SlideShare a Scribd company logo
1 of 20
Download to read offline
CY BERSECURI TY LEA DERS HIP FORUM 2017 | 1
CY BERSECURI TY LEA DERS HIP FORUM 2017 | 2
SECURITY INSIGHTS FOR
MISSION-CRITICAL NETWORKS
Jim Fulton
Sr. Director, Product Marketing, Forcepoint
CY BERSECURI TY LEA DERS HIP FORUM 2017 | 3
Where criticaldata is most valuable– and most
vulnerable
PROTECTING
THE HUMAN POINT
Modern firewallsconnect and protect people and data at the point they come together
– the Human Point
CY BERSECURI TY LEA DERS HIP FORUM 2017 | 4
NETWORK SECURITY HAS INCREASING ROLE IN GOVERNMENT MISSIONS
Optimizing networks
for growth & cost
Handling increasing
encrypted traffic
Reducing breaches/theft
by outsiders & insiders
Reducing overlap,
complexity
Simplifying
complianceand audits
Securing Virtual& Cloud
networks
Cutting TCO burden
Respondingfaster
to emerging threats
Mitigating shortageof
specializedIT expertise
Staying aheadof ever-
shifting perimeter
CY BERSECURI TY LEA DERS HIP FORUM 2017 | 5
CY BERSECURI TY LEA DERS HIP FORUM 2017 | 6
FIELD
OPERATIVES
COMMAND
CENTERS
INTERNATIONAL
PARTNERS
DATACENTERS
CY BERSECURI TY LEA DERS HIP FORUM 2017 | 7
COSTS ARE DRIVEN
BY MANY FACTORS
80%
OF THE
COSTS LIE
BENEATH THE
SURFACE
✖ # of Appliances
✚ Deployment
✚ Installation
✚ Configuration
✚ Updates
✚ Upgrades
✚ Rules
✚ Policies
✚ Signatures
✚ VPN Mesh
✖ # of Appliances
✖ # of Software blades
✖ # of Admins
✖ # of VPN Tunnels
■ Hardware
■ Subscriptions& Licenses
■ Support
THESEARE THE
VISIBLE
COSTS
CY BERSECURI TY LEA DERS HIP FORUM 2017 | 8
NEXT GEN OFFER A MORE-EFFICIENT
FIREWALLS APPROACH
TO CUT INVISIBLE
COSTS
HOW
 Uniform Solutions– Physical,Virtual,Cloud
 Built-in IPS, VPN, NGFW
 Zero-Touch Deployment
 High Availability at Every Level
 WAN Controlwith Low-CostBroadband
 CentralManagement,One-ClickDeployment
 UpgradableSoftware
 Reusable Appliances
CY BERSECURI TY LEA DERS HIP FORUM 2017 | 9
CY BERSECURI TY LEA DERS HIP FORUM 2017 | 10
FIREWALL
CLUSTERING
CY BERSECURI TY LEA DERS HIP FORUM 2017 | 11
UPDATE
POLICIES
UPGRADE
SOFTWARE&
WITHOUTDROPPINGA
SINGLEPACKET
CY BERSECURI TY LEA DERS HIP FORUM 2017 | 12
NETWORK
CLUSTERING
CY BERSECURI TY LEA DERS HIP FORUM 2017 | 13
CY BERSECURI TY LEA DERS HIP FORUM 2017 | 14
HIGH AVAILABILITY FOR MISSION-CRITICAL NETWORKS
ERP BACK UP
VOIP
BROADBAND
MPLS
3/4G
XDSL
SATELLITE
FIBER
CABLEFTP
WEB
NETWORK
CLUSTERING
 Centrally Managed
 Inspected & Encrypted
 Always-on  ControlledBandwidth& Costs
CY BERSECURI TY LEA DERS HIP FORUM 2017 | 15
CY BERSECURI TY LEA DERS HIP FORUM 2017 | 16
SECURITY – STOPPING ATTACKS, BREACHES, THEFT OF DATA
■ VPN
■ User-, app-controls
■ Anti-virus scanning
✚ IPS
✚ Encryptedinspection& privacycontrol
✚ Mission-criticalapplication protection
✚ Anti-botnetdefenses
BASIC NGFW
ADVANCED NGFW
✚ Automation
✚ Policies,Not Rules
✚ Sandboxing
CY BERSECURI TY LEA DERS HIP FORUM 2017 | 17
MODERNSECURITY IS
DYNAMIC
DECRYPTION
ADVANCED
EVASIONDETECTION APPLICATIONPROXIES
SANDBOXING
CY BERSECURI TY LEA DERS HIP FORUM 2017 | 18
MISSION-CRITICAL APPLICATION PROTECTION
NETWORK
Mission-critical
apps & services
STOP
CY BERSECURI TY LEA DERS HIP FORUM 2017 | 19
HOW AGENCIES SHOULD EVALUATE NGFW TECHNOLOGY
Efficiency
Lookfor best centralized management
Sophistication,not complication
Availability
Bestclustering options
Resilience forfirewalls and networks
Security
High-performance IPS,decryption,
VPN Integrated Proxy
Mission Critical
Payback, ROI, downtime and breach data from IDC Research
CY BERSECURI TY LEA DERS HIP FORUM 2017 | 20
THANK YOU

