SlideShare a Scribd company logo
Solving	access	for	Hybrid	IT
Jeff	Green	SVP	Products
Solving Access for Hybrid IT
Securing accessis a challenge
Solving Access for Hybrid IT
97%
ENTERPRISES
SUFFERED A
BREACH
134
BEFORE BREACHES WERE
DISCOVERED
DAYS
Gigamon 2015
1%
55%
PC
Mobile
How we are connecting
2011
2015
Hacking 38%
(up 8%)
Employee
Negligence
15% (doubled)
Insider Theft
10%
PhysicalTheft
10%
Subcontractors
9%
Primary sourcesofbreaches
Accidental
Exposure
13%
Data on the Move
7%
Old NAC:
PC and Datacenter
NetworkAccess
Access
PC Datacenter, Campus
VS
New Access:
Hybrid IT
SecureAccess
Visibility
Compliance
Authentication
Access Control
Datacenter,
Cloud, SaaS, Campus
BYOD
Solving Access for Hybrid IT
How we connect is more complex
All Major OSs
On-the-go
Homenetwork
Untrusted LAN
Guest Wi-Fi
CorporateNetwork
• Enterpriseapplications
• VDI, terminalservices
Datacenter
Cloud SaaS
• Apps
Cloud IaaS
• AWS, Azure
Mobile Apps
• Apps
Mobility HybridIT,
Cloudification
VDI
Datacenter
Consolidation
The new reality and challenges of Hybrid IT
Solving Access for Hybrid IT
MAM/MDM
VPN
Mobile GW
Web GW
Cloud Security GW
NAC
2FA/MFA
Authentication
Identity
Federation
Contextual
AccessControl
Device
Compliance
DataProtection
SecureData
Center Access
SecureCloud
Access
Visibility
Puzzle pieces needed for secureaccess
Secure AccessArchitecture
Solving Access for Hybrid IT
Remote &
Mobile
users
Protected
Resources
Firewall Switch
Wireless
LAN
Remote Access
Cloud Access
Network Access
Datacenter
Access
Single
Management
Console
CampusSaaS/Cloud Data Center
Employees
Guests
Protected
Resources
Secure the Endpoint
Solving Access for Hybrid IT
MDMRemote &
Mobile
users
Protected
Resources
Firewall Switch
Wireless
LAN
Remote Access
Cloud Access
Network Access
Datacenter
Access
Single
Management
Console
CampusSaaS/Cloud Data Center
Employees
Guests
Securing the endpoint
• Native app single sign-on
• Transparent strong authentication
• Device compliance check
• Contextual Access Policies
• Improved user experience
• Integration with mobility
management
Protected
Resources
Secure Mobile andCloud
Solving Access for Hybrid IT
Remote &
Mobile
users
Protected
Resources
Firewall Switch
Wireless
LAN
Remote Access
Cloud Access
Network Access
Datacenter
Access
Single
Management
Console
CampusSaaS/Cloud Data Center
Employees
Guests
Mobile and Cloud access
• Easy BYOD on/off-boarding for
laptops, smartphones and tablets
• Contextual Access control
• Compliance policy for access
• Identity tied back to the enterprise
• Device & Identity tie
Protected
Resources
Secure AccessArchitecture
Solving Access for Hybrid IT
Remote &
Mobile
users
Protected
Resources
Firewall Switch
Wireless
LAN
Remote Access
Cloud Access
Network Access
Datacenter
Access
Single
Management
Console
CampusSaaS/Cloud Data Center
Employees
Guests
Network and Datacenter access
• Device compliance check
• Contextual Access Policies
• Enforcement points throughout the
network
• Guest user access
Protected
Resources
Visibility
Solving Access for Hybrid IT
Remote &
Mobile
users
Protected
Resources
Firewall Switch
Wireless
LAN
Remote Access
Cloud Access
Network Access
Datacenter
Access
Single
Management
Console
CampusSaaS/Cloud Data Center
Employees
Guests
Visibility into the network
• Understand compliance
• Understand the what, who, when,
how
• Understand contractors and third
party access
• Understand devices hitting the
network and the risk they may
cause
Protected
Resources
Summary
Solving Access for Hybrid IT
Accessis evolving
Hybrid IT
Is/has changedthe way wesecuredata. Hybridity is important.
Endpoint
Becomes important insolvingtheaccess problems introduced
withHybrid IT
Identityand Device
Whilst strongidentity and authis important tyingindevice and
its complianceis now key
Visibility
Understandingwhat is going on in your network (inccloud) is
vital
Questions?
SecureAccess For the Next Generation
Solving Access for Hybrid IT

