SlideShare ist ein Scribd-Unternehmen logo
1 von 18
Getting More Value out of your
Data
Tammy Schuring
Chief Customer Officer
Voltage Security, Inc.
For Internal Use Only.5/16/2013 1
Data in 2013 and Beyond
*** Confidential and
Proprietary ***
2
• Up through 2012, compliance and breach risk have driven
data security
– Defending reputation, mitigating breach risks.
• Now, enterprise must maximize the return on data
• Maximize return on data by
– Liberating data across any channel without risk
– Enabling cloud, big data, mobility to be fully embraced
– Simplified regulatory compliance at the lowest cost of ownership
The shift to data security is here
• Threats moving from the network to the host to the data
– The next trend is to move from host to data
– Consumerization of IT is the catalyst for this change
– Focus is to identify “bubbles” of data and protect those assets –
as opposed to building protection at device layer
5/16/2013
(C) 2013 Voltage Security, Inc. All Rights Reserved
CONFIDENTIAL
3
Current and future security
initiatives will focus more on
protecting enterprise data
than the underlying device or
network infrastructure
Prediction in 2005
Dan Hitchcock
Security Architect, Microsoft Information Security
Taming the data explosion
• The explosion in data fuels growth and agility
– But time to data value is gated by risk and compliance
– Attacks to data are here to stay, and big data means a big target
– The balance of data access and data security is critical
5/16/2013
(C) 2013 Voltage Security, Inc. All Rights Reserved
CONFIDENTIAL
4
“90% of the data in the world
today has been created in the
last two years alone” - IBM
Cisco, IBM.
Parabolic growth in data created and consumed
0
10
20
30
40
50
60
70
80
2000 2005 2010 2015
Exabytespermonth
Customer Trends – Big Data
• Big Data – from the lab to production use cases
– Customer data analytics & modeling
– Fraud detection in payments
– Medical data analysis
5
Customer Trends – Cloud
• Cloud – from plans and trials to secure foundations
– Private clouds with data-centric Security as a Service
– Hybrid clouds with integrated enterprise data
– FPE technology enabling “Data as a Service” strategies
6
Customer Trends – Mobile
• Adoption of email encryption on Mobile to:
– Streamline customer processes via least cost email channels
– Integrate the consumer into the business via smartphones
– Cover the gaps left by BYOD security with data-centric security
7
90% of smartphone owners access the
same email account on mobile and
desktop. ExactTarget– “The 2012 channel
preference survey” (2012)
More email is read Mobile than on a
desktop email client or via webmail. Stats
say 42% of email is now opened on a
mobile device Litmus –”Email Analytics”
(Jan 2013)
5/16/2013
(C) 2013 Voltage Security, Inc. All Rights Reserved
CONFIDENTIAL
8
5/16/2013
(C) 2013 Voltage Security, Inc. All Rights Reserved
CONFIDENTIAL
9
4th Largest Retailer – Web Application protection of
PCI Data
• PCI scope reduction for ecommerce
environment
– Projected $1MM/year savings
• E2EE for every card purchase &
tokenization for all stored cards
– Nearly 100MM transactions annually
• Selected Voltage SecureData Web &
Secure Stateless Tokenization
• Integrated into security private cloud
– Global Security as a Service
10
Top 5 US Retailer – PCI Compliance
• PCI compliance and cost reduction
– Loyalty data linked to cardholder data
• HP NonStop Guardian, IBM z/OS
– Mission-critical environments
• Voltage SecureData Enterprise
– Native encryption on legacy platforms
– Format Preserving Encryption – no
change to z/OS applications
– Maximum loyalty data use without risk
National Logistics Organization – POS E2EE
• PCI scope reduction project
– Opportunity for huge annual cost savings
• 75k POS terminals across 35k locations
– Mix of Ingenico & VeriFone devices
• Evaluated P2PE solutions from VeriFone,
RSA, and others
• Selected Voltage & Ingenico as
organizational standard
– Replacing all existing VeriFone devices
12
Top Health Insurance Company – Trusted Secure
Email Communication
• HITECH Compliance cost reduction
• Secure communications to
– >30m network members – healthcare, dental,
pharmacy
– >13m million group insurance members
– >840,000 health-care professionals
– >490,000 primary-care doctors and specialists
– ~5000 hospitals
• Standardized on Voltage SecureMail
Enterprise & Mobile
– Application & user driven encrypted email
– Customers on desktop and smartphones
• Replaced CISCO IronPort Encryption
with usability, cost, support and scale
issues
13
Top 10 Bank – Mobile Data Security
• Secure, differentiated customer
service via mobile channels
• Extends BYOD with end-to-end
security – emails and attachments
• Voltage SecureMail Mobile
– Enterprise standard for mobile email &
attachment encryption
– Inside the Bank, outside to partners and
customers – including consumers
– Adds to Voltage SecureMail Enterprise
with >2m users
14
Top US Telco – Mobile Data Security
• Transparent email encryption on
smartphones – internal and external
• End-to-end security to and from
– Android, iPhone, Blackberry
– Desktops and applications.
• Ease of use for executives critical
• Voltage SecureMail Mobile
– Mobile specific data policy control
– Internal, partner, law enforcement,
government secure collaboration
– Adds to Voltage SecureMail Enterprise –
the enterprise standard at the Telco
Global Credit Card Issuer
• Extending Office365 Email
Encryption to smartphones
– Blackberry critical, also iOS, Android
– Tablets and smartphones
– Support for corporate Blackberry and
BYPD
• Ease of use for executives critical
– Integration into complex AD framework
– Integrate to complex enterprise cloud
• Voltage SecureMail Mobile
– Executive communications
– External smartphone user collaboration
– Ability to compose key requirement for
International Health – Cloud Email Encryption
• #1 National Healthcare Service in EU*
• Standardized on IBE technology for
privacy compliant communications
– Links hospitals and healthcare services
• Seamless, federated EHR exchange – labs,
hospitals, doctors, patients, partners
• Ease of use for patients & doctors
• Simplicity for IT operations
• Mobile support for mobile health workers
• Voltage SecureMail &Voltage
SecureMail Cloud Services
 Cloud delivery –SaaS service
 Simple, easy to consume privacy compliance
* http://www.bmj.com/content/344/bmj.e3430
Summary
• It is possible to get more value from your data
• A data-centric approach to protecting sensitive
information will remove many obstacles to this goal
• Innovations in cryptography and tokenization make this
level of protection possible today
5/16/2013
(C) 2013 Voltage Security, Inc. All Rights Reserved
CONFIDENTIAL
18

