SlideShare a Scribd company logo
How secure is your data?




            ENCRYPTION MADE EASY
Current Security Landscape

“Take heed of Lockheed… the
attackers are really smart and their
exploits are highly sophisticated”
                      Art Coviello - RSA




     Breaches are
     increasing and
     becoming more
     frequent and
     more costly


                                           ENCRYPTION MADE EASY
Rune background and pedigree


 Created by a team of security stalwarts to:
      “absolutely ensure that critically sensitive
      information does not get into the wrong hands”

      “develop an encryption technique that was simple to
      use and portable”

 Backed and supported by industry and government
 experts

 Deployed in hostile environments such as
 Afghanistan, Somalia and China


                                             ENCRYPTION MADE EASY
What Does Rune Information Security Do?
 We don’t secure every potential vulnerability – we
 secure sensitive data that is important to you
 Ideal for small user groups who need to share
 sensitive data
 The user decides what data needs to be
 secured (not an enterprise-wide policy)


       Military-grade encryption made easy…
           • Using any portable USB device
           • Floating tool bar
           • Select it, Secure it



                                       ENCRYPTION MADE EASY
User Groups requiring extra protection?
 Cyber-security teams – requiring higher than enterprise
 level data security
 Government & Military contractors – working with highly
 sensitive military/defense information
 Intra company secure comms –
 establish secure, encrypted channels
 with partners / 3rd parties
 Senior Management and Board Level
 communications
 R&D teams – clinical trials,
 international operations in countries
 like China
 Legal teams – attorney/client privilege


                                           ENCRYPTION MADE EASY
Use Case - Executives on the move

 Senior executives travel a lot and work
 from anywhere
 The data they carry and share is usually
 sensitive
 Security sometimes takes 2nd place to
 productivity
 Executive Protection (personal) is a
 concern, but data protection is not?           Airport


                                                          Hotel



         Trusted circle of comms                  Partner office
         and data for Leadership
         Team anytime, anywhere        Home
                                       office




                                                ENCRYPTION MADE EASY
Use Case - intra-company data &
communications
      Examples: Outside Counsel, Payroll Processor, Manufacturing Partner

 Rapid deployment (within 24 hours)                         Partner, Government,
                                                            Consultant, Law
 Strong authentication and control                          Firm, Customer, etc.
 Minimal set-up between parties
 Military-grade encryption – for data
 at rest and in motion
 Easy to use                       Secure data
                                         transfer




                                                            Establish secure
                                    Client                  company-to-company
                                    company                 communications
                                                            within hours


                                                    ENCRYPTION MADE EASY
Customer Use Cases
 Government & Military teams keep operational
 directives secure in hostile areas



 Board Level projects and communications




 Executives travelling to high risk countries with
 sensitive company data



                                      ENCRYPTION MADE EASY
Easy deployment and flexible management
model


     1 USB device per user
     Small number of users and/or groups
     No management required
     Deployed in hours (monthly or annual)




     USB devices provided or software
     Multiple users and groups
     Client (or 3rd party) chooses to manage
     Deployed in days



                                               ENCRYPTION MADE EASY
Easy Deployment & Pricing Model

 Define your user groups
 Ship devices (or download software) to users
 Load application and go



 From $300 to $1,500 per user per year
 Annual or monthly service
 Managed Service or client-owned




                                    ENCRYPTION MADE EASY
For More Information Contact Us
 Rune Information Security
  Rob Levey, VP North America
  Phone: +1 978-996-2758
  Email: robert.levey@rune.sg
  Web: www.rune.sg




                                ENCRYPTION MADE EASY

More Related Content

What's hot

IBM MaaS360 with Watson
IBM MaaS360 with WatsonIBM MaaS360 with Watson
IBM MaaS360 with Watson
Killian Delaney
 
Surveillance Video Capabilities
Surveillance Video CapabilitiesSurveillance Video Capabilities
Surveillance Video Capabilities
desktopalert
 
