TRUSTED SOLUTION FOR THE PROTECTION OF SENSITIVE INFORMATION DATA SECURITY N E TWOR K S EC U RITY I E N D P O I N T S EC U R I T Y I D ATA S EC U R I T Y DATA CONFIDENTIALITY: ARE YOU READY? NEGLIGENCE AND INDUSTRIAL ESPIONAGE ARE ONLY PART OF THE PROBLEM An organization’s most precious asset, information, is constantly exposed to numerous instances where it can be lost or stolen – malicious behavior from inside the company, the theft of computers, data leaks due to the exploitation of a vulnerability, unauthorized access to a computer or even the careless configuration of a security policy, etc. NEW USER HABITS With the growth of outsourced infrastructures, applications in the cloud and/or the mobility of collaborators working on multiple peripheral devices (including personal devices (BYOD), organizations have no other option but to come to terms with new user habits. This transformation of the digital landscape increases exposure to the risks involved in sharing information. IMPACT These changes present a real cost to the organization: • Loss of clients and/or projects • Loss of the trust of coworkers • Tarnished public image of the organization • • Theft of sensitive data such as IP, customer and employee data , R&D, etc. Remediation in terms of human and financial resources DATA THEFT IN A FEW FIGURES Source : Ponemon 33% of incidents of data theft are linked to a malicious internal employee $5.4 M Total average cost by organization per data breach Data protection How confidential is your data? RESELLERS Your resellers are multi-brand entities with diverse partnerships and relationships. Would you like your sales practices to be made known to your competitors? Client Sales communication with Distributors/Wholesalers Client Client Sales representative with a client ON-CALL TECHNICAL SUPPORT Your client’s sensitive information (technical architecture, information on equipment deployed) is viewed on a mobile terminal. Is confidentiality guaranteed for your client? EXTERNAL Technological partners Shared calendar Sales Technical support EXTERNAL (trusted partners) INTERNAL (2nd level) Products & Marketing INTERNAL (1st level) YOU R&D Production line (Product A) Qualiÿcation unit in a subsidiary CREATING INNOVATION THAT SPELLS YOUR SUCCESS Launching products requires sharing plans that, once communicated to a third party, are no longer considered a trade secret for your organization. What if an indiscretion took place and your idea was leaked? Management Accounts & Human Resources Telecommuting Presentation for Shareholders DISMISSAL PROCEDURE IN PROGRESS Are you able to guarantee the ethical behavior of a coworker holding on to unencrypted information on his computer or storage device? Would you take this risk? Production line (Product B) New Production line (Product C) Payroll management solution SERVICES IN THE CLOUD Your unencrypted data is stored on a server. Do you know the level of protection or the names of your provider’s subcontractors? Do you know what country your data may be in? Stormshield Data Security THE SECURITY SOLUTION THAT ALLOWS CONTROL OF THE CONFIDENTIALITY OF SENSITIVE INFORMATION WHILE ENJOYING THE ADVANTAGES OF CLOUD-BASED COLLABORATION IN TODAY’S MOBILE WORLD. MAIN FEATURES SIMPLE MANAGEMENT OF TRUST BUBBLES Easy to integrate into collaboration or communication tools, this encryption solution is scalable and particularly adapted to global deployments by department or by project. GUARANTEED CONFIDENTIALITY By dissociating the way confidential data is accessed from the way it is read, the confidentiality of the data is guaranteed. Furthermore, Stormshield Data Security’s technology has been certified by multiple international organizations (Common Criteria, NATO and others). CENTRALIZED ADMINISTRATION With the unique Stormshield Data Security tool, organizations reduce human resources costs (training and maintenance) and eliminate the risks relating to interoperability issues between various solutions. ADVANTAGES FOR THE CLIENT Sharing and storing confidential data for members of a collaboration unit Total independence from the infrastructure Systems and network administrators as well as hosting providers will not have access to sensitive information Simple to use thanks to its easy integration into standard tools (Outlook, SharePoint, Windows 7 or 8, etc.) EAL3+-certified cryptographic implementation qualified by the ANSSI and NATO, adapted to the protection of “Restricted” data Integration into an organization's infrastructure regardless of whether it has an Active Directory or PKI Control over data •Seamless encryption of local or shared folders •Automated encryption •Integration with mail clients for electronic mail signature and confidentiality •Security of data shared confidentially between internal and external collaborators •Confidentiality of data contained in a virtual volume Authentication and destruction •Sign any type of fi e •Help provided for digitizing administrative and sales procedures •Secure and irreversible deletion of fi es and folders Centralized administration •Manage security policies •Manage user identities Smart Card Extension • Smart Card Extension allows the user to store private keys in an external cryptographic device (SmartCard or USB). • SDS Smart Card Extension is compatible with all cryptographic devices