SlideShare a Scribd company logo
1 of 45
Changing
Data Center
STKI
Summit
2013
IT at the crossroads:
Lead, follow or get out of the way
Pini Cohen
Sigal Russin
Security and Networking
Pini Cohen and Sigal Russin’s work/
Copyright@2013
Do not remove source or attribution from any
slide, graph or portion of graph
Customers Main Issues in 2012
• Cyber security -Smarter & Complexity attacks,
APT, DDOS
• BYOD - Security on Mobile –MDM
• Network monitoring -SIEM
• NAC –network access control
• WI-FI as a service
• Control & Monitoring of Administrative
• Unauthorized Device Detection
• DLP- Data loss prevention
• Cloud security
• Regulation – ISO
2
Pini Cohen and Sigal Russin’s work/
Copyright@2013
Do not remove source or attribution from any
slide, graph or portion of graph
Security
• Security 2013
• Social engineering
• Identity management
• Cloud storage services
3
Pini Cohen and Sigal Russin's work
Copyright@2013
Do not remove source or attribution
from any slide, graph or portion of
graph 4
Security
Pini Cohen and Sigal Russin’s work/
Copyright@2013
Do not remove source or attribution from any
slide, graph or portion of graph
Industry groups represented by percent of breaches
5
Source: Verison , 2012 DATA BREACH INVESTIGATIONS REPORT
Security
Pini Cohen and Sigal Russin’s work/
Copyright@2013
Do not remove source or attribution from any
slide, graph or portion of graph
Social tactics by percent of breaches within Social
6
Source: Verison , 2012 DATA BREACH INVESTIGATIONS REPORT
Security
Pini Cohen and Sigal Russin’s work/
Copyright@2013
Do not remove source or attribution from any
slide, graph or portion of graph
7
Source: Ponemon Institute
Security
8
Pini Cohen and Sigal Russin's work
Copyright@2013
Do not remove source or attribution
from any slide, graph or portion of
graph
1
3
2
Pini Cohen and Sigal Russin’s work/
Copyright@2013
Do not remove source or attribution from any
slide, graph or portion of graph
9
Security
Pini Cohen and Sigal Russin's work
Copyright@2013
Do not remove source or attribution
from any slide, graph or portion of
graph
Identity & Access Management
10
Pini Cohen and Sigal Russin’s work/
Copyright@2013
Do not remove source or attribution from any
slide, graph or portion of graph
11
Security
Pini Cohen and Sigal Russin’s work/
Copyright@2013
Do not remove source or attribution from any
slide, graph or portion of graph
12Source: veracode
Pini Cohen and Sigal Russin's
work Copyright@2013
Do not remove source or
attribution from any slide, graph
or portion of graph 13
"Forrester: “Most data breaches caused by employees
30% - 'simple loss or theft‘
27% - 'inadvertant misuse by an employee‘
25% - 'external attack‘
12% - 'malicious insiders‘
Source: information week 2012
Security
Pini Cohen and Sigal Russin’s work/
Copyright@2013
Do not remove source or attribution from any
slide, graph or portion of graph
Turn Insiders Into Assets - Security Awareness Program
14
Source: information week 2012
Focus on changing user behavior- training your employee
(videos)
Test and retest - testing employee reaction to an actual test
like: phishing e-mails.
Teach the individual- tailored training to the company and
the individuals who work there (USB devices).
Even a failure can be a success- employee reports, susceptible
to social engineering.
Pini Cohen and Sigal Russin’s work/
Copyright@2013
Do not remove source or attribution from any
slide, graph or portion of graph
Most Intellectual Property Theft Involves Company Insiders
• Perimeter defenses do not absolutely protect a network, vetting
suppliers is not a sure way to protect against compromised
hardware. You should monitor for anomalies in your network.
• Keep Policy Up To Date!
15
Source: information week 2012, Verison
Security
Pini Cohen and Sigal Russin’s work/
Copyright@2013
Do not remove source or attribution from any
slide, graph or portion of graph
Best Practices for Defending Yourself
16
Out of office replies- do not give a stranger personally
identifiable information.
Email Links and Attachments-never open a link or an attachment
from someone you don’t know.
Phone Calls-requiring that employees use verbal code words to
verify their identity.
On-Premise Badge and Security- use cameras, guards and
mantraps before a secure doorway.
Unlocked Computers and Laptops- always be vigilant!
Source: http://blog.neustar.biz/dont/social-engineering-5-tips-and-best-practices-for-defending-against-it/
Pini Cohen and Sigal Russin’s work/
Copyright@2013
Do not remove source or attribution from any
slide, graph or portion of graph
17
Security
Pini Cohen and Sigal Russin’s work/
Copyright@2013
Do not remove source or attribution from any
slide, graph or portion of graph
18
Security
Pini Cohen and Sigal Russin’s work/
Copyright@2013
Do not remove source or attribution from any
slide, graph or portion of graph
Don’t risk your Data!
19
Source: Ponemon Institute
Pini Cohen and Sigal Russin’s work/
Copyright@2013
Do not remove source or attribution from any
slide, graph or portion of graph
Cloud Storage Services Definition
• A network of distributed data centers which typically uses cloud
computing technologies like virtualization, and offers some kind
of interface for storing data.
• To increase the availability of the data, it may be redundantly
stored at different locations.
• Many cloud storage providers are active on the market, offering
various kinds of services to their customers.
20
Source: https://www.sit.fraunhofer.de/fileadmin/dokumente/studien_und_technical_reports/Cloud-Storage-Security_a4.pdf
Security
Pini Cohen and Sigal Russin’s work/
Copyright@2013
Do not remove source or attribution from any
slide, graph or portion of graph
Cloud Storage Features
21
Source: https://www.sit.fraunhofer.de/fileadmin/dokumente/studien_und_technical_reports/Cloud-Storage-Security_a4.pdf
Security
Pini Cohen and Sigal Russin’s work/
Copyright@2013
Do not remove source or attribution from any
slide, graph or portion of graph
Case Study : DROPBOX
22
APIBrowser
 Dropbox uses Amazon Web Services (AWS) for storage and transfer.
 Dropbox does not verify the email address at registration, hence it is open
for incrimination attacks.
 Client-side encryption is not supported.
 It is unclear which flavor of sharing is used if non-subscribers are included
(closed user group vs. publication).
 In 2011 accounts could be accessed without a password,
and in 2012 spam emails were sent to Dropbox users.
