21
www.Vormetric.com Defend the Core: Protecting Business Critical Data BRUCE JOHNSON VP Worldwide Sales & Services

Vormetric - Gherkin Event

Embed Size (px)

DESCRIPTION

 

Citation preview

Page 1: Vormetric - Gherkin Event

www.Vormetric.com

Defend the Core: Protecting Business Critical

Data

BRUCE JOHNSONVP Worldwide Sales & Services

Page 2: Vormetric - Gherkin Event

Data is Everywhere

Remote Locations & Systems

vvUnstructured Data

File SystemsOffice documents,

PDF, Vision, Audio & other

Fax/Print ServersFile Servers

Storage & Backup Systems

SAN/NASBackup Systems

Data Communications

VoIP SystemsFTP/Dropbox Server

Email Servers

Business Application Systems

(SAP, PeopleSoft, Oracle Financials, In-house, CRM,

eComm/eBiz, etc.)Application Server

Security & Other Systems

(Event logs, Error logsCache, Encryption keys,

& other secrets)Security Systems

Structured DataDatabase Systems

(SQL, Oracle, DB2, Informix, MySQL)Database Server

!Data exists in different formats, states, and locations.Traditional Controls are not designed to secure it.

Virtual &

Cloud

Page 3: Vormetric - Gherkin Event

Data Security Drivers

Are we Compliant?PCI DSS, HIPAA/HITECH, SOXUK Data Protection Act & EU Data Protection DirectiveExecutive mandates to avoid unwanted media headlines

Are we Secure?How can I protect my data?Who is accessing my data?What are my privileged users doing?

Are IT Operations Optimized?Disruption of existing IT infrastructure is painfulRe-architecting applications or storage is expensiveSimplify security operations to minimize costs

Page 4: Vormetric - Gherkin Event

Drivers for Encryption

Compliance to regulationsPCI, HITECH, State PII laws, EU laws, Int’l Laws

Customer or executive mandatesIncreasing customer contractual demands to encrypt data

Limit or reduce personnel allowed to access sensitive data

Executive mandating encryption for safe harbor or to avoid breach notification

Better Defense and Depth Data SecurityProtect against threats that can cause a breach

Transformational technologyProtect data in Physical, Virtualized and Cloud environments

Page 5: Vormetric - Gherkin Event

VORMETRIC

Page 6: Vormetric - Gherkin Event

About Vormetric

Founded in 2001

Purpose: To Simplify Data Security

Customers:1000+ Customers Worldwide, 16 of the Fortune 25

Technology Partners:IBM – Guardium Data Encryption

Symantec – NetBackup MSEO

Example Strategic RelationshipsIntel

Imperva

Page 7: Vormetric - Gherkin Event

Market Challenges We See

Too many encryption products

I have to Implement quickly“I have a pending audit, how can I secure data quickly?”

Performance Is Critical“Performance of our existing solution is not what we had hoped, how can we secure our sensitive data with minimal overhead?”

Keys are Everywhere“I am starting to get overwhelmed with key management, is there something that can help me manage them centrally?”

I have 3 different solutions for 3 different platforms and now I am introducing another platform, how can I protect sensitive data with just one solution?

“i

Page 8: Vormetric - Gherkin Event

Data Security Simplified

TransparentMust be transparent to business processes, end users, and applications

Data type neutral – any data, anywhere

StrongPrivileged users should not have access to sensitive data

Firewall your data – approved users and applications allowed, deny all others.

