SlideShare a Scribd company logo
Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2017 Blancco Oy Ltd. All rights reserved.
The Top 3 Data Sanitization
Challenges – And How to
Overcome Them
Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2017 Blancco Oy Ltd. All rights reserved.
Today’s Agenda
2
• Addressing today’s data center challenges
• Destroy vs. erase – navigating through the sea of gray when it comes
to data protection requirements
• Most common use cases – best practices for audit controls
• Sanitizing your SSDs – not all methods are created equal
Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2017 Blancco Oy Ltd. All rights reserved.
Data Center Consolidation Stat
https://federaltechnologyinsider.com/data-center-optimization-initiative-consolidation-cloud/Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2018 Blancco Oy Ltd. All rights reserved.
OMB and Federal Information Technology Acquisition Reform Act
(FITARA) guidelines state we should expect 60% of non-tiered data centers
closed and 25% of tiered data centers consolidated by 2018.
60%
of non-tiered data
centers will close
25%
of tiered data centers
will consolidate
Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2017 Blancco Oy Ltd. All rights reserved.
Gartner recently predicted that
by 2021, 50 percent of data
centers will use SSAs for
high-performance computing
and big data workloads – up
from less than 10 percent today.
NVMes Become the Interface for
Enterprise Drives
50%
of data centers will use
SSAs by 2021
Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2017 Blancco Oy Ltd. All rights reserved.
Data Relocation Needs to be
Secure and Efficient
Gartner suggests that 70% of
data center migrations will
experience significant time delays
or even unplanned downtime,
largely due to improper planning.
70%
of data center migrations
will experience delays
Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2017 Blancco Oy Ltd. All rights reserved.
Let’s hear from you!
6
See note for poll question
to put in ReadyTalk
Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2017 Blancco Oy Ltd. All rights reserved.
Security vs. Operations
Efficient & clean
operations for end-of-life
Security & compliance
demands for data
across the entire
lifecycle.
Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2018 Blancco Oy Ltd. All rights reserved.
Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2017 Blancco Oy Ltd. All rights reserved.
Data Protection in the Data Center
Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2018 Blancco Oy Ltd. All rights reserved.
State / Local
Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2017 Blancco Oy Ltd. All rights reserved.
Poll Question
9
See note for poll question
to put in ReadyTalk
Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2017 Blancco Oy Ltd. All rights reserved.
Storage Security Needs Evidence
of Sanitization
10
Proof of sanitization takes on at
least two forms:
1. an audit log trail and
2. a certificate of sanitization
The controller shall have the
obligation to erase personal
data without undue delay
Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2018 Blancco Oy Ltd. All rights reserved.
Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2017 Blancco Oy Ltd. All rights reserved.
Poll Question
11
See note for poll question
to put in ReadyTalk
Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2017 Blancco Oy Ltd. All rights reserved.
According to …
What is Data Sanitization?
Data sanitization is the consistently applied,
disciplined process of reliably and
completely removing all data from a
read/write medium so that it can no longer be
read or recovered.
Verify
Certify
Select
Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2018 Blancco Oy Ltd. All rights reserved.
Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2017 Blancco Oy Ltd. All rights reserved.
What methods
achieve it?
Data Sanitization
Data
Erasure
Cryptographic
Erasure
Data
Destruction
Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2018 Blancco Oy Ltd. All rights reserved.
Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2017 Blancco Oy Ltd. All rights reserved.
To achieve data sanitization, these
methods must:
1. Degaussing
2. and/or Mechanical Shredders
3. Audit Report
1. Select a specific standard
2. Verify the overwriting methodology removed data
across the entire device
3. Produce tamper-proof certificate
1. Find and overwrite crypto keys and password
2. Verify the data encrypted and the previous key
unrecoverable
3. Produce a tamper-proof certificate
Physical
Destruction
Cryptographic
Erasure
Data
Erasure
Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2017 Blancco Oy Ltd. All rights reserved.
Poll Question
15
See note for poll question
to put in ReadyTalk
Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2017 Blancco Oy Ltd. All rights reserved.
or +
Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2018 Blancco Oy Ltd. All rights reserved.
Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2017 Blancco Oy Ltd. All rights reserved.
How Organizations Manage End-of-Life
Data Today
17
Insecure &
Recoverable Data
Secure & Reliable
Secure &
Reliable
Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2017 Blancco Oy Ltd. All rights reserved.
Top 3 Data Sanitization
Challenges
Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2017 Blancco Oy Ltd. All rights reserved.
Data Center Use Cases - Two Dimensions
• Data migration
• Customer Exit- Cloud Exit
• VM life cycles
• Repurposing system storage
• Temporary data
• Data retention policies
Erase Data from an operational
environment
• Data Center decommissioning
• Tech refresh
• End of lease
• Return test systems
• Break fix (RMA)
Erase entire systems or servers
on drive level
• Break fix (RMA)
• Repurposing system storage
• Data Center decommissioning
19
Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2017 Blancco Oy Ltd. All rights reserved.
Challenge #1:
Server decommissioning
manual and time consuming
Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2018 Blancco Oy Ltd. All rights reserved.
Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2017 Blancco Oy Ltd. All rights reserved.
Poll Question
21
See note for poll question
to put in ReadyTalk
Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2017 Blancco Oy Ltd. All rights reserved.
Best Practice:
Implement a scalable, automated
process to decrease time and
resources needed
Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2018 Blancco Oy Ltd. All rights reserved.
Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2017 Blancco Oy Ltd. All rights reserved.
Server decommissioning
example:
• 856 Servers
Decommissioned Overnight
• Each server had 6x1TB SATA
HDD. Total 5117 drives
• Erasure time was 5-8 hours.
Total time from start (boot
up) to finish (report
collection): 10 hours
• Erasure method was NIST
800-88 Clear
23
Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2017 Blancco Oy Ltd. All rights reserved.
Challenge #2:
Sanitizing advanced media,
like NVMe
Image Credit: Unlocked/NeweggBlancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2018 Blancco Oy Ltd. All rights reserved.
Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2017 Blancco Oy Ltd. All rights reserved.
Poll Question
25
See note for poll question
to put in ReadyTalk
Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2017 Blancco Oy Ltd. All rights reserved.
Challenges with SSD Erasure
26
Blancco Patented Solution
1. Freeze lock Removal
2. Proprietary Erasure Sequence
i. Combines SW overwrite and FW commands
3. Erasure Validation
i. Identifies malfunctions and preformed processes
SSD Challenges
• Freeze Locks
• Wear Leveling
• Data Compression
• Unreliable Firmware
Commands
• Corrupted Blocks
• Secure-Erase
Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2017 Blancco Oy Ltd. All rights reserved.
Best Practice:
If erasing SSDs, move to an NIST Purge
Standard, if supported by the drive. If not,
fall back should be NIST Clear.
Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2018 Blancco Oy Ltd. All rights reserved.
Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2017 Blancco Oy Ltd. All rights reserved.
Challenge #3:
Sanitization process
in a live environment
Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2018 Blancco Oy Ltd. All rights reserved.
Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2017 Blancco Oy Ltd. All rights reserved.
Poll Question
29
See note for poll question
to put in ReadyTalk
Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2017 Blancco Oy Ltd. All rights reserved.
Security controls for cloud computing and
protection of personal data in the cloud
30
ISO 27018: Protection of privacy and personal data in the cloud –
IMPLEMENTED in H2 2014
Includes:
• Cloud provider should enable the right to erase personal data.
• Cloud provider should securely erase any temporary files in systems.
• Cloud provider should ensure that whenever data storage space is re-assigned,
previously residing data is not recoverable.
ISO 27017: Security controls for cloud computing
• Estimated to be in place by H1 2015.
• Will affect Cloud Service Providers on an even broader level than the ISO 27018.
Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2017 Blancco Oy Ltd. All rights reserved.
Logical Level Erasure:
for Unix and Windows Environments
31
Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2017 Blancco Oy Ltd. All rights reserved.
What We Do:
About Us
32
Standards
We Support:
Some of
Our Customers:
Erase a
Laptop or Server
Erase
iPhone Devices
Diagnose
iPhone Devices
Erase Secure
Active Files
Erase a
Virtual Machine
Erase a
SAN Server
Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2017 Blancco Oy Ltd. All rights reserved.
We have the certifications to prove our
solutions meet highest standards.
33
The Polish Internal
Security Agency
Common Criteria
(ISO15408)
Swedish Armed
Forces
Netherlands Comms
Security Agency
NATO UK Comms Electronic
Security Group
German BSIUSA Department
of Defense
Certification Sécurité
de Premier Niveau
TüV-SüD UK Defense INFOSEC Norwegian National
Security Authority
Japan’s Refurb. IT
Equipment Association
Czech NSA National Assoc. for
Information Destruction
UK Asset Disposal &
Information Security Alliance
Netherlands Comms
Security Agency
Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2017 Blancco Oy Ltd. All rights reserved.
And help you prove compliance with auditors.
According to the Cloud Security Alliance, falls to “…the provider to keep that data secure,
and when it is deleted, the provider should ensure (or be able to prove) that it is
permanently destroyed.”
Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2017 Blancco Oy Ltd. All rights reserved.
Russ Ernst
VP Product Development
russ.ernst@blancco.com
Matthew Anderson
Global Director – OEM & BD
matthew.anderson@blancco.com
Questions?
Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2018 Blancco Oy Ltd. All rights reserved.
Schedule a Free Strategy Session
https://www.blancco.com/demo/
free-strategy-session-data-center/

