Network infrastructure security management solution - A holistic approach in Network Security

Preview:

DESCRIPTION

Network Infrastructure Security Management Solution can continuously provide network visualisation and identify critical attack risk. It provide security network and risk team with a firm understanding of Where the investment is needed, and Where greatest cyber attack risks lie. This understanding enable organizations to allocate resouces and take prioritized actions.

Citation preview

A Holistic approach in network security

Network Infrastructure

Security Management (NISM)

Solution

Thoughts on Network Infrastructure Security

One small hole could lead to a significant data breach

Threat agents use automated tools to find and exploit weak

points

Addressing the millions of vulnerabilities in the system

Situational awareness in the turbulent times

Is the threat against your network

is increasing or decreasing?

Where to spend the time and money

in your network

Understand all the possible attack path

Prioritizing the incidence response action, once

attacked.

After attack, understand,

How it happened & prevention

Understanding on the interaction

between the devices in the network

Understanding on the interaction

between the devices in the network

Some Facts

A recent Ponemon Institute report on perceptions about network security found

that 90 percent of responding organizations had suffered a security breach within the

previous 12 months

2012 Verizon data breach investigations report found that 97

percent of security breaches could have been prevented through a consistent, system-wide application of “simple or

intermediate controls.”

Common Challenges in NISM

Constantly changing Network complexity

exceeding human ability to analyze

Multiple point of access

Inconsistent IT implementation

Typical Network Infrastructure comprises:

Networking Hardware ( Routers, Switches, LAN Cards, Wireless Routers, Cables)

Networking Software (Network Operations and Management, Operating systems, Firewall, Network Security Applications)

Network Service (T-1 Line, DSL, Satellite, Wireless Protocols, IP Addressing)

FYI

Typical Network Infrastructure comprises: Networking Hardware ( Routers, Switches,

LAN Cards, Wireless Routers, Cables)

Networking Software (Network Operations and Management, Operating systems, Firewall,

Network Security Applications)

Network Service (T-1 Line, DSL, Satellite, Wireless Protocols, IP Addressing)

FYI

Typical Network Infrastructure comprises:

Networking Hardware ( Routers, Switches, LAN Cards, Wireless Routers, Cables)

Networking Software (Network Operations and

Management, Operating systems, Firewall, Network Security Applications)

Network Service (T-1 Line, DSL, Satellite,

Wireless Protocols, IP Addressing)

FYI

Typical Network Infrastructure comprises:

Networking Hardware ( Routers, Switches, LAN Cards, Wireless Routers, Cables)

Networking Software (Network Operations and

Management, Operating systems, Firewall, Network Security Applications)

Network Service (T-1 Line, DSL, Satellite,

Wireless Protocols, IP Addressing)

FYI

Typical Network Infrastructure comprises:

Networking Hardware ( Routers, Switches, LAN Cards, Wireless Routers, Cables)

Networking Software (Network Operations and

Management, Operating systems, Firewall, Network Security Applications)

Network Service (T-1 Line, DSL, Satellite,

Wireless Protocols, IP Addressing)

FYI

Health check on NISM

Health check on NISM

Know your Network

Health check on NISM

Know your Network Know your Assets

Health check on NISM

Know your Network Know your Assets

Know your Security

Health check on NISM

Know your Network Know your Assets

Know your Security Map the Topology

Health check on NISM

Know your Network Know your Assets

Know your Security Map the Topology Prioritize & Fix

Health check on NISM

Know your Network Know your Assets

Know your Security Map the Topology Prioritize & Fix

Monitor Continuously

Health check on NISM

Know your Network Know your Assets

Know your Security Map the Topology Prioritize & Fix

Monitor Continuously Manage Change & Build Workflows

How NISM solution prevent Cyber attacks

How NISM prevent Cyber attacks Ensure all the access controls are configured correctly

How NISM prevent Cyber attacks Ensure all the access controls are configured correctly

Maintaining situational analysis

How NISM prevent Cyber attacks Ensure all the access controls are configured correctly

Expand the new network

Maintaining situational analysis

How NISM prevent Cyber attacks Ensure all the access controls are configured correctly

Identify the greatest risk in the network

Expand the new network

Maintaining situational analysis

How NISM prevent Cyber attacks Ensure all the access controls are configured correctly

Identify the greatest risk in the network

Identifying risk

levels

Expand the new network

Maintaining situational analysis

How NISM prevent Cyber attacks Ensure all the access controls are configured correctly

Identify the greatest risk in the network

Maintain and proving with all applicable regulations

Identifying risk

levels

Expand the new network

Maintaining situational analysis

How NISM prevent Cyber attacks Ensure all the access controls are configured correctly

Identify the greatest risk in the network

Maintain and proving with all applicable regulations

Identifying risk

levels

Manage and mitigate

risk from untrusted

network / partner or

network

Expand the new network

Maintaining situational analysis

How NISM prevent Cyber attacks Ensure all the access controls are configured correctly

Identify the greatest risk in the network

Maintain and proving with all applicable regulations

Identifying risk

levels

Manage and mitigate

risk from untrusted

network / partner or

network

Expand the new network

Maintaining situational analysis

How NISM prevent Cyber attacks Ensure all the access controls are configured correctly

Identify the greatest risk in the network

Maintain and proving with all applicable regulations

Identifying risk

levels

Integrating the wireless device

Manage and mitigate

risk from untrusted

network / partner or

network

Expand the new network

Maintaining situational analysis

How NISM prevent Cyber attacks Ensure all the access controls are configured correctly

Identify the greatest risk in the network

Maintain and proving with all applicable regulations

Identifying risk

levels

Integrating the wireless device

Manage and mitigate

risk from untrusted

network / partner or

network

Expand the new network

Maintaining situational analysis

To summarize:

To summarize:

NISM solution models your security control

infrastructure to identify key points of attack

To summarize:

NISM solution models your security control

infrastructure to identify key points of attack

NISMS Identifies the holes in your security controls

To summarize:

NISM solution models your security control

infrastructure to identify key points of attack

NISMS Identifies the holes in your security controls

NISMS Identifies the holes in your security controls

Thanking you Your response: sebastiantwinkle@gmail.com

Recommended