling
Collaborative SellingCollaborative Selling
Collaborative Selling
 
Early Case Analytics
Early Case AnalyticsEarly Case Analytics
Early Case Analytics
 
Catelas Visual Identification for eDiscovery
Catelas Visual Identification for eDiscoveryCatelas Visual Identification for eDiscovery
Catelas Visual Identification for eDiscovery
 
Collaboration webinar
Collaboration webinar Collaboration webinar
Collaboration webinar
 
How corrupt is your International Business?
How corrupt is your International Business?How corrupt is your International Business?
How corrupt is your International Business?
 
Unleash the power of your people
Unleash the power of your peopleUnleash the power of your people
Unleash the power of your people
 
CRM Tools Suck
CRM Tools SuckCRM Tools Suck
CRM Tools Suck
 
Catelas Security & Investigations
Catelas Security & InvestigationsCatelas Security & Investigations
Catelas Security & Investigations
 
Catelas Deloitte FCPA webinar
Catelas Deloitte FCPA webinarCatelas Deloitte FCPA webinar
Catelas Deloitte FCPA webinar
 
Catelas Security Webinar 12 14 10
Catelas Security Webinar 12 14 10Catelas Security Webinar 12 14 10
Catelas Security Webinar 12 14 10
 

Recently uploaded

Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Recently uploaded (20)

"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 

Does your Data have Super-Powers?

  • 1. Do you have control of your most sensitive data?
  • 2. Information Security is Being Compromised… “Take heed of Lockheed… the attackers are really smart and their exploits are highly sophisticated” Art Coviello - RSA
  • 3. The Rules Have Changed…Dramatically Hacker sophistication Potential vulnerabilities Monetization of security breaches Data is everywhere A day in the life of a Company Executive… 11pm Laptop in Hotel 6pm – catch up on day’s work. Phone – a few Comment on 2pm important phone Facebook. Desktop – work calls and emails 8am at airport on M&A 5am iPad – catch proposal and a Home PC – up on emails few key emails final iterations on the train to Board How many times was this executive’s presentation information security potentially compromised? At the end of the day, what are we trying to protect?
  • 4. What Does Rune Information Security Do? We don’t secure every potential vulnerability – we secure what you care about If it absolutely must be kept secret, we secure it unconditionally User-defined security, not policy-based Empowering users to secure their most sensitive data themselves… • You select it, we secure it! • Making encryption-based security easier for the user
  • 5. User-Defined Security: 3 simple steps 1. Select the data you want to secure 2. Encrypt message (file or folder) 3. Send encrypted message that only selected recipients who can un-encrypt and read
  • 6. Unconditional Security: The Vema-Cipher Platform Encryption for those that need security in addition to compliance  Personal information  Business intelligence  Proprietary information Secures your data locally or in the cloud  No matter where data is stored… You control exactly who can read your message Defends your data as it moves though hostile environments Innovative yet proven approach to data security  Standards based compliance coupled with unbreakable encryption
  • 7. • Secure: • Proven, unbreakable Vernam cipher • VC-Key™ creates a Compliance completely random FIPS 140-2 message – immune to brute-force attacks • Stops man-in-the-middle attacks • Compliance: • FIPS 140-2 standards- based encryption Simple to Use Secure • Simple to use: 3 steps 3 Easy Steps Vernam Cipher • Set your audience • Select your message or document • Click to encrypt or decrypt
  • 8. For More Information Contact Us Rune Information Security Rob Levey, VP North America Phone: +1 978-996-2758 Email: robert.levey@rune.sg Web: www.rune.sg