Data Centric Security



Similar documents
Cloud Data Security. Sol Cates

2015 VORMETRIC INSIDER THREAT REPORT

How To Protect Your Organization From Insider Threats

With Great Power comes Great Responsibility: Managing Privileged Users

White Paper Big Data Without Big Headaches

SECURING SENSITIVE DATA WITHIN AMAZON WEB SERVICES EC2 AND EBS

2015 VORMETRIC INSIDER THREAT REPORT

VORMETRIC DATA SECURITY PLATFORM ARCHITECTURE

HIPAA and HITECH Compliance Simplification. Sol Cates

Complying with Payment Card Industry (PCI-DSS) Requirements with DataStax and Vormetric

Compliance Guide ISO Compliance Guide. September Contents. Introduction 1. Detailed Controls Mapping 2.

Where Data Security and Value of Data Meet in the Cloud

Securing Oracle E-Business Suite in the Cloud

A COALFIRE PERSPECTIVE. Moving to the Cloud. NCHELP Spring Convention Panel May 2012

Teradata and Protegrity High-Value Protection for High-Value Data

IBM QRadar as a Service

Protect the data that drives our customers business. Data Security. Imperva s mission is simple:

BECAUSE DATA CAN T DEFEND ITSELF

ICT budget and staffing trends in Healthcare

How To Use Vormetric.Com To Protect Your Data From Hackers

Putting The Cloud To Work For Real Businesses

Cloud Security Introduction and Overview

Fortinet FortiGate App for Splunk

When it Comes to Monitoring and Validation it Takes More Than Just Collecting Logs

Securing Sensitive Data

SimpliVity OmniStack with Vormetric Transparent Encryption

Presentation by: Dr. Nathalie Moreno Partner. Cloud Computing and Data Protection: an Update 4 October 2012

Log Management Solution for IT Big Data

How To Manage Log Management

Securing Sensitive Data within Amazon Web Services EC2 and EBS

The Advantages and Disadvantages of ITIL

White Paper. BD Assurity Linc Software Security. Overview

<Insert Picture Here> Oracle Database Security Overview

Best Practices for a BYOD World

Big Data at Cloud Scale

Data Security: Strategy and Tactics for Success

THE BLUENOSE SECURITY FRAMEWORK

Copyright 2013, Oracle and/or its affiliates. All rights reserved.

Privileged Administra0on Best Prac0ces :: September 1, 2015

IBM Cloud Security Draft for Discussion September 12, IBM Corporation

The State of Data Centric Security

Protecting against DoS/DDoS Attacks with FortiWeb Web Application Firewall

Securing Office 365 with MobileIron

15th May Giuseppe Genovesi

IBM Security QRadar SIEM & Fortinet FortiGate / FortiAnalyzer

Enterprise World 2013 IR Briefing

Jort Kollerie SonicWALL

Securing Data in the Cloud

Vormetric Data Security

ICT budget and staffing trends in the UK

INCIDENT RESPONSE CHECKLIST

Enabling Manufacturing Transformation in a Connected World. John Shewchuk Technical Fellow DX

Privilege Gone Wild: The State of Privileged Account Management in 2015

ICT Priorities in Pharmaceuticals

Meeting Technology Risk Management (TRM) Guidelines from the Monetary Authority of Singapore (MAS)

Encryption Doesn t Always Protect Your Data. Presented by: Joe Sturonas PKWARE

About SecuPi. Your business runs on applications We secure them. Tel Aviv, Founded

Architecting for the Internet of Things & Big Data

Assessment & Monitoring

2015 VORMETRIC INSIDER THREAT REPORT

database monitoring, access control and data masking AccessMatrix DB Guard Basic Configuration

Safeguarding the cloud with IBM Dynamic Cloud Security

Software that provides secure access to technology, everywhere.

