Unisys Security. Enabling Business Growth with Advanced Security Solutions. Tom Patterson, Vice President, Security Solutions, Unisys

Similar documents
DEFINING SECURITY FOR TODAY S CLOUD ENVIRONMENTS. Security Without Compromise

BUILDING SECURITY INTO YOUR DATA CENTER MODERNIZATION STRATEGY

Future Challenges and Changes in Industrial Cybersecurity. Sid Snitkin VP Cybersecurity Services ARC Advisory Group

Securing Digital Transformation

Continuous protection to reduce risk and maintain production availability

Solution Overview Cisco Tetration Analytics and AlgoSec: Business Application Connectivity Visibility, Policy Enforcement, and Business-Based Risk and

GDPR Update and ENISA guidelines

Critical Infrastructure Protection for the Energy Industries. Building Identity Into the Network

MAKING THE CLOUD A SECURE EXTENSION OF YOUR DATACENTER

align security instill confidence

MICRO-SEGMENTATION FOR CLOUD-SCALE SECURITY TECHNICAL WHITE PAPER

Data Management and Security in the GDPR Era

Build Your Zero Trust Security Strategy With Microsegmentation

Cybersecurity. Securely enabling transformation and change

PROTECT WORKLOADS IN THE HYBRID CLOUD

The Oracle Trust Fabric Securing the Cloud Journey

Managing Security While Driving Digital Transformation

Securing Your Most Sensitive Data

NOTHING IS WHAT IT SIEMs: COVER PAGE. Simpler Way to Effective Threat Management TEMPLATE. Dan Pitman Principal Security Architect

MICRO-SEGMENTATION FOR CLOUD-SCALE SECURITY TECHNICAL WHITE PAPER

to protect the well-being of citizens. Fairfax is also home to some Fortune 500 and large

Delivering Integrated Cyber Defense for the Cloud Generation Darren Thomson

INFRASTRUCTURE AND CLOUD SERVICES

Run the business. Not the risks.

DIGITAL TRUST Making digital work by making digital secure

CloudSOC and Security.cloud for Microsoft Office 365

SECURITY REDEFINED. Managing risk and securing the business in the age of the third platform. Copyright 2014 EMC Corporation. All rights reserved.

Simple and Secure Micro-Segmentation for Internet of Things (IoT)

Modern Database Architectures Demand Modern Data Security Measures

Cloud for Government: A Transformative Digital Tool to Better Serve Communities

SECURITY SERVICES SECURITY

The Need In today s fast-paced world, the growing demand to support a variety of applications across the data center and help ensure the compliance an

Cisco Digital Network Architecture The Network Enables Digital Business. Rene Andersen Cisco DK

5 Steps to Government IT Modernization

vrealize Introducing VMware vrealize Suite Purpose Built for the Hybrid Cloud

GDPR: An Opportunity to Transform Your Security Operations

Transforming IT: From Silos To Services

FOR FINANCIAL SERVICES ORGANIZATIONS

2017 THALES DATA THREAT REPORT

SYMANTEC DATA CENTER SECURITY

Popular SIEM vs aisiem

Safeguard Application Uptime and Consistent Performance

Achieving Digital Transformation: FOUR MUST-HAVES FOR A MODERN VIRTUALIZATION PLATFORM WHITE PAPER

SGS CYBER SECURITY GROWTH OPPORTUNITIES

Government IT Modernization and the Adoption of Hybrid Cloud

21ST century enterprise. HCL Technologies Presents. Roadmap for Data Center Transformation

CYBER SECURITY AIR TRANSPORT IT SUMMIT

Social Engineering: We are the target Sponsor Guide

AT&T Endpoint Security

AND FINANCIAL CYBER FRAUD INSTITUTIONS FROM. Solution Brief PROTECTING BANKING

CHARTING THE FUTURE OF SOFTWARE DEFINED NETWORKING

DATA SHEET RISK & CYBERSECURITY PRACTICE EMPOWERING CUSTOMERS TO TAKE COMMAND OF THEIR EVOLVING RISK & CYBERSECURITY POSTURE

Mapping Your Requirements to the NIST Cybersecurity Framework. Industry Perspective

Microsoft Security Management

SIEM Solutions from McAfee

Traditional Security Solutions Have Reached Their Limit

THE BEST OF ICT WITH A HUMAN TOUCH

Speaker Introduction Who Mate Barany, VMware Manuel Mazzolin, VMware Peter Schmitt, Deutsche Bahn Systel Why VMworld 2017 Understanding the modern sec

IN THE FRAME. Computacenter Public Sector Frameworks FRAMEWORK

AWS Reference Design Document

CHALLENGES GOVERNANCE INTEGRATION SECURITY

AKAMAI CLOUD SECURITY SOLUTIONS

Christopher Covert. Principal Product Manager Enterprise Solutions Group. Copyright 2016 Symantec Endpoint Protection Cloud

