Cryptzone Simple Encryption Platform Technical Presentation

advertisement
Cryptzone Group AB (publ)
The Simple Encryption Platform
Technical Overview
Cryptzone Security Solutions
Technical Overview
February 2011
For technical questions email
support@cryptzone.com
Agenda
.........................................
• Simple Encryption Platform (SEP) – An introduction
• Product presentation
• Technical Presentation of Secured eFile, Secured eCollaboration,
Secured eMail and Secured eUSB
• Use cases for the Simple Encryption Platform
More resources
……………………………………..
Direct access to Crytpzone Group resource center
•
Webinars – http://www.cryptzone.com/resourcecenter/recorded_webinars.aspx
•
Demos / Workshops - http://www.cryptzone.com/resourcecenter/demos.aspx
•
Whitepapers – http://www.cryptzone.com/resourcecenter/whitepapers.aspx
•
Case Studies - http://www.cryptzone.com/resourcecenter/casestudies.aspx
•
Solution Guides - http://www.cryptzone.com/resourcecenter/solutionguides.aspx
•
Product Sheets - http://www.cryptzone.com/resourcecenter/product_sheets.aspx
•
Security as a Service - http://www.cryptzone.com/resourcecenter/saas.aspx
•
Software Manuals - http://www.cryptzone.com/library/#3
Elevator pitch
……………………………………..
Secured eUSB
Secured eCollaboration
Centrally managed USB encryption tool
Microsoft SharePoint File security & encryption
Secured eUSB makes it possible to convert a regular
USB flash drive into a secured USB flash drive with
strong security that users can safely travel with. The
central management console offers detailed content
reporting about every flash drive and the ability to
lock down or wipe the flash drive.
Secured eCollaboration is a file encryption & security
add-on to your existing Microsoft SharePoint®
deployment. It adds functionality which allows users
to encrypt documents and files right from within
SharePoint but also on the users desktop, USB flash
drives, portable hard drives , network drives, etc.
Secured eFile
Secured eMail
Centrally controlled file/folder security and encryption
Policy-controlled email encryption
Secured eFile enables the end user to secure any file
or folder and assign specific rights to it. The secured
data can be stored on any media and it is possible
for the end user to change the access rights of the file
and its copies at any time.
Secured eMail makes it possible for the end user to
send secured emails and attachment to anyone
directly from Outlook and Lotus Notes. The receiver
can open the secured email on any platform as Mac,
PC, iPhone, iPad, Blackberry, Symbian and Android.
SEP – Simple Encryption Platform
.........................................
See a video at http://www.cryptzone.com/demos/Simple_Encryption_Platform_Presentation/
Client Applications
Server
Management Console
Document Security
Global Object Synchronization:
Basic Management:
Policies
Role based administration
Licenses
User rights management
Shared Secrets
Secured
eFile
Secured
eCollaboration
……..……………………...….
Outbound Compliance
Encryption Keys
EPM Stealth Keys
Policy design and administration
Auditing and incident reporting
Passwords
Education management
Templates
Help Desk / Lost password Recovery
……..……………………...….
Standard SQL database platform
……..……………………...….
Secured
eMail
……..……………………...….
Endpoint Security
One way synchronization with directories:
Intellectual Property:
Active Directory
EPM - Enterprise Protection Method
Lotus Domino
Resource/ License Management
LDAP
DCR - Data Content Reporting
……..……………………...….
Secured
eUSB
.
Custom directory files
Existing infrastructure integration such as Microsoft RMS and content management solutions
Secured eFile – EPM
..........................................
Encrypt Network Files/Folders for automatic authentication
Best Practice
Features
•
•
Proactive management platform and intelligent
client synchronizes:
•
•
•
•
•
•
•
•
Security policies
Stealth encryption keys
User and system access rights
Password & helpdesk recovery passwords
Intuitive interface and workflows
Empowerment for internal/external users
Audit trail of all end user actions
Integration with Active Directory
Security Methodology
•
•
•
•
•
EPM (Enterprise Protection Method)
Document creator can add/remove access
rights
Manage access to documents – Manager,
Contributor and Reader levels
System access protection – one password
FIPS certified AES256 encryption algorithm
•
•
•
•
•
Regulatory Compliance – Sarbanes Oxley,
GLB Act, HIPAA HITECH, FTC Red Flag Rules
EPM Stealth Key Technology which allows
Automatic authentication & Key Management
End users can secure data and add access
rights to AD users and groups
Create Secured Groups that can collaborate
and share secured content without passwords
Secured file(s)/folder(s) can be placed on any
media or device including network shared
drives, FTP servers, DVDs, etc.
