Sourcefire Overview Jens Brandt. Regional Sales Manager Nordics and Baltics

Save this PDF as:
 WORD  PNG  TXT  JPG

Size: px
Start display at page:

Download "Sourcefire Overview Jens Brandt. Regional Sales Manager Nordics and Baltics"

Transcription

1 Sourcefire Overview Jens Brandt Regional Sales Manager Nordics and Baltics

2 About Sourcefire Mission: To be the leading provider of intelligent cyber security solutions for the enterprise.! Founded in 2001 by Snort Creator, Martin Roesch, CTO! Headquarters: Columbia, MD! Focus on enterprise and government customers! Global Security Alliance ecosystem! NASDAQ: FIRE 2

3 Gartner 2010 IPS Magic Quadrant FACT: Sourcefire has been a leader in Gartner s IPS Magic Quadrant since The Magic Quadrant is copyrighted 6 December 2010 by Gartner, Inc. and is reused with permission. The Magic Quadrant is a graphical representation of a marketplace at and for a specific time period. 3 It depicts Gartner's analysis of how certain vendors measure against criteria for that marketplace, as defined by Gartner. Gartner does not endorse any vendor, product or service depicted in the Magic Quadrant, and does not advise technology users to select only those vendors placed in the "Leaders" quadrant. The Magic Quadrant is intended solely as a research tool, and is not meant to be a specific guide to action. Gartner disclaims all warranties, express or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.

4 Traditional IPS vs. Next-Generation IPS Traditional IPS Next-Generation IPS Closed & Blind Architecture Open & Customizable None or Limited Awareness Visibility & Intelligence 4 Human Intensive Automation Self Tuning & Precision

5 Mgmt Sourcefire a comprehensive solution Products Defense Center Management Console Technologies IPSx IPS Awareness 5 NGIPS NGFW SSL Appliance Virtual Products Immunet

6 Security IS needed 6

7 When Security fails Always expect the unexpected! 7

8 Who is this a statue of? Born September 1846 in USA Died

9 9 Died 1911 Cause of death?

10 10 Kicked himself to death He proved that passwords aren t safe 100 years later we still haven t learned the lesson They can even kill you

11 Security systems All face similar problems In or out, same problem Same challenge What makes you smarter? 11

12 Awareness 12

13 Security is really easy!! Know everything!! Keep track of everything!! Be on top of everything!! Always take the right decision!! Be a superman? 13

14 Sourcefire is an alarm system! IPS is your network s combined automated burglar alarm and security guard force 14

15 Incidents Enough awareness? Organizations reputation/brand took a big hit. 15

16 Do you Know your soft spots? Have awareness enough? Have the capacity to handle all security events? Amount of incidents can be a big challenge! 16

17 Next-Gen IPS The Power of Awareness Network Know what s there, what s vulnerable, and what s under attack Application Identify change and enforce policy on hundreds of applications Behavior Detect anomalies in configuration, connections and data flow Identity Know who is doing what, with what, and where 17

18 Sample RNA Detection 18 Applications Operating Systems Network Infrastructure Consumer

19 Comprehensive Ecosystem Network Infrastructure SIEM / Log Management Configuration Management Incident 19 Management Vulnerability Management Systems Management

20 Next-Generation IPS Defense Center Management Console Awareness Technologies Intrusion Prevention Networks SSL Inspection 20 Apps Behavior Virtualization Users

21 Overall Achievable Block Rate 98% 97% 95% 94% 93% 91% 85% 83% 79% 63% 43% 21 Graphic by Sourcefire, Inc. Source data from NSS Labs Network IPS 2010 Comparative Test Results.

22 Protection Against Server-Side Attacks 96% 96% 93% 90% 90% 90% 73% 73% 69% 63% 43% 22 Graphic by Sourcefire, Inc. Source data from NSS Labs Network IPS 2010 Comparative Test Results.

23 Protection Against Client-Side Attacks 99% 98% 97% 97% 96% 96% 96% 93% 91% 55% 44% 23 Graphic by Sourcefire, Inc. Source data from NSS Labs Network IPS 2010 Comparative Test Results.

