SlideShare a Scribd company logo
Fatigue Business Disruption
Exposure Helplessness
Lack Of Confidence
Defeat
Anger
Frustration
Violated
Futility
Empty Promises
Expensive
Snake Oil
15,000 Vulnerabilities Found in over 4,000 Apps
Volatile Cedar: Ongoing since 2012, 10 countries infected
Rootpipe: Infects all Apple products; No patch available
Sandworm: Launched in 2009; Discovered in 2014;
Infected major utilities throughout West
Shellshock: Core flaw for over a decade; 1.1M attacks in one week of monitoring
Poodle: Obsoleted new version of HTTPS overnight
Home Field
Office
Internet
Corporat
e
Gateway
Corpor
ate
Servers
Quasi-Secured
Unsecured
Confidential and Proprietary Property of
2018 Cybersecurity Market: $101B
2019
Mobile
Security
Market
Size:
$5.8B
2019 Global
Network
Security
Market Size:
$7.5B
2020 SSL VPN
Market Size:
$26.62B
2016 IP VPN Market Size:
$81B
2015 Cybersecurity Market: $77B
(Click To Continue)
Confidential and Proprietary Property of
Computer
Computer
Network
SIPNVirtualization
Layer
SIPNVirtualization
Layer
Home Field
Office
Internet
SIPN
Gatewa
y
Corporat
e Servers
Secured
Unsecured
Confidential and Proprietary Property of
Confidential and Proprietary Property of
Confidential and Proprietary Property of
Confidential and Proprietary Property of
Application Layer (Http/s, FTP,
DNS,…)
Presentation Layer (MIME,
XDR)Session Layer (PPTP,
SOCKS, NetBIOS)Transport Layer (TCP, UDP,
SCTP)Network Layer (IP (v4/6),
IPsec)
Data Link Layer (mini-Port
Driver)Physical Layer (Network
Card)
SIPN Virtualization Layer
OperatingSystemPhysical
OSIStack
Confidential and Proprietary Property of
Confidential and Proprietary Property of Confidential and Proprietary Property of
Confidential and Proprietary Property of
SIPN Business Overview
SIPN Business Overview
SIPN Business Overview

More Related Content

What's hot

Create WiFi Hotspot on Windows 7
Create WiFi Hotspot on Windows 7 Create WiFi Hotspot on Windows 7
Create WiFi Hotspot on Windows 7
Jack Smith
 
Cyren cybersecurity of things
Cyren cybersecurity of thingsCyren cybersecurity of things
Cyren cybersecurity of things
Christian Milde
 
Intelligence Driven Security
Intelligence Driven SecurityIntelligence Driven Security
Intelligence Driven Security
MarketingArrowECS_CZ
 
Debunking the Top 5 Myths About Mobile AppSec
Debunking the Top 5 Myths About Mobile AppSecDebunking the Top 5 Myths About Mobile AppSec
Debunking the Top 5 Myths About Mobile AppSec
NowSecure
 
LiPari_Assignment8
LiPari_Assignment8LiPari_Assignment8
LiPari_Assignment8
Phillip LiPari
 
Top 5 wi fi security threats
Top 5 wi fi security threatsTop 5 wi fi security threats
Top 5 wi fi security threats
gruzabb
 
Building a Mobile App Pen Testing Blueprint
Building a Mobile App Pen Testing BlueprintBuilding a Mobile App Pen Testing Blueprint
Building a Mobile App Pen Testing Blueprint
NowSecure
 
Android Q & iOS 13 Privacy Enhancements
Android Q & iOS 13 Privacy EnhancementsAndroid Q & iOS 13 Privacy Enhancements
Android Q & iOS 13 Privacy Enhancements
NowSecure
 
secureIoT Presentation #1
secureIoT Presentation #1secureIoT Presentation #1
secureIoT Presentation #1
Mel Savich
 
Cybersecurity Threat Intelligence Briefing
Cybersecurity Threat Intelligence BriefingCybersecurity Threat Intelligence Briefing
Cybersecurity Threat Intelligence Briefing
www.securekm.com; Secure Knowledge Management Inc.
 
