SlideShare une entreprise Scribd logo
1  sur  45
Aligning Security to
          Business


       1          Cloud Meets Big Data
           16-17 November 2011. Grand Hyatt - Mumbai
Challenge: Expanding Identities


                            Remote Employees                    Partners                    Customers


                                     Channels                    Channels                     Channels

                                                           Partner Entry Points         Customer Entry Points
                                       VPN


       Endpoint                            Network            Apps/DB                  FS/CMS                          Storage



      Contractors                     Privileged Users     Privileged Users          Privileged Users              Privileged Users




                                                          Enterprise    Production      File Server                   Backup Tape
                                                         Applications   Database
Internal Employees



                                                           Business      Replica        SharePoint                   Disk      Backup
                                                           Analytics                    eRoom, etc.                 Arrays      Disk



                                                                                                      2          Cloud Meets Big Data
© Copyright 2011 EMC Corporation. All rights reserved.                                                    17-18 November 2011. Grand Hyatt - Mumbai
                                                                                                                                                  2
Challenge: Expanding Infrastructure


       Mobility                                                            Cloud


                         Remote Employees                      Partners                            Customers


                                                          Partner Entry Points               Partner Entry Points
                                     VPN


       Endpoint                            Network         Apps/DB                   FS/CMS                           Storage



      Contractors                     Privileged Users   Privileged Users          Privileged Users               Privileged Users


                                                                     Virtualization
                                                           Enterprise Apps                                           Backup Tape
Internal Employees                                                                   File Server
                                                           Production
                                                                                                                     Disk Arrays
                                                                                     SharePoint
                                                           Replica
                                                                                     eRoom, etc.
                                                                                                                     Backup Disk
                                                            Business Analytics



                                                                                                     3          Cloud Meets Big Data
© Copyright 2011 EMC Corporation. All rights reserved.                                                   17-18 November 2011. Grand Hyatt - Mumbai
                                                                                                                                                 3
Challenge: Increasing Threats


                            Remote Employees                         Partners                 Customers


           IP Sent to                Channels                 App, DB or Encryption
                                                                     Channels                   Channels              Stolen
                                             Stolen IP                                     Fraud
        non trusted user                                            Key Hack                                        Credentials
                                                                Partner Entry Points       Partner Entry Points
                                       VPN


       Endpoint                            Network                 Apps/DB               FS/CMS                          Storage



      Contractors
       Endpoint                       Privileged Leak
                                         Network Users          Privileged Users
                                                                    Privileged         Privileged Users
                                                                                        Inappropriate                Privileged Users
                                                                                                                       Tapes lost or
                                         Email-IM-HTTP-
       theft/loss                          FTP-etc.               User Breach               Access                         stolen



                                                               Enterprise Production      File Server                   Backup Tape
     Data Leak                        Public Infrastructure   Applications Database
                                                                  Unintentional        (Semi) Trusted                 Discarded disk
Internal Employees
   Via USB/Print                         Access Hack               Distribution         User Misuse                      exploited


                                                                Business     Replica      SharePoint                   Disk      Backup
                                                                Analytics                 eRoom, etc.                 Arrays      Disk



                                                                                                        4          Cloud Meets Big Data
© Copyright 2011 EMC Corporation. All rights reserved.                                                      17-18 November 2011. Grand Hyatt - Mumbai
                                                                                                                                                    4
The Dark Cloud

                                                            Dark Cloud
                                      Phishing                                  Mule
                                      Attacks                                   Network



                Trojans                                                                   Fraud Forum
                Attacks                                                                   Discussion



                                                                Cloud
 Stolen
 Credentials                                                                                              Stolen
 Database                                                                                                 Cards Shop




                                                         Financial Institutes



                                                                                          5          Cloud Meets Big Data
© Copyright 2011 EMC Corporation. All rights reserved.                                        17-18 November 2011. Grand Hyatt - Mumbai
                                                                                                                                      5
Corporations are a new target for Cybercriminals


• Cybercriminals increasingly targeting corporations
• Value of extracted corporate resources is on the
  rise
• Social networks make it easier to launch targeted
  attacks
• Corporations required to harden their infrastructure




                                                         6          Cloud Meets Big Data
© Copyright 2011 EMC Corporation. All rights reserved.       17-18 November 2011. Grand Hyatt - Mumbai
                                                                                                     6
Online Financial Fraud targeted at Financial Institutes


             Technical                                                                   Operational
             Infrastructure                                                              Infrastructure

               Tools             Hosting            Delivery                             Mules     Drops           Monetizing



  Phishing                                                                                                                          Purchase
                                                                                                                                    Online
  Trojans
                                                                                                                                    Money
  Pharming                  Identity                           Communication                     Cash Out                           Transfer through
                                                                                                                                    Internet Banking
                            Harvester                          Fraud forum / chat room
                                                                                                 Fraudster
                                                                                                                                    ATM
  Physical                                                                                                                          withdrawal
    Theft / Card Skimming

                                                                                                                                     IVR/Mobile
  Other Social
                                                                                                                                     Channel
  Engineering
                                                                                                                                     Withdrawal
  Techniques
                                                                                                                                     Mechanisms

                                                               User Account
                                                                                                           7          Cloud Meets Big Data
   © Copyright 2011 EMC Corporation. All rights reserved.                                                      17-18 November 2011. Grand Hyatt - Mumbai
                                                                                                                                                       7
Question

Do you think Banks should implement a stronger form of authentication
To identify online banking customers (other than user name & Password)
when they log on and transact?

                       A. Yes

                       B. NO

                       C. I have no preference




                                                                       8          Cloud Meets Big Data
   © Copyright 2011 EMC Corporation. All rights reserved.                  17-18 November 2011. Grand Hyatt - Mumbai
                                                                                                                   8
Consumers Want Stronger Security for Online Banking




 Impact: Stronger Security Can Drive Portal Usage




                                                            9          Cloud Meets Big Data
   © Copyright 2011 EMC Corporation. All rights reserved.       17-18 November 2011. Grand Hyatt - Mumbai
                                                                                                        9
CSO/CIO Balancing Act

                            Business Requirement         Business Enablement

                                           Regulatory         Customer
                                           Controls           Services

                                          Information
                                                               Innovation
                                           Protection

                                            Customer
                                                              Productivity
                                            Protection

                                              Brand           Globalization
                                            Protection




                                                                               10      Cloud Meets Big Data
© Copyright 2011 EMC Corporation. All rights reserved.                          17-18 November 2011. Grand Hyatt - Mumbai
                                                                                                                       10
Managing Information Infrastructure Security


                                                                   people
                                                         Ensure the right
                                           have access to the right information
                                              over a trusted infrastructure


                Identities                                     Infrastructure              Information
                                                                   Endpoints
                                                                    Internet
                                                               Corporate networks
        Enable                  Block                             Applications         Public            Sensitive
        Authorized              Harmful                        Databases and files     Marketing         Health
        customers               employees                                                                records
                                                                    Storage            Earnings
        Partners                Criminals                                                                IP/ PII
                                                                                       Product Info
        Employees               Spies                                                                    Financial




                                                         in a system/process that is
                                            easy and efficient to manage
                                                                                            11        Cloud Meets Big Data
© Copyright 2011 EMC Corporation. All rights reserved.                                        17-18 November 2011. Grand Hyatt - Mumbai
                                                                                                                                     11
The RSA Approach                                             Comprehensive Solutions



                                     GRC                                      Real Time Analytics

                           Actionable                                                 SIEM

                                          Policy                          Aggregate

                                                         Orchestrate - Monitor

                                                             Consoles

                                           Map                             Monitor

                                                         Enforce - Protect

                        Identities                          Information          Servers/Apps



                                                                                             12      Cloud Meets Big Data
© Copyright 2011 EMC Corporation. All rights reserved.                                        17-18 November 2011. Grand Hyatt - Mumbai
                                                                                                                                     12
Question

In the light of the RSA approach to Risk Management, do you feel?

                       A. Proactive solution is the way forward

                       B. Benefits seem marginal compared to the effort and cost

                       C. I am happy with the current setup




                                                                       13      Cloud Meets Big Data
   © Copyright 2011 EMC Corporation. All rights reserved.               17-18 November 2011. Grand Hyatt - Mumbai
                                                                                                               13
Reserve Bank of India - Guidelines on Information
security, Electronic Banking, Technology risk
management and cyber frauds

    Requirements                                                       Tools
                                                             GRC
•   Information Technology Governance
•   Information Security                                      –   Audit Management

•   IT Operations                                             –   Policy Management
•   It Services Outsourcing                                   –   User Awareness / communication tool
•   IS Audit                                                  –   Incident Management
•   Cyber Frauds                                             Security Operations Centre
•   Business Continuity Planning                             BS25599 compliance
•   Customer Education                                       Risk Based Authentication and
•   Legal Issues                                             Transaction Monitoring



                                                                               14      Cloud Meets Big Data
    © Copyright 2011 EMC Corporation. All rights reserved.                      17-18 November 2011. Grand Hyatt - Mumbai
                                                                                                                       14
Customer Case Study

                                                            BEFORE                           AFTER
PROGRESSIVE BANK
                                                            NEEDS                           Easy-to-implement ,
                                                            Deliver innovative online       convenient risk-based
                                                            banking services to             authentication fraud down
 Investing in customer                                      maintain industry-leading       by 80%
 banking protection                                         position. Combat growing
 with an online anti-                                       threat of online fraud          24x7 monitoring and
 fraud strategy                                                                             alerting on online/network
                                                            Get Visibility of the network   security risks
 “…RSA Adaptive                                             and have proactive action
 Authentication and RSA                                     taken
 FraudAction have accelerated                                                               Layered approach
 the route to market for our
 enhanced online banking                                    Ensure Compliance as per
                                                                                            resulted in >60% reduction
 security features…”
                                                            regulator and corporate         in phishing attacks and
  , SVP and CISO, Information                               governance                      accelerated route to
              Security Group,
                                                                                            market with GRC

                                                                                                  15      Cloud Meets Big Data
                     15
   © Copyright 2011 EMC Corporation. All rights reserved.
                                                                                                       MENU
                                                                                                   17-18 November 2011. Grand Hyatt - Mumbai
                                                                                                                                          15
Information Security
                                               RSA

                                               Objective 1:
                                               “Deliver innovative online banking services to maintain
                                               industry-leading position. Combat growing threat of
                                               online fraud”




                                                                                   16       Cloud Meets Big Data
© Copyright 2011 EMC Corporation. All rights reserved.                               17-18 November 2011. Grand Hyatt - Mumbai
                                                                                                                            16
The RSA Approach                                             Comprehensive Solutions




                                                            Enforce - Protect
Layer 1
                        Identities
                         Identities                           Information
                                                               Information        Servers/Apps
                                                                                  Servers/Apps

                    Multi factor2FA / IPV
                                authentication &RE                              DLP
                                                                              DLP



                                                                                            17      Cloud Meets Big Data
   © Copyright 2011 EMC Corporation. All rights reserved.                                    17-18 November 2011. Grand Hyatt - Mumbai
                                                                                                                                    17
Protection with Multiple Layers and of Multiple Channels




                                                                                                                           Adaptive
      FraudAction Anti-                           Adaptive Authentication          Access Manager                        Authentication
       Phishing                                    Adaptive Authentication for      Adaptive Authentication              ACS Services
      FraudAction Anti-                            eCommerce                        Transaction Monitoring               Transaction
       Trojan                                      Identity Verification                                                   Monitoring
                                                                                     Identity Verification
      FraudAction                                                                                                         Adaptive
       Intelligence                                                                                                         Authentication for
      Identity Verification                                                                                                eCommerce
                                                                                                                           Identity Verification


                                                                                                            18         Cloud Meets Big Data
    © Copyright 2011 EMC Corporation. All rights reserved.                                                      17-18 November 2011. Grand Hyatt - Mumbai
                                                                                                                                                       18
Protecting Fraud Channels using Multifactor
Authentication
               Mobile Channel


                                                                            Analyze Access Risk
                 EPI Channel                                                Create risk score for access to sensitive resources

