compliance through Integrated solutions for effective compliance management Solution Brief



Similar documents
TECHNOLOGY PARTNER CERTIFICATION BENEFITS AND PROCESS

with Managing RSA the Lifecycle of Key Manager RSA Streamlining Security Operations Data Loss Prevention Solutions RSA Solution Brief

RSA envision. Platform. Real-time Actionable Security Information, Streamlined Incident Handling, Effective Security Measures. RSA Solution Brief

RSA SECURITY MANAGEMENT. An Integrated approach to risk, operations and incident management. Solution Brief

Compliance Management, made easy

The RSA Solution for. infrastructure security and compliance. A GRC foundation for VMware. Solution Brief

RSA Solution Brief. The RSA Solution for Cloud Security and Compliance

RSA, The Security Division of EMC. Zamanta Anguiano Sales Manager RSA

White paper. Four Best Practices for Secure Web Access

IMPLEMENTING A SECURITY ANALYTICS ARCHITECTURE

Payment Card Industry Data Security Standard

A Websense Research Brief Prevent Data Loss and Comply with Payment Card Industry Data Security Standards

White paper. Five Key Considerations for Selecting a Data Loss Prevention Solution

Achieving Regulatory Compliance through Security Information Management

RSA ARCHER OPERATIONAL RISK MANAGEMENT

Information Risk Management. Alvin Ow Director, Technology Consulting Asia Pacific & Japan RSA, The Security Division of EMC

FIVE KEY CONSIDERATIONS FOR ENABLING PRIVACY IN HEALTH INFORMATION EXCHANGES

ACCELUS COMPLIANCE MANAGER FOR FINANCIAL SERVICES

TOP 10 WAYS TO ADDRESS PCI DSS COMPLIANCE. ebook Series

Tech Brief. Choosing the Right Log Management Product. By Michael Pastore

IBM InfoSphere Guardium Data Activity Monitor for Hadoop-based systems

RSA Data Loss Prevention (DLP) Understand business risk and mitigate it effectively

Adopt a unified, holistic approach to a broad range of data security challenges with IBM Data Security Services.

Leveraging a Maturity Model to Achieve Proactive Compliance

Prevent cyber attacks. SEE. what you are missing. Netw rk Infrastructure Security Management

Security management solutions White paper. IBM Tivoli and Consul: Facilitating security audit and compliance for heterogeneous environments.

PCI Compliance for Cloud Applications

Protecting Data-at-Rest with SecureZIP for DLP

Prevent cyber attacks. SEE. what you are missing. Netw rk Infrastructure Security Management

Top Ten Keys to Gaining Enterprise Configuration Visibility TM WHITEPAPER

IMPROVING RISK VISIBILITY AND SECURITY POSTURE WITH IDENTITY INTELLIGENCE

White paper. Creating an Effective Security Operations Function

Compliance and Security Solutions

RSA Solution Brief RSA. Data Loss. Uncover your risk, establish control. RSA. Key Manager. RSA Solution Brief

Seven Things To Consider When Evaluating Privileged Account Security Solutions

How RSA has helped EMC to secure its Virtual Infrastructure

Tripwire Log Center NEXT GENERATION LOG AND EVENT MANAGEMENT WHITE PAPER

How to Define SIEM Strategy, Management and Success in the Enterprise

LOG MANAGEMENT AND SIEM FOR SECURITY AND COMPLIANCE

8 Key Requirements of an IT Governance, Risk and Compliance Solution

The Impact of HIPAA and HITECH

BlackStratus for Managed Service Providers

Detect & Investigate Threats. OVERVIEW

Boosting enterprise security with integrated log management

RSA Archer Training. Governance, Risk and Compliance. Managing enterprise-wide governance, risk and compliance through training and education

10 Building Blocks for Securing File Data

RSA SIEM and DLP Infrastructure and Information Monitoring in One Solution

RSA Via Lifecycle and Governance 101. Getting Started with a Solid Foundation

PCI DSS READINESS AND RESPONSE

nfx One for Managed Service Providers

Tripwire Log Center NEXT GENERATION LOG AND EVENT MANAGEMENT WHITE PAPER

White paper. 6 Best Practices for Preventing Enterprise Data Loss

Real-Time Security for Active Directory

SharePoint Governance & Security: Where to Start

Information & Asset Protection with SIEM and DLP

Building a Security Program that Protects an Organizations Most Critical Assets

Protect the data that drives our customers business. Data Security. Imperva s mission is simple:

GETTING REAL ABOUT SECURITY MANAGEMENT AND "BIG DATA"

White Paper Achieving PCI Data Security Standard Compliance through Security Information Management. White Paper / PCI

場 次 :C-3 公 司 名 稱 :RSA, The Security Division of EMC 主 題 : 如 何 應 用 網 路 封 包 分 析 對 付 資 安 威 脅 主 講 人 :Jerry.Huang@rsa.com Sr. Technology Consultant GCR

7 Tips for Achieving Active Directory Compliance. By Darren Mar-Elia

Preemptive security solutions for healthcare

Sarbanes-Oxley Compliance for Cloud Applications

Enabling Security Operations with RSA envision. August, 2009

The SIEM Evaluator s Guide

White paper. Information Risk Management for Healthcare Organizations. Six Best Practices for Protecting Your Health Information

IBM Data Security Services for endpoint data protection endpoint data loss prevention solution

EMC CONSULTING SECURITY STANDARDS AND COMPLIANCE SERVICES

ADAPTIVE AUTHENTICATION ADAPTER FOR JUNIPER SSL VPNS. Adaptive Authentication in Juniper SSL VPN Environments. Solution Brief

PCI DSS Top 10 Reports March 2011

White Paper Achieving GLBA Compliance through Security Information Management. White Paper / GLBA

PCI DSS Reporting WHITEPAPER

Attack Intelligence: Why It Matters

Product white paper. ROI and SIEM. How the RSA envision platform delivers an Industry-leading ROI

RSA Solution Brief RSA. Encryption and Key Management Suite. RSA Solution Brief

IT Security & Compliance. On Time. On Budget. On Demand.

Compliance and Security Information Management for PCI DSS Requirement 10 and Beyond

Extreme Networks Security Analytics G2 Vulnerability Manager

SecureGRC TM - Cloud based SaaS

Discover & Investigate Advanced Threats. OVERVIEW

Best Practices for Building a Security Operations Center

LOG AND EVENT MANAGEMENT FOR SECURITY AND COMPLIANCE

EMC HYBRID CLOUD FOR SAP

RSA ARCHER AUDIT MANAGEMENT

IBM Tivoli Netcool network management solutions for enterprise

IBM Tivoli Netcool Configuration Manager

Continuous Network Monitoring

State of Oregon. State of Oregon 1

Simply Sophisticated. Information Security and Compliance

Leveraging innovative security solutions for government. Helping to protect government IT infrastructure, meet compliance demands and reduce costs

RSA ARCHER BUSINESS CONTINUITY MANAGEMENT AND OPERATIONS Solution Brief

ORACLE ENTERPRISE GOVERNANCE, RISK, AND COMPLIANCE MANAGER FUSION EDITION

DISCOVER, MONITOR AND PROTECT YOUR SENSITIVE INFORMATION Symantec Data Loss Prevention. symantec.com

The Firewall Audit Checklist Six Best Practices for Simplifying Firewall Compliance and Risk Mitigation

RSA SecurID Two-factor Authentication

whitepaper Ten Essential Steps for Achieving Continuous Compliance: A Complete Strategy for Compliance

Strengthen security with intelligent identity and access management

Best Practices for Information Security and IT Governance. A Management Perspective

LOG INTELLIGENCE FOR SECURITY AND COMPLIANCE

IBM Security Intelligence Strategy

Transcription:

compliance through RSA SECURITY MANAGEMENT Integrated solutions for effective compliance management Solution Brief

