secureit 2013 - your file development in cyber systems - ruchin kumar, safenet
DESCRIPTION
TRANSCRIPT
![Page 1: SecureIT 2013 - Your file Development in Cyber Systems - Ruchin Kumar, SafeNet](https://reader033.vdocuments.net/reader033/viewer/2022052820/54b3af294a79596b5f8b4581/html5/thumbnails/1.jpg)
1© SafeNet Confidential and Proprietary
Secure The Information Breach
Ruchin KumarSecurity Evangelist – India & SAARCSafeNet [email protected]
![Page 2: SecureIT 2013 - Your file Development in Cyber Systems - Ruchin Kumar, SafeNet](https://reader033.vdocuments.net/reader033/viewer/2022052820/54b3af294a79596b5f8b4581/html5/thumbnails/2.jpg)
2
IT Landscape is at a Tipping Point
Consumerization of IT Shift in Service Deliver Models Data moving to the Cloud Increasingly Complex Threat
Landscape
![Page 3: SecureIT 2013 - Your file Development in Cyber Systems - Ruchin Kumar, SafeNet](https://reader033.vdocuments.net/reader033/viewer/2022052820/54b3af294a79596b5f8b4581/html5/thumbnails/3.jpg)
3
SafeNet ‘Secure Breach’ Survey….Coming Soon…April 2013
31% admitted that their perimeter has been breached
20% were not sure if they’d been breached.
38% believe unauthorized users currently have access to their networks.
65% think they will suffer a data breach within 3 years
59% believe if their perimeter is breached, their data would not be safe.
20% wouldn’t trust their own company with their personal data….
![Page 4: SecureIT 2013 - Your file Development in Cyber Systems - Ruchin Kumar, SafeNet](https://reader033.vdocuments.net/reader033/viewer/2022052820/54b3af294a79596b5f8b4581/html5/thumbnails/4.jpg)
4
A New Mindset is Needed
Sole Perimeter Security is No Longer Enough
Breaches Will Happen and We Must Prepare Differently
Data is the New Perimeter
![Page 5: SecureIT 2013 - Your file Development in Cyber Systems - Ruchin Kumar, SafeNet](https://reader033.vdocuments.net/reader033/viewer/2022052820/54b3af294a79596b5f8b4581/html5/thumbnails/5.jpg)
5
State of Data Protection: Protect What Matters, Where it Matters
![Page 6: SecureIT 2013 - Your file Development in Cyber Systems - Ruchin Kumar, SafeNet](https://reader033.vdocuments.net/reader033/viewer/2022052820/54b3af294a79596b5f8b4581/html5/thumbnails/6.jpg)
6
The recent wave of breaches is just the start
![Page 7: SecureIT 2013 - Your file Development in Cyber Systems - Ruchin Kumar, SafeNet](https://reader033.vdocuments.net/reader033/viewer/2022052820/54b3af294a79596b5f8b4581/html5/thumbnails/7.jpg)
7
The cloud & virtualization waves will only get higher
![Page 8: SecureIT 2013 - Your file Development in Cyber Systems - Ruchin Kumar, SafeNet](https://reader033.vdocuments.net/reader033/viewer/2022052820/54b3af294a79596b5f8b4581/html5/thumbnails/8.jpg)
8
Encryption will play vital role in protection of information assets
![Page 9: SecureIT 2013 - Your file Development in Cyber Systems - Ruchin Kumar, SafeNet](https://reader033.vdocuments.net/reader033/viewer/2022052820/54b3af294a79596b5f8b4581/html5/thumbnails/9.jpg)
9
You need to protect what matters where it matters
![Page 10: SecureIT 2013 - Your file Development in Cyber Systems - Ruchin Kumar, SafeNet](https://reader033.vdocuments.net/reader033/viewer/2022052820/54b3af294a79596b5f8b4581/html5/thumbnails/10.jpg)
10
It’s the Dawn of the Breach Prevention Era
![Page 11: SecureIT 2013 - Your file Development in Cyber Systems - Ruchin Kumar, SafeNet](https://reader033.vdocuments.net/reader033/viewer/2022052820/54b3af294a79596b5f8b4581/html5/thumbnails/11.jpg)
11
And for Next Year
![Page 12: SecureIT 2013 - Your file Development in Cyber Systems - Ruchin Kumar, SafeNet](https://reader033.vdocuments.net/reader033/viewer/2022052820/54b3af294a79596b5f8b4581/html5/thumbnails/12.jpg)
12
CISOs will be forced to think breach acceptance and Securing the Breach
![Page 13: SecureIT 2013 - Your file Development in Cyber Systems - Ruchin Kumar, SafeNet](https://reader033.vdocuments.net/reader033/viewer/2022052820/54b3af294a79596b5f8b4581/html5/thumbnails/13.jpg)
13
Companies will Encrypt way more data. But only if it just works.
