A Fabric Approach to Network Security
|
|
- Amy Fletcher
- 5 years ago
- Views:
Transcription
1 A Fabric Approach to Network Security John Little August 20 th 2018 Copyright Fortinet Inc. All rights reserved.
2 What you will learn Our schedule for the session will include discussion of: Points of Inflection in todays Enterprise Networks Identify the drivers of Digital Transformation (Dx)» What is it?» Why should you care and why are we talking about it? Virtualization & Cloud IOT The changing Threat Landscape Security Transformation» What is it & Why should you care» Basic Security Principals» The Fabric 8» Discussion of Fabric integration Real life examples 2
3 Points of Inflection POINT OF INFLECTION TODAY S NETWORK IS BORDERLESS TODAY S NETWORK IS FASTER THAN EVER TODAY S NETWORK IS MORE COMPLEX THAN EVER
4 [Digital Transformation] integration of digital technology into all areas of a business, resulting in fundamental changes to how businesses operate and how they deliver value to customers
5 DATA DRIVEN BUSINESS MODEL Digital Transformation Omni Channel Customer Engagement Empower Your Employees Optimize Your Business Transform from Products to CX Digital Technology 5
6 REAL LIFE DX EMIRATES AIRLINE Goal is to transform Emirates into the leading customercentric, technology-enabled travel experience enterprise AI or robotics to reconstruct processes Efficiencies through task simplification so more tasks can be tackled Blockchain is a revolution within a revolution Security automated, deep at speed and scale 1. RESEARCH & KNOW YOUR CUSTOMER 2. UNDERSTAND THE CISO & OUTCOMES
7 DRAMATIC SHIFTS Dramatic economic and quality of life improvements Source: Paul Hodges, Economic Grouwth
8 COMPLEXITY, SKILLS & ADVANCED THREATS Security is the largest factor standing in the way of enterprise digital transformation efforts. More than half (55%) of companies said that security was the No. 1 challenge they face when implementing digital enablement technologies Source: SoftServe 2017 Cybersecurity one of Top 10 obstacles to Digital Transformation Source:Harvard Business Review 2017 Security nearly always tops the list of digital transformation obstacles. Marc Cecere, Forrester, ZD Net, 2017 Biggest disruptive technologies (58%), mobility and collaboration (54%), big data (52%)...IoT (43%) Source: BT CIO Report 2016 Some 57% of businesses reported major issues finding and recruiting talented IT security staff a problem as digital transformation efforts move more data and systems to the cloud, and cyber attacks grow more sophisticated. Source: Osterman Research 2017
9 SECURING DATA AT SPEED & SCALE in the digital era, [security] focus needs to shift from securing network perimeters to safeguarding data spread across systems, devices, and the cloud. MIT Technology Review, 2017 Mobile Devices Augmented Reality/Wearables IoT Platforms Cloud Computing Bid Data Analytics and Advanced Algorithms Multi-level Customer Interaction and Customer Profiling 3D Printing Location Detection Technologies Smart Sensor Advanced Human-machine Interfaces
10 SECURING DATA AT SPEED & SCALE in the digital era, [security] focus needs to shift from securing network perimeters to safeguarding data spread across systems, devices, and the cloud. MIT Technology Review, 2017 Mobile Devices Augmented Reality/Wearables IoT Platforms Cloud Computing Bid Data Analytics and Advanced Algorithms Multi-level Customer Interaction and Customer Profiling 3D Printing Location Detection Technologies Smart Sensor Advanced Human-machine Interfaces 10
11 Virtualization and Cloud FOCUS #1
12 The Multi-Cloud Experience Silos due to lack of visibility & control VIRTUALIZATION PRIVATE CLOUD HYBRID PUBLIC CLOUD HYPERVISOR IaaS/PaaS East-West North-South SaaS 12
13 The Internet of Things FOCUS #2
14 EXPANDING EXPOSURE & COMPLEXITY Hyper-connected Networks Connected OT & IT Systems Functional & Cyber Security 20.4B TOTAL 11.2B TOTAL IoT Devices (Billions) 8.4B TOTAL Business Vertical Specific Business Cross-Industry Consumer Source: Gartner 2017
15 The Threat Landscape FOCUS #3
16 CYBER CHANGES SINCE Threat Actors <50 >1,000 Threat Types <50 >1,000,000 Alerts/Day (Average Per Firm) <1,000 >1,000,000 Security Vendors <100 >2,300 VC Investments <$500M >$6B Security Spending <$3B >$80B Source: Optiv,
17 MISSING Missing BASICS basics DUE due TO to COMPLEXITY complexity
18 DX INCREASES COMPLEXITY DX DX DX DX Existing Issues BORDERLESS PERFORMANCE COMPLEXITY
19 ability to execute THREAT ACTORS challengers LEADERSHIP leaders QUADRANT N. Korea Iran Brazil Romania Ukraine niche players India UK France USA Israel visionaries Russia China 1. USA, Russia, China, Israel, and the UK have ~ 100% success rates on offensive APT cyber operations 2. North Korea derives ~100% of its APT cyber operations capability via training and support from China 3. Romania, Iran, and Ukraine have large populations of technically trained, under-employed youth 4. Reconsideration of risk management and The disappearing perimeter completeness of vision Source: Ed Amoroso 19