WHEN WILL COMPLIANCE GET EASIER? The increasingly complex and stringent compliance environment has become almost a cliché for IT security and compliance management professionals, but (as with many clichés) that s only because it s true. RSA integrated solutions for compliance Integrated asset discovery and management. RSA Data Loss Prevention and Enterprise Management Integrated SIEM and DLP. RSA envision and RSA Data Loss Prevention RSA Security Incident Management. RSA envision and RSA Archer Incident Management RSA DLP Policy Workflow Manager. RSA Data Loss Prevention and RSA Archer egrc Platform egrc Suite. Out-of-thebox solutions for integrated enterprise, incident, policy, compliance, vendor, risk, threat, business continuity and audit management As long as serious data breaches continue to hit the headlines, government scrutiny will evolve in one direction only: becoming more intense and uncompromising. As long as corporate scandals occur, regulatory oversight of enterprise governance and risk management will only become tougher. And as long as information technology becomes increasingly embedded in our lives, enterprises will only have more to manage: more information, more systems, more IT-mediated processes. But it s not all doom and gloom. We ve learned a lot about managing compliance in the last ten years. Standards and best practices have become established. While every industry regulation or piece of legislation has its own nuances, they also have many fundamental requirements in common; it s possible to cover a lot of compliance ground by addressing these common requirements in a standard way. And while IT developments have certainly created compliance challenges, they ve also created sophisticated new tools for managing these challenges. If you take the right approach and use the right tools, compliance doesn t have to be the struggle it currently is for many enterprises even though it continues to become more complex and stringent. Here are five steps to resolving the most fundamental compliance challenges, along with an introduction to the integrated tools that RSA offers to help you tackle each step. All the steps become significantly easier with just three RSA solution suites that readily integrate with one another: RSA Data Loss Prevention Suite: for identifying and protecting data in use (on application servers or user devices), in motion (over networks) and at rest (in storage media and user devices) RSA envision Platform: for real-time security information and event management (SIEM) RSA Archer egrc Suite: for integrating compliance-related data, turning it into meaningful information in the context of your business, managing policies and the authoritative sources that govern your business, and implementing effective processes to manage your governance, risk management and compliance (egrc) program. FIVE STEPS TO EFFECTIVE COMPLIANCE These five steps represent best practices in establishing an effective compliance program, but they don t have to be done in this order. Most organizations have at least some existing compliance processes or initiatives that might affect the prioritization of certain steps. 1. Know your assets 2. Respond effectively to incidents 3. Protect data and control access 4. Establish and communicate policies 5. Establish a long-term compliance strategy page 2

SharePoint Business users Apply DRM Grid Databases Encrypt Virtual grid RSA Data Loss Prevention RRM RSA data discovery and remediation NAS / SAN Delete/shred Temporary agents File servers Change permissions Agents End points File activity tools GRC systems Policy exceptions Discover sensitive data manage remediation workflow apply controls Not surprisingly given that parent company EMC s slogan is where information lives the RSA DLP offerings are more about the lifecycle of information within an enterprise. RSA separates protecting regulated data from corporate secrets and intellectual property something most of the industry has forgotten. Josh Corman, The 451 Group, RSA DLP 8.5 seeks to streamline PCI, workflow and paths to its Archer egrc, March 2011 STEP ONE: KNOW YOUR ASSETS Almost every regulation, law and standard covers a defined scope of assets. These may encompass not just specific systems and the data they hold typical examples include credit card data, personally identifiable information, financials and health information but also the processes that handle this information and the IT infrastructure supporting those processes. It s all but impossible to comply, certainly to prove compliance, if you can t identify the relevant assets and be certain that you haven t missed any. Without being able to show that you re sure about where the relevant data is, some audits will include every device your organization owns within scope. Simply put, the first step in complying with any requirement is knowing what you have that is covered by the requirement. For the purposes of compliance there are two stages to this step: Identifying the relevant information sources Connecting these to the business processes, IT platforms and applications that handle them, so as to be able to prove that these are all compliant RSA Data Loss Prevention and Enterprise Management: Integrated Solutions for Identifying and Connecting Information Assets If managing compliance were just about monitoring official databases of information it would be complex enough in a large enterprise. When you add all of your fileshare areas; SharePoint sites; spreadsheets, documents and emails held on desktops, laptops, smartphones and other end-user devices it s a mammoth task. The RSA Data Loss Prevention (DLP) Suite is specifically designed to help you identify data within scope of your compliance requirements and to do so thoroughly and efficiently. It has a powerful classification engine that will scan whatever devices or data sources you ask it to (in the data center, on the network and on endpoint devices), looking specifically for the type of information you specify. It uses a range of information discovery and classification techniques and comes with more than 160 policies for page 3

