RSA and Microsoft s Build in vs.bolt On
|
|
- Douglas Shepherd
- 8 years ago
- Views:
Transcription
1 RSA and Microsoft s Build in vs.bolt On Kimmo Bergius, Microsoft Petri Vilander, RSA, Security Division of EMC
2 What Microsoft and RSA did Announce? Microsoft and RSA partnering with a Built-In systems approach to protect sensitive information throughout the infrastructure based on content, context, and identity Two Main Components of Announcement: Microsoft building RSA Data Loss Prevention (DLP) classification technology directly into multiple Microsoft products throughout the infrastructure. RSA integrating Microsoft Rights Management Services (RMS) and Active Directory (AD) Groups in DLP 6.5 (Available Dec 08) All RSA DLP solutions today are Future Ready for RSA DLP enabled Microsoft products RSA and Microsoft share mutual roadmap for Integrated Solutions MS SharePoint Security
3 What a Year! RSA is vastly more than user authentication; it is a key portion of how companies protect critical records and comply with critical regulations. ITBusiness Edge, Rob Enderle A Huge Cache of Stolen Financial Data EMC, Microsoft Team Up on Data Security SIEM Magic Quadrant: May 2008 Security and Innovation: Why Can t We All Get Along 3 Web Fraud Management MQ: Jan 2009 TBD DLP Magic Quadrant: June 2008
4 2008 was a year of strength for RSA Acceleration in Newer, Growth Categories: IPV envision DLP Expansion into New Verticals Creation of New Partnerships Microsoft Recognition of Our Market Leadership RSA Value Forrester Wave leadership for DLP Gartner Magic Quadrant Leadership for envision, DLP and IPV (new!) 4
5 RSA Protection in Action , , ,000+ Billion+ Million+ Applications Phishing Events Organizations shipped Identities logged attacks with per protected BSAFE shut second down Encryption 30, , , Billion+ 200 Million+ organizations protected by RSA technology online phishing attacks shut down by the RSA Anti-Fraud Command Center events per second logged from over 80,000+ devices at a single RSA envision customer site applications shipped with RSA BSAFE encryption most widely deployed software in the world* online identities protected with RSA identification and protection technology 5 *Embedded in Microsoft, HP, Sun and IBM operating systems, Internet Explorer and Netscape browsers, Ericsson, Nokia, Motorola phones, major US government agencies and the list goes on
6 RSA Strategy RSA System 1 Holistic Solution Build a holistic solution, integrating between and among products and services from RSA and EMC. 2 Leverage Own strategic aspects of the system: policies, monitoring and some controls where we are market leaders. Move into adjacent markets. 3 Integrate Own or partner for key assets in Identity, Intelligence and Information Infrastructure. 4 Partner Ecosystem 5 Strategic Services Build an ecosystem of strategic, market leaders that control key segments which significantly expand our footprint. A suite of services that allow us to become the trusted advisor to our customers. 6
7 CISO s View of the World RISK POLICY IDENTITIES INFRASTRUCTURE INFORMATION Enable Employees Customer Partners Disable Inexperienced Users Disgruntled Employees Criminals Spies Data Center Applications End Points Protect Important Information Sensitive/Legal/Financial PII IP Ignore Unimportant Information Product Literature Networks Marketing Collateral Corporate Information COLLECT ANALYZE REPORT RESPOND 7
8 The RSA System RISK Policy Management POLICY Console INFRASTRUCTURE Are my controls working? Am I compliant? Data Center POLICY IDENTITIES Authentication Access Controls Applications POLICY INFRASTRUCTURE End Points Networks SIEM POLICY INFORMATION DLP Encrypt/ Key Mgmt COLLECT ANALYZE REPORT RESPOND 8 SIEM
9 What Microsoft and RSA did Announce? Microsoft and RSA partnering with a Built-In systems approach to protect sensitive information throughout the infrastructure based on content, context, and identity Two Main Components of Announcement: Microsoft building RSA Data Loss Prevention (DLP) classification technology directly into multiple Microsoft products throughout the infrastructure. RSA integrating Microsoft Rights Management Services (RMS) and Active Directory (AD) Groups in DLP 6.5 (Available Dec 08) All RSA DLP solutions today are Future Ready for RSA DLP enabled Microsoft products RSA and Microsoft share mutual roadmap for Integrated Solutions MS SharePoint Security
