RSA and Microsoft s Build in vs.bolt On Kimmo Bergius, Microsoft Petri Vilander, RSA, Security Division of EMC
What Microsoft and RSA did Announce? Microsoft and RSA partnering with a Built-In systems approach to protect sensitive information throughout the infrastructure based on content, context, and identity Two Main Components of Announcement: Microsoft building RSA Data Loss Prevention (DLP) classification technology directly into multiple Microsoft products throughout the infrastructure. RSA integrating Microsoft Rights Management Services (RMS) and Active Directory (AD) Groups in DLP 6.5 (Available Dec 08) All RSA DLP solutions today are Future Ready for RSA DLP enabled Microsoft products RSA and Microsoft share mutual roadmap for Integrated Solutions MS SharePoint Security
What a Year! RSA is vastly more than user authentication; it is a key portion of how companies protect critical records and comply with critical regulations. ITBusiness Edge, Rob Enderle A Huge Cache of Stolen Financial Data EMC, Microsoft Team Up on Data Security SIEM Magic Quadrant: May 2008 Security and Innovation: Why Can t We All Get Along 3 Web Fraud Management MQ: Jan 2009 TBD DLP Magic Quadrant: June 2008
2008 was a year of strength for RSA Acceleration in Newer, Growth Categories: IPV envision DLP Expansion into New Verticals Creation of New Partnerships Microsoft Recognition of Our Market Leadership RSA Value Forrester Wave leadership for DLP Gartner Magic Quadrant Leadership for envision, DLP and IPV (new!) 4
RSA Protection in Action 200 1240,000+ 100,000+ 30,000+ Billion+ Million+ Applications Phishing Events Organizations shipped Identities logged attacks with per protected BSAFE shut second down Encryption 30,000+ 100,000+ 240,000+ 1 Billion+ 200 Million+ organizations protected by RSA technology online phishing attacks shut down by the RSA Anti-Fraud Command Center events per second logged from over 80,000+ devices at a single RSA envision customer site applications shipped with RSA BSAFE encryption most widely deployed software in the world* online identities protected with RSA identification and protection technology 5 *Embedded in Microsoft, HP, Sun and IBM operating systems, Internet Explorer and Netscape browsers, Ericsson, Nokia, Motorola phones, major US government agencies and the list goes on
RSA Strategy RSA System 1 Holistic Solution Build a holistic solution, integrating between and among products and services from RSA and EMC. 2 Leverage Own strategic aspects of the system: policies, monitoring and some controls where we are market leaders. Move into adjacent markets. 3 Integrate Own or partner for key assets in Identity, Intelligence and Information Infrastructure. 4 Partner Ecosystem 5 Strategic Services Build an ecosystem of strategic, market leaders that control key segments which significantly expand our footprint. A suite of services that allow us to become the trusted advisor to our customers. 6
CISO s View of the World RISK POLICY IDENTITIES INFRASTRUCTURE INFORMATION Enable Employees Customer Partners Disable Inexperienced Users Disgruntled Employees Criminals Spies Data Center Applications End Points Protect Important Information Sensitive/Legal/Financial PII IP Ignore Unimportant Information Product Literature Networks Marketing Collateral Corporate Information COLLECT ANALYZE REPORT RESPOND 7
The RSA System RISK Policy Management POLICY Console INFRASTRUCTURE Are my controls working? Am I compliant? Data Center POLICY IDENTITIES Authentication Access Controls Applications POLICY INFRASTRUCTURE End Points Networks SIEM POLICY INFORMATION DLP Encrypt/ Key Mgmt COLLECT ANALYZE REPORT RESPOND 8 SIEM
What Microsoft and RSA did Announce? Microsoft and RSA partnering with a Built-In systems approach to protect sensitive information throughout the infrastructure based on content, context, and identity Two Main Components of Announcement: Microsoft building RSA Data Loss Prevention (DLP) classification technology directly into multiple Microsoft products throughout the infrastructure. RSA integrating Microsoft Rights Management Services (RMS) and Active Directory (AD) Groups in DLP 6.5 (Available Dec 08) All RSA DLP solutions today are Future Ready for RSA DLP enabled Microsoft products RSA and Microsoft share mutual roadmap for Integrated Solutions MS SharePoint Security
Microsoft Building Information Protection Into Infrastructure RSA Providing Complementary Platforms Add-on Policies RSA DLP Enterprise Manager Microsoft Information Protection Management RSA Microsoft Endpoint E-mail/UC Network Apps FS/CMS Storage Built-in DLP Classification and RMS Controls Microsoft Environment and Applications Complementary Platforms and functionality RSA DLP Endpoint RSA DLP Network RSA DLP Datacenter Future ready: Seamless upgrade path for current DLP customers Common policies throughout infrastructure Built-in approach to protect data based on content, context, identity