More Related Content

What's hot

Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014
Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014
Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014
Conference_by_EVRY
 
WatchGuard Firewall & Network Security
WatchGuard Firewall & Network SecurityWatchGuard Firewall & Network Security
WatchGuard Firewall & Network Security
Marketing Team
 
Security & Seamless CX in User Authentication: How to Achieve Both?
Security & Seamless CX in User Authentication: How to Achieve Both?Security & Seamless CX in User Authentication: How to Achieve Both?
Security & Seamless CX in User Authentication: How to Achieve Both?
Ivona M
 
The Security Policy Management Maturity Model: How to Move Up the Curve
The Security Policy Management Maturity Model: How to Move Up the CurveThe Security Policy Management Maturity Model: How to Move Up the Curve
The Security Policy Management Maturity Model: How to Move Up the Curve
AlgoSec
 
Cloud Security & Cloud Encryption Explained
Cloud Security & Cloud Encryption ExplainedCloud Security & Cloud Encryption Explained
Cloud Security & Cloud Encryption Explained
Porticor - The Cloud Security Experts
 
Security For Business: Are You And Your Customers Safe
Security For Business:  Are You And Your Customers SafeSecurity For Business:  Are You And Your Customers Safe
Security For Business: Are You And Your Customers Safe
woodsy01
 
OpenText Core Customer Presentation Sept 2015
OpenText Core Customer Presentation Sept 2015OpenText Core Customer Presentation Sept 2015
OpenText Core Customer Presentation Sept 2015
Marcel Hoffmann
 
The Loss of Intellectual Property in the Digital Age: What Companies can d…
The Loss of Intellectual Property in the Digital Age: What Companies can d…The Loss of Intellectual Property in the Digital Age: What Companies can d…
The Loss of Intellectual Property in the Digital Age: What Companies can d…
Christopher Kranich
 
Building secure digital services
Building secure digital servicesBuilding secure digital services
Building secure digital services
NetDef
 
Zero Trust Enterprise Network at Adobe
Zero Trust Enterprise Network at AdobeZero Trust Enterprise Network at Adobe
Zero Trust Enterprise Network at Adobe
Vishwas Manral
 
Developer Day 2014 - 2 - philippe guillemette - sierra wireless device to clo...
Developer Day 2014 - 2 - philippe guillemette - sierra wireless device to clo...Developer Day 2014 - 2 - philippe guillemette - sierra wireless device to clo...
Developer Day 2014 - 2 - philippe guillemette - sierra wireless device to clo...
Thibault Cantegrel
 
Webinar bitglass - complete deck-2
Webinar   bitglass - complete deck-2Webinar   bitglass - complete deck-2
Webinar bitglass - complete deck-2
Bitglass
 
Simplifying Security Management in the Virtual Data Center
Simplifying Security Management in the Virtual Data CenterSimplifying Security Management in the Virtual Data Center
Simplifying Security Management in the Virtual Data Center
AlgoSec
 
OpenText Secure MFT (Managed File Transfer)
OpenText Secure MFT (Managed File Transfer)OpenText Secure MFT (Managed File Transfer)
OpenText Secure MFT (Managed File Transfer)
Marcel Hoffmann
 
Practical IIoT Solutions for Manufacturing
Practical IIoT Solutions for ManufacturingPractical IIoT Solutions for Manufacturing
Practical IIoT Solutions for Manufacturing
Inductive Automation
 
Law seminars intl cybersecurity in the power industry
Law seminars intl cybersecurity in the power industryLaw seminars intl cybersecurity in the power industry
Law seminars intl cybersecurity in the power industry
Kevin Murphy
 
Office365 security in depth
Office365 security in depthOffice365 security in depth
Office365 security in depth
Alberto Pascual
 
Getting More Value Out of Your Data
Getting More Value Out of Your DataGetting More Value Out of Your Data
Getting More Value Out of Your Data
InnoTech
 
