Symantec Encryption Overview Alvaro Freyre Manager, Encryption Specialist LAM Presentation Identifier Goes Here 1
Agenda 1 Contactos 2 Mercado 3 Problemas y Soluciones 4 Preguntas Presentation Identifier Goes Here 2
Contacts Sus Consultores de Criptografia Alvaro Freyre - Comercial Encryption Specialist LAM (California) Alvaro_Freyre@Symantec.com + 1 650 319 9062 office, + 1 650 387 8178 mobile Andres Bore - Technico Senior Systems Engineer / Trainer (Florida) Andres_Bore@Symantec.com + 1 772 223 9507
Cuánto vale su identidad? La identidad de Marcelo fue robada, pero se la devolvieron
Creciente Amenaza Sobre Correo Electrónico. 2 millones / segundo. 541 millones confían en el correo electrónico para negocios. Usuarios corporativos envian reciben promedio 133 / dia. 36% compañías no tienen políticas de seguridad sobre el correo o la mensajería instantanea. CORREO ELECTRONICO = CARTA POSTAL Sources: Radicati Group, Osterman Research
Reglas & Requerimientos Globales PCI DSS Basel II Sarbanes Oxley (US, JP, etc.) Únicos por País CO Circular 052 y 014 VE Normativa Bancaria EEUU CASB 1386 MX Ley Federal de Protección de Datos Personales, Circular 10 y 14 Conocen sus Regulaciones Locales?
PCI DSS 12 REGLAS # 3: Proteger datos almacenados # 4: Encriptar comunicaciones de información sensible por la red pública # 7: Restringir el acceso a la información en base a la Necesidad de Saber Whitepaper PGP : Requerimientos para cumplir con Payment Card Industry Data Security Standard (PCI DSS)
?Que es Encrypcion? Encrypcion is el proceso de hacer informacion imposible leer sin que el recipiente tenga la llave para desencryptarla. Soluciones: Hard Disk & Removable Media Email (gateway and peer-peer) Network File Share Command Line Device Control Mobile Devices Key Management 8
Encryption Use Cases
Encryption Use Cases
Encryption Use Cases
Encryption Use Cases
Encryption Use Cases
Encryption Use Cases
Encryption Use Cases
Encryption Use Cases
Encryption Use Cases
Encryption Use Cases
Encryption Use Cases
Encryption Use Cases
Encryption Use Cases
Encryption Use Cases
Encryption Use Cases
Universal Server Unified Encryption Management Whole Disk Encryption Laptop & Disk Security Portable USB Device & Media Encryption Desktop Email Email, File, Disk, & IM Encryption Universal Server Central Management of Encryption Applications Universal Gateway Email User-transparent, Gateway Email Encryption Smartphone Solutions PGP Mobile PGP Support Package for BlackBerry Command Line Secure FTP/Batch & Backups NetShare Shared Server Storage Security
Las Soluciones de PGP Datos Almacenados Datos en Tránsito Datos en Uso Automatización y Gestión PGP Whole Disk Encryption (Full Disk) PGP Netshare PGP Endpoint PGP Portable PGP Desktop Email PGP Mobile PGP Universal Gateway Email PGP PDF Messenger PGP Support Package for Blackberry PGP Command Line PGP Software Development Kit PGP Universal Server 25
Cliente Tipico 7 Anos Customer Revenue Contribution over Time Our Broad Solutions drive increasing revenue streams as customer data protection strategies evolve Identity solutions and hybrid delivery models increase these revenue streams 26
Acelerando el Tiempo de Instalación Tiempo Para Instalar Productos Independientes PGP Encryption Platform 1era 2da 3era 4ta 5ta # de Aplicaciones Instaladas 27
Account Profiles Encryption: Financial services Government / Military Healthcare Manufacturing Pharmaceutical Energy Highly regulated industries (Utilities, Legal etc) Key Management Financial Services Large Enterprise Accounts
Preguntas?Que es el problema??cuantos laptops tienen??que pasa si no hacen nada?
Encryption Questions What is the problem? Have you deployed laptop / desktop encryption in your enterprise? Refresh when? Are you protecting the risk of a lost USB or removable media? Do your end users send emails containing critical or sensitive data? Are you aware of the risks of a lost or compromised email? Process to protect data sent to 3 rd parties using FTP or other transmission methods? Protecting data and email traffic on your mobile device population? How are you protecting from the leakage of sensitive information through the unprotected ports on laptops, desktops, gateway? How are you protecting sensitive data that resides in file shares ie SharePoint etc Do you currently have different security systems that generate and manage their own encryption keys? What happens if you do nothing?
Thank you! Alvaro Freyre alvaro_freyre@symantec.com + 1 650 319 9062 SYMANTEC PROPRIETARY/CONFIDENTIAL INTERNAL USE ONLY Copyright 2010 Symantec Corporation. All rights reserved. Presentation Identifier Goes Here 31