SlideShare a Scribd company logo
1 of 16
Human-Centric Security For The
Era Of Digital Transformation
© 2019 Forcepoint | 2
Forcepoint was purpose-built to enable the
next generation of cybersecurity
• Created by Raytheon in 2016 to commercialize
defense-grade technologies for large enterprises.
• One of the largest private cybersecurity companies in
the world – more than 13,000 customers, operations
in more than 150 countries, 2,700 employees across
50 offices, and 27 data centers worldwide.
• Leading partner to the global intelligence community
and for high assurance cyber missions.
• One of the most comprehensive and integrated
security product portfolios in the industry.
Forcepoint Proprietary
© 2019 Forcepoint | 3
$1 Trillion Has Been Spent Over The Past
7 Years On Cybersecurity, With A 95%
Success Rate…For The Attackers
46% say they can’t prevent attackers
from breaking into internal networks
each time it is attempted.
100% of CIOs believe a breach will
occur through a successful phishing
attack in next 12 months.
Enterprises have seen a 26% increase
in security incidents despite
increasing budgets by 9% YoY.
Forcepoint Proprietary
Source: CyberArk Global Advanced Threat Landscape Report 2018 Sources: Verizon 2018 Data Breach Investigations Report.
© 2019 Forcepoint | 4
Digital Transformation Will Unlock Tremendous Value…
If Cybersecurity Challenges Can Be Addressed
Security 31%
Technology strategy 24%
Company culture 23%
Lack of technology skills 20%
“What are the greatest challenges in
digital transformation?”
The value that the World Economic
Forum estimates will be created from
digitalization over the next 10 years.
$100 trillion
Source: Digital Transformation Initiative, World Economic Forum, May 2018. Source: Forrester: The Sorry State Of Digital Transformation in 2018.
Forcepoint Proprietary
© 2019 Forcepoint | 5
Four Elements Of Digital Transformation That Create
Advantage And Risk
A critical need is created to
ensure trusted interactions across
the extended enterprise.
Network transformation to
support cloud-centric IT breaks
existing security architectures.
Personnel and IoT devices are
security vulnerabilities.
More critical data is being created
than properly protected.
Data should flow freely across the
business.
Cloud IT creates security blind
spots and fragmented security
management and accountability.
“Your IT infrastructure is going
to the cloud, driven by
business need and speed.”
“Data is the new oil and
artificial intelligence the new
engine of the digital economy.”
“Workforce, devices, and
business processes are
globally hyperconnected.”
“Employees and partners
collaborate using all of a
company’s assets.”
Forcepoint Proprietary
© 2019 Forcepoint | 6
Users And Data Must Be At The Center Of Your Design Thinking
User and data interactions are distributed, diverse and dynamic – this breaks traditional security architectures and increases business risk
Degree
of
Digital
Transformation
IT
Complexity
&
Risk
Pre-2000 2020
Infrastructure-centric 2010 Behavioral-centric
N
S
perimeter
Network-Centric
E
W
N
S
Virtual & App-Centric
Forcepoint Proprietary
User & Data Centric
© 2019 Forcepoint | 7
Users And Data Must Be At The Center Of Your Design Thinking
User and data interactions are distributed, diverse and dynamic – this breaks traditional security architectures and increases business risk
Forcepoint Proprietary
User & Data Centric
Traditional Security
One-to-many enforcement of static, generic
policies, producing high false positive rates.
Policy
© 2019 Forcepoint | 8
Human-Centric Cybersecurity Changes Everything
Forcepoint Proprietary
Traditional Security
One-to-many enforcement of static, generic
policies, producing high false positive rates.
Policy
One-to-one enforcement of different policies
based on the risk, enabling automation.
Human-Centric Security
© 2019 Forcepoint | 9
Forcepoint Proprietary
What is the best way to reduce
risk and secure an environment
you increasingly don’t own or
fully manage?
Humans
and
Data
© 2019 Forcepoint | 10
Where Are You In Your Digital Transformation Journey?
*from Gartner’s 2019 CIO Agenda: Secure the New Foundation for Digital Business
Example IT
Initiatives
Just Getting
Started
(25%)
Well
Underway
(42%)
Ahead of Peer
Group
(20%)
Industry
Leading
(13%)
Salesforce.com
Cloud Email
Private Cloud
Box.com
Zero Trust
CARTA
Human-Centric
Threat Protection
NGFW
Secure Web Gateway
Digital Transformation Stage*
Example Security
Technologies
UEBA
AI / ML
SOAR
Security Maturity
Analytics-Centric
Information-Centric Behavior-Centric
Infrastructure-Centric
DLP
CASB
Email
Office 365
SAP Concur
Private Cloud + AWS
Zoom / Slack
Workday
Cloud ERP
SD-WAN/Direct-to-Cloud
AWS + Azure
Public-Cloud First
SaaS-First
Full BYOD Support
Forcepoint Proprietary
© 2019 Forcepoint | 11
Key Security Categories In The Era Of Digital Transformation
Workforce and Supply
Chain Protection
Secure Cloud Adoption and
Network User Protection
Critical Data and Intellectual
Property Protection
Domain Security
Architect
Network Security
Architect
VP / Director,
Security
Data Security
Administrator
Insider Threat
Program Manager Corporate Security
Infrastructure
& Operations
Network Engineer
Compliance Officer
Security Ops &
Compliance VP / Director, Security Risk Officer
Forcepoint Proprietary
© 2019 Forcepoint | 12
Forcepoint Supports Key Security Initiatives
• Stop data loss from insiders and
compromised users
• Prevent sabotage and financial loss
• Protecting your supply chain
• Secure the adoption of SaaS & cloud
• Enable direct-to-cloud connectivity and
security for remote offices
• Protect off-network users
• Modernize your hybrid IT network
• Deploy a cloud converged security model
from the cloud
• Next-gen your data protection
• Protect data in the cloud
• Discover data in a hybrid environment
• Confidently verify regulatory compliance
(e.g., GDPR and HIPAA)
Security Initiatives Security Initiatives Security Initiatives
Workforce and Supply
Chain Protection
Secure Cloud Adoption and
Network User Protection
Critical Data and Intellectual
Property Protection
Forcepoint Proprietary
© 2019 Forcepoint | 13
Forcepoint Offers A Broad Continuum Of Capabilities
• Stop data loss from insiders and
compromised users
• Prevent sabotage and financial loss
• Protecting your supply chain
• Secure the adoption of SaaS & cloud
• Enable direct-to-cloud connectivity and
security for remote offices
• Protect off-network users
• Modernize your hybrid IT network
• Deploy a cloud converged security model
from the cloud
• Next-gen your data protection
• Protect data in the cloud
• Discover data in a hybrid environment
• Confidently verify regulatory compliance
(e.g., GDPR and HIPAA)
Converged Security Capabilities
Security Initiatives Security Initiatives Security Initiatives
Workforce and Supply
Chain Protection
Secure Cloud Adoption and
Network User Protection
Critical Data and Intellectual
Property Protection
Forcepoint Proprietary
© 2019 Forcepoint | 14
Forcepoint Converged Security Platform
Designed to manage and mitigate risk
Cloud first, hybrid-ready flexibility
Complete coverage across
endpoints, clouds and networks
Integrated capabilities that reduce
security gaps and maintenance
Integration with 3rd party tools
Support for the broadest set of
behavioral use cases
Automated policy enforcement and
case management
Key Business Benefits
Secure Critical data and
Intellectual Property Protection
Ensure Workforce and
Supply Chain Protection
Secure Cloud Access and
Network User Protection
Forcepoint and 3rd Party
Ecosystem Integrations
Forcepoint Converged Security Platform
Behavior Intelligence
and Analytics
Risk-Adaptive Policies
and Workflow
Composable
Security Services
Next Generation Firewall ● IPS ● SD-WAN ● Web Security ● Email Security ● AMD ● Cloud Access
and User Behavior Security ● Data Security ● Deep Behavior Inspection
Data Discovery, Classification, & Loss Prevention ● Insider Threat ● Analytics ● Endpoint DVR
Unified Policy ● Cloud-based Management ● Real-time Investigation
Adaptive Trust Profile ● Dynamic Risk Scoring
Behavior and Threat Intelligence Feeds
Forcepoint and 3rd Party Observation & Enforcement Points
IDAM ● Cloud Application Integrations ● Orchestration & Automation
Forcepoint Proprietary
© 2019 Forcepoint | 15
The Forcepoint Difference
Risk-adaptive protection powered by behavioral
intelligence research delivers automation.
Compelling TCO through a breadth of
converged capabilities.
We are the experts in human-centric security.
We are 100% committed to our customers’
success.
Forcepoint Proprietary
© 2019 Forcepoint | 16
Next Steps On Your Path To
Human-Centric Cybersecurity
Participate in a briefing at our
Boston Cyber Experience Center
Engage in a workshop with our
executive security strategists
Conduct a demonstration with your
technical team
I am your
greatest
asset.
I am your
greatest
risk.
© 2019 Forcepoint | 16
Forcepoint Proprietary

More Related Content

What's hot

Microsoft 365 Enterprise Security with E5 Overview
Microsoft 365 Enterprise Security with E5 OverviewMicrosoft 365 Enterprise Security with E5 Overview
Microsoft 365 Enterprise Security with E5 OverviewDavid J Rosenthal
 
(SACON) Jim Hietala - Zero Trust Architecture: From Hype to Reality
(SACON) Jim Hietala - Zero Trust Architecture: From Hype to Reality(SACON) Jim Hietala - Zero Trust Architecture: From Hype to Reality
(SACON) Jim Hietala - Zero Trust Architecture: From Hype to RealityPriyanka Aash
 
The Zero Trust Model of Information Security
The Zero Trust Model of Information Security The Zero Trust Model of Information Security
The Zero Trust Model of Information Security Tripwire
 
Azure Security Overview
Azure Security OverviewAzure Security Overview
Azure Security OverviewAllen Brokken
 
Introduction - Trend Micro Deep Security
Introduction - Trend Micro Deep SecurityIntroduction - Trend Micro Deep Security
Introduction - Trend Micro Deep SecurityAndrew Wong
 
Succeeding with Secure Access Service Edge (SASE)
Succeeding with Secure Access Service Edge (SASE)Succeeding with Secure Access Service Edge (SASE)
Succeeding with Secure Access Service Edge (SASE)Cloudflare
 
Presentation on Cyber Security
Presentation on Cyber SecurityPresentation on Cyber Security
Presentation on Cyber SecurityBalwantBesra
 
