Is technology ubiquity a chance to re-connect security? Greg Day Director of Security Strategy.

Slides:



Advertisements
Similar presentations
October 10-13, 2006 San Diego Convention Center, San Diego California VoIP/SOA Integration Impact on IT Apps, Processes, & Overall Business.
Advertisements

Unified Communications Bill Palmer ADNET Technologies, Inc.
What is Infrastructure Optimisation and Why should you care?
Network Systems Sales LLC
IBM SMB Software Group ® ibm.com/software/smb Maintain Hardware Platform Health An IT Services Management Infrastructure Solution.
IBM DEVELOP, NETWORK, PROMOTE & GROW Cloud Transformation: What are the risks, pitfalls and challenges to be addressed? Steve Strutt, CTO Cloud Computing,
Palo Alto Networks Jay Flanyak Channel Business Manager
2  Industry trends and challenges  Windows Server 2012: Modern workstyle, enabled  Access from virtually anywhere, any device  Full Windows experience.
2  Industry trends and challenges  Windows Server 2012: Modern workstyle, enabled  Access from virtually anywhere, any device  Full Windows experience.
Windows Server Deployment and Management With System Center.
1 Dell World 2014 Dell & Trend Micro Boost VM Density with AV Designed for VDI TJ Lamphier, Sr. Director Trend Micro & Aaron Brace, Solution Architect.
New Solutions to New Threats. The Threats, They Are A Changing Page 2 | © 2008 Palo Alto Networks. Proprietary and Confidential.
Architecting and Building a Secure and Compliant Virtual Infrastructure and Private Cloud Rob Randell, CISSP, CCSK Principal Systems Engineer – Security.
System Center 2012 R2 Overview
What’s New: Windows Server 2012 R2 Tim Vander Kooi Systems Architect
The future of Desktops Transform Your Desktop with Virtualization.
Blue Coat Systems Securing and accelerating the Remote office Matt Bennett.
Unified Logs and Reporting for Hybrid Centralized Management
Citrix Partner Update The Citrix Delivery Centre.
Symantec Vision and Strategy for the Information-Centric Enterprise Muhamed Bavçiç Senior Technology Consultant SEE.
The Evolution of the Kaspersky Lab Approach to Corporate Security Petr Merkulov, Chief Product Officer, Kaspersky Lab Kaspersky Lab Cyber Conference, Cancun,
by Evolve IP Managed Services
© Centrify Corporation. All Rights Reserved. Unified Identity Management across Data Center, Cloud and Mobile.
Security Risk Management Marcus Murray, CISSP, MVP (Security) Senior Security Advisor, Truesec
IT-Partners Limited © 2011 IT Partners Limited Y OUR IT SOLUTION P ARTNERS Managing Director Confidential Data Loss Prevention Sunny Ho 1.
Copyright 2009 Trend Micro Inc. OfficeScan 10.5 VDI-aware endpoint security.
© 2009 IBM Corporation Delivering Quality Service with IBM Service Management April 13 th, 2009.
The Citrix Delivery Center. 2 © 2008 Citrix Systems, Inc. — All rights reserved Every Day, IT Gets More Complex EMPLOYEES PARTNERS CUSTOMERS.
Successful Deployment and Solid Management … Close Relatives Tim Sinclair, General Manager, Windows Enterprise Management.
Dell Connected Security Solutions Simplify & unify.
©2014 Bit9. All Rights Reserved Endpoint Threat Prevention Charles Roussey | Sr. Sales Engineer Detection and Response in Seconds.
What is Driving the Virtual Desktop? VMware View 4: Built for Desktops VMware View 4: Deployment References…Q&A Agenda.
Copyright © 2015 Centrify Corporation. All Rights Reserved. 1 Secure & Unified Identity for End Users & Privileged Users.
The Infrastructure Optimization Journey Kamel Abu Ayash Microsoft Corporation.
Uwe Lüthy Solution Specialist, Core Infrastructure Microsoft Corporation Integrated System Management.
Network security Product Group 2 McAfee Network Security Platform.
DaaS (Desktop as a Service) Last Update: July 15 th, 2015.
Securely Synchronize and Share Enterprise Files across Desktops, Web, and Mobile with EasiShare on the Powerful Microsoft Azure Cloud Platform MICROSOFT.
2015 Security Conference Dave Gill Intel Security.
Data Center Management Microsoft System Center. Objective: Drive Cost of Data Center Management 78% Maintenance 22% New Issue:Issue: 78% of IT budgets.
User and Device Management
Minimising IT costs, maximising operational efficiency IO and NIMM: Now is the time Glyn Knaresborough Director of Strategic Consulting.
Infrastructure for the People-Ready Business. Presentation Outline POINT B: Pro-actively work with your Account manager to go thru the discovery process.
Get Full Protection on Microsoft Azure with Symantec™ Endpoint Protection 12.1 MICROSOFT AZURE ISV PROFILE: SYMANTEC Symantec™ Endpoint Protection is an.
Clouding with Microsoft Azure
OIT Security Operations
Service Assurance in the Age of Virtualization
Univa Grid Engine Makes Work Management Automatic and Efficient, Accelerates Deployment of Cloud Services with Power of Microsoft Azure MICROSOFT AZURE.
Device Maintenance and Management, Parental Control, and Theft Protection for Home Users Made Easy with Remo MORE and Power of Azure MICROSOFT AZURE APP.
Hybrid Management and Security
Real-time protection for web sites and web apps against ATTACKS
Threat Management Gateway
Speaker’s Name, SAP Month 00, 2017
Virtualization & Security real solutions
Secure & Unified Identity
Built on the Powerful Microsoft Azure Platform, Lievestro Delivers Care Information, Capacity Management Solutions to Hospitals, Medical Field MICROSOFT.
McAfee Security Connected – Next Generation Security
BOMGAR REMOTE SUPPORT Karl Lankford
Replace with Application Image
Logsign All-In-One Security Information and Event Management (SIEM) Solution Built on Azure Improves Security & Business Continuity MICROSOFT AZURE APP.
ResourceFirst Puts Emphasis on Communication, Uses Power of Azure to Bring Successful Resource and Portfolio Management to Companies Globally MICROSOFT.
On-Premises, or Deployed in a Hybrid Environment
DeFacto Planning on the Powerful Microsoft Azure Platform Puts the Power of Intelligent and Timely Planning at Any Business Manager’s Fingertips Partner.
Data Security for Microsoft Azure
Unitrends Enterprise Backup Solution Offers Backup and Recovery of Data in the Microsoft Azure Cloud for Better Protection of Virtual and Physical Systems.
Datacastle RED Delivers a Proven, Enterprise-Class Endpoint Data Protection Solution that Is Scalable to Millions of Devices on the Microsoft Azure Platform.
Healthcare Cloud Security Stack for Microsoft Azure
BluSync by ParaBlu Offers Secure Enterprise File Collaboration and Synchronization Solution That Uses Azure Blob Storage to Enable Secure Sharing MICROSOFT.
Guarantee Hyper-V, System Center Performance and Autoscale to Microsoft Azure with Application Performance Control System from VMTurbo MICROSOFT AZURE.
Presentation transcript:

Is technology ubiquity a chance to re-connect security? Greg Day Director of Security Strategy

The changing technology landscape Circa 50% Source: Citi Investment Research and Analysis (support iPads) 150m a year (2015) Source: Ovum Q m 12.1m Source: Circa 50% Source: IDC, Data is freely intermingle d

What risks do they really bring? Banking services already targeted –Authentication –Vulnerabilities in the apps Heavily used for social networking Apps stores add revenue –10,000,000,000+ downloads to date! –Worth billions per year! Less than 1000 viruses today due to diversity

Enterprise and LOB Apps Web and Social Media Basic Services Customer Facing Apps Mobile Enterprise Apps are Rapidly Evolving What are your long term goals?

Approaches to Security on Smart Devices Segregate data (inc wipe) Secure 3 rd party apps Security controls Sandbox Full device Mitigate on device attacks

Integration of Smart devices to your existing security strategy - Enterprise Mobile Manager Database Files Directory Applications Certificate Services Messaging Enterprise Environment Windows Mobile Symbian Android webOS iPhone iPad McAfee EMM IT Ops Support Provisioning Compliance Policy Management Security & Authentication Mobile Device Management

Virtualization Enables technology ubiquity Expect 50% of the enterprise data centers workloads to be virtualized by the end of 2012 (Gartner) –Go green, decrease datacenter footprint, improve utilization –Enables faster response reducing application deployment and migration times But Gartner report that –Through 2012, 60% of virtualized servers will be less secure than the physical servers they replace, dropping to 30% by YE15 –40% of virtualization deployment projects were undertaken without involving the information security team in the initial architecture and planning Hypervisor VM

