StorTech Security Regulatory compliance provides the business foundation for security Organisations need to tackle all security challenges from a business.

Slides:



Advertisements
Similar presentations
Unified Communications Bill Palmer ADNET Technologies, Inc.
Advertisements

Complete Event Log Viewing, Monitoring and Management.
Security and Control Soetam Rizky. Why Systems Are Vulnerable ?
© Hitachi Data Systems Corporation All Rights Reserved. Hitachi Data Systems File and Content Services Solutions Presented to (Contact name) (Customer.
E-Commerce Security Issues. General E-Business Security Issues Any E-Business needs to be concerned about network security. The Internet is a “ public.
11© 2011 Hitachi Data Systems. All rights reserved. HITACHI DATA DISCOVERY FOR MICROSOFT® SHAREPOINT ® SOLUTION SCALING YOUR SHAREPOINT ENVIRONMENT PRESENTER.
1 Archive Access Audit Keys to Effective Compliance Lifecycle Management.
Security Controls – What Works
Barracuda Backup Service Data Backup and Disaster Recovery.
Information Security Policies and Standards
The New World of Security for Business Travellers Anurag Lal Senior Vice President Strategic Services & Business Development Wi-Fi Business Development.
Insight Consulting Siemens Identity Management Survey Conducted April – June 2007 Info
Lecture 10 Security and Control.
10.1 © 2006 by Prentice Hall 10 Chapter Security and Control.
Unified Logs and Reporting for Hybrid Centralized Management
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Symantec Vision and Strategy for the Information-Centric Enterprise Muhamed Bavçiç Senior Technology Consultant SEE.
RSA SecurID November 10, 2005.
Exchange 2010 Overview Name Title Group. What You Tell Us Communication overload Globally distributed customers and partners High cost of communications.
Kaspersky Open Space Security: Release 2 World-class security solution for your business.
New Data Regulation Law 201 CMR TJX Video.
Chapter 8 Security and Control.
10.1 © 2006 by Prentice Hall 10 Chapter Security and Control.
1 Managed Security. 2 Managed Security provides a comprehensive suite of security services to manage and protect your network assets –Managed Firewall.
StorTech Security Regulatory compliance provides the business foundation for security Organisations need to tackle all security challenges from a business.
RSA Security Validating Users and Devices to Protect Network Assets Endpoint Solutions for Cisco Environments.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Global Capabilities Archiving – Designing from Top to Bottom Gary Brown Dimension Data.
Cloud Security Julian Lovelock VP, Product Marketing, HID Global.
Evolving IT Framework Standards (Compliance and IT)
1 Brett Roberts Director of Innovation | Microsoft NZ | 28 Aug 07 Technology and Privacy.
What Keeps You Awake at Night Compliance Corporate Governance Critical Infrastructure Are there regulatory risks? Do employees respect and adhere to internal.
STORAGE MANAGEMENT/ EXECUTIVE: Managing a Compliant Infrastructure Processes and Procedures Mike Casey Principal Analyst Contoural Inc.
1 CISCO SAFE: VALIDATED SECURITY REFERENCE ARCHITECTURE What It Is Business Transformation Top Questions To Ask To Initiate The Sale Where It Fits KEY.
Archiving s. How to Manage Auto-Archive in Outlook Your Microsoft Outlook mailbox grows as you create and receive items. To manage the space.
Electronic Records Management: A Checklist for Success Jesse Wilkins April 15, 2009.
Private Cloud: Manage Data Center Services Business Priorities Presentation.
2. Document Management Involves the receipt, tracking and storing of documents, images and multimedia files. Involves the receipt, tracking and storing.
CIO Perspectives on Security Fabrício Brasileiro Regional Sales Manager.
Business Productivity Infrastructure Optimization Campaign 1 Agenda: BPIO Partner Sales Readiness Workshop Day 3: Topic: Enterprise Content management.
Forefront – Security in Education Stephen Cakebread Security Solutions Sales Professional Microsoft Corporation.
UC Opportunities For Service Providers. Agenda Software + Services recap Services through SPLA –Exchange Hosted Services –Live Meeting –Dedicated Hosted.
Chapter 7 1Artificial Intelligent. OBJECTIVES Explain why information systems need special protection from destruction, error, and abuse Assess the business.
Microsoft and Symantec
Global Infrastructure Tenets Strategic Value 1.Growth - Identify enabling technologies that can boost employee productivity and agility, bring products.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Sicherheitsaspekte beim Betrieb von IT-Systemen Christian Leichtfried, BDE Smart Energy IBM Austria December 2011.
RECLAIM CONTROL OF MOBILE AND DISTRIBUTED DATA January 13, 2016.
Enterprise Mobility Suite: Simplify security, stay productive Protect data and empower workers Unsecured company data can cost millions in lost research,
Improve the Performance, Scalability, and Reliability of Applications in the Cloud with jetNEXUS Load Balancer for Microsoft Azure MICROSOFT AZURE ISV.
10.1 © 2006 by Prentice Hall 10 Chapter Security and Control.
LESSON 12 Business Internet. Electronic business, or e-business, is the application of information and communication technologies (ICT) in support of.
Securing Information Systems
Securing Information Systems
Your Office 365 Journey Prepare, Migrate, and Operate with Barracuda
Dell Compellent and SafeNet KeySecure
AT&T Premises-Based Firewall Enhanced SBS Solution
Hybrid Management and Security
Chapter 17 Risks, Security and Disaster Recovery
Advanced Security Architecture for System Engineers Cisco Dumps Get Full Exam Info From: /cisco-question-answers.html.
Securing Information Systems
Datacastle RED Delivers a Proven, Enterprise-Class Endpoint Data Protection Solution that Is Scalable to Millions of Devices on the Microsoft Azure Platform.
Druva inSync: A 360° Endpoint and Cloud App Data Protection and Information Management Solution Powered by Azure for the Modern Mobile Workforce MICROSOFT.
Dell Data Protection | Rapid Recovery: Simple, Quick, Configurable, and Affordable Cloud-Based Backup, Retention, and Archiving Powered by Microsoft Azure.
Chapter 10 Security and Control.
Security Insights: Secure Messaging
Cloud Computing for Wireless Networks
Presentation transcript:

StorTech Security Regulatory compliance provides the business foundation for security Organisations need to tackle all security challenges from a business perspective Security & storage must be managed end-to-end Answering the “who, what, where, when & how” of information systems ensures compliance and improves operational efficiency

StorTech’s Security Engagement Survey –Check internal policies against compliance best practice –Assess vulnerabilities and threats across the entire network –Provide a vulnerability assessment report –Recommend remedial priorities –Produce remedial plan Solve –Comprehensive, multi-vendor solutions –Standalone or integrated offerings –Market-leading technologies Support –Full maintenance options –Ongoing vulnerability & compliance assessments Solve Support Survey

Compliance Regulations, like the World Cup, are coming here Standards/regulations are good –Increase business benefit –Decrease risk –Open up business opportunities –Ready for the future Why reinvent the wheel? PCI

Requirements Regulatory Data Protection Data Retention/Corp Gov National Security Legal Framework IPR Protection Who? What? Where? When? How? But, All Regulations are the Same.. Real World Events Identity Theft Financial Scandals Terrorist Threats Electronic Commerce SA Constitution

Information “At Rest” Information “On the Move” It All Starts With Identity…… Who? What? Corporate Governance Where? When? How? When? How? Where? What?

Who? – Strong Identity Management Centralised User Management Reduced or Single Sign-On Multi-Function Devices A single management console for all users. Centralised access management to applications, devices and locations. Full audit trail for compliance. Easy addition and removal of users. Centralised user control for all access. Identity Management system deals with password resets. Single authentication method can unlock all user access. Additional services can be added. Increases the business value of Strong Authentication.

What? - Perimeter Security Anti-VirusAnti-Spam Encryption Secure BackUp & Disaster Recovery Reduced Infection = Reduced Downtime Customer Protection Ensured 60% Reduction of Messaging Traffic Reduced Storage Overhead Faster Messaging = Increased Business Efficiency Secrecy & Non-Repudiation = More Electronic Use for Paper- Based Transactions Secure Electronic Transactions = Better Customer Experience Increased Availability = Reduced Downtime Ensured Compliance = Good Business Practice

Where? - End-Point Compliance Appliance Identification Centralised Management Policy Adherance Securely identifying the user is pointless if the remote device is insecure. Centrally managing end-points enables your business to allow more services remotely. More remote services increases overall efficiency. Increased efficiency gives a better customer experience. Users have different levels of access according to the device they are logging on from. Policy-based access according to business rules. Dictates the level of security for full remote access.

When? - Time-Based Info Management Digital Verification Data Retention & Control Corporate Governance Digital signatures ensure that electronic transactions are secret, secure and tamper-proof. Ensuring secure electronic transactions means trusted electronic business. Defining the correct business policies means IP can be retained, leveraged and managed efficiently. Controlled destruction of expired data limits exponential storage growth. Defining good internal business policies limits an organisation’s exposure to expensive litigation. Clearly defining employee roles based on compliance ensures greater operational efficiency.

Secure Information Blueprint Symantec NetBackup/Backup Exec Symantec Cluster Server StorageTek Disk & Tape Internet Microsoft Exchange Messaging Security (Groupware) Storage Management Recovery and Availability Information Archiving Messaging Security (SMTP) Symantec Storage Foundation Symantec CommandCentral Sun GSM Symantec Enterprise VaultSymantec Mail Security/ Symantec IM Manager Symantec Mail Security Software/Appliances/Hosted IBM Notes/Domino SMTP Traffic MTA Identity Management RSA SecurID & Auth. Manager Symantec Sygate Sun IDM