YOMEDIA
ADSENSE
Change in Multiple Dimensions
95
lượt xem 6
download
lượt xem 6
download
Download
Vui lòng tải xuống để xem tài liệu đầy đủ
Propelling Business Growth With A Secure And Continuous Information Infrastructure
AMBIENT/
Chủ đề:
Bình luận(0) Đăng nhập để gửi bình luận!
Nội dung Text: Change in Multiple Dimensions
- Go to View/Master/Slide Master to type in header Propelling Business Growth With A Secure And Continuous Information Infrastructure Jon Murray 1
- Go to View/Master/Slide Master to type in header 2
- Go to View/Master/Slide Master to type in header Information: Change in Multiple Dimensions information information growth information regulations more growth: uses information stored on disk arrays growing ~60% in 2006 more types: transactions, documents, forms, web, images, voice, messages, reports ... more uses: ERP, CRM, RFID, collaboration, data mining, discovery … information types more regulations: SEC 17a-4, NASD 3010,Sarbanes-Oxley, Basel II, UK Metadata, eSign Act, 21 CFR Part 11 (more coming!) 3
- Go to View/Master/Slide Master to type in header Customers’ Information Storage and Management Challenges Information stored on disk arrays ~ 70% IT budget growth ~ 4 - 5% IT environment getting more complex SLA’s continue to expand and tighten Protection and security increasingly important CIO’s Dilemma: How to manage all the information growth with limited resources? 4
- Go to View/Master/Slide Master to type in header 2006 Technology Spending Priorities–CIO Survey 1. Security (Software) 1. Wireless LAN (clients) 2. Security (HW & Services) 2. New Custom Development 3. Storage Area Networks 3. Routing 4. Wireless LAN (access points & routers) 4. Systems Management Software 5. Storage Software 5. Application Integration Software 6. Portal Software 6. Notebook PCs 7. VOIP Infrastructure 7. Document Management Software 8. IT Education and Training 8. Automated Testing Tool 9. Storage Hardware 9. Microsoft Office Upgrade 10. Business Intelligence Software 10. Application Software Server 1. Mainframe hardware 2. Printers Source: Morgan Stanley November CIO Survey, Jan. 3, 2006 5
- Go to View/Master/Slide Master to type in header Security Today An Amalgamation of Point Products Across IT Anitvirus Threat Digital Rights Detection Management Authentication Clients Servers VPN Encryption LAN SAN Web Firewall Disk Storage Authentication Filtering Authentication Antivirus Encryption Change/Patch Vault Management Recovery Management Tape Spyware 6
- Go to View/Master/Slide Master to type in header Today’s Approach: Secure the Perimeter 7
- Go to View/Master/Slide Master to type in header Security Tomorrow: Protect the Information 8
- Go to View/Master/Slide Master to type in header Security Must Become Information-Centric Information-centric Security – An inside-out view of how to secure information Begins with securing the data itself Moves out through layers of increasingly intelligent infrastructure Relies on our ability to leverage the interaction between data and infrastructure Important Technology • Data-level access control • Open policy decision points • Enforcement at point of use 9
- Go to View/Master/Slide Master to type in header Information Security (Confidentiality) A Natural and Requested Evolution of EMC’s Data Protection Capabilities Information Security and Protection Information Information Information Confidentiality Integrity Availability EMC’s Heritage 10
- Go to View/Master/Slide Master to type in header EMC’s Security Efforts to Date • CEO-level Mandate Dedicated Focus • Information Security Leadership Team • Company-wide Goals and Objectives • Security-related Workshops, Assessments • EMC Vulnerability Alert Service Security of Offering • Documentum Trusted Content Services • EMC Secure Remote Support • Data Erasure Service • DRM for ECM Comprehensive • Software-native Encryption Information Protection – Retrospect and NetWorker • Data Encryption through EMC Select 11
- Go to View/Master/Slide Master to type in header EMC Security Mission End-to-End Information Security Management EMC ISM Applications Systems Information People Security Risk Management Vulnerability Vulnerability Assessment Management Patching Security Configuration Security Event Management / Managed Security Threat Firewall / VPN Management Intrusion Detect / Prevent Threat Appliances Anti-Virus/Malware Secure Secure Messaging Content Web Filtering Encryption Encryption Digital Rights Mgmt File / Database Security ID and Access Authentication Authentication Management Authentication Mgmt Authentication Mgmt Provisioning Security Services 12
