A apresentação está carregando. Por favor, espere

A apresentação está carregando. Por favor, espere

Protegendo Suas Informações

Apresentações semelhantes


Apresentação em tema: "Protegendo Suas Informações"— Transcrição da apresentação:

1 Protegendo Suas Informações
Presentation Title <Date> Protegendo Suas Informações Luiz Claudio Rodrigues Pre Sales Consultant Computer Associates Copyright © 2001 Computer Associates International, Inc. All rights reserved.

2 Agenda Computer Associates Segurança de Rede Segurança de Dados Resumo
Defesa de Fronteira Defesa Doméstica Segurança de Dados Backup & Restore Disaster Recovery Planning Resource Management Resumo Q & A

3 Quem é a Computer Associates?
Sede - Islandia - NY- Fundada em 1976 empregados, 160 escritórios, 43 países. Aprox produtos CA no Brasil 350 funcionários no país

4 CA – Six Brands Presentation Title <Date>
Our solutions can be grouped into three strategic categories as mentioned before: eBusiness Process Management to seamlessly manage business processes and applications within and across the extended enterprise. eBusiness Information Management to cohesively manage vital business information and leverage it for new opportunities. eBusiness Infrastructure Management to powerfully manage the core infrastructure, keeping the eBusiness up, running, and secure while connecting customers, suppliers, partners, and employees.  Through these strategic categories, CA delivers innovative technology, offering tremendous value to our customers. Across these three strategic categories, we have targeted six focus areas that address today’s most pressing eBusiness needs: Enterprise Management Storage Security Application Life Cycle Management Data Management and Application Development Portal and Business Intelligence Within these focus areas, we offer our customers the solutions they need to overcome the challenges presented by the next generation of eBusiness and fully embrace the opportunities that lie ahead.   In addition to technological innovation, a successful eBusiness relies on a combination of smart business practices and experienced people. CA provides this winning combination today. We have introduced a revolutionary business model giving our customers and partners flexible choices to meet their evolving needs. This includes the opportunity to pace technology investments to business growth, to implement the latest advances in CA technology, and to mitigate risk by signing flexible contracts. Additionally, we’re the first enterprise software company to receive global ISO 9002 Certification for our commitment to quality. Combined with our 25 years of rich experience, CA is committed to providing simple, meaningful, real solutions, enabling eBusinesses to succeed and thrive in this new environment. CA portal (services) technology integrates with each of our solutions, providing a common web-based user interface and advanced visualization. Organizations benefit from this commonality across our solutions through simplified configuration, management and reduced training costs. Within each focus area, our solutions are integrated, platform neutral, open-standards-compliant, scalable, and extensible. Because they leverage CA Common Services, these eBusiness solutions provide simplified, streamlined sharing of data and information across heterogeneous environments. They include integrated services for building and deploying robust, safe, manageable, scalable and reliable eBusiness applications (such as messaging, compression, naming, cache management, publish/subscribe, and transaction management) as well as shared management functions and technologies (for example, EnterpriseDiscovery, calendar and event management). CA Common Services enable our solutions to be deployed standalone, or to interoperate with one another, giving customers the freedom to choose whatever solution  or combination of solutions  they need today, with the assurance that they will work together. CA Common Services also extend to third-party solutions, allowing organizations to leverage existing investments. The openness and extensibility via CA Portal and Common Services give customers the flexibility to leverage their existing technologies and adopt new ones as their businesses evolve. Copyright © 2001 Computer Associates International, Inc. All rights reserved.

5 Parceria Sisnema Certificação ESP (Enterprise Solution Provider)
Presentation Title <Date> Parceria Sisnema Certificação ESP (Enterprise Solution Provider) Gereciamento (Unicenter), Segurança (eTrust) e Storage (Brightstor) Atuação na Região Copyright © 2001 Computer Associates International, Inc. All rights reserved.

6 A Face Oculta das Ameaças
Não existe sistema invulnerável Lidamos com informações demais Um mundo cheio de máquinas feitas por homens

7

8

9

10

11

12

13

14

15 Problemas INVASÕES 30% das empresas brasileiras sofreram algum tipo de invasão nos últimos dois anos 39% não sabem se foram invadidas Apenas 31% afirmam que ainda não tiveram problemas de invasão Das invasões registradas, 50% aconteceram nos últimos seis meses Fonte: PESQUISA NACIONAL SOBRE SEGURANÇA DA INFORMAÇÃO Módulo Security Solutions S/A

16 Novas Ameaças Vírus Wireless Nimda Klez Magister Code Red
“Pesquisas estimaram que o vírus “love bug'' (I Love you) e suas variantes causaram danos de $6.7 bilhões

17 Tipos de Ataques comuns
Ameaças: Viruses Worms Trojan Horses Hackers Distributed Denial Of Service Malicious Java Applets Malicious ActiveX Controls Resource Misuse/Abuse Intruder Attacks

18 Ataques no mundo Fonte: SANS Institute Presentation Title <Date>
This chart offered by the SANS Institute displays recorded cyber attacks in a five-day period worldwide. The warfare is not isolated to just North America, although by far, we are the largest target. All types of intrusion methods are used by attackers. Attacks are classified both by type (ports affected) and the quantity. The larger the circle, the larger the number. Fonte: SANS Institute Copyright © 2001 Computer Associates International, Inc. All rights reserved.

19 Crimes Cibernéticos em 2001- Fatos
Ataques via internet dobraram 64% das empresas atacadas tiveram prejuízo financeiro 70% das empresas atacadas identificaram a internet como ponto de origem do ataque

20 As Ameaças % dos Administradores S1 Information Security Oct 2001
Presentation Title <Date> As Ameaças % dos Administradores As you see on this chart, most IT administrators are experiencing security breaches. And the Internet is considered the source of many of these security breaches. {Select and read a few of the catorgeries and through them around} Uso/Instalação de Software não autorizado Uso ilegal dos recursos da empresa Uso dos recursos da empresa para proveito próprio Abuso do controle de acesso aos sistemas Roubo ou depredação física Uso não autorizado de hardware Roubo/Sabotagem/Destruição de informações particulares S1 Information Security Oct 2001 Copyright © 2001 Computer Associates International, Inc. All rights reserved.

21 Abordagem Existe um projeto de eBusiness/eCommerce em andamento ?
A empresa possui firewall, mas ela possui um sistema de IDS ? A empresa possui Antivírus, mas ela possui um sistema de Inspeção de Conteúdo ? A empresa possui IDS, mas ela conhece como os usuários utilizam a Internet ? Os usuários que se conectam remotamente trafegam a informação de forma criptografada?

22 Linha eTrust Presentation Title <Date>
eID is part of CA’s etrust portfolio Full details can be found on CA’s website. Copyright © 2001 Computer Associates International, Inc. All rights reserved.

23 Linha eTrust Threat Management Access Management Identity Management
Intrusion Detection, Firewall, Content Inspection, Antivírus Access Management VPN, PKI, OCSPRO, Directory, Web Access Control Identity Management Admin, Audit, Policy Compliance, Single Sign On, Access Control Portal

24 eTrust FireWall Simulação de Regras e políticas de segurança antes de implementa-las “Test Drive” voce pode testar novas Regras e Políticas para determinar se serão eficazes em produção e feitas apenas UMA VEZ e propagadas para todos os outros FireWalls da rede.