More Related Content

What's hot

Building Saas for the Enterprise
Building Saas for the EnterpriseBuilding Saas for the Enterprise
Building Saas for the Enterprise
Beau Christensen
 
Keeping your collaboration safe while working remotely
Keeping your collaboration safe while working remotelyKeeping your collaboration safe while working remotely
Keeping your collaboration safe while working remotely
Cisco Webex
 
Ole Trøan - State of the Norwegian IPv6 Nation
Ole Trøan - State of the Norwegian IPv6 NationOle Trøan - State of the Norwegian IPv6 Nation
Ole Trøan - State of the Norwegian IPv6 Nation
IKT-Norge
 
Beyond Diagnostics & Erasure – The Future of Ultra-Efficient Mobile Device Pr...
Beyond Diagnostics & Erasure – The Future of Ultra-Efficient Mobile Device Pr...Beyond Diagnostics & Erasure – The Future of Ultra-Efficient Mobile Device Pr...
Beyond Diagnostics & Erasure – The Future of Ultra-Efficient Mobile Device Pr...
Blancco
 
Straight Talk on End to End Encryption and Confidentiality
Straight Talk on End to End Encryption and ConfidentialityStraight Talk on End to End Encryption and Confidentiality
Straight Talk on End to End Encryption and Confidentiality
Cisco Webex
 
Webinar- Overcoming the Unseen Data Destrution Issues in Solid State Drives
Webinar- Overcoming the Unseen Data Destrution Issues in Solid State DrivesWebinar- Overcoming the Unseen Data Destrution Issues in Solid State Drives
Webinar- Overcoming the Unseen Data Destrution Issues in Solid State Drives
Blancco
 
Working remotely? Learn how to collaborate and communicate effectively in the...
Working remotely? Learn how to collaborate and communicate effectively in the...Working remotely? Learn how to collaborate and communicate effectively in the...
Working remotely? Learn how to collaborate and communicate effectively in the...
Cisco Webex
 

