Automatizacija mrežne bezbednosti

Slides:



Advertisements
Similar presentations
The Most Analytical and Comprehensive Defense Network in a Box.
Advertisements

Security Offering. Cyber Security Solutions 2 Assessment Analysis & Planning Design & Architecture Development & Implementation O&M Critical Infrastructure.
Security Risk Management Marcus Murray, CISSP, MVP (Security) Senior Security Advisor, Truesec
Skybox® Security Solutions for Symantec CCS Comprehensive IT Governance Risk and Access Compliance Management Skybox Security's.
1 Managed Security. 2 Managed Security provides a comprehensive suite of security services to manage and protect your network assets –Managed Firewall.
Cedes.ba The art of security What is not security (what years of pen testing have shown us)
© 2009 IBM Corporation Delivering Quality Service with IBM Service Management April 13 th, 2009.
CMGT400 Intro to Information Assurance and Security (University of Phoenix) Lecture, Week 4 Tom Olzak, MBA, CISSP.
SEC835 Database and Web application security Information Security Architecture.
© 2001 Carnegie Mellon University S8A-1 OCTAVE SM Process 8 Develop Protection Strategy Workshop A: Protection Strategy Development Software Engineering.
Dell Connected Security Solutions Simplify & unify.
Security Professional Services. Security Assessments Vulnerability Assessment IT Security Assessment Firewall Migration Custom Professional Security Services.
Auditing IT Vulnerabilities IT vulnerabilities are weaknesses or exposures in IT assets or processes that may lead to a business risk or security risk.
Office of Campus Information Security Driving a Security Architecture by Assessing Risk Stefan Wahe Sr. Information Security Analyst.
Network security Product Group 2 McAfee Network Security Platform.
What Can Go Wrong During a Pen-test? Effectively Engaging and Managing a Pen-test.
Scott Charney Cybercrime and Risk Management PwC.
What Is DevOps? DevOps is "a portmanteau of 'development' and 'operations'" and is "a software development method that stresses communications, collaboration,
IT Security CS5493(74293). IT Security Q: Why do you need security? A: To protect assets.
ARAMA TECH D A T A P R O T E C T I O N P R O F E S S I O N A L S VISION & STRATEGY.
IS3220 Information Technology Infrastructure Security
Dr. Mark Gaynor, Dr. Feliciano Yu, Bryan Duepner.
ARAMA TECH D A T A P R O T E C T I O N P R O F E S S I O N A L S VISION & STRATEGY.
2© Copyright 2013 EMC Corporation. All rights reserved. Cyber Intelligence Fighting Cyber Crime Insert Event Date LEADERS EDGE.
Why SIEM – Why Security Intelligence??
Welcome Information Security Office Services Available to Counties Security Operations Center Questions.
Blazent / ServiceNow Messaging Guide. Transforming data into actionable intelligence Improve business outcomes by contextualizing data to make informed.
HCNA-Security Huawei Certified Network Associate Security (HCNA-Security) validates the basics of network security knowledge and skills to support the.
DATS Portfolio. PARTNERS & Solutions END TO END DATA CENTER SOLUTIONS Building a robust, resilient IT infrastructure. Lenovo System x combines unbeatable.
Tripwire Threat Intelligence Integrations. 2 Threat Landscape by the Numbers Over 390K malicious programs are found every day AV-Test.org On day 0, only.
11/03/2016.
Defining your requirements for a successful security (and compliance
Proactive Incident Response
Cisco Tetration Analytics: Open APIs Fuel a Thriving Ecosystem
Your Partner for Superior Cybersecurity
OIT Security Operations
Service Assurance in the Age of Virtualization
“Introduction to Azure Security Center”
The Game has Changed… Ready or Not! Andrew Willetts Technologies, Inc.
Hybrid Management and Security
Real-time protection for web sites and web apps against ATTACKS
Compliance with hardening standards
Active Cyber Security, OnDemand
WEBINAR Exterminate Your Bugs With Vulnerability Management
Reduce Security Risks to Protect Your Network
Infrastructure, Data Center & Managed Services
Programi zasnovani na prozorima
I have many checklists: how do I get started with cyber security?
By: Tekeste Berhan Habtu Chief Executive Officer Venue: African Union
Securing Your Digital Transformation
Healthcare Cloud Security Stack for Microsoft Azure
11/17/2018 9:32 PM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
Best Practices in Cyber Security Maggy Powell Senior Manager Real-Time Systems Security Exelon 21 March 2018.
Validating Your Information Security Program (ISP 3 of 3)
Shifting from “Incident” to “Continuous” Response
Security Essentials for Small Businesses
Securing the Threats of Tomorrow, Today.
NetBeans Platfrom.
Osnovni simboli jezika Pascal
Specification of Countermeasures for CYRAIL
Healthcare Cloud Security Stack for Microsoft Azure
1 5 Identify Connect Leverage MOBILE-READY SINGLE PLATFORM
Intrusion Detection system
Overview UA has formed is forming a Security Operations Center (SOC) with Students supporting Tier 1 Activities. The SOC provides benefits to the University.
Best Practices in Cyber Security Maggy Powell Senior Manager Real-Time Systems Security Exelon 26 September 2018.
The MobileIron® Threat Detection difference:
5/9/2019 2:05 AM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS.
Security in the Real World – Plenary Day One
AIR-T11 What We’ve Learned Building a Cyber Security Operation Center: du Case Study Tamer El Refaey Senior Director, Security Monitoring and Operations.
Presentation transcript:

Automatizacija mrežne bezbednosti Ivan Mladenović Regional Manager Adriatic

O kompaniji… Osnovana 1991 u Poljskoj, u privatnom vlasništvu VAD sa kancelarijama u CEE regiji Fokus na naprednim tehnologijama u delu bezbednosti, mrežnih sistema i menadžmentu Izuzetan portfolio proizvođača opreme i tehnologija (Gartner, IDC) Rad na prezentaciji naprednih rešenja partnerima i krajnjim korisnicima Edukacija tržišta kroz razne hands-on treninge sa vrlo efikasnom prodajnom i tehničkom podrškom Praćenje svetskih trendova u cilju što bolje edukacije korisnika

Portfolio u Adriatic regiji NEW Acronis Arista Networks A10 Networks CyberArk HPE (Aruba Networks) Juniper Networks Microsens MobileIron Pulse Secure Rapid7 Rubrik SonicWall Tufin Ucopia Communications Trainings and professional services CLICO NEW

Komponente IT arhitekture

Rešavanje kritičnih bezbedonosnih i IT pitanja Da li sam kompromitovan? Da li sam ranjiv? Da li sam optimizovan? Threat Exposure Management Incident Detection & Response Log Management & IT Analytics VULNERABILITY MANAGEMENT USER BEHAVIOR ANALYTICS ENDPOINT VISIBILITY & ASSET MANAGEMENT APPLICATION SECURITY TESTING INCIDENT DETECTION & RESPONSE INFRASTRUCTURE MONITORING & TROUBLESHOOTING ATTACK SIMULATION ENDPOINT VISIBILITY & INTERROGATION LOG MANAGEMENT & COMPLIANCE Software + Managed Services

Vulnerability Management Threat Exposure Management Vulnerability Management | Application Security | Penetration Testing Vulnerability Management Know your weak points Prioritize what matters most Improve Your Outcomes Know your weak points: Know your weak points: Uncover your hidden attack surface Validate vulnerabilities with Metasploit® Contextualize assets using RealContext™ Prioritize what matters most: Focus on the highest risks using RealRisk™ Deliver impactful, actionable remediation plans Implement best practice security controls Improve your outcomes: Drive decisions using powerful reporting Meet vulnerability management compliance requirements

Threat Exposure Management Vulnerability Management | Application Security | Penetration Testing Know your weak points Prioritize what matters most Improve Your Position Know your weak points: World’s largest code-reviewed exploit database Simulate real-world attacks to test your defenses Find weak credentials Prioritize what matters most: Highlight weaknesses throughout attack chain Closed-loop integration with Nexpose for remediation Improve your position: Scale and speed up penetration testing User awareness programs using phishing campaigns Complete compliance programs faster

Izazovi sa IT upravljanjem u delu mrežne bezbednosti Compliance & Risk Kompleksnost Stalne promene Konektivnost Komunikacija Velike kompanije imaju od 10 pa do 100 promena nedeljno Automatizacija nebezbednih procesa Greške u konfiguraciji lako dovode do service downtime-a Prolazno vreme do rešavanja problema može biti značajno Zahtevi za pristupima od strane dev tima i conf greške dovode do ugrožavanja bezbedonosnih i security polisa Propusti mogu biti nedetektovani i nedeljama Naviše zahteva za promenama dolaze od aplikativnih promena Loša komunikacija između DEC i IT tima Kompanije imaju desetine Firewall, rutera i svičeva Svaki uređaj poseduje kompleksnu conf sa 100 i više rulova Heterogene tehnologije Rezultat: Greške i gubitak kontrole Konfiguracione promene mogu trajati i do 2 nedelje kako bi se implementirale 8

Implementirajte mrežne promene Vizija Implementirajte mrežne promene za 1 dan umesto 1 nedelje sa uvećanom tačnošću i bezbednošću, koristeći automatizaciju i analitiku

Orchestration Suite™ Business Applications Rešava problem koji nastaje usled potrebe za brzom isporukom aplikacija i manualnog procesa promena bezbedonosnih polisa Network Infrastructure 10

Orchestration Suite™ Tufin Orchestration Suite Business Applications Network Infrastructure

Orchestration Suite™ Tufin Orchestration Suite Business Applications Application Connectivity Business Continuity Tufin Orchestration Suite Proactive Risk & Compliance Change Automation & Provisioning Real-time Policy Retrieval, Tracking & Alerting Network Topology & Policy Analysis Engine Network Infrastructure 12

Orchestration Suite™ Centralno upravljanje Vizualizacija povezanosti Promene i obaveštavanja Unified Security Policy™

Hvala vam! Ivan.Mladenovic@clico.rs