20 [Security Transformation] is the integration of security into all areas of digital technology resulting in fundamental changes to how security is architected, deployed and operated. 20
21 SECURING DATA AT SPEED & SCALE in the digital era, [security] focus needs to shift from securing network perimeters to safeguarding data spread across systems, devices, and the cloud. MIT Technology Review, 2017 Mobile Devices Augmented Reality/Wearables IoT Platforms Cloud Computing Bid Data Analytics and Advanced Algorithms Multi-level Customer Interaction and Customer Profiling 3D Printing Location Detection Technologies Smart Sensor Advanced Human-machine Interfaces
22 SECURING DIGITAL THE ENTERPRISE SECURITY PRINCIPLES 01 Holistic security plan based on simplicity and automation 04 Shared local and global intelligence 02 Open standards so everything can connect 05 Orchestration at Speed and Scale 03 Single pane of glass deep centralized visbility and control 06 Analytics & Artificial Intelligence for behavioral analysis
23 SECURITY FABRIC 2018 PARTNER API MANAGEMENT- ANALYTICS MULTI- CLOUD 2018 IOT- ENDPOINT WEB APPS NETWORK UNIFIED ACCESS BROAD ADVANCED THREAT PROTECTION A Security Architecture that is: INTEGRATED AUTOMATED Provides Visibility and Protection Across the Entire Digital Attack Surface Multiple Technologies Working Together for the Detection of Advanced Threats Embedded Intelligence for Automatic Response & Continuous Trust Assessment 23
24 SECURING IOT, NETWORKS & CLOUD ECOSYSTEMS The Fabric 8
25 THE FABRIC 8 MANAGEMENT- ANALYTICS Endpoint Security PARTNER API MULTI- CLOUD IoT Endpoint Products and services that detect and block malicious objects delivered via web, , network, or personal storage to an endpoint IOT- ENDPOINT NETWORK WEB APPS NG Endpoint Protection Platform UNIFIED ACCESS Enterprise Management Server Central Management Software ADVANCED THREAT PROTECTION
26 THE FABRIC 8 MANAGEMENT- ANALYTICS Network Security PARTNER API MULTI- CLOUD Network Products and services that provide high-performance, consolidated advanced security and deep visibility to protect the network from known and unknown threats IOT- ENDPOINT NETWORK WEB APPS Enterprise Firewall UNIFIED ACCESS IPS SWG Appliance Virtual Machine ADVANCED THREAT PROTECTION SD-WAN Cloud 27
27 THE FABRIC 8 MANAGEMENT- ANALYTICS Secure Unified Access PARTNER API MULTI- CLOUD Unified Access Products and services necessary to provide secure network connectivity, wired or wirelessly, to users of the Fortinet Security Fabric Integrated Wireless IOT- ENDPOINT NETWORK WEB APPS Wireless Infrastructure UNIFIED ACCESS Switching Infrastructure Appliance Virtual Machine ADVANCED THREAT PROTECTION Identity and Identity Management Hosted
28 THE FABRIC 8 MANAGEMENT- ANALYTICS Security PARTNER API MULTI- CLOUD Products and services that inspect corporate for unwanted (spam) and malicious (phishing, malware) messages as well as inappropriate or sensitive content IOT- ENDPOINT NETWORK WEB APPS UNIFIED ACCESS Secure Gateway Appliance Virtual Machine ADVANCED THREAT PROTECTION Hosted Cloud
29 THE FABRIC 8 MANAGEMENT- ANALYTICS Web Application Security PARTNER API MULTI- CLOUD Web Applications Products and services that protect web-based applications from threats that target known and unknown exploits IOT- ENDPOINT NETWORK WEB APPS Web Application Firewall UNIFIED ACCESS Application Delivery Controller Appliance Virtual Machine ADVANCED THREAT PROTECTION Hosted Cloud
30 THE FABRIC 8 MANAGEMENT- ANALYTICS Advanced Threat Protection PARTNER API MULTI- CLOUD ATP Products and services that continue inspecting for malware and other signs that cyber criminals have gained entry despite traditional threat prevention products (NGFW, SEG, EPP, WAF, etc) IOT- ENDPOINT NETWORK WEB APPS UNIFIED ACCESS Advanced Threat Protection ie, Sandbox or Detonation chamber Appliance Virtual Machine ADVANCED THREAT PROTECTION Hosted Cloud
31 THE FABRIC 8 MANAGEMENT- ANALYTICS Multi-Cloud Security PARTNER API MULTI- CLOUD Multi Cloud Products and services that protect the expanded attack surface across private cloud, public cloud and SaaS IOT- ENDPOINT NETWORK WEB APPS Virtual Firewall Network Security Cloud Firewall Network Security Cloud Access Security Broker Virtual Machine UNIFIED ACCESS ADVANCED THREAT PROTECTION Cloud & SDN Integration Cloud
32 THE FABRIC 8 MANAGEMENT- ANALYTICS Management & Analytics PARTNER API MULTI- CLOUD Products and services that weave Fortinet and partner products into a cohesive solution, uncovering hidden insights and reducing the total cost of ownership IOT- ENDPOINT NETWORK WEB APPS Central Logging & Reporting Central Security Management Cloud-based Central Management Appliance Virtual Machine UNIFIED ACCESS ADVANCED THREAT PROTECTION Security Information & Event Management Hosted Cloud
