Upload
hans-w-flisnes
View
225
Download
0
Embed Size (px)
Citation preview
End point protection
• Once there Was Something
Called Antivirus
• Developed to become
Endpoint Protection
Sometimes known as anti-malware software,
is computer software used to prevent, detect and
remove malicious software
2
Endpoint developed
3
Is this secured
Added featuresAntivirus
anti-malware
IntrusionPrevention
WebFiltering
WANOptimization Firewall
Application Control
All is ok !!!!
4
Starts to be Complicated
sw upgrades !!!
When is you security On.
only when the
Operating system is On
What about
booting up
access control
encryption.
What Exactly is Endpoint Protection
5
What are we protecting.
Connected to the internal network ?
PC Laptop flexible
Business and Private use
Protecting mobile units
6
Is This the “Killer” App?
The second step.- access control
- protecting the data
Trying to safe the situation
8
• We make more roles and
restrictions- Don’t allow mobile phones,
just unimportant mails.
- Tablets not allowed
- External HD
• PC/ Laptops no mobility
• Job or private related use
Questions about Endpoint
Protection
1. How to deal with mobile
devices
2. Figure out BYOD
Network secured
9
FirewallApplication
ControlWeb
Filtering
Antivirus
AntispamIPS
Network Based Functions
Weak Links Waiting to be Exploited
The weakest link
10
FirewallApplication
ControlWeb
Filtering
Antivirus
AntispamIPS
Cracks in the Protection - moving the end points - internal threats
How to deal with mobileDevices
Figure out BYOD
Endpoint don’t talk withnetwork based systems.
What does “Dave” want to do
• He wants to do his job
• What do we offer him- Complicated Roles
- access difficulties
- security system with operational challenges
• Dave is not stupid
- finds ways to be efficient, and gets the work done.
- he is human
- his PC is not protected
December 2011 12
Information leakage
13
Laptop protection is the weakest part in the chain.
• 1 out of 10 laptops are lost or
• 5,500,000+ laptops were in the U.S. in the past 3 years
• 57% of corporate crimes are linked to laptops.
~ 2014 FBI Crime Statistics Report
“Dave” wants to do his job
• How can we help “Dave”
• We need to secure - Pre-boot stage – access control
- encryption that
- does not slow him down
- no hassel with sw upgrades
- user friendly
December 2011 15
• When the PC is powered on - Insert your key card
- Enter your PIN
• Dave can not start his PC without
the safety is on
- access control, 2 factor authentication
- all data is always encrypted
• When powered off all keys are deleted
16
Safe and secure with no human error
Sealing the Leaks
Hiddn represent a paradigm shift in encryption security
• Approved in Norway, NSM, Dec. 2014. restricted (B)
- coCrypt USB Flash drive ( No other USB flash drive is approved )
- Laptop delivered to project at Norwegian Defense
• Approved in Italy, Dec. 2015 . restricted (B)
- coCrypt USB Flash drive ( No other USB flash drive is approved )
• Interim approved in Nederland for Laptops
(confidential (C)) final improvement in 2q 2016
• Approved for Global Hawk
• FIPS approved
• Approval process ongoing in
other countries
18
[hiddn]®’s PC/laptop solutions and
coCrypt USB flash drives are
approved and used by:
- The Norwegian Government
- Norwegian Defense
- The Dutch Government
- Northrop Grumman (Global
Hawk)
TECHNOLOGY TRUSTED BY DEMANDING CUSTOMERS
With Hiddn technology you newer compromise on
- safety- your data is always
encrypted- no one can access laptop- when powered off all
keys are deleted
- user friendly- no user training is needed
The weakest link
20
FirewallApplication
ControlWeb
Filtering
Antivirus
AntispamIPS
Cracks in the Protection - moving the end points - internal threats
The Consequence of Inaction Pretty Damn Malicious