SlideShare una empresa de Scribd logo
1 de 32
Guarantee data protection for your clients
Adrian DUMITRESCU
Q-East Software
www.qeast.ro
2
Topic relevance
The GDPR requires organizations — both “data controllers” and “data
processors” — to strengthen their data protection and security measures to
protect the personally identifiable information (PII) of EU citizens, and to
demonstrate their compliance at any time. More specifically, organizations
must ensure the following:
 Only people who should have access to sensitive data actually have
access.
 Reasonable measures are in place to protect the data from unauthorized
access.
 There is accountability of who is accessing the data.
 The organization has an accurate understanding of the scope of any data
breach in a timely manner.
If you offer products or
services to EU citizens,
have EU citizens as
employees or even accept
job applications from EU
citizens, you are almost
certainly subject to the new
GDPR legislation.
3
Critical strategies for compliance
#1 Know all about the personal data you store
#2 Carefully manage access to personal data
#3 Encrypt as much data as possible
#4 Monitor changes that could affect sensitive data,
and prevent the most critical changes
#5 Investigate potential breaches
Quick Fact:
Insider threats represent up to 60% of all attacks. How quickly can you spot an
insider abusing their privileges or an attacker using compromised credentials?
4
How Quest can help
Quest solutions can help make it easier to ensure that your
customer on-premises, cloud or hybrid environment meets
GDPR compliance requirements. Your customers can start
preparing for GDPR now by improving their security posture
and strengthening data protection safeguards across the
entire environment. Doing so can help them achieve and
maintain GDPR compliance and avoid costly fines and
reputation damage.
5
Why Quest
Secure and manage
data
B E T T E R
Modernize
infrastructure
F A S T E R
All network
devices
C O N T R O L L E D
Turn data
into insights
Q U I C K E R
Quest customers gain a competitive edge though better
use of their IT resources.
By automating the mundane IT teams can redesign their
work helping their firm:
Connect
to the cloud
E A S I E R
6
Who We Are
9 0 % o f
F o r t u n e 1 0 0
using our
software
1 , 5 0 0
engineers building
quality products
4 M
c o m m u n i t y
m e m b e r s
sharing best practices
3 , 5 0 0
employees focused
on customers
Quest is a global software provider trusted by 100,000
customers and 6,000 partners in 100 countries.
We help IT organizations spend less time on administration
and more time on innovation.
6 , 0 0 0
partners selling
our software
7
Compliance Roadmap
Prepare AuthorizationProtect &
Secure
ReviewManage
Data Protection Impact
Assessment
Obtain prior Authorization
from the Supervisory
Authority
Data Protection Officer
Protect all data Data Protection
Compliance Review
Define the way data is
collected and managed
8
#1: Data Protection Impact Assessment
According to a 2016 Ponemon Report, only 12% of IT and security staff know the risk of their
structured data
• You need to have a global visibility of sensitive data
• Make sure you are only managing data that you actually need or are lawful to process
• Understand data proliferation
Prepare AuthorizationProtect &
Secure
ReviewManage
5 IT auditing & compliance mistakes organizations make
Lack of visibility into who is doing what in Windows environments.
Underestimating user & organizational impact.
Inconsistent or absence of a GRC strategy.
Inadequate data protection.
1
2
3
4
Failure to plan and manage external and internal audits.5
What if you could…
1
With one view answer: who has access,
how was it obtained, and how was it used
– all in real time?
2
Complete investigations with full-text
search of critical IT data and its relation to
users and events?
3
Report on user activity for internal investigations and
compliance?
4
Be alerted on violations, malicious activity and
suspicious trends as they happen?
5
Automate andsecure collection oflog data from
disparate platformswithout needing expertise?
6
Save expensive storage space andmaintain compliance
by storing event logs in a compressed format?
7
Troubleshoot andpinpoint problems should an incident
occur foroperational visibility?
8
Improveinsight andcommunication across teams with
flexible reporting?
9
Eliminate information security silos with integration for
SIEMsolutions?
10
Leverage auditing solutions already in place?
Evaluating business risks in terms of security and compliance
Translating criptic knowledge into business insight
USERS
DATA
APPLICATIONS
IT Engineer
PEOPLE
INFORMATION
PROCESSES
And enabling management to take the right decisions
PEOPLE
INFORMATION
PROCESSES
Business Manager
14
#2: Define the way data is collected and managed
Embrace privacy by design principles
• Proactive not reactive; Preventative not remedial
• Privacy as the default setting
• Privacy embedded into design
• Full functionality – positive-sum, not zero-sum
• End-to-end security – full lifecycle protection
• Visibility and transparency – keep it open
• Respect for user privacy – keep it user-centric
Prepare AuthorizationProtect &
Secure
ReviewManage
Information Management is about PROCESSES
#1 Performance Management
#2 Big Data & BI
16
Foglight for the Internet of Things
Transform – Integrate - Develop
Toad supports the entire database application lifecycle
18
#3: Protect all data
Implement data security requirements
• ensure the ongoing confidentiality, integrity, availability and resilience of systems and services processing
personal data
• take preventive, corrective and mitigating action in near real time against vulnerabilities
• regularly test, assess and evaluate the effectiveness of security policies
Implement backup and data recovery policies
• Create a backup policy that clearly identifies roles, responsibilities, schedule, location, formats
• Define the differences between backups and archiving data
• Include archiving in addition to processes such as data rescue, data reformatting, data conversion, metadata
Designate a data protection officer
Prepare AuthorizationProtect &
Secure
ReviewManage
Data Protection is about INFORMATION
#1 Backup and Replication
#2 InformationSecurity
Foundational Backup & Recovery
Cross-Platform Backup & Recovery
Simpleyetscalablebackupandrecoveryformixed environments
Replication & Disaster Recovery
Solutions for site, server, and application disaster recovery
Continuous Data Protection
Real-time backup and instant recovery for mission-critical
applications
Data Deduplication
Byte-level, variable-block-size deduplication to reduce the
backup storage footprint by up to 90%
Virtual Protection
VMware & Hyper-V backup, replication, and recovery
Simple, affordable zero-impact replication
Endpoint Management: END-TO-END ELM
Inventory&Asset Management
Service Desk
Systems Deployment
Software Distribution
Patch & Security Management
Privileged Account Management
• Hardened Appliance
• Full AES disk encryption
• FIPS 140-2 & ISO 27001
• Embedded hardware firewall
• Purpose built for security
• No direct access of any kind
• Syslog integration
• Highly available architecture
• Scalable clustering
• Small 1U footprint
• Hardware redundancy
• Agentless architecture
• RESTful API
• Secure audit backup
ONE IDENTITY SAFEGUARD
FOR PRIVILEGED PASSWORDS AND SESSIONS
24
#4: Obtain prior Authorization from the Supervisory Authority
• Comply with the requirements
for prior authorization or prior consultation of the supervisory authority in order to ensure the compliance of the
processing with EUGDPR
• Set procedures in place
for contacting the supervisory authority on issues related to the processing and consulting with the supervisory
authority (Data Protection Officer)
Prepare AuthorizationProtect &
Secure
ReviewManage
Identity Management is about PEOPLE
#1 Userprovisioning
#2 Access control
26
Four Fundamental Concepts
Improve visibility into who has access to business critical
information, automate provisioning and enforce access
controls.
Access Governance
Centrally manage privileged accounts and provide
granular control of administrator access.
Privileged Account
Management
Simplify the environment and user experience with
centralized account management.
Identity
Administration
Audit what the users are doing with the access they have
been granted.
User Activity
Monitoring
…in other words
28
#5: Data Protection Compliance Review
Implement compliance policies
which shall be reviewed at least every two years and updated where necessary (compliance review shall be carried
out at least once every two years)
Where the compliance review results show compliance inconsistencies, the review shall include recommendations
on how to achieve full compliance
Prepare AuthorizationProtect &
Secure
ReviewManage
29
IT Security Investigations
30
IT Security Investigations
Quest Software: International leadership
1M
customers
90%
of Global 1000 are Quest
Software customers
4M
community members
Highest overall protection
Next-Gen Firewall
NSS Labs EMA
Radar Report Value Leader for
Boomi Cloud Integration
6,000
team members
Gartner
$2B
software revenue
9 Magic Quadrants
1,600 software
engineers
2,500 software
sales
Thank You!

