Beyond Encryption Presentation By Cormac Kelly
The Beyond Encryption end-point security solution enables any organization, individual or government agency to target, wit...
<ul><li>The ability to target specific files, folders and extensions on a devices for  Lock/Unlock Encryption/Decryption ,...
<ul><li>The B.E. Server maintains policies, and settings associated with each individual device that has the B.E. Client d...
<ul><li>Version 3.5 of Beyond Encryption contains the following Core Security Functions </li></ul><ul><li>Freeze  any sens...
<ul><li>Pinpoint Accuracy  – Browse the devices drive over the internet and target data in real-time. </li></ul>How can yo...
<ul><li>Version 3.5 of Beyond Encryption can execute commands in the following ways </li></ul><ul><li>Reactive Security  I...
<ul><li>Connect to any device over the Internet at any time. </li></ul><ul><li>Device only needs to connect for a millisec...
Timed Security <ul><li>If the device does not connect to the Internet your data is secure. </li></ul><ul><li>Set the timer...
Local Fencing <ul><li>Predefined local commands execute when a device leaves the company. </li></ul><ul><li>Your data cann...
Geo Fencing – Slide One <ul><li>Predefined local commands execute when a device leaves a Geo Zone. </li></ul><ul><li>Can s...
Geo Fencing – Slide Two Large Scale Fencing Pinpoint Fencing
<ul><li>Easy deployment and invisible to the End User. </li></ul><ul><li>Does not slow the device down. </li></ul><ul><li>...
<ul><li>Beyond Encryption Prime </li></ul><ul><ul><li>1-500 User SMB. </li></ul></ul><ul><ul><li>Fully managed and support...
<ul><li>Your Sensitive Data </li></ul><ul><li>Beyond  Your Network </li></ul><ul><li>Beyond  Your Perimeter </li></ul><ul>...
Upcoming SlideShare
Loading in …5
×

Why Go Beyond Encryption

903 views

Published on

This is a PowerPoint presentation from Cormac M. Kelly on behalf of Beyond Encryption Technologies Ltd. Cormac is the Director Of Business Development at Global Defence & Safety Solutions Ltd in Ireland and one of the leading distributors of the End-Point Security solutions from BETL.

