1 / 25

Welcome to: Workstation Security and Removable Media Encryption Presented by Jim Shaeffer

Welcome to: Workstation Security and Removable Media Encryption Presented by Jim Shaeffer. Today’s Agenda. Regulatory Compliance Security Threats Disknet Pro Solution. Regulatory Compliance: The Minefield. Privacy & Security:

aitana
Télécharger la présentation

Welcome to: Workstation Security and Removable Media Encryption Presented by Jim Shaeffer

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Welcome to: Workstation Security and Removable Media Encryption Presented by Jim Shaeffer

  2. Today’s Agenda • Regulatory Compliance • Security Threats • Disknet Pro Solution

  3. Regulatory Compliance: The Minefield • Privacy & Security: • Personal Information Protection Electronic Document Act (PIPEDA) • US Patriot Act \ Homeland Security (Critical Infrastructure) • Personal Health Information Protection Act (PHIPA) • Health Insurance Portability and Accountability Act (HIPAA) • SEC Rules 17a-3 & 17a-4 re: securities transaction retention • Gramm-Leach Bliley Act (GLBA) privacy of financial information • Children’s Online Privacy Protection Act • European Privacy Directive (Safe Harbor Framework) • Clinger-Cohen Act (US Gov.) • Federal Information Security Mgmt. Act (FISMA) Finance: • Sarbanes-Oxley (US) • Basel 2 (World Bank) • Turnbull Report (UK) • Canadian Bill 198 (MI 52-109 & 52-111) Other International IT Models: • Australian Corporate Governance for ICT DR 04198 • Intragob Mexican Quality Effort • C6 – Canada

  4. Regulatory Compliance: Legislation/Regulations Timeline 1970 1980 1990 2000 • C6 – Canada • USA Patriot Act 2001 • EC Data Privacy Directive • CLERP 9 • CAN – SPAM Act • FISMA 2002 • CIPA 2002 • COPPA 2003 • NERC 1200 (2003) • Sarbanes Oxley • Basel II • EU Data Protection Directive • HIPAA 1996 • FDA 21CFR Part 11 • GLBA 1999 • Privacy Act of 1974 • Foreign Corrupt Practice Act of 1977 • Computer Security Act of 1987

  5. Security Threats: 2K/XP Figures Managing Information Strategies Survey - 100 biggest users of IT 2004 • 50% currently using 2K, many “are currently migrating to XP” • Most will be on 2K/XP, and therefore vulnerable, by the end of 2005

  6. Workstation Security Facts Comp TIA Survey 03/18/03 • 63% of Security Threats were internal as opposed to external! MSBlaster/Lovesan • 30,000 PCs/hour infected at peak • Standard defense = continual and repeated AV signature updates W32/Sobig • 08/21/03 Sobig Windows virus the biggest virus • MessageLabs intercept >1 million copies in first 24hrs • AOL had stopped >11.5 million copies since August 18th, 2003 Summary • The vast majority of companies have realized the threats coming in via web/email gateways and are taking precautions • 60-80% of security breaches are internal. The desktop is at least as serious a threat as web/email gateways.

  7. Identifying Security Threats

  8. Native Solutions to these problems? • Switch off USB Ports in the PC’s BIOS • Turn off USB Ports using MS policy editor Are These Controls Adequate? Answer: NO! Why? Non-file system USB devices are also disabled. Legacy-free PCs (no PS2 ports for keyboards and mice) won’t work. USB Printers, Mice, Keyboards, Biometrics etc. • These devices ARE useful and necessary in most environments • Group/network management unworkable and not granular enough • Very limited scope of control with Native MS Controls – either ON or OFF • Once access has been granted, these issues need to be considered: • Imported Data • What data files are being introduced into the workstation/network? (viruses, unsuitable content, etc.) • Exported Data • What data files are being exported from the workstation/network? • Is that data sensitive?

  9. Disknet Pro Overview Disknet Pro Core Components • Combination of Content and Virus Checking • Extensive Audit Capability • Transparent Encryption • Image Management

  10. How does Disknet Pro manage these threats? What is a profile? A profile is a collection of pre-defined Disknet settings that can be applied to your groups and users Profile based PSG PGD EPM RMM RMM

  11. How does Disknet Pro manage these threats? User Group Profile Dept 1 BP PSG Assign Edith, Roger Kelly, Neil RMM Jasmine, Colin

  12. Disknet Pro 4 Enterprise Server/Client Concept Users/Groups Disknet Server Logon Profile Administration BP PSG Assigned Logs Disknet Clients

  13. Reflex Disknet Pro – Centralized Administration • MMC Based Administration console using SQL back end database • Highly scalable across multiple domains • Automatically integrates into MS NT Domain/2K Active Directory & Novell eDirectory users/groups

