© 2015 ForeScout Technologies, Page 2 Source: Identity Theft Resource Center Annual number of data breaches Breaches reported Average annual cost of security.

Slides:



Advertisements
Similar presentations
Summary of Forrester Wave
Advertisements

Bill McClanahan – Principal Business Consultant LPS Integration.

Managed Security Monitoring. 2 ©2015 EarthLink. All rights reserved. Today’s top IT concerns — sound familiar? Source: IT Security Risks 2014: A Business.
Preventing Good People From Doing Bad Things Best Practices for Cloud Security Brian Anderson Chief Marketing Officer & Author of “Preventing Good People.
©2014 Bit9. All Rights Reserved Building a Continuous Response Architecture.
© 2015 Cisco and/or its affiliates. All rights reserved. 1 The Importance of Threat-Centric Security William Young Security Solutions Architect It’s Our.
Gartner Magic Quadrant
1. 2 Oracle + Hyperion Integrated Enterprise Performance Management System Provides industry’s first EPM System Align operational intelligence with strategy:
Unstructured org looking to improve project management? Portal Enterprise Content Management Collaborative Workspaces Collaborative Workspaces Business.
Company LOGO Copyright Carrie Kerskie Data Breach & Identity Theft By Carrie Kerskie Kerskie Group, Inc.
It’s Not Your Father’s NAC: Next-generation NAC
Private vs. Public: What’s Your Risk? San Diego’s 3 rd Annual Cloud Computing Conference September 22, 2011.
Microsoft Confidential2 3 Paul Hamerman, China Martens, Forrester Research Inc., May 2011 ”Microsoft Commits to ERP in the Cloud” 4 Product-centric.
Protecting Mainframe and Distributed Corporate Data from FTP Attacks: Introducing FTP/Security Suite Alessandro Braccia, DBA Sistemi.
What Keeps You Awake at Night Compliance Corporate Governance Critical Infrastructure Are there regulatory risks? Do employees respect and adhere to internal.
May 2015 Toni Buhrke, Director Systems Engineering.
Dell Connected Security Solutions Simplify & unify.
Symantec Managed Security Services The Power To Protect Duncan Evans Director, Cyber Security Services 1.
My Sites (2003) Blogs & Wikis (2007) Kits (2008+)
Data Center Firewall. 2 Common IT Security Challenges Does my network security protect my IT environment and sensitive data and meet the regulatory compliances?
1 © 2001, Cisco Systems, Inc. All rights reserved. Cisco Info Center for Security Monitoring.
Ali Pabrai, CISSP, CSCS ecfirst, chairman & ceo Preparing for a HIPAA Security Audit.
Grants Management Training 200 Cyber Security There are two kinds of people in America today: Those who have experienced a cyber-attack and know it, and.
APolicy EASy Security Project Analysis and Recommendations for TJX Companies, Inc.
1Copyright © 2015 Blue Coat Systems Inc. All Rights Reserved. BLUE COAT SYSTEMS CORPORATE OVERVIEW May 2015.
Availability for the modern datacenter. The Era of the “Always-On Business” ™
Mail2Cloud Case Study Crescent Electric Supply Company mxHero Solves for Large s & Drives Cloud Adoption 1 Copyright 2016, mxHero Inc.March 8, 2016.
© 2011 IBM Corporation IBM Security Services Smarter Security Enabling Growth and Innovation Obbe Knoop – Security Services Leader Pacific.
Riverbed Confidential. Riverbed – RVBD 22,000+ Customers $1 BILLION Revenue Market Leader * Performance Management * WAN Optimization * Cloud Storage.
SemiCorp Inc. Presented by Danu Hunskunatai GGU ID #
Why IT auditing is a must in your security strategy ?
Palo Alto Networks - Next Generation Security Platform
Kevin Watson and Ammar Ammar IT Asset Visibility.
1 ©2010 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice SIMPLIFY command of the data center.
IDC Says, "Don't Move To The Cloud" Richard Whitehead Director, Intelligent Workload Management August, 2010 Ben Goodman Principal.
Gartner Magic Quadrants
SQL Server 2016: Everything built-in The above graphics were published by Gartner, Inc. as part of a larger research document and should be evaluated in.
Tripwire Threat Intelligence Integrations. 2 Threat Landscape by the Numbers Over 390K malicious programs are found every day AV-Test.org On day 0, only.
Copyright © 2015 Centrify Corporation. All Rights Reserved. 1 Securing Enterprise Identities Against Cyberthreats Brian Krause Manager of North America.
Next Step in Cyber Defense & Response Len Rosenberg, VP of Systems Engineering.
BI and EPM Market Leadership Slides
ABC Company Positioned as a Magic Quadrant Leader
Transform IT with networking innovation Dell Networking
Reduce Risk Across Hybrid IT
The Game has Changed… Ready or Not! Ted Lee
The Game has Changed… Ready or Not! Ted Lee
Protect your Digital Enterprise
Reduce Risk Across Hybrid IT
Market Growth Context – Where would you bet your company’s future?
Self-service BI per user
Cloud Firewall.
The Game has Changed… Ready or Not! Andrew Willetts Technologies, Inc.
The Game has Changed… Ready or Not! Ted Lee
Real-time protection for web sites and web apps against ATTACKS
Network Access Control 101 Securing the Critical Edge of Your Network
Improving Azure IoT Insights with network context
Reduce Risk Across Hybrid IT
Unfortunately, any small business could face the risk of a data breach or cyber attack. Regardless of how big or small your business is, if your data,
Network Access Control 101 Securing the Critical Edge of Your Network
Improving Azure IoT Insights with network context
11/17/2018 9:32 PM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
Analytical Software for Fraud Detection
Partners with Dynamics practices are showing an upward trend in both services (+17%) and software (+29%) revenues, compared with partners who.
Securing the Threats of Tomorrow, Today.
Power BI and SharePoint – the road ahead
STEALTHbits Technologies, Inc.
AIR-T11 What We’ve Learned Building a Cyber Security Operation Center: du Case Study Tamer El Refaey Senior Director, Security Monitoring and Operations.
Anatomy of a Common Cyber Attack
Presentation transcript:

© 2015 ForeScout Technologies, Page 2 Source: Identity Theft Resource Center Annual number of data breaches Breaches reported Average annual cost of security incidents Regulatory mandates PCI HIPAA HITECH NIST SOX NERC $ 5.9 million $ 3.9 million Source: 2015 Global State of Information Security Survey, PwC Among companies with revenues over $1 billion

© 2015 ForeScout Technologies, Page 3 76 Million Households affected Hackers took over a remote server the bank failed to properly update 21m government employees identities stolen OPM did not maintain a comprehensive inventory of servers, databases and network devices 11m customers’ medical and financial data stolen Premera’s network security procedures were inadequate Cyber attack could cost as much as $100 million Disabled the antivirus in the target machines without detection 80m customer records stolen “Suspicious” administrator activity went unnoticed for months “44 percent of known breaches came from vulnerabilities that are 2 to 4 years old” HP Cyber Risk Report million addresses and 56 million credit cards Attackers used stolen vendor credential to access critical systems The Home Depot

© 2015 ForeScout Technologies, Page 4 Managed Devices Unmanaged Devices Source: Gartner, BI Intelligence, Verizon, ForeScout Less than 10% of new devices connecting to the corporate environment will be manageable through traditional methods By 2020: 20+ Billion Unmanaged Connected Devices Dec 2014: “Within two years, 90% of all IT networks will have an IoT-based security breach”

© 2015 ForeScout Technologies, Page 5 Security products are silos. Human beings are needed to compensate for lack of automation. SecOps teams are overwhelmed and cannot respond in timely fashion. FIREWALL SIEMATDVA ENDPOINT PATCHEMM IBM “70 to 90 percent of all malicious incidents could have been prevented or found sooner if existing logs and alerts had been monitored” Verizon Data Breach Investigations Report “Average time to contain a cyber attack is 31 days” Ponemon Institute “2014 Global Report on the Cost of Cyber Crime”

© 2015 ForeScout Technologies, Page 6

© 2015 ForeScout Technologies, Page 7 Not VisibleVisible Visible with IoT ManagedUnmanaged DIRECTORIES PATCH SIEM ATD VA EMM OTHER Computing Devices Network Devices Applications Antivirus out-of-date Broken agent Vulnerability Continuous Agentless