What's hot (7)

Building Saas for the Enterprise
Building Saas for the EnterpriseBuilding Saas for the Enterprise
Building Saas for the Enterprise
 
Keeping your collaboration safe while working remotely
Keeping your collaboration safe while working remotelyKeeping your collaboration safe while working remotely
Keeping your collaboration safe while working remotely
 
Ole Trøan - State of the Norwegian IPv6 Nation
Ole Trøan - State of the Norwegian IPv6 NationOle Trøan - State of the Norwegian IPv6 Nation
Ole Trøan - State of the Norwegian IPv6 Nation
 
Beyond Diagnostics & Erasure – The Future of Ultra-Efficient Mobile Device Pr...
Beyond Diagnostics & Erasure – The Future of Ultra-Efficient Mobile Device Pr...Beyond Diagnostics & Erasure – The Future of Ultra-Efficient Mobile Device Pr...
Beyond Diagnostics & Erasure – The Future of Ultra-Efficient Mobile Device Pr...
 
Straight Talk on End to End Encryption and Confidentiality
Straight Talk on End to End Encryption and ConfidentialityStraight Talk on End to End Encryption and Confidentiality
Straight Talk on End to End Encryption and Confidentiality
 
Webinar- Overcoming the Unseen Data Destrution Issues in Solid State Drives
Webinar- Overcoming the Unseen Data Destrution Issues in Solid State DrivesWebinar- Overcoming the Unseen Data Destrution Issues in Solid State Drives
Webinar- Overcoming the Unseen Data Destrution Issues in Solid State Drives
 
Working remotely? Learn how to collaborate and communicate effectively in the...
Working remotely? Learn how to collaborate and communicate effectively in the...Working remotely? Learn how to collaborate and communicate effectively in the...
Working remotely? Learn how to collaborate and communicate effectively in the...
 

Similar to [US & Canda Webinar] The Top 3 Data Sanitization Challenges – And How to Overcome Them

Delete vs Erase: How Are Companies Wiping Active Files
Delete vs Erase: How Are Companies Wiping Active Files Delete vs Erase: How Are Companies Wiping Active Files
Delete vs Erase: How Are Companies Wiping Active Files
Blancco
 
Why Blancco ?
Why Blancco ?Why Blancco ?
Why Blancco ?
Christophe Elut
 
An Introduction to Live Environment and Cloud Eraser
An Introduction to Live Environment and Cloud EraserAn Introduction to Live Environment and Cloud Eraser
An Introduction to Live Environment and Cloud Eraser
Blancco
 
Upselling and upgrading webinar presentation
Upselling and upgrading webinar presentationUpselling and upgrading webinar presentation
Upselling and upgrading webinar presentation
Stuart Selbst Consulting
 
Cloud Storage: How to Fight Off Data Security Threats & Stay Compliant
Cloud Storage: How to Fight Off Data Security Threats & Stay CompliantCloud Storage: How to Fight Off Data Security Threats & Stay Compliant
Cloud Storage: How to Fight Off Data Security Threats & Stay Compliant
Blancco
 
Splunk GDPR Security Roundtable: Zurich - 22 Nov 2017 PT1
Splunk GDPR Security Roundtable: Zurich - 22 Nov 2017 PT1Splunk GDPR Security Roundtable: Zurich - 22 Nov 2017 PT1
Splunk GDPR Security Roundtable: Zurich - 22 Nov 2017 PT1
Splunk
 
Designing Cloud Backup to reduce DR downtime for IT Professionals
Designing Cloud Backup to reduce DR downtime for IT ProfessionalsDesigning Cloud Backup to reduce DR downtime for IT Professionals
Designing Cloud Backup to reduce DR downtime for IT Professionals
Storage Switzerland
 
Blockchain in Retail :Omnichannel retailers can now compete and beat Amazon!
Blockchain in Retail :Omnichannel retailers can now compete and beat Amazon!Blockchain in Retail :Omnichannel retailers can now compete and beat Amazon!
Blockchain in Retail :Omnichannel retailers can now compete and beat Amazon!
Antony Welfare
 
Cisco Connect Toronto 2018 an introduction to Cisco kinetic
Cisco Connect Toronto 2018   an introduction to Cisco kineticCisco Connect Toronto 2018   an introduction to Cisco kinetic
Cisco Connect Toronto 2018 an introduction to Cisco kinetic
Cisco Canada
 
Cisco Connect Toronto 2018 an introduction to Cisco kinetic
Cisco Connect Toronto 2018   an introduction to Cisco kineticCisco Connect Toronto 2018   an introduction to Cisco kinetic
Cisco Connect Toronto 2018 an introduction to Cisco kinetic
Cisco Canada
 
INTRODUCING JASPERSOFT ADVANCED DATA SERVICES: DATA VIRTUALIZATION AT SCALE
INTRODUCING JASPERSOFT ADVANCED DATA SERVICES: DATA VIRTUALIZATION AT SCALEINTRODUCING JASPERSOFT ADVANCED DATA SERVICES: DATA VIRTUALIZATION AT SCALE
INTRODUCING JASPERSOFT ADVANCED DATA SERVICES: DATA VIRTUALIZATION AT SCALE
TIBCO Jaspersoft
 
Cisco Connect Ottawa 2018 dna assurance shortest path to network innocence
Cisco Connect Ottawa 2018 dna assurance shortest path to network innocenceCisco Connect Ottawa 2018 dna assurance shortest path to network innocence
Cisco Connect Ottawa 2018 dna assurance shortest path to network innocence
Cisco Canada
 
