SlideShare ist ein Scribd-Unternehmen logo
1 von 29
ARROW INSPIRATION DAY, RIGA
Symantec Deepens
Encryption Offerings
Raivis Kalniņš
Agenda
2
Data Lifecycle
Encryption can Start Anywhere
Whole Disk Encryption
Removable Storage Encription
File and Email Encription
File/Folder Encription
Encyiption Management
Data Lifecycle
The director of finance
downloads data from the
customer database. He drafts
the “Year End” results
spreadsheet and saves it on
his desktop PC.
3
Data Lifecycle
The director of finance
downloads data from the
customer database. He drafts
the “Year End” results
spreadsheet and saves it on
his desktop PC.
The director stores a copy
of “Year End” results in a
shared directory on a
corporate server for the
finance team.
4
Data Lifecycle
The director of finance
downloads data from the
customer database. He drafts
the “Year End” results
spreadsheet and saves it on
his desktop PC.
The director stores a copy
of “Year End” results in a
shared directory on a
corporate server for the
finance team.
The finance manager accesses the “Year End”
results, adjusts the numbers, and emails the file to
the company’s outside accountant.
5
Data Lifecycle
The director of finance
downloads data from the
customer database. He drafts
the “Year End” results
spreadsheet and saves it on
his desktop PC.
The director stores a copy
of “Year End” results in a
shared directory on a
corporate server for the
finance team.
The accountant accesses the
email on a handheld and
forwards it with comments
to a colleague. She reviews
“Year End” results and saves
it on a laptop and a thumb
drive.
The finance manager accesses Year End results,
adjusts the numbers, and emails the file to the
company’s outside accountant.
6
Data Lifecycle
The director of finance
downloads data from the
customer database. He drafts
the “Year End” results
spreadsheet and saves it on
his desktop PC.
The director stores a copy
of “Year End” results in a
shared directory on a
corporate server for the
finance team.
The accountant accesses the
email on a handheld and
forwards it with comments
to a colleague. She reviews
“Year End” results and saves
it on a laptop and a thumb
drive.
The colleague gives the thumb
drive to the onsite auditor, who
transfers “Year End” results to
his laptop so he can review it
later at home.
The finance manager accesses Year End results,
adjusts the numbers, and emails the file to the
company’s outside accountant.
7
Data Lifecycle
How many people had access to data today?
- Director of Finance
- Finance Team
- Outside Accountant
- Outside Accountant’s Collegue
- Onsite Auditor
The Encryption Discussion Can Start Anywhere
9
Field
Data Center
Headquarters
Field Offices
What is the
organizational
policy on USB
drives? Could there
potentially be
intellectual property
(IP) on these drives?
Email protection regulations and
mandates?
What is being downloaded to employee
systems? Trojans, malware, unauthorized
software?
Tangible/intangible
costs of a lost
laptop – customer
data? Personnel
data? IP?
Are there customer
addresses stored on
mobile phones?
Data on HR/Legal/Finance/Other
Shared servers residing in the clear?
Nightly transactions / backups sent
outside the organization?
Barriers to Sale and Value Proposition
10
Potential Barriers Description Value Proposition
Encryption solutions
are complex
Ease of implementation, ongoing
management, long-term cost of
ownership
Experience: Solutions are
easy to deploy
Limited resources
Need to share IT staff across
multiple activities. Endpoint
encryption should integrate with
existing IT infrastructure
Leverage: Uses existing
infrastructure architecture
Substantial training
required
Substantial upfront and on-going
investment in training costs
Simple: Little or no training
required for end-users
Resistant end-users
Need to preserve existing
workflows; not change how users
perform their job
Transparent: User behavior
need not change
significantly
Diverse devices
Mandated to protect all devices
containing sensitive data.
Comprehensive: Protection
across devices, platforms
Symantec Strategy
Things to remember
Encryption is not a new technology, but it is a security control
that has NOT been introduced into a majority of environments.
Most companies don’t have a lot of experience with Encryption
and their criteria is based off of Internet research (hastily done) or
a vendor. There is rarely expertise in the field.
Most companies are looking at Encryption in the face of an
event: lost/stolen system, audit and/or regulatory hit.
Most companies are on an aggressive deployment schedule.
Encryption on the Endpoint
PGP – Whole Disk Encryption
Whole disk encryption for desktops, laptops, and Windows®
servers. Supports Windows®, Mac OS® X, and Linux® platforms
Encrypts desktops, laptops, and USB drives
Protects against personal computer loss, theft, compromise and
improper disposal
Reduces risk of loss of PII (Personally Identifiable Information) and
other sensitive data
Protects against reputation damage
Demonstrates compliance to regulatory standards
Supports Windows, Mac OS X, and Linux
Whole Disk Encryption – How it Works
Symantec EE Management System
High availability
Web services transport, communications
Database server mirroring, failover and HA
Active Directory replication, failover
Supports Windows cluster services
Seamless integration
Directory services
Software deployment
User authentication
Workgroup encryption
Wake on LAN
Leverages familiar, proven technologies
Active Directory, IIS, SQL Server, Linux, ASP.NET, PKI, and so on
Simple to deploy, easy to learn and support
Scalable >100,000 endpoints per server
16
Symantec Endpoint Encryption – Full Disk
17
Policies Auditing
Full-Disk
Encryption
Opal Self-
Encrypting
Drives
High-performance, true full disk
encryption
Pre-boot user authentication
Rapid deployment and activation
Extensive support for smart cards,
CAC, and PIV
Non-disruptive maintenance and
patching
Supports Windows and Mac OS X
Symantec EE – Removable Storage
Secure portable data at rest
– Enforce mandatory removable storage
encryption policies
– Access and re-encrypt data from any PC or
Mac
Granular file and folder based
encryption
– Allow encrypted and unencrypted data on
user devices
– Enforce policy-controlled exemptions by file
type and device
18
Centralized – Integrated
Management Console
Policies Auditing
Removable
Media
Encryption
File and Email Encryption
Where Is Sensitive Data at Risk?
Gateway Email Encryption – How it Works
Desktop Email Encryption – How it Works
File/Folder Encryption
23
User file protection
Shared file protection
Distributed file protection
Protect shared files and folders
Protect transferred files and folders
Protect individual files and folders
PGP NetShare, PGP Command Line
PGP NetShare
24
Client-based Protected File Sharing
?
Finance encrypts a file
on the server using
PGP NetShare
11
Finance allows HR to
view/edit the file on
the server
22
HR can view and edit the
file on the server33
HR saves the file to the
server and PGP NetShare
maintains protection
44 55 Sales tries to view the
document and the
document is unreadable
When the document is copied
to backup tape, it remains
protected
66
PGP Command Line
Scriptable Encription
– A complete library of encryption commands
– Simplifies encryption integration into business practices
Wide Range of Platforms
– Supported on over 35 supported operating systems
Windows, Linux, Solaris, Mac OS X, HP-UX, IBM AIX, iSeries, zSeries
– Runs with most scripting languages, such as Perl, Python, JavaScript, and more
Many Uses
– End-to-end protection for the internal or external transfer of files
– SDA enabled distribution of files via CD, DVD or file servers lockboxes
– Encryption protection and recovery of backed-up and archived files
25
File encryption for server protection & file transfer
PGP Command Line – How it Works
26
Data DistributionData Distribution
File TransferFile Transfer
Data BackupData Backup
> pgp –es dbdump.sql – r admin@company_a.com
dbdump.sql:encrypt (0:output file dbdump.sql.pgp)
> pgp –es dbdump.sql – r admin@company_a.com
dbdump.sql:encrypt (0:output file dbdump.sql.pgp)
Encryption Management
Centralized management for all of the PGP® Applications
27
Central Administration
- Manages users from a central location. Supports LDAP
integration
- Provides tools to help manage and deploy clients
Policy Enforcement
- Controls when encryption must be used
Reporting and Logging
- Tracks device and data encryption and user events
Key Management
- Ensures that keys stay protected with proper access
controls, along with mechanisms available for safe data
recovery
Defense-In-Depth: Encription + DLP
28
Encryption Management
29
Thank you!
Raivis Kalniņš
raivis@dss.lv
info@dss.lv
GSM: +37129162784
GSM: +37126113545

Weitere ähnliche Inhalte

Was ist angesagt?

