16
Symantec Encryption SAC Meeting 1 State of Arkansas Encryption Offerings Tuesday October 12, 2010 Marc Potrzeboski, Brandon Grieve, Alan Reese, Shane Scholes Symantec Account Team

Symantec Encryption SAC Meeting 1 State of Arkansas Encryption Offerings Tuesday October 12, 2010 Marc Potrzeboski, Brandon Grieve, Alan Reese, Shane Scholes

Embed Size (px)

Citation preview

Symantec Encryption SAC Meeting 1

State of Arkansas

Encryption Offerings

Tuesday October 12, 2010

Marc Potrzeboski, Brandon Grieve, Alan Reese, Shane ScholesSymantec Account Team

Symantec Corporate Overview 2

Security Leadership

Industry Recognition

• Consumer Endpoint Security (#1 market position1)

• Endpoint Security (#1 market position2, Positioned in Leader’s Quadrant in Gartner Magic Quadrant3)

• Messaging Security (#1 market position4, Positioned in Leader’s Quadrant in Gartner Magic Quadrant leader5)

• Policy & Compliance (#1 market position6)

• Email Archiving (#1market position7, Positioned in Leader’s Quadrant in Gartner Magic Quadrant8, Forrester Wave leader9)

• Data Loss Prevention (#1 market position, Positioned in Leader’s Quadrant in Gartner Magic Quadrant10 and Forrester Wave leader11)

• Security Management (#1 market position12)

• Security Information & Event Management (SIEM) (Positioned in Leader’s Quadrant in Gartner Magic Quadrant13)

Storage and Availability Management Leadership

• Storage Infrastructure Software (#1 market position14)

• Core Storage Management Software (#1 market position15)

• Data Protection (#1 market position 16)

3

Corporate history

Partnerships with IBM, RIM, Intel, and more

15 years of encryption innovation

Global sales, marketing, and development

Corporate historyDeployment Successes

Over 4,000 successful managed

deployments

Deploy-once Encryption Platform

Over 100,000 corporate customers

Deployment Successes

Trusted name

Formative industry patents 7

issued, 9 pending

Synonymous with encryption

Standards-based, globally deployed

Trusted name

© 2009 PGP Corporation |

PGP Now A Part Of Symantec•Encryption experts

4

Data Protection You Can Trust

Globally Deployed Standard For Encryption

The Risks

5

Symantec Encryption Products

• 46 U.S. states now have mandatory data breach notification laws

Headlines

• An average data breach costs $204/record in the U.S., £64/record in the U.K., and €132 in Germany (Source: Ponemon Institute)

Escalation and Lost Business Costs

• $1.5M – HITECH Act maximum fine by U.S. HHS and FTC• £3M – HSBC fined by U.K. FSA• £500K – U.K. Data Protection Act (ICO) maximum fine

Government Fines and Criminal Charges (Compliance)

• $1,000+/customer/breach – Mass. and Nevada Encryption Laws

Lawsuits (Compliance)

6

Whole Disk Encryption

7

Rapid Deployment

• Quick and Easy Deployment

– No disruption to operational infrastructure

– Deploy to Windows and Mac laptops automatically using existing network deployment infrastructure

– Silent, automatic deployment

– Encrypt USB drives

– Centralized policy enforcement

– LDAP integration - enroll users automatically

88

PGP® Whole Disk Encryption How it Works

Comprehensive, efficient full disk encryption

Flexible strong authentication options

The drive is encrypted, block-by-block

Token

Comprehensive, efficient full disk encryption

Flexible strong authentication options

Passphrase Smart Card

9

The Symantec Encryption Solution

The Symantec Solution

• Symantec’s centrally managed, enterprise encryption solutions:– Hard Disk & Removable Media

– Email (gateway and peer-peer)

– Network File Share

– Command Line

– Device Control

– Mobile Devices

– Key Management

10

PGP® Encryption Platform•The first application deploys the Platform, future applications leverage it.

Your Existing Infrastructure

PGP® Encryption Platform

Automated Operations

Key Management Provisioning Security Policy

Standards (S/MIME, X.509. OpenPGP)

PGP® Encryption Applications

Whole Disk Desktop

EmailGateway

EmailInstant

MessagingNetworkStorage

Tape/Archive

Batch/FTP

MainframeFile &Archive

3rd PartyBlackBerry

CustomerApplication

s

Key Management System• Enables central management of disparate encryption key generating applications.

• Addresses not only security issues but also operational efficiency and cost.

With PGP Key Management Server

User 1 Keys

User 2 Keys

User 3 Keys

User 4 Keys

Key Management Server

User 1 User 2 User 3 User 4

File Email Disk

Without Key Management

User 1 User 2 User 3 User 4

File Email Disk

Solution Requirements

Provisioning

Storage

Auditing and Reporting

Lifecycle Management

Policy Enforcement

Discovery

Key ManagementWireless KeysSSL / TLS Keys

Disk Encryption KeysAuthentication Keys

Encryption KeysAuthentication Keys

Data Encryption KeysApplication KeysSSL / TLS Keys

Transport KeysAuthentication Keys

Transaction Keys

Clients

Backend Applications

Databases Application Servers

WebServers

Mail Servers CRM

Encryption Applications

Banking and Retail Hardware

ATM PoS EMV

Networks

WiFiVPN

13© 2010 • Symantec Corporation • Confidential

Symantec Protection Center• The SPC console allows administrators the ability to manage

multiple Symantec products through a Single Console.

• Products:– Symantec Endpoint Protection

– Symantec Web Gateway

– Symantec Data Loss Prevention

– Symantec Critical Systems Protection

– Symantec IT Analytics

– Symantec Brightmail Gateway

14

15 © 2009 PGP Corporation |

Symantec/PGP Whole Disk Encryption Package

Most Competitive Price Available!•Key benefits

– Encrypt internal, external, thumb drives• including boot drives

– Includes Virtual Disk and file encryption

– True Mac OS X solution - not a Windows port

– Compatible with Apple’s FileVault

– Windows, Mac & Linux Support

– Centrally ManagedMac Windows

Thank you!

Copyright © 2010 Symantec Corporation. All rights reserved. Symantec and the Symantec Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners.

This document is provided for informational purposes only and is not intended as advertising. All warranties relating to the information in this document, either express or implied, are disclaimed to the maximum extent allowed by law. The information in this document is subject to change without notice.

Thank you!

3