33 AUTOMATED DEEP VISIBITY & CONTROL Management & Analytics Multi-Cloud Security Cloud FW VFW CASB Internal Segmentation FW Web Application Security Secured Unified Access NGFW Segmentation Security Endpoint Security Advanced Threat Protection DC / Cloud Services 3G/4G/5G wireless DC / Private Cloud UCPE Branch Access and off-load Transport / SDWAN Consumer Access and off-load 34
34 Backup Slides
35 Broad The Fabric Allows Flexible, Open Integration of Other Security Partners Virtualization & SDN/NFV CLOUD ENDPOINT & IoT MANAGEMENT SIEM SYSTEMS INTEGRATOR 36
36 Fabric-Ready Partners Carbon Black Key Solution Features Real-time endpoint sensor & recorder that provides real-time and historical data for every server and endpoint. Policy-driven trust-based security allows you to define software you trust, and deny everything else by default. Instantly retrieve files from any endpoint - to submit to FortiSandbox, or remove based on FortiSandbox intelligence. Key Benefits Lock down systems to stop malware, ransomware, zero-day, and non-malware attacks. Built-in file-integrity monitoring, device control, and memory protection to block unauthorized change Harden new and legacy systems, with broad support for embedded, virtual, and physical OS types & versions. Integration: Endpoint/ATP and Management APIs. Carbon Black-Fortinet Integrated Endpoint Protection Solution Solution brief: Technical Integration Guide: Contacts: 37
37 Fabric-Ready Partners Cisco ACI Key Solution Features Cisco ACI - FortiGate integration provides automated, predefined policy-based security provisioning Single-pane-of-glass management enablement from Cisco APIC with full visibility on security policy enforcement Rapid deployment of predefined security policies Enables scale on-demand with automation Key Benefits Enhanced visibility and security correlated with overlay/underlay networks. Lower TCO from reduced administrative OPEX Accelerated application and L4-L7 security deployment. Increased efficiency in service provisioning & network security segmentation. Integration: Virtualization & Management APIs Fortinet-Cisco ACI Solution Solution brief: ACI-SolutionBrief.pdf Technical Guide: Deployment-Guide-CiscoACI-v1.1-v1.2.html Contacts: 38
Strategies for a Successful Security and Digital Transformation
#RSAC SESSION ID: GPS-F02A Strategies for a Successful Security and Digital Transformation Jonathan Nguyen-Duy Vice President, Strategic Programs jnguyenduy@fortinet.com AGENDA 2017 Digital transformation
More informationDEFINING SECURITY FOR TODAY S CLOUD ENVIRONMENTS. Security Without Compromise
DEFINING SECURITY FOR TODAY S CLOUD ENVIRONMENTS Security Without Compromise CONTENTS INTRODUCTION 1 SECTION 1: STRETCHING BEYOND STATIC SECURITY 2 SECTION 2: NEW DEFENSES FOR CLOUD ENVIRONMENTS 5 SECTION
More informationA CISO GUIDE TO MULTI-CLOUD SECURITY Achieving Transparent Visibility and Control and Enhanced Risk Management
A CISO GUIDE TO MULTI-CLOUD SECURITY Achieving Transparent Visibility and Control and Enhanced Risk Management CONTENTS INTRODUCTION 1 SECTION 1: MULTI-CLOUD COVERAGE 2 SECTION 2: MULTI-CLOUD VISIBILITY
More informationSecuring Digital Transformation
September 4, 2017 Securing Digital Transformation DXC Security Andreas Wuchner, CTO Security Innovation Risk surface is evolving and increasingly complex The adversary is highly innovative and sophisticated
More informationMAKING THE CLOUD A SECURE EXTENSION OF YOUR DATACENTER
MAKING THE CLOUD A SECURE EXTENSION OF YOUR DATACENTER Bret Hartman Cisco / Security & Government Group Session ID: SPO1-W25 Session Classification: General Interest 1 Mobility Cloud Threat Customer centric
More informationBuild a Software-Defined Network to Defend your Business
Build a Software-Defined Network to Defend your Business Filip Vanierschot Systems Engineer fvanierschot@juniper.net Kappa Data 2020 Software Defined Secure Networks Juniper s Innovation in Secure Networks
More informationThe Why, What, and How of Cisco Tetration
The Why, What, and How of Cisco Tetration Why Cisco Tetration? With the above trends as a backdrop, Cisco has seen specific changes within the multicloud data center. Infrastructure is changing. It is
More informationCisco Cloud Security. How to Protect Business to Support Digital Transformation
Cisco Cloud Security How to Protect Business to Support Digital Transformation Dragan Novakovic Cybersecurity Consulting Systems Engineer January 2018. Security Enables Digitization Digital Disruption,
More informationCisco Unified Data Center Strategy
Cisco Unified Data Center Strategy How can IT enable new business? Holger Müller Technical Solutions Architect, Cisco September 2014 My business is rapidly changing and I need the IT and new technologies
More informationEnabling Fast IT. In the IoE era. Alberto Degradi DCV Sales Leader. November 2014