Share data with customers and partners
•
•
•
•
Free Reader
Self-Extracting option
Recovery password and Help Desk tools
All secured data is automatically compressed
Secured eCollaboration
Secure Documents with automatic authentication
 What is Secured eCollaboration
-
SEP Management Console
SEP Server
SEP Client
Add-in to Share Point
 Centrally managed by SEP, integrated
with Active Directory & SharePoint
 Enterprise Protection Method
-

Automatic authentication
Automatic K ey management
Client based document rights management
Help Desk/Lost password recovery
Automatic upload of encrypted files
 Regulatory Compliance – HIPAA HiTECH,
SOX, GLB Act, FTC’s Red Flag Rules
 Simple to use – one click encryption
 There’s a icon added that shows it’s
encrypted - Sharing Access – double
click to open
 User work flow doesn’t change
 Supports full “versioning”
 Supports “check-in/check-out”
Secured eCollaboration - EPM
….........................................
Secure Microsoft Documents with automatic authentication
Best Practice
Features
•
•
Proactive management platform and intelligent
client synchronizes:
•
•
•
•
•
•
•
•
Security policies
Stealth encryption keys
User and system access rights
Password & helpdesk recovery passwords
Intuitive interface and workflows
Empowerment for internal/external users
Audit trail of all end user actions
Integration with Active Directory
Security Methodology
•
•
•
•
•
EPM (Enterprise Protection Method)
Document creator can add/remove access
rights
Manage access to documents – Manager,
Contributor and Reader levels
System access protection – one password
FIPS certified AES256 encryption algorithm
•
•
•
•
•
•
•
•
Regulatory Compliance – Sarbanes Oxley,
GLB Act, HIPAA HITECH, FTC Red Flag Rules
User work flow doesn’t change
Simple to use – one click encryption
Supports full “versioning”, “checkin”, &
“checkout”
Document icon shown visually as encrypted
Secure documents can travel and rest secured
on any media or device including network
shared drives, FTP servers, DVDs, etc.
EPM Stealth Key Technology and Automatic
authentication/Key management
End users can secure data and add access
rights to AD users and groups
Share data with customers and partners
• Free Reader
• Self-Extracting option
Cliff Notes on Secured eMail
Proven market leader!
 Simply press “send secured” button in Outlook or
Lotus Notes or automatic encryption thru custom
policy control – Secured eControl
 Send to anybody in the world regardless of their
email client, OWA, or web service – Yahoo Mail/
Google Mail
 Recipient can view emails with client application,
browser or portable device; iPhone, iPad, Android
device, Symbian device, PDA.
 Centrally managed by SEP, integrated with
Microsoft Active Directory
Centralized control of:
- User access rights
- Password and security policies
- Customized templates
- Secured Groups
 Enterprise Protection Method
- Automatic authentication
- Automatic Key management
- Manage Group Access Right using AD Infrastructure
 Global Objects Synchronization
- Proactive server management
- Intelligent SEP Client sync real time change state
- Controls access rights & encryption key management
 Global Communications service.
- In-house web service to allow all user to read & reply
to all encrypted emails.
- Customize template interface to your exact requirements
 Strong Encryption
- AES 256 bit – FIPS 140-2 Certified Methodology
What is Global Communications?
What does it do for my organization?




Global Communications is in-house service that you can customize
to look exactly how you want the service to look like!
Global Communications is a fool-proof method of delivering
encrypted emails for any type of user, any client, any device!
Global Communications can control how long you want to
offer the delivery of the encrypted email!
Secured eMail and our Global Communications functionality
doesn’t impact your Microsoft Exchange Server or Domino nor
require additional network infrastructure to support the web
service!
Secured eMail
.........................................