10 Microsoft Building Information Protection Into Infrastructure RSA Providing Complementary Platforms Add-on Policies RSA DLP Enterprise Manager Microsoft Information Protection Management RSA Microsoft Endpoint /UC Network Apps FS/CMS Storage Built-in DLP Classification and RMS Controls Microsoft Environment and Applications Complementary Platforms and functionality RSA DLP Endpoint RSA DLP Network RSA DLP Datacenter Future ready: Seamless upgrade path for current DLP customers Common policies throughout infrastructure Built-in approach to protect data based on content, context, identity
11 First Step - RSA DLP Suite integrating with Microsoft AD RMS in DLP 6.5 Release (Dec 2008) 1. RMS admin creates RMS templates for data protection Microsoft AD RMS Legal Department View, Edit, Print Outside law firm View Others No Access Legal Contracts RMS 2. RSA DLP admin designs policies to find sensitive data and protect it using RMS RSA DLP Find Legal Contracts Apply Legal Contracts RMS Contracts DLP Policy 3. RSA DLP discovers and classifies sensitive files 4. RSA DLP applies RMS controls based on policy Laptops/desktops Legal department Outside law firm 5. Users request files -RMS provides policy based access File shares SharePoint Automate the application of AD RMS protection based on sensitiveinformation identified by RSA DLP Datacenter and DLP Endpoint Discover Leverage AD Groups with DLP Network and Endpoint Enforce for identity or group aware data loss prevention Other s
12 Microsoft Building Information Protection Into Infrastructure RSA Providing Complementary Platforms Add-on Policies RSA DLP Enterprise Manager Microsoft Information Protection Management RSA Microsoft Endpoint /UC Network Apps FS/CMS Storage Built-in DLP Classification and RMS Controls Microsoft Environment and Applications Complementary Platforms and functionality RSA DLP Endpoint RSA DLP Network RSA DLP Datacenter Future ready: Seamless upgrade path for current DLP customers Common policies throughout infrastructure Built-in approach to protect data based on content, context, identity
13 First Step - RSA DLP Suite integrating with Microsoft AD RMS in DLP 6.5 Release (Dec 2008) 1. RMS admin creates RMS templates for data protection Microsoft AD RMS Legal Department View, Edit, Print Outside law firm View Others No Access Legal Contracts RMS 2. RSA DLP admin designs policies to find sensitive data and protect it using RMS RSA DLP Find Legal Contracts Apply Legal Contracts RMS Contracts DLP Policy 3. RSA DLP discovers and classifies sensitive files 4. RSA DLP applies RMS controls based on policy Laptops/desktops Legal department Outside law firm 5. Users request files -RMS provides policy based access File shares SharePoint Automate the application of AD RMS protection based on sensitiveinformation identified by RSA DLP Datacenter and DLP Endpoint Discover Leverage AD Groups with DLP Network and Endpoint Enforce for identity or group aware data loss prevention Other s
14
15 Computer Technology Review - newpaper Monday February 02, 2009 Practice What You Preach: EMC Implements Its Own Solution for Data Loss Prevention Monday, 05 January :46 V.Jay LaRosa, EMC When technology giant EMC Corp. deployed a data loss prevention (DLP) solution for the first time, it chose to protect a critical asset: software source code obtained through nearly four dozen acquisitions. Like most large companies, EMC is tackling the challenge of data loss prevention (DLP)- keeping sensitive, confidential and high-value information from leaking outside the organization through unauthorized or unprotected channels. Our efforts are driven by the usual pressures: increased compliance requirements, the need to manage business risk, and the desire to preserve our brand. But we have another compelling reason as well. Our customers expect us to practice what we preach. And one value we preach, especially through our RSA Security division, is the importance of protecting critical information assets from external and internal threats. So it was a logical step for us to take the plunge into data loss prevention, which aims to reduce losses caused by insider activities, including deliberate misdeeds by wrong-doers and accidental security lapses caused by unwitting employees, contractors and partners.
