Presentation Title: 32 pt Arial Normal

Download Report

Transcript Presentation Title: 32 pt Arial Normal

Security Solutions
for Business Acceleration
Arun Dhaka
Regional Sales Head – North & East, India
Backgrounder: Who is RSA?
Ron
Rivest
Adi
Shamir
Leonard
Adleman
Three MIT Professors developed an encryption algorithm
(RSA)
1982 RSA Data Security founded
1996 Security Dynamics acquires RSA Data Security
1999 Company renamed and re-branded RSA Security Inc.
2006 Company acquired by EMC Corp
2
•
Additional acquisition of Network Intelligence
EMC: Information Infrastructure
RSA, The Security Division of EMC – launched to
help customers accelerate their business with
confidence
Information is one of the only
unique and valuable assets
Over the next four years,
>800 exabytes will be added *
•
People
Infrastructure
Data
Transactions
Information Infrastructure
store | protect | optimize | leverage
3
Organizations are responsible for
the security, privacy, reliability,
and compliance of at least 85%
of the information they keep
IT organizations are
transforming their
Infrastructure to maximize
the value of information
Protection is a vital capability
of Information Infrastructure
* Source - IDC
Is Your Information an Asset or a Liability?
“Despite massive investment in
security technology and services…
18%
82%
4
Source: Enterprise Strategy Group March 2006
… fewer than one in five
companies feel that all their
data is adequately protected.”
Introducing Information-centric Security
In the past, guarding the
perimeter against external
threats was sufficient, but…
People
Infrastructure
Transactions
5
Data
Introducing Information-centric Security
customers
partners
Today's organizations are virtual,
global, and dynamic
People
employees
6
infrastructure
Data
Perimeters fail to protect data as
it moves or repel internal threats
Perimeter-centric security
creates boundaries that hinder
new business models
Introducing Information-centric Security
customers
Information-centric security
partners
binds security directly
to information and
the people who need it
customers
partners
employees
employees
7
Introducing Information-centric Security
secure enterprise data
Preserve the confidentiality and integrity
of critical data wherever it resides
secure employee access
Enable secure, anytime, anywhere access
to corporate resources
secure access
secure data
customers
secure partner access
Open internal systems to trusted partners
partners
employees
secure customer access
Offer self-service channels, prevent fraud,
and enhance consumer confidence
security information management
manage security information
Comply with security policy and regulations
8
Secure Data
RSA Capabilities: Classification | Encryption | Key Mgmt. | Rights Mgmt. | Advisory & Implementation Services
Secure Access
Secure Data
Security Information Management
Accor North America
seamlessly protects sensitive
customer information at more
than 1,200 hotel properties.
9
Protect critical structured and
unstructured data wherever it
resides.
•
•
•
Classify sensitive information and
develop appropriate protection
policies and enforcement strategies
Encrypt sensitive data at the
application level, in databases, in file
systems, on backup tapes and
storage systems
Manage the lifecycle of encryption
keys across the enterprise
Secure Employee Access
RSA Capabilities : Strong Authentication | Web Access Mgmt. | Card Mgmt. | Digital Certificate Mgmt..
Securely work with corporate
resources anywhere, anytime
Secure Access
Secure Data
employees
Security Information Management
•
•
•
•
Geisinger Health System
delivers potentially life-saving
information to doctors through
Web-based portals.
10
Secure and simplify access to
internal network resources
Authenticate authorized remote
users to corporate resources
Securely extend the reach of
Web-based systems
Leverage trusted identities across
multiple corporate domains
Secure Partner Access
RSA Capabilities: Strong Authentication | Web Access Mgmt. | Identity Federation
Secure Access
Secure Data
Securely leverage the value of
Web-based systems for partner
ecosystems
•
partners
•
Security Information Management
•
Milliman nearly doubled its
retirement plan participation
by offering services through
an indirect channel.
11
Authenticate authorized partners to
corporate resources
Provide secure access to Web
portals and applications through
role-based authorization
Share trusted identities across
partner domains
Secure Customer Access
RSA Capabilities: Adaptive Authentication | Identity Verification | Fraud Protection | Transaction Monitoring
Secure customer
self-service channels
Secure Access
Secure Data
•
customers
•
Security Information Management
•
Halifax Bank of Scotland
reported an 80% reduction in
fraud after deploying RSA
technology.
12
•
Provide risk-appropriate
authentication and identity
verification options for
customers on web or phone
Monitor online transactions, detect
and flag high-risk activities and
investigate to reduce fraud
Detect and shutdown phishing,
pharming, and trojan attacks
Provide secure access to web
portals and applications through
role-based authorization
Manage Security Information
RSA Capabilities: Security Information and Event Mgmt. (SIEM) | Enterprise Storage | Implementation Services
Validate compliance with security
policy and regulations
Secure Access
Secure Data
•
•
Security Information Management
•
“RSA enVision® allows us to
do things we simply couldn’t
do before ... the ROI has
