SlideShare a Scribd company logo
Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2017 Blancco Oy Ltd. All rights reserved.
Data Erasure Management:
How to Protect Data throughout its Lifecycle
Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2017 Blancco Oy Ltd. All rights reserved.
Today’s Agenda
2
12.00 – 1.00 Registration
1.00 – 1.15 Official Welcome, Christopher Eeg
1.15 – 1.30 Canadian Market / Industry Overview, James Martens
1.30 – 2.15 Introduction to Data Erasure Management, Christopher Eeg
2.15 – 3.00 Break / Product Demonstrations, Omi Malzai
3.00 – 3.45 Active Erasure Solutions, Use Cases & What the Future
Holds, Fredrik Forslund
3.45 – 4.00 Closing Remarks / Q&A, Christopher Eeg
4.00 – 6.00 Networking Drinks / Product Demonstrations
Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2017 Blancco Oy Ltd. All rights reserved.
Welcome!
Christopher Eeg,
Managing Director, Canada
Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2017 Blancco Oy Ltd. All rights reserved.
Who you are
What your Co. Does
What You Do
Something Unique
Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2017 Blancco Oy Ltd. All rights reserved.
Canadian Market Industry Overview
James Martens, Solutions Specialist
Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2017 Blancco Oy Ltd. All rights reserved. 6
• Terms and Definitions
• Policies and Standards
• Editable Policies and Templates
• Research Studies
• Whitepapers
https://www.datasanitization.org/
Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2017 Blancco Oy Ltd. All rights reserved.
Rising Pressure
• Teams
– IT Security
– IT Audit and Compliance
– Risk Management
– Privacy
• Industries
– Healthcare and Finance
– Data Centers
– Government
– Managed Service Providers
– System Integrators
Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2017 Blancco Oy Ltd. All rights reserved.
Industry Changes
• Consolidation of ITADs
• Massive increase in mobile phones processed
• Outsource of risk and operations to MSPs
• Increased virtualization
• Complexity of SANs
• Complexity of Policies and Regulations
Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2017 Blancco Oy Ltd. All rights reserved.
Complicated landscape challenges
made easy
9
Complicated
environment
due to layers
of compliance
across a variety
of asset types
Data Erasure Management
During-Life Hardware + Data Erasure
End-of-Life Hardware + Data Erasure
Risk Management
Security Policies
Industry Specific Policies
Federal Legislation
International Legislation
During Life Data Erasure
Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2017 Blancco Oy Ltd. All rights reserved.
Global & Regional Data Protection
Laws & Standards
Singapore fined an organization for not having
a Data Protection Officer.
Japan: Protection of Personal Information and
the Right to Erasure
PCI DSS, a Global Standard, requiring policies
and procedures to remove any stored data
Security Frameworks & Guidelines, including
NIST SP 800-88r1 & ISO 270001 sensitive
data be securely overwritten prior to disposal
or re-use
100+
Countries with
Data Protection Laws
1998
1
111
2018
Number of data-
protection laws:
EU General Data Protection
Regulation: Right to be Forgotten
27,000 new Data Protection Officers needed
FINES - Non-Compliance could result in up to 4%
of turnover OR €20 MM – whatever is GREATER!
ANY EU citizen can demand their records be
expunged – and the company must provide proof
The EU will adopt GDPR by May 2018
Regulations are here to stay – and
growing.
10
Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2017 Blancco Oy Ltd. All rights reserved.
Mr. Daniel Therrien – Federal Privacy Commissioner
“I have further urged Parliamentarians to give serious consideration
to reviewing any gaps that may exist between Canadian privacy law
and European law, including differences in the enforcement powers of
data protection authorities and the right-to-be-forgotten, which is
included in the EUGDPR”
We’re trying to use 20th Century
tools to deal with 21st Century
privacy problems and it’s clear those
tools are increasingly insufficient
Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2017 Blancco Oy Ltd. All rights reserved.
Protection of privacy and
personal data in the cloud
Security controls for
cloud computing
Right to be Forgotten and
to Erasure, May 2018
Increasing Regulatory and Policy
Pressure
12
Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2017 Blancco Oy Ltd. All rights reserved.
ISO Security Standards
impacting all large organizations
Includes instructions on the following:
• Top management shall implement the information security
policy themselves.
• The policy must ensure that all relevant risks are addressed.
• Internal audits should regularly verify that all risks are
addressed and operational processes are in place.
“All items of equipment containing storage media shall be verified
to ensure that any sensitive data and licensed software has been
removed or securely overwritten prior to disposal or re-use”.
Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2017 Blancco Oy Ltd. All rights reserved.
Introduction to Data Erasure Management
Christopher Eeg, Managing Director, Canada
Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2017 Blancco Oy Ltd. All rights reserved.
#modernreality #AcrossAllPlatforms
#DifferentEra
WE LIVE IN AN ERA THAT DEMANDS
100% DATA PROTECTION
15
Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2017 Blancco Oy Ltd. All rights reserved.
1990’s
A SHIFT IN TECHNOLOGY
16
TODAY
#ComplexDemands
SSD’s, NVMEs,
Hybrid Drives.
Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2017 Blancco Oy Ltd. All rights reserved.
The amount of data you will be
responsible to secure continues
to rise…
17
2009 2010 2011 2012 2013 2014 2015 2016 2017
40,000
(Exabytes)
30,000
20,000
10,000
2018 2019 2020
Quantity of Data with Corporate Responsibility:
https://www.emc.com/collateral/analyst-reports/idc-the-digital-universe-in-2020.pdf
Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2017 Blancco Oy Ltd. All rights reserved.
TECH SHIFT EXAMPLE -
SSD’s
Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2017 Blancco Oy Ltd. All rights reserved.
A SHIFT IN LEGISLATION
#LegislativeChange #Mulit-layered
100+
Countries with
Data Protection Laws
1998
1 111
2018
# of data-protection
laws:
Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2017 Blancco Oy Ltd. All rights reserved.
PRIVACY
Not Fear and Worry
WHAT PEOPLE
EXPECT HAS
CHANGED FOR
GOOD
#NewDemands #FailureIsNotAnOption
CONSTANT IMPROVEMENT
Not Complacency
ZERO BREACHES
Not Failed GAP Analysis
INDUSTRY BEST PRACTICES
Not Legacy Processes/Policies
Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2017 Blancco Oy Ltd. All rights reserved.
Data sanitization needs to
become a bigger and more
urgent priority within the IT
security industry.
21
- Paul Henry, Information Security & Forensics Expert
#DoDataRight
Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2017 Blancco Oy Ltd. All rights reserved.
Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2017 Blancco Oy Ltd. All rights reserved.
GARTNER QUOTE
23
“Growing concerns about data privacy and
security, leakage, regulatory compliance, and the
ever-expanding capacity of storage media are
making robust data sanitization a core
competency for all IT organizations.”
Source: Gartner Hype Cycle for Storage Technologies, 2015
Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2017 Blancco Oy Ltd. All rights reserved.
IT professionals don’t always know
right from wrong when it comes to
data security.
24
Believe files are
permanently gone
once they’ve emptied
the Recycle Bin on
their computers/
laptops.
Believe performing a
quick format or
reformatting an entire
drive permanently
erases data so it can
never be recovered.
Hit the ‘delete’ button
and/or drag files to
Recycle Bin on
computers/laptops to
get rid of files on a
regular basis –
ranging from 6-10
times a day to once
a week.
Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2017 Blancco Oy Ltd. All rights reserved.
How Organizations Manage
End-of-Life Data Today
25
Insecure &
Recoverable
Data
Secure & Reliable
Secure &
Reliable
Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2017 Blancco Oy Ltd. All rights reserved.
Suffer from
data breaches
mostly in:
SecurityScorecard, 2016 Financial Industry Cybersecurity Report
Publicly Disclosed Data Breaches
2015-2016
Servers Virtual
Machines
Desktop
Computers
Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2017 Blancco Oy Ltd. All rights reserved.
200 used hard
disk drives
and SSDs
from eBay and
Craigslist
Type of information recovered
The Leftovers: A Data Recovery Study, Blancco, 2016
Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2017 Blancco Oy Ltd. All rights reserved.
Financial Services:
Main target for data breaches
28
More than 10
percent of data
breaches were
financial services
organizations.
SecurityScorecard, 2016
Percentage of Major Data Breaches by Industry
April 2015 – June 2016
% of Total Companies Experienced Data Breaches during June 2015 to April 2016
Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2017 Blancco Oy Ltd. All rights reserved.
There are two types of
companies: Those that
have been hacked, and
those that will be.”
29
– Robert Mueller, FBI Director, 2012
It is now imperative for businesses to focus on being proactive to minimize
the potentially devastating impact of a data breach or a compromise.
Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2017 Blancco Oy Ltd. All rights reserved.
Summarize
• We know there is a demand for 100% Data
Protection driven by the Shifts we covered.
• We know IT Professionals don’t always get it right.
• We know its extremely challenging for InfoSec
• We know breaches are not industry specific. We are
all vulnerable but Finance Sector were highly
targeted.
• We know that all organizations have been hacked.
………so what are the consequences of all this?
Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2017 Blancco Oy Ltd. All rights reserved.
22
Records
compromised
every second
The consequences are
steep – increasing the
importance of data erasure.
31
$6M CDN
average cost of
a data breach
$190 CDN
Per-record cost of a
data breach
Source: IBM, 2016
Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2017 Blancco Oy Ltd. All rights reserved.
Companies meeting this shift head
on…..
Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2017 Blancco Oy Ltd. All rights reserved.
Companies meeting this shift head
on…..
Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2017 Blancco Oy Ltd. All rights reserved.
Companies meeting this shift head
on…..
Environment
Canada
Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2017 Blancco Oy Ltd. All rights reserved.
Data sanitization is the consistently
applied, disciplined process of reliably
and completely removing all data
from a read/write medium so that it can
no longer be read or recovered.
What is
Data Sanitization?
35
What methods
achieve it?
Data Sanitization
Physical
Destruction
Cryptographic
Erasure
Data
Erasure
Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2017 Blancco Oy Ltd. All rights reserved.
• Highest form of securing
data within data sanitization
• Auditable reporting readily
available
• Supports environmental
initiatives
• Allows organizations to
retain the resale value of
the storage devices
• Timelier process than other
forms of data sanitization
• Policies and processes need
to be in place for all data
storage devices
Data Erasure
Data erasure is the software-
based method of securely
overwriting data from any
data storage device. By
overwriting the data on the
storage device, the data is
rendered unrecoverable and
achieves data sanitization.
Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2017 Blancco Oy Ltd. All rights reserved.
Customer Demand
The Right to be Forgotten
allows EU citizens to request
removal of their data from
your system.
Employee Onboarding &
Departures
Protect against data
breaches at transition points
in your hardware’s chain of
custody and use.
Equipment End-of-Life
When a server, storage, device
or other IT asset is ready to be
reused, resold or discarded –
any data must be erased.
Data Migration
When data is moved from one
location to another, from an old
server to a new one, or virtual
machine to another – the original
data location must be erased.
Disaster Recovery Exercises
Following the successful
restoration of production
systems, any data left on the
recovery disks should be erased.
Data End-of-Life
When data is no longer needed
on any storage device, policies
can enforce the erasure of virtual
machines, files and folders with
automated routines within your
existing systems.
When to perform data erasure in the
enterprise.
37
Cloud Exit
When you are exiting a cloud
service or a managed services
provider is handling your data,
data erasure policies must still
be enforced to keep control
over the data.
Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2017 Blancco Oy Ltd. All rights reserved.
Take a Layered Data Protection
Approach
38
• Most encryption is based on
drive encryption and is
unlocked when system is
being operated.
• Encryption key management is
always a challenge
• Executive travelers can also
be ordered to unlock
encryption on lap-tops when
crossing sensitive borders
In a layered approach to data security, attacks that are missed
by one defensive layer are defeated by another. Data erasure
represents a last line of defense in protecting your data.
Encryption is not enough:
Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2017 Blancco Oy Ltd. All rights reserved.
A Holistic Approach to Data Lifecycle
Management
39
We recommend a holistic approach to help you meet data protection
standards and regulations by addressing your needs across the entire
data lifecycle.
Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2017 Blancco Oy Ltd. All rights reserved.
Data Erasure Management – easily
manage a complete data erasure
strategy.
Centralized
Reporting
Flexible Deployment
for Global Visibility
Customized Reporting of
>250 Hardware Details
Compatible with
ALL Solutions
100% Tamper-Proof &
Certified Reporting
Traditional
Drive Erasure
Mobile
Device Erasure
Active Erasure
Mobile
Diagnostics
Asset Manager and
Drive Eraser
Mobile Device Eraser
File Eraser, Virtual
Machine Eraser,
LUN Eraser
Management Console
Data Eraser Management Console available On-Premise and Cloud Accessibility
40
Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2017 Blancco Oy Ltd. All rights reserved. 41
Old World
RECORDS
TextFiles or Spreadsheets
Decentralized, unsearchable.
SOFTWARE
- Multiple uncertified, out of date
solutions
- Legacy tools or no tools on
hand
DATA SETS
- None
#HOUSEINORDER
New World
RECORDS
- Digitally Signed, Tamper Proof
- Central Repository, Searchable
SOFTWARE
- Single, Certified, Industry Std.,
State of the Art, Enterprise
Solution
- Right tools for the right job
DATA SETS
- Failure rates, costs to org per
drive manufacturer, RMA savings
calculable,
Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2017 Blancco Oy Ltd. All rights reserved.
Prove Compliance with
Auditors
According to the Cloud Security Alliance, falls to “…the provider to keep that data secure,
and when it is deleted, the provider should ensure (or be able to prove) that it is
permanently destroyed.”
Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2017 Blancco Oy Ltd. All rights reserved.
The Polish Internal
Security AgencySwedish Armed
Forces
Common
Criteria
(ISO15408)
Netherlands
Comms
Security Agency
NATO
UK Comms Electronic
Security Group
German BSI
Certification
Sécurité
de Premier Niveau
USA Department
of DefenseTüV-SüD UK Defense INFOSEC
Norwegian National
Security Authority
Japan’s Refurb. IT
Equipment AssociationCzech NSA National Assoc. for
Information Destruction
UK Asset Disposal &
Information Security
Alliance
Netherlands
Comms
Security Agency
We have the certifications to
prove our solutions meet
highest standards.
43
Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2017 Blancco Oy Ltd. All rights reserved.
Because the work is automated, we managed to
reduce the human error associated with manual
operations and release resources for other
document creation and in-house audits. I would
say that management of data deletion now
requires about a sixth of the man-hours that it
used to, so we have managed to improve
efficiency.”
– Hiroki Uno, Business Innovation Partner,
Samsung Japan
Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2017 Blancco Oy Ltd. All rights reserved.
The Blancco Data Eraser solutions, coupled with their
