RSA Solutions Overview Security Solutions for Business Accelleration

Скачать презентацию RSA Solutions Overview Security Solutions for Business Accelleration Скачать презентацию RSA Solutions Overview Security Solutions for Business Accelleration

ef5896219fe58db6cf4a2910769c81e7.ppt

  • Количество слайдов: 30

RSA Solutions Overview Security Solutions for Business Accelleration Ivan Svoboda Key Account Manager RSA RSA Solutions Overview Security Solutions for Business Accelleration Ivan Svoboda Key Account Manager RSA Security ivan. [email protected] com

RSA Protection in Action 134, 000+ Billion+ 200 Million+ 150, 000+ 25+ Applications shipped RSA Protection in Action 134, 000+ Billion+ 200 Million+ 150, 000+ 25+ Applications shipped withprotected Encryption Year legacy in information security Phishing attacks shut down Organizations BSAFE® Identities protected 25+ 34, 000+ 150, 000+ 250 Million+ 1 Billion+ year legacy in information security and risk management organizations protected by RSA technology online phishing attacks shut down by the RSA Anti-Fraud Command Center online identities protected with RSA identification and protection technology applications shipped with RSA BSAFE® encryption most widely deployed software in the world* *Embedded in Microsoft, HP, Sun and IBM operating systems, Internet Explorer and Netscape browsers, Ericsson, Nokia, Motorola phones, major US government agencies and the list goes on

RSA: Award Winning Company RSA: Award Winning Company

Frost and Sullivan – Competitive Landscape OTP Authentication(December 2008) Frost and Sullivan – Competitive Landscape OTP Authentication(December 2008)

Leadership Beyond Authentication “RSA is vastly more than user authentication; it is a key Leadership Beyond Authentication “RSA is vastly more than user authentication; it is a key portion of how companies, particularly in the financial industry, protect critical records and comply with critical regulations. ” -- “EMC Addresses the 2009 ‘OMG’ Budget”, ITBusiness Edge, Rob Enderle, Enderle Group, Dec. 9, 2008 Data Loss Prevention MQ June 2008 Web Fraud Detection MQ Dec. 2008 SIEM MQ May 2008

RSA – The Big Picture Encryption Store, Transport IT infrastructure Access Authentication, Authorization information RSA – The Big Picture Encryption Store, Transport IT infrastructure Access Authentication, Authorization information SIEM Security Information and Event Management DLP Data Loss Prevention

RSA – The Big Picture – Product Lines RSA Encryption and Key Management Suite RSA – The Big Picture – Product Lines RSA Encryption and Key Management Suite RSA Access Manager RSA Federated Identity Manager IT infrastructure RSA Secur. ID RSA Digital Certificate Solutions information RSA Identity Protection and Verification Suite RSA en. Vision Platform RSA Data Loss Prevention Suite

Encryption Store, Transport Encryption RSA Key Manager RSA BSAFE information Encryption Store, Transport Encryption RSA Key Manager RSA BSAFE information

RSA Key Manager Enterprise-Wide Key Management Apps/DB FS/CMS RSA Key Manager (RKM) Policy-based Interface RSA Key Manager Enterprise-Wide Key Management Apps/DB FS/CMS RSA Key Manager (RKM) Policy-based Interface 1. Generate Keys 2. Securely Distribute Keys 3. Vault Keys 4. Expire / Turnover Keys 5. Monitor + Audit 13 Storage

RSA Key Manager Enterprise-Wide Key Management RKM Server RSA Key Manager with Application Encryption RSA Key Manager Enterprise-Wide Key Management RKM Server RSA Key Manager with Application Encryption RSA Key Manager for the Datacenter Application Encryption Client Integration modules EMC & 3 rd party encryption Sensitive data encrypted within applications at point of capture Application Encryption Clients. Comprehensive platform and language support C, Java, . NET, Cobol, CICS Linux, Mainframe, Unix, Windows 14 Integrates with host, SAN switch, and native tape encryption solutions from RSA, EMC, and third parties Current integrations include File Security Manager, Power. Path, Connectrix/Cisco, Oracle and Native Tape

Access Authentication, Authorization information Access RSA Access Manager RSA Federated Identity Manager RSA Secur. Access Authentication, Authorization information Access RSA Access Manager RSA Federated Identity Manager RSA Secur. ID, RSA Authentication Manager RSA Digital Certificate Solutions RSA Identity Protection and Verification Suite

RSA Access Manager Policy based secure web access and SSO solution Extranet SSO based RSA Access Manager Policy based secure web access and SSO solution Extranet SSO based on Federated Identity Simple management

RSA Secur. ID – Two-Factor Authentication: “The act of identifying an individual by using RSA Secur. ID – Two-Factor Authentication: “The act of identifying an individual by using any combination of something they know, something they have or something they are. ” “Something you know” = PIN, password, life question “Something you have” = Token, Smartcard, Trusted Device “Something you are” = Biometrics (fingerprint, retinal scan, etc)

RSA Secur. ID, RSA Authentication Manager Deployment Options RSA Secur. ID, RSA Authentication Manager Deployment Options

