Security Threats & Trends Arvind Sahay, Enterprise Manager India, McAfee
|
|
- Ophelia Ferguson
- 5 years ago
- Views:
Transcription
1 7/26/2005 Security Threats & Trends Arvind Sahay, Enterprise Manager India, McAfee
2 7/26/2005 Page 2 Outline Some Threats Current Trends Corporate Dilemma Challenges Security solutions available Q&A
3 7/26/2005 Page 3 Where we are TODAY 20 billion s,60 billion by million net users 25% of all mail are spam 98% PC s have PUP, Adware, Spyware Almost all vulnerabilities result in an exploit Global Spread of outbreaks in less than a few minutes Sources: IDC, NUA, Global Internet Geography
4 7/26/2005 Page 4 Malware Impact Costs Last 6 Years Computer Economics Inc., a Carlsbad, California-based consulting firm, estimates that cleanup, lost revenue, labor, hardware and software costs for the most damaging malware attacks for the past six years were: Malware United States Worldwide 1999 Melissa $570 million $1.5 billion 2000 Love Bug $3.33 billion $8.75 billion 2001 Code Red $1.05 billion $2.75 billion 2002 Klez $285 million $750 million 2003 SoBig.F $950 million $2.5 billion 2004 MyDoom $1.52 billion $4 billion 2004 Sasser N/A $400 - $500 million (estimate) Note: All costs are USD costs are projected
5 7/26/2005 Page 5 Threats to future technologies Possibility of Threats chtml /SMS Serial Open OS Java IrDA Increasing threats USB XHTML Increasing threats Bluetooth Increasing threats Standardization of platforms (CPU,OS) Plug-in Flash card Script Wireless LAN Open API Int l roaming
6 7/26/2005 Page 6 Window of Vulnerability going forward Time to deploy counter measures Time needed to infect 10,000 devices (in Hrs) Device Population, in millions ,000 3,000 2,000 1,000 0 Melissa Loveletter Kournikova Code Red Nimda Goner Klez Window of Vulnerability What s Next Source: McAfee AVERT
7 Mobile threats Malware in the palm of your hand PDAs and other mobile devices Portable threat to corporate networks The floppy disk of the new millennium Wireless networking Prone b G3 WIFI Bluetooth
8 Trends in IT security 7/26/2005
9 7/26/2005 Page 9 Trend #1: The Vanishing Perimeter Web Traffic customers, partners, employees Traffic Applications/Web Services Traffic partners, customers, internal Remote user VPN Traffic remote and mobile users Internal security threat Contractors/disgruntled employees
10 7/26/2005 Page 10 Trend #2: Security Breaches Happen! Vulnerability management problem gets worse Patch and Pray is not a solution The threat is both internal and external Network Computing Reader Poll April 2004
11 7/26/2005 Page 11 Trend #3: Evolving threats impact networks and systems Encrypted Attacks DoS and DDoS Attacks Known Exploits Worms Blended Attacks Mass- Mailers P2P Traffic Networks Switches, Routers, Firewalls, VPNs Zero-Day Attacks Share Hoppers Systems PCs, Servers, Mobile Devices P2P Applications Inappropriate Content Buffer Overflows Blended Attacks Buffer Overflows Database Attacks Application Attacks
12 7/26/2005 Page 12 Trend #4: Potential future threats heighten security and business risk Today Future Globally Propagating Blended Threats Traditional Viruses Routing Infrastructure Next Generation User Devices
13 7/26/2005 Page 13 Trend # 5 Worldwide Security Services Revenues Security Service Revenue ($M) $25,000 $20,000 $15,000 $10,000 $5,000 $ Revenues ($M) $9,109 $10,826 $12,984 $15,801 $19,383 $23,540 Managed Security Services 18% Source: IDC 2003
14 7/26/2005 Page 14 Trend # 6 Vendors expanding their solution portfolio Microsoft moves into security space by acquiring Giant, Sybari McAfee acquires Intrushield, Entercept, Deersoft, Foundstone Symantec acquires brightmail, Veritas Juniper acquires Netscreen 3Com acquires Tipping point List just goes on and on and on
15 7/26/2005 Page 15 Our Time to React Is Compressed.Or Non-Existent
16 7/26/2005 Page 16 Shorter Time Window From Patch to First Attack Sasser Apr. 13, 2004 Patch MS Days April MSBlaster Oct. 16, 2003 Patch MS Days Aug Jul. 24, 2002 Patch MS Slammer 185 Days Jan Oct. 17, 2000 Patch MS Nimda 336 Days Sept
17 7/26/2005 Page 17 Key User Requirements Proactive Protection without update Risk mitigation/remediation Comprehensive Changing threat environment Malware and vulnerabilities Network and system security Manageable Knowledge for policy enforcement and compliance Leverage people, infrastructure, processes Scale to changing needs
18 Corporate Dilemma 7/26/2005
19 7/26/2005 Page 19 Dilemma What should the base layers to be protected in a typical Corporate environment How to assess the risk environment How to take care of reactive AV How to manage patches and compliance What to select Best of breed or End to End solutions What is better Managed Solutions or Self Managed Multipurpose devices or Purpose built How to sustain levels of security
20 7/26/2005 Page 20 The various layers in a enterprise Policy Enforcement & Remediation Host Intrusion Prevention Anti-Virus Network Intrusion Prevention Anti-Spam/ Content Filtering Forensic Analysis
21 7/26/2005 Page 21 The Dynamic Risk Environment Assets Vulnerabilities Increasing numbers Critical vs. non-critical Shorter time to public exploit Vulnerabilities Risk Assets Known vs. unknown Critical vs. noncritical Trusted vs. untrusted Threats Malware Known vs. unknown Targeted vs. random Fast vs. slow Threats Risk Reduce complexity Improve efficiency reduce costs Manage compliance
22 7/26/2005 Page 22 The current issues with Traditional Anti-Virus Traditional Anti-Virus Reactive approach Creates Window of Vulnerability Not Effective against Newer Security Risks High TCO for Outbreak Response
23 7/26/2005 Page 23 Traditional Anti-Virus Is Not Effective against Newer Security Risks Traditional Traditional Malware Malware Blended Blended Attacks Attacks Social Social Engineering Engineering Peer-to- Peer-to- Peer Peer Mass- Mass- Mailers Mailers Unwanted Unwanted Programs Programs Share Share Hoppers Hoppers New Security Threats Network Network Attacks Attacks Buffer Buffer Overflows Overflows!!!
24 7/26/2005 Page 24 Patch Management a major challenge An administrative nightmare More than 4000 vulnerabilities last year, so that many patches Windows, Linux, Unix, Database patches Patch management tools cannot automate your decision to patch Agent-less tools overload the network Agent-based overload the administrator
25 7/26/2005 Page 25 The reality: Patch and Pray Intel applied 2.4 million patches to its own network last year. One security officer scanned 470 machines with patch management software, which told him to apply 8,000 patches. Researching each of the 4,200 vulnerabilities published by CERT last year for 10 minutes would require 700 hours. A company with 100,000 IP addresses is subject to 2.3 million vulnerability probes per day. Sources: Intel white paper, CERT, ICSA Labs
26 Single Console 7/26/2005 Page 26
27 The Challenge to do it effectively 7/26/2005
28 7/26/2005 Page 28 Challenges How to it Effectively Recognize the Jigsaw Analyse the Assets Leverage on MSSP Vendor selection / technology Scalability Keeping the security levels high
29 7/26/2005 Page 29 Recognize the jig-saw puzzle Network Firewall VPNs Wireless Application Security Smart Cards, Biometrics Desktop Firewall Anti-Virus (Gateway / Server / Workstation / ) Policy Management Forensics Anti-Spam Access Control (SSO) SSL / SSH Web Content Filtering, SPAM Intrusion Detection & Protection PKI Server Encryption Fault Identification, Performance Measurement & Analysis Network, Host, Application, Database
30 7/26/2005 Page 30 A Priority-Based Approach to Risk Management Focus first on the most critical assets RISK: Correlate the known presence of a vulnerability.on a business-critical asset.with a real-time threat exploiting that vulnerability Automate the process to effectively streamline and create efficiencies
31 7/26/2005 Page 31 Dynamic Risk Management and Mitigation Optimizing Business Availability and Return on Security Investment: 1. Dynamic assessment and prioritization 2. Proactive remediation with intrusion prevention systems 3. Scalable security policy enforcement and compliance
32 7/26/2005 Page 32 Business Challenge for Security Professionals: Security Business Availability What are my critical assets? Which investments optimize business availability? Business Risk Investment Can I better manage security investments? How can I better deploy resources against core business priorities? Are we compliant?