consulting services, have become invaluable tools for
us to not only securely erase data from IT assets when
they reach end-of-life, but also to provide us with the
ongoing guidance and recommendations ….. One of
the most valuable components of Blancco’s offering is
the ability to receive digitally signed, tamper-proof
erasure reports. These certificates allow us to increase
visibility and monitoring of data erasures and provide
the necessary audit trail for regulatory compliance with
data protection laws and industry guidelines, such as
the Philippines National Privacy Act, PCI DSS and ISO
27001.”
– Anton Bonifacio, CISO, Globe Telecom
Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2017 Blancco Oy Ltd. All rights reserved.
Time for a break!
Please take a moment to refresh yourselves!
Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2017 Blancco Oy Ltd. All rights reserved.
Data Erasure Demonstrations
Omi Malzai, Technical Support Engineer,
Canada
Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2017 Blancco Oy Ltd. All rights reserved.
DEMONSTRATION
• Erasure Options
• Local
• Remote
• Boot Options
• PXE
(Network)
• USB
• License Options
• BMC
• HASP
• Erasure
• iOS
• Android
• Diagnostics
• 40+
diagnostic
tests
• Hardware
Appliances
• Array Server
Eraser
• 12 Bay Drive
Enclosure
Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2017 Blancco Oy Ltd. All rights reserved.
Active Erasure Solutions, Use Cases & What the Future Holds
Fredrik Forslund, Director, Cloud & Data Center Erasure Solutions
Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2017 Blancco Oy Ltd. All rights reserved.
My Content- your choice!
50
• ISO and regulation in more detail, EUGDPR example
• Trends in the global industry
• Real use case examples – best practice
Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2017 Blancco Oy Ltd. All rights reserved.
More on regulations and
standards
Image Credit: Unlocked/NeweggBlancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2018 Blancco Oy Ltd. All rights reserved.
Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2017 Blancco Oy Ltd. All rights reserved.
Data Protection regulation and requirements
Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2018 Blancco Oy Ltd. All rights reserved.
State / Local
Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2017 Blancco Oy Ltd. All rights reserved.
Storage Security Needs
Evidence of Sanitization
53
Proof of sanitization takes on at
least two forms:
1. an audit log trail and
2. a certificate of sanitization
The controller shall have the
obligation to erase personal
data without undue delay
Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2018 Blancco Oy Ltd. All rights reserved.
Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2017 Blancco Oy Ltd. All rights reserved.
The Right to be Forgotten
54
• Data subject will have the right to obtain
from the controller the erasure of
personal data concerning him or her
• The controller shall have the obligation to
erase personal data without undue delay
• The controller shall take reasonable
steps, including technical measures, to
inform controllers of any links to, or copy
or replication of, of the data subject’s
personal data
Article 17 of the new regulation focuses
on the right to erasure.
Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2017 Blancco Oy Ltd. All rights reserved.
Consequences are Steep
55
The greater of
€20 million or 4%
of global annual
turnover
Based on several factors:
 Whether the infringement was intentional or
negligent
 Whether the controller or processor took any
steps to mitigate the damage
 Technical and organizational measures that
had been implemented by the controller or
processor
 Prior infringements by the controller or
processor
 The degree of cooperation with the regulator
 The types of personal data involved
 The way the regulator found out about the
infringement
Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2017 Blancco Oy Ltd. All rights reserved.
Protection of privacy and personal data in the
cloud - IMPLEMENTED in H2 2014
Includes:
• Cloud provider should enable the right to erase personal data.
• Cloud provider should securely erase any temporary files in
systems.
• Cloud provider should ensure that whenever data storage space
is re-assigned, previously residing data is not recoverable.
ISO Security Standards
impacting data centers and cloud providers
Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2017 Blancco Oy Ltd. All rights reserved.
Newest ISO Recommendations 27040 for
storage security on how to erase and
when
Erase on logical and virtual level:
• “logical sanitization (see 6.8.1.3) should be
used to clear virtualized storage, especially
when the actual storage devices and media
cannot be determined.”
Also an addition to Encryption:
• “Sanitization of media at end-of-use situations
is recommended, even when using
encryption methods.”
Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2017 Blancco Oy Ltd. All rights reserved.
A thorough documentation is required:
• Organizations should maintain a record of
sanitization activities to document what media
were sanitized, when, how they were sanitized,
and the final disposition of the media.
Often when an organization is suspected of losing
control of its information, it is because of inadequate
record keeping of media sanitization.
Proof of sanitization takes on at least two forms:
1. an audit log trail and
2. a certificate of sanitization.
Newest ISO Recommendations 27040 for storage
security on how to erase and when
Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2017 Blancco Oy Ltd. All rights reserved.
Current Trends
Image Credit: Unlocked/NeweggBlancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2018 Blancco Oy Ltd. All rights reserved.
Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2017 Blancco Oy Ltd. All rights reserved.
Security vs. Operations
Efficient & clean
operations for end-of-life
Security & compliance
demands for data
across the entire
lifecycle.
Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2018 Blancco Oy Ltd. All rights reserved.
Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2017 Blancco Oy Ltd. All rights reserved.
Data Center Consolidation Stat
https://federaltechnologyinsider.com/data-center-optimization-initiative-consolidation-cloud/Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2018 Blancco Oy Ltd. All rights reserved.
OMB and Federal Information Technology Acquisition Reform Act
(FITARA) guidelines state we should expect 60% of non-tiered data centers
closed and 25% of tiered data centers consolidated by 2018.
60%
of non-tiered data
centers will close
25%
of tiered data centers
will consolidate
Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2017 Blancco Oy Ltd. All rights reserved.
Gartner recently predicted that
by 2021, 50 percent of data
centers will use SSDs for
high-performance computing
and big data workloads – up
from less than 10 percent today.
SSD NVMes Become the
Interface for Enterprise
Drives
50%
of data centers will use
SSDs by 2021
Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2017 Blancco Oy Ltd. All rights reserved.
Data Relocation Needs to be
Secure and Efficient
Gartner suggests that 70% of
data center migrations will
experience significant time delays
or even unplanned downtime,
largely due to improper planning.
70%
of data center migrations
will experience delays
Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2017 Blancco Oy Ltd. All rights reserved.
Mitigate Risks Posed by Dark
Data
According to Veritas
Global Databerg
Report, 85% of
Stored Data Is Either
Dark or Redundant,
Obsolete, or Trivial
(ROT)
Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2017 Blancco Oy Ltd. All rights reserved.
What are the Negatives
Associated with Hoarding
Data?
65
• Cost
• Compliance
• Increased attack surface
• Readiness to respond to customer request
Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2017 Blancco Oy Ltd. All rights reserved.
Calculate Your Customers’ Cost Savings
66
Cost of Cloud Storage Vs. Data Erasure
350
Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2017 Blancco Oy Ltd. All rights reserved.
67
Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2017 Blancco Oy Ltd. All rights reserved.
68
Data
Retention!
Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2017 Blancco Oy Ltd. All rights reserved.
What methods
achieve it?
Data Sanitization
Data
Erasure
Cryptographic
Erasure
Data
Destruction
Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2018 Blancco Oy Ltd. All rights reserved.
Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2017 Blancco Oy Ltd. All rights reserved.
To achieve data sanitization, these
methods must:
1. Degaussing
2. and/or Mechanical Shredders
3. Audit Report
1. Select a specific standard
2. Verify the overwriting methodology removed data
across the entire device
3. Produce tamper-proof certificate
1. Find and overwrite crypto keys and password
2. Verify the data encrypted and the previous key
unrecoverable
3. Produce a tamper-proof certificate
Physical
Destruction
Cryptographic
Erasure
Data
Erasure
Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2017 Blancco Oy Ltd. All rights reserved.
71
Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2017 Blancco Oy Ltd. All rights reserved.
Use Cases
Image Credit: Unlocked/NeweggBlancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2018 Blancco Oy Ltd. All rights reserved.
Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2017 Blancco Oy Ltd. All rights reserved.
Data Center Use Cases - Two
Dimensions
• Data migration
• Customer Exit- Cloud Exit
• VM life cycles
• Repurposing system storage
• Temporary data
• Data retention policies
Erase Data from an operational
environment
• Data Center decommissioning
• Tech refresh
• End of lease
• Return test systems
• Break fix (RMA)
Erase entire systems or servers
on drive level
• Break fix (RMA)
• Repurposing system storage
• Data Center decommissioning
73
Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2017 Blancco Oy Ltd. All rights reserved.
Use case
Personal and confidential
Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2017 Blancco Oy Ltd. All rights reserved.
Customer Infrastructure:
12 Data centers (Colo)
around the world
Mostly using leased HP
and Dell HW, but also
EMC and Oracle
Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2017 Blancco Oy Ltd. All rights reserved.
Drives are pulled out of
servers when they fail.
Servers and drives were
piling up because of their
previous erasure
solution wasn’t working
well.
The old solution wasn’t
approved for SSDs either.
When the server lease
(2-3yr) ends, they are
disconnected and must
be erased before
returning.
The
problem:
Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2017 Blancco Oy Ltd. All rights reserved.
Portable Blancco BMC / B5 PXE
server laptop
• Management Console
• Blancco 5 Server
• PXE boot server
• All preinstalled on a laptop
provided by Blancco
Professional Services
• 1-2 laptops per DC
1. Connect BMC laptop and
servers to same network
switch
2. Connect power
3. Connect KVM
4. PXE boot
5. Erase
6. Send reports
Solution:
Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2017 Blancco Oy Ltd. All rights reserved.
1st day after delivering and
training the product:
The customer’s Data
Center Engineers started
erasing whole arrays of
servers using the BMC
laptop.
In this picture, the BMC/PXE laptop and the
network switch are moved around the DC on a
cart. The selected target servers were connected
to connected the same switch with the BMC
laptop. A KVM crash cart was used to monitor
and control the erasures.
Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2017 Blancco Oy Ltd. All rights reserved.
Custom 3U
appliance for
loose drive erasure
• Based on 2U E2400 HW
• B5HW software
• Mounted to customer’s old
EPS rack
• Connected to Dell, EMC and
EPS SATA/SAS and FC disk
enclosures
1. Plug in the loose drives
2. Erase
3. Repeat
Hardware
Solution
Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2017 Blancco Oy Ltd. All rights reserved.
Server decommissioning
example for a Fortune 50
company:
• 856 Servers
Decommissioned Overnight
• Each server had 6x1TB SATA
HDD. Total 5117 drives
• Erasure time was 5-8 hours.
Total time from start (boot
up) to finish (report
collection): 10 hours
• Erasure method was NIST
800-88 Clear 80
Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2017 Blancco Oy Ltd. All rights reserved.
Best Practice:
Implement a scalable, automated
process to decrease time and
resources needed
Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2018 Blancco Oy Ltd. All rights reserved.
Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2017 Blancco Oy Ltd. All rights reserved.
Common challenge:
Sanitizing advanced media,
like NVMe SSDs
Image Credit: Unlocked/NeweggBlancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2018 Blancco Oy Ltd. All rights reserved.
Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2017 Blancco Oy Ltd. All rights reserved.
Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2017 Blancco Oy Ltd. All rights reserved.
Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2017 Blancco Oy Ltd. All rights reserved.
Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2017 Blancco Oy Ltd. All rights reserved.
Challenges with SSD Erasure
86
Blancco Patented Solution
1. Freeze lock Removal
2. Proprietary Erasure Sequence
i. Combines SW overwrite and FW commands
3. Erasure Validation
i. Identifies malfunctions and preformed processes
SSD Challenges
• Freeze Locks
• Wear Leveling
• Data Compression
• Unreliable Firmware
Commands
• Corrupted Blocks
• Secure-Erase
Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2017 Blancco Oy Ltd. All rights reserved.
Original Process:
• Failing HDDS hotswapped for new ones.
• Had 28 day SLA w/ Mft. & paying large
fines per drive as no way to ensure
erasure.
• Up to 85% of drives still functional. No
return req’d.
Improved process:
• 14 Blancco H/W appliances delivered to 14
DCs.
• Saves UBS $3 Million Euro annually in
fines.
Business case example loose drives (RMA/break fixes)
UBS Break-fix processes
Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2017 Blancco Oy Ltd. All rights reserved.
ROI - RMAAnalysis on RMA savings from another Financial
Institution of similar size
Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2017 Blancco Oy Ltd. All rights reserved.
Active Erasure:
Sanitization process
in a live environment
Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2018 Blancco Oy Ltd. All rights reserved.
Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2017 Blancco Oy Ltd. All rights reserved.
“As a Datacenter and Cloud solution provider, Telehouse is committed to
providing strong guaranty to its customer. We chose a software-based
data erasure process as irrefutable evidence that we comply with EU
regulation when erasing customer data.
More than a technical solution, the software erasure
process allows us to deliver TRUST to our customers. This
is the most valuable asset in our business field, on top of
providing strong evidence for our security certifications
like ISO 27001 or PCI DSS”.
– Benoît Mercier, Directeur ICT Solutions, Telehouse Europe
Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2017 Blancco Oy Ltd. All rights reserved.
On
DemandErase VMs through
Command Line Interface
– manually performed
and/or scripted by the
administrator
VMware Hypervisor ESX and ESXi with
VMFS, versions 4, 5 and 6.
Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2017 Blancco Oy Ltd. All rights reserved.
Logical Level Erasure:
for Unix and Windows Environments
92
Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2017 Blancco Oy Ltd. All rights reserved.
File Level- Use Case
93
• Requirement
 Secure data erasure for customer exit
 Regulatory need to remove customer details using a certified solution
 Customer details on SMB shares, local & hosted email & paper
• How
 Discovery using standard MS Windows tools
 Blancco File Eraser erases mailboxes & files, “freespace” tool
 Secure report generated for every erasure performed
• Timeline
 Sales cycle approx. 2 weeks. Execution of project 2 days on site
Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2017 Blancco Oy Ltd. All rights reserved.
Recovery of Virtual
Machines is an
established practice
Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2017 Blancco Oy Ltd. All rights reserved.
Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2017 Blancco Oy Ltd. All rights reserved.
Closing Remarks
Christopher Eeg,
Managing Director, Canada

