SlideShare a Scribd company logo
1 of 8
CYBER
SECURITY
NEXTGEN GROUP
2021
NEXTGEN | DISTRIBUTION REINVENTED
P / 2
© NEXTGEN Group | DISTRIBUTION | MARKETING | SOFTWARE & CLOUD ECONOMICS | FINANCE | TECHNICAL CENTRE OF EXCELLENCE
DISTRIBUTION
SERVICES
We’ve responded to
the evolving IT
ecosystem with an
advanced enterprise
software strategy,
best-in-breed
infrastructure, and
select services
tailored to the needs
of the channel.
MAR-TECH
PLATFORM
Leverage data
driven sales
intelligence to
identify and target
customers, influence
them on the buying
journey and deliver
sales execution.
Resulting in
increased pipeline
and revenue.
MARKETING
SERVICES
Our data first brand,
digital and creative
agency has a long
pedigree in B2B and
technology
marketing that takes
a human approach
to how audiences
experience your
brand.
CONSULTING
SERVICES
Expert consultation
to drive optimal
outcomes from
software vendor
audits, better
manage over or
under-provisioning of
software licensing
and create greater
efficiency across
digital transformation
projects.
PAYMENT
SOLUTIONS
Flexible risk-free
payment solutions
that provide 100%
financing on
hardware, software,
licensing and cloud
services tailored for
the cloud economy.
CLOUD
PLATFORM
Globally scalable
‘Order2Cash’
platform with unique
IP automating the
consumption and
billing of cloud
managed services
and platform
operations for Cloud
Providers, MSPs
and ISVs.
COLLABORATIVE
CYBERSEC
Provides the ability
to emulate customer
environments in
order to showcase
multiple vendor
integrations to create
seamless security
fabrics, from
discovery to POC in
a single session, in
real time.
TECH CENTRE
OF EXCELLENCE
Hub of sales and
technical
enablement for
Partners. It
accelerates
customer innovation
and channel
enablement through
complimentary, rapid
access to assets,
resources, and cloud
environments.
VALUE ADDED SERVICES
NEXTGEN | DISRUPTIVE INNOVATION
NEXTGEN | GROUP GO TO MARKET
NEXTGEN | DISTRIBUTION REINVENTED
P / 3
© NEXTGEN Group | DISTRIBUTION | MARKETING | SOFTWARE & CLOUD ECONOMICS | FINANCE | TECHNICAL CENTRE OF EXCELLENCE
ABM / MARTECH
PLATFORM
DIGITAL
MARKETING
SOFTWARE
CONSULTING
PAYMENT
SOLUTIONS
CLOUD
PLATFORM
COLLABORATIVE
CYBERSEC
TECH CENTRE
OF EXCELLENCE
VALUE
ADDED
SERVICES
VENDOR
PARTNERS
TECHNOLOGY
VISION DIGITAL ENTERPRISE CLOUD CYBER SECURITY DATA MANAGEMENT
NEXTGEN | ANZ GO TO MARKET
NEXTGEN | DISTRIBUTION REINVENTED
P / 4
© NEXTGEN Group | DISTRIBUTION | MARKETING | SOFTWARE & CLOUD ECONOMICS | FINANCE | TECHNICAL CENTRE OF EXCELLENCE
Threat and
Vulnerability
Management
Security
Monitoring
and Operations
Identity
and Access
Management
Operational
and Network
Security
Application
and Data
Security
Cloud and
Emerging
Technology
Security
Endpoint
and Mobile
Security
Cyber Security
Strategy
Technology
Complementary, best-of-breed
technology with next-generation
cyber solutions.
GTM Pillars
• Zero Trust
• Next-Gen SOC Triad
• Security Observability
CyberLAB & oSpace
Key value pillars that ‘move the
dial’ for our vendors and partners
in a competitive technology
marketplace.
CYBER | STRATEGY
NEXTGEN | DISTRIBUTION REINVENTED
P / 5
© NEXTGEN Group | DISTRIBUTION | MARKETING | SOFTWARE & CLOUD ECONOMICS | FINANCE | TECHNICAL CENTRE OF EXCELLENCE
NEXTGEN CYBER | GTM PILLARS
From network-orientated security to a
continuous verification of trust.
Data, devices, networks, automation,
analytics, automation and orchestration.
Scale technology as an ecosystem solution
to achieve ZTX for customers.
Technologies: Illumio, CrowdStrike,
Netskope, Okta, Spectra Alliance.
Achieves visibility through three
capabilities: Logs, Network & Data.
Enabler for comprehensive incident
detection and response measures.
Critical SOC capabilities but also applied
to the overarching security posture.
Technologies: ExtraHop (NDR),
CrowdStrike (EDR & XDR).
New paradigm shift in securing
complex, high-velocity cloud-native
environments.
Three hyper-scalers; AWS, Azure & GCP.
Rapid, distributed and dynamic nature
of cloud applications and digital estate.
Technologies: CrowdStrike, Sysdig,
Imperva, Illumio.
Observability
“Evolution of Security”.
SOC Triad
“Enhanced Visibility”
Zero Trust
“Never Trust, Always Verify”.
NEXTGEN | DISTRIBUTION REINVENTED
P / 6
CYBER | CYBERLAB
© NEXTGEN Group | DISTRIBUTION | MARKETING | SOFTWARE & CLOUD ECONOMICS | FINANCE | TECHNICAL CENTRE OF EXCELLENCE
The NEXTGEN CyberLAB
offers customized technology
integrations and use cases for
key partners, vendors and
customer opportunities.
Value Pillars
1. Customized environments
2. Demos & hosted POCs
3. Cerebrum learning center
ZEROTRUST (ZTX)
PRODUCT
Customer has NETSKOPE and is looking
to integrate EXTRAHOP for NDR and
CROWDSTRIKE for endpoint.
INTEGRATIONS
Partner selects EXTRAHOP &
CROWDSTRIKE as primary demo
technologies, NETSKOPE as background.
Unique demo/POC environment loads.
POC
Partner remotely delivers agents from
CyberLAB. Environment is fluid for
customer’s requirements but capped
on Vendor allowances.
NEXTGEN | DISTRIBUTION REINVENTED
P / 12
© NEXTGEN Group | DISTRIBUTION | MARKETING | SOFTWARE & CLOUD ECONOMICS | FINANCE | TECHNICAL CENTRE OF EXCELLENCE
2020
2019
2017
2018
2016/15
2014/13
THANK YOU
LET’S
CREATE
BETTER