More Related Content

What's hot

Web Performance Without Sacrificing Security: Featuring Forrester Guest Speaker
Web Performance Without Sacrificing Security: Featuring Forrester Guest SpeakerWeb Performance Without Sacrificing Security: Featuring Forrester Guest Speaker
Web Performance Without Sacrificing Security: Featuring Forrester Guest SpeakerCloudflare
 
GDPR aneb jak umí Veritas pomoci být v souladu s tímto nařízením
GDPR aneb jak umí Veritas pomoci být v souladu s tímto nařízenímGDPR aneb jak umí Veritas pomoci být v souladu s tímto nařízením
GDPR aneb jak umí Veritas pomoci být v souladu s tímto nařízenímMarketingArrowECS_CZ
 
Stopping DDoS Attacks in North America
Stopping DDoS Attacks in North AmericaStopping DDoS Attacks in North America
Stopping DDoS Attacks in North AmericaCloudflare
 
It’s 9AM... Do you know what’s happening on your network?
It’s 9AM... Do you know what’s happening on your network?It’s 9AM... Do you know what’s happening on your network?
It’s 9AM... Do you know what’s happening on your network?Cloudflare
 
Strengthening security posture for modern-age SaaS providers
Strengthening security posture for modern-age SaaS providersStrengthening security posture for modern-age SaaS providers
Strengthening security posture for modern-age SaaS providersCloudflare
 
Proteja sus datos en cualquier servicio Cloud y Web de forma unificada
Proteja sus datos en cualquier servicio Cloud y Web de forma unificadaProteja sus datos en cualquier servicio Cloud y Web de forma unificada
Proteja sus datos en cualquier servicio Cloud y Web de forma unificadaCristian Garcia G.
 
Inteligentní ochrana osobních údajů v procesu digitální transformace
Inteligentní ochrana osobních údajů v procesu digitální transformaceInteligentní ochrana osobních údajů v procesu digitální transformace
Inteligentní ochrana osobních údajů v procesu digitální transformaceMarketingArrowECS_CZ
 
How to Build a Practical and Cost-Effective Security Strategy
How to Build a Practical and Cost-Effective Security StrategyHow to Build a Practical and Cost-Effective Security Strategy
How to Build a Practical and Cost-Effective Security StrategyCloudflare
 
Securing Your Cloud Transformation
Securing Your Cloud TransformationSecuring Your Cloud Transformation
Securing Your Cloud TransformationMarketingArrowECS_CZ
 
Dinis Cruz (CV) - CISO and Transformation Agent v1.2
Dinis Cruz (CV) - CISO and Transformation Agent v1.2Dinis Cruz (CV) - CISO and Transformation Agent v1.2
Dinis Cruz (CV) - CISO and Transformation Agent v1.2Dinis Cruz
 
Cisco Live Cancun Collaboration Press
Cisco Live Cancun Collaboration PressCisco Live Cancun Collaboration Press
Cisco Live Cancun Collaboration PressFelipe Lamus
 
Ntxissacsc5 blue 5-holistic approach to cybersecurity-abu_sadeq
Ntxissacsc5 blue 5-holistic approach to cybersecurity-abu_sadeqNtxissacsc5 blue 5-holistic approach to cybersecurity-abu_sadeq
Ntxissacsc5 blue 5-holistic approach to cybersecurity-abu_sadeqNorth Texas Chapter of the ISSA
 
Ntxissacsc5 blue 7-zerotrust more effective approach to security-ed higgins
Ntxissacsc5 blue 7-zerotrust more effective approach to security-ed higginsNtxissacsc5 blue 7-zerotrust more effective approach to security-ed higgins
Ntxissacsc5 blue 7-zerotrust more effective approach to security-ed higginsNorth Texas Chapter of the ISSA
 
The 2019 Security Strategy
The 2019 Security StrategyThe 2019 Security Strategy
The 2019 Security StrategyCloudflare
 
Accelerating Digital Leadership
Accelerating Digital LeadershipAccelerating Digital Leadership
Accelerating Digital LeadershipM2M Alliance e.V.
 
Serverless Security Workflows - cyber talks - 19th nov 2019
Serverless  Security Workflows - cyber talks - 19th nov 2019Serverless  Security Workflows - cyber talks - 19th nov 2019
Serverless Security Workflows - cyber talks - 19th nov 2019Dinis Cruz
 
Cisco Live Cancun PR Session
Cisco Live Cancun PR SessionCisco Live Cancun PR Session
Cisco Live Cancun PR SessionFelipe Lamus
 
The GDPR and What It Means to You
The GDPR and What It Means to YouThe GDPR and What It Means to You
The GDPR and What It Means to YouDelphix
 
Why Your Approach To Data Governance Needs a Major Update
Why Your Approach To Data Governance Needs a Major UpdateWhy Your Approach To Data Governance Needs a Major Update
Why Your Approach To Data Governance Needs a Major UpdateDelphix
 

What's hot (20)

Web Performance Without Sacrificing Security: Featuring Forrester Guest Speaker
Web Performance Without Sacrificing Security: Featuring Forrester Guest SpeakerWeb Performance Without Sacrificing Security: Featuring Forrester Guest Speaker
Web Performance Without Sacrificing Security: Featuring Forrester Guest Speaker
 
GDPR aneb jak umí Veritas pomoci být v souladu s tímto nařízením
GDPR aneb jak umí Veritas pomoci být v souladu s tímto nařízenímGDPR aneb jak umí Veritas pomoci být v souladu s tímto nařízením
GDPR aneb jak umí Veritas pomoci být v souladu s tímto nařízením
 
Stopping DDoS Attacks in North America
Stopping DDoS Attacks in North AmericaStopping DDoS Attacks in North America
Stopping DDoS Attacks in North America
 
It’s 9AM... Do you know what’s happening on your network?
It’s 9AM... Do you know what’s happening on your network?It’s 9AM... Do you know what’s happening on your network?
It’s 9AM... Do you know what’s happening on your network?
 
Ministry of Foreign Affairs
Ministry of Foreign AffairsMinistry of Foreign Affairs
Ministry of Foreign Affairs
 
Strengthening security posture for modern-age SaaS providers
Strengthening security posture for modern-age SaaS providersStrengthening security posture for modern-age SaaS providers
Strengthening security posture for modern-age SaaS providers
 
Proteja sus datos en cualquier servicio Cloud y Web de forma unificada
Proteja sus datos en cualquier servicio Cloud y Web de forma unificadaProteja sus datos en cualquier servicio Cloud y Web de forma unificada
Proteja sus datos en cualquier servicio Cloud y Web de forma unificada
 
Inteligentní ochrana osobních údajů v procesu digitální transformace
Inteligentní ochrana osobních údajů v procesu digitální transformaceInteligentní ochrana osobních údajů v procesu digitální transformace
Inteligentní ochrana osobních údajů v procesu digitální transformace
 
How to Build a Practical and Cost-Effective Security Strategy
How to Build a Practical and Cost-Effective Security StrategyHow to Build a Practical and Cost-Effective Security Strategy
How to Build a Practical and Cost-Effective Security Strategy
 
Securing Your Cloud Transformation
Securing Your Cloud TransformationSecuring Your Cloud Transformation
Securing Your Cloud Transformation
 
Dinis Cruz (CV) - CISO and Transformation Agent v1.2
Dinis Cruz (CV) - CISO and Transformation Agent v1.2Dinis Cruz (CV) - CISO and Transformation Agent v1.2
Dinis Cruz (CV) - CISO and Transformation Agent v1.2
 
Cisco Live Cancun Collaboration Press
Cisco Live Cancun Collaboration PressCisco Live Cancun Collaboration Press
Cisco Live Cancun Collaboration Press
 
Ntxissacsc5 blue 5-holistic approach to cybersecurity-abu_sadeq
Ntxissacsc5 blue 5-holistic approach to cybersecurity-abu_sadeqNtxissacsc5 blue 5-holistic approach to cybersecurity-abu_sadeq
Ntxissacsc5 blue 5-holistic approach to cybersecurity-abu_sadeq
 
Ntxissacsc5 blue 7-zerotrust more effective approach to security-ed higgins
Ntxissacsc5 blue 7-zerotrust more effective approach to security-ed higginsNtxissacsc5 blue 7-zerotrust more effective approach to security-ed higgins
Ntxissacsc5 blue 7-zerotrust more effective approach to security-ed higgins
 
The 2019 Security Strategy
The 2019 Security StrategyThe 2019 Security Strategy
The 2019 Security Strategy
 
Accelerating Digital Leadership
Accelerating Digital LeadershipAccelerating Digital Leadership
Accelerating Digital Leadership
 