4 Smart_Connected_Factory_Slides Francois Briandet PDF.pdf
4 Smart_Connected_Factory_Slides Francois Briandet PDF.pdf4 Smart_Connected_Factory_Slides Francois Briandet PDF.pdf
4 Smart_Connected_Factory_Slides Francois Briandet PDF.pdf
MahdiAjoudanian1
 
Jeremiah O'Connor & David Maynor - Chasing the Crypto Workshop: Tracking Fina...
Jeremiah O'Connor & David Maynor - Chasing the Crypto Workshop: Tracking Fina...Jeremiah O'Connor & David Maynor - Chasing the Crypto Workshop: Tracking Fina...
Jeremiah O'Connor & David Maynor - Chasing the Crypto Workshop: Tracking Fina...
NoNameCon
 
Big Data LDN 2017: The New Dominant Companies Are Running on Data
Big Data LDN 2017: The New Dominant Companies Are Running on DataBig Data LDN 2017: The New Dominant Companies Are Running on Data
Big Data LDN 2017: The New Dominant Companies Are Running on Data
Matt Stubbs
 
Big Data LDN 2017: The New Dominant Companies Are Running on Data
Big Data LDN 2017: The New Dominant Companies Are Running on DataBig Data LDN 2017: The New Dominant Companies Are Running on Data
Big Data LDN 2017: The New Dominant Companies Are Running on Data
Matt Stubbs
 
Contratos Inteligentes: passo-a-passo para criação
Contratos Inteligentes: passo-a-passo para criaçãoContratos Inteligentes: passo-a-passo para criação
Contratos Inteligentes: passo-a-passo para criação
Fernando Galdino
 
Insights into Real-world Data Management Challenges
Insights into Real-world Data Management ChallengesInsights into Real-world Data Management Challenges
Insights into Real-world Data Management Challenges
DataWorks Summit
 
Rethinking The Data Warehouse: Emerging Practices and Technologies to Meet To...
Rethinking The Data Warehouse: Emerging Practices and Technologies to Meet To...Rethinking The Data Warehouse: Emerging Practices and Technologies to Meet To...
Rethinking The Data Warehouse: Emerging Practices and Technologies to Meet To...
Senturus
 
David Noy – Realising the true potential of software-defined storage
David Noy – Realising the true potential of software-defined storageDavid Noy – Realising the true potential of software-defined storage
David Noy – Realising the true potential of software-defined storage
Veritas Technologies LLC
 

Similar to [US & Canda Webinar] The Top 3 Data Sanitization Challenges – And How to Overcome Them (20)

Delete vs Erase: How Are Companies Wiping Active Files
Delete vs Erase: How Are Companies Wiping Active Files Delete vs Erase: How Are Companies Wiping Active Files
Delete vs Erase: How Are Companies Wiping Active Files
 
Why Blancco ?
Why Blancco ?Why Blancco ?
Why Blancco ?
 
An Introduction to Live Environment and Cloud Eraser
An Introduction to Live Environment and Cloud EraserAn Introduction to Live Environment and Cloud Eraser
An Introduction to Live Environment and Cloud Eraser
 
Upselling and upgrading webinar presentation
Upselling and upgrading webinar presentationUpselling and upgrading webinar presentation
Upselling and upgrading webinar presentation
 
Cloud Storage: How to Fight Off Data Security Threats & Stay Compliant
Cloud Storage: How to Fight Off Data Security Threats & Stay CompliantCloud Storage: How to Fight Off Data Security Threats & Stay Compliant
Cloud Storage: How to Fight Off Data Security Threats & Stay Compliant
 
Splunk GDPR Security Roundtable: Zurich - 22 Nov 2017 PT1
Splunk GDPR Security Roundtable: Zurich - 22 Nov 2017 PT1Splunk GDPR Security Roundtable: Zurich - 22 Nov 2017 PT1
Splunk GDPR Security Roundtable: Zurich - 22 Nov 2017 PT1
 
Designing Cloud Backup to reduce DR downtime for IT Professionals
Designing Cloud Backup to reduce DR downtime for IT ProfessionalsDesigning Cloud Backup to reduce DR downtime for IT Professionals
Designing Cloud Backup to reduce DR downtime for IT Professionals
 
Blockchain in Retail :Omnichannel retailers can now compete and beat Amazon!
Blockchain in Retail :Omnichannel retailers can now compete and beat Amazon!Blockchain in Retail :Omnichannel retailers can now compete and beat Amazon!
Blockchain in Retail :Omnichannel retailers can now compete and beat Amazon!
 
Cisco Connect Toronto 2018 an introduction to Cisco kinetic
Cisco Connect Toronto 2018   an introduction to Cisco kineticCisco Connect Toronto 2018   an introduction to Cisco kinetic
Cisco Connect Toronto 2018 an introduction to Cisco kinetic
 
Cisco Connect Toronto 2018 an introduction to Cisco kinetic
Cisco Connect Toronto 2018   an introduction to Cisco kineticCisco Connect Toronto 2018   an introduction to Cisco kinetic
Cisco Connect Toronto 2018 an introduction to Cisco kinetic
 
INTRODUCING JASPERSOFT ADVANCED DATA SERVICES: DATA VIRTUALIZATION AT SCALE
INTRODUCING JASPERSOFT ADVANCED DATA SERVICES: DATA VIRTUALIZATION AT SCALEINTRODUCING JASPERSOFT ADVANCED DATA SERVICES: DATA VIRTUALIZATION AT SCALE
INTRODUCING JASPERSOFT ADVANCED DATA SERVICES: DATA VIRTUALIZATION AT SCALE
 
Cisco Connect Ottawa 2018 dna assurance shortest path to network innocence
Cisco Connect Ottawa 2018 dna assurance shortest path to network innocenceCisco Connect Ottawa 2018 dna assurance shortest path to network innocence
Cisco Connect Ottawa 2018 dna assurance shortest path to network innocence
 
4 Smart_Connected_Factory_Slides Francois Briandet PDF.pdf
4 Smart_Connected_Factory_Slides Francois Briandet PDF.pdf4 Smart_Connected_Factory_Slides Francois Briandet PDF.pdf
4 Smart_Connected_Factory_Slides Francois Briandet PDF.pdf
 
Jeremiah O'Connor & David Maynor - Chasing the Crypto Workshop: Tracking Fina...
Jeremiah O'Connor & David Maynor - Chasing the Crypto Workshop: Tracking Fina...Jeremiah O'Connor & David Maynor - Chasing the Crypto Workshop: Tracking Fina...
Jeremiah O'Connor & David Maynor - Chasing the Crypto Workshop: Tracking Fina...
 