More Related Content

What's hot

Why Zero Trust Architecture Will Become the New Normal in 2021
Why Zero Trust Architecture Will Become the New Normal in 2021Why Zero Trust Architecture Will Become the New Normal in 2021
Why Zero Trust Architecture Will Become the New Normal in 2021Cloudflare
 
Why Integrating Network Technology & Security Makes Sense Now
Why Integrating Network Technology & Security Makes Sense NowWhy Integrating Network Technology & Security Makes Sense Now
Why Integrating Network Technology & Security Makes Sense NowAbaram Network Solutions
 
Empowering Digital Transformation in Financial Services
Empowering Digital Transformation in Financial ServicesEmpowering Digital Transformation in Financial Services
Empowering Digital Transformation in Financial ServicesCristian Garcia G.
 
Fortinet's Secure SD-WAN: Gartner Peer Insights Reviews
Fortinet's Secure SD-WAN: Gartner Peer Insights ReviewsFortinet's Secure SD-WAN: Gartner Peer Insights Reviews
Fortinet's Secure SD-WAN: Gartner Peer Insights ReviewsFortinet
 
Alpha & Omega Presentation
Alpha & Omega PresentationAlpha & Omega Presentation
Alpha & Omega PresentationDarryl Santa
 
Proteja sus datos en cualquier servicio Cloud y Web de forma unificada
Proteja sus datos en cualquier servicio Cloud y Web de forma unificadaProteja sus datos en cualquier servicio Cloud y Web de forma unificada
Proteja sus datos en cualquier servicio Cloud y Web de forma unificadaCristian Garcia G.
 
HIGH-IMPACT USE CASES POWERED BY NEXT-GENERATION NETWORK ANALYTICS
HIGH-IMPACT USE CASES POWERED BY NEXT-GENERATION NETWORK ANALYTICSHIGH-IMPACT USE CASES POWERED BY NEXT-GENERATION NETWORK ANALYTICS
HIGH-IMPACT USE CASES POWERED BY NEXT-GENERATION NETWORK ANALYTICSHappiest Minds Technologies
 
Introduction to Cloud Security
Introduction to Cloud SecurityIntroduction to Cloud Security
Introduction to Cloud SecuritySusanne Tedrick
 
Microsoft Telco AI Brochure
Microsoft Telco AI BrochureMicrosoft Telco AI Brochure
Microsoft Telco AI BrochureRick Lievano
 
Rethinking Cybersecurity for the Digital Transformation Era
Rethinking Cybersecurity for the Digital Transformation EraRethinking Cybersecurity for the Digital Transformation Era
Rethinking Cybersecurity for the Digital Transformation EraZscaler
 
Desafíos de la Ciberseguridad en un ecosistema digitalmente transformado
Desafíos de la Ciberseguridad en un ecosistema digitalmente transformadoDesafíos de la Ciberseguridad en un ecosistema digitalmente transformado
Desafíos de la Ciberseguridad en un ecosistema digitalmente transformadoCristian Garcia G.
 
SE-4110, Securing Identities in the Cloud, by Martin Ahlers
SE-4110, Securing Identities in the Cloud, by Martin AhlersSE-4110, Securing Identities in the Cloud, by Martin Ahlers
SE-4110, Securing Identities in the Cloud, by Martin AhlersAMD Developer Central
 
Splunk live! Italy 2015
Splunk live! Italy 2015Splunk live! Italy 2015
Splunk live! Italy 2015Georg Knon
 
Rethinking Cybersecurity for the Digital Transformation Era
Rethinking Cybersecurity for the Digital Transformation EraRethinking Cybersecurity for the Digital Transformation Era
Rethinking Cybersecurity for the Digital Transformation EraZscaler
 
EARTHLINK How To Predict Impact The Network Impact of Apps
EARTHLINK  How To Predict Impact The Network Impact of Apps EARTHLINK  How To Predict Impact The Network Impact of Apps
EARTHLINK How To Predict Impact The Network Impact of Apps Joe Maglitta
 
Ciphercloud Solutions Overview hsa oct2011
Ciphercloud Solutions Overview hsa oct2011Ciphercloud Solutions Overview hsa oct2011
Ciphercloud Solutions Overview hsa oct2011Ramy Houssaini
 
HP Iot platform and solution plans
HP Iot platform and solution plansHP Iot platform and solution plans
HP Iot platform and solution plansJeff Edlund
 

What's hot (20)

Why Zero Trust Architecture Will Become the New Normal in 2021
Why Zero Trust Architecture Will Become the New Normal in 2021Why Zero Trust Architecture Will Become the New Normal in 2021
Why Zero Trust Architecture Will Become the New Normal in 2021
 
Why Integrating Network Technology & Security Makes Sense Now
Why Integrating Network Technology & Security Makes Sense NowWhy Integrating Network Technology & Security Makes Sense Now
Why Integrating Network Technology & Security Makes Sense Now
 
Empowering Digital Transformation in Financial Services
Empowering Digital Transformation in Financial ServicesEmpowering Digital Transformation in Financial Services
Empowering Digital Transformation in Financial Services
 
What is SASE
What is SASEWhat is SASE
What is SASE
 
Fortinet's Secure SD-WAN: Gartner Peer Insights Reviews
Fortinet's Secure SD-WAN: Gartner Peer Insights ReviewsFortinet's Secure SD-WAN: Gartner Peer Insights Reviews
Fortinet's Secure SD-WAN: Gartner Peer Insights Reviews
 
Alpha & Omega Presentation
Alpha & Omega PresentationAlpha & Omega Presentation
Alpha & Omega Presentation
 
Proteja sus datos en cualquier servicio Cloud y Web de forma unificada
Proteja sus datos en cualquier servicio Cloud y Web de forma unificadaProteja sus datos en cualquier servicio Cloud y Web de forma unificada
Proteja sus datos en cualquier servicio Cloud y Web de forma unificada
 
HIGH-IMPACT USE CASES POWERED BY NEXT-GENERATION NETWORK ANALYTICS
HIGH-IMPACT USE CASES POWERED BY NEXT-GENERATION NETWORK ANALYTICSHIGH-IMPACT USE CASES POWERED BY NEXT-GENERATION NETWORK ANALYTICS
HIGH-IMPACT USE CASES POWERED BY NEXT-GENERATION NETWORK ANALYTICS
 
Introduction to Cloud Security
Introduction to Cloud SecurityIntroduction to Cloud Security
Introduction to Cloud Security
 
SD-WAN iFLX-Brochure
SD-WAN iFLX-BrochureSD-WAN iFLX-Brochure
SD-WAN iFLX-Brochure
 
Microsoft Telco AI Brochure
Microsoft Telco AI BrochureMicrosoft Telco AI Brochure
Microsoft Telco AI Brochure
 
Rethinking Cybersecurity for the Digital Transformation Era
Rethinking Cybersecurity for the Digital Transformation EraRethinking Cybersecurity for the Digital Transformation Era
Rethinking Cybersecurity for the Digital Transformation Era
 
Value Journal - October 2020
Value Journal - October 2020Value Journal - October 2020
Value Journal - October 2020
 
Desafíos de la Ciberseguridad en un ecosistema digitalmente transformado
Desafíos de la Ciberseguridad en un ecosistema digitalmente transformadoDesafíos de la Ciberseguridad en un ecosistema digitalmente transformado
Desafíos de la Ciberseguridad en un ecosistema digitalmente transformado
 
SE-4110, Securing Identities in the Cloud, by Martin Ahlers
SE-4110, Securing Identities in the Cloud, by Martin AhlersSE-4110, Securing Identities in the Cloud, by Martin Ahlers
SE-4110, Securing Identities in the Cloud, by Martin Ahlers
 
Splunk live! Italy 2015
Splunk live! Italy 2015Splunk live! Italy 2015
Splunk live! Italy 2015
 
Rethinking Cybersecurity for the Digital Transformation Era
Rethinking Cybersecurity for the Digital Transformation EraRethinking Cybersecurity for the Digital Transformation Era
Rethinking Cybersecurity for the Digital Transformation Era
 
EARTHLINK How To Predict Impact The Network Impact of Apps
EARTHLINK  How To Predict Impact The Network Impact of Apps EARTHLINK  How To Predict Impact The Network Impact of Apps
EARTHLINK How To Predict Impact The Network Impact of Apps
 
Ciphercloud Solutions Overview hsa oct2011
Ciphercloud Solutions Overview hsa oct2011Ciphercloud Solutions Overview hsa oct2011
Ciphercloud Solutions Overview hsa oct2011
 
HP Iot platform and solution plans
HP Iot platform and solution plansHP Iot platform and solution plans
HP Iot platform and solution plans
 

Similar to NEXTGEN Cyber Security 2021

Conférence Internet des objets IoT M2M - CCI Bordeaux - 02 04 2015 - presenta...
Conférence Internet des objets IoT M2M - CCI Bordeaux - 02 04 2015 - presenta...Conférence Internet des objets IoT M2M - CCI Bordeaux - 02 04 2015 - presenta...
Conférence Internet des objets IoT M2M - CCI Bordeaux - 02 04 2015 - presenta...polenumerique33
 
Insurtech, Cloud and Cybersecurity - Chartered Insurance Institute
Insurtech, Cloud and Cybersecurity -  Chartered Insurance InstituteInsurtech, Cloud and Cybersecurity -  Chartered Insurance Institute
Insurtech, Cloud and Cybersecurity - Chartered Insurance InstituteHenrique Centieiro
 
NEW PERSPECTIVES FOR ENERGY UTILITIES
NEW PERSPECTIVES FOR ENERGY UTILITIES NEW PERSPECTIVES FOR ENERGY UTILITIES
NEW PERSPECTIVES FOR ENERGY UTILITIES CGI
 
Marlabs corporate deck july 2018
Marlabs corporate deck july 2018Marlabs corporate deck july 2018
Marlabs corporate deck july 2018Marlabs
 
Network Process Outsourcing Services
Network Process Outsourcing ServicesNetwork Process Outsourcing Services
Network Process Outsourcing ServicesTech Mahindra
 
Business case Schneider-Linkbynet
Business case Schneider-LinkbynetBusiness case Schneider-Linkbynet
Business case Schneider-LinkbynetMatthieu DEMOOR
 
Presentación Dell, Omega Peripherals e Intel: El centro de datos eficiente (1...
Presentación Dell, Omega Peripherals e Intel: El centro de datos eficiente (1...Presentación Dell, Omega Peripherals e Intel: El centro de datos eficiente (1...
Presentación Dell, Omega Peripherals e Intel: El centro de datos eficiente (1...Omega Peripherals
 
Hyperledger Blockchain Development Services
Hyperledger Blockchain Development ServicesHyperledger Blockchain Development Services
Hyperledger Blockchain Development ServicesMobiloitte Technologies
 
The changing landscape of SDN. What your customers need to know.
The changing landscape of SDN. What your customers need to know.The changing landscape of SDN. What your customers need to know.
The changing landscape of SDN. What your customers need to know.Tech Data
 
Spearhead Systems 2012
Spearhead Systems 2012Spearhead Systems 2012
Spearhead Systems 2012Marius Pana
 
Csc Company Profile
Csc Company ProfileCsc Company Profile
Csc Company ProfileWader Zhang
 
Building Modern Platforms on Microsoft Azure by Steef-Jan Wiggers
Building Modern Platforms on Microsoft Azure by Steef-Jan WiggersBuilding Modern Platforms on Microsoft Azure by Steef-Jan Wiggers
Building Modern Platforms on Microsoft Azure by Steef-Jan WiggersCodit
 
TGS-BP-BusinessPresentation-en-r00
TGS-BP-BusinessPresentation-en-r00TGS-BP-BusinessPresentation-en-r00
TGS-BP-BusinessPresentation-en-r00Itconic
 
Accenture: ACIC Rome & Commvault
Accenture: ACIC Rome & Commvault Accenture: ACIC Rome & Commvault
Accenture: ACIC Rome & Commvault Accenture Italia
 

Similar to NEXTGEN Cyber Security 2021 (20)

Conférence Internet des objets IoT M2M - CCI Bordeaux - 02 04 2015 - presenta...
Conférence Internet des objets IoT M2M - CCI Bordeaux - 02 04 2015 - presenta...Conférence Internet des objets IoT M2M - CCI Bordeaux - 02 04 2015 - presenta...
Conférence Internet des objets IoT M2M - CCI Bordeaux - 02 04 2015 - presenta...
 
Insurtech, Cloud and Cybersecurity - Chartered Insurance Institute
Insurtech, Cloud and Cybersecurity -  Chartered Insurance InstituteInsurtech, Cloud and Cybersecurity -  Chartered Insurance Institute
Insurtech, Cloud and Cybersecurity - Chartered Insurance Institute
 
NEW PERSPECTIVES FOR ENERGY UTILITIES
NEW PERSPECTIVES FOR ENERGY UTILITIES NEW PERSPECTIVES FOR ENERGY UTILITIES
NEW PERSPECTIVES FOR ENERGY UTILITIES
 
Marlabs corporate deck july 2018
Marlabs corporate deck july 2018Marlabs corporate deck july 2018
Marlabs corporate deck july 2018
 
Value Stories - 7th Issue
Value Stories - 7th Issue Value Stories - 7th Issue
Value Stories - 7th Issue
 
Value Journal - December 2020
Value Journal - December 2020Value Journal - December 2020
Value Journal - December 2020
 
Foraying the Cloud
Foraying the CloudForaying the Cloud
Foraying the Cloud
 
Network Process Outsourcing Services
Network Process Outsourcing ServicesNetwork Process Outsourcing Services
Network Process Outsourcing Services
 
Business case Schneider-Linkbynet
Business case Schneider-LinkbynetBusiness case Schneider-Linkbynet
Business case Schneider-Linkbynet
 
Presentación Dell, Omega Peripherals e Intel: El centro de datos eficiente (1...
Presentación Dell, Omega Peripherals e Intel: El centro de datos eficiente (1...Presentación Dell, Omega Peripherals e Intel: El centro de datos eficiente (1...
Presentación Dell, Omega Peripherals e Intel: El centro de datos eficiente (1...
 