Why Everyone Needs a Cloud-First Security Program - SASEfaction Guaranteed!
Why Everyone Needs a Cloud-First  Security Program - SASEfaction Guaranteed!Why Everyone Needs a Cloud-First  Security Program - SASEfaction Guaranteed!
Why Everyone Needs a Cloud-First Security Program - SASEfaction Guaranteed!Netskope
 
Realizing the Full Potential of Cloud-Native Application Security
Realizing the Full Potential of Cloud-Native Application SecurityRealizing the Full Potential of Cloud-Native Application Security
Realizing the Full Potential of Cloud-Native Application SecurityOry Segal
 
Cloud Security: A New Perspective
Cloud Security: A New PerspectiveCloud Security: A New Perspective
Cloud Security: A New PerspectiveWen-Pai Lu
 
What is Zero Trust
What is Zero TrustWhat is Zero Trust
What is Zero TrustOkta-Inc
 
4_Session 1- Universal ZTNA.pptx
4_Session 1- Universal ZTNA.pptx4_Session 1- Universal ZTNA.pptx
4_Session 1- Universal ZTNA.pptxaungyekhant1
 
Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023PECB
 

What's hot (20)

Microsoft 365 Enterprise Security with E5 Overview
Microsoft 365 Enterprise Security with E5 OverviewMicrosoft 365 Enterprise Security with E5 Overview
Microsoft 365 Enterprise Security with E5 Overview
 
Zero Trust
Zero TrustZero Trust
Zero Trust
 
(SACON) Jim Hietala - Zero Trust Architecture: From Hype to Reality
(SACON) Jim Hietala - Zero Trust Architecture: From Hype to Reality(SACON) Jim Hietala - Zero Trust Architecture: From Hype to Reality
(SACON) Jim Hietala - Zero Trust Architecture: From Hype to Reality
 
The Zero Trust Model of Information Security
The Zero Trust Model of Information Security The Zero Trust Model of Information Security
The Zero Trust Model of Information Security
 
CLOUD NATIVE SECURITY
CLOUD NATIVE SECURITYCLOUD NATIVE SECURITY
CLOUD NATIVE SECURITY
 
Azure Security Overview
Azure Security OverviewAzure Security Overview
Azure Security Overview
 
Introduction - Trend Micro Deep Security
Introduction - Trend Micro Deep SecurityIntroduction - Trend Micro Deep Security
Introduction - Trend Micro Deep Security
 
Zero trust deck 2020
Zero trust deck 2020Zero trust deck 2020
Zero trust deck 2020
 
Succeeding with Secure Access Service Edge (SASE)
Succeeding with Secure Access Service Edge (SASE)Succeeding with Secure Access Service Edge (SASE)
Succeeding with Secure Access Service Edge (SASE)
 
Presentation on Cyber Security
Presentation on Cyber SecurityPresentation on Cyber Security
Presentation on Cyber Security
 
Why Everyone Needs a Cloud-First Security Program - SASEfaction Guaranteed!
Why Everyone Needs a Cloud-First  Security Program - SASEfaction Guaranteed!Why Everyone Needs a Cloud-First  Security Program - SASEfaction Guaranteed!
Why Everyone Needs a Cloud-First Security Program - SASEfaction Guaranteed!
 
Realizing the Full Potential of Cloud-Native Application Security
Realizing the Full Potential of Cloud-Native Application SecurityRealizing the Full Potential of Cloud-Native Application Security
Realizing the Full Potential of Cloud-Native Application Security
 
Cloud Security: A New Perspective
Cloud Security: A New PerspectiveCloud Security: A New Perspective
Cloud Security: A New Perspective
 
What is Zero Trust
What is Zero TrustWhat is Zero Trust
What is Zero Trust
 
4_Session 1- Universal ZTNA.pptx
4_Session 1- Universal ZTNA.pptx4_Session 1- Universal ZTNA.pptx
4_Session 1- Universal ZTNA.pptx
 
Multi cloud security architecture
Multi cloud security architecture Multi cloud security architecture
Multi cloud security architecture
 
Microsoft Zero Trust
Microsoft Zero TrustMicrosoft Zero Trust
Microsoft Zero Trust
 
Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023
 
Cloud Security
Cloud SecurityCloud Security
Cloud Security
 
Zero Trust Model Presentation
Zero Trust Model PresentationZero Trust Model Presentation
Zero Trust Model Presentation
 

Similar to Human-Centric Security For Digital Transformation Era

The Secure Path to Value in the Cloud by Denny Heaberlin
The Secure Path to Value in the Cloud by Denny HeaberlinThe Secure Path to Value in the Cloud by Denny Heaberlin
The Secure Path to Value in the Cloud by Denny HeaberlinCloud Expo
 
Evolution security controls towards Cloud Services
Evolution security controls towards Cloud ServicesEvolution security controls towards Cloud Services
Evolution security controls towards Cloud ServicesHugo Rodrigues
 
EMEA10: Trepidation in Moving to the Cloud
EMEA10: Trepidation in Moving to the CloudEMEA10: Trepidation in Moving to the Cloud
EMEA10: Trepidation in Moving to the CloudCompTIA UK
 
Aalto cyber-10.4.18
Aalto cyber-10.4.18Aalto cyber-10.4.18
Aalto cyber-10.4.18japijapi
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observabilityitnewsafrica
 
