safenet data protection on demand (dpod)...safenet data protection on demand is a cloud-based...

Post on 26-Jun-2020

6 Views

Category:

Documents

0 Downloads

Preview:

Click to see full reader

TRANSCRIPT

Arthur Tagmann, PreSales Consultant - Identity & Data ProtectionJune 2018

SafeNet Data Protection on Demand (DPoD)

CONFIDENTIAL FOR INTERNAL USE ONLYTAKE THE LEAD2

The Challenges

Our Solution

Introduction

Customer References

Your Benefit

Summary

SafeNet Data Protection on Demand - Agenda

3

THE CHALLENGES

Enterprise & Cyber SecurityTAKE THE LEAD4

The transformation in Data ProtectionThe Challenge:

Compliance in a Cloudy world

SaaS Applications

The Change:Audience Transformation

Result: 60% of data is NOT encrypted

……. which makes compliance TOUGH!!

Enterprise & Cyber SecurityTAKE THE LEAD5

Are you ready to change the way you protect data?We need a comprehensive data

protection strategy to securesensitive data that scales across ourorganization and allows us to takeadvantage of a service model, toleverage our hybrid environments

securely.

We have limited resources but weneeded a cost effective and streamlinedapproach for protecting sensitive data,to meet compliance regulations such as

GDPR and PCI DSS quickly andeffectively.

My critical data is dynamic so Iinvest in lots of services that

need money, support, resourcesand knowledge to allow me tomeet business needs and SLAs

within these complex of projects.

My ability to assure confidentiality,integrity and availability are

constrained by the location, upfrontcosts and proprietary policies required.

I need my security to be simple todeploy with as little impact on my

users as possible – rapid deploymentand frictionless use are critical

7

OUR SOLUTION

Enterprise & Cyber SecurityTAKE THE LEAD8

Our answer to the transformation -Data Protection On Demand

SafeNet Data Protection On Demand is a cloud-based platformthat provides a wide range of on-demand key management and encryption services

through a simple online marketplace.

With SafeNet Data Protection On Demand,security is made simpler, more cost effective and easier to manage

because there is no hardware to buy, deploy and maintain.

Just click and deploy the protection you need, provision services, addsecurity policies and get usage reporting in minutes

Enterprise & Cyber SecurityTAKE THE LEAD9

The DPoD service platform in a Nutshell

Virtual

Cloud

Data Center

Protect Everywhere

Network

Payments &Transactions

IoT

Big Data

Protect Everything

PersonalData

SAFENET DATA PROTECTION ON DEMAND

Applications

ROOT OFTRUST

KEYMANAGEMENT

ENCRYPTION

MARKETPLACE

POLICYMANAGEMENT &

REPORTING

SaaS

PaaS

IaaS

APIs

Multi-TierMulti-Tenant

Enterprise & Cyber SecurityTAKE THE LEAD10

DPoD Service Structure

CUSTOMERS

HSM

Encryption

API &3rd Party

BYOK

Key Broker

Enterprise & Cyber SecurityTAKE THE LEAD11

DPoDMarketPlace

Today &Tomorrow

KeyBrokers forO365 & AWS

Encryption On Demand Services

File & folderEncrypt your

unstructured data

Virtual MachineEncrypt your

Virtual Machines

Servicesavailable inDPoD today

Enterprise & Cyber SecurityTAKE THE LEAD12

KeyBrokers forO365 & AWS

Encryption On Demand Services

File & folderEncrypt your

unstructured data

Virtual MachineEncrypt your

Virtual Machines

Servicesavailable inDPoD today

Partner Services

XYZ ServiceBy

Company X

XYZ ServiceBy

Company Y

XYZ ServiceBy

Company Z

DPoDMarketPlace

Today &Tomorrow

Security SHOULD Feel to Enterprise Users and ITAdministrators….

….like a push of a button

Enterprise & Cyber SecurityTAKE THE LEAD14

Subscribe & Deploy; Made Simple and FrictionlessExample: Salesforce KeyBroker

5

MANAGE

4

CHECK/AUDIT

3

CREATE

2

AUTHENTICATE

1

SUBSCRIBE

Minutes

Enterprise & Cyber SecurityTAKE THE LEAD15

Sales Process – SimplifiedIdentify the Use Case /Opportunity

•HSM•Key Broker•Encryption etc.