Don’t Sweat the Small Stuff – Protect What Matters Most - Interop 2014
Don’t Sweat the Small Stuff – Protect What Matters Most - Interop 2014 Don’t Sweat the Small Stuff – Protect What Matters Most - Interop 2014
Don’t Sweat the Small Stuff – Protect What Matters Most - Interop 2014
Unisys Corporation
 
Immix PSIM for the Enterprise
Immix PSIM for the EnterpriseImmix PSIM for the Enterprise
Immix PSIM for the Enterprise
Jaco Nel
 
Symantec government technology summit abstract
Symantec government technology summit abstractSymantec government technology summit abstract
Symantec government technology summit abstract
Carahsoft
 
8 Sure-Fire Ways to Manage Your Desktops
8 Sure-Fire Ways to Manage Your Desktops8 Sure-Fire Ways to Manage Your Desktops
8 Sure-Fire Ways to Manage Your Desktops
ScriptLogic
 
Prolexic Routed Product Brief - DDoS defense for protecting network and data ...
Prolexic Routed Product Brief - DDoS defense for protecting network and data ...Prolexic Routed Product Brief - DDoS defense for protecting network and data ...
Prolexic Routed Product Brief - DDoS defense for protecting network and data ...
Akamai Technologies
 
Cognitive security
Cognitive securityCognitive security
Cognitive security
Iqra khalil
 
Laptop management
Laptop managementLaptop management
Laptop management
Killian Delaney
 
Guardium value proposition for fss pn 12 02-10
Guardium value proposition for fss pn 12 02-10Guardium value proposition for fss pn 12 02-10
Guardium value proposition for fss pn 12 02-10
Avirot Mitamura
 
Total Defense Product Information
Total Defense Product InformationTotal Defense Product Information
Total Defense Product Information
Zeeshan Humayun
 
TrendMicro
TrendMicroTrendMicro
TrendMicro
1CloudRoad.com
 
Vanguard Company Highlights2009
Vanguard Company Highlights2009Vanguard Company Highlights2009
Vanguard Company Highlights2009
brian.f
 
Vanguard Company Highlights2009
Vanguard Company Highlights2009Vanguard Company Highlights2009
Vanguard Company Highlights2009
brian.f
 
Trend micro deep security
Trend micro deep securityTrend micro deep security
Trend micro deep security
Trend Micro
 
The 2016 Guide to IT Identity Management
The 2016 Guide to IT Identity ManagementThe 2016 Guide to IT Identity Management
The 2016 Guide to IT Identity Management
JumpCloud
 
Protecting Data on Laptops
Protecting Data on LaptopsProtecting Data on Laptops
Protecting Data on Laptops
Product Marketing Services
 
Ivanti remote worker ds
Ivanti remote worker   dsIvanti remote worker   ds
Ivanti remote worker ds
Ivanti
 
Mobile security new challenges practical solutions
Mobile security new challenges practical solutionsMobile security new challenges practical solutions
Mobile security new challenges practical solutions
Interop
 
Come gestire l'encryption dei dati con SKLM
Come gestire l'encryption dei dati con SKLMCome gestire l'encryption dei dati con SKLM
Come gestire l'encryption dei dati con SKLM
Luigi Perrone
 

What's hot (20)

IBM MaaS360 with Watson
IBM MaaS360 with WatsonIBM MaaS360 with Watson
IBM MaaS360 with Watson
 
Surveillance Video Capabilities
Surveillance Video CapabilitiesSurveillance Video Capabilities
Surveillance Video Capabilities
 
Don’t Sweat the Small Stuff – Protect What Matters Most - Interop 2014
Don’t Sweat the Small Stuff – Protect What Matters Most - Interop 2014 Don’t Sweat the Small Stuff – Protect What Matters Most - Interop 2014
Don’t Sweat the Small Stuff – Protect What Matters Most - Interop 2014
 
Immix PSIM for the Enterprise
Immix PSIM for the EnterpriseImmix PSIM for the Enterprise
Immix PSIM for the Enterprise
 
Symantec government technology summit abstract
Symantec government technology summit abstractSymantec government technology summit abstract
Symantec government technology summit abstract
 
8 Sure-Fire Ways to Manage Your Desktops
8 Sure-Fire Ways to Manage Your Desktops8 Sure-Fire Ways to Manage Your Desktops
8 Sure-Fire Ways to Manage Your Desktops
 
Prolexic Routed Product Brief - DDoS defense for protecting network and data ...
Prolexic Routed Product Brief - DDoS defense for protecting network and data ...Prolexic Routed Product Brief - DDoS defense for protecting network and data ...
Prolexic Routed Product Brief - DDoS defense for protecting network and data ...
 
Cognitive security
Cognitive securityCognitive security
Cognitive security
 
Laptop management
Laptop managementLaptop management
Laptop management
 
Guardium value proposition for fss pn 12 02-10
Guardium value proposition for fss pn 12 02-10Guardium value proposition for fss pn 12 02-10
Guardium value proposition for fss pn 12 02-10
 
Total Defense Product Information
Total Defense Product InformationTotal Defense Product Information
Total Defense Product Information
 
TrendMicro
TrendMicroTrendMicro
TrendMicro
 
Vanguard Company Highlights2009
Vanguard Company Highlights2009Vanguard Company Highlights2009
Vanguard Company Highlights2009
 
Vanguard Company Highlights2009
Vanguard Company Highlights2009Vanguard Company Highlights2009
Vanguard Company Highlights2009
 
Trend micro deep security
Trend micro deep securityTrend micro deep security
Trend micro deep security
 
The 2016 Guide to IT Identity Management
The 2016 Guide to IT Identity ManagementThe 2016 Guide to IT Identity Management
The 2016 Guide to IT Identity Management
 
Protecting Data on Laptops
Protecting Data on LaptopsProtecting Data on Laptops
Protecting Data on Laptops
 
Ivanti remote worker ds
Ivanti remote worker   dsIvanti remote worker   ds
Ivanti remote worker ds
 
Mobile security new challenges practical solutions
Mobile security new challenges practical solutionsMobile security new challenges practical solutions
Mobile security new challenges practical solutions
 
Come gestire l'encryption dei dati con SKLM
Come gestire l'encryption dei dati con SKLMCome gestire l'encryption dei dati con SKLM
Come gestire l'encryption dei dati con SKLM
 

Similar to How secure is your data?

Safeguard Your Business
Safeguard Your BusinessSafeguard Your Business
Safeguard Your Business
DWP Information Architects Inc.
 
MT50 Data is the new currency: Protect it!
MT50 Data is the new currency: Protect it!MT50 Data is the new currency: Protect it!
MT50 Data is the new currency: Protect it!
Dell EMC World
 
Good Security Whitepaper
Good Security WhitepaperGood Security Whitepaper
Good Security Whitepaper
genasun
 
Sweden dell security
Sweden dell securitySweden dell security
Sweden dell security
Ronny Stavem
 
Manage Risk By Protecting the Apps and Data That Drive Business Productivity
Manage Risk By Protecting the Apps and Data That Drive Business ProductivityManage Risk By Protecting the Apps and Data That Drive Business Productivity
Manage Risk By Protecting the Apps and Data That Drive Business Productivity
Citrix
 
Manage Risk By Protecting the Apps and Data Infographic
Manage Risk By Protecting the Apps and Data InfographicManage Risk By Protecting the Apps and Data Infographic
Manage Risk By Protecting the Apps and Data Infographic
Citrix
 
InstaSafe Zero Trust Access - Key Features and Benefits
InstaSafe Zero Trust Access - Key Features and BenefitsInstaSafe Zero Trust Access - Key Features and Benefits
InstaSafe Zero Trust Access - Key Features and Benefits
InstaSafe Technologies
 
Extending security in the cloud network box - v4
Extending security in the cloud   network box - v4Extending security in the cloud   network box - v4
Extending security in the cloud network box - v4
Valencell, Inc.
 
