1 / 12

Dermot Hayden

Dermot Hayden. Personally identifiable information. Customer data. Intellectual property. Changing Security L andscape . Digital generation set loose. Information theft – not graffiti. Firewall. $. Complex threats. Corporate data. Mobile workers. Fast changing.

emmly
Télécharger la présentation

Dermot Hayden

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Dermot Hayden

  2. Personally identifiable information Customer data Intellectual property Changing Security Landscape Digital generation set loose Information theft – not graffiti Firewall $ Complex threats.... Corporate data Mobile workers Fast changing Web-based, Invisible Targeted ...targeting commercial data Contractors, outsourcing Partners, customers Web 2.0 Regulatory disclosure and reputation damage PCI-DSS HIPAA GLBA 95/46/EC CSB 1386

  3. Increasing Pressure on IT Security Data everywhere, regulations growing Security takes too much time to manage and impacts users Threats changing, still increasing Users everywhere, using everything

  4. “ We now see 250,000+ new pieces of malware every day and that number is doubling every year” SophosLabs

  5. “30,000 websitesare infected every day and 80% of those are legitimate” SophosLabs

  6. Web is now the #1 source of risk Significant shift in the last 12-18 months… 85% Spam Web

  7. “As much as 90% of successful attacks are against vulnerabilities where a patch already exists” Gartner

  8. How Do Organisations Cope? Usually through appliance sprawl … SSL VPN Gateway Router Firewall Intrusion prevention Wireless Hotspot Spam filter Gateway antivirus Web ApplicationSecurity WAN link balancer Loadbalancer Web filter Mobile Device Mgnt Encryption EndpointProtection

  9. Complete Security Covering the entire security lifecycle URL Filtering Endpoint Web Protection Mobile Control Secure branch offices Virtualization Data Control • Anti-malware • Reduce attack surface Protect everywhere Keep people working Stop attacks and breaches • Anti-spam Web Application Firewall Patch Manager Application Control Device Control • Intrusion • prevention Mobile app security Visibility • Encryption • for cloud Clean up • User education • WiFi security Automation Access control Local self-help • Technical support • Firewall Encryption • Free Home use • Email • encryption • Tamper protection • Small updates • Live Protection • Performance • VPN

  10. “Smaller budgets and limited IT resources definitely affect buying behaviours. It’s all about finding all-in-one solutions and riding out current technology to its maximum lifeline.” CRN: IT Buying Behaviours, April 2012

  11. Two Paths to Complete Security Mid – Large Endpoint driven Small – Mid UTM driven

  12. Questions

More Related