Upload
emc-forum-india
View
735
Download
1
Embed Size (px)
DESCRIPTION
Citation preview
Cloud Meets Big Data1
16-17 November 2011. Grand Hyatt - Mumbai
Aligning Security to Business
Aligning Security to Business
2© Copyright 2011 EMC Corporation. All rights reserved.
Cloud Meets Big Data2
17-18 November 2011. Grand Hyatt - Mumbai
Challenge: Expanding Identities
ContractorsPrivileged
UsersPrivileged
UsersPrivileged
UsersPrivileged
Users
BusinessAnalytics
EnterpriseApplications
Replica BackupDisk
Backup Tape
SharePointeRoom, etc.
File Server
DiskArrays
ProductionDatabaseInternal
Employees
Customer Entry Points
Channels
Customers
Partner Entry Points
Partners
Channels
Remote Employees
Channels
VPN
Apps/DB StorageFS/CMSNetworkEndpoint
3© Copyright 2011 EMC Corporation. All rights reserved.
Cloud Meets Big Data3
17-18 November 2011. Grand Hyatt - Mumbai
Partner Entry Points
Partners
Partner Entry Points
CustomersRemote Employees
VPN
Internal Employees
Business Analytics
Enterprise Apps
Replica
Production
Backup Disk
Backup Tape
Disk ArraysSharePointeRoom, etc.
File Server
ContractorsPrivileged
UsersPrivileged
UsersPrivileged
UsersPrivileged
Users
Challenge: Expanding Infrastructure
Cloud
Virtualization
Mobility
Apps/DB StorageFS/CMSNetworkEndpoint
4© Copyright 2011 EMC Corporation. All rights reserved.
Cloud Meets Big Data4
17-18 November 2011. Grand Hyatt - Mumbai
Internal Employees
Challenge: Increasing Threats
BusinessAnalytics
EnterpriseApplications
Replica BackupDisk
Backup Tape
SharePointeRoom, etc.
File Server
DiskArrays
ProductionDatabase
Privileged Users
ContractorsPrivileged
UsersPrivileged
Users
Partner Entry Points
Channels
Customers
Partner Entry Points
Partners
Channels
Remote Employees
Channels
VPN
Apps/DB StorageFS/CMSNetworkEndpoint
IP Sent to non trusted
userStolen IP
App, DB or Encryption Key
HackFraud
Stolen Credentials
Endpoint theft/loss
Network LeakEmail-IM-HTTP-
FTP-etc.
PrivilegedUser Breach
InappropriateAccess
Privileged UsersTapes lost or stolen
Data LeakVia USB/Print
Public Infrastructure Access Hack
UnintentionalDistribution
(Semi) Trusted User Misuse
Discarded disk exploited
5© Copyright 2011 EMC Corporation. All rights reserved.
Cloud Meets Big Data5
17-18 November 2011. Grand Hyatt - Mumbai
Dark CloudDark Cloud
StolenCards Shop
Fraud ForumDiscussion
MuleNetwork
PhishingAttacks
TrojansAttacks
StolenCredentialsDatabase
Financial Institutes
Cloud
The Dark Cloud
6© Copyright 2011 EMC Corporation. All rights reserved.
Cloud Meets Big Data6
17-18 November 2011. Grand Hyatt - Mumbai
Corporations are a new target for Cybercriminals
• Cybercriminals increasingly targeting corporations
• Value of extracted corporate resources is on the rise
• Social networks make it easier to launch targeted attacks
• Corporations required to harden their infrastructure
7© Copyright 2011 EMC Corporation. All rights reserved.
Cloud Meets Big Data7
17-18 November 2011. Grand Hyatt - Mumbai
Online Financial Fraud targeted at Financial Institutes
TechnicalInfrastructure
Cash OutFraudster
Identity Harvester
OperationalInfrastructure
CommunicationFraud forum / chat room
User Account
Tools Hosting Delivery Mules Drops Monetizing
Phishing
Trojans
Pharming
Physical Theft / Card Skimming
Other Social EngineeringTechniques
PurchaseOnline
MoneyTransfer throughInternet Banking
ATM withdrawal
IVR/MobileChannel WithdrawalMechanisms
8© Copyright 2011 EMC Corporation. All rights reserved.
Cloud Meets Big Data8
17-18 November 2011. Grand Hyatt - Mumbai
Question
Do you think Banks should implement a stronger form of authenticationTo identify online banking customers (other than user name & Password)when they log on and transact?