16 RSA and Microsoft Integrated Solution MS SharePoint Security Unfettered growth of SharePoint sites with lack of central management of security information infrastructure identities Need for granular, central control over where sensitive data might exist and who has access to it Need for reporting on actual access to sensitive data Need to ensure SharePoint configuration is secured
17 MS SharePoint Security Questions and Capabilities Known Sites Known Confidential Sites Confidential 1 Data Controls Problem Offer 6 5 Access Controls 1- Which Sites Are Sensitive? DLP 2 2- Who s using those sites? 3- How are they using them? EPM envision /EPM P 3 Confidential Sites & Users 4- Can I control the data? DLP 5- Can I control Access? EPM and SID 6- Can I de-provision? Courion Event Monitoring 4 17
18 Proposed RSA Solution Components Discovery of Sites and Sensitive Information on the sites Information righs management Through integration of DLP and MS RMS Central Entitlements Management Sensitivity awareness through integration with DLP Monitoring and Reporting of User access and activities envision monitoring DLP and EPM logs Identity provisioning Security configuration mgmt DLP Datacenter + EMC ADM DLP Datacenter + MS RMS EPM + SecurID envision Courion or other partner Pro svcs, EMC partners 18
19 Finally. Hindi Russian Arabic Grazie Italian Traditional Chinese Thank English You Simplified Chinese Thai Gracias Spanish Obrigado Brazilian Portuguese German Danke French Merci Tamil Japanese Korean
20 Petri Vilander Country Manager +358 (0) Kimmo Bergius Chief Security Advisor +358 (0)
21 21
Mobile Strategies and the Need for Process Reinvention. 2013 Smarter Process Summit
Mobile Strategies and the Need for Process Reinvention 2013 Smarter Process Summit Mobile is Mandatory 10 billion devices by 2020 72% of company leaders purchased tablets for their employees in 2012 Business
More informationwith Managing RSA the Lifecycle of Key Manager RSA Streamlining Security Operations Data Loss Prevention Solutions RSA Solution Brief
RSA Solution Brief Streamlining Security Operations with Managing RSA the Lifecycle of Data Loss Prevention and Encryption RSA envision Keys with Solutions RSA Key Manager RSA Solution Brief 1 Who is asking
More informationKelvin Wee CISA, CISM, CISSP Principal Consultant (DLP Specialist) Asia Pacific and Japan
The Truth about Data Loss Kelvin Wee CISA, CISM, CISSP Principal Consultant (DLP Specialist) Asia Pacific and Japan RSA Data Loss Prevention Data Breaches Overview RSA DLP Solution Five Critical Factors
More informationThe Future of Marketing Platforms. 2012 IBM Corporation
The Future of Marketing Platforms Agenda Introduction of IBM Smarter Commerce Today s marketing challenges IBM s solutions for marketing Smarter Commerce can help transform every phase of the commerce
More informationSOA Governance and the Service Lifecycle
IBM SOA SOA Governance and the Service Lifecycle Naveen Sachdeva sachdeva@us.ibm.com IBM Software Group 2007 IBM Corporation IBM SOA Agenda What is SOA Governance? Why SOA Governance? Importance of SOA
More informationRSA Solution Brief RSA. Data Loss. Uncover your risk, establish control. RSA. Key Manager. RSA Solution Brief
RSA Solution Brief RSA Managing Data Loss the Lifecycle of Prevention Encryption Suite Keys with Uncover your risk, establish control. RSA Key Manager RSA Solution Brief 1 Executive Summary RSA Data Loss
More informationSecuring Remote Access in the Federal Government: Addressing the Needs for Telework and Continuity of Operations. RSA Solution Brief
RSA Solution Brief Securing Remote Access in the Federal Government: Addressing the Needs for Telework and Continuity of Operations RSA Solution Brief The Telework Improvements Act of 2009 that was introduced
More informationWhite paper. Four Best Practices for Secure Web Access
White paper Four Best Practices for Secure Web Access What can be done to protect web access? The Web has created a wealth of new opportunities enabling organizations to reduce costs, increase efficiency
More informationRSA Data Loss Prevention (DLP) Understand business risk and mitigate it effectively
RSA Data Loss Prevention (DLP) Understand business risk and mitigate it effectively Arrow ECS DLP workshop, Beograd September 2011 Marko Pust marko.pust@rsa.com 1 Agenda DLP in general What to expect from
More informationBackup and Restore Manager for z/vm
Managing Backup and Recovery of z/vm and Linux on System z Backup and Restore Manager for z/vm Tracy Dean, IBM tld1@us.ibm.com April 2009 Product Overview Backup Requested by administrators Full or incremental
More informationBusiness Activity Monitoring of non-ibm activity
Business Activity Monitoring of non-ibm activity WebSphere Technical Sales Agenda Intro to BPM & BAM WebSphere Business Monitor Talking to WebSphere Business Monitor Demo using WebSphere Message Broker
More informationIBM Tivoli End-to-End Software Asset Management Solutions
IBM Tivoli Business and Performance Automation IBM Tivoli End-to-End Software Asset Management Solutions IBM Tivoli License Compliance Manager for z/os, IBM Tivoli Contract Compliance Manager, and IBM
More informationTECHNOLOGY PARTNER CERTIFICATION BENEFITS AND PROCESS
TECHNOLOGY PARTNER CERTIFICATION BENEFITS AND PROCESS BUSINESS BENEFITS Use of the Certified Partner seal and the Secured by RSA brand on product packaging and advertising Exposure in the Secured by RSA
More information<Insert Picture Here> Oracle Identity And Access Management
Oracle Identity And Access Management Gautam Gopal, MSIST, CISSP Senior Security Sales Consultant Oracle Public Sector The following is intended to outline our general product direction.
