49
A Holistic approach in network security Network Infrastructure Security Management (NISM) Solution

Network infrastructure security management solution - A holistic approach in Network Security

Embed Size (px)

DESCRIPTION

Network Infrastructure Security Management Solution can continuously provide network visualisation and identify critical attack risk. It provide security network and risk team with a firm understanding of Where the investment is needed, and Where greatest cyber attack risks lie. This understanding enable organizations to allocate resouces and take prioritized actions.

Citation preview

Page 1: Network infrastructure security management solution - A holistic approach in Network Security

A Holistic approach in network security

Network Infrastructure

Security Management (NISM)

Solution

Page 2: Network infrastructure security management solution - A holistic approach in Network Security

Thoughts on Network Infrastructure Security

Page 3: Network infrastructure security management solution - A holistic approach in Network Security

One small hole could lead to a significant data breach

Page 4: Network infrastructure security management solution - A holistic approach in Network Security

Threat agents use automated tools to find and exploit weak

points

Page 5: Network infrastructure security management solution - A holistic approach in Network Security

Addressing the millions of vulnerabilities in the system

Page 6: Network infrastructure security management solution - A holistic approach in Network Security

Situational awareness in the turbulent times

Page 7: Network infrastructure security management solution - A holistic approach in Network Security

Is the threat against your network

is increasing or decreasing?

Page 8: Network infrastructure security management solution - A holistic approach in Network Security

Where to spend the time and money

in your network

Page 9: Network infrastructure security management solution - A holistic approach in Network Security

Understand all the possible attack path

Page 10: Network infrastructure security management solution - A holistic approach in Network Security

Prioritizing the incidence response action, once

attacked.

Page 11: Network infrastructure security management solution - A holistic approach in Network Security

After attack, understand,

How it happened & prevention

Page 12: Network infrastructure security management solution - A holistic approach in Network Security

Understanding on the interaction

between the devices in the network

Page 13: Network infrastructure security management solution - A holistic approach in Network Security

Understanding on the interaction

between the devices in the network

Page 14: Network infrastructure security management solution - A holistic approach in Network Security

Some Facts

Page 15: Network infrastructure security management solution - A holistic approach in Network Security

A recent Ponemon Institute report on perceptions about network security found

that 90 percent of responding organizations had suffered a security breach within the

previous 12 months

Page 16: Network infrastructure security management solution - A holistic approach in Network Security

2012 Verizon data breach investigations report found that 97

percent of security breaches could have been prevented through a consistent, system-wide application of “simple or

intermediate controls.”

Page 17: Network infrastructure security management solution - A holistic approach in Network Security

Common Challenges in NISM

Page 18: Network infrastructure security management solution - A holistic approach in Network Security

Constantly changing Network complexity

exceeding human ability to analyze

Page 19: Network infrastructure security management solution - A holistic approach in Network Security

Multiple point of access

Page 20: Network infrastructure security management solution - A holistic approach in Network Security

Inconsistent IT implementation

Page 21: Network infrastructure security management solution - A holistic approach in Network Security

Typical Network Infrastructure comprises:

Networking Hardware ( Routers, Switches, LAN Cards, Wireless Routers, Cables)

Networking Software (Network Operations and Management, Operating systems, Firewall, Network Security Applications)

Network Service (T-1 Line, DSL, Satellite, Wireless Protocols, IP Addressing)

FYI

Page 22: Network infrastructure security management solution - A holistic approach in Network Security

Typical Network Infrastructure comprises: Networking Hardware ( Routers, Switches,

LAN Cards, Wireless Routers, Cables)

Networking Software (Network Operations and Management, Operating systems, Firewall,

Network Security Applications)

Network Service (T-1 Line, DSL, Satellite, Wireless Protocols, IP Addressing)

FYI

Page 23: Network infrastructure security management solution - A holistic approach in Network Security

Typical Network Infrastructure comprises:

Networking Hardware ( Routers, Switches, LAN Cards, Wireless Routers, Cables)

Networking Software (Network Operations and

Management, Operating systems, Firewall, Network Security Applications)

Network Service (T-1 Line, DSL, Satellite,

Wireless Protocols, IP Addressing)

FYI

Page 24: Network infrastructure security management solution - A holistic approach in Network Security

Typical Network Infrastructure comprises:

Networking Hardware ( Routers, Switches, LAN Cards, Wireless Routers, Cables)

Networking Software (Network Operations and

Management, Operating systems, Firewall, Network Security Applications)

Network Service (T-1 Line, DSL, Satellite,

Wireless Protocols, IP Addressing)

FYI

Page 25: Network infrastructure security management solution - A holistic approach in Network Security

Typical Network Infrastructure comprises:

Networking Hardware ( Routers, Switches, LAN Cards, Wireless Routers, Cables)

Networking Software (Network Operations and

Management, Operating systems, Firewall, Network Security Applications)

Network Service (T-1 Line, DSL, Satellite,

Wireless Protocols, IP Addressing)

