SlideShare a Scribd company logo
Rational Unified Process
     Bezpieczeństwo
        in Action
        Data Center




 Szymon Dowgwiłłowicz-Nowicki
        Styczeń 2012 roku
Bezpieczeństwo informatyczne


       Audyty bezpieczeństwa
       Testy bezpieczeństwa aplikacji
       Bezpieczny Cykl Rozwoju
        Oprogramowania (SDL)
       Zarządzanie tożsamością
       Badanie zabezpieczeń sieci
       Projektowanie zabezpieczeń
       Analiza podatności zabezpieczeń
       Rekomendacje naprawcze
       Pen-Testing
       Badanie zgodności
       Coaching / Szkolenia


2
Motywy kryjące się za incydentami bezp.




                  Source: Breach/WASC 2007 Web Hacking Incident Annual Report
Data Center Security
System Incident Management
    Q1Radar/INVEA-TECH
Juniper STRM / IBM Q1Labs QRadar Architecture



                                   STRM – Real time network &
                                    security visibility
                                   Data collection provides
                                    network, security, application,
                                    and identity awareness
                                   Embedded intelligence &
                                    analytics simplifies security
                                    operations
                                   Prioritized “offenses”
                                    separates the wheat from the
                                    chafe

                                   Solution enables effective
                                    Threat, Compliance & Log
                                    Management
Unrivalled Data & log Management                                                               Log
                                                                                               Management


•   Networking events
     –   Switches & routers, including flow data
•   Security logs                                                     Compliance   Forensics   Policy
     –   Firewalls, IDS, IPS, VPNs, Vulnerability Scanners, Gateway   Templates    Search      Reporting
         AV, Desktop AV, & UTM devices
•   Operating Systems/Host logs
     –   Microsoft, Unix and Linux
•   Applications
     –   Database, mail & web
•   User and asset
     –   Authentication data
•   Support for leading vendors including:
     –   Networking: Juniper,Cisco, Extreme, Nokia, F5, 3Com,
         TopLayer and others
     –   Security: Juniper, Bluecoat, Checkpoint, Fortinet, ISS,
         McAfee,Snort, SonicWall, Sourcefire, Secure Computing,
         Symantec, and others
     –   Network flow: NetFlow, JFlow, Packeteer FDR, & SFlow
     –   Operating systems: Microsoft, AIX, HP-UX, Linux (RedHat,
         SuSe), SunOS, and others
     –   Applications: Oracle, MS SQL, MS IIS, MS AD, MS Exchange,
         and others
•   Security map utilities:
     –    Maxmine (provides geographies)
     –   Shadownet
     –   Botnet
•   Customization logs through generic Device
    Support Module (DSM) Adaptive Logging Exporter
Q1Radar Key Value Proposition


                                              Threat Detection:
                                              Detect New
                                              Threats That Others Miss


                                              Log Management:
                                              Right Threats at the Right
                                              Time


                                              Compliance:
                                              Compliance and Policy
                                              Safety Net
                                 Enterprise
                                 Value
                                              Complements
                                              Juniper’s Enterprise
                Juniper’s STRM                Mgmt Portfolio
                Appliance
INVEA-Tech: FlowMon
INVEA-Tech: Lawful Intercept
DLP – Data Leakage Protection
       Fidelis Security
Exfiltration

                                                                   • Business Partners

                                                                   • Webmail
                                       Leakage
                                                                   • Social Networking
               Uneducated User
                                                                   • Cloud



                                        Theft
                                                                  • Nation States
               Malicious Insider
                                                                  • Organized Non-State
                                                                    Actors (e.g., Terrorist
                                                                    groups)
                        Exfiltration                              • Organized Crime

                                         External Threat Actors   • Advanced Persistent
                                                                    Threats
Fidelis XPS Products
®
The Secret Sauce: Deep Session Inspection




   • Total visibility and control over inbound and outbound network traffic

   • Deep, session-level application, payload and content decoding and analysis

   • Flexible, multi-level policy engine with multiple real-time enforcement options
     (visualize, alert, prevent, etc)

   • Scalable up to multiple Gbps of analyzed throughput in a single device
Fidelis SSL Inspector Solution




      •   Identifies and decrypts all SSL/TLS encrypted traffic
           –   Based on SSL/TLS handshake detection, not on TCP port (port-independent)
           –   Decrypts everything over SSL (HTTP, POP3, SMTP….) – not just HTTPS

      •   Forwards ALL traffic (SSL and non-SSL) to XPS for analysis

      •   Completely transparent to endpoints at the IP, TCP and HTTP levels
           –   Don’t need to configure endpoints to “point at” it – it’s an SSL proxy, not an HTTP proxy
           –   Just need to install an endpoint-trusted CA certificate on the SSL Inspector

      •   Scales up to 1 Gbps in a single device
Fidelis Extrusion Prevention System®―Fidelis XPS™


