SlideShare a Scribd company logo
Why	
  Perimeter	
  Security	
  is	
  Failing	
  
A	
  presenta6on	
  by	
  SECUDE	
  
In	
  light	
  of	
  recent	
  data	
  breaches,	
  tradi6onal	
  
perimeter	
  security	
  simply	
  
	
  
	
  
	
  
	
  
	
  
In	
  light	
  of	
  recent	
  data	
  breaches,	
  tradi6onal	
  
perimeter	
  security	
  simply	
  
	
  
	
  
	
  Perimeters	
  can	
  easily	
  be	
  penetrated	
  at	
  key	
  
exposure	
  points	
  where	
  cri6cal	
  business	
  data	
  is	
  
store,	
  used,	
  and	
  processed	
  
A	
  companies	
  greatest	
  risk	
  
Is	
  also	
  their	
  greatest	
  asset	
  
A	
  companies	
  greatest	
  risk	
  
Corporate	
  data	
  stored	
  on	
  databases	
  and	
  
accessible	
  file	
  systems.	
  	
  
Is	
  also	
  their	
  greatest	
  asset	
  
DATA	
  BREACHES	
  ON	
  THE	
  RISE	
  
Data	
  Breaches	
  
47%	
  of	
  all	
  American	
  
adults	
  have	
  been	
  affected	
  
by	
  data	
  breaches	
  
Source:	
  Ponemon	
  Ins6tute	
  
Data	
  Breaches	
  
47%	
  of	
  all	
  American	
  
adults	
  have	
  been	
  affected	
  
by	
  data	
  breaches	
  
Source:	
  Ponemon	
  Ins6tute	
  
More	
  than	
  600	
  reported	
  
data	
  breaches	
  in	
  2013.	
  
A	
  30	
  %	
  increase	
  from	
  
2012	
  
Data	
  Breaches	
  
47%	
  of	
  all	
  American	
  
adults	
  have	
  been	
  affected	
  
by	
  data	
  breaches	
  
Source:	
  Ponemon	
  Ins6tute	
  
More	
  than	
  600	
  reported	
  
data	
  breaches	
  in	
  2013.	
  
A	
  30	
  %	
  increase	
  from	
  
2012	
  
Cybercrime	
  Costs	
  
Global	
  Economy:	
  $575	
  bil	
  
U.S.	
  Economy:	
  $100	
  bil	
  
Annually	
  
Source:	
  Intel	
  Security	
  and	
  the	
  Center	
  for	
  Strategic	
  and	
  Interna6onal	
  Studies	
  
The	
  Security	
  Risk	
  is	
  Real	
  
$5.85 million
Average	
  cost	
  of	
  data	
  breach	
  in	
  USA	
  in	
  2014	
  
Source: 2014 Cost of Data Breach, Ponemon Institute
The	
  Security	
  Risk	
  is	
  Real	
  
42%	
  
29%	
  
30%	
  
Cause of Data Breach
Malicious	
  aYack	
   System	
  glitch	
  
Human	
  error	
  
$5.85 million
Average	
  cost	
  of	
  data	
  breach	
  in	
  USA	
  in	
  2014	
  
Source: 2014 Cost of Data Breach, Ponemon Institute
Source: 2014 Cost of Data Breach, Ponemon Institute
The	
  Security	
  Risk	
  is	
  Real	
  
42%	
  
29%	
  
30%	
  
Cause of Data Breach
Malicious	
  aYack	
   System	
  glitch	
  
Human	
  error	
  
Financial consequences of a data breach
Divided by categories
29%
Reputation
damage
21%
Lost
productivity
12%
Forensics
19%
Lost
revenue
10%
Technical
support
8%
Regulatory
$5.85 million
Source: IBM
Average	
  cost	
  of	
  data	
  breach	
  in	
  USA	
  in	
  2014	
  
Source: 2014 Cost of Data Breach, Ponemon Institute
Source: 2014 Cost of Data Breach, Ponemon Institute
CURRENT	
  STATE	
  OF	
  THE	
  THREAT	
  
LANDSCAPE	
  
0SSN00110101100
100100100101001
10100PASSWORD1
010100101001010
010PII0010010011	
  
 
Today’s	
  Challenges	
  
	
  
Cloud	
  &	
  mobility	
  
	
  
	
  
IT	
  consumeriza6on	
  
	
  
Loss	
  of	
  control	
  over	
  
corporate	
  data	
  
	
  
 
Today’s	
  Challenges	
  
	
  
Cloud	
  &	
  mobility	
   Business	
  collaboraJon	
  
	
  
	
  
IT	
  consumeriza6on	
  
	
  
Loss	
  of	
  control	
  over	
  
corporate	
  data	
  
	
  
	
  
Cloud-­‐based	
  and	
  file-­‐
sharing	
  tools	
  
	
  
No	
  balance	
  between	
  
sharing	
  and	
  security	
  
	
  
 
Today’s	
  Challenges	
  
	
  
Cloud	
  &	
  mobility	
   Security	
  Business	
  collaboraJon	
  
	
  
Data	
  breaches	
  on	
  
the	
  rise	
  
	
  
Eroding	
  enterprise	
  
perimeter	
  
	
  
	
  
	
  
IT	
  consumeriza6on	
  
	
  
Loss	
  of	
  control	
  over	
  
corporate	
  data	
  
	
  
	
  
Cloud-­‐based	
  and	
  file-­‐
sharing	
  tools	
  
	
  
No	
  balance	
  between	
  
sharing	
  and	
  security	
  
	
  
PERIMETER	
  SECURITY	
  IS	
  
NO	
  LONGER	
  ENOUGH	
  
Why	
  Not?	
  
•  Corporate	
  perimeter	
  is	
  eroding/has	
  eroded	
  
•  Businesses	
  don’t	
  know	
  where	
  their	
  data	
  has	
  
become	
  a	
  challenge	
  
•  Keeping	
  track	
  of	
  corporate	
  data	
  is	
  next	
  to	
  
impossible	
  
IT	
  is	
  Borderless	
  
•  Data	
  exists	
  to	
  be	
  
consumed	
  and	
  shared	
  
–  Locking	
  everything	
  down	
  
and	
  disallowing	
  
employees	
  to	
  use	
  data	
  is	
  
counter-­‐produc6ve	
  
–  Data	
  itself	
  should	
  be	
  
protected	
  for	
  secure	
  
movement	
  and	
  usage	
  
Employees	
  
Partner	
  
Internal	
  Threats	
  
Source:	
  Kaspersky	
  Labs	
  
27%	
  of	
  businesses	
  reported	
  having	
  lost	
  sensi6ve	
  
business	
  data	
  due	
  to	
  internal	
  IT	
  threats	
  in	
  the	
  past	
  
year,	
  not	
  external	
  
	
  
Internal	
  Threats	
  
Source:	
  Kaspersky	
  Labs	
  
27%	
  of	
  businesses	
  reported	
  having	
  lost	
  sensi6ve	
  
business	
  data	
  due	
  to	
  internal	
  IT	
  threats	
  in	
  the	
  past	
  
year,	
  not	
  external	
  
	
  
29%	
  of	
  businesses	
  report	
  
accidental	
  data	
  leaks	
  by	
  
staff	
  
That	
  is	
  the	
  2nd	
  most-­‐
common	
  internal	
  
threat	
  and	
  now	
  the	
  
largest	
  source	
  of	
  data	
  
loss	
  
	
  
Internal	
  Threats	
  
Source:	
  Kaspersky	
  Labs	
  
27%	
  of	
  businesses	
  reported	
  having	
  lost	
  sensi6ve	
  
business	
  data	
  due	
  to	
  internal	
  IT	
  threats	
  in	
  the	
  past	
  
year,	
  not	
  external	
  
	
  
29%	
  of	
  businesses	
  report	
  
accidental	
  data	
  leaks	
  by	
  
staff	
  
That	
  is	
  the	
  2nd	
  most-­‐
common	
  internal	
  
threat	
  and	
  now	
  the	
  
largest	
  source	
  of	
  data	
  
loss	
  
	
  
Sodware	
  
vulnerabili6es	
  
are	
  no	
  longer	
  
the	
  greatest	
  
threat	
  	
  
	
  
LAYERED	
  SECURITY	
  APPROACH	
  
Network	
  Protec6on	
  
1	
  
Data	
  Loss	
  PrevenJon	
  (DLP):	
  monitors	
  user	
  ac6vity,	
  restricts	
  
confiden6ally	
  tagged	
  informa6on	
  from	
  being	
  emailed	
  or	
  copied,	
  scans	
  
storage	
  medium	
  for	
  sensi6ve	
  informa6on,	
  and	
  monitors	
  end	
  point	
  
ac6vity.	
  