Risks and Benefits of Cloud Computing
Risks and Benefits of Cloud ComputingRisks and Benefits of Cloud Computing
Risks and Benefits of Cloud Computing
DLA Piper (Canada) LLP
 
Microsegmentation for enterprise data centers
Microsegmentation for enterprise data centersMicrosegmentation for enterprise data centers
Microsegmentation for enterprise data centers
Narendran Vaideeswaran
 

What's hot (20)

Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014
Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014
Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014
 
WatchGuard Firewall & Network Security
WatchGuard Firewall & Network SecurityWatchGuard Firewall & Network Security
WatchGuard Firewall & Network Security
 
Security & Seamless CX in User Authentication: How to Achieve Both?
Security & Seamless CX in User Authentication: How to Achieve Both?Security & Seamless CX in User Authentication: How to Achieve Both?
Security & Seamless CX in User Authentication: How to Achieve Both?
 
The Security Policy Management Maturity Model: How to Move Up the Curve
The Security Policy Management Maturity Model: How to Move Up the CurveThe Security Policy Management Maturity Model: How to Move Up the Curve
The Security Policy Management Maturity Model: How to Move Up the Curve
 
Cloud Security & Cloud Encryption Explained
Cloud Security & Cloud Encryption ExplainedCloud Security & Cloud Encryption Explained
Cloud Security & Cloud Encryption Explained
 
Security For Business: Are You And Your Customers Safe
Security For Business:  Are You And Your Customers SafeSecurity For Business:  Are You And Your Customers Safe
Security For Business: Are You And Your Customers Safe
 
OpenText Core Customer Presentation Sept 2015
OpenText Core Customer Presentation Sept 2015OpenText Core Customer Presentation Sept 2015
OpenText Core Customer Presentation Sept 2015
 
The Loss of Intellectual Property in the Digital Age: What Companies can d…
The Loss of Intellectual Property in the Digital Age: What Companies can d…The Loss of Intellectual Property in the Digital Age: What Companies can d…
The Loss of Intellectual Property in the Digital Age: What Companies can d…
 
Building secure digital services
Building secure digital servicesBuilding secure digital services
Building secure digital services
 
Zero Trust Enterprise Network at Adobe
Zero Trust Enterprise Network at AdobeZero Trust Enterprise Network at Adobe
Zero Trust Enterprise Network at Adobe
 
Developer Day 2014 - 2 - philippe guillemette - sierra wireless device to clo...
Developer Day 2014 - 2 - philippe guillemette - sierra wireless device to clo...Developer Day 2014 - 2 - philippe guillemette - sierra wireless device to clo...
Developer Day 2014 - 2 - philippe guillemette - sierra wireless device to clo...
 
Webinar bitglass - complete deck-2
Webinar   bitglass - complete deck-2Webinar   bitglass - complete deck-2
Webinar bitglass - complete deck-2
 
Simplifying Security Management in the Virtual Data Center
Simplifying Security Management in the Virtual Data CenterSimplifying Security Management in the Virtual Data Center
Simplifying Security Management in the Virtual Data Center
 
OpenText Secure MFT (Managed File Transfer)
OpenText Secure MFT (Managed File Transfer)OpenText Secure MFT (Managed File Transfer)
OpenText Secure MFT (Managed File Transfer)
 
Practical IIoT Solutions for Manufacturing
Practical IIoT Solutions for ManufacturingPractical IIoT Solutions for Manufacturing
Practical IIoT Solutions for Manufacturing
 
Law seminars intl cybersecurity in the power industry
Law seminars intl cybersecurity in the power industryLaw seminars intl cybersecurity in the power industry
Law seminars intl cybersecurity in the power industry
 
Office365 security in depth
Office365 security in depthOffice365 security in depth
Office365 security in depth
 
Getting More Value Out of Your Data
Getting More Value Out of Your DataGetting More Value Out of Your Data
Getting More Value Out of Your Data
 
Risks and Benefits of Cloud Computing
Risks and Benefits of Cloud ComputingRisks and Benefits of Cloud Computing
Risks and Benefits of Cloud Computing
 
Microsegmentation for enterprise data centers
Microsegmentation for enterprise data centersMicrosegmentation for enterprise data centers
Microsegmentation for enterprise data centers
 

