TRUSTED IT: REDEFINE SOCIAL, MOBILE & CLOUD INFRASTRUCTURE Ralf Kaltenbach, Regional Director RSA Germany 1
TRUSTED IT Continuous Availability of Applications, Systems and Data Data Protection with Integrated Backup and Recovery Threats Identified and Repelled with Advanced Security 2
Continuous Availability. Redefined Continuous Avail. Seconds GRC Zero RTO Eliminate Restarts RPO Active- Active Traditional Failover Days Days Manual, Stand-by RTO Zero 9s of Availability Swap, Stand-by 3
Backup And Recovery. Redefined Self ACCELERATE Helpdesk 0 Isolated BCM Integrated LEVERAGE 100% Protection Storage Leveraged Infrastructure Native App Support Traditional Backup Dedicated Equipment Application Silos 4
Advanced Security. Redefined Individual Advanced Security Predictive analysis PERIMETER Organization Monitor and Manage Past Data Science TIME Future Activity. What if? Traditional Security Reports and Response What happened? 5
Platform 3 Redefines Security Cloud, Mobile & Social Combined With A New Set Of Threats Cloud & Mobile Perimeters Are Changing Social Networks More Identities To Verify New Threats Examine All Behavior Private Hybrid Public Sophisticated Fraud Advanced Threats 6
A New Security Approach Is Required Focus on People, Data Flow And Transactions 2 ND PLATFORM LAN/Internet PC Client/Server 3 RD PLATFORM Mobile Cloud Big Data Social Mobile Devices IT CONTROLLED PERIMETER-BOUND PREVENTION SIGNATURE-BASED USER-CENTRIC BORDERLESS DETECTION INTELLIGENCE-DRIVEN 7
IS WHERE SECURITY MEETS BIG DATA 8
Intelligence-Driven Security VISIBILITY ANALYSIS ACTION Collect data about what matters Risk Network Traffic Identities - Transactions Detect anomalies that indicate threats Act to mitigate business damage or loss 9
Advanced Security. Redefined Monitoring 15% Response 5% Monitoring 33% Response 33% Prevention 80% Prevention 33% Historic Security Spend Future Security Spend 10
RSA s Focus Areas Advanced Security Advanced Security Operations Operations Detecting and Stopping Advanced Threats Understanding and Managing Organizational Risk Governance, Risk, & Compliance Identity & Access Identity & Data Management Protection Securing the Interactions Between People and Information Preventing Online Fraud and Cybercrime Fraud Fraud & Risk & Risk Intelligence 11
CMDB Assets RSA Advanced SOC Incidents Breaches Projects Risks SIEM Discovery DLP ARCHER GRC SECURITY OPERATIONS Vulns SECURITY ANALYTICS ECAT Live Malware Analysis Client Identity Server LIVE - THREAT INTELLIGENCE Rules Parsers Alerts Feeds Apps Directories Reports & Custom Actions 12
RSA Security Analytics Distributed Data Collection Data Enrichment Alerts & Reporting Incident Response NETWORK SYSTEM PACKET METADATA LOG METADATA LIVE Investigation & Forensics Compliance Malware Analysis Intel Feeds Endpoint Visibility & Analysis Parsing & Tagging LIVE Business & IT Context LIVE LIVE - THREAT INTELLIGENCE Rules Parsers Alerts Feeds Apps Directories Reports & Custom Actions 13
Planning The Journey CONTROL COMPLIANCE IT RISK BUSINESS RISK MATURITY LEVEL 14
Benefits Of Our Approach Risk-driven Prioritize activity and resources appropriately Incremental and achievable New capabilities improve your maturity over time Future proof Enables response to changes in landscape not based on adding new products Agile Enables the business to take advantage of new technology and IT-driven opportunities 15