Evolution Director, CTO Office. Avoid data theft and downtime by extending the security perimeter outside the data-center and protect.

Slides:



Advertisements
Similar presentations
Part 5 Introduction to CSS. CSS Display - Block and Inline Elements A block element is an element that takes up the full width available, and has a line.
Advertisements

Technology Evangelist, Connected Devices
As Never Seen Before Ronen Gabbay Microsoft Exchange Regional Director U-BTech & Hi-Tech CTO.
Security Awareness: Applying Practical Security in Your World Chapter 6: Total Security.
FIRST COURSE Creating Web Pages with Microsoft Office 2007.
CHAPTER 24 PERFORMING CSS TRANSITIONS AND ANIMATIONS.
Google Confidential and Proprietary 1 Google and the Enterprise Paul Souza New England Director of Sales - Enterprise Google Inc.
- -Heather Rodriguez, - Shilpa Reddy. Goal - One stop shop for Undergrad Competitions.
Responsive Design - It’s time for a reality check.
Internet & World Wide Web How to Program, 5/e Copyright © Pearson, Inc All Rights Reserved.
1. Windows Vista Enterprise And Mid-Market User Scenarios 2. Customer Profiling And Segmentation Tools 3. Windows Vista Business Value And Infrastructure.
Applets & Video Games 1 Last Edited 1/10/04CPS4: Java for Video Games Applets &
Sara Teel Units A-H and L-M.  The different types of computers  The types of computer systems  Input and Output devices  Processing data  Memory.
HTML Boot Camp: Rules and Images
Copyright © Terry Felke-Morris CSS Flow & Positioning 1 Copyright © Terry Felke-Morris.
Images, Links, and Multimedia. Directories and Pathnames.
Drowning in a Sea of Paper Document Archiving With Technology Presented by Arthur J. Staerk AccuScan
Web Design (7) Images (1). Images and the Image Element Images can be placed in the flow of text..jpg,.png and.gif image files work in web pages The img.
Resizing Images CS 268. Where to start? Pictures (of course)  Need to down size them for the web.  Pictures taken with a 10 mega pixel camera are usually.
Drew Reinders | GSEC Principal Solutions Engineer Defending Your Castle.
PERIMETER SECURITY PROTECTING THE BOUNDARIES OF YOUR INFORMATION SECURITY SYSTEM.
Demystifying Forefront Edge Security Technologies – TMG and UAG Richard Hicks Director – Sales Engineering Celestix Networks, Inc. SIA208.
ONE® Pages Training Presentation North York General Hospital.
The Basics of Managing Your Department Website March 8, 2012.
1 Web Search/Thinkin g What does an operating system do? 2 Web Search/Thinkin g What would happen if a computer did not have an operating system?
Phone:
IT 244 Week 3 Assignment Disaster Recovery Plan To purchase this material link Assignment-Disaster-Recovery-Plan.
CSS Layouts: Grouping Elements
HTML5 Level II Session V Chapter 8 - How to Use Responsive Web Design (RWD)
2.01 Understand Digital Raster Graphics
Special Topics in CCIT: Databases
Introduction to Windows
Real-time protection for web sites and web apps against ATTACKS
Building Responsive Media for Optimal Performance
Responsive Images.
2.01 Understand Digital Raster Graphics
Introduction to Windows Your Name Goes Here. Evolution of Windows Windows 3.1 –First widely used successful version of Windows –Replaced MS-DOS Windows.
Selecting a Business Continuity Planning Tool
A computer display is made up of small squares, called pixels.
PAGE LAYOUT - 2.  The div tag equipped with CSS rules produces good looking pages.  With CSS, the div tag can easily be positioned anywhere on the page.
Mcafee.com/activate - To get more information about download, install and activate the McAfee antivirus software, visit on using.
Mcafee.com/activate - To get more information about download, install and activate the McAfee antivirus software, visit on using.
Mcafee.com/activate - To get more information about download, install and activate the McAfee antivirus software, visit on using.
MCAFEE.COM/ACTIVATE - TO GET MORE INFORMATION ABOUT DOWNLOAD, INSTALL AND ACTIVATE THE MCAFEE ANTIVIRUS SOFTWARE, VISIT ON USING.
Mcafee.com/activate - To get more information about download, install and activate the McAfee antivirus software, visit on using.
Mcafee.com/activate - To get more information about download, install and activate the McAfee antivirus software, visit on using.
Mcafee.com/activate - To get more information about download, install and activate the McAfee antivirus software, visit on using.
Mcafee.com/activate - To get more information about download, install and activate the McAfee antivirus software, visit on using.
Mcafee.com/activate - To get more information about download, install and activate the McAfee antivirus software, visit on using.
Mcafee.com/activate - To get more information about download, install and activate the McAfee antivirus software, visit on using.
SEC 340 Education for Service/tutorialrank.com
Web Development & Design Foundations with HTML5 7th Edition
Responsive Web Design (RWD)
Starter What is identity theft?
ONE® Pages Training Presentation
Park A Call Meeting Notes (2/21/17 09:23) ok
Responsive Web Design (RWD)
Session VI Chapter 8 - How to Use Responsive Web Design (RWD)
Business Continuity and Disaster Recovery Services
Chapter 8 - How to Use Responsive Web Design (RWD)
Work from anywhere Sync your files to the cloud with OneDrive
Floating and Positioning
2 types of scale factor problems
Work from anywhere Sync your files to the cloud with OneDrive
Move your data to the cloud with Azure Social media graphics
Unit 10 The Web Book Test.
Find the Perimeter.
Presentation transcript:

Evolution Director, CTO Office

Avoid data theft and downtime by extending the security perimeter outside the data-center and protect from increasing frequency, scale and sophistication of web attacks. 1989

Avoid data theft and downtime by extending the security perimeter outside the data-center and protect from increasing frequency, scale and sophistication of web attacks. 1992

Avoid data theft and downtime by extending the security perimeter outside the data-center and protect from increasing frequency, scale and sophistication of web attacks. <img src="/brooklyn_bridge.jpg" lowsrc="/bridge.gif" title="NYC Golden Gate at night" /> 1995

Avoid data theft and downtime by extending the security perimeter outside the data-center and protect from increasing frequency, scale and sophistication of web attacks. <div class="delayed-image-load" data-src="/brooklyn_bridge_{width}_{pixel_ratio}.jpg" data-alt="alternative text"> new Imager({ availableWidths: [200, 260, 320, 600], availablePixelRatios: [1, 1.3, 2] }); 2011

Avoid data theft and downtime by extending the security perimeter outside the data-center and protect from increasing frequency, scale and sophistication of web attacks. <img src="/brooklyn_bridge_100.jpg" srcset="/brooklyn_bridge_200.jpg 100w, /brooklyn_bridge_400.jpg 400w, /brooklyn_bridge_800.jpg 800w, /brooklyn_bridge_1000.jpg 1000w, /brooklyn_bridge_1400.jpg 1400w, /brooklyn_bridge_1800.jpg 1800w, /brooklyn_bridge_2200.jpg 2200w" sizes="(min-width: 500px) 33.3vw, 100vw" /> 2014

<source type="image/jp2" srcset="/brooklyn_bridge_200.jp2 100w, /brooklyn_bridge_400.jp2 400w, /brooklyn_bridge_800.jp2 800w, /brooklyn_bridge_1000.jp2 1000w, /brooklyn_bridge_1400.jp2 1400w, /brooklyn_bridge_1800.jp2 1800w, /brooklyn_bridge_2200.jp2 2200w" /> …

<source type="image/webp" srcset="/brooklyn_bridge_200.webp 100w, /brooklyn_bridge_400.webp 400w, /brooklyn_bridge_800.webp 800w, /brooklyn_bridge_1000.webp 1000w, /brooklyn_bridge_1400.webp 1400w, /brooklyn_bridge_1800.webp 1800w, /brooklyn_bridge_2200.webp 2200w"/> <source type="image/vnd.ms-photo" srcset="/brooklyn_bridge_200.jxr 100w, /brooklyn_bridge_400.jxr 400w, /brooklyn_bridge_800.jxr 800w, /brooklyn_bridge_1000.jxr 1000w, /brooklyn_bridge_1400.jxr 1400w, /brooklyn_bridge_1800.jxr 1800w, /brooklyn_bridge_2200.jxr 2200w"/> <source type="image/jp2" srcset="/brooklyn_bridge_200.jp2 100w, /brooklyn_bridge_400.jp2 400w, /brooklyn_bridge_800.jp2 800w, /brooklyn_bridge_1000.jp2 1000w, /brooklyn_bridge_1400.jp2 1400w, /brooklyn_bridge_1800.jp2 1800w, /brooklyn_bridge_2200.jp2 2200w"/> <img src="/brooklyn_bridge_100.jpg" srcset="/brooklyn_bridge_200.jpg 100w, /brooklyn_bridge_400.jpg 400w, /brooklyn_bridge_800.jpg 800w, /brooklyn_bridge_1000.jpg 1000w, /brooklyn_bridge_1400.jpg 1400w, /brooklyn_bridge_1800.jpg 1800w, /brooklyn_bridge_2200.jpg 2200w" sizes="(min-width: 500px) 33.3vw, 100vw"/>

What happened to ?

Avoid data theft and downtime by extending the security perimeter outside the data-center and protect from increasing frequency, scale and sophistication of web attacks. <img src="/brooklyn_bridge.jpg" sizes="(min-width: 500px) 33.3vw, 100vw" /> GET /brooklyn_bridge.jpg Accept: image/webp, */* DPR: 3 Width: 230 Viewport-Width: OK Content-Type: image/webp Content-DPR: 1 Vary: Accept, DPR, Width 2015

3 device types x 4 formats x 3 resolutions x 3 uses (search, thumb…) SALE 108 images x angles x products

Next Questions What about: Network Conditions? Legacy Browsers? Operations? Disaster Recovery?

Visit Akamai at Kiosk #22! Pick up your copy of the preview edition of the upcoming book: “High Performance Images” Talk to an HTTP/2 expert and view our demo!