Más contenido relacionado

La actualidad más candente

IBM Security Guardium Data Activity Monitor (Data Sheet-USEN)
IBM Security Guardium Data Activity Monitor (Data Sheet-USEN)IBM Security Guardium Data Activity Monitor (Data Sheet-USEN)
IBM Security Guardium Data Activity Monitor (Data Sheet-USEN)Peter Tutty
 
Big Data Security Analytics (BDSA) with Randy Franklin
Big Data Security Analytics (BDSA) with Randy FranklinBig Data Security Analytics (BDSA) with Randy Franklin
Big Data Security Analytics (BDSA) with Randy FranklinSridhar Karnam
 
McAfee Total Protection for Data Loss Prevention (DLP)
McAfee Total Protection for Data Loss Prevention (DLP)McAfee Total Protection for Data Loss Prevention (DLP)
McAfee Total Protection for Data Loss Prevention (DLP)Trustmarque
 
Whitepaper IBM Guardium Data Activity Monitor
Whitepaper IBM Guardium Data Activity MonitorWhitepaper IBM Guardium Data Activity Monitor
Whitepaper IBM Guardium Data Activity MonitorCamilo Fandiño Gómez
 
Symantec 2011 Social Media Protection Flash Poll Global Results
Symantec 2011 Social Media Protection Flash Poll Global ResultsSymantec 2011 Social Media Protection Flash Poll Global Results
Symantec 2011 Social Media Protection Flash Poll Global ResultsSymantec
 
Symantec Data Insight
Symantec Data InsightSymantec Data Insight
Symantec Data InsightSymantec
 
Magix Value Proposition Ar
Magix Value Proposition ArMagix Value Proposition Ar
Magix Value Proposition Aralanrehbock
 
GitHub: Secure Software Development for Financial Services
GitHub: Secure Software Development for Financial ServicesGitHub: Secure Software Development for Financial Services
GitHub: Secure Software Development for Financial ServicesDebbie A. Everson
 
In data security
In data securityIn data security
In data securityadithdev
 
Data Security: Why You Need Data Loss Prevention & How to Justify It
Data Security: Why You Need Data Loss Prevention & How to Justify ItData Security: Why You Need Data Loss Prevention & How to Justify It
Data Security: Why You Need Data Loss Prevention & How to Justify ItMarc Crudgington, MBA
 
Life After Compliance march 2010 v2
Life After Compliance march 2010 v2Life After Compliance march 2010 v2
Life After Compliance march 2010 v2SafeNet
 
Effective cybersecurity for small and midsize businesses
Effective cybersecurity for small and midsize businessesEffective cybersecurity for small and midsize businesses
Effective cybersecurity for small and midsize businessesShawn Tuma
 
EU's General Data Protection Regulation (GDPR)
EU's General Data Protection Regulation (GDPR)EU's General Data Protection Regulation (GDPR)
EU's General Data Protection Regulation (GDPR)Kimberly Simon MBA
 
Data security in a big data environment sweden
Data security in a big data environment   swedenData security in a big data environment   sweden
Data security in a big data environment swedenIBM Sverige
 
Compliance regulations with Data Centric Security | Seclore
Compliance regulations with Data Centric Security | SecloreCompliance regulations with Data Centric Security | Seclore
Compliance regulations with Data Centric Security | SecloreSeclore
 
Symantec Enterprise Mobility Enhancements
Symantec Enterprise Mobility EnhancementsSymantec Enterprise Mobility Enhancements
Symantec Enterprise Mobility EnhancementsSymantec
 
Cybersecurity Update
Cybersecurity UpdateCybersecurity Update
Cybersecurity UpdateShawn Tuma
 
Rbi compliance and Data Centric Security
Rbi compliance and Data Centric Security Rbi compliance and Data Centric Security
Rbi compliance and Data Centric Security Seclore
 

La actualidad más candente (20)

It security cognic_systems
It security cognic_systemsIt security cognic_systems
It security cognic_systems
 
IBM Security Guardium Data Activity Monitor (Data Sheet-USEN)
IBM Security Guardium Data Activity Monitor (Data Sheet-USEN)IBM Security Guardium Data Activity Monitor (Data Sheet-USEN)
IBM Security Guardium Data Activity Monitor (Data Sheet-USEN)
 
Data security and privacy
Data security and privacyData security and privacy
Data security and privacy
 
Big Data Security Analytics (BDSA) with Randy Franklin
Big Data Security Analytics (BDSA) with Randy FranklinBig Data Security Analytics (BDSA) with Randy Franklin
Big Data Security Analytics (BDSA) with Randy Franklin
 
McAfee Total Protection for Data Loss Prevention (DLP)
McAfee Total Protection for Data Loss Prevention (DLP)McAfee Total Protection for Data Loss Prevention (DLP)
McAfee Total Protection for Data Loss Prevention (DLP)
 
Whitepaper IBM Guardium Data Activity Monitor
Whitepaper IBM Guardium Data Activity MonitorWhitepaper IBM Guardium Data Activity Monitor
Whitepaper IBM Guardium Data Activity Monitor
 