More informationRSA Via Lifecycle and Governance 101. Getting Started with a Solid Foundation
RSA Via Lifecycle and Governance 101 Getting Started with a Solid Foundation Early Identity and Access Management Early IAM was all about Provisioning IT tools to solve an IT productivity problem Meet
More informationIBM Infrastructure Suite for z/vm and Linux
IBM Infrastructure Suite for z/vm and Linux Tracy Dean, IBM tld1@us.ibm.com October 2015 Agenda Solution introduction Solution details Summary, contacts, and more information 2 IBM Infrastructure Suite
More informationManageability with BPM
Manageability with BPM Presenter Names: Thierry Hendrickx / Chris den Hoedt 2008 IBM Corporation Agenda What is BPM Managing Internal controls with BPM IBM s Vision to BPM 1 Government leaders know what
More informationActual trends in backup protection solution IBM Backup Products and Services
Actual trends in backup protection solution IBM Backup Products and Services Gražvydas Govaras IT Architektas 2013-03-19 Tivoli Storage Manager Fastback Continuos Data Protection solution for Windows and
More informationz/vm and Linux on zseries Performance Monitoring An Update on How and With What Products
Tivoli Software z/vm and Linux on zseries Performance Monitoring An Update on How and With What Products Laura Knapp ljknapp@us.ibm.com August 2006 2006 IBM Corporation Agenda Opportunity New work loads
More informationService Updates and Enhancements
Service Updates and Enhancements May 8, 2013 McAfee understands that providing the tools for a trusted communication environment is our primary directive. Accomplishing this goal requires listening to
More informationAn E2E integrated approach to IT Asset Management
IBM Software Group An E2E integrated approach to IT Asset Carmen Ces IT Specialist SWG Tivoli, IBM Agenda IBM Software Group What is IT Asset? Why Business needs it? Business Priorities segments descriptions
More informationProcess Automation Overview Process Automation Overview
Process Automation Overview Process Automation Business Overview Presented By: Skype: dom.fernandez Dominic Fernandez Principal Consultant dscf@computants.org http://www.computants.org/ 1 http://www.computants.org/
More informationData Protection McAfee s Endpoint and Network Data Loss Prevention
Data Protection McAfee s Endpoint and Network Data Loss Prevention Dipl.-Inform. Rolf Haas Principal Security Engineer, S+, CISSP rolf@mcafee.com January 22, 2013 for ANSWER SA Event, Geneva Position Features
More informationWhite paper. Five Key Considerations for Selecting a Data Loss Prevention Solution
White paper Five Key Considerations for Selecting a Data Loss Prevention Solution What do you need to consider before selecting a data loss prevention solution? There is a renewed awareness of the value
More informationRSA SIEM and DLP Infrastructure and Information Monitoring in One Solution
RSA SIEM and DLP Infrastructure and Information Monitoring in One Solution David Mateju RSA Sales Consultant, RSA CSE david.mateju@rsa.com Adding an information-centric view Infrastructure Information
More information- Update 2.0.3. IBM Content Navigator Experience Platform. Sven Hapke Leading Technical Professional, Enterprise Content Management
New insights. Better outcomes. IBM Content Navigator Experience Platform - Update 2.0.3 Sven Hapke Leading Technical Professional, Enterprise Content Management Introducing IBM Content Navigator IBM s
More informationA Websense Research Brief Prevent Data Loss and Comply with Payment Card Industry Data Security Standards
A Websense Research Brief Prevent Loss and Comply with Payment Card Industry Security Standards Prevent Loss and Comply with Payment Card Industry Security Standards Standards for Credit Card Security
More informationThe IBM Rational Software Development Platform..Role focused tools help simplification via Separation of Concerns
The IBM Rational Software Development Platform..Role focused tools help simplification via Separation of Concerns Analyst Architect Developer Tester Model the business & identify the business services
More informationCA Technologies Data Protection
CA Technologies Data Protection can you protect and control information? Johan Van Hove Senior Solutions Strategist Security Johan.VanHove@CA.com CA Technologies Content-Aware IAM strategy CA Technologies
More informationRSA SecurBook for Microsoft SharePoint. A Guide for Deploying and Administering the RSA Solution for Microsoft SharePoint
RSA SecurBook for Microsoft SharePoint A Guide for Deploying and Administering the RSA Solution for Microsoft SharePoint The RSA Solution for Microsoft SharePoint Team Susam Pal, Arun P Kumar, Satish Vohra,
More informationRSA Solution Brief RSA. Encryption and Key Management Suite. RSA Solution Brief
RSA Encryption and Key Management Suite The threat of experiencing a data breach has never been greater. According to the Identity Theft Resource Center, since the beginning of 2008, the personal information
More informationSOA Executive Overview Achieve Business Agility, October 23, 2012. Ray Daniel, Connectivity and Integration Executive
SOA Executive Overview Achieve Business Agility, October 23, 2012 Ray Daniel, Connectivity and Integration Executive 1 2 These trends are changing entire industries Mobile 2 Cloud Big Data Social 3 3 4
More informationQ1 Labs Corporate Overview
Q1 Labs Corporate Overview The Security Intelligence Leader Who we are: Innovative Security Intelligence software company One of the largest and most successful SIEM vendors Leader in Gartner 2011, 2010,
More informationCopyright 2013, Oracle and/or its affiliates. All rights reserved.
