Presentation is loading. Please wait.

Presentation is loading. Please wait.

1 Go to View/Master/Slide Master to type in header Propelling Business Growth With A Secure And Continuous Information Infrastructure Jon Murray.

Similar presentations


Presentation on theme: "1 Go to View/Master/Slide Master to type in header Propelling Business Growth With A Secure And Continuous Information Infrastructure Jon Murray."— Presentation transcript:

1 1 Go to View/Master/Slide Master to type in header Propelling Business Growth With A Secure And Continuous Information Infrastructure Jon Murray

2 2 Go to View/Master/Slide Master to type in header Information: Change in Multiple Dimensions information growth information types information uses information regulations more regulations: SEC 17a-4, NASD 3010,Sarbanes-Oxley, Basel II, UK Metadata, eSign Act, 21 CFR Part 11 (more coming!) more growth: information stored on disk arrays growing ~60% in 2006 more uses: ERP, CRM, RFID, collaboration, data mining, discovery … more types: transactions, documents, forms, web, images, voice, messages, reports...

3 3 Go to View/Master/Slide Master to type in header Customers’ Information Storage and Management Challenges CIO’s Dilemma: How to manage all the information growth with limited resources? Information stored on disk arrays ~ 70% IT budget growth ~ 4 - 5% IT environment getting more complex SLA’s continue to expand and tighten Protection and security increasingly important

4 4 Go to View/Master/Slide Master to type in header 2006 Technology Spending Priorities–CIO Survey Source: Morgan Stanley November CIO Survey, Jan. 3, 2006 1. Security (Software) 2. Security (HW & Services) 3. Storage Area Networks 4. Wireless LAN (access points & routers) 5. Storage Software 6. Portal Software 7. VOIP Infrastructure 8. IT Education and Training 9. Storage Hardware 10. Business Intelligence Software 11.Wireless LAN (clients) 12.New Custom Development 13.Routing 14.Systems Management Software 15.Application Integration Software 16.Notebook PCs 17.Document Management Software 18.Automated Testing Tool 19.Microsoft Office Upgrade 20.Application Software Server 45.Mainframe hardware 46.Printers

5 5 Go to View/Master/Slide Master to type in header Security Today An Amalgamation of Point Products Across IT Antivirus Anitvirus VPN Encryption Authentication Web Filtering Authentication Threat Detection Change/Patch Management LAN Clients Servers SAN Disk Storage Tape Spyware Firewall Digital Rights Management Encryption Vault Recovery Management Authentication

6 6 Go to View/Master/Slide Master to type in header Today’s Approach: Secure the Perimeter

7 7 Go to View/Master/Slide Master to type in header Security Tomorrow: Protect the Information

8 8 Go to View/Master/Slide Master to type in header Security Must Become Information-Centric  Information-centric Security –An inside-out view of how to secure information  Begins with securing the data itself  Moves out through layers of increasingly intelligent infrastructure  Relies on our ability to leverage the interaction between data and infrastructure Important Technology Data-level access control Open policy decision points Enforcement at point of use

9 9 Go to View/Master/Slide Master to type in header Information Security (Confidentiality) Information Security Information Security Information Availability Information Confidentiality Information Integrity EMC’s Heritage Protection and A Natural and Requested Evolution of EMC’s Data Protection Capabilities

10 10 Go to View/Master/Slide Master to type in header EMC’s Security Efforts to Date CEO-level Mandate Information Security Leadership Team Company-wide Goals and Objectives Security-related Workshops, Assessments EMC Vulnerability Alert Service Documentum Trusted Content Services EMC Secure Remote Support Data Erasure Service DRM for ECM Software-native Encryption –Retrospect and NetWorker Data Encryption through EMC Select Dedicated Focus Security of Offering Comprehensive Information Protection