Hyperledger Blockchain Development Services
Hyperledger Blockchain Development ServicesHyperledger Blockchain Development Services
Hyperledger Blockchain Development Services
 
The changing landscape of SDN. What your customers need to know.
The changing landscape of SDN. What your customers need to know.The changing landscape of SDN. What your customers need to know.
The changing landscape of SDN. What your customers need to know.
 
Blockhain Ecosystem Development
Blockhain Ecosystem DevelopmentBlockhain Ecosystem Development
Blockhain Ecosystem Development
 
Spearhead Systems 2012
Spearhead Systems 2012Spearhead Systems 2012
Spearhead Systems 2012
 
Csc Company Profile
Csc Company ProfileCsc Company Profile
Csc Company Profile
 
Redington Value Journal - May 2018
Redington Value Journal - May 2018Redington Value Journal - May 2018
Redington Value Journal - May 2018
 
EENA2019: Track3 session2 Enabling agility in the PSAP and the wider response...
EENA2019: Track3 session2 Enabling agility in the PSAP and the wider response...EENA2019: Track3 session2 Enabling agility in the PSAP and the wider response...
EENA2019: Track3 session2 Enabling agility in the PSAP and the wider response...
 
Building Modern Platforms on Microsoft Azure by Steef-Jan Wiggers
Building Modern Platforms on Microsoft Azure by Steef-Jan WiggersBuilding Modern Platforms on Microsoft Azure by Steef-Jan Wiggers
Building Modern Platforms on Microsoft Azure by Steef-Jan Wiggers
 
TGS-BP-BusinessPresentation-en-r00
TGS-BP-BusinessPresentation-en-r00TGS-BP-BusinessPresentation-en-r00
TGS-BP-BusinessPresentation-en-r00
 
Accenture: ACIC Rome & Commvault
Accenture: ACIC Rome & Commvault Accenture: ACIC Rome & Commvault
Accenture: ACIC Rome & Commvault
 

Recently uploaded

Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfjimielynbastida
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsPrecisely
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Neo4j
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfngoud9212
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 

Recently uploaded (20)

Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdf
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power Systems
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdf
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 