Weitere ähnliche Inhalte

Was ist angesagt?

Recommended Solutions to Major Security Challenges Facing OT & IT Personnel w...
Recommended Solutions to Major Security Challenges Facing OT & IT Personnel w...Recommended Solutions to Major Security Challenges Facing OT & IT Personnel w...
Recommended Solutions to Major Security Challenges Facing OT & IT Personnel w...
Power System Operation
 

Was ist angesagt? (20)

Data enrichment
Data enrichmentData enrichment
Data enrichment
 
Cybersecurity in Utilities
Cybersecurity in UtilitiesCybersecurity in Utilities
Cybersecurity in Utilities
 
Internet of Things Service Level Agreements: Market Outlook and Forecast for ...
Internet of Things Service Level Agreements: Market Outlook and Forecast for ...Internet of Things Service Level Agreements: Market Outlook and Forecast for ...
Internet of Things Service Level Agreements: Market Outlook and Forecast for ...
 
Internet of Things (IoT)
Internet of Things (IoT)Internet of Things (IoT)
Internet of Things (IoT)
 
IRJET- Exploring the Nuances of Internet of Things in Health Care Assisting S...
IRJET- Exploring the Nuances of Internet of Things in Health Care Assisting S...IRJET- Exploring the Nuances of Internet of Things in Health Care Assisting S...
IRJET- Exploring the Nuances of Internet of Things in Health Care Assisting S...
 
