SlideShare una empresa de Scribd logo
1 de 36
Descargar para leer sin conexión
The Navajo Systems vision:
  To expand the use of cloud computing by
  eliminating the entry barriers of data privacy
  and regulatory compliance.

 Founded in 2009 by experts in the fields of information security
   and back by Jerusalem Venture Partners a leading Israeli
   venture capital fund with over $780 million under
   management
Navajo Code Talkers
America’s secret weapon in WWII
Navajo in the News
Analyst Recognition
SaaS is all around us




The “traditional” enterprise vendors
            are coming in
Saas Industry Consensus #2



 “Security is the number one issue affecting the adoption of cloud
 services.”
 Dan Yachin IDC - 2008



 “Privacy concerns and laws or other domestic or foreign regulations
 may reduce the effectiveness of our solution and adversely affect our
 business.”
 SalesForce 2008 Annual Report



 “The security models being used three or four years go are not the
 kind we'll be using in the future.”
 Steve Purser, deputy director of European Union network security agency
Can We Trust our SaaS Providers?
Relevant Data Security Regulations
 • Health Insurance Portability and Accountability Act (HIPAA)
 • Sarbanes Oxley (SOX)
 • Children's Online Privacy Protection Act (COPPA)
 • Family Educational Rights and Privacy Act (FERPA)
 US State Regulations
 • California's AB 1950 and SB1386/CC1798
 • Nevada NRS 597.970
 • Massachusetts 201 CMR 17.00
 • Florida's HB 481
 • Georgia's SB 230
            The controller himself needs to
 • Illinois' HB 1633
 • New York's AB 4254
            GUARANTEE compliance with
 • Pennsylvania's SB 712
 • Utah's SB 69
            all data protection regulations.
 International Regulations
 • The Payment Card Industry Data Security Standard (PCI DSS) and Check 21 Act
 • UK Data Protection Act
 • Canada's Personal Information Protection and Electronic Documents Act
     (PIPEDA)
 • International government and banking regulations for the European Union,
     United Kingdom, Israel, South Africa, Australia and Singapore
Cloud
                                            Computing




Cloud computing is about gracefully losing control while
   maintaining accountability even if the operational
   responsibility falls upon one or more third parties

                    (CSA Guideline 2.0)


        What can we do?
Virtual Private
     SaaS
The Customer Control Concept
VPS: A Revolutionary Concept


  Customer is in control of its data privacy
  Real-time encryption of sensitive SaaS data
  Sensitive data remains encrypted while at rest
  SaaS application functionality is unaffected
  Out-of-the-box policy configuration
  No need to modify the SaaS application

*Patent pending technology
Navajo VPS Use Case
Client sends data to VPS
Step 1: Detect Sensitive Data
Step 2: Encrypt Sensitive Data
Step 3: Receive Data from App
     5: Store Encrypted Data
     4: Send Encrypted Data




                     Encrypted Data
                             Customer name : eso01992
                     Social security no : add3441asdad
                    E-mail : asfd34@cdaf.wqeerq.wdqw
                                 Address : edqew213ada
                            Parent account : adcae87asf
                 Credit card no : adwew.edwe.eqe.qeqe
                          Phone no : 432-2424-242-234
Step 7: Decrypt and Present Data
     6: Detect Encrypted Data
Step 8: Search and Query Data
Live Demo



 Real-time Encryption of Sensitive SaaS Data:
 1. Contacts
 2. Accounts
 3. Reports
  SaaS application functionality is unaffected
 1. Search for data
 2. Sort contacts
 3. Run Reports
Listed on Salesforce’s AppExchange
Processing Encrypted Data

  “...safe harbor provisions in laws and regulations
  treat lost encrypted data as not lost at all.”
  –Cloud Security Alliance , December 2009
Virtual - Private SaaS
VPS Server Architecture


       HTTP Proxy               SMTP Proxy                Pop3 Proxy                    SaaS
        Apache                    & MTA                                              Integration
                                                                                         API



