SlideShare a Scribd company logo
1 of 31
Download to read offline
Redefining Security for the Nomadic Workforce
                November 28, 2012
Webcast Logistics




        To send us questions during the sessions:
            •  Type the question in the Q&A section provided in
               WebEx. We will answer questions at the end of the
               webcast.

        Any Technical Issues?
      	
  



           •  Email: martin@opendns.com




#2ŸŸ 28-Nov-12
Agenda



          Redefining Security for the Nomadic Worker
          Dan Hubbard, CTO, OpenDNS
       	
  
       	
  
       	
  

          Challenges Of Existing Technologies
          Dan Hubbard, CTO, OpenDNS
       	
  
       	
  
       	
  

         Introducing Umbrella
         David Ulevitch, CEO and Founder, OpenDNS
       	
  
       	
  
       	
  

          Lessons Learned & Deployment Experience
       	
  


          Randy Raw, Network Security Director, Veterans United Home
          Loans
       	
  
       	
  
       	
  

          Q&A Session

#3ŸŸ 28-Nov-12
Speakers




              Dan Hubbard   David Ulevitch    Randy Raw
              OpenDNS       OpenDNS           Veterans United Home Loans
              CTO           Founder and CEO   Network Security Director




#4ŸŸ 28-Nov-12
Redefining Security for the Nomadic Worker




                                        Dan Hubbard
                                       CTO, OpenDNS



#5ŸŸ 28-Nov-12
The way we work has changed…



                   OLD-SCHOOL   THE NEW REALITY




#6ŸŸ 28-Nov-12
And so have the threats…


 BYOD and nomadic workers have
 introduced new challenges




http://blog.opendns.com/2012/10/16/cloud-security-alliance-top-threats-to-mobile-computing/

#7ŸŸ 28-Nov-12
#8ŸŸ 28-Nov-12
#9ŸŸ 28-Nov-12
…as a result, IT is losing visibility and control




  f10   28-Nov-12                                   UMBRELL
Challenges of Existing
                   Technologies


#11 ŸŸ 28-
Nov-12
Current solutions fail to measure up




                                       Host-based

                                          IDS



                                        a.          Host-based
                                                       FW
                                         Netwo
                                         Acooss
                                         Control




#12 • :28-
Nov-12
                                                                 U B EL
                                                                  MRL
Current approaches leave mobile devices unprotected


                       Existing solutions are
                      only designed to protect
                       network perimeter….




                                                                        Internet
                                            	
  
                                            	
  
                                            	
  
                                            	
  


                                            	
  
                                                      Direct-to-Net
                                            	
  
                                              …Leaving mobile devices
                                              and nomadic users
                                              completely unprotected




#13 ŸŸ 28-
Nov-12
InfoSec is undergoing a major transition


   Device Diversity
  	
  
  	
  
   We see hundreds of thousands of blocked requests that are connecting to
   malware, botnets, and phishing sites that are “mobile”.




#14 ŸŸ 28-
Nov-12
Existing technology issues



Companies are struggling
    •  Loss of visibility                                    Hardware          Software
                                                               Cost              Cost
    •  Loss of control
    •  Increased costs
                                                 Data                                      Software
    •  A changing threat landscape            Architecture                                Functionality



Incumbents are struggling                                               TCO                 Software
                                              Support and                                  Architecture
   •  Cloud technology transition             Maintenance                                 and Scalability

   •  Legacy business and technology models
                                                               User
                                                             Training             Time to
                                                                              Implementation




#15 ŸŸ 28-
Nov-12
#16 ŸŸ 28-
Nov-12
#17 ŸŸ 28-
Nov-12
Introducing Umbrella




                           David Ulevitch
               CEO and Founder, OpenDNS



#18 ŸŸ 28-
Nov-12
Introducing Umbrella




 11                    U M B RW. A
 9
UMBRELLA: Desktops, laptops, smart devices




                                         Do Not Distribute
UMBRELLA: Security that evolves with how we work




                                          Do Not Distribute
UMBRELLA is…
	
  
	
  
	
  
  •      Device Agnostic: Aim for all smart networked devices.


