SlideShare ist ein Scribd-Unternehmen logo
1 von 11
How secure is your data?




            ENCRYPTION MADE EASY
Current Security Landscape

“Take heed of Lockheed… the
attackers are really smart and their
exploits are highly sophisticated”
                      Art Coviello - RSA




     Breaches are
     increasing and
     becoming more
     frequent and
     more costly


                                           ENCRYPTION MADE EASY
Rune background and pedigree


 Created by a team of security stalwarts to:
      “absolutely ensure that critically sensitive
      information does not get into the wrong hands”

      “develop an encryption technique that was simple to
      use and portable”

 Backed and supported by industry and government
 experts

 Deployed in hostile environments such as
 Afghanistan, Somalia and China


                                             ENCRYPTION MADE EASY
What Does Rune Information Security Do?
 We don’t secure every potential vulnerability – we
 secure sensitive data that is important to you
 Ideal for small user groups who need to share
 sensitive data
 The user decides what data needs to be
 secured (not an enterprise-wide policy)


       Military-grade encryption made easy…
           • Using any portable USB device
           • Floating tool bar
           • Select it, Secure it



                                       ENCRYPTION MADE EASY
User Groups requiring extra protection?
 Cyber-security teams – requiring higher than enterprise
 level data security
 Government & Military contractors – working with highly
 sensitive military/defense information
 Intra company secure comms –
 establish secure, encrypted channels
 with partners / 3rd parties
 Senior Management and Board Level
 communications
 R&D teams – clinical trials,
 international operations in countries
 like China
 Legal teams – attorney/client privilege


                                           ENCRYPTION MADE EASY
Use Case - Executives on the move

 Senior executives travel a lot and work
 from anywhere
 The data they carry and share is usually
 sensitive
 Security sometimes takes 2nd place to
 productivity
 Executive Protection (personal) is a
 concern, but data protection is not?           Airport


                                                          Hotel



         Trusted circle of comms                  Partner office
         and data for Leadership
         Team anytime, anywhere        Home
                                       office




                                                ENCRYPTION MADE EASY
Use Case - intra-company data &
communications
      Examples: Outside Counsel, Payroll Processor, Manufacturing Partner

 Rapid deployment (within 24 hours)                         Partner, Government,
                                                            Consultant, Law
 Strong authentication and control                          Firm, Customer, etc.
 Minimal set-up between parties
 Military-grade encryption – for data
 at rest and in motion
 Easy to use                       Secure data
                                         transfer




                                                            Establish secure
                                    Client                  company-to-company
                                    company                 communications
                                                            within hours


                                                    ENCRYPTION MADE EASY
Customer Use Cases
 Government & Military teams keep operational
 directives secure in hostile areas



 Board Level projects and communications




 Executives travelling to high risk countries with
 sensitive company data



                                      ENCRYPTION MADE EASY
Easy deployment and flexible management
model


     1 USB device per user
     Small number of users and/or groups
     No management required
     Deployed in hours (monthly or annual)




     USB devices provided or software
     Multiple users and groups
     Client (or 3rd party) chooses to manage
     Deployed in days



                                               ENCRYPTION MADE EASY
Easy Deployment & Pricing Model

 Define your user groups
 Ship devices (or download software) to users
 Load application and go



 From $300 to $1,500 per user per year
 Annual or monthly service
 Managed Service or client-owned




                                    ENCRYPTION MADE EASY
For More Information Contact Us
 Rune Information Security
  Rob Levey, VP North America
  Phone: +1 978-996-2758
  Email: robert.levey@rune.sg
  Web: www.rune.sg




                                ENCRYPTION MADE EASY

Weitere ähnliche Inhalte

Was ist angesagt?

Surveillance Video Capabilities
Surveillance Video CapabilitiesSurveillance Video Capabilities
Surveillance Video Capabilitiesdesktopalert
 
Don’t Sweat the Small Stuff – Protect What Matters Most - Interop 2014
Don’t Sweat the Small Stuff – Protect What Matters Most - Interop 2014 Don’t Sweat the Small Stuff – Protect What Matters Most - Interop 2014
Don’t Sweat the Small Stuff – Protect What Matters Most - Interop 2014 Unisys Corporation
 
Immix PSIM for the Enterprise
Immix PSIM for the EnterpriseImmix PSIM for the Enterprise
Immix PSIM for the EnterpriseJaco Nel
 