 Comprehensive Information Protection
 •   Content protection
 •   Application activity control
 •   Encryption policy enforcement
 •   Threat mitigation
 Deep Session Inspection™ Platform
 • Comprehensive visibility into content
   and applications
 • Prevention on all 65,535 ports           The Power to Prevent:
 • Wire-speed performance                  It’s the Next Generation

 Network Appliance
 • Fast to deploy = quick time-to-value
 • Easy to manage
 • Enables zones of control
Policy Engine: Power of Context

    •In addition to pre-built policies, customer-specific policies can
    easily be built using Fidelis XPS’ powerful policy engine.
             • Policy = group of one or more rules
             • Rule = logical combination of one
               or more triggers delivers context


   Trigger > Content              Trigger > Location                   Trigger > Channel
   Sensitive information defined Sender and recipient                  Details about the
   in content                    information                           information flow
   analyzers
  1. Smart Identity Profiling    1.source IP address                  1.Application / protocol
  2. Keyword                     2.destination IP address             (port -independent)
  3. Keyword Sequence            3.Geographical Data–the country in   2.Application-specific Attributes
  4. Regular Expressions         which the IP address is registered   (e.g., user, e-mail address, subject,
  5. Binary Signatures           4.Username                           filename, URL, encrypted, cipher,
  6. Encrypted Files             5.LDAP directory attributes          and many more)
  7. File Names                                                       3.Port (Source / Destination)
  8. Exact File Matching                                              4.Session length / size
  9. Partial Document Matching                                        5.Day of week / Time of day
  10.Embedded Images                                                  6.Session duration
                                                                      7.Decoding path
Social Network whilst Mitigating Risk

      • Technical and Business Controls

      • Ensure employees code-of-conduct policies covers social networking
          – Who can speak on behalf of the company
          – What can employees use social network for

      • Train employees on roles and risks of social networking

      • Create official profiles for corporate executives
          – Even if they will not actually be used
          – Request sites block executives account

      • Implement technical controls that address how social network is used


      • Social Networking is here to stay
          – Security Policy needs to address how it is used


 17
Fidelis XPS: Risk assessment in vivo

  • 88 suspects culled out of >150,000 transactions in a 24
    hour period.




                                      Price list trawling in password-
                                      protected areas
                                      PII over FTP in clear text
                                      File transfers of confidential office
                                      documents using MSN Messenger.
Public Key Infrastructure
     Nexus Security
Nexus PKI – System Overview
Nexus - PortWise Authentication Suite
Nexus IT Security - Corporate Environment
Nexus PKI – System Overview
Dziękuję za uwagę

                        Szymon Dowgwiłłowicz-Nowicki
                         sdow@premiumtechnology.pl
                                601.890.080




Copyright © 2011 Premium Technology Sp. z o.o. All rights reserved.

More Related Content

What's hot

DSS ITSEC CONFERENCE - Lumension Security - Intelligent application whiteli...
DSS   ITSEC CONFERENCE - Lumension Security - Intelligent application whiteli...DSS   ITSEC CONFERENCE - Lumension Security - Intelligent application whiteli...
DSS ITSEC CONFERENCE - Lumension Security - Intelligent application whiteli...
Andris Soroka
 
Trend Micro Dec 6 Toronto VMUG
Trend Micro Dec 6 Toronto VMUGTrend Micro Dec 6 Toronto VMUG
Trend Micro Dec 6 Toronto VMUGtovmug
 
Empowering the business while efficiently mitigating risks - Eva Chen (Trend ...
Empowering the business while efficiently mitigating risks - Eva Chen (Trend ...Empowering the business while efficiently mitigating risks - Eva Chen (Trend ...
Empowering the business while efficiently mitigating risks - Eva Chen (Trend ...
Minh Le
 
PCTY 2012, Threat landscape and Security Intelligence v. Michael Andersson
PCTY 2012, Threat landscape and Security Intelligence v. Michael AnderssonPCTY 2012, Threat landscape and Security Intelligence v. Michael Andersson
PCTY 2012, Threat landscape and Security Intelligence v. Michael Andersson
IBM Danmark
 
RSA 2010 Kevin Rowney
RSA 2010 Kevin RowneyRSA 2010 Kevin Rowney
RSA 2010 Kevin Rowney
Symantec
 
“8th National Biennial Conference on Medical Informatics 2012”
“8th National Biennial Conference on Medical Informatics 2012”“8th National Biennial Conference on Medical Informatics 2012”
“8th National Biennial Conference on Medical Informatics 2012”
Ashu Ash
 
VSD Infotech
VSD InfotechVSD Infotech
VSD Infotech
VSD infotech
 
Trend micro - Your journey to the cloud, where are you
Trend micro - Your journey to the cloud, where are youTrend micro - Your journey to the cloud, where are you
Trend micro - Your journey to the cloud, where are you
Global Business Events
 
Introduction - Trend Micro Deep Security
Introduction - Trend Micro Deep SecurityIntroduction - Trend Micro Deep Security
Introduction - Trend Micro Deep Security
Andrew Wong
 
