PRIMA DECADA   Noile Generatii Bogdan Toporan │ BEST INTERNET SECURITY
Security solutions “ An infinite number of monkeys with an infinite number of typewriters and an infinite amount of time could eventually write the works of Shakespeare “—The Infinite Monkey Theorem “ An infinite number of hackers with an infinite number of  keyboards, an infinite amount of  caffeine, and an infinite amount  of time could eventually compromise a network.”
BISS │ Best Internet Security 10 ani – 1.11.’11 Suntem specializati in system si network security Suntem o echipa de experti, cu acces la ultimele tehnologii si descoperiri in  domeniul IT Sec Protejam organizatii financiar-bancare, guvernamentale, de telecomunicatii, utilitati si industrie De 10 ani suntem permanent conectati la dinamica dezvoltarii domeniului IT Security In 10 ani, am evoluat de la statutul de pionier intr-un segment IT foarte specializat, la cel de integrator pentru solutii profesionale IT Security BISS propune cele mai avansate tehnologii / solutii / produse si ofera suport / servicii de inalta calitate. Suntem parte a sistemelor de protectie ale clientilor si partenerilor nostri  Suntem partenerii liderilor tehnologiilor IT Security .  Partenerii BISS sunt companii ce dezvolta concepte si tehnologii de varf, companii vizionare specializate in aria protectiei retelelor, comunicatiilor si datelor rezidente in sistemele informatice.
BISS – infiintata in 2001 Trusted information security integrator
Expertiza Gateway Server Desktop NIPS / HIPS VAM Web Security IAM Log Management Encryption /PKI UTM DLP WAN Optimization SIEM  Intelligence Web App E-mail Etc. WAF XML Fw Mail fw AntiSpam App scans Code review Application Oracle SQL Etc. VA IPS Discovery Log  mgmt Admin monitor DAM Reporting Database Compliance Plan Audit Training Deployment Support Professional services Consultant Network BISS
Motive pentru IT Security Nevoia reala de conectare Existenta Internetului
Motive pentru IT Security Complexitatea sistemelor informatice Rapiditatea adoptarii noilor modele si tehnologii
X-Force Trend Risk report H1 2011
X-Force Trend Risk report H1 2011 Common points of entry the public website and data servers. employee workstations or endpoints.
X-Force Trend Risk report H1 2011 Aproximativ 50% din vulnerabilitatile cunoscute sunt inca unpatched
X-Force Trend Risk report H1 2011 Un studiu recent al Forrester Research, releva faptul ca peste 75% din companii nu au documentat inca un database security plan. Forrester estimeaza de asemenea ca in prezent, DBAs aloca sub 5% din timpul lor pentru database security. Key drivers pentru database security Atacatorii  sunt motivati sa compromita bazele de date cu o protectie slaba, de sumele pe care le castiga vanzand datele personale sustrase. Cyber-spionajul  vizeaza proprietatea intelectuala. Hacktivism-ul  este o forma de atac motivata politic, adesea sponsorizata politic si folosita pentru suportul activitatilor politice. Amenintarile interne sunt considerate cele mai serioase, angajatii putand frauda si exploata facil accesul legitim. Compliance  – cerinte tot mai complexe
X-Force Trend Risk report H1 2011
Security drivers
O noua abordare Informatie relevanta (intelligence) Vizibilitate (in timp real) Corelare Predictibilitate (risk management) Administrare unitara (corelare) Reactie rapida Analiza (forensic) Scalabilitate
Eliminate False Choice - Capability & Simplicity Siloed Solution Integrated Solution
Disponibilitate Compliance validation and security response improvement in the same solution Out of the box content to swiftly meet PCI, NERC, SOX, HIPAA, GLBA, CoCo, etc. Flexibility to meet new compliance standards as they evolve PCI HIPAA FISMA CoCo NERC SOX
Intelligence Clear & concise delivery of the most relevant information … What was the attack? Who was responsible? How many targets involved? Was it successful? Where do I find them? Are any of them vulnerable? How valuable are they to the business? Where is all the evidence?