33 7/26/2005 Page 33 Managed Services Environment CAPEX/OPEX Crunch Maturing Markets SP Environment Price Erosion Leverage on MSSP > Capitalize on coverage > Uniform implementation across geo s > On core competency > Lower Capex > Leverage small security teams Quick new product introduction > Shorten productization cycles > Quick time to revenue Capitalize on industry trends > Security & Managed Services in demand > Improved outsourcing acceptance
34 7/26/2005 Page 34 What would a corporate want? Scalability Architecture elegance Small -> expand Work with other technologies Economics 2-year pay back Possible wide-spread deployment Small to large deployments Respected/tested/approved technology Proven MSSP working model Management Provisioning, configuration, troubleshooting/fault management Real-time remote access Reporting References Done for other similar organisations May need to do a small free deployment
35 7/26/2005 Page 35 What more does the Corporate want? Vendor Stability Financial strength Performance against industry reference metrics Roadmap for the future Protection from Obsolesence Vision and the ability to deliver consistently
36 7/26/2005 Page 36 Solutions Available Today Vulnerability Management and Assessment Perimeter security Gateway security Server and Application security Host based security Desktop security
37 7/26/2005 Page 37 A Typical Enterprise Network and System Protection Technologies Perimeter Firewall Critical Systems and Users
38 Q&A 7/26/2005 Page 38
IBM Global Technology Services Provide around-the-clock expertise and protect against Internet threats.
IBM Global Technology Services Provide around-the-clock expertise and protect against Internet threats. Enhancing cost to serve and pricing maturity Keeping up with quickly evolving ` Internet threats
More informationDefense-in-Depth Against Malicious Software. Speaker name Title Group Microsoft Corporation
Defense-in-Depth Against Malicious Software Speaker name Title Group Microsoft Corporation Agenda Understanding the Characteristics of Malicious Software Malware Defense-in-Depth Malware Defense for Client
More informationCisco Self Defending Network
Cisco Self Defending Network Integrated Network Security George Chopin Security Business Development Manager, CISSP 2003, Cisco Systems, Inc. All rights reserved. 1 The Network as a Strategic Asset Corporate
More informationWhite Paper April McAfee Protection-in-Depth. The Risk Management Lifecycle Protecting Critical Business Assets.
White Paper April 2005 McAfee Protection-in-Depth The Risk Management Lifecycle Protecting Critical Business Assets Protecting Critical Business Assets 2 Table of Contents Overview 3 Diagram (10 Step Lifecycle)
More informationChanging face of endpoint security
Changing face of endpoint security S A N T H O S H S R I N I V A S A N C I S S P, C I S M, C R I S C, C E H, C I S A, G S L C, C G E I T D I R E C T O R S H A R E D S E R V I C E S, H C L T E C H N O L
More informationSymantec Network Access Control Starter Edition
Simplified endpoint compliance Overview makes it easy to begin implementing a network access control solution. It offers a subset of Symantec Network Access Control functionality that can be completely
More informationData Sheet: Endpoint Security Symantec Network Access Control Starter Edition Simplified endpoint enforcement
Simplified endpoint enforcement Overview makes it easy to begin implementing a network access control solution. It offers a subset of Symantec Network Access Control functionality that can be completely
More informationPutting Trust Into The Network Securing Your Network Through Trusted Access Control
Putting Trust Into The Network Securing Your Network Through Trusted Access Control Steve Hanna, Juniper Networks Co-Chair, Trusted Network Connect Sub Group of Trusted Computing Group ACSAC December 2006
More informationSymantec Network Access Control Starter Edition
Symantec Network Access Control Starter Edition Simplified endpoint compliance Overview makes it easy to begin implementing a network access control solution. It offers a subset of Symantec Network Access
More informationSymantec Network Access Control Starter Edition
Simplified endpoint compliance Overview makes it easy to begin implementing a network access control solution. It offers a subset of Symantec Network Access Control functionality that can be completely
More informationCisco ASA 5500 Series IPS Edition for the Enterprise
Cisco ASA 5500 Series IPS Edition for the Enterprise Attacks on critical information assets and infrastructure can seriously degrade an organization s ability to do business. The most effective risk mitigation
More informationSymantec Client Security. Integrated protection for network and remote clients.
Symantec Client Security Integrated protection for network and remote clients. Complex Internet threats require comprehensive security. Today's complex threats require comprehensive security solutions
More informationFuture-ready security for small and mid-size enterprises
First line of defense for your network Quick Heal Terminator (UTM) (Unified Threat Management Solution) Data Sheet Future-ready security for small and mid-size enterprises Quick Heal Terminator is a high-performance,
More informationGet BitDefender Client Security 2 Years 30 PCs software suite ]
Get BitDefender Client Security 2 Years 30 PCs software suite ] Description: The foundation of business security The security requirements for any new or existing company no matter how large or small -
More informationData Sheet: Endpoint Security Symantec Multi-tier Protection Trusted protection for endpoints and messaging environments
Trusted protection for endpoints and messaging environments Overview creates a protected endpoint and messaging environment that is secure against today s complex data loss, malware, and spam threats controlling
More informationCCISO Blueprint v1. EC-Council
CCISO Blueprint v1 EC-Council Categories Topics Covered Weightage 1. Governance (Policy, Legal, & Compliance) & Risk Management 1.1 Define, implement, manage and maintain an information security governance
More informationWhite Paper February McAfee Policy Enforcer. Securing your endpoints for network access with McAfee Policy Enforcer.
