introducing the fusion platform from ionic security

4
Ionic Security 2013 1 With a unified solution for securing and controlling data across applications, mobile devices and the cloud, Ionic Security offers access control, intellectual property (IP) monitoring, data encryption, and policy management— without proxies, gateways, or changes to user behavior. Ionic Security enables information protection for the cloud with no compromises. Mobile devices. BrowserͲbased applications. Cloud storage. WebͲbased collaboration. Never before have organizations faced so many opportunities to increase business productivity, reduce IT costs, and improve operational flexibility. However, each new capability brings new risks – risks that legacy security solutions were never designed to address. To allow adoption of new technologies, IT Security organizations require the same controls for web and cloud applications they have for traditional applications: x Central Management x Data Visibility x Password Controls x Usage Tracking x Identity Management x Data Security Introducing the Fusion platform from Ionic Security. Designed from the ground up to secure cloud applications, Fusion allows IT and business users to embrace the cloud without compromising security or convenience. 9 Central Control of data, devices and users: Comprehensively control data as it moves between the local network, mobile devices, and cloud applications. A sophisticated policy engine allows or denies access based on: user attributes, such as business group, user status (active vs. disabled), or time of day; device attributes, such as device fingerprint, system health, or malware status; and network attributes, such as physical location or network type. 9 Data Visibility: Understand where employees access or post enterprise data by monitoring the use of personally identifiable information (PII), credit card data, Social Security numbers, intellectual property, or custom attributes. 9 Usage Tracking: Report on usage of web applications and collaboration tools, whether accessed directly or via corporate VPN. Intelligent dashboards provide visibility into not just who accessed what, but also when, where (via geolocation), and how (which device, which operating system). 9 Identity and Access Control: Quickly deny access to remote applications when employees leave or their status changes. Centrally manage applicationͲspecific user accounts, link with an enterprise directory, and mitigate risks to enterprise data by resetting passwords across multiple services from one location. 9 Password Control: Dramatically increase password security while simplifying the login process. Users enter a single password or PIN across all web applications; behind the scenes, Ionic Security’s Fusion Key technology ensures that enterprise policy allows access, confirms the device fingerprint matches that of an approved device, and automates the user’s logͲin process. 9 Data Security: Encrypt sensitive information in cloud and mobile applications, automatically and transparently, on the device, in transit, and in the cloud. The Fusion platform protects data with full AESͲ256 encryption and no performance impact, even on tablets. Users simply enter data into applications as usual; central ITͲdefined policies control which fields – or which data – become unreadable to unauthorized users.

Upload: others

Post on 04-Feb-2022

4 views

Category:

Documents


0 download

TRANSCRIPT

Ionic�Security�2013� 1

� With�a�unified�solution�for�securing�and�controlling�data�across�applications,�mobile�devices�and�the�cloud,�Ionic�Security�offers�access�control,�intellectual�property�(IP)�monitoring,�data�encryption,�and�policy�management—without�proxies,�gateways,�or�changes�to�user�behavior.�Ionic�Security�enables�information�protection�for�the�cloud�with�no�compromises.��Mobile�devices.�BrowserͲbased�applications.�Cloud�storage.�WebͲbased�collaboration.�Never�before�have�organizations�faced�so�many�opportunities�to�increase�business�productivity,�reduce�IT�costs,�and�improve�operational�flexibility.�However,�each�new�capability�brings�new�risks�–�risks�that�legacy�security�solutions�were�never�designed�to�address.���To�allow�adoption�of�new�technologies,�IT�Security�organizations�require�the�same�controls�for�web�and�cloud�applications�they�have�for�traditional�applications:�

x Central�Management� x Data�Visibility� x Password�Controls�x Usage�Tracking� x Identity�Management� x Data�Security�

�Introducing�the�Fusion�platform�from�Ionic�Security.�Designed�from�the�ground�up�to�secure�cloud�applications,�Fusion�allows�IT�and�business�users�to�embrace�the�cloud�without�compromising�security�or�convenience.���9 Central�Control�of�data,�devices�and�users:�Comprehensively�control�data�as�it�moves�between�the�local�

network,�mobile�devices,�and�cloud�applications.�A�sophisticated�policy�engine�allows�or�denies�access�based�on:�user�attributes,�such�as�business�group,�user�status�(active�vs.�disabled),�or�time�of�day;�device�attributes,�such�as�device�fingerprint,�system�health,�or�malware�status;�and�network�attributes,�such�as�physical�location�or�network�type.��

9 Data�Visibility:�Understand�where�employees�access�or�post�enterprise�data�by�monitoring�the�use�of�personally�identifiable�information�(PII),�credit�card�data,�Social�Security�numbers,�intellectual�property,�or�custom�attributes.��

9 Usage�Tracking:�Report�on�usage�of�web�applications�and�collaboration�tools,�whether�accessed�directly�or�via�corporate�VPN.�Intelligent�dashboards�provide�visibility�into�not�just�who�accessed�what,�but�also�when,�where�(via�geolocation),�and�how�(which�device,�which�operating�system).�

�9 Identity�and�Access�Control:�Quickly�deny�access�to�remote�applications�when�employees�leave�or�their�

status�changes.�Centrally�manage�applicationͲspecific�user�accounts,�link�with�an�enterprise�directory,�and�mitigate�risks�to�enterprise�data�by�resetting�passwords�across�multiple�services�from�one�location.��

9 Password�Control:�Dramatically�increase�password�security�while�simplifying�the�login�process.�Users�enter�a�single�password�or�PIN�across�all�web�applications;�behind�the�scenes,�Ionic�Security’s�Fusion�Key�technology�ensures�that�enterprise�policy�allows�access,�confirms�the�device�fingerprint�matches�that�of�an�approved�device,�and�automates�the�user’s�logͲin�process.��

9 Data�Security:�Encrypt�sensitive�information�in�cloud�and�mobile�applications,�automatically�and�transparently,�on�the�device,�in�transit,�and�in�the�cloud.�The�Fusion�platform�protects�data�with�full�AESͲ256�encryption�and�no�performance�impact,�even�on�tablets.�Users�simply�enter�data�into�applications�as�usual;�central�ITͲdefined�policies�control�which�fields�–�or�which�data�–�become�unreadable�to�unauthorized�users.

Ionic�Security�2013� 2

The�Ionic�Security�Solution�The�Fusion�platform’s�unique�architecture�combines�the�power�of�a�horizontally�scalable�management�server�with�the�granular�control�of�an�endpoint�agent.�Together,�the�components�seamlessly�secure�and�protect�digital�assets�at�rest�and�in�the�cloud�without�forcing�traffic�through�a�VPN�or�proxy�server.���KAAP�Server:�Integrated�Key�Management,�Access�Control,�Auditing,�and�Policy�Management.�The�purposeͲbuilt�KAAP�Server�combines�powerful�controls�and�a�highly�scalable�design�with�a�beautiful,�easyͲtoͲuse�user�interface.�The�multiͲfaceted�management�engine�authenticates�users,�validates�mobile�devices,�deploys�and�updates�endpoint�agents,�creates�and�delivers�encryption�keys,�and�provides�a�rich�reporting�dashboard�with�a�familiar�tabletͲlike�interface.��Ionic�Security�Agent.�The�highly�advanced�endpoint�agent�is�architected�to�provide�comprehensive�coverage�across�Windows,�Mac,�Linux,�iOS�and�BlackBerry�platforms,�with�more�to�come.�Once�installed,�the�Agent�transparently�generates�a�device�fingerprint,�communicates�to�the�KAAP�Server,�authenticates�the�device,�monitors�for�sensitive�data,�applies�policy,�encrypts�and�decrypts�data,�and�(optionally)�prompts�for�the�user’s�Fusion�Key�password—with�no�perceptible�delay�in�rendering�the�web�application.��Fusion�Key.�This�cryptographically�secure�signͲon�technology�automates�access�to�web�applications,�simplifies�the�user�experience,�and�enables�ITͲcentric�control�of�both�usernames�and�passwords.��

�� �

Ionic�Security�2013� 3

Fusion�Key�goes�beyond�single�signͲon�to�significantly�increase�cloud�security.�Through�pairing�with�specific�authorized�devices,�users’�Fusion�Keys�provide�a�third�factor�in�a�webͲbased�signͲin�process.�Only�authorized,�paired�devices�can�use�a�Fusion�Key—rendering�it�ineffective�even�if�the�password�is�compromised�and�used�on�an�attacker’s�system.�To�increase�security�further,�the�Fusion�Key�is�neither�stored�on�the�device�nor�transmitted�to�the�device�during�use.�And�of�course�users,�devices,�and�applications�can�be�deͲauthorized�from�the�central�KAAP�Server�at�any�time.���Ionic�Security�Solutions�Address�the�Primary�Risks�to�Enterprise�Data�in�the�Cloud������

Risk� Solution� 5� Loss�of�control�in�“cloud�computing”�

as�IT�groups�cannot�enforce�corporate�policies�outside�of�their�networks�(e.g.,�accessing�data�from�offͲsite�locations,�using�own�devices)�

¨ Sophisticated�policies�allow�control�over�which�users,�locations,�devices,�and�applications�are�authorized�for�use.�

� �5 Penalties,�fines,�or�breach�notifications�

resulting�from�compromise�of�data�stored�in�mobile�devices�and�cloud�applications�

¨ Data�encrypted�at�all�times,�whether�at�rest,�in�motion,�or�in�use,�using�AESͲ256�encryption�to�render�sensitive�data�indecipherable�to�unauthorized�parties.�

� �5� Gateway�bottlenecks�or�single�choke�point�

when�third�party�solutions�force�traffic�through�enterprise�VPNs�or�proxy�devices,�eliminating�much�of�the�value�gained�from�the�cloud�

¨ Distributed�environment�enables�each�user�to�use�public�or�private�networks�to�access�sensitive�data�and�apps�from�any�device,�anywhere,�including�BYOD,�without�detouring�traffic�through�a�gateway�

� �5� Security�breaches�when�employees/users�

leave,�are�terminated,�data�is�compromised,�or�devices�are�lost�or�stolen�

¨ IT�maintains�control�for�all�users,�data,�and�devices�–�any�data�or�device�can�be�easily�and�immediately�disabled�without�the�need�to�call�down�to�the�device.�

� �5� Complex�and�varying�password�

requirements�that�encourage�users�to�reuse�passwords,�write�them�down,�or�use�unauthorized�password�managers�

¨ Simplicity�of�a�single�password�–�a�“Fusion�Key”�acts�as�the�only�user�visible�part�of�a�sophisticated�multiͲfactor�authentication�process�to�access�to�all�remote�applications�

� �5 Unauthorized�storage�of�enterprise�data�on�

cloud�services,�unknown�use�of�web�applications,�or�overprovisioning�of�licenses�for�SaaS�products�

¨ Centralized�monitoring�of�application�usage�identifies�where�sensitive�data�resides,�who�has�access,�and�which�applications�are�in�use�

� � ��

� �

Ionic�Security�2013� 4

Expand�to�the�Cloud�with�Confidence��

5 Increase�use�of�web�apps�without�increasing�management�complexity

5 Share�or�store�sensitive�information�in�cloud�file�sharing�and�collaboration�services��

5� Maintain�data�jurisdiction�by�enforcing�geographic�controls�on�data��

5� Avoid�fines�or�brand�damage�due�to�compromised�cloud�account�credentials��

5 Lower�helpdesk�costs�by�simplifying�logins�to�multiple�web�apps���

5 Comply�with�data�protection�laws�by�encrypting�sensitive�data�in�the�cloud��Ionic�Security�Team��

x Adam�Ghetti:� Founder�/�CTO�

x Steve�Abbott:� CEO,�formerly�CoͲFounder�of�PGP�Corp.�

x AwardͲwinning�product�and�engineering�team�with�founder�and�senior�level�experience�from�Internet�Security�Systems,�SecureWorks,�Dell,�Cisco,�Nortel,�Scientific�Atlanta,�Federal�and�Defense�industries.�

Ionic�Security�Investors��Ionic�Security�is�backed�and�advised�by�leading�venture�capital�firms�and�industry�visionaries,�including:�

x Kleiner�Perkins�Caufield�&�Byers�

x Google�Ventures�

x TechOperators�

x ff�VC�

x Christopher�Klaus:� Founder�/�CTO,�Internet�Security�Systems�(Acquired�by�IBM)�

x Phil�Dunkelberger:� Founder�/�CEO,�PGP�Corp.�(Acquired�by�Symantec)�

x Ken�Levine:� CEO,�NitroSecurity�(Acquired�by�McAfee)�

x Dr.�Paul�Judge:� CoͲFounder�/�CTO,�CipherTrust�(Acquired�by�Secure�Computing),�� Founder�/�CTO,�PureWire�(Acquired�by�Barracuda�Networks)��

Further�Information:�[email protected]�Ionic�Security,�Inc.�730�Peachtree�Street�NE�Suite�675�Atlanta,�GA�30308