Symantec 2011 Social Media Protection Flash Poll Global Results
Symantec 2011 Social Media Protection Flash Poll Global ResultsSymantec 2011 Social Media Protection Flash Poll Global Results
Symantec 2011 Social Media Protection Flash Poll Global Results
 
Symantec Data Insight
Symantec Data InsightSymantec Data Insight
Symantec Data Insight
 
Magix Value Proposition Ar
Magix Value Proposition ArMagix Value Proposition Ar
Magix Value Proposition Ar
 
GitHub: Secure Software Development for Financial Services
GitHub: Secure Software Development for Financial ServicesGitHub: Secure Software Development for Financial Services
GitHub: Secure Software Development for Financial Services
 
In data security
In data securityIn data security
In data security
 
Data Security: Why You Need Data Loss Prevention & How to Justify It
Data Security: Why You Need Data Loss Prevention & How to Justify ItData Security: Why You Need Data Loss Prevention & How to Justify It
Data Security: Why You Need Data Loss Prevention & How to Justify It
 
Life After Compliance march 2010 v2
Life After Compliance march 2010 v2Life After Compliance march 2010 v2
Life After Compliance march 2010 v2
 
Effective cybersecurity for small and midsize businesses
Effective cybersecurity for small and midsize businessesEffective cybersecurity for small and midsize businesses
Effective cybersecurity for small and midsize businesses
 
EU's General Data Protection Regulation (GDPR)
EU's General Data Protection Regulation (GDPR)EU's General Data Protection Regulation (GDPR)
EU's General Data Protection Regulation (GDPR)
 
Data security in a big data environment sweden
Data security in a big data environment   swedenData security in a big data environment   sweden
Data security in a big data environment sweden
 
Compliance regulations with Data Centric Security | Seclore
Compliance regulations with Data Centric Security | SecloreCompliance regulations with Data Centric Security | Seclore
Compliance regulations with Data Centric Security | Seclore
 
Symantec Enterprise Mobility Enhancements
Symantec Enterprise Mobility EnhancementsSymantec Enterprise Mobility Enhancements
Symantec Enterprise Mobility Enhancements
 
Cybersecurity Update
Cybersecurity UpdateCybersecurity Update
Cybersecurity Update
 
Rbi compliance and Data Centric Security
Rbi compliance and Data Centric Security Rbi compliance and Data Centric Security
Rbi compliance and Data Centric Security
 

Similar a GDPR Part 2: Quest Relevance

Breakdown of Microsoft Purview Solutions
Breakdown of Microsoft Purview SolutionsBreakdown of Microsoft Purview Solutions
Breakdown of Microsoft Purview SolutionsDrew Madelung
 
Vuzion Love Cloud GDPR Event
Vuzion Love Cloud GDPR Event Vuzion Love Cloud GDPR Event
Vuzion Love Cloud GDPR Event Vuzion
 
Microsoft Cloud GDPR Compliance Options (SUGUK)
Microsoft Cloud GDPR Compliance Options (SUGUK)Microsoft Cloud GDPR Compliance Options (SUGUK)
Microsoft Cloud GDPR Compliance Options (SUGUK)Andy Talbot
 
Ethyca CodeDriven - Data Privacy Compliance for Engineers & Data Teams
Ethyca CodeDriven - Data Privacy Compliance for Engineers & Data TeamsEthyca CodeDriven - Data Privacy Compliance for Engineers & Data Teams
Ethyca CodeDriven - Data Privacy Compliance for Engineers & Data TeamsCillian Kieran
 
ISSA Atlanta - Emerging application and data protection for multi cloud
ISSA Atlanta - Emerging application and data protection for multi cloudISSA Atlanta - Emerging application and data protection for multi cloud
ISSA Atlanta - Emerging application and data protection for multi cloudUlf Mattsson
 
Big Data LDN 2017: Applied AI for GDPR
Big Data LDN 2017: Applied AI for GDPRBig Data LDN 2017: Applied AI for GDPR
Big Data LDN 2017: Applied AI for GDPRMatt Stubbs
 
Improve IT Security and Compliance with Mainframe Data in Splunk
Improve IT Security and Compliance with Mainframe Data in SplunkImprove IT Security and Compliance with Mainframe Data in Splunk
Improve IT Security and Compliance with Mainframe Data in SplunkPrecisely
 
Bridging the Data Security Gap
Bridging the Data Security GapBridging the Data Security Gap
Bridging the Data Security Gapxband
 
Flash Friday: Data Quality & GDPR
Flash Friday: Data Quality & GDPRFlash Friday: Data Quality & GDPR
Flash Friday: Data Quality & GDPRPrecisely
 
Webinar Metalogix "Auf der Zielgeraden zur DSGVO!"
Webinar Metalogix "Auf der Zielgeraden zur DSGVO!"Webinar Metalogix "Auf der Zielgeraden zur DSGVO!"
Webinar Metalogix "Auf der Zielgeraden zur DSGVO!"Ragnar Heil
 
GDPR challenges for the healthcare sector and the practical steps to compliance
GDPR challenges for the healthcare sector and the practical steps to complianceGDPR challenges for the healthcare sector and the practical steps to compliance
GDPR challenges for the healthcare sector and the practical steps to complianceIT Governance Ltd
 
ISO/IEC 27001 & ISO/IEC 27002:2022: What you need to know
ISO/IEC 27001 & ISO/IEC 27002:2022: What you need to knowISO/IEC 27001 & ISO/IEC 27002:2022: What you need to know
ISO/IEC 27001 & ISO/IEC 27002:2022: What you need to knowPECB
 
Microsoft Office 365 Security and Compliance
Microsoft Office 365 Security and ComplianceMicrosoft Office 365 Security and Compliance
Microsoft Office 365 Security and ComplianceDavid J Rosenthal
 
The EU General Protection Regulation and how Oracle can help
The EU General Protection Regulation and how Oracle can help The EU General Protection Regulation and how Oracle can help
The EU General Protection Regulation and how Oracle can help Niklas Hjorthen
 
The Three Critical Steps for Effective BYOD Management
The Three Critical Steps for Effective BYOD Management The Three Critical Steps for Effective BYOD Management
The Three Critical Steps for Effective BYOD Management Kaseya
 
Laser App Conference 2017 - Sid Yenamandra, Entreda
Laser App Conference 2017 - Sid Yenamandra, EntredaLaser App Conference 2017 - Sid Yenamandra, Entreda
Laser App Conference 2017 - Sid Yenamandra, EntredaLaser App Software
 
Data protection within development
Data protection within developmentData protection within development
Data protection within developmentowaspsuffolk
 
Toreon adding privacy by design in secure application development oss18 v20...
Toreon adding privacy by design in secure application development   oss18 v20...Toreon adding privacy by design in secure application development   oss18 v20...
Toreon adding privacy by design in secure application development oss18 v20...Sebastien Deleersnyder
 
Office 365 Security, Privacy and Compliance - SMB Nation 2015
Office 365 Security, Privacy and Compliance - SMB Nation 2015Office 365 Security, Privacy and Compliance - SMB Nation 2015
Office 365 Security, Privacy and Compliance - SMB Nation 2015Robert Crane
 
HPE-Security update talk presented in Vienna to partners on 15th April 2016
HPE-Security update talk presented in Vienna to partners on 15th April 2016HPE-Security update talk presented in Vienna to partners on 15th April 2016
HPE-Security update talk presented in Vienna to partners on 15th April 2016SteveAtHPE
 

Similar a GDPR Part 2: Quest Relevance (20)

Breakdown of Microsoft Purview Solutions
Breakdown of Microsoft Purview SolutionsBreakdown of Microsoft Purview Solutions
Breakdown of Microsoft Purview Solutions
 
Vuzion Love Cloud GDPR Event
Vuzion Love Cloud GDPR Event Vuzion Love Cloud GDPR Event
Vuzion Love Cloud GDPR Event
 
Microsoft Cloud GDPR Compliance Options (SUGUK)
Microsoft Cloud GDPR Compliance Options (SUGUK)Microsoft Cloud GDPR Compliance Options (SUGUK)
Microsoft Cloud GDPR Compliance Options (SUGUK)
 
Ethyca CodeDriven - Data Privacy Compliance for Engineers & Data Teams
Ethyca CodeDriven - Data Privacy Compliance for Engineers & Data TeamsEthyca CodeDriven - Data Privacy Compliance for Engineers & Data Teams
Ethyca CodeDriven - Data Privacy Compliance for Engineers & Data Teams
 
ISSA Atlanta - Emerging application and data protection for multi cloud
ISSA Atlanta - Emerging application and data protection for multi cloudISSA Atlanta - Emerging application and data protection for multi cloud
ISSA Atlanta - Emerging application and data protection for multi cloud
 
Big Data LDN 2017: Applied AI for GDPR
Big Data LDN 2017: Applied AI for GDPRBig Data LDN 2017: Applied AI for GDPR
Big Data LDN 2017: Applied AI for GDPR
 
Improve IT Security and Compliance with Mainframe Data in Splunk
Improve IT Security and Compliance with Mainframe Data in SplunkImprove IT Security and Compliance with Mainframe Data in Splunk
Improve IT Security and Compliance with Mainframe Data in Splunk
 
Bridging the Data Security Gap
Bridging the Data Security GapBridging the Data Security Gap
Bridging the Data Security Gap
 
Flash Friday: Data Quality & GDPR
Flash Friday: Data Quality & GDPRFlash Friday: Data Quality & GDPR
Flash Friday: Data Quality & GDPR
 
Webinar Metalogix "Auf der Zielgeraden zur DSGVO!"
Webinar Metalogix "Auf der Zielgeraden zur DSGVO!"Webinar Metalogix "Auf der Zielgeraden zur DSGVO!"
Webinar Metalogix "Auf der Zielgeraden zur DSGVO!"
 
GDPR challenges for the healthcare sector and the practical steps to compliance
GDPR challenges for the healthcare sector and the practical steps to complianceGDPR challenges for the healthcare sector and the practical steps to compliance
GDPR challenges for the healthcare sector and the practical steps to compliance
 
ISO/IEC 27001 & ISO/IEC 27002:2022: What you need to know
ISO/IEC 27001 & ISO/IEC 27002:2022: What you need to knowISO/IEC 27001 & ISO/IEC 27002:2022: What you need to know
ISO/IEC 27001 & ISO/IEC 27002:2022: What you need to know
 
Microsoft Office 365 Security and Compliance
Microsoft Office 365 Security and ComplianceMicrosoft Office 365 Security and Compliance
Microsoft Office 365 Security and Compliance
 
The EU General Protection Regulation and how Oracle can help
The EU General Protection Regulation and how Oracle can help The EU General Protection Regulation and how Oracle can help
The EU General Protection Regulation and how Oracle can help
 
The Three Critical Steps for Effective BYOD Management
The Three Critical Steps for Effective BYOD Management The Three Critical Steps for Effective BYOD Management
The Three Critical Steps for Effective BYOD Management
 
Laser App Conference 2017 - Sid Yenamandra, Entreda
Laser App Conference 2017 - Sid Yenamandra, EntredaLaser App Conference 2017 - Sid Yenamandra, Entreda
Laser App Conference 2017 - Sid Yenamandra, Entreda
 
Data protection within development
Data protection within developmentData protection within development
Data protection within development
 
Toreon adding privacy by design in secure application development oss18 v20...
Toreon adding privacy by design in secure application development   oss18 v20...Toreon adding privacy by design in secure application development   oss18 v20...
Toreon adding privacy by design in secure application development oss18 v20...
 
Office 365 Security, Privacy and Compliance - SMB Nation 2015
Office 365 Security, Privacy and Compliance - SMB Nation 2015Office 365 Security, Privacy and Compliance - SMB Nation 2015
Office 365 Security, Privacy and Compliance - SMB Nation 2015
 
HPE-Security update talk presented in Vienna to partners on 15th April 2016
HPE-Security update talk presented in Vienna to partners on 15th April 2016HPE-Security update talk presented in Vienna to partners on 15th April 2016
HPE-Security update talk presented in Vienna to partners on 15th April 2016
 

Más de Adrian Dumitrescu

OneIdentity - A Future-Ready Approach to IAM
OneIdentity - A Future-Ready Approach to IAMOneIdentity - A Future-Ready Approach to IAM
OneIdentity - A Future-Ready Approach to IAMAdrian Dumitrescu
 
Smart Analytics for The Big Unknown
Smart Analytics for The Big UnknownSmart Analytics for The Big Unknown
Smart Analytics for The Big UnknownAdrian Dumitrescu
 
Dell Software is Future Ready - no movie
Dell Software is Future Ready - no movieDell Software is Future Ready - no movie
Dell Software is Future Ready - no movieAdrian Dumitrescu
 
Dell software - Excellence for IT-Enabled Enterprises
Dell software - Excellence for IT-Enabled EnterprisesDell software - Excellence for IT-Enabled Enterprises
Dell software - Excellence for IT-Enabled EnterprisesAdrian Dumitrescu
 
GDPR Part 5: Better Together Quest & Cyberquest
GDPR Part 5: Better Together Quest & CyberquestGDPR Part 5: Better Together Quest & Cyberquest
GDPR Part 5: Better Together Quest & CyberquestAdrian Dumitrescu
 
