Network Computing is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

EMC's Long Road to Security

The security features EMC began integrating into its Symmetrix systems this week represent the first step in a long process that will likely take years. Eventually, though, security will permeate all of EMC's storage products.

That's the word from Mark Lewis, EMC's chief development officer. Of all the acquired technologies EMC is integrating into its core products, security features from RSA and Network Intelligence are near -- if not at -- the top of the list. (See EMC Pockets Network Intelligence and EMC Secures RSA for $2.1B.) But Lewis says the process will take far longer than it took for security to become such a high customer priority.

"The data security market is a market that a couple of years ago customers werent talking about, and all of a sudden it became top of mind," Lewis told Byte and Switch . "It went from ‘I don’t care' to 'This is my No. 1 priority’ overnight."

The integration certainly won't happen overnight, though. EMC began this week at the RSA Conference in San Francisco by announcing Symmetrix Service Credential, an RSA technology for authorizing users. (See EMC Kicks Off With Security and So Long, Security Silos .) EMC also added audit logs for tracking management activities and enhanced its disk erasure technology. But there are still a lot more RSA features waiting to be integrated.

"It's going to roll out over time," Lewis says. "You'll see this quarter on out, products adopting more security capabilities. We’ll have common security platform pieces for sign on, authentication, authorization, embedding, encryption, and -- more importantly -- global key management. It’s something that will roll out in quarters and it will literally be years before you look at ubiquity for encryption in every device and every disk drive and every element."

  • 1