SlideShare a Scribd company logo
1 of 23
Download to read offline
Threat Lab and Creating a Need for
Layered Security
Jon-Marc Wilkinson
WatchGuard Sales Director, UK & Ireland
Meet the Presenter
Jon-Marc Wilkinson
Sales Director – UK & Ireland
• 22 years in security sales
• 9 years with WatchGuard
• Experience across each channel tier
Background
• Why do we need Threat Research?
WatchGuard Threat Lab
• Understanding the Importance of Threat Intelligence
Firebox Feed Trends
• Analysis of top global attack trends
Why WatchGuard
• Delivering a layered approach to security
Dimension
• Create your own Threat Lab and add value
Agenda
Background
Copyright ©2019 WatchGuard Technologies, Inc. All Rights Reserved
companies that faced a
cyber security attack¹
attacks that resulted in a data
breach¹
average cost of a
cyber attack²
companies that go
out of business within 6-months
of a breach³
61%
$188K 60%
54%
¹ Ponemon 2017 State of SMB Cybersecurity Report; ² Symantec Internet Security Threat Report; ³ National Cyber Security Alliance
Copyright ©2019 WatchGuard Technologies, Inc. All Rights Reserved
WatchGuard is dedicated to
eliminating the cost and
complexity of security, making it
accessible to organizations of all
types and sizes, regardless of
budget and technical staff!
45%
of organizations reported lack
of adequate security controls
in 2017
6
65%
of organizations reported
a security incident in
2016…
65%lack cyber
security staff
57%lack budget
for security
54%lack time to
prioritize security
37%lack proper
staff training
Source: Netwrix 2017 IT Risks Report
Threat Lab
Threat Trends
H2 2018 Malware Trends
Personalized Email Phishing
• Trojan.Phishing.MH is a
sextortion campaign.
• Individually targets specific
emails from recent password
breaches.
• Claims to have installed
malware to track internet
activity and use webcam.
Phishing Attack
Why WatchGuard
A Firebox for Every Occasion
17
Best-in-Class Security Services
INTRUSION PREVENTION
SERVICE (IPS)
GATEWAY ANTIVIRUS (GAV)
APT BLOCKER
REPUTATION ENABLED DEFENSE
SERVICE (RED)
WEBBLOCKER
DATA LOSS PREVENTION
(DLP)
SPAMBLOCKER
APPLICATION CONTROL
NETWORK
DISCOVERY
FUNDAMENTAL SECURITY SERVICES
ADVANCED SECURITY SERVICES
DIMENSION
COMMAND
THREAT DETECTION &
RESPONSE
HOST RANSOMWARE
PREVENTION (HRP)
ACCESS PORTAL DNSWATCH INTELLIGENTAV
Correlation
Visibility
3 Key Takeaways
Threat Lab = Basis for each sale
THE security platform for SMB and Mid Market
Dimension to enhance partner value
Thank You

More Related Content

What's hot

Incident response
Incident responseIncident response
Incident responsebluecoatss
 
Blue Coat Infographic: Proactive Incident response
Blue Coat Infographic: Proactive Incident response Blue Coat Infographic: Proactive Incident response
Blue Coat Infographic: Proactive Incident response Meriann Muraoka
 
Effective security monitoring mp 2014
Effective security monitoring mp 2014Effective security monitoring mp 2014
Effective security monitoring mp 2014Ricardo Resnik
 
Six Degrees Aegis - What's your cybersecurity maturity score?
Six Degrees Aegis - What's your cybersecurity maturity score?Six Degrees Aegis - What's your cybersecurity maturity score?
Six Degrees Aegis - What's your cybersecurity maturity score?Six Degrees
 
Boosting Your Small Business's Cybersecurity
Boosting Your Small Business's CybersecurityBoosting Your Small Business's Cybersecurity
Boosting Your Small Business's CybersecurityW. Patric Gregory
 
