History, Heresy & The Future of Data Encryption
Martin Hellman
Professor Emeritus, Stanford University Co-Inventor of Public Key Cryptography
Michael Callahan
CMO and VP, CREDANT
Gretchen Hellman
VP of Marketing and Product Management, Vormetric
History, Heresy & The Future of Data Encryption Martin Hellman - - PowerPoint PPT Presentation
History, Heresy & The Future of Data Encryption Martin Hellman Professor Emeritus, Stanford University Co-Inventor of Public Key Cryptography Michael Callahan CMO and VP, CREDANT Gretchen Hellman VP of Marketing and Product Management,
History, Heresy & The Future of Data Encryption
Martin Hellman
Professor Emeritus, Stanford University Co-Inventor of Public Key Cryptography
Michael Callahan
CMO and VP, CREDANT
Gretchen Hellman
VP of Marketing and Product Management, Vormetric
Agenda
Key Cryptography
Cryptography
Data Center
3
The Business Problem
Employee Contractor Partner
Prospect List Intellectual Property Customer Credit Card Information Social Security Numbers Classified Government Information
Airport Internet Cafe Home Office Site Transit
Patient Records ALL Sensitive Corporate Data
Compliance Regulations Expanding
4
Many National Laws/Initiatives/Acts/Programs
44 states, DC, Puerto Rico and the Virgin Islands have laws* States with no law yet
Why aren’t all Enterprises Encrypting? Perception of encryption is behind advances in technology
Hard Expensive Unmanageable Easy Economical Transparent
Perception - History Reality - State of the Art
Introducing Professor Martin Hellman
Cryptography
Stanford University
IEEE Fellow, Marconi Fellow, Electronic Frontier Foundation Pioneer Award, Member of National Academy of Engineering
Early 1970s: Looking Into the Future
Finding Other “Fools”
Merkle Diffie Hellman
Early Feedback About the Idea
Identifying the Issues
unknown users over computer networks
could not work
Solving the Problem
An important suggestion from Professor John Gill Stanford University
1976 – New Directions in Cryptography
“We stand today on the brink of a revolution in cryptography”
Building on the Foundation
Risk, Psychology and Encryption
risk
immortality, nuclear risk, soaring and cryptography
Cryptography Today – What Works
Martin Hellman’s Work Today
Soaring, Cryptography and Nuclear Weapons
CREDANT and Vormetric Changing perceptions about Encryption
CREDANT – Endpoint Encryption Vormetric – Servers and Storage
Manageable, transparent, secure
“Vormetric made our key management and encryption as simple as it can be.” — Troy Larson, VP of Information Systems, Metabank “The CREDANT software is very transparent — most people don’t know it’s on the machine.” — David Fennel, IT Security Coordinator, Talisman Energy
18
CREDANT Overview
19
CREDANT Company Overview
2007 Data Security
Leadership Quadrant
2007 & 2008: #1 Fastest Growing Private (Security) Company
Testergebnis: 8.6 Very Good
Founded - September 17, 2001
To enable customers to manage security of data on any device
Product Line - CREDANT Mobile Guardian (CMG)
Data-centric, policy based, centrally managed data protection solution that "Protects What Matters"- your critical information
Financial and Strategic Investors
Leading Venture Capital Firms
Austin Ventures, Menlo Ventures, Crescendo Ventures
Cisco Systems & Intel Capital
Accomplishments
More than 775 customers worldwide Protecting >5 Million endpoints globally Solution recognized by leading industry experts
CREDANT’s Diverse Customer Base Spans Major Industries and Geographies
Aerospace & Defense State and Local Government Universities Consumer Industries Drugs & Healthcare Energy Financial Services Telecommunications, IT & Media Public Sector Retail & Leisure 20
CREDANT’s Data-Centric Encryption
More secure than other options
Disadvantage:
level - no awareness of user
and Laptops
significantly impacted
and security administration
Full Disk Encryption
Complete encryption of hard disk, including boot and system files
File & Folder Encryption
Files and Folders specifically selected by the user are encrypted
Disadvantage:
behavior
can leak information
key recovery
prove compliance
The CREDANT approach combines the best of “Full Disk Encryption“ and “File & Folder Encryption“ and overcomes their significant problems CREDANT’S Data-Centric Encryption
policies
systems and data types
administration
and storage media with automated key escrow for guaranteed recovery
protection of external media
22
CREDANT Simplifies the Solution
Full Compliance Reporting Transparent to End-users No Operational Impact All Solutions Managed within One Web-based Console
Vormetric Overview The Best in Enterprise Encryption
Founded in 2001, production deployments since 2003 Over 500 enterprises use Vormetric solutions
Transparent to applications, databases, storage and users High performance, extendible, and rapidly deployable
Unparalleled partnerships Diverse expanding customer base standardizing on Vormetric
Strong Validation
environment for Oracle DataVault
policy and key management
Any File, Any Database, Any Application, Anywhere!
Vormetric Data Security
Vormetric Simplifies Data Security
Oracle DB2 Informix Sybase SQL Server MySQL ERP CRM CMS Care Management CAD POS VoIP Dev Apps Homegrown Applications File Shares Flat Files
Point Encryption
HR Apps
The Vormetric Approach
Users Apps
File System
Databases
Volume Manager
management
DB2 Oracle
Vormetric’s Extensible Solution
DAS ERP SAN NAS SQL Sybase IIS Apache WebLogic File Servers FTP Servers Email Servers CRM Payments Other CMS Custom
MySQL VM
“ ”
Future scalability to apply this solution where additional needs may arise was a significant consideration
Thomas Doughty, CISO, Prudential
Summary
endpoint to the core
protected
Thank You!
CREDANT
Vormetric
For More Information Contact: