SlideShare a Scribd company logo
Modern Security Game




                Being Outside and feeling Inside
                    Being Safe Everywhere

Guy Eilon – Websense Mediterranean Regional Manager




© 2010 Websense, Inc. All rights reserved.            web security | data security | email security
Web Technology Trends
Dynamic, interactive Web 2.0 technologies have transformed
the Web into a core business application platform

Employees are working from everywhere




Data now lives outside your network, more
so if you use SaaS applications.
Along with Web 2.0, however, comes new risk as traditional URL
filtering and antivirus are rendered ineffective.
Blocking access is not the answer – increasingly the business needs broad
Web access to compete and enable employees to get the job done.


                                                                     © 2010 Websense, Inc. All rights reserved.
Today’s Webscape

              • Constantly changing content
              • Billions of varied pages per site
              • Web 2.0 attacks are here
              • Data Leakage problems with bad business                 • Junk, personal, scam, adult, etc.
              practices                                                 • Million of new sites appear daily
              • Advanced Persistent Threats using Web 2.0
Web Traffic




                                                                        • Targeted attacks hosted here
                                                                        and send their data here
                              • Current events, regional, genre sites
                              • Less user-generated content
                              • Highest volume of compromised sites




                                                                          Source: Alexa Internet, Inc. , January 2010




                                                                                © 2009 Websense, Inc. All rights reserved.   3
Static URL Filtering is Dead


                                                                Traditional URL
                                                                filters, classify
                                             Auctions           this as “Search”
       Gambling        Video or Audio
                                                                Is it really?
                         Streaming

                                          Inappropriate
                                             Content
        Social
      Networking




Understanding the URL is not enough. You must understand
and control the content on the page.

                                                           © 2010 Websense, Inc. All rights reserved.
Without Websense




                   6
With Websense




                7
Antivirus Can’t Keep Up
Number of Web viruses not detected by top 5 AV engines each day




                                                                      No AV protections
                                                                     exist for hundreds of
                                                                      emergent threats
                                                                            each day




                         http://securitylabs.websense.com/

 AV is a baseline “known threat” Web security layer – but AV alone is not the solution


                                                                        © 2010 Websense, Inc. All rights reserved.
Compromised Sites


 71% of Malicious Websites
 are compromised websites
 Just 1 attack = 82,000
 compromised sites!




                             ©2010 All Rights Reserved. Websense, Inc.   10
Threats Span Multiple Vectors



 Email with URL   Website downloads   Confidential data    Hacker collects
                   Trojan malware       harvested          data from web
                                                                 site




  User visits     Website downloads   Confidential data    Hacker collects
  popular site     Trojan malware       harvested         data via IRC chat




                    USB dropped in    Confidential data   Hacker collects
                      car park          harvested         data with SMTP
                                                              engine


                                                            © 2010 Websense, Inc. All rights reserved.
Example 1 – Blended Threat




                             12
Example 2 – Social Network scams




                                   13
Don’t Trust Search Results




User Trust Targeted Attacks
13.7 percent of searches for
trending news/buzz words (as
defined by Yahoo Buzz & Google
Trends) will lead to malware.


Search engine optimization (SEO)
poisoning attacks target the top
searches enabling hackers to drive
traffic to their sites.




                                     14
Threat Landscape


Confidential Data    Customer Data



                                      35 percent of malicious
                                      Web attacks include
                                      data stealing code
                                      58 percent of data
                                      stealing attacks are
                                      conducted over the Web



Regulated Data       Financial Data




                                                                15
The Issues you Face

 Today’s Web is powerful and has strong business
 value
 The use of Web 2.0 technology has dramatically
 expanded dynamic content and the attack surface
 Our Users and Data lives Everywhere
 Attackers are actively utilising the new Web in order
 to get into your sensitive Data
 Traditional security technologies are not effectively
 addressing today’s issues
 New detection methods are needed for modern
 threats
                                     © 2010 Websense, Inc. All rights reserved.   16
Rising Total Cost of Ownership
Websense




  What does this all lead to ???