Serverless Security Workflows - cyber talks - 19th nov 2019
Serverless  Security Workflows - cyber talks - 19th nov 2019Serverless  Security Workflows - cyber talks - 19th nov 2019
Serverless Security Workflows - cyber talks - 19th nov 2019
 
Cisco Live Cancun PR Session
Cisco Live Cancun PR SessionCisco Live Cancun PR Session
Cisco Live Cancun PR Session
 
The GDPR and What It Means to You
The GDPR and What It Means to YouThe GDPR and What It Means to You
The GDPR and What It Means to You
 
Why Your Approach To Data Governance Needs a Major Update
Why Your Approach To Data Governance Needs a Major UpdateWhy Your Approach To Data Governance Needs a Major Update
Why Your Approach To Data Governance Needs a Major Update
 

Similar to Security Insights for Mission-Critical Networks

Exhibitor session: Efficient IP
Exhibitor session: Efficient IPExhibitor session: Efficient IP
Exhibitor session: Efficient IPJisc
 
PLNOG15: Session Border Controller – cost effective virtualized and cloud dep...
PLNOG15: Session Border Controller – cost effective virtualized and cloud dep...PLNOG15: Session Border Controller – cost effective virtualized and cloud dep...
PLNOG15: Session Border Controller – cost effective virtualized and cloud dep...PROIDEA
 
Faster to 5G
Faster to 5GFaster to 5G
Faster to 5GEricsson
 
Businessday okt 2016 - Xirrus
Businessday okt 2016 - Xirrus Businessday okt 2016 - Xirrus
Businessday okt 2016 - Xirrus Marketing Team
 
Deliver The Latest Wave 2 Wi-Fi as a Service | The Future of Sophisticated Wi...
Deliver The Latest Wave 2 Wi-Fi as a Service | The Future of Sophisticated Wi...Deliver The Latest Wave 2 Wi-Fi as a Service | The Future of Sophisticated Wi...
Deliver The Latest Wave 2 Wi-Fi as a Service | The Future of Sophisticated Wi...Xirrus
 
Security and services drive data north
Security and services drive data northSecurity and services drive data north
Security and services drive data northADVA
 
Network Service Business: Transformation with Service Provider SDN, NFV and C...
Network Service Business: Transformation with Service Provider SDN, NFV and C...Network Service Business: Transformation with Service Provider SDN, NFV and C...
Network Service Business: Transformation with Service Provider SDN, NFV and C...Ericsson
 
DETENIENDO LOS ATAQUES DDOS CON NSFOCUS
DETENIENDO LOS ATAQUES DDOS CON NSFOCUSDETENIENDO LOS ATAQUES DDOS CON NSFOCUS
DETENIENDO LOS ATAQUES DDOS CON NSFOCUSCristian Garcia G.
 
Cisco Connect Vancouver 2017 - Cisco Meraki -Let Simple Work For You
Cisco Connect Vancouver 2017 - Cisco Meraki -Let Simple Work For YouCisco Connect Vancouver 2017 - Cisco Meraki -Let Simple Work For You
Cisco Connect Vancouver 2017 - Cisco Meraki -Let Simple Work For YouCisco Canada
 
Cisco Connect 2018 Malaysia - Programmability and telemetry for future networks
Cisco Connect 2018 Malaysia - Programmability and telemetry for future networksCisco Connect 2018 Malaysia - Programmability and telemetry for future networks
Cisco Connect 2018 Malaysia - Programmability and telemetry for future networksNetworkCollaborators
 
Forcepoint SD-WAN and NGFW + IPS
Forcepoint SD-WAN and NGFW + IPSForcepoint SD-WAN and NGFW + IPS
Forcepoint SD-WAN and NGFW + IPSLarry Austin
 
Nvis, inc. 03 18-2020 - final
Nvis, inc. 03 18-2020 - finalNvis, inc. 03 18-2020 - final
Nvis, inc. 03 18-2020 - finalA. Phillip Smith
 
M2M deployments in SDN Enabled IPv6 Networks
M2M deployments in SDN Enabled IPv6 NetworksM2M deployments in SDN Enabled IPv6 Networks
M2M deployments in SDN Enabled IPv6 NetworksEricsson
 
Cisco Connect Toronto 2017 - NFV/SDN Platform for Orchestrating Cloud and vBr...
Cisco Connect Toronto 2017 - NFV/SDN Platform for Orchestrating Cloud and vBr...Cisco Connect Toronto 2017 - NFV/SDN Platform for Orchestrating Cloud and vBr...
Cisco Connect Toronto 2017 - NFV/SDN Platform for Orchestrating Cloud and vBr...Cisco Canada
 
Mobile enterprise sept 24 v1
Mobile enterprise sept 24 v1Mobile enterprise sept 24 v1
Mobile enterprise sept 24 v1Wilfried Grommen
 

Similar to Security Insights for Mission-Critical Networks (20)

Exhibitor session: Efficient IP
Exhibitor session: Efficient IPExhibitor session: Efficient IP
Exhibitor session: Efficient IP
 
PLNOG15: Session Border Controller – cost effective virtualized and cloud dep...
PLNOG15: Session Border Controller – cost effective virtualized and cloud dep...PLNOG15: Session Border Controller – cost effective virtualized and cloud dep...
PLNOG15: Session Border Controller – cost effective virtualized and cloud dep...
 
