Holistic Security
Solution Brief
 
	
  
WindTalker™: set your data free www.windtalkersecurity.com
	
  
Introduction _____________________________________________________________________________________
The convergence of mobile computing, cloud utilization, BYOD, and collaboration – among the fastest
growing trends in computing today – has led to complexity
in securing multiple systems, applications, platforms and
devices. The difficulty in patching together an integrated
security protocol to cover such a disparate and disperse
computing environment is leaving many organizations
vulnerable. For example, nearly half of companies that
permit employees to use their own devices at work (a
practice known as “BYOD”) reported experiencing a data or
security breach as a result of an employee-owned device
accessing the corporate network. And yet, 87% of
executives say their employees are using personal devices
for work-related purposes.1
Solution Parameters_____________________________________________________________________________
To provide protection that extends across all applications, devices, and platforms, the security must
reside within the data itself. By making data self-protecting at the point of creation, security becomes
inherent to the data itself, and independent of the infrastructure, applications, and devices that
create, access, or store the data. In this way, security can override the differences presented by a
diverse computing environment.
A consistent and single approach to applying security
simplifies security policy, decreasing IT management
time, costs, and the risk of vulnerability, while increasing
user-friendliness and end-user adoption.
By enabling data-level security, organizations can
embrace and maximize the cost-savings, productivity,
and collaborative benefits to be realized by advances in
mobility and decentralized data storage.
WindTalker™-enabled Holistic Security_______________________________________________________
WindTalker™ creates self-protecting data™, allowing a comprehensive solution for holistic data
protection that extends beyond the traditional constraints of network security.
• Data-level protection independent of network security – Data can roam freely, because the
protection comes from within the data itself. WindTalker is the only solution that creates self-
protecting data.
• Protection within the native file format – WindTalker requires no special end-user skills to protect
data -- redacting data is as easy as highlighting text. The robust WindTalker SDK allows
integration into new or existing applications via custom plug-ins.
• Protection independent of device, location or platform – Security can be applied to the edge
of any network, and across devices, and extended to BYOD or collaborative users.
• Dynamic Key Management (DKM)™ - Role Keys can provide access to any user, including
external contractors or collaborators, based on corporate or organizational policy. WindTalker’s
DKM enables state-of-the-art management of holistic security policies that are easy to adopt,
embrace and enforce.
	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  
1	
  CIO Magazine, Sept. 15, 2011	
  
“New	
  compliance	
  mandates,	
  the	
  growing	
  
use	
  of	
  cloud-­‐based	
  applications,	
  and	
  the	
  
proliferation	
  of	
  smart	
  phones	
  and	
  tablets	
  
are	
  causing	
  IT	
  organizations	
  to	
  rethink	
  
their	
  identity	
  management	
  and	
  user	
  
provisioning	
  strategies	
  to	
  control	
  support	
  
costs	
  and	
  better	
  manage	
  security.”	
  
	
  
Source:	
  “10	
  Predictions	
  for	
  Technology	
  
Trends	
  and	
  Practices	
  in	
  2012”	
  
“One	
  of	
  the	
  best	
  ways	
  to	
  leverage	
  the	
  cost	
  and	
  
efficiency	
  benefits	
  of	
  the	
  cloud	
  and	
  
virtualization	
  while	
  keeping	
  sensitive	
  
information	
  secure,	
  is	
  to	
  protect	
  the	
  data	
  using	
  
a	
  security	
  solution	
  that	
  delivers	
  data-­‐centric,	
  
file-­‐level	
  encryption	
  that	
  is	
  portable	
  across	
  all	
  
computing	
  platforms	
  and	
  operating	
  systems	
  …”	
  
	
  
Source:	
  How	
  Data-­‐Centric	
  Protection	
  Increases	
  
Security	
  in	
  Cloud	
  Computing	
  and	
  Virtualization	
  

Strategy for Holistic Security

  • 1.
          Holistic Security Solution Brief
  • 2.
        WindTalker™: setyour data free www.windtalkersecurity.com   Introduction _____________________________________________________________________________________ The convergence of mobile computing, cloud utilization, BYOD, and collaboration – among the fastest growing trends in computing today – has led to complexity in securing multiple systems, applications, platforms and devices. The difficulty in patching together an integrated security protocol to cover such a disparate and disperse computing environment is leaving many organizations vulnerable. For example, nearly half of companies that permit employees to use their own devices at work (a practice known as “BYOD”) reported experiencing a data or security breach as a result of an employee-owned device accessing the corporate network. And yet, 87% of executives say their employees are using personal devices for work-related purposes.1 Solution Parameters_____________________________________________________________________________ To provide protection that extends across all applications, devices, and platforms, the security must reside within the data itself. By making data self-protecting at the point of creation, security becomes inherent to the data itself, and independent of the infrastructure, applications, and devices that create, access, or store the data. In this way, security can override the differences presented by a diverse computing environment. A consistent and single approach to applying security simplifies security policy, decreasing IT management time, costs, and the risk of vulnerability, while increasing user-friendliness and end-user adoption. By enabling data-level security, organizations can embrace and maximize the cost-savings, productivity, and collaborative benefits to be realized by advances in mobility and decentralized data storage. WindTalker™-enabled Holistic Security_______________________________________________________ WindTalker™ creates self-protecting data™, allowing a comprehensive solution for holistic data protection that extends beyond the traditional constraints of network security. • Data-level protection independent of network security – Data can roam freely, because the protection comes from within the data itself. WindTalker is the only solution that creates self- protecting data. • Protection within the native file format – WindTalker requires no special end-user skills to protect data -- redacting data is as easy as highlighting text. The robust WindTalker SDK allows integration into new or existing applications via custom plug-ins. • Protection independent of device, location or platform – Security can be applied to the edge of any network, and across devices, and extended to BYOD or collaborative users. • Dynamic Key Management (DKM)™ - Role Keys can provide access to any user, including external contractors or collaborators, based on corporate or organizational policy. WindTalker’s DKM enables state-of-the-art management of holistic security policies that are easy to adopt, embrace and enforce.                                                                                                                 1  CIO Magazine, Sept. 15, 2011   “New  compliance  mandates,  the  growing   use  of  cloud-­‐based  applications,  and  the   proliferation  of  smart  phones  and  tablets   are  causing  IT  organizations  to  rethink   their  identity  management  and  user   provisioning  strategies  to  control  support   costs  and  better  manage  security.”     Source:  “10  Predictions  for  Technology   Trends  and  Practices  in  2012”   “One  of  the  best  ways  to  leverage  the  cost  and   efficiency  benefits  of  the  cloud  and   virtualization  while  keeping  sensitive   information  secure,  is  to  protect  the  data  using   a  security  solution  that  delivers  data-­‐centric,   file-­‐level  encryption  that  is  portable  across  all   computing  platforms  and  operating  systems  …”     Source:  How  Data-­‐Centric  Protection  Increases   Security  in  Cloud  Computing  and  Virtualization