Cloud Computing & Cybersecurity in Industry 4.0
Cloud Computing & Cybersecurity in Industry 4.0Cloud Computing & Cybersecurity in Industry 4.0
Cloud Computing & Cybersecurity in Industry 4.0PT Datacomm Diangraha
 
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...Symantec
 
HP2065_TieCon_Presentation_V7
HP2065_TieCon_Presentation_V7HP2065_TieCon_Presentation_V7
HP2065_TieCon_Presentation_V7Mark Interrante
 
Akamai Intelligent Edge Security
Akamai Intelligent Edge SecurityAkamai Intelligent Edge Security
Akamai Intelligent Edge SecurityAkamai Technologies
 
Empowering the business while efficiently mitigating risks - Eva Chen (Trend ...
Empowering the business while efficiently mitigating risks - Eva Chen (Trend ...Empowering the business while efficiently mitigating risks - Eva Chen (Trend ...
Empowering the business while efficiently mitigating risks - Eva Chen (Trend ...Minh Le
 
Enable your employees to work securely from anywhere with digital workplace
Enable your employees to work securely from anywhere with digital workplaceEnable your employees to work securely from anywhere with digital workplace
Enable your employees to work securely from anywhere with digital workplaceNeetaSahay1
 
Trend Micro: Security Challenges and Solutions for the Cloud (Saas) & Cloud S...
Trend Micro: Security Challenges and Solutions for the Cloud (Saas) & Cloud S...Trend Micro: Security Challenges and Solutions for the Cloud (Saas) & Cloud S...
Trend Micro: Security Challenges and Solutions for the Cloud (Saas) & Cloud S...Ingram Micro Cloud
 
Strategically moving towards a secure hybrid it
Strategically moving towards a secure hybrid itStrategically moving towards a secure hybrid it
Strategically moving towards a secure hybrid itAvancercorp
 
Cybersecurity in Oil & Gas Company
Cybersecurity in Oil & Gas CompanyCybersecurity in Oil & Gas Company
Cybersecurity in Oil & Gas CompanyEryk Budi Pratama
 

Similar to Human-Centric Security For Digital Transformation Era (20)

The Secure Path to Value in the Cloud by Denny Heaberlin
The Secure Path to Value in the Cloud by Denny HeaberlinThe Secure Path to Value in the Cloud by Denny Heaberlin
The Secure Path to Value in the Cloud by Denny Heaberlin
 
Evolution security controls towards Cloud Services
Evolution security controls towards Cloud ServicesEvolution security controls towards Cloud Services
Evolution security controls towards Cloud Services
 
Security Chat 5.0
Security Chat 5.0Security Chat 5.0
Security Chat 5.0
 
The 10 best performing cloud solution providers 2018
The 10 best performing cloud solution providers 2018The 10 best performing cloud solution providers 2018
The 10 best performing cloud solution providers 2018
 
EMEA10: Trepidation in Moving to the Cloud
EMEA10: Trepidation in Moving to the CloudEMEA10: Trepidation in Moving to the Cloud
EMEA10: Trepidation in Moving to the Cloud
 
J3602068071
J3602068071J3602068071
J3602068071
 
Aalto cyber-10.4.18
Aalto cyber-10.4.18Aalto cyber-10.4.18
Aalto cyber-10.4.18
 
Ad4502189193
Ad4502189193Ad4502189193
Ad4502189193
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
 
Cloud Computing & Cybersecurity in Industry 4.0
Cloud Computing & Cybersecurity in Industry 4.0Cloud Computing & Cybersecurity in Industry 4.0
Cloud Computing & Cybersecurity in Industry 4.0
 
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
 
HP2065_TieCon_Presentation_V7
HP2065_TieCon_Presentation_V7HP2065_TieCon_Presentation_V7
HP2065_TieCon_Presentation_V7
 
Akamai Intelligent Edge Security
Akamai Intelligent Edge SecurityAkamai Intelligent Edge Security
Akamai Intelligent Edge Security
 
Cloud Computing Security
Cloud Computing SecurityCloud Computing Security
Cloud Computing Security
 
Empowering the business while efficiently mitigating risks - Eva Chen (Trend ...
Empowering the business while efficiently mitigating risks - Eva Chen (Trend ...Empowering the business while efficiently mitigating risks - Eva Chen (Trend ...
Empowering the business while efficiently mitigating risks - Eva Chen (Trend ...
 
Enable your employees to work securely from anywhere with digital workplace
Enable your employees to work securely from anywhere with digital workplaceEnable your employees to work securely from anywhere with digital workplace
Enable your employees to work securely from anywhere with digital workplace
 
Trend Micro: Security Challenges and Solutions for the Cloud (Saas) & Cloud S...
Trend Micro: Security Challenges and Solutions for the Cloud (Saas) & Cloud S...Trend Micro: Security Challenges and Solutions for the Cloud (Saas) & Cloud S...
Trend Micro: Security Challenges and Solutions for the Cloud (Saas) & Cloud S...
 
Level3-ATC comSpark.tech Presentation Snapshot
Level3-ATC comSpark.tech Presentation SnapshotLevel3-ATC comSpark.tech Presentation Snapshot
Level3-ATC comSpark.tech Presentation Snapshot
 
Strategically moving towards a secure hybrid it
Strategically moving towards a secure hybrid itStrategically moving towards a secure hybrid it
Strategically moving towards a secure hybrid it
 
Cybersecurity in Oil & Gas Company
Cybersecurity in Oil & Gas CompanyCybersecurity in Oil & Gas Company
Cybersecurity in Oil & Gas Company
 

Recently uploaded

KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptxKnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptxTier1 app
 
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio, Inc.
 