DSS ITSEC Conference 2012 - SIEM Q1 Labs IBM Security Systems Intelligence
DSS ITSEC Conference 2012 - SIEM Q1 Labs IBM Security Systems IntelligenceDSS ITSEC Conference 2012 - SIEM Q1 Labs IBM Security Systems Intelligence
DSS ITSEC Conference 2012 - SIEM Q1 Labs IBM Security Systems IntelligenceAndris Soroka
 
FROM STRATEGY TO ACTION - Vasil Tsvimitidze
FROM STRATEGY TO ACTION - Vasil Tsvimitidze FROM STRATEGY TO ACTION - Vasil Tsvimitidze
FROM STRATEGY TO ACTION - Vasil Tsvimitidze
DataExchangeAgency
 
Trend Micro - Virtualization and Security Compliance
Trend Micro - Virtualization and Security Compliance Trend Micro - Virtualization and Security Compliance
Trend Micro - Virtualization and Security Compliance
1CloudRoad.com
 
Lessons Learned Fighting Modern Cyberthreats in Critical ICS Networks
Lessons Learned Fighting Modern Cyberthreats in Critical ICS NetworksLessons Learned Fighting Modern Cyberthreats in Critical ICS Networks
Lessons Learned Fighting Modern Cyberthreats in Critical ICS Networks
Angeloluca Barba
 
HTLV - DSS @Vilnius 2010
HTLV - DSS @Vilnius 2010HTLV - DSS @Vilnius 2010
HTLV - DSS @Vilnius 2010Andris Soroka
 
Trend Micro - 13martie2012
Trend Micro - 13martie2012Trend Micro - 13martie2012
Trend Micro - 13martie2012Agora Group
 
GTB Data Leakage Prevention Use Cases 2014
GTB Data Leakage Prevention Use Cases 2014GTB Data Leakage Prevention Use Cases 2014
GTB Data Leakage Prevention Use Cases 2014Ravindran Vasu
 
Smau Bari 2012 Marco Soldi
Smau Bari 2012   Marco SoldiSmau Bari 2012   Marco Soldi
Smau Bari 2012 Marco Soldi
SMAU
 
DDS Secure Intro
DDS Secure IntroDDS Secure Intro
DDS Secure Intro
John Breitenbach
 

What's hot (20)

DSS ITSEC CONFERENCE - Lumension Security - Intelligent application whiteli...
DSS   ITSEC CONFERENCE - Lumension Security - Intelligent application whiteli...DSS   ITSEC CONFERENCE - Lumension Security - Intelligent application whiteli...
DSS ITSEC CONFERENCE - Lumension Security - Intelligent application whiteli...
 
Trend Micro Dec 6 Toronto VMUG
Trend Micro Dec 6 Toronto VMUGTrend Micro Dec 6 Toronto VMUG
Trend Micro Dec 6 Toronto VMUG
 
Empowering the business while efficiently mitigating risks - Eva Chen (Trend ...
Empowering the business while efficiently mitigating risks - Eva Chen (Trend ...Empowering the business while efficiently mitigating risks - Eva Chen (Trend ...
Empowering the business while efficiently mitigating risks - Eva Chen (Trend ...
 
PCTY 2012, Threat landscape and Security Intelligence v. Michael Andersson
PCTY 2012, Threat landscape and Security Intelligence v. Michael AnderssonPCTY 2012, Threat landscape and Security Intelligence v. Michael Andersson
PCTY 2012, Threat landscape and Security Intelligence v. Michael Andersson
 
RSA 2010 Kevin Rowney
RSA 2010 Kevin RowneyRSA 2010 Kevin Rowney
RSA 2010 Kevin Rowney
 
“8th National Biennial Conference on Medical Informatics 2012”
“8th National Biennial Conference on Medical Informatics 2012”“8th National Biennial Conference on Medical Informatics 2012”
“8th National Biennial Conference on Medical Informatics 2012”
 
VSD Infotech
VSD InfotechVSD Infotech
VSD Infotech
 
Trend micro - Your journey to the cloud, where are you
Trend micro - Your journey to the cloud, where are youTrend micro - Your journey to the cloud, where are you
Trend micro - Your journey to the cloud, where are you
 
Ds nsa series_4500
Ds nsa series_4500Ds nsa series_4500
Ds nsa series_4500
 
Introduction - Trend Micro Deep Security
Introduction - Trend Micro Deep SecurityIntroduction - Trend Micro Deep Security
Introduction - Trend Micro Deep Security
 
DSS ITSEC Conference 2012 - SIEM Q1 Labs IBM Security Systems Intelligence
DSS ITSEC Conference 2012 - SIEM Q1 Labs IBM Security Systems IntelligenceDSS ITSEC Conference 2012 - SIEM Q1 Labs IBM Security Systems Intelligence
DSS ITSEC Conference 2012 - SIEM Q1 Labs IBM Security Systems Intelligence
 