  •      Simple and Easy: Making complex solutions is easy to deploy and manage is a core
         strength and pre-requisite to effective mobile security.


  •      Disruptive Delivery: 100% subscription, no hardware, priced per user, not per device.


  •      Instant Scalability: No sizing guides, unlimited data and bandwidth, low latency, broad
         breadth with specific and selective depth. “Cloud” from the ground-up, servicing more
         than 50 Billion requests per day globally with zero downtime.


  •      Big Data meets Security: Big Data systems combined with security research algorithms
         to keep ahead of threats.




  #22ŸŸ 28-Nov-12
UMBRELLA: Security for nomadic workers and visibility for IT


                    Any Device
                     Any User
                    Anywhere
                                     14 Global Datacenters




                                       	
  
                                                                    Internet
                                       	
  
                                       	
  
                                       	
  
                                       	
  
                                         •    Malware protection
                                         •    Botnet containment
                                         •    Phishing protection
                                         •    Policy enforcement




#23ŸŸ 28-Nov-12
UMBRELLA: Dashboard




                      Do Not Distribute
UMBRELLA: Provision in minutes




                                 Do Not Distribute
UMBRELLA: Location aware policies	
  
UMBRELLA: Drill down activity search	
  
Lessons Learned and Deployment Experience




                                          Randy Raw
                              Network Security Director



#28ŸŸ 28-Nov-12
About Veterans United Home Loans
           The nation's largest dedicated provider of VA Loans
           Dedicated to making the American dream of homeownership a reality
          for those who so bravely served.
           27 offices
           Distributed across 22 states
           1,200 employees




#29ŸŸ 28-Nov-12
What have we learned?




#13:> • 2&
Nov-1. 2
                        •   U B EL
                             M RL
Q&A and next steps
  Want to try it today?
  Limited offer: $20/year for a single-user license of Umbrella Mobility
	
  


               Visit: www.umbrella.com/umbrella-security-pricing/
	
  
	
  
	
  
  To request a product demo visit: sales@opendns.com




          David Ulevitch             Dan Hubbard                    Randy Raw
          Email: david@opendns.com   Email: dan@opendns.com
          Twitter: @davidu           Twitter: @dhubbard858

#31 ŸŸ 28-
Nov-12

More Related Content

What's hot

IT FUTURE 2011 - Présentation d'Intel
IT FUTURE 2011 - Présentation d'IntelIT FUTURE 2011 - Présentation d'Intel
IT FUTURE 2011 - Présentation d'IntelFujitsu France
 
Clavister Csp Sit Group
Clavister Csp Sit GroupClavister Csp Sit Group
Clavister Csp Sit Grouptwproject
 
Open Cloud System Networking Vision
Open Cloud System Networking VisionOpen Cloud System Networking Vision
Open Cloud System Networking VisionRandy Bias
 
A GENERIC FRAMEWORK FOR DEVICE PAIRING IN UBIQUITOUS COMPUTING ENVIRONMENTS
A GENERIC FRAMEWORK FOR DEVICE PAIRING IN UBIQUITOUS COMPUTING ENVIRONMENTSA GENERIC FRAMEWORK FOR DEVICE PAIRING IN UBIQUITOUS COMPUTING ENVIRONMENTS
A GENERIC FRAMEWORK FOR DEVICE PAIRING IN UBIQUITOUS COMPUTING ENVIRONMENTSIJNSA Journal
 
Bapinger Network Security
Bapinger Network SecurityBapinger Network Security
Bapinger Network SecurityDjadja Sardjana
 
Tech trendnotes
Tech trendnotesTech trendnotes
Tech trendnotesStudying
 
Egress Switch Datasheet
Egress Switch Datasheet Egress Switch Datasheet
Egress Switch Datasheet yonifine
 
Peering Through the Cloud Forrester EMEA 2010
Peering Through the Cloud Forrester EMEA 2010Peering Through the Cloud Forrester EMEA 2010
Peering Through the Cloud Forrester EMEA 2010graywilliams
 
