SlideShare a Scribd company logo
*
2016
UNCLASSIFIED 1
Continuous Cyber-Defense for Data & Systems
*HACK PROOF DATA is a reality
*Security Beyond The Firewall
*SURVIVABLE DATA
*Prevent a SONY Type of Attack
Bring AwarenessBring Awareness -- WORMdisk™ is a new Cyber-Defense approach to rapidly
Strengthen National Systems & National Data Assets against various types of Cyber-Attacks.
Keep Systems OperationalKeep Systems Operational - Protect data & OS boot disks. Prevent Sony-type
attacks on vulnerable parts of OS disks. Systems survive the attack and remain operational.
Maintain DataMaintain Data IIntegrityntegrity - Protect against static data manipulation, deletion,
modification, re-formatting. Data survives the attack. Trust & confidence in your data.
Objective - Confidence in DataObjective - Confidence in Data
•• Secure:Secure: Protection is in the disk itself, and cannot be bypassed.
•• Protects:Protects: Against Ransomware, firmware attacks, insider threats, accidental errors.
•• Interfaces:Interfaces: Standard Disk Drive to Windows, Linux, Mac OS X, VMware and others.
•• Simple:Simple: Easy to use as any disk, standard interfaces, file systems, and file formats.
•• Existing Apps:Existing Apps: Plug and Play, Drag and Drop, Copy-To, Save-As.
•• DeploymentDeployment:: Fast, easy, rapid install. From a single disk, up to Big Data solutions.
2
WHAT is a WORMdisk™?WHAT is a WORMdisk™?
• Why do I need a WORMdisk™? To protect your static data from manipulation, modification, alteration, deletion or re-
formatting. Typical uses include data that must be retained for financial, medical, legal, PII data, contracts, corporate, documents,
surveillance, law enforcement, reference material, content libraries, archives and data backups.
• Why do I need a CYBERdisk™? To protect sensitive parts of boot disks from cyber-attacks such as the SONY and Aramco attacks
& firmware attacks. Windows, MAC OS X, Linux and VMware may be installed and protected on CYBERdisks™.
• What type of Cyber-Attacks are prevented? Data manipulation, deletion, alteration, modification, re-formatting, unauthorized
DNI Gen James Clapper testified at the U.S. Cybersecurity Policy for the Senate Armed Services
Committee on September 29, 2015 that one of his biggest concerns is Data Manipulation &
Integrity of the Data.
WORMdisks™ prevent Data Manipulation to provide Data Confidence and Data Integrity.
• What type of Cyber-Attacks are prevented? Data manipulation, deletion, alteration, modification, re-formatting, unauthorized
encryption, Ransomware, MBR attacks and undetectable firmware viruses are prevented.
• What happens if a hacker tries to attack my data? If a hacker gets into your system, WORMdisks™ will give them I/O errors when they
try to change or delete your data. Ransomware will fail, firmware viruses will abort and “delete” and “format” commands will fail.
• How does WORMdisk™ secure data? WORMdisks™ are much more secure than conventional host-based security since the protection
is inside the disk itself. Data protection is standalone in the disk and travels with the disk. It cannot be bypassed regardless of user
permissions or the operating system being used.
• Will WORMdisks™ support my applications? WORMdisks™ work with existing applications the same way other disks do.
• How do I use WORMdisks™? They are used like other disks and may be local SATA, eSATA, USB, NAS/SAN network attached, or used as
Cloud WORMdisk™ storage. WORMdisks™ easily integrate into existing systems and operate like existing disks.
• Do WORMdisks™ support encryption? WORMdisks™ support FIPS 140-2 encryption technology, so in addition to protection from data
manipulation , modification or deletion, data is also protected from disclosure.
3
GreenTec-USA, Secure KnowledgeGreenTec-USA, Secure Knowledge
• A high performance data security technology company
• Serving Intelligence, Defense and Law Enforcement Communities
• Agile rapid in-house Software, Hardware, Systems, Security & Metal Fab
• Solving difficult security and defense technical problems since 2005
– Established 2005 for performance hardware solutions.
Background of 30+ years in the Intelligence Community, DoD, federal civilian agencies
and commercial organizations
– Self replicating, patented 4-tier data protected RAID 61+1™
– On-board supercomputer processing and storage for Volumetric
Synthetic Aperture Radar (VSAR) Miniaturization program for IED detection. Hi-Synthetic Aperture Radar (VSAR) Miniaturization program for IED detection. Hi-
performance, low-energy, low-heat signature, lightweight. Flight-worthiness tested (high-
altitude, vibration, shock, -4
o
F to 128
o
F ops, humidity range, RF emanations &
bombardment)
– “Lego-like” re-configurable, modular Processor Blocks,
Storage Blocks, Video Blocks, Sensor Blocks, from datacenter to mobile to avionics.
– Hardware-level Write Once Read Many (WORM) protection
from data modification and viruses.
– Protects Master Boot Record (MBR) and Partition Information
from deletion, overwriting or modification protecting the OS disk from Sony-type attacks.
– Co-Marketing agreement with Seagate to deliver
WORMdisk™ products to Government and Commercial markets.
4
National Cyber-Security Protection System (DHS)
Gateway Security Devices/Firewalls
Desktop/Laptops/Mobile Devices
Wide Area Network
Local Area Network
Datacenters and Servers
Your Last Line of DefenseYour Last Line of Defense
When perimeters are penetrated,
access controls or authentication
methods are compromised . . .
CYBERdisk & WORMdisk provide
vigilant continuous protection as
the last line of defense against
cyber-attacks.
5
Protects data at the coreProtects data at the core--levellevel
inside the disk hardwareinside the disk hardware
WORMdisk™ Data Integrity for Mission Critical Systems
Securing the MissionSecuring the Mission
Defending Our National IT Infrastructure
• Combat Support Systems • Logistics & Supply Chain
• Communications Systems • Command and Control Systems
• Air, Ground & Sea Defense
Systems
• Sensors and Intelligence
Collections
• Utilities and Power Grid • Industrial Control Systems
6
• Utilities and Power Grid • Industrial Control Systems
• Financial Infrastructure • Acquisition Systems
• Medical Systems • Personnel Records
• Forward Operating Base (FOB)
Deployments
• Training Reference Material
• DoD 5015.2 Electronic Records
Compliance
• Mobile Cloud –based Systems
CYBERdisk™ and WORMdisk™CYBERdisk™ and WORMdisk™
Key Features:
• Drastically increases Data Integrity and System Integrity
• CYBERdisks™ protect sensitive parts of system boot disks from cyber-attacks & firmware attacks
• WORMdisks™ protect static data files from manipulation, modification, alteration, deletion or re-formatting
Key Benefits:
• Immediate protection of computer systems MBR (Master Boot Record), GPT and Partition Tables from Malware
such as the Equation Group Virus which current cyber protections fail to detect or remove.
• Prevents Ransomware encrypting data files and holding you hostage forcing you to pay a ransom to decrypt data
• Data is permanently protected from both disclosure and modification or deletion.
• Inexpensive, low CapEx, low OpEx. Easy to use and deploy. Supports native file systems and file formats.• Inexpensive, low CapEx, low OpEx. Easy to use and deploy. Supports native file systems and file formats.
• Uses standard computer disk interfaces (SATA, eSATA, USB), plug and play.
• Functions like a typical hard disk drive; connect, drag & drop, save-as, copy, etc.
• Supports workstations, laptops, servers and the cloud.
• Read and write from Windows, Linux, Mac OS X & VMware.
• WORMdisks™ may be used as local disks or as NAS, SAN, CIFS, NFS, SAMBA, iSCSI, etc.
• Supports one-to-one and one-to-many local or remote mirrors.
• Scalable from 500GB up to 4.1PB in a standard 19” rack.
• No performance impact. Full disk speed access for data read and write.
• Internal disks, external disks and rack mount configurations.
• Reduces demands on overburdened skilled cyber-staff. Security team can focus on other cyber-threats.
7
Protected Audit Logs
CYBERdisk™ and WORMdisk™ Protected EnvironmentsCYBERdisk™ and WORMdisk™ Protected Environments
WORMdisk™ Secure Local D: Drive
OS Boot CYBERdisk™
WORMdisk™ Secure Network Data
8
Today’s ChallengesToday’s Challenges
Challenges we face today that can be mitigated with WORMdisks™
Cyber-Attacks
• Cyber threats, malware and viruses are damaging, manipulating and disclose important data.
• Ransomware encrypts user data files and holds you hostage, forcing you to pay a ransom to get data back.
• Data damage and disclosure from the Equation Group Virus and other cyber-attacks.
• Data is not fully protectable with current technology, and data can still be erased even when encrypted.
Data Loss & Manipulation
• Insider tampering, disgruntled employees, cyber-espionage.
• Accidental Overwrites and deletions.
• Data Loss and data compromise prevention (Onsite, Mobile and Cloud).
• Assure system integrity and reliability.• Assure system integrity and reliability.
Digital Records Management
• Electronic data compliance and regulatory requirements (DoD 5015.2, NARA, Capstone, HIPAA, NRC, SOX)
• Current expensive and complex compliance solutions do not support native file formats and are difficult to
administer, requiring software and appliances. Data is not protected when it is removed from the appliance.
• Records and original digital evidence require protection and permanence beyond policy based approaches.
• The costly demands of secure electronic records sharing and transportation.
Processes and Procedures are Complex, Costly and Error-prone
• Costly preparation of digital electronic records for compliance, governance and legal action.
• Chain-of-custody requires complex handling, storage and transportation for digital evidence.
• Improper handling of sensitive data not stored in secure locations may be manipulated by outsiders.
• Maintain long-term protection and accessibility for archives.
9
Continuous Cyber-SecurityContinuous Cyber-Security
Securely create, access & backup data from
Workstations, Laptops, Mobile & Servers
Secure disk, folder and file access from
anywhere
Workstations, laptops,
mobile devices
Headquarters
Data Center
Servers & Databases
DR Offsite Storage
Archive or Mirror
for Disaster Recovery
10
CLOUD Storage
Maps data to specific WORMdisk™
• WORMdisk™ was initially developed for DOJ requirements for immutable video
surveillance data to be defensible in court.
• GreenTec-USA developed the WORMdisk™ in conjunction with Seagate for Data
and Cyber Defense solutions. Full Seagate Warranty and Support.
• Secure WORM storage solutions for mobile, workstations, servers, and the Cloud.
• WORMdisk™ available on GSA Schedule 70, NASA SEWP, CIO-CS and other vehicles.
Trusted Partnerships and SupportTrusted Partnerships and Support
• WORMdisk™ available on GSA Schedule 70, NASA SEWP, CIO-CS and other vehicles.
• Scalable from 500G and beyond Petabytes for Big Data solutions.
• Integrated enterprise WORMdisk™ management applications and APIs.
• Easy to use GUIs and Web-based management tools for remote monitoring,
tracking and administration.
• Trade Agreement Act (TAA) Compliant, manufactured in the USA.
• COTS solution available now. Partnering with large systems integrators for rapid
global deployment and support.
11
1. Create, ingest, copy, and tag
documents, files, folders,
images, video, audio,
database exports, etc.
• Catalog WORMdisk™ SerialNo,
Location, Status, POC, Purge Date
& Metadata Tags
• Process Mount and Un-mount for
Online/Offline and Warehousing
• Automated Purge Date Processing
• Notify Users via Email or Text
Catalog Manager
(CatMan)
WORMdisk™
User Workstations & Servers Search, Mount, Un-mount
& Purge Requests
Status Notification
Typical WORMdisk™ WorkflowTypical WORMdisk™ Workflow
WORM Storage Servers (WSS)
Local or Remote
WORMdisk™
Online Library
WORMdisk™
Warehouse
4. Mount to Online
12
WORMdisk™
CLOUD
Enterprise Roles for User, Operator,
Administrator & Security Officer
Status of WORM Storage Servers (WSS)
Highlights in red when WSS down
WORMdisk™ Catalog Manager (CatMan™)WORMdisk™ Catalog Manager (CatMan™)
Shows WORMdisk™ location, status
and user metadata fields
Edit and Search on any data field
13
Immutable Chain-of-Custody and Workflow for Secure Content Delivery
Availability:Availability:Availability:Availability: Any DeviceAny DeviceAny DeviceAny DeviceIntegration:Integration:Integration:Integration: Any ApplicationAny ApplicationAny ApplicationAny Application
Centralization: InformationCentralization: InformationCentralization: InformationCentralization: Information Workflow for RecordsWorkflow for RecordsWorkflow for RecordsWorkflow for Records
Example of WORMdisks™ Integrated into ECMExample of WORMdisks™ Integrated into ECM
CaptureCaptureCaptureCapture ArchiveArchiveArchiveArchiveHoldHoldHoldHoldRetainRetainRetainRetainManageManageManageManageClassifyClassifyClassifyClassify DisposeDisposeDisposeDispose
Enterprise Disk/Enterprise Disk/Enterprise Disk/Enterprise Disk/
Solid State DiskSolid State DiskSolid State DiskSolid State Disk
SAN/NASSAN/NASSAN/NASSAN/NAS
DiskDiskDiskDisk
Content AddressableContent AddressableContent AddressableContent Addressable
Storage(CAS)Storage(CAS)Storage(CAS)Storage(CAS)
Open Text Content Suite
14
CatMan™ Enterprise Web Application
• Awareness of WORMdisks™ on all
WORM Storage Servers in the domain.
• Electronic library provides metadata
and locates WORMdisks™ after being
placed in storage Standalone browser
content manifest.
GT_WinStatus WORM Storage Server™ (WSS) GUI
• Manages individual WORM Storage Servers (WSS)
• Knows when WORMdisk™ is inserted and removed. Provides
WORMdisk™ status , control & threshold warnings
• Displays WORMdisk™ rack location, disk#, physical & SCSI mapping
• Monitors WORMdisk™ and generates visual high-lighting, email and
SMS text messages when getting full
• Interfaces with CATMAN™ and processes mount & un-mount user
requests for Online, Nearline, Offline and Archive transitions
100 Year Archive, Tracking and Storage100 Year Archive, Tracking and Storage
CYBERvault™ Physical storage
service for WORMdisks™
WORMdisk™ at rest has 100 year life expectancy*
*as tested by Seagate Technologies
15
Contact InformationContact Information
Ready for Deployment Today
GreenTec-USA, Inc.
11720 Sunrise Valley Dr., LL-02
Reston, VA 20191Reston, VA 20191
info@greentec-usa.com
http://www.DataDefenseNow.com
(703) 880-8332
16

More Related Content

What's hot

Building Trust Despite Digital Personal Devices
Building Trust Despite Digital Personal DevicesBuilding Trust Despite Digital Personal Devices
Building Trust Despite Digital Personal Devices
Javier González
 
Blancco Removable Media Eraser
Blancco Removable Media EraserBlancco Removable Media Eraser
Blancco Removable Media Eraser
Jemma Elliott
 
Trustworthy Records Retention
Trustworthy Records Retention Trustworthy Records Retention
Trustworthy Records Retention
Arwa
 
Security data sheet
Security data sheetSecurity data sheet
Security data sheet
INSZoom
 
TISA Pro-Talk_1-2554-K.Sommai_pci-dss
TISA Pro-Talk_1-2554-K.Sommai_pci-dssTISA Pro-Talk_1-2554-K.Sommai_pci-dss
TISA Pro-Talk_1-2554-K.Sommai_pci-dss
TISA
 
Iron key h350-datasheet
Iron key h350-datasheetIron key h350-datasheet
Iron key h350-datasheet
MariusEnescu3
 
Asterisk High Availability Design Guide
Asterisk High Availability Design GuideAsterisk High Availability Design Guide
Asterisk High Availability Design Guide
Michelle Dupuis
 
Security and privacy
Security and privacySecurity and privacy
Security and privacy
Haa'Meem Mohiyuddin
 
