Download presentation
Presentation is loading. Please wait.
Published byRandolf Washington Modified over 9 years ago
1
1 Go to View/Master/Slide Master to type in header Propelling Business Growth With A Secure And Continuous Information Infrastructure Jon Murray
2
2 Go to View/Master/Slide Master to type in header Information: Change in Multiple Dimensions information growth information types information uses information regulations more regulations: SEC 17a-4, NASD 3010,Sarbanes-Oxley, Basel II, UK Metadata, eSign Act, 21 CFR Part 11 (more coming!) more growth: information stored on disk arrays growing ~60% in 2006 more uses: ERP, CRM, RFID, collaboration, data mining, discovery … more types: transactions, documents, forms, web, images, voice, messages, reports...
3
3 Go to View/Master/Slide Master to type in header Customers’ Information Storage and Management Challenges CIO’s Dilemma: How to manage all the information growth with limited resources? Information stored on disk arrays ~ 70% IT budget growth ~ 4 - 5% IT environment getting more complex SLA’s continue to expand and tighten Protection and security increasingly important
4
4 Go to View/Master/Slide Master to type in header 2006 Technology Spending Priorities–CIO Survey Source: Morgan Stanley November CIO Survey, Jan. 3, 2006 1. Security (Software) 2. Security (HW & Services) 3. Storage Area Networks 4. Wireless LAN (access points & routers) 5. Storage Software 6. Portal Software 7. VOIP Infrastructure 8. IT Education and Training 9. Storage Hardware 10. Business Intelligence Software 11.Wireless LAN (clients) 12.New Custom Development 13.Routing 14.Systems Management Software 15.Application Integration Software 16.Notebook PCs 17.Document Management Software 18.Automated Testing Tool 19.Microsoft Office Upgrade 20.Application Software Server 45.Mainframe hardware 46.Printers
5
5 Go to View/Master/Slide Master to type in header Security Today An Amalgamation of Point Products Across IT Antivirus Anitvirus VPN Encryption Authentication Web Filtering Authentication Threat Detection Change/Patch Management LAN Clients Servers SAN Disk Storage Tape Spyware Firewall Digital Rights Management Encryption Vault Recovery Management Authentication
6
6 Go to View/Master/Slide Master to type in header Today’s Approach: Secure the Perimeter
7
7 Go to View/Master/Slide Master to type in header Security Tomorrow: Protect the Information
8
8 Go to View/Master/Slide Master to type in header Security Must Become Information-Centric Information-centric Security –An inside-out view of how to secure information Begins with securing the data itself Moves out through layers of increasingly intelligent infrastructure Relies on our ability to leverage the interaction between data and infrastructure Important Technology Data-level access control Open policy decision points Enforcement at point of use
9
9 Go to View/Master/Slide Master to type in header Information Security (Confidentiality) Information Security Information Security Information Availability Information Confidentiality Information Integrity EMC’s Heritage Protection and A Natural and Requested Evolution of EMC’s Data Protection Capabilities
10
10 Go to View/Master/Slide Master to type in header EMC’s Security Efforts to Date CEO-level Mandate Information Security Leadership Team Company-wide Goals and Objectives Security-related Workshops, Assessments EMC Vulnerability Alert Service Documentum Trusted Content Services EMC Secure Remote Support Data Erasure Service DRM for ECM Software-native Encryption –Retrospect and NetWorker Data Encryption through EMC Select Dedicated Focus Security of Offering Comprehensive Information Protection
11
11 Go to View/Master/Slide Master to type in header ID and Access Management Threat Management Encryption Secure Content Vulnerability Management EMC Security Mission ApplicationsInformationPeopleSystems Security Services Patching Vulnerability Assessment Security Risk Management Security Configuration Security Event Management / Managed Security Intrusion Detect / Prevent Firewall / VPN Threat Appliances Anti-Virus/Malware Secure Messaging Web Filtering Encryption File / Database Security Digital Rights Mgmt Authentication Authentication Mgmt Authentication Authentication Mgmt Provisioning End-to-End Information Security Management EMC ISM
12
12 Go to View/Master/Slide Master to type in header EMC’s Information-Centric Approach to Security EMC Strategy Expose key native capabilities Repurpose existing technologies for security “use cases” Develop new products, solutions, and service offerings Partner and acquire to complete portfolio 12 Information Security Management (ISM) Information Security is an end-to-end challenge To be most effective, security capabilities must be integrated with the information infrastructure All security offerings need to be interoperable and open
13
13 Go to View/Master/Slide Master to type in header EMC Retrospect EMC Networker EMC Secure Remote Support EMC Documentum Trusted Content Services VMware Assured Computing Environment Digital Rights Management (with partners) What is Happening with Information Security ? Hard to know where to start define requirements establish services catalog identify gaps create plan monitor effectiveness hardware NeoScale Decru Kasten Chase Cipheroptics software Storage Security Assessment Service SAN Security Best Practices NAS Security Best Practices Data Erasure Services services
14
14 Go to View/Master/Slide Master to type in header Secure Content Management ACLs MACL EAL4 Common Criteria Testing 2 Trusted Content Services Information Object
15
15 Go to View/Master/Slide Master to type in header ESG Strategy for Enterprise Archiving Retain Migrate Discover Common Archiving Record and Storage (CARS) Secure, scalable, and unified archive for all types of content Rich Media Email / IM Desktop & File System SharePoint Web Paper Applications & Reports Classify
16
16 Go to View/Master/Slide Master to type in header New Architecture for Backup, Recovery, and Archive Extract valuable information to archive –Increases performance of production applications –Improves TCO through use of tiered storage –Recovers capacity on Tier 1 resources Back up active production information –Backup window reduced or eliminated –Higher reliability, greater likelihood of full backups Retrieve from archive or recover from backup –Restore requests are faster –Information that was once offline is now online via archive Archive process Recovery process Production
17
17 Go to View/Master/Slide Master to type in header Backup and Archive are Different BackupArchive A secondary copy of informationPrimary copy of information Used for recovery operationsAvailable for information retrieval Improves availability by enabling application to be restored to point in time Adds operational efficiencies by moving fixed / unstructured content out of operational environment Typically short-term (weeks or months) Typically long-term (months, years, or decades) Data typically overwritten on periodic basis (e.g., monthly) Data typically maintained for analysis, value generation, or compliance Not for regulatory compliance— though some are forced to use Useful for compliance and should take into account information-retention policy
18
18 Go to View/Master/Slide Master to type in header Continuity Reduce Total Cost Improve Business Value Minimize under-protection Flexibility to change Improving productivity Eliminate over-protection Simplified environment Consolidated continuity
19
19 Go to View/Master/Slide Master to type in header Continuity Challenge: The Common Current State Not protected Under- protected Different requirements Different technologies Different processes Over- protected Continuity Issues Survive a disaster Achieve high availability Prevent data corruption Non-disruptively upgrade software and/or hardware Do parallel processing Move and migrate data Restart the enterprise Protect remote data sites Shorten backup and restore times Contain costs Cannot add resources Pain Points Inconsistent service levels Gaps in coverage Growth in complexity and effort Growth in cost and risk to the business Continuity Defined: Ensuring applications and data are available during planned and unplanned outages.
