25
PRIMA DECADA Noile Generatii Bogdan Toporan │ BEST INTERNET SECURITY

BISS - 11nov2011

Embed Size (px)

Citation preview

Page 1: BISS - 11nov2011

PRIMA DECADA

Noile Generatii

Bogdan Toporan │ BEST INTERNET SECURITY

Page 2: BISS - 11nov2011

© BISS 2011 │ all rights reserved

Security solutions

►“An infinite number of monkeys with an infinite number of typewriters and an infinite amount of time could eventually write the works of Shakespeare “—The Infinite Monkey Theorem

►“An infinite number of hackers

with an infinite number of

keyboards, an infinite amount of

caffeine, and an infinite amount

of time could eventually

compromise a network.”

Page 3: BISS - 11nov2011

© BISS 2011 │ all rights reserved

BISS │ Best Internet Security 10 ani – 1.11.’11

Suntem specializati in system si network security

Suntem o echipa de experti, cu acces la ultimele tehnologii si descoperiri in domeniul IT Sec

Protejam organizatii financiar-bancare, guvernamentale, de telecomunicatii, utilitati si industrie

De 10 ani suntem permanent conectati la dinamica dezvoltarii domeniului IT Security

In 10 ani, am evoluat de la statutul de pionier intr-un segment IT foarte specializat, la cel de integrator pentru solutii profesionale IT Security

BISS propune cele mai avansate tehnologii / solutii / produse si ofera suport / servicii de inalta calitate.

Suntem parte a sistemelor de protectie ale clientilor si partenerilor nostri

Suntem partenerii liderilor tehnologiilor IT Security. Partenerii BISS sunt companii ce dezvolta concepte si tehnologii de varf, companii vizionare specializate in aria protectiei retelelor, comunicatiilor si datelor rezidente in sistemele informatice.

Page 4: BISS - 11nov2011

© BISS 2011 │ all rights reserved

BISS – infiintata in 2001

Trusted information security integrator

Page 5: BISS - 11nov2011

© BISS 2011 │ all rights reserved

Expertiza

Gateway

Server

Desktop

NIPS / HIPS

VAM

Web Security

IAM

Log Management

Encryption /PKI

UTM

DLP

WAN Optimization

SIEM

Intelligence

BISS

Web AppE-mailEtc.

WAFXML FwMail fwAntiSpamApp scansCode review

ApplicationApplication

OracleSQLEtc.

VAIPSDiscoveryLog mgmtAdmin monitorDAMReporting

DatabaseDatabase

CompliancePlanAuditTrainingDeploymentSupportProfessional services

ConsultantConsultantNetworkNetwork

Page 6: BISS - 11nov2011

© BISS 2011 │ all rights reserved

Motive pentru IT Security

►Nevoia reala de conectare

►Existenta Internetului

Page 7: BISS - 11nov2011

© BISS 2011 │ all rights reserved

Motive pentru IT Security

►Complexitatea sistemelor informatice

►Rapiditatea adoptarii noilor modele si tehnologii

Page 8: BISS - 11nov2011

© BISS 2011 │ all rights reserved

X-Force Trend Risk report H1 2011

Page 9: BISS - 11nov2011

© BISS 2011 │ all rights reserved

X-Force Trend Risk report H1 2011

►Common points of entry the public website and data servers.

employee workstations or endpoints.

Page 10: BISS - 11nov2011

© BISS 2011 │ all rights reserved

X-Force Trend Risk report H1 2011

► Aproximativ 50% din vulnerabilitatile cunoscute sunt inca unpatched

Page 11: BISS - 11nov2011

© BISS 2011 │ all rights reserved

X-Force Trend Risk report H1 2011

►Un studiu recent al Forrester Research, releva faptul ca peste 75% din companii nu au documentat inca un database security plan.

►Forrester estimeaza de asemenea ca in prezent, DBAs aloca sub 5% din timpul lor pentru database security.

►Key drivers pentru database security

Atacatorii sunt motivati sa compromita bazele de date cu o protectie slaba, de sumele pe care le castiga vanzand datele personale sustrase.

Cyber-spionajul vizeaza proprietatea intelectuala.

Hacktivism-ul este o forma de atac motivata politic, adesea sponsorizata politic si folosita pentru suportul activitatilor politice.

