BEYOND THE PC – COMBATINGUNMANAGED THREATSJune 12th, 2013
View the webinar replay here:https://www.brainshark.com/xerox/vu?pi=zIDz6kmucz62tqz0
Watch this video here:http://a400.g.akamai.net/7/400/14595/v0001/xeroxwebcast.download.akamai.com/14595/TEMP/201306/Comput...
TODAY’S PROGRAM• CISO Insights– Mark Leary, Chief Information Security Officer, Xerox• Solutions: Managed Print Servicesan...
INSIGHTSMark LearyChief Information Security OfficerXerox
THE “INTERNET OF THINGS”It has arrived….and so havehuge security issues….– Network and protocolsecurity– Data privacy and ...
A “THING” CALLED A MFP…3.4MILLIONbusinesses thatexperienced aprinter-relateddata breachcompanieswithout asecure printstrat...
COMMON MFP SECURITY THREATS• Poor mobile device management• Weak MFP wireless access control• Poor VPN remote access contr...
QUESTIONS TO ASK1) Do we have an understanding of our business processes thatinvolve document management and printing?2) W...
A CYCLE OF CONTINUOUS VALUEDocumentOutsourcingIT OutsourcingBusiness ProcessOutsourcingSustainabilityCost SavingsProductiv...
SOLUTIONS: MANAGED PRINTSERVICES AND CONNECTKEY™Karl Dueland, Vice President, Solutions Delivery Unit, Xerox
STARTING POINT: SECURE TECHNOLOGY• An ecosystem built into new Xerox MFPs• Offering flexibility, coherency and commonality...
LEADERSHIP SECURITY:MULTILAYERED APPROACHNetworkManagementConsoles• Simple email alerts• Xerox DeviceManager• McAfee ePoli...
Watch this video here:http://a400.g.akamai.net/7/400/14595/v0001/xeroxwebcast.download.akamai.com/14595/TEMP/201306/09-Sec...
PROTECTING YOUR NETWORKJohn Hartman, CISCO
TOP OF MINDSECURITY CONCERNS• How do I classify so many devicescoming onto my network?• How do I allow suppliers andcontra...
All-in-One Enterprise Policy ControlCISCO IDENTITYSERVICES ENGINE (ISE)Who What Where When HowVirtual machine client, IP d...
EMBEDDED SECURITY, SMARTERSECURITYBrian Kenyon, Chief Technology Officer, McAfee
BLACKLIST VS. WHITELIST
THE DYNAMICSOF WHITELISTINGBlack Grey WhiteDYNAMIC STATICMACNetBookConsumer PCVDISmartphoneMobilePhoneREPUTATION-BASEDMedi...
Watch this video here:http://www.youtube.com/watch?v=XbQowo1ForM
SustainabilityCost SavingsProductivitySecurityInnovationInsightMobilityXerox ManagedPrint Servicesand TechnologySecure and...
Watch this video here:http://www.youtube.com/watch?v=_05x6fWtREQ
OPEN FOR QUESTIONS• Please press *1 for the Operatorto ask a questions• Or use the Q&A feature inLive Meeting to submit a ...
THANK YOU FOR JOINING US• www.xerox.com/security• Chief Optimist Magazine– More insights and innovative ideas fromthe newe...
Upcoming SlideShare
Loading in...5
×

Beyond the PC: Combating Unmanaged Threats Security

532

Published on

Beyond the PC: Combating Unmanaged Threats Security
Gain insights about how to protect your vital information against security threats by viewing this presentation from the Optimist TV webinar.

Published in: Business, Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
532
On Slideshare
0
From Embeds
0
Number of Embeds
1
Actions
Shares
0
Downloads
3
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Beyond the PC: Combating Unmanaged Threats Security

