22
ACER CONFIDENTIAL ProShield - Advance security solution for Acer commercial devices

ProShield - Acer Inc.static.acer.com/up/Resource/Acer/Professional/Vertical Segmentation...Grab the GFK data when it arrives into ACER so that we can process the information re\ൡl

  • Upload
    dinhnga

  • View
    215

  • Download
    1

Embed Size (px)

Citation preview

ACER CONFIDENTIAL

ProShield - Advance security solution for Acer commercial devices

Presenter
Presentation Notes
Late last year we were doing research into the commercial space and we found that “security” is very important to the commercial market No matter whether it was small business, medium business, or large business… “security” was a “Top Priority” After several research into our competitors, we realize that we needed a “security” software Hence ProShield was born Let me share with you why “security” is important

ACER CONFIDENTIAL

Topics

1

• Security Background

• What is ProShield

• Features and benefits

• New Feature in version 1.5

• References

ACER CONFIDENTIAL

you are only as SECURE as your weakest link

Presenter
Presentation Notes
Maarten Product survey, more on the details not just the overall Can we do any quick survey when the product launch to help the next year’s NPI process (Match the surveys to the NPI process timeline) PMBU can co-help write the survey and Maarten’s team can deliver the surveys Francesco 1. Grab the GFK data when it arrives into ACER so that we can process the information real time and to help our supply chain process

ACER CONFIDENTIAL

Three major security risks to any organization

• Lost revenue & value • Lost competitive advantage • Reduce public confidence

Information Theft

• Operational downtime • Repair & recovery costs • Reduce productivity

System Malfunction

• Lost physical & intellectual assets • Replacement cost

Asset Vulnerability

3

Presenter
Presentation Notes
When loss of PC data/info or being hacked, the loss could be indirect or direct of any one of above.

ACER CONFIDENTIAL

Users need easy to use data security solution

4

• Businesses desire to manage access and policies but current methods are too complex.

• Desire to keep PCs patched and up to date and pushing tasks to users often results in security holes.

• Backup tasks are pushed to employees and compliance is spotty until a disaster occurs.

• Provides employees with easy to use tools that can set usage policies for software, websites, and hardware use on employees workers PCs.

• Help to remind employees of PC management tasks.

• Let employees know of potential holes in security so they can get help.

• Help employees to make sure that all PCs have up to date patches and updates.

• Ensure that important data are backed up sound and safe.

Implications Needs

Presenter
Presentation Notes
Most businesses feel and believe security is important, but they often do not have time or skills to manage. This will lead their info in PC very vulnerable. If there is easier way to manage and easier secure tool for employees to use on their own, this will greatly reduce to security risks.

ACER CONFIDENTIAL

39% of SMB spends 1 hour/week on IT security

1hr per week 39%

2-3 hrs per week 25%

4-5 hrs per week 12%

1 day per month 10%

More than 1 day 4%

no time 10%

Percentage of time spent proactively on IT security

SMB needs to choose an easy-to-use IT security solution Source: McAfee 2010 5

Presenter
Presentation Notes
This is the extension of previous slide buy giving the reader the actual statistics. Most businesses feel and believe security is important, but they often do not have time or skills to manage. This will lead their info in PC very vulnerable. If there is easier way to manage and easier secure tool for employees to use on their own, this will greatly reduce to security risks.

ACER CONFIDENTIAL

Acer ProShield

6

Is a suite of essential security and manageability tools allows you to manage your security applications. Create encrypted personal secure drives and add extra layers of protection to keep your system virtually impregnable.

Acer ProShield integrates multiple security and management features in a single-client console, and works with optional hardware security features, such as Trusted Platform Module (TPM), to fortify business security and better protect data against unauthorized access and threats.