      ?             Introducing…




                           © 2010 Websense, Inc. All rights reserved.   18
The TRITON Architecture

                    Web             Data              Email
   Unified         Security        Security           Security
   Solution
                         Unified Content Security


                  SaaS           Appliance            Software
   Unified
   Platform



   Unified
 Management

                                              © 2010 Websense, Inc. All rights reserved.
The TRITON Unified Management




                                © 2010 Websense, Inc. All rights reserved.
TRITON: The First and Only TruHybrid™ Solution

             On-premise



                          In-the-cloud
How Not to Unify Technology




                              © 2010 Websense, Inc. All rights reserved.
London Headquarters

                                              New York
San Diego

                                                                                                   Tokyo

                                                           Mumbai




                                Sao Paulo
                                                   Cape                       Sydney
                                                   Town




 © 2010 Websense, Inc. All rights reserved.                              web security | data security | email security
London Headquarters

                                              New York
San Diego

                                                                                                   Tokyo

                                                           Mumbai




                                Sao Paulo
                                                   Cape                       Sydney
                                                   Town




 © 2010 Websense, Inc. All rights reserved.                              web security | data security | email security
Unparalleled Visibility
        Where Your Users are Going




                Where Your Data is Going




                               Where You Are at Risk
Key Takeaways

 Websense delivers the best security
  – The only solution with real-time protection
    against zero-day and scripted malware
  – The only solution with real-time content
    classification across all 95 categories
  – Enterprise-class Security against Blended
    Threats including Web, Email and DLP

 At the lowest cost of ownership
  – The only solution with unified management of
    on-premise and SaaS deployment platforms
  – The only unified Web, data, and email security
    solution

 Websense is a strategic choice
  – Firmly established leadership across Web, data
    and email segments
  – Unified platform that can meet multiple
    challenges today and scale for tomorrow



                                                     © 2010 Websense, Inc. All rights reserved.   28
…And remember
                    Your Data’s Security and
                    Your Web’s Security are
                    Critical Anywhere and at Anytime.




© 2010 Websense, Inc. All rights reserved.    web security | data security | email security
Websense Delivers




                    © 2010 Websense, Inc. All rights reserved.   30

More Related Content

What's hot

Cybersecurity
CybersecurityCybersecurity
Cybersecurity
National LECET
 
Security And Privacy Cagliari 2012
Security And Privacy Cagliari 2012Security And Privacy Cagliari 2012
Security And Privacy Cagliari 2012
Marco Morana
 
Is the Web at Risk?
Is the Web at Risk?Is the Web at Risk?
Is the Web at Risk?
Carlos Serrao
 
Finding Out More with Data Analytics and AWS
Finding Out More with Data Analytics and AWSFinding Out More with Data Analytics and AWS
Finding Out More with Data Analytics and AWS
Amazon Web Services
 
NATO Cyber Security Conference: Creating IT-Security Start-Ups
NATO Cyber Security Conference: Creating IT-Security Start-UpsNATO Cyber Security Conference: Creating IT-Security Start-Ups
NATO Cyber Security Conference: Creating IT-Security Start-Ups
Benjamin Rohé
 
The internet and www
The internet and wwwThe internet and www
The internet and www
Shobu Kirafuda
 
Web content management_wcm_social_computing_rivals_or_partners
Web content management_wcm_social_computing_rivals_or_partnersWeb content management_wcm_social_computing_rivals_or_partners
Web content management_wcm_social_computing_rivals_or_partnersQuestexConf
 
How To Defeat Advanced Malware. New Tools for Protection and Forensics
How To Defeat Advanced Malware. New Tools for Protection and ForensicsHow To Defeat Advanced Malware. New Tools for Protection and Forensics
How To Defeat Advanced Malware. New Tools for Protection and Forensics
London School of Cyber Security
 
Безопасность данных мобильных приложений. Мифы и реальность.
Безопасность данных мобильных приложений. Мифы и реальность.Безопасность данных мобильных приложений. Мифы и реальность.
Безопасность данных мобильных приложений. Мифы и реальность.
Advanced monitoring
 
