You are on page 1of 27

Go to View/Master/Slide Master to type in header

Propelling Business Growth With


A Secure And Continuous
Information Infrastructure

Jon Murray

1
Go to View/Master/Slide Master to type in
header

Information: Change in Multiple Dimensions

information information
growth information regulations more growth:
uses information stored on disk arrays growing ~60%
in 2006

more types:
transactions, documents, forms, web, images,
voice, messages, reports ...

more uses:
ERP, CRM, RFID, collaboration, data mining,
discovery …

information
types more regulations:
SEC 17a-4, NASD 3010,Sarbanes-Oxley, Basel
II, UK Metadata, eSign Act, 21 CFR Part 11

(more coming!)

2
Go to View/Master/Slide Master to type in
header

Customers’ Information Storage and


Management Challenges

Information stored on disk arrays ~ 70%


IT budget growth ~ 4 - 5%
IT environment getting more complex
SLA’s continue to expand and tighten
Protection and security increasingly important

CIO’s Dilemma:
How to manage all the information
growth with limited resources?
3
Go to View/Master/Slide Master to type in
header

2006 Technology Spending Priorities–CIO Survey

1. Security (Software) 11. Wireless LAN (clients)


2. Security (HW & Services) 12. New Custom Development
3. Storage Area Networks 13. Routing
4. Wireless LAN (access points & routers) 14. Systems Management Software
5. Storage Software 15. Application Integration Software
6. Portal Software 16. Notebook PCs
7. VOIP Infrastructure 17. Document Management Software
8. IT Education and Training 18. Automated Testing Tool
9. Storage Hardware 19. Microsoft Office Upgrade
10. Business Intelligence Software 20. Application Software Server

45. Mainframe hardware


46. Printers
Source: Morgan Stanley November CIO Survey, Jan. 3, 2006
4
Go to View/Master/Slide Master to type in
header

Security Today
An Amalgamation of Point Products Across IT

Anitvirus

Threat Digital Rights


Detection Management Authentication
Clients Servers
VPN Encryption

LAN SAN

Disk Storage
Authentication Web Firewall
Filtering Authentication
Antivirus Encryption
Change/Patch Vault
Management Recovery
Management Tape

Spyware

5
Go to View/Master/Slide Master to type in
header

Today’s Approach: Secure the Perimeter

6
Go to View/Master/Slide Master to type in
header

Security Tomorrow: Protect the Information

7
Go to View/Master/Slide Master to type in
header

Security Must Become Information-Centric

 Information-centric Security
– An inside-out view of how to secure information
 Begins with securing the data itself
 Moves out through layers of
increasingly intelligent infrastructure
 Relies on our ability to leverage
the interaction between data and
infrastructure

Important Technology
• Data-level access control
• Open policy decision points
• Enforcement at point of use

8
Go to View/Master/Slide Master to type in
header

Information Security (Confidentiality)


A Natural and Requested Evolution of EMC’s Data Protection Capabilities

Information
Information
Security
Security
and
Protection

Information
Information Information
Information Information
Information
Confidentiality
Confidentiality Integrity
Integrity Availability
Availability

EMC’s Heritage

9
Go to View/Master/Slide Master to type in
header

EMC’s Security Efforts to Date

• CEO-level Mandate
Dedicated
DedicatedFocus
Focus • Information Security Leadership Team
• Company-wide Goals and Objectives

• Security-related Workshops, Assessments


• EMC Vulnerability Alert Service
Security
Securityof
ofOffering
Offering • Documentum Trusted Content Services
• EMC Secure Remote Support

• Data Erasure Service


• DRM for ECM
Comprehensive
Comprehensive • Software-native Encryption
Information
InformationProtection
Protection – Retrospect and NetWorker
• Data Encryption through EMC Select

10
Go to View/Master/Slide Master to type in
header

EMC Security Mission


End-to-End Information Security Management

EMC ISM
Applications Systems Information People
Security Risk Management
Vulnerability Vulnerability Assessment
Management Patching
Security Configuration
Security Event Management / Managed Security
Threat Firewall / VPN
Management Intrusion Detect / Prevent
Threat Appliances
Anti-Virus/Malware
Secure Secure Messaging
Content Web Filtering
Encryption
Encryption Digital Rights Mgmt
File / Database Security
ID and Access Authentication Authentication
Management Authentication Mgmt Authentication Mgmt
Provisioning
Security Services

