We think you have liked this presentation. If you wish to download it, please recommend it to your friends in any social system. Share buttons are a little bit lower. Thank you!
Presentation is loading. Please wait.
Published byAddison Jowers
Modified over 2 years ago
1© Copyright 2010 EMC Corporation. All rights reserved. Stephen Chadwick EMEA Director, Defence & Aerospace
2© Copyright 2010 EMC Corporation. All rights reserved. Who am I? 12 Years RN –Weapons Engineer –2 years RM (Poole) –12 months NATO –2 years procurement 10 Years BT –3 Years MoD NATO Agencies –International business development
3© Copyright 2010 EMC Corporation. All rights reserved. Air Marshal Sir Christopher Coville KCB BA FCIPD FRAeS RAF RAF Fighter Pilot Appointed Knight Commander of the Order of the Bath, 1999 Fellow of the Royal Aeronautical Society Chairman of Westland Helicopters Ltd Council member of the Forces Pension Society Chairman of the Regular Forces Employment Association Director of the Royal Air Force Club Ltd Formally Senior Defence Advisor to British Telecommunications PLC And Senior Defence and Security Advisor to EMC
4© Copyright 2010 EMC Corporation. All rights reserved. Agenda Who are EMC? What do EMC do? What are the challenges in Defence and Intelligence? How can EMC help?
5© Copyright 2010 EMC Corporation. All rights reserved. Who are EMC? EMC is a technology hardware and software manufacturer with a total focus on information management. Enabling corporations and organisations to maximize their competitive advantage or business efficiency by leveraging value from the information they have in the organisation. Stephen Chadwick - Creating a Culturally Acceptable Virtual Team – Sept 2010
6© Copyright 2010 EMC Corporation. All rights reserved. The Power of Innovation Long tradition of innovation Sustained R & D investment: 11-12% of revenues Billions invested in strategic acquisitions EMC Innovation Network Sustained technology and market leadership >8,000 technical R & D employees Nearly 3,000 approved or pending patents 6 © Copyright 2008 EMC Corporation. All rights reserved.
7© Copyright 2010 EMC Corporation. All rights reserved. Roadmap to Effective eGovernment
8© Copyright 2010 EMC Corporation. All rights reserved. The BIG themes in Defence and Aerospace: Cyber Defence Information Security and Forensic Data Tracking Cloud/Network Centric Computing Current Conflicts, Counter Terrorism, Counter Piracy etc –What Armed Forces deliver – Example is the Top Level Messages – UK MoD Money –Economic climate has meant a decrease in ALL public sector spending but defence has been hard hit. Collaboration –Working effectively, efficiently and with external partners Personnel & Training –Recruiting, training, maintaining the best people possible …………And Where EMC COULD BE relevant!!!! What are the big issues…..
9© Copyright 2010 EMC Corporation. All rights reserved. What are the Challenges and Issues in this Market? Harnessing Information in a Coalition Environment. –Processing, Managing and Sharing – Instantly! –Information for decision making UAV, Reaper –24x7x365 over 100 hours per day Mission control in the Gulf Flight control in California Information exploited in the UK Carries out task in Afghanistan Connection, not just collection Information no longer just an enabler, it is a key capability Vice Admiral Paul Lambert, RN
10© Copyright 2010 EMC Corporation. All rights reserved. Why EMC in Defence, Security & Aerospace? Major General Michael Flynn, ISAF –Personnel and HR Real time intelligence and decision making –Intelligence and Information Needs to be processed, managed and shared instantly Access to the Cloud Knowledge as power is an old adage –Enabling Capabilities To work as a coalition technology needs to be standardised From Unrestricted through to the highest levels Industry standards and protocols –Mission Assurance –C20th warfare was fire and manoeuvre –C21st warfare is detection, precision and understanding Solutions that speed up sharing of information
11© Copyright 2010 EMC Corporation. All rights reserved. Why EMC in Defence, Security & Aerospace? Information Growth Time Brigadier Andy Bristow - Information efficiency Intuitive Use of Technology to exploit all its capabilities The Facts
12© Copyright 2010 EMC Corporation. All rights reserved. UKs HMRC Challenges: How best to modernize their IT infrastructure to make it more flexible Manage the growth of information Expedite their time to market for deploying new services Protection of citizen information Insure continuity of operations EMC Solutions: EMC Consulting services that included planning, design, implementation, residencies and support EMC Information Infrastructure ( DMX, Centera ) Back-Up that includes over 800 sites Virtualization ( VMware ) and consolidation eRoom for collaboration activities RSA Security Benefits: Achieved operational efficiency due to modernization Faster deployment of new services due to simplicity and consolidation of the physical environment HMRC was able to develop and deploy a comprehensive new storage infrastructure Increased communications and collaboration throughout the organization via Eroom.
