Propelling Business Growth With A Secure And Continuous Information Infrastructure - PowerPoint PPT Presentation

Loading...

PPT – Propelling Business Growth With A Secure And Continuous Information Infrastructure PowerPoint presentation | free to view - id: 1285be-NTg0Y



Loading


The Adobe Flash plugin is needed to view this content

Get the plugin now

View by Category
About This Presentation
Title:

Propelling Business Growth With A Secure And Continuous Information Infrastructure

Description:

Automated Testing Tool. Microsoft Office Upgrade. Application ... Anti-Virus/Malware. Secure Messaging. Web Filtering. Encryption. File / Database Security ... – PowerPoint PPT presentation

Number of Views:78
Avg rating:3.0/5.0
Slides: 28
Provided by: vei3
Category:

less

Write a Comment
User Comments (0)
Transcript and Presenter's Notes

Title: Propelling Business Growth With A Secure And Continuous Information Infrastructure


1
Propelling Business Growth With A Secure And
Continuous Information Infrastructure
  • Jon Murray

2
Information Change in Multiple Dimensions
informationgrowth
information regulations
more growth information stored on disk arrays
growing 60 in 2006
informationuses
more typestransactions, documents, forms, web,
images, voice, messages, reports ...
more usesERP, CRM, RFID, collaboration, data
mining, discovery
informationtypes
more regulationsSEC 17a-4, NASD
3010,Sarbanes-Oxley, Basel II, UK Metadata, eSign
Act, 21 CFR Part 11 (more coming!)
3
Customers Information Storage andManagement
Challenges
Information stored on disk arrays 70 IT
budget growth 4 - 5 IT environment getting
more complex SLAs continue to expand and
tighten Protection and security increasingly
important
CIOs Dilemma How to manage all the information
growth with limited resources?
4
2006 Technology Spending PrioritiesCIO Survey
1. Security (Software) 2. Security (HW
Services) 3. Storage Area Networks 4.
Wireless LAN (access points routers) 5.
Storage Software 6. Portal Software 7. VOIP
Infrastructure 8. IT Education and Training 9.
Storage Hardware 10. Business Intelligence
Software
  • Wireless LAN (clients)
  • New Custom Development
  • Routing
  • Systems Management Software
  • Application Integration Software
  • Notebook PCs
  • Document Management Software
  • Automated Testing Tool
  • Microsoft Office Upgrade
  • Application Software Server
  • Mainframe hardware
  • Printers

Source Morgan Stanley November CIO Survey, Jan.
3, 2006
5
Security Today
An Amalgamation of Point Products Across IT
Clients
Servers
LAN
SAN
Disk Storage
Tape
6
Todays Approach Secure the Perimeter
7
Security Tomorrow Protect the Information
8
Security Must Become Information-Centric
  • Information-centric Security
  • An inside-out view of how to secure information
  • Begins with securing the data itself
  • Moves out through layers of increasingly
    intelligent infrastructure
  • Relies on our ability to leveragethe interaction
    between data andinfrastructure
  • Important Technology
  • Data-level access control
  • Open policy decision points
  • Enforcement at point of use

9
Information Security (Confidentiality)
A Natural and Requested Evolution of EMCs Data
Protection Capabilities
Information Security
and
Protection
EMCs Heritage
10
EMCs Security Efforts to Date
Dedicated Focus
  • CEO-level Mandate
  • Information Security Leadership Team
  • Company-wide Goals and Objectives

Security of Offering
  • Security-related Workshops, Assessments
  • EMC Vulnerability Alert Service
  • Documentum Trusted Content Services
  • EMC Secure Remote Support
  • Data Erasure Service
  • DRM for ECM
  • Software-native Encryption
  • Retrospect and NetWorker
  • Data Encryption through EMC Select

