SlideShare a Scribd company logo
1 of 1
Download to read offline
www.validy.com
Contact: Gilles SGRO, President, +33 684 60 00 96, gilles.sgro@validy-net.com
CYBERDEFENSE IN DEPTH WITHOUT OR WITH VALIDY
« Traditional » cyberdefense in depth
Defense
line #1
Defense
line #2
Defense
line #3
Assets
to
protect
Threats
Firewall
Intrusion
Detection
System
Antivirus
Programs
under
execution
Security obtained by 3 lines of defense: a Firewall, an Intrusion Detection System (IDS) and an Antivirus
Cyberdefense in depth with VALIDY
Threats
Defense
line #1
Defense
line #2
Defense
line #3
Defense
line #4
Defense
line #5
Defense
line #6
Assets to
protect
Firewall
VALIDY’s Protection
Intrusion
Detection
System
Antivirus Operating
System
Database
engine
Protection of
the programs
Programs
under
execution
Security obtained by adding the VALIDY Technology protection to each traditional defense line, but also to the
Operating System, the Database engine and to the programs themselves.

More Related Content

What's hot

What endpoint protection solutions are available on the market today?
What endpoint protection solutions are available on the market today?What endpoint protection solutions are available on the market today?
What endpoint protection solutions are available on the market today?David Strom
 
Best Information Security Tips for Better Computing
Best Information Security Tips for Better ComputingBest Information Security Tips for Better Computing
Best Information Security Tips for Better ComputingPatten John
 
Re solution - corona virus cyber security infographic
Re solution - corona virus cyber security infographicRe solution - corona virus cyber security infographic
Re solution - corona virus cyber security infographicJacob Tranter
 
Crytek CSIRT CERT-EE Symposium 2016
Crytek CSIRT CERT-EE Symposium 2016Crytek CSIRT CERT-EE Symposium 2016
Crytek CSIRT CERT-EE Symposium 2016CrytekCSIRT
 
DC970 Presents: Defense in Depth
DC970 Presents: Defense in DepthDC970 Presents: Defense in Depth
DC970 Presents: Defense in DepthIceQUICK
 
PhD-Guidance-in-Information-Security
PhD-Guidance-in-Information-SecurityPhD-Guidance-in-Information-Security
PhD-Guidance-in-Information-SecurityPhdtopiccom
 
Evolución de la Ciber Seguridad
Evolución de la Ciber SeguridadEvolución de la Ciber Seguridad
Evolución de la Ciber SeguridadCristian Garcia G.
 
What makes the IT industry tick?
What makes the IT industry tick? What makes the IT industry tick?
What makes the IT industry tick? Richard Stiennon
 
2017 Security Report Presentation
2017 Security Report Presentation2017 Security Report Presentation
2017 Security Report Presentationixiademandgen
 
The Next Generation Security
The Next Generation SecurityThe Next Generation Security
The Next Generation SecurityCybera Inc.
 
Risq mark bullen - juniper (11-16-16)
Risq   mark bullen - juniper (11-16-16)Risq   mark bullen - juniper (11-16-16)
Risq mark bullen - juniper (11-16-16)ColloqueRISQ
 
How to Take the Ransom Out of Ransomware
How to Take the Ransom Out of RansomwareHow to Take the Ransom Out of Ransomware
How to Take the Ransom Out of Ransomwaremarketingunitrends
 
Top 10 Reasons to Learn Cybersecurity | Why Cybersecurity is Important | Edureka
Top 10 Reasons to Learn Cybersecurity | Why Cybersecurity is Important | EdurekaTop 10 Reasons to Learn Cybersecurity | Why Cybersecurity is Important | Edureka
Top 10 Reasons to Learn Cybersecurity | Why Cybersecurity is Important | EdurekaEdureka!
 
Ransomware Detection: Don’t Pay Up. Backup.
Ransomware Detection:  Don’t Pay Up. Backup.Ransomware Detection:  Don’t Pay Up. Backup.
Ransomware Detection: Don’t Pay Up. Backup.marketingunitrends
 
Network Security - Defense Through Layered Information Security
Network Security - Defense Through Layered Information SecurityNetwork Security - Defense Through Layered Information Security
Network Security - Defense Through Layered Information SecurityEryk Budi Pratama
 
Beveilig je data met windows 10
Beveilig je data met windows 10 Beveilig je data met windows 10
Beveilig je data met windows 10 Avanade Nederland
 
F5 Networks- Why Legacy Security Systems are Failing
F5 Networks- Why Legacy Security Systems are FailingF5 Networks- Why Legacy Security Systems are Failing
F5 Networks- Why Legacy Security Systems are FailingGlobal Business Events
 

What's hot (20)

What endpoint protection solutions are available on the market today?
What endpoint protection solutions are available on the market today?What endpoint protection solutions are available on the market today?
What endpoint protection solutions are available on the market today?
 