Chap11
Chap11Chap11
Chap11
nitin_009
 
Chap11
Chap11Chap11
Chap11
Aman Sharma
 
Clape n
Clape nClape n
Clape n
Joy Dhar
 
Anti-Forensic Rootkits
Anti-Forensic RootkitsAnti-Forensic Rootkits
Anti-Forensic Rootkits
amiable_indian
 
Free Libre Open Source Software Development
Free Libre Open Source Software DevelopmentFree Libre Open Source Software Development
Free Libre Open Source Software Development
Frederik Questier
 
MFP Hard Drive Security
MFP Hard Drive SecurityMFP Hard Drive Security
MFP Hard Drive Security
DianaElarde
 
ESET_SECURE_ENTERPRISE_DATASHEET
ESET_SECURE_ENTERPRISE_DATASHEETESET_SECURE_ENTERPRISE_DATASHEET
ESET_SECURE_ENTERPRISE_DATASHEET
ESET Belgique & Luxembourg
 
Anti forensics-techniques-for-browsing-artifacts
Anti forensics-techniques-for-browsing-artifactsAnti forensics-techniques-for-browsing-artifacts
Anti forensics-techniques-for-browsing-artifacts
gaurang17
 
Windows 7 security enhancements
Windows 7 security enhancementsWindows 7 security enhancements
Windows 7 security enhancements
Narenda Wicaksono
 
V Pro Bp08505 Phase Ii Edited
V Pro Bp08505 Phase Ii EditedV Pro Bp08505 Phase Ii Edited
V Pro Bp08505 Phase Ii Edited
SHC
 
V Pro Bp08505 Phase Iii Edited
V Pro Bp08505 Phase Iii EditedV Pro Bp08505 Phase Iii Edited
V Pro Bp08505 Phase Iii Edited
SHC
 

What's hot (19)

Building Trust Despite Digital Personal Devices
Building Trust Despite Digital Personal DevicesBuilding Trust Despite Digital Personal Devices
Building Trust Despite Digital Personal Devices
 
Blancco Removable Media Eraser
Blancco Removable Media EraserBlancco Removable Media Eraser
Blancco Removable Media Eraser
 
Trustworthy Records Retention
Trustworthy Records Retention Trustworthy Records Retention
Trustworthy Records Retention
 
Security data sheet
Security data sheetSecurity data sheet
Security data sheet
 
TISA Pro-Talk_1-2554-K.Sommai_pci-dss
TISA Pro-Talk_1-2554-K.Sommai_pci-dssTISA Pro-Talk_1-2554-K.Sommai_pci-dss
TISA Pro-Talk_1-2554-K.Sommai_pci-dss
 
Iron key h350-datasheet
Iron key h350-datasheetIron key h350-datasheet
Iron key h350-datasheet
 
Asterisk High Availability Design Guide
Asterisk High Availability Design GuideAsterisk High Availability Design Guide
Asterisk High Availability Design Guide
 
Security and privacy
Security and privacySecurity and privacy
Security and privacy
 
Chap11
Chap11Chap11
Chap11
 
Chap11
Chap11Chap11
Chap11
 
Clape n
Clape nClape n
Clape n
 
Anti-Forensic Rootkits
Anti-Forensic RootkitsAnti-Forensic Rootkits
Anti-Forensic Rootkits
 
Free Libre Open Source Software Development
Free Libre Open Source Software DevelopmentFree Libre Open Source Software Development
Free Libre Open Source Software Development
 
MFP Hard Drive Security
MFP Hard Drive SecurityMFP Hard Drive Security
MFP Hard Drive Security
 
ESET_SECURE_ENTERPRISE_DATASHEET
ESET_SECURE_ENTERPRISE_DATASHEETESET_SECURE_ENTERPRISE_DATASHEET
ESET_SECURE_ENTERPRISE_DATASHEET
 
Anti forensics-techniques-for-browsing-artifacts
Anti forensics-techniques-for-browsing-artifactsAnti forensics-techniques-for-browsing-artifacts
Anti forensics-techniques-for-browsing-artifacts
 
Windows 7 security enhancements
Windows 7 security enhancementsWindows 7 security enhancements
Windows 7 security enhancements
 
V Pro Bp08505 Phase Ii Edited
V Pro Bp08505 Phase Ii EditedV Pro Bp08505 Phase Ii Edited
V Pro Bp08505 Phase Ii Edited
 
V Pro Bp08505 Phase Iii Edited
V Pro Bp08505 Phase Iii EditedV Pro Bp08505 Phase Iii Edited
V Pro Bp08505 Phase Iii Edited
 

Similar to CYBERdisk WORMdisk SLIDES 2016-HACK PROOF DATA

Brochure Imperva Vormetric
Brochure Imperva VormetricBrochure Imperva Vormetric
Brochure Imperva Vormetric
Michelle Guerrero Montalvo
 
Security.pdf
Security.pdfSecurity.pdf
Introduction to Security (Hardware, Software, Data & Policies)
Introduction to Security (Hardware, Software, Data & Policies)Introduction to Security (Hardware, Software, Data & Policies)
Introduction to Security (Hardware, Software, Data & Policies)
Amr Salah
 
Webinar: Ransomware - Five Reasons You’re Not As Protected As You Think
Webinar: Ransomware - Five Reasons You’re Not As Protected As You ThinkWebinar: Ransomware - Five Reasons You’re Not As Protected As You Think
Webinar: Ransomware - Five Reasons You’re Not As Protected As You Think
Storage Switzerland
 
