Security Intelligence
for business data
protection
Andris Soroka2015, Riga
Riga, Latvia
“Data Security Solutions” business cardWhat We Do?
DSS
ICT Security Provider
Advisory, Consulting, Installation,
Support
Most Innovative Portfolio in
BalticsMember–
ships, Awareness
Rising
Technology &
Knowledge Transfer
ICT Security
Evangelists
Endpoints
Applications
Networks
Data
Identity
Mobility
Management
Cloud
DSS Global Partnerships
DSS Delivering Excellent ICT Security Operatitions to its Customers
Customer ICT Security
Operations Excellence
Cooperation with Industry Top Technology
Leaders Recognised by Gartner, IDC,
Forester
Top level ICT Security
Professionals
Selected Cutting Edge ICT Security Innovative
TechnologyIntegration
Pan-Baltic
Projects
Particular Focus on Security
Our international cyber security conference
In 2015 included in World Summit of Information Society Prize candidates.
Online voting is ON.
C5 – building theConfidence in Security in the use of ICT.
Political (external and internal)
Technological (risks, threats, fraud, attacks, leaks)
Economical (budget reality, competition, costs…)
Legal (compliances, regulations etc.)
Professional (HR, information quantity)
Psychological ( traditions / knowledge / trust)
Challenges of C-level executives
Trends of the digital future
Cyber security future is now ..
LogManageme
nt
Security Intelligence
Network Activity
Monitoring
RiskManageme
nt
Vulnerability
Management
Network Forensics
Suspected
Incidents
Prioritized Incidents
Servers and mainframes
Data activity
Network and virtual activity
Application activity
Configuration information
Security devices
Users and identities
Vulnerabilities and threats
Global threat intelligence
Extensive Data Sources
AutomatedOffenseIdentification
•Massive data reduction
•Automated data collection,
asset discovery and profiling
•Automated, real-time,
and integrated analytics
•Activity baselining
and anomaly detection
•Out-of-the box rules
and templatesEmbedded
Intelligence
Security intelligence for automated offense detection
Prevent. Detect. Respond.
Business part
Business processes analysis from tech perspective
Assessment and management of cyber security risks
Related technological part
Inventory of devices and software
Secure configuration of everything (end-users, devices)
Vulnerability assessment and management
Malware defenses, application security, pen tests
Wifi security
Mobile security
Data security
Continuos skills training and learning
Access control and visibility
Audit, monitoring, analysis, incident response and more
Business & technology must come together
How we can help
Analyze and detect risks
Fulfill audit
Build security action plan
Train the employees
Pass compliance regulations
Save from data leakage
Protect critical assets
Get rid of passwords
Consult Your professionals
Protect from attacks
Help creating RFP docs
Be Your IT Security Advisor!
Business value of «Data Security Solutions»
Balancing costs and risk – floods happen..
Contact UsAndris [email protected]
Mob. +371 29162784
Riga, Latviawww.dss.lvLinkedIn: http://lv.linkedin.com/in/andsor
Twitter: @andris_soroka / @dss_it_security
Facebook: http://www.facebook.com/lvdss
Youtube: http://ow.ly/FAfEN
SlideShare: http://www.slideshare.net/andsor
Think Security FirstThank you
Top Related