Pain Point Facilitation and Prioritization Exercise

Slides:



Advertisements
Similar presentations
Rational Unified Process®
Advertisements

Impacts of 3 rd Party IaaS on broadband network operations and businesses Prabhat Kumar Managing Partner, i 3 m 3 Solutions.
Which Cloud? Len Padilla Senior Technical Director NTT Europe.
Copyright (C) The Open Group 2014 Securing Global IT Supply Chains and IT Products by Working with Open Trusted Technology Provider™ Accredited Companies.
Copyright © 2011 Cloud Security Alliance Trusted Cloud Initiative Work Group Session.
Standards Certification Education & Training Publishing Conferences & Exhibits Using Outbound IP Connections for Remote Access EXPO 2005 Chicago, IL.
© 2013 Cisco and/or its affiliates. All rights reserved. 1 Cisco Public Building Trustworthy Systems Overview and Strategy 2013 RSA Conference January.
Security that is... Ergonomic, Economical and Efficient! In every way! Stonesoft SSL VPN SSL VPN.
© Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. HP Security Services Svetlana.
Mechanics of Exporting Certificates of Origin presented by Amanda Barlow USCIB Export Expo December 10, 2013 USCIB Trade Services.
Panorama Consulting Group LLC ERP Assessment, Selection, and Planning SAMPLE APPROACH.
Asper School of Business University of Manitoba Systems Analysis & Design Instructor: Bob Travica System architectures Updated: November 2014.
MIGRATION FROM SCREENOS TO JUNOS based firewall
Cisco Confidential 1 © 2010 Cisco and/or its affiliates. All rights reserved.
1 Past Present Future A Honeywell Company North America Sales Organization.
1 Introduction to Cloud Computing Jian Tang 01/19/2012.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
NUAGA May 22,  IT Specialist, Utah Department of Technology Services (DTS)  Assigned to Department of Alcoholic Beverage Control  PCI Professional.
The Cloud Identity Security Leader. © 2012 Ping Identity Corporation Nair the twain shall meet Enterprise Social Mobile.
Copyright © 2005 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 1 Open Standards for Network Access Control Trusted Network Connect.
Enterprise Privacy Architectures Leveraging Encryption to Keep Data Private Karim Toubba VP of Product Management Ingrian Networks.
Virtual Connectivity Network Virtual Connectivity Networks – Improving Usability and Enhancing Security for Remote Access Jim Kokal Wavetrix President/CEO.
1 CISCO SAFE: VALIDATED SECURITY REFERENCE ARCHITECTURE What It Is Business Transformation Top Questions To Ask To Initiate The Sale Where It Fits KEY.
Panel Three - Small Businesses: Sustaining and Growing a Market Presence Open Interfaces and Market Penetration Protecting Intellectual Innovation and.
Proposal for device identification PAR. Scope Unique per-device identifiers (DevID) Method or methods for authenticating that device is bound to that.
Before: Servers Behind Firewalls Today: Servers Migrate Out Business drivers: E-Business Supply chain management CRM.
“New” Business Model Focused Responsive Variable production Resilient.
Building a Fully Trusted Authentication Environment
Copyright © 2014 Juniper Networks, Inc. 1 Juniper Unite Cloud-Enabled Enterprise Juniper’s Innovation in Enterprise Networks.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
TRAFFIC/GFTN Legality Framework Ulrich Malessa, TRAFFIC Ian Gray, WWF GFTN.
Boris Ulík Technology Solutions Professional Microsoft Slovakia Microsoft ® System Center 2012: System Center Endpoint Protection 2012.
Total Enterprise Mobility Comprehensive Management and Security
The Open Group Supporting: The Office of the Under Secretary of Defense for Acquisition, Technology & Logistics Seattle, February 1, 2010 Acquisition Cybersecurity.
11 Vendors Eye View of New I/M Network Design Vince Mow – Applus Technologies, Inc. I/M Solutions – Chicago – May 20, 2012 I/M SOLUTIONS 2013 Training.
Accelerating the Energy Transition through standardized open-source smart flexibility solutions Flexiblepower Alliance Network aims at a renewable energy.
Sophos Central for partners and customers: overview and new features
Reliable VPN Solutions IN IOT Environments
ClearAvenue, LLC Headquartered in Columbia, Maryland
Case studies on Authentication, Authorization and Audit in SOA Environments Dr. Srini Kankanahalli.
Identity Access Management
BEST CLOUD COMPUTING PLATFORM Skype : mukesh.k.bansal.
Breakthrough Cloud Hosting
Juniper Software-Defined Secure Network
Identification of Locations & Products in complex Supply Chains
Threat Management Gateway
Speaker’s Name, SAP Month 00, 2017
Secure DevOps for Government in MOC
RTES Forum Seattle Agenda, 1- 4 February 2010
Selling Advanced Security for Account Managers v4.0 Smart Services for AM/SE Exam Code: practice-questions.html.
Virtualization & Security real solutions
Cisco Exam Study Material - Cisco Exam Dumps Dumps4download.co.in
Tailor slide to customer industry/pain points
Assessing the Security of the Cloud
Building the Smart City Together
Your Next LIMS: SaaS or On-Premise? Presented by:
Software-Defined Secure Networks in Action
Cybersecurity Special Public Meeting/Commission Workshop for Natural Gas Utilities September 27, 2018.
CLEARTM Media ERP and Azure
The Globus Toolkit™: Information Services
NSX Data Center for Security
(With Hybrid Network Support)
Securing Android Apps using Trusted Execution Environment (TEE) - 07/08/14 Presented by: Mike Hendrick VP Product Sequitur Labs.
Company Overview MegaPath is a leading provider of managed IP communications services in North America Business Founded in 1996 HQ in Pleasanton, CA 1,000+
Building the Smart City Together
TELE3119: Trusted Networks Week 10
VNF Validation Project (VVP) Governance Model – Preliminary Views Sandeep Shah November 9, 2017.
Cybriant Partner Partner Program White Label Materials
Software Defined Perimeter Market Research Report By Forecast to 2023 Industry Survey, Growth, Competitive Landscape and Forecasts to 2023 PREPARED BY.
Presentation transcript:

Pain Point Facilitation and Prioritization Exercise Jim Hietala

Question for Pain Point Discussion: For each of these segments, what are the obstacles or pain points that prevent us from: defining what “good commercial products” are in that segment identifying and acquiring products that meet those definitions?

Pain Points Discussion Starter Network Security Devices (e.g. firewall, NIPS, AV/spam gateways) Centralized Security Services (e.g. IAM, SIEM, log management) Cloud/SaaS Delivered Security Services (e.g. Managed VA/ scan, cloud A/V, spam) Vendors: Cost to develop, test, certify/accredit, deliver Timeframe to develop, test, certify/accredit, deliver Limited market for certified products given time to test required Uncertain market for “highly secure” vs. “highly functional”   Customers: Lack of interoperability Supply chain security assurance Cost of secure, certified products Lack of software assurance, all types of software Lack of guidance on secure architectures Perimeter security model breaking down Lack of guidance on effective infosec management Threat/response, point solution nature of market Secure Platforms (e.g. SELinux, Trusted Solaris, TPM, Separation Kernel, et al) Acquisition: Globalization: R&D, manufacturing, software/hardware design (assurance of entire chain) Revised Common Criteria – Security certification standardization Approach to complexity where needed/can be eliminated Root cause analysis to feed policy updates Standardization (configurations and work with vendors before stipulating) System Assurance guidelines High Assurance – when will it be mandated? Swim-lanes and authorities across government Export control/ITAR, etc. Sensible policies for acquisition: scalable to program and place in architecture Redundant interoperability testing (and regimes) –need to overhaul certification policies Endpoint Security Software (e.g. A/V, F/W, anti-spam)

Contacts: Dave Lounsbury, VP, Collaboration Services d.lounsbury@opengroup.org Jim Hietala, VP, Security j.hietala@opengroup.org Sally Long, Project Management s.long@opengroup.org Joe Bergmann, Director, RTES Forum j.bergmann@opengroup.org Administrative: Diane MacDonald d.macdonald@opengroup.org

Thank you for your participation! We look forward to seeing you in Seattle