TRUSTED IT: REDEFINE SOCIAL, MOBILE & CLOUD INFRASTRUCTURE. Ralf Kaltenbach, Regional Director RSA Germany

Similar documents
TRUSTED IT: REDEFINE SOCIAL, MOBILE & CLOUD INFRASTRUCTURE. John McDonald

SECURITY REDEFINED. Managing risk and securing the business in the age of the third platform. Copyright 2014 EMC Corporation. All rights reserved.

Key Technologies for Security Operations. Copyright 2014 EMC Corporation. All rights reserved.

What matters in Cyber Security

RSA Advanced Security Operations Richard Nichols, Director EMEA. Copyright 2015 EMC Corporation. All rights reserved. 1

Un SOC avanzato per una efficace risposta al cybercrime

Aktueller Überblick über das RSA Portfolio

RSA Security Analytics

RSA NetWitness Suite Respond in Minutes, Not Months

SOLUTION BRIEF RSA NETWITNESS SUITE 3X THE IMPACT WITH YOUR EXISTING SECURITY TEAM

MITIGATE CYBER ATTACK RISK

THE RSA SUITE NETWITNESS REINVENT YOUR SIEM. Presented by: Walter Abeson

SOLUTION BRIEF RSA NETWITNESS EVOLVED SIEM

WHITEPAPER. Enterprise Cyber Risk Management Protecting IT Assets that Matter

DATA SHEET RISK & CYBERSECURITY PRACTICE EMPOWERING CUSTOMERS TO TAKE COMMAND OF THEIR EVOLVING RISK & CYBERSECURITY POSTURE

Challenges 3. HAWK Introduction 4. Key Benefits 6. About Gavin Technologies 7. Our Security Practice 8. Security Services Approach 9

Cyber Defense Maturity Scorecard DEFINING CYBERSECURITY MATURITY ACROSS KEY DOMAINS

Trust in the Cloud. Mike Foley RSA Virtualization Evangelist 2009/2010/ VMware Inc. All rights reserved

SIEM: Five Requirements that Solve the Bigger Business Issues

Transforming IT: From Silos To Services

FOR FINANCIAL SERVICES ORGANIZATIONS

Threat Containment and Operations. Yong Kwang Kek, Director of Presales SE, APJ

Security. Risk Management. Compliance.

MAKING THE CLOUD A SECURE EXTENSION OF YOUR DATACENTER

Operationalizing the Three Principles of Advanced Threat Detection

EMC & VMWARE STRATEGIC FORUM NEW YORK MARCH Tom Heiser President, RSA. Tom Corn SVP & Chief Strategy Officer, RSA

Incident Response Agility: Leverage the Past and Present into the Future

RSA IT Security Risk Management

IBM Cloud Security for the Cloud. Amr Ismail Security Solutions Sales Leader Middle East & Pakistan

OUTSMART ADVANCED CYBER ATTACKS WITH AN INTELLIGENCE-DRIVEN SECURITY OPERATIONS CENTER

RSA INCIDENT RESPONSE SERVICES

The Critical Incident Response Maturity Journey

Microsoft Security Management

SOLUTION BRIEF RSA NETWITNESS NETWORK VISIBILITY-DRIVEN THREAT DEFENSE

RSA INCIDENT RESPONSE SERVICES

Integrated, Intelligence driven Cyber Threat Hunting

Future Challenges and Changes in Industrial Cybersecurity. Sid Snitkin VP Cybersecurity Services ARC Advisory Group

Cybersecurity Roadmap: Global Healthcare Security Architecture

LTI Security Services. Intelligent & integrated Approach to Cyber & Digital Security

SOLUTION BRIEF RSA ARCHER IT & SECURITY RISK MANAGEMENT

SIEM Product Comparison

Microsoft Operations Management Suite (OMS) Fernando Andreazi RED CLOUD

Prescriptive Security Operations Centers. Leveraging big data capabilities to build next generation SOC

SOLUTION BRIEF HELPING BREACH RESPONSE FOR GDPR WITH RSA SECURITY ADDRESSING THE TICKING CLOCK OF GDPR COMPLIANCE

National Cyber Security Operations Center (N-CSOC) Stakeholders' Conference

Cyber Resilience: Developing a Shared Culture. Sponsor Guide

Analytics Driven, Simple, Accurate and Actionable Cyber Security Solution CYBER ANALYTICS

NetWitness Overview. Copyright 2011 EMC Corporation. All rights reserved.