Firewalls:	
  	
  keeps	
  out	
  unauthorized	
  access	
  
Virtual	
  Private	
  Network	
  (VPN):	
  a	
  virtual	
  point-­‐to-­‐point	
  connec6on	
  
that	
  can	
  be	
  set	
  up	
  either	
  by	
  direct	
  connec6ons	
  or	
  by	
  virtual	
  tunneling	
  
protocols	
  for	
  authorized	
  users	
  outside	
  your	
  network	
  
Storage	
  Protec6on	
  	
  
2	
   Full	
  Disk	
  EncrypJon	
  (FDE):	
  data	
  on	
  a	
  hard	
  drive	
  scrambles	
  when	
  the	
  
machine	
  is	
  off	
  and	
  is	
  decryptable	
  when	
  the	
  machine	
  is	
  running;	
  data	
  
cannot	
  be	
  accessed	
  if	
  a	
  storage	
  medium	
  is	
  lost	
  or	
  stolen	
  
Trusted	
  PlaUorm	
  Module	
  (TPM):	
  an	
  encryp6on	
  method	
  used	
  to	
  verify	
  
the	
  hard	
  disk	
  drive	
  is	
  6ed	
  to	
  specific	
  device	
  using	
  an	
  embedded	
  crypto	
  
processor	
  aYached	
  to	
  the	
  device	
  motherboard	
  
AuthenJcaJon:	
  method	
  to	
  gain	
  access	
  to	
  a	
  storage	
  medium	
  using	
  
unique	
  passwords,	
  pins,	
  biometrics,	
  smart	
  card,	
  or	
  key	
  fob	
  access	
  
File	
  –	
  Based	
  Protec6on	
  
3	
   InformaJon	
  Rights	
  Management	
  (IRM):	
  encrypt	
  and	
  place	
  
policy	
  based	
  access	
  limita6ons	
  to	
  a	
  file	
  allowing	
  for	
  only	
  
permiYed	
  users	
  to	
  use	
  specific	
  opera6ons	
  such	
  as	
  view,	
  edit,	
  
copy,	
  and	
  print	
  the	
  informa6on	
  
Once	
  a	
  layered	
  security	
  approach	
  is	
  enabled	
  and	
  
properly	
  u6lized,	
  informa6on	
  can	
  have	
  
persistent	
  protec6on	
  regardless	
  of	
  whether	
  it	
  is	
  
	
  
	
  in	
  mo6on	
  -­‐	
  NETWORK	
  
at	
  rest	
  -­‐	
  STORAGE	
  
or	
  in	
  use	
  -­‐	
  FILE	
  
Once	
  a	
  layered	
  security	
  approach	
  is	
  enabled	
  and	
  
properly	
  u6lized,	
  informa6on	
  can	
  have	
  
persistent	
  protec6on	
  regardless	
  of	
  whether	
  it	
  is	
  
	
  
	
  in	
  mo6on	
  -­‐	
  NETWORK	
  
at	
  rest	
  -­‐	
  STORAGE	
  
or	
  in	
  use	
  -­‐	
  FILE	
  
Why	
  File-­‐Based	
  Protec6on	
  
	
  Should	
  Not	
  be	
  Overlooked	
  
Sensi6ve	
  informa6on	
  is	
  protected	
  no	
  
maYer	
  where	
  it’s	
  moved,	
  including	
  
mobile	
  and	
  cloud	
  plahorms	
  
Prevents	
  unauthorized	
  viewing	
  and	
  
use	
  of	
  sensi6ve	
  data	
  
The	
  document	
  itself	
  is	
  protected.	
  
Even	
  if	
  hackers	
  get	
  access	
  to	
  the	
  
protected	
  documents,	
  they	
  cannot	
  
“unlock”	
  them	
  to	
  view	
  in	
  clear	
  text	
  	
  
FAIL	
  –	
  SAFE:	
  when	
  other	
  protec6on	
  
mechanisms	
  fail,	
  sensi6ve	
  documents	
  
will	
  s6ll	
  be	
  safely	
  protected	
  
File-­‐Based	
  Protec6on	
  with	
  	
  
Microsod	
  Rights	
  Management	
  
•  Persistent	
  usage	
  policies,	
  which	
  remain	
  with	
  the	
  
informa6on,	
  no	
  maYer	
  where	
  it	
  is	
  moved,	
  sent	
  
or	
  forwarded.	
  
•  An	
  addi6onal	
  layer	
  of	
  privacy	
  to	
  protect	
  sensi6ve	
  
informa6on	
  —such	
  as	
  financial	
  reports,	
  
product	
  specifica6ons,	
  customer	
  data,	
  and	
  confiden6al	
  
e-­‐mail	
  messages—from	
  inten6onally	
  or	
  
accidentally	
  gelng	
  into	
  the	
  wrong	
  hands.	
  
•  Prevent	
  an	
  authorized	
  recipient	
  of	
  restricted	
  content	
  
from	
  forwarding,	
  copying,	
  modifying,	
  prin6ng,	
  faxing,	
  
or	
  pas6ng	
  the	
  content	
  for	
  unauthorized	
  use	
  
Source:	
  Microsod	
  
File-­‐Based	
  Protec6on	
  with	
  
Microsod	
  Rights	
  Management	
  
•  Prevent	
  restricted	
  content	
  from	
  being	
  copied	
  
by	
  using	
  the	
  Print	
  Screen	
  feature	
  in	
  
Microsod	
  Windows	
  
•  Support	
  file	
  expira6on	
  so	
  that	
  content	
  in	
  
documents	
  can	
  no	
  longer	
  be	
  viewed	
  ader	
  a	
  
specified	
  period	
  of	
  6me	
  
•  Enforce	
  corporate	
  policies	
  that	
  govern	
  the	
  use	
  
and	
  dissemina6on	
  of	
  content	
  within	
  the	
  
company	
  
Source:	
  Microsod	
  
Key	
  to	
  Microsod	
  Rights	
  Management	
  	
  
	
  
Protect	
  any	
  file	
  type	
  
	
  
	
  
	
  
	
  
Office	
  docs,	
  PDF,	
  text,	
  and	
  
Images	
  
	
  
	
  
	
  
	
  
	
  
Protect	
  with	
  data-­‐
centric	
  security	
  
	
  
	
  
	
  
	
  
Protec6on	
  stays	
  with	
  data	
  
all	
  the	
  6me	
  
Share	
  with	
  anyone	
  
	
  
	
  
	
  
	
  
	
  
Inside	
  and	
  outside	
  of	
  the	
  
enterprise	
  
	
  
	
  
	
  
	
  
	
  
	
  
	
  
	
  
	
  
Consume	
  on	
  mobile	
  
devices	
  
	
  
	
  
	
  
	
  
Support	
  of	
  most	
  popular	
  
mobile	
  plahorms	
  
Meet	
  varied	
  
organizaJonal	
  needs	
  
	
  
	
  
	
  
	
  
Protec6on	
  enforced	
  in	
  the	
  
cloud	
  or	
  on-­‐premise	
  
Control	
  your	
  keys	
  
	
  
	
  
	
  
	
  
	
  
Delegated	
  access	
  to	
  data	
  
with	
  BYOK	
  
EXTENDING	
  FILE-­‐BASED	
  
PROTECTION	
  TO	
  SAP	
  DATA	
  
Persistent	
  
protecJon	
  	
  
In	
  case	
  device	
  is	
  
lost	
  or	
  stolen	
  or	
  
cloud	
  is	
  hacked,	
  
data	
  is	
  s6ll	
  secure	
  
	
  