SouIe: https://www.sit.fraunhofer.de/fileadmin/dokumente/studien_und_technical_reports/Cloud-Storage-Security_a4.pdf
Security
Pini Cohen and Sigal Russin’s work/
Copyright@2013
Do not remove source or attribution from any
slide, graph or portion of graph
23
Source: The FixYa Cloud Storage Report. Novmber 2012
Security
Pini Cohen and Sigal Russin’s work/
Copyright@2013
Do not remove source or attribution from any
slide, graph or portion of graph
Security Concerns
• SkyDrive uses SSL to encrypt files during transport, but files are
unencrypted once at rest on Microsoft’s servers.
• Data Leak
24
Source: Ponemon Institute
Pini Cohen and Sigal Russin’s work/
Copyright@2013
Do not remove source or attribution from any
slide, graph or portion of graph
Secured Alternative Solutions
• Use Local encryption for protecting your data
• IBM Collaboration Cloud
• Box.net
• SpiderOak
• Sharefile –Citrix
• WatchDox
• Acronis
• Application Rapping
• Symantec
• F5
25
67% viewed third-party
applications as a significant
risk – second to mobile
security risk.
Security
Pini Cohen and Sigal Russin’s work/
Copyright@2013
Do not remove source or attribution from any
slide, graph or portion of graph
WatchDox
26
ACCESS documents on any device
SHARE documents across organizations
CONTROL documents at all times
Security
Pini Cohen and Sigal Russin's work
Copyright@2013
Do not remove source or attribution
from any slide, graph or portion of
graph
WatchDox Makes Document Security Easy
Email Sharing
Group Collaboration
Cross-Device Sync
WatchDox
Exchange
WatchDox
Workspaces
WatchDox
Sync
• Security is added seamlessly, automatically
• Documents encrypted at all times: rest, transit, use
Pini Cohen and Sigal Russin's work
Copyright@2013
Do not remove source or attribution
from any slide, graph or portion of
graph
Recommendations
• Review your security policy related to social engineering
• DO NOT allow using free cloud storage OR
• Allow employee BYOA but secure it with encryption tools
• Use a collaboration tool for better productivity & security
• Start Identity & access management project
• Education ,awareness  Training!
30
Pini Cohen and Sigal Russin's work
Copyright@2013
Do not remove source or attribution
from any slide, graph or portion of
graph
Data Leakage Prevention -Israeli Market Positioning 1Q13
31
LocalSupport
Market Presence/Perception
Websense
McAfee
Symantec
GTB
Verdasys
EMC
Safend
Fidelis
CA
Checkpoint
Player
Worldwide
Leader
Pini Cohen and Sigal Russin's work
Copyright@2013
Do not remove source or attribution
from any slide, graph or portion of
graph 32
Security Consultants -Israeli Market View 1Q13 (Partial List)
Source: STKI
*DataSec, **Oasis-Tech
Pini Cohen and Sigal Russin's work
Copyright@2013
Do not remove source or attribution
from any slide, graph or portion of
graph 33
Security System Integrators -Israeli Market View 1Q13 (Partial List)
Source: STKI
*Netcom
**Spider
^Oasis-Tech
^^Decimus
Pini Cohen and Sigal Russin's work
Copyright@2013
Do not remove source or attribution
from any slide, graph or portion of
graph
Networking General trends-2013
34
Software-
defined
networking will
replace current
NAC
Wireless local
area network
(WLAN) for
guests and
BYOD (VoWLAN)
Network
visibility in
virtualized
environments
Pini Cohen and Sigal Russin's work
Copyright@2013
Do not remove source or attribution
from any slide, graph or portion of
graph
Network Visibility Benefits
 Improve the performance of your network with cloud computing,
video streaming, mobility etc.
 Utilize security issues and application performance management.
 Good view of your network traffic down to the packet level.
 You don’t need to go through an emergency change control at the
start of the incident just to get these taps!
35
Networking
Pini Cohen and Sigal Russin's work
Copyright@2013
Do not remove source or attribution
from any slide, graph or portion of
graph
Port Mirroring
• Requires an engineer to configure the switch or switches.
• Eliminate corrupt packets or packets which below a minimum size.
• Switches may drop layer 1 and select layer 2 errors depending on high
priority.
• Need to troubleshoot common physical layer problems such as faulty
NIC.
• A network devices can support a restricted number of port mirrors.
It is very important for security and analysis the same data with
many devices.
36
Cyber Security Challenges – No Visibility
NETWORK INFRASTRUCTURE
Traffic
Data Center
Device
New Applications
New Protocols, Encrypted Traffic
BYOD
Mixture of devices, Policies & Compliance
Cloud / Virtualization
Applications go virtual, Inter-VM traffic
Traffic Growth
Number of links, Size of links, amount of traffic
Cloud /
Virtualization
Solution - Visibility with NPB
NETWORK
INFRASTRUCTURE
Traffic
Data Center
Device
Cloud /
Virtualization
Network Packet Broker
MONITORING
TOOLS
Traffic Visibility FabricGigamon - Market Maker, Market Leader
Pini Cohen and Sigal Russin's work
Copyright@2013
Do not remove source or attribution
from any slide, graph or portion of
graph
Data Leakage Prevention -Israeli Market Positioning 1Q13
40
LocalSupport
Market Presence/Perception
Websense
McAfee
Symantec
GTB
Verdasys
EMC
Safend
Fidelis
CA
Checkpoint
Player
Worldwide
Leader
Pini Cohen and Sigal Russin's work
Copyright@2013
Do not remove source or attribution
from any slide, graph or portion of
graph
Customer Center Infrastructure -Israeli Market Positioning 1Q13
41
LocalSupport
Market Presence/Perception
Player
Worldwide
Leader
Cisco
Alcatel-Lucent
Avaya
Interactive Intelligence
Cosmocom
Siemens EC
Aspect
Pini Cohen and Sigal Russin’s work/
Copyright@2013
Do not remove source or attribution from any
slide, graph or portion of graph
Network Access Control -Israeli Market Positioning 1Q13
42
LocalSupport
Market Presence/Perception
Player
Worldwide
Leader
Access Layers
Wise-Mon
Fore Scout
Cisco
Juniper
Symantec
Microsoft
Checkpoint
HP
Enterasys
Pini Cohen and Sigal Russin's work
Copyright@2013
Do not remove source or attribution
from any slide, graph or portion of
graph
Output Management-Israeli Market Positioning 1Q13
43
LocalSupport
Market Presence/Perception
Player
Worldwide
LeaderAman
Adobe
Auto font
Consist
ISIS-Papyrus
Vendors to watch :
HP
Pini Cohen and Sigal Russin's work
Copyright@2013
Do not remove source or attribution
from any slide, graph or portion of
graph
HP Exstream
44
Thanks for your patience and hope you enjoyed
45
Pini Cohen and Sigal Russin's work Copyright@2013
Do not remove source or attribution from any slide, graph or portion of graph