Seeger Weiss Case Study
Seeger Weiss Case StudySeeger Weiss Case Study
Seeger Weiss Case StudyScott Griffith
 
Protect data effectively with endpoint encryption & data leak prevention
Protect data effectively with endpoint encryption & data leak preventionProtect data effectively with endpoint encryption & data leak prevention
Protect data effectively with endpoint encryption & data leak preventionAdi Saputra
 
Protecting Your Business - All Covered Security Services
Protecting Your Business - All Covered Security ServicesProtecting Your Business - All Covered Security Services
Protecting Your Business - All Covered Security ServicesAll Covered
 
Protecting application delivery without network security blind spots
Protecting application delivery without network security blind spotsProtecting application delivery without network security blind spots
Protecting application delivery without network security blind spotsThales e-Security
 
A Vision for Shared, Central Intelligence to Ebb a Growing Flood of Alerts
A Vision for Shared, Central Intelligence  to Ebb a Growing Flood of AlertsA Vision for Shared, Central Intelligence  to Ebb a Growing Flood of Alerts
A Vision for Shared, Central Intelligence to Ebb a Growing Flood of AlertsPriyanka Aash
 
Jelecos Services Overview
Jelecos Services OverviewJelecos Services Overview
Jelecos Services OverviewJessica Sheldon
 
How Endpoint Encryption Works
How Endpoint Encryption WorksHow Endpoint Encryption Works
How Endpoint Encryption WorksSymantec
 
Process Whitelisting and Resource Access Control For ICS Computers, Kuniyasu ...
Process Whitelisting and Resource Access Control For ICS Computers, Kuniyasu ...Process Whitelisting and Resource Access Control For ICS Computers, Kuniyasu ...
Process Whitelisting and Resource Access Control For ICS Computers, Kuniyasu ...Digital Bond
 
F5 networks the_expectation_of_ssl_everywhere
F5 networks the_expectation_of_ssl_everywhereF5 networks the_expectation_of_ssl_everywhere
F5 networks the_expectation_of_ssl_everywhereF5 Networks
 
Keeping Denial of Service and Financial Fraud out of Your Contact Center
Keeping Denial of Service and Financial Fraud out of Your Contact CenterKeeping Denial of Service and Financial Fraud out of Your Contact Center
Keeping Denial of Service and Financial Fraud out of Your Contact CenterCase IQ
 
Hyperconverged: The Future of Data Centers Presentation
Hyperconverged: The Future of Data Centers PresentationHyperconverged: The Future of Data Centers Presentation
Hyperconverged: The Future of Data Centers PresentationSara Thomason
 
Active Directory in ICS: Lessons Learned From The Field
Active Directory in ICS: Lessons Learned From The FieldActive Directory in ICS: Lessons Learned From The Field
Active Directory in ICS: Lessons Learned From The FieldDigital Bond
 
Case Study: Running a DCS in a Highly Virtualized Environment, Chris Hughes o...
Case Study: Running a DCS in a Highly Virtualized Environment, Chris Hughes o...Case Study: Running a DCS in a Highly Virtualized Environment, Chris Hughes o...
Case Study: Running a DCS in a Highly Virtualized Environment, Chris Hughes o...Digital Bond
 
Combatting Insider Threats Presentation
Combatting Insider Threats PresentationCombatting Insider Threats Presentation
Combatting Insider Threats PresentationSara Thomason
 
The Ins and Outs of Data Security: Kareo Success Summit
The Ins and Outs of Data Security: Kareo Success SummitThe Ins and Outs of Data Security: Kareo Success Summit
The Ins and Outs of Data Security: Kareo Success SummitKareo
 
Symantec Data Loss Prevention - Technical Proposal (General)
Symantec Data Loss Prevention - Technical Proposal (General)Symantec Data Loss Prevention - Technical Proposal (General)
Symantec Data Loss Prevention - Technical Proposal (General)Iftikhar Ali Iqbal
 
Unidirectional Security, Andrew Ginter of Waterfall Security
Unidirectional Security, Andrew Ginter of Waterfall Security Unidirectional Security, Andrew Ginter of Waterfall Security
Unidirectional Security, Andrew Ginter of Waterfall Security Digital Bond
 
Cyber Security: Cyber Incident Response Methodology
Cyber Security:  Cyber Incident Response MethodologyCyber Security:  Cyber Incident Response Methodology
Cyber Security: Cyber Incident Response MethodologySignals Defense, LLC
 

Was ist angesagt? (20)

Seeger Weiss Case Study
Seeger Weiss Case StudySeeger Weiss Case Study
Seeger Weiss Case Study
 
Protect data effectively with endpoint encryption & data leak prevention
Protect data effectively with endpoint encryption & data leak preventionProtect data effectively with endpoint encryption & data leak prevention
Protect data effectively with endpoint encryption & data leak prevention
 
Protecting Your Business - All Covered Security Services
Protecting Your Business - All Covered Security ServicesProtecting Your Business - All Covered Security Services
Protecting Your Business - All Covered Security Services
 
Protecting application delivery without network security blind spots
Protecting application delivery without network security blind spotsProtecting application delivery without network security blind spots
Protecting application delivery without network security blind spots
 
A Vision for Shared, Central Intelligence to Ebb a Growing Flood of Alerts
A Vision for Shared, Central Intelligence  to Ebb a Growing Flood of AlertsA Vision for Shared, Central Intelligence  to Ebb a Growing Flood of Alerts
A Vision for Shared, Central Intelligence to Ebb a Growing Flood of Alerts
 
Jelecos Services Overview
Jelecos Services OverviewJelecos Services Overview
Jelecos Services Overview
 
How Endpoint Encryption Works
How Endpoint Encryption WorksHow Endpoint Encryption Works
How Endpoint Encryption Works
 
Process Whitelisting and Resource Access Control For ICS Computers, Kuniyasu ...
Process Whitelisting and Resource Access Control For ICS Computers, Kuniyasu ...Process Whitelisting and Resource Access Control For ICS Computers, Kuniyasu ...
Process Whitelisting and Resource Access Control For ICS Computers, Kuniyasu ...
 
F5 networks the_expectation_of_ssl_everywhere
F5 networks the_expectation_of_ssl_everywhereF5 networks the_expectation_of_ssl_everywhere
F5 networks the_expectation_of_ssl_everywhere
 
Virtual Security
Virtual SecurityVirtual Security
Virtual Security
 
Keeping Denial of Service and Financial Fraud out of Your Contact Center
Keeping Denial of Service and Financial Fraud out of Your Contact CenterKeeping Denial of Service and Financial Fraud out of Your Contact Center
Keeping Denial of Service and Financial Fraud out of Your Contact Center
 
Hyperconverged: The Future of Data Centers Presentation
Hyperconverged: The Future of Data Centers PresentationHyperconverged: The Future of Data Centers Presentation
Hyperconverged: The Future of Data Centers Presentation
 
Active Directory in ICS: Lessons Learned From The Field
Active Directory in ICS: Lessons Learned From The FieldActive Directory in ICS: Lessons Learned From The Field
Active Directory in ICS: Lessons Learned From The Field
 
Case Study: Running a DCS in a Highly Virtualized Environment, Chris Hughes o...
Case Study: Running a DCS in a Highly Virtualized Environment, Chris Hughes o...Case Study: Running a DCS in a Highly Virtualized Environment, Chris Hughes o...
Case Study: Running a DCS in a Highly Virtualized Environment, Chris Hughes o...
 
