SlideShare uma empresa Scribd logo
1 de 53
Baixar para ler offline
© SafeNet Confidential and Proprietary
1
Alexandre Bento
alexandre.bento@safenet-inc.com
Tecnologías para el Cumplimiento
© SafeNet Confidential and Proprietary
2
Agenda
 ¿Quién es Safenet?
 Market Background PCI
 Desafíos para PCI
 Soluciones SafeNet para PCI
 Caso de Éxito
© SafeNet Confidential and Proprietary
3
¿Quien es Safenet?
© SafeNet Confidential and Proprietary
4
SafeNet Fact Sheet
La compañía más grande enfocada exclusivamente en la
protección de la información de alto valor.
Fundada: 1983
Capital: Privado
Éxito Global con más de 25.000 clientes en 100
paises
Empleados: Alrededor de 1.500 en 25 paises,
Reconocido liderazgo en Tecnología de Seguridad,
más de 550 ingenieros expertos en cifrado
Acreditados con los productos certificados en los más
altos estándares de seguridad
© SafeNet Confidential and Proprietary
5
Líder en Confianza.
Protegemos cosas como:
> la mayoría del dinero que se mueve en el mundo. 80% de todas las
transferencias intrabancarias -SWIFT- $1 trillón por día
> la mayoría de las identidades digitales en el mundo. 84% de la cuota de
mercado de protección de claves raíces de PKI (Salomon Smith Barney) -
módulos criptográficos (HSMs)
> el número 1 en cifrado de conexiones WAN alta velocidad para Frame
Relay, ATM, líneas dedicadas y Ethernet
> el número 1 en Tokens USB en el mundo (IDC)
© SafeNet Confidential and Proprietary
6
Market Background PCI
© SafeNet Confidential and Proprietary
7
¿Cuales son las amenazas?
Fuente: Ponemon Institute, 2009
© SafeNet Confidential and Proprietary
8
La Evolución de las Incidencias
© SafeNet Confidential and Proprietary
9
¿Objetivo de los Ataques?
 Data, Data and more Data
 Vulnerabilities
© SafeNet Confidential and Proprietary
10
¿Objetivo de los Ataques?
 Data, Data and more Data
 Vulnerabilities
© SafeNet Confidential and Proprietary
11
¿Objetivo de los Ataques?
 Data, Data and more Data
 Vulnerabilities
© SafeNet Confidential and Proprietary
12
¿Objetivo de los Ataques?
 Data, Data and more Data
 Vulnerabilities
© SafeNet Confidential and Proprietary
13
Fraude Online en Alta
Fuente: Anti-Phishing Working Group, marzo 2009
El número de páginas web infectando PCs con programas
diseñados para el robo de contraseñas alcanzo las 31,173 en
diciembre 2009, un incremento de 827 % desde enero de 2008.
Phishing: $3.2 Mil
Millones de Dólares
en 2007 solo en
EEUU
Gartner Dic. 2007
© SafeNet Confidential and Proprietary
14
¿Cómo logran hacerlo?
 Troyanos, Key loggers, Root kits
 Vulnerabilidad Web o Aplicación
 Miembro de la organización que se deja corromper
© SafeNet Confidential and Proprietary
15
¿Cómo logran hacerlo?
 Trojans, Key loggers, Root kits
 Web or Application Vulnerabilities
 The corruptible insider
© SafeNet Confidential and Proprietary
16
¿Cuanto están costando?
Fuente: Ponemon Institute, 2009
47%
© SafeNet Confidential and Proprietary
17
Desafios para PCI
© SafeNet Confidential and Proprietary
18
¿PCI DSS es El Suelo o El Techo ?
• ―PCI DSS es El Techo‖
• Obstáculos a la Implementación―¿excusas?‖
• Demasiado Complejo
• No está al día con las actuales amenazas
• Demasiado tiempo para implementar
• Demasiado costoso para cumplir
• ―PCI DSS es solo El Suelo‖
• Apalancar la Inversión
• Mayor Protección
• 50% Ventaja de Coste
© SafeNet Confidential and Proprietary
19
¿Cuanto está Costando?
Allocation of PCI Investment Best-in-Class All Others
Cost to achieve initial compliance $520K $958K
Time to report 11 mo 11 mo
Annual cost to sustain compliance $135K $300K
Average time since first reporting 2.0 yrs 2.3 yrs
Average total spend on PCI compliance $784K $1,642K
Build & Maintain a Secure Network $197K $375K
Protect Cardholder Data $186K $399K
Maintain a Vulnerability Mgmt Program $88K $188K
Implement Strong Access Control $93K $211K
Regularly Monitor and Test $124K $317K
Maintain an IS Policy $97K $152K
Fuente: Aberdeen Group, 2009
© SafeNet Confidential and Proprietary
20
Buenas Prácticas
 Es protección, no una Casilla de Punteo
 Implique a los stakeholders
 Descubrimiento y clasificación de los datos
 Establezca el modelo de la amenaza
 Documente y defina las políticas de seguridad y los
procedimientos
 Determine dónde proteger datos
© SafeNet Confidential and Proprietary
21
¿Cómo está la Industria hoy?
Objective Requirement Current
Capability
Known
Incidents
Avg. PCI
Spend
Build &
Maintain
Secure
Network
1. Firewall Configurations 85% 16% $250K
2. No Default Passwords 16%
Protect
Cardholder
Data
3. Protect Stored Cardholder Data 71% 23% $242K
4. Encrypt Transmission Across Networks 12%
Maintain
Vulnerability
Mgmt Program
5. Use &Update Antivirus Software 61% 19% $114K
6. Develop & Maintain Secure Applications 28%
Strong Access
Control
7. Restrict Access Business Need-to-Know 65% 24% $124K
8. Assign a Unique ID 18%
9. Restrict Physical Access 15%
Regularly
Monitor & Test
10. Track and Monitor Network Access 78% 23% $169K
11. Regularly Test Security Systems 22%
Maintain IS
Policy
12. Maintain Policies for IS 83% 23% $118K
Fuente: Aberdeen Group, 2009
© SafeNet Confidential and Proprietary
22
Soluciones de Safenet para PCI
© SafeNet Confidential and Proprietary
23
Proteja los datos del titular de la tarjeta que fueron
almacenadosReq. 3
Hard Disk Encryption
SafeNet ProtectDrive
Data Tokenization
SafeNet DataSecure
SafeNet Hardware Security Modules
File/Folder Encryption
SafeNet ProtectFile Unstructured Data
Database Encryption
SafeNet DataSecure for Structured Data
© SafeNet Confidential and Proprietary
24
SafeNet DataSecure Platform
Intelligent Data Protection
DataSecure is the industry’s
most trusted platform to
provide intelligent data
protection for ALL
information assets—both
structured and unstructured,
using centralized:
key management
policy management
logging and auditing
Business Needs SafeNet Solution
Protect sensitive data at
the web, application,
mainframe, database
tiers, including file
servers
Protect Data at Risk –
Most flexible and scalable
hardware-based encryption
platform for heterogeneous
environments
Implement data
encryption controls for
compliance
Comply w/ Legislation –
Proven compliance with laws
requiring protection of
sensitive information
Reduce cost &
complexity with secure
key management and
centralized policy
management
Reduce Operational Cost –
Ease of management and
administration with best-in-
class security management
console
© SafeNet Confidential and Proprietary
25
SafeNet DataSecure
Data Protection, Key, and Policy Management
Mainframes
Web/App
Servers
Endpoint
Devices
Network Shares
File Servers
© SafeNet Confidential and Proprietary
26
DataSecure Database Integration
• Database Connectors
• Oracle 8i, 9i, 10g, 11g
• IBM DB2 version 8, 9
• IBM UDB version 8, 9
• Microsoft SQL Server 2000, 2005,
2008
• Teradata 12
• Application changes not required
• Batch processing tools for managing
large data sets
• Vendor Transparent Database
Integration
• SQL Server 2008
• Oracle 11g
Customer
Database
© SafeNet Confidential and Proprietary
27
• Software Libraries
• Microsoft .NET, CAPI
• JCE (Java)
• PKCS#11 (C/C++)
• SafeNet ICAPI (C/C++)
• z/OS (Cobol, Assembler, etc.)
• XML
• Support for virtually all application and
web server environments
DataSecure Application Integration
Reporting
Application
Customer
Database
E-Commerce
Application
© SafeNet Confidential and Proprietary
28
ProtectFile and ProtectDrive
 File Protection for PCs, File
Servers, and Network Shares
Windows Server 2003
Windows XP, Vista
RHEL 4, 5
 File Server Encryption
File Encryption Keys (FEKs)
protect files on disk
FEKs are encrypted with a Key
Encryption Key (KEK) that
resides on the DataSecure
appliance
 Policy configured on
DataSecure and pushed to file
systems
 Mobile Handset Support
 Full Disk Encryption with
ProtectDrive
End User
Laptop
Network Shares
