LANDesk Software Confidential 2012 Secure Your Data More Intelligently with LANDesk Data Protection...
-
Upload
savannah-wipper -
Category
Documents
-
view
224 -
download
2
Transcript of LANDesk Software Confidential 2012 Secure Your Data More Intelligently with LANDesk Data Protection...
LANDesk Software ConfidentialLANDesk Software Confidential
2012
Secure Your Data More Intelligently with LANDesk Data Protection – External Media Protection
LANDesk Software Confidential
The Leader in Helping IT Gain Control of End User Environments› LANDesk named a “Leader” in Magic Quadrant for
systems lifecycle management (Gartner 2012)› 698% return on investment within 3 years;
payback in 5 months (IDC 2011)› LANDesk saves over $32,022 per
100 users, per year (IDC 2010)
Solutions› Systems Lifecycle Management› Endpoint Security Management› IT Service Management› Adaptive Cloud Environment
Premise and/or Cloud Services
Partners› Apple, HP, Credant, IBM, Intel,
Kaspersky, Lenovo, Microsoft, ISG› 400+ certified system integrators / VARs
worldwide
LANDesk Software
2
“The LANDesk Security Suite also includes an integrated full-drive encryption option licensed from Credant and includes
support for persistent and non-persistent hosted virtual desktop images. Credant can also centrally manage BitLocker through the
LANDesk console.” – Gartner MQ EPP 2012
LANDesk Software Confidential
MobileManagement
LANDesk Solutions
3
SystemsLifecycle
Management
Asset Lifecycle
ManagementVirtualizationManagement
IT ServiceManagement
Endpoint Security & Compliance
Management Automation
Platform
LANDesk Software Confidential
LANDesk Management & Security Suite
Software LicenseMonitoring
SoftwareDistribution
Remote Control /Problem Resolution
ManagementSuite
Reporting & Dashboards
Power Management
DesktopManager
InventoryManagement
Discovery
OS Imaging, Provisioning & Migration
PatchManagement
Host Intrusion PreventionAntivirus
Auditing
SecuritySuite
Application Blocking
Connection Control
Spyware Blocking / Removal
Firewall
Security Audit
MobilityManager
LANDesk® Cloud Services Appliance
LANDesk Software Confidential
How are you Keeping up with Changing Regulations?
Global/Industry Regulations› PCI DSS› Sarbanes Oxley (SOX)
Federal / National Regulations› HIPAA & The HITECH Act› Gramm-Leach-Bliley Act (GLBA)› Pending:
US Cyber Security Proposal
International Regulations› EU Data Protection Directive 95/46/EC
EC Proposal Jan 2012 to update EU Directive National Data Privacy Laws in UK, Germany,
France, Spain & every other European Country US – European Union Safe Harbor
› PIPEDA (Canada)› Australian Privacy Act
US State Regulations› CA- SB1386 (the first)› MA - 201 CMR 17 (one of the latest)
CD/DVD
USB Memory Sticks
Smartphone’s & PDA’s
Desktops
Laptops
Cloud
LANDesk Software Confidential
The Rising Cost of Data Breaches
Source: Ponemon Institute
True Cost of Compliance
LANDesk Software Confidential
What are Past Data Protection Experiences? What’s Changing?
Policy-BasedEncryption
Self- EncryptingDrives
USBThumb Drives
OS - Only(MS Bitlocker)
BackupDrives
Sector-Based Encryption Further Complications
»Hardware Refresh Cycles»Recovery & SLAs»Mergers/Acquisitions»Contractors»Employee-Owned Systems»Refresh and Recycling
Further Complications
»Hardware Refresh Cycles»Recovery & SLAs»Mergers/Acquisitions»Contractors»Employee-Owned Systems»Refresh and Recycling
LANDesk Software Confidential
LANDesk Data Protection’s Data-Centric Encryption
Disadvantage:
• Encryption only on system level - no awareness of user or type of data
• Only available for Desktops and Laptops
• System administration significantly impacted
• No separation of system and security administration
• No protection against copy onto external media
Full Disk Encryption
Complete encryption of hard disk, including boot and system files
File & Folder Encryption
Files and Folders specifically selected by the user are encrypted
Disadvantage:
• Security dependent on user behavior
• Temporary application files can leak information
• No central administration or key recovery
• Impossible to enforce or prove compliance
• Data automatically encrypted based on policies
• Encryption awareness of users, groups, systems and data types
• System remains accessible for system administration
• Central Administration for all devices and storage media with automated key escrow for guaranteed recovery
• Automatic detection and enforced protection of external media
The LANDesk Data Protection approach combines the best of “Full Disk Encryption“ and “File & Folder Encryption“ and overcomes their significant problems
LANDesk’s Data-Centric Encryption
More secure than other options
LANDesk Software Confidential
BitLocker Management
• Single management platform for all endpoint encryption solutions
• Recovery key management for BitLocker protected systems
• Centralised reporting for compliance & audit
LANDesk Data Protection: Comprehensive Data Protection
LANDesk Data Protection Platform
Policy-Based Encryption
• Flexible, easy deployment• Minimal impact to
Operations / Ecosystem• Transparent to end-users• Easily segregate data on
multi-user systems• Fastest recovery• Highest levels of
certification• Dell Data Protection
• LANDesk Data Protection
External Media Protection
• Protects data leaving the system (Most common loss vector)
• No proprietary formatting• Access on UnShielded
(e.g. Home) PC’s, without SW download
• Configurable policies – by user, and by device
• Protects without harming productivity
Compliance-Grade Enforce data security automatically
Day One Flexible, easy to deploy choices fit to map non-invasive security to your operations & mandates
Responsive You choose. Secure everything. Secure by user or group. Directories or drive. Specific files or applications. Granular responsive-to-change encryption combinations.
