SlideShare a Scribd company logo
Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2017 Blancco Oy Ltd. All rights reserved.
The Top 3 Data Sanitisation
Challenges – And How to
Overcome Them
Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2017 Blancco Oy Ltd. All rights reserved.
Today’s Agenda
2
• Addressing today’s data centre challenges
• Destroy vs. erase – navigating through the sea of grey when it comes
to data protection requirements
• Most common use cases – best practices for audit controls
• Sanitising your SSDs – not all methods are created equal
Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2017 Blancco Oy Ltd. All rights reserved.
Data Centre Consolidation Stat
https://federaltechnologyinsider.com/data-center-optimization-initiative-consolidation-cloud/Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2018 Blancco Oy Ltd. All rights reserved.
OMB and Federal Information Technology Acquisition Reform Act
(FITARA) guidelines state we should expect 60% of non-tiered data centres
closed and 25% of tiered data centers consolidated by 2018.
60%
of non-tiered data
centres will close
25%
of tiered data centress
will consolidate
Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2017 Blancco Oy Ltd. All rights reserved.
Gartner recently predicted that
by 2021, 50 percent of data
centers will use SSAs for
high-performance computing
and big data workloads – up
from less than 10 percent today.
NVMes Become the Interface for
Enterprise Drives
50%
of data centres will use
SSAs by 2021
Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2017 Blancco Oy Ltd. All rights reserved.
Data Relocation Needs to be
Secure and Efficient
Gartner suggests that 70% of
data center migrations will
experience significant time delays
or even unplanned downtime,
largely due to improper planning.
70%
of data centre migrations
will experience delays
Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2017 Blancco Oy Ltd. All rights reserved.
Let’s hear from you!
6
See note for poll question
to put in ReadyTalk
Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2017 Blancco Oy Ltd. All rights reserved.
Security vs. Operations
Efficient & clean
operations for end-of-life
Security & compliance
demands for data
across the entire
lifecycle.
Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2018 Blancco Oy Ltd. All rights reserved.
Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2017 Blancco Oy Ltd. All rights reserved.
Data Protection in the Data Centre
Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2018 Blancco Oy Ltd. All rights reserved.
Local/National
Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2017 Blancco Oy Ltd. All rights reserved.
Poll Question
9
See note for poll question
to put in ReadyTalk
Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2017 Blancco Oy Ltd. All rights reserved.
Storage Security Needs Evidence
of Sanitisation
10
Proof of sanitisation takes on at
least two forms:
1. an audit log trail and
2. a certificate of sanitisation
The controller shall have the
obligation to erase personal
data without undue delay
Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2018 Blancco Oy Ltd. All rights reserved.
Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2017 Blancco Oy Ltd. All rights reserved.
Poll Question
11
See note for poll question
to put in ReadyTalk
Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2017 Blancco Oy Ltd. All rights reserved.
According to …
What is Data Sanitisation?
Data sanitisation is the consistently applied,
disciplined process of reliably and
completely removing all data from a
read/write medium so that it can no longer be
read or recovered.
Verify
Certify
Select
Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2018 Blancco Oy Ltd. All rights reserved.
Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2017 Blancco Oy Ltd. All rights reserved.
What methods
achieve it?
Data Sanitisation
Data
Erasure
Cryptographic
Erasure
Data
Destruction
Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2018 Blancco Oy Ltd. All rights reserved.
Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2017 Blancco Oy Ltd. All rights reserved.
To achieve data sanitisation, these
methods must:
1. Degaussing
2. and/or Mechanical Shredders
3. Audit Report
1. Select a specific standard
2. Verify the overwriting methodology removed data
across the entire device
3. Produce tamper-proof certificate
1. Find and overwrite crypto keys and password
2. Verify the data encrypted and the previous key
unrecoverable
3. Produce a tamper-proof certificate
Physical
Destruction
Cryptographic
Erasure
Data
Erasure
Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2017 Blancco Oy Ltd. All rights reserved.
Poll Question
15
See note for poll question
to put in ReadyTalk
Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2017 Blancco Oy Ltd. All rights reserved.
or +
Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2018 Blancco Oy Ltd. All rights reserved.
Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2017 Blancco Oy Ltd. All rights reserved.
How Organisations Manage End-of-Life
Data Today
17
Insecure &
Recoverable Data
Secure & Reliable
Secure &
Reliable
Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2017 Blancco Oy Ltd. All rights reserved.
Top 3 Data Sanitisation
Challenges
Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2017 Blancco Oy Ltd. All rights reserved.
Data Centre Use Cases - Two Dimensions
• Data migration
• Customer Exit- Cloud Exit
• VM life cycles
• Repurposing system storage
• Temporary data
• Data retention policies
Erase Data from an operational
environment
• Data Center decommissioning
• Tech refresh
• End of lease
• Return test systems
• Break fix (RMA)
Erase entire systems or servers
on drive level
• Break fix (RMA)
• Repurposing system storage
• Data Centre decommissioning
19
Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2017 Blancco Oy Ltd. All rights reserved.
Challenge #1:
Server decommissioning
manual and time consuming
Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2018 Blancco Oy Ltd. All rights reserved.
Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2017 Blancco Oy Ltd. All rights reserved.
Poll Question
21
See note for poll question
to put in ReadyTalk
Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2017 Blancco Oy Ltd. All rights reserved.
Best Practice:
Implement a scalable, automated
process to decrease time and
resources needed
Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2018 Blancco Oy Ltd. All rights reserved.
Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2017 Blancco Oy Ltd. All rights reserved.
Server decommissioning
example:
• 856 Servers
Decommissioned Overnight
• Each server had 6x1TB SATA
HDD. Total 5117 drives
• Erasure time was 5-8 hours.
Total time from start (boot
up) to finish (report
collection): 10 hours
• Erasure method was NIST
800-88 Clear
23
Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2017 Blancco Oy Ltd. All rights reserved.
Challenge #2:
Sanitising advanced media,
like NVMe
Image Credit: Unlocked/NeweggBlancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2018 Blancco Oy Ltd. All rights reserved.
Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2017 Blancco Oy Ltd. All rights reserved.
Poll Question
25
See note for poll question
to put in ReadyTalk
Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2017 Blancco Oy Ltd. All rights reserved.
Challenges with SSD Erasure
26
Blancco Patented Solution
1. Freeze lock Removal
2. Proprietary Erasure Sequence
i. Combines SW overwrite and FW commands
3. Erasure Validation
i. Identifies malfunctions and preformed processes
SSD Challenges
• Freeze Locks
• Wear Leveling
• Data Compression
• Unreliable Firmware
Commands
• Corrupted Blocks
• Secure-Erase
Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2017 Blancco Oy Ltd. All rights reserved.
Best Practice:
If erasing SSDs, move to an NIST Purge
Standard, if supported by the drive. If not,
fallback should be NIST Clear.
Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2018 Blancco Oy Ltd. All rights reserved.
Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2017 Blancco Oy Ltd. All rights reserved.
Challenge #3:
Sanitisation process
in a live environment
Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2018 Blancco Oy Ltd. All rights reserved.
Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2017 Blancco Oy Ltd. All rights reserved.
Poll Question
29
See note for poll question
to put in ReadyTalk
Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2017 Blancco Oy Ltd. All rights reserved.
Security controls for cloud computing and
protection of personal data in the cloud
30
ISO 27018: Protection of privacy and personal data in the cloud –
IMPLEMENTED in H2 2014
Includes:
• Cloud provider should enable the right to erase personal data.
• Cloud provider should securely erase any temporary files in systems.
• Cloud provider should ensure that whenever data storage space is re-assigned,
previously residing data is not recoverable.
ISO 27017: Security controls for cloud computing
• Estimated to be in place by H1 2015.
• Will affect Cloud Service Providers on an even broader level than the ISO 27018.
Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2017 Blancco Oy Ltd. All rights reserved.
Logical Level Erasure:
for Unix and Windows Environments
31
Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2017 Blancco Oy Ltd. All rights reserved.
What We Do:
About Us
32
Standards
We Support:
Some of
Our Customers:
Erase a
Laptop or Server
Erase
iPhone Devices
Diagnose
iPhone Devices
Erase Secure
Active Files
Erase a
Virtual Machine
Erase a
SAN Server
Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2017 Blancco Oy Ltd. All rights reserved.
We have the certifications to prove our
solutions meet highest standards.
33
The Polish Internal
Security Agency
Common Criteria
(ISO15408)
Swedish Armed
Forces
Netherlands Comms
Security Agency
NATO UK Comms Electronic
Security Group
German BSIUSA Department
of Defense
Certification Sécurité
de Premier Niveau
TüV-SüD UK Defense INFOSEC Norwegian National
Security Authority
Japan’s Refurb. IT
Equipment Association
Czech NSA National Assoc. for
Information Destruction
UK Asset Disposal &
Information Security Alliance
Netherlands Comms
Security Agency
Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2017 Blancco Oy Ltd. All rights reserved.
And help you prove compliance with auditors.
According to the Cloud Security Alliance, falls to “…the provider to keep that data secure,
and when it is deleted, the provider should ensure (or be able to prove) that it is
permanently destroyed.”
Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2017 Blancco Oy Ltd. All rights reserved.
Russ Ernst
VP Product Development
russ.ernst@blancco.com
Matthew Anderson
Global Director – OEM & BD
matthew.anderson@blancco.com
Questions?
Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2018 Blancco Oy Ltd. All rights reserved.
Schedule a Free Strategy Session
https://www.blancco.com/demo/
free-strategy-session-data-center/