Similar to Solving access for Hybrid IT

Solving access for hybrid it Axians (introducing pulse secure) - Networkshop44
Solving access for hybrid it  Axians (introducing pulse secure) - Networkshop44Solving access for hybrid it  Axians (introducing pulse secure) - Networkshop44
Solving access for hybrid it Axians (introducing pulse secure) - Networkshop44
Jisc
 
Aerohive Networks e ZScaler, le soluzioni tecnologiche per il nuovo ecosistem...
Aerohive Networks e ZScaler, le soluzioni tecnologiche per il nuovo ecosistem...Aerohive Networks e ZScaler, le soluzioni tecnologiche per il nuovo ecosistem...
Aerohive Networks e ZScaler, le soluzioni tecnologiche per il nuovo ecosistem...
Miriade Spa
 
EMEA10: Trepidation in Moving to the Cloud
EMEA10: Trepidation in Moving to the CloudEMEA10: Trepidation in Moving to the Cloud
EMEA10: Trepidation in Moving to the Cloud
CompTIA UK
 
HP2065_TieCon_Presentation_V7
HP2065_TieCon_Presentation_V7HP2065_TieCon_Presentation_V7
HP2065_TieCon_Presentation_V7
Mark Interrante
 
Bring Your Own Device - DesktopDirect by Array Networks
 Bring Your Own Device - DesktopDirect by Array Networks Bring Your Own Device - DesktopDirect by Array Networks
Bring Your Own Device - DesktopDirect by Array Networks
Intellicomp GmbH
 
Optimizing Your Hybrid IT Strategy
Optimizing Your Hybrid IT StrategyOptimizing Your Hybrid IT Strategy
Optimizing Your Hybrid IT Strategy
Advanced Technology Consulting (ATC)
 
3 Steps to Safely Bringing Your Own Devices (BYOD)
3 Steps to Safely Bringing Your Own Devices (BYOD)3 Steps to Safely Bringing Your Own Devices (BYOD)
3 Steps to Safely Bringing Your Own Devices (BYOD)
Motorola Solutions
 
Corporate Mobility Insights
Corporate Mobility InsightsCorporate Mobility Insights
Corporate Mobility Insights
Joe Robens
 
Big data in term of security measure
Big data in term of security measureBig data in term of security measure
Big data in term of security measure
Yaakub Idris
 
Information Security
Information SecurityInformation Security
Information Security
Mohit8780
 
Rethinking Data Availability and Governance in a Mobile World
Rethinking Data Availability and Governance in a Mobile WorldRethinking Data Availability and Governance in a Mobile World
Rethinking Data Availability and Governance in a Mobile World
Inside Analysis
 
Rethinking Data Availability and Governance in a Mobile World
Rethinking Data Availability and Governance in a Mobile WorldRethinking Data Availability and Governance in a Mobile World
Rethinking Data Availability and Governance in a Mobile World
Hao Tran
 
Wp byod
Wp byodWp byod
Wp byod
J
 
Security - A Digital Transformation Enabler
Security - A Digital Transformation EnablerSecurity - A Digital Transformation Enabler
Security - A Digital Transformation Enabler
Alexander Akinjayeju. MSc, CISM, Prince2
 
Mobile secure workplace briefing presentation
Mobile secure workplace briefing presentationMobile secure workplace briefing presentation
Mobile secure workplace briefing presentation
solarisyourep
 
TIC-TOC: VPN Is Dead; Are you Monetizing Its Replacement?
TIC-TOC: VPN Is Dead; Are you Monetizing Its Replacement?TIC-TOC: VPN Is Dead; Are you Monetizing Its Replacement?
TIC-TOC: VPN Is Dead; Are you Monetizing Its Replacement?
SaraPia5
 
Developing Interoperable Components for an Open IoT Foundation
Developing Interoperable Components for an Open IoT Foundation Developing Interoperable Components for an Open IoT Foundation
Developing Interoperable Components for an Open IoT Foundation
Eurotech
 
Cybersecurity Insiders Webinar - Zero Trust: Best Practices for Securing the...
Cybersecurity Insiders Webinar  - Zero Trust: Best Practices for Securing the...Cybersecurity Insiders Webinar  - Zero Trust: Best Practices for Securing the...
Cybersecurity Insiders Webinar - Zero Trust: Best Practices for Securing the...
Ivanti
 