More Related Content

What's hot

Zero footprint guest memory introspection from xen
Zero footprint guest memory introspection from xenZero footprint guest memory introspection from xen
Zero footprint guest memory introspection from xen
Bitdefender Enterprise
 
Webinar: Securing IoT with FIDO Authentication
Webinar: Securing IoT with FIDO AuthenticationWebinar: Securing IoT with FIDO Authentication
Webinar: Securing IoT with FIDO Authentication
FIDO Alliance
 
Java SE Subscription Workshop
Java SE Subscription WorkshopJava SE Subscription Workshop
Java SE Subscription Workshop
MarketingArrowECS_CZ
 
US Roadshow - Introduction to Bitdefender
US Roadshow - Introduction to BitdefenderUS Roadshow - Introduction to Bitdefender
US Roadshow - Introduction to BitdefenderBitdefender Enterprise
 
FIDO Privacy Principles and Approach
FIDO Privacy Principles and ApproachFIDO Privacy Principles and Approach
FIDO Privacy Principles and Approach
FIDO Alliance
 
[UK & EU Webinar] The Top 3 Data Sanitisation Challenges – And How to Overcom...
[UK & EU Webinar] The Top 3 Data Sanitisation Challenges – And How to Overcom...[UK & EU Webinar] The Top 3 Data Sanitisation Challenges – And How to Overcom...
[UK & EU Webinar] The Top 3 Data Sanitisation Challenges – And How to Overcom...
Blancco
 
Safely Return to Work with Webex Rooms
Safely Return to Work with Webex RoomsSafely Return to Work with Webex Rooms
Safely Return to Work with Webex Rooms
Cisco Webex
 
Acuent Security
Acuent Security Acuent Security
Acuent Security
Stephen Bates
 
Webex Control Hub - IT Control no matter where they work
Webex Control Hub -IT Control no matter where they workWebex Control Hub -IT Control no matter where they work
Webex Control Hub - IT Control no matter where they work
Cisco Webex
 
Bitdefender Corporate July2011 V3
Bitdefender Corporate July2011 V3Bitdefender Corporate July2011 V3
Bitdefender Corporate July2011 V3princescorpio
 
RoundTable: da Industria 4.0 a GDPR #ICTSecurity #ZeroTrust
RoundTable: da Industria 4.0 a GDPR #ICTSecurity #ZeroTrustRoundTable: da Industria 4.0 a GDPR #ICTSecurity #ZeroTrust
RoundTable: da Industria 4.0 a GDPR #ICTSecurity #ZeroTrust
Talea Consulting Srl
 
Luca, Marius Alexandru „BitDefender apsaugos sprendimai organizacijoms“ (Rumu...
Luca, Marius Alexandru „BitDefender apsaugos sprendimai organizacijoms“ (Rumu...Luca, Marius Alexandru „BitDefender apsaugos sprendimai organizacijoms“ (Rumu...
Luca, Marius Alexandru „BitDefender apsaugos sprendimai organizacijoms“ (Rumu...
Lietuvos kompiuterininkų sąjunga
 
Bit Defender Anti virus by Anupam
Bit Defender Anti virus by AnupamBit Defender Anti virus by Anupam
Bit Defender Anti virus by Anupam
Unified Child Foundation
 
Making it big with something small - Philip Handschin - Codemotion Roma 2015
Making it big with something small - Philip Handschin - Codemotion Roma 2015Making it big with something small - Philip Handschin - Codemotion Roma 2015
Making it big with something small - Philip Handschin - Codemotion Roma 2015
Codemotion
 
Ben Rothke - Effective Data Destruction Practices
Ben Rothke - Effective Data Destruction PracticesBen Rothke - Effective Data Destruction Practices
Ben Rothke - Effective Data Destruction Practices
Ben Rothke
 
Unpacking the Power Behind Huddle Spaces
Unpacking the Power Behind Huddle SpacesUnpacking the Power Behind Huddle Spaces
Unpacking the Power Behind Huddle Spaces
Cisco Webex
 
Developing IoT devices. Creating wearables with the new LinkIt™ 2523 HDK by SAC
Developing IoT devices. Creating wearables with the new LinkIt™ 2523 HDK by SACDeveloping IoT devices. Creating wearables with the new LinkIt™ 2523 HDK by SAC
Developing IoT devices. Creating wearables with the new LinkIt™ 2523 HDK by SAC
MediaTek Labs
 
How to Transform Your Workplace with Hybrid Collaboration
How to Transform Your Workplace with Hybrid CollaborationHow to Transform Your Workplace with Hybrid Collaboration
How to Transform Your Workplace with Hybrid Collaboration
Cisco Webex
 
Straight Talk on End to End Encryption and Confidentiality
Straight Talk on End to End Encryption and ConfidentialityStraight Talk on End to End Encryption and Confidentiality
Straight Talk on End to End Encryption and Confidentiality
Cisco Webex
 

What's hot (20)

Zero footprint guest memory introspection from xen
Zero footprint guest memory introspection from xenZero footprint guest memory introspection from xen
Zero footprint guest memory introspection from xen
 
Webinar: Securing IoT with FIDO Authentication
Webinar: Securing IoT with FIDO AuthenticationWebinar: Securing IoT with FIDO Authentication
Webinar: Securing IoT with FIDO Authentication
 
Java SE Subscription Workshop
Java SE Subscription WorkshopJava SE Subscription Workshop
Java SE Subscription Workshop
 
US Roadshow - Introduction to Bitdefender
US Roadshow - Introduction to BitdefenderUS Roadshow - Introduction to Bitdefender
US Roadshow - Introduction to Bitdefender
 
FIDO Privacy Principles and Approach
FIDO Privacy Principles and ApproachFIDO Privacy Principles and Approach
FIDO Privacy Principles and Approach
 
[UK & EU Webinar] The Top 3 Data Sanitisation Challenges – And How to Overcom...
[UK & EU Webinar] The Top 3 Data Sanitisation Challenges – And How to Overcom...[UK & EU Webinar] The Top 3 Data Sanitisation Challenges – And How to Overcom...
[UK & EU Webinar] The Top 3 Data Sanitisation Challenges – And How to Overcom...
 
