SlideShare a Scribd company logo
1 of 17
Download to read offline
What is Hybrid IT ?
The Security Heretic ….The Case For Change
In The Data Protection Market
Gary Marsden, Senior Director, Data Protection Services
December 2017
Are traditional methods and beliefs hindering the
advancement of our industry?
“If I'd asked customers what they wanted, they would have said
"a faster horse” (Henry Ford)
……so, you have to ask the question to think outside of the box
Are traditional methods and
beliefs hindering the
advancement of our industry?
Hey, I just proved that you can
simplify Data Protection
Retract your findings immediately we
cant have customers finding out!!!
Only DEVILS think they
can improve the world so
others can understand it
Do it for the good of the industry you beast!!
The Security Market Needs to Change
“No one wakes up in
the morning wanting
to buy a HSM”
“Don’t even think of selling
me ‘just one more product’.”
“Make it so my 5 year old can use it,
and I only want to pay for what I use.
Period.”
“Encryption is a religion
Marsden, and you are a
heretic”
How Security SHOULD Feel to Enterprise Users and IT
Administrators….
….secured with the push of a button
Example: The Cloud Has Reset IT Expectations
“I deployed my application
in five minutes.”
Rapid Time to Market
“No more time spent on low-level
infrastructure management.”
One-Click Simplicity
“I use and pay for just what I
need only when I need it.”
Fractional IT Consumption
“New capabilities are available
on a regular basis.”
Continuous Innovation
Too many clouds, can make things a bit foggy…..
0%
5%
10%
15%
20%
25%
30%
35%
40%
45%
50%
One to three Four to Eight Nine to Twelve
Number of clouds within an organization
Number of Clouds
06.12.17Title6 Source: Gemalto – Sept 2017
Example: The Extent of The Problem
7
Total Germany
0% 9% 2%
1% 5% 0%
2% 13% 13%
3% 16% 31%
4% 15% 18%
5-10% 31% 27%
*More than 10% (please specify) 8% 2%
Don’t know 4% 7%
Average percentage of breached data
that was protected by encryption
8.36% 4.52%
Thinking about your organisation’s most recent
breach, what percentage of the breached data was
protected by encryption?
Source: Gemalto – July 2017
Click to
download
GOAL: All data is secured
Multiple borders and data silo’s
Too many solutions, high
management overhead
Individual SaaS providers become
Crypto custodians
Lost of portability and control
Struggle to define a unified security
policy
Investment is prohibitive
……. which makes compliance
TOUGH!!
The Challenge: Compliance in a Cloudy World
Example: The Complex Path To Compliance and CIAAA
How do I ensure that
only I have access to my
data forever
How do I ensure that I set
and manage the policies for
my encrypted data
How do I control my
keys across such
disparate
environments?
How do I secure my keys
without adding cost and
complexity
Reminder: Confidentiality, Integrity, Availability, Auditability, Accountability
And What About The Future…… More Complexity?
10
LDAP
IDaaS
Data
Protection
IoT
PaaS
IAM
Encrypt
PKI
SAML
HSM
Block-
Chain
2FA
Biz Process
IaaS
Oracle
SAP
API
SaaS
SFDC
KMIP
Usage
Billing
Micro
Services
Challenge: Adopting New Models to Keep Pace
Example: The Changing Audience
Partner/SP
Prod Mgr
Partner/SP
CIO/
CISO
IT /Sec
Dir
Distributor or Service Provider Tenant
Responsible for delivering
solutions that secure all
data in-line with company
policies and industry
standards
Owns
Budget
Economical Buyer
App Owner
(Use Cases)
Tenant
Admin
Users
Defines or Confirms
requirements
Responsible for applications
which need to be secured.
Meets data security
requirements, manages
application lifecycles,
increasingly Dev Ops
Application
Owner
Technical Buyer
Wants help
doing their job
Enterprise
Customer/
Consumer
Customer
ServiceMgr.
Responsible for the corporate
system of record which
contains personal identifiable
information. Multiple roles
across different disciplines
with the organization
Functional Buyer
ITSecurity
Director
Example: Good Security Takes Too Long to Build
12
Monday Tuesday Wednesday Thursday Friday
X
Purchase
Delivery
Understand
X
Configure
Deploy
X
Test
Use
Manage
Support
Upgrade
X
Design
Select
Plan
Situation: Data Protection Needs Today and Tomorrow
Affordability
Move to OPEX base
cloud models
Investment
Leverage Pay-as-
you-Go
Complexity
Reduce need for
specialist knowledge
Scalability
Grow as you need
Simplicity
Easy to deploy
Manageability
Everything from one
central point
TCO
Minimize overheads
and resource
utilization
£
€ $
Challenge: Changing Our Approach to Achieve These Goals
Business ProtectionBusiness Productivity
A New Model For Data Protection
Point, Click, Deploy
Example: Key Broker ….
5 Steps to Securing Cloud Data - A Heretic’s Dream
CUSTOMERS
Trusted 3rd Party
BYOK
Cloud Providers with
native encryption:-
SAP HANA
GOOGLE
AWS
WORKDAY
1 Subscribe
2
Authenticate
3
Enter Parameters
4
Access Protected Data
Generate and Provision Keys
Key Management & Audit5
Manage Key Lifecycles
In Summary……..
No one wakes up in the morning wanting encryption – New compliance regulations and
increasing number of data breaches are driving need
Traditional security approaches no longer map to the market needs – Instant and on
demand service (not product) and “pay per Use” is the new norm
A refreshed approach to security that provides CIAA for a new set of data and
applications owners – users want a “Click to Encrypt” model
Active data protection is on horizon – encryption becomes a natural part of the distributed
neural network that will be the IT landscape of the future. Efficient, easy-to-use, transparent
Need to trust someone– Staggering shift to higher order services is putting trust in service
providers and 3rd party software based applications
Similar Gemalto Discussions
How Cryptocurrencies are Changing the Face of Financial Services
451 Research & Gemalto Present "Alphabet Soup: Deciphering Multi-Cloud
Security”
The Blockchain Bubble: Identifying viable opportunities for blockchain
06.12.17Title17

More Related Content

What's hot

What is Zero Trust
What is Zero TrustWhat is Zero Trust
What is Zero TrustOkta-Inc
 
Bitglass Webinar - Top 6 CASB Use Cases
Bitglass Webinar - Top 6 CASB Use CasesBitglass Webinar - Top 6 CASB Use Cases
Bitglass Webinar - Top 6 CASB Use CasesBitglass
 
Mitigating the Top 5 Cloud Security Threats
Mitigating the Top 5 Cloud Security ThreatsMitigating the Top 5 Cloud Security Threats
Mitigating the Top 5 Cloud Security ThreatsBitglass
 
securing the cloud for financial services
securing the cloud for financial servicessecuring the cloud for financial services
securing the cloud for financial servicesBitglass
 
Jervis Hui - No Tradeoffs: Cloud Security & Privacy Don't Need To Be At Odds
Jervis Hui - No Tradeoffs: Cloud Security & Privacy Don't Need To Be At OddsJervis Hui - No Tradeoffs: Cloud Security & Privacy Don't Need To Be At Odds
Jervis Hui - No Tradeoffs: Cloud Security & Privacy Don't Need To Be At Oddscentralohioissa
 
Ken Czekaj & Robert Wright - Leveraging APM NPM Solutions to Compliment Cyber...
Ken Czekaj & Robert Wright - Leveraging APM NPM Solutions to Compliment Cyber...Ken Czekaj & Robert Wright - Leveraging APM NPM Solutions to Compliment Cyber...
Ken Czekaj & Robert Wright - Leveraging APM NPM Solutions to Compliment Cyber...centralohioissa
 
5 Highest-Impact CASB Use Cases
5 Highest-Impact CASB Use Cases5 Highest-Impact CASB Use Cases
5 Highest-Impact CASB Use CasesNetskope
 
BeyondCorp and Zero Trust
BeyondCorp and Zero TrustBeyondCorp and Zero Trust
BeyondCorp and Zero TrustIvan Dwyer
 
