sid shetye
play

Sid Shetye CEO & Founder sid@crypteron.com 858-342-1617 The - PowerPoint PPT Presentation

1 Sid Shetye CEO & Founder sid@crypteron.com 858-342-1617 The Problem Data breaches 2 $$$ Compliance fines, Customer goodwill, Lawsuits, Lights out Basically, anyone building connected apps should be concerned Stages of a data


  1. 1 Sid Shetye CEO & Founder sid@crypteron.com 858-342-1617

  2. The Problem – Data breaches 2 $$$ Compliance fines, Customer goodwill, Lawsuits, Lights out … Basically, anyone building connected apps should be concerned

  3. Stages of a data breach 3 Lateral Data Reconnaissance Intrusion Persistence movement Exfiltration Industry focus and investments - Network breach ≠ Data beach - The perimeter is a losing battle - Fight where you can win: invest in SELF-PROTECTING core assets - Crypteron: Simplifies data security for developers - Crypteron: Post-breach, neutering controls in-place

  4. Ecosystem and Crypteron 4 Cloud SaaS Apps Data store Internet Custom Enterprise Apps Customers Sensitive ‘Game Over’ Web/App Firewalls Data Server External File Server VPN Server Employee Hackers & Botnets Commercial off the shelf server apps Internal Employee Anti Virus Email Document Endpoint security etc. Server Server A platform-as-a-service that instantly enables pervasive Data always encrypted … except when being processed encryption, offering one-click data-breach response

  5. The Crypteron Difference – minutes vs months/years 5 Security Features Crypteron Alternatives Encryption Custom code + 3rd party libraries Automatic Tamper Protection Custom code Automatic Key Storage Insecure or custom code + 3rd party appliances (off-site and multi-layered encryption) Automatic Insecure or single-layered SSL Key Distribution (multi-layered encryption) (vulnerable to Heartbleed etc.) Key Usage and Caching Access controls Automatic Custom code Audit Logs Key Revocations Key Rotations Secures all types of data Yes Custom code (SQL, NoSQL, Objects, Files, (unified platform) (Fragmented) Streams, etc.) Cloud Provider Flexibility Any public, private or hybrid cloud Cloud lock-in or custom code

  6. Benefits - simpler compliance 6 Painful compliance covering Simple compliance by keeping most all building blocks infrastructure ‘out of scope’

  7. 7 1 min demo Secure. Productive. In minutes.

  8. 00:00:10 Step 1. Install SDK Timer

  9. 00:00:20 Step 2. Get API Key Timer

  10. 00:00:30 Step 3. Plug in the API Key Timer

  11. Step 4. Tell what’s secure That’s it (really!) Once for the entire app. And Java users 00:01:00 skip this Timer

  12. Step 5. Enjoy. Everything just works 00:01:00 Timer

  13. Automatically decrypted when data is being processed 00:01:00 Timer

  14. Basically, as simple as … 14 [Secure] @Secure … that’s smaller than a Tweet. Any developer can learn in seconds.

  15. Don’t be left behind Let’s Get Started Today Still Have Questions…? Call: 1-(858) 342-1617 E-mail: sid@crypteron.com Documentation: crypteron.com/docs

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend