SlideShare a Scribd company logo
Rune – Does Your Data Have
             Superpowers?
Information Security Is Compromised – We need a
hero
Read the news everyday:
  Easily identify passwords through brute force
    24 seconds to break a NTLM login password
    http://www.zdnet.com/blog/hardware/cheap-gpus-are-rendering-strong-passwords-
     useless/13125
  World‟s first commercial quantum computer
    Rapidly compromises all PKI based internet transactions
    http://venturebeat.com/2011/05/27/first-quantum-computer-sold/
  RSA – Secure ID compromised
    Math-based token encryption compromised
    http://www.pcworld.com/businesscenter/article/229553/after_hack_rsa_offers_to_re
     place_secureid_tokens.html
  Citi massive credit cards breached for the 2nd time
    http://www.wired.com/threatlevel/2011/06/citibank-hacked/
  LulzSec
    New kind of hacking group that is exposing vulnerabilities
    http://www.guardian.co.uk/technology/2011/jun/14/us-politics-hacking-senate-
     lulzsec
Why is the Vema-Cipher Platform Different?
 Data-centric
   Encrypted information easily moves across any infrastructure even
    public internet
 Can be used in combination with math-based
 solutions like RSA SecureID®
   Second tier of encryption in the event RSA or other math-based
    cipher „seed values‟ are compromised
 Two encryption modes: Variable-Strength
   Free math based cipher: Standards based PKI and AES Keys
   Paid Vernam cipher: VC-Pad™
 First Vernam Encryption Product of it‟s kind
   A One-time pad „wrapped‟ in a standards based AES 256 encryption
   The VC-Pad™ is an encryption key based on random numbers that
    are not mathematically derived
The Vema-Cipher Value: Unconditional Security

 Encryption for those that need security in addition
 to compliance
   Personal information
   Business intelligence
   Proprietary information
 Secures your data locally or in the cloud
   No matter where data is stored… You control exactly who can read
    your message
 Defends your data as it moves though hostile
 environments
 Innovative yet proven approach to data security
   Standards based compliance coupled with unbreakable encryption
• Secure:
    •   Proven, unbreakable
        Vernam cipher
    •   VC-Key™ creates a
                                                  Compliance
        completely random                          FIPS 140-2
        message – immune to
        brute-force attacks
    •   Stops man-in-the-middle
        attacks
• Compliance:
    •   FIPS 140-2 standards-
        based encryption
                                  Simple to Use                    Secure
• Simple to use: 3 steps           3 Easy Steps                 Vernam Cipher
    •   Set your audience
    •   Select your message or
        document
    •   Click to encrypt or
        decrypt
Historical “Vernam” issues addressed
 Utilizes modern dense storage devices
   Addresses requirement for 1 to 1 VC-Pad™ to data ratio
 Random number generators are readily available
   No longer difficult to generate
   Proven TRNG products from Comscire, ID Quantique e.g.
   Pass NIST‟s die hard test for cryptographically secure random numbers
 Multiple methods for VC-Pad™ exchange
   Physical – For enhanced security policies
   Electronic – Much more secure than current, standard PKI solutions
 VC-Pad™ can be physically secured
   VC-Pad™ can be on external hard drives with strong defense
    mechanisms (Biometric, GPS, e.g.)
 VC-Pad™ are not reused
   Tracks where you are at in the VC-Pad™ random mass
   Delete when it makes sense – Doesn‟t affect integrity of cipher-text
Rune Delivers
 Veri-Cipher Platform
   Open source, standards-based crypto engine
   Supports Vernam encryption
   Integrate into many different applications
 Deadbolt
   Application to secure your data
 Locksmith
   Made up of Agent(s) and Vault(s)
   System to make “Vernam” VC-Pad™
   System to manage standards based keys and VC-Pad™
3 clicks or less
Vernam and standards-based encryption
Easy key and VC-Pad™ management
Only deploy to those that need to know
Minimal to no IT department overhead
Rune can manufacture VC-Pad™ or customers can
purchase Locksmith & Vault appliances
to manufacture freely
Deadbolt Application: How it Works
 Simple floating tool-bar
 Easily set your target audience: 1 person or many




 Select text or file and click 1 button to encrypt
 Encrypted text or file is created