Top reasons why Endpoint Security should move to Cloud | Sysfore
Top reasons why Endpoint Security should move to Cloud | SysforeTop reasons why Endpoint Security should move to Cloud | Sysfore
Top reasons why Endpoint Security should move to Cloud | Sysfore
Sysfore Technologies
 
CloudWALL Profile ENG
CloudWALL Profile ENGCloudWALL Profile ENG
CloudWALL Profile ENG
CloudWALL Italia
 
Ibm Mobile Device Security Datasheet V2.0
Ibm Mobile Device Security   Datasheet   V2.0Ibm Mobile Device Security   Datasheet   V2.0
Ibm Mobile Device Security Datasheet V2.0
wendyking63
 
Beyond the PC: Combating Unmanaged Threats Security
Beyond the PC: Combating Unmanaged Threats SecurityBeyond the PC: Combating Unmanaged Threats Security
Beyond the PC: Combating Unmanaged Threats Security
Chief Optimist
 
SafeNet - Data Protection Company
SafeNet - Data Protection CompanySafeNet - Data Protection Company
SafeNet - Data Protection Company
ASBIS SK
 
Atea erfa microsoft mobile security
Atea erfa microsoft mobile securityAtea erfa microsoft mobile security
Atea erfa microsoft mobile security
J Hartig
 
White Paper: Protecting Your Cloud
White Paper: Protecting Your CloudWhite Paper: Protecting Your Cloud
White Paper: Protecting Your Cloud
thinkASG
 
4192 sslvpn sb_0412
4192 sslvpn sb_04124192 sslvpn sb_0412
4192 sslvpn sb_0412
Hai Nguyen
 
eircom Managed Security
eircom Managed Securityeircom Managed Security
eircom Managed Security
eircom
 
druva-solution-brochure
druva-solution-brochuredruva-solution-brochure
druva-solution-brochure
Vitalie Bucatel
 
Virtual Data Room Brochure
Virtual Data Room BrochureVirtual Data Room Brochure
Virtual Data Room Brochure
EthosData
 
Assuring Reliable and Secure IT Services
Assuring Reliable and Secure IT ServicesAssuring Reliable and Secure IT Services
Assuring Reliable and Secure IT Services
tsaiblake
 

Similar to How secure is your data? (20)

Safeguard Your Business
Safeguard Your BusinessSafeguard Your Business
Safeguard Your Business
 
MT50 Data is the new currency: Protect it!
MT50 Data is the new currency: Protect it!MT50 Data is the new currency: Protect it!
MT50 Data is the new currency: Protect it!
 
Good Security Whitepaper
Good Security WhitepaperGood Security Whitepaper
Good Security Whitepaper
 
Sweden dell security
Sweden dell securitySweden dell security
Sweden dell security
 
Manage Risk By Protecting the Apps and Data That Drive Business Productivity
Manage Risk By Protecting the Apps and Data That Drive Business ProductivityManage Risk By Protecting the Apps and Data That Drive Business Productivity
Manage Risk By Protecting the Apps and Data That Drive Business Productivity
 
Manage Risk By Protecting the Apps and Data Infographic
Manage Risk By Protecting the Apps and Data InfographicManage Risk By Protecting the Apps and Data Infographic
Manage Risk By Protecting the Apps and Data Infographic
 
InstaSafe Zero Trust Access - Key Features and Benefits
InstaSafe Zero Trust Access - Key Features and BenefitsInstaSafe Zero Trust Access - Key Features and Benefits
InstaSafe Zero Trust Access - Key Features and Benefits
 
Extending security in the cloud network box - v4
Extending security in the cloud   network box - v4Extending security in the cloud   network box - v4
Extending security in the cloud network box - v4
 
Top reasons why Endpoint Security should move to Cloud | Sysfore
Top reasons why Endpoint Security should move to Cloud | SysforeTop reasons why Endpoint Security should move to Cloud | Sysfore
Top reasons why Endpoint Security should move to Cloud | Sysfore
 