Samsung and Android Security brochure
Samsung and Android Security brochureSamsung and Android Security brochure
Samsung and Android Security brochure
Sherief Razzaque
 
Pure retail training presentation
Pure retail training presentationPure retail training presentation
Pure retail training presentation
katelyn-fogarty
 
Pure retail training presentation v2
Pure retail training presentation v2Pure retail training presentation v2
Pure retail training presentation v2
kaspersky-lab
 
Pure retail training non animation
Pure retail training non animationPure retail training non animation
Pure retail training non animation
katelyn-fogarty
 
Bitzer Mobile TiECON 2013 Pitch Indus Khaitan
Bitzer Mobile TiECON 2013 Pitch Indus KhaitanBitzer Mobile TiECON 2013 Pitch Indus Khaitan
Bitzer Mobile TiECON 2013 Pitch Indus Khaitan
Indus Khaitan
 
Five mobile security challenges facing the enterprise
Five mobile security challenges facing the enterpriseFive mobile security challenges facing the enterprise
Five mobile security challenges facing the enterprise
NowSecure
 
u2f fido security key
u2f fido security keyu2f fido security key
u2f fido security key
GoTrust ID
 
Managing Mobile Business Insecurities
Managing Mobile Business InsecuritiesManaging Mobile Business Insecurities
Managing Mobile Business Insecurities
Ping Identity
 
Clear and Present Danger
Clear and Present DangerClear and Present Danger
Clear and Present Danger
Ping Identity
 
Mobile Security - 2015 Wrap-up and 2016 Predictions
Mobile Security - 2015 Wrap-up and 2016 PredictionsMobile Security - 2015 Wrap-up and 2016 Predictions
Mobile Security - 2015 Wrap-up and 2016 Predictions
Skycure
 

What's hot (20)

Create WiFi Hotspot on Windows 7
Create WiFi Hotspot on Windows 7 Create WiFi Hotspot on Windows 7
Create WiFi Hotspot on Windows 7
 
Cyren cybersecurity of things
Cyren cybersecurity of thingsCyren cybersecurity of things
Cyren cybersecurity of things
 
Intelligence Driven Security
Intelligence Driven SecurityIntelligence Driven Security
Intelligence Driven Security
 
Debunking the Top 5 Myths About Mobile AppSec
Debunking the Top 5 Myths About Mobile AppSecDebunking the Top 5 Myths About Mobile AppSec
Debunking the Top 5 Myths About Mobile AppSec
 
LiPari_Assignment8
LiPari_Assignment8LiPari_Assignment8
LiPari_Assignment8
 
Top 5 wi fi security threats
Top 5 wi fi security threatsTop 5 wi fi security threats
Top 5 wi fi security threats
 
Building a Mobile App Pen Testing Blueprint
Building a Mobile App Pen Testing BlueprintBuilding a Mobile App Pen Testing Blueprint
Building a Mobile App Pen Testing Blueprint
 
Android Q & iOS 13 Privacy Enhancements
Android Q & iOS 13 Privacy EnhancementsAndroid Q & iOS 13 Privacy Enhancements
Android Q & iOS 13 Privacy Enhancements
 
secureIoT Presentation #1
secureIoT Presentation #1secureIoT Presentation #1
secureIoT Presentation #1
 
Cybersecurity Threat Intelligence Briefing
Cybersecurity Threat Intelligence BriefingCybersecurity Threat Intelligence Briefing
Cybersecurity Threat Intelligence Briefing
 
Samsung and Android Security brochure
Samsung and Android Security brochureSamsung and Android Security brochure
Samsung and Android Security brochure
 
Pure retail training presentation
Pure retail training presentationPure retail training presentation
Pure retail training presentation
 
Pure retail training presentation v2
Pure retail training presentation v2Pure retail training presentation v2
Pure retail training presentation v2
 
Pure retail training non animation
Pure retail training non animationPure retail training non animation
Pure retail training non animation
 
Bitzer Mobile TiECON 2013 Pitch Indus Khaitan
Bitzer Mobile TiECON 2013 Pitch Indus KhaitanBitzer Mobile TiECON 2013 Pitch Indus Khaitan
Bitzer Mobile TiECON 2013 Pitch Indus Khaitan
 
Five mobile security challenges facing the enterprise
Five mobile security challenges facing the enterpriseFive mobile security challenges facing the enterprise
Five mobile security challenges facing the enterprise
 
u2f fido security key
u2f fido security keyu2f fido security key
u2f fido security key
 
Managing Mobile Business Insecurities
Managing Mobile Business InsecuritiesManaging Mobile Business Insecurities
Managing Mobile Business Insecurities
 