common types of sensitive data. Uniquely, we employ a full-time knowledge engineering team that does nothing but research the regulatory environment and develop and maintain the classification engine s policies. The team includes scientists with backgrounds in library sciences and linguistics and relevant regulatory certifications. They re also available to provide guidance and training to enable you to create your own policies for sensitive information specific to your organization. Apart from the fact that it is a part of a major global organization, RSA s biggest strength is its integration, which is as good as we have seen in this market....rsa is one of the leaders in this market and there is no reason to expect that to change. Philip Howard, Bloor, Log and Event Management: RSA, May 2010 Once RSA DLP has identified your information assets, out-of-the-box integration with RSA Archer Enterprise Management lets you build relationships between them and your business structures, people, processes, applications and infrastructure. For any piece of data or information source, you can specify what business units and processes use it, what facilities and devices store it, what applications handle it and who is accountable for it. As a single repository of information about your organizational structure, its assets and their interdependencies, Enterprise Management gives you the visibility and context to support effective compliance processes. You can track the risk and compliance status of your products, services and business processes; assign accountability to facilitate distribution of compliance assessments and tasks; and report on compliance activities at company, division and business-unit levels to support informed decision-making. STEP TWO: RESPOND EFFECTIVELY TO INCIDENTS From data privacy laws to standards such as the Payment Card Industry Data Security Standard (PCI DSS), compliance requires violations to be identified and resolved. In the digital realm most events of interest will be associated with some kind of indicator from an IT system or platform, such as failed access attempts, system probes or database errors. The problem is that your systems are generating hundreds of thousands of event logs every day; finding the relevant ones is all but impossible without technological help. The RSA envision platform: Market-Leading Security Information and Event Management That s where the RSA envision platform for security information and event management (SIEM) comes in. It collects, correlates, analyzes and retains complete log records in real time from every system that generates them; and generates real-time alerts of high-risk events. It s one of the most sophisticated SIEM solutions available: An intuitive dashboard and advanced analytical software turns unstructured raw data into valuable business information and actionable insight for security and compliance professionals. It includes more than 1,400 reports and policies tailored to specific compliance requirements, including industry-specific regulations. It provides granular visibility into specific behaviors by end-users to assist in identifying, prioritizing and remediating incidents. It integrates with the RSA Data Loss Prevention Suite to provide content-aware prioritization of incidents (see below). RSA envision can easily scale to handle hundreds of thousands of events per second without any lost logs; it also requires a fraction of the storage space of other SIEM solutions because it uses industry-leading lossless compression technology to compress logs by up to 80%. It stores all log data without filtration or normalization and protects it from tampering, providing a verifiably authentic source of archived data. The RSA envision platform and RSA Data Loss Prevention: Integrated Content-Aware Incident Identification The RSA envision platform s advanced analytics are a powerful tool for identifying and prioritizing incidents, but it becomes even more powerful through out-of-the-box integration with the RSA Data Loss Prevention Suite. If a system breach or suspicious user behavior is detected, RSA envision can t know on its own whether the data involved in page 4

the incident is particularly sensitive or not. Combined with RSA DLP, it becomes a content-aware solution that knows not just if data has been compromised, but how serious that compromise is given the nature of the data. The RSA envision Platform and Incident Management: Integrated Business- Aware Incident Management and Resolution Identifying and prioritizing incidents is only half of the story for compliance. Equally important and equally time-consuming and resource-intensive without the right tools is the investigation and resolution of the event, and the ability to demonstrate to auditors that the event has been resolved. Security Incident Management in Action 1. Events occur on critical systems indicating a potential security breach. 2. RSA envision platform collects the events for immediate triage and reporting. Incident Management 4. Security administrators use Incident Management to assess the situation. An investigation is initiated and the incident is tracked and resolved. RSA envision RSA Connector Framework 3. Based on Event Rules, an alert is triggered and security administrators are notified. The RSA Connector Framework automatically creates an incident in Incident Management associating the specific event data to the incident. Enterprise Management 5. The CISO has complete visibility through the entire process via dashboards and reporting. A major benefit we ve seen since implementing is more information transparency. Marshall Toburen Vice President and Operations Risk Manager UMB Financial Corporation The RSA Security Incident Management Solution is created through out-of-the-box integration between the RSA envision platform and Incident Management. Alerts from envision feed directly to the Archer solution, which streamlines the complete case management lifecycle for incidents. It supports efficient incident management processes through a web-based interface and features such as automated e-mail notifications, incident response workflows and real-time status reporting. Incident Management lets you document incidents and assign response team members based on business impact and compliance requirements. You can consolidate response procedures and limit access to incident data to those individuals directly involved in investigation, resolution and analysis. Built-in dashboards and reports provide insight and help you report on trends, losses and recovery efforts, as well as providing a detailed incident history and audit trail. There s also an ethics violation feature to support an enterprise hotline for anonymous reporting of incidents in accordance with laws such as Sarbanes-Oxley and EU privacy requirements. Furthermore, integration between Incident Management and Enterprise Management enables you to provide business context to incidents for informed decision-making and resolution. With information assets linked to organizational structures in the Enterprise Management solution you can easily identify the business units, processes and devices affected by incidents, assign actions to the relevant owners, and assess the impact of incidents on the organization. page 5

