RSA and Microsoft s Build in vs.bolt On



Similar documents
Mobile Strategies and the Need for Process Reinvention Smarter Process Summit

with Managing RSA the Lifecycle of Key Manager RSA Streamlining Security Operations Data Loss Prevention Solutions RSA Solution Brief

Kelvin Wee CISA, CISM, CISSP Principal Consultant (DLP Specialist) Asia Pacific and Japan

The Future of Marketing Platforms IBM Corporation

SOA Governance and the Service Lifecycle

RSA Solution Brief RSA. Data Loss. Uncover your risk, establish control. RSA. Key Manager. RSA Solution Brief

Securing Remote Access in the Federal Government: Addressing the Needs for Telework and Continuity of Operations. RSA Solution Brief

White paper. Four Best Practices for Secure Web Access

RSA Data Loss Prevention (DLP) Understand business risk and mitigate it effectively

Backup and Restore Manager for z/vm

Business Activity Monitoring of non-ibm activity

IBM Tivoli End-to-End Software Asset Management Solutions

TECHNOLOGY PARTNER CERTIFICATION BENEFITS AND PROCESS

<Insert Picture Here> Oracle Identity And Access Management

RSA Via Lifecycle and Governance 101. Getting Started with a Solid Foundation

IBM Infrastructure Suite for z/vm and Linux

Manageability with BPM

Actual trends in backup protection solution IBM Backup Products and Services

z/vm and Linux on zseries Performance Monitoring An Update on How and With What Products

Service Updates and Enhancements

An E2E integrated approach to IT Asset Management

Process Automation Overview Process Automation Overview

Data Protection McAfee s Endpoint and Network Data Loss Prevention

White paper. Five Key Considerations for Selecting a Data Loss Prevention Solution

RSA SIEM and DLP Infrastructure and Information Monitoring in One Solution

- Update IBM Content Navigator Experience Platform. Sven Hapke Leading Technical Professional, Enterprise Content Management

A Websense Research Brief Prevent Data Loss and Comply with Payment Card Industry Data Security Standards

The IBM Rational Software Development Platform..Role focused tools help simplification via Separation of Concerns

CA Technologies Data Protection

RSA SecurBook for Microsoft SharePoint. A Guide for Deploying and Administering the RSA Solution for Microsoft SharePoint

RSA Solution Brief RSA. Encryption and Key Management Suite. RSA Solution Brief

SOA Executive Overview Achieve Business Agility, October 23, Ray Daniel, Connectivity and Integration Executive

Q1 Labs Corporate Overview

Copyright 2013, Oracle and/or its affiliates. All rights reserved.

IBM Cloud Security Draft for Discussion September 12, IBM Corporation

10 Building Blocks for Securing File Data

場 次 :C-3 公 司 名 稱 :RSA, The Security Division of EMC 主 題 : 如 何 應 用 網 路 封 包 分 析 對 付 資 安 威 脅 主 講 人 :Jerry.Huang@rsa.com Sr. Technology Consultant GCR

How To Protect Your Virtual Infrastructure From Attack From A Cyber Threat

Delivering Quality Service with IBM Service Management

Ensuring Security and Compliance of Your EMC Documentum Enterprise Content Management System: A Collaborative Effort of EMC Documentum and RSA

EMC Security for Microsoft Exchange Solution: Data Loss Prevention and Secure Access Management

MaaSter Microsoft Ecosystem Management with MaaS360. Chuck Brown Jimmy Tsang

How To Manage A Corporate Device Ownership (Byod) On A Corporate Network (For Employees) On An Iphone Or Ipad Or Ipa (For Non-Usenet) On Your Personal Device

Implementing Tivoli Storage Manager on Linux on System z

Modern Data Management & Intelligent Archive. Mark Bentkower, CISSP Director, Enterprise Solution APAC CommVault

Strategies to Mitigate Information Risk: Data Loss Prevention and Enterprise Rights Management

A Buyer's Guide to Data Loss Protection Solutions

Mobile, Cloud, Advanced Threats: A Unified Approach to Security

Securely Yours LLC Top Security Topics for Sajay Rai, CPA, CISSP, CISM

Web Security Update. A Radicati Group, Inc. Webconference. The Radicati Group, Inc. Copyright March 2010, Reproduction Prohibited