Combatting Insider Threats Presentation
Combatting Insider Threats PresentationCombatting Insider Threats Presentation
Combatting Insider Threats Presentation
 
The Ins and Outs of Data Security: Kareo Success Summit
The Ins and Outs of Data Security: Kareo Success SummitThe Ins and Outs of Data Security: Kareo Success Summit
The Ins and Outs of Data Security: Kareo Success Summit
 
Cyber Security 4.0 conference 30 November 2016
Cyber Security 4.0 conference 30 November 2016Cyber Security 4.0 conference 30 November 2016
Cyber Security 4.0 conference 30 November 2016
 
Symantec Data Loss Prevention - Technical Proposal (General)
Symantec Data Loss Prevention - Technical Proposal (General)Symantec Data Loss Prevention - Technical Proposal (General)
Symantec Data Loss Prevention - Technical Proposal (General)
 
Unidirectional Security, Andrew Ginter of Waterfall Security
Unidirectional Security, Andrew Ginter of Waterfall Security Unidirectional Security, Andrew Ginter of Waterfall Security
Unidirectional Security, Andrew Ginter of Waterfall Security
 
Cyber Security: Cyber Incident Response Methodology
Cyber Security:  Cyber Incident Response MethodologyCyber Security:  Cyber Incident Response Methodology
Cyber Security: Cyber Incident Response Methodology
 

Ähnlich wie DSS @Arrow_Inspiration_Roadshow_2013_Symantec_Extends_Encryption_Offerings

Expanded ten reasons to deploy data express final
Expanded ten reasons to deploy data express   finalExpanded ten reasons to deploy data express   final
Expanded ten reasons to deploy data express finalDataExpress
 
Expanded ten reasons to deploy data express final
Expanded ten reasons to deploy data express   finalExpanded ten reasons to deploy data express   final
Expanded ten reasons to deploy data express finalDataExpress
 
SplunkLive! - Splunk for Security
SplunkLive! - Splunk for SecuritySplunkLive! - Splunk for Security
SplunkLive! - Splunk for SecuritySplunk
 
Safend General Presentation 2010
Safend General Presentation 2010Safend General Presentation 2010
Safend General Presentation 2010Joseph Mark Heinzen
 
10 Risky Employee Practices - Security solutions
10 Risky Employee Practices - Security solutions10 Risky Employee Practices - Security solutions
10 Risky Employee Practices - Security solutionsFuji Xerox Singapore
 
Splunk for Security Breakout Session
Splunk for Security Breakout SessionSplunk for Security Breakout Session
Splunk for Security Breakout SessionSplunk
 
Software Datasheet Template
Software Datasheet TemplateSoftware Datasheet Template
Software Datasheet TemplateTDSmaker
 
Blbs prod-bloombase-store safe-product-brochure-uslet-en-r3
Blbs prod-bloombase-store safe-product-brochure-uslet-en-r3Blbs prod-bloombase-store safe-product-brochure-uslet-en-r3
Blbs prod-bloombase-store safe-product-brochure-uslet-en-r3Bloombase
 
Wave 14 - Winodws 7 Security Story Core by MVP Azra Rizal
Wave 14 - Winodws 7 Security Story Core by MVP Azra RizalWave 14 - Winodws 7 Security Story Core by MVP Azra Rizal
Wave 14 - Winodws 7 Security Story Core by MVP Azra RizalQuek Lilian
 
Information Security
Information SecurityInformation Security
Information SecurityMohit8780
 
Alex Hanway - Securing the Breach: Using a Holistic Data Protection Framework
Alex Hanway - Securing the Breach: Using a Holistic Data Protection FrameworkAlex Hanway - Securing the Breach: Using a Holistic Data Protection Framework
Alex Hanway - Securing the Breach: Using a Holistic Data Protection Frameworkcentralohioissa
 
Make the Upgrade: Data protection in the cloud
Make the Upgrade: Data protection in the cloudMake the Upgrade: Data protection in the cloud
Make the Upgrade: Data protection in the cloudErik Von Schlehenried
 
Infowatch endpoint security
Infowatch endpoint securityInfowatch endpoint security
Infowatch endpoint securityhassan latifi
 
Extending The Enterprise With Office 365 & Azure for the Enterprise
Extending The Enterprise With Office 365 & Azure for the EnterpriseExtending The Enterprise With Office 365 & Azure for the Enterprise
Extending The Enterprise With Office 365 & Azure for the EnterpriseRichard Harbridge
 
Glasswall - Safety and Integrity Through Trusted Files
Glasswall - Safety and Integrity Through Trusted FilesGlasswall - Safety and Integrity Through Trusted Files
Glasswall - Safety and Integrity Through Trusted FilesDinis Cruz
 

Ähnlich wie DSS @Arrow_Inspiration_Roadshow_2013_Symantec_Extends_Encryption_Offerings (20)

Expanded ten reasons to deploy data express final
Expanded ten reasons to deploy data express   finalExpanded ten reasons to deploy data express   final
Expanded ten reasons to deploy data express final
 
Expanded ten reasons to deploy data express final
Expanded ten reasons to deploy data express   finalExpanded ten reasons to deploy data express   final
Expanded ten reasons to deploy data express final
 
DLP and MDM Datasheet
DLP and MDM DatasheetDLP and MDM Datasheet
DLP and MDM Datasheet
 
GO AnyWhere - MFT
GO AnyWhere - MFTGO AnyWhere - MFT
GO AnyWhere - MFT
 
SplunkLive! - Splunk for Security
SplunkLive! - Splunk for SecuritySplunkLive! - Splunk for Security
SplunkLive! - Splunk for Security
 
IT security solutions
IT security solutionsIT security solutions
IT security solutions
 
Safend General Presentation 2010
Safend General Presentation 2010Safend General Presentation 2010
Safend General Presentation 2010
 
10 Risky Employee Practices - Security solutions
10 Risky Employee Practices - Security solutions10 Risky Employee Practices - Security solutions
10 Risky Employee Practices - Security solutions
 
Splunk for Security Breakout Session
Splunk for Security Breakout SessionSplunk for Security Breakout Session
Splunk for Security Breakout Session
 
Smbtechedge
SmbtechedgeSmbtechedge
Smbtechedge
 
Cisco SecureX.pdf
Cisco SecureX.pdfCisco SecureX.pdf
Cisco SecureX.pdf
 
Software Datasheet Template
Software Datasheet TemplateSoftware Datasheet Template
Software Datasheet Template
 
Blbs prod-bloombase-store safe-product-brochure-uslet-en-r3
Blbs prod-bloombase-store safe-product-brochure-uslet-en-r3Blbs prod-bloombase-store safe-product-brochure-uslet-en-r3
Blbs prod-bloombase-store safe-product-brochure-uslet-en-r3
 
Wave 14 - Winodws 7 Security Story Core by MVP Azra Rizal
Wave 14 - Winodws 7 Security Story Core by MVP Azra RizalWave 14 - Winodws 7 Security Story Core by MVP Azra Rizal
Wave 14 - Winodws 7 Security Story Core by MVP Azra Rizal
 
Information Security
Information SecurityInformation Security
Information Security
 
Alex Hanway - Securing the Breach: Using a Holistic Data Protection Framework
Alex Hanway - Securing the Breach: Using a Holistic Data Protection FrameworkAlex Hanway - Securing the Breach: Using a Holistic Data Protection Framework
Alex Hanway - Securing the Breach: Using a Holistic Data Protection Framework
 
Make the Upgrade: Data protection in the cloud
Make the Upgrade: Data protection in the cloudMake the Upgrade: Data protection in the cloud
Make the Upgrade: Data protection in the cloud
 