                                  Administration
                                Policy Management

                                 *Encryption Engine
                       Sort and Search Enabled                Search Enabled
                              Encryption                        Encryption

          Standard Encryption               File encryption                    Format-preserved
                                                                                  Encryption




*Based on NIST-standard algorithms
VPS Server Architecture


       HTTP Proxy               SMTP Proxy                Pop3 Proxy                    SaaS
        Apache                    & MTA                                              Integration
                                                                                         API



                                  Administration
                                Policy Management

                                 *Encryption Engine
                       Sort and Search Enabled                Search Enabled
                              Encryption                        Encryption

          Standard Encryption               File encryption                    Format-preserved
                                                                                  Encryption




*Based on NIST-standard algorithms
VPS Server Architecture


       HTTP Proxy               SMTP Proxy                Pop3 Proxy                    SaaS
        Apache                    & MTA                                              Integration
                                                                                         API



                                  Administration
                                Policy Management

                                 *Encryption Engine
                       Sort and Search Enabled                Search Enabled
                              Encryption                        Encryption

          Standard Encryption               File encryption                    Format-preserved
                                                                                  Encryption




*Based on NIST-standard algorithms
VPS policy Data Flow



           HTTP Proxy             SMTP Proxy &             Pop3 Proxy            SaaS Integration
            Apache                   MTA                                               API


                                                   Policy

                                    *Encryption Engine
                         Sort and Search Enabled                Search Enabled
                                Encryption                        Encryption

            Standard Encryption               File encryption                Format-preserved
                                                                                Encryption




                                           SaaS / PaaS
                                             Vendor
One Infrastructure
Multiple Application
SaaS Integration       Mail Transfer
                      API                Agent

      VPS
    Appliance                        Corporate LAN/WAN




     VPS
Internet
 as a Service




                                   SaaS provider facilities

 SaaS Application
     Servers
Comparison of Data Confidentiality
             Risk   Eaves-      Database   Identity   Server
                    dropping/   Theft      Theft      Hacking
  Solution          Tampering

  TLS / SSL

  VPN

  Virtual Private
  Cloud
  Database
  Encryption
  Firewall

  SAS-70

  Navajo –
  VPS
With VPS, SaaS Customers will…

    • Retain complete control over
      sensitive data
    • Eliminate data privacy concerns

    • Eliminate data regulation concerns

    • Reduce the expense of SaaS
      solution audits
Dr. David Movshovitz -  Navajo SaaS

Más contenido relacionado

La actualidad más candente

Scott Rea - IoT: Taking PKI Where No PKI Has Gone Before
Scott Rea - IoT: Taking PKI Where No PKI Has Gone BeforeScott Rea - IoT: Taking PKI Where No PKI Has Gone Before
Scott Rea - IoT: Taking PKI Where No PKI Has Gone Before
DigiCert, Inc.
 
SDP Glossary v2.0
SDP Glossary v2.0 SDP Glossary v2.0
SDP Glossary v2.0
Shamun Mahmud
 

La actualidad más candente (20)

Cisco Connect Toronto 2018 cloud and on premises collaboration security exp...
Cisco Connect Toronto 2018   cloud and on premises collaboration security exp...Cisco Connect Toronto 2018   cloud and on premises collaboration security exp...
Cisco Connect Toronto 2018 cloud and on premises collaboration security exp...
 
Scott Rea - IoT: Taking PKI Where No PKI Has Gone Before
Scott Rea - IoT: Taking PKI Where No PKI Has Gone BeforeScott Rea - IoT: Taking PKI Where No PKI Has Gone Before
Scott Rea - IoT: Taking PKI Where No PKI Has Gone Before
 
501 ch 6 threats vulnerabilities and common attacks
501 ch 6 threats vulnerabilities and common attacks501 ch 6 threats vulnerabilities and common attacks
501 ch 6 threats vulnerabilities and common attacks
 
501 ch 2 understanding iam
501 ch 2 understanding iam501 ch 2 understanding iam
501 ch 2 understanding iam
 
