Data Protection & Security

Slides:



Advertisements
Similar presentations
2  Industry trends and challenges  Windows Server 2012: Modern workstyle, enabled  Access from virtually anywhere, any device  Full Windows experience.
Advertisements

Windows Server 2012 R2 Capabilities for BYOD Scenario Yuri Diogenes Senior Knowledge Engineer Data Center, Devices & Enterprise Client – CSI Team’s Page:
Mobility Without Vulnerability: Secure and Enable Your Mobile Users, Apps, and Devices David Clapp – Intuitive.
1 Managed Security. 2 Managed Security provides a comprehensive suite of security services to manage and protect your network assets –Managed Firewall.
Market Trends Enterprise Web Applications Cloud Computing SaaS Applications BYOD Data Compliance Regulations 30 Second Elevator Pitch Web browsers have.
© Copyright 2011 Hewlett-Packard Development Company, L.P. 1 Sundara Nagarajan (“SN”) CLOUD SYSTEMS AUTOMATION.
Market reaction to consumerization ““…pressure from users to support non IT-procured, or individual liable devices whilst still providing convenient.
Dell Connected Security Solutions Simplify & unify.
Security considerations for mobile devices in GoRTT
CIO Perspectives on Security Fabrício Brasileiro Regional Sales Manager.
Access and Information Protection Product Overview Andrew McMurray Technical Evangelist – Windows
LIMPOPO DEPARTMENT OF ECONOMIC DEVELOPMENT, ENVIRONMENT AND TOURISM The heartland of southern Africa – development is about people! 2015 ICT YOUTH CONFERENCE.
RECLAIM CONTROL OF MOBILE AND DISTRIBUTED DATA January 13, 2016.
Vodafone Business Cloud
Complete Cloud Security Anyone, anywhere, any app, any device.
Novell iFolder Novell Academy QuickTrain. What is iFolder? Novell iFolder lets users’ files follow them anywhere A simple and secure way to access, organize.
Best-in-class enterprise backup for the mobile enterprise Prepared for [Insert customer name] [Date}
Dell Software Unified Communications Command Suite (UCCS) Provides Flexible, Cross-Platform Management, Reporting and Data Diagnostics MICROSOFT AZURE.
Commvault and Nutanix October Changing IT landscape Today’s Challenges Datacenter Complexity Building for Scale Managing disparate solutions.
Copyright © 2014 Oracle and/or its affiliates. All rights reserved. |1 Accelerate Your Digital Transformation Innovate, Integrate, Collaborate #paas.
Clouding with Microsoft Azure
Your Office 365 Journey Prepare, Migrate, and Operate with Barracuda
Leverage the Cloud to Minimize the Impact of Ransomware
Device Maintenance and Management, Parental Control, and Theft Protection for Home Users Made Easy with Remo MORE and Power of Azure MICROSOFT AZURE APP.
Chapter 6: Securing the Cloud
A Shift in the Data Security Paradigm
3 Do you monitor for unauthorized intrusion activity?
Organizations Are Embracing New Opportunities
COMPANY PROFILE: CORENT TECHNOLOGY INC.
What is it ? …all via a single, proven Platform-as-a-Service.
Transforming business
Cloud adoption NECOOST Advisory | June 2017.
Barracuda Networks Creates Next-Generation Security Solutions That Enable Customers to Accelerate Their Adoption of Microsoft Azure MICROSOFT AZURE APP.
92% of the world’s data was created in the past 2 years
Hybrid Management and Security
Microsoft Operations Management Suite Insight and Analytics
Vidcoding Introduces Scalable Video and TV Encoding in the Cloud at an Affordable Price by Utilizing the Processing Power of Azure Batch MICROSOFT AZURE.
Customized Solutions to your needs
Gather Valuable Customer Data
SMS+ on Microsoft Azure Provides Enhanced and Secure Text Messaging, with Audit Trail, Scalability, End-to-End Encryption, and Special Certifications MICROSOFT.
Wonderware Online Cost-Effective SaaS Solution Powered by the Microsoft Azure Cloud Platform Delivers Industrial Insights to Users and OEMs MICROSOFT AZURE.
Virtual Private Network (VPN) Market
Intelledox Infiniti Helps Organizations Digitally Transform Paper and Manual Business Processes into Intuitive, Guided User Experiences on Azure MICROSOFT.
Customer Services Single view of the customer, enabling wide variety of customer requests to be dealt with at the point of contact Self-Service Portal.
Logsign All-In-One Security Information and Event Management (SIEM) Solution Built on Azure Improves Security & Business Continuity MICROSOFT AZURE APP.
Voice Analytics on Microsoft Azure Allows Various Customers to Get the Most Out of Conversations with Clients Through Efficient Content Analysis MICROSOFT.
On-Premises, or Deployed in a Hybrid Environment
Data Security for Microsoft Azure
Access and Information Protection Product Overview October 2013
Unitrends Enterprise Backup Solution Offers Backup and Recovery of Data in the Microsoft Azure Cloud for Better Protection of Virtual and Physical Systems.
Datacastle RED Delivers a Proven, Enterprise-Class Endpoint Data Protection Solution that Is Scalable to Millions of Devices on the Microsoft Azure Platform.
Druva inSync: A 360° Endpoint and Cloud App Data Protection and Information Management Solution Powered by Azure for the Modern Mobile Workforce MICROSOFT.
Searchable. Secure. Simple.
Crypteron is a Developer-Friendly Data Breach Solution that Allows Organizations to Secure Applications on Microsoft Azure in Just Minutes MICROSOFT AZURE.
Dell Data Protection | Rapid Recovery: Simple, Quick, Configurable, and Affordable Cloud-Based Backup, Retention, and Archiving Powered by Microsoft Azure.
Securing the Threats of Tomorrow, Today.
MICROSOFT AZURE ISV PROFILE: ONEBE
Cloud Analytics for Microsoft Azure
Media365 Portal by Ctrl365 is Powered by Azure and Enables Easy and Seamless Dissemination of Video for Enhanced B2C and B2B Communication MICROSOFT AZURE.
Cloud Consulting Services and Solutions
BluSync by ParaBlu Offers Secure Enterprise File Collaboration and Synchronization Solution That Uses Azure Blob Storage to Enable Secure Sharing MICROSOFT.
Enterprise Data Solution Running on the Azure Cloud Platform Protects, Preserves Critical Data “Druva takes a proactive approach to help customers address.
2/25/2019.
The People Ready Vision for Business in the Enterprise
4/9/ :42 PM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
System Center Marketing
3 Do you monitor for unauthorized intrusion activity?
© 2016 Global Market Insights, Inc. USA. All Rights Reserved Fuel Cell Market size worth $25.5bn by 2024 Low Power Wide Area Network.
3 Do you monitor for unauthorized intrusion activity?
Microsoft Virtual Academy
Presentation transcript:

Data Protection & Security Nizar Elfarra

Today’s Overview Industry trends Security & Protection How Can We Help

Industry Trends

Infrastructure (R)evolution Challenges Faced Business Challenges Budget Constraints More Data More Workloads Lines of Business Owner Demands Service Providers Cloud SaaS Mobile Data Center Infrastructure (R)evolution There is an infrastructure evolution taking place in today’s marketplace. Business Challenges There is continued pressure on IT budgets to do more with less, yet still somehow drive innovation. Data is being created with greater volume and variety than ever before, and the value associated with that data is at an all time high. Add to this the Lines of Business themselves driving much more dynamic business requirements, increased IT expectations, and expanded SLAs. Infrastructure Now let’s look to the technology space itself which is increasingly disruptive and challenging the traditional IT strategies and tactics. There is so much noise in the market place and so many new or varied technologies that it is a challenge to identify which trends to follow, which to ignore, and which to get ahead of. Businesses as a whole now have to evolve to accommodate expanding their data footprints beyond their 4 walls and into the cloud, XaaS providers, and also deal with the increased consumerization of IT (BYOD, etc). Commvault In the midst of all this chaos sits Commvault. Organically developed as a single, unified platform that allows organizations the agility to adapt to the ebb and flow of their business needs and data requirements. The software solution delivers across 9 different focus areas of business need: Application Data Management Enterprise Backup and Recovery Virtualized Data Center Solutions Cloud Data Solutions Search & Discovery Information Management & Governance Endpoint Security & Protection Big Data Clinical/Healthcare All of these running as parts of the same code allowing unprecedented scalability in not just size (TBs  PBs), but in functionality. All without the need to stand up what would otherwise be multiple disparate siloes to address these areas. Wrap around this Commvault Consulting and Managed services, and you have a complete solution for the enterprise that is delivered and/or managed to meet your needs and expectations.