                                                                              Risk Engine       Adaptive Authentication
                        IVR                                                                     Transactions, URLs, Logins, Web services
                                                                                                    Challenge
                                                                                eFraud                                                    OTP                         OOB (Phone Call)
                                                                                                    Questions
                                                                                Network
                 Web Channel



                  Ecommerce                  Protected Applications: Retail Net Banking and Cards
                                                                      Money Transfers                                   Add Payee/ Beneficiary                         View Statement



                                                                                                    Support Financial




                                                                                                                                                      Non Financial
                                             Financial Transactions




                                                                      Internal/NEFT /RTGS                               • TPT                                          Request Statement
                                                                      • Internal                                        • TPCC
                                                                      • External (TPT)                                  Update Profile
                                                                      Visa Money Transfer                               • Address
                                                                      Bill Payment                                      • Mobile /Email

                                                                      Electronic Payment                                Stop Cheques
                                                                      Interface                                         Request Cheque book
                                                                      Third Party Credit Card
                                                                      Credit Card
                                                                      • Auto Pay
                                                                      • Enhance Credit Limit
                                                                      • Get Loan / Cash

                                                                                                                                                 19                   Cloud Meets Big Data
  © Copyright 2011 EMC Corporation. All rights reserved.                                                                                          17-18 November 2011. Grand Hyatt - Mumbai
                                                                                                                                                                                         19
RSA Adaptive Authentication with Transaction
Monitoring




                                                         20      Cloud Meets Big Data
© Copyright 2011 EMC Corporation. All rights reserved.    17-18 November 2011. Grand Hyatt - Mumbai
                                                                                                 20
Securing Identities and Access using Multifactor
 RSA Authentication and Access Solutions
                   Username/                   Analyze Access Risk
                                               Create risk score for access to sensitive resources
                   Password
                                                                        RSA Adaptive Authentication

                                                   Higher Risk

   Multi-Factor User Authentication                                                                                                  Low Risk
   Strong Authentication for access to sensitive resources

      RSA SecurID HW                               RSA SecurID SW                     On-Demand
       RSA Authentication Manager


   Multi-Access Control
   Control access to multiple resources                                                       Resource(s)
               RSA Access Manager                                                             (logins, URLs, web services, etc.)

                         SAML
                         Assertion                 Manage Trust Relationships
                                                   Establish and control trust between organizations

Trusted External Users                                                     RSA Federated Identity Manager


                                                                                                              21      Cloud Meets Big Data
     © Copyright 2011 EMC Corporation. All rights reserved.                                                    17-18 November 2011. Grand Hyatt - Mumbai
                                                                                                                                                      21
DLP Covers Your Entire Infrastructure

                                                                DLP Enterprise Manager



                                         DLP                                                                 DLP
                                        Network                        DLP Datacenter                      Endpoint




                                                                                                    Connected        Disconnected
                                   Email                 Web   File shares SharePoint   Databases     PCs                PCs

 DISCOVER                                                                                                         
  MONITOR                                                                                                         
  EDUCATE                                                                                                         
  ENFORCE                                                                                                         
                                                                                                      22        Cloud Meets Big Data
© Copyright 2011 EMC Corporation. All rights reserved.                                                  17-18 November 2011. Grand Hyatt - Mumbai
                                                                                                                                               22
RSA Risk Remediation Manager (RRM)



   SharePoint
                                                                     Business
                     Grid                                             Users
                                                                                                      Apply DRM
   Databases

                       Virtual Grid                                                                      Encrypt

                                          RSA DLP                   RSA DLP                         Delete / Shred
   NAS/SAN                               Datacenter                  RRM
                                                                                                Change Permissions
                    Temp Agents


      File
                                                         File Activity           GRC              Policy Exception
     Servers                                                Tools               Systems
                Agents



   Endpoints

                                                               Manage Remediation                       Apply
          Discover Sensitive Data
                                                                   Workflow                            Controls

                                                                                          23      Cloud Meets Big Data
© Copyright 2011 EMC Corporation. All rights reserved.                                     17-18 November 2011. Grand Hyatt - Mumbai
                                                                                                                                  23
RSA Data Loss Prevention Suite
                                                                     DLP
  Unified Policy Mgmt &             Incident Workflow         Enterprise Manager          Dashboard &              User & System
       Enforcement                                                                         Reporting               Administration




                   DLP Datacenter                                    DLP Network                          DLP Endpoint

                     Discover                                        Monitor                             Discover
     File shares, SharePoint sites,                      Email, webmail, IM/Chat, FTP,    Local drives, PST files, Office files,
         Databases, SAN/NAS                                     HTTP/S, TCP/IP                      300+ file types

                    Remediate                                       Enforce                              Enforce
        Delete, Move, Quarantine                          Allow, Notify, Block, Encrypt   Allow, Justify, Block on Copy, Save
                                                                                               As, Print, USB, Burn, etc.




              eDRM (e.g. RMS)                                    Encryption                         Access Controls


                    24


                                                                                               24       Cloud Meets Big Data
© Copyright 2011 EMC Corporation. All rights reserved.                                           17-18 November 2011. Grand Hyatt - Mumbai
                                                                                                                                        24
Information Security
                                               RSA

                                               Objective 2:
                                               “Get Visibility of the network and have proactive action
                                               taken”




                                                                                    25       Cloud Meets Big Data
© Copyright 2011 EMC Corporation. All rights reserved.                                17-18 November 2011. Grand Hyatt - Mumbai
                                                                                                                             25
The RSA Approach                                             Comprehensive Solutions




                                                                             Aggregate

                                                            Orchestrate - Monitor
Layer 2
                                                                 Consoles

                                              Map                             Monitor

                                                            Enforce - Protect
Layer 1                     Identities                         Information           Servers/Apps
                        Multifactor Authentication &RE                         DLP



                                                                                              26      Cloud Meets Big Data
   © Copyright 2011 EMC Corporation. All rights reserved.                                      17-18 November 2011. Grand Hyatt - Mumbai
                                                                                                                                      26
How SIEM Enhances Security Operations
Risk and Operations Efficiency Monitoring
(Manager)
Incident Big Board         Web SOC                              asset, exposure, incident, vulnerability reports
Security Operations        monitor
Dashboard


Incident
Management
           Workflow
(Analyst)  Management
                                                                 open, reassign, add logs, notate, escalate, close incident




Automatic                                                        correlation, alerting, auto assignment, prioritization, escalation
                          Notification
Processes
(System)

                           Log                                                                                                        Vulnerabiltiy
                           Repository                                                                           Asset DB              KnowledgeBase

                                                                                                                    bulk        patch
                                                                                                                    imports     info            CVEs
                                                  events




                        firewalls       intrusion           servers        applications             configuration    scanners
                                                                                                                                27       Cloud Meets Big Data
                                        detection
     © Copyright 2011 EMC Corporation. All rights reserved.                                         management tools        17-18 November 2011. Grand Hyatt - Mumbai
                                                                                                                                                                   27
RSA Security Incident Management in Action
                                                                                                        Events occur on critical systems indicating a potential
                                                                                                    1   security breach.
                                                            RSA enVision

                                                                                                        enVision collects the events for immediate triage and
                                                                                                    2   reporting.


                                                                                                        Based on Event Rules, an Alert is triggered and
                                                                                                    3   security administrators are notified. The RSA
                                                                                                        Connector Framework automatically creates an
                                         RSA Connector Framework                                        Incident in RSA Archer Incident Management
                                                                                                        associating the specific Event data to the Incident.


                                         RSA Archer Incident Management                                 Security Administrators use the Incident
                                                                                                    4   Management capabilities in RSA Archer along with
                                                                                                        information from the RSA Archer Enterprise
                                                                                                        Management to assess the situation. An
                                                                                                        investigation is initiated and the incident is tracked
                                                                                                        and resolved.

                                                                                                         The CISO has complete visibility through the entire
                           RSA Archer Enterprise Management                                         5    process via dashboards and reporting.



Business                         Business
Hierarchy    Product/Services    Processes    Information     Applications   Devices   Facilities




                                                                                                                           28        Cloud Meets Big Data
     © Copyright 2011 EMC Corporation. All rights reserved.                                                                   17-18 November 2011. Grand Hyatt - Mumbai
                                                                                                                                                                     28
RSA enVision Enterprise/Security Operations Model
      Correlation                 Reporting


Real-time Correlation/Base-lining          Alerter                                     Collaborative Incident Management
                                                                 Task Triage
                                     Auto-assignment
                                     Auto-prioritization                          Open Task                                                   EE
    Event                            Auto-escalation
    Trace                                                                                                                        Reassign
                                                                                                          Task                   Annotate
                                                                          EE                                            EE                                        Auto-
                                                             Watch
                                   False IDS Alert                                                        DB                                                      Escalation
                                                             lists
                                   Suppression
                                                                                         Event                                    Close Task
     Log Collection                                                                      Trace

                                                                     Asset                                                    Escalate Task
                                                                     Vulnerabilities
                                Events

                                                           Asset                                                   Feedback
                                                                                                                                              Ticketing
                                                                               Vulnerability
         IPDB                                              DB                                                      Loop                       System
                                       Discovered
                                                                               KB
                                       Changes
                                                                                                                              Web SOC Monitor
                                                     Bulk               VA
          Logs                   Config                                                          VAM                      1. IncidentRisk Big Board
                                                     Imports            Reports
                                 Actions                                                         Reporting                2. SOC Efficiency Monitor




                                                                                                   Asset Reports
                                                                                                   Exposure Reports
                                                                                                   Incident Reports
  Web                                                                                              Vulnerability KB Reports
             FWs         IDSs          Apps                CMDBs Scanners
  Farm
                                                           & Config
                                                           Managers                                                               29        Cloud Meets Big Data
    © Copyright 2011 EMC Corporation. All rights reserved.                                                                          17-18 November 2011. Grand Hyatt - Mumbai
                                                                                                                                                                           29
RSA enVision Deployment
  …to a distributed, enterprise-wide architecture

                      Scheduled                                                                                       Ad Hoc Realtime
    Realtime                    Realtime                                                                   eMail
                      Reports                                                                                         Reports Alerting
    Correlation                 Alerting                                                                   Alerts



       Analyze                                                                                           Analyze
                                                                                                                                                Collect
                                                                                                                                                Remotely


              Manage                               Manage                         Manage                        Manage                          Windows
                                                                                                                                                Servers
                                                                                                                                              Stockholm

                                                                                                                                              Collect
    Collect         Collect          Collect           Collect     Collect        Collect      Collect          Collect       Collect
                                                                                                                                              Remotely



Storage           Oracle            Windows            Netscreen    Windows                       Trend Micro   Storage          Oracle
                                                                                   Cisco IPS                                                      Cisco IPS
Device            Financial         Server             Firewall     Workstation                   Antivirus     Device           Financial

                               Mexico                                                   India                         Europe                    China
Local Collection with Global Analysis

Fine Grain Role-Based Access Control


                                                                                                                      30         Cloud Meets Big Data
  © Copyright 2011 EMC Corporation. All rights reserved.                                                                  17-18 November 2011. Grand Hyatt - Mumbai
                                                                                                                                                                 30
Information Security
                                               RSA

                                               Objective 3:
                                               “Ensure Compliance as per regulator and corporate
                                               governance”




                                                                                    31      Cloud Meets Big Data
© Copyright 2011 EMC Corporation. All rights reserved.                               17-18 November 2011. Grand Hyatt - Mumbai
                                                                                                                            31
The RSA Approach                                             Comprehensive Solutions

                                                                                  Real Time Analytics
                        RSA Archer (eGRC)                                          (Netwitness)
Layer 3
                                                                Panorama                SIEM
                                                                                     (Envision)
                                             Policy                          Aggregate

                                                            Orchestrate - Monitor
Layer 2
                                                                 Consoles

                                              Map                             Monitor

                                                            Enforce - Protect
Layer 1
                            Identities                         Information          Servers/Apps



                                                                                              32      Cloud Meets Big Data
   © Copyright 2011 EMC Corporation. All rights reserved.                                      17-18 November 2011. Grand Hyatt - Mumbai
                                                                                                                                      32
The Security Incident Management Solution
                               Infrastructure Audit Trail




                                     Collectors
                                                                                                                                                           Collects and manages



                                     enVision
                                                                                                RSA enVision                                               event data; Identifies
                                                                                                                                                           critical issues from log
                                                                                                                                                           data.


