Change in Multiple Dimensions

Chia sẻ: Nguyen Thanh Lam | Ngày: | Loại File: PPT | Số trang:28

0
67
lượt xem
6
download

Change in Multiple Dimensions

Mô tả tài liệu
  Download Vui lòng tải xuống để xem tài liệu đầy đủ

Propelling Business Growth With A Secure And Continuous Information Infrastructure

Chủ đề:
Lưu

Nội dung Text: Change in Multiple Dimensions

  1. Go to View/Master/Slide Master to type in header Propelling Business Growth With A Secure And Continuous Information Infrastructure Jon Murray 1
  2. Go to View/Master/Slide Master to type in header 2
  3. Go to View/Master/Slide Master to type in header Information: Change in Multiple Dimensions information information growth information regulations more growth: uses information stored on disk arrays growing ~60% in 2006 more types: transactions, documents, forms, web, images, voice, messages, reports ... more uses: ERP, CRM, RFID, collaboration, data mining, discovery … information types more regulations: SEC 17a-4, NASD 3010,Sarbanes-Oxley, Basel II, UK Metadata, eSign Act, 21 CFR Part 11 (more coming!) 3
  4. Go to View/Master/Slide Master to type in header Customers’ Information Storage and Management Challenges Information stored on disk arrays ~ 70% IT budget growth ~ 4 - 5% IT environment getting more complex SLA’s continue to expand and tighten Protection and security increasingly important CIO’s Dilemma: How to manage all the information growth with limited resources? 4
  5. Go to View/Master/Slide Master to type in header 2006 Technology Spending Priorities–CIO Survey 1. Security (Software) 1. Wireless LAN (clients) 2. Security (HW & Services) 2. New Custom Development 3. Storage Area Networks 3. Routing 4. Wireless LAN (access points & routers) 4. Systems Management Software 5. Storage Software 5. Application Integration Software 6. Portal Software 6. Notebook PCs 7. VOIP Infrastructure 7. Document Management Software 8. IT Education and Training 8. Automated Testing Tool 9. Storage Hardware 9. Microsoft Office Upgrade 10. Business Intelligence Software 10. Application Software Server 1. Mainframe hardware 2. Printers Source: Morgan Stanley November CIO Survey, Jan. 3, 2006 5
  6. Go to View/Master/Slide Master to type in header Security Today An Amalgamation of Point Products Across IT Anitvirus Threat Digital Rights Detection Management Authentication Clients Servers VPN Encryption LAN SAN Web Firewall Disk Storage Authentication Filtering Authentication Antivirus Encryption Change/Patch Vault Management Recovery Management Tape Spyware 6
  7. Go to View/Master/Slide Master to type in header Today’s Approach: Secure the Perimeter 7
  8. Go to View/Master/Slide Master to type in header Security Tomorrow: Protect the Information 8
  9. Go to View/Master/Slide Master to type in header Security Must Become Information-Centric  Information-centric Security – An inside-out view of how to secure information  Begins with securing the data itself  Moves out through layers of increasingly intelligent infrastructure  Relies on our ability to leverage the interaction between data and infrastructure Important Technology • Data-level access control • Open policy decision points • Enforcement at point of use 9
  10. Go to View/Master/Slide Master to type in header Information Security (Confidentiality) A Natural and Requested Evolution of EMC’s Data Protection Capabilities Information Security and Protection Information Information Information Confidentiality Integrity Availability EMC’s Heritage 10
  11. Go to View/Master/Slide Master to type in header EMC’s Security Efforts to Date • CEO-level Mandate Dedicated Focus • Information Security Leadership Team • Company-wide Goals and Objectives • Security-related Workshops, Assessments • EMC Vulnerability Alert Service Security of Offering • Documentum Trusted Content Services • EMC Secure Remote Support • Data Erasure Service • DRM for ECM Comprehensive • Software-native Encryption Information Protection – Retrospect and NetWorker • Data Encryption through EMC Select 11
  12. Go to View/Master/Slide Master to type in header EMC Security Mission End-to-End Information Security Management EMC ISM Applications Systems Information People Security Risk Management Vulnerability Vulnerability Assessment Management Patching Security Configuration Security Event Management / Managed Security Threat Firewall / VPN Management Intrusion Detect / Prevent Threat Appliances Anti-Virus/Malware Secure Secure Messaging Content Web Filtering Encryption Encryption Digital Rights Mgmt File / Database Security ID and Access Authentication Authentication Management Authentication Mgmt Authentication Mgmt Provisioning Security Services 12
