Secure Any Data, Anywhere. The Vera Security Architecture

Transcription

201 5 VERA TECHN IC A L W HIT EPA P ERSecure any data, anywhere.The Vera security architectureAt VeraTM, we believe that enterprise securityperimeters are porous and data will travel. In aworld of continuous productivity, collaborationacross companies and services, and trulyproductive mobility, it’s vital for organizations toconfront this shift head-on by attaching securitydirectly to the data itself. The Vera platformenables businesses of all sizes to effectivelyprotect any kind of data, and then track, auditand manage the policies securing it in real-time,no matter how far it travels. Our belief is that itis possible to secure data no matter what device,person, cloud or application it travels to, even if –and after – it falls into the wrong hands.Current solutions, from on-premises storage,to Enterprise Content Management (ECM), tomodern enterprise sync and share tools -- likeBox, Dropbox and OneDrive -- can addressdifferent parts of this problem. But, none havethe capability to fully protect the full lifecycle ofenterprise content. Companies regularly store andshare information across multiple repositories, andthe daily course of business disperses that dataacross different systems, from CRM to ERP to HRMand even to financial systems. As organizationsand individual workers become more continuouslyproductive, IT and security teams need tools thatcan simply extend these controls across platforms.Even for organizations with a clearcloud and data control strategy,this fragmentation of sources andsharing services drastically reducesthe ability to monitor and control thespread of data.Moreover, all of this needs to be done with a focuson user interaction design. By making it simpleand transparent to secure and share securelyacross any repository, companies can improveadherence to policy and dramatically improvetheir governance, security and data controlpostureVera’s unique security model follows your datawherever it goes. For every individual in yourorganization, we make it effortless to securelycollaborate with anyone, no matter whichtools they choose to use. For IT and securitypractitioners, Vera provides powerful managementand oversight in a cloud-based platform that cancoordinate and monitor activity independent ofwhere content is stored.

The Vera ApproachSIMPLE SECURE DATA PROTECTIONTHAT FOLLOWS YOUR CONTENTThe Vera architecture is designed to addressthe challenges created by today’s highlycollaborative, cloud-based and mobile-centricwork environment. Based on the assumptionthat traditional perimeter- and endpoint-basedsecurity solutions are ineffective ways to protectyour enterprise’s data, Vera provides flexible,transparent data security that is:1. STORAGE, TRANSIT AND DATA AGNOSTIC.Due to the highly-collaborative nature ofbusiness, it is not safe to assume thatenterprise data resides solely in controlledsystems. A better approach is to design asystem that can operate securely, independentfrom how information is shared or stored.And, to ensure the control, management andownership over critical data, the platform mustpermit any kind of content type to becontrolled and monitored consistently.2. DATA-CENTRIC AND POLICY-DRIVEN.Secure cloud platforms permit thecentralization of policies that govern themanagement of sensitive enterprise data.By giving organizations central control overaccess, sharing and collaboration, policiesfollow the data and can be implementedglobally and automatically across theentire organization.3. DESIGNED FOR FLEXIBILITY,ADOPTION AND COMPLIANCE.In a complex organization, data security isimproved through adoption and compliance,and the fastest path to these goals is throughuseful, flexible and consistent user experiences.Securing data must be simple and transparent,and there must be as little friction as possiblefor collaborators receiving secured data -no matter what platform or tools theychoose to use.By designing a system that addresses these three key criteria, organizations can more effectivelyimplement, manage and encourage compliance to their individual data security standards.WWW.VERA.COM318 CAMBRIDGE AVE, PALO ALTO, CASALES@VERA.COMTOLL FREE 1.844.GET.VERA

