Defending Business Data James Cheng Strategic Business Group, ITOX. +65-6866 3229 •  © 2009 ITOX Pte Ltd
Agenda <ul><li>18 th  March 2010 </li></ul><ul><li>Threats to Sensitive Business Data </li></ul><ul><li>OXSecure™ Sensitiv...
Threats to Sensitive Business Data •  © 2009 ITOX Pte Ltd
Growing Threats to Processing Business Data <ul><li>Growing integration with customers, suppliers, and partners </li></ul>...
Potential Consequences of a Data Breach 1 <ul><li>Business process data is vulnerable </li></ul><ul><ul><li>23% of breache...
OXSecure ™  Sensitive Data Protection © 2009 ITOX Pte Ltd
Using Encryption to Protect Business Data <ul><li>File transfers </li></ul><ul><ul><li>Encryption provides security while ...
OXSecure™ for PGP Command Line <ul><li>Protect critical business transactions </li></ul><ul><ul><li>Secures data in back-e...
PGP Command Line in Secure File Transfers <ul><li>Extend life cycle of legacy systems by adding encryption </li></ul><ul><...
Administrator Experience – PGP Command Line pgp --encrypt AcmeCorpData.db --recipient “Recipient Server&quot;  <ul><li>Add...
Administrative Advantages – PGP Command Line <ul><li>Low impact on running systems </li></ul><ul><li>A flexible “Swiss arm...
PGP Customer Case Study &quot;We completed the project within budget and faster than expected. PGP Command Line was very e...
Planning Beyond Business Process Data February 2008  •  PGP Corporation
IT Security Evolves: Enterprise Data Protection <ul><li>An evolutionary approach to data security </li></ul><ul><li>Securi...
Enabling Solution: PGP ®  Encryption Platform The first application deploys the platform. . . future applications leverage...
Summary <ul><li>Business processes present significant risk </li></ul><ul><ul><li>Business process data is vulnerable </li...
Q&A and Next Steps
© 2009 PGP Corporation
Upcoming SlideShare
Loading in …5
×

ITOX PGP CommandLine slide_share march 2010

613 views

Published on

PGP CommandLine

Published in: Technology
0 Comments
1 Like
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total views
613
On SlideShare
0
From Embeds
0
Number of Embeds
3
Actions
Shares
0
Downloads
0
Comments
0
Likes
1
Embeds 0
No embeds

No notes for slide
  • Centralized deployment – Customized clients can be easily created and distributed using the MS Windows MSI application and security policies are centrally created, updated, managed, and automatically distributed to clients. One-time-use administrative recovery tokens – A unique one-time-use recovery access passphrase allowing a user or administrator to access an encrypted disk drive. Multiple policies – Unique polices can be created for each user group. User groups can be automatically generated from existing corporate directories Patented PGP Additional Decryption Key – Technology allows data to be encrypted to an administrative key in addition to the email recipient&apos;s key. This approach ensures administrative access to data in the event the recipient loses his/her key, forgets the passphrase, or leaves the organization. PGP Whole Disk Encryption engine – Non-stop encryption of all data on a hard drive, including temporary &amp; operating system swap files. PGP Virtual Disk – Transparently creates volumes whose contents are encrypted when not in use, preventing unauthorized access. It includes options to automatically unmount a disk after a specified period of inactivity, even with files open or when a computer goes into Sleep mode. It also can be used with PGP Whole Disk Encryption when encrypted files/folders are needed to protect data after a whole disk has been unlocked. PGP Shredder – Securely removes all traces of files from the Recycle Bin. PGP Wipe – Securely removes all traces of file from the disk’s free space. Multi user support – Multiple users may access a PGP-encrypted drive using separate credentials, allowing employees to share workstations. Users may also access individually encrypted volumes residing on an encrypted drive.
  • ITOX PGP CommandLine slide_share march 2010

