partner presentation

advertisement
RSA Solutions Overview
Security Solutions for Business Accelleration
Ivan Svoboda
Key Account Manager
RSA Security
ivan.svoboda@rsa.com
RSA Protection in Action
134,000+
Billion+
200
150,000+
Million+
25+
Applications
shipped
with
BSAFE®
Encryption
Year
Phishing
legacy
Organizations
Identities
attacks
in information
protected
shut
protected
down
security
25+
34,000+
150,000+
250 Million+
1 Billion+
year legacy
in information
security and risk
management
organizations
protected by
RSA technology
online phishing
attacks shut down
by the RSA
Anti-Fraud
Command Center
online identities
protected with
RSA identification
and protection
technology
applications shipped
with RSA BSAFE®
encryption most widely
deployed software in
the world*
*Embedded in Microsoft, HP, Sun and IBM operating systems, Internet Explorer and Netscape browsers,
Ericsson, Nokia, Motorola phones, major US government agencies and the list goes on
RSA: Award Winning Company
Frost and Sullivan – Competitive Landscape
OTP Authentication(December 2008)
Leadership Beyond Authentication
“RSA is vastly more than user authentication; it is a key portion of how
companies, particularly in the financial industry, protect critical records and
comply with critical regulations.”
-- “EMC Addresses the 2009 ‘OMG’ Budget”, ITBusiness Edge, Rob Enderle,
Enderle Group, Dec. 9, 2008
Data Loss Prevention MQ June 2008
Web Fraud Detection MQ Dec. 2008
SIEM MQ May 2008
RSA – The Big Picture
Encryption
Store, Transport
IT infrastructure
Access
Authentication,
Authorization
DLP
information
SIEM
Security Information and Event Management
Data Loss
Prevention
RSA – The Big Picture – Product Lines
RSA Encryption and
Key Management Suite
RSA Access Manager
RSA Federated Identity
Manager
IT infrastructure
RSA SecurID
RSA Digital
Certificate
Solutions
information
RSA Identity
Protection and
Verification Suite
RSA enVision Platform
RSA
Data Loss
Prevention
Suite
Encryption
Store, Transport
Encryption
RSA Key Manager
RSA BSAFE
information
RSA Key Manager
Enterprise-Wide Key Management
Apps/DB
FS/CMS
RSA Key Manager (RKM)
Policy-based Interface
1. Generate Keys
2. Securely Distribute Keys
3. Vault Keys
4. Expire / Turnover Keys
5. Monitor + Audit
13
Storage
RSA Key Manager
Enterprise-Wide Key Management
RKM Server
RSA Key Manager with
Application Encryption
RSA Key Manager for
the Datacenter
Application Encryption Client
Integration modules EMC & 3rd party encryption
Sensitive data encrypted within
applications at point of capture
Application Encryption ClientsComprehensive platform and
language support
C, Java, .NET, Cobol, CICS
Linux, Mainframe, Unix, Windows
14
Integrates with host, SAN switch,
and native tape encryption
solutions from RSA, EMC, and
third parties
Current integrations include File
Security Manager, PowerPath,
Connectrix/Cisco, Oracle and
Native Tape
Access
Authentication,
Authorization
information
Access
RSA Access Manager
RSA Federated Identity Manager
RSA SecurID, RSA Authentication Manager
RSA Digital Certificate Solutions
RSA Identity Protection and Verification Suite
RSA Access Manager
Policy based secure web access and SSO solution
Extranet SSO based on Federated Identity
Simple management
RSA SecurID – Two-Factor Authentication
Two-Factor Authentication:
“The act of identifying an individual by using any combination of something
they know, something they have or something they are.”