  13. Go to View/Master/Slide Master to type in header EMC’s Information-Centric Approach to Security Information Security Management (ISM)  Information Security is an end-to-end challenge  To be most effective, security capabilities must be integrated with the information infrastructure  All security offerings need to be interoperable and open EMC Strategy  Expose key native capabilities  Repurpose existing technologies for security “use cases”  Develop new products, solutions, and service offerings  Partner and acquire to complete portfolio 13
  14. Go to View/Master/Slide Master to type in header What is Happening with Information Security ? Hard to know where to start define establish identify create monitor requirements services catalog gaps plan effectiveness hardware EMC Retrospect Storage Security Assessment Service EMC Networker NeoScale EMC Secure RemotePractices SAN Security Best Support software Decru EMC Documentum Trusted Content Services NAS Security Best Practices Kasten Chase VMware Assured Computing Environment Data Cipheroptics Erasure Services Digital Rights Management (with partners) services 14
  15. Go to View/Master/Slide Master to type in header Secure Content Management Information Object s ACL L C MA 4 a EAL riteri n C mo 2 C om sting tent T e on dC ste vices Tru Ser 15
  16. Go to View/Master/Slide Master to type in header ESG Strategy for Enterprise and Storage Common Archiving Record Archiving (CARS) Secure, scalable, and unified archive for all types of content Desktop & Classify SharePoint File System Retain Migrate Email / IM Discover Applications & Reports Paper Web Rich Media 16
  17. Go to View/Master/Slide Master to type in header New Architecture for Backup, Recovery, and Archive Recovery I Œ Archive process Production process Ž Ž  Extract valuable information to archive – Increases performance of production applications – Improves TCO through use of tiered storage – Recovers capacity on Tier 1 resources  Back up active production information – Backup window reduced or eliminated – Higher reliability, greater likelihood of full backups  Retrieve from archive or recover from backup – Restore requests are faster – Information that was once offline is now online via archive 17
  18. Go to View/Master/Slide Master to type in header Backup and Archive are Different Backup Archive A secondary copy of information Primary copy of information Used for recovery operations Available for information retrieval Improves availability by enabling Adds operational efficiencies by application to be restored to point in moving fixed / unstructured content out time of operational environment Typically short-term (weeks or months) Typically long-term (months, years, or decades) Data typically overwritten on periodic Data typically maintained for analysis, basis (e.g., monthly) value generation, or compliance Not for regulatory compliance— Useful for compliance and should take though some are forced to use into account information-retention policy 18
  19. Go to View/Master/Slide Master to type in header Continuity Reduce Total Cost Improve Business Value  Eliminate over-protection  Minimize under-protection  Simplified environment  Flexibility to change  Consolidated continuity  Improving productivity 19
  20. Go to View/Master/Slide Master to type in header Continuity Challenge: The Common Current State Continuity Issues Over-  Survive a disaster protected  Achieve high availability Different requirements Under- Different technologies  Prevent data corruption protected Different processes  Non-disruptively upgrade software Not protected and/or hardware  Do parallel processing Pain Points  Move and migrate data  Inconsistent service levels  Restart the enterprise  Gaps in coverage  Protect remote data sites  Growth in complexity and effort  Shorten backup and restore times  Growth in cost and risk to the business  Contain costs Continuity Defined:  Cannot add resources Ensuring applications and data are available during planned and unplanned outages. 20
Đồng bộ tài khoản