TRUSTED IT. Copyright 2013 EMC Corporation. All rights reserved

TRUSTED IT © Copyright 2013 EMC Corporation. All rights reserved. 1 Trusted IT Means Identifying & Repelling Threats Advanced Security Protecting ...
1 downloads 1 Views 4MB Size
TRUSTED IT

© Copyright 2013 EMC Corporation. All rights reserved.

1

Trusted IT Means Identifying & Repelling Threats Advanced Security Protecting Data Integrated Backup & Recovery Ensuring Availability Of Applications, Systems & Data Continuous Availability

© Copyright 2013 EMC Corporation. All rights reserved.

2

Evolution to Continuous Availability Continuous Avail.

Seconds

• Zero RTO

RPO

• Eliminate Restarts ActiveActive

Traditional Failover • “9s” of Availability

Manual, Stand-by

• Swap, Stand-by

Days

Days

© Copyright 2013 EMC Corporation. All rights reserved.

RTO

Zero

3

Continuous Availability Protect Against Technical and Operational Failures

© Copyright 2013 EMC Corporation. All rights reserved.

4

Continuous Availability, VPLEX, RecoverPoint should stay on screen together. This slide goes on right.

Active-Active Data

Protect Against Technical Failures

Active-Active

Read & Write at Two Sites

Zero RTO

No “Failover” Required

VMware Integrated SRM, VSI, VAAI Integrations

© Copyright 2013 EMC Corporation. All rights reserved.

5

Continuous Data Protection Protect Against Operational Failure

Point-in-Time Recovery

Log All Changes and Replicate to Second Site

More Efficient DR Models Fan-In (4:1) and Fan-Out (1:4) Replication

Simpler Than Ever Deploy as a Virtual Appliance

© Copyright 2013 EMC Corporation. All rights reserved.

6

Trusted IT Means

Protecting Data Integrated Backup & Recovery Ensuring Availability Of Applications, Systems & Data Continuous Availability

© Copyright 2013 EMC Corporation. All rights reserved.

7

Present State of The Backup World THE PROBLEM

53%

24%

Companies with data loss in 2012 (31% in 2011)

Do not tell CEOs they are not backing up all files

HOW ITMore Data  Protect

HURTS  Across More Environments BUSINESS

43%  With Shrinking Budgets Source: Acronis Global Disaster Recovery Index: 2012

© Copyright 2013 EMC Corporation. All rights reserved.

Loss of employee productivity productivity

33% Do not back up virtual servers as often as physical 49% Back up virtual 29% 29% machines weekly orcustomer monthly Loss of revenue Loss of confidence

Source: Vanson Bourne 2012 Backup and Recovery Survey

8

A Growing Rift In The Backup World Silos Emerging

SCAN & COPY

STORE

SELF-SERVICE

DO MORE

RECOVER

WITH DATA

Backup Team

Lines of Business

© Copyright 2013 EMC Corporation. All rights reserved.

9

Transform Backup It Is Night And Day Different Application Silos Dedicated Infrastructure Helpdesk Recovery Backup Consoles

© Copyright 2013 EMC Corporation. All rights reserved.

Centralized Backup Leveraged Infrastructure Self-Service Recovery Native Application Consoles

10

Evolution To Integrated Backup And Recovery Integrated BRS

Self

• Native App Support

SERVICE

• Leveraged Infra. Integrated

Traditional Backup • Silos

Isolated

• Dedicated Equipment

Helpdesk

0

© Copyright 2013 EMC Corporation. All rights reserved.

LEVERAGE

100%

11

Continuous Availability, VPLEX, RecoverPoint should stay on screen together. This slide goes on right.

Centralize Data Protection Storage Protect Against Disasters with Archival Access

High Performance

6x Faster Recovery, 3x More Capacity

Extended Retention

Exceed Regulatory Requirements

VMware Integrated

3x Faster Backup, 30x Faster Recovery

© Copyright 2013 EMC Corporation. All rights reserved.

12

Continuous Availability, VPLEX, RecoverPoint should stay on screen together. This slide goes on right.

Centralize Data Protection Storage Self-Service Catalog, Monitoring and Reporting

Backup, Recovery & Archive Services Catalog

Policy Mgmt

Archive

Report

Storage Mgmt

© Copyright 2013 EMC Corporation. All rights reserved.

Microsoft System Center For Exchange

Oracle Enterprise Manager

VMware vCenter

Microsoft System Center For SQL

SAP Landscape Virtualization Manager

Microsoft System Center For Sharepoint

App & Storage Integration

13

Trusted IT Means Identifying & Repelling Threats Advanced Security Protecting Data Integrated Backup & Recovery Ensuring Availability Of Applications, Systems & Data Continuous Availability

© Copyright 2013 EMC Corporation. All rights reserved.

14

Old World Threats

ATTACK FOCUS ON

INTRUSION

© Copyright 2013 EMC Corporation. All rights reserved.

DEFENSE FOCUS ON

PREVENTION

15

New World Advanced Threats

1 STEALTHY 2TARGETED 3INTERACTIVE LOW AND SLOW

Attack

Intrusion

SPECIFIC OBJECTIVE

Pivot and Hide

Dwell Time

Cover

Response Time

Identification

A © Copyright 2013 EMC Corporation. All rights reserved.

HUMAN INVOLVEMENT

Reduce Dwell

B

Prevention

Response

Speed Response

16

New World Advanced Threats

85% of

breaches Breach response under 2 hours

weeks or more to discover

60%

reduced risk Source: Verizon 2012 Data Breach Investigations Report

© Copyright 2013 EMC Corporation. All rights reserved.

17

IS WHERE

SECURITY MEETS

BIG DATA © Copyright 2013 EMC Corporation. All rights reserved.

18

Perimeters are Changing

Virtual Data Centers, Cloud Compute and Mobile Users Traditional Data Center

Modern Data Center

Dedicated, Vertical Gaps and Stacks

Dynamic Pools Of Compute & Storage

© Copyright 2013 EMC Corporation. All rights reserved.

19

Perimeters Are Changing

Focus on people, data flow and transactions Traditional Data Center People Data Flow

Modern Data Center  Challenges – ID and Authenticity – Complex Relationships – New and Different Layers

 Opportunities with Data Transactions

Dedicated, Vertical Gaps and Stacks

© Copyright 2013 EMC Corporation. All rights reserved.

– – – –

Velocity Variety Volume Vulnerability

Big

Dynamic Pools Of Compute & Storage

20

Evolution To Advanced Security Advanced Security

Hi

• Predictive analysis

VALUE

• Activity. What if…? Data Science

Traditional Security • Reports and Response

Monitor and Manage

• What happened?

Low

Past

© Copyright 2013 EMC Corporation. All rights reserved.

TIME

Future

21

Traditional: Collect and report on

existing data to monitor and manage risk

Advanced: Advanced analytics and algorithms generate

predictive insights and active controls as direct result of data

Security

Analytics

Source: EMC Study, “Data Science Revealed: A Data-Driven Glimpse into the Burgeoning New Field,” December 5, 2011

© Copyright 2013 EMC Corporation. All rights reserved.

22

Breaking Data Barriers Security Analytics Reduces Dwell and Speeds Response Time

Scope of Data

After

Near

Real IDS

Platform SIEM

Normalized Security Analytics

Raw

© Copyright 2013 EMC Corporation. All rights reserved.

23

Security Analytics Platform Big Data

Analytics

Governance

Data

Alert & Report

Compliance

Apps

Investigate & Analyze

SECURITY ANALYTICS +

Systems

Store

Visualize Respond

Network

ARCHER Incident GRC Management

Remediation

Public & Private Threat Intelligence © Copyright 2013 EMC Corporation. All rights reserved.

24

All Files Executable Content Manipulated File Type Critical Assets

33,350,000 535,575 2,361 29 3

© Copyright 2013 EMC Corporation. All rights reserved.

25

Monitoring and Response Allocation Monitoring 15%

Response 5%

Monitoring 33%

Response 33%

Prevention 80%

Prevention 33%

Historic Security Spend

Future Security Spend

© Copyright 2013 EMC Corporation. All rights reserved.

26

A Fresh Look At Perimeters Focus now on people, data flow and transactions People

Analysis Engine

Data Flow

Transactions

Device Profile

Fraud Network User Behavior Profile

© Copyright 2013 EMC Corporation. All rights reserved.

27

Adaptive & Risk-Based Authentication Step Up Authentication Analysis Engine

High Risk

Two-Factor Out Of Band

User Action

Challenge Q’s

Proceed As Normal Fraud Network

Device Profile

User Behavior Profile

© Copyright 2013 EMC Corporation. All rights reserved.

28

Adaptive & Risk-Based Authentication Analysis Engine Private Cloud

User Action

User Behavior Profile

© Copyright 2013 EMC Corporation. All rights reserved.

Read Email Username & Password

Download Sales Pipeline Additional Authentication

Out Of Band

Fraud Network

Device Profile

AUTHENTICATION Two-Factor MANAGER + SECURID

Public Cloud

IDENTITY PROTECTION & VERIFICATION + SILVERTAIL Access Bank Account Username & Password

Transfer Challenge Q Funds Additional Authentication

29

Profile of Attack: Data Exfiltration Unusual Network Traffic Multi-connections tunneled over non-standard port

1

4 Ex-filtration Encrypted ZIP transmitted out of corporate network

© Copyright 2013 EMC Corporation. All rights reserved.

Authentication Check Directory logs authorized credentials from unknown IP

PASSWORD

******

2

3 Authorization Checks VPN & Host log multiple credentials on multiple servers

30

© Copyright 2013 EMC Corporation. All rights reserved.

31

Suggest Documents