More Related Content

What's hot

Ponemon Institute Reviews Key Findings from “2017 State of Mobile & IoT Appli...
Ponemon Institute Reviews Key Findings from “2017 State of Mobile & IoT Appli...Ponemon Institute Reviews Key Findings from “2017 State of Mobile & IoT Appli...
Ponemon Institute Reviews Key Findings from “2017 State of Mobile & IoT Appli...IBM Security
 
Security and Privacy Big Challenges in Internet of things
Security and Privacy Big Challenges in Internet of thingsSecurity and Privacy Big Challenges in Internet of things
Security and Privacy Big Challenges in Internet of thingsIRJET Journal
 
Marcel van der Heijden - SpeedInvest & Aircloak - EU GDPR & Data Privacy Comp...
Marcel van der Heijden - SpeedInvest & Aircloak - EU GDPR & Data Privacy Comp...Marcel van der Heijden - SpeedInvest & Aircloak - EU GDPR & Data Privacy Comp...
Marcel van der Heijden - SpeedInvest & Aircloak - EU GDPR & Data Privacy Comp...Burton Lee
 
Securing and automating your application infrastructure meetup 23112021 b
Securing and automating your application infrastructure meetup 23112021 bSecuring and automating your application infrastructure meetup 23112021 b
Securing and automating your application infrastructure meetup 23112021 blior mazor
 
Readying your IT Infrastructure for Cloud
Readying your IT Infrastructure for CloudReadying your IT Infrastructure for Cloud
Readying your IT Infrastructure for CloudRH
 
ICT and Cybersecurity for Lawyers August 2021
ICT and Cybersecurity for Lawyers August 2021ICT and Cybersecurity for Lawyers August 2021
ICT and Cybersecurity for Lawyers August 2021Doug Newdick
 
Is the Cloud Safe? Ensuring Security in the Cloud
Is the Cloud Safe? Ensuring Security in the CloudIs the Cloud Safe? Ensuring Security in the Cloud
Is the Cloud Safe? Ensuring Security in the CloudTechSoup
 
Broke Note Broken: An Effective Information Security Program With a $0 Budget
Broke Note Broken: An Effective Information Security Program With a $0 BudgetBroke Note Broken: An Effective Information Security Program With a $0 Budget
Broke Note Broken: An Effective Information Security Program With a $0 BudgetPaul Melson
 
Top 6 things_small_businesses_q12015
Top 6 things_small_businesses_q12015Top 6 things_small_businesses_q12015
Top 6 things_small_businesses_q12015anpapathanasiou
 
TLS 1.3 Adoption in the Enterprise: Growing Encryption Use Extends to New St...
TLS 1.3 Adoption in the Enterprise:  Growing Encryption Use Extends to New St...TLS 1.3 Adoption in the Enterprise:  Growing Encryption Use Extends to New St...
TLS 1.3 Adoption in the Enterprise: Growing Encryption Use Extends to New St...Enterprise Management Associates
 
PCM Vision 2019 Breakout: IBM | Red Hat
PCM Vision 2019 Breakout: IBM | Red HatPCM Vision 2019 Breakout: IBM | Red Hat
PCM Vision 2019 Breakout: IBM | Red HatPCM
 
Kista watson summit final public version
Kista watson summit final public versionKista watson summit final public version
Kista watson summit final public versionIBM Sverige
 
Ce hv8 module 14 sql injection
Ce hv8 module 14 sql injectionCe hv8 module 14 sql injection
Ce hv8 module 14 sql injectionMehrdad Jingoism
 
כנס אבטחת מידע מוטו תקשורת V2
כנס אבטחת מידע  מוטו תקשורת V2כנס אבטחת מידע  מוטו תקשורת V2
כנס אבטחת מידע מוטו תקשורת V2Shahar Geiger Maor
 
Scale vp wisegate-investing-in_security_innovation_aug2014-gartner_catalyst
Scale vp wisegate-investing-in_security_innovation_aug2014-gartner_catalystScale vp wisegate-investing-in_security_innovation_aug2014-gartner_catalyst
Scale vp wisegate-investing-in_security_innovation_aug2014-gartner_catalystBill Burns
 
Using Language Modeling to Verify User Identities
Using Language Modeling to Verify User IdentitiesUsing Language Modeling to Verify User Identities
Using Language Modeling to Verify User IdentitiesForcepoint LLC
 
Black Hat USA 2015: A Visual Snapshot of Security Threats, Trends and Ideas
Black Hat USA 2015: A Visual Snapshot of Security Threats, Trends and IdeasBlack Hat USA 2015: A Visual Snapshot of Security Threats, Trends and Ideas
Black Hat USA 2015: A Visual Snapshot of Security Threats, Trends and IdeasTripwire
 

What's hot (19)

Cloud security with Sage Construction Anywhere
Cloud security with Sage Construction AnywhereCloud security with Sage Construction Anywhere
Cloud security with Sage Construction Anywhere
 
Ponemon Institute Reviews Key Findings from “2017 State of Mobile & IoT Appli...
Ponemon Institute Reviews Key Findings from “2017 State of Mobile & IoT Appli...Ponemon Institute Reviews Key Findings from “2017 State of Mobile & IoT Appli...
Ponemon Institute Reviews Key Findings from “2017 State of Mobile & IoT Appli...
 