  1. 1. BEYOND THE PC – COMBATINGUNMANAGED THREATSJune 12th, 2013
  2. 2. View the webinar replay here:https://www.brainshark.com/xerox/vu?pi=zIDz6kmucz62tqz0
  3. 3. Watch this video here:http://a400.g.akamai.net/7/400/14595/v0001/xeroxwebcast.download.akamai.com/14595/TEMP/201306/Computer_Hacking-Cracking_down_on_cyber_crime-clip1.mp4
  4. 4. TODAY’S PROGRAM• CISO Insights– Mark Leary, Chief Information Security Officer, Xerox• Solutions: Managed Print Servicesand ConnectKey™– Karl Dueland, VP Solutions Delivery Unit, Xerox• Protecting Your Network– John Hartman, Client Executive, Cisco• Embedded Security, Smarter Security– Brian Kenyon, Chief Technology Officer, McAfee
  5. 5. INSIGHTSMark LearyChief Information Security OfficerXerox
  6. 6. THE “INTERNET OF THINGS”It has arrived….and so havehuge security issues….– Network and protocolsecurity– Data privacy and security– Identity– Trustpopulationwith Internetaccess in 201575%devicesconnected tothe Internet in20156Bdevicesconnected tothe Internetin 202030B
  7. 7. A “THING” CALLED A MFP…3.4MILLIONbusinesses thatexperienced aprinter-relateddata breachcompanieswithout asecure printstrategy65%companieshave a secureprintinitiative22%63%
  8. 8. COMMON MFP SECURITY THREATS• Poor mobile device management• Weak MFP wireless access control• Poor VPN remote access controls• Poor Web-based remote access controls• Weak identity and access management• MFP hardware component weaknesses• MFP embedded software weaknesses• Poor partner/contractor/consultant access• Poor physical access to MFPs• Poor MFP system and application access• Poor MFP software management controlsREMOTE ACCESSPROXIMITYINSIDER THREATSUPPLY CHAIN
  9. 9. QUESTIONS TO ASK1) Do we have an understanding of our business processes thatinvolve document management and printing?2) What threats are targeting our IT environment and particularlyMFPs?3) Are our policies addressing MFP information security still relevantto protect the business?4) Are our MFPs correctly configured to prevent cyber attacks?5) Do we have visibility into our IT environment to identify devicesand determine normal behavior from abnormal?6) Are we incorporating our customers, partners, and vendors intoour IT security operating model?
  10. 10. A CYCLE OF CONTINUOUS VALUEDocumentOutsourcingIT OutsourcingBusiness ProcessOutsourcingSustainabilityCost SavingsProductivitySecurityInnovationInsightMobilityManagedPrint Services andTechnologySecure andIntegrateAutomateand SimplifyAssess andOptimize
  11. 11. SOLUTIONS: MANAGED PRINTSERVICES AND CONNECTKEY™Karl Dueland, Vice President, Solutions Delivery Unit, Xerox
  12. 12. STARTING POINT: SECURE TECHNOLOGY• An ecosystem built into new Xerox MFPs• Offering flexibility, coherency and commonality• A complete refresh of key office products• Integrated with Managed Print Services8700,8900 7220,7225 7800 5800 9300+ConnectKeyTM
  13. 13. LEADERSHIP SECURITY:MULTILAYERED APPROACHNetworkManagementConsoles• Simple email alerts• Xerox DeviceManager• McAfee ePolicyOrchestratorTrustSecAccess ProtectionXerox MFPUser Endpoints
  14. 14. Watch this video here:http://a400.g.akamai.net/7/400/14595/v0001/xeroxwebcast.download.akamai.com/14595/TEMP/201306/09-Security_low.mp4
  15. 15. PROTECTING YOUR NETWORKJohn Hartman, CISCO
  16. 16. TOP OF MINDSECURITY CONCERNS• How do I classify so many devicescoming onto my network?• How do I allow suppliers andcontractors to collaborate securely?• Do we have control over devicesconnecting to our applications & datain the DC?• Virtual Machine Sprawl! How should Imanage security for all of those VMs weare being asked to provision everyday?• My critical services are still runningon physical servers. Do I maintainseparate policies?
  17. 17. All-in-One Enterprise Policy ControlCISCO IDENTITYSERVICES ENGINE (ISE)Who What Where When HowVirtual machine client, IP device, guest, employee, and remote userCisco® ISEWIRED WIRELESS VPNBusiness-RelevantPoliciesSecurity Policy AttributesIDENTITYCONTEXT
  18. 18. EMBEDDED SECURITY, SMARTERSECURITYBrian Kenyon, Chief Technology Officer, McAfee
  19. 19. BLACKLIST VS. WHITELIST
  20. 20. THE DYNAMICSOF WHITELISTINGBlack Grey WhiteDYNAMIC STATICMACNetBookConsumer PCVDISmartphoneMobilePhoneREPUTATION-BASEDMedicalDevicesSCADA SystemsServersPoint ofSaleATMsKiosksCOEDesktopSmartMeterMFP
  21. 21. Watch this video here:http://www.youtube.com/watch?v=XbQowo1ForM
  22. 22. SustainabilityCost SavingsProductivitySecurityInnovationInsightMobilityXerox ManagedPrint Servicesand TechnologySecure andIntegrateAutomate andSimplifyAssess andOptimizeMANAGING PRINT SECURELYSustainability• Manage power consumption with CiscoEnergyWise• Earth Smart Print DriversEmployee Productivity & Mobility• Scan to Cloud / SharePoint• Print from / to anywhere• Open API for custom workflow integrationSecurity• McAfee embedded security & whitelisting• Cisco TrustSec – secure printimage overwrite & encryptionCost Savings• Reduce wasteful printing withdefault settings• Card access authentication
  23. 23. Watch this video here:http://www.youtube.com/watch?v=_05x6fWtREQ
  24. 24. OPEN FOR QUESTIONS• Please press *1 for the Operatorto ask a questions• Or use the Q&A feature inLive Meeting to submit a question
  25. 25. THANK YOU FOR JOINING US• www.xerox.com/security• Chief Optimist Magazine– More insights and innovative ideas fromthe newest issue focused on security.• iPad edition: “Chief Optimist” on App Store• PC edition: Xerox.com/optimist• Focus Forward Events– Explore expert commentary• XeroxFocusForward.com
  1. A particular slide catching your eye?

    Clipping is a handy way to collect important slides you want to go back to later.

×