Telling the right story Confidential © Bloor Research 2010 …optimise your IT investments Click to edit Master subtitle style Malware—taking protection.

Slides:



Advertisements
Similar presentations
Worry-Free Business Security 7
Advertisements

…optimise your IT investments archiving best practices Fran Howarth Senior Analyst, Security.
Security intelligence: solving the puzzle for actionable insight Fran Howarth Senior analyst, security Bloor Research.
Bucharest, July 31, 2012 | Bitdefender 2012 Cloud Security for Endpoints Customer Presentation.
11 Zero Trust Networking PALO ALTO NETWORKS Zero Trust Networking April 2015 | ©2014, Palo Alto Networks. Confidential and Proprietary.1 Greg Kreiling.
CHAPTER 2 KNOW YOUR VILLAINS. Who writes it: Malware writers vary in age, income level, location, social/peer interaction, education level, likes, dislikes.
Threat Overview: The Italian Job / HTML_IFRAME.CU June 18, 2007.
The Changing Face of Endpoint Security K Varadarajan Regional Manager, Enterprise Sales, Symantec Security Conference 2010_Bangalore.
Lisa Farmer, Cedo Vicente, Eric Ahlm
Defense-in-Depth Against Malicious Software Jeff Alexander IT Pro Evangelist Microsoft Australia
1 Pertemuan 6 Points of Exposure Matakuliah:A0334/Pengendalian Lingkungan Online Tahun: 2005 Versi: 1/1.
Copyright 2011 Trend Micro Inc. Trend Micro Web Security- Overview.
Securing Instant Messaging Matt Hsu. Outline Introduction Instant Messaging Primer Instant Messaging Vulnerabilities and Exploits Securing Instant Messaging.
MobileFirst Protect 1. MobileFirst Protect (MaaS360) 2 Mobile Device Management Enable and Manage Apple iOS smartphones, and tablets with Apple DEP Gain.
Introducing Quick Heal Endpoint Security 5.3. “Quick Heal Endpoint Security 5.3 is designed to provide simple, intuitive centralized management and control.
Kaspersky Lab: The Best of Both Worlds Alexey Denisyuk, pre-sales engineer Kaspersky Lab Eastern Europe 5 th April 2012 / 2 nd InfoCom Security Conference.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 1: Exploring the Network Introduction to Networks.
Windows 7 & Office 2010 Glenn Osako Partner Territory Manager West Region SMB Microsoft Corporation Best productivity on a modern foundation.
Norman SecureSurf Protect your users when surfing the Internet.
©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties Building Your Security Strategy with 3D.
eScan Total Security Suite with Cloud Security
First Community Bank Prevx Safe Online Rollout & Best Practice Presentation.
INTRODUCING F-SECURE POLICY MANAGER
[Name / Title] [Date] Effective Threat Protection Strategies.
Network Security Essentials Chapter 11 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
Introducing Quick Heal Endpoint Security 5.2. “Quick Heal Endpoint Security 5.2 is designed to provide simple, intuitive centralized management and control.
InterScan Gateway Security Appliance 1.0 Filip Demianiuk Sales Engineer Eastern Europe
© 2006 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Cisco ASA 5500 Series Content Security Edition License Renewal Program.
COPYRIGHT © 2007, PATRIOT TECHNOLOGIES, INC. THIRD PARTY BRANDS & NAMES ARE THE PROPERTY OF THEIR RESPECTIVE OWNERS Maryland Digital Government Summit.
Business Computing 550 Lesson 6. 2 Security Threats on Web Sites Issues and vulnerabilities 1.Illegal Access and Use (Hacking the system or users exposing.
IT security By Tilly Gerlack.
WEBSENSE ® SECURITY LABS™ 2006 Semi-Annual Web Security Trends Report OWASP Presentation November 9, 2006 Jim Young (301)
Classification 10/3/2015 Worry-Free Business Security 5.0.
Click to edit Master title style Click to edit Master text styles –Second level Third level –Fourth level »Fifth level June 10 th, 2009Event details (title,
Hosted Security: Complete Protection With A Peace Of Mind Leonard Sim Client Services Manager – South Asia Symantec Hosted Services 1.
…optimise your IT investments Taming the device creep Fran Howarth, Bloor Research
Webroot Web Security SaaS A Better Approach to Web Security
Network and Perimeter Security Paula Kiernan Senior Consultant Ward Solutions.
ANTIVIRUS SOFTWARE.  Antivirus software is the most widespread mechanism for defending individual hosts against threats associated with malicious software,
Sophos Live Protection. Agenda 1.Before and After Scenarios 2.Minimum Required Capabilities 3.How we do it 4.How we do it better.
The Changing World of Endpoint Protection
SPAM Settings. The ExchangeDefender Admin Site is a powerful tool that gives you access to all of the benefits ExchangeDefender has to offer, from the.
1 Topic 2: Lesson 3 Intro to Firewalls Summary. 2 Basic questions What is a firewall? What is a firewall? What can a firewall do? What can a firewall.
CIO Perspectives on Security Fabrício Brasileiro Regional Sales Manager.
Copyright 2009 Trend Micro Inc. Beyond AV security, now with DLP and web protection. Trend Micro PortalProtect SharePoint Security.
© 2009 WatchGuard Technologies WatchGuard ReputationAuthority Rejecting Unwanted & Web Traffic at the Perimeter.
Security Version 6.1 | August Need for Complete Security Stop threats at the perimeter High volume spam, phishing, viruses and.
Module  Introduction Introduction  Techniques and tools used to commit computer crimes Techniques and tools used to commit computer crimes.
Total Threat Protection Securing All Your Threat Vectors Hartford Tech Summit.
Computer Security By Duncan Hall.
BUFFERZONE Advanced Endpoint Security Data Connectors-Charlotte January 2016 Company Confidential.
Information Security: Current Threats Marc Scarborough Information Security Officer
© 2006, iPolicy Networks, Inc. All rights reserved. Security Technology Correlation Proneet Biswas Sr. Security Architect iPolicy Networks
Sponsored by: 1 The State of Corporate A Survey of IT Professionals October 2013.
©2015 Check Point Software Technologies Ltd. 1 [Restricted] ONLY for designated groups and individuals CHECK POINT MOBILE THREAT PREVENTION.
Cryptography and Network Security
CLOSE THE SECURITY GAP WITH IT SOLUTIONS FROM COMPUTACENTER AND CISCO AUGUST 2014.
SemiCorp Inc. Presented by Danu Hunskunatai GGU ID #
- Company Confidential - Corporate Overview March 2015.
Armenia Twinning 2011 Component F – Information Society, 2 – 6 May DEVELOPMENT OF INFORMATION SOCIETY STATISTICS IN LITHUANIA SURVEY ON.
Have a Safe Shopping Online Experience. Did You Shop Online Today?  Anything you need today is available online. Whether it’s groceries, jewellery, clothes,
Complete Cloud Security Anyone, anywhere, any app, any device.
No boundaries with Unified Web Security Solutions Steven Vlastra Sr. Systems Engineer - Benelux.
KASPERSKY INTERNET SECURITY FOR ANDROID. YOUR MOBILE DEVICES NEED PROTECTION More online communications and transaction are happening on tablets and phones.
FUSE MAIL. ABOUT FUSE MAIL Fuse mail provides the business around the world to communicate with confidence. Use cloud based services to provide secure.
BUILD SECURE PRODUCTS AND SERVICES
Barracuda Web Security Flex
Barracuda Firewall The Next-Generation Firewall for Everyone
Check Point Connectra NGX R60
Security intelligence: solving the puzzle for actionable insight
Presentation transcript:

telling the right story Confidential © Bloor Research 2010 …optimise your IT investments Click to edit Master subtitle style Malware—taking protection to where the threats are Fran Howarth Senior Analyst, Security Bloor Research

telling the right story Confidential © Bloor Research 2010 The realities of malware today Previously on the decline, malware threats are on the rise again Greater chance of success

telling the right story Confidential © Bloor Research 2010 The internet is the new perimeter “You’ve already been de-perimeterised” An alternative take on the term “de-perimeterisation”, first coined by the Jericho Forum, that describes security exploits such as internet worms and viruses that are designed to bypass the borders of organisations using web and threats. Source: Network World

telling the right story Confidential © Bloor Research 2010 Reliance on and the internet is growing 62% of people check work over the weekend 55% of mobile users upgraded to a new phone just to get 59% admit to checking from the bathroom Source: AOL addiction survey 2009

telling the right story Confidential © Bloor Research 2010 Today’s ubiquity of communication

telling the right story Confidential © Bloor Research 2010 The imperative for data security Some recent headlines: “Hacked website exposes customers’ credit card details” “State employee data accessible on website exposing names, addresses, DOB and social security numbers” “Names and social security numbers of about 5,000 accidentally posted to web” Source: DataLossDB

telling the right story Confidential © Bloor Research 2010 Why existing security technologies are no longer enough Too many malware variants, introduced too fast Existing mechanisms using signatures can’t cope—too long to develop and too much hassle to update all users in in-house deployments Mobile workers left out in the cold New technologies make the threats worse—social networking, Web 2.0 in general Browser as principal means of infection Hybrid threats using blended mechanisms

telling the right story Confidential © Bloor Research 2010 Move protection to the cloud Anti-virus Anti-spyware Anti-phishing Application blocking Policy enforcement URL filtering Mobile workers and remote offices Internet Corporate network at HQ Management reporting dashboard for audit Cloud-based web security Services and analysis centre Remote data centre for failover and redundancy Anti-virus Anti-spyware Anti-phishing Application blocking Policy enforcement URL filtering

telling the right story Confidential © Bloor Research 2010 Why the cloud makes sense XXX Organisation relies purely on perimeter defences Traffic routed via cloud-based service provider enables better, more economical protection Only good traffic reaches organisation and web Security provided In the cloud

telling the right story Confidential © Bloor Research 2010 What drove your move to SaaS? Ranked from 1 = not a factor to 5 = major driver Source: InformationWeek Analytics 2010 SaaS survey of 131 business technology Professionals using SaaS

telling the right story Confidential © Bloor Research 2010 Conclusions Web and security is a necessity in today’s world where the web is a prime vector of attack Moving protection to where the threats emanate from provides better, faster protection against increasingly complex, sophisticated threats being seen Not only is the available protection provided faster and is of higher quality than traditional security technologies, but the use of cloud-based services can afford organisations with substantial cost benefits as well

telling the right story Confidential © Bloor Research 2010 Fran Howarth, Bloor Research Thank you