Secured eMail – End Point Security for eMail Encryption
Best Practice
Features
•
•
Proactive management platform and intelligent
client synchronizes:
•
•
•
•
•
•
•
•
Security policies
Stealth encryption keys
User and system access rights
Password & helpdesk recovery passwords
Intuitive interface and workflows
Empowerment for internal/external users
Audit trail of all end user actions
Integration with Active Directory
Security Methodology
•
•
•
•
System SKG Patented encryption technology
Strongest methodology available
•
Automatic authentication – key management
•
System generates dynamic one-time keys for each
content element
System access protection – one password
FIPS certified AES256 encryption algorithm
•
•
•
•
•
•
Regulatory Compliance – Sarbanes Oxley,
GLB Act, HIPAA HITECH, FTC Red Flag Rules
Fully integrated into Microsoft Outlook and Lotus
Notes
End to End messaging – virtual channel
Send to anyone capability – any client app or
web based email
•
Receivers can download a full Reader and reply
back secured for free
•
Receivers can activate a Reader Lite with zero
footprint
Ease of use – Press “Send secured”
or Send with Secured eControl policy
Centralized policy based email encryption
Archive encrypted and compressed
Secured eUSB
........................................
eUSB – Encrypts ANY USB flash drive in the market today!
Best Practice
Features
•
•
•
Proactive management platform and intelligent
client synchronizes:
•
•
•
•
•
•
•
•
Security policies
Stealth encryption keys
User and system access rights
Password & helpdesk recovery passwords
Intuitive interface and workflows – no training
Audit trail of all end user actions
Lost flash drive – Kill Pill support
Integration with Active Directory
Security Methodology
•
•
•
•
•
EPM (Enterprise Protection Method)
FIPS certified AES256 encryption algorithm
Brute force protection and Automatic Data
Compression up to 5:1
Zero Footprint Deployment
Enforced synchronization of portable device
•
•
•
•
•
•
•
•
Distributed or Zero Footprint Deployment
Regulatory Compliance – Sarbanes Oxley,
GLB Act, HIPAA HITECH, FTC Red Flag Rules
Security Policy – whole drive or partial encryption
Security Policy based enforced encryption
Fastest encryption – 16 GB in one minute
Encryption .exe is portable, use on any computer
in the world – no license required!
Secured workflow - work in a “secured
vault” – create, edit, delete
Unlimited Passwords
Help Desk Lost Password Recovery Support
DCR – Data Content Reporting
•
•
•
Inventory list of all secured USB flash drives &
what user that owns it
Monitor all content on every secured USB flash
drive in the organization by manufacturer
Automatic data audit reporting – by user,
access, actions and files
The Simple Encryption Platform
SEP
Secured eMail, Secured eFile and Secured eUSB
Components
From Small Businesses to Large Enterprises
.........................................
Standard components
•
SEP Server – Run as a service on the
main server.
•
SEP Management Console - .NET based
management application that can run
on the server or at any desktop. This
means it is possible to do management
from any location of choice.
•
Client Distribution package – Contains
the MSI generator that will create the
MSI package.
•
SEP Client installation package –
Generated inside the SEP
Management Console.
Additional components
•
Secured eCollaboration solution - A
WSP add in that integrates into
SharePoint.
•
Secured eMail – For Lotus Notes there is
a Lotus Notes Deployment tool and
template editor.
•
Secured eUSB – All encrypted USB flash
drives have a Secured eUSB client that
operates the end user interface and
the connection to the SEP server.
Enterprise
Deployment Architecture Diagram
.........................................
Cryptzone deployment architecture diagram
Directory
Services
•
Storage – All data is stored in a SQL
database. The SEP server can connect
to any standard Microsoft SQL
database.
•
Directories - The SEP main server can
connect to ActiveDirectory and
SharePoint for user and group
management.
•
The SEP client can connect to the
central server using SSL or HTTPS.
•
Deployment and scaling instructions
can be found at
http://www.cryptzone.com/download
center/enterprise/
Microsoft SQL Server
Main company server
SEP Server,
SEP MC
Backup server
SEP Server,
SEP MC
Organization Network
Synchronized SEP Client
Clients using SEP
Installation and set up
From Small Businesses to Large Enterprises
.........................................
•
A standard installation takes 1-4 hours
depending on set up.