1 The following is intended to outline our general product direction. It is intended for information purposes only, and may not be incorporated into any contract. It is not a commitment to deliver any
More informationIBM Cloud Security Draft for Discussion September 12, 2011. 2011 IBM Corporation
IBM Cloud Security Draft for Discussion September 12, 2011 IBM Point of View: Cloud can be made secure for business As with most new technology paradigms, security concerns surrounding cloud computing
More information10 Building Blocks for Securing File Data
hite Paper 10 Building Blocks for Securing File Data Introduction Securing file data has never been more important or more challenging for organizations. Files dominate the data center, with analyst firm
More information場 次 :C-3 公 司 名 稱 :RSA, The Security Division of EMC 主 題 : 如 何 應 用 網 路 封 包 分 析 對 付 資 安 威 脅 主 講 人 :Jerry.Huang@rsa.com Sr. Technology Consultant GCR
場 次 :C-3 公 司 名 稱 :RSA, The Security Division of EMC 主 題 : 如 何 應 用 網 路 封 包 分 析 對 付 資 安 威 脅 主 講 人 :Jerry.Huang@rsa.com Sr. Technology Consultant GCR Minimum Requirements of Security Management and Compliance
More informationHow To Protect Your Virtual Infrastructure From Attack From A Cyber Threat
VMware Integrated Partner Solutions for Networking and Security VMware Integrated Partner Solutions for Security and Compliance VMware vcloud Networking and Security is the leading networking and security
More informationDelivering Quality Service with IBM Service Management
Delivering Quality Service with IBM Service Milos Nikolic, Global Technology Services Manager Dragan Jeremic, Technical Sales Specialist for Tivoli December 10th 2008 Innovation is the Process, Success
More informationEnsuring Security and Compliance of Your EMC Documentum Enterprise Content Management System: A Collaborative Effort of EMC Documentum and RSA
Ensuring Security and Compliance of Your EMC Documentum Enterprise Content Management System: A Collaborative Effort of EMC Documentum and RSA Applied Technology Abstract This white paper discusses the
More informationEMC Security for Microsoft Exchange Solution: Data Loss Prevention and Secure Access Management
EMC Security for Microsoft Exchange Solution: Data Loss Prevention and Applied Technology Abstract Securing a Microsoft Exchange e-mail environment presents a myriad of challenges and compliance issues
More informationMaaSter Microsoft Ecosystem Management with MaaS360. Chuck Brown Jimmy Tsang www.maas360.com
MaaSter Microsoft Ecosystem Management with MaaS360 Chuck Brown Jimmy Tsang www.maas360.com Introductions Chuck Brown Product Management IBM MaaS360 Jimmy Tsang Director of Product Marketing IBM MaaS360
More informationHow To Manage A Corporate Device Ownership (Byod) On A Corporate Network (For Employees) On An Iphone Or Ipad Or Ipa (For Non-Usenet) On Your Personal Device
Empowering BYOD and Mobile Security in the Enterprise Jeff Baum, APAC Managing Director Growth of Mobile Mobile worker population will reach 1.3 Billion in 2015 Source: IDC Worldwide Mobile Worker Population
More informationImplementing Tivoli Storage Manager on Linux on System z
IBM Software Group Implementing Tivoli Storage Manager on Linux on System z Laura Knapp ljknapp@us.ibm.com 2006 Tivoli Software 2006 IBM Corporation Agenda Why use Linux on System z for TSM TSM Some basics
More informationModern Data Management & Intelligent Archive. Mark Bentkower, CISSP Director, Enterprise Solution APAC CommVault
Modern Data Management & Intelligent Archive Mark Bentkower, CISSP Director, Enterprise Solution APAC CommVault Agenda Who is CommVault? Why CommVault? Microsoft and CommVault Cloud Use Cases A Brief History
More informationStrategies to Mitigate Information Risk: Data Loss Prevention and Enterprise Rights Management
Strategies to Mitigate Information Risk: Data Loss Prevention and Enterprise Rights Management An ENTERPRISE MANAGEMENT ASSOCIATES (EMA ) White Paper Prepared for RSA, The Security Division of EMC and
More informationA Buyer's Guide to Data Loss Protection Solutions
A Buyer's Guide to Data Loss Protection Solutions 2010 Websense, Inc. All rights reserved. Websense is a registered trademark of Websense, Inc. in the United States and certain international markets. Websense
More informationMobile, Cloud, Advanced Threats: A Unified Approach to Security
Mobile, Cloud, Advanced Threats: A Unified Approach to Security David Druker, Ph.D. Senior Security Solution Architect IBM 1 Business Security for Business 2 Common Business Functions Manufacturing or
More informationSecurely Yours LLC Top Security Topics for 2013. Sajay Rai, CPA, CISSP, CISM sajayrai@securelyyoursllc.com
Securely Yours LLC Top Security Topics for 2013 Sajay Rai, CPA, CISSP, CISM sajayrai@securelyyoursllc.com Contents Background Top Security Topics What auditors must know? What auditors must do? Next Steps
