boole server 3 2 - general presentation - november 2012 (3)

17
Strictly confidential

Upload: prasad-kshirsagar

Post on 22-Dec-2015

11 views

Category:

Documents


3 download

TRANSCRIPT

Page 1: Boole Server 3 2 - General Presentation - November 2012 (3)

Strictly confidential

Page 2: Boole Server 3 2 - General Presentation - November 2012 (3)

Innovative software platform

Securing and Sharing Sensitive Data

• International software vendor with 7 offices in 6 countries

• Commercial network includes about 50 partners in more than 30

countries (Europe, North Africa, Middle East, Asia and Latin America)

INTRODUCTION

2

Page 3: Boole Server 3 2 - General Presentation - November 2012 (3)

Boole Server has been chosen by leading global companies across a

wide variety of markets/verticals:

Finance

Energy

Manufacturing

Pharmaceuticals

INDUSTRIES

3

Legal

Fashion

Retail

Services

Government

Media

Transport

Others

Page 4: Boole Server 3 2 - General Presentation - November 2012 (3)

SELECTED CLIENTS

4

Ministry of Culture and Information

Page 5: Boole Server 3 2 - General Presentation - November 2012 (3)

SELECTED GLOBAL PARTNERS

5

Boole Server™ is Microsoft Partner Network

Boole Server™ is partner of Celestix which has a

network of over 500 resellers worldwide

Boole Server™ is the only recommended

confidential data management platform of Accenture

Boole Server™ is Amazon Web Services Partner

Network

Boole Server™ is Dimension Data Partner

Page 6: Boole Server 3 2 - General Presentation - November 2012 (3)

Winner 2012 ISSA Good Practice Awards for Asia and the Pacific

Winner 2012 Bully Awards

Winner 2012 SC Magazine Awards for Best Encryption Solution and for

Best DLP Solution

Finalist 2012 Red Herring Top 100 Europe

Finalist 2011 SC Magazine Awards for Information Security Product

and for Innovation Award

“Cool Vendor” 2010 Gartner in “Data and Infrastructure Protection”

AWARDS – COMPANY & PRODUCT

6

Page 7: Boole Server 3 2 - General Presentation - November 2012 (3)

DATA SECURITY: THE CHALLENGE

Technology evolves quickly

and towards persistent access

- Hardware & Software

- Internet, mobile, cloud

- 24/7, offline

Multiple & changing threats

- External

(hackers, competitors, espionage)

- Internal

(negligent / malicious employees)

8

Page 8: Boole Server 3 2 - General Presentation - November 2012 (3)

THE CONSEQUENCES

Mclaren linked to Ferrari espionage scandal

Ex-HSBC employee stole data

on 24,000 customers

9

Page 9: Boole Server 3 2 - General Presentation - November 2012 (3)

TRADITIONAL APPROACH – SECURING THE PERIMETER

Business

People

Applications

Storage/Hardware

Networks/Communications

Facilities

Data

Safes, locks, etc

USB, FDE

MFT, Secure Email, Firewall

Focus on securing storage, transport or facilities

Try to map boundaries up to data and people

10

Page 10: Boole Server 3 2 - General Presentation - November 2012 (3)

DATA CENTRIC PROTECTION – A POWERFUL PHILOSOPHY

Data Centric Protection focuses on the data itself, wherever & however it

is used

Business

People

Applications

Storage/Hardware

Networks/Communications

Facilities

Data

11

Page 11: Boole Server 3 2 - General Presentation - November 2012 (3)

DATA CENTRIC PROTECTION – COMPREHENSIVE, COMPLIANT AND EFFICIENT

Securely deliver and share

sensitive information

beyond your network

Control and change access

to information in real time

even after it has been sent

out. Restrict functions on

secured documents, e.g.

print, copy, save as, print

screen

Revoke access instantly,

even after delivery has been

taken, no matter where it has

ended up

Protect data from

unauthorised access,

wherever it resides (fixed

infrastructure, end points

& mobile devices)

Audit every single

activity undertaken on

secured data and prove

regulatory controls are in

place

12

Page 12: Boole Server 3 2 - General Presentation - November 2012 (3)

Combines security and sharing

Can be easily integrated as it complements

Extends protection across organisational boundaries, including

compliance

Invites and de-risks collaboration

Security as an enabler of business, not a restriction

Efficient: where, when, who and how

Versatile and appropriate: dynamic and granular

13

DATA CENTRIC PROTECTION – COMPREHENSIVE, COMPLIANT AND EFFICIENT

Page 13: Boole Server 3 2 - General Presentation - November 2012 (3)

Store and access any information (files, text and emails) wherever

(incl. external), however (incl. iPad/iPhone) and whenever (incl. offline)

Persistent protection through military grade encryption (RC6 algorithm

– 2048 bit) and high end-point protections (incl. video capture and print

screen)

Granular, dynamic and independent rights management

Control in real time, of all user and data activity

THE SOLUTION

Access Boole Server™

14

Page 14: Boole Server 3 2 - General Presentation - November 2012 (3)

UNIFIED DATA PROTECTION FOR THE ENTIRE BUSINESS

Your Networks

Board Members

Management

Finance

Sales

Marketing

Human Resources

Legal

Research & Development

Boole ServerInternal & Internet

Facing

Secure Sharing, Transfer, Access & Dynamic Rights Mangement

Protected data stored

in Boole Server

Web

portal

Boole Server

client

HTTPS

15

Protected data stored on

your file server

Unprotected data stored

on your file server

Page 15: Boole Server 3 2 - General Presentation - November 2012 (3)

POSITIONING – COMPETITIVE LANDSCAPE

DRM

IA & Compliance

DLP

Data Sharing

Storage

Auditing

Messaging

Collaboration

THE ULTIMATE SOLUTION

FOR THE SIMPLE, TRANSPARENT AND SECURE

CONFIDENTIAL DATA

PROTECTION AND SHARING

16

Encryption

Page 16: Boole Server 3 2 - General Presentation - November 2012 (3)

Persistent military grade protection

- Persistent (at rest, in transit and in use)

- Industry leading encryption (2048 bit random key)

Dynamic and granular data centric right management

- Rights can be managed at any time and in real time

- Rights can be assigned in a granular way (admins, users and data)

Putting data control back in hands of data owners

- Separation between admins and owners/users

- Independent management

Flexible

- Internal and external users, any type of file, any storage location

- Size and type of solution, customisation and integration

Simple

- Easy to use and access, administer, implement and maintain

Complete

- Storage, remote access, audit, messaging, collaboration

KEY SOLUTION STRENGTHS

17

Page 17: Boole Server 3 2 - General Presentation - November 2012 (3)

The contents of this document are confidential: any copy,

reproduction, representation, adaptation, modification, distribution,

dissemination, in whole or in part, is not authorized by Boole Server

CONFIDENTIALITY

18