Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

Achieving Data Privacy in the Enterprise

924 views

Published on

  • Be the first to comment

  • Be the first to like this

Achieving Data Privacy in the Enterprise

  1. 1. Achieving Data Privacy in the Enterprise SafeNet Derek Tumulak, VP Product Management REV 0.1
  2. 2. SafeNet Data Protection Protecting the Information Lifecycle REV 0.1 From idea to action, SafeNet smartly protects information as it moves through its lifecycle.
  3. 3. <ul><li>Founded: 1983 </li></ul><ul><li>Ownership: Private </li></ul><ul><li>Global Footprint with more than 25,000 customers in 100 countries </li></ul><ul><li>Employees: 1,600 in 25 countries </li></ul><ul><li>Recognized Security technology leadership, over 600 encryption engineers strong </li></ul><ul><li>Accredited with products certified to the highest security standards </li></ul>The largest company exclusively focused on the protection of high-value information assets. SafeNet Fact Sheet
  4. 4. Online Fraud is on the Rise Source: Anti-Phishing Working Group, March 2009 The number of crimeware‐spreading sites infecting PCs with password‐stealing crimeware reached an all time high of 31,173 in December, an 827 percent increase from January of 2008. Phishing: $3.2 Billion lost in 2007 in the US alone Gartner Dec. 2007
  5. 5. What Are the Threats? Source: Ponemon Institute, 2009
  6. 6. The New IT Security Realities <ul><li>Traditional Enterprise Boundaries Evolve </li></ul><ul><li>Cyber Security </li></ul>REV 0.1 <ul><li>Insider Threats </li></ul><ul><li>Compliance and Regulations </li></ul><ul><li>Information and Identity Protection—A Key Business Enabler </li></ul>
  7. 7. Where Is Sensitive Data? Inside the Network Partners’ & Interagency networks Consultant / Contractor Networks Outside the network (cloud / SaaS) <ul><ul><li>Databases </li></ul></ul>Laptops Desktops Mobile Devices Removable Drives <ul><ul><li>CDs/DVDs </li></ul></ul><ul><ul><li>File Servers </li></ul></ul><ul><ul><li>NAS/SAN Devices </li></ul></ul><ul><ul><li>Log Files </li></ul></ul><ul><ul><li>Excel Spreadsheets </li></ul></ul><ul><ul><li>PDFs </li></ul></ul><ul><ul><li>Word Docs </li></ul></ul><ul><ul><li>Image Files </li></ul></ul><ul><ul><li>PowerPoint Presentations </li></ul></ul><ul><ul><li>Email Text </li></ul></ul><ul><ul><li>Email Attachments </li></ul></ul><ul><ul><li>Instant Messages </li></ul></ul>
  8. 8. Where Is Sensitive Data? EVERYWHERE! Inside the Network Partners’ & Interagency networks Consultant / Contractor Networks Outside the network (cloud / SaaS) <ul><ul><li>Databases </li></ul></ul>Laptops Desktops Mobile Devices Removable Drives <ul><ul><li>CDs/DVDs </li></ul></ul><ul><ul><li>File Servers </li></ul></ul><ul><ul><li>NAS/SAN Devices </li></ul></ul><ul><ul><li>Log Files </li></ul></ul><ul><ul><li>Excel Spreadsheets </li></ul></ul><ul><ul><li>PDFs </li></ul></ul><ul><ul><li>Word Docs </li></ul></ul><ul><ul><li>Image Files </li></ul></ul><ul><ul><li>PowerPoint Presentations </li></ul></ul><ul><ul><li>Email Text </li></ul></ul><ul><ul><li>Email Attachments </li></ul></ul><ul><ul><li>Instant Messages </li></ul></ul>
  9. 9. Worldwide Compliance REV 0.1 Electronic Ledger Storage Law (Japan) 11MEDIS-DC (Japan) Canadian Electronic Evidence Act PCI Data Security Standard (WW) CA SB1386 et al FDA 21 CFR Part 11 Sarbanes-Oxley Act (USA) AIPA (Italy) GDPdU and GoBS (Germany) EU Data Protection Directive UK Data Protection Act NF Z 42-013 (France) Financial Services Authority (UK) Basel II Capital Accord GLB Act Japan PIP Act PCI (WW) Note: International companies must adhere to regulations in each country of operation HIPAA (USA)
  10. 10. Compliance Hype Cycle REV 0.1
  11. 11. What Is It Costing? Source: Ponemon Institute, 2009 47%