 The encrypted file is ready to send or store
Locksmith System made up of Agents
and a Vault
Collects random numbers
Creates VC-Pads™ for unbreakable
encryption
Produces VC-Pad™ on USB devices or
optical storage
Integrates automatically with Vault
Use one or many to speed up production
times
Maintain control of system
Creates an escrow of asymmetric keys and
symmetric VC-Pad™
Standards based approach (OASIS)
Manage users, groups, permissions, keys & VC-Pads™
that are deployed
Add users to groups
Easily re-key devices for data retrieval
Software Packages
 Deadbolt LT is a free open-source version of the
 software that provides asymmetric encryption only
 Deadbolt can be purchased as a stand-alone product
 for personal use
   Rune manufactures VC-Pads™
   Can use stronger symmetric encryption for personal archival or
    small group communications
 Locksmith Systems are sold in various packages for
 larger group communications
   Includes Deadbolt, Agent(s) and Vault(s)
   Allow users to manufacture own VC-Pads™
Locksmith Systems
 Locksmith UP (Ultra Portable)
   All systems in highly portable laptop form factor – Supports up to
    50 users – Custom solutions available
 Locksmith 100
   2 Agents, 1 Vault 100, 100 USB Tokens, Supports 100 Users
 Locksmith 250
   5 Agents, 1 Vault 250, 250 USB Tokens, Supports 250 Users
 Locksmith 500
   10 Agents, 1 Vault 500, 500 USB Tokens, Supports 500 Users
 Larger than 500 please discuss solution with your
 sales representative
Rune = Unconditional Security
 Executive teams communicate with confidence in
 open SharePoint platforms
 Finance teams collaborate effectively and inside-
 information leaks are prevented
 Financial institutions securely transmit sensitive
 information
 Legal teams communicate securely with clients
 M&A teams negotiate deals in total privacy
 R&D teams out-perform competitors by protecting
 critical IP
 Government & Military teams keep operational
 directives secure
Contact Us
 Rune Information Security Company Pte Ltd
  1 Raffles Place
  One Raffles Place
  Level 24-00
  Singapore 048616
  PH: +65 6408-0575
  Email: sales@rune.sg
  Web: www.rune.sg

More Related Content

What's hot

Intrusion Detection System(IDS)
Intrusion Detection System(IDS)Intrusion Detection System(IDS)
Intrusion Detection System(IDS)
shraddha_b
 
GreenTec WORMdisk & CYBERdisk Capabilities
GreenTec WORMdisk & CYBERdisk CapabilitiesGreenTec WORMdisk & CYBERdisk Capabilities
GreenTec WORMdisk & CYBERdisk Capabilities
Keith P. Melvey
 
Hardwar based Security of Systems
Hardwar based Security of SystemsHardwar based Security of Systems
Hardwar based Security of Systems
Jamal Jamali
 
Blancco Drive Eraser - product sheet
Blancco Drive Eraser - product sheetBlancco Drive Eraser - product sheet
Blancco Drive Eraser - product sheet
Christophe Elut
 
Network security and protocols
Network security and protocolsNetwork security and protocols
Network security and protocols
Online
 
Lecture 5
Lecture 5Lecture 5
Lecture 5
Education
 
Network and network security
Network and network securityNetwork and network security
Network and network security
Ruchi Gupta
 
Mobile Banking Channel Security - Cyber Security Conference 2011
Mobile Banking Channel Security - Cyber Security Conference 2011Mobile Banking Channel Security - Cyber Security Conference 2011
Mobile Banking Channel Security - Cyber Security Conference 2011
Filip Maertens
 
Security data sheet
Security data sheetSecurity data sheet
Security data sheet
INSZoom
 
Intrusion detection and prevention system
Intrusion detection and prevention systemIntrusion detection and prevention system
Intrusion detection and prevention system
Nikhil Raj
 
Network security
Network securityNetwork security
Network security
Mahmoud Abdeen
 
Intrusion Detection And Prevention
Intrusion Detection And PreventionIntrusion Detection And Prevention
Intrusion Detection And Prevention
Nicholas Davis
 
P2PE Solutions From Futurex
P2PE Solutions From FuturexP2PE Solutions From Futurex
P2PE Solutions From Futurex
Greg Stone
 
Intrusion prevention systems
Intrusion prevention systemsIntrusion prevention systems
Intrusion prevention systems
samis
 
Blancco Drive Eraser
Blancco Drive EraserBlancco Drive Eraser
Blancco Drive Eraser
Jemma Elliott
 
Network security and System Admin
Network security and System AdminNetwork security and System Admin
Network security and System Admin
MD SAHABUDDIN
 
Hacking
HackingHacking
Rivetz Corp. - Building the hardware protected wallet
Rivetz Corp. - Building the hardware protected walletRivetz Corp. - Building the hardware protected wallet
Rivetz Corp. - Building the hardware protected wallet
Steven Sprague
 
Intrusion dDetection
Intrusion dDetectionIntrusion dDetection
Intrusion dDetection
Aayush Khandelwal
 
RSA Conference 2011 Presentation: BYOC: Securing Untrusted, Employee-Owned De...
RSA Conference 2011 Presentation: BYOC: Securing Untrusted, Employee-Owned De...RSA Conference 2011 Presentation: BYOC: Securing Untrusted, Employee-Owned De...
RSA Conference 2011 Presentation: BYOC: Securing Untrusted, Employee-Owned De...
John Whaley
 

What's hot (20)

Intrusion Detection System(IDS)
Intrusion Detection System(IDS)Intrusion Detection System(IDS)
Intrusion Detection System(IDS)
 
GreenTec WORMdisk & CYBERdisk Capabilities
GreenTec WORMdisk & CYBERdisk CapabilitiesGreenTec WORMdisk & CYBERdisk Capabilities
GreenTec WORMdisk & CYBERdisk Capabilities
 
Hardwar based Security of Systems
Hardwar based Security of SystemsHardwar based Security of Systems
Hardwar based Security of Systems
 
Blancco Drive Eraser - product sheet
Blancco Drive Eraser - product sheetBlancco Drive Eraser - product sheet
Blancco Drive Eraser - product sheet
 
