We think you have liked this presentation. If you wish to download it, please recommend it to your friends in any social system. Share buttons are a little bit lower. Thank you!
Presentation is loading. Please wait.
Published byCraig Garner
Modified over 3 years ago
www.redsealnetworks.com The Changing Communications Security Landscape Prem Iyer | VP of North America Channel Programs | 07/11/12
www.redsealnetworks.com Gartner: 5.6 billion worldwide mobile connections in 2011, up 11% from 5 billion in 2010; reach at least 7.4 billion by 2015 Mobile Revolution Requires Baked In Security Approach Increased Sharing of Info – Coalition Forces & Intra-Federal (IC & DOD) June 15: DoD formal device strategy, broader adoption of commercial devices, enterprise-wide approach to apps. McAfee: After many years, recent mobile malware explosion, jumped 1,200% in Q1 2012, largely around Android platform attacks. Image: U.S. Army Explosion of Devices and Apps, and New Threats © 2012 RedSeal Networks, Inc. All rights reserved. 2
www.redsealnetworks.com Continuous Monitoring Need: $202 million to expand government-wide adoption of processes and solutions in 2013 alone, including DoD. Why?: Increased complexity and constant change in network security infrastructure itself, as well as attacks, new devices, use of cloud. –Perimeters Disappeared – Protect Subnets –Adapt to Change – Agile –Network Visibility is Crucial – DoD federated mobile device strategy: Cites continuous monitoring specifically as key aspect of secure deployment and management. Image: Fedramp Security: Visibility, Monitoring and Awareness © 2012 RedSeal Networks, Inc. All rights reserved. 3
www.redsealnetworks.com New domain battlefield map Align Protection with Risk Full-time situational awareness Ability to Identify Threat Vector Maintain control via monitoring Understand exposed vulnerabilities Streamline info sharing Report metrics centrally Image: Liverpool War Museum Visibility is Key to Risk Mitigation © 2012 RedSeal Networks, Inc. All rights reserved. 4
Copyright © 2012, Oracle and/or its affiliates. All rights reserved. 1 The following is intended to outline our general product direction. It is intended.
BENEFITS OF SUCCESSFUL IT MODERNIZATION
Palo Alto Networks Jay Flanyak Channel Business Manager
CLOSE THE SECURITY GAP WITH IT SOLUTIONS FROM COMPUTACENTER AND CISCO AUGUST 2014.
Copyright © 2015 Centrify Corporation. All Rights Reserved. 1 Securing Enterprise Identities Against Cyberthreats Brian Krause Manager of North America.
1© Copyright 2012 EMC Corporation. All rights reserved. Next Generation Authentication Bring Your Own security impact Tim Dumas – Technology Consultant.
Company Confidential | ©2013 Good Technology, Inc. All Rights Reserved. Mobile Work Exchange Spring Town Hall April 30, 2013 Planning for Tomorrow’s Mobile.
No boundaries with Unified Web Security Solutions Steven Vlastra Sr. Systems Engineer - Benelux.
BYOD: An IT Security Perspective. What is BYOD? Bring your own device - refers to the policy of permitting employees to bring personally owned mobile.
© Blue Coat Systems, Inc John Yun Director, Product Marketing.
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other product or service names are the property of their respective.
Blue Coat Confidential Web and Mobile Application Controls Timothy Chiu Director of Product Marketing, Security July 2012.
© ITT Educational Services, Inc. All rights reserved. IS3220 Information Technology Infrastructure Security Unit 10 Network Security Management.
1© Copyright 2011 EMC Corporation. All rights reserved. The Future of the Advance Soc 3rd Annual Privacy, Access and Security Congress, Ottawa, 2012 Mike.
© 2012 Gigamon. All rights reserved. The Dynamic World of Threat Detection, Containment & Response 1.
SHIFTING INFORMATION SECURITY LANDSCAPE FROM C&AS TO CONTINUOUS MONITORING ANDREW PATCHAN JD, CISA ASSOCIATE IG FOR IT, FRB LOUIS C. KING, CPA, CISA, CMA,
Copyright © 2015 Centrify Corporation. All Rights Reserved. 1 Company Overview & Strategy Lance McAndrew Product Line Sales Engineer.
BYOD in practice KPMG case study 13 March © 2013KPMG Romania, a Romanian limited liability company and a member firm of the KPMG network of independent.
Mobile Security Solution Solution Overview Check Point Mobile Threat Prevention is an innovative approach to mobile security that detects and stops advanced.
Managing Risk and Enabling Business Transformation
© 2017 SlidePlayer.com Inc. All rights reserved.