imation defender collection
TRANSCRIPT
1
DEFENDER COLLECTION INTRODUCTION
April 22, 2010
2
TABLE OF CONTENTS
Introduction
Market Situation
Defender Portfolio Summary
Portfolio Details
Q & A
03
07
14
23
32
3
INTRODUCTION
3
4
PRESENTERS
Keith G. SchwartzDirector of Global Strategic Growth
and Public Sector
Jason J. EllesImation Global Brand Manager
5
KEY TAKEAWAYS
• Need for data-at-rest security solutions is rapidly growing
• As the data storage industry leader, Imation is uniquely positioned to extend its offerings into secure storage solutions
• Our new secure data storage product portfolio:– Meets the most advanced global data encryption standards– Will be industry’s broadest– Offers solutions from enterprise to personal use
6
IMATION CORP OVERVIEW
• Leading global marketer and developer of branded products that enable people to store, protect and enrich their experiences with digital information
• Technology leadership, global distribution reach, and customer relationships make us a preferred partner for leading companies worldwide
• Broad portfolio of data storage products, consumer electronics and accessories
• Global market share leader in recordable optical media and data storage tape
• ’09 revenue $1.65 billion, >1,200 employees, serving more than 100 countries
7
MARKET SITUATION
7
8
MARKET SITUATION - SUMMARY
DATA GROWTHThe growth of digital information has rapidly surpassed expectations
INCREASED DATA MOBILITYThe importance of data has increased its access and mobility requirements making it more difficult to secure and protect
INCREASED DATA BREACHESAs data and its mobility grow, the amount of data breaches and data exposure has also grown
REGULATIONS INCREASINGIncreased data exposure has resulted in increased regulations and reporting requirements globally
U.S. 2009> 220 Million Records Exposed2
> 498 Breaches2
COST OF DATA BREACHES GROWS
Increased reporting requirements and increased data breaches results in increased breach costs
U.S. 2009
$6.6 Million3
Average org. cost of data breach over 4 years
$202 per record3
1Source: IDC – The Diverse and Exploding Universe – March 20082Source: Identity Theft Resource Center – 2009 Data Breach Stats January 6, 20103Source: Ponemon Institute – Fourth Annual U.S. Cost of Data Breach Study January 2009
1
9
DATA GROWTH
By 2011, the digital universe will be 10 times the size it was in 2006
Approximately 70% of the digital universe is created by individuals, but enterprises are responsible for the security, privacy, reliability and compliance of 85%
Source: IDC – The Diverse and Exploding Universe – March 2008
10
INCREASED DATA MOBILITY
75% of the U.S. Workforce will be Mobile by 2011 The portable data defense solutions market is growing at 35%
Source: IDC – January 2008
11
INCREASED DATA BREACHES
In 2009, U.S. companies experienced 498 data breaches exposing 222,477,043 records
35% of the records breached were in the government/military segment
And that’s just reported breaches!
Govt./Military
Source: Identity Theft Resource Center – 2009 Data Breach Stats January 6, 2010
12
REGULATIONS INCREASING
• 40% of the WW Digital Universe will be
Subject to Security in 2010
• 20% of the WW Digital Universe will be
Subject to Compliance/Regulations in 2010
• Data Breach Reporting Laws in 45 States
Source: Scott&Scottllp – State Data Breach Notification Laws - October 2009
13
COST OF DATA BREACH GROWS
$202$197
$182
$138
$0
$50
$100
$150
$200
$250
Average 2008 Average 2007 Average 2006 Average 2005
Cost of data breach on a per victim basis over four years
Average cost per record exposed grows to $202
Average cost per data breach grows to $6,655,758
Source: Ponemon Institute – Fourth Annual U.S. Cost of Data Breach Study January 2009
$6,655,758$6,355,132
$4,789,637$4,541,429
$0
$1,000,000
$2,000,000
$3,000,000
$4,000,000
$5,000,000
$6,000,000
$7,000,000
Average 2008 Average 2007 Average 2006 Adjusted Average2005
Average organizational cost of data breach cost over four years
14
PORTFOLIO SUMMARY
14
15
A BETTER MODEL
• Most offerings come from companies focused on either Storage or Security.