Trend Micro 10 Minute Overview
Trend Micro 10 Minute OverviewTrend Micro 10 Minute Overview
Trend Micro 10 Minute OverviewJohn D. Haden
 
Embracing Threat Intelligence and Finding ROI in Your Decision
Embracing Threat Intelligence and Finding ROI in Your DecisionEmbracing Threat Intelligence and Finding ROI in Your Decision
Embracing Threat Intelligence and Finding ROI in Your DecisionCylance
 
Outpost24 webinar - Busting the myths of cloud security
Outpost24 webinar - Busting the myths of cloud security Outpost24 webinar - Busting the myths of cloud security
Outpost24 webinar - Busting the myths of cloud security Outpost24
 
MARM State of Security v2
MARM State of Security v2MARM State of Security v2
MARM State of Security v2Donald Tabone
 
ePlus Virtual Chief Information Security Officer (vCISO)
ePlus Virtual Chief Information Security Officer (vCISO)ePlus Virtual Chief Information Security Officer (vCISO)
ePlus Virtual Chief Information Security Officer (vCISO)ePlus
 
Outpost24 Webinar - Creating a sustainable application security program to dr...
Outpost24 Webinar - Creating a sustainable application security program to dr...Outpost24 Webinar - Creating a sustainable application security program to dr...
Outpost24 Webinar - Creating a sustainable application security program to dr...Outpost24
 
Keynote: Cyber Security in Banking by CyberQ at ArabNet Riyadh 2018
Keynote: Cyber Security in Banking by CyberQ at ArabNet Riyadh 2018Keynote: Cyber Security in Banking by CyberQ at ArabNet Riyadh 2018
Keynote: Cyber Security in Banking by CyberQ at ArabNet Riyadh 2018ArabNet ME
 
Security and PCI: 4 Things You Need to Know
Security and PCI: 4 Things You Need to KnowSecurity and PCI: 4 Things You Need to Know
Security and PCI: 4 Things You Need to KnowThe Internet of Things
 
Cisco Connect 2018 Malaysia - Changing the equation-cybersecurity in digital ...
Cisco Connect 2018 Malaysia - Changing the equation-cybersecurity in digital ...Cisco Connect 2018 Malaysia - Changing the equation-cybersecurity in digital ...
Cisco Connect 2018 Malaysia - Changing the equation-cybersecurity in digital ...NetworkCollaborators
 
FireHost Webinar: Protect Your Application With Intelligent Security
FireHost Webinar: Protect Your Application With Intelligent SecurityFireHost Webinar: Protect Your Application With Intelligent Security
FireHost Webinar: Protect Your Application With Intelligent SecurityArmor
 
Scalar_Security_Overview October 2015
Scalar_Security_Overview October 2015Scalar_Security_Overview October 2015
Scalar_Security_Overview October 2015patmisasi
 
Global Thought Leadership Webcast, March 23
Global Thought Leadership Webcast, March 23Global Thought Leadership Webcast, March 23
Global Thought Leadership Webcast, March 23Patrícia Alves
 

What's hot (20)

Incident response
Incident responseIncident response
Incident response
 
Blue Coat Infographic: Proactive Incident response
Blue Coat Infographic: Proactive Incident response Blue Coat Infographic: Proactive Incident response
Blue Coat Infographic: Proactive Incident response
 
Effective security monitoring mp 2014
Effective security monitoring mp 2014Effective security monitoring mp 2014
Effective security monitoring mp 2014
 
Six Degrees Aegis - What's your cybersecurity maturity score?
Six Degrees Aegis - What's your cybersecurity maturity score?Six Degrees Aegis - What's your cybersecurity maturity score?
Six Degrees Aegis - What's your cybersecurity maturity score?
 