Safely Return to Work with Webex Rooms
Safely Return to Work with Webex RoomsSafely Return to Work with Webex Rooms
Safely Return to Work with Webex Rooms
 
Acuent Security
Acuent Security Acuent Security
Acuent Security
 
Webex Control Hub - IT Control no matter where they work
Webex Control Hub -IT Control no matter where they workWebex Control Hub -IT Control no matter where they work
Webex Control Hub - IT Control no matter where they work
 
Bitdefender Corporate July2011 V3
Bitdefender Corporate July2011 V3Bitdefender Corporate July2011 V3
Bitdefender Corporate July2011 V3
 
RoundTable: da Industria 4.0 a GDPR #ICTSecurity #ZeroTrust
RoundTable: da Industria 4.0 a GDPR #ICTSecurity #ZeroTrustRoundTable: da Industria 4.0 a GDPR #ICTSecurity #ZeroTrust
RoundTable: da Industria 4.0 a GDPR #ICTSecurity #ZeroTrust
 
1View Cloud
1View Cloud1View Cloud
1View Cloud
 
Luca, Marius Alexandru „BitDefender apsaugos sprendimai organizacijoms“ (Rumu...
Luca, Marius Alexandru „BitDefender apsaugos sprendimai organizacijoms“ (Rumu...Luca, Marius Alexandru „BitDefender apsaugos sprendimai organizacijoms“ (Rumu...
Luca, Marius Alexandru „BitDefender apsaugos sprendimai organizacijoms“ (Rumu...
 
Bit Defender Anti virus by Anupam
Bit Defender Anti virus by AnupamBit Defender Anti virus by Anupam
Bit Defender Anti virus by Anupam
 
Making it big with something small - Philip Handschin - Codemotion Roma 2015
Making it big with something small - Philip Handschin - Codemotion Roma 2015Making it big with something small - Philip Handschin - Codemotion Roma 2015
Making it big with something small - Philip Handschin - Codemotion Roma 2015
 
Ben Rothke - Effective Data Destruction Practices
Ben Rothke - Effective Data Destruction PracticesBen Rothke - Effective Data Destruction Practices
Ben Rothke - Effective Data Destruction Practices
 
Unpacking the Power Behind Huddle Spaces
Unpacking the Power Behind Huddle SpacesUnpacking the Power Behind Huddle Spaces
Unpacking the Power Behind Huddle Spaces
 
Developing IoT devices. Creating wearables with the new LinkIt™ 2523 HDK by SAC
Developing IoT devices. Creating wearables with the new LinkIt™ 2523 HDK by SACDeveloping IoT devices. Creating wearables with the new LinkIt™ 2523 HDK by SAC
Developing IoT devices. Creating wearables with the new LinkIt™ 2523 HDK by SAC
 
How to Transform Your Workplace with Hybrid Collaboration
How to Transform Your Workplace with Hybrid CollaborationHow to Transform Your Workplace with Hybrid Collaboration
How to Transform Your Workplace with Hybrid Collaboration
 
Straight Talk on End to End Encryption and Confidentiality
Straight Talk on End to End Encryption and ConfidentialityStraight Talk on End to End Encryption and Confidentiality
Straight Talk on End to End Encryption and Confidentiality
 

Similar to Toronto Event- How to Protect Data Throughout Its Lifecycle

Delete vs Erase: How Are Companies Wiping Active Files
Delete vs Erase: How Are Companies Wiping Active Files Delete vs Erase: How Are Companies Wiping Active Files
Delete vs Erase: How Are Companies Wiping Active Files
Blancco
 
An Introduction to Live Environment and Cloud Eraser
An Introduction to Live Environment and Cloud EraserAn Introduction to Live Environment and Cloud Eraser
An Introduction to Live Environment and Cloud Eraser
Blancco
 
Splunk GDPR Security Roundtable: Zurich - 22 Nov 2017 PT1
Splunk GDPR Security Roundtable: Zurich - 22 Nov 2017 PT1Splunk GDPR Security Roundtable: Zurich - 22 Nov 2017 PT1
Splunk GDPR Security Roundtable: Zurich - 22 Nov 2017 PT1
Splunk
 
Splunk Forum Frankfurt - 15th Nov 2017 - GDPR / EU-DSGVO
Splunk Forum Frankfurt - 15th Nov 2017 - GDPR / EU-DSGVOSplunk Forum Frankfurt - 15th Nov 2017 - GDPR / EU-DSGVO
Splunk Forum Frankfurt - 15th Nov 2017 - GDPR / EU-DSGVO
Splunk
 
Why Blancco ?
Why Blancco ?Why Blancco ?
Why Blancco ?
Christophe Elut
 
Cloud Storage: How to Fight Off Data Security Threats & Stay Compliant
Cloud Storage: How to Fight Off Data Security Threats & Stay CompliantCloud Storage: How to Fight Off Data Security Threats & Stay Compliant
Cloud Storage: How to Fight Off Data Security Threats & Stay Compliant
Blancco
 
GDPR Complaince: Don't Let SIEM BE Your Downfall
GDPR Complaince: Don't Let SIEM BE Your DownfallGDPR Complaince: Don't Let SIEM BE Your Downfall
GDPR Complaince: Don't Let SIEM BE Your Downfall
Splunk
 
Symantec Webinar Part 1 of 6 The Four Stages of GDPR Readiness
Symantec Webinar Part 1 of 6 The Four Stages of GDPR ReadinessSymantec Webinar Part 1 of 6 The Four Stages of GDPR Readiness
Symantec Webinar Part 1 of 6 The Four Stages of GDPR Readiness
Symantec
 
Cisco Connect 2018 Philippines - fay ocampo
Cisco Connect 2018 Philippines - fay ocampoCisco Connect 2018 Philippines - fay ocampo
Cisco Connect 2018 Philippines - fay ocampo
NetworkCollaborators
 
Symantec Webinar Part 3 of 6 How to Tackle Data Protection Risk in Time for G...
Symantec Webinar Part 3 of 6 How to Tackle Data Protection Risk in Time for G...Symantec Webinar Part 3 of 6 How to Tackle Data Protection Risk in Time for G...
Symantec Webinar Part 3 of 6 How to Tackle Data Protection Risk in Time for G...
Symantec
 
CCET-GBC Fueling Innovation for Construction and Real Estate with IoE
CCET-GBC Fueling Innovation for Construction and Real Estate with IoECCET-GBC Fueling Innovation for Construction and Real Estate with IoE
CCET-GBC Fueling Innovation for Construction and Real Estate with IoE
Rick Huijbregts
 
David Noy – Realising the true potential of software-defined storage
David Noy – Realising the true potential of software-defined storageDavid Noy – Realising the true potential of software-defined storage
David Noy – Realising the true potential of software-defined storage
Veritas Technologies LLC
 
Firewall Webinar
Firewall WebinarFirewall Webinar
Firewall Webinar
AT&T
 
Splunk Discovery: Milan 2018 - Splunk Overview
Splunk Discovery: Milan 2018 - Splunk OverviewSplunk Discovery: Milan 2018 - Splunk Overview
Splunk Discovery: Milan 2018 - Splunk Overview
Splunk
 
RWDG Slides: Using Tools to Advance Your Data Governance Program
RWDG Slides: Using Tools to Advance Your Data Governance ProgramRWDG Slides: Using Tools to Advance Your Data Governance Program
RWDG Slides: Using Tools to Advance Your Data Governance Program
DATAVERSITY
 
Leading Media and Marketing Solutions Company Yellow Pages Group Uses Enterpr...
Leading Media and Marketing Solutions Company Yellow Pages Group Uses Enterpr...Leading Media and Marketing Solutions Company Yellow Pages Group Uses Enterpr...
Leading Media and Marketing Solutions Company Yellow Pages Group Uses Enterpr...
tibbr
 
Smart Tech = Smart Organizations : Building Smarter Organizations
Smart Tech = Smart Organizations : Building Smarter OrganizationsSmart Tech = Smart Organizations : Building Smarter Organizations
Smart Tech = Smart Organizations : Building Smarter OrganizationsRick Huijbregts
 
Tomorrow Starts Here - Security Everywhere
Tomorrow Starts Here - Security Everywhere Tomorrow Starts Here - Security Everywhere
Tomorrow Starts Here - Security Everywhere
Cisco Canada
 
AI in Software for Augmenting Intelligence Across the Enterprise
AI in Software for Augmenting Intelligence Across the EnterpriseAI in Software for Augmenting Intelligence Across the Enterprise
AI in Software for Augmenting Intelligence Across the Enterprise
The Hive
 
SplunkLive! Paris 2017: Plenary Session - Splunk Overview
SplunkLive! Paris 2017: Plenary Session - Splunk OverviewSplunkLive! Paris 2017: Plenary Session - Splunk Overview
SplunkLive! Paris 2017: Plenary Session - Splunk Overview
Splunk
 

Similar to Toronto Event- How to Protect Data Throughout Its Lifecycle (20)

Delete vs Erase: How Are Companies Wiping Active Files
Delete vs Erase: How Are Companies Wiping Active Files Delete vs Erase: How Are Companies Wiping Active Files
Delete vs Erase: How Are Companies Wiping Active Files
 
An Introduction to Live Environment and Cloud Eraser
An Introduction to Live Environment and Cloud EraserAn Introduction to Live Environment and Cloud Eraser
An Introduction to Live Environment and Cloud Eraser
 
Splunk GDPR Security Roundtable: Zurich - 22 Nov 2017 PT1
Splunk GDPR Security Roundtable: Zurich - 22 Nov 2017 PT1Splunk GDPR Security Roundtable: Zurich - 22 Nov 2017 PT1
Splunk GDPR Security Roundtable: Zurich - 22 Nov 2017 PT1
 
Splunk Forum Frankfurt - 15th Nov 2017 - GDPR / EU-DSGVO
Splunk Forum Frankfurt - 15th Nov 2017 - GDPR / EU-DSGVOSplunk Forum Frankfurt - 15th Nov 2017 - GDPR / EU-DSGVO
Splunk Forum Frankfurt - 15th Nov 2017 - GDPR / EU-DSGVO
 
Why Blancco ?
Why Blancco ?Why Blancco ?
Why Blancco ?
 
Cloud Storage: How to Fight Off Data Security Threats & Stay Compliant
Cloud Storage: How to Fight Off Data Security Threats & Stay CompliantCloud Storage: How to Fight Off Data Security Threats & Stay Compliant
Cloud Storage: How to Fight Off Data Security Threats & Stay Compliant
 
GDPR Complaince: Don't Let SIEM BE Your Downfall
GDPR Complaince: Don't Let SIEM BE Your DownfallGDPR Complaince: Don't Let SIEM BE Your Downfall
GDPR Complaince: Don't Let SIEM BE Your Downfall
 
Symantec Webinar Part 1 of 6 The Four Stages of GDPR Readiness
Symantec Webinar Part 1 of 6 The Four Stages of GDPR ReadinessSymantec Webinar Part 1 of 6 The Four Stages of GDPR Readiness
Symantec Webinar Part 1 of 6 The Four Stages of GDPR Readiness
 
Cisco Connect 2018 Philippines - fay ocampo
Cisco Connect 2018 Philippines - fay ocampoCisco Connect 2018 Philippines - fay ocampo
Cisco Connect 2018 Philippines - fay ocampo
 
Symantec Webinar Part 3 of 6 How to Tackle Data Protection Risk in Time for G...
Symantec Webinar Part 3 of 6 How to Tackle Data Protection Risk in Time for G...Symantec Webinar Part 3 of 6 How to Tackle Data Protection Risk in Time for G...
Symantec Webinar Part 3 of 6 How to Tackle Data Protection Risk in Time for G...
 