                                                                     Event Database             Reporting            Event Rules               Alerts


                                                                                                                                                           Seamlessly integrates
                                                                                        RSA Connector Framework                                            SEIM infrastructure and
                                                                                                                                                           GRC platform.
Network Forensic Analysis
• Automated Malware analysis and
  prioritization                                                                RSA Archer Incident Management
                                                                                                                                                            Supports complete
• Network Session Modeling                                                                                                                                  incident lifecycle
• Network Forensic Store                                                                                                                                    management from
                                                                                                                                                            identification to
                                                                                   Investigations           Incidents              Incident Events          resolution.



                                                   RSA Archer Enterprise Management                                                                        Brings business context
                                                                                                                                                           of asset information to
                                                                                                                                                           Incident Management
                                                                                                                                                           for prioritization and
                                                                                                                                                           reporting events in the
                                                                                                                                                           context of IT GRC.
                              Business                                 Business
                              Hierarchy           Product/Services     Processes       Information    Applications      Devices           Facilities



                                                                                                                                            33          Cloud Meets Big Data
  © Copyright 2011 EMC Corporation. All rights reserved.                                                                                        17-18 November 2011. Grand Hyatt - Mumbai
                                                                                                                                                                                       33
Introducing the NetWitness Network Security
Analysis Platform


                                                           Automated Malware
                                                           Analysis and Prioritization


                                                           Automated Threat Reporting,
                                                           Alerting and Integration

                                                           Freeform Analytics for
                                                           Investigations and Real-time
                                                           Answers

                                                           Revolutionary Visualization
                                                           of Content for Rapid Review




                                                               34       Cloud Meets Big Data
  © Copyright 2011 EMC Corporation. All rights reserved.         17-18 November 2011. Grand Hyatt - Mumbai
                                                                                                        34
RSA Incident Management
                                                   • Industry leading Security Incident and Event
                                                     Management (SIEM) technology for the automated
                                                     identification and escalation of high priority security
                                                     incidents


                                                   • Industry leading Incident Management solution that
                                                     can handle proactive incidents no matter how they are
                                                     detected giving complete flexibility in managing
                                                     incident workflow using Panorama reporting into GRC


                                                   • A GRC platform that brings unprecedented business
                                                     context to Incident Management processes and
                                                     incorporates security incidents into wider enterprise
                    Business                         risk management and compliance reporting and
                    Processes
                                                     actionable decisions.
Information
                                         Devices

                  Applications




                                                                                         35       Cloud Meets Big Data
     © Copyright 2011 EMC Corporation. All rights reserved.                                17-18 November 2011. Grand Hyatt - Mumbai
                                                                                                                                  35
Creating Actionable Intel. from Data Overload

                                            ITGRC: Data Governance , Risk, Incident BCM &
RBI Compliance                                        Compliance Management
  Assessment                             Process Controls                         Technical Controls                                               •Nessus, Qualys,
                                                                                                                             VA and Threat         Veracode, External
                                           Process Control Testing                 Vulnerabilities Extreme                   Management            threat feeds etc.


 PCI DSS SAQ
                                           Self Assessment                         Compliance      High                                             • Control
                                                                                                                               Exception            Exception
                                                                                                                                                    Management
                                                                                                                              Management            • Documented
                                           ISO 27001 Assessment                    Mis-Configurations High                                          Exceptions
  ISO 27001
                                                                                                                                                     • User Groups
  Assessment                                                                       Access          Extreme                    User Access            • Roles and
                                           BS25999 Assessment                                                                                        Permissions
                                                                                                                              Management

   BS25999                                                          Incidents Priority
                                                                                                                             Incidents Feed
  Assessment
                                                                   Assets Classification
                                                                                                                                 Envision
 Policy Comp.
  Assessment
                                       Inputs and Process Automation Layer

                                     Other Incidents                                       Asset Feed             Asset Feed DLP Violations Feed

                                BCM            Physical Security           Information              Asset
                                                                                                                              DLP
                              Incidents           Incidents                   Assets          Management (CMDB)




                                                                                                                    36       Cloud Meets Big Data
     © Copyright 2011 EMC Corporation. All rights reserved.                                                           17-18 November 2011. Grand Hyatt - Mumbai
                                                                                                                                                             36
GRC Processes Automation Framework
                                                                Assessments (Risk,
                                                                Compliance, Audit, BCM,
                                                                and Vendor)
                                                                • Audit Management
                                                                • Audit Programs
                                                                • Risk Assessments
                    Governance                                  • Compliance Assessments   Monitoring
                                                                • Vendor Management
                    • Holistic GRC Reporting                    • BCM                      • Frauds
                    • Dashboard: Risk & Compliance                                         • Monitoring of Compliance,
                      • Key Perf. Indicators (KPI)                                           Vulnerabilities and Threats
                      • Key Risks Indicators (KRI)                                         • Monitoring of the KRI, KPIs
                      • Key Controls                                                       • Findings Management
                    • Performance Mgmt                                                     • Remediation Plan Management
                      • Process Performance                                                • Exception Management
                      • Governance (e.g. coverage)                                         • Global SOC
                      • Performance & Quality Reviews                                      • Global CERT




Enterprise Management                                                                                      GRC Portal
• Targets of Evaluation: Business                                                                          • Corporate Communication
  Processes, Business Units,                                                                               • Content Delivery
  Information Assets,                                                                                      • Compliance, Risk , BCM and Security
• Target of Reporting: Business
  Hierarchy:
• Asset Classification
• Policy Management
                                                                    Archer                                   Awareness, Trainings, Surveys
                                                                                                           • Website (single entry point)
                                                                                                           • Incidents Reporting:
                                                                                                             • Compliance,
• Risk Register                                                                                              • Security/Loss event
• Identification of the Risk from various
  sources




                                                                                                           37        Cloud Meets Big Data
       © Copyright 2011 EMC Corporation. All rights reserved.                                                 17-18 November 2011. Grand Hyatt - Mumbai
                                                                                                                                                     37
Enabling Effective Security Incident Management

 With RSA’s Security Incident Management Solution you can:

     • Collect security relevant events
       across your infrastructure


     • Prioritize incidents based upon
       business context


     • Manage incidents and
       investigations proactively to
       combat APT


     • Report on your security and
       compliance posture


                                                             38      Cloud Meets Big Data
  © Copyright 2011 EMC Corporation. All rights reserved.      17-18 November 2011. Grand Hyatt - Mumbai
                                                                                                     38
Conclusion: End-to-End Layered Protection is
required. “A Lock on the Door” is Not Enough



                                                             Enterprise
                                                   Governance Risk and Compliance

                                                            Internal SOC

                                                                           On-Demand




                                                                                       39      Cloud Meets Big Data
© Copyright 2011 EMC Corporation. All rights reserved.                                  17-18 November 2011. Grand Hyatt - Mumbai
                                                                                                                               39
RSA overall solution implementation
                                                                                                                                Business
                                                                                                                                Reporting
                                     enVision




                                                                                                     Geo Info
                                                                                        Division
                                                                             Identity




                                                                                                                  Data
                          IPS
                                                                                                                                                      Archer
Event Aggregation




                                             AV
                                                             EP
                          Auth




                                                                                                                                      Incidents




                                                                                                                                                                 Policies
                                                                                                                                                       Threats
                                                 WAF                          Data Enhancement
                                                                   DLP
                               FW

                                         WLAN URL
                                                                                        Department
                                                                             Location




                                                                                                     Regulation

                                                                                                                  Asset Value
                            AD




                                                                                                                                           Panorama
                                                                                                                                                                 SOC

                                                                                                                                                            Investigations
                                                                                                                                                              Netwitness

                                                                                                                                     40           Cloud Meets Big Data
                    © Copyright 2011 EMC Corporation. All rights reserved.                                                            17-18 November 2011. Grand Hyatt - Mumbai
                                                                                                                                                                             40
Cloud Compliance Architecture




                                                         41      Cloud Meets Big Data
© Copyright 2011 EMC Corporation. All rights reserved.    17-18 November 2011. Grand Hyatt - Mumbai
                                                                                                 41
Positive Business Outcome

The objectives of the customer were met with a cost effective Integrated
Solution
   • Increase customer confidence in online transactions (30% increase YoY)

   • Reduce the Fraud and AntiPhishing / Anti Trojan for customers (>60%)

   • Provide 24X7 Visibility of the Network and report critical incidents

   • Proactive monitoring to save against APT’s

   • Automated Compliance Reporting meeting Corporate and regulations




                                                             42      Cloud Meets Big Data
   © Copyright 2011 EMC Corporation. All rights reserved.     17-18 November 2011. Grand Hyatt - Mumbai
                                                                                                     42
Summary

Key Take aways:

  A breach/Incident is inevitable the key is to reduce the “Window of
  Vulnerability”

  Use technology as a Business Enhancer rather than a cost

  Your technology provider is a Partner not a Vendor choose Wisely

  Risk Management is Strategic not Tactical - Scalable, Adaptive , Layered



                   RSA –EMC Can be that Partner


                                                           43      Cloud Meets Big Data
  © Copyright 2011 EMC Corporation. All rights reserved.    17-18 November 2011. Grand Hyatt - Mumbai
                                                                                                   43
Question

With the presentation as a backdrop, what course would to take?

                       A. I would go ahead with an Integrated solution

                       B. I would go ahead with a Best of Breed Solution

                       C. I would go ahead with a Best for Need Solution




                                                                       44      Cloud Meets Big Data
   © Copyright 2011 EMC Corporation. All rights reserved.               17-18 November 2011. Grand Hyatt - Mumbai
                                                                                                               44
THANK YOU



                                                         45      Cloud Meets Big Data
© Copyright 2011 EMC Corporation. All rights reserved.    17-18 November 2011. Grand Hyatt - Mumbai
                                                                                                 45

Contenu connexe

Tendances

Bloombase Spitfire Messaging Security Server Brochure
Bloombase Spitfire Messaging Security Server BrochureBloombase Spitfire Messaging Security Server Brochure
Bloombase Spitfire Messaging Security Server BrochureBloombase
 
Dharmes Mistry Tony De Bree S O A Business Persp V1b
Dharmes  Mistry    Tony De  Bree   S O A Business Persp V1bDharmes  Mistry    Tony De  Bree   S O A Business Persp V1b
Dharmes Mistry Tony De Bree S O A Business Persp V1bSOA Symposium
 
Riverbed Cascade and VXLAN Monitoring
Riverbed Cascade and VXLAN MonitoringRiverbed Cascade and VXLAN Monitoring
Riverbed Cascade and VXLAN MonitoringRiverbed Technology
 
Manage Agility through Manage-ability – Introducing Design Time at Run Time ...
Manage Agility through Manage-ability – Introducing Design Time at Run Time ...Manage Agility through Manage-ability – Introducing Design Time at Run Time ...
Manage Agility through Manage-ability – Introducing Design Time at Run Time ...Lucas Jellema
 
Compuware APM Solution
Compuware APM SolutionCompuware APM Solution
Compuware APM Solutionbackfire_88
 
Instant Agility in Oracle Fusion Middleware through Design Time @ Run Time (O...
Instant Agility in Oracle Fusion Middleware through Design Time @ Run Time (O...Instant Agility in Oracle Fusion Middleware through Design Time @ Run Time (O...
Instant Agility in Oracle Fusion Middleware through Design Time @ Run Time (O...Lucas Jellema
 
[Chaco] Optimización del área de TI con Servidores POWER y System x – Gabriel...
[Chaco] Optimización del área de TI con Servidores POWER y System x – Gabriel...[Chaco] Optimización del área de TI con Servidores POWER y System x – Gabriel...
[Chaco] Optimización del área de TI con Servidores POWER y System x – Gabriel...IBMSSA
 
Building tomorrow's web with today's tools
Building tomorrow's web with today's toolsBuilding tomorrow's web with today's tools
Building tomorrow's web with today's toolsJames Pearce
 
ScaleBase Webinar 8.16: ScaleUp vs. ScaleOut
ScaleBase Webinar 8.16: ScaleUp vs. ScaleOutScaleBase Webinar 8.16: ScaleUp vs. ScaleOut
ScaleBase Webinar 8.16: ScaleUp vs. ScaleOutScaleBase
 
