Nevada Digital Summit David Podwojski Director, Public Sector Citrix Systems, Inc.

Slides:



Advertisements
Similar presentations
Computer and Mobile Device Equipment Security Brief May 29, 2008 Presented by: Kevin G. Sutton, Chief, Information Technology Unit.
Advertisements

ControlSphere is a computer security and automation solution designed to protect user data and automate most of authentication tasks for the user at work.
Avoid data leakage, espionage, sabotage and other reputation and business risks without losing employee performance and mobility.
Digital Certificate Installation & User Guide For Class-2 Certificates.
COMPUTER BASICS METC 106. The Internet Global group of interconnected networks Originated in 1969 – Department of Defense ARPANet Only text, no graphics.
For further information computersecurity.wlu.ca
Securing. Agenda  Hard Drive Encryption  User Account Permissions  Root Level Access  Firewall Protection  Malware Protection.
Data Security for Healthcare Facilities Debbie Abbott Health Information Consultant Resolutions (Int) Pty Ltd.
E-Commerce Security Issues. General E-Business Security Issues Any E-Business needs to be concerned about network security. The Internet is a “ public.
Operating System Customization
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
Nada Abdulla Ahmed.  SmoothWall Express is an open source firewall distribution based on the GNU/Linux operating system. Designed for ease of use, SmoothWall.
Avoid data leakage, espionage, sabotage and other reputation and business risks without losing employee performance and mobility. Simplify authentication.
1 © 2007 Citrix Systems, Inc.—All rights reserved, Citrix Company Confidential What’s New with Citrix Presentation Server 4.5 Presented by
OAAIS Enterprise Information Security Security Awareness, Training & Education (SATE) Program or UCSF Campus VPN.
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 9: Planning and Managing Certificate Services.
Beyond WiFi: Securing Your Mobile Devices Thomas Kuhn Information Technology Assistance Center (iTAC) Kansas State University.
INTRANET SECURITY Catherine Alexis CMPT 585 Computer and Data Security Dr Stefan Robila.
HIPAA Data Security PCF Data Security Update May 1 st, 2015.
Remote Access SSL VPN Stewart Duncan Technical Manager.
Sensitive Data Accessibility Financial Management College of Education Michigan State University.
Server 2008 Terminal Services and Remote Desktop Services Basic application access is possible without Citrix, and Server 2008 R2 adds on some key features.
Joel Garmon, Director, Information Security Mike Rollins, Security Architect Jeff Teague, Security Analyst, Senior 1
Mobility Methods for document access while away from the office.
New Data Regulation Law 201 CMR TJX Video.
Information Security Information Technology and Computing Services Information Technology and Computing Services
Dr. John P. Abraham Professor UTPA.  Particularly attacks university computers  Primarily originating from Korea, China, India, Japan, Iran and Taiwan.
E-business Security Dana Vasiloaica Institute of Technology Sligo 22 April 2006.
Automating 100 Processes with Interneer Apps Chris Condon – Director, IT Innovation and Solutions, Los Angeles Firemen’s Credit Union.
TRACs Security Awareness FY2009 Office of Information Technology Security 1.
The Impact of Physical Security on Network Security
Market Trends Enterprise Web Applications Cloud Computing SaaS Applications BYOD Data Compliance Regulations 30 Second Elevator Pitch Web browsers have.
Best Practices in Deploying a PKI Solution BIEN Nguyen Thanh Product Consultant – M.Tech Vietnam
Microsoft ® Official Course Module 8 Securing Windows 8 Desktops.
Security Awareness ITS SECURITY TRAINING. Why am I here ? Isn’t security an IT problem ?  Technology can address only a small fraction of security risks.
Component 4: Introduction to Information and Computer Science Unit 8: Security Lecture 2 This material was developed by Oregon Health & Science University,
BUSINESS B1 Information Security.
Staying Safe Online Keep your Information Secure.
Chapter SIx Maintaining a Computer Part I: Configuring, Updating, and Upgrading the OS.
Windows Security. Security Windows 2000/XP Professional security oriented Authentication Authorization Internet Connection Firewall.
Protecting Internet Communications: Encryption  Encryption: Process of transforming plain text or data into cipher text that cannot be read by anyone.
Name Region Assisting Partners to Do the Day in the Life Demonstration.
System Security Chapter no 16. Computer Security Computer security is concerned with taking care of hardware, Software and data The cost of creating data.
Name Company A Day in the Life… A Demonstration of Application Delivery.
ExamSoft at BU LAW Boston University School of Law Office of Systems & Technology.
Maintaining Network Health. Active Directory Certificate Services Public Key Infrastructure (PKI) Provides assurance that you are communicating with the.
Security Issues and Strategies Chapter 8 – Computers: Understanding Technology (Third edition)
Integrating and Troubleshooting Citrix Access Gateway.
Joel Rosenblatt Director, Computer and Network Security September 10, 2013.
Copyright © 2003 Jorgen Thelin / Cape Clear Software 1 A Web Services Security Framework Jorgen Thelin Chief Scientist Cape Clear Software Inc.
SonicWALL SSL-VPN Series Easy Secure Remote Access Cafferata Cristiano SE Italia.
Security fundamentals Topic 5 Using a Public Key Infrastructure.
© ITT Educational Services, Inc. All rights reserved. IS3230 Access Security Unit 7 Authentication Methods and Requirements.
Encryption as a Preventive Countermeasure Sean Maher, Information Security Coordinator.
Cybersecurity Test Review Introduction to Digital Technology.
OCTOBER IS CYBER SECURITY AWARENESS MONTH. October is Cyber Security Awareness Month  Our Cyber Security Awareness Campaign focuses on topics such as.
©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. Securing Your Data in Endpoint and Mobile Environments Frank Suijten Security.
SY0-401 COMPTIA Security+ Certification Exam Vcepracticetest.com.
Unit 2 Personal Cyber Security and Social Engineering Part 2.
Information Systems Design and Development Security Precautions Computing Science.
BizSmart Lunch & Learn Webinar Information Security and Protecting your business With the increased risk of some sort of cyber- attack over the past few.
SemiCorp Inc. Presented by Danu Hunskunatai GGU ID #
EasyAccess 2.0 A secured way to remotely access your Weintek HMIs and their PLCs Wherever they are on the globe.
CompTIA Security+ Certification Exam SY
Barracuda SSL VPN Remote, Authenticated Access to Applications and Data Version 2.6 | July 2014.
Utilize Group Policy Terminal Server Settings
WI / XA Integration with NetScaler Gateway: How it works
County HIPAA Review All Rights Reserved 2002.
Modular Object Scanning Technology (MOST)
Designing IIS Security (IIS – Internet Information Service)
Presentation transcript:

Nevada Digital Summit David Podwojski Director, Public Sector Citrix Systems, Inc.

JOE’S IDEAL SYSTEM On startup the user would get a browser interface or Logon that required their authentication. They would never authenticate again for anything during their Session. Each program, file share or other access would validate their credentials and access or reject based on the confirmed identity.

3 © 2007 Citrix Systems, Inc.—All rights reserved, Citrix Company Confidential What if …. Your system checked the identity of each attached client? Your system validated the version of the OS and patches to the OS installed along with the antivirus software on the end point device? Your system would terminate the session of any user who disabled the antivirus software after launching the their session? You were able to set “use policies” based on user, end user device, and network. The “use policies” also would be used to manage downloading, network and external drives and printing? If needed you could record any user session on the system.

4 © 2007 Citrix Systems, Inc.—All rights reserved, Citrix Company Confidential What if … The only computing device the user had was an six or seven years old and didn’t have a hard drive but would boot from a floppy? If the only devices available were diskless thin clients appliances? You could get all the graphics that Vista can deliver on a thin client appliance? A new application or a new version of an application had to be delivered to 100’s or 1,000’s of users within a few hours?

5 © 2007 Citrix Systems, Inc.—All rights reserved, Citrix Company Confidential A world where any service can be accessed or delivered from anywhere Our Vision for Government

6 © 2007 Citrix Systems, Inc.—All rights reserved, Citrix Company Confidential UsersApps App Delivery as an On-Demand Service Application Delivery via a Browser Applications and data reside in the Data Center Compatible with biometric, smartcard, two factor/key fob Manage password with AD or LDAP integrated password manager Monitor OptimizeSecureControl

7 © 2007 Citrix Systems, Inc.—All rights reserved, Citrix Company Confidential UsersApps App Delivery as an On-Demand Service Highest Security 128 bit encryption Transmit only mouse clicks, key strokes and replace pixels. Hardened Linux SSL VPN Appliance in the DMZ Smart Access Software – Granular Access Control Monitor OptimizeSecureControl

8 © 2007 Citrix Systems, Inc.—All rights reserved, Citrix Company Confidential UsersApps App Delivery as an On-Demand Service Fastest Performance Highest Security Secure by Design Lowest Total Cost Best User Experience Monitor OptimizeSecureControl

9 © 2007 Citrix Systems, Inc.—All rights reserved, Citrix Company Confidential Joe’s Ideal State Every individual is identified via a two or three factor identification process (biometric, smart card, passport) and are provisioned to access any application or system in the state based on that identity and their need Every system/application validates the user via a common interface Every individual is setup automatically based on their need and a predetermined profile All state and municipal entities have a trust relationship based on a shared/common security model Individuals receive access to only that information needed to complete their mission Sensitive records are well defined and encrypted or securely stored

10 © 2007 Citrix Systems, Inc.—All rights reserved, Citrix Company Confidential It would be a very bad day if …

11 © 2007 Citrix Systems, Inc.—All rights reserved, Citrix Company Confidential County workers' data on stolen laptop By Keith Ervin Seattle Times staff reporter The King County Transportation Department has informed 1,400 current and former employees that a laptop computer containing personal information about them has been stolen. Workers' names, addresses and Social Security numbers were on the password-protected laptop, which was stolen during a Sept. 28 home burglary. The information was not encrypted, department spokeswoman Rochelle Ogershok said Thursday. The laptop was taken from the home of a Transportation Department human-resources employee while the employee was traveling outside the country, Ogershok said. The employee routinely carries the laptop from one work site to another. Transportation officials learned of the theft Oct. 1 and, after determining what information was on the computer, sent letters to current and former employees Oct. 3 advising them of the incident. The affected employees work or worked in the Roads, Airport and Fleet divisions. Managers have held meetings with employees to discuss steps they can take to protect themselves from possible identity theft. The county will provide free credit monitoring for one year, Ogershok said.

12 © 2007 Citrix Systems, Inc.—All rights reserved, Citrix Company Confidential Thank You