Enabling Fast IT In the IoE era Alberto Degradi DCV Sales Leader November 2014 Agenda IT Challenges Today EMC + Cisco + Intel Cisco Unified Data Center Joint Data Center Solutions Cisco Confidential 2
More informationFuture Challenges and Changes in Industrial Cybersecurity. Sid Snitkin VP Cybersecurity Services ARC Advisory Group
Future Challenges and Changes in Industrial Cybersecurity Sid Snitkin VP Cybersecurity Services ARC Advisory Group Srsnitkin@ARCweb.com Agenda Industrial Cybersecurity Today Scope, Assumptions and Strategies
More informationAKAMAI CLOUD SECURITY SOLUTIONS
AKAMAI CLOUD SECURITY SOLUTIONS Whether you sell to customers over the web, operate data centers around the world or in the cloud, or support employees on the road, you rely on the Internet to keep your
More informationTHE EFFECTIVE APPROACH TO CYBER SECURITY VALIDATION BREACH & ATTACK SIMULATION
BREACH & ATTACK SIMULATION THE EFFECTIVE APPROACH TO CYBER SECURITY VALIDATION Cymulate s cyber simulation platform allows you to test your security assumptions, identify possible security gaps and receive
More informationEvolution of connectivity in the era of cloud
Evolution of connectivity in the era of cloud Phil Harris SVP and GM SP Market Vertical Riverbed Technology 1 2017 Riverbed Technology. All rights reserved. Transformational Services Span The Business
More informationSoftware-Defined Secure Networks in Action
Software-Defined Secure Networks in Action Enabling automated threat remediation without impacting business continuity Challenge Businesses need to continuously evolve to fight the increasingly sophisticated
More informationto protect the well-being of citizens. Fairfax is also home to some Fortune 500 and large
Executive Summary As a County Government servicing about 1.5 million citizens, we have the utmost responsibility to protect the well-being of citizens. Fairfax is also home to some Fortune 500 and large
More informationWhite Paper. Why IDS Can t Adequately Protect Your IoT Devices
White Paper Why IDS Can t Adequately Protect Your IoT Devices Introduction As a key component in information technology security, Intrusion Detection Systems (IDS) monitor networks for suspicious activity
More informationSYMANTEC DATA CENTER SECURITY
SYMANTEC DATA CENTER SECURITY SYMANTEC UNIFIED SECURITY STRATEGY Users Cyber Security Services Monitoring, Incident Response, Simulation, Adversary Threat Intelligence Data Threat Protection Information
More informationTransforming the Network for the Digital Business
Transforming the Network for the Digital Business Driven by Software Defined Platforms Hugo Padilla Prad Enterprise Networks Digital Acceleration Team CCIE Emeritus #12444 Cisco Forum Kiev, November 14
More informationTHE BUGGIE WHIP MISNOMER 2016 PRESIDIO
Bob Cagnazzi THE BUGGIE WHIP MISNOMER THE BUGGIE WHIP MISNOMER 1905 2016 WORLD OF DIGITAL TRANSFORMATION The realignment of or investment in new technology, business models, and processes to drive value
More informationCYBER ATTACKS DON T DISCRIMINATE. Michael Purcell, Systems Engineer Manager
CYBER ATTACKS DON T DISCRIMINATE Michael Purcell, Systems Engineer Manager THREAT LANDSCAPE IS HUGE AND ORGANIZED $8 TRILLION Will be cost of fighting cybercrime in 2022 (JuniperResearch) 14.5 BILLION
More informationMitigating Branch Office Risks with SD-WAN
WHITE PAPER Mitigating Branch Office Risks with SD-WAN 1 M itigating Branch Office Risks with SD-WAN Branch Security Overview The branch or remote office stands out as a point of vulnerability in an increasingly
More informationManaged Endpoint Defense
DATA SHEET Managed Endpoint Defense Powered by CB Defense Next-gen endpoint threat detection and response DEPLOY AND HARDEN. Rapidly deploy and optimize endpoint prevention with dedicated security experts
More informationCisco APIC Enterprise Module Simplifies Network Operations
Cisco APIC Enterprise Module Simplifies Network Operations October 2015 Prepared by: Zeus Kerravala Cisco APIC Enterprise Module Simplifies Network Operations by Zeus Kerravala October 2015 º º º º º º
More informationSOLUTION BRIEF RSA NETWITNESS EVOLVED SIEM
RSA NETWITNESS EVOLVED SIEM OVERVIEW A SIEM is technology originally intended for compliance and log management. Later, as SIEMs became the aggregation points for security alerts, they began to be more
More informationI D C T E C H N O L O G Y S P O T L I G H T
I D C T E C H N O L O G Y S P O T L I G H T P ow e ring Digital Transfor m a t i o n T h r ough the C l o u d - R e a d y E n t e r p rise September 2016 Adapted from Developing a Cloud Strategy for Digital
More informationRun the business. Not the risks.
Run the business. Not the risks. RISK-RESILIENCE FOR THE DIGITAL BUSINESS Cyber-attacks are a known risk to business. Today, with enterprises becoming pervasively digital, these risks have grown multifold.