20
20 Go to View/Master/Slide Master to type in header CDP to Disk SECONDS HOURS/ MINUTES Backup to Disk Backup to Tape DAYS/ HOURS Snap / Clone MINUTES/ SECONDS Operational Effectiveness Decreased Recovery Time / Increased Recovery Point Granularity Information Protection is Evolving Beyond Tape Backup… Replication < SECONDS Common Recovery Management Services Automated and Simplified Management Disaster Recovery, Operational Recovery, and Testing/Migration
21
21 Go to View/Master/Slide Master to type in header Products and Technologies Platform LocalRemote SAN Backup Recovery SAN Remote Information Remote processing Clustering across site with Storage DR aware Multi-site SAN
22
22 Go to View/Master/Slide Master to type in header Products and Technologies Platform Storage, switch, and server protection Backup Frequent, consistent, non-disruptive backups Recovery Quick, accurate, predictable recovery Remote Information All critical data safe at remote location Remote processing Automatic processing resumption: “lights out” Multi-site Increasing distance improves protection LocalRemote Information Protection & Recovery SRDF Family MirrorView AutoStart Family TimeFinder Family SnapView EMC SnapSure PowerPath NetWorker Celerra Replicator RepliStor
23
23 Go to View/Master/Slide Master to type in header Getting Started: Sample Customer Requirements Plan Service LevelBronzeSilverGoldPlatinum Service ClassNon-criticalBusiness urgentBusiness-criticalMission-critical Site TypeWarm siteHot site Standby site (manual failover) Standby site (automatic failover) RTO +/- <72 hours up to (+/-) <5 days+/- 24 hours up to (+/-) 3 days+/- 6 hours up to (+/-) 12 hours+/- 1 hours up to (+/-) 3 hours RPO +/- 24 hours up to (+/-) 3 days Sync = 0 data loss Async = acceptable data loss *(Potential for 0 data loss for Async) Sync = 0 data loss Async = acceptable data loss Recovery Service OS: restored from tape and validated Application: restored from tape and validated Data: restored from tape and validated Connectivity: restored and validated Redundancy of data: recover lost transaction and validate Redundant site: ready (warm site) Recovery plans: ready OS: restored from tape and validated Application: restored from tape and validated Data: restored from tape and validated Connectivity: restored and validated Redundancy of data: recover lost transaction and validate OS: ready Application: ready Data: ready Connectivity: repoint network Redundancy of data: store and forward, tape back up of site Recovery plans: ready Testing: quarterly after significant OS: ready Application: ready Data: ready Connectivity: repoint network Redundancy of data: store and forward, tape backup of site Redundant site: ready Recovery plans: ready Testing: quarterly after significant Application Type Desktop applications Corporate tax systems Travel systems Human resources Some desktop applications Corporate tax system Travel systems Payroll Document imaging Accounting systems (ERP) Inventory control / distribution Credit card processing Cash management Accounting systems (ERP) Inventory control / distribution Credit card processing Cash management
24
24 Go to View/Master/Slide Master to type in header Customer Needs “Not all information is created equal” Tiered Storage that Is Optimized for Business Requirements Budget CapacityAvailabilityCompliance Performance Business Applications ERP CRM Exchange Archive
25
25 Go to View/Master/Slide Master to type in header EMC Retrospect EMC Networker EMC Secure Remote Support EMC Documentum Trusted Content Services VMware Assured Computing Environment Digital Rights Management (with partners) What is Happening with Information Security ? define requirements establish services catalog identify gaps create plan monitor effectiveness hardware NeoScale Decru Kasten Chase Cipheroptics software Storage Security Assessment Service SAN Security Best Practices NAS Security Best Practices Data Erasure Services services where to start
26
26 Go to View/Master/Slide Master to type in header Building a Next-Generation Information Infrastructure Information protection and security Information Lifecycle Management Flexible infrastructure Next-Generation Information Infrastructure
27
27 Go to View/Master/Slide Master to type in header
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.