More informationWeb Security Update. A Radicati Group, Inc. Webconference. The Radicati Group, Inc. Copyright March 2010, Reproduction Prohibited
The Radicati Group, Inc. www.radicati.com Web Security Update A Radicati Group, Inc. Webconference The Radicati Group, Inc. Copyright March 2010, Reproduction Prohibited 9:30 am, PT March 25, 2010 Speakers
More informationIBM Tivoli Monitoring for Databases
Enhance the availability and performance of database servers IBM Tivoli Monitoring for Databases Highlights Integrated, intelligent database monitoring for your on demand business Preconfiguration of metric
More informationHow To Secure A Database From A Leaky, Unsecured, And Unpatched Server
InfoSphere Guardium Ingmārs Briedis (ingmars.briedis@also.com) IBM SW solutions Agenda Any questions unresolved? The Guardium Architecture Integration with Existing Infrastructure Summary Any questions
More informationBacking Up and Restoring a z/vm Cluster and Linux on System z Guests
SHARE Session 10246 Backing Up and Restoring a z/vm Cluster and Linux on System z Guests Tracy Dean, IBM tld1@us.ibm.com March 2012 Agenda Recommended practices Requirements for these scenarios Overview
More informationLeading The World Into Connected Security. Paolo Florian Sales Engineer
Leading The World Into Connected Security Paolo Florian Sales Engineer History of Defining Largest Dedicated Delivering a Next Generation Architecture Security Provider Security Architecture Inventor of
More informationMcAfee - Overview. Anthony Albisser
McAfee - Overview Anthony Albisser Channel Account Manager About McAfee Founded in 1987, McAfee is now the world s largest dedicated security company (acquired by Intel in 2011) Global research for real-time
More informationArwed Tschoeke, Systems Architect tschoeke@de.ibm.com IBM Systems and Technology Group
Virtualization in a Nutshell Arwed Tschoeke, Systems Architect tschoeke@de.ibm.com and Technology Group Virtualization Say What? Virtual Resources Proxies for real resources: same interfaces/functions,
More informationXProtect Corporate 2013
Release note Milestone XProtect Corporate 2013 May 21, 2013 It is with great pleasure that we announce the release of: XProtect Corporate 2013 High performance for high security XProtect Corporate is powerful
More informationIBM Tivoli Monitoring for Applications
Optimize the operation of your critical e-business applications IBM Tivoli Monitoring for Applications Highlights Helps maintain the performance and availability of your application environment including
More informationSECURE FILE SHARING AND COLLABORATION: THE PATH TO INCREASED PRODUCTIVITY AND REDUCED RISK
SECURE FILE SHARING AND COLLABORATION: THE PATH TO INCREASED PRODUCTIVITY AND REDUCED RISK Whitepaper 2 Secure File Sharing and Collaboration: The Path to Increased Productivity and Reduced Risk Executive
More informationMcAfee Web Reporter Turning volumes of data into actionable intelligence
McAfee Web Reporter Turning volumes of data into actionable intelligence Business today is more Internet-dependent than ever before. From missioncritical services to productivity tools, Internet access
More informationPowering real-time mobile access to critical information with ShareFile
Powering real-time mobile access to critical information with ShareFile An enterprise file sync and sharing solution built for the needs of the energy, oil and gas industry to provide employee and third-party
More informationCopyright 2013, Oracle and/or its affiliates. All rights reserved.
1 Security Inside-Out with Oracle Database 12c Denise Mallin, CISSP Oracle Enterprise Architect - Security The following is intended to outline our general product direction. It is intended for information
More informationState of the Market for Security Information Event Management and Log File Management Solutions
This research paper from TheInfoPro (TIP) delivers findings on over 140 in-depth interviews with Fortune 1000 Information Security professionals conducted in 2008, plus another 300 interviews conducted
More informationWhite paper. 6 Best Practices for Preventing Enterprise Data Loss
White paper 6 Best Practices for Preventing Enterprise Data Loss 'Enterprise data loss' cost businesses nearly $105 billion last year Nearly 220 million records have been breached since January 2005, according
More informationMcAfee Endpoint Protection Products
McAfee Total Protection Security Overview for MEEC Sumeet Gohri, CISSP Sr. Sales Engineer GovED + Healthcare McAfee, Inc. Agenda Protection Challenges McAfee Protection Products McAfee epo walkthrough
More informationChanging the Enterprise Security Landscape
Changing the Enterprise Security Landscape Petr Hněvkovský Presales Consultant, ArcSight EMEA HP Enterprise Security Products 2012 Hewlett-Packard Development Company, L.P. The information contained herein
More informationHP CLOUD SYSTEM. The most complete, integrated platform for building and managing clouds featuring Intel technologies.