GDPR Part 4: Better Together Quest & SonicWall
GDPR Part 4: Better Together Quest & SonicWallGDPR Part 4: Better Together Quest & SonicWall
GDPR Part 4: Better Together Quest & SonicWallAdrian Dumitrescu
 
GDPR Part 3: Practical Quest
GDPR Part 3: Practical QuestGDPR Part 3: Practical Quest
GDPR Part 3: Practical QuestAdrian Dumitrescu
 

Más de Adrian Dumitrescu (8)

OneIdentity - A Future-Ready Approach to IAM
OneIdentity - A Future-Ready Approach to IAMOneIdentity - A Future-Ready Approach to IAM
OneIdentity - A Future-Ready Approach to IAM
 
Smart Analytics for The Big Unknown
Smart Analytics for The Big UnknownSmart Analytics for The Big Unknown
Smart Analytics for The Big Unknown
 
Dell Software is Future Ready - no movie
Dell Software is Future Ready - no movieDell Software is Future Ready - no movie
Dell Software is Future Ready - no movie
 
Dell software - Excellence for IT-Enabled Enterprises
Dell software - Excellence for IT-Enabled EnterprisesDell software - Excellence for IT-Enabled Enterprises
Dell software - Excellence for IT-Enabled Enterprises
 
GDPR Part 5: Better Together Quest & Cyberquest
GDPR Part 5: Better Together Quest & CyberquestGDPR Part 5: Better Together Quest & Cyberquest
GDPR Part 5: Better Together Quest & Cyberquest
 
GDPR Part 4: Better Together Quest & SonicWall
GDPR Part 4: Better Together Quest & SonicWallGDPR Part 4: Better Together Quest & SonicWall
GDPR Part 4: Better Together Quest & SonicWall
 
GDPR Part 3: Practical Quest
GDPR Part 3: Practical QuestGDPR Part 3: Practical Quest
GDPR Part 3: Practical Quest
 
GDPR Part 1: Quick Facts
GDPR Part 1: Quick FactsGDPR Part 1: Quick Facts
GDPR Part 1: Quick Facts
 

Último

My Presentation "In Your Hands" by Halle Bailey
My Presentation "In Your Hands" by Halle BaileyMy Presentation "In Your Hands" by Halle Bailey
My Presentation "In Your Hands" by Halle Baileyhlharris
 
Introduction to Artificial intelligence.
Introduction to Artificial intelligence.Introduction to Artificial intelligence.
Introduction to Artificial intelligence.thamaeteboho94
 
Uncommon Grace The Autobiography of Isaac Folorunso
Uncommon Grace The Autobiography of Isaac FolorunsoUncommon Grace The Autobiography of Isaac Folorunso
Uncommon Grace The Autobiography of Isaac FolorunsoKayode Fayemi
 
Zone Chairperson Role and Responsibilities New updated.pptx
Zone Chairperson Role and Responsibilities New updated.pptxZone Chairperson Role and Responsibilities New updated.pptx
Zone Chairperson Role and Responsibilities New updated.pptxlionnarsimharajumjf
 
Dreaming Marissa Sánchez Music Video Treatment
Dreaming Marissa Sánchez Music Video TreatmentDreaming Marissa Sánchez Music Video Treatment
Dreaming Marissa Sánchez Music Video Treatmentnswingard
 
Bring back lost lover in USA, Canada ,Uk ,Australia ,London Lost Love Spell C...
Bring back lost lover in USA, Canada ,Uk ,Australia ,London Lost Love Spell C...Bring back lost lover in USA, Canada ,Uk ,Australia ,London Lost Love Spell C...
Bring back lost lover in USA, Canada ,Uk ,Australia ,London Lost Love Spell C...amilabibi1
 
AWS Data Engineer Associate (DEA-C01) Exam Dumps 2024.pdf
AWS Data Engineer Associate (DEA-C01) Exam Dumps 2024.pdfAWS Data Engineer Associate (DEA-C01) Exam Dumps 2024.pdf
AWS Data Engineer Associate (DEA-C01) Exam Dumps 2024.pdfSkillCertProExams
 
SOLID WASTE MANAGEMENT SYSTEM OF FENI PAURASHAVA, BANGLADESH.pdf
SOLID WASTE MANAGEMENT SYSTEM OF FENI PAURASHAVA, BANGLADESH.pdfSOLID WASTE MANAGEMENT SYSTEM OF FENI PAURASHAVA, BANGLADESH.pdf
SOLID WASTE MANAGEMENT SYSTEM OF FENI PAURASHAVA, BANGLADESH.pdfMahamudul Hasan
 
Digital collaboration with Microsoft 365 as extension of Drupal
Digital collaboration with Microsoft 365 as extension of DrupalDigital collaboration with Microsoft 365 as extension of Drupal
Digital collaboration with Microsoft 365 as extension of DrupalFabian de Rijk
 
Unlocking Exploration: Self-Motivated Agents Thrive on Memory-Driven Curiosity
Unlocking Exploration: Self-Motivated Agents Thrive on Memory-Driven CuriosityUnlocking Exploration: Self-Motivated Agents Thrive on Memory-Driven Curiosity
Unlocking Exploration: Self-Motivated Agents Thrive on Memory-Driven CuriosityHung Le
 
Proofreading- Basics to Artificial Intelligence Integration - Presentation:Sl...
Proofreading- Basics to Artificial Intelligence Integration - Presentation:Sl...Proofreading- Basics to Artificial Intelligence Integration - Presentation:Sl...
Proofreading- Basics to Artificial Intelligence Integration - Presentation:Sl...David Celestin
 
lONG QUESTION ANSWER PAKISTAN STUDIES10.
lONG QUESTION ANSWER PAKISTAN STUDIES10.lONG QUESTION ANSWER PAKISTAN STUDIES10.
lONG QUESTION ANSWER PAKISTAN STUDIES10.lodhisaajjda
 
Jual obat aborsi Jakarta 085657271886 Cytote pil telat bulan penggugur kandun...
Jual obat aborsi Jakarta 085657271886 Cytote pil telat bulan penggugur kandun...Jual obat aborsi Jakarta 085657271886 Cytote pil telat bulan penggugur kandun...
Jual obat aborsi Jakarta 085657271886 Cytote pil telat bulan penggugur kandun...ZurliaSoop
 
Report Writing Webinar Training
Report Writing Webinar TrainingReport Writing Webinar Training
Report Writing Webinar TrainingKylaCullinane
 
Dreaming Music Video Treatment _ Project & Portfolio III
Dreaming Music Video Treatment _ Project & Portfolio IIIDreaming Music Video Treatment _ Project & Portfolio III
Dreaming Music Video Treatment _ Project & Portfolio IIINhPhngng3
 

Último (17)

My Presentation "In Your Hands" by Halle Bailey
My Presentation "In Your Hands" by Halle BaileyMy Presentation "In Your Hands" by Halle Bailey
My Presentation "In Your Hands" by Halle Bailey
 
Introduction to Artificial intelligence.
Introduction to Artificial intelligence.Introduction to Artificial intelligence.
Introduction to Artificial intelligence.
 
