secureit 2013 - your file development in cyber systems - ruchin kumar, safenet

40
1 © SafeNet Confidential and Proprietary Secure The Information Breach Ruchin Kumar Security Evangelist – India & SAARC SafeNet Inc [email protected]

Upload: elets-technomedia-pvt-ltd

Post on 12-Jan-2015

182 views

Category:

News & Politics


5 download

DESCRIPTION

 

TRANSCRIPT

Page 1: SecureIT 2013 - Your file Development in Cyber Systems - Ruchin Kumar, SafeNet

1© SafeNet Confidential and Proprietary

Secure The Information Breach

Ruchin KumarSecurity Evangelist – India & SAARCSafeNet [email protected]

Page 2: SecureIT 2013 - Your file Development in Cyber Systems - Ruchin Kumar, SafeNet

2

IT Landscape is at a Tipping Point

Consumerization of IT Shift in Service Deliver Models Data moving to the Cloud Increasingly Complex Threat

Landscape

Page 3: SecureIT 2013 - Your file Development in Cyber Systems - Ruchin Kumar, SafeNet

3

SafeNet ‘Secure Breach’ Survey….Coming Soon…April 2013

31% admitted that their perimeter has been breached

20% were not sure if they’d been breached.

38% believe unauthorized users currently have access to their networks.

65% think they will suffer a data breach within 3 years

59% believe if their perimeter is breached, their data would not be safe.

20% wouldn’t trust their own company with their personal data….

Page 4: SecureIT 2013 - Your file Development in Cyber Systems - Ruchin Kumar, SafeNet

4

A New Mindset is Needed

Sole Perimeter Security is No Longer Enough

Breaches Will Happen and We Must Prepare Differently

Data is the New Perimeter

Page 5: SecureIT 2013 - Your file Development in Cyber Systems - Ruchin Kumar, SafeNet

5

State of Data Protection: Protect What Matters, Where it Matters

Page 6: SecureIT 2013 - Your file Development in Cyber Systems - Ruchin Kumar, SafeNet

6

The recent wave of breaches is just the start

Page 7: SecureIT 2013 - Your file Development in Cyber Systems - Ruchin Kumar, SafeNet

7

The cloud & virtualization waves will only get higher

Page 8: SecureIT 2013 - Your file Development in Cyber Systems - Ruchin Kumar, SafeNet

8

Encryption will play vital role in protection of information assets

Page 9: SecureIT 2013 - Your file Development in Cyber Systems - Ruchin Kumar, SafeNet

9

You need to protect what matters where it matters

Page 10: SecureIT 2013 - Your file Development in Cyber Systems - Ruchin Kumar, SafeNet

10

It’s the Dawn of the Breach Prevention Era

Page 11: SecureIT 2013 - Your file Development in Cyber Systems - Ruchin Kumar, SafeNet

11

And for Next Year

Page 12: SecureIT 2013 - Your file Development in Cyber Systems - Ruchin Kumar, SafeNet

12

CISOs will be forced to think breach acceptance and Securing the Breach

Page 13: SecureIT 2013 - Your file Development in Cyber Systems - Ruchin Kumar, SafeNet

13

Companies will Encrypt way more data. But only if it just works.

Page 14: SecureIT 2013 - Your file Development in Cyber Systems - Ruchin Kumar, SafeNet

14

IT/IS consolidation will be a top priority for large companies and Security will need to ‘consolidate with it’

Page 15: SecureIT 2013 - Your file Development in Cyber Systems - Ruchin Kumar, SafeNet

15

CBEO

Page 16: SecureIT 2013 - Your file Development in Cyber Systems - Ruchin Kumar, SafeNet

16

The Chief Business Enablement Officer

Page 17: SecureIT 2013 - Your file Development in Cyber Systems - Ruchin Kumar, SafeNet

17

We Enable Business By Helping Customer Say Yes

Page 18: SecureIT 2013 - Your file Development in Cyber Systems - Ruchin Kumar, SafeNet

18

Say yes to more data center consolidation

Page 19: SecureIT 2013 - Your file Development in Cyber Systems - Ruchin Kumar, SafeNet