11
Go to View/Master/Slide Master to type in
header

EMC’s Information-Centric Approach to Security


Information Security Management (ISM)
 Information Security is an end-to-end challenge
 To be most effective, security capabilities must be integrated
with the information infrastructure
 All security offerings need to be interoperable and open

EMC Strategy
 Expose key native capabilities
 Repurpose existing technologies for security “use cases”
 Develop new products, solutions, and service offerings
 Partner and acquire to complete portfolio

12
Go to View/Master/Slide Master to type in
header

What is Happening with Information Security

?
Hard to know
where to start

define establish identify create monitor


requirements services catalog gaps plan effectiveness

hardware EMC Retrospect


Storage Security Assessment Service
EMCNeoScale
Networker
SAN Secure
EMC Security Best Practices
Remote Support
software EMC Documentum
NAS Security
Decru
Trusted
Kasten Best Content Services
Practices
Chase
VMware Assured Computing
Data Cipheroptics
Erasure Environment
Services
services Digital Rights Management (with partners)

13
Go to View/Master/Slide Master to type in
header

Secure Content Management

Information
Object

s
ACL
C L
MA
4 g2
EAL a Testin s
ri ce
o n Crite nt Servi
m te
Com ted Con
Trus

14
Go to View/Master/Slide Master to type in
header

ESG Strategy
Common forRecord
Archiving Enterprise Archiving
and Storage (CARS)
Secure, scalable, and unified archive for all types of
content
Desktop & Classify
SharePoint
File System Retain

Migrate
Email / IM Discover

Applications
& Reports

Paper Web
Rich Media

15
Go to View/Master/Slide Master to type in
header

New Architecture for Backup, Recovery, and Archive

Recovery  Œ Archive
process Production process
Ž Ž

 Extract valuable information to archive


– Increases performance of production applications
– Improves TCO through use of tiered storage
– Recovers capacity on Tier 1 resources
 Back up active production information
– Backup window reduced or eliminated
– Higher reliability, greater likelihood of full backups
 Retrieve from archive or recover from backup
– Restore requests are faster
– Information that was once offline is now online via archive
16
Go to View/Master/Slide Master to type in
header

Backup and Archive are Different


Backup Archive
A secondary copy of information Primary copy of information

Used for recovery operations Available for information retrieval

Improves availability by enabling Adds operational efficiencies by


application to be restored to point in moving fixed / unstructured content out
time of operational environment

Typically short-term (weeks or months) Typically long-term (months, years, or


decades)

Data typically overwritten on periodic Data typically maintained for analysis,


basis (e.g., monthly) value generation, or compliance

Not for regulatory compliance— Useful for compliance and should take
though some are forced to use into account information-retention policy

17
Go to View/Master/Slide Master to type in
header

Continuity
Reduce Total Cost Improve Business Value

 Eliminate over-protection  Minimize under-protection


 Simplified environment  Flexibility to change
 Consolidated continuity  Improving productivity

18
Go to View/Master/Slide Master to type in
header

Continuity Challenge: The Common Current State


Continuity Issues
Over-
 Survive a disaster protected
Different requirements
 Achieve high availability Under- Different technologies
 Prevent data corruption protected Different processes
 Non-disruptively upgrade software Not
protected
and/or hardware
 Do parallel processing Pain Points
 Move and migrate data  Inconsistent service levels
 Restart the enterprise  Gaps in coverage
 Protect remote data sites  Growth in complexity and effort
 Shorten backup and restore times  Growth in cost and risk to the business
 Contain costs
Continuity Defined:
 Cannot add resources Ensuring applications and data are available
during planned and unplanned outages.
19
Go to View/Master/Slide Master to type in
header