Best Information Security Tips for Better Computing
Best Information Security Tips for Better ComputingBest Information Security Tips for Better Computing
Best Information Security Tips for Better Computing
 
Re solution - corona virus cyber security infographic
Re solution - corona virus cyber security infographicRe solution - corona virus cyber security infographic
Re solution - corona virus cyber security infographic
 
Crytek CSIRT CERT-EE Symposium 2016
Crytek CSIRT CERT-EE Symposium 2016Crytek CSIRT CERT-EE Symposium 2016
Crytek CSIRT CERT-EE Symposium 2016
 
DC970 Presents: Defense in Depth
DC970 Presents: Defense in DepthDC970 Presents: Defense in Depth
DC970 Presents: Defense in Depth
 
Hacker Tricks: How You Can Protect Yourself
Hacker Tricks: How You Can Protect YourselfHacker Tricks: How You Can Protect Yourself
Hacker Tricks: How You Can Protect Yourself
 
PhD-Guidance-in-Information-Security
PhD-Guidance-in-Information-SecurityPhD-Guidance-in-Information-Security
PhD-Guidance-in-Information-Security
 
Evolución de la Ciber Seguridad
Evolución de la Ciber SeguridadEvolución de la Ciber Seguridad
Evolución de la Ciber Seguridad
 
FireEye Engineering
FireEye Engineering FireEye Engineering
FireEye Engineering
 
What makes the IT industry tick?
What makes the IT industry tick? What makes the IT industry tick?
What makes the IT industry tick?
 
2017 Security Report Presentation
2017 Security Report Presentation2017 Security Report Presentation
2017 Security Report Presentation
 
The Next Generation Security
The Next Generation SecurityThe Next Generation Security
The Next Generation Security
 
Risq mark bullen - juniper (11-16-16)
Risq   mark bullen - juniper (11-16-16)Risq   mark bullen - juniper (11-16-16)
Risq mark bullen - juniper (11-16-16)
 
How to Take the Ransom Out of Ransomware
How to Take the Ransom Out of RansomwareHow to Take the Ransom Out of Ransomware
How to Take the Ransom Out of Ransomware
 
Top 10 Reasons to Learn Cybersecurity | Why Cybersecurity is Important | Edureka
Top 10 Reasons to Learn Cybersecurity | Why Cybersecurity is Important | EdurekaTop 10 Reasons to Learn Cybersecurity | Why Cybersecurity is Important | Edureka
Top 10 Reasons to Learn Cybersecurity | Why Cybersecurity is Important | Edureka
 
Ransomware Detection: Don’t Pay Up. Backup.
Ransomware Detection:  Don’t Pay Up. Backup.Ransomware Detection:  Don’t Pay Up. Backup.
Ransomware Detection: Don’t Pay Up. Backup.
 
Network Security - Defense Through Layered Information Security
Network Security - Defense Through Layered Information SecurityNetwork Security - Defense Through Layered Information Security
Network Security - Defense Through Layered Information Security
 
Hiring for cybersecurity
Hiring for cybersecurityHiring for cybersecurity
Hiring for cybersecurity
 
Beveilig je data met windows 10
Beveilig je data met windows 10 Beveilig je data met windows 10
Beveilig je data met windows 10
 
F5 Networks- Why Legacy Security Systems are Failing
F5 Networks- Why Legacy Security Systems are FailingF5 Networks- Why Legacy Security Systems are Failing
F5 Networks- Why Legacy Security Systems are Failing
 

Similar to Cyberdefense in depth with validy technology

JS Fest 2019. Анастасия Войтова. "Defense in depth": trench warfare principle...
JS Fest 2019. Анастасия Войтова. "Defense in depth": trench warfare principle...JS Fest 2019. Анастасия Войтова. "Defense in depth": trench warfare principle...
JS Fest 2019. Анастасия Войтова. "Defense in depth": trench warfare principle...JSFestUA
 
Fidelis - Live Demonstration of Deception Solution
Fidelis - Live Demonstration of Deception SolutionFidelis - Live Demonstration of Deception Solution
Fidelis - Live Demonstration of Deception SolutionFidelis Cybersecurity
 
Cyber Security
Cyber SecurityCyber Security
Cyber SecurityRamiro Cid
 
Industry Best Practice against DDoS Attacks
Industry Best Practice against DDoS AttacksIndustry Best Practice against DDoS Attacks
Industry Best Practice against DDoS AttacksMarcelo Silva
 
Cyber Security: A Hands on review
Cyber Security: A Hands on reviewCyber Security: A Hands on review
Cyber Security: A Hands on reviewMiltonBiswas8
 
Steve Porter : cloud Computing Security
Steve Porter : cloud Computing SecuritySteve Porter : cloud Computing Security
Steve Porter : cloud Computing SecurityGurbir Singh
 
Two for Attack: Web and Email Content Protection
Two for Attack: Web and Email Content ProtectionTwo for Attack: Web and Email Content Protection
Two for Attack: Web and Email Content ProtectionCisco Canada
 
Insecurity in security products 2013
Insecurity in security products 2013Insecurity in security products 2013
Insecurity in security products 2013DaveEdwards12
 
Why current security solutions fail
Why current security solutions failWhy current security solutions fail
Why current security solutions failDaveEdwards12
 
Teknisen tietoturvan minimivaatimukset
Teknisen tietoturvan minimivaatimuksetTeknisen tietoturvan minimivaatimukset
Teknisen tietoturvan minimivaatimuksetTeemu Tiainen
 
Cisco Connected Factory - Security
Cisco Connected Factory - SecurityCisco Connected Factory - Security
Cisco Connected Factory - SecurityConnected Futures
 
Types-of-Cyber-Attacks-E-book.pdf
Types-of-Cyber-Attacks-E-book.pdfTypes-of-Cyber-Attacks-E-book.pdf
Types-of-Cyber-Attacks-E-book.pdfANUSREEASHOK5
 
Advanced Threat Protection - Sandboxing 101
Advanced Threat Protection - Sandboxing 101Advanced Threat Protection - Sandboxing 101
Advanced Threat Protection - Sandboxing 101Blue Coat
 
withsecure-elements-epp-brochure-en.pdf
withsecure-elements-epp-brochure-en.pdfwithsecure-elements-epp-brochure-en.pdf
withsecure-elements-epp-brochure-en.pdfMdZabedHossain2
 
Essentials Of Security
Essentials Of SecurityEssentials Of Security
Essentials Of Securityxsy
 
SDK Whitepaper
SDK WhitepaperSDK Whitepaper
SDK Whitepaperhanniw79
 
Wireless security report
Wireless security reportWireless security report
Wireless security reportMarynol Cahinde
 

Similar to Cyberdefense in depth with validy technology (20)

JS Fest 2019. Анастасия Войтова. "Defense in depth": trench warfare principle...
JS Fest 2019. Анастасия Войтова. "Defense in depth": trench warfare principle...JS Fest 2019. Анастасия Войтова. "Defense in depth": trench warfare principle...
JS Fest 2019. Анастасия Войтова. "Defense in depth": trench warfare principle...
 
Fidelis - Live Demonstration of Deception Solution
Fidelis - Live Demonstration of Deception SolutionFidelis - Live Demonstration of Deception Solution
Fidelis - Live Demonstration of Deception Solution
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Industry Best Practice against DDoS Attacks
Industry Best Practice against DDoS AttacksIndustry Best Practice against DDoS Attacks
Industry Best Practice against DDoS Attacks
 
Cyber Security: A Hands on review
Cyber Security: A Hands on reviewCyber Security: A Hands on review
Cyber Security: A Hands on review
 
Steve Porter : cloud Computing Security
Steve Porter : cloud Computing SecuritySteve Porter : cloud Computing Security
Steve Porter : cloud Computing Security
 
Two for Attack: Web and Email Content Protection
Two for Attack: Web and Email Content ProtectionTwo for Attack: Web and Email Content Protection
Two for Attack: Web and Email Content Protection
 
Insecurity in security products 2013
Insecurity in security products 2013Insecurity in security products 2013
Insecurity in security products 2013
 
Why current security solutions fail
Why current security solutions failWhy current security solutions fail
Why current security solutions fail
 
22 need-for-security
22  need-for-security22  need-for-security
22 need-for-security
 
Cybersecurity Concerns You Should be Thinking About
Cybersecurity Concerns You Should be Thinking AboutCybersecurity Concerns You Should be Thinking About
Cybersecurity Concerns You Should be Thinking About
 
Teknisen tietoturvan minimivaatimukset
Teknisen tietoturvan minimivaatimuksetTeknisen tietoturvan minimivaatimukset
Teknisen tietoturvan minimivaatimukset
 
infisign.pdf.pdf
infisign.pdf.pdfinfisign.pdf.pdf
infisign.pdf.pdf
 
Cisco Connected Factory - Security
Cisco Connected Factory - SecurityCisco Connected Factory - Security
Cisco Connected Factory - Security
 
Types-of-Cyber-Attacks-E-book.pdf
Types-of-Cyber-Attacks-E-book.pdfTypes-of-Cyber-Attacks-E-book.pdf
Types-of-Cyber-Attacks-E-book.pdf
 
Advanced Threat Protection - Sandboxing 101
Advanced Threat Protection - Sandboxing 101Advanced Threat Protection - Sandboxing 101
Advanced Threat Protection - Sandboxing 101
 
withsecure-elements-epp-brochure-en.pdf
withsecure-elements-epp-brochure-en.pdfwithsecure-elements-epp-brochure-en.pdf
withsecure-elements-epp-brochure-en.pdf
 
Essentials Of Security
Essentials Of SecurityEssentials Of Security
Essentials Of Security
 
SDK Whitepaper
SDK WhitepaperSDK Whitepaper
SDK Whitepaper
 
Wireless security report
Wireless security reportWireless security report
Wireless security report
 

More from Gilles Sgro

Pierre moscovici 13 nov 2013
Pierre moscovici  13 nov 2013Pierre moscovici  13 nov 2013
Pierre moscovici 13 nov 2013Gilles Sgro
 
Fleur pellerin 13 nov 2013
Fleur pellerin  13 nov 2013Fleur pellerin  13 nov 2013
Fleur pellerin 13 nov 2013Gilles Sgro
 
Patrick pailloux anssi -3 nov 2013
Patrick pailloux   anssi -3 nov 2013Patrick pailloux   anssi -3 nov 2013
Patrick pailloux anssi -3 nov 2013Gilles Sgro
 
Courrier embassade de etats unis m. defranchi
Courrier embassade de etats unis m. defranchiCourrier embassade de etats unis m. defranchi
Courrier embassade de etats unis m. defranchiGilles Sgro
 
Réponse chef de cabinet nicolas sarkosy
Réponse chef de cabinet nicolas sarkosyRéponse chef de cabinet nicolas sarkosy
Réponse chef de cabinet nicolas sarkosyGilles Sgro
 
Validy lettre-dpsd-colonel-bourguignon-27-dec-2006
Validy lettre-dpsd-colonel-bourguignon-27-dec-2006Validy lettre-dpsd-colonel-bourguignon-27-dec-2006
Validy lettre-dpsd-colonel-bourguignon-27-dec-2006Gilles Sgro
 
Validy lettre-dpsd-colonel-bourguignon-15-fev-2007
Validy lettre-dpsd-colonel-bourguignon-15-fev-2007Validy lettre-dpsd-colonel-bourguignon-15-fev-2007
Validy lettre-dpsd-colonel-bourguignon-15-fev-2007Gilles Sgro
 
Reponse claude gueant à gilles sgro 9 fev 2012
Reponse claude gueant à gilles sgro   9 fev 2012Reponse claude gueant à gilles sgro   9 fev 2012
Reponse claude gueant à gilles sgro 9 fev 2012Gilles Sgro
 
Validy 171 signataires lettre au président, aux députés, aux sénateurs et à...
Validy   171 signataires lettre au président, aux députés, aux sénateurs et à...Validy   171 signataires lettre au président, aux députés, aux sénateurs et à...
Validy 171 signataires lettre au président, aux députés, aux sénateurs et à...Gilles Sgro
 
Courrier du chef de cabinet du président de la république du 8 aout 2012
Courrier du chef de cabinet du président de la république  du 8 aout 2012Courrier du chef de cabinet du président de la république  du 8 aout 2012
Courrier du chef de cabinet du président de la république du 8 aout 2012Gilles Sgro
 
Lettre recue le 9 nov 2012 du chef de cabinet du président de la république
Lettre recue le 9 nov 2012 du chef de cabinet du président de la républiqueLettre recue le 9 nov 2012 du chef de cabinet du président de la république
Lettre recue le 9 nov 2012 du chef de cabinet du président de la républiqueGilles Sgro
 
