SafeNet The Foundation of Information Security Zen and the Art of Data Protection Preparing for the Evolution Adel Hajrasuliha – Regional Account Manager.

Slides:



Advertisements
Similar presentations
Property Inventory Valuation Replacement Cost Value The amount it would take to replace property with like property of the same quality and construction.
Advertisements

Creating HIPAA-Compliant Medical Data Applications with Amazon Web Services Presented by, Tulika Srivastava Purdue University.
ANNUAL SECURITY AWARENESS TRAINING – 2011 UMW Information Technology Security Program Annual Security Awareness Training for UMW Faculty and Staff.
2  Industry trends and challenges  Windows Server 2012: Modern workstyle, enabled  Access from virtually anywhere, any device  Full Windows experience.
BalaBit Shell Control Box
Internet of Things Security Architecture
Current impacts of cloud migration on broadband network operations and businesses David Sterling Partner, i 3 m 3 Solutions.
Dell Compellent and SafeNet KeySecure
Data Leak Prevention: Safeguarding Corporate Information in a world of vanishing perimeters Kostas Papadatos MSc InfoSec, CISSP, ISO Lead Auditor,
Solutions & Services to ‘Multiply your Business Performance’ 2013.
E-Commerce Security Issues. General E-Business Security Issues Any E-Business needs to be concerned about network security. The Internet is a “ public.
Persistent Protection Using E-DRM Technology Jason Fasoo 06/18/2008.
Sophos / Utimaco Data Loss Prevention Peter Szendröi, SOPHOS Nordics Jan 20, 2010.
Security Management IACT 918 July 2004 Gene Awyzio SITACS University of Wollongong.
Creating a Secured and Trusted Information Sphere in Different Markets Giuseppe Contino.
Symantec Vision and Strategy for the Information-Centric Enterprise Muhamed Bavçiç Senior Technology Consultant SEE.
Sensitive Data Accessibility Financial Management College of Education Michigan State University.
Demonstrating IT Relevance to Business Aligning IT and Business Goals with On Demand Automation Solutions Robert LeBlanc General Manager Tivoli Software.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
© Centrify Corporation. All Rights Reserved. Unified Identity Management across Data Center, Cloud and Mobile.
Mobility Without Vulnerability: Secure and Enable Your Mobile Users, Apps, and Devices David Clapp – Intuitive.
©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties Building Your Security Strategy with 3D.
October The Insider Financial Crime and Identity Theft Hacktivists Piracy Cyber Espionage and Sabotage.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
(2011) Security Breach Compromises 75,000 Staff/Student Social Security Numbers Image from this Site Presenters: Aron Eisold, Matt Mickelson, Bryce Nelson,
1 Protecting Data in a Collaborative Environment Willa Pickering, Ph.D.
Enterprise Computing Community June , 2010February 27, Information Security Industry View Linda Betz IBM Director IT Policy and Information.
Unify and Simplify: Security Management
What Keeps You Awake at Night Compliance Corporate Governance Critical Infrastructure Are there regulatory risks? Do employees respect and adhere to internal.
FIVE STEPS TO REDUCE THE RISK OF CYBERCRIME TO YOUR BUSINESS.
Dell Connected Security Solutions Simplify & unify.
Secure Data Sharing What is it Where is it What is the Risk – Strategic > What Policy should be enforced > How can the process be Audited > Ongoing Process.