NEXTGEN Cyber Security 2021

  • 2. NEXTGEN | DISTRIBUTION REINVENTED P / 2 © NEXTGEN Group | DISTRIBUTION | MARKETING | SOFTWARE & CLOUD ECONOMICS | FINANCE | TECHNICAL CENTRE OF EXCELLENCE DISTRIBUTION SERVICES We’ve responded to the evolving IT ecosystem with an advanced enterprise software strategy, best-in-breed infrastructure, and select services tailored to the needs of the channel. MAR-TECH PLATFORM Leverage data driven sales intelligence to identify and target customers, influence them on the buying journey and deliver sales execution. Resulting in increased pipeline and revenue. MARKETING SERVICES Our data first brand, digital and creative agency has a long pedigree in B2B and technology marketing that takes a human approach to how audiences experience your brand. CONSULTING SERVICES Expert consultation to drive optimal outcomes from software vendor audits, better manage over or under-provisioning of software licensing and create greater efficiency across digital transformation projects. PAYMENT SOLUTIONS Flexible risk-free payment solutions that provide 100% financing on hardware, software, licensing and cloud services tailored for the cloud economy. CLOUD PLATFORM Globally scalable ‘Order2Cash’ platform with unique IP automating the consumption and billing of cloud managed services and platform operations for Cloud Providers, MSPs and ISVs. COLLABORATIVE CYBERSEC Provides the ability to emulate customer environments in order to showcase multiple vendor integrations to create seamless security fabrics, from discovery to POC in a single session, in real time. TECH CENTRE OF EXCELLENCE Hub of sales and technical enablement for Partners. It accelerates customer innovation and channel enablement through complimentary, rapid access to assets, resources, and cloud environments. VALUE ADDED SERVICES NEXTGEN | DISRUPTIVE INNOVATION NEXTGEN | GROUP GO TO MARKET
  • 3. NEXTGEN | DISTRIBUTION REINVENTED P / 3 © NEXTGEN Group | DISTRIBUTION | MARKETING | SOFTWARE & CLOUD ECONOMICS | FINANCE | TECHNICAL CENTRE OF EXCELLENCE ABM / MARTECH PLATFORM DIGITAL MARKETING SOFTWARE CONSULTING PAYMENT SOLUTIONS CLOUD PLATFORM COLLABORATIVE CYBERSEC TECH CENTRE OF EXCELLENCE VALUE ADDED SERVICES VENDOR PARTNERS TECHNOLOGY VISION DIGITAL ENTERPRISE CLOUD CYBER SECURITY DATA MANAGEMENT NEXTGEN | ANZ GO TO MARKET
  • 4. NEXTGEN | DISTRIBUTION REINVENTED P / 4 © NEXTGEN Group | DISTRIBUTION | MARKETING | SOFTWARE & CLOUD ECONOMICS | FINANCE | TECHNICAL CENTRE OF EXCELLENCE Threat and Vulnerability Management Security Monitoring and Operations Identity and Access Management Operational and Network Security Application and Data Security Cloud and Emerging Technology Security Endpoint and Mobile Security Cyber Security Strategy Technology Complementary, best-of-breed technology with next-generation cyber solutions. GTM Pillars • Zero Trust • Next-Gen SOC Triad • Security Observability CyberLAB & oSpace Key value pillars that ‘move the dial’ for our vendors and partners in a competitive technology marketplace. CYBER | STRATEGY
  • 5. NEXTGEN | DISTRIBUTION REINVENTED P / 5 © NEXTGEN Group | DISTRIBUTION | MARKETING | SOFTWARE & CLOUD ECONOMICS | FINANCE | TECHNICAL CENTRE OF EXCELLENCE NEXTGEN CYBER | GTM PILLARS From network-orientated security to a continuous verification of trust. Data, devices, networks, automation, analytics, automation and orchestration. Scale technology as an ecosystem solution to achieve ZTX for customers. Technologies: Illumio, CrowdStrike, Netskope, Okta, Spectra Alliance. Achieves visibility through three capabilities: Logs, Network & Data. Enabler for comprehensive incident detection and response measures. Critical SOC capabilities but also applied to the overarching security posture. Technologies: ExtraHop (NDR), CrowdStrike (EDR & XDR). New paradigm shift in securing complex, high-velocity cloud-native environments. Three hyper-scalers; AWS, Azure & GCP. Rapid, distributed and dynamic nature of cloud applications and digital estate. Technologies: CrowdStrike, Sysdig, Imperva, Illumio. Observability “Evolution of Security”. SOC Triad “Enhanced Visibility” Zero Trust “Never Trust, Always Verify”.
  • 6. NEXTGEN | DISTRIBUTION REINVENTED P / 6 CYBER | CYBERLAB © NEXTGEN Group | DISTRIBUTION | MARKETING | SOFTWARE & CLOUD ECONOMICS | FINANCE | TECHNICAL CENTRE OF EXCELLENCE The NEXTGEN CyberLAB offers customized technology integrations and use cases for key partners, vendors and customer opportunities. Value Pillars 1. Customized environments 2. Demos & hosted POCs 3. Cerebrum learning center ZEROTRUST (ZTX) PRODUCT Customer has NETSKOPE and is looking to integrate EXTRAHOP for NDR and CROWDSTRIKE for endpoint. INTEGRATIONS Partner selects EXTRAHOP & CROWDSTRIKE as primary demo technologies, NETSKOPE as background. Unique demo/POC environment loads. POC Partner remotely delivers agents from CyberLAB. Environment is fluid for customer’s requirements but capped on Vendor allowances.
  • 7. NEXTGEN | DISTRIBUTION REINVENTED P / 12 © NEXTGEN Group | DISTRIBUTION | MARKETING | SOFTWARE & CLOUD ECONOMICS | FINANCE | TECHNICAL CENTRE OF EXCELLENCE 2020 2019 2017 2018 2016/15 2014/13