“Something you know” = PIN,
password, life question
“Something you have” = Token,
Smartcard, Trusted Device
“Something you are” = Biometrics
(fingerprint, retinal scan, etc)
RSA SecurID, RSA Authentication Manager
Deployment Options
RSA SecurID Tokens (HW and SW)
RSA Identity Protection and Verification Suite
RSA Adaptive Authentication
and Transaction Monitoring (with Risk Engine)
RSA eFraudNetwork
RSA FraudAction
information
DLP
RSA Data Loss Prevention Suite
DLP
Data Loss
Prevention
RSA Data Loss Prevention Suite
Your Sensitive Data are Everywhere
Endpoint
Network/Email
Apps/DB
FS/CMS
Storage
LAN
Internal
Employees
WAN
Enterprise
Applications
Production
Database
File Server
Replica
File Server
Disk Arrays
Backup
Tape
Disk Arrays
Backup
System
VPN
Business
Analytics
Remote
Employees
Disk Arrays Backup Disk
Outsourced
Dev.
Partners
Endpoint
Network/E-
Staging
Apps/DB
Collaboration &
Content Mgmt
Systems
FS/CMS
Storage
RSA Data Loss Prevention Suite
Unified Policy Mgmt &
Enforcement
Incident
Workflow
DLP
Enterprise Manager
Dashboard &
Reporting
DLP Endpoint
DLP Network
DLP Datacenter
User & System
Administration
Discover
Monitor
Discover
File shares, SharePoint sites,
Databases, SAN/NAS
Email, webmail, IM/Chat, FTP,
HTTP/S, TCP/IP
Local drives, PST files, Office files,
300+ file types
Remediate
Enforce
Enforce
Delete, Move, Quarantine
Allow, Notify, Block, Encrypt
Allow, Justify, Block on Copy, Save
As, Print, USB, Burn, etc.
eDRM
Encryption
Access Controls
RSA DLP with Microsoft AD RMS
Current Status
1. RMS admin creates
RMS templates for data
protection
Microsoft AD RMS
2. RSA DLP admin designs
policies to find sensitive data
and protect it using RMS
Legal
Department
Outside law
firm
Others
View, Edit,
Print
View
No Access
Find Legal Contracts
Apply Legal Contracts RMS
Contracts
DLP Policy
RSA DLP
Legal department
3. RSA DLP discovers and
classifies sensitive files
4. RSA DLP applies RMS
controls based on policy
Legal
Contracts
RMS
Outside law firm
Laptops/desktops
File shares
SharePoint
Other
s
5. Users request
files - RMS
provides policy
based access
information
SIEM
RSA enVision Platform
SIEM
Security Information
and Event Management
RSA enVision 3-in-1 SIEM Platform
Simplifying
Compliance
Enhancing
Security
Optimizing IT &
Network Operations
Compliance reports
for regulations and
internal policy
Real-time security
alerting and analysis
IT monitoring across
the infrastructure
Reporting
Forensics
Auditing
Purpose-built
database
(IPDB)
security
devices
Alert /
correlation
Network
baseline
Visibility
RSA enVision Log Management platform
network
devices
applications
/ databases
servers
storage
RSA Security
Pozvánky na semináře
Další semináře, konference
14.5. (čtvrtek): RSA Security Day
•
komplet přehled všech řešení
11.6.: Soft-tronik Forum 2009: www.stforum2009.cz
•
DLP and SIEM
24.6.: RSA Security snídaně
•
Fraud Detection, Identity Protection (IPV)
Další semináře, konference
Další plánovaná témata:
•
•
•
•
•
Šifrování dat
Data Loss Prevention (DLP)
Identita a zákony, tokeny a certifikáty
Společné řešení RSA a Oracle
Společné řešení RSA a Microsoft
Stačí poslat email: ivan.svoboda@rsa.com
Conclusion
RSA – The Big Picture
Encryption
Store, Transport
IT infrastructure
Access
Authentication,
Authorization
DLP
information
SIEM
Security Information and Event Management
Data Loss
Prevention
RSA – The First Aid in Security :-)
information
Otázka:
Jaké jsou 3 oblasti, ve kterých je společnost RSA
hodnocena jako LEADER v Gartner Magic Quadrantu?
DLP
SIEM
Web Fraud Detection
Download