IDC data has shown RSA to consistently be a leader in the identity and access management (IAM) market. The organization is the undisputed market leader with its SecurID family of authentication and access control technologies. The RSA brand currently protects more than 250 million online identities. IDC, RSA: Weaving a Continuum of Solutions for Mitigating Risk in Identities, Infrastructure, and Information, October 2010 RSA Data Loss Prevention and egrc Platform: A Risk Remediation Manager for Responding to Vulnerabilities While incident management is traditionally thought of as managing specific events with a defined starting point (the first access attempt or incident of file copying, for example), compliance programs are more effective if they take a wider view that includes preventative action: responding to information vulnerabilities before they become involved in an incident. When you identify your sensitive information assets in the first place, the chances are high that information risks will come to light such as sensitive data stored in unsecured file-share areas. As your organization continues to create, receive, transmit and process information, new risks of this type are likely to arise. RSA Risk Remediation Manager is designed to help you identify, monitor and respond to these data vulnerabilities. It integrates RSA Data Loss Prevention with the egrc Platform to give you a user-friendly interface for rolling out a process to remediate discovered sensitive information risks. It gives you tools to engage the owners of business information and processes in the remediation process, check that remediation has occurred and repeat the process as new sources of sensitive information are discovered through DLP monitoring. STEP THREE: PROTECT DATA AND CONTROL ACCESS Understandably, most regulatory requirements for digital assets focus heavily on preventing unauthorized use of systems and data. Common regulatory themes include user administration and authentication, identity management, access control and data encryption. RSA has a comprehensive range of security solutions in these areas, including RSA Data Protection Manager (encryption, tokenization and enterprise key management), RSA Digital Certificate Solution, RSA Identity and Access Management (including federated identity management), RSA Identity Protection and Verification Suite (preventing fraudulent use of identities), and RSA SecurID solutions (range of two-factor authentication options). The key with such technologies, if you want them to contribute effectively to your compliance program, is to: Combine them with data identification and monitoring capabilities to enhance your ability to protect sensitive data. For example, you can use RSA Data Loss Prevention to enforce digital rights management controls or accurately tailor access controls to the sensitivity of information. Combine them with robust SIEM capabilities and effective investigation and resolution processes if a control is circumvented (or there s an attempt to do so). All RSA data protection and identity and access control technologies integrate seamlessly with the RSA Security Incident Management Solution comprising RSA envision and Incident Management. Document their use clearly in relevant compliance policies (see below). STEP FOUR: ESTABLISH AND COMMUNICATE POLICIES You d be hard-pressed to find a compliance requirement that doesn t require a documented policy for the processes and controls involved in complying with the requirement. You can take one of two attitudes to the creation of policies: you can regard them as a box-checking exercise done purely for compliance purposes, with no real effect on your organization s security profile or behavior; or you can regard them as the vital part of enterprise governance and risk management that they should be. Policy creation is an opportunity to turn compliance from a burden into a differentiator; to define and control your organization s wider security profile and tie it to business objectives and best practices. page 6