24 Vulnerability (CVE) Coverage by Year Sourcefire Vendor 2 Vendor 3 Vendor 4 Vendor 5 Vendor 4 Vendor 6 Vendor 7 Vendor 8 Vendor 9 Vendor 10 6 Vendor 10 Vendor 11 24

25 Vendor-Stated vs. Actual Performance 180% 160% 140% 161% Sourcefire s 2G IPS achieved 3.2G for 161% of vendor-stated performance 120% 100% 80% 60% 40% 20% 115% 113% 100% 81% 49% 40% 39% 100% Performance Baseline Most IPS products achieved well below vendor-stated performance claims 35% 20% 17% 3% 3% 0% 25 Graphic by Sourcefire, Inc. Computations derived from NSS Labs Network IPS 2010 Comparative Test Result

26 Thank you!

Effective IDS/IPS Network Security in a Dynamic World with Next-Generation Intrusion Detection & Prevention

Effective IDS/IPS Network Security in a Dynamic World with Next-Generation Intrusion Detection & Prevention Effective IDS/IPS Network Security in a Dynamic World with Next-Generation Intrusion Detection & Prevention Your Security Challenges Defending the Dynamic Network! Dynamic threats 䕬 䕬 䕬 䕬 Many threats

More information

Next-Generation Intrusion Detection & Prevention. Manuel Minzoni, Brand Manager ITWAY VAD

Next-Generation Intrusion Detection & Prevention. Manuel Minzoni, Brand Manager ITWAY VAD Next-Generation Intrusion Detection & Prevention Manuel Minzoni, Brand Manager ITWAY VAD Today s Reality Begin the transformation to context-aware and adaptive security infrastructure now as you replace

More information

Adaptive IPS Security in a changing world. Dave Venman Security Engineer, UK & Ireland

Adaptive IPS Security in a changing world. Dave Venman Security Engineer, UK & Ireland Adaptive IPS Security in a changing world Dave Venman Security Engineer, UK & Ireland 2 Who Is Sourcefire? Mission: To help customers manage increasing risks and regulations by providing the most effective,

More information

Sourcefire Solutions Overview Security for the Real World. SEE everything in your environment. LEARN by applying security intelligence to data

Sourcefire Solutions Overview Security for the Real World. SEE everything in your environment. LEARN by applying security intelligence to data SEE everything in your environment LEARN by applying security intelligence to data ADAPT defenses automatically ACT in real-time Sourcefire Solutions Overview Security for the Real World Change is constant.

More information

Our Vision and Strategy for Eva Chen CEO and Co-Founder

Our Vision and Strategy for Eva Chen CEO and Co-Founder Our Vision and Strategy for 2016 Eva Chen CEO and Co-Founder Three Key Aspects of our Success in 2016 Staying true to our vision and philosophy as innovators Addressing hottest customer pain points with

More information

32% of Excel users are comfortable with using it for Advanced Analysis e.g., PivotTables

32% of Excel users are comfortable with using it for Advanced Analysis e.g., PivotTables Only 28% of potential BI users have any meaningful access 32% of Excel users are comfortable with using it for Advanced Analysis e.g., PivotTables 31% of all BI initiatives partially meet or don t meet

More information

Cisco and Sourcefire. AGILE SECURITY : Security for the Real World. Stefano Volpi

Cisco and Sourcefire. AGILE SECURITY : Security for the Real World. Stefano Volpi Cisco and Sourcefire AGILE SECURITY : Security for the Real World Stefano Volpi SOURCEfire Worldwide John Chambers statement Security is the TOP issue for Cisco and many of the CIO s in the industry. We

More information

SourceFireNext-Generation IPS

SourceFireNext-Generation IPS D Ů V Ě Ř U J T E S I L N Ý M SourceFireNext-Generation IPS Petr Salač CCNP Security, CCNP, CICSP, CCSI #33835 petr.salac@alefnula.com Our Customers Biggest Security Challenges Maintaining security posture

More information

The Need for Intelligent Network Security: Adapting IPS for today s Threats

The Need for Intelligent Network Security: Adapting IPS for today s Threats The Need for Intelligent Network Security: Adapting IPS for today s Threats James Tucker Security Engineer Sourcefire Nordics A Bit of History It started with passive IDS. Burglar alarm for the network

More information

Overview of F5 Networks. Fatih Bilger Senior Systems Engineer, Prolink. fatih.bilger@prolink.com.tr

Overview of F5 Networks. Fatih Bilger Senior Systems Engineer, Prolink. fatih.bilger@prolink.com.tr Overview of F5 Networks Fatih Bilger Senior Systems Engineer, Prolink fatih.bilger@prolink.com.tr Company Snapshot Leading provider of Application Delivery Networking products that optimize the security,

More information

Sourcefire Next-Generation IPS

Sourcefire Next-Generation IPS Sourcefire Next-Generation IPS Sourcefire Next-Generation IPS sets a new standard for advanced threat protection, integrating real-time contextual awareness, intelligent security automation, and unprecedented