501 ch 10 understanding cryptography and pki
501 ch 10 understanding cryptography and pki501 ch 10 understanding cryptography and pki
501 ch 10 understanding cryptography and pki
 
Cisco Connect Toronto 2017 - Model-driven Telemetry
Cisco Connect Toronto 2017 - Model-driven TelemetryCisco Connect Toronto 2017 - Model-driven Telemetry
Cisco Connect Toronto 2017 - Model-driven Telemetry
 
Implementing a Secure and Effective PKI on Windows Server 2012 R2
Implementing a Secure and Effective PKI on Windows Server 2012 R2Implementing a Secure and Effective PKI on Windows Server 2012 R2
Implementing a Secure and Effective PKI on Windows Server 2012 R2
 
От прорывной концепции до комплексного решения для компаний
От прорывной концепции до комплексного решения для компанийОт прорывной концепции до комплексного решения для компаний
От прорывной концепции до комплексного решения для компаний
 
TechWiseTV Workshop: Encrypted Traffic Analytics
TechWiseTV Workshop: Encrypted Traffic Analytics TechWiseTV Workshop: Encrypted Traffic Analytics
TechWiseTV Workshop: Encrypted Traffic Analytics
 
SafeNet: Don't Leave It to Luck: What am I Not Doing?
SafeNet: Don't Leave It to Luck: What am I Not Doing?SafeNet: Don't Leave It to Luck: What am I Not Doing?
SafeNet: Don't Leave It to Luck: What am I Not Doing?
 
Cryptzone: What is a Software-Defined Perimeter?
Cryptzone: What is a Software-Defined Perimeter?Cryptzone: What is a Software-Defined Perimeter?
Cryptzone: What is a Software-Defined Perimeter?
 
501 ch 8 risk managment tool
501 ch 8 risk managment tool501 ch 8 risk managment tool
501 ch 8 risk managment tool
 
Cisco Connect Vancouver 2017 - Anatomy of Attack
Cisco Connect Vancouver 2017 - Anatomy of AttackCisco Connect Vancouver 2017 - Anatomy of Attack
Cisco Connect Vancouver 2017 - Anatomy of Attack
 
Cisco Connect Toronto 2017 - NFV/SDN Platform for Orchestrating Cloud and vBr...
Cisco Connect Toronto 2017 - NFV/SDN Platform for Orchestrating Cloud and vBr...Cisco Connect Toronto 2017 - NFV/SDN Platform for Orchestrating Cloud and vBr...
Cisco Connect Toronto 2017 - NFV/SDN Platform for Orchestrating Cloud and vBr...
 
Software Defined Perimeter - A New Paradigm for Securing Digital Infrastructu...
Software Defined Perimeter - A New Paradigm for Securing Digital Infrastructu...Software Defined Perimeter - A New Paradigm for Securing Digital Infrastructu...
Software Defined Perimeter - A New Paradigm for Securing Digital Infrastructu...
 
501 ch 1 mastering security basics
501 ch 1 mastering security basics501 ch 1 mastering security basics
501 ch 1 mastering security basics
 
SDP Glossary v2.0
SDP Glossary v2.0 SDP Glossary v2.0
SDP Glossary v2.0
 
How Google Protects Its Corporate Security Perimeter without Firewalls
How Google Protects Its Corporate  Security Perimeter without FirewallsHow Google Protects Its Corporate  Security Perimeter without Firewalls
How Google Protects Its Corporate Security Perimeter without Firewalls
 
Cisco Connect Toronto 2018 consuming public and private clouds
Cisco Connect Toronto 2018   consuming public and private cloudsCisco Connect Toronto 2018   consuming public and private clouds
Cisco Connect Toronto 2018 consuming public and private clouds
 
VPN - Virtual Private Network
VPN - Virtual Private NetworkVPN - Virtual Private Network
VPN - Virtual Private Network
 

Destacado (6)

Native American Coordination and Consultationestions
Native American Coordination and ConsultationestionsNative American Coordination and Consultationestions
Native American Coordination and Consultationestions
 