StoneGate_Конкурс продуктов портала VirtualizationSecurityGroup.Ru_продукт пр...
StoneGate_Конкурс продуктов портала VirtualizationSecurityGroup.Ru_продукт пр...StoneGate_Конкурс продуктов портала VirtualizationSecurityGroup.Ru_продукт пр...
StoneGate_Конкурс продуктов портала VirtualizationSecurityGroup.Ru_продукт пр...VirtSGR
 
Stealth solution for healthcare
Stealth solution for healthcareStealth solution for healthcare
Stealth solution for healthcarePeter de Bruijn
 
What to curate? Preserving and Curating Software-Based Art
What to curate? Preserving and Curating Software-Based ArtWhat to curate? Preserving and Curating Software-Based Art
What to curate? Preserving and Curating Software-Based Artneilgrindley
 
Trend Micro - 13martie2012
Trend Micro - 13martie2012Trend Micro - 13martie2012
Trend Micro - 13martie2012Agora Group
 
Take Control of End User Security
Take Control of End User SecurityTake Control of End User Security
Take Control of End User Securityanniebrowny
 
Trend Micro Dec 6 Toronto VMUG
Trend Micro Dec 6 Toronto VMUGTrend Micro Dec 6 Toronto VMUG
Trend Micro Dec 6 Toronto VMUGtovmug
 
I GOvirtual En Brochure
I GOvirtual En BrochureI GOvirtual En Brochure
I GOvirtual En Brochureguybelliveau
 
Enabling High Level Application Development In The Internet Of Things
Enabling High Level Application Development In The Internet Of ThingsEnabling High Level Application Development In The Internet Of Things
Enabling High Level Application Development In The Internet Of ThingsPankesh Patel
 
The next generation ethernet gangster (part 3)
The next generation ethernet gangster (part 3)The next generation ethernet gangster (part 3)
The next generation ethernet gangster (part 3)Jeff Green
 

What's hot (20)

IT FUTURE 2011 - Présentation d'Intel
IT FUTURE 2011 - Présentation d'IntelIT FUTURE 2011 - Présentation d'Intel
IT FUTURE 2011 - Présentation d'Intel
 
Clavister Csp Sit Group
Clavister Csp Sit GroupClavister Csp Sit Group
Clavister Csp Sit Group
 
Open Cloud System Networking Vision
Open Cloud System Networking VisionOpen Cloud System Networking Vision
Open Cloud System Networking Vision
 
A GENERIC FRAMEWORK FOR DEVICE PAIRING IN UBIQUITOUS COMPUTING ENVIRONMENTS
A GENERIC FRAMEWORK FOR DEVICE PAIRING IN UBIQUITOUS COMPUTING ENVIRONMENTSA GENERIC FRAMEWORK FOR DEVICE PAIRING IN UBIQUITOUS COMPUTING ENVIRONMENTS
A GENERIC FRAMEWORK FOR DEVICE PAIRING IN UBIQUITOUS COMPUTING ENVIRONMENTS
 
Cloud Provisioning
Cloud ProvisioningCloud Provisioning
Cloud Provisioning
 
Bapinger Network Security
Bapinger Network SecurityBapinger Network Security
Bapinger Network Security
 
Wireless Distributed Sensor Networks Verhaert
Wireless Distributed Sensor Networks VerhaertWireless Distributed Sensor Networks Verhaert
Wireless Distributed Sensor Networks Verhaert
 
Tech trendnotes
Tech trendnotesTech trendnotes
Tech trendnotes
 
Egress Switch Datasheet
Egress Switch Datasheet Egress Switch Datasheet
Egress Switch Datasheet
 
Asigra Story
Asigra StoryAsigra Story
Asigra Story
 
Peering Through the Cloud Forrester EMEA 2010
Peering Through the Cloud Forrester EMEA 2010Peering Through the Cloud Forrester EMEA 2010
Peering Through the Cloud Forrester EMEA 2010
 
StoneGate_Конкурс продуктов портала VirtualizationSecurityGroup.Ru_продукт пр...
StoneGate_Конкурс продуктов портала VirtualizationSecurityGroup.Ru_продукт пр...StoneGate_Конкурс продуктов портала VirtualizationSecurityGroup.Ru_продукт пр...
StoneGate_Конкурс продуктов портала VirtualizationSecurityGroup.Ru_продукт пр...
 