Infowatch endpoint security
Infowatch endpoint securityInfowatch endpoint security
Infowatch endpoint security
 
Extending The Enterprise With Office 365 & Azure for the Enterprise
Extending The Enterprise With Office 365 & Azure for the EnterpriseExtending The Enterprise With Office 365 & Azure for the Enterprise
Extending The Enterprise With Office 365 & Azure for the Enterprise
 
Glasswall - Safety and Integrity Through Trusted Files
Glasswall - Safety and Integrity Through Trusted FilesGlasswall - Safety and Integrity Through Trusted Files
Glasswall - Safety and Integrity Through Trusted Files
 

Mehr von Andris Soroka

Digitala Era 2017 - TransactPro - Normunds Aizstrauts - Maksājumu un finansu ...
Digitala Era 2017 - TransactPro - Normunds Aizstrauts - Maksājumu un finansu ...Digitala Era 2017 - TransactPro - Normunds Aizstrauts - Maksājumu un finansu ...
Digitala Era 2017 - TransactPro - Normunds Aizstrauts - Maksājumu un finansu ...Andris Soroka
 
Digitala Era 2017 - Datu Valsts Inspekcija - Lauris Linabergs - Vispārīgā dau...
Digitala Era 2017 - Datu Valsts Inspekcija - Lauris Linabergs - Vispārīgā dau...Digitala Era 2017 - Datu Valsts Inspekcija - Lauris Linabergs - Vispārīgā dau...
Digitala Era 2017 - Datu Valsts Inspekcija - Lauris Linabergs - Vispārīgā dau...Andris Soroka
 
Digitala Era 2017 - PMLP - Vilnis Vītoliņš - Gaisa kuģu pasažieru datu apstrā...
Digitala Era 2017 - PMLP - Vilnis Vītoliņš - Gaisa kuģu pasažieru datu apstrā...Digitala Era 2017 - PMLP - Vilnis Vītoliņš - Gaisa kuģu pasažieru datu apstrā...
Digitala Era 2017 - PMLP - Vilnis Vītoliņš - Gaisa kuģu pasažieru datu apstrā...Andris Soroka
 
Digitala Era 2017 - BOD LAW - Līva Aleksejeva - LIELIE DATI un personas datu ...
Digitala Era 2017 - BOD LAW - Līva Aleksejeva - LIELIE DATI un personas datu ...Digitala Era 2017 - BOD LAW - Līva Aleksejeva - LIELIE DATI un personas datu ...
Digitala Era 2017 - BOD LAW - Līva Aleksejeva - LIELIE DATI un personas datu ...Andris Soroka
 
Digitala Era 2017 - Spridzans Law Office - Anna Vladimirova Krykova - Mobilo ...
Digitala Era 2017 - Spridzans Law Office - Anna Vladimirova Krykova - Mobilo ...Digitala Era 2017 - Spridzans Law Office - Anna Vladimirova Krykova - Mobilo ...
Digitala Era 2017 - Spridzans Law Office - Anna Vladimirova Krykova - Mobilo ...Andris Soroka
 
Digitala Era 2017 - ZAB “BULLET” - Ivo Krievs - Vai uz valsti attiecināmi cit...
Digitala Era 2017 - ZAB “BULLET” - Ivo Krievs - Vai uz valsti attiecināmi cit...Digitala Era 2017 - ZAB “BULLET” - Ivo Krievs - Vai uz valsti attiecināmi cit...
Digitala Era 2017 - ZAB “BULLET” - Ivo Krievs - Vai uz valsti attiecināmi cit...Andris Soroka
 
Digitala Era 2017 - LSPDSA - Arnis Puksts - Datu aizsardzības speciālists (DPO)
Digitala Era 2017 - LSPDSA - Arnis Puksts - Datu aizsardzības speciālists (DPO)Digitala Era 2017 - LSPDSA - Arnis Puksts - Datu aizsardzības speciālists (DPO)
Digitala Era 2017 - LSPDSA - Arnis Puksts - Datu aizsardzības speciālists (DPO)Andris Soroka
 
Digitala Era 2017 - IIZI - Lauris Kļaviņš - GDPR - Kādus izdevumus un riskus ...
Digitala Era 2017 - IIZI - Lauris Kļaviņš - GDPR - Kādus izdevumus un riskus ...Digitala Era 2017 - IIZI - Lauris Kļaviņš - GDPR - Kādus izdevumus un riskus ...
Digitala Era 2017 - IIZI - Lauris Kļaviņš - GDPR - Kādus izdevumus un riskus ...Andris Soroka
 
Digitala Era 2017 - E-Risinajumi - Māris Ruķers - Vai ar vienu datu aizsardzī...
Digitala Era 2017 - E-Risinajumi - Māris Ruķers - Vai ar vienu datu aizsardzī...Digitala Era 2017 - E-Risinajumi - Māris Ruķers - Vai ar vienu datu aizsardzī...
Digitala Era 2017 - E-Risinajumi - Māris Ruķers - Vai ar vienu datu aizsardzī...Andris Soroka
 
Digitala Era 2017 - Gints Puškundzis - Personas datu apstrādes līgumi
Digitala Era 2017 - Gints Puškundzis - Personas datu apstrādes līgumi Digitala Era 2017 - Gints Puškundzis - Personas datu apstrādes līgumi
Digitala Era 2017 - Gints Puškundzis - Personas datu apstrādes līgumi Andris Soroka
 
Digitala Era 2017 - DatuAizsardziba.LV - Agnese Boboviča - Datu aizsardzības ...
Digitala Era 2017 - DatuAizsardziba.LV - Agnese Boboviča - Datu aizsardzības ...Digitala Era 2017 - DatuAizsardziba.LV - Agnese Boboviča - Datu aizsardzības ...
Digitala Era 2017 - DatuAizsardziba.LV - Agnese Boboviča - Datu aizsardzības ...Andris Soroka
 
Digitala Era 2017 - NotAKey - Janis Graubins - Mobile technologies for single...
Digitala Era 2017 - NotAKey - Janis Graubins - Mobile technologies for single...Digitala Era 2017 - NotAKey - Janis Graubins - Mobile technologies for single...
Digitala Era 2017 - NotAKey - Janis Graubins - Mobile technologies for single...Andris Soroka
 
Digitala Era 2017 - Hermitage Solutions - Gatis Kaušs - Clearswift - Komunikā...
Digitala Era 2017 - Hermitage Solutions - Gatis Kaušs - Clearswift - Komunikā...Digitala Era 2017 - Hermitage Solutions - Gatis Kaušs - Clearswift - Komunikā...
Digitala Era 2017 - Hermitage Solutions - Gatis Kaušs - Clearswift - Komunikā...Andris Soroka
 
Digitala Era 2017 - Digital Mind - Leons Mednis - eDiscovery risinājums GDPR ...
Digitala Era 2017 - Digital Mind - Leons Mednis - eDiscovery risinājums GDPR ...Digitala Era 2017 - Digital Mind - Leons Mednis - eDiscovery risinājums GDPR ...
Digitala Era 2017 - Digital Mind - Leons Mednis - eDiscovery risinājums GDPR ...Andris Soroka
 
Digitala Era 2017 - ALSO - Artjoms Krūmiņš - Personas datu regulas (EU GDPR) ...
Digitala Era 2017 - ALSO - Artjoms Krūmiņš - Personas datu regulas (EU GDPR) ...Digitala Era 2017 - ALSO - Artjoms Krūmiņš - Personas datu regulas (EU GDPR) ...
Digitala Era 2017 - ALSO - Artjoms Krūmiņš - Personas datu regulas (EU GDPR) ...Andris Soroka
 
