Transcript

Ionic�Security�2013� 1

� With�a�unified�solution�for�securing�and�controlling�data�across�applications,�mobile�devices�and�the�cloud,�Ionic�Security�offers�access�control,�intellectual�property�(IP)�monitoring,�data�encryption,�and�policy�management—without�proxies,�gateways,�or�changes�to�user�behavior.�Ionic�Security�enables�information�protection�for�the�cloud�with�no�compromises.��Mobile�devices.�BrowserͲbased�applications.�Cloud�storage.�WebͲbased�collaboration.�Never�before�have�organizations�faced�so�many�opportunities�to�increase�business�productivity,�reduce�IT�costs,�and�improve�operational�flexibility.�However,�each�new�capability�brings�new�risks�–�risks�that�legacy�security�solutions�were�never�designed�to�address.���To�allow�adoption�of�new�technologies,�IT�Security�organizations�require�the�same�controls�for�web�and�cloud�applications�they�have�for�traditional�applications:�

x Central�Management� x Data�Visibility� x Password�Controls�x Usage�Tracking� x Identity�Management� x Data�Security�

�Introducing�the�Fusion�platform�from�Ionic�Security.�Designed�from�the�ground�up�to�secure�cloud�applications,�Fusion�allows�IT�and�business�users�to�embrace�the�cloud�without�compromising�security�or�convenience.���9 Central�Control�of�data,�devices�and�users:�Comprehensively�control�data�as�it�moves�between�the�local�

network,�mobile�devices,�and�cloud�applications.�A�sophisticated�policy�engine�allows�or�denies�access�based�on:�user�attributes,�such�as�business�group,�user�status�(active�vs.�disabled),�or�time�of�day;�device�attributes,�such�as�device�fingerprint,�system�health,�or�malware�status;�and�network�attributes,�such�as�physical�location�or�network�type.��

9 Data�Visibility:�Understand�where�employees�access�or�post�enterprise�data�by�monitoring�the�use�of�personally�identifiable�information�(PII),�credit�card�data,�Social�Security�numbers,�intellectual�property,�or�custom�attributes.��

9 Usage�Tracking:�Report�on�usage�of�web�applications�and�collaboration�tools,�whether�accessed�directly�or�via�corporate�VPN.�Intelligent�dashboards�provide�visibility�into�not�just�who�accessed�what,�but�also�when,�where�(via�geolocation),�and�how�(which�device,�which�operating�system).�

�9 Identity�and�Access�Control:�Quickly�deny�access�to�remote�applications�when�employees�leave�or�their�

status�changes.�Centrally�manage�applicationͲspecific�user�accounts,�link�with�an�enterprise�directory,�and�mitigate�risks�to�enterprise�data�by�resetting�passwords�across�multiple�services�from�one�location.��

9 Password�Control:�Dramatically�increase�password�security�while�simplifying�the�login�process.�Users�enter�a�single�password�or�PIN�across�all�web�applications;�behind�the�scenes,�Ionic�Security’s�Fusion�Key�technology�ensures�that�enterprise�policy�allows�access,�confirms�the�device�fingerprint�matches�that�of�an�approved�device,�and�automates�the�user’s�logͲin�process.��

9 Data�Security:�Encrypt�sensitive�information�in�cloud�and�mobile�applications,�automatically�and�transparently,�on�the�device,�in�transit,�and�in�the�cloud.�The�Fusion�platform�protects�data�with�full�AESͲ256�encryption�and�no�performance�impact,�even�on�tablets.�Users�simply�enter�data�into�applications�as�usual;�central�ITͲdefined�policies�control�which�fields�–�or�which�data�–�become�unreadable�to�unauthorized�users.

Ionic�Security�2013� 2

The�Ionic�Security�Solution�The�Fusion�platform’s�unique�architecture�combines�the�power�of�a�horizontally�scalable�management�server�with�the�granular�control�of�an�endpoint�agent.�Together,�the�components�seamlessly�secure�and�protect�digital�assets�at�rest�and�in�the�cloud�without�forcing�traffic�through�a�VPN�or�proxy�server.���KAAP�Server:�Integrated�Key�Management,�Access�Control,�Auditing,�and�Policy�Management.�The�purposeͲbuilt�KAAP�Server�combines�powerful�controls�and�a�highly�scalable�design�with�a�beautiful,�easyͲtoͲuse�user�interface.�The�multiͲfaceted�management�engine�authenticates�users,�validates�mobile�devices,�deploys�and�updates�endpoint�agents,�creates�and�delivers�encryption�keys,�and�provides�a�rich�reporting�dashboard�with�a�familiar�tabletͲlike�interface.��Ionic�Security�Agent.�The�highly�advanced�endpoint�agent�is�architected�to�provide�comprehensive�coverage�across�Windows,�Mac,�Linux,�iOS�and�BlackBerry�platforms,�with�more�to�come.�Once�installed,�the�Agent�transparently�generates�a�device�fingerprint,�communicates�to�the�KAAP�Server,�authenticates�the�device,�monitors�for�sensitive�data,�applies�policy,�encrypts�and�decrypts�data,�and�(optionally)�prompts�for�the�user’s�Fusion�Key�password—with�no�perceptible�delay�in�rendering�the�web�application.��Fusion�Key.�This�cryptographically�secure�signͲon�technology�automates�access�to�web�applications,�simplifies�the�user�experience,�and�enables�ITͲcentric�control�of�both�usernames�and�passwords.��

�� �

Ionic�Security�2013� 3

Fusion�Key�goes�beyond�single�signͲon�to�significantly�increase�cloud�security.�Through�pairing�with�specific�authorized�devices,�users’�Fusion�Keys�provide�a�third�factor�in�a�webͲbased�signͲin�process.�Only�authorized,�paired�devices�can�use�a�Fusion�Key—rendering�it�ineffective�even�if�the�password�is�compromised�and�used�on�an�attacker’s�system.�To�increase�security�further,�the�Fusion�Key�is�neither�stored�on�the�device�nor�transmitted�to�the�device�during�use.�And�of�course�users,�devices,�and�applications�can�be�deͲauthorized�from�the�central�KAAP�Server�at�any�time.���Ionic�Security�Solutions�Address�the�Primary�Risks�to�Enterprise�Data�in�the�Cloud������

Risk� Solution� 5� Loss�of�control�in�“cloud�computing”�

as�IT�groups�cannot�enforce�corporate�policies�outside�of�their�networks�(e.g.,�accessing�data�from�offͲsite�locations,�using�own�devices)�

¨ Sophisticated�policies�allow�control�over�which�users,�locations,�devices,�and�applications�are�authorized�for�use.�

� �5 Penalties,�fines,�or�breach�notifications�

resulting�from�compromise�of�data�stored�in�mobile�devices�and�cloud�applications�

¨ Data�encrypted�at�all�times,�whether�at�rest,�in�motion,�or�in�use,�using�AESͲ256�encryption�to�render�sensitive�data�indecipherable�to�unauthorized�parties.�

� �5� Gateway�bottlenecks�or�single�choke�point�

when�third�party�solutions�force�traffic�through�enterprise�VPNs�or�proxy�devices,�eliminating�much�of�the�value�gained�from�the�cloud�

¨ Distributed�environment�enables�each�user�to�use�public�or�private�networks�to�access�sensitive�data�and�apps�from�any�device,�anywhere,�including�BYOD,�without�detouring�traffic�through�a�gateway�

� �5� Security�breaches�when�employees/users�

leave,�are�terminated,�data�is�compromised,�or�devices�are�lost�or�stolen�

¨ IT�maintains�control�for�all�users,�data,�and�devices�–�any�data�or�device�can�be�easily�and�immediately�disabled�without�the�need�to�call�down�to�the�device.�

� �5� Complex�and�varying�password�

requirements�that�encourage�users�to�reuse�passwords,�write�them�down,�or�use�unauthorized�password�managers�

¨ Simplicity�of�a�single�password�–�a�“Fusion�Key”�acts�as�the�only�user�visible�part�of�a�sophisticated�multiͲfactor�authentication�process�to�access�to�all�remote�applications�

� �5 Unauthorized�storage�of�enterprise�data�on�

cloud�services,�unknown�use�of�web�applications,�or�overprovisioning�of�licenses�for�SaaS�products�

¨ Centralized�monitoring�of�application�usage�identifies�where�sensitive�data�resides,�who�has�access,�and�which�applications�are�in�use�

� � ��

� �

Ionic�Security�2013� 4

Expand�to�the�Cloud�with�Confidence��

5 Increase�use�of�web�apps�without�increasing�management�complexity

5 Share�or�store�sensitive�information�in�cloud�file�sharing�and�collaboration�services��

5� Maintain�data�jurisdiction�by�enforcing�geographic�controls�on�data��

5� Avoid�fines�or�brand�damage�due�to�compromised�cloud�account�credentials��

5 Lower�helpdesk�costs�by�simplifying�logins�to�multiple�web�apps���

5 Comply�with�data�protection�laws�by�encrypting�sensitive�data�in�the�cloud��Ionic�Security�Team��

x Adam�Ghetti:� Founder�/�CTO�

x Steve�Abbott:� CEO,�formerly�CoͲFounder�of�PGP�Corp.�

x AwardͲwinning�product�and�engineering�team�with�founder�and�senior�level�experience�from�Internet�Security�Systems,�SecureWorks,�Dell,�Cisco,�Nortel,�Scientific�Atlanta,�Federal�and�Defense�industries.�

Ionic�Security�Investors��Ionic�Security�is�backed�and�advised�by�leading�venture�capital�firms�and�industry�visionaries,�including:�

x Kleiner�Perkins�Caufield�&�Byers�

x Google�Ventures�

x TechOperators�

x ff�VC�

x Christopher�Klaus:� Founder�/�CTO,�Internet�Security�Systems�(Acquired�by�IBM)�

x Phil�Dunkelberger:� Founder�/�CEO,�PGP�Corp.�(Acquired�by�Symantec)�

x Ken�Levine:� CEO,�NitroSecurity�(Acquired�by�McAfee)�

x Dr.�Paul�Judge:� CoͲFounder�/�CTO,�CipherTrust�(Acquired�by�Secure�Computing),�� Founder�/�CTO,�PureWire�(Acquired�by�Barracuda�Networks)��

Further�Information:�[email protected]�Ionic�Security,�Inc.�730�Peachtree�Street�NE�Suite�675�Atlanta,�GA�30308�


Top Related