Network security and protocols
Network security and protocolsNetwork security and protocols
Network security and protocols
 
Lecture 5
Lecture 5Lecture 5
Lecture 5
 
Network and network security
Network and network securityNetwork and network security
Network and network security
 
Mobile Banking Channel Security - Cyber Security Conference 2011
Mobile Banking Channel Security - Cyber Security Conference 2011Mobile Banking Channel Security - Cyber Security Conference 2011
Mobile Banking Channel Security - Cyber Security Conference 2011
 
Security data sheet
Security data sheetSecurity data sheet
Security data sheet
 
Intrusion detection and prevention system
Intrusion detection and prevention systemIntrusion detection and prevention system
Intrusion detection and prevention system
 
Network security
Network securityNetwork security
Network security
 
Intrusion Detection And Prevention
Intrusion Detection And PreventionIntrusion Detection And Prevention
Intrusion Detection And Prevention
 
P2PE Solutions From Futurex
P2PE Solutions From FuturexP2PE Solutions From Futurex
P2PE Solutions From Futurex
 
Intrusion prevention systems
Intrusion prevention systemsIntrusion prevention systems
Intrusion prevention systems
 
Blancco Drive Eraser
Blancco Drive EraserBlancco Drive Eraser
Blancco Drive Eraser
 
Network security and System Admin
Network security and System AdminNetwork security and System Admin
Network security and System Admin
 
Hacking
HackingHacking
Hacking
 
Rivetz Corp. - Building the hardware protected wallet
Rivetz Corp. - Building the hardware protected walletRivetz Corp. - Building the hardware protected wallet
Rivetz Corp. - Building the hardware protected wallet
 
Intrusion dDetection
Intrusion dDetectionIntrusion dDetection
Intrusion dDetection
 
RSA Conference 2011 Presentation: BYOC: Securing Untrusted, Employee-Owned De...
RSA Conference 2011 Presentation: BYOC: Securing Untrusted, Employee-Owned De...RSA Conference 2011 Presentation: BYOC: Securing Untrusted, Employee-Owned De...
RSA Conference 2011 Presentation: BYOC: Securing Untrusted, Employee-Owned De...
 

Viewers also liked

Sete Motivos Para Fazer Um Blog
Sete Motivos Para Fazer Um BlogSete Motivos Para Fazer Um Blog
Sete Motivos Para Fazer Um Blog
Carlos Henrique
 
Discount mobility sells clearance products
Discount mobility sells clearance productsDiscount mobility sells clearance products
Discount mobility sells clearance products
indunair
 
AP chinese updates
AP chinese updatesAP chinese updates
Using Technology to connect Students Worldwide K-12
Using Technology to connect Students Worldwide K-12Using Technology to connect Students Worldwide K-12
Using Technology to connect Students Worldwide K-12
Center for Global Education at Asia Society
 
Lojalność klienta budowana w nowych mediach
Lojalność klienta budowana w nowych mediachLojalność klienta budowana w nowych mediach
Lojalność klienta budowana w nowych mediach
Grupa Adweb
 
Adwords und Landingpages
Adwords und LandingpagesAdwords und Landingpages
Adwords und Landingpages
Kai Radanitsch
 
Developing qualified chinese language teachers
Developing qualified chinese language teachersDeveloping qualified chinese language teachers
Developing qualified chinese language teachers
Center for Global Education at Asia Society
 
Restoration uk
Restoration ukRestoration uk
Restoration uk
indunair
 
Youth Exchanges
Youth ExchangesYouth Exchanges
Preparing Teachers To Teach About The World
Preparing Teachers To Teach About The WorldPreparing Teachers To Teach About The World
Preparing Teachers To Teach About The World
Center for Global Education at Asia Society
 
No Author North Carolina Educational Exchange
No Author North Carolina Educational ExchangeNo Author North Carolina Educational Exchange
No Author North Carolina Educational Exchange
Center for Global Education at Asia Society
 
Idea Cycles (1)
Idea Cycles (1)Idea Cycles (1)
Idea Cycles (1)
R. Sosa
 
Asia Society Asia Society PGL Chinese in After School
Asia Society Asia Society PGL Chinese in After SchoolAsia Society Asia Society PGL Chinese in After School
Asia Society Asia Society PGL Chinese in After School
Center for Global Education at Asia Society
 
Kakslauttanen igloo village
Kakslauttanen igloo villageKakslauttanen igloo village
Kakslauttanen igloo village
indunair
 
Richey Ryan FLAP
Richey Ryan FLAPRichey Ryan FLAP
Making The Most Of Teacher Training Programs
Making The Most Of Teacher Training ProgramsMaking The Most Of Teacher Training Programs
Making The Most Of Teacher Training Programs
Center for Global Education at Asia Society
 
India Media and Digital 2012
India Media and Digital 2012India Media and Digital 2012
India Media and Digital 2012
Nitin Karkara
 
conception 2009 Werbung und Marketing GmbH, Siegen
conception 2009 Werbung und Marketing GmbH, Siegenconception 2009 Werbung und Marketing GmbH, Siegen
conception 2009 Werbung und Marketing GmbH, Siegen
conception Kommunikationsagentur GmbH
 