More Related Content

What's hot

Dr levitich Consult G Suite for Education
Dr levitich Consult  G Suite for EducationDr levitich Consult  G Suite for Education
Dr levitich Consult G Suite for Education
Dr. Rachael Fisher
 
Acuent Security
Acuent Security Acuent Security
Acuent Security
Stephen Bates
 
GDPR & digital strategy
GDPR & digital strategyGDPR & digital strategy
GDPR & digital strategy
Prof. Jacques Folon (Ph.D)
 
Ben Rothke - Effective Data Destruction Practices
Ben Rothke - Effective Data Destruction PracticesBen Rothke - Effective Data Destruction Practices
Ben Rothke - Effective Data Destruction Practices
Ben Rothke
 
PCI Myths
PCI MythsPCI Myths
PCI Myths
Sasha Nunke
 
Data Protection for Credit Unions
Data Protection for Credit UnionsData Protection for Credit Unions
Data Protection for Credit Unions
Carbonite
 
Scot-Cloud 2015
Scot-Cloud 2015Scot-Cloud 2015
Scot-Cloud 2015
Ray Bugg
 
Securing Your Enterprise Continuous Delivery Pipelines with CA Automation Sol...
Securing Your Enterprise Continuous Delivery Pipelines with CA Automation Sol...Securing Your Enterprise Continuous Delivery Pipelines with CA Automation Sol...
Securing Your Enterprise Continuous Delivery Pipelines with CA Automation Sol...
CA Technologies
 
Cisco brand-language-iabc-houston
Cisco brand-language-iabc-houstonCisco brand-language-iabc-houston
Cisco brand-language-iabc-houston
Emily Murphy
 
The 3 Phased Approach to Data Leakage Prevention (DLP)
The 3 Phased Approach to Data Leakage Prevention (DLP)The 3 Phased Approach to Data Leakage Prevention (DLP)
The 3 Phased Approach to Data Leakage Prevention (DLP)
Kirsty Donovan
 

What's hot (11)

Dr levitich Consult G Suite for Education
Dr levitich Consult  G Suite for EducationDr levitich Consult  G Suite for Education
Dr levitich Consult G Suite for Education
 