Adopting Modern Practices for Improved Cloud Security. Cox Automotive - Enterprise Risk & Security

Security Awareness Training Courses

Cyber Resilience: Developing a Shared Culture. Sponsor Guide

Asset Management conference 2016

Challenges 3. HAWK Introduction 4. Key Benefits 6. About Gavin Technologies 7. Our Security Practice 8. Security Services Approach 9

with Advanced Protection

AUTOMATE THE DEPLOYMENT OF SECURE DEVELOPER VPCs

The Windstream Enterprise Advantage for Banking

Industrial Cyber Security. ICS SHIELD Top-down security for multi-vendor OT assets

Ο ρόλος της τεχνολογίας στο ταξίδι της συμμόρφωσης με τον Γενικό Κανονισμό. Αντιγόνη Παπανικολάου & Νίκος Αναστόπουλος

Enhancing Security With SQL Server How to balance the risks and rewards of using big data

CYBER SOLUTIONS & THREAT INTELLIGENCE

Thrive in today's digital economy

Thrive in today's digital economy

Six Weeks to Security Operations The AMP Story. Mike Byrne Cyber Security AMP

THE SIX ESSENTIAL CAPABILITIES OF AN ANALYTICS-DRIVEN SIEM

Digital Network Architecture

Oracle Buys Palerra Extends Oracle Identity Cloud Service with Innovative Cloud Access Security Broker

SOLUTION BRIEF RSA NETWITNESS SUITE 3X THE IMPACT WITH YOUR EXISTING SECURITY TEAM

MITIGATE CYBER ATTACK RISK

Qualys Cloud Platform

The threat landscape is constantly

21ST CENTURY CYBER SECURITY FOR MEDIA AND BROADCASTING

Closing the Hybrid Cloud Security Gap with Cavirin

Securing Your Digital Transformation

CipherCloud CASB+ Connector for ServiceNow

Securing the Cloud Today: How do we get there?

Qualys Cloud Platform

Best Practices in Securing a Multicloud World

What matters in Cyber Security

SIEM: Five Requirements that Solve the Bigger Business Issues

Video-Aware Networking: Automating Networks and Applications to Simplify the Future of Video

Autobot - IoT enabled security. For Private circulation only October Risk Advisory

Dimension Data IaaS Services. Gary Ramsay

CYBERBIT P r o t e c t i n g a n e w D i m e n s i o n

Tieto Compliance Cloud For a more secure IT environment

Accelerate Digital Transformation

Transcription:

Unisys Security Enabling Business Growth with Advanced Security Solutions Tom Patterson, Vice President, Security Solutions, Unisys

Unisys EMEA Security Examples Leading European bank Stealth(core) Leading French Food brand Security Managed Services European intergovernmental agency (France) Security Managed Services French Nuclear Power Major European Oil & Gas Co (Spain) U.K. Passport Office U.K. Met Police Yorkshire Building Society (U.K.) Stealth(core) Leading global luxury brand (Swiss) European Food Safety Authority (Italy) Dutch Government EU Commission Agency (Baltics) Leading Auto Co (Germany) Stealth(cloud), Stealth(mobile) Leading Airline (Germany) Government of Angola Austrian Ministry of Justice 2017 Unisys Corporation All rights reserved. 2

Security Is Part of Everything Using Technology to Enable Business Growth 2017 Unisys Corporation All rights reserved.

Today s Enterprises Have Changed Borders have dissolved perimeters have become amorphous Shifting from perimeters to globally connected, driving competiveness No longer a question of protecting the perimeter we must safeguard the data Budgets pushing data centers to the cloud, saving billions Unchecked threats to business are costing billions Complexion of the modern data center hybrid, multi-csp, API-driven, automation 2017 Unisys Corporation All rights reserved. 4

Our Clients Key Requests from Security Ability to lower costs by moving to the cloud Ability to integrate customers and suppliers into their extended enterprise Lower enterprise risk of becoming the next headline Protect the brand Lower the cost of operations Provide more security, transparent to users and operators Reduce complexity of maintaining numerous security profiles, across extended enterprise A Globally Trusted Security Partner 2017 Unisys Corporation All rights reserved. 5

Why Unisys New Enterprise and Business Requirements Require New Security Thinking, Tools and Delivery 2017 Unisys Corporation All rights reserved.