Extending	
  RMS	
  file-­‐based	
  
protec6on	
  beyond	
  the	
  
boundaries	
  of	
  the	
  enterprise	
  to	
  
SAP	
  –	
  the	
  largest	
  ERP	
  applica6on	
  
SAP	
  at	
  the	
  Heart	
  of	
  the	
  Enterprise	
  
HR	
  
PII	
  
SSN	
  
Salary	
  figures	
  
FI/FHCM	
  
Bank	
  account	
  numbers	
  	
  
Budgets	
  
Invoices	
  
BW	
  
Strategy	
  details	
  
Vendors	
  and	
  resources	
  
QM	
  
Product	
  specs	
  
Trade	
  process	
  secrets	
  
CRM	
  
Client	
  info	
  
Credit	
  card	
  numbers	
  
PP	
  
Trade	
  secrets	
  
Secret	
  formula	
  
Pricing	
  strategy	
  
CO	
  
Balance	
  sheets	
  
Cash	
  flows	
  
Accounts	
  payables	
  &	
  
receivables	
  
SD	
  
Revenues	
  
Billing	
  
Every	
  Day	
  Data	
  is	
  Extracted	
  from	
  SAP	
  
ReporJng	
   AnalyJcs	
   ForecasJng	
  &	
  Planning	
  
Financial/	
  HR/	
  Sales	
  reports	
  
Standard	
  /MSS/	
  Ad	
  hoc	
  
reports	
  
Crystal	
  reports	
  
GRC	
  reports	
  
	
  
BI/	
  BO/	
  BW	
  analy6cs	
  
Predic6ve	
  analy6cs/	
  HANA	
  
Financial	
  analy6cs	
  
Business	
  analy6cs	
  
	
  
Sales	
  planning	
  &	
  forecas6ng	
  
Workforce	
  planning	
  
Material	
  requirement	
  
planning	
  
Logis6cs	
  &	
  produc6on	
  
planning	
  
Halocore	
  for	
  SAP	
  
NetWeaver	
  
Protec6on	
  
Intercepts	
  
data	
  
leaving	
  SAP	
  
Suggests	
  or	
  
enforces	
  
classifica6on	
  
Protects	
  
data	
  
encryp6on	
  
+policy	
  
Creates	
  
audit	
  trial	
  
Advanced	
  audi6ng	
  
&	
  repor6ng	
  
	
  
Rights	
  
Management	
  
Fine-­‐grained	
  
access	
  policies	
  
Compliance	
   Audit	
  
Halocore	
  Benefits	
  
•  Provides	
  data-­‐centric	
  protec6on	
  
of	
  sensi6ve	
  SAP	
  informa6on	
  
•  Minimizes	
  risk	
  of	
  data	
  breaches,	
  
thed	
  and	
  loss	
  
•  Controls	
  who	
  has	
  access	
  to	
  
sensi6ve	
  informa6on	
  	
  
•  Boosts	
  secure	
  collabora6on	
  
•  Enables	
  compliance	
  
•  Offers	
  advanced	
  audi6ng	
  
capabili6es	
  	
  
Halocore	
  for	
  SAP	
  NetWeaver	
  
Persistent	
  
protecJon	
  	
  
In	
  case	
  device	
  is	
  
lost	
  or	
  stolen	
  or	
  
cloud	
  is	
  hacked,	
  
data	
  is	
  s6ll	
  secure	
  
	
  
Halocore	
  for	
  SAP	
  NetWeaver	
  
Persistent	
  
protecJon	
  	
  
In	
  case	
  device	
  is	
  
lost	
  or	
  stolen	
  or	
  
cloud	
  is	
  hacked,	
  
data	
  is	
  s6ll	
  secure	
  
	
  
Policies	
  
Owner-­‐only	
  
Department	
  
Company	
  
Partner	
  
Consultant	
  
	
  
Halocore	
  for	
  SAP	
  NetWeaver	
  
Persistent	
  
protecJon	
  	
  
In	
  case	
  device	
  is	
  
lost	
  or	
  stolen	
  or	
  
cloud	
  is	
  hacked,	
  
data	
  is	
  s6ll	
  secure	
  
	
  
Policies	
  
Owner-­‐only	
  
Department	
  
Company	
  
Partner	
  
Consultant	
  
	
  
Data-­‐centric	
  
protecJon	
  	
  
Data/documents	
  
themselves	
  are	
  
persistently	
  
protected	
  
FOR	
  MORE	
  INFORMATION	
  
Click	
  the	
  link	
  below	
  to	
  read	
  a	
  complete	
  interview	
  on	
  how	
  Halocore	
  can	
  
limit	
  data	
  leakage	
  with	
  the	
  use	
  of	
  Microsod	
  RMS.	
  
Read Now Microsoft RMS is now limiting SAP
data leakage with the help of Secude
Halocore	
  Data	
  Export	
  Auditor	
  
•  Free	
  tool	
  to	
  monitor	
  data	
  movement	
  
inside	
  and	
  outside	
  of	
  SAP	
  
•  Helps	
  to	
  track	
  sensi6ve	
  data	
  distribu6on	
  in	
  the	
  
company	
  and	
  iden6fy	
  possibly	
  weak	
  spots	
  
•  Does	
  not	
  require	
  a	
  Microsod	
  RMS	
  infrastructure	
  
•  Each	
  and	
  every	
  download	
  is	
  tracked	
  
•  The	
  log	
  can	
  be	
  displayed	
  with	
  an	
  easy-­‐to-­‐use	
  
report	
  transac6on,	
  in	
  an	
  ALV	
  grid	
  
•  Data	
  can	
  be	
  extracted	
  and	
  analyzed	
  with	
  more	
  
powerful	
  tools,	
  such	
  as	
  Business	
  Objects	
  
•  Request	
  download	
  at	
  www.secude.com	
  
LEARN	
  MORE	
  ABOUT	
  AUDITING	
  
YOUR	
  DATA	
  NOW	
  
Click HERE
PRESENTATION	
  BY	
  
Tweet us @SECUDE

More Related Content

What's hot

Delve Labs - Upcoming Security Challenges for the Internet of Things
Delve Labs - Upcoming Security Challenges for the Internet of ThingsDelve Labs - Upcoming Security Challenges for the Internet of Things
Delve Labs - Upcoming Security Challenges for the Internet of ThingsFrederic Roy-Gobeil, CPA, CGA, M.Tax.
 
Getting ahead of compromise
Getting ahead of compromiseGetting ahead of compromise
Getting ahead of compromise
CMR WORLD TECH
 
Protective Intelligence
Protective IntelligenceProtective Intelligence
Protective Intelligence
wbesse
 
Cyber Resilience
Cyber ResilienceCyber Resilience
Cyber Resilience
Ian-Edward Stafrace
 
Where in the world is your Corporate data?
Where in the world is your Corporate data?Where in the world is your Corporate data?
Where in the world is your Corporate data?
Ashish Patel
 
Proactive Measures to Defeat Insider Threat
Proactive Measures to Defeat Insider ThreatProactive Measures to Defeat Insider Threat
Proactive Measures to Defeat Insider Threat
Andrew Case
 
Cyber Security for Financial Institutions
Cyber Security for Financial InstitutionsCyber Security for Financial Institutions
Cyber Security for Financial Institutions
Khawar Nehal khawar.nehal@atrc.net.pk
 
Cyberwar Gets Personal
Cyberwar Gets PersonalCyberwar Gets Personal
Cyberwar Gets Personal
Nicholas Davis
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
Christopher Daza
 
Cybersecurity in the Age of Mobility
Cybersecurity in the Age of MobilityCybersecurity in the Age of Mobility
Cybersecurity in the Age of Mobility
Booz Allen Hamilton
 
Establishing an insider threat programme: Know your Snowden - Puneet Kukreja,...
Establishing an insider threat programme: Know your Snowden - Puneet Kukreja,...Establishing an insider threat programme: Know your Snowden - Puneet Kukreja,...
Establishing an insider threat programme: Know your Snowden - Puneet Kukreja,...
Puneet Kukreja
 
Data erasure's role in limiting cyber attacks
Data erasure's role in limiting cyber attacksData erasure's role in limiting cyber attacks
Data erasure's role in limiting cyber attacks
Blancco
 
How can i find my security blind spots ulf mattsson - aug 2016
How can i find my security blind spots   ulf mattsson - aug 2016How can i find my security blind spots   ulf mattsson - aug 2016
How can i find my security blind spots ulf mattsson - aug 2016
Ulf Mattsson
 
