Take back control: taming rogue device, user and application exposures Mark Blake, Capita Secure Managed Services Chris Gothard, Colt Technology Services.

Slides:



Advertisements
Similar presentations
Beyond Compliance: Advanced SmartGrid Authentication Paul Miller Uniloc.
Advertisements

Security intelligence: solving the puzzle for actionable insight Fran Howarth Senior analyst, security Bloor Research.
© 2015 Cisco and/or its affiliates. All rights reserved. 1 The Importance of Threat-Centric Security William Young Security Solutions Architect It’s Our.
Cloud Usability Framework
All Rights Reserved © Alcatel-Lucent | Dynamic Enterprise Tour – Safe NAC Solution | 2010 Protect your information with intelligent Network Access.
© 2012 AT&T Intellectual Property. All rights reserved. AT&T, the AT&T logo and all other AT&T marks contained herein are trademarks of AT&T Intellectual.
Telenet for Business Mobile & Security? Brice Mees Security Services Operations Manager.
SMART SECURITY ON DEMAND NETWORK ACCESS CONTROL Control Who And What Is On Your Network Larry Fermi Sr. Systems Engineer, NAC Subject Matter Expert.
© 2013 AT&T Intellectual Property. All rights reserved. AT&T and the AT&T logo are trademarks of AT&T Intellectual Property. Mobile Application Ecosystem.
Cloud Security Julian Lovelock VP, Product Marketing, HID Global.
Lessons Learned in Smart Grid Cyber Security
Presentation title SUB TITLE HERE Intelligent 21st Century Strategies for Broadband and Cyber Infrastructures Security By Dr. Emmanuel Hooper, PhD, PhD,
Staying Ahead of the Curve in Cyber Security Bill Chang CEO, SingTel Group Enterprise.
©2014 Bit9. All Rights Reserved Endpoint Threat Prevention Charles Roussey | Sr. Sales Engineer Detection and Response in Seconds.
Data Fusion & Multi-Sensors in Power Grids Rabinder N. Madan FIEEE Program Manager, Systems Theory Office of Naval Research.
1 CISCO SAFE: VALIDATED SECURITY REFERENCE ARCHITECTURE What It Is Business Transformation Top Questions To Ask To Initiate The Sale Where It Fits KEY.
© All Rights Reserved. Mining Big Data for Fun, Fraud and Profit Vitaly Levin
…optimise your IT investments Taming the device creep Fran Howarth, Bloor Research
Complete Security. Threats changing, still increasing Data everywhere, regulations growing Users everywhere, using everything We’re focused on protecting.
1 The New Security Blueprint : Challenges & Opportunities Ajay Goel, Managing Director, Symantec India & SAARC Sept 1, 2011.
Copyright © 2015 Centrify Corporation. All Rights Reserved. 1 Secure & Unified Identity for End Users & Privileged Users.
The Changing World of Endpoint Protection
PAGE Intelligence Meets Vulnerability Management NYC ISSA January 24, 2013.
CIO Perspectives on Security Fabrício Brasileiro Regional Sales Manager.
Network security Product Group 2 McAfee Network Security Platform.
Nexthink V5 Demo Security – Malicious Anomaly. Situation › Avoid damage resulting from the incident itself and the cost of the unplanned response › Protection.
Strong Security for Your Weak Link: Implementing People-Centric Security Jennifer Cheng, Director of Product Marketing.
© 2008 AT&T Intellectual Property. All rights reserved. AT&T and the AT&T logo are trademarks of AT&T Intellectual Property. Cyber Security and the National.
© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. State of Network Security.
ARAMA TECH D A T A P R O T E C T I O N P R O F E S S I O N A L S VISION & STRATEGY.
Copyright © 2015 Centrify Corporation. All Rights Reserved. 1 Company Overview & Strategy Lance McAndrew Product Line Sales Engineer.
Network Consulting Customer NDA Deck September 2014.
Secure Authentication Solution. Keypasco – the company Keypasco was founded in 2010 by specialists with over 20 years of experience within online security.
© 2015 IBM Corporation IBM Security 1 © 2015 IBM Corporation Protecting your executives’ cyber DNA Executive protection from IBM an IBM alliance with Social.