Central Management Protect data without reformatting, buying special and expensive media, creating special containers or other limitations that make USB and removable media unusable
Reporting Intuitive reporting, comprehensive logging, advanced auditing with expertise
Architected Control Highly controlled content exchange allows users & data to productively work in and out of physical/virtual walls
Depth of Expertise Industry's top security professionals & services unmatched, ready to work for you
Policy-Based Encryption
External Media Encryption
BitLocker Management
LANDesk Software Confidential
EXTERNAL MEDIA SHIELD (EMS)
LANDesk Software Confidential
Extend support to Protect/Encrypt Removable Media
Centrally Manage and Protect Data on External Media› Manage, encrypt and report on any type of USB, iPod, Camera SD card, etc.› All encryption keys escrowed for ease of recovery
Minimal impact on users› Encryption rules/policies are tied to Active Directory› Only need to log in once, not every time they want to access the drive› No special formatting or “containers” created on the removable drive
No forced copy, removal or destruction of pre-existing data Won’t force limitations/ “read only” functionality
Meets Regulatory Requirements› Set granular policies, automatically update & report
Prove that external media was Shielded if lost or stolen or when it was last accessed
› Gain visibility into external media use across the environment View activity history by user, host, device category, model, or serial number
› Produce customized reports Map user identity via policy to removable devices just as would
laptops and desktops (ADD, Groups, Individual Users)
Full Disk EncryptionUSB Encryption
LANDesk Software Confidential
Initial End User Prompt
Block Read-only Access Full Access
LANDesk Software Confidential
LANDesk Integration – Sneak Peak
14
LANDesk Software Confidential
15
Credant Integration
Validate Policy Server ExistenceValidate Policy Server Existence
LANDesk Software Confidential
Validate Policy Server ExistenceValidate Policy Server Existence
Credant Integration
LANDesk Software Confidential
Launch Credant Console from within LANDeskLaunch Credant Console from within LANDesk
Credant Integration
LANDesk Software Confidential
An integrated and intelligent security platform for data protection on all endpoints and media in the complete security lifecycle
Trusted, Proven Compliance-Grade Security
for the Entire Data Protection Lifecycle
MitigateRisk
EnsureOperationalEfficiency
GainWorkforce
Productivity
LANDesk Software Confidential
19
Thank You!
The information herein is the confidential information and/or proprietary property of LANDesk Software, Inc. and its affiliates (referred to collectively as “LANDesk”), and may not be disclosed or copied without prior written consent of LANDesk.
To the maximum extent permitted under applicable law, LANDesk assumes no liability whatsoever, and disclaims any express or implied warranty, relating to the sale and/or use of LANDesk products including liability or warranties relating to fitness for a particular purpose, merchantability, or infringement of any patent, copyright or other intellectual property right, without limiting the rights under copyright.
LANDesk retains the right to make changes to the information herein or related product specifications and descriptions, at any time, without notice. LANDesk makes no warranty for the use of the information herein and assumes no responsibility for any errors that can appear nor does it make a commitment to update the information contained herein. For the most current product information, please visit www.landesk.com.
Copyright © 2010, LANDesk Software, Inc. and its affiliates. All rights reserved. LANDesk and its logos are registered trademarks or trademarks of LANDesk Software, Inc. and its affiliates in the United States and/or other countries. Other brands and names may be claimed as the property of others.