We think you have liked this presentation. If you wish to download it, please recommend it to your friends in any social system. Share buttons are a little bit lower. Thank you!
Presentation is loading. Please wait.
Published byCraig Garner
Modified over 2 years ago
www.redsealnetworks.com The Changing Communications Security Landscape Prem Iyer | VP of North America Channel Programs | 07/11/12
www.redsealnetworks.com Gartner: 5.6 billion worldwide mobile connections in 2011, up 11% from 5 billion in 2010; reach at least 7.4 billion by 2015 Mobile Revolution Requires Baked In Security Approach Increased Sharing of Info – Coalition Forces & Intra-Federal (IC & DOD) June 15: DoD formal device strategy, broader adoption of commercial devices, enterprise-wide approach to apps. McAfee: After many years, recent mobile malware explosion, jumped 1,200% in Q1 2012, largely around Android platform attacks. Image: U.S. Army Explosion of Devices and Apps, and New Threats © 2012 RedSeal Networks, Inc. All rights reserved. 2
www.redsealnetworks.com Continuous Monitoring Need: $202 million to expand government-wide adoption of processes and solutions in 2013 alone, including DoD. Why?: Increased complexity and constant change in network security infrastructure itself, as well as attacks, new devices, use of cloud. –Perimeters Disappeared – Protect Subnets –Adapt to Change – Agile –Network Visibility is Crucial – DoD federated mobile device strategy: Cites continuous monitoring specifically as key aspect of secure deployment and management. Image: Fedramp Security: Visibility, Monitoring and Awareness © 2012 RedSeal Networks, Inc. All rights reserved. 3
www.redsealnetworks.com New domain battlefield map Align Protection with Risk Full-time situational awareness Ability to Identify Threat Vector Maintain control via monitoring Understand exposed vulnerabilities Streamline info sharing Report metrics centrally Image: Liverpool War Museum Visibility is Key to Risk Mitigation © 2012 RedSeal Networks, Inc. All rights reserved. 4
Copyright © 2012, Oracle and/or its affiliates. All rights reserved. 1 The following is intended to outline our general product direction. It is intended.
DOD IT MODERNIZATION ENABLING AGILE, SECURE, EFFICIENT, AND EFFECTIVE DOD IT For more information go to dodcio.defense.gov/ITModernization (*website not.
Palo Alto Networks Jay Flanyak Channel Business Manager
CLOSE THE SECURITY GAP WITH IT SOLUTIONS FROM COMPUTACENTER AND CISCO AUGUST 2014.
Copyright © 2015 Centrify Corporation. All Rights Reserved. 1 Securing Enterprise Identities Against Cyberthreats Brian Krause Manager of North America.
1© Copyright 2012 EMC Corporation. All rights reserved. Next Generation Authentication Bring Your Own security impact Tim Dumas – Technology Consultant.
Company Confidential | ©2013 Good Technology, Inc. All Rights Reserved. Mobile Work Exchange Spring Town Hall April 30, 2013 Planning for Tomorrow’s Mobile.
No boundaries with Unified Web Security Solutions Steven Vlastra Sr. Systems Engineer - Benelux.
BYOD: An IT Security Perspective. What is BYOD? Bring your own device - refers to the policy of permitting employees to bring personally owned mobile.
© Blue Coat Systems, Inc John Yun Director, Product Marketing.
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other product or service names are the property of their respective.
Blue Coat Confidential Web and Mobile Application Controls Timothy Chiu Director of Product Marketing, Security July 2012.
© ITT Educational Services, Inc. All rights reserved. IS3220 Information Technology Infrastructure Security Unit 10 Network Security Management.
1© Copyright 2011 EMC Corporation. All rights reserved. The Future of the Advance Soc 3rd Annual Privacy, Access and Security Congress, Ottawa, 2012 Mike.
© 2012 Gigamon. All rights reserved. The Dynamic World of Threat Detection, Containment & Response 1.
SHIFTING INFORMATION SECURITY LANDSCAPE FROM C&AS TO CONTINUOUS MONITORING ANDREW PATCHAN JD, CISA ASSOCIATE IG FOR IT, FRB LOUIS C. KING, CPA, CISA, CMA,
Copyright © 2015 Centrify Corporation. All Rights Reserved. 1 Company Overview & Strategy Lance McAndrew Product Line Sales Engineer.