Point & click Feature Benefit Network topology and traffic maps, provided in context of an active threat Greatly enhance end-to-end visualization and remediation of security incidents Summary network connection database and visualization tools built from high volume of network flow data Improves the speed and efficiency of drilling into end user activity and attack path Graphical mapping of risk (both pre and post exploit) on top of network visualization tools Greatly improves time to recognize and remediate security incidents
Next Generation Web Security
Blue Coat
Next Generation Firewall
Next Generation SIEM
Next Generation Proactive threat management Massive data reduction Rapid, complete impact analysis Eliminates silos  Highly scalable Flexible, future-proof Operational elegance Simple deployment Rapid time to value
Q&A Cum tratez problemele de confidentialitate? Cum imi monitorizez reteaua si echipamentele de securitate acum? Cum stabilesc anume o prioritizare a sistemelor vulnerabile?  Cum interpretez rezultatele furnizate de scanerele de vulnerabilitati? Cum monitorizez utilizarea aplicatiilor de socializare?  Controlez accesul la retelele sociale? Am cum sa fac o corelare a informatiilor furnizate de reteaua mea? In cazul unui atac, exista resursa interna pregatita sa  faca fata? S-ar fi putut detecta atacul mai devreme (inaintea declansarii impactului)? Cine e responsabil pentru securitate? La cine pot sa apelez? Partener /consultant Date de contact Outsourced
Sample Slide    Bullet Points The text demonstrates how your own text will look when  you replace the placeholder with your own text. This is a placeholder text. This text can be replaced with  your own text.  If you don’t want to use the style and size of the fonts as used in this placeholder it is possible to replace it by selecting different options. For replacing the placeholder text you need to click on  the placeholder text and insert your own text. The text that you insert will retain the same style  and format as the placeholder text. MULŢUMESC Bogdan Toporan │ BISS [email_address] www.biss.ro  1.11.’11

BISS - 11nov2011

  • 1.
    PRIMA DECADA Noile Generatii Bogdan Toporan │ BEST INTERNET SECURITY
  • 2.
    Security solutions “An infinite number of monkeys with an infinite number of typewriters and an infinite amount of time could eventually write the works of Shakespeare “—The Infinite Monkey Theorem “ An infinite number of hackers with an infinite number of keyboards, an infinite amount of caffeine, and an infinite amount of time could eventually compromise a network.”
  • 3.
    BISS │ BestInternet Security 10 ani – 1.11.’11 Suntem specializati in system si network security Suntem o echipa de experti, cu acces la ultimele tehnologii si descoperiri in  domeniul IT Sec Protejam organizatii financiar-bancare, guvernamentale, de telecomunicatii, utilitati si industrie De 10 ani suntem permanent conectati la dinamica dezvoltarii domeniului IT Security In 10 ani, am evoluat de la statutul de pionier intr-un segment IT foarte specializat, la cel de integrator pentru solutii profesionale IT Security BISS propune cele mai avansate tehnologii / solutii / produse si ofera suport / servicii de inalta calitate. Suntem parte a sistemelor de protectie ale clientilor si partenerilor nostri Suntem partenerii liderilor tehnologiilor IT Security . Partenerii BISS sunt companii ce dezvolta concepte si tehnologii de varf, companii vizionare specializate in aria protectiei retelelor, comunicatiilor si datelor rezidente in sistemele informatice.
  • 4.
    BISS – infiintatain 2001 Trusted information security integrator
  • 5.
    Expertiza Gateway ServerDesktop NIPS / HIPS VAM Web Security IAM Log Management Encryption /PKI UTM DLP WAN Optimization SIEM Intelligence Web App E-mail Etc. WAF XML Fw Mail fw AntiSpam App scans Code review Application Oracle SQL Etc. VA IPS Discovery Log mgmt Admin monitor DAM Reporting Database Compliance Plan Audit Training Deployment Support Professional services Consultant Network BISS
  • 6.
    Motive pentru ITSecurity Nevoia reala de conectare Existenta Internetului
  • 7.