Faster to 5G
Faster to 5GFaster to 5G
Faster to 5G
 
Businessday okt 2016 - Xirrus
Businessday okt 2016 - Xirrus Businessday okt 2016 - Xirrus
Businessday okt 2016 - Xirrus
 
Deliver The Latest Wave 2 Wi-Fi as a Service | The Future of Sophisticated Wi...
Deliver The Latest Wave 2 Wi-Fi as a Service | The Future of Sophisticated Wi...Deliver The Latest Wave 2 Wi-Fi as a Service | The Future of Sophisticated Wi...
Deliver The Latest Wave 2 Wi-Fi as a Service | The Future of Sophisticated Wi...
 
Security and services drive data north
Security and services drive data northSecurity and services drive data north
Security and services drive data north
 
Clouding the Networked Society
Clouding the Networked SocietyClouding the Networked Society
Clouding the Networked Society
 
Webinar connectivity vs hybrid networking
Webinar connectivity vs hybrid networkingWebinar connectivity vs hybrid networking
Webinar connectivity vs hybrid networking
 
Network Service Business: Transformation with Service Provider SDN, NFV and C...
Network Service Business: Transformation with Service Provider SDN, NFV and C...Network Service Business: Transformation with Service Provider SDN, NFV and C...
Network Service Business: Transformation with Service Provider SDN, NFV and C...
 
DETENIENDO LOS ATAQUES DDOS CON NSFOCUS
DETENIENDO LOS ATAQUES DDOS CON NSFOCUSDETENIENDO LOS ATAQUES DDOS CON NSFOCUS
DETENIENDO LOS ATAQUES DDOS CON NSFOCUS
 
Netpluz corp presentation 2020
Netpluz corp presentation 2020Netpluz corp presentation 2020
Netpluz corp presentation 2020
 
Cisco Connect Vancouver 2017 - Cisco Meraki -Let Simple Work For You
Cisco Connect Vancouver 2017 - Cisco Meraki -Let Simple Work For YouCisco Connect Vancouver 2017 - Cisco Meraki -Let Simple Work For You
Cisco Connect Vancouver 2017 - Cisco Meraki -Let Simple Work For You
 
Cisco Connect 2018 Malaysia - Programmability and telemetry for future networks
Cisco Connect 2018 Malaysia - Programmability and telemetry for future networksCisco Connect 2018 Malaysia - Programmability and telemetry for future networks
Cisco Connect 2018 Malaysia - Programmability and telemetry for future networks
 
Forcepoint SD-WAN and NGFW + IPS
Forcepoint SD-WAN and NGFW + IPSForcepoint SD-WAN and NGFW + IPS
Forcepoint SD-WAN and NGFW + IPS
 
Nvis, inc. 03 18-2020 - final
Nvis, inc. 03 18-2020 - finalNvis, inc. 03 18-2020 - final
Nvis, inc. 03 18-2020 - final
 
M2M deployments in SDN Enabled IPv6 Networks
M2M deployments in SDN Enabled IPv6 NetworksM2M deployments in SDN Enabled IPv6 Networks
M2M deployments in SDN Enabled IPv6 Networks
 
Innovation Connected
Innovation ConnectedInnovation Connected
Innovation Connected
 
ICC Networking handles BYOD & BYOC
ICC Networking handles BYOD & BYOCICC Networking handles BYOD & BYOC
ICC Networking handles BYOD & BYOC
 
Cisco Connect Toronto 2017 - NFV/SDN Platform for Orchestrating Cloud and vBr...
Cisco Connect Toronto 2017 - NFV/SDN Platform for Orchestrating Cloud and vBr...Cisco Connect Toronto 2017 - NFV/SDN Platform for Orchestrating Cloud and vBr...
Cisco Connect Toronto 2017 - NFV/SDN Platform for Orchestrating Cloud and vBr...
 
