SlideShare a Scribd company logo
1 of 54
Download to read offline
Innovations in cyber security technologies

Arturs Filatovs
Business Development
Manager
March 2014
Arrow ECS RoadShow Baltics

Symantec Encryption –
Building A
Digital Fortress
Arturs Filatovs business card

More then 5 years experience in delivering Innovative
IT Security Solutions to Baltic states
Knowledge of more then 25 different IT Security
Solutions
Specialization - Mobile IT Security
Lets move our hands – who is here today?

CISO

Director, Desktop Ops

Director, Network Ops

Helpdesk Manager
Todays To do list

“Data Security Solutions” role in Baltics
Technology vs. Time
Encryption’s role in security
Don't be scared – Encrypt everything
Build Digital fortress with Symantec Tech
“Data Security Solutions” business card

Specialization – IT Security
IT Security services (consulting,
audit, pen-testing, market analysis,
system testing and integration,
training and technical support)
Solutions and experience portfolio
with more than 20 different
technologies – cyber-security global
market leaders from more than 10
countries
Trusted services provider for
banks,
insurance
companies,
government and private companies
(critical infrastructure etc.)
Role of DSS in Cyber-security
Development in Baltics
Cyber-Security Awareness Raising
Technology and knowledge transfer
Most Innovative Portfolio
Trusted Advisor to its Customers
Cybersecurity Awareness Raising

Own organized conference “DSS ITSEC”
5th annual event this year
More than 400 visitors and more than 250 online
live streaming watchers from LV, EE, LT
4 parallel sessions with more than 40
international speakers, including Microsoft, Oracle,
Symantec, IBM, Samsung and many more –
everything free of charge
Participation in other events & sponsorship
CERT & ISACA conferences
RIGA COMM exhibition & conferences
Roadshows and events in Latvia / Lithuania /
Estonia (f.i. Vilnius Innovation Forum, Devcon,
ITSEC HeadLight, SFK, business associations)
Participation in cyber security discussions,
preparations, seminaries, publications etc.

strategy
Innovations – technology & knowledge transfer

Innovative Technology Transfer
Number of unique projects done with
different technology global leadership
vendors
Knowledge transfer (own employees,
customers – both from private & public,
other IT companies)
Areas include:
Endpoint Security
Network Security
Security Management
Application Security
Mobile Security
Data Security
Cyber-security
Security Intelligence
Our portfolio is most innovative in Baltics!
Some just basic ideas
Lets Start
Time line

PAST
NOW
Technology is everywhere

AND NOW SERIOUSLY
PC era to MOBILE era

PC era

Mobile era
Consolidation of IT in 21st Century

We are at point where
functionality of desktop collides
with mobility of mobile device.

Mobile IT
Technology development over time
IT Must Evolve To Meet New Demands

InformationCentric
System-Centric

• Collaborative Apps and Social
Media
• Transactional Apps

• Unstructured data

• Structured Data

• Distributed information

• Centralized information

• People are the new perimeter

• Perimeter-based security

• Virtual Infrastructure and Cloud

• On-premise infrastructure
Endpoints: The Borderless Enterprise

Field

Data Center

Headquarters

Field Offices

Point
of Sale

Point
of Sale

$262 Million: Estimated cost of
the Heartland Payment Systems
breach1
1Based

Global Internet Security Threat Report, Trends for 2008

Customer email
stored on mobile
phone

12,000 Laptops lost
in United States
airports every week2

Trojans, malware, unauthorized 1 in 10 people have lost a laptop, smart
software
phone, or USB drive with corporate
information on it3

on 130,000,000 records lost (Datalossdb.org) and $202 per record (Ponemon Institute)

3Symantec

Corporate data
copied onto USB
drive

2http://www.darkreading.com/security/encryption/showArticle.jhtml?articleID=211201139
Cloud is taking us much higher…
Choose the right cloud smart way..
Passwords?
When we have to change our password...
Some questions?

Who from you are using encryption?
What will happen if data will be lost/stolen?
Who will be responsible?
When you are sending confidential data via post, how
do you secure it?
Encryption beginnings – Sparta/ Greeks/ Rome

Greek generals used Scytel to encrypt and decrypt
messages (Symmetric encryption)
In what our organizations believe today

SSL/ TLS/ VPN/ HTTPS – this is only
data in motion using x.509
What we use for document security

E-Signatures – Limited functionality for
document encryption data at rest/ data in motion
Not User friendly (smart cards, Card readers,
USB tokens … )
Separate solutions less security
NSA did “great work…”

Hmmm....NSA?
Cyber criminals don't sleep
Encryption threats by Ponemon Institute

Our Users are our weakest link
Mobility - Potential For Data Loss

47% of corporate
data resides on
mobile devices

43% of employees
lost a device with
company data

32% of employees didn’t report the loss or theft in a timely fashion
Our users weakest link

1 in 10

people have lost a laptop,
smart phone, or USB drive with
corporate information on it*

32%

of employees didn’t report the
loss or theft in a timely fashion*
*Symantec Global Internet Security Threat Report
Data protection priorities Ponemon
Concerns from customer side

Hardware-based encryption is
faster and it’s an option on Dell
and other PCs.
Why do I need encryption if I
have
DLP
or
Endpoint
monitoring?
We are going to wait for our
Windows 7 rollout in our
environment and use Bit locker
How to recover encrypted
info?
Master key is security risk for
us.
Encryption is not a rocket science
Encryption is easy
Centralized key administration is solution
Products

Tasks Objectives

Don't be scared – Encrypt everything

Keep data secure
Meet compliance objectives
Protect data at rest

Protect the business
Control costs and liabilities

Protect data in motion

Protect data in use

Endpoint Data
Protection

File and Server
Protection

Email
Protection

• PGP Whole Disk
Encryption

• PGP NetShare

• PGP Desktop Email

• PGP Command Line

• PGP Gateway Email

• SEE FDE
• SEE RSE

• PGP PDF Messenger

• PGP Portable

• PGP Support Package
for BlackBerry

• SEE Device Control

• PGP Mobile

Management
• PGP Universal Server
• PGP Key Management
Server
Oh Boy do we

got solution for you!
Build Digital fortress with Symantec
Full Disk Encryption (FDE)
• PGP® Whole Disk Encryption
• Symantec Endpoint Encryption (EE) FDE

Device and Media Encryption
• PGP Portable
• SEE Removable Storage Edition (RSE)
• SEE Device Control

FTP/Batch and Backups
• PGP® Command Line

Management
Central Management of
Encryption Applications
PGP® Universal ™ Server

File/Folder/Shared Server Encryption
• PGP® NetShare

Gateway Email Encryption
• PGP® Gateway Email

End-End Email and IM Encryption

Key Management

PGP® Key Management
Server (KMS)

• PGP® Desktop Email

Smartphone Solutions
• PGP® Mobile
• PGP® Support Package for BlackBerry®
42
Full Disk Encryption

Full disk encryption for desktops, laptops, and
Windows® servers. Supports Windows®, Mac
OS® X, and Linux® platforms
• Encrypts desktops, laptops, and USB-attached drives
• Protects against personal computer loss,
theft, compromise and improper disposal
• Reduces risk of loss of
PII (Personally Identifiable Information)
and other sensitive data
• Supports Windows, Mac OS X, and Linux

PGP Whole Disk Encryption; SEE Full Disk
Encryption

43
Removable Media Protection

Removable Storage Encryption
• Secure portable data at rest
– Enforce mandatory removable

storage encryption policies
– Access and re-encrypt data from any
PC or Mac

Centralized – Integrated
Management Console

Policies

Auditing

• Granular file- and folder-based

encryption

– Allow encrypted and unencrypted

data on user devices
– Enforce policy-controlled exemptions
by file type and device
SEE Removable Storage Encryption

Removable
Media
Encryption
PGP® Email Protection

PGP® Desktop Email

PGP Universal™
Gateway Email
PGP®®PDF Messenger
PGP Viewer for iOS

PGP® Support Package
for BlackBerry®

Desktop-based Email Encryption
• Automatic end-to-end email encryption

Gateway-based Email Encryption
• Clientless email encryption

Encrypted Email Viewer App for iOS
• Decrypts and views messages
• Verifies digital signatures

Encryption for BlackBerry Email
• Native client access to encrypted email

Encryption for Windows Mobile Devices
PGP®

Mobile

Symantec Encryption - Confidential

• Encrypted Email
• Encrypted Files and Folders

45
File/Folder Encryption

Distributed file protection
Shared file protection
User file protection

Protect individual files and folders
Protect shared files and folders
Protect transferred files and folders