Comprehensive Information Protection
11
EMC Security Mission
End-to-End Information Security Management
EMC ISM
Vulnerability Management
Security Risk Management
Vulnerability Assessment
Patching
Security Configuration
Security Event Management / Managed Security
Threat Management
Firewall / VPN
Intrusion Detect / Prevent
Threat Appliances
Secure Content
Anti-Virus/Malware
Secure Messaging
Web Filtering
Encryption
Encryption
Digital Rights Mgmt
File / Database Security
ID and AccessManagement
Authentication
Authentication
Authentication Mgmt
Authentication Mgmt
Provisioning
Security Services
12
EMCs Information-Centric Approach to Security
  • Information Security Management (ISM)
  • Information Security is an end-to-end challenge
  • To be most effective, security capabilities must
    be integrated with the information
    infrastructure
  • All security offerings need to be interoperable
    and open
  • EMC Strategy
  • Expose key native capabilities
  • Repurpose existing technologies for security use
    cases
  • Develop new products, solutions, and service
    offerings
  • Partner and acquire to complete portfolio

12
13
What is Happening with Information Security
hardware
Storage Security Assessment Service SAN Security
Best Practices NAS Security Best Practices Data
Erasure Services
software
services
14
Secure Content Management
Content Management Meets Security!
Information Object
15
ESG Strategy for Enterprise Archiving
Retain
Migrate
Discover
Enterprise Archive
16
New Architecture for Backup, Recovery, and Archive
Recovery process
Production
Archive process
  • Extract valuable information to archive
  • Increases performance of production applications
  • Improves TCO through use of tiered storage
  • Recovers capacity on Tier 1 resources
  • Back up active production information
  • Backup window reduced or eliminated
  • Higher reliability, greater likelihood of full
    backups
  • Retrieve from archive or recover from backup
  • Restore requests are faster
  • Information that was once offline is now online
    via archive

17
Backup and Archive are Different
18
Continuity
Reduce Total Cost
Improve Business Value
  • Minimize under-protection
  • Flexibility to change
  • Improving productivity
  • Eliminate over-protection
  • Simplified environment
  • Consolidated continuity

19
Continuity Challenge The Common Current State
  • Continuity Issues
  • Survive a disaster
  • Achieve high availability
  • Prevent data corruption
  • Non-disruptively upgrade software and/or hardware
  • Do parallel processing
  • Move and migrate data
  • Restart the enterprise
  • Protect remote data sites
  • Shorten backup and restore times
  • Contain costs
  • Cannot add resources
  • Pain Points
  • Inconsistent service levels
  • Gaps in coverage
  • Growth in complexity and effort
  • Growth in cost and risk to the business

Continuity Defined Ensuring applications and
data are available during planned and unplanned
outages.
20
Information Protection is Evolving Beyond Tape
Backup
Replication
CDP to Disk
Snap / Clone
OperationalEffectiveness
Backup to Disk
Backup to Tape
MINUTES/ SECONDS
HOURS/ MINUTES
DAYS/ HOURS
lt SECONDS
SECONDS
Common Recovery Management Services Automated
and Simplified Management Disaster Recovery,
Operational Recovery, and Testing/Migration
Decreased Recovery Time / Increased Recovery
Point Granularity
21
Products and Technologies
Multi-site
Remote processing
Remote Information
Recovery
Backup
Platform
Clustering across site with Storage DR aware
22
Products and Technologies
Information Protection Recovery
SRDF Family MirrorView
AutoStart Family
NetWorker Celerra Replicator RepliStor
TimeFinder Family SnapView EMC SnapSure PowerPath
23
Getting Started Sample Customer Requirements Plan
24
Customer Needs
Tiered Storage that Is Optimized for Business
Requirements
Not all information is created equal
25
What is Happening with Information Security
where to start
hardware
Storage Security Assessment Service SAN Security
Best Practices NAS Security Best Practices Data
Erasure Services
software
services
26
Building a Next-Generation Information
Infrastructure
Information Lifecycle Management
Flexible infrastructure
Next-Generation Information Infrastructure
Information protection and security
27
(No Transcript)
About PowerShow.com