13© Copyright 2010 EMC Corporation. All rights reserved. US Marines Corps Customer Profile Challenge –Enable mobile combat units and central commands to securely share information –Quickly enable continuous on-demand access to mission-critical applications for all levels of users regardless of location Solution –VMware Infrastructure –VMware ACE and Services Benefits –Meet Aggressive server consolidation goal –Increase in availability, security, continuity, and sustainability of the enterprise –Alignment with IT Strategy Deployment lays the foundation for a long- term virtualization strategy information. VMware ACE for Desktop Virtualization Bringing Flexibility, Mobility and Security to the Desktop Provides complete portability through secure, virtualized desktops that can be carried on a USB thumb drive and deployed on any PC Enables mobile combat units to access computing environments on the fly and from any location
14© Copyright 2010 EMC Corporation. All rights reserved. The Information Security Discussion + Perimeter-Centric Security Goal: Build and protect perimeters Tools: VPNs, firewalls, IDS/IPS, anti-malware, endpoint protection Information-Centric Security Goal: Manage and protect information Tools: Identity and access management, data encryption, rights management, anti-fraud protection, security information management Evolving from Perimeter-Centric to Information-Centric
15© Copyright 2010 EMC Corporation. All rights reserved. Data Security in the Public Sector
16© Copyright 2010 EMC Corporation. All rights reserved. Monitoring for Security and Compliance RSA enVision Router logs IDS/IDP logs VPN logs Firewall logs Switch logs Windows logs Client & file server logs Wireless access logs Windows domain logins Oracle Financial Logs San File Access Logs VLAN Access & Control logs DHCP logs Linux, Unix, Windows OS logs Mainframe logs Database Logs Web server activity logs Content management logs Web cache & proxy logs VA Scan logs Unauthorized Service Detection IP Leakage Configuration Control Lockdown enforcement False Positive Reduction Access Control Enforcement Privileged User Management Malicious Code Detection Spyware detection Real-Time Monitoring Troubleshooting User Monitoring SLA Monitoring
17© Copyright 2010 EMC Corporation. All rights reserved. Centralised Approach to Policy Management The infrastructure to manage key security services centrally Services to Help you Manage Risk Services to help you mature your processes Built-in Versus Bolted-on Security Embedding controls directly into the infrastructure Visibility Across Identity, Infrastructure and Information A common platform to monitor, audit and report across the 3 Is Industry Leadership & Market-Leading Products Authentication, Data Loss Prevention, Web Fraud Protection, SIEM Built-in Expertise …about regulations, threats and best practices. Built by teams of experts. Why RSA?
18© Copyright 2010 EMC Corporation. All rights reserved. THANK YOU
19© Copyright 2010 EMC Corporation. All rights reserved. What does a fraudster know https://passports.ips.gov.uk/epa1r1a/index.aspx Title=Mr Forenames=Terry John ApplicationType=First BornInUK=true DateOfBirth-Day=13 DateOfBirth-Month=8 DateOfBirth-Year=1986 ResidentInUK=true Surname=Finlay AddressPostcode=KY5 0XZ AddressLine1=35 Sauchie Street AddressLine2=Kinglassie AddressTown=Lochgelly AddressCounty=Fife AddressCountry=Scotland DaytimeTelephone= EveningTelephone= CountryOfBirth=GB UKCountryOfBirth=Scotland TownOfBirth=Kirkcaldy Gender=Male MothersFullName=Beavis MothersDateOfBirth-Day=12 MothersDateOfBirth-Month=11 MothersDateOfBirth-Year=1965 MothersTownOfBirth=Kirkcaldy MothersCountryOfBirth=GB MothersNationality=British FathersFullName=Finlay john dand FathersDateOfBirth-Day=13 FathersDateOfBirth-Month=8 FathersDateOfBirth-Year=1965 FathersTownOfBirth=Kirkcaldy FathersCountryOfBirth=GB FathersNationality=British FathersPassportNumber= FathersPassportDateOfIssue-Day=12 FathersPassportDateOfIssue-Month=9 FathersPassportDateOfIssue-Year=2005