Symantec government technology summit abstract
Symantec government technology summit abstractSymantec government technology summit abstract
Symantec government technology summit abstractCarahsoft
 
8 Sure-Fire Ways to Manage Your Desktops
8 Sure-Fire Ways to Manage Your Desktops8 Sure-Fire Ways to Manage Your Desktops
8 Sure-Fire Ways to Manage Your DesktopsScriptLogic
 
Prolexic Routed Product Brief - DDoS defense for protecting network and data ...
Prolexic Routed Product Brief - DDoS defense for protecting network and data ...Prolexic Routed Product Brief - DDoS defense for protecting network and data ...
Prolexic Routed Product Brief - DDoS defense for protecting network and data ...Akamai Technologies
 
Cognitive security
Cognitive securityCognitive security
Cognitive securityIqra khalil
 
Guardium value proposition for fss pn 12 02-10
Guardium value proposition for fss pn 12 02-10Guardium value proposition for fss pn 12 02-10
Guardium value proposition for fss pn 12 02-10Avirot Mitamura
 
Total Defense Product Information
Total Defense Product InformationTotal Defense Product Information
Total Defense Product InformationZeeshan Humayun
 
Vanguard Company Highlights2009
Vanguard Company Highlights2009Vanguard Company Highlights2009
Vanguard Company Highlights2009brian.f
 
Vanguard Company Highlights2009
Vanguard Company Highlights2009Vanguard Company Highlights2009
Vanguard Company Highlights2009brian.f
 
Trend micro deep security
Trend micro deep securityTrend micro deep security
Trend micro deep securityTrend Micro
 
The 2016 Guide to IT Identity Management
The 2016 Guide to IT Identity ManagementThe 2016 Guide to IT Identity Management
The 2016 Guide to IT Identity ManagementJumpCloud
 
Ivanti remote worker ds
Ivanti remote worker   dsIvanti remote worker   ds
Ivanti remote worker dsIvanti
 
Mobile security new challenges practical solutions
Mobile security new challenges practical solutionsMobile security new challenges practical solutions
Mobile security new challenges practical solutionsInterop
 
Come gestire l'encryption dei dati con SKLM
Come gestire l'encryption dei dati con SKLMCome gestire l'encryption dei dati con SKLM
Come gestire l'encryption dei dati con SKLMLuigi Perrone
 

Was ist angesagt? (20)

IBM MaaS360 with Watson
IBM MaaS360 with WatsonIBM MaaS360 with Watson
IBM MaaS360 with Watson
 
Surveillance Video Capabilities
Surveillance Video CapabilitiesSurveillance Video Capabilities
Surveillance Video Capabilities
 
Don’t Sweat the Small Stuff – Protect What Matters Most - Interop 2014
Don’t Sweat the Small Stuff – Protect What Matters Most - Interop 2014 Don’t Sweat the Small Stuff – Protect What Matters Most - Interop 2014
Don’t Sweat the Small Stuff – Protect What Matters Most - Interop 2014
 
Immix PSIM for the Enterprise
Immix PSIM for the EnterpriseImmix PSIM for the Enterprise
Immix PSIM for the Enterprise
 
Symantec government technology summit abstract
Symantec government technology summit abstractSymantec government technology summit abstract
Symantec government technology summit abstract
 
8 Sure-Fire Ways to Manage Your Desktops
8 Sure-Fire Ways to Manage Your Desktops8 Sure-Fire Ways to Manage Your Desktops
8 Sure-Fire Ways to Manage Your Desktops
 
Prolexic Routed Product Brief - DDoS defense for protecting network and data ...
Prolexic Routed Product Brief - DDoS defense for protecting network and data ...Prolexic Routed Product Brief - DDoS defense for protecting network and data ...
Prolexic Routed Product Brief - DDoS defense for protecting network and data ...
 