More informationCHARTING THE FUTURE OF SOFTWARE DEFINED NETWORKING
www.hcltech.com CHARTING THE FUTURE OF SOFTWARE DEFINED NETWORKING Why Next-Gen Networks? The rapid and large scale adoption of new age disruptive digital technologies has resulted in astronomical growth
More informationEvolution of Data Center Security Automated Security for Today s Dynamic Data Centers
Evolution of Data Center Security Automated Security for Today s Dynamic Data Centers Speaker: Mun Hossain Director of Product Management - Security Business Group Cisco Twitter: @CiscoDCSecurity 2 Any
More informationFast IT - Policy Driven Infrastructure for the Intercloud World
Fast IT - Policy Driven Infrastructure for the Intercloud World Paul Horrocks Technical Solution Architect Agenda What is Fast IT? What is Policy? How Cisco delivers Fast IT The foundation for Fast IT
More informationAutomated Response in Cyber Security SOC with Actionable Threat Intelligence
Automated Response in Cyber Security SOC with Actionable Threat Intelligence while its biggest weakness is lack of visibility: SOCs still can t detect previously unknown threats, which is a consistent
More informationModelos de Negócio na Era das Clouds. André Rodrigues, Cloud Systems Engineer
Modelos de Negócio na Era das Clouds André Rodrigues, Cloud Systems Engineer Agenda Software and Cloud Changed the World Cisco s Cloud Vision&Strategy 5 Phase Cloud Plan Before Now From idea to production:
More informationCybersecurity Roadmap: Global Healthcare Security Architecture
SESSION ID: TECH-W02F Cybersecurity Roadmap: Global Healthcare Security Architecture Nick H. Yoo Chief Security Architect Disclosure No affiliation to any vendor products No vendor endorsements Products
More informationDelivering the Wireless Software-Defined Branch
Delivering the Wireless Software-Defined Branch By: Lee Doyle, Principal Analyst at Doyle Research Sponsored by Cradlepoint Executive Summary Operations at the branch, critical to many distributed organizations,
More informationPerimeter Defenses T R U E N E T W O R K S E C U R I T Y DEPENDS ON MORE THAN
T R U E N E T W O R K S E C U R I T Y DEPENDS ON MORE THAN Perimeter Defenses Enterprises need to take their security strategy beyond stacking up layers of perimeter defenses to building up predictive
More informationSafeguard Application Uptime and Consistent Performance
Safeguard Application Uptime and Consistent Performance A software-first approach to delivering applications across hybrid and multi-cloud architectures. 1 Safeguard Application Uptime and Consistent Performance
More informationAnalytics Driven, Simple, Accurate and Actionable Cyber Security Solution CYBER ANALYTICS
Analytics Driven, Simple, Accurate and Actionable Cyber Security Solution CYBER ANALYTICS Overview Cyberattacks are increasingly getting more frequent, more sophisticated and more widespread than ever
More informationin collaboration with
in collaboration with Table of Contents 01 Turn Silos of Data into Operational Intelligence page 04 02 Gain a Competitive Advantage with Cisco and Splunk page 06 03 Improve Insight with IT Operations Analytics
More informationWhat can we lose not implementing proper security in our IT environment? Aleksandar Pavlovic Security Account Manager Cisco
What can we lose not implementing proper security in our IT environment? Aleksandar Pavlovic Security Account Manager Cisco Increasing Digital Traffic Creates a Greater Attack Surface Global IP Traffic
More informationSimplifying the Branch Network
Simplifying the Branch Network By: Lee Doyle, Principal Analyst at Doyle Research Sponsored by Aruba, a Hewlett Packard Enterprise company Executive Summary A majority of IT organizations are experiencing
More informationDeception: Deceiving the Attackers Step by Step
Deception: Deceiving the Attackers Step by Step TrapX Security, Inc. February, 2018 In 2017, Gartner emphasized how companies are transforming their security spending strategy and moving away from prevention-only
More informationCloud for Government: A Transformative Digital Tool to Better Serve Communities
Cloud for Government: A Transformative Digital Tool to Better Serve Communities 1 005181004 From state to local agencies, government organizations crave access to the same cloud-based tools enabling digital
More informationThe threat landscape is constantly
A PLATFORM-INDEPENDENT APPROACH TO SECURE MICRO-SEGMENTATION Use Case Analysis The threat landscape is constantly evolving. Data centers running business-critical workloads need proactive security solutions
More informationSecurity-as-a-Service: The Future of Security Management
Security-as-a-Service: The Future of Security Management EVERY SINGLE ATTACK THAT AN ORGANISATION EXPERIENCES IS EITHER ON AN ENDPOINT OR HEADING THERE 65% of CEOs say their risk management approach is
More informationPT Unified Application Security Enforcement. ptsecurity.com
PT Unified Application Security Enforcement ptsecurity.com Positive Technologies: Ongoing research for the best solutions Penetration Testing ICS/SCADA Security Assessment Over 700 employees globally Over
More informationRealities and Risks of Software-Defined Everything (SDx) John P. Morency Research Vice President
Realities and Risks of Software-Defined Everything (SDx) John P. Morency Research Vice President Key Issues 1. SDx Today s Reality 2. SDx Risks and How to Avoid Them 1 2017 Gartner, Inc. and/or its affiliates.