Security and Privacy Big Challenges in Internet of things
Security and Privacy Big Challenges in Internet of thingsSecurity and Privacy Big Challenges in Internet of things
Security and Privacy Big Challenges in Internet of things
 
Marcel van der Heijden - SpeedInvest & Aircloak - EU GDPR & Data Privacy Comp...
Marcel van der Heijden - SpeedInvest & Aircloak - EU GDPR & Data Privacy Comp...Marcel van der Heijden - SpeedInvest & Aircloak - EU GDPR & Data Privacy Comp...
Marcel van der Heijden - SpeedInvest & Aircloak - EU GDPR & Data Privacy Comp...
 
Securing and automating your application infrastructure meetup 23112021 b
Securing and automating your application infrastructure meetup 23112021 bSecuring and automating your application infrastructure meetup 23112021 b
Securing and automating your application infrastructure meetup 23112021 b
 
Readying your IT Infrastructure for Cloud
Readying your IT Infrastructure for CloudReadying your IT Infrastructure for Cloud
Readying your IT Infrastructure for Cloud
 
ICT and Cybersecurity for Lawyers August 2021
ICT and Cybersecurity for Lawyers August 2021ICT and Cybersecurity for Lawyers August 2021
ICT and Cybersecurity for Lawyers August 2021
 
Is the Cloud Safe? Ensuring Security in the Cloud
Is the Cloud Safe? Ensuring Security in the CloudIs the Cloud Safe? Ensuring Security in the Cloud
Is the Cloud Safe? Ensuring Security in the Cloud
 
Broke Note Broken: An Effective Information Security Program With a $0 Budget
Broke Note Broken: An Effective Information Security Program With a $0 BudgetBroke Note Broken: An Effective Information Security Program With a $0 Budget
Broke Note Broken: An Effective Information Security Program With a $0 Budget
 
Top 6 things_small_businesses_q12015
Top 6 things_small_businesses_q12015Top 6 things_small_businesses_q12015
Top 6 things_small_businesses_q12015
 
TLS 1.3 Adoption in the Enterprise: Growing Encryption Use Extends to New St...
TLS 1.3 Adoption in the Enterprise:  Growing Encryption Use Extends to New St...TLS 1.3 Adoption in the Enterprise:  Growing Encryption Use Extends to New St...
TLS 1.3 Adoption in the Enterprise: Growing Encryption Use Extends to New St...
 
Iot cyber security
Iot cyber securityIot cyber security
Iot cyber security
 
PCM Vision 2019 Breakout: IBM | Red Hat
PCM Vision 2019 Breakout: IBM | Red HatPCM Vision 2019 Breakout: IBM | Red Hat
PCM Vision 2019 Breakout: IBM | Red Hat
 
Kista watson summit final public version
Kista watson summit final public versionKista watson summit final public version
Kista watson summit final public version
 
Ce hv8 module 14 sql injection
Ce hv8 module 14 sql injectionCe hv8 module 14 sql injection
Ce hv8 module 14 sql injection
 
כנס אבטחת מידע מוטו תקשורת V2
כנס אבטחת מידע  מוטו תקשורת V2כנס אבטחת מידע  מוטו תקשורת V2
כנס אבטחת מידע מוטו תקשורת V2
 
Scale vp wisegate-investing-in_security_innovation_aug2014-gartner_catalyst
Scale vp wisegate-investing-in_security_innovation_aug2014-gartner_catalystScale vp wisegate-investing-in_security_innovation_aug2014-gartner_catalyst
Scale vp wisegate-investing-in_security_innovation_aug2014-gartner_catalyst
 
Using Language Modeling to Verify User Identities
Using Language Modeling to Verify User IdentitiesUsing Language Modeling to Verify User Identities
Using Language Modeling to Verify User Identities
 
Black Hat USA 2015: A Visual Snapshot of Security Threats, Trends and Ideas
Black Hat USA 2015: A Visual Snapshot of Security Threats, Trends and IdeasBlack Hat USA 2015: A Visual Snapshot of Security Threats, Trends and Ideas
Black Hat USA 2015: A Visual Snapshot of Security Threats, Trends and Ideas
 

Viewers also liked

Delivery positionnig 2016 v1
Delivery positionnig 2016 v1Delivery positionnig 2016 v1
Delivery positionnig 2016 v1Pini Cohen
 
2016 positioning apps_analytics_final
2016 positioning apps_analytics_final2016 positioning apps_analytics_final
2016 positioning apps_analytics_finalEinat Shimoni
 
Dr. Jimmy Schwarzkopf main tent trends 2016
Dr. Jimmy Schwarzkopf  main tent trends 2016Dr. Jimmy Schwarzkopf  main tent trends 2016
Dr. Jimmy Schwarzkopf main tent trends 2016Dr. Jimmy Schwarzkopf
 
STKI Israeli IT market study 2016 V2
STKI Israeli IT  market study 2016 V2STKI Israeli IT  market study 2016 V2
STKI Israeli IT market study 2016 V2Dr. Jimmy Schwarzkopf
 
STKI 25th Annual Israel IT Market Study 2017
STKI 25th Annual Israel IT Market Study 2017STKI 25th Annual Israel IT Market Study 2017
STKI 25th Annual Israel IT Market Study 2017Dr. Jimmy Schwarzkopf
 
Dr. Jimmy Schwarzkopf main tent trend presentation 2017
Dr. Jimmy Schwarzkopf main tent trend presentation 2017Dr. Jimmy Schwarzkopf main tent trend presentation 2017
Dr. Jimmy Schwarzkopf main tent trend presentation 2017Dr. Jimmy Schwarzkopf
 

Viewers also liked (6)

Delivery positionnig 2016 v1
Delivery positionnig 2016 v1Delivery positionnig 2016 v1
Delivery positionnig 2016 v1
 
2016 positioning apps_analytics_final
2016 positioning apps_analytics_final2016 positioning apps_analytics_final
2016 positioning apps_analytics_final
 