Digital Transformation and the Internet of Things Forces fueling the move to the cloud Explosion of Digital Data …of all digital data ever created was created in the last 2 years. Source: Sintef ITC 90% Cloud Usage on the Rise …of organizations are managing some of their data in cloud infrastructure. Source: IDC 70% Connected Devices Skyrocketing Source: Gartner …things could be connected to the Internet by 2020, about 5.5 million devices added every day. 20.8 BILLION 5

Private Cloud / Hybrid Cloud Market Opportunity Cloud Agility Enterprise Control 18% 25% -8% 2013-2018 CAGR Self - Service Budget Controls Rapid Start / Stop Access Controls Standard Interface Policy Enforcement Pay for Use Reporting Source: Gartner

The Disappearing Datacenter Increased Hybridization of Workloads The thin line between your traditional 4 walls and the cloud are very quickly greying. The need for agility continues to increase as data flows between various locations, media, and frameworks throughout its lifecycle. The Cloud Computing Scenario: Cloud — the Last 10 and the Next 10 Years ·       Cloud is becoming less of a "disruptor" as it gets more adopted. ·       According to Gartner, cloud is not about cost savings anymore; it is not cheap. ·       Gartner sees the enterprise use of public cloud and SaaS resources are accelerating and becoming more strategic. ·       Gartner predicts: Hybrid will dominate for many years, there will not be one cloud and PaaS will become more pervasive. Heterogeneous cloud strategy

Security & Protection

Security Concerns Ransomware on the rise Protecting blockchain & cryptocurrency Unauthorized access within the organization Mobile workforce & corporate data on endpoints Personal devices used to access corporate data Use of free file sharing service Data and compliance breach due to laptop loss or theft Risk associated with end point and cloud based data Current user security practices will not pass a compliance audit

Security Requirements

Data Access & Control Secure Access from Anywhere Secure, easy to manage access from browser or mobile devices Access Control Capture Knowing who should an can have access to data stored App Aware Security & Authentication Enabled across different access points (web or mobile)

Cloud & Network Security Multi-Tenancy Segregating data at all times Secure Communication SSL communications between systems Client Certification All systems require certification to authenticate the connections Firewalls Blocked unauthorized access to network resources

Data Encryption Data in transit & data at rest 256 bit key encryption Encryption Key Management FIPS certifications FIPS 140-1 and FIPS 140-2

Auditing, Monitoring & Analytics Full Auditing Ability to provide audit trails for the data being stored, deleted and accessed Log Monitoring Ability to monitor, capture and interpret log file data of user access Log Analytics Ability to forensically review logs from the time of a data breach to be able to prevent it

Data Governance & Compliance Data Residency Ability to view and access data is in an organization eDiscovery, Compliance & Legal Hold Ability to view, search, discovery and preserve selected data owned by the organization Remote Wipe Mitigating breaches by remotely wipe data in case of a lost endpoint device Data Privacy Ability to local a service providers ability to view and access their data Also Relevant for GDPR

What To Do

We Can Help Ransomware Detection & Recovery Data Protection Prevent & Detect Ransomware Detection & Recovery Flag suspect processes that read a lot of files in a short period by setting up ‘honey pots’ Recover from a clean offline backup Data Protection Setting up the right backup and DR policies Creating clean offline copies User Data Segregation Multi-tenancy – User can access only their data, preserving user privacy and segregation at all times Secure Communications Encrypt data during transit and at rest Monitoring & Auditing Setting policies, generating reports and triggering alerts to warn and prevent unauthorized access Stop Infection Spread Recovery & DR Strategy