enterprise privacy architectures leveraging encryption to keep data private karim toubba vp of...

6
Enterprise Privacy Architectures Leveraging Encryption to Keep Data Private Karim Toubba VP of Product Management Ingrian Networks

Upload: asher-wilkinson

Post on 28-Dec-2015

216 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Enterprise Privacy Architectures Leveraging Encryption to Keep Data Private Karim Toubba VP of Product Management Ingrian Networks

Enterprise Privacy Architectures

Leveraging Encryption to

Keep Data Private

Karim Toubba

VP of Product Management

Ingrian Networks

Page 2: Enterprise Privacy Architectures Leveraging Encryption to Keep Data Private Karim Toubba VP of Product Management Ingrian Networks

Ingrian Networks, Inc. 2

Security vs. Data Privacy

Security—A Journey not a Destination:o According to Gartner, 75% of external-based attacks are tunneling

through applications—and so go undetected by firewalls. o According to Symantec, in 2003, 70 percent of all security vulnerabilities

were simple for attackers to manage, and the number’s growing.o Most estimates cite that now approximately 50% of security breaches are

perpetrated by internal staff—a number consistently rising each year.

o Plus, physical storage systems and data in the databases and

applications themselves can be stolen. Need to have a solution in place for securing

critical data inside the enterprise.That solution needs to work with existing

enterprise privacy architectures.

Page 3: Enterprise Privacy Architectures Leveraging Encryption to Keep Data Private Karim Toubba VP of Product Management Ingrian Networks

Ingrian Networks, Inc. 3

Encryption—A Vital Component of Enterprise Privacy Architectures

One of the best ways to achieve data privacy in an enterprise is by selectively encrypting the sensitive data that needs to stay private.

To be effective, an encryption architecture needs to be…

o Centralized. Keys, auditing, and logging can’t be managed disparately.

o Secure. Cryptographic processing needs to be on dedicated, tamper resistant device.

o Redundant. Need to ensure availability and scalability—if security processing fails, business is at risk.

o Open. Leverage standards to integrate with existing privacy architectures.

Storage SystemsNAS/SAN

ApplicationServers

Databases

WebServer

s

Page 4: Enterprise Privacy Architectures Leveraging Encryption to Keep Data Private Karim Toubba VP of Product Management Ingrian Networks

Ingrian Networks, Inc. 4

Data Privacy from Ingrian

Ingrian delivers data privacy solutions with capabilities for…

o Encrypting critical data in Web, application, and database servers.

o Ensuring all access to data is securely managed, logged, and controlled.

o Administering keys and policies in a secure, centralized fashion.

o Ensuring security processing is highly scalable, reliable, and redundant.

o Using standard interfaces and protocols to do integration.

IngrianDataSecure

Platform

Storage SystemsNAS/SAN

ApplicationServers

Databases

WebServer

s

Page 5: Enterprise Privacy Architectures Leveraging Encryption to Keep Data Private Karim Toubba VP of Product Management Ingrian Networks

Ingrian Networks, Inc. 5

Ingrian DataSecure Platforms

Authentication & AuthorizationAuthentication & Authorization

Secure Key ManagementSecure Key Management

Specialized Cryptographic EngineSpecialized Cryptographic Engine

Bac

kup

and

Rec

over

y

Logg

ing,

Aud

iting

, Mgm

t

Pla

tform

Sec

urity

DatabaseDatabaseApplication Server

Application Server

Commercial ApplicationsCommercial ApplicationsWeb ServerWeb Server

DatabaseDatabaseApplication Server

Application Server

Commercial ApplicationsCommercial ApplicationsWeb ServerWeb Server

Page 6: Enterprise Privacy Architectures Leveraging Encryption to Keep Data Private Karim Toubba VP of Product Management Ingrian Networks

Ingrian Networks, Inc. 6

Summary

Ingrian’s Data Privacy Solutions Enable Enterprises to:

o Protect Business-Critical Customer and Corporate Data

o Ensure Compliance with Legislation and Industry Guidelines

o Augment Security Technologies—They’re No Longer Enough