RSA Secur. ID Tokens (HW and SW) RSA Secur. ID Tokens (HW and SW)

RSA Identity Protection and Verification Suite RSA Adaptive Authentication and Transaction Monitoring (with Risk RSA Identity Protection and Verification Suite RSA Adaptive Authentication and Transaction Monitoring (with Risk Engine) RSA e. Fraud. Network RSA Fraud. Action

information DLP RSA Data Loss Prevention Suite DLP Data Loss Prevention information DLP RSA Data Loss Prevention Suite DLP Data Loss Prevention

RSA Data Loss Prevention Suite Your Sensitive Data are Everywhere Endpoint Network/E-mail Apps/DB FS/CMS RSA Data Loss Prevention Suite Your Sensitive Data are Everywhere Endpoint Network/E-mail Apps/DB FS/CMS Storage LAN Internal Employees WAN Enterprise Applications Production Database File Server Replica File Server Disk Arrays Backup Tape Disk Arrays Backup System VPN Business Analytics Remote Employees Disk Arrays Backup Disk Outsourced Dev. Partners Endpoint Network/E-mail Staging Apps/DB Collaboration & Content Mgmt Systems FS/CMS Storage

RSA Data Loss Prevention Suite Unified Policy Mgmt & Enforcement Incident Workflow DLP Enterprise RSA Data Loss Prevention Suite Unified Policy Mgmt & Enforcement Incident Workflow DLP Enterprise Manager Dashboard & Reporting DLP Endpoint DLP Network DLP Datacenter User & System Administration Discover Monitor Discover File shares, Share. Point sites, Databases, SAN/NAS Email, webmail, IM/Chat, FTP, HTTP/S, TCP/IP Local drives, PST files, Office files, 300+ file types Remediate Enforce Delete, Move, Quarantine Allow, Notify, Block, Encrypt Allow, Justify, Block on Copy, Save As, Print, USB, Burn, etc. e. DRM Encryption Access Controls

RSA DLP with Microsoft AD RMS Current Status 1. RMS admin creates RMS templates RSA DLP with Microsoft AD RMS Current Status 1. RMS admin creates RMS templates for data protection 2. RSA DLP admin designs policies to find sensitive data and protect it using RMS Legal Department Outside law firm Others View, Edit, Print Microsoft AD RMS View No Access Find Legal Contracts Apply Legal Contracts RMS Contracts DLP Policy RSA DLP Legal department 3. RSA DLP discovers and classifies sensitive files 4. RSA DLP applies RMS controls based on policy Legal Contracts RMS Outside law firm Laptops/desktops File shares Share. Point Others 5. Users request files - RMS provides policy based access

information SIEM RSA en. Vision Platform SIEM Security Information and Event Management information SIEM RSA en. Vision Platform SIEM Security Information and Event Management

RSA en. Vision 3 -in-1 SIEM Platform Simplifying Compliance Enhancing Security Optimizing IT & RSA en. Vision 3 -in-1 SIEM Platform Simplifying Compliance Enhancing Security Optimizing IT & Network Operations Compliance reports for regulations and internal policy Real-time security alerting and analysis IT monitoring across the infrastructure Reporting Forensics Auditing Purpose-built database (IPDB) security devices Network baseline Alert / correlation Visibility RSA en. Vision Log Management platform network devices applications / databases servers storage

RSA Security Pozvánky na semináře RSA Security Pozvánky na semináře

Další semináře, konference 14. 5. (čtvrtek): RSA Security Day • komplet přehled všech řešení Další semináře, konference 14. 5. (čtvrtek): RSA Security Day • komplet přehled všech řešení 11. 6. : Soft-tronik Forum 2009: www. stforum 2009. cz • DLP and SIEM 24. 6. : RSA Security snídaně • Fraud Detection, Identity Protection (IPV)

Další semináře, konference Další plánovaná témata: • • • Šifrování dat Data Loss Prevention Další semináře, konference Další plánovaná témata: • • • Šifrování dat Data Loss Prevention (DLP) Identita a zákony, tokeny a certifikáty Společné řešení RSA a Oracle Společné řešení RSA a Microsoft Stačí poslat email: ivan. [email protected] com

Conclusion Conclusion

RSA – The Big Picture Encryption Store, Transport IT infrastructure Access Authentication, Authorization information RSA – The Big Picture Encryption Store, Transport IT infrastructure Access Authentication, Authorization information SIEM Security Information and Event Management DLP Data Loss Prevention

RSA – The First Aid in Security : -) information RSA – The First Aid in Security : -) information

Otázka: Jaké jsou 3 oblasti, ve kterých je společnost RSA hodnocena jako LEADER v Otázka: Jaké jsou 3 oblasti, ve kterých je společnost RSA hodnocena jako LEADER v Gartner Magic Quadrantu? DLP SIEM Web Fraud Detection




  • Мы удаляем страницу по первому запросу с достаточным набором данных, указывающих на ваше авторство. Мы также можем оставить страницу, явно указав ваше авторство (страницы полезны всем пользователям рунета и не несут цели нарушения авторских прав). Если такой вариант возможен, пожалуйста, укажите об этом.