DATA SECURITY

advertisement
TRUSTED SOLUTION FOR THE PROTECTION OF SENSITIVE INFORMATION
DATA SECURITY
N E TWOR K S EC U RITY
I
E N D P O I N T S EC U R I T Y
I
D ATA S EC U R I T Y
DATA CONFIDENTIALITY:
ARE YOU READY?
NEGLIGENCE AND INDUSTRIAL ESPIONAGE ARE ONLY PART OF THE PROBLEM
An organization’s most precious asset, information, is constantly exposed to numerous
instances where it can be lost or stolen – malicious behavior from inside the company,
the theft of computers, data leaks due to the exploitation of a vulnerability, unauthorized
access to a computer or even the careless configuration of a security policy, etc.
NEW USER HABITS
With the growth of outsourced infrastructures, applications in the cloud and/or the
mobility of collaborators working on multiple peripheral devices (including personal
devices (BYOD), organizations have no other option but to come to terms with new user
habits. This transformation of the digital landscape increases exposure to the risks
involved in sharing information.
IMPACT
These changes present a real cost to the organization:
• Loss of clients and/or projects
• Loss of the trust of coworkers
• Tarnished public image of the organization
•
•
Theft of sensitive data such as IP, customer and employee data ,
R&D, etc.
Remediation in terms of human and financial resources
DATA THEFT IN A FEW FIGURES
Source : Ponemon
33%
of incidents of data theft are linked to a
malicious internal employee
$5.4 M
Total average cost by
organization per data
breach
Data protection
How confidential is
your data?
RESELLERS
Your resellers are multi-brand entities with
diverse partnerships and relationships.
Would you like your sales practices to be
made known to your competitors?
Client
Sales communication
with Distributors/Wholesalers
Client
Client
Sales representative
with a client
ON-CALL TECHNICAL SUPPORT
Your client’s sensitive information
(technical architecture,
information on equipment
deployed) is viewed on a mobile
terminal. Is confidentiality
guaranteed for your client?
EXTERNAL
Technological
partners
Shared
calendar
Sales
Technical
support
EXTERNAL (trusted partners)
INTERNAL (2nd level)
Products &
Marketing
INTERNAL (1st level)
YOU
R&D
Production line
(Product A)
Qualiÿcation unit
in a subsidiary
CREATING INNOVATION THAT SPELLS
YOUR SUCCESS
Launching products requires sharing
plans that, once communicated to a
third party, are no longer considered
a trade secret for your organization.
What if an indiscretion took place
and your idea was leaked?
Management
Accounts
&
Human Resources
Telecommuting
Presentation
for Shareholders
DISMISSAL PROCEDURE IN
PROGRESS
Are you able to guarantee the
ethical behavior of a coworker
holding on to unencrypted
information on his computer or
storage device? Would you take
this risk?
Production line
(Product B)
New Production line
(Product C)
Payroll management
solution
SERVICES IN THE CLOUD
Your unencrypted data is stored on a
server. Do you know the level of protection
or the names of your provider’s
subcontractors? Do you know what
country your data may be in?
Stormshield
Data Security
THE SECURITY SOLUTION THAT ALLOWS CONTROL OF
THE CONFIDENTIALITY OF SENSITIVE INFORMATION
WHILE ENJOYING THE ADVANTAGES OF CLOUD-BASED
COLLABORATION IN TODAY’S MOBILE WORLD.
MAIN
FEATURES
SIMPLE MANAGEMENT OF TRUST BUBBLES
Easy to integrate into collaboration or communication
tools, this encryption
solution
is
scalable
and
particularly adapted to global deployments by department or
by project.
GUARANTEED CONFIDENTIALITY
By dissociating the way confidential data is accessed from the
way it is read, the confidentiality of the data is guaranteed.
Furthermore, Stormshield Data Security’s technology has
been certified by multiple international organizations
(Common Criteria, NATO and others).
CENTRALIZED ADMINISTRATION
With the unique Stormshield Data Security tool, organizations
reduce human resources costs (training and maintenance) and
eliminate the risks relating to interoperability issues between
various solutions.
ADVANTAGES FOR THE CLIENT

Sharing and storing confidential data
for members of a collaboration unit
Total independence from the infrastructure
Systems and network administrators as well as hosting
providers will not have access to sensitive information
Simple to use
thanks to its easy integration into standard tools
(Outlook, SharePoint, Windows 7 or 8, etc.)
EAL3+-certified cryptographic implementation
qualified by the ANSSI and NATO,
adapted to the protection of “Restricted” data
Integration into an organization's infrastructure
regardless of whether it has an Active Directory or PKI
Control over data
•Seamless encryption of local or
shared folders
•Automated encryption
•Integration with mail clients for
electronic mail signature and
confidentiality
•Security of data shared
confidentially between internal
and external collaborators
•Confidentiality of data contained
in a virtual volume
Authentication and destruction
•Sign any type of fi e
•Help provided for digitizing
administrative and sales
procedures
•Secure and irreversible deletion of
fi es and folders
Centralized administration
•Manage security policies
•Manage user identities
Smart Card Extension
• Smart Card Extension allows the
user to store private keys in an
external cryptographic device
(SmartCard or USB).
• SDS Smart Card Extension is
compatible with all cryptographic
devices using the standard PKCS11.
STAY IN CONTROL OF
YOUR DATA
WITH STORMSHIELD DATA SECURITY
Preserve the confidentiality and integrity of your information while
taking full advantage of the potential in cloud-based collaboration.
