1 / 27

Propelling Business Growth With A Secure And Continuous Information Infrastructure

Propelling Business Growth With A Secure And Continuous Information Infrastructure. Jon Murray. Information: Change in Multiple Dimensions. information growth. information regulations. more growth : information stored on disk arrays growing ~60% in 2006. information uses.

linore
Download Presentation

Propelling Business Growth With A Secure And Continuous Information Infrastructure

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Go to View/Master/Slide Master to type in header Propelling Business Growth With A Secure And Continuous Information Infrastructure Jon Murray

  2. Go to View/Master/Slide Master to type in header Information: Change in Multiple Dimensions informationgrowth information regulations more growth: information stored on disk arrays growing ~60% in 2006 informationuses more types:transactions, documents, forms, web, images, voice, messages, reports ... more uses:ERP, CRM, RFID, collaboration, data mining, discovery … informationtypes more regulations:SEC 17a-4, NASD 3010,Sarbanes-Oxley, Basel II, UK Metadata, eSign Act, 21 CFR Part 11 (more coming!)

  3. Go to View/Master/Slide Master to type in header Customers’ Information Storage andManagement Challenges Information stored on disk arrays ~ 70% IT budget growth ~ 4 - 5% IT environment getting more complex SLA’s continue to expand and tighten Protection and security increasingly important CIO’s Dilemma: How to manage all the information growth with limited resources?

  4. Go to View/Master/Slide Master to type in header 2006 Technology Spending Priorities–CIO Survey 1.Security (Software) 2.Security (HW & Services) 3.Storage Area Networks 4.Wireless LAN (access points & routers) 5.Storage Software 6.Portal Software 7.VOIP Infrastructure 8.IT Education and Training 9.Storage Hardware 10.Business Intelligence Software • Wireless LAN (clients) • New Custom Development • Routing • Systems Management Software • Application Integration Software • Notebook PCs • Document Management Software • Automated Testing Tool • Microsoft Office Upgrade • Application Software Server • Mainframe hardware • Printers Source: Morgan Stanley November CIO Survey, Jan. 3, 2006

  5. Anitvirus Digital Rights Management Threat Detection Authentication VPN Encryption Web Filtering Firewall Authentication Authentication Antivirus Encryption Change/Patch Management Vault Recovery Management Spyware Go to View/Master/Slide Master to type in header Security Today An Amalgamation of Point Products Across IT Clients Servers LAN SAN Disk Storage Tape

  6. Go to View/Master/Slide Master to type in header Today’s Approach: Secure the Perimeter

  7. Go to View/Master/Slide Master to type in header Security Tomorrow: Protect the Information

  8. Go to View/Master/Slide Master to type in header Security Must Become Information-Centric • Information-centric Security • An inside-out view of how to secure information • Begins with securing the data itself • Movesout through layers of increasingly intelligent infrastructure • Relies on our ability to leveragethe interaction between data andinfrastructure • Important Technology • Data-level access control • Open policy decision points • Enforcement at point of use

  9. InformationIntegrity InformationAvailability InformationConfidentiality Go to View/Master/Slide Master to type in header Information Security (Confidentiality) A Natural and Requested Evolution of EMC’s Data Protection Capabilities Information Security and Protection EMC’s Heritage

  10. Go to View/Master/Slide Master to type in header EMC’s Security Efforts to Date Dedicated Focus • CEO-level Mandate • Information Security Leadership Team • Company-wide Goals and Objectives Security of Offering • Security-related Workshops, Assessments • EMC Vulnerability Alert Service • Documentum Trusted Content Services • EMC Secure Remote Support • Data Erasure Service • DRM for ECM • Software-native Encryption • Retrospect and NetWorker • Data Encryption through EMC Select Comprehensive Information Protection

  11. Applications Systems Information People Go to View/Master/Slide Master to type in header EMC Security Mission End-to-End Information Security Management EMC ISM Vulnerability Management Security Risk Management Vulnerability Assessment Patching Security Configuration Security Event Management / Managed Security Threat Management Firewall / VPN Intrusion Detect / Prevent Threat Appliances Secure Content Anti-Virus/Malware Secure Messaging Web Filtering Encryption Encryption Digital Rights Mgmt File / Database Security ID and AccessManagement Authentication Authentication Authentication Mgmt Authentication Mgmt Provisioning Security Services

  12. Go to View/Master/Slide Master to type in header EMC’s Information-Centric Approach to Security • Information Security Management (ISM) • Information Security is anend-to-endchallenge • To be most effective, security capabilities must be integratedwith the information infrastructure • All security offerings need to be interoperable and open EMC Strategy • Expose key native capabilities • Repurpose existing technologies for security “use cases” • Develop new products, solutions, and service offerings • Partner and acquire to complete portfolio 12