Lead Generation Conference 2012 Korolivski Mitci
Lead Generation Conference 2012 Korolivski MitciLead Generation Conference 2012 Korolivski Mitci
Lead Generation Conference 2012 Korolivski Mitci
 
Pps
PpsPps
Pps
 
Ofer Maor - OWASP Top 10
Ofer Maor -  OWASP Top 10Ofer Maor -  OWASP Top 10
Ofer Maor - OWASP Top 10
 
V Com Tem
V Com TemV Com Tem
V Com Tem
 
Guy Bejerano: A practical view of cloud security
Guy Bejerano:  A practical view of cloud securityGuy Bejerano:  A practical view of cloud security
Guy Bejerano: A practical view of cloud security
 

Similar a Dr. David Movshovitz - Navajo SaaS

Java Abs Packet Sniffer Tool
Java Abs   Packet Sniffer ToolJava Abs   Packet Sniffer Tool
Java Abs Packet Sniffer Tool
ncct
 
ISSA: Next Generation Tokenization for Compliance and Cloud Data Protection
ISSA: Next Generation Tokenization for Compliance and Cloud Data ProtectionISSA: Next Generation Tokenization for Compliance and Cloud Data Protection
ISSA: Next Generation Tokenization for Compliance and Cloud Data Protection
Ulf Mattsson
 
Secure Cloud Computing for the Health Enterprise
Secure Cloud Computing for the Health EnterpriseSecure Cloud Computing for the Health Enterprise
Secure Cloud Computing for the Health Enterprise
Joel Amoussou
 
Palo Alto Networks: Protection for Security & Compliance
Palo Alto Networks: Protection for Security & CompliancePalo Alto Networks: Protection for Security & Compliance
Palo Alto Networks: Protection for Security & Compliance
Amazon Web Services
 
Data Power For Pci Webinar Aug 2012
Data Power For Pci Webinar Aug 2012Data Power For Pci Webinar Aug 2012
Data Power For Pci Webinar Aug 2012
gaborvodics
 
Will your cloud be compliant
Will your cloud be compliantWill your cloud be compliant
Will your cloud be compliant
Evgeniya Shumakher
 

Similar a Dr. David Movshovitz - Navajo SaaS (20)

Extending Your Network Cloud Security to AWS
Extending Your Network Cloud Security to AWSExtending Your Network Cloud Security to AWS
Extending Your Network Cloud Security to AWS
 
Secure Your Web Applications and Achieve Compliance
Secure Your Web Applications and Achieve Compliance Secure Your Web Applications and Achieve Compliance
Secure Your Web Applications and Achieve Compliance
 
SaaS Challenges & Security Concerns
SaaS Challenges & Security ConcernsSaaS Challenges & Security Concerns
SaaS Challenges & Security Concerns
 
Intoto Linley Tech Utm Architecture Presentation
Intoto Linley Tech Utm Architecture PresentationIntoto Linley Tech Utm Architecture Presentation
Intoto Linley Tech Utm Architecture Presentation
 
Deploying Next Generation Firewalling with ASA - CX
Deploying Next Generation Firewalling with ASA - CXDeploying Next Generation Firewalling with ASA - CX
Deploying Next Generation Firewalling with ASA - CX
 
Alfresco DevCon 2019: Encryption at-rest and in-transit
Alfresco DevCon 2019: Encryption at-rest and in-transitAlfresco DevCon 2019: Encryption at-rest and in-transit
Alfresco DevCon 2019: Encryption at-rest and in-transit
 
Java Abs Packet Sniffer Tool
Java Abs   Packet Sniffer ToolJava Abs   Packet Sniffer Tool
Java Abs Packet Sniffer Tool
 
Cisco Security Technical Alliance
Cisco Security Technical AllianceCisco Security Technical Alliance
Cisco Security Technical Alliance
 
