PRINT2012 - Don't count on luck! - Isabelle Lagae, Databasemanagement
SafeNet: Don't Leave It to Luck: What am I Not Doing?
-
Upload
rahul-neel-mani -
Category
Technology
-
view
66 -
download
0
Transcript of SafeNet: Don't Leave It to Luck: What am I Not Doing?
Insert Your Name
Insert Your Title
Insert Date
“Don’t leave it to luck: Secure Your
Mission Critical Data NOW”
Manoj Bhati
Sr. Solution Specialist (SAARC)
+91-99103-22259
Breach Level Index
2© SafeNet Confidential and Proprietary
SINCE 2013FIRST QUARTER
2,897,929,310RECORDS STOLEN
Only 1% of 254 Q1 2014 Data Breaches Were “Secure Breaches” Using
Encryption
Healthcare industry accounted for 24% of all breaches, while Financial industry
represented 56% of all data records lost or stolen
Malicious insiders only accounted for 11% of total incidents, but they
were much more effective at seizing 52% of records stolen.
Three breaches and 2.2 million records stolen each day, more than 93,000 per hour
A New Mindset is Needed!
Sole Perimeter
Security is No
Longer Enough
Insider Threat is
Greater Than Ever
Breaches Will
Happen and We
Must Prepare
Differently
DATA IS THE NEW PERIMETER!
4© SafeNet Confidential and Proprietary
Gartner Magic Quadrant for 2015
Protect Everything
5
Online
Storage
Application
Hosting
Disaster
Recovery
SAML
Tokens & Users
Administrator
Agent
RADIUS
API
Private Networks
Corporate
Network
Corporate
Network
Corporate
Network
Corporate
Network
LDAP / Active
Directory
LDAP / Active
Directory
LDAP / Active
Directory
LDAP / Active
Directory
Cloud
Services
Cloud
Applications
SAML
SAML
Protects everyone
Authenticators for every user type – and an increasing
focus on commoditisation
Authenticators that:
Don’t expire
Seed keys can be owned by the subscriber
Can be easily re-assigned to new users
Easy deployment saves cost and time
A token can be included in the service charge
H/W SMSBlackBerry iOS Android Microsoft Java
Multi Platform
USB GridMicrosoftOSx
SafeNet KeySecure® PlatformEnterprise Key Management, Encryption and Tokenization
Application
Connector
Tokenization
Service
Database
Connector File & Directory
Connector
Virtual Image & Volume
(AWS / VMware)
Data Center
3rd Party Key Management
(Tape / Disk / KMIP)
KeySecure® Platform
ProtectToken
ProtectV
ProtectAPPProtectDB ProtectFile
Ecosystem
Transform Utility
Batch File
(Positional / Delimited)