SlideShare a Scribd company logo
Copyright 2018 Virtru Corporation
Bootstrapping UX
In a Privacy & Security Organization
Jim Lane
Vice President of User Experience
jlane@virtru.com
@jimlanenova
/in/jimlane
Copyright 2019 Virtru CorporationCopyright 2019 Virtru Corporation
We help organizations worldwide protect data
wherever it’s created or shared so they can
collaborate with confidence.
In so doing, we foster trust
and unlock the power of data.
Virtru’s Mission
Copyright 2018 Virtru CorporationCopyright 2019 Virtru Corporation 3
DataAge 2025, Seagate
https://www.seagate.com/our-story/data-age-2025/
175
Zettabytes of data world-wide by 2025
Copyright 2018 Virtru CorporationCopyright 2019 Virtru Corporation 4
Global Encryption Trends Study, conducted by Ponemon Institute and sponsored by nCipher Security
https://www.ncipher.com/2018/global-encryption-trends-study
43%
Only 43% of organizations have encryption
deployed across the enterprise
Part of the problem: usability.
Copyright 2018 Virtru CorporationCopyright 2019 Virtru Corporation 5
106M records
540M records
885M records
11.9M records
Just a few of the major data breaches this year...
Copyright 2018 Virtru CorporationCopyright 2019 Virtru Corporation 6
CHARTER PEOPLE PROCESS TOOLS STRATEGY
Copyright 2018 Virtru CorporationCopyright 2019 Virtru Corporation 7
What is the Strategic Priority of UX?
1 2 3 4 5 6 7 8
Hostility
towards user
experience
Teams designing
for themselves
Small skunk
work projects
Dedicated
UX budget
Managed
UX team
Systematic
UCD process
Integrated UX &
design process
User driven
organization
With executive alignment…
Adapted from UX Maturity Model by Nielsen Norman Group
Copyright 2018 Virtru CorporationCopyright 2019 Virtru Corporation 8
Tips & Tricks
Check out: John Whalen, Brilliant Experience: “Building Buy-In: Internally Positioning UX for Executive Impact”
Speak their language.
Communicate how design metrics will map to business goals.
Be a champion for both your team and the business.
Copyright 2018 Virtru CorporationCopyright 2019 Virtru Corporation 9
CHARTER PEOPLE
Copyright 2018 Virtru CorporationCopyright 2019 Virtru Corporation 10
Scenario
Design
Hire specialists,
Or generalists?
Copyright 2018 Virtru CorporationCopyright 2019 Virtru Corporation 11
Product
Family
Product
Family
Product
Family
Product
Family
Product designers
embedded in teams with
product and engineering
leads
Copyright 2018 Virtru CorporationCopyright 2019 Virtru Corporation 12
Tips & Tricks
Invest in your network.
Go beyond portfolio – look for process and soft skills.
Host an intern program.
Copyright 2018 Virtru CorporationCopyright 2019 Virtru Corporation 13
CHARTER PEOPLE PROCESS
Copyright 2018 Virtru CorporationCopyright 2019 Virtru Corporation 14
Research Prototype Design Develop Release
Iterative Cross-Functional Design Process
Check out: “Articulating Design Decisions” by Tom Greever
Copyright 2018 Virtru Corporation
Iterative Cross-Functional Design Process
Sometimes we sprint...
Sometimes we sprint ahead...
And sometimes we work on larger design problems or concepts outside
of the Agile process, and bring it back into sprints later when solutions are
better understood
Copyright 2018 Virtru CorporationCopyright 2019 Virtru Corporation 16
Tips & Tricks
Share early and often.
Create opportunities to collaborate.
Demonstrate the value of UX quickly.
Check out: “Articulating Design Decisions” by Tom Greever
Copyright 2018 Virtru Corporation 17
heuristic evaluation
noun
A usability inspection method for computer software that helps to identify
usability problems in the user interface (UI) design.