Eurotech and Red Hat collaboration simplifies Internet of Things integration ...
Eurotech and Red Hat collaboration simplifies Internet of Things integration ...Eurotech and Red Hat collaboration simplifies Internet of Things integration ...
Eurotech and Red Hat collaboration simplifies Internet of Things integration ...
Eurotech
 
vtec-company-profile-final-digital
vtec-company-profile-final-digitalvtec-company-profile-final-digital
vtec-company-profile-final-digital
Burhan Kamal
 

Similar to Solving access for Hybrid IT (20)

Solving access for hybrid it Axians (introducing pulse secure) - Networkshop44
Solving access for hybrid it  Axians (introducing pulse secure) - Networkshop44Solving access for hybrid it  Axians (introducing pulse secure) - Networkshop44
Solving access for hybrid it Axians (introducing pulse secure) - Networkshop44
 
Aerohive Networks e ZScaler, le soluzioni tecnologiche per il nuovo ecosistem...
Aerohive Networks e ZScaler, le soluzioni tecnologiche per il nuovo ecosistem...Aerohive Networks e ZScaler, le soluzioni tecnologiche per il nuovo ecosistem...
Aerohive Networks e ZScaler, le soluzioni tecnologiche per il nuovo ecosistem...
 
EMEA10: Trepidation in Moving to the Cloud
EMEA10: Trepidation in Moving to the CloudEMEA10: Trepidation in Moving to the Cloud
EMEA10: Trepidation in Moving to the Cloud
 
HP2065_TieCon_Presentation_V7
HP2065_TieCon_Presentation_V7HP2065_TieCon_Presentation_V7
HP2065_TieCon_Presentation_V7
 
Bring Your Own Device - DesktopDirect by Array Networks
 Bring Your Own Device - DesktopDirect by Array Networks Bring Your Own Device - DesktopDirect by Array Networks
Bring Your Own Device - DesktopDirect by Array Networks
 
Optimizing Your Hybrid IT Strategy
Optimizing Your Hybrid IT StrategyOptimizing Your Hybrid IT Strategy
Optimizing Your Hybrid IT Strategy
 
3 Steps to Safely Bringing Your Own Devices (BYOD)
3 Steps to Safely Bringing Your Own Devices (BYOD)3 Steps to Safely Bringing Your Own Devices (BYOD)
3 Steps to Safely Bringing Your Own Devices (BYOD)
 
Corporate Mobility Insights
Corporate Mobility InsightsCorporate Mobility Insights
Corporate Mobility Insights
 
Big data in term of security measure
Big data in term of security measureBig data in term of security measure
Big data in term of security measure
 
Information Security
Information SecurityInformation Security
Information Security
 
Rethinking Data Availability and Governance in a Mobile World
Rethinking Data Availability and Governance in a Mobile WorldRethinking Data Availability and Governance in a Mobile World
Rethinking Data Availability and Governance in a Mobile World
 
Rethinking Data Availability and Governance in a Mobile World
Rethinking Data Availability and Governance in a Mobile WorldRethinking Data Availability and Governance in a Mobile World
Rethinking Data Availability and Governance in a Mobile World
 
Wp byod
Wp byodWp byod
Wp byod
 
Security - A Digital Transformation Enabler
Security - A Digital Transformation EnablerSecurity - A Digital Transformation Enabler
Security - A Digital Transformation Enabler
 
Mobile secure workplace briefing presentation
Mobile secure workplace briefing presentationMobile secure workplace briefing presentation
Mobile secure workplace briefing presentation
 
TIC-TOC: VPN Is Dead; Are you Monetizing Its Replacement?
TIC-TOC: VPN Is Dead; Are you Monetizing Its Replacement?TIC-TOC: VPN Is Dead; Are you Monetizing Its Replacement?
TIC-TOC: VPN Is Dead; Are you Monetizing Its Replacement?
 