Stealth solution for healthcare
Stealth solution for healthcareStealth solution for healthcare
Stealth solution for healthcare
 
What to curate? Preserving and Curating Software-Based Art
What to curate? Preserving and Curating Software-Based ArtWhat to curate? Preserving and Curating Software-Based Art
What to curate? Preserving and Curating Software-Based Art
 
Trend Micro - 13martie2012
Trend Micro - 13martie2012Trend Micro - 13martie2012
Trend Micro - 13martie2012
 
Take Control of End User Security
Take Control of End User SecurityTake Control of End User Security
Take Control of End User Security
 
Trend Micro Dec 6 Toronto VMUG
Trend Micro Dec 6 Toronto VMUGTrend Micro Dec 6 Toronto VMUG
Trend Micro Dec 6 Toronto VMUG
 
I GOvirtual En Brochure
I GOvirtual En BrochureI GOvirtual En Brochure
I GOvirtual En Brochure
 
Enabling High Level Application Development In The Internet Of Things
Enabling High Level Application Development In The Internet Of ThingsEnabling High Level Application Development In The Internet Of Things
Enabling High Level Application Development In The Internet Of Things
 
The next generation ethernet gangster (part 3)
The next generation ethernet gangster (part 3)The next generation ethernet gangster (part 3)
The next generation ethernet gangster (part 3)
 

Viewers also liked

The Art of Effective Lean Communication
The Art of Effective Lean CommunicationThe Art of Effective Lean Communication
The Art of Effective Lean CommunicationThe Culture Group
 
Luminesce™ Cellular Rejuvenation Serum Before & After Photo Testimonials
Luminesce™ Cellular Rejuvenation Serum Before & After Photo TestimonialsLuminesce™ Cellular Rejuvenation Serum Before & After Photo Testimonials
Luminesce™ Cellular Rejuvenation Serum Before & After Photo TestimonialsJoyce Nguyen
 
Nic aker copyright project
Nic aker copyright projectNic aker copyright project
Nic aker copyright projectnic1222
 
Desarrollo del pensamiento creativo
Desarrollo del pensamiento creativoDesarrollo del pensamiento creativo
Desarrollo del pensamiento creativoJonathan Elforastero
 
Kotor-naš grad, učenici 4.2 razreda
Kotor-naš grad, učenici 4.2 razredaKotor-naš grad, učenici 4.2 razreda
Kotor-naš grad, učenici 4.2 razredaAnna Milosevic
 
Camtasia getting started guide
Camtasia getting started guideCamtasia getting started guide
Camtasia getting started guideJoyce Nguyen
 
Roya vafaiyan
Roya vafaiyanRoya vafaiyan
Roya vafaiyanrvafaiyan
 
Belle Haven Toy Presentation
Belle Haven Toy PresentationBelle Haven Toy Presentation
Belle Haven Toy Presentationberstor
 
Mandolinski orkestar Hrvatskog građanskog društva
Mandolinski orkestar Hrvatskog građanskog društvaMandolinski orkestar Hrvatskog građanskog društva
Mandolinski orkestar Hrvatskog građanskog društvaAnna Milosevic
 
Photo album kotorska škura
Photo album kotorska škuraPhoto album kotorska škura
Photo album kotorska škuraAnna Milosevic
 
Investigation of students’ motivation towards learning secondary
Investigation of students’ motivation towards learning secondaryInvestigation of students’ motivation towards learning secondary
Investigation of students’ motivation towards learning secondaryrvafaiyan
 
Investigation of students’ motivation towards learning secondary
Investigation of students’ motivation towards learning secondaryInvestigation of students’ motivation towards learning secondary
Investigation of students’ motivation towards learning secondaryrvafaiyan
 

Viewers also liked (18)

The Art of Effective Lean Communication
The Art of Effective Lean CommunicationThe Art of Effective Lean Communication
The Art of Effective Lean Communication
 
Sellingppt
SellingpptSellingppt
Sellingppt
 
Priče sa Pestingrada
Priče sa PestingradaPriče sa Pestingrada
Priče sa Pestingrada
 