Peters: Water Wars
Peters:  Water WarsPeters:  Water Wars

Viewers also liked (20)

Sete Motivos Para Fazer Um Blog
Sete Motivos Para Fazer Um BlogSete Motivos Para Fazer Um Blog
Sete Motivos Para Fazer Um Blog
 
Discount mobility sells clearance products
Discount mobility sells clearance productsDiscount mobility sells clearance products
Discount mobility sells clearance products
 
AP chinese updates
AP chinese updatesAP chinese updates
AP chinese updates
 
Using Technology to connect Students Worldwide K-12
Using Technology to connect Students Worldwide K-12Using Technology to connect Students Worldwide K-12
Using Technology to connect Students Worldwide K-12
 
Lojalność klienta budowana w nowych mediach
Lojalność klienta budowana w nowych mediachLojalność klienta budowana w nowych mediach
Lojalność klienta budowana w nowych mediach
 
Adwords und Landingpages
Adwords und LandingpagesAdwords und Landingpages
Adwords und Landingpages
 
Developing qualified chinese language teachers
Developing qualified chinese language teachersDeveloping qualified chinese language teachers
Developing qualified chinese language teachers
 
Restoration uk
Restoration ukRestoration uk
Restoration uk
 
Youth Exchanges
Youth ExchangesYouth Exchanges
Youth Exchanges
 
Preparing Teachers To Teach About The World
Preparing Teachers To Teach About The WorldPreparing Teachers To Teach About The World
Preparing Teachers To Teach About The World
 
No Author North Carolina Educational Exchange
No Author North Carolina Educational ExchangeNo Author North Carolina Educational Exchange
No Author North Carolina Educational Exchange
 
Idea Cycles (1)
Idea Cycles (1)Idea Cycles (1)
Idea Cycles (1)
 
Asia Society Asia Society PGL Chinese in After School
Asia Society Asia Society PGL Chinese in After SchoolAsia Society Asia Society PGL Chinese in After School
Asia Society Asia Society PGL Chinese in After School
 
Kakslauttanen igloo village
Kakslauttanen igloo villageKakslauttanen igloo village
Kakslauttanen igloo village
 
Richey Ryan FLAP
Richey Ryan FLAPRichey Ryan FLAP
Richey Ryan FLAP
 
Making The Most Of Teacher Training Programs
Making The Most Of Teacher Training ProgramsMaking The Most Of Teacher Training Programs
Making The Most Of Teacher Training Programs
 
India Media and Digital 2012
India Media and Digital 2012India Media and Digital 2012
India Media and Digital 2012
 
conception 2009 Werbung und Marketing GmbH, Siegen
conception 2009 Werbung und Marketing GmbH, Siegenconception 2009 Werbung und Marketing GmbH, Siegen
conception 2009 Werbung und Marketing GmbH, Siegen
 
The use of chinese movies in language classrooms
The use of chinese movies in language classroomsThe use of chinese movies in language classrooms
The use of chinese movies in language classrooms
 
Peters: Water Wars
Peters:  Water WarsPeters:  Water Wars
Peters: Water Wars
 

Similar to Rune - Empowering User-based Security

Schneider-Electric & NextNine – Comparing Remote Connectivity Solutions
Schneider-Electric & NextNine – Comparing Remote Connectivity SolutionsSchneider-Electric & NextNine – Comparing Remote Connectivity Solutions
Schneider-Electric & NextNine – Comparing Remote Connectivity Solutions
Honeywell
 
Building Trust Despite Digital Personal Devices
Building Trust Despite Digital Personal DevicesBuilding Trust Despite Digital Personal Devices
Building Trust Despite Digital Personal Devices
Javier González
 
Secrity project keyvan
Secrity project   keyvanSecrity project   keyvan
Secrity project keyvan
itrraincity
 
Secure channels main deck
Secure channels main deckSecure channels main deck
Secure channels main deck
Richard Blech
 
SafeNet overview 2014
SafeNet overview 2014SafeNet overview 2014
SafeNet overview 2014
Sectricity
 
Computer & Data Security
Computer & Data SecurityComputer & Data Security
Computer & Data Security
Frederik Questier
 
OmniSpotlight 05-2014
OmniSpotlight 05-2014OmniSpotlight 05-2014
OmniSpotlight 05-2014
Anita Lösch
 
Offline attacks-and-hard-disk-encription
Offline attacks-and-hard-disk-encriptionOffline attacks-and-hard-disk-encription
Offline attacks-and-hard-disk-encription
malvvv
 
Come gestire l'encryption dei dati con SKLM
Come gestire l'encryption dei dati con SKLMCome gestire l'encryption dei dati con SKLM
Come gestire l'encryption dei dati con SKLM
Luigi Perrone
 
Windows network security
Windows network securityWindows network security
Windows network security
Information Technology
 
CertainSafe MicroTokenization Technology Detailed Overview
CertainSafe MicroTokenization Technology Detailed OverviewCertainSafe MicroTokenization Technology Detailed Overview
CertainSafe MicroTokenization Technology Detailed Overview
Steven Russo
 
Mis jaiswal-chapter-11
Mis jaiswal-chapter-11Mis jaiswal-chapter-11
Mis jaiswal-chapter-11
Amit Fogla
 
Build A Solid Foundation For Industrial Network Security - Cybersecurity Webi...
Build A Solid Foundation For Industrial Network Security - Cybersecurity Webi...Build A Solid Foundation For Industrial Network Security - Cybersecurity Webi...
Build A Solid Foundation For Industrial Network Security - Cybersecurity Webi...
Jiunn-Jer Sun
 
Onepager w10 security
Onepager w10 securityOnepager w10 security
Onepager w10 security
Louise Berri Lange
 
CipherWire Networks - SafeNet KeySecure
CipherWire Networks - SafeNet KeySecureCipherWire Networks - SafeNet KeySecure
CipherWire Networks - SafeNet KeySecure
cnnetwork
 
withsecure-elements-epp-brochure-en.pdf
withsecure-elements-epp-brochure-en.pdfwithsecure-elements-epp-brochure-en.pdf
withsecure-elements-epp-brochure-en.pdf
MdZabedHossain2
 
4 Easy Steps for Increased Industrial Cybersecurity
4 Easy Steps for Increased Industrial Cybersecurity4 Easy Steps for Increased Industrial Cybersecurity
4 Easy Steps for Increased Industrial Cybersecurity
Westermo Network Technologies
 
Block Armour Brochure
Block Armour BrochureBlock Armour Brochure
Block Armour Brochure
Block Armour
 
Block Armour Brochure
Block Armour BrochureBlock Armour Brochure
Block Armour Brochure
Floyd DCosta
 
Bezpečnost není jen antivirus
Bezpečnost není jen antivirusBezpečnost není jen antivirus
Bezpečnost není jen antivirus
MarketingArrowECS_CZ
 

Similar to Rune - Empowering User-based Security (20)

Schneider-Electric & NextNine – Comparing Remote Connectivity Solutions
Schneider-Electric & NextNine – Comparing Remote Connectivity SolutionsSchneider-Electric & NextNine – Comparing Remote Connectivity Solutions
Schneider-Electric & NextNine – Comparing Remote Connectivity Solutions
 
Building Trust Despite Digital Personal Devices
Building Trust Despite Digital Personal DevicesBuilding Trust Despite Digital Personal Devices
Building Trust Despite Digital Personal Devices
 
Secrity project keyvan
Secrity project   keyvanSecrity project   keyvan
Secrity project keyvan
 
Secure channels main deck
Secure channels main deckSecure channels main deck
Secure channels main deck
 
SafeNet overview 2014
SafeNet overview 2014SafeNet overview 2014
SafeNet overview 2014
 
Computer & Data Security
Computer & Data SecurityComputer & Data Security
Computer & Data Security
 
OmniSpotlight 05-2014
OmniSpotlight 05-2014OmniSpotlight 05-2014
OmniSpotlight 05-2014
 
Offline attacks-and-hard-disk-encription
Offline attacks-and-hard-disk-encriptionOffline attacks-and-hard-disk-encription
Offline attacks-and-hard-disk-encription
 
Come gestire l'encryption dei dati con SKLM
Come gestire l'encryption dei dati con SKLMCome gestire l'encryption dei dati con SKLM
Come gestire l'encryption dei dati con SKLM
 
Windows network security
Windows network securityWindows network security
Windows network security
 
CertainSafe MicroTokenization Technology Detailed Overview
CertainSafe MicroTokenization Technology Detailed OverviewCertainSafe MicroTokenization Technology Detailed Overview
CertainSafe MicroTokenization Technology Detailed Overview
 
Mis jaiswal-chapter-11
Mis jaiswal-chapter-11Mis jaiswal-chapter-11
Mis jaiswal-chapter-11
 
Build A Solid Foundation For Industrial Network Security - Cybersecurity Webi...
Build A Solid Foundation For Industrial Network Security - Cybersecurity Webi...Build A Solid Foundation For Industrial Network Security - Cybersecurity Webi...
Build A Solid Foundation For Industrial Network Security - Cybersecurity Webi...
 
Onepager w10 security
Onepager w10 securityOnepager w10 security
Onepager w10 security
 
CipherWire Networks - SafeNet KeySecure
CipherWire Networks - SafeNet KeySecureCipherWire Networks - SafeNet KeySecure
CipherWire Networks - SafeNet KeySecure
 
withsecure-elements-epp-brochure-en.pdf
withsecure-elements-epp-brochure-en.pdfwithsecure-elements-epp-brochure-en.pdf
withsecure-elements-epp-brochure-en.pdf
 
4 Easy Steps for Increased Industrial Cybersecurity
4 Easy Steps for Increased Industrial Cybersecurity4 Easy Steps for Increased Industrial Cybersecurity
4 Easy Steps for Increased Industrial Cybersecurity
 
Block Armour Brochure
Block Armour BrochureBlock Armour Brochure
Block Armour Brochure
 
Block Armour Brochure
Block Armour BrochureBlock Armour Brochure
Block Armour Brochure
 
Bezpečnost není jen antivirus
Bezpečnost není jen antivirusBezpečnost není jen antivirus
Bezpečnost není jen antivirus
 

More from Rob Levey

How secure is your data?
How secure is your data?How secure is your data?
How secure is your data?
Rob Levey
 
