The Need For A New IT Security Architecture: Global Study On The Risk Of Outdated Technologies

Similar documents
MOBILE SECURITY 2017 SPOTLIGHT REPORT. Information Security PRESENTED BY. Group Partner

The Top 6 WAF Essentials to Achieve Application Security Efficacy

Securing Your Most Sensitive Data

Maintain Compliance with SWIFT Security Standards

Next Generation Authentication

How your network can take on the cloud and win. Think beyond traditional networking toward a secure digital perimeter

Speaker Introduction Who Mate Barany, VMware Manuel Mazzolin, VMware Peter Schmitt, Deutsche Bahn Systel Why VMworld 2017 Understanding the modern sec

Cloud for Government: A Transformative Digital Tool to Better Serve Communities

Defense in Depth Security in the Enterprise

GDPR Update and ENISA guidelines

SYMANTEC DATA CENTER SECURITY

Addressing Today s Endpoint Security Challenges

Best Practices in Securing a Multicloud World

SONICWALL SECURITY HEALTH CHECK SERVICE

Datasheet. Only Workspaces delivers the features users want and the control that IT needs.

Transforming Security Part 2: From the Device to the Data Center

RHM Presentation. Maas 360 Mobile device management

Service. Sentry Cyber Security Gain protection against sophisticated and persistent security threats through our layered cyber defense solution

Protecting Against Modern Attacks. Protection Against Modern Attack Vectors

FOR FINANCIAL SERVICES ORGANIZATIONS

Maximize your investment in Microsoft Office 365 with Citrix Workspace

Secure app and data delivery across devices, networks and locations

SONICWALL SECURITY HEALTH CHECK SERVICE

to protect the well-being of citizens. Fairfax is also home to some Fortune 500 and large

Safeguard Application Uptime and Consistent Performance

Cisco Firepower NGFW. Anticipate, block, and respond to threats

Cybersecurity Survey Results

Cisco Firepower NGFW. Anticipate, block, and respond to threats

EBOOK 4 TIPS FOR STRENGTHENING THE SECURITY OF YOUR VPN ACCESS

Securing Dynamic Data Centers. Muhammad Wajahat Rajab, Pre-Sales Consultant Trend Micro, Pakistan &

Verizon Software Defined Perimeter (SDP).

GEARS + CounterACT. Advanced Compliance Enforcement for Healthcare. December 16, Presented by:

Optimizing your network for the cloud-first world

Joe Stocker, CISSP, MCITP, VTSP Patriot Consulting

Optimizing Pulse Secure Access Suite with Pulse Secure Virtual Application Delivery Controller solution

EU GENERAL DATA PROTECTION: TIME TO ACT. Laurent Vanderschrick Channel Manager Belgium & Luxembourg Stefaan Van Hoornick Technical Manager BeNeLux

Converged Security - Protect your Digital Enterprise May 24, Copyright 2016 Vivit Worldwide

Managing Microsoft 365 Identity and Access

Cisco Stealthwatch Improves Threat Defense with Network Visibility and Security Analytics

2015 VORMETRIC INSIDER THREAT REPORT

SONICWALL SECURITY HEALTH CHECK PSO 2017

DEFINING SECURITY FOR TODAY S CLOUD ENVIRONMENTS. Security Without Compromise

SECOPS: NAVIGATE THE NEW LANDSCAPE FOR PREVENTION, DETECTION AND RESPONSE

Is Your Compliance Strategy Putting Your Business at Risk?

Securing the Cloud Today: How do we get there?

Govern every identity, Inspect every packet. Transform IT to the Department of YES

THE IMPLICATIONS OF PERFORMANCE, SECURITY, AND RESOURCE CONSTRAINTS IN DIGITAL TRANSFORMATION

CloudSOC and Security.cloud for Microsoft Office 365

Centrify Identity Services for AWS

Locking Down the Cloud Security is Not a Myth

The Internet of Everything is changing Everything

The Cost of Denial-of-Services Attacks

locuz.com SOC Services

Mitigating Risks with Cloud Computing Dan Reis

Microsoft 365 Security & Compliance For Small- and Mid-Sized Businesses

PT Unified Application Security Enforcement. ptsecurity.com

A Mobile Security Checklist: The Top Ten Threats to Your Enterprise Today. White Paper

Strategies for a Successful Security and Digital Transformation

ADVANCED THREAT PREVENTION FOR ENDPOINT DEVICES 5 th GENERATION OF CYBER SECURITY

Maximize your move to Microsoft in the cloud

Social Engineering: We are the target Sponsor Guide

Say Goodbye to Enterprise IT: Welcome to the Mobile First World. Sean Ginevan, Senior Director, Strategy Infosecurity Europe

HIPAA Compliance discussion

Understanding of basic networking concepts (routing, switching, VLAN, firewall functionality)

Outwit Cyber Criminals with Comprehensive Malware and Exploit Protection.

