does your data have super-powers?
DESCRIPTION
TRANSCRIPT
Do you have control of your most sensitive
data?
Information Security is Being Compromised…
“Take heed of Lockheed… the attackers are really smart and their exploits are highly sophisticated” Art Coviello - RSA
The Rules Have Changed…Dramatically
Hacker sophisticationMonetization of security breachesData is everywhere
At the end of the day, what are we trying to protect?
6pm
5am
2pm
8am
11pm
Home PC – final iterations to Board presentation
A day in the life of a Company Executive…
iPad – catch up on emails on the train
Desktop – work on M&A proposal and a few key emails
Phone – a few important phone calls and emails at airport
Laptop in Hotel – catch up on day’s work. Comment on Facebook.
How many times was this executive’s information security potentially compromised?
Potential vulnerabilities
What Does Rune Information Security Do?
We don’t secure every potential vulnerability – we secure what you care aboutIf it absolutely must be kept secret, we secure it unconditionallyUser-defined security, not policy-based
Empowering users to secure their most sensitive data themselves…
• You select it, we secure it!
• Making encryption-based security easier for the user
User-Defined Security: 3 simple steps
1. Select the data you want to secure
2. Encrypt message (file or folder)
3. Send encrypted message that only selected recipients who can un-encrypt and read
Unconditional Security: The Vema-Cipher Platform
Encryption for those that need security in addition to compliance
Personal information Business intelligence Proprietary information
Secures your data locally or in the cloud No matter where data is stored… You control exactly who
can read your message
Defends your data as it moves though hostile environmentsInnovative yet proven approach to data security
Standards based compliance coupled with unbreakable encryption
ComplianceFIPS 140-2
SecureVernam Cipher
Simple to Use
3 Easy Steps
• Secure:• Proven, unbreakable
Vernam cipher• VC-Key™ creates a
completely random message – immune to brute-force attacks
• Stops man-in-the-middle attacks
• Compliance:• FIPS 140-2 standards-
based encryption
• Simple to use: 3 steps• Set your audience• Select your message or
document• Click to encrypt or
decrypt
For More Information Contact Us
Rune Information SecurityRob Levey, VP North AmericaPhone: +1 978-996-2758Email: [email protected]: www.rune.sg