BYOD in practice KPMG case study 13 March © 2013KPMG Romania, a Romanian limited liability company and a member firm of the KPMG network of independent.
Mobile Security Solution Solution Overview Check Point Mobile Threat Prevention is an innovative approach to mobile security that detects and stops advanced.
Managing Risk and Enabling Business Transformation
Dell Connected Security Solutions Simplify & unify.
Strong Security for Your Weak Link: Implementing People-Centric Security Jennifer Cheng, Director of Product Marketing.
| © 2013 Axway | All rights reserved. 1 Govern the Flow of Data: Moving from Chaos to Control Steve Jordan Director, Industry Marketing.
Small Business Solutions Copyright 2014 Trend Micro Inc.
Is technology ubiquity a chance to re-connect security? Greg Day Director of Security Strategy.
Latest Strategies for IT Security Margaret Myers Principal Director, Deputy CIO United States Department of Defense North American Day 2006.
SCRUB: Secure Computing Research for Users’ Benefit David Wagner 1.
A Comprehensive Guide to Mobile Targeted Attacks (and What Can You Do About It) Ohad Bobrov, CTO twitter.com/LacoonSecurity.
Mobilize employees, field workers, and business partners with layered security infrastructure for mobile apps, Fiori apps, content, and devices Andreas.
1Copyright © 2015 Blue Coat Systems Inc. All Rights Reserved. BLUE COAT SYSTEMS CORPORATE OVERVIEW May 2015.
Current impacts of cloud migration on broadband network operations and businesses David Sterling Partner, i 3 m 3 Solutions.
Network security Product Group 2 McAfee Network Security Platform.
Bomgar Product Strategy SECURE REMOTE SUPPORT FOR THE MOBILE ENTERPRISE © 2011 Bomgar Corporation | CONFIDENTIAL BOMGAR Solution Overview Stuart McGregor.
© 2016 ForgeRock. All rights reserved. Lars Gunnar Tiben – Senior Customer Engineer Nordic
Protection of Transportation Infrastructure from Cyber Attacks EXECUTIVE BRIEFING.
Geneva, Switzerland, 17 October 2011 ITU Workshop on Service Delivery Platforms (SDP) for Telecommunication Ecosystems: from todays realities to requirements.
Device Evolution Greg Pelton Chief Technology Officer Avaya Government Solutions.
This presentation, including any supporting materials, is owned by Gartner, Inc. and/or its affiliates and is for the sole use of the intended Gartner.
OnlineOn Premises Hybrid Cloud on your terms Messaging Voice & Video Content Management Enterprise Social Reporting & Analytics Best experience across.
CUTTING COMPLEXITY – SIMPLIFYING SECURITY INSERT PRESENTERS NAME HERE XXXX INSERT DATE OF EVENT HERE XXXX.
Protecting High-Value Applications: A New Approach John Westerman.
Didzis Balodis, CISSP, Head of IT Security and Infrastructure at SQUALIO Using the Cloud - practical security implications.
Securing Emerging Mobile Technology JOHN G. LEVINE PH.D. D/CHIEF ARCHITECTURE GROUP 13 SEP
Understanding the benefits and the risks. Presented by Corey Nachreiner, CISSP BYOD - Bring Your Own Device or Bring Your Own Danger?
Emerging Security Trends & Technologies Presented by Santhosh Koratt Head Consulting & Compliance SecureSynergy Pvt.Ltd.
Asif Jinnah Microsoft IT – United Kingdom. Security Challenges in an ever changing landscape Evolution of Security Controls: Microsoft’s Secure Anywhere.
Norman M. Sadeh, Ph.D. Smart Phone Security & Privacy: What Should We Teach Our Users …and How? Professor, School of Computer Science Director, Mobile.
© 2014 Level 3 Communications, LLC. All Rights Reserved. Proprietary and Confidential. Polycom event Security Briefing 12/03/14 Level 3 Managed Security.
© Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. Hewlett-Packard.
© 2015 IBM Corporation John Guidone Account Executive IBM Security IBM MaaS360.
© 2017 SlidePlayer.com Inc. All rights reserved.