Click me
Transcript

Enterprise Information Security Strategic Technologies

ENTERPRISE INFORMATION SECURITY STRATEGIC TECHNOLOGIES 3 AREAS TO FOCUS INVESTMENT CYBER- THREAT RESILIENCY OPTIMIZING END-USER EXPERIENCE CLOUD SECURITY New Cloud security Security leaders focus on Better UX translates into resilience against cyber threats. In the face of on-going intrusions, the goal is to prevent increased efficiency for enterprise employees. It means having less in the way: fewer and faster attackers from achieving sign-ons; quicker access adoption, providing risk to data and applications, services deliver better visibility and control. They address security problems slowing cloud their outcomes, manage assessment and controls assurance, identity and access management, protection of user credentials, and encryption to meet regulatory requirements. the inevitable breaches, and the freedom to and minimize their impact. securely move between devices, locatlons, and platforms. 01011110000011 01000111010 010001010 01 11111000 01010101010 1110 TECHNOLOGIES SECURITY NEXT-GEN ANTI- MALWARE ANALYTICS A foundational technology to helo Add new techniques to this baseline capability achieve a stronger cyber defense FLEXIBLE AUTHENTICATION NEW CLOUD SERVICES МЕТНODS: Evaluate services to help with Implement new analytics drivenfrisk-based models visibility and control in the Cloud IDENTITY AND ACCESS MANAGEMENT Increase granularity - providing deeper, vital insight into user privileges MAKING THE MOST OFYOUR TECH INVESTMENTS 3. Maximize Value Through Formalized Technology Investments 1. Look at least 3 years ahead 2. Achieve a Bigger Picture Through A three-year rolling plan Integration helps focus limited capital on forward- leaning security investments. Consider how technology will evalve and what risks will applications. Favor it create or change. Be willing to make bets on where you think technology will land. The greatest payoffs often come from connecting and consolldating multiple Formal approaches to deployment help proactively help manage risk and maximize value. solutions that can be part Predict and track total Integrated architecture and use costs. Scale deployments appropriately for quick of an point solutions only where wins. Approach necessary to meet niche requirements. maintenance strategically, especially for alder technologies. ABOUT THIS SERIES OF REPORTS FROM SBIC What does an effective and forward-leaning information security program look like? The Security for Business Innovation Council (SBIC) has produced a series of three reports on "Transforming Information Security" to answer that question. Fusing the knowledge and vision of top information security leaders, the reports deliver actionable recommendations. Security for Business Innovation Council An industry initiative sponsored by RSA TWEET THIS www.emc.comrsa-sbic113

Enterprise Information Security Strategic Technologies

shared by Deksia on May 12
176 views
1 shares
0 comments
Infographic based on SBIC Report "Transforming Information Security: Focusing on Strategic Technologies ". The report is in final editing stage. See the attached technology messaging draft for informa...

Source

Unknown. Add a source

Category

Technology
Did you work on this visual? Claim credit!

Get a Quote

Embed Code

For hosted site:

Click the code to copy

For wordpress.com:

Click the code to copy
Customize size