White Paper February 2006 McAfee Policy Enforcer Securing your endpoints for network access with McAfee Policy Enforcer White Paper February 2006 Page 2 Table of Contents Executive Summary 3 Enforcing
More informationReviewer s guide. PureMessage for Windows/Exchange Product tour
Reviewer s guide PureMessage for Windows/Exchange Product tour reviewer s guide: sophos nac advanced 2 welcome WELCOME Welcome to the reviewer s guide for NAC Advanced. The guide provides a review of the
More informationUnderstanding Network Access Control: What it means for your enterprise
Understanding Network Access Control: What it means for your enterprise Network access control is a term that is highly used, but not clearly defined. By understanding the reasons for pursuing a network
More informationAT&T Endpoint Security
AT&T Endpoint Security November 2016 Security Drivers Market Drivers Online business 24 x 7, Always on Globalization Virtual Enterprise Business Process / IT Alignment Financial Drivers CapEx / OpEx Reduction
More informationSeqrite Endpoint Security
Enterprise Security Solutions by Quick Heal Integrated enterprise security and unified endpoint management console Enterprise Suite Edition Product Highlights Innovative endpoint security that prevents
More informationNebraska CERT Conference
Nebraska CERT Conference Security Methodology / Incident Response Patrick Hanrion Security Center of Excellence Sr. Security Consultant Agenda Security Methodology Security Enabled Business Framework methodology
More informationCIH
mitigating at host level, 23 25 at network level, 25 26 Morris worm, characteristics of, 18 Nimda worm, characteristics of, 20 22 replacement login, example of, 17 signatures. See signatures SQL Slammer
More informationA Unified Threat Defense: The Need for Security Convergence
A Unified Threat Defense: The Need for Security Convergence Udom Limmeechokchai, Senior system Engineer Cisco Systems November, 2005 1 Agenda Evolving Network Security Challenges META Group White Paper
More informationCA Security Management
CA Security CA Security CA Security In today s business environment, security remains one of the most pressing IT concerns. Most organizations are struggling to protect an increasing amount of disparate
More informationChristopher Covert. Principal Product Manager Enterprise Solutions Group. Copyright 2016 Symantec Endpoint Protection Cloud
Christopher Covert Principal Product Manager Enterprise Solutions Group Copyright 2016 Symantec Endpoint Protection Cloud THE PROMISE OF CLOUD COMPUTING We re all moving from challenges like these Large
More informationInternet Threats Today and Tomorrow
Internet Threats Today and Tomorrow Page 2 Agenda Intro about AVERT Threat count and growth rate Threats using the known system vulnerabilities Noteworthy viruses overview Threats during 2004 and beyond
More informationCA Host-Based Intrusion Prevention System r8
PRODUCT BRIEF: CA HOST-BASED INTRUSION PREVENTION SYSTEM CA Host-Based Intrusion Prevention System r8 CA HOST-BASED INTRUSION PREVENTION SYSTEM (CA HIPS) BLENDS A STAND-ALONE FIREWALL WITH INTRUSION DETECTION
More informationThe SANS Institute Top 20 Critical Security Controls. Compliance Guide
The SANS Institute Top 20 Critical Security Controls Compliance Guide February 2014 The Need for a Risk-Based Approach A common factor across many recent security breaches is that the targeted enterprise
More informationInternet Scanner 7.0 Service Pack 2 Frequently Asked Questions
Frequently Asked Questions Internet Scanner 7.0 Service Pack 2 Frequently Asked Questions April 2005 6303 Barfield Road Atlanta, GA 30328 Tel: 404.236.2600 Fax: 404.236.2626 Internet Security Systems (ISS)
More informationReinvent Your 2013 Security Management Strategy
Reinvent Your 2013 Security Management Strategy Laurent Boutet 18 septembre 2013 Phone:+33 6 25 34 12 01 Email:laurent.boutet@skyboxsecurity.com www.skyboxsecurity.com What are Your Key Objectives for
More informationetrust Antivirus Release 7.1
D A T A S H E E T etrust Antivirus Release 7.1 etrust Antivirus provides superior protection from the perimeter to the PDA against today s most prevalent security threat viruses. It eliminates virus infections,
More informationSteelGate Overview. Manage perimeter security and network traffic to ensure operational efficiency, and optimal Quality of Service (QoS)
Internet Communications Made Safe SteelGate Overview SteelGate Overview SteelGate is a high-performance VPN firewall appliance that Prevent Eliminate threats & attacks at the perimeter Stop unauthorized
More informationSYMANTEC: SECURITY ADVISORY SERVICES. Symantec Security Advisory Services The World Leader in Information Security
SYMANTEC: SECURITY ADVISORY SERVICES Symantec Security Advisory Services The World Leader in Information Security Knowledge, as the saying goes, is power. At Symantec we couldn t agree more. And when it
More informationCombating Today s Cyber Threats Inside Look at McAfee s Security
Combating Today s Cyber Threats Inside Look at McAfee s Security Charles Ross, Director Sales Engineering Public Sector 2008 McAfee, Inc. Agenda Today s Threat Landscape McAfee s Security Challenges McAfee
More informationNetDefend Firewall UTM Services
NetDefend Firewall UTM Services Unified Threat Management D-Link NetDefend UTM firewalls (DFL-260/860/1660/2560/2560G) integrate an Intrusion Prevention System (IPS), gateway AntiVirus (AV), and Web Content
More informationDeployment of security devices can result in significant financial savings from reduction or redirection of IT staff resources needed to deploy,
SECURITY APPLIANCES True Security Appliances reduce the complexity and increase the reliability of network security, while enhancing control, efficiency, and overall functionality for enterprises of all
More informationWatchGuard Total Security Complete network protection in a single, easy-to-deploy solution.
