This presentation covers the challenges and potential risks each device connected to a corporate network creates. It provides some of the recommended security approaches an organisation should comply with and the processes they should follow.
2. Agenda
• Network and Endpoint Security – what is it?
• Problems and risks
• Impact and cost of a security breach
• How to implement Network and Endpoint Security?
• Endpoint Security management
• Challenges
• Real example of an ineffective implementation
• Online world and Hackers
• Network and endpoint security on the mainframe
28. • Defence Manager Daemon
• Traffic Regulation Management Daemon
• Syslog Daemon (SyslogD)
• SNA environment
• Enterprise Edition (EE) connections make
sure who they are connected to and what
access the 3rd parties has
• Internal Telnet connections
Network and Endpoint security on the
mainframe
30. • Review your security policies across the board
• Review your technological estate
• Provide regular training and awareness
• Keep your systems up-to-date
• Segregate and do not allow devices that do not meet
the minimum security requirements
• Perform regular security audits, and pen tests
• Pay special attention to default settings
• Always assume you’ve already been hacked!
Before we go, a quick review