SlideShare a Scribd company logo
Future
Juha Kivikoski
Chief Operating Officer
Stonesoft Corporation
Facts and figures
Founded in   1990 over 20 years of high end network security
Listed company since       1999 (NASDAQ OMX: SFT1V)
Operational offices in   18 countries. 4 continents
R&D in   3 locations across Europe, Finland, France and Poland
# 1 European based network security vendor.
Deployments in more than      90 countries, on 5 continents
app.   250 employees. Technology R&D 50 %
Customer base over   6000 large and mid sized organizations
 Customer retention rate   95% is the highest in the industry
Globally working with    200 active channel partners
Product sales growing over     40% in 2011 and 2012.
Customer Base by verticals
We are securing

Data             Mission Critical   Classified
centers          Networks           Data
Critical         Critical
Infrastructure   Applications
                                    Financial
                                    transactions
Product Scope

                Stay
                connected
                and secured
                in a dynamic
                world.
                Now and in
                the future.
BEING IN THE EYE OF
THE PERFECT STORM
The change of REALITY
What is
security?
The Security Trinity is a
Combination of…


    Reality        Feeling      Model &
    What is the     Are we    Technology
   situation out   secured     How are we
       there?       or not?    protecting
                               ourselves?
Dynamics of Security
Some reality checks:
  Feelings and Model must be                           Reality
  grounded in reality – NEVER the                  How things really
                                                    are out there?
  other way around.
  Changing a model or feeling never
  changes the reality.
  Marketing can make you feel
  secured but reality can be                                             Model
                                          Feeling
  different                           Are we secured                   How can we
                                          or not?                        protect
  We need to always ask if the link                                    ourselves?
  between Reality=Facts=Research
  has changed and act on that
THE CHANGE OF …

REALITY
Advanced &       Nationalization   Industrialization
Targeted attacks                      302-DIRECT-MEDIA-ASN
                                      8e6 Technologies, Inc.
                                      AAPT AAPT Limited
                                      ABBOTT Abbot Labs
                                      ABOVENET-CUSTOMER – Abovenet
                                      Communications, Inc
                                      ACCNETWORKS – Advanced Computer Connections
                                      ACEDATACENTERS-AS-1 – Ace Data Centers, Inc.
                                      ACSEAST – ACS Inc.
                                      ACS-INTERNET – Affiliated Computer Services
                                      ACS-INTERNET – Armstrong Cable Services
                                      ADELPHIA-AS – Road Runner HoldCo LLC
                                      Administracion Nacional de Telecomunicaciones
                                      AERO-NET – The Aerospace Corporation
                                      AHP – WYETH-AYERST/AMERICAN HOME
                                      PRODUCTS
                                      AIRLOGIC – Digital Magicians, Inc.
                                      AIRTELBROADBAND-AS-AP Bharti Airtel Ltd.,
                                      Telemedia Services
                                      AIS-WEST – American Internet Services, LLC.
                                      AKADO-STOLITSA-AS _AKADO-Stolitsa_ JSC
                                      ALCANET Corporate ALCANET Access
                                      ALCANET-DE-AS Alcanet International Deutschland
                                      GmbH
                                      ALCATEL-NA – Alcanet International NA
                                      ALCHEMYNET – Alchemy Communications, Inc.
                                      Alestra, S. de R.L. de C.V.
                                      ALLIANCE-GATEWAY-AS-AP Alliance Broadband
                                      Services Pvt. Ltd.,Alliance Gateway AS,Broadband
                                      Services Provider,Kolkata,India
                                      ALMAZAYA Almazaya gateway L.L.C
                                      AMAZON-AES – Amazon.com, Inc.
                                      AMERITECH-AS – AT&T Services, Inc.
                                      AMNET-AU-AP Amnet IT Services Pty Ltd
                                      ANITEX-AS Anitex Autonomus System
                                      AOL-ATDN – AOL Transit Data Network
                                      API-DIGITAL – API Digital Communications Group,
                                      LLC
                                      APOLLO-AS LATTELEKOM-APOLLO
                                      APOLLO-GROUP-INC – University of Phoenix
                                      APT-AP AS
                                      ARLINGTONVA – Arlington County Government
                                      ARMENTEL Armenia Telephone Company
Industrialization
It is a 388 Billion USD industry…and
growing! Norton Cyber Crime report 2011
Malicious attacks by cyber criminals
increased by 81% in 2011 Symantec Report
2011

Organized crime is moving to e-
crime
Hacktivists have started
implementing e-tactics in their fight
Entry barriers to e-crime and
hacking lowering
Nationalization
Advanced & Persistent Threats
increasing
National goals to improve cyber
readiness and capabilities
State level hacking for national
interests
Advanced and state level
resourced attacks e.g.
STUXNET
Cyber war strategies and
programs
Advanced Hacking
Techniques
More advanced and effective
(e.g. AETs)
Professional activity. Own labs
and testing tools
Focused on hacking strategies
and delivery methods
Specific and sophisticated tools
for specific needs
31% of attacks against large
organizations utilized unknown
hacking techniques Verizon Breach
Investigation report 2011
Implications
It’s public NEWS!
Bad guys are getting an
upper hand
No one is safe but do not be
an easy target
High Business risk
Becomes a personal matter
for C-level, board members
and shareholders
Digital World has become a
domain where strategic
advantage (national,
industrial or military) can be
lost or won
PARADIGM SHIFT              TECHNOLOGY IMPLICATIONS
Physical contrains          ”5 seconds war” from anywhere
do not limit actions
Security can not be         Network Architecture must have Security build in
aftertough
Situational Awareness       Visibility is everything
Managing the ”Unknown”      Focus to Vulnerabilities and visibility – not to known
                            exploits
Deterrence                  Shown ability to Counter Measures
Layered Defence with Cell   System ability to support complex topologies
structure
Dynamic and Agile           All security functions must be remotely updateble
                            efficiently
Digital Maintenance and     Ability to make changes during crisis and use the HW
Supply Security             platforms you find
Continuity                  All components must be HA
Our Mission

 To Protect and save Lives and
 Businesses in Cyber Space
Our Vision

 The Best Protection for
 Cyber Space

More Related Content

Similar to Ctab intro juha kivikoski

TECHEXPO 2011
TECHEXPO 2011TECHEXPO 2011
TECHEXPO 2011
cdinzes
 
AWS Intelligent at Edge for IoT
AWS Intelligent at Edge for IoTAWS Intelligent at Edge for IoT
AWS Intelligent at Edge for IoT
Amazon Web Services
 
Tets 2010
Tets 2010Tets 2010
Tets 2010
EricMendel
 
Cleared Job Fair Job Seeker Handbook, Sept 9, DoubleTree Crystal City, VA
Cleared Job Fair Job Seeker Handbook, Sept 9, DoubleTree Crystal City, VACleared Job Fair Job Seeker Handbook, Sept 9, DoubleTree Crystal City, VA
Cleared Job Fair Job Seeker Handbook, Sept 9, DoubleTree Crystal City, VA
ClearedJobs.Net
 
Jed Prevor
Jed PrevorJed Prevor
Jed Prevor
Jed Prevor
 
Mobile Scoping 05-13-11
Mobile Scoping 05-13-11Mobile Scoping 05-13-11
Mobile Scoping 05-13-11
Christine Nolan
 
Nile ICT Group Profile - Sept2015
Nile ICT Group Profile - Sept2015Nile ICT Group Profile - Sept2015
Nile ICT Group Profile - Sept2015
Nagui Chalache
 
Company_Profile_Updated_17032016
Company_Profile_Updated_17032016Company_Profile_Updated_17032016
Company_Profile_Updated_17032016
Dr. Afnan Ullah Khan
 
Mega Events- מכון היצוא
Mega Events- מכון היצוא Mega Events- מכון היצוא
Mega Events- מכון היצוא
Israel Export Institute_מכון היצוא
 