WatchGuard Total Security Complete network protection in a single, easy-to-deploy solution. Total Security. A stateful packet firewall, while essential, simply isn t enough anymore. The reality is that
More informationCisco Network Admission Control (NAC) Solution
Data Sheet Cisco Network Admission Control (NAC) Solution New: Updated to include the Cisco Secure Network Server (SNS) Cisco Network Admission Control (NAC) solutions allow you to authenticate wired,
More informationCisco NAC Network Module for Integrated Services Routers
Cisco NAC Network Module for Integrated Services Routers The Cisco NAC Network Module for Integrated Services Routers (NME-NAC-K9) brings the feature-rich Cisco NAC Appliance Server capabilities to Cisco
More informationMalware Research at SMU. Tom Chen SMU
Malware Research at SMU Tom Chen SMU tchen@engr.smu.edu www.engr.smu.edu/~tchen Outline About SMU and Me Virus Research Lab Early Worm Detection Epidemic Modeling New Research Interests TC/BT/11-5-04 SMU
More informationSymantec Network Security 7100 Series
Symantec Network Security 7100 Series Proactive intrusion prevention device protects against known and unknown attacks to secure critical networks transition can be accomplished transparent to any network
More informationSecuring the Empowered Branch with Cisco Network Admission Control. September 2007
Securing the Empowered Branch with Cisco Network Admission Control September 2007 Presentation_ID 2006 Cisco Systems, Inc. All rights reserved. 1 Contents 1 The Cisco Empowered Branch 2 Security Considerations
More informationNetworks with Cisco NAC Appliance primarily benefit from:
Cisco NAC Appliance Cisco NAC Appliance (formerly Cisco Clean Access) is an easily deployed Network Admission Control (NAC) product that allows network administrators to authenticate, authorize, evaluate,
More informationalign security instill confidence
align security instill confidence cyber security Securing data has become a top priority across all industries. High-profile data breaches and the proliferation of advanced persistent threats have changed
More informationNETWORKING &SECURITY SOLUTIONSPORTFOLIO
NETWORKING &SECURITY SOLUTIONSPORTFOLIO NETWORKING &SECURITY SOLUTIONSPORTFOLIO Acomprehensivesolutionsportfoliotohelpyougetyourbusiness securelyconnected.clickononeofoursolutionstoknowmore NETWORKING
More information5 Trends That Will Impact Your IT Planning in Layered Security. Executive Brief
5 Trends That Will Impact Your IT Planning in 2012 Layered Security Executive Brief a QuinStreet Excutive Brief. 2011 Layered Security Many of the IT trends that your organization will tackle in 2012 aren
More informationSecurity Solutions. Overview. Business Needs
Security Solutions Overview Information security is not a one time event. The dynamic nature of computer networks mandates that examining and ensuring information security be a constant and vigilant effort.