CCET-GBC Fueling Innovation for Construction and Real Estate with IoE
CCET-GBC Fueling Innovation for Construction and Real Estate with IoECCET-GBC Fueling Innovation for Construction and Real Estate with IoE
CCET-GBC Fueling Innovation for Construction and Real Estate with IoE
 
David Noy – Realising the true potential of software-defined storage
David Noy – Realising the true potential of software-defined storageDavid Noy – Realising the true potential of software-defined storage
David Noy – Realising the true potential of software-defined storage
 
Firewall Webinar
Firewall WebinarFirewall Webinar
Firewall Webinar
 
Splunk Discovery: Milan 2018 - Splunk Overview
Splunk Discovery: Milan 2018 - Splunk OverviewSplunk Discovery: Milan 2018 - Splunk Overview
Splunk Discovery: Milan 2018 - Splunk Overview
 
RWDG Slides: Using Tools to Advance Your Data Governance Program
RWDG Slides: Using Tools to Advance Your Data Governance ProgramRWDG Slides: Using Tools to Advance Your Data Governance Program
RWDG Slides: Using Tools to Advance Your Data Governance Program
 
Leading Media and Marketing Solutions Company Yellow Pages Group Uses Enterpr...
Leading Media and Marketing Solutions Company Yellow Pages Group Uses Enterpr...Leading Media and Marketing Solutions Company Yellow Pages Group Uses Enterpr...
Leading Media and Marketing Solutions Company Yellow Pages Group Uses Enterpr...
 
Smart Tech = Smart Organizations : Building Smarter Organizations
Smart Tech = Smart Organizations : Building Smarter OrganizationsSmart Tech = Smart Organizations : Building Smarter Organizations
Smart Tech = Smart Organizations : Building Smarter Organizations
 
Tomorrow Starts Here - Security Everywhere
Tomorrow Starts Here - Security Everywhere Tomorrow Starts Here - Security Everywhere
Tomorrow Starts Here - Security Everywhere
 
AI in Software for Augmenting Intelligence Across the Enterprise
AI in Software for Augmenting Intelligence Across the EnterpriseAI in Software for Augmenting Intelligence Across the Enterprise
AI in Software for Augmenting Intelligence Across the Enterprise
 
SplunkLive! Paris 2017: Plenary Session - Splunk Overview
SplunkLive! Paris 2017: Plenary Session - Splunk OverviewSplunkLive! Paris 2017: Plenary Session - Splunk Overview
SplunkLive! Paris 2017: Plenary Session - Splunk Overview
 

More from Blancco

Making the Case- Blancco Data Center Eraser Solution
Making the Case- Blancco Data Center Eraser Solution Making the Case- Blancco Data Center Eraser Solution
Making the Case- Blancco Data Center Eraser Solution
Blancco
 
EU GDPR- The Countdown to Compliance, Research Study Highlights
EU GDPR- The Countdown to Compliance, Research Study Highlights EU GDPR- The Countdown to Compliance, Research Study Highlights
EU GDPR- The Countdown to Compliance, Research Study Highlights
Blancco
 
IAPP Canada Privacy Symposium- "Data Retention Is a Team Sport: How to Get It...
IAPP Canada Privacy Symposium- "Data Retention Is a Team Sport: How to Get It...IAPP Canada Privacy Symposium- "Data Retention Is a Team Sport: How to Get It...
IAPP Canada Privacy Symposium- "Data Retention Is a Team Sport: How to Get It...
Blancco
 
Data Governance in the Enterprise: Highlights from Our Research Report
Data Governance in the Enterprise: Highlights from Our Research Report Data Governance in the Enterprise: Highlights from Our Research Report
Data Governance in the Enterprise: Highlights from Our Research Report
Blancco
 
Solid State Drives (SSDs) -What it Takes to Make Data Go Away
Solid State Drives (SSDs) -What it Takes to Make Data Go AwaySolid State Drives (SSDs) -What it Takes to Make Data Go Away
Solid State Drives (SSDs) -What it Takes to Make Data Go Away
Blancco
 
Webinar- Overcoming the Unseen Data Destrution Issues in Solid State Drives
Webinar- Overcoming the Unseen Data Destrution Issues in Solid State DrivesWebinar- Overcoming the Unseen Data Destrution Issues in Solid State Drives
Webinar- Overcoming the Unseen Data Destrution Issues in Solid State Drives
Blancco
 
Security Regulations & Guidelines: Is Your Business on the Path to Compliance?
Security Regulations & Guidelines:  Is Your Business on the Path to Compliance? Security Regulations & Guidelines:  Is Your Business on the Path to Compliance?
Security Regulations & Guidelines: Is Your Business on the Path to Compliance?
Blancco
 
Data Sanitization: When, Why & How
Data Sanitization: When, Why & How Data Sanitization: When, Why & How
Data Sanitization: When, Why & How
Blancco
 
Data erasure's role in limiting cyber attacks
Data erasure's role in limiting cyber attacksData erasure's role in limiting cyber attacks
Data erasure's role in limiting cyber attacks
Blancco
 
What One Digital Forensics Expert Found on Hundreds of Hard Drives, iPhones a...
What One Digital Forensics Expert Found on Hundreds of Hard Drives, iPhones a...What One Digital Forensics Expert Found on Hundreds of Hard Drives, iPhones a...
What One Digital Forensics Expert Found on Hundreds of Hard Drives, iPhones a...
Blancco
 

More from Blancco (10)

Making the Case- Blancco Data Center Eraser Solution
Making the Case- Blancco Data Center Eraser Solution Making the Case- Blancco Data Center Eraser Solution
Making the Case- Blancco Data Center Eraser Solution
 
EU GDPR- The Countdown to Compliance, Research Study Highlights
EU GDPR- The Countdown to Compliance, Research Study Highlights EU GDPR- The Countdown to Compliance, Research Study Highlights
EU GDPR- The Countdown to Compliance, Research Study Highlights
 
IAPP Canada Privacy Symposium- "Data Retention Is a Team Sport: How to Get It...
IAPP Canada Privacy Symposium- "Data Retention Is a Team Sport: How to Get It...IAPP Canada Privacy Symposium- "Data Retention Is a Team Sport: How to Get It...
IAPP Canada Privacy Symposium- "Data Retention Is a Team Sport: How to Get It...
 
Data Governance in the Enterprise: Highlights from Our Research Report
Data Governance in the Enterprise: Highlights from Our Research Report Data Governance in the Enterprise: Highlights from Our Research Report
Data Governance in the Enterprise: Highlights from Our Research Report
 
Solid State Drives (SSDs) -What it Takes to Make Data Go Away
Solid State Drives (SSDs) -What it Takes to Make Data Go AwaySolid State Drives (SSDs) -What it Takes to Make Data Go Away
Solid State Drives (SSDs) -What it Takes to Make Data Go Away
 
Webinar- Overcoming the Unseen Data Destrution Issues in Solid State Drives
Webinar- Overcoming the Unseen Data Destrution Issues in Solid State DrivesWebinar- Overcoming the Unseen Data Destrution Issues in Solid State Drives
Webinar- Overcoming the Unseen Data Destrution Issues in Solid State Drives
 
Security Regulations & Guidelines: Is Your Business on the Path to Compliance?
Security Regulations & Guidelines:  Is Your Business on the Path to Compliance? Security Regulations & Guidelines:  Is Your Business on the Path to Compliance?
Security Regulations & Guidelines: Is Your Business on the Path to Compliance?
 
Data Sanitization: When, Why & How
Data Sanitization: When, Why & How Data Sanitization: When, Why & How
Data Sanitization: When, Why & How
 
Data erasure's role in limiting cyber attacks
Data erasure's role in limiting cyber attacksData erasure's role in limiting cyber attacks
Data erasure's role in limiting cyber attacks
 
What One Digital Forensics Expert Found on Hundreds of Hard Drives, iPhones a...
What One Digital Forensics Expert Found on Hundreds of Hard Drives, iPhones a...What One Digital Forensics Expert Found on Hundreds of Hard Drives, iPhones a...
What One Digital Forensics Expert Found on Hundreds of Hard Drives, iPhones a...
 

Recently uploaded

Meas_Dylan_DMBS_PB1_2024-05XX_Revised.pdf
Meas_Dylan_DMBS_PB1_2024-05XX_Revised.pdfMeas_Dylan_DMBS_PB1_2024-05XX_Revised.pdf
Meas_Dylan_DMBS_PB1_2024-05XX_Revised.pdf
dylandmeas
 
Introduction to Amazon company 111111111111
Introduction to Amazon company 111111111111Introduction to Amazon company 111111111111
Introduction to Amazon company 111111111111
zoyaansari11365
 
Improving profitability for small business
Improving profitability for small businessImproving profitability for small business
Improving profitability for small business
Ben Wann
 
India Orthopedic Devices Market: Unlocking Growth Secrets, Trends and Develop...
India Orthopedic Devices Market: Unlocking Growth Secrets, Trends and Develop...India Orthopedic Devices Market: Unlocking Growth Secrets, Trends and Develop...
India Orthopedic Devices Market: Unlocking Growth Secrets, Trends and Develop...
Kumar Satyam
 
falcon-invoice-discounting-a-premier-platform-for-investors-in-india
falcon-invoice-discounting-a-premier-platform-for-investors-in-indiafalcon-invoice-discounting-a-premier-platform-for-investors-in-india
falcon-invoice-discounting-a-premier-platform-for-investors-in-india
Falcon Invoice Discounting
 
Discover the innovative and creative projects that highlight my journey throu...
Discover the innovative and creative projects that highlight my journey throu...Discover the innovative and creative projects that highlight my journey throu...
Discover the innovative and creative projects that highlight my journey throu...
dylandmeas
 
Unveiling the Secrets How Does Generative AI Work.pdf
Unveiling the Secrets How Does Generative AI Work.pdfUnveiling the Secrets How Does Generative AI Work.pdf
Unveiling the Secrets How Does Generative AI Work.pdf
Sam H
 
anas about venice for grade 6f about venice
anas about venice for grade 6f about veniceanas about venice for grade 6f about venice
anas about venice for grade 6f about venice
anasabutalha2013
 
3.0 Project 2_ Developing My Brand Identity Kit.pptx
3.0 Project 2_ Developing My Brand Identity Kit.pptx3.0 Project 2_ Developing My Brand Identity Kit.pptx
3.0 Project 2_ Developing My Brand Identity Kit.pptx
tanyjahb
 
What is the TDS Return Filing Due Date for FY 2024-25.pdf
What is the TDS Return Filing Due Date for FY 2024-25.pdfWhat is the TDS Return Filing Due Date for FY 2024-25.pdf
What is the TDS Return Filing Due Date for FY 2024-25.pdf
seoforlegalpillers
 
Business Valuation Principles for Entrepreneurs
Business Valuation Principles for EntrepreneursBusiness Valuation Principles for Entrepreneurs
Business Valuation Principles for Entrepreneurs
Ben Wann
 
CADAVER AS OUR FIRST TEACHER anatomt in your.pptx
CADAVER AS OUR FIRST TEACHER anatomt in your.pptxCADAVER AS OUR FIRST TEACHER anatomt in your.pptx
CADAVER AS OUR FIRST TEACHER anatomt in your.pptx
fakeloginn69
 
Pitch Deck Teardown: RAW Dating App's $3M Angel deck
Pitch Deck Teardown: RAW Dating App's $3M Angel deckPitch Deck Teardown: RAW Dating App's $3M Angel deck
Pitch Deck Teardown: RAW Dating App's $3M Angel deck
HajeJanKamps
 