using the standard PKCS11. STAY IN CONTROL OF YOUR DATA WITH STORMSHIELD DATA SECURITY Preserve the confidentiality and integrity of your information while taking full advantage of the potential in cloud-based collaboration. How do you guarantee the confidentiality of your business data when mobility has become part and parcel of everyday life? Is there a way to be protected from external interception or internal indiscretion? Seamless and built into your usual communication tools, the Stormshield Data Security solution allows your specialized teams to create safe collaboration environments, regardless of the medium (e-mail, USB keys, etc), terminal (computer, smartphone) and application (collaborative, intranet, shared networks, etc.) used. Advantages of the solution • Fully turnkey solution (centralized administration, PKI, encryption agent) • Comprehensive data security service based on a trusted infrastructure that we provide • Certified solution • Scalable solution: adapted to largescale deployments (large groups) as well as projects or services Its proven robustness, backed by its EAL3+/ NATO certifications, means that Stormshield Data Security will ensure the preservation of the confidentiality of projects from any internal or external indiscretion. With Stormshield Data Security, sensitive information is protected from end to end – when it is created, modified or transferred. PROTECTION IN AN UNCONTROLLED INFRASTRUCTURE PROTECTION FROM INTERNAL THREATS On-premises / Private cloud / Public cloud Malicious administrators Vulnerabilities of datacenters Accidental data leaks Improper use leading to data leaks (e.g. recycling authentication credentials) Unauthorized access to workstations Maliciousness of employees with privileges on the system, the network or in a database Interception of data over the network Theft of peripherals Collaborating in total security has never been this easy 1. Work Create sensitive content in full security Store conÿdential information on removable media Exchange important data inside and outside the organization 2. Define Allow users to manage the conÿdentiality of their data Allow users to deÿne their trust bubble themselves Manage data conÿdentiality and integrity 3. Share Safely communicate through e-mail Save ÿles or volumes conÿdentially on removable media Collaborate simply in workspaces over the network Exchange sensitive information with external parties 4. Guarantee 5. Collaborate Integrate the solution easily into standard tools Take advantage of the simple user experience Beneÿt from features from various platforms Opt for strong authentication Deploy a separate authentication method from the one o°e red by Windows Reap the beneÿts of a trusted infrastructure Erase data by rewriting over it Separate security administration and IT administration roles A full data control range TEAM Create a personal or collaborative trust bubble in a shared location. SHREDDER Irreversibly destroy all sensitive data. TRUST AUTHORITY MANAGER DELETION AUTHENTICATION Centralized Administration. SIGN Sign data and communications. CONFIDENTIALITY DISK FILE Protect data on hard drives or peripheral devices. Protect data inside and outside the organization by guaranteeing integrity. MAIL Protect the conÿdentiality of information contained in e-mails. Stormshield Data Security (SDS) offers end-to-end encrypted security in exchanges and collaboration. The identification of users and verification of their security keys through SDS in the trusted zone guarantee their authentication. SELECT PACK PREMIUM PACK ULTIMATE PACK Centralized administration Centralized administration Centralized administration AUTHORITY MANAGER AUTHORITY MANAGER AUTHORITY MANAGER Modules Modules Modules TEAM TEAM TEAM DISK DISK DISK MAIL MAIL MAIL FILE FILE FILE SIGN SIGN SIGN SHREDDER SHREDDER SHREDDER SMART CARD SMART CARD SMART CARD Arkoon and Netasq, fully owned subsidiaries of Airbus Defence and Space, run the Stormshield brand and offer innovative end-to-end security solutions to protect networks (Stormshield Network Security), workstations (Stormshield Endpoint Security) and data (Stormshield Data Security). WWW.STORMSHIELD.EU Version 1.1 - Copyright Arkoon 2015 Technical Information MODULES CENTRALIZED ADMINISTRATION CONSOLE Platforms Platforms Operating systems Windows Vista SP2 (32 bits); Windows Seven SP1 (32 & 64 bits); Windows 8.1 (32 bits & 64 bits) Operating systems Windows Seven SP1 (32 & 64 bits); Windows Server 2008 R2 Disk space required 200 MB Mail clients Microsoft Outlook (2003, 2007, 2010, 2013), Lotus Notes (8.x) Compatibility Microsoft SQL 2008 R2 & SQL Express; Internet Information Services 7.0 (IIS); Internet Explorer 10 & 11 Hardware Security Module (PKCS 11) Disk space required 200 MB Standards and norms supported CMS; S/MIME (V3); LDAP; X509 (1 & 3); CRLs; PKCS (1, 5, 7, 10, 12); Chip cards and USB tokens (PKCS 11) Encryption algorithms RSA of up to 4,096 bits; AES (128 & 256 bits); SHA-256; SHA-1; HMAC CERTIFICATIONS AND QUALIFICATIONS Common Criteria EAL4+ certification for the cryptographic engine Common Criteria EAL3+ certification Reference in the NATO Catalogue Qualified for the protection of data tagged “DR” and “DRSF” NATO COMMON CRITERIA OTAN NATO CATALOGUE COMMON CRITERIA CERTIFIED CERTIFIED EAL3 + EAL4 + COMMON CRITERIA WWW.STORMSHIELD.EU