More informationSymantec Endpoint Protection
The next generation of antivirus technology from Overview Advanced threat protection combines AntiVirus with advanced threat prevention to deliver an unmatched defense against malware for laptops, desktops,
More informationSymantec Endpoint Protection 11.0
OVERVIEW Symantec Endpoint Protection replaces Symantec AntiVirus Corporate Edition, Symantec Client Security, Symantec Sygate Enterprise protection and Confidence Online for PCs. Symantec Endpoint Protection
More informationComparison of Firewall, Intrusion Prevention and Antivirus Technologies
Comparison of Firewall, Intrusion Prevention and Antivirus Technologies (How each protects the network) Dr. Gaurav Kumar Jain Email: gaurav.rinkujain.jain@gmail.com Mr. Pradeep Sharma Mukul Verma Abstract
More informationHow security intelligence can be used for incident management. Volker Rath, Techn. Lead Consulting Services
How security intelligence can be used for incident management Volker Rath, Techn. Lead Consulting Services Safety and protection matters Lots of news about threats and diseases. Which immunizations? Spreading
More informationTraditional Security Solutions Have Reached Their Limit
Traditional Security Solutions Have Reached Their Limit CHALLENGE #1 They are reactive They force you to deal only with symptoms, rather than root causes. CHALLENGE #2 256 DAYS TO IDENTIFY A BREACH TRADITIONAL
More informationKlaudia Bakšová System Engineer Cisco Systems. Cisco Clean Access
Klaudia Bakšová System Engineer Cisco Systems Cisco Clean Access Agenda 1. Securing Complexity 2. NAC Appliance Product Overview and In-Depth 3. NAC Appliance Technical Benefits The Challenge of Securing
More informationRSA IT Security Risk Management
RSA IT Security Risk Adding Insight to Security March 18, 2014 Wael Jaroudi GRC Sales Specialist 1 Where is Security Today? Companies have built layer upon layer of security, but is it helping? Complexity
More informationKERIO TECHNOLOGIES KERIO WINROUTE FIREWALL 6.3 REVIEWER S GUIDE
KERIO TECHNOLOGIES KERIO WINROUTE FIREWALL 6.3 REVIEWER S GUIDE (4/20/07) WHO IS KERIO? Kerio Technologies provides Internet messaging and firewall software solutions for small to medium sized networks,
More informationConverged World. Martin Capurro
Information Management in a Converged World Martin Capurro Qwest Product Management Agenda I. Changes In Information Technology II. III. IV. Exploring Technology Trends vs. Needs What is the Buying Opportunity
More informationMAKING THE CLOUD A SECURE EXTENSION OF YOUR DATACENTER
MAKING THE CLOUD A SECURE EXTENSION OF YOUR DATACENTER Bret Hartman Cisco / Security & Government Group Session ID: SPO1-W25 Session Classification: General Interest 1 Mobility Cloud Threat Customer centric
More informationSecuring Your Business Against the Diversifying Targeted Attacks Leonard Sim
Securing Your Business Against the Diversifying Targeted Attacks Leonard Sim Manager, Client & Partner Services, Asia 1 Agenda 2010 Threats Targeted Attacks Defense Against Targeted Attacks Questions 2
More informationINSIDE. Integrated Security: Creating the Secure Enterprise. Symantec Enterprise Security
Symantec Enterprise Security WHITE PAPER Integrated Security: Creating the Secure Enterprise INSIDE Evolving IT and business environments The impact of network attacks on business The logical solution
More informationCracked BitDefender Client Security 2 Years 20 PCs lowest price software ]
Cracked BitDefender Client Security 2 Years 20 PCs lowest price software ] Description: The foundation of business security The security requirements for any new or existing company no matter how large
More informationThreat Control and Containment in Intelligent Networks. Philippe Roggeband - Product Manager, Security, Emerging Markets
Threat Control and Containment in Intelligent Networks Philippe Roggeband - proggeba@cisco.com Product Manager, Security, Emerging Markets 1 Agenda Threat Control and Containment Trends in motivation The
More informationAgenda. Today s IT Challenges. Symantec s Collaborative Architecture. Symantec TM Endpoint Management Suite. Connecting Symantec Technologies Today
Agenda 1 Today s IT Challenges 2 Symantec s Collaborative Architecture 3 Symantec TM Endpoint Management Suite 4 Connecting Symantec Technologies Today 5 Q & A 1 Traditional Protection isn t Good Enough
More informationSonicWALL UTM Overview. Jon Piro NA Channel SE
SonicWALL UTM Overview Jon Piro NA Channel SE SonicWALL Strengths SonicWALL is in a leadership position across our key markets and gaining share. SonicWALL has a growing, global install base of over 1
More informationMcAfee Public Cloud Server Security Suite
McAfee Public Cloud Server Security Suite Comprehensive security for AWS and Azure cloud workloads As enterprises shift their data center strategy to include and often lead with public cloud server instances,
More informationMEMORY AND BEHAVIORAL PROTECTION ENDPOINT SECURITY NETWORK SECURITY I ENDPOINT SECURITY I DATA SECURITY
MEMORY AND BEHAVIORAL PROTECTION ENDPOINT SECURITY NETWORK SECURITY I ENDPOINT SECURITY I DATA SECURITY FACT: COMPUTERS AND SERVERS ARE STILL AT RISK CONVENTIONAL TOOLS NO LONGER MEASURE UP Despite pouring
More informationCISCO NETWORKS BORDERLESS Cisco Systems, Inc. All rights reserved. 1
CISCO BORDERLESS NETWORKS 2009 Cisco Systems, Inc. All rights reserved. 1 Creating New Business Models The Key Change: Putting the Interaction Where the Customer Is Customer Experience/ Innovation Productivity/
More informationAngelo Gentili Head of Business Development, EMEA Region, PartnerNET
Angelo Gentili Head of Business Development, EMEA Region, PartnerNET The Innovation Solution in the Business Security Field. PartnerNet introduces Seqrite Welcome To Dynamic. Scalable. Future-Ready. Why
More informationSourcefire Solutions Overview Security for the Real World. SEE everything in your environment. LEARN by applying security intelligence to data
SEE everything in your environment LEARN by applying security intelligence to data ADAPT defenses automatically ACT in real-time Sourcefire Solutions Overview Security for the Real World Change is constant.