Cognitive security
Cognitive securityCognitive security
Cognitive security
 
Laptop management
Laptop managementLaptop management
Laptop management
 
Guardium value proposition for fss pn 12 02-10
Guardium value proposition for fss pn 12 02-10Guardium value proposition for fss pn 12 02-10
Guardium value proposition for fss pn 12 02-10
 
Total Defense Product Information
Total Defense Product InformationTotal Defense Product Information
Total Defense Product Information
 
TrendMicro
TrendMicroTrendMicro
TrendMicro
 
Vanguard Company Highlights2009
Vanguard Company Highlights2009Vanguard Company Highlights2009
Vanguard Company Highlights2009
 
Vanguard Company Highlights2009
Vanguard Company Highlights2009Vanguard Company Highlights2009
Vanguard Company Highlights2009
 
Trend micro deep security
Trend micro deep securityTrend micro deep security
Trend micro deep security
 
The 2016 Guide to IT Identity Management
The 2016 Guide to IT Identity ManagementThe 2016 Guide to IT Identity Management
The 2016 Guide to IT Identity Management
 
Protecting Data on Laptops
Protecting Data on LaptopsProtecting Data on Laptops
Protecting Data on Laptops
 
Ivanti remote worker ds
Ivanti remote worker   dsIvanti remote worker   ds
Ivanti remote worker ds
 
Mobile security new challenges practical solutions
Mobile security new challenges practical solutionsMobile security new challenges practical solutions
Mobile security new challenges practical solutions
 
Come gestire l'encryption dei dati con SKLM
Come gestire l'encryption dei dati con SKLMCome gestire l'encryption dei dati con SKLM
Come gestire l'encryption dei dati con SKLM
 

Ähnlich wie How secure is your data?

MT50 Data is the new currency: Protect it!
MT50 Data is the new currency: Protect it!MT50 Data is the new currency: Protect it!
MT50 Data is the new currency: Protect it!Dell EMC World
 
Good Security Whitepaper
Good Security WhitepaperGood Security Whitepaper
Good Security Whitepapergenasun
 
Sweden dell security
Sweden dell securitySweden dell security
Sweden dell securityRonny Stavem
 
Manage Risk By Protecting the Apps and Data Infographic
Manage Risk By Protecting the Apps and Data InfographicManage Risk By Protecting the Apps and Data Infographic
Manage Risk By Protecting the Apps and Data InfographicCitrix
 
Manage Risk By Protecting the Apps and Data That Drive Business Productivity
Manage Risk By Protecting the Apps and Data That Drive Business ProductivityManage Risk By Protecting the Apps and Data That Drive Business Productivity
Manage Risk By Protecting the Apps and Data That Drive Business ProductivityCitrix
 
InstaSafe Zero Trust Access - Key Features and Benefits
InstaSafe Zero Trust Access - Key Features and BenefitsInstaSafe Zero Trust Access - Key Features and Benefits
InstaSafe Zero Trust Access - Key Features and BenefitsInstaSafe Technologies
 
Extending security in the cloud network box - v4
Extending security in the cloud   network box - v4Extending security in the cloud   network box - v4
Extending security in the cloud network box - v4Valencell, Inc.
 
Top reasons why Endpoint Security should move to Cloud | Sysfore
Top reasons why Endpoint Security should move to Cloud | SysforeTop reasons why Endpoint Security should move to Cloud | Sysfore
Top reasons why Endpoint Security should move to Cloud | SysforeSysfore Technologies
 
Ibm Mobile Device Security Datasheet V2.0
Ibm Mobile Device Security   Datasheet   V2.0Ibm Mobile Device Security   Datasheet   V2.0
Ibm Mobile Device Security Datasheet V2.0wendyking63
 
Beyond the PC: Combating Unmanaged Threats Security
Beyond the PC: Combating Unmanaged Threats SecurityBeyond the PC: Combating Unmanaged Threats Security
Beyond the PC: Combating Unmanaged Threats SecurityChief Optimist
 
SafeNet - Data Protection Company
SafeNet - Data Protection CompanySafeNet - Data Protection Company
SafeNet - Data Protection CompanyASBIS SK
 
Atea erfa microsoft mobile security
Atea erfa microsoft mobile securityAtea erfa microsoft mobile security
Atea erfa microsoft mobile securityJ Hartig
 
White Paper: Protecting Your Cloud
White Paper: Protecting Your CloudWhite Paper: Protecting Your Cloud
White Paper: Protecting Your CloudthinkASG
 
4192 sslvpn sb_0412
4192 sslvpn sb_04124192 sslvpn sb_0412
4192 sslvpn sb_0412Hai Nguyen
 
eircom Managed Security
eircom Managed Securityeircom Managed Security
eircom Managed Securityeircom
 
Virtual Data Room Brochure
Virtual Data Room BrochureVirtual Data Room Brochure
Virtual Data Room BrochureEthosData
 
Assuring Reliable and Secure IT Services
Assuring Reliable and Secure IT ServicesAssuring Reliable and Secure IT Services
Assuring Reliable and Secure IT Servicestsaiblake
 

Ähnlich wie How secure is your data? (20)

Safeguard Your Business
Safeguard Your BusinessSafeguard Your Business
Safeguard Your Business
 
MT50 Data is the new currency: Protect it!
MT50 Data is the new currency: Protect it!MT50 Data is the new currency: Protect it!
MT50 Data is the new currency: Protect it!
 