Dr. Jimmy Schwarzkopf main tent trends 2016
Dr. Jimmy Schwarzkopf  main tent trends 2016Dr. Jimmy Schwarzkopf  main tent trends 2016
Dr. Jimmy Schwarzkopf main tent trends 2016
 
STKI Israeli IT market study 2016 V2
STKI Israeli IT  market study 2016 V2STKI Israeli IT  market study 2016 V2
STKI Israeli IT market study 2016 V2
 
STKI 25th Annual Israel IT Market Study 2017
STKI 25th Annual Israel IT Market Study 2017STKI 25th Annual Israel IT Market Study 2017
STKI 25th Annual Israel IT Market Study 2017
 
Dr. Jimmy Schwarzkopf main tent trend presentation 2017
Dr. Jimmy Schwarzkopf main tent trend presentation 2017Dr. Jimmy Schwarzkopf main tent trend presentation 2017
Dr. Jimmy Schwarzkopf main tent trend presentation 2017
 

Similar to Stki summit2013 infra_pini sigaltechnologies_v5 final

DLP Data leak prevention
DLP Data leak preventionDLP Data leak prevention
DLP Data leak preventionAriel Evans
 
Cyber security 2013
Cyber security 2013 Cyber security 2013
Cyber security 2013 Ariel Evans
 
Sigal summit 2014 final
Sigal summit 2014 finalSigal summit 2014 final
Sigal summit 2014 finalAriel Evans
 
Contact Center infrastructure 2014
Contact Center infrastructure 2014Contact Center infrastructure 2014
Contact Center infrastructure 2014Ariel Evans
 
297727851 getting-to-the-cloud-event-2015
297727851 getting-to-the-cloud-event-2015297727851 getting-to-the-cloud-event-2015
297727851 getting-to-the-cloud-event-2015Inbalraanan
 
Secure develpment 2014
Secure develpment 2014Secure develpment 2014
Secure develpment 2014Ariel Evans
 
Protecting Your Data In Office 365
Protecting Your Data In Office 365Protecting Your Data In Office 365
Protecting Your Data In Office 365Elastica Inc.
 
Pini sigal Summit 2014 final
Pini sigal  Summit 2014 finalPini sigal  Summit 2014 final
Pini sigal Summit 2014 finalAriel Evans
 
Israel IT trends and positioning in networking and security
Israel IT  trends and positioning in networking and security Israel IT  trends and positioning in networking and security
Israel IT trends and positioning in networking and security Dr. Jimmy Schwarzkopf
 
Positioning+trends sigal summit 2014
Positioning+trends sigal summit 2014Positioning+trends sigal summit 2014
Positioning+trends sigal summit 2014Ariel Evans
 
Output management 2013
Output management 2013 Output management 2013
Output management 2013 Ariel Evans
 
contact center trends 2014
contact center trends 2014contact center trends 2014
contact center trends 2014Ariel Evans
 
Unlocking AI Potential: Leveraging PIA Processes for Comprehensive Impact Ass...
Unlocking AI Potential: Leveraging PIA Processes for Comprehensive Impact Ass...Unlocking AI Potential: Leveraging PIA Processes for Comprehensive Impact Ass...
Unlocking AI Potential: Leveraging PIA Processes for Comprehensive Impact Ass...TrustArc
 
Risk mngt gov compliance security cyber
Risk mngt  gov compliance security cyberRisk mngt  gov compliance security cyber
Risk mngt gov compliance security cyberAriel Evans
 
How to Extend Security and Compliance Within Box
How to Extend Security and Compliance Within BoxHow to Extend Security and Compliance Within Box
How to Extend Security and Compliance Within BoxElastica Inc.
 
IBM Relay 2015: Securing the Future
IBM Relay 2015: Securing the Future IBM Relay 2015: Securing the Future
IBM Relay 2015: Securing the Future IBM
 
Protecting your Data in Google Apps
Protecting your Data in Google AppsProtecting your Data in Google Apps
Protecting your Data in Google AppsElastica Inc.
 
Cloud Security for Dummies Webinar — The Identity Edition
Cloud Security for Dummies Webinar — The Identity EditionCloud Security for Dummies Webinar — The Identity Edition
Cloud Security for Dummies Webinar — The Identity EditionNetskope
 
Be A Hero: Combat Cloud Security Threats with Google Apps Unlimited & CloudLock
Be A Hero: Combat Cloud Security Threats with Google Apps Unlimited & CloudLockBe A Hero: Combat Cloud Security Threats with Google Apps Unlimited & CloudLock
Be A Hero: Combat Cloud Security Threats with Google Apps Unlimited & CloudLockCloudLock
 

Similar to Stki summit2013 infra_pini sigaltechnologies_v5 final (20)

DLP Data leak prevention
DLP Data leak preventionDLP Data leak prevention
DLP Data leak prevention
 
Cyber security 2013
Cyber security 2013 Cyber security 2013
Cyber security 2013
 
Sigal summit 2014 final
Sigal summit 2014 finalSigal summit 2014 final
Sigal summit 2014 final
 
Contact Center infrastructure 2014
Contact Center infrastructure 2014Contact Center infrastructure 2014
Contact Center infrastructure 2014
 
297727851 getting-to-the-cloud-event-2015
297727851 getting-to-the-cloud-event-2015297727851 getting-to-the-cloud-event-2015
297727851 getting-to-the-cloud-event-2015
 
Secure develpment 2014
Secure develpment 2014Secure develpment 2014
Secure develpment 2014
 
Protecting Your Data In Office 365
Protecting Your Data In Office 365Protecting Your Data In Office 365
Protecting Your Data In Office 365
 
Pini sigal Summit 2014 final
Pini sigal  Summit 2014 finalPini sigal  Summit 2014 final
Pini sigal Summit 2014 final
 
Israel IT trends and positioning in networking and security
Israel IT  trends and positioning in networking and security Israel IT  trends and positioning in networking and security
Israel IT trends and positioning in networking and security
 
Positioning+trends sigal summit 2014
Positioning+trends sigal summit 2014Positioning+trends sigal summit 2014
Positioning+trends sigal summit 2014
 
Output management 2013
Output management 2013 Output management 2013
Output management 2013
 
contact center trends 2014
contact center trends 2014contact center trends 2014
contact center trends 2014
 
Unlocking AI Potential: Leveraging PIA Processes for Comprehensive Impact Ass...
Unlocking AI Potential: Leveraging PIA Processes for Comprehensive Impact Ass...Unlocking AI Potential: Leveraging PIA Processes for Comprehensive Impact Ass...
Unlocking AI Potential: Leveraging PIA Processes for Comprehensive Impact Ass...
 
