Storage Security: The Next Frontier Jim Anderson Vice President, Marketing Networking and Storage Products Group May 2008.

Slides:



Advertisements
Similar presentations
2  Industry trends and challenges  Windows Server 2012: Modern workstyle, enabled  Access from virtually anywhere, any device  Full Windows experience.
Advertisements

© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 1: Exploring the Network Network Basics.
Enterprise Data Solutions A Better Network. A Better ROI. Martin Matthews Technical Sales Engineer.
Dell Compellent and SafeNet KeySecure
1 Disk Based Disaster Recovery & Data Replication Solutions Gavin Cole Storage Consultant SEE.
16254_08_2002 © 2002, Cisco Systems, Inc. All rights reserved. Cisco’s Security Vision Mario Mazzola Chief Development Officer August 29, 2002.
2 An Overview of Telecommunications and Networks Telecommunications: the _________ transmission of signals for communications (home net) (home net)
Building Trust in Digital Online World Dr. Shekhar Kirani Vice President VeriSign India 5th June 2009 IBA Conference.
Lisa Farmer, Cedo Vicente, Eric Ahlm
Security strategy. What is security strategy? How an organisation plans to protect and respond to security attacks on their information technology assets.
Unified Logs and Reporting for Hybrid Centralized Management
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
© 2014 Level 3 Communications, LLC. All Rights Reserved. Proprietary and Confidential. Polycom event Security Briefing 12/03/14 Level 3 Managed Security.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 1: Exploring the Network Introduction to Networks.
Network Infrastructure Security. LAN Security Local area networks facilitate the storage and retrieval of programs and data used by a group of people.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 1: Exploring the Network Introduction to Networks.
Network Topology. Cisco 2921 Integrated Services Router Security Embedded hardware-accelerated VPN encryption Secure collaborative communications with.
CISCO CONFIDENTIAL – DO NOT DUPLICATE OR COPY Protecting the Business Network and Resources with CiscoWorks VMS Security Management Software Girish Patel,
Barracuda Networks Steve Scheidegger Commercial Account Manager
1Cisco Security NOW © 2003, Cisco Systems, Inc. All rights reserved. THIS IS THE POWER OF CISCO SECURITY. now.
1 Windows Server Roadmap Update. 2 Agenda Windows Server Market Trends A Look Ahead NAP Collaboration Announcement Windows Server 2003 R2 Product Update.
Windows ® Powered NAS. Agenda Windows Powered NAS Windows Powered NAS Key Technologies in Windows Powered NAS Key Technologies in Windows Powered NAS.
IT-Partners Limited © 2011 IT Partners Limited Y OUR IT SOLUTION P ARTNERS Managing Director Confidential Data Loss Prevention Sunny Ho 1.
1 Managed Security. 2 Managed Security provides a comprehensive suite of security services to manage and protect your network assets –Managed Firewall.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
1 Deployment of Computer Security in an Organization CE-408 Sir Syed University of Engineering & Technology 99-CE-282, 257 & 260.
The generation, storage, and movement of information are central to managing an enterprise’s business processes As a result, businesses must ensure.
1 IS 8950 Managing Network Infrastructure and Operations.
PROJECT PAPER ON BLUEFIRE MOBILE SECURITY. BY PONNURU VENKATA DINESH KUMAR STUDENT ID # A0815 PROFESSOR – VICKY HSU CS-426.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Cisco ASA 5500 Series Content Security Edition License Renewal Program.
© NOKIApage: 1 Wireless IP Solutions Enabled by GPRS Chris Briglin Head of Marketing GPRS Business Program Nokia Telecommunications.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Welcome to the Human Network Matt Duke 11/29/06.
Fortinet An Introduction
Chapter 1 Intro to Routing & Switching.  Networks have changed how we communicate  Everyone can connect & share  How have networks changed the way…
Systems and Next Generation Collaboration Kevin Woods Director of Marketing and Product Management Mirapoint Inc.
© 2003, Cisco Systems, Inc. All rights reserved _03_2003_c4 © 2003, Cisco Systems, Inc. All rights reserved _03_2003_c4.
Robbie Upcroft Sales Manager - SMB & Distribution, Asia-Pacific
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 1: Exploring the Network Introduction to Networks.
Dell Connected Security Solutions Simplify & unify.
Exploring the Network.
Center of Excellence for IT at Bellevue College. Cyber security and information assurance refer to measures for protecting computer systems, networks,
Chapter 01: Introduction to Network Security. Network  A Network is the inter-connection of communications media, connectivity equipment, and electronic.
Kiew-Hong Chua a.k.a Francis Computer Network Presentation 12/5/00.
Emerging Security Trends & Technologies Presented by Santhosh Koratt Head Consulting & Compliance SecureSynergy Pvt.Ltd.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Living in a Network Centric World Network Fundamentals – Chapter 1.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Living in a Network Centric World Network Fundamentals – Chapter 1.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Living in a Network Centric World Network Fundamentals – Chapter 1.
Last Minute Security Compliance - Tips for Those Just Starting 10 th National HIPAA Summit April 7, 2005 Chris Apgar, CISSP – President Apgar &
Texas Technology Forum The Future of Mobile Technology Trends and Issues July 16, 2009.
I NTRODUCTION TO N ETWORK A DMINISTRATION. W HAT IS A N ETWORK ? A network is a group of computers connected to each other to share information. Networks.
Chapter 1: Explore the Network
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Version 4.0 Living in a Network Centric World Network Fundamentals – Chapter 1.
Infrastructure for the People-Ready Business. Presentation Outline POINT B: Pro-actively work with your Account manager to go thru the discovery process.
JUNIPER NETWORKS OVERVIEW March 2012 Ing Stephen Vella Computime Ltd. Head of Technology Solutions.
A presentation by John Rowley for IUP COSC 356 Dr. William Oblitey Faculty member in attendance.
Transform the datacenter brought to you by [insert partner name] Speaker name 00/00/0000 Insert your Logo here.
Barracuda Networks. Safe Public Cloud Transitions Why Barracuda? The Challenge When organizations move workloads to the public cloud, data protection.
Security Policy and Key Management Centrally Manage Encryption Keys - Oracle TDE, SQL Server TDE and Vormetric. Tina Stewart, Vice President.
Vodafone Business Cloud
© 2007 IBM Corporation IBM Software Strategy Group IBM Google Announcement on Internet-Scale Computing (“Cloud Computing Model”) Oct 8, 2007 IBM Confidential.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 1: Exploring the Network Introduction to Networks.
Novell iFolder Novell Academy QuickTrain. What is iFolder? Novell iFolder lets users’ files follow them anywhere A simple and secure way to access, organize.
Chapter 1: Explore the Network
Instructor Materials Chapter 1: Explore the Network
Chapter 1: Exploring the Network
Chapter 1: Explore the Network
Check Point Connectra NGX R60
© 2016 Global Market Insights, Inc. USA. All Rights Reserved Fuel Cell Market size worth $25.5bn by 2024 Low Power Wide Area Network.
Presentation transcript:

Storage Security: The Next Frontier Jim Anderson Vice President, Marketing Networking and Storage Products Group May 2008

2 LSI Proprietary Agenda Market Trends Impacting Storage Security Need for Security of Data-at-Rest New Data-at-Rest Security System Seagate Self-Encrypting Drives

3 LSI Proprietary Trend #1: New Usage Models Driving the Information Explosion Web commerce, social networking, telecommuting, telepresence, tele-education IP traffic expected to double every 2 years through 2011* Information created per year to increase by 6x by 2011** Growth in unstructured rich data (video, audio, images) exceeds structured data growth*** More connections, faster speeds, and richer data require expanded security Digital Information Created, Captured, Replicated Worldwide* Available Storage Information Created Exabytes * Source: Cisco ** Source: IDC, “The Diverse and Exploding Digital Universe”, IDC Doc #204807, March 2008 ***Source: IDC, Storage Infrastructure: Innovations for the Future Datacenter, IDC Doc #DR2008_1RV, 2008 Storage Security must be Scalable

4 LSI Proprietary Padlock Firewall Stateful Firewall VPN Blended Attack Corporate Espionage Identity Theft Keyboard Loggers Image Spam Spyware Text Spam Indecent Content Trojans Worms Viruses Moat Physical Connection Based Anti-Virus Web-Filtering Content Based IDS/IPS Anti-Spam Anti-Spyware Anti-X Firedoor Content Processing Theft Siege Intrusions Defacement File Deletion Complexity Trend #2: Evolving Security Threats * source: IDC, “Enterprise Security Survey: The Rise of the Insider Threat,” IDC Doc # Dec 2006 Storage Security must Protect All Data at All Times Motivation shift from proof-of-concept to profit-motivated Must protect against multiple blended attacks Complexity of threats increasing Insider security threat on the rise*

5 LSI Proprietary LSI Approach to Storage and Networking Security  Standard products with integrated security functions  Content inspection processors Component  Broad portfolio of security IP blocks (IPSec, MACSec, etc.) Silicon Silicon-to-Systems-to-Software Approach System & SW  Working with industry partners to develop complete storage security systems Today’s Focus: Data-at-Rest Security System

6 LSI Proprietary Agenda Market Trends Impacting Storage Security Need for Security of Data-at-Rest New Data-at-Rest Security System Seagate Self-Encrypting Drives

7 LSI Proprietary Today’s Storage Environment Shared DAS Storage System Blade Servers Server HBA FC Switch JBOD PCI RAID Ethernet Switch JBOD SAN Storage System Server Workstation PCs Storage Security must be based on Industry Standards and provide Interoperability between Devices

8 LSI Proprietary Why Encrypt Data-At-Rest? Data spends most of its life at rest Disk drives are mobile Loss of customer data requires disclosure – average cost of disclosure estimated at $14M USD per incident* Majority of US states and EU have safe harbors for encryption * source: Ponemon Institute, “Lost Customer Information: What Does a Data Breach Cost Companies?”, November 2005

9 LSI Proprietary Agenda Market Trends Impacting Storage Security Need for Security of Data-at-Rest New Data-at-Rest Security System Seagate Self-Encrypting Drives

10 LSI Proprietary T10/T13 (TCG) Data-at-Rest Security System Elements Key Management System –Stores and serves authentication keys Storage System –Authenticates with key source –Passes key to drive –Makes encryption function transparent to applications Self-encrypting drives (SED) –Data is always encrypted –AES hardware encryption built in –No performance impact Disk Storage Array IEEE P Key Management System Full Enterprise Data-at-Rest Solution from IBM, Seagate and LSI SED DataAuthentication Communication Path

11 LSI Proprietary Storage System’s Role in a Data-At-Rest Solution Data Flow Key Flow Storage System Management Station Application Servers Self-encrypting drive (SED) FC SAN Enterprise Storage Key Management Server Environment Management Flow Key Server IEEE P Administrator requests creation of new key Storage System requests new key from Key Server Key Server generates new key and sends to Storage System Storage System passes key to SED SED unlocks and appears as “regular” drive to application servers, OS, etc.

12 LSI Proprietary Benefits of the Storage Security System Inherently Scalable –Scales with increasing richer, unstructured data Everything is encrypted –No performance penalty –Transparent to end user Standards-based / Unified key management –Works with all types of storage devices –Multiple sources, interoperable

13 LSI Proprietary Self-Encrypting Drives… We The People of the United States of America

14 LSI Proprietary