A. Yes
B. NO
C. I have no preference
9© Copyright 2011 EMC Corporation. All rights reserved.
Cloud Meets Big Data9
17-18 November 2011. Grand Hyatt - Mumbai
Consumers Want Stronger Security for Online Banking
Impact: Stronger Security Can Drive Portal Usage
10© Copyright 2011 EMC Corporation. All rights reserved.
Cloud Meets Big Data10
17-18 November 2011. Grand Hyatt - Mumbai
CSO/CIO Balancing Act
Brand Protection
Customer Services
Information Protection
Regulatory Controls
Globalization
CustomerProtection
Innovation
Productivity
Business EnablementBusiness Requirement
11© Copyright 2011 EMC Corporation. All rights reserved.
Cloud Meets Big Data11
17-18 November 2011. Grand Hyatt - Mumbai
Enable BlockAuthorized customersPartnersEmployees
HarmfulemployeesCriminalsSpies
Identities Information
Public SensitiveMarketing
EarningsProduct Info
HealthrecordsIP/ PIIFinancial
Infrastructure
Endpoints
Internet
Corporate networks
Applications
Databases and files
Storage
Managing Information Infrastructure Security
Ensure the right people have access to the right information
over a trusted infrastructure
in a system/process that is
easy and efficient to manage
12© Copyright 2011 EMC Corporation. All rights reserved.
Cloud Meets Big Data12
17-18 November 2011. Grand Hyatt - Mumbai
The RSA Approach Comprehensive Solutions
Identities Servers/AppsInformation
Enforce - Protect
Consoles
Map Monitor
Policy Aggregate
GRC Real Time Analytics
SIEM
Orchestrate - Monitor
Actionable
13© Copyright 2011 EMC Corporation. All rights reserved.
Cloud Meets Big Data13
17-18 November 2011. Grand Hyatt - Mumbai
Question
In the light of the RSA approach to Risk Management, do you feel?
A. Proactive solution is the way forward
B. Benefits seem marginal compared to the effort and cost
C. I am happy with the current setup
14© Copyright 2011 EMC Corporation. All rights reserved.
Cloud Meets Big Data14
17-18 November 2011. Grand Hyatt - Mumbai
Reserve Bank of India - Guidelines on Information security, Electronic Banking, Technology risk management and cyber frauds
• Information Technology Governance• Information Security• IT Operations• It Services Outsourcing• IS Audit• Cyber Frauds• Business Continuity Planning• Customer Education• Legal Issues
GRC
– Audit Management
– Policy Management
– User Awareness / communication tool
– Incident Management
Security Operations Centre
BS25599 compliance
Risk Based Authentication and Transaction Monitoring
Requirements Tools
15© Copyright 2011 EMC Corporation. All rights reserved.
Cloud Meets Big Data15
17-18 November 2011. Grand Hyatt - Mumbai
Customer Case Study
Deliver innovative online banking services to maintain industry-leading position. Combat growing threat of online fraud
Get Visibility of the network and have proactive action taken
Ensure Compliance as per regulator and corporate governance
BEFORENEEDS
Investing in customer banking protection with an online anti-fraud strategy
“…RSA Adaptive Authentication and RSA FraudAction have accelerated the route to market for our enhanced online banking security features…”
, SVP and CISO, Information Security
Group,
AFTER
15 MENU
Easy-to-implement , convenient risk-based authentication fraud down by 80%
24x7 monitoring and alerting on online/network security risks
Layered approach resulted in >60% reduction in phishing attacks and accelerated route to market with GRC
PROGRESSIVE BANK
16© Copyright 2011 EMC Corporation. All rights reserved.
Cloud Meets Big Data16
17-18 November 2011. Grand Hyatt - Mumbai
Information Security RSA
Objective 1:“Deliver innovative online banking services to maintain industry-leading position. Combat
growing threat of online fraud”
17© Copyright 2011 EMC Corporation. All rights reserved.
Cloud Meets Big Data17
17-18 November 2011. Grand Hyatt - Mumbai
The RSA Approach Comprehensive Solutions
Identities Servers/AppsInformation
2FA / IPV DLP
Layer 1Identities Servers/AppsInformation
Enforce - Protect
Multi factor authentication &RE DLP
18© Copyright 2011 EMC Corporation. All rights reserved.