Disclaimer This presentation may contain product features that are currently under development. This overview of new technology represents no commitme

align security instill confidence

AND FINANCIAL CYBER FRAUD INSTITUTIONS FROM. Solution Brief PROTECTING BANKING

Secure XenApp and XenDesktop, Embrace the Flexibility

Cybersecurity. You have been breached; What Happens Next THE CHALLENGE FOR THE FINANCIAL SERVICES INDUSTRY

Vulnerability Management Trends In APAC

Digital Workspace SHOWDOWN

Securing intelligent networks: a guide for CISO and CIOs

CASE STUDY INSIGHTS: MICRO-SEGMENTATION TRANSFORMS SECURITY. How Organizations Around the World Are Protecting Critical Data

App Gateway Deployment Guide

CYBER ATTACKS DON T DISCRIMINATE. Michael Purcell, Systems Engineer Manager

MAKING THE CLOUD A SECURE EXTENSION OF YOUR DATACENTER

Citrix on Azure Better Together"

ENDNOTE SECURITY OVERVIEW INCLUDING ENDNOTE DESKTOP AND ONLINE

Zero Trust in Healthcare Centrify Corporations. All Rights Reserved.

AKAMAI CLOUD SECURITY SOLUTIONS

Today s workforce is Mobile. Cloud and SaaSbased. are being deployed and used faster than ever. Most applications are Web-based apps

Enhanced Threat Detection, Investigation, and Response

Reducing Cybersecurity Costs & Risk through Automation Technologies

SAS and F5 integration at F5 Networks. Updates for Version 11.6

The Realities of Data Security and Compliance: Compliance Security

Endpoint Protection : Last line of defense?

SONICWALL SECURITY HEALTH CHECK SERVICE

A COMPREHENSIVE APPROACH TO SECURITY ACROSS THE DIGITAL WORKSPACE WHITE PAPER MARCH 2018

Virtual Machine Encryption Security & Compliance in the Cloud

Delivering a Secure BYOD Solution with XenMobile MDM and Cisco ISE

Simplify PCI Compliance

Overcoming Business Challenges in WAN infrastructure

STATE OF THE NETWORK STUDY

NETWORK FORENSIC ANALYSIS IN THE AGE OF CLOUD COMPUTING.

PONEMON INSTITUTE RESEARCH REPORT 2018 STUDY ON GLOBAL MEGATRENDS IN CYBERSECURITY

IDENTITY AND THE NEW AGE OF ENTERPRISE SECURITY BEN SMITH CISSP CRISC CIPT RSA FIELD CTO

Leveraging Adaptive Auth and Device Trust for Enhanced Security and Compliance

with Advanced Protection

Next Generation Infrastructure Outsourcing. Copyright 2016 Tech Mahindra. All rights reserved.

Transcription:

The Need For A New IT Security Architecture: Global Study On The Risk Of Outdated Technologies Daniel Yeung Technical Manager, Hong Kong & Taiwan AUG 2017 2017 Citrix

Why Worry? Security needs to be top-of-mind

3 2017 Citrix The threat is real

WannaCry: 230k Hosts infected NotPetya: 15k servers, 50k endpoints at one customer 4 2017 Citrix

The consequences are expensive 5 2017 Citrix

Cybercrime cost businesses $3b 89% of breaches had financial or espionage motive According to Verizon s 2016 Data Breach Investigations Report 6 2017 Citrix

Security Landscape Growing Attack Surface Security Professionals Biggest Sources of Concern Related to Cyber Attacks 10 2017 Citrix

Major cyber attacks in last 2 years by region North America 21% European Union 29% % of respondents who experienced cyber attacks Asia-Pacific 32% Below global average Global average Above global average Global Average 28% Source: KPMG CIO Survey 2016 3,400 responses from CIOs and technology leaders across 82 countries. 11 2017 Citrix

