Docstoc

ima_def-collection0510

Document Sample
ima_def-collection0510 Powered By Docstoc
					DEFENDER COLLECTION™
INTRODUCTION


                       May 12, 2010




1
TABLE OF CONTENTS

                    03   Introduction
                    06   Market Situation
                    13   Defender Portfolio Summary
                    22   Portfolio Details
                    32   Q&A



2
    INTRODUCTION




3   3
KEY TAKEAWAYS




    • Need for data-at-rest security solutions is rapidly growing

    • As the data storage industry leader, Imation is uniquely
      positioned to extend its offerings into secure storage solutions

    • Our new secure data storage product portfolio:
       – Meets the most advanced global data encryption standards
       – Will be industry’s broadest
       – Offers solutions from enterprise to personal use




4
IMATION CORP OVERVIEW



    •   Leading global marketer and developer of branded products that enable people
        to store, protect and enrich their experiences with digital information

    •   Technology leadership, global distribution reach, and customer relationships
        make us a preferred partner for leading companies worldwide

    •   Broad portfolio of data storage products, consumer electronics and accessories

    •   Global market share leader in recordable optical media and data storage tape

    •   ’09 revenue $1.65 billion, >1,200 employees, serving more than 100 countries




5
    MARKET SITUATION




6   6
MARKET SITUATION - SUMMARY

                                                                                                                                    1
       DATA GROWTH
       The growth of digital information has rapidly surpassed expectations



       INCREASED DATA MOBILITY
       The importance of data has increased its access and mobility
       requirements making it more difficult to secure and protect



       INCREASED DATA BREACHES
       As data and its mobility grow, the amount of data breaches and data
                                                                                              U.S. 2009 > 498 Breaches2
       exposure has also grown                                                                > 220 Million Records Exposed2


       REGULATIONS INCREASING
       Increased data exposure has resulted in increased regulations and
       reporting requirements globally



       COST OF DATA BREACHES GROWS                                                            U.S. 2009 $202 per record3
       Increased reporting requirements and increased data breaches
       results in increased breach costs
                                                                                                     $6.6 Million3
                                                                                               Average org. cost of data breach over 4 years

     1Source: IDC – The Diverse and Exploding Universe – March 2008
     2Source: Identity Theft Resource Center – 2009 Data Breach Stats January 6, 2010
     3Source: Ponemon Institute – Fourth Annual U.S. Cost of Data Breach Study January 2009




 7
  DATA GROWTH

      By 2011, the digital universe will be 10 times the size it was in 2006
      Approximately 70% of the digital universe is created by individuals, but enterprises
      are responsible for the security, privacy, reliability and compliance of 85%




Source: IDC – The Diverse and Exploding Universe – March 2008


  8
 INCREASED DATA MOBILITY


                   75% of the U.S. Workforce will be Mobile by 2011
             The portable data defense solutions market is growing at 35%




Source: IDC – January 2008




  9
 INCREASED DATA BREACHES

      In 2009, U.S. companies experienced 498 data breaches exposing 222,477,043 records
                      35% of the records breached were in the government/military segment

                                                     And that’s just reported breaches!




                                                                                  Govt./
                                                                                  Military




Source: Identity Theft Resource Center – 2009 Data Breach Stats January 6, 2010



   10
REGULATIONS INCREASING



                                                                              • 40% of the WW Digital Universe will be
                                                                                Subject to Security in 2010


                                                                              • 20% of the WW Digital Universe will be
                                                                                Subject to Compliance/Regulations in 2010


                                                                              • Data Breach Reporting Laws in 45 States




Source: Scott&Scottllp – State Data Breach Notification Laws - October 2009



11
COST OF DATA BREACH GROWS


                             Average cost per record exposed grows to $202
                           Average cost per data breach grows to $6,655,758


         Cost of data breach on a per victim basis over four years                                    Average organizational cost of data breach cost over four years
$250
                                                                                         $7,000,000    $6,655,758          $6,355,132
           $202                 $197
$200                                                                                     $6,000,000
                                                    $182

                                                                                         $5,000,000                                        $4,789,637
                                                                                                                                                            $4,541,429
$150                                                                    $138
                                                                                         $4,000,000


$100                                                                                     $3,000,000


                                                                                         $2,000,000
$50
                                                                                         $1,000,000

 $0                                                                                             $0
        Average 2008        Average 2007       Average 2006        Average 2005                          Average 2008    Average 2007     Average 2006   Adjusted Average
                                                                                                                                                               2005




 Source: Ponemon Institute – Fourth Annual U.S. Cost of Data Breach Study January 2009



 12
PORTFOLIO SUMMARY




13   13
A BETTER MODEL


     • Most offerings come from companies focused on either
       Storage or Security.