Heuristics -> Observations -> Severity -> Frequency -> Scope -> Prioritization
Copyright 2018 Virtru Corporation 18
The system should:
1. provide appropriate feedback
2. act in a way the user expects
3. provide the user control and freedom
4. provide consistency and follows standards
5. not require users to remember information from one part of the interface to another
6. provide flexibility and efficiency of use
7. provide an aesthetic and simple-as-applicable design
8. help users recognize, diagnose, and recover from errors
9. prevent user error in the first place
10. provide appropriate help and documentation
Nielsen Norman Group
https://www.nngroup.com/articles/ten-usability-heuristics/
Copyright 2018 Virtru Corporation 19
The cryptographic API should:
1. Integrate crypto functionality into standard APIs
2. Sufficiently powerful to satisfy both security and non-security requirements
3. Easy to learn, even without cryptographic expertise
4. Don’t break the developer’s paradigm
5. Easy to use, even without documentation
6. Hard to misuse. Incorrect use should lead to visible errors.
7. Defaults should be safe and never ambiguous
8. Provide a testing mode
9. Easy to read and maintain code that uses it/updatability
10. Assist with/handle end-user interaction
Adapted from “Developers Are Not The Enemy! The Need for Usable Security APIs”
Green & Smith (2016)
Copyright 2018 Virtru Corporation 20
Personas
Customer Journeys
Service Blueprints
User Testing
Copyright 2018 Virtru Corporation 21
Personas
Customer Journeys
Service Blueprints
User Testing
Copyright 2018 Virtru Corporation 22
Personas
Customer Journeys
Service Blueprints
User Testing
Copyright 2018 Virtru CorporationCopyright 2019 Virtru Corporation 23
CHARTER PEOPLE PROCESS TOOLS
Copyright 2018 Virtru CorporationCopyright 2019 Virtru Corporation 24
+ + =
Sketch
Project Files,
Symbol Libraries
Abstract
Version
Control
Storybook
Javascript UI
Components
Design System
Componentized
Prod Design & Dev
Virtuoso Design System
Copyright 2019 Virtru Corporation
Product Design
Plug-ins
Secure Reader
Dashboard
Authentication
Marketing
Headers
Footers
Navigation
Forms
Menus
Tables
Layouts
...
25
Virtuoso Design System
Color
Shape
Typography
Icons
Buttons
Fields
Checkboxes
Radio
Buttons
...
Atoms Molecules Organisms
Copyright 2018 Virtru CorporationCopyright 2019 Virtru Corporation 26
Tips & Tricks
Choose tools that will help your team collaborate,
prototype, scale, and pivot quickly.
Handoff to engineers is critical!
Copyright 2018 Virtru CorporationCopyright 2019 Virtru Corporation 27
CHARTER PEOPLE PROCESS TOOLS STRATEGY
Copyright 2018 Virtru Corporation 28
Why Do Customers Protect Data?
Use cases:
Protect intellectual property from intentional or unintentional misuse
Share data securely within an organization, and with partners and service providers
Comply with regulations such as HIPAA, CFPB, GLBA
Protect data shared outside of the organization
Allow migration to Cloud platforms without sacrificing security - back to encryption
Copyright 2018 Virtru CorporationCopyright 2019 Virtru Corporation 29
1. Persistent: Protect the data wherever it goes.
2. Share with Anyone: No prior trust relationship/key exchange required.
3. Positive Control: Control who can access data, from where, and for how long.
4. Visibility and Audit: Track and audit where data is shared and accessed.
What is Usable Encryption?
Copyright 2018 Virtru CorporationCopyright 2019 Virtru Corporation 30
Basic Usability
Control & Visibility
Scalability
Value
Can I collaborate successfully, securely, end-to-end,
with anyone?
Is security there when I need it?
Does it grow with my
experience & needs?
Are my company
and I secure?
Designing Usable Experiences
Copyright 2019 Virtru CorporationCopyright 2019 Virtru Corporation
We help organizations worldwide protect data
wherever it’s created or shared so they can
collaborate with confidence.
In so doing, we foster trust
and unlock the power of data.
Virtru’s Mission
Copyright 2018 Virtru Corporation
Thank you!
Jim Lane
Vice President of User Experience
jlane@virtru.com
@jimlanenova
/in/jimlane

More Related Content

PDF
Making best-in-class security ubiquitous - Why security is no longer just an ...
PDF
MMV Webinar 3. Cybersecurity Perspectives. March 2018
PPTX
Nuovi modelli di sicurezza IT: le trasformazioni degli Innovation Accelerators
PDF
RisingStarsOfCybersecurity
PPTX
Regulations in IoT - Innovation Stifle or Urgent Need
PPTX
OWASP Bay Area Meetup - DevSecOps the Kubernetes Way
PDF
Rethinking the Enterprise Perimeter | SnowFROC Presentation
PDF
FIRST CTI Symposium: Turning intelligence into action with MITRE ATT&CK™
Making best-in-class security ubiquitous - Why security is no longer just an ...
MMV Webinar 3. Cybersecurity Perspectives. March 2018
Nuovi modelli di sicurezza IT: le trasformazioni degli Innovation Accelerators
RisingStarsOfCybersecurity
Regulations in IoT - Innovation Stifle or Urgent Need
OWASP Bay Area Meetup - DevSecOps the Kubernetes Way
Rethinking the Enterprise Perimeter | SnowFROC Presentation
FIRST CTI Symposium: Turning intelligence into action with MITRE ATT&CK™

What's hot (20)

PDF
neXt Curve reThink: What Meltdown & Spectre Mean for IoT Past, Present & Future?
PPTX
Social Media Bootcamp for LinkedIn
PDF
Technology Trends & The Impact for Software Industry
PDF
Close the Security Gaps of a Remote Workforce
PPTX
Top 5 Information Security Lessons Learned from Transitioning to the Cloud
PDF
From Cybersecurity to Cyber Resilience
PPTX
Towards a Digital teammate to support sensemaking in Cyber Security teams
PDF
Security Everywhere: A Growth Engine for the Digital Economy
PDF
Cloud security lessons learned and audit
PDF
Content is King - Symantec
PPTX
Why care about GDPR and avoid over $20 million fines, even outside EU ?
PDF
How secure are chat and webconf tools
PDF
Cisco Connect 2018 Singapore - Cybersecurity strategy
PDF
Cisco Connect 2018 Malaysia - Cisco services-guiding your digital transformation
PDF
ATT&CKing Your Adversaries - Operationalizing cyber intelligence in your own ...
PDF
Advantages of privacy by design in IoE
PDF
NUS-ISS Learning Day 2019-Complying with new IoT cyber security guide
PPTX
[Cisco Connect 2018 - Vietnam] Brink sanders cisco connect opening_keynote_vn_v4
PDF
Infographic: 5 Tips for Approaching Customers About Cloud Security
PPTX
CompTIA Instructor Network - CyberFest 2018 Week 1
neXt Curve reThink: What Meltdown & Spectre Mean for IoT Past, Present & Future?
Social Media Bootcamp for LinkedIn
Technology Trends & The Impact for Software Industry
Close the Security Gaps of a Remote Workforce
Top 5 Information Security Lessons Learned from Transitioning to the Cloud
From Cybersecurity to Cyber Resilience
Towards a Digital teammate to support sensemaking in Cyber Security teams
Security Everywhere: A Growth Engine for the Digital Economy
Cloud security lessons learned and audit
Content is King - Symantec
Why care about GDPR and avoid over $20 million fines, even outside EU ?
How secure are chat and webconf tools
Cisco Connect 2018 Singapore - Cybersecurity strategy
Cisco Connect 2018 Malaysia - Cisco services-guiding your digital transformation
ATT&CKing Your Adversaries - Operationalizing cyber intelligence in your own ...