IBM Tivoli Monitoring for Databases

How To Secure A Database From A Leaky, Unsecured, And Unpatched Server

Backing Up and Restoring a z/vm Cluster and Linux on System z Guests

Leading The World Into Connected Security. Paolo Florian Sales Engineer

McAfee - Overview. Anthony Albisser

Arwed Tschoeke, Systems Architect IBM Systems and Technology Group

XProtect Corporate 2013

IBM Tivoli Monitoring for Applications

SECURE FILE SHARING AND COLLABORATION: THE PATH TO INCREASED PRODUCTIVITY AND REDUCED RISK

McAfee Web Reporter Turning volumes of data into actionable intelligence

Powering real-time mobile access to critical information with ShareFile

Copyright 2013, Oracle and/or its affiliates. All rights reserved.

State of the Market for Security Information Event Management and Log File Management Solutions

White paper. 6 Best Practices for Preventing Enterprise Data Loss

McAfee Endpoint Protection Products

Changing the Enterprise Security Landscape

HP CLOUD SYSTEM. The most complete, integrated platform for building and managing clouds featuring Intel technologies.

Securely Yours LLC IT Hot Topics. Sajay Rai, CPA, CISSP, CISM

Strong Authentication: Enabling Efficiency and Maximizing Security in Your Microsoft Environment

Cisco Unified Expert Advisor

Malware and Other Malicious Threats

ADAPTIVE AUTHENTICATION ADAPTER FOR JUNIPER SSL VPNS. Adaptive Authentication in Juniper SSL VPN Environments. Solution Brief

Security Information & Event Management (SIEM)

IBM Tivoli Remote Control

SHARE in Pittsburgh Session 15591

Extending Identity and Access Management

This document provides the first-priority information on Parallels Virtuozzo Containers 4.0 for Windows and supplements the included documentation.

HP Software LICENSE KEY PROCESSES

Check Point Positions

How To Buy Nitro Security

Securing the Journey to the Private Cloud. Dominique Dessy RSA, the Security Division of EMC

Virtualization Support - Real Backups of Virtual Environments

Information Risk Management. Alvin Ow Director, Technology Consulting Asia Pacific & Japan RSA, The Security Division of EMC

VCE BUSINESS UPDATE AND OVERVIEW

Sophos Acquires Cyberoam

Beyond passwords: Protect the mobile enterprise with smarter security solutions

8 Steps to Holistic Database Security

management solutions

Process modeling at enterprise scale using BlueworksLive and IBM BPM

Kony Mobile Application Management (MAM)

Data Loss Prevention Program

INFORMATION PROTECTION

PCI Security Standards Council

Avaya Interaction Center

DocuSign for SharePoint Online v2.4

RSA Identity and Access Management 2014

Rashmi Knowles Chief Security Architect EMEA

MANAGEMENT SOLUTIONS SAFEGUARD BUSINESS CONTINUITY AND PRODUCTIVITY WITH MIMECAST

Alexander De Houwer Technology Advisor Devices Win 10 Vincent Dal Technology Advisor Business Productivity

File Integrity Monitoring: A Critical Piece in the Security Puzzle. Challenges and Solutions

Transcription:

RSA and Microsoft s Build in vs.bolt On Kimmo Bergius, Microsoft Petri Vilander, RSA, Security Division of EMC

What Microsoft and RSA did Announce? Microsoft and RSA partnering with a Built-In systems approach to protect sensitive information throughout the infrastructure based on content, context, and identity Two Main Components of Announcement: Microsoft building RSA Data Loss Prevention (DLP) classification technology directly into multiple Microsoft products throughout the infrastructure. RSA integrating Microsoft Rights Management Services (RMS) and Active Directory (AD) Groups in DLP 6.5 (Available Dec 08) All RSA DLP solutions today are Future Ready for RSA DLP enabled Microsoft products RSA and Microsoft share mutual roadmap for Integrated Solutions MS SharePoint Security

What a Year! RSA is vastly more than user authentication; it is a key portion of how companies protect critical records and comply with critical regulations. ITBusiness Edge, Rob Enderle A Huge Cache of Stolen Financial Data EMC, Microsoft Team Up on Data Security SIEM Magic Quadrant: May 2008 Security and Innovation: Why Can t We All Get Along 3 Web Fraud Management MQ: Jan 2009 TBD DLP Magic Quadrant: June 2008

