Upload
cleberfmodesto
View
229
Download
0
Embed Size (px)
Citation preview
8/8/2019 Encryption v3 Vision_2010
1/32
1
Symantec Encryption Overview
Alvaro Freyre
Manager, Encryption Specialist LAM
Presentation Identifier Goes Here
8/8/2019 Encryption v3 Vision_2010
2/32
SYMANTEC VISION 2010
Agenda
Presentation Identifier Goes Here 2
Contacts1
Market Overview2
Problems - Solutions3
Customer Questions4
8/8/2019 Encryption v3 Vision_2010
3/32
SYMANTEC VISION 2010
Contacts Your Encryption Consultants
Alvaro Freyre - Commercial
Encryption Specialist LAM (California)
+ 1 650 319 9062 office, + 1 650 387 8178 mobile
Andres Bore - Technical
Senior Systems Engineer / Trainer (Florida)
+ 1 772 223 9507
8/8/2019 Encryption v3 Vision_2010
4/32
SYMANTEC VISION 2010
Cunto vale su identidad?
La identidad de Marcos fue robada, pero se la devolvieron
8/8/2019 Encryption v3 Vision_2010
5/32
SYMANTEC VISION 2010
Creciente Amenaza Sobre Correo Electrnico.
2 millones / segundo.
541 millones confan en el correoelectrnico para negocios.
Usuarios corporativos envian recibenpromedio 133 / dia.
36% compaas no tienen polticas deseguridad sobre el correo o lamensajera instantanea.
Sources: Radicati Group, Osterman Research
CORREO ELECTRONICO = CARTA POSTAL
8/8/2019 Encryption v3 Vision_2010
6/32
SYMANTEC VISION 2010
Reglas & Requerimientos
Globales
PCI DSS
Basel II
Sarbanes Oxley (US, JP, etc.)
nicos por Pas
CO Circular 052 y 014
VE Normativa Bancaria
EEUU CASB 1386
MX
Ley Federal de Proteccin de Datos
Personales,
Circular 10 y 14
Conocen sus Regulaciones Locales?
8/8/2019 Encryption v3 Vision_2010
7/32
SYMANTEC VISION 2010
PCI DSS
12 REGLAS
# 3: Proteger datos almacenados
# 4: Encriptar comunicaciones de informacin sensible por la red
pblica# 7: Restringir el acceso a la informacin en base a la Necesidad
de Saber
WhitepaperPGP : Requerimientos para cumplir con Payment
Card Industry Data Security Standard (PCI DSS)
8/8/2019 Encryption v3 Vision_2010
8/32
SYMANTEC VISION 2010
Brasil
Consumer Protection Code 1990
Telecommunications Act of 1997
Article 5 of Federal Constitution 1988
Habeas Data Law #9507 1997
Financial Institutions Secrecy Law # 105 2001
Brasil Civil Code #10 406 2002
8/8/2019 Encryption v3 Vision_2010
9/32
SYMANTEC VISION 2010
Mexico
Article 16 of Constitution 1917
The E Commerce Act
The Revised Federal Consumer Protection Act
Law of Protection and Defense of the User of Financial Services Federal Communications Act
Credit Bureau Act
Mexico D.F.
Law of Civil Liability for the Protection of the Right to Private Life, Honorand Image
Colima, Jalisco
8/8/2019 Encryption v3 Vision_2010
10/32
SYMANTEC VISION 2010
What is Encryption?
Encryption is a process to make information humanlyunreadable except by someone that knows how to decrypt it.
