ETrust End to End Security Management Bernd Dultinger Sales Manager South CEE & Turkey.

Slides:



Advertisements
Similar presentations
Unified Communications Bill Palmer ADNET Technologies, Inc.
Advertisements

THE BUSINESS NEED Create affordable alternative/ provide enterprise power/capability for any-sized company Reduce resource-draining burden of meeting.
2  Industry trends and challenges  Windows Server 2012: Modern workstyle, enabled  Access from virtually anywhere, any device  Full Windows experience.
BalaBit Shell Control Box
© 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential 14854_10_2008_c1 1 Holistic Approach to Information Security Greg Carter, Cisco Security.
Misys Treasury & Capital Markets
Introducing WatchGuard Dimension. Oceans of Log Data The 3 Dimensions of Big Data Volume –“Log Everything - Storage is Cheap” –Becomes too much data –
Privileged Identity Management Enterprise Password Vault
The Most Analytical and Comprehensive Defense Network in a Box.
CA: A New Step into Security Management.  eBusiness = business  A cultural shift — security is a part of the business fabric  Security is prevention.
Benefits of CA Technology & HVB Bank Romania Study Case Bucharest, May 31, 2005.
Preventing Good People From Doing Bad Things Best Practices for Cloud Security Brian Anderson Chief Marketing Officer & Author of “Preventing Good People.
The Business Value of CA Solutions Ovidiu VALEANU Senior Consultant DNA Software – CA Regional Representative.
Securing Remote Network Access FirePass ®. Business Case VirginiaCORIS is an initiative to modernize the way that offender information is managed, to.
Security Controls – What Works
Enterprise security How to bring security transparency into your organization ISSA EDUCATIONAL SESSION Nicklaus Schleicher, VP Support & Customer Service.
© Copyright Lumension Security Lumension Security PatchLink Enterprise Reporting™ 6.4 Overview and What’s New.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Rethinking Security to Enable Business LJ Johnson Nike’s Global Information Security Officer August 16, 2005.
Identity and Access Management: Strategy and Solution Sandeep Sinha Lead Product Manager Windows Server Product Management Redmond,
Identity and Access Management — at the Core of Business Andrew A. Afifi, M.Sc. Network Security, CISSP Technology Strategist.
Demonstrating IT Relevance to Business Aligning IT and Business Goals with On Demand Automation Solutions Robert LeBlanc General Manager Tivoli Software.
Customized solutions. Keep It Secure Contents  Protection objectives  Endpoint and server software  Protection.
© Centrify Corporation. All Rights Reserved. Unified Identity Management across Data Center, Cloud and Mobile.
Security Risk Management Marcus Murray, CISSP, MVP (Security) Senior Security Advisor, Truesec
Governance, Risk, and Compliance Bill Greene Senior Industry Director.
1Cisco Security NOW © 2003, Cisco Systems, Inc. All rights reserved. THIS IS THE POWER OF CISCO SECURITY. now.
Computer Associates Solutions Managing eBusiness Catalin Matei, April 12, 2005
Mobility Without Vulnerability: Secure and Enable Your Mobile Users, Apps, and Devices David Clapp – Intuitive.
Identity and Access Management Dustin Puryear Sr. Consultant, Puryear IT, LLC
1 Managed Security. 2 Managed Security provides a comprehensive suite of security services to manage and protect your network assets –Managed Firewall.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
No one questions that Microsoft can write great software. Customers want to know if we can be innovative, scalable, reliable in the cloud. (1996) 450M+
SecureAware Building an Information Security Management System.
Unify and Simplify: Security Management
HIPAA COMPLIANCE WITH DELL
1. Windows Vista Enterprise And Mid-Market User Scenarios 2. Customer Profiling And Segmentation Tools 3. Windows Vista Business Value And Infrastructure.
The Most Analytical and Comprehensive Defense Network in a Box.
Preparing your Fabric & Apps for Windows Server 2003 End of Support Jeff Woolsey Principal Program Manager.
Dell Connected Security Solutions Simplify & unify.
User Manager Pro Suite Taking Control of Your Systems Joe Vachon Sales Engineer November 8, 2007.
Asif Jinnah Microsoft IT – United Kingdom. Security Challenges in an ever changing landscape Evolution of Security Controls: Microsoft’s Secure Anywhere.
1 CISCO SAFE: VALIDATED SECURITY REFERENCE ARCHITECTURE What It Is Business Transformation Top Questions To Ask To Initiate The Sale Where It Fits KEY.
Alert Logic Security and Compliance Solutions for vCloud Air High-level Overview.
Complete Security. Threats changing, still increasing Data everywhere, regulations growing Users everywhere, using everything We’re focused on protecting.
The Infrastructure Optimization Journey Kamel Abu Ayash Microsoft Corporation.
TeamCluster Project Real time project management solutions Harry Hvostov April 27, 2002.
Alert Logic Security and Compliance Solutions for vCloud Air High-level Overview.
Network security Product Group 2 McAfee Network Security Platform.
Terminal Services Technical Overview Olav Tvedt TVEDT.info Microsoft Speaker Community
Network Perimeter Defense Josef Pojsl, Martin Macháček, Trusted Network Solutions, Inc.
Forefront – Security in Education Stephen Cakebread Security Solutions Sales Professional Microsoft Corporation.
Managed Support CSM Event – 1 st June Steven Grier Premier Support Manager Premier Support.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
ARAMA TECH D A T A P R O T E C T I O N P R O F E S S I O N A L S VISION & STRATEGY.
Infrastructure for the People-Ready Business. Presentation Outline POINT B: Pro-actively work with your Account manager to go thru the discovery process.
Sicherheitsaspekte beim Betrieb von IT-Systemen Christian Leichtfried, BDE Smart Energy IBM Austria December 2011.
Illinois Health Network The 14th Global Grid Forum Chicago, Illinois June 27, 2005.
Cloud, big data, and mobility Your phone today probably meets the minimum requirements to run Windows Server 2003 Transformational change up.
© 2011 IBM Corporation IBM Security Services Smarter Security Enabling Growth and Innovation Obbe Knoop – Security Services Leader Pacific.
Agenda Current Network Limitations New Network Requirements About Enterasys Security Branch Office Routers Overall Enterprise Requirements Proposed Solution.
SYMANTEC ENDPOINT SECURITY SERVICE PROVIDERS | ALLIANCE PRO IT HYDERABAD (CORPORATE OFFICE) ALLIANCE PRO IT PRIVATE LIMITED, 3A, HYNDAVA TECHNO PARK, TECHNO.
SYMANTEC ENDPOINT SECURITY SERVICE PROVIDERS | ALLIANCE PRO IT HYDERABAD (CORPORATE OFFICE) ALLIANCE PRO IT PRIVATE LIMITED, 3A, HYNDAVA TECHNO PARK, TECHNO.
Governance, Risk, and Compliance Bill Greene Senior Industry Director
Secure & Unified Identity
2018 Real Cisco Dumps IT-Dumps
11/17/2018 9:32 PM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
Identity & Access Management
Presentation transcript:

eTrust End to End Security Management Bernd Dultinger Sales Manager South CEE & Turkey

1 st Generation Gates, Guns, Guards Evolution of Security Complexity/Management Time Security Today 2 nd Generation Reactive Security 3 rd Generation Security as an Enabler 4 th Generation Proactive Security and Accountability

Market Dynamics  Risk is higher than ever  Doing more with less “still”  Accountability is key  Fragmented security market  Lack of integration

Key challenges  Vulnerabilities and viruses are out of control  Patch Management  SPAM is impacting our effectiveness  Costly to manage user accounts  Too much data, not enough information  Need to demonstrate regulatory compliance (HIPAA, Sarbanes-Oxley Act, Basel II, and so on)

CA Security Management Vision  Deliver security management solutions  Enable proactive management of an entire security environment  Allowing customers to focus on their business  Be the trusted advisor in security management  Partner with customers to achieve business efficiencies  Ensure continuous business operations  Comply with security policies and regulations  Reduce overall security risks

CA eTrust ™ Security Management  Security Management  Who has access to what?  What is happening in your environment?  What should be done about it?  Enabled by world-class research team  Integration with Network and Systems management  On-Demand Security Management

eTrust Product Strategy  C omplete  I ntegrated  O pen

All the Security Management software you need  Identity & Access Management  Threat management  Security Information Management  Identity & Access Management  Threat management  Security Information Management Supporting the Full IT Stack  PDA  Desktop  Gateway  Server  Mainframe  PDA  Desktop  Gateway  Server  Mainframe Across all of your Major Operating Systems  Microsoft  Linux  Unix  zOS  Palm  Microsoft  Linux  Unix  zOS  Palm Complete  Who has access to what?  What is happening in your environment?  What should be done about it?  Who has access to what?  What is happening in your environment?  What should be done about it? To Answer All of the Questions

Integrated  Integrated with 3 rd party software  Integrated Product Suites  User Interface  Functional  Repository  Auditing  Security Process Views  Integrated Management Software

Open and Flexible  Manage other security software  Modular Suites  Built on standards  We drive standards & we support standards  SPML, UDDI, LDAP, SAML, Liberty, OSE, etc  Flexible pricing  Mapping to how the customer sees the value

CA eTrust ™ Security Management

At the Core of your Business eTrust Identity & Access Management Key Solutions  eTrust Access Control  eTrust Admin  eTrust CA-ACF2  eTrust CA-Top Secret  eTrust Clean-up  eTrust Directory  eTrust SSO  eTrust Web Access Control Complementary Technologies  eTrust Security Command Center

Identity-Sphere Complete Identity Visualization

User & Role Management

Policy-based Management Server Access Management Policy

End user self management

Workflow

eTrust Threat Management Proactively Managing Threats Key Solutions  eTrust Antivirus  eTrust PestPatrol  eTrust Examine  eTrust EZ Armor  eTrust Intrusion Detection  eTrust Secure Content Manager  eTrust Vulnerability Manager Complementary Technologies  eTrust Security Command Center

eTrust Threat Research Team Backed by 24x7 Global Research Team

eTrust Security Information Management Enabling the right decisions at the right time Key Solutions  eTrust 20/20  eTrust Network Forensics  eTrust Security Command Center Complementary Technologies  eTrust Vulnerability Manager

Security Information Management

VPN Traffic Events Overlay Intrusion Detection System Alerts Blocked Firewall Traffic Visual Event Correlation

eTrust Customers  HVB Bank Romania  Interamerican  Omniasig  Cesarom  Cargus  and many more

eTrust End to End Security Management