Addressing the Cyber-Security Landscape

download Addressing the Cyber-Security Landscape

If you can't read please download the document

Transcript of Addressing the Cyber-Security Landscape

1. Addressing the Cyber- Security Landscape ePlus Security 2. AddressingtheCyber-SecurityLandscape ePlusSecurity According to the Cisco 2015 Annual Security Report: Security is no longer a question of if a network will be compromised. Every network will, at some point, be compromised. What will an organization do then? And if security staff knew the network was going to be compromised, would it approach security differently? ePlus Securitys answer: Provide for a Secure Perimeter and Secure Data 3. AddressingtheCyber-SecurityLandscape ePlusSecurity ePlus Security + Secure Perimeter Solutions + Secure Data Solutions + Secure Services SECURE DATA SECURE PERIMETER SECURE SERVICES 4. AddressingtheCyber-SecurityLandscape ePlusSecurity Data Center Evolution Lets explore how data centers have transformed. We started with a simple architecture + Physical server environment + Dedicated databases + Applications available to end user desktops + All sitting on the network NETWORK Employee Desktop NETWORK Database PHYSICAL ENVIRONMENT Web App App Web App App 5. AddressingtheCyber-SecurityLandscape ePlusSecurity Data Center Evolution Then came the Internet: + Web and email became critical day-to-day applications + New security risks emerged + Firewalls were implemented to protect assets Database PHYSICAL ENVIRONMENT NETWORK FIREWALL Web App App Web App App Email Gateway Web Gateway Employee Desktop 6. AddressingtheCyber-SecurityLandscape ePlusSecurity Data Center Evolution The complexities increased: + Trusted business connections + Virtualized environments + Remote workforces + Mobile devices + Cloud solutions + BYOD Database NETWORK IDACCESSMANAGEMENT FIREWALL CloudSolutions Email Internet Mobile Employee Desktop TrustedThirdParty Forensics Desktop VIRTUAL OR PHYSICAL ENVIRONMENT SECURITY OPERATIONS DATA CENTER Web App App Web App App 7. AddressingtheCyber-SecurityLandscape ePlusSecurity BYOD Todays Reality ANTI- VIRUS MALWARE WEB FILTERING VULNERABLE SCANNING DLP DLP DLP THREAT ANALYSIS IDENTITY & ACCESS CONTROL APT MDM WAF NGFW ENCRYPTION ANTI SPAM END POINT SECURITY SEIM PERIMETER DEFENSE 8. AddressingtheCyber-SecurityLandscape ePlusSecurity Secure Perimeter In a world where + The perimeter has effectively dissolved and manifests itself anywhere data is accessed + Access control, identify, and deep packet inspection span across traditional, mobile, and cloud access We need to secure + The access and transmission of electronic data + All methods of transport (to/from data centers and cloud solutions) Database NETWORK IDACCESSMANAGEMENT FIREWALL CloudSolutions Email Internet Mobile EmployeeDesktop TrustedThirdParty Forensics Desktop VIRTUAL OR PHYSICAL ENVIRONMENT SECURITY OPERATIONS DATA CENTER Web App App Web App App SECURE PERIMETER 9. AddressingtheCyber-SecurityLandscape ePlusSecurity ePlus Secure Perimeter Solutions + Help address the challenge of point products + Leverage talented strategists and architects for design and implementation + Securely enable your business 10. AddressingtheCyber-SecurityLandscape ePlusSecurity ePlus Secure Perimeter Solutions + Firewalls + Intrusion Prevention Systems + Anti-Malware + Web and Email Gateways + Endpoint + Mobile + Cloud 11. AddressingtheCyber-SecurityLandscape ePlusSecurity Secure Data + Information Security is all about the data + Align defenses as close to the data as possible - Secure applications and databases - Encrypt data in motion and at rest - Provide deep packet inspection within physical, virtual, and cloud environments Database NETWORK IDACCESSMANAGEMENT FIREWALL CloudSolutions Email Internet Mobile EmployeeDesktop TrustedThirdParty Forensics Desktop VIRTUAL OR PHYSICAL ENVIRONMENT SECURITY OPERATIONS DATA CENTER Web App App Web App App SECURE PERIMETER SECURE DATA 12. AddressingtheCyber-SecurityLandscape ePlusSecurity ePlus Secure Data Solutions + Leverage security technologies designed for todays virtualized data centers + Benefit from the nations leading data center architects and engineers + Align security into your applications development and operations 13. AddressingtheCyber-SecurityLandscape ePlusSecurity ePlus Secure Data Solutions + Web Application Firewalls + Identity and Access Control + Security Event and Incident Management (SEIM) + Database Monitoring + Encryption + Data Loss Prevention 14. AddressingtheCyber-SecurityLandscape ePlusSecurity ePlus Secure Services + Provide all the pieces to the Infosec puzzle + Tailored to meet the demands of your industry + Align seasoned experts to assist in building your security program + Range of offerings: - Assessments - Strategy - Complex deployments - On-going support 15. AddressingtheCyber-SecurityLandscape ePlusSecurity Security Assessments + Vulnerability Assessments + Penetration Testing + Web Application Assessment + Wireless Security + Firewall Config Review + Social Engineering/Phishing + Compliance/Regulatory DISCOVER INVESTIGATE VALIDATE REPORT REMEDIATE REASSESS SECURITY ASSESSMENT PROCESS 16. AddressingtheCyber-SecurityLandscape ePlusSecurity Virtual Chief Information Security Ofcer (vCISO) Services + Seasoned security executive resource + Information security assessment/discovery + Security technology recommendations + ISO 27000 framework alignment + Security policy/procedure implementation + Drive information security/compliance programs forward + Reduce enterprise risk 17. AddressingtheCyber-SecurityLandscape ePlusSecurity ePlus Managed Security Services Powered by Solutionary + + + + + + Offerings: Log Monitoring 24/7 monitoring to protect against threats and comply with regulations that require log monitoring Log Management Secure, cloud-based log retention for forensics, compliance and incident investigation ActiveGuard Security and Compliance Platform Patented, cloud-based advanced threat detection, log monitoring and log management Security Device Management Advanced threat detection and cloud-based log monitoring and management Vulnerability Management Monitoring and management of internal and external vulnerabilities Targeted Threat Intelligence Customized service providing actionable threat information specific to your organization Blue Pantone 287 Hex: 00529b C: 100 M: 68 Y: 0 K: 12 SM 18. AddressingtheCyber-SecurityLandscape ePlusSecurity Next Steps + + + Short Term: In-Depth Security Program Assessment Ultimate Goal: Create an End State Reference Architecture Tailored to your environment to best meet your business and technology goals Maximize your budget for the most effective security posture with the minimal number of security solutions Meet your auditing requirements for compliancy and regulatory guidelines Help prioritize initiatives + + - - - - 19. AddressingtheCyber-SecurityLandscape ePlusSecurity ePlus Builds Secure Data Centers + Secure Perimeter Solutions + Secure Data Solutions + Secure Services SECURE DATA SECURE PERIMETER SECURE SERVICES 20. Contact us today to learn more about security solutions from ePlus. Contact us today to learn more about security solutions from ePlus. I 800-326-1990 I [email protected] I www.eplus.com/security 2015 ePlus inc. All rights reserved. ePlus, the ePlus logo, and all referenced product names are trademarks or registered trademarks of ePlus inc. All other company names, product images and products mentioned herein are trademarks or registered trademarks of their respective companies.