Go to View/Master/Slide Master to type in header
1
Propelling Business Growth With
A Secure And Continuous
Information Infrastructure
Jon Murray
Go to View/Master/Slide Master to type
in header
2
Information: Change in Multiple Dimensions
information
growth
information
types
information
uses
information
regulations
more regulations:
SEC 17a-4, NASD 3010,Sarbanes-Oxley, Basel II,
UK Metadata, eSign Act, 21 CFR Part 11
(more coming!)
more growth:
information stored on disk arrays growing ~60% in
2006
more uses:
ERP, CRM, RFID, collaboration, data mining,
discovery …
more types:
transactions, documents, forms, web, images,
voice, messages, reports ...
Go to View/Master/Slide Master to type
in header
3
Customers’ Information Storage and
Management Challenges
CIO’s Dilemma:
How to manage all the information
growth with limited resources?
Information stored on disk arrays ~ 70%
IT budget growth ~ 4 - 5%
IT environment getting more complex
SLA’s continue to expand and tighten
Protection and security increasingly important
Go to View/Master/Slide Master to type
in header
4
2006 Technology Spending Priorities–CIO Survey
Source: Morgan Stanley November CIO Survey, Jan. 3, 2006
1. Security (Software)
2. Security (HW & Services)
3. Storage Area Networks
4. Wireless LAN (access points & routers)
5. Storage Software
6. Portal Software
7. VOIP Infrastructure
8. IT Education and Training
9. Storage Hardware
10. Business Intelligence Software
11.Wireless LAN (clients)
12.New Custom Development
13.Routing
14.Systems Management Software
15.Application Integration Software
16.Notebook PCs
17.Document Management Software
18.Automated Testing Tool
19.Microsoft Office Upgrade
20.Application Software Server
45.Mainframe hardware
46.Printers
Go to View/Master/Slide Master to type
in header
5
Security Today
An Amalgamation of Point Products Across IT
Antivirus
Anitvirus
VPN
Encryption
Authentication
Web
Filtering
Authentication
Threat
Detection
Change/Patch
Management
LAN
Clients
Servers
SAN
Disk Storage
Tape
Spyware
Firewall
Digital Rights
Management
Encryption
Vault
Recovery
Management
Authentication
Go to View/Master/Slide Master to type
in header
6
Today’s Approach: Secure the Perimeter
Go to View/Master/Slide Master to type
in header
7
Security Tomorrow: Protect the Information
Go to View/Master/Slide Master to type
in header
8
Security Must Become Information-Centric
Information-centric Security
–
An inside-out view of how to secure information
Begins with securing the data itself
Moves out through layers of
increasingly intelligent infrastructure
Relies on our ability to leverage
the interaction between data and
infrastructure
Important Technology
•
Data-level access control
•
Open policy decision points
•
Enforcement at point of use
Go to View/Master/Slide Master to type
in header
9
Information Security (Confidentiality)
Information
Security
Information
Security
Information
Availability
Information
Availability
Information
Confidentiality
Information
Confidentiality
Information
Integrity
Information
Integrity
EMC’s Heritage
P
r
o
t
e
c
t
i
o
n
and
A Natural and Requested Evolution of EMC’s Data Protection Capabilities
Go to View/Master/Slide Master to type
in header
10
EMC’s Security Efforts to Date
•
CEO-level Mandate
•
Information Security Leadership Team
•
Company-wide Goals and Objectives
•
Security-related Workshops, Assessments
•
EMC Vulnerability Alert Service
•
Documentum Trusted Content Services
•
EMC Secure Remote Support
•
Data Erasure Service
•
DRM for ECM
•
Software-native Encryption
–
Retrospect and NetWorker
•
Data Encryption through EMC Select
Dedicated Focus
Dedicated Focus
Security of Offering
Security of Offering
Comprehensive
Information Protection
Comprehensive
Information Protection