DSS ITSEC 2013 Conference 07.11.2013 - SafeX - Next generation USB's

Preview:

DESCRIPTION

Presentation from one of the remarkable IT Security events in the Baltic States organized by “Data Security Solutions” (www.dss.lv ) Event took place in Riga, on 7th of November, 2013 and was visited by more than 400 participants at event place and more than 300 via online live streaming.

Citation preview

Next Generation Secure USB’s

Presented byJames Baker

Vice-President of SalesCtwo Products AB

(Secure Flash Division)

1

Meet Dr Lee

• Patient X-Rays• Patient Contact Details• Patient Case Notes

Dr Lee

2

Transporting Data

Liverpool Hospital Manchester Hospital

3

Data Loss

Data Protection Act Breach

4

Data Loss Incident

Sorry, we don’t

have you're files.

5

Data Loss Headache

ICO FINEDamaged Reputation

Stockport NHS fined £100,000 for

losing Patient Identifiable Data

6

Portable Data Discussion

We need to issue secure mediums for

transporting sensitive data.

We need to lockdown all

computer ports.

We need to block unauthorised

portable device usage.

We need to encrypt

data.

7

Removable Media Options• Super low cost• Portable• Can be encrypted

• Lack of computer DVD drives• Easily corrupted• Capacity limited

• Low cost• Ultra portable• Can be encrypted

• Easily lost• Risk of huge data loss• Needs computer to operate

• Doesn’t need a computer to operate• Portable• Patients can use to interact

• High cost• Expensive to manage• Not allowed in secure environments

• Can’t be centrally managed

• High capacities available• Options for management• Self contained, no battery

• Software to update

• Risk of huge data loss

Lets take a look at the options…

8

• Can be centrally managed

Removable Media Decisions

1. All computer ports will be locked down with a device control solution.

2. Restrictions will be put in place to stop unauthorised device usage.

3. Staff will be issued secure USB devices for securely storing and transporting sensitive data.

4. Transportation of paper files outside of hospital grounds will be severely limited and restricted to secure delivery methods.

Software Encryption

Strengths

• Low cost• Install on own USB• Works on cross-platform operating systems

Weaknesses

• Shares computer resources to encrypt data• Susceptible to brute-force attacks• Software can be removed and deleted• Slow performance

Hardware Encryption

Strengths

• Users a dedicated processor• Increased performance• Zero-footprint• Protects against physical attacks• Encryptions always on• Management options

Weaknesses

• Higher hardware costs• Firmware / software to update

A few decisions are made…

9

Hardware Encryption Costs

Market Analysis

USB memory Sticks and Flash Drives in USD $0

20

40

60

80

100

120

140

20112012201320142015201620172018

Taken from Hardware Encryption Analysis & Forecast (2013 – 2018) by Markets and Markets

10

USB Drive Market Volume

Taken from Hardware Encryption Analysis & Forecast (2013 – 2018) by Markets and Markets

Europe0

10

20

30

40

50

60

20112012201320142015201620172018

11

DSS ITSEC 2013

After much deliberation….A decision is made

12

Managed or unmanaged• Lower upfront cost• Quicker deployment• Less staff training

• Lack of visibility• No reporting• Can’t reset passwords

• More control• Drive visibility• Restrict access

• Higher upfront cost• Recurring support costs• Staff training

• Data loss risk increased

• Reporting• Reduced risk of data loss• Reset lost passwords

• Longer deployment timeManaged or Unmanaged

13

Hardware Based Managed Solution

Cloud

14

Next Generation Secure USB’s - Conclusion

• Hardware Based-Encryption• Ability to be managed• Cross Platform Support• Super Fast (USB 3.0) Speeds• Ability to be updated – (New OS Support)• Low to High Capacities• Small Form Factor (Portability)• Tamperproof & Waterproof

15

DSS ITSEC 2013

Paldies!

16

Next Generation Secure USB’s

Presented byJames Baker

Vice-President of SalesCtwo Products AB

(Secure Flash Division)

1

Recommended