Upload
others
View
0
Download
0
Embed Size (px)
Citation preview
Eric Hutto, Senior Vice President and President, Enterprise Solutions, UnisysTom Patterson, Vice President, Security Solutions, Unisys
Unisys SecurityEnabling Business Growth with Advanced Security Solutions
© 2016 Unisys Corporation | All rights reserved. 2
Unisys Security Snapshot
• Single go-to-market group
• Launched CISO Advisory Services
• Delivered globally through local engagement
• Accelerating micro-segmentation use and identity-based management
• Pragmatic solutions with predictable outcomes
© 2016 Unisys Corporation | All rights reserved. 3
Unisys Security Enables Business by…
• Making it easier for you to manage
• Making it work for you
• Making it extensible to your enterprise
© 2016 Unisys Corporation | All rights reserved.
Security Is Part of EverythingUsing Technology to Enable Business Growth
© 2016 Unisys Corporation | All rights reserved. 5
Why Unisys Now! Today’s Enterprises Have Changed
• Borders have dissolved — perimeters have become amorphous
• Shifting from perimeters to globally connected, driving competiveness
• No longer a question of protecting the perimeter — we must safeguard the data
• Budgets pushing data centers to the cloud, saving billions
• Unchecked threats to business are costing billions
• Business goals require you to move fast — to be part of the solution, not a “gate”
© 2016 Unisys Corporation | All rights reserved. 6
Our Clients’ Key Requests from Security
• Ability to lower costs by moving to the cloud
• Ability to integrate customers and suppliers into their extended enterprise
• Lower enterprise risk of becoming the next headline
• Protect the brand
• Lower the cost of operations
• Provide more security, transparent to users and operators
• Reduce complexity of maintaining numerous security profiles, across extended enterprise (which can encourage network vulnerabilities)
© 2016 Unisys Corporation | All rights reserved.
Why UnisysNew Enterprise and Business Requirements
Require New Security Thinking, Tools and Delivery
© 2016 Unisys Corporation | All rights reserved. 8
Unisys: Building Trust into Everything We Do
TargetedConsulting
• Risk Analysis & Remediation
• Architecture & Use Cases
• Create Communities
• Technical Services
• Business Services
AdvancedProducts
• Stealth(core)
• Stealth(cloud)
• Stealth(mobile)
• Stealth(identity)
• Stealth(analytics)
• Stealth(Q4)
EfficientManaged
• Managed SEIM
• Managed Devices
• Managed End User
• Managed Stealth
• Threat Intelligence
• Our/Your Prem
VerticalSolutions
• Safe Cities
• Medical Device Supply Chain
• Border Management
• Jail Management
• PCI Control
Lower Risk | Save Money | Increase Agility
© 2016 Unisys Corporation | All rights reserved. 9
Micro-Segmentation Is Changingthe Security Paradigm
Traditional
© 2016 Unisys Corporation | All rights reserved. 10
Action on Objectives
Commandand Control
Installation
Exploitation
Delivery
Weaponization
Reconnaissance
Why
Unisys Core Reference Architecture
HowMicro-segmentation
Micro-segmentation
End Point Security
Micro-segmentation Firewalls &VPN
Adaptive Security
Antimalware/AV
Privilege Escalation
Web Application Firewalls
Analytics
Email Security Vigilant User Web Content Security
DLP
SIEM
End Point Security
Secure Remote Access
Micro-segmentation
Vulnerability Assessment
Event Analytics
Patch Management
Micro-segmentation
Log Management
ID&AM
IDS/IPS
and With What
UnisysMSS
UnisysMSS
UnisysMSS
UnisysMSS
UnisysMSS
UnisysMSS
UnisysMSS
UnisysMSS
UnisysMSS
UnisysMSS
Unisys Analytics
Unisys Consulting
UnisysMSS
identity
© 2016 Unisys Corporation | All rights reserved.
Client StoriesUnisys Security
Consulting | Products | Managed Services | Solutions
© 2016 Unisys Corporation | All rights reserved. 12
European Financial InstitutionIncrease Compliance While Also Increasing Security
Business Problem
• Compliance/audit requirements increasing but are costly and difficult to maintain
• Increasing security around legacy applications are risky and costly
• Traditional security measures slow and disruptive
Business Benefits
• PCI audit scope significantly reduced
• Secure isolation of critical legacy applications through micro-segmentation
• Increased security through network/asset identity-based access
Our Solution
• Stealth(core) allowed client to achieve critical regulatory compliance/successful audit
• Stealth(core) isolated (cloaked) key legacy servers without modifications to critical applications
© 2016 Unisys Corporation | All rights reserved. 13
State GovernmentConsolidation to Save Taxpayer Money
Business Problem
• Consolidation of 52 agencies/data centers into a single shared environment
• Traditional security solutions costly and error-prone
• Insufficient state resources to manage
Business Benefits
• Flatten shared network (reduced complexity/cost)
• Reduce traditional CapEx/OpEx (i.e. firewalls, vLans)
• Improve long-term security audit success
Our Solution
• Stealth(core) allowed consolidation into shared asset environment and provided agency segmentation to meet specific regulatory audits
• Security Integration Services provided transition from “current state to future state”
• Managed Security Services (MSS) deployed to operate new environment
© 2016 Unisys Corporation | All rights reserved. 14
Leading Utility CompanyAdvanced Analytics and Micro-Segmentation Create Intelligent Network
Business Problem
• Ingest network data from existing SIEM tool and SOC to identify cyber threats before they occur
Business Benefits
• Identify network anomalies for both external and internal threats near-real time to save time and money and protect service to the citizen
Our Solution
• Machine learning and advanced analytics improved security posture when combined with Stealth(analytics)
• SIEM and data aggregators used event modeling to anticipate threats, creating an agile network
• Stealth(analytics) extended enterprise via mobile end points, BYOD and emergence of IoT/IoE, providing true sentience and cognizance of operational environment
© 2016 Unisys Corporation | All rights reserved. 15
Department of Defense OutreachImproving Community Communications to Support Mission Readiness
Business Problem
• Information was at risk of defacement, poison well, PII theft, Man-in-the-Middle attacks and redirection
Business Benefits
• Secure data and workload in cloud environment
• Allow safe access to staff and citizens
• Reduce attack surface
• Lower costs, shifting away from CapEx to efficient OpEx
Our Solution
• Stealth(cloud) segmented key content, control and database workloads to ensure mission integrity and data security
• Automated infrastructure security controls with encryption in motion for all traffic
• Simple transition of workloads via Stealth XDC with ability to handle peak loads efficiently
© 2016 Unisys Corporation | All rights reserved. 16
Energy CompanyProtect and Secure Access to Critical Processes and Assets
Business Problem
• Reach across many data sources to identify anomalies and security challenges
• Need 24 x 7 insight and correlation between security events
Business Benefits
• Correlates SEIM, firewall logs, end point protection devices, servers, workstations and internal routing/security zones
• Lower risks due to ability to stay in front of attack vectors and methods
• Lower operational costs and reduced incidents due to ability to circumvent issues from occurring
Our Solution
• Stealth(analytics) predicts how malware will move and act if introduced inside the perimeter
• Connect to Unisys global MSS services to monitor all security events, assess threat intelligence and manage firewalls and end user devices
© 2016 Unisys Corporation | All rights reserved. 17
Business Enablement
Our Formula for Success
Defend the business — enable the business
Intelligent Defense That Adapts and Reconfigures
Using SDN and Unisys Stealth®
Efficient Delivery
Vertical Integration
Best-of-Breed
Technologies
Advanced Security
Solutions