How much Security do you really need?
-
Upload
rob-levey -
Category
Technology
-
view
506 -
download
1
description
Transcript of How much Security do you really need?
![Page 1: How much Security do you really need?](https://reader036.fdocuments.us/reader036/viewer/2022082915/5479c68cb4af9f87188b45aa/html5/thumbnails/1.jpg)
How much Security do your really need?
![Page 2: How much Security do you really need?](https://reader036.fdocuments.us/reader036/viewer/2022082915/5479c68cb4af9f87188b45aa/html5/thumbnails/2.jpg)
Many vendors will say you need a lot of security
Data Loss, Cyber attacks, Cloud Security, etc
We contend that the Bastion approach is not feasible… you cannot protect everything!
![Page 3: How much Security do you really need?](https://reader036.fdocuments.us/reader036/viewer/2022082915/5479c68cb4af9f87188b45aa/html5/thumbnails/3.jpg)
So what do you protect?
Your company’s most sensitive and private data…
And then protect it with unbreakable encryption
![Page 4: How much Security do you really need?](https://reader036.fdocuments.us/reader036/viewer/2022082915/5479c68cb4af9f87188b45aa/html5/thumbnails/4.jpg)
The problem is most encryption is too much of a hassle for users
So we focus on encryption for the corner office
Too complicated or a hassle Takes too long One size does not fit all Full disk encryption is not necessary Executives don’t use it
The typical encryption complaints we hear…
![Page 5: How much Security do you really need?](https://reader036.fdocuments.us/reader036/viewer/2022082915/5479c68cb4af9f87188b45aa/html5/thumbnails/5.jpg)
User Groups requiring extra protection?
Senior Management and Board Level communicationsFinance teams - financial results, ‘quiet-period’ Legal teams - attorney-client privileged communicationsM&A teams – Hedge Funds, Private Equity Firms, Investment Firms, internal M&A discussions R&D and Production teams – clinical trials, overseas production especially in countries like ChinaGovernment & Military contractors – supporting military operations in hostile countriesExecutive travel – to high-risk countries
![Page 6: How much Security do you really need?](https://reader036.fdocuments.us/reader036/viewer/2022082915/5479c68cb4af9f87188b45aa/html5/thumbnails/6.jpg)
What Does Rune Information Security Do?
We don’t secure every potential vulnerability – we secure what you care aboutIf it absolutely must be kept secret, we secure it unconditionallyUser-group security, not policy-based
Military-grade encryption that even a 55 year old can master…
• Select it, Secure it
• In 3 clicks or less
![Page 7: How much Security do you really need?](https://reader036.fdocuments.us/reader036/viewer/2022082915/5479c68cb4af9f87188b45aa/html5/thumbnails/7.jpg)
So easy a 55 year-old could master it…
1. Select the User Group encryption key
• Tim Cook• Peter Oppenheimer• Philip Schiller• Bruce Sewell• David Rice
3. Send encrypted message that only Group members can un-encrypt and read
Message is received
scrambled, but is
unscrambles like this
2. Select the data (file or folder) you want to encrypt
Message is
scrambled like this
and sent
… in 3 clicks or less
![Page 8: How much Security do you really need?](https://reader036.fdocuments.us/reader036/viewer/2022082915/5479c68cb4af9f87188b45aa/html5/thumbnails/8.jpg)
For More Information Contact Us
Rune Information SecurityRob Levey, VP North AmericaPhone: +1 978-996-2758Email: [email protected]: www.rune.sg