2017 Security Predictions from FortiGuard Labs

Slides:



Advertisements
Similar presentations
!! Are we under attack !! Consumer devices continue to invade *Corporate enterprise – just wanting to plug in* Mobile Device Management.
Advertisements

1 © Copyright 2013 Fortinet Inc. All rights reserved. Комплексная экосистема безопасности Мирослав Мищенко Менеджер по работе с ключевыми клиентами.
1 © Copyright 2013 Fortinet Inc. All rights reserved. Fortinet High Performance Network Security Data Connectors – Los Angeles Edwin Mendoza – Manager.
Simon Garcia Jaramillo Network Administrator ATS Automation Tooling Systems.
National Symposium for Command & Control and Cyber Security
Introduction to Fortinet Unified Threat Management
Icon Library Release notes
Network Topology. Cisco 2921 Integrated Services Router Security Embedded hardware-accelerated VPN encryption Secure collaborative communications with.
CISCO CONFIDENTIAL – DO NOT DUPLICATE OR COPY Protecting the Business Network and Resources with CiscoWorks VMS Security Management Software Girish Patel,
Barracuda Load Balancer Server Availability and Scalability.
© Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. Cyber Security: Now and.
Robbie Upcroft Sales Manager - SMB & Distribution, Asia-Pacific
Complete Security. Threats changing, still increasing Data everywhere, regulations growing Users everywhere, using everything We’re focused on protecting.
Network security Product Group 2 McAfee Network Security Platform.
Synchronized Security Revolutionizing Advanced Threat Protection
Threat Landscape Ryan Kane – SWAT Specialist - Secure Wireless, & Access Technologies Data Connectors ABQ December 2015.
Icon Library Slide 11 – Release notes
Computer Security By Duncan Hall.
©2015 Check Point Software Technologies Ltd. 1 [Restricted] ONLY for designated groups and individuals CHECK POINT MOBILE THREAT PREVENTION.
Managing End Point Security Starts at the Perimeter DIR ISF April 14&15, 2016 Randy Guin, CISSP, CGEIT.
Enterprise’ Ever-Evolving Challenge & Constraints Dealing with BYOD Challenges Enable Compliance to Regulations Stay Current with New Consumption Models.
Barracuda Networks. Safe Public Cloud Transitions Why Barracuda? The Challenge When organizations move workloads to the public cloud, data protection.
1 CONFIDENTIAL – INTERNAL ONLY1 Fortinet Confidential June 23, 2016 Securing The Cloud & Data Center.
SYMANTEC ENDPOINT SECURITY SERVICE PROVIDERS | ALLIANCE PRO IT HYDERABAD (CORPORATE OFFICE) ALLIANCE PRO IT PRIVATE LIMITED, 3A, HYNDAVA TECHNO PARK, TECHNO.
SYMANTEC ENDPOINT SECURITY SERVICE PROVIDERS | ALLIANCE PRO IT HYDERABAD (CORPORATE OFFICE) ALLIANCE PRO IT PRIVATE LIMITED, 3A, HYNDAVA TECHNO PARK, TECHNO.
Fortinet Security Fabric
La sécurité Globale de votre SI du Poste de Travail au Cloud
Your Partner for Superior Cybersecurity
Security fabric Today’s world demands security without compromise.
Chapter 1: Exploring the Network
Présentation Fortinet
Fortinet NSE8 Exam Do You Want To Pass In First Attempt.
Securing Today’s Multi-Dimensional Cloud
Fortinet Company Overview
Barracuda Web Filtering Service
Smart Building Solution
AT&T Premises-Based Firewall Enhanced SBS Solution
Journey to Microsoft Secure Cloud
Real-time protection for web sites and web apps against ATTACKS
Ransomware & Security for Virtualization
Hybrid IT is Here. Security: First.
Smart Building Solution
Network Modeling and Business Intelligence Service
How Smart Networks are Changing Corporate Networks
Security Fabric Salon MedIT 2017
© 2016 Global Market Insights, Inc. USA. All Rights Reserved Endpoint Security Market to grow at 7% CAGR from 2017 to 2024: Global Market.
Securing Information Systems
Jon Peppler, Menlo Security Channels
NSE5 Dumps PDF Fortinet Network Security Expert 5 Written Exam (500) NSE5 DumpsNSE5 BraindumpsNSE5 Questions AnswersNSE5 Study Material.
2018 Real Cisco Dumps IT-Dumps
Company Overview & Strategy
UNM Enterprise Firewall
Healthcare Cloud Security Stack for Microsoft Azure
Software-Defined Secure Networks in Action
Home Internet Vulnerabilities
Securing the Internet of Things: Key Insights and Best Practices Across the Industry Theresa Bui Revon IoT Cloud Strategy.
Security Essentials for Small Businesses
Securing the Threats of Tomorrow, Today.
The Next Generation Cyber Security in the 4th Industrial Revolution
Secure once, run anywhere Simplify your security with Sophos
Healthcare Cloud Security Stack for Microsoft Azure
How to Mitigate the Consequences What are the Countermeasures?
Defending high value targets in the cloud using IP Reputation
Increase and Improve your PC management with Windows Intune
Topic What is Network & Network Security ? Network Security Companies
(With Hybrid Network Support)
Introduction to the 3rd Gen Fortinet Security Fabric
Per Söderqvist Per Söderqvist Sales Engineer
©2018 Graphical Research. All rights reserved. North America Enterprise Networking Market to trace exponential gain of $30bn.
IoT in Healthcare: Life or Death
Presentation transcript:

2017 Security Predictions from FortiGuard Labs Bart Green – Utah Named Account Manager Jesse Alverson – Utah Sales Engineer 2/23/2017

What to Expect in Security This Year? 6 Key Drivers are Shaping Threats & Your Response

Introduction Video Derek Manky – Global Security Strategist with FortiGuard Labs https://fortinet.wistia.com/m edias/0h6ej6xua7

Prediction 1: From Smart to Smarter: Automated and Human-Like Attacks will Demand more Intelligent Defense Past: Dumb Malware – relied on target-specific data or volume for success Present: Smart Malware – will be adaptive & use success- based learning for more successful attacks across platforms in different parts of the network

Prediction 2: IoT Manufacturers will be Held Accountable for Security Breaches Past: IoT devices seen as low- hanging fruit: default passwords, coding errors, back doors & junk code made devices easy targets for simple attacks Present: Device growth will cause IoT attacks to become more sophisticated, increasing Shadownets (IoT Botnets), the IoT Deepweb & Targeted Attacks on OEM Manufactures

Prediction 3: 20 billion IoT and Endpoint Devices are the Weakest Link for Attacking the Cloud Past: Nonexistence of the cloud meant no data moving to cloud = smaller attack surface Present: Millions of remote devices accessing the sensitive data stored in the cloud using trust model – threats will be developed to trick trust model by exploiting endpoints & connected devices

Prediction 4: Attackers will Begin to Turn Up the Heat in Smart Cities Past: Public infrastructure systems not connected to the internet or interconnected with each other Present: Traffic control systems, HVAC, lighting, robots, self driving cars, smart TVs, and thousands of smart devices have constant connections with limited security – will be targets as easy entrance points into a network

Prediction 5: Ransomware was just the Gateway Malware Past: Successful ransomware attacks were difficult, costly, and required advanced social engineering Present: The dramatic increase of RaaS (Ransomware-as-a- Service) means the most basic hacker can deploy attacks on high-value targets (political figures, celebrities) or deploy at scale extorting every day people for more money

Prediction 6: Technology will Have to Close the Gap on the Critical Cyber Skills Shortage Past: Successful businesses were not dependent upon the digital economy Present: Any company, especially in the devolving world, requires an online presence and therefore a network, but there are not enough skilled security professionals to write policy, protect critical assets, and secure those connections. There will be an increase in outsourcing to MSSPs to address this skills gap.

What is FortiGuard Labs? Real-Time Threat Intelligence Intrusion Prevention Service Antivirus Anti-spam Web Filtering IP Reputation Security Database Application Control Vulnerability Management Mobile FortiGuard Labs = A Global Threat Research Team – over 200 top threat analysts FortiGuard Services = Security services offered on all Fortinet devices, deployed through FortiOS, receiving real-time updates with proactive threat defense and new signautes/updates Cloud Sandbox

What Does FortiGuard Labs Do? Every Minute, Every Day:

What Can You Do? Deploy A Security Fabric Routing What Can You Do? Deploy A Security Fabric SECURE ACCESS APPLICATION SECURITY ENTERPRISE FIREWALL CLOUD SECURITY ADVANCED THREAT PROTECTION FortiSandbox DATA CENTER/PRIVATE CLOUD FortiClient Secure Access Point FortiGate NGFW Fortinet Virtual Firewall Top-of-Rack Cloud-IaaS FortiSwitch Switching FortiGate VMX SDN, Virtual Firewall FortiDB Database Protection FortiGate Internal Segmentation FW FortiGate Internal Segmentation FW FortiADC Application Delivery Controller Web Servers IP Video Security FortiWeb Web Application Firewall PUBLIC CLOUD FortiSwitch Switching FortiGate Internal Segmentation FW CAMPUS Email Server FortiCloud AP Management FortiGate DCFW/ NGFW FortiCloud Sandboxing FortiGate/FortiWiFi Distributed Ent FW SCRIPT: Fortinet is the only company with security solutions for the data center, cloud, campus, branch, operations center and remote user access designed to work together as an integrated security fabric to provide true end-to-end protection. FortiMail Email Security Cloud-SaaS FortiClient FortiGate Internal Segmentation FW FortiClient FortiExtender LTE Extension FortiAnalyzer FortiDDoS Protection FortiCloud FortiSandbox BRANCH OFFICE FortiManager FortiSIEM OPERATIONS CENTER