Digitala Era 2017 - ZAB Skopiņa & Azanda - Jūlija Terjuhana - Tiesības uz dat...
Digitala Era 2017 - ZAB Skopiņa & Azanda - Jūlija Terjuhana - Tiesības uz dat...Digitala Era 2017 - ZAB Skopiņa & Azanda - Jūlija Terjuhana - Tiesības uz dat...
Digitala Era 2017 - ZAB Skopiņa & Azanda - Jūlija Terjuhana - Tiesības uz dat...Andris Soroka
 
Digitala Era 2017 - IT Centrs - Agris Krusts - Latvijas iedzīvotāju digitālo ...
Digitala Era 2017 - IT Centrs - Agris Krusts - Latvijas iedzīvotāju digitālo ...Digitala Era 2017 - IT Centrs - Agris Krusts - Latvijas iedzīvotāju digitālo ...
Digitala Era 2017 - IT Centrs - Agris Krusts - Latvijas iedzīvotāju digitālo ...Andris Soroka
 
Digitala Era 2017 - DSS.LV - Arturs Filatovs - Datu Aizsardzības Tehnoloģiskā...
Digitala Era 2017 - DSS.LV - Arturs Filatovs - Datu Aizsardzības Tehnoloģiskā...Digitala Era 2017 - DSS.LV - Arturs Filatovs - Datu Aizsardzības Tehnoloģiskā...
Digitala Era 2017 - DSS.LV - Arturs Filatovs - Datu Aizsardzības Tehnoloģiskā...Andris Soroka
 
Digitala Era 2017 - DSS.LV - Arturs Filatovs - Mobilitāte un Personas Datu Dr...
Digitala Era 2017 - DSS.LV - Arturs Filatovs - Mobilitāte un Personas Datu Dr...Digitala Era 2017 - DSS.LV - Arturs Filatovs - Mobilitāte un Personas Datu Dr...
Digitala Era 2017 - DSS.LV - Arturs Filatovs - Mobilitāte un Personas Datu Dr...Andris Soroka
 
Digitala Era 2017 - DSS.LV - Andris Soroka - Personas datu regulas tehnoloģis...
Digitala Era 2017 - DSS.LV - Andris Soroka - Personas datu regulas tehnoloģis...Digitala Era 2017 - DSS.LV - Andris Soroka - Personas datu regulas tehnoloģis...
Digitala Era 2017 - DSS.LV - Andris Soroka - Personas datu regulas tehnoloģis...Andris Soroka
 

Mehr von Andris Soroka (20)

Digitala Era 2017 - TransactPro - Normunds Aizstrauts - Maksājumu un finansu ...
Digitala Era 2017 - TransactPro - Normunds Aizstrauts - Maksājumu un finansu ...Digitala Era 2017 - TransactPro - Normunds Aizstrauts - Maksājumu un finansu ...
Digitala Era 2017 - TransactPro - Normunds Aizstrauts - Maksājumu un finansu ...
 
Digitala Era 2017 - Datu Valsts Inspekcija - Lauris Linabergs - Vispārīgā dau...
Digitala Era 2017 - Datu Valsts Inspekcija - Lauris Linabergs - Vispārīgā dau...Digitala Era 2017 - Datu Valsts Inspekcija - Lauris Linabergs - Vispārīgā dau...
Digitala Era 2017 - Datu Valsts Inspekcija - Lauris Linabergs - Vispārīgā dau...
 
Digitala Era 2017 - PMLP - Vilnis Vītoliņš - Gaisa kuģu pasažieru datu apstrā...
Digitala Era 2017 - PMLP - Vilnis Vītoliņš - Gaisa kuģu pasažieru datu apstrā...Digitala Era 2017 - PMLP - Vilnis Vītoliņš - Gaisa kuģu pasažieru datu apstrā...
Digitala Era 2017 - PMLP - Vilnis Vītoliņš - Gaisa kuģu pasažieru datu apstrā...
 
Digitala Era 2017 - BOD LAW - Līva Aleksejeva - LIELIE DATI un personas datu ...
Digitala Era 2017 - BOD LAW - Līva Aleksejeva - LIELIE DATI un personas datu ...Digitala Era 2017 - BOD LAW - Līva Aleksejeva - LIELIE DATI un personas datu ...
Digitala Era 2017 - BOD LAW - Līva Aleksejeva - LIELIE DATI un personas datu ...
 
Digitala Era 2017 - Spridzans Law Office - Anna Vladimirova Krykova - Mobilo ...
Digitala Era 2017 - Spridzans Law Office - Anna Vladimirova Krykova - Mobilo ...Digitala Era 2017 - Spridzans Law Office - Anna Vladimirova Krykova - Mobilo ...
Digitala Era 2017 - Spridzans Law Office - Anna Vladimirova Krykova - Mobilo ...
 
Digitala Era 2017 - ZAB “BULLET” - Ivo Krievs - Vai uz valsti attiecināmi cit...
Digitala Era 2017 - ZAB “BULLET” - Ivo Krievs - Vai uz valsti attiecināmi cit...Digitala Era 2017 - ZAB “BULLET” - Ivo Krievs - Vai uz valsti attiecināmi cit...
Digitala Era 2017 - ZAB “BULLET” - Ivo Krievs - Vai uz valsti attiecināmi cit...
 
Digitala Era 2017 - LSPDSA - Arnis Puksts - Datu aizsardzības speciālists (DPO)
Digitala Era 2017 - LSPDSA - Arnis Puksts - Datu aizsardzības speciālists (DPO)Digitala Era 2017 - LSPDSA - Arnis Puksts - Datu aizsardzības speciālists (DPO)
Digitala Era 2017 - LSPDSA - Arnis Puksts - Datu aizsardzības speciālists (DPO)
 
Digitala Era 2017 - IIZI - Lauris Kļaviņš - GDPR - Kādus izdevumus un riskus ...
Digitala Era 2017 - IIZI - Lauris Kļaviņš - GDPR - Kādus izdevumus un riskus ...Digitala Era 2017 - IIZI - Lauris Kļaviņš - GDPR - Kādus izdevumus un riskus ...
Digitala Era 2017 - IIZI - Lauris Kļaviņš - GDPR - Kādus izdevumus un riskus ...
 
Digitala Era 2017 - E-Risinajumi - Māris Ruķers - Vai ar vienu datu aizsardzī...
Digitala Era 2017 - E-Risinajumi - Māris Ruķers - Vai ar vienu datu aizsardzī...Digitala Era 2017 - E-Risinajumi - Māris Ruķers - Vai ar vienu datu aizsardzī...
Digitala Era 2017 - E-Risinajumi - Māris Ruķers - Vai ar vienu datu aizsardzī...
 
Digitala Era 2017 - Gints Puškundzis - Personas datu apstrādes līgumi
Digitala Era 2017 - Gints Puškundzis - Personas datu apstrādes līgumi Digitala Era 2017 - Gints Puškundzis - Personas datu apstrādes līgumi
Digitala Era 2017 - Gints Puškundzis - Personas datu apstrādes līgumi
 
Digitala Era 2017 - DatuAizsardziba.LV - Agnese Boboviča - Datu aizsardzības ...
Digitala Era 2017 - DatuAizsardziba.LV - Agnese Boboviča - Datu aizsardzības ...Digitala Era 2017 - DatuAizsardziba.LV - Agnese Boboviča - Datu aizsardzības ...
Digitala Era 2017 - DatuAizsardziba.LV - Agnese Boboviča - Datu aizsardzības ...
 
Digitala Era 2017 - NotAKey - Janis Graubins - Mobile technologies for single...
Digitala Era 2017 - NotAKey - Janis Graubins - Mobile technologies for single...Digitala Era 2017 - NotAKey - Janis Graubins - Mobile technologies for single...
Digitala Era 2017 - NotAKey - Janis Graubins - Mobile technologies for single...
 