•
The solution comes with a Best Practice
Set up Wizard that is easy to follow. The
Best Practice policy are the most
commonly used policy among
Cryptzone customers. The wizard will
assist with set up of
–
–
–
–
–
–
–
•
AD connection and sync
Define Master Password
Define Admin Password
Select the main administrator
License management policy
Assign default policy to all users
Generate custom templates
Cryptzone Professional Service team
can assist organizations in the set up
process of the solution.
•
The configuration manual help
organizations to configure the pre
designed Best Practices policy to fit the
organizations requirements. The
configuration manual are available at
http://www.cryptzone.com/download
center/enterprise/
•
A special manual how to set up the
solution for external access using a
web service is available at
http://www.cryptzone.com/download
center/enterprise/
•
A special manual for Lotus Notes users
are available at
http://www.cryptzone.com/download
center/enterprise/
Redundancy and backup
No worries
.........................................
SQL Database
•
The core component of Simple
Encryption Platform is the database in
SQL. This means it is very important to
back up the database daily.
•
The database can easily be moved to
any location without any problems.
•
SEP Clients will not be affected if the
server where the SEP server
components is installed will go down or
fail. The SEP server and SEP
Management console can easily be
reinstalled and reconnected to the SQL
Database in less than 10 minutes.
Clients
•
If the SEP server goes down the SEP clients
will continue to function without any issues.
Lost functionality will be;
•
Policies can not be updated centrally
•
NEW encryption keys cannot be
synchronized.
•
Users cannot change access rights to
secured files/folders.
•
If a user secures a file/folder the user
cannot add access right to other
users.
•
USB memory sticks that has been
encrypted with Secured eUSB will
capture logs file locally until the SEP
server is up and running and will then
deliver the updated information.
•
Licenses cannot be moved or
changed.
Considerations
Storage and network utilization
.........................................
Enterprise Server
•
1 user profile will on average store up to 100 k
per user profile.
•
The network handshake between the
Management Server and the SEP Client or
agent, takes 8KB.
•
•
Desktop Client
•
SEP Client dynamically load and release
resources as needed, system resources used
will vary depending on tasks and licenses. In
passive mode the SEP monitor will use ~2700K
of memory and USB monitor around 980K.
CPU usage is negligible.
SEP Client and user agent have separate
polices updates, but will average on 0.4Kb –
1KB per policy depending on the information
it includes. Event takes approximately 0.4KB.
Sending an event to the Management Server
takes 1KB, not including the event file itself
(the log file).
•
In active mode during a user session the task
of securing a file will average around 8 MB for
SEP monitor and 4-10 MB SEMX Explorer. SEMX
can have a peak memory usage of 27 MB for
an operation and on a 2.4 Ghz system CPU
usage averages on 50% during intense
encryption operations.
SEP Client, Secured eUSB will store logs locally
until synchronized with the server. Size of logs
will vary depending on the number of
changes performed per action. Logs are
filtered and compressed before transferring to
SEP to minimize traffic and storage. A log file
for normal file usage will estimated on
average take 0.6 KB per completed action.
•
Opening additional secured folders will use 410 MB for each folder, so should a user
choose to have 10 active secured folders the
combined memory usage would be 40+ MB.
As folders are closed and the SEP Client is
logged out, memory usage will return to
passive mode. During a normal install disk
space usage is below 15MB for the SEP Client
and log file can be size restricted or disabled
depending on configuration.
Uninstallation
What to think about
.........................................
Encrypted data
•
•
•
Files and folders - All encrypted files
and folders needs to be unencrypted
before uninstalling the software.
USB Memory sticks - Encrypted USB
memory stick will continue to function
without the SEP Server. To uninstall the
solution from the USB memory stick,
unencrypt all data and then format the
stick.
Emails – If the organization needs easy
access to encrypted emails then the
archive function should be activated
when the software is installed. Then the
organization will have a centralized
storage of all sensitive data. The data
can be stored secured or unsecured.
SEP Server
•
Store and document Master password
and all Group passwords.
•
Backup and store the database for
future reference.
•
Store a set of the installation files and
manuals.
Support and documentation
With focus on professional support
.........................................
Support
•
Support calls available - 24/7/365.