Acuent Security
Acuent Security Acuent Security
Acuent Security
 
GDPR & digital strategy
GDPR & digital strategyGDPR & digital strategy
GDPR & digital strategy
 
Ben Rothke - Effective Data Destruction Practices
Ben Rothke - Effective Data Destruction PracticesBen Rothke - Effective Data Destruction Practices
Ben Rothke - Effective Data Destruction Practices
 
PCI Myths
PCI MythsPCI Myths
PCI Myths
 
Webinar Win In Court V3
Webinar Win In Court V3Webinar Win In Court V3
Webinar Win In Court V3
 
Data Protection for Credit Unions
Data Protection for Credit UnionsData Protection for Credit Unions
Data Protection for Credit Unions
 
Scot-Cloud 2015
Scot-Cloud 2015Scot-Cloud 2015
Scot-Cloud 2015
 
Securing Your Enterprise Continuous Delivery Pipelines with CA Automation Sol...
Securing Your Enterprise Continuous Delivery Pipelines with CA Automation Sol...Securing Your Enterprise Continuous Delivery Pipelines with CA Automation Sol...
Securing Your Enterprise Continuous Delivery Pipelines with CA Automation Sol...
 
Cisco brand-language-iabc-houston
Cisco brand-language-iabc-houstonCisco brand-language-iabc-houston
Cisco brand-language-iabc-houston
 
The 3 Phased Approach to Data Leakage Prevention (DLP)
The 3 Phased Approach to Data Leakage Prevention (DLP)The 3 Phased Approach to Data Leakage Prevention (DLP)
The 3 Phased Approach to Data Leakage Prevention (DLP)
 

Similar to [UK & EU Webinar] The Top 3 Data Sanitisation Challenges – And How to Overcome Them

Webinar- Overcoming the Unseen Data Destrution Issues in Solid State Drives
Webinar- Overcoming the Unseen Data Destrution Issues in Solid State DrivesWebinar- Overcoming the Unseen Data Destrution Issues in Solid State Drives
Webinar- Overcoming the Unseen Data Destrution Issues in Solid State Drives
Blancco
 
Why Blancco ?
Why Blancco ?Why Blancco ?
Why Blancco ?
Christophe Elut
 
Delete vs Erase: How Are Companies Wiping Active Files
Delete vs Erase: How Are Companies Wiping Active Files Delete vs Erase: How Are Companies Wiping Active Files
Delete vs Erase: How Are Companies Wiping Active Files
Blancco
 
An Introduction to Live Environment and Cloud Eraser
An Introduction to Live Environment and Cloud EraserAn Introduction to Live Environment and Cloud Eraser
An Introduction to Live Environment and Cloud Eraser
Blancco
 
Upselling and upgrading webinar presentation
Upselling and upgrading webinar presentationUpselling and upgrading webinar presentation
Upselling and upgrading webinar presentation
Stuart Selbst Consulting
 
Cloud Storage: How to Fight Off Data Security Threats & Stay Compliant
Cloud Storage: How to Fight Off Data Security Threats & Stay CompliantCloud Storage: How to Fight Off Data Security Threats & Stay Compliant
Cloud Storage: How to Fight Off Data Security Threats & Stay Compliant
Blancco
 
Designing Cloud Backup to reduce DR downtime for IT Professionals
Designing Cloud Backup to reduce DR downtime for IT ProfessionalsDesigning Cloud Backup to reduce DR downtime for IT Professionals
Designing Cloud Backup to reduce DR downtime for IT Professionals
Storage Switzerland
 
Splunk GDPR Security Roundtable: Zurich - 22 Nov 2017 PT1
Splunk GDPR Security Roundtable: Zurich - 22 Nov 2017 PT1Splunk GDPR Security Roundtable: Zurich - 22 Nov 2017 PT1
Splunk GDPR Security Roundtable: Zurich - 22 Nov 2017 PT1
Splunk
 
Cisco Connect Toronto 2018 an introduction to Cisco kinetic
Cisco Connect Toronto 2018   an introduction to Cisco kineticCisco Connect Toronto 2018   an introduction to Cisco kinetic
Cisco Connect Toronto 2018 an introduction to Cisco kinetic
Cisco Canada
 
Cisco Connect Toronto 2018 an introduction to Cisco kinetic
Cisco Connect Toronto 2018   an introduction to Cisco kineticCisco Connect Toronto 2018   an introduction to Cisco kinetic
Cisco Connect Toronto 2018 an introduction to Cisco kinetic
Cisco Canada
 
Cisco Connect Ottawa 2018 dna assurance shortest path to network innocence
Cisco Connect Ottawa 2018 dna assurance shortest path to network innocenceCisco Connect Ottawa 2018 dna assurance shortest path to network innocence
Cisco Connect Ottawa 2018 dna assurance shortest path to network innocence
Cisco Canada
 
INTRODUCING JASPERSOFT ADVANCED DATA SERVICES: DATA VIRTUALIZATION AT SCALE
INTRODUCING JASPERSOFT ADVANCED DATA SERVICES: DATA VIRTUALIZATION AT SCALEINTRODUCING JASPERSOFT ADVANCED DATA SERVICES: DATA VIRTUALIZATION AT SCALE
INTRODUCING JASPERSOFT ADVANCED DATA SERVICES: DATA VIRTUALIZATION AT SCALE
TIBCO Jaspersoft
 
Blockchain in Retail :Omnichannel retailers can now compete and beat Amazon!
Blockchain in Retail :Omnichannel retailers can now compete and beat Amazon!Blockchain in Retail :Omnichannel retailers can now compete and beat Amazon!
Blockchain in Retail :Omnichannel retailers can now compete and beat Amazon!
Antony Welfare
 
David Noy – Realising the true potential of software-defined storage
David Noy – Realising the true potential of software-defined storageDavid Noy – Realising the true potential of software-defined storage
David Noy – Realising the true potential of software-defined storage
Veritas Technologies LLC
 