More informationPerimeter Defenses T R U E N E T W O R K S E C U R I T Y DEPENDS ON MORE THAN
T R U E N E T W O R K S E C U R I T Y DEPENDS ON MORE THAN Perimeter Defenses Enterprises need to take their security strategy beyond stacking up layers of perimeter defenses to building up predictive
More informationFree Download BitDefender Client Security 1 Year 50 PCs softwares download ]
Free Download BitDefender Client Security 1 Year 50 PCs softwares download ] Description: The foundation of business security The security requirements for any new or existing company no matter how large
More informationCisco Adaptive Wireless Intrusion Prevention System: Protecting Information in Motion
Cisco Adaptive Wireless Intrusion Prevention System: Protecting Information in Motion What You Will Learn The wireless spectrum is a new frontier for many IT organizations. Like any other networking medium,
More informationSecuring Today s Mobile Workforce
WHITE PAPER Securing Today s Mobile Workforce Secure and Manage Mobile Devices and Users with Total Defense Mobile Security Table of Contents Executive Summary..................................................................................
More informationKASPERSKY ENDPOINT SECURITY FOR BUSINESS
KASPERSKY ENDPOINT SECURITY FOR BUSINESS 1 WHAT WE SEE TODAY 325,000 New Endpoint Threats per day Targeted attacks and malware campaigns Threat reports Continued Exploitation of Vulnerabilities in 3rd
More informationIntroducing KASPERSKY ENDPOINT SECURITY FOR BUSINESS
Introducing KASPERSKY ENDPOINT SECURITY FOR BUSINESS 1 Business drivers and their impact on IT AGILITY Move fast, be nimble and flexible 66% of business owners identify business agility as a priority EFFICIENCY
More informationCORPORATE BUSINESS SOLUTIONS
Consulting Services Auditing Services Managed services Integration services Educational services Specialised distribution Service offering CORPORATE BUSINESS SOLUTIONS Firewalls Anti-virus Authentication
More informationCSIRT in general CSIRT Service Categories Reactive Services Proactive services Security Quality Management Services CSIRT. Brmlab, hackerspace Prague
Brmlab, hackerspace Prague Lightning talks, November 2016 in general in general WTF is an? in general WTF is an? Computer Security in general WTF is an? Computer Security Incident Response in general WTF
More informationHOLISTIC NETWORK PROTECTION: INNOVATIONS IN SOFTWARE DEFINED NETWORKS
HOLISTIC NETWORK PROTECTION: INNOVATIONS IN SOFTWARE DEFINED NETWORKS Danielle M. Zeedick, Ed.D., CISM, CBCP Juniper Networks August 2016 Today s Objectives Goal Objectives To understand how holistic network
More informationEnterprise Cybersecurity Best Practices Part Number MAN Revision 006
Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006 April 2013 Hologic and the Hologic Logo are trademarks or registered trademarks of Hologic, Inc. Microsoft, Active Directory,
More informationCyber Security Audit & Roadmap Business Process and
Cyber Security Audit & Roadmap Business Process and Organizations planning for a security assessment have to juggle many competing priorities. They are struggling to become compliant, and stay compliant,
More informationWireless and Network Security Integration Solution Overview
Wireless and Network Security Integration Solution Overview Solution Overview Introduction Enterprise businesses are being transformed to meet the evolving challenges of today's global business economy.
More informationINCIDENTRESPONSE.COM. Automate Response. Did you know? Your playbook overview - Malware Outbreak
Automate Response Congratulations on selecting IncidentResponse.com to retrieve your custom incident response playbook guide. This guide has been created especially for you for use in within your security
More informationTotal Threat Protection. Whitepaper
Total Threat Protection Whitepaper Organizations Are Caught Between a Growing Threat Landscape and Resource Limitations Today s organizations continue to struggle with providing adequate protection in
More informationProtecting Your Digital World
Protecting Your Digital World C O R P O R A T E O V E R V I E W With revenues of more than $105 Billion, cybercrime generates more revenue than the illegal drug trade. Source: U.S. Treasury, reported by
More informationIntrusion prevention systems are an important part of protecting any organisation from constantly developing threats.
