inSync Enterprise-Class Security
Transcription
inSync Enterprise-Class Security
White Paper inSync Enterprise-Class Security Advanced, multi-dimensional security features ensure the highest security levels White Paper Table of Contents inSync Security Overview............................................................................................................. 4 Data in Transit.............................................................................................................................. 5 Data at Rest................................................................................................................................... 5 Secure Client Authentication.................................................................................................... 5 inSync On-Premise......................................................................................................................... 6 inSync On-Premise Secure Deployment................................................................................ 6 inSync On-Premise Ports........................................................................................................... 8 inSync On-Premise AD Integration.......................................................................................... 8 inSync Cloud...................................................................................................................................... 8 inSync Cloud Security Objectives............................................................................................ 10 Ensuring Data Security During Bi-directional Transfer Between Client Machines and Servers.................................................................................10 Segregation of Customer Data...............................................................................................10 2-Factor Encryption Key Management & Authentication................................................11 inSync Cloud AD Integration...................................................................................................13 File Retention and Version Control.......................................................................................13 inSync Cloud Management Control Panel...........................................................................14 inSync Cloud Access by Druva Employees..........................................................................14 Data Center Security.................................................................................................................14 Additional Security Mechanisms to Protect Cloud Infrastructure and Data Assets..............................................................................................15 Third-Party Security Certifications.........................................................................................16 Backup Security.............................................................................................................................17 Client Triggered Architecture..................................................................................................17 Data Backup Session Security................................................................................................18 Data Restore Session Security...............................................................................................18 inSync Security 2 White Paper Device Security...............................................................................................................................19 Data Encryption.........................................................................................................................19 Remote Wipe..............................................................................................................................20 Geo-location Features..............................................................................................................21 Security for Smartphones and Tablets................................................................................. 22 Mobile Access.............................................................................................................................22 Policy-based Access..................................................................................................................22 Secure Authentication..............................................................................................................23 Securing Data in Transit...........................................................................................................23 Private Container for Corporate Data Accessed on a Mobile Device...........................23 Protecting Mobile Devices.......................................................................................................24 Data Encryption.........................................................................................................................24 File Share Security........................................................................................................................25 IT Control.....................................................................................................................................25 Control on employees who can share data........................................................................26 Control on who can share and what can be shared........................................................26 Control on sharing data with external partners and collaborators..............................26 Encryption...................................................................................................................................27 Comparing with Consumer-Grade Sharing Options (e.g., Dropbox with SecretSync).............................................................................................27 Protecting Shared Data............................................................................................................28 Summary..........................................................................................................................................28 About Druva....................................................................................................................................29 inSync Security 3 White Paper Overview With Druva inSync, you can rest assured that your enterprise’s data is completely secure end to end. inSync comprehensively protects your corporate data by adhering to strict standards that keep your data private and safe from external threats. With data protection as its number one priority, inSync is engineered to ensure data security at every step – data transmission, data storage, and data access. This document provides an overview of the security measures that Druva has put in place including security of data in transit and at rest, the on-premise deployment architecture, cloud security, and secure access to the service. inSync On-Premise Active Directory Server Web Browser Access Edge Server inSync Server Corporate Firewall Authentication Endpoints 256-bit SSL Encryption DLP Encryption on device 256-bit AES Encryption inSync Cloud HIPAA TRUSTE Third Party IdP Web Browser Access SOC 1 SOC 2 SOC 3 3rd Party Security Certifications Authentication SAML Endpoints AD Server inSync Cloud Service 256-bit AES Encryption 256-bit SSL Encryption DLP Encryption on device inSync Security 2-Factor Encryption 4 White Paper Data in Transit inSync is designed from the ground up for endpoints with the understanding that endpoints often connect over WANs and VPN-less networks. inSync always encrypts data in transit with 256-bit SSL encryption, ensuring enterprise-grade security over these networks. Data at Rest In addition to strict authentication and access controls, inSync secures data on storage nodes with 256-bit AES encryption. Secure Client Authentication inSync clients can either be mass-deployed using Integrated Mass Deployment (IMD) tools or can be activated by end users individually. For IMD, inSync uses a one-time activation token that is used to uniquely activate endpoints. Once activated, the client re-negotiates the authentication parameters. These authentication parameters are then stored in the inSync client for all subsequent connections with the inSync server. Even when a user self-deploys inSync on his or her device with a user ID and password, the client and server use the authentication key mechanism in the background to authenticate and authorize client activities such as backups, setting changes, and restores. Every time the authentication key is regenerated or the credentials are reset by an administrator, the existing authentication key is reset, this feature ensures that data never lands in the hands of a malicious user. inSync Security 5 White Paper inSync On-Premise inSync On-Premise is a deployment of inSync in an enterprise’s own data center. Available in multiple editions to address enterprises of varying sizes, inSync features a future-proof, scale-out architecture that enables linear scaling with the addition of customer provisioned storage as needed. inSync On-Premise Secure Deployment inSync on-premise servers can be deployed behind the firewall without requiring VPN connections from end users as depicted by Figure 1. inSync on-premise servers may also be deployed in the DMZ as shown by Figure 2. Figure 1. Deployment behind a firewall inSync Security 6 White Paper Figure 2. Deployment in the DMZ Deployment of inSync Private Cloud with Edge Server Edge 1 Firewall inSync network Master server Storage node 1 Internet inSync clients Storage node 2 DMZ Edge 2 Firewall Storage nodes connecting via WAN Storage node 3 Storage node 4 Figure 3. Deployment of inSync Private Cloud with Edge Server inSync Security 7 White Paper inSync On-Premise Ports inSync on-premise servers require the following ports to be opened to allow secure connections to the server from outside: • Endpoint Backup: 6061 • Endpoint Restore: 443 • Administrator Web Console (HTTPS access): 443 • inSync storage nodes (Applicable for Private Cloud deployments only): 6071 inSync On-Premise AD Integration inSync on-premise can be configured to integrate with on-premise Active Directory for: • Integrated mass deployment of the inSync client • Automatic user provisioning/deprovisioning • User authentication • User management inSync Cloud inSync Cloud is a fully-automated, enterprise-class endpoint protection solution offered as a software as a service (SaaS). Powered by Amazon’s state-of-the-art AWS technology, inSync Cloud offers elastic, on-demand storage that can grow to handle any number of users and data. The service can be instantly provisioned to a global user base with policies that lock user storage to specific regions. inSync Cloud offers secure, lightning-fast data backups and restores. It operates within multiple storage regions across the world to address the needs of the global enterprise. The service provides high availability and enterprise-scale RPO and RTO. The service’s enterprise-class security is compliant with international standards such as SOC-1, SOC-2, and SOC-3. inSync Security 8 White Paper Full administrative control to inSync Cloud is provided via a secure Web-based administrator control panel over HTTPS, which allows corporate policies to be defined for groups of protected users, including the ability to enable or disable users to change settings on their accounts. On the client side, the inSync Cloud agent is a lightweight, non-intrusive client application that manages data backup along with other endpoint services such as DLP and file sharing on each protected device. With IT having centralized policy setting and controls they can enable end users to manage their preferences such as folder selection and scheduling, while also providing them to access their shared and backed up data including data from their other devices. Figure 4. inSync Cloud Architecture inSync Security 9 White Paper inSync Cloud Security Objectives Druva strictly adheres to the following set of objectives to ensure the security of inSync Cloud: • Ensuring data security during bi-directional transfer between client machines and servers • Segregation of customer data • Two-factor encryption key management and authentication • Data center security • Additional security mechanisms to protect Cloud infrastructure and data assets • Third-party security verifications Ensuring Data Security During Bi-directional Transfer Between Client Machines and Servers See Overview (page 4) and Backup Security (page 17) sections Segregation of Customer Data inSync Cloud segregates each customer’s data from other customers’ data, thereby resulting in a virtual private cloud for each customer. Virtual Private Cloud for each customer is realized by: • Compartmentalization of customer configuration based on access credentials • Compartmentalization of customer metadata within Dynamo DB • Compartmentalization of customer data within S3 buckets • Encrypting data of each customer using a unique 256 AES encryption key inSync Security 10 White Paper 2-Factor Encryption Key Management & Authentication To uphold the highest security standards for enterprises, key management in inSync Cloud is modeled after a bank lockbox system, in which both parties hold part of the key. The encryption and authentication keys are mutually shared between the customer and the Cloud. Consequently, neither has full, unencrypted access to any data on the cloud independently. Key Points to Note: Both authentication and encryption depend upon two pieces of information: • UPn password (held ONLY by the customer) • UTn token (held ONLY by inSync) • Both these pieces (UPn and UTn) are required to authenticate the user and get the final key AK, which is used to encrypt and decrypt user data. • At no time is the actual key (AKn) saved by inSync; it exists only until a user or admin is authenticated and is then destroyed. UTn password held only by Customer UTn token held only by inSync Figure 5. Two pieces of information required for access. Both the inSync and Customer components required to decrypt user data. Actual key is never saved by inSync. inSync Security 11 White Paper Steps followed by inSync Cloud to create an account and secure data in the cloud: 1. 2. 3. Primary admin (A1) opens a new account with inSync Cloud with a randomly generated password P1 inSync Cloud creates a new virtual private instance with AES 256-bit encryption key : AK1. This is a customer specific encryption key inSync Cloud creates a new storage based on AK1, reminds the administrator that they take steps to remember the password. 4. inSync Cloud then creates a new security token to be stored in the cloud. The new key is created as follows: New Token T1 = encrypted with P1 (AK1 + P1 + salt) where salt is a random string generated for this operation. 5. The token T1 is saved in inSync Cloud while the password (P1) is held only by the admin (and NOT saved in the cloud). 6. inSync Cloud strongly recommends that the admin create a secondary admin account (A2), which results in the creation of a new password (P2) and a token T2. This is needed for potential scenarios where an admin forgets his or her password and only a secondary admin can reset it. Because of Druva’s stringent password policy, Druva is unable to reset admin passwords for any customer. 7. When a new backup user account is created (U1), inSync saves a new token (UT1) based on the user’s password (UP1), which only the user knows. Likewise, for all other users, inSync Cloud creates a username (Un) and a customized token (UTn). Authentication and encryption steps: inSync Security 1. A user or admin authenticates with a password, e.g., UP1 2. The password is used to decrypt the associated token UT1 and determine if a meaningful combination of AK1, UP1 and salt can be achieved. 