22
Hiddn Security AS 2016 Hvordan stoppe datalekkasje fra mobile enheter.

10. hddn-datalekaje-hs-01

Embed Size (px)

Citation preview

Hiddn Security AS 2016

Hvordan stoppe datalekkasje fra mobile enheter.

End point protection

• Once there Was Something

Called Antivirus

• Developed to become

Endpoint Protection

Sometimes known as anti-malware software,

is computer software used to prevent, detect and

remove malicious software

2

Endpoint developed

3

Is this secured

Added featuresAntivirus

anti-malware

IntrusionPrevention

WebFiltering

WANOptimization Firewall

Application Control

All is ok !!!!

4

Starts to be Complicated

sw upgrades !!!

When is you security On.

only when the

Operating system is On

What about

booting up

access control

encryption.

What Exactly is Endpoint Protection

5

What are we protecting.

Connected to the internal network ?

PC Laptop flexible

Business and Private use

Protecting mobile units

6

Is This the “Killer” App?

The second step.- access control

- protecting the data

How protected are we.

7

Cracks in the Protection

Trying to safe the situation

8

• We make more roles and

restrictions- Don’t allow mobile phones,

just unimportant mails.

- Tablets not allowed

- External HD

• PC/ Laptops no mobility

• Job or private related use

Questions about Endpoint

Protection

1. How to deal with mobile

devices

2. Figure out BYOD

Network secured

9

FirewallApplication

ControlWeb

Filtering

Antivirus

AntispamIPS

Network Based Functions

Weak Links Waiting to be Exploited

The weakest link

10

FirewallApplication

ControlWeb

Filtering

Antivirus

AntispamIPS

Cracks in the Protection - moving the end points - internal threats

How to deal with mobileDevices

Figure out BYOD

Endpoint don’t talk withnetwork based systems.

Human error

11

What does “Dave” want to do

• He wants to do his job

• What do we offer him- Complicated Roles

- access difficulties

- security system with operational challenges

• Dave is not stupid

- finds ways to be efficient, and gets the work done.

- he is human

- his PC is not protected

December 2011 12

Information leakage

13

Laptop protection is the weakest part in the chain.

• 1 out of 10 laptops are lost or

• 5,500,000+ laptops were in the U.S. in the past 3 years

• 57% of corporate crimes are linked to laptops.

~ 2014 FBI Crime Statistics Report

Information leakage, Gardermoen

14

2014 FBI Crime Statistics Report

“Dave” wants to do his job

• How can we help “Dave”

• We need to secure - Pre-boot stage – access control

- encryption that

- does not slow him down

- no hassel with sw upgrades

- user friendly

December 2011 15

• When the PC is powered on - Insert your key card

- Enter your PIN

• Dave can not start his PC without

the safety is on

- access control, 2 factor authentication

- all data is always encrypted

• When powered off all keys are deleted

16

Safe and secure with no human error

Sealing the Leaks

Hiddn a unique Solution

17

Hiddn represent a paradigm shift in encryption security

• Approved in Norway, NSM, Dec. 2014. restricted (B)

- coCrypt USB Flash drive ( No other USB flash drive is approved )

- Laptop delivered to project at Norwegian Defense

• Approved in Italy, Dec. 2015 . restricted (B)

- coCrypt USB Flash drive ( No other USB flash drive is approved )

• Interim approved in Nederland for Laptops

(confidential (C)) final improvement in 2q 2016

• Approved for Global Hawk

• FIPS approved

• Approval process ongoing in

other countries

18

[hiddn]®’s PC/laptop solutions and

coCrypt USB flash drives are

approved and used by:

- The Norwegian Government

- Norwegian Defense

- The Dutch Government

- Northrop Grumman (Global

Hawk)

TECHNOLOGY TRUSTED BY DEMANDING CUSTOMERS

With Hiddn technology you newer compromise on

- safety- your data is always

encrypted- no one can access laptop- when powered off all

keys are deleted

- user friendly- no user training is needed

The weakest link

20

FirewallApplication

ControlWeb

Filtering

Antivirus

AntispamIPS

Cracks in the Protection - moving the end points - internal threats

The Consequence of Inaction Pretty Damn Malicious

TECHNOLOGY

The only data protection

you will ever need

21

December 2011 22