170 likes | 181 Views
Explore the latest industry trends in data protection and security. Learn how to overcome challenges in cloud infrastructure and safeguard your business from security threats. Discover expert solutions for secure data access, encryption, monitoring, and compliance.
E N D
Data Protection & Security Nizar Elfarra
Today’s Overview Industry trends Security & Protection How Can We Help
Challenges Faced Infrastructure (R)evolution Business Challenges Budget Constraints Data Center Cloud More Data More Workloads Service Providers SaaS Lines of Business Owner Demands Mobile
Digital Transformation and the Internet of ThingsForces fueling the move to the cloud Connected Devices Skyrocketing Cloud Usage on the Rise Explosion of Digital Data 90% 70% 20.8BILLION 5 …of all digital data ever created was created in the last 2 years. …things could be connected to the Internet by 2020, about 5.5 million devices added every day. …of organizations are managing some of their data in cloud infrastructure. Source: IDC Source: Sintef ITC Source: Gartner
Private Cloud / Hybrid Cloud Market Opportunity Cloud Agility Enterprise Control 2013-2018 CAGR Self - Service Budget Controls 18% Rapid Start / Stop Access Controls 25% Standard Interface Policy Enforcement -8% Pay for Use Reporting Source: Gartner
The Disappearing Datacenter Increased Hybridization of Workloads
Security Concerns Ransomware on the rise Protecting blockchain & cryptocurrency Unauthorized access within the organization Mobile workforce & corporate data on endpoints Personal devices used to access corporate data Use of free file sharing service Data and compliance breach due to laptop loss or theft Risk associated with end point and cloud based data Current user security practices will not pass a compliance audit
Data Access & Control Secure Access from Anywhere • Secure, easy to manage access from browser or mobile devices Access Control Capture • Knowing who should an can have access to data stored App Aware Security & Authentication • Enabled across different access points (web or mobile)
Cloud & Network Security Multi-Tenancy • Segregating data at all times Secure Communication • SSL communications between systems Client Certification • All systems require certification to authenticate the connections Firewalls • Blocked unauthorized access to network resources
Data Encryption Data in transit & data at rest • 256 bit key encryption Encryption Key Management FIPS certifications • FIPS 140-1 and FIPS 140-2
Auditing, Monitoring & Analytics Full Auditing • Ability to provide audit trails for the data being stored, deleted and accessed Log Monitoring • Ability to monitor, capture and interpret log file data of user access Log Analytics • Ability to forensically review logs from the time of a data breach to be able to prevent it
Data Governance & Compliance Data Residency • Ability to view and access data is in an organization eDiscovery, Compliance & Legal Hold • Ability to view, search, discovery and preserve selected data owned by the organization Remote Wipe • Mitigating breaches by remotely wipe data in case of a lost endpoint device Data Privacy • Ability to local a service providers ability to view and access their data Also Relevant for GDPR
We Can Help Prevent & Detect Ransomware Detection & Recovery • Flag suspect processes that read a lot of files in a short period by setting up ‘honey pots’ • Recover from a clean offline backup Data Protection • Setting up the right backup and DR policies • Creating clean offline copies User Data Segregation • Multi-tenancy – User can access only their data, preserving user privacy and segregation at all times Secure Communications • Encrypt data during transit and at rest Monitoring & Auditing • Setting policies, generating reports and triggering alerts to warn and prevent unauthorized access Stop Infection Spread Recovery & DR Strategy