Boosting Your Small Business's Cybersecurity
Boosting Your Small Business's CybersecurityBoosting Your Small Business's Cybersecurity
Boosting Your Small Business's Cybersecurity
 
Trend Micro 10 Minute Overview
Trend Micro 10 Minute OverviewTrend Micro 10 Minute Overview
Trend Micro 10 Minute Overview
 
Embracing Threat Intelligence and Finding ROI in Your Decision
Embracing Threat Intelligence and Finding ROI in Your DecisionEmbracing Threat Intelligence and Finding ROI in Your Decision
Embracing Threat Intelligence and Finding ROI in Your Decision
 
Outpost24 webinar - Busting the myths of cloud security
Outpost24 webinar - Busting the myths of cloud security Outpost24 webinar - Busting the myths of cloud security
Outpost24 webinar - Busting the myths of cloud security
 
MARM State of Security v2
MARM State of Security v2MARM State of Security v2
MARM State of Security v2
 
Cyber-attacks
Cyber-attacksCyber-attacks
Cyber-attacks
 
ePlus Virtual Chief Information Security Officer (vCISO)
ePlus Virtual Chief Information Security Officer (vCISO)ePlus Virtual Chief Information Security Officer (vCISO)
ePlus Virtual Chief Information Security Officer (vCISO)
 
Outpost24 Webinar - Creating a sustainable application security program to dr...
Outpost24 Webinar - Creating a sustainable application security program to dr...Outpost24 Webinar - Creating a sustainable application security program to dr...
Outpost24 Webinar - Creating a sustainable application security program to dr...
 
Keynote: Cyber Security in Banking by CyberQ at ArabNet Riyadh 2018
Keynote: Cyber Security in Banking by CyberQ at ArabNet Riyadh 2018Keynote: Cyber Security in Banking by CyberQ at ArabNet Riyadh 2018
Keynote: Cyber Security in Banking by CyberQ at ArabNet Riyadh 2018
 
Security and PCI: 4 Things You Need to Know
Security and PCI: 4 Things You Need to KnowSecurity and PCI: 4 Things You Need to Know
Security and PCI: 4 Things You Need to Know
 
Cisco Connect 2018 Malaysia - Changing the equation-cybersecurity in digital ...
Cisco Connect 2018 Malaysia - Changing the equation-cybersecurity in digital ...Cisco Connect 2018 Malaysia - Changing the equation-cybersecurity in digital ...
Cisco Connect 2018 Malaysia - Changing the equation-cybersecurity in digital ...
 
FireHost Webinar: Protect Your Application With Intelligent Security
FireHost Webinar: Protect Your Application With Intelligent SecurityFireHost Webinar: Protect Your Application With Intelligent Security
FireHost Webinar: Protect Your Application With Intelligent Security
 
SECURITY
SECURITYSECURITY
SECURITY
 
Scalar_Security_Overview October 2015
Scalar_Security_Overview October 2015Scalar_Security_Overview October 2015
Scalar_Security_Overview October 2015
 
Check Point SMB Proposition
Check Point SMB PropositionCheck Point SMB Proposition
Check Point SMB Proposition
 
Global Thought Leadership Webcast, March 23
Global Thought Leadership Webcast, March 23Global Thought Leadership Webcast, March 23
Global Thought Leadership Webcast, March 23
 

Similar to Threat Lab and Creating a Need for Layered Security

WatchGuard Corporate Presentation.pptx
WatchGuard  Corporate Presentation.pptxWatchGuard  Corporate Presentation.pptx
WatchGuard Corporate Presentation.pptxRachatrinTongrungroj1
 
2018 State of Cyber Resilience Report - Ireland
2018 State of Cyber Resilience Report - Ireland2018 State of Cyber Resilience Report - Ireland
2018 State of Cyber Resilience Report - IrelandAccenture Security
 
Accenture Security CG&S Cyber Resilience
Accenture Security CG&S Cyber ResilienceAccenture Security CG&S Cyber Resilience
Accenture Security CG&S Cyber Resilienceaccenture
 
Accenture Security CG&S Cyber Resilience
Accenture Security CG&S Cyber ResilienceAccenture Security CG&S Cyber Resilience
Accenture Security CG&S Cyber Resilienceaccenture
 
