EEye Digital Security  1.866.339.3732   On the Frontline of the Threat Landscape: Simple configuration goes a long way.

Slides:



Advertisements
Similar presentations
1© Copyright 2011 EMC Corporation. All rights reserved. The Future of the Advance Soc 3rd Annual Privacy, Access and Security Congress, Ottawa, 2012 Mike.
Advertisements

© 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential 14854_10_2008_c1 1 Holistic Approach to Information Security Greg Carter, Cisco Security.
Introducing WatchGuard Dimension. Oceans of Log Data The 3 Dimensions of Big Data Volume –“Log Everything - Storage is Cheap” –Becomes too much data –
The State of Security Management By Jim Reavis January 2003.
Boost your network security with NETASQ Vulnerability Manager.
Unified Logs and Reporting for Hybrid Centralized Management
SELECTING AND IMPLEMENTING VULNERABILITY SCANNER FOR FUN AND PROFIT by Tim Jett and Mike Townes.
Patching MIT SUS Services IS&T Network Infrastructure Services Team.
Small Business Security By Donatas Sumyla. Content Introduction Tools Symantec Corp. Company Overview Symantec.com Microsoft Company Overview Small Business.
Mel Pless, Sr. Director, Solutions Consulting Guidance Software, Inc. Let’s Get Right To The Endpoint Leveraging Endpoint Data to Expose,
Norman Endpoint Protection Advanced security made easy.
© 2012 AT&T Intellectual Property. All rights reserved. AT&T, the AT&T logo and all other AT&T marks contained herein are trademarks of AT&T Intellectual.
Patch Management Strategy
SYSTEM CENTER: ENDPOINT PROTECTION FUNDAMENTALS Howard A. Carter III Senior Consultant Microsoft Consulting Services September 21, 2013 TechGate 2013 –
Office 365: Efficient Cloud Solutions Wednesday March 12, 9AM Chaz Vossburg / Gabe Laushbaugh.
Security Risk Management Marcus Murray, CISSP, MVP (Security) Senior Security Advisor, Truesec
Website Hardening HUIT IT Security | Sep
Security Audit Tools Project. CT 395 IT Security I Professor Igbeare Summer Quarter 2009 August 25, 2009.
1 Managed Security. 2 Managed Security provides a comprehensive suite of security services to manage and protect your network assets –Managed Firewall.
HIPAA COMPLIANCE WITH DELL
Security Overview for Microsoft Infrastructures Fred Baumhardt and James Noyce Infrastructure Solutions and Security Solutions Teams Microsoft Security.
Dell Connected Security Solutions Simplify & unify.
Virtual techdays INDIA │ 9-11 February 2011 Security Discussion: Ask the Experts M.S.Anand │ MTC Technology Specialist │ Microsoft Corporation Anirudh.
Security Professional Services. Security Assessments Vulnerability Assessment IT Security Assessment Firewall Migration Custom Professional Security Services.
With the Help of the Microsoft Azure Platform, Awingu’s Web-Based Workspace Aggregator Enables Concrete and Easy Mobility Scenarios MICROSOFT AZURE ISV.
Alert Logic Security and Compliance Solutions for vCloud Air High-level Overview.
Next-Generation Formotus Forms Replace Paper and InfoPath with Mobile Business Applications Created and Deployed Using Microsoft Azure MICROSOFT AZURE.
Time lag between discovering issue and resolving Difficult to find solutions and patches that can help resolve issue Service outages expensive and.
AREVA T&D Security Focus Group - 09/14/091 Security Focus Group A Vendor & Customer Collaboration EMS Users Conference September 14, 2009 Rich White AREVA.
CUTTING COMPLEXITY – SIMPLIFYING SECURITY INSERT PRESENTERS NAME HERE XXXX INSERT DATE OF EVENT HERE XXXX.