Cryptzone support is performed by
highly skilled Solution Engineers that will
contact customer within 24 hours for
personal support.
–
–
–
Phone UK: +44 800 680 0657
Phone USA/Canada: +1.888.533.6365
Phone Sweden: +46 (0)31 773 86 93
•
Customers can email support questions
to support@cryptzone.com or go to
www.cryptzone.com/support for more
help.
•
The Solution Engineers have access to
professional tools making it possible for
them to see customers screen and give
better support.
Cryptzone Professional Services team
offers special support, deployment,
educations etc. at a fee.
•
Documentation
•
Manuals and instructions can be
downloaded at
www.cryptzone.com/downloadcenter/enter
prise
•
For Whitepapers and more technical papers
go to
www.cryptzone.com/downloadcenter/enter
prise
•
FAQ and discussion forum are available at
http://support.cryptzone.com/
Use Cases for the
Simple Encryption Platform
Password Recovery
For Secured eMail
.........................................
No helpdesk necessary
•
•
Shared secret recovery – If the user
would need to remember a shared
secret created for a specific secured
contact the user can find this
information in their own client. The user
simply goes to settings and the secured
contact list. There they can display all
shared secrets ever created to a
secured contact.
Central Policy - If this is possible or not
can be defined by policy.
Password Recovery
For Secured eFile and Secured eUSB
.........................................
Password Recovery Wizard
•
•
•
•
Helpdesk user - The system comes with a
ready to go Helpdesk user that can
perform the Password Recovery task.
User message – Everywhere where an
end user needs to enter a password there
is a message informing about password
recovery. It is possible to centrally define
the information.
Recovery ticket – For every Secured file,
folder or USB there is a unique recovery
ticket.
Recover wizard - The system offers a
Recovery Wizard for helpdesk. The wizard
will tell the helpdesk personnel what user
that created the secured file, folder or
USB. This is to assist helpdesk to do a
security check of the person calling.
Restore of user profile
Nothing to worry about it is all automatic
.........................................
Issues
•
•
•
•
•
User profile in Citrix / Terminal server gets
damaged and needs to be recreated
User machine crashes and the data
cannot be restored
User have several machines
Windows crashes
Etc…
Solution
•
•
Global Object Synchronization –
Cryptzone has built a synchronization
concept where information like
policies, licenses, encryption keys, logs,
templates etc. are automatically
synchronized between Cryptzone
server and one or several clients. For
the IT department this means that a
recovery is fully automatic in case of
the issues to the right happens. All that
needs to be done is to reinstall the
client.
Encrypted emails, files and folders can
and will be backuped in the same
procedure as any other email, file or
folder.
Give licenses to end users
License management
.........................................
How to give license
•
Licensing for SEP is managed per user.
Each user is allowed to have the
software installed on several machines
and only 1 license will be used.
•
The SEP Management Console is used
to manage licenses. A license can be
added or removed from a user on the
fly.
•
The system comes with the ability to
manage licenses by policies. Example:
–
–
–
If user belongs to certain group the user will
receive a license automatically. If user is removed
from group the license will be removed.
A group can be a AD group, SharePoint group or
custom created group in the system.
System manager can give licenses to end users
manually.
An employee leaves
How to recover all information
.........................................
Data recovery
•
Encrypted USB sticks – All USB sticks can
be opened with the master password.
•
Secured files and folders – All secured
files and folders can be opened and
unencrypted with the master password.
•
Secured eMail – Simply log in as the user
to a profile and all secured emails can
be accessed. Another possibility is also
to use the archiving function where all
secured emails can be stored at central
location.
Lock down
•
Encrypted USB sticks – Can be lock
down using the Kill Pill Command in the
SEP Management Console
•
Secured files and folders – Will be
locked down automatically using AD
Disable or Delete command for an AD
account. It is also possible to remove
access by removing the user license.
•
Secured eMail – Will be locked down
automatically using AD Disable or
Delete command for an AD account. It
is also possible to remove access by
removing the user license
Cryptzone Group
(publ) AB
Global Headquarters:
Drakegatan 7, SE-412 50 Goteborg, Sweden
+46 31 776 86 00
www.cryptzone.com
support@cryptzone.com
Download