Digitala Era 2017 - Hermitage Solutions - Gatis Kaušs - Clearswift - Komunikā...
Digitala Era 2017 - Hermitage Solutions - Gatis Kaušs - Clearswift - Komunikā...Digitala Era 2017 - Hermitage Solutions - Gatis Kaušs - Clearswift - Komunikā...
Digitala Era 2017 - Hermitage Solutions - Gatis Kaušs - Clearswift - Komunikā...
 
Digitala Era 2017 - Digital Mind - Leons Mednis - eDiscovery risinājums GDPR ...
Digitala Era 2017 - Digital Mind - Leons Mednis - eDiscovery risinājums GDPR ...Digitala Era 2017 - Digital Mind - Leons Mednis - eDiscovery risinājums GDPR ...
Digitala Era 2017 - Digital Mind - Leons Mednis - eDiscovery risinājums GDPR ...
 
Digitala Era 2017 - ALSO - Artjoms Krūmiņš - Personas datu regulas (EU GDPR) ...
Digitala Era 2017 - ALSO - Artjoms Krūmiņš - Personas datu regulas (EU GDPR) ...Digitala Era 2017 - ALSO - Artjoms Krūmiņš - Personas datu regulas (EU GDPR) ...
Digitala Era 2017 - ALSO - Artjoms Krūmiņš - Personas datu regulas (EU GDPR) ...
 
Digitala Era 2017 - ZAB Skopiņa & Azanda - Jūlija Terjuhana - Tiesības uz dat...
Digitala Era 2017 - ZAB Skopiņa & Azanda - Jūlija Terjuhana - Tiesības uz dat...Digitala Era 2017 - ZAB Skopiņa & Azanda - Jūlija Terjuhana - Tiesības uz dat...
Digitala Era 2017 - ZAB Skopiņa & Azanda - Jūlija Terjuhana - Tiesības uz dat...
 
Digitala Era 2017 - IT Centrs - Agris Krusts - Latvijas iedzīvotāju digitālo ...
Digitala Era 2017 - IT Centrs - Agris Krusts - Latvijas iedzīvotāju digitālo ...Digitala Era 2017 - IT Centrs - Agris Krusts - Latvijas iedzīvotāju digitālo ...
Digitala Era 2017 - IT Centrs - Agris Krusts - Latvijas iedzīvotāju digitālo ...
 
Digitala Era 2017 - DSS.LV - Arturs Filatovs - Datu Aizsardzības Tehnoloģiskā...
Digitala Era 2017 - DSS.LV - Arturs Filatovs - Datu Aizsardzības Tehnoloģiskā...Digitala Era 2017 - DSS.LV - Arturs Filatovs - Datu Aizsardzības Tehnoloģiskā...
Digitala Era 2017 - DSS.LV - Arturs Filatovs - Datu Aizsardzības Tehnoloģiskā...
 
Digitala Era 2017 - DSS.LV - Arturs Filatovs - Mobilitāte un Personas Datu Dr...
Digitala Era 2017 - DSS.LV - Arturs Filatovs - Mobilitāte un Personas Datu Dr...Digitala Era 2017 - DSS.LV - Arturs Filatovs - Mobilitāte un Personas Datu Dr...
Digitala Era 2017 - DSS.LV - Arturs Filatovs - Mobilitāte un Personas Datu Dr...
 
Digitala Era 2017 - DSS.LV - Andris Soroka - Personas datu regulas tehnoloģis...
Digitala Era 2017 - DSS.LV - Andris Soroka - Personas datu regulas tehnoloģis...Digitala Era 2017 - DSS.LV - Andris Soroka - Personas datu regulas tehnoloģis...
Digitala Era 2017 - DSS.LV - Andris Soroka - Personas datu regulas tehnoloģis...
 

Kürzlich hochgeladen

How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 

Kürzlich hochgeladen (20)

How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 

DSS @Arrow_Inspiration_Roadshow_2013_Symantec_Extends_Encryption_Offerings

  • 1. ARROW INSPIRATION DAY, RIGA Symantec Deepens Encryption Offerings Raivis Kalniņš
  • 2. Agenda 2 Data Lifecycle Encryption can Start Anywhere Whole Disk Encryption Removable Storage Encription File and Email Encription File/Folder Encription Encyiption Management
  • 3. Data Lifecycle The director of finance downloads data from the customer database. He drafts the “Year End” results spreadsheet and saves it on his desktop PC. 3
  • 4. Data Lifecycle The director of finance downloads data from the customer database. He drafts the “Year End” results spreadsheet and saves it on his desktop PC. The director stores a copy of “Year End” results in a shared directory on a corporate server for the finance team. 4
  • 5. Data Lifecycle The director of finance downloads data from the customer database. He drafts the “Year End” results spreadsheet and saves it on his desktop PC. The director stores a copy of “Year End” results in a shared directory on a corporate server for the finance team. The finance manager accesses the “Year End” results, adjusts the numbers, and emails the file to the company’s outside accountant. 5
  • 6. Data Lifecycle The director of finance downloads data from the customer database. He drafts the “Year End” results spreadsheet and saves it on his desktop PC. The director stores a copy of “Year End” results in a shared directory on a corporate server for the finance team. The accountant accesses the email on a handheld and forwards it with comments to a colleague. She reviews “Year End” results and saves it on a laptop and a thumb drive. The finance manager accesses Year End results, adjusts the numbers, and emails the file to the company’s outside accountant. 6
  • 7. Data Lifecycle The director of finance downloads data from the customer database. He drafts the “Year End” results spreadsheet and saves it on his desktop PC. The director stores a copy of “Year End” results in a shared directory on a corporate server for the finance team. The accountant accesses the email on a handheld and forwards it with comments to a colleague. She reviews “Year End” results and saves it on a laptop and a thumb drive. The colleague gives the thumb drive to the onsite auditor, who transfers “Year End” results to his laptop so he can review it later at home. The finance manager accesses Year End results, adjusts the numbers, and emails the file to the company’s outside accountant. 7
  • 8. Data Lifecycle How many people had access to data today? - Director of Finance - Finance Team - Outside Accountant - Outside Accountant’s Collegue - Onsite Auditor
  • 9. The Encryption Discussion Can Start Anywhere 9 Field Data Center Headquarters Field Offices What is the organizational policy on USB drives? Could there potentially be intellectual property (IP) on these drives? Email protection regulations and mandates? What is being downloaded to employee systems? Trojans, malware, unauthorized software? Tangible/intangible costs of a lost laptop – customer data? Personnel data? IP? Are there customer addresses stored on mobile phones? Data on HR/Legal/Finance/Other Shared servers residing in the clear? Nightly transactions / backups sent outside the organization?
  • 10. Barriers to Sale and Value Proposition 10 Potential Barriers Description Value Proposition Encryption solutions are complex Ease of implementation, ongoing management, long-term cost of ownership Experience: Solutions are easy to deploy Limited resources Need to share IT staff across multiple activities. Endpoint encryption should integrate with existing IT infrastructure Leverage: Uses existing infrastructure architecture Substantial training required Substantial upfront and on-going investment in training costs Simple: Little or no training required for end-users Resistant end-users Need to preserve existing workflows; not change how users perform their job Transparent: User behavior need not change significantly Diverse devices Mandated to protect all devices containing sensitive data. Comprehensive: Protection across devices, platforms
  • 12. Things to remember Encryption is not a new technology, but it is a security control that has NOT been introduced into a majority of environments. Most companies don’t have a lot of experience with Encryption and their criteria is based off of Internet research (hastily done) or a vendor. There is rarely expertise in the field. Most companies are looking at Encryption in the face of an event: lost/stolen system, audit and/or regulatory hit. Most companies are on an aggressive deployment schedule.
  • 13. Encryption on the Endpoint
  • 14. PGP – Whole Disk Encryption Whole disk encryption for desktops, laptops, and Windows® servers. Supports Windows®, Mac OS® X, and Linux® platforms Encrypts desktops, laptops, and USB drives Protects against personal computer loss, theft, compromise and improper disposal Reduces risk of loss of PII (Personally Identifiable Information) and other sensitive data Protects against reputation damage Demonstrates compliance to regulatory standards Supports Windows, Mac OS X, and Linux
  • 15. Whole Disk Encryption – How it Works
  • 16. Symantec EE Management System High availability Web services transport, communications Database server mirroring, failover and HA Active Directory replication, failover Supports Windows cluster services Seamless integration Directory services Software deployment User authentication Workgroup encryption Wake on LAN Leverages familiar, proven technologies Active Directory, IIS, SQL Server, Linux, ASP.NET, PKI, and so on Simple to deploy, easy to learn and support Scalable >100,000 endpoints per server 16
  • 17. Symantec Endpoint Encryption – Full Disk 17 Policies Auditing Full-Disk Encryption Opal Self- Encrypting Drives High-performance, true full disk encryption Pre-boot user authentication Rapid deployment and activation Extensive support for smart cards, CAC, and PIV Non-disruptive maintenance and patching Supports Windows and Mac OS X
  • 18. Symantec EE – Removable Storage Secure portable data at rest – Enforce mandatory removable storage encryption policies – Access and re-encrypt data from any PC or Mac Granular file and folder based encryption – Allow encrypted and unencrypted data on user devices – Enforce policy-controlled exemptions by file type and device 18 Centralized – Integrated Management Console Policies Auditing Removable Media Encryption
  • 19. File and Email Encryption
  • 20. Where Is Sensitive Data at Risk?
  • 21. Gateway Email Encryption – How it Works
  • 22. Desktop Email Encryption – How it Works
  • 23. File/Folder Encryption 23 User file protection Shared file protection Distributed file protection Protect shared files and folders Protect transferred files and folders Protect individual files and folders PGP NetShare, PGP Command Line
  • 24. PGP NetShare 24 Client-based Protected File Sharing ? Finance encrypts a file on the server using PGP NetShare 11 Finance allows HR to view/edit the file on the server 22 HR can view and edit the file on the server33 HR saves the file to the server and PGP NetShare maintains protection 44 55 Sales tries to view the document and the document is unreadable When the document is copied to backup tape, it remains protected 66
  • 25. PGP Command Line Scriptable Encription – A complete library of encryption commands – Simplifies encryption integration into business practices Wide Range of Platforms – Supported on over 35 supported operating systems Windows, Linux, Solaris, Mac OS X, HP-UX, IBM AIX, iSeries, zSeries – Runs with most scripting languages, such as Perl, Python, JavaScript, and more Many Uses – End-to-end protection for the internal or external transfer of files – SDA enabled distribution of files via CD, DVD or file servers lockboxes – Encryption protection and recovery of backed-up and archived files 25 File encryption for server protection & file transfer
  • 26. PGP Command Line – How it Works 26 Data DistributionData Distribution File TransferFile Transfer Data BackupData Backup > pgp –es dbdump.sql – r admin@company_a.com dbdump.sql:encrypt (0:output file dbdump.sql.pgp) > pgp –es dbdump.sql – r admin@company_a.com dbdump.sql:encrypt (0:output file dbdump.sql.pgp)
  • 27. Encryption Management Centralized management for all of the PGP® Applications 27 Central Administration - Manages users from a central location. Supports LDAP integration - Provides tools to help manage and deploy clients Policy Enforcement - Controls when encryption must be used Reporting and Logging - Tracks device and data encryption and user events Key Management - Ensures that keys stay protected with proper access controls, along with mechanisms available for safe data recovery
  • 29. Encryption Management 29 Thank you! Raivis Kalniņš raivis@dss.lv info@dss.lv GSM: +37129162784 GSM: +37126113545