Big Data LDN 2017: The New Dominant Companies Are Running on Data
Big Data LDN 2017: The New Dominant Companies Are Running on DataBig Data LDN 2017: The New Dominant Companies Are Running on Data
Big Data LDN 2017: The New Dominant Companies Are Running on Data
 
Big Data LDN 2017: The New Dominant Companies Are Running on Data
Big Data LDN 2017: The New Dominant Companies Are Running on DataBig Data LDN 2017: The New Dominant Companies Are Running on Data
Big Data LDN 2017: The New Dominant Companies Are Running on Data
 
Contratos Inteligentes: passo-a-passo para criação
Contratos Inteligentes: passo-a-passo para criaçãoContratos Inteligentes: passo-a-passo para criação
Contratos Inteligentes: passo-a-passo para criação
 
Insights into Real-world Data Management Challenges
Insights into Real-world Data Management ChallengesInsights into Real-world Data Management Challenges
Insights into Real-world Data Management Challenges
 
Rethinking The Data Warehouse: Emerging Practices and Technologies to Meet To...
Rethinking The Data Warehouse: Emerging Practices and Technologies to Meet To...Rethinking The Data Warehouse: Emerging Practices and Technologies to Meet To...
Rethinking The Data Warehouse: Emerging Practices and Technologies to Meet To...
 
David Noy – Realising the true potential of software-defined storage
David Noy – Realising the true potential of software-defined storageDavid Noy – Realising the true potential of software-defined storage
David Noy – Realising the true potential of software-defined storage
 

More from Blancco

Enabling End-to-End Mobile Customer Journey
Enabling End-to-End Mobile Customer JourneyEnabling End-to-End Mobile Customer Journey
Enabling End-to-End Mobile Customer Journey
Blancco
 
Blancco Recharge - BMDE Optimizations & Updates
Blancco Recharge - BMDE Optimizations & UpdatesBlancco Recharge - BMDE Optimizations & Updates
Blancco Recharge - BMDE Optimizations & Updates
Blancco
 
EU GDPR- The Countdown to Compliance, Research Study Highlights
EU GDPR- The Countdown to Compliance, Research Study Highlights EU GDPR- The Countdown to Compliance, Research Study Highlights
EU GDPR- The Countdown to Compliance, Research Study Highlights
Blancco
 
IAPP Canada Privacy Symposium- "Data Retention Is a Team Sport: How to Get It...
IAPP Canada Privacy Symposium- "Data Retention Is a Team Sport: How to Get It...IAPP Canada Privacy Symposium- "Data Retention Is a Team Sport: How to Get It...
IAPP Canada Privacy Symposium- "Data Retention Is a Team Sport: How to Get It...
Blancco
 
Data Governance in the Enterprise: Highlights from Our Research Report
Data Governance in the Enterprise: Highlights from Our Research Report Data Governance in the Enterprise: Highlights from Our Research Report
Data Governance in the Enterprise: Highlights from Our Research Report
Blancco
 
Solid State Drives (SSDs) -What it Takes to Make Data Go Away
Solid State Drives (SSDs) -What it Takes to Make Data Go AwaySolid State Drives (SSDs) -What it Takes to Make Data Go Away
Solid State Drives (SSDs) -What it Takes to Make Data Go Away
Blancco
 
Security Regulations & Guidelines: Is Your Business on the Path to Compliance?
Security Regulations & Guidelines:  Is Your Business on the Path to Compliance? Security Regulations & Guidelines:  Is Your Business on the Path to Compliance?
Security Regulations & Guidelines: Is Your Business on the Path to Compliance?
Blancco
 
Data Sanitization: When, Why & How
Data Sanitization: When, Why & How Data Sanitization: When, Why & How
Data Sanitization: When, Why & How
Blancco
 
Data erasure's role in limiting cyber attacks
Data erasure's role in limiting cyber attacksData erasure's role in limiting cyber attacks
Data erasure's role in limiting cyber attacks
Blancco
 
What One Digital Forensics Expert Found on Hundreds of Hard Drives, iPhones a...
What One Digital Forensics Expert Found on Hundreds of Hard Drives, iPhones a...What One Digital Forensics Expert Found on Hundreds of Hard Drives, iPhones a...
What One Digital Forensics Expert Found on Hundreds of Hard Drives, iPhones a...
Blancco
 

More from Blancco (10)

Enabling End-to-End Mobile Customer Journey
Enabling End-to-End Mobile Customer JourneyEnabling End-to-End Mobile Customer Journey
Enabling End-to-End Mobile Customer Journey
 
Blancco Recharge - BMDE Optimizations & Updates
Blancco Recharge - BMDE Optimizations & UpdatesBlancco Recharge - BMDE Optimizations & Updates
Blancco Recharge - BMDE Optimizations & Updates
 
EU GDPR- The Countdown to Compliance, Research Study Highlights
EU GDPR- The Countdown to Compliance, Research Study Highlights EU GDPR- The Countdown to Compliance, Research Study Highlights
EU GDPR- The Countdown to Compliance, Research Study Highlights
 
IAPP Canada Privacy Symposium- "Data Retention Is a Team Sport: How to Get It...
IAPP Canada Privacy Symposium- "Data Retention Is a Team Sport: How to Get It...IAPP Canada Privacy Symposium- "Data Retention Is a Team Sport: How to Get It...
IAPP Canada Privacy Symposium- "Data Retention Is a Team Sport: How to Get It...
 
