Your SlideShare is downloading. ×
0
Network infrastructure security management solution - A holistic approach in Network Security
Network infrastructure security management solution - A holistic approach in Network Security
Network infrastructure security management solution - A holistic approach in Network Security
Network infrastructure security management solution - A holistic approach in Network Security
Network infrastructure security management solution - A holistic approach in Network Security
Network infrastructure security management solution - A holistic approach in Network Security
Network infrastructure security management solution - A holistic approach in Network Security
Network infrastructure security management solution - A holistic approach in Network Security
Network infrastructure security management solution - A holistic approach in Network Security
Network infrastructure security management solution - A holistic approach in Network Security
Network infrastructure security management solution - A holistic approach in Network Security
Network infrastructure security management solution - A holistic approach in Network Security
Network infrastructure security management solution - A holistic approach in Network Security
Network infrastructure security management solution - A holistic approach in Network Security
Network infrastructure security management solution - A holistic approach in Network Security
Network infrastructure security management solution - A holistic approach in Network Security
Network infrastructure security management solution - A holistic approach in Network Security
Network infrastructure security management solution - A holistic approach in Network Security
Network infrastructure security management solution - A holistic approach in Network Security
Network infrastructure security management solution - A holistic approach in Network Security
Network infrastructure security management solution - A holistic approach in Network Security
Network infrastructure security management solution - A holistic approach in Network Security
Network infrastructure security management solution - A holistic approach in Network Security
Network infrastructure security management solution - A holistic approach in Network Security
Network infrastructure security management solution - A holistic approach in Network Security
Network infrastructure security management solution - A holistic approach in Network Security
Network infrastructure security management solution - A holistic approach in Network Security
Network infrastructure security management solution - A holistic approach in Network Security
Network infrastructure security management solution - A holistic approach in Network Security
Network infrastructure security management solution - A holistic approach in Network Security
Network infrastructure security management solution - A holistic approach in Network Security
Network infrastructure security management solution - A holistic approach in Network Security
Network infrastructure security management solution - A holistic approach in Network Security
Network infrastructure security management solution - A holistic approach in Network Security
Network infrastructure security management solution - A holistic approach in Network Security
Network infrastructure security management solution - A holistic approach in Network Security
Network infrastructure security management solution - A holistic approach in Network Security
Network infrastructure security management solution - A holistic approach in Network Security
Network infrastructure security management solution - A holistic approach in Network Security
Network infrastructure security management solution - A holistic approach in Network Security
Network infrastructure security management solution - A holistic approach in Network Security
Network infrastructure security management solution - A holistic approach in Network Security
Network infrastructure security management solution - A holistic approach in Network Security
Network infrastructure security management solution - A holistic approach in Network Security
Network infrastructure security management solution - A holistic approach in Network Security
Network infrastructure security management solution - A holistic approach in Network Security
Network infrastructure security management solution - A holistic approach in Network Security
Network infrastructure security management solution - A holistic approach in Network Security
Network infrastructure security management solution - A holistic approach in Network Security
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×
Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Text the download link to your phone
Standard text messaging rates apply

Network infrastructure security management solution - A holistic approach in Network Security

1,251

Published on

Network Infrastructure Security Management Solution can continuously provide network visualisation and identify critical attack risk. It provide security network and risk team with a firm …

Network Infrastructure Security Management Solution can continuously provide network visualisation and identify critical attack risk. It provide security network and risk team with a firm understanding of Where the investment is needed, and Where greatest cyber attack risks lie. This understanding enable organizations to allocate resouces and take prioritized actions.

Published in: Technology
0 Comments
2 Likes
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total Views
1,251
On Slideshare
0
From Embeds
0
Number of Embeds
4
Actions
Shares
0
Downloads
111
Comments
0
Likes
2
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide

Transcript

  • 1. A Holistic approach in network security Network Infrastructure Security Management (NISM) Solution
  • 2. Thoughts onNetwork Infrastructure Security
  • 3. Onesmallholecouldleadto asignificantdatabreach
  • 4. Threatagentsuseautomated toolstofindandexploitweak points
  • 5. Addressingthemillionsof vulnerabilitiesinthesystem
  • 6. Situationalawarenessinthe turbulenttimes
  • 7. Isthethreat againstyour network isincreasingordecreasing?
  • 8. Wheretospend thetimeandmoney inyournetwork
  • 9. Understandallthepossible attackpath
  • 10. Prioritizingtheincidence responseaction,once attacked.
  • 11. Afterattack, understand, Howithappened& prevention
  • 12. Understandingonthe interaction betweenthedevicesinthe network
  • 13. Understandingonthe interaction betweenthedevicesinthe network
  • 14. SomeFacts
  • 15. ArecentPonemonInstitutereporton perceptionsaboutnetworksecurityfound that90percentofrespondingorganizations hadsufferedasecuritybreachwithinthe previous12months
  • 16. 2012Verizondatabreach investigationsreportfoundthat97 percentofsecuritybreachescouldhave beenpreventedthroughaconsistent, system-wideapplicationof“simpleor intermediatecontrols.”
  • 17. Common Challenges in NISM
  • 18. Constantlychanging Networkcomplexity exceeding humanabilitytoanalyze
  • 19. Multiplepointofaccess
  • 20. InconsistentIT implementation
  • 21. TypicalNetworkInfrastructure comprises: Networking Hardware ( Routers, Switches, LAN Cards, Wireless Routers, Cables) Networking Software (Network Operations and Management, Operating systems, Firewall, Network Security Applications) Network Service (T-1 Line, DSL, Satellite, Wireless Protocols, IP Addressing) FYI
  • 22. TypicalNetworkInfrastructurecomprises: Networking Hardware ( Routers, Switches, LAN Cards, Wireless Routers, Cables) Networking Software (Network Operations and Management, Operating systems, Firewall, Network Security Applications) Network Service (T-1 Line, DSL, Satellite, Wireless Protocols, IP Addressing) FYI
  • 23. TypicalNetworkInfrastructurecomprises: Networking Hardware ( Routers, Switches, LAN Cards, Wireless Routers, Cables) Networking Software (Network Operations and Management, Operating systems, Firewall, Network Security Applications) Network Service (T-1 Line, DSL, Satellite, Wireless Protocols, IP Addressing) FYI
  • 24. TypicalNetworkInfrastructurecomprises: Networking Hardware ( Routers, Switches, LAN Cards, Wireless Routers, Cables) Networking Software (Network Operations and Management, Operating systems, Firewall, Network Security Applications) Network Service (T-1 Line, DSL, Satellite, Wireless Protocols, IP Addressing) FYI
  • 25. TypicalNetworkInfrastructurecomprises: Networking Hardware ( Routers, Switches, LAN Cards, Wireless Routers, Cables) Networking Software (Network Operations and Management, Operating systems, Firewall, Network Security Applications) Network Service (T-1 Line, DSL, Satellite, Wireless Protocols, IP Addressing) FYI
  • 26. HealthcheckonNISM
  • 27. HealthcheckonNISM Know your Network
  • 28. HealthcheckonNISM Know your Network Know your Assets
  • 29. HealthcheckonNISM Know your Network Know your Assets Know your Security
  • 30. HealthcheckonNISM Know your Network Know your Assets Know your Security Map the Topology
  • 31. HealthcheckonNISM Know your Network Know your Assets Know your Security Map the Topology Prioritize & Fix
  • 32. HealthcheckonNISM Know your Network Know your Assets Know your Security Map the Topology Prioritize & Fix Monitor Continuously
  • 33. HealthcheckonNISM Know your Network Know your Assets Know your Security Map the Topology Prioritize & Fix Monitor Continuously Manage Change & Build Workflows
  • 34. HowNISMsolution preventCyberattacks
  • 35. HowNISMpreventCyberattacks Ensure all the access controls are configured correctly
  • 36. HowNISMpreventCyberattacks Ensure all the access controls are configured correctly Maintaining situational analysis
  • 37. HowNISMpreventCyberattacks Ensure all the access controls are configured correctly Expand the new network Maintaining situational analysis
  • 38. HowNISMpreventCyberattacks Ensure all the access controls are configured correctly Identify the greatest risk in the network Expand the new network Maintaining situational analysis
  • 39. HowNISMpreventCyberattacks Ensure all the access controls are configured correctly Identify the greatest risk in the network Identifying risk levels Expand the new network Maintaining situational analysis
  • 40. HowNISMpreventCyberattacks Ensure all the access controls are configured correctly Identify the greatest risk in the network Maintain and proving with all applicable regulations Identifying risk levels Expand the new network Maintaining situational analysis
  • 41. HowNISMpreventCyberattacks Ensure all the access controls are configured correctly Identify the greatest risk in the network Maintain and proving with all applicable regulations Identifying risk levels Manage and mitigate risk from untrusted network / partner or network Expand the new network Maintaining situational analysis
  • 42. HowNISMpreventCyberattacks Ensure all the access controls are configured correctly Identify the greatest risk in the network Maintain and proving with all applicable regulations Identifying risk levels Manage and mitigate risk from untrusted network / partner or network Expand the new network Maintaining situational analysis
  • 43. HowNISMpreventCyberattacks Ensure all the access controls are configured correctly Identify the greatest risk in the network Maintain and proving with all applicable regulations Identifying risk levels Integrating the wireless device Manage and mitigate risk from untrusted network / partner or network Expand the new network Maintaining situational analysis
  • 44. HowNISMpreventCyberattacks Ensure all the access controls are configured correctly Identify the greatest risk in the network Maintain and proving with all applicable regulations Identifying risk levels Integrating the wireless device Manage and mitigate risk from untrusted network / partner or network Expand the new network Maintaining situational analysis
  • 45. To summarize:
  • 46. To summarize: NISMsolutionmodelsyour securitycontrol infrastructuretoidentify keypointsofattack
  • 47. To summarize: NISMsolutionmodelsyour securitycontrol infrastructuretoidentify keypointsofattack NISMSIdentifiestheholes inyoursecuritycontrols
  • 48. To summarize: NISMsolutionmodelsyour securitycontrol infrastructuretoidentify keypointsofattack NISMSIdentifiestheholes inyoursecuritycontrols NISMSIdentifiestheholes inyoursecuritycontrols
  • 49. Thanking you Yourresponse:sebastiantwinkle@gmail.com

×