Bright talk intrusion prevention are we joking - henshaw july 2010 a
Bright talk   intrusion prevention are we joking - henshaw july 2010 aBright talk   intrusion prevention are we joking - henshaw july 2010 a
Bright talk intrusion prevention are we joking - henshaw july 2010 aMark Henshaw
 
Owasp atlanta-ciso-guidevs1
Owasp atlanta-ciso-guidevs1Owasp atlanta-ciso-guidevs1
Owasp atlanta-ciso-guidevs1Marco Morana
 
Updated Cyber Security and Fraud Prevention Tools Tactics
Updated Cyber Security and Fraud Prevention Tools TacticsUpdated Cyber Security and Fraud Prevention Tools Tactics
Updated Cyber Security and Fraud Prevention Tools TacticsBen Graybar
 
Do You... Legal?
Do You... Legal?Do You... Legal?
Do You... Legal?
Ludovic Petit
 
Ijnsa050215
Ijnsa050215Ijnsa050215
Ijnsa050215
IJNSA Journal
 
White Paper: Is Your Network Safe Behind Just a Firewall?
White Paper: Is Your Network Safe Behind Just a Firewall?White Paper: Is Your Network Safe Behind Just a Firewall?
White Paper: Is Your Network Safe Behind Just a Firewall?
Windstream Enterprise
 
Using Social Software to Market yourself - inside and outside the firewall
Using Social Software to Market yourself - inside and outside the firewallUsing Social Software to Market yourself - inside and outside the firewall
Using Social Software to Market yourself - inside and outside the firewall
Ian McNairn
 
Mobile security hakin9_Revista
Mobile security hakin9_RevistaMobile security hakin9_Revista
Mobile security hakin9_Revista
the_ro0t
 
Watchguard - How Cloud‐based Security Delivers   Up‐to‐the‐Minute Network Pro...
Watchguard - How Cloud‐based Security Delivers   Up‐to‐the‐Minute Network Pro...Watchguard - How Cloud‐based Security Delivers   Up‐to‐the‐Minute Network Pro...
Watchguard - How Cloud‐based Security Delivers   Up‐to‐the‐Minute Network Pro...INSPIRIT BRASIL
 

What's hot (18)

Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Security And Privacy Cagliari 2012
Security And Privacy Cagliari 2012Security And Privacy Cagliari 2012
Security And Privacy Cagliari 2012
 
Is the Web at Risk?
Is the Web at Risk?Is the Web at Risk?
Is the Web at Risk?
 
Finding Out More with Data Analytics and AWS
Finding Out More with Data Analytics and AWSFinding Out More with Data Analytics and AWS
Finding Out More with Data Analytics and AWS
 
NATO Cyber Security Conference: Creating IT-Security Start-Ups
NATO Cyber Security Conference: Creating IT-Security Start-UpsNATO Cyber Security Conference: Creating IT-Security Start-Ups
NATO Cyber Security Conference: Creating IT-Security Start-Ups
 
The internet and www
The internet and wwwThe internet and www
The internet and www
 
Web content management_wcm_social_computing_rivals_or_partners
Web content management_wcm_social_computing_rivals_or_partnersWeb content management_wcm_social_computing_rivals_or_partners
Web content management_wcm_social_computing_rivals_or_partners
 
How To Defeat Advanced Malware. New Tools for Protection and Forensics
How To Defeat Advanced Malware. New Tools for Protection and ForensicsHow To Defeat Advanced Malware. New Tools for Protection and Forensics
How To Defeat Advanced Malware. New Tools for Protection and Forensics
 
Безопасность данных мобильных приложений. Мифы и реальность.
Безопасность данных мобильных приложений. Мифы и реальность.Безопасность данных мобильных приложений. Мифы и реальность.
Безопасность данных мобильных приложений. Мифы и реальность.
 