Risk mngt gov compliance security cyber
Risk mngt  gov compliance security cyberRisk mngt  gov compliance security cyber
Risk mngt gov compliance security cyber
 
How to Extend Security and Compliance Within Box
How to Extend Security and Compliance Within BoxHow to Extend Security and Compliance Within Box
How to Extend Security and Compliance Within Box
 
InfoSec World 2014 Security Imperatives for IOS and Android
InfoSec World 2014 Security Imperatives for IOS and AndroidInfoSec World 2014 Security Imperatives for IOS and Android
InfoSec World 2014 Security Imperatives for IOS and Android
 
IBM Relay 2015: Securing the Future
IBM Relay 2015: Securing the Future IBM Relay 2015: Securing the Future
IBM Relay 2015: Securing the Future
 
Protecting your Data in Google Apps
Protecting your Data in Google AppsProtecting your Data in Google Apps
Protecting your Data in Google Apps
 
Cloud Security for Dummies Webinar — The Identity Edition
Cloud Security for Dummies Webinar — The Identity EditionCloud Security for Dummies Webinar — The Identity Edition
Cloud Security for Dummies Webinar — The Identity Edition
 
Be A Hero: Combat Cloud Security Threats with Google Apps Unlimited & CloudLock
Be A Hero: Combat Cloud Security Threats with Google Apps Unlimited & CloudLockBe A Hero: Combat Cloud Security Threats with Google Apps Unlimited & CloudLock
Be A Hero: Combat Cloud Security Threats with Google Apps Unlimited & CloudLock
 

More from Ariel Evans

infra 2015 delivery
infra 2015  deliveryinfra 2015  delivery
infra 2015 deliveryAriel Evans
 
2015 positioning security & networking
2015 positioning security & networking2015 positioning security & networking
2015 positioning security & networkingAriel Evans
 
Secure development 2014
Secure development 2014Secure development 2014
Secure development 2014Ariel Evans
 
CONTACT CENTER TRENDS 2014
CONTACT CENTER TRENDS 2014CONTACT CENTER TRENDS 2014
CONTACT CENTER TRENDS 2014Ariel Evans
 
Printing om 2014
Printing om 2014Printing om 2014
Printing om 2014Ariel Evans
 
Stki summit2013 ratios
Stki summit2013 ratiosStki summit2013 ratios
Stki summit2013 ratiosAriel Evans
 
Cloud cc security
Cloud cc securityCloud cc security
Cloud cc securityAriel Evans
 
Stki summit2013 infra_pini sigal_mega_v10 final
Stki summit2013 infra_pini sigal_mega_v10 finalStki summit2013 infra_pini sigal_mega_v10 final
Stki summit2013 infra_pini sigal_mega_v10 finalAriel Evans
 
Mdm byod survey results 2013
Mdm byod survey results 2013Mdm byod survey results 2013
Mdm byod survey results 2013Ariel Evans
 
Trends In Infrastructure Services
Trends In Infrastructure ServicesTrends In Infrastructure Services
Trends In Infrastructure ServicesAriel Evans
 
From creeper to stuxnet
From creeper to stuxnetFrom creeper to stuxnet
From creeper to stuxnetAriel Evans
 

More from Ariel Evans (12)

infra 2015 delivery
infra 2015  deliveryinfra 2015  delivery
infra 2015 delivery
 
2015 positioning security & networking
2015 positioning security & networking2015 positioning security & networking
2015 positioning security & networking
 
Secure development 2014
Secure development 2014Secure development 2014
Secure development 2014
 
CONTACT CENTER TRENDS 2014
CONTACT CENTER TRENDS 2014CONTACT CENTER TRENDS 2014
CONTACT CENTER TRENDS 2014
 
Printing om 2014
Printing om 2014Printing om 2014
Printing om 2014
 
Stki summit2013 ratios
Stki summit2013 ratiosStki summit2013 ratios
Stki summit2013 ratios
 
Cloud cc security
Cloud cc securityCloud cc security
Cloud cc security
 
Stki summit2013 infra_pini sigal_mega_v10 final
Stki summit2013 infra_pini sigal_mega_v10 finalStki summit2013 infra_pini sigal_mega_v10 final
Stki summit2013 infra_pini sigal_mega_v10 final
 
Mdm byod survey results 2013
Mdm byod survey results 2013Mdm byod survey results 2013
Mdm byod survey results 2013
 
IDM & IAM 2012
IDM & IAM 2012IDM & IAM 2012
IDM & IAM 2012
 
Trends In Infrastructure Services
Trends In Infrastructure ServicesTrends In Infrastructure Services
Trends In Infrastructure Services
 
From creeper to stuxnet
From creeper to stuxnetFrom creeper to stuxnet
From creeper to stuxnet
 

Recently uploaded

Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfjimielynbastida
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Neo4j
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 

Recently uploaded (20)

Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdf
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 

