TRUSTED IT
© Copyright 2013 EMC Corporation. All rights reserved.
1
Trusted IT Means Identifying & Repelling Threats Advanced Security Protecting Data Integrated Backup & Recovery Ensuring Availability Of Applications, Systems & Data Continuous Availability
© Copyright 2013 EMC Corporation. All rights reserved.
2
Evolution to Continuous Availability Continuous Avail.
Seconds
• Zero RTO
RPO
• Eliminate Restarts ActiveActive
Traditional Failover • “9s” of Availability
Manual, Stand-by
• Swap, Stand-by
Days
Days
© Copyright 2013 EMC Corporation. All rights reserved.
RTO
Zero
3
Continuous Availability Protect Against Technical and Operational Failures
© Copyright 2013 EMC Corporation. All rights reserved.
4
Continuous Availability, VPLEX, RecoverPoint should stay on screen together. This slide goes on right.
Active-Active Data
Protect Against Technical Failures
Active-Active
Read & Write at Two Sites
Zero RTO
No “Failover” Required
VMware Integrated SRM, VSI, VAAI Integrations
© Copyright 2013 EMC Corporation. All rights reserved.
5
Continuous Data Protection Protect Against Operational Failure
Point-in-Time Recovery
Log All Changes and Replicate to Second Site
More Efficient DR Models Fan-In (4:1) and Fan-Out (1:4) Replication
Simpler Than Ever Deploy as a Virtual Appliance
© Copyright 2013 EMC Corporation. All rights reserved.
6
Trusted IT Means
Protecting Data Integrated Backup & Recovery Ensuring Availability Of Applications, Systems & Data Continuous Availability
© Copyright 2013 EMC Corporation. All rights reserved.
7
Present State of The Backup World THE PROBLEM
53%
24%
Companies with data loss in 2012 (31% in 2011)
Do not tell CEOs they are not backing up all files
HOW ITMore Data Protect
HURTS Across More Environments BUSINESS
43% With Shrinking Budgets Source: Acronis Global Disaster Recovery Index: 2012
© Copyright 2013 EMC Corporation. All rights reserved.
Loss of employee productivity productivity
33% Do not back up virtual servers as often as physical 49% Back up virtual 29% 29% machines weekly orcustomer monthly Loss of revenue Loss of confidence
Source: Vanson Bourne 2012 Backup and Recovery Survey
8
A Growing Rift In The Backup World Silos Emerging
SCAN & COPY
STORE
SELF-SERVICE
DO MORE
RECOVER
WITH DATA
Backup Team
Lines of Business
© Copyright 2013 EMC Corporation. All rights reserved.
9
Transform Backup It Is Night And Day Different Application Silos Dedicated Infrastructure Helpdesk Recovery Backup Consoles
© Copyright 2013 EMC Corporation. All rights reserved.
Centralized Backup Leveraged Infrastructure Self-Service Recovery Native Application Consoles
10
Evolution To Integrated Backup And Recovery Integrated BRS
Self
• Native App Support
SERVICE
• Leveraged Infra. Integrated
Traditional Backup • Silos
Isolated
• Dedicated Equipment
Helpdesk
0
© Copyright 2013 EMC Corporation. All rights reserved.
LEVERAGE
100%
11
Continuous Availability, VPLEX, RecoverPoint should stay on screen together. This slide goes on right.
Centralize Data Protection Storage Protect Against Disasters with Archival Access
High Performance
6x Faster Recovery, 3x More Capacity
Extended Retention
Exceed Regulatory Requirements
VMware Integrated
3x Faster Backup, 30x Faster Recovery
© Copyright 2013 EMC Corporation. All rights reserved.
12
Continuous Availability, VPLEX, RecoverPoint should stay on screen together. This slide goes on right.
Centralize Data Protection Storage Self-Service Catalog, Monitoring and Reporting
Backup, Recovery & Archive Services Catalog
Policy Mgmt
Archive
Report
Storage Mgmt
© Copyright 2013 EMC Corporation. All rights reserved.
Microsoft System Center For Exchange
Oracle Enterprise Manager
VMware vCenter
Microsoft System Center For SQL
SAP Landscape Virtualization Manager
Microsoft System Center For Sharepoint
App & Storage Integration
13
Trusted IT Means Identifying & Repelling Threats Advanced Security Protecting Data Integrated Backup & Recovery Ensuring Availability Of Applications, Systems & Data Continuous Availability
© Copyright 2013 EMC Corporation. All rights reserved.
14
Old World Threats
ATTACK FOCUS ON
INTRUSION
© Copyright 2013 EMC Corporation. All rights reserved.
DEFENSE FOCUS ON
PREVENTION
15
New World Advanced Threats
1 STEALTHY 2TARGETED 3INTERACTIVE LOW AND SLOW
Attack
Intrusion
SPECIFIC OBJECTIVE
Pivot and Hide
Dwell Time
Cover
Response Time
Identification
A © Copyright 2013 EMC Corporation. All rights reserved.
HUMAN INVOLVEMENT
Reduce Dwell
B
Prevention
Response
Speed Response
16
New World Advanced Threats
85% of
breaches Breach response under 2 hours
weeks or more to discover
60%
reduced risk Source: Verizon 2012 Data Breach Investigations Report
© Copyright 2013 EMC Corporation. All rights reserved.
17
IS WHERE
SECURITY MEETS
BIG DATA © Copyright 2013 EMC Corporation. All rights reserved.
18
Perimeters are Changing
Virtual Data Centers, Cloud Compute and Mobile Users Traditional Data Center
Modern Data Center
Dedicated, Vertical Gaps and Stacks
Dynamic Pools Of Compute & Storage
© Copyright 2013 EMC Corporation. All rights reserved.
19
Perimeters Are Changing
Focus on people, data flow and transactions Traditional Data Center People Data Flow
Modern Data Center Challenges – ID and Authenticity – Complex Relationships – New and Different Layers
Opportunities with Data Transactions
Dedicated, Vertical Gaps and Stacks
© Copyright 2013 EMC Corporation. All rights reserved.
– – – –
Velocity Variety Volume Vulnerability
Big
Dynamic Pools Of Compute & Storage
20
Evolution To Advanced Security Advanced Security
Hi
• Predictive analysis
VALUE
• Activity. What if…? Data Science
Traditional Security • Reports and Response
Monitor and Manage
• What happened?
Low
Past
© Copyright 2013 EMC Corporation. All rights reserved.
TIME
Future
21
Traditional: Collect and report on
existing data to monitor and manage risk
Advanced: Advanced analytics and algorithms generate
predictive insights and active controls as direct result of data
Security
Analytics
Source: EMC Study, “Data Science Revealed: A Data-Driven Glimpse into the Burgeoning New Field,” December 5, 2011
© Copyright 2013 EMC Corporation. All rights reserved.
22
Breaking Data Barriers Security Analytics Reduces Dwell and Speeds Response Time
Scope of Data
After
Near
Real IDS
Platform SIEM
Normalized Security Analytics
Raw
© Copyright 2013 EMC Corporation. All rights reserved.
23
Security Analytics Platform Big Data
Analytics
Governance
Data
Alert & Report
Compliance
Apps
Investigate & Analyze
SECURITY ANALYTICS +
Systems
Store
Visualize Respond
Network
ARCHER Incident GRC Management
Remediation
Public & Private Threat Intelligence © Copyright 2013 EMC Corporation. All rights reserved.
24
All Files Executable Content Manipulated File Type Critical Assets
33,350,000 535,575 2,361 29 3
© Copyright 2013 EMC Corporation. All rights reserved.
25
Monitoring and Response Allocation Monitoring 15%
Response 5%
Monitoring 33%
Response 33%
Prevention 80%
Prevention 33%
Historic Security Spend
Future Security Spend
© Copyright 2013 EMC Corporation. All rights reserved.
26
A Fresh Look At Perimeters Focus now on people, data flow and transactions People
Analysis Engine
Data Flow
Transactions
Device Profile
Fraud Network User Behavior Profile
© Copyright 2013 EMC Corporation. All rights reserved.
27
Adaptive & Risk-Based Authentication Step Up Authentication Analysis Engine
High Risk
Two-Factor Out Of Band
User Action
Challenge Q’s
Proceed As Normal Fraud Network
Device Profile
User Behavior Profile
© Copyright 2013 EMC Corporation. All rights reserved.
28
Adaptive & Risk-Based Authentication Analysis Engine Private Cloud
User Action
User Behavior Profile
© Copyright 2013 EMC Corporation. All rights reserved.
Read Email Username & Password
Download Sales Pipeline Additional Authentication
Out Of Band
Fraud Network
Device Profile
AUTHENTICATION Two-Factor MANAGER + SECURID
Public Cloud
IDENTITY PROTECTION & VERIFICATION + SILVERTAIL Access Bank Account Username & Password
Transfer Challenge Q Funds Additional Authentication
29
Profile of Attack: Data Exfiltration Unusual Network Traffic Multi-connections tunneled over non-standard port
1
4 Ex-filtration Encrypted ZIP transmitted out of corporate network
© Copyright 2013 EMC Corporation. All rights reserved.
Authentication Check Directory logs authorized credentials from unknown IP
PASSWORD
******
2
3 Authorization Checks VPN & Host log multiple credentials on multiple servers
30
© Copyright 2013 EMC Corporation. All rights reserved.
31