The Vera ArchitectureTo address these three requirements and deliver ahighly available, flexible and confidential securitysystem that can serve both large and smallbusinesses alike, Vera incorporates three primarycomponents in its platform architecture: a securecloud platform, a set of end-user clients, and aweb-based administration dashboard.VERA CLOUD PLATFORMThe central component of the Vera service is thecloud platform. The Vera cloud platform managesthe policy and controls for each customer, ortenant on the platform, and securely managesthe processes of creating keys, enforcing accesspolicies and aggregating events and activities foraudit and reporting purposes. No customer dataor content is stored on the Vera Cloud Platform.VERA END-USER CLIENTSThe end-user clients on mobile devices, WindowsPCs and Apple OS X desktops facilitate theencyrption, decryption and policy determinationfor everything secured by Vera. Through eachendpoint, Vera can transparently confirm identity,protect new data as it is created, enforce policyrestrictions, and ensure the secure transmissionof keys and policy to and from the Vera CloudPlatform. An end-user client permits IT teams tocentrally manage access on devices both in andoutside the enterprise’s control.Securing the EnterprisePut together, these three components can secure,monitor and control any type of enterprisedata, in any platform. Currently, the Vera CloudPlatform and End User Clients support theencryption and policy management for content the documents, objects and files most frequentlycollaborated on by employees.When a new document is secured with Vera, theclient on the employee’s device requests a keyfrom the Vera Cloud Platform. A unique key iscreated for that document, which identifies it inthe Vera system and allows it to be associatedwith a policy and tracked across any repositoryor device. The key is stored securely on the Veraplatform, and any restrictions in the policy areapplied to the document.These policy restrictions include the ability tocontrol a recipient’s ability to Open, Edit, Copy,Share or Save a copy of the file. All of theseactivities are logged and tracked by the cloudplatform, and are aggregated for viewing in theVera Dashboard.VERA DASHBOARDThe Dashboard gives both end users andadministrators full visibility and control over allthe activity around content, no matter where itis stored or how it is transmitted. Through theVera Dashboard, an admin can manage accesscontrols, set and update policies, oversee usersand activity and run audit reports on usage.WWW.VERA.COM318 CAMBRIDGE AVE, PALO ALTO, CASALES@VERA.COMTOLL FREE 1.844.GET.VERA

Data Security in VeraSECURE CLOUD POLICY MANAGEMENTA key tenet of the Vera security model is thatour platform never stores customer contentor application data in any way. The primaryinformation that lives in the Vera Cloud Platformare the policy definitions and encryption keys,separated logically for each customer. Allcommunication between the cloud platform,device clients and the administrative Dashboardis secured in transit and at rest with at least SSL2.0 (though TLS 1.2 is preferred) and AES 256bit encryption.Each document secured with Vera is encryptedwith a unique key that is secured within theVera Cloud Platform. These keys are transmittedsecurely via TLS/SSL to the clients which form atrusted key space on the end user’s device. Auditlogs for every successful and unsuccessful accessrequest to a document are recorded. Keys are notstored locally on the endpoint unless the policyowner specifically grants that privilege for offlineor time-bound access. Additionally, Vera End-userClients protect the enterprise against man-in-themiddle attacks from custom or forged certificates.To decrypt and access a protected file, theopposite occurs - a request for a decryption keyis sent via the Vera client to the Cloud Platformvia TLS/SSL for the specific file. That request isverified against the user permissions and policyrestriction for the document, and if access isconfirmed, the client is given access to decryptthe file. In the absence of a client, the end user willbe given the choice to view the secure file via abrowser interface. All access information, includingtime, identity, action and location are logged forthe Dashboard and audit trail.Centralization of policy management andadministration is critical, ensuring that copies ofdocuments or edited versions do not lose theoriginal’s security. The system will maintain theintegrity of the original.As a result of this design, Vera employees andengineers cannot see customer content, unlessthe individual has been expressly granted accessby a content owner. As a result, customers in evenhighly-regulated industries trust Vera with eventheir most sensitive data.WWW.VERA.COM318 CAMBRIDGE AVE, PALO ALTO, CASALES@VERA.COMTOLL FREE 1.844.GET.VERA

Consistent, transparentuser experiencesimpacting their efficiency or effectiveness. Fora user in-policy, opening a secure document isno different than opening any other file.THE VERA END-USER CLIENTOne of the reasons employees have not adoptedtraditional data and content security solutionslike RMS and DRM is that they require users tochange the way they work. Document-specificsettings are disruptive to the process of gettingthings done and serve as impediments toadoption. People need instant, seamless accessto their information, on any device, and atthe same time, IT needs to ensure that criticalinformation is protected.With Vera, IT can deploy a non-invasive,passive client that manages the applicationand enforcement of policy invisibly in thebackground on every user device. A user withthe Vera client installed can open, edit andshare information however they choose withoutWWW.VERA.COM318 CAMBRIDGE AVE, PALO ALTO, CAVera provides native clients for Windows andApple OS X desktops and laptops, as wellas mobile applications for iOS, Android, andWindows 8 tablets. The client is designedwith the concept of “smart defaults” in mind,giving users the right nudges and indicatorsto secure important content as it is created.For access to secured documents away froma trusted device, Vera also provides a webbased document viewer that supports readonly access to content. For desktops, Veraalso integrates with popular email clients likeOutlook and Apple Mail , allowing users toprotect attachments, apply policies, and shareinformation directly from an email.SALES@VERA.COMTOLL FREE 1.844.GET.VERA