IoT Trends in Industrial IoT for 2018
IoT Trends in Industrial IoT for 2018IoT Trends in Industrial IoT for 2018
IoT Trends in Industrial IoT for 2018
 
The internet of things for health care a comprehensive survey
The internet of things for health care a comprehensive surveyThe internet of things for health care a comprehensive survey
The internet of things for health care a comprehensive survey
 
Cybersecurity in the Era of IoT
Cybersecurity in the Era of IoTCybersecurity in the Era of IoT
Cybersecurity in the Era of IoT
 
Ls subramanian internet of things
Ls subramanian internet of thingsLs subramanian internet of things
Ls subramanian internet of things
 
The Growing U.S. IT Productivity Gap
The Growing U.S. IT Productivity GapThe Growing U.S. IT Productivity Gap
The Growing U.S. IT Productivity Gap
 
A History of IIoT Cyber-Attacks & Checklist for Implementing Security [Infogr...
A History of IIoT Cyber-Attacks & Checklist for Implementing Security [Infogr...A History of IIoT Cyber-Attacks & Checklist for Implementing Security [Infogr...
A History of IIoT Cyber-Attacks & Checklist for Implementing Security [Infogr...
 
IOT: The Evolving World of Realtime BigData by Jerry Power
IOT: The Evolving World of Realtime BigData by Jerry PowerIOT: The Evolving World of Realtime BigData by Jerry Power
IOT: The Evolving World of Realtime BigData by Jerry Power
 
AI is the Catalyst of IoT
AI is the Catalyst of IoTAI is the Catalyst of IoT
AI is the Catalyst of IoT
 
IIoT - A data-driven future for manufacturing
IIoT - A data-driven future for manufacturingIIoT - A data-driven future for manufacturing
IIoT - A data-driven future for manufacturing
 
Internet of everything ppt
Internet of everything pptInternet of everything ppt
Internet of everything ppt
 
Cloud computing_LKYSPP GSP 2019
Cloud computing_LKYSPP GSP 2019Cloud computing_LKYSPP GSP 2019
Cloud computing_LKYSPP GSP 2019
 
10 predictions for the future of IoT
10 predictions for the future of IoT10 predictions for the future of IoT
10 predictions for the future of IoT
 
Io t powered healthcare solutions- reshaping medical industry!
Io t powered healthcare solutions- reshaping medical industry!Io t powered healthcare solutions- reshaping medical industry!
Io t powered healthcare solutions- reshaping medical industry!
 
IoT Analytics From Data to Decision Making - Trends & Challenges
IoT Analytics From Data to Decision Making- Trends & ChallengesIoT Analytics From Data to Decision Making- Trends & Challenges
IoT Analytics From Data to Decision Making - Trends & Challenges
 
Recommended Solutions to Major Security Challenges Facing OT & IT Personnel w...
Recommended Solutions to Major Security Challenges Facing OT & IT Personnel w...Recommended Solutions to Major Security Challenges Facing OT & IT Personnel w...
Recommended Solutions to Major Security Challenges Facing OT & IT Personnel w...
 

Andere mochten auch

Hortonworks, Novetta and Noble Energy Webinar
Hortonworks, Novetta and Noble Energy Webinar Hortonworks, Novetta and Noble Energy Webinar
Hortonworks, Novetta and Noble Energy Webinar
Hortonworks
 

Andere mochten auch (7)

YARN Ready: Integrating to YARN with Tez
YARN Ready: Integrating to YARN with Tez YARN Ready: Integrating to YARN with Tez
YARN Ready: Integrating to YARN with Tez
 
Don't Let Security Be The 'Elephant in the Room'
Don't Let Security Be The 'Elephant in the Room'Don't Let Security Be The 'Elephant in the Room'
Don't Let Security Be The 'Elephant in the Room'
 