3. If inSync Cloud gets a meaningful combination, the user is authenticated and AK1 is used to encrypt/decrypt the user backup stream. 4. The key is finally discarded when the user exits. 12 White Paper inSync Cloud AD Integration inSync’s Cloud AD-connector extends all the benefits of deep AD integration to inSync Cloud enabling integrated mass deployment of the inSync client, automatic user provisioning/deprovisioning, user authentication, and user management. Additionally, inSync Cloud supports SAML, an XML based open standard for exchanging authentication and authorization data between security domains. SAML permits users to securely log into inSync using their credentials on external identity services such as Microsoft Active Directory. • AD Federation Services (AD FS 2.0) can be set up to be the ID provider for inSync Cloud • Mobile app access can be set up for AD authentication using SAML • SAML can provide integration with other 3rd party ID providers, providing MFA services as well File Retention and Version Control inSync Cloud enables its customers to hold infinite restore points for protected data. Administrative control provides the ability to specify file retention at an individual backup policy level. If this option is chosen, an automatic process (Compaction) runs daily to remove any files outside of the retention rules. Administrators with appropriate rights also have the ability to selectively remove restore points from individual accounts where required. End users of the system have no control over removal of stored files, thus keeping the ownership of protected data with the administrator. inSync Security 13 White Paper inSync Cloud Management Control Panel • Administrative access to each inSync Cloud instance is provided via an Admin Control Panel. • Administrators access inSync Cloud using a web console over an HTTPS connection. • inSync Cloud does not store the admin password but uses the authentication methodology defined in section above. • An administrator can create multiple other admins based on roles. There are two primary types of administrators: -- Server administrator: Has overall administrator rights across all areas of service -- Profile administrator: Has tiered rights on user profiles. Each profile admin can have one or more of following rights: create users, restore data, and run reports. • No Druva employee has Server or Profile Administration based access to the instance. • Only server administrators can revoke access of another admin at any time by removing the appropriate admin account via the web-based admin control panel. inSync Cloud Access by Druva Employees Druva employees have no access to any of customers’ inSync Cloud instances. Access to cloud infrastructure by Druva employees is limited to its cloud operations team that follows strict rules and regulations defined under the Druva security policies document. This access is granted for the purpose of security patching, service upgrades, and monitoring tasks. Data Center Security inSync Cloud is built on top of the Amazon Web Services (AWS) technology stack. Amazon has several years of experience in designing, constructing, and operating large-scale data centers. AWS infrastructure is housed in Amazon-controlled data centers throughout the world. Only those within Amazon who have a legitimate inSync Security 14 White Paper business need to have such information know the actual location of these data centers, and the data centers themselves are secure and meet SOC-1, SOC-2, and SOC-3 certification requirements. The AWS network provides significant protection against network security issues including (but not limited to): • Distributed denial-of-service (DDoS) attacks • Man-in-the-middle (MITM) attacks • IP spoofing • Port scanning • Packet sniffing by other tenants For details, please refer Amazon Web Services - Overview of Security Processes. Additional Security Mechanisms to Protect Cloud Infrastructure and Data Assets Redundancy AWS data centers are designed to anticipate and tolerate failure while maintaining service levels and are built in clusters in various global regions. inSync Cloud provides multi-zone replication of various elements of customer data including configuration, metadata and the actual data, thereby ensuring that customer data is available in multiple availability zones to handle failure of any zone. Redundancy measures provided by Amazon include ( but not limited to) : • Fire detection and suppression • Power • Climate and temperature • Management For details, please refer Amazon Web Services - Overview of Security Processes. inSync Security 15 White Paper Third-Party Security Certifications AWS has achieved compliance with the following 3rd party standards and/or frameworks. The list of certifications includes (but is not limited to): • SOC 1 (SSAE 16/ISAE 3402) and SOC 2 and SOC 3 • PCI DSS Level 1 • ISO 27001 • FedRAMP • DIACAP and FISMA • ITAR Regularly updated details about compliance certifications completed by Amazon can be found at : http://aws.amazon.com/compliance/ ISAE 3000 Type II Druva has completed an ISAE 3000 Type II certification by KPMG . The ISAE audit covers the following elements: Description of