FROM STRATEGY TO ACTION - Vasil Tsvimitidze
FROM STRATEGY TO ACTION - Vasil Tsvimitidze FROM STRATEGY TO ACTION - Vasil Tsvimitidze
FROM STRATEGY TO ACTION - Vasil Tsvimitidze
 
Trend Micro - Virtualization and Security Compliance
Trend Micro - Virtualization and Security Compliance Trend Micro - Virtualization and Security Compliance
Trend Micro - Virtualization and Security Compliance
 
Lessons Learned Fighting Modern Cyberthreats in Critical ICS Networks
Lessons Learned Fighting Modern Cyberthreats in Critical ICS NetworksLessons Learned Fighting Modern Cyberthreats in Critical ICS Networks
Lessons Learned Fighting Modern Cyberthreats in Critical ICS Networks
 
HTLV - DSS @Vilnius 2010
HTLV - DSS @Vilnius 2010HTLV - DSS @Vilnius 2010
HTLV - DSS @Vilnius 2010
 
Trend Micro - 13martie2012
Trend Micro - 13martie2012Trend Micro - 13martie2012
Trend Micro - 13martie2012
 
GTB Data Leakage Prevention Use Cases 2014
GTB Data Leakage Prevention Use Cases 2014GTB Data Leakage Prevention Use Cases 2014
GTB Data Leakage Prevention Use Cases 2014
 
Smau Bari 2012 Marco Soldi
Smau Bari 2012   Marco SoldiSmau Bari 2012   Marco Soldi
Smau Bari 2012 Marco Soldi
 
Stone gate ips
Stone gate ipsStone gate ips
Stone gate ips
 
DDS Secure Intro
DDS Secure IntroDDS Secure Intro
DDS Secure Intro
 

Viewers also liked

Mathcad volumes and plane areas
Mathcad   volumes and plane areasMathcad   volumes and plane areas
Mathcad volumes and plane areas
Julio Banks
 
2.el buzdolabı alan yerler
 2.el buzdolabı alan yerler 2.el buzdolabı alan yerler
2.el buzdolabı alan yerler
Yatak odası satmak istiyorum
 
οδηγος ηπειρου
οδηγος ηπειρουοδηγος ηπειρου
οδηγος ηπειρου
evelina15mp
 
El Renacimiento
El RenacimientoEl Renacimiento
El Renacimiento
Erwin Rivas
 
10 alarmierende Fakten über Webseiten von IT Lösungsanbietern
10 alarmierende Fakten über Webseiten von IT Lösungsanbietern10 alarmierende Fakten über Webseiten von IT Lösungsanbietern
10 alarmierende Fakten über Webseiten von IT Lösungsanbietern
PDAgroup
 
BUS30104 Intro to Biz Final Project - Jan 2015.doc
BUS30104 Intro to Biz Final Project - Jan 2015.docBUS30104 Intro to Biz Final Project - Jan 2015.doc
BUS30104 Intro to Biz Final Project - Jan 2015.docOng Shi Hui
 
Organic chemistry
Organic chemistryOrganic chemistry
Organic chemistry
mubeen ahmad
 
http://weekvanhetdigitaalerfgoed.nl/ 003 plenair margaretha mazura utrecht sl...
http://weekvanhetdigitaalerfgoed.nl/ 003 plenair margaretha mazura utrecht sl...http://weekvanhetdigitaalerfgoed.nl/ 003 plenair margaretha mazura utrecht sl...
http://weekvanhetdigitaalerfgoed.nl/ 003 plenair margaretha mazura utrecht sl...
Rob Blaauboer
 
SST handbook 2011
SST handbook 2011SST handbook 2011
SST handbook 2011
SST Singapore
 
City life: How satisfied are you?
City life: How satisfied are you?City life: How satisfied are you?
City life: How satisfied are you?
Ericsson Latin America
 
Zettech рождение бренда
Zettech рождение брендаZettech рождение бренда
Zettech рождение брендаSunSanna
 
Testimonial with Settings from One Spooky2 User with Morgellons
Testimonial with Settings from One Spooky2 User with MorgellonsTestimonial with Settings from One Spooky2 User with Morgellons
Testimonial with Settings from One Spooky2 User with Morgellons
Spooky2 Rife
 
clubs de lectura
clubs de lecturaclubs de lectura
clubs de lectura
pilixo
 
Html5, css3 y js
Html5, css3 y jsHtml5, css3 y js
Html5, css3 y js
Facundo Ferrero
 
Jhsci 2013-v3-i3-december
Jhsci 2013-v3-i3-decemberJhsci 2013-v3-i3-december
Jhsci 2013-v3-i3-december
Journal-of Health-Sciences
 
Overlap of emotion and usability
Overlap of emotion and usabilityOverlap of emotion and usability
Overlap of emotion and usability
Ross Johnson
 

Viewers also liked (20)

Mathcad volumes and plane areas
Mathcad   volumes and plane areasMathcad   volumes and plane areas
Mathcad volumes and plane areas
 