More information

Salient Partner Program

Salient Partner Program Salient Partner Program Resellers Referral Partners Salient Partner Program Why Partner with Salient? Salient partner programs deliver tools, resources and the expertise your company needs to implement

More information

McAfee Acquires NitroSecurity

McAfee Acquires NitroSecurity McAfee Acquires NitroSecurity McAfee announced that it has closed the acquisition of privately owned NitroSecurity. 1. Who is NitroSecurity? What do they do? NitroSecurity develops high-performance security

More information

Gartner Magic Quadrant Sources and Disclaimer

Gartner Magic Quadrant Sources and Disclaimer Gartner Magic Quadrant Sources and Disclaimer 1. Gartner Magic Quadrant for Network Access Control; by Lawrence Orans, John Pescatore, Mark Nicolett; March 27, 2009 2. Gartner Magic Quadrant for Endpoint

More information

FROM PRODUCT TO PLATFORM

FROM PRODUCT TO PLATFORM FROM PRODUCT TO PLATFORM DATA EQUIPMENT 2016 Mikkel Bossen Agenda Today s Challenges Data Growth, SSL encryption, Application Growth & SaaS What s hiding in under the surface? Legacy Security is that really

More information

Stallion SIA Seminar 2.12.2015 PREVENTION FIRST. Introducing the Enterprise Security Platform. Sami Walle Regional Sales Manager

Stallion SIA Seminar 2.12.2015 PREVENTION FIRST. Introducing the Enterprise Security Platform. Sami Walle Regional Sales Manager Stallion SIA Seminar 2.12.2015 PREVENTION FIRST Introducing the Enterprise Security Platform Sami Walle Regional Sales Manager CYBER THREATS ARE GETTING MORE ADVANCED Advanced Persistent Threat Uses a

More information

Requirements When Considering a Next- Generation Firewall

Requirements When Considering a Next- Generation Firewall White Paper Requirements When Considering a Next- Generation Firewall What You Will Learn The checklist provided in this document details six must-have capabilities to look for when evaluating a nextgeneration

More information

Independent process platform

Independent process platform Independent process platform Megatrend in infrastructure software Dr. Wolfram Jost CTO February 22, 2012 2 Agenda Positioning BPE Strategy Cloud Strategy Data Management Strategy ETS goes Mobile Each layer

More information

Sourcefire Next-Generation IPS

Sourcefire Next-Generation IPS Sourcefire Next-Generation IPS Key NGIPS Capabilities Snort IPS detection engine Network intelligence Impact assessment User identification Automated policy tuning Network behavior analysis Packet-level

More information

Решения HP по информационной безопасности

Решения HP по информационной безопасности Решения HP по информационной безопасности Евгений Нечитайло ynechyta@hp.com Mobile: +380 67 464 0218 Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject

More information

Altiris Asset Management Suite 7.0

Altiris Asset Management Suite 7.0 Altiris Asset Management Suite 7.0 1 Today s Agenda 1 Asset Management Overview 2 What's New in AMS 7 3 New Process Automations (workflow) 4 Migration from 6.x to 7.0 Altiris Asset Management Suite 7.0

More information

Skybox Security Survey: Next-Generation Firewall Management

Skybox Security Survey: Next-Generation Firewall Management Skybox Security Survey: Next-Generation Firewall Management November 2012 Worldwide Results Notice: This document contains a summary of the responses to a November 2012 survey of medium- to largesize organizations

More information

Security strategies to stay off the Børsen front page

Security strategies to stay off the Børsen front page Security strategies to stay off the Børsen front page Steve Durkin, Channel Director for Europe, Q1 Labs, an IBM Company 1 2012 IBM Corporation Given the dynamic nature of the challenge, measuring the

More information

Matthias Meier. VP Engineering, bw digitronik. 2013 ForeScout Technologies, Page 1 2014 ForeScout Technologies, Page 1

Matthias Meier. VP Engineering, bw digitronik. 2013 ForeScout Technologies, Page 1 2014 ForeScout Technologies, Page 1 Matthias Meier VP Engineering, bw digitronik 2013 ForeScout Technologies, Page 1 2014 ForeScout Technologies, Page 1 Inadequate Visibility Inadequate Collaboration Inadequate Automation 2013 ForeScout