    Motive pentru ITSecurity Complexitatea sistemelor informatice Rapiditatea adoptarii noilor modele si tehnologii
  • 8.
    X-Force Trend Riskreport H1 2011
  • 9.
    X-Force Trend Riskreport H1 2011 Common points of entry the public website and data servers. employee workstations or endpoints.
  • 10.
    X-Force Trend Riskreport H1 2011 Aproximativ 50% din vulnerabilitatile cunoscute sunt inca unpatched
  • 11.
    X-Force Trend Riskreport H1 2011 Un studiu recent al Forrester Research, releva faptul ca peste 75% din companii nu au documentat inca un database security plan. Forrester estimeaza de asemenea ca in prezent, DBAs aloca sub 5% din timpul lor pentru database security. Key drivers pentru database security Atacatorii sunt motivati sa compromita bazele de date cu o protectie slaba, de sumele pe care le castiga vanzand datele personale sustrase. Cyber-spionajul vizeaza proprietatea intelectuala. Hacktivism-ul este o forma de atac motivata politic, adesea sponsorizata politic si folosita pentru suportul activitatilor politice. Amenintarile interne sunt considerate cele mai serioase, angajatii putand frauda si exploata facil accesul legitim. Compliance – cerinte tot mai complexe
  • 12.
    X-Force Trend Riskreport H1 2011
  • 13.
  • 14.
    O noua abordareInformatie relevanta (intelligence) Vizibilitate (in timp real) Corelare Predictibilitate (risk management) Administrare unitara (corelare) Reactie rapida Analiza (forensic) Scalabilitate
  • 15.
    Eliminate False Choice- Capability & Simplicity Siloed Solution Integrated Solution
  • 16.
    Disponibilitate Compliance validationand security response improvement in the same solution Out of the box content to swiftly meet PCI, NERC, SOX, HIPAA, GLBA, CoCo, etc. Flexibility to meet new compliance standards as they evolve PCI HIPAA FISMA CoCo NERC SOX
  • 17.
    Intelligence Clear &concise delivery of the most relevant information … What was the attack? Who was responsible? How many targets involved? Was it successful? Where do I find them? Are any of them vulnerable? How valuable are they to the business? Where is all the evidence?
  • 18.
    Point & clickFeature Benefit Network topology and traffic maps, provided in context of an active threat Greatly enhance end-to-end visualization and remediation of security incidents Summary network connection database and visualization tools built from high volume of network flow data Improves the speed and efficiency of drilling into end user activity and attack path Graphical mapping of risk (both pre and post exploit) on top of network visualization tools Greatly improves time to recognize and remediate security incidents
  • 19.
  • 20.
  • 21.
  • 22.
  • 23.
    Next Generation Proactivethreat management Massive data reduction Rapid, complete impact analysis Eliminates silos Highly scalable Flexible, future-proof Operational elegance Simple deployment Rapid time to value
  • 24.
    Q&A Cum tratezproblemele de confidentialitate? Cum imi monitorizez reteaua si echipamentele de securitate acum? Cum stabilesc anume o prioritizare a sistemelor vulnerabile? Cum interpretez rezultatele furnizate de scanerele de vulnerabilitati? Cum monitorizez utilizarea aplicatiilor de socializare? Controlez accesul la retelele sociale? Am cum sa fac o corelare a informatiilor furnizate de reteaua mea? In cazul unui atac, exista resursa interna pregatita sa faca fata? S-ar fi putut detecta atacul mai devreme (inaintea declansarii impactului)? Cine e responsabil pentru securitate? La cine pot sa apelez? Partener /consultant Date de contact Outsourced
  • 25.
    Sample Slide  Bullet Points The text demonstrates how your own text will look when you replace the placeholder with your own text. This is a placeholder text. This text can be replaced with your own text. If you don’t want to use the style and size of the fonts as used in this placeholder it is possible to replace it by selecting different options. For replacing the placeholder text you need to click on the placeholder text and insert your own text. The text that you insert will retain the same style and format as the placeholder text. MULŢUMESC Bogdan Toporan │ BISS [email_address] www.biss.ro 1.11.’11