Bright talk intrusion prevention are we joking - henshaw july 2010 a
Bright talk   intrusion prevention are we joking - henshaw july 2010 aBright talk   intrusion prevention are we joking - henshaw july 2010 a
Bright talk intrusion prevention are we joking - henshaw july 2010 a
 
Owasp atlanta-ciso-guidevs1
Owasp atlanta-ciso-guidevs1Owasp atlanta-ciso-guidevs1
Owasp atlanta-ciso-guidevs1
 
Updated Cyber Security and Fraud Prevention Tools Tactics
Updated Cyber Security and Fraud Prevention Tools TacticsUpdated Cyber Security and Fraud Prevention Tools Tactics
Updated Cyber Security and Fraud Prevention Tools Tactics
 
Do You... Legal?
Do You... Legal?Do You... Legal?
Do You... Legal?
 
Ijnsa050215
Ijnsa050215Ijnsa050215
Ijnsa050215
 
White Paper: Is Your Network Safe Behind Just a Firewall?
White Paper: Is Your Network Safe Behind Just a Firewall?White Paper: Is Your Network Safe Behind Just a Firewall?
White Paper: Is Your Network Safe Behind Just a Firewall?
 
Using Social Software to Market yourself - inside and outside the firewall
Using Social Software to Market yourself - inside and outside the firewallUsing Social Software to Market yourself - inside and outside the firewall
Using Social Software to Market yourself - inside and outside the firewall
 
Mobile security hakin9_Revista
Mobile security hakin9_RevistaMobile security hakin9_Revista
Mobile security hakin9_Revista
 
Watchguard - How Cloud‐based Security Delivers   Up‐to‐the‐Minute Network Pro...
Watchguard - How Cloud‐based Security Delivers   Up‐to‐the‐Minute Network Pro...Watchguard - How Cloud‐based Security Delivers   Up‐to‐the‐Minute Network Pro...
Watchguard - How Cloud‐based Security Delivers   Up‐to‐the‐Minute Network Pro...
 

Viewers also liked

עלון זכויות הסעות לאנשים עם מוגבלות
עלון זכויות הסעות לאנשים עם מוגבלותעלון זכויות הסעות לאנשים עם מוגבלות
עלון זכויות הסעות לאנשים עם מוגבלותlihig
 
Ibm עמרי וייסמן
Ibm  עמרי וייסמןIbm  עמרי וייסמן
Ibm עמרי וייסמןlihig
 
סייבר ארק מירי
סייבר ארק  מיריסייבר ארק  מירי
סייבר ארק מיריlihig
 
Omri
OmriOmri
Omrilihig
 
TRAN VAN BO_NGHIEN CUU XAY DUNG CHL.pdf
TRAN VAN BO_NGHIEN CUU XAY DUNG CHL.pdfTRAN VAN BO_NGHIEN CUU XAY DUNG CHL.pdf
TRAN VAN BO_NGHIEN CUU XAY DUNG CHL.pdfthanhechip99
 
The mc mullens (slide show version nov 2010)
The mc mullens (slide show version   nov 2010)The mc mullens (slide show version   nov 2010)
The mc mullens (slide show version nov 2010)
Dave McMullen
 
Ibm עמרי וייסמן
Ibm  עמרי וייסמןIbm  עמרי וייסמן
Ibm עמרי וייסמןlihig
 
וובסנס ליאור ארבל
וובסנס   ליאור ארבלוובסנס   ליאור ארבל
וובסנס ליאור ארבלlihig
 
עלון זכויות הסעות לאנשים עם מוגבלות
עלון זכויות הסעות לאנשים עם מוגבלותעלון זכויות הסעות לאנשים עם מוגבלות
עלון זכויות הסעות לאנשים עם מוגבלותlihig
 
LE TIEN TOAN_QUAN LI NGAN QUY.pdf
LE TIEN TOAN_QUAN LI NGAN QUY.pdfLE TIEN TOAN_QUAN LI NGAN QUY.pdf
LE TIEN TOAN_QUAN LI NGAN QUY.pdfthanhechip99
 
