SlideShare uma empresa Scribd logo
1 de 18
Getting More Value out of your
Data
Tammy Schuring
Chief Customer Officer
Voltage Security, Inc.
For Internal Use Only.5/16/2013 1
Data in 2013 and Beyond
*** Confidential and
Proprietary ***
2
• Up through 2012, compliance and breach risk have driven
data security
– Defending reputation, mitigating breach risks.
• Now, enterprise must maximize the return on data
• Maximize return on data by
– Liberating data across any channel without risk
– Enabling cloud, big data, mobility to be fully embraced
– Simplified regulatory compliance at the lowest cost of ownership
The shift to data security is here
• Threats moving from the network to the host to the data
– The next trend is to move from host to data
– Consumerization of IT is the catalyst for this change
– Focus is to identify “bubbles” of data and protect those assets –
as opposed to building protection at device layer
5/16/2013
(C) 2013 Voltage Security, Inc. All Rights Reserved
CONFIDENTIAL
3
Current and future security
initiatives will focus more on
protecting enterprise data
than the underlying device or
network infrastructure
Prediction in 2005
Dan Hitchcock
Security Architect, Microsoft Information Security
Taming the data explosion
• The explosion in data fuels growth and agility
– But time to data value is gated by risk and compliance
– Attacks to data are here to stay, and big data means a big target
– The balance of data access and data security is critical
5/16/2013
(C) 2013 Voltage Security, Inc. All Rights Reserved
CONFIDENTIAL
4
“90% of the data in the world
today has been created in the
last two years alone” - IBM
Cisco, IBM.
Parabolic growth in data created and consumed
0
10
20
30
40
50
60
70
80
2000 2005 2010 2015
Exabytespermonth
Customer Trends – Big Data
• Big Data – from the lab to production use cases
– Customer data analytics & modeling
– Fraud detection in payments
– Medical data analysis
5
Customer Trends – Cloud
• Cloud – from plans and trials to secure foundations
– Private clouds with data-centric Security as a Service
– Hybrid clouds with integrated enterprise data
– FPE technology enabling “Data as a Service” strategies
6
Customer Trends – Mobile
• Adoption of email encryption on Mobile to:
– Streamline customer processes via least cost email channels
– Integrate the consumer into the business via smartphones
– Cover the gaps left by BYOD security with data-centric security
7
90% of smartphone owners access the
same email account on mobile and
desktop. ExactTarget– “The 2012 channel
preference survey” (2012)
More email is read Mobile than on a
desktop email client or via webmail. Stats
say 42% of email is now opened on a
mobile device Litmus –”Email Analytics”
(Jan 2013)
5/16/2013
(C) 2013 Voltage Security, Inc. All Rights Reserved
CONFIDENTIAL
8
5/16/2013
(C) 2013 Voltage Security, Inc. All Rights Reserved
CONFIDENTIAL
9
4th Largest Retailer – Web Application protection of
PCI Data
• PCI scope reduction for ecommerce
environment
– Projected $1MM/year savings
• E2EE for every card purchase &
tokenization for all stored cards
– Nearly 100MM transactions annually
• Selected Voltage SecureData Web &
Secure Stateless Tokenization
• Integrated into security private cloud
– Global Security as a Service
10
Top 5 US Retailer – PCI Compliance
• PCI compliance and cost reduction
– Loyalty data linked to cardholder data
• HP NonStop Guardian, IBM z/OS
– Mission-critical environments
• Voltage SecureData Enterprise
– Native encryption on legacy platforms
– Format Preserving Encryption – no
change to z/OS applications
– Maximum loyalty data use without risk
National Logistics Organization – POS E2EE
• PCI scope reduction project
– Opportunity for huge annual cost savings
• 75k POS terminals across 35k locations
– Mix of Ingenico & VeriFone devices
• Evaluated P2PE solutions from VeriFone,
RSA, and others
• Selected Voltage & Ingenico as
organizational standard
– Replacing all existing VeriFone devices
12
Top Health Insurance Company – Trusted Secure
Email Communication
• HITECH Compliance cost reduction
• Secure communications to
– >30m network members – healthcare, dental,
pharmacy
– >13m million group insurance members
– >840,000 health-care professionals
– >490,000 primary-care doctors and specialists
– ~5000 hospitals
• Standardized on Voltage SecureMail
Enterprise & Mobile
– Application & user driven encrypted email
– Customers on desktop and smartphones
• Replaced CISCO IronPort Encryption
with usability, cost, support and scale
issues
13
Top 10 Bank – Mobile Data Security
• Secure, differentiated customer
service via mobile channels
• Extends BYOD with end-to-end
security – emails and attachments
• Voltage SecureMail Mobile
– Enterprise standard for mobile email &
attachment encryption
– Inside the Bank, outside to partners and
customers – including consumers
– Adds to Voltage SecureMail Enterprise
with >2m users
14
Top US Telco – Mobile Data Security
• Transparent email encryption on
smartphones – internal and external
• End-to-end security to and from
– Android, iPhone, Blackberry
– Desktops and applications.
• Ease of use for executives critical
• Voltage SecureMail Mobile
– Mobile specific data policy control
– Internal, partner, law enforcement,
government secure collaboration
– Adds to Voltage SecureMail Enterprise –
the enterprise standard at the Telco
Global Credit Card Issuer
• Extending Office365 Email
Encryption to smartphones
– Blackberry critical, also iOS, Android
– Tablets and smartphones
– Support for corporate Blackberry and
BYPD
• Ease of use for executives critical
– Integration into complex AD framework
– Integrate to complex enterprise cloud
• Voltage SecureMail Mobile
– Executive communications
– External smartphone user collaboration
– Ability to compose key requirement for
International Health – Cloud Email Encryption
• #1 National Healthcare Service in EU*
• Standardized on IBE technology for
privacy compliant communications
– Links hospitals and healthcare services
• Seamless, federated EHR exchange – labs,
hospitals, doctors, patients, partners
• Ease of use for patients & doctors
• Simplicity for IT operations
• Mobile support for mobile health workers
• Voltage SecureMail &Voltage
SecureMail Cloud Services
 Cloud delivery –SaaS service
 Simple, easy to consume privacy compliance
* http://www.bmj.com/content/344/bmj.e3430
Summary
• It is possible to get more value from your data
• A data-centric approach to protecting sensitive
information will remove many obstacles to this goal
• Innovations in cryptography and tokenization make this
level of protection possible today
5/16/2013
(C) 2013 Voltage Security, Inc. All Rights Reserved
CONFIDENTIAL
18

Mais conteúdo relacionado

Mais procurados

Recommended Solutions to Major Security Challenges Facing OT & IT Personnel w...
Recommended Solutions to Major Security Challenges Facing OT & IT Personnel w...Recommended Solutions to Major Security Challenges Facing OT & IT Personnel w...
Recommended Solutions to Major Security Challenges Facing OT & IT Personnel w...
Power System Operation
 

Mais procurados (20)

Data enrichment
Data enrichmentData enrichment
Data enrichment
 
Cybersecurity in Utilities
Cybersecurity in UtilitiesCybersecurity in Utilities
Cybersecurity in Utilities
 
Internet of Things Service Level Agreements: Market Outlook and Forecast for ...
Internet of Things Service Level Agreements: Market Outlook and Forecast for ...Internet of Things Service Level Agreements: Market Outlook and Forecast for ...
Internet of Things Service Level Agreements: Market Outlook and Forecast for ...
 
Internet of Things (IoT)
Internet of Things (IoT)Internet of Things (IoT)
Internet of Things (IoT)
 
IRJET- Exploring the Nuances of Internet of Things in Health Care Assisting S...
IRJET- Exploring the Nuances of Internet of Things in Health Care Assisting S...IRJET- Exploring the Nuances of Internet of Things in Health Care Assisting S...
IRJET- Exploring the Nuances of Internet of Things in Health Care Assisting S...
 
IoT Trends in Industrial IoT for 2018
IoT Trends in Industrial IoT for 2018IoT Trends in Industrial IoT for 2018
IoT Trends in Industrial IoT for 2018
 
The internet of things for health care a comprehensive survey
The internet of things for health care a comprehensive surveyThe internet of things for health care a comprehensive survey
The internet of things for health care a comprehensive survey
 
Cybersecurity in the Era of IoT
Cybersecurity in the Era of IoTCybersecurity in the Era of IoT
Cybersecurity in the Era of IoT
 
Ls subramanian internet of things
Ls subramanian internet of thingsLs subramanian internet of things
Ls subramanian internet of things
 
The Growing U.S. IT Productivity Gap
The Growing U.S. IT Productivity GapThe Growing U.S. IT Productivity Gap
The Growing U.S. IT Productivity Gap
 
A History of IIoT Cyber-Attacks & Checklist for Implementing Security [Infogr...
A History of IIoT Cyber-Attacks & Checklist for Implementing Security [Infogr...A History of IIoT Cyber-Attacks & Checklist for Implementing Security [Infogr...
A History of IIoT Cyber-Attacks & Checklist for Implementing Security [Infogr...
 
IOT: The Evolving World of Realtime BigData by Jerry Power
IOT: The Evolving World of Realtime BigData by Jerry PowerIOT: The Evolving World of Realtime BigData by Jerry Power
IOT: The Evolving World of Realtime BigData by Jerry Power
 
AI is the Catalyst of IoT
AI is the Catalyst of IoTAI is the Catalyst of IoT
AI is the Catalyst of IoT
 
IIoT - A data-driven future for manufacturing
IIoT - A data-driven future for manufacturingIIoT - A data-driven future for manufacturing
IIoT - A data-driven future for manufacturing
 
Internet of everything ppt
Internet of everything pptInternet of everything ppt
Internet of everything ppt
 
Cloud computing_LKYSPP GSP 2019
Cloud computing_LKYSPP GSP 2019Cloud computing_LKYSPP GSP 2019
Cloud computing_LKYSPP GSP 2019
 
10 predictions for the future of IoT
10 predictions for the future of IoT10 predictions for the future of IoT
10 predictions for the future of IoT
 
Io t powered healthcare solutions- reshaping medical industry!
Io t powered healthcare solutions- reshaping medical industry!Io t powered healthcare solutions- reshaping medical industry!
Io t powered healthcare solutions- reshaping medical industry!
 
IoT Analytics From Data to Decision Making - Trends & Challenges
IoT Analytics From Data to Decision Making- Trends & ChallengesIoT Analytics From Data to Decision Making- Trends & Challenges
IoT Analytics From Data to Decision Making - Trends & Challenges
 
Recommended Solutions to Major Security Challenges Facing OT & IT Personnel w...
Recommended Solutions to Major Security Challenges Facing OT & IT Personnel w...Recommended Solutions to Major Security Challenges Facing OT & IT Personnel w...
Recommended Solutions to Major Security Challenges Facing OT & IT Personnel w...
 

Destaque

Hortonworks, Novetta and Noble Energy Webinar
Hortonworks, Novetta and Noble Energy Webinar Hortonworks, Novetta and Noble Energy Webinar
Hortonworks, Novetta and Noble Energy Webinar
Hortonworks
 

Destaque (7)

YARN Ready: Integrating to YARN with Tez
YARN Ready: Integrating to YARN with Tez YARN Ready: Integrating to YARN with Tez
YARN Ready: Integrating to YARN with Tez
 
Don't Let Security Be The 'Elephant in the Room'
Don't Let Security Be The 'Elephant in the Room'Don't Let Security Be The 'Elephant in the Room'
Don't Let Security Be The 'Elephant in the Room'
 
Pig Out to Hadoop
Pig Out to HadoopPig Out to Hadoop
Pig Out to Hadoop
 
Hortonworks and Voltage Security webinar
Hortonworks and Voltage Security webinarHortonworks and Voltage Security webinar
Hortonworks and Voltage Security webinar
 
Hortonworks, Novetta and Noble Energy Webinar
Hortonworks, Novetta and Noble Energy Webinar Hortonworks, Novetta and Noble Energy Webinar
Hortonworks, Novetta and Noble Energy Webinar
 
2015 02 12 talend hortonworks webinar challenges to hadoop adoption
2015 02 12 talend hortonworks webinar challenges to hadoop adoption2015 02 12 talend hortonworks webinar challenges to hadoop adoption
2015 02 12 talend hortonworks webinar challenges to hadoop adoption
 
Apache Ambari: Managing Hadoop and YARN
Apache Ambari: Managing Hadoop and YARNApache Ambari: Managing Hadoop and YARN
Apache Ambari: Managing Hadoop and YARN
 

Semelhante a Getting More Value Out of Your Data

IBM InterConnect 2103 - Institute a MobileFirst IT Infrastructure
IBM InterConnect 2103 -  Institute a MobileFirst IT InfrastructureIBM InterConnect 2103 -  Institute a MobileFirst IT Infrastructure
IBM InterConnect 2103 - Institute a MobileFirst IT Infrastructure
Chris Pepin
 

Semelhante a Getting More Value Out of Your Data (20)

NTXISSACSC2 - Bring Your Own Device: The Great Debate by Brandon Swain
NTXISSACSC2 - Bring Your Own Device: The Great Debate by Brandon SwainNTXISSACSC2 - Bring Your Own Device: The Great Debate by Brandon Swain
NTXISSACSC2 - Bring Your Own Device: The Great Debate by Brandon Swain
 
EMEA10: Trepidation in Moving to the Cloud
EMEA10: Trepidation in Moving to the CloudEMEA10: Trepidation in Moving to the Cloud
EMEA10: Trepidation in Moving to the Cloud
 
IBM InterConnect 2103 - Institute a MobileFirst IT Infrastructure
IBM InterConnect 2103 -  Institute a MobileFirst IT InfrastructureIBM InterConnect 2103 -  Institute a MobileFirst IT Infrastructure
IBM InterConnect 2103 - Institute a MobileFirst IT Infrastructure
 
Leveraging compute power at the edge - M2M solutions with Informix in the IoT...
Leveraging compute power at the edge - M2M solutions with Informix in the IoT...Leveraging compute power at the edge - M2M solutions with Informix in the IoT...
Leveraging compute power at the edge - M2M solutions with Informix in the IoT...
 
Cyber security general perspective a
Cyber security general perspective aCyber security general perspective a
Cyber security general perspective a
 
SAND SKILLS
SAND SKILLSSAND SKILLS
SAND SKILLS
 
IoT / M2M Solutions with Informix in the IoT Gateway
IoT / M2M Solutions with Informix in the IoT GatewayIoT / M2M Solutions with Informix in the IoT Gateway
IoT / M2M Solutions with Informix in the IoT Gateway
 
10 Reasons to Strengthen Security with App & Desktop Virtualization
10 Reasons to Strengthen Security with App & Desktop Virtualization10 Reasons to Strengthen Security with App & Desktop Virtualization
10 Reasons to Strengthen Security with App & Desktop Virtualization
 
Security For Business: Are You And Your Customers Safe
Security For Business:  Are You And Your Customers SafeSecurity For Business:  Are You And Your Customers Safe
Security For Business: Are You And Your Customers Safe
 
dataProtection_p3.ppt
dataProtection_p3.pptdataProtection_p3.ppt
dataProtection_p3.ppt
 
Tigerspike - Cybersecurity and Mobility in the Energy Industry
Tigerspike - Cybersecurity and Mobility in the Energy IndustryTigerspike - Cybersecurity and Mobility in the Energy Industry
Tigerspike - Cybersecurity and Mobility in the Energy Industry
 
Good Security Whitepaper
Good Security WhitepaperGood Security Whitepaper
Good Security Whitepaper
 
Introduction to MessageSight - gateway to the internet of things and mobile m...
Introduction to MessageSight - gateway to the internet of things and mobile m...Introduction to MessageSight - gateway to the internet of things and mobile m...
Introduction to MessageSight - gateway to the internet of things and mobile m...
 
Strategy for Holistic Security
Strategy for Holistic SecurityStrategy for Holistic Security
Strategy for Holistic Security
 
3433 IBM messaging security why securing your environment is important-feb2...
3433   IBM messaging security why securing your environment is important-feb2...3433   IBM messaging security why securing your environment is important-feb2...
3433 IBM messaging security why securing your environment is important-feb2...
 
IBM Messaging Security - Why securing your environment is important : IBM Int...
IBM Messaging Security - Why securing your environment is important : IBM Int...IBM Messaging Security - Why securing your environment is important : IBM Int...
IBM Messaging Security - Why securing your environment is important : IBM Int...
 
The Top 7 Trends Revolutionising IT
The Top 7 Trends Revolutionising IT The Top 7 Trends Revolutionising IT
The Top 7 Trends Revolutionising IT
 
mobile application security
mobile application securitymobile application security
mobile application security
 
Alpha & Omega's Managed Security
Alpha & Omega's Managed SecurityAlpha & Omega's Managed Security
Alpha & Omega's Managed Security
 
M2M_IoT_Presentation
M2M_IoT_PresentationM2M_IoT_Presentation
M2M_IoT_Presentation
 

Mais de InnoTech

Mais de InnoTech (20)

"So you want to raise funding and build a team?"
"So you want to raise funding and build a team?""So you want to raise funding and build a team?"
"So you want to raise funding and build a team?"
 
Artificial Intelligence is Maturing
Artificial Intelligence is MaturingArtificial Intelligence is Maturing
Artificial Intelligence is Maturing
 
What is AI without Data?
What is AI without Data?What is AI without Data?
What is AI without Data?
 
Courageous Leadership - When it Matters Most
Courageous Leadership - When it Matters MostCourageous Leadership - When it Matters Most
Courageous Leadership - When it Matters Most
 
The Gathering Storm
The Gathering StormThe Gathering Storm
The Gathering Storm
 
Sql Server tips from the field
Sql Server tips from the fieldSql Server tips from the field
Sql Server tips from the field
 
Quantum Computing and its security implications
Quantum Computing and its security implicationsQuantum Computing and its security implications
Quantum Computing and its security implications
 
Converged Infrastructure
Converged InfrastructureConverged Infrastructure
Converged Infrastructure
 
Making the most out of collaboration with Office 365
Making the most out of collaboration with Office 365Making the most out of collaboration with Office 365
Making the most out of collaboration with Office 365
 
Blockchain use cases and case studies
Blockchain use cases and case studiesBlockchain use cases and case studies
Blockchain use cases and case studies
 
Blockchain: Exploring the Fundamentals and Promising Potential
Blockchain: Exploring the Fundamentals and Promising Potential Blockchain: Exploring the Fundamentals and Promising Potential
Blockchain: Exploring the Fundamentals and Promising Potential
 
Business leaders are engaging labor differently - Is your IT ready?
Business leaders are engaging labor differently - Is your IT ready?Business leaders are engaging labor differently - Is your IT ready?
Business leaders are engaging labor differently - Is your IT ready?
 
AI 3.0: Is it Finally Time for Artificial Intelligence and Sensor Networks to...
AI 3.0: Is it Finally Time for Artificial Intelligence and Sensor Networks to...AI 3.0: Is it Finally Time for Artificial Intelligence and Sensor Networks to...
AI 3.0: Is it Finally Time for Artificial Intelligence and Sensor Networks to...
 