Developing Interoperable Components for an Open IoT Foundation
Developing Interoperable Components for an Open IoT Foundation Developing Interoperable Components for an Open IoT Foundation
Developing Interoperable Components for an Open IoT Foundation
 
Cybersecurity Insiders Webinar - Zero Trust: Best Practices for Securing the...
Cybersecurity Insiders Webinar  - Zero Trust: Best Practices for Securing the...Cybersecurity Insiders Webinar  - Zero Trust: Best Practices for Securing the...
Cybersecurity Insiders Webinar - Zero Trust: Best Practices for Securing the...
 
Eurotech and Red Hat collaboration simplifies Internet of Things integration ...
Eurotech and Red Hat collaboration simplifies Internet of Things integration ...Eurotech and Red Hat collaboration simplifies Internet of Things integration ...
Eurotech and Red Hat collaboration simplifies Internet of Things integration ...
 
vtec-company-profile-final-digital
vtec-company-profile-final-digitalvtec-company-profile-final-digital
vtec-company-profile-final-digital
 

More from Jeff Green

McAfeeSecJournal-2010
McAfeeSecJournal-2010McAfeeSecJournal-2010
McAfeeSecJournal-2010Jeff Green
 
McAfeeSecJournal-06-2009
McAfeeSecJournal-06-2009McAfeeSecJournal-06-2009
McAfeeSecJournal-06-2009Jeff Green
 
McAfeeSecJournal-09-2008
McAfeeSecJournal-09-2008McAfeeSecJournal-09-2008
McAfeeSecJournal-09-2008Jeff Green
 
McAfeeSecJournal-01-2008
McAfeeSecJournal-01-2008McAfeeSecJournal-01-2008
McAfeeSecJournal-01-2008Jeff Green
 
Building excellence in support
Building excellence in supportBuilding excellence in support
Building excellence in support
Jeff Green
 
Moving from a Data Center to a Hybrid IT Environment Securely
Moving from a Data Center to a Hybrid IT Environment SecurelyMoving from a Data Center to a Hybrid IT Environment Securely
Moving from a Data Center to a Hybrid IT Environment Securely
Jeff Green
 
Implementing Secure Access & Mobile Identity
Implementing Secure Access & Mobile IdentityImplementing Secure Access & Mobile Identity
Implementing Secure Access & Mobile Identity
Jeff Green
 

More from Jeff Green (7)

McAfeeSecJournal-2010
McAfeeSecJournal-2010McAfeeSecJournal-2010
McAfeeSecJournal-2010
 
McAfeeSecJournal-06-2009
McAfeeSecJournal-06-2009McAfeeSecJournal-06-2009
McAfeeSecJournal-06-2009
 
McAfeeSecJournal-09-2008
McAfeeSecJournal-09-2008McAfeeSecJournal-09-2008
McAfeeSecJournal-09-2008
 
McAfeeSecJournal-01-2008
McAfeeSecJournal-01-2008McAfeeSecJournal-01-2008
McAfeeSecJournal-01-2008
 
Building excellence in support
Building excellence in supportBuilding excellence in support
Building excellence in support
 
Moving from a Data Center to a Hybrid IT Environment Securely
Moving from a Data Center to a Hybrid IT Environment SecurelyMoving from a Data Center to a Hybrid IT Environment Securely
Moving from a Data Center to a Hybrid IT Environment Securely
 
Implementing Secure Access & Mobile Identity
Implementing Secure Access & Mobile IdentityImplementing Secure Access & Mobile Identity
Implementing Secure Access & Mobile Identity
 

Recently uploaded

WeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation TechniquesWeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation Techniques
Postman
 
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
Chart Kalyan
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Safe Software
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Speck&Tech
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
Jason Packer
 
Project Management Semester Long Project - Acuity
Project Management Semester Long Project - AcuityProject Management Semester Long Project - Acuity
Project Management Semester Long Project - Acuity
jpupo2018
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
MichaelKnudsen27
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
Tomaz Bratanic
 
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxOcean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
SitimaJohn
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
panagenda
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
Edge AI and Vision Alliance
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
DanBrown980551
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
panagenda
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
ssuserfac0301
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
Zilliz
 
Recommendation System using RAG Architecture
Recommendation System using RAG ArchitectureRecommendation System using RAG Architecture
Recommendation System using RAG Architecture
fredae14
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 

Recently uploaded (20)

WeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation TechniquesWeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation Techniques
 