Luminesce™ Cellular Rejuvenation Serum Before & After Photo Testimonials
Luminesce™ Cellular Rejuvenation Serum Before & After Photo TestimonialsLuminesce™ Cellular Rejuvenation Serum Before & After Photo Testimonials
Luminesce™ Cellular Rejuvenation Serum Before & After Photo Testimonials
 
Nic aker copyright project
Nic aker copyright projectNic aker copyright project
Nic aker copyright project
 
Desarrollo del pensamiento creativo
Desarrollo del pensamiento creativoDesarrollo del pensamiento creativo
Desarrollo del pensamiento creativo
 
Plan projekta
Plan projektaPlan projekta
Plan projekta
 
Kotor-naš grad, učenici 4.2 razreda
Kotor-naš grad, učenici 4.2 razredaKotor-naš grad, učenici 4.2 razreda
Kotor-naš grad, učenici 4.2 razreda
 
Camtasia getting started guide
Camtasia getting started guideCamtasia getting started guide
Camtasia getting started guide
 
Roya vafaiyan
Roya vafaiyanRoya vafaiyan
Roya vafaiyan
 
Belle Haven Toy Presentation
Belle Haven Toy PresentationBelle Haven Toy Presentation
Belle Haven Toy Presentation
 
Mandolinski orkestar Hrvatskog građanskog društva
Mandolinski orkestar Hrvatskog građanskog društvaMandolinski orkestar Hrvatskog građanskog društva
Mandolinski orkestar Hrvatskog građanskog društva
 
Bebells blog
Bebells blogBebells blog
Bebells blog
 
Bebells blog
Bebells blogBebells blog
Bebells blog
 
Photo album kotorska škura
Photo album kotorska škuraPhoto album kotorska škura
Photo album kotorska škura
 
Investigation of students’ motivation towards learning secondary
Investigation of students’ motivation towards learning secondaryInvestigation of students’ motivation towards learning secondary
Investigation of students’ motivation towards learning secondary
 
Investigation of students’ motivation towards learning secondary
Investigation of students’ motivation towards learning secondaryInvestigation of students’ motivation towards learning secondary
Investigation of students’ motivation towards learning secondary
 
Bumn
BumnBumn
Bumn
 

Similar to Redefining Security for Nomadic Workers Webcast

Cohesive SDN Summit Presentation: OpenFlow is SDN, SDN is not OpenFlow
Cohesive SDN Summit Presentation: OpenFlow is SDN, SDN is not OpenFlowCohesive SDN Summit Presentation: OpenFlow is SDN, SDN is not OpenFlow
Cohesive SDN Summit Presentation: OpenFlow is SDN, SDN is not OpenFlowCohesive Networks
 
Dynamic Software Defined Network Infrastructure Test Bed at Marist College
Dynamic Software Defined Network Infrastructure Test Bed at Marist CollegeDynamic Software Defined Network Infrastructure Test Bed at Marist College
Dynamic Software Defined Network Infrastructure Test Bed at Marist CollegeADVA
 
Using NetFlow to Streamline Security Analysis and Response to Cyber Threats
Using NetFlow to Streamline Security Analysis and Response to Cyber ThreatsUsing NetFlow to Streamline Security Analysis and Response to Cyber Threats
Using NetFlow to Streamline Security Analysis and Response to Cyber ThreatsEmulex Corporation
 
Mikehall FutureWorld 2010 - enabling connectivity
Mikehall FutureWorld 2010 - enabling connectivityMikehall FutureWorld 2010 - enabling connectivity
Mikehall FutureWorld 2010 - enabling connectivityMicrosoft Windows Embedded
 
Breaking the Edge -- A Journey Through Cloud, Edge and Fog Computing
Breaking the Edge -- A Journey Through Cloud, Edge and Fog ComputingBreaking the Edge -- A Journey Through Cloud, Edge and Fog Computing
Breaking the Edge -- A Journey Through Cloud, Edge and Fog ComputingAngelo Corsaro
 
