120 likes | 234 Views
Dermot Hayden. Personally identifiable information. Customer data. Intellectual property. Changing Security L andscape . Digital generation set loose. Information theft – not graffiti. Firewall. $. Complex threats. Corporate data. Mobile workers. Fast changing.
E N D
Personally identifiable information Customer data Intellectual property Changing Security Landscape Digital generation set loose Information theft – not graffiti Firewall $ Complex threats.... Corporate data Mobile workers Fast changing Web-based, Invisible Targeted ...targeting commercial data Contractors, outsourcing Partners, customers Web 2.0 Regulatory disclosure and reputation damage PCI-DSS HIPAA GLBA 95/46/EC CSB 1386
Increasing Pressure on IT Security Data everywhere, regulations growing Security takes too much time to manage and impacts users Threats changing, still increasing Users everywhere, using everything
“ We now see 250,000+ new pieces of malware every day and that number is doubling every year” SophosLabs
“30,000 websitesare infected every day and 80% of those are legitimate” SophosLabs
Web is now the #1 source of risk Significant shift in the last 12-18 months… 85% Spam Web
“As much as 90% of successful attacks are against vulnerabilities where a patch already exists” Gartner
How Do Organisations Cope? Usually through appliance sprawl … SSL VPN Gateway Router Firewall Intrusion prevention Wireless Hotspot Spam filter Gateway antivirus Web ApplicationSecurity WAN link balancer Loadbalancer Web filter Mobile Device Mgnt Encryption EndpointProtection
Complete Security Covering the entire security lifecycle URL Filtering Endpoint Web Protection Mobile Control Secure branch offices Virtualization Data Control • Anti-malware • Reduce attack surface Protect everywhere Keep people working Stop attacks and breaches • Anti-spam Web Application Firewall Patch Manager Application Control Device Control • Intrusion • prevention Mobile app security Visibility • Encryption • for cloud Clean up • User education • WiFi security Automation Access control Local self-help • Technical support • Firewall Encryption • Free Home use • Email • encryption • Tamper protection • Small updates • Live Protection • Performance • VPN
“Smaller budgets and limited IT resources definitely affect buying behaviours. It’s all about finding all-in-one solutions and riding out current technology to its maximum lifeline.” CRN: IT Buying Behaviours, April 2012
Two Paths to Complete Security Mid – Large Endpoint driven Small – Mid UTM driven