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataAdobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataBradBedford3
 
Intelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalmIntelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalmSujith Sukumaran
 
Software Project Health Check: Best Practices and Techniques for Your Product...
Software Project Health Check: Best Practices and Techniques for Your Product...Software Project Health Check: Best Practices and Techniques for Your Product...
Software Project Health Check: Best Practices and Techniques for Your Product...Velvetech LLC
 
Cloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackCloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackVICTOR MAESTRE RAMIREZ
 
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...stazi3110
 
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样umasea
 
Unveiling the Future: Sylius 2.0 New Features
Unveiling the Future: Sylius 2.0 New FeaturesUnveiling the Future: Sylius 2.0 New Features
Unveiling the Future: Sylius 2.0 New FeaturesŁukasz Chruściel
 
Folding Cheat Sheet #4 - fourth in a series
Folding Cheat Sheet #4 - fourth in a seriesFolding Cheat Sheet #4 - fourth in a series
Folding Cheat Sheet #4 - fourth in a seriesPhilip Schwarz
 
Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...OnePlan Solutions
 
SuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte Germany
SuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte GermanySuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte Germany
SuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte GermanyChristoph Pohl
 
Salesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantSalesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantAxelRicardoTrocheRiq
 
Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024Andreas Granig
 
Cloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEECloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEEVICTOR MAESTRE RAMIREZ
 
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdfGOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdfAlina Yurenko
 
What are the key points to focus on before starting to learn ETL Development....
What are the key points to focus on before starting to learn ETL Development....What are the key points to focus on before starting to learn ETL Development....
What are the key points to focus on before starting to learn ETL Development....kzayra69
 
The Evolution of Karaoke From Analog to App.pdf
The Evolution of Karaoke From Analog to App.pdfThe Evolution of Karaoke From Analog to App.pdf
The Evolution of Karaoke From Analog to App.pdfPower Karaoke
 
Recruitment Management Software Benefits (Infographic)
Recruitment Management Software Benefits (Infographic)Recruitment Management Software Benefits (Infographic)
Recruitment Management Software Benefits (Infographic)Hr365.us smith
 

Recently uploaded (20)

KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptxKnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
 
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
 
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataAdobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
 
Intelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalmIntelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalm
 
Software Project Health Check: Best Practices and Techniques for Your Product...
Software Project Health Check: Best Practices and Techniques for Your Product...Software Project Health Check: Best Practices and Techniques for Your Product...
Software Project Health Check: Best Practices and Techniques for Your Product...
 
Cloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackCloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStack
 
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
 
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
 
Unveiling the Future: Sylius 2.0 New Features
Unveiling the Future: Sylius 2.0 New FeaturesUnveiling the Future: Sylius 2.0 New Features
Unveiling the Future: Sylius 2.0 New Features
 
Folding Cheat Sheet #4 - fourth in a series
Folding Cheat Sheet #4 - fourth in a seriesFolding Cheat Sheet #4 - fourth in a series
Folding Cheat Sheet #4 - fourth in a series
 
Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...
 
SuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte Germany
SuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte GermanySuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte Germany
SuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte Germany
 
Salesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantSalesforce Certified Field Service Consultant
Salesforce Certified Field Service Consultant
 
Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024
 
Cloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEECloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEE
 
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdfGOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
 
What are the key points to focus on before starting to learn ETL Development....
What are the key points to focus on before starting to learn ETL Development....What are the key points to focus on before starting to learn ETL Development....
What are the key points to focus on before starting to learn ETL Development....
 
Hot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort Service
Hot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort ServiceHot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort Service
Hot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort Service
 
The Evolution of Karaoke From Analog to App.pdf
The Evolution of Karaoke From Analog to App.pdfThe Evolution of Karaoke From Analog to App.pdf
The Evolution of Karaoke From Analog to App.pdf
 
Recruitment Management Software Benefits (Infographic)
Recruitment Management Software Benefits (Infographic)Recruitment Management Software Benefits (Infographic)
Recruitment Management Software Benefits (Infographic)
 