Our Channel 3 The Team Liat Ivri Nadav Elkabets Orit Cittone Nir Peim.
Federated or Not: Secure Identity Management Janemarie Duh Identity Management Systems Architect Chair, Security Working Group ITS, Lafayette College.
PRIVACY, SECURITY & ID THEFT PREVENTION - TIPS FOR THE VIGILANT BUSINESS - SMALL BUSINESS & ECONOMIC DEVELOPMENT FORUM October 21, WITH THANKS TO.
Copyright © 2015 Centrify Corporation. All Rights Reserved. 1 Secure & Unified Identity for End Users & Privileged Users.
Managing Data Against Insider Threats Dr. John D. Johnson, CISSP.
The Changing World of Endpoint Protection
Put your company logo here Confidential Data Upgrade from 8.x to 9.0.
Beyond the Fortress Fortify Your Content Before it Travels Beyond the Firm Walls.
Empowering people-centric IT Unified device management Access and information protection Desktop Virtualization Hybrid Identity.
Securing Data in Transit and Storage Sanjay Beri Co-Founder & Senior Director of Product Management Ingrian Networks.
Yair Grindlinger, CEO and Co-Founder Do you know who your employees are sharing their credentials with? Do they?
Identity Assurance Emory University Security Conference March 26, 2008.
- NCSU project goals and requirements - Adoption Drivers - Current challenges and pain points - Identacor at NCSU - Identacor Features - NCSU Key Benefits.
12/23/2015Software Assist Corporation1 “Most companies have little idea how pervasive FTP activity is in their organizations because FTP is no longer just.
Data Security at Duke DECEMBER What happened: “At this time, we have no indication that research data or personal data managed by Harvard systems.
Data Security & Privacy: Fundamental Risk Mitigation Tactics 360° of IT Compliance Anthony Perkins, Shareholder Business Law Practice Group Data Security.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
(2011) Security Breach Compromises 75,000 Staff/Student Social Security Numbers Image from this Site Presenters: Aron Eisold, Matt Mickelson, Bryce Nelson,
Copyright © 2015 Centrify Corporation. All Rights Reserved. 1 Company Overview & Strategy Lance McAndrew Product Line Sales Engineer.
BYOD: An IT Security Perspective. What is BYOD? Bring your own device - refers to the policy of permitting employees to bring personally owned mobile.
Taking on Tomorrow's Challenges Today Taking on Tomorrow's Challenges Today Almost every organisation has been attacked …. But most don’t know about it!
Copyright © 2015 Centrify Corporation. All Rights Reserved. 1 Securing Enterprise Identities Against Cyberthreats Brian Krause Manager of North America.
Protecting a Tsunami of Data in Hadoop
Dell Compellent and SafeNet KeySecure
Do you know who your employees are sharing their credentials with
0_kit End to End encryption in your app
Advanced Security Architecture System Engineer Cisco: practice-questions.html.
practice-questions.html If you Are Thinking about your dumps? Introduction:
Advanced Security Architecture for System Engineers Cisco Dumps Get Full Exam Info From: /cisco-question-answers.html.
Forensics Week 11.
Secure & Unified Identity
Company Overview & Strategy
DATA PRIVACY EMERGING TECHNOLOGIES by Virginia Mushkatblat
4/9/ :42 PM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
Microsoft Data Insights Summit
Protect data in core business applications
Presentation transcript:

SafeNet The Foundation of Information Security Zen and the Art of Data Protection Preparing for the Evolution Adel Hajrasuliha – Regional Account Manager ISSA Honolulu—October 2009

Sharing, Collaboration Threat Drivers Market Forces Cyber Crime Identity Theft Data Loss, Theft The Outsider Becomes the Insider Data Breaches Fear of Downstream Legal and Financial Liabilities Penalties & Fines Compliance Outsourcing Shared Service Centers SaaS Cloud Computing Globalization Boundaries? What's sensitive? Sharing without risk? Who’s good, who’s bad? Market Trends, Threat Drivers

Questions You Should Be Asking How do I protect salary information? Large Oil company oil at $160 barrel How do I allow my call center reps to support customers without having access to SSN/CC data? 10 records per hour or 8-5 access Launching a new product? How do I make sure that only authorized users see relevant data? SAS apps such as SalesForce.com How do I make sure that people accessing protected data are who they say they are? MLS website Can my firewall help me? My IPS? My Disk Encryption? Should I just encrypt all of my databases? (Good luck with that…..) If you don’t know where your data is, or what it is, you are Data Blind, Now it the time to be Conscious about it.

Data Breaches in the US Jan 10, 2000: Hacker steals 300,000 credit cards from CD Universe June 16, 2005: Cardsystems is hacked, exposing 40,000,000 records Jan 17, 2007: TJ MAX is hacked, exposing 45,000,000 records Jan 20, 2009: Heartland Payment Systems is hacked, exposing 130,000,000 records See the Trend, GOING UP!!! For full reports see:

The Market is Changing—Customers Demand Intelligent Data Protection Data Protection 2.0 Perimeter-level security All-or-nothing encryption Keep bad guys out, authorized users get full access Multiple products to meet business and security needs Limited to no visibility Data-centric data protection—intelligent to protect the data itself at the point of creation Granular protection—protect specific data elements (files, fields, columns), data types (structured or unstructured) Granular protection for authorized users—who can access what, when Solution that addresses many business, compliance & security issues Greater data control and visibility with centralized key/policy mgmt, logging & auditing Data Protection 1.0

Today’s Trends Create the Need for Enlightenment Disk Encryption, Network Encryption, Firewalls, NAP/IDS/IPS/ACLs, Storage Encryption Network-centric: Protect the Network Protect Devices Network-centric: Protect the Network Protect Devices Reactive, Blind to Data & Its Whereabouts, Fear-based, Compliance and Penalty- driven File Protection, Database/Application Protection, Encryption, Authentication, Content Security Data-centric: Protect the Data Itself Centralize Keys, Attach Policies Secure Access Control Data-centric: Protect the Data Itself Centralize Keys, Attach Policies Secure Access Control Comprehensive/Data Agnostic, Intelligent, Persistent Protection, Selective/Portable Encryption Content Awareness, Security Information Management, Granular Control & Reporting Proactively Monitor Data Flow, Discover, and Protect. Align Policies to Processes Proactive, Self Aware, Pre-emptive, Data Protection Data Consciousness Gaining Data Consciousness Data Consciousness Gaining Data Consciousness Data Awareness Become Data Aware Data Awareness Become Data Aware Data Blindness Understand Your Security Blindness Technologies Policies Characteristic Stages of Data Consciousness Preparing for the Evolution

Full disk encryption, NAP/IDS/IPS/ACL’s, network encryption, perimeter-level security Blind to what data is in use, at rest, and unaware of where and how data travels, and whom is accessing it Binary, all-or-nothing approach to data protection Reactive to data breaches Blind to what data is in use, at rest, and unaware of where and how data travels, and whom is accessing it Binary, all-or-nothing approach to data protection Reactive to data breaches Protect transmissions between networks Secure access to devices and infrastructure Protect transmissions between networks Secure access to devices and infrastructure Technologies Policies Characteristic Step 1: Understand Your Security Blindness Data Consciousness Gaining Data Consciousness Data Consciousness Gaining Data Consciousness Data Awareness Become Data Aware Data Awareness Become Data Aware Data Blindness Understand Your Security Blindness Secure settlements and transactions between merchants, payment processors, and acquiring banks Secure laptop access using user credentials Use Case Scenarios Limited to No Visibility to Data Whereabouts All-or-Nothing Encryption Restricts Business Process and Provides Unrestricted Access to Authorized Users Limited to No Visibility to Data Whereabouts All-or-Nothing Encryption Restricts Business Process and Provides Unrestricted Access to Authorized Users Risks