Lettre recue fleur pellerin 14 sept 2012 - recu le 1 er octobre 2012
Lettre recue fleur pellerin   14 sept 2012 - recu le 1 er octobre 2012Lettre recue fleur pellerin   14 sept 2012 - recu le 1 er octobre 2012
Lettre recue fleur pellerin 14 sept 2012 - recu le 1 er octobre 2012Gilles Sgro
 
Secrétaire général elyséee macron - lettre - 4 octobre 2012
Secrétaire général elyséee   macron - lettre - 4 octobre 2012Secrétaire général elyséee   macron - lettre - 4 octobre 2012
Secrétaire général elyséee macron - lettre - 4 octobre 2012Gilles Sgro
 
Secrétaire général elyséee macron - note -4 octobre 2012
Secrétaire général elyséee  macron - note -4 octobre 2012Secrétaire général elyséee  macron - note -4 octobre 2012
Secrétaire général elyséee macron - note -4 octobre 2012Gilles Sgro
 
Validy lettre à dpsd 09 octobre-2006
Validy lettre à dpsd 09 octobre-2006Validy lettre à dpsd 09 octobre-2006
Validy lettre à dpsd 09 octobre-2006Gilles Sgro
 
Rapport senateur bockel surligné cyber defense - 19 juillet 2012
Rapport senateur bockel surligné  cyber defense - 19 juillet 2012Rapport senateur bockel surligné  cyber defense - 19 juillet 2012
Rapport senateur bockel surligné cyber defense - 19 juillet 2012Gilles Sgro
 
Validy ministere-defense-chef de cabinet marland
Validy ministere-defense-chef de cabinet marlandValidy ministere-defense-chef de cabinet marland
Validy ministere-defense-chef de cabinet marlandGilles Sgro
 
Patents portfolio 29 aout 2013
Patents portfolio   29 aout 2013Patents portfolio   29 aout 2013
Patents portfolio 29 aout 2013Gilles Sgro
 
Portefeuille de brevets 29 aout 2013
Portefeuille de brevets   29 aout 2013Portefeuille de brevets   29 aout 2013
Portefeuille de brevets 29 aout 2013Gilles Sgro
 
Autorité de la concurrence retrait de la plainte - bruno lasserre - 6 mars ...
Autorité de la concurrence   retrait de la plainte - bruno lasserre - 6 mars ...Autorité de la concurrence   retrait de la plainte - bruno lasserre - 6 mars ...
Autorité de la concurrence retrait de la plainte - bruno lasserre - 6 mars ...Gilles Sgro
 

More from Gilles Sgro (20)

Pierre moscovici 13 nov 2013
Pierre moscovici  13 nov 2013Pierre moscovici  13 nov 2013
Pierre moscovici 13 nov 2013
 
Fleur pellerin 13 nov 2013
Fleur pellerin  13 nov 2013Fleur pellerin  13 nov 2013
Fleur pellerin 13 nov 2013
 
Patrick pailloux anssi -3 nov 2013
Patrick pailloux   anssi -3 nov 2013Patrick pailloux   anssi -3 nov 2013
Patrick pailloux anssi -3 nov 2013
 
Courrier embassade de etats unis m. defranchi
Courrier embassade de etats unis m. defranchiCourrier embassade de etats unis m. defranchi
Courrier embassade de etats unis m. defranchi
 
Réponse chef de cabinet nicolas sarkosy
Réponse chef de cabinet nicolas sarkosyRéponse chef de cabinet nicolas sarkosy
Réponse chef de cabinet nicolas sarkosy
 
Validy lettre-dpsd-colonel-bourguignon-27-dec-2006
Validy lettre-dpsd-colonel-bourguignon-27-dec-2006Validy lettre-dpsd-colonel-bourguignon-27-dec-2006
Validy lettre-dpsd-colonel-bourguignon-27-dec-2006
 
Validy lettre-dpsd-colonel-bourguignon-15-fev-2007
Validy lettre-dpsd-colonel-bourguignon-15-fev-2007Validy lettre-dpsd-colonel-bourguignon-15-fev-2007
Validy lettre-dpsd-colonel-bourguignon-15-fev-2007
 
Reponse claude gueant à gilles sgro 9 fev 2012
Reponse claude gueant à gilles sgro   9 fev 2012Reponse claude gueant à gilles sgro   9 fev 2012
Reponse claude gueant à gilles sgro 9 fev 2012
 
Validy 171 signataires lettre au président, aux députés, aux sénateurs et à...
Validy   171 signataires lettre au président, aux députés, aux sénateurs et à...Validy   171 signataires lettre au président, aux députés, aux sénateurs et à...
Validy 171 signataires lettre au président, aux députés, aux sénateurs et à...
 