Why Unisys 1. Client business operations are now digital, global and agile 2. Client technical infrastructures to support new bizops are changing 3. Client s old security is failing in these new infrastructures 4. New regulations including GDPR are forcing change Unisys is Providing Global Security that Empowers new business models Enables agile new technologies Operates efficiently and effectively 2017 Unisys Corporation All rights reserved. 7

Lowering Risk Saving Money Increasing Agility With our Full Complement of Security Offerings Targeted Consulting Advanced Products Efficient Managed Vertical Solutions Risk Analysis & Remediation Architecture & Use Cases Create Communities Technical Services Business Services Stealth(core) Stealth(cloud) Stealth(mobile) Stealth(analytics) Stealth(aware) Managed SEIM Managed Devices Managed End User Managed Stealth Threat Intelligence Our/Your Prem Safe Cities SM Next Elevate Active Insights Appointment Manager LMS 2017 Unisys Corporation All rights reserved. 8

Delivering Micro-Segmentation That Supports Client s Goals Visibility into inter-workload traffic Control access with least-privilege Reduce attack surface area Data protection Predictive analytics Traditional 2017 Unisys Corporation All rights reserved. 9

Stealth(aware) Gets Clients to Security Quicker Stealth(aware) Auto Discover Auto Configure Auto Deploy Renders assets undetectable to unauthorized users Eliminates dozens of point products with a single platform across locations and hosting models Encrypts data-in-motion No application changes needed No infrastructure changes needed Incrementally implemented 2017 Unisys Corporation All rights reserved. 10

Client Stories Unisys Security Consulting Products Managed Services Solutions 2017 Unisys Corporation All rights reserved.

European Financial Institution Increase Compliance While Also Increasing Security Business Problem Compliance/audit requirements increasing but are costly and difficult to maintain Increasing security around legacy applications are risky and costly Traditional security measures slow and disruptive Business Benefits PCI audit scope significantly reduced Secure isolation of critical legacy applications through micro-segmentation Increased security through network/asset identitybased access Our Solution Stealth(core) allowed client to achieve critical regulatory compliance/successful audit Stealth(core) isolated (cloaked) key legacy servers without modifications to critical applications 2017 Unisys Corporation All rights reserved. 12

Local Government Consolidation to Save Taxpayer Money Business Problem Consolidation of 52 agencies/data centers into a single shared environment Traditional security solutions costly and error-prone Insufficient state resources to manage Business Benefits Flatten shared network (reduced complexity/cost) to provide improved citizen services Reduce traditional CapEx/OpEx (i.e. firewalls, vlans) Improve long-term security audit success Our Solution Stealth(core) allowed consolidation and provided agency segmentation to meet regulatory audits provided transition from current state to future state Managed Security Services (MSS) deployed to operate new environment 2017 Unisys Corporation All rights reserved. 13

European Inter-Governmental Agency Move Tax Collection to the Cloud to Increase Efficiency Business Problem Transmission of information between tax authorities in a secure, standardized and accessible way Business Benefits More efficient tax collection with new businesses automatically exchanging information Pooled resources and ensure cost-effectiveness Our Solution Implement and operate a fully secure cloud and infrastructure services AWS cloud infrastructure secured by Stealth(cloud) 2017 Unisys Corporation All rights reserved. 14

Leading Utility Company Advanced Analytics and Micro-Segmentation Create Intelligent Network Business Problem Ingest network data from existing SIEM tool and SOC to identify cyber threats before they occur Business Benefits Increased uptime and resilience of power delivery to customers Identify network anomalies for both external and internal threats near-real time to save time and money and protect service to the citizen Our Solution Machine learning and advanced analytics improved security posture when combined with Stealth(analytics) MSS SIEM and data aggregators used event modeling to anticipate threats, creating an agile network 2017 Unisys Corporation All rights reserved. 15

Our Formula for Success Intelligent Defense That Adapts and Reconfigures Using SDN and Unisys Stealth Advanced Security Solutions Vertical Integration Best-of- Breed Technologies Efficient Delivery Business Enablement Defend the business enable the business 2017 Unisys Corporation All rights reserved. 16

Where We re Headed Predictive Analytics with Stealth(analytics) and MSS Software Defined Security with Stealth(core) and Stealth(cloud) Behavioral Biometrics and Blockchain with ICS, IoT, and Critical Infrastructure Protection Logical and Physical Convergence Leading the Way in Adaptive Security 2017 Unisys Corporation All rights reserved. 17

Unisys EMEA Security Examples Leading European bank Stealth(core) Leading French Food brand Security Managed Services European intergovernmental agency (France) Security Managed Services French Nuclear Power Major European Oil & Gas Co (Spain) U.K. Passport Office U.K. Met Police Yorkshire Building Society (U.K.) Stealth(core) Leading global luxury brand (Swiss) European Food Safety Authority (Italy) Dutch Government EU Commission Agency (Baltics) Leading Auto Co (Germany) Stealth(cloud), Stealth(mobile) Leading Airline (Germany) Government of Angola Austrian Ministry of Justice 2017 Unisys Corporation All rights reserved. 18