2008 was a year of strength for RSA Acceleration in Newer, Growth Categories: IPV envision DLP Expansion into New Verticals Creation of New Partnerships Microsoft Recognition of Our Market Leadership RSA Value Forrester Wave leadership for DLP Gartner Magic Quadrant Leadership for envision, DLP and IPV (new!) 4

RSA Protection in Action 200 1240,000+ 100,000+ 30,000+ Billion+ Million+ Applications Phishing Events Organizations shipped Identities logged attacks with per protected BSAFE shut second down Encryption 30,000+ 100,000+ 240,000+ 1 Billion+ 200 Million+ organizations protected by RSA technology online phishing attacks shut down by the RSA Anti-Fraud Command Center events per second logged from over 80,000+ devices at a single RSA envision customer site applications shipped with RSA BSAFE encryption most widely deployed software in the world* online identities protected with RSA identification and protection technology 5 *Embedded in Microsoft, HP, Sun and IBM operating systems, Internet Explorer and Netscape browsers, Ericsson, Nokia, Motorola phones, major US government agencies and the list goes on

RSA Strategy RSA System 1 Holistic Solution Build a holistic solution, integrating between and among products and services from RSA and EMC. 2 Leverage Own strategic aspects of the system: policies, monitoring and some controls where we are market leaders. Move into adjacent markets. 3 Integrate Own or partner for key assets in Identity, Intelligence and Information Infrastructure. 4 Partner Ecosystem 5 Strategic Services Build an ecosystem of strategic, market leaders that control key segments which significantly expand our footprint. A suite of services that allow us to become the trusted advisor to our customers. 6

CISO s View of the World RISK POLICY IDENTITIES INFRASTRUCTURE INFORMATION Enable Employees Customer Partners Disable Inexperienced Users Disgruntled Employees Criminals Spies Data Center Applications End Points Protect Important Information Sensitive/Legal/Financial PII IP Ignore Unimportant Information Product Literature Networks Marketing Collateral Corporate Information COLLECT ANALYZE REPORT RESPOND 7

The RSA System RISK Policy Management POLICY Console INFRASTRUCTURE Are my controls working? Am I compliant? Data Center POLICY IDENTITIES Authentication Access Controls Applications POLICY INFRASTRUCTURE End Points Networks SIEM POLICY INFORMATION DLP Encrypt/ Key Mgmt COLLECT ANALYZE REPORT RESPOND 8 SIEM

What Microsoft and RSA did Announce? Microsoft and RSA partnering with a Built-In systems approach to protect sensitive information throughout the infrastructure based on content, context, and identity Two Main Components of Announcement: Microsoft building RSA Data Loss Prevention (DLP) classification technology directly into multiple Microsoft products throughout the infrastructure. RSA integrating Microsoft Rights Management Services (RMS) and Active Directory (AD) Groups in DLP 6.5 (Available Dec 08) All RSA DLP solutions today are Future Ready for RSA DLP enabled Microsoft products RSA and Microsoft share mutual roadmap for Integrated Solutions MS SharePoint Security

Microsoft Building Information Protection Into Infrastructure RSA Providing Complementary Platforms Add-on Policies RSA DLP Enterprise Manager Microsoft Information Protection Management RSA Microsoft Endpoint E-mail/UC Network Apps FS/CMS Storage Built-in DLP Classification and RMS Controls Microsoft Environment and Applications Complementary Platforms and functionality RSA DLP Endpoint RSA DLP Network RSA DLP Datacenter Future ready: Seamless upgrade path for current DLP customers Common policies throughout infrastructure Built-in approach to protect data based on content, context, identity

First Step - RSA DLP Suite integrating with Microsoft AD RMS in DLP 6.5 Release (Dec 2008) 1. RMS admin creates RMS templates for data protection Microsoft AD RMS Legal Department View, Edit, Print Outside law firm View Others No Access Legal Contracts RMS 2. RSA DLP admin designs policies to find sensitive data and protect it using RMS RSA DLP Find Legal Contracts Apply Legal Contracts RMS Contracts DLP Policy 3. RSA DLP discovers and classifies sensitive files 4. RSA DLP applies RMS controls based on policy Laptops/desktops Legal department Outside law firm 5. Users request files -RMS provides policy based access File shares SharePoint Automate the application of AD RMS protection based on sensitiveinformation identified by RSA DLP Datacenter and DLP Endpoint Discover Leverage AD Groups with DLP Network and Endpoint Enforce for identity or group aware data loss prevention Other s