11 11 Go to View/Master/Slide Master to type in header ID and Access Management Threat Management Encryption Secure Content Vulnerability Management EMC Security Mission ApplicationsInformationPeopleSystems Security Services Patching Vulnerability Assessment Security Risk Management Security Configuration Security Event Management / Managed Security Intrusion Detect / Prevent Firewall / VPN Threat Appliances Anti-Virus/Malware Secure Messaging Web Filtering Encryption File / Database Security Digital Rights Mgmt Authentication Authentication Mgmt Authentication Authentication Mgmt Provisioning End-to-End Information Security Management EMC ISM

12 12 Go to View/Master/Slide Master to type in header EMC’s Information-Centric Approach to Security EMC Strategy  Expose key native capabilities  Repurpose existing technologies for security “use cases”  Develop new products, solutions, and service offerings  Partner and acquire to complete portfolio 12 Information Security Management (ISM)  Information Security is an end-to-end challenge  To be most effective, security capabilities must be integrated with the information infrastructure  All security offerings need to be interoperable and open

13 13 Go to View/Master/Slide Master to type in header EMC Retrospect EMC Networker EMC Secure Remote Support EMC Documentum Trusted Content Services VMware Assured Computing Environment Digital Rights Management (with partners) What is Happening with Information Security ? Hard to know where to start define requirements establish services catalog identify gaps create plan monitor effectiveness hardware NeoScale Decru Kasten Chase Cipheroptics software Storage Security Assessment Service SAN Security Best Practices NAS Security Best Practices Data Erasure Services services

14 14 Go to View/Master/Slide Master to type in header Secure Content Management ACLs MACL EAL4 Common Criteria Testing 2 Trusted Content Services Information Object

15 15 Go to View/Master/Slide Master to type in header ESG Strategy for Enterprise Archiving Retain Migrate Discover Common Archiving Record and Storage (CARS) Secure, scalable, and unified archive for all types of content Rich Media Email / IM Desktop & File System SharePoint Web Paper Applications & Reports Classify

16 16 Go to View/Master/Slide Master to type in header New Architecture for Backup, Recovery, and Archive  Extract valuable information to archive –Increases performance of production applications –Improves TCO through use of tiered storage –Recovers capacity on Tier 1 resources  Back up active production information –Backup window reduced or eliminated –Higher reliability, greater likelihood of full backups  Retrieve from archive or recover from backup –Restore requests are faster –Information that was once offline is now online via archive     Archive process Recovery process Production

17 17 Go to View/Master/Slide Master to type in header Backup and Archive are Different BackupArchive A secondary copy of informationPrimary copy of information Used for recovery operationsAvailable for information retrieval Improves availability by enabling application to be restored to point in time Adds operational efficiencies by moving fixed / unstructured content out of operational environment Typically short-term (weeks or months) Typically long-term (months, years, or decades) Data typically overwritten on periodic basis (e.g., monthly) Data typically maintained for analysis, value generation, or compliance Not for regulatory compliance— though some are forced to use Useful for compliance and should take into account information-retention policy

18 18 Go to View/Master/Slide Master to type in header Continuity Reduce Total Cost Improve Business Value  Minimize under-protection  Flexibility to change  Improving productivity  Eliminate over-protection  Simplified environment  Consolidated continuity

19 19 Go to View/Master/Slide Master to type in header Continuity Challenge: The Common Current State Not protected Under- protected Different requirements Different technologies Different processes Over- protected Continuity Issues  Survive a disaster  Achieve high availability  Prevent data corruption  Non-disruptively upgrade software and/or hardware  Do parallel processing  Move and migrate data  Restart the enterprise  Protect remote data sites  Shorten backup and restore times  Contain costs  Cannot add resources Pain Points  Inconsistent service levels  Gaps in coverage  Growth in complexity and effort  Growth in cost and risk to the business Continuity Defined: Ensuring applications and data are available during planned and unplanned outages.