More information

Changing the Enterprise Security Landscape

Changing the Enterprise Security Landscape Changing the Enterprise Security Landscape Petr Hněvkovský Presales Consultant, ArcSight EMEA HP Enterprise Security Products 2012 Hewlett-Packard Development Company, L.P. The information contained herein

More information

Commvault - Modern Data and Information Management. Aleksandar Antić Commvault Regional Sales SEE Region

Commvault - Modern Data and Information Management. Aleksandar Antić Commvault Regional Sales SEE Region Commvault - Modern Data and Information Management Aleksandar Antić Commvault Regional Sales SEE Region Snapshot of Commvault Established in 1996, headquartered in New Jersey, USA Over 2,000 employees

More information

<Insert Picture Here> Oracle Identity And Access Management

<Insert Picture Here> Oracle Identity And Access Management Oracle Identity And Access Management Gautam Gopal, MSIST, CISSP Senior Security Sales Consultant Oracle Public Sector The following is intended to outline our general product direction.

More information

Status Evolution Balance Trends

Status Evolution Balance Trends This summary represents opinions of Project Botticelli Ltd as of March 2011 only, and does not represent opinions or recommendations of Microsoft Corp, Gartner Group, Forrester Research, except when directly

More information

REV: 0.1.1 (July 2011) McAfee Security: Intrusion Prevention System

REV: 0.1.1 (July 2011) McAfee Security: Intrusion Prevention System McAfee Security: Intrusion Prevention System REV: 0.1.1 (July 2011) 1 Contents 1. McAfee Network Security Platform...3 2. McAfee Host Intrusion Prevention for Server...4 2.1 Network IPS...4 2.2 Workload

More information

QRadar SIEM and Zscaler Nanolog Streaming Service

QRadar SIEM and Zscaler Nanolog Streaming Service QRadar SIEM and Zscaler Nanolog Streaming Service February 2014 1 QRadar SIEM: Security Intelligence Platform QRadar SIEM provides full visibility and actionable insight to protect networks and IT assets

More information

C a r l G o e t h a l s T e r r e m a r k E u r o p e. C a r l. g o e t h a l s @ t e r r e m a r k. c o m

C a r l G o e t h a l s T e r r e m a r k E u r o p e. C a r l. g o e t h a l s @ t e r r e m a r k. c o m Cloud Computing for Government & Enterprise C a r l G o e t h a l s T e r r e m a r k E u r o p e C a r l. g o e t h a l s @ t e r r e m a r k. c o m Agenda Some history on Terremark State of Cloud Public

More information

Salient Managed Services. Hosting and Support

Salient Managed Services. Hosting and Support Salient Managed Services Hosting and Support Salient Managed Services: Hosting and Support Salient s Managed Services provide clients with the highest level of reliability and peace of mind. We have qualified

More information

IBM QRadar Security Intelligence April 2013

IBM QRadar Security Intelligence April 2013 IBM QRadar Security Intelligence April 2013 1 2012 IBM Corporation Today s Challenges 2 Organizations Need an Intelligent View into Their Security Posture 3 What is Security Intelligence? Security Intelligence

More information

Interactive Intelligence. Joe Staples Chief marketing officer Interactive Intelligence

Interactive Intelligence. Joe Staples Chief marketing officer Interactive Intelligence Interactive Intelligence Joe Staples Chief marketing officer Interactive Intelligence As We Get Started 2 www.inin.com As We Get Started 3 www.inin.com As We Get Started 4 www.inin.com What We Do Customer

More information

SAS CUSTOMER INTELLIGENCE. Solve more marketing challenges with a comprehensive enterprise solution

SAS CUSTOMER INTELLIGENCE. Solve more marketing challenges with a comprehensive enterprise solution SAS CUSTOMER INTELLIGENCE Solve more marketing challenges with a comprehensive enterprise solution Enable Smarter Decisions Throughout Your Marketing Process SAS analytics leads to deeper understanding

More information

The Next Generation of IT Management. Jason Andrew Vice President, Marketing & Communications

The Next Generation of IT Management. Jason Andrew Vice President, Marketing & Communications The Next Generation of IT Management Jason Andrew Vice President, Marketing & Communications BMC Has Outperformed the Market Growing Stock Price Over 130 Percent in 5 Years BMC +134% IBM +76% HP +50% NASDAQ

More information

The SDN Opportunity. Erik Papir Director, Global Technical Marketing & Competitive Intelligence HP Networking May 2014

The SDN Opportunity. Erik Papir Director, Global Technical Marketing & Competitive Intelligence HP Networking May 2014 The SDN Opportunity Erik Papir Director, Global Technical Marketing & Competitive Intelligence HP Networking May 2014 Enterprise is moving to a New Style of IT Networking innovations lay the foundation

More information

Sun and Oracle: Joining Forces in Identity Management

Sun and Oracle: Joining Forces in Identity Management Sun and Oracle: Joining Forces in Identity Management The following is intended to outline our general product direction. It is intended for information purposes only, and may not be incorporated into

More information

Intro to NSX. Network Virtualization. 2014 VMware Inc. All rights reserved.