Empowering the Cloud Through G Suite
Empowering the Cloud Through G SuiteEmpowering the Cloud Through G Suite
Empowering the Cloud Through G SuiteBitglass
 
Webinar bitglass - complete deck-2
Webinar   bitglass - complete deck-2Webinar   bitglass - complete deck-2
Webinar bitglass - complete deck-2Bitglass
 
Robert Hurlbut - Threat Modeling for Secure Software Design
Robert Hurlbut - Threat Modeling for Secure Software DesignRobert Hurlbut - Threat Modeling for Secure Software Design
Robert Hurlbut - Threat Modeling for Secure Software Designcentralohioissa
 
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...Symantec
 
LoginCat - Zero Trust Integrated Cybersecurity
LoginCat - Zero Trust Integrated CybersecurityLoginCat - Zero Trust Integrated Cybersecurity
LoginCat - Zero Trust Integrated CybersecurityRohit Kapoor
 
Bitglass Webinar - 5 Cloud Security Best Practices for 2018
Bitglass Webinar - 5 Cloud Security Best Practices for 2018Bitglass Webinar - 5 Cloud Security Best Practices for 2018
Bitglass Webinar - 5 Cloud Security Best Practices for 2018Bitglass
 
3 Reasons It's Time for a New Remote Access Model
3 Reasons It's Time for a New Remote Access Model3 Reasons It's Time for a New Remote Access Model
3 Reasons It's Time for a New Remote Access ModelAkamai Technologies
 
Cloud Security for Dummies Webinar — The Identity Edition
Cloud Security for Dummies Webinar — The Identity EditionCloud Security for Dummies Webinar — The Identity Edition
Cloud Security for Dummies Webinar — The Identity EditionNetskope
 
SACON - Devops-container (Richard Bussiere)
SACON - Devops-container (Richard Bussiere)SACON - Devops-container (Richard Bussiere)
SACON - Devops-container (Richard Bussiere)Priyanka Aash
 
WeSecure Data Security Congres: 5 must haves to safe cloud enablement
WeSecure Data Security Congres: 5 must haves to safe cloud enablementWeSecure Data Security Congres: 5 must haves to safe cloud enablement
WeSecure Data Security Congres: 5 must haves to safe cloud enablementWeSecure
 
BeyondCorp Myths: Busted
BeyondCorp Myths: BustedBeyondCorp Myths: Busted
BeyondCorp Myths: BustedIvan Dwyer
 

What's hot (20)

What is Zero Trust
What is Zero TrustWhat is Zero Trust
What is Zero Trust
 
Bitglass Webinar - Top 6 CASB Use Cases
Bitglass Webinar - Top 6 CASB Use CasesBitglass Webinar - Top 6 CASB Use Cases
Bitglass Webinar - Top 6 CASB Use Cases
 
Mitigating the Top 5 Cloud Security Threats
Mitigating the Top 5 Cloud Security ThreatsMitigating the Top 5 Cloud Security Threats
Mitigating the Top 5 Cloud Security Threats
 
securing the cloud for financial services
securing the cloud for financial servicessecuring the cloud for financial services
securing the cloud for financial services
 
Jervis Hui - No Tradeoffs: Cloud Security & Privacy Don't Need To Be At Odds
Jervis Hui - No Tradeoffs: Cloud Security & Privacy Don't Need To Be At OddsJervis Hui - No Tradeoffs: Cloud Security & Privacy Don't Need To Be At Odds
Jervis Hui - No Tradeoffs: Cloud Security & Privacy Don't Need To Be At Odds
 
Ken Czekaj & Robert Wright - Leveraging APM NPM Solutions to Compliment Cyber...
Ken Czekaj & Robert Wright - Leveraging APM NPM Solutions to Compliment Cyber...Ken Czekaj & Robert Wright - Leveraging APM NPM Solutions to Compliment Cyber...
Ken Czekaj & Robert Wright - Leveraging APM NPM Solutions to Compliment Cyber...
 
