1 file encryption. 2 our business is built on sharing files with partners, customers and vendors how...

32
1 File Encryption

Upload: kendall-platten

Post on 11-Dec-2015

225 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: 1 File Encryption. 2 Our business is built on sharing files with partners, customers and vendors How do we keep these files safe? Business Concerns

1

File Encryption

Page 2: 1 File Encryption. 2 Our business is built on sharing files with partners, customers and vendors How do we keep these files safe? Business Concerns

2

Our business is built on sharing files with partners, customers and vendors

How do we keep these files safe?

Business Concerns

Page 3: 1 File Encryption. 2 Our business is built on sharing files with partners, customers and vendors How do we keep these files safe? Business Concerns

3

CISO• How will we need to adjust

our compliance strategy for my operations in Nevada?

• Can improved file protection strategies mitigate my risk for a data breach?

• How does file protection help grow our business?

Desktop/IT Operations• I can’t manage file encryption

for every user, what’s a better way?

• How can I minimize helpdesk impact?

• There are files going everywhere, what can I do to protect them?

User• I don’t want to be trained on

yet another application.• I want to be able to use the

devices and systems I’m used to.

• I’d like to be able to do my job without having to call IT.

Buyer Concerns

Page 4: 1 File Encryption. 2 Our business is built on sharing files with partners, customers and vendors How do we keep these files safe? Business Concerns

4

User file protection

Shared file protection

Distributed file protection

Protect shared files and folders

Protect transferred files and folders

Protect individual files and folders

Protecting Files Wherever They Need To Go

Page 5: 1 File Encryption. 2 Our business is built on sharing files with partners, customers and vendors How do we keep these files safe? Business Concerns

5

PGP® NetShareShared File Protection

• Protect data exchanged between users via shared network folders

PGP® Command Line

Scriptable Encryption• Integrate encryption into data transfer, data

distribution and data backup processes

PGP File And Server ProtectionProducts At A Glance

Page 6: 1 File Encryption. 2 Our business is built on sharing files with partners, customers and vendors How do we keep these files safe? Business Concerns

6

PGP NetShare

PGP® NetShareShared File Protection

• Protect data exchanged between users via shared network folders

PGP® Command Line

Scriptable Encryption• Integrate encryption into data transfer, data

distribution and data backup processes

Page 7: 1 File Encryption. 2 Our business is built on sharing files with partners, customers and vendors How do we keep these files safe? Business Concerns

PGP NetShareSolution Highlights

PGP NetShare• Encrypts data by policy

– Network servers & local/removable storage– Application-based

• Controls access by group or user level• Operates in background on desktop• Can leverage LDAP / Active Directory groups• Supports Citrix and Microsoft Terminal

Services• Support for WebDAV/SharePoint

Data encrypted/decrypted automatically

No change in user behavior

7

Page 8: 1 File Encryption. 2 Our business is built on sharing files with partners, customers and vendors How do we keep these files safe? Business Concerns

8

PGP NetShareHow It Works

?

Finance encrypts a file on the server using PGP NetShare

1Finance allows HR to view/edit the file on the server

2 HR can view and edit the file on the server 3

HR saves the file to the server and PGP NetShare maintains protection

4 5 Sales tries to view the document and the document is unreadable

When the document is copied to backup tape, it remains protected

6

Page 9: 1 File Encryption. 2 Our business is built on sharing files with partners, customers and vendors How do we keep these files safe? Business Concerns

9

PGP NetShareOpening Files

Open file via the Application, Explorer, etc.

…and the files opens

Zero impact on workflow!

Page 10: 1 File Encryption. 2 Our business is built on sharing files with partners, customers and vendors How do we keep these files safe? Business Concerns

10

PGP NetShareSaving Files

Create the file

Zero loss of productivity!