Uncommon Grace The Autobiography of Isaac Folorunso
Uncommon Grace The Autobiography of Isaac FolorunsoUncommon Grace The Autobiography of Isaac Folorunso
Uncommon Grace The Autobiography of Isaac Folorunso
 
Zone Chairperson Role and Responsibilities New updated.pptx
Zone Chairperson Role and Responsibilities New updated.pptxZone Chairperson Role and Responsibilities New updated.pptx
Zone Chairperson Role and Responsibilities New updated.pptx
 
Dreaming Marissa Sánchez Music Video Treatment
Dreaming Marissa Sánchez Music Video TreatmentDreaming Marissa Sánchez Music Video Treatment
Dreaming Marissa Sánchez Music Video Treatment
 
Bring back lost lover in USA, Canada ,Uk ,Australia ,London Lost Love Spell C...
Bring back lost lover in USA, Canada ,Uk ,Australia ,London Lost Love Spell C...Bring back lost lover in USA, Canada ,Uk ,Australia ,London Lost Love Spell C...
Bring back lost lover in USA, Canada ,Uk ,Australia ,London Lost Love Spell C...
 
AWS Data Engineer Associate (DEA-C01) Exam Dumps 2024.pdf
AWS Data Engineer Associate (DEA-C01) Exam Dumps 2024.pdfAWS Data Engineer Associate (DEA-C01) Exam Dumps 2024.pdf
AWS Data Engineer Associate (DEA-C01) Exam Dumps 2024.pdf
 
in kuwait௹+918133066128....) @abortion pills for sale in Kuwait City
in kuwait௹+918133066128....) @abortion pills for sale in Kuwait Cityin kuwait௹+918133066128....) @abortion pills for sale in Kuwait City
in kuwait௹+918133066128....) @abortion pills for sale in Kuwait City
 
SOLID WASTE MANAGEMENT SYSTEM OF FENI PAURASHAVA, BANGLADESH.pdf
SOLID WASTE MANAGEMENT SYSTEM OF FENI PAURASHAVA, BANGLADESH.pdfSOLID WASTE MANAGEMENT SYSTEM OF FENI PAURASHAVA, BANGLADESH.pdf
SOLID WASTE MANAGEMENT SYSTEM OF FENI PAURASHAVA, BANGLADESH.pdf
 
Digital collaboration with Microsoft 365 as extension of Drupal
Digital collaboration with Microsoft 365 as extension of DrupalDigital collaboration with Microsoft 365 as extension of Drupal
Digital collaboration with Microsoft 365 as extension of Drupal
 
Unlocking Exploration: Self-Motivated Agents Thrive on Memory-Driven Curiosity
Unlocking Exploration: Self-Motivated Agents Thrive on Memory-Driven CuriosityUnlocking Exploration: Self-Motivated Agents Thrive on Memory-Driven Curiosity
Unlocking Exploration: Self-Motivated Agents Thrive on Memory-Driven Curiosity
 
Proofreading- Basics to Artificial Intelligence Integration - Presentation:Sl...
Proofreading- Basics to Artificial Intelligence Integration - Presentation:Sl...Proofreading- Basics to Artificial Intelligence Integration - Presentation:Sl...
Proofreading- Basics to Artificial Intelligence Integration - Presentation:Sl...
 
lONG QUESTION ANSWER PAKISTAN STUDIES10.
lONG QUESTION ANSWER PAKISTAN STUDIES10.lONG QUESTION ANSWER PAKISTAN STUDIES10.
lONG QUESTION ANSWER PAKISTAN STUDIES10.
 
Jual obat aborsi Jakarta 085657271886 Cytote pil telat bulan penggugur kandun...
Jual obat aborsi Jakarta 085657271886 Cytote pil telat bulan penggugur kandun...Jual obat aborsi Jakarta 085657271886 Cytote pil telat bulan penggugur kandun...
Jual obat aborsi Jakarta 085657271886 Cytote pil telat bulan penggugur kandun...
 
ICT role in 21st century education and it's challenges.pdf
ICT role in 21st century education and it's challenges.pdfICT role in 21st century education and it's challenges.pdf
ICT role in 21st century education and it's challenges.pdf
 
Report Writing Webinar Training
Report Writing Webinar TrainingReport Writing Webinar Training
Report Writing Webinar Training
 
Dreaming Music Video Treatment _ Project & Portfolio III
Dreaming Music Video Treatment _ Project & Portfolio IIIDreaming Music Video Treatment _ Project & Portfolio III
Dreaming Music Video Treatment _ Project & Portfolio III
 