25 eTrust Content Inspection
Código Móvel O que é código móvel ? Vantagens Desvantagens

26 eTrust Intrusion Detection - Características chaves
Tecnologia Packet Sniffing (modo Stealth) Biblioteca de Padrões de Ataques Atividade Suspeita URL Blocking (Sites Improdutivos) Scan de padrões de palavras Network Usage Logging (controle de acesso à rede) - Tracking Full access for Network Administrator Reporting/Customizing Reports

27 eTrust Antivírus Gerenciamento centralizado por domínios
Presente em desktops, servidores, firewall e message systems (MS-Exchange e Lotus Notes) Duas Tecnologias de varreduras (InoculateIT e Vet) Vários tipos de scan (fast, secure, reviewer, heurístico) inclusive de arquivos comprimidos Update automático de novas assinaturas

28 Solução - Lar doce Lar Intrusion Detection Antivirus
Content Inspection Firewall VPN

29 Log de auditoria identifica
Presentation Title <Date> Invasão Detectada Acesso a ferramenta não Permitida Suspensão Automática do Acesso do Usuário Log de auditoria identifica origem da brecha de segurança This is an example of access management view. In this example, a business critical applications ( here CA’s own “customer connect”) is under attacks. The administrator can clearly see which systems are impacted. Without leaving the workplace, the operator can identify the user who is causing the problem: in this case a malevolent employee. The security operator can then take automatic action such as denying further access. Moreover, through the integration with identity management we can “retire” this user as shown previously. Copyright © 2001 Computer Associates International, Inc. All rights reserved.

30 Sua solução de segurança é completa ?

31 Linha BrightStor Presentation Title <Date>
End-to-end Storage Management for total BUSINESS CONTINUITY is a must today. Today, storage technologies must ensure that businesses run without interruption with reliable, secure, scalable and most importantly 100% available applications. Storage space is one of the fastest growing software segments in the IT industry today. High growth in transactional applications, exponentially growing data volumes and limited physical skill and space are forcing enterprises to automate their storage capabilities more than ever before. CA’s BrightStor Storage solutions (in order to map to storage market trends and segments) can be categorized in 3 main areas, outlined below. Data availability solutions ensure that servers, applications, and data are always available. These solutions provide comprehensive backup/recovery and hierarchical storage management across all platforms from mainframes to laptops and other mobile devices/systems. CA provides the widest range of solutions in this space. Backup, recovery and restore from mainframes to laptops via BrightStor products like CA-Disk (Mainframe), Enterprise Backup (High-end UNIX and NT), ARCserve (NT) and Mobile Backup Enterprise storage resource management solutions include storage resource management, SAN management, tape management, and software virtual tape. With these solutions enterprises can manage storage hardware, information and other assets to lower the total cost of ownership of data storage. Enterprise storage resource management solutions provide end-to-end storage management regardless of storage model deployed (From Direct Attached Storage/DAS to Network Attached Storage/NAS and Storage Area Networks/SAN) on any platform (mainframe to hand-held devices) through any network device (routers, switches and hubs). CA’s network management , security technologies bundled with predictive intelligence capabilities provide comprehensive benefits for managing storage resources, especially for SAN-centric models. SANs are especially in need of these cross-solutions since these environments impose security and network challenges on the IT staff. CA’s solid enterprise storage resource management capabilities enable organizations to manage all resources depending on any model. High availability solutions ensure ongoing availability of critical information through data replication, file system management and file sharing. Via replication and virtual clustering, enterprises avoid physical clustering and data center consolidation, thus creating costs savings. These solutions ensure that storage networks are protected and optimized to keep the business continually up and running. Especially, in distributed networks, storage infrastructure solutions a key role for availability and scalability. All these categories, will be glued together via CA’s unparalleled vision through Centralized Enterprise Storage Management. This is a new initiative, a layer of consolidated functions to provide active storage management via intelligent policy and event management for any storage asset (storage hardware, software and information.) Centralized enterprise storage management provides a consolidated and unified view via a comprehensive management platform to all assets from any vendor in the backend. This way enterprises can enjoy efficiency and lower costs by not spending time and money managing all assets separately. Finally, IT staff can identify and manage storage workload levels more intelligently for the extended enterprise. Introduced, through a “portal” view at CA World 2001, centralized enterprise storage management will be the crux of CA’s storage vision via key partnerships with both hardware and software vendors in upcoming years. Copyright © 2001 Computer Associates International, Inc. All rights reserved.