5 Highest-Impact CASB Use Cases
5 Highest-Impact CASB Use Cases5 Highest-Impact CASB Use Cases
5 Highest-Impact CASB Use Cases
 
BeyondCorp and Zero Trust
BeyondCorp and Zero TrustBeyondCorp and Zero Trust
BeyondCorp and Zero Trust
 
Empowering the Cloud Through G Suite
Empowering the Cloud Through G SuiteEmpowering the Cloud Through G Suite
Empowering the Cloud Through G Suite
 
Webinar bitglass - complete deck-2
Webinar   bitglass - complete deck-2Webinar   bitglass - complete deck-2
Webinar bitglass - complete deck-2
 
Robert Hurlbut - Threat Modeling for Secure Software Design
Robert Hurlbut - Threat Modeling for Secure Software DesignRobert Hurlbut - Threat Modeling for Secure Software Design
Robert Hurlbut - Threat Modeling for Secure Software Design
 
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
 
LoginCat - Zero Trust Integrated Cybersecurity
LoginCat - Zero Trust Integrated CybersecurityLoginCat - Zero Trust Integrated Cybersecurity
LoginCat - Zero Trust Integrated Cybersecurity
 
Bitglass Webinar - 5 Cloud Security Best Practices for 2018
Bitglass Webinar - 5 Cloud Security Best Practices for 2018Bitglass Webinar - 5 Cloud Security Best Practices for 2018
Bitglass Webinar - 5 Cloud Security Best Practices for 2018
 
3 Reasons It's Time for a New Remote Access Model
3 Reasons It's Time for a New Remote Access Model3 Reasons It's Time for a New Remote Access Model
3 Reasons It's Time for a New Remote Access Model
 
Cloud Security for Dummies Webinar — The Identity Edition
Cloud Security for Dummies Webinar — The Identity EditionCloud Security for Dummies Webinar — The Identity Edition
Cloud Security for Dummies Webinar — The Identity Edition
 
SACON - Devops-container (Richard Bussiere)
SACON - Devops-container (Richard Bussiere)SACON - Devops-container (Richard Bussiere)
SACON - Devops-container (Richard Bussiere)
 
Forrester zero trust_dna
 Forrester zero trust_dna Forrester zero trust_dna
Forrester zero trust_dna
 
WeSecure Data Security Congres: 5 must haves to safe cloud enablement
WeSecure Data Security Congres: 5 must haves to safe cloud enablementWeSecure Data Security Congres: 5 must haves to safe cloud enablement
WeSecure Data Security Congres: 5 must haves to safe cloud enablement
 
BeyondCorp Myths: Busted
BeyondCorp Myths: BustedBeyondCorp Myths: Busted
BeyondCorp Myths: Busted
 

Similar to Data protection on demand in hybrid it

Worry free security breach - Gemalto
Worry free security breach - GemaltoWorry free security breach - Gemalto
Worry free security breach - GemaltoHarry Gunns
 
Data_Security_Guide_Everything_You_Need_to_Know.pdf
Data_Security_Guide_Everything_You_Need_to_Know.pdfData_Security_Guide_Everything_You_Need_to_Know.pdf
Data_Security_Guide_Everything_You_Need_to_Know.pdfMehdi Ahmadi
 
Symantec Webinar Part 2 of 6 GDPR Compliance
Symantec Webinar Part 2 of 6 GDPR ComplianceSymantec Webinar Part 2 of 6 GDPR Compliance
Symantec Webinar Part 2 of 6 GDPR ComplianceSymantec
 
Ciso round table on effective implementation of dlp & data security
Ciso round table on effective implementation of dlp & data securityCiso round table on effective implementation of dlp & data security
Ciso round table on effective implementation of dlp & data securityPriyanka Aash
 
Reimagine Your Claims Process with Future-Proof Technologies
Reimagine Your Claims Process with Future-Proof TechnologiesReimagine Your Claims Process with Future-Proof Technologies
Reimagine Your Claims Process with Future-Proof TechnologiesNuxeo
 
Protect your confidential information while improving services
Protect your confidential information while improving servicesProtect your confidential information while improving services
Protect your confidential information while improving servicesCloudMask inc.
 
trellix-dlp-buyers-guide.pdf
trellix-dlp-buyers-guide.pdftrellix-dlp-buyers-guide.pdf
trellix-dlp-buyers-guide.pdfLaLaBlaGhvgT
 
Transforming Insurance Analytics with Big Data and Automated Machine Learning

Transforming Insurance Analytics with Big Data and Automated Machine Learning
Transforming Insurance Analytics with Big Data and Automated Machine Learning

Transforming Insurance Analytics with Big Data and Automated Machine Learning
Cloudera, Inc.
 