Good Security Whitepaper
Good Security WhitepaperGood Security Whitepaper
Good Security Whitepaper
 
Sweden dell security
Sweden dell securitySweden dell security
Sweden dell security
 
Manage Risk By Protecting the Apps and Data Infographic
Manage Risk By Protecting the Apps and Data InfographicManage Risk By Protecting the Apps and Data Infographic
Manage Risk By Protecting the Apps and Data Infographic
 
Manage Risk By Protecting the Apps and Data That Drive Business Productivity
Manage Risk By Protecting the Apps and Data That Drive Business ProductivityManage Risk By Protecting the Apps and Data That Drive Business Productivity
Manage Risk By Protecting the Apps and Data That Drive Business Productivity
 
InstaSafe Zero Trust Access - Key Features and Benefits
InstaSafe Zero Trust Access - Key Features and BenefitsInstaSafe Zero Trust Access - Key Features and Benefits
InstaSafe Zero Trust Access - Key Features and Benefits
 
Extending security in the cloud network box - v4
Extending security in the cloud   network box - v4Extending security in the cloud   network box - v4
Extending security in the cloud network box - v4
 
Top reasons why Endpoint Security should move to Cloud | Sysfore
Top reasons why Endpoint Security should move to Cloud | SysforeTop reasons why Endpoint Security should move to Cloud | Sysfore
Top reasons why Endpoint Security should move to Cloud | Sysfore
 
CloudWALL Profile ENG
CloudWALL Profile ENGCloudWALL Profile ENG
CloudWALL Profile ENG
 
Ibm Mobile Device Security Datasheet V2.0
Ibm Mobile Device Security   Datasheet   V2.0Ibm Mobile Device Security   Datasheet   V2.0
Ibm Mobile Device Security Datasheet V2.0
 
Beyond the PC: Combating Unmanaged Threats Security
Beyond the PC: Combating Unmanaged Threats SecurityBeyond the PC: Combating Unmanaged Threats Security
Beyond the PC: Combating Unmanaged Threats Security
 
SafeNet - Data Protection Company
SafeNet - Data Protection CompanySafeNet - Data Protection Company
SafeNet - Data Protection Company
 
Atea erfa microsoft mobile security
Atea erfa microsoft mobile securityAtea erfa microsoft mobile security
Atea erfa microsoft mobile security
 
White Paper: Protecting Your Cloud
White Paper: Protecting Your CloudWhite Paper: Protecting Your Cloud
White Paper: Protecting Your Cloud
 
4192 sslvpn sb_0412
4192 sslvpn sb_04124192 sslvpn sb_0412
4192 sslvpn sb_0412
 
eircom Managed Security
eircom Managed Securityeircom Managed Security
eircom Managed Security
 
druva-solution-brochure
druva-solution-brochuredruva-solution-brochure
druva-solution-brochure
 
Virtual Data Room Brochure
Virtual Data Room BrochureVirtual Data Room Brochure
Virtual Data Room Brochure
 
Assuring Reliable and Secure IT Services
Assuring Reliable and Secure IT ServicesAssuring Reliable and Secure IT Services
Assuring Reliable and Secure IT Services
 

Mehr von Rob Levey

Does your Data have Super-Powers?
Does your Data have Super-Powers?Does your Data have Super-Powers?
Does your Data have Super-Powers?Rob Levey
 
Rune - Empowering User-based Security
Rune  - Empowering User-based SecurityRune  - Empowering User-based Security
Rune - Empowering User-based SecurityRob Levey
 
Unleash the power of your people mar2012
Unleash the power of your people mar2012Unleash the power of your people mar2012
Unleash the power of your people mar2012Rob Levey
 
How to say NO to outrageous Preservation Requests
How to say NO to outrageous Preservation RequestsHow to say NO to outrageous Preservation Requests
How to say NO to outrageous Preservation RequestsRob Levey
 