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...International Federation of Accountants
 
MMV Webinar 3. Cybersecurity Perspectives. March 2018
MMV Webinar 3. Cybersecurity Perspectives. March 2018MMV Webinar 3. Cybersecurity Perspectives. March 2018
MMV Webinar 3. Cybersecurity Perspectives. March 2018Match-Maker Ventures
 
2018 State of Cyber Resilience Insurance
2018 State of Cyber Resilience Insurance2018 State of Cyber Resilience Insurance
2018 State of Cyber Resilience InsuranceAccenture Insurance
 
Securing Consumer Trust
Securing Consumer TrustSecuring Consumer Trust
Securing Consumer Trustaccenture
 
Is cyber security now too hard for enterprises?
Is cyber security now too hard for enterprises? Is cyber security now too hard for enterprises?
Is cyber security now too hard for enterprises? Pierre Audoin Consultants
 
US Electronic Security Market Outlook 2020
US Electronic Security Market Outlook 2020US Electronic Security Market Outlook 2020
US Electronic Security Market Outlook 2020Neil Dave
 
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)Sarah Jarvis
 
symc_annual2001
symc_annual2001symc_annual2001
symc_annual2001finance40
 
Tomorrow Starts Here - Security Everywhere
Tomorrow Starts Here - Security Everywhere Tomorrow Starts Here - Security Everywhere
Tomorrow Starts Here - Security Everywhere Cisco Canada
 
InfoSec: Evolve Thyself to Keep Pace in the Age of DevOps
InfoSec: Evolve Thyself to Keep Pace in the Age of DevOpsInfoSec: Evolve Thyself to Keep Pace in the Age of DevOps
InfoSec: Evolve Thyself to Keep Pace in the Age of DevOpsVMware Tanzu
 
WatchGuard: Protecting Endpoints with Threat Detection Response (TDR)
WatchGuard: Protecting Endpoints with Threat Detection Response (TDR)WatchGuard: Protecting Endpoints with Threat Detection Response (TDR)
WatchGuard: Protecting Endpoints with Threat Detection Response (TDR)Carla Nadin
 
Accounting for Cyber Risks - How much does Cyber actually cost the Industry?
Accounting for Cyber Risks - How much does Cyber actually cost the Industry?Accounting for Cyber Risks - How much does Cyber actually cost the Industry?
Accounting for Cyber Risks - How much does Cyber actually cost the Industry?Jef Lacson
 
Cybersecurity - Unlock Your Buyers
Cybersecurity - Unlock Your Buyers Cybersecurity - Unlock Your Buyers
Cybersecurity - Unlock Your Buyers Jasper Colin
 
Webinar-MSP+ Cyber Insurance Fina.pptx
Webinar-MSP+  Cyber Insurance Fina.pptxWebinar-MSP+  Cyber Insurance Fina.pptx
Webinar-MSP+ Cyber Insurance Fina.pptxControlCase
 

Similar to Threat Lab and Creating a Need for Layered Security (20)

WatchGuard Corporate Presentation.pptx
WatchGuard  Corporate Presentation.pptxWatchGuard  Corporate Presentation.pptx
WatchGuard Corporate Presentation.pptx
 
2018 State of Cyber Resilience Report - Ireland
2018 State of Cyber Resilience Report - Ireland2018 State of Cyber Resilience Report - Ireland
2018 State of Cyber Resilience Report - Ireland
 
Accenture Security CG&S Cyber Resilience
Accenture Security CG&S Cyber ResilienceAccenture Security CG&S Cyber Resilience
Accenture Security CG&S Cyber Resilience
 
Accenture Security CG&S Cyber Resilience
Accenture Security CG&S Cyber ResilienceAccenture Security CG&S Cyber Resilience
Accenture Security CG&S Cyber Resilience
 