Data Governance in the Enterprise: Highlights from Our Research Report
Data Governance in the Enterprise: Highlights from Our Research Report Data Governance in the Enterprise: Highlights from Our Research Report
Data Governance in the Enterprise: Highlights from Our Research Report
 
Solid State Drives (SSDs) -What it Takes to Make Data Go Away
Solid State Drives (SSDs) -What it Takes to Make Data Go AwaySolid State Drives (SSDs) -What it Takes to Make Data Go Away
Solid State Drives (SSDs) -What it Takes to Make Data Go Away
 
Security Regulations & Guidelines: Is Your Business on the Path to Compliance?
Security Regulations & Guidelines:  Is Your Business on the Path to Compliance? Security Regulations & Guidelines:  Is Your Business on the Path to Compliance?
Security Regulations & Guidelines: Is Your Business on the Path to Compliance?
 
Data Sanitization: When, Why & How
Data Sanitization: When, Why & How Data Sanitization: When, Why & How
Data Sanitization: When, Why & How
 
Data erasure's role in limiting cyber attacks
Data erasure's role in limiting cyber attacksData erasure's role in limiting cyber attacks
Data erasure's role in limiting cyber attacks
 
What One Digital Forensics Expert Found on Hundreds of Hard Drives, iPhones a...
What One Digital Forensics Expert Found on Hundreds of Hard Drives, iPhones a...What One Digital Forensics Expert Found on Hundreds of Hard Drives, iPhones a...
What One Digital Forensics Expert Found on Hundreds of Hard Drives, iPhones a...
 

Recently uploaded

Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
Abida Shariff
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
Bhaskar Mitra
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 

Recently uploaded (20)

Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 

[US & Canda Webinar] The Top 3 Data Sanitization Challenges – And How to Overcome Them

