does your data have super-powers?

8
Do you have control of your most sensitive data?

Upload: rob-levey

Post on 14-Dec-2014

244 views

Category:

Technology


0 download

DESCRIPTION

 

TRANSCRIPT

Page 1: Does your Data have Super-Powers?

Do you have control of your most sensitive

data?

Page 2: Does your Data have Super-Powers?

Information Security is Being Compromised…

“Take heed of Lockheed… the attackers are really smart and their exploits are highly sophisticated” Art Coviello - RSA

Page 3: Does your Data have Super-Powers?

The Rules Have Changed…Dramatically

Hacker sophisticationMonetization of security breachesData is everywhere

At the end of the day, what are we trying to protect?

6pm

5am

2pm

8am

11pm

Home PC – final iterations to Board presentation

A day in the life of a Company Executive…

iPad – catch up on emails on the train

Desktop – work on M&A proposal and a few key emails

Phone – a few important phone calls and emails at airport

Laptop in Hotel – catch up on day’s work. Comment on Facebook.

How many times was this executive’s information security potentially compromised?

Potential vulnerabilities

Page 4: Does your Data have Super-Powers?

What Does Rune Information Security Do?

We don’t secure every potential vulnerability – we secure what you care aboutIf it absolutely must be kept secret, we secure it unconditionallyUser-defined security, not policy-based

Empowering users to secure their most sensitive data themselves…

• You select it, we secure it!

• Making encryption-based security easier for the user

Page 5: Does your Data have Super-Powers?

User-Defined Security: 3 simple steps

1. Select the data you want to secure

2. Encrypt message (file or folder)

3. Send encrypted message that only selected recipients who can un-encrypt and read

Page 6: Does your Data have Super-Powers?

Unconditional Security: The Vema-Cipher Platform

Encryption for those that need security in addition to compliance

Personal information Business intelligence Proprietary information

Secures your data locally or in the cloud No matter where data is stored… You control exactly who

can read your message

Defends your data as it moves though hostile environmentsInnovative yet proven approach to data security

Standards based compliance coupled with unbreakable encryption

Page 7: Does your Data have Super-Powers?

ComplianceFIPS 140-2

SecureVernam Cipher

Simple to Use

3 Easy Steps

• Secure:• Proven, unbreakable

Vernam cipher• VC-Key™ creates a

completely random message – immune to brute-force attacks

• Stops man-in-the-middle attacks

• Compliance:• FIPS 140-2 standards-

based encryption

• Simple to use: 3 steps• Set your audience• Select your message or

document• Click to encrypt or

decrypt

Page 8: Does your Data have Super-Powers?

For More Information Contact Us

Rune Information SecurityRob Levey, VP North AmericaPhone: +1 978-996-2758Email: [email protected]: www.rune.sg