Eileen Presentation
Eileen  PresentationEileen  Presentation
Eileen Presentationjc06442n
 
Cyber Risk Management in 2017 - Challenges & Recommendations
Cyber Risk Management in 2017 - Challenges & RecommendationsCyber Risk Management in 2017 - Challenges & Recommendations
Cyber Risk Management in 2017 - Challenges & Recommendations
Ulf Mattsson
 
What's behind a cyber attack
What's behind a cyber attackWhat's behind a cyber attack
What's behind a cyber attack
Andreanne Clarke
 
McNair_Paper_Hill
McNair_Paper_HillMcNair_Paper_Hill
McNair_Paper_HillDennis Hill
 
Insider Threat Solution from GTRI
Insider Threat Solution from GTRIInsider Threat Solution from GTRI
Insider Threat Solution from GTRI
Zivaro Inc
 

What's hot (20)

Delve Labs - Upcoming Security Challenges for the Internet of Things
Delve Labs - Upcoming Security Challenges for the Internet of ThingsDelve Labs - Upcoming Security Challenges for the Internet of Things
Delve Labs - Upcoming Security Challenges for the Internet of Things
 
Getting ahead of compromise
Getting ahead of compromiseGetting ahead of compromise
Getting ahead of compromise
 
Protective Intelligence
Protective IntelligenceProtective Intelligence
Protective Intelligence
 
Cyber Resilience
Cyber ResilienceCyber Resilience
Cyber Resilience
 
Where in the world is your Corporate data?
Where in the world is your Corporate data?Where in the world is your Corporate data?
Where in the world is your Corporate data?
 
Proactive Measures to Defeat Insider Threat
Proactive Measures to Defeat Insider ThreatProactive Measures to Defeat Insider Threat
Proactive Measures to Defeat Insider Threat
 
The Top Ten Insider Threats And How To Prevent Them
The Top Ten Insider Threats And How To Prevent ThemThe Top Ten Insider Threats And How To Prevent Them
The Top Ten Insider Threats And How To Prevent Them
 
Cyber Security for Financial Institutions
Cyber Security for Financial InstitutionsCyber Security for Financial Institutions
Cyber Security for Financial Institutions
 
Cyberwar Gets Personal
Cyberwar Gets PersonalCyberwar Gets Personal
Cyberwar Gets Personal
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
csxnewsletter
csxnewslettercsxnewsletter
csxnewsletter
 
Cybersecurity in the Age of Mobility
Cybersecurity in the Age of MobilityCybersecurity in the Age of Mobility
Cybersecurity in the Age of Mobility
 
Establishing an insider threat programme: Know your Snowden - Puneet Kukreja,...
Establishing an insider threat programme: Know your Snowden - Puneet Kukreja,...Establishing an insider threat programme: Know your Snowden - Puneet Kukreja,...
Establishing an insider threat programme: Know your Snowden - Puneet Kukreja,...
 
Data erasure's role in limiting cyber attacks
Data erasure's role in limiting cyber attacksData erasure's role in limiting cyber attacks
Data erasure's role in limiting cyber attacks
 
How can i find my security blind spots ulf mattsson - aug 2016
How can i find my security blind spots   ulf mattsson - aug 2016How can i find my security blind spots   ulf mattsson - aug 2016
How can i find my security blind spots ulf mattsson - aug 2016
 
Eileen Presentation
Eileen  PresentationEileen  Presentation
Eileen Presentation
 
Cyber Risk Management in 2017 - Challenges & Recommendations
Cyber Risk Management in 2017 - Challenges & RecommendationsCyber Risk Management in 2017 - Challenges & Recommendations
Cyber Risk Management in 2017 - Challenges & Recommendations
 
What's behind a cyber attack
What's behind a cyber attackWhat's behind a cyber attack
What's behind a cyber attack
 
McNair_Paper_Hill
McNair_Paper_HillMcNair_Paper_Hill
McNair_Paper_Hill
 
Insider Threat Solution from GTRI
Insider Threat Solution from GTRIInsider Threat Solution from GTRI
Insider Threat Solution from GTRI
 

Viewers also liked

Sports and Special Event Security Planning: Best Practices
Sports and Special Event Security Planning: Best PracticesSports and Special Event Security Planning: Best Practices
Sports and Special Event Security Planning: Best Practices
National Center for Campus Public Safety
 
Joseph Bradley, IoE in action, Cisco Live
Joseph Bradley, IoE in action, Cisco LiveJoseph Bradley, IoE in action, Cisco Live
Joseph Bradley, IoE in action, Cisco Live
Felipe Lamus
 
Perimeter Security Scenario Questions
Perimeter Security Scenario QuestionsPerimeter Security Scenario Questions
Perimeter Security Scenario QuestionsJohn N. Motlagh
 
EVENTS RISK MANAGEMENT SAFETY AND SECURITY
EVENTS RISK MANAGEMENT SAFETY AND SECURITYEVENTS RISK MANAGEMENT SAFETY AND SECURITY
EVENTS RISK MANAGEMENT SAFETY AND SECURITY
Yanne Evangelista
 
Barracuda Networks Overview
Barracuda Networks OverviewBarracuda Networks Overview
Barracuda Networks Overview
AEC Networks
 
Security of IoT Data: Implementing Data-Centric Security and User Access Stra...
Security of IoT Data: Implementing Data-Centric Security and User Access Stra...Security of IoT Data: Implementing Data-Centric Security and User Access Stra...
Security of IoT Data: Implementing Data-Centric Security and User Access Stra...
Altoros
 
Perimeter security systems
Perimeter security systemsPerimeter security systems
Perimeter security systems
Roundabout Technologies
 

Viewers also liked (7)

Sports and Special Event Security Planning: Best Practices
Sports and Special Event Security Planning: Best PracticesSports and Special Event Security Planning: Best Practices
Sports and Special Event Security Planning: Best Practices
 
Joseph Bradley, IoE in action, Cisco Live
Joseph Bradley, IoE in action, Cisco LiveJoseph Bradley, IoE in action, Cisco Live
Joseph Bradley, IoE in action, Cisco Live
 
Perimeter Security Scenario Questions
Perimeter Security Scenario QuestionsPerimeter Security Scenario Questions
Perimeter Security Scenario Questions
 
EVENTS RISK MANAGEMENT SAFETY AND SECURITY
EVENTS RISK MANAGEMENT SAFETY AND SECURITYEVENTS RISK MANAGEMENT SAFETY AND SECURITY
EVENTS RISK MANAGEMENT SAFETY AND SECURITY
 
Barracuda Networks Overview
Barracuda Networks OverviewBarracuda Networks Overview
Barracuda Networks Overview
 
Security of IoT Data: Implementing Data-Centric Security and User Access Stra...
Security of IoT Data: Implementing Data-Centric Security and User Access Stra...Security of IoT Data: Implementing Data-Centric Security and User Access Stra...
Security of IoT Data: Implementing Data-Centric Security and User Access Stra...
 
Perimeter security systems
Perimeter security systemsPerimeter security systems
Perimeter security systems
 

Similar to Perimeter Security is Failing

Data security in a big data environment sweden
Data security in a big data environment   swedenData security in a big data environment   sweden
Data security in a big data environment sweden
IBM Sverige
 
Think Your Network Is Safe? Check Your Printers
Think Your Network Is Safe? Check Your PrintersThink Your Network Is Safe? Check Your Printers
Think Your Network Is Safe? Check Your Printers
scoopnewsgroup
 
Symantec Data Loss Prevention 9
Symantec Data Loss Prevention 9Symantec Data Loss Prevention 9
Symantec Data Loss Prevention 9
Ariel Martin Beliera
 
Threat Ready Data: Protect Data from the Inside and the Outside
Threat Ready Data: Protect Data from the Inside and the OutsideThreat Ready Data: Protect Data from the Inside and the Outside
Threat Ready Data: Protect Data from the Inside and the Outside
DLT Solutions
 
IRJET- Data Leak Prevention System: A Survey
IRJET-  	  Data Leak Prevention System: A SurveyIRJET-  	  Data Leak Prevention System: A Survey
IRJET- Data Leak Prevention System: A Survey
IRJET Journal
 
Mobility & BYOD: Leveraging Best Practices and Latest Technologies for Compre...
Mobility & BYOD: Leveraging Best Practices and Latest Technologies for Compre...Mobility & BYOD: Leveraging Best Practices and Latest Technologies for Compre...
Mobility & BYOD: Leveraging Best Practices and Latest Technologies for Compre...
UL Transaction Security
 
Version 3.6 Powerpoint March10
Version 3.6 Powerpoint March10Version 3.6 Powerpoint March10
Version 3.6 Powerpoint March10jpmccormack
 
Drivelock modern approach of it security & amp; encryption solution -whitep...
Drivelock   modern approach of it security & amp; encryption solution -whitep...Drivelock   modern approach of it security & amp; encryption solution -whitep...
Drivelock modern approach of it security & amp; encryption solution -whitep...
Arbp Worldwide
 
Guide Preview: Ensuring your enterprise image-viewer if fully secure
Guide Preview: Ensuring your enterprise image-viewer if fully secureGuide Preview: Ensuring your enterprise image-viewer if fully secure
Guide Preview: Ensuring your enterprise image-viewer if fully secure
Calgary Scientific Inc.
 
