Managing End Point Security Starts at the Perimeter DIR ISF April 14&15, 2016 Randy Guin, CISSP, CGEIT.

Slides:



Advertisements
Similar presentations
!! Are we under attack !! Consumer devices continue to invade *Corporate enterprise – just wanting to plug in* Mobile Device Management.
Advertisements

CS898T Mobile and Wireless Network Handheld Device Security By Yuan Chen July 25 th, 2005.
KASPERSKY ANTI VIRUS Independent tests show Kaspersky to be the #1 in terms of Virus detection, false positives and response time for new viruses. Antivirus.
Current Security Threats WMO CBS ET-CTS Toulouse, France May 2008 Allan Darling, NOAA’s National Weather Service WMO CBS ET-CTS Toulouse, France.
SCRUB: Secure Computing Research for Users’ Benefit David Wagner 1.
Securing Remote Network Access FirePass ®. Business Case VirginiaCORIS is an initiative to modernize the way that offender information is managed, to.
Network and Server Basics. 6/1/20152 Learning Objectives After viewing this presentation, you will be able to: Understand the benefits of a client/server.
Information Security in Real Business
Small Business Security By Donatas Sumyla. Content Introduction Tools Symantec Corp. Company Overview Symantec.com Microsoft Company Overview Small Business.
The Evolution of the Kaspersky Lab Approach to Corporate Security Petr Merkulov, Chief Product Officer, Kaspersky Lab Kaspersky Lab Cyber Conference, Cancun,
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 1: Exploring the Network Introduction to Networks.
by Evolve IP Managed Services
CISCO CONFIDENTIAL – DO NOT DUPLICATE OR COPY Protecting the Business Network and Resources with CiscoWorks VMS Security Management Software Girish Patel,
© 2012 Bradford Networks. All rights reserved. Secure BYOD.
©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone Endpoint Security Current portfolio and looking forward October 2010.
Partnering For Profitability Growing your business with Microsoft Forefront Security Solutions Mark Hassall Director Security & Access BG Microsoft Corporation.
©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties Building Your Security Strategy with 3D.
1 Managed Security. 2 Managed Security provides a comprehensive suite of security services to manage and protect your network assets –Managed Firewall.
Security Imperatives in a New Workplace Partnering to Protect Digital Information in the 21st Century Presented by Michael Ferris, Alaska Enterprise Solutions.
SEC835 Database and Web application security Information Security Architecture.
Cloud Security Julian Lovelock VP, Product Marketing, HID Global.
Surviving in a hostile world  The myth of fortress applications  Tomas Olovsson CTO, Appgate Professor at Goteborg University, Sweden.
©2004 Check Point Software Technologies Ltd. Proprietary & Confidential Policy and Configuration Compliance for Devices Connecting to the Wireless Network.
Normalized Endpoint Computing Research Team Results PSU Technology Solution Mat B. & Alice S.
Robbie Upcroft Sales Manager - SMB & Distribution, Asia-Pacific
Dell Connected Security Solutions Simplify & unify.
MIS3300_Team8 Service Aron Allen Angela Chong Cameron Sutherland Edment Thai Nakyung Kim.
Exploring the Network.
Asif Jinnah Microsoft IT – United Kingdom. Security Challenges in an ever changing landscape Evolution of Security Controls: Microsoft’s Secure Anywhere.
 INADEQUATE SECURITY POLICIES ›Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA.
1 DEFENSE LOGISTICS AGENCY AMERICA’S COMBAT LOGISTICS SUPPORT AGENCY DEFENSE LOGISTICS AGENCY AMERICA’S COMBAT LOGISTICS SUPPORT AGENCY WARFIGHTER SUPPORT.
Sophos Live Protection. Agenda 1.Before and After Scenarios 2.Minimum Required Capabilities 3.How we do it 4.How we do it better.
Information Technology Acceptable Use Policy The acceptable use policy (AUP) is a document stipulating constraints and practices that a user must agree.
Module 11: Designing Security for Network Perimeters.
Enabling Secure Always-On Connectivity [Name] Microsoft Corporation.
Synchronized Security Revolutionizing Advanced Threat Protection
Total Threat Protection Securing All Your Threat Vectors Hartford Tech Summit.
Threat Landscape Ryan Kane – SWAT Specialist - Secure Wireless, & Access Technologies Data Connectors ABQ December 2015.
Panel: Engineering Discipline in Cyber Security Steve Orrin, Chief Technologist, Intel Federal, Intel Coporation.
Safe’n’Sec IT security solutions for enterprises of any size.
BYOD: An IT Security Perspective. What is BYOD? Bring your own device - refers to the policy of permitting employees to bring personally owned mobile.
69% of employees say they are accessing business apps on personal devices Organizations say 34% of their employees are accessing business apps on.
1 1 Advanced Cyber Security Event - Introduction 11 th May 2016 Matt Locker.
©2004 Check Point Software Technologies Ltd. Proprietary & Confidential Moving Beyond the Perimeter with Intelligent Security Alfredo Cusin Channel Mgr.
BizSmart Lunch & Learn Webinar Information Security and Protecting your business With the increased risk of some sort of cyber- attack over the past few.
Enterprise | education | public printing locations PrinterOn for Manufacturing.
Servelite - Complete IT Solutions. Servelite IT solutions specialize in providing Home solutions and Business solutions. We focus upon delivering quality.
Short Customer Presentation September The Company  Storgrid delivers a secure software platform for creating secure file sync and sharing solutions.
No boundaries with Unified Web Security Solutions Steven Vlastra Sr. Systems Engineer - Benelux.
Network and Server Basics. Learning Objectives After viewing this presentation, you will be able to: Understand the benefits of a client/server network.
Enterprise | education | public printing locations PrinterOn for Healthcare.
Sophos Mobile Control Joanna Wziątek-Ładosz Sales Engineer, Sophos.
Fourth ICT Security Conference 2017
Chapter 1: Exploring the Network
Name, Title.
TASHKENT UNIVERSITY OF INFORMATION TECHNOLOGIES NAMED AFTER MUHAMMAD AL-KHWARIZMI THE SMART HOME IS A BASIC OF SMART CITIES: SECURITY AND METHODS OF.
Cybersecurity Reference Architecture
(1888 PressRelease) Staying Ahead of Today’s Rapidly Evolving Security Landscape
Chapter 1: Exploring the Network
Acer Technical Support Number
Company Overview & Strategy
Cybersecurity Strategy
Cyber Defense Matrix Cyber Defense Matrix
Check Point Connectra NGX R60
The Next Generation Cyber Security in the 4th Industrial Revolution
Secure once, run anywhere Simplify your security with Sophos
Implementing Client Security on Windows 2000 and Windows XP Level 150
Introduction to Symantec Security Service
In the attack index…what number is your Company?
IT Management, Simplified
Presentation transcript:

Managing End Point Security Starts at the Perimeter DIR ISF April 14&15, 2016 Randy Guin, CISSP, CGEIT

What is an Endpoint? Desktop Computer Server Laptops Tablets Smart Phones POS Device Printers

What is End Point Security? End Point Security protects a network by requiring endpoint devices (laptops, mobile devices, etc.) to comply with corporate security standards before access is granted. These security standards may include an approved OS, a VPN client and anti-virus software.

What has Changed? Threat Landscape Virus/Trojans - old Phishing s – Social Engineering Malicious - Ransomware APT’s – AET’s Focus Privileged accounts - old Authenticated users End point devices – Management (who’s - what – when - where) Technology Antivirus – old Solutions Architecture – integrated security

5

End Point Security - Technology Methodology Signature based Specific code profiles – Palo Alto Heuristic / Behavorial Analysis IOC (Indicators of Compromise) – Tanium/McAfee/Fireeye Attack Indicators – Symantec ATP Proactive - Shavlik

Attack Focus

Endpoints – Who’s, What, When, Where? Who’s Company/Agency Employee’s Vendor What Desktop Laptop/Tablet Smart Phone POS When ???? Where Office Data Center Cloud Remote

The Perimeter Next Generation Firewall (NGFW) Fortinet - Palo Alto – Checkpoint– Cisco Application Awareness Authenticated Users Advanced Threat Protection Sand boxing (on prem and cloud)

The Perimeter Next Generation Firewall (NGFW) Gateways On Premise Cloud Internet – gmail, yahoo, hotmail MDM BYOD MAM VPN Other Agencies Vendors

Case Study Infrastructure – McAfee Implemented Tanium Implemented Malware Bytes Leveraged Palo Alto

What’s to come IoT – Internet of Things Endpoints Change the definition Number/types Manage Security Patches Integration Connectivity Anywhere - Anytime

Summary Endpoints what was what is what will be Threat Landscape Phishing s Malicious stuff APT’s – AET’s Technology Methodology Architecture What’s to come IoT Security Architecture Integrated Security

Questions?