Comment détecter des virus inconnus en utilisant des « honey pots » et d’autr...
Comment détecter des virus inconnus en utilisant des « honey pots » et d’autr...Comment détecter des virus inconnus en utilisant des « honey pots » et d’autr...
Comment détecter des virus inconnus en utilisant des « honey pots » et d’autr...Hackfest Communication
 
Sanjay Mirchandani’s KeyNote – EMC Forum India – Mumbai November 17, 2011
Sanjay Mirchandani’s KeyNote – EMC Forum India – Mumbai November 17, 2011Sanjay Mirchandani’s KeyNote – EMC Forum India – Mumbai November 17, 2011
Sanjay Mirchandani’s KeyNote – EMC Forum India – Mumbai November 17, 2011EMC Forum India
 
Aras Vision and Roadmap with Aras Innovator PLM Software
Aras Vision and Roadmap with Aras Innovator PLM SoftwareAras Vision and Roadmap with Aras Innovator PLM Software
Aras Vision and Roadmap with Aras Innovator PLM SoftwareAras
 
CA John Michelsen - Oracle OpenWorld 2012 - "ServiceVirtualization Reality is...
CA John Michelsen - Oracle OpenWorld 2012 - "ServiceVirtualization Reality is...CA John Michelsen - Oracle OpenWorld 2012 - "ServiceVirtualization Reality is...
CA John Michelsen - Oracle OpenWorld 2012 - "ServiceVirtualization Reality is...ServiceVirtualization.Com
 
Presentation from physical to virtual to cloud emc
Presentation   from physical to virtual to cloud emcPresentation   from physical to virtual to cloud emc
Presentation from physical to virtual to cloud emcxKinAnx
 
Lotus Live 4 ClubAlliances.com
Lotus Live 4 ClubAlliances.comLotus Live 4 ClubAlliances.com
Lotus Live 4 ClubAlliances.comPhilippe MATHIEU
 
AWS Partner Presentation - Riverbed
AWS Partner Presentation - RiverbedAWS Partner Presentation - Riverbed
AWS Partner Presentation - RiverbedAmazon Web Services
 
Webinar: eFolder Expert Series: BDR Pain Relief with Lloyd Wolf
Webinar: eFolder Expert Series: BDR Pain Relief with Lloyd WolfWebinar: eFolder Expert Series: BDR Pain Relief with Lloyd Wolf
Webinar: eFolder Expert Series: BDR Pain Relief with Lloyd WolfDropbox
 
Connect the Cloud: A Strategy for Enterprise, Mobile and Developer APIs
 Connect the Cloud: A Strategy for Enterprise, Mobile and Developer APIs Connect the Cloud: A Strategy for Enterprise, Mobile and Developer APIs
Connect the Cloud: A Strategy for Enterprise, Mobile and Developer APIsRyan Boyles
 
Enabling Supplier Communities
Enabling Supplier CommunitiesEnabling Supplier Communities
Enabling Supplier Communitiesbillwoerner
 
Genesis Overview Slides from Adobe MAX 2008
Genesis Overview Slides from Adobe MAX 2008Genesis Overview Slides from Adobe MAX 2008
Genesis Overview Slides from Adobe MAX 2008Matthias Zeller
 

Tendances (20)

Bloombase Spitfire Messaging Security Server Brochure
Bloombase Spitfire Messaging Security Server BrochureBloombase Spitfire Messaging Security Server Brochure
Bloombase Spitfire Messaging Security Server Brochure
 
Dharmes Mistry Tony De Bree S O A Business Persp V1b
Dharmes  Mistry    Tony De  Bree   S O A Business Persp V1bDharmes  Mistry    Tony De  Bree   S O A Business Persp V1b
Dharmes Mistry Tony De Bree S O A Business Persp V1b
 
Riverbed Cascade and VXLAN Monitoring
Riverbed Cascade and VXLAN MonitoringRiverbed Cascade and VXLAN Monitoring
Riverbed Cascade and VXLAN Monitoring
 
Manage Agility through Manage-ability – Introducing Design Time at Run Time ...
Manage Agility through Manage-ability – Introducing Design Time at Run Time ...Manage Agility through Manage-ability – Introducing Design Time at Run Time ...
Manage Agility through Manage-ability – Introducing Design Time at Run Time ...
 
Compuware APM Solution
Compuware APM SolutionCompuware APM Solution
Compuware APM Solution
 
Instant Agility in Oracle Fusion Middleware through Design Time @ Run Time (O...
Instant Agility in Oracle Fusion Middleware through Design Time @ Run Time (O...Instant Agility in Oracle Fusion Middleware through Design Time @ Run Time (O...
Instant Agility in Oracle Fusion Middleware through Design Time @ Run Time (O...
 
[Chaco] Optimización del área de TI con Servidores POWER y System x – Gabriel...
[Chaco] Optimización del área de TI con Servidores POWER y System x – Gabriel...[Chaco] Optimización del área de TI con Servidores POWER y System x – Gabriel...
[Chaco] Optimización del área de TI con Servidores POWER y System x – Gabriel...
 
Building tomorrow's web with today's tools
Building tomorrow's web with today's toolsBuilding tomorrow's web with today's tools
Building tomorrow's web with today's tools
 
ScaleBase Webinar 8.16: ScaleUp vs. ScaleOut
ScaleBase Webinar 8.16: ScaleUp vs. ScaleOutScaleBase Webinar 8.16: ScaleUp vs. ScaleOut
ScaleBase Webinar 8.16: ScaleUp vs. ScaleOut
 
Comment détecter des virus inconnus en utilisant des « honey pots » et d’autr...
Comment détecter des virus inconnus en utilisant des « honey pots » et d’autr...Comment détecter des virus inconnus en utilisant des « honey pots » et d’autr...
Comment détecter des virus inconnus en utilisant des « honey pots » et d’autr...
 
Sanjay Mirchandani’s KeyNote – EMC Forum India – Mumbai November 17, 2011
Sanjay Mirchandani’s KeyNote – EMC Forum India – Mumbai November 17, 2011Sanjay Mirchandani’s KeyNote – EMC Forum India – Mumbai November 17, 2011
Sanjay Mirchandani’s KeyNote – EMC Forum India – Mumbai November 17, 2011
 
Aras Vision and Roadmap with Aras Innovator PLM Software
Aras Vision and Roadmap with Aras Innovator PLM SoftwareAras Vision and Roadmap with Aras Innovator PLM Software
Aras Vision and Roadmap with Aras Innovator PLM Software
 
CA John Michelsen - Oracle OpenWorld 2012 - "ServiceVirtualization Reality is...
CA John Michelsen - Oracle OpenWorld 2012 - "ServiceVirtualization Reality is...CA John Michelsen - Oracle OpenWorld 2012 - "ServiceVirtualization Reality is...
CA John Michelsen - Oracle OpenWorld 2012 - "ServiceVirtualization Reality is...
 
Presentation from physical to virtual to cloud emc
Presentation   from physical to virtual to cloud emcPresentation   from physical to virtual to cloud emc
Presentation from physical to virtual to cloud emc
 
Lotus Live 4 ClubAlliances.com
Lotus Live 4 ClubAlliances.comLotus Live 4 ClubAlliances.com
Lotus Live 4 ClubAlliances.com
 
AWS Partner Presentation - Riverbed
AWS Partner Presentation - RiverbedAWS Partner Presentation - Riverbed
AWS Partner Presentation - Riverbed
 
Webinar: eFolder Expert Series: BDR Pain Relief with Lloyd Wolf
Webinar: eFolder Expert Series: BDR Pain Relief with Lloyd WolfWebinar: eFolder Expert Series: BDR Pain Relief with Lloyd Wolf
Webinar: eFolder Expert Series: BDR Pain Relief with Lloyd Wolf
 
Connect the Cloud: A Strategy for Enterprise, Mobile and Developer APIs
 Connect the Cloud: A Strategy for Enterprise, Mobile and Developer APIs Connect the Cloud: A Strategy for Enterprise, Mobile and Developer APIs
Connect the Cloud: A Strategy for Enterprise, Mobile and Developer APIs
 
Enabling Supplier Communities
Enabling Supplier CommunitiesEnabling Supplier Communities
Enabling Supplier Communities
 
Genesis Overview Slides from Adobe MAX 2008
Genesis Overview Slides from Adobe MAX 2008Genesis Overview Slides from Adobe MAX 2008
Genesis Overview Slides from Adobe MAX 2008
 

Similaire à Track 2, session 5, aligning security with business kartik shahani

Data Loss Prevention de RSA
Data Loss Prevention de RSAData Loss Prevention de RSA
Data Loss Prevention de RSAAEC Networks
 
Securing Your Endpoints Using Novell ZENworks Endpoint Security Management
Securing Your Endpoints Using Novell ZENworks Endpoint Security ManagementSecuring Your Endpoints Using Novell ZENworks Endpoint Security Management
Securing Your Endpoints Using Novell ZENworks Endpoint Security ManagementNovell
 
2. FOMS _ FeedHenry_ Mícheál Ó Foghlú
2. FOMS _ FeedHenry_ Mícheál Ó Foghlú2. FOMS _ FeedHenry_ Mícheál Ó Foghlú
2. FOMS _ FeedHenry_ Mícheál Ó FoghlúFOMS011
 
Integration SharePoint 2010 with CRM 2010 by Mai Omar Desouki
Integration SharePoint 2010 with CRM 2010 by Mai Omar DesoukiIntegration SharePoint 2010 with CRM 2010 by Mai Omar Desouki
Integration SharePoint 2010 with CRM 2010 by Mai Omar DesoukiMai Omar Desouki
 
Beyond SPML: Access Provisioning in a Services World
Beyond SPML: Access Provisioning in a Services WorldBeyond SPML: Access Provisioning in a Services World
Beyond SPML: Access Provisioning in a Services WorldNishant Kaushik
 
Cloud Computing Security
Cloud Computing SecurityCloud Computing Security
Cloud Computing SecurityPiyush Mittal
 
IBM Pulse 2013 session - DevOps for Mobile Apps
IBM Pulse 2013 session - DevOps for Mobile AppsIBM Pulse 2013 session - DevOps for Mobile Apps
IBM Pulse 2013 session - DevOps for Mobile AppsSanjeev Sharma
 
Managing API Security in SaaS and Cloud
Managing API Security in SaaS and CloudManaging API Security in SaaS and Cloud
Managing API Security in SaaS and CloudCA API Management
 
Managing API Security in SaaS and Cloud
Managing API Security in SaaS and CloudManaging API Security in SaaS and Cloud
Managing API Security in SaaS and CloudCA API Management
 
Layer 7 Mobile Security Workshop with CA Technologies and Forrester Research ...
Layer 7 Mobile Security Workshop with CA Technologies and Forrester Research ...Layer 7 Mobile Security Workshop with CA Technologies and Forrester Research ...
Layer 7 Mobile Security Workshop with CA Technologies and Forrester Research ...CA API Management
 
Building reliable systems from unreliable components
Building reliable systems from unreliable componentsBuilding reliable systems from unreliable components
Building reliable systems from unreliable componentsArnon Rotem-Gal-Oz
 
Aras PLM Roadmap
Aras PLM RoadmapAras PLM Roadmap
Aras PLM RoadmapAras
 
Inaugural address manjusha - Indicthreads cloud computing conference 2011
Inaugural address manjusha -  Indicthreads cloud computing conference 2011Inaugural address manjusha -  Indicthreads cloud computing conference 2011
Inaugural address manjusha - Indicthreads cloud computing conference 2011IndicThreads
 
Beyond MDM: 5 Things You Must do to Secure Mobile Devices in the Enterprise
Beyond MDM: 5 Things You Must do to Secure Mobile Devices in the EnterpriseBeyond MDM: 5 Things You Must do to Secure Mobile Devices in the Enterprise
Beyond MDM: 5 Things You Must do to Secure Mobile Devices in the EnterpriseCA API Management
 
Development Model for The Cloud
Development Model for The CloudDevelopment Model for The Cloud
Development Model for The Cloudumityalcinalp
 