Rethinking The Data Warehouse: Emerging Practices and Technologies to Meet To...
Rethinking The Data Warehouse: Emerging Practices and Technologies to Meet To...Rethinking The Data Warehouse: Emerging Practices and Technologies to Meet To...
Rethinking The Data Warehouse: Emerging Practices and Technologies to Meet To...
Senturus
 
4 Smart_Connected_Factory_Slides Francois Briandet PDF.pdf
4 Smart_Connected_Factory_Slides Francois Briandet PDF.pdf4 Smart_Connected_Factory_Slides Francois Briandet PDF.pdf
4 Smart_Connected_Factory_Slides Francois Briandet PDF.pdf
MahdiAjoudanian1
 
Big Data LDN 2017: The New Dominant Companies Are Running on Data
Big Data LDN 2017: The New Dominant Companies Are Running on DataBig Data LDN 2017: The New Dominant Companies Are Running on Data
Big Data LDN 2017: The New Dominant Companies Are Running on Data
Matt Stubbs
 
Big Data LDN 2017: The New Dominant Companies Are Running on Data
Big Data LDN 2017: The New Dominant Companies Are Running on DataBig Data LDN 2017: The New Dominant Companies Are Running on Data
Big Data LDN 2017: The New Dominant Companies Are Running on Data
Matt Stubbs
 
Jeremiah O'Connor & David Maynor - Chasing the Crypto Workshop: Tracking Fina...
Jeremiah O'Connor & David Maynor - Chasing the Crypto Workshop: Tracking Fina...Jeremiah O'Connor & David Maynor - Chasing the Crypto Workshop: Tracking Fina...
Jeremiah O'Connor & David Maynor - Chasing the Crypto Workshop: Tracking Fina...
NoNameCon
 
Cisco Connect Toronto 2018 DNA assurance
Cisco Connect Toronto 2018  DNA assuranceCisco Connect Toronto 2018  DNA assurance
Cisco Connect Toronto 2018 DNA assurance
Cisco Canada
 

Similar to [UK & EU Webinar] The Top 3 Data Sanitisation Challenges – And How to Overcome Them (20)

Webinar- Overcoming the Unseen Data Destrution Issues in Solid State Drives
Webinar- Overcoming the Unseen Data Destrution Issues in Solid State DrivesWebinar- Overcoming the Unseen Data Destrution Issues in Solid State Drives
Webinar- Overcoming the Unseen Data Destrution Issues in Solid State Drives
 
Why Blancco ?
Why Blancco ?Why Blancco ?
Why Blancco ?
 
Delete vs Erase: How Are Companies Wiping Active Files
Delete vs Erase: How Are Companies Wiping Active Files Delete vs Erase: How Are Companies Wiping Active Files
Delete vs Erase: How Are Companies Wiping Active Files
 
An Introduction to Live Environment and Cloud Eraser
An Introduction to Live Environment and Cloud EraserAn Introduction to Live Environment and Cloud Eraser
An Introduction to Live Environment and Cloud Eraser
 
Upselling and upgrading webinar presentation
Upselling and upgrading webinar presentationUpselling and upgrading webinar presentation
Upselling and upgrading webinar presentation
 
Cloud Storage: How to Fight Off Data Security Threats & Stay Compliant
Cloud Storage: How to Fight Off Data Security Threats & Stay CompliantCloud Storage: How to Fight Off Data Security Threats & Stay Compliant
Cloud Storage: How to Fight Off Data Security Threats & Stay Compliant
 
Designing Cloud Backup to reduce DR downtime for IT Professionals
Designing Cloud Backup to reduce DR downtime for IT ProfessionalsDesigning Cloud Backup to reduce DR downtime for IT Professionals
Designing Cloud Backup to reduce DR downtime for IT Professionals
 
Splunk GDPR Security Roundtable: Zurich - 22 Nov 2017 PT1
Splunk GDPR Security Roundtable: Zurich - 22 Nov 2017 PT1Splunk GDPR Security Roundtable: Zurich - 22 Nov 2017 PT1
Splunk GDPR Security Roundtable: Zurich - 22 Nov 2017 PT1
 
Cisco Connect Toronto 2018 an introduction to Cisco kinetic
Cisco Connect Toronto 2018   an introduction to Cisco kineticCisco Connect Toronto 2018   an introduction to Cisco kinetic
Cisco Connect Toronto 2018 an introduction to Cisco kinetic
 
Cisco Connect Toronto 2018 an introduction to Cisco kinetic
Cisco Connect Toronto 2018   an introduction to Cisco kineticCisco Connect Toronto 2018   an introduction to Cisco kinetic
Cisco Connect Toronto 2018 an introduction to Cisco kinetic
 
Cisco Connect Ottawa 2018 dna assurance shortest path to network innocence
Cisco Connect Ottawa 2018 dna assurance shortest path to network innocenceCisco Connect Ottawa 2018 dna assurance shortest path to network innocence
Cisco Connect Ottawa 2018 dna assurance shortest path to network innocence
 
INTRODUCING JASPERSOFT ADVANCED DATA SERVICES: DATA VIRTUALIZATION AT SCALE
INTRODUCING JASPERSOFT ADVANCED DATA SERVICES: DATA VIRTUALIZATION AT SCALEINTRODUCING JASPERSOFT ADVANCED DATA SERVICES: DATA VIRTUALIZATION AT SCALE
INTRODUCING JASPERSOFT ADVANCED DATA SERVICES: DATA VIRTUALIZATION AT SCALE
 
Blockchain in Retail :Omnichannel retailers can now compete and beat Amazon!
Blockchain in Retail :Omnichannel retailers can now compete and beat Amazon!Blockchain in Retail :Omnichannel retailers can now compete and beat Amazon!
Blockchain in Retail :Omnichannel retailers can now compete and beat Amazon!
 