been huge.”
Source: Cole Taylor Bank
13
•
Efficiently collect and store audit
logs from any IP device
Analyze and manage security
events, perform real-time alerting
and detailed forensic analysis
Analyze data and produce targeted
compliance reports for regulations
and internal policy
Integrate solution with Enterprise
Storage for effective lifecycle
management of log data
Flexible Solutions for a Variety of Needs
secure employee, partner, and customer access
Technology Solutions:
Secure Enterprise Access
Secure Remote Access
Secure Web Access
Secure Consumer Identities and Assets
manage security information
Technology Solutions:
Compliance & Security
Information Management
14
secure data
Technology Solutions:
Secure Enterprise Data
assessment, planning and implementation services
Offerings include:
Classification for Information Security
Design and Implementation for Security Information Mgmt.
Design and Implementation for Storage Encryption
Today’s Focus
SecurID
SIEM
15
RSA Worldwide Market Leadership
Traditional Two-Factor Authentication
26%
All
Others
RSA
74%
Source: IDC Worldwide Authentication Token Market
Report 2006
16
Access Inside the Enterprise
A Changing Environment
Fact: 59% of survey respondents reported experiencing
a security incident originating from inside the enterprise
in the last 12 months*
Increasing exposure inside the enterprise
• Proliferation of wireless networks inside the firewall
• Multiple groups accessing sensitive information (IT, HR, Finance etc.)
• Enterprise SSO deployments creating vulnerable password vaults
• Drive for convergence of logical and physical access requiring
management of multiple credentials
*TheInfoPro Information Security Study, Wave 8, Winter 2007
17
Defining “The Insider”
Who has physical or logical access to network resources?
Employees
Contract
workers
Consultants
Visitors
Maintenance
personnel
Interns
18
Four Reasons for Security Breaches
1. Ignorance
Insiders do not understand or are not familiar with
the existing security policies
2. Carelessness
Insiders do not think about how their actions will
break the rules, resulting in a breach of security
3. Disregard of
Insiders will act in ways that make their lives easier,
even if it involves going against security policies (ex.
writing passwords on sticky notes)
security
policies
4.
19
Insiders will purposely damage, destroy or
Maliciousness compromise an enterprise’s intellectual property –
for financial gain or personal satisfaction
Secure Enterprise Access Solution
Accelerating Business Securely
Securely provide access to high-value digital assets
• Strengthen security
• Prevent unauthorized access
• Protect high-value resources
• Heighten compliance
• Track and report user behavior and access
• Reduce costs
• Reduce IT costs associated with password management
• Eliminate costs associated with internal security breaches
• Simplify user experience
• Reduce the challenge of password management
• Accelerate business
• Provide seamless access to enterprise resources
20
Changing Business Reality
Key Business Drivers for Secure Remote Access
Globalization and growing mobility of the workforce
•
Anytime, Anywhere Access
Real-time collaboration between employees,
customers and partners
•
Ready access needed to sensitive corporate information
Rising use of unmanaged devices and locations
for remote access
•
•
Airport and Hotel Kiosks
Access from Laptops, BlackBerry devices, SmartPhones etc.
Growth of compliance regulations
•
SOX, HIPAA, GLBA, OCC etc.
Growing sophistication of security attacks
•
21
Long lasting impact on brand reputation, business viability
Specific Business Imperatives Further Drive
the Need for Secure Remote Access
Tele-working
•
•
•
By 2011, 46.6 million corporate employees globally
will spend at least one day a week tele-working*
By 2011, 112 million will work from home at least
one day a month*
State legislation in the U.S. supporting tele-working
initiatives
Home-sourcing
•
Example: Jet Blue employs stay-at-home moms to
process reservations from home
Business Acceleration
•
•
22
Facilities cost savings through remote offices
Hiring the right talent…anywhere without relocation
* Source: Gartner
Millions of Users Log Into their Networks Remotely
Fact: 80%* of users rely on insecure passwords to logon
Organizational challenges
23
Heightened
security risk
Cost of a security breach is approximately $203,000**
Poor compliance
Fees and criminal penalties related to non-compliance
Increased costs
Industry averages put password-reset and User ID issues
at about 35% of all help desk call volumes; each call costs
approximately $58***
Suboptimal user
experience and
productivity
The average user has to remember 20+ passwords for the
systems and applications they access
Missed business
opportunities
Inability to grow the business due to lack of real-time info
exchange between stakeholders
*Frost & Sullivan estimates that 20% of VPN deployments have a strong authentication component
**CSI-FBI “Computer Crime and Security” Survey, Computer Security Institute, 2006
***$58 takes into account Gartner metric of IT costs =$36 + RSA estimate of lost user productivity costs
Secure Remote Access
Accelerating Business Securely
RSA Goal: Securely provide access to corporate
information anywhere, anytime
Strengthen
security
Enhanced
compliance
24
Reduce costs
Utilize industry best practices to validate user identities
and access
Ensure effective tracking and reporting for who accessed
what