Does your Data have Super-Powers?
Does your Data have Super-Powers?Does your Data have Super-Powers?
Does your Data have Super-Powers?
Rob Levey
 
Unleash the power of your people mar2012
Unleash the power of your people mar2012Unleash the power of your people mar2012
Unleash the power of your people mar2012
Rob Levey
 
How to say NO to outrageous Preservation Requests
How to say NO to outrageous Preservation RequestsHow to say NO to outrageous Preservation Requests
How to say NO to outrageous Preservation Requests
Rob Levey
 
Annual Performance Reviews
Annual Performance ReviewsAnnual Performance Reviews
Annual Performance Reviews
Rob Levey
 
Using Power Maps for Sales Success
Using Power Maps for Sales SuccessUsing Power Maps for Sales Success
Using Power Maps for Sales Success
Rob Levey
 
Catelas 360 degree Partner Assessments
Catelas 360 degree Partner Assessments Catelas 360 degree Partner Assessments
Catelas 360 degree Partner Assessments
Rob Levey
 
Are you spending too much on Legal settlement costs?
Are you spending too much on Legal settlement costs?Are you spending too much on Legal settlement costs?
Are you spending too much on Legal settlement costs?
Rob Levey
 
Catelas Investigations & Litigation
Catelas Investigations & LitigationCatelas Investigations & Litigation
Catelas Investigations & Litigation
Rob Levey
 
Catelas - Conducting cost effective Internal Investigations
Catelas  -  Conducting cost effective Internal InvestigationsCatelas  -  Conducting cost effective Internal Investigations
Catelas - Conducting cost effective Internal Investigations
Rob Levey
 
Catelas Early Case Assessment Trap
Catelas Early Case Assessment TrapCatelas Early Case Assessment Trap
Catelas Early Case Assessment Trap
Rob Levey
 
Collaborative Selling
Collaborative SellingCollaborative Selling
Collaborative Selling
Rob Levey
 
Early Case Analytics
Early Case AnalyticsEarly Case Analytics
Early Case Analytics
Rob Levey
 
Catelas Visual Identification for eDiscovery
Catelas Visual Identification for eDiscoveryCatelas Visual Identification for eDiscovery
Catelas Visual Identification for eDiscovery
Rob Levey
 
Collaboration webinar
Collaboration webinar Collaboration webinar
Collaboration webinar
Rob Levey
 
How corrupt is your International Business?
How corrupt is your International Business?How corrupt is your International Business?
How corrupt is your International Business?
Rob Levey
 
Unleash the power of your people
Unleash the power of your peopleUnleash the power of your people
Unleash the power of your people
Rob Levey
 
CRM Tools Suck
CRM Tools SuckCRM Tools Suck
CRM Tools Suck
Rob Levey
 
Catelas Security & Investigations
Catelas Security & InvestigationsCatelas Security & Investigations
Catelas Security & Investigations
Rob Levey
 
Catelas Deloitte FCPA webinar
Catelas Deloitte FCPA webinarCatelas Deloitte FCPA webinar
Catelas Deloitte FCPA webinar
Rob Levey
 

More from Rob Levey (20)

How secure is your data?
How secure is your data?How secure is your data?
How secure is your data?
 
Does your Data have Super-Powers?
Does your Data have Super-Powers?Does your Data have Super-Powers?
Does your Data have Super-Powers?
 
Unleash the power of your people mar2012
Unleash the power of your people mar2012Unleash the power of your people mar2012
Unleash the power of your people mar2012
 
How to say NO to outrageous Preservation Requests
How to say NO to outrageous Preservation RequestsHow to say NO to outrageous Preservation Requests
How to say NO to outrageous Preservation Requests
 
Annual Performance Reviews
Annual Performance ReviewsAnnual Performance Reviews
Annual Performance Reviews
 
Using Power Maps for Sales Success
Using Power Maps for Sales SuccessUsing Power Maps for Sales Success
Using Power Maps for Sales Success
 
Catelas 360 degree Partner Assessments
Catelas 360 degree Partner Assessments Catelas 360 degree Partner Assessments
Catelas 360 degree Partner Assessments
 
Are you spending too much on Legal settlement costs?
Are you spending too much on Legal settlement costs?Are you spending too much on Legal settlement costs?
Are you spending too much on Legal settlement costs?
 
Catelas Investigations & Litigation
Catelas Investigations & LitigationCatelas Investigations & Litigation
Catelas Investigations & Litigation
 
Catelas - Conducting cost effective Internal Investigations
Catelas  -  Conducting cost effective Internal InvestigationsCatelas  -  Conducting cost effective Internal Investigations
Catelas - Conducting cost effective Internal Investigations
 
Catelas Early Case Assessment Trap
Catelas Early Case Assessment TrapCatelas Early Case Assessment Trap
Catelas Early Case Assessment Trap
 
Collaborative Selling
Collaborative SellingCollaborative Selling
Collaborative Selling
 
Early Case Analytics
Early Case AnalyticsEarly Case Analytics
Early Case Analytics
 
Catelas Visual Identification for eDiscovery
Catelas Visual Identification for eDiscoveryCatelas Visual Identification for eDiscovery
Catelas Visual Identification for eDiscovery
 
Collaboration webinar
Collaboration webinar Collaboration webinar
Collaboration webinar
 
How corrupt is your International Business?
How corrupt is your International Business?How corrupt is your International Business?
How corrupt is your International Business?
 
Unleash the power of your people
Unleash the power of your peopleUnleash the power of your people
Unleash the power of your people
 
CRM Tools Suck
CRM Tools SuckCRM Tools Suck
CRM Tools Suck
 
Catelas Security & Investigations
Catelas Security & InvestigationsCatelas Security & Investigations
Catelas Security & Investigations
 
Catelas Deloitte FCPA webinar
Catelas Deloitte FCPA webinarCatelas Deloitte FCPA webinar
Catelas Deloitte FCPA webinar
 

Recently uploaded

Must Know Postgres Extension for DBA and Developer during Migration
Must Know Postgres Extension for DBA and Developer during MigrationMust Know Postgres Extension for DBA and Developer during Migration
Must Know Postgres Extension for DBA and Developer during Migration
Mydbops
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
Brandon Minnick, MBA
 
Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |
AstuteBusiness
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
Jakub Marek
 
Dandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity serverDandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity server
Antonios Katsarakis
 
9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...
9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...
9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...
saastr
 
GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)
Javier Junquera
 
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Pitangent Analytics & Technology Solutions Pvt. Ltd
 
High performance Serverless Java on AWS- GoTo Amsterdam 2024
High performance Serverless Java on AWS- GoTo Amsterdam 2024High performance Serverless Java on AWS- GoTo Amsterdam 2024
High performance Serverless Java on AWS- GoTo Amsterdam 2024
Vadym Kazulkin
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
DanBrown980551
 
Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving
 
What is an RPA CoE? Session 1 – CoE Vision
What is an RPA CoE?  Session 1 – CoE VisionWhat is an RPA CoE?  Session 1 – CoE Vision
What is an RPA CoE? Session 1 – CoE Vision
DianaGray10
 
JavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green MasterplanJavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green Masterplan
Miro Wengner
 
"Choosing proper type of scaling", Olena Syrota
"Choosing proper type of scaling", Olena Syrota"Choosing proper type of scaling", Olena Syrota
"Choosing proper type of scaling", Olena Syrota
Fwdays
 
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
akankshawande
 
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
Edge AI and Vision Alliance
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
Hiroshi SHIBATA
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Tosin Akinosho
 
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge GraphGraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
Neo4j
 
Northern Engraving | Modern Metal Trim, Nameplates and Appliance Panels
Northern Engraving | Modern Metal Trim, Nameplates and Appliance PanelsNorthern Engraving | Modern Metal Trim, Nameplates and Appliance Panels
Northern Engraving | Modern Metal Trim, Nameplates and Appliance Panels
Northern Engraving
 

Recently uploaded (20)

Must Know Postgres Extension for DBA and Developer during Migration
Must Know Postgres Extension for DBA and Developer during MigrationMust Know Postgres Extension for DBA and Developer during Migration
Must Know Postgres Extension for DBA and Developer during Migration
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
 
Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
 
Dandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity serverDandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity server
 
9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...
9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...
9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...
 
GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)
 
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
 
High performance Serverless Java on AWS- GoTo Amsterdam 2024
High performance Serverless Java on AWS- GoTo Amsterdam 2024High performance Serverless Java on AWS- GoTo Amsterdam 2024
High performance Serverless Java on AWS- GoTo Amsterdam 2024
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
 
Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024
 
What is an RPA CoE? Session 1 – CoE Vision
What is an RPA CoE?  Session 1 – CoE VisionWhat is an RPA CoE?  Session 1 – CoE Vision
What is an RPA CoE? Session 1 – CoE Vision
 
JavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green MasterplanJavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green Masterplan
 
"Choosing proper type of scaling", Olena Syrota
"Choosing proper type of scaling", Olena Syrota"Choosing proper type of scaling", Olena Syrota
"Choosing proper type of scaling", Olena Syrota
 
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
 
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
 
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge GraphGraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
 
Northern Engraving | Modern Metal Trim, Nameplates and Appliance Panels
Northern Engraving | Modern Metal Trim, Nameplates and Appliance PanelsNorthern Engraving | Modern Metal Trim, Nameplates and Appliance Panels
Northern Engraving | Modern Metal Trim, Nameplates and Appliance Panels
 

