Post on 17-Jun-2020
transcript
ACER CONFIDENTIAL
ProShield - Advance security solution for Acer commercial devices
ACER CONFIDENTIAL
Topics
1
• Security Background
• What is ProShield
• Features and benefits
• New Feature in version 1.5
• References
ACER CONFIDENTIAL
you are only as SECURE as your weakest link
ACER CONFIDENTIAL
Three major security risks to any organization
• Lost revenue & value • Lost competitive advantage • Reduce public confidence
Information Theft
• Operational downtime • Repair & recovery costs • Reduce productivity
System Malfunction
• Lost physical & intellectual assets • Replacement cost
Asset Vulnerability
3
ACER CONFIDENTIAL
Users need easy to use data security solution
4
• Businesses desire to manage access and policies but current methods are too complex.
• Desire to keep PCs patched and up to date and pushing tasks to users often results in security holes.
• Backup tasks are pushed to employees and compliance is spotty until a disaster occurs.
• Provides employees with easy to use tools that can set usage policies for software, websites, and hardware use on employees workers PCs.
• Help to remind employees of PC management tasks.
• Let employees know of potential holes in security so they can get help.
• Help employees to make sure that all PCs have up to date patches and updates.
• Ensure that important data are backed up sound and safe.
Implications Needs
ACER CONFIDENTIAL
39% of SMB spends 1 hour/week on IT security
1hr per week 39%
2-3 hrs per week 25%
4-5 hrs per week 12%
1 day per month 10%
More than 1 day 4%
no time 10%
Percentage of time spent proactively on IT security
SMB needs to choose an easy-to-use IT security solution Source: McAfee 2010 5
ACER CONFIDENTIAL
Acer ProShield
6
Is a suite of essential security and manageability tools allows you to manage your security applications. Create encrypted personal secure drives and add extra layers of protection to keep your system virtually impregnable.
Acer ProShield integrates multiple security and management features in a single-client console, and works with optional hardware security features, such as Trusted Platform Module (TPM), to fortify business security and better protect data against unauthorized access and threats.
ACER CONFIDENTIAL
• File Shredder
• Folder Shredder
• Settings (Boot Order PWD…)
•Import/Export Settings
•BIOS Security •Port & Device
Control
•Personal Secure Drive
•File/Folder Encryption/Decryption
•Self Encryption Drive
•Device Lock
ProShield Features
7
Data Protection
BIOS Settings
Data Removal
FP: Finger Print; TPM: Trusted Platform Module; FL: Face Logon
• PWD/FP/TPM Configuration
Website • Single sign-on
(PWD/TPM) • One-step logon
(TPM/FP) • Restore/Backup
Credential Manager
ACER CONFIDENTIAL
ProShield Benefits
Device security through BIOS Setting
Multi-Level Credential Manager for the peace of mind
Data Protection prevents unauthorized access
Data Removal for business security protecting intellectual property
8
ACER CONFIDENTIAL
BIOS Setting protects from the beginning
Prevent unauthorized device (i.e. USB) to boot up the computer
If hacker is successfully boot up the computer, the hacker can obtain sensitive information from the HDD
ProShield protects the boot settings from unauthorized access
BIOS Settings
9
ACER CONFIDENTIAL
Credential Manager provides peace of mind
Unwanted entry into YOUR computer
Building multi layers of user authentication forming a “barrier to entry” for the PC and websites
ProShield embedded security provides additional protection against unwanted entry
Credential Manager
10
ACER CONFIDENTIAL
Data Protection prevents unauthorized access
Your information is YOUR intellectual property
Cyber crime takes a “entire week” to get the business back and running, but unauthorized access to YOUR intellectual property is lost forever
ProShield protects YOUR individual/group files and folders for security
Data Protection
11
ACER CONFIDENTIAL
Data Removal protects sensitive documents
Every companies has regulations and standards to dispose of sensitive documents
Requiring the highest certification to protect the most sensitive material
ProShield’s data shredder is certified with the USA Department of Defense (DoD)
Data Removal
12
ACER CONFIDENTIAL
Face Login* - login your computer in a blink of eyes
13
Quick and easy access
No-typing access
Adjustable sensitivity levels
New feature
Auto focus and tracking movement
“*Note: Face Login feature is only available in selected Acer commercial notebook models”.
Thank you
ACER CONFIDENTIAL
Additional References
15
ACER CONFIDENTIAL
Acer ProShield Model Coverage
16
1. ProShield is available in all Acer commercial desktops, commercial tablets, and commercial notebook computers.
2. Current all Acer Veriton commercial desktops and tablets are on version 1.4, and Acer Commercial notebooks will be on version 1.5 with new feature Face Login after August 2013 production under the Intel Hashwell platform.
ACER CONFIDENTIAL
Why don’t we secure our computer?
17
ACER CONFIDENTIAL
Lost a laptop or desktop
Problem:
A lost or stolen computer with sensitive information
Solution thru ProShield:
Personal Secure Drive (PSD)
File Shredder
18
ACER CONFIDENTIAL
Disgruntle employees stealing company info
Problem:
Disgruntle employees sealing company information from other employees in the company
Solution thru ProShield:
1. Password settings
2. Biometric password setting
3. BIOS password
4. Port enable/disable
19
ACER CONFIDENTIAL
Shredder with US Department of Defense
DoD 5220.22M is the US requirement for all government contractor with classify information
Ability to permanently erase 2GB of data in 2 minutes
Three pass overwriting algorithm:
– First Pass with zeroes
– Second Pass with ones
– Third Pass with random bytes
Permanently destroy data reminisce in the from deleted files
20
ACER CONFIDENTIAL
Case Study: 2010 & 2012 Olympic security requirements
TPM (London)
Need all client machines to enable TPM (UK Government Regulation)
Remote Management (Vancouver/London)
Upload new BIOS, settings & software to multiple devices
Security Setting (Vancouver/London)
Secure Boot Sequence • Do not want unwanted USB or other external Boot Sequence
Secure BIOS Password (Hardening) • Do not allow unwanted re-configuration of BIOS
21