Farukh Bashir Waqt
Farukh Bashir WaqtFarukh Bashir Waqt
Farukh Bashir Waqt
 
2.el buzdolabı alan yerler
 2.el buzdolabı alan yerler 2.el buzdolabı alan yerler
2.el buzdolabı alan yerler
 
οδηγος ηπειρου
οδηγος ηπειρουοδηγος ηπειρου
οδηγος ηπειρου
 
El Renacimiento
El RenacimientoEl Renacimiento
El Renacimiento
 
10 alarmierende Fakten über Webseiten von IT Lösungsanbietern
10 alarmierende Fakten über Webseiten von IT Lösungsanbietern10 alarmierende Fakten über Webseiten von IT Lösungsanbietern
10 alarmierende Fakten über Webseiten von IT Lösungsanbietern
 
BUS30104 Intro to Biz Final Project - Jan 2015.doc
BUS30104 Intro to Biz Final Project - Jan 2015.docBUS30104 Intro to Biz Final Project - Jan 2015.doc
BUS30104 Intro to Biz Final Project - Jan 2015.doc
 
Organic chemistry
Organic chemistryOrganic chemistry
Organic chemistry
 
Resume1
Resume1Resume1
Resume1
 
AMUN Times (1)
AMUN Times (1)AMUN Times (1)
AMUN Times (1)
 
Armament
ArmamentArmament
Armament
 
http://weekvanhetdigitaalerfgoed.nl/ 003 plenair margaretha mazura utrecht sl...
http://weekvanhetdigitaalerfgoed.nl/ 003 plenair margaretha mazura utrecht sl...http://weekvanhetdigitaalerfgoed.nl/ 003 plenair margaretha mazura utrecht sl...
http://weekvanhetdigitaalerfgoed.nl/ 003 plenair margaretha mazura utrecht sl...
 
SST handbook 2011
SST handbook 2011SST handbook 2011
SST handbook 2011
 
City life: How satisfied are you?
City life: How satisfied are you?City life: How satisfied are you?
City life: How satisfied are you?
 
Zettech рождение бренда
Zettech рождение брендаZettech рождение бренда
Zettech рождение бренда
 
Testimonial with Settings from One Spooky2 User with Morgellons
Testimonial with Settings from One Spooky2 User with MorgellonsTestimonial with Settings from One Spooky2 User with Morgellons
Testimonial with Settings from One Spooky2 User with Morgellons
 
clubs de lectura
clubs de lecturaclubs de lectura
clubs de lectura
 
Html5, css3 y js
Html5, css3 y jsHtml5, css3 y js
Html5, css3 y js
 
Jhsci 2013-v3-i3-december
Jhsci 2013-v3-i3-decemberJhsci 2013-v3-i3-december
Jhsci 2013-v3-i3-december
 
Overlap of emotion and usability
Overlap of emotion and usabilityOverlap of emotion and usability
Overlap of emotion and usability
 

Similar to 2012 Data Center Security

CYBER INTELLIGENCE & RESPONSE TECHNOLOGY
CYBER INTELLIGENCE & RESPONSE TECHNOLOGYCYBER INTELLIGENCE & RESPONSE TECHNOLOGY
CYBER INTELLIGENCE & RESPONSE TECHNOLOGYjmical
 
Preventing The Next Data Breach Through Log Management
Preventing The Next Data Breach Through Log ManagementPreventing The Next Data Breach Through Log Management
Preventing The Next Data Breach Through Log Management
Novell
 
Enterprise Strategy for Cloud Security
Enterprise Strategy for Cloud SecurityEnterprise Strategy for Cloud Security
Enterprise Strategy for Cloud Security
Bob Rhubart
 
DSS ITSEC CONFERENCE - Q1 Labs - Intelligent network security - next genera...
DSS   ITSEC CONFERENCE - Q1 Labs - Intelligent network security - next genera...DSS   ITSEC CONFERENCE - Q1 Labs - Intelligent network security - next genera...
DSS ITSEC CONFERENCE - Q1 Labs - Intelligent network security - next genera...
Andris Soroka
 
2012-12-12 Seminar McAfee ESM
2012-12-12 Seminar McAfee ESM2012-12-12 Seminar McAfee ESM
2012-12-12 Seminar McAfee ESM
Pinewood
 
Redefining siem to real time security intelligence
Redefining siem to real time security intelligenceRedefining siem to real time security intelligence
Redefining siem to real time security intelligenceBrendaly Marcano
 
Axxera Security Solutions
Axxera Security SolutionsAxxera Security Solutions
Axxera Security Solutions
akshayvreddy
 
Information Security
Information SecurityInformation Security
Information SecurityMohit8780
 
Qradar ibm partner_enablement_220212_final
Qradar ibm partner_enablement_220212_finalQradar ibm partner_enablement_220212_final
Qradar ibm partner_enablement_220212_finalArrow ECS UK
 
Operational Security Intelligence
Operational Security IntelligenceOperational Security Intelligence
Operational Security Intelligence
Splunk
 
FrontOne our new and different solutions
FrontOne our new and different solutionsFrontOne our new and different solutions
FrontOne our new and different solutions
frontone
 