20 20 Go to View/Master/Slide Master to type in header CDP to Disk SECONDS HOURS/ MINUTES Backup to Disk Backup to Tape DAYS/ HOURS Snap / Clone MINUTES/ SECONDS Operational Effectiveness Decreased Recovery Time / Increased Recovery Point Granularity Information Protection is Evolving Beyond Tape Backup… Replication < SECONDS Common Recovery Management Services Automated and Simplified Management Disaster Recovery, Operational Recovery, and Testing/Migration

21 21 Go to View/Master/Slide Master to type in header Products and Technologies Platform LocalRemote SAN Backup Recovery SAN Remote Information Remote processing Clustering across site with Storage DR aware Multi-site SAN

22 22 Go to View/Master/Slide Master to type in header Products and Technologies Platform Storage, switch, and server protection Backup Frequent, consistent, non-disruptive backups Recovery Quick, accurate, predictable recovery Remote Information All critical data safe at remote location Remote processing Automatic processing resumption: “lights out” Multi-site Increasing distance improves protection LocalRemote Information Protection & Recovery SRDF Family MirrorView AutoStart Family TimeFinder Family SnapView EMC SnapSure PowerPath NetWorker Celerra Replicator RepliStor

23 23 Go to View/Master/Slide Master to type in header Getting Started: Sample Customer Requirements Plan Service LevelBronzeSilverGoldPlatinum Service ClassNon-criticalBusiness urgentBusiness-criticalMission-critical Site TypeWarm siteHot site Standby site (manual failover) Standby site (automatic failover) RTO +/- <72 hours up to (+/-) <5 days+/- 24 hours up to (+/-) 3 days+/- 6 hours up to (+/-) 12 hours+/- 1 hours up to (+/-) 3 hours RPO +/- 24 hours up to (+/-) 3 days  Sync = 0 data loss  Async = acceptable data loss *(Potential for 0 data loss for Async)  Sync = 0 data loss  Async = acceptable data loss Recovery Service  OS: restored from tape and validated  Application: restored from tape and validated  Data: restored from tape and validated  Connectivity: restored and validated  Redundancy of data: recover lost transaction and validate  Redundant site: ready (warm site)  Recovery plans: ready  OS: restored from tape and validated  Application: restored from tape and validated  Data: restored from tape and validated  Connectivity: restored and validated  Redundancy of data: recover lost transaction and validate  OS: ready  Application: ready  Data: ready  Connectivity: repoint network  Redundancy of data: store and forward, tape back up of site  Recovery plans: ready  Testing: quarterly after significant  OS: ready  Application: ready  Data: ready  Connectivity: repoint network  Redundancy of data: store and forward, tape backup of site  Redundant site: ready  Recovery plans: ready  Testing: quarterly after significant Application Type  Desktop applications  Corporate tax systems  Travel systems  Human resources  Some desktop applications  Corporate tax system  Travel systems  Payroll  Document imaging  Accounting systems (ERP)  Inventory control / distribution  Credit card processing  Cash management  Accounting systems (ERP)  Inventory control / distribution  Credit card processing  Cash management

24 24 Go to View/Master/Slide Master to type in header Customer Needs “Not all information is created equal” Tiered Storage that Is Optimized for Business Requirements Budget CapacityAvailabilityCompliance Performance Business Applications ERP CRM Exchange Archive

25 25 Go to View/Master/Slide Master to type in header EMC Retrospect EMC Networker EMC Secure Remote Support EMC Documentum Trusted Content Services VMware Assured Computing Environment Digital Rights Management (with partners) What is Happening with Information Security ? define requirements establish services catalog identify gaps create plan monitor effectiveness hardware NeoScale Decru Kasten Chase Cipheroptics software Storage Security Assessment Service SAN Security Best Practices NAS Security Best Practices Data Erasure Services services where to start

26 26 Go to View/Master/Slide Master to type in header Building a Next-Generation Information Infrastructure Information protection and security Information Lifecycle Management Flexible infrastructure Next-Generation Information Infrastructure

27 27 Go to View/Master/Slide Master to type in header


Download ppt "1 Go to View/Master/Slide Master to type in header Propelling Business Growth With A Secure And Continuous Information Infrastructure Jon Murray."

Similar presentations


Ads by Google