Intro to NSX. Network Virtualization. 2014 VMware Inc. All rights reserved. Intro to NSX Network Virtualization 2014 VMware Inc. All rights reserved. Agenda Introduction NSX Overview Details: Microsegmentation NSX Operations More Information SDDC/Network Virtualization Security

More information

Jeff Warson, GCIH, SCPS, CISSP, CCSK Sr. Principal Security Strategist Symantec Corpora5on

Jeff Warson, GCIH, SCPS, CISSP, CCSK Sr. Principal Security Strategist Symantec Corpora5on Jeff Warson, GCIH, SCPS, CISSP, CCSK Sr. Principal Security Strategist Symantec Corpora5on Agenda 1 2 3 4 5 Sources of a Breach Key IT Security Trends How is DLP Implemented Symantec's Strategy and Recent

More information

How to choose the right NGFW for your organization: Independent 3 rd Party Testing

How to choose the right NGFW for your organization: Independent 3 rd Party Testing How to choose the right NGFW for your organization: Independent 3 rd Party Testing Daniel Ayoub, CISSP, CISM, CISA, CEH Manager, Product Marketing Dell Marketing 2 Confidential Marketing vs. Reality 3

More information

The Hillstone and Trend Micro Joint Solution

The Hillstone and Trend Micro Joint Solution The Hillstone and Trend Micro Joint Solution Advanced Threat Defense Platform Overview Hillstone and Trend Micro offer a joint solution the Advanced Threat Defense Platform by integrating the industry

More information

IBM Security. 2013 IBM Corporation. 2013 IBM Corporation

IBM Security. 2013 IBM Corporation. 2013 IBM Corporation IBM Security Security Intelligence What is Security Intelligence? Security Intelligence --noun 1.the real-time collection, normalization and analytics of the data generated by users, applications and infrastructure

More information

VMware Vision Accelerating the Journey to Your Cloud

VMware Vision Accelerating the Journey to Your Cloud VMware Vision Accelerating the Journey to Your Cloud Ralf von Gunten Sr. Systems Engineer 2010 VMware Inc. All rights reserved VMware is the Customer-Proven Market Leader Company Overview > $2.6 billion

More information

Leader in Forrester Wave ratings (Large & Midsized) 2 nd year as a Leader in the Gartner Customer Service MQ

Leader in Forrester Wave ratings (Large & Midsized) 2 nd year as a Leader in the Gartner Customer Service MQ Leader in Forrester Wave ratings (Large & Midsized) 2 nd year as a Leader in the Gartner Customer Service MQ Mitsubishi Caterpillar Forklift Europe received the all-up Gartner CRM Excellence Award ISS

More information

Simplify and Automate IT

Simplify and Automate IT Simplify and Automate IT The current state of IT INCIDENT SERVICE LEVEL DATA SERVICE REQUEST ASSET RELEASE CONFIGURATION GOVERNANCE AND COMPLIANCE EVENT AND IMPACT ENTERPRISE SCHEDULING DASHBOARDS CAPACITY

More information

Business Intelligence with SharePoint 2010

Business Intelligence with SharePoint 2010 Business Intelligence with SharePoint 2010 August 2011 Asad Mahmood Head Of Business Analytics Consulting E: asad.mahmood@contemporary.co.uk T: @MrAsadMahmood Symon Garfield Chief Technology Officer E:

More information

CA Technologies Data Protection

CA Technologies Data Protection CA Technologies Data Protection can you protect and control information? Johan Van Hove Senior Solutions Strategist Security Johan.VanHove@CA.com CA Technologies Content-Aware IAM strategy CA Technologies

More information

Q1 Labs Corporate Overview

Q1 Labs Corporate Overview Q1 Labs Corporate Overview The Security Intelligence Leader Who we are: Innovative Security Intelligence software company One of the largest and most successful SIEM vendors Leader in Gartner 2011, 2010,