Big Data LDN 2017: Applied AI for GDPR
Big Data LDN 2017: Applied AI for GDPRBig Data LDN 2017: Applied AI for GDPR
Big Data LDN 2017: Applied AI for GDPRMatt Stubbs
 
CWIN17 New-York / earning the currency of trust
CWIN17 New-York / earning the currency of trustCWIN17 New-York / earning the currency of trust
CWIN17 New-York / earning the currency of trustCapgemini
 
Symantec Webinar Part 1 of 6 The Four Stages of GDPR Readiness
Symantec Webinar Part 1 of 6 The Four Stages of GDPR ReadinessSymantec Webinar Part 1 of 6 The Four Stages of GDPR Readiness
Symantec Webinar Part 1 of 6 The Four Stages of GDPR ReadinessSymantec
 
Webinar: How to Design Primary Storage for GDPR
Webinar: How to Design Primary Storage for GDPRWebinar: How to Design Primary Storage for GDPR
Webinar: How to Design Primary Storage for GDPRStorage Switzerland
 
Big Data Monetisation
Big Data MonetisationBig Data Monetisation
Big Data MonetisationPSD Group Ltd
 
Webinar : Desperately Seeking Transformation - Part 1: Why data will make or ...
Webinar : Desperately Seeking Transformation - Part 1: Why data will make or ...Webinar : Desperately Seeking Transformation - Part 1: Why data will make or ...
Webinar : Desperately Seeking Transformation - Part 1: Why data will make or ...The Digital Insurer
 
Life After Compliance march 2010 v2
Life After Compliance march 2010 v2Life After Compliance march 2010 v2
Life After Compliance march 2010 v2SafeNet
 
How Insurers Fueled Transformation During a Pandemic
How Insurers Fueled Transformation During a PandemicHow Insurers Fueled Transformation During a Pandemic
How Insurers Fueled Transformation During a PandemicNuxeo
 

Similar to Data protection on demand in hybrid it (20)

Worry free security breach - Gemalto
Worry free security breach - GemaltoWorry free security breach - Gemalto
Worry free security breach - Gemalto
 
Data_Security_Guide_Everything_You_Need_to_Know.pdf
Data_Security_Guide_Everything_You_Need_to_Know.pdfData_Security_Guide_Everything_You_Need_to_Know.pdf
Data_Security_Guide_Everything_You_Need_to_Know.pdf
 
Symantec Webinar Part 2 of 6 GDPR Compliance
Symantec Webinar Part 2 of 6 GDPR ComplianceSymantec Webinar Part 2 of 6 GDPR Compliance
Symantec Webinar Part 2 of 6 GDPR Compliance
 
295256_Security_Problem_Whitepaper.Web
295256_Security_Problem_Whitepaper.Web295256_Security_Problem_Whitepaper.Web
295256_Security_Problem_Whitepaper.Web
 
Ciso round table on effective implementation of dlp & data security
Ciso round table on effective implementation of dlp & data securityCiso round table on effective implementation of dlp & data security
Ciso round table on effective implementation of dlp & data security
 
Reimagine Your Claims Process with Future-Proof Technologies
Reimagine Your Claims Process with Future-Proof TechnologiesReimagine Your Claims Process with Future-Proof Technologies
Reimagine Your Claims Process with Future-Proof Technologies
 
Protect your confidential information while improving services
Protect your confidential information while improving servicesProtect your confidential information while improving services
Protect your confidential information while improving services
 
trellix-dlp-buyers-guide.pdf
trellix-dlp-buyers-guide.pdftrellix-dlp-buyers-guide.pdf
trellix-dlp-buyers-guide.pdf
 