  • 1. Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2017 Blancco Oy Ltd. All rights reserved. The Top 3 Data Sanitization Challenges – And How to Overcome Them
  • 2. Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2017 Blancco Oy Ltd. All rights reserved. Today’s Agenda 2 • Addressing today’s data center challenges • Destroy vs. erase – navigating through the sea of gray when it comes to data protection requirements • Most common use cases – best practices for audit controls • Sanitizing your SSDs – not all methods are created equal
  • 3. Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2017 Blancco Oy Ltd. All rights reserved. Data Center Consolidation Stat https://federaltechnologyinsider.com/data-center-optimization-initiative-consolidation-cloud/Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2018 Blancco Oy Ltd. All rights reserved. OMB and Federal Information Technology Acquisition Reform Act (FITARA) guidelines state we should expect 60% of non-tiered data centers closed and 25% of tiered data centers consolidated by 2018. 60% of non-tiered data centers will close 25% of tiered data centers will consolidate
  • 4. Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2017 Blancco Oy Ltd. All rights reserved. Gartner recently predicted that by 2021, 50 percent of data centers will use SSAs for high-performance computing and big data workloads – up from less than 10 percent today. NVMes Become the Interface for Enterprise Drives 50% of data centers will use SSAs by 2021
  • 5. Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2017 Blancco Oy Ltd. All rights reserved. Data Relocation Needs to be Secure and Efficient Gartner suggests that 70% of data center migrations will experience significant time delays or even unplanned downtime, largely due to improper planning. 70% of data center migrations will experience delays
  • 6. Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2017 Blancco Oy Ltd. All rights reserved. Let’s hear from you! 6 See note for poll question to put in ReadyTalk
  • 7. Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2017 Blancco Oy Ltd. All rights reserved. Security vs. Operations Efficient & clean operations for end-of-life Security & compliance demands for data across the entire lifecycle. Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2018 Blancco Oy Ltd. All rights reserved.
  • 8. Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2017 Blancco Oy Ltd. All rights reserved. Data Protection in the Data Center Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2018 Blancco Oy Ltd. All rights reserved. State / Local
  • 9. Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2017 Blancco Oy Ltd. All rights reserved. Poll Question 9 See note for poll question to put in ReadyTalk
  • 10. Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2017 Blancco Oy Ltd. All rights reserved. Storage Security Needs Evidence of Sanitization 10 Proof of sanitization takes on at least two forms: 1. an audit log trail and 2. a certificate of sanitization The controller shall have the obligation to erase personal data without undue delay Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2018 Blancco Oy Ltd. All rights reserved.
  • 11. Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2017 Blancco Oy Ltd. All rights reserved. Poll Question 11 See note for poll question to put in ReadyTalk
  • 12. Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2017 Blancco Oy Ltd. All rights reserved. According to … What is Data Sanitization? Data sanitization is the consistently applied, disciplined process of reliably and completely removing all data from a read/write medium so that it can no longer be read or recovered. Verify Certify Select Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2018 Blancco Oy Ltd. All rights reserved.
  • 13. Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2017 Blancco Oy Ltd. All rights reserved. What methods achieve it? Data Sanitization Data Erasure Cryptographic Erasure Data Destruction Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2018 Blancco Oy Ltd. All rights reserved.
  • 14. Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2017 Blancco Oy Ltd. All rights reserved. To achieve data sanitization, these methods must: 1. Degaussing 2. and/or Mechanical Shredders 3. Audit Report 1. Select a specific standard 2. Verify the overwriting methodology removed data across the entire device 3. Produce tamper-proof certificate 1. Find and overwrite crypto keys and password 2. Verify the data encrypted and the previous key unrecoverable 3. Produce a tamper-proof certificate Physical Destruction Cryptographic Erasure Data Erasure
  • 15. Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2017 Blancco Oy Ltd. All rights reserved. Poll Question 15 See note for poll question to put in ReadyTalk
  • 16. Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2017 Blancco Oy Ltd. All rights reserved. or + Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2018 Blancco Oy Ltd. All rights reserved.
  • 17. Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2017 Blancco Oy Ltd. All rights reserved. How Organizations Manage End-of-Life Data Today 17 Insecure & Recoverable Data Secure & Reliable Secure & Reliable
  • 18. Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2017 Blancco Oy Ltd. All rights reserved. Top 3 Data Sanitization Challenges
  • 19. Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2017 Blancco Oy Ltd. All rights reserved. Data Center Use Cases - Two Dimensions • Data migration • Customer Exit- Cloud Exit • VM life cycles • Repurposing system storage • Temporary data • Data retention policies Erase Data from an operational environment • Data Center decommissioning • Tech refresh • End of lease • Return test systems • Break fix (RMA) Erase entire systems or servers on drive level • Break fix (RMA) • Repurposing system storage • Data Center decommissioning 19
  • 20. Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2017 Blancco Oy Ltd. All rights reserved. Challenge #1: Server decommissioning manual and time consuming Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2018 Blancco Oy Ltd. All rights reserved.
  • 21. Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2017 Blancco Oy Ltd. All rights reserved. Poll Question 21 See note for poll question to put in ReadyTalk
  • 22. Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2017 Blancco Oy Ltd. All rights reserved. Best Practice: Implement a scalable, automated process to decrease time and resources needed Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2018 Blancco Oy Ltd. All rights reserved.
  • 23. Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2017 Blancco Oy Ltd. All rights reserved. Server decommissioning example: • 856 Servers Decommissioned Overnight • Each server had 6x1TB SATA HDD. Total 5117 drives • Erasure time was 5-8 hours. Total time from start (boot up) to finish (report collection): 10 hours • Erasure method was NIST 800-88 Clear 23
  • 24. Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2017 Blancco Oy Ltd. All rights reserved. Challenge #2: Sanitizing advanced media, like NVMe Image Credit: Unlocked/NeweggBlancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2018 Blancco Oy Ltd. All rights reserved.
  • 25. Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2017 Blancco Oy Ltd. All rights reserved. Poll Question 25 See note for poll question to put in ReadyTalk
  • 26. Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2017 Blancco Oy Ltd. All rights reserved. Challenges with SSD Erasure 26 Blancco Patented Solution 1. Freeze lock Removal 2. Proprietary Erasure Sequence i. Combines SW overwrite and FW commands 3. Erasure Validation i. Identifies malfunctions and preformed processes SSD Challenges • Freeze Locks • Wear Leveling • Data Compression • Unreliable Firmware Commands • Corrupted Blocks • Secure-Erase
  • 27. Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2017 Blancco Oy Ltd. All rights reserved. Best Practice: If erasing SSDs, move to an NIST Purge Standard, if supported by the drive. If not, fall back should be NIST Clear. Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2018 Blancco Oy Ltd. All rights reserved.
  • 28. Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2017 Blancco Oy Ltd. All rights reserved. Challenge #3: Sanitization process in a live environment Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2018 Blancco Oy Ltd. All rights reserved.
  • 29. Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2017 Blancco Oy Ltd. All rights reserved. Poll Question 29 See note for poll question to put in ReadyTalk
  • 30. Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2017 Blancco Oy Ltd. All rights reserved. Security controls for cloud computing and protection of personal data in the cloud 30 ISO 27018: Protection of privacy and personal data in the cloud – IMPLEMENTED in H2 2014 Includes: • Cloud provider should enable the right to erase personal data. • Cloud provider should securely erase any temporary files in systems. • Cloud provider should ensure that whenever data storage space is re-assigned, previously residing data is not recoverable. ISO 27017: Security controls for cloud computing • Estimated to be in place by H1 2015. • Will affect Cloud Service Providers on an even broader level than the ISO 27018.
  • 31. Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2017 Blancco Oy Ltd. All rights reserved. Logical Level Erasure: for Unix and Windows Environments 31
  • 32. Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2017 Blancco Oy Ltd. All rights reserved. What We Do: About Us 32 Standards We Support: Some of Our Customers: Erase a Laptop or Server Erase iPhone Devices Diagnose iPhone Devices Erase Secure Active Files Erase a Virtual Machine Erase a SAN Server
  • 33. Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2017 Blancco Oy Ltd. All rights reserved. We have the certifications to prove our solutions meet highest standards. 33 The Polish Internal Security Agency Common Criteria (ISO15408) Swedish Armed Forces Netherlands Comms Security Agency NATO UK Comms Electronic Security Group German BSIUSA Department of Defense Certification Sécurité de Premier Niveau TüV-SüD UK Defense INFOSEC Norwegian National Security Authority Japan’s Refurb. IT Equipment Association Czech NSA National Assoc. for Information Destruction UK Asset Disposal & Information Security Alliance Netherlands Comms Security Agency
  • 34. Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2017 Blancco Oy Ltd. All rights reserved. And help you prove compliance with auditors. According to the Cloud Security Alliance, falls to “…the provider to keep that data secure, and when it is deleted, the provider should ensure (or be able to prove) that it is permanently destroyed.”
  • 35. Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2017 Blancco Oy Ltd. All rights reserved. Russ Ernst VP Product Development russ.ernst@blancco.com Matthew Anderson Global Director – OEM & BD matthew.anderson@blancco.com Questions? Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2018 Blancco Oy Ltd. All rights reserved. Schedule a Free Strategy Session https://www.blancco.com/demo/ free-strategy-session-data-center/

