Introducing Novell ZENworks Full Disk Encryption€¦ · Introducing Novell ZENworks Full Disk...
Transcript of Introducing Novell ZENworks Full Disk Encryption€¦ · Introducing Novell ZENworks Full Disk...
Introducing Novell ZENworks Full Disk Encryption
Justin Strong
Sr. Product Marketing Manager
© Novell, Inc. All rights reserved. 2
© Novell, Inc. All rights reserved. 2
When one breach could end the world…
…you can’t expect (or trust) users to keep
your data safe.
© Novell, Inc. All rights reserved. 3
What are you prepared to lose?
It’s a matter of when,
what, how often
Maybe nothing
Maybe everything
The Attack Spectrum
It’s not a matter of if.
and (most important) how bad.
© Novell, Inc. All rights reserved. 3
© Novell, Inc. All rights reserved. 4
Affects: Highly-Regulated Industries
Drivers: HIPAA, PCI-DSS, FIPS 140
Pain: Help Me Easily Prove Compliance
DON’T FINE ME
© Novell, Inc. All rights reserved. 5
Affects: Anyone with Third-Party Info
Drivers: Trigger-Happy Lawyers
Pain: Help Me Easily Stop Data Loss
DON’T SUE ME
© Novell, Inc. All rights reserved. 6
Affects: Anyone with Sensitive Information
Drivers: Thieves / Malicious Employees
Pain: Help Me Easily Stop Data Loss
DON’T EXPLOIT ME
© Novell, Inc. All rights reserved. 7
Affects: Anyone with Customer Information
Drivers: Bad Press, Loss Reporting, FUD
Pain: Help Me Preserve My Reputation
DON’T LEAVE ME
© Novell, Inc. All rights reserved. 8
You shouldn’t
have to choose
between
productivity
and protection.
© Novell, Inc. All rights reserved. 8
© Novell, Inc. All rights reserved. 9
DATA IN USE
DATA IN MOTION
Databases & Repositories
300+ File types
File shares, Servers, Laptops
Web Traffic Instant Messages Email
Copy / Save As USB Print / Burn
DATA AT REST
Problem:
DATA LOSS
© Novell, Inc. All rights reserved. 10
There are at least half a dozen different ways to steal your data
You could be getting hacked right
now…without even knowing it. Man-in-the-middle
Drive bombing
Thumb sucking
Data slurping
Hacking
War-driving
Sniffing
Hot spots
© Novell, Inc. All rights reserved. 11
En
dp
oin
t T
hre
ats
cap
e
MA
NA
GE
D
Complex / Inefficient Security Tools
Lost / Stolen USB Drive
USB “Trojan” Drive
Employee Data Theft
WiFi Hacker
Unsecure Access
Network Hacker
Malicious Application
Constantly Changing
Threatscape
ZENworks Unified Console / Agent
Compliance Audits
Patch Stability Problems
Patch Burden
Application Vulnerability
Employee Locked-Out of
Device
Lost / Stolen Computer
Mobile / Remote Workforce
Patch Testing
Automated Reporting
One Solution for Everything File / Folder
Encryption
USB / Port Controls
File / Folder Encryption
WiFi Security
Personal Firewall
Alerts, Monitoring & Reporting
Application Controls VPN
Enforcement
Manage Beyond The Firewall
Full Disk Encryption
Centralized Key Management
Patch Assessment
Automated Patch Dep.
ZESM
ZPM
ZFDE
© Novell, Inc. All rights reserved. 12
ZENworks Asset Management
ZENworks Application Virtualization
ZENworks Patch Management
(SUBCRIPTION OPTION)
Solution:
NEPS (NOVELL ENDPOINT PROTECTION SUITE)
Novell Total Endpoint Management Suite
Novell Endpoint Lifecycle
Management Suite
Novell Endpoint Protection Suite
ZENworks Configuration Management ZENworks Endpoint Security Management
ZENworks Full-Disk Encryption
ZENworks Patch Management (SUBSCRIPTION OPTION)
© Novell, Inc. All rights reserved. 13
Firewall protection
File/folder encryption
Device/port/USB control
Wireless security
Application control
Novell ZENworks Endpoint Security Management
© Novell, Inc. All rights reserved. 13
From a single console, ZENworks lets you manage your enterprise remotely:
down the hall, down the street, across the country, or around the world
Deploy security controls across the enterprise at the push of a button
© Novell, Inc. All rights reserved. 14
Automate deployment
Collect, analyze, pre-test
Monitor and report
Policy-based compliance
Novell ZENworks Patch Management
© Novell, Inc. All rights reserved. 14
From a single console, ZENworks lets you manage your enterprise remotely:
down the hall, down the street, across the country, or around the world
Deploy patches across the enterprise all the time or at the push of a button
© Novell, Inc. All rights reserved. 15
Generate reports demonstrating encryption
Manage hardware & software encryption
Troubleshoot passwords
Turn encryption on/off
Manage access
Novell ZENworks Full Disk Encryption
© Novell, Inc. All rights reserved. 15
From a single console, ZENworks lets you manage your enterprise remotely:
down the hall, down the street, across the country, or around the world
Deploy encryption software across the enterprise at the push of a button
© Novell, Inc. All rights reserved. 16
What is ZENworks 11? Endpoint Lifecycle Management Products
ZENworks Endpoint Management Solutions:
‒ Endpoint Lifecycle Management
‒ Endpoint Security Management
‒ IT Service Management Application Virtualization
Endpoint
Configuration Management
Asset Management
Novell Service Desk
Full Disk Encryption
Endpoint Security Management
Patch Management
© Novell, Inc. All rights reserved. 17
Q & A
801.861.7000 (Worldwide) 800.452.1267 (Toll-free)
Corporate Headquarters 1800 South, Novell Place Provo, Utah 84606
Join us on: www.novell.com
© Novell, Inc. All rights reserved. 18
Unpublished Work of Novell, Inc. All Rights Reserved.
This work is an unpublished work and contains confidential, proprietary, and trade secret information of Novell, Inc.
Access to this work is restricted to Novell employees who have a need to know to perform tasks within the scope of
their assignments. No part of this work may be practiced, performed, copied, distributed, revised, modified, translated,
abridged, condensed, expanded, collected, or adapted without the prior written consent of Novell, Inc. Any use or
exploitation of this work without authorization could subject the perpetrator to criminal and civil liability.
General Disclaimer
This document is not to be construed as a promise by any participating company to develop, deliver, or market a product.
It is not a commitment to deliver any material, code, or functionality, and should not be relied upon in making purchasing
decisions. Novell, Inc. makes no representations or warranties with respect to the contents of this document, and
specifically disclaims any express or implied warranties of merchantability or fitness for any particular purpose.
The development, release, and timing of features or functionality described for Novell products remains at the sole
discretion of Novell. Further, Novell, Inc. reserves the right to revise this document and to make changes to its content,
at any time, without obligation to notify any person or entity of such revisions or changes. All Novell marks referenced
in this presentation are trademarks or registered trademarks of Novell, Inc. in the United States and other countries.
All third-party trademarks are the property of their respective owners.