270 likes | 413 Views
Propelling Business Growth With A Secure And Continuous Information Infrastructure. Jon Murray. Information: Change in Multiple Dimensions. information growth. information regulations. more growth : information stored on disk arrays growing ~60% in 2006. information uses.
E N D
Go to View/Master/Slide Master to type in header Propelling Business Growth With A Secure And Continuous Information Infrastructure Jon Murray
Go to View/Master/Slide Master to type in header Information: Change in Multiple Dimensions informationgrowth information regulations more growth: information stored on disk arrays growing ~60% in 2006 informationuses more types:transactions, documents, forms, web, images, voice, messages, reports ... more uses:ERP, CRM, RFID, collaboration, data mining, discovery … informationtypes more regulations:SEC 17a-4, NASD 3010,Sarbanes-Oxley, Basel II, UK Metadata, eSign Act, 21 CFR Part 11 (more coming!)
Go to View/Master/Slide Master to type in header Customers’ Information Storage andManagement Challenges Information stored on disk arrays ~ 70% IT budget growth ~ 4 - 5% IT environment getting more complex SLA’s continue to expand and tighten Protection and security increasingly important CIO’s Dilemma: How to manage all the information growth with limited resources?
Go to View/Master/Slide Master to type in header 2006 Technology Spending Priorities–CIO Survey 1.Security (Software) 2.Security (HW & Services) 3.Storage Area Networks 4.Wireless LAN (access points & routers) 5.Storage Software 6.Portal Software 7.VOIP Infrastructure 8.IT Education and Training 9.Storage Hardware 10.Business Intelligence Software • Wireless LAN (clients) • New Custom Development • Routing • Systems Management Software • Application Integration Software • Notebook PCs • Document Management Software • Automated Testing Tool • Microsoft Office Upgrade • Application Software Server • Mainframe hardware • Printers Source: Morgan Stanley November CIO Survey, Jan. 3, 2006
Anitvirus Digital Rights Management Threat Detection Authentication VPN Encryption Web Filtering Firewall Authentication Authentication Antivirus Encryption Change/Patch Management Vault Recovery Management Spyware Go to View/Master/Slide Master to type in header Security Today An Amalgamation of Point Products Across IT Clients Servers LAN SAN Disk Storage Tape
Go to View/Master/Slide Master to type in header Today’s Approach: Secure the Perimeter
Go to View/Master/Slide Master to type in header Security Tomorrow: Protect the Information
Go to View/Master/Slide Master to type in header Security Must Become Information-Centric • Information-centric Security • An inside-out view of how to secure information • Begins with securing the data itself • Movesout through layers of increasingly intelligent infrastructure • Relies on our ability to leveragethe interaction between data andinfrastructure • Important Technology • Data-level access control • Open policy decision points • Enforcement at point of use
InformationIntegrity InformationAvailability InformationConfidentiality Go to View/Master/Slide Master to type in header Information Security (Confidentiality) A Natural and Requested Evolution of EMC’s Data Protection Capabilities Information Security and Protection EMC’s Heritage
Go to View/Master/Slide Master to type in header EMC’s Security Efforts to Date Dedicated Focus • CEO-level Mandate • Information Security Leadership Team • Company-wide Goals and Objectives Security of Offering • Security-related Workshops, Assessments • EMC Vulnerability Alert Service • Documentum Trusted Content Services • EMC Secure Remote Support • Data Erasure Service • DRM for ECM • Software-native Encryption • Retrospect and NetWorker • Data Encryption through EMC Select Comprehensive Information Protection
Applications Systems Information People Go to View/Master/Slide Master to type in header EMC Security Mission End-to-End Information Security Management EMC ISM Vulnerability Management Security Risk Management Vulnerability Assessment Patching Security Configuration Security Event Management / Managed Security Threat Management Firewall / VPN Intrusion Detect / Prevent Threat Appliances Secure Content Anti-Virus/Malware Secure Messaging Web Filtering Encryption Encryption Digital Rights Mgmt File / Database Security ID and AccessManagement Authentication Authentication Authentication Mgmt Authentication Mgmt Provisioning Security Services
Go to View/Master/Slide Master to type in header EMC’s Information-Centric Approach to Security • Information Security Management (ISM) • Information Security is anend-to-endchallenge • To be most effective, security capabilities must be integratedwith the information infrastructure • All security offerings need to be interoperable and open EMC Strategy • Expose key native capabilities • Repurpose existing technologies for security “use cases” • Develop new products, solutions, and service offerings • Partner and acquire to complete portfolio 12