How to Secure Data Privacy in 2024.pdf
How to Secure Data Privacy in 2024.pdfHow to Secure Data Privacy in 2024.pdf
How to Secure Data Privacy in 2024.pdf
V2Infotech1
 
How to Secure Data Privacy in 2024.pptx
How to Secure Data Privacy in 2024.pptxHow to Secure Data Privacy in 2024.pptx
How to Secure Data Privacy in 2024.pptx
V2Infotech1
 
Preventing Data Breaches
Preventing Data BreachesPreventing Data Breaches
Preventing Data Breaches
xband
 
Data Loss Prevention from Symantec
Data Loss Prevention from SymantecData Loss Prevention from Symantec
Data Loss Prevention from SymantecArrow ECS UK
 
Security Best Practices for Small Business
Security Best Practices for Small BusinessSecurity Best Practices for Small Business
Security Best Practices for Small Business
Valiant Technology
 
Bridging the Data Security Gap
Bridging the Data Security GapBridging the Data Security Gap
Bridging the Data Security Gap
xband
 
Data security in the cloud
Data security in the cloud Data security in the cloud
Data security in the cloud
IBM Security
 
Proven Practices to Protect Critical Data - DarkReading VTS Deck
Proven Practices to Protect Critical Data - DarkReading VTS DeckProven Practices to Protect Critical Data - DarkReading VTS Deck
Proven Practices to Protect Critical Data - DarkReading VTS Deck
NetIQ
 
Segurinfo2014 Santiago Cavanna
Segurinfo2014 Santiago CavannaSegurinfo2014 Santiago Cavanna
Segurinfo2014 Santiago Cavanna
Santiago Cavanna
 
A Cybersecurity Planning Guide for CFOs
A Cybersecurity Planning Guide for CFOsA Cybersecurity Planning Guide for CFOs
A Cybersecurity Planning Guide for CFOs
gppcpa
 
IT Security Essentials
IT Security EssentialsIT Security Essentials
IT Security Essentials
Skoda Minotti
 

Similar to Perimeter Security is Failing (20)

Data security in a big data environment sweden
Data security in a big data environment   swedenData security in a big data environment   sweden
Data security in a big data environment sweden
 
Think Your Network Is Safe? Check Your Printers
Think Your Network Is Safe? Check Your PrintersThink Your Network Is Safe? Check Your Printers
Think Your Network Is Safe? Check Your Printers
 
Symantec Data Loss Prevention 9
Symantec Data Loss Prevention 9Symantec Data Loss Prevention 9
Symantec Data Loss Prevention 9
 
Threat Ready Data: Protect Data from the Inside and the Outside
Threat Ready Data: Protect Data from the Inside and the OutsideThreat Ready Data: Protect Data from the Inside and the Outside
Threat Ready Data: Protect Data from the Inside and the Outside
 
IRJET- Data Leak Prevention System: A Survey
IRJET-  	  Data Leak Prevention System: A SurveyIRJET-  	  Data Leak Prevention System: A Survey
IRJET- Data Leak Prevention System: A Survey
 
Mobility & BYOD: Leveraging Best Practices and Latest Technologies for Compre...
Mobility & BYOD: Leveraging Best Practices and Latest Technologies for Compre...Mobility & BYOD: Leveraging Best Practices and Latest Technologies for Compre...
Mobility & BYOD: Leveraging Best Practices and Latest Technologies for Compre...
 
Version 3.6 Powerpoint March10
Version 3.6 Powerpoint March10Version 3.6 Powerpoint March10
Version 3.6 Powerpoint March10
 
Drivelock modern approach of it security & amp; encryption solution -whitep...
Drivelock   modern approach of it security & amp; encryption solution -whitep...Drivelock   modern approach of it security & amp; encryption solution -whitep...
Drivelock modern approach of it security & amp; encryption solution -whitep...
 
Guide Preview: Ensuring your enterprise image-viewer if fully secure
Guide Preview: Ensuring your enterprise image-viewer if fully secureGuide Preview: Ensuring your enterprise image-viewer if fully secure
Guide Preview: Ensuring your enterprise image-viewer if fully secure
 
How to Secure Data Privacy in 2024.pdf
How to Secure Data Privacy in 2024.pdfHow to Secure Data Privacy in 2024.pdf
How to Secure Data Privacy in 2024.pdf
 
How to Secure Data Privacy in 2024.pptx
How to Secure Data Privacy in 2024.pptxHow to Secure Data Privacy in 2024.pptx
How to Secure Data Privacy in 2024.pptx
 
Preventing Data Breaches
Preventing Data BreachesPreventing Data Breaches
Preventing Data Breaches
 
Data Loss Prevention from Symantec
Data Loss Prevention from SymantecData Loss Prevention from Symantec
Data Loss Prevention from Symantec
 
Security Best Practices for Small Business
Security Best Practices for Small BusinessSecurity Best Practices for Small Business
Security Best Practices for Small Business
 
Bridging the Data Security Gap
Bridging the Data Security GapBridging the Data Security Gap
Bridging the Data Security Gap
 
Data security in the cloud
Data security in the cloud Data security in the cloud
Data security in the cloud
 
Proven Practices to Protect Critical Data - DarkReading VTS Deck
Proven Practices to Protect Critical Data - DarkReading VTS DeckProven Practices to Protect Critical Data - DarkReading VTS Deck
Proven Practices to Protect Critical Data - DarkReading VTS Deck
 
Segurinfo2014 Santiago Cavanna
Segurinfo2014 Santiago CavannaSegurinfo2014 Santiago Cavanna
Segurinfo2014 Santiago Cavanna
 
A Cybersecurity Planning Guide for CFOs
A Cybersecurity Planning Guide for CFOsA Cybersecurity Planning Guide for CFOs
A Cybersecurity Planning Guide for CFOs
 
IT Security Essentials
IT Security EssentialsIT Security Essentials
IT Security Essentials
 

More from UL Transaction Security

Webinar: Data Classification - Closing the Gap between Enterprise and SAP Data
Webinar: Data Classification - Closing the Gap between Enterprise and SAP DataWebinar: Data Classification - Closing the Gap between Enterprise and SAP Data
Webinar: Data Classification - Closing the Gap between Enterprise and SAP Data
UL Transaction Security
 
Webinar: Eliminating Negative Impact on User Experience from Security Solutions
Webinar: Eliminating Negative Impact on User Experience from Security SolutionsWebinar: Eliminating Negative Impact on User Experience from Security Solutions
Webinar: Eliminating Negative Impact on User Experience from Security Solutions
UL Transaction Security
 
Solving Security, Collaboration, and Mobility Challenges in SAP With Microsof...
Solving Security, Collaboration, and Mobility Challenges in SAP With Microsof...Solving Security, Collaboration, and Mobility Challenges in SAP With Microsof...
Solving Security, Collaboration, and Mobility Challenges in SAP With Microsof...
UL Transaction Security
 
BYOD Webinar for SAP: Securing Data in a Mobile World
BYOD Webinar for SAP: Securing Data in a Mobile WorldBYOD Webinar for SAP: Securing Data in a Mobile World
BYOD Webinar for SAP: Securing Data in a Mobile World
UL Transaction Security
 
