Making money from network security David Strom CMP Xchange Emerging Techs October 2002.

Slides:



Advertisements
Similar presentations
TERMINAL SERVER DEPLOYMENT PLAN. STEP 1: PREPARATION  UTILIZE THE CURRENT SERVER FOR: ACTIVE DIRECTORY (AD) ACTIVE DIRECTORY (AD) NEEDED FOR STORAGE.
Advertisements

Layered Security Solutions - Simplified © 2008 Monte Robertson - CEO Layered Security Solutions – Simplified!
Firewalls By Tahaei Fall What is a firewall? a choke point of control and monitoring interconnects networks with differing trust imposes restrictions.
Top 5 Networking Innovations David Strom Technology Editor, VARBusiness XChange October 2003.
MID/jpl 5/15/ © 1999 by James P. Litchko Total BS Security: Business-based Systems Security Jim Litchko (703) ext. 310.
Introducing Kaspersky OpenSpace TM Security Introducing Kaspersky ® OpenSpace TM Security Available February 15, 2007.
Phishing (pronounced “fishing”) is the process of sending messages to lure Internet users into revealing personal information such as credit card.
Building Your Own Firewall Chapter 10. Learning Objectives List and define the two categories of firewalls Explain why desktop firewalls are used Explain.
Information Security 1 Information Security: Demo of Some Security Tools Jeffy Mwakalinga.
 Controls that provide security against internal and external threats  2 Types of access controls: › Physical controls › Logical controls.
Know the Client Own the Problem Share the Solution The 2005 Case for Information Technology Security October 14, 2004.
Data Security Issues in IR Eileen Driscoll Institutional Planning and Research Cornell University
Security Management IACT 918 July 2004 Gene Awyzio SITACS University of Wollongong.
Principles of Information Technology
Firewalls Presented By Hareesh Pattipati. Outline Introduction Firewall Environments Type of Firewalls Future of Firewalls Conclusion.
Kaspersky Open Space Security: Release 2 World-class security solution for your business.
1 Computer Security: Protect your PC and Protect Yourself.
PCM2U Presentation by Paul A Cook IT SERVICES. PCM2U Our History  Our team has been providing complete development and networking solutions for over.
© 2005,2006 NeoAccel Inc. Training Access Modes. © 2005,2006 NeoAccel Inc. Agenda 2. Access Terminals 6. Quick Access Terminal Client 3. SSL VPN-Plus.
EDUCAUSE Security 2006 Internet John Brown University.
 Norton Antivirus, developed and distributed by Symantec Corporation, provides malware prevention and removal during a subscription period. It uses signatures.
Your technology solution partner.™ Security Enterprise Protection Gener C. Tongco Product Manager CT Link Systems Inc.
Cloud Computing How secure is it? Author: Marziyeh Arabnejad Revised/Edited: James Childress April 2014 Tandy School of Computer Science.
Partnering For Profitability Growing your business with Microsoft Forefront Security Solutions Mark Hassall Director Security & Access BG Microsoft Corporation.
Network Security in a Business Setting By: Brian Haumschild.
David I. McGeown "Where's the value in on site generation? Can real time metering and dispatch make a difference?
Staying Safe. Files can be added to a computer by:- when users are copying files from a USB stick or CD/DVD - downloading files from the Internet - opening.
How to Set Effective Security Policies at Your Organization David Strom VAR Business Technology Editor June 20, 2002.
Networks and Hackers Copyright © Texas Education Agency, All rights reserved. 1.
Utility Programs Lesson Objective: Understanding the functions of an operating system. Learning Outcome: Answer some basic questions on operating systems.
BY MOHAMMED ALQAHTANI (802.11) Security. What is ? IEEE is a set of standards carrying out WLAN computer communication in frequency bands.
Cloud Computing.
Chapter 6 of the Executive Guide manual Technology.
Firewalls Nathan Long Computer Science 481. What is a firewall? A firewall is a system or group of systems that enforces an access control policy between.
Fundamentals of Information Systems, Second Edition 1 Telecommunications, the Internet, Intranets, and Extranets.
Security at NCAR David Mitchell February 20th, 2007.
Lecture 16 Page 1 Advanced Network Security Perimeter Defense in Networks: Virtual Private Networks Advanced Network Security Peter Reiher August, 2014.
Networked Information Systems Network Security. Network Physical Security File server failure can severely affect network users. Server security: Locked.
Name of Presentation T E C H N O L O G Y S O L U T I O N S G R O U P The Next Ten Big Things To Know David Strom, Technology Editor, VARBusiness Michael.
Top 5 Disruptive Technologies for MSPs David Strom MSP Alliance San Jose (310)
The State of the Firewall Art ComNET DC 2002 David Strom
G53SEC 1 Coursework Specification. G53SEC Coursework Option 1: Spam Detection and Categorisation 2.
Data Security Overview. Data Security Periphery –Firewalls –Web Filtering –Intrusion Detection & Prevention Internal –Virus Protection –Anti Spy-ware.
Project Scenario # 3 Daniel Gomez. I am the Information Systems Security Manager at Western Technical College. A virus has penetrated the network firewall.
What do you know about your network Or maybe you don’t know who’s really there.
Small Business Security Keith Slagle April 24, 2007.
Malicious Attacks By: Albert, Alex, Andon, Ben, Robert.
Module 11: Designing Security for Network Perimeters.
Computer Security Risks for Control Systems at CERN Denise Heagerty, CERN Computer Security Officer, 12 Feb 2003.
CERN - European Organization for Nuclear Research Beyond ACB – VPN’s FOCUS June 13 th, 2002 Frédéric Hemmer & Denise Heagerty- IT Division.
Brownie Girl Guides Guide to Computer Security Part1 Confused with viruses? Look no further and listen then ;)
1 Firewalls - Introduction l What is a firewall? –Firewalls are frequently thought of as a very complex system that is some sort of magical, mystical..
Systems Analysis and Design in a Changing World, 6th Edition 1 Chapter 6 Essentials of Design.
Security threats from pervasive broadband access Prof. Jim Norton Chartered Director & Chartered Engineer Senior Policy Adviser e-Business & e-Government.
World Wireless LAN Security Technologies Market Securing The Wireless Communications Revolution “Potential wireless local area network (WLAN) end-users.
“Lines of Defense” against Malware.. Prevention: Keep Malware off your computer. Limit Damage: Stop Malware that gets onto your computer from doing any.
Secure Network Connectivity Claus Jespersen Solution Architect (the new) HP
0 What Does SIP Bring to Your Customer Experience ? Extend VoIP and IP Contact Center values through support of SIP o Media and location independent support.
 client  client/server network  communication hardware  extranet  firewall  hacker  Internet  intranet  local area network (LAN)  Network 
BizSmart Lunch & Learn Webinar Information Security and Protecting your business With the increased risk of some sort of cyber- attack over the past few.
Presented By Hareesh Pattipati.  Introduction  Firewall Environments  Type of Firewalls  Future of Firewalls  Conclusion.
Lecture 19 Page 1 CS 236 Online 6. Application Software Security Why it’s important: –Security flaws in applications are increasingly the attacker’s entry.
1 What is hot, what is not in emerging technologies David Strom and Frank Ohlhorst CMP Xchange Emerging Techs October 2002.
Cosc 5/4765 NAC Network Access Control. What is NAC? The core concept: –Who you are should govern what you’re allowed to do on the network. Authentication.
Top 5 Open Source Firewall Software for Linux User
Networking Opportunities
Level 2 Diploma Unit 11 IT Security
Wireless LANs: No longer local
6. Application Software Security
Protecting your home from digital intrusion
Presentation transcript:

Making money from network security David Strom CMP Xchange Emerging Techs October 2002

Issues Network penetrations continue to climb in number, sophistication, and complexity Proliferation of spam and viruses Risk of infection rises as everything is connected Remote teleworkers and wireless networks bring their own complexities

Wireless network issues More than half of wireless networks operate with no security whatsoever “War driving” is now a popular sport WEP isn’t even that good a protocol Mostly outside of control of IT/integrator

Wireless solutions How do you know if wLANs are running? NetStumbler and AirMagnet can help! Best to make use of appliances like BlueSocket, ReefEdge, Vernier, others Need a separate firewall for wireless users to separate from main corp. net

Remote teleworker isses Your corp. net now reaches into people’s homes Your net is only as secure as your weakest link VPNs are essential to protect corp. net Yet another opportunity for resellers!

Teleworker solutions Understand how remote users are connecting to internal nets Simplify, simplify, simplify Don’t poke holes in firewalls just because users ask you -- HAVE A PLAN! Think big and deploy for the long haul

Bright spots on the security horizon Biometrics -- just beginning to take off (IBM Thinkpad and NetVista line) Anti-virus screening almost a given now VPNs and secured access to internal nets Web applications monitoring shows promise

Places of despair Secure -- still not happening Key servers and PKI -- not much better Secure database access via the web -- not really happening yet filtering software pretty grim

Panel Brian Cohen, SPIdynamics Luis Claret, Rainbow Technologies Alonzo Ellis, Imperito Networks Chris Fleck, Omnicluster Technologies

Questions for the panel Has anti-virus screening become a commodity? Is there such as thing as a secure Web server? What penetrations can resellers stop quickly? Can corporations who have firewalls operate them effectively? How can resellers find the most profitable areas for providing better security for their clients? How large a corp. to use enterprise-based anti- virus solutions? How can a VAR sell customers additional security beyond just firewalls?