(Hstp) cam nang trien khai shortcourse
(Hstp) cam nang trien khai shortcourse(Hstp) cam nang trien khai shortcourse
(Hstp) cam nang trien khai shortcourse
thanhechip99
 

Viewers also liked (17)

Units 5 & 6
Units 5 & 6Units 5 & 6
Units 5 & 6
 
Isaac newton lina
Isaac newton linaIsaac newton lina
Isaac newton lina
 
עלון זכויות הסעות לאנשים עם מוגבלות
עלון זכויות הסעות לאנשים עם מוגבלותעלון זכויות הסעות לאנשים עם מוגבלות
עלון זכויות הסעות לאנשים עם מוגבלות
 
Ibm עמרי וייסמן
Ibm  עמרי וייסמןIbm  עמרי וייסמן
Ibm עמרי וייסמן
 
סייבר ארק מירי
סייבר ארק  מיריסייבר ארק  מירי
סייבר ארק מירי
 
Omri
OmriOmri
Omri
 
TRAN VAN BO_NGHIEN CUU XAY DUNG CHL.pdf
TRAN VAN BO_NGHIEN CUU XAY DUNG CHL.pdfTRAN VAN BO_NGHIEN CUU XAY DUNG CHL.pdf
TRAN VAN BO_NGHIEN CUU XAY DUNG CHL.pdf
 
Analisi swot
Analisi swotAnalisi swot
Analisi swot
 
Isaac newton lina
Isaac newton linaIsaac newton lina
Isaac newton lina
 
Units 5 & 6
Units 5 & 6Units 5 & 6
Units 5 & 6
 
The mc mullens (slide show version nov 2010)
The mc mullens (slide show version   nov 2010)The mc mullens (slide show version   nov 2010)
The mc mullens (slide show version nov 2010)
 
Ibm עמרי וייסמן
Ibm  עמרי וייסמןIbm  עמרי וייסמן
Ibm עמרי וייסמן
 
וובסנס ליאור ארבל
וובסנס   ליאור ארבלוובסנס   ליאור ארבל
וובסנס ליאור ארבל
 
עלון זכויות הסעות לאנשים עם מוגבלות
עלון זכויות הסעות לאנשים עם מוגבלותעלון זכויות הסעות לאנשים עם מוגבלות
עלון זכויות הסעות לאנשים עם מוגבלות
 
LE TIEN TOAN_QUAN LI NGAN QUY.pdf
LE TIEN TOAN_QUAN LI NGAN QUY.pdfLE TIEN TOAN_QUAN LI NGAN QUY.pdf
LE TIEN TOAN_QUAN LI NGAN QUY.pdf
 
Teks ucapan
Teks ucapanTeks ucapan
Teks ucapan
 
(Hstp) cam nang trien khai shortcourse
(Hstp) cam nang trien khai shortcourse(Hstp) cam nang trien khai shortcourse
(Hstp) cam nang trien khai shortcourse
 

Similar to גיא אילון Websense

Web security 2012
Web security 2012Web security 2012
Web security 2012
Mohamed Elabnody
 
Spiceworld 2011 - AppRiver breakout session
Spiceworld 2011 - AppRiver breakout sessionSpiceworld 2011 - AppRiver breakout session
Spiceworld 2011 - AppRiver breakout session
Shane Rice
 
Cyberjutitsu101coleevertzfinal 1296250763392-phpapp02
Cyberjutitsu101coleevertzfinal 1296250763392-phpapp02Cyberjutitsu101coleevertzfinal 1296250763392-phpapp02
Cyberjutitsu101coleevertzfinal 1296250763392-phpapp02
Mark Evertz
 
Watch Guard Reputation Enabled Defense (White Paper)Dna
Watch Guard   Reputation Enabled Defense (White Paper)DnaWatch Guard   Reputation Enabled Defense (White Paper)Dna
Watch Guard Reputation Enabled Defense (White Paper)Dna
SylCotter
 