CloudWALL Profile ENG
CloudWALL Profile ENGCloudWALL Profile ENG
CloudWALL Profile ENG
 
Ibm Mobile Device Security Datasheet V2.0
Ibm Mobile Device Security   Datasheet   V2.0Ibm Mobile Device Security   Datasheet   V2.0
Ibm Mobile Device Security Datasheet V2.0
 
Beyond the PC: Combating Unmanaged Threats Security
Beyond the PC: Combating Unmanaged Threats SecurityBeyond the PC: Combating Unmanaged Threats Security
Beyond the PC: Combating Unmanaged Threats Security
 
SafeNet - Data Protection Company
SafeNet - Data Protection CompanySafeNet - Data Protection Company
SafeNet - Data Protection Company
 
Atea erfa microsoft mobile security
Atea erfa microsoft mobile securityAtea erfa microsoft mobile security
Atea erfa microsoft mobile security
 
White Paper: Protecting Your Cloud
White Paper: Protecting Your CloudWhite Paper: Protecting Your Cloud
White Paper: Protecting Your Cloud
 
4192 sslvpn sb_0412
4192 sslvpn sb_04124192 sslvpn sb_0412
4192 sslvpn sb_0412
 
eircom Managed Security
eircom Managed Securityeircom Managed Security
eircom Managed Security
 
druva-solution-brochure
druva-solution-brochuredruva-solution-brochure
druva-solution-brochure
 
Virtual Data Room Brochure
Virtual Data Room BrochureVirtual Data Room Brochure
Virtual Data Room Brochure
 
Assuring Reliable and Secure IT Services
Assuring Reliable and Secure IT ServicesAssuring Reliable and Secure IT Services
Assuring Reliable and Secure IT Services
 

More from Rob Levey

Does your Data have Super-Powers?
Does your Data have Super-Powers?Does your Data have Super-Powers?
Does your Data have Super-Powers?
Rob Levey
 
Rune - Empowering User-based Security
Rune  - Empowering User-based SecurityRune  - Empowering User-based Security
Rune - Empowering User-based Security
Rob Levey
 
Unleash the power of your people mar2012
Unleash the power of your people mar2012Unleash the power of your people mar2012
Unleash the power of your people mar2012
Rob Levey
 
How to say NO to outrageous Preservation Requests
How to say NO to outrageous Preservation RequestsHow to say NO to outrageous Preservation Requests
How to say NO to outrageous Preservation Requests
Rob Levey
 
Annual Performance Reviews
Annual Performance ReviewsAnnual Performance Reviews
Annual Performance Reviews
Rob Levey
 
Using Power Maps for Sales Success
Using Power Maps for Sales SuccessUsing Power Maps for Sales Success
Using Power Maps for Sales Success
Rob Levey
 
Catelas 360 degree Partner Assessments
Catelas 360 degree Partner Assessments Catelas 360 degree Partner Assessments
Catelas 360 degree Partner Assessments
Rob Levey
 
Are you spending too much on Legal settlement costs?
Are you spending too much on Legal settlement costs?Are you spending too much on Legal settlement costs?
Are you spending too much on Legal settlement costs?
Rob Levey
 
Catelas Investigations & Litigation
Catelas Investigations & LitigationCatelas Investigations & Litigation
Catelas Investigations & Litigation
Rob Levey
 
Catelas - Conducting cost effective Internal Investigations
Catelas  -  Conducting cost effective Internal InvestigationsCatelas  -  Conducting cost effective Internal Investigations
Catelas - Conducting cost effective Internal Investigations
Rob Levey
 
Catelas Early Case Assessment Trap
Catelas Early Case Assessment TrapCatelas Early Case Assessment Trap
Catelas Early Case Assessment Trap
Rob Levey
 
Collaborative Selling
Collaborative SellingCollaborative Selling
Collaborative Selling
Rob Levey
 
Early Case Analytics
Early Case AnalyticsEarly Case Analytics
Early Case Analytics
Rob Levey
 