GDPR Part 2: Quest Relevance

  • 1. Guarantee data protection for your clients Adrian DUMITRESCU Q-East Software www.qeast.ro
  • 2. 2 Topic relevance The GDPR requires organizations — both “data controllers” and “data processors” — to strengthen their data protection and security measures to protect the personally identifiable information (PII) of EU citizens, and to demonstrate their compliance at any time. More specifically, organizations must ensure the following:  Only people who should have access to sensitive data actually have access.  Reasonable measures are in place to protect the data from unauthorized access.  There is accountability of who is accessing the data.  The organization has an accurate understanding of the scope of any data breach in a timely manner. If you offer products or services to EU citizens, have EU citizens as employees or even accept job applications from EU citizens, you are almost certainly subject to the new GDPR legislation.
  • 3. 3 Critical strategies for compliance #1 Know all about the personal data you store #2 Carefully manage access to personal data #3 Encrypt as much data as possible #4 Monitor changes that could affect sensitive data, and prevent the most critical changes #5 Investigate potential breaches Quick Fact: Insider threats represent up to 60% of all attacks. How quickly can you spot an insider abusing their privileges or an attacker using compromised credentials?
  • 4. 4 How Quest can help Quest solutions can help make it easier to ensure that your customer on-premises, cloud or hybrid environment meets GDPR compliance requirements. Your customers can start preparing for GDPR now by improving their security posture and strengthening data protection safeguards across the entire environment. Doing so can help them achieve and maintain GDPR compliance and avoid costly fines and reputation damage.
  • 5. 5 Why Quest Secure and manage data B E T T E R Modernize infrastructure F A S T E R All network devices C O N T R O L L E D Turn data into insights Q U I C K E R Quest customers gain a competitive edge though better use of their IT resources. By automating the mundane IT teams can redesign their work helping their firm: Connect to the cloud E A S I E R
  • 6. 6 Who We Are 9 0 % o f F o r t u n e 1 0 0 using our software 1 , 5 0 0 engineers building quality products 4 M c o m m u n i t y m e m b e r s sharing best practices 3 , 5 0 0 employees focused on customers Quest is a global software provider trusted by 100,000 customers and 6,000 partners in 100 countries. We help IT organizations spend less time on administration and more time on innovation. 6 , 0 0 0 partners selling our software
  • 7. 7 Compliance Roadmap Prepare AuthorizationProtect & Secure ReviewManage Data Protection Impact Assessment Obtain prior Authorization from the Supervisory Authority Data Protection Officer Protect all data Data Protection Compliance Review Define the way data is collected and managed
  • 8. 8 #1: Data Protection Impact Assessment According to a 2016 Ponemon Report, only 12% of IT and security staff know the risk of their structured data • You need to have a global visibility of sensitive data • Make sure you are only managing data that you actually need or are lawful to process • Understand data proliferation Prepare AuthorizationProtect & Secure ReviewManage
  • 9. 5 IT auditing & compliance mistakes organizations make Lack of visibility into who is doing what in Windows environments. Underestimating user & organizational impact. Inconsistent or absence of a GRC strategy. Inadequate data protection. 1 2 3 4 Failure to plan and manage external and internal audits.5
  • 10. What if you could… 1 With one view answer: who has access, how was it obtained, and how was it used – all in real time? 2 Complete investigations with full-text search of critical IT data and its relation to users and events? 3 Report on user activity for internal investigations and compliance? 4 Be alerted on violations, malicious activity and suspicious trends as they happen? 5 Automate andsecure collection oflog data from disparate platformswithout needing expertise? 6 Save expensive storage space andmaintain compliance by storing event logs in a compressed format? 7 Troubleshoot andpinpoint problems should an incident occur foroperational visibility? 8 Improveinsight andcommunication across teams with flexible reporting? 9 Eliminate information security silos with integration for SIEMsolutions? 10 Leverage auditing solutions already in place?
  • 11. Evaluating business risks in terms of security and compliance
  • 12. Translating criptic knowledge into business insight USERS DATA APPLICATIONS IT Engineer PEOPLE INFORMATION PROCESSES
  • 13. And enabling management to take the right decisions PEOPLE INFORMATION PROCESSES Business Manager
  • 14. 14 #2: Define the way data is collected and managed Embrace privacy by design principles • Proactive not reactive; Preventative not remedial • Privacy as the default setting • Privacy embedded into design • Full functionality – positive-sum, not zero-sum • End-to-end security – full lifecycle protection • Visibility and transparency – keep it open • Respect for user privacy – keep it user-centric Prepare AuthorizationProtect & Secure ReviewManage
  • 15. Information Management is about PROCESSES #1 Performance Management #2 Big Data & BI
  • 16. 16 Foglight for the Internet of Things
  • 17. Transform – Integrate - Develop Toad supports the entire database application lifecycle
  • 18. 18 #3: Protect all data Implement data security requirements • ensure the ongoing confidentiality, integrity, availability and resilience of systems and services processing personal data • take preventive, corrective and mitigating action in near real time against vulnerabilities • regularly test, assess and evaluate the effectiveness of security policies Implement backup and data recovery policies • Create a backup policy that clearly identifies roles, responsibilities, schedule, location, formats • Define the differences between backups and archiving data • Include archiving in addition to processes such as data rescue, data reformatting, data conversion, metadata Designate a data protection officer Prepare AuthorizationProtect & Secure ReviewManage
  • 19. Data Protection is about INFORMATION #1 Backup and Replication #2 InformationSecurity
  • 20. Foundational Backup & Recovery Cross-Platform Backup & Recovery Simpleyetscalablebackupandrecoveryformixed environments Replication & Disaster Recovery Solutions for site, server, and application disaster recovery Continuous Data Protection Real-time backup and instant recovery for mission-critical applications Data Deduplication Byte-level, variable-block-size deduplication to reduce the backup storage footprint by up to 90% Virtual Protection VMware & Hyper-V backup, replication, and recovery
  • 22. Endpoint Management: END-TO-END ELM Inventory&Asset Management Service Desk Systems Deployment Software Distribution Patch & Security Management
  • 23. Privileged Account Management • Hardened Appliance • Full AES disk encryption • FIPS 140-2 & ISO 27001 • Embedded hardware firewall • Purpose built for security • No direct access of any kind • Syslog integration • Highly available architecture • Scalable clustering • Small 1U footprint • Hardware redundancy • Agentless architecture • RESTful API • Secure audit backup ONE IDENTITY SAFEGUARD FOR PRIVILEGED PASSWORDS AND SESSIONS
  • 24. 24 #4: Obtain prior Authorization from the Supervisory Authority • Comply with the requirements for prior authorization or prior consultation of the supervisory authority in order to ensure the compliance of the processing with EUGDPR • Set procedures in place for contacting the supervisory authority on issues related to the processing and consulting with the supervisory authority (Data Protection Officer) Prepare AuthorizationProtect & Secure ReviewManage
  • 25. Identity Management is about PEOPLE #1 Userprovisioning #2 Access control
  • 26. 26 Four Fundamental Concepts Improve visibility into who has access to business critical information, automate provisioning and enforce access controls. Access Governance Centrally manage privileged accounts and provide granular control of administrator access. Privileged Account Management Simplify the environment and user experience with centralized account management. Identity Administration Audit what the users are doing with the access they have been granted. User Activity Monitoring
  • 28. 28 #5: Data Protection Compliance Review Implement compliance policies which shall be reviewed at least every two years and updated where necessary (compliance review shall be carried out at least once every two years) Where the compliance review results show compliance inconsistencies, the review shall include recommendations on how to achieve full compliance Prepare AuthorizationProtect & Secure ReviewManage
  • 31. Quest Software: International leadership 1M customers 90% of Global 1000 are Quest Software customers 4M community members Highest overall protection Next-Gen Firewall NSS Labs EMA Radar Report Value Leader for Boomi Cloud Integration 6,000 team members Gartner $2B software revenue 9 Magic Quadrants 1,600 software engineers 2,500 software sales