    1. 1. Defending Business Data James Cheng Strategic Business Group, ITOX. +65-6866 3229 • © 2009 ITOX Pte Ltd
    2. 2. Agenda <ul><li>18 th March 2010 </li></ul><ul><li>Threats to Sensitive Business Data </li></ul><ul><li>OXSecure™ Sensitive Data Protection </li></ul><ul><li>Planning Beyond Protecting Business Process Data </li></ul><ul><li>Q&A </li></ul>
    3. 3. Threats to Sensitive Business Data • © 2009 ITOX Pte Ltd
    4. 4. Growing Threats to Processing Business Data <ul><li>Growing integration with customers, suppliers, and partners </li></ul><ul><ul><li>Outsourcing for finance and accounting is growing at 12% 1 </li></ul></ul><ul><ul><li>Businesses processes handle sensitive financial, R&D, and customer data </li></ul></ul><ul><ul><li>Data is vulnerable during transfer and on in-house and third-party servers </li></ul></ul><ul><li>Legacy applications and backup media are prone to security breaches </li></ul><ul><ul><li>Traditional file transfer and email protocols have no built-in security </li></ul></ul><ul><ul><li>Backup tapes are easily lost </li></ul></ul>1 Gartner, “Market Trends: Finance and Accounting BPO, Worldwide,” 2007
    5. 5. Potential Consequences of a Data Breach 1 <ul><li>Business process data is vulnerable </li></ul><ul><ul><li>23% of breaches due to third party, outsourcer, or electronic backups </li></ul></ul><ul><ul><li>Third-party data breaches result in highest per-case cost </li></ul></ul><ul><li>Average cost of breach is increasing </li></ul><ul><ul><li>$197 per record, up 43% from 2005 </li></ul></ul><ul><li>Customer churn is increasing </li></ul><ul><ul><li>Growing turnover & acquisition costs </li></ul></ul><ul><ul><li>$128 per record, up 30% from 2006 </li></ul></ul><ul><li>Prevention is cost-effective </li></ul><ul><ul><li>Following a breach, encryption is the most frequently deployed technology </li></ul></ul>1 The Ponemon Institute, “2007 Annual Study: U.S. Cost of a Data Breach,” November 2007
    6. 6. OXSecure ™ Sensitive Data Protection © 2009 ITOX Pte Ltd
    7. 7. Using Encryption to Protect Business Data <ul><li>File transfers </li></ul><ul><ul><li>Encryption provides security while data is transferred and stored </li></ul></ul><ul><ul><li>Digital signatures ensure authenticity and create audit trails </li></ul></ul><ul><li>Electronic backups </li></ul><ul><ul><li>Encryption protects data on backup media from unauthorized access when lost or stolen </li></ul></ul><ul><li>Best practice: central management </li></ul><ul><ul><li>Centralized key management </li></ul></ul><ul><ul><li>Long-term corporate data access </li></ul></ul><ul><ul><li>Single cross-platform solution </li></ul></ul>
    8. 8. OXSecure™ for PGP Command Line <ul><li>Protect critical business transactions </li></ul><ul><ul><li>Secures data in back-end systems to ensure confidentiality and authenticity in transactions </li></ul></ul><ul><li>Fast and flexible deployment </li></ul><ul><ul><li>Integrates encryption in existing automated email or file transfers </li></ul></ul><ul><li>Comprehensive protection </li></ul><ul><ul><li>Secures data in transit and at rest </li></ul></ul><ul><li>Enterprise standard </li></ul><ul><ul><li>Manages keys centrally </li></ul></ul><ul><ul><li>Leverages a common encryption application across enterprise systems </li></ul></ul><ul><ul><li>Provides long-term data access </li></ul></ul>
    9. 9. PGP Command Line in Secure File Transfers <ul><li>Extend life cycle of legacy systems by adding encryption </li></ul><ul><li>Protect data from source to target system </li></ul><ul><li>Digital signatures create audit trails and ensure authenticity </li></ul><ul><li>Secure data flow across platforms </li></ul><ul><li>Access data easily for years to come </li></ul><ul><li>Wipe files for confidentiality </li></ul><ul><li>Simplify administration with central keyserver </li></ul><ul><li>Secure transfer as file, email, or self-decrypting archive to any recipient </li></ul><ul><li>Compression reduces transmission time </li></ul><ul><li>OpenPGP standard widely accepted </li></ul>Source System e.g., ERP system PGP Command Line File Transfer Server Original File Automation Script PGP Encryption Encrypted File Unencrypted Secure file transfer Encryption at source Fast deployment