IT Compliance and Governance with DLP Controls and Vulnerability Scanning Sof...
IT Compliance and Governance with DLP Controls and Vulnerability Scanning Sof...IT Compliance and Governance with DLP Controls and Vulnerability Scanning Sof...
IT Compliance and Governance with DLP Controls and Vulnerability Scanning Sof...
Skoda Minotti
 
Extending Your Network Cloud Security to AWS
Extending Your Network Cloud Security to AWSExtending Your Network Cloud Security to AWS
Extending Your Network Cloud Security to AWS
Fidelis Cybersecurity
 
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...Amazon Web Services
 
Information Security Risk Management
Information Security Risk ManagementInformation Security Risk Management
Information Security Risk Management
ipspat
 
Cyber security-briefing-presentation
Cyber security-briefing-presentationCyber security-briefing-presentation
Cyber security-briefing-presentationsathiyamaha
 
Intrusion detection system
Intrusion detection systemIntrusion detection system
Intrusion detection systemSweta Sharma
 

Similar to 2012 Data Center Security (20)

CYBER INTELLIGENCE & RESPONSE TECHNOLOGY
CYBER INTELLIGENCE & RESPONSE TECHNOLOGYCYBER INTELLIGENCE & RESPONSE TECHNOLOGY
CYBER INTELLIGENCE & RESPONSE TECHNOLOGY
 
Preventing The Next Data Breach Through Log Management
Preventing The Next Data Breach Through Log ManagementPreventing The Next Data Breach Through Log Management
Preventing The Next Data Breach Through Log Management
 
S series presentation
S series presentationS series presentation
S series presentation
 
Enterprise Strategy for Cloud Security
Enterprise Strategy for Cloud SecurityEnterprise Strategy for Cloud Security
Enterprise Strategy for Cloud Security
 
DSS ITSEC CONFERENCE - Q1 Labs - Intelligent network security - next genera...
DSS   ITSEC CONFERENCE - Q1 Labs - Intelligent network security - next genera...DSS   ITSEC CONFERENCE - Q1 Labs - Intelligent network security - next genera...
DSS ITSEC CONFERENCE - Q1 Labs - Intelligent network security - next genera...
 
2012-12-12 Seminar McAfee ESM
2012-12-12 Seminar McAfee ESM2012-12-12 Seminar McAfee ESM
2012-12-12 Seminar McAfee ESM
 
Redefining siem to real time security intelligence
Redefining siem to real time security intelligenceRedefining siem to real time security intelligence
Redefining siem to real time security intelligence
 
Axxera Security Solutions
Axxera Security SolutionsAxxera Security Solutions
Axxera Security Solutions
 
Information Security
Information SecurityInformation Security
Information Security
 
Qradar ibm partner_enablement_220212_final
Qradar ibm partner_enablement_220212_finalQradar ibm partner_enablement_220212_final
Qradar ibm partner_enablement_220212_final
 
Operational Security Intelligence
Operational Security IntelligenceOperational Security Intelligence
Operational Security Intelligence
 
FrontOne our new and different solutions
FrontOne our new and different solutionsFrontOne our new and different solutions
FrontOne our new and different solutions
 
IT Compliance and Governance with DLP Controls and Vulnerability Scanning Sof...
IT Compliance and Governance with DLP Controls and Vulnerability Scanning Sof...IT Compliance and Governance with DLP Controls and Vulnerability Scanning Sof...
IT Compliance and Governance with DLP Controls and Vulnerability Scanning Sof...
 
Extending Your Network Cloud Security to AWS
Extending Your Network Cloud Security to AWSExtending Your Network Cloud Security to AWS
Extending Your Network Cloud Security to AWS
 
Enterprise API Security & Data Loss Prevention - Intel
Enterprise API Security & Data Loss Prevention - IntelEnterprise API Security & Data Loss Prevention - Intel
Enterprise API Security & Data Loss Prevention - Intel
 
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
 
Information Security Risk Management
Information Security Risk ManagementInformation Security Risk Management
Information Security Risk Management
 
Cyber security-briefing-presentation
Cyber security-briefing-presentationCyber security-briefing-presentation
Cyber security-briefing-presentation
 
Hh 2012-mberman-sds2
Hh 2012-mberman-sds2Hh 2012-mberman-sds2
Hh 2012-mberman-sds2
 
Intrusion detection system
Intrusion detection systemIntrusion detection system
Intrusion detection system
 

More from Szymon Dowgwillowicz-Nowicki

IBM Security AppScan Introduction - Horyzont bezpieczeństwa aplikacji webowych
IBM Security AppScan Introduction - Horyzont bezpieczeństwa aplikacji webowychIBM Security AppScan Introduction - Horyzont bezpieczeństwa aplikacji webowych
IBM Security AppScan Introduction - Horyzont bezpieczeństwa aplikacji webowych
Szymon Dowgwillowicz-Nowicki
 
