RFID - RSA, The Security Division of EMC: Security Solutions for ...
RSA, The Security Division of EMC - execute · RSA, The Security Division of EMC The Expert in...
Transcript of RSA, The Security Division of EMC - execute · RSA, The Security Division of EMC The Expert in...
![Page 1: RSA, The Security Division of EMC - execute · RSA, The Security Division of EMC The Expert in Information-Centric Security eXecure Technology Day 07 31/01/2007 Nick Parisi | Sales](https://reader036.fdocuments.us/reader036/viewer/2022071016/5fceb44c08d3992fbd438a47/html5/thumbnails/1.jpg)
RSA, The Security Division of EMCThe Expert in Information-Centric Security
eXecure Technology Day 07 31/01/2007Nick Parisi | Sales Manager SwitzerlandRSA, The Security Division of EMCIm Schörli 5, CH-8600, Dübendorf, Switzerlandtel: +41 44 882 22 33 | cell: +41 79 625 00 00 | fax: +41 44 820 25 21mail: [email protected]
![Page 2: RSA, The Security Division of EMC - execute · RSA, The Security Division of EMC The Expert in Information-Centric Security eXecure Technology Day 07 31/01/2007 Nick Parisi | Sales](https://reader036.fdocuments.us/reader036/viewer/2022071016/5fceb44c08d3992fbd438a47/html5/thumbnails/2.jpg)
Agenda Velocity 2 Workshop November 2006
• Background —RSA, The Security Division of EMC
• Solution Overview
![Page 3: RSA, The Security Division of EMC - execute · RSA, The Security Division of EMC The Expert in Information-Centric Security eXecure Technology Day 07 31/01/2007 Nick Parisi | Sales](https://reader036.fdocuments.us/reader036/viewer/2022071016/5fceb44c08d3992fbd438a47/html5/thumbnails/3.jpg)
Security Leadership
• More than two decades dedicated to identity and data protection
• Announced acquisition by EMC Corp. in June
• 20,000+ customers
— 90% of the Fortune 100, 70% of the Fortune 500
• Leading market share in strong authentication for business and consumer marketplaces
• Over 1 billion units of software shipped with RSA technology inside
• Industry-leading initiatives, including RSA Conference and RSA Laboratories
• Leading critical industry standards development
— Liberty Alliance Project; SAML; WS-Security; PKCS
![Page 4: RSA, The Security Division of EMC - execute · RSA, The Security Division of EMC The Expert in Information-Centric Security eXecure Technology Day 07 31/01/2007 Nick Parisi | Sales](https://reader036.fdocuments.us/reader036/viewer/2022071016/5fceb44c08d3992fbd438a47/html5/thumbnails/4.jpg)
Seamless Security Solutions
• Solutions fit seamlessly into heterogeneous environments
— 1,000+ technology partner relationships around the world
— Interoperable with over 730 solutions
— Commitment to implementing industry standards within our products
• Managed service partners
• Channel partners and system integrators
![Page 5: RSA, The Security Division of EMC - execute · RSA, The Security Division of EMC The Expert in Information-Centric Security eXecure Technology Day 07 31/01/2007 Nick Parisi | Sales](https://reader036.fdocuments.us/reader036/viewer/2022071016/5fceb44c08d3992fbd438a47/html5/thumbnails/5.jpg)
On September 18, 2006
• EMC completed the acquisition of RSA Security
• EMC announced the completed acquisition of Network Intelligence
• RSA Security became RSA, The Security Division of EMC
+
+
![Page 6: RSA, The Security Division of EMC - execute · RSA, The Security Division of EMC The Expert in Information-Centric Security eXecure Technology Day 07 31/01/2007 Nick Parisi | Sales](https://reader036.fdocuments.us/reader036/viewer/2022071016/5fceb44c08d3992fbd438a47/html5/thumbnails/6.jpg)
EMC Strategic Acquisitions: 2003–2006Egan-Marino-Computer-Corporation
Strengthen and Enable Information Infrastructure
store
protect
optimize
leverage
2003JAN.
2005JAN.
2006JAN.
2007JAN.
2004JAN.