HR Security in SAP: Securing Data Beyond HCM Authorizations
HR Security in SAP: Securing Data Beyond HCM AuthorizationsHR Security in SAP: Securing Data Beyond HCM Authorizations
HR Security in SAP: Securing Data Beyond HCM Authorizations
UL Transaction Security
 
WEBINAR - A New Era in HR Security for SAP
WEBINAR - A New Era in HR Security for SAPWEBINAR - A New Era in HR Security for SAP
WEBINAR - A New Era in HR Security for SAP
UL Transaction Security
 
What's New in Microsoft Rights Management Services
What's New in Microsoft Rights Management ServicesWhat's New in Microsoft Rights Management Services
What's New in Microsoft Rights Management Services
UL Transaction Security
 

More from UL Transaction Security (8)

Webinar: Data Classification - Closing the Gap between Enterprise and SAP Data
Webinar: Data Classification - Closing the Gap between Enterprise and SAP DataWebinar: Data Classification - Closing the Gap between Enterprise and SAP Data
Webinar: Data Classification - Closing the Gap between Enterprise and SAP Data
 
Webinar: Eliminating Negative Impact on User Experience from Security Solutions
Webinar: Eliminating Negative Impact on User Experience from Security SolutionsWebinar: Eliminating Negative Impact on User Experience from Security Solutions
Webinar: Eliminating Negative Impact on User Experience from Security Solutions
 
BREACHED: Data Centric Security for SAP
BREACHED: Data Centric Security for SAPBREACHED: Data Centric Security for SAP
BREACHED: Data Centric Security for SAP
 
Solving Security, Collaboration, and Mobility Challenges in SAP With Microsof...
Solving Security, Collaboration, and Mobility Challenges in SAP With Microsof...Solving Security, Collaboration, and Mobility Challenges in SAP With Microsof...
Solving Security, Collaboration, and Mobility Challenges in SAP With Microsof...
 
BYOD Webinar for SAP: Securing Data in a Mobile World
BYOD Webinar for SAP: Securing Data in a Mobile WorldBYOD Webinar for SAP: Securing Data in a Mobile World
BYOD Webinar for SAP: Securing Data in a Mobile World
 
HR Security in SAP: Securing Data Beyond HCM Authorizations
HR Security in SAP: Securing Data Beyond HCM AuthorizationsHR Security in SAP: Securing Data Beyond HCM Authorizations
HR Security in SAP: Securing Data Beyond HCM Authorizations
 
WEBINAR - A New Era in HR Security for SAP
WEBINAR - A New Era in HR Security for SAPWEBINAR - A New Era in HR Security for SAP
WEBINAR - A New Era in HR Security for SAP
 
What's New in Microsoft Rights Management Services
What's New in Microsoft Rights Management ServicesWhat's New in Microsoft Rights Management Services
What's New in Microsoft Rights Management Services
 

Recently uploaded

Advanced Flow Concepts Every Developer Should Know
Advanced Flow Concepts Every Developer Should KnowAdvanced Flow Concepts Every Developer Should Know
Advanced Flow Concepts Every Developer Should Know
Peter Caitens
 
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital TransformationWSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2
 
Lecture 1 Introduction to games development
Lecture 1 Introduction to games developmentLecture 1 Introduction to games development
Lecture 1 Introduction to games development
abdulrafaychaudhry
 
Quarkus Hidden and Forbidden Extensions
Quarkus Hidden and Forbidden ExtensionsQuarkus Hidden and Forbidden Extensions
Quarkus Hidden and Forbidden Extensions
Max Andersen
 
De mooiste recreatieve routes ontdekken met RouteYou en FME
De mooiste recreatieve routes ontdekken met RouteYou en FMEDe mooiste recreatieve routes ontdekken met RouteYou en FME
De mooiste recreatieve routes ontdekken met RouteYou en FME
Jelle | Nordend
 
Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...
Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...
Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...
Globus
 
Globus Compute Introduction - GlobusWorld 2024
Globus Compute Introduction - GlobusWorld 2024Globus Compute Introduction - GlobusWorld 2024
Globus Compute Introduction - GlobusWorld 2024
Globus
 
Exploring Innovations in Data Repository Solutions - Insights from the U.S. G...
Exploring Innovations in Data Repository Solutions - Insights from the U.S. G...Exploring Innovations in Data Repository Solutions - Insights from the U.S. G...
Exploring Innovations in Data Repository Solutions - Insights from the U.S. G...
Globus
 
Multiple Your Crypto Portfolio with the Innovative Features of Advanced Crypt...
Multiple Your Crypto Portfolio with the Innovative Features of Advanced Crypt...Multiple Your Crypto Portfolio with the Innovative Features of Advanced Crypt...
Multiple Your Crypto Portfolio with the Innovative Features of Advanced Crypt...
Hivelance Technology
 
top nidhi software solution freedownload
top nidhi software solution freedownloadtop nidhi software solution freedownload
top nidhi software solution freedownload
vrstrong314
 
First Steps with Globus Compute Multi-User Endpoints
First Steps with Globus Compute Multi-User EndpointsFirst Steps with Globus Compute Multi-User Endpoints
First Steps with Globus Compute Multi-User Endpoints
Globus
 
Developing Distributed High-performance Computing Capabilities of an Open Sci...
Developing Distributed High-performance Computing Capabilities of an Open Sci...Developing Distributed High-performance Computing Capabilities of an Open Sci...
Developing Distributed High-performance Computing Capabilities of an Open Sci...
Globus
 
Corporate Management | Session 3 of 3 | Tendenci AMS
Corporate Management | Session 3 of 3 | Tendenci AMSCorporate Management | Session 3 of 3 | Tendenci AMS
Corporate Management | Session 3 of 3 | Tendenci AMS
Tendenci - The Open Source AMS (Association Management Software)
 
Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...
Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...
Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...
Globus
 
Dominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdf
Dominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdfDominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdf
Dominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdf
AMB-Review
 
Cracking the code review at SpringIO 2024
Cracking the code review at SpringIO 2024Cracking the code review at SpringIO 2024
Cracking the code review at SpringIO 2024
Paco van Beckhoven
 
Why React Native as a Strategic Advantage for Startup Innovation.pdf
Why React Native as a Strategic Advantage for Startup Innovation.pdfWhy React Native as a Strategic Advantage for Startup Innovation.pdf
Why React Native as a Strategic Advantage for Startup Innovation.pdf
ayushiqss
 
Prosigns: Transforming Business with Tailored Technology Solutions
Prosigns: Transforming Business with Tailored Technology SolutionsProsigns: Transforming Business with Tailored Technology Solutions
Prosigns: Transforming Business with Tailored Technology Solutions
Prosigns
 
SOCRadar Research Team: Latest Activities of IntelBroker
SOCRadar Research Team: Latest Activities of IntelBrokerSOCRadar Research Team: Latest Activities of IntelBroker
SOCRadar Research Team: Latest Activities of IntelBroker
SOCRadar
 
Vitthal Shirke Microservices Resume Montevideo
Vitthal Shirke Microservices Resume MontevideoVitthal Shirke Microservices Resume Montevideo
Vitthal Shirke Microservices Resume Montevideo
Vitthal Shirke
 

Recently uploaded (20)

Advanced Flow Concepts Every Developer Should Know
Advanced Flow Concepts Every Developer Should KnowAdvanced Flow Concepts Every Developer Should Know
Advanced Flow Concepts Every Developer Should Know
 
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital TransformationWSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
 
Lecture 1 Introduction to games development
Lecture 1 Introduction to games developmentLecture 1 Introduction to games development
Lecture 1 Introduction to games development
 
Quarkus Hidden and Forbidden Extensions
Quarkus Hidden and Forbidden ExtensionsQuarkus Hidden and Forbidden Extensions
Quarkus Hidden and Forbidden Extensions
 
De mooiste recreatieve routes ontdekken met RouteYou en FME
De mooiste recreatieve routes ontdekken met RouteYou en FMEDe mooiste recreatieve routes ontdekken met RouteYou en FME
De mooiste recreatieve routes ontdekken met RouteYou en FME
 
Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...
Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...
Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...
 