Editor's Notes

  1. The NEXTGEN Cyber Security Business Unit includes the following go-to-market strategy:    Zero Trust Reference Architecture    Vendor technologies: Netskope, Okta, CrowdStrike, Proofpoint   Based on the mantra of “Never Trust, Always Verify,” Gartner’s Zero Trust Reference Architecture has become increasingly relevant since 2019. Zero Trust eXtended (ZTX) is a conceptual and architectural framework for moving security from a network-orientated, perimeter-based security model to one based on a continuous verification of trust. As the ZTX framework encompasses data, devices, networks, automation and analytics (amongst others), we must provide partners with the ability to scale technology as an ecosystem solution to achieve this for their customers.     SOC Visibility Triad     Vendor technologies: ExtraHop, CrowdStrike, Splunk   Slightly more mature than ZTX but just as relevant, the SOC Visibility Triad was originally coined to demonstrate security visibility through three key pillars: logs, network and data. Security visibility is the enabler for comprehensive incident response measures. We understand the customer’s need for enhanced visibility, so the CyberLAB™ delivers this instrumental technology integration across EDR, NDR and SIEM/UEBA.    Security observability   Vendor technologies: Netskope, Sysdig, Imperva, ExtraHop   Born in 2021, Security Observability is our newest go-to-market model that addresses the rapid, distributed and dynamic nature of securing cloud-native application deployments. This new paradigm of observability for security purposes has emerged as a core requirement for modern enterprises adopting complex, high-velocity cloud architectures. The CyberLAB™ enables NEXTGEN partners to show the value of security observability in cloud-native environments. 
  2. “The CyberLAB is a fully customized, virtual lab environment that showcases integrated technology solutions and offers scalable technical enablement. The CyberLAB can be end customer or partner facing and has been proven to speed up the opportunity lifecycle by 75%. The key differentiation of the C The CyberLAB™ enables partners to rapidly deploy solutions and prove the value of cyber security investments. Backed by our cyber security intellectual property, market analysis and research and development, the CyberLAB™ helps showcase key industry trends, these include:   Breach and attack simulation  Cyber security mesh architecture  Security product consolidation  Identity first and machine identity management  Privacy enhancing computation  Securing distributed digital assets  CyberLAB is rapid technology deployments that are fully integrated, demonstrating the value of a cyber security solutions, not just a ‘point product’.
  3. Falcon Prevent Better Protection We solve the challenge of attack sophistication by providing better protection. We protect against all types of attacks, prevent silent failure, proactively hunt for threats and optimize defenses with Threat Intelligence. Reduced Complexity We reduce complexity by simplifying endpoint security, decreasing the number of agents to manage and eliminating agent bloat. We eliminate the on-premises infrastructure that needs to be maintained and kept up-todate. Increased Efficiency We increase security efficiency and provide a great workaround to the problem of skills shortage by accelerating security operations, automating security operations, and reducing time and effort to respond to incidents.
  4. “The CyberLAB is a fully customized, virtual lab environment that showcases integrated technology solutions and offers scalable technical enablement. The CyberLAB can be end customer or partner facing and has been proven to speed up the opportunity lifecycle by 75%. The key differentiation of the C The CyberLAB™ enables partners to rapidly deploy solutions and prove the value of cyber security investments. Backed by our cyber security intellectual property, market analysis and research and development, the CyberLAB™ helps showcase key industry trends, these include:   Breach and attack simulation  Cyber security mesh architecture  Security product consolidation  Identity first and machine identity management  Privacy enhancing computation  Securing distributed digital assets  CyberLAB is rapid technology deployments that are fully integrated, demonstrating the value of a cyber security solutions, not just a ‘point product’.
  5. Benefits of the SOC Visibility Triad (NDR, EDR, SIEM) Reduce exposure to risk and financial/reputational damage associated with data breaches and ransomware. Empower SOC teams with optimized threat detection and response. Enhance efficiency with single threat detection, response and forensics. Monitor IoT threats which don't have endpoint security installed. Save money with a single, powerful detection and response tool that works across on-premises, cloud, and hybrid environments. Support digital transformation projects with the confidence that they will be built on secure foundations.
  6. “The CyberLAB is a fully customized, virtual lab environment that showcases integrated technology solutions and offers scalable technical enablement. The CyberLAB can be end customer or partner facing and has been proven to speed up the opportunity lifecycle by 75%. The key differentiation of the C The CyberLAB™ enables partners to rapidly deploy solutions and prove the value of cyber security investments. Backed by our cyber security intellectual property, market analysis and research and development, the CyberLAB™ helps showcase key industry trends, these include:   Breach and attack simulation  Cyber security mesh architecture  Security product consolidation  Identity first and machine identity management  Privacy enhancing computation  Securing distributed digital assets  CyberLAB is rapid technology deployments that are fully integrated, demonstrating the value of a cyber security solutions, not just a ‘point product’.
  7. “The CyberLAB is a fully customized, virtual lab environment that showcases integrated technology solutions and offers scalable technical enablement. The CyberLAB can be end customer or partner facing and has been proven to speed up the opportunity lifecycle by 75%. The key differentiation of the C The CyberLAB™ enables partners to rapidly deploy solutions and prove the value of cyber security investments. Backed by our cyber security intellectual property, market analysis and research and development, the CyberLAB™ helps showcase key industry trends, these include:   Breach and attack simulation  Cyber security mesh architecture  Security product consolidation  Identity first and machine identity management  Privacy enhancing computation  Securing distributed digital assets  CyberLAB is rapid technology deployments that are fully integrated, demonstrating the value of a cyber security solutions, not just a ‘point product’.
  8. “The CyberLAB is a fully customized, virtual lab environment that showcases integrated technology solutions and offers scalable technical enablement. The CyberLAB can be end customer or partner facing and has been proven to speed up the opportunity lifecycle by 75%. The key differentiation of the C The CyberLAB™ enables partners to rapidly deploy solutions and prove the value of cyber security investments. Backed by our cyber security intellectual property, market analysis and research and development, the CyberLAB™ helps showcase key industry trends, these include:   Breach and attack simulation  Cyber security mesh architecture  Security product consolidation  Identity first and machine identity management  Privacy enhancing computation  Securing distributed digital assets  CyberLAB is rapid technology deployments that are fully integrated, demonstrating the value of a cyber security solutions, not just a ‘point product’.