![Page 7: RSA, The Security Division of EMC - execute · RSA, The Security Division of EMC The Expert in Information-Centric Security eXecure Technology Day 07 31/01/2007 Nick Parisi | Sales](https://reader036.fdocuments.us/reader036/viewer/2022071016/5fceb44c08d3992fbd438a47/html5/thumbnails/7.jpg)
The Mission of RSA, the Security Division of EMC
• Continue investment in – and commitment to – current products, solutions and markets
• Drive the information-centric security strategy for EMC which will enable customers to cost-effectively secure critical information assets wherever they live and at every step of the way
![Page 8: RSA, The Security Division of EMC - execute · RSA, The Security Division of EMC The Expert in Information-Centric Security eXecure Technology Day 07 31/01/2007 Nick Parisi | Sales](https://reader036.fdocuments.us/reader036/viewer/2022071016/5fceb44c08d3992fbd438a47/html5/thumbnails/8.jpg)
In response, Information Security must evolve
Perimeter-centric SecurityBuild and protect perimeters
Necessary but insufficient
Firewalls, IDS / IPS, Anti-Malware, Endpoint Protection
Information-centric SecurityManage and protect information
Directly addresses threatsto information
+
Identity and Access ManagementData Protection, Rights Management
Goal:
Tools:
![Page 9: RSA, The Security Division of EMC - execute · RSA, The Security Division of EMC The Expert in Information-Centric Security eXecure Technology Day 07 31/01/2007 Nick Parisi | Sales](https://reader036.fdocuments.us/reader036/viewer/2022071016/5fceb44c08d3992fbd438a47/html5/thumbnails/9.jpg)
Delivering Information-Centric Security
Security Professional ServicesAssess the security of information to establish risk and priorityPlan and implement Information-centric security programs
Identity and Access Management SolutionsAssure identity and control information access
Secure Information InfrastructureDeliver inherently secure infrastructure through a common, integrated security platform
Data Protection SolutionsDirectly protect sensitive information and transactions
Integrated Security Information Management SolutionsCollect, correlate, and analyze security information in real-timeand over time
AssurePolicy Compliance
SecureData
SecureInfrastructure
SecureIdentities and Access
AssessRisk
1
2
3
4
5
![Page 10: RSA, The Security Division of EMC - execute · RSA, The Security Division of EMC The Expert in Information-Centric Security eXecure Technology Day 07 31/01/2007 Nick Parisi | Sales](https://reader036.fdocuments.us/reader036/viewer/2022071016/5fceb44c08d3992fbd438a47/html5/thumbnails/10.jpg)
Where the major capabilities come from today
Product Security Policy
Information Rights Management
Security Professional
Services
Security InformationManagement
Identity Assurance and Access Management
Data Encryption and
Key Management
Common Security Platform
Security Professional
Services
AssurePolicy Compliance
SecureData
SecureInfrastructure
SecureIdentities and Access
AssessRisk
1
2
3
4
5
![Page 11: RSA, The Security Division of EMC - execute · RSA, The Security Division of EMC The Expert in Information-Centric Security eXecure Technology Day 07 31/01/2007 Nick Parisi | Sales](https://reader036.fdocuments.us/reader036/viewer/2022071016/5fceb44c08d3992fbd438a47/html5/thumbnails/11.jpg)
APPENDIX 1
Solution Overviev
![Page 12: RSA, The Security Division of EMC - execute · RSA, The Security Division of EMC The Expert in Information-Centric Security eXecure Technology Day 07 31/01/2007 Nick Parisi | Sales](https://reader036.fdocuments.us/reader036/viewer/2022071016/5fceb44c08d3992fbd438a47/html5/thumbnails/12.jpg)
Trusted Identity
Authentication and Access Management Solutions
Leverage: Identity Empowerment
• Backend Infrastructure• Administrative tools &
workflow• Data repository integration• Scalable, reliable real-time
performance
Web SSO and Access Management
Cross-Domain SSO (Federation)
Enterprise SSO
• Market-leading OTP• Tokens, USBs,
on PDAs, on cell phones
•Digital certificate & smart chip-based solutions
![Page 13: RSA, The Security Division of EMC - execute · RSA, The Security Division of EMC The Expert in Information-Centric Security eXecure Technology Day 07 31/01/2007 Nick Parisi | Sales](https://reader036.fdocuments.us/reader036/viewer/2022071016/5fceb44c08d3992fbd438a47/html5/thumbnails/13.jpg)
• Withinthe Channel
• AtChannel Entry
• Outside the Channel
Consumer Protection Suite: Layered Approach
Stop Phishing & Pharming
User-to-Channel& Channel-to-User
Authentication
• RSA eFraudNetwork
Consumer Account
Transaction Monitoring
for Web and Phone
![Page 14: RSA, The Security Division of EMC - execute · RSA, The Security Division of EMC The Expert in Information-Centric Security eXecure Technology Day 07 31/01/2007 Nick Parisi | Sales](https://reader036.fdocuments.us/reader036/viewer/2022071016/5fceb44c08d3992fbd438a47/html5/thumbnails/14.jpg)
![Page 15: RSA, The Security Division of EMC - execute · RSA, The Security Division of EMC The Expert in Information-Centric Security eXecure Technology Day 07 31/01/2007 Nick Parisi | Sales](https://reader036.fdocuments.us/reader036/viewer/2022071016/5fceb44c08d3992fbd438a47/html5/thumbnails/15.jpg)
RSA Security Solutions: Authenticators
RSA SD200
RSA SD520
RSA Toolbar
RSA SID800
RSA SID700
Soft-Token for Desktop
RSA PDA Soft-Token
RSA USB6200
RSA SmartCard 5200 (Optional with Building AccessHID or MIFARE Standard)
RSA SID900
RSA SD600
![Page 16: RSA, The Security Division of EMC - execute · RSA, The Security Division of EMC The Expert in Information-Centric Security eXecure Technology Day 07 31/01/2007 Nick Parisi | Sales](https://reader036.fdocuments.us/reader036/viewer/2022071016/5fceb44c08d3992fbd438a47/html5/thumbnails/16.jpg)
Thank you for your attention