Information Protection is Evolving Beyond Tape


Backup…
Replication

CDP to
Disk

Snap /
Effectiveness

Clone
Operational

Backup
to Disk
Backup
to Tape

DAYS/ HOURS/ MINUTES/


HOURS MINUTES SECONDS SECONDS < SECONDS

CommonDecreased
RecoveryRecovery
Management
Time / Services
Automated andIncreased
SimplifiedRecovery
Management Disaster
Point Recovery, Operational
Granularity
Recovery, and Testing/Migration

20
Go to View/Master/Slide Master to type in
header

Products and Technologies

Remote Multi-site
Remote processing
Recovery Information
Backup
Platform
Local Remote

Clustering across site with Storage DR aware

SAN SAN SAN

21
Go to View/Master/Slide Master to type in
header

Products and Technologies


Information Protection & Recovery
SRDF Family
MirrorView

AutoStart Family
NetWorker
Celerra Replicator
RepliStor
Multi-site
TimeFinder Family Increasing
SnapView Remote distance
processing
EMC SnapSure Remote Automatic
improves
PowerPath protection
Information processing
Recovery All critical data resumption:
Backup Quick,
Frequent, safe at remote “lights out”
Platform accurate, location
consistent, predictable
Storage, non-
switch, and recovery
disruptive
server backups
protection
Local Remote

22
Go to View/Master/Slide Master to type in
header

Getting Started: Sample Customer Requirements Plan


Service Level Bronze Silver Gold Platinum
Service Class Non-critical Business urgent Business-critical Mission-critical

Site Type Warm site Hot site Standby site Standby site
(manual failover) (automatic failover)

RTO +/- <72 hours up to (+/-) <5 days +/- 24 hours up to (+/-) 3 days +/- 6 hours up to (+/-) 12 hours +/- 1 hours up to (+/-) 3 hours

RPO +/- 24 hours up to (+/-) 3 days +/- 24 hours up to (+/-) 3 days  Sync = 0 data loss  Sync = 0 data loss
 Async = acceptable data loss  Async = acceptable data
*(Potential for 0 data loss for loss
Async)

Recovery Service  OS: restored from tape and  OS: restored from tape and  OS: ready  OS: ready
validated validated  Application: ready  Application: ready
 Application: restored from tape  Application: restored from  Data: ready  Data: ready
and validated tape and validated
 Connectivity: repoint network  Connectivity: repoint
 Data: restored from tape and  Data: restored from tape network
validated and validated  Redundancy of data: store
and forward, tape back up of  Redundancy of data: store
 Connectivity: restored and  Connectivity: restored and site and forward, tape backup of
validated validated site
 Recovery plans: ready
 Redundancy of data: recover  Redundancy of data:  Redundant site: ready
lost transaction and validate recover lost transaction and  Testing: quarterly after
validate significant  Recovery plans: ready
 Redundant site: ready (warm
site)  Testing: quarterly after
significant
 Recovery plans: ready

Application Type  Desktop applications  Some desktop applications  Accounting systems (ERP)  Accounting systems (ERP)
 Corporate tax systems  Corporate tax system  Inventory control / distribution  Inventory control /
 Travel systems  Travel systems  Credit card processing distribution
 Human resources  Payroll  Cash management  Credit card processing
 Document imaging  Cash management

23
Go to View/Master/Slide Master to type in
header

Customer Needs
Tiered Storage that Is Optimized for Business Requirements

Business Applications Budget Capacity Performance Availability Compliance

ERP

CRM

Exchange

Archive

“Not all information is created equal”


24
Go to View/Master/Slide Master to type in
header

What is Happening with Information Security

where to start
?
define establish identify create monitor
requirements services catalog gaps plan effectiveness

hardware EMC Retrospect


Storage Security Assessment Service
EMCNeoScale
Networker
SAN Secure
EMC Security Best Practices
Remote Support
software EMC Documentum
NAS Security
Decru
Trusted
Kasten Best Content Services
Practices
Chase
VMware Assured Computing
Data Cipheroptics
Erasure Environment
Services
services Digital Rights Management (with partners)

25
Go to View/Master/Slide Master to type in
header

Building a Next-Generation Information Infrastructure


Information
Flexible Lifecycle
infrastructure Management

Next-Generation
Information
Infrastructure

Information protection and security


26
Go to View/Master/Slide Master to type in
header

27

You might also like