Clear and Present Danger
Clear and Present DangerClear and Present Danger
Clear and Present Danger
 
Mobile Security - 2015 Wrap-up and 2016 Predictions
Mobile Security - 2015 Wrap-up and 2016 PredictionsMobile Security - 2015 Wrap-up and 2016 Predictions
Mobile Security - 2015 Wrap-up and 2016 Predictions
 

Viewers also liked

Eventagram
EventagramEventagram
Happy 25 ADAp2
Happy 25 ADAp2Happy 25 ADAp2
Happy 25 ADAp2
Sara Capetillo
 
Thomas-McBride-Resume3
Thomas-McBride-Resume3Thomas-McBride-Resume3
Thomas-McBride-Resume3
Thomas McBride
 
Business Implications and Politics Accompanying Australian Climate Policy Reform
Business Implications and Politics Accompanying Australian Climate Policy ReformBusiness Implications and Politics Accompanying Australian Climate Policy Reform
Business Implications and Politics Accompanying Australian Climate Policy Reform
Nicholas Flood
 
Homework Hungary
Homework HungaryHomework Hungary
Homework Hungary
Flatio
 
Sistema operativo ventajas y desventajas
Sistema operativo ventajas y desventajasSistema operativo ventajas y desventajas
Sistema operativo ventajas y desventajas
grismay
 
Intelegain profile-4.1
Intelegain profile-4.1Intelegain profile-4.1
Intelegain profile-4.1
Vinay Halappa
 
Metodologia rup
Metodologia rupMetodologia rup
Metodologia rup
Luiyi Rodriguez
 
A Mobile Sensor Activity for Ad-Hoc Groups
A Mobile Sensor Activity for Ad-Hoc GroupsA Mobile Sensor Activity for Ad-Hoc Groups
A Mobile Sensor Activity for Ad-Hoc Groups
The Mind Lab
 
Editor de archivos de texto vi
Editor de archivos de texto viEditor de archivos de texto vi
Editor de archivos de texto vi
Pablo Macon
 
Homework Finland
Homework FinlandHomework Finland
Homework Finland
Flatio
 
Sistema operativo ventajas y desventajas
Sistema operativo ventajas y desventajasSistema operativo ventajas y desventajas
Sistema operativo ventajas y desventajas
grismay
 

Viewers also liked (12)

Eventagram
EventagramEventagram
Eventagram
 
Happy 25 ADAp2
Happy 25 ADAp2Happy 25 ADAp2
Happy 25 ADAp2
 
Thomas-McBride-Resume3
Thomas-McBride-Resume3Thomas-McBride-Resume3
Thomas-McBride-Resume3
 
Business Implications and Politics Accompanying Australian Climate Policy Reform
Business Implications and Politics Accompanying Australian Climate Policy ReformBusiness Implications and Politics Accompanying Australian Climate Policy Reform
Business Implications and Politics Accompanying Australian Climate Policy Reform
 
Homework Hungary
Homework HungaryHomework Hungary
Homework Hungary
 
Sistema operativo ventajas y desventajas
Sistema operativo ventajas y desventajasSistema operativo ventajas y desventajas
Sistema operativo ventajas y desventajas
 
Intelegain profile-4.1
Intelegain profile-4.1Intelegain profile-4.1
Intelegain profile-4.1
 
Metodologia rup
Metodologia rupMetodologia rup
Metodologia rup
 
A Mobile Sensor Activity for Ad-Hoc Groups
A Mobile Sensor Activity for Ad-Hoc GroupsA Mobile Sensor Activity for Ad-Hoc Groups
A Mobile Sensor Activity for Ad-Hoc Groups
 
Editor de archivos de texto vi
Editor de archivos de texto viEditor de archivos de texto vi
Editor de archivos de texto vi
 
Homework Finland
Homework FinlandHomework Finland
Homework Finland
 
Sistema operativo ventajas y desventajas
Sistema operativo ventajas y desventajasSistema operativo ventajas y desventajas
Sistema operativo ventajas y desventajas
 

Similar to SIPN Business Overview

Year of pawnage - Ian trump
Year of pawnage  - Ian trumpYear of pawnage  - Ian trump
Year of pawnage - Ian trump
MAXfocus
 