Hinweis der Redaktion

  1. [Important points to remember] This slide covers the common concerns that Symantec (and PGP and GuardianEdge) heard from other customers (which should be similar to the audience’s concern) The point of this slide is to engage the audience for their validation and affirmation of each of these points. Ideally, this section should be covered like a dialogue, not a lecture Empathize as these are the challenges that your audience will invariably face Symantec has had many years of experience working with organizations like yours and we understand the practical concerns that they faced when it came to deploying an endpoint encryption and data protection solution. We found that while many IT organizations realized the business need to implement an endpoint encryption and data protection solution immediately, but had real-world concerns about the ease of implementation, ongoing management, and long-term cost of ownership. Every IT organizations faces a challenge of limited resources that must be shared across competing priorities and projects . This creates conflict and contention for resources which only serves to delay the actual implementation. Not surprisingly, organizations strive to address their data protection problems in a manner that doesn’t require new staff. Ideally, this means that the architecture of the endpoint encryption and data protection solution should be congruent with existing IT architectures . It should also avoid introducing a significant new burden on IT staff for initial deployment as well as on-going management and maintenance. We also found that IT organizations like yours do not necessarily acquire additional budget for the incremental infrastructure that’s needed to support an endpoint encryption and data protection solution. All IT organizations these days are under pressure to “do more with less” . Not surprisingly, we found that our customers prioritized solutions that could leverage existing infrastructure and mitigate the need for excessive build-out. There are other reasons why it’s preferable to leverage existing infrastructure; not the least of which being that it’s time-consuming and expensive to train IT staff on new, proprietary management technologies let alone overlay this proprietary infrastructure atop an existing IT architecture. Organizations should strongly consider an endpoint data protection solution that fits neatly into an existing IT architecture and leverages established operating procedures. Not only will this simplify and accelerate the deployment of the solution, but it will also help mitigate the substantial upfront and on-going costs for IT staff training . One of the most overlooked aspects of an endpoint encryption and data protection deployment is anticipating how end-users will react to the implementation of the solution. End-users can be highly resistant to new security measures, especially if they impact existing workflows or fundamentally change the way they must perform their job. As a result, the best security measures to implement are the ones that minimize impact on the end-user. This not only ensures user acceptance of your data protection rollout, but it also minimizes the possibility that savvy users will intentionally circumvent the security measures. After all, a bypassed security measure is a failed security measure . Finally, IT organizations are increasingly realizing and appreciating the scope of the problem they’re being asked to address: governing a very diverse collection of endpoint devices that reside both on and off the enterprise network. As a result, the right endpoint encryption and data protection solution must support all of the devices that IT is mandated to protect. This means more than just support for notebooks and desktops, but support for all the devices where sensitive corporate data may reside and a data breach could occur. Symantec Endpoint Encryption solves these practical problems with a combination of broad device support, a full set of data protection controls and enterprise class management that seamlessly integrates with customers’ existing infrastructure. [Discussion questions] Which of these issues or factors are the most important to your organization? Are there others? How many laptops, desktops, and storage devices reside in your organization? Do you use Active Directory to manage users, devices, and policies? Another directory services technology?
  2. Symantec Endpoint Encryption extends granular, policy-based controls to removable media and devices. In this manner, the Symantec Endpoint Encryption Removable Storage Edition and Device Control provide information security managers with peace of mind that this particular threat vector can be effectively monitored and controlled. Symantec Endpoint Encryption Removable Storage Edition adds a layer of data encryption to removable storage devices ensuring that in the event that an external hard drive, CD or DVD, or USB flash drive is lost, the data that resides on the device is not compromised. This package can be used in conjunction with Device Control to further safeguard against inadvertent data leakage , d evice and port access controls prevent unauthorized transfer of sensitive information between devices and wireless networks as well as preventing unauthorized devices from connecting. The operation of Symantec Endpoint Encryption Removable Storage Edition is largely transparent to end-users on managed systems; providing file-level encryption for maximum performance and interoperability . For devices like flash drives and external hard drives which mount like a standard disk, file encryption occurs discretely in the background using either unique, password-protected encryption keys or a default encrypted key for more transparent and seamless operation. To ensure data portability with non-managed devices, Symantec Endpoint Encryption Removable Storage Edition includes an Access Utility that allows users to access encrypted files on devices where the Symantec Endpoint Encryption client software doesn’t reside . Symantec Endpoint Encryption Removable Storage Edition also includes special CD/DVD burner software to ensure that data burned to optical storage remains encrypted as well. Symantec Endpoint Encryption Device Control e nsures that only authorized, trusted devices can connect to enterprise managed endpoints. It also provides a deep layer of device- and endpoint-level visibility allowing IT administrators to identify device usage patterns through an agent-less auditor tool , monitor and control the flow of data via granular policy-based access controls, and enforce the secure transfer of data through mandatory enforcement of encryption policies. Device Control employs numerous sophisticated policy-driven capabilities, such as file-type inspection, activity logging, and file shadowing to extend IT’s visibility and control on the endpoint, which is especially important for forensic analysis. In addition to visibility and control, the Symantec Endpoint Encryption Device Control package adds critical capabilities to mitigate the spread and prevent the outbreak of device-borne malware . These capabilities include blocking self-executing code (especially autorun code that resides on CDs, DVDs, and USB flash drives); detection and disablement of keyloggers ; and control of endpoint association with rogue wireless LANs .
