Going beyond perimeter defence

383 views

Published on

SysAdmin day 2013 presentation

Published in: Technology, Business
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
383
On SlideShare
0
From Embeds
0
Number of Embeds
4
Actions
Shares
0
Downloads
6
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Going beyond perimeter defence

  1. 1. Going beyond perimeter defence Dragos Madarasan 26 July 2013
  2. 2. •Who & What •Security challenges in Post-PC •Beyond perimeter defence Agenda
  3. 3. IN YOUR ZONE Who •Currently Support Engineer at Endava •Former freelancer on oDesk.com •Technologist & web enthusiast
  4. 4. IN YOUR ZONE Who •NOT a networking/security guru •Just looking to share my findings •Vendor agnostic presentation
  5. 5. IN YOUR ZONE Security challenges in Post-PC •Proliferation of web applications & mobile devices •Virtualization •BYOD •Software vulnerabilities (bad code)
  6. 6. IN YOUR ZONE Beyond perimeter security •Vulnerability & patch management •Network access control •Public key infrastructure •IPsec •Mobile device management (MDM)
  7. 7. IN YOUR ZONE Vulnerability & patch management •Scan network infrastructure •Determine unpatched / unsecured applications •Automatic patch management
  8. 8. IN YOUR ZONE Network access control (802.1X) •RADIUS protocol •Compliance enforcement •Remediation / quarantine
  9. 9. IN YOUR ZONE Public key infrastructure •Self signed certificates are bad •Provides better identification vs. passwords
  10. 10. IN YOUR ZONE Mobile device management •No demand in Romania, yet •BYOD will change that
  11. 11. IN YOUR ZONE Thank you!
  12. 12. IN YOUR ZONE We’re hiring! careers.endava.com

×