More informationCopyright 2012 EMC Corporation. All rights reserved. Obrigado
Copyright 20132012 EMC Corporation. EMC Corporation. All rights reserved. All rights reserved. 1 EMC FORUM 2013 2 Obrigado 3 SOFTWARE DEFINED DATA CENTER WORLD IS CHANGING RAPID CHANGE APP / INFRA INCREASED
More informationDigital Network Architecture
Digital Network Architecture Capturing the Digital Explosion Thomas Latzer, Cisco Digital Enterprise Definition Digital Enterprise: An organization or business that uses technology as a competitive advantage
More informationVersa Software-Defined Solutions for Service Providers
PRODUCT BRIEF Software-Defined Solutions for Service Providers Transformative solutions to increase growth and value The Service Provider industry has seen an incredible amount of disruption due to NFV
More informationThere s Never Been a Better Time. Dave West CTO, Cisco APJ May 2016
There s Never Been a Better Time Dave West CTO, Cisco APJ May 2016 The 4 th Era of IT: More Digital Disruption 1960 1980 2005 2015 IT Era Mainframe PC + Web Cloud + Mobile IoT + Analytics + Automation
More information5 STEPS TO BUILDING ADVANCED SECURITY IN SOFTWARE- DEFINED DATA CENTERS
5 STEPS TO BUILDING ADVANCED SECURITY IN SOFTWARE- DEFINED DATA CENTERS INTRODUCTION The modern data center is rapidly evolving. Virtualization is paving the way to the private cloud, enabling applications
More information6 KEY SECURITY REQUIREMENTS
KEY SECURITY REQUIREMENTS for Next Generation Mobile Networks A Prevention-Oriented Approach to in Evolving Mobile Network Ecosystems A Prevention-Oriented Approach to in Evolving Mobile Network Ecosystems
More informationDriving Business Outcomes: Cisco Data Center Innovation and Solutions
Driving Business Outcomes: Data Center Innovation and Solutions Connect 2014 Riyadh, Saudi Arabia Frank Palumbo Senior Vice President Global Data Center @fpalumbo Unified Computing System, UCS, Invicta,
More information5 Steps to Government IT Modernization
5 Steps to Government IT Modernization 1 WHY MODERNIZE? IT modernization is intimidating, but it s necessary. What are the advantages of modernization? Enhance citizen experience and service delivery Lower
More informationSecurity by Default: Enabling Transformation Through Cyber Resilience
Security by Default: Enabling Transformation Through Cyber Resilience FIVE Steps TO Better Security Hygiene Solution Guide Introduction Government is undergoing a transformation. The global economic condition,
More informationProtecting Your Digital Business: The Case for Next-Generation Intrusion Prevention
White Paper Protecting Your Digital Business: The Case for Next-Generation Intrusion Prevention What You Will Learn Many companies that adopt a next-generation firewall (NGFW) believe that they can t benefit
More informationCISCO NETWORKS BORDERLESS Cisco Systems, Inc. All rights reserved. 1
CISCO BORDERLESS NETWORKS 2009 Cisco Systems, Inc. All rights reserved. 1 Creating New Business Models The Key Change: Putting the Interaction Where the Customer Is Customer Experience/ Innovation Productivity/
More informationJUNIPER SKY ADVANCED THREAT PREVENTION
Data Sheet JUNIPER SKY ADVANCED THREAT PREVENTION Product Overview Juniper Sky Advanced Threat Prevention is a cloud-based service that provides complete advanced malware protection. Integrated with SRX
More informationwith Advanced Protection
with Advanced Email Protection OVERVIEW Today s sophisticated threats are changing. They re multiplying. They re morphing into new variants. And they re targeting people, not just technology. As organizations
More informationSD-WAN Market Overview
SD-WAN Market Overview Simplify and Secure Your Complex Network 01/02/2017 Executive Summary According to a March, 2016 article in Network World, IDC expects SD-WAN sales to approach $600 million this
More informationARTIFICIAL INTELLIGENCE POWERED AUTOMATED THREAT HUNTING AND NETWORK SELF-DEFENSE
ARTIFICIAL INTELLIGENCE POWERED AUTOMATED THREAT HUNTING AND NETWORK SELF-DEFENSE Vectra Cognito HIGHLIGHTS Finds active attackers inside your network Automates security investigations with conclusive
More informationSecurity for the Cloud Era
Security for the Cloud Era Make the Most Out of Your Cloud Journey Fadhly Hassim Sales Engineer South East Asia & Korea Barracuda Networks Current Weather Situation Customer Provisions & Manage On-Premises
More informationHow to master hybrid IT. Get the speed and agility you want, with the visibility and control you need
How to master hybrid IT Get the speed and agility you want, with the visibility and control you need The process of moving from a dedicated hosted server to the cloud was seamless. Dimension Data s platform
