We think you have liked this presentation. If you wish to download it, please recommend it to your friends in any social system. Share buttons are a little bit lower. Thank you!
Presentation is loading. Please wait.
Published byAddison Jowers
Modified over 2 years ago
1© Copyright 2010 EMC Corporation. All rights reserved. Stephen Chadwick EMEA Director, Defence & Aerospace
2© Copyright 2010 EMC Corporation. All rights reserved. Who am I? 12 Years RN –Weapons Engineer –2 years RM (Poole) –12 months NATO –2 years procurement 10 Years BT –3 Years MoD NATO Agencies –International business development
3© Copyright 2010 EMC Corporation. All rights reserved. Air Marshal Sir Christopher Coville KCB BA FCIPD FRAeS RAF RAF Fighter Pilot Appointed Knight Commander of the Order of the Bath, 1999 Fellow of the Royal Aeronautical Society Chairman of Westland Helicopters Ltd Council member of the Forces Pension Society Chairman of the Regular Forces Employment Association Director of the Royal Air Force Club Ltd Formally Senior Defence Advisor to British Telecommunications PLC And Senior Defence and Security Advisor to EMC
4© Copyright 2010 EMC Corporation. All rights reserved. Agenda Who are EMC? What do EMC do? What are the challenges in Defence and Intelligence? How can EMC help?
5© Copyright 2010 EMC Corporation. All rights reserved. Who are EMC? EMC is a technology hardware and software manufacturer with a total focus on information management. Enabling corporations and organisations to maximize their competitive advantage or business efficiency by leveraging value from the information they have in the organisation. Stephen Chadwick - Creating a Culturally Acceptable Virtual Team – Sept 2010
6© Copyright 2010 EMC Corporation. All rights reserved. The Power of Innovation Long tradition of innovation Sustained R & D investment: 11-12% of revenues Billions invested in strategic acquisitions EMC Innovation Network Sustained technology and market leadership >8,000 technical R & D employees Nearly 3,000 approved or pending patents 6 © Copyright 2008 EMC Corporation. All rights reserved.
7© Copyright 2010 EMC Corporation. All rights reserved. Roadmap to Effective eGovernment
8© Copyright 2010 EMC Corporation. All rights reserved. The BIG themes in Defence and Aerospace: Cyber Defence Information Security and Forensic Data Tracking Cloud/Network Centric Computing Current Conflicts, Counter Terrorism, Counter Piracy etc –What Armed Forces deliver – Example is the Top Level Messages – UK MoD Money –Economic climate has meant a decrease in ALL public sector spending but defence has been hard hit. Collaboration –Working effectively, efficiently and with external partners Personnel & Training –Recruiting, training, maintaining the best people possible …………And Where EMC COULD BE relevant!!!! What are the big issues…..
9© Copyright 2010 EMC Corporation. All rights reserved. What are the Challenges and Issues in this Market? Harnessing Information in a Coalition Environment. –Processing, Managing and Sharing – Instantly! –Information for decision making UAV, Reaper –24x7x365 over 100 hours per day Mission control in the Gulf Flight control in California Information exploited in the UK Carries out task in Afghanistan Connection, not just collection Information no longer just an enabler, it is a key capability Vice Admiral Paul Lambert, RN
10© Copyright 2010 EMC Corporation. All rights reserved. Why EMC in Defence, Security & Aerospace? Major General Michael Flynn, ISAF –Personnel and HR Real time intelligence and decision making –Intelligence and Information Needs to be processed, managed and shared instantly Access to the Cloud Knowledge as power is an old adage –Enabling Capabilities To work as a coalition technology needs to be standardised From Unrestricted through to the highest levels Industry standards and protocols –Mission Assurance –C20th warfare was fire and manoeuvre –C21st warfare is detection, precision and understanding Solutions that speed up sharing of information
11© Copyright 2010 EMC Corporation. All rights reserved. Why EMC in Defence, Security & Aerospace? Information Growth Time Brigadier Andy Bristow - Information efficiency Intuitive Use of Technology to exploit all its capabilities The Facts
12© Copyright 2010 EMC Corporation. All rights reserved. UKs HMRC Challenges: How best to modernize their IT infrastructure to make it more flexible Manage the growth of information Expedite their time to market for deploying new services Protection of citizen information Insure continuity of operations EMC Solutions: EMC Consulting services that included planning, design, implementation, residencies and support EMC Information Infrastructure ( DMX, Centera ) Back-Up that includes over 800 sites Virtualization ( VMware ) and consolidation eRoom for collaboration activities RSA Security Benefits: Achieved operational efficiency due to modernization Faster deployment of new services due to simplicity and consolidation of the physical environment HMRC was able to develop and deploy a comprehensive new storage infrastructure Increased communications and collaboration throughout the organization via Eroom.
13© Copyright 2010 EMC Corporation. All rights reserved. US Marines Corps Customer Profile Challenge –Enable mobile combat units and central commands to securely share information –Quickly enable continuous on-demand access to mission-critical applications for all levels of users regardless of location Solution –VMware Infrastructure –VMware ACE and Services Benefits –Meet Aggressive server consolidation goal –Increase in availability, security, continuity, and sustainability of the enterprise –Alignment with IT Strategy Deployment lays the foundation for a long- term virtualization strategy information. VMware ACE for Desktop Virtualization Bringing Flexibility, Mobility and Security to the Desktop Provides complete portability through secure, virtualized desktops that can be carried on a USB thumb drive and deployed on any PC Enables mobile combat units to access computing environments on the fly and from any location
14© Copyright 2010 EMC Corporation. All rights reserved. The Information Security Discussion + Perimeter-Centric Security Goal: Build and protect perimeters Tools: VPNs, firewalls, IDS/IPS, anti-malware, endpoint protection Information-Centric Security Goal: Manage and protect information Tools: Identity and access management, data encryption, rights management, anti-fraud protection, security information management Evolving from Perimeter-Centric to Information-Centric
15© Copyright 2010 EMC Corporation. All rights reserved. Data Security in the Public Sector
16© Copyright 2010 EMC Corporation. All rights reserved. Monitoring for Security and Compliance RSA enVision Router logs IDS/IDP logs VPN logs Firewall logs Switch logs Windows logs Client & file server logs Wireless access logs Windows domain logins Oracle Financial Logs San File Access Logs VLAN Access & Control logs DHCP logs Linux, Unix, Windows OS logs Mainframe logs Database Logs Web server activity logs Content management logs Web cache & proxy logs VA Scan logs Unauthorized Service Detection IP Leakage Configuration Control Lockdown enforcement False Positive Reduction Access Control Enforcement Privileged User Management Malicious Code Detection Spyware detection Real-Time Monitoring Troubleshooting User Monitoring SLA Monitoring
17© Copyright 2010 EMC Corporation. All rights reserved. Centralised Approach to Policy Management The infrastructure to manage key security services centrally Services to Help you Manage Risk Services to help you mature your processes Built-in Versus Bolted-on Security Embedding controls directly into the infrastructure Visibility Across Identity, Infrastructure and Information A common platform to monitor, audit and report across the 3 Is Industry Leadership & Market-Leading Products Authentication, Data Loss Prevention, Web Fraud Protection, SIEM Built-in Expertise …about regulations, threats and best practices. Built by teams of experts. Why RSA?
18© Copyright 2010 EMC Corporation. All rights reserved. THANK YOU
19© Copyright 2010 EMC Corporation. All rights reserved. What does a fraudster know https://passports.ips.gov.uk/epa1r1a/index.aspx Title=Mr Forenames=Terry John ApplicationType=First BornInUK=true DateOfBirth-Day=13 DateOfBirth-Month=8 DateOfBirth-Year=1986 ResidentInUK=true Surname=Finlay AddressPostcode=KY5 0XZ AddressLine1=35 Sauchie Street AddressLine2=Kinglassie AddressTown=Lochgelly AddressCounty=Fife AddressCountry=Scotland DaytimeTelephone= EveningTelephone= CountryOfBirth=GB UKCountryOfBirth=Scotland TownOfBirth=Kirkcaldy Gender=Male MothersFullName=Beavis MothersDateOfBirth-Day=12 MothersDateOfBirth-Month=11 MothersDateOfBirth-Year=1965 MothersTownOfBirth=Kirkcaldy MothersCountryOfBirth=GB MothersNationality=British FathersFullName=Finlay john dand FathersDateOfBirth-Day=13 FathersDateOfBirth-Month=8 FathersDateOfBirth-Year=1965 FathersTownOfBirth=Kirkcaldy FathersCountryOfBirth=GB FathersNationality=British FathersPassportNumber= FathersPassportDateOfIssue-Day=12 FathersPassportDateOfIssue-Month=9 FathersPassportDateOfIssue-Year=2005
20© Copyright 2010 EMC Corporation. All rights reserved. What does a fraudster know https://passports.ips.gov.uk/epa1r1a/index.aspx ApplicationType=Renewal BornInUK=true DateOfBirth-Day=1 DateOfBirth-Month=5 DateOfBirth-Year=1984 ResidentInUK=true PreviousPassport=true Title=Mr Forenames=Christopher Surname=Murphy AddressPostcode=DE6 1RP AddressLine1=6 Atlow Brow AddressTown=Ashbourne AddressCounty=Derbyshire AddressCountry=UK DaytimeTelephone= CountryOfBirth=GB UKCountryOfBirth=England TownOfBirth=Altrincham Gender=Male NumberOfPreviousPassports=1 PassportNumber1=