2012 Accumulate Mobile Everywhere - Standard Product Description
2012 Accumulate Mobile Everywhere - Standard Product Description2012 Accumulate Mobile Everywhere - Standard Product Description
2012 Accumulate Mobile Everywhere - Standard Product Description
Szymon Dowgwillowicz-Nowicki
 
2012 Enterprise Single Sign-On (IBM vs CA)
2012 Enterprise Single Sign-On (IBM vs CA)2012 Enterprise Single Sign-On (IBM vs CA)
2012 Enterprise Single Sign-On (IBM vs CA)
Szymon Dowgwillowicz-Nowicki
 
2012 NagraID display cards - alternatywa dla tokenów
2012 NagraID display cards - alternatywa dla tokenów2012 NagraID display cards - alternatywa dla tokenów
2012 NagraID display cards - alternatywa dla tokenów
Szymon Dowgwillowicz-Nowicki
 
2012 Premium Technology usługi bezpieczeństwa teleinformatycznego
2012 Premium Technology usługi bezpieczeństwa teleinformatycznego2012 Premium Technology usługi bezpieczeństwa teleinformatycznego
2012 Premium Technology usługi bezpieczeństwa teleinformatycznego
Szymon Dowgwillowicz-Nowicki
 
2012 Accumulate Mobile Everywhere Introduction
2012 Accumulate Mobile Everywhere Introduction2012 Accumulate Mobile Everywhere Introduction
2012 Accumulate Mobile Everywhere Introduction
Szymon Dowgwillowicz-Nowicki
 

More from Szymon Dowgwillowicz-Nowicki (6)

IBM Security AppScan Introduction - Horyzont bezpieczeństwa aplikacji webowych
IBM Security AppScan Introduction - Horyzont bezpieczeństwa aplikacji webowychIBM Security AppScan Introduction - Horyzont bezpieczeństwa aplikacji webowych
IBM Security AppScan Introduction - Horyzont bezpieczeństwa aplikacji webowych
 
2012 Accumulate Mobile Everywhere - Standard Product Description
2012 Accumulate Mobile Everywhere - Standard Product Description2012 Accumulate Mobile Everywhere - Standard Product Description
2012 Accumulate Mobile Everywhere - Standard Product Description
 
2012 Enterprise Single Sign-On (IBM vs CA)
2012 Enterprise Single Sign-On (IBM vs CA)2012 Enterprise Single Sign-On (IBM vs CA)
2012 Enterprise Single Sign-On (IBM vs CA)
 
2012 NagraID display cards - alternatywa dla tokenów
2012 NagraID display cards - alternatywa dla tokenów2012 NagraID display cards - alternatywa dla tokenów
2012 NagraID display cards - alternatywa dla tokenów
 
2012 Premium Technology usługi bezpieczeństwa teleinformatycznego
2012 Premium Technology usługi bezpieczeństwa teleinformatycznego2012 Premium Technology usługi bezpieczeństwa teleinformatycznego
2012 Premium Technology usługi bezpieczeństwa teleinformatycznego
 
2012 Accumulate Mobile Everywhere Introduction
2012 Accumulate Mobile Everywhere Introduction2012 Accumulate Mobile Everywhere Introduction
2012 Accumulate Mobile Everywhere Introduction
 

Recently uploaded

Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
UiPathCommunity
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 
Quantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIsQuantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIs
Vlad Stirbu
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
Alex Pruden
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 

Recently uploaded (20)

Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 
Quantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIsQuantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIs
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 