Using Business Intelligence to Bring Your Data to Life
Using Business Intelligence to Bring Your Data to LifeUsing Business Intelligence to Bring Your Data to Life
Using Business Intelligence to Bring Your Data to Life
 
User requirements is a fallacy
User requirements is a fallacyUser requirements is a fallacy
User requirements is a fallacy
 
What I Wish I Knew Before I Signed that Contract - San Antonio
What I Wish I Knew Before I Signed that Contract - San Antonio What I Wish I Knew Before I Signed that Contract - San Antonio
What I Wish I Knew Before I Signed that Contract - San Antonio
 
Disaster Recovery Plan - Quorum
Disaster Recovery Plan - QuorumDisaster Recovery Plan - Quorum
Disaster Recovery Plan - Quorum
 
Share point saturday access services 2015 final 2
Share point saturday access services 2015 final 2Share point saturday access services 2015 final 2
Share point saturday access services 2015 final 2
 
Sp tech festdallas - office 365 groups - planner session
Sp tech festdallas - office 365 groups - planner sessionSp tech festdallas - office 365 groups - planner session
Sp tech festdallas - office 365 groups - planner session
 
Power apps presentation
Power apps presentationPower apps presentation
Power apps presentation
 

Último

Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Último (20)

Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu SubbuApidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 

