ENCRYPTIONS EVOLUTION IN TODAYS GDPR COMPLIANT WORLD Mark - - PowerPoint PPT Presentation

encryption s evolution
SMART_READER_LITE
LIVE PREVIEW

ENCRYPTIONS EVOLUTION IN TODAYS GDPR COMPLIANT WORLD Mark - - PowerPoint PPT Presentation

ENCRYPTIONS EVOLUTION IN TODAYS GDPR COMPLIANT WORLD Mark Christie, Senior Systems Engineer, StorMagic Kevin Mooney, Solutions Engineering Manager, Fornetix SIMPLIFYING STORAGE AT THE EDGE DATA SECURITY AT THE EDGE Top reasons for


slide-1
SLIDE 1

SIMPLIFYING STORAGE AT THE EDGE

ENCRYPTION’S EVOLUTION

IN TODAY’S GDPR COMPLIANT WORLD

Mark Christie, Senior Systems Engineer, StorMagic Kevin Mooney, Solutions Engineering Manager, Fornetix

slide-2
SLIDE 2

DATA SECURITY AT THE EDGE

2

20% 50%

2018 2020 (Predicted)

% of enterprises purchasing encryption products

Top reasons for security

  • Regulations – GDPR, HIPAA, PCI DSS, SOX
  • Threats – data breaches, cyber attacks, ransomware

Protecting edge sites can be difficult & expensive

  • Potentially less physical security than the datacenter
  • Encryption even more important

Not all HCI solutions offer encryption

  • Datacenter-class solutions may not offer it
  • OR….could be very expensive for the edge
slide-3
SLIDE 3

3

ENCRYPTION IS CRITICAL

Heavy Use of Encryption Is Rising:

Sources: Sophos, US Census

25.6%

Probability a company will have a major data breach

Source: Ponemon Institute

slide-4
SLIDE 4

WHERE ARE ALL THE KEYS?

4

Encrypted Data at Rest Encrypted Data in Transit

Storage, databases, IoT devices, hard drives, files, applications Voice, email, chat, website, network, files

slide-5
SLIDE 5

TODAY’S SPEAKERS

5

Mark Christie Senior Systems Engineer at StorMagic With more than a decade of experience in technical systems engineering, his primary responsibilities at StorMagic include global customer support, product testing, software release management and documentation, and pre-sales demonstrations and support. Kevin Mooney Solutions Engineering Manager at Fornetix Kevin is an experienced Solutions Architect with a passion for cyber security and integration programming. Expert in identity management, cryptographic key management, application delivery, and enterprise architecture.

slide-6
SLIDE 6

WHAT TO ENCRYPT?

6

Data-at-rest Encryption is becoming more important for many customers to protect sensitive data, including: Intellectual Property (IP)

  • Blueprints, specifications and designs

Financial

  • Credit card details

Legal documents Personally Identifiable Information (PII)

  • Medical records, X-ray images, social security number, driver's license,

passport details.

slide-7
SLIDE 7

WHY ENCRYPT?

7

Protecting data is governed by different regulatory, risk or compliance requirements

  • HIPAA - Health Insurance Portability and Accountability Act - US healthcare
  • FIPS 140-2 - Federal Information Processing Standard - US Defense & Federal
  • GDPR - EU General Data Protection Regulation (GDPR)
  • Sarbanes-Oxley (SOX) - Finance
  • PCI DSS - Payment Card Industry Data Security Standard (PCI DSS) – Finance
  • UK Data Protection Bill (DPB)
  • Others: HITECH, EPCS, FISMA, ISO, GLBA
slide-8
SLIDE 8

GDPR

  • Personally identifiable information of European Union

citizens

  • Applies even if the company is not located within

an EU country

  • Fines start at 2% of gross revenue or €10

million, whichever is higher

8

slide-9
SLIDE 9

SvSAN SOLVES PAIN AT THE EDGE

  • Virtualizes disk, flash and memory
  • Software only: runs on any hardware
  • Start with 2 node clusters with no

single point of failure

9

SIMPLE

Set and forget

COST EFFECTIVE

Lightest footprint, lowest cost

FLEXIBLE

Today’s needs, future proofed

slide-10
SLIDE 10

SLASHING THE COST OF DATA ENCRYPTION

10

SIMPLE – Secure data without the hassle

  • 100% software approach – FIPS 140-2 compliant
  • Data destruction on failed drives not needed

COST-EFFECTIVE – 85% less than competitors

  • No OS or hypervisor-level encryption required
  • No special hardware

FLEXIBLE – Many use cases

  • Single site, stretched clusters or 100’s of edge sites
  • Encrypt any volume and data inflight between servers

ACHIEVE MILITARY-GRADE DATA SECURITY AND SAVE 85%

slide-11
SLIDE 11

SINGLE SITE - SME DATACENTER

  • Storage high availability
  • Agility through software
  • Scale up with commodity

hardware

  • Add performance through

flash and memory caching

  • Eliminate single points of

failure

11

slide-12
SLIDE 12

EDGE SITES - CENTRALIZED SHARED KMS

  • Centralized management & deployment
  • Single, shared remote witness
  • Powerful automation tools and scripts
  • Integrates with vCenter and SCOM
  • Eliminate remote site security concerns

12

slide-13
SLIDE 13

WORKS WITH ANY HARDWARE

13

Any x86 server vSphere & Hyper-V Any storage type

slide-14
SLIDE 14

WHY DO YOU NEED A THIRD-PARTY KEY MANAGER?

External Key Management Solutions protect your data

when storage devices or entire storage systems can be physically accessed by an intruder, are lost, or stolen. Some of the features and advantages of external key management solutions include:

  • Centralized, consistent key management
  • The ability to easily meet compliance mandates
  • The separation of duties

14

slide-15
SLIDE 15

FORNETIX HAS BUILT A KEY MANAGEMENT SOLUTION

that enables a unified approach to data security through deploying and enforcing encryption across the entire

  • rganization.
slide-16
SLIDE 16

SaaS Data-at-Rest Data-in-Motion PKI Cloud Database Storage Encryptors Disk CASB Virtual Machines SAN / NAS SEDs Software Virtual Tape Backups Internet-of-Things Networking Proxy / Balancer Web Servers SSH

With unified encryption management, you have the ability to store and control all your encryption keys across all your environments whether it's on premise storage, virtualization, or cloud.

slide-17
SLIDE 17

MAJOR TAKEAWAYS

  • Security at the edge is becoming more important
  • GDPR is here and it’s critical to adhere to
  • Not all HCI solutions offer encryption
  • The StorMagic/Fornetix solution makes

this all very easy

17

slide-18
SLIDE 18

StorMagic Free Trial: stormagic.com/trial Fornetix Free Trial: fornetix.com/free-ko

THANK YOU FOR JOINING US! ANY QUESTIONS?

18

Mark Christie: mark_christie@stormagic.com Kevin Mooney: kmooney@fornetix.com