20© Copyright 2010 EMC Corporation. All rights reserved. What does a fraudster know https://passports.ips.gov.uk/epa1r1a/index.aspx ApplicationType=Renewal BornInUK=true DateOfBirth-Day=1 DateOfBirth-Month=5 DateOfBirth-Year=1984 ResidentInUK=true PreviousPassport=true Title=Mr Forenames=Christopher Surname=Murphy AddressPostcode=DE6 1RP AddressLine1=6 Atlow Brow AddressTown=Ashbourne AddressCounty=Derbyshire AddressCountry=UK DaytimeTelephone= CountryOfBirth=GB UKCountryOfBirth=England TownOfBirth=Altrincham Gender=Male NumberOfPreviousPassports=1 PassportNumber1=
21© Copyright 2010 EMC Corporation. All rights reserved. Check the forums for the latest Trojan review Easy to Use Downside: control panel in Russian Customer service was outstanding Product 9/10 Service 9/10
22© Copyright 2010 EMC Corporation. All rights reserved. What do you want to buy? Malware Price List –Torpig/SinowalNot for sale individually –Silent BankerNot for sale individually –Zeus Trojan Kit$3000 –Limbo Trojan Kit$350
23© Copyright 2010 EMC Corporation. All rights reserved. Its ok... Weve got Anti Virus! Detection Rate as a % of the total variants
24© Copyright 2010 EMC Corporation. All rights reserved. Strength of Service: The RSA AFCC T h e i n d u s t r y s l a r g e s t, a n d m o s t e x p e r i e n c e d A n t i - F r a u d t e a m H i g h l y t r a i n e d, m u l t i - l i n g u a l f r a u d a n a l y s t s, m a n y b o a s t i n g y e a r s o f c o m m e r c i a l a n d m i l i t a r y i n t e l l i g e n c e e x p e r i e n c e S t r o n g, d i r e c t r e l a t i o n s h i p s w i t h d o z e n s o f w o r l d w i d e I S P s, C E R T S, a n d l a w e n f o r c e m e n t A c t i v i t i e s p e r f o r m e d i n p a r a l l e l i n c l u d e : –M o n i t o r i n g a n d d e t e c t i o n –A l e r t s a n d r e p o r t i n g –B l o c k i n g –C o u n t e r m e a s u r e s –S h u t d o w n –F o r e n s i c s –A n t i - P h a r m i n g
2 Industry trends and challenges Windows Server 2012: Modern workstyle, enabled Access from virtually anywhere, any device Full Windows experience.
Symantec Vision and Strategy for the Information-Centric Enterprise Muhamed Bavçiç Senior Technology Consultant SEE.
Polycom Unified Collaboration for IBM Lotus Sametime and IBM Lotus Notes January 2010.
1-1 Human Resource Management Gaining a Competitive Advantage Chapter 16 Strategically Managing the HRM Function McGraw-Hill/Irwin Copyright © 2008 by.
Understanding the benefits and the risks. Presented by Corey Nachreiner, CISSP BYOD - Bring Your Own Device or Bring Your Own Danger?
Infrastructure for the People-Ready Business. Presentation Outline POINT B: Pro-actively work with your Account manager to go thru the discovery process.
Chapter 14 Intranets & Extranets. Awad –Electronic Commerce 1/e © 2002 Prentice Hall 2 OBJECTIVES Introduction Technical Infrastructure Planning an Intranet.
©2010 Check Point Software Technologies Ltd. | [Restricted] ONLY for designated groups and individuals Visions for 2010 Anna Russell & Andy Clark.
Dell Connected Security Solutions Simplify & unify.
1. Windows Vista Enterprise And Mid-Market User Scenarios 2. Customer Profiling And Segmentation Tools 3. Windows Vista Business Value And Infrastructure.
Mid-market server campaign – thru partner presentation: Slide for presenter only: do not show Speaker: Partner Title of Presentation: Giving you the power.
1© Copyright 2013 EMC Corporation. All rights reserved. EMC STORAGE ANALYTICS With VNX and VMAX Support.
| © 2013 Axway | All rights reserved. 1 Govern the Flow of Data: Moving from Chaos to Control Steve Jordan Director, Industry Marketing.
