Presentation is loading. Please wait.

Presentation is loading. Please wait.

Data Protection & Security

Similar presentations


Presentation on theme: "Data Protection & Security"— Presentation transcript:

1 Data Protection & Security
Nizar Elfarra

2 Today’s Overview Industry trends Security & Protection How Can We Help

3 Industry Trends

4 Infrastructure (R)evolution
Challenges Faced Business Challenges Budget Constraints More Data More Workloads Lines of Business Owner Demands Service Providers Cloud SaaS Mobile Data Center Infrastructure (R)evolution There is an infrastructure evolution taking place in today’s marketplace. Business Challenges There is continued pressure on IT budgets to do more with less, yet still somehow drive innovation. Data is being created with greater volume and variety than ever before, and the value associated with that data is at an all time high. Add to this the Lines of Business themselves driving much more dynamic business requirements, increased IT expectations, and expanded SLAs. Infrastructure Now let’s look to the technology space itself which is increasingly disruptive and challenging the traditional IT strategies and tactics. There is so much noise in the market place and so many new or varied technologies that it is a challenge to identify which trends to follow, which to ignore, and which to get ahead of. Businesses as a whole now have to evolve to accommodate expanding their data footprints beyond their 4 walls and into the cloud, XaaS providers, and also deal with the increased consumerization of IT (BYOD, etc). Commvault In the midst of all this chaos sits Commvault. Organically developed as a single, unified platform that allows organizations the agility to adapt to the ebb and flow of their business needs and data requirements. The software solution delivers across 9 different focus areas of business need: Application Data Management Enterprise Backup and Recovery Virtualized Data Center Solutions Cloud Data Solutions Search & Discovery Information Management & Governance Endpoint Security & Protection Big Data Clinical/Healthcare All of these running as parts of the same code allowing unprecedented scalability in not just size (TBs  PBs), but in functionality. All without the need to stand up what would otherwise be multiple disparate siloes to address these areas. Wrap around this Commvault Consulting and Managed services, and you have a complete solution for the enterprise that is delivered and/or managed to meet your needs and expectations.

5 Digital Transformation and the Internet of Things Forces fueling the move to the cloud
Explosion of Digital Data …of all digital data ever created was created in the last 2 years. Source: Sintef ITC 90% Cloud Usage on the Rise …of organizations are managing some of their data in cloud infrastructure. Source: IDC 70% Connected Devices Skyrocketing Source: Gartner …things could be connected to the Internet by 2020, about 5.5 million devices added every day. 20.8 BILLION 5

6 Private Cloud / Hybrid Cloud Market Opportunity
Cloud Agility Enterprise Control 18% 25% -8% CAGR Self - Service Budget Controls Rapid Start / Stop Access Controls Standard Interface Policy Enforcement Pay for Use Reporting Source: Gartner

7 The Disappearing Datacenter
Increased Hybridization of Workloads The thin line between your traditional 4 walls and the cloud are very quickly greying. The need for agility continues to increase as data flows between various locations, media, and frameworks throughout its lifecycle. The Cloud Computing Scenario: Cloud — the Last 10 and the Next 10 Years ·       Cloud is becoming less of a "disruptor" as it gets more adopted. ·       According to Gartner, cloud is not about cost savings anymore; it is not cheap. ·       Gartner sees the enterprise use of public cloud and SaaS resources are accelerating and becoming more strategic. ·       Gartner predicts: Hybrid will dominate for many years, there will not be one cloud and PaaS will become more pervasive. Heterogeneous cloud strategy

8 Security & Protection

9 Security Concerns Ransomware on the rise
Protecting blockchain & cryptocurrency Unauthorized access within the organization Mobile workforce & corporate data on endpoints Personal devices used to access corporate data Use of free file sharing service Data and compliance breach due to laptop loss or theft Risk associated with end point and cloud based data Current user security practices will not pass a compliance audit

10 Security Requirements

11 Data Access & Control Secure Access from Anywhere
Secure, easy to manage access from browser or mobile devices Access Control Capture Knowing who should an can have access to data stored App Aware Security & Authentication Enabled across different access points (web or mobile)

12 Cloud & Network Security
Multi-Tenancy Segregating data at all times Secure Communication SSL communications between systems Client Certification All systems require certification to authenticate the connections Firewalls Blocked unauthorized access to network resources

13 Data Encryption Data in transit & data at rest
256 bit key encryption Encryption Key Management FIPS certifications FIPS and FIPS 140-2

14 Auditing, Monitoring & Analytics
Full Auditing Ability to provide audit trails for the data being stored, deleted and accessed Log Monitoring Ability to monitor, capture and interpret log file data of user access Log Analytics Ability to forensically review logs from the time of a data breach to be able to prevent it

15 Data Governance & Compliance
Data Residency Ability to view and access data is in an organization eDiscovery, Compliance & Legal Hold Ability to view, search, discovery and preserve selected data owned by the organization Remote Wipe Mitigating breaches by remotely wipe data in case of a lost endpoint device Data Privacy Ability to local a service providers ability to view and access their data Also Relevant for GDPR

16 What To Do

17 We Can Help Ransomware Detection & Recovery Data Protection
Prevent & Detect Ransomware Detection & Recovery Flag suspect processes that read a lot of files in a short period by setting up ‘honey pots’ Recover from a clean offline backup Data Protection Setting up the right backup and DR policies Creating clean offline copies User Data Segregation Multi-tenancy – User can access only their data, preserving user privacy and segregation at all times Secure Communications Encrypt data during transit and at rest Monitoring & Auditing Setting policies, generating reports and triggering alerts to warn and prevent unauthorized access Stop Infection Spread Recovery & DR Strategy


Download ppt "Data Protection & Security"

Similar presentations


Ads by Google