PGP NetShare, PGP Command Line
46
PGP® File and Server Protection

PGP® NetShare

PGP® Command
Line

Shared File Protection
• Protect data exchanged between users via shared
network folders

Scriptable Encryption
• Integrate encryption into data transfer, data
distribution and data backup processes
PGP or Symantec Endpoint Encryption?
Products

Exceptions
Customer Need

Default Play

Existing
SEE/GE
Customer

DAR U.S.
Fed
SmartBuy

Active Directory +
MSFT Stack

PGP Whole Disk Encryption
PGP Portable

SEE Removable Storage Encryption

SEE Device Control

Endpoint Encryption

SEE Full Disk Encryption
SEE Device Control

PGP Desktop Email
Email Encryption

PGP Gateway Email
PGP Mobile
PGP Support Package for BlackBerry

Server / File Encryption
Management

PGP NetShare
PGP Command Line
PGP Universal Server and PGP Key Management Server (KMS)

• Symantec’s strategic direction for Endpoint Encryption is to “converge” the solutions into a single offering.
• In the interim, Symantec will provide full support for both Endpoint Encryption technologies.
Selling Symantec Encryption Products

48
Defense-In-Depth: Encryption + DLP

Network DLP / Gateway Encryption
• Automatically encrypt emails containing sensitive data
• Notify employees in real time/context about encryption policies and tools

Storage DLP / File-Based Encryption
• Discover where confidential data files are stored and automatically apply
encryption
• Ease the burden to IT staff with near transparence to users

Endpoint DLP / Removable Storage Encryption
• Target high risk users by discovering what laptops contain sensitive data
• Protect AND enable the business by targeting encryption efforts to
sensitive data moving to USB devices
DLP + PGP Universal Gateway Email
5 Email encrypted and sent

1 Receive email

MTA or Proxy

PGP Universal Server

4 Violation detected - re-route
to encryption server
2 Check email content
for encryption policy
violations

3 No violation - email sent

Key Benefits:
• Automate gateway encryption; ease burden on end users
• Enforce and report on encryption policies
Complete Encryption Platform
Takeaway

Technology lifecycle from 3-6 year to 6-12 months
Encryption will help you sleep tight
Don’t be scared to encrypt all type of data
Centralized key management is important
One encryption solution for different type of date
Select DSS as your trusted security advisor – we
work with Symantec (PGP) more than 5 years already!!
Think security first

www.dss.lv
info@dss.lv
+371 27194080 / +371 29162784
Think security first

More Related Content

What's hot

ESET: Delivering Benefits to Enterprises
ESET: Delivering Benefits to EnterprisesESET: Delivering Benefits to Enterprises
ESET: Delivering Benefits to EnterprisesESET
 
DataLockerOverview vs 3.9 Final_120715
DataLockerOverview vs 3.9 Final_120715DataLockerOverview vs 3.9 Final_120715
DataLockerOverview vs 3.9 Final_120715Patrick Eyberg
 
Secure Email Communications from Symantec
Secure Email Communications from SymantecSecure Email Communications from Symantec
Secure Email Communications from SymantecArrow ECS UK
 
ESET: Delivering Benefits to Medium and Large Businesses
ESET: Delivering Benefits to Medium and Large BusinessesESET: Delivering Benefits to Medium and Large Businesses
ESET: Delivering Benefits to Medium and Large BusinessesESET
 
SafeNet DataSecure vs. Native SQL Server Encryption
SafeNet DataSecure vs. Native SQL Server EncryptionSafeNet DataSecure vs. Native SQL Server Encryption
SafeNet DataSecure vs. Native SQL Server EncryptionSafeNet
 
MT 68 Hunting for the Threat: When You Don’t Know If You’ve Been Breached
MT 68 Hunting for the Threat: When You Don’t Know If You’ve Been Breached MT 68 Hunting for the Threat: When You Don’t Know If You’ve Been Breached
MT 68 Hunting for the Threat: When You Don’t Know If You’ve Been Breached Dell EMC World
 
PCI Compliance Evolved
PCI Compliance EvolvedPCI Compliance Evolved
PCI Compliance EvolvedSafeNet
 
ESET is introducing its brand new product ESET Secure Authentication
ESET is introducing its brand new product ESET Secure AuthenticationESET is introducing its brand new product ESET Secure Authentication
ESET is introducing its brand new product ESET Secure AuthenticationESET
 
Make the Upgrade: Data protection in the cloud
Make the Upgrade: Data protection in the cloudMake the Upgrade: Data protection in the cloud
Make the Upgrade: Data protection in the cloudErik Von Schlehenried
 
Jms secure data presentation
Jms secure data  presentationJms secure data  presentation
Jms secure data presentationJMS Secure Data
 
Technology Overview - Symantec IT Management Suite (ITMS)
Technology Overview - Symantec IT Management Suite (ITMS)Technology Overview - Symantec IT Management Suite (ITMS)
Technology Overview - Symantec IT Management Suite (ITMS)Iftikhar Ali Iqbal
 
ESET: #DoMore With Our Comprehensive Range of Business Products
ESET: #DoMore With Our Comprehensive Range of Business ProductsESET: #DoMore With Our Comprehensive Range of Business Products
ESET: #DoMore With Our Comprehensive Range of Business ProductsESET
 
Infowatch endpoint security
Infowatch endpoint securityInfowatch endpoint security
Infowatch endpoint securityhassan latifi
 
8 WAYS TO PROTECT THE DATA IN YOUR OFFICE: #4 Secure your office IoT
8 WAYS TO PROTECT THE DATA IN YOUR OFFICE: #4 Secure your office IoT8 WAYS TO PROTECT THE DATA IN YOUR OFFICE: #4 Secure your office IoT
8 WAYS TO PROTECT THE DATA IN YOUR OFFICE: #4 Secure your office IoTCanon Business CEE
 
Protect Your Sensitive Data with Gemalto Guidebook
Protect Your Sensitive Data with Gemalto Guidebook Protect Your Sensitive Data with Gemalto Guidebook
Protect Your Sensitive Data with Gemalto Guidebook Exclusive Networks ME
 
SafeNet - Data Protection Company
SafeNet - Data Protection CompanySafeNet - Data Protection Company
SafeNet - Data Protection CompanyASBIS SK
 
Zero footprint guest memory introspection from xen
Zero footprint guest memory introspection from xenZero footprint guest memory introspection from xen
Zero footprint guest memory introspection from xenBitdefender Enterprise
 
Cloud Security & Control: A Multi-Layer Approach to Secure Cloud Computing
Cloud Security & Control: A Multi-Layer Approach to Secure Cloud ComputingCloud Security & Control: A Multi-Layer Approach to Secure Cloud Computing
Cloud Security & Control: A Multi-Layer Approach to Secure Cloud ComputingOpSource
 
SafeNet Enterprise Key and Crypto Management
SafeNet Enterprise Key and Crypto ManagementSafeNet Enterprise Key and Crypto Management
SafeNet Enterprise Key and Crypto ManagementSectricity
 
Mudhrastec corporate brochur
Mudhrastec corporate brochur Mudhrastec corporate brochur
Mudhrastec corporate brochur Mudhrastec FZE
 

What's hot (20)

ESET: Delivering Benefits to Enterprises
ESET: Delivering Benefits to EnterprisesESET: Delivering Benefits to Enterprises
ESET: Delivering Benefits to Enterprises
 
DataLockerOverview vs 3.9 Final_120715
DataLockerOverview vs 3.9 Final_120715DataLockerOverview vs 3.9 Final_120715
DataLockerOverview vs 3.9 Final_120715
 
Secure Email Communications from Symantec
Secure Email Communications from SymantecSecure Email Communications from Symantec
Secure Email Communications from Symantec
 
ESET: Delivering Benefits to Medium and Large Businesses
ESET: Delivering Benefits to Medium and Large BusinessesESET: Delivering Benefits to Medium and Large Businesses
ESET: Delivering Benefits to Medium and Large Businesses
 
SafeNet DataSecure vs. Native SQL Server Encryption
SafeNet DataSecure vs. Native SQL Server EncryptionSafeNet DataSecure vs. Native SQL Server Encryption
SafeNet DataSecure vs. Native SQL Server Encryption
 