Accpac to QuickBooks Conversion Navigating the Transition with Online Account...
Accpac to QuickBooks Conversion Navigating the Transition with Online Account...Accpac to QuickBooks Conversion Navigating the Transition with Online Account...
Accpac to QuickBooks Conversion Navigating the Transition with Online Account...
PaulBryant58
 
Cracking the Workplace Discipline Code Main.pptx
Cracking the Workplace Discipline Code Main.pptxCracking the Workplace Discipline Code Main.pptx
Cracking the Workplace Discipline Code Main.pptx
Workforce Group
 
Buy Verified PayPal Account | Buy Google 5 Star Reviews
Buy Verified PayPal Account | Buy Google 5 Star ReviewsBuy Verified PayPal Account | Buy Google 5 Star Reviews
Buy Verified PayPal Account | Buy Google 5 Star Reviews
usawebmarket
 
PriyoShop Celebration Pohela Falgun Mar 20, 2024
PriyoShop Celebration Pohela Falgun Mar 20, 2024PriyoShop Celebration Pohela Falgun Mar 20, 2024
PriyoShop Celebration Pohela Falgun Mar 20, 2024
PriyoShop.com LTD
 
Role of Remote Sensing and Monitoring in Mining
Role of Remote Sensing and Monitoring in MiningRole of Remote Sensing and Monitoring in Mining
Role of Remote Sensing and Monitoring in Mining
Naaraayani Minerals Pvt.Ltd
 
Memorandum Of Association Constitution of Company.ppt
Memorandum Of Association Constitution of Company.pptMemorandum Of Association Constitution of Company.ppt
Memorandum Of Association Constitution of Company.ppt
seri bangash
 
Putting the SPARK into Virtual Training.pptx
Putting the SPARK into Virtual Training.pptxPutting the SPARK into Virtual Training.pptx
Putting the SPARK into Virtual Training.pptx
Cynthia Clay
 

Recently uploaded (20)

Meas_Dylan_DMBS_PB1_2024-05XX_Revised.pdf
Meas_Dylan_DMBS_PB1_2024-05XX_Revised.pdfMeas_Dylan_DMBS_PB1_2024-05XX_Revised.pdf
Meas_Dylan_DMBS_PB1_2024-05XX_Revised.pdf
 
Introduction to Amazon company 111111111111
Introduction to Amazon company 111111111111Introduction to Amazon company 111111111111
Introduction to Amazon company 111111111111
 
Improving profitability for small business
Improving profitability for small businessImproving profitability for small business
Improving profitability for small business
 
India Orthopedic Devices Market: Unlocking Growth Secrets, Trends and Develop...
India Orthopedic Devices Market: Unlocking Growth Secrets, Trends and Develop...India Orthopedic Devices Market: Unlocking Growth Secrets, Trends and Develop...
India Orthopedic Devices Market: Unlocking Growth Secrets, Trends and Develop...
 
falcon-invoice-discounting-a-premier-platform-for-investors-in-india
falcon-invoice-discounting-a-premier-platform-for-investors-in-indiafalcon-invoice-discounting-a-premier-platform-for-investors-in-india
falcon-invoice-discounting-a-premier-platform-for-investors-in-india
 
Discover the innovative and creative projects that highlight my journey throu...
Discover the innovative and creative projects that highlight my journey throu...Discover the innovative and creative projects that highlight my journey throu...
Discover the innovative and creative projects that highlight my journey throu...
 
Unveiling the Secrets How Does Generative AI Work.pdf
Unveiling the Secrets How Does Generative AI Work.pdfUnveiling the Secrets How Does Generative AI Work.pdf
Unveiling the Secrets How Does Generative AI Work.pdf
 
anas about venice for grade 6f about venice
anas about venice for grade 6f about veniceanas about venice for grade 6f about venice
anas about venice for grade 6f about venice
 
3.0 Project 2_ Developing My Brand Identity Kit.pptx
3.0 Project 2_ Developing My Brand Identity Kit.pptx3.0 Project 2_ Developing My Brand Identity Kit.pptx
3.0 Project 2_ Developing My Brand Identity Kit.pptx
 
What is the TDS Return Filing Due Date for FY 2024-25.pdf
What is the TDS Return Filing Due Date for FY 2024-25.pdfWhat is the TDS Return Filing Due Date for FY 2024-25.pdf
What is the TDS Return Filing Due Date for FY 2024-25.pdf
 
Business Valuation Principles for Entrepreneurs
Business Valuation Principles for EntrepreneursBusiness Valuation Principles for Entrepreneurs
Business Valuation Principles for Entrepreneurs
 
CADAVER AS OUR FIRST TEACHER anatomt in your.pptx
CADAVER AS OUR FIRST TEACHER anatomt in your.pptxCADAVER AS OUR FIRST TEACHER anatomt in your.pptx
CADAVER AS OUR FIRST TEACHER anatomt in your.pptx
 
Pitch Deck Teardown: RAW Dating App's $3M Angel deck
Pitch Deck Teardown: RAW Dating App's $3M Angel deckPitch Deck Teardown: RAW Dating App's $3M Angel deck
Pitch Deck Teardown: RAW Dating App's $3M Angel deck
 
Accpac to QuickBooks Conversion Navigating the Transition with Online Account...
Accpac to QuickBooks Conversion Navigating the Transition with Online Account...Accpac to QuickBooks Conversion Navigating the Transition with Online Account...
Accpac to QuickBooks Conversion Navigating the Transition with Online Account...
 
Cracking the Workplace Discipline Code Main.pptx
Cracking the Workplace Discipline Code Main.pptxCracking the Workplace Discipline Code Main.pptx
Cracking the Workplace Discipline Code Main.pptx
 
Buy Verified PayPal Account | Buy Google 5 Star Reviews
Buy Verified PayPal Account | Buy Google 5 Star ReviewsBuy Verified PayPal Account | Buy Google 5 Star Reviews
Buy Verified PayPal Account | Buy Google 5 Star Reviews
 
PriyoShop Celebration Pohela Falgun Mar 20, 2024
PriyoShop Celebration Pohela Falgun Mar 20, 2024PriyoShop Celebration Pohela Falgun Mar 20, 2024
PriyoShop Celebration Pohela Falgun Mar 20, 2024
 
Role of Remote Sensing and Monitoring in Mining
Role of Remote Sensing and Monitoring in MiningRole of Remote Sensing and Monitoring in Mining
Role of Remote Sensing and Monitoring in Mining
 
Memorandum Of Association Constitution of Company.ppt
Memorandum Of Association Constitution of Company.pptMemorandum Of Association Constitution of Company.ppt
Memorandum Of Association Constitution of Company.ppt
 
Putting the SPARK into Virtual Training.pptx
Putting the SPARK into Virtual Training.pptxPutting the SPARK into Virtual Training.pptx
Putting the SPARK into Virtual Training.pptx
 

