Network infrastructure security management solution - A holistic approach in Network Security

1,957 views
1,780 views

Published on

Network Infrastructure Security Management Solution can continuously provide network visualisation and identify critical attack risk. It provide security network and risk team with a firm understanding of Where the investment is needed, and Where greatest cyber attack risks lie. This understanding enable organizations to allocate resouces and take prioritized actions.

Published in: Technology
0 Comments
2 Likes
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total views
1,957
On SlideShare
0
From Embeds
0
Number of Embeds
201
Actions
Shares
0
Downloads
132
Comments
0
Likes
2
Embeds 0
No embeds

No notes for slide

Network infrastructure security management solution - A holistic approach in Network Security

  1. 1. A Holistic approach in network security Network Infrastructure Security Management (NISM) Solution
  2. 2. Thoughts onNetwork Infrastructure Security
  3. 3. Onesmallholecouldleadto asignificantdatabreach
  4. 4. Threatagentsuseautomated toolstofindandexploitweak points
  5. 5. Addressingthemillionsof vulnerabilitiesinthesystem
  6. 6. Situationalawarenessinthe turbulenttimes
  7. 7. Isthethreat againstyour network isincreasingordecreasing?
  8. 8. Wheretospend thetimeandmoney inyournetwork
  9. 9. Understandallthepossible attackpath
  10. 10. Prioritizingtheincidence responseaction,once attacked.
  11. 11. Afterattack, understand, Howithappened& prevention
  12. 12. Understandingonthe interaction betweenthedevicesinthe network
  13. 13. Understandingonthe interaction betweenthedevicesinthe network
  14. 14. SomeFacts
  15. 15. ArecentPonemonInstitutereporton perceptionsaboutnetworksecurityfound that90percentofrespondingorganizations hadsufferedasecuritybreachwithinthe previous12months
  16. 16. 2012Verizondatabreach investigationsreportfoundthat97 percentofsecuritybreachescouldhave beenpreventedthroughaconsistent, system-wideapplicationof“simpleor intermediatecontrols.”
  17. 17. Common Challenges in NISM
  18. 18. Constantlychanging Networkcomplexity exceeding humanabilitytoanalyze
  19. 19. Multiplepointofaccess
  20. 20. InconsistentIT implementation
  21. 21. TypicalNetworkInfrastructure comprises: Networking Hardware ( Routers, Switches, LAN Cards, Wireless Routers, Cables) Networking Software (Network Operations and Management, Operating systems, Firewall, Network Security Applications) Network Service (T-1 Line, DSL, Satellite, Wireless Protocols, IP Addressing) FYI
  22. 22. TypicalNetworkInfrastructurecomprises: Networking Hardware ( Routers, Switches, LAN Cards, Wireless Routers, Cables) Networking Software (Network Operations and Management, Operating systems, Firewall, Network Security Applications) Network Service (T-1 Line, DSL, Satellite, Wireless Protocols, IP Addressing) FYI
  23. 23. TypicalNetworkInfrastructurecomprises: Networking Hardware ( Routers, Switches, LAN Cards, Wireless Routers, Cables) Networking Software (Network Operations and Management, Operating systems, Firewall, Network Security Applications) Network Service (T-1 Line, DSL, Satellite, Wireless Protocols, IP Addressing) FYI
  24. 24. TypicalNetworkInfrastructurecomprises: Networking Hardware ( Routers, Switches, LAN Cards, Wireless Routers, Cables) Networking Software (Network Operations and Management, Operating systems, Firewall, Network Security Applications) Network Service (T-1 Line, DSL, Satellite, Wireless Protocols, IP Addressing) FYI
  25. 25. TypicalNetworkInfrastructurecomprises: Networking Hardware ( Routers, Switches, LAN Cards, Wireless Routers, Cables) Networking Software (Network Operations and Management, Operating systems, Firewall, Network Security Applications) Network Service (T-1 Line, DSL, Satellite, Wireless Protocols, IP Addressing) FYI
  26. 26. HealthcheckonNISM
  27. 27. HealthcheckonNISM Know your Network
  28. 28. HealthcheckonNISM Know your Network Know your Assets
  29. 29. HealthcheckonNISM Know your Network Know your Assets Know your Security
  30. 30. HealthcheckonNISM Know your Network Know your Assets Know your Security Map the Topology
  31. 31. HealthcheckonNISM Know your Network Know your Assets Know your Security Map the Topology Prioritize & Fix
  32. 32. HealthcheckonNISM Know your Network Know your Assets Know your Security Map the Topology Prioritize & Fix Monitor Continuously
  33. 33. HealthcheckonNISM Know your Network Know your Assets Know your Security Map the Topology Prioritize & Fix Monitor Continuously Manage Change & Build Workflows
  34. 34. HowNISMsolution preventCyberattacks
  35. 35. HowNISMpreventCyberattacks Ensure all the access controls are configured correctly
  36. 36. HowNISMpreventCyberattacks Ensure all the access controls are configured correctly Maintaining situational analysis
  37. 37. HowNISMpreventCyberattacks Ensure all the access controls are configured correctly Expand the new network Maintaining situational analysis
  38. 38. HowNISMpreventCyberattacks Ensure all the access controls are configured correctly Identify the greatest risk in the network Expand the new network Maintaining situational analysis
  39. 39. HowNISMpreventCyberattacks Ensure all the access controls are configured correctly Identify the greatest risk in the network Identifying risk levels Expand the new network Maintaining situational analysis
  40. 40. HowNISMpreventCyberattacks Ensure all the access controls are configured correctly Identify the greatest risk in the network Maintain and proving with all applicable regulations Identifying risk levels Expand the new network Maintaining situational analysis
  41. 41. HowNISMpreventCyberattacks Ensure all the access controls are configured correctly Identify the greatest risk in the network Maintain and proving with all applicable regulations Identifying risk levels Manage and mitigate risk from untrusted network / partner or network Expand the new network Maintaining situational analysis
  42. 42. HowNISMpreventCyberattacks Ensure all the access controls are configured correctly Identify the greatest risk in the network Maintain and proving with all applicable regulations Identifying risk levels Manage and mitigate risk from untrusted network / partner or network Expand the new network Maintaining situational analysis
  43. 43. HowNISMpreventCyberattacks Ensure all the access controls are configured correctly Identify the greatest risk in the network Maintain and proving with all applicable regulations Identifying risk levels Integrating the wireless device Manage and mitigate risk from untrusted network / partner or network Expand the new network Maintaining situational analysis
  44. 44. HowNISMpreventCyberattacks Ensure all the access controls are configured correctly Identify the greatest risk in the network Maintain and proving with all applicable regulations Identifying risk levels Integrating the wireless device Manage and mitigate risk from untrusted network / partner or network Expand the new network Maintaining situational analysis
  45. 45. To summarize:
  46. 46. To summarize: NISMsolutionmodelsyour securitycontrol infrastructuretoidentify keypointsofattack
  47. 47. To summarize: NISMsolutionmodelsyour securitycontrol infrastructuretoidentify keypointsofattack NISMSIdentifiestheholes inyoursecuritycontrols
  48. 48. To summarize: NISMsolutionmodelsyour securitycontrol infrastructuretoidentify keypointsofattack NISMSIdentifiestheholes inyoursecuritycontrols NISMSIdentifiestheholes inyoursecuritycontrols
  49. 49. Thanking you Yourresponse:sebastiantwinkle@gmail.com

×