Save the file

File is saved encrypted

Page 11: 1 File Encryption. 2 Our business is built on sharing files with partners, customers and vendors How do we keep these files safe? Business Concerns

11

PGP NetShareMoving And Copying Files

• Encryption maintained with folder or file

• Allowed users have access if they have a PGP NetShare client

Page 12: 1 File Encryption. 2 Our business is built on sharing files with partners, customers and vendors How do we keep these files safe? Business Concerns

12

PGP NetShareEnterprise Features

• PGP Universal Server– Manages Assigned keys

– Allows for Application-Aware encryption of files • “Encrypt all .DOC files in this folder”• “Don’t encrypt .MOV files in this folder”

• PGP NetShare Command Line– Allows for PGP NetShare commands to be issued in “batch mode”

• “Encrypt all files in the folder”• “Encrypt all files in this folder with new users in the Active Directory database”

Page 13: 1 File Encryption. 2 Our business is built on sharing files with partners, customers and vendors How do we keep these files safe? Business Concerns

13

PGP NetShareOutsourcing• Large outsourcer of human

resources and payroll services

• Shared network storage with customers

• PGP NetShare is used by outsourcer and customers to:– Partition information between

different customers

– Secure the access of shared storage across organizational boundaries

– Protect privacy and comply with regulations by restricting access to personnel information

Account Manager for Company “A”

Account Manager for Company “B”

Payroll Clerks for Company “A”

Payroll Clerks for Company “B”

Page 14: 1 File Encryption. 2 Our business is built on sharing files with partners, customers and vendors How do we keep these files safe? Business Concerns

PGP NetShare

• Transparent Encryption of Shared Files– No change in user behavior

– Empowers protected collaboration

– Encryption follows the file

• Strengthens Organizational Compliance Initiatives– Enables application-aware encryption strategies

– Enforces policy-based protection of shared files and folders

• Minimizes Impact on IT Operations– Client-based, no server impact, no application impact

– Leverages LDAP / Active Directory groups for simplified management

– Supports role separation for appropriate content access

– Utilizes Additional Decryption Key (ADK) for file recovery

Policy-enforced file and folder encryption for team collaboration

14

Page 15: 1 File Encryption. 2 Our business is built on sharing files with partners, customers and vendors How do we keep these files safe? Business Concerns

15

PGP NetShare

Scenario:• Need to Protect customer credit/bank information for PCI

compliance

The Solution:• PGP NetShare encrypts files on a dedicated share

The Benefits:• PGP Platform

• End to End Encryption

• ADK

Customer Case StudySafeway - Retail/Grocery

Page 16: 1 File Encryption. 2 Our business is built on sharing files with partners, customers and vendors How do we keep these files safe? Business Concerns

16

PGP NetShare

Scenario:• Need to Protect customer financial information on servers

The Solution:• PGP NetShare (as part of storage) encrypts files in “NetShares”

on Servers . Backups all while preventing unauthorized access

The Benefits:• “NetShares” on local or servers

• End to End Encryption

• Wanted Citrix.. but decided product was too compelling to wait

Customer Case StudyCast Consulting - Accounting

Page 17: 1 File Encryption. 2 Our business is built on sharing files with partners, customers and vendors How do we keep these files safe? Business Concerns

17

PGP® NetShareShared File Protection

• Protect data exchanged between users via shared network folders

PGP® Command Line

Scriptable Encryption• Integrate encryption into data transfer, data

distribution and data backup processes

PGP Command Line

Page 18: 1 File Encryption. 2 Our business is built on sharing files with partners, customers and vendors How do we keep these files safe? Business Concerns

18

• Encrypt

• Decrypt

• Compress

• Sign files

• List keys

• Assign keys

• …and more

PGP Command LineScriptable Encryption

Page 19: 1 File Encryption. 2 Our business is built on sharing files with partners, customers and vendors How do we keep these files safe? Business Concerns

PGP Command LineOver 35 Supported Operating System Platforms

• Microsoft Windows 7 (32- and 64-bit)• Microsoft Windows Server 2008, 2003 (32- and

64-bit) SP2• Microsoft Windows Server 2003 (32- and 64-bit)