Cloud Meets Big Data18
17-18 November 2011. Grand Hyatt - Mumbai
Protection with Multiple Layers and of Multiple
Channels
FraudAction Anti-Phishing
FraudAction Anti-Trojan
FraudAction Intelligence
Identity Verification
Adaptive Authentication Adaptive Authentication
for eCommerce Identity Verification
Adaptive Authentication
ACS Services Transaction
Monitoring Adaptive
Authentication for eCommerce
Identity Verification
Access Manager Adaptive Authentication Transaction Monitoring Identity Verification
19© Copyright 2011 EMC Corporation. All rights reserved.
Cloud Meets Big Data19
17-18 November 2011. Grand Hyatt - Mumbai
Protecting Fraud Channels using Multifactor Authentication
Protected Applications: Retail Net Banking and CardsFinancial Transa
ctions
Money Transfers Internal/NEFT /RTGS• Int
ernal
• External (TPT)
Visa Money TransferBill Payment Electronic Payment InterfaceThird Party Credit CardCredit Card• Aut
o Pay
• Enhance Credit Limit
• Get Loan / Cash
Support Financial
Add Payee/ Beneficiary• T
PT
• TPCC
Update Profile• A
ddress
• Mobile /Email
Stop ChequesRequest Cheque book
Non Fi
nanci
al
View StatementRequest Statement
Analyze Access Risk Create risk score for access to sensitive resources
Risk Engine
Adaptive AuthenticationTransactions, URLs, Logins, Web services
Challenge Questions
Web Channel
Mobile Channel
IVR
EPI Channel
Ecommerce
20© Copyright 2011 EMC Corporation. All rights reserved.
Cloud Meets Big Data20
17-18 November 2011. Grand Hyatt - Mumbai
RSA Adaptive Authentication with Transaction Monitoring
21© Copyright 2011 EMC Corporation. All rights reserved.
Cloud Meets Big Data21
17-18 November 2011. Grand Hyatt - Mumbai
Securing Identities and Access using MultifactorRSA Authentication and Access Solutions
Multi-Factor User AuthenticationStrong Authentication for access to sensitive resources
Analyze Access RiskCreate risk score for access to sensitive resources
RSA Adaptive Authentication
Resource(s)(logins, URLs, web services, etc.)
Low Risk
Username/Password
Higher Risk
RSA SecurID HW RSA SecurID SW On-Demand
Trusted External Users
Manage Trust RelationshipsEstablish and control trust between organizations
RSA Federated Identity Manager
SAMLAssertion
Multi-Access ControlControl access to multiple resources
RSA Access Manager
RSA Authentication Manager
22© Copyright 2011 EMC Corporation. All rights reserved.
Cloud Meets Big Data22
17-18 November 2011. Grand Hyatt - Mumbai
DLP Covers Your Entire Infrastructure
DISCOVER
MONITOR
EDUCATE
ENFORCE
DLP Network
DLP Datacenter DLP Endpoint
Email Web File shares Connected PCs
DLP Enterprise Manager
SharePoint Databases
Disconnected PCs
23© Copyright 2011 EMC Corporation. All rights reserved.
Cloud Meets Big Data23
17-18 November 2011. Grand Hyatt - Mumbai
RSA Risk Remediation Manager (RRM)
RSA DLP Datacenter
SharePoint
Databases
Endpoints
NAS/SAN
Agents
Temp Agents
Grid
Virtual Grid
File Servers
RSA DLPRRM
File Activity Tools
GRC Systems
Apply DRM
Encrypt
Delete / Shred
Change Permissions
Policy Exception
Business Users
Discover Sensitive Data
Manage Remediation Workflow
Apply Controls
24© Copyright 2011 EMC Corporation. All rights reserved.
Cloud Meets Big Data24
17-18 November 2011. Grand Hyatt - Mumbai
RSA Data Loss Prevention Suite
24
Enforce
Allow, Notify, Block, Encrypt
Enforce
Allow, Justify, Block on Copy, Save As, Print, USB, Burn, etc.
Remediate
Delete, Move, Quarantine
Discover
Local drives, PST files, Office files, 300+ file types
Monitor
Email, webmail, IM/Chat, FTP, HTTP/S, TCP/IP
Discover
File shares, SharePoint sites, Databases, SAN/NAS
DLP Enterprise Manager
DLP Datacenter DLP Network DLP Endpoint
Unified Policy Mgmt & Enforcement
Incident Workflow Dashboard & Reporting
User & System Administration
eDRM (e.g. RMS) Encryption Access Controls
25© Copyright 2011 EMC Corporation. All rights reserved.
