Presentation is loading. Please wait.

Presentation is loading. Please wait.

Delivering Information-centric Security Carol Clark Senior Manager, EMEA Market Development.

Similar presentations


Presentation on theme: "Delivering Information-centric Security Carol Clark Senior Manager, EMEA Market Development."— Presentation transcript:

1 Delivering Information-centric Security Carol Clark Senior Manager, EMEA Market Development

2 EMC: Information Infrastructure Forward thinking IT organizations are transforming their infrastructures to maximize the value of information Information Infrastructures help organizations store information efficiently, protect it from loss or misuse, optimize IT operations and leverage information for new business value RSA, The Security Division of EMC was launched in Q4 ’06 to help customers accelerate their business with confidence Systems DataPeople Transactions Information Infrastructure store | protect | optimize | leverage

3 A Crisis of Confidence: Is Data Safe? Source: Enterprise Strategy Group March 2006 18% 82% Data confidentiality and integrity are the top-of-mind concerns  Fear of data loss/privacy breach –Protecting sensitive data from unauthorized access and use Significant financial implications  Fear of audit and non-compliance –Compliance with internal and external mandates on data protection Significant legal implications … fewer than one in five organizations feel all their data is adequately protected Despite massive investment in security products and services… Loss of customer confidence and reputation damage

4 Increasing Enterprise Focus on Data Security Increased Monetary Impact Greater Regulatory Scrutiny Rise in Disclosures Increased focus on Data Security

5 From the Storage of Data to the Management of… Information

6 CustomersPartnersEmployees Applications Infrastructure Information POSphotosdirectoriesVoIPreports whitepapers modelsimagesdesigns XML presentations analysisresearch manuals imagesmodelsquotesemail resumes SOW inventory video orders Web brochures payroll balancesquotesforecasts notes memos proposalsillustrationsreports SOPs warrantiesarticlesmanuals plans models tests reports RFID whitepapers specs images billing contracts The Information Trap Volume of Data 75% Annual Increase From Gigabytes to Petabytes in just ten years Complexity of Operations Hundreds of applications and formats Intricate servers and storage networks New rules, regulations and risks

7 CustomersPartnersEmployees Applications Infrastructure Your Next Opportunity presentations proposals orders research specs models Your Next Innovation The Greatest Asset… can be a Significant Liability images Your Next Breach email memos contracts The Greatest Asset…

8 Information POS photos directories reports images XML images email resumes inventory proposals  Users save everything - manage nothing –90% of unstructured information is unmanaged –Low value information clogs the infrastructure  Information is under constant attack –Unauthorized Access to Information and Intellectual Property Theft are the only growing categories and now 50% larger than Virus  High value information is underutilized and unprotected –70% of existing unstructured info is re-created from scratch –$1.6 million per discovery  IT struggles to align with the business –80% of IT budget consumed by operations and maintenance Information Challenges

9 Our Inability to Manage Information is the Vulnerability The Hard Reality: Organizations cannot secure what they do not manage Create Classify Collaborate Transform Version Publish ArchiveRetire Re-archive Query The Lifecycle of Enterprise Information

10 Services and Partners Information Lifecycle Management Virtualization Resource Mgmt Intelligent Information Mgmt Software Archiving Software Data Mobility Software Protection Software Content Management Software Tiered Storage EMC’s Information Infrastructure Platform

11 Services and Partners Information Lifecycle Management Virtualization Resource Mgmt Intelligent Information Mgmt Software Archiving Software Data Mobility Software Protection Software Content Management Software Tiered Storage EMC’s Information Infrastructure Platform Where’s Security?

12 secure data secure access Introducing Information-centric Security customers partners employees security information management secure enterprise data Preserve the confidentiality and integrity of critical data wherever it resides secure customer access Offer self-service channels, prevent fraud, and enhance consumer confidence secure partner access Open internal systems to trusted partners secure employee access Enable secure, anytime, anywhere access to corporate resources manage security information Comply with security policy and regulations

13 Secure Data Halifax Bank of Scotland reported an 80% reduction in fraud after deploying RSA technology. Secure Customer Access Secure customer self-service channels Provide risk-appropriate authentication options for customers on web or phone Provide secure access to web portals and applications through role-based authorization Monitor online transactions, detect and flag high-risk activities and investigate to reduce fraud Detect and shutdown Phishing and Pharming attacks Secure Access customers RSA Capabilities: Adaptive Authentication | Fraud Protection | Transaction Monitoring | Web Access Management Security Information Management

14 Secure Data Secure Employee and Partner Access Securely work with corporate resources anywhere, anytime; and simplify access to internal network resources Authenticate authorized remote users to corporate resources by securely extending the reach of Web-based systems Securely leverage the value of Web- based systems for partner ecosystems Authenticate authorized partners to corporate resources and leverage trusted identities across multiple corporate domains Provide secure access to web portals and applications through role-based authorization and share trusted identities across partner domains Secure Access employees Over 20,000 organizations worldwide use RSA SecurID® authentication to protect corporate data and resources RSA Capabilities : Strong Authentication | Enterprise SSO | Web Access Mgmt. | Card Mgmt. | Digital Certs. Security Information Management

15 More than 1,000 companies worldwide embed RSA BSAFE encryption software in their applications. Secure Data Secure Access Security Information Management RSA Capabilities: Classification | Encryption | Key Mgmt. | Rights Mgmt. | Advisory & Implementation Services Secure Data Protect critical structured and unstructured data wherever it resides. Classify sensitive information and develop appropriate protection policies and enforcement strategies Encrypt sensitive data at the application level, in databases, on backup tapes and storage systems Manage the lifecycle of encryption keys across the enterprise

16 Secure AccessSecure Data Manage Security Information Validate compliance with security policy and regulations Efficiently collect and store audit logs from any IP device Analyze and manage security events, perform real-time alerting and detailed forensic analysis Analyze data and produce targeted compliance reports for regulations and internal policy Integrate solution with Enterprise Storage for effective lifecycle management of log data Security Information Management “RSA enVision® allows us to do things we simply couldn’t do before... the ROI has been huge.” Source: Cole Taylor Bank RSA Capabilities: Security Information and Event Mgmt. (SIEM) | Enterprise Storage | Implementation Services

17 Flexible Solutions for a Variety of Needs secure customer, partner and employee access Technology Solutions: Secure Consumer Identities and Access Secure Enterprise Access Secure Remote Access Web Access Management manage security information Technology Solutions: Compliance & Security Information Management assessment, planning and implementation services Offerings include: Classification for Information Security Design and Implementation for Security Information Mgmt. Design and Implementation for Storage Encryption secure data Technology Solutions: Secure Enterprise Data

18 Availability Storage Security Virtualization Intelligent Information Mgmt Intelligent Information Mgmt Enterprise Content Mgmt Enterprise Content Mgmt Archive Information Infrastructure Information Infrastructure Store Protect Optimize Leverage Resource Mgmt Resource Mgmt Your Information Infrastructure

19 Information-centric Security May 2007


Download ppt "Delivering Information-centric Security Carol Clark Senior Manager, EMEA Market Development."

Similar presentations


Ads by Google