2013 AWS Worldwide Public Sector Summit Washington, D.C.

Ensuring High Service Levels for Public Cloud Deployments Keys to Effective Service Management

Data Refinery with Big Data Aspects

HP Atalla. Data-Centric Security & Encryption Solutions. Jean-Charles Barbou Strategic Sales Manager HP Atalla EMEA MAY 2015

Welcome to Services Discovery Channel. Host: Jean Wong, Head of Service Marketing, Asia Pacific, Japan and Greater China

Using a Managed File Transfer technology to prepare your customers for the GDPR (whatever is next)

Websense Data Security Gateway and Citrix NetScaler SDX Platform Overview

Compliance & Data Protection in the Big Data Age - MongoDB Security Architecture

DIGITAL GUARDIAN 6. The Foundation of Enterprise Information Protection

Analyzing Security for Retailers An analysis of what retailers can do to improve their network security

BCP and DR Plan With NAS Solution

Take the Red Pill: Becoming One with Your Computing Environment using Security Intelligence

Transcription:

Data Centric Security What s wrong and what to do about it Mike Shanahan Regional Sales Manager Albert Dolan Senior Systems Engineer, EMEA

IT s Dirty Little Secret 30+ Years super users have been managing our servers, their configurations, and data. 100% Percent of data that super users have access to in the systems they manage. 1 Number of compromised users required to cause havoc.

Why is privilege so important?

Threat Protection Transparent Encryption Valid Users APT DBAs Application/Utility SysAdmins Outsourced /Cloud Admins Database FS Agent File Systems Volume Managers Storage Storage Storage Admins Storag e Disk Theft/ Negligence

New Technologies Offer Business Advantage. But come with additional risks Business Advantage New Risks Cloud Flexibility Cost efficiency Higher Data Breach Risk Data Residency/Privacy Compliance violations Big Data Deep customer profiling and relationships Business trend analysis and correlations Sensitive data is everywhere Reports and results

What if You could use cloud IaaS without enhanced data breach risk? Enterprise Data Center Environment Policies & Logs Management Appliance or Software VPN Link Keys Data Access Policy and Encryption Key management Encryption and Access Control - only the enterprise has access to their data Data access logs provide audit and insight into enterprise data access patterns Data cannot be legally compelled from the cloud provider

What if You could use cloud and still meet Data Residency/Privacy requirements? UK Local encryption key management France Local encryption key management Germany & Spain Local encryption key management for all data Tokenize PII Private Information never leaves the country

What if You could use SaaS Storage without risk of data exposure? Enterprise Premise Audit Data/ Access logs Personal Computers Cloud Storage DSM Mobile Devices Servers Cloud Encryption Gateway Give users access to cloud storage environments retain local control of data Data access by policy All data encrypted before it leaves the enterprise

What if Big Data environments were safe for data inside and out? Data Data source Analytics Logs Financial Data Structure d Database Data warehouse Reports ERP CRM Big Data PII Credit cards Unstructure d Healthcare Data Audio video Dashboards Excel, CSV Social media Logs Encrypt at OS level and Tokenize or Encrypt within application System logs Configuratio n Disk cache Error logs Protect with encryption + access controls + access monitoring at OS/File system level What if queries Encrypt at OS level and Tokenize or Encrypt within application Encryption, access controls, tokenization protect data from inside-out and outside-in

Vormetric Data Security Platform Vormetric Tokenization Vormetric Application Encryption Vormetric Transparent Encryption Vormetric DSM Vormetric Cloud Gateway Vormetric Key Management

2015 VORMETRIC INSIDER THREAT REPORT 818 100% Retail Polling by Harris 2015 Vormetric Insider Threat Report Healthcare IT DECISION MAKERS US, UK, Germany, Japan, ASEAN Enterprises: $200M + US $100M + UK, Germany, Japan, ASEAN Financial Services Other Enterprise Analysis and Reporting by Ovum

TOP IT SPENDING PRIORITIES COMPLIANCE IS LAST FOR THE FIRST TIME DATA BREACH 50% PREVENTING A DATA BREACH INCIDENT 44% PROTECTION OF CRITICAL IP 41% PROTECTION OF FINANCES AND OTHER ASSETS 32% FULFILLING REQUIREMENTS FROM CUSTOMERS, PARTNERS AND PROSPECTS 32% FULFILLING COMPLIANCE REQUIREMENTS AND PASSING AUDITS

A Word About Vormetric Vision To Secure the World s Information Customers 1500+ Customers Across 21 Countries 17 of Fortune 30 15+ Cloud and Hosting Providers Global Presence Global Headquarters - San Jose, CA, USA EMEA Headquarters - Reading, United Kingdom APAC Headquarters - Singapore Data-at-Rest Protection Products Transparent Encryption, Application-layer Encryption Tokenization with Dynamic Data Masking Cloud Encryption Gateway Key Management