Toronto Event- How to Protect Data Throughout Its Lifecycle

  • 1. Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2017 Blancco Oy Ltd. All rights reserved. Data Erasure Management: How to Protect Data throughout its Lifecycle
  • 2. Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2017 Blancco Oy Ltd. All rights reserved. Today’s Agenda 2 12.00 – 1.00 Registration 1.00 – 1.15 Official Welcome, Christopher Eeg 1.15 – 1.30 Canadian Market / Industry Overview, James Martens 1.30 – 2.15 Introduction to Data Erasure Management, Christopher Eeg 2.15 – 3.00 Break / Product Demonstrations, Omi Malzai 3.00 – 3.45 Active Erasure Solutions, Use Cases & What the Future Holds, Fredrik Forslund 3.45 – 4.00 Closing Remarks / Q&A, Christopher Eeg 4.00 – 6.00 Networking Drinks / Product Demonstrations
  • 3. Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2017 Blancco Oy Ltd. All rights reserved. Welcome! Christopher Eeg, Managing Director, Canada
  • 4. Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2017 Blancco Oy Ltd. All rights reserved. Who you are What your Co. Does What You Do Something Unique
  • 5. Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2017 Blancco Oy Ltd. All rights reserved. Canadian Market Industry Overview James Martens, Solutions Specialist
  • 6. Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2017 Blancco Oy Ltd. All rights reserved. 6 • Terms and Definitions • Policies and Standards • Editable Policies and Templates • Research Studies • Whitepapers https://www.datasanitization.org/
  • 7. Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2017 Blancco Oy Ltd. All rights reserved. Rising Pressure • Teams – IT Security – IT Audit and Compliance – Risk Management – Privacy • Industries – Healthcare and Finance – Data Centers – Government – Managed Service Providers – System Integrators
  • 8. Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2017 Blancco Oy Ltd. All rights reserved. Industry Changes • Consolidation of ITADs • Massive increase in mobile phones processed • Outsource of risk and operations to MSPs • Increased virtualization • Complexity of SANs • Complexity of Policies and Regulations
  • 9. Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2017 Blancco Oy Ltd. All rights reserved. Complicated landscape challenges made easy 9 Complicated environment due to layers of compliance across a variety of asset types Data Erasure Management During-Life Hardware + Data Erasure End-of-Life Hardware + Data Erasure Risk Management Security Policies Industry Specific Policies Federal Legislation International Legislation During Life Data Erasure
  • 10. Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2017 Blancco Oy Ltd. All rights reserved. Global & Regional Data Protection Laws & Standards Singapore fined an organization for not having a Data Protection Officer. Japan: Protection of Personal Information and the Right to Erasure PCI DSS, a Global Standard, requiring policies and procedures to remove any stored data Security Frameworks & Guidelines, including NIST SP 800-88r1 & ISO 270001 sensitive data be securely overwritten prior to disposal or re-use 100+ Countries with Data Protection Laws 1998 1 111 2018 Number of data- protection laws: EU General Data Protection Regulation: Right to be Forgotten 27,000 new Data Protection Officers needed FINES - Non-Compliance could result in up to 4% of turnover OR €20 MM – whatever is GREATER! ANY EU citizen can demand their records be expunged – and the company must provide proof The EU will adopt GDPR by May 2018 Regulations are here to stay – and growing. 10
  • 11. Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2017 Blancco Oy Ltd. All rights reserved. Mr. Daniel Therrien – Federal Privacy Commissioner “I have further urged Parliamentarians to give serious consideration to reviewing any gaps that may exist between Canadian privacy law and European law, including differences in the enforcement powers of data protection authorities and the right-to-be-forgotten, which is included in the EUGDPR” We’re trying to use 20th Century tools to deal with 21st Century privacy problems and it’s clear those tools are increasingly insufficient
  • 12. Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2017 Blancco Oy Ltd. All rights reserved. Protection of privacy and personal data in the cloud Security controls for cloud computing Right to be Forgotten and to Erasure, May 2018 Increasing Regulatory and Policy Pressure 12
  • 13. Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2017 Blancco Oy Ltd. All rights reserved. ISO Security Standards impacting all large organizations Includes instructions on the following: • Top management shall implement the information security policy themselves. • The policy must ensure that all relevant risks are addressed. • Internal audits should regularly verify that all risks are addressed and operational processes are in place. “All items of equipment containing storage media shall be verified to ensure that any sensitive data and licensed software has been removed or securely overwritten prior to disposal or re-use”.
  • 14. Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2017 Blancco Oy Ltd. All rights reserved. Introduction to Data Erasure Management Christopher Eeg, Managing Director, Canada
  • 15. Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2017 Blancco Oy Ltd. All rights reserved. #modernreality #AcrossAllPlatforms #DifferentEra WE LIVE IN AN ERA THAT DEMANDS 100% DATA PROTECTION 15
  • 16. Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2017 Blancco Oy Ltd. All rights reserved. 1990’s A SHIFT IN TECHNOLOGY 16 TODAY #ComplexDemands SSD’s, NVMEs, Hybrid Drives.
  • 17. Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2017 Blancco Oy Ltd. All rights reserved. The amount of data you will be responsible to secure continues to rise… 17 2009 2010 2011 2012 2013 2014 2015 2016 2017 40,000 (Exabytes) 30,000 20,000 10,000 2018 2019 2020 Quantity of Data with Corporate Responsibility: https://www.emc.com/collateral/analyst-reports/idc-the-digital-universe-in-2020.pdf
  • 18. Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2017 Blancco Oy Ltd. All rights reserved. TECH SHIFT EXAMPLE - SSD’s
  • 19. Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2017 Blancco Oy Ltd. All rights reserved. A SHIFT IN LEGISLATION #LegislativeChange #Mulit-layered 100+ Countries with Data Protection Laws 1998 1 111 2018 # of data-protection laws:
  • 20. Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2017 Blancco Oy Ltd. All rights reserved. PRIVACY Not Fear and Worry WHAT PEOPLE EXPECT HAS CHANGED FOR GOOD #NewDemands #FailureIsNotAnOption CONSTANT IMPROVEMENT Not Complacency ZERO BREACHES Not Failed GAP Analysis INDUSTRY BEST PRACTICES Not Legacy Processes/Policies
  • 21. Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2017 Blancco Oy Ltd. All rights reserved. Data sanitization needs to become a bigger and more urgent priority within the IT security industry. 21 - Paul Henry, Information Security & Forensics Expert #DoDataRight
  • 22. Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2017 Blancco Oy Ltd. All rights reserved.
  • 23. Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2017 Blancco Oy Ltd. All rights reserved. GARTNER QUOTE 23 “Growing concerns about data privacy and security, leakage, regulatory compliance, and the ever-expanding capacity of storage media are making robust data sanitization a core competency for all IT organizations.” Source: Gartner Hype Cycle for Storage Technologies, 2015
  • 24. Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2017 Blancco Oy Ltd. All rights reserved. IT professionals don’t always know right from wrong when it comes to data security. 24 Believe files are permanently gone once they’ve emptied the Recycle Bin on their computers/ laptops. Believe performing a quick format or reformatting an entire drive permanently erases data so it can never be recovered. Hit the ‘delete’ button and/or drag files to Recycle Bin on computers/laptops to get rid of files on a regular basis – ranging from 6-10 times a day to once a week.
  • 25. Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2017 Blancco Oy Ltd. All rights reserved. How Organizations Manage End-of-Life Data Today 25 Insecure & Recoverable Data Secure & Reliable Secure & Reliable
  • 26. Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2017 Blancco Oy Ltd. All rights reserved. Suffer from data breaches mostly in: SecurityScorecard, 2016 Financial Industry Cybersecurity Report Publicly Disclosed Data Breaches 2015-2016 Servers Virtual Machines Desktop Computers
  • 27. Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2017 Blancco Oy Ltd. All rights reserved. 200 used hard disk drives and SSDs from eBay and Craigslist Type of information recovered The Leftovers: A Data Recovery Study, Blancco, 2016
  • 28. Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2017 Blancco Oy Ltd. All rights reserved. Financial Services: Main target for data breaches 28 More than 10 percent of data breaches were financial services organizations. SecurityScorecard, 2016 Percentage of Major Data Breaches by Industry April 2015 – June 2016 % of Total Companies Experienced Data Breaches during June 2015 to April 2016
  • 29. Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2017 Blancco Oy Ltd. All rights reserved. There are two types of companies: Those that have been hacked, and those that will be.” 29 – Robert Mueller, FBI Director, 2012 It is now imperative for businesses to focus on being proactive to minimize the potentially devastating impact of a data breach or a compromise.
  • 30. Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2017 Blancco Oy Ltd. All rights reserved. Summarize • We know there is a demand for 100% Data Protection driven by the Shifts we covered. • We know IT Professionals don’t always get it right. • We know its extremely challenging for InfoSec • We know breaches are not industry specific. We are all vulnerable but Finance Sector were highly targeted. • We know that all organizations have been hacked. ………so what are the consequences of all this?
  • 31. Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2017 Blancco Oy Ltd. All rights reserved. 22 Records compromised every second The consequences are steep – increasing the importance of data erasure. 31 $6M CDN average cost of a data breach $190 CDN Per-record cost of a data breach Source: IBM, 2016
  • 32. Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2017 Blancco Oy Ltd. All rights reserved. Companies meeting this shift head on…..
  • 33. Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2017 Blancco Oy Ltd. All rights reserved. Companies meeting this shift head on…..
  • 34. Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2017 Blancco Oy Ltd. All rights reserved. Companies meeting this shift head on….. Environment Canada
  • 35. Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2017 Blancco Oy Ltd. All rights reserved. Data sanitization is the consistently applied, disciplined process of reliably and completely removing all data from a read/write medium so that it can no longer be read or recovered. What is Data Sanitization? 35 What methods achieve it? Data Sanitization Physical Destruction Cryptographic Erasure Data Erasure
  • 36. Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2017 Blancco Oy Ltd. All rights reserved. • Highest form of securing data within data sanitization • Auditable reporting readily available • Supports environmental initiatives • Allows organizations to retain the resale value of the storage devices • Timelier process than other forms of data sanitization • Policies and processes need to be in place for all data storage devices Data Erasure Data erasure is the software- based method of securely overwriting data from any data storage device. By overwriting the data on the storage device, the data is rendered unrecoverable and achieves data sanitization.
  • 37. Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2017 Blancco Oy Ltd. All rights reserved. Customer Demand The Right to be Forgotten allows EU citizens to request removal of their data from your system. Employee Onboarding & Departures Protect against data breaches at transition points in your hardware’s chain of custody and use. Equipment End-of-Life When a server, storage, device or other IT asset is ready to be reused, resold or discarded – any data must be erased. Data Migration When data is moved from one location to another, from an old server to a new one, or virtual machine to another – the original data location must be erased. Disaster Recovery Exercises Following the successful restoration of production systems, any data left on the recovery disks should be erased. Data End-of-Life When data is no longer needed on any storage device, policies can enforce the erasure of virtual machines, files and folders with automated routines within your existing systems. When to perform data erasure in the enterprise. 37 Cloud Exit When you are exiting a cloud service or a managed services provider is handling your data, data erasure policies must still be enforced to keep control over the data.
  • 38. Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2017 Blancco Oy Ltd. All rights reserved. Take a Layered Data Protection Approach 38 • Most encryption is based on drive encryption and is unlocked when system is being operated. • Encryption key management is always a challenge • Executive travelers can also be ordered to unlock encryption on lap-tops when crossing sensitive borders In a layered approach to data security, attacks that are missed by one defensive layer are defeated by another. Data erasure represents a last line of defense in protecting your data. Encryption is not enough:
  • 39. Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2017 Blancco Oy Ltd. All rights reserved. A Holistic Approach to Data Lifecycle Management 39 We recommend a holistic approach to help you meet data protection standards and regulations by addressing your needs across the entire data lifecycle.
  • 40. Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2017 Blancco Oy Ltd. All rights reserved. Data Erasure Management – easily manage a complete data erasure strategy. Centralized Reporting Flexible Deployment for Global Visibility Customized Reporting of >250 Hardware Details Compatible with ALL Solutions 100% Tamper-Proof & Certified Reporting Traditional Drive Erasure Mobile Device Erasure Active Erasure Mobile Diagnostics Asset Manager and Drive Eraser Mobile Device Eraser File Eraser, Virtual Machine Eraser, LUN Eraser Management Console Data Eraser Management Console available On-Premise and Cloud Accessibility 40
  • 41. Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2017 Blancco Oy Ltd. All rights reserved. 41 Old World RECORDS TextFiles or Spreadsheets Decentralized, unsearchable. SOFTWARE - Multiple uncertified, out of date solutions - Legacy tools or no tools on hand DATA SETS - None #HOUSEINORDER New World RECORDS - Digitally Signed, Tamper Proof - Central Repository, Searchable SOFTWARE - Single, Certified, Industry Std., State of the Art, Enterprise Solution - Right tools for the right job DATA SETS - Failure rates, costs to org per drive manufacturer, RMA savings calculable,
  • 42. Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2017 Blancco Oy Ltd. All rights reserved. Prove Compliance with Auditors According to the Cloud Security Alliance, falls to “…the provider to keep that data secure, and when it is deleted, the provider should ensure (or be able to prove) that it is permanently destroyed.”
  • 43. Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2017 Blancco Oy Ltd. All rights reserved. The Polish Internal Security AgencySwedish Armed Forces Common Criteria (ISO15408) Netherlands Comms Security Agency NATO UK Comms Electronic Security Group German BSI Certification Sécurité de Premier Niveau USA Department of DefenseTüV-SüD UK Defense INFOSEC Norwegian National Security Authority Japan’s Refurb. IT Equipment AssociationCzech NSA National Assoc. for Information Destruction UK Asset Disposal & Information Security Alliance Netherlands Comms Security Agency We have the certifications to prove our solutions meet highest standards. 43
  • 44. Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2017 Blancco Oy Ltd. All rights reserved. Because the work is automated, we managed to reduce the human error associated with manual operations and release resources for other document creation and in-house audits. I would say that management of data deletion now requires about a sixth of the man-hours that it used to, so we have managed to improve efficiency.” – Hiroki Uno, Business Innovation Partner, Samsung Japan