Secure Virtualization Challenges How can I ease management across physical and virtualized environments? Virtual images built on the fly redefine the notion of an asset Virtualized systems are no longer systems, they become data Security impacts performance Compliance and operational procedures l ess defined Lack of support for live-migration Endpoint security not designed for VDI Excessive resource utilization is slowing adoption Virtualized Desktops Virtualized Servers

Is your security utilizing the advantages of technology? MOVE (McAfee Optimized Virtual Environments ) Move security processing out of each VM – Offloading Optimized with the Hypervisor to address scalability Enables planned capacity ~60% more VDI density Integrated management, responsive user experience, supporting persistent and non-persistent desktops Hypervisor VM MOVE Virtual Appliance MOVE Server McAfee EPO Cache Synchronization Protocol Cloud Threat Intel (GTI) Scan Engine

Changing the way we apply security in the future Application Control Dynamic whitelisting Trusted applications Trusted sources Memory Protection No Updates Change Control Change configuration audit File Integrity Monitoring and Change Prevention Prevents “compliance drift” Keep the bad stuff out Stop unauthorized apps “Greater protection, faster time to compliance, lower cost” Deny unauthorized changes Enforce change policy Integrity Control = Application Control + Change Control

Security Management The Problem Security Dashboard Modestly Helpful  Decision-making still manual  Based on human correlation of available information Net Result  Dramatic increase in Information Risk and Costs to secure Security Purchases are Tactical  Patchwork of independent products  Requiring separate management Threats Overwhelm Existing Approach  Many product types and security layers  Can’t continue to add resources to manage new events, products

Leads to Proliferation of Security Management Consoles and Reporting Tools Anti-virus Management Tools 1 Network Access Control Management Tools 8 Anti-spyware Management Tools 2 Host Intrusion Prevention Management Tools 7 Desktop Firewall Management Tools 3 Data Protection (DLP, Encryption, etc.) Management Tools 6 Policy Auditing Management Tools 4 Web Security Management Tools 5 Security Landscape

A Re-connection strategy: Security Connected

Optimizing a Security Architecture Requires / Centralized security management Open platform for centralized management and maximum interoperability / Real-time Threat Intelligence Actionable protection with the delivery of correlated threat intelligence and immediate visibility into enterprise-wide security posture / Multi-layered protection Effective and efficient defense in depth provided by multi-layered security approach / Automated compliance Compliance-ready solutions which streamline prioritization of threat responses, reporting, policy and risk management

McAfee Global Threat intelligence - Intelligent Connected Security via the Cloud Firewall IPS DLPWebAWL ePO AV File Reputation Web Reputation Web Categorization Network Connection Reputation Message Reputation Vulnerability Information Threat Intelligence Feeds Other feeds & analysis ServersFirewallsEndpointsAppliances Mobile

PROTECTION REAL TIME THREAT FEEDS (GTI) ACTIONABLE INFORMATION SECURITY METRICS ePO DLP Web IPSSIA Endpoint White Listing Encrypt. Risk Mgmt Firewall Security Optimization Security Management Platform: ePO Executive Security Admin IT Architect Security Management Platform

Real Business Risk Assessment ““3,000 to 30” – Countermeasure aware risk management correlates MTIS threat feeds with discovered vulnerabilities, assets, and deployed countermeasures (intrusion protection, anti-virus, buffer overflow) Leverages GTI threat advisory information, delivered by MTIS feed Risk = (Threat X Vulnerability X Asset)/Detailed Countermeasure 17

McAfee’s Open Platform for Security Risk Management Industry Leadership to Drive Better Protection, Greater Compliance and Lower TCO SIA Associate Partner SIA Technology Partner (McAfee Compatible)

Cost Model of Enterprise Security 19 RISK OPTIMIZATION Optimized spend ~4% with very low risk Compliant/Proactive spend ~8% of IT budget on security Medium risk Reactive spend ~3% of IT budget on security High risk Why has it been so challenging to reduce risk? DYNAMIC Predictive and agile, the enterprise instantiates policy, illuminates events and helps the operators find, fix and target for response. Tools Based Applying tools and technologies to assist people in reacting faster REACTIVE & Manual People only. No tools or processes. “Putting out fires”.

Greg Day Director of Security Strategy, EMEA McAfeeGregDay