Cloud Meets Big Data25
17-18 November 2011. Grand Hyatt - Mumbai
Information Security RSA
Objective 2:“Get Visibility of the network and have proactive action taken”
26© Copyright 2011 EMC Corporation. All rights reserved.
Cloud Meets Big Data26
17-18 November 2011. Grand Hyatt - Mumbai
The RSA Approach Comprehensive Solutions
Layer 1
Layer 2
Enforce - Protect
Consoles
Map Monitor
Aggregate
Orchestrate - Monitor
Identities Servers/AppsInformation
Enforce - Protect
Multifactor Authentication &RE DLP
27© Copyright 2011 EMC Corporation. All rights reserved.
Cloud Meets Big Data27
17-18 November 2011. Grand Hyatt - Mumbai
How SIEM Enhances Security Operations
Automatic Processes(System)
Incident Management(Analyst)
asset, exposure, incident, vulnerability reportsWeb SOC monitorWeb SOC monitor
Incident Big Board
Security Operations Dashboard
Risk and Operations Efficiency Monitoring(Manager)
configuration management tools
scanners
patch info
bulk imports
applicationsserversfirewalls intrusion detection
events
Asset DBAsset DB
Vulnerabiltiy KnowledgeBaseVulnerabiltiy KnowledgeBase
Log RepositoryLog Repository
Workflow Management
Workflow Management
open, reassign, add logs, notate, escalate, close incident
NotificationNotification
correlation, alerting, auto assignment, prioritization, escalation
CVEs
28© Copyright 2011 EMC Corporation. All rights reserved.
Cloud Meets Big Data28
17-18 November 2011. Grand Hyatt - Mumbai
RSA Security Incident Management in Action
Events occur on critical systems indicating a potential security breach.1
RSA enVision
enVision collects the events for immediate triage and reporting.2
RSA Connector Framework
RSA Archer Incident Management
Based on Event Rules, an Alert is triggered and security administrators are notified. The RSA Connector Framework automatically creates an Incident in RSA Archer Incident Management associating the specific Event data to the Incident.
3
The CISO has complete visibility through the entire process via dashboards and reporting.5
DevicesApplicationsBusinessProcesses
BusinessHierarchy Product/Services FacilitiesInformation
RSA Archer Enterprise Management
Security Administrators use the Incident Management capabilities in RSA Archer along with information from the RSA Archer Enterprise Management to assess the situation. An investigation is initiated and the incident is tracked and resolved.
4
29© Copyright 2011 EMC Corporation. All rights reserved.
Cloud Meets Big Data29
17-18 November 2011. Grand Hyatt - Mumbai
WebFarm
FWs IDSs Apps Scanners
IPDBAssetDB
LogsVAReports
Real-time Correlation/Base-lining
Events
False IDS Alert Suppression
EventTrace
EE
AssetVulnerabilities
Auto-Escalation
Open Task
Close Task
TicketingSystem
Escalate Task
Task TriageAlerter
VulnerabilityKB
Task DB
VAMReporting
Asset ReportsExposure ReportsIncident ReportsVulnerability KB Reports
Web SOC Monitor
1. Incident\Risk Big Board2. SOC Efficiency Monitor
BulkImports
CMDBs& ConfigManagers
Discovered Changes
ConfigActions
Auto-assignmentAuto-prioritizationAuto-escalation
FeedbackLoop
EE
EE
ReassignAnnotate
Collaborative Incident Management
EventTrace
Watchlists
RSA enVision Enterprise/Security Operations Model
Log Collection
ReportingCorrelation
30© Copyright 2011 EMC Corporation. All rights reserved.
Cloud Meets Big Data30
17-18 November 2011. Grand Hyatt - Mumbai
RSA enVision Deployment…to a distributed, enterprise-wide architecture
Cisco IPSOracleFinancial
Storage Device
Trend MicroAntivirus
Cisco IPSWindowsWorkstation
NetscreenFirewall
WindowsServer
OracleFinancial
Storage Device
Manage Manage Manage Manage
Analyze Analyze
Collect Collect Collect Collect Collect Collect Collect Collect Collect CollectRemotely
WindowsServers
ScheduledReportsRealtime
Correlation
Ad HocReports
RealtimeAlerting
RealtimeAlerting
eMailAlerts
Stockholm
Mexico India Europe China
Collect Remotely
Local Collection with Global Analysis
Fine Grain Role-Based Access Control
31© Copyright 2011 EMC Corporation. All rights reserved.
