RSA, The Security Division of EMC. Zamanta Anguiano Sales Manager RSA

Similar documents
Enabling Security Operations with RSA envision. August, 2009

RSA Solution Brief. The RSA Solution for Cloud Security and Compliance

The RSA Solution for. infrastructure security and compliance. A GRC foundation for VMware. Solution Brief

Continuous Network Monitoring

RSA envision. Platform. Real-time Actionable Security Information, Streamlined Incident Handling, Effective Security Measures. RSA Solution Brief

RSA SECURITY MANAGEMENT. An Integrated approach to risk, operations and incident management. Solution Brief

How RSA has helped EMC to secure its Virtual Infrastructure

Preempting Business Risk with RSA SIEM and CORE Security Predictive Security Intelligence Solutions

with Managing RSA the Lifecycle of Key Manager RSA Streamlining Security Operations Data Loss Prevention Solutions RSA Solution Brief

場 次 :C-3 公 司 名 稱 :RSA, The Security Division of EMC 主 題 : 如 何 應 用 網 路 封 包 分 析 對 付 資 安 威 脅 主 講 人 :Jerry.Huang@rsa.com Sr. Technology Consultant GCR

The Benefits of an Integrated Approach to Security in the Cloud

Strengthen security with intelligent identity and access management

How To Protect Your Network From Attack From A Network Security Threat

SANS Top 20 Critical Controls for Effective Cyber Defense

Solving the Security Puzzle

FIVE KEY CONSIDERATIONS FOR ENABLING PRIVACY IN HEALTH INFORMATION EXCHANGES

RSA ARCHER AUDIT MANAGEMENT

Preparing for a Cyber Attack PROTECT YOUR PEOPLE AND INFORMATION WITH SYMANTEC SECURITY SOLUTIONS

CONNECTING ACCESS GOVERNANCE AND PRIVILEGED ACCESS MANAGEMENT

Securing Remote Vendor Access with Privileged Account Security

Security Analytics for Smart Grid

Scalability in Log Management

Whitepaper. Advanced Threat Hunting with Carbon Black

RSA ARCHER OPERATIONAL RISK MANAGEMENT

CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL

Accenture Intelligent Security for the Digital Enterprise. Archer s important role in solving today's pressing security challenges

RSA ARCHER BUSINESS CONTINUITY MANAGEMENT AND OPERATIONS Solution Brief

Managing the Unpredictable Human Element of Cybersecurity

Navigating the NIST Cybersecurity Framework

Security management solutions White paper. IBM Tivoli and Consul: Facilitating security audit and compliance for heterogeneous environments.

CyberArk Privileged Threat Analytics. Solution Brief

Mike Smart Cyber Strategist & Enterprise Security Solutions, EMEA. Cyber: The Catalyst to Transform the Security Program

Securing Privileges in the Cloud. A Clear View of Challenges, Solutions and Business Benefits

Leveraging innovative security solutions for government. Helping to protect government IT infrastructure, meet compliance demands and reduce costs

Product white paper. ROI and SIEM. How the RSA envision platform delivers an Industry-leading ROI

IMPLEMENTING A SECURITY ANALYTICS ARCHITECTURE

Information Risk Management. Alvin Ow Director, Technology Consulting Asia Pacific & Japan RSA, The Security Division of EMC

Seven Things To Consider When Evaluating Privileged Account Security Solutions

Advanced Threats: The New World Order

ADAPTIVE AUTHENTICATION ADAPTER FOR JUNIPER SSL VPNS. Adaptive Authentication in Juniper SSL VPN Environments. Solution Brief

HyTrust Logging Solution Brief: Gain Virtualization Compliance by Filling Log Data Gaps

Close The Gaps Left By Traditional Vulnerability Management Through Continuous Monitoring Organizations Find Real Value With Continuous Monitoring

Using SIEM for Real- Time Threat Detection

Cyber Resilience Implementing the Right Strategy. Grant Brown Security specialist,

Payment Card Industry Data Security Standard

Safeguarding the cloud with IBM Dynamic Cloud Security

RSA Security Solutions for Virtualization

ForeScout CounterACT CONTINUOUS DIAGNOSTICS & MITIGATION (CDM)

Take Control of Identities & Data Loss. Vipul Kumra

IMPROVING RISK VISIBILITY AND SECURITY POSTURE WITH IDENTITY INTELLIGENCE

Extreme Networks Security Analytics G2 Vulnerability Manager

McAfee Security Architectures for the Public Sector

Enterprise Security Solutions

How To Manage Security On A Networked Computer System

Avoiding the Top 5 Vulnerability Management Mistakes

Real-Time Security for Active Directory

What is Security Intelligence?