Advantages of privacy by design in IoE
NUS-ISS Learning Day 2019-Complying with new IoT cyber security guide
[Cisco Connect 2018 - Vietnam] Brink sanders cisco connect opening_keynote_vn_v4
Infographic: 5 Tips for Approaching Customers About Cloud Security
CompTIA Instructor Network - CyberFest 2018 Week 1
Ad

Similar to Bootstrapping UX (20)

PDF
Protecting Innovation Through Next Generation Enterprise File Sharing
PDF
DataEd Slides: Approaching Data Management Technologies
PDF
Dominando o 'Dragão Digital' | Encontro de Cios DTI e Sucesu Minas 27/02/2014
PPTX
WatchGuard Corporate Presentation.pptx
PDF
2024-gartner-top-strategic-technology-trends-ebook.pdf
PDF
How To Build A Winning MarTech Stack In 2023
PPTX
Privacy preserving computing and secure multi-party computation ISACA Atlanta
PDF
Summary : 5G adoption plans
PDF
Brands as Services: How the IoT Is Creating New Ecosystems
PDF
TrustArc Webinar - Unlocking AI Potential: Leveraging PIA Processes for Compr...
PDF
Scot Secure 2019 Edinburgh (Day 2)
PPTX
Inflectra Enterprise Agile Planning Briefing for Gartner 2018
PPTX
Proteja sus datos en cualquier servicio Cloud y Web de forma unificada
PPTX
VSD Paris 2018 - Présentation Finale
PPTX
Protecting data privacy in analytics and machine learning ISACA London UK
PPTX
Streaming Processes: Creating a Start-up Within a Big Corporate (Mohammad Sha...
PDF
(CISOPlatform Summit & SACON 2024) Gen AI & Deepfake In Overall Security.pdf
PPTX
Innovation story
PDF
An Identity Crisis at the Center of Every IoT Product
PDF
Security and Data Breach
Protecting Innovation Through Next Generation Enterprise File Sharing
DataEd Slides: Approaching Data Management Technologies
Dominando o 'Dragão Digital' | Encontro de Cios DTI e Sucesu Minas 27/02/2014
WatchGuard Corporate Presentation.pptx
2024-gartner-top-strategic-technology-trends-ebook.pdf
How To Build A Winning MarTech Stack In 2023
Privacy preserving computing and secure multi-party computation ISACA Atlanta
Summary : 5G adoption plans
Brands as Services: How the IoT Is Creating New Ecosystems
TrustArc Webinar - Unlocking AI Potential: Leveraging PIA Processes for Compr...
Scot Secure 2019 Edinburgh (Day 2)
Inflectra Enterprise Agile Planning Briefing for Gartner 2018
Proteja sus datos en cualquier servicio Cloud y Web de forma unificada
VSD Paris 2018 - Présentation Finale
Protecting data privacy in analytics and machine learning ISACA London UK
Streaming Processes: Creating a Start-up Within a Big Corporate (Mohammad Sha...