The box-checking approach not only wastes this opportunity, it s also fast becoming inadequate as a compliance strategy. Auditors are no longer satisfied with dusty policies sitting on a shelf; they want to know how you communicate your policies to employees, how you enforce them, and how often you review and adapt them. Policy Management: One Place to Create and Manage Policies and Exceptions It s difficult if not impossible to create and actively manage policies using tools not designed for the job. Policy Management is specifically designed for the job and, as part of the egrc Suite, works seamlessly with the other solutions in the suite to create an effective end-to-end enterprise compliance program. The Policy Management solution gives you a head start in creating policies, standards and control procedures and mapping them to compliance requirements as well as corporate objectives, industry guidelines and best practices. It comes with the market s most comprehensive library of policy content mapped to regulatory requirements. It gives you processes and flexible tools to identify and close gaps in policy, communicate policies enterprise-wide, track acceptance, assess comprehension and manage exception requests. With Policy Management you ll be able reduce the time and effort required to enforce and demonstrate compliance. RSA Data Loss Prevention Policy Workflow Manager: Engaging Information Owners in Policy Creation When it comes to your information assets, one of the difficulties in creating effective policies for protecting them is tapping into the knowledge of the relevant business owners. RSA Policy Workflow Manager lets you use the asset information of Enterprise Management as you re using RSA Data Loss Prevention to identify sensitive information. It gives you the tools to engage the owners of business information and processes, ask them questions about the information and how it s used so as to create effective policies, educate them on how to deal with policy violations, and ensure that they do their bit to enforce policies. Being able to track security operations is a huge benefit in terms of compliance. We simply weren t able to gather and track security data like this before. Chad Peterson Manager, Information Security Lakeland Regional Medical Center STEP FIVE: ESTABLISH A LONG-TERM COMPLIANCE STRATEGY As we noted up front, compliance is not going to get any less complex or important in the foreseeable future. The scope of regulation will continue to expand, the number of requirements will grow, the scrutiny of auditors will deepen and sanctions will become steeper. Responding in an ad-hoc or project-by-project manner is simply not an effective way to deal with the realities of compliance. If you don t develop an enterprise-wide compliance strategy you will over-spend on compliance, make poor compliance-related decisions, waste the valuable time of your employees, and probably fail to comply more often than not. A compliance strategy will give you a framework for assessing and measuring compliance, creating and controlling compliance processes, and responding to compliance requirements across your organization and across multiple compliance domains. It will streamline your efforts, support collaboration across business units and ultimately reduce the time, effort and cost in becoming and staying compliant. Compliance Management: Making Enterprise-Wide Compliance a Reality Compliance Management works with the other solutions in the egrc Suite to document your compliance control framework, integrate disparate compliance processes and sources of information, automate risk and compliance assessment, and execute design and operating tests. It gives you an enterprise-wide view of compliance gaps and remediation efforts and lets you feed the results back into your policy management and risk remediation activities. With automated workflow and task management capabilities you can resolve compliance deficiencies efficiently and route findings and tasks to appropriate owners, who can respond by completing the task or by logging an exception request that identifies effective compensating controls. Real-time dashboards and reporting enable informed decision-making and you can implement notifications to alert management or auditors, or prompt stakeholders to take required action. page 7

As security becomes deeply integrated and embedded in IT components ranging from elemental silicon to the furthest reaches of the cloud, enterprises will look to RSA and its partners to enable and ensure the trust on which every business relationship and business process literally depends. Charles King, Pund-IT, Inc, Trusted Cloud: Built On Proof, Not Promises, February 2011 RSA Security Practice: Leveraging Best-Practice Approaches for Security Management The RSA Security Practice, part of EMC Consulting, offers a variety of assessments and workshops to help you establish the right approach for your organization. Among these are several standards and compliance consulting services: Security Policy Development: establishes policy documents in line with the objectives of an overall information security management program Classification for Information Security: identifies levels of criticality and sensitivity for your organization s information assets Information Risk Assessment: an overall assessment of business and technical infrastructure security controls mapped to established best practices, based on the ISO 27002 standard Policy-Driven Management: establishes an overall framework for policy management by evaluating all of your financial review and control (FRC) processes and identifying timelines and dependencies for business processes WHY CHOOSE RSA INTEGRATED SOLUTIONS FOR COMPLIANCE MANAGEMENT? From identifying assets to managing a compliance strategy, RSA has solutions that work together to help you make better decisions, act faster and more efficiently, and spend less on compliance. Importantly, these solutions will also help you roll compliance into a wider strategy for enterprise governance and risk management; they are egrc solutions. We also recognize that managing compliance is not just about technology. We offer a comprehensive portfolio of services to help you set your strategy, develop a compliance roadmap and deploy and use your RSA solutions effectively. egrc Suite How RSA helps you manage compliance effectively RSA Data Loss Prevention RSA envision Enterprise Management Incident Management Policy Management Compliance Management 1. Know your assets P P 2. Respond to incidents P P P P 3. Control access P P 4. Establish policies P P 5. Have a strategy P www.rsa.com 2011 EMC Corporation. EMC2, EMC, RSA, envision, SecurID, Archer and the RSA logo are either registered trademarks or trademarks of EMC Corporation in the United States and/or other countries. All other products or services mentioned are trademarks of their respective companies. smcp SB 0611