![Page 14: SecureIT 2013 - Your file Development in Cyber Systems - Ruchin Kumar, SafeNet](https://reader033.vdocuments.net/reader033/viewer/2022052820/54b3af294a79596b5f8b4581/html5/thumbnails/14.jpg)
14
IT/IS consolidation will be a top priority for large companies and Security will need to ‘consolidate with it’
![Page 15: SecureIT 2013 - Your file Development in Cyber Systems - Ruchin Kumar, SafeNet](https://reader033.vdocuments.net/reader033/viewer/2022052820/54b3af294a79596b5f8b4581/html5/thumbnails/15.jpg)
15
CBEO
![Page 16: SecureIT 2013 - Your file Development in Cyber Systems - Ruchin Kumar, SafeNet](https://reader033.vdocuments.net/reader033/viewer/2022052820/54b3af294a79596b5f8b4581/html5/thumbnails/16.jpg)
16
The Chief Business Enablement Officer
![Page 17: SecureIT 2013 - Your file Development in Cyber Systems - Ruchin Kumar, SafeNet](https://reader033.vdocuments.net/reader033/viewer/2022052820/54b3af294a79596b5f8b4581/html5/thumbnails/17.jpg)
17
We Enable Business By Helping Customer Say Yes
![Page 18: SecureIT 2013 - Your file Development in Cyber Systems - Ruchin Kumar, SafeNet](https://reader033.vdocuments.net/reader033/viewer/2022052820/54b3af294a79596b5f8b4581/html5/thumbnails/18.jpg)
18
Say yes to more data center consolidation
![Page 19: SecureIT 2013 - Your file Development in Cyber Systems - Ruchin Kumar, SafeNet](https://reader033.vdocuments.net/reader033/viewer/2022052820/54b3af294a79596b5f8b4581/html5/thumbnails/19.jpg)
19
Say yes to a shared services infrastructure
![Page 20: SecureIT 2013 - Your file Development in Cyber Systems - Ruchin Kumar, SafeNet](https://reader033.vdocuments.net/reader033/viewer/2022052820/54b3af294a79596b5f8b4581/html5/thumbnails/20.jpg)
20
Say yes to Virtualizing their critical apps
![Page 21: SecureIT 2013 - Your file Development in Cyber Systems - Ruchin Kumar, SafeNet](https://reader033.vdocuments.net/reader033/viewer/2022052820/54b3af294a79596b5f8b4581/html5/thumbnails/21.jpg)
21
Say yes to moving their critical apps to the cloud
![Page 22: SecureIT 2013 - Your file Development in Cyber Systems - Ruchin Kumar, SafeNet](https://reader033.vdocuments.net/reader033/viewer/2022052820/54b3af294a79596b5f8b4581/html5/thumbnails/22.jpg)
22
Say yes to more IT as a Service
![Page 23: SecureIT 2013 - Your file Development in Cyber Systems - Ruchin Kumar, SafeNet](https://reader033.vdocuments.net/reader033/viewer/2022052820/54b3af294a79596b5f8b4581/html5/thumbnails/23.jpg)
23
Say yes to better authentication for everyone
![Page 24: SecureIT 2013 - Your file Development in Cyber Systems - Ruchin Kumar, SafeNet](https://reader033.vdocuments.net/reader033/viewer/2022052820/54b3af294a79596b5f8b4581/html5/thumbnails/24.jpg)
24
Say yes to online transactions
![Page 25: SecureIT 2013 - Your file Development in Cyber Systems - Ruchin Kumar, SafeNet](https://reader033.vdocuments.net/reader033/viewer/2022052820/54b3af294a79596b5f8b4581/html5/thumbnails/25.jpg)
25
Say yes to sensitive workloads in the cloud
![Page 26: SecureIT 2013 - Your file Development in Cyber Systems - Ruchin Kumar, SafeNet](https://reader033.vdocuments.net/reader033/viewer/2022052820/54b3af294a79596b5f8b4581/html5/thumbnails/26.jpg)
26
Say yes to SaaS
![Page 27: SecureIT 2013 - Your file Development in Cyber Systems - Ruchin Kumar, SafeNet](https://reader033.vdocuments.net/reader033/viewer/2022052820/54b3af294a79596b5f8b4581/html5/thumbnails/27.jpg)
27
Say yes to file shares
![Page 28: SecureIT 2013 - Your file Development in Cyber Systems - Ruchin Kumar, SafeNet](https://reader033.vdocuments.net/reader033/viewer/2022052820/54b3af294a79596b5f8b4581/html5/thumbnails/28.jpg)
28
Say yes to Sharepoint