Corporate
File Server
© SafeNet Confidential and Proprietary
29
 File & Folder encryption whilst cryptographically
enforcing user and group permission-based access to
confidential data.
Protection of workgroup data against unauthorized access
File & Folder Encryption
© SafeNet Confidential and Proprietary
30
 DataSecure—acts as the ―vault‖ for
sensitive data values and token by protecting
with strong encryption and key management
 Token Manager—replaces sensitive data
with format-preserving tokenization via:
Secure Message Layer - SOA-based interface,
callable from anywhere
Protected Zone - host of the Secure Message
Layer, handles calling DataSecure and generating tokens
DataSecure Tokenization
Protected
Zone
DataSecure
Secure
Message Layer
DataSecure
Token Manager
© SafeNet Confidential and Proprietary
31
¿Que es la Tokenización?
 On the most basic level –
Replacement of sensitive structured data with
data of a similar size that is not sensitive (a
―token‖)
Stores sensitive data in an encrypted protected
zone
 More sophisticated approaches involve –
1-to-1 mapping of tokens to sensitive data
(referential integrity)
Presentation Options:
Masked data: XXXXX6789
Data with dashes in it: 123-45-6789
Token type options:
Purely random digits
Sequential
First two/last four, first six, etc.
 Benefits –
Data protection is
―transparent‖ to pure end
users and systems
Only the ―protected zone‖
remains in scope of
compliance audits
Only authenticated end
users or systems can access
data in the clear from the
protected zone
© SafeNet Confidential and Proprietary
32
DataSecure Token Manager
 DataSecure—locks the ―vault‖ for
sensitive data values and token with strong
encryption and key management
 Token Manager—replaces sensitive
data with format-preserving tokenization
via:
Secure Message Layer— SOA-
based interface, callable from anywhere
Protected Zone— host of the Secure
Message Layer, handles calling DataSecure
and generating tokens
ProtectedZone
DataSecure
Secure Message
Layer
Data Vault
© SafeNet Confidential and Proprietary
33
ProtectedZone
DataSecure
Secure Message
Layer
Data Vault
Tokenization Use Case – Credit Card #’s
PCI Auditor for
Compliance
© SafeNet Confidential and Proprietary
34
SafeNet DataSecure Interface
© SafeNet Confidential and Proprietary
35
SafeNet DataSecure Interface
© SafeNet Confidential and Proprietary
36
 Disk encryption of desktops – in conjunction with
Certificate Services
 Access to Pre-Boot Authentication only with
Token/Certificate – no UserID/Password Logon
Protection of all data in case of theft, loss and end of life
Disk Encryption
© SafeNet Confidential and Proprietary
37
Codifique la transmisión de los datos de los titulares de las
tarjetas a través de redes públicas abiertas
Encrypt Network Communications
SafeNet High Speed Ethernet Encryption
Req. 4
© SafeNet Confidential and Proprietary
38
Network Encryption
 Edge Layer- SSL/IPSec
 Boundary Layer- MPLS,
ATM, Frame Relay,
Ethernet transport
connecting branch offices,
remote sites, partners
 Core Layer- Typically
SONET or Ethernet
transport over carrier WAN
or dark fiber
© SafeNet Confidential and Proprietary
39
Best Fit for Layer 2 Encryption
 Ethernet
Encryption
 SONET
Encryption
 Ethernet
Encryption
10/1G
100/10M
© SafeNet Confidential and Proprietary
40
Simplified Management – Layer 2
Transport
Customer Premise Router
Layer 2 Encryptor
Carrier Switch
LAN
Operations
Center
Disaster
Recovery
Location
Operations
Center
When
something
changes
here…
or here…
or here!!!
nothing
changes
here…
No administrative
burden, no outages
and no security policy
changes
Company Confidential
© SafeNet Confidential and Proprietary
41
Security Management Center II
• Easy Installation and Simple Ongoing Management
• Intuitive web-based GUI
• Virtualization Support with VMWare and Solaris Zones
Lowest Cost of Ownership
• Full Audit and Event logging and Reporting
• Secure Remote Management and Encrypted
Communications
• Integrated Key Manager with Optional Hardware-Security
Secure Operations
• Simple Management Design for Thousands of Encryptors
• Rapid Deployment Tools for Large Installations
• Enterprise Class High-Availability Features
Scalability / Reliability
SMC II Is The Only Truly Enterprise Class
Encryptor Management Platform
© SafeNet Confidential and Proprietary
42
Desarrolle y Mantenga Sistemas y Aplicaciones Seguras
Secure Application Development Tools
SafeNet Hardware Security Modules
Approved Payment Applications
SafeNet Hardware Security Modules
Req. 6
© SafeNet Confidential and Proprietary
43
HSM - Protección de Transacciones
Los HSMs de SafeNet
proporcionan la forma más
segura, fácil y rápida de integrar
la solución de seguridad para
aplicaciones y transacciones
para empresas y gobiernos. Las
Certificaciones FIPS y Common
Criteria.
CA4
Luna PCM
ProtectServer Gold
Luna PCI
Luna SA / SP
ProtectHost EFT
Luna XML
Luna SX
© SafeNet Confidential and Proprietary
44
HSM Technology
Breadth of Hardware Security Offerings
Customizable,
Economical
SOA, Web
Services
FastestNetworked,
Scaleable
Performance
PCM, CA4
Luna PCI
Luna SA / SP / IS
Offline Key
Archive,
Registration
Auth
Protect Server
Luna XML
Protect Host EFT
Payments,
EMV/EFT
4000+/sec600/sec 7000/sec27/sec 600/sec1200/sec
300+/sec
© SafeNet Confidential and Proprietary
45
Restrinja el acceso a los datos y Asigne un ID exclusiva
para cada persona que tenga acceso al sistema informático
Privileged User Management
SafeNet Authentication
SafeNet DataSecure
Strong User Authentication
SafeNet Authentication
Network Access Management
SafeNet Authentication
Req. 7
& 8
© SafeNet Confidential and Proprietary
46
PKI Certificates
User Name &
Passwords
Biometric
Credentials
Barcode & Magnetic
Swipe encoding*
Access Controls*
Photo ID*
* Photo ID, Access Control, Bar Code/Magnetic Swipe are applicable to smart cards only
Protección de Identidades – Autenticación
© SafeNet Confidential and Proprietary
47
Soluciones SafeNet para el Ecosistema PCI
© SafeNet Confidential and Proprietary
48
Beneficios
Benefits Proof Points
Single Key Management and
Encryption Solution
 Comprehensive, core-to-edge solution
from a SINGLE vendor
 ONLY solution that secures data across
the connected enterprise for data at rest, in
transit, and in use
Reduces the Cost and Complexity  Integrated security platform with
centralized policy management and
reporting
All critical PCI encryption and key
management requirements are centrally
implemented
Streamlined Implementation  Designed for fast and easy integration
into existing IT infrastructure
Highest Security  FIPS 140-2 Level 2 and Level 3, and CC
Validations
 More than 25 years experience
Comprehensive Audit Trails  Centralized logging and auditing of all
cryptographic functions
© SafeNet Confidential and Proprietary
49
Caso de Éxito
© SafeNet Confidential and Proprietary
50
British Airways
Business
Drivers
• PCI info in Oracle DB, and mainframe
• Proprietary flight information on mainframe
Technical
Requirement
• Sensitive data on their mainframes
• General security & granular level security.
• Gartner said “FIPS level 2 will eventually be a PCI requirement.”
Why SafeNet
• Batch processing between their mainframe and two other databases
• Files needed column level encryption at a command line to handle credit card data.
• Level 2 FIPS compliance
• SafeNet is the only company to offer command line file protection and conversion on the
mainframe
Later Phases
• Working directly with business owners
• Sales
• Risk Management
© SafeNet Confidential and Proprietary
51
British Airways
Bulk Load
TU
3rd Party Apps
InternalApps
z/OS Mainframe Linux MachinesWindows FTP
Servers
Windows File
Servers
NAS
© SafeNet Confidential and Proprietary
52
Casos de Éxito
© SafeNet Confidential and Proprietary
53
Alexandre Bento
alexandre.bento@safenet-inc.com
Gracias