(CISOPlatform Summit & SACON 2024) Gen AI & Deepfake In Overall Security.pdf
Innovation story
An Identity Crisis at the Center of Every IoT Product
Security and Data Breach
Ad

More from Jim Lane (9)

PDF
ADPList BeMore'24 Unlock Your Team's Potential with Coaching
PDF
Design Systems, Beyond Components: Spacing, Measurement & More
PDF
ux@addthis NoVA UX meetup presentation
PDF
Notion Theory: UX Lessons Learned
PDF
NoVA UX User Testing Workshop July 2015 - Will King
PPTX
Chrissy Ching: How to Land a Job in UX
PPTX
UI Testing Automation - Alex Kalinovsky - CreamTec LLC
PDF
NoVA UX Meetup: Product Testing and Data-informed Design
PPTX
AddThis Web Intents Lightning Talk
ADPList BeMore'24 Unlock Your Team's Potential with Coaching
Design Systems, Beyond Components: Spacing, Measurement & More
ux@addthis NoVA UX meetup presentation
Notion Theory: UX Lessons Learned
NoVA UX User Testing Workshop July 2015 - Will King
Chrissy Ching: How to Land a Job in UX
UI Testing Automation - Alex Kalinovsky - CreamTec LLC
NoVA UX Meetup: Product Testing and Data-informed Design
AddThis Web Intents Lightning Talk

Recently uploaded (20)

PDF
SEVA- Fashion designing-Presentation.pdf
PPTX
Wisp Textiles: Where Comfort Meets Everyday Style
PPTX
DOC-20250430-WA0014._20250714_235747_0000.pptx
PPTX
12. Community Pharmacy and How to organize it
PDF
Emailing DDDX-MBCaEiB.pdf DDD_Europe_2022_Intro_to_Context_Mapping_pdf-165590...
PDF
BRANDBOOK-Presidential Award Scheme-Kenya-2023
PDF
Interior Structure and Construction A1 NGYANQI
PDF
Trusted Executive Protection Services in Ontario — Discreet & Professional.pdf
PDF
YOW2022-BNE-MinimalViableArchitecture.pdf
PPT
WHY_R12 Uaafafafpgradeaffafafafaffff.ppt
PPTX
building Planning Overview for step wise design.pptx
PDF
Urban Design Final Project-Context
PPTX
LITERATURE CASE STUDY DESIGN SEMESTER 5.pptx
PDF
GREEN BUILDING MATERIALS FOR SUISTAINABLE ARCHITECTURE AND BUILDING STUDY
PDF
Quality Control Management for RMG, Level- 4, Certificate
PPTX
YV PROFILE PROJECTS PROFILE PRES. DESIGN
PPTX
CLASS_11_BUSINESS_STUDIES_PPT_CHAPTER_1_Business_Trade_Commerce.pptx
PPTX
Entrepreneur intro, origin, process, method
PPTX
Special finishes, classification and types, explanation
PDF
Phone away, tabs closed: No multitasking
SEVA- Fashion designing-Presentation.pdf
Wisp Textiles: Where Comfort Meets Everyday Style
DOC-20250430-WA0014._20250714_235747_0000.pptx
12. Community Pharmacy and How to organize it
Emailing DDDX-MBCaEiB.pdf DDD_Europe_2022_Intro_to_Context_Mapping_pdf-165590...
BRANDBOOK-Presidential Award Scheme-Kenya-2023
Interior Structure and Construction A1 NGYANQI
Trusted Executive Protection Services in Ontario — Discreet & Professional.pdf
YOW2022-BNE-MinimalViableArchitecture.pdf
WHY_R12 Uaafafafpgradeaffafafafaffff.ppt
building Planning Overview for step wise design.pptx
Urban Design Final Project-Context
LITERATURE CASE STUDY DESIGN SEMESTER 5.pptx
GREEN BUILDING MATERIALS FOR SUISTAINABLE ARCHITECTURE AND BUILDING STUDY
Quality Control Management for RMG, Level- 4, Certificate
YV PROFILE PROJECTS PROFILE PRES. DESIGN
CLASS_11_BUSINESS_STUDIES_PPT_CHAPTER_1_Business_Trade_Commerce.pptx
Entrepreneur intro, origin, process, method
Special finishes, classification and types, explanation
Phone away, tabs closed: No multitasking

Bootstrapping UX

  • 1. Copyright 2018 Virtru Corporation Bootstrapping UX In a Privacy & Security Organization Jim Lane Vice President of User Experience jlane@virtru.com @jimlanenova /in/jimlane
  • 2. Copyright 2019 Virtru CorporationCopyright 2019 Virtru Corporation We help organizations worldwide protect data wherever it’s created or shared so they can collaborate with confidence. In so doing, we foster trust and unlock the power of data. Virtru’s Mission
  • 3. Copyright 2018 Virtru CorporationCopyright 2019 Virtru Corporation 3 DataAge 2025, Seagate https://www.seagate.com/our-story/data-age-2025/ 175 Zettabytes of data world-wide by 2025
  • 4. Copyright 2018 Virtru CorporationCopyright 2019 Virtru Corporation 4 Global Encryption Trends Study, conducted by Ponemon Institute and sponsored by nCipher Security https://www.ncipher.com/2018/global-encryption-trends-study 43% Only 43% of organizations have encryption deployed across the enterprise Part of the problem: usability.