Corona - Ph.D. Defense Slides
Corona - Ph.D. Defense SlidesCorona - Ph.D. Defense Slides
Corona - Ph.D. Defense SlidesPluribus One
 
Wk online trust solutions overview january 2012
Wk online trust solutions overview january 2012Wk online trust solutions overview january 2012
Wk online trust solutions overview january 2012Creus Moreira Carlos
 
Cyber Threat Jujitsu 101: Acknowledge. Assess. Avoid. Address.
Cyber Threat Jujitsu 101: Acknowledge. Assess. Avoid. Address.Cyber Threat Jujitsu 101: Acknowledge. Assess. Avoid. Address.
Cyber Threat Jujitsu 101: Acknowledge. Assess. Avoid. Address.
Tripwire
 
Web 2.0 Presentation
Web 2.0 PresentationWeb 2.0 Presentation
Web 2.0 Presentationxia_bofa
 
Cyberoam: il futuro della network security!
Cyberoam: il futuro della network security!Cyberoam: il futuro della network security!
Cyberoam: il futuro della network security!
Team Sistemi
 
F5 - BigIP ASM introduction
F5 - BigIP ASM introductionF5 - BigIP ASM introduction
F5 - BigIP ASM introductionJimmy Saigon
 
Scansafe Annual Global Threat Report 2009
Scansafe Annual Global Threat Report 2009Scansafe Annual Global Threat Report 2009
Scansafe Annual Global Threat Report 2009Kim Jensen
 
Deconstructing Application DoS Attacks
Deconstructing Application DoS AttacksDeconstructing Application DoS Attacks
Deconstructing Application DoS Attacks
Imperva
 
Debunking Common Myths of Mobile Application Development
Debunking Common Myths of Mobile Application DevelopmentDebunking Common Myths of Mobile Application Development
Debunking Common Myths of Mobile Application Development
Antenna Software
 
parabcswithout-front-200320113631.pdf
parabcswithout-front-200320113631.pdfparabcswithout-front-200320113631.pdf
parabcswithout-front-200320113631.pdf
NirGoldstein5
 
Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentation
Parab Mishra
 
PC Maker's Support Page Succumbs To Compromise
PC Maker's Support Page Succumbs To CompromisePC Maker's Support Page Succumbs To Compromise
PC Maker's Support Page Succumbs To Compromise
Trend Micro
 
Guarding the guardian’s guard: IBM Trusteer - SEP326 - AWS re:Inforce 2019
Guarding the guardian’s guard: IBM Trusteer - SEP326 - AWS re:Inforce 2019 Guarding the guardian’s guard: IBM Trusteer - SEP326 - AWS re:Inforce 2019
Guarding the guardian’s guard: IBM Trusteer - SEP326 - AWS re:Inforce 2019
Amazon Web Services
 
Cisco Web and Email Security Overview
Cisco Web and Email Security OverviewCisco Web and Email Security Overview
Cisco Web and Email Security Overview
Cisco Security
 

Similar to גיא אילון Websense (20)

Web security 2012
Web security 2012Web security 2012
Web security 2012
 
Spiceworld 2011 - AppRiver breakout session
Spiceworld 2011 - AppRiver breakout sessionSpiceworld 2011 - AppRiver breakout session
Spiceworld 2011 - AppRiver breakout session
 
Cyberjutitsu101coleevertzfinal 1296250763392-phpapp02
Cyberjutitsu101coleevertzfinal 1296250763392-phpapp02Cyberjutitsu101coleevertzfinal 1296250763392-phpapp02
Cyberjutitsu101coleevertzfinal 1296250763392-phpapp02
 
Watch Guard Reputation Enabled Defense (White Paper)Dna
Watch Guard   Reputation Enabled Defense (White Paper)DnaWatch Guard   Reputation Enabled Defense (White Paper)Dna
Watch Guard Reputation Enabled Defense (White Paper)Dna
 
Corona - Ph.D. Defense Slides
Corona - Ph.D. Defense SlidesCorona - Ph.D. Defense Slides
Corona - Ph.D. Defense Slides
 
Wk online trust solutions overview january 2012
Wk online trust solutions overview january 2012Wk online trust solutions overview january 2012
Wk online trust solutions overview january 2012
 
Cyber Threat Jujitsu 101: Acknowledge. Assess. Avoid. Address.
Cyber Threat Jujitsu 101: Acknowledge. Assess. Avoid. Address.Cyber Threat Jujitsu 101: Acknowledge. Assess. Avoid. Address.
Cyber Threat Jujitsu 101: Acknowledge. Assess. Avoid. Address.
 
