Download presentation
Presentation is loading. Please wait.
Published byPearl Chandler Modified over 8 years ago
1
IT Security Mandatory Solutions Andris Soroka 2nd of July, 2014 @LPS, RIGA
2
“Data Security Solutions” business card Specialization – IT Security IT Security services (consulting, audit, pen-testing, market analysis, system testing and integration, training and technical support) Solutions and experience portfolio with more than 20 different technologies – cyber-security global market leaders from more than 10 countries Trusted services provider for banks, insurance companies, government and private companies (critical infrastructure etc.)
3
Role of DSS in Cyber-security Development in Baltics Cyber-Security Awareness Raising Technology and knowledge transfer Most Innovative Portfolio Trusted Advisor to its Customers
4
Innovations – technology & knowledge transfer Innovative Technology Transfer Number of unique projects done with different technology global leadership vendors Knowledge transfer (own employees, customers – both from private & public, other IT companies in LV, EE, LT) Specialization areas include: Endpoint Security Network Security Security Management Application Security Mobile Security Data Security Cyber-security Security Intelligence
5
Cybersecurity Awareness Raising Own organized conference “DSS ITSEC” 5 th annual event this year (30.10.2014, RIGA) More than 400 visitors + more than 250 online live streaming watchers from LV, EE, LT 4 parallel sessions with more than 40 international speakers, including Microsoft, Oracle, Symantec, IBM, Samsung and many more – everything free of charge (EVENT.DSS.LV) Participation in other events & sponsorship CERT & ISACA conferences & events RIGA COMM, HeadLight, IBM Pulse Las Vegas Roadshows and events in Latvia / Lithuania / Estonia (f.i. Vilnius Innovation Forum, Devcon, ITSEC HeadLight, business associations, VAD’s) Participation in cyber security discussions, strategy preparations, seminaries, publications etc.
6
Welcome & lets make Baltics more safe place
7
Innovations in IT Security for You Security Intelligence Log Management Security Information & Events Management (SIEM) Risk Management Vulnerability Management Network Forensics Mobile Security Mobile Device Management Mobile Content Management Mobile Applications Management Secure Calls & SMS Secure file sharing and data synchronization Various Security Wireless Intrusion Prevention, DDoS & SSL DDoS protection Encryption and data leakage prevention Authentication, authorization, audit and so on
8
Innovations in IT Security for You What is Security Intelligence? Security Intelligence {noun \si- ˈ kyu ̇ r-ə-tē in- ˈ te-lə-jən(t)s\} 1. A methodology of analyzing millions and billions of security, network and application records across the organization’s entire network in order to gain insight into what is actually happening in that digital world. 2. The process of combining internal, locally collected security data with external intelligence feeds and the application of correlation rules to reduce huge volumes of data into a handful of high probability ‘offense’ records requiring immediate investigation to prevent or minimize the impact of security incidents Delivers actionable, comprehensive insight for managing risks, combatting threats, and meeting compliance mandates.
9
Innovations in IT Security for You Logs Events Alerts Configuration information System audit trails External threat feeds E-mail and social activity Network flows and anomalies Identity context Business process data Malware information Now: Intelligence Real-time monitoring Context-aware anomaly detection Automated correlation and analytics Then: Collection Log collection Signature-based detection Evolving along with changing threat landscape
10
Innovations in IT Security for You Suspected Incidents Prioritized Incidents Massive data gathering allows embedded intelligence to automatically detect anomalous conditions Servers and mainframes Data activity Network and virtual activity Application activity Configuration information Security devices Users and identities Vulnerabilities and threats Global threat intelligence Extensive Data Sources Automated Offense Identification Massive data reduction Automated data collection, asset discovery and profiling Automated, real-time, and integrated analytics Activity baselining and anomaly detection Out-of-the box rules and templates Embedded Intelligence
11
Innovations in IT Security for You Single web-based console provides superior visibility Log Management Security Intelligence Network Activity Monitoring Risk Management Vulnerability Management Network Forensics
12
Innovations in IT Security for You
15
As mobile grows, so do security threats Mobile downloads will increase to 108 billion by 2017. 2 Mobile malware is growing. Malicious code is infecting more than 11.6 million mobile devices at any given time. 3 In 2014 the number of cell phones (7.3 billion) will exceed the number of people on the planet (7 billion). 1 Mobile devices and the apps we rely on are under attack. 90% of the top mobile apps have been hacked. 4
16
Innovations in IT Security for You
17
4 Roll out at scale Group-based User self-service Multi-tier management Email AD/LDAP Certificates BES 2 Integrate tightly Email and apps Policy and identity Connectivity (Wi-Fi, VPN) By group, individual, or ownership 1 Configure securely 3 Protect privacy BYOD programs Regional regulations Across OS For apps and devices For BYOD and corporate programs 5 Manage inventory Wipe corporate data 15 Limit roaming costs 14 Deliver apps at scale Protect app container 12 11 Tunnel app data 13 Apps 6 Monitor risk 8 Enforce identity 9 Automate workflow 7 Control access Security Access and protect docs 10 Docs
18
Our portfolio is most innovative in Baltics!
19
Some just basic ideas
22
Think security first www.dss.lv andris@dss.lv +371 29162784
23
Think security first
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.