Tehničke mjere zaštite podataka

Slides:



Advertisements
Similar presentations
Leap into Innovation 7 Cloud Facts You Can't Afford to Ignore James Lambe Canadian Director, Google Enterprise.
Advertisements

©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties Building Your Security Strategy with 3D.
[Name / Title] [Date] Effective Threat Protection Strategies.
Dell Connected Security Solutions Simplify & unify.
ENTERPRISE COMPUTING QUIZ By: Lean F. Torida
Complete Security. Threats changing, still increasing Data everywhere, regulations growing Users everywhere, using everything We’re focused on protecting.
Sophos Live Protection. Agenda 1.Before and After Scenarios 2.Minimum Required Capabilities 3.How we do it 4.How we do it better.
The Changing World of Endpoint Protection
Network security Product Group 2 McAfee Network Security Platform.
StageNow The easy way to stage Android mobile computers from Zebra Technologies.
Synchronized Security Revolutionizing Advanced Threat Protection
Total Threat Protection Securing All Your Threat Vectors Hartford Tech Summit.
Global Digital Security Market WEBSITE Single User License: US$ 2500 No of Pages: 60 Corporate User License: US$ 4000.
Global Big Data Infrastructure Market WEBSITE Single User License: US$ 2500 No of Pages: 51 Corporate User License:
Global Multi-factor Authentication Market WEBSITE Single User License: US$ 2500 No of Pages: 51 Corporate User License:
© 2011 IBM Corporation IBM Security Services Smarter Security Enabling Growth and Innovation Obbe Knoop – Security Services Leader Pacific.
Cyber Security for the real world Tim Brown Dell Fellow and CTO Dell Security Solutions.
Enterprise Network Security Threats that are Overlooked.
Next-Generation Endpoint Protection Enduser Protection
Mobile Cloud Market to Global Analysis and Forecasts by User Type, End-users No of Pages: 150 Publishing Date: Jan 2017 Single User PDF: US$ 3900.
SYMANTEC ENDPOINT SECURITY SERVICE PROVIDERS | ALLIANCE PRO IT HYDERABAD (CORPORATE OFFICE) ALLIANCE PRO IT PRIVATE LIMITED, 3A, HYNDAVA TECHNO PARK, TECHNO.
SYMANTEC ENDPOINT SECURITY SERVICE PROVIDERS | ALLIANCE PRO IT HYDERABAD (CORPORATE OFFICE) ALLIANCE PRO IT PRIVATE LIMITED, 3A, HYNDAVA TECHNO PARK, TECHNO.
SDN & NFV Driving Additional Value into Managed Services.
The Game has Changed… Ready or Not! Ted Lee
Chapter 1: Explore the Network
2017 Security Predictions from FortiGuard Labs
Advanced Endpoint Security Data Connectors-Charlotte January 2016
Sophos Intercept X Matt Cooke – Senior Product Marketing Manager.
BUILD SECURE PRODUCTS AND SERVICES
IoT Security Part 2, The Malware
Chapter 1: Exploring the Network
Ilija Jovičić Sophos Consultant.
Synchronized Security
Today’s cyber security landscape
Comprehensive Security and Compliance at an Affordable Price.
The Game has Changed… Ready or Not! Andrew Willetts Technologies, Inc.
Security Training and Certification A look at why security should become a part of your DNA
Real-time protection for web sites and web apps against ATTACKS
Defeat Tomorrow’s Threats Today
Free Cloud Management Portal Helps Empower Azure Users to Optimize Spending and Usage Partner Logo “We see the transformational power of Microsoft Azure.
Trends in Ransomware Distribution
Speaker’s Name, SAP Month 00, 2017
National Mining University
Matt G change over point ?
McAfee Security Connected – Next Generation Security
What Do We Do? Managed IT services
Preparing for the cyber landscape of 2020
Infrastructure, Data Center & Managed Services
PRIJENOS PODATAKA.
Developing Innovative Unified Communications Applications
Cloud vs Local: Better Data Storage Device
Podatkovni višemedijski prijenos i računalne mreže Speech Recognition
Li Yang, Carson Woods (University of Tennessee at Chattanooga
Security Essentials for Small Businesses
The Next Generation Cyber Security in the 4th Industrial Revolution
ELEKTRONIČKA POŠTA ( ) OTVARANJE RAČUNA.
Secure once, run anywhere Simplify your security with Sophos
Mcafee Antivirus Setup
Building an Integrated Security System Microsoft Forefront code name “Stirling” Ravi Sankar Technology Evangelist | Microsoft
Make it easy to be secure E.g. derived credentials test lab
Every Business is growing with the help of Mobile Apps. However, thousands of applications get introduced in the market every day. Hence, to make your.
Podatkovni višemedijski prijenos i računalne mreže Speech Recognition
2/25/2019.
Topic What is Network & Network Security ? Network Security Companies
Vida Vasilj (Z) II.4.
The MobileIron® Threat Detection difference:
5/9/2019 2:05 AM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS.
Per Söderqvist Per Söderqvist Sales Engineer
Threat Landscape Update
Digitization complicates visibility Market demands have taken the network beyond your perimeter Threats are more numerous and complex Threats are using.
Presentation transcript:

Tehničke mjere zaštite podataka momir.grgec@fortuno.hr

Prijetnje za podatke Virusi Krađa identiteta Iskorištavanje lokalnih resursa

Izvori prijetnji WEB Elektronička pošta Zaraženi prijenosni uređaji (USB) Društvene mreže

Porast broja napada i njihova složenost Prostor za napad sve veći Napadi su mnogo složeniji od obrane Threat landscape is constantly changing Average user had 3 devices and both user and device are mobile Everything will be Cloud Managed IoT Attackers coordinate and combine tecniques to improve thier strike rate. Resuable code, online tools, it’s easy Soccer/Football – Red Cards (7 player minimum) Laptops/Desktops Phones/Tablets Virtual servers/desktops Cloud servers/storage IoT Syndicated crime tools Zero day exploits Memory resident Polymorphic/metamorphic Multilevel botnets

Razvoj prijetnji Rješavanje web sigurnosnih je potreba vaših radnika već danas Podaci o kupcima Intelektualno vlasništvo Bankovni računi Pristupni podaci društvenih mreža Website kontrola Raspoloživost sustava

Trend razvoja prijetnji PRIJETNJE: Postaju sve više nepoznate Jednostavno ih je primijeniti Koriste se za hakiranje METE: Svi – od pojedinca do korporacija

Lokalna mreža

Lokalna mreža

Smjerovi zaštite: network i endpoint

Zadaće i funkcionalnost firewalla Promet u oba smjera web promet elektronička pošta kontrola aplikacija Kontrola WiFi prometa

Endpoint zaštita Tradicionalni antivirus Temeljen na poznatom kodu - definicije Antivirus nove generacije Prati ponašanje Kontrola fizičkih uređaja

Ostali vidovi zaštite Kriptiranje podataka Kontrola mobilnih uređaja Zaštita servera

Sophos sinkronizirana zaštita Security Heartbeat™ Firewall Next-Gen Endpoint Wireless Mobile Email Server Encryption Web This type of communication and automated response is the future of IT Security, and it’s here today… providing real benefits to thousands of customers around the world who are saving enormous amounts of time responding to and remediating threats. But We’re just getting started with Synchronized Security, we have a ton of new innovations in this area in the works

IT sigurnost je zahtjevna Ljudi koji se bave IT sigurnosti Growing number and sophistication of security threats Increasing cost and exposure of "getting it wrong" Traditional, complex point solutions increase cost and erode usability and manageability Fragmented and constantly changing vendor landscape is difficult to navigate and understand Limited in-house IT security personnel and expertise Pressure on resources, budgets and time Enterprise security issues without enterprise class budgets 100 – 500 500 – 1000 1,000 - 5,000 5,000 - 20,000 20,000+

Licenciranje Kupnja licenci na bazi 1, 2 ili 3 godine MSP program