self defending data webinar (feb13)
DESCRIPTION
Covata USA offers a line of security solutions that implement "self-defending data". These products include: Secure Envelopes, the Covata Server and the COvata SDK.TRANSCRIPT
© Cocoon Data Holdings Limited 2012. All rights reserved.
Is Your Data “Self Defending”?Vic Winkler
CTO
Covata.COM
Reston, Virginia
© Cocoon Data Holdings Limited 2012. All rights reserved.
Facts and Questions
Problems• Networks and end-user devices are frequently hacked• This means that your information is at risk• Managing security takes expertise and that’s
expensive
What are you doing about it?
Are you sending your sensitive information into the world, defenseless?
Are you invested in heavy solutions like PKI that are expensive and have limitations?
© Cocoon Data Holdings Limited 2012. All rights reserved.
Self Defending Data:It’s Not
• Disk encryptionThere is a unique key for each self defending data object – versus a single key for the disk
• PKISelf defending data is far simpler in concept and elegant in implementation, this translates
to savings and greater agility and sharing (ad-hoc relationships are encouraged!)
• Public-Private Key CryptographyUsers know nothing about keys or mechanisms – the data itself handles all that
But, is it real?
© Cocoon Data Holdings Limited 2012. All rights reserved.
What is: Self Defending Data?
• It doesn’t let you access it unless you meet it’s requirements
• It doesn’t care if the computer or network are hacked• The originator of self defending data can specify
business rules that must be met for you to access it• Every access to self defending data is audited,
regardless• The originator can revoke permissions anytime …at
the granularity of each recipient• It doesn’t care how many copies there are – they all
behave the same way