Reduce IT costs associated with user password
administration
Heightened user
productivity
Securely support remote office initiatives
Eliminate user frustration and lost productivity associated
with passwords
Business
acceleration
Connect key internal and external stakeholders for
business enablement
Secure Remote Access
RSA capabilities: Strong authentication via VPN, WLAN,
and external Web applications
Assure
Identities
and Access
Infrastructure
and Data
external
remote users
remote
employees
Securely work with corporate
resources anywhere, anytime
•
•
•
Over 20,000 organizations
worldwide use RSA
SecurID® authentication to
protect corporate data and
resources
25
Secure and simplify remote access to
network resources
Authenticate authorized remote internal &
external users to corporate resources
Improve accountability for restricting
access to corporate and private
information
Offering
•
RSA SecurID® authentication
Building a Secure Remote Access Solution
Who are the end users Employees, Partner,
Customers
and what are their
access methods?
Matching strong
authentication
solution to business
needs
Strategic Fit, User
Management, Cost
VPN (IPSec, SSL), Outlook
Web Access, Citrix…
– Strategic Fit: Appropriate
Security, Interoperability,
Choice & Flexibility
– User Mgmt:
Convenience, Portability
– Cost: Deployment,
Acquisition, Operational
Ensure a common
platform for
compliance and
security operations
26
Repeatable Process
for User Access
Tracking
Ensure a repeatable
process for enhanced
compliance
Authentication Choices—Relative Strength
PIN
+
PIN
or
Weak
27
+
+
PASSWORD
Single factor
+
PIN
Two factor
Stronger
Three factor
Strongest
Secure One-Time Password
How RSA SecurID® authentication works
Calculates passcode
Authentication
Agent
User enters Passcode
(PIN + token code)
Authentication
Manager
User Authenticated!
An authenticator generates a random pass code every
60 seconds
28
RSA Secure Enterprise Access Technology
Solution RSA SecurID offers…Choice…
®
29
RSA enVision – Market Proven Leadership
Vision
Information Management Platform for transforming event, log, asset
and other data into actionable related intelligence
Market Presence Over 800 major enterprise and government accounts
Technology
Proven Patent-pending Internet Protocol Database™ (IPDB)
All the data for compliance and security success
Partners
Network
Technology
Partners
- Cisco
- Juniper
- Nortel
- Foundry
Security
- Symantec
- ISS
- McAfee
- Check Point
- RSA
Operating System
- Microsoft
- Linux / Unix
- Sun / HP
- IBM AS400/Main
Application
- MS Exchange
- Oracle
- MS SQL
Other
- Websense
- Bluecoat
- Apache
- EMC
Over 130 device partners
Accolades
30
“Leader, 3rd Year in a Row”
“Only vendor with all the data”
“Excellent”
“2005 Appliance bake-off winner”
“Leader”
“Largest Market Presence”
RSA enVision
Market-Proven Leadership
Energy & Utility
Retail & Hospitality
MSSP
Healthcare
Fortune 500
31
 800+ customers
 50% of Fortune 10
 40% of top Global Banks
 30% of top US Banks
Financial Services
RSA Worldwide Market Leadership
Security Information and Event Management
32
The Enterprise Today
Mountains of data, many stakeholders
Malicious Code Detection
Real-Time Monitoring
Spyware detection
Troubleshooting
Access Control Enforcement
Configuration Control
Privileged User Management
Lockdown enforcement
Unauthorized
Service Detection
False Positive
Reduction
IP Leakage
Web server
activity logs
User Monitoring
Switch logs
Web cache & proxy logs
SLA Monitoring
Content management logs
How
to collect
& protect
How
to analyze
and
manage all
all the
the data
data to
necessary
to build a platform
for
transform
the information
into actionable
compliance
andand
security
operations
knowledge
intelligence
VA Scan logs
Windows
domain
logins
Windows logs
IDS/IDP logs
Router logs
VPN logs
Firewall logs
Wireless
access
logs
Oracle Financial
Logs
Mainframe
logs
Linux, Unix,
Windows OS logs
San File
Access
Logs
33
Client & file
server logs
DHCP logs
VLAN Access
& Control logs
Database Logs
Challenge: Growth of Enterprise Silos
Redundant Information Management
COMMERCIAL
INTERNAL
APPLICATIONS APPLICATIONS
34
OPERATING
SYSTEMS
SECURITY
INFORMATION
NETWORK
INFORMATION
DATABASE
SYSTEMS
STORAGE
Solution: RSA enVision
An Information Management Platform…
Server Engineering
Business Ops.
Compliance Audit
Baseline
Asset Ident.
Log Mgmt.
Risk Mgmt.
Security Ops.
Report
Compliance Operations
Access Control
Configuration Control
Malicious Software
Policy Enforcements
User Monitoring & Management
Environmental & Transmission Security
Desktop Ops.
Network Ops.
Alert/Correlation
Security Operations
Forensics
Access Control Enforcement
SLA Compliance Monitoring
False Positive Reduction
Real-time Monitoring
Unauthorized Network Service Detection
More…
All the Data
Log Management
Any enterprise IP device – Universal Device Support (UDS)
No filtering, normalizing, or data reduction
Security events & operational information
No agents required
…For
Compliance &
Security Operations
35
Application & Database
Incident Mgmt.
RSA enVision
A Platform for Security Operations
Internal Systems &
Applications
Secure operations of all
systems and data associated
with internal network services
and applications
eCommerce
Operations
Secure operations of all
systems and data
associated with
eCommerce operations
Perimeter Network
Operations
Securely connect the
enterprise to the Internet
and other required
corporate entities
36
RSA Envision:
The Information Management Platform Checklist