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
 
MMV Webinar 3. Cybersecurity Perspectives. March 2018
MMV Webinar 3. Cybersecurity Perspectives. March 2018MMV Webinar 3. Cybersecurity Perspectives. March 2018
MMV Webinar 3. Cybersecurity Perspectives. March 2018
 
2018 State of Cyber Resilience Insurance
2018 State of Cyber Resilience Insurance2018 State of Cyber Resilience Insurance
2018 State of Cyber Resilience Insurance
 
Securing Consumer Trust
Securing Consumer TrustSecuring Consumer Trust
Securing Consumer Trust
 
16231
1623116231
16231
 
Is cyber security now too hard for enterprises?
Is cyber security now too hard for enterprises? Is cyber security now too hard for enterprises?
Is cyber security now too hard for enterprises?
 
US Electronic Security Market Outlook 2020
US Electronic Security Market Outlook 2020US Electronic Security Market Outlook 2020
US Electronic Security Market Outlook 2020
 
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)
 
symc_annual2001
symc_annual2001symc_annual2001
symc_annual2001
 
Tomorrow Starts Here - Security Everywhere
Tomorrow Starts Here - Security Everywhere Tomorrow Starts Here - Security Everywhere
Tomorrow Starts Here - Security Everywhere
 
9 September 2014: Cyber Security Model
9 September 2014: Cyber Security Model 9 September 2014: Cyber Security Model
9 September 2014: Cyber Security Model
 
InfoSec: Evolve Thyself to Keep Pace in the Age of DevOps
InfoSec: Evolve Thyself to Keep Pace in the Age of DevOpsInfoSec: Evolve Thyself to Keep Pace in the Age of DevOps
InfoSec: Evolve Thyself to Keep Pace in the Age of DevOps
 
WatchGuard: Protecting Endpoints with Threat Detection Response (TDR)
WatchGuard: Protecting Endpoints with Threat Detection Response (TDR)WatchGuard: Protecting Endpoints with Threat Detection Response (TDR)
WatchGuard: Protecting Endpoints with Threat Detection Response (TDR)
 
Accounting for Cyber Risks - How much does Cyber actually cost the Industry?
Accounting for Cyber Risks - How much does Cyber actually cost the Industry?Accounting for Cyber Risks - How much does Cyber actually cost the Industry?
Accounting for Cyber Risks - How much does Cyber actually cost the Industry?
 
Cybersecurity - Unlock Your Buyers
Cybersecurity - Unlock Your Buyers Cybersecurity - Unlock Your Buyers
Cybersecurity - Unlock Your Buyers
 
Webinar-MSP+ Cyber Insurance Fina.pptx
Webinar-MSP+  Cyber Insurance Fina.pptxWebinar-MSP+  Cyber Insurance Fina.pptx
Webinar-MSP+ Cyber Insurance Fina.pptx
 

More from Purdicom

CommScope RUCKUS Technical Family Day Education & MDF Q12021
CommScope RUCKUS Technical Family Day Education & MDF Q12021CommScope RUCKUS Technical Family Day Education & MDF Q12021
CommScope RUCKUS Technical Family Day Education & MDF Q12021Purdicom
 
RUCKUS Technical Family Day: Migrating to RUCKUS Cloud
RUCKUS Technical Family Day: Migrating to RUCKUS CloudRUCKUS Technical Family Day: Migrating to RUCKUS Cloud
RUCKUS Technical Family Day: Migrating to RUCKUS CloudPurdicom
 
How to maximise your profit as an MSP using Cambium Networks
How to maximise your profit as an MSP using Cambium NetworksHow to maximise your profit as an MSP using Cambium Networks
How to maximise your profit as an MSP using Cambium NetworksPurdicom
 
WatchGuard Integrates with CommScope RUCKUS: Full Solutions for 2021
 WatchGuard Integrates with CommScope RUCKUS: Full Solutions for 2021 WatchGuard Integrates with CommScope RUCKUS: Full Solutions for 2021
WatchGuard Integrates with CommScope RUCKUS: Full Solutions for 2021Purdicom
 