MT 68 Hunting for the Threat: When You Don’t Know If You’ve Been Breached
MT 68 Hunting for the Threat: When You Don’t Know If You’ve Been Breached MT 68 Hunting for the Threat: When You Don’t Know If You’ve Been Breached
MT 68 Hunting for the Threat: When You Don’t Know If You’ve Been Breached
 
PCI Compliance Evolved
PCI Compliance EvolvedPCI Compliance Evolved
PCI Compliance Evolved
 
ESET is introducing its brand new product ESET Secure Authentication
ESET is introducing its brand new product ESET Secure AuthenticationESET is introducing its brand new product ESET Secure Authentication
ESET is introducing its brand new product ESET Secure Authentication
 
Make the Upgrade: Data protection in the cloud
Make the Upgrade: Data protection in the cloudMake the Upgrade: Data protection in the cloud
Make the Upgrade: Data protection in the cloud
 
Jms secure data presentation
Jms secure data  presentationJms secure data  presentation
Jms secure data presentation
 
Technology Overview - Symantec IT Management Suite (ITMS)
Technology Overview - Symantec IT Management Suite (ITMS)Technology Overview - Symantec IT Management Suite (ITMS)
Technology Overview - Symantec IT Management Suite (ITMS)
 
ESET: #DoMore With Our Comprehensive Range of Business Products
ESET: #DoMore With Our Comprehensive Range of Business ProductsESET: #DoMore With Our Comprehensive Range of Business Products
ESET: #DoMore With Our Comprehensive Range of Business Products
 
Infowatch endpoint security
Infowatch endpoint securityInfowatch endpoint security
Infowatch endpoint security
 
8 WAYS TO PROTECT THE DATA IN YOUR OFFICE: #4 Secure your office IoT
8 WAYS TO PROTECT THE DATA IN YOUR OFFICE: #4 Secure your office IoT8 WAYS TO PROTECT THE DATA IN YOUR OFFICE: #4 Secure your office IoT
8 WAYS TO PROTECT THE DATA IN YOUR OFFICE: #4 Secure your office IoT
 
Protect Your Sensitive Data with Gemalto Guidebook
Protect Your Sensitive Data with Gemalto Guidebook Protect Your Sensitive Data with Gemalto Guidebook
Protect Your Sensitive Data with Gemalto Guidebook
 
SafeNet - Data Protection Company
SafeNet - Data Protection CompanySafeNet - Data Protection Company
SafeNet - Data Protection Company
 
Zero footprint guest memory introspection from xen
Zero footprint guest memory introspection from xenZero footprint guest memory introspection from xen
Zero footprint guest memory introspection from xen
 
Cloud Security & Control: A Multi-Layer Approach to Secure Cloud Computing
Cloud Security & Control: A Multi-Layer Approach to Secure Cloud ComputingCloud Security & Control: A Multi-Layer Approach to Secure Cloud Computing
Cloud Security & Control: A Multi-Layer Approach to Secure Cloud Computing
 
SafeNet Enterprise Key and Crypto Management
SafeNet Enterprise Key and Crypto ManagementSafeNet Enterprise Key and Crypto Management
SafeNet Enterprise Key and Crypto Management
 
Mudhrastec corporate brochur
Mudhrastec corporate brochur Mudhrastec corporate brochur
Mudhrastec corporate brochur
 

Viewers also liked

2014 - DSS - Mobile devices & security overview
2014 - DSS - Mobile devices & security overview2014 - DSS - Mobile devices & security overview
2014 - DSS - Mobile devices & security overviewAndris Soroka
 
2015 - The Cloud for Managers @ Riga Business School - DSS - Cloud risks and ...
2015 - The Cloud for Managers @ Riga Business School - DSS - Cloud risks and ...2015 - The Cloud for Managers @ Riga Business School - DSS - Cloud risks and ...
2015 - The Cloud for Managers @ Riga Business School - DSS - Cloud risks and ...Andris Soroka
 
2014 - Digital Era Seminary #1 - Agnese Bobovica - Datu drosiba veselibas nozare
2014 - Digital Era Seminary #1 - Agnese Bobovica - Datu drosiba veselibas nozare2014 - Digital Era Seminary #1 - Agnese Bobovica - Datu drosiba veselibas nozare
2014 - Digital Era Seminary #1 - Agnese Bobovica - Datu drosiba veselibas nozareAndris Soroka
 
2014 - Digital Era Seminary #1 - Arnis Puksts - Izmainas ES personas datu regula
2014 - Digital Era Seminary #1 - Arnis Puksts - Izmainas ES personas datu regula2014 - Digital Era Seminary #1 - Arnis Puksts - Izmainas ES personas datu regula
2014 - Digital Era Seminary #1 - Arnis Puksts - Izmainas ES personas datu regulaAndris Soroka
 
2014 - Digital Era Seminary #1 - Ivo Krievs - Datu drosiba darba vieta
2014 - Digital Era Seminary #1 - Ivo Krievs - Datu drosiba darba vieta2014 - Digital Era Seminary #1 - Ivo Krievs - Datu drosiba darba vieta
2014 - Digital Era Seminary #1 - Ivo Krievs - Datu drosiba darba vietaAndris Soroka
 
DSS @SFK International Conference - March 2014 - Quantifying Business Value o...
DSS @SFK International Conference - March 2014 - Quantifying Business Value o...DSS @SFK International Conference - March 2014 - Quantifying Business Value o...
DSS @SFK International Conference - March 2014 - Quantifying Business Value o...Andris Soroka
 
DSS ITSEC 2013 Conference 07.11.2013 - ISACA LATVIA IVO IVANOVS
DSS ITSEC 2013 Conference 07.11.2013  - ISACA LATVIA IVO IVANOVSDSS ITSEC 2013 Conference 07.11.2013  - ISACA LATVIA IVO IVANOVS
DSS ITSEC 2013 Conference 07.11.2013 - ISACA LATVIA IVO IVANOVSAndris Soroka
 
DSS ITSEC 2013 Conference 07.11.2013 - HeadTechnology - IT security trends 2014
DSS ITSEC 2013 Conference 07.11.2013  - HeadTechnology - IT security trends 2014DSS ITSEC 2013 Conference 07.11.2013  - HeadTechnology - IT security trends 2014
DSS ITSEC 2013 Conference 07.11.2013 - HeadTechnology - IT security trends 2014Andris Soroka
 
2015 Data Security Solutions @SFK - Working and living in digital work of future
2015 Data Security Solutions @SFK - Working and living in digital work of future2015 Data Security Solutions @SFK - Working and living in digital work of future
2015 Data Security Solutions @SFK - Working and living in digital work of futureAndris Soroka
 
2015 - Data Security Solutions @Dienas Bizness Exigen IBM - Business Data Pro...
2015 - Data Security Solutions @Dienas Bizness Exigen IBM - Business Data Pro...2015 - Data Security Solutions @Dienas Bizness Exigen IBM - Business Data Pro...
2015 - Data Security Solutions @Dienas Bizness Exigen IBM - Business Data Pro...Andris Soroka
 
2014 - Digital Era Seminary #1 - Sintija Deruma - Informacijas drosibas profe...
2014 - Digital Era Seminary #1 - Sintija Deruma - Informacijas drosibas profe...2014 - Digital Era Seminary #1 - Sintija Deruma - Informacijas drosibas profe...
2014 - Digital Era Seminary #1 - Sintija Deruma - Informacijas drosibas profe...Andris Soroka
 
Digitālā Ēra 2016 - Ivo Krievs - Likumiskās intereses kā personas datu apstrā...
Digitālā Ēra 2016 - Ivo Krievs - Likumiskās intereses kā personas datu apstrā...Digitālā Ēra 2016 - Ivo Krievs - Likumiskās intereses kā personas datu apstrā...
Digitālā Ēra 2016 - Ivo Krievs - Likumiskās intereses kā personas datu apstrā...Andris Soroka
 
Symantec Solutions
Symantec SolutionsSymantec Solutions
Symantec Solutionstwelling
 
Mobile Management
Mobile ManagementMobile Management
Mobile ManagementCarahsoft
 
Symantec 2011 Encryption Flash Poll Global Results
Symantec 2011 Encryption Flash Poll Global ResultsSymantec 2011 Encryption Flash Poll Global Results
Symantec 2011 Encryption Flash Poll Global ResultsSymantec
 
Why you need to secure mobile apps - now
Why you need to secure mobile apps - nowWhy you need to secure mobile apps - now
Why you need to secure mobile apps - nowSymantec
 
WWW.DSS.LV - Data Protection Basics 2015 - DeviceLock
WWW.DSS.LV - Data Protection Basics 2015 - DeviceLock WWW.DSS.LV - Data Protection Basics 2015 - DeviceLock
WWW.DSS.LV - Data Protection Basics 2015 - DeviceLock Andris Soroka
 
Symantec Data Insight for Storage
Symantec Data Insight for StorageSymantec Data Insight for Storage
Symantec Data Insight for StorageSymantec
 

Viewers also liked (18)

2014 - DSS - Mobile devices & security overview
2014 - DSS - Mobile devices & security overview2014 - DSS - Mobile devices & security overview
2014 - DSS - Mobile devices & security overview
 
2015 - The Cloud for Managers @ Riga Business School - DSS - Cloud risks and ...
2015 - The Cloud for Managers @ Riga Business School - DSS - Cloud risks and ...2015 - The Cloud for Managers @ Riga Business School - DSS - Cloud risks and ...
2015 - The Cloud for Managers @ Riga Business School - DSS - Cloud risks and ...
 