More information

Microsoft Business Intelligence solution. What makes Microsoft BI difference

Microsoft Business Intelligence solution. What makes Microsoft BI difference Business Intelligence today Microsoft Business Intelligence solution What makes Microsoft BI difference Case study and Demo Gartner BI Platform Software Revenue (in $Billions) CIO Priorities: Data Analysis

More information

Identity Management Overview. Bill Nelson bill.nelson@gca.net Vice President of Professional Services

Identity Management Overview. Bill Nelson bill.nelson@gca.net Vice President of Professional Services Identity Management Overview Bill Nelson bill.nelson@gca.net Vice President of Professional Services 1 Agenda Common Identity-related Requests Business Drivers for Identity Management Account (Identity)

More information

CHANGING THE RULES OF NETWORKING. Mike Banic, Vice President, Global Marketing, HP Networking January 13th, 2011

CHANGING THE RULES OF NETWORKING. Mike Banic, Vice President, Global Marketing, HP Networking January 13th, 2011 CHANGING THE RULES OF NETWORKING Mike Banic, Vice President, Global Marketing, HP Networking January 13th, 2011 FORWARD LOOKING STATEMENTS This presentation may contain forward-looking statements that

More information

McAfee Next Generation Firewall

McAfee Next Generation Firewall McAfee Next Generation Firewall Services solutions for Managed Service Providers (MSPs) McAfee Next Generation Firewall offers the advanced security, flexibility, and multitenant control needed to protect

More information

Ian White EPM Specialist Microsoft

Ian White EPM Specialist Microsoft Ian White EPM Specialist Microsoft A bit of background A lot of demo Some closing thoughts Cost Reduction Enhance Efficiency Drive Growth Probably you have heard this 100 times Alignment Enhance strategic

More information

The real trend of the Future Workspace. John Phillips Enterprise Technology Strategist Microsoft Corporation john.phillips@microsoft.

The real trend of the Future Workspace. John Phillips Enterprise Technology Strategist Microsoft Corporation john.phillips@microsoft. The real trend of the Future Workspace John Phillips Enterprise Technology Strategist Microsoft Corporation john.phillips@microsoft.com Communications.... Our Vision Create experiences that combine the

More information

G06 - How to store your data in SharePoint

G06 - How to store your data in SharePoint G06 - How to store your data in SharePoint European Microsoft SharePoint Conference 2007 A story about Performance, Compliance and Reliability by NetApp February 12th to 14th, 2007 Convention Center Hotel

More information

Enterprise Identity Management Reference Architecture

Enterprise Identity Management Reference Architecture Enterprise Identity Management Reference Architecture Umut Ceyhan Principal Sales Consultant, IDM SEE Agenda Introduction Virtualization Access Management Provisioning Demo Architecture

More information

Parallel Data Warehouse

Parallel Data Warehouse MICROSOFT S ANALYTICS SOLUTIONS WITH PARALLEL DATA WAREHOUSE Parallel Data Warehouse Stefan Cronjaeger Microsoft May 2013 AGENDA PDW overview Columnstore and Big Data Business Intellignece Project Ability

More information

DATA TRANSPARENCY TOWN HALL MEETING

DATA TRANSPARENCY TOWN HALL MEETING DATA TRANSPARENCY TOWN HALL MEETING September 26, 2014 richard.harmison@teradata.com gindy.feeser@teradata.com A Question How much financial data does the US Government have? 2 Teradata Confidential 3

More information

Symantec to Acquire Clearwell Systems, Inc. May 19, 2011

Symantec to Acquire Clearwell Systems, Inc. May 19, 2011 Symantec to Acquire Clearwell Systems, Inc. May 19, 2011 1 Forward-Looking Statements This presentation contains forward-looking statements within the meaning of U.S. federal securities laws, including

More information

The 2014 Next Generation Firewall Challenge

The 2014 Next Generation Firewall Challenge Network World and Robin Layland present The 2014 Next Generation Firewall Challenge Guide to Understanding and Choosing a Next Generation Firewall to Combat Today's Threats 2014 The 2014 Next Generation

More information

DATA CENTER IPS COMPARATIVE ANALYSIS

DATA CENTER IPS COMPARATIVE ANALYSIS DATA CENTER IPS COMPARATIVE ANALYSIS Security Value Map (SVM) 2014 Thomas Skybakmoen, Jason Pappalexis Tested Products Fortinet FortiGate 5140B, Juniper SRX 5800, McAfee NS- 9300, Sourcefire 8290-2 Overview

More information

Revolutionize your Enterprise with IT-Infrastructure-as-a-Service. Thomas Riley International MD 17 th April 2009