HP CLOUD SYSTEM The most complete, integrated platform for building and managing clouds featuring Intel technologies Presenter Title 2010 2011 Hewlett-Packard Development Company, L.P. The information
More informationSecurely Yours LLC IT Hot Topics. Sajay Rai, CPA, CISSP, CISM sajayrai@securelyyoursllc.com
Securely Yours LLC IT Hot Topics Sajay Rai, CPA, CISSP, CISM sajayrai@securelyyoursllc.com Contents Background Top Security Topics What auditors must know? What auditors must do? Next Steps [Image Info]
More informationStrong Authentication: Enabling Efficiency and Maximizing Security in Your Microsoft Environment
Strong Authentication: Enabling Efficiency and Maximizing Security in Your Microsoft Environment IIIIII Best Practices www.gemalto.com IIIIII Table of Contents Strong Authentication and Cybercrime... 1
More informationCisco Unified Expert Advisor
. Data Sheet Cisco Unified Expert Advisor Cisco Unified Communications Solutions unify voice, video, data, and mobile applications on fixed and mobile networks, enabling easy collaboration every time,
More informationMalware and Other Malicious Threats
21 August Thailand Securing Your Endpoints from Malware and Other Malicious Threats Steven Scheurmann Sales Leader, Tivoli Endpoint Management Products, built on BigFix, IBM Software Group, Asia Pacific
More informationADAPTIVE AUTHENTICATION ADAPTER FOR JUNIPER SSL VPNS. Adaptive Authentication in Juniper SSL VPN Environments. Solution Brief
ADAPTIVE AUTHENTICATION ADAPTER FOR JUNIPER SSL VPNS Adaptive Authentication in Juniper SSL VPN Environments Solution Brief RSA Adaptive Authentication is a comprehensive authentication platform providing
More informationSecurity Information & Event Management (SIEM)
Security Information & Event Management (SIEM) Peter Helms, Senior Sales Engineer, CISA, CISSP September 6, 2012 1 McAfee Security Connected 2 September 6, 2012 Enterprise Security How? CAN? 3 Getting
More informationIBM Tivoli Remote Control
Robust remote desktop management across the enterprise IBM Tivoli Remote Control Highlights Enables organizations to Supports Federal Desktop Core remotely manage thousands of Configuration (FDCC) and
More informationSHARE in Pittsburgh Session 15591
Top 10 Things You Should Be Doing On Your HMC But You're NOT You Probably Are Tuesday, August 5th 2014 Jason Stapels HMC Development jstapels@us.ibm.com Agenda Setting up HMC for Remote Use Securing User
More informationExtending Identity and Access Management
Extending Identity and Access Management Michael Quirin Sales Engineer Citrix Systems 1 2006 Citrix Systems, Inc. All rights reserved. Company Overview Leader in Access Infrastructure NASDAQ 100 and S&P
More informationThis document provides the first-priority information on Parallels Virtuozzo Containers 4.0 for Windows and supplements the included documentation.
Parallels Virtuozzo Containers 4.0 for Windows Readme Copyright 1999-2011 by Parallels Holdings, Ltd. All rights reserved. This document provides the first-priority information on Parallels Virtuozzo Containers
More informationHP Software LICENSE KEY PROCESSES
HP Software LICENSE KEY PROCESSES Requesting License Keys during Normal Business Hours How to obtain support Emergency License Key Process Updated January 2013 Requesting License Keys during Normal Business
More informationCheck Point Positions
Check Point Positions - Gartner Magic Quadrants - IDC Market Share Research 2012 Dean J. Whitehair Analyst Relations October 2012 Version 9.0 Updated 10/17/2012 2012 Check Point Software Technologies Ltd.