White Paper: Securing Nomadic Workforce
White Paper: Securing Nomadic WorkforceWhite Paper: Securing Nomadic Workforce
White Paper: Securing Nomadic WorkforceCourtland Smith
 
infraxstructure: Emil Gągała "Ludzie, procesy, technika – czy wirtualizacja ...
infraxstructure: Emil Gągała  "Ludzie, procesy, technika – czy wirtualizacja ...infraxstructure: Emil Gągała  "Ludzie, procesy, technika – czy wirtualizacja ...
infraxstructure: Emil Gągała "Ludzie, procesy, technika – czy wirtualizacja ...PROIDEA
 
Application-Aware Network Performance Management
Application-Aware Network Performance ManagementApplication-Aware Network Performance Management
Application-Aware Network Performance ManagementRiverbed Technology
 
Towards the extinction of mega data centres? To which extent should the Clou...
 Towards the extinction of mega data centres? To which extent should the Clou... Towards the extinction of mega data centres? To which extent should the Clou...
Towards the extinction of mega data centres? To which extent should the Clou...Thierry Coupaye
 
Introduction to roof computing by Nishant Krishna
Introduction to roof computing by Nishant KrishnaIntroduction to roof computing by Nishant Krishna
Introduction to roof computing by Nishant KrishnaCodeOps Technologies LLP
 
Technology & Policy Interaction Panel at Inform[ED] IoT Security
Technology & Policy Interaction Panel at Inform[ED] IoT SecurityTechnology & Policy Interaction Panel at Inform[ED] IoT Security
Technology & Policy Interaction Panel at Inform[ED] IoT SecurityCableLabs
 
Cloudcomputing Nivo Consultancy 26 Mei 2009 Versie 1
Cloudcomputing Nivo Consultancy 26 Mei 2009 Versie 1Cloudcomputing Nivo Consultancy 26 Mei 2009 Versie 1
Cloudcomputing Nivo Consultancy 26 Mei 2009 Versie 1Ruud Ramakers
 
IoT Design Principles
IoT Design PrinciplesIoT Design Principles
IoT Design Principlesardexateam
 
Walking through the fog (computing) - Keynote talk at Italian Networking Work...
Walking through the fog (computing) - Keynote talk at Italian Networking Work...Walking through the fog (computing) - Keynote talk at Italian Networking Work...
Walking through the fog (computing) - Keynote talk at Italian Networking Work...FBK CREATE-NET
 
ICRTITCS-2012 Conference Publication
ICRTITCS-2012 Conference PublicationICRTITCS-2012 Conference Publication
ICRTITCS-2012 Conference PublicationTejaswi Agarwal
 
Ixia anue maximum roi from your existing toolsets
Ixia anue   maximum roi from your existing toolsetsIxia anue   maximum roi from your existing toolsets
Ixia anue maximum roi from your existing toolsetsresponsedatacomms
 

Similar to Redefining Security for Nomadic Workers Webcast (20)

Cohesive SDN Summit Presentation: OpenFlow is SDN, SDN is not OpenFlow
Cohesive SDN Summit Presentation: OpenFlow is SDN, SDN is not OpenFlowCohesive SDN Summit Presentation: OpenFlow is SDN, SDN is not OpenFlow
Cohesive SDN Summit Presentation: OpenFlow is SDN, SDN is not OpenFlow
 
Dynamic Software Defined Network Infrastructure Test Bed at Marist College
Dynamic Software Defined Network Infrastructure Test Bed at Marist CollegeDynamic Software Defined Network Infrastructure Test Bed at Marist College
Dynamic Software Defined Network Infrastructure Test Bed at Marist College
 
Using NetFlow to Streamline Security Analysis and Response to Cyber Threats
Using NetFlow to Streamline Security Analysis and Response to Cyber ThreatsUsing NetFlow to Streamline Security Analysis and Response to Cyber Threats
Using NetFlow to Streamline Security Analysis and Response to Cyber Threats
 
Mikehall FutureWorld 2010 - enabling connectivity
Mikehall FutureWorld 2010 - enabling connectivityMikehall FutureWorld 2010 - enabling connectivity
Mikehall FutureWorld 2010 - enabling connectivity
 
Breaking the Edge -- A Journey Through Cloud, Edge and Fog Computing
Breaking the Edge -- A Journey Through Cloud, Edge and Fog ComputingBreaking the Edge -- A Journey Through Cloud, Edge and Fog Computing
Breaking the Edge -- A Journey Through Cloud, Edge and Fog Computing
 