Published in: Business, Technology
  • Be the first to comment

  • Be the first to like this

Why Go Beyond Encryption

  1. 1. Beyond Encryption Presentation By Cormac Kelly
  2. 2. The Beyond Encryption end-point security solution enables any organization, individual or government agency to target, with pinpoint accuracy, any sensitive information on any device, regardless of location, and protect it .
  3. 3. <ul><li>The ability to target specific files, folders and extensions on a devices for Lock/Unlock Encryption/Decryption , Retrieval and/or Destruction regardless of the device’s location either Remotely , through Time Delay , Local Fencing or Geo Fencing . </li></ul><ul><li>All this is done in a way that completely satisfies international audit requirements.  When a command has been executed on a device the administrator receives a full report outlining when the command was executed on that device, and what files and folders were affected by what actions. </li></ul><ul><li>Once a command has been initiated on a device, the user has no control. It is impossible for them to prevent any command from being executed. </li></ul><ul><li>The B.E. Security Solution is the only product on the market that has both Geo-Fencing and Local Fencing capabilities that allow a device or the data on a device to lock as soon as the device moves into, or out of, a pre-defined geographic area OR outside of your company network. </li></ul>Unique Selling Points Of The Beyond Encryption Security Solution
  4. 4. <ul><li>The B.E. Server maintains policies, and settings associated with each individual device that has the B.E. Client deployed on it. </li></ul><ul><li>The B.E. Client resides on each device under management. Its job it is to maintain contact with and carry out instructions issued from the B.E. Server. The B.E. Client cannot be removed from a device by the Device User. </li></ul><ul><li>A Secure Communications Channel provides a secure, encrypted, point-to-point communication channel between the B.E. Client and the B.E. Server. </li></ul>So How Does The Beyond Encryption Security Solution Work?
  5. 5. <ul><li>Version 3.5 of Beyond Encryption contains the following Core Security Functions </li></ul><ul><li>Freeze any sensitive data on any device so that it can never be accessed. </li></ul><ul><li>Unfreeze any sensitive data on any device. </li></ul><ul><li>Retrieve any data from any device. </li></ul><ul><li>Destroy any data on any device (exceed US DOD standards for file deletion). </li></ul><ul><li>Lock down any device. </li></ul><ul><li>Unlock any device. </li></ul>Beyond Encryption Core Functionality Version 3.6 In development featuring more security functions. Roadmap available to select customers under NDA.
  6. 6. <ul><li>Pinpoint Accuracy – Browse the devices drive over the internet and target data in real-time. </li></ul>How can you Target and Select Data on a device? Figure 1.1 – Targeting Data <ul><li>Additional Notes </li></ul><ul><li>Can target device drivers to Disable Hardware. </li></ul><ul><li>Can target and Freeze or Remove Software. </li></ul><ul><li>File Type – Based on type of data (example – all Microsoft Word Documents). </li></ul><ul><li>File Location – Based on location of data (example – Contents of ‘My Documents’ directory). </li></ul><ul><li>File Name – Based on name of file or files. </li></ul>
  7. 7. <ul><li>Version 3.5 of Beyond Encryption can execute commands in the following ways </li></ul><ul><li>Reactive Security Instant execution if the device is connected to the Internet. </li></ul><ul><li>Timed Security Local execution if the device does not connect to the Internet. </li></ul><ul><li>Local Fencing Local Execution if the device is taken away from the office. </li></ul><ul><li>Geo Fencing Local Execution if the device leaves a Geographic location. </li></ul>How are commands Executed on a device?
  8. 8. <ul><li>Connect to any device over the Internet at any time. </li></ul><ul><li>Device only needs to connect for a millisecond to receive commands. </li></ul><ul><li>Full reporting when commands have been completed. </li></ul><ul><li>Easy to use Interface. </li></ul><ul><li>Target All data or Specific Data. </li></ul>Reactive Security
  9. 9. Timed Security <ul><li>If the device does not connect to the Internet your data is secure. </li></ul><ul><li>Set the timer anywhere from One Minute to One Year. </li></ul><ul><li>Predefined commands will execute locally when the timer reaches zero. </li></ul><ul><li>Designed to force your end users to connect to the organisation. </li></ul><ul><li>Target all data or specific data. </li></ul><ul><li>Full reporting capability. </li></ul>
  10. 10. Local Fencing <ul><li>Predefined local commands execute when a device leaves the company. </li></ul><ul><li>Your data cannot be used outside of your facility. </li></ul><ul><li>Locally fence all data or specific data. </li></ul><ul><li>Full reporting. </li></ul>
  11. 11. Geo Fencing – Slide One <ul><li>Predefined local commands execute when a device leaves a Geo Zone. </li></ul><ul><li>Can support multiple Geo Zones. </li></ul><ul><li>Can set Go Zones and No Go Zones . </li></ul><ul><li>Geo Fence All data or Specific Data. </li></ul>
  12. 12. Geo Fencing – Slide Two Large Scale Fencing Pinpoint Fencing
  13. 13. <ul><li>Easy deployment and invisible to the End User. </li></ul><ul><li>Does not slow the device down. </li></ul><ul><li>User cannot stop commands from executing. </li></ul><ul><li>Can send to a group of devices or to a single device. </li></ul><ul><li>Can set a combination of commands that can execute at the same time. </li></ul><ul><li>Full reporting and audit trail. </li></ul>Further Product Information
  14. 14. <ul><li>Beyond Encryption Prime </li></ul><ul><ul><li>1-500 User SMB. </li></ul></ul><ul><ul><li>Fully managed and supported by Beyond Encryption. </li></ul></ul><ul><ul><li>State of the art hosting facility. </li></ul></ul><ul><ul><li>Can be made available as a managed service. </li></ul></ul><ul><li>Beyond Encryption Professional </li></ul><ul><ul><li>Enterprise Applicaton. </li></ul></ul><ul><ul><li>Full Active Directory integration. </li></ul></ul><ul><ul><li>Plug and Play. </li></ul></ul><ul><li>Beyond Encryption Premium </li></ul><ul><ul><li>Custom Development of Core Technology. </li></ul></ul><ul><ul><li>Integration with existing security applications. </li></ul></ul><ul><ul><li>Working with Defence and Police agencies around the world. </li></ul></ul>Beyond Encryption Product Range
  15. 15. <ul><li>Your Sensitive Data </li></ul><ul><li>Beyond Your Network </li></ul><ul><li>Beyond Your Perimeter </li></ul><ul><li>Beyond Encryption </li></ul><ul><li>Always Under Your Control </li></ul>

×