RSA Solutions Overview Security Solutions for Business Accelleration Ivan Svoboda Key Account Manager RSA Security ivan.svoboda@rsa.com RSA Protection in Action 134,000+ Billion+ 200 150,000+ Million+ 25+ Applications shipped with BSAFE® Encryption Year Phishing legacy Organizations Identities attacks in information protected shut protected down security 25+ 34,000+ 150,000+ 250 Million+ 1 Billion+ year legacy in information security and risk management organizations protected by RSA technology online phishing attacks shut down by the RSA Anti-Fraud Command Center online identities protected with RSA identification and protection technology applications shipped with RSA BSAFE® encryption most widely deployed software in the world* *Embedded in Microsoft, HP, Sun and IBM operating systems, Internet Explorer and Netscape browsers, Ericsson, Nokia, Motorola phones, major US government agencies and the list goes on RSA: Award Winning Company Frost and Sullivan – Competitive Landscape OTP Authentication(December 2008) Leadership Beyond Authentication “RSA is vastly more than user authentication; it is a key portion of how companies, particularly in the financial industry, protect critical records and comply with critical regulations.” -- “EMC Addresses the 2009 ‘OMG’ Budget”, ITBusiness Edge, Rob Enderle, Enderle Group, Dec. 9, 2008 Data Loss Prevention MQ June 2008 Web Fraud Detection MQ Dec. 2008 SIEM MQ May 2008 RSA – The Big Picture Encryption Store, Transport IT infrastructure Access Authentication, Authorization DLP information SIEM Security Information and Event Management Data Loss Prevention RSA – The Big Picture – Product Lines RSA Encryption and Key Management Suite RSA Access Manager RSA Federated Identity Manager IT infrastructure RSA SecurID RSA Digital Certificate Solutions information RSA Identity Protection and Verification Suite RSA enVision Platform RSA Data Loss Prevention Suite Encryption Store, Transport Encryption RSA Key Manager RSA BSAFE information RSA Key Manager Enterprise-Wide Key Management Apps/DB FS/CMS RSA Key Manager (RKM) Policy-based Interface 1. Generate Keys 2. Securely Distribute Keys 3. Vault Keys 4. Expire / Turnover Keys 5. Monitor + Audit 13 Storage RSA Key Manager Enterprise-Wide Key Management RKM Server RSA Key Manager with Application Encryption RSA Key Manager for the Datacenter Application Encryption Client Integration modules EMC & 3rd party encryption Sensitive data encrypted within applications at point of capture Application Encryption ClientsComprehensive platform and language support C, Java, .NET, Cobol, CICS Linux, Mainframe, Unix, Windows 14 Integrates with host, SAN switch, and native tape encryption solutions from RSA, EMC, and third parties Current integrations include File Security Manager, PowerPath, Connectrix/Cisco, Oracle and Native Tape Access Authentication, Authorization information Access RSA Access Manager RSA Federated Identity Manager RSA SecurID, RSA Authentication Manager RSA Digital Certificate Solutions RSA Identity Protection and Verification Suite RSA Access Manager Policy based secure web access and SSO solution Extranet SSO based on Federated Identity Simple management RSA SecurID – Two-Factor Authentication Two-Factor Authentication: “The act of identifying an individual by using any combination of something they know, something they have or something they are.” “Something you know” = PIN, password, life question “Something you have” = Token, Smartcard, Trusted Device “Something you are” = Biometrics (fingerprint, retinal scan, etc) RSA SecurID, RSA Authentication Manager Deployment Options RSA SecurID Tokens (HW and SW) RSA Identity Protection and Verification Suite RSA Adaptive Authentication and Transaction Monitoring (with Risk Engine) RSA eFraudNetwork RSA FraudAction information DLP RSA Data Loss Prevention Suite DLP Data Loss Prevention RSA Data Loss Prevention Suite Your Sensitive Data are Everywhere Endpoint Network/Email Apps/DB FS/CMS Storage LAN Internal Employees WAN Enterprise Applications Production Database File Server Replica File Server Disk Arrays Backup Tape Disk Arrays Backup System VPN Business Analytics Remote Employees Disk Arrays Backup Disk Outsourced Dev. Partners Endpoint Network/E- Staging Apps/DB Collaboration & Content Mgmt Systems FS/CMS Storage RSA Data Loss Prevention Suite Unified Policy Mgmt & Enforcement Incident Workflow DLP Enterprise Manager Dashboard & Reporting DLP Endpoint DLP Network DLP Datacenter User & System Administration Discover Monitor Discover File shares, SharePoint sites, Databases, SAN/NAS Email, webmail, IM/Chat, FTP, HTTP/S, TCP/IP Local drives, PST files, Office files, 300+ file types Remediate Enforce Enforce Delete, Move, Quarantine Allow, Notify, Block, Encrypt Allow, Justify, Block on Copy, Save As, Print, USB, Burn, etc. eDRM Encryption Access Controls RSA DLP with Microsoft AD RMS Current Status 1. RMS admin creates RMS templates for data protection Microsoft AD RMS 2. RSA DLP admin designs policies to find sensitive data and protect it using RMS Legal Department Outside law firm Others View, Edit, Print View No Access Find Legal Contracts Apply Legal Contracts RMS Contracts DLP Policy RSA DLP Legal department 3. RSA DLP discovers and classifies sensitive files 4. RSA DLP applies RMS controls based on policy Legal Contracts RMS Outside law firm Laptops/desktops File shares SharePoint Other s 5. Users request files - RMS provides policy based access information SIEM RSA enVision Platform SIEM Security Information and Event Management RSA enVision 3-in-1 SIEM Platform Simplifying Compliance Enhancing Security Optimizing IT & Network Operations Compliance reports for regulations and internal policy Real-time security alerting and analysis IT monitoring across the infrastructure Reporting Forensics Auditing Purpose-built database (IPDB) security devices Alert / correlation Network baseline Visibility RSA enVision Log Management platform network devices applications / databases servers storage RSA Security Pozvánky na semináře Další semináře, konference 14.5. (čtvrtek): RSA Security Day • komplet přehled všech řešení 11.6.: Soft-tronik Forum 2009: www.stforum2009.cz • DLP and SIEM 24.6.: RSA Security snídaně • Fraud Detection, Identity Protection (IPV) Další semináře, konference Další plánovaná témata: • • • • • Šifrování dat Data Loss Prevention (DLP) Identita a zákony, tokeny a certifikáty Společné řešení RSA a Oracle Společné řešení RSA a Microsoft Stačí poslat email: ivan.svoboda@rsa.com Conclusion RSA – The Big Picture Encryption Store, Transport IT infrastructure Access Authentication, Authorization DLP information SIEM Security Information and Event Management Data Loss Prevention RSA – The First Aid in Security :-) information Otázka: Jaké jsou 3 oblasti, ve kterých je společnost RSA hodnocena jako LEADER v Gartner Magic Quadrantu? DLP SIEM Web Fraud Detection