Tài liệu Change in Multiple Dimensions pdf

28 311 0
Tài liệu Change in Multiple Dimensions pdf

Đang tải... (xem toàn văn)

Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống

Thông tin tài liệu

Go to View/Master/Slide Master to type in header 1 Propelling Business Growth With A Secure And Continuous Information Infrastructure Jon Murray Go to View/Master/Slide Master to type in header 2 Go to View/Master/Slide Master to type in header 3 Information: Change in Multiple Dimensions information growth information types information uses information regulations more regulations: SEC 17a-4, NASD 3010,Sarbanes-Oxley, Basel II, UK Metadata, eSign Act, 21 CFR Part 11 (more coming!) more growth: information stored on disk arrays growing ~60% in 2006 more uses: ERP, CRM, RFID, collaboration, data mining, discovery … more types: transactions, documents, forms, web, images, voice, messages, reports . Go to View/Master/Slide Master to type in header 4 Customers’ Information Storage and Management Challenges CIO’s Dilemma: How to manage all the information growth with limited resources? Information stored on disk arrays ~ 70% IT budget growth ~ 4 - 5% IT environment getting more complex SLA’s continue to expand and tighten Protection and security increasingly important Go to View/Master/Slide Master to type in header 5 2006 Technology Spending Priorities–CIO Survey Source: Morgan Stanley November CIO Survey, Jan. 3, 2006 1. Security (Software) 2. Security (HW & Services) 3. Storage Area Networks 4. Wireless LAN (access points & routers) 5. Storage Software 6. Portal Software 7. VOIP Infrastructure 8. IT Education and Training 9. Storage Hardware 10. Business Intelligence Software 11.Wireless LAN (clients) 12.New Custom Development 13.Routing 14.Systems Management Software 15.Application Integration Software 16.Notebook PCs 17.Document Management Software 18.Automated Testing Tool 19.Microsoft Office Upgrade 20.Application Software Server 45.Mainframe hardware 46.Printers Go to View/Master/Slide Master to type in header 6 Security Today An Amalgamation of Point Products Across IT Antivirus Anitvirus VPN Encryption Authentication Web Filtering Authentication Threat Detection Change/Patch Management LAN Clients Servers SAN Disk Storage Tape Spyware Firewall Digital Rights Management Encryption Vault Recovery Management Authentication Go to View/Master/Slide Master to type in header 7 Today’s Approach: Secure the Perimeter Go to View/Master/Slide Master to type in header 8 Security Tomorrow: Protect the Information Go to View/Master/Slide Master to type in header 9 Security Must Become Information-Centric  Information-centric Security – An inside-out view of how to secure information  Begins with securing the data itself  Moves out through layers of increasingly intelligent infrastructure  Relies on our ability to leverage the interaction between data and infrastructure Important Technology • Data-level access control • Open policy decision points • Enforcement at point of use Go to View/Master/Slide Master to type in header 10 Information Security (Confidentiality) Information Security Information Security Information Availability Information Availability Information Confidentiality Information Confidentiality Information Integrity Information Integrity EMC’s Heritage P r o t e c t i o n and A Natural and Requested Evolution of EMC’s Data Protection Capabilities [...]... technologies Different processes Pain Points  Move and migrate data  Inconsistent service levels  Restart the enterprise  Gaps in coverage  Protect remote data sites  Growth in complexity and effort  Shorten backup and restore times  Growth in cost and risk to the business  Contain costs  Cannot add resources Continuity Defined: Ensuring applications and data are available during planned and unplanned... – Information that was once offline is now online via archive 17 Go to View/Master/Slide Master to type in header Backup and Archive are Different Backup Archive A secondary copy of information Primary copy of information Used for recovery operations Available for information retrieval Improves availability by enabling application to be restored to point in time Adds operational efficiencies by moving... Assured Computing Environment Data Cipheroptics Erasure Services Digital Rights Management (with partners) 26 Go to View/Master/Slide Master to type in header Building a Next-Generation Information Infrastructure Information Lifecycle Management Flexible infrastructure Next-Generation Information Infrastructure Information protection and security 27 Go to View/Master/Slide Master to type in header 28... must be integrated with the information infrastructure  All security offerings need to be interoperable and open EMC Strategy     Expose key native capabilities Repurpose existing technologies for security “use cases” Develop new products, solutions, and service offerings Partner and acquire to complete portfolio 13 Go to View/Master/Slide Master to type in header What is Happening with Information... typically maintained for analysis, value generation, or compliance Not for regulatory compliance— though some are forced to use Useful for compliance and should take into account information-retention policy 18 Go to View/Master/Slide Master to type in header Continuity Reduce Total Cost  Eliminate over-protection  Simplified environment  Consolidated continuity Improve Business Value  Minimize under-protection... in header Customer Needs Tiered Storage that Is Optimized for Business Requirements Business Applications Budget Capacity Performance Availability Compliance ERP CRM Exchange Archive “Not all information is created equal” 25 Go to View/Master/Slide Master to type in header What is Happening with Information Security ? where to start define establish identify create monitor requirements services catalog... Master to type in header Secure Content Management Information Object s ACL CL MA g2 4 EAL a Testin s e i riter ervic on C nt e n t S m Com ted Co Trus 15 Go to View/Master/Slide Master to type in header ESG Strategy forRecord and Storage (CARS) Common Archiving Enterprise Archiving Secure, scalable, and unified archive for all types of content Desktop & File System SharePoint Classify Retain Migrate Email... Disaster Recovery, Operational Recovery, and Testing/Migration 21 Go to View/Master/Slide Master to type in header Products and Technologies Platform Backup Recovery Remote Information Local Remote processing Multi-site Remote Clustering across site with Storage DR aware SAN SAN SAN 22 Go to View/Master/Slide Master to type in header Products and Technologies Information Protection & Recovery SRDF Family... processing Cash management     OS: ready Application: ready Data: ready Connectivity: repoint network Redundancy of data: store and forward, tape backup of site Redundant site: ready Recovery plans: ready Testing: quarterly after significant  Accounting systems (ERP)  Inventory control / distribution  Credit card processing  Cash management 24 Go to View/Master/Slide Master to type in header... Appliances Anti-Virus/Malware Secure Messaging Web Filtering Encryption Encryption Digital Rights Mgmt File / Database Security Authentication Authentication Authentication Mgmt Authentication Mgmt Provisioning Security Services 12 Go to View/Master/Slide Master to type in header EMC’s Information-Centric Approach to Security Information Security Management (ISM)  Information Security is an end-to-end . View/Master/Slide Master to type in header 3 Information: Change in Multiple Dimensions information growth information types information uses information regulations. Pain Points  Inconsistent service levels  Gaps in coverage  Growth in complexity and effort  Growth in cost and risk to the business Continuity Defined:

Ngày đăng: 16/12/2013, 15:15

Từ khóa liên quan

Tài liệu cùng người dùng

Tài liệu liên quan