15
Beyond Encryption Presentation By Cormac Kelly

Why Go Beyond Encryption

Embed Size (px)

DESCRIPTION

This is a PowerPoint presentation from Cormac M. Kelly on behalf of Beyond Encryption Technologies Ltd. Cormac is the Director Of Business Development at Global Defence & Safety Solutions Ltd in Ireland and one of the leading distributors of the End-Point Security solutions from BETL.

Citation preview

Page 1: Why Go Beyond Encryption

Beyond Encryption Presentation

By Cormac Kelly

Page 2: Why Go Beyond Encryption

The Beyond Encryption end-point security solution enables any organization, individual or government agency to target, with pinpoint accuracy, any sensitive information on any device, regardless of location, and protect it.

Page 3: Why Go Beyond Encryption

• The ability to target specific files, folders and extensions on a devices for Lock/Unlock Encryption/Decryption, Retrieval and/or Destruction regardless of the device’s location either Remotely, through Time Delay, Local Fencing or Geo Fencing.

All this is done in a way that completely satisfies international audit requirements. When a command has been executed on a device the administrator receives a full report outlining when the command was executed on that device, and what files and folders were affected by what actions.

Once a command has been initiated on a device, the user has no control. It is impossible for them to prevent any command from being executed.

The B.E. Security Solution is the only product on the market that has both Geo-Fencing and Local Fencing capabilities that allow a device or the data on a device to lock as soon as the device moves into, or out of, a pre-defined geographic area OR outside of your company network.

Unique Selling Points Of The Beyond Encryption Security Solution

Page 4: Why Go Beyond Encryption

The B.E. Server maintains policies, and settings associated with each individual device that has the B.E. Client deployed on it.

The B.E. Client resides on each device under management. Its job it is to maintain contact with and carry out instructions issued from the B.E. Server. The B.E. Client cannot be removed from a device by the Device User.

A Secure Communications Channel provides a secure, encrypted, point-to-point communication channel between the B.E. Client and the B.E. Server.

So How Does The Beyond Encryption Security Solution Work?

Page 5: Why Go Beyond Encryption

Version 3.5 of Beyond Encryption contains the following Core Security Functions

• Freeze any sensitive data on any device so that it can never be accessed.

• Unfreeze any sensitive data on any device.

• Retrieve any data from any device.

• Destroy any data on any device (exceed US DOD standards for file deletion).

• Lock down any device.

• Unlock any device.

Beyond Encryption Core Functionality

Version 3.6 In development featuring more security functions.

Roadmap available to select customers under NDA.

Page 6: Why Go Beyond Encryption

Figure 1.1 – Targeting Data

• Pinpoint Accuracy – Browse the devices drive over the internet and target data in real-time.

How can you Target and Select Data on a device?

Additional Notes• Can target device drivers to Disable Hardware.• Can target and Freeze or Remove Software.

• File Type – Based on type of data (example – all Microsoft Word Documents).• File Location – Based on location of data (example – Contents of ‘My Documents’ directory).• File Name – Based on name of file or files.

Page 7: Why Go Beyond Encryption

Version 3.5 of Beyond Encryption can execute commands in the following ways

• Reactive Security Instant execution if the device is connected to the Internet.

• Timed Security Local execution if the device does not connect to the Internet.

• Local Fencing Local Execution if the device is taken away from the office.

• Geo Fencing Local Execution if the device leaves a Geographic location.

How are commands Executed on a device?

Page 8: Why Go Beyond Encryption

Connect to any device over the Internet at any time.Device only needs to connect for a millisecond to receive commands.Full reporting when commands have been completed.Easy to use Interface.Target All data or Specific Data.

Reactive Security

Page 9: Why Go Beyond Encryption

Timed Security

If the device does not connect to the Internet your data is secure.Set the timer anywhere from One Minute to One Year.Predefined commands will execute locally when the timer reaches zero.Designed to force your end users to connect to the organisation.Target all data or specific data.Full reporting capability.

Page 10: Why Go Beyond Encryption

Local Fencing

Predefined local commands execute when a device leaves the company.

Your data cannot be used outside of your facility.

Locally fence all data or specific data.

Full reporting.

Page 11: Why Go Beyond Encryption

Geo Fencing – Slide One

• Predefined local commands execute when a device leaves a Geo Zone.• Can support multiple Geo Zones.• Can set Go Zones and No Go Zones.• Geo Fence All data or Specific Data.

Page 12: Why Go Beyond Encryption

Geo Fencing – Slide Two

Large Scale Fencing

Pinpoint Fencing

Page 13: Why Go Beyond Encryption

Easy deployment and invisible to the End User.

Does not slow the device down.

User cannot stop commands from executing.

Can send to a group of devices or to a single device.

Can set a combination of commands that can execute at the same time.

Full reporting and audit trail.

Further Product Information

Page 14: Why Go Beyond Encryption

Beyond Encryption Prime

1-500 User SMB.

Fully managed and supported by Beyond Encryption.

State of the art hosting facility.

Can be made available as a managed service.

Beyond Encryption Professional

Enterprise Applicaton.

Full Active Directory integration.

Plug and Play.

Beyond Encryption Premium

Custom Development of Core Technology.

Integration with existing security applications.

Working with Defence and Police agencies around the world.

Beyond Encryption Product Range

Page 15: Why Go Beyond Encryption

Your Sensitive Data

Beyond Your Network

Beyond Your Perimeter

Beyond EncryptionAlways Under Your Control