Web 2.0 Presentation
Web 2.0 PresentationWeb 2.0 Presentation
Web 2.0 Presentation
 
Cyberoam: il futuro della network security!
Cyberoam: il futuro della network security!Cyberoam: il futuro della network security!
Cyberoam: il futuro della network security!
 
F5 - BigIP ASM introduction
F5 - BigIP ASM introductionF5 - BigIP ASM introduction
F5 - BigIP ASM introduction
 
Scansafe Annual Global Threat Report 2009
Scansafe Annual Global Threat Report 2009Scansafe Annual Global Threat Report 2009
Scansafe Annual Global Threat Report 2009
 
Deconstructing Application DoS Attacks
Deconstructing Application DoS AttacksDeconstructing Application DoS Attacks
Deconstructing Application DoS Attacks
 
Debunking Common Myths of Mobile Application Development
Debunking Common Myths of Mobile Application DevelopmentDebunking Common Myths of Mobile Application Development
Debunking Common Myths of Mobile Application Development
 
S series presentation
S series presentationS series presentation
S series presentation
 
parabcswithout-front-200320113631.pdf
parabcswithout-front-200320113631.pdfparabcswithout-front-200320113631.pdf
parabcswithout-front-200320113631.pdf
 
Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentation
 
PC Maker's Support Page Succumbs To Compromise
PC Maker's Support Page Succumbs To CompromisePC Maker's Support Page Succumbs To Compromise
PC Maker's Support Page Succumbs To Compromise
 
Apresentação Allen ES
Apresentação Allen ESApresentação Allen ES
Apresentação Allen ES
 
Guarding the guardian’s guard: IBM Trusteer - SEP326 - AWS re:Inforce 2019
Guarding the guardian’s guard: IBM Trusteer - SEP326 - AWS re:Inforce 2019 Guarding the guardian’s guard: IBM Trusteer - SEP326 - AWS re:Inforce 2019
Guarding the guardian’s guard: IBM Trusteer - SEP326 - AWS re:Inforce 2019
 
Cisco Web and Email Security Overview
Cisco Web and Email Security OverviewCisco Web and Email Security Overview
Cisco Web and Email Security Overview
 