SP2• Microsoft Windows Vista (32- and 64-bit) SP2• Microsoft Windows XP (32- and 64-bit) SP3• Microsoft Windows 2000 SP4• HP-UX 11i and above (PA-RISC and Itanium)• IBM AIX 5.3 and 6.1• Red Hat Enterprise Linux 5.0 (x86 and x86_64)• SUSE Linux Enterprise Server 9 SP4 and 10 SP2

(x86)• Fedora Core 6 (x86_64 only)• Sun Solaris 9 (SPARC) and Solaris 10 (SPARC, x86,

and x86_64)• Apple Mac OS X 10.5.x and 10.6.x (Intel-based)

• IBM® Mainframe (previously System z®)– IBM z/OS 1.7 and later

– SUSE Linux Enterprise Server 9.0

– Red Hat Enterprise Linux 4.0

• IBM® Power Systems® (previously System i®) – SUSE® Linux Enterprise Server 9.0

– Red Hat Enterprise Linux 4.0

– IBMi V5R2 and later

Server Support Mainframe Support

19

Page 20: 1 File Encryption. 2 Our business is built on sharing files with partners, customers and vendors How do we keep these files safe? Business Concerns

20

Data Distribution

File Transfer

Data Backup

> pgp –es dbdump.sql – r admin@company_a.com

dbdump.sql:encrypt (0:output file dbdump.sql.pgp)

PGP Command LineHow It Works

Page 21: 1 File Encryption. 2 Our business is built on sharing files with partners, customers and vendors How do we keep these files safe? Business Concerns

21

• Problem– Files transferred internal to an organization are often not protected

– Potential Exposure• Files transferred to wrong folder/user• Files are stored on the servers unprotected – readable by anyone?

• Solution– As part of a script or application, PGP Command Line can

• Protect files on the server • Protect files in transit• Allow different users to have access to just their files (those they have keys to)

File Server FTP Server FTP Server File Server

PGP Command LineInternal File Transfer

Page 22: 1 File Encryption. 2 Our business is built on sharing files with partners, customers and vendors How do we keep these files safe? Business Concerns

• Problem– Files transferred externally are protected from Firewall to Firewall

– Potential Exposure• Files on the sending and receiving servers are unprotected• Files could be transferred to the wrong folder/user

• Solution– As part of a script or application, PGP Command Line can

• Protect files on the sending server • Protect files in transit• Protect files on the receiving server until the proper credentials are presented

22

File Server FTP Server

PGP Command LineExternal File Transfer

Page 23: 1 File Encryption. 2 Our business is built on sharing files with partners, customers and vendors How do we keep these files safe? Business Concerns

23

• Requirements– Provide protected content to third parties

– Distribution medium: CDs, DVDs, files on server

– Cannot require the purchase/installation of software or services to read media

• Examples– Tax preparers

– Software distribution

– Legal documents

– Healthcare records

• Solution– Use PGP Command Line to create a Self-Decrypting Archive

44% of data loss breaches are caused by

third-party vendors(Ponemon study – Jan 2010)

PGP Command LineDistributing Secure Files

Page 24: 1 File Encryption. 2 Our business is built on sharing files with partners, customers and vendors How do we keep these files safe? Business Concerns

24

PGP Command LineDistributing Secure Files

SDA protectedCD/DVD

File Server CD/DVD

Without PGP, the contents of CD/DVD can be read by anyone

Passphrase?

Passphrase

With PGP, the contents of CD/DVD are protected

Page 25: 1 File Encryption. 2 Our business is built on sharing files with partners, customers and vendors How do we keep these files safe? Business Concerns

25

If the “tapes” are lost or stolen they are useless

Files are compressed and encrypted before they are backed up

PGP Command LineProtecting Data Backups

Page 26: 1 File Encryption. 2 Our business is built on sharing files with partners, customers and vendors How do we keep these files safe? Business Concerns

26

PGP Command LineProtecting Recovered Files• Recovering Files

– Method 1: Use the Encryption Key used to encrypt the files on the tape

• But – What if the key is lost? Or worse the “admin” is gone?