Getting More Value Out of Your Data

  • 1. Getting More Value out of your Data Tammy Schuring Chief Customer Officer Voltage Security, Inc. For Internal Use Only.5/16/2013 1
  • 2. Data in 2013 and Beyond *** Confidential and Proprietary *** 2 • Up through 2012, compliance and breach risk have driven data security – Defending reputation, mitigating breach risks. • Now, enterprise must maximize the return on data • Maximize return on data by – Liberating data across any channel without risk – Enabling cloud, big data, mobility to be fully embraced – Simplified regulatory compliance at the lowest cost of ownership
  • 3. The shift to data security is here • Threats moving from the network to the host to the data – The next trend is to move from host to data – Consumerization of IT is the catalyst for this change – Focus is to identify “bubbles” of data and protect those assets – as opposed to building protection at device layer 5/16/2013 (C) 2013 Voltage Security, Inc. All Rights Reserved CONFIDENTIAL 3 Current and future security initiatives will focus more on protecting enterprise data than the underlying device or network infrastructure Prediction in 2005 Dan Hitchcock Security Architect, Microsoft Information Security
  • 4. Taming the data explosion • The explosion in data fuels growth and agility – But time to data value is gated by risk and compliance – Attacks to data are here to stay, and big data means a big target – The balance of data access and data security is critical 5/16/2013 (C) 2013 Voltage Security, Inc. All Rights Reserved CONFIDENTIAL 4 “90% of the data in the world today has been created in the last two years alone” - IBM Cisco, IBM. Parabolic growth in data created and consumed 0 10 20 30 40 50 60 70 80 2000 2005 2010 2015 Exabytespermonth
  • 5. Customer Trends – Big Data • Big Data – from the lab to production use cases – Customer data analytics & modeling – Fraud detection in payments – Medical data analysis 5
  • 6. Customer Trends – Cloud • Cloud – from plans and trials to secure foundations – Private clouds with data-centric Security as a Service – Hybrid clouds with integrated enterprise data – FPE technology enabling “Data as a Service” strategies 6
  • 7. Customer Trends – Mobile • Adoption of email encryption on Mobile to: – Streamline customer processes via least cost email channels – Integrate the consumer into the business via smartphones – Cover the gaps left by BYOD security with data-centric security 7 90% of smartphone owners access the same email account on mobile and desktop. ExactTarget– “The 2012 channel preference survey” (2012) More email is read Mobile than on a desktop email client or via webmail. Stats say 42% of email is now opened on a mobile device Litmus –”Email Analytics” (Jan 2013)
  • 8. 5/16/2013 (C) 2013 Voltage Security, Inc. All Rights Reserved CONFIDENTIAL 8
  • 9. 5/16/2013 (C) 2013 Voltage Security, Inc. All Rights Reserved CONFIDENTIAL 9
  • 10. 4th Largest Retailer – Web Application protection of PCI Data • PCI scope reduction for ecommerce environment – Projected $1MM/year savings • E2EE for every card purchase & tokenization for all stored cards – Nearly 100MM transactions annually • Selected Voltage SecureData Web & Secure Stateless Tokenization • Integrated into security private cloud – Global Security as a Service 10
  • 11. Top 5 US Retailer – PCI Compliance • PCI compliance and cost reduction – Loyalty data linked to cardholder data • HP NonStop Guardian, IBM z/OS – Mission-critical environments • Voltage SecureData Enterprise – Native encryption on legacy platforms – Format Preserving Encryption – no change to z/OS applications – Maximum loyalty data use without risk
  • 12. National Logistics Organization – POS E2EE • PCI scope reduction project – Opportunity for huge annual cost savings • 75k POS terminals across 35k locations – Mix of Ingenico & VeriFone devices • Evaluated P2PE solutions from VeriFone, RSA, and others • Selected Voltage & Ingenico as organizational standard – Replacing all existing VeriFone devices 12
  • 13. Top Health Insurance Company – Trusted Secure Email Communication • HITECH Compliance cost reduction • Secure communications to – >30m network members – healthcare, dental, pharmacy – >13m million group insurance members – >840,000 health-care professionals – >490,000 primary-care doctors and specialists – ~5000 hospitals • Standardized on Voltage SecureMail Enterprise & Mobile – Application & user driven encrypted email – Customers on desktop and smartphones • Replaced CISCO IronPort Encryption with usability, cost, support and scale issues 13
  • 14. Top 10 Bank – Mobile Data Security • Secure, differentiated customer service via mobile channels • Extends BYOD with end-to-end security – emails and attachments • Voltage SecureMail Mobile – Enterprise standard for mobile email & attachment encryption – Inside the Bank, outside to partners and customers – including consumers – Adds to Voltage SecureMail Enterprise with >2m users 14
  • 15. Top US Telco – Mobile Data Security • Transparent email encryption on smartphones – internal and external • End-to-end security to and from – Android, iPhone, Blackberry – Desktops and applications. • Ease of use for executives critical • Voltage SecureMail Mobile – Mobile specific data policy control – Internal, partner, law enforcement, government secure collaboration – Adds to Voltage SecureMail Enterprise – the enterprise standard at the Telco
  • 16. Global Credit Card Issuer • Extending Office365 Email Encryption to smartphones – Blackberry critical, also iOS, Android – Tablets and smartphones – Support for corporate Blackberry and BYPD • Ease of use for executives critical – Integration into complex AD framework – Integrate to complex enterprise cloud • Voltage SecureMail Mobile – Executive communications – External smartphone user collaboration – Ability to compose key requirement for
  • 17. International Health – Cloud Email Encryption • #1 National Healthcare Service in EU* • Standardized on IBE technology for privacy compliant communications – Links hospitals and healthcare services • Seamless, federated EHR exchange – labs, hospitals, doctors, patients, partners • Ease of use for patients & doctors • Simplicity for IT operations • Mobile support for mobile health workers • Voltage SecureMail &Voltage SecureMail Cloud Services  Cloud delivery –SaaS service  Simple, easy to consume privacy compliance * http://www.bmj.com/content/344/bmj.e3430
  • 18. Summary • It is possible to get more value from your data • A data-centric approach to protecting sensitive information will remove many obstacles to this goal • Innovations in cryptography and tokenization make this level of protection possible today 5/16/2013 (C) 2013 Voltage Security, Inc. All Rights Reserved CONFIDENTIAL 18