Microsoft Building Information Protection Into Infrastructure RSA Providing Complementary Platforms Add-on Policies RSA DLP Enterprise Manager Microsoft Information Protection Management RSA Microsoft Endpoint E-mail/UC Network Apps FS/CMS Storage Built-in DLP Classification and RMS Controls Microsoft Environment and Applications Complementary Platforms and functionality RSA DLP Endpoint RSA DLP Network RSA DLP Datacenter Future ready: Seamless upgrade path for current DLP customers Common policies throughout infrastructure Built-in approach to protect data based on content, context, identity

First Step - RSA DLP Suite integrating with Microsoft AD RMS in DLP 6.5 Release (Dec 2008) 1. RMS admin creates RMS templates for data protection Microsoft AD RMS Legal Department View, Edit, Print Outside law firm View Others No Access Legal Contracts RMS 2. RSA DLP admin designs policies to find sensitive data and protect it using RMS RSA DLP Find Legal Contracts Apply Legal Contracts RMS Contracts DLP Policy 3. RSA DLP discovers and classifies sensitive files 4. RSA DLP applies RMS controls based on policy Laptops/desktops Legal department Outside law firm 5. Users request files -RMS provides policy based access File shares SharePoint Automate the application of AD RMS protection based on sensitiveinformation identified by RSA DLP Datacenter and DLP Endpoint Discover Leverage AD Groups with DLP Network and Endpoint Enforce for identity or group aware data loss prevention Other s

Computer Technology Review - newpaper Monday February 02, 2009 Practice What You Preach: EMC Implements Its Own Solution for Data Loss Prevention Monday, 05 January 2009 15:46 V.Jay LaRosa, EMC When technology giant EMC Corp. deployed a data loss prevention (DLP) solution for the first time, it chose to protect a critical asset: software source code obtained through nearly four dozen acquisitions. Like most large companies, EMC is tackling the challenge of data loss prevention (DLP)- keeping sensitive, confidential and high-value information from leaking outside the organization through unauthorized or unprotected channels. Our efforts are driven by the usual pressures: increased compliance requirements, the need to manage business risk, and the desire to preserve our brand. But we have another compelling reason as well. Our customers expect us to practice what we preach. And one value we preach, especially through our RSA Security division, is the importance of protecting critical information assets from external and internal threats. So it was a logical step for us to take the plunge into data loss prevention, which aims to reduce losses caused by insider activities, including deliberate misdeeds by wrong-doers and accidental security lapses caused by unwitting employees, contractors and partners.

RSA and Microsoft Integrated Solution MS SharePoint Security Unfettered growth of SharePoint sites with lack of central management of security information infrastructure identities Need for granular, central control over where sensitive data might exist and who has access to it Need for reporting on actual access to sensitive data Need to ensure SharePoint configuration is secured

MS SharePoint Security Questions and Capabilities Known Sites Known Confidential Sites Confidential 1 Data Controls Problem Offer 6 5 Access Controls 1- Which Sites Are Sensitive? DLP 2 2- Who s using those sites? 3- How are they using them? EPM envision /EPM P 3 Confidential Sites & Users 4- Can I control the data? DLP 5- Can I control Access? EPM and SID 6- Can I de-provision? Courion Event Monitoring 4 17

Proposed RSA Solution Components Discovery of Sites and Sensitive Information on the sites Information righs management Through integration of DLP and MS RMS Central Entitlements Management Sensitivity awareness through integration with DLP Monitoring and Reporting of User access and activities envision monitoring DLP and EPM logs Identity provisioning Security configuration mgmt DLP Datacenter + EMC ADM DLP Datacenter + MS RMS EPM + SecurID envision Courion or other partner Pro svcs, EMC partners 18

Finally. Hindi Russian Arabic Grazie Italian Traditional Chinese Thank English You Simplified Chinese Thai Gracias Spanish Obrigado Brazilian Portuguese German Danke French Merci Tamil Japanese Korean

Petri Vilander Country Manager petri.vilander@rsa.com +358 (0) 201202200 Kimmo Bergius Chief Security Advisor kimmo.bergius@microsoft.com +358 (0)503428739

21