Thomas E. Noonan President and Chief Executive Officer Issues in eBusiness Security.

Slides:



Advertisements
Similar presentations
Infrastructure Services. Introducing Al-Futtaim Technologies One of the regions leading System Integrators Strong partnerships with leading global ICT.
Advertisements

Tryllian Agent Technology AgentLink 21 January 2002 Christine Karman.
Security Monitoring & Management Security Control Panel Sensors & Detection Devices $ $ $ $ $ $ Physical Security Monitoring.
Eleventh Edition 1 Introduction to Information Systems Essentials for the Internetworked E-Business Enterprise Irwin/McGraw-Hill Copyright © 2002, The.
16254_08_2002 © 2002, Cisco Systems, Inc. All rights reserved. Cisco’s Security Vision Mario Mazzola Chief Development Officer August 29, 2002.
Building Trust in Digital Online World Dr. Shekhar Kirani Vice President VeriSign India 5th June 2009 IBA Conference.
Blue Coat Systems Securing and accelerating the Remote office Matt Bennett.
E-business Infrastructure
67% of the people who use a smartphone for work and 70% of people who use a tablet for work are choosing the devices themselves 905M tablets in.
Enterprise and Global Management of e-Business Technology
Information Security in Real Business Asian Connection and Craig.
Global Information Security Issues According to the E&Y Global Survey, Managers Say the Right Thing… –90% of 1400 companies surveyed in 66 countries say.
© 2014 Level 3 Communications, LLC. All Rights Reserved. Proprietary and Confidential. Polycom event Security Briefing 12/03/14 Level 3 Managed Security.
Small Business Security By Donatas Sumyla. Content Introduction Tools Symantec Corp. Company Overview Symantec.com Microsoft Company Overview Small Business.
Diana Zarazua Employee Learning Director Alcatel-Lucent University Shifting the Emphasis from Training to Learning ECU Forum London (Feb 10-11)
Demonstrating IT Relevance to Business Aligning IT and Business Goals with On Demand Automation Solutions Robert LeBlanc General Manager Tivoli Software.
© 2012 AT&T Intellectual Property. All rights reserved. AT&T, the AT&T logo and all other AT&T marks contained herein are trademarks of AT&T Intellectual.
Barracuda Networks Steve Scheidegger Commercial Account Manager
Embracing IP Multimedia Services for Strategic Business Advantage Rick Seeto VP & GM Enterprise Networks, Asia Pacific.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Internet Trust Defined. Delivered. Electronic Business the Way It Was Meant to Be.
Information Security Issues at Casinos and eGaming
12 Enterprise and Global Management of e-Business Technology.
How STERIS is using Cloud Technology to Protect Web Access Presented By: Ed Pollock, CISSP-ISSMP, CISM CISO STERIS Corporation “Enabling Business”
Fortinet An Introduction
VS Anywhere. Visual Studio Industry Partner VS Anywhere NEXT STEPS Contact us at: Websitehttps://vsanywhere.com Blog- Facebook.
“Assuring Reliable and Secure IT Services”. IT Redundancy: Its Value How much reliability to buy? Customer Service impacted as a result of 15 minutes.
Joseph Ferracin Director IT Security Solutions Managing Security.
FIVE STEPS TO REDUCE THE RISK OF CYBERCRIME TO YOUR BUSINESS.
© 2013 South-Western, a part of Cengage Learning. All rights reserved. Chapter 14 | Slide 1 Understanding Information and e-Business Chapter14.
Chapter 6 of the Executive Guide manual Technology.
Sample Security Model. Security Model Secure: Identity management & Authentication Filtering and Stateful Inspection Encryption and VPN’s Monitor: Intrusion.
Acquisition of NetScaler Mark Templeton, Citrix President and CEO B.V. Jagadeesh, NetScaler President and CEO June 2, 2005.
INTRODUCTION TO “ I.T. INFRASTRUCTURE & MANAGEMENT”
VED S.A.. VED Your trusted partner for Investment Management, Mergers & Acquisitions and Real Estate Investments VED S.A. 1.
Global IT Solutions for Multinational Corporations Jim Forbes Vice President Equant IP Solutions Line of Business.
The ProactiveWatch Monitoring Service. Are These Problems For You? Your business gets disrupted when your IT environment has issues Your employee and.
Enterprise and Global Management of e-Business Technology
Virtualisation Challenges IBM Smarter Storage Symposium – July 2012 Hardev Sanghera, Partner SE.
Data Security Overview. Data Security Periphery –Firewalls –Web Filtering –Intrusion Detection & Prevention Internal –Virus Protection –Anti Spy-ware.
Chapter 17 THE FUTURE OF BUSINESS Gitman & McDaniel 5 th Edition THE FUTURE OF BUSINESS Gitman & McDaniel 5 th Edition Chapter Using Technology to Manage.
McGraw-Hill/Irwin ©2008 The McGraw-Hill Companies, All Rights Reserved Plug-in B10 ENTERPRISE RESOURCE PLANNING.
IP Message Systems By: Michelle Gromala BMA 373 February 20, 2002.
Internal apps How enterprises use mobile apps internally.
Network Perimeter Defense Josef Pojsl, Martin Macháček, Trusted Network Solutions, Inc.
Module 11: Designing Security for Network Perimeters.
Hot Topics in Information Security Rick Shaw – President, CorpNet Security, Inc. Mick Johannes – CTO, CorpNet Security, Inc.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
© 2011 IBM Corporation IBM Security Services Smarter Security Enabling Growth and Innovation Obbe Knoop – Security Services Leader Pacific.
© Copyright 2004 Frost & Sullivan. All Rights Reserved. Latin American Managed Network Security Services Market Internet Protocol Virtual Private Network.
Small Business Solutions Copyright 2014 Trend Micro Inc.
© 2016 ForgeRock. All rights reserved. Lars Gunnar Tiben – Senior Customer Engineer Nordic
Copyright © 2013 OneNeck IT Services Corporation. All Rights Reserved. 1 Cloud Enablement For Microsoft Dynamics Cloud Enablement for Dynamics AX and Use.
© Copyright 2003 Frost & Sullivan. All Rights Reserved. World Managed Security Service Provider Markets Undeveloped Distribution Channel Organization Impedes.
No. 1 e-Security Solution We make IT safe. 1 History SecureSoft (June. 1999) International Software Solutions, Inc. l Dec Merged with CGII l Feb.
Industry Solutions Tom Ngo Chief Technology Officer.
SYMANTEC ENDPOINT SECURITY SERVICE PROVIDERS | ALLIANCE PRO IT HYDERABAD (CORPORATE OFFICE) ALLIANCE PRO IT PRIVATE LIMITED, 3A, HYNDAVA TECHNO PARK, TECHNO.
SYMANTEC ENDPOINT SECURITY SERVICE PROVIDERS | ALLIANCE PRO IT HYDERABAD (CORPORATE OFFICE) ALLIANCE PRO IT PRIVATE LIMITED, 3A, HYNDAVA TECHNO PARK, TECHNO.
Barracuda Web Security Flex
AT&T Premises-Based Firewall Enhanced SBS Solution
What Do We Do? Managed IT services
Consulting Services for IoT
MISSION STRATEGIC DIRECTION
Identity & Access Management
Securing the Threats of Tomorrow, Today.
Computer Services Business challenge
Telecommunications Business challenge
Company Overview MegaPath is a leading provider of managed IP communications services in North America Business Founded in 1996 HQ in Pleasanton, CA 1,000+
Transforming the way companies build wealth
Presentation transcript:

Thomas E. Noonan President and Chief Executive Officer Issues in eBusiness Security

Internet Security Systems Overview Founded 1994, headquarters in Atlanta, GA Pioneered security assessment and intrusion detection technology Network IDnA market share leader – 49% Public company: NASDAQ - ISSX Global operations in 14 countries serving over 5,500 customers Over 900 employees worldwide 18 successive quarters of growth Pioneer and leader in Remote Managed Security Services

Business Summary Pre-IPO Dec Pre-IPO Dec ISS Dec ISS Dec ISS Dec ISS Dec # Products # Customers # Services Headcount # Strategic Alliances Headcount Global Expansion # Products # Customers # Services Headcount # Strategic Alliances Headcount Global Expansion 3 1, $13.5M 8 3, $35.9M 16 5, $116.5M # International Offices Revenue # International Offices Revenue

Market Drivers

Key to Security Management Growth Internet user and transaction growth eBusiness is a priority Benefits and risks of open systems Dynamic networks and security confusion Growing internal and external threats Limited security resources and expertise Security is embedded and heterogeneous Security management becoming too complex

eBusiness Technology Adoption

eBusiness Transformation

The Internal Threat is Real

The Outside Threat is Growing

The Security “Skills Gap” In addition, the ability of organizations to adopt and maintain a secure environment has not kept pace with technology change...

Downtime is Rising

Security is Complex Source: Forrester Research Access control scanning Authentication VPN Mobile code Firewall Scanning Intrusion detection Anti virus URL filtering PKI

Business is changing, security must

The Security Market is Changing Infrastructure Security vs. Security Management

Enterprise Security Management

Business-Driven Security Solutions

What’s Appropriate for my Business?