First Step - RSA DLP Suite integrating with Microsoft AD RMS in DLP 6.5 Release (Dec 2008) 1. RMS admin creates RMS templates for data protection Microsoft AD RMS Legal Department View, Edit, Print Outside law firm View Others No Access Legal Contracts RMS 2. RSA DLP admin designs policies to find sensitive data and protect it using RMS RSA DLP Find Legal Contracts Apply Legal Contracts RMS Contracts DLP Policy 3. RSA DLP discovers and classifies sensitive files 4. RSA DLP applies RMS controls based on policy Laptops/desktops Legal department Outside law firm 5. Users request files -RMS provides policy based access File shares SharePoint Automate the application of AD RMS protection based on sensitiveinformation identified by RSA DLP Datacenter and DLP Endpoint Discover Leverage AD Groups with DLP Network and Endpoint Enforce for identity or group aware data loss prevention Other s
Microsoft Building Information Protection Into Infrastructure RSA Providing Complementary Platforms Add-on Policies RSA DLP Enterprise Manager Microsoft Information Protection Management RSA Microsoft Endpoint E-mail/UC Network Apps FS/CMS Storage Built-in DLP Classification and RMS Controls Microsoft Environment and Applications Complementary Platforms and functionality RSA DLP Endpoint RSA DLP Network RSA DLP Datacenter Future ready: Seamless upgrade path for current DLP customers Common policies throughout infrastructure Built-in approach to protect data based on content, context, identity
First Step - RSA DLP Suite integrating with Microsoft AD RMS in DLP 6.5 Release (Dec 2008) 1. RMS admin creates RMS templates for data protection Microsoft AD RMS Legal Department View, Edit, Print Outside law firm View Others No Access Legal Contracts RMS 2. RSA DLP admin designs policies to find sensitive data and protect it using RMS RSA DLP Find Legal Contracts Apply Legal Contracts RMS Contracts DLP Policy 3. RSA DLP discovers and classifies sensitive files 4. RSA DLP applies RMS controls based on policy Laptops/desktops Legal department Outside law firm 5. Users request files -RMS provides policy based access File shares SharePoint Automate the application of AD RMS protection based on sensitiveinformation identified by RSA DLP Datacenter and DLP Endpoint Discover Leverage AD Groups with DLP Network and Endpoint Enforce for identity or group aware data loss prevention Other s
Computer Technology Review - newpaper Monday February 02, 2009 Practice What You Preach: EMC Implements Its Own Solution for Data Loss Prevention Monday, 05 January 2009 15:46 V.Jay LaRosa, EMC When technology giant EMC Corp. deployed a data loss prevention (DLP) solution for the first time, it chose to protect a critical asset: software source code obtained through nearly four dozen acquisitions. Like most large companies, EMC is tackling the challenge of data loss prevention (DLP)- keeping sensitive, confidential and high-value information from leaking outside the organization through unauthorized or unprotected channels. Our efforts are driven by the usual pressures: increased compliance requirements, the need to manage business risk, and the desire to preserve our brand. But we have another compelling reason as well. Our customers expect us to practice what we preach. And one value we preach, especially through our RSA Security division, is the importance of protecting critical information assets from external and internal threats. So it was a logical step for us to take the plunge into data loss prevention, which aims to reduce losses caused by insider activities, including deliberate misdeeds by wrong-doers and accidental security lapses caused by unwitting employees, contractors and partners.
RSA and Microsoft Integrated Solution MS SharePoint Security Unfettered growth of SharePoint sites with lack of central management of security information infrastructure identities Need for granular, central control over where sensitive data might exist and who has access to it Need for reporting on actual access to sensitive data Need to ensure SharePoint configuration is secured
MS SharePoint Security Questions and Capabilities Known Sites Known Confidential Sites Confidential 1 Data Controls Problem Offer 6 5 Access Controls 1- Which Sites Are Sensitive? DLP 2 2- Who s using those sites? 3- How are they using them? EPM envision /EPM P 3 Confidential Sites & Users 4- Can I control the data? DLP 5- Can I control Access? EPM and SID 6- Can I de-provision? Courion Event Monitoring 4 17
Proposed RSA Solution Components Discovery of Sites and Sensitive Information on the sites Information righs management Through integration of DLP and MS RMS Central Entitlements Management Sensitivity awareness through integration with DLP Monitoring and Reporting of User access and activities envision monitoring DLP and EPM logs Identity provisioning Security configuration mgmt DLP Datacenter + EMC ADM DLP Datacenter + MS RMS EPM + SecurID envision Courion or other partner Pro svcs, EMC partners 18
Finally. Hindi Russian Arabic Grazie Italian Traditional Chinese Thank English You Simplified Chinese Thai Gracias Spanish Obrigado Brazilian Portuguese German Danke French Merci Tamil Japanese Korean
Petri Vilander Country Manager petri.vilander@rsa.com +358 (0) 201202200 Kimmo Bergius Chief Security Advisor kimmo.bergius@microsoft.com +358 (0)503428739
21