Presenter
Presentation Notes
Bundled with Acer business notebooks and desktop PCs,

ACER CONFIDENTIAL

• File Shredder

• Folder Shredder

• Settings (Boot Order PWD…)

•Import/Export Settings

•BIOS Security •Port & Device

Control

•Personal Secure Drive

•File/Folder Encryption/Decryption

•Self Encryption Drive

•Device Lock

ProShield Features

7

Data Protection

BIOS Settings

Data Removal

FP: Finger Print; TPM: Trusted Platform Module; FL: Face Logon

• PWD/FP/TPM Configuration

Website • Single sign-on

(PWD/TPM) • One-step logon

(TPM/FP) • Restore/Backup

Credential Manager

ACER CONFIDENTIAL

ProShield Benefits

Device security through BIOS Setting

Multi-Level Credential Manager for the peace of mind

Data Protection prevents unauthorized access

Data Removal for business security protecting intellectual property

8

ACER CONFIDENTIAL

BIOS Setting protects from the beginning

Prevent unauthorized device (i.e. USB) to boot up the computer

If hacker is successfully boot up the computer, the hacker can obtain sensitive information from the HDD

ProShield protects the boot settings from unauthorized access

BIOS Settings

9

ACER CONFIDENTIAL

Credential Manager provides peace of mind

Unwanted entry into YOUR computer

Building multi layers of user authentication forming a “barrier to entry” for the PC and websites

ProShield embedded security provides additional protection against unwanted entry

Credential Manager

10

ACER CONFIDENTIAL

Data Protection prevents unauthorized access

Your information is YOUR intellectual property

Cyber crime takes a “entire week” to get the business back and running, but unauthorized access to YOUR intellectual property is lost forever

ProShield protects YOUR individual/group files and folders for security

Data Protection

11

ACER CONFIDENTIAL

Data Removal protects sensitive documents

Every companies has regulations and standards to dispose of sensitive documents

Requiring the highest certification to protect the most sensitive material

ProShield’s data shredder is certified with the USA Department of Defense (DoD)

Data Removal

12

Presenter
Presentation Notes
Comply DoD 5220m

ACER CONFIDENTIAL

Face Login* - login your computer in a blink of eyes

13

Quick and easy access

No-typing access

Adjustable sensitivity levels

New feature

Auto focus and tracking movement

“*Note: Face Login feature is only available in selected Acer commercial notebook models”.

Presenter
Presentation Notes
Sophisticated face recognition algorithms adjust for varying lighting conditions automatically. Login is simple as blink of your eyes without any training required. Lighting condition is automatically adjusted to recognize.

Thank you

ACER CONFIDENTIAL

Additional References

15

ACER CONFIDENTIAL

Acer ProShield Model Coverage

16

1. ProShield is available in all Acer commercial desktops, commercial tablets, and commercial notebook computers.

2. Current all Acer Veriton commercial desktops and tablets are on version 1.4, and Acer Commercial notebooks will be on version 1.5 with new feature Face Login after August 2013 production under the Intel Hashwell platform.

ACER CONFIDENTIAL

Why don’t we secure our computer?

17

ACER CONFIDENTIAL

Lost a laptop or desktop

Problem:

A lost or stolen computer with sensitive information

Solution thru ProShield:

Personal Secure Drive (PSD)

File Shredder

18

ACER CONFIDENTIAL

Disgruntle employees stealing company info

Problem:

Disgruntle employees sealing company information from other employees in the company

Solution thru ProShield:

1. Password settings

2. Biometric password setting

3. BIOS password

4. Port enable/disable

19

ACER CONFIDENTIAL

Shredder with US Department of Defense

DoD 5220.22M is the US requirement for all government contractor with classify information

Ability to permanently erase 2GB of data in 2 minutes

Three pass overwriting algorithm:

– First Pass with zeroes

– Second Pass with ones

– Third Pass with random bytes

Permanently destroy data reminisce in the from deleted files

20

ACER CONFIDENTIAL

Case Study: 2010 & 2012 Olympic security requirements

TPM (London)

Need all client machines to enable TPM (UK Government Regulation)

Remote Management (Vancouver/London)

Upload new BIOS, settings & software to multiple devices

Security Setting (Vancouver/London)

Secure Boot Sequence • Do not want unwanted USB or other external Boot Sequence

Secure BIOS Password (Hardening) • Do not allow unwanted re-configuration of BIOS

21