safenet data protection on demand (dpod)...safenet data protection on demand is a cloud-based...
TRANSCRIPT
Arthur Tagmann, PreSales Consultant - Identity & Data ProtectionJune 2018
SafeNet Data Protection on Demand (DPoD)
CONFIDENTIAL FOR INTERNAL USE ONLYTAKE THE LEAD2
The Challenges
Our Solution
Introduction
Customer References
Your Benefit
Summary
SafeNet Data Protection on Demand - Agenda
3
THE CHALLENGES
Enterprise & Cyber SecurityTAKE THE LEAD4
The transformation in Data ProtectionThe Challenge:
Compliance in a Cloudy world
SaaS Applications
The Change:Audience Transformation
Result: 60% of data is NOT encrypted
……. which makes compliance TOUGH!!
Enterprise & Cyber SecurityTAKE THE LEAD5
Are you ready to change the way you protect data?We need a comprehensive data
protection strategy to securesensitive data that scales across ourorganization and allows us to takeadvantage of a service model, toleverage our hybrid environments
securely.
We have limited resources but weneeded a cost effective and streamlinedapproach for protecting sensitive data,to meet compliance regulations such as
GDPR and PCI DSS quickly andeffectively.
My critical data is dynamic so Iinvest in lots of services that
need money, support, resourcesand knowledge to allow me tomeet business needs and SLAs
within these complex of projects.
My ability to assure confidentiality,integrity and availability are
constrained by the location, upfrontcosts and proprietary policies required.
I need my security to be simple todeploy with as little impact on my
users as possible – rapid deploymentand frictionless use are critical
7
OUR SOLUTION
Enterprise & Cyber SecurityTAKE THE LEAD8
Our answer to the transformation -Data Protection On Demand
SafeNet Data Protection On Demand is a cloud-based platformthat provides a wide range of on-demand key management and encryption services
through a simple online marketplace.
With SafeNet Data Protection On Demand,security is made simpler, more cost effective and easier to manage
because there is no hardware to buy, deploy and maintain.
Just click and deploy the protection you need, provision services, addsecurity policies and get usage reporting in minutes
Enterprise & Cyber SecurityTAKE THE LEAD9
The DPoD service platform in a Nutshell
Virtual
Cloud
Data Center
Protect Everywhere
Network
Payments &Transactions
IoT
Big Data
Protect Everything
PersonalData
SAFENET DATA PROTECTION ON DEMAND
Applications
ROOT OFTRUST
KEYMANAGEMENT
ENCRYPTION
MARKETPLACE
POLICYMANAGEMENT &
REPORTING
SaaS
PaaS
IaaS
APIs
Multi-TierMulti-Tenant
Enterprise & Cyber SecurityTAKE THE LEAD10
DPoD Service Structure
CUSTOMERS
HSM
Encryption
API &3rd Party
BYOK
Key Broker
Enterprise & Cyber SecurityTAKE THE LEAD11
DPoDMarketPlace
Today &Tomorrow
KeyBrokers forO365 & AWS
Encryption On Demand Services
File & folderEncrypt your
unstructured data
Virtual MachineEncrypt your
Virtual Machines
Servicesavailable inDPoD today
Enterprise & Cyber SecurityTAKE THE LEAD12
KeyBrokers forO365 & AWS
Encryption On Demand Services
File & folderEncrypt your
unstructured data
Virtual MachineEncrypt your
Virtual Machines
Servicesavailable inDPoD today
Partner Services
XYZ ServiceBy
Company X
XYZ ServiceBy
Company Y
XYZ ServiceBy
Company Z
DPoDMarketPlace
Today &Tomorrow
Security SHOULD Feel to Enterprise Users and ITAdministrators….
….like a push of a button
Enterprise & Cyber SecurityTAKE THE LEAD14
Subscribe & Deploy; Made Simple and FrictionlessExample: Salesforce KeyBroker
5
MANAGE
4
CHECK/AUDIT
3
CREATE
2
AUTHENTICATE
1
SUBSCRIBE
Minutes
Enterprise & Cyber SecurityTAKE THE LEAD15
Sales Process – SimplifiedIdentify the Use Case /Opportunity
•HSM•Key Broker•Encryption etc.
