Upload
evelyn-wilson
View
215
Download
0
Tags:
Embed Size (px)
Citation preview
copyright CryptoTec AG 2015 1
Communication in stealth
mode
copyright CryptoTec AG 2015 2copyright CryptoTec AG 2015
About us
iDev Gmbh• IT security expert• ISTQB certification in the area of
quality management• Business environment is the sports
betting industry with billions of turnover
CryptoTec AG• Goal: high security encrypted data
management• Technology & usability united• Cryptographic systems
2
copyright CryptoTec AG 2015 3copyright CryptoTec AG 2015
Internet threat
3
copyright CryptoTec AG 2015 4
Internet threat
copyright CryptoTec AG 2015 55
Internet threat
copyright CryptoTec AG 2015
copyright CryptoTec AG 2015 66
Internet threat
copyright CryptoTec AG 2015
copyright CryptoTec AG 2015 7
CybercrimeNew dimension
of threat
copyright CryptoTec AG 2015 7
copyright CryptoTec AG 2015 8
Cybercrime
• Attacks from the inside and via social engineering• Huge data storage devices• Industrial espionage• Centralized servers• VPN• Webbrowser • Invitation by e-mail (containing links)• Hacker
copyright CryptoTec AG 2015 8
New dimension
of threat
copyright CryptoTec AG 2015 9
CryptoTec ZoneEncrypted communication & highly secure file transfers
Intuitive – straightforward – timesaving
copyright CryptoTec AG 2015 9
copyright CryptoTec AG 2015 10
Preventive – CryptoTec Zone
• CryptoLibensures end-to-end encryption
• CryptoStoragegarantees that all data will only be transferred & stored encrypted
• Usability & maximum performance (faster than VPN) • Automated cryptography• CryptoTec Zone
only allows authorized CryptoIDs • Closed User Group (CUG) • Monitoring 2.0 • Workflow unimpaired:
- Delta Coding optimized- Standard applications (MS Office)
useable
copyright CryptoTec AG 2015 10
copyright CryptoTec AG 2015 11copyright CryptoTec AG 2015 11
copyright CryptoTec AG 2015 12
100% protection against unauthorized access by:
• Administrators and staff• Softwaredevelopers and providers• Service providers (Mail, Cloud, Mobile, Internet, WLAN)• TC & IT providers• Organzied crime• Hackers• Intelligence services and foreign authorities
Highsecurity solutionAccess protection
copyright CryptoTec AG 2015 12
copyright CryptoTec AG 2015 13
Become an IT security expert• Integration into Workflow• Customizing• Modular extensions
(Change according to development)• Human and M2M communication• Redundant and fully encrypted
high security servers• Operation of the Trust Center
copyright CryptoTec AG 2015 13
copyright CryptoTec AG 2015 14
Exponential growthof the IT security budget
copyright CryptoTec AG 2015 14
copyright CryptoTec AG 2015 15
Academic Alliance• Free software version• Intellectual property must be protected• Friedrich-Alexander-University Erlangen-Nuremberg• RWTH Aachen University• UZH Zurich
https://www.cryptotec.com/aa
copyright CryptoTec AG 2015 15
copyright CryptoTec AG 2015 16
Thank you for your
attentionCryptoTec AGSpichernstr. 7350672 Köln
T: +49221 222 8383 0F: +49221 222 8383 [email protected]
copyright CryptoTec AG 2015 17
Any questions?