Role of a Forensic Investigator
Role of a Forensic InvestigatorRole of a Forensic Investigator
Role of a Forensic Investigator
Agape Inc
 
TP564_DriveTrust_Oct06
TP564_DriveTrust_Oct06TP564_DriveTrust_Oct06
TP564_DriveTrust_Oct06
Tyson Supasatit
 
IT security solutions
IT security solutionsIT security solutions
IT security solutions
Mechsoft Technologies LLC
 
501 ch 5 securing hosts and data
501 ch 5 securing hosts and data501 ch 5 securing hosts and data
501 ch 5 securing hosts and data
gocybersec
 
Data security
Data securityData security
Data security
sbmiller87
 
Information Security Lesson 13 - Advanced Security - Eric Vanderburg
Information Security Lesson 13 - Advanced Security - Eric VanderburgInformation Security Lesson 13 - Advanced Security - Eric Vanderburg
Information Security Lesson 13 - Advanced Security - Eric Vanderburg
Eric Vanderburg
 
B sep ds-21194634.en-us
B sep ds-21194634.en-usB sep ds-21194634.en-us
B sep ds-21194634.en-us
Pelos TCHIKAYA
 
Enterprise Security in Mainframe-Connected Environments
Enterprise Security in Mainframe-Connected EnvironmentsEnterprise Security in Mainframe-Connected Environments
Enterprise Security in Mainframe-Connected Environments
Precisely
 
Cyber security event
Cyber security eventCyber security event
Cyber security event
Tryzens
 
Vaultize corp three-pager v14
Vaultize corp three-pager v14Vaultize corp three-pager v14
Vaultize corp three-pager v14
Sameer (Sam) Vitkar
 
Brochure Imperva Securesphere Vormetric Encryption
Brochure Imperva Securesphere Vormetric EncryptionBrochure Imperva Securesphere Vormetric Encryption
Brochure Imperva Securesphere Vormetric Encryption
Michelle Guerrero Montalvo
 
Invited Talk - Cyber Security and Open Source
Invited Talk - Cyber Security and Open SourceInvited Talk - Cyber Security and Open Source
Invited Talk - Cyber Security and Open Source
hack33
 
Securing Your Digital Files from Legal Threats
Securing Your Digital Files from Legal ThreatsSecuring Your Digital Files from Legal Threats
Securing Your Digital Files from Legal Threats
Abbie Hosta
 
Protecting Your Key Asset – Data Protection Best Practices V2.0 Final
Protecting Your Key Asset – Data Protection Best Practices V2.0   FinalProtecting Your Key Asset – Data Protection Best Practices V2.0   Final
Protecting Your Key Asset – Data Protection Best Practices V2.0 Final
Vinod Kumar
 
Come gestire l'encryption dei dati con SKLM
Come gestire l'encryption dei dati con SKLMCome gestire l'encryption dei dati con SKLM
Come gestire l'encryption dei dati con SKLM
Luigi Perrone
 
XPDS16: Hypervisor Enforced Data Loss Prevention - Neil Sikka, A1LOGIC
XPDS16: Hypervisor Enforced Data Loss Prevention - Neil Sikka, A1LOGICXPDS16: Hypervisor Enforced Data Loss Prevention - Neil Sikka, A1LOGIC
XPDS16: Hypervisor Enforced Data Loss Prevention - Neil Sikka, A1LOGIC
The Linux Foundation
 

Similar to CYBERdisk WORMdisk SLIDES 2016-HACK PROOF DATA (20)

Brochure Imperva Vormetric
Brochure Imperva VormetricBrochure Imperva Vormetric
Brochure Imperva Vormetric
 
Security.pdf
Security.pdfSecurity.pdf
Security.pdf
 
Introduction to Security (Hardware, Software, Data & Policies)
Introduction to Security (Hardware, Software, Data & Policies)Introduction to Security (Hardware, Software, Data & Policies)
Introduction to Security (Hardware, Software, Data & Policies)
 
Webinar: Ransomware - Five Reasons You’re Not As Protected As You Think
Webinar: Ransomware - Five Reasons You’re Not As Protected As You ThinkWebinar: Ransomware - Five Reasons You’re Not As Protected As You Think
Webinar: Ransomware - Five Reasons You’re Not As Protected As You Think
 
Role of a Forensic Investigator
Role of a Forensic InvestigatorRole of a Forensic Investigator
Role of a Forensic Investigator
 
TP564_DriveTrust_Oct06
TP564_DriveTrust_Oct06TP564_DriveTrust_Oct06
TP564_DriveTrust_Oct06
 
IT security solutions
IT security solutionsIT security solutions
IT security solutions
 
501 ch 5 securing hosts and data
501 ch 5 securing hosts and data501 ch 5 securing hosts and data
501 ch 5 securing hosts and data
 
Data security
Data securityData security
Data security
 
Information Security Lesson 13 - Advanced Security - Eric Vanderburg
Information Security Lesson 13 - Advanced Security - Eric VanderburgInformation Security Lesson 13 - Advanced Security - Eric Vanderburg
Information Security Lesson 13 - Advanced Security - Eric Vanderburg
 
B sep ds-21194634.en-us
B sep ds-21194634.en-usB sep ds-21194634.en-us
B sep ds-21194634.en-us
 
Enterprise Security in Mainframe-Connected Environments
Enterprise Security in Mainframe-Connected EnvironmentsEnterprise Security in Mainframe-Connected Environments
Enterprise Security in Mainframe-Connected Environments
 
