Tehničke mjere zaštite podataka momir.grgec@fortuno.hr
Prijetnje za podatke Virusi Krađa identiteta Iskorištavanje lokalnih resursa
Izvori prijetnji WEB Elektronička pošta Zaraženi prijenosni uređaji (USB) Društvene mreže
Porast broja napada i njihova složenost Prostor za napad sve veći Napadi su mnogo složeniji od obrane Threat landscape is constantly changing Average user had 3 devices and both user and device are mobile Everything will be Cloud Managed IoT Attackers coordinate and combine tecniques to improve thier strike rate. Resuable code, online tools, it’s easy Soccer/Football – Red Cards (7 player minimum) Laptops/Desktops Phones/Tablets Virtual servers/desktops Cloud servers/storage IoT Syndicated crime tools Zero day exploits Memory resident Polymorphic/metamorphic Multilevel botnets
Razvoj prijetnji Rješavanje web sigurnosnih je potreba vaših radnika već danas Podaci o kupcima Intelektualno vlasništvo Bankovni računi Pristupni podaci društvenih mreža Website kontrola Raspoloživost sustava
Trend razvoja prijetnji PRIJETNJE: Postaju sve više nepoznate Jednostavno ih je primijeniti Koriste se za hakiranje METE: Svi – od pojedinca do korporacija
Lokalna mreža
Lokalna mreža
Smjerovi zaštite: network i endpoint
Zadaće i funkcionalnost firewalla Promet u oba smjera web promet elektronička pošta kontrola aplikacija Kontrola WiFi prometa
Endpoint zaštita Tradicionalni antivirus Temeljen na poznatom kodu - definicije Antivirus nove generacije Prati ponašanje Kontrola fizičkih uređaja
Ostali vidovi zaštite Kriptiranje podataka Kontrola mobilnih uređaja Zaštita servera
Sophos sinkronizirana zaštita Security Heartbeat™ Firewall Next-Gen Endpoint Wireless Mobile Email Server Encryption Web This type of communication and automated response is the future of IT Security, and it’s here today… providing real benefits to thousands of customers around the world who are saving enormous amounts of time responding to and remediating threats. But We’re just getting started with Synchronized Security, we have a ton of new innovations in this area in the works
IT sigurnost je zahtjevna Ljudi koji se bave IT sigurnosti Growing number and sophistication of security threats Increasing cost and exposure of "getting it wrong" Traditional, complex point solutions increase cost and erode usability and manageability Fragmented and constantly changing vendor landscape is difficult to navigate and understand Limited in-house IT security personnel and expertise Pressure on resources, budgets and time Enterprise security issues without enterprise class budgets 100 – 500 500 – 1000 1,000 - 5,000 5,000 - 20,000 20,000+
Licenciranje Kupnja licenci na bazi 1, 2 ili 3 godine MSP program