  13. EMC Retrospect EMC Networker EMC Secure Remote Support EMC Documentum Trusted Content Services VMware Assured Computing Environment Digital Rights Management (with partners) ? Hard to know where to start define requirements establishservices catalog identifygaps create plan monitor effectiveness NeoScale Decru Kasten Chase Cipheroptics Go to View/Master/Slide Master to type in header What is Happening with Information Security hardware Storage Security Assessment Service SAN Security Best Practices NAS Security Best Practices Data Erasure Services software services

  14. Encryption Authentication Accounting Notarization Signature ACLs MACL EAL4 Common Criteria Testing 2 Trusted Content Services Digital Rights Management Digital Watermarking Auditing Time Stamping Go to View/Master/Slide Master to type in header Secure Content Management Content Management Meets Security! Information Object

  15. Common Archiving Record and Storage (CARS) Secure, scalable, and unified archive for all types of content Classify SharePoint Desktop & File System Email / IM Applications& Reports Paper Web Rich Media Go to View/Master/Slide Master to type in header ESG Strategy for Enterprise Archiving Retain Migrate Discover Enterprise Archive

  16.  Ž Ž Œ Go to View/Master/Slide Master to type in header New Architecture for Backup, Recovery, and Archive Recovery process Production Archive process • Extractvaluable information to archive • Increases performance of production applications • Improves TCO through use of tiered storage • Recovers capacity on Tier 1 resources • Back up active production information • Backup window reduced or eliminated • Higher reliability, greater likelihood of full backups • Retrieve from archive or recoverfrom backup • Restore requests are faster • Information that was once offline is now online via archive

  17. Go to View/Master/Slide Master to type in header Backup and Archive are Different

  18. Go to View/Master/Slide Master to type in header Continuity Reduce Total Cost Improve Business Value • Eliminate over-protection • Simplified environment • Consolidated continuity • Minimize under-protection • Flexibility to change • Improving productivity

  19. Over- protected Different requirements Different technologies Different processes Under- protected Not protected Go to View/Master/Slide Master to type in header Continuity Challenge: The Common Current State Continuity Issues • Survive a disaster • Achieve high availability • Prevent data corruption • Non-disruptively upgrade software and/or hardware • Do parallel processing • Move and migrate data • Restart the enterprise • Protect remote data sites • Shorten backup and restore times • Contain costs • Cannot add resources Pain Points • Inconsistent service levels • Gaps in coverage • Growth in complexity and effort • Growth in cost and risk to the business • Continuity Defined: • Ensuring applications and data are available during planned and unplanned outages.

  20. Go to View/Master/Slide Master to type in header Information Protection is Evolving Beyond Tape Backup… Replication CDP to Disk Snap / Clone OperationalEffectiveness Backup to Disk Backup to Tape MINUTES/ SECONDS HOURS/ MINUTES DAYS/ HOURS < SECONDS SECONDS Common Recovery Management Services Automated and Simplified Management Disaster Recovery, Operational Recovery, and Testing/Migration Decreased Recovery Time / Increased Recovery Point Granularity

  21. SAN SAN SAN Local Remote Go to View/Master/Slide Master to type in header Products and Technologies Multi-site Remote processing Remote Information Recovery Backup Platform Clustering across site with Storage DR aware

  22. Multi-site Increasing distance improves protection Remote processing Automatic processing resumption: “lights out” Remote Information All critical data safe at remote location Recovery Quick, accurate, predictable recovery Backup Frequent, consistent, non-disruptive backups Platform Storage, switch, and server protection Local Remote Go to View/Master/Slide Master to type in header Products and Technologies Information Protection & Recovery SRDF Family MirrorView AutoStart Family NetWorker Celerra Replicator RepliStor TimeFinder Family SnapView EMC SnapSure PowerPath

  23. Go to View/Master/Slide Master to type in header Getting Started: Sample Customer Requirements Plan

  24. Performance Compliance Availability Capacity Budget Business Applications ERP CRM Exchange Archive Go to View/Master/Slide Master to type in header Customer Needs Tiered Storage that Is Optimized for Business Requirements “Not all information is created equal”

  25. EMC Retrospect EMC Networker EMC Secure Remote Support EMC Documentum Trusted Content Services VMware Assured Computing Environment Digital Rights Management (with partners) ? define requirements establishservices catalog identifygaps create plan monitor effectiveness NeoScale Decru Kasten Chase Cipheroptics Go to View/Master/Slide Master to type in header What is Happening with Information Security where to start hardware Storage Security Assessment Service SAN Security Best Practices NAS Security Best Practices Data Erasure Services software services

  26. Go to View/Master/Slide Master to type in header Building a Next-Generation Information Infrastructure Information Lifecycle Management Flexible infrastructure Next-Generation Information Infrastructure Information protection and security

  27. Go to View/Master/Slide Master to type in header

More Related