We live in the era of digital transformation.
In addition to end-point computers and networks, we now have our mobile devices and the cloud computing as part of our daily connected lives.
Lets talk about mobile. Most of you have a smartphone. If you receive work emails or connect to your company's intranet, your smartphone is mixing your private data and business data. Your smartphone goes everywhere with you and has a GPS that knows where you are. It has microphone that can listen to your conversations. The company and personal information on your smartphone and the connections to your business network are available to you and anyone else who can take control of your phone. Your smartphone must be secure.
Check Point offers very innovative protection for smartphones and tablets. We do this by sending your metadata, applications and networking behavior to the cloud. We analyze your mobile device's activity in the cloud and give you an immediate alert for any malware or breach.
Suggested anecdote:
Want to be a hacker? Here’s how to conduct a man-in-the-middle attack. Simply connect to free airport Wi-Fi and change your phone settings to broadcast “free airport Wi-Fi.” In a instant, you’ll have a hundred users connected to your phone. You can harvest every password or login on their phones: corporate and personal.
Lacoon was founded in 2011, POCs started at 2012
Lean infrastructure, no real need for redundancy
Puppet story, if we started with puppet at 2012 what would have been the major event we have experienced a few month ago?
A bit about mcollective, transport based on message queue, identity based on client certificate, very granular control over who can run what, allows for parallel execution on many servers
Big moment, you have done an exit…after the excitement fades away….