Alert Logic Security and Compliance Solutions for vCloud Air High-level Overview.
Built on the Powerful Microsoft Azure Platform, Phyzit Helps Doctors Reduce Readmissions Through a Transitional Care Management App MICROSOFT AZURE ISV.
ISS SiteProtector and Internet Scanner LanAdmin Group Meeting 12/8/2005.
Mobilise Your Business in Days with Crimson Tide’s mpro5 Enterprise Solution on Microsoft Azure! MICROSOFT AZURE ISV PROFILE: CRIMSON TIDE Crimson Tide.
Alert Logic Provides a Fully Managed Security and Compliance Solution Based in the Cloud, Powered by the Robust Microsoft Azure Platform MICROSOFT AZURE.
CIO Perspectives on Security Fabrício Brasileiro Regional Sales Manager.
Network security Product Group 2 McAfee Network Security Platform.
Rob Davidson, Partner Technology Specialist Microsoft Management Servers: Using management to stay secure.
TACTIC | Workflow: Project Management OSS on Microsoft Azure Helps Enterprises to Create Streamline, Manage, and Track Digital Content MICROSOFT AZURE.
BUFFERZONE Advanced Endpoint Security Data Connectors-Charlotte January 2016 Company Confidential.
Bring Your Own Security (BYOS™): Deploy Applications in a Manageable Java Container with Waratek Locker on Microsoft Azure MICROSOFT AZURE ISV PROFILE:
RMM / MDM Cloud Partner Training Series September 2015.
DenyAll Delivering Next-Generation Application Security to the Microsoft Azure Platform to Secure Cloud-Based and Hybrid Application Deployments MICROSOFT.
Microsoft Azure and ServiceNow: Extending IT Best Practices to the Microsoft Cloud to Give Enterprises Total Control of Their Infrastructure MICROSOFT.
© 2011 IBM Corporation IBM Security Services Smarter Security Enabling Growth and Innovation Obbe Knoop – Security Services Leader Pacific.
Welcome Information Security Office Services Available to Counties Security Operations Center Questions.
MICROSOFT AZURE APP BUILDER PROFILE: RAVERUS LTD. Raverus is a customer-driven company engaged in providing software applications designed to improve and.
Improve the Performance, Scalability, and Reliability of Applications in the Cloud with jetNEXUS Load Balancer for Microsoft Azure MICROSOFT AZURE ISV.
IT Security Mandatory Solutions Andris Soroka 2nd of July, RIGA.
Advanced Endpoint Security Data Connectors-Charlotte January 2016
Your Partner for Superior Cybersecurity
Cloud App Security vs. O365 Advanced Security Management
Comprehensive Security and Compliance at an Affordable Price.
Proactive Attack Prevention and Detection
Hybrid Management and Security
Real-time protection for web sites and web apps against ATTACKS
What if tomorrow never comes
Speaker’s Name, SAP Month 00, 2017
Security Automation Standards Landscape
Healthcare Cloud Security Stack for Microsoft Azure
Logsign All-In-One Security Information and Event Management (SIEM) Solution Built on Azure Improves Security & Business Continuity MICROSOFT AZURE APP.
11/17/2018 9:32 PM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
Enterprise/Security Alignment Review
Healthcare Cloud Security Stack for Microsoft Azure
Healthcare Cloud Security Stack for Microsoft Azure
A 5-minute overview of ADAudit Plus
Windows 10 Enterprise subscriptions in CSP – Messaging Summary
4/9/ :42 PM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
Healthcare Cloud Security Stack for Microsoft Azure
Cybriant Partner Partner Program White Label Materials
Presentation transcript:

eEye Digital Security    On the Frontline of the Threat Landscape: Simple configuration goes a long way

eEye Digital Security    2 Agenda  eEye at a Glance  Today’s Threat Landscape  Zeroday Vulnerability Trends  Attack Surface/Configuration  Security’s Cultural Shift

eEye Digital Security    3  Security Experts  Seasoned security professionals  Thousands of customers  Some of the largest VM installations in the world  Award-Winning Solutions  Recognized product leadership  Securing companies of all sizes  Unparalleled services and support eEye at a Glance  Industry Pioneers  Leaders in IT security since 1998  Developed one of the first vulnerability scanners  Growing and profitable  Thought Leaders  World-renowned security research team  Trusted advisors to organizations across industries and sizes 

eEye Digital Security    4 Time-Consuming Vulnerability Management Managing compliance initiatives takes IT Security Pros up to 50% of their work week. Centralized visibility is key to vulnerability management with 73% of organizations having as many as 100 applications deployed. 31% of IT pros do not have enough personnel to patch vulnerabilities - a challenge intensified by lack of integration between scan and patch solutions VM Trends Multiple regulatory standards Constantly changing networks and configurations  Source: eEye 2011 VM Survey of 2,000 IT Security Professionals INDUSTRY CHALLENGES  Decentralized visibility and reporting  Too many stand-alone tools  Unmanaged ‘exception’ systems  Unprotected against zero-days  Struggling to meet compliance requirements Increasing client-side exploits Hundreds of applications

eEye Digital Security    5 Zeroday Vulnerability Trends

Zeroday Vulnerabilites by Type eEye Digital Security    6

Zeroday: Tip of the iceberg eEye Digital Security    7

Attack Surface eEye Digital Security    8 Where security begins and ends.

Attack Surface eEye Digital Security    9

Attack Surface eEye Digital Security    10

Back to Basics eEye Digital Security    11 Good ConfigurationSecurity Product >

Top 2 Mitigations vs. Microsoft 2010 Vulnerabilities eEye Digital Security    12

Microsoft 2010 Patches - WebDAV eEye Digital Security    13

New = Better eEye Digital Security    14 Microsoft 2010 Patches vs. Latest Products

Metasploit vs. Microsoft 2010 Vulnerabilities eEye Digital Security    15

eEye Digital Security    16 Security’s Cultural Shift  What’s hype and what’s a real concern with:  Stuxnet  Night Dragon  Aurora  Nation-sponsored hacking  Advanced Persistent Threats  Security / Social Media / Mobile Computing..  Sliding scale, push back and find a balance or fail.

eEye Digital Security    17 eEye Research Report  New report from eEye’s Research team: In Configuration We Trust  Insights into straightforward changes you can make right away – for free – that will dramatically improve your security posture. eEye Digital Security    17

eEye Digital Security    18 Free eEye Resources  Zero Day Tracker:  Vulnerability Experts Forum:  eEye Blog and Social Networking:  Retina Community: – NEW! A Tradition of Supporting the IT Security Community:

eEye Digital Security    19 eEye Unified Vulnerability Management SECURITY RESEARCH Automation and Efficiency = Minimized Risk and Lower TCO  MANAGE AND REPORT End-to-end vulnerability and compliance management Centralized management, reporting, and controls Assess, mitigate, and protect from one console Advanced trending and analytics  Vulnerability Scanning  Configuration Auditing  Asset Discovery & Inventory  Zero-Day Vulnerability Identification  Vulnerability Reporting  Compliance Auditing ASSESS  Integrated Patch Management  Prioritized Mitigation  Risk Scoring  Security Alerts  Prescriptive Remediation Reporting MITIGATE  Zero-Day Protection  Intrusion Prevention  Web Protection  Application Protection  System Protection PROTECT

eEye Digital Security    20 Retina Community Edition  Vulnerability assessment across operating systems, applications, devices, and virtual environments (32 IPs)  Zero-day vulnerability identification  SCAP configuration scanning  Integrated vulnerability updates and alerting  Detailed vulnerability and executive-level reporting  Report export to XML, CSV, and PDF  Online support and resources eEye Digital Security    20

eEye Digital Security    21 Retina Community Edition - Download eEye Digital Security    21

eEye Digital Security    22  Visit eEye  About Us, Solutions, Awards, Resources, Downloads  Visit the eEye Security Resource Center  Demos, Guides, Whitepapers, Videos, Webinars, Events  Contact Us or  Recommendations, Full-Featured Evaluations, Trials More eEye Info