Amenintarile interne sunt considerate cele mai serioase, angajatii putand frauda si exploata facil accesul legitim.

Compliance – cerinte tot mai complexe

Page 12: BISS - 11nov2011

© BISS 2011 │ all rights reserved

X-Force Trend Risk report H1 2011

Page 13: BISS - 11nov2011

© BISS 2011 │ all rights reserved

Security drivers

Page 14: BISS - 11nov2011

© BISS 2011 │ all rights reserved

O noua abordare

►Informatie relevanta (intelligence)

►Vizibilitate (in timp real)

►Corelare

►Predictibilitate (risk management)

►Administrare unitara (corelare)

►Reactie rapida

►Analiza (forensic)

►Scalabilitate

Page 15: BISS - 11nov2011

© BISS 2011 │ all rights reserved

Eliminate False Choice - Capability & Simplicity

Siloed Solution Integrated Solution

Page 16: BISS - 11nov2011

© BISS 2011 │ all rights reserved

Disponibilitate

Compliance validation and security response improvement in the same solution

Out of the box content to swiftly meet PCI, NERC, SOX, HIPAA, GLBA, CoCo, etc.

Flexibility to meet new compliance standards as they evolve

PCI HIPAA FISMA

CoCo NERC SOX

Page 17: BISS - 11nov2011

© BISS 2011 │ all rights reserved

Intelligence

What was the attack?

Who was responsible?

How many targets involved?

Was it successful?

Where do I find them?

Are any of them vulnerable?

How valuable are they to the business?

Where is all the evidence?

Clear & concise delivery of the most relevant information …

Page 18: BISS - 11nov2011

© BISS 2011 │ all rights reserved

Point & click

Feature Benefit

Network topology and traffic maps, provided in context of an active threat

Greatly enhance end-to-end visualization and remediation of security incidents

Summary network connection database and visualization tools built from high volume of network flow data

Improves the speed and efficiency of drilling into end user activity and attack path

Graphical mapping of risk (both pre and post exploit) on top of network visualization tools

Greatly improves time to recognize and remediate security incidents

Page 19: BISS - 11nov2011

© BISS 2011 │ all rights reserved

Next Generation Web Security

Page 20: BISS - 11nov2011

© BISS 2011 │ all rights reserved

Blue Coat

Page 21: BISS - 11nov2011

© BISS 2011 │ all rights reserved

Next Generation Firewall

Page 22: BISS - 11nov2011

© BISS 2011 │ all rights reserved

Next Generation SIEM

Page 23: BISS - 11nov2011

© BISS 2011 │ all rights reserved

Next Generation

• Proactive threat management• Massive data reduction• Rapid, complete impact analysis

• Eliminates silos • Highly scalable• Flexible, future-proof

• Operational elegance• Simple deployment• Rapid time to value

Page 24: BISS - 11nov2011

© BISS 2011 │ all rights reserved

Q&A

►Cum tratez problemele de confidentialitate?

►Cum imi monitorizez reteaua si echipamentele de securitate acum?

►Cum stabilesc anume o prioritizare a sistemelor vulnerabile?

►Cum interpretez rezultatele furnizate de scanerele de vulnerabilitati?

►Cum monitorizez utilizarea aplicatiilor de socializare?

►Controlez accesul la retelele sociale?

► Am cum sa fac o corelare a informatiilor furnizate de reteaua mea?

►In cazul unui atac, exista resursa interna pregatita sa faca fata?

►S-ar fi putut detecta atacul mai devreme (inaintea declansarii impactului)?

►Cine e responsabil pentru securitate?

►La cine pot sa apelez?

• Partener /consultant

• Date de contact

• Outsourced

Page 25: BISS - 11nov2011

© BISS 2011 │ all rights reserved

Sample Slide Bullet Points

►The text demonstrates how your own text will look when you replace the placeholder with your own text.

►This is a placeholder text. This text can be replaced with your own text.

►If you don’t want to use the style and size of the fonts as used in this placeholder it is possible to replace it by selecting different options.

For replacing the placeholder text you need to click on the placeholder text and insert your own text.

The text that you insert will retain the same style and format as the placeholder text.

MULŢUMESCBogdan Toporan │ BISS

[email protected]

www.biss.ro

1.11.’11