21© Copyright 2010 EMC Corporation. All rights reserved. Check the forums for the latest Trojan review Easy to Use Downside: control panel in Russian Customer service was outstanding Product 9/10 Service 9/10
22© Copyright 2010 EMC Corporation. All rights reserved. What do you want to buy? Malware Price List –Torpig/SinowalNot for sale individually –Silent BankerNot for sale individually –Zeus Trojan Kit$3000 –Limbo Trojan Kit$350
23© Copyright 2010 EMC Corporation. All rights reserved. Its ok... Weve got Anti Virus! Detection Rate as a % of the total variants
24© Copyright 2010 EMC Corporation. All rights reserved. Strength of Service: The RSA AFCC T h e i n d u s t r y s l a r g e s t, a n d m o s t e x p e r i e n c e d A n t i - F r a u d t e a m H i g h l y t r a i n e d, m u l t i - l i n g u a l f r a u d a n a l y s t s, m a n y b o a s t i n g y e a r s o f c o m m e r c i a l a n d m i l i t a r y i n t e l l i g e n c e e x p e r i e n c e S t r o n g, d i r e c t r e l a t i o n s h i p s w i t h d o z e n s o f w o r l d w i d e I S P s, C E R T S, a n d l a w e n f o r c e m e n t A c t i v i t i e s p e r f o r m e d i n p a r a l l e l i n c l u d e : –M o n i t o r i n g a n d d e t e c t i o n –A l e r t s a n d r e p o r t i n g –B l o c k i n g –C o u n t e r m e a s u r e s –S h u t d o w n –F o r e n s i c s –A n t i - P h a r m i n g
1 Copyright © 2010, Oracle. All rights reserved. Cyber Security / Cyber Warfare Hype or underestimated? Bert Oltmans Director Defence, Justice and Public.
1 Unified Communications and Collaboration Campaign MM TI-BDM Deck User Guidance Purpose of this deck: –Show how Microsoft ® Unified Communications and.
Mycroft & CA Technologies Our Winning Strategy CA Technologies | November 2011.
Adding Value to Your e-business with IBM Tivoli Performance & Availability Solutions Manage Your Technology Master Your Business Customer Name Speaker.
© Copyright Ovum. All rights reserved. Ovum is a subsidiary of Informa plc. 1 Addressing “The BYOD Gap” Richard Absalom, Analyst, Consumer Impact Technology.
1 Services. 2 Agenda Overview –Managing the Transitions of The Networked Transaction Environment Blackboard Consulting –Who We Are and What We Do Blackboard.
IPMA Executive Summary - October 31, 2002 IPMA Executive Summit The Enterprise Architecture of the HR/Payroll Systems October 31, 2002 FINAL NOTES AND.
Notes accompany this presentation. Please select Notes Page view. These materials can be reproduced only with written approval from Gartner. Such approvals.
January 17, 2014 Aaron Stuart Product Manager Research In Motion Wireless Applications for the Enterprise: Taking Your BlackBerry Deployment.
1 Services. 2 Agenda Overview –Managing the Transitions of The Networked Learning Environment Blackboard Consulting –Who We Are and What We Do Blackboard.
How Microsoft does end-to-end IT Security Bruce Cowper Senior Program Manager, Security Initiative Microsoft Canada.
Managing IT Budgets in Uncertain Economic Times: IT Optimization.
Copyright © 2011 Pearson Education, Inc. publishing as Prentice Hall 14-1 MANAGING INFORMATION TECHNOLOGY 7 th EDITION CHAPTER 14 INFORMATION SECURITY.
Sophos Security and Data Protection Overview by: Mun Foong, Che – Channel Manager.
Trends in Endpoint Security by Richard Lau Trends in Endpoint Security by Richard Lau 29 September 2005.
Securing your move to VoIP… Luis Eguiagaray, Managing Director Professional Services EMEA Lucent Worldwide Services 15 November 2005, Lisbon.
ID#: S Title: Safe Hands - What Do You Look For In a System Implementer How do customers select their partners? We will look at the importance of.
new ways of working enabled #MWLG14.
Copyright © 2005 SOA Software, Inc. All Rights Reserved. Specifications Subject to Change Without Notice. Overcoming the SOA Network Fallacy Roberto Medrano.
1 © Copyright 2010 EMC Corporation. All rights reserved. EMC Avamar Never back up the same data twice.
1 Symantec Endpoint Protection 12.1 Unrivaled Security. Blazing Performance. Built for Virtual Environments. May 2011.
© 2016 SlidePlayer.com Inc. All rights reserved.