32 Desafios Performance Complexidade Heterogeneidade
Suporte Completo a Dispositivos Integração Operações

33 Presentation Title <Date> Desafios Hoje as operações de armazenamento são muito complexos para serem gerenciados com produtos táticos convencionais IT environments used to be simplistic and homogenous with probably mainframe machines in the past. Today’s IT environment is complex and difficult to manage in light of new web-based applications, platforms, protocols, and hardware devices such as Networked-Attached Storage (NAS) and Storage Area Networks (SANs) Copyright © 2001 Computer Associates International, Inc. All rights reserved.

34 Tendências Aumento da complexidade dos ambientes heterogêneos de TI
Presentation Title <Date> Tendências Aumento da complexidade dos ambientes heterogêneos de TI Muitas ferramentas incompatíveis distribuídas pelos diversos ambientes da rede A ineficácia do armazenamento afetando o negócio das empresas Copyright © 2001 Computer Associates International, Inc. All rights reserved.

35 Storage: Tendências 76% CAGR Fonte:
Demanda por capacidade de armazenamento em Petabytes 76% CAGR Fonte:

36 Para algumas pessoas Armazenamento é tudo

37 Vendas em 2001 de Storage

38 Tecnologias envolvidas

39 Backup Tradicional (DAS)
ASIT TLO Agents Ethernet Data Path Tape Library Storage Management Server Remote Server with Agents SCSI

40 Storage Area Network Option
SAN Storage Area Network Option Suporte a SAN Gerenciamento de SAN Escalabilidade LAN Fibre Channel Hub FC Bridge FC Bridge FC Bridge

41 Serverless Servless Backup Option - Backup sem Servidor Gadzoox
Capellix 3000 Switch Crossroads Bridge Crossroads Bridge

42 Necessidades Backup / Restore Disaster Recovery Mobile Backup
Alta Disponibilidade Gerenciamento de Recursos (SRM) Integração/Automação (Portal)

43 Quando se fala em Backup !!!

44 Performance Baixo Consumo de CPU Rápido (Janela Estreita)
Presentation Title <Date> Performance Baixo Consumo de CPU Rápido (Janela Estreita) 1.5T/hr, 17%CPU Doculabs July, 2001 Copyright © 2001 Computer Associates International, Inc. All rights reserved.

45 Backup/Restore - Escalabilidade
Presentation Title <Date> Backup/Restore - Escalabilidade SAN NAS HP Desktop E-commerce Database Application File/ Print RAID Mainframe S/390, AS/400 Windows SUN AIX Tru64 Laptop Copyright © 2001 Computer Associates International, Inc. All rights reserved.

46 Opção de recuperação em caso de disastre
Presentation Title <Date> Opção de recuperação em caso de disastre Disaster Recovery Option 1)Substitua o hardware 2)Dê um boot no servidor com os discos de boot, o cd do Windows NT (por exemplo) e a sua última fita de backup 3)Comece o processo de Restauração Emergency Boot Disks Copyright © 2001 Computer Associates International, Inc. All rights reserved.

47 Disponibilidade e Downtime
Presentation Title <Date> Disponibilidade e Downtime 95% 99.99% 99% 99.9% 99.999% 3-4 Dias 8 Horas 1 Hora 5 Minutos Downtime por ano Soluções de Sistema Operacional Soluções de alta disponibilidade 2-3 Semanas Sistemas Tolerantes a falhas Copyright © 2001 Computer Associates International, Inc. All rights reserved.

