intelligence driven security

14
1 RSA CONFIDENTIAL—INTERNAL USE ONLY Intelligence Driven Security 07.10.2015 Lara MAIER Distribution Manager G,A, CEE&SEE

Upload: marketingarrowecscz

Post on 13-Apr-2017

509 views

Category:

Technology


0 download

TRANSCRIPT

1RSA CONFIDENTIAL—INTERNAL USE ONLY

Intelligence Driven Security07.10.2015

Lara MAIER Distribution

Manager G,A, CEE&SEE

2RSA CONFIDENTIAL—INTERNAL USE ONLY

RSA is about delivering a Trusted Digital World and we do that by applying our Intelligence Driven Security Strategy

RSAWhat do we stand for and why?

3RSA CONFIDENTIAL—INTERNAL USE ONLY

Agenda Evolving IT Infrastructure The Changing Threat Landscape Kill Chain Intelligence Driven Security Benefits of Intelligence Driven Security

4RSA CONFIDENTIAL—INTERNAL USE ONLY

Mainframe, Mini ComputerTerminals

LAN/Internet Client/ServerPC

Mobile Cloud Big Data SocialMobile Devices

1ST PLATFORM

2ND PLATFORM

3RD PLATFORM

MILLIONS OF USERS

THOUSANDSOF APPS

HUNDREDS OF MILLIONS OF USERS

TENS OF THOUSANDSOF APPS

BILLIONSOF USERS

MILLIONSOF APPS

Source: IDC, 2012

2010

1990

1970

5RSA CONFIDENTIAL—INTERNAL USE ONLY

CustomersPartners

Third-Parties

On-Prem

MobileEmployees

BYOD

Cloud

Shadow IT

THE EVOLVING IT INFRASTRUCTURE

6RSA CONFIDENTIAL—INTERNAL USE ONLY

SECURITY & RISK CHALLENGES

CustomersPartners

Third-Parties

On-Prem

MobileEmployees

BYOD

Cloud

Shadow IT

Managing Identities & Access

Detecting & StoppingThreats

Preventing Fraud &Cybercrime

EnsuringCompliance

7RSA CONFIDENTIAL—INTERNAL USE ONLY

Emergence of New Attackers

Nation state

actors

PII, government, defense industrial base, IP rich organizations

Criminals

Petty criminals Organized crimeOrganized, sophisticated supply chains (PII, financial services, retail)

Unsophisticated

Non-state actors

Terrorists Anti-establishment vigilantes“Hacktivists”Targets of opportunity

PII, Government, critical infrastructure

8RSA CONFIDENTIAL—INTERNAL USE ONLY

Intrusion Kill Chain

9RSA CONFIDENTIAL—INTERNAL USE ONLY

THE SOLUTION: INTELLIGENCE DRIVEN SECURITY

10RSA CONFIDENTIAL—INTERNAL USE ONLY

OnPrem

Cloud

11RSA CONFIDENTIAL—INTERNAL USE ONLY

SHIFT PRIORITIES AND CAPABILITIES

Today’sPriorities

Prevention80%

Monitoring15%

Response5%

Prevention80%

Monitoring15%

Response5%

Prevention33%

Intelligence-DrivenSecurity

Monitoring33%

Response33%

12RSA CONFIDENTIAL—INTERNAL USE ONLY

RSA’S PRODUCT PORTFOLIO

IDENTITY & ACCESS

SecurID – Adaptive Authentication – Identity Mgmt & Gov

GOVERNANCE, RISK, & COMPLIANCEArcher GRC

MONITORING & ANALYTICSSecurity Analytics – ECAT

Web Threat Detection

RSA Research

13RSA CONFIDENTIAL—INTERNAL USE ONLY

• Risk-driven– Prioritize activity and resources

appropriately• Incremental and achievable

– New capabilities improve your maturity over time

• Future-proof– Enables response to changes in landscape

not based on adding new products• Agile

– Enables the business to take advantage of new technology and IT-driven opportunities

THE BENEFITS OF OUR APPROACH

EMC, RSA, the EMC logo and the RSA logo are trademarks of EMC Corporation in the U.S. and other countries.