1 / 6

Enterprise Privacy Architectures

Enterprise Privacy Architectures. Leveraging Encryption to Keep Data Private. Karim Toubba VP of Product Management Ingrian Networks. Security vs. Data Privacy. Security—A Journey not a Destination:

Download Presentation

Enterprise Privacy Architectures

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Enterprise Privacy Architectures Leveraging Encryption to Keep Data Private Karim Toubba VP of Product Management Ingrian Networks

  2. Security vs. Data Privacy • Security—A Journey not a Destination: • According to Gartner, 75% of external-based attacks are tunneling through applications—and so go undetected by firewalls. • According to Symantec, in 2003, 70 percent of all security vulnerabilities were simple for attackers to manage, and the number’s growing. • Most estimates cite that now approximately 50% of security breaches are perpetrated by internal staff—a number consistently rising each year. • Plus, physical storage systems and data in the databases and applications themselves can be stolen. • Need to have a solution in place for securing critical data inside the enterprise. • That solution needs to work with existing enterprise privacy architectures.

  3. Encryption—A Vital Component of Enterprise Privacy Architectures • One of the best ways to achieve data privacy in an enterprise is by selectively encrypting the sensitive data that needs to stay private. • To be effective, an encryption architecture needs to be… • Centralized. Keys, auditing, and logging can’t be managed disparately. • Secure. Cryptographic processing needs to be on dedicated, tamper resistant device. • Redundant. Need to ensure availability and scalability—if security processing fails, business is at risk. • Open. Leverage standards to integrate with existing privacy architectures. Web Servers Application Servers Storage Systems NAS/SAN Databases

  4. Data Privacy from Ingrian • Ingrian delivers data privacy solutions with capabilities for… • Encrypting critical data in Web, application, and database servers. • Ensuring all access to data is securely managed, logged, and controlled. • Administering keys and policies in a secure, centralized fashion. • Ensuring security processing is highly scalable, reliable, and redundant. • Using standard interfaces and protocols to do integration. Web Servers Application Servers Storage Systems NAS/SAN Databases Ingrian DataSecure Platform

  5. Ingrian DataSecure Platforms Web Server Commercial Applications Application Server Database Authentication & Authorization Backup and Recovery Platform Security Secure Key Management Logging, Auditing, Mgmt Specialized Cryptographic Engine Web Server Commercial Applications Application Server Database

  6. Summary • Ingrian’s Data Privacy Solutions Enable Enterprises to: • Protect Business-Critical Customer and Corporate Data • Ensure Compliance with Legislation and Industry Guidelines • Augment Security Technologies—They’re No Longer Enough

More Related