EMC Forum India 2011, Day 2 - Welcome Note by Manoj Chugh
EMC Forum India 2011, Day 2 - Welcome Note by Manoj ChughEMC Forum India 2011, Day 2 - Welcome Note by Manoj Chugh
EMC Forum India 2011, Day 2 - Welcome Note by Manoj ChughEMC Forum India
 
DevOps for Mobile - DevOpsDays, NY, 2013
DevOps for Mobile - DevOpsDays, NY, 2013DevOps for Mobile - DevOpsDays, NY, 2013
DevOps for Mobile - DevOpsDays, NY, 2013Sanjeev Sharma
 
Nimbus ninjas final 2012 berkeley
Nimbus ninjas final 2012 berkeleyNimbus ninjas final 2012 berkeley
Nimbus ninjas final 2012 berkeleyStanford University
 

Similaire à Track 2, session 5, aligning security with business kartik shahani (20)

Data Loss Prevention de RSA
Data Loss Prevention de RSAData Loss Prevention de RSA
Data Loss Prevention de RSA
 
Securing Your Endpoints Using Novell ZENworks Endpoint Security Management
Securing Your Endpoints Using Novell ZENworks Endpoint Security ManagementSecuring Your Endpoints Using Novell ZENworks Endpoint Security Management
Securing Your Endpoints Using Novell ZENworks Endpoint Security Management
 
2. FOMS _ FeedHenry_ Mícheál Ó Foghlú
2. FOMS _ FeedHenry_ Mícheál Ó Foghlú2. FOMS _ FeedHenry_ Mícheál Ó Foghlú
2. FOMS _ FeedHenry_ Mícheál Ó Foghlú
 
Integration SharePoint 2010 with CRM 2010 by Mai Omar Desouki
Integration SharePoint 2010 with CRM 2010 by Mai Omar DesoukiIntegration SharePoint 2010 with CRM 2010 by Mai Omar Desouki
Integration SharePoint 2010 with CRM 2010 by Mai Omar Desouki
 
Beyond SPML: Access Provisioning in a Services World
Beyond SPML: Access Provisioning in a Services WorldBeyond SPML: Access Provisioning in a Services World
Beyond SPML: Access Provisioning in a Services World
 
Cloud Computing Security
Cloud Computing SecurityCloud Computing Security
Cloud Computing Security
 
IBM Pulse 2013 session - DevOps for Mobile Apps
IBM Pulse 2013 session - DevOps for Mobile AppsIBM Pulse 2013 session - DevOps for Mobile Apps
IBM Pulse 2013 session - DevOps for Mobile Apps
 
Managing API Security in SaaS and Cloud
Managing API Security in SaaS and CloudManaging API Security in SaaS and Cloud
Managing API Security in SaaS and Cloud
 
Managing API Security in SaaS and Cloud
Managing API Security in SaaS and CloudManaging API Security in SaaS and Cloud
Managing API Security in SaaS and Cloud
 
DirectAccess
DirectAccessDirectAccess
DirectAccess
 
Layer 7 Mobile Security Workshop with CA Technologies and Forrester Research ...
Layer 7 Mobile Security Workshop with CA Technologies and Forrester Research ...Layer 7 Mobile Security Workshop with CA Technologies and Forrester Research ...
Layer 7 Mobile Security Workshop with CA Technologies and Forrester Research ...
 
Exchange 2013 ABC's: Architecture, Best Practices and Client Access
Exchange 2013 ABC's: Architecture, Best Practices and Client AccessExchange 2013 ABC's: Architecture, Best Practices and Client Access
Exchange 2013 ABC's: Architecture, Best Practices and Client Access
 
Building reliable systems from unreliable components
Building reliable systems from unreliable componentsBuilding reliable systems from unreliable components
Building reliable systems from unreliable components
 
Aras PLM Roadmap
Aras PLM RoadmapAras PLM Roadmap
Aras PLM Roadmap
 
Inaugural address manjusha - Indicthreads cloud computing conference 2011
Inaugural address manjusha -  Indicthreads cloud computing conference 2011Inaugural address manjusha -  Indicthreads cloud computing conference 2011
Inaugural address manjusha - Indicthreads cloud computing conference 2011
 
Beyond MDM: 5 Things You Must do to Secure Mobile Devices in the Enterprise
Beyond MDM: 5 Things You Must do to Secure Mobile Devices in the EnterpriseBeyond MDM: 5 Things You Must do to Secure Mobile Devices in the Enterprise
Beyond MDM: 5 Things You Must do to Secure Mobile Devices in the Enterprise
 
Development Model for The Cloud
Development Model for The CloudDevelopment Model for The Cloud
Development Model for The Cloud
 
EMC Forum India 2011, Day 2 - Welcome Note by Manoj Chugh
EMC Forum India 2011, Day 2 - Welcome Note by Manoj ChughEMC Forum India 2011, Day 2 - Welcome Note by Manoj Chugh
EMC Forum India 2011, Day 2 - Welcome Note by Manoj Chugh
 
DevOps for Mobile - DevOpsDays, NY, 2013
DevOps for Mobile - DevOpsDays, NY, 2013DevOps for Mobile - DevOpsDays, NY, 2013
DevOps for Mobile - DevOpsDays, NY, 2013
 
Nimbus ninjas final 2012 berkeley
Nimbus ninjas final 2012 berkeleyNimbus ninjas final 2012 berkeley
Nimbus ninjas final 2012 berkeley
 

Plus de EMC Forum India

Best Practices from EMC: Ingest High Availability Performance, Trust and Effi...
Best Practices from EMC: Ingest High Availability Performance, Trust and Effi...Best Practices from EMC: Ingest High Availability Performance, Trust and Effi...
Best Practices from EMC: Ingest High Availability Performance, Trust and Effi...EMC Forum India
 
Do More with Oracle Environment with Open and Best of breed Technologies
Do More with Oracle Environment with Open and Best of breed TechnologiesDo More with Oracle Environment with Open and Best of breed Technologies
Do More with Oracle Environment with Open and Best of breed TechnologiesEMC Forum India
 
Transform Microsoft Application Environment With EMC Information Infrastructure
Transform Microsoft Application Environment With EMC Information InfrastructureTransform Microsoft Application Environment With EMC Information Infrastructure
Transform Microsoft Application Environment With EMC Information InfrastructureEMC Forum India
 
White Paper on Disaster Recovery in Geographically dispersed cross site virtu...
White Paper on Disaster Recovery in Geographically dispersed cross site virtu...White Paper on Disaster Recovery in Geographically dispersed cross site virtu...
White Paper on Disaster Recovery in Geographically dispersed cross site virtu...EMC Forum India
 
H9539 vfcache-accelerates-microsoft-sql-server-vnx-wp
H9539 vfcache-accelerates-microsoft-sql-server-vnx-wpH9539 vfcache-accelerates-microsoft-sql-server-vnx-wp
H9539 vfcache-accelerates-microsoft-sql-server-vnx-wpEMC Forum India
 
An interesting whitepaper on How ‘EMC VFCACHE accelerates MS SQL Server’
An interesting whitepaper on How ‘EMC VFCACHE accelerates MS SQL Server’An interesting whitepaper on How ‘EMC VFCACHE accelerates MS SQL Server’
An interesting whitepaper on How ‘EMC VFCACHE accelerates MS SQL Server’EMC Forum India
 
Track 2, session 6 best practices to virtualize mission critical sap environm...
Track 2, session 6 best practices to virtualize mission critical sap environm...Track 2, session 6 best practices to virtualize mission critical sap environm...
Track 2, session 6 best practices to virtualize mission critical sap environm...EMC Forum India
 
Track 1, session 6, accelerating your cloud journey with advanced services ab...
Track 1, session 6, accelerating your cloud journey with advanced services ab...Track 1, session 6, accelerating your cloud journey with advanced services ab...
Track 1, session 6, accelerating your cloud journey with advanced services ab...EMC Forum India
 
Track3, session 5, implementing documentum and captiva based application and ...
Track3, session 5, implementing documentum and captiva based application and ...Track3, session 5, implementing documentum and captiva based application and ...
Track3, session 5, implementing documentum and captiva based application and ...EMC Forum India
 
Track 2, session 4, data protection and disaster recovery with riverbed
Track 2, session 4, data protection and disaster recovery with riverbedTrack 2, session 4, data protection and disaster recovery with riverbed
Track 2, session 4, data protection and disaster recovery with riverbedEMC Forum India
 
Track 1, session 4, hcl by adarsh singh, practice head, cloud computing
Track 1, session 4, hcl by adarsh singh, practice head, cloud computingTrack 1, session 4, hcl by adarsh singh, practice head, cloud computing
Track 1, session 4, hcl by adarsh singh, practice head, cloud computingEMC Forum India
 
Track 1, session 5, beat the backup blues pk gupta
Track  1, session 5, beat the backup blues pk guptaTrack  1, session 5, beat the backup blues pk gupta
Track 1, session 5, beat the backup blues pk guptaEMC Forum India
 
Track 3, session 3,big data infrastructure by sunil brid
Track 3, session 3,big data infrastructure by sunil bridTrack 3, session 3,big data infrastructure by sunil brid
Track 3, session 3,big data infrastructure by sunil bridEMC Forum India
 
Track 2, session 3, business continuity and disaster recovery in the virtuali...
Track 2, session 3, business continuity and disaster recovery in the virtuali...Track 2, session 3, business continuity and disaster recovery in the virtuali...
Track 2, session 3, business continuity and disaster recovery in the virtuali...EMC Forum India
 
Track 1, Session 3 - intelligent infrastructure for the virtualized world by ...
Track 1, Session 3 - intelligent infrastructure for the virtualized world by ...Track 1, Session 3 - intelligent infrastructure for the virtualized world by ...
Track 1, Session 3 - intelligent infrastructure for the virtualized world by ...EMC Forum India
 
Track 3, session 2, converged infrastructure
Track 3, session   2, converged infrastructureTrack 3, session   2, converged infrastructure
Track 3, session 2, converged infrastructureEMC Forum India
 
Track 2, Session 2, worlds most powerful intelligent and trusted storage syst...
Track 2, Session 2, worlds most powerful intelligent and trusted storage syst...Track 2, Session 2, worlds most powerful intelligent and trusted storage syst...
Track 2, Session 2, worlds most powerful intelligent and trusted storage syst...EMC Forum India
 
Track 1, Session 2, Flash by Amit Sharma
Track 1, Session 2, Flash by Amit SharmaTrack 1, Session 2, Flash by Amit Sharma
Track 1, Session 2, Flash by Amit SharmaEMC Forum India
 
Track 3 - next generation computing
Track 3 - next generation computingTrack 3 - next generation computing
Track 3 - next generation computingEMC Forum India
 
Track 2 - architecting data centres in the information economy wipro
Track 2 - architecting data centres in the information economy wiproTrack 2 - architecting data centres in the information economy wipro
Track 2 - architecting data centres in the information economy wiproEMC Forum India
 

Plus de EMC Forum India (20)

Best Practices from EMC: Ingest High Availability Performance, Trust and Effi...
Best Practices from EMC: Ingest High Availability Performance, Trust and Effi...Best Practices from EMC: Ingest High Availability Performance, Trust and Effi...
Best Practices from EMC: Ingest High Availability Performance, Trust and Effi...
 
Do More with Oracle Environment with Open and Best of breed Technologies
Do More with Oracle Environment with Open and Best of breed TechnologiesDo More with Oracle Environment with Open and Best of breed Technologies
Do More with Oracle Environment with Open and Best of breed Technologies
 
Transform Microsoft Application Environment With EMC Information Infrastructure
Transform Microsoft Application Environment With EMC Information InfrastructureTransform Microsoft Application Environment With EMC Information Infrastructure
Transform Microsoft Application Environment With EMC Information Infrastructure
 
White Paper on Disaster Recovery in Geographically dispersed cross site virtu...
White Paper on Disaster Recovery in Geographically dispersed cross site virtu...White Paper on Disaster Recovery in Geographically dispersed cross site virtu...
White Paper on Disaster Recovery in Geographically dispersed cross site virtu...
 