• Imation has supplemented its foundation as a storage company with key partnerships in security to create a broad, unique, secure storage Defender Collection portfolio
+
16
DEFENDER COLLECTION:A Natural Extension
• DataGuard rf™ Tape Tracking System– Enhanced tape-location tracking system
• DataGuard Transport and Storage Case– Enhanced physical protection for tape– GPS solution available in Europe
• Imation Secure Scan– Allows data center managers to secure existing tape libraries– Only LTO scanning product that locks tape cartridges for in-transit protection
17
• Physical Security
• Encryption
• Authentication
• Malware Protection
• Management
OUR SECURITY ELEMENTS
18
The Federal Information Processing Standardization (FIPS) 140-2 U.S. government security standard that specifies requirements for cryptography modules
• FIPS is required by law for U.S. government purchases
• Strictly enforced in Canada
• Gaining international recognition in Asia and Europe
• Being adopted within regulated industries (e.g. Financial, Healthcare)
FIPS 140-2 Level 1 The lowest level, imposes very limited requirements; loosely, all components must be "production-grade" and various egregious kinds of insecurity must be absent
FIPS 140-2 Level 3 Adds requirements for physical tamper-resistance and identity-based authentication, and for a physical or logical separation between the interfaces by which "critical security parameters" enter and leave the module, and its other interfaces
FIPS 140-2 Level 2 Adds requirements for physical tamper-evidence and role-based authentication.
FIPS 140-2 Level 4 Makes the physical security requirements more stringent, and requires robustness against environmental attacks. Level 4 is currently not being utilized in the market
Description of FIPS 140-2 Four Levels
FIPS BASICS
19
OUR DIFFERENTIATION
• Broadest Industry Portfolio:
– Optical Products - CD/DVD
– USB Flash Drives
– External Hard Disk Drives
– Management Software
• Global Government-Validated Encryption
• Multiple Authentication Methods
– Password (hardware rules)
– Biometric + Password
– CAC/PIV + Biometric (3-factor)
• Multi-user Solutions
20
TARGET MARKETS
Global Governments• Unites States• Canada• European• APAC & Japan
Military & Intelligence• Department of Defense• Global Military Organizations• Global Intelligence Community
Enterprise/SMB Customers• Banking/Financial• Medical/Healthcare• Law Firms• Other Regulated Industries
21
PORTFOLIO SUMMARY
SOHO/SMBConsumer EnterpriseLarge EnterpriseGovernment/Financial Services
TARGET MARKETS
Secure Storage
ManagedSecure Storage
ManagedSecure Storage
& Strong Authentications
ManagedSecure Storage
& Strong Authenticationswith SmartCard
FU
NC
TIO
NA
LIT
Y
Defender F100 & F150
Features:FIPS 140-2 L3Cap design
Defender F50Features:
FIPS 140-2 L1Pivot design
Defender H100 &H200 +BioFeatures:
FIPS 140-2 L3
Defender F200 +BioFeatures:
FIPS 140-2 L3
Defender OpticalFeatures:
FIPS 140-2 L1
Available:May ‘10
Available:May ‘10
Available:June ‘10
Available:May/June ‘10
Available:June ‘10
22
SECURE PORTABLE STORAGE
Defender F50 Pivot Flash Drive
Defender F100 Flash Drive
Defender F150 Flash Drive
Defender F200 Biometric Flash Drive
Defender H100 Hard Drive
Defender H200 Biometric Hard Drive
Defender Optical Media
●
●
●
●
●2
56
-bit
AE
S
Ha
rdw
are
E
nc
ryp
tio
n
Pa
ss
wo
rd
Au
the
nti
ca
tio
n
Bio
me
tric
A
uth
en
tic
ati
on
Mu
ltip
le U
se
r A
cc
ou
nts
●
●
●
●
●
●
●
●
●
●
●
●
●
●
Op
tio
na
l C
en
tra
l M
an
ag
em
en