Pig Out to Hadoop
Pig Out to HadoopPig Out to Hadoop
Pig Out to Hadoop
 
Hortonworks and Voltage Security webinar
Hortonworks and Voltage Security webinarHortonworks and Voltage Security webinar
Hortonworks and Voltage Security webinar
 
Hortonworks, Novetta and Noble Energy Webinar
Hortonworks, Novetta and Noble Energy Webinar Hortonworks, Novetta and Noble Energy Webinar
Hortonworks, Novetta and Noble Energy Webinar
 
2015 02 12 talend hortonworks webinar challenges to hadoop adoption
2015 02 12 talend hortonworks webinar challenges to hadoop adoption2015 02 12 talend hortonworks webinar challenges to hadoop adoption
2015 02 12 talend hortonworks webinar challenges to hadoop adoption
 
Apache Ambari: Managing Hadoop and YARN
Apache Ambari: Managing Hadoop and YARNApache Ambari: Managing Hadoop and YARN
Apache Ambari: Managing Hadoop and YARN
 

Ähnlich wie Getting More Value Out of Your Data

IBM InterConnect 2103 - Institute a MobileFirst IT Infrastructure
IBM InterConnect 2103 -  Institute a MobileFirst IT InfrastructureIBM InterConnect 2103 -  Institute a MobileFirst IT Infrastructure
IBM InterConnect 2103 - Institute a MobileFirst IT Infrastructure
Chris Pepin
 

Ähnlich wie Getting More Value Out of Your Data (20)

NTXISSACSC2 - Bring Your Own Device: The Great Debate by Brandon Swain
NTXISSACSC2 - Bring Your Own Device: The Great Debate by Brandon SwainNTXISSACSC2 - Bring Your Own Device: The Great Debate by Brandon Swain
NTXISSACSC2 - Bring Your Own Device: The Great Debate by Brandon Swain
 
EMEA10: Trepidation in Moving to the Cloud
EMEA10: Trepidation in Moving to the CloudEMEA10: Trepidation in Moving to the Cloud
EMEA10: Trepidation in Moving to the Cloud
 
IBM InterConnect 2103 - Institute a MobileFirst IT Infrastructure
IBM InterConnect 2103 -  Institute a MobileFirst IT InfrastructureIBM InterConnect 2103 -  Institute a MobileFirst IT Infrastructure
IBM InterConnect 2103 - Institute a MobileFirst IT Infrastructure
 
Leveraging compute power at the edge - M2M solutions with Informix in the IoT...
Leveraging compute power at the edge - M2M solutions with Informix in the IoT...Leveraging compute power at the edge - M2M solutions with Informix in the IoT...
Leveraging compute power at the edge - M2M solutions with Informix in the IoT...
 
Cyber security general perspective a
Cyber security general perspective aCyber security general perspective a
Cyber security general perspective a
 
SAND SKILLS
SAND SKILLSSAND SKILLS
SAND SKILLS
 
IoT / M2M Solutions with Informix in the IoT Gateway
IoT / M2M Solutions with Informix in the IoT GatewayIoT / M2M Solutions with Informix in the IoT Gateway
IoT / M2M Solutions with Informix in the IoT Gateway
 
10 Reasons to Strengthen Security with App & Desktop Virtualization
10 Reasons to Strengthen Security with App & Desktop Virtualization10 Reasons to Strengthen Security with App & Desktop Virtualization
10 Reasons to Strengthen Security with App & Desktop Virtualization
 
Security For Business: Are You And Your Customers Safe
Security For Business:  Are You And Your Customers SafeSecurity For Business:  Are You And Your Customers Safe
Security For Business: Are You And Your Customers Safe
 
dataProtection_p3.ppt
dataProtection_p3.pptdataProtection_p3.ppt
dataProtection_p3.ppt
 