Human-Centric Security For Digital Transformation Era

  • 1. Human-Centric Security For The Era Of Digital Transformation
  • 2. © 2019 Forcepoint | 2 Forcepoint was purpose-built to enable the next generation of cybersecurity • Created by Raytheon in 2016 to commercialize defense-grade technologies for large enterprises. • One of the largest private cybersecurity companies in the world – more than 13,000 customers, operations in more than 150 countries, 2,700 employees across 50 offices, and 27 data centers worldwide. • Leading partner to the global intelligence community and for high assurance cyber missions. • One of the most comprehensive and integrated security product portfolios in the industry. Forcepoint Proprietary
  • 3. © 2019 Forcepoint | 3 $1 Trillion Has Been Spent Over The Past 7 Years On Cybersecurity, With A 95% Success Rate…For The Attackers 46% say they can’t prevent attackers from breaking into internal networks each time it is attempted. 100% of CIOs believe a breach will occur through a successful phishing attack in next 12 months. Enterprises have seen a 26% increase in security incidents despite increasing budgets by 9% YoY. Forcepoint Proprietary Source: CyberArk Global Advanced Threat Landscape Report 2018 Sources: Verizon 2018 Data Breach Investigations Report.
  • 4. © 2019 Forcepoint | 4 Digital Transformation Will Unlock Tremendous Value… If Cybersecurity Challenges Can Be Addressed Security 31% Technology strategy 24% Company culture 23% Lack of technology skills 20% “What are the greatest challenges in digital transformation?” The value that the World Economic Forum estimates will be created from digitalization over the next 10 years. $100 trillion Source: Digital Transformation Initiative, World Economic Forum, May 2018. Source: Forrester: The Sorry State Of Digital Transformation in 2018. Forcepoint Proprietary
  • 5. © 2019 Forcepoint | 5 Four Elements Of Digital Transformation That Create Advantage And Risk A critical need is created to ensure trusted interactions across the extended enterprise. Network transformation to support cloud-centric IT breaks existing security architectures. Personnel and IoT devices are security vulnerabilities. More critical data is being created than properly protected. Data should flow freely across the business. Cloud IT creates security blind spots and fragmented security management and accountability. “Your IT infrastructure is going to the cloud, driven by business need and speed.” “Data is the new oil and artificial intelligence the new engine of the digital economy.” “Workforce, devices, and business processes are globally hyperconnected.” “Employees and partners collaborate using all of a company’s assets.” Forcepoint Proprietary
  • 6. © 2019 Forcepoint | 6 Users And Data Must Be At The Center Of Your Design Thinking User and data interactions are distributed, diverse and dynamic – this breaks traditional security architectures and increases business risk Degree of Digital Transformation IT Complexity & Risk Pre-2000 2020 Infrastructure-centric 2010 Behavioral-centric N S perimeter Network-Centric E W N S Virtual & App-Centric Forcepoint Proprietary User & Data Centric
  • 7. © 2019 Forcepoint | 7 Users And Data Must Be At The Center Of Your Design Thinking User and data interactions are distributed, diverse and dynamic – this breaks traditional security architectures and increases business risk Forcepoint Proprietary User & Data Centric Traditional Security One-to-many enforcement of static, generic policies, producing high false positive rates. Policy
  • 8. © 2019 Forcepoint | 8 Human-Centric Cybersecurity Changes Everything Forcepoint Proprietary Traditional Security One-to-many enforcement of static, generic policies, producing high false positive rates. Policy One-to-one enforcement of different policies based on the risk, enabling automation. Human-Centric Security
  • 9. © 2019 Forcepoint | 9 Forcepoint Proprietary What is the best way to reduce risk and secure an environment you increasingly don’t own or fully manage? Humans and Data
  • 10. © 2019 Forcepoint | 10 Where Are You In Your Digital Transformation Journey? *from Gartner’s 2019 CIO Agenda: Secure the New Foundation for Digital Business Example IT Initiatives Just Getting Started (25%) Well Underway (42%) Ahead of Peer Group (20%) Industry Leading (13%) Salesforce.com Cloud Email Private Cloud Box.com Zero Trust CARTA Human-Centric Threat Protection NGFW Secure Web Gateway Digital Transformation Stage* Example Security Technologies UEBA AI / ML SOAR Security Maturity Analytics-Centric Information-Centric Behavior-Centric Infrastructure-Centric DLP CASB Email Office 365 SAP Concur Private Cloud + AWS Zoom / Slack Workday Cloud ERP SD-WAN/Direct-to-Cloud AWS + Azure Public-Cloud First SaaS-First Full BYOD Support Forcepoint Proprietary
  • 11. © 2019 Forcepoint | 11 Key Security Categories In The Era Of Digital Transformation Workforce and Supply Chain Protection Secure Cloud Adoption and Network User Protection Critical Data and Intellectual Property Protection Domain Security Architect Network Security Architect VP / Director, Security Data Security Administrator Insider Threat Program Manager Corporate Security Infrastructure & Operations Network Engineer Compliance Officer Security Ops & Compliance VP / Director, Security Risk Officer Forcepoint Proprietary
  • 12. © 2019 Forcepoint | 12 Forcepoint Supports Key Security Initiatives • Stop data loss from insiders and compromised users • Prevent sabotage and financial loss • Protecting your supply chain • Secure the adoption of SaaS & cloud • Enable direct-to-cloud connectivity and security for remote offices • Protect off-network users • Modernize your hybrid IT network • Deploy a cloud converged security model from the cloud • Next-gen your data protection • Protect data in the cloud • Discover data in a hybrid environment • Confidently verify regulatory compliance (e.g., GDPR and HIPAA) Security Initiatives Security Initiatives Security Initiatives Workforce and Supply Chain Protection Secure Cloud Adoption and Network User Protection Critical Data and Intellectual Property Protection Forcepoint Proprietary
  • 13. © 2019 Forcepoint | 13 Forcepoint Offers A Broad Continuum Of Capabilities • Stop data loss from insiders and compromised users • Prevent sabotage and financial loss • Protecting your supply chain • Secure the adoption of SaaS & cloud • Enable direct-to-cloud connectivity and security for remote offices • Protect off-network users • Modernize your hybrid IT network • Deploy a cloud converged security model from the cloud • Next-gen your data protection • Protect data in the cloud • Discover data in a hybrid environment • Confidently verify regulatory compliance (e.g., GDPR and HIPAA) Converged Security Capabilities Security Initiatives Security Initiatives Security Initiatives Workforce and Supply Chain Protection Secure Cloud Adoption and Network User Protection Critical Data and Intellectual Property Protection Forcepoint Proprietary
  • 14. © 2019 Forcepoint | 14 Forcepoint Converged Security Platform Designed to manage and mitigate risk Cloud first, hybrid-ready flexibility Complete coverage across endpoints, clouds and networks Integrated capabilities that reduce security gaps and maintenance Integration with 3rd party tools Support for the broadest set of behavioral use cases Automated policy enforcement and case management Key Business Benefits Secure Critical data and Intellectual Property Protection Ensure Workforce and Supply Chain Protection Secure Cloud Access and Network User Protection Forcepoint and 3rd Party Ecosystem Integrations Forcepoint Converged Security Platform Behavior Intelligence and Analytics Risk-Adaptive Policies and Workflow Composable Security Services Next Generation Firewall ● IPS ● SD-WAN ● Web Security ● Email Security ● AMD ● Cloud Access and User Behavior Security ● Data Security ● Deep Behavior Inspection Data Discovery, Classification, & Loss Prevention ● Insider Threat ● Analytics ● Endpoint DVR Unified Policy ● Cloud-based Management ● Real-time Investigation Adaptive Trust Profile ● Dynamic Risk Scoring Behavior and Threat Intelligence Feeds Forcepoint and 3rd Party Observation & Enforcement Points IDAM ● Cloud Application Integrations ● Orchestration & Automation Forcepoint Proprietary
  • 15. © 2019 Forcepoint | 15 The Forcepoint Difference Risk-adaptive protection powered by behavioral intelligence research delivers automation. Compelling TCO through a breadth of converged capabilities. We are the experts in human-centric security. We are 100% committed to our customers’ success. Forcepoint Proprietary
  • 16. © 2019 Forcepoint | 16 Next Steps On Your Path To Human-Centric Cybersecurity Participate in a briefing at our Boston Cyber Experience Center Engage in a workshop with our executive security strategists Conduct a demonstration with your technical team I am your greatest asset. I am your greatest risk. © 2019 Forcepoint | 16 Forcepoint Proprietary