David Noy – Realising the true potential of software-defined storage
David Noy – Realising the true potential of software-defined storageDavid Noy – Realising the true potential of software-defined storage
David Noy – Realising the true potential of software-defined storage
 
Rethinking The Data Warehouse: Emerging Practices and Technologies to Meet To...
Rethinking The Data Warehouse: Emerging Practices and Technologies to Meet To...Rethinking The Data Warehouse: Emerging Practices and Technologies to Meet To...
Rethinking The Data Warehouse: Emerging Practices and Technologies to Meet To...
 
4 Smart_Connected_Factory_Slides Francois Briandet PDF.pdf
4 Smart_Connected_Factory_Slides Francois Briandet PDF.pdf4 Smart_Connected_Factory_Slides Francois Briandet PDF.pdf
4 Smart_Connected_Factory_Slides Francois Briandet PDF.pdf
 
Big Data LDN 2017: The New Dominant Companies Are Running on Data
Big Data LDN 2017: The New Dominant Companies Are Running on DataBig Data LDN 2017: The New Dominant Companies Are Running on Data
Big Data LDN 2017: The New Dominant Companies Are Running on Data
 
Big Data LDN 2017: The New Dominant Companies Are Running on Data
Big Data LDN 2017: The New Dominant Companies Are Running on DataBig Data LDN 2017: The New Dominant Companies Are Running on Data
Big Data LDN 2017: The New Dominant Companies Are Running on Data
 
Jeremiah O'Connor & David Maynor - Chasing the Crypto Workshop: Tracking Fina...
Jeremiah O'Connor & David Maynor - Chasing the Crypto Workshop: Tracking Fina...Jeremiah O'Connor & David Maynor - Chasing the Crypto Workshop: Tracking Fina...
Jeremiah O'Connor & David Maynor - Chasing the Crypto Workshop: Tracking Fina...
 
Cisco Connect Toronto 2018 DNA assurance
Cisco Connect Toronto 2018  DNA assuranceCisco Connect Toronto 2018  DNA assurance
Cisco Connect Toronto 2018 DNA assurance
 

More from Blancco

Beyond Diagnostics & Erasure – The Future of Ultra-Efficient Mobile Device Pr...
Beyond Diagnostics & Erasure – The Future of Ultra-Efficient Mobile Device Pr...Beyond Diagnostics & Erasure – The Future of Ultra-Efficient Mobile Device Pr...
Beyond Diagnostics & Erasure – The Future of Ultra-Efficient Mobile Device Pr...
Blancco
 
Enabling End-to-End Mobile Customer Journey
Enabling End-to-End Mobile Customer JourneyEnabling End-to-End Mobile Customer Journey
Enabling End-to-End Mobile Customer Journey
Blancco
 
Blancco Recharge - BMDE Optimizations & Updates
Blancco Recharge - BMDE Optimizations & UpdatesBlancco Recharge - BMDE Optimizations & Updates
Blancco Recharge - BMDE Optimizations & Updates
Blancco
 
EU GDPR- The Countdown to Compliance, Research Study Highlights
EU GDPR- The Countdown to Compliance, Research Study Highlights EU GDPR- The Countdown to Compliance, Research Study Highlights
EU GDPR- The Countdown to Compliance, Research Study Highlights
Blancco
 
IAPP Canada Privacy Symposium- "Data Retention Is a Team Sport: How to Get It...
IAPP Canada Privacy Symposium- "Data Retention Is a Team Sport: How to Get It...IAPP Canada Privacy Symposium- "Data Retention Is a Team Sport: How to Get It...
IAPP Canada Privacy Symposium- "Data Retention Is a Team Sport: How to Get It...
Blancco
 
Data Governance in the Enterprise: Highlights from Our Research Report
Data Governance in the Enterprise: Highlights from Our Research Report Data Governance in the Enterprise: Highlights from Our Research Report
Data Governance in the Enterprise: Highlights from Our Research Report
Blancco
 
Solid State Drives (SSDs) -What it Takes to Make Data Go Away
Solid State Drives (SSDs) -What it Takes to Make Data Go AwaySolid State Drives (SSDs) -What it Takes to Make Data Go Away
Solid State Drives (SSDs) -What it Takes to Make Data Go Away
Blancco
 
Security Regulations & Guidelines: Is Your Business on the Path to Compliance?
Security Regulations & Guidelines:  Is Your Business on the Path to Compliance? Security Regulations & Guidelines:  Is Your Business on the Path to Compliance?
Security Regulations & Guidelines: Is Your Business on the Path to Compliance?
Blancco
 
Data Sanitization: When, Why & How
Data Sanitization: When, Why & How Data Sanitization: When, Why & How
Data Sanitization: When, Why & How
Blancco
 
Data erasure's role in limiting cyber attacks
Data erasure's role in limiting cyber attacksData erasure's role in limiting cyber attacks
Data erasure's role in limiting cyber attacks
Blancco
 
What One Digital Forensics Expert Found on Hundreds of Hard Drives, iPhones a...
What One Digital Forensics Expert Found on Hundreds of Hard Drives, iPhones a...What One Digital Forensics Expert Found on Hundreds of Hard Drives, iPhones a...
What One Digital Forensics Expert Found on Hundreds of Hard Drives, iPhones a...
Blancco
 

More from Blancco (11)

Beyond Diagnostics & Erasure – The Future of Ultra-Efficient Mobile Device Pr...
Beyond Diagnostics & Erasure – The Future of Ultra-Efficient Mobile Device Pr...Beyond Diagnostics & Erasure – The Future of Ultra-Efficient Mobile Device Pr...
Beyond Diagnostics & Erasure – The Future of Ultra-Efficient Mobile Device Pr...
 