Globus Compute Introduction - GlobusWorld 2024
Globus Compute Introduction - GlobusWorld 2024Globus Compute Introduction - GlobusWorld 2024
Globus Compute Introduction - GlobusWorld 2024
 
Exploring Innovations in Data Repository Solutions - Insights from the U.S. G...
Exploring Innovations in Data Repository Solutions - Insights from the U.S. G...Exploring Innovations in Data Repository Solutions - Insights from the U.S. G...
Exploring Innovations in Data Repository Solutions - Insights from the U.S. G...
 
Multiple Your Crypto Portfolio with the Innovative Features of Advanced Crypt...
Multiple Your Crypto Portfolio with the Innovative Features of Advanced Crypt...Multiple Your Crypto Portfolio with the Innovative Features of Advanced Crypt...
Multiple Your Crypto Portfolio with the Innovative Features of Advanced Crypt...
 
top nidhi software solution freedownload
top nidhi software solution freedownloadtop nidhi software solution freedownload
top nidhi software solution freedownload
 
First Steps with Globus Compute Multi-User Endpoints
First Steps with Globus Compute Multi-User EndpointsFirst Steps with Globus Compute Multi-User Endpoints
First Steps with Globus Compute Multi-User Endpoints
 
Developing Distributed High-performance Computing Capabilities of an Open Sci...
Developing Distributed High-performance Computing Capabilities of an Open Sci...Developing Distributed High-performance Computing Capabilities of an Open Sci...
Developing Distributed High-performance Computing Capabilities of an Open Sci...
 
Corporate Management | Session 3 of 3 | Tendenci AMS
Corporate Management | Session 3 of 3 | Tendenci AMSCorporate Management | Session 3 of 3 | Tendenci AMS
Corporate Management | Session 3 of 3 | Tendenci AMS
 
Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...
Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...
Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...
 
Dominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdf
Dominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdfDominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdf
Dominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdf
 
Cracking the code review at SpringIO 2024
Cracking the code review at SpringIO 2024Cracking the code review at SpringIO 2024
Cracking the code review at SpringIO 2024
 
Why React Native as a Strategic Advantage for Startup Innovation.pdf
Why React Native as a Strategic Advantage for Startup Innovation.pdfWhy React Native as a Strategic Advantage for Startup Innovation.pdf
Why React Native as a Strategic Advantage for Startup Innovation.pdf
 
Prosigns: Transforming Business with Tailored Technology Solutions
Prosigns: Transforming Business with Tailored Technology SolutionsProsigns: Transforming Business with Tailored Technology Solutions
Prosigns: Transforming Business with Tailored Technology Solutions
 
SOCRadar Research Team: Latest Activities of IntelBroker
SOCRadar Research Team: Latest Activities of IntelBrokerSOCRadar Research Team: Latest Activities of IntelBroker
SOCRadar Research Team: Latest Activities of IntelBroker
 
Vitthal Shirke Microservices Resume Montevideo
Vitthal Shirke Microservices Resume MontevideoVitthal Shirke Microservices Resume Montevideo
Vitthal Shirke Microservices Resume Montevideo
 