    10. 10. Administrator Experience – PGP Command Line pgp --encrypt AcmeCorpData.db --recipient “Recipient Server&quot; <ul><li>Add encryption to existing applications with one line of code: </li></ul><ul><ul><li>Encrypting file before transmission / backup: </li></ul></ul><ul><ul><li>Decrypting file after transmission / restore: </li></ul></ul><ul><ul><li>Downloading a key from a central server: </li></ul></ul>pgp --decrypt AcmeCorpData.pgp --passphrase kd028#@4jkakljKJ pgp --keyserver-recv “Recipient Server” --keyserver keys.acme.com
    11. 11. Administrative Advantages – PGP Command Line <ul><li>Low impact on running systems </li></ul><ul><li>A flexible “Swiss army knife” to solve many security-related tasks </li></ul><ul><li>One application – many operating systems </li></ul><ul><ul><li>Windows Vista (32- and 64-bit) </li></ul></ul><ul><ul><li>Windows 2003 SP1 </li></ul></ul><ul><ul><li>Windows XP SP2 (32- and 64-bit) </li></ul></ul><ul><ul><li>Windows 2000 SP4 </li></ul></ul><ul><ul><li>HP-UX 11i or above (PA-RISC and Itanium) </li></ul></ul><ul><ul><li>IBM AIX 5.2 and 5.3 RedHat Enterprise Linux 3.0 or above (x86 and x86_64) </li></ul></ul><ul><ul><li>Sun Solaris 9 (SPARC only) </li></ul></ul><ul><ul><li>Solaris 10 (SPARC, x86, and x86_64) </li></ul></ul><ul><ul><li>Fedora Core 3 and above (x86_64 only) </li></ul></ul><ul><ul><li>Apple Mac OS X 10.4 and 10.5 (Universal Binary) </li></ul></ul><ul><ul><li>IBM System i, System z </li></ul></ul>
    12. 12. PGP Customer Case Study &quot;We completed the project within budget and faster than expected. PGP Command Line was very easy to install, well documented, and runs without problems.” – Richard Goldklang Chief Technology Officer <ul><li>Challenge: Protect financial transactions between brokers </li></ul><ul><li>Solution: PGP Command Line </li></ul><ul><li>Benefits </li></ul><ul><ul><li>Easy installation </li></ul></ul><ul><ul><li>Project completed within budget and faster than expected </li></ul></ul><ul><ul><li>Seamless integration with existing infrastructure </li></ul></ul>
    13. 13. Planning Beyond Business Process Data February 2008 • PGP Corporation
    14. 14. IT Security Evolves: Enterprise Data Protection <ul><li>An evolutionary approach to data security </li></ul><ul><li>Securing data, wherever it goes </li></ul><ul><li>Comprehensive strategy based on multiple technologies </li></ul><ul><li>Encryption & key management play critical roles protecting data throughout enterprise and beyond </li></ul>Protect : Secure data according to policy Detect : Identify risk & enforce policy Access : Authenticate identity Manage : Archive, backup, & store
    15. 15. Enabling Solution: PGP ® Encryption Platform The first application deploys the platform. . . future applications leverage it. The first application deploys the platform. . . future applications leverage it. <ul><li>Enables Enterprise Data Protection strategy </li></ul><ul><li>Provides the encryption applications and key management to protect data throughout the enterprise and beyond </li></ul><ul><li>First application deploys the platform </li></ul><ul><li>Add additional encryption applications as needed </li></ul><ul><li>Enabled applications from PGP Corporation & third-party vendors </li></ul><ul><li>Reduces operational costs, expedites time to deploy </li></ul>PGP Encryption Platform
    16. 16. Summary <ul><li>Business processes present significant risk </li></ul><ul><ul><li>Business process data is vulnerable </li></ul></ul><ul><ul><li>23% of breaches due to third party, outsourcer, or electronic backups </li></ul></ul><ul><ul><li>Third-party data breaches result in highest per-case cost </li></ul></ul><ul><li>PGP Command Line mitigates the risk </li></ul><ul><ul><li>Protection of trusted business transactions </li></ul></ul><ul><ul><li>Fast and flexible deployment </li></ul></ul><ul><ul><li>Long-term data access </li></ul></ul><ul><ul><li>Enterprise standard </li></ul></ul><ul><li>PGP Corporation’s solutions are “future-proof” </li></ul><ul><ul><li>The PGP Encryption Platform offers a proactive approach to enable additional applications </li></ul></ul><ul><ul><li>Allows organizations to plan for future needs as part of an Enterprise Data Protection strategy </li></ul></ul>
    17. 17. Q&A and Next Steps
    18. 18. © 2009 PGP Corporation

    ×