10-1 McGraw-Hill/Irwin Copyright © 2010 by The McGraw-Hill Companies, Inc. All rights reserved.
Fujitsu Siemens Computers at a glance Georgios Nikolopoulos Sales Manager November 2008.
©2013 Check Point Software Technologies Ltd. | [Unrestricted] For everyone Best Practices to Secure the Mobile Enterprise Macy Torrey
Carrie, living with Crohns disease Mobile Devices & The Information Professional – Where Do I fit In? PHTD Spring Meeting, Baltimore March 18 th -20 th.
Copyright Critical Software S.A All Rights Reserved. COTS based approach for the Multilevel Security Problem Bernardo Patrão.
SharePoint ShortUrl and SharePoint Document Merge SharePoint and Office 365 Add-ins to Increase Productivity and Improve User Adoption! OFFICE 365 APP.
© Prentice Hall CHAPTER 15 Managing the IS Function.
1 Strategic Meetings Management 101 Lynda Garvey. SMMC Strategic Meetings Consultant.
| Copyright © 2009 Juniper Networks, Inc. | 1 WX Client Rajoo Nagar PLM, WABU.
© 2011 IBM Corporation IBM Security Services Smarter Security Enabling Growth and Innovation Obbe Knoop – Security Services Leader Pacific.
© 2013 IBM Corporation IBMs Transformation to a Services Company and the Growth of Digital Trade Michael DiPaula-Coyle IBM Governmental Programs.
Palo Alto Networks Jay Flanyak Channel Business Manager
1 Managed Security. 2 Managed Security provides a comprehensive suite of security services to manage and protect your network assets –Managed Firewall.
1 Functional Strategy – IS & IT Geoff Leese November 2006, revised July 2007, September 2008, August 2009.
RSA Approach for Securing the Cloud Bernard Montel Directeur Technique RSA France Juillet 2010.
© BT PLC 2005 ‘Risk-based’ Approach to Managing Infrastructure a ‘Commercial Prospective’ Malcolm Page BT UK AFCEA Lisbon 2005.
CLOSE THE SECURITY GAP WITH IT SOLUTIONS FROM COMPUTACENTER AND CISCO AUGUST 2014.
Get Full Protection on Microsoft Azure with Symantec™ Endpoint Protection 12.1 MICROSOFT AZURE ISV PROFILE: SYMANTEC Symantec™ Endpoint Protection is an.
‘Changing environment – changing security’ - Cyber-threat challenges today – Budapest, September 17-18, Industry and the fight against cybercrime.
1 World Meteorological Organization Working together in weather, climate and water Sixteenth World Meteorological Congress Information Technology Support.
Solutions & Services to ‘Multiply your Business Performance’ 2013.
Check Point Virtual Gateway Protects Microsoft Azure Cloud Infrastructure with a Full Range of Security Defenses and Threat Prevention Solutions MICROSOFT.
1© Copyright 2012 EMC Corporation. All rights reserved. Next Generation Authentication Bring Your Own security impact Tim Dumas – Technology Consultant.
Government Connect Connected Government Framework Nigel Tilley, Industry Strategy Consultant, Microsoft.
1 The New Security Blueprint : Challenges & Opportunities Ajay Goel, Managing Director, Symantec India & SAARC Sept 1, 2011.
© 2009 IBM Corporation Maximize Cost Savings While Improving Visibility Into Lines of Business Wendy Tam, CDC Product Marketing Manager
1 IT Analytics for Symantec Endpoint Protection Presenter’s Name Here Presenter’s Title Here.
MANAGEMENT RICHARD L. DAFT. Designing Adaptive Organizations CHAPTER 9.
CTS Strategic Roadmap Walkthrough, v1.2 Dan Mercer.
LIMS (Location Information Management System) is the Smart Claim Solution for Motor Insurers, Built on the Powerful Microsoft Azure Platform MICROSOFT.
Built atop SharePoint Online, WorkPoint 365 Offers a Project and Case Management Solution to Boost Business Productivity and Deliver Governance OFFICE.
Blue Coat Systems Securing and accelerating the Remote office Matt Bennett.
Copyright © 2012 Accenture & Symantec. All rights reserved. This Sales Accelerator presentation is intended to provide sales teams fast facts on solutions.
© 2017 SlidePlayer.com Inc. All rights reserved.