Solidcore Harness the Power of Change John Sebes CTO Solidcore Systems, Inc. Case Study:

Slides:



Advertisements
Similar presentations
Presented by Nikita Shah 5th IT ( )
Advertisements

Patch Management Patch Management in a Windows based environment
Information System protection and Security. Need for Information System Security §With the invent of computers and telecommunication systems, organizations.
Solutions & Services to ‘Multiply your Business Performance’ 2013.
ForeScout Technologies Ayelet Steinitz, Product Manager April, 2003.
-How To leverage Virtual Desktop for Manageability & Security -Desktop Computing “as a service” Andreas Tsangaris CTO, PERFORMANCE
Software Security Threats Threats have been an issue since computers began to be used widely by the general public.
Lesson 14-Desktop Protection. Overview Protect against malicious code. Use the Internet. Protect against physical tampering.
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
Contact Center Security Strategies Grant Sainsbury Practice Director, Dimension Data.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
1 Secure Your Business PATCH MANAGEMENT STRATEGY.
Stephen S. Yau CSE , Fall Security Strategies.
Mel Pless, Sr. Director, Solutions Consulting Guidance Software, Inc. Let’s Get Right To The Endpoint Leveraging Endpoint Data to Expose,
Guide to Operating System Security Chapter 2 Viruses, Worms, and Malicious Software.
Barracuda Networks Confidential1 Barracuda Backup Service Integrated Local & Offsite Data Backup.
Department Of Computer Engineering
Presented by INTRUSION DETECTION SYSYTEM. CONTENT Basically this presentation contains, What is TripWire? How does TripWire work? Where is TripWire used?
Security Risk Management Marcus Murray, CISSP, MVP (Security) Senior Security Advisor, Truesec
Your technology solution partner.™ Security Enterprise Protection Gener C. Tongco Product Manager CT Link Systems Inc.
Cloud Computing How secure is it? Author: Marziyeh Arabnejad Revised/Edited: James Childress April 2014 Tandy School of Computer Science.
Avanade: 10 tips for å sikring av dine SQL Server databaser Bernt Lervik Infrastructure Architect Avanade.
1 Managed Security. 2 Managed Security provides a comprehensive suite of security services to manage and protect your network assets –Managed Firewall.
SEC835 Database and Web application security Information Security Architecture.
Introducing Quick Heal Endpoint Security 5.2. “Quick Heal Endpoint Security 5.2 is designed to provide simple, intuitive centralized management and control.
Malicious Code Brian E. Brzezicki. Malicious Code (from Chapter 13 and 11)
©2004 Check Point Software Technologies Ltd. Proprietary & Confidential Policy and Configuration Compliance for Devices Connecting to the Wireless Network.
Security Awareness: Applying Practical Security in Your World Chapter 1: Introduction to Security.
1Cisco Security NOW © 2003, Cisco Systems, Inc. All rights reserved. THIS IS THE POWER OF CISCO SECURITY. now.
PATCH MANAGEMENT: Issues and Practical Solutions Presented by: ISSA Vancouver Chapter March 4, 2004.
Classification 10/3/2015 Worry-Free Business Security 5.0.
User Manager Pro Suite Taking Control of Your Systems Joe Vachon Sales Engineer November 8, 2007.
Environment for Information Security n Distributed computing n Decentralization of IS function n Outsourcing.
ERP. What is ERP?  ERP stands for: Enterprise Resource Planning systems  This is what it does: attempts to integrate all data and processes of an organization.