  9. Gartner Magic quadrant leader for CASB, but only vendor to be listed on both the CASB and Secure Web Gateway Gartner Magic Quadrant.
  10. Netskopes Key Pillars: Data Centric: Focus on providing granular visibility across organisation and staff activity. Cloud Smart: Understands the cloud environment as it was born in the cloud, tools also sit in line with the cloud application as opposed to agent based on the endpoint. Netskope aims to provide one of the network coverage through their NewEdge global coverage.
  11. 2012 - Enterprises adopting more cloud services, need to gain control of both sanctioned applications and provide visibility of shadow IT/control over unmanaged cloud use.
  12. One of the differentiators I covered on the previous slide was our unified platform. The Netskope platform was born in the cloud from inception and designed to enable organizations to make the transition to the cloud safely using cloud-native security controls. Leveraging both API and Inline controls, organizations can secure Sanctioned and Unsanctioned cloud services, Web traffic, and also private apps. All from a single console with granular policy enforcement powered by our CloudXD engine and utilizing a common set of microservices These microservices include cloud discovery and risk assessment, advanced multi-layer data protection, analytics and forensics, post authentication access control, multi-layered threat protection … with the ability to add future services to address additional security needs. And although we believe that Netskope has built the most comprehensive cloud security platform, it’s critical to integrate with other layers of your security stack. From SSO to SIEM to threat sharing, we offer a wide range of third-party integrations to help you get the most out of your other security investments. It is also worth mentioning that Netskope is building the largest and most performant security cloud network in the world. We are calling this NewEdge and our goal is to be the onramp for all enterprises accessing the internet and where our security cloud will be accessible within 15ms of 80 percent of the world’s population and within 50ms of everyone else. Our network will soon rival that of a cloud provider and will be second-to-none in the security industry. This is important for customers because it enables us to continue to add robust, real-time security services without impacting end user performance
  13. Netskope Cloud XD is the brain behind Netskope. It understands all inputs (Logs, SaaS, IaaS, Web) in extreme definition (XD) and performs big data analytics to eliminate blind spots and make policy enforcement simple across all cloud services and the web. Legacy security tools force IT into a binary decision to allow or block cloud services because they have a very limited view of cloud transactions. Netskope, on the other hand, has a much more granular view including the identity of the user, location information, device classification (managed vs. unmanaged), instance of the cloud service (personal vs. corporate), what specific activity are they doing (upload, downloads, share, create, edit, etc.) and the content of the data.  All of these inputs can be used to create granular cloud security policies. A good example is allowing uploads of sensitive data from managed devices to OneDrive for Business while blocking uploads of sensitive data to Personal OneDrive. Netskope can enforce this policy without having to block access to Personal OneDrive.
  14. Netskope’s vision is to provide the largest and most performant security network, in doing so we hired a guy called Joe De Pallo, the same guy that built out AWS network. He brought with him a team of the world’s best internet experts to build NewEdge from the ground up. Massive global footprint 75 unique locations [note: latest build out plan shows 59 locations] Over 50 Terabits/s of network egress capacity Netskope’s vision is to provide the largest and most performant security network Mitigate shortcomings of the Internet and CSPs: Detect downtime/regional outages Identify slowness (latency, packet loss, routing) Cloud Service Providers architected for cost Auto-remediate failure conditions Optimised for low latency - full control over all routing, peering and data centre locations to minimise reliance on the public internet. <15ms latency to 80% of users <50ms latency to 99% of users
  15. Netskope’s Next Gen Secure Web Gateway is a cloud-based web security solution that: Prevents malware & detects advanced threats. Filters by category, protects data, and controls app use for any user, location, device. Provides granular control (instance awareness and control at the activity level) It unifies our industry-leading CASB, SWG, and DLP into common policy controls with custom reporting and rich metadata for ad-hoc queries.
  16. “The CyberLAB is a fully customized, virtual lab environment that showcases integrated technology solutions and offers scalable technical enablement. The CyberLAB can be end customer or partner facing and has been proven to speed up the opportunity lifecycle by 75%. The key differentiation of the C The CyberLAB™ enables partners to rapidly deploy solutions and prove the value of cyber security investments. Backed by our cyber security intellectual property, market analysis and research and development, the CyberLAB™ helps showcase key industry trends, these include:   Breach and attack simulation  Cyber security mesh architecture  Security product consolidation  Identity first and machine identity management  Privacy enhancing computation  Securing distributed digital assets  CyberLAB is rapid technology deployments that are fully integrated, demonstrating the value of a cyber security solutions, not just a ‘point product’.
  17. “The CyberLAB is a fully customized, virtual lab environment that showcases integrated technology solutions and offers scalable technical enablement. The CyberLAB can be end customer or partner facing and has been proven to speed up the opportunity lifecycle by 75%. The key differentiation of the C The CyberLAB™ enables partners to rapidly deploy solutions and prove the value of cyber security investments. Backed by our cyber security intellectual property, market analysis and research and development, the CyberLAB™ helps showcase key industry trends, these include:   Breach and attack simulation  Cyber security mesh architecture  Security product consolidation  Identity first and machine identity management  Privacy enhancing computation  Securing distributed digital assets  CyberLAB is rapid technology deployments that are fully integrated, demonstrating the value of a cyber security solutions, not just a ‘point product’.
  18. “The CyberLAB is a fully customized, virtual lab environment that showcases integrated technology solutions and offers scalable technical enablement. The CyberLAB can be end customer or partner facing and has been proven to speed up the opportunity lifecycle by 75%. The key differentiation of the C The CyberLAB™ enables partners to rapidly deploy solutions and prove the value of cyber security investments. Backed by our cyber security intellectual property, market analysis and research and development, the CyberLAB™ helps showcase key industry trends, these include:   Breach and attack simulation  Cyber security mesh architecture  Security product consolidation  Identity first and machine identity management  Privacy enhancing computation  Securing distributed digital assets  CyberLAB is rapid technology deployments that are fully integrated, demonstrating the value of a cyber security solutions, not just a ‘point product’.