SafeNet overview 2014

19
1 Yves Van Tongerloo Sales Manager Belgium and Luxembourg [email protected] Safenet The Data Protection COMPANY

Transcript of SafeNet overview 2014

Page 1: SafeNet overview 2014

1

Yves Van Tongerloo

Sales Manager Belgium and Luxembourg

[email protected]

Safenet

The Data Protection COMPANY

Page 2: SafeNet overview 2014

2

What We Do

SafeNet is trusted to protect, control access to, and manage

the worlds most sensitive data

We control access to the most

sensitive corporate

information– more than 35

million identities protected

via tokens, smartcards, and

mobile devices managed on-

premise and in the cloud.

We protect the most money

that moves–over 80% of the

world’s intra-bank fund

transfers and nearly $1 trillion

per day

We are the de facto root of

trust–deploying more than

86,000 key managers and

protecting up to 750,000,000

encryption keys.

Recognised by Gartner as the

Leader for Authentication

Page 3: SafeNet overview 2014

3

Who We Are

Trusted to protect the world’s most sensitive data for the

world’s most trusted brands.

REVENUE

~330m

GLOBAL FOOTPRINT

+40,000Customers in

100 countries

EMPLOYEES

+1,500In 25 countries

Page 4: SafeNet overview 2014

A New Mindset is Needed!

Sole Perimeter

Security is No

Longer Enough

Insider Threat is

Greater Than Ever

Breaches Will

Happen and We

Must Prepare

Differently

DATA IS THE NEW PERIMETER!

Page 5: SafeNet overview 2014

Breach Level Index

5© SafeNet Confidential and Proprietary

2014FIRST QUARTER

200,735,721RECORDS STOLEN

Only 1% of 254 Q1 Data Breaches Were “Secure Breaches” Using Encryption

Healthcare industry accounted for 24% of all breaches, while Financial industry

represented 56% of all data records lost or stolen

Malicious insiders only accounted for 11% of total incidents, but they

were much more effective at seizing 52% of records stolen.

Three breaches and 2.2 million records stolen each day, more than 93,000 per hour

Page 6: SafeNet overview 2014

WHERE are

your KEYS?

Protect What Matters, Where it Matters

WHERE is

your DATA?

WHO is

Accessing

your DATA?

Page 7: SafeNet overview 2014

SafeNet’s Three Step Approach

Page 8: SafeNet overview 2014

8© SafeNet Confidential and Proprietary

KeySecure or

Virtual KeySecure

Luna HSM or

Cloud HSM

Crypto Command Center

SafeNet’s

Crypto Management Platform

ProtectApp ProtectFile ProtectDB StorageSecure ProtectV™

SafeNet’s Data Encryption Solutions

SafeNet’s Key

Management Ecosystem

SafeNet’s

HSM Ecosystem

Doc

Signing

SSL

Webserver

Email

Gateway

Payment

Transactions

SafeNet Data Encryption & Crypto Management

Ethernet

Encryption

File & Disk

Encryption

Customer

KMIP Client

Backup,

Storage &

Archive

SIEM Tools

Cloud

Storage &

Encryption

Gateways

Page 9: SafeNet overview 2014

9© SafeNet Confidential and Proprietary

What is Crypto Management?

2

Key Manager

3

Management

Software

1

Hardware

Security Modules

Encryption Key Generation

Encryption Key Storage

Crypto Operations Acceleration

Encryption Key Lifecycle Management

Crypto Provisioning & Audit Reporting

Page 10: SafeNet overview 2014

10© SafeNet Confidential and Proprietary

Complete Crypto Management Platform

KeySecure for lifecycle enterprise key

management of encryption keys

Hardware Security Modules for

high assurance key storage

Crypto Command Center for

management and provisioning of

encryption keys

Key

Storage

Crypto

Provisioning

Key

Management

Page 11: SafeNet overview 2014

11

304HSM

Integrations

37KeySecure

Integrations

45Payments HSM

Integrations

Page 12: SafeNet overview 2014

12

45Payments HSM

Integrations

304HSM

Integrations

37KeySecure

Integrations

Page 13: SafeNet overview 2014

13

37KeySecure

Integrations

304HSM

Integrations

45Payments HSM

Integrations

Page 14: SafeNet overview 2014

14

TRANSPARENCY TRUSTAUTOMATION AGILITY

Evolving Endpoint

SafeNet Next Generation AuthenticationAUTHENTICATION BYOI FEDERATED SSO

Broad Eco-System

VPNs

Web App

Webmail

VDI

SaaS Apps

ERP

IAM

Page 15: SafeNet overview 2014

15© SafeNet Confidential and Proprietary

Maximum Versatility with Multiple

Authentication Methods

Context-based

Authentication

OTP Authenticators

OOB (SMS)

Authenticators

USB Authenticators

Smart Cards

Hybrid AuthenticatorsSoftware Authenticators

GRID Cards

Page 16: SafeNet overview 2014

16

SafeNet: THE User Authentication market

leader 2014

Gartner Recognizes SafeNet in Leaders Quadrant in Magic Quadrant for User Authentication.

SafeNet positioned as a market leader for its completeness of vision and ability to execute

1

6

Page 17: SafeNet overview 2014

17

121Authentication

Integrations

Page 18: SafeNet overview 2014

18

Why Customers Choose SafeNet Data

Protection?

Comprehensive Information Lifecycle ProtectionMore ways to protect data than any other vendor- in Databases, Applications, File

Servers, Mainframes, Desktops, and more.

Trusted by the Largest Organizations for Critical Data ProtectionProven track record of protecting critical data and transactions –trillions of dollars in

bank transfers, stored streaming videos, and from M1 tanks to Air Force One.

Confidence in the Most Certified SolutionsSafeNet has more FIPS 140-2 and Common Criteria certifications than any vendor,

giving peace of mind to our customers.

High Performance for High Volume DeploymentFor the largest enterprise deployments - dedicated hardware and optimized software

scales to millions of protected records and trillions of transactions.

Page 19: SafeNet overview 2014

19

Thank You!

SafeNet Universal ProtectionUniversal Data Protection from Data Center to Cloud

Yves Van Tongerloo

Sales Manager Belgium and Luxembourg

[email protected]