LIVE WEBINAR Data Protection:  Safeguarding your business today & tomorrow   Wednesday, November 25, 2009 12:30 PM - 1:30 PM (AEDST), Sydney Australia Conference Number: Australia: 1800 098 754 New Zealand: 0800 447 860 Your conference ID #: 42727822
Current issues in information security, and the value of data James Turner Advisor
Presentation outline About IBRS Analysis of current issues Data Loss Prevention Mobility of workers The cloud What is the common thread? “ Colour Beginning” J.(M.W.) Turner
Our advisors IBRS is an Australian company providing timely advice,  insightful judgement, and thorough research  to benefit IT and business managers in Australasian organisations. Dr Kevin McIsaac Terry Dargan Dr Colin Boswell Joseph Sweeney James Turner Alan Hansell Rob Mackinnon Guy Cranswick Irene Pimentel Brian Bowman Jorn Bettin Peter Hind
We’re focussing on: Confidentiality Defend Availability Recover The CIA triad Confidentiality Integrity Availability Your sensitive data needs all 3 attributes
Data Loss Prevention Mobility of workers The cloud The issues and trends
Licensing – complex  (immature) More  resources False alerts and  genuine alerts Can be useful for audit Really poorly named! Data Loss Prevention "The scream" Edvard Munch Business cases based on fear  of public disclosure
Lots of people, using lots of devices, to do lots of stuff, to lots of data,  on lots of systems Complexity is driven  by diversity (multiformity) Complexity is not your friend Mobility of workers Virtualisation is the market response  to rampant multiformity The PED trilemma Source: " Portable electronic devices ( PEDs ): a frog close to the boil ", IBRS, February 2008
The cloud The Cloud
Adoption: Yes No Maybe It depends Resilience, and the location of the data The cloud Big migrations will make the news,  because they are the exceptions "Clouds" John Constable
The value of the data These 3 threads all have  the data  as their core issue. Clearly  the data  is paramount! Data Loss Prevention Endpoint encryption  E.g. Client USB key lost on main street Mobility of employees and data Availability of data to roaming employees Resilience/Availability E.g. Flooded computer room from faulty aircon
Incident response lifecycle Mitigate risks Backup  important data Restore Life is too short to only learn from  your own mistakes
Current issues in information security, and the value of data James Turner Advisor
Andrew Fry Business Unit Executive Business Continuity & Resiliency Services, IBM Global Technology Services
Data Security Services – Endpoint Data Protection PGP Corporation Encryption Software and Support Benefits Help protect business data in transit and at rest—even beyond the enterprise network Designed to protect sensitive data on endpoint devices—including laptops, hand-helds, and removable storage devices—against unauthorised exposure Reduces the need for in-house security experts with IBM 24x7x365 support and professional services What does PGP Encryption do? Full disk encryption to protect data even when a device is lost or stolen Selective file or folder encryption to protect data during use Control over and protection of data on removable storage devices Identification of sensitive data and monitoring of usage Policy engine to enforce corporate policies on endpoint devices
PGP Encryption – Example Company:  A mining and exploration company operating in a highly competitive and volatile market. Problem: Suffered from leakage of sensitive corporate data as a result of stolen employee’s laptop. Solution: Security specialists from IBM ISS implemented a  PGP® Whole Disk Encryption solution to  protect sensitive corporate data on desktops, laptops and removable media. Benefits:   1)   Peace of mind that sensitive data is constantly protected from unauthorised access,    providing strong security for intellectual property and reduced competitive risk   2)  Data is protected without changing the user experience   3)  Reduced operational costs by centrally automating encryption policies
Data Backup and Restoration services Cloud delivered, fully managed service Disk, tape and virtual tape-based backup and recovery for  data centres, and remote sites Protect the core:  Onsite and Remote data protection Scalable on-demand services architecture Disk-based backup and recovery for  Desktops and laptops Protect the edge:  Fastprotect Online Managed service  including scalable hardware, software, monitoring, management and reporting  Near 100% backup success rate in 24hr period Usage based, monthly fee (pay as you go)
A managed service that automatically protects business critical data servers Remote Data Protection  Automatic, reliable protection for your critical data that can be restored virtually anywhere, anytime
Fully Managed backup service Internet / Private network Customer network Virtual Server Recovery A Better way to recover data  and  server infrastructure Combine Data backup via cloud, and virtualised disaster recovery servers IBM Recovery Centre
Server and Data recovery - Example Company: Financial services firm, servicing mid-size organisations in Australia Problem: Business demanded faster recovery times and assurance that data was being  protected every day across distributed sites, and all within existing budget. Solution: Implemented  IBM Remote Data Protection  to backup critical server data to secure  IBM facility, on a pay-as-you-go service. IBM coupled the backup service with  IBM  Virtual Server recovery  to provide complete offsite server and data recovery  solution, for a shared price point.  Benefits: 1)  Client achieved vastly improved recovery times, without needing to invest in  expensive dedicated infrastructure 2)  Daily reports confirming critical data is securely backed up 3)  Storage capacity scales up/down based on usage (opex model)
Data Protection Services Avoid data loss or leakage, and have a plan for recovery Mitigate risks Backup  important data Restore
THANK YOU