1Free Evaluation2 Sign-up at our website

Full material kit

3 Sign Contract

Enterprise & Cyber SecurityTAKE THE LEAD16

What SafeNet Data Protection On Demand Does Best

AffordabilityEasy to subscribe to market

place and low monthly prices

InvestmentNo hardware to buy and pay

as you go billing

Low ComplexityPoint, click deploy reduces skill

requirements and usage

ScalabilityGrows to meet your on-

demand needs

SimplicityEasy to use, wizard-based

GUI and orchestrationtools

ManageabilityTake control of policies and

auditability

Low TCOFully managed with

SLA’s and fastdeployments

$

ProvenEstablished leadership,integration and value

#1

17

DEPLOYMENT

Enterprise & Cyber SecurityTAKE THE LEAD18

DPoD Data Center deployment

• DC’s failover internally andthen to same region

• DC’s in different continents donot have connection with eachother

• Tours and Dallas owned andmanaged by Gemalto

• Other DC’s are Co-location viaTier 1 partners

• Additional DC’s in planning

Ottawa

Dallas

FrankfurtToursWest Coast

19

CUSTOMER REFERENCES

Enterprise & Cyber SecurityTAKE THE LEAD20

Customer ReferencesFrench payment services company• Using DPoD for payment security related encryption• Wrapped into their own service for PCI-DSS compliancy• Selected DPoD over AWS due to e.g. High-Availability environment and committed 99.95% SLA

US Enterprise Content Management company• Using DPoD for securing the root keys for document digital signatures• Wrapped into their own services to enhance security• Needed a solution to provide e.g. zero upfront investment and cloud based pricing

US Manufacturing company• Using DPoD for securing root keys for code signing• Allowed them to focus quickly on their main use cases without IT infra investments• DPoD enabled easy testing and deployment with infinite scalability

21

YOUR BENEFIT

Enterprise & Cyber SecurityTAKE THE LEAD23

What is Your benefit

Customers

> Cloud Security Service

> No DC install & deployment

> High availability

> 12, 24 and 36 months contract> Including support &

maintenance

Partners

> Attractive alternative

> New customer segments

> Market differentiator

> Easy evaluation process

> Fast implementation

How to identify DPoD opportunities?

Enterprise & Cyber SecurityTAKE THE LEAD24

DPoD does support a wide range of use cases with services available today;Important to keep an open mind with opportunities!

Do not hesitate to contact us for support !

MSP / MSSPGrowing market, wraps DPoD

into their services

CompliancyGDPR, PCI-DSS …

Cloud migrationLooking to migrate to / from

public clouds

Limited resourcesLimited financial &

personnel resources

Extensivefeatures

Looking for a committedSLA, HA environment, 24/7

support

Unpredictable needsNeeds scalability / flexibility &

cloud based pricing

25

SAFENET DATA PROTECTION

Enterprise & Cyber SecurityTAKE THE LEAD26

Security Delivered the Way You Like It

ENCRYPTION KEY MANAGEMENTAND PROTECTION

IDENTITY AND ACCESSMANAGEMENT

• Data-at-rest encryption• Data-in-motion encryption

• Enterprise key lifecyclemanagement

• High assurance key protection• Crypto operations management

• Access management• Multi-factor authentication• PKI credential management

Hybrid

On-PremisesHardware or Software

On DemandCloud-based | as-a-Service

CO

NS

UM

PTIO

NM

OD

ELS

UN

IFIE

D D

ATA

SE

CU

RIT

YS

OLU

TIO

NS

Digital Payments &Transactions

Compliance EnterpriseSecurity

Internet ofThings

Big Data CloudPR

OTE

CT

AN

YTH

ING

Marketplace

API’s

Reporting& PolicyControl

Deployment &Orchestration

Enterprise & Cyber SecurityTAKE THE LEAD27

Security Delivered the Way You Like It

ENCRYPTION KEY MANAGEMENTAND PROTECTION

IDENTITY AND ACCESSMANAGEMENT

• Data-at-rest encryption• Data-in-motion encryption

• Enterprise key lifecyclemanagement

• High assurance key protection• Crypto operations management

• Access management• Multi-factor authentication• PKI credential management

Hybrid

On-PremisesHardware or Software

On DemandCloud-based | as-a-Service

CO

NS

UM

PTIO

NM

OD

ELS

UN

IFIE

D D

ATA

SE

CU

RIT

YS

OLU

TIO

NS

Digital Payments &Transactions

Compliance EnterpriseSecurity

Internet ofThings

Big Data CloudPR

OTE

CT

AN

YTH

ING

Marketplace

API’s

Reporting& PolicyControl

Deployment &Orchestration

Thank You!

top related