H9539 vfcache-accelerates-microsoft-sql-server-vnx-wp
H9539 vfcache-accelerates-microsoft-sql-server-vnx-wpH9539 vfcache-accelerates-microsoft-sql-server-vnx-wp
H9539 vfcache-accelerates-microsoft-sql-server-vnx-wp
 
An interesting whitepaper on How ‘EMC VFCACHE accelerates MS SQL Server’
An interesting whitepaper on How ‘EMC VFCACHE accelerates MS SQL Server’An interesting whitepaper on How ‘EMC VFCACHE accelerates MS SQL Server’
An interesting whitepaper on How ‘EMC VFCACHE accelerates MS SQL Server’
 
Track 2, session 6 best practices to virtualize mission critical sap environm...
Track 2, session 6 best practices to virtualize mission critical sap environm...Track 2, session 6 best practices to virtualize mission critical sap environm...
Track 2, session 6 best practices to virtualize mission critical sap environm...
 
Track 1, session 6, accelerating your cloud journey with advanced services ab...
Track 1, session 6, accelerating your cloud journey with advanced services ab...Track 1, session 6, accelerating your cloud journey with advanced services ab...
Track 1, session 6, accelerating your cloud journey with advanced services ab...
 
Track3, session 5, implementing documentum and captiva based application and ...
Track3, session 5, implementing documentum and captiva based application and ...Track3, session 5, implementing documentum and captiva based application and ...
Track3, session 5, implementing documentum and captiva based application and ...
 
Track 2, session 4, data protection and disaster recovery with riverbed
Track 2, session 4, data protection and disaster recovery with riverbedTrack 2, session 4, data protection and disaster recovery with riverbed
Track 2, session 4, data protection and disaster recovery with riverbed
 
Track 1, session 4, hcl by adarsh singh, practice head, cloud computing
Track 1, session 4, hcl by adarsh singh, practice head, cloud computingTrack 1, session 4, hcl by adarsh singh, practice head, cloud computing
Track 1, session 4, hcl by adarsh singh, practice head, cloud computing
 
Track 1, session 5, beat the backup blues pk gupta
Track  1, session 5, beat the backup blues pk guptaTrack  1, session 5, beat the backup blues pk gupta
Track 1, session 5, beat the backup blues pk gupta
 
Track 3, session 3,big data infrastructure by sunil brid
Track 3, session 3,big data infrastructure by sunil bridTrack 3, session 3,big data infrastructure by sunil brid
Track 3, session 3,big data infrastructure by sunil brid
 
Track 2, session 3, business continuity and disaster recovery in the virtuali...
Track 2, session 3, business continuity and disaster recovery in the virtuali...Track 2, session 3, business continuity and disaster recovery in the virtuali...
Track 2, session 3, business continuity and disaster recovery in the virtuali...
 
Track 1, Session 3 - intelligent infrastructure for the virtualized world by ...
Track 1, Session 3 - intelligent infrastructure for the virtualized world by ...Track 1, Session 3 - intelligent infrastructure for the virtualized world by ...
Track 1, Session 3 - intelligent infrastructure for the virtualized world by ...
 
Track 3, session 2, converged infrastructure
Track 3, session   2, converged infrastructureTrack 3, session   2, converged infrastructure
Track 3, session 2, converged infrastructure
 
Track 2, Session 2, worlds most powerful intelligent and trusted storage syst...
Track 2, Session 2, worlds most powerful intelligent and trusted storage syst...Track 2, Session 2, worlds most powerful intelligent and trusted storage syst...
Track 2, Session 2, worlds most powerful intelligent and trusted storage syst...
 
Track 1, Session 2, Flash by Amit Sharma
Track 1, Session 2, Flash by Amit SharmaTrack 1, Session 2, Flash by Amit Sharma
Track 1, Session 2, Flash by Amit Sharma
 
Track 3 - next generation computing
Track 3 - next generation computingTrack 3 - next generation computing
Track 3 - next generation computing
 
Track 2 - architecting data centres in the information economy wipro
Track 2 - architecting data centres in the information economy wiproTrack 2 - architecting data centres in the information economy wipro
Track 2 - architecting data centres in the information economy wipro
 

Dernier

Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesThousandEyes
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...panagenda
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditManual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditSkynet Technologies
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationKnoldus Inc.
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Alkin Tezuysal
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Farhan Tariq
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality AssuranceInflectra
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Hiroshi SHIBATA
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterMydbops
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentPim van der Noll
 

Dernier (20)

Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditManual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance Audit
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog Presentation
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL Router
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
 