Mobile enterprise sept 24 v1
Mobile enterprise sept 24 v1Mobile enterprise sept 24 v1
Mobile enterprise sept 24 v1
 

More from Forcepoint LLC

Rethinking the concept of trust (DoDIIS 2019 presentation)
Rethinking the concept of trust (DoDIIS 2019 presentation)Rethinking the concept of trust (DoDIIS 2019 presentation)
Rethinking the concept of trust (DoDIIS 2019 presentation)Forcepoint LLC
 
Sparking Curiosity to Change Security Behaviors
Sparking Curiosity to Change Security BehaviorsSparking Curiosity to Change Security Behaviors
Sparking Curiosity to Change Security BehaviorsForcepoint LLC
 
Understanding the "Intelligence" in AI
Understanding the "Intelligence" in AIUnderstanding the "Intelligence" in AI
Understanding the "Intelligence" in AIForcepoint LLC
 
Weary Warriors: Reducing the Impact of Wishful Thinking & Fatigue on Informat...
Weary Warriors: Reducing the Impact of Wishful Thinking & Fatigue on Informat...Weary Warriors: Reducing the Impact of Wishful Thinking & Fatigue on Informat...
Weary Warriors: Reducing the Impact of Wishful Thinking & Fatigue on Informat...Forcepoint LLC
 
AI and ML in Cybersecurity
AI and ML in CybersecurityAI and ML in Cybersecurity
AI and ML in CybersecurityForcepoint LLC
 
Using Language Modeling to Verify User Identities
Using Language Modeling to Verify User IdentitiesUsing Language Modeling to Verify User Identities
Using Language Modeling to Verify User IdentitiesForcepoint LLC
 
Driving the successful adoption of Microsoft Office 365
Driving the successful adoption of Microsoft Office 365Driving the successful adoption of Microsoft Office 365
Driving the successful adoption of Microsoft Office 365Forcepoint LLC
 
Securing Beyond the Cloud Generation
Securing Beyond the Cloud GenerationSecuring Beyond the Cloud Generation
Securing Beyond the Cloud GenerationForcepoint LLC
 
Forcepoint Advanced Malware Detection
Forcepoint Advanced Malware DetectionForcepoint Advanced Malware Detection
Forcepoint Advanced Malware DetectionForcepoint LLC
 
Top 5 Information Security Lessons Learned from Transitioning to the Cloud
Top 5 Information Security Lessons Learned from Transitioning to the CloudTop 5 Information Security Lessons Learned from Transitioning to the Cloud
Top 5 Information Security Lessons Learned from Transitioning to the CloudForcepoint LLC
 
CASB: Securing your cloud applications
CASB: Securing your cloud applicationsCASB: Securing your cloud applications
CASB: Securing your cloud applicationsForcepoint LLC
 
One Year After WannaCry - Has Anything Changed? A Root Cause Analysis of Data...
One Year After WannaCry - Has Anything Changed? A Root Cause Analysis of Data...One Year After WannaCry - Has Anything Changed? A Root Cause Analysis of Data...
One Year After WannaCry - Has Anything Changed? A Root Cause Analysis of Data...Forcepoint LLC
 
GDPR is Here. Now What?
GDPR is Here. Now What?GDPR is Here. Now What?
GDPR is Here. Now What?Forcepoint LLC
 
Addressing Future Risks and Legal Challenges of Insider Threats
Addressing Future Risks and Legal Challenges of Insider ThreatsAddressing Future Risks and Legal Challenges of Insider Threats
Addressing Future Risks and Legal Challenges of Insider ThreatsForcepoint LLC
 
A Predictive “Precrime” Approach Requires a Human Focus
A Predictive “Precrime” Approach Requires a Human FocusA Predictive “Precrime” Approach Requires a Human Focus
A Predictive “Precrime” Approach Requires a Human FocusForcepoint LLC
 
Cyber Convergence, Warfare and You
Cyber Convergence, Warfare and YouCyber Convergence, Warfare and You
Cyber Convergence, Warfare and YouForcepoint LLC
 
Securing the Global Mission: Enabling Effective Information Sharing (DoD MPE-IS)
Securing the Global Mission: Enabling Effective Information Sharing (DoD MPE-IS)Securing the Global Mission: Enabling Effective Information Sharing (DoD MPE-IS)
Securing the Global Mission: Enabling Effective Information Sharing (DoD MPE-IS)Forcepoint LLC
 
Revolutionary, Not Evolutionary
Revolutionary, Not EvolutionaryRevolutionary, Not Evolutionary
Revolutionary, Not EvolutionaryForcepoint LLC
 
Cybersecurity and the Human Psyche
Cybersecurity and the Human PsycheCybersecurity and the Human Psyche
Cybersecurity and the Human PsycheForcepoint LLC
 

More from Forcepoint LLC (20)

Rethinking the concept of trust (DoDIIS 2019 presentation)
Rethinking the concept of trust (DoDIIS 2019 presentation)Rethinking the concept of trust (DoDIIS 2019 presentation)
Rethinking the concept of trust (DoDIIS 2019 presentation)
 