Tigerspike - Cybersecurity and Mobility in the Energy Industry
Tigerspike - Cybersecurity and Mobility in the Energy IndustryTigerspike - Cybersecurity and Mobility in the Energy Industry
Tigerspike - Cybersecurity and Mobility in the Energy Industry
 
Good Security Whitepaper
Good Security WhitepaperGood Security Whitepaper
Good Security Whitepaper
 
Introduction to MessageSight - gateway to the internet of things and mobile m...
Introduction to MessageSight - gateway to the internet of things and mobile m...Introduction to MessageSight - gateway to the internet of things and mobile m...
Introduction to MessageSight - gateway to the internet of things and mobile m...
 
Strategy for Holistic Security
Strategy for Holistic SecurityStrategy for Holistic Security
Strategy for Holistic Security
 
3433 IBM messaging security why securing your environment is important-feb2...
3433   IBM messaging security why securing your environment is important-feb2...3433   IBM messaging security why securing your environment is important-feb2...
3433 IBM messaging security why securing your environment is important-feb2...
 
IBM Messaging Security - Why securing your environment is important : IBM Int...
IBM Messaging Security - Why securing your environment is important : IBM Int...IBM Messaging Security - Why securing your environment is important : IBM Int...
IBM Messaging Security - Why securing your environment is important : IBM Int...
 
The Top 7 Trends Revolutionising IT
The Top 7 Trends Revolutionising IT The Top 7 Trends Revolutionising IT
The Top 7 Trends Revolutionising IT
 
mobile application security
mobile application securitymobile application security
mobile application security
 
Alpha & Omega's Managed Security
Alpha & Omega's Managed SecurityAlpha & Omega's Managed Security
Alpha & Omega's Managed Security
 
M2M_IoT_Presentation
M2M_IoT_PresentationM2M_IoT_Presentation
M2M_IoT_Presentation
 

Mehr von InnoTech

Mehr von InnoTech (20)

"So you want to raise funding and build a team?"
"So you want to raise funding and build a team?""So you want to raise funding and build a team?"
"So you want to raise funding and build a team?"
 
Artificial Intelligence is Maturing
Artificial Intelligence is MaturingArtificial Intelligence is Maturing
Artificial Intelligence is Maturing
 
What is AI without Data?
What is AI without Data?What is AI without Data?
What is AI without Data?
 
Courageous Leadership - When it Matters Most
Courageous Leadership - When it Matters MostCourageous Leadership - When it Matters Most
Courageous Leadership - When it Matters Most
 
The Gathering Storm
The Gathering StormThe Gathering Storm
The Gathering Storm
 
Sql Server tips from the field
Sql Server tips from the fieldSql Server tips from the field
Sql Server tips from the field
 
Quantum Computing and its security implications
Quantum Computing and its security implicationsQuantum Computing and its security implications
Quantum Computing and its security implications
 
Converged Infrastructure
Converged InfrastructureConverged Infrastructure
Converged Infrastructure
 
Making the most out of collaboration with Office 365
Making the most out of collaboration with Office 365Making the most out of collaboration with Office 365
Making the most out of collaboration with Office 365
 
Blockchain use cases and case studies
Blockchain use cases and case studiesBlockchain use cases and case studies
Blockchain use cases and case studies
 
Blockchain: Exploring the Fundamentals and Promising Potential
Blockchain: Exploring the Fundamentals and Promising Potential Blockchain: Exploring the Fundamentals and Promising Potential
Blockchain: Exploring the Fundamentals and Promising Potential
 
Business leaders are engaging labor differently - Is your IT ready?
Business leaders are engaging labor differently - Is your IT ready?Business leaders are engaging labor differently - Is your IT ready?
Business leaders are engaging labor differently - Is your IT ready?
 
AI 3.0: Is it Finally Time for Artificial Intelligence and Sensor Networks to...
AI 3.0: Is it Finally Time for Artificial Intelligence and Sensor Networks to...AI 3.0: Is it Finally Time for Artificial Intelligence and Sensor Networks to...
AI 3.0: Is it Finally Time for Artificial Intelligence and Sensor Networks to...
 