Druva’s system related to general operating environment supporting inSync Cloud Operations Design of controls related to the control objectives stated in the description TRUSTe EU Safe Harbor Druva has achieved TRUSTe EU Safe Harbor certification facilitating compliance with the European Union’s Data Protection Directive. HIPAA Druva has passed a review by KPMG validating the company’s security and privacy controls for handling HIPAA-compliant protected health information (PHI). These certifications are available from Druva upon request. inSync Security 16 White Paper Certifications ITAR SOC 1, 2, 3 FISMA Moderate ISAE 3000 HIPAA BAA ISO 27001 HIPAA PCI DSS TRUSTe MPAA FIPS 140-2 Amazon Web Web Services Certifications Amazon Services ISAE 3402 EU Safe Harbor Certified Cloud Operations Certified Cloud Backup Security Client Triggered Architecture With Druva inSync, backup and restore requests are always initiated by the inSync client, which aids in security and scalability of the server. The servers never initiate any request, and both backup and restore use the same (default 6061) port for all configuration, control and data requests. All backup and restore activities are secured using 256-bit SSL encryption. inSync Security 17 White Paper Data Backup Session Security: 1. The agent contacts the inSync server via TCP/IP socket. 2. 256-bit SSL encryption is used for all communication by inSync. 3. Server authenticates users with the encryption key. 4. As required, the client sends the server blocks of data for backup over the secure SSL connection. 5. Blocks of data are stored encrypted on the server using 256 AES encryption. Data Restore Session Security: inSync Security 1. User launches client agent, selects files from the restore points required. 2. The agent contacts the inSync server via TCP/IP socket. 3. 256-bit SSL encryption is used for all communication of authentication details. 4. The client agent sends a list of files to the server to retrieve. 5. The client agent sends a list of files to the server to retrieve. 6. inSync offers optional support for data restore over a Web browser. User authentication can be mandated prior to restore, which can utilize Active Directory authentication. This enables end-users to select and restores files, which are then transferred via a secure 256-bit SSL connection. 18 White Paper Device Security inSync includes a simple but highly effective solution that reduces the economic impact to an enterprise from a lost or stolen endpoint. Its device-level security features provide powerful, multi-layered protection of critical corporate data on endpoints. Data Encryption With inSync, critical files and folders on laptops and mobile devices can be selected for data encryption to ensure that they are protected with the highest encryption standards. On-device data encryption features (requires DLP to be enabled): • Uses endpoint operating system’s built-in encryption tools (e.g., Windows’ Encrypting File System or EFS). • Selective encryption of files or folders avoids need for a heavy, full-disk encryption. Any file on the endpoint, which has been selected for backup, is encrypted. This approach is superior to alternatives that require a heavyweight full disk encryption or placing all files on a single location, either of which is sub-optimal. • Encryption and decryption are transparent, with no need for any additional user steps. Users logging into their endpoint device automatically have decrypted access to their files. inSync Security 19 White Paper Remote Wipe In order to prevent data breach on lost or stolen devices, inSync provides remote wipe capabilities across both laptops and smart-devices that can be executed either by an administrator or an auto-delete policy. Remote Wipe Features: • Administrators can initiate a remote decommission operation on a lost or stolen device, so the device’s data is wiped the next time time the device connects with inSync. • An auto-delete policy can be configured to automatically wipe data if a device hasn’t connected for a specified number of days. • Data deletion meets NSA Security Standards and protects lost or stolen devices from data breach. Steps followed during remote wipe (for Windows): inSync Security 1. inSync overwrites all files that were backed up. If a file cannot be overwritten (possible with encrypted files) then the file is deleted right away. 2. inSync then overwrites the entire free space of that partition by creating an SErase file and increasing the size of SErase until it gets a 'No free space error.’ By doing so, it is able to clean up the free space of the drive, with data written by a secure algorithm. 3. Next, inSync deletes all backed up or sync/shared files. 4. Then, it creates 0 byte SMFT files untill it exhausts MFT records and can't create any more of them. This overwrites the records in the MFT table so that no one can see the name of the files that were there on the system. 5. inSync finally deletes the SErase file (the file used to fill up the free space). 