rsa, the security division of emc - execute · rsa, the security division of emc the expert in...
TRANSCRIPT
RSA, The Security Division of EMCThe Expert in Information-Centric Security
eXecure Technology Day 07 31/01/2007Nick Parisi | Sales Manager SwitzerlandRSA, The Security Division of EMCIm Schörli 5, CH-8600, Dübendorf, Switzerlandtel: +41 44 882 22 33 | cell: +41 79 625 00 00 | fax: +41 44 820 25 21mail: [email protected]
Agenda Velocity 2 Workshop November 2006
• Background —RSA, The Security Division of EMC
• Solution Overview
Security Leadership
• More than two decades dedicated to identity and data protection
• Announced acquisition by EMC Corp. in June
• 20,000+ customers
— 90% of the Fortune 100, 70% of the Fortune 500
• Leading market share in strong authentication for business and consumer marketplaces
• Over 1 billion units of software shipped with RSA technology inside
• Industry-leading initiatives, including RSA Conference and RSA Laboratories
• Leading critical industry standards development
— Liberty Alliance Project; SAML; WS-Security; PKCS
Seamless Security Solutions
• Solutions fit seamlessly into heterogeneous environments
— 1,000+ technology partner relationships around the world
— Interoperable with over 730 solutions
— Commitment to implementing industry standards within our products
• Managed service partners
• Channel partners and system integrators
On September 18, 2006
• EMC completed the acquisition of RSA Security
• EMC announced the completed acquisition of Network Intelligence
• RSA Security became RSA, The Security Division of EMC
+
+
EMC Strategic Acquisitions: 2003–2006Egan-Marino-Computer-Corporation
Strengthen and Enable Information Infrastructure
store
protect
optimize
leverage
2003JAN.
2005JAN.
2006JAN.
2007JAN.
2004JAN.
The Mission of RSA, the Security Division of EMC
• Continue investment in – and commitment to – current products, solutions and markets
• Drive the information-centric security strategy for EMC which will enable customers to cost-effectively secure critical information assets wherever they live and at every step of the way
In response, Information Security must evolve
Perimeter-centric SecurityBuild and protect perimeters
Necessary but insufficient
Firewalls, IDS / IPS, Anti-Malware, Endpoint Protection
Information-centric SecurityManage and protect information
Directly addresses threatsto information
+
Identity and Access ManagementData Protection, Rights Management
Goal:
Tools:
Delivering Information-Centric Security
Security Professional ServicesAssess the security of information to establish risk and priorityPlan and implement Information-centric security programs
Identity and Access Management SolutionsAssure identity and control information access
Secure Information InfrastructureDeliver inherently secure infrastructure through a common, integrated security platform
Data Protection SolutionsDirectly protect sensitive information and transactions
Integrated Security Information Management SolutionsCollect, correlate, and analyze security information in real-timeand over time
AssurePolicy Compliance
SecureData
SecureInfrastructure
SecureIdentities and Access
AssessRisk
1
2
3
4
5
Where the major capabilities come from today
Product Security Policy
Information Rights Management
Security Professional
Services
Security InformationManagement
Identity Assurance and Access Management
Data Encryption and
Key Management
Common Security Platform
Security Professional
Services
AssurePolicy Compliance
SecureData
SecureInfrastructure
SecureIdentities and Access
AssessRisk
1
2
3
4
5
APPENDIX 1
Solution Overviev
Trusted Identity
Authentication and Access Management Solutions
Leverage: Identity Empowerment
• Backend Infrastructure• Administrative tools &
workflow• Data repository integration• Scalable, reliable real-time
performance
Web SSO and Access Management
Cross-Domain SSO (Federation)
Enterprise SSO
• Market-leading OTP• Tokens, USBs,
on PDAs, on cell phones
•Digital certificate & smart chip-based solutions
• Withinthe Channel
• AtChannel Entry
• Outside the Channel
Consumer Protection Suite: Layered Approach
Stop Phishing & Pharming
User-to-Channel& Channel-to-User
Authentication
• RSA eFraudNetwork
Consumer Account
Transaction Monitoring
for Web and Phone
RSA Security Solutions: Authenticators
RSA SD200
RSA SD520
RSA Toolbar
RSA SID800
RSA SID700
Soft-Token for Desktop
RSA PDA Soft-Token
RSA USB6200
RSA SmartCard 5200 (Optional with Building AccessHID or MIFARE Standard)
RSA SID900
RSA SD600
Thank you for your attention