IT Redefined. Hans Timmerman CTO EMC Nederland. Copyright 2015 EMC Corporation. All rights reserved.

Protecting Against Modern Attacks. Protection Against Modern Attack Vectors

CloudSOC and Security.cloud for Microsoft Office 365

LEAD YOUR CLOUD TRANSFORMATION. Copyright 2013 EMC Corporation. All rights reserved.

Automated Response in Cyber Security SOC with Actionable Threat Intelligence

SOLUTION BRIEF RSA NETWITNESS PLATFORM ACCELERATED THREAT DETECTION & AUTOMATED RESPONSE FROM THE ENDPOINT TO THE CLOUD

Detect Fraud & Financial Crime

Security. Made Smarter.

Qualys Cloud Platform

Not your Father s SIEM

Cybersecurity Auditing in an Unsecure World

Enabling Security Controls, Supporting Business Results

DEFEATING THE CYBERSECURITY THREAT TO OIL & GAS

Modern Database Architectures Demand Modern Data Security Measures

AKAMAI CLOUD SECURITY SOLUTIONS

EMC FORUM Vic Bhagat. Executive Vice President & Chief Information Officer EMC Corporation

CYBERBIT P r o t e c t i n g a n e w D i m e n s i o n

RSA. The security division of EMC. Visibilidad total en el entorno de seguridad. Javier Galvan Systems Engineer Mexico & NOLA

Social Engineering: We are the target Sponsor Guide

locuz.com SOC Services

TSC Business Continuity & Disaster Recovery Session

How WebSafe Can Protect Customers from Web-Based Attacks. Mark DiMinico Sr. Mgr., Systems Engineering Security

QuickSpecs. Aruba IntroSpect User and Entity Behavior Analytics. Overview. Aruba IntroSpect User and Entity Behavior Analytics Product overview

Automated Threat Management - in Real Time. Vectra Networks

WHITE PAPER END-TO-END VISIBILITY: THE FOUNDATION OF BUSINESS-DRIVEN SECURITY THREAT DETECTION & RESPONSE OPTIMIZED SIEM

Todays Threat Landscape Cloud / Big data / Mobile Jonathan Martin HP Enterprise Security Products

RSA ADVANCED SOC SERVICES

Enhancing the Cybersecurity of Federal Information and Assets through CSIP

NEXT GENERATION SECURITY OPERATIONS CENTER

Copyright 2013 EMC Corporation. All rights reserved. BIG DATA AND SECURITY JOINING FORCES

Build a Software-Defined Network to Defend your Business

ISO/IEC Solution Brief ISO/IEC EventTracker 8815 Centre Park Drive, Columbia MD 21045

Security Operations Centers in Action

Intelligence for the connected world How European First-Movers Manage IoT Analytics Projects Successfully

Technology Risk Management in Banking Industry. Rocky Cheng General Manager, Information Technology, Bank of China (Hong Kong) Limited

THE EVOLUTION OF SIEM

Next Generation Authentication

Copyright 2012 EMC Corporation. All rights reserved. Obrigado

PULLING OUR SOCS UP VODAFONE GROUP AT RSAC Emma Smith. Andy Talbot. Group Technology Security Director Vodafone Group Plc

ARC VIEW. Critical Industries Need Continuous ICS Security Monitoring. Keywords. Summary. By Sid Snitkin

SIEMLESS THREAT DETECTION FOR AWS

<Partner Name> <Partner Product> RSA Ready Implementation Guide for. Rapid 7 Nexpose Enterprise 6.1

A Risk Management Platform

Readiness, Response & Resilence:

Rethinking Security: The Need For A Security Delivery Platform

IBM services and technology solutions for supporting GDPR program

ISO COMPLIANCE GUIDE. How Rapid7 Can Help You Achieve Compliance with ISO 27002

Data Protection Everywhere

IT Security Mandatory Solutions. Andris Soroka 2nd of July, RIGA

How Boards use the NIST Cybersecurity Framework as a Roadmap to oversee cybersecurity

Securing Digital Transformation

Dell EMC Isolated Recovery

Transcription:

TRUSTED IT: REDEFINE SOCIAL, MOBILE & CLOUD INFRASTRUCTURE Ralf Kaltenbach, Regional Director RSA Germany 1

TRUSTED IT Continuous Availability of Applications, Systems and Data Data Protection with Integrated Backup and Recovery Threats Identified and Repelled with Advanced Security 2

Continuous Availability. Redefined Continuous Avail. Seconds GRC Zero RTO Eliminate Restarts RPO Active- Active Traditional Failover Days Days Manual, Stand-by RTO Zero 9s of Availability Swap, Stand-by 3

Backup And Recovery. Redefined Self ACCELERATE Helpdesk 0 Isolated BCM Integrated LEVERAGE 100% Protection Storage Leveraged Infrastructure Native App Support Traditional Backup Dedicated Equipment Application Silos 4

Advanced Security. Redefined Individual Advanced Security Predictive analysis PERIMETER Organization Monitor and Manage Past Data Science TIME Future Activity. What if? Traditional Security Reports and Response What happened? 5

Platform 3 Redefines Security Cloud, Mobile & Social Combined With A New Set Of Threats Cloud & Mobile Perimeters Are Changing Social Networks More Identities To Verify New Threats Examine All Behavior Private Hybrid Public Sophisticated Fraud Advanced Threats 6

A New Security Approach Is Required Focus on People, Data Flow And Transactions 2 ND PLATFORM LAN/Internet PC Client/Server 3 RD PLATFORM Mobile Cloud Big Data Social Mobile Devices IT CONTROLLED PERIMETER-BOUND PREVENTION SIGNATURE-BASED USER-CENTRIC BORDERLESS DETECTION INTELLIGENCE-DRIVEN 7

IS WHERE SECURITY MEETS BIG DATA 8

Intelligence-Driven Security VISIBILITY ANALYSIS ACTION Collect data about what matters Risk Network Traffic Identities - Transactions Detect anomalies that indicate threats Act to mitigate business damage or loss 9

Advanced Security. Redefined Monitoring 15% Response 5% Monitoring 33% Response 33% Prevention 80% Prevention 33% Historic Security Spend Future Security Spend 10

RSA s Focus Areas Advanced Security Advanced Security Operations Operations Detecting and Stopping Advanced Threats Understanding and Managing Organizational Risk Governance, Risk, & Compliance Identity & Access Identity & Data Management Protection Securing the Interactions Between People and Information Preventing Online Fraud and Cybercrime Fraud Fraud & Risk & Risk Intelligence 11

CMDB Assets RSA Advanced SOC Incidents Breaches Projects Risks SIEM Discovery DLP ARCHER GRC SECURITY OPERATIONS Vulns SECURITY ANALYTICS ECAT Live Malware Analysis Client Identity Server LIVE - THREAT INTELLIGENCE Rules Parsers Alerts Feeds Apps Directories Reports & Custom Actions 12

RSA Security Analytics Distributed Data Collection Data Enrichment Alerts & Reporting Incident Response NETWORK SYSTEM PACKET METADATA LOG METADATA LIVE Investigation & Forensics Compliance Malware Analysis Intel Feeds Endpoint Visibility & Analysis Parsing & Tagging LIVE Business & IT Context LIVE LIVE - THREAT INTELLIGENCE Rules Parsers Alerts Feeds Apps Directories Reports & Custom Actions 13

Planning The Journey CONTROL COMPLIANCE IT RISK BUSINESS RISK MATURITY LEVEL 14

Benefits Of Our Approach Risk-driven Prioritize activity and resources appropriately Incremental and achievable New capabilities improve your maturity over time Future proof Enables response to changes in landscape not based on adding new products Agile Enables the business to take advantage of new technology and IT-driven opportunities 15