Presentation is loading. Please wait.

Presentation is loading. Please wait.

Storage Security: The Next Frontier Jim Anderson Vice President, Marketing Networking and Storage Products Group May 2008.

Similar presentations


Presentation on theme: "Storage Security: The Next Frontier Jim Anderson Vice President, Marketing Networking and Storage Products Group May 2008."— Presentation transcript:

1 Storage Security: The Next Frontier Jim Anderson Vice President, Marketing Networking and Storage Products Group May 2008

2 2 LSI Proprietary Agenda Market Trends Impacting Storage Security Need for Security of Data-at-Rest New Data-at-Rest Security System Seagate Self-Encrypting Drives

3 3 LSI Proprietary Trend #1: New Usage Models Driving the Information Explosion Web commerce, social networking, telecommuting, telepresence, tele-education IP traffic expected to double every 2 years through 2011* Information created per year to increase by 6x by 2011** Growth in unstructured rich data (video, audio, images) exceeds structured data growth*** More connections, faster speeds, and richer data require expanded security Digital Information Created, Captured, Replicated Worldwide* Available Storage Information Created 2005200620072008200920102011 0 200 400 600 800 1000 1200 1400 1600 1800 Exabytes * Source: Cisco ** Source: IDC, “The Diverse and Exploding Digital Universe”, IDC Doc #204807, March 2008 ***Source: IDC, Storage Infrastructure: Innovations for the Future Datacenter, IDC Doc #DR2008_1RV, 2008 Storage Security must be Scalable

4 4 LSI Proprietary Padlock Firewall Stateful Firewall VPN Blended Attack Corporate Espionage Identity Theft Keyboard Loggers Image Spam Spyware Text Spam Indecent Content Trojans Worms Viruses Moat Physical Connection Based Anti-Virus Web-Filtering Content Based IDS/IPS Anti-Spam Anti-Spyware Anti-X Firedoor Content Processing Theft Siege Intrusions Defacement File Deletion Complexity Trend #2: Evolving Security Threats * source: IDC, “Enterprise Security Survey: The Rise of the Insider Threat,” IDC Doc #204807 Dec 2006 Storage Security must Protect All Data at All Times Motivation shift from proof-of-concept to profit-motivated Must protect against multiple blended attacks Complexity of threats increasing Insider security threat on the rise*

5 5 LSI Proprietary LSI Approach to Storage and Networking Security  Standard products with integrated security functions  Content inspection processors Component  Broad portfolio of security IP blocks (IPSec, MACSec, etc.) Silicon Silicon-to-Systems-to-Software Approach System & SW  Working with industry partners to develop complete storage security systems Today’s Focus: Data-at-Rest Security System

6 6 LSI Proprietary Agenda Market Trends Impacting Storage Security Need for Security of Data-at-Rest New Data-at-Rest Security System Seagate Self-Encrypting Drives

7 7 LSI Proprietary Today’s Storage Environment Shared DAS Storage System Blade Servers Server HBA FC Switch JBOD PCI RAID Ethernet Switch JBOD SAN Storage System Server Workstation PCs Storage Security must be based on Industry Standards and provide Interoperability between Devices

8 8 LSI Proprietary Why Encrypt Data-At-Rest? Data spends most of its life at rest Disk drives are mobile Loss of customer data requires disclosure – average cost of disclosure estimated at $14M USD per incident* Majority of US states and EU have safe harbors for encryption * source: Ponemon Institute, “Lost Customer Information: What Does a Data Breach Cost Companies?”, November 2005

9 9 LSI Proprietary Agenda Market Trends Impacting Storage Security Need for Security of Data-at-Rest New Data-at-Rest Security System Seagate Self-Encrypting Drives

10 10 LSI Proprietary T10/T13 (TCG) Data-at-Rest Security System Elements Key Management System –Stores and serves authentication keys Storage System –Authenticates with key source –Passes key to drive –Makes encryption function transparent to applications Self-encrypting drives (SED) –Data is always encrypted –AES hardware encryption built in –No performance impact Disk Storage Array IEEE P1619.3 Key Management System Full Enterprise Data-at-Rest Solution from IBM, Seagate and LSI SED DataAuthentication Communication Path

11 11 LSI Proprietary Storage System’s Role in a Data-At-Rest Solution Data Flow Key Flow Storage System Management Station Application Servers Self-encrypting drive (SED) FC SAN Enterprise Storage Key Management Server Environment Management Flow Key Server IEEE P1619.3 Administrator requests creation of new key Storage System requests new key from Key Server Key Server generates new key and sends to Storage System Storage System passes key to SED SED unlocks and appears as “regular” drive to application servers, OS, etc.

12 12 LSI Proprietary Benefits of the Storage Security System Inherently Scalable –Scales with increasing richer, unstructured data Everything is encrypted –No performance penalty –Transparent to end user Standards-based / Unified key management –Works with all types of storage devices –Multiple sources, interoperable

13 13 LSI Proprietary Self-Encrypting Drives… We The People of the United States of America

14 14 LSI Proprietary


Download ppt "Storage Security: The Next Frontier Jim Anderson Vice President, Marketing Networking and Storage Products Group May 2008."

Similar presentations


Ads by Google