t
●
●
●
●
●
●
●
25
6-b
it A
ES
S
oft
wa
re
En
cry
pti
on
●
●
23
PORTFOLIO DETAILS
23
24
Key Features:• FIPS 140-2 Level 1 Validated
• AES 256-bit Software Encryption
• Integrated Password Recovery Option
• Printable Formats: CD-R, DVD-R, BD-R
• Two-year Limited Warranty
DEFENDER OPTICAL
Availability:
March 2010 (OEM Branded)
May/June 2010 (Imation Branded)
Suggested Price $2.10 - $7.50
25
Key Features:• FIPS 140-2 Level 1 Validated
• AES 256-bit Software Encryption
• One-factor Authentication
• Pivot Design – never lose cap
• Capacities: 2GB, 4GB, 8GB, 16GB
• Five-year Limited Warranty
Optional
• Central Management Software
DEFENDER F50
Availability: April 2010
Suggested Price TBD
26
DEFENDER F100 & F150
Availability: April 2010
Suggested Price $54.00 - $299.00
Defender F150Metal Enclosure
Defender F100Plastic Enclosure
Key Features:• FIPS 140-2 Level 3 Validated
• AES 256-bit Hardware Encryption
• One-factor Authentication
• Tamper-resistant, Waterproof and Dustproof Plastic or
Metal Enclosure
• Capacities: 1GB, 2GB, 4GB, 8GB, 16GB, 32GB
• Five-year Limited Warranty
Optional
• Antivirus Software
• Central Management Software
27
DEFENDER F200 + BIO
Availability: June 2010
Suggested Price $99.00 - $349.00
Key Features:• FIPS 140-2 Pending Level 3 Validation
• AES 256-bit Hardware Encryption
• Two-factor Authentication
• Biometric (fingerprint) Identification
• Tamper-resistant, Waterproof and Dustproof Metal
Enclosure
• Capacities: 1GB, 2GB, 4GB, 8GB, 16GB, 32GB
• Five-year Limited Warranty
Optional
• Antivirus Software
• Central Management Software
28
DEFENDER H100
Availability: June 2010
Suggested Price TBD
Key Features:• FIPS 140-2 Pending Level 3 Validation
• AES 256-bit Hardware Encryption
• One-factor Authentication
• Tamper-resistant Metal Enclosure
• Capacities: 250GB, 320GB, 500GB
• Five-year Limited Warranty
Optional
• Antivirus Software
• Central Management Software
29
DEFENDER H200 + Bio
Availability: June 2010
Suggested Price TBD
Key Features:• FIPS 140-2 Pending Level 3 Validation
• AES 256-bit Hardware Encryption
• Two-factor Authentication
• Biometric (fingerprint) Identification
• Tamper-resistant Metal Enclosure
• Capacities: 250GB, 320GB, 500GB
• Five-year Limited Warranty
Optional
• Antivirus Software
• Central Management Software
30
DEFENDER SOFTWARE SUITE
• Access Standard
• Access Enterprise– Security policies– Device provisioning– Custom software images– Key management (user rescue)– Administrative data recovery– Updating– Reporting and auditing– MXI, Imation, McAfee brands only
• Malware – AntiVirus Scanning
• Access Identity– Same as Access Enterprise but includes digital identity capabilities
31
PORTFOLIO DIRECTION
Defender F175 Pivot Flash Drive
Secure Mobile Desktop
Product Extension – Secure Solid State Drives
– Secure Removable Hard Disk Systems (RDX)
Enhanced Features– Integrating Digital Identity Capabilities
• RSA Soft Tokens• Digital Certificates
– Integrating SmartCard Technology
32
KEY TAKEAWAYS
• Need for data-at-rest security solutions is rapidly growing
• As the data storage industry leader, Imation is uniquely positioned to extend its offerings into secure storage solutions
• Our new secure data storage product portfolio:– Meets the most advanced global data encryption standards
– Will be industry’s broadest
– Offers solutions from enterprise to personal use
33
THANK YOU
Keith G. Schwartz Director of Global Strategic Growth and Public Sector
Jason J. Elles Imation Global Brand Manager