ISSA: Next Generation Tokenization for Compliance and Cloud Data Protection
ISSA: Next Generation Tokenization for Compliance and Cloud Data ProtectionISSA: Next Generation Tokenization for Compliance and Cloud Data Protection
ISSA: Next Generation Tokenization for Compliance and Cloud Data Protection
 
Secure Cloud Computing for the Health Enterprise
Secure Cloud Computing for the Health EnterpriseSecure Cloud Computing for the Health Enterprise
Secure Cloud Computing for the Health Enterprise
 
CSTA - Cisco Security Technical Alliances, New Ecosystem Program Built on the...
CSTA - Cisco Security Technical Alliances, New Ecosystem Program Built on the...CSTA - Cisco Security Technical Alliances, New Ecosystem Program Built on the...
CSTA - Cisco Security Technical Alliances, New Ecosystem Program Built on the...
 
Palo Alto Networks: Protection for Security & Compliance
Palo Alto Networks: Protection for Security & CompliancePalo Alto Networks: Protection for Security & Compliance
Palo Alto Networks: Protection for Security & Compliance
 
Windows Server 2008 Security Overview Short
Windows Server 2008 Security Overview ShortWindows Server 2008 Security Overview Short
Windows Server 2008 Security Overview Short
 
Windows Server 2008 Security Overview Short
Windows  Server 2008  Security  Overview  ShortWindows  Server 2008  Security  Overview  Short
Windows Server 2008 Security Overview Short
 
Design Continuous Authorization for Rapid Delivery of Mission-Critical Servic...
Design Continuous Authorization for Rapid Delivery of Mission-Critical Servic...Design Continuous Authorization for Rapid Delivery of Mission-Critical Servic...
Design Continuous Authorization for Rapid Delivery of Mission-Critical Servic...
 
Securing Serverless Applications and AWS Lambda (SRV314-R1) - AWS re:Invent 2018
Securing Serverless Applications and AWS Lambda (SRV314-R1) - AWS re:Invent 2018Securing Serverless Applications and AWS Lambda (SRV314-R1) - AWS re:Invent 2018
Securing Serverless Applications and AWS Lambda (SRV314-R1) - AWS re:Invent 2018
 
Fighting cyber fraud with hadoop
Fighting cyber fraud with hadoopFighting cyber fraud with hadoop
Fighting cyber fraud with hadoop
 
Data Power For Pci Webinar Aug 2012
Data Power For Pci Webinar Aug 2012Data Power For Pci Webinar Aug 2012
Data Power For Pci Webinar Aug 2012
 
Will your cloud be compliant
Will your cloud be compliantWill your cloud be compliant
Will your cloud be compliant
 
Cloud Breach – Preparation and Response
Cloud Breach – Preparation and ResponseCloud Breach – Preparation and Response
Cloud Breach – Preparation and Response
 