Annual Performance Reviews
Annual Performance ReviewsAnnual Performance Reviews
Annual Performance ReviewsRob Levey
 
Using Power Maps for Sales Success
Using Power Maps for Sales SuccessUsing Power Maps for Sales Success
Using Power Maps for Sales SuccessRob Levey
 
Catelas 360 degree Partner Assessments
Catelas 360 degree Partner Assessments Catelas 360 degree Partner Assessments
Catelas 360 degree Partner Assessments Rob Levey
 
Are you spending too much on Legal settlement costs?
Are you spending too much on Legal settlement costs?Are you spending too much on Legal settlement costs?
Are you spending too much on Legal settlement costs?Rob Levey
 
Catelas Investigations & Litigation
Catelas Investigations & LitigationCatelas Investigations & Litigation
Catelas Investigations & LitigationRob Levey
 
Catelas - Conducting cost effective Internal Investigations
Catelas  -  Conducting cost effective Internal InvestigationsCatelas  -  Conducting cost effective Internal Investigations
Catelas - Conducting cost effective Internal InvestigationsRob Levey
 
Catelas Early Case Assessment Trap
Catelas Early Case Assessment TrapCatelas Early Case Assessment Trap
Catelas Early Case Assessment TrapRob Levey
 
Collaborative Selling
Collaborative SellingCollaborative Selling
Collaborative SellingRob Levey
 
Early Case Analytics
Early Case AnalyticsEarly Case Analytics
Early Case AnalyticsRob Levey
 
Catelas Visual Identification for eDiscovery
Catelas Visual Identification for eDiscoveryCatelas Visual Identification for eDiscovery
Catelas Visual Identification for eDiscoveryRob Levey
 
Collaboration webinar
Collaboration webinar Collaboration webinar
Collaboration webinar Rob Levey
 
How corrupt is your International Business?
How corrupt is your International Business?How corrupt is your International Business?
How corrupt is your International Business?Rob Levey
 
Unleash the power of your people
Unleash the power of your peopleUnleash the power of your people
Unleash the power of your peopleRob Levey
 
CRM Tools Suck
CRM Tools SuckCRM Tools Suck
CRM Tools SuckRob Levey
 
Catelas Security & Investigations
Catelas Security & InvestigationsCatelas Security & Investigations
Catelas Security & InvestigationsRob Levey
 
Catelas Deloitte FCPA webinar
Catelas Deloitte FCPA webinarCatelas Deloitte FCPA webinar
Catelas Deloitte FCPA webinarRob Levey
 

Mehr von Rob Levey (20)

Does your Data have Super-Powers?
Does your Data have Super-Powers?Does your Data have Super-Powers?
Does your Data have Super-Powers?
 
Rune - Empowering User-based Security
Rune  - Empowering User-based SecurityRune  - Empowering User-based Security
Rune - Empowering User-based Security
 
Unleash the power of your people mar2012
Unleash the power of your people mar2012Unleash the power of your people mar2012
Unleash the power of your people mar2012
 
How to say NO to outrageous Preservation Requests
How to say NO to outrageous Preservation RequestsHow to say NO to outrageous Preservation Requests
How to say NO to outrageous Preservation Requests
 
Annual Performance Reviews
Annual Performance ReviewsAnnual Performance Reviews
Annual Performance Reviews
 
Using Power Maps for Sales Success
Using Power Maps for Sales SuccessUsing Power Maps for Sales Success
Using Power Maps for Sales Success
 
Catelas 360 degree Partner Assessments
Catelas 360 degree Partner Assessments Catelas 360 degree Partner Assessments
Catelas 360 degree Partner Assessments
 
Are you spending too much on Legal settlement costs?
Are you spending too much on Legal settlement costs?Are you spending too much on Legal settlement costs?
Are you spending too much on Legal settlement costs?
 
Catelas Investigations & Litigation
Catelas Investigations & LitigationCatelas Investigations & Litigation
Catelas Investigations & Litigation
 
Catelas - Conducting cost effective Internal Investigations
Catelas  -  Conducting cost effective Internal InvestigationsCatelas  -  Conducting cost effective Internal Investigations
Catelas - Conducting cost effective Internal Investigations
 
Catelas Early Case Assessment Trap
Catelas Early Case Assessment TrapCatelas Early Case Assessment Trap
Catelas Early Case Assessment Trap
 
Collaborative Selling
Collaborative SellingCollaborative Selling
Collaborative Selling
 
Early Case Analytics
Early Case AnalyticsEarly Case Analytics
Early Case Analytics
 
Catelas Visual Identification for eDiscovery
Catelas Visual Identification for eDiscoveryCatelas Visual Identification for eDiscovery
Catelas Visual Identification for eDiscovery
 
Collaboration webinar
Collaboration webinar Collaboration webinar
Collaboration webinar
 
How corrupt is your International Business?
How corrupt is your International Business?How corrupt is your International Business?
How corrupt is your International Business?
 