2012 Data Center Security

  • 1. Rational Unified Process Bezpieczeństwo in Action Data Center Szymon Dowgwiłłowicz-Nowicki Styczeń 2012 roku
  • 2. Bezpieczeństwo informatyczne  Audyty bezpieczeństwa  Testy bezpieczeństwa aplikacji  Bezpieczny Cykl Rozwoju Oprogramowania (SDL)  Zarządzanie tożsamością  Badanie zabezpieczeń sieci  Projektowanie zabezpieczeń  Analiza podatności zabezpieczeń  Rekomendacje naprawcze  Pen-Testing  Badanie zgodności  Coaching / Szkolenia 2
  • 3. Motywy kryjące się za incydentami bezp. Source: Breach/WASC 2007 Web Hacking Incident Annual Report
  • 4. Data Center Security System Incident Management Q1Radar/INVEA-TECH
  • 5. Juniper STRM / IBM Q1Labs QRadar Architecture  STRM – Real time network & security visibility  Data collection provides network, security, application, and identity awareness  Embedded intelligence & analytics simplifies security operations  Prioritized “offenses” separates the wheat from the chafe  Solution enables effective Threat, Compliance & Log Management
  • 6. Unrivalled Data & log Management Log Management • Networking events – Switches & routers, including flow data • Security logs Compliance Forensics Policy – Firewalls, IDS, IPS, VPNs, Vulnerability Scanners, Gateway Templates Search Reporting AV, Desktop AV, & UTM devices • Operating Systems/Host logs – Microsoft, Unix and Linux • Applications – Database, mail & web • User and asset – Authentication data • Support for leading vendors including: – Networking: Juniper,Cisco, Extreme, Nokia, F5, 3Com, TopLayer and others – Security: Juniper, Bluecoat, Checkpoint, Fortinet, ISS, McAfee,Snort, SonicWall, Sourcefire, Secure Computing, Symantec, and others – Network flow: NetFlow, JFlow, Packeteer FDR, & SFlow – Operating systems: Microsoft, AIX, HP-UX, Linux (RedHat, SuSe), SunOS, and others – Applications: Oracle, MS SQL, MS IIS, MS AD, MS Exchange, and others • Security map utilities: – Maxmine (provides geographies) – Shadownet – Botnet • Customization logs through generic Device Support Module (DSM) Adaptive Logging Exporter
  • 7. Q1Radar Key Value Proposition Threat Detection: Detect New Threats That Others Miss Log Management: Right Threats at the Right Time Compliance: Compliance and Policy Safety Net Enterprise Value Complements Juniper’s Enterprise Juniper’s STRM Mgmt Portfolio Appliance
  • 10. DLP – Data Leakage Protection Fidelis Security
  • 11. Exfiltration • Business Partners • Webmail Leakage • Social Networking Uneducated User • Cloud Theft • Nation States Malicious Insider • Organized Non-State Actors (e.g., Terrorist groups) Exfiltration • Organized Crime External Threat Actors • Advanced Persistent Threats
  • 13. ® The Secret Sauce: Deep Session Inspection • Total visibility and control over inbound and outbound network traffic • Deep, session-level application, payload and content decoding and analysis • Flexible, multi-level policy engine with multiple real-time enforcement options (visualize, alert, prevent, etc) • Scalable up to multiple Gbps of analyzed throughput in a single device
  • 14. Fidelis SSL Inspector Solution • Identifies and decrypts all SSL/TLS encrypted traffic – Based on SSL/TLS handshake detection, not on TCP port (port-independent) – Decrypts everything over SSL (HTTP, POP3, SMTP….) – not just HTTPS • Forwards ALL traffic (SSL and non-SSL) to XPS for analysis • Completely transparent to endpoints at the IP, TCP and HTTP levels – Don’t need to configure endpoints to “point at” it – it’s an SSL proxy, not an HTTP proxy – Just need to install an endpoint-trusted CA certificate on the SSL Inspector • Scales up to 1 Gbps in a single device
  • 15. Fidelis Extrusion Prevention System®―Fidelis XPS™ Comprehensive Information Protection • Content protection • Application activity control • Encryption policy enforcement • Threat mitigation Deep Session Inspection™ Platform • Comprehensive visibility into content and applications • Prevention on all 65,535 ports The Power to Prevent: • Wire-speed performance It’s the Next Generation Network Appliance • Fast to deploy = quick time-to-value • Easy to manage • Enables zones of control
  • 16. Policy Engine: Power of Context •In addition to pre-built policies, customer-specific policies can easily be built using Fidelis XPS’ powerful policy engine. • Policy = group of one or more rules • Rule = logical combination of one or more triggers delivers context Trigger > Content Trigger > Location Trigger > Channel Sensitive information defined Sender and recipient Details about the in content information information flow analyzers 1. Smart Identity Profiling 1.source IP address 1.Application / protocol 2. Keyword 2.destination IP address (port -independent) 3. Keyword Sequence 3.Geographical Data–the country in 2.Application-specific Attributes 4. Regular Expressions which the IP address is registered (e.g., user, e-mail address, subject, 5. Binary Signatures 4.Username filename, URL, encrypted, cipher, 6. Encrypted Files 5.LDAP directory attributes and many more) 7. File Names 3.Port (Source / Destination) 8. Exact File Matching 4.Session length / size 9. Partial Document Matching 5.Day of week / Time of day 10.Embedded Images 6.Session duration 7.Decoding path
  • 17. Social Network whilst Mitigating Risk • Technical and Business Controls • Ensure employees code-of-conduct policies covers social networking – Who can speak on behalf of the company – What can employees use social network for • Train employees on roles and risks of social networking • Create official profiles for corporate executives – Even if they will not actually be used – Request sites block executives account • Implement technical controls that address how social network is used • Social Networking is here to stay – Security Policy needs to address how it is used 17
  • 18. Fidelis XPS: Risk assessment in vivo • 88 suspects culled out of >150,000 transactions in a 24 hour period. Price list trawling in password- protected areas PII over FTP in clear text File transfers of confidential office documents using MSN Messenger.
  • 19. Public Key Infrastructure Nexus Security
  • 20. Nexus PKI – System Overview
  • 21. Nexus - PortWise Authentication Suite
  • 22. Nexus IT Security - Corporate Environment
  • 23. Nexus PKI – System Overview
  • 24. Dziękuję za uwagę Szymon Dowgwiłłowicz-Nowicki sdow@premiumtechnology.pl 601.890.080 Copyright © 2011 Premium Technology Sp. z o.o. All rights reserved.