Editor's Notes

  1. Get this done week of 21st.
  2. What I want to build out for each Solution we are going to take for each vertical. How can we broaden our relationship with ITADs – one of the key areas is in approaching the data center. We want to pass this down to Ingram micro itad – to give them a better view into the full capabilities that we provide in the data center.
  3. All existing tiered data centers need to achieve a Power Effectiveness Rating (PUE) of 1.5 and all new data centers must have a PUE of 1.2. The GAO predicts a savings of $8.2 billion. 53% of respondents said technical difficulties are delaying decisions on consolidation projects – SafeNet Research Study (add or mention??)
  4. http://www.datacenterjournal.com/nvme-change-agent-next-gen-data-centers/ NVMe-enabled storage infrastructures are not only seeing wide deployment, but they’re now entering other data center areas that were once typically reserved for legacy HDDs and SSDs. (DataCenter Journal) NVMe will continue to replace SAS and SATA as the interface for enterprise drives. RAID is succumbing to the inevitability of all-flash arrays and SSD storage appliances. (Network Computing) By 2019, SSDs are expected to be in about 56% of notebooks and desktops. (ComputerWorld)
  5. https://blog.equinix.com/blog/2017/08/03/are-you-ready-to-migrate-your-data-center-to-the-cloud/ https://datacenterfrontier.com/overcoming-data-center-migration-challenges-staged-approach/ Other stats to mention: By 2020, 86% of companies will be interconnecting multiple clouds across multiple locations and over the next five years to realize a lower Capex. (Equinix) Gartner says that “a multicloud strategy will become the common strategy for 70% of enterprises by 2019, up from less than 10% today.”[1]
  6. Question: In 2018, what is the top challenge facing your data center(s)? Answers (select one): Data Security / Data Loss Increasing infrastructure complexity Staff Issues (talent shortage, training, retaining) Increasing infrastructure complexity Reduced budgets
  7. NOTES FROM RUSS: Have to pass the security requirements, but that isn’t the day job Their biggest concern is they have this stuff piling up but they can’t do anything because of these strict security rules Erase or fails on the erasure side and report back to security/compliance teams Need least friction as possible as they go through this process
  8. A lot of big providers of cloud (microsoft and salesforce) – if a company is going to store data in their cloud, (don’t forget about Fred slide about use cases that looks like this one!)
  9. What data protection regulations are you required to meet within your data center? (select all that apply) HIPAA FISMA High PCI-DSS 3.1 SOC 2 Type II, SOC 3 ISO 27001 ISO 50001 OTHER: Please Specify
  10. FREDRIK
  11. What is data sanitization? The process of deliberately permanently and irreversibly removing or destroying the data stored on a memory device to make it unrecoverable The process of ensuring all incorrect, duplicate or unused data is properly classified and migrated into the appropriate lifecycle stage, archival or destruction on an ongoing basis through automated policy enforcement The process of ensuring shared company data is clear of viruses and malware that can compromise the network, creating areas for breaches ANSWER: A
  12. What data sanitization method are you using to meet your data protection regulations today? Physical destruction Encryption Data Erasure Outsource to Third Party Not Sure Other: Please specify
  13. Best practice is a combination of these (physical destruction is part of it, but should do erasure/encryption with certificate of sanitization you can show auditors at will)
  14. Very good slide for most erasure presos
  15. Get this done week of 21st.
  16. A lot of big providers of cloud (microsoft and salesforce) – if a company is going to store data in their cloud,
  17. Poll question: What is your process when you are decommissioning servers to bring in new hardware? Pull drives manually and wipe them one by one Pull each server out of the rack and wipe on a per server basis We erase servers while in rack and wipe a rack at a time Other
  18. Need to understand how they connect the servers to the MC – need to be clear HOW we do this.
  19. 232323
  20. What data sanitization method do you use to erase advanced media like NVMe, m.2 SSD drives? Destruction Standard overwrite We don’t sanitize, but store instead Other (specify)
  21. Speak to Verification step! Certification (so they don’t store it in their storage and think that is OK) Reference NIST 800 80R1 that on the slide.
  22. What is your data sanitization process to avoid data spillage or to securely move customer data in a live system? We would remove the hardware, the destroy it and rebuild the system We don’t do anything We have a home grown system that sanitization the data We delete the virtual machines Other: Please specify
  23. You will not get serial drive numbers in the report or execute hardware erasure commands (no purge on SSD) – you aren’t running dialog with the drive directly, you are running on the operating system. Connect Blancco and easily target data on logical level within the cabinet that needs to be erased – without removing drives or risking system functionality (can be done in the operational environment systems can be online) We sit on top of the server (you don’t need to reboot), we will list everything that is available You can target all LUNs and erase them (no cables, no appliance). The software can be deployed remotely or locally with admin account Erases the mounted user accessible part of functional drives and assemblies of drives Erase any type of disk drive supported by Microsoft Windows, including IDE, SCSI, FC and iSCSI in both 32-bit and 64-bit systems Erase disk drives supported by the Unix operating system in hand, including IDE, SCSI, FC and iSCSI
  24. De facto standard in data erasure 1400+ Customers Permanent data removal with 100% tamper-proof audit trail Tested, certified, approved and recommended by 18 governing bodies around the world
  25. We have 18 global certifications. If customer ask why don’t we have any in the US – it is because there are no certification in the US! Blog post coming.
  26. Produces a 100% certified data erasure and tamper-proof audit trail So you can ensure compliance with industry standards and regulations, including PCI DSS, HIPAA, SOX, ISO 27001, ISO 27040 and EU General Data Protection Regulation