  • 5. Copyright 2018 Virtru CorporationCopyright 2019 Virtru Corporation 5 106M records 540M records 885M records 11.9M records Just a few of the major data breaches this year...
  • 6. Copyright 2018 Virtru CorporationCopyright 2019 Virtru Corporation 6 CHARTER PEOPLE PROCESS TOOLS STRATEGY
  • 7. Copyright 2018 Virtru CorporationCopyright 2019 Virtru Corporation 7 What is the Strategic Priority of UX? 1 2 3 4 5 6 7 8 Hostility towards user experience Teams designing for themselves Small skunk work projects Dedicated UX budget Managed UX team Systematic UCD process Integrated UX & design process User driven organization With executive alignment… Adapted from UX Maturity Model by Nielsen Norman Group
  • 8. Copyright 2018 Virtru CorporationCopyright 2019 Virtru Corporation 8 Tips & Tricks Check out: John Whalen, Brilliant Experience: “Building Buy-In: Internally Positioning UX for Executive Impact” Speak their language. Communicate how design metrics will map to business goals. Be a champion for both your team and the business.
  • 9. Copyright 2018 Virtru CorporationCopyright 2019 Virtru Corporation 9 CHARTER PEOPLE
  • 10. Copyright 2018 Virtru CorporationCopyright 2019 Virtru Corporation 10 Scenario Design Hire specialists, Or generalists?
  • 11. Copyright 2018 Virtru CorporationCopyright 2019 Virtru Corporation 11 Product Family Product Family Product Family Product Family Product designers embedded in teams with product and engineering leads
  • 12. Copyright 2018 Virtru CorporationCopyright 2019 Virtru Corporation 12 Tips & Tricks Invest in your network. Go beyond portfolio – look for process and soft skills. Host an intern program.
  • 13. Copyright 2018 Virtru CorporationCopyright 2019 Virtru Corporation 13 CHARTER PEOPLE PROCESS
  • 14. Copyright 2018 Virtru CorporationCopyright 2019 Virtru Corporation 14 Research Prototype Design Develop Release Iterative Cross-Functional Design Process Check out: “Articulating Design Decisions” by Tom Greever
  • 15. Copyright 2018 Virtru Corporation Iterative Cross-Functional Design Process Sometimes we sprint... Sometimes we sprint ahead... And sometimes we work on larger design problems or concepts outside of the Agile process, and bring it back into sprints later when solutions are better understood
  • 16. Copyright 2018 Virtru CorporationCopyright 2019 Virtru Corporation 16 Tips & Tricks Share early and often. Create opportunities to collaborate. Demonstrate the value of UX quickly. Check out: “Articulating Design Decisions” by Tom Greever
  • 17. Copyright 2018 Virtru Corporation 17 heuristic evaluation noun A usability inspection method for computer software that helps to identify usability problems in the user interface (UI) design. Heuristics -> Observations -> Severity -> Frequency -> Scope -> Prioritization
  • 18. Copyright 2018 Virtru Corporation 18 The system should: 1. provide appropriate feedback 2. act in a way the user expects 3. provide the user control and freedom 4. provide consistency and follows standards 5. not require users to remember information from one part of the interface to another 6. provide flexibility and efficiency of use 7. provide an aesthetic and simple-as-applicable design 8. help users recognize, diagnose, and recover from errors 9. prevent user error in the first place 10. provide appropriate help and documentation Nielsen Norman Group https://www.nngroup.com/articles/ten-usability-heuristics/
