17
Eric Hutto, Senior Vice President and President, Enterprise Solutions, Unisys Tom Patterson, Vice President, Security Solutions, Unisys Unisys Security Enabling Business Growth with Advanced Security Solutions

Unisys ©2015 Templates Now Available · Unisys ©2015 Templates Now Available Author: mcalliee Created Date: 11/10/2016 7:12:30 AM

  • Upload
    others

  • View
    0

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Unisys ©2015 Templates Now Available · Unisys ©2015 Templates Now Available Author: mcalliee Created Date: 11/10/2016 7:12:30 AM

Eric Hutto, Senior Vice President and President, Enterprise Solutions, UnisysTom Patterson, Vice President, Security Solutions, Unisys

Unisys SecurityEnabling Business Growth with Advanced Security Solutions

Page 2: Unisys ©2015 Templates Now Available · Unisys ©2015 Templates Now Available Author: mcalliee Created Date: 11/10/2016 7:12:30 AM

© 2016 Unisys Corporation | All rights reserved. 2

Unisys Security Snapshot

• Single go-to-market group

• Launched CISO Advisory Services

• Delivered globally through local engagement

• Accelerating micro-segmentation use and identity-based management

• Pragmatic solutions with predictable outcomes

Page 3: Unisys ©2015 Templates Now Available · Unisys ©2015 Templates Now Available Author: mcalliee Created Date: 11/10/2016 7:12:30 AM

© 2016 Unisys Corporation | All rights reserved. 3

Unisys Security Enables Business by…

• Making it easier for you to manage

• Making it work for you

• Making it extensible to your enterprise

Page 4: Unisys ©2015 Templates Now Available · Unisys ©2015 Templates Now Available Author: mcalliee Created Date: 11/10/2016 7:12:30 AM

© 2016 Unisys Corporation | All rights reserved.

Security Is Part of EverythingUsing Technology to Enable Business Growth

Page 5: Unisys ©2015 Templates Now Available · Unisys ©2015 Templates Now Available Author: mcalliee Created Date: 11/10/2016 7:12:30 AM

© 2016 Unisys Corporation | All rights reserved. 5

Why Unisys Now! Today’s Enterprises Have Changed

• Borders have dissolved — perimeters have become amorphous

• Shifting from perimeters to globally connected, driving competiveness

• No longer a question of protecting the perimeter — we must safeguard the data

• Budgets pushing data centers to the cloud, saving billions

• Unchecked threats to business are costing billions

• Business goals require you to move fast — to be part of the solution, not a “gate”

Page 6: Unisys ©2015 Templates Now Available · Unisys ©2015 Templates Now Available Author: mcalliee Created Date: 11/10/2016 7:12:30 AM

© 2016 Unisys Corporation | All rights reserved. 6

Our Clients’ Key Requests from Security

• Ability to lower costs by moving to the cloud

• Ability to integrate customers and suppliers into their extended enterprise

• Lower enterprise risk of becoming the next headline

• Protect the brand

• Lower the cost of operations

• Provide more security, transparent to users and operators

• Reduce complexity of maintaining numerous security profiles, across extended enterprise (which can encourage network vulnerabilities)

Page 7: Unisys ©2015 Templates Now Available · Unisys ©2015 Templates Now Available Author: mcalliee Created Date: 11/10/2016 7:12:30 AM

© 2016 Unisys Corporation | All rights reserved.

Why UnisysNew Enterprise and Business Requirements

Require New Security Thinking, Tools and Delivery

Page 8: Unisys ©2015 Templates Now Available · Unisys ©2015 Templates Now Available Author: mcalliee Created Date: 11/10/2016 7:12:30 AM

© 2016 Unisys Corporation | All rights reserved. 8

Unisys: Building Trust into Everything We Do

TargetedConsulting

• Risk Analysis & Remediation

• Architecture & Use Cases

• Create Communities

• Technical Services

• Business Services

AdvancedProducts

• Stealth(core)

• Stealth(cloud)

• Stealth(mobile)

• Stealth(identity)

• Stealth(analytics)

• Stealth(Q4)

EfficientManaged

• Managed SEIM

• Managed Devices

• Managed End User

• Managed Stealth

• Threat Intelligence

• Our/Your Prem

VerticalSolutions

• Safe Cities

• Medical Device Supply Chain

• Border Management

• Jail Management

• PCI Control

Lower Risk | Save Money | Increase Agility

Page 9: Unisys ©2015 Templates Now Available · Unisys ©2015 Templates Now Available Author: mcalliee Created Date: 11/10/2016 7:12:30 AM

© 2016 Unisys Corporation | All rights reserved. 9

Micro-Segmentation Is Changingthe Security Paradigm

Traditional

Page 10: Unisys ©2015 Templates Now Available · Unisys ©2015 Templates Now Available Author: mcalliee Created Date: 11/10/2016 7:12:30 AM

© 2016 Unisys Corporation | All rights reserved. 10

Action on Objectives

Commandand Control

Installation

Exploitation

Delivery

Weaponization

Reconnaissance

Why

Unisys Core Reference Architecture

HowMicro-segmentation

Micro-segmentation

End Point Security

Micro-segmentation Firewalls &VPN

Adaptive Security

Antimalware/AV

Privilege Escalation

Web Application Firewalls

Analytics

Email Security Vigilant User Web Content Security

DLP

SIEM

End Point Security

Secure Remote Access

Micro-segmentation

Vulnerability Assessment

Event Analytics

Patch Management

Micro-segmentation

Log Management

ID&AM

IDS/IPS

and With What

UnisysMSS

UnisysMSS

UnisysMSS

UnisysMSS

UnisysMSS

UnisysMSS

UnisysMSS

UnisysMSS

UnisysMSS

UnisysMSS

Unisys Analytics

Unisys Consulting

UnisysMSS

identity

Page 11: Unisys ©2015 Templates Now Available · Unisys ©2015 Templates Now Available Author: mcalliee Created Date: 11/10/2016 7:12:30 AM

© 2016 Unisys Corporation | All rights reserved.

Client StoriesUnisys Security

Consulting | Products | Managed Services | Solutions

Page 12: Unisys ©2015 Templates Now Available · Unisys ©2015 Templates Now Available Author: mcalliee Created Date: 11/10/2016 7:12:30 AM

© 2016 Unisys Corporation | All rights reserved. 12

European Financial InstitutionIncrease Compliance While Also Increasing Security

Business Problem

• Compliance/audit requirements increasing but are costly and difficult to maintain

• Increasing security around legacy applications are risky and costly

• Traditional security measures slow and disruptive

Business Benefits

• PCI audit scope significantly reduced

• Secure isolation of critical legacy applications through micro-segmentation

• Increased security through network/asset identity-based access

Our Solution

• Stealth(core) allowed client to achieve critical regulatory compliance/successful audit

• Stealth(core) isolated (cloaked) key legacy servers without modifications to critical applications

Page 13: Unisys ©2015 Templates Now Available · Unisys ©2015 Templates Now Available Author: mcalliee Created Date: 11/10/2016 7:12:30 AM

© 2016 Unisys Corporation | All rights reserved. 13

State GovernmentConsolidation to Save Taxpayer Money

Business Problem

• Consolidation of 52 agencies/data centers into a single shared environment

• Traditional security solutions costly and error-prone

• Insufficient state resources to manage

Business Benefits

• Flatten shared network (reduced complexity/cost)

• Reduce traditional CapEx/OpEx (i.e. firewalls, vLans)

• Improve long-term security audit success

Our Solution

• Stealth(core) allowed consolidation into shared asset environment and provided agency segmentation to meet specific regulatory audits

• Security Integration Services provided transition from “current state to future state”

• Managed Security Services (MSS) deployed to operate new environment

Page 14: Unisys ©2015 Templates Now Available · Unisys ©2015 Templates Now Available Author: mcalliee Created Date: 11/10/2016 7:12:30 AM

© 2016 Unisys Corporation | All rights reserved. 14

Leading Utility CompanyAdvanced Analytics and Micro-Segmentation Create Intelligent Network

Business Problem

• Ingest network data from existing SIEM tool and SOC to identify cyber threats before they occur

Business Benefits

• Identify network anomalies for both external and internal threats near-real time to save time and money and protect service to the citizen

Our Solution

• Machine learning and advanced analytics improved security posture when combined with Stealth(analytics)

• SIEM and data aggregators used event modeling to anticipate threats, creating an agile network

• Stealth(analytics) extended enterprise via mobile end points, BYOD and emergence of IoT/IoE, providing true sentience and cognizance of operational environment

Page 15: Unisys ©2015 Templates Now Available · Unisys ©2015 Templates Now Available Author: mcalliee Created Date: 11/10/2016 7:12:30 AM

© 2016 Unisys Corporation | All rights reserved. 15

Department of Defense OutreachImproving Community Communications to Support Mission Readiness

Business Problem

• Information was at risk of defacement, poison well, PII theft, Man-in-the-Middle attacks and redirection

Business Benefits

• Secure data and workload in cloud environment

• Allow safe access to staff and citizens

• Reduce attack surface

• Lower costs, shifting away from CapEx to efficient OpEx

Our Solution

• Stealth(cloud) segmented key content, control and database workloads to ensure mission integrity and data security

• Automated infrastructure security controls with encryption in motion for all traffic

• Simple transition of workloads via Stealth XDC with ability to handle peak loads efficiently

Page 16: Unisys ©2015 Templates Now Available · Unisys ©2015 Templates Now Available Author: mcalliee Created Date: 11/10/2016 7:12:30 AM

© 2016 Unisys Corporation | All rights reserved. 16

Energy CompanyProtect and Secure Access to Critical Processes and Assets

Business Problem

• Reach across many data sources to identify anomalies and security challenges

• Need 24 x 7 insight and correlation between security events

Business Benefits

• Correlates SEIM, firewall logs, end point protection devices, servers, workstations and internal routing/security zones

• Lower risks due to ability to stay in front of attack vectors and methods

• Lower operational costs and reduced incidents due to ability to circumvent issues from occurring

Our Solution

• Stealth(analytics) predicts how malware will move and act if introduced inside the perimeter

• Connect to Unisys global MSS services to monitor all security events, assess threat intelligence and manage firewalls and end user devices

Page 17: Unisys ©2015 Templates Now Available · Unisys ©2015 Templates Now Available Author: mcalliee Created Date: 11/10/2016 7:12:30 AM

© 2016 Unisys Corporation | All rights reserved. 17

Business Enablement

Our Formula for Success

Defend the business — enable the business

Intelligent Defense That Adapts and Reconfigures

Using SDN and Unisys Stealth®

Efficient Delivery

Vertical Integration

Best-of-Breed

Technologies

Advanced Security

Solutions