WSO2Con EU 2015: IoT in Finance
WSO2Con EU 2015: IoT in FinanceWSO2Con EU 2015: IoT in Finance
WSO2Con EU 2015: IoT in Finance
WSO2
 
reStartEvents 7-13 Nationwide TS/SCI & Above Employer Directory.pdf
reStartEvents 7-13 Nationwide TS/SCI & Above Employer Directory.pdfreStartEvents 7-13 Nationwide TS/SCI & Above Employer Directory.pdf
reStartEvents 7-13 Nationwide TS/SCI & Above Employer Directory.pdf
Ken Fuller
 
TECHEXPO 2012
TECHEXPO 2012TECHEXPO 2012
TECHEXPO 2012
ken_fuller
 
Arrow ECS/IBM Partner Jam – MobileFirst – A BP’s Perspective - David Peacock...
Arrow ECS/IBM Partner Jam – MobileFirst – A BP’s Perspective -  David Peacock...Arrow ECS/IBM Partner Jam – MobileFirst – A BP’s Perspective -  David Peacock...
Arrow ECS/IBM Partner Jam – MobileFirst – A BP’s Perspective - David Peacock...
Arrow ECS UK
 
Successful Industrial IoT Patterns
Successful Industrial IoT PatternsSuccessful Industrial IoT Patterns
Successful Industrial IoT Patterns
WSO2
 
Future Ready Enterprise Systems | Accenture
Future Ready Enterprise Systems | AccentureFuture Ready Enterprise Systems | Accenture
Future Ready Enterprise Systems | Accenture
accenture
 
Alcatel lucent edited
Alcatel lucent editedAlcatel lucent edited
Alcatel lucent edited
Arisa Pruekwattanasiri
 
Alcatel lucent MIS
Alcatel lucent MISAlcatel lucent MIS
Alcatel lucent MIS
Arisa Pruekwattanasiri
 
Tets2012
Tets2012Tets2012
Tets2012
demone50
 
Phiên sáng - 05 - Chia sẻ về Open Infrastructure trên thế giới
Phiên sáng - 05 - Chia sẻ về Open Infrastructure trên thế giớiPhiên sáng - 05 - Chia sẻ về Open Infrastructure trên thế giới
Phiên sáng - 05 - Chia sẻ về Open Infrastructure trên thế giới
Vietnam Open Infrastructure User Group
 
מכון היצוא - מצגת ענפים טכנולוגיים 2011
מכון היצוא - מצגת ענפים טכנולוגיים 2011מכון היצוא - מצגת ענפים טכנולוגיים 2011
מכון היצוא - מצגת ענפים טכנולוגיים 2011
Israel Export Institute_מכון היצוא
 

Similar to Ctab intro juha kivikoski (20)

TECHEXPO 2011
TECHEXPO 2011TECHEXPO 2011
TECHEXPO 2011
 
AWS Intelligent at Edge for IoT
AWS Intelligent at Edge for IoTAWS Intelligent at Edge for IoT
AWS Intelligent at Edge for IoT
 
Tets 2010
Tets 2010Tets 2010
Tets 2010
 
Cleared Job Fair Job Seeker Handbook, Sept 9, DoubleTree Crystal City, VA
Cleared Job Fair Job Seeker Handbook, Sept 9, DoubleTree Crystal City, VACleared Job Fair Job Seeker Handbook, Sept 9, DoubleTree Crystal City, VA
Cleared Job Fair Job Seeker Handbook, Sept 9, DoubleTree Crystal City, VA
 
Jed Prevor
Jed PrevorJed Prevor
Jed Prevor
 
Mobile Scoping 05-13-11
Mobile Scoping 05-13-11Mobile Scoping 05-13-11
Mobile Scoping 05-13-11
 
Nile ICT Group Profile - Sept2015
Nile ICT Group Profile - Sept2015Nile ICT Group Profile - Sept2015
Nile ICT Group Profile - Sept2015
 
Company_Profile_Updated_17032016
Company_Profile_Updated_17032016Company_Profile_Updated_17032016
Company_Profile_Updated_17032016
 