Cloud Meets Big Data31
17-18 November 2011. Grand Hyatt - Mumbai
Information Security RSA
Objective 3:“Ensure Compliance as per regulator and corporate governance”
32© Copyright 2011 EMC Corporation. All rights reserved.
Cloud Meets Big Data32
17-18 November 2011. Grand Hyatt - Mumbai
The RSA Approach Comprehensive Solutions
Layer 1
Layer 2
Layer 3
Identities Servers/AppsInformation
Enforce - Protect
Consoles
Map Monitor
Policy Aggregate
RSA Archer (eGRC)
Orchestrate - Monitor
Real Time Analytics
SIEM(Netwitness)
Panorama(Envision)
33© Copyright 2011 EMC Corporation. All rights reserved.
Cloud Meets Big Data33
17-18 November 2011. Grand Hyatt - Mumbai
Supports complete incident lifecycle management from identification to resolution.IncidentsInvestigations
RSA enVision
The Security Incident Management Solution
Incident Events
DevicesApplicationsBusinessProcesses
BusinessHierarchy Product/Services Facilities
Brings business context of asset information to Incident Management for prioritization and reporting events in the context of IT GRC.
Information
Infrastructure Audit Trail
Event Database Event Rules
enV
isio
n
Co
llec
tor
sAlertsReporting
Collects and manages event data; Identifies critical issues from log data.
RSA Connector Framework
RSA Archer Incident Management
RSA Archer Enterprise Management
Seamlessly integrates SEIM infrastructure and GRC platform.
Network Forensic Analysis• Automated Malware analysis
and prioritization • Network Session Modeling• Network Forensic Store
34© Copyright 2011 EMC Corporation. All rights reserved.
Cloud Meets Big Data34
17-18 November 2011. Grand Hyatt - Mumbai
Introducing the NetWitness Network Security Analysis Platform
Automated Malware Analysis and Prioritization
Automated Threat Reporting, Alerting and IntegrationFreeform Analytics for Investigations and Real-time Answers
Revolutionary Visualization of Content for Rapid Review
35© Copyright 2011 EMC Corporation. All rights reserved.
Cloud Meets Big Data35
17-18 November 2011. Grand Hyatt - Mumbai
RSA Incident Management• Industry leading Security Incident and Event
Management (SIEM) technology for the automated identification and escalation of high priority security incidents
• Industry leading Incident Management solution that can handle proactive incidents no matter how they are detected giving complete flexibility in managing incident workflow using Panorama reporting into GRC
• A GRC platform that brings unprecedented business context to Incident Management processes and incorporates security incidents into wider enterprise risk management and compliance reporting and actionable decisions.Devices
Applications
Information
BusinessProcesses
36© Copyright 2011 EMC Corporation. All rights reserved.
Cloud Meets Big Data36
17-18 November 2011. Grand Hyatt - Mumbai
Creating Actionable Intel. from Data Overload
Incidents Feed
Envision
ITGRC: Data Governance , Risk, Incident BCM & Compliance Management
Compliance High
Access Extreme
Vulnerabilities ExtremeVA and ThreatManagement
Asset Management (CMDB)
ExceptionManagement
• Control Exception Management• Documented ExceptionsMis-Configurations High
User AccessManagement
• User Groups• Roles and Permissions
DLP Violations Feed
DLP
Asset Feed
Information Assets
Asset Feed
Assets Classification
Incidents Priority
Technical ControlsProcess Controls
Self Assessment
ISO 27001 Assessment
Process Control Testing
BS25999 Assessment
PCI DSS SAQ
RBI Compliance Assessment
ISO 27001 Assessment
BS25999 Assessment
Inputs and Process Automation Layer
•Nessus, Qualys, Veracode, External threat feeds etc.
Other Incidents
BCM Incidents
Physical SecurityIncidents
Policy Comp. Assessment
37© Copyright 2011 EMC Corporation. All rights reserved.