White Paper: Securing Nomadic Workforce
White Paper: Securing Nomadic WorkforceWhite Paper: Securing Nomadic Workforce
White Paper: Securing Nomadic Workforce
 
infraxstructure: Emil Gągała "Ludzie, procesy, technika – czy wirtualizacja ...
infraxstructure: Emil Gągała  "Ludzie, procesy, technika – czy wirtualizacja ...infraxstructure: Emil Gągała  "Ludzie, procesy, technika – czy wirtualizacja ...
infraxstructure: Emil Gągała "Ludzie, procesy, technika – czy wirtualizacja ...
 
Application-Aware Network Performance Management
Application-Aware Network Performance ManagementApplication-Aware Network Performance Management
Application-Aware Network Performance Management
 
Towards the extinction of mega data centres? To which extent should the Clou...
 Towards the extinction of mega data centres? To which extent should the Clou... Towards the extinction of mega data centres? To which extent should the Clou...
Towards the extinction of mega data centres? To which extent should the Clou...
 
NEtwork Security Admin Portal
NEtwork Security Admin PortalNEtwork Security Admin Portal
NEtwork Security Admin Portal
 
Conférence ARBOR ACSS 2018
Conférence ARBOR ACSS 2018Conférence ARBOR ACSS 2018
Conférence ARBOR ACSS 2018
 
Nas nie zaatakują!
Nas nie zaatakują!Nas nie zaatakują!
Nas nie zaatakują!
 
Introduction to roof computing by Nishant Krishna
Introduction to roof computing by Nishant KrishnaIntroduction to roof computing by Nishant Krishna
Introduction to roof computing by Nishant Krishna
 
Technology & Policy Interaction Panel at Inform[ED] IoT Security
Technology & Policy Interaction Panel at Inform[ED] IoT SecurityTechnology & Policy Interaction Panel at Inform[ED] IoT Security
Technology & Policy Interaction Panel at Inform[ED] IoT Security
 
Sdn primer pdf
Sdn primer pdfSdn primer pdf
Sdn primer pdf
 
Cloudcomputing Nivo Consultancy 26 Mei 2009 Versie 1
Cloudcomputing Nivo Consultancy 26 Mei 2009 Versie 1Cloudcomputing Nivo Consultancy 26 Mei 2009 Versie 1
Cloudcomputing Nivo Consultancy 26 Mei 2009 Versie 1
 
IoT Design Principles
IoT Design PrinciplesIoT Design Principles
IoT Design Principles
 
Walking through the fog (computing) - Keynote talk at Italian Networking Work...
Walking through the fog (computing) - Keynote talk at Italian Networking Work...Walking through the fog (computing) - Keynote talk at Italian Networking Work...
Walking through the fog (computing) - Keynote talk at Italian Networking Work...
 
ICRTITCS-2012 Conference Publication
ICRTITCS-2012 Conference PublicationICRTITCS-2012 Conference Publication
ICRTITCS-2012 Conference Publication
 
Ixia anue maximum roi from your existing toolsets
Ixia anue   maximum roi from your existing toolsetsIxia anue   maximum roi from your existing toolsets
Ixia anue maximum roi from your existing toolsets
 