Network IPS Overview Intrusion prevention systems are an important part of protecting any organisation from constantly developing threats. By using protocol recognition, identification, and traffic analysis
More informationMobile Devices prioritize User Experience
Mobile Security 1 Uniqueness of Mobile Mobile Devices are Shared More Often Mobile Devices are Used in More Locations Mobile Devices prioritize User Experience Mobile Devices have multiple personas Mobile
More informationClient Health Key Features Datasheet. Client Health Key Features Datasheet
Client Health Key Features Datasheet Client Health Key Features Datasheet Introducing the fastest way to manage endpoint health and security at scale Are you spending countless hours trying to find and
More informationIntroducing Next Generation Symantec AntiVirus: Symantec Endpoint Protection. Bernard Laroche Endpoint security Product marketing
Introducing Next Generation Symantec AntiVirus: Symantec Endpoint Protection Bernard Laroche Endpoint security Product marketing Agenda 1 Organizational Risk and Endpoint Challenges 32 Symantec Endpoint
More informationSymantec Endpoint Protection 14
Symantec Endpoint Protection Cloud Security Made Simple Symantec Endpoint Protection 14 Data Data Sheet: Sheet: Endpoint Endpoint Security Security Overview Last year, we saw 431 million new malware variants,
More informationRethinking Security: The Need For A Security Delivery Platform
Rethinking Security: The Need For A Security Delivery Platform Cybercrime In Asia: A Changing Environment & Shifting Focus Asia, more vulnerable to cybercrime because of diversity and breadth of countries
More informationNERC CIP VERSION 6 BACKGROUND COMPLIANCE HIGHLIGHTS
NERC CIP VERSION 6 COMPLIANCE BACKGROUND The North American Electric Reliability Corporation (NERC) Critical Infrastructure Protection (CIP) Reliability Standards define a comprehensive set of requirements
More informationNetwork Security in the Patched Environment. Guy Helmer, Ph.D. Palisade Systems, Inc.
Network Security in the Patched Environment Guy Helmer, Ph.D. Palisade Systems, Inc. Introduction Target audience: Network Managers Topic: Transport and Application Networklayer techniques Defend vulnerabilities
More informationImplementing. Security Technologies. NAP and NAC. The Complete Guide to Network Access Control. Daniel V. Hoffman. WILEY Wiley Publishing, Inc.
Implementing NAP and NAC Security Technologies The Complete Guide to Network Access Control Daniel V. Hoffman m WILEY Wiley Publishing, Inc. Contents Acknowledgments Introduction XIII XV Chapter 1 Chapter
More informationAccelerate Your Cloud Journey
Dubai, UAE 20th March 2013 Accelerate Your Cloud Journey James Spearman Dimension Data - Solutions Architect Cloud 2012 2011 Cisco and/or its affiliates. All rights reserved. Cisco Connect 1 Dimension
More informationCyber Criminal Methods & Prevention Techniques. By
Cyber Criminal Methods & Prevention Techniques By Larry.Boettger@Berbee.com Meeting Agenda Trends Attacker Motives and Methods Areas of Concern Typical Assessment Findings ISO-17799 & NIST Typical Remediation
More informationaccelerate your ambition Chris Jenkins
accelerate your ambition Chris Jenkins Changing landscape of the Security Industry Chris Jenkins European GM Security Dimension Data Business relationships Geographic footprint Revenue USD 700+m 1 NTT
More informationVenusense UTM Introduction
Venusense UTM Introduction Featuring comprehensive security capabilities, Venusense Unified Threat Management (UTM) products adopt the industry's most advanced multi-core, multi-thread computing architecture,
More informationIBM Europe, Middle East, and Africa Services Announcement ZS , dated October 6, 2009
Services Announcement ZS09-0202, dated October 6, 2009 Security software for IBM Proventia Endpoint Secure Control, IBM ISS Data Security Services endpoint system protection - Digital Guardian software
More informationIBM Security Network Protection Solutions
Systems IBM Security IBM Security Network Protection Solutions Pre-emptive protection to keep you Ahead of the Threat Tanmay Shah Product Lead Network Protection Appliances IBM Security Systems 1 IBM Security
More informationHerd Intelligence: true protection from targeted attacks. Ryan Sherstobitoff, Chief Corporate Evangelist
Herd Intelligence: true protection from targeted attacks Ryan Sherstobitoff, Chief Corporate Evangelist Complexity Web Based Malware Attacks Crimeware Intelligent Botnets Vulnerabilities Worm/ Outbreaks
More information