Mais conteúdo relacionado

Mais procurados

ION-E Defense In Depth Presentation for The Institiute of Internal Auditors
ION-E Defense In Depth Presentation for The Institiute of Internal AuditorsION-E Defense In Depth Presentation for The Institiute of Internal Auditors
ION-E Defense In Depth Presentation for The Institiute of Internal Auditors
mdagrossa
 
Cyber-Leave-Behind-Brochure-Done (1)
Cyber-Leave-Behind-Brochure-Done (1)Cyber-Leave-Behind-Brochure-Done (1)
Cyber-Leave-Behind-Brochure-Done (1)
Sam Norallah
 

Mais procurados (20)

Using advanced security and data-protection features
Using advanced security and data-protection featuresUsing advanced security and data-protection features
Using advanced security and data-protection features
 
Practical advice for cloud data protection ulf mattsson - bright talk webin...
Practical advice for cloud data protection   ulf mattsson - bright talk webin...Practical advice for cloud data protection   ulf mattsson - bright talk webin...
Practical advice for cloud data protection ulf mattsson - bright talk webin...
 
JS Fest 2019. Анастасия Войтова. "Defense in depth": trench warfare principle...
JS Fest 2019. Анастасия Войтова. "Defense in depth": trench warfare principle...JS Fest 2019. Анастасия Войтова. "Defense in depth": trench warfare principle...
JS Fest 2019. Анастасия Войтова. "Defense in depth": trench warfare principle...
 
A Migration Imperative With Windows 10 Enterprise-Grade Security
A Migration Imperative With Windows 10 Enterprise-Grade SecurityA Migration Imperative With Windows 10 Enterprise-Grade Security
A Migration Imperative With Windows 10 Enterprise-Grade Security
 
Mack Hardy: Five practical things you can do to secure your online self. Poli...
Mack Hardy: Five practical things you can do to secure your online self. Poli...Mack Hardy: Five practical things you can do to secure your online self. Poli...
Mack Hardy: Five practical things you can do to secure your online self. Poli...
 
The day when 3rd party security providers disappear into cloud bright talk se...
The day when 3rd party security providers disappear into cloud bright talk se...The day when 3rd party security providers disappear into cloud bright talk se...
The day when 3rd party security providers disappear into cloud bright talk se...
 
Drivelock modern approach of it security & amp; encryption solution -whitep...
Drivelock   modern approach of it security & amp; encryption solution -whitep...Drivelock   modern approach of it security & amp; encryption solution -whitep...
Drivelock modern approach of it security & amp; encryption solution -whitep...
 
Recover your files from Ransomware - Ransomware Incident Response by Tictac
Recover your files from Ransomware - Ransomware Incident Response by TictacRecover your files from Ransomware - Ransomware Incident Response by Tictac
Recover your files from Ransomware - Ransomware Incident Response by Tictac
 
Security Myths Surrounding Microsoft Information Protection
Security Myths Surrounding Microsoft Information ProtectionSecurity Myths Surrounding Microsoft Information Protection
Security Myths Surrounding Microsoft Information Protection
 
How Network Data Loss Prevention is Implemented
How Network Data Loss Prevention is ImplementedHow Network Data Loss Prevention is Implemented
How Network Data Loss Prevention is Implemented
 
Data Security: Are you Protected?
Data Security: Are you Protected?Data Security: Are you Protected?
Data Security: Are you Protected?
 
Putting Cyber Attackers on the Defensive
Putting Cyber Attackers on the DefensivePutting Cyber Attackers on the Defensive
Putting Cyber Attackers on the Defensive
 
Fidelis - Live Demonstration of Deception Solution
Fidelis - Live Demonstration of Deception SolutionFidelis - Live Demonstration of Deception Solution
Fidelis - Live Demonstration of Deception Solution
 
PCI DSS Basics - The Twelve Steps
PCI DSS Basics - The Twelve StepsPCI DSS Basics - The Twelve Steps
PCI DSS Basics - The Twelve Steps
 
Five Key Trends for Data-Centric Security
Five Key Trends for Data-Centric SecurityFive Key Trends for Data-Centric Security
Five Key Trends for Data-Centric Security
 
8549 bloombase ss_usl_v1
8549 bloombase ss_usl_v18549 bloombase ss_usl_v1
8549 bloombase ss_usl_v1
 
ION-E Defense In Depth Presentation for The Institiute of Internal Auditors
ION-E Defense In Depth Presentation for The Institiute of Internal AuditorsION-E Defense In Depth Presentation for The Institiute of Internal Auditors
ION-E Defense In Depth Presentation for The Institiute of Internal Auditors
 
Cyber security and ISMS
Cyber security and ISMSCyber security and ISMS
Cyber security and ISMS
 
Cyber Security & User's Privacy Invasion
Cyber Security & User's Privacy InvasionCyber Security & User's Privacy Invasion
Cyber Security & User's Privacy Invasion
 
Cyber-Leave-Behind-Brochure-Done (1)
Cyber-Leave-Behind-Brochure-Done (1)Cyber-Leave-Behind-Brochure-Done (1)
Cyber-Leave-Behind-Brochure-Done (1)
 

Destaque

Tenir nom es important!!! 1
Tenir nom es important!!! 1Tenir nom es important!!! 1
Tenir nom es important!!! 1
escoladamiamateu
 

Destaque (9)

Fundación Vuelta Larga: Restauración de bosques en la región de Paria. Estado...
Fundación Vuelta Larga: Restauración de bosques en la región de Paria. Estado...Fundación Vuelta Larga: Restauración de bosques en la región de Paria. Estado...
Fundación Vuelta Larga: Restauración de bosques en la región de Paria. Estado...
 
Directorio de ONG Ambientales de Venezuela (2012)
Directorio de ONG Ambientales de Venezuela (2012)Directorio de ONG Ambientales de Venezuela (2012)
Directorio de ONG Ambientales de Venezuela (2012)
 
Hacia la sostenibilidad de las OSC: Un debate necesario en América Latina
Hacia la sostenibilidad de las OSC: Un debate necesario en América LatinaHacia la sostenibilidad de las OSC: Un debate necesario en América Latina
Hacia la sostenibilidad de las OSC: Un debate necesario en América Latina
 
Especies Invasoras y Biodiversidad: Introducción al Simposio
Especies Invasoras y Biodiversidad: Introducción al SimposioEspecies Invasoras y Biodiversidad: Introducción al Simposio
Especies Invasoras y Biodiversidad: Introducción al Simposio
 
América Latina: Promesa y desafío para la sostenibilidad
América Latina: Promesa y desafío para la sostenibilidadAmérica Latina: Promesa y desafío para la sostenibilidad
América Latina: Promesa y desafío para la sostenibilidad
 
Tendencias de la inversión social privada en América Latina: Influencias glob...
Tendencias de la inversión social privada en América Latina: Influencias glob...Tendencias de la inversión social privada en América Latina: Influencias glob...
Tendencias de la inversión social privada en América Latina: Influencias glob...
 
Tenir nom es important!!! 1
Tenir nom es important!!! 1Tenir nom es important!!! 1
Tenir nom es important!!! 1
 
Sostenibilidad de las ONG de Venezuela (2013)
Sostenibilidad de las ONG de Venezuela (2013)Sostenibilidad de las ONG de Venezuela (2013)
Sostenibilidad de las ONG de Venezuela (2013)
 
Securing Network-Attached HSMs: The SafeNet Luna SA Three-Layer Authenticatio...
Securing Network-Attached HSMs: The SafeNet Luna SA Three-Layer Authenticatio...Securing Network-Attached HSMs: The SafeNet Luna SA Three-Layer Authenticatio...
Securing Network-Attached HSMs: The SafeNet Luna SA Three-Layer Authenticatio...
 

Semelhante a Tecnologías para el Cumplimiento. Alexandre Bento. SafeNet

Achieving Data Privacy in the Enterprise
Achieving Data Privacy in the EnterpriseAchieving Data Privacy in the Enterprise
Achieving Data Privacy in the Enterprise
SafeNet
 
Cryptographie avancée et Logical Data Fabric : Accélérez le partage et la mig...
Cryptographie avancée et Logical Data Fabric : Accélérez le partage et la mig...Cryptographie avancée et Logical Data Fabric : Accélérez le partage et la mig...
Cryptographie avancée et Logical Data Fabric : Accélérez le partage et la mig...
Denodo
 
Content is King - Symantec
Content is King - SymantecContent is King - Symantec
Content is King - Symantec
Harry Gunns
 

Semelhante a Tecnologías para el Cumplimiento. Alexandre Bento. SafeNet (20)

Life After Compliance march 2010 v2
Life After Compliance march 2010 v2Life After Compliance march 2010 v2
Life After Compliance march 2010 v2
 
IBM Share Conference 2010, Boston, Ulf Mattsson
IBM Share Conference 2010, Boston, Ulf MattssonIBM Share Conference 2010, Boston, Ulf Mattsson
IBM Share Conference 2010, Boston, Ulf Mattsson
 
SafeNet overview 2014
SafeNet overview 2014SafeNet overview 2014
SafeNet overview 2014
 
Jak využít cloudu pro zvýšení bezpečnosti vašeho IT
Jak využít cloudu pro zvýšení bezpečnosti vašeho ITJak využít cloudu pro zvýšení bezpečnosti vašeho IT
Jak využít cloudu pro zvýšení bezpečnosti vašeho IT
 
Unlock the potential of data security 2020
Unlock the potential of data security 2020Unlock the potential of data security 2020
Unlock the potential of data security 2020
 
Whose Cloud Is It Anyway: Exploring Data Security Ownership and Control
Whose Cloud Is It Anyway: Exploring Data Security Ownership and ControlWhose Cloud Is It Anyway: Exploring Data Security Ownership and Control
Whose Cloud Is It Anyway: Exploring Data Security Ownership and Control
 
Payment Card Security: 12-Steps to Meeting PCI-DSS Compliance with SafeNet
Payment Card Security: 12-Steps to Meeting PCI-DSS Compliance with SafeNetPayment Card Security: 12-Steps to Meeting PCI-DSS Compliance with SafeNet
Payment Card Security: 12-Steps to Meeting PCI-DSS Compliance with SafeNet
 
Achieving Data Privacy in the Enterprise
Achieving Data Privacy in the EnterpriseAchieving Data Privacy in the Enterprise
Achieving Data Privacy in the Enterprise
 
Maintaining Trust & Control of your Data in the Cloud
Maintaining Trust & Control of your Data in the CloudMaintaining Trust & Control of your Data in the Cloud
Maintaining Trust & Control of your Data in the Cloud
 
Cryptographie avancée et Logical Data Fabric : Accélérez le partage et la mig...
Cryptographie avancée et Logical Data Fabric : Accélérez le partage et la mig...Cryptographie avancée et Logical Data Fabric : Accélérez le partage et la mig...
Cryptographie avancée et Logical Data Fabric : Accélérez le partage et la mig...
 
Content is King - Symantec
Content is King - SymantecContent is King - Symantec
Content is King - Symantec
 
Nvis, inc. 01 01-2021
Nvis, inc. 01 01-2021Nvis, inc. 01 01-2021
Nvis, inc. 01 01-2021
 
Safend General Presentation 2010
Safend General Presentation 2010Safend General Presentation 2010
Safend General Presentation 2010
 
SafeNet Enterprise Key and Crypto Management
SafeNet Enterprise Key and Crypto ManagementSafeNet Enterprise Key and Crypto Management
SafeNet Enterprise Key and Crypto Management
 
Maintaining Trust & Control of your Data in the Cloud
Maintaining Trust & Control of your Data in the CloudMaintaining Trust & Control of your Data in the Cloud
Maintaining Trust & Control of your Data in the Cloud
 
UNCOVER DATA SECURITY BLIND SPOTS IN YOUR CLOUD, BIG DATA & DEVOPS ENVIRONMENT
UNCOVER DATA SECURITY BLIND SPOTS IN YOUR CLOUD, BIG DATA & DEVOPS ENVIRONMENTUNCOVER DATA SECURITY BLIND SPOTS IN YOUR CLOUD, BIG DATA & DEVOPS ENVIRONMENT
UNCOVER DATA SECURITY BLIND SPOTS IN YOUR CLOUD, BIG DATA & DEVOPS ENVIRONMENT
 
Webinar | Aligning GDPR Requirements with Today's Hybrid Cloud Realities
Webinar  |  Aligning GDPR Requirements with Today's Hybrid Cloud RealitiesWebinar  |  Aligning GDPR Requirements with Today's Hybrid Cloud Realities
Webinar | Aligning GDPR Requirements with Today's Hybrid Cloud Realities
 
General Version 9 21 09
General Version 9 21 09General Version 9 21 09
General Version 9 21 09
 
Cyber Security in the market place: HP CTO Day
Cyber Security in the market place: HP CTO DayCyber Security in the market place: HP CTO Day
Cyber Security in the market place: HP CTO Day
 
Data security in the cloud
Data security in the cloud Data security in the cloud
Data security in the cloud
 

Mais de Internet Security Auditors

Mais de Internet Security Auditors (20)

Explotando los datos como materia prima del conocimiento
Explotando los datos como materia prima del conocimientoExplotando los datos como materia prima del conocimiento
Explotando los datos como materia prima del conocimiento
 
XIII Jornadas STIC CCN-CERT. OSINT de la información a la inteligencia
XIII Jornadas STIC CCN-CERT. OSINT de la información a la inteligenciaXIII Jornadas STIC CCN-CERT. OSINT de la información a la inteligencia
XIII Jornadas STIC CCN-CERT. OSINT de la información a la inteligencia
 
Proceso de implementación de los sistemas de gestión ISO 27001 e ISO 22301
Proceso de implementación de los sistemas de gestión ISO 27001 e ISO 22301Proceso de implementación de los sistemas de gestión ISO 27001 e ISO 22301
Proceso de implementación de los sistemas de gestión ISO 27001 e ISO 22301
 
Problemática de implementación de un SGSI o un SGCN en contact centers y BPOs
Problemática de implementación de un SGSI o un SGCN en contact centers y BPOsProblemática de implementación de un SGSI o un SGCN en contact centers y BPOs
Problemática de implementación de un SGSI o un SGCN en contact centers y BPOs
 
PCI DSS en el Cloud: Transferencia Internacional Datos
PCI DSS en el Cloud: Transferencia Internacional DatosPCI DSS en el Cloud: Transferencia Internacional Datos
PCI DSS en el Cloud: Transferencia Internacional Datos
 
Problematicas de PCI DSS en Contact Centers & BPO
Problematicas de PCI DSS en Contact Centers & BPOProblematicas de PCI DSS en Contact Centers & BPO
Problematicas de PCI DSS en Contact Centers & BPO
 
PCI DSS: Justificacion del Cumplimiento
PCI DSS: Justificacion del CumplimientoPCI DSS: Justificacion del Cumplimiento
PCI DSS: Justificacion del Cumplimiento
 
Proteccion de Datos Personales: Conceptos, Sanciones, Metodologia
Proteccion de Datos Personales: Conceptos, Sanciones, MetodologiaProteccion de Datos Personales: Conceptos, Sanciones, Metodologia
Proteccion de Datos Personales: Conceptos, Sanciones, Metodologia
 
GigaTIC 2017 - Más allá del futuro: Negocio, tecnología y robótica. (Abril 2017)
GigaTIC 2017 - Más allá del futuro: Negocio, tecnología y robótica. (Abril 2017)GigaTIC 2017 - Más allá del futuro: Negocio, tecnología y robótica. (Abril 2017)
GigaTIC 2017 - Más allá del futuro: Negocio, tecnología y robótica. (Abril 2017)
 
RootedCon 2017 - Workshop: IoT Insecurity of Things?
RootedCon 2017 - Workshop: IoT Insecurity of Things?RootedCon 2017 - Workshop: IoT Insecurity of Things?
RootedCon 2017 - Workshop: IoT Insecurity of Things?
 
PCI DSS en la Nube
PCI DSS en la NubePCI DSS en la Nube
PCI DSS en la Nube
 
Cambios de las versiones 3.2, Cuestionarios y Ecosistema de Normas PCI
Cambios de las versiones 3.2, Cuestionarios y Ecosistema de Normas PCICambios de las versiones 3.2, Cuestionarios y Ecosistema de Normas PCI
Cambios de las versiones 3.2, Cuestionarios y Ecosistema de Normas PCI
 
Overdrive Hacking Conference 2016 - Riesgos en el uso de las Redes Sociales (...
Overdrive Hacking Conference 2016 - Riesgos en el uso de las Redes Sociales (...Overdrive Hacking Conference 2016 - Riesgos en el uso de las Redes Sociales (...
Overdrive Hacking Conference 2016 - Riesgos en el uso de las Redes Sociales (...
 
Conferencia sobre Protección de Datos (Bogotá): Errores comunes en la identif...
Conferencia sobre Protección de Datos (Bogotá): Errores comunes en la identif...Conferencia sobre Protección de Datos (Bogotá): Errores comunes en la identif...
Conferencia sobre Protección de Datos (Bogotá): Errores comunes en la identif...
 
Conferencia sobre Protección de Datos (Bogotá): Aprendiendo de las Sanciones
Conferencia sobre Protección de Datos (Bogotá): Aprendiendo de las SancionesConferencia sobre Protección de Datos (Bogotá): Aprendiendo de las Sanciones
Conferencia sobre Protección de Datos (Bogotá): Aprendiendo de las Sanciones
 
Catosfera 2016: Anàlisi de xarxes socials amb finalitats d'investigació: ris...
Catosfera 2016:  Anàlisi de xarxes socials amb finalitats d'investigació: ris...Catosfera 2016:  Anàlisi de xarxes socials amb finalitats d'investigació: ris...
Catosfera 2016: Anàlisi de xarxes socials amb finalitats d'investigació: ris...
 
CIBERSEG'16. Técnicas #OSINT
CIBERSEG'16. Técnicas #OSINTCIBERSEG'16. Técnicas #OSINT
CIBERSEG'16. Técnicas #OSINT
 
VI Foro Evidencias Electrónicas en la Investigación Policial. Análisis forens...
VI Foro Evidencias Electrónicas en la Investigación Policial. Análisis forens...VI Foro Evidencias Electrónicas en la Investigación Policial. Análisis forens...
VI Foro Evidencias Electrónicas en la Investigación Policial. Análisis forens...
 
CIBERSEG '15 - Taller: Ingeniería inversa en aplicaciones Android
CIBERSEG '15 - Taller: Ingeniería inversa en aplicaciones AndroidCIBERSEG '15 - Taller: Ingeniería inversa en aplicaciones Android
CIBERSEG '15 - Taller: Ingeniería inversa en aplicaciones Android
 
(ISC)2 Security Congress EMEA. You are being watched.
(ISC)2 Security Congress EMEA. You are being watched.(ISC)2 Security Congress EMEA. You are being watched.
(ISC)2 Security Congress EMEA. You are being watched.
 

Último

EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Earley Information Science
 

Último (20)

TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 

Tecnologías para el Cumplimiento. Alexandre Bento. SafeNet

  • 1. © SafeNet Confidential and Proprietary 1 Alexandre Bento alexandre.bento@safenet-inc.com Tecnologías para el Cumplimiento
  • 2. © SafeNet Confidential and Proprietary 2 Agenda  ¿Quién es Safenet?  Market Background PCI  Desafíos para PCI  Soluciones SafeNet para PCI  Caso de Éxito
  • 3. © SafeNet Confidential and Proprietary 3 ¿Quien es Safenet?
  • 4. © SafeNet Confidential and Proprietary 4 SafeNet Fact Sheet La compañía más grande enfocada exclusivamente en la protección de la información de alto valor. Fundada: 1983 Capital: Privado Éxito Global con más de 25.000 clientes en 100 paises Empleados: Alrededor de 1.500 en 25 paises, Reconocido liderazgo en Tecnología de Seguridad, más de 550 ingenieros expertos en cifrado Acreditados con los productos certificados en los más altos estándares de seguridad
  • 5. © SafeNet Confidential and Proprietary 5 Líder en Confianza. Protegemos cosas como: > la mayoría del dinero que se mueve en el mundo. 80% de todas las transferencias intrabancarias -SWIFT- $1 trillón por día > la mayoría de las identidades digitales en el mundo. 84% de la cuota de mercado de protección de claves raíces de PKI (Salomon Smith Barney) - módulos criptográficos (HSMs) > el número 1 en cifrado de conexiones WAN alta velocidad para Frame Relay, ATM, líneas dedicadas y Ethernet > el número 1 en Tokens USB en el mundo (IDC)
  • 6. © SafeNet Confidential and Proprietary 6 Market Background PCI
  • 7. © SafeNet Confidential and Proprietary 7 ¿Cuales son las amenazas? Fuente: Ponemon Institute, 2009
  • 8. © SafeNet Confidential and Proprietary 8 La Evolución de las Incidencias
  • 9. © SafeNet Confidential and Proprietary 9 ¿Objetivo de los Ataques?  Data, Data and more Data  Vulnerabilities
  • 10. © SafeNet Confidential and Proprietary 10 ¿Objetivo de los Ataques?  Data, Data and more Data  Vulnerabilities
  • 11. © SafeNet Confidential and Proprietary 11 ¿Objetivo de los Ataques?  Data, Data and more Data  Vulnerabilities
  • 12. © SafeNet Confidential and Proprietary 12 ¿Objetivo de los Ataques?  Data, Data and more Data  Vulnerabilities
  • 13. © SafeNet Confidential and Proprietary 13 Fraude Online en Alta Fuente: Anti-Phishing Working Group, marzo 2009 El número de páginas web infectando PCs con programas diseñados para el robo de contraseñas alcanzo las 31,173 en diciembre 2009, un incremento de 827 % desde enero de 2008. Phishing: $3.2 Mil Millones de Dólares en 2007 solo en EEUU Gartner Dic. 2007
  • 14. © SafeNet Confidential and Proprietary 14 ¿Cómo logran hacerlo?  Troyanos, Key loggers, Root kits  Vulnerabilidad Web o Aplicación  Miembro de la organización que se deja corromper
  • 15. © SafeNet Confidential and Proprietary 15 ¿Cómo logran hacerlo?  Trojans, Key loggers, Root kits  Web or Application Vulnerabilities  The corruptible insider
  • 16. © SafeNet Confidential and Proprietary 16 ¿Cuanto están costando? Fuente: Ponemon Institute, 2009 47%
  • 17. © SafeNet Confidential and Proprietary 17 Desafios para PCI
  • 18. © SafeNet Confidential and Proprietary 18 ¿PCI DSS es El Suelo o El Techo ? • ―PCI DSS es El Techo‖ • Obstáculos a la Implementación―¿excusas?‖ • Demasiado Complejo • No está al día con las actuales amenazas • Demasiado tiempo para implementar • Demasiado costoso para cumplir • ―PCI DSS es solo El Suelo‖ • Apalancar la Inversión • Mayor Protección • 50% Ventaja de Coste
  • 19. © SafeNet Confidential and Proprietary 19 ¿Cuanto está Costando? Allocation of PCI Investment Best-in-Class All Others Cost to achieve initial compliance $520K $958K Time to report 11 mo 11 mo Annual cost to sustain compliance $135K $300K Average time since first reporting 2.0 yrs 2.3 yrs Average total spend on PCI compliance $784K $1,642K Build & Maintain a Secure Network $197K $375K Protect Cardholder Data $186K $399K Maintain a Vulnerability Mgmt Program $88K $188K Implement Strong Access Control $93K $211K Regularly Monitor and Test $124K $317K Maintain an IS Policy $97K $152K Fuente: Aberdeen Group, 2009
  • 20. © SafeNet Confidential and Proprietary 20 Buenas Prácticas  Es protección, no una Casilla de Punteo  Implique a los stakeholders  Descubrimiento y clasificación de los datos  Establezca el modelo de la amenaza  Documente y defina las políticas de seguridad y los procedimientos  Determine dónde proteger datos
  • 21. © SafeNet Confidential and Proprietary 21 ¿Cómo está la Industria hoy? Objective Requirement Current Capability Known Incidents Avg. PCI Spend Build & Maintain Secure Network 1. Firewall Configurations 85% 16% $250K 2. No Default Passwords 16% Protect Cardholder Data 3. Protect Stored Cardholder Data 71% 23% $242K 4. Encrypt Transmission Across Networks 12% Maintain Vulnerability Mgmt Program 5. Use &Update Antivirus Software 61% 19% $114K 6. Develop & Maintain Secure Applications 28% Strong Access Control 7. Restrict Access Business Need-to-Know 65% 24% $124K 8. Assign a Unique ID 18% 9. Restrict Physical Access 15% Regularly Monitor & Test 10. Track and Monitor Network Access 78% 23% $169K 11. Regularly Test Security Systems 22% Maintain IS Policy 12. Maintain Policies for IS 83% 23% $118K Fuente: Aberdeen Group, 2009
  • 22. © SafeNet Confidential and Proprietary 22 Soluciones de Safenet para PCI
  • 23. © SafeNet Confidential and Proprietary 23 Proteja los datos del titular de la tarjeta que fueron almacenadosReq. 3 Hard Disk Encryption SafeNet ProtectDrive Data Tokenization SafeNet DataSecure SafeNet Hardware Security Modules File/Folder Encryption SafeNet ProtectFile Unstructured Data Database Encryption SafeNet DataSecure for Structured Data
  • 24. © SafeNet Confidential and Proprietary 24 SafeNet DataSecure Platform Intelligent Data Protection DataSecure is the industry’s most trusted platform to provide intelligent data protection for ALL information assets—both structured and unstructured, using centralized: key management policy management logging and auditing Business Needs SafeNet Solution Protect sensitive data at the web, application, mainframe, database tiers, including file servers Protect Data at Risk – Most flexible and scalable hardware-based encryption platform for heterogeneous environments Implement data encryption controls for compliance Comply w/ Legislation – Proven compliance with laws requiring protection of sensitive information Reduce cost & complexity with secure key management and centralized policy management Reduce Operational Cost – Ease of management and administration with best-in- class security management console
  • 25. © SafeNet Confidential and Proprietary 25 SafeNet DataSecure Data Protection, Key, and Policy Management Mainframes Web/App Servers Endpoint Devices Network Shares File Servers
  • 26. © SafeNet Confidential and Proprietary 26 DataSecure Database Integration • Database Connectors • Oracle 8i, 9i, 10g, 11g • IBM DB2 version 8, 9 • IBM UDB version 8, 9 • Microsoft SQL Server 2000, 2005, 2008 • Teradata 12 • Application changes not required • Batch processing tools for managing large data sets • Vendor Transparent Database Integration • SQL Server 2008 • Oracle 11g Customer Database
  • 27. © SafeNet Confidential and Proprietary 27 • Software Libraries • Microsoft .NET, CAPI • JCE (Java) • PKCS#11 (C/C++) • SafeNet ICAPI (C/C++) • z/OS (Cobol, Assembler, etc.) • XML • Support for virtually all application and web server environments DataSecure Application Integration Reporting Application Customer Database E-Commerce Application
  • 28. © SafeNet Confidential and Proprietary 28 ProtectFile and ProtectDrive  File Protection for PCs, File Servers, and Network Shares Windows Server 2003 Windows XP, Vista RHEL 4, 5  File Server Encryption File Encryption Keys (FEKs) protect files on disk FEKs are encrypted with a Key Encryption Key (KEK) that resides on the DataSecure appliance  Policy configured on DataSecure and pushed to file systems  Mobile Handset Support  Full Disk Encryption with ProtectDrive End User Laptop Network Shares Corporate File Server
  • 29. © SafeNet Confidential and Proprietary 29  File & Folder encryption whilst cryptographically enforcing user and group permission-based access to confidential data. Protection of workgroup data against unauthorized access File & Folder Encryption
  • 30. © SafeNet Confidential and Proprietary 30  DataSecure—acts as the ―vault‖ for sensitive data values and token by protecting with strong encryption and key management  Token Manager—replaces sensitive data with format-preserving tokenization via: Secure Message Layer - SOA-based interface, callable from anywhere Protected Zone - host of the Secure Message Layer, handles calling DataSecure and generating tokens DataSecure Tokenization Protected Zone DataSecure Secure Message Layer DataSecure Token Manager
  • 31. © SafeNet Confidential and Proprietary 31 ¿Que es la Tokenización?  On the most basic level – Replacement of sensitive structured data with data of a similar size that is not sensitive (a ―token‖) Stores sensitive data in an encrypted protected zone  More sophisticated approaches involve – 1-to-1 mapping of tokens to sensitive data (referential integrity) Presentation Options: Masked data: XXXXX6789 Data with dashes in it: 123-45-6789 Token type options: Purely random digits Sequential First two/last four, first six, etc.  Benefits – Data protection is ―transparent‖ to pure end users and systems Only the ―protected zone‖ remains in scope of compliance audits Only authenticated end users or systems can access data in the clear from the protected zone
  • 32. © SafeNet Confidential and Proprietary 32 DataSecure Token Manager  DataSecure—locks the ―vault‖ for sensitive data values and token with strong encryption and key management  Token Manager—replaces sensitive data with format-preserving tokenization via: Secure Message Layer— SOA- based interface, callable from anywhere Protected Zone— host of the Secure Message Layer, handles calling DataSecure and generating tokens ProtectedZone DataSecure Secure Message Layer Data Vault
  • 33. © SafeNet Confidential and Proprietary 33 ProtectedZone DataSecure Secure Message Layer Data Vault Tokenization Use Case – Credit Card #’s PCI Auditor for Compliance
  • 34. © SafeNet Confidential and Proprietary 34 SafeNet DataSecure Interface
  • 35. © SafeNet Confidential and Proprietary 35 SafeNet DataSecure Interface
  • 36. © SafeNet Confidential and Proprietary 36  Disk encryption of desktops – in conjunction with Certificate Services  Access to Pre-Boot Authentication only with Token/Certificate – no UserID/Password Logon Protection of all data in case of theft, loss and end of life Disk Encryption
  • 37. © SafeNet Confidential and Proprietary 37 Codifique la transmisión de los datos de los titulares de las tarjetas a través de redes públicas abiertas Encrypt Network Communications SafeNet High Speed Ethernet Encryption Req. 4
  • 38. © SafeNet Confidential and Proprietary 38 Network Encryption  Edge Layer- SSL/IPSec  Boundary Layer- MPLS, ATM, Frame Relay, Ethernet transport connecting branch offices, remote sites, partners  Core Layer- Typically SONET or Ethernet transport over carrier WAN or dark fiber
  • 39. © SafeNet Confidential and Proprietary 39 Best Fit for Layer 2 Encryption  Ethernet Encryption  SONET Encryption  Ethernet Encryption 10/1G 100/10M
  • 40. © SafeNet Confidential and Proprietary 40 Simplified Management – Layer 2 Transport Customer Premise Router Layer 2 Encryptor Carrier Switch LAN Operations Center Disaster Recovery Location Operations Center When something changes here… or here… or here!!! nothing changes here… No administrative burden, no outages and no security policy changes Company Confidential
  • 41. © SafeNet Confidential and Proprietary 41 Security Management Center II • Easy Installation and Simple Ongoing Management • Intuitive web-based GUI • Virtualization Support with VMWare and Solaris Zones Lowest Cost of Ownership • Full Audit and Event logging and Reporting • Secure Remote Management and Encrypted Communications • Integrated Key Manager with Optional Hardware-Security Secure Operations • Simple Management Design for Thousands of Encryptors • Rapid Deployment Tools for Large Installations • Enterprise Class High-Availability Features Scalability / Reliability SMC II Is The Only Truly Enterprise Class Encryptor Management Platform
  • 42. © SafeNet Confidential and Proprietary 42 Desarrolle y Mantenga Sistemas y Aplicaciones Seguras Secure Application Development Tools SafeNet Hardware Security Modules Approved Payment Applications SafeNet Hardware Security Modules Req. 6
  • 43. © SafeNet Confidential and Proprietary 43 HSM - Protección de Transacciones Los HSMs de SafeNet proporcionan la forma más segura, fácil y rápida de integrar la solución de seguridad para aplicaciones y transacciones para empresas y gobiernos. Las Certificaciones FIPS y Common Criteria. CA4 Luna PCM ProtectServer Gold Luna PCI Luna SA / SP ProtectHost EFT Luna XML Luna SX
  • 44. © SafeNet Confidential and Proprietary 44 HSM Technology Breadth of Hardware Security Offerings Customizable, Economical SOA, Web Services FastestNetworked, Scaleable Performance PCM, CA4 Luna PCI Luna SA / SP / IS Offline Key Archive, Registration Auth Protect Server Luna XML Protect Host EFT Payments, EMV/EFT 4000+/sec600/sec 7000/sec27/sec 600/sec1200/sec 300+/sec
  • 45. © SafeNet Confidential and Proprietary 45 Restrinja el acceso a los datos y Asigne un ID exclusiva para cada persona que tenga acceso al sistema informático Privileged User Management SafeNet Authentication SafeNet DataSecure Strong User Authentication SafeNet Authentication Network Access Management SafeNet Authentication Req. 7 & 8
  • 46. © SafeNet Confidential and Proprietary 46 PKI Certificates User Name & Passwords Biometric Credentials Barcode & Magnetic Swipe encoding* Access Controls* Photo ID* * Photo ID, Access Control, Bar Code/Magnetic Swipe are applicable to smart cards only Protección de Identidades – Autenticación
  • 47. © SafeNet Confidential and Proprietary 47 Soluciones SafeNet para el Ecosistema PCI
  • 48. © SafeNet Confidential and Proprietary 48 Beneficios Benefits Proof Points Single Key Management and Encryption Solution  Comprehensive, core-to-edge solution from a SINGLE vendor  ONLY solution that secures data across the connected enterprise for data at rest, in transit, and in use Reduces the Cost and Complexity  Integrated security platform with centralized policy management and reporting All critical PCI encryption and key management requirements are centrally implemented Streamlined Implementation  Designed for fast and easy integration into existing IT infrastructure Highest Security  FIPS 140-2 Level 2 and Level 3, and CC Validations  More than 25 years experience Comprehensive Audit Trails  Centralized logging and auditing of all cryptographic functions
  • 49. © SafeNet Confidential and Proprietary 49 Caso de Éxito
  • 50. © SafeNet Confidential and Proprietary 50 British Airways Business Drivers • PCI info in Oracle DB, and mainframe • Proprietary flight information on mainframe Technical Requirement • Sensitive data on their mainframes • General security & granular level security. • Gartner said “FIPS level 2 will eventually be a PCI requirement.” Why SafeNet • Batch processing between their mainframe and two other databases • Files needed column level encryption at a command line to handle credit card data. • Level 2 FIPS compliance • SafeNet is the only company to offer command line file protection and conversion on the mainframe Later Phases • Working directly with business owners • Sales • Risk Management
  • 51. © SafeNet Confidential and Proprietary 51 British Airways Bulk Load TU 3rd Party Apps InternalApps z/OS Mainframe Linux MachinesWindows FTP Servers Windows File Servers NAS
  • 52. © SafeNet Confidential and Proprietary 52 Casos de Éxito
  • 53. © SafeNet Confidential and Proprietary 53 Alexandre Bento alexandre.bento@safenet-inc.com Gracias