  • 19. Copyright 2018 Virtru Corporation 19 The cryptographic API should: 1. Integrate crypto functionality into standard APIs 2. Sufficiently powerful to satisfy both security and non-security requirements 3. Easy to learn, even without cryptographic expertise 4. Don’t break the developer’s paradigm 5. Easy to use, even without documentation 6. Hard to misuse. Incorrect use should lead to visible errors. 7. Defaults should be safe and never ambiguous 8. Provide a testing mode 9. Easy to read and maintain code that uses it/updatability 10. Assist with/handle end-user interaction Adapted from “Developers Are Not The Enemy! The Need for Usable Security APIs” Green & Smith (2016)
  • 20. Copyright 2018 Virtru Corporation 20 Personas Customer Journeys Service Blueprints User Testing
  • 21. Copyright 2018 Virtru Corporation 21 Personas Customer Journeys Service Blueprints User Testing
  • 22. Copyright 2018 Virtru Corporation 22 Personas Customer Journeys Service Blueprints User Testing
  • 23. Copyright 2018 Virtru CorporationCopyright 2019 Virtru Corporation 23 CHARTER PEOPLE PROCESS TOOLS
  • 24. Copyright 2018 Virtru CorporationCopyright 2019 Virtru Corporation 24 + + = Sketch Project Files, Symbol Libraries Abstract Version Control Storybook Javascript UI Components Design System Componentized Prod Design & Dev Virtuoso Design System
  • 25. Copyright 2019 Virtru Corporation Product Design Plug-ins Secure Reader Dashboard Authentication Marketing Headers Footers Navigation Forms Menus Tables Layouts ... 25 Virtuoso Design System Color Shape Typography Icons Buttons Fields Checkboxes Radio Buttons ... Atoms Molecules Organisms
  • 26. Copyright 2018 Virtru CorporationCopyright 2019 Virtru Corporation 26 Tips & Tricks Choose tools that will help your team collaborate, prototype, scale, and pivot quickly. Handoff to engineers is critical!
  • 27. Copyright 2018 Virtru CorporationCopyright 2019 Virtru Corporation 27 CHARTER PEOPLE PROCESS TOOLS STRATEGY
  • 28. Copyright 2018 Virtru Corporation 28 Why Do Customers Protect Data? Use cases: Protect intellectual property from intentional or unintentional misuse Share data securely within an organization, and with partners and service providers Comply with regulations such as HIPAA, CFPB, GLBA Protect data shared outside of the organization Allow migration to Cloud platforms without sacrificing security - back to encryption
  • 29. Copyright 2018 Virtru CorporationCopyright 2019 Virtru Corporation 29 1. Persistent: Protect the data wherever it goes. 2. Share with Anyone: No prior trust relationship/key exchange required. 3. Positive Control: Control who can access data, from where, and for how long. 4. Visibility and Audit: Track and audit where data is shared and accessed. What is Usable Encryption?
  • 30. Copyright 2018 Virtru CorporationCopyright 2019 Virtru Corporation 30 Basic Usability Control & Visibility Scalability Value Can I collaborate successfully, securely, end-to-end, with anyone? Is security there when I need it? Does it grow with my experience & needs? Are my company and I secure? Designing Usable Experiences
  • 31. Copyright 2019 Virtru CorporationCopyright 2019 Virtru Corporation We help organizations worldwide protect data wherever it’s created or shared so they can collaborate with confidence. In so doing, we foster trust and unlock the power of data. Virtru’s Mission
  • 32. Copyright 2018 Virtru Corporation Thank you! Jim Lane Vice President of User Experience jlane@virtru.com @jimlanenova /in/jimlane