Redefining Security for Nomadic Workers Webcast

  • 1. Redefining Security for the Nomadic Workforce November 28, 2012
  • 2. Webcast Logistics To send us questions during the sessions: •  Type the question in the Q&A section provided in WebEx. We will answer questions at the end of the webcast. Any Technical Issues?   •  Email: martin@opendns.com #2ŸŸ 28-Nov-12
  • 3. Agenda Redefining Security for the Nomadic Worker Dan Hubbard, CTO, OpenDNS       Challenges Of Existing Technologies Dan Hubbard, CTO, OpenDNS       Introducing Umbrella David Ulevitch, CEO and Founder, OpenDNS       Lessons Learned & Deployment Experience   Randy Raw, Network Security Director, Veterans United Home Loans       Q&A Session #3ŸŸ 28-Nov-12
  • 4. Speakers Dan Hubbard David Ulevitch Randy Raw OpenDNS OpenDNS Veterans United Home Loans CTO Founder and CEO Network Security Director #4ŸŸ 28-Nov-12
  • 5. Redefining Security for the Nomadic Worker Dan Hubbard CTO, OpenDNS #5ŸŸ 28-Nov-12
  • 6. The way we work has changed… OLD-SCHOOL THE NEW REALITY #6ŸŸ 28-Nov-12
  • 7. And so have the threats… BYOD and nomadic workers have introduced new challenges http://blog.opendns.com/2012/10/16/cloud-security-alliance-top-threats-to-mobile-computing/ #7ŸŸ 28-Nov-12
  • 10. …as a result, IT is losing visibility and control f10 28-Nov-12 UMBRELL
  • 11. Challenges of Existing Technologies #11 ŸŸ 28- Nov-12
  • 12. Current solutions fail to measure up Host-based IDS a. Host-based FW Netwo Acooss Control #12 • :28- Nov-12 U B EL MRL
  • 13. Current approaches leave mobile devices unprotected Existing solutions are only designed to protect network perimeter…. Internet           Direct-to-Net   …Leaving mobile devices and nomadic users completely unprotected #13 ŸŸ 28- Nov-12
  • 14. InfoSec is undergoing a major transition Device Diversity     We see hundreds of thousands of blocked requests that are connecting to malware, botnets, and phishing sites that are “mobile”. #14 ŸŸ 28- Nov-12
  • 15. Existing technology issues Companies are struggling •  Loss of visibility Hardware Software Cost Cost •  Loss of control •  Increased costs Data Software •  A changing threat landscape Architecture Functionality Incumbents are struggling TCO Software Support and Architecture •  Cloud technology transition Maintenance and Scalability •  Legacy business and technology models User Training Time to Implementation #15 ŸŸ 28- Nov-12
  • 18. Introducing Umbrella David Ulevitch CEO and Founder, OpenDNS #18 ŸŸ 28- Nov-12
  • 19. Introducing Umbrella 11 U M B RW. A 9
  • 20. UMBRELLA: Desktops, laptops, smart devices Do Not Distribute
  • 21. UMBRELLA: Security that evolves with how we work Do Not Distribute
  • 22. UMBRELLA is…       •  Device Agnostic: Aim for all smart networked devices. •  Simple and Easy: Making complex solutions is easy to deploy and manage is a core strength and pre-requisite to effective mobile security. •  Disruptive Delivery: 100% subscription, no hardware, priced per user, not per device. •  Instant Scalability: No sizing guides, unlimited data and bandwidth, low latency, broad breadth with specific and selective depth. “Cloud” from the ground-up, servicing more than 50 Billion requests per day globally with zero downtime. •  Big Data meets Security: Big Data systems combined with security research algorithms to keep ahead of threats. #22ŸŸ 28-Nov-12
  • 23. UMBRELLA: Security for nomadic workers and visibility for IT Any Device Any User Anywhere 14 Global Datacenters   Internet         •  Malware protection •  Botnet containment •  Phishing protection •  Policy enforcement #23ŸŸ 28-Nov-12
  • 24. UMBRELLA: Dashboard Do Not Distribute
  • 25. UMBRELLA: Provision in minutes Do Not Distribute
  • 27. UMBRELLA: Drill down activity search  
  • 28. Lessons Learned and Deployment Experience Randy Raw Network Security Director #28ŸŸ 28-Nov-12
  • 29. About Veterans United Home Loans The nation's largest dedicated provider of VA Loans Dedicated to making the American dream of homeownership a reality for those who so bravely served. 27 offices Distributed across 22 states 1,200 employees #29ŸŸ 28-Nov-12
  • 30. What have we learned? #13:> • 2& Nov-1. 2 • U B EL M RL
  • 31. Q&A and next steps Want to try it today? Limited offer: $20/year for a single-user license of Umbrella Mobility   Visit: www.umbrella.com/umbrella-security-pricing/       To request a product demo visit: sales@opendns.com David Ulevitch Dan Hubbard Randy Raw Email: david@opendns.com Email: dan@opendns.com Twitter: @davidu Twitter: @dhubbard858 #31 ŸŸ 28- Nov-12