Data Protection Presentation

  • 1.
    LIVE WEBINAR DataProtection: Safeguarding your business today & tomorrow Wednesday, November 25, 2009 12:30 PM - 1:30 PM (AEDST), Sydney Australia Conference Number: Australia: 1800 098 754 New Zealand: 0800 447 860 Your conference ID #: 42727822
  • 2.
    Current issues ininformation security, and the value of data James Turner Advisor
  • 3.
    Presentation outline AboutIBRS Analysis of current issues Data Loss Prevention Mobility of workers The cloud What is the common thread? “ Colour Beginning” J.(M.W.) Turner
  • 4.
    Our advisors IBRSis an Australian company providing timely advice, insightful judgement, and thorough research to benefit IT and business managers in Australasian organisations. Dr Kevin McIsaac Terry Dargan Dr Colin Boswell Joseph Sweeney James Turner Alan Hansell Rob Mackinnon Guy Cranswick Irene Pimentel Brian Bowman Jorn Bettin Peter Hind
  • 5.
    We’re focussing on:Confidentiality Defend Availability Recover The CIA triad Confidentiality Integrity Availability Your sensitive data needs all 3 attributes
  • 6.
    Data Loss PreventionMobility of workers The cloud The issues and trends
  • 7.
    Licensing – complex (immature) More resources False alerts and genuine alerts Can be useful for audit Really poorly named! Data Loss Prevention "The scream" Edvard Munch Business cases based on fear of public disclosure
  • 8.
    Lots of people,using lots of devices, to do lots of stuff, to lots of data, on lots of systems Complexity is driven by diversity (multiformity) Complexity is not your friend Mobility of workers Virtualisation is the market response to rampant multiformity The PED trilemma Source: " Portable electronic devices ( PEDs ): a frog close to the boil ", IBRS, February 2008
  • 9.
  • 10.
    Adoption: Yes NoMaybe It depends Resilience, and the location of the data The cloud Big migrations will make the news, because they are the exceptions "Clouds" John Constable
  • 11.
    The value ofthe data These 3 threads all have the data as their core issue. Clearly the data is paramount! Data Loss Prevention Endpoint encryption E.g. Client USB key lost on main street Mobility of employees and data Availability of data to roaming employees Resilience/Availability E.g. Flooded computer room from faulty aircon
  • 12.
    Incident response lifecycleMitigate risks Backup important data Restore Life is too short to only learn from your own mistakes
  • 13.
    Current issues ininformation security, and the value of data James Turner Advisor
  • 14.
    Andrew Fry BusinessUnit Executive Business Continuity & Resiliency Services, IBM Global Technology Services
  • 15.
    Data Security Services– Endpoint Data Protection PGP Corporation Encryption Software and Support Benefits Help protect business data in transit and at rest—even beyond the enterprise network Designed to protect sensitive data on endpoint devices—including laptops, hand-helds, and removable storage devices—against unauthorised exposure Reduces the need for in-house security experts with IBM 24x7x365 support and professional services What does PGP Encryption do? Full disk encryption to protect data even when a device is lost or stolen Selective file or folder encryption to protect data during use Control over and protection of data on removable storage devices Identification of sensitive data and monitoring of usage Policy engine to enforce corporate policies on endpoint devices
  • 16.
    PGP Encryption –Example Company: A mining and exploration company operating in a highly competitive and volatile market. Problem: Suffered from leakage of sensitive corporate data as a result of stolen employee’s laptop. Solution: Security specialists from IBM ISS implemented a PGP® Whole Disk Encryption solution to protect sensitive corporate data on desktops, laptops and removable media. Benefits: 1) Peace of mind that sensitive data is constantly protected from unauthorised access, providing strong security for intellectual property and reduced competitive risk 2) Data is protected without changing the user experience 3) Reduced operational costs by centrally automating encryption policies
  • 17.
    Data Backup andRestoration services Cloud delivered, fully managed service Disk, tape and virtual tape-based backup and recovery for data centres, and remote sites Protect the core: Onsite and Remote data protection Scalable on-demand services architecture Disk-based backup and recovery for Desktops and laptops Protect the edge: Fastprotect Online Managed service including scalable hardware, software, monitoring, management and reporting Near 100% backup success rate in 24hr period Usage based, monthly fee (pay as you go)
  • 18.
    A managed servicethat automatically protects business critical data servers Remote Data Protection Automatic, reliable protection for your critical data that can be restored virtually anywhere, anytime
  • 19.
    Fully Managed backupservice Internet / Private network Customer network Virtual Server Recovery A Better way to recover data and server infrastructure Combine Data backup via cloud, and virtualised disaster recovery servers IBM Recovery Centre
  • 20.
    Server and Datarecovery - Example Company: Financial services firm, servicing mid-size organisations in Australia Problem: Business demanded faster recovery times and assurance that data was being protected every day across distributed sites, and all within existing budget. Solution: Implemented IBM Remote Data Protection to backup critical server data to secure IBM facility, on a pay-as-you-go service. IBM coupled the backup service with IBM Virtual Server recovery to provide complete offsite server and data recovery solution, for a shared price point. Benefits: 1) Client achieved vastly improved recovery times, without needing to invest in expensive dedicated infrastructure 2) Daily reports confirming critical data is securely backed up 3) Storage capacity scales up/down based on usage (opex model)
  • 21.
    Data Protection ServicesAvoid data loss or leakage, and have a plan for recovery Mitigate risks Backup important data Restore
  • 22.

Editor's Notes

  • #10 No, not this cloud
  • #12 Law of very large numbers – given the number of computer rooms and servers around the place; it’s likely that something will go wrong somewhere.
  • #16 Price? Subscription? OTC? Rollout?