RSA 2019: Machine Identity Protection
RSA 2019: Machine Identity ProtectionRSA 2019: Machine Identity Protection
RSA 2019: Machine Identity Protection
Michael Thelander
 
Why Everyone Needs a Cloud-First Security Program - SASEfaction Guaranteed!
Why Everyone Needs a Cloud-First  Security Program - SASEfaction Guaranteed!Why Everyone Needs a Cloud-First  Security Program - SASEfaction Guaranteed!
Why Everyone Needs a Cloud-First Security Program - SASEfaction Guaranteed!
Netskope
 
It’s time to boost VoIP network security
It’s time to boost VoIP network securityIt’s time to boost VoIP network security
It’s time to boost VoIP network security
Bev Robb
 
PALO ALTO presentation used during the SWITCHPOINT NV/SA Quarterly Experience...
PALO ALTO presentation used during the SWITCHPOINT NV/SA Quarterly Experience...PALO ALTO presentation used during the SWITCHPOINT NV/SA Quarterly Experience...
PALO ALTO presentation used during the SWITCHPOINT NV/SA Quarterly Experience...
SWITCHPOINT NV/SA
 
Check Point Corporate Overview 2020 - Detailed
Check Point Corporate Overview 2020 - DetailedCheck Point Corporate Overview 2020 - Detailed
Check Point Corporate Overview 2020 - Detailed
Moti Sagey מוטי שגיא
 
Nvis, inc. 03 18-2020 - final
Nvis, inc. 03 18-2020 - finalNvis, inc. 03 18-2020 - final
Nvis, inc. 03 18-2020 - final
A. Phillip Smith
 
Top 5 predictions webinar
Top 5 predictions webinarTop 5 predictions webinar
Top 5 predictions webinar
Zscaler
 
The Future of Digital Identity in the Age of the Internet of Things
The Future of Digital Identity in the Age of the Internet of ThingsThe Future of Digital Identity in the Age of the Internet of Things
The Future of Digital Identity in the Age of the Internet of Things
ForgeRock
 
Five questions to help you choose the right mobile connectivity provider. Kar...
Five questions to help you choose the right mobile connectivity provider. Kar...Five questions to help you choose the right mobile connectivity provider. Kar...
Five questions to help you choose the right mobile connectivity provider. Kar...
Karina Popova
 
Developing Your Security Foundation: A Guide for Nonprofits During the Pandem...
Developing Your Security Foundation: A Guide for Nonprofits During the Pandem...Developing Your Security Foundation: A Guide for Nonprofits During the Pandem...
Developing Your Security Foundation: A Guide for Nonprofits During the Pandem...
TechSoup
 
Cybersecurity in an IoT and Mobile World
Cybersecurity in an IoT and Mobile WorldCybersecurity in an IoT and Mobile World
Cybersecurity in an IoT and Mobile World
Ahmed Abu Eldahab
 
Fortinet - Digital Government Cloud Security 2.pptx
Fortinet - Digital Government Cloud Security 2.pptxFortinet - Digital Government Cloud Security 2.pptx
Fortinet - Digital Government Cloud Security 2.pptx
ThanhBoHoaluaVn
 
BotwallPresentation
BotwallPresentationBotwallPresentation
BotwallPresentation
Robert Mendelsohn
 
No IoT Without Identity
No IoT Without Identity No IoT Without Identity
No IoT Without Identity
ForgeRock
 
Introduction to FIDO Biometric Authentication
Introduction to FIDO Biometric AuthenticationIntroduction to FIDO Biometric Authentication
Introduction to FIDO Biometric Authentication
FIDO Alliance
 
The Secret to Surviving the Network Deluge
The Secret to Surviving the Network DelugeThe Secret to Surviving the Network Deluge
The Secret to Surviving the Network Deluge
LiveAction Next Generation Network Management Software
 
Akamai Intelligent Edge Security
Akamai Intelligent Edge SecurityAkamai Intelligent Edge Security
Akamai Intelligent Edge Security
Akamai Technologies
 
The State of Open Source Security Vulnerabilities in 2020
The State of Open Source Security Vulnerabilities in 2020The State of Open Source Security Vulnerabilities in 2020
The State of Open Source Security Vulnerabilities in 2020
DevOps.com
 
The Promise (and Perils) of the Blockchain in Media & Insights
The Promise (and Perils) of the Blockchain in Media & InsightsThe Promise (and Perils) of the Blockchain in Media & Insights
The Promise (and Perils) of the Blockchain in Media & Insights
MediaPost
 