Notas del editor

  1. Thank you for you time today. As I will demonstrate, I believe your time is critical to you and your organization. I’d like to introduce you to our organization, talk about how we help thousands of customers like you, and learn more about how we can help you with your specific challenges.
  2. Most organizations have three major questions about the GDPR: Is my organization subject to the GDPR? What does the GDPR mean for my organization? Is this an urgent issue?
  3. Key GDPR provisions: Protection of personal data: right to be forgotten, data protection by design and by default, data portability Continuous compliance and audit Mandatory breach notifications To achieve GDPR compliance, you need to gain a clear understanding of the scope of the sensitive data your organization handles, and implement proper processes to protect that data. Organizations are required to demonstrate GDPR compliance not just monthly or annually, but whenever an auditor asks
  4. Without the right tools, achieving and maintaining GDPR compliance for heterogeneous environments is extremely time-consuming and costly, and diverts resources away from improving operational efficiency, meeting SLAs and innovating the business.
  5. In IT, you’re always under tight deadlines because time is your most valuable asset. This is where Quest can help. We tackle one of the biggest challenges IT admins face daily: having to using static management tools, left over from a previous era, to administer their highly virtualized infrastructure and cloud-connected applications. This technical inflexibility sucks time from IT teams that would be better spent working on innovation to unlock new sources of company revenue. Our customers gain a competitive edge though better use of their IT resources. By automating the mundane IT teams can redesign their work helping firms turn data into insights quicker, modernize infrastructure faster, connect to the cloud easier, secure data better and get control of every device that touches their network. We have a history of getting these results. [ NEXT SLIDE]
  6. Based on decades of experience with 100,000 customers in 100 countries, we help you spend less time on administration and more time on innovation.   Our solutions automate and simplify the work being done at more than 100,000 organizations worldwide. We help firms get where they need to go sensibly with solutions that use a combination of on-premise, hybrid and cloud-based technology to improve the effectiveness of all their major workloads including Microsoft, Oracle and SAP. Which one of these is most troubling to your business?
  7. Everyone should understand that for organizations to be successful on a competitive market, it’s not about the technology but about enterprise collaboration and about creating the culture to allow and drive the RIGHT people to do the RIGHT job by using the RIGHT tools The right technology, in the right situation can go a long way towards enabling teams and people to manage business processes and by that, collaborate for the common goal of maximizing business productivity
  8. IT-enabled enterprises are organizations where IT is given the RIGHT purpose of putting technology in the hands of the business. This is done by reaching a level of cultural conscience that enables the organization to adopt those scalable, integrated and enterprise-designed solutions that are built from scratch with the single purpose in mind of being used by non-IT people and providing value to managers Market research shows that in IT-enabled enterprises, IT value counts as much as 20% of the whole business, because this is business that is adaptive, flexible, responsive to changes and has business processes that are clearly defined and rightfully managed by the right people.
  9. And by that, relieving IT of the load of managing people, information and processes and putting them in the RIGHT position of adding IT value to the organization. An IT-enabled enterprise provides much higher ROI and has a greater TCO than a traditional one.
  10. For IT personnel, Information Management is about implementing and maintaining APPLICATIONS that will be used by non-IT PEOPLE in order to manage PROCESSES that transform DATA into INFORMATION… in other words, it’s about APPLICATION PERFORMANCE and DATA MANAGEMENT There are two major areas of interest: #1 Application Performance Management #2 Big Data Analytics and Business Intelligence
  11. TRANSFORM – INTEGRATE - DEVELOP Toad - The best known family of tools dedicated to database development & administration, but also to BI, with roots going back to the 90’s! Quest enables self-service business intelligence, which means easily and secure access to structured and unstructured data from nearly any source, within a collaborative analysis environment that streamlines data sharing between IT and business, thru intuitive interfaces and leading visualization capabilities that enable business and technical users to easily discover new insight. Going back to Development, Toad is the world’s #1 name for DBAs everywhere. Dell guarantees application success through improved code quality, performance and maintainability and gives you access to a community of 3 mil. users
  12. Data Protection covers two major areas: #1 – Ensuring information exists and is always actual within systems and applications, which is done via data backup and replication In other words, data backup and replication technologies ensure that PEOPLE will always be able to use and exchange most recent corporate INFORMATION in their day-to-day job activities #2 - Ensuring information is safe and secure In other words, access control technologies ensure that INFORMATION will be accessed, changed and shared only by the RIGHT people, at the RIGHT time and by using the RIGHT tools so that corporate intellectual property is safe from theft or loss, and the information management tools used are working without downtime
  13. Dell backup and recovery solutions range from scalable software designed for almost any platform, to CDP & deduplication appliances as well as database & application specific data protection. Dell solutions cut backup windows from hours to minutes – and recovering data takes only seconds. Only Dell allows your customers to back up physical and virtual machines with either agent-based or agentless backup, giving them the best of both worlds. Plus, our broad portofolio lets IT choose the speed at which they recover data to meet business-driven SLAs, as well as choose the levels of protection based on how vital data and applications are to the business Note to presenter: Comprehensive data protection software: NetVault Backup CDP solutions: AppAssure Deduplication applicances: DR4000 \ DR6000 Application Specific: Recovery Manager for AD / Exchange / SharePoint, vRanger Database Specific: LiteSpeed for SQL Server
  14. Dell is the only player on the market that provides high-speed replication for both physical and virtual environments and at any layer: infrastructure, database and application. Your customer will be able to achieve high availability, offload operational reporting to a cost-effective secondary system and integrate existing data stores by copying only changed data to VMware, Hyper-V, Windows and Linux, File Systems, Exchange, Oracle, Hadoop, SQL Server, IBM DB2 and other platforms. Our solutions also simplify and accelerate backup and recovery while dramatically reducing storage costs. Note to presenter: we are discussing about Shareplex, AppAssure, vRanger Also, we’d like to mention here that Dell Compellent is the only solution on the market that leverages thin remote replication at block level. Thin replication transfers only blocks of data that have changed and does not require pre-allocation, consuming less space and helping to lower bandwidth costs.
  15. 22
  16. 23
  17. Identity and Access Management is about creating, maintaining and mapping user accounts for the PEOPLE that will access corporate SYSTEMS and APPLICATIONS And also to control and make sure each PERSON has the RIGHT access to do the RIGHT job by using the RIGHT tools, nothing more and nothing less Identity Management is a broad administrative area that deals with identifying individuals in a system (such as a country, a network, or an organization) and controlling access to the resources in that system by placing restrictions on the established identities of the individuals
  18. All of the „A”assume there is an identity established for each user. This identity or account resides somewhere (typically in a directory) so it can be authenticated, authorized, managed and audited. And typically the directory is tied specifically and exclusively to the application or system that controls user access. If all this is done correctly, the four „A” are easily satisfied. All systems include these requirements for authentication, authorization, administration and audit.
  19. Dell Software gives you 30 years of experience in Information Management, Identity Management and Data Protection. This continuous effort enabled us to position the company as an international leader with over 1 mil. customers, 90% of the Global 1000 being among them