Enabling End-to-End Mobile Customer Journey
Enabling End-to-End Mobile Customer JourneyEnabling End-to-End Mobile Customer Journey
Enabling End-to-End Mobile Customer Journey
 
Blancco Recharge - BMDE Optimizations & Updates
Blancco Recharge - BMDE Optimizations & UpdatesBlancco Recharge - BMDE Optimizations & Updates
Blancco Recharge - BMDE Optimizations & Updates
 
EU GDPR- The Countdown to Compliance, Research Study Highlights
EU GDPR- The Countdown to Compliance, Research Study Highlights EU GDPR- The Countdown to Compliance, Research Study Highlights
EU GDPR- The Countdown to Compliance, Research Study Highlights
 
IAPP Canada Privacy Symposium- "Data Retention Is a Team Sport: How to Get It...
IAPP Canada Privacy Symposium- "Data Retention Is a Team Sport: How to Get It...IAPP Canada Privacy Symposium- "Data Retention Is a Team Sport: How to Get It...
IAPP Canada Privacy Symposium- "Data Retention Is a Team Sport: How to Get It...
 
Data Governance in the Enterprise: Highlights from Our Research Report
Data Governance in the Enterprise: Highlights from Our Research Report Data Governance in the Enterprise: Highlights from Our Research Report
Data Governance in the Enterprise: Highlights from Our Research Report
 
Solid State Drives (SSDs) -What it Takes to Make Data Go Away
Solid State Drives (SSDs) -What it Takes to Make Data Go AwaySolid State Drives (SSDs) -What it Takes to Make Data Go Away
Solid State Drives (SSDs) -What it Takes to Make Data Go Away
 
Security Regulations & Guidelines: Is Your Business on the Path to Compliance?
Security Regulations & Guidelines:  Is Your Business on the Path to Compliance? Security Regulations & Guidelines:  Is Your Business on the Path to Compliance?
Security Regulations & Guidelines: Is Your Business on the Path to Compliance?
 
Data Sanitization: When, Why & How
Data Sanitization: When, Why & How Data Sanitization: When, Why & How
Data Sanitization: When, Why & How
 
Data erasure's role in limiting cyber attacks
Data erasure's role in limiting cyber attacksData erasure's role in limiting cyber attacks
Data erasure's role in limiting cyber attacks
 
What One Digital Forensics Expert Found on Hundreds of Hard Drives, iPhones a...
What One Digital Forensics Expert Found on Hundreds of Hard Drives, iPhones a...What One Digital Forensics Expert Found on Hundreds of Hard Drives, iPhones a...
What One Digital Forensics Expert Found on Hundreds of Hard Drives, iPhones a...
 

Recently uploaded

Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 

Recently uploaded (20)

Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 

[UK & EU Webinar] The Top 3 Data Sanitisation Challenges – And How to Overcome Them