Mega Events- מכון היצוא
Mega Events- מכון היצוא Mega Events- מכון היצוא
Mega Events- מכון היצוא
 
WSO2Con EU 2015: IoT in Finance
WSO2Con EU 2015: IoT in FinanceWSO2Con EU 2015: IoT in Finance
WSO2Con EU 2015: IoT in Finance
 
reStartEvents 7-13 Nationwide TS/SCI & Above Employer Directory.pdf
reStartEvents 7-13 Nationwide TS/SCI & Above Employer Directory.pdfreStartEvents 7-13 Nationwide TS/SCI & Above Employer Directory.pdf
reStartEvents 7-13 Nationwide TS/SCI & Above Employer Directory.pdf
 
TECHEXPO 2012
TECHEXPO 2012TECHEXPO 2012
TECHEXPO 2012
 
Arrow ECS/IBM Partner Jam – MobileFirst – A BP’s Perspective - David Peacock...
Arrow ECS/IBM Partner Jam – MobileFirst – A BP’s Perspective -  David Peacock...Arrow ECS/IBM Partner Jam – MobileFirst – A BP’s Perspective -  David Peacock...
Arrow ECS/IBM Partner Jam – MobileFirst – A BP’s Perspective - David Peacock...
 
Successful Industrial IoT Patterns
Successful Industrial IoT PatternsSuccessful Industrial IoT Patterns
Successful Industrial IoT Patterns
 
Future Ready Enterprise Systems | Accenture
Future Ready Enterprise Systems | AccentureFuture Ready Enterprise Systems | Accenture
Future Ready Enterprise Systems | Accenture
 
Alcatel lucent edited
Alcatel lucent editedAlcatel lucent edited
Alcatel lucent edited
 
Alcatel lucent MIS
Alcatel lucent MISAlcatel lucent MIS
Alcatel lucent MIS
 
Tets2012
Tets2012Tets2012
Tets2012
 
Phiên sáng - 05 - Chia sẻ về Open Infrastructure trên thế giới
Phiên sáng - 05 - Chia sẻ về Open Infrastructure trên thế giớiPhiên sáng - 05 - Chia sẻ về Open Infrastructure trên thế giới
Phiên sáng - 05 - Chia sẻ về Open Infrastructure trên thế giới
 
מכון היצוא - מצגת ענפים טכנולוגיים 2011
מכון היצוא - מצגת ענפים טכנולוגיים 2011מכון היצוא - מצגת ענפים טכנולוגיים 2011
מכון היצוא - מצגת ענפים טכנולוגיים 2011
 