Rune - Empowering User-based Security

  • 1. Rune – Does Your Data Have Superpowers?
  • 2. Information Security Is Compromised – We need a hero Read the news everyday: Easily identify passwords through brute force  24 seconds to break a NTLM login password  http://www.zdnet.com/blog/hardware/cheap-gpus-are-rendering-strong-passwords- useless/13125 World‟s first commercial quantum computer  Rapidly compromises all PKI based internet transactions  http://venturebeat.com/2011/05/27/first-quantum-computer-sold/ RSA – Secure ID compromised  Math-based token encryption compromised  http://www.pcworld.com/businesscenter/article/229553/after_hack_rsa_offers_to_re place_secureid_tokens.html Citi massive credit cards breached for the 2nd time  http://www.wired.com/threatlevel/2011/06/citibank-hacked/ LulzSec  New kind of hacking group that is exposing vulnerabilities  http://www.guardian.co.uk/technology/2011/jun/14/us-politics-hacking-senate- lulzsec
  • 3. Why is the Vema-Cipher Platform Different? Data-centric  Encrypted information easily moves across any infrastructure even public internet Can be used in combination with math-based solutions like RSA SecureID®  Second tier of encryption in the event RSA or other math-based cipher „seed values‟ are compromised Two encryption modes: Variable-Strength  Free math based cipher: Standards based PKI and AES Keys  Paid Vernam cipher: VC-Pad™ First Vernam Encryption Product of it‟s kind  A One-time pad „wrapped‟ in a standards based AES 256 encryption  The VC-Pad™ is an encryption key based on random numbers that are not mathematically derived
  • 4. The Vema-Cipher Value: Unconditional Security Encryption for those that need security in addition to compliance  Personal information  Business intelligence  Proprietary information Secures your data locally or in the cloud  No matter where data is stored… You control exactly who can read your message Defends your data as it moves though hostile environments Innovative yet proven approach to data security  Standards based compliance coupled with unbreakable encryption
  • 5. • Secure: • Proven, unbreakable Vernam cipher • VC-Key™ creates a Compliance completely random FIPS 140-2 message – immune to brute-force attacks • Stops man-in-the-middle attacks • Compliance: • FIPS 140-2 standards- based encryption Simple to Use Secure • Simple to use: 3 steps 3 Easy Steps Vernam Cipher • Set your audience • Select your message or document • Click to encrypt or decrypt
  • 6. Historical “Vernam” issues addressed Utilizes modern dense storage devices  Addresses requirement for 1 to 1 VC-Pad™ to data ratio Random number generators are readily available  No longer difficult to generate  Proven TRNG products from Comscire, ID Quantique e.g.  Pass NIST‟s die hard test for cryptographically secure random numbers Multiple methods for VC-Pad™ exchange  Physical – For enhanced security policies  Electronic – Much more secure than current, standard PKI solutions VC-Pad™ can be physically secured  VC-Pad™ can be on external hard drives with strong defense mechanisms (Biometric, GPS, e.g.) VC-Pad™ are not reused  Tracks where you are at in the VC-Pad™ random mass  Delete when it makes sense – Doesn‟t affect integrity of cipher-text
  • 7. Rune Delivers Veri-Cipher Platform  Open source, standards-based crypto engine  Supports Vernam encryption  Integrate into many different applications Deadbolt  Application to secure your data Locksmith  Made up of Agent(s) and Vault(s)  System to make “Vernam” VC-Pad™  System to manage standards based keys and VC-Pad™
  • 8. 3 clicks or less Vernam and standards-based encryption Easy key and VC-Pad™ management Only deploy to those that need to know Minimal to no IT department overhead Rune can manufacture VC-Pad™ or customers can purchase Locksmith & Vault appliances to manufacture freely
  • 9. Deadbolt Application: How it Works Simple floating tool-bar Easily set your target audience: 1 person or many Select text or file and click 1 button to encrypt Encrypted text or file is created The encrypted file is ready to send or store
  • 10. Locksmith System made up of Agents and a Vault Collects random numbers Creates VC-Pads™ for unbreakable encryption Produces VC-Pad™ on USB devices or optical storage Integrates automatically with Vault Use one or many to speed up production times
  • 11. Maintain control of system Creates an escrow of asymmetric keys and symmetric VC-Pad™ Standards based approach (OASIS) Manage users, groups, permissions, keys & VC-Pads™ that are deployed Add users to groups Easily re-key devices for data retrieval
  • 12. Software Packages Deadbolt LT is a free open-source version of the software that provides asymmetric encryption only Deadbolt can be purchased as a stand-alone product for personal use  Rune manufactures VC-Pads™  Can use stronger symmetric encryption for personal archival or small group communications Locksmith Systems are sold in various packages for larger group communications  Includes Deadbolt, Agent(s) and Vault(s)  Allow users to manufacture own VC-Pads™
  • 13. Locksmith Systems Locksmith UP (Ultra Portable)  All systems in highly portable laptop form factor – Supports up to 50 users – Custom solutions available Locksmith 100  2 Agents, 1 Vault 100, 100 USB Tokens, Supports 100 Users Locksmith 250  5 Agents, 1 Vault 250, 250 USB Tokens, Supports 250 Users Locksmith 500  10 Agents, 1 Vault 500, 500 USB Tokens, Supports 500 Users Larger than 500 please discuss solution with your sales representative
  • 14. Rune = Unconditional Security Executive teams communicate with confidence in open SharePoint platforms Finance teams collaborate effectively and inside- information leaks are prevented Financial institutions securely transmit sensitive information Legal teams communicate securely with clients M&A teams negotiate deals in total privacy R&D teams out-perform competitors by protecting critical IP Government & Military teams keep operational directives secure
  • 15. Contact Us Rune Information Security Company Pte Ltd 1 Raffles Place One Raffles Place Level 24-00 Singapore 048616 PH: +65 6408-0575 Email: sales@rune.sg Web: www.rune.sg