Revolutionize your Enterprise with IT-Infrastructure-as-a-Service. Thomas Riley International MD 17 th April 2009 Revolutionize your Enterprise with IT-Infrastructure-as-a-Service Thomas Riley International MD 17 th April 2009 Agenda Key challenges facing IT leaders in this challenging climate New findings! Singapore

More information

The webinar will begin shortly

The webinar will begin shortly The webinar will begin shortly An Introduction to Security Intelligence Presented by IBM Security Chris Ross Senior Security Specialist, IBM Security Agenda The Security Landscape An Introduction to Security

More information

Achieve Deeper Network Security

Achieve Deeper Network Security Achieve Deeper Network Security Dell Next-Generation Firewalls Abstract Next-generation firewalls (NGFWs) have taken the world by storm, revolutionizing network security as we once knew it. Yet in order

More information

IAN MASSINGHAM. Technical Evangelist Amazon Web Services

IAN MASSINGHAM. Technical Evangelist Amazon Web Services IAN MASSINGHAM Technical Evangelist Amazon Web Services From 2014: Cloud computing has become the new normal Deploying new applications to the cloud by default Migrating existing applications as quickly

More information

HP ENTERPRISE SECURITY. Protecting the Instant-On Enterprise

HP ENTERPRISE SECURITY. Protecting the Instant-On Enterprise HP ENTERPRISE SECURITY Protecting the Instant-On Enterprise HP SECURITY INTELLIGENCE AND RISK MANAGEMENT PLATFORM Advanced Protection Against Advanced Threats 360 Security Monitoring to Detect Incidents

More information

QRadar SIEM and FireEye MPS Integration

QRadar SIEM and FireEye MPS Integration QRadar SIEM and FireEye MPS Integration March 2014 1 IBM QRadar Security Intelligence Platform Providing actionable intelligence INTELLIGENT Correlation, analysis and massive data reduction AUTOMATED Driving

More information

Service Desk Offering

Service Desk Offering Service Desk Offering 1 Our Approach Strategy & Value Proposition User Experience Continuous Improvement Value Delivery Capability Customer Experience Benefits Summary 2 Our approach The Service Desk is

More information

Simplify and Automate IT

Simplify and Automate IT Simplify and Automate IT Expectations have never been higher Reduce IT Costs 30% increase in staff efficiency Reduce support costs by 25% Improve Quality of Service Reduce downtime by 75% 70% faster MTTR

More information

Braindumps.700-295.50.QA

Braindumps.700-295.50.QA Braindumps.700-295.50.QA Number: 700-295 Passing Score: 800 Time Limit: 120 min File Version: 6.0 http://www.gratisexam.com/ Comprehensive, easy and to the point study material made it possible for me

More information

CA Systems Performance for Infrastructure Managers

CA Systems Performance for Infrastructure Managers PRODUCT SHEET: CA Systems Performance for Infrastructure Managers agility made possible CA Systems Performance for Infrastructure Managers CA Systems Performance for Infrastructure Managers is an add-on

More information

TRANSFORMING GOVERNMENT, ONE SOLUTION AT A TIME. Networx solutions from Verizon

TRANSFORMING GOVERNMENT, ONE SOLUTION AT A TIME. Networx solutions from Verizon TRANSFORMING GOVERNMENT, ONE SOLUTION AT A TIME Networx solutions from Verizon The business of government is complex as agencies face more demands. New executive priorities must be addressed. Agency-wide

More information

NetApp SANscreen: come controllare i costi senza sacrificare la service quality. Roberto Patano Business Development Manager NetApp Italia

NetApp SANscreen: come controllare i costi senza sacrificare la service quality. Roberto Patano Business Development Manager NetApp Italia NetApp SANscreen: come controllare i costi senza sacrificare la service quality Roberto Patano Business Development Manager NetApp Italia Data Center Transformation Explosive Data Growth Dedicated Architectures

More information

IBM Security Intelligence Strategy

IBM Security Intelligence Strategy IBM Security Intelligence Strategy Delivering Insight with Agility October 17, 2014 Victor Margina Security Solutions Accent Electronic 12013 IBM Corporation We are in an era of continuous breaches Operational

More information

Cloud Database Demystified to Deliver SaaS Customer Value

Cloud Database Demystified to Deliver SaaS Customer Value Cloud Database Demystified to Deliver SaaS Customer Value 2 The business of Cloud Savvis ranks as a leader Magic Quadrant for Cloud Infrastructure-as-a-Service and Web Hosting The Magic Quadrant is copyrighted