CommScope RUCKUS Technical Family
CommScope RUCKUS Technical FamilyCommScope RUCKUS Technical Family
CommScope RUCKUS Technical FamilyPurdicom
 
Cambium Networks - Intro into cnPilot and cnMaestro
Cambium Networks - Intro into cnPilot and cnMaestro Cambium Networks - Intro into cnPilot and cnMaestro
Cambium Networks - Intro into cnPilot and cnMaestro Purdicom
 
Our Cambium Events 2019
Our Cambium Events 2019Our Cambium Events 2019
Our Cambium Events 2019Purdicom
 
Claus Hetting - Future of Next Generation WiFi
Claus Hetting - Future of Next Generation WiFiClaus Hetting - Future of Next Generation WiFi
Claus Hetting - Future of Next Generation WiFiPurdicom
 
Gigabit to the Home - Fixed Wireless Access in mmWave
Gigabit to the Home - Fixed Wireless Access in mmWaveGigabit to the Home - Fixed Wireless Access in mmWave
Gigabit to the Home - Fixed Wireless Access in mmWavePurdicom
 
The Ruckus Edge: Networking Solutions
The Ruckus Edge: Networking SolutionsThe Ruckus Edge: Networking Solutions
The Ruckus Edge: Networking SolutionsPurdicom
 
Introduction to Mobility
Introduction to MobilityIntroduction to Mobility
Introduction to MobilityPurdicom
 
Enterprise Networking Key Strategic Verticals for WiFi Success
Enterprise Networking Key Strategic Verticals for WiFi SuccessEnterprise Networking Key Strategic Verticals for WiFi Success
Enterprise Networking Key Strategic Verticals for WiFi SuccessPurdicom
 
RG Nets rXg Webinar
RG Nets rXg WebinarRG Nets rXg Webinar
RG Nets rXg WebinarPurdicom
 
Cambium Networks - cnPilot and cnMaestro
Cambium Networks - cnPilot and cnMaestroCambium Networks - cnPilot and cnMaestro
Cambium Networks - cnPilot and cnMaestroPurdicom
 
Purdicom Roadshow Ubiquiti/Cambium Networks/Encapto
Purdicom Roadshow Ubiquiti/Cambium Networks/EncaptoPurdicom Roadshow Ubiquiti/Cambium Networks/Encapto
Purdicom Roadshow Ubiquiti/Cambium Networks/EncaptoPurdicom
 
Case Study: Matthew Arnold School enhances network security with iboss
Case Study: Matthew Arnold School enhances network security with ibossCase Study: Matthew Arnold School enhances network security with iboss
Case Study: Matthew Arnold School enhances network security with ibossPurdicom
 
CASE STUDY: Sweyne Park School Upgrades to iBoss Next Generation Security
CASE STUDY: Sweyne Park School Upgrades to iBoss Next Generation SecurityCASE STUDY: Sweyne Park School Upgrades to iBoss Next Generation Security
CASE STUDY: Sweyne Park School Upgrades to iBoss Next Generation SecurityPurdicom
 
CASE STUDY: Curve IT and Purdicom are excited to announce the first, of many,...
CASE STUDY: Curve IT and Purdicom are excited to announce the first, of many,...CASE STUDY: Curve IT and Purdicom are excited to announce the first, of many,...
CASE STUDY: Curve IT and Purdicom are excited to announce the first, of many,...Purdicom
 
CASE STUDY: Hull City public Wifi Utilise RG Nets, Ruckus & Brocade to suppor...
CASE STUDY: Hull City public Wifi Utilise RG Nets, Ruckus & Brocade to suppor...CASE STUDY: Hull City public Wifi Utilise RG Nets, Ruckus & Brocade to suppor...
CASE STUDY: Hull City public Wifi Utilise RG Nets, Ruckus & Brocade to suppor...Purdicom
 
Purdicom Radio Frequency Guide
Purdicom Radio Frequency GuidePurdicom Radio Frequency Guide
Purdicom Radio Frequency GuidePurdicom
 

