Presentation is loading. Please wait.

Presentation is loading. Please wait.

How to Integrate Security Tools to Defend Data Assets Robert Lara Senior Enterprise Solutions Consultant, GTSI.

Similar presentations


Presentation on theme: "How to Integrate Security Tools to Defend Data Assets Robert Lara Senior Enterprise Solutions Consultant, GTSI."— Presentation transcript:

1 How to Integrate Security Tools to Defend Data Assets Robert Lara Senior Enterprise Solutions Consultant, GTSI

2 Proactive Security Model Map Architecture Digital Asset ID Profile Model Identify Vulnerabilities Standardize Policies Incident Response Training Risk Assessment

3 Defense in Depth Strategy Multiple (overlapping) Layers Narrow “windows” of access per layers High Fault tolerance Always assume that the higher layer will fail

4 Defense in Depth Strategy Perimeter Defenses Network Defenses Host Defenses Application Defenses Data and Resources

5 Defense in Depth Strategy Perimeter Defenses Physical Access Control Remote video monitoring Essential personnel access only Network Defenses VLAN access control lists Firewall (Zones) Auditing Packet Inspection / Intrusion Detection Host Defenses Server hardening Auditing and host intrusion detection Packet filtering

6 Defense in Depth Strategy Application Defenses Validation Checks Verify HTML & Cookies source Secure Web Services Data and Resources Authentication method Data encryption Services Account

7 Securing Virtualization in Data Centers VMM or Hypervisor VMM or Hypervisor Hardware Integrated Security VM Integrated Security VM App OS Next-Generation Virtualization Security: Control virtual machine Control virtual machine management - Hypervisor Security VM Features: Centralized network protection VM NAC, assessment, and control Hypervisor Security: Hypervisor attestation (Trusted Platform Module, or TPM) VM attestation (vTPM) Guest VM Guest VM Guest VM Guest VM Mgmt Network Protection (IPS/FW) Host Protection (AV/HIPS) Policy-Based MAC NAC, Assessment & Control TPM Security APIs vTPM FinanceEngineering 7

8 Topological View

9 3-D Visualization

10 Role-Based Dashboard Situational Awareness Enterprise Focused

11 Top Five Recommendations 1.Vulnerability scans 2.Patch management 3.Multi-layered security 4.Policy refresh 5.Integration of logical and physical controls

12 Thought for the day Perfection is achieved, not when there is nothing more to add, but when there is nothing left to take away. Antoine De Saint-Exupery (1900-1944)

13 THANK YOU Rob Lara Robert.Lara@GTSI.com


Download ppt "How to Integrate Security Tools to Defend Data Assets Robert Lara Senior Enterprise Solutions Consultant, GTSI."

Similar presentations


Ads by Google