Sparking Curiosity to Change Security Behaviors
Sparking Curiosity to Change Security BehaviorsSparking Curiosity to Change Security Behaviors
Sparking Curiosity to Change Security Behaviors
 
Understanding the "Intelligence" in AI
Understanding the "Intelligence" in AIUnderstanding the "Intelligence" in AI
Understanding the "Intelligence" in AI
 
Weary Warriors: Reducing the Impact of Wishful Thinking & Fatigue on Informat...
Weary Warriors: Reducing the Impact of Wishful Thinking & Fatigue on Informat...Weary Warriors: Reducing the Impact of Wishful Thinking & Fatigue on Informat...
Weary Warriors: Reducing the Impact of Wishful Thinking & Fatigue on Informat...
 
AI and ML in Cybersecurity
AI and ML in CybersecurityAI and ML in Cybersecurity
AI and ML in Cybersecurity
 
Using Language Modeling to Verify User Identities
Using Language Modeling to Verify User IdentitiesUsing Language Modeling to Verify User Identities
Using Language Modeling to Verify User Identities
 
Driving the successful adoption of Microsoft Office 365
Driving the successful adoption of Microsoft Office 365Driving the successful adoption of Microsoft Office 365
Driving the successful adoption of Microsoft Office 365
 
Securing Beyond the Cloud Generation
Securing Beyond the Cloud GenerationSecuring Beyond the Cloud Generation
Securing Beyond the Cloud Generation
 
Forcepoint Advanced Malware Detection
Forcepoint Advanced Malware DetectionForcepoint Advanced Malware Detection
Forcepoint Advanced Malware Detection
 
Top 5 Information Security Lessons Learned from Transitioning to the Cloud
Top 5 Information Security Lessons Learned from Transitioning to the CloudTop 5 Information Security Lessons Learned from Transitioning to the Cloud
Top 5 Information Security Lessons Learned from Transitioning to the Cloud
 
CASB: Securing your cloud applications
CASB: Securing your cloud applicationsCASB: Securing your cloud applications
CASB: Securing your cloud applications
 
One Year After WannaCry - Has Anything Changed? A Root Cause Analysis of Data...
One Year After WannaCry - Has Anything Changed? A Root Cause Analysis of Data...One Year After WannaCry - Has Anything Changed? A Root Cause Analysis of Data...
One Year After WannaCry - Has Anything Changed? A Root Cause Analysis of Data...
 
GDPR is Here. Now What?
GDPR is Here. Now What?GDPR is Here. Now What?
GDPR is Here. Now What?
 
Addressing Future Risks and Legal Challenges of Insider Threats
Addressing Future Risks and Legal Challenges of Insider ThreatsAddressing Future Risks and Legal Challenges of Insider Threats
Addressing Future Risks and Legal Challenges of Insider Threats
 
A Predictive “Precrime” Approach Requires a Human Focus
A Predictive “Precrime” Approach Requires a Human FocusA Predictive “Precrime” Approach Requires a Human Focus
A Predictive “Precrime” Approach Requires a Human Focus
 
Cyber Convergence, Warfare and You
Cyber Convergence, Warfare and YouCyber Convergence, Warfare and You
Cyber Convergence, Warfare and You
 
Securing the Global Mission: Enabling Effective Information Sharing (DoD MPE-IS)
Securing the Global Mission: Enabling Effective Information Sharing (DoD MPE-IS)Securing the Global Mission: Enabling Effective Information Sharing (DoD MPE-IS)
Securing the Global Mission: Enabling Effective Information Sharing (DoD MPE-IS)
 
Shift the Burden
Shift the BurdenShift the Burden
Shift the Burden
 
Revolutionary, Not Evolutionary
Revolutionary, Not EvolutionaryRevolutionary, Not Evolutionary
Revolutionary, Not Evolutionary
 
Cybersecurity and the Human Psyche
Cybersecurity and the Human PsycheCybersecurity and the Human Psyche
Cybersecurity and the Human Psyche
 

Recently uploaded

#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 

Recently uploaded (20)