Courrier du chef de cabinet du président de la république du 8 aout 2012
Courrier du chef de cabinet du président de la république  du 8 aout 2012Courrier du chef de cabinet du président de la république  du 8 aout 2012
Courrier du chef de cabinet du président de la république du 8 aout 2012
 
Lettre recue le 9 nov 2012 du chef de cabinet du président de la république
Lettre recue le 9 nov 2012 du chef de cabinet du président de la républiqueLettre recue le 9 nov 2012 du chef de cabinet du président de la république
Lettre recue le 9 nov 2012 du chef de cabinet du président de la république
 
Lettre recue fleur pellerin 14 sept 2012 - recu le 1 er octobre 2012
Lettre recue fleur pellerin   14 sept 2012 - recu le 1 er octobre 2012Lettre recue fleur pellerin   14 sept 2012 - recu le 1 er octobre 2012
Lettre recue fleur pellerin 14 sept 2012 - recu le 1 er octobre 2012
 
Secrétaire général elyséee macron - lettre - 4 octobre 2012
Secrétaire général elyséee   macron - lettre - 4 octobre 2012Secrétaire général elyséee   macron - lettre - 4 octobre 2012
Secrétaire général elyséee macron - lettre - 4 octobre 2012
 
Secrétaire général elyséee macron - note -4 octobre 2012
Secrétaire général elyséee  macron - note -4 octobre 2012Secrétaire général elyséee  macron - note -4 octobre 2012
Secrétaire général elyséee macron - note -4 octobre 2012
 
Validy lettre à dpsd 09 octobre-2006
Validy lettre à dpsd 09 octobre-2006Validy lettre à dpsd 09 octobre-2006
Validy lettre à dpsd 09 octobre-2006
 
Rapport senateur bockel surligné cyber defense - 19 juillet 2012
Rapport senateur bockel surligné  cyber defense - 19 juillet 2012Rapport senateur bockel surligné  cyber defense - 19 juillet 2012
Rapport senateur bockel surligné cyber defense - 19 juillet 2012
 
Validy ministere-defense-chef de cabinet marland
Validy ministere-defense-chef de cabinet marlandValidy ministere-defense-chef de cabinet marland
Validy ministere-defense-chef de cabinet marland
 
Patents portfolio 29 aout 2013
Patents portfolio   29 aout 2013Patents portfolio   29 aout 2013
Patents portfolio 29 aout 2013
 
Portefeuille de brevets 29 aout 2013
Portefeuille de brevets   29 aout 2013Portefeuille de brevets   29 aout 2013
Portefeuille de brevets 29 aout 2013
 
Autorité de la concurrence retrait de la plainte - bruno lasserre - 6 mars ...
Autorité de la concurrence   retrait de la plainte - bruno lasserre - 6 mars ...Autorité de la concurrence   retrait de la plainte - bruno lasserre - 6 mars ...
Autorité de la concurrence retrait de la plainte - bruno lasserre - 6 mars ...
 

Recently uploaded

Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsPrecisely
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 

Recently uploaded (20)

Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power Systems
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 

Cyberdefense in depth with validy technology

  • 1. www.validy.com Contact: Gilles SGRO, President, +33 684 60 00 96, gilles.sgro@validy-net.com CYBERDEFENSE IN DEPTH WITHOUT OR WITH VALIDY « Traditional » cyberdefense in depth Defense line #1 Defense line #2 Defense line #3 Assets to protect Threats Firewall Intrusion Detection System Antivirus Programs under execution Security obtained by 3 lines of defense: a Firewall, an Intrusion Detection System (IDS) and an Antivirus Cyberdefense in depth with VALIDY Threats Defense line #1 Defense line #2 Defense line #3 Defense line #4 Defense line #5 Defense line #6 Assets to protect Firewall VALIDY’s Protection Intrusion Detection System Antivirus Operating System Database engine Protection of the programs Programs under execution Security obtained by adding the VALIDY Technology protection to each traditional defense line, but also to the Operating System, the Database engine and to the programs themselves.