ISO17799 Maturity. Confidentiality Confidentiality relates to the protection of sensitive data from unauthorized use and distribution. Examples include:
A virus is software that spreads from program to program, or from disk to disk, and uses each infected program or disk to make copies of itself. Basically.
Time lag between discovering issue and resolving Difficult to find solutions and patches that can help resolve issue Service outages expensive and.
SOA Management Packs & Governance Cheat Sheet (Shared under OPN NDA - Last Updated: 8/3/2009)OPN NDA Target Account Profile Enterprises that: Have IT infrastructure.
The Infrastructure Optimization Journey Kamel Abu Ayash Microsoft Corporation.
Lesson 19-E-Commerce Security Needs. Overview Understand e-commerce services. Understand the importance of availability. Implement client-side security.
INTRUSION DETECTION SYSYTEM. CONTENT Basically this presentation contains, What is TripWire? How does TripWire work? Where is TripWire used? Tripwire.
System Implementation. © 2011 Pearson Education, Inc. Publishing as Prentice Hall 2 Chapter 13 FIGURE 13-1 Systems development life cycle with the implementation.
©2015 HEAT Software. All rights reserved. Proprietary & Confidential. Ransomware: How to Avoid Extortion Matthew Walker – VP Northern Europe.
Safe’n’Sec IT security solutions for enterprises of any size.
Staff Assessment Technology Services Department Palmyra Area School District.
© 2013 Toshiba Corporation B2B PC Training Mailer - Toshiba Device Access Control.
1© Copyright 2015 EMC Corporation. All rights reserved. FEDERATION ENTERPRISE HYBRID CLOUD OPERATION SERVICES FULL RANGE OF SERVICES TO ASSIST YOUR STAFF.
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
Infrastructure for the People-Ready Business. Presentation Outline POINT B: Pro-actively work with your Account manager to go thru the discovery process.
MUHAMMAD GHAZI AIMAN BIN MOHD AIDI. DEFINITION  A computer virus is a malware program that, when executed, replicates by inserting copies of itself (possibly.
Microsoft NDA Material Adwait Joshi Sr. Technical Product Manager Microsoft Corporation.
Enterprise’ Ever-Evolving Challenge & Constraints Dealing with BYOD Challenges Enable Compliance to Regulations Stay Current with New Consumption Models.
Unit 2 Personal Cyber Security and Social Engineering Part 2.
By the end of this lesson you will be able to: 1. Determine the preventive support measures that are in place at your school.
Welcome Information Security Office Services Available to Counties Security Operations Center Questions.
Contingency Management Indiana University of Pennsylvania John P. Draganosky.
SemiCorp Inc. Presented by Danu Hunskunatai GGU ID #
SELF-DEFENDING NETWORK. CONTENTS Introduction What is Self Defending Network? Types of Network Attacks Structure of Self Defending Network Conclusion.
HIPS. Host-Based Intrusion Prevention Systems  One of the major benefits to HIPS technology is the ability to identify and stop known and unknown attacks,
Application Communities
Chapter 7. Identifying Assets and Activities to Be Protected
Critical Security Controls
Infrastructure as a Service
Firewalls.
Faculty of Science IT Department By Raz Dara MA.
BACHELOR’S THESIS DEFENSE
BACHELOR’S THESIS DEFENSE
PLANNING A SECURE BASELINE INSTALLATION
Chapter # 3 COMPUTER AND INTERNET CRIME
Presentation transcript:

Solidcore Harness the Power of Change John Sebes CTO Solidcore Systems, Inc. Case Study:

Slide 2 Solidcore Proprietary and Confidential What Solidcore Does  Situation  Operations and Security are at a cross roads  Business Drivers  Frequent change is affecting IT service levels – including unknown and possibly malicious change  Compliance initiatives stress IT/business linkage  Key Insight  Change drives complexity & cost!  Frequency of changes  Changes outside process  Multi-org. change coordination  The Solidcore Value  Provides complete and proactive control of change in the production environment  Works at the device-level and ties infrastructure change to IT processes and policies  Augments existing configuration management and IT workflow systems

Slide 3 Solidcore Proprietary and Confidential Customer: PACE  Profile: Pace Suburban Bus Service  Pace Suburban Bus Service - 14th largest bus service in the U.S. - 1,500 employees buses  Pace provides bus and van service for six Chicago- area counties  MIS department has a centralized data center with limited support staff - performs large amounts of data analysis - responsible for software requests and communications - datacenter system maintenance

Slide 4 Solidcore Proprietary and Confidential Customer: PACE  The Problem  Servers needed patching every other day to try to stay one step ahead of all the security threats  Need to provide 24x7 service availability - aren’t staffed for 24x7  Patching alone was stressing ability to maintain SLAs

Slide 5 Solidcore Proprietary and Confidential What are Pace’s Technical Requirements?  Low on-going operational costs  Scale deployments at fixed and predictable cost  No policies or rules to setup  No policies to update on an ongoing basis  Reduce security related patch cycles  Low performance overhead  Minimize security risk  Protection from malicious code execution  Zero Day attacks, mass attacks worms, viruses, Trojans, etc  Prevent internal threat  Control what can be installed and run on remote systems.

Slide 6 Solidcore Proprietary and Confidential Why is Securing Pace’s Environment so Hard?  Operational Effectiveness  Current security products are operationally intensive, making scaling to large deployments expensive  Performance overhead can be significantly high  Operationally intensive “Patching” is becoming the solution of choice  Risk Minimization  Understanding prevalent level of risk for current investment  Implemented policies do not keep pace with IT growth or Zero-day attacks, especially for remote/distributed systems  Level of protection erodes over time.  Internal threat is not accounted for

Slide 7 Solidcore Proprietary and Confidential Protecting Pace: What’s being Optimized? Deployment Scope with fixed ops cost (customization, tweaking, maintenance etc) per machine EvalPilotDepartment Enterprise Degree of Prevention/Detection AV HIPS

Slide 8 Solidcore Proprietary and Confidential Introducing S3 Security ™ S3 | security Solidcore  Deploy & Forget Security  No requirements for initial or on-going configuration, rules, signatures or learning  Minimal Performance Overhead  Installs easily with minimal system overhead  Unauthorized Code Cannot Run  Categorical protection from external threats including zero day attacks, mass attacks worms, viruses, and Trojans regardless of vector of attack  Internal Threat Protection  Maintains administrative flexibility while protecting authorized software configuration Operations-centric security based on change control

Slide 9 Solidcore Proprietary and Confidential Protecting Pace: Protection with Fixed Ops Cost Deployment Scope with fixed ops cost (customization, tweaking, maintenance etc) per machine EvalPilotDepartment Enterprise Degree of Prevention/Detection AV HIPS S3 Security

Slide 10 Solidcore Proprietary and Confidential Solidcore’s Innovation: Solidification ™ Solidified Production Mode Control Assured 2 Initial Solidification Initial System Inventory Created 1 Solidified Production Update Mode Updated System Inventory 3 Updated Solidified Production Mode Control Assured 4 Enable Update Mode Disable Update Mode Identify Disk Image Current, Gold or Audited Image 0 Deployment State Production State

Slide 11 Solidcore Proprietary and Confidential S3 Security is Practical Solidification ™ “Deploy and Forget Protection” No initial and on-going configuration No false positives or negatives Practically no performance overhead Very small footprint

Slide 12 Solidcore Proprietary and Confidential Customer: PACE  The Solidcore Value  "Solidcore is a godsend.” Bob Lescaleet, MIS department manager at Pace Suburban Bus Service  With Solidcore, if patching is needed, it can be done on Pace’s schedule.  Solidcore’s installation was a breeze and, once running, is transparent to operators.

Thank You

Slide 14 Solidcore Proprietary and Confidential Prevention & Detection with Solidcore KeyExample Full Capability Partial Capability Understanding Risk Prevention % of Attacks Extent of Damage Types of AttacksHIDSAVHIPSSolidificationExample --Strategic like IP theft Internal Threat Planting Backdoor, turning prevention off <2%Authorized Code bad behavior FTP application can be used to overwrite a system file. PeopleSoft can upload a sw and then run it. 95%Wide- spread Unauthorized Code ZotoB, SQL Slammer etc Buffer Overflow, Denial of Service etc <2%--Known bad code (signature) Detection HIDSAVHIPSSolidification BreadthHigh--HighMedium AccuracyLow--LowHigh