#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 

Security Insights for Mission-Critical Networks

  • 1. CY BERSECURI TY LEA DERS HIP FORUM 2017 | 1
  • 2. CY BERSECURI TY LEA DERS HIP FORUM 2017 | 2 SECURITY INSIGHTS FOR MISSION-CRITICAL NETWORKS Jim Fulton Sr. Director, Product Marketing, Forcepoint
  • 3. CY BERSECURI TY LEA DERS HIP FORUM 2017 | 3 Where criticaldata is most valuable– and most vulnerable PROTECTING THE HUMAN POINT Modern firewallsconnect and protect people and data at the point they come together – the Human Point
  • 4. CY BERSECURI TY LEA DERS HIP FORUM 2017 | 4 NETWORK SECURITY HAS INCREASING ROLE IN GOVERNMENT MISSIONS Optimizing networks for growth & cost Handling increasing encrypted traffic Reducing breaches/theft by outsiders & insiders Reducing overlap, complexity Simplifying complianceand audits Securing Virtual& Cloud networks Cutting TCO burden Respondingfaster to emerging threats Mitigating shortageof specializedIT expertise Staying aheadof ever- shifting perimeter
  • 5. CY BERSECURI TY LEA DERS HIP FORUM 2017 | 5
  • 6. CY BERSECURI TY LEA DERS HIP FORUM 2017 | 6 FIELD OPERATIVES COMMAND CENTERS INTERNATIONAL PARTNERS DATACENTERS
  • 7. CY BERSECURI TY LEA DERS HIP FORUM 2017 | 7 COSTS ARE DRIVEN BY MANY FACTORS 80% OF THE COSTS LIE BENEATH THE SURFACE ✖ # of Appliances ✚ Deployment ✚ Installation ✚ Configuration ✚ Updates ✚ Upgrades ✚ Rules ✚ Policies ✚ Signatures ✚ VPN Mesh ✖ # of Appliances ✖ # of Software blades ✖ # of Admins ✖ # of VPN Tunnels ■ Hardware ■ Subscriptions& Licenses ■ Support THESEARE THE VISIBLE COSTS
  • 8. CY BERSECURI TY LEA DERS HIP FORUM 2017 | 8 NEXT GEN OFFER A MORE-EFFICIENT FIREWALLS APPROACH TO CUT INVISIBLE COSTS HOW  Uniform Solutions– Physical,Virtual,Cloud  Built-in IPS, VPN, NGFW  Zero-Touch Deployment  High Availability at Every Level  WAN Controlwith Low-CostBroadband  CentralManagement,One-ClickDeployment  UpgradableSoftware  Reusable Appliances
  • 9. CY BERSECURI TY LEA DERS HIP FORUM 2017 | 9
  • 10. CY BERSECURI TY LEA DERS HIP FORUM 2017 | 10 FIREWALL CLUSTERING
  • 11. CY BERSECURI TY LEA DERS HIP FORUM 2017 | 11 UPDATE POLICIES UPGRADE SOFTWARE& WITHOUTDROPPINGA SINGLEPACKET
  • 12. CY BERSECURI TY LEA DERS HIP FORUM 2017 | 12 NETWORK CLUSTERING
  • 13. CY BERSECURI TY LEA DERS HIP FORUM 2017 | 13
  • 14. CY BERSECURI TY LEA DERS HIP FORUM 2017 | 14 HIGH AVAILABILITY FOR MISSION-CRITICAL NETWORKS ERP BACK UP VOIP BROADBAND MPLS 3/4G XDSL SATELLITE FIBER CABLEFTP WEB NETWORK CLUSTERING  Centrally Managed  Inspected & Encrypted  Always-on  ControlledBandwidth& Costs
  • 15. CY BERSECURI TY LEA DERS HIP FORUM 2017 | 15
  • 16. CY BERSECURI TY LEA DERS HIP FORUM 2017 | 16 SECURITY – STOPPING ATTACKS, BREACHES, THEFT OF DATA ■ VPN ■ User-, app-controls ■ Anti-virus scanning ✚ IPS ✚ Encryptedinspection& privacycontrol ✚ Mission-criticalapplication protection ✚ Anti-botnetdefenses BASIC NGFW ADVANCED NGFW ✚ Automation ✚ Policies,Not Rules ✚ Sandboxing
  • 17. CY BERSECURI TY LEA DERS HIP FORUM 2017 | 17 MODERNSECURITY IS DYNAMIC DECRYPTION ADVANCED EVASIONDETECTION APPLICATIONPROXIES SANDBOXING
  • 18. CY BERSECURI TY LEA DERS HIP FORUM 2017 | 18 MISSION-CRITICAL APPLICATION PROTECTION NETWORK Mission-critical apps & services STOP
  • 19. CY BERSECURI TY LEA DERS HIP FORUM 2017 | 19 HOW AGENCIES SHOULD EVALUATE NGFW TECHNOLOGY Efficiency Lookfor best centralized management Sophistication,not complication Availability Bestclustering options Resilience forfirewalls and networks Security High-performance IPS,decryption, VPN Integrated Proxy Mission Critical Payback, ROI, downtime and breach data from IDC Research
  • 20. CY BERSECURI TY LEA DERS HIP FORUM 2017 | 20 THANK YOU