More informationSoftware-Define Secure Networks The Future of Network Security for Digital Learning
Software-Define Secure Networks The Future of Network Security for Digital Learning SIGS, 5.Juli 2015 Klaus Ernst, Systems Engineer Juniper Networks Threat Landscape Feels like Treading Water 2017 IT Priorities
More informationNew Digital Business Models Driving the Softwarization of the Network
New Digital Business Models Driving the Softwarization of the Network Marc Halbfinger January 2018 Here To Serve Headquartered in Hong Kong PCCW consolidated 2016 Revenue: US$4.9 billion HKT 2016 Revenue:
More informationBromium: Virtualization-Based Security
Bromium: Virtualization-Based Security TAG-Cyber Briefing Presented by Simon Crosby CTO, Co-Founder of Bromium Bromium 2016 2 Bromium 2016 3 Real-time Detection & Analysis Malware manifest Bromium 2016
More informationKaspersky Cloud Security for Hybrid Cloud. Diego Magni Presales Manager Kaspersky Lab Italia
Kaspersky Cloud Security for Hybrid Cloud Diego Magni Presales Manager Kaspersky Lab Italia EXPERTISE 1/3 of our employees are R&D specialists 323,000 new malicious files are detected by Kaspersky Lab
More informationLeisure Business Center,Muntaza,Doha, Qatar Ph: Fax Your trusted security partner
Leisure Business Center,Muntaza,Doha, Qatar Ph: +974 44528099 Fax +97444528951 sales@ds-qatar.com www.ds-qatar.com Your trusted security partner About US DSS is conceived and formed by professionals with
More informationEvolution For Enterprises In A Cloud World
Evolution For Enterprises In A Cloud World Foreword Cloud is no longer an unseen, futuristic technology that proves unattainable for enterprises. Rather, it s become the norm; a necessity for realizing
More informationThe Rise of the Intercloud
The Rise of the Intercloud How Service Providers Can Leverage the Platform for the Internet of Everything Tom Williams, Director, Cloud Business Development Azhar Sayeed, Sr. Director of Solutions Engineering
More informationCisco Start. IT solutions designed to propel your business
Cisco Start IT solutions designed to propel your business Small and medium-sized businesses (SMBs) typically have very limited resources to invest in new technologies. With every IT investment made, they
More informationBorderless security engineered for your elastic hybrid cloud. Kaspersky Hybrid Cloud Security. #truecybersecurity
Borderless security engineered for your elastic hybrid cloud Kaspersky Hybrid Cloud Security www.kaspersky.com #truecybersecurity Borderless security engineered for your hybrid cloud environment Data
More informationHOLISTIC NETWORK PROTECTION: INNOVATIONS IN SOFTWARE DEFINED NETWORKS
HOLISTIC NETWORK PROTECTION: INNOVATIONS IN SOFTWARE DEFINED NETWORKS Danielle M. Zeedick, Ed.D., CISM, CBCP Juniper Networks August 2016 Today s Objectives Goal Objectives To understand how holistic network
More informationEfficience de l IT & croissance?
Efficience de l IT & croissance? Dirigeants «Data Driven» Mise en place de solutions Cloud Contribution du numérique à la recherche de nouveaux clients ou au support et les échanges avec les clients existants
More informationCisco Software-Defined Access
F Cisco Software-Defined ccess What is Cisco Software-Defined ccess? Cisco Software-Defined ccess (SD-ccess) is a central part of the Cisco Digital Network rchitecture (Cisco DN ) solution and represents
More informationVideo-Aware Networking: Automating Networks and Applications to Simplify the Future of Video
Video-Aware Networking: Automating Networks and Applications to Simplify the Future of Video The future of video is in the network We live in a world where more and more video is shifting to IP and mobile.
More informationAutomated Threat Management - in Real Time. Vectra Networks
Automated Threat Management - in Real Time Security investment has traditionally been in two areas Prevention Phase Active Phase Clean-up Phase Initial Infection Key assets found in the wild $$$$ $$$ $$
More informationJuniper Sky Advanced Threat Prevention
Juniper Sky Advanced Threat Prevention Product Overview Juniper Sky Advanced Threat Prevention is a cloud-based service that provides complete advanced malware protection. Integrated with SRX Series Services
More informationTransition Your Windows Server 2003 Infrastructure to a Modern Cisco and Microsoft Solution
Solution Overview Transition Your Windows Server 2003 Infrastructure to a Modern Cisco and Microsoft Solution Microsoft support for all versions of Windows Server 2003 and Windows Server 2003 R2 ends on
More informationCopyright 2011 Trend Micro Inc.