Cisco Software-as-a-Service (SaaS) Access Control

An Introduction to SIEM & RSA envision (Security Information and Event Management) January, 2011

Eoin Thornton Senior Security Architect Zinopy Security Ltd.

Combating a new generation of cybercriminal with in-depth security monitoring. 1 st Advanced Data Analysis Security Operation Center

SITUATIONAL AWARENESS MITIGATE CYBERTHREATS

Compliance Guide ISO Compliance Guide. September Contents. Introduction 1. Detailed Controls Mapping 2.

Caretower s SIEM Managed Security Services

Take Back Control in IT. Desktop & Server Management (DSM)

THE 2014 THREAT DETECTION CHECKLIST. Six ways to tell a criminal from a customer.

Active Network Defense: Real time Network Situational Awareness and a Single Source of Integrated, Comprehensive Network Knowledge

Cisco Advanced Services for Network Security

Endpoint Security for DeltaV Systems

ADVANCED THREATS IN THE ENTERPRISE. Finding an Evil in the Haystack with RSA ECAT. White Paper

What Do You Mean My Cloud Data Isn t Secure?

Trusted Geolocation in The Cloud Technical Demonstration

BREAKING THE KILL CHAIN AN EARLY WARNING SYSTEM FOR ADVANCED THREAT

Top 5 Global Bank Selects Resolution1 for Cyber Incident Response.

TECHNOLOGY PARTNER CERTIFICATION BENEFITS AND PROCESS

Effective Threat Management. Building a complete lifecycle to manage enterprise threats.

McAfee Server Security

IIA Conference. September 18, Paige Needling Director, Global Information Security Recall, Inc.

Protect the data that drives our customers business. Data Security. Imperva s mission is simple:

Information Blue Valley Schools FEBRUARY 2015

CYBER AND IT SECURITY: CLOUD SECURITY FINAL SESSION. Architecture Framework Advisory Committee November 4, 2014

IBM Security QRadar Vulnerability Manager

FFIEC Cybersecurity Assessment Tool

Defending against modern cyber threats

Identity & Access Management in the Cloud: Fewer passwords, more productivity

NetIQ FISMA Compliance & Risk Management Solutions

Business Case Outsourcing Information Security: The Benefits of a Managed Security Service

Preemptive security solutions for healthcare

Transcription:

RSA, The Security Division of EMC Zamanta Anguiano Sales Manager RSA

The Age of the Hyperextended Enterprise BUSINESS ISSUES IMPACT Innovation Collaboration Exploding Information Supply Chain Customer Services Hyperextended Enterprise Expanding Identities Evolving Infrastructure IT Consumerization Virtualization and Cloud Computing Complex Risk, Security and Compliance Environment Increasing Regulations 2

Traditional Approach Team Team Team Policy Point Tool Policy Point Tool Policy Point Tool Network Endpoint Applications Siloed Inflexible Inconsistent Costly 3

Our Customers Are Asking Themselves Am I secure? Am I compliant? Where do I have gaps? How do I prioritize? 4

Our Customers Are Asking Themselves Can I do this affordably? Am I aligned to the business? 5

Meeting our Customers Challenges Manage Risk and Threats Throughout Enterprise Prove Compliance Consistently & Affordably Secure Access for Increased Mobility & Collaboration Secure Virtualization & Cloud Computing 6 How?

Managing Risk and Threats No clear visibility to threats and exposures Inability to adequately address exposures Slow to respond 7

What We ve Heard Risk and Threat Management CHALLENGE Siloed view of risk Security measures don t address internal and external threats Don t have a good handle on vulnerabilities Can t respond quickly enough to incidents Difficult to prioritize threats and incidents Single dashboard for managing risk Regular feed of current and relevant threat information Gap analyses and security assessments Ability to discover, monitor and protect sensitive data as it travels Automated incident and threat management process integrated with embedded detection tools and controls Easy-to-use tools for dashboarding compliance, reporting, forensics analysis REQUIREMENT SOLUTION Comprehensive view of external threats, sensitive data and use of corporate infrastructure 8 MENU