Using Business Intelligence to Bring Your Data to Life
Using Business Intelligence to Bring Your Data to LifeUsing Business Intelligence to Bring Your Data to Life
Using Business Intelligence to Bring Your Data to Life
 
User requirements is a fallacy
User requirements is a fallacyUser requirements is a fallacy
User requirements is a fallacy
 
What I Wish I Knew Before I Signed that Contract - San Antonio
What I Wish I Knew Before I Signed that Contract - San Antonio What I Wish I Knew Before I Signed that Contract - San Antonio
What I Wish I Knew Before I Signed that Contract - San Antonio
 
Disaster Recovery Plan - Quorum
Disaster Recovery Plan - QuorumDisaster Recovery Plan - Quorum
Disaster Recovery Plan - Quorum
 
Share point saturday access services 2015 final 2
Share point saturday access services 2015 final 2Share point saturday access services 2015 final 2
Share point saturday access services 2015 final 2
 
Sp tech festdallas - office 365 groups - planner session
Sp tech festdallas - office 365 groups - planner sessionSp tech festdallas - office 365 groups - planner session
Sp tech festdallas - office 365 groups - planner session
 
Power apps presentation
Power apps presentationPower apps presentation
Power apps presentation
 

Kürzlich hochgeladen

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
 

Kürzlich hochgeladen (20)