2014 - Digital Era Seminary #1 - Agnese Bobovica - Datu drosiba veselibas nozare
2014 - Digital Era Seminary #1 - Agnese Bobovica - Datu drosiba veselibas nozare2014 - Digital Era Seminary #1 - Agnese Bobovica - Datu drosiba veselibas nozare
2014 - Digital Era Seminary #1 - Agnese Bobovica - Datu drosiba veselibas nozare
 
2014 - Digital Era Seminary #1 - Arnis Puksts - Izmainas ES personas datu regula
2014 - Digital Era Seminary #1 - Arnis Puksts - Izmainas ES personas datu regula2014 - Digital Era Seminary #1 - Arnis Puksts - Izmainas ES personas datu regula
2014 - Digital Era Seminary #1 - Arnis Puksts - Izmainas ES personas datu regula
 
2014 - Digital Era Seminary #1 - Ivo Krievs - Datu drosiba darba vieta
2014 - Digital Era Seminary #1 - Ivo Krievs - Datu drosiba darba vieta2014 - Digital Era Seminary #1 - Ivo Krievs - Datu drosiba darba vieta
2014 - Digital Era Seminary #1 - Ivo Krievs - Datu drosiba darba vieta
 
DSS @SFK International Conference - March 2014 - Quantifying Business Value o...
DSS @SFK International Conference - March 2014 - Quantifying Business Value o...DSS @SFK International Conference - March 2014 - Quantifying Business Value o...
DSS @SFK International Conference - March 2014 - Quantifying Business Value o...
 
DSS ITSEC 2013 Conference 07.11.2013 - ISACA LATVIA IVO IVANOVS
DSS ITSEC 2013 Conference 07.11.2013  - ISACA LATVIA IVO IVANOVSDSS ITSEC 2013 Conference 07.11.2013  - ISACA LATVIA IVO IVANOVS
DSS ITSEC 2013 Conference 07.11.2013 - ISACA LATVIA IVO IVANOVS
 
DSS ITSEC 2013 Conference 07.11.2013 - HeadTechnology - IT security trends 2014
DSS ITSEC 2013 Conference 07.11.2013  - HeadTechnology - IT security trends 2014DSS ITSEC 2013 Conference 07.11.2013  - HeadTechnology - IT security trends 2014
DSS ITSEC 2013 Conference 07.11.2013 - HeadTechnology - IT security trends 2014
 
2015 Data Security Solutions @SFK - Working and living in digital work of future
2015 Data Security Solutions @SFK - Working and living in digital work of future2015 Data Security Solutions @SFK - Working and living in digital work of future
2015 Data Security Solutions @SFK - Working and living in digital work of future
 
2015 - Data Security Solutions @Dienas Bizness Exigen IBM - Business Data Pro...
2015 - Data Security Solutions @Dienas Bizness Exigen IBM - Business Data Pro...2015 - Data Security Solutions @Dienas Bizness Exigen IBM - Business Data Pro...
2015 - Data Security Solutions @Dienas Bizness Exigen IBM - Business Data Pro...
 
2014 - Digital Era Seminary #1 - Sintija Deruma - Informacijas drosibas profe...
2014 - Digital Era Seminary #1 - Sintija Deruma - Informacijas drosibas profe...2014 - Digital Era Seminary #1 - Sintija Deruma - Informacijas drosibas profe...
2014 - Digital Era Seminary #1 - Sintija Deruma - Informacijas drosibas profe...
 
Digitālā Ēra 2016 - Ivo Krievs - Likumiskās intereses kā personas datu apstrā...
Digitālā Ēra 2016 - Ivo Krievs - Likumiskās intereses kā personas datu apstrā...Digitālā Ēra 2016 - Ivo Krievs - Likumiskās intereses kā personas datu apstrā...
Digitālā Ēra 2016 - Ivo Krievs - Likumiskās intereses kā personas datu apstrā...
 
Symantec Solutions
Symantec SolutionsSymantec Solutions
Symantec Solutions
 
Mobile Management
Mobile ManagementMobile Management
Mobile Management
 
Symantec 2011 Encryption Flash Poll Global Results
Symantec 2011 Encryption Flash Poll Global ResultsSymantec 2011 Encryption Flash Poll Global Results
Symantec 2011 Encryption Flash Poll Global Results
 
Why you need to secure mobile apps - now
Why you need to secure mobile apps - nowWhy you need to secure mobile apps - now
Why you need to secure mobile apps - now
 
WWW.DSS.LV - Data Protection Basics 2015 - DeviceLock
WWW.DSS.LV - Data Protection Basics 2015 - DeviceLock WWW.DSS.LV - Data Protection Basics 2015 - DeviceLock
WWW.DSS.LV - Data Protection Basics 2015 - DeviceLock
 
Symantec Data Insight for Storage
Symantec Data Insight for StorageSymantec Data Insight for Storage
Symantec Data Insight for Storage
 

Similar to DSS Symantec PGP Encryption Fortress 2014 - ArrowECS - RoadShow Baltics

Secure channels main deck
Secure channels main deckSecure channels main deck
Secure channels main deckRichard Blech
 
Smart Cards & Devices Forum 2013 - Protecting enterprise sensitive informatio...
Smart Cards & Devices Forum 2013 - Protecting enterprise sensitive informatio...Smart Cards & Devices Forum 2013 - Protecting enterprise sensitive informatio...
Smart Cards & Devices Forum 2013 - Protecting enterprise sensitive informatio...OKsystem
 
Dell sonicwall connected security
Dell sonicwall connected securityDell sonicwall connected security
Dell sonicwall connected securityMotty Ben Atia
 
Hardwar based Security of Systems
Hardwar based Security of SystemsHardwar based Security of Systems
Hardwar based Security of SystemsJamal Jamali
 
Cyber security event
Cyber security eventCyber security event
Cyber security eventTryzens
 
Come gestire l'encryption dei dati con SKLM
Come gestire l'encryption dei dati con SKLMCome gestire l'encryption dei dati con SKLM
Come gestire l'encryption dei dati con SKLMLuigi Perrone
 
What i learned at gartner summit 2019
What i learned at gartner summit 2019What i learned at gartner summit 2019
What i learned at gartner summit 2019Ulf Mattsson
 
IBM Share Conference 2010, Boston, Ulf Mattsson
IBM Share Conference 2010, Boston, Ulf MattssonIBM Share Conference 2010, Boston, Ulf Mattsson
IBM Share Conference 2010, Boston, Ulf MattssonUlf Mattsson
 
M I Dentity 3 G 040111
M I Dentity 3 G 040111M I Dentity 3 G 040111
M I Dentity 3 G 040111Jan Vekemans
 
Safend General Presentation 2010
Safend General Presentation 2010Safend General Presentation 2010
Safend General Presentation 2010Joseph Mark Heinzen
 
Cloud_security.pptx
Cloud_security.pptxCloud_security.pptx
Cloud_security.pptxSofiyaKhan49
 
Efficiency, effectiveness, productivity: Dell Connected Security in action
Efficiency, effectiveness, productivity: Dell Connected Security in actionEfficiency, effectiveness, productivity: Dell Connected Security in action
Efficiency, effectiveness, productivity: Dell Connected Security in actionKenneth de Brucq
 
Nordic IT Security 2014 agenda
Nordic IT Security 2014 agendaNordic IT Security 2014 agenda
Nordic IT Security 2014 agendaCopperberg
 
Information Security
Information SecurityInformation Security
Information SecurityMohit8780
 