How do you guarantee the confidentiality of your
business data when mobility has become part
and parcel of everyday life? Is there a way to be
protected from external interception or internal
indiscretion?
Seamless and built into your usual communication tools, the Stormshield Data Security solution
allows your specialized teams to create safe collaboration environments, regardless of the medium (e-mail, USB keys, etc), terminal (computer,
smartphone) and application (collaborative, intranet, shared networks, etc.) used.
Advantages of the solution
• Fully turnkey solution (centralized
administration, PKI, encryption
agent)
• Comprehensive data security service
based on a trusted infrastructure that
we provide
• Certified solution
• Scalable solution: adapted to largescale deployments (large groups) as
well as projects or services
Its proven robustness, backed by its EAL3+/
NATO certifications, means that Stormshield Data Security will ensure the preservation of
the confidentiality of projects from any internal or external indiscretion.
With Stormshield Data Security, sensitive information is protected from end to end – when it
is created, modified or transferred.
PROTECTION IN AN
UNCONTROLLED
INFRASTRUCTURE
PROTECTION
FROM
INTERNAL THREATS
On-premises / Private cloud / Public cloud
Malicious administrators
Vulnerabilities of datacenters
Accidental data leaks
Improper use leading to data leaks (e.g. recycling
authentication credentials)
Unauthorized access to workstations
Maliciousness of employees with privileges on the
system, the network or in a database
Interception of data over the network
Theft of peripherals
Collaborating in total security
has never been this easy
1. Work
Create sensitive content in full
security
Store conÿdential information on
removable media
Exchange important data inside
and outside the organization
2. Define
Allow users to manage the
conÿdentiality of their data
Allow users to deÿne their
trust bubble themselves
Manage data conÿdentiality
and integrity
3. Share
Safely communicate through e-mail
Save ÿles or volumes conÿdentially
on removable media
Collaborate simply in workspaces
over the network
Exchange sensitive information with
external parties
4. Guarantee
5. Collaborate
Integrate the solution easily
into standard tools
Take advantage
of the simple user experience
Beneÿt from features
from various platforms
Opt for strong authentication
Deploy a separate authentication
method from the one o°e red by
Windows
Reap the beneÿts of a trusted
infrastructure
Erase data by rewriting over it
Separate security administration
and IT administration roles
A full data control
range
TEAM
Create a personal
or collaborative
trust bubble in a
shared location.
SHREDDER
Irreversibly
destroy all
sensitive data.
TRUST
AUTHORITY MANAGER
DELETION
AUTHENTICATION
Centralized
Administration.
SIGN
Sign data and
communications.
CONFIDENTIALITY
DISK
FILE
Protect data on
hard drives or
peripheral devices.
Protect data
inside and
outside the
organization by
guaranteeing
integrity.
MAIL
Protect the
conÿdentiality of
information
contained in
e-mails.
Stormshield Data Security (SDS) offers end-to-end
encrypted security
in
exchanges
and
collaboration.
The
identification of users and
verification of their security keys through SDS in the
trusted zone guarantee their authentication.
SELECT
PACK
PREMIUM
PACK
ULTIMATE
PACK
Centralized administration
Centralized administration
Centralized administration
AUTHORITY MANAGER
AUTHORITY MANAGER
AUTHORITY MANAGER
Modules
Modules
Modules
TEAM
TEAM
TEAM
DISK
DISK
DISK
MAIL
MAIL
MAIL
FILE
FILE
FILE
SIGN
SIGN
SIGN
SHREDDER
SHREDDER
SHREDDER
SMART CARD
SMART CARD
SMART CARD
Arkoon and Netasq, fully owned subsidiaries of Airbus Defence and Space, run the Stormshield brand and offer
innovative end-to-end security solutions to protect networks (Stormshield Network Security), workstations
(Stormshield Endpoint Security) and data (Stormshield Data Security).
WWW.STORMSHIELD.EU
Version 1.1 - Copyright Arkoon 2015
Technical Information
MODULES
CENTRALIZED ADMINISTRATION CONSOLE
Platforms
Platforms
Operating systems
Windows Vista SP2 (32 bits); Windows Seven
SP1 (32 & 64 bits);
Windows 8.1 (32 bits & 64 bits)
Operating systems
Windows Seven SP1 (32 & 64 bits);
Windows Server 2008 R2
Disk space required
200 MB
Mail clients
Microsoft Outlook (2003, 2007, 2010, 2013),
Lotus Notes (8.x)
Compatibility
Microsoft SQL 2008 R2 & SQL Express;
Internet Information Services 7.0 (IIS);
Internet Explorer 10 & 11
Hardware Security Module (PKCS 11)
Disk space required
200 MB
Standards and norms supported
CMS; S/MIME (V3); LDAP; X509 (1 & 3);
CRLs; PKCS (1, 5, 7, 10, 12);
Chip cards and USB tokens (PKCS 11)
Encryption algorithms
RSA of up to 4,096 bits; AES (128 & 256 bits);
SHA-256; SHA-1; HMAC
CERTIFICATIONS AND QUALIFICATIONS
Common Criteria EAL4+ certification for the cryptographic engine
Common Criteria EAL3+ certification
Reference in the NATO Catalogue
Qualified for the protection of data tagged “DR” and “DRSF”
NATO
COMMON CRITERIA
OTAN
NATO
CATALOGUE
COMMON CRITERIA
CERTIFIED
CERTIFIED
EAL3 +
EAL4 +
COMMON
CRITERIA
WWW.STORMSHIELD.EU
Download