ProShield Introduction 20101217
-
Upload
tham-my-vien -
Category
Documents
-
view
138 -
download
2
Transcript of ProShield Introduction 20101217
ProShield Introduction
December 2010
ProShield Remote Control
3 CONFIDENTIAL
BIOS Settings
BIOS supervisor/user password
Boot sequence
BIOS Refresh
Log and Report
TPM status report
ProShield Remote Control
Altiris Server+ProSheild plug-in
acer desktop
LAN
acerlaptops
Security Policy Depolyment
BIOS settings
BIOS remote refresh
Return Audit Log and Report
Altiris agent
4 CONFIDENTIAL
Business Security
Easy Setup
Through Altiris agent, Administrator could remote setting up BIOS password and boot sequence for PCs.
Easy Use
Web-based applications
Easy to discover computer from LAN and deploy company Computer Security Policy to both acer laptops and desktops
Log and Report
Audit log
Key word search for ProShield event update
ProShield Client
6 CONFIDENTIAL
BIOS Settings
BIOS Security
User can setup BIOS password from ProShieldGUI console instead CMOS
Enable password pre-boot authentication for data-at-rest protection
Set BIOS asset tag for asset management
Computer Boot Order Settings
Setup boot order from hardware drive, optical drive, removable device, or network boot to make sure system bootable.
Backup/Restore BIOS settings
Backup file is protected by password.
HDD drive
Optical driveFloppy drive
pen drive
BIOS Password Check
7 CONFIDENTIAL
Credential Manager
Popular Authentication Service
ProShield provides the two popular authentication services, ProShield password and Fingerprint.
If user enable fingerprint credential, he or she can logon computer securely.
Online account
Records all logins to password bank with “auto-fill-in”
Support specific URLs of IE, Firefox & popular AP like MSN, Skype
TPM
Using TPM hardware key to protect the EFS certificate. Making sure the data is well protection in specific system.
Backup/Restore
User can backup all credential manager settings for restore.
8 CONFIDENTIAL
Pre-boot Authentication
Fingerprint
Allow two PBA fingerprints for every user
Identify user from power on computer
Offer BIOS password single-sign-on to Windows logon
9 CONFIDENTIAL
Data Protection
Powerful Data Protection File encryption (AES-256)
Personal Secure Disk encryption
batch mode file encryption
Easy Drag & Drop File to Control Center A convenient Control Center for file
encryption, decryption and PSD storage
Simply drag & drop files for convenient file security
Convenient Self-decrypting File Sharing The convenience of being able to share your
protected files with friends that do not have a decryption tool installed.
10 CONFIDENTIAL
Powerful Data Protection
Powerful file encryption with strong AES 256-bit algorithm, the same type of encryption that National Department of Defense used.
Batch mode file encryption, automatically encrypt files in your assigned folder.
Personal Secure Disk lets you to secure all data in a hidden folder that no one finds.
10
PSD is much valuable to keep private data especially for desktop which are usually shared in use!!!
Can’t find the vault and data!
It’s hidden & protected!
Put into PSD.. Close PSD!
11 CONFIDENTIAL
Convenient
Convenient Self-decrypting File The convenience of being able to share your
protected files with friends that do not have a decryption tool installed
Right-Click menu Decrypt File
Encrypt File
Move to PSD
Encrypting File System (EFS) with TPM protection
11
12 CONFIDENTIAL
Data Removal
Fix DONE!Open PC to check…
1 2 3
4 5
6
7
Trouble occurs when PC is not with you..
13 CONFIDENTIAL
File Shredder
File Shredder Shred sensitive documents securely
Support files & folders
Fast, Secure and reliable
Easy to use & multiple entries
Proven shredding algorithm U.S.Department of Defense Sanitizing
(DoD 5220.22-M ECE)
Leading Recovery tool cannot retry! Final Recovery
Handy recovery
Smart Data recovery
Easy recovery
Undelete Plus
Restoration
VitualLab Data Recovery
14 CONFIDENTIAL
Performance Results
Competitor A Competitor B Competitor C
15 CONFIDENTIAL
ComparisonHP Dell Acer ProShield
NBProBook
DTHP Pro
NBVostro
DTVostro
Pre-boot security V X X X V(FPR)
TPM V(EFS, PSD)
X X X V(EFS)
Fingerprint ∆ X ∆ X V
Rescue Key V(spare Key)
X X X V(Admin reset pw)
File/Disk Shredder V(Disk Shred)
X X V(File Shred)
V(File Shred)
One Step Log-On V X V X V
File Encryption V ? X X V
Disk Encryption X X V(SED)
X X
Ports Lock V V X X V(BIOS)
Anti-theft V X X X X
Thank You!