Cyber security event
Cyber security eventCyber security event
Cyber security event
 
Vaultize corp three-pager v14
Vaultize corp three-pager v14Vaultize corp three-pager v14
Vaultize corp three-pager v14
 
Brochure Imperva Securesphere Vormetric Encryption
Brochure Imperva Securesphere Vormetric EncryptionBrochure Imperva Securesphere Vormetric Encryption
Brochure Imperva Securesphere Vormetric Encryption
 
Invited Talk - Cyber Security and Open Source
Invited Talk - Cyber Security and Open SourceInvited Talk - Cyber Security and Open Source
Invited Talk - Cyber Security and Open Source
 
Securing Your Digital Files from Legal Threats
Securing Your Digital Files from Legal ThreatsSecuring Your Digital Files from Legal Threats
Securing Your Digital Files from Legal Threats
 
Protecting Your Key Asset – Data Protection Best Practices V2.0 Final
Protecting Your Key Asset – Data Protection Best Practices V2.0   FinalProtecting Your Key Asset – Data Protection Best Practices V2.0   Final
Protecting Your Key Asset – Data Protection Best Practices V2.0 Final
 
Come gestire l'encryption dei dati con SKLM
Come gestire l'encryption dei dati con SKLMCome gestire l'encryption dei dati con SKLM
Come gestire l'encryption dei dati con SKLM
 
XPDS16: Hypervisor Enforced Data Loss Prevention - Neil Sikka, A1LOGIC
XPDS16: Hypervisor Enforced Data Loss Prevention - Neil Sikka, A1LOGICXPDS16: Hypervisor Enforced Data Loss Prevention - Neil Sikka, A1LOGIC
XPDS16: Hypervisor Enforced Data Loss Prevention - Neil Sikka, A1LOGIC
 