EMC Retrospect EMC Networker EMC Secure Remote Support EMC Documentum Trusted Content Services VMware Assured Computing Environment Digital Rights Management (with partners) ? Hard to know where to start define requirements establishservices catalog identifygaps create plan monitor effectiveness NeoScale Decru Kasten Chase Cipheroptics Go to View/Master/Slide Master to type in header What is Happening with Information Security hardware Storage Security Assessment Service SAN Security Best Practices NAS Security Best Practices Data Erasure Services software services
Encryption Authentication Accounting Notarization Signature ACLs MACL EAL4 Common Criteria Testing 2 Trusted Content Services Digital Rights Management Digital Watermarking Auditing Time Stamping Go to View/Master/Slide Master to type in header Secure Content Management Content Management Meets Security! Information Object
Common Archiving Record and Storage (CARS) Secure, scalable, and unified archive for all types of content Classify SharePoint Desktop & File System Email / IM Applications& Reports Paper Web Rich Media Go to View/Master/Slide Master to type in header ESG Strategy for Enterprise Archiving Retain Migrate Discover Enterprise Archive
Ž Ž Œ Go to View/Master/Slide Master to type in header New Architecture for Backup, Recovery, and Archive Recovery process Production Archive process • Extractvaluable information to archive • Increases performance of production applications • Improves TCO through use of tiered storage • Recovers capacity on Tier 1 resources • Back up active production information • Backup window reduced or eliminated • Higher reliability, greater likelihood of full backups • Retrieve from archive or recoverfrom backup • Restore requests are faster • Information that was once offline is now online via archive
Go to View/Master/Slide Master to type in header Backup and Archive are Different
Go to View/Master/Slide Master to type in header Continuity Reduce Total Cost Improve Business Value • Eliminate over-protection • Simplified environment • Consolidated continuity • Minimize under-protection • Flexibility to change • Improving productivity
Over- protected Different requirements Different technologies Different processes Under- protected Not protected Go to View/Master/Slide Master to type in header Continuity Challenge: The Common Current State Continuity Issues • Survive a disaster • Achieve high availability • Prevent data corruption • Non-disruptively upgrade software and/or hardware • Do parallel processing • Move and migrate data • Restart the enterprise • Protect remote data sites • Shorten backup and restore times • Contain costs • Cannot add resources Pain Points • Inconsistent service levels • Gaps in coverage • Growth in complexity and effort • Growth in cost and risk to the business • Continuity Defined: • Ensuring applications and data are available during planned and unplanned outages.
Go to View/Master/Slide Master to type in header Information Protection is Evolving Beyond Tape Backup… Replication CDP to Disk Snap / Clone OperationalEffectiveness Backup to Disk Backup to Tape MINUTES/ SECONDS HOURS/ MINUTES DAYS/ HOURS < SECONDS SECONDS Common Recovery Management Services Automated and Simplified Management Disaster Recovery, Operational Recovery, and Testing/Migration Decreased Recovery Time / Increased Recovery Point Granularity
SAN SAN SAN Local Remote Go to View/Master/Slide Master to type in header Products and Technologies Multi-site Remote processing Remote Information Recovery Backup Platform Clustering across site with Storage DR aware
Multi-site Increasing distance improves protection Remote processing Automatic processing resumption: “lights out” Remote Information All critical data safe at remote location Recovery Quick, accurate, predictable recovery Backup Frequent, consistent, non-disruptive backups Platform Storage, switch, and server protection Local Remote Go to View/Master/Slide Master to type in header Products and Technologies Information Protection & Recovery SRDF Family MirrorView AutoStart Family NetWorker Celerra Replicator RepliStor TimeFinder Family SnapView EMC SnapSure PowerPath
Go to View/Master/Slide Master to type in header Getting Started: Sample Customer Requirements Plan
Performance Compliance Availability Capacity Budget Business Applications ERP CRM Exchange Archive Go to View/Master/Slide Master to type in header Customer Needs Tiered Storage that Is Optimized for Business Requirements “Not all information is created equal”
EMC Retrospect EMC Networker EMC Secure Remote Support EMC Documentum Trusted Content Services VMware Assured Computing Environment Digital Rights Management (with partners) ? define requirements establishservices catalog identifygaps create plan monitor effectiveness NeoScale Decru Kasten Chase Cipheroptics Go to View/Master/Slide Master to type in header What is Happening with Information Security where to start hardware Storage Security Assessment Service SAN Security Best Practices NAS Security Best Practices Data Erasure Services software services
Go to View/Master/Slide Master to type in header Building a Next-Generation Information Infrastructure Information Lifecycle Management Flexible infrastructure Next-Generation Information Infrastructure Information protection and security