EfficientSLA, User, and Application performance must remain acceptable

Encryption overhead can approach zero

EasyEasy to Understand

Easy to Implement

Easy to Manage

Page 9: Vormetric - Gherkin Event

Protect Server Data

DAS SAN NAS VM CLOUD

Log FilesPassword filesConfig FilesArchive

File ShareArchiveContentMulti Needs

Data FilesTransaction LogsExportsBackup

IIS APACHE WebLogic

DB2 Oracle SQL Sybase MySQL

File Servers FTP Servers Email Servers Others

Log FilesPassword filesConfig filesArchive

ERP CRM Payment CMS Custom Apps

Page 10: Vormetric - Gherkin Event

Server Tier

Data Tier

Application Tier

Storage Tier

Internet

Operating System

Database

Applications

Data

Network Security Layers of Defense

FirewallIDS / IPSContent filtering

DLPIAM

DAM

WAF

Data Security Layers of Defense Encryptio

n

Encryption

Layered Enterprise Security

Page 11: Vormetric - Gherkin Event

Server Tier

Data Tier

Application Tier

Storage Tier

Data Security Layers of Defense

Network Security Layers of Defense

FirewallIDS / IPSContent filtering

DLPIAM

Imperva+Vormetric Protect Your Data

Database

Applications

Data

Operating System

Internet

Page 12: Vormetric - Gherkin Event

Vormetric

Database file encryption, OS-level audit & access

controls

Encryption key management

Imperva

Awareness of Database users & rights

Database Activity audit & access controls

Database

Applications

Users

Data

Layered Database Security Solution

Operating System

Page 13: Vormetric - Gherkin Event

Imperva and Vormetric Threat Coverage

Typical Threats:Unauthorized access to sensitive database data

Typical Threats:Unauthorized system access to data, mitigate risk of lost media (server, disk)

Vormetric

Imperva

Database

Applications

Users

Data

Operating System

Page 14: Vormetric - Gherkin Event

Imperva + Vormetric

Imperva SecureSphere Data Security Suite: Protect high-value business databases in the data center

Audit and monitor user access to sensitive data across heterogeneous database platforms

Generate alerts or block access when prohibited or anomalous database access occurs

Advanced analytics and reporting to accelerate incident response and forensic investigation

Vormetric Data Security: Encrypt, audit and control access to sensitive data files

Transparent encryption of structured (database) and unstructured data

Physical, virtual and cloud environments

Integrated encryption key management and management for Transparent Data Encryption keys

Protect against external threats (hackers with user credentials) and most internal threats (IT admins, etc)

Page 15: Vormetric - Gherkin Event

Use Cases

Page 16: Vormetric - Gherkin Event

Business Use Cases

Data Base Encryption

From Standalone DB Instances, to Clustered Database Environments

Oracle, MSSQL, DB2, Sybase, Informix, MySQL, Postgres

Big Data and NoSQL Big Data Typically Use Unstructured Data Stores, Distributed Across Many Hosts MongoDB, Hadoop, Cloudera, CouchDB

UnStructured Data – Application Servers Supporting Data for Application Specific Data

Logs, Reports, Exports,

Audio/Video Recordings

Document Management Documents, Files, etc.

Common Vendors: Documentum, SharePoint, FileNet…

Four Common Use Cases

Page 17: Vormetric - Gherkin Event

Fortune 500 Medical Devices: Protects SAP Data without Oracle/Solaris changes

Business ProblemGlobal Compliance

PII, PHI, EU Data Protection, UK Data Protection, US HIPAA/HITECH

Executive Mandate for total data protection for all SAP data

Technical RequirementTransparent protection without changes to Solaris OS, Oracle DB or apps

No changes to SAP Infrastructure investment

Solutions DeliveredImperva SecureSphere Database Activity Monitoring

Vormetric Encryption to encrypt data at rest

Results AchievedPolicy driven Security

Complete data protection satisfies multiple compliance initiatives

Forensic audit data for platforms and data

Page 18: Vormetric - Gherkin Event

Fortune 500 Financial Services: Protects Data at Rest and Manages Access

Business ProblemBasel II & US banking regulations

EU Data Privacy and data across bordersEnterprise centralized datacenters to conserve costs but needed to ensure users only accessing data for their specific country

Technical RequirementsHeterogeneous database security including DB2, Oracle, Microsoft SQL Server with multiple versions of the same database

Protecting information at rest and managing privileged usersEnsuring database procedures only executed by right user for right tables.

Solutions DeliveredImperva SecureSphere Database Activity Monitoring (DAM)

Vormetric Encryption

Results AchievedCompliance with global banking regulations and EU privacy requirements

Operational efficiency with consistent security posture across heterogenous database environment.

Page 19: Vormetric - Gherkin Event

SUMMARY

Page 20: Vormetric - Gherkin Event

Vormetric + Imperva Combined Value

Robust Security: Ensures privileged users do not access to sensitive data

Transparent: No disruptions to business operations

No changes to applications, databases, storage

Near zero performance impact

Manageable: Minimize costs and maximize ROI by protecting and auditing heterogeneous database environments

Quick: Rapid deployment without disrupting existing environments

Page 21: Vormetric - Gherkin Event

www.Vormetric.com

Thank You

www.vormetric.com@Vormetric