• Answer: Additional Decryption Key (ADK)– An encryption/decryption key split between two or more people

– Each person has a different part of the key

– An ADK requires a predefined number of people (keys parts) to reassemble the entire key

• Example:– Key is split between 5 people

– Any 3 of those people can recreate the decryption key

Page 27: 1 File Encryption. 2 Our business is built on sharing files with partners, customers and vendors How do we keep these files safe? Business Concerns

PGP Command Line

• Scriptable Encryption– A complete library of encryption commands

– Simplifies encryption integration into business practices

• Wide Range of Platforms– Supported on over 35 supported operating systems

• Windows, Linux, Solaris, Mac OS X, HP-UX, IBM AIX, iSeries, zSeries

– Runs with most scripting languages, such as Perl, Python, JavaScript, etc.

• Many Uses– End-to-end protection for the internal or external transfer of files

– SDA enabled distribution of files via CD, DVD, hard drives or file servers lockboxes

– Encryption protection and recovery of backed-up and archived files

File encryption for server protection & file transfer

27

Page 28: 1 File Encryption. 2 Our business is built on sharing files with partners, customers and vendors How do we keep these files safe? Business Concerns

28

PGP Command Line

Scenario:• Need to Protect sensitive customer data in storage and from

interception in transit

The Solution:• Secure Large File Transfer service designed with PGP

Command Line as the encryption engine

The Benefits:• PGP Platform

• Lower operational costs and regulatory compliance

Customer Case StudyAffiliated Computer Services, Inc. – Business Process and IT Outsourcing

Page 29: 1 File Encryption. 2 Our business is built on sharing files with partners, customers and vendors How do we keep these files safe? Business Concerns

29

PGP Command Line

Scenario:• To comply with HIPAA PHNS identified the need to have a

secure email solution to serve multiple customers

The Solution:• PGP Command Line secures data flow between key systems

The Benefits:• PHNS Integration group was able to write scripts and develop

applications that leveraged PGP Command Line

• Consolidated/automated systems resulted in lower costs and higher ROI

Customer Case StudyPHNS – Health Care Outsourcer

Page 30: 1 File Encryption. 2 Our business is built on sharing files with partners, customers and vendors How do we keep these files safe? Business Concerns

30

PGP File And Server Protection - In Action

Human ResourcesProtect Personal Identifiable Information

(PII) by encrypting shared files and folders on file servers

IT OperationsEncrypt files being backed-up or archived and utilize split-keys to

ensure recoverability

DistributionSafeguard the contents of

distributed media such as CDs and DVDs for every customer

LegalEnable the end-to-end secure transfer of

intellectual property, and proprietary and client confidential information to third parties

HealthcareSecure Personal Health

Information (PHI) of patient records, images and related files shared among medical staff and

administrators

Client ServicesCreate and protect “lock-boxes” for

multiple clients on the same server while ensuring data protection

Page 31: 1 File Encryption. 2 Our business is built on sharing files with partners, customers and vendors How do we keep these files safe? Business Concerns

31

Summary – File And Folder ProtectionSupport Compliance Initiatives

Secure files and folders

Protect data being transferred

Provide standards-based protection

Simplify IT Operations

Fit into existing business processes and systems

Provide centralized management

Automate policy enforcement

Enable application-aware encryption

Support Additional Decryption Keys

Provide Ease of Use

Doesn’t require user training to use

Doesn’t affect user applications or system operation

Page 32: 1 File Encryption. 2 Our business is built on sharing files with partners, customers and vendors How do we keep these files safe? Business Concerns

Thank you!

Copyright © 2010 Symantec Corporation. All rights reserved. Symantec and the Symantec Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners.

This document is provided for informational purposes only and is not intended as advertising. All warranties relating to the information in this document, either express or implied, are disclaimed to the maximum extent allowed by law. The information in this document is subject to change without notice.

Thank you!

32

[email protected]+48 12 443 14 07