The day when 3rd party security providers disappear into cloud bright talk se...
The day when 3rd party security providers disappear into cloud bright talk se...The day when 3rd party security providers disappear into cloud bright talk se...
The day when 3rd party security providers disappear into cloud bright talk se...Ulf Mattsson
 
Trend micro data protection
Trend micro data protectionTrend micro data protection
Trend micro data protectionAndrew Wong
 
DSS ITSEC 2013 Conference 07.11.2013 - For your eyes only - Symantec PGP Re-L...
DSS ITSEC 2013 Conference 07.11.2013 - For your eyes only - Symantec PGP Re-L...DSS ITSEC 2013 Conference 07.11.2013 - For your eyes only - Symantec PGP Re-L...
DSS ITSEC 2013 Conference 07.11.2013 - For your eyes only - Symantec PGP Re-L...Andris Soroka
 
apsec 7 Golden Rules Data Leakage Prevention / DLP
apsec 7 Golden Rules Data Leakage Prevention / DLPapsec 7 Golden Rules Data Leakage Prevention / DLP
apsec 7 Golden Rules Data Leakage Prevention / DLPandreasschuster
 
Developing Interoperable Components for an Open IoT Foundation
Developing Interoperable Components for an Open IoT Foundation Developing Interoperable Components for an Open IoT Foundation
Developing Interoperable Components for an Open IoT Foundation Eurotech
 

Similar to DSS Symantec PGP Encryption Fortress 2014 - ArrowECS - RoadShow Baltics (20)

Secure channels main deck
Secure channels main deckSecure channels main deck
Secure channels main deck
 
Smart Cards & Devices Forum 2013 - Protecting enterprise sensitive informatio...
Smart Cards & Devices Forum 2013 - Protecting enterprise sensitive informatio...Smart Cards & Devices Forum 2013 - Protecting enterprise sensitive informatio...
Smart Cards & Devices Forum 2013 - Protecting enterprise sensitive informatio...
 
Dell sonicwall connected security
Dell sonicwall connected securityDell sonicwall connected security
Dell sonicwall connected security
 
Hardwar based Security of Systems
Hardwar based Security of SystemsHardwar based Security of Systems
Hardwar based Security of Systems
 
Cyber security event
Cyber security eventCyber security event
Cyber security event
 
Come gestire l'encryption dei dati con SKLM
Come gestire l'encryption dei dati con SKLMCome gestire l'encryption dei dati con SKLM
Come gestire l'encryption dei dati con SKLM
 
What i learned at gartner summit 2019
What i learned at gartner summit 2019What i learned at gartner summit 2019
What i learned at gartner summit 2019
 
IBM Share Conference 2010, Boston, Ulf Mattsson
IBM Share Conference 2010, Boston, Ulf MattssonIBM Share Conference 2010, Boston, Ulf Mattsson
IBM Share Conference 2010, Boston, Ulf Mattsson
 
M I Dentity 3 G 040111
M I Dentity 3 G 040111M I Dentity 3 G 040111
M I Dentity 3 G 040111
 
Safend General Presentation 2010
Safend General Presentation 2010Safend General Presentation 2010
Safend General Presentation 2010
 
Cloud_security.pptx
Cloud_security.pptxCloud_security.pptx
Cloud_security.pptx
 
Efficiency, effectiveness, productivity: Dell Connected Security in action
Efficiency, effectiveness, productivity: Dell Connected Security in actionEfficiency, effectiveness, productivity: Dell Connected Security in action
Efficiency, effectiveness, productivity: Dell Connected Security in action
 
Nordic IT Security 2014 agenda
Nordic IT Security 2014 agendaNordic IT Security 2014 agenda
Nordic IT Security 2014 agenda
 
Information Security
Information SecurityInformation Security
Information Security
 
Dart Key ENG
Dart Key ENGDart Key ENG
Dart Key ENG
 
The day when 3rd party security providers disappear into cloud bright talk se...
The day when 3rd party security providers disappear into cloud bright talk se...The day when 3rd party security providers disappear into cloud bright talk se...
The day when 3rd party security providers disappear into cloud bright talk se...
 
Trend micro data protection
Trend micro data protectionTrend micro data protection
Trend micro data protection
 
DSS ITSEC 2013 Conference 07.11.2013 - For your eyes only - Symantec PGP Re-L...
DSS ITSEC 2013 Conference 07.11.2013 - For your eyes only - Symantec PGP Re-L...DSS ITSEC 2013 Conference 07.11.2013 - For your eyes only - Symantec PGP Re-L...
DSS ITSEC 2013 Conference 07.11.2013 - For your eyes only - Symantec PGP Re-L...
 
apsec 7 Golden Rules Data Leakage Prevention / DLP
apsec 7 Golden Rules Data Leakage Prevention / DLPapsec 7 Golden Rules Data Leakage Prevention / DLP
apsec 7 Golden Rules Data Leakage Prevention / DLP
 
Developing Interoperable Components for an Open IoT Foundation
Developing Interoperable Components for an Open IoT Foundation Developing Interoperable Components for an Open IoT Foundation
Developing Interoperable Components for an Open IoT Foundation
 

More from Andris Soroka

Digitala Era 2017 - TransactPro - Normunds Aizstrauts - Maksājumu un finansu ...
Digitala Era 2017 - TransactPro - Normunds Aizstrauts - Maksājumu un finansu ...Digitala Era 2017 - TransactPro - Normunds Aizstrauts - Maksājumu un finansu ...
Digitala Era 2017 - TransactPro - Normunds Aizstrauts - Maksājumu un finansu ...Andris Soroka
 
Digitala Era 2017 - Datu Valsts Inspekcija - Lauris Linabergs - Vispārīgā dau...
Digitala Era 2017 - Datu Valsts Inspekcija - Lauris Linabergs - Vispārīgā dau...Digitala Era 2017 - Datu Valsts Inspekcija - Lauris Linabergs - Vispārīgā dau...
Digitala Era 2017 - Datu Valsts Inspekcija - Lauris Linabergs - Vispārīgā dau...Andris Soroka
 
Digitala Era 2017 - PMLP - Vilnis Vītoliņš - Gaisa kuģu pasažieru datu apstrā...
Digitala Era 2017 - PMLP - Vilnis Vītoliņš - Gaisa kuģu pasažieru datu apstrā...Digitala Era 2017 - PMLP - Vilnis Vītoliņš - Gaisa kuģu pasažieru datu apstrā...
Digitala Era 2017 - PMLP - Vilnis Vītoliņš - Gaisa kuģu pasažieru datu apstrā...Andris Soroka
 
Digitala Era 2017 - BOD LAW - Līva Aleksejeva - LIELIE DATI un personas datu ...
Digitala Era 2017 - BOD LAW - Līva Aleksejeva - LIELIE DATI un personas datu ...Digitala Era 2017 - BOD LAW - Līva Aleksejeva - LIELIE DATI un personas datu ...
Digitala Era 2017 - BOD LAW - Līva Aleksejeva - LIELIE DATI un personas datu ...Andris Soroka
 
Digitala Era 2017 - Spridzans Law Office - Anna Vladimirova Krykova - Mobilo ...
Digitala Era 2017 - Spridzans Law Office - Anna Vladimirova Krykova - Mobilo ...Digitala Era 2017 - Spridzans Law Office - Anna Vladimirova Krykova - Mobilo ...
Digitala Era 2017 - Spridzans Law Office - Anna Vladimirova Krykova - Mobilo ...Andris Soroka
 
Digitala Era 2017 - ZAB “BULLET” - Ivo Krievs - Vai uz valsti attiecināmi cit...
Digitala Era 2017 - ZAB “BULLET” - Ivo Krievs - Vai uz valsti attiecināmi cit...Digitala Era 2017 - ZAB “BULLET” - Ivo Krievs - Vai uz valsti attiecināmi cit...
Digitala Era 2017 - ZAB “BULLET” - Ivo Krievs - Vai uz valsti attiecināmi cit...Andris Soroka
 
Digitala Era 2017 - LSPDSA - Arnis Puksts - Datu aizsardzības speciālists (DPO)
Digitala Era 2017 - LSPDSA - Arnis Puksts - Datu aizsardzības speciālists (DPO)Digitala Era 2017 - LSPDSA - Arnis Puksts - Datu aizsardzības speciālists (DPO)
Digitala Era 2017 - LSPDSA - Arnis Puksts - Datu aizsardzības speciālists (DPO)Andris Soroka
 
