The New World of Security for Business Travellers Anurag Lal Senior Vice President Strategic Services & Business Development Wi-Fi Business Development.

Slides:



Advertisements
Similar presentations
© 2013 Bradford Networks. All rights reserved. Rapid Threat Response From 7 Days to 7 Seconds.
Advertisements

!! Are we under attack !! Consumer devices continue to invade *Corporate enterprise – just wanting to plug in* Mobile Device Management.
CS898T Mobile and Wireless Network Handheld Device Security By Yuan Chen July 25 th, 2005.
INADEQUATE SECURITY POLICIES Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA standards.
COMPREHENSIVE APPROACH TO INFORMATION SECURITY IN ADVANCED COMPANIES.
© 2009 Avaya Inc. All rights reserved. Page 1 AT&T Mobile Extension with Avaya one-X Mobile.
Privileged Identity Management Enterprise Password Vault
The twenty-four/seven database Oracle Database Security David Yahalom Senior database consultant
Beyond Brute Force Strategies for Securely leveraging Mobile Devices Rajesh Pakkath, Sr. Principal Product Manger, Oracle Bob Beach, CIO, Chevron October,
Beyond Brute Force Strategies for Securely leveraging Mobile Devices Rajesh Pakkath, Sr. Product Manager, Oracle Bob Beach, CIO, Chevron October, 2014.
A Federated Approach to Systems Management Todd Nugent Mike Huffstatler Sr. Product Specialist Systems Engineer.
Sponsored by Lumension Ponemon Institute© Private & Confidential Document Page Security Mega Trends Survey Independently conducted by Ponemon Institute.
16254_08_2002 © 2002, Cisco Systems, Inc. All rights reserved. Cisco’s Security Vision Mario Mazzola Chief Development Officer August 29, 2002.
Open Workshop on e-Infrastructures, Helsinki October 4 – 5, 2006 Roadmap Parallel Session on last chapter of e-IRG Roadmap: Crossing the Boundaries of.
Building Trust in Digital Online World Dr. Shekhar Kirani Vice President VeriSign India 5th June 2009 IBA Conference.
January 23-26, 2007 Ft. Lauderdale, Florida IP Communications, Secure – By Design Roger W. Farnsworth.
Authentication choices! Vincent van Kooten: Business Sales Manager Benelux Distributed by -
67% of the people who use a smartphone for work and 70% of people who use a tablet for work are choosing the devices themselves 905M tablets in.
Network Access Management Trends in IT Applications for Management Prepared by: Ahmed Ibrahim S
4/17/2017 © 2014 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks.
Symantec Vision and Strategy for the Information-Centric Enterprise Muhamed Bavçiç Senior Technology Consultant SEE.
MobileFirst Protect 1. MobileFirst Protect (MaaS360) 2 Mobile Device Management Enable and Manage Apple iOS smartphones, and tablets with Apple DEP Gain.
Windows Server 2012 R2 Capabilities for BYOD Scenario Yuri Diogenes Senior Knowledge Engineer Data Center, Devices & Enterprise Client – CSI Team’s Page:
Demi Albuz SENIOR PRODUCT MARKETING MANAGER Samim Erdogan PRINCIPAL ENGINEERING MANAGER Thomas Willingham TECHNICAL PRODUCT MANAGER.
Security Risk Management Marcus Murray, CISSP, MVP (Security) Senior Security Advisor, Truesec
StorTech Security Regulatory compliance provides the business foundation for security Organisations need to tackle all security challenges from a business.
RSA Security Validating Users and Devices to Protect Network Assets Endpoint Solutions for Cisco Environments.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Cloud Security Julian Lovelock VP, Product Marketing, HID Global.
PROJECT PAPER ON BLUEFIRE MOBILE SECURITY. BY PONNURU VENKATA DINESH KUMAR STUDENT ID # A0815 PROFESSOR – VICKY HSU CS-426.
Unify and Simplify: Security Management
Copyright © 2006 CyberRAVE LLC. All rights reserved. 1 Virtual Private Network Service Grid A Fixed-to-Mobile Secure Communications Framework Managed Security.
What Keeps You Awake at Night Compliance Corporate Governance Critical Infrastructure Are there regulatory risks? Do employees respect and adhere to internal.
Brad Allen Windows Client Technical Specialist Microsoft Corporation.
Robbie Upcroft Sales Manager - SMB & Distribution, Asia-Pacific
Asif Jinnah Microsoft IT – United Kingdom. Security Challenges in an ever changing landscape Evolution of Security Controls: Microsoft’s Secure Anywhere.
 INADEQUATE SECURITY POLICIES ›Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA.
StorTech Security Regulatory compliance provides the business foundation for security Organisations need to tackle all security challenges from a business.
1 Chapter 12: VPN Connectivity in Remote Access Designs Designs That Include VPN Remote Access Essential VPN Remote Access Design Concepts Data Protection.
VIRTUAL PRIVATE NETWORK By: Tammy Be Khoa Kieu Stephen Tran Michael Tse.
The Infrastructure Optimization Journey Kamel Abu Ayash Microsoft Corporation.
US Perspectives on Internet Policy Opportunities and Challenges in 2010 David P. McClure President & CEO US Internet Industry Association.
PCIT313. Today’s challenges Deliver applications to mobile platforms (BYOD) Respond to dynamic business requirements for IT: Seasonal/temporary workers.
CIO Perspectives on Security Fabrício Brasileiro Regional Sales Manager.
© 2005 IBM Corporation IBM Business-Centric SOA Event SOA on your terms and our expertise Operational Efficiency Achieved through People and SOA Martin.
Enforcing Cyber security in Mobile Applications – Public Sector Use Case SAPHINA MCHOME, VIOLA RUKIZA TANZANIA REVENUE AUTHORITY INFORMATION AND COMMUNICATION.
Identity Assurance Emory University Security Conference March 26, 2008.
Enabling Secure Always-On Connectivity [Name] Microsoft Corporation.
Texas Technology Forum The Future of Mobile Technology Trends and Issues July 16, 2009.
A New Security Blueprint Shantanu Ghosh Vice President, Enterprise Security & India Product Operations.
Understand Network Isolation Part 2 LESSON 3.3_B Security Fundamentals.
Information Security Measures Confidentiality IntegrityAccessibility Information cannot be available or disclosed to unauthorized persons, entities or.
About Softex Mission Statement: “To provide innovative security software products and solutions for computing devices” Softex was founded in 1992 by IBM.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Asif Jinnah Field Desktop Services Enabling a Flexible Workforce, an insider’s view.
2015 October 5 th - 6 th 3 Things You Need to Know to Capitalise on Enterprise Mobility Suite How to Unlock EMS.
Enterprise Mobility Suite: Simplify security, stay productive Protect data and empower workers Unsecured company data can cost millions in lost research,
©2015 Check Point Software Technologies Ltd. 1 [Restricted] ONLY for designated groups and individuals CHECK POINT MOBILE THREAT PREVENTION.
Ponemon Institute© Private & Confidential ReportPage 1 State of the Endpoint Survey Analysis of Global Results Briefing for Lumension October 30, 2009.
Tomaž Čebul Principal Consultant Microsoft Bring Your Own Device, kaj pa je to?
1© Copyright 2012 EMC Corporation. All rights reserved. Next Generation Authentication Bring Your Own security impact Tim Dumas – Technology Consultant.
Best-in-class enterprise backup for the mobile enterprise Prepared for [Insert customer name] [Date}
Reduce Risk Across Hybrid IT
(1888 PressRelease) Staying Ahead of Today’s Rapidly Evolving Security Landscape
Reduce Risk Across Hybrid IT
Company Overview & Strategy
Microsoft Data Insights Summit
Providing Teleworker Services
Presentation transcript:

The New World of Security for Business Travellers Anurag Lal Senior Vice President Strategic Services & Business Development Wi-Fi Business Development Summit, Milan 26 th October 2005

2 THE SECURE MOBILITY DILEMMA: Availability Security Usability Control DEMAND FOR ACCESS Workforce Productivity Corporate Agility Global Reach Business Process Optimization On-Demand Enterprise NEED TO PROTECT User Identities Trade Secrets Regulatory Compliance Device Integrity IP on Devices Network Operations Customer Privacy Painful Business Compromises

3 THE MOBILE RISK Vulnerability Means Expense

4 EVOLUTION OF THREATS SECURITY: #1 issue for Broadband Mobility

5 Piecemeal processes through “bundled” solutions Security tools and connectivity service operate in silos Danger from inconsistent or improper use of these tools Endpoint protection only when touching enterprise During Internet-only sessions, pre-VPN window, and during VPN session Accelerate remediation once new threat/antidote discovered Inability to combine best-of-breed point solutions No security vendor are strong across the board “Forklift upgrade” of existing security components SECURITY SOLUTIONS TODAY

6 Data User and Device Authentication Identity Device Automated Assessment & Remediation Network Role-Based Network Security Coordinated protection of identities, endpoints, networks and data that ties together authentication, compliance and network authorization. Enforced VPN TRUSTED CONNECTIONS. NO COMPROMISE.

7 SECURING THE CONNECTION PROCESS Policy Orchestration Platform Single point of control for managing and enforcing policies INTERNET CONNECTIONLAN CONNECTION Internet Access Restricted VPN Access Policies Enforced Trusted Networks Endpoint Lockdown Securing the Connection Dynamic Policy Retrieval Remote Vulnerability Remediation Coordinated Network Enforcement

8 Protection of information Username / Password (single factor) authentication is not secure enough in current environment. Connection paradigm driving two factor authentication to enable trusted computing. Mechanism for “digital fingerprinting” and policy enforcement that ONLY allows corporate authorized devices to attach to the corporate LAN remotely. Almost 2,000 mobile phones are lost every day in the UK (Source: Metropolitian Police, UK) 49% of organizations experienced laptop or mobile phone theft (Source: CSI/FBI 2004 Computer Crime and Security Survey) DEVICE SECURITY

9 SUMMARY Mobility is rapidly evolving but it is not just about connectivity Security must be addressed from a holistic point of view in order for gaps to be identified and closed Policy Orchestration services tie internet and VPN access to both strong device/user authentication and endpoint policy compliance

11 Q&A Securing Mobile Data Sessions Anurag Lal Senior Vice President Strategic Services & Business Development