Download presentation
Presentation is loading. Please wait.
Published byConstance Barber Modified over 8 years ago
1
Emerging Security Trends & Technologies Presented by Santhosh Koratt Head Consulting & Compliance SecureSynergy Pvt.Ltd.
2
“We are in the initial years of technology innovation and growth, namely, IT Everywhere” Source: Forrester Research TELECOM BANKING RETAIL PHARMA Highlight key security trends for the coming years Discuss the information risk management solutions from a technology front To give a practical view of integrated security infrastructure Aim IT
3
Security Trends & Technologies
4
Multiple point solutions Poor visibility & control Compliance requirements High cost of management Emergence of holistic end point security Endpoint security suites comprising Antivirus, Antispyware, Host-based IPS, Email Security & Network Access Control Industry is moving towards Single Agent - Single Console concept Converged Endpoint Security
6
Data Loss Prevention Unauthorized transfer of data to external devices Growing insider attacks Loss of data via Web & E-mail Privacy regulations Emphasis on Data discovery &classification Solutions at host & perimeter levels Policy based control
7
Data Loss Prevention
8
Information Rights Management Growing outsourced relationships Need to look beyond NDA
9
Information Rights Management
10
Mobile Device Security Increasing connected mobile workforce Lot of critical data on mobile devices Physical theft prone devices Full disclousure norms & compliance mandates Acceptance of full disk encryption Maturing technology Mobile Devices: “the most severe and overlooked threat to the enterprise,” Gartner Group
11
Secure Software Engineering Microsoft Patch Tuesday Increasing VA/ PT adoption & costs Hacktivism A secure product is one that protects the confidentiality, integrity, and availability of the customers’ information, and the integrity and availability of processing resources under control of the system’s owner or administrator. Source: Writing Secure Code (Microsoft.com)
12
Secure Software Engineering
13
Integrated Network Security
14
Integrated Network Security
15
Centralized Entitlement Management
16
IT Enabled Physical Security
17
Compliance Management
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.