Tải bản đầy đủ (.ppt) (27 trang)

Thúc đẩy tăng trưởng kinh doanh với hạ tầng thông tin an toàn và hoạt động liên tục

Bạn đang xem bản rút gọn của tài liệu. Xem và tải ngay bản đầy đủ của tài liệu tại đây (1.81 MB, 27 trang )

Go to View/Master/Slide Master to type in header
1
Propelling Business Growth With A
Secure And Continuous
Information Infrastructure
Jon Murray
Go to View/Master/Slide Master to type
in header
2
Information: Change in Multiple Dimensions
information
growth
information
types
information
uses
information
regulations
more regulations:
SEC 17a-4, NASD 3010,Sarbanes-Oxley, Basel II,
UK Metadata, eSign Act, 21 CFR Part 11
(more coming!)
more growth:
information stored on disk arrays growing ~60% in
2006
more uses:
ERP, CRM, RFID, collaboration, data mining,
discovery …
more types:
transactions, documents, forms, web, images,
voice, messages, reports ...


Go to View/Master/Slide Master to type
in header
3
Customers’ Information Storage and
Management Challenges
CIO’s Dilemma:
How to manage all the information
growth with limited resources?
Information stored on disk arrays
~ 70%
IT budget growth
~ 4 - 5%
IT environment getting more complex
SLA’s continue to expand and tighten
Protection and security increasingly important
Go to View/Master/Slide Master to type
in header
4
2006 Technology Spending Priorities–CIO Survey
Source: Morgan Stanley November CIO Survey, Jan. 3, 2006
1. Security (Software)
2. Security (HW & Services)
3. Storage Area Networks
4. Wireless LAN (access points & routers)
5. Storage Software
6. Portal Software
7. VOIP Infrastructure
8. IT Education and Training
9. Storage Hardware
10. Business Intelligence Software

11.Wireless LAN (clients)
12.New Custom Development
13.Routing
14.Systems Management Software
15.Application Integration Software
16.Notebook PCs
17.Document Management Software
18.Automated Testing Tool
19.Microsoft Office Upgrade
20.Application Software Server
45.Mainframe hardware
46.Printers
Go to View/Master/Slide Master to type
in header
5
Security Today
An Amalgamation of Point Products Across IT
Antivirus
Anitvirus
VPN
Encryption
Authentication
Web
Filtering
Authentication
Threat
Detection
Change/Patch
Management
LAN

Clients
Servers
SAN
Disk Storage
Tape
Spyware
Firewall
Digital Rights
Management
Encryption
Vault
Recovery
Management
Authentication
Go to View/Master/Slide Master to type
in header
6
Today’s Approach: Secure the Perimeter
Go to View/Master/Slide Master to type
in header
7
Security Tomorrow: Protect the Information
Go to View/Master/Slide Master to type
in header
8
Security Must Become Information-Centric

Information-centric Security

An inside-out view of how to secure information


Begins with securing the data itself

Moves out through layers of
increasingly intelligent infrastructure

Relies on our ability to leverage
the interaction between data and
infrastructure
Important Technology

Data-level access control

Open policy decision points

Enforcement at point of use
Go to View/Master/Slide Master to type
in header
9
Information Security (Confidentiality)
Information
Security
Information
Security
Information
Availability
Information
Availability
Information
Confidentiality

Information
Confidentiality
Information
Integrity
Information
Integrity
EMC’s Heritage
P
r
o
t
e
c
t
i
o
n
and
A Natural and Requested Evolution of EMC’s Data Protection Capabilities
Go to View/Master/Slide Master to type
in header
10
EMC’s Security Efforts to Date

CEO-level Mandate

Information Security Leadership Team

Company-wide Goals and Objectives


Security-related Workshops, Assessments

EMC Vulnerability Alert Service

Documentum Trusted Content Services

EMC Secure Remote Support

Data Erasure Service

DRM for ECM

Software-native Encryption

Retrospect and NetWorker

Data Encryption through EMC Select
Dedicated Focus
Dedicated Focus
Security of Offering
Security of Offering
Comprehensive
Information Protection
Comprehensive
Information Protection

×