1Free Evaluation2 Sign-up at our website
Full material kit
3 Sign Contract
Enterprise & Cyber SecurityTAKE THE LEAD16
What SafeNet Data Protection On Demand Does Best
AffordabilityEasy to subscribe to market
place and low monthly prices
InvestmentNo hardware to buy and pay
as you go billing
Low ComplexityPoint, click deploy reduces skill
requirements and usage
ScalabilityGrows to meet your on-
demand needs
SimplicityEasy to use, wizard-based
GUI and orchestrationtools
ManageabilityTake control of policies and
auditability
Low TCOFully managed with
SLA’s and fastdeployments
$
ProvenEstablished leadership,integration and value
#1
17
DEPLOYMENT
Enterprise & Cyber SecurityTAKE THE LEAD18
DPoD Data Center deployment
• DC’s failover internally andthen to same region
• DC’s in different continents donot have connection with eachother
• Tours and Dallas owned andmanaged by Gemalto
• Other DC’s are Co-location viaTier 1 partners
• Additional DC’s in planning
Ottawa
Dallas
FrankfurtToursWest Coast
19
CUSTOMER REFERENCES
Enterprise & Cyber SecurityTAKE THE LEAD20
Customer ReferencesFrench payment services company• Using DPoD for payment security related encryption• Wrapped into their own service for PCI-DSS compliancy• Selected DPoD over AWS due to e.g. High-Availability environment and committed 99.95% SLA
US Enterprise Content Management company• Using DPoD for securing the root keys for document digital signatures• Wrapped into their own services to enhance security• Needed a solution to provide e.g. zero upfront investment and cloud based pricing
US Manufacturing company• Using DPoD for securing root keys for code signing• Allowed them to focus quickly on their main use cases without IT infra investments• DPoD enabled easy testing and deployment with infinite scalability
21
YOUR BENEFIT
Enterprise & Cyber SecurityTAKE THE LEAD23
What is Your benefit
Customers
> Cloud Security Service
> No DC install & deployment
> High availability
> 12, 24 and 36 months contract> Including support &
maintenance
Partners
> Attractive alternative
> New customer segments
> Market differentiator
> Easy evaluation process
> Fast implementation
How to identify DPoD opportunities?
Enterprise & Cyber SecurityTAKE THE LEAD24
DPoD does support a wide range of use cases with services available today;Important to keep an open mind with opportunities!
Do not hesitate to contact us for support !
MSP / MSSPGrowing market, wraps DPoD
into their services
CompliancyGDPR, PCI-DSS …
Cloud migrationLooking to migrate to / from
public clouds
Limited resourcesLimited financial &
personnel resources
Extensivefeatures
Looking for a committedSLA, HA environment, 24/7
support
Unpredictable needsNeeds scalability / flexibility &
cloud based pricing
25
SAFENET DATA PROTECTION
Enterprise & Cyber SecurityTAKE THE LEAD26
Security Delivered the Way You Like It
ENCRYPTION KEY MANAGEMENTAND PROTECTION
IDENTITY AND ACCESSMANAGEMENT
• Data-at-rest encryption• Data-in-motion encryption
• Enterprise key lifecyclemanagement
• High assurance key protection• Crypto operations management
• Access management• Multi-factor authentication• PKI credential management
Hybrid
On-PremisesHardware or Software
On DemandCloud-based | as-a-Service
CO
NS
UM
PTIO
NM
OD
ELS
UN
IFIE
D D
ATA
SE
CU
RIT
YS
OLU
TIO
NS
Digital Payments &Transactions
Compliance EnterpriseSecurity
Internet ofThings
Big Data CloudPR
OTE
CT
AN
YTH
ING
Marketplace
API’s
Reporting& PolicyControl
Deployment &Orchestration
Enterprise & Cyber SecurityTAKE THE LEAD27
Security Delivered the Way You Like It
ENCRYPTION KEY MANAGEMENTAND PROTECTION
IDENTITY AND ACCESSMANAGEMENT
• Data-at-rest encryption• Data-in-motion encryption
• Enterprise key lifecyclemanagement
• High assurance key protection• Crypto operations management
• Access management• Multi-factor authentication• PKI credential management
Hybrid
On-PremisesHardware or Software
On DemandCloud-based | as-a-Service
CO
NS
UM
PTIO
NM
OD
ELS
UN
IFIE
D D
ATA
SE
CU
RIT
YS
OLU
TIO
NS
Digital Payments &Transactions
Compliance EnterpriseSecurity
Internet ofThings
Big Data CloudPR
OTE
CT
AN
YTH
ING
Marketplace
API’s
Reporting& PolicyControl
Deployment &Orchestration
Thank You!