More from Purdicom (20)

CommScope RUCKUS Technical Family Day Education & MDF Q12021
CommScope RUCKUS Technical Family Day Education & MDF Q12021CommScope RUCKUS Technical Family Day Education & MDF Q12021
CommScope RUCKUS Technical Family Day Education & MDF Q12021
 
RUCKUS Technical Family Day: Migrating to RUCKUS Cloud
RUCKUS Technical Family Day: Migrating to RUCKUS CloudRUCKUS Technical Family Day: Migrating to RUCKUS Cloud
RUCKUS Technical Family Day: Migrating to RUCKUS Cloud
 
How to maximise your profit as an MSP using Cambium Networks
How to maximise your profit as an MSP using Cambium NetworksHow to maximise your profit as an MSP using Cambium Networks
How to maximise your profit as an MSP using Cambium Networks
 
WatchGuard Integrates with CommScope RUCKUS: Full Solutions for 2021
 WatchGuard Integrates with CommScope RUCKUS: Full Solutions for 2021 WatchGuard Integrates with CommScope RUCKUS: Full Solutions for 2021
WatchGuard Integrates with CommScope RUCKUS: Full Solutions for 2021
 
CommScope RUCKUS Technical Family
CommScope RUCKUS Technical FamilyCommScope RUCKUS Technical Family
CommScope RUCKUS Technical Family
 
Cambium Networks - Intro into cnPilot and cnMaestro
Cambium Networks - Intro into cnPilot and cnMaestro Cambium Networks - Intro into cnPilot and cnMaestro
Cambium Networks - Intro into cnPilot and cnMaestro
 
Our Cambium Events 2019
Our Cambium Events 2019Our Cambium Events 2019
Our Cambium Events 2019
 
Claus Hetting - Future of Next Generation WiFi
Claus Hetting - Future of Next Generation WiFiClaus Hetting - Future of Next Generation WiFi
Claus Hetting - Future of Next Generation WiFi
 
Gigabit to the Home - Fixed Wireless Access in mmWave
Gigabit to the Home - Fixed Wireless Access in mmWaveGigabit to the Home - Fixed Wireless Access in mmWave
Gigabit to the Home - Fixed Wireless Access in mmWave
 
The Ruckus Edge: Networking Solutions
The Ruckus Edge: Networking SolutionsThe Ruckus Edge: Networking Solutions
The Ruckus Edge: Networking Solutions
 
Introduction to Mobility
Introduction to MobilityIntroduction to Mobility
Introduction to Mobility
 
Enterprise Networking Key Strategic Verticals for WiFi Success
Enterprise Networking Key Strategic Verticals for WiFi SuccessEnterprise Networking Key Strategic Verticals for WiFi Success
Enterprise Networking Key Strategic Verticals for WiFi Success
 
RG Nets rXg Webinar
RG Nets rXg WebinarRG Nets rXg Webinar
RG Nets rXg Webinar
 
Cambium Networks - cnPilot and cnMaestro
Cambium Networks - cnPilot and cnMaestroCambium Networks - cnPilot and cnMaestro
Cambium Networks - cnPilot and cnMaestro
 
Purdicom Roadshow Ubiquiti/Cambium Networks/Encapto
Purdicom Roadshow Ubiquiti/Cambium Networks/EncaptoPurdicom Roadshow Ubiquiti/Cambium Networks/Encapto
Purdicom Roadshow Ubiquiti/Cambium Networks/Encapto
 
Case Study: Matthew Arnold School enhances network security with iboss
Case Study: Matthew Arnold School enhances network security with ibossCase Study: Matthew Arnold School enhances network security with iboss
Case Study: Matthew Arnold School enhances network security with iboss
 
CASE STUDY: Sweyne Park School Upgrades to iBoss Next Generation Security
CASE STUDY: Sweyne Park School Upgrades to iBoss Next Generation SecurityCASE STUDY: Sweyne Park School Upgrades to iBoss Next Generation Security
CASE STUDY: Sweyne Park School Upgrades to iBoss Next Generation Security
 
CASE STUDY: Curve IT and Purdicom are excited to announce the first, of many,...
CASE STUDY: Curve IT and Purdicom are excited to announce the first, of many,...CASE STUDY: Curve IT and Purdicom are excited to announce the first, of many,...
CASE STUDY: Curve IT and Purdicom are excited to announce the first, of many,...
 
