StorTech Security Regulatory compliance provides the business foundation for security Organisations need to tackle all security challenges from a business.

Slides:



Advertisements
Similar presentations
Unified Communications Bill Palmer ADNET Technologies, Inc.
Advertisements

Security and Control Soetam Rizky. Why Systems Are Vulnerable ?
COPYRIGHT © 2010 TECTIA CORPORATION. ALL RIGHTS RESERVED. Proactive Measures to Prevent Data Theft Securing, Auditing and Controlling remote.
Building Your Own Firewall Chapter 10. Learning Objectives List and define the two categories of firewalls Explain why desktop firewalls are used Explain.
Security Controls – What Works
Information Security Policies and Standards
The New World of Security for Business Travellers Anurag Lal Senior Vice President Strategic Services & Business Development Wi-Fi Business Development.
Lecture 10 Security and Control.
10.1 © 2006 by Prentice Hall 10 Chapter Security and Control.
Unified Logs and Reporting for Hybrid Centralized Management
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Exchange 2010 Overview Name Title Group. What You Tell Us Communication overload Globally distributed customers and partners High cost of communications.
Kaspersky Open Space Security: Release 2 World-class security solution for your business.
The Difficult Road To Cybersecurity Steve Katz, CISSP Security Risk Solutions Steve Katz, CISSP Security.
New Data Regulation Law 201 CMR TJX Video.
Resiliency Rules: 7 Steps for Critical Infrastructure Protection.
Chapter 8 Security and Control.
10.1 © 2006 by Prentice Hall 10 Chapter Security and Control.
1 Managed Security. 2 Managed Security provides a comprehensive suite of security services to manage and protect your network assets –Managed Firewall.
RSA Security Validating Users and Devices to Protect Network Assets Endpoint Solutions for Cisco Environments.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
1 Deployment of Computer Security in an Organization CE-408 Sir Syed University of Engineering & Technology 99-CE-282, 257 & 260.
Enterprise Computing Community June , 2010February 27, Information Security Industry View Linda Betz IBM Director IT Policy and Information.
Evolving IT Framework Standards (Compliance and IT)
PROJECT PAPER ON BLUEFIRE MOBILE SECURITY. BY PONNURU VENKATA DINESH KUMAR STUDENT ID # A0815 PROFESSOR – VICKY HSU CS-426.
Network Security Policy Anna Nash MBA 737. Agenda Overview Goals Components Success Factors Common Barriers Importance Questions.
Unify and Simplify: Security Management
What Keeps You Awake at Night Compliance Corporate Governance Critical Infrastructure Are there regulatory risks? Do employees respect and adhere to internal.
Surviving in a hostile world  The myth of fortress applications  Tomas Olovsson CTO, Appgate Professor at Goteborg University, Sweden.
Asset & Security Management Chapter 9. IT Asset Management (ITAM) Is the process of tracking information about technology assets through the entire asset.
Dell Connected Security Solutions Simplify & unify.
Security Professional Services. Security Assessments Vulnerability Assessment IT Security Assessment Firewall Migration Custom Professional Security Services.
Center of Excellence for IT at Bellevue College. Cyber security and information assurance refer to measures for protecting computer systems, networks,
StorTech Security Regulatory compliance provides the business foundation for security Organisations need to tackle all security challenges from a business.
Managing Data Against Insider Threats Dr. John D. Johnson, CISSP.
Protecting Your Business! SBA Ft. Lauderdale November 15, 2006 Gregory Levine, Sr. Director Marketing.
Alert Logic Provides a Fully Managed Security and Compliance Solution Based in the Cloud, Powered by the Robust Microsoft Azure Platform MICROSOFT AZURE.
CIO Perspectives on Security Fabrício Brasileiro Regional Sales Manager.
Identity Assurance Emory University Security Conference March 26, 2008.
UC Opportunities For Service Providers. Agenda Software + Services recap Services through SPLA –Exchange Hosted Services –Live Meeting –Dedicated Hosted.
Microsoft and Symantec
Global Infrastructure Tenets Strategic Value 1.Growth - Identify enabling technologies that can boost employee productivity and agility, bring products.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Chapter 3 Pre-Incident Preparation Spring Incident Response & Computer Forensics.
Sicherheitsaspekte beim Betrieb von IT-Systemen Christian Leichtfried, BDE Smart Energy IBM Austria December 2011.
RECLAIM CONTROL OF MOBILE AND DISTRIBUTED DATA January 13, 2016.
Enterprise Mobility Suite: Simplify security, stay productive Protect data and empower workers Unsecured company data can cost millions in lost research,
ProcessFrame QMS Is a Quality Management System that Supports ISO 9001:2015 Standard and Runs on the Microsoft Azure Cloud Platform MICROSOFT AZURE ISV.
Improve the Performance, Scalability, and Reliability of Applications in the Cloud with jetNEXUS Load Balancer for Microsoft Azure MICROSOFT AZURE ISV.
Managed IT Services JND Consulting Group LLC
LESSON 12 Business Internet. Electronic business, or e-business, is the application of information and communication technologies (ICT) in support of.
Securing Information Systems
Securing Information Systems
Cybersecurity - What’s Next? June 2017
AT&T Premises-Based Firewall Enhanced SBS Solution
Hybrid Management and Security
Securing Information Systems
Datacastle RED Delivers a Proven, Enterprise-Class Endpoint Data Protection Solution that Is Scalable to Millions of Devices on the Microsoft Azure Platform.
Druva inSync: A 360° Endpoint and Cloud App Data Protection and Information Management Solution Powered by Azure for the Modern Mobile Workforce MICROSOFT.
Dell Data Protection | Rapid Recovery: Simple, Quick, Configurable, and Affordable Cloud-Based Backup, Retention, and Archiving Powered by Microsoft Azure.
Chapter 10 Security and Control.
MICROSOFT AZURE ISV PROFILE: ONEBE
Protect Your Microsoft Azure Cloud Assets Against Inside and Outside Threats With Balabit’s Shell Control Box Privileged User Monitoring Solution Partner.
One-Stop Shop Manages All Technical Vendor Data and Documentation and is Globally Deployed Using Microsoft Azure to Support Asset Owners/Operators MICROSOFT.
Microsoft Data Insights Summit
IT Management, Simplified
Cloud Computing for Wireless Networks
Presentation transcript:

StorTech Security Regulatory compliance provides the business foundation for security Organisations need to tackle all security challenges from a business perspective Security & storage must be managed end-to-end Answering the “who, what, where, when & how” of information systems ensures compliance and improves operational efficiency

2007 Security Business Drivers Complexity, Compliance, Cost –Solutions need to balance IT Risk, Cost & Performance –Security needs to fit business needs The rise of the “Malicious Insider” Physical & Digital Convergence Targeted application threats – AJAX, VOIP Poisoned Websites Zero-Day Exploits

StorTech’s Security Engagement Survey –Check internal policies against compliance best practice –Assess vulnerabilities and threats across the entire network –Provide a vulnerability assessment report –Recommend remedial priorities –Produce remedial plan Solve –Comprehensive, multi-vendor solutions –Standalone or integrated offerings –Market-leading technologies Support –Full maintenance options –Ongoing vulnerability & compliance assessments Solve Support Survey

Compliance Regulations, like the World Cup, are coming here Standards/regulations are good –Increase business benefit –Decrease risk –Open up business opportunities –Ready for the future Why reinvent the wheel? PCI

Requirements Regulatory Data Protection Data Retention/Corp Gov National Security Legal Framework IPR Protection Who? What? Where? When? How? But, All Regulations are the Same.. Real World Events Identity Theft Financial Scandals Terrorist Threats Electronic Commerce SA Constitution

Information “At Rest” Information “On the Move” It All Starts With Identity…… Who? What? Corporate Governance Where? When? How? When? How? Where? What?

Who? – Strong Identity Management Centralised User Management Reduced or Single Sign-On Multi-Function Devices A single management console for all users. Centralised access management to applications, devices and locations. Full audit trail for compliance. Easy addition and removal of users. Centralised user control for all access. Identity Management system deals with password resets. Single authentication method can unlock all user access. Additional services can be added. Increases the business value of Strong Authentication.

What? - Perimeter Security Anti-VirusAnti-Spam Encryption Secure BackUp & Disaster Recovery Reduced Infection = Reduced Downtime Customer Protection Ensured 60% Reduction of Messaging Traffic Reduced Storage Overhead Faster Messaging = Increased Business Efficiency Secrecy & Non-Repudiation = More Electronic Use for Paper- Based Transactions Secure Electronic Transactions = Better Customer Experience Increased Availability = Reduced Downtime Ensured Compliance = Good Business Practice

Where? - End-Point Compliance Appliance Identification Centralised Management Policy Adherance Securely identifying the user is pointless if the remote device is insecure. Centrally managing end-points enables your business to allow more services remotely. More remote services increases overall efficiency. Increased efficiency gives a better customer experience. Users have different levels of access according to the device they are logging on from. Policy-based access according to business rules. Dictates the level of security for full remote access.

Where? – Mobile Security Smartphones & PDA’s Centralised Management Policy Adherance Phones, PDA’s and other devices are increasingly powerful and being used as business tools. They represent similar risks to businesses as traditional laptops and PC’s. They need to be protected in the same way. Mobile Security is managed centrally. This is both from a device management perspective as well as the deployment of client software. The system treats phones and remote devices in the same way as any remote computer. Users have different levels of access according to the device they are logging on from and the risk associated with that device.

When? - Time-Based Info Management Digital Verification Data Retention & Control Corporate Governance Digital signatures ensure that electronic transactions are secret, secure and tamper-proof. Ensuring secure electronic transactions means trusted electronic business. Defining the correct business policies means IP can be retained, leveraged and managed efficiently. Controlled destruction of expired data limits exponential storage growth. Defining good internal business policies limits an organisation’s exposure to expensive litigation. Clearly defining employee roles based on compliance ensures greater operational efficiency.

Secure Information Blueprint Symantec NetBackup/Backup Exec Symantec Cluster Server StorageTek Disk & Tape Internet Microsoft Exchange Messaging Security (Groupware) Storage Management Recovery and Availability Information Archiving Messaging Security (SMTP) Symantec Storage Foundation Symantec CommandCentral Sun GSM Symantec Enterprise VaultSymantec Mail Security/ Symantec IM Manager Symantec Mail Security Software/Appliances/Hosted IBM Notes/Domino SMTP Traffic MTA Identity Management RSA SecurID & Auth. Manager Symantec Sygate Sun IDM

Managed Security Services In Partnership with Symantec –1 st & 2 nd line support by StorTech locally, 3 rd line by Symantec Global SOC’s Managed Perimeter Security –AV, Anti-Spam, IDS, IPS Managed Identity –Strong authentication, IDM Secure Incident & Event Management –Management of user log files to detect & manage additional security threats –Reduction of false/positives –Greater efficiency for patch management –Tiered relevance for alerts according to the specific organisation