Catelas Visual Identification for eDiscovery
Catelas Visual Identification for eDiscoveryCatelas Visual Identification for eDiscovery
Catelas Visual Identification for eDiscovery
Rob Levey
 
Collaboration webinar
Collaboration webinar Collaboration webinar
Collaboration webinar
Rob Levey
 
How corrupt is your International Business?
How corrupt is your International Business?How corrupt is your International Business?
How corrupt is your International Business?
Rob Levey
 
Unleash the power of your people
Unleash the power of your peopleUnleash the power of your people
Unleash the power of your people
Rob Levey
 
CRM Tools Suck
CRM Tools SuckCRM Tools Suck
CRM Tools Suck
Rob Levey
 
Catelas Security & Investigations
Catelas Security & InvestigationsCatelas Security & Investigations
Catelas Security & Investigations
Rob Levey
 
Catelas Deloitte FCPA webinar
Catelas Deloitte FCPA webinarCatelas Deloitte FCPA webinar
Catelas Deloitte FCPA webinar
Rob Levey
 

More from Rob Levey (20)

Does your Data have Super-Powers?
Does your Data have Super-Powers?Does your Data have Super-Powers?
Does your Data have Super-Powers?
 
Rune - Empowering User-based Security
Rune  - Empowering User-based SecurityRune  - Empowering User-based Security
Rune - Empowering User-based Security
 
Unleash the power of your people mar2012
Unleash the power of your people mar2012Unleash the power of your people mar2012
Unleash the power of your people mar2012
 
How to say NO to outrageous Preservation Requests
How to say NO to outrageous Preservation RequestsHow to say NO to outrageous Preservation Requests
How to say NO to outrageous Preservation Requests
 
Annual Performance Reviews
Annual Performance ReviewsAnnual Performance Reviews
Annual Performance Reviews
 
Using Power Maps for Sales Success
Using Power Maps for Sales SuccessUsing Power Maps for Sales Success
Using Power Maps for Sales Success
 
Catelas 360 degree Partner Assessments
Catelas 360 degree Partner Assessments Catelas 360 degree Partner Assessments
Catelas 360 degree Partner Assessments
 
Are you spending too much on Legal settlement costs?
Are you spending too much on Legal settlement costs?Are you spending too much on Legal settlement costs?
Are you spending too much on Legal settlement costs?
 
Catelas Investigations & Litigation
Catelas Investigations & LitigationCatelas Investigations & Litigation
Catelas Investigations & Litigation
 
Catelas - Conducting cost effective Internal Investigations
Catelas  -  Conducting cost effective Internal InvestigationsCatelas  -  Conducting cost effective Internal Investigations
Catelas - Conducting cost effective Internal Investigations
 
Catelas Early Case Assessment Trap
Catelas Early Case Assessment TrapCatelas Early Case Assessment Trap
Catelas Early Case Assessment Trap
 
Collaborative Selling
Collaborative SellingCollaborative Selling
Collaborative Selling
 
Early Case Analytics
Early Case AnalyticsEarly Case Analytics
Early Case Analytics
 
Catelas Visual Identification for eDiscovery
Catelas Visual Identification for eDiscoveryCatelas Visual Identification for eDiscovery
Catelas Visual Identification for eDiscovery
 
Collaboration webinar
Collaboration webinar Collaboration webinar
Collaboration webinar
 
How corrupt is your International Business?
How corrupt is your International Business?How corrupt is your International Business?
How corrupt is your International Business?
 
Unleash the power of your people
Unleash the power of your peopleUnleash the power of your people
Unleash the power of your people
 
CRM Tools Suck
CRM Tools SuckCRM Tools Suck
CRM Tools Suck
 
Catelas Security & Investigations
Catelas Security & InvestigationsCatelas Security & Investigations
Catelas Security & Investigations
 
Catelas Deloitte FCPA webinar
Catelas Deloitte FCPA webinarCatelas Deloitte FCPA webinar
Catelas Deloitte FCPA webinar
 

Recently uploaded

Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
Tatiana Kojar
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
panagenda
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Speck&Tech
 
OpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - AuthorizationOpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - Authorization
David Brossard
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
ssuserfac0301
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
MichaelKnudsen27
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
Jakub Marek
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
Pixlogix Infotech
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
Zilliz
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
Zilliz
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
Recommendation System using RAG Architecture
Recommendation System using RAG ArchitectureRecommendation System using RAG Architecture
Recommendation System using RAG Architecture
fredae14
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
DanBrown980551
 
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
IndexBug
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
tolgahangng
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
Edge AI and Vision Alliance
 
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxOcean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
SitimaJohn
 
UI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentationUI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentation
Wouter Lemaire
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 

Recently uploaded (20)

Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
 
OpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - AuthorizationOpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - Authorization
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
Recommendation System using RAG Architecture
Recommendation System using RAG ArchitectureRecommendation System using RAG Architecture
Recommendation System using RAG Architecture
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
 
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
 
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxOcean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
 
UI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentationUI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentation
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 

How secure is your data?

  • 1. How secure is your data? ENCRYPTION MADE EASY
  • 2. Current Security Landscape “Take heed of Lockheed… the attackers are really smart and their exploits are highly sophisticated” Art Coviello - RSA Breaches are increasing and becoming more frequent and more costly ENCRYPTION MADE EASY
  • 3. Rune background and pedigree Created by a team of security stalwarts to: “absolutely ensure that critically sensitive information does not get into the wrong hands” “develop an encryption technique that was simple to use and portable” Backed and supported by industry and government experts Deployed in hostile environments such as Afghanistan, Somalia and China ENCRYPTION MADE EASY
  • 4. What Does Rune Information Security Do? We don’t secure every potential vulnerability – we secure sensitive data that is important to you Ideal for small user groups who need to share sensitive data The user decides what data needs to be secured (not an enterprise-wide policy) Military-grade encryption made easy… • Using any portable USB device • Floating tool bar • Select it, Secure it ENCRYPTION MADE EASY
  • 5. User Groups requiring extra protection? Cyber-security teams – requiring higher than enterprise level data security Government & Military contractors – working with highly sensitive military/defense information Intra company secure comms – establish secure, encrypted channels with partners / 3rd parties Senior Management and Board Level communications R&D teams – clinical trials, international operations in countries like China Legal teams – attorney/client privilege ENCRYPTION MADE EASY
  • 6. Use Case - Executives on the move Senior executives travel a lot and work from anywhere The data they carry and share is usually sensitive Security sometimes takes 2nd place to productivity Executive Protection (personal) is a concern, but data protection is not? Airport Hotel Trusted circle of comms Partner office and data for Leadership Team anytime, anywhere Home office ENCRYPTION MADE EASY
  • 7. Use Case - intra-company data & communications Examples: Outside Counsel, Payroll Processor, Manufacturing Partner Rapid deployment (within 24 hours) Partner, Government, Consultant, Law Strong authentication and control Firm, Customer, etc. Minimal set-up between parties Military-grade encryption – for data at rest and in motion Easy to use Secure data transfer Establish secure Client company-to-company company communications within hours ENCRYPTION MADE EASY
  • 8. Customer Use Cases Government & Military teams keep operational directives secure in hostile areas Board Level projects and communications Executives travelling to high risk countries with sensitive company data ENCRYPTION MADE EASY
  • 9. Easy deployment and flexible management model 1 USB device per user Small number of users and/or groups No management required Deployed in hours (monthly or annual) USB devices provided or software Multiple users and groups Client (or 3rd party) chooses to manage Deployed in days ENCRYPTION MADE EASY
  • 10. Easy Deployment & Pricing Model Define your user groups Ship devices (or download software) to users Load application and go From $300 to $1,500 per user per year Annual or monthly service Managed Service or client-owned ENCRYPTION MADE EASY
  • 11. For More Information Contact Us Rune Information Security Rob Levey, VP North America Phone: +1 978-996-2758 Email: robert.levey@rune.sg Web: www.rune.sg ENCRYPTION MADE EASY