Stki summit2013 infra_pini sigaltechnologies_v5 final

  • 1. Changing Data Center STKI Summit 2013 IT at the crossroads: Lead, follow or get out of the way Pini Cohen Sigal Russin Security and Networking
  • 2. Pini Cohen and Sigal Russin’s work/ Copyright@2013 Do not remove source or attribution from any slide, graph or portion of graph Customers Main Issues in 2012 • Cyber security -Smarter & Complexity attacks, APT, DDOS • BYOD - Security on Mobile –MDM • Network monitoring -SIEM • NAC –network access control • WI-FI as a service • Control & Monitoring of Administrative • Unauthorized Device Detection • DLP- Data loss prevention • Cloud security • Regulation – ISO 2
  • 3. Pini Cohen and Sigal Russin’s work/ Copyright@2013 Do not remove source or attribution from any slide, graph or portion of graph Security • Security 2013 • Social engineering • Identity management • Cloud storage services 3
  • 4. Pini Cohen and Sigal Russin's work Copyright@2013 Do not remove source or attribution from any slide, graph or portion of graph 4 Security
  • 5. Pini Cohen and Sigal Russin’s work/ Copyright@2013 Do not remove source or attribution from any slide, graph or portion of graph Industry groups represented by percent of breaches 5 Source: Verison , 2012 DATA BREACH INVESTIGATIONS REPORT Security
  • 6. Pini Cohen and Sigal Russin’s work/ Copyright@2013 Do not remove source or attribution from any slide, graph or portion of graph Social tactics by percent of breaches within Social 6 Source: Verison , 2012 DATA BREACH INVESTIGATIONS REPORT Security
  • 7. Pini Cohen and Sigal Russin’s work/ Copyright@2013 Do not remove source or attribution from any slide, graph or portion of graph 7 Source: Ponemon Institute Security
  • 8. 8 Pini Cohen and Sigal Russin's work Copyright@2013 Do not remove source or attribution from any slide, graph or portion of graph 1 3 2
  • 9. Pini Cohen and Sigal Russin’s work/ Copyright@2013 Do not remove source or attribution from any slide, graph or portion of graph 9 Security
  • 10. Pini Cohen and Sigal Russin's work Copyright@2013 Do not remove source or attribution from any slide, graph or portion of graph Identity & Access Management 10
  • 11. Pini Cohen and Sigal Russin’s work/ Copyright@2013 Do not remove source or attribution from any slide, graph or portion of graph 11 Security
  • 12. Pini Cohen and Sigal Russin’s work/ Copyright@2013 Do not remove source or attribution from any slide, graph or portion of graph 12Source: veracode
  • 13. Pini Cohen and Sigal Russin's work Copyright@2013 Do not remove source or attribution from any slide, graph or portion of graph 13 "Forrester: “Most data breaches caused by employees 30% - 'simple loss or theft‘ 27% - 'inadvertant misuse by an employee‘ 25% - 'external attack‘ 12% - 'malicious insiders‘ Source: information week 2012 Security
  • 14. Pini Cohen and Sigal Russin’s work/ Copyright@2013 Do not remove source or attribution from any slide, graph or portion of graph Turn Insiders Into Assets - Security Awareness Program 14 Source: information week 2012 Focus on changing user behavior- training your employee (videos) Test and retest - testing employee reaction to an actual test like: phishing e-mails. Teach the individual- tailored training to the company and the individuals who work there (USB devices). Even a failure can be a success- employee reports, susceptible to social engineering.
  • 15. Pini Cohen and Sigal Russin’s work/ Copyright@2013 Do not remove source or attribution from any slide, graph or portion of graph Most Intellectual Property Theft Involves Company Insiders • Perimeter defenses do not absolutely protect a network, vetting suppliers is not a sure way to protect against compromised hardware. You should monitor for anomalies in your network. • Keep Policy Up To Date! 15 Source: information week 2012, Verison Security
  • 16. Pini Cohen and Sigal Russin’s work/ Copyright@2013 Do not remove source or attribution from any slide, graph or portion of graph Best Practices for Defending Yourself 16 Out of office replies- do not give a stranger personally identifiable information. Email Links and Attachments-never open a link or an attachment from someone you don’t know. Phone Calls-requiring that employees use verbal code words to verify their identity. On-Premise Badge and Security- use cameras, guards and mantraps before a secure doorway. Unlocked Computers and Laptops- always be vigilant! Source: http://blog.neustar.biz/dont/social-engineering-5-tips-and-best-practices-for-defending-against-it/
  • 17. Pini Cohen and Sigal Russin’s work/ Copyright@2013 Do not remove source or attribution from any slide, graph or portion of graph 17 Security
  • 18. Pini Cohen and Sigal Russin’s work/ Copyright@2013 Do not remove source or attribution from any slide, graph or portion of graph 18 Security
  • 19. Pini Cohen and Sigal Russin’s work/ Copyright@2013 Do not remove source or attribution from any slide, graph or portion of graph Don’t risk your Data! 19 Source: Ponemon Institute
  • 20. Pini Cohen and Sigal Russin’s work/ Copyright@2013 Do not remove source or attribution from any slide, graph or portion of graph Cloud Storage Services Definition • A network of distributed data centers which typically uses cloud computing technologies like virtualization, and offers some kind of interface for storing data. • To increase the availability of the data, it may be redundantly stored at different locations. • Many cloud storage providers are active on the market, offering various kinds of services to their customers. 20 Source: https://www.sit.fraunhofer.de/fileadmin/dokumente/studien_und_technical_reports/Cloud-Storage-Security_a4.pdf Security
  • 21. Pini Cohen and Sigal Russin’s work/ Copyright@2013 Do not remove source or attribution from any slide, graph or portion of graph Cloud Storage Features 21 Source: https://www.sit.fraunhofer.de/fileadmin/dokumente/studien_und_technical_reports/Cloud-Storage-Security_a4.pdf Security
  • 22. Pini Cohen and Sigal Russin’s work/ Copyright@2013 Do not remove source or attribution from any slide, graph or portion of graph Case Study : DROPBOX 22 APIBrowser  Dropbox uses Amazon Web Services (AWS) for storage and transfer.  Dropbox does not verify the email address at registration, hence it is open for incrimination attacks.  Client-side encryption is not supported.  It is unclear which flavor of sharing is used if non-subscribers are included (closed user group vs. publication).  In 2011 accounts could be accessed without a password, and in 2012 spam emails were sent to Dropbox users. SouIe: https://www.sit.fraunhofer.de/fileadmin/dokumente/studien_und_technical_reports/Cloud-Storage-Security_a4.pdf Security