Cloud Meets Big Data37
17-18 November 2011. Grand Hyatt - Mumbai
GRC Processes Automation Framework
Archer
Enterprise Management• Targets of Evaluation: Business
Processes, Business Units, Information Assets,
• Target of Reporting: Business Hierarchy:
• Asset Classification• Policy Management• Risk Register• Identification of the Risk from various
sources
Governance• Holistic GRC Reporting• Dashboard: Risk & Compliance
• Key Perf. Indicators (KPI)• Key Risks Indicators (KRI)• Key Controls
• Performance Mgmt• Process Performance• Governance (e.g. coverage)• Performance & Quality Reviews
Assessments (Risk, Compliance, Audit, BCM, and Vendor)• Audit Management• Audit Programs• Risk Assessments• Compliance Assessments• Vendor Management• BCM
Monitoring• Frauds• Monitoring of Compliance,
Vulnerabilities and Threats• Monitoring of the KRI, KPIs• Findings Management• Remediation Plan Management• Exception Management• Global SOC• Global CERT
GRC Portal• Corporate Communication• Content Delivery• Compliance, Risk , BCM and
Security Awareness, Trainings, Surveys
• Website (single entry point)• Incidents Reporting:
• Compliance, • Security/Loss event
38© Copyright 2011 EMC Corporation. All rights reserved.
Cloud Meets Big Data38
17-18 November 2011. Grand Hyatt - Mumbai
With RSA’s Security Incident Management Solution you can:
Enabling Effective Security Incident Management
• Collect security relevant events across your infrastructure
• Prioritize incidents based upon business context
• Manage incidents and investigations proactively to combat APT
• Report on your security and compliance posture
39© Copyright 2011 EMC Corporation. All rights reserved.
Cloud Meets Big Data39
17-18 November 2011. Grand Hyatt - Mumbai
Conclusion: End-to-End Layered Protection is required. “A Lock on the Door” is Not Enough
On-Demand
Internal SOC
Enterprise Governance Risk and Compliance
40© Copyright 2011 EMC Corporation. All rights reserved.
Cloud Meets Big Data40
17-18 November 2011. Grand Hyatt - Mumbai
RSA overall solution implementation
Pan
ora
ma Investigations
Netwitness
AVAuth
WAF DLP
ADWLAN
EP
URL
FW
IPS
Data Enhancement
Even
t A
ggre
gati
on
Loca
tion
Identity
Div
ision
Departm
ent
Data
Asse
t Valu
e
Geo In
foR
egula
tion SOC
Th
reats
Incid
en
ts
Policie
s
Archer
HR
Legal
Eng.Business
ReportingenVision
41© Copyright 2011 EMC Corporation. All rights reserved.
Cloud Meets Big Data41
17-18 November 2011. Grand Hyatt - Mumbai
Cloud Compliance Architecture
42© Copyright 2011 EMC Corporation. All rights reserved.
Cloud Meets Big Data42
17-18 November 2011. Grand Hyatt - Mumbai
Positive Business Outcome
The objectives of the customer were met with a cost effective Integrated Solution
• Increase customer confidence in online transactions (30% increase YoY)
• Reduce the Fraud and AntiPhishing / Anti Trojan for customers (>60%)
• Provide 24X7 Visibility of the Network and report critical incidents
• Proactive monitoring to save against APT’s
• Automated Compliance Reporting meeting Corporate and regulations
43© Copyright 2011 EMC Corporation. All rights reserved.
Cloud Meets Big Data43
17-18 November 2011. Grand Hyatt - Mumbai
Summary
Key Take aways:
A breach/Incident is inevitable the key is to reduce the “Window of Vulnerability”
Use technology as a Business Enhancer rather than a cost
Your technology provider is a Partner not a Vendor choose Wisely
Risk Management is Strategic not Tactical - Scalable, Adaptive , Layered
RSA –EMC Can be that Partner
44© Copyright 2011 EMC Corporation. All rights reserved.
Cloud Meets Big Data44
17-18 November 2011. Grand Hyatt - Mumbai
Question
With the presentation as a backdrop, what course would to take?
A. I would go ahead with an Integrated solution
B. I would go ahead with a Best of Breed Solution
C. I would go ahead with a Best for Need Solution
45© Copyright 2011 EMC Corporation. All rights reserved.
Cloud Meets Big Data45
17-18 November 2011. Grand Hyatt - Mumbai
THANK YOUTHANK YOU