FYI

Page 26: Network infrastructure security management solution - A holistic approach in Network Security

Health check on NISM

Page 27: Network infrastructure security management solution - A holistic approach in Network Security

Health check on NISM

Know your Network

Page 28: Network infrastructure security management solution - A holistic approach in Network Security

Health check on NISM

Know your Network Know your Assets

Page 29: Network infrastructure security management solution - A holistic approach in Network Security

Health check on NISM

Know your Network Know your Assets

Know your Security

Page 30: Network infrastructure security management solution - A holistic approach in Network Security

Health check on NISM

Know your Network Know your Assets

Know your Security Map the Topology

Page 31: Network infrastructure security management solution - A holistic approach in Network Security

Health check on NISM

Know your Network Know your Assets

Know your Security Map the Topology Prioritize & Fix

Page 32: Network infrastructure security management solution - A holistic approach in Network Security

Health check on NISM

Know your Network Know your Assets

Know your Security Map the Topology Prioritize & Fix

Monitor Continuously

Page 33: Network infrastructure security management solution - A holistic approach in Network Security

Health check on NISM

Know your Network Know your Assets

Know your Security Map the Topology Prioritize & Fix

Monitor Continuously Manage Change & Build Workflows

Page 34: Network infrastructure security management solution - A holistic approach in Network Security

How NISM solution prevent Cyber attacks

Page 35: Network infrastructure security management solution - A holistic approach in Network Security

How NISM prevent Cyber attacks Ensure all the access controls are configured correctly

Page 36: Network infrastructure security management solution - A holistic approach in Network Security

How NISM prevent Cyber attacks Ensure all the access controls are configured correctly

Maintaining situational analysis

Page 37: Network infrastructure security management solution - A holistic approach in Network Security

How NISM prevent Cyber attacks Ensure all the access controls are configured correctly

Expand the new network

Maintaining situational analysis

Page 38: Network infrastructure security management solution - A holistic approach in Network Security

How NISM prevent Cyber attacks Ensure all the access controls are configured correctly

Identify the greatest risk in the network

Expand the new network

Maintaining situational analysis

Page 39: Network infrastructure security management solution - A holistic approach in Network Security

How NISM prevent Cyber attacks Ensure all the access controls are configured correctly

Identify the greatest risk in the network

Identifying risk

levels

Expand the new network

Maintaining situational analysis

Page 40: Network infrastructure security management solution - A holistic approach in Network Security

How NISM prevent Cyber attacks Ensure all the access controls are configured correctly

Identify the greatest risk in the network

Maintain and proving with all applicable regulations

Identifying risk

levels

Expand the new network

Maintaining situational analysis

Page 41: Network infrastructure security management solution - A holistic approach in Network Security

How NISM prevent Cyber attacks Ensure all the access controls are configured correctly

Identify the greatest risk in the network

Maintain and proving with all applicable regulations

Identifying risk

levels

Manage and mitigate

risk from untrusted

network / partner or

network

Expand the new network

Maintaining situational analysis

Page 42: Network infrastructure security management solution - A holistic approach in Network Security

How NISM prevent Cyber attacks Ensure all the access controls are configured correctly

Identify the greatest risk in the network

Maintain and proving with all applicable regulations

Identifying risk

levels

Manage and mitigate

risk from untrusted

network / partner or

network

Expand the new network

Maintaining situational analysis

Page 43: Network infrastructure security management solution - A holistic approach in Network Security

How NISM prevent Cyber attacks Ensure all the access controls are configured correctly

Identify the greatest risk in the network

Maintain and proving with all applicable regulations

Identifying risk

levels

Integrating the wireless device

Manage and mitigate

risk from untrusted

network / partner or

network

Expand the new network

Maintaining situational analysis

Page 44: Network infrastructure security management solution - A holistic approach in Network Security

How NISM prevent Cyber attacks Ensure all the access controls are configured correctly

Identify the greatest risk in the network

Maintain and proving with all applicable regulations

Identifying risk

levels

Integrating the wireless device

Manage and mitigate

risk from untrusted

network / partner or

network

Expand the new network

Maintaining situational analysis

Page 45: Network infrastructure security management solution - A holistic approach in Network Security

To summarize:

Page 46: Network infrastructure security management solution - A holistic approach in Network Security

To summarize:

NISM solution models your security control

infrastructure to identify key points of attack

Page 47: Network infrastructure security management solution - A holistic approach in Network Security

To summarize:

NISM solution models your security control

infrastructure to identify key points of attack

NISMS Identifies the holes in your security controls

Page 48: Network infrastructure security management solution - A holistic approach in Network Security

To summarize:

NISM solution models your security control

infrastructure to identify key points of attack

NISMS Identifies the holes in your security controls

NISMS Identifies the holes in your security controls

Page 49: Network infrastructure security management solution - A holistic approach in Network Security

Thanking you Your response: [email protected]