  14. Key Disknet Pro Benefits Control Data Theft/Loss - RMM/PGD/EPM • Controls Software Piracy issues • Stops theft of confidential information; e.g. sales database, financial information, commercially sensitive information, criminal records, informants details etc., through access control for removable media and optional encryption Control File Introduction - RMM/PGD/PSG • Control introduction of unlicensed software • Stop introduction of viruses, pests/spyware and/or untested software • Stop the introduction of unapproved restricted/confidential/top secret information • Restrict the introduction of unapproved Video/Audio files (MPG, MP3, JPG etc). • MSBlast/Sobig – stopped in their tracks by DisknetPro

  15. Differentiating Factors • Only software security solution that combines content and virus checking with data encryption to provide total protection • Only software solution with Common Criteria and FIPS accreditation • ‘Role based’ approach to managing desktop security ensures scalability across the enterprise • Filtering of audit events enables key personnel to focus on trapping events in order of priority • Only product that enables secure data to be accessed on third party machines without having to install software • Only product that integrates with both Active Directory and eDirectory

  16. Disknet Pro Scalability • Disknet Pro is designed for small to large deployments • MMC console plug-in allows for remote control of entire network • Large clients include British RAF where over 28,000 PCs are managed from a single site • Other centrally managed customers are EDS, Woolwich, Police, UN, NATO, EDF, US DOD Central Command

  17. Disknet Pro Reliability • No conflicts with XP, Win2x O/S • Automatic upgrades to Disknet Pro occur through the network using GPO, SMS, etc. • Less network downtime - actually protects the workstation build and so the network is inherently more reliable • Workstation virus infections and pest/spyware incidents are eliminated

  18. Disknet Pro Simplicity • Centrally managed • Configurable messages tells the users what is happening • Disknet Pro removes the need for complex and costly training

  19. What our customers are saying about devices and data… • Device Level Control • Royal Air Force • “With USB devices, if you plug it straight into the computer, you can bypass passwords and get right on the system … we had to plug the gap.” Peter D’Ardenne, Wing Commander, British RAF • Data Level Control • Family Investments • “Reflex Disknet Pro was installed to support our strategic security aims and to safeguard our position in achieving FAST accreditation in 2003. It has addressed many risks but additionally ensures that our practices relating to the holding, use and disclosure of data are always in accordance with our data protection notifications.” Annette Matthews, Head of IS, Family Assurance • Skipton Building Society • “By using Reflex Disknet Pro for over six years, I can say that Skipton Building Society has resisted 99.9% of virus infections. On the few occasions when we did become infected, it was traced back to clients left unprotected by Reflex’s software, and that can be attributed to an internal failure in security policy. Reflex Disknet Pro even protects against the newer security threats such as spyware and keylogging, which in a banking environment like ours is critical.” Ron Logie, Data Security Manager, Skipton Building Society

  20. Customer Success Stories • UK Ministry of Defense – 80,000 Licenses • UK Central & Local Government • UK Police – 15,000 Licenses • UK Banks & Building Societies • US DoD Fort Bragg • US DoD Fort Gordon • US DoD Central Command • US DoD Air Force • US Harvard Management • US Coastal Federal Credit Union • US State of Colorado Dept. of Personnel & Admin • Tarrant County Texas Public Health Department • Nebraska Supreme Court • Over 1,000,000 Licenses worldwide

  21. Third Party Accreditations: April, 2005 Common Criteria

  22. Third Party Accreditations • 2005 - Reflex Disknet Pro V4.5 Common Criteria EAL2 • 2005 - Reflex Disknet Pro V4.5 FIPS 197 • 2004 - Reflex Disknet Pro V4.4 GYPSI Trials • 2004 - Reflex Disknet Pro V4 DIPCOG • 2004 - Reflex Disknet Pro V4.4 CCT Mark (pending) • 1999 - Reflex Disknet NT V1.7 UK ITSEC E2

  23. Disknet Pro Demonstrations Available on the Web http://www.reflex-magnetics.co.uk/products/disknetpro/ • PSG Prevents an unexpected web download • PSG Blocks .mp3 file download • PSG Prevents a user delete request • PSG Prevents a user rename request • RMM Authorizes removable media • EPM Encrypts removable media

  24. Disknet Pro 30 Day No Cost Evaluation http://www.reflex-magnetics.com/downloads/disknet/

  25. Disknet Pro Contact Information Jim Shaeffer JCS & Associates, Inc. Phone 800-968-9527 E-Mail: jcs@jcsinc.com Web Site: http://www.reflex-magnetics.com

More Related