Symantecs centrally managed, enterprise encryption solutions:
Hard Disk & Removable Media
Email (gateway and peer-peer)
Network File Share
Command Line
Device Control
Mobile Devices
Key Management
10
8/8/2019 Encryption v3 Vision_2010
11/32
SYMANTEC VISION 2010
Encryption Use Cases
8/8/2019 Encryption v3 Vision_2010
12/32
SYMANTEC VISION 2010
Encryption Use Cases
8/8/2019 Encryption v3 Vision_2010
13/32
SYMANTEC VISION 2010
Encryption Use Cases
8/8/2019 Encryption v3 Vision_2010
14/32
SYMANTEC VISION 2010
Encryption Use Cases
8/8/2019 Encryption v3 Vision_2010
15/32
SYMANTEC VISION 2010
Encryption Use Cases
8/8/2019 Encryption v3 Vision_2010
16/32
SYMANTEC VISION 2010
Encryption Use Cases
8/8/2019 Encryption v3 Vision_2010
17/32
SYMANTEC VISION 2010
Encryption Use Cases
8/8/2019 Encryption v3 Vision_2010
18/32
SYMANTEC VISION 2010
Encryption Use Cases
8/8/2019 Encryption v3 Vision_2010
19/32
SYMANTEC VISION 2010
Encryption Use Cases
8/8/2019 Encryption v3 Vision_2010
20/32
SYMANTEC VISION 2010
Encryption Use Cases
8/8/2019 Encryption v3 Vision_2010
21/32
SYMANTEC VISION 2010
Encryption Use Cases
8/8/2019 Encryption v3 Vision_2010
22/32
SYMANTEC VISION 2010
Encryption Use Cases
8/8/2019 Encryption v3 Vision_2010
23/32
SYMANTEC VISION 2010
Encryption Use Cases
8/8/2019 Encryption v3 Vision_2010
24/32
SYMANTEC VISION 2010
Encryption Use Cases
8/8/2019 Encryption v3 Vision_2010
25/32
SYMANTEC VISION 2010
Encryption Use Cases
8/8/2019 Encryption v3 Vision_2010
26/32
SYMANTEC VISION 2010
Universal Server Unified Encryption Management
Smartphone Solutions PGPMobile
PGPSupport Package for BlackBerry
Whole Disk Encryption Laptop & Disk Security
NetShare Shared Server Storage Security
Desktop Email E
mail, File, Disk, & IME
ncryption
Universal Gateway Email User-transparent, Gateway Email Encryption
Universal Server
Central Management of
Encryption Applications
Portable USB Device & Media Encryption
Command Line Secure FTP/Batch & Backups
8/8/2019 Encryption v3 Vision_2010
27/32
SYMANTEC VISION 201027
Las Soluciones de PGP
PGPWhole DiskEncryption (Full Disk)
PGPNetshare
PGPEndpoint
PGPPortable
PGPDesktop Email
PGPMobile
PGP UniversalGateway Email
PGPPDF Messenger
PGPSupportPackage forBlackberry
PGPCommand Line
PGPSoftwareDevelopment Kit
PGP UniversalServer
Datos
Almacenados
Datosen
Trnsito
DatosenUso
Automatizacin
y Gestin
8/8/2019 Encryption v3 Vision_2010
28/32
SYMANTEC VISION 201028
Customer Revenue Contribution over Time Our Broad Solutions drive increasing revenue streams as customer data protection strategies
evolve Identity solutions and hybrid delivery models increase these revenue streams
Cliente Tipico 7 Anos
8/8/2019 Encryption v3 Vision_2010
29/32
SYMANTEC VISION 201029
Productos
Independientes
Acelerando el Tiempo de Instalacin
#de Aplicaciones Instaladas
Tiempo
Para
Instalar
PGPEncryption
Platform
1era 2da 3era 4ta 5ta
8/8/2019 Encryption v3 Vision_2010
30/32
SYMANTEC VISION 2010
Account Profiles
Encryption:
Financial services
Government / Military
Healthcare
Manufacturing
Pharmaceutical
Energy
Highly regulated industries (Utilities, Legal etc)
Key Management
Financial Services
Large Enterprise Accounts
8/8/2019 Encryption v3 Vision_2010
31/32
SYMANTEC VISION 2010
Encryption Questions
What is the problem?
Have you deployed laptop / desktop encryption in your enterprise? Refresh when?
Are you protecting the risk of a lost USB or removable media?
Do your end users send emails containing critical or sensitive data? Are you aware of therisks of a lost or compromised email?
Process to protect data sent to 3rd
parties using FTP or other transmission methods?
Protecting data and email traffic on your mobile device population?
How are you protecting from the leakage of sensitive information through theunprotected ports on laptops, desktops, gateway?
How are you protecting sensitive data that resides in file shares ie SharePoint etc
Do you currently have different security systems that generate and manage their ownencryption keys?
What happens if you do nothing?
8/8/2019 Encryption v3 Vision_2010
32/32
Thank you!
SYMANTECPROPRIETARY/CONFIDENTIAL INTERNAL USE ONLYCopyright 2010 Symantec Corporation. All rights reserved.
Presentation Identifier Goes Here 32
Alvaro Freyre
+ 1 650 319 9062