- Go to View/Master/Slide Master to type in header EMC’s Information-Centric Approach to Security Information Security Management (ISM) Information Security is an end-to-end challenge To be most effective, security capabilities must be integrated with the information infrastructure All security offerings need to be interoperable and open EMC Strategy Expose key native capabilities Repurpose existing technologies for security “use cases” Develop new products, solutions, and service offerings Partner and acquire to complete portfolio 13
- Go to View/Master/Slide Master to type in header What is Happening with Information Security ? Hard to know where to start define establish identify create monitor requirements services catalog gaps plan effectiveness hardware EMC Retrospect Storage Security Assessment Service EMC Networker NeoScale EMC Secure RemotePractices SAN Security Best Support software Decru EMC Documentum Trusted Content Services NAS Security Best Practices Kasten Chase VMware Assured Computing Environment Data Cipheroptics Erasure Services Digital Rights Management (with partners) services 14
- Go to View/Master/Slide Master to type in header Secure Content Management Information Object s ACL L C MA 4 a EAL riteri n C mo 2 C om sting tent T e on dC ste vices Tru Ser 15
- Go to View/Master/Slide Master to type in header ESG Strategy for Enterprise and Storage Common Archiving Record Archiving (CARS) Secure, scalable, and unified archive for all types of content Desktop & Classify SharePoint File System Retain Migrate Email / IM Discover Applications & Reports Paper Web Rich Media 16
- Go to View/Master/Slide Master to type in header New Architecture for Backup, Recovery, and Archive Recovery I Œ Archive process Production process Ž Ž Extract valuable information to archive – Increases performance of production applications – Improves TCO through use of tiered storage – Recovers capacity on Tier 1 resources Back up active production information – Backup window reduced or eliminated – Higher reliability, greater likelihood of full backups Retrieve from archive or recover from backup – Restore requests are faster – Information that was once offline is now online via archive 17
- Go to View/Master/Slide Master to type in header Backup and Archive are Different Backup Archive A secondary copy of information Primary copy of information Used for recovery operations Available for information retrieval Improves availability by enabling Adds operational efficiencies by application to be restored to point in moving fixed / unstructured content out time of operational environment Typically short-term (weeks or months) Typically long-term (months, years, or decades) Data typically overwritten on periodic Data typically maintained for analysis, basis (e.g., monthly) value generation, or compliance Not for regulatory compliance— Useful for compliance and should take though some are forced to use into account information-retention policy 18
- Go to View/Master/Slide Master to type in header Continuity Reduce Total Cost Improve Business Value Eliminate over-protection Minimize under-protection Simplified environment Flexibility to change Consolidated continuity Improving productivity 19
- Go to View/Master/Slide Master to type in header Continuity Challenge: The Common Current State Continuity Issues Over- Survive a disaster protected Achieve high availability Different requirements Under- Different technologies Prevent data corruption protected Different processes Non-disruptively upgrade software Not protected and/or hardware Do parallel processing Pain Points Move and migrate data Inconsistent service levels Restart the enterprise Gaps in coverage Protect remote data sites Growth in complexity and effort Shorten backup and restore times Growth in cost and risk to the business Contain costs Continuity Defined: Cannot add resources Ensuring applications and data are available during planned and unplanned outages. 20
ADSENSE
CÓ THỂ BẠN MUỐN DOWNLOAD
Thêm tài liệu vào bộ sưu tập có sẵn:
Báo xấu
LAVA
AANETWORK
TRỢ GIÚP
HỖ TRỢ KHÁCH HÀNG
Chịu trách nhiệm nội dung:
Nguyễn Công Hà - Giám đốc Công ty TNHH TÀI LIỆU TRỰC TUYẾN VI NA
LIÊN HỆ
Địa chỉ: P402, 54A Nơ Trang Long, Phường 14, Q.Bình Thạnh, TP.HCM
Hotline: 093 303 0098
Email: support@tailieu.vn