What We ve Heard Fraud Management CHALLENGE Difficult to balance tradeoff between strong security and user experience Can t keep pace with cybercriminal innovation and tactics Unaware of the money, credentials, assets identities that my business is losing Prevented from offering new services/products due to lack of controls Accurate, real-time fraud/threat detection with minimal impact to user experience 24 x 7 x 365 dedicated anti-fraud cybercrime operation Ability to share cybercrime across thousands of networked organizations Knowledge and prevention of fraud losses Layered defense strategy to safely offer new products and services REQUIREMENT SOLUTION Cybercrime defense strategy to prevent unauthorized use and/or acquisition of critical information 9 MENU

Prove Compliance Consistently and Affordably Difficult to keep track of changing regulations Time consuming manual processes Unclear view of compliance posture 10

What We ve Heard Prove Compliance Consistently and Affordably CHALLENGE Can t keep up with changing regulations Wasting time and money with inefficient, manual processes Not sure if we re non- compliant No way to communicate compliance posture throughout the organization Centralized policy system powered by content from a community of experts Automated compliance process integrated with well-defined controls and reporting Streamlined, repeatable system Ability to discover, monitor and protect sensitive information Real-time alerting Flexible dashboards and reports for compliance Tailored dashboards to get the right information to the right people when they need it REQUIREMENT SOLUTION Easier audits, minimized exposure, improved focus on adding value to business 11 MENU

Secure Access for Increased Mobility and Collaboration Lack of confidence in secure access Struggle with onesize-fits-all security Security impeding new business initiatives 12

What We ve Heard Secure Access for Increased Mobility and Collaboration CHALLENGE Unclear who is remotely accessing our systems and what they are doing inside the network Users bypass cumbersome security mechanisms -- putting corporate resources at risk Not prepared to address attacks against our organization Security is impeding new business initiatives such as VDI and outsourcing Confidence that only legitimate users are accessing your information Ability to monitor all user activity on the network Range of authentication mechanisms for various applications and profiles Single sign-on capabilities for reduced costs and increased user satisfaction Global threat detection and takedown Corporate identities, credentials and systems recovery Strong authentication for workforce, partners customers Flexibility to enforce policies and controls by user, document, site or transaction REQUIREMENT SOLUTION Enable collaboration between employees, partners and outsourcers without compromising security 13 MENU

Securing Virtualization and Cloud Security is impeding adoption Proceeding without security policies and processes Lack of visibility and control 14

What We ve Heard Virtual Desktop Security CHALLENGE Slow VDI rollout due to security concerns; Increasing costs and risks Lack of control over information on 3rd party desktops and employee laptops Need to protect access to VDI Visibility into security events and compliance across VDI Expertise and best practices for secure Virtualization; EMC, VMware and RSA Identify and protect sensitive information in use on virtual desktops Two factor authentication for user and administrator access Monitor security events across VDI to integrate into existing security operations and compliance reporting REQUIREMENT SOLUTION Realize business benefits of virtualizing desktops without compromising security 15 MENU

What We ve Heard Virtual Business Applications Security CHALLENGE Need to better understand security and compliance risks in virtualized environment Lack the visibility and controls in a virtualized environment that we have in physical IT environment Our virtual servers are less secure than the physical servers they replace Expertise and best practices for secure virtualization EMC, VMWare, RSA Enforce a single data security policy -- physical and virtual Collect and correlate security and compliance events physical and virtual Enforce secure access for privileged users Integrated solution to secure the virtual infrastructure, access to it, and information within it REQUIREMENT SOLUTION Realize the benefits of virtualization for mission critical applications without compromises on the security front MENU

How We Do It System for Managing Security, Risk and Compliance BUSINESS DRIVERS Manage Governance, Risk + Compliance Define Policy Assess Risk and Report Monitor Audit Report Correlate Map to Controls Add Context Collect IDENTITIES INFRASTRUCTURE INFORMATION Manage Monitor Detect Enforce MENU

RSA Archer egrc Suite 18

MAAGTIC 19

Why our Customers Choose RSA Industry Leadership & Market- Leading Products and Services Authentication, Data Loss Prevention, egrc, SIEM, Web Fraud Protection Built-in Versus Bolted-on Security Embedding controls directly into the infrastructure Integrated Approach to Managing Security, Risk and Compliance Connecting governance, evidence and controls RSA Community Security and egrc experts collaborating on challenges and trends Out-of-the-Box Expertise about regulations, threats and best practices, built by teams of experts EMC Connection Investing in our customers success 20 MENU

Thank you!