 Collects, Manages & Analyzes “All the Data”



Any enterprise IP device
Security exception events and IT operations information
No filtering, normalizing, or data reduction
 Offers Single Global View


Access and analysis of All the Data across sites/geographies
Secure Access Control
 Supports All Devices


Hundreds of supported devices
Flexible XML UDS engine for easy integration of legacy devices, homegrown
applications
 Installs Non-invasively

37
No Agents
Easy integration with customer infrastructure
RSA Envision:
The Information Management Platform Checklist

 Interoperable & Extensible


All the Data architecture
All devices support
Enables Compliance and Security Operations
 Delivers Cradle to Grave ILM


Security information managed throughout its lifecycle

Automatic deployment of customer defined retention policies
 Implements High Availability Infrastructure


Non-stop collection architecture


38
Dual Hot Standby server configuration
Best-of-breed storage reliability and fault-tolerant design
RSA Envision:
The Information Management Platform Checklist

 Scales without interruptions

From single appliance to multiple appliance deployment
On-the-fly additional storage capacity

 Delivers High and Consistent Application
Performance



Parallel architecture ensures alert performance
Purpose-built for high-performance requirements
 Minimizes Operational Costs



39
Compressed data store
Easy to deploy appliance package
No DBA resources required
No agents required
EMC Corporation
At a Glance
Revenues (2007):
>$12.7 billion*
Employees (end Q2 worldwide):
>33,000
(end Q2 outside U.S.):
Countries:
85
R&D Investment (2007):
≈$1.4 billion**
Market Capitalization:
$39 billion
(July 27)
Cash and Investments:
Founded:
40
>12,000
(end Q2)
$5.9 billion
1979
*EMC’s expectations as stated in July 24, 2007 earnings news release; **based on annual run rate of Q2
Information-centric Security