  • 45. Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2017 Blancco Oy Ltd. All rights reserved. The Blancco Data Eraser solutions, coupled with their consulting services, have become invaluable tools for us to not only securely erase data from IT assets when they reach end-of-life, but also to provide us with the ongoing guidance and recommendations ….. One of the most valuable components of Blancco’s offering is the ability to receive digitally signed, tamper-proof erasure reports. These certificates allow us to increase visibility and monitoring of data erasures and provide the necessary audit trail for regulatory compliance with data protection laws and industry guidelines, such as the Philippines National Privacy Act, PCI DSS and ISO 27001.” – Anton Bonifacio, CISO, Globe Telecom
  • 46. Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2017 Blancco Oy Ltd. All rights reserved. Time for a break! Please take a moment to refresh yourselves!
  • 47. Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2017 Blancco Oy Ltd. All rights reserved. Data Erasure Demonstrations Omi Malzai, Technical Support Engineer, Canada
  • 48. Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2017 Blancco Oy Ltd. All rights reserved. DEMONSTRATION • Erasure Options • Local • Remote • Boot Options • PXE (Network) • USB • License Options • BMC • HASP • Erasure • iOS • Android • Diagnostics • 40+ diagnostic tests • Hardware Appliances • Array Server Eraser • 12 Bay Drive Enclosure
  • 49. Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2017 Blancco Oy Ltd. All rights reserved. Active Erasure Solutions, Use Cases & What the Future Holds Fredrik Forslund, Director, Cloud & Data Center Erasure Solutions
  • 50. Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2017 Blancco Oy Ltd. All rights reserved. My Content- your choice! 50 • ISO and regulation in more detail, EUGDPR example • Trends in the global industry • Real use case examples – best practice
  • 51. Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2017 Blancco Oy Ltd. All rights reserved. More on regulations and standards Image Credit: Unlocked/NeweggBlancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2018 Blancco Oy Ltd. All rights reserved.
  • 52. Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2017 Blancco Oy Ltd. All rights reserved. Data Protection regulation and requirements Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2018 Blancco Oy Ltd. All rights reserved. State / Local
  • 53. Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2017 Blancco Oy Ltd. All rights reserved. Storage Security Needs Evidence of Sanitization 53 Proof of sanitization takes on at least two forms: 1. an audit log trail and 2. a certificate of sanitization The controller shall have the obligation to erase personal data without undue delay Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2018 Blancco Oy Ltd. All rights reserved.
  • 54. Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2017 Blancco Oy Ltd. All rights reserved. The Right to be Forgotten 54 • Data subject will have the right to obtain from the controller the erasure of personal data concerning him or her • The controller shall have the obligation to erase personal data without undue delay • The controller shall take reasonable steps, including technical measures, to inform controllers of any links to, or copy or replication of, of the data subject’s personal data Article 17 of the new regulation focuses on the right to erasure.
  • 55. Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2017 Blancco Oy Ltd. All rights reserved. Consequences are Steep 55 The greater of €20 million or 4% of global annual turnover Based on several factors:  Whether the infringement was intentional or negligent  Whether the controller or processor took any steps to mitigate the damage  Technical and organizational measures that had been implemented by the controller or processor  Prior infringements by the controller or processor  The degree of cooperation with the regulator  The types of personal data involved  The way the regulator found out about the infringement
  • 56. Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2017 Blancco Oy Ltd. All rights reserved. Protection of privacy and personal data in the cloud - IMPLEMENTED in H2 2014 Includes: • Cloud provider should enable the right to erase personal data. • Cloud provider should securely erase any temporary files in systems. • Cloud provider should ensure that whenever data storage space is re-assigned, previously residing data is not recoverable. ISO Security Standards impacting data centers and cloud providers
  • 57. Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2017 Blancco Oy Ltd. All rights reserved. Newest ISO Recommendations 27040 for storage security on how to erase and when Erase on logical and virtual level: • “logical sanitization (see 6.8.1.3) should be used to clear virtualized storage, especially when the actual storage devices and media cannot be determined.” Also an addition to Encryption: • “Sanitization of media at end-of-use situations is recommended, even when using encryption methods.”
  • 58. Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2017 Blancco Oy Ltd. All rights reserved. A thorough documentation is required: • Organizations should maintain a record of sanitization activities to document what media were sanitized, when, how they were sanitized, and the final disposition of the media. Often when an organization is suspected of losing control of its information, it is because of inadequate record keeping of media sanitization. Proof of sanitization takes on at least two forms: 1. an audit log trail and 2. a certificate of sanitization. Newest ISO Recommendations 27040 for storage security on how to erase and when
  • 59. Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2017 Blancco Oy Ltd. All rights reserved. Current Trends Image Credit: Unlocked/NeweggBlancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2018 Blancco Oy Ltd. All rights reserved.
  • 60. Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2017 Blancco Oy Ltd. All rights reserved. Security vs. Operations Efficient & clean operations for end-of-life Security & compliance demands for data across the entire lifecycle. Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2018 Blancco Oy Ltd. All rights reserved.
  • 61. Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2017 Blancco Oy Ltd. All rights reserved. Data Center Consolidation Stat https://federaltechnologyinsider.com/data-center-optimization-initiative-consolidation-cloud/Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2018 Blancco Oy Ltd. All rights reserved. OMB and Federal Information Technology Acquisition Reform Act (FITARA) guidelines state we should expect 60% of non-tiered data centers closed and 25% of tiered data centers consolidated by 2018. 60% of non-tiered data centers will close 25% of tiered data centers will consolidate
  • 62. Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2017 Blancco Oy Ltd. All rights reserved. Gartner recently predicted that by 2021, 50 percent of data centers will use SSDs for high-performance computing and big data workloads – up from less than 10 percent today. SSD NVMes Become the Interface for Enterprise Drives 50% of data centers will use SSDs by 2021
  • 63. Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2017 Blancco Oy Ltd. All rights reserved. Data Relocation Needs to be Secure and Efficient Gartner suggests that 70% of data center migrations will experience significant time delays or even unplanned downtime, largely due to improper planning. 70% of data center migrations will experience delays
  • 64. Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2017 Blancco Oy Ltd. All rights reserved. Mitigate Risks Posed by Dark Data According to Veritas Global Databerg Report, 85% of Stored Data Is Either Dark or Redundant, Obsolete, or Trivial (ROT)
  • 65. Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2017 Blancco Oy Ltd. All rights reserved. What are the Negatives Associated with Hoarding Data? 65 • Cost • Compliance • Increased attack surface • Readiness to respond to customer request
  • 66. Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2017 Blancco Oy Ltd. All rights reserved. Calculate Your Customers’ Cost Savings 66 Cost of Cloud Storage Vs. Data Erasure 350
  • 67. Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2017 Blancco Oy Ltd. All rights reserved. 67
  • 68. Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2017 Blancco Oy Ltd. All rights reserved. 68 Data Retention!
  • 69. Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2017 Blancco Oy Ltd. All rights reserved. What methods achieve it? Data Sanitization Data Erasure Cryptographic Erasure Data Destruction Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2018 Blancco Oy Ltd. All rights reserved.
  • 70. Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2017 Blancco Oy Ltd. All rights reserved. To achieve data sanitization, these methods must: 1. Degaussing 2. and/or Mechanical Shredders 3. Audit Report 1. Select a specific standard 2. Verify the overwriting methodology removed data across the entire device 3. Produce tamper-proof certificate 1. Find and overwrite crypto keys and password 2. Verify the data encrypted and the previous key unrecoverable 3. Produce a tamper-proof certificate Physical Destruction Cryptographic Erasure Data Erasure
  • 71. Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2017 Blancco Oy Ltd. All rights reserved. 71
  • 72. Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2017 Blancco Oy Ltd. All rights reserved. Use Cases Image Credit: Unlocked/NeweggBlancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2018 Blancco Oy Ltd. All rights reserved.
  • 73. Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2017 Blancco Oy Ltd. All rights reserved. Data Center Use Cases - Two Dimensions • Data migration • Customer Exit- Cloud Exit • VM life cycles • Repurposing system storage • Temporary data • Data retention policies Erase Data from an operational environment • Data Center decommissioning • Tech refresh • End of lease • Return test systems • Break fix (RMA) Erase entire systems or servers on drive level • Break fix (RMA) • Repurposing system storage • Data Center decommissioning 73
  • 74. Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2017 Blancco Oy Ltd. All rights reserved. Use case Personal and confidential
  • 75. Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2017 Blancco Oy Ltd. All rights reserved. Customer Infrastructure: 12 Data centers (Colo) around the world Mostly using leased HP and Dell HW, but also EMC and Oracle
  • 76. Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2017 Blancco Oy Ltd. All rights reserved. Drives are pulled out of servers when they fail. Servers and drives were piling up because of their previous erasure solution wasn’t working well. The old solution wasn’t approved for SSDs either. When the server lease (2-3yr) ends, they are disconnected and must be erased before returning. The problem:
  • 77. Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2017 Blancco Oy Ltd. All rights reserved. Portable Blancco BMC / B5 PXE server laptop • Management Console • Blancco 5 Server • PXE boot server • All preinstalled on a laptop provided by Blancco Professional Services • 1-2 laptops per DC 1. Connect BMC laptop and servers to same network switch 2. Connect power 3. Connect KVM 4. PXE boot 5. Erase 6. Send reports Solution:
  • 78. Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2017 Blancco Oy Ltd. All rights reserved. 1st day after delivering and training the product: The customer’s Data Center Engineers started erasing whole arrays of servers using the BMC laptop. In this picture, the BMC/PXE laptop and the network switch are moved around the DC on a cart. The selected target servers were connected to connected the same switch with the BMC laptop. A KVM crash cart was used to monitor and control the erasures.
  • 79. Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2017 Blancco Oy Ltd. All rights reserved. Custom 3U appliance for loose drive erasure • Based on 2U E2400 HW • B5HW software • Mounted to customer’s old EPS rack • Connected to Dell, EMC and EPS SATA/SAS and FC disk enclosures 1. Plug in the loose drives 2. Erase 3. Repeat Hardware Solution
  • 80. Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2017 Blancco Oy Ltd. All rights reserved. Server decommissioning example for a Fortune 50 company: • 856 Servers Decommissioned Overnight • Each server had 6x1TB SATA HDD. Total 5117 drives • Erasure time was 5-8 hours. Total time from start (boot up) to finish (report collection): 10 hours • Erasure method was NIST 800-88 Clear 80
  • 81. Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2017 Blancco Oy Ltd. All rights reserved. Best Practice: Implement a scalable, automated process to decrease time and resources needed Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2018 Blancco Oy Ltd. All rights reserved.
  • 82. Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2017 Blancco Oy Ltd. All rights reserved. Common challenge: Sanitizing advanced media, like NVMe SSDs Image Credit: Unlocked/NeweggBlancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2018 Blancco Oy Ltd. All rights reserved.
  • 83. Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2017 Blancco Oy Ltd. All rights reserved.
  • 84. Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2017 Blancco Oy Ltd. All rights reserved.
  • 85. Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2017 Blancco Oy Ltd. All rights reserved.
  • 86. Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2017 Blancco Oy Ltd. All rights reserved. Challenges with SSD Erasure 86 Blancco Patented Solution 1. Freeze lock Removal 2. Proprietary Erasure Sequence i. Combines SW overwrite and FW commands 3. Erasure Validation i. Identifies malfunctions and preformed processes SSD Challenges • Freeze Locks • Wear Leveling • Data Compression • Unreliable Firmware Commands • Corrupted Blocks • Secure-Erase
  • 87. Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2017 Blancco Oy Ltd. All rights reserved. Original Process: • Failing HDDS hotswapped for new ones. • Had 28 day SLA w/ Mft. & paying large fines per drive as no way to ensure erasure. • Up to 85% of drives still functional. No return req’d. Improved process: • 14 Blancco H/W appliances delivered to 14 DCs. • Saves UBS $3 Million Euro annually in fines. Business case example loose drives (RMA/break fixes) UBS Break-fix processes
  • 88. Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2017 Blancco Oy Ltd. All rights reserved. ROI - RMAAnalysis on RMA savings from another Financial Institution of similar size
  • 89. Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2017 Blancco Oy Ltd. All rights reserved. Active Erasure: Sanitization process in a live environment Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2018 Blancco Oy Ltd. All rights reserved.
  • 90. Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2017 Blancco Oy Ltd. All rights reserved. “As a Datacenter and Cloud solution provider, Telehouse is committed to providing strong guaranty to its customer. We chose a software-based data erasure process as irrefutable evidence that we comply with EU regulation when erasing customer data. More than a technical solution, the software erasure process allows us to deliver TRUST to our customers. This is the most valuable asset in our business field, on top of providing strong evidence for our security certifications like ISO 27001 or PCI DSS”. – Benoît Mercier, Directeur ICT Solutions, Telehouse Europe
  • 91. Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2017 Blancco Oy Ltd. All rights reserved. On DemandErase VMs through Command Line Interface – manually performed and/or scripted by the administrator VMware Hypervisor ESX and ESXi with VMFS, versions 4, 5 and 6.
  • 92. Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2017 Blancco Oy Ltd. All rights reserved. Logical Level Erasure: for Unix and Windows Environments 92
  • 93. Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2017 Blancco Oy Ltd. All rights reserved. File Level- Use Case 93 • Requirement  Secure data erasure for customer exit  Regulatory need to remove customer details using a certified solution  Customer details on SMB shares, local & hosted email & paper • How  Discovery using standard MS Windows tools  Blancco File Eraser erases mailboxes & files, “freespace” tool  Secure report generated for every erasure performed • Timeline  Sales cycle approx. 2 weeks. Execution of project 2 days on site
  • 94. Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2017 Blancco Oy Ltd. All rights reserved. Recovery of Virtual Machines is an established practice
  • 95. Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2017 Blancco Oy Ltd. All rights reserved.
  • 96. Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2017 Blancco Oy Ltd. All rights reserved. Closing Remarks Christopher Eeg, Managing Director, Canada