Successfully reported this slideshow.
Your SlideShare is downloading. ×

Cyber Priority - Judson Walker

Ad
Ad
Ad
Ad
Ad
Ad
Ad
Ad
Ad
Ad
Ad
Loading in …3
×

Check these out next

1 of 19 Ad

More Related Content

Slideshows for you (20)

Similar to Cyber Priority - Judson Walker (20)

Advertisement

More from scoopnewsgroup (20)

Recently uploaded (20)

Advertisement

Cyber Priority - Judson Walker

  1. 1. © 2015 BROCADE COMMUNICATIONS SYSTEMS, INC. COMPANY PROPRIETARY INFORMATION Cyber Priority Option for Enhanced Infrastructure Data Protection Measures
  2. 2. Agenda • Level of Criticality / Current Perceptions • Recommendations • What Does the Future Hold? • Call to Action © 2015 BROCADE COMMUNICATIONS SYSTEMS, INC. COMPANY PROPRIETARY INFORMATION 2
  3. 3. © 2015 BROCADE COMMUNICATIONS SYSTEMS, INC. COMPANY PROPRIETARY INFORMATION Criticality of Network Security
  4. 4. The Connection: Network Data & Cybersecurity • Migration to cloud-based services increases vulnerability • Evolution of the “Network of Things” is a catalyst for a heightened volume of sensitive data © 2015 BROCADE COMMUNICATIONS SYSTEMS, INC. COMPANY PROPRIETARY INFORMATION 4
  5. 5. © 2015 BROCADE COMMUNICATIONS SYSTEMS, INC. COMPANY PROPRIETARY INFORMATION Do Agency Cybersecurity Priorities and Budgets Align?
  6. 6. Agency Cyber Priorities & Budgets Agencies’ cybersecurity priorities for 2015 include a widespread focus on prevention (72%), and budgets reflect this. © 2015 BROCADE COMMUNICATIONS SYSTEMS, INC. COMPANY PROPRIETARY INFORMATIONSOURCE: MARKET CONNECTIONS, INC. 4% 24% 72% 0 20 40 60 80 100 High Priority Moderate Priority Not a Priority 6% 71% 24% 0 20 40 60 80 100 Increase in FY 2015 About the same in FY 2015 as previous fiscal year Decrease in FY 2015 2015 Cybersecurity Prevention Budget2015 Cybersecurity Prevention Priority Level 96% 95% 6 To the best of your knowledge, in each of the following areas did your agency’s cyber- security budget increase, decrease, or stay about the same as the previous fiscal year? What are your agency’s cybersecurity priorities for 2015 with regard to prevention?
  7. 7. © 2015 BROCADE COMMUNICATIONS SYSTEMS, INC. COMPANY PROPRIETARY INFORMATION Are Agencies Protecting Data on the Network? If Not, Why Not?
  8. 8. © 2015 BROCADE COMMUNICATIONS SYSTEMS, INC. COMPANY PROPRIETARY INFORMATIONSOURCE: MARKET CONNECTIONS, INC. 8
  9. 9. Is Data as Safe as Agencies Think It Is? Agency encryption is focused on web applications (SSL). Yet there are many other applications that need protection on the network. © 2015 BROCADE COMMUNICATIONS SYSTEMS, INC. COMPANY PROPRIETARY INFORMATIONSOURCE: MARKET CONNECTIONS, INC. 9
  10. 10. Commercial Solutions for Classified (CSfC) Standardized Inflight Encryption Policy for Public Sector • CSfC describes how to protect classified data in transit across untrusted networks leveraging multiple levels of encryption • COTS products leveraging Suite B encryption algorithms are preferred and gaining momentum • Developed vendor-agnostic capability packages to provide high-level security and configuration guidance for customers and/or solution integrators © 2015 BROCADE COMMUNICATIONS SYSTEMS, INC. COMPANY PROPRIETARY INFORMATION 10
  11. 11. © 2015 BROCADE COMMUNICATIONS SYSTEMS, INC. COMPANY PROPRIETARY INFORMATION Recommendations
  12. 12. Recommendations Checklist for selecting a data protection solution for your network… Simple to implement and maintain Does not impact your network or increase network costs due to complexity and management overhead The right level to protect the different types of data on your network Can handle your data connection speeds today as well as into the future © 2015 BROCADE COMMUNICATIONS SYSTEMS, INC. COMPANY PROPRIETARY INFORMATION 12
  13. 13. Brocade Security Solutions • Physical/Modular solutions with the capability to deliver Terabits per second of encrypted throughput within a single chassis • Virtual IPSec VPN—prime solution for edge and data center deployments – Low cost software solution that can be applied as a virtualized overlay within existing infrastructures – Excellent solution for SaaS models to provide inflight encryption services per customer • Alternative acquisition model leveraging OPEX dollars to easily scale and modernize © 2015 BROCADE COMMUNICATIONS SYSTEMS, INC. COMPANY PROPRIETARY INFORMATION 13
  14. 14. © 2015 BROCADE COMMUNICATIONS SYSTEMS, INC. COMPANY PROPRIETARY INFORMATION What Can Agencies Expect in the Future?
  15. 15. • Leverage software defined networking to centrally manage and abstract how security policies are defined, managed, and deployed • Future application development will allow for enhanced end-to-end security initiation, configuration and management • SDN brings multiple security disciplines together between various vendors for a truly unified experience with a common API framework that any security appliance can leverage Software Defined Networking (SDN) Enhances Data Protection © 2015 BROCADE COMMUNICATIONS SYSTEMS, INC. COMPANY PROPRIETARY INFORMATION Hypervisor Multi-core CPU SW Router SW Firewall SW VPN Virtual Networking Platform Image 15
  16. 16. © 2015 BROCADE COMMUNICATIONS SYSTEMS, INC. COMPANY PROPRIETARY INFORMATION Call to Action
  17. 17. Learn More about Protecting the Data on Your Network! • Download the Federal Network Security Survey Report www.marketconnectionsinc.com/networksecurity • Check out the latest on the efforts associated with the CSfC charter and proposed framework associated with NSA/IAD – Latest Capabilities Package: https://www.nsa.gov/ia/_files/VPN_CP_3_0.pdf • Bring focus to the security aspects of our customers’ environments—we have the tools today to minimize the pain © 2015 BROCADE COMMUNICATIONS SYSTEMS, INC. COMPANY PROPRIETARY INFORMATION 17
  18. 18. Learn More about Protecting the Data on Your Network! • Discuss how the SDN conversations can be tied to security as part of a encryption services offering • Swing by the Technical Pavilion to talk with Brocade subject matter experts about data protection offerings © 2015 BROCADE COMMUNICATIONS SYSTEMS, INC. COMPANY PROPRIETARY INFORMATION 18
  19. 19. © 2015 BROCADE COMMUNICATIONS SYSTEMS, INC. COMPANY PROPRIETARY INFORMATION Thank you

Editor's Notes

  • Page 6
  • Page 8
  • Page 9
  • Page 10

×