Welcome to the SafeNet Executive Day! Bucharest 27th of May 2014. Insert Your Name Insert Your Title Insert Date

Similar documents
Securing sensitive data at Rest ProtectFile, ProtectDb and ProtectV. Nadav Elkabets Presale Consultant

Cloud Security Case Study Amazon Web Services. Ugo Piazzalunga Technical Manager, IT Security

Welcome to the SafeNet Executive Day! Новые ГоризонтыИнформа ционной Безопасности

ProtectV. Securing Sensitive Data in Virtual and Cloud Environments. Executive Summary

The Cloud Backup Opportunity

FAMILY BROCHURE Sensitive data is everywhere. So are we.

Secure your cloud applications by building solid foundations with enterprise (security ) architecture

NCTA Cloud Architecture

Adding value as a Cloud Broker. Nick Hyner Director Cloud Services EMEA Twitter Dell.com/Cloud

ways to enhance security in AWS ebook

Cloud Security. Peter Jopling IBM UK Ltd Software Group Hursley Labs. peterjopling IBM Corporation

McAfee - Overview. Anthony Albisser

Data Protection: From PKI to Virtualization & Cloud

Encrypting Data at Rest

Leadership Styles - Top 10 Success Strategies of a SafeNet President

Layer 2 Network Encryption where safety is not an optical illusion Marko Bobinac SafeNet PreSales Engineer

ways to enhance security in AWS ebook

Beyond CRM: a new era for Customer Engagement SAP hybris - Customer Engagement & Commerce

Applying Cryptography as a Service to Mobile Applications

Glinda Cummings World Wide Tivoli Security Product Manager

Commercially Proven Trusted Computing Solutions RSA 2010

Security in the Software Defined Data Center

Securing Data at Rest with Encryption

People-centric IT: Bedeutung für das Identity und Access Management. Uwe Lüthy Solution Sales Specialist Core Infrastructure Microsoft Schweiz Gmbh

Secure Your Success. Intel Security Partner Program

Security Solutions for Microsoft Applications

Compliance for the Road Ahead

Securing Data in the Virtual Data Center and Cloud: Requirements for Effective Encryption

How To Make A Multi-Tenant Platform Secure And Secure

creating a connected world NTT clouds overview

Accenture and Oracle: Leading the IoT Revolution

National Certification Authority Framework in Sri Lanka

Zero Downtime In Multi tenant Software as a Service Systems

Cloud Security: Is It Safe To Go In Yet?

On the Radar: CipherCloud

The Business Case for Colocation in a Cloud Obsessed World Andy Huxtable: Colocation Product Management

Sophos Acquires Cyberoam

KeySecure CUSTOMER RELEASE NOTES. Contents. Version: Issue Date: 2 February 2015 Document Part Number: , Rev A.

VMware Vision Accelerating the Journey to Your Cloud

Building Trust in a Digital World. Brian Phelps, BSc CISSP Director of Advanced Solutions Group EMEA Thales UK, Ltd.

Multi-factor Authentication

Overview and Frequently Asked Questions

Secure the AWS Cloud with SafeNet Solutions ebook GEMALTO.COM

White paper Contents

Red Hat Update at IBM LSU Sebastian Siegert Alliance Manager EMEA for IBM Red Hat

Business Partner Brochure. Become a Business Partner and share the Maximizer success!

Repeatable, Embedded Integration from the Cloud to SaaS or On-Premises ERP, CRM and More

View from a European Trust Service Provider Server Signing: Return of experience and certification strategy

Magic Quadrant for Sales Force Automation

Appendix C Pricing Index DIR Contract Number DIR-TSO-2724

About iomart Group plc

VICNET is G-Cloud7 GOV UK Supplier VISIT DIGITAL MARKET PLACE VICNETCLOUD VICNET CLOUD MIGRATION SERVICES

Cloud Security Who do you trust?

SERVICES. Software licensing and entitlement management delivered in the cloud for the cloud

SIIA Cloud Webinars: Cloud Integration

The Internet of Everything

Encryption, Key Management, and Consolidation in Today s Data Center

Billing and Payment with the Elastic Path Ecommerce Platform

Own, launch, grow and support your cloud backup and recovery offering

Amendment 1 - Annexure 5 (C) Technical Criteria

MONETIZING IOT: THINGWORX MARKETPLACE AND THE SUBSCRIPTION ECONOMY

High Speed Ethernet WAN: Is encryption compromising your network?