More information

Security Intelligence Solutions

Security Intelligence Solutions Security Intelligence Solutions Know what is going on inside your enterprise with QRadar Joseph Skocich, WW Sales Integration Executive Q1 Labs, an IBM Company June 2012 jskocich@us.ibm.com What is Security

More information

Top 5 Reasons to choose Microsoft Windows Server 2008 R2 SP1 Hyper-V over VMware vsphere 5

Top 5 Reasons to choose Microsoft Windows Server 2008 R2 SP1 Hyper-V over VMware vsphere 5 Top 5 Reasons to choose Microsoft Windows Server 2008 R2 SP1 Hyper-V over VMware Published: April 2012 2012 Microsoft Corporation. All rights reserved. This document is provided "as-is." Information and

More information

Fortinet Advanced Threat Protection- Part 3

Fortinet Advanced Threat Protection- Part 3 Fortinet Advanced Threat Protection- Part 3 Upgrading Your Endpoint Security to Meet Advanced Threats Copyright Fortinet Inc. All rights reserved. Agenda Brief Recap on Breaches and the Need for Advanced

More information

HP FlexNetwork and IPv6

HP FlexNetwork and IPv6 HP FlexNetwork and IPv6 Miha Petrač ESSN HP Networking presales 25.1.2012 2011Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice Magic Quadrant:

More information

Realize That Big Security Data Is Not Big Security Nor Big Intelligence

Realize That Big Security Data Is Not Big Security Nor Big Intelligence G00245789 Realize That Big Security Data Is Not Big Security Nor Big Intelligence Published: 19 April 2013 Analyst(s): Joseph Feiman Security intelligence's ultimate objective, enterprise protection, is

More information

Cisco Security Strategy Update Integrated Threat Defense. Oct 28, 2015

Cisco Security Strategy Update Integrated Threat Defense. Oct 28, 2015 Cisco Security Strategy Update Integrated Threat Defense Oct 28, 2015 Breaches are the New Normal FDA Wards of Security Flaw in Infusion Pump Cisco Confidential Cisco s Covers the Threat-Centric Entire

More information

End User Services. Managed Mobile. Mobile Device Management. Managed Mobile. Copyright 2012 FUJITSU

End User Services. Managed Mobile. Mobile Device Management. Managed Mobile. Copyright 2012 FUJITSU End User Services Managed Mobile Mobile Device Management Managed Mobile 0 Managed Mobile Offering Overview Challenges Managed Mobile Why Fujitsu 1 Mobility Challenges The way we do business is changing

More information

Log management & SIEM: QRadar Security Intelligence Platform

Log management & SIEM: QRadar Security Intelligence Platform Log management & SIEM: QRadar Security Intelligence Platform Tibor Bősze Security Architect for CEE+RCIS tibor.boesze@hu.ibm.com The Security Intelligence Leader Who is Q1Labs: Innovative Security Intelligence

More information

How to Choose the Right Security Information and Event Management (SIEM) Solution

How to Choose the Right Security Information and Event Management (SIEM) Solution How to Choose the Right Security Information and Event Management (SIEM) Solution John Burnham Director, Strategic Communications and Analyst Relations IBM Security Chris Meenan Director, Security Intelligence

More information

IBM Cognos Business Intelligence

IBM Cognos Business Intelligence Click to add text IBM Cognos Business Intelligence Business Analytics software IBM Business Analytics Portfolio 2 Organizations today operate with blind spots Incomplete Information 1 in 3 managers frequently

More information

Protecting What Matters Most

Protecting What Matters Most Protecting What Matters Most Piotr Kluczwajd 7 th June 2016 OUR MISSION Provide leading solutions that protect the data, apps and commerce of our customers 2 OUR GLOBAL BUSINESS Founded in 2002 Global

More information

Network that Know. Rasmus Andersen Lead Security Sales Specialist North & RESE

Network that Know. Rasmus Andersen Lead Security Sales Specialist North & RESE Network that Know Rasmus Andersen Lead Security Sales Specialist North & RESE Email Gateway vendor CERT AV vendor Law enforcement Web Security Vendor Network security appliance vendor IT Department App

More information

INVESTOR PRESENTATION. Third Quarter 2014

INVESTOR PRESENTATION. Third Quarter 2014 INVESTOR PRESENTATION Third Quarter 2014 Note to Investors Certain non-gaap financial information regarding operating results may be discussed during this presentation. Reconciliations of the differences

More information

MDM that Works. A Real World Guide