Your SlideShare is downloading. ×

Guy websense

510

Published on

Published in: Education
0 Comments
1 Like
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total Views
510
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
37
Comments
0
Likes
1
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide

Transcript

  • 1. Modern Security Game Being Outside and feeling Inside Being Safe EverywhereGuy Eilon – Websense Mediterranean Regional Manager© 2010 Websense, Inc. All rights reserved. web security | data security | email security
  • 2. Web Technology TrendsDynamic, interactive Web 2.0 technologies have transformedthe Web into a core business application platformEmployees are working from everywhereData now lives outside your network, moreso if you use SaaS applications.Along with Web 2.0, however, comes new risk as traditional URLfiltering and antivirus are rendered ineffective.Blocking access is not the answer – increasingly the business needs broadWeb access to compete and enable employees to get the job done. © 2010 Websense, Inc. All rights reserved.
  • 3. Today’s Webscape • Constantly changing content • Billions of varied pages per site • Web 2.0 attacks are here • Data Leakage problems with bad business • Junk, personal, scam, adult, etc. practices • Million of new sites appear daily • Advanced Persistent Threats using Web 2.0Web Traffic • Targeted attacks hosted here and send their data here • Current events, regional, genre sites • Less user-generated content • Highest volume of compromised sites Source: Alexa Internet, Inc. , January 2010 © 2009 Websense, Inc. All rights reserved. 3
  • 4. Static URL Filtering is Dead Traditional URL filters, classify Auctions this as “Search” Gambling Video or Audio Is it really? Streaming Inappropriate Content Social NetworkingUnderstanding the URL is not enough. You must understandand control the content on the page. © 2010 Websense, Inc. All rights reserved.
  • 5. Without Websense 6
  • 6. With Websense 7
  • 7. Antivirus Can’t Keep UpNumber of Web viruses not detected by top 5 AV engines each day No AV protections exist for hundreds of emergent threats each day http://securitylabs.websense.com/ AV is a baseline “known threat” Web security layer – but AV alone is not the solution © 2010 Websense, Inc. All rights reserved.
  • 8. Compromised Sites 71% of Malicious Websites are compromised websites Just 1 attack = 82,000 compromised sites! ©2010 All Rights Reserved. Websense, Inc. 10
  • 9. Threats Span Multiple Vectors Email with URL Website downloads Confidential data Hacker collects Trojan malware harvested data from web site User visits Website downloads Confidential data Hacker collects popular site Trojan malware harvested data via IRC chat USB dropped in Confidential data Hacker collects car park harvested data with SMTP engine © 2010 Websense, Inc. All rights reserved.
  • 10. Example 1 – Blended Threat 12
  • 11. Example 2 – Social Network scams 13
  • 12. Don’t Trust Search ResultsUser Trust Targeted Attacks13.7 percent of searches fortrending news/buzz words (asdefined by Yahoo Buzz & GoogleTrends) will lead to malware.Search engine optimization (SEO)poisoning attacks target the topsearches enabling hackers to drivetraffic to their sites. 14
  • 13. Threat LandscapeConfidential Data Customer Data 35 percent of malicious Web attacks include data stealing code 58 percent of data stealing attacks are conducted over the WebRegulated Data Financial Data 15
  • 14. The Issues you Face Today’s Web is powerful and has strong business value The use of Web 2.0 technology has dramatically expanded dynamic content and the attack surface Our Users and Data lives Everywhere Attackers are actively utilising the new Web in order to get into your sensitive Data Traditional security technologies are not effectively addressing today’s issues New detection methods are needed for modern threats © 2010 Websense, Inc. All rights reserved. 16
  • 15. Rising Total Cost of Ownership
  • 16. Websense What does this all lead to ??? ? Introducing… © 2010 Websense, Inc. All rights reserved. 18
  • 17. The TRITON Architecture Web Data Email Unified Security Security Security Solution Unified Content Security SaaS Appliance Software Unified Platform Unified Management © 2010 Websense, Inc. All rights reserved.
  • 18. The TRITON Unified Management © 2010 Websense, Inc. All rights reserved.
  • 19. TRITON: The First and Only TruHybrid™ Solution On-premise In-the-cloud
  • 20. How Not to Unify Technology © 2010 Websense, Inc. All rights reserved.
  • 21. London Headquarters New YorkSan Diego Tokyo Mumbai Sao Paulo Cape Sydney Town © 2010 Websense, Inc. All rights reserved. web security | data security | email security
  • 22. London Headquarters New YorkSan Diego Tokyo Mumbai Sao Paulo Cape Sydney Town © 2010 Websense, Inc. All rights reserved. web security | data security | email security
  • 23. Unparalleled Visibility Where Your Users are Going Where Your Data is Going Where You Are at Risk
  • 24. Key Takeaways Websense delivers the best security – The only solution with real-time protection against zero-day and scripted malware – The only solution with real-time content classification across all 95 categories – Enterprise-class Security against Blended Threats including Web, Email and DLP At the lowest cost of ownership – The only solution with unified management of on-premise and SaaS deployment platforms – The only unified Web, data, and email security solution Websense is a strategic choice – Firmly established leadership across Web, data and email segments – Unified platform that can meet multiple challenges today and scale for tomorrow © 2010 Websense, Inc. All rights reserved. 28
  • 25. …And remember Your Data’s Security and Your Web’s Security are Critical Anywhere and at Anytime.© 2010 Websense, Inc. All rights reserved. web security | data security | email security
  • 26. Websense Delivers © 2010 Websense, Inc. All rights reserved. 30

×