  • 1. Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2017 Blancco Oy Ltd. All rights reserved. The Top 3 Data Sanitisation Challenges – And How to Overcome Them
  • 2. Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2017 Blancco Oy Ltd. All rights reserved. Today’s Agenda 2 • Addressing today’s data centre challenges • Destroy vs. erase – navigating through the sea of grey when it comes to data protection requirements • Most common use cases – best practices for audit controls • Sanitising your SSDs – not all methods are created equal
  • 3. Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2017 Blancco Oy Ltd. All rights reserved. Data Centre Consolidation Stat https://federaltechnologyinsider.com/data-center-optimization-initiative-consolidation-cloud/Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2018 Blancco Oy Ltd. All rights reserved. OMB and Federal Information Technology Acquisition Reform Act (FITARA) guidelines state we should expect 60% of non-tiered data centres closed and 25% of tiered data centers consolidated by 2018. 60% of non-tiered data centres will close 25% of tiered data centress will consolidate
  • 4. Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2017 Blancco Oy Ltd. All rights reserved. Gartner recently predicted that by 2021, 50 percent of data centers will use SSAs for high-performance computing and big data workloads – up from less than 10 percent today. NVMes Become the Interface for Enterprise Drives 50% of data centres will use SSAs by 2021
  • 5. Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2017 Blancco Oy Ltd. All rights reserved. Data Relocation Needs to be Secure and Efficient Gartner suggests that 70% of data center migrations will experience significant time delays or even unplanned downtime, largely due to improper planning. 70% of data centre migrations will experience delays
  • 6. Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2017 Blancco Oy Ltd. All rights reserved. Let’s hear from you! 6 See note for poll question to put in ReadyTalk
  • 7. Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2017 Blancco Oy Ltd. All rights reserved. Security vs. Operations Efficient & clean operations for end-of-life Security & compliance demands for data across the entire lifecycle. Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2018 Blancco Oy Ltd. All rights reserved.
  • 8. Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2017 Blancco Oy Ltd. All rights reserved. Data Protection in the Data Centre Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2018 Blancco Oy Ltd. All rights reserved. Local/National
  • 9. Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2017 Blancco Oy Ltd. All rights reserved. Poll Question 9 See note for poll question to put in ReadyTalk
  • 10. Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2017 Blancco Oy Ltd. All rights reserved. Storage Security Needs Evidence of Sanitisation 10 Proof of sanitisation takes on at least two forms: 1. an audit log trail and 2. a certificate of sanitisation The controller shall have the obligation to erase personal data without undue delay Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2018 Blancco Oy Ltd. All rights reserved.
  • 11. Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2017 Blancco Oy Ltd. All rights reserved. Poll Question 11 See note for poll question to put in ReadyTalk
  • 12. Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2017 Blancco Oy Ltd. All rights reserved. According to … What is Data Sanitisation? Data sanitisation is the consistently applied, disciplined process of reliably and completely removing all data from a read/write medium so that it can no longer be read or recovered. Verify Certify Select Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2018 Blancco Oy Ltd. All rights reserved.
  • 13. Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2017 Blancco Oy Ltd. All rights reserved. What methods achieve it? Data Sanitisation Data Erasure Cryptographic Erasure Data Destruction Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2018 Blancco Oy Ltd. All rights reserved.
  • 14. Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2017 Blancco Oy Ltd. All rights reserved. To achieve data sanitisation, these methods must: 1. Degaussing 2. and/or Mechanical Shredders 3. Audit Report 1. Select a specific standard 2. Verify the overwriting methodology removed data across the entire device 3. Produce tamper-proof certificate 1. Find and overwrite crypto keys and password 2. Verify the data encrypted and the previous key unrecoverable 3. Produce a tamper-proof certificate Physical Destruction Cryptographic Erasure Data Erasure
  • 15. Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2017 Blancco Oy Ltd. All rights reserved. Poll Question 15 See note for poll question to put in ReadyTalk
  • 16. Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2017 Blancco Oy Ltd. All rights reserved. or + Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2018 Blancco Oy Ltd. All rights reserved.
  • 17. Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2017 Blancco Oy Ltd. All rights reserved. How Organisations Manage End-of-Life Data Today 17 Insecure & Recoverable Data Secure & Reliable Secure & Reliable
  • 18. Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2017 Blancco Oy Ltd. All rights reserved. Top 3 Data Sanitisation Challenges
  • 19. Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2017 Blancco Oy Ltd. All rights reserved. Data Centre Use Cases - Two Dimensions • Data migration • Customer Exit- Cloud Exit • VM life cycles • Repurposing system storage • Temporary data • Data retention policies Erase Data from an operational environment • Data Center decommissioning • Tech refresh • End of lease • Return test systems • Break fix (RMA) Erase entire systems or servers on drive level • Break fix (RMA) • Repurposing system storage • Data Centre decommissioning 19
  • 20. Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2017 Blancco Oy Ltd. All rights reserved. Challenge #1: Server decommissioning manual and time consuming Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2018 Blancco Oy Ltd. All rights reserved.
  • 21. Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2017 Blancco Oy Ltd. All rights reserved. Poll Question 21 See note for poll question to put in ReadyTalk
  • 22. Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2017 Blancco Oy Ltd. All rights reserved. Best Practice: Implement a scalable, automated process to decrease time and resources needed Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2018 Blancco Oy Ltd. All rights reserved.
  • 23. Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2017 Blancco Oy Ltd. All rights reserved. Server decommissioning example: • 856 Servers Decommissioned Overnight • Each server had 6x1TB SATA HDD. Total 5117 drives • Erasure time was 5-8 hours. Total time from start (boot up) to finish (report collection): 10 hours • Erasure method was NIST 800-88 Clear 23
  • 24. Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2017 Blancco Oy Ltd. All rights reserved. Challenge #2: Sanitising advanced media, like NVMe Image Credit: Unlocked/NeweggBlancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2018 Blancco Oy Ltd. All rights reserved.
  • 25. Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2017 Blancco Oy Ltd. All rights reserved. Poll Question 25 See note for poll question to put in ReadyTalk
  • 26. Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2017 Blancco Oy Ltd. All rights reserved. Challenges with SSD Erasure 26 Blancco Patented Solution 1. Freeze lock Removal 2. Proprietary Erasure Sequence i. Combines SW overwrite and FW commands 3. Erasure Validation i. Identifies malfunctions and preformed processes SSD Challenges • Freeze Locks • Wear Leveling • Data Compression • Unreliable Firmware Commands • Corrupted Blocks • Secure-Erase
  • 27. Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2017 Blancco Oy Ltd. All rights reserved. Best Practice: If erasing SSDs, move to an NIST Purge Standard, if supported by the drive. If not, fallback should be NIST Clear. Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2018 Blancco Oy Ltd. All rights reserved.
  • 28. Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2017 Blancco Oy Ltd. All rights reserved. Challenge #3: Sanitisation process in a live environment Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2018 Blancco Oy Ltd. All rights reserved.
  • 29. Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2017 Blancco Oy Ltd. All rights reserved. Poll Question 29 See note for poll question to put in ReadyTalk
  • 30. Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2017 Blancco Oy Ltd. All rights reserved. Security controls for cloud computing and protection of personal data in the cloud 30 ISO 27018: Protection of privacy and personal data in the cloud – IMPLEMENTED in H2 2014 Includes: • Cloud provider should enable the right to erase personal data. • Cloud provider should securely erase any temporary files in systems. • Cloud provider should ensure that whenever data storage space is re-assigned, previously residing data is not recoverable. ISO 27017: Security controls for cloud computing • Estimated to be in place by H1 2015. • Will affect Cloud Service Providers on an even broader level than the ISO 27018.
  • 31. Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2017 Blancco Oy Ltd. All rights reserved. Logical Level Erasure: for Unix and Windows Environments 31
  • 32. Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2017 Blancco Oy Ltd. All rights reserved. What We Do: About Us 32 Standards We Support: Some of Our Customers: Erase a Laptop or Server Erase iPhone Devices Diagnose iPhone Devices Erase Secure Active Files Erase a Virtual Machine Erase a SAN Server
  • 33. Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2017 Blancco Oy Ltd. All rights reserved. We have the certifications to prove our solutions meet highest standards. 33 The Polish Internal Security Agency Common Criteria (ISO15408) Swedish Armed Forces Netherlands Comms Security Agency NATO UK Comms Electronic Security Group German BSIUSA Department of Defense Certification Sécurité de Premier Niveau TüV-SüD UK Defense INFOSEC Norwegian National Security Authority Japan’s Refurb. IT Equipment Association Czech NSA National Assoc. for Information Destruction UK Asset Disposal & Information Security Alliance Netherlands Comms Security Agency
  • 34. Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2017 Blancco Oy Ltd. All rights reserved. And help you prove compliance with auditors. According to the Cloud Security Alliance, falls to “…the provider to keep that data secure, and when it is deleted, the provider should ensure (or be able to prove) that it is permanently destroyed.”
  • 35. Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2017 Blancco Oy Ltd. All rights reserved. Russ Ernst VP Product Development russ.ernst@blancco.com Matthew Anderson Global Director – OEM & BD matthew.anderson@blancco.com Questions? Blancco Proprietary & Confidential. Do Not Copy or Distribute. Copyright © 2018 Blancco Oy Ltd. All rights reserved. Schedule a Free Strategy Session https://www.blancco.com/demo/ free-strategy-session-data-center/