19

Say yes to a shared services infrastructure

Page 20: SecureIT 2013 - Your file Development in Cyber Systems - Ruchin Kumar, SafeNet

20

Say yes to Virtualizing their critical apps

Page 21: SecureIT 2013 - Your file Development in Cyber Systems - Ruchin Kumar, SafeNet

21

Say yes to moving their critical apps to the cloud

Page 22: SecureIT 2013 - Your file Development in Cyber Systems - Ruchin Kumar, SafeNet

22

Say yes to more IT as a Service

Page 23: SecureIT 2013 - Your file Development in Cyber Systems - Ruchin Kumar, SafeNet

23

Say yes to better authentication for everyone

Page 24: SecureIT 2013 - Your file Development in Cyber Systems - Ruchin Kumar, SafeNet

24

Say yes to online transactions

Page 25: SecureIT 2013 - Your file Development in Cyber Systems - Ruchin Kumar, SafeNet

25

Say yes to sensitive workloads in the cloud

Page 26: SecureIT 2013 - Your file Development in Cyber Systems - Ruchin Kumar, SafeNet

26

Say yes to SaaS

Page 27: SecureIT 2013 - Your file Development in Cyber Systems - Ruchin Kumar, SafeNet

27

Say yes to file shares

Page 28: SecureIT 2013 - Your file Development in Cyber Systems - Ruchin Kumar, SafeNet

28

Say yes to Sharepoint

Page 29: SecureIT 2013 - Your file Development in Cyber Systems - Ruchin Kumar, SafeNet

29

Say yes to data protection

Page 30: SecureIT 2013 - Your file Development in Cyber Systems - Ruchin Kumar, SafeNet

30

Now, forget everything I said for just a sec

Page 31: SecureIT 2013 - Your file Development in Cyber Systems - Ruchin Kumar, SafeNet

31

Say yes to more agility

Page 32: SecureIT 2013 - Your file Development in Cyber Systems - Ruchin Kumar, SafeNet

32

Say yes to more efficiency

Page 33: SecureIT 2013 - Your file Development in Cyber Systems - Ruchin Kumar, SafeNet

33

Say yes to more revenue

Page 34: SecureIT 2013 - Your file Development in Cyber Systems - Ruchin Kumar, SafeNet

34

Say yes to less risk

Page 35: SecureIT 2013 - Your file Development in Cyber Systems - Ruchin Kumar, SafeNet

35

Say NO! to the next breach

Page 36: SecureIT 2013 - Your file Development in Cyber Systems - Ruchin Kumar, SafeNet

36

Encryption as Structural Data Protection

Local H/W orS/W CSPs

App

Applications DBs Files & Storage

Identity and Authentication

Virtualization

Tokens

Identity Server

Key-Policy Management

Page 37: SecureIT 2013 - Your file Development in Cyber Systems - Ruchin Kumar, SafeNet

37

Data Protection - To the Cloud – Is Now

Private Cloud

External CloudInternal CloudFEDERATION

File Servers

Application and web servers

Databases

Mainframes

Enterprise Key-Management

DataSecure & KeySecure

NAS/SAN Storage

Tokenization

Manager

ProtectZ

ProtectDBProtectApp

ProtectFile

DATACENTER

ProtectV

Virtual Machines

Authentication Service

HSM as a Service

StorageSecure

Page 38: SecureIT 2013 - Your file Development in Cyber Systems - Ruchin Kumar, SafeNet

38

SafeNet Asia Pacific

Regional headquarters: Hong Kong

Offices: Australia (ANZ), China, India (SARRC), Japan, Korea, Singapore (ASEAN), Hong Kong (Taiwan)

APAC employees: Over 430 employees including sales, engineers, operations and technical support

R&D centers: India & China

Page 39: SecureIT 2013 - Your file Development in Cyber Systems - Ruchin Kumar, SafeNet

39

Where We Focus

Software Monetization Solutions

Identity and Transaction Protection

Data Encryption and Control

Secure Communications

Compliance and Governance

Data Protection in Cloud & Virtual Environments

Solutions Customers

Enterprise

Government

Banking

Data Protection Solutions

Page 40: SecureIT 2013 - Your file Development in Cyber Systems - Ruchin Kumar, SafeNet

40

Thank You

Queries????