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 

Getting More Value Out of Your Data

  • 1. Getting More Value out of your Data Tammy Schuring Chief Customer Officer Voltage Security, Inc. For Internal Use Only.5/16/2013 1
  • 2. Data in 2013 and Beyond *** Confidential and Proprietary *** 2 • Up through 2012, compliance and breach risk have driven data security – Defending reputation, mitigating breach risks. • Now, enterprise must maximize the return on data • Maximize return on data by – Liberating data across any channel without risk – Enabling cloud, big data, mobility to be fully embraced – Simplified regulatory compliance at the lowest cost of ownership
  • 3. The shift to data security is here • Threats moving from the network to the host to the data – The next trend is to move from host to data – Consumerization of IT is the catalyst for this change – Focus is to identify “bubbles” of data and protect those assets – as opposed to building protection at device layer 5/16/2013 (C) 2013 Voltage Security, Inc. All Rights Reserved CONFIDENTIAL 3 Current and future security initiatives will focus more on protecting enterprise data than the underlying device or network infrastructure Prediction in 2005 Dan Hitchcock Security Architect, Microsoft Information Security
  • 4. Taming the data explosion • The explosion in data fuels growth and agility – But time to data value is gated by risk and compliance – Attacks to data are here to stay, and big data means a big target – The balance of data access and data security is critical 5/16/2013 (C) 2013 Voltage Security, Inc. All Rights Reserved CONFIDENTIAL 4 “90% of the data in the world today has been created in the last two years alone” - IBM Cisco, IBM. Parabolic growth in data created and consumed 0 10 20 30 40 50 60 70 80 2000 2005 2010 2015 Exabytespermonth
  • 5. Customer Trends – Big Data • Big Data – from the lab to production use cases – Customer data analytics & modeling – Fraud detection in payments – Medical data analysis 5
  • 6. Customer Trends – Cloud • Cloud – from plans and trials to secure foundations – Private clouds with data-centric Security as a Service – Hybrid clouds with integrated enterprise data – FPE technology enabling “Data as a Service” strategies 6
  • 7. Customer Trends – Mobile • Adoption of email encryption on Mobile to: – Streamline customer processes via least cost email channels – Integrate the consumer into the business via smartphones – Cover the gaps left by BYOD security with data-centric security 7 90% of smartphone owners access the same email account on mobile and desktop. ExactTarget– “The 2012 channel preference survey” (2012) More email is read Mobile than on a desktop email client or via webmail. Stats say 42% of email is now opened on a mobile device Litmus –”Email Analytics” (Jan 2013)
  • 8. 5/16/2013 (C) 2013 Voltage Security, Inc. All Rights Reserved CONFIDENTIAL 8
  • 9. 5/16/2013 (C) 2013 Voltage Security, Inc. All Rights Reserved CONFIDENTIAL 9
  • 10. 4th Largest Retailer – Web Application protection of PCI Data • PCI scope reduction for ecommerce environment – Projected $1MM/year savings • E2EE for every card purchase & tokenization for all stored cards – Nearly 100MM transactions annually • Selected Voltage SecureData Web & Secure Stateless Tokenization • Integrated into security private cloud – Global Security as a Service 10
  • 11. Top 5 US Retailer – PCI Compliance • PCI compliance and cost reduction – Loyalty data linked to cardholder data • HP NonStop Guardian, IBM z/OS – Mission-critical environments • Voltage SecureData Enterprise – Native encryption on legacy platforms – Format Preserving Encryption – no change to z/OS applications – Maximum loyalty data use without risk
  • 12. National Logistics Organization – POS E2EE • PCI scope reduction project – Opportunity for huge annual cost savings • 75k POS terminals across 35k locations – Mix of Ingenico & VeriFone devices • Evaluated P2PE solutions from VeriFone, RSA, and others • Selected Voltage & Ingenico as organizational standard – Replacing all existing VeriFone devices 12
  • 13. Top Health Insurance Company – Trusted Secure Email Communication • HITECH Compliance cost reduction • Secure communications to – >30m network members – healthcare, dental, pharmacy – >13m million group insurance members – >840,000 health-care professionals – >490,000 primary-care doctors and specialists – ~5000 hospitals • Standardized on Voltage SecureMail Enterprise & Mobile – Application & user driven encrypted email – Customers on desktop and smartphones • Replaced CISCO IronPort Encryption with usability, cost, support and scale issues 13
  • 14. Top 10 Bank – Mobile Data Security • Secure, differentiated customer service via mobile channels • Extends BYOD with end-to-end security – emails and attachments • Voltage SecureMail Mobile – Enterprise standard for mobile email & attachment encryption – Inside the Bank, outside to partners and customers – including consumers – Adds to Voltage SecureMail Enterprise with >2m users 14
  • 15. Top US Telco – Mobile Data Security • Transparent email encryption on smartphones – internal and external • End-to-end security to and from – Android, iPhone, Blackberry – Desktops and applications. • Ease of use for executives critical • Voltage SecureMail Mobile – Mobile specific data policy control – Internal, partner, law enforcement, government secure collaboration – Adds to Voltage SecureMail Enterprise – the enterprise standard at the Telco
  • 16. Global Credit Card Issuer • Extending Office365 Email Encryption to smartphones – Blackberry critical, also iOS, Android – Tablets and smartphones – Support for corporate Blackberry and BYPD • Ease of use for executives critical – Integration into complex AD framework – Integrate to complex enterprise cloud • Voltage SecureMail Mobile – Executive communications – External smartphone user collaboration – Ability to compose key requirement for
  • 17. International Health – Cloud Email Encryption • #1 National Healthcare Service in EU* • Standardized on IBE technology for privacy compliant communications – Links hospitals and healthcare services • Seamless, federated EHR exchange – labs, hospitals, doctors, patients, partners • Ease of use for patients & doctors • Simplicity for IT operations • Mobile support for mobile health workers • Voltage SecureMail &Voltage SecureMail Cloud Services  Cloud delivery –SaaS service  Simple, easy to consume privacy compliance * http://www.bmj.com/content/344/bmj.e3430
  • 18. Summary • It is possible to get more value from your data • A data-centric approach to protecting sensitive information will remove many obstacles to this goal • Innovations in cryptography and tokenization make this level of protection possible today 5/16/2013 (C) 2013 Voltage Security, Inc. All Rights Reserved CONFIDENTIAL 18