Ctab intro juha kivikoski

  • 1. Future Juha Kivikoski Chief Operating Officer Stonesoft Corporation
  • 2. Facts and figures Founded in 1990 over 20 years of high end network security Listed company since 1999 (NASDAQ OMX: SFT1V) Operational offices in 18 countries. 4 continents R&D in 3 locations across Europe, Finland, France and Poland # 1 European based network security vendor. Deployments in more than 90 countries, on 5 continents app. 250 employees. Technology R&D 50 % Customer base over 6000 large and mid sized organizations Customer retention rate 95% is the highest in the industry Globally working with 200 active channel partners Product sales growing over 40% in 2011 and 2012.
  • 3. Customer Base by verticals
  • 4. We are securing Data Mission Critical Classified centers Networks Data Critical Critical Infrastructure Applications Financial transactions
  • 5. Product Scope Stay connected and secured in a dynamic world. Now and in the future.
  • 6. BEING IN THE EYE OF THE PERFECT STORM The change of REALITY
  • 8. The Security Trinity is a Combination of… Reality Feeling Model & What is the Are we Technology situation out secured How are we there? or not? protecting ourselves?
  • 9. Dynamics of Security Some reality checks: Feelings and Model must be Reality grounded in reality – NEVER the How things really are out there? other way around. Changing a model or feeling never changes the reality. Marketing can make you feel secured but reality can be Model Feeling different Are we secured How can we or not? protect We need to always ask if the link ourselves? between Reality=Facts=Research has changed and act on that
  • 10. THE CHANGE OF … REALITY
  • 11. Advanced & Nationalization Industrialization Targeted attacks 302-DIRECT-MEDIA-ASN 8e6 Technologies, Inc. AAPT AAPT Limited ABBOTT Abbot Labs ABOVENET-CUSTOMER – Abovenet Communications, Inc ACCNETWORKS – Advanced Computer Connections ACEDATACENTERS-AS-1 – Ace Data Centers, Inc. ACSEAST – ACS Inc. ACS-INTERNET – Affiliated Computer Services ACS-INTERNET – Armstrong Cable Services ADELPHIA-AS – Road Runner HoldCo LLC Administracion Nacional de Telecomunicaciones AERO-NET – The Aerospace Corporation AHP – WYETH-AYERST/AMERICAN HOME PRODUCTS AIRLOGIC – Digital Magicians, Inc. AIRTELBROADBAND-AS-AP Bharti Airtel Ltd., Telemedia Services AIS-WEST – American Internet Services, LLC. AKADO-STOLITSA-AS _AKADO-Stolitsa_ JSC ALCANET Corporate ALCANET Access ALCANET-DE-AS Alcanet International Deutschland GmbH ALCATEL-NA – Alcanet International NA ALCHEMYNET – Alchemy Communications, Inc. Alestra, S. de R.L. de C.V. ALLIANCE-GATEWAY-AS-AP Alliance Broadband Services Pvt. Ltd.,Alliance Gateway AS,Broadband Services Provider,Kolkata,India ALMAZAYA Almazaya gateway L.L.C AMAZON-AES – Amazon.com, Inc. AMERITECH-AS – AT&T Services, Inc. AMNET-AU-AP Amnet IT Services Pty Ltd ANITEX-AS Anitex Autonomus System AOL-ATDN – AOL Transit Data Network API-DIGITAL – API Digital Communications Group, LLC APOLLO-AS LATTELEKOM-APOLLO APOLLO-GROUP-INC – University of Phoenix APT-AP AS ARLINGTONVA – Arlington County Government ARMENTEL Armenia Telephone Company
  • 12. Industrialization It is a 388 Billion USD industry…and growing! Norton Cyber Crime report 2011 Malicious attacks by cyber criminals increased by 81% in 2011 Symantec Report 2011 Organized crime is moving to e- crime Hacktivists have started implementing e-tactics in their fight Entry barriers to e-crime and hacking lowering
  • 13. Nationalization Advanced & Persistent Threats increasing National goals to improve cyber readiness and capabilities State level hacking for national interests Advanced and state level resourced attacks e.g. STUXNET Cyber war strategies and programs
  • 14. Advanced Hacking Techniques More advanced and effective (e.g. AETs) Professional activity. Own labs and testing tools Focused on hacking strategies and delivery methods Specific and sophisticated tools for specific needs 31% of attacks against large organizations utilized unknown hacking techniques Verizon Breach Investigation report 2011
  • 15. Implications It’s public NEWS! Bad guys are getting an upper hand No one is safe but do not be an easy target High Business risk Becomes a personal matter for C-level, board members and shareholders
  • 16. Digital World has become a domain where strategic advantage (national, industrial or military) can be lost or won
  • 17. PARADIGM SHIFT TECHNOLOGY IMPLICATIONS Physical contrains ”5 seconds war” from anywhere do not limit actions Security can not be Network Architecture must have Security build in aftertough Situational Awareness Visibility is everything Managing the ”Unknown” Focus to Vulnerabilities and visibility – not to known exploits Deterrence Shown ability to Counter Measures Layered Defence with Cell System ability to support complex topologies structure Dynamic and Agile All security functions must be remotely updateble efficiently Digital Maintenance and Ability to make changes during crisis and use the HW Supply Security platforms you find Continuity All components must be HA
  • 18. Our Mission To Protect and save Lives and Businesses in Cyber Space
  • 19. Our Vision The Best Protection for Cyber Space