Track 2, session 5, aligning security with business kartik shahani

  • 1. Aligning Security to Business 1 Cloud Meets Big Data 16-17 November 2011. Grand Hyatt - Mumbai
  • 2. Challenge: Expanding Identities Remote Employees Partners Customers Channels Channels Channels Partner Entry Points Customer Entry Points VPN Endpoint Network Apps/DB FS/CMS Storage Contractors Privileged Users Privileged Users Privileged Users Privileged Users Enterprise Production File Server Backup Tape Applications Database Internal Employees Business Replica SharePoint Disk Backup Analytics eRoom, etc. Arrays Disk 2 Cloud Meets Big Data © Copyright 2011 EMC Corporation. All rights reserved. 17-18 November 2011. Grand Hyatt - Mumbai 2
  • 3. Challenge: Expanding Infrastructure Mobility Cloud Remote Employees Partners Customers Partner Entry Points Partner Entry Points VPN Endpoint Network Apps/DB FS/CMS Storage Contractors Privileged Users Privileged Users Privileged Users Privileged Users Virtualization Enterprise Apps Backup Tape Internal Employees File Server Production Disk Arrays SharePoint Replica eRoom, etc. Backup Disk Business Analytics 3 Cloud Meets Big Data © Copyright 2011 EMC Corporation. All rights reserved. 17-18 November 2011. Grand Hyatt - Mumbai 3
  • 4. Challenge: Increasing Threats Remote Employees Partners Customers IP Sent to Channels App, DB or Encryption Channels Channels Stolen Stolen IP Fraud non trusted user Key Hack Credentials Partner Entry Points Partner Entry Points VPN Endpoint Network Apps/DB FS/CMS Storage Contractors Endpoint Privileged Leak Network Users Privileged Users Privileged Privileged Users Inappropriate Privileged Users Tapes lost or Email-IM-HTTP- theft/loss FTP-etc. User Breach Access stolen Enterprise Production File Server Backup Tape Data Leak Public Infrastructure Applications Database Unintentional (Semi) Trusted Discarded disk Internal Employees Via USB/Print Access Hack Distribution User Misuse exploited Business Replica SharePoint Disk Backup Analytics eRoom, etc. Arrays Disk 4 Cloud Meets Big Data © Copyright 2011 EMC Corporation. All rights reserved. 17-18 November 2011. Grand Hyatt - Mumbai 4
  • 5. The Dark Cloud Dark Cloud Phishing Mule Attacks Network Trojans Fraud Forum Attacks Discussion Cloud Stolen Credentials Stolen Database Cards Shop Financial Institutes 5 Cloud Meets Big Data © Copyright 2011 EMC Corporation. All rights reserved. 17-18 November 2011. Grand Hyatt - Mumbai 5
  • 6. Corporations are a new target for Cybercriminals • Cybercriminals increasingly targeting corporations • Value of extracted corporate resources is on the rise • Social networks make it easier to launch targeted attacks • Corporations required to harden their infrastructure 6 Cloud Meets Big Data © Copyright 2011 EMC Corporation. All rights reserved. 17-18 November 2011. Grand Hyatt - Mumbai 6
  • 7. Online Financial Fraud targeted at Financial Institutes Technical Operational Infrastructure Infrastructure Tools Hosting Delivery Mules Drops Monetizing Phishing Purchase Online Trojans Money Pharming Identity Communication Cash Out Transfer through Internet Banking Harvester Fraud forum / chat room Fraudster ATM Physical withdrawal Theft / Card Skimming IVR/Mobile Other Social Channel Engineering Withdrawal Techniques Mechanisms User Account 7 Cloud Meets Big Data © Copyright 2011 EMC Corporation. All rights reserved. 17-18 November 2011. Grand Hyatt - Mumbai 7
  • 8. Question Do you think Banks should implement a stronger form of authentication To identify online banking customers (other than user name & Password) when they log on and transact? A. Yes B. NO C. I have no preference 8 Cloud Meets Big Data © Copyright 2011 EMC Corporation. All rights reserved. 17-18 November 2011. Grand Hyatt - Mumbai 8
  • 9. Consumers Want Stronger Security for Online Banking Impact: Stronger Security Can Drive Portal Usage 9 Cloud Meets Big Data © Copyright 2011 EMC Corporation. All rights reserved. 17-18 November 2011. Grand Hyatt - Mumbai 9
  • 10. CSO/CIO Balancing Act Business Requirement Business Enablement Regulatory Customer Controls Services Information Innovation Protection Customer Productivity Protection Brand Globalization Protection 10 Cloud Meets Big Data © Copyright 2011 EMC Corporation. All rights reserved. 17-18 November 2011. Grand Hyatt - Mumbai 10
  • 11. Managing Information Infrastructure Security people Ensure the right have access to the right information over a trusted infrastructure Identities Infrastructure Information Endpoints Internet Corporate networks Enable Block Applications Public Sensitive Authorized Harmful Databases and files Marketing Health customers employees records Storage Earnings Partners Criminals IP/ PII Product Info Employees Spies Financial in a system/process that is easy and efficient to manage 11 Cloud Meets Big Data © Copyright 2011 EMC Corporation. All rights reserved. 17-18 November 2011. Grand Hyatt - Mumbai 11
  • 12. The RSA Approach Comprehensive Solutions GRC Real Time Analytics Actionable SIEM Policy Aggregate Orchestrate - Monitor Consoles Map Monitor Enforce - Protect Identities Information Servers/Apps 12 Cloud Meets Big Data © Copyright 2011 EMC Corporation. All rights reserved. 17-18 November 2011. Grand Hyatt - Mumbai 12
  • 13. Question In the light of the RSA approach to Risk Management, do you feel? A. Proactive solution is the way forward B. Benefits seem marginal compared to the effort and cost C. I am happy with the current setup 13 Cloud Meets Big Data © Copyright 2011 EMC Corporation. All rights reserved. 17-18 November 2011. Grand Hyatt - Mumbai 13
  • 14. Reserve Bank of India - Guidelines on Information security, Electronic Banking, Technology risk management and cyber frauds Requirements Tools GRC • Information Technology Governance • Information Security – Audit Management • IT Operations – Policy Management • It Services Outsourcing – User Awareness / communication tool • IS Audit – Incident Management • Cyber Frauds Security Operations Centre • Business Continuity Planning BS25599 compliance • Customer Education Risk Based Authentication and • Legal Issues Transaction Monitoring 14 Cloud Meets Big Data © Copyright 2011 EMC Corporation. All rights reserved. 17-18 November 2011. Grand Hyatt - Mumbai 14
  • 15. Customer Case Study BEFORE AFTER PROGRESSIVE BANK NEEDS Easy-to-implement , Deliver innovative online convenient risk-based banking services to authentication fraud down Investing in customer maintain industry-leading by 80% banking protection position. Combat growing with an online anti- threat of online fraud 24x7 monitoring and fraud strategy alerting on online/network Get Visibility of the network security risks “…RSA Adaptive and have proactive action Authentication and RSA taken FraudAction have accelerated Layered approach the route to market for our enhanced online banking Ensure Compliance as per resulted in >60% reduction security features…” regulator and corporate in phishing attacks and , SVP and CISO, Information governance accelerated route to Security Group, market with GRC 15 Cloud Meets Big Data 15 © Copyright 2011 EMC Corporation. All rights reserved. MENU 17-18 November 2011. Grand Hyatt - Mumbai 15
  • 16. Information Security RSA Objective 1: “Deliver innovative online banking services to maintain industry-leading position. Combat growing threat of online fraud” 16 Cloud Meets Big Data © Copyright 2011 EMC Corporation. All rights reserved. 17-18 November 2011. Grand Hyatt - Mumbai 16
  • 17. The RSA Approach Comprehensive Solutions Enforce - Protect Layer 1 Identities Identities Information Information Servers/Apps Servers/Apps Multi factor2FA / IPV authentication &RE DLP DLP 17 Cloud Meets Big Data © Copyright 2011 EMC Corporation. All rights reserved. 17-18 November 2011. Grand Hyatt - Mumbai 17
  • 18. Protection with Multiple Layers and of Multiple Channels  Adaptive  FraudAction Anti-  Adaptive Authentication  Access Manager Authentication Phishing  Adaptive Authentication for  Adaptive Authentication  ACS Services  FraudAction Anti- eCommerce  Transaction Monitoring  Transaction Trojan  Identity Verification Monitoring  Identity Verification  FraudAction  Adaptive Intelligence Authentication for  Identity Verification eCommerce  Identity Verification 18 Cloud Meets Big Data © Copyright 2011 EMC Corporation. All rights reserved. 17-18 November 2011. Grand Hyatt - Mumbai 18
  • 19. Protecting Fraud Channels using Multifactor Authentication Mobile Channel Analyze Access Risk EPI Channel Create risk score for access to sensitive resources Risk Engine Adaptive Authentication IVR Transactions, URLs, Logins, Web services Challenge eFraud OTP OOB (Phone Call) Questions Network Web Channel Ecommerce Protected Applications: Retail Net Banking and Cards Money Transfers Add Payee/ Beneficiary View Statement Support Financial Non Financial Financial Transactions Internal/NEFT /RTGS • TPT Request Statement • Internal • TPCC • External (TPT) Update Profile Visa Money Transfer • Address Bill Payment • Mobile /Email Electronic Payment Stop Cheques Interface Request Cheque book Third Party Credit Card Credit Card • Auto Pay • Enhance Credit Limit • Get Loan / Cash 19 Cloud Meets Big Data © Copyright 2011 EMC Corporation. All rights reserved. 17-18 November 2011. Grand Hyatt - Mumbai 19
  • 20. RSA Adaptive Authentication with Transaction Monitoring 20 Cloud Meets Big Data © Copyright 2011 EMC Corporation. All rights reserved. 17-18 November 2011. Grand Hyatt - Mumbai 20
  • 21. Securing Identities and Access using Multifactor RSA Authentication and Access Solutions Username/ Analyze Access Risk Create risk score for access to sensitive resources Password RSA Adaptive Authentication Higher Risk Multi-Factor User Authentication Low Risk Strong Authentication for access to sensitive resources RSA SecurID HW RSA SecurID SW On-Demand RSA Authentication Manager Multi-Access Control Control access to multiple resources Resource(s) RSA Access Manager (logins, URLs, web services, etc.) SAML Assertion Manage Trust Relationships Establish and control trust between organizations Trusted External Users RSA Federated Identity Manager 21 Cloud Meets Big Data © Copyright 2011 EMC Corporation. All rights reserved. 17-18 November 2011. Grand Hyatt - Mumbai 21
  • 22. DLP Covers Your Entire Infrastructure DLP Enterprise Manager DLP DLP Network DLP Datacenter Endpoint Connected Disconnected Email Web File shares SharePoint Databases PCs PCs DISCOVER        MONITOR        EDUCATE        ENFORCE        22 Cloud Meets Big Data © Copyright 2011 EMC Corporation. All rights reserved. 17-18 November 2011. Grand Hyatt - Mumbai 22
  • 23. RSA Risk Remediation Manager (RRM) SharePoint Business Grid Users Apply DRM Databases Virtual Grid Encrypt RSA DLP RSA DLP Delete / Shred NAS/SAN Datacenter RRM Change Permissions Temp Agents File File Activity GRC Policy Exception Servers Tools Systems Agents Endpoints Manage Remediation Apply Discover Sensitive Data Workflow Controls 23 Cloud Meets Big Data © Copyright 2011 EMC Corporation. All rights reserved. 17-18 November 2011. Grand Hyatt - Mumbai 23
  • 24. RSA Data Loss Prevention Suite DLP Unified Policy Mgmt & Incident Workflow Enterprise Manager Dashboard & User & System Enforcement Reporting Administration DLP Datacenter DLP Network DLP Endpoint Discover Monitor Discover File shares, SharePoint sites, Email, webmail, IM/Chat, FTP, Local drives, PST files, Office files, Databases, SAN/NAS HTTP/S, TCP/IP 300+ file types Remediate Enforce Enforce Delete, Move, Quarantine Allow, Notify, Block, Encrypt Allow, Justify, Block on Copy, Save As, Print, USB, Burn, etc. eDRM (e.g. RMS) Encryption Access Controls 24 24 Cloud Meets Big Data © Copyright 2011 EMC Corporation. All rights reserved. 17-18 November 2011. Grand Hyatt - Mumbai 24
  • 25. Information Security RSA Objective 2: “Get Visibility of the network and have proactive action taken” 25 Cloud Meets Big Data © Copyright 2011 EMC Corporation. All rights reserved. 17-18 November 2011. Grand Hyatt - Mumbai 25
  • 26. The RSA Approach Comprehensive Solutions Aggregate Orchestrate - Monitor Layer 2 Consoles Map Monitor Enforce - Protect Layer 1 Identities Information Servers/Apps Multifactor Authentication &RE DLP 26 Cloud Meets Big Data © Copyright 2011 EMC Corporation. All rights reserved. 17-18 November 2011. Grand Hyatt - Mumbai 26
  • 27. How SIEM Enhances Security Operations Risk and Operations Efficiency Monitoring (Manager) Incident Big Board Web SOC asset, exposure, incident, vulnerability reports Security Operations monitor Dashboard Incident Management Workflow (Analyst) Management open, reassign, add logs, notate, escalate, close incident Automatic correlation, alerting, auto assignment, prioritization, escalation Notification Processes (System) Log Vulnerabiltiy Repository Asset DB KnowledgeBase bulk patch imports info CVEs events firewalls intrusion servers applications configuration scanners 27 Cloud Meets Big Data detection © Copyright 2011 EMC Corporation. All rights reserved. management tools 17-18 November 2011. Grand Hyatt - Mumbai 27
  • 28. RSA Security Incident Management in Action Events occur on critical systems indicating a potential 1 security breach. RSA enVision enVision collects the events for immediate triage and 2 reporting. Based on Event Rules, an Alert is triggered and 3 security administrators are notified. The RSA Connector Framework automatically creates an RSA Connector Framework Incident in RSA Archer Incident Management associating the specific Event data to the Incident. RSA Archer Incident Management Security Administrators use the Incident 4 Management capabilities in RSA Archer along with information from the RSA Archer Enterprise Management to assess the situation. An investigation is initiated and the incident is tracked and resolved. The CISO has complete visibility through the entire RSA Archer Enterprise Management 5 process via dashboards and reporting. Business Business Hierarchy Product/Services Processes Information Applications Devices Facilities 28 Cloud Meets Big Data © Copyright 2011 EMC Corporation. All rights reserved. 17-18 November 2011. Grand Hyatt - Mumbai 28
  • 29. RSA enVision Enterprise/Security Operations Model Correlation Reporting Real-time Correlation/Base-lining Alerter Collaborative Incident Management Task Triage Auto-assignment Auto-prioritization Open Task EE Event Auto-escalation Trace Reassign Task Annotate EE EE Auto- Watch False IDS Alert DB Escalation lists Suppression Event Close Task Log Collection Trace Asset Escalate Task Vulnerabilities Events Asset Feedback Ticketing Vulnerability IPDB DB Loop System Discovered KB Changes Web SOC Monitor Bulk VA Logs Config VAM 1. IncidentRisk Big Board Imports Reports Actions Reporting 2. SOC Efficiency Monitor Asset Reports Exposure Reports Incident Reports Web Vulnerability KB Reports FWs IDSs Apps CMDBs Scanners Farm & Config Managers 29 Cloud Meets Big Data © Copyright 2011 EMC Corporation. All rights reserved. 17-18 November 2011. Grand Hyatt - Mumbai 29
  • 30. RSA enVision Deployment …to a distributed, enterprise-wide architecture Scheduled Ad Hoc Realtime Realtime Realtime eMail Reports Reports Alerting Correlation Alerting Alerts Analyze Analyze Collect Remotely Manage Manage Manage Manage Windows Servers Stockholm Collect Collect Collect Collect Collect Collect Collect Collect Collect Collect Remotely Storage Oracle Windows Netscreen Windows Trend Micro Storage Oracle Cisco IPS Cisco IPS Device Financial Server Firewall Workstation Antivirus Device Financial Mexico India Europe China Local Collection with Global Analysis Fine Grain Role-Based Access Control 30 Cloud Meets Big Data © Copyright 2011 EMC Corporation. All rights reserved. 17-18 November 2011. Grand Hyatt - Mumbai 30
  • 31. Information Security RSA Objective 3: “Ensure Compliance as per regulator and corporate governance” 31 Cloud Meets Big Data © Copyright 2011 EMC Corporation. All rights reserved. 17-18 November 2011. Grand Hyatt - Mumbai 31
  • 32. The RSA Approach Comprehensive Solutions Real Time Analytics RSA Archer (eGRC) (Netwitness) Layer 3 Panorama SIEM (Envision) Policy Aggregate Orchestrate - Monitor Layer 2 Consoles Map Monitor Enforce - Protect Layer 1 Identities Information Servers/Apps 32 Cloud Meets Big Data © Copyright 2011 EMC Corporation. All rights reserved. 17-18 November 2011. Grand Hyatt - Mumbai 32
  • 33. The Security Incident Management Solution Infrastructure Audit Trail Collectors Collects and manages enVision RSA enVision event data; Identifies critical issues from log data. Event Database Reporting Event Rules Alerts Seamlessly integrates RSA Connector Framework SEIM infrastructure and GRC platform. Network Forensic Analysis • Automated Malware analysis and prioritization RSA Archer Incident Management Supports complete • Network Session Modeling incident lifecycle • Network Forensic Store management from identification to Investigations Incidents Incident Events resolution. RSA Archer Enterprise Management Brings business context of asset information to Incident Management for prioritization and reporting events in the context of IT GRC. Business Business Hierarchy Product/Services Processes Information Applications Devices Facilities 33 Cloud Meets Big Data © Copyright 2011 EMC Corporation. All rights reserved. 17-18 November 2011. Grand Hyatt - Mumbai 33
  • 34. Introducing the NetWitness Network Security Analysis Platform Automated Malware Analysis and Prioritization Automated Threat Reporting, Alerting and Integration Freeform Analytics for Investigations and Real-time Answers Revolutionary Visualization of Content for Rapid Review 34 Cloud Meets Big Data © Copyright 2011 EMC Corporation. All rights reserved. 17-18 November 2011. Grand Hyatt - Mumbai 34
  • 35. RSA Incident Management • Industry leading Security Incident and Event Management (SIEM) technology for the automated identification and escalation of high priority security incidents • Industry leading Incident Management solution that can handle proactive incidents no matter how they are detected giving complete flexibility in managing incident workflow using Panorama reporting into GRC • A GRC platform that brings unprecedented business context to Incident Management processes and incorporates security incidents into wider enterprise Business risk management and compliance reporting and Processes actionable decisions. Information Devices Applications 35 Cloud Meets Big Data © Copyright 2011 EMC Corporation. All rights reserved. 17-18 November 2011. Grand Hyatt - Mumbai 35
  • 36. Creating Actionable Intel. from Data Overload ITGRC: Data Governance , Risk, Incident BCM & RBI Compliance Compliance Management Assessment Process Controls Technical Controls •Nessus, Qualys, VA and Threat Veracode, External Process Control Testing Vulnerabilities Extreme Management threat feeds etc. PCI DSS SAQ Self Assessment Compliance High • Control Exception Exception Management Management • Documented ISO 27001 Assessment Mis-Configurations High Exceptions ISO 27001 • User Groups Assessment Access Extreme User Access • Roles and BS25999 Assessment Permissions Management BS25999 Incidents Priority Incidents Feed Assessment Assets Classification Envision Policy Comp. Assessment Inputs and Process Automation Layer Other Incidents Asset Feed Asset Feed DLP Violations Feed BCM Physical Security Information Asset DLP Incidents Incidents Assets Management (CMDB) 36 Cloud Meets Big Data © Copyright 2011 EMC Corporation. All rights reserved. 17-18 November 2011. Grand Hyatt - Mumbai 36
  • 37. GRC Processes Automation Framework Assessments (Risk, Compliance, Audit, BCM, and Vendor) • Audit Management • Audit Programs • Risk Assessments Governance • Compliance Assessments Monitoring • Vendor Management • Holistic GRC Reporting • BCM • Frauds • Dashboard: Risk & Compliance • Monitoring of Compliance, • Key Perf. Indicators (KPI) Vulnerabilities and Threats • Key Risks Indicators (KRI) • Monitoring of the KRI, KPIs • Key Controls • Findings Management • Performance Mgmt • Remediation Plan Management • Process Performance • Exception Management • Governance (e.g. coverage) • Global SOC • Performance & Quality Reviews • Global CERT Enterprise Management GRC Portal • Targets of Evaluation: Business • Corporate Communication Processes, Business Units, • Content Delivery Information Assets, • Compliance, Risk , BCM and Security • Target of Reporting: Business Hierarchy: • Asset Classification • Policy Management Archer Awareness, Trainings, Surveys • Website (single entry point) • Incidents Reporting: • Compliance, • Risk Register • Security/Loss event • Identification of the Risk from various sources 37 Cloud Meets Big Data © Copyright 2011 EMC Corporation. All rights reserved. 17-18 November 2011. Grand Hyatt - Mumbai 37
  • 38. Enabling Effective Security Incident Management With RSA’s Security Incident Management Solution you can: • Collect security relevant events across your infrastructure • Prioritize incidents based upon business context • Manage incidents and investigations proactively to combat APT • Report on your security and compliance posture 38 Cloud Meets Big Data © Copyright 2011 EMC Corporation. All rights reserved. 17-18 November 2011. Grand Hyatt - Mumbai 38
  • 39. Conclusion: End-to-End Layered Protection is required. “A Lock on the Door” is Not Enough Enterprise Governance Risk and Compliance Internal SOC On-Demand 39 Cloud Meets Big Data © Copyright 2011 EMC Corporation. All rights reserved. 17-18 November 2011. Grand Hyatt - Mumbai 39
  • 40. RSA overall solution implementation Business Reporting enVision Geo Info Division Identity Data IPS Archer Event Aggregation AV EP Auth Incidents Policies Threats WAF Data Enhancement DLP FW WLAN URL Department Location Regulation Asset Value AD Panorama SOC Investigations Netwitness 40 Cloud Meets Big Data © Copyright 2011 EMC Corporation. All rights reserved. 17-18 November 2011. Grand Hyatt - Mumbai 40
  • 41. Cloud Compliance Architecture 41 Cloud Meets Big Data © Copyright 2011 EMC Corporation. All rights reserved. 17-18 November 2011. Grand Hyatt - Mumbai 41
  • 42. Positive Business Outcome The objectives of the customer were met with a cost effective Integrated Solution • Increase customer confidence in online transactions (30% increase YoY) • Reduce the Fraud and AntiPhishing / Anti Trojan for customers (>60%) • Provide 24X7 Visibility of the Network and report critical incidents • Proactive monitoring to save against APT’s • Automated Compliance Reporting meeting Corporate and regulations 42 Cloud Meets Big Data © Copyright 2011 EMC Corporation. All rights reserved. 17-18 November 2011. Grand Hyatt - Mumbai 42
  • 43. Summary Key Take aways: A breach/Incident is inevitable the key is to reduce the “Window of Vulnerability” Use technology as a Business Enhancer rather than a cost Your technology provider is a Partner not a Vendor choose Wisely Risk Management is Strategic not Tactical - Scalable, Adaptive , Layered RSA –EMC Can be that Partner 43 Cloud Meets Big Data © Copyright 2011 EMC Corporation. All rights reserved. 17-18 November 2011. Grand Hyatt - Mumbai 43
  • 44. Question With the presentation as a backdrop, what course would to take? A. I would go ahead with an Integrated solution B. I would go ahead with a Best of Breed Solution C. I would go ahead with a Best for Need Solution 44 Cloud Meets Big Data © Copyright 2011 EMC Corporation. All rights reserved. 17-18 November 2011. Grand Hyatt - Mumbai 44
  • 45. THANK YOU 45 Cloud Meets Big Data © Copyright 2011 EMC Corporation. All rights reserved. 17-18 November 2011. Grand Hyatt - Mumbai 45