![Page 29: SecureIT 2013 - Your file Development in Cyber Systems - Ruchin Kumar, SafeNet](https://reader033.vdocuments.net/reader033/viewer/2022052820/54b3af294a79596b5f8b4581/html5/thumbnails/29.jpg)
29
Say yes to data protection
![Page 30: SecureIT 2013 - Your file Development in Cyber Systems - Ruchin Kumar, SafeNet](https://reader033.vdocuments.net/reader033/viewer/2022052820/54b3af294a79596b5f8b4581/html5/thumbnails/30.jpg)
30
Now, forget everything I said for just a sec
![Page 31: SecureIT 2013 - Your file Development in Cyber Systems - Ruchin Kumar, SafeNet](https://reader033.vdocuments.net/reader033/viewer/2022052820/54b3af294a79596b5f8b4581/html5/thumbnails/31.jpg)
31
Say yes to more agility
![Page 32: SecureIT 2013 - Your file Development in Cyber Systems - Ruchin Kumar, SafeNet](https://reader033.vdocuments.net/reader033/viewer/2022052820/54b3af294a79596b5f8b4581/html5/thumbnails/32.jpg)
32
Say yes to more efficiency
![Page 33: SecureIT 2013 - Your file Development in Cyber Systems - Ruchin Kumar, SafeNet](https://reader033.vdocuments.net/reader033/viewer/2022052820/54b3af294a79596b5f8b4581/html5/thumbnails/33.jpg)
33
Say yes to more revenue
![Page 34: SecureIT 2013 - Your file Development in Cyber Systems - Ruchin Kumar, SafeNet](https://reader033.vdocuments.net/reader033/viewer/2022052820/54b3af294a79596b5f8b4581/html5/thumbnails/34.jpg)
34
Say yes to less risk
![Page 35: SecureIT 2013 - Your file Development in Cyber Systems - Ruchin Kumar, SafeNet](https://reader033.vdocuments.net/reader033/viewer/2022052820/54b3af294a79596b5f8b4581/html5/thumbnails/35.jpg)
35
Say NO! to the next breach
![Page 36: SecureIT 2013 - Your file Development in Cyber Systems - Ruchin Kumar, SafeNet](https://reader033.vdocuments.net/reader033/viewer/2022052820/54b3af294a79596b5f8b4581/html5/thumbnails/36.jpg)
36
Encryption as Structural Data Protection
Local H/W orS/W CSPs
App
Applications DBs Files & Storage
Identity and Authentication
Virtualization
Tokens
Identity Server
Key-Policy Management
![Page 37: SecureIT 2013 - Your file Development in Cyber Systems - Ruchin Kumar, SafeNet](https://reader033.vdocuments.net/reader033/viewer/2022052820/54b3af294a79596b5f8b4581/html5/thumbnails/37.jpg)
37
Data Protection - To the Cloud – Is Now
Private Cloud
External CloudInternal CloudFEDERATION
File Servers
Application and web servers
Databases
Mainframes
Enterprise Key-Management
DataSecure & KeySecure
NAS/SAN Storage
Tokenization
Manager
ProtectZ
ProtectDBProtectApp
ProtectFile
DATACENTER
ProtectV
Virtual Machines
Authentication Service
HSM as a Service
StorageSecure
![Page 38: SecureIT 2013 - Your file Development in Cyber Systems - Ruchin Kumar, SafeNet](https://reader033.vdocuments.net/reader033/viewer/2022052820/54b3af294a79596b5f8b4581/html5/thumbnails/38.jpg)
38
SafeNet Asia Pacific
Regional headquarters: Hong Kong
Offices: Australia (ANZ), China, India (SARRC), Japan, Korea, Singapore (ASEAN), Hong Kong (Taiwan)
APAC employees: Over 430 employees including sales, engineers, operations and technical support
R&D centers: India & China
![Page 39: SecureIT 2013 - Your file Development in Cyber Systems - Ruchin Kumar, SafeNet](https://reader033.vdocuments.net/reader033/viewer/2022052820/54b3af294a79596b5f8b4581/html5/thumbnails/39.jpg)
39
Where We Focus
Software Monetization Solutions
Identity and Transaction Protection
Data Encryption and Control
Secure Communications
Compliance and Governance
Data Protection in Cloud & Virtual Environments
Solutions Customers
Enterprise
Government
Banking
Data Protection Solutions
![Page 40: SecureIT 2013 - Your file Development in Cyber Systems - Ruchin Kumar, SafeNet](https://reader033.vdocuments.net/reader033/viewer/2022052820/54b3af294a79596b5f8b4581/html5/thumbnails/40.jpg)
40
Thank You
Queries????