48 Como Conseguir Alta Disponibilidade?
Presentation Title <Date> Como Conseguir Alta Disponibilidade? Soluções de Hardware Redundância (UPS, memória ECC) Replicação Soluções de Software Failover de servidor Clustering Alta disponibilidade só pode ser obtida com a combinação de soluções inteligentes de software e hardware Copyright © 2001 Computer Associates International, Inc. All rights reserved.

49 O que o BrightStor High Availability oferece…
Presentation Title <Date> O que o BrightStor High Availability oferece… Solução de Software para Disponibilidade dos Dados Solução de server failover e replicação de dados, que ajuda oferecer 99.99% de disponibilidade dos dados. Suporte completo para Windows NT 4.0 e Windows 2000. Suporte as aplicações (Exchange, MS SQL, Oracle, TNG, e muito mais.) Alternativa para o Custo das Soluções de Clustering SurviveIT 2000, a high-availability solution from Computer Associates, provides a high-level of data availability for Windows NT and 2000 environments. SurviveIT 2000 uses data replication and server failover technologies to achieve up to four nines of availability. With built-in support many many popular applications including Exchange, MSSQL, Oracle and Unicenter TNG, SurviveIT 2000 is a low-cost solution to help organizations ensure business continuity. As mentioned in the previous slide, from a software perspective, there are three ways to keep systems online and data available. SurviveIT 2000 provides replication and server failover as an alternative to architecting and implementing a cluster. Why? There are two main reasons: cost and flexibility. Clusters are expensive and require dedicated resources. To build a cluster, you need dedicated servers and cluster-aware applications. SurviveIT 2000, on the other hand, does not require any dedicated servers and uses a many-to-one architecture to protect multiple servers with a single replacement server. Copyright © 2001 Computer Associates International, Inc. All rights reserved.

50 Arquitetura Remote Site WAN Primary_1 Server Secondary_1 Server
Presentation Title <Date> Arquitetura Primary_1 Server Secondary_1 Server Remote Site Primary_2Server Secondary_2 Server Admin Console WAN For the next few slides, I’m going to talk a little more in-depth about how SurviveIT 2000 works. On this slide, I’ve put up a graphic to describe the SurviveIT architecture. SurviveIT 2000 operates in both LAN and WAN environments providing unique benefits to each: In LAN environments, SurviveIT 2000 replicates data from a primary server to a designated secondary server. If there is a failure with the primary server, the secondary server can stand-in for the primary, ensuring business continuity and protecting critical business data. In WAN environments, SurviveIT 2000 replicates data off-site to a remote server. If a disaster were to occur at the site of the primary server, the data would be kept safe at the off-site location and immediately available via the network. SurviveIT 2000 is also very easy to manage. From a central console, an administrator can view the status of all the servers and perform any configuration changes. Copyright © 2001 Computer Associates International, Inc. All rights reserved.

51 Onde estão seus Dados Críticos???
Presentation Title <Date> Onde estão seus Dados Críticos??? De acordo com o Gartner Group, IDC e META Group 40-80% dos dados e informações críticas de negócios residem em PCs (Desktops & Notebooks) Copyright © 2001 Computer Associates International, Inc. All rights reserved.

52 Presentation Title <Date> BrightStor™ Managing eBusiness Storage BrightStor™ Mobile Backup Solução para Proteção de Dados de PC’s e Notebooks Remotos Storage Management is Critical To Meet Today’s e-Business Challenges The internet has changed the way business is done. The demands on networked information is a lot different from what it was before. Data is the most valuable corporate asset and information availability is vital to an organization’s success. Guaranteed access to data becoming an absolute necessacity has expanded the role of implementing an effective storage management strategy, in planning and implementing an enterprise. In addition to traditional backup and restore, storage management solutions need to provide an effective disaster recovery solution, hot online data, application backup, and also address the ever shrinking backup window. ARCserveIT – Complete Storage Management Solution. ARCserveIT delivers a complete suite of solutions that address the storage management needs of the ever changing IT environment. It provides centralized management and complete automation of all storage tasks across the enterprise. In addition, the comprehensive suite of solutions extend data protection beyond basic backup and restore to provide, hot online data and application protection, high availability and enhanced performance to address the ever shrinking backup window. The various options and agents are grouped strategically into solution areas and offer maximum flexibility in customizing a storage solution to meet the specific needs of any environment. Alexandre Bandeira Consultor Técnico – Indirect Sales Computer Associates Copyright © 2001 Computer Associates International, Inc. All rights reserved.