© 2015 ForeScout Technologies, Page 8 Users EndpointsNetwork Existing IT INFORM ADJUST ALERT SEGMENT Automated Policy-driven

© 2015 ForeScout Technologies, Page 9 Automate workflows Share context IBM ControlFabric Open APIs

© 2015 ForeScout Technologies, Page 10 FIREWALL SIEMATDVA ENDPOINT PATCHEMM Network Infrastructure Managed DevicesBYOD DevicesRogue DevicesIoT Devices Network Internet 1 1 See corporate, BYOD, IoT, rogue devices Detect transient devices and trigger real-time vulnerability scans Automate enrollment for guests and BYOD including mobile devices Find and fix vulnerabilities and security problems on managed endpoints 5 Rapidly respond to incidents, without human intervention Control network access based on user, device, policy 6 IBM Directories

© 2015 ForeScout Technologies, Page 11 FIREWALL SIEMATDVA ENDPOINT PATCHEMM Network Infrastructure Managed DevicesBYOD DevicesIoT Devices Network Internet See corporate, BYOD, IoT, rogue devices Detect transient devices and trigger real-time vulnerability scans Automate enrollment for guests and BYOD including mobile devices Find and fix vulnerabilities and security problems on managed endpoints 5 Rapidly respond to incidents, without human intervention Control network access based on user, device, policy Rogue Devices IBM Directories

© 2015 ForeScout Technologies, Page 12 FIREWALL SIEMATDVA ENDPOINT PATCHEMM Network Infrastructure Managed DevicesBYOD DevicesRogue DevicesIoT Devices Network Internet See corporate, BYOD, IoT, rogue devices Detect transient devices and trigger real-time vulnerability scans Automate enrollment for guests and BYOD including mobile devices Find and fix vulnerabilities and security problems on managed endpoints 5 Rapidly respond to incidents, without human intervention Control network access based on user, device, policy 6 3 IBM Directories

© 2015 ForeScout Technologies, Page 13 FIREWALL SIEMATD ENDPOINT PATCHEMM Network Infrastructure Managed DevicesBYOD DevicesRogue DevicesIoT Devices Network Internet See corporate, BYOD, IoT, rogue devices Detect transient devices and trigger real-time vulnerability scans Automate enrollment for guests and BYOD including mobile devices Find and fix vulnerabilities and security problems on managed endpoints 5 Rapidly respond to incidents, without human intervention Control network access based on user, device, policy 6 4 IBM Directories VA

© 2015 ForeScout Technologies, Page 14 EMM Network Infrastructure Managed DevicesBYOD DevicesIoT Devices Network Internet See corporate, BYOD, IoT, rogue devices Detect transient devices and trigger real-time vulnerability scans Automate enrollment for guests and BYOD including mobile devices Find and fix vulnerabilities and security problems on managed endpoints 5 Rapidly respond to incidents, without human intervention Control network access based on user, device, policy 6 5 FIREWALL SIEMATDVA ENDPOINT PATCH IBM Directories

© 2015 ForeScout Technologies, Page 15 FIREWALL SIEMATDVA ENDPOINT PATCHEMM Network Infrastructure Managed DevicesBYOD DevicesIoT Devices Network Internet See corporate, BYOD, IoT, rogue devices Detect transient devices and trigger real-time vulnerability scans Automate enrollment for guests and BYOD including mobile devices Find and fix vulnerabilities and security problems on managed endpoints 5 Rapidly respond to incidents, without human intervention Control network access based on user, device, policy 6 6 IBM Directories

© 2015 ForeScout Technologies, Page 16 Real-time visibility No gaps No agents Broad range of responses User Network Endpoint Existing IT systems Information sharing and automation Reduce security fragmentation Speed incident response

© 2015 ForeScout Technologies, Page 17 *Magic Quadrant for Network Access Control, December 2014, Gartner Inc. *This graphic was published by Gartner, Inc. as part of a larger research document and should be evaluated in the context of the entire document. The Gartner document is available upon request from ForeScout. Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner's research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose. Gartner "Magic Quadrant for Network Access Control,” Lawrence Orans and Claudio Neiva, December 10, 2014.

© 2015 ForeScout Technologies, Page 18 Questions

© 2015 ForeScout Technologies, Page 19