  12. 12. Approaches to Achieving Data Privacy <ul><li>Persistently protect access to data where it rests, as it moves through the network, and after it has left the network </li></ul><ul><li>Intelligently secure critical points of the information lifecycle using a platform approach that includes standards-based key management and centralized policy </li></ul><ul><li>Combine commercial agility with government grade security solutions </li></ul><ul><li>Extensible to evolve to support changing cloud delivery models—from today’s SaaS and private clouds, to the evolving demands of hybrid and public clouds. </li></ul>
  13. 13. Data Ownership and Control Requires a Holistic Data Privacy Strategy REV 0.1
  14. 14. As Threats Change Approaches Must Change Data Privacy Approaches Traditional Approaches <ul><li>Perimeter focused security </li></ul><ul><li>All-or-nothing encryption </li></ul><ul><li>Keep bad guys out, authorized users get full access </li></ul><ul><li>Multiple products to meet business and security needs </li></ul><ul><li>High level or very specific policy only, </li></ul><ul><li>No proper central policy management </li></ul><ul><li>Data-centric protection—intelligence to protect the data itself throughout its lifecycle </li></ul><ul><li>Granular, selective protection over subset of unstructured or structured data (files, fields, and columns) </li></ul><ul><li>Granular data protection for authorized users, assure compartmentalization </li></ul><ul><li>Centrally managed solution that addresses business, compliance, data governance & security </li></ul><ul><li>Centralized policy and key management providing data use tracking and control </li></ul>
  15. 15. Six Best Practices in Data Privacy
  16. 16. Five Core Technology Components of Data Privacy
  17. 17. SafeNet Data Protection SafeNet persistently protects information throughout its lifecycle, empowering customers to efficiently adapt to change and act on opportunity.
  18. 18. SafeNet Data Protection Portfolio <ul><li>Offering the broadest range of authenticators, from smart cards and tokens to mobile phone auth—all managed from a single platform </li></ul><ul><li>The industry’s only unified authentication platform offering customers the freedom to adapt to changing environments </li></ul><ul><li>The market leader in certificate-based token authentication </li></ul><ul><li>Unique technology offerings with client-less tokens, high-assurance solutions, and more </li></ul><ul><li>SafeNet high-speed network encryptors combine the highest performance with the easiest integration and management. </li></ul><ul><li>Solutions for Ethernet, SONET up to 10Gb </li></ul><ul><li>Best-in-class Security Management Center </li></ul><ul><li>Zero bandwidth loss, low- latency encryption </li></ul><ul><li>Unparalleled leverage across classified and COTS communication protection (FIPS 140-2 Level 3) </li></ul><ul><li>The fastest, most secure, and easiest to integrate application & transaction security solution for enterprise and government </li></ul><ul><li>Market leader in enterprise-grade HSMs </li></ul><ul><li>Industry innovator in payment HSMs </li></ul><ul><li>Widest portfolio of platforms and solutions </li></ul><ul><li>Delivered over 75,000 HSMs— the most in the industry </li></ul><ul><li>Only leading HSM with the option of keys ALWAYS in Hardware </li></ul><ul><li>World’s first and only unified platform that delivers intelligent data protection and control for ALL information assets </li></ul><ul><li>Data-centric, persistent protection across data centers, endpoints, and into the cloud </li></ul><ul><li>Centralized policy, key management, logging, and auditing </li></ul><ul><li>Integrated perimeter data leakage prevention </li></ul><ul><li>Appliance-based, proven scalability, and high performance </li></ul>Identity Protection - Authentication Communication Protection - High-Speed Network Encryption Transaction and Identity Protection - HSM Data Encryption and Control - DataSecure
  19. 19. Persistent Information Lifecycle Protection REV 0.1 <ul><li>Secure, Centralized Key Management </li></ul><ul><li>Data-centric Policy Management </li></ul><ul><li>Identity & Access Management </li></ul><ul><li>Visibility via Logging, Auditing, Reporting </li></ul>
  20. 20. <ul><li>Questions? </li></ul>

×