  • 23. Pini Cohen and Sigal Russin’s work/ Copyright@2013 Do not remove source or attribution from any slide, graph or portion of graph 23 Source: The FixYa Cloud Storage Report. Novmber 2012 Security
  • 24. Pini Cohen and Sigal Russin’s work/ Copyright@2013 Do not remove source or attribution from any slide, graph or portion of graph Security Concerns • SkyDrive uses SSL to encrypt files during transport, but files are unencrypted once at rest on Microsoft’s servers. • Data Leak 24 Source: Ponemon Institute
  • 25. Pini Cohen and Sigal Russin’s work/ Copyright@2013 Do not remove source or attribution from any slide, graph or portion of graph Secured Alternative Solutions • Use Local encryption for protecting your data • IBM Collaboration Cloud • Box.net • SpiderOak • Sharefile –Citrix • WatchDox • Acronis • Application Rapping • Symantec • F5 25 67% viewed third-party applications as a significant risk – second to mobile security risk. Security
  • 26. Pini Cohen and Sigal Russin’s work/ Copyright@2013 Do not remove source or attribution from any slide, graph or portion of graph WatchDox 26 ACCESS documents on any device SHARE documents across organizations CONTROL documents at all times Security
  • 27. Pini Cohen and Sigal Russin's work Copyright@2013 Do not remove source or attribution from any slide, graph or portion of graph WatchDox Makes Document Security Easy Email Sharing Group Collaboration Cross-Device Sync WatchDox Exchange WatchDox Workspaces WatchDox Sync • Security is added seamlessly, automatically • Documents encrypted at all times: rest, transit, use
  • 28.
  • 29.
  • 30. Pini Cohen and Sigal Russin's work Copyright@2013 Do not remove source or attribution from any slide, graph or portion of graph Recommendations • Review your security policy related to social engineering • DO NOT allow using free cloud storage OR • Allow employee BYOA but secure it with encryption tools • Use a collaboration tool for better productivity & security • Start Identity & access management project • Education ,awareness  Training! 30
  • 31. Pini Cohen and Sigal Russin's work Copyright@2013 Do not remove source or attribution from any slide, graph or portion of graph Data Leakage Prevention -Israeli Market Positioning 1Q13 31 LocalSupport Market Presence/Perception Websense McAfee Symantec GTB Verdasys EMC Safend Fidelis CA Checkpoint Player Worldwide Leader
  • 32. Pini Cohen and Sigal Russin's work Copyright@2013 Do not remove source or attribution from any slide, graph or portion of graph 32 Security Consultants -Israeli Market View 1Q13 (Partial List) Source: STKI *DataSec, **Oasis-Tech
  • 33. Pini Cohen and Sigal Russin's work Copyright@2013 Do not remove source or attribution from any slide, graph or portion of graph 33 Security System Integrators -Israeli Market View 1Q13 (Partial List) Source: STKI *Netcom **Spider ^Oasis-Tech ^^Decimus
  • 34. Pini Cohen and Sigal Russin's work Copyright@2013 Do not remove source or attribution from any slide, graph or portion of graph Networking General trends-2013 34 Software- defined networking will replace current NAC Wireless local area network (WLAN) for guests and BYOD (VoWLAN) Network visibility in virtualized environments
  • 35. Pini Cohen and Sigal Russin's work Copyright@2013 Do not remove source or attribution from any slide, graph or portion of graph Network Visibility Benefits  Improve the performance of your network with cloud computing, video streaming, mobility etc.  Utilize security issues and application performance management.  Good view of your network traffic down to the packet level.  You don’t need to go through an emergency change control at the start of the incident just to get these taps! 35 Networking
  • 36. Pini Cohen and Sigal Russin's work Copyright@2013 Do not remove source or attribution from any slide, graph or portion of graph Port Mirroring • Requires an engineer to configure the switch or switches. • Eliminate corrupt packets or packets which below a minimum size. • Switches may drop layer 1 and select layer 2 errors depending on high priority. • Need to troubleshoot common physical layer problems such as faulty NIC. • A network devices can support a restricted number of port mirrors. It is very important for security and analysis the same data with many devices. 36
  • 37. Cyber Security Challenges – No Visibility NETWORK INFRASTRUCTURE Traffic Data Center Device New Applications New Protocols, Encrypted Traffic BYOD Mixture of devices, Policies & Compliance Cloud / Virtualization Applications go virtual, Inter-VM traffic Traffic Growth Number of links, Size of links, amount of traffic Cloud / Virtualization
  • 38. Solution - Visibility with NPB NETWORK INFRASTRUCTURE Traffic Data Center Device Cloud / Virtualization Network Packet Broker MONITORING TOOLS
  • 39. Traffic Visibility FabricGigamon - Market Maker, Market Leader
  • 40. Pini Cohen and Sigal Russin's work Copyright@2013 Do not remove source or attribution from any slide, graph or portion of graph Data Leakage Prevention -Israeli Market Positioning 1Q13 40 LocalSupport Market Presence/Perception Websense McAfee Symantec GTB Verdasys EMC Safend Fidelis CA Checkpoint Player Worldwide Leader
  • 41. Pini Cohen and Sigal Russin's work Copyright@2013 Do not remove source or attribution from any slide, graph or portion of graph Customer Center Infrastructure -Israeli Market Positioning 1Q13 41 LocalSupport Market Presence/Perception Player Worldwide Leader Cisco Alcatel-Lucent Avaya Interactive Intelligence Cosmocom Siemens EC Aspect
  • 42. Pini Cohen and Sigal Russin’s work/ Copyright@2013 Do not remove source or attribution from any slide, graph or portion of graph Network Access Control -Israeli Market Positioning 1Q13 42 LocalSupport Market Presence/Perception Player Worldwide Leader Access Layers Wise-Mon Fore Scout Cisco Juniper Symantec Microsoft Checkpoint HP Enterasys
  • 43. Pini Cohen and Sigal Russin's work Copyright@2013 Do not remove source or attribution from any slide, graph or portion of graph Output Management-Israeli Market Positioning 1Q13 43 LocalSupport Market Presence/Perception Player Worldwide LeaderAman Adobe Auto font Consist ISIS-Papyrus Vendors to watch : HP
  • 44. Pini Cohen and Sigal Russin's work Copyright@2013 Do not remove source or attribution from any slide, graph or portion of graph HP Exstream 44
  • 45. Thanks for your patience and hope you enjoyed 45 Pini Cohen and Sigal Russin's work Copyright@2013 Do not remove source or attribution from any slide, graph or portion of graph