     • Imation has supplemented its foundation as a storage company
       with key partnerships in security to create a broad, unique,
       secure storage Defender Collection portfolio




                                   +

14
DEFENDER COLLECTION:
A Natural Extension

     •   DataGuard rf™ Tape Tracking System
         – Enhanced tape-location tracking system
     •   DataGuard Transport and Storage Case
         – Enhanced physical protection for tape
         – GPS solution available in Europe
     •   Imation Secure Scan
         – Allows data center managers to secure existing tape libraries
         – Only LTO scanning product that locks tape cartridges for in-transit protection




15
OUR SECURITY ELEMENTS



     • Physical Security

     • Encryption

     • Authentication

     • Malware Protection

     • Management



16
FIPS BASICS

     The Federal Information Processing Standardization (FIPS) 140-2 U.S. government
          security standard that specifies requirements for cryptography modules

     • FIPS is required by law for U.S. government purchases
     • Strictly enforced in Canada
     • Gaining international recognition in Asia and Europe
     • Being adopted within regulated industries (e.g. Financial, Healthcare)


                                    Description of FIPS 140-2 Four Levels

 FIPS 140-2 Level 1                                              FIPS 140-2 Level 2
 The lowest level, imposes very limited requirements; loosely,   Adds requirements for physical tamper-evidence and
 all components must be "production-grade" and various           role-based authentication.
 egregious kinds of insecurity must be absent




 FIPS 140-2 Level 3                                              FIPS 140-2 Level 4
 Adds requirements for physical tamper-resistance and            Makes the physical security requirements more
 identity-based authentication, and for a physical or logical    stringent, and requires robustness against
 separation between the interfaces by which "critical security   environmental attacks. Level 4 is currently not being
 parameters" enter and leave the module, and its other           utilized in the market
 interfaces




17
OUR DIFFERENTIATION


 •   Broadest Industry Portfolio:
      – Optical Products - CD/DVD
      – USB Flash Drives
      – External Hard Disk Drives
      – Management Software
 •   Global Government-Validated Encryption
 •   Multiple Authentication Methods
      – Password (hardware rules)
      – Biometric + Password
      – CAC/PIV + Biometric (3-factor)
 •   Multi-user Solutions




18
TARGET MARKETS




     Global Governments   Military & Intelligence             Enterprise/SMB Customers
     •   Unites States    •   Department of Defense           •   Banking/Financial
     •   Canada           •   Global Military Organizations   •   Medical/Healthcare
     •   European         •   Global Intelligence Community   •   Law Firms
     •   APAC & Japan                                         •   Other Regulated Industries




19
 PORTFOLIO SUMMARY
                                                                                            Available:                        Available:
                                                                                             June ‘10                          June ‘10


      Managed
Secure Storage
      & Strong
Authentications
with SmartCard
                                                                                                                         Defender F200 +Bio
                                                         Available:                                                          Features:
                                                          May ‘10                                                          FIPS 140-2 L3

     Managed
Secure Storage                                                                           Defender H100 &
      & Strong                                                                              H200 +Bio
Authentications                                                                             Features:
                  FUNCTIONALITY




                                     Available:                                           FIPS 140-2 L3
                                      May ‘10

                                                         Defender
                                                        F100 & F150
     Managed                                             Features:
Secure Storage                                         FIPS 140-2 L3
                                                        Cap design
                                   Defender F50
                                     Features:                               Available:
                                   FIPS 140-2 L1                            May/June ‘10
                                   Pivot design                                              Defender Optical
                                                                                                Features:
Secure Storage                                                                                FIPS 140-2 L1



                                                                  TARGET MARKETS
                                                                                                     Large Enterprise
                                  Consumer         SOHO/SMB                 Enterprise
                                                                                                     Government/Financial Services



 20
SECURE PORTABLE STORAGE




21
PORTFOLIO DETAILS




22   22
DEFENDER™ OPTICAL




                                       Key Features:
                                       • FIPS 140-2 Level 1 Validated
                                       • AES 256-bit Software Encryption
                                       • Integrated Password Recovery Option
                                       • Printable Formats: CD-R, DVD-R, BD-R
                                       • Two-year Limited Warranty