Unleash the power of your people
Unleash the power of your peopleUnleash the power of your people
Unleash the power of your people
 
CRM Tools Suck
CRM Tools SuckCRM Tools Suck
CRM Tools Suck
 
Catelas Security & Investigations
Catelas Security & InvestigationsCatelas Security & Investigations
Catelas Security & Investigations
 
Catelas Deloitte FCPA webinar
Catelas Deloitte FCPA webinarCatelas Deloitte FCPA webinar
Catelas Deloitte FCPA webinar
 

Kürzlich hochgeladen

Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterMydbops
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Strongerpanagenda
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Scott Andery
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfpanagenda
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesThousandEyes
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...panagenda
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Hiroshi SHIBATA
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Farhan Tariq
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 

Kürzlich hochgeladen (20)

Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL Router
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 

How secure is your data?

  • 1. How secure is your data? ENCRYPTION MADE EASY
  • 2. Current Security Landscape “Take heed of Lockheed… the attackers are really smart and their exploits are highly sophisticated” Art Coviello - RSA Breaches are increasing and becoming more frequent and more costly ENCRYPTION MADE EASY
  • 3. Rune background and pedigree Created by a team of security stalwarts to: “absolutely ensure that critically sensitive information does not get into the wrong hands” “develop an encryption technique that was simple to use and portable” Backed and supported by industry and government experts Deployed in hostile environments such as Afghanistan, Somalia and China ENCRYPTION MADE EASY
  • 4. What Does Rune Information Security Do? We don’t secure every potential vulnerability – we secure sensitive data that is important to you Ideal for small user groups who need to share sensitive data The user decides what data needs to be secured (not an enterprise-wide policy) Military-grade encryption made easy… • Using any portable USB device • Floating tool bar • Select it, Secure it ENCRYPTION MADE EASY
  • 5. User Groups requiring extra protection? Cyber-security teams – requiring higher than enterprise level data security Government & Military contractors – working with highly sensitive military/defense information Intra company secure comms – establish secure, encrypted channels with partners / 3rd parties Senior Management and Board Level communications R&D teams – clinical trials, international operations in countries like China Legal teams – attorney/client privilege ENCRYPTION MADE EASY
  • 6. Use Case - Executives on the move Senior executives travel a lot and work from anywhere The data they carry and share is usually sensitive Security sometimes takes 2nd place to productivity Executive Protection (personal) is a concern, but data protection is not? Airport Hotel Trusted circle of comms Partner office and data for Leadership Team anytime, anywhere Home office ENCRYPTION MADE EASY
  • 7. Use Case - intra-company data & communications Examples: Outside Counsel, Payroll Processor, Manufacturing Partner Rapid deployment (within 24 hours) Partner, Government, Consultant, Law Strong authentication and control Firm, Customer, etc. Minimal set-up between parties Military-grade encryption – for data at rest and in motion Easy to use Secure data transfer Establish secure Client company-to-company company communications within hours ENCRYPTION MADE EASY
  • 8. Customer Use Cases Government & Military teams keep operational directives secure in hostile areas Board Level projects and communications Executives travelling to high risk countries with sensitive company data ENCRYPTION MADE EASY
  • 9. Easy deployment and flexible management model 1 USB device per user Small number of users and/or groups No management required Deployed in hours (monthly or annual) USB devices provided or software Multiple users and groups Client (or 3rd party) chooses to manage Deployed in days ENCRYPTION MADE EASY
  • 10. Easy Deployment & Pricing Model Define your user groups Ship devices (or download software) to users Load application and go From $300 to $1,500 per user per year Annual or monthly service Managed Service or client-owned ENCRYPTION MADE EASY
  • 11. For More Information Contact Us Rune Information Security Rob Levey, VP North America Phone: +1 978-996-2758 Email: robert.levey@rune.sg Web: www.rune.sg ENCRYPTION MADE EASY