Enterprise Mobility Suite: Simplify security, stay productive Protect data and empower workers Unsecured company data can cost millions in lost research,
1 Current Trends in Enterprise IT Network Security Key Takeaways Based on 100 Survey Responses © 2016 Lumeta Corporation.
SAFEGUARD REVENUE & REPUTATION WITH SMARTER, SHARPER IT SECURITY COMPUTACENTER AND SECURITY JUNE 2014.
ROLE OF ANALYTICS IN ENHANCING BUSINESS RESILIENCY.
Mobile Security Solution Solution Overview Check Point Mobile Threat Prevention is an innovative approach to mobile security that detects and stops advanced.
© 2013 TM Forum | 1 V Catalysts and Innovation Projects Rapid Technology Innovation Projects The Hub at Management World 2013.
Kevin Watson and Ammar Ammar IT Asset Visibility.
Complete Cloud Security Anyone, anywhere, any app, any device.
No boundaries with Unified Web Security Solutions Steven Vlastra Sr. Systems Engineer - Benelux.
FROM SECURITY DATA TO SECURITY INTELLIGENCE ZULFIKAR RAMZAN, CTO, RSA.
Barracuda Solutions VMware® vCloud® Air™ Version 1.0 | February 2015.
SYMANTEC ENDPOINT SECURITY SERVICE PROVIDERS | ALLIANCE PRO IT HYDERABAD (CORPORATE OFFICE) ALLIANCE PRO IT PRIVATE LIMITED, 3A, HYNDAVA TECHNO PARK, TECHNO.
SYMANTEC ENDPOINT SECURITY SERVICE PROVIDERS | ALLIANCE PRO IT HYDERABAD (CORPORATE OFFICE) ALLIANCE PRO IT PRIVATE LIMITED, 3A, HYNDAVA TECHNO PARK, TECHNO.
EAST AFRICAN DATA HANDLERS DATA SECURITY/MOBILITY
Barracuda Web Security Flex
Proactive Attack Prevention and Detection
The Game has Changed… Ready or Not! Andrew Willetts Technologies, Inc.
Accelerate GDPR compliance with Microsoft 365
Journey to Microsoft Secure Cloud
Active Cyber Security, OnDemand
Improving the WiFi Customer Experience
practice-questions.html If you Are Thinking about your dumps? Introduction:
Secure & Unified Identity
Add your services to Microsoft 365 Business
Company Overview & Strategy
Customer NDA Deck September 2014
Strong Security for Your Weak Link:
Securing the Threats of Tomorrow, Today.
Business Planning Enabling Priorities
Powerful Partnerships with Industry Leaders
The MobileIron® Threat Detection difference:
Managing IT Risk in a digital Transformation AGE
Security intelligence: solving the puzzle for actionable insight
Plan and design the solution
Technical Capabilities
Digitization complicates visibility Market demands have taken the network beyond your perimeter Threats are more numerous and complex Threats are using.
Presentation transcript:

Take back control: taming rogue device, user and application exposures Mark Blake, Capita Secure Managed Services Chris Gothard, Colt Technology Services Fran Howarth, Bloor Research 30/04/14

Company logo What is Next-generation NAC? NAC has traditionally been used to control access and reduce malware threats via user and device authentication Growing need for real-time visibility across the network and endpoints, users and applications and need for more efficient remediation of threats/violations NAC morphing into a platform that combines traditional NAC capabilities with mobile security, endpoint compliance and threat management Next-gen NAC - providing actionable insight regarding endpoint health, user identities and applications, combined with security intelligence, interoperability and response Continuously monitor and mitigate security exposures and cyber attacks yielding more pervasive network security

Company logo Question 1: Key Drivers Top drivers / rationale for network visibility and endpoint control?

Company logo Question 2: Considerations and Requisites Top 2-3 technology considerations and selection criteria?

Company logo Question 3: Set-up and Realisations Ease to engage technical controls and interesting results once active?

Company logo Question 4: Lessons Learned Share some advice?

Company logo Thank You & Questions