53 Backup para PCs Remotos
Presentation Title <Date> Backup para PCs Remotos Automático Oportunista Leve Rápido 70% das informações vitais para os negócios das empresas residem em Desktops/Notebooks!!! Backup Server Instalação Remota Backup Client Backup Automático e Transparente & Inventário Restore On-board Retrieval Atualização do Software Unique Copyright © 2001 Computer Associates International, Inc. All rights reserved.

54 Preciso comprar mais discos ??
Standard Volume (Std) Business Continuance (BCV) Data Path Backup I/O Tape Library

55 Presentation Title <Date> Brightstor Storage Resource Manager Enterprise-Wide Storage Resource Management Uma Solução CA para Gerenciamento de Storage Copyright © 2001 Computer Associates International, Inc. All rights reserved.

56 Storage Resource Management
Presentation Title <Date> Storage Resource Management Controle de Aplicativos Otimização de Custos Monitoramento em Storage Coleta de Informações Análise de Tendências Automação Storage Resource Mgmt. SRM -- standard message Gives the detailed usage information we need BrightStor SRM BrightStor CA-Vantage SRM SOLUTIONS Copyright © 2001 Computer Associates International, Inc. All rights reserved.

57 Storage Resource Management
Perguntas Difíceis: Quanto espaço em disco/fita o usuário Luiz Rodrigues usa na empresa como um todo? Quanto deste espaço é utilizado com MP3/JPG/MPEG? Qual a porcentagem de arquivos na minha empresa que não são acessados a 3 meses ou mais?

58 BrightStor SRM Option for MS Exchange
Suporte para MS Exchange Gerencie todos os níveis: Servidor Public/private folders Mailbox Relatórios, análises e planejamento de funções centralizadas Top Tens ?

59 Análise de tendência Acompanhe o espaço livre nos seus volumes críticos

60 Nossas Soluções não são iguais

61 Portal de Storage - Operações
multiplas Telas Um usuário

62 BrightStor Enterprise Backup – report on Job Status (lower left)
Presentation Title <Date> This portal Example provides cross functional integration with the portal providing integration for BrightStor Media Management – Highlighting data from the mainframe tape volumes ( upper left) Brightstor San Manager – Looking at Mission Critical Systems in the SAN (upper right) BrightStor Enterprise Backup – report on Job Status (lower left) BrightSTor SRM – Report on Volume usage with least free space (lower right) This slide has a build – after explaining the picture of the portal – knowledge on the right, etc. CLICK once This will replace the BrightSTor Enterprise Backup Job Status with Veritas Netbackup Job Status Integration of CA and Non-CA content Isponsors developed for Veritas Netbackup, Veritas Backup Exec and Legato Networker One common integration point for managing all storage related activities – BrightStor Portal Copyright © 2001 Computer Associates International, Inc. All rights reserved.

63 BrightStor Portal - Visualização

64 BrightStor Portal - Integração

65 Escolher bem o Parceiro de Negócios

66 Resumo Storage & Security Linha eTrust Linha BrightStor Desafios
Tendências Soluções Linha eTrust Linha BrightStor

67 Perguntas? Luiz Rodrigues Computer Associates Luiz.rodrigues@ca.com
Presentation Title <Date> Perguntas? Luiz Rodrigues Computer Associates Copyright © 2001 Computer Associates International, Inc. All rights reserved.


Carregar ppt "Protegendo Suas Informações"

Apresentações semelhantes


Anúncios Google