The Vera Policy BarTHE VERA END-USER CLIENTAn important element of the Vera ecosystemis the Vera Policy Bar, the user experienceelement that clearly demonstrates a user’saccess permissions and any policy restrictionson a document. When a secure document isopened, the Vera client overlays a Policy Bar onthe document that shows what restrictions areenforced.“Vera provides one of the most pivotaltechnologies eluding enterprise IT:A solution truly balancing strongsecurity and simple user experience.”- Nick Mehta, CEO, GainsightThese policies can be set broadly, or on aper-document basis, and allow end users andadministrators to prescribe granular permissionsto documents, including the ability to limit thecopy and paste of information into, out of, oracross protected files.Finally, all Vera access points, whether web,mobile or desktop, are integrated with enterpriseidentity and permissions management tools likeOkta and Active Directory, further improvingaccess and transparency in the system. Byallowing customers to authenticate users to Veraagents with their corporate directory service,Vera streamlines and simplifies the login, accessand provisioning of accounts.WWW.VERA.COM318 CAMBRIDGE AVE, PALO ALTO, CA“Vera is geared towards users thatalready have accounts with Dropbox,Box, Google Drive, and OneDrivebut need a way to maintain privacycontrol of those documents.”- Ruth Reader, VenturebeatSALES@VERA.COMTOLL FREE 1.844.GET.VERA

Policy, user and contentadministration:THE VERA DASHBOARDThe Vera Dashboard is the central consolewhere Vera customers aggregate, analyze andtake action on all the activity around their data.Returning to the fundamental assumption thatperimeter and endpoint security is not enough toprotect an organization’s sensitive information,Vera gives both end users and IT administratorsfull visibility and control over all their content, nomatter where it is stored or how it is transmitted.Through the Dashboard, an admin can manageaccess controls, set and update policies, overseeusers and activity and run audit reports. Theweb-based dashboard provides full visibility andmanagement, and aggregates event data in asimple, powerful dashboard.The Dashboard also allows an administratorto centrally view all policies in effect by theorganization and can also update those policiesin real time. This is a critical capability, allowingan admin to instantly revoke access or adjustpermissions to documents that have already leftthe organization’s control. An IT admin can alsomanage user accounts, control groups, createnew policies, and view all files secured by Vera.Beyond simple administration and management, the Vera Dashboard is a powerful analytics andSIEM tool. The dashboard provides analytics on user adoption, policies in place, and attempted (andmore importantly, unsuccessful) accesses to content. In tandem with the Vera end-user clients, thisconsole also can provide insights into attempts to tamper with a client or endpoint in an effort to gainunsanctioned access to information.WWW.VERA.COM318 CAMBRIDGE AVE, PALO ALTO, CASALES@VERA.COMTOLL FREE 1.844.GET.VERA

ConclusionWith a centralized cloud architecture that is content and storage agnostic,policy-driven and designed to adapt to modern work practices, Vera allowscustomers to provide consistent, auditable protection across all their criticalcontent. And, by adopting Vera, organizations of all sizes and in any industrycan maintain their existing investments in storage, collaboration andcommunication and still improve their security profile.Vera is a data and content security solution that enhances IT’s abilityto protect, govern and manage the transmission of information withoutimpacting employees or the existing security choices the organization hasmade. Files secured by Vera can still be protected by gateways, firewalls andendpoint technologies, but customers choosing Vera can now extend thesecontrols beyond the boundaries of their business.With Vera, you can:Enable employees to work in the toolsof their choice, on their terms, withoutsacrificing security and controlAutomatically apply policytransparently to information createdby your organizationExtend policy, data governance, andcompliance requirements beyondtraditional security perimetersTrack, audit, and manage access toconfidential information in transit andat restSecure enterprise data no matter whichrepository, cloud collaboration platform,or device it resides onFor more information about Vera, or to schedule a demonstration for your organization,please visit us at www.vera.com or find us on Twitter @veratalk Vera 2015. All rights reserved. Vera and the Vera logo are trademarks of Vera. All other logos, trademarks and registered trademarksare the properties of their respective owners. Document 2015001WWW.VERA.COM318 CAMBRIDGE AVE, PALO ALTO, CASALES@VERA.COMTOLL FREE 1.844.GET.VERA

identity and permissions management tools like Okta and Active Directory, further improving access and transparency in the system. By allowing customers to authenticate users to Vera agents with their corporate directory service, Vera streamlines and simplifies the login, access and provisioning of accounts. "Vera provides one of the most pivotal