Sid Shetye CEO & Founder sid@crypteron.com 858-342-1617 The - - PowerPoint PPT Presentation

sid shetye
SMART_READER_LITE
LIVE PREVIEW

Sid Shetye CEO & Founder sid@crypteron.com 858-342-1617 The - - PowerPoint PPT Presentation

1 Sid Shetye CEO & Founder sid@crypteron.com 858-342-1617 The Problem Data breaches 2 $$$ Compliance fines, Customer goodwill, Lawsuits, Lights out Basically, anyone building connected apps should be concerned Stages of a data


slide-1
SLIDE 1

Sid Shetye

CEO & Founder sid@crypteron.com 858-342-1617

1

slide-2
SLIDE 2

The Problem – Data breaches

2

Basically, anyone building connected apps should be concerned

Compliance fines, Customer goodwill, Lawsuits, Lights out …

$$$

slide-3
SLIDE 3

Stages of a data breach

Reconnaissance Intrusion Lateral movement Persistence Data Exfiltration

  • Network breach ≠ Data beach
  • The perimeter is a losing battle
  • Fight where you can win: invest in SELF-PROTECTING core assets
  • Crypteron: Simplifies data security for developers
  • Crypteron: Post-breach, neutering controls in-place

Industry focus and investments

3

slide-4
SLIDE 4

Ecosystem and Crypteron

Internet Cloud SaaS Apps Customers External Employee Firewalls VPN Server Internal Employee Anti Virus Endpoint security etc. Web/App Server File Server

Custom Enterprise Apps Commercial off the shelf server apps

Email Server Document Server Data store

Sensitive ‘Game Over’ Data

Data always encrypted … except when being processed

A platform-as-a-service that instantly enables pervasive encryption, offering one-click data-breach response

4 Hackers & Botnets

slide-5
SLIDE 5

The Crypteron Difference – minutes vs months/years

Security Features Crypteron Alternatives Encryption

Automatic

Custom code + 3rd party libraries

Tamper Protection

Custom code

Key Storage Automatic

(off-site and multi-layered encryption)

Insecure or custom code + 3rd party appliances

Key Distribution Automatic

(multi-layered encryption)

Insecure or single-layered SSL

(vulnerable to Heartbleed etc.)

Key Usage and Caching

Automatic Custom code

Access controls Audit Logs Key Revocations Key Rotations Secures all types of data

(SQL, NoSQL, Objects, Files, Streams, etc.)

Yes

(unified platform)

Custom code

(Fragmented)

Cloud Provider Flexibility

Any public, private or hybrid cloud Cloud lock-in or custom code

5

slide-6
SLIDE 6

Benefits - simpler compliance

6

Simple compliance by keeping most infrastructure ‘out of scope’ Painful compliance covering all building blocks

slide-7
SLIDE 7

1 min demo

  • Secure. Productive. In minutes.

7

slide-8
SLIDE 8

00:00:10

Timer

Step 1. Install SDK

slide-9
SLIDE 9

00:00:20

Timer

Step 2. Get API Key

slide-10
SLIDE 10

00:00:30

Timer

Step 3. Plug in the API Key

slide-11
SLIDE 11

Once for the entire

  • app. And Java users

skip this That’s it (really!)

00:01:00

Timer

Step 4. Tell what’s secure

slide-12
SLIDE 12

00:01:00

Timer

Step 5. Enjoy. Everything just works

slide-13
SLIDE 13

Automatically decrypted when data is being processed

00:01:00

Timer

slide-14
SLIDE 14

Basically, as simple as …

14

@Secure

… that’s smaller than a Tweet. Any developer can learn in seconds.

[Secure]

slide-15
SLIDE 15

Don’t be left behind Let’s Get Started

Today

Still Have Questions…?

Call: 1-(858) 342-1617 E-mail: sid@crypteron.com Documentation: crypteron.com/docs