CYBERdisk WORMdisk SLIDES 2016-HACK PROOF DATA

  • 1. * 2016 UNCLASSIFIED 1 Continuous Cyber-Defense for Data & Systems *HACK PROOF DATA is a reality *Security Beyond The Firewall *SURVIVABLE DATA *Prevent a SONY Type of Attack
  • 2. Bring AwarenessBring Awareness -- WORMdisk™ is a new Cyber-Defense approach to rapidly Strengthen National Systems & National Data Assets against various types of Cyber-Attacks. Keep Systems OperationalKeep Systems Operational - Protect data & OS boot disks. Prevent Sony-type attacks on vulnerable parts of OS disks. Systems survive the attack and remain operational. Maintain DataMaintain Data IIntegrityntegrity - Protect against static data manipulation, deletion, modification, re-formatting. Data survives the attack. Trust & confidence in your data. Objective - Confidence in DataObjective - Confidence in Data •• Secure:Secure: Protection is in the disk itself, and cannot be bypassed. •• Protects:Protects: Against Ransomware, firmware attacks, insider threats, accidental errors. •• Interfaces:Interfaces: Standard Disk Drive to Windows, Linux, Mac OS X, VMware and others. •• Simple:Simple: Easy to use as any disk, standard interfaces, file systems, and file formats. •• Existing Apps:Existing Apps: Plug and Play, Drag and Drop, Copy-To, Save-As. •• DeploymentDeployment:: Fast, easy, rapid install. From a single disk, up to Big Data solutions. 2
  • 3. WHAT is a WORMdisk™?WHAT is a WORMdisk™? • Why do I need a WORMdisk™? To protect your static data from manipulation, modification, alteration, deletion or re- formatting. Typical uses include data that must be retained for financial, medical, legal, PII data, contracts, corporate, documents, surveillance, law enforcement, reference material, content libraries, archives and data backups. • Why do I need a CYBERdisk™? To protect sensitive parts of boot disks from cyber-attacks such as the SONY and Aramco attacks & firmware attacks. Windows, MAC OS X, Linux and VMware may be installed and protected on CYBERdisks™. • What type of Cyber-Attacks are prevented? Data manipulation, deletion, alteration, modification, re-formatting, unauthorized DNI Gen James Clapper testified at the U.S. Cybersecurity Policy for the Senate Armed Services Committee on September 29, 2015 that one of his biggest concerns is Data Manipulation & Integrity of the Data. WORMdisks™ prevent Data Manipulation to provide Data Confidence and Data Integrity. • What type of Cyber-Attacks are prevented? Data manipulation, deletion, alteration, modification, re-formatting, unauthorized encryption, Ransomware, MBR attacks and undetectable firmware viruses are prevented. • What happens if a hacker tries to attack my data? If a hacker gets into your system, WORMdisks™ will give them I/O errors when they try to change or delete your data. Ransomware will fail, firmware viruses will abort and “delete” and “format” commands will fail. • How does WORMdisk™ secure data? WORMdisks™ are much more secure than conventional host-based security since the protection is inside the disk itself. Data protection is standalone in the disk and travels with the disk. It cannot be bypassed regardless of user permissions or the operating system being used. • Will WORMdisks™ support my applications? WORMdisks™ work with existing applications the same way other disks do. • How do I use WORMdisks™? They are used like other disks and may be local SATA, eSATA, USB, NAS/SAN network attached, or used as Cloud WORMdisk™ storage. WORMdisks™ easily integrate into existing systems and operate like existing disks. • Do WORMdisks™ support encryption? WORMdisks™ support FIPS 140-2 encryption technology, so in addition to protection from data manipulation , modification or deletion, data is also protected from disclosure. 3
  • 4. GreenTec-USA, Secure KnowledgeGreenTec-USA, Secure Knowledge • A high performance data security technology company • Serving Intelligence, Defense and Law Enforcement Communities • Agile rapid in-house Software, Hardware, Systems, Security & Metal Fab • Solving difficult security and defense technical problems since 2005 – Established 2005 for performance hardware solutions. Background of 30+ years in the Intelligence Community, DoD, federal civilian agencies and commercial organizations – Self replicating, patented 4-tier data protected RAID 61+1™ – On-board supercomputer processing and storage for Volumetric Synthetic Aperture Radar (VSAR) Miniaturization program for IED detection. Hi-Synthetic Aperture Radar (VSAR) Miniaturization program for IED detection. Hi- performance, low-energy, low-heat signature, lightweight. Flight-worthiness tested (high- altitude, vibration, shock, -4 o F to 128 o F ops, humidity range, RF emanations & bombardment) – “Lego-like” re-configurable, modular Processor Blocks, Storage Blocks, Video Blocks, Sensor Blocks, from datacenter to mobile to avionics. – Hardware-level Write Once Read Many (WORM) protection from data modification and viruses. – Protects Master Boot Record (MBR) and Partition Information from deletion, overwriting or modification protecting the OS disk from Sony-type attacks. – Co-Marketing agreement with Seagate to deliver WORMdisk™ products to Government and Commercial markets. 4
  • 5. National Cyber-Security Protection System (DHS) Gateway Security Devices/Firewalls Desktop/Laptops/Mobile Devices Wide Area Network Local Area Network Datacenters and Servers Your Last Line of DefenseYour Last Line of Defense When perimeters are penetrated, access controls or authentication methods are compromised . . . CYBERdisk & WORMdisk provide vigilant continuous protection as the last line of defense against cyber-attacks. 5 Protects data at the coreProtects data at the core--levellevel inside the disk hardwareinside the disk hardware
  • 6. WORMdisk™ Data Integrity for Mission Critical Systems Securing the MissionSecuring the Mission Defending Our National IT Infrastructure • Combat Support Systems • Logistics & Supply Chain • Communications Systems • Command and Control Systems • Air, Ground & Sea Defense Systems • Sensors and Intelligence Collections • Utilities and Power Grid • Industrial Control Systems 6 • Utilities and Power Grid • Industrial Control Systems • Financial Infrastructure • Acquisition Systems • Medical Systems • Personnel Records • Forward Operating Base (FOB) Deployments • Training Reference Material • DoD 5015.2 Electronic Records Compliance • Mobile Cloud –based Systems
  • 7. CYBERdisk™ and WORMdisk™CYBERdisk™ and WORMdisk™ Key Features: • Drastically increases Data Integrity and System Integrity • CYBERdisks™ protect sensitive parts of system boot disks from cyber-attacks & firmware attacks • WORMdisks™ protect static data files from manipulation, modification, alteration, deletion or re-formatting Key Benefits: • Immediate protection of computer systems MBR (Master Boot Record), GPT and Partition Tables from Malware such as the Equation Group Virus which current cyber protections fail to detect or remove. • Prevents Ransomware encrypting data files and holding you hostage forcing you to pay a ransom to decrypt data • Data is permanently protected from both disclosure and modification or deletion. • Inexpensive, low CapEx, low OpEx. Easy to use and deploy. Supports native file systems and file formats.• Inexpensive, low CapEx, low OpEx. Easy to use and deploy. Supports native file systems and file formats. • Uses standard computer disk interfaces (SATA, eSATA, USB), plug and play. • Functions like a typical hard disk drive; connect, drag & drop, save-as, copy, etc. • Supports workstations, laptops, servers and the cloud. • Read and write from Windows, Linux, Mac OS X & VMware. • WORMdisks™ may be used as local disks or as NAS, SAN, CIFS, NFS, SAMBA, iSCSI, etc. • Supports one-to-one and one-to-many local or remote mirrors. • Scalable from 500GB up to 4.1PB in a standard 19” rack. • No performance impact. Full disk speed access for data read and write. • Internal disks, external disks and rack mount configurations. • Reduces demands on overburdened skilled cyber-staff. Security team can focus on other cyber-threats. 7
  • 8. Protected Audit Logs CYBERdisk™ and WORMdisk™ Protected EnvironmentsCYBERdisk™ and WORMdisk™ Protected Environments WORMdisk™ Secure Local D: Drive OS Boot CYBERdisk™ WORMdisk™ Secure Network Data 8
  • 9. Today’s ChallengesToday’s Challenges Challenges we face today that can be mitigated with WORMdisks™ Cyber-Attacks • Cyber threats, malware and viruses are damaging, manipulating and disclose important data. • Ransomware encrypts user data files and holds you hostage, forcing you to pay a ransom to get data back. • Data damage and disclosure from the Equation Group Virus and other cyber-attacks. • Data is not fully protectable with current technology, and data can still be erased even when encrypted. Data Loss & Manipulation • Insider tampering, disgruntled employees, cyber-espionage. • Accidental Overwrites and deletions. • Data Loss and data compromise prevention (Onsite, Mobile and Cloud). • Assure system integrity and reliability.• Assure system integrity and reliability. Digital Records Management • Electronic data compliance and regulatory requirements (DoD 5015.2, NARA, Capstone, HIPAA, NRC, SOX) • Current expensive and complex compliance solutions do not support native file formats and are difficult to administer, requiring software and appliances. Data is not protected when it is removed from the appliance. • Records and original digital evidence require protection and permanence beyond policy based approaches. • The costly demands of secure electronic records sharing and transportation. Processes and Procedures are Complex, Costly and Error-prone • Costly preparation of digital electronic records for compliance, governance and legal action. • Chain-of-custody requires complex handling, storage and transportation for digital evidence. • Improper handling of sensitive data not stored in secure locations may be manipulated by outsiders. • Maintain long-term protection and accessibility for archives. 9
  • 10. Continuous Cyber-SecurityContinuous Cyber-Security Securely create, access & backup data from Workstations, Laptops, Mobile & Servers Secure disk, folder and file access from anywhere Workstations, laptops, mobile devices Headquarters Data Center Servers & Databases DR Offsite Storage Archive or Mirror for Disaster Recovery 10 CLOUD Storage Maps data to specific WORMdisk™
  • 11. • WORMdisk™ was initially developed for DOJ requirements for immutable video surveillance data to be defensible in court. • GreenTec-USA developed the WORMdisk™ in conjunction with Seagate for Data and Cyber Defense solutions. Full Seagate Warranty and Support. • Secure WORM storage solutions for mobile, workstations, servers, and the Cloud. • WORMdisk™ available on GSA Schedule 70, NASA SEWP, CIO-CS and other vehicles. Trusted Partnerships and SupportTrusted Partnerships and Support • WORMdisk™ available on GSA Schedule 70, NASA SEWP, CIO-CS and other vehicles. • Scalable from 500G and beyond Petabytes for Big Data solutions. • Integrated enterprise WORMdisk™ management applications and APIs. • Easy to use GUIs and Web-based management tools for remote monitoring, tracking and administration. • Trade Agreement Act (TAA) Compliant, manufactured in the USA. • COTS solution available now. Partnering with large systems integrators for rapid global deployment and support. 11
  • 12. 1. Create, ingest, copy, and tag documents, files, folders, images, video, audio, database exports, etc. • Catalog WORMdisk™ SerialNo, Location, Status, POC, Purge Date & Metadata Tags • Process Mount and Un-mount for Online/Offline and Warehousing • Automated Purge Date Processing • Notify Users via Email or Text Catalog Manager (CatMan) WORMdisk™ User Workstations & Servers Search, Mount, Un-mount & Purge Requests Status Notification Typical WORMdisk™ WorkflowTypical WORMdisk™ Workflow WORM Storage Servers (WSS) Local or Remote WORMdisk™ Online Library WORMdisk™ Warehouse 4. Mount to Online 12 WORMdisk™ CLOUD Enterprise Roles for User, Operator, Administrator & Security Officer
  • 13. Status of WORM Storage Servers (WSS) Highlights in red when WSS down WORMdisk™ Catalog Manager (CatMan™)WORMdisk™ Catalog Manager (CatMan™) Shows WORMdisk™ location, status and user metadata fields Edit and Search on any data field 13
  • 14. Immutable Chain-of-Custody and Workflow for Secure Content Delivery Availability:Availability:Availability:Availability: Any DeviceAny DeviceAny DeviceAny DeviceIntegration:Integration:Integration:Integration: Any ApplicationAny ApplicationAny ApplicationAny Application Centralization: InformationCentralization: InformationCentralization: InformationCentralization: Information Workflow for RecordsWorkflow for RecordsWorkflow for RecordsWorkflow for Records Example of WORMdisks™ Integrated into ECMExample of WORMdisks™ Integrated into ECM CaptureCaptureCaptureCapture ArchiveArchiveArchiveArchiveHoldHoldHoldHoldRetainRetainRetainRetainManageManageManageManageClassifyClassifyClassifyClassify DisposeDisposeDisposeDispose Enterprise Disk/Enterprise Disk/Enterprise Disk/Enterprise Disk/ Solid State DiskSolid State DiskSolid State DiskSolid State Disk SAN/NASSAN/NASSAN/NASSAN/NAS DiskDiskDiskDisk Content AddressableContent AddressableContent AddressableContent Addressable Storage(CAS)Storage(CAS)Storage(CAS)Storage(CAS) Open Text Content Suite 14
  • 15. CatMan™ Enterprise Web Application • Awareness of WORMdisks™ on all WORM Storage Servers in the domain. • Electronic library provides metadata and locates WORMdisks™ after being placed in storage Standalone browser content manifest. GT_WinStatus WORM Storage Server™ (WSS) GUI • Manages individual WORM Storage Servers (WSS) • Knows when WORMdisk™ is inserted and removed. Provides WORMdisk™ status , control & threshold warnings • Displays WORMdisk™ rack location, disk#, physical & SCSI mapping • Monitors WORMdisk™ and generates visual high-lighting, email and SMS text messages when getting full • Interfaces with CATMAN™ and processes mount & un-mount user requests for Online, Nearline, Offline and Archive transitions 100 Year Archive, Tracking and Storage100 Year Archive, Tracking and Storage CYBERvault™ Physical storage service for WORMdisks™ WORMdisk™ at rest has 100 year life expectancy* *as tested by Seagate Technologies 15
  • 16. Contact InformationContact Information Ready for Deployment Today GreenTec-USA, Inc. 11720 Sunrise Valley Dr., LL-02 Reston, VA 20191Reston, VA 20191 info@greentec-usa.com http://www.DataDefenseNow.com (703) 880-8332 16