Digitala Era 2017 - IIZI - Lauris Kļaviņš - GDPR - Kādus izdevumus un riskus ...
Digitala Era 2017 - IIZI - Lauris Kļaviņš - GDPR - Kādus izdevumus un riskus ...Digitala Era 2017 - IIZI - Lauris Kļaviņš - GDPR - Kādus izdevumus un riskus ...
Digitala Era 2017 - IIZI - Lauris Kļaviņš - GDPR - Kādus izdevumus un riskus ...Andris Soroka
 
Digitala Era 2017 - E-Risinajumi - Māris Ruķers - Vai ar vienu datu aizsardzī...
Digitala Era 2017 - E-Risinajumi - Māris Ruķers - Vai ar vienu datu aizsardzī...Digitala Era 2017 - E-Risinajumi - Māris Ruķers - Vai ar vienu datu aizsardzī...
Digitala Era 2017 - E-Risinajumi - Māris Ruķers - Vai ar vienu datu aizsardzī...Andris Soroka
 
Digitala Era 2017 - Gints Puškundzis - Personas datu apstrādes līgumi
Digitala Era 2017 - Gints Puškundzis - Personas datu apstrādes līgumi Digitala Era 2017 - Gints Puškundzis - Personas datu apstrādes līgumi
Digitala Era 2017 - Gints Puškundzis - Personas datu apstrādes līgumi Andris Soroka
 
Digitala Era 2017 - DatuAizsardziba.LV - Agnese Boboviča - Datu aizsardzības ...
Digitala Era 2017 - DatuAizsardziba.LV - Agnese Boboviča - Datu aizsardzības ...Digitala Era 2017 - DatuAizsardziba.LV - Agnese Boboviča - Datu aizsardzības ...
Digitala Era 2017 - DatuAizsardziba.LV - Agnese Boboviča - Datu aizsardzības ...Andris Soroka
 
Digitala Era 2017 - NotAKey - Janis Graubins - Mobile technologies for single...
Digitala Era 2017 - NotAKey - Janis Graubins - Mobile technologies for single...Digitala Era 2017 - NotAKey - Janis Graubins - Mobile technologies for single...
Digitala Era 2017 - NotAKey - Janis Graubins - Mobile technologies for single...Andris Soroka
 
Digitala Era 2017 - Hermitage Solutions - Gatis Kaušs - Clearswift - Komunikā...
Digitala Era 2017 - Hermitage Solutions - Gatis Kaušs - Clearswift - Komunikā...Digitala Era 2017 - Hermitage Solutions - Gatis Kaušs - Clearswift - Komunikā...
Digitala Era 2017 - Hermitage Solutions - Gatis Kaušs - Clearswift - Komunikā...Andris Soroka
 
Digitala Era 2017 - Digital Mind - Leons Mednis - eDiscovery risinājums GDPR ...
Digitala Era 2017 - Digital Mind - Leons Mednis - eDiscovery risinājums GDPR ...Digitala Era 2017 - Digital Mind - Leons Mednis - eDiscovery risinājums GDPR ...
Digitala Era 2017 - Digital Mind - Leons Mednis - eDiscovery risinājums GDPR ...Andris Soroka
 
Digitala Era 2017 - ALSO - Artjoms Krūmiņš - Personas datu regulas (EU GDPR) ...
Digitala Era 2017 - ALSO - Artjoms Krūmiņš - Personas datu regulas (EU GDPR) ...Digitala Era 2017 - ALSO - Artjoms Krūmiņš - Personas datu regulas (EU GDPR) ...
Digitala Era 2017 - ALSO - Artjoms Krūmiņš - Personas datu regulas (EU GDPR) ...Andris Soroka
 
Digitala Era 2017 - ZAB Skopiņa & Azanda - Jūlija Terjuhana - Tiesības uz dat...
Digitala Era 2017 - ZAB Skopiņa & Azanda - Jūlija Terjuhana - Tiesības uz dat...Digitala Era 2017 - ZAB Skopiņa & Azanda - Jūlija Terjuhana - Tiesības uz dat...
Digitala Era 2017 - ZAB Skopiņa & Azanda - Jūlija Terjuhana - Tiesības uz dat...Andris Soroka
 
Digitala Era 2017 - IT Centrs - Agris Krusts - Latvijas iedzīvotāju digitālo ...
Digitala Era 2017 - IT Centrs - Agris Krusts - Latvijas iedzīvotāju digitālo ...Digitala Era 2017 - IT Centrs - Agris Krusts - Latvijas iedzīvotāju digitālo ...
Digitala Era 2017 - IT Centrs - Agris Krusts - Latvijas iedzīvotāju digitālo ...Andris Soroka
 
Digitala Era 2017 - DSS.LV - Arturs Filatovs - Datu Aizsardzības Tehnoloģiskā...
Digitala Era 2017 - DSS.LV - Arturs Filatovs - Datu Aizsardzības Tehnoloģiskā...Digitala Era 2017 - DSS.LV - Arturs Filatovs - Datu Aizsardzības Tehnoloģiskā...
Digitala Era 2017 - DSS.LV - Arturs Filatovs - Datu Aizsardzības Tehnoloģiskā...Andris Soroka
 
Digitala Era 2017 - DSS.LV - Arturs Filatovs - Mobilitāte un Personas Datu Dr...
Digitala Era 2017 - DSS.LV - Arturs Filatovs - Mobilitāte un Personas Datu Dr...Digitala Era 2017 - DSS.LV - Arturs Filatovs - Mobilitāte un Personas Datu Dr...
Digitala Era 2017 - DSS.LV - Arturs Filatovs - Mobilitāte un Personas Datu Dr...Andris Soroka
 
Digitala Era 2017 - DSS.LV - Andris Soroka - Personas datu regulas tehnoloģis...
Digitala Era 2017 - DSS.LV - Andris Soroka - Personas datu regulas tehnoloģis...Digitala Era 2017 - DSS.LV - Andris Soroka - Personas datu regulas tehnoloģis...
Digitala Era 2017 - DSS.LV - Andris Soroka - Personas datu regulas tehnoloģis...Andris Soroka
 

More from Andris Soroka (20)

Digitala Era 2017 - TransactPro - Normunds Aizstrauts - Maksājumu un finansu ...
Digitala Era 2017 - TransactPro - Normunds Aizstrauts - Maksājumu un finansu ...Digitala Era 2017 - TransactPro - Normunds Aizstrauts - Maksājumu un finansu ...
Digitala Era 2017 - TransactPro - Normunds Aizstrauts - Maksājumu un finansu ...
 
Digitala Era 2017 - Datu Valsts Inspekcija - Lauris Linabergs - Vispārīgā dau...
Digitala Era 2017 - Datu Valsts Inspekcija - Lauris Linabergs - Vispārīgā dau...Digitala Era 2017 - Datu Valsts Inspekcija - Lauris Linabergs - Vispārīgā dau...
Digitala Era 2017 - Datu Valsts Inspekcija - Lauris Linabergs - Vispārīgā dau...
 
Digitala Era 2017 - PMLP - Vilnis Vītoliņš - Gaisa kuģu pasažieru datu apstrā...
Digitala Era 2017 - PMLP - Vilnis Vītoliņš - Gaisa kuģu pasažieru datu apstrā...Digitala Era 2017 - PMLP - Vilnis Vītoliņš - Gaisa kuģu pasažieru datu apstrā...
Digitala Era 2017 - PMLP - Vilnis Vītoliņš - Gaisa kuģu pasažieru datu apstrā...
 
Digitala Era 2017 - BOD LAW - Līva Aleksejeva - LIELIE DATI un personas datu ...
Digitala Era 2017 - BOD LAW - Līva Aleksejeva - LIELIE DATI un personas datu ...Digitala Era 2017 - BOD LAW - Līva Aleksejeva - LIELIE DATI un personas datu ...
Digitala Era 2017 - BOD LAW - Līva Aleksejeva - LIELIE DATI un personas datu ...
 
Digitala Era 2017 - Spridzans Law Office - Anna Vladimirova Krykova - Mobilo ...
Digitala Era 2017 - Spridzans Law Office - Anna Vladimirova Krykova - Mobilo ...Digitala Era 2017 - Spridzans Law Office - Anna Vladimirova Krykova - Mobilo ...
Digitala Era 2017 - Spridzans Law Office - Anna Vladimirova Krykova - Mobilo ...
 