Dr. David Movshovitz - Navajo SaaS

  • 1.
  • 2. The Navajo Systems vision: To expand the use of cloud computing by eliminating the entry barriers of data privacy and regulatory compliance. Founded in 2009 by experts in the fields of information security and back by Jerusalem Venture Partners a leading Israeli venture capital fund with over $780 million under management
  • 3. Navajo Code Talkers America’s secret weapon in WWII
  • 6. SaaS is all around us The “traditional” enterprise vendors are coming in
  • 7. Saas Industry Consensus #2 “Security is the number one issue affecting the adoption of cloud services.” Dan Yachin IDC - 2008 “Privacy concerns and laws or other domestic or foreign regulations may reduce the effectiveness of our solution and adversely affect our business.” SalesForce 2008 Annual Report “The security models being used three or four years go are not the kind we'll be using in the future.” Steve Purser, deputy director of European Union network security agency
  • 8. Can We Trust our SaaS Providers?
  • 9.
  • 10.
  • 11.
  • 12. Relevant Data Security Regulations • Health Insurance Portability and Accountability Act (HIPAA) • Sarbanes Oxley (SOX) • Children's Online Privacy Protection Act (COPPA) • Family Educational Rights and Privacy Act (FERPA) US State Regulations • California's AB 1950 and SB1386/CC1798 • Nevada NRS 597.970 • Massachusetts 201 CMR 17.00 • Florida's HB 481 • Georgia's SB 230 The controller himself needs to • Illinois' HB 1633 • New York's AB 4254 GUARANTEE compliance with • Pennsylvania's SB 712 • Utah's SB 69 all data protection regulations. International Regulations • The Payment Card Industry Data Security Standard (PCI DSS) and Check 21 Act • UK Data Protection Act • Canada's Personal Information Protection and Electronic Documents Act (PIPEDA) • International government and banking regulations for the European Union, United Kingdom, Israel, South Africa, Australia and Singapore
  • 13. Cloud Computing Cloud computing is about gracefully losing control while maintaining accountability even if the operational responsibility falls upon one or more third parties (CSA Guideline 2.0) What can we do?
  • 16. VPS: A Revolutionary Concept Customer is in control of its data privacy Real-time encryption of sensitive SaaS data Sensitive data remains encrypted while at rest SaaS application functionality is unaffected Out-of-the-box policy configuration No need to modify the SaaS application *Patent pending technology
  • 19. Step 1: Detect Sensitive Data
  • 20. Step 2: Encrypt Sensitive Data
  • 21. Step 3: Receive Data from App 5: Store Encrypted Data 4: Send Encrypted Data Encrypted Data Customer name : eso01992 Social security no : add3441asdad E-mail : asfd34@cdaf.wqeerq.wdqw Address : edqew213ada Parent account : adcae87asf Credit card no : adwew.edwe.eqe.qeqe Phone no : 432-2424-242-234
  • 22. Step 7: Decrypt and Present Data 6: Detect Encrypted Data
  • 23. Step 8: Search and Query Data
  • 24. Live Demo Real-time Encryption of Sensitive SaaS Data: 1. Contacts 2. Accounts 3. Reports SaaS application functionality is unaffected 1. Search for data 2. Sort contacts 3. Run Reports
  • 26. Processing Encrypted Data “...safe harbor provisions in laws and regulations treat lost encrypted data as not lost at all.” –Cloud Security Alliance , December 2009
  • 28. VPS Server Architecture HTTP Proxy SMTP Proxy Pop3 Proxy SaaS Apache & MTA Integration API Administration Policy Management *Encryption Engine Sort and Search Enabled Search Enabled Encryption Encryption Standard Encryption File encryption Format-preserved Encryption *Based on NIST-standard algorithms
  • 29. VPS Server Architecture HTTP Proxy SMTP Proxy Pop3 Proxy SaaS Apache & MTA Integration API Administration Policy Management *Encryption Engine Sort and Search Enabled Search Enabled Encryption Encryption Standard Encryption File encryption Format-preserved Encryption *Based on NIST-standard algorithms
  • 30. VPS Server Architecture HTTP Proxy SMTP Proxy Pop3 Proxy SaaS Apache & MTA Integration API Administration Policy Management *Encryption Engine Sort and Search Enabled Search Enabled Encryption Encryption Standard Encryption File encryption Format-preserved Encryption *Based on NIST-standard algorithms
  • 31. VPS policy Data Flow HTTP Proxy SMTP Proxy & Pop3 Proxy SaaS Integration Apache MTA API Policy *Encryption Engine Sort and Search Enabled Search Enabled Encryption Encryption Standard Encryption File encryption Format-preserved Encryption SaaS / PaaS Vendor
  • 33. SaaS Integration Mail Transfer API Agent VPS Appliance Corporate LAN/WAN VPS Internet as a Service SaaS provider facilities SaaS Application Servers
  • 34. Comparison of Data Confidentiality Risk Eaves- Database Identity Server dropping/ Theft Theft Hacking Solution Tampering TLS / SSL VPN Virtual Private Cloud Database Encryption Firewall SAS-70 Navajo – VPS
  • 35. With VPS, SaaS Customers will… • Retain complete control over sensitive data • Eliminate data privacy concerns • Eliminate data regulation concerns • Reduce the expense of SaaS solution audits