              Availability:
       March 2010 (OEM Branded)
     May/June 2010 (Imation Branded)
      Suggested Price $2.10 - $7.50




23
DEFENDER™ F50 PIVOT




                                       Key Features:
                                       • FIPS 140-2 Level 1 Validated
                                       • AES 256-bit Software Encryption
                                       • One-factor Authentication
                                       • Pivot Design – never lose cap
                                       • Capacities: 2GB, 4GB, 8GB, 16GB
                                       • Five-year Limited Warranty


                                       Optional
                                       •   Central Management Software




         Availability: April 2010
     Suggested Price $24.99 – $89.99




24
DEFENDER™ F100 & F150




                                              Key Features:
                                              • FIPS 140-2 Level 3 Validated
                                              • AES 256-bit Hardware Encryption
                                              • One-factor Authentication
                                              • Tamper-resistant, Waterproof and Dustproof Plastic or
                                                  Metal Enclosure
                                              • Capacities: 1GB, 2GB, 4GB, 8GB, 16GB, 32GB
                                              • Five-year Limited Warranty
                           Defender F150
                            Metal Enclosure

     Defender F100                            Optional
     Plastic Enclosure                        •   Antivirus Software
                                              •   Central Management Software

             Availability: April 2010
       Suggested Price $54.00 - $319.00




25
DEFENDER™ F200 + BIO



                                         Key Features:
                                         • FIPS 140-2 Level 3 Validated
                                         • AES 256-bit Hardware Encryption
                                         • Two-factor Authentication
                                         • Biometric (fingerprint) Identification
                                         • Tamper-resistant, Waterproof and Dustproof Metal
                                             Enclosure
                                         • Capacities: 1GB, 2GB, 4GB, 8GB, 16GB, 32GB
                                         • Five-year Limited Warranty


                                         Optional
                                         •   Antivirus Software
                                         •   Central Management Software

         Availability: June 2010
     Suggested Price $109.00 - $369.00




26
DEFENDER™ H100




                                         Key Features:
                                         • FIPS 140-2 Level 3 Validated
                                         • AES 256-bit Hardware Encryption
                                         • One-factor Authentication
                                         • Tamper-resistant Metal Enclosure
                                         • Capacities: 250GB, 320GB, 500GB
                                         • Five-year Limited Warranty


                                         Optional
                                         •   Antivirus Software
                                         •   Central Management Software



         Availability: June 2010
     Suggested Price $279.00 - $399.00




27
DEFENDER™ H200 + Bio




                                          Key Features:
                                          • FIPS 140-2 Level 3 Validated
                                          • AES 256-bit Hardware Encryption
                                          • Two-factor Authentication
                                          • Biometric (fingerprint) Identification
                                          • Tamper-resistant Metal Enclosure
                                          • Capacities: 250GB, 320GB, 500GB
                                          • Five-year Limited Warranty


                                          Optional
                                          •   Antivirus Software
                                          •   Central Management Software


          Availability: June 2010
      Suggested Price $329.00 - $469.00




 28
DEFENDER SOFTWARE SUITE


      •   Access Standard

      •   Access Enterprise
           –   Security policies
           –   Device provisioning
           –   Custom software images
           –   Key management (user rescue)
           –   Administrative data recovery
           –   Updating
           –   Reporting and auditing
           –   MXI, Imation, McAfee brands only

      •   Malware – AntiVirus Scanning

      •   Access Identity
           – Same as Access Enterprise but includes digital identity capabilities




 29
PORTFOLIO DIRECTION



     Defender F175 Pivot Flash Drive

     Secure Mobile Desktop

     Product Extension
     – Secure Solid State Drives
     – Secure Removable Hard Disk Systems (RDX)


     Enhanced Features
     – Integrating Digital Identity Capabilities
         • RSA Soft Tokens
         • Digital Certificates
     – Integrating SmartCard Technology



30
KEY TAKEAWAYS




• Need for data-at-rest security solutions is rapidly growing

• As the data storage industry leader, Imation is uniquely positioned
  to extend its offerings into secure storage solutions

• Our new secure data storage product portfolio:
     – Meets the most advanced global data encryption standards
     – Will be industry’s broadest
     – Offers solutions from enterprise to personal use




31
 THANK YOU




32

				
DOCUMENT INFO
Shared By:
Categories:
Tags:
Stats:
views:5
posted:5/2/2011
language:English
pages:32