20 White Paper Steps followed during remote wipe (for Mac): 1. inSync uses the srm tool to do safe delete of data. 2. SRM ensures each file is overwritten, renamed, and truncated before it is unlinked. This prevents other people from undeleting or recovering any information about the file. 3. Additionally, the overwrite process is implemented with 7 US DoD compliant passes (0xF6, 0x00, 0xFF, random, 0x00, 0xFF, random) Geo-location Features: inSync provides the ability to track the geographical location of devices with an accuracy of near to 20 meters at any point in time. • An embedded software engine uses advanced hybrid positioning algorithms based on data from Wi-Fi access points, GPS satellites, and cell towers to keep track of all your endpoints. • Geo-location provides details such as street, city, state, or country. • A familiar Google Maps interface provides a quick view of the coordinates for every endpoint device available on the inSync management console. inSync Security 21 White Paper Security for Smartphones and Tablets inSync’s mobile application allows users to access backed up and shared data from any of their mobile devices. inSync provides administrators a variety of policy options to protect devices and data on both BYOD and corporateowned devices. Administrators can allow users to choose their backup & device protection policies; however, the corporate data (accessed using the inSync mobile app) on these mobile devices is always under administrator control. All of inSync’s features - secure client authentication, client triggered architecture, data backup session, data restore session and data in transit security features are applicable to mobile devices as well. Mobile Access inSync ensures that access to corporate data (backed up, shared) is secure in order to prevent data leaks from mobile devices. the inSync mobile app is enabled with the following security features: 1. Policy-based Access Access to inSync data on mobile devices is enabled at a profile level that is assigned to a user. By making it a profile setting, inSync gives the option to allow only select employees mobile access to corporate data based on their roles, privileges, and security levels or even based on the projects they work on. inSync Security 22 White Paper 2. Secure Authentication To access their data, employees need to login to the inSync mobile app using their Email ID and Password. The inSync mobile app is equipped to authenticate using inSync’s base credentials, Active Directory password or even with an organization’s single sign-on solution using SAML 2.0. In addition, administrators can configure policies to enforce a user-defined PIN to access the inSync mobile app. This will ensure that corporate data in the inSync mobile app is secure even if an employee hasn’t configured a PIN for the mobile device. 3. Securing Data in Transit Communication between the server and the mobile device is encrypted using 256-bit SSL encryption. This ensures that data at all levels is secure until it is received by the device and presented to the authenticated employee using the the inSync mobile app. 4. Private Container for Corporate Data Accessed on a Mobile Device inSync recognizes that IT administrators need to have control over corporate data stored on all endpoints - company-owned devices or employee-owned (BYOD) devices. To help administrators achieve this, inSync employs a private container that allows administrators to wipe critical data in a compartmentalized manner. inSync ensures that data on stolen or lost mobile devices can be protected. Administrators can remotely wipe a device and the data is wiped whenever the device is turned on even if a new data/SIM card is used on the stolen mobile device. In addition, admins can enforce policies to disable downloads of files accessed via inSync on personal devices as well as prevent the opening of files in third party apps. inSync Security 23 White Paper Protecting Mobile Devices IT administrators can configure inSync to enforce backup and device protection on mobile devices. Employees cannot access their data using the inSync mobile app until these settings are accepted and configured successfully. Administrators can configure inSync to backup Contacts, Photos, and Videos on these mobile devices and even SD-card content on Android devices. These settings are configured on the mobile devices using encrypted certificates generated by the enterprise. The inSync mobile app periodically backs up the selected data based on the configured settings and also updates the latest location of the device from where it was backed up. With this configuration, inSync gives administrators the option to deactivate the entire device (as against wiping just the inSync Container). Deactivating the entire device will lead to all the data on the device being lost - equivalent to a new device purchased from the store. All the backed up data, however, continues to reside on the server. Data Encryption inSync ensures that no data is stored in an unencrypted form on mobile devices. inSync leverages iOS' Full Disk AES 256-bit hardware encryption on devices with passcode enabled. On Android inSync uses 128-bit AES-CBC and ESSIV:SHA256, with an option to strengthen the encryption with PIN which administrators can mandate. inSync Security 24 White Paper File Sharing Security inSync’s security capabilities encompass data synced/shared using inSync Share. inSync Share offers administrators the ability to configure policies for sharing data within the enterprise or with external