Upload
viswas-athrassery-m
View
216
Download
0
Embed Size (px)
Citation preview
8/9/2019 SEE 6.0 Technical Presentation
1/19
Symantec Endpoint Encryption 6.0
8/9/2019 SEE 6.0 Technical Presentation
2/19
Symantec Endpoint Encryption 2
Data is Pervasive and Portable: Desktops and Laptops
Computer hard drives
Removable storage devices, such as CDs or USB drivesRisk for organizations:
Loss of data and associated expenses
Data at Risk puts your Business at Risk
The Problem with Data
8/9/2019 SEE 6.0 Technical Presentation
3/19
Symantec Endpoint Encryption 3
8/9/2019 SEE 6.0 Technical Presentation
4/19
Symantec Endpoint Encryption 4
Fast-growing, mobile work force
93M laptops, 2008 - 170M USB dev., 50% CAGR
Disclosure is mandatory, costs are gigantic USA: SB1386 36 State laws, 5 Federal bills
Encryption is the only safe harbor
Growing notification requirements, penalties
FSA, BASEL-II, Data Protection Act (UK / EU), EUDirective 95/46/EC
SOX, HIPAA, GLBA
Average tangible cost per breach: ~$7.5 Million1/15th as expensive to prevent
Market Drivers
StricterCompliance
Increased
Mobility
Cost ofDisclosure
8/9/2019 SEE 6.0 Technical Presentation
5/19
What is Endpoint Encryption and How itWorks
8/9/2019 SEE 6.0 Technical Presentation
6/19
Symantec Endpoint Encryption 6
Product Overview
Symantec Endpoint Encryption 6.0 provides advancedencryption for desktops, laptops and removable storagedevices. It offers scalable security and preventsunauthorized access to endpoints.
Symantec EndpointEncryption 6.0
Symantec Endpoint EncryptionFull Disk Edition
Symantec Endpoint EncryptionRemovable Storage Edition
8/9/2019 SEE 6.0 Technical Presentation
7/19Symantec Endpoint Encryption 7
Endpoint EncryptionBusiness Benefits
Reduce Risk Protect sensitive, proprietary or protected data
Prevent erosion of trust, brand, goodwill and image
Eliminate the legal liabilities of a data breach
Prove that no information has been lost
Save Money and Time
Reduce time and cost of privacy compliance
Eradicate the customer service costs of data breachdisclosure
Use data security as a competitive advantage
Disclosure(SB1386)
RemediationCost
Legal Liability
Brand Erosion
8/9/2019 SEE 6.0 Technical Presentation
8/19Symantec Endpoint Encryption 8
Endpoint Encryption key Highlights
Pre-boot Protection
Centralized Management
Support for 3rd party Authentication
Seamless Key sharing
Secure user recovery
Enforceable policies
Extensive Reporting
Multiple encryption algorithms
8/9/2019 SEE 6.0 Technical Presentation
9/19Symantec Endpoint Encryption 9
Symantec Endpoint EncryptionFull Disk Edition
Full disk encryption
Encrypts all disk sectors
Supports standby and hibernation modes
Excellent performance
Mandatory pre-boot authentication
Hardened pre-boot operating system
Single Sign-on
Token support
Automatic recovery
8/9/2019 SEE 6.0 Technical Presentation
10/19Symantec Endpoint Encryption 10
Symantec Endpoint EncryptionFull Disk Edition - continued
Multiple user / administrator accts.
Supports multiple users
Password recovery
Two recovery methods
Self Service
Help Desk assisted
Automatic client reportingand audit trail
8/9/2019 SEE 6.0 Technical Presentation
11/19Symantec Endpoint Encryption 11
Transparent, policy-based fileencryption
Multiple devices/media
USB flash drives, USB harddrives, SD cards, CF cards,CDs/DVDs, iPods, etc.
Portability
Password protected executableto decrypt even if you dont havethe application
Self-extracting files
Symantec Endpoint EncryptionRemovable Storage Edition
http://www.sxc.hu/browse.phtml?f=download&id=6589608/9/2019 SEE 6.0 Technical Presentation
12/19Symantec Endpoint Encryption 12
Monitoring and logging Policies
Activity
Kiosk Mode Operation
Flexibility
A personal key, groupkey, or key for entire
organization
Symantec Endpoint EncryptionRemovable Storage Edition - continued
8/9/2019 SEE 6.0 Technical Presentation
13/19Symantec Endpoint Encryption
Removable StorageCD/DVD Burning
14
8/9/2019 SEE 6.0 Technical Presentation
14/19Symantec Endpoint Encryption
Architecture
15
ADAM
Reporting
Keys
ComputerState
ActiveDirectory
Polic ies Users, Computersand Groups/OUs
Adam
Unique Instance
Does not requireSchemaModification to AD
Allows forApplicationSpecific Needs
SupportsReplication
Active Directory
Authentication
User Identities
Group Policies
8/9/2019 SEE 6.0 Technical Presentation
15/19Symantec Endpoint Encryption
Active Directory (AD) Administrators
Overall AD administrators
Perform initial Management Console installation
Delegate control to specific Symantec Endpoint Encryption Policy Administrators
Symantec Endpoint Encryption Policy Administrators
Create Client Setup (.msi) files and deploy to users computers
Create and deploy policy updates to clients
Audit clients with Symantec Endpoint Encryption Client Monitor
Establish Symantec Endpoint Encryption Client Administrators
Symantec Endpoint Encryption Client Administrators
Perform administrative tasks on clients
Unregister users
Extend a scheduled lockout condition
Initiate data recovery operations
Unlock a machine
16
Administrative Roles
8/9/2019 SEE 6.0 Technical Presentation
16/19Symantec Endpoint Encryption
Managed Through GPOs
17
Client Admin Accounts
Autologon Timeframe Immediate DecryptionOne-Time Password Off or OnAuthenti-Check Off or On
Authenti-Check Questions Reporting IntervalADAM Client Account Single Sign-On or Password PolicyMax Incorrect Password Attempts
Registration Password & LogonAssistance Messages Decryption Rights Required Network Access Time Limit Display Last User Name at Logon
8/9/2019 SEE 6.0 Technical Presentation
17/19Symantec Endpoint Encryption 18
Additional Endpoint Protection
Results:
ReducedCost, Complexity &
Risk Exposure
IncreasedProtection, Control &
Manageability
Symantec EndpointProtection 11.0
Symantec NetworkAccess Control 11.0
AntiVirus
Antispyware
Firewall
IntrusionPrevention
Device Control
Network AccessControl
Single Agent, Single Console
8/9/2019 SEE 6.0 Technical Presentation
18/19Symantec Endpoint Encryption
Additional Data Loss Protection
8/9/2019 SEE 6.0 Technical Presentation
19/19
Thank You !