Step 2: Becoming Data Aware Data Consciousness Gaining Data Consciousness Data Consciousness Gaining Data Consciousness Data Awareness Become Data Aware Data Awareness Become Data Aware Data Blindness Understand Your Security Blindness Data-centric technologies that protect the data itself—database encryption, application encryption, file encryption, strong access control Intelligent, fine-grain encryption Comprehensive to protect all data types Persistent—policy is attached to data Selective, portable—user controlled Intelligent, fine-grain encryption Comprehensive to protect all data types Persistent—policy is attached to data Selective, portable—user controlled Protect structured data: CCs, SSNs, PII Protect unstructured data: spreadsheets, medical records in shared file servers Intelligent policies defined by users, data type (.doc,.xls), folder and directory, time, and # of encryption/decryption operations Protect structured data: CCs, SSNs, PII Protect unstructured data: spreadsheets, medical records in shared file servers Intelligent policies defined by users, data type (.doc,.xls), folder and directory, time, and # of encryption/decryption operations Technologies Policies Characteristic A controller needs to update a revenue report for the CEO before an earnings call—he selectively encrypts that specific file and sends it to the CEO (user controlled encryption) A Call Center encrypts only SSNs in patient records to allow service reps to support clients without gaining accessing to sensitive data An HR dept protects salary files ending in.doc in the Employee HR folder in the file server. To augment access control, HR admins require authen- tication to access encrypted HR files Use Case Scenarios

Content awareness, security information management, reporting Proactive, self-aware, pre-emptive Data-aware + proactive Proactive, self-aware, pre-emptive Data-aware + proactive Proactively monitor data flow, discover, and protect Align policies to business processes so sensitive data can move freely and is efficiently accessible to authorized users Proactively monitor data flow, discover, and protect Align policies to business processes so sensitive data can move freely and is efficiently accessible to authorized users Technologies Policies Characteristic Step 3: Gaining Data Consciousness Data Consciousness Gaining Data Consciousness Data Consciousness Gaining Data Consciousness Data Awareness Become Data Aware Data Awareness Become Data Aware Data Blindness Understand Your Security Blindness A Healthcare provider applies policies to auto-detect SSNs from patient medical records and encrypt them, even as new ones are created A Bank classifies executive bonuses, stock options, and SSNs to monitor and enforce protection, and applies intelligent access policies based on different user profiles in Finance & Acct Use Case Scenarios A security architect unifies the mgmt of authentication keys and encryption keys, using a single centralized platform as the universal key manager to provision key creation and key changes

Invest in Your Growth Data Consciousness Gaining Data Consciousness Data Consciousness Gaining Data Consciousness Data Awareness Become Data Aware Data Awareness Become Data Aware Data Blindness Understand Your Security Blindness Stages of Data Consciousness Get on the Path of Enlightenment

Intelligent Data Protection

Data Protection Evolution Architecture Authentication and Access Management Data Access Control and Management Data Protection Management Data Protection Infrastructure Structured and Unstructured Data From Creation, and While in Use/ Motion Across Applications, Mainframes, Databases, and Endpoints Key Life Cycle Management Policy Life Cycle Management Logging, Auditing, Reporting First, know your users and apply strong access control to secure access to sensitive data. Second, the design goal of a well designed data protection program = Secure centralized key management and policy life cycle management that provides visibility into who is logging into systems, creating & changing keys, automatic rotation of keys. The idea is greater visibility gives you more control over your data. Finally, apply enforcement points to where protection needs to happen—across databases, file servers, etc. and out to endpoints for both structured and unstructured data.

Data Protection Evolution Secure, Centralized Key Management Data-centric Policy Management Identity & Access Management Visibility via Logging, Auditing, Reporting Secure, Centralized Key Management Data-centric Policy Management Identity & Access Management Visibility via Logging, Auditing, Reporting Authentication and access management

Authentication Evolution Secure, Centralized Key Management Data-centric Policy Management Identity & Access Management Visibility via Logging, Auditing, Reporting Secure, Centralized Key Management Data-centric Policy Management Identity & Access Management Visibility via Logging, Auditing, Reporting

Thank You Zen and the Art of Data Protection Preparing for the Evolution Adel Hajrasuliha – Regional Account Manager ISSA Honolulu—October 2009