  3. The Symantec Endpoint Encryption Management System is designed to be a direct extension of a customer’s existing infrastructure. By leveraging and building atop standards-based , widely-deployed technologies, such as Active Directory, IIS, SQL Server, and Linux , SEEMS minimizes deployment, management, training, rollout, and support costs. Among the many benefits of a standards-based approach is an architecture based on a familiar, proven technologies which ultimately flatten the training curve for new administrators while ensuring fewer problems and consistent troubleshooting. For enterprises using Active Directory as their principle directory services infrastructure, the Symantec Endpoint Encryption platform natively integrates and makes direct use of existing servers, datastores, replication schemes, and policy management frameworks . Since most organizations already have measures in place to ensure the scalability, resiliency, and fault-tolerance of their Active Directory services infrastructure, this is one less consideration to worry about when deploying the Symantec Endpoint Encryption Management Systems. In fact, integrating with Active Directory completely eliminates the need for a separate infrastructure or for deploying a new management tool . Active Directory already provides the ability to manage security applications the same way it manages other programs and policies. Policy for the Symantec Endpoint Encryption platform is managed centrally using Group Policy Objects and applied to users and devices that reside within Organization Units of the directory. Occasionally, some organizations have deployed a directory services infrastructure built around Novell eDirectory. SEEMS also supports eDirectory making it easy for Novell customers to take advantage of their existing infrastructure. Similarly, many enterprises also have devices on their network that are not part of their Windows domain infrastructure or reside “unregistered”. For instance, these devices might include employee-purchased PCs for enterprise-wide BYOPC initiatives, employee home computers that periodically access the corporate network via remote access connection, or devices belonging to independent agents or contractors. SEEMS allows these machines to be managed from the same console as machines registered within the corporate domain . Operationally, the environment for policy management and reporting within the Symantec Endpoint Encryption platform is implemented directly using an MMC (Microsoft Management Console) snap-in (with a connector to the Symantec Altiris management platform). This familiar interface makes it possible for administrators to implement data protection policies with minimal training within a single console . Policy deployment is performed using standard Windows Group Policy Objects (GPOs) which leverage existing directory services groupings for users and machines. Administrative privileges and security policies are native and directly supported with no need for synchronization or operation within another management console. The benefit of this architecture is a highly scalable system, easily scalable to hundreds of thousands of endpoints, as well as in-built high availability and server failover. The system also provides true, end-to-end, enterprise-class, granular auditing and reporting as well as strong, two-factor, advanced authentication capabilities. SEEMS, as well as its constituent packages, provide comprehensive support for PKI and a plethora of smart cards, such as the Common Access Card and PIV .
  4. Symantec Endpoint Encryption Full Disk Edition helps mitigate business risk in the event of the loss or theft of laptops that contain sensitive data. Symantec Endpoint Encryption uses high-performance, full disk encryption technology to safeguard data from physical loss or theft. This true full disk encryption is augmented by a series of management, security, and usability features including: Pre-boot user authentication to allow users to authenticate to their device before accessing the operating system. This provides the most thorough degree of security; ensuring complete full disk encryption of the data stored on the device. Rapid software deployment and activation leveraging standard methods for deploying endpoint software clients as well as non-disruptive background encryption . This speeds the time to deployment while avoiding disruption to end-user workflows. Extensive support for smart cards , including CAC and PIV cards currently employed by the US gov’t. Smart card support allows users to log on the preboot environment on their encrypted system with a smart card thus completely bypassing the need for single-factor, password-based authentication. Non-disruptive software maintenance and patching. Symantec has paid particular attention to ensuring the highest full disk encryption deployment success rates in the industry. Some of the ways that we accomplish this include:   Other than an initial logon procedure, users are not impacted during or after deployment of full disk encryption Security applications that must reside on end-user devices are packaged in standard formats, such as MSI , and can be pushed to devices using Altiris, Group Policy, or other standard software deployment tools When users log onto their system via the Symantec Endpoint Encryption pre-boot environment, their credentials are automatically passed to Windows for single sign-on Users always have the option to register a series of “help” questions . If users forget their passwords, they are simply prompted to answer the questions and, assuming they provide the correct answers, are then able to regain access to their machine and can reset the password. All of this occurs without help desk or administrator intervention. Failing this self-service mechanism, complete help desk recovery capabilities are available. Symantec Endpoint Encryption Encrypted Drive Edition , our newest endpoint encryption product, adds a layer of enterprise-class management capabilities onto TCG (Trusted Computing Group) Opal-compliant self-encrypting drives . These management capabilities augment the in-built encryption capabilities by providing robust reporting, comprehensive key escrow and recovery, policy management, and end-to-end rollout services . Like Symantec Endpoint Encryption Full Disk Edition, Symantec Endpoint Encryption Encrypted Drive Edition is managed through the Symantec Endpoint Encryption Management System which provides a single console for managing drive encryption in hybrid environments . As you can see, encryption is only part of the solution; end-to-end management capabilities are integral to ensure low-cost operations and sufficient IT governance and control. From rapid deployment and activation to comprehensive end-user self-service recovery capabilities, administrators can assert complete data protection controls over laptops and netbooks using either software-based full disk encryption or hardware-based self-encrypting drives.
  5. Symantec Endpoint Encryption extends granular, policy-based controls to removable media and devices. In this manner, the Symantec Endpoint Encryption Removable Storage Edition and Device Control provide information security managers with peace of mind that this particular threat vector can be effectively monitored and controlled. Symantec Endpoint Encryption Removable Storage Edition adds a layer of data encryption to removable storage devices ensuring that in the event that an external hard drive, CD or DVD, or USB flash drive is lost, the data that resides on the device is not compromised. This package can be used in conjunction with Device Control to further safeguard against inadvertent data leakage , d evice and port access controls prevent unauthorized transfer of sensitive information between devices and wireless networks as well as preventing unauthorized devices from connecting. The operation of Symantec Endpoint Encryption Removable Storage Edition is largely transparent to end-users on managed systems; providing file-level encryption for maximum performance and interoperability . For devices like flash drives and external hard drives which mount like a standard disk, file encryption occurs discretely in the background using either unique, password-protected encryption keys or a default encrypted key for more transparent and seamless operation. To ensure data portability with non-managed devices, Symantec Endpoint Encryption Removable Storage Edition includes an Access Utility that allows users to access encrypted files on devices where the Symantec Endpoint Encryption client software doesn’t reside . Symantec Endpoint Encryption Removable Storage Edition also includes special CD/DVD burner software to ensure that data burned to optical storage remains encrypted as well.