Background to Vaulting Technology - PowerPoint PPT Presentation

1 / 9
About This Presentation
Title:

Background to Vaulting Technology

Description:

Brocade? Neoscale? Decru? Vormetric? Orano? Permabit? Host Based Security Risks ... Security is a chain and its strength is the strength of its weakest link. ... – PowerPoint PPT presentation

Number of Views:72
Avg rating:3.0/5.0
Slides: 10
Provided by: securi1
Category:

less

Transcript and Presenter's Notes

Title: Background to Vaulting Technology


1
Background to Vaulting Technology Alon Cohen Feb
2004
2
Protecting data in a Network environment - What
kind of risks does it face?
  • Endless Security Risks, in 4 main categories
  • Storage Based Security Attacks
  • Host Based Security Attacks
  • Application Based Security Attacks
  • Network Based Security Attacks

My ERP
3
How do we deal today with all these threats?
Storage Based Security Risks
Host Based Security Risks
What Technologies Should I Use? IPSec/SSL
VPN? Firewall? Dos/DDos Defensive
Tools? Proxy? Intrusion Detection? Content
Filtering? Anti-Virus? Which Vendor? Checkpoint?
Netscreen? Cisco? Microsoft? Symantec? Netwo
rk Associates?
What Technologies Should I Use? Access
Control? O/S Hardening? Host Based
Firewall? Intrusion Detection? Two Factors
Authentication? Which Vendor? Computer
Associates? Netegrity? Argus? Cisco? Microsoft
? Entercept? RSA?
What Technologies Should I Use? Storage
Encryption? LUN Masking? Storage Based
Zoning? HBA-Based Authentication? Which
Vendor? Brocade? Neoscale? Decru? Vormetric?
Orano? Permabit?
What Technologies Should I Use? Application
Scanners? Application Firewall? Application
Control? Which Vendor? Sanctum? Kavado? Foundst
one? Stratum8? Harris?
The Problem We actually need to combine all (or
most) of these! Security is a chain and its
strength is the strength of its weakest link.
Application Based Security Risks
Network Based Security Risks
4
The Role of Perimeter Security
Perimeter Security only splits the world into two
networks the Internal Enterprise and the
Internet. Now we still need to secure the data
within each one of these networks, dealing with
Internal Risks and External Risks.
The Enterprise
The Internet
5
Introducing Vaulting Technology
The Vault is a Safe Haven, highly secured
regardless of overall network security. No need
to deal with security risks related to the
Storage, the Host, the Application or the
Network, the Vault is designed and built to deal
with all these risks.
6
Security becomes easy US Patent 6,356,941
7
10 Layers of Security are already there
8
But not only security is improved so is
connectivity
Telecommuter
The Vault
InternalNetwork
Business partner
CIFS, FTP, SMTP, HTTP
CIFS, FTP, SMTP, HTTP
End-to-end Security, High-Performance, Worldwide
Accessibility and Distributed Admin.
Business partner
9
  • Thank You
Write a Comment
User Comments (0)
About PowerShow.com