users. In addition, all shared data is encrypted on the wire, on the server, and also on the endpoints with the DLP option. IT Control inSync provides IT with three-tiered control over shared data within the enterprise. It also offers administrators visibility into data sharing activities and access at all levels to monitor and check for any unsecure sharing practices. inSync Security 25 White Paper LEVEL 1. USER SHARING 1. Control on employees who can share data 2. Control on who can share and what can be shared 3. IT control on sharing data with external partners and collaborators inSync Security LEVEL 2. FILE SHARING EXTERNAL 3. PARTY SHARING IT can control which employees can share data using inSync. Administrators can enable this setting at a group/user profile level based on an employee’s functional role, or projects that the employee works on. Administrators have complete visibility over an employee’s shared data. Administrators can view sharing activities including what data has been shared and when, in the context of a single employee as well as globally (all employees). inSync also offers requisite privacy settings for companies with policies disallowing administrator access to employee data. Employees can configure privacy settings if they don’t want IT to view their confidential data. IT administrators can control whether a user can share data with all other employees or only with selected groups of employees within the enterprise. This setting is part of the user profile and is configured by specifying the user profiles that data can be shared with. This setting allows administrators to configure inSync for employees working in groups that have data sharing restrictions. IT administrators can control whether a user can share data using links and whether a user can collaborate with external parties via guest accounts. Shared links allow external partners to view or download the shared files depending on the link configuration. Guest accounts further allow external users to edit and upload files to a shared folder. Administrators can determine how long shared links remain valid by setting automatic expiry policies. Administrators and employees can also manually delete links to any documents shared with external partners with immediate effect. Links can be password protected and configured as view-only. Administrators have complete visibility on the usage of links shared with external partners and can see the number of link views and downloads. Administrators further have visibility into all activity related to guest accounts. 26 White Paper Encryption Administrators can choose to encrypt data added to the inSync Share folder as part of their organizations DLP policies. Data is encrypted using the endpoint’s operating system’s native encryption algorithms, giving much better performance than application-level encryption algorithms. For example, inSync leverages Windows’ Encrypted File System services to encrypt and decrypt data on the fly. Parameter Dropbox with SecretSync inSync Share Functionality Limited (encrypting data synced across devices). Complete (Encrypting data for sharing across users OR syncing across devices). Tools required Multiple tools required (Dropbox & SecretSync, each with their own password & key. Also requires Java). Single unified solution Accessing encrypted data Requires SecretSync key to decrypt data for every access. Requires no additional keys managed by the native OS. Risk to data Loss of key is irreparable. No risk to employee data - admin can reset any lost password. Performance Slow (Application level encryption). Fast (Native OS API’s). Windows, iOS, Mac OS, Linux Windows, Mac OS, iOS, Android High (inclusive of all tools) Low Platforms Cost The following algorithms are used to encrypt shared data. 1. Windows - 256-bit AES encryption used by Windows EFS. 2. iOS & Mac - 256-bit AES encryption. 3. Android - 128-bit AES-CBC and ESSIV:SHA256 encryption. inSync Security 27 White Paper Protecting Shared Data inSync’s remote wipe & auto delete DLP policies also encompass shared data. Data in the inSync Share folder can be remotely wiped by administrators by decommissioning the device. The inSync Share folder on all devices of the employee can be automatically deleted by setting an auto-delete policy in the inSync user profile. Summary Data protection is Druva’s number one priority, and inSync guarantees security at every step. By adhering to strict standards, inSync keeps your corporate data private, protected, and safe from threats. inSync Security 28 About Druva Druva provides integrated data protection and governance solutions for enterprise laptops, PCs, smartphones and tablets. Its flagship product, inSync, empowers an enterprise's mobile workforce and IT teams with backup, ITmanaged file sharing, data loss prevention and rich analytics. Deployed in public or private cloud scenarios or on-premise, inSync is the only solution built with both IT needs and end user experiences in mind. With offices in the U.S., India and U.K., Druva is privately held and is backed by Nexus Venture Partners, Sequoia Capital and Tenaya Capital. For more information, visit www.Druva.com. Druva, Inc. Americas: +1 888-248-4976 Europe: +44.(0)20.3150.1722 APJ: +919886120215 [email protected] www.druva.com