RSA® Conference Europe 2010, London, UK - October 11, 2010 -
Building a systematic strategy to help organizations efficiently and reliably manage security across physical, virtual and cloud infrastructures was the theme of the opening keynote at RSA® Conference Europe 2010 delivered by top executives from RSA, The Security Division of EMC.
In a joint keynote address, RSA President Art Coviello and RSA Chief Operating Officer Tom Heiser outlined a compelling vision and real world strategy demonstrating how security organizations can take advantage of the opportunities enabled by virtualization and cloud computing to build "air traffic control systems for information security" to achieve more secure, compliant and manageable information infrastructures.
"The security industry does not have a system that integrates people, process and individual security controls that can be managed with the same kind of correlated, contextual and comprehensive view used by the aviation industry to guarantee the safety of our airways," said Art Coviello, President, RSA, The Security Division of EMC. "Information security management needs to function as a system capable of effectively and efficiently managing our information infrastructures providing visibility, manageability and control across all three domains – physical, virtual and cloud. We need a system that enables us to close the gaps of protection and apply controls in a more holistic, systemic manner, centralizing management not just for some vendor controls, but for all."
In the joint keynote address, both EMC executives addressed the challenges IT teams face as a result of siloed, inefficient and ineffective point tool approaches to administering and enforcing security policy across hybrid IT infrastructures. Coviello and Heiser also detailed three layers, working in concert required to achieve the vision of a successful 'air traffic control system' for information security:
1. A Controls Enforcement Layer which is the point of security detection enforcement across the infrastructure. In an ideal environment, many controls are embedded directly into IT infrastructure such as operating systems and networks, providing ubiquitous coverage without deploying and managing hundreds of point tools.
2. A Controls Management Layer where organizations can provision and monitor security controls. Establishing this layer offers the opportunity to consolidate numerous security consoles.
3. A Security Management Layer where policies are defined that govern the organization and information infrastructure based on compliance requirements, best practices and the nature of risk. This is also the layer where events and alerts from controls across the infrastructure come together and are correlated to assess compliance and remediate as necessary. This visibility layer is about bringing together what were once isolated technologies, inputs and feeds, into a single platform or framework, the same as an air traffic control system.
"In the end the goal is to simplify management and enhance alignment between the security team responsible for defining security policy and the operations team charged with implementing that policy," said Tom Heiser, Chief Operations Officer for RSA, The Security Division of EMC. "By integrating these technologies, systems and feeds we enable a holistic approach to risk management and compliance; a single view to the most important security and compliance elements across the entire IT environment. In effect, we’ve built our version of air traffic control for the traditional information infrastructure."
The executives then detailed how this same approach could be used as organizations journey to the cloud, leveraging virtualization to deliver better security by providing a single point of visibility and coordination for physical, virtual and cloud assets. They provided two examples of air control capabilities in cloud environments. The first referenced a RSA, VMWare and Intel technology demonstration that leverages Intel's Trusted Execution Technology and the RSA Archer® Enterprise Governance, Risk and Compliance platform designed to create a chain of trust from the processor through the hypervisor and to the operating system. This capability is engineered to make it possible to actually verify that virtual applications are running on infrastructure that has not been compromised by malware. The second example described a new technology demonstration that now leverages Intel's TXT processor, VMWare vCenter and the RSA Archer eGRC platform designed to control and manage geographic location of VMs. This technology is engineered to enable policy based restrictions preventing sensitive data and processes in the cloud from travelling to unauthorized locations.
Information regarding additional RSA announcements can be found at RSA.com.
, a part of , enables organizations to modernize, automate and transform their using industry-leading , servers, and data protection technologies. This provides a trusted foundation for businesses to transform IT, through the creation of a , and transform their business through the creation of cloud-native applications and solutions. Dell EMC services customers across 180 countries – including 98 percent of the Fortune 500 – with the industry’s most comprehensive and innovative portfolio from edge to core to cloud.