self defending data webinar (feb13)

4
© Cocoon Data Holdings Limited 2012. All rights reserved. Is Your Data “Self Defending”? Vic Winkler CTO Covata.COM Reston, Virginia [email protected]

Upload: vic-winkler

Post on 18-Nov-2014

296 views

Category:

Technology


2 download

DESCRIPTION

Covata USA offers a line of security solutions that implement "self-defending data". These products include: Secure Envelopes, the Covata Server and the COvata SDK.

TRANSCRIPT

Page 1: Self defending data webinar (feb13)

© Cocoon Data Holdings Limited 2012. All rights reserved.

Is Your Data “Self Defending”?Vic Winkler

CTO

Covata.COM

Reston, Virginia

[email protected]

Page 2: Self defending data webinar (feb13)

© Cocoon Data Holdings Limited 2012. All rights reserved.

Facts and Questions

Problems• Networks and end-user devices are frequently hacked• This means that your information is at risk• Managing security takes expertise and that’s

expensive

What are you doing about it?

Are you sending your sensitive information into the world, defenseless?

Are you invested in heavy solutions like PKI that are expensive and have limitations?

Page 3: Self defending data webinar (feb13)

© Cocoon Data Holdings Limited 2012. All rights reserved.

Self Defending Data:It’s Not

• Disk encryptionThere is a unique key for each self defending data object – versus a single key for the disk

• PKISelf defending data is far simpler in concept and elegant in implementation, this translates

to savings and greater agility and sharing (ad-hoc relationships are encouraged!)

• Public-Private Key CryptographyUsers know nothing about keys or mechanisms – the data itself handles all that

But, is it real?

Page 4: Self defending data webinar (feb13)

© Cocoon Data Holdings Limited 2012. All rights reserved.

What is: Self Defending Data?

• It doesn’t let you access it unless you meet it’s requirements

• It doesn’t care if the computer or network are hacked• The originator of self defending data can specify

business rules that must be met for you to access it• Every access to self defending data is audited,

regardless• The originator can revoke permissions anytime …at

the granularity of each recipient• It doesn’t care how many copies there are – they all

behave the same way