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
 
Project Management Semester Long Project - Acuity
Project Management Semester Long Project - AcuityProject Management Semester Long Project - Acuity
Project Management Semester Long Project - Acuity
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
 
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxOcean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
 
Recommendation System using RAG Architecture
Recommendation System using RAG ArchitectureRecommendation System using RAG Architecture
Recommendation System using RAG Architecture
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 

Solving access for Hybrid IT

  • 2. Securing accessis a challenge Solving Access for Hybrid IT 97% ENTERPRISES SUFFERED A BREACH 134 BEFORE BREACHES WERE DISCOVERED DAYS Gigamon 2015 1% 55% PC Mobile How we are connecting 2011 2015 Hacking 38% (up 8%) Employee Negligence 15% (doubled) Insider Theft 10% PhysicalTheft 10% Subcontractors 9% Primary sourcesofbreaches Accidental Exposure 13% Data on the Move 7%
  • 3. Old NAC: PC and Datacenter NetworkAccess Access PC Datacenter, Campus VS New Access: Hybrid IT SecureAccess Visibility Compliance Authentication Access Control Datacenter, Cloud, SaaS, Campus BYOD Solving Access for Hybrid IT How we connect is more complex
  • 4. All Major OSs On-the-go Homenetwork Untrusted LAN Guest Wi-Fi CorporateNetwork • Enterpriseapplications • VDI, terminalservices Datacenter Cloud SaaS • Apps Cloud IaaS • AWS, Azure Mobile Apps • Apps Mobility HybridIT, Cloudification VDI Datacenter Consolidation The new reality and challenges of Hybrid IT Solving Access for Hybrid IT MAM/MDM VPN Mobile GW Web GW Cloud Security GW NAC
  • 6. Secure AccessArchitecture Solving Access for Hybrid IT Remote & Mobile users Protected Resources Firewall Switch Wireless LAN Remote Access Cloud Access Network Access Datacenter Access Single Management Console CampusSaaS/Cloud Data Center Employees Guests Protected Resources
  • 7. Secure the Endpoint Solving Access for Hybrid IT MDMRemote & Mobile users Protected Resources Firewall Switch Wireless LAN Remote Access Cloud Access Network Access Datacenter Access Single Management Console CampusSaaS/Cloud Data Center Employees Guests Securing the endpoint • Native app single sign-on • Transparent strong authentication • Device compliance check • Contextual Access Policies • Improved user experience • Integration with mobility management Protected Resources
  • 8. Secure Mobile andCloud Solving Access for Hybrid IT Remote & Mobile users Protected Resources Firewall Switch Wireless LAN Remote Access Cloud Access Network Access Datacenter Access Single Management Console CampusSaaS/Cloud Data Center Employees Guests Mobile and Cloud access • Easy BYOD on/off-boarding for laptops, smartphones and tablets • Contextual Access control • Compliance policy for access • Identity tied back to the enterprise • Device & Identity tie Protected Resources
  • 9. Secure AccessArchitecture Solving Access for Hybrid IT Remote & Mobile users Protected Resources Firewall Switch Wireless LAN Remote Access Cloud Access Network Access Datacenter Access Single Management Console CampusSaaS/Cloud Data Center Employees Guests Network and Datacenter access • Device compliance check • Contextual Access Policies • Enforcement points throughout the network • Guest user access Protected Resources
  • 10. Visibility Solving Access for Hybrid IT Remote & Mobile users Protected Resources Firewall Switch Wireless LAN Remote Access Cloud Access Network Access Datacenter Access Single Management Console CampusSaaS/Cloud Data Center Employees Guests Visibility into the network • Understand compliance • Understand the what, who, when, how • Understand contractors and third party access • Understand devices hitting the network and the risk they may cause Protected Resources
  • 11. Summary Solving Access for Hybrid IT Accessis evolving Hybrid IT Is/has changedthe way wesecuredata. Hybridity is important. Endpoint Becomes important insolvingtheaccess problems introduced withHybrid IT Identityand Device Whilst strongidentity and authis important tyingindevice and its complianceis now key Visibility Understandingwhat is going on in your network (inccloud) is vital
  • 12. Questions? SecureAccess For the Next Generation Solving Access for Hybrid IT