Authentication Solutions. Versatile And Innovative Authentication Solutions To Secure And Enable Your Business

Crittografia e Enterprise Key Management una sfida possibile da affrontare

CLOUD COMPUTING FOR THE ENTERPRISE AND GLOBAL COMPANIES Steve Midgley Head of AWS EMEA

Parallels Automation Cloud Enablement. Oleg Melnikov. Senior VP, Automation. Profit from the Cloud TM

The Top ISVs for SaaS business in Europe. The project covers DACH region UK France Italy Spain Nordics BNL

Embracing the power of the Enterprise Cloud. Paul Phillips - Vice President Western Europe

SafeNet Security Enhancements for IBM Solutions

Remote Logging Agent Configuration Guide

Transcription:

Welcome to the SafeNet Executive Day! Bucharest 27th of May 2014 Insert Your Name Insert Your Title Insert Date

Introduction Ondrej Valent Regional Sales Manager, Central EMEA, SafeNet

Who We Are Trusted to protect the world s most sensitive data FOUNDED 1983 Baltimore, MD REVENUE ~330m EMPLOYEES +1,400 In 25 countries OWNERSHIP Private GLOBAL FOOTPRINT +25,000 Customers in 100 countries ACCREDITED Products certified to the highest security standard We control access to the most sensitive corporate information more than 35 million identities protected via tokens, smartcards, and mobile devices managed on-premise and in the cloud. We are the de facto root of trust deploying more than 86,000 key managers and protecting up to 750,000,000 encryption keys. We protect the most money that moves over 80% of the world s intra-bank fund transfers and nearly $1 trillion per day. We monetize the most high-value software more than 100 million license keys protect and manage on-premise, embedded, and cloud applications globally.

Protecting Your Data Encrypt Your Data 1 WHERE IS YOUR DATA? Secure & Manage Your Keys 2 WHERE ARE YOUR KEYS Databases Storage Networks File Servers Virtual Machines Applications Control Access 3 SaaS Apps Internal Users + Administrators Cloud Providers Admins/Superusers Customers + Partners WHO AND WHAT IS ACESSING YOUR DATA

Gartner Magic Quadrant for User Authentication 2014 The most highly ranked vendor Considered the most visionary Cited for the best execution Recognized as having: Very sound market understanding Very strong product strategy Innovation 5

SafeNet: Who We Secure Financial Services Representative Global Customers Government Healthcare UK Government Retail ISV & SW Publishers Technology

What s New this Year? Focused Vision HSM-as-a-Service- SafeNet Crypto Hypervisor CloudHSM launched by AWS Key Management gains prominence launch of virtual KeySecure in 2H 2014 Coming this year: SAS 3.4 Context-based Authentication New range of SafeNet High Speed Encryptors: CN4010 solution adapted for SMB needs Investment in product improvements 7

Key focus for SafeNet in Central EMEA Continued investment in Main businesses: token certifications HSMs / HSEs, New Features Data Protection portfolio Service providers offering SafeNet in Central EMEA - strong plans for Investment: Staff Localization / certification decisions Availability of trainings New partner program 8

SafeNet coverage in Central EMEA Value Added Distributors, a real extension of SafeNet Focus on customer satisfaction with a strong ability to help with: Presales and Postsales support, financing, providing training, POC... Efficient and proven Sales model: Distributor - Partner - Customer 9

Your SafeNet team VP EMEA, Gary Clark VP South & Central EMEA: Miguel Braojos Regional Sales Manager Central EMEA: Ondrej Valent Regional Channel Sales Manager Central EMEA: Anna Rewers Inside Sales Central EMEA: Sabine Huber/Gabriela Kissova System Engineer Central EMEA: Marko Bobinac Marketing manager Central EMEA & Russia: soon! 10

Secure the Breach 3 steps to follow!

Agenda of the Conference Time Presentation Title Speaker Name Speaker Title 09:30-10:00 Welcome coffee & Registration 10:00-10:20 Introduction & SafeNet Corporate Update Ondrej Valent 10:20-10:40 Secure the Breach in 3 steps Miguel Braojos Step 1: Encrypt all sensitive Data in motion and at rest 10:40-11:00 Securing Data in Motion - High Speed Network Encryption Ugo Piazzalunga 11:00-11:20 Securing Data at Rest - StorageSecure Ondrej Valent 11:25-12:05 Securing Data at Rest - Databases and Applications, ProtectV 12:05-13:05 LUNCH 13:05-13:25 13:25-14:05 Ugo Piazzalunga & Ondrej Valent Step 2: Securely store and manage your encryption keys Crypto Management: Encryption management & optimal security of your data - Positioning, Use Cases, Target customers Crypto Management: Encryption management & optimal security of your data: - HSM, Keysecure in details Miguel Braojos Ugo Piazzalunga 14:05-14:25 Organization assets under layers of cryptography Victor Mitu 14:25-15:00 Step 3: Control who and what is accessing your sensitive data and places Establishing your authentication strategy to regulate who has access to your data - Safenet Authentication Service Ondrej Valent 15:00-15:15 Closing of the day with a Raffle! Ondrej Valent 15:15-16:00 Drinks and Network Regional Sales Manager, Central EMEA, SafeNet Regional Sales VP, Southern EMEA, SafeNet Pre-Sales Manager, Southern & Central Europe, SafeNet Regional Sales Manager, Central EMEA, SafeNet Pre-Sales Manager, Southern & Central Europe, Regional Sales Manager, Central EMEA, SafeNet Regional Sales VP, Southern EMEA, SafeNet Pre-Sales Manager, Southern & Central Europe, SafeNet Senior Security Consultant, CISSP- ISSAP, Provision Software Division Regional Sales Manager, Central EMEA, SafeNet Regional Sales Manager, Central EMEA, SafeNet 12

Thank You! Insert Your Name Insert Your Title Insert Date