Transforming Insurance Analytics with Big Data and Automated Machine Learning

Transforming Insurance Analytics with Big Data and Automated Machine Learning
Transforming Insurance Analytics with Big Data and Automated Machine Learning

Transforming Insurance Analytics with Big Data and Automated Machine Learning

 
Big Data LDN 2017: Applied AI for GDPR
Big Data LDN 2017: Applied AI for GDPRBig Data LDN 2017: Applied AI for GDPR
Big Data LDN 2017: Applied AI for GDPR
 
CWIN17 New-York / earning the currency of trust
CWIN17 New-York / earning the currency of trustCWIN17 New-York / earning the currency of trust
CWIN17 New-York / earning the currency of trust
 
Symantec Webinar Part 1 of 6 The Four Stages of GDPR Readiness
Symantec Webinar Part 1 of 6 The Four Stages of GDPR ReadinessSymantec Webinar Part 1 of 6 The Four Stages of GDPR Readiness
Symantec Webinar Part 1 of 6 The Four Stages of GDPR Readiness
 
Value Stories - 3rd issue - April 2019
Value Stories - 3rd issue - April 2019Value Stories - 3rd issue - April 2019
Value Stories - 3rd issue - April 2019
 
Azure Security.pdf
Azure Security.pdfAzure Security.pdf
Azure Security.pdf
 
Azure security
Azure securityAzure security
Azure security
 
Webinar: How to Design Primary Storage for GDPR
Webinar: How to Design Primary Storage for GDPRWebinar: How to Design Primary Storage for GDPR
Webinar: How to Design Primary Storage for GDPR
 
Big Data Monetisation
Big Data MonetisationBig Data Monetisation
Big Data Monetisation
 
Webinar : Desperately Seeking Transformation - Part 1: Why data will make or ...
Webinar : Desperately Seeking Transformation - Part 1: Why data will make or ...Webinar : Desperately Seeking Transformation - Part 1: Why data will make or ...
Webinar : Desperately Seeking Transformation - Part 1: Why data will make or ...
 
Life After Compliance march 2010 v2
Life After Compliance march 2010 v2Life After Compliance march 2010 v2
Life After Compliance march 2010 v2
 
How Insurers Fueled Transformation During a Pandemic
How Insurers Fueled Transformation During a PandemicHow Insurers Fueled Transformation During a Pandemic
How Insurers Fueled Transformation During a Pandemic
 

Recently uploaded

Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetEnjoy Anytime
 

Recently uploaded (20)

Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
 

Data protection on demand in hybrid it

  • 1. What is Hybrid IT ? The Security Heretic ….The Case For Change In The Data Protection Market Gary Marsden, Senior Director, Data Protection Services December 2017
  • 2. Are traditional methods and beliefs hindering the advancement of our industry? “If I'd asked customers what they wanted, they would have said "a faster horse” (Henry Ford) ……so, you have to ask the question to think outside of the box Are traditional methods and beliefs hindering the advancement of our industry? Hey, I just proved that you can simplify Data Protection Retract your findings immediately we cant have customers finding out!!! Only DEVILS think they can improve the world so others can understand it Do it for the good of the industry you beast!!
  • 3. The Security Market Needs to Change “No one wakes up in the morning wanting to buy a HSM” “Don’t even think of selling me ‘just one more product’.” “Make it so my 5 year old can use it, and I only want to pay for what I use. Period.” “Encryption is a religion Marsden, and you are a heretic”
  • 4. How Security SHOULD Feel to Enterprise Users and IT Administrators…. ….secured with the push of a button
  • 5. Example: The Cloud Has Reset IT Expectations “I deployed my application in five minutes.” Rapid Time to Market “No more time spent on low-level infrastructure management.” One-Click Simplicity “I use and pay for just what I need only when I need it.” Fractional IT Consumption “New capabilities are available on a regular basis.” Continuous Innovation
  • 6. Too many clouds, can make things a bit foggy….. 0% 5% 10% 15% 20% 25% 30% 35% 40% 45% 50% One to three Four to Eight Nine to Twelve Number of clouds within an organization Number of Clouds 06.12.17Title6 Source: Gemalto – Sept 2017
  • 7. Example: The Extent of The Problem 7 Total Germany 0% 9% 2% 1% 5% 0% 2% 13% 13% 3% 16% 31% 4% 15% 18% 5-10% 31% 27% *More than 10% (please specify) 8% 2% Don’t know 4% 7% Average percentage of breached data that was protected by encryption 8.36% 4.52% Thinking about your organisation’s most recent breach, what percentage of the breached data was protected by encryption? Source: Gemalto – July 2017 Click to download
  • 8. GOAL: All data is secured Multiple borders and data silo’s Too many solutions, high management overhead Individual SaaS providers become Crypto custodians Lost of portability and control Struggle to define a unified security policy Investment is prohibitive ……. which makes compliance TOUGH!! The Challenge: Compliance in a Cloudy World
  • 9. Example: The Complex Path To Compliance and CIAAA How do I ensure that only I have access to my data forever How do I ensure that I set and manage the policies for my encrypted data How do I control my keys across such disparate environments? How do I secure my keys without adding cost and complexity Reminder: Confidentiality, Integrity, Availability, Auditability, Accountability
  • 10. And What About The Future…… More Complexity? 10 LDAP IDaaS Data Protection IoT PaaS IAM Encrypt PKI SAML HSM Block- Chain 2FA Biz Process IaaS Oracle SAP API SaaS SFDC KMIP Usage Billing Micro Services Challenge: Adopting New Models to Keep Pace
  • 11. Example: The Changing Audience Partner/SP Prod Mgr Partner/SP CIO/ CISO IT /Sec Dir Distributor or Service Provider Tenant Responsible for delivering solutions that secure all data in-line with company policies and industry standards Owns Budget Economical Buyer App Owner (Use Cases) Tenant Admin Users Defines or Confirms requirements Responsible for applications which need to be secured. Meets data security requirements, manages application lifecycles, increasingly Dev Ops Application Owner Technical Buyer Wants help doing their job Enterprise Customer/ Consumer Customer ServiceMgr. Responsible for the corporate system of record which contains personal identifiable information. Multiple roles across different disciplines with the organization Functional Buyer ITSecurity Director
  • 12. Example: Good Security Takes Too Long to Build 12 Monday Tuesday Wednesday Thursday Friday X Purchase Delivery Understand X Configure Deploy X Test Use Manage Support Upgrade X Design Select Plan
  • 13. Situation: Data Protection Needs Today and Tomorrow Affordability Move to OPEX base cloud models Investment Leverage Pay-as- you-Go Complexity Reduce need for specialist knowledge Scalability Grow as you need Simplicity Easy to deploy Manageability Everything from one central point TCO Minimize overheads and resource utilization £ € $ Challenge: Changing Our Approach to Achieve These Goals
  • 14. Business ProtectionBusiness Productivity A New Model For Data Protection Point, Click, Deploy
  • 15. Example: Key Broker …. 5 Steps to Securing Cloud Data - A Heretic’s Dream CUSTOMERS Trusted 3rd Party BYOK Cloud Providers with native encryption:- SAP HANA GOOGLE AWS WORKDAY 1 Subscribe 2 Authenticate 3 Enter Parameters 4 Access Protected Data Generate and Provision Keys Key Management & Audit5 Manage Key Lifecycles
  • 16. In Summary…….. No one wakes up in the morning wanting encryption – New compliance regulations and increasing number of data breaches are driving need Traditional security approaches no longer map to the market needs – Instant and on demand service (not product) and “pay per Use” is the new norm A refreshed approach to security that provides CIAA for a new set of data and applications owners – users want a “Click to Encrypt” model Active data protection is on horizon – encryption becomes a natural part of the distributed neural network that will be the IT landscape of the future. Efficient, easy-to-use, transparent Need to trust someone– Staggering shift to higher order services is putting trust in service providers and 3rd party software based applications
  • 17. Similar Gemalto Discussions How Cryptocurrencies are Changing the Face of Financial Services 451 Research & Gemalto Present "Alphabet Soup: Deciphering Multi-Cloud Security” The Blockchain Bubble: Identifying viable opportunities for blockchain 06.12.17Title17