Editor's Notes

  1. Get this done week of 21st.
  2. What I want to build out for each Solution we are going to take for each vertical. How can we broaden our relationship with ITADs – one of the key areas is in approaching the data center. We want to pass this down to Ingram micro itad – to give them a better view into the full capabilities that we provide in the data center.
  3. All existing tiered data centers need to achieve a Power Effectiveness Rating (PUE) of 1.5 and all new data centers must have a PUE of 1.2. The GAO predicts a savings of $8.2 billion. 53% of respondents said technical difficulties are delaying decisions on consolidation projects – SafeNet Research Study (add or mention??)
  4. http://www.datacenterjournal.com/nvme-change-agent-next-gen-data-centers/ NVMe-enabled storage infrastructures are not only seeing wide deployment, but they’re now entering other data center areas that were once typically reserved for legacy HDDs and SSDs. (DataCenter Journal) NVMe will continue to replace SAS and SATA as the interface for enterprise drives. RAID is succumbing to the inevitability of all-flash arrays and SSD storage appliances. (Network Computing) By 2019, SSDs are expected to be in about 56% of notebooks and desktops. (ComputerWorld)
  5. https://blog.equinix.com/blog/2017/08/03/are-you-ready-to-migrate-your-data-center-to-the-cloud/ https://datacenterfrontier.com/overcoming-data-center-migration-challenges-staged-approach/ Other stats to mention: By 2020, 86% of companies will be interconnecting multiple clouds across multiple locations and over the next five years to realize a lower Capex. (Equinix) Gartner says that “a multicloud strategy will become the common strategy for 70% of enterprises by 2019, up from less than 10% today.”[1]
  6. Question: In 2018, what is the top challenge facing your data centre(s)? Answers (select one): Data Security / Data Loss Increasing infrastructure complexity Staff Issues (talent shortage, training, retaining) Increasing infrastructure complexity Reduced budgets
  7. NOTES FROM RUSS: Have to pass the security requirements, but that isn’t the day job Their biggest concern is they have this stuff piling up but they can’t do anything because of these strict security rules Erase or fails on the erasure side and report back to security/compliance teams Need least friction as possible as they go through this process
  8. A lot of big providers of cloud (microsoft and salesforce) – if a company is going to store data in their cloud, (don’t forget about Fred slide about use cases that looks like this one!)
  9. What data protection regulations are you required to meet within your data center? (select all that apply) HIPAA FISMA High PCI-DSS 3.1 SOC 2 Type II, SOC 3 ISO 27001 ISO 50001 OTHER: Please Specify
  10. FREDRIK
  11. What is data sanitisation? The process of deliberately permanently and irreversibly removing or destroying the data stored on a memory device to make it unrecoverable The process of ensuring all incorrect, duplicate or unused data is properly classified and migrated into the appropriate lifecycle stage, archival or destruction on an ongoing basis through automated policy enforcement The process of ensuring shared company data is clear of viruses and malware that can compromise the network, creating areas for breaches ANSWER: A
  12. Which data sanitisation method are you using to meet your data protection regulations today? Physical destruction Encryption Data Erasure Outsource to Third Party Not Sure Other: Please specify
  13. Best practice is a combination of these (physical destruction is part of it, but should do erasure/encryption with certificate of sanitization you can show auditors at will)
  14. Get this done week of 21st.
  15. A lot of big providers of cloud (microsoft and salesforce) – if a company is going to store data in their cloud,
  16. Poll question: What is your process when you are decommissioning servers to bring in new hardware? Pull drives manually and wipe them one by one Pull each server out of the rack and wipe on a per server basis We erase servers while in rack and wipe a rack at a time Other
  17. Need to understand how they connect the servers to the MC – need to be clear HOW we do this.
  18. 232323
  19. What data sanitisation method do you use to erase advanced media like NVMe, m.2 SSD drives? Destruction Standard overwrite We don’t sanitise, but store instead Other (specify)
  20. Speak to Verification step! Certification (so they don’t store it in their storage and think that is OK) Reference NIST 800 80R1 that on the slide.
  21. What is your data sanitisation process to avoid data spillage or to securely move customer data in a live system? We would remove the hardware, the destroy it and rebuild the system We don’t do anything We have a home grown system that sanitisation the data We delete the virtual machines Other: Please specify
  22. You will not get serial drive numbers in the report or execute hardware erasure commands (no purge on SSD) – you aren’t running dialog with the drive directly, you are running on the operating system. Connect Blancco and easily target data on logical level within the cabinet that needs to be erased – without removing drives or risking system functionality (can be done in the operational environment systems can be online) We sit on top of the server (you don’t need to reboot), we will list everything that is available You can target all LUNs and erase them (no cables, no appliance). The software can be deployed remotely or locally with admin account Erases the mounted user accessible part of functional drives and assemblies of drives Erase any type of disk drive supported by Microsoft Windows, including IDE, SCSI, FC and iSCSI in both 32-bit and 64-bit systems Erase disk drives supported by the Unix operating system in hand, including IDE, SCSI, FC and iSCSI
  23. De facto standard in data erasure 1400+ Customers Permanent data removal with 100% tamper-proof audit trail Tested, certified, approved and recommended by 18 governing bodies around the world
  24. We have 18 global certifications. If customer ask why don’t we have any in the US – it is because there are no certification in the US! Blog post coming.
  25. Produces a 100% certified data erasure and tamper-proof audit trail So you can ensure compliance with industry standards and regulations, including PCI DSS, HIPAA, SOX, ISO 27001, ISO 27040 and EU General Data Protection Regulation