Copyright 2011 Trend Micro Inc. 2008Q1 2008Q2 2008Q3 2008Q4 2009Q1 2009Q2 2009Q3 2009Q4 2010Q1 2010Q2 2010Q3 2010Q4 2011Q1 2011Q2 2011Q3 2011Q4 M'JPY Cloud Security revenue Q to Q Growth DeepSecurity/Hosted/CPVM/IDF
More informationFOR FINANCIAL SERVICES ORGANIZATIONS
RSA BUSINESS-DRIVEN SECURITYTM FOR FINANCIAL SERVICES ORGANIZATIONS MANAGING THE NEXUS OF RISK & SECURITY A CHANGING LANDSCAPE AND A NEW APPROACH Today s financial services technology landscape is increasingly
More informationSTRATEGIC WHITE PAPER. Securing cloud environments with Nuage Networks VSP: Policy-based security automation and microsegmentation overview
STRATEGIC WHITE PAPER Securing cloud environments with Nuage Networks VSP: Policy-based security automation and microsegmentation overview Abstract Cloud architectures rely on Software-Defined Networking
More informationCYBER SOLUTIONS & THREAT INTELLIGENCE
CYBER SOLUTIONS & THREAT INTELLIGENCE STRENGTHEN YOUR DEFENSE DarkTower is a global advisory firm focused on security for some of the world s leading organizations. Our security services, along with real-world
More informationCloud-Enable Your District s Network For Digital Learning
Cloud-Enable Your District s Network For Digital Learning Session B40 BrainStorm 17.0 Gavin Lee Education Business Development Manager Juniper Networks gavinl@juniper.net Juniper Innovations for Mission
More informationA Random Walk through Cyber Security
A Random Walk through Cyber Security Dr. Edward G. Amoroso Chief Executive Officer, TAG Cyber LLC Adjunct Professor, Stevens Institute and NYU Senior Advisor, APL/JHU; 2010 AT&T Labs Fellow eamoroso@tag-cyber.com
More informationEnterprise Cloud Computing. Eddie Toh Platform Marketing Manager, APAC Data Centre Group Cisco Summit 2010, Kuala Lumpur
1 Enterprise Cloud Computing Eddie Toh Platform Marketing Manager, APAC Data Centre Group Cisco Summit 2010, Kuala Lumpur Agenda 2 Fundamentals of Enterprise Cloud Computing IT & Cloud Computing Requirements
More informationZero Trust with Okta: A Modern Approach to Secure Access from Anywhere. How Okta enables a Zero Trust solution for our customers
Zero Trust with Okta: A Modern Approach to Secure Access from Anywhere How Okta enables a Zero Trust solution for our customers Okta Inc. 301 Brannan Street, Suite 300 San Francisco, CA 94107 info@okta.com
More informationWHITE PAPER ARUBA SD-BRANCH OVERVIEW
WHITE PAPER ARUBA SD-BRANCH OVERVIEW June 2018 Table of Contents Overview of the Traditional Branch...1 Adoption of Cloud Services...1 Shift to the Internet as a Business Transport Medium...1 Increasing
More informationJourney to Secure and Automated Multi-cloud
Journey to Secure and Automated Multi-cloud 2018 Mark Hinckley WW SE and Partner Enablement Juniper Networks Agenda Evolution of Value [Chain] Rise of Enterprise Multicloud Network as the Security Platform
More informationPetroleum Refiner Overhauls Security Infrastructure
Petroleum Refiner Overhauls Security Infrastructure Small team strengthens security posture and responds faster to threats HollyFrontier Customer Profile Fortune 500 independent petroleum refiner and distributor
More informationCisco Digital Network Architecture The Network Enables Digital Business. Rene Andersen Cisco DK
Cisco Digital Network Architecture The Network Enables Digital Business Rene Andersen Cisco DK IT Priorities for Digital Transformation Faster Innovation Slow IT processes Technology innovation speed Only
More informationTHE IDENTITY DEFINED SECURITY ALLIANCE
THE IDENTITY DEFINED SECURITY ALLIANCE A collaborative solution for Identity Defined Security EXECUTIVE OVERVIEW Identity Defined Security is a novel term, but not necessarily a new idea. Applications
More informationCenturyLink for Microsoft
Strategic Partner Alliances CenturyLink for Microsoft EMPOWER REACH AGILITY 2017 CenturyLink. All Rights Reserved. The CenturyLink mark, pathways logo and certain CenturyLink product names are the property
More informationTREND MICRO SMART PROTECTION SUITES
SOLUTION BROCHURE TREND MICRO SMART ROTECTION SUITES Maximum endpoint security from your proven security partner Get smarter security that goes where your users go The threat landscape is constantly changing,
More informationAWS Reference Design Document
AWS Reference Design Document Contents Overview... 1 Amazon Web Services (AWS), Public Cloud and the New Security Challenges... 1 Security at the Speed of DevOps... 2 Securing East-West and North-South
More informationREALIZE YOUR. DIGITAL VISION with Digital Private Cloud from Atos and VMware
REALIZE YOUR DIGITAL VISION with Digital Private Cloud from Atos and VMware Today s critical business challenges and their IT impact Business challenges Maximizing agility to accelerate time to market
More informationReducing the Cost of Incident Response
Reducing the Cost of Incident Response Introduction Cb Response is the most complete endpoint detection and response solution available to security teams who want a single platform for hunting threats,
More informationSecuring Your Digital Transformation
Securing Your Digital Transformation Security Consulting Managed Security Leveraging experienced, senior experts to help define and communicate risk and security program strategy using real-world data,
More informationCloudSOC and Security.cloud for Microsoft Office 365
Solution Brief CloudSOC and Email Security.cloud for Microsoft Office 365 DID YOU KNOW? Email is the #1 delivery mechanism for malware. 1 Over 40% of compliance related data in Office 365 is overexposed
More informationHOSTED SECURITY SERVICES
HOSTED SECURITY SERVICES A PROVEN STRATEGY FOR PROTECTING CRITICAL IT INFRASTRUCTURE AND DEVICES Being always-on, always-connected might be good for business, but it creates an ideal climate for cybercriminal
More information