2. ¿Cuánto vale su identidad? “La identidad de Andrea fue robada, pero se la devolvieron”
3. La creciente amenaza sobre el correo electrónico. 2 millones / segundo. 541 millones confían en el correo electrónico para negocios. Usuarios corporativos envian reciben promedio 133 / dia. 36% compañías no tienen políticas de seguridad sobre el correo o la mensajería instantanea. CORREO ELECTRONICO = CARTA POSTAL Sources: Radicati Group, Osterman Research
4. Reglas Globales & Regionales Regulaciones Globales PCI DSS Basel II Sarbanes Oxley Requerimientos Únicos por País CO Circular 52 VE Normativa Bancaria EEUU CASB 1386 ¿Conocen sus Regulaciones Locales?
5. PCI DSS 12 REGLAS # 3: Proteger datos almacenados # 4: Encriptar comunicaciones de información sensible por la red pública # 7: Restringir el acceso a la información en base a la “Necesidad de Saber Whitepaper PGP : Requerimientos para cumplir con “Payment Card Industry Data Security Standard” (PCI DSS)
6. Forrester Research El cambio a la seguridad céntrica en los datos La propuesta de valor de la plataforma
27. Una aproximación más estratégica Apl #1 Install Install Install Install Rollout Rollout Rollout Rollout Configure Configure Configure Configure Monitoring Integration Monitoring Integration Monitoring Integration Monitoring Integration Apl #2 Policy Policy Policy Policy Apl #4 Apl #3 Apl #3 Enrollment Enrollment Enrollment Enrollment Apl #2 Training Training Training Training Apl #1 Apl #4 Instalar una sola vez Costo, Esfuerzo y Tiempo ($)
28. 10 Productos Independientes Acelerando el Tiempo de Instalación Tiempo Para Instalar PGP® Encryption Platform 1era2da 3era4ta5ta # de Aplicaciones Instaladas
29. 11 Las Soluciones de PGP Datos en uso. Automatización y gestión Datos en Tránsito Datos almacenados PGP® Whole Disk Encryption (Full Disk) PGP® Netshare PGP® Endpoint PGP® Desktop Email PGP® Mobile PGP Universal™ Gateway Email PGP® PDF Messenger PGP® Support Package for Blackberry® PGP® Command Line PGP® Software Development Kit PGP Universal™ Server
30. Preguntas ?Porque? ?Cuantas Laptops tienen? ?Executivos? ?Presupuesto? ?Evaluation? ?Outsourcing? ?Blackberries? ?Que pasa si no hacen nada?
Solutions fall into 3 categoriesData at Rest:WDEComprehensive disk encryption for securing all files on desktops, laptops, or removable mediaMobile computers emerging as the industry standard but the portable nature of these devices increases the possibility of loss or theftWDE Locks down the entire contents of a laptop, desktop, external drive, or USB flash drive, including boot sectors, system, and swap files. Avaiable for mac osxVery transparent to the userNetshare:NetShare enables teams to securely share documents on file serversAutomatically and transparently encrypts the files for fine-grained group accessWhy?This approach ensures that only authorized users can read or modify filesfulfill partner and regulatory requirements for information partitioning and securityData in MotionDTEIt enables organizations to automaticallysecure email communications from the sender’s email client to the recipient’s—and at all points in between—Encryption is automatic and transparently enforced based on user- or corporate-defined policies MobileNot only is data at risk on desktops/laptops and usb devices, but the data used by a mobile device or in its removable storage card may contain intellectual property or customers’ personal data.PGP also has data encryption for smartphonesPGP Mobile can encrypt individual files, entire data volumes, archives, or directoriesPGP Mobile supports the following smartphone operatingsystems: Windows Mobile 5 Pocket PC Phone Edition andWindows Mobile 6 ProfessionalPGP for Blackberry also encryptions emailGateway Email: which encrypts data at the gateway…. and ensures data is protected from unauthorized access in transit over the public Internet and at rest on a recipient’s mail server. Allows you deliver messages securely to external users that lack an email encryption solutionProvides multiple, flexible secure delivery options for secure Web-mail using PGP Universal Web Messenger, encrypted PDF messages using PDF Messenger, and standards-based OpenPGP and S/MIME message formats. Data in UseCommand Lineprovides a new set of software tools for organizations that need to encrypt large amounts of batch information or secure backup processesenables users to insert encryption and digital-signing functionality into existing automation scripts to ensure information is transmitted, stored, or backed up using strong PGP encryption.