גיא אילון Websense

  • 1. Modern Security Game Being Outside and feeling Inside Being Safe Everywhere Guy Eilon – Websense Mediterranean Regional Manager © 2010 Websense, Inc. All rights reserved. web security | data security | email security
  • 2. Web Technology Trends Dynamic, interactive Web 2.0 technologies have transformed the Web into a core business application platform Employees are working from everywhere Data now lives outside your network, more so if you use SaaS applications. Along with Web 2.0, however, comes new risk as traditional URL filtering and antivirus are rendered ineffective. Blocking access is not the answer – increasingly the business needs broad Web access to compete and enable employees to get the job done. © 2010 Websense, Inc. All rights reserved.
  • 3. Today’s Webscape • Constantly changing content • Billions of varied pages per site • Web 2.0 attacks are here • Data Leakage problems with bad business • Junk, personal, scam, adult, etc. practices • Million of new sites appear daily • Advanced Persistent Threats using Web 2.0 Web Traffic • Targeted attacks hosted here and send their data here • Current events, regional, genre sites • Less user-generated content • Highest volume of compromised sites Source: Alexa Internet, Inc. , January 2010 © 2009 Websense, Inc. All rights reserved. 3
  • 4. Static URL Filtering is Dead Traditional URL filters, classify Auctions this as “Search” Gambling Video or Audio Is it really? Streaming Inappropriate Content Social Networking Understanding the URL is not enough. You must understand and control the content on the page. © 2010 Websense, Inc. All rights reserved.
  • 7. Antivirus Can’t Keep Up Number of Web viruses not detected by top 5 AV engines each day No AV protections exist for hundreds of emergent threats each day http://securitylabs.websense.com/ AV is a baseline “known threat” Web security layer – but AV alone is not the solution © 2010 Websense, Inc. All rights reserved.
  • 8. Compromised Sites 71% of Malicious Websites are compromised websites Just 1 attack = 82,000 compromised sites! ©2010 All Rights Reserved. Websense, Inc. 10
  • 9. Threats Span Multiple Vectors Email with URL Website downloads Confidential data Hacker collects Trojan malware harvested data from web site User visits Website downloads Confidential data Hacker collects popular site Trojan malware harvested data via IRC chat USB dropped in Confidential data Hacker collects car park harvested data with SMTP engine © 2010 Websense, Inc. All rights reserved.
  • 10. Example 1 – Blended Threat 12
  • 11. Example 2 – Social Network scams 13
  • 12. Don’t Trust Search Results User Trust Targeted Attacks 13.7 percent of searches for trending news/buzz words (as defined by Yahoo Buzz & Google Trends) will lead to malware. Search engine optimization (SEO) poisoning attacks target the top searches enabling hackers to drive traffic to their sites. 14
  • 13. Threat Landscape Confidential Data Customer Data 35 percent of malicious Web attacks include data stealing code 58 percent of data stealing attacks are conducted over the Web Regulated Data Financial Data 15
  • 14. The Issues you Face Today’s Web is powerful and has strong business value The use of Web 2.0 technology has dramatically expanded dynamic content and the attack surface Our Users and Data lives Everywhere Attackers are actively utilising the new Web in order to get into your sensitive Data Traditional security technologies are not effectively addressing today’s issues New detection methods are needed for modern threats © 2010 Websense, Inc. All rights reserved. 16
  • 15. Rising Total Cost of Ownership
  • 16. Websense What does this all lead to ??? ? Introducing… © 2010 Websense, Inc. All rights reserved. 18
  • 17.
  • 18. The TRITON Architecture Web Data Email Unified Security Security Security Solution Unified Content Security SaaS Appliance Software Unified Platform Unified Management © 2010 Websense, Inc. All rights reserved.
  • 19. The TRITON Unified Management © 2010 Websense, Inc. All rights reserved.
  • 20. TRITON: The First and Only TruHybrid™ Solution On-premise In-the-cloud
  • 21. How Not to Unify Technology © 2010 Websense, Inc. All rights reserved.
  • 22. London Headquarters New York San Diego Tokyo Mumbai Sao Paulo Cape Sydney Town © 2010 Websense, Inc. All rights reserved. web security | data security | email security
  • 23. London Headquarters New York San Diego Tokyo Mumbai Sao Paulo Cape Sydney Town © 2010 Websense, Inc. All rights reserved. web security | data security | email security
  • 24. Unparalleled Visibility Where Your Users are Going Where Your Data is Going Where You Are at Risk
  • 25. Key Takeaways Websense delivers the best security – The only solution with real-time protection against zero-day and scripted malware – The only solution with real-time content classification across all 95 categories – Enterprise-class Security against Blended Threats including Web, Email and DLP At the lowest cost of ownership – The only solution with unified management of on-premise and SaaS deployment platforms – The only unified Web, data, and email security solution Websense is a strategic choice – Firmly established leadership across Web, data and email segments – Unified platform that can meet multiple challenges today and scale for tomorrow © 2010 Websense, Inc. All rights reserved. 28
  • 26. …And remember Your Data’s Security and Your Web’s Security are Critical Anywhere and at Anytime. © 2010 Websense, Inc. All rights reserved. web security | data security | email security
  • 27. Websense Delivers © 2010 Websense, Inc. All rights reserved. 30