CASE STUDY: Hull City public Wifi Utilise RG Nets, Ruckus & Brocade to suppor...
CASE STUDY: Hull City public Wifi Utilise RG Nets, Ruckus & Brocade to suppor...CASE STUDY: Hull City public Wifi Utilise RG Nets, Ruckus & Brocade to suppor...
CASE STUDY: Hull City public Wifi Utilise RG Nets, Ruckus & Brocade to suppor...
 
Purdicom Radio Frequency Guide
Purdicom Radio Frequency GuidePurdicom Radio Frequency Guide
Purdicom Radio Frequency Guide
 

Recently uploaded

Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 

Recently uploaded (20)

Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 

Threat Lab and Creating a Need for Layered Security

  • 1. Threat Lab and Creating a Need for Layered Security Jon-Marc Wilkinson WatchGuard Sales Director, UK & Ireland
  • 2. Meet the Presenter Jon-Marc Wilkinson Sales Director – UK & Ireland • 22 years in security sales • 9 years with WatchGuard • Experience across each channel tier
  • 3. Background • Why do we need Threat Research? WatchGuard Threat Lab • Understanding the Importance of Threat Intelligence Firebox Feed Trends • Analysis of top global attack trends Why WatchGuard • Delivering a layered approach to security Dimension • Create your own Threat Lab and add value Agenda
  • 5. Copyright ©2019 WatchGuard Technologies, Inc. All Rights Reserved companies that faced a cyber security attack¹ attacks that resulted in a data breach¹ average cost of a cyber attack² companies that go out of business within 6-months of a breach³ 61% $188K 60% 54% ¹ Ponemon 2017 State of SMB Cybersecurity Report; ² Symantec Internet Security Threat Report; ³ National Cyber Security Alliance
  • 6. Copyright ©2019 WatchGuard Technologies, Inc. All Rights Reserved WatchGuard is dedicated to eliminating the cost and complexity of security, making it accessible to organizations of all types and sizes, regardless of budget and technical staff! 45% of organizations reported lack of adequate security controls in 2017 6 65% of organizations reported a security incident in 2016… 65%lack cyber security staff 57%lack budget for security 54%lack time to prioritize security 37%lack proper staff training Source: Netwrix 2017 IT Risks Report
  • 8.
  • 10. H2 2018 Malware Trends
  • 11.
  • 12.
  • 13.
  • 14. Personalized Email Phishing • Trojan.Phishing.MH is a sextortion campaign. • Individually targets specific emails from recent password breaches. • Claims to have installed malware to track internet activity and use webcam.
  • 17. A Firebox for Every Occasion 17
  • 18. Best-in-Class Security Services INTRUSION PREVENTION SERVICE (IPS) GATEWAY ANTIVIRUS (GAV) APT BLOCKER REPUTATION ENABLED DEFENSE SERVICE (RED) WEBBLOCKER DATA LOSS PREVENTION (DLP) SPAMBLOCKER APPLICATION CONTROL NETWORK DISCOVERY FUNDAMENTAL SECURITY SERVICES ADVANCED SECURITY SERVICES DIMENSION COMMAND THREAT DETECTION & RESPONSE HOST RANSOMWARE PREVENTION (HRP) ACCESS PORTAL DNSWATCH INTELLIGENTAV
  • 21.
  • 22. 3 Key Takeaways Threat Lab = Basis for each sale THE security platform for SMB and Mid Market Dimension to enhance partner value