Businesses at Risk Because of Organizational Complexity 83% say their organization is at risk because of the complexity of business and IT operations 71% say there is risk from their inability to control employees devices and apps 74% say a new IT security framework is needed to improve security posture and reduce risk The Need for a New IT Security Architecture: Global Study Sponsored by Citrix and conducted by Ponemon Institute January 2017 12 2017 Citrix

13 2017 Citrix Rethinking Security

OLD NEW WHERE WHAT Apps Users Services Data 14 2017 Citrix

OLD NEW FORCE THE USER FOLLOW THE USER Software-Defined Perimeter Apps Users Services Centralized Policy Data Distributed Hybrid Enforcement 15 2017 Citrix

OLD NEW ATTACKERS USERS 16 2017 Citrix

OLD NEW ZONES CONTEXT Network Apps Data Access 17 2017 Citrix

OLD NEW LOCKS DETECTORS 18 2017 Citrix

NEW What Follow the User Users Context-based Detectors Software Defined Perimeter Citrix Analytics Service 19 2017 Citrix

NEW What Follow the User Users Context-based Detectors Software Defined Perimeter Citrix Analytics Service 20 2017 Citrix

21 2017 Citrix

Citrix Secure Digital Workspace Software Defined Perimeter Unified Experience Contextual Access Unified Endpoint Management BYO Identity App Ops Users Single Sign-on Contextual Performance Legacy/ Custom Apps Content Control Secure IT Security & Performance Analytics 22 2017 Citrix

Citrix Secure Digital Workspace Software-Defined Perimeter Unified Experience Contextual Access Unified Endpoint Mgmt. Users BYO Identity Single Sign-on Contextual Performance Legacy/ Custom Apps App Ops Content Control Secure IT Security & Performance Analytics 23 2017 Citrix

24 2017 Citrix

Citrix Secure Digital Workspace Software-Defined Perimeter Unified Experience Contextual Access Unified Endpoint Mgmt. Users BYO Identity Single Sign-on Contextual Performance Gateway as a Service Legacy/ Custom Apps WebApp Firewall and DDoS as a Service Security & Performance Analytics App Ops Content Control Secure IT SD-WAN as a Service 25 2017 Citrix

Citrix Secure Digital Workspace Software-Defined Perimeter Users Unified Experience BYO Identity Single Sign-on Contextual Access Contextual Performance IT Controls: Onboard, monitor and control Legacy/ your devices, apps, Custom Apps and content Unified Endpoint Mgmt. App Ops Content Control Secure IT Security & Performance Analytics 26 2017 Citrix

Citrix Secure Digital Workspace Software-Defined Perimeter Unified Experience Contextual Access Unified Endpoint Mgmt. Users BYO Identity Single Sign-on Contextual Performance Legacy/ Custom Apps App Ops Content Control Secure IT Security & Performance Analytics 27 2017 Citrix

28 2017 Citrix

29 2017 Citrix

Citrix: Secure Delivery of Apps & Data Enhanced IT and Security Operations Reduce Risk Confidentiality Integrity Availability Identity & Access Network Security Application Security Data Security Monitoring & Response Enterprise Cloud Public Cloud Managed Services 30 2017 Citrix

Citrix Security Capabilities Identity & Access Network Security Application Security Data Security Monitoring & Response Authentication n-factor Authentication Federation Single Sign On Remote Access Unified Gateway Encrypted Delivery SmartControl Centralization App Virtualization Restrict Virt. Channel Secure Browser Centralization Hosted Delivery Water Marking Peripheral Control Visibility HDX Insight Web Insight Security Insight Authorization Role Based Task Based Location Based Segmentation SDX Instances Admin Partitions Traffic Domains Containerization Micro VPN Jailbreak Detection Secure Apps Containerization Restrict Open-in Encrypt Data at Rest Inter-App Control Auditing Access Logs Configuration Logs Session Recording Access Control Endpoint Analysis Contextual Control Quarantine Availability Load Balancing Health Monitoring DDoS Protection Inspection Web AppFW DDoS Protection Zero-Day Protection File Sharing File Expiration Encrypted Email Remote Wipe Compliance FIPS 140-2 PCI DSS HIPAA Common Criteria 31 2017 Citrix

Takeaway Threat is Real The Consequences are Expensive Rethinking Security What from Where Follow the User from Force the User Users from Attackers Context-based from Zones Detectors from Locks 32 2017 Citrix

33 2017 Citrix