HTLV - DSS @Vilnius 2010

885 views

Published on

0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
885
On SlideShare
0
From Embeds
0
Number of Embeds
3
Actions
Shares
0
Downloads
12
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

HTLV - DSS @Vilnius 2010

  1. 1. The trends in IT Security innovationsArturs FilatovsValue Added Distributionheadtechnology Baltics SIALatvia, Lithuania and Estonia www.headtechnology.com
  2. 2. headtechnology Groupwww.headtechnology.com
  3. 3. Operations in The Baltic States Business Gateway Security Host Security Network Security Value Added Distribution Marketing & Sales assistance Technical & Integration Support Trainings Certification Business Network Managed Services & Supportwww.headtechnology.com
  4. 4. 2nd of December, Vilnius, LithuaniaThe trends in IT Security innovationswww.headtechnology.com
  5. 5. Security and time Mobility is raising, productivity is decreasing security Problems with InfoSEC – were, are, WILL BE moreEarly 90’s Year 2000 Year 2011• DOS applications • Complex aplications • ?• Passwords • Mobility + Productivity• Physical access • Passwords • Physical accesswww.headtechnology.com
  6. 6. Besides technology – problems with security Top 10 Security problems in enterpise 1. Yelow Posters 2. We know better than you 3. Leaving the machine on 4. Opening e-mail attachments 5. Poor password selection 6. Loose lips sink ships 7. Laptops have legs 8. Poorly enforced security policies 9. Failing to consider the staff 10. Being slow to updatewww.headtechnology.com
  7. 7. Key risks for shortlist End users – the weakest link Vulnerability – everyone vs. everything Data access and protection Black community makes it easy • Google.com/hacking for dummies • Youtube.com/how to hack passwords • P2P for software downloadwww.headtechnology.com
  8. 8. Hall of fame in Latvia 99% Things we’ll never knowwww.headtechnology.com
  9. 9. Solution? Weak security is not an option! Too much of security makes no sense!www.headtechnology.com
  10. 10. IT Security puzlewww.headtechnology.com
  11. 11. Most important things Monitoring (systems, users, administrators) Vulnerability and EndPoints (done by Lumension) Encryption (in motion / during transfer / at rest) Agentless real time network visibility and NACwww.headtechnology.com
  12. 12. MONITORwww.headtechnology.com
  13. 13. Spectorsoft – Monitoring all Theft of confidential information Fraud & embezzlement Sexual or racial harassment Litigation by employees and outside companies Discrimination claims Illegal downloadswww.headtechnology.com
  14. 14. How to use SpectorSoft? Maximize productivity Increase security Reduce liability Enforce compliancewww.headtechnology.com
  15. 15. ENCRYPTwww.headtechnology.com
  16. 16. PGP – Encryption Platform PGP Encryption Solutions 3rd Party SolutionsDisk and File Email Mobile Mainframe Commercial Commercial Custom Device Devices Hardware Software Applications Key Lifecycle Key Storage Authentication / Authorization Auditing Policy Management Reporting Logging Automated Operations and Provisioning PGP Encryption Platform Existing Infrastructurewww.headtechnology.com
  17. 17. PGP solutions PGP Universal™ Server Central Management of PGP Universal™ Gateway Email all products • User-transparent, gateway email encryption PGP® Desktop Email • Email, file, disk, & IM encryption PGP® Whole Disk Encryption • Laptop & disk security PGP® NetShare • Shared server storage security PGP® Command Line • Secure FTP/batch & backups PGP® Support Package for BlackBerry® All PGP products are based on • Mobile client software the PGP SDK, a mature FIPS 140-2 validated cryptographic PDF Messenger module • Secure & Certified Statement Deliverywww.headtechnology.com
  18. 18. KNOW YOUR NETWORKwww.headtechnology.com
  19. 19. Real time “agentless” network assesment Control & Enforcement Safeguarding the network’s security integrity by preventing network access from unauthorized and/or non-compliant Discovery elements. Comprehensive collection of data from ALL network assets, gathering complete, accurate and detailed continuous network intelligence. This unique approach provides always on, real-time network visibility acting as the foundation for the BSA solution. Remediation Identification of the corrective measures that must be put in place and fix inconsistencies with the security posture of assets attached to the network. Aligning the security configuration of assets with security best practices considerably reduces the enterprise networks risk of exposure. Audit, Compliance User Identity Profiling & Risk Analysis: Establishment and maintenance of user intelligence Automated security configuration auditing, by correlating between user identities and specific simplifying the process of conducting IP addresses. This improves audit controls, and network-wide configuration audits. This enhances regulatory compliance. It also significantly provides efficient security compliance enhances incident response by enabling locating tracking and auditing procedures. vulnerable and/or exploited hosts, and eliminating the manual efforts to track users.The Insightix Business Security Assurance (BSA) product suite is designed to detect, identify, profile, audit and control ALL devices connected to your network. www.headtechnology.com
  20. 20. One to hundred locationswww.headtechnology.com
  21. 21. Summarywww.headtechnology.com
  22. 22. @ the end Privacy is dead!www.headtechnology.com
  23. 23. Contacts headtechnology Baltics SIA Innovative IT Security Solutions Value Added Distributor Latvia, Lithuania and Estonia 31 Cesu str. 3rd floor, LV-1012, Riga, Latvia Phone: +371 674 21 021 Fax: +371 674 21 024 eMail: info@headtechnology.lv Internet: www.headtechnology.comwww.headtechnology.com

×