Editor's Notes

  1. Thank you for investing your valuable time with us, we know you have choices in terms of where you spend it.    I am certain you will find our paradigm changing approach both refreshing and valuable. ​
  2. [OPTIONAL SLIDE FOR THOSE PROSPECTS NOT FAMILIAR WITH FORCEPOINT] Forcepoint’s creation was led by Raytheon with its acqusition of Websense in 2016 and its merge with Raytheon’s Cyber Products business. In January 2016, Raytheon also acquired the Stonesoft NGFW. These three companies formed the initial backbone of Forcepoint. Forcepoint has made subsequent acquistions of a CASB company (Skyfence) and a UEBA company (RedOwl). Forcepoint is actually one of the largest private cybersecurity companies in the world with more than $600M in revenue, more than 10K customers, and offices throughout the globe. It has been and continues to be a close partner to the global intelligence community and organizations with high assurance cyber missions – its has enterprise technologies at its core. It has one of the most comprehensive product portfolios in the industry, across key control points that include Data Protection, NGFW, Web Security, Email Security, CASB, Insider Threat, UEBA, and Sandboxing.
  3. In the last 7 years one trillion dollars has been spent on cyber security, but every CISO I speak to feels no safer. More aware of risk perhaps, but no safer. ​ ​ When we spent the next trillion, ……  are we expecting a different result?​ ​ Half of security organization can’t stop an attack on their networks Attackers will get in by tricking employees using phishing to compromise their accounts # of incidents are growing 2.5X faster than budgets   ​ Something has got to change
  4. ……..Meanwhile – you and other business leaders are under pressure in the race to digitally transform, and both take advantage of the potential $100 trillion in value realization AND defend against new agile disruptors ​ This is why companies are so aggressively pursuing DX: …..BUT …..  The #1 hurdle is still security.​ ​ Companies that can transform and overcome this hurdle, are the ones that will win.​ ​ I am here today to help you get over that hurdle as fast and cost effectively as possible.​ ​ So……..Let’s break down DX into its four key elements and understand how to address the security issues raised by each of them.​ ​
  5. The 4 KEY ELEMENTS of DX are CLOUD, DATA, CONNECTIVITY, AND PEOPLE.​ ​ 1. Companies are moving to cloud as rapidly as possible, and the result can be blind spots, fragmented security and a lack of accountability ​ ​ 2. Data is the new oil, and it needs to be able to flow freely, and be protected everywhere, all the time. This remains a massive challenge for organizations ​ 3.As workloads move to the cloud , Network architectures are evolving, providing opportunities which can be maximized when your networking teams integrate their strategy with security. ​ 4. Lastly – ensuring trusted interactions with employees, partners and vendors in this evolution remains a growing priority and challenge for CxOs ​ At Forcepoint we believe that Organizations need to place users and data at the center of their design thinking……… let me explain
  6. Our journey into a complex world of DX is already happening . Our ecosystems are already beginning to look the one on the top right.  Complexity and risk is already HIGH. This is a multi-dimensional world based, on user and data connections. ​ ·         73% of enterprises will run almost entirely on SaaS by 2020 ​ ·         87% of companies rely on their employees using personal devices to access business apps  ​ ·         2.5 quintillion bytes of data are created each day ​   Organizations need to place users and data at the center of their design thinking.  ​ HOWEVER - The reality is that most security organizations are still operating in the middle or to the left of this diagram, in an infrastructure-centric world. ​  
  7. If you take a look at how security is applied in an infrastructure-centric paradigm, Policies are applied from the infrastructure to groups, or departments or to the whole company.   The result ……… friction for genuine users and an opportunity for malicious users that may find loop holes in the policy or the rights that are applied. Due to the generic nature of these policies, the noise of events and log files makes finding the bad amongst the good extremely difficult
  8. Human-centric cyber security  flips that paradigm on its head and changes everything.  By making humans, and not events, the units of analysis, you can now use events as data input to understand what each individual is trying to do by their behavior.   Based on that understanding of each user’s behavior and intent, you can then apply different policies depending on the riskiness of that behavior. You can now get aggressive with automation to stop threats without breaking the environment. The result is ONE to ONE security that provides more user freedom and appropriate security enforcement based on a risk adaptive profile ​  ​ ……………………So there is a simple question you need to answer in this new world. 
  9. What is the best way to reduce risk and secure an environment you increasingly don’t own or manage? ​ Remember every icon around that person will potentially be outsourced …..People need to be at the center of the new network, and the 2 constants that are of value are HUMANS AND DATA . That is what need to be managed.​ ​ This means making your hybrid infrastructure USER and DATA aware 
  10. [this slide is tool to explore a customer’s maturity level and the key areas of interest that they have; use it to have a conversation with a customer] [the Gartner reference is to the data points of customers in each digital transformation stage; the maturity curve itself is a Forcepoint point-of-view]   So let’s talk about where you are on your DX journey.    Remember the 4 ELEMENTS? CLOUD , DATA , CONNECTIVITY and PEOPLE? .   Every customer we talk to is in a different place on this journey. The key is being careful to avoid a mis-match to the technology you buy and the given need that the business has for that point in time. There unfortunately is no silver bullet. (talk about one specific example with the maturity curve. For example, Office 365 adoption. Depending of the exact need, that may lead to a NGFW, DLP, and CASB discussion or all of these)   What is important is HOW YOU INVEST AS THIS SHOULD BE ALIGNED TO YOUR FUTURE STATE which we propose should ultimately be BEHAVIOR CENTRIC   At Forcepoint we are uniquely positioned to help you along this journey, and to help focus on YOUR NEEDS, we have organized our business into 3 key categories:-
  11. When we talk to CISOs, Forcepoint sees their problems falling into three categories: Having a path to the cloud Protecting data And stopping insider threats First, as customers transition to cloud-based IT, they want new networking and security architectures  What they have today doesn’t work.  It’s slowing down the business They want to accelerate their digital transformation and secure their path to the cloud. They need to fund that transition while maintaining legacy systems Right now, the choice is between on-premises or pure public cloud solutions  Neither satisfies their enterprise-wide need. Second, the top 5 most valuable publicly traded companies get value from data Microsoft, Apple, Alphabet, Amazon and Tencent  They can't secure their data with traditional methods - need automated and intelligent protection Also there's an imbalance between the value of data and investment made to protect it.   And most customers know it. So the second category we're tackling is protection of critical data and intellectual property    Third, and increasingly important, companies are struggling to protect against insider threats, sabotage, and corporate espionage  They need to protect their workforce Just think about the headlines you’ve been reading about Apple, Tesla, and GE. These threats extend to their broader business ecosystem and supply chain  This is one of the hardest problems they have to tackle We’re old hands at solving these kinds of problems for large companies and the US government with Raytheon tech Each one of these categories have different function leaders who are responsible for solving problems and implementing the solutions, sometimes overlapping. Part of my role is to understand the needs of all of these roles and help bridge the gaps and overlaps.
  12. Under each one of these categories are different security and IT initiatives that many of our customers have on their roadmap of projects for the year. Our approach is to identify which ones matter most to you and understand what you need within each one. [talk through a couple example initiatives] (Transition: -) ……..of course we are a technology company, and this now shows you how our products map to the outcomes we are looking to solve
  13. As you can see, integration of solutions will be the key to unlocking true value, and we have invested heavily in this.   There is overlap between outcomes and initiatives with the technology which means interdepartmental cooperation and multiple use cases will improve your risk posture and TCO   ALL of these technologies are available to support your journey TODAY……………
  14. Later this year, Forcepoint will be introducing our Converged Security Platform.  ​ ​ Our platform will simplify how you can consume our capabilities in a way that can satisfy your needs across all three categories.​ ​ For example, we are deploying our capabilities on this platform in a way that you will be able to easily compose solutions. This allows you to start with a simple use case and the add additional capabilities to solve more complex use cases without having to re-deploy the platform. ​ Another example is the bottom layer. Our platform will have an integration layer to an ecosystem of other products, including some that you have already made investment in. Our platform will allow you to make your current infrastructure risk-adaptive.​ ​ Transition: ………….Let me wrap by sharing with you why Forcepoint…​
  15. We are the experts in Human Centric Cyber Security Risk-adaptive protection powered by behavioral intelligence research delivers automation Compelling TCO through a breadth of converged capabilities We are 100% committed to our customers success   (Transition :- ) I would like to leave you with 3 things ……
  16. We’re going to leave you with three things….   How can we progress our discussions that best fits your need?