Digitala Era 2017 - ZAB “BULLET” - Ivo Krievs - Vai uz valsti attiecināmi cit...
Digitala Era 2017 - ZAB “BULLET” - Ivo Krievs - Vai uz valsti attiecināmi cit...Digitala Era 2017 - ZAB “BULLET” - Ivo Krievs - Vai uz valsti attiecināmi cit...
Digitala Era 2017 - ZAB “BULLET” - Ivo Krievs - Vai uz valsti attiecināmi cit...
 
Digitala Era 2017 - LSPDSA - Arnis Puksts - Datu aizsardzības speciālists (DPO)
Digitala Era 2017 - LSPDSA - Arnis Puksts - Datu aizsardzības speciālists (DPO)Digitala Era 2017 - LSPDSA - Arnis Puksts - Datu aizsardzības speciālists (DPO)
Digitala Era 2017 - LSPDSA - Arnis Puksts - Datu aizsardzības speciālists (DPO)
 
Digitala Era 2017 - IIZI - Lauris Kļaviņš - GDPR - Kādus izdevumus un riskus ...
Digitala Era 2017 - IIZI - Lauris Kļaviņš - GDPR - Kādus izdevumus un riskus ...Digitala Era 2017 - IIZI - Lauris Kļaviņš - GDPR - Kādus izdevumus un riskus ...
Digitala Era 2017 - IIZI - Lauris Kļaviņš - GDPR - Kādus izdevumus un riskus ...
 
Digitala Era 2017 - E-Risinajumi - Māris Ruķers - Vai ar vienu datu aizsardzī...
Digitala Era 2017 - E-Risinajumi - Māris Ruķers - Vai ar vienu datu aizsardzī...Digitala Era 2017 - E-Risinajumi - Māris Ruķers - Vai ar vienu datu aizsardzī...
Digitala Era 2017 - E-Risinajumi - Māris Ruķers - Vai ar vienu datu aizsardzī...
 
Digitala Era 2017 - Gints Puškundzis - Personas datu apstrādes līgumi
Digitala Era 2017 - Gints Puškundzis - Personas datu apstrādes līgumi Digitala Era 2017 - Gints Puškundzis - Personas datu apstrādes līgumi
Digitala Era 2017 - Gints Puškundzis - Personas datu apstrādes līgumi
 
Digitala Era 2017 - DatuAizsardziba.LV - Agnese Boboviča - Datu aizsardzības ...
Digitala Era 2017 - DatuAizsardziba.LV - Agnese Boboviča - Datu aizsardzības ...Digitala Era 2017 - DatuAizsardziba.LV - Agnese Boboviča - Datu aizsardzības ...
Digitala Era 2017 - DatuAizsardziba.LV - Agnese Boboviča - Datu aizsardzības ...
 
Digitala Era 2017 - NotAKey - Janis Graubins - Mobile technologies for single...
Digitala Era 2017 - NotAKey - Janis Graubins - Mobile technologies for single...Digitala Era 2017 - NotAKey - Janis Graubins - Mobile technologies for single...
Digitala Era 2017 - NotAKey - Janis Graubins - Mobile technologies for single...
 
Digitala Era 2017 - Hermitage Solutions - Gatis Kaušs - Clearswift - Komunikā...
Digitala Era 2017 - Hermitage Solutions - Gatis Kaušs - Clearswift - Komunikā...Digitala Era 2017 - Hermitage Solutions - Gatis Kaušs - Clearswift - Komunikā...
Digitala Era 2017 - Hermitage Solutions - Gatis Kaušs - Clearswift - Komunikā...
 
Digitala Era 2017 - Digital Mind - Leons Mednis - eDiscovery risinājums GDPR ...
Digitala Era 2017 - Digital Mind - Leons Mednis - eDiscovery risinājums GDPR ...Digitala Era 2017 - Digital Mind - Leons Mednis - eDiscovery risinājums GDPR ...
Digitala Era 2017 - Digital Mind - Leons Mednis - eDiscovery risinājums GDPR ...
 
Digitala Era 2017 - ALSO - Artjoms Krūmiņš - Personas datu regulas (EU GDPR) ...
Digitala Era 2017 - ALSO - Artjoms Krūmiņš - Personas datu regulas (EU GDPR) ...Digitala Era 2017 - ALSO - Artjoms Krūmiņš - Personas datu regulas (EU GDPR) ...
Digitala Era 2017 - ALSO - Artjoms Krūmiņš - Personas datu regulas (EU GDPR) ...
 
Digitala Era 2017 - ZAB Skopiņa & Azanda - Jūlija Terjuhana - Tiesības uz dat...
Digitala Era 2017 - ZAB Skopiņa & Azanda - Jūlija Terjuhana - Tiesības uz dat...Digitala Era 2017 - ZAB Skopiņa & Azanda - Jūlija Terjuhana - Tiesības uz dat...
Digitala Era 2017 - ZAB Skopiņa & Azanda - Jūlija Terjuhana - Tiesības uz dat...
 
Digitala Era 2017 - IT Centrs - Agris Krusts - Latvijas iedzīvotāju digitālo ...
Digitala Era 2017 - IT Centrs - Agris Krusts - Latvijas iedzīvotāju digitālo ...Digitala Era 2017 - IT Centrs - Agris Krusts - Latvijas iedzīvotāju digitālo ...
Digitala Era 2017 - IT Centrs - Agris Krusts - Latvijas iedzīvotāju digitālo ...
 
Digitala Era 2017 - DSS.LV - Arturs Filatovs - Datu Aizsardzības Tehnoloģiskā...
Digitala Era 2017 - DSS.LV - Arturs Filatovs - Datu Aizsardzības Tehnoloģiskā...Digitala Era 2017 - DSS.LV - Arturs Filatovs - Datu Aizsardzības Tehnoloģiskā...
Digitala Era 2017 - DSS.LV - Arturs Filatovs - Datu Aizsardzības Tehnoloģiskā...
 
Digitala Era 2017 - DSS.LV - Arturs Filatovs - Mobilitāte un Personas Datu Dr...
Digitala Era 2017 - DSS.LV - Arturs Filatovs - Mobilitāte un Personas Datu Dr...Digitala Era 2017 - DSS.LV - Arturs Filatovs - Mobilitāte un Personas Datu Dr...
Digitala Era 2017 - DSS.LV - Arturs Filatovs - Mobilitāte un Personas Datu Dr...
 
Digitala Era 2017 - DSS.LV - Andris Soroka - Personas datu regulas tehnoloģis...
Digitala Era 2017 - DSS.LV - Andris Soroka - Personas datu regulas tehnoloģis...Digitala Era 2017 - DSS.LV - Andris Soroka - Personas datu regulas tehnoloģis...
Digitala Era 2017 - DSS.LV - Andris Soroka - Personas datu regulas tehnoloģis...
 

Recently uploaded

Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 

Recently uploaded (20)

Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 

DSS Symantec PGP Encryption Fortress 2014 - ArrowECS - RoadShow Baltics

  • 1. Innovations in cyber security technologies Arturs Filatovs Business Development Manager March 2014 Arrow ECS RoadShow Baltics Symantec Encryption – Building A Digital Fortress
  • 2. Arturs Filatovs business card More then 5 years experience in delivering Innovative IT Security Solutions to Baltic states Knowledge of more then 25 different IT Security Solutions Specialization - Mobile IT Security
  • 3. Lets move our hands – who is here today? CISO Director, Desktop Ops Director, Network Ops Helpdesk Manager
  • 4. Todays To do list “Data Security Solutions” role in Baltics Technology vs. Time Encryption’s role in security Don't be scared – Encrypt everything Build Digital fortress with Symantec Tech
  • 5. “Data Security Solutions” business card Specialization – IT Security IT Security services (consulting, audit, pen-testing, market analysis, system testing and integration, training and technical support) Solutions and experience portfolio with more than 20 different technologies – cyber-security global market leaders from more than 10 countries Trusted services provider for banks, insurance companies, government and private companies (critical infrastructure etc.)
  • 6. Role of DSS in Cyber-security Development in Baltics Cyber-Security Awareness Raising Technology and knowledge transfer Most Innovative Portfolio Trusted Advisor to its Customers
  • 7. Cybersecurity Awareness Raising Own organized conference “DSS ITSEC” 5th annual event this year More than 400 visitors and more than 250 online live streaming watchers from LV, EE, LT 4 parallel sessions with more than 40 international speakers, including Microsoft, Oracle, Symantec, IBM, Samsung and many more – everything free of charge Participation in other events & sponsorship CERT & ISACA conferences RIGA COMM exhibition & conferences Roadshows and events in Latvia / Lithuania / Estonia (f.i. Vilnius Innovation Forum, Devcon, ITSEC HeadLight, SFK, business associations) Participation in cyber security discussions, preparations, seminaries, publications etc. strategy
  • 8. Innovations – technology & knowledge transfer Innovative Technology Transfer Number of unique projects done with different technology global leadership vendors Knowledge transfer (own employees, customers – both from private & public, other IT companies) Areas include: Endpoint Security Network Security Security Management Application Security Mobile Security Data Security Cyber-security Security Intelligence
  • 9. Our portfolio is most innovative in Baltics!
  • 11.
  • 12.
  • 16. PC era to MOBILE era PC era Mobile era
  • 17. Consolidation of IT in 21st Century We are at point where functionality of desktop collides with mobility of mobile device. Mobile IT
  • 19. IT Must Evolve To Meet New Demands InformationCentric System-Centric • Collaborative Apps and Social Media • Transactional Apps • Unstructured data • Structured Data • Distributed information • Centralized information • People are the new perimeter • Perimeter-based security • Virtual Infrastructure and Cloud • On-premise infrastructure
  • 20. Endpoints: The Borderless Enterprise Field Data Center Headquarters Field Offices Point of Sale Point of Sale $262 Million: Estimated cost of the Heartland Payment Systems breach1 1Based Global Internet Security Threat Report, Trends for 2008 Customer email stored on mobile phone 12,000 Laptops lost in United States airports every week2 Trojans, malware, unauthorized 1 in 10 people have lost a laptop, smart software phone, or USB drive with corporate information on it3 on 130,000,000 records lost (Datalossdb.org) and $202 per record (Ponemon Institute) 3Symantec Corporate data copied onto USB drive 2http://www.darkreading.com/security/encryption/showArticle.jhtml?articleID=211201139
  • 21. Cloud is taking us much higher…
  • 22. Choose the right cloud smart way..
  • 24. When we have to change our password...
  • 25. Some questions? Who from you are using encryption? What will happen if data will be lost/stolen? Who will be responsible? When you are sending confidential data via post, how do you secure it?
  • 26. Encryption beginnings – Sparta/ Greeks/ Rome Greek generals used Scytel to encrypt and decrypt messages (Symmetric encryption)
  • 27. In what our organizations believe today SSL/ TLS/ VPN/ HTTPS – this is only data in motion using x.509
  • 28. What we use for document security E-Signatures – Limited functionality for document encryption data at rest/ data in motion Not User friendly (smart cards, Card readers, USB tokens … )
  • 30. NSA did “great work…” Hmmm....NSA?
  • 32. Encryption threats by Ponemon Institute Our Users are our weakest link
  • 33. Mobility - Potential For Data Loss 47% of corporate data resides on mobile devices 43% of employees lost a device with company data 32% of employees didn’t report the loss or theft in a timely fashion
  • 34. Our users weakest link 1 in 10 people have lost a laptop, smart phone, or USB drive with corporate information on it* 32% of employees didn’t report the loss or theft in a timely fashion* *Symantec Global Internet Security Threat Report
  • 36. Concerns from customer side Hardware-based encryption is faster and it’s an option on Dell and other PCs. Why do I need encryption if I have DLP or Endpoint monitoring? We are going to wait for our Windows 7 rollout in our environment and use Bit locker How to recover encrypted info? Master key is security risk for us.
  • 37. Encryption is not a rocket science
  • 40. Products Tasks Objectives Don't be scared – Encrypt everything Keep data secure Meet compliance objectives Protect data at rest Protect the business Control costs and liabilities Protect data in motion Protect data in use Endpoint Data Protection File and Server Protection Email Protection • PGP Whole Disk Encryption • PGP NetShare • PGP Desktop Email • PGP Command Line • PGP Gateway Email • SEE FDE • SEE RSE • PGP PDF Messenger • PGP Portable • PGP Support Package for BlackBerry • SEE Device Control • PGP Mobile Management • PGP Universal Server • PGP Key Management Server
  • 41. Oh Boy do we got solution for you!
  • 42. Build Digital fortress with Symantec Full Disk Encryption (FDE) • PGP® Whole Disk Encryption • Symantec Endpoint Encryption (EE) FDE Device and Media Encryption • PGP Portable • SEE Removable Storage Edition (RSE) • SEE Device Control FTP/Batch and Backups • PGP® Command Line Management Central Management of Encryption Applications PGP® Universal ™ Server File/Folder/Shared Server Encryption • PGP® NetShare Gateway Email Encryption • PGP® Gateway Email End-End Email and IM Encryption Key Management PGP® Key Management Server (KMS) • PGP® Desktop Email Smartphone Solutions • PGP® Mobile • PGP® Support Package for BlackBerry® 42
  • 43. Full Disk Encryption Full disk encryption for desktops, laptops, and Windows® servers. Supports Windows®, Mac OS® X, and Linux® platforms • Encrypts desktops, laptops, and USB-attached drives • Protects against personal computer loss, theft, compromise and improper disposal • Reduces risk of loss of PII (Personally Identifiable Information) and other sensitive data • Supports Windows, Mac OS X, and Linux PGP Whole Disk Encryption; SEE Full Disk Encryption 43
  • 44. Removable Media Protection Removable Storage Encryption • Secure portable data at rest – Enforce mandatory removable storage encryption policies – Access and re-encrypt data from any PC or Mac Centralized – Integrated Management Console Policies Auditing • Granular file- and folder-based encryption – Allow encrypted and unencrypted data on user devices – Enforce policy-controlled exemptions by file type and device SEE Removable Storage Encryption Removable Media Encryption
  • 45. PGP® Email Protection PGP® Desktop Email PGP Universal™ Gateway Email PGP®®PDF Messenger PGP Viewer for iOS PGP® Support Package for BlackBerry® Desktop-based Email Encryption • Automatic end-to-end email encryption Gateway-based Email Encryption • Clientless email encryption Encrypted Email Viewer App for iOS • Decrypts and views messages • Verifies digital signatures Encryption for BlackBerry Email • Native client access to encrypted email Encryption for Windows Mobile Devices PGP® Mobile Symantec Encryption - Confidential • Encrypted Email • Encrypted Files and Folders 45
  • 46. File/Folder Encryption Distributed file protection Shared file protection User file protection Protect individual files and folders Protect shared files and folders Protect transferred files and folders PGP NetShare, PGP Command Line 46
  • 47. PGP® File and Server Protection PGP® NetShare PGP® Command Line Shared File Protection • Protect data exchanged between users via shared network folders Scriptable Encryption • Integrate encryption into data transfer, data distribution and data backup processes
  • 48. PGP or Symantec Endpoint Encryption? Products Exceptions Customer Need Default Play Existing SEE/GE Customer DAR U.S. Fed SmartBuy Active Directory + MSFT Stack PGP Whole Disk Encryption PGP Portable SEE Removable Storage Encryption SEE Device Control Endpoint Encryption SEE Full Disk Encryption SEE Device Control PGP Desktop Email Email Encryption PGP Gateway Email PGP Mobile PGP Support Package for BlackBerry Server / File Encryption Management PGP NetShare PGP Command Line PGP Universal Server and PGP Key Management Server (KMS) • Symantec’s strategic direction for Endpoint Encryption is to “converge” the solutions into a single offering. • In the interim, Symantec will provide full support for both Endpoint Encryption technologies. Selling Symantec Encryption Products 48
  • 49. Defense-In-Depth: Encryption + DLP Network DLP / Gateway Encryption • Automatically encrypt emails containing sensitive data • Notify employees in real time/context about encryption policies and tools Storage DLP / File-Based Encryption • Discover where confidential data files are stored and automatically apply encryption • Ease the burden to IT staff with near transparence to users Endpoint DLP / Removable Storage Encryption • Target high risk users by discovering what laptops contain sensitive data • Protect AND enable the business by targeting encryption efforts to sensitive data moving to USB devices
  • 50. DLP + PGP Universal Gateway Email 5 Email encrypted and sent 1 Receive email MTA or Proxy PGP Universal Server 4 Violation detected - re-route to encryption server 2 Check email content for encryption policy violations 3 No violation - email sent Key Benefits: • Automate gateway encryption; ease burden on end users • Enforce and report on encryption policies
  • 52. Takeaway Technology lifecycle from 3-6 year to 6-12 months Encryption will help you sleep tight Don’t be scared to encrypt all type of data Centralized key management is important One encryption solution for different type of date Select DSS as your trusted security advisor – we work with Symantec (PGP) more than 5 years already!!