Notes de l'éditeur

  1. Fraud has been evolving all the while we have been preparing to fight fraudPhishing attacks require very few resources to launchPhishers are getting smarterPhishers NEVER get caughtTrojans have entered the arenaTrojan attacks are targeted attacks impacting only specific organizationsThere is no one silver Bullet.
  2. This has caused user’s to want more security. Well this is actually a good thing! One of the biggest barriers to secuirty is usability and the impact it has on user’s perceptions about any type of portal. The more willing user’s are to accept security, the better value the business will get out of deploying security. As you can see a strong majority of users want online banking security beyond a username and password.
  3.  IntroHDFC Bank is one of India’s leading financial institutions and one of the 50 best companies in Asia Pacific according to Forbes MagazineDeveloped one of the first online banking services in India, supporting third-party transactions, but needed to protect customers from growing threat of frauds like phishing, pharming and TrojansRSA Adaptive Authentication platform powered by RSA® Risk Engine enables risk-based authentication and fraud detectionRSA FraudAction service offers 24x7 monitoring and alerting to online security risksPhishing attacks against HDFC Bank customers significantly reducedComprehensive layered security platform gives bank better visibility of threats ChallengeHDFC Bank is committed to maintaining its position as a leader in the Asia Pacific financial industry through delivery of innovative banking servicesIt wanted to launch online support for third-party transactions but needed to ensure customers’ private personal and financial data was protected from increasing threat of online fraud from activities such as phishing, pharming and Trojans Needed a security platform that would be easy for customers to use while enabling HDFC Bank to maintain complete visibility and control of any risks to its online environment SolutionSelected RSA Adaptive Authentication – an intelligent system powered by the RSA Risk Engine to enable authentication of users behind-the-scenes by measuring a series of risk indicators – only challenging users in higher risk scenariosAlso deployed RSA FraudAction service which provides constant monitoring of online security threats and real-time alerting when one is detectedHDFC Bank therefore able to determine whether fraud might be taking place, and require additional pre-registered security questions to be answered before access is granted ResultsPhishing attacks against HDFC Bank’s online banking customers have reduced by 60% with successful fraud attacks down to almost zero.Response time to phishing attacks has reduced to a little as five hours – well below the industry averageMulti-layered online security strategy gives customers peace-of-mind and easy online experience while bank can be more responsive to any threats that arrive
  4. Key talking PointsTypically you see risk in one or more of the areas shown here. From L-R, corporate email (SMTP email), web traffic (includes web mail, FTP traffic, blogs, wikis, social posting onto Linked In or Facebook, IM, etc.), file shares, SharePoint sites or other content repositories, databases, PCs connected to your corporate network and the last is laptops not connected to your networks but still are capable of transmitting data to the web or peripheral devices.You want to map the four phases we just talked about with these risk sources.RSA offer solutions for every phase for every risk source.Starting with DLP Network for email and web traffic. This is for all data in motion.DLP Datacenter for all data at rest that resides on file shares, databases, repositories, etc.DLP Endpoint for data in use on laptops and PCs.One key point to note is the manageability of DLP across all the four phases and all the risk sources. RSA offers a single console to manage anything and everything to do with DLP. It’s called the RSA DLP Enterprise Manager. It’s a powerful management console, to manage policies, configure devices, collect incidents or violations, generate reports, etc.
  5. Talking points:This is how RSA solves the challenge of risk of sensitive data at rest. You want to think beyond basic discovery of data (most vendors stop at discovering the data) and think about the right process for remediating the exposed risk.Depending on the type of infrastructure you have you can leverage RSA grid technology or agent based scanning to discovery all the sensitive data in various file repositories. RSA has native support for SharePoint 2010 (we take advantage of SharePoint APIs to scan files, blogs, notes saved in SharePoint).Once the location of sensitive data is identified you might want to communicate with the business user to figure out the right remediation for the file. If you do not involve the business user or understand the business context and apply a blanket control such as encryption it will potentially have a HUGE negative impact to business.RSA offers a robust framework to facilitate the workflow of identifying the business user/owner and communicating with them about sensitive files. RSA’s Risk Remediation Manager (RRM) module can map data from File Activity Monitoring systems (such as Imperva or Varonis) and provide insight into what files are sensitive and who has been using these filesYou can leverage RRM to group this data and send out questionnaires to the business owners. Instead of managing the communication through 1000s of emails and 100s of spreadsheets you can now have a central repository that offers a auditable and repeatable process for remediation.Once all the business context is added and remediation options are determined you can enforce controls through DLP or other IT tools. Note: the remediation information from RRM does not automatically flow into DLP. Remediation has to be done manually (automated scripts to delete files for example).
  6.  
  7.  
  8. NetWitness is an enterprise security platform. In order to understand why it provides unique value to leading security teams, it’s important to understand a bit about the architecture.NetWitness includes a pervasive infrastructure that captures everything crossing the wire, for example at key Internet gateways, critical network choke points, or partner network connections. While NetWitness captures all the data to disk, it also uses a patented process to extract the metadata depicted in the data cube. These 100’s of metadata are the key characteristics or descriptors of the network traffic that are essential to network security analysis by security teams. No other technology provides this depth and breath of network analysis and indexing at line speed at capture time.NetWitness also stands alone in this space by using a content management framework known as NetWitness Live, which permits the real-time integration and fusion of security intelligence from global security community, or from your own organization or community of interest. Live manages this real-time data fusion that also includes objects such as new protocol parsers, rules, alerts, apps and other content. All of this information is made available via an open API, and our core applications leverage this interface to provide unique visibility into what is happening on the network, and to address specific information risk problems.Spectrum provides automated malware analysis and prioritization focused on zero-day and targeted malware.Informer facilitates real-time reporting and alerting around specific problem sets such as APTs, hacker/malware, inappropriate use, data leakage, and much more. It also facilities integration with both enVision and 3rd party SIEM products.Investigator is the award winning, interactive network analysis tool, permitting freeform analysis of hundreds of terabytes of data and giving the security team the power to answer any question – past, present, or future with precision and detail.Visualize provides a graphic rendering of queries from investigator or Informer, presenting a “Minority Report”-like, multi-touch interface for rapid visualization and review of content.NetWitness is designed with one idea in mind: once you record everything, you can re-use the data to answer any question you have about any type of security problem. This approach saves you time and money.
  9. The RSA Security Incident Management Solution differentiates itself from the competition by:Seamlessly integrating industry leading Security Incident and Event Management (SIEM) technology RSA enVision for the automated identification and escalation of high priority security incidents – unlike other IT GRC vendors like Symantec, RSAM or AgilienceIncorporating business context like the business criticality of assets involved, the business processes affected, or the history of similar incidents affecting the group managing those affected systems – unlike other SIEM vendors like ArcSight, Q1 Labs or NitroIncluding a full-blown, industry strength Incident Management solution that can handle incidents no matter how they are detected, and give unprecedented flexibility in managing incident workflow unlike other SIEM vendors like ArcSight, Q1 Labs or NitroProviding a platform that can automatically incorporate security incidents into wider enterprise risk management and compliance reporting processes unlike other enterprise GRC vendors like IBM, BWise
  10. Trusted Virtualization EnvironmentWhile IaaS components have been relatively safe in the past, data centers are increasingly finding their servers under attack – not just by the more common viruses and Trojans, but by more sophisticated, coordinated security threats. As companies expand their use of clouds and as the exploitable value of information and business transactions handled within clouds continue to grow, it’s only reasonable to expect that clouds will become stronger magnets for malware attacks Need to “harden” hypervisorsVMware offers detailed set of hardening guidelines to mitigate security risksHardware Root of TrustThe foundation of Trusted Computing Infrastructure is the hardware root of trust, which establishes a bottoms-up security posture based on hardware components embedded with inalterable security technology.In servers equipped with these secure computing chips, such as Intel’s Trusted Execution Technology, the embedded security technology examines and measures all processing components to attest to a trusted profile every time the server is turned on or reset(Click)As an industry, we now have the opportunity to build security controls, such as Data Loss Prevention, into the infrastructure