More informationHow To Buy Nitro Security
McAfee Acquires NitroSecurity McAfee announced that it has closed the acquisition of privately owned NitroSecurity. 1. Who is NitroSecurity? What do they do? NitroSecurity develops high-performance security
More informationSecuring the Journey to the Private Cloud. Dominique Dessy RSA, the Security Division of EMC
Securing the Journey to the Private Cloud Dominique Dessy RSA, the Security Division of EMC June 2010 Securing the Journey to The Private Cloud The Journey IT Production Business Production IT-As-A-Service
More informationVirtualization Support - Real Backups of Virtual Environments
Virtualization Support Real Backups of Virtual Environments Contents Virtualization Challenges 3 The Benefits of Agentless Backup 4 Backup and Recovery Built for Virtualized Environments 4 Agentless in
More informationInformation Risk Management. Alvin Ow Director, Technology Consulting Asia Pacific & Japan RSA, The Security Division of EMC
Information Risk Management Alvin Ow Director, Technology Consulting Asia Pacific & Japan RSA, The Security Division of EMC Agenda Data Breaches Required Capabilities of preventing Data Loss Information
More informationVCE BUSINESS UPDATE AND OVERVIEW
VCE BUSINESS UPDATE AND OVERVIEW October, 2014 BUSINESS UPDATE VCE is a privately held company funded by Cisco, EMC, VMware, and Intel 2000+ employees globally, with manufacturing operations in the US
More informationSophos Acquires Cyberoam
Sophos Acquires Cyberoam Frequently Asked Questions Table of Contents FAQ... 2 What is Sophos announcing?... 2 Who is Cyberoam?... 2 Why is Sophos acquiring Cyberoam?... 2 Why is Sophos acquiring Cyberoam
More informationBeyond passwords: Protect the mobile enterprise with smarter security solutions
IBM Software Thought Leadership White Paper September 2013 Beyond passwords: Protect the mobile enterprise with smarter security solutions Prevent fraud and improve the user experience with an adaptive
More information8 Steps to Holistic Database Security
Information Management White Paper 8 Steps to Holistic Database Security By Ron Ben Natan, Ph.D., IBM Distinguished Engineer, CTO for Integrated Data Management 2 8 Steps to Holistic Database Security
More informationemail management solutions
Safeguard business continuity and productivity with Mimecast email management solutions Computacenter and Mimecast in partnership Expert software solutions Computacenter and Mimecast help organisations
More informationProcess modeling at enterprise scale using BlueworksLive and IBM BPM
WebSphere User Group Process modeling at enterprise scale using BlueworksLive and IBM BPM Abstract Blueworks Live's is a powerful, web based, modelling tool that makes mapping processes incredibly easy
More informationKony Mobile Application Management (MAM)
Kony Mobile Application Management (MAM) Kony s Secure Mobile Application Management Feature Brief Contents What is Mobile Application Management? 3 Kony Mobile Application Management Solution Overview
More informationData Loss Prevention Program
Data Loss Prevention Program Safeguarding Intellectual Property Author: Powell Hamilton Senior Managing Consultant Foundstone Professional Services One of the major challenges for today s IT security professional
More informationINFORMATION PROTECTION
INFORMATION PROTECTION Johan Celis Principal Security Consultant Symantec Benelux SYMANTEC ENTERPRISE SECURITY STRATEGY Users Data Cyber Security Services Monitoring, Incident Response, Simulation, Adversary
More informationPCI Security Standards Council
PCI Security Standards Council Jeremy King, European Director 2013 Why PCI Matters Applying PCI How You Can Participate Agenda 2 Why PCI Matters Applying PCI How You Can Participate Agenda About the PCI
More informationAvaya Interaction Center
Avaya Interaction Center Overview Exceeding customer expectations for personalized service across all channels phone, video, email, web, SMS, and social media is no longer an afterthought. For many companies
More informationDocuSign for SharePoint Online v2.4
Quick Start Guide DocuSign for SharePoint Online v2.4 Published October 12, 2015 Overview DocuSign for SharePoint Online allows users to sign or send documents out for signature from a SharePoint Online
More informationRSA Identity and Access Management 2014
RSA Identity and Access Management 2014 1 Agenda Today s Enterprises and IAM Customer Challenges IAM Requirements RSA IAM Our Competitive Advantage Leading The Pack RSA Views on Identity Management and
More informationRashmi Knowles Chief Security Architect EMEA
Rashmi Knowles Chief Security Architect EMEA AGENDA Transformation of IT New cyber-security challenges Intelligence Driven Security Security Analytics Q&A 2 ENTERPRISE DATA CENTER ADVANCED SECURITY A UNIQUE
More informationEMAIL MANAGEMENT SOLUTIONS SAFEGUARD BUSINESS CONTINUITY AND PRODUCTIVITY WITH MIMECAST
EMAIL MANAGEMENT SOLUTIONS SAFEGUARD BUSINESS CONTINUITY AND PRODUCTIVITY WITH MIMECAST Enabling user efficiency with a cloud-based email platform With productivity, revenues and reputation at stake, an
More informationAlexander De Houwer Technology Advisor Devices Win 10 Vincent Dal Technology Advisor Business Productivity
Alexander De Houwer Technology Advisor Devices Win 10 Vincent Dal Technology Advisor Business Productivity Agenda INTRODUCTION (5 slides) WINDOWS 10 (10 slides) OFFICE 2016 (11 slides) Enterprise Mobility
More informationFile Integrity Monitoring: A Critical Piece in the Security Puzzle. Challenges and Solutions
File Integrity Monitoring Challenges and Solutions Introduction (TOC page) A key component to any information security program is awareness of data breaches, and yet every day, hackers are using malware
More information