Perimeter Security is Failing

  • 1. Why  Perimeter  Security  is  Failing   A  presenta6on  by  SECUDE  
  • 2. In  light  of  recent  data  breaches,  tradi6onal   perimeter  security  simply            
  • 3. In  light  of  recent  data  breaches,  tradi6onal   perimeter  security  simply        Perimeters  can  easily  be  penetrated  at  key   exposure  points  where  cri6cal  business  data  is   store,  used,  and  processed  
  • 4. A  companies  greatest  risk   Is  also  their  greatest  asset  
  • 5. A  companies  greatest  risk   Corporate  data  stored  on  databases  and   accessible  file  systems.     Is  also  their  greatest  asset  
  • 6. DATA  BREACHES  ON  THE  RISE  
  • 7. Data  Breaches   47%  of  all  American   adults  have  been  affected   by  data  breaches   Source:  Ponemon  Ins6tute  
  • 8. Data  Breaches   47%  of  all  American   adults  have  been  affected   by  data  breaches   Source:  Ponemon  Ins6tute   More  than  600  reported   data  breaches  in  2013.   A  30  %  increase  from   2012  
  • 9. Data  Breaches   47%  of  all  American   adults  have  been  affected   by  data  breaches   Source:  Ponemon  Ins6tute   More  than  600  reported   data  breaches  in  2013.   A  30  %  increase  from   2012   Cybercrime  Costs   Global  Economy:  $575  bil   U.S.  Economy:  $100  bil   Annually   Source:  Intel  Security  and  the  Center  for  Strategic  and  Interna6onal  Studies  
  • 10. The  Security  Risk  is  Real   $5.85 million Average  cost  of  data  breach  in  USA  in  2014   Source: 2014 Cost of Data Breach, Ponemon Institute
  • 11. The  Security  Risk  is  Real   42%   29%   30%   Cause of Data Breach Malicious  aYack   System  glitch   Human  error   $5.85 million Average  cost  of  data  breach  in  USA  in  2014   Source: 2014 Cost of Data Breach, Ponemon Institute Source: 2014 Cost of Data Breach, Ponemon Institute
  • 12. The  Security  Risk  is  Real   42%   29%   30%   Cause of Data Breach Malicious  aYack   System  glitch   Human  error   Financial consequences of a data breach Divided by categories 29% Reputation damage 21% Lost productivity 12% Forensics 19% Lost revenue 10% Technical support 8% Regulatory $5.85 million Source: IBM Average  cost  of  data  breach  in  USA  in  2014   Source: 2014 Cost of Data Breach, Ponemon Institute Source: 2014 Cost of Data Breach, Ponemon Institute
  • 13. CURRENT  STATE  OF  THE  THREAT   LANDSCAPE   0SSN00110101100 100100100101001 10100PASSWORD1 010100101001010 010PII0010010011  
  • 14.   Today’s  Challenges     Cloud  &  mobility       IT  consumeriza6on     Loss  of  control  over   corporate  data    
  • 15.   Today’s  Challenges     Cloud  &  mobility   Business  collaboraJon       IT  consumeriza6on     Loss  of  control  over   corporate  data       Cloud-­‐based  and  file-­‐ sharing  tools     No  balance  between   sharing  and  security    
  • 16.   Today’s  Challenges     Cloud  &  mobility   Security  Business  collaboraJon     Data  breaches  on   the  rise     Eroding  enterprise   perimeter         IT  consumeriza6on     Loss  of  control  over   corporate  data       Cloud-­‐based  and  file-­‐ sharing  tools     No  balance  between   sharing  and  security    
  • 17. PERIMETER  SECURITY  IS   NO  LONGER  ENOUGH  
  • 18. Why  Not?   •  Corporate  perimeter  is  eroding/has  eroded   •  Businesses  don’t  know  where  their  data  has   become  a  challenge   •  Keeping  track  of  corporate  data  is  next  to   impossible  
  • 19. IT  is  Borderless   •  Data  exists  to  be   consumed  and  shared   –  Locking  everything  down   and  disallowing   employees  to  use  data  is   counter-­‐produc6ve   –  Data  itself  should  be   protected  for  secure   movement  and  usage   Employees   Partner  
  • 20. Internal  Threats   Source:  Kaspersky  Labs   27%  of  businesses  reported  having  lost  sensi6ve   business  data  due  to  internal  IT  threats  in  the  past   year,  not  external    
  • 21. Internal  Threats   Source:  Kaspersky  Labs   27%  of  businesses  reported  having  lost  sensi6ve   business  data  due  to  internal  IT  threats  in  the  past   year,  not  external     29%  of  businesses  report   accidental  data  leaks  by   staff   That  is  the  2nd  most-­‐ common  internal   threat  and  now  the   largest  source  of  data   loss    
  • 22. Internal  Threats   Source:  Kaspersky  Labs   27%  of  businesses  reported  having  lost  sensi6ve   business  data  due  to  internal  IT  threats  in  the  past   year,  not  external     29%  of  businesses  report   accidental  data  leaks  by   staff   That  is  the  2nd  most-­‐ common  internal   threat  and  now  the   largest  source  of  data   loss     Sodware   vulnerabili6es   are  no  longer   the  greatest   threat      
  • 24. Network  Protec6on   1   Data  Loss  PrevenJon  (DLP):  monitors  user  ac6vity,  restricts   confiden6ally  tagged  informa6on  from  being  emailed  or  copied,  scans   storage  medium  for  sensi6ve  informa6on,  and  monitors  end  point   ac6vity.   Firewalls:    keeps  out  unauthorized  access   Virtual  Private  Network  (VPN):  a  virtual  point-­‐to-­‐point  connec6on   that  can  be  set  up  either  by  direct  connec6ons  or  by  virtual  tunneling   protocols  for  authorized  users  outside  your  network  
  • 25. Storage  Protec6on     2   Full  Disk  EncrypJon  (FDE):  data  on  a  hard  drive  scrambles  when  the   machine  is  off  and  is  decryptable  when  the  machine  is  running;  data   cannot  be  accessed  if  a  storage  medium  is  lost  or  stolen   Trusted  PlaUorm  Module  (TPM):  an  encryp6on  method  used  to  verify   the  hard  disk  drive  is  6ed  to  specific  device  using  an  embedded  crypto   processor  aYached  to  the  device  motherboard   AuthenJcaJon:  method  to  gain  access  to  a  storage  medium  using   unique  passwords,  pins,  biometrics,  smart  card,  or  key  fob  access  
  • 26. File  –  Based  Protec6on   3   InformaJon  Rights  Management  (IRM):  encrypt  and  place   policy  based  access  limita6ons  to  a  file  allowing  for  only   permiYed  users  to  use  specific  opera6ons  such  as  view,  edit,   copy,  and  print  the  informa6on  
  • 27. Once  a  layered  security  approach  is  enabled  and   properly  u6lized,  informa6on  can  have   persistent  protec6on  regardless  of  whether  it  is      in  mo6on  -­‐  NETWORK   at  rest  -­‐  STORAGE   or  in  use  -­‐  FILE  
  • 28. Once  a  layered  security  approach  is  enabled  and   properly  u6lized,  informa6on  can  have   persistent  protec6on  regardless  of  whether  it  is      in  mo6on  -­‐  NETWORK   at  rest  -­‐  STORAGE   or  in  use  -­‐  FILE  
  • 29. Why  File-­‐Based  Protec6on    Should  Not  be  Overlooked   Sensi6ve  informa6on  is  protected  no   maYer  where  it’s  moved,  including   mobile  and  cloud  plahorms   Prevents  unauthorized  viewing  and   use  of  sensi6ve  data   The  document  itself  is  protected.   Even  if  hackers  get  access  to  the   protected  documents,  they  cannot   “unlock”  them  to  view  in  clear  text     FAIL  –  SAFE:  when  other  protec6on   mechanisms  fail,  sensi6ve  documents   will  s6ll  be  safely  protected  
  • 30. File-­‐Based  Protec6on  with     Microsod  Rights  Management   •  Persistent  usage  policies,  which  remain  with  the   informa6on,  no  maYer  where  it  is  moved,  sent   or  forwarded.   •  An  addi6onal  layer  of  privacy  to  protect  sensi6ve   informa6on  —such  as  financial  reports,   product  specifica6ons,  customer  data,  and  confiden6al   e-­‐mail  messages—from  inten6onally  or   accidentally  gelng  into  the  wrong  hands.   •  Prevent  an  authorized  recipient  of  restricted  content   from  forwarding,  copying,  modifying,  prin6ng,  faxing,   or  pas6ng  the  content  for  unauthorized  use   Source:  Microsod  
  • 31. File-­‐Based  Protec6on  with   Microsod  Rights  Management   •  Prevent  restricted  content  from  being  copied   by  using  the  Print  Screen  feature  in   Microsod  Windows   •  Support  file  expira6on  so  that  content  in   documents  can  no  longer  be  viewed  ader  a   specified  period  of  6me   •  Enforce  corporate  policies  that  govern  the  use   and  dissemina6on  of  content  within  the   company   Source:  Microsod  
  • 32. Key  to  Microsod  Rights  Management       Protect  any  file  type           Office  docs,  PDF,  text,  and   Images             Protect  with  data-­‐ centric  security           Protec6on  stays  with  data   all  the  6me   Share  with  anyone             Inside  and  outside  of  the   enterprise                     Consume  on  mobile   devices           Support  of  most  popular   mobile  plahorms   Meet  varied   organizaJonal  needs           Protec6on  enforced  in  the   cloud  or  on-­‐premise   Control  your  keys             Delegated  access  to  data   with  BYOK  
  • 34. Persistent   protecJon     In  case  device  is   lost  or  stolen  or   cloud  is  hacked,   data  is  s6ll  secure     Extending  RMS  file-­‐based   protec6on  beyond  the   boundaries  of  the  enterprise  to   SAP  –  the  largest  ERP  applica6on  
  • 35. SAP  at  the  Heart  of  the  Enterprise   HR   PII   SSN   Salary  figures   FI/FHCM   Bank  account  numbers     Budgets   Invoices   BW   Strategy  details   Vendors  and  resources   QM   Product  specs   Trade  process  secrets   CRM   Client  info   Credit  card  numbers   PP   Trade  secrets   Secret  formula   Pricing  strategy   CO   Balance  sheets   Cash  flows   Accounts  payables  &   receivables   SD   Revenues   Billing  
  • 36. Every  Day  Data  is  Extracted  from  SAP   ReporJng   AnalyJcs   ForecasJng  &  Planning   Financial/  HR/  Sales  reports   Standard  /MSS/  Ad  hoc   reports   Crystal  reports   GRC  reports     BI/  BO/  BW  analy6cs   Predic6ve  analy6cs/  HANA   Financial  analy6cs   Business  analy6cs     Sales  planning  &  forecas6ng   Workforce  planning   Material  requirement   planning   Logis6cs  &  produc6on   planning  
  • 37. Halocore  for  SAP   NetWeaver   Protec6on   Intercepts   data   leaving  SAP   Suggests  or   enforces   classifica6on   Protects   data   encryp6on   +policy   Creates   audit  trial   Advanced  audi6ng   &  repor6ng     Rights   Management   Fine-­‐grained   access  policies   Compliance   Audit   Halocore  Benefits   •  Provides  data-­‐centric  protec6on   of  sensi6ve  SAP  informa6on   •  Minimizes  risk  of  data  breaches,   thed  and  loss   •  Controls  who  has  access  to   sensi6ve  informa6on     •  Boosts  secure  collabora6on   •  Enables  compliance   •  Offers  advanced  audi6ng   capabili6es    
  • 38. Halocore  for  SAP  NetWeaver   Persistent   protecJon     In  case  device  is   lost  or  stolen  or   cloud  is  hacked,   data  is  s6ll  secure    
  • 39. Halocore  for  SAP  NetWeaver   Persistent   protecJon     In  case  device  is   lost  or  stolen  or   cloud  is  hacked,   data  is  s6ll  secure     Policies   Owner-­‐only   Department   Company   Partner   Consultant    
  • 40. Halocore  for  SAP  NetWeaver   Persistent   protecJon     In  case  device  is   lost  or  stolen  or   cloud  is  hacked,   data  is  s6ll  secure     Policies   Owner-­‐only   Department   Company   Partner   Consultant     Data-­‐centric   protecJon     Data/documents   themselves  are   persistently   protected  
  • 41. FOR  MORE  INFORMATION   Click  the  link  below  to  read  a  complete  interview  on  how  Halocore  can   limit  data  leakage  with  the  use  of  Microsod  RMS.   Read Now Microsoft RMS is now limiting SAP data leakage with the help of Secude
  • 42. Halocore  Data  Export  Auditor   •  Free  tool  to  monitor  data  movement   inside  and  outside  of  SAP   •  Helps  to  track  sensi6ve  data  distribu6on  in  the   company  and  iden6fy  possibly  weak  spots   •  Does  not  require  a  Microsod  RMS  infrastructure   •  Each  and  every  download  is  tracked   •  The  log  can  be  displayed  with  an  easy-­‐to-­‐use   report  transac6on,  in  an  ALV  grid   •  Data  can  be  extracted  and  analyzed  with  more   powerful  tools,  such  as  Business  Objects   •  Request  download  at  www.secude.com  
  • 43. LEARN  MORE  ABOUT  AUDITING   YOUR  DATA  NOW   Click HERE