Similar to SIPN Business Overview (20)

Year of pawnage - Ian trump
Year of pawnage  - Ian trumpYear of pawnage  - Ian trump
Year of pawnage - Ian trump
 
RSA 2019: Machine Identity Protection
RSA 2019: Machine Identity ProtectionRSA 2019: Machine Identity Protection
RSA 2019: Machine Identity Protection
 
Why Everyone Needs a Cloud-First Security Program - SASEfaction Guaranteed!
Why Everyone Needs a Cloud-First  Security Program - SASEfaction Guaranteed!Why Everyone Needs a Cloud-First  Security Program - SASEfaction Guaranteed!
Why Everyone Needs a Cloud-First Security Program - SASEfaction Guaranteed!
 
It’s time to boost VoIP network security
It’s time to boost VoIP network securityIt’s time to boost VoIP network security
It’s time to boost VoIP network security
 
PALO ALTO presentation used during the SWITCHPOINT NV/SA Quarterly Experience...
PALO ALTO presentation used during the SWITCHPOINT NV/SA Quarterly Experience...PALO ALTO presentation used during the SWITCHPOINT NV/SA Quarterly Experience...
PALO ALTO presentation used during the SWITCHPOINT NV/SA Quarterly Experience...
 
Check Point Corporate Overview 2020 - Detailed
Check Point Corporate Overview 2020 - DetailedCheck Point Corporate Overview 2020 - Detailed
Check Point Corporate Overview 2020 - Detailed
 
Nvis, inc. 03 18-2020 - final
Nvis, inc. 03 18-2020 - finalNvis, inc. 03 18-2020 - final
Nvis, inc. 03 18-2020 - final
 
Top 5 predictions webinar
Top 5 predictions webinarTop 5 predictions webinar
Top 5 predictions webinar
 
The Future of Digital Identity in the Age of the Internet of Things
The Future of Digital Identity in the Age of the Internet of ThingsThe Future of Digital Identity in the Age of the Internet of Things
The Future of Digital Identity in the Age of the Internet of Things
 
Five questions to help you choose the right mobile connectivity provider. Kar...
Five questions to help you choose the right mobile connectivity provider. Kar...Five questions to help you choose the right mobile connectivity provider. Kar...
Five questions to help you choose the right mobile connectivity provider. Kar...
 
Developing Your Security Foundation: A Guide for Nonprofits During the Pandem...
Developing Your Security Foundation: A Guide for Nonprofits During the Pandem...Developing Your Security Foundation: A Guide for Nonprofits During the Pandem...
Developing Your Security Foundation: A Guide for Nonprofits During the Pandem...
 
Cybersecurity in an IoT and Mobile World
Cybersecurity in an IoT and Mobile WorldCybersecurity in an IoT and Mobile World
Cybersecurity in an IoT and Mobile World
 
Fortinet - Digital Government Cloud Security 2.pptx
Fortinet - Digital Government Cloud Security 2.pptxFortinet - Digital Government Cloud Security 2.pptx
Fortinet - Digital Government Cloud Security 2.pptx
 
BotwallPresentation
BotwallPresentationBotwallPresentation
BotwallPresentation
 
No IoT Without Identity
No IoT Without Identity No IoT Without Identity
No IoT Without Identity
 
Introduction to FIDO Biometric Authentication
Introduction to FIDO Biometric AuthenticationIntroduction to FIDO Biometric Authentication
Introduction to FIDO Biometric Authentication
 
The Secret to Surviving the Network Deluge
The Secret to Surviving the Network DelugeThe Secret to Surviving the Network Deluge
The Secret to Surviving the Network Deluge
 
Akamai Intelligent Edge Security
Akamai Intelligent Edge SecurityAkamai Intelligent Edge Security
Akamai Intelligent Edge Security
 
The State of Open Source Security Vulnerabilities in 2020
The State of Open Source Security Vulnerabilities in 2020The State of Open Source Security Vulnerabilities in 2020
The State of Open Source Security Vulnerabilities in 2020
 
The Promise (and Perils) of the Blockchain in Media & Insights
The Promise (and Perils) of the Blockchain in Media & InsightsThe Promise (and Perils) of the Blockchain in Media & Insights
The Promise (and Perils) of the Blockchain in Media & Insights
 

SIPN Business Overview