Data on the move, moved and stored the risks to your Organisation

Who we are
Irish (EU) Based
Developers of leading edge Encrypted USB Storage solutions
Market focussed
Business requirement driven
Leading security levels
AES 256
Best value for the best performance
Based on extensive market knowledge and experience
OUR PEDIGREE
A BRAND OF RENAISSANCE CONTINGENCY SERVICES LTD®®
AN IRISH DATA SECURITY BUSINESS SINCE 1987 WITH
•
•
•
•
•
LONG ESTABLISHED DATA SECURITY SOLUTIONS SUPPLIER 1987
CLEAR UNDERSTANDING OF THE MARKET
CLEAR UNDERSTANDING OF THE LIMITATIONS OF EXISTING PLAYERS
CLEAR UNDERSTANDING AS TO WHY TAKE UP COULD BE MUCH IMPROVED
WE KNOW THE LIMITATIONS OF ALL COMPETITION WHICH IS HOLDING THE
MARKET BACK
WHY ARE WE HERE
BECAUSE
THERE IS A PROBLEM
WITH EVERY PROBLEM
THERE IS AN OPPORTUNITY!!!!
What is the problem ?
• DATA
ITS CONFIDENTIALITY AND INTEGRITY
ITS SECURITY!!!!!!!!!
COMPLIANCE AND REGULATIONS
Laws, regulations good practice and
commercial and other pressures mean
you must worry about it and not just
worry about
YOU MUST DO SOMETHING
Who’s data is it
Who is responsible to protect it
Who is liable if there is an issue
In the cloud
On back up devices
On the move
ON USB DEVICES
A RECENT INTERNATIONAL HEADLINE, THE EUROPEAN COURT OF JUSTICE
RULED INVALID A FIFTEEN-YEAR OLD DATA TRANSFER PACT BETWEEN THE
UNITED STATES AND EUROPE. WHEN FORMER NATIONAL SECURITY
AGENCY (NSA) CONTRACTOR EDWARD SNOWDEN EXPOSED THE EXTENT
OF THE NSA'S INTERNATIONAL DATA SURVEILLANCE, HE CREATED A RIPPLE
EFFECT. THE RESULT? PUBLIC ANXIETY AROUND DATA PRIVACY HAS
BECOME CEMENTED IN INTERNATIONAL LAW. WHAT DOES THIS MEAN FOR
IT SERVICE AND SOLUTIONS PROVIDERS IN THE U.S. AND U.K.? WE CAN'T
DEFINITIVELY SAY, BUT HERE'S A CLOSER LOOK AT THE SITUATION...
“Without any concrete guidelines, it’s too early to assess the full
impact of this ruling. We are carefully monitoring the situation. As
rulemaking proceeds, we will be assessing what, if any actions may
be required by Continuum or its partners to ensure compliance with
European regulations.” ~Rob Autor, Senior VP of Global Service
Delivery at Continuum ~
Social and browsing data are not the only examples
of "personal data" as defined by the EU...
TO PROTECT THE PRIVACY OF CITIZENS, BUSINESSES NEED TO OBTAIN CONSENT FROM THOSE
EUROPEAN RESIDENTS WHOSE PERSONAL DATA THEY WANT TO TRACK.
WITH NEW CHANGES TO THE SINGLE EU DIGITAL STANDARD, ALL DATA THAT IDENTIFIES AN
INDIVIDUAL, WHETHER DIRECTLY OR INDIRECTLY, WILL NOW BE PERSONAL DATA.
THIS INCLUDES IP ADDRESSES AND PSEUDONYMS. DOES THAT THEN MEAN THAT THIS DATA CAN
ONLY BE STORED AND ACCESSED WITHIN THE CONFINES OF THE 28 EU MEMBER STATES?
Client data
Customer data
Customer lists
Price lists
Patient data
Financial data
Credit card data
Any other data you can think of ???????
Ex-Employees are a Data Security Menace
The 2014 Intermedia (business applications cloud-hosting vendor) SMB ROGUE ACCESS STUDY was released in
August 2014.
This report should shock smaller businesses into realizing that they need to protect their leads databases,
financial information and social reputation from human error as well as from malicious activity.
BASED ON A SURVEY OF KNOWLEDGE-WORKERS PERFORMED BY OSTERMAN RESEARCH, THE
REPORT QUANTIFIES THE STAGGERING SCOPE OF THE “ROGUE ACCESS” PROBLEM AND PRESENTS
A WAKE-UP CALL FOR EVERY BUSINESS — REGARDLESS OF SIZE
BEFORE AN EMPLOYEE LEAVES HE/SHE WILL PROBABLY TAKE WHATEVER DATA THEY WANT BUT
FOLLOWING THAT YOU NEED TO MANAGE THAT.
 More than a third of organisations have had a device lost or stolen in the past six
months. What's more, many of these devices are not protected by even basic
security measures, according to research from data security firm Imation.
 The study of UK and German workers, carried out by market research firm
Vanson Bourne, shows the risks of remote working to an organisation.
 Some 44% of organisations said a member of their senior management has lost a
mobile device in the last year, while another 39% of senior management had a
device stolen.
 More than half (54%) of organisations reported that a non-senior management
employee had lost a device and a further 49% said they'd had a device stolen in
the past 12 months.
 The vast majority of these devices (93%) contained work related data, such as
confidential emails (49%), confidential files or documents (38%), customer data
(24%) and financial data (15%).
More data breaches caused by lost devices than
malware or hacking, Trend Micro says
Device loss
In addition to this black-market pricing data, Trend Micro explored the causes of data theft. And
they came up with a surprise. Hacking or malware are not the leading causes of breaches. Trend
Micro says it is device loss that's the problem.
It's "sensitive information stored on employees' laptops, mobile devices, and thumb drives," the
report says.
The numbers
Device loss accounts for 41% of breaches, compared with 25% that derived from hacking and
malware.
Rounding out the numbers are 12% for insider leaks, 17% from unintended disclosure, 1% from
payment card fraud, and 3% unknown breach causes.
•
Social experiment: 200 USB flash drives left in public locations
Posted on 28 October 2015. Nearly one in five people who found a
random USB stick in a public setting proceeded to use the drive in
ways that posed cybersecurity risks to their personal devices and
information and potentially, that of their employer, a recent
experiment conducted on behalf of CompTIA revealed.
With the cybersecurity threat landscape facing companies growing
increasingly complex, employees who practice unsafe
cybersecurity habits put both themselves and their employer at
risk.
WHICH ONE IS ENCRYPTED???
HOW CAN YOU KNOW???
• Business
• Professionals
• Students/home users – not low end
consumable
• The “MAC TYPE” marketplace
WHO HAVE WE SOLD TO?
•
Process has been a phased launch in a few test markets before launching to
significant European markets
•
Initial launch in Ireland – B2B
•
Launched in Eastern Europe
•
Launching in UK
•
For sale through TRADE ONLY
COMPETITIVE LANDSCAPE
•
•
Main UK competitors:
•
iStorage
•
IronKey – soon to be Kingston
Others
•
Kanguru
•
Sentenial
GLOBAL SALES STRATEGY
•
Through partners only
•
Objective is to leave money in the channel
•
Deal Reg for larger opportunities
•
Not over distribute
•
Offer alternative to other brands with better performance and a price
advantage
•
Continually develop the range
•
Work with partners to develop the market and not over distribute the
market
WHAT THE MARKET NEEDED
•
•
•
•
•
•
•
•

A Product to work in all environments; MAC, Windows, Linux etc.
Simple and deployable
Always encrypted
Designed so the “User” can handle it
Range of capacities
Cost effective
Speed
Hardware Encrypted – i.e. always encrypted
The Solution
A RANGE OF PRODUCTS MEETING THE CRITERIA ABOVE
FLASH
mSata
Flash/M Sata/HDD
ClearCrypt is a range of 256 bit encrypted
Storage devices designed to be robust, secure
and cost effective.
HDD
FLASH
Capacities 8 Gb, 16 Gb and 32 Gb
Model
Material
Colour
Interface
ClearCrypt
Stainless Steel
Black
USB 3.0 port (backup to USB 2.0,
USB 1.1)
Transfer rate
USB 3.0 up to 5.0 Gbs
USB 2.0 up to 480Mbps
System Requirement USB 3.0; Windows 2000/XP/Vista/
PC
7/8/10
USB 2.0; Windows 2000/XP/Vista/
7/8/10
System Requirement USB 3.0; MAC OS 10.6 or higher
MAC
USB 2.0; MAC OS 10.2 or higher
Power Supply
Li-ion Battery
Size
80x24x8 mm
mSata
Model
ClearCrypt
Material
Colour
High Quality Aluminium
Black
Interface
USB 3.0 port (backup to USB 2.0, USB 1.1)
Transfer rate
USB 3.0 up to 5.0 Gbs
USB 2.0 up to 480Mbps
System Requirement PC
USB 3.0; Windows 2000/XP/Vista/ 7/8/10
USB 2.0; Windows 2000/XP/Vista/ 7/8/10
System Requirement
MAC
USB 3.0; MAC OS 10.6 or higher
USB 2.0; MAC OS 10.2 or higher
Power Supply
USB bus power 5v/900mA
Size
97 x 42 x 12 mm
Capacities 128 Gb, 256 Gb and 512 Gb
HDD
Model
Material
Colour
Interface
Transfer rate
System Requirement
PC
System Requirement
MAC
Power Supply
Size
Capacities 500 Gb, 1 Tb and 2Tb
ClearCrypt
High Quality Aluminium
Black
USB 3.0 port (backup to USB 2.0, USB
1.1)
USB 3.0 up to 5.0 Gbs
USB 2.0 up to 480Mbps
USB 3.0; Windows 2000/XP/Vista/
7/8/10
USB 2.0; Windows 2000/XP/Vista/
7/8/10
USB 3.0; MAC OS 10.6 or higher
USB 2.0; MAC OS 10.2 or higher
USB bus power 5v/900mA
126 x 76 x 16 mm
ClearCrypt is a range of 256 bit encrypted Storage devices
designed to be robust, secure and cost effective.
Smooth design perfect for travel
•Full Capacity Range
•Real-time AES256bit encryption
•Software free
•Aluminium Casing
•True Hardware Encryption
•Super Speed USB3.0
•On-board keypad
USB3.0 super speed with a transfer
rate up to 5.0Gpbs, 10x faster
than traditional USB 2.0 drives
The ClearCrypt range offer industry leading encryption and also a range to suit all
needs and requirements
ROAD MAP
•
Additional Products to be launched mid 2016
•
Details available under NDA
Full Channel Program
Managed Margins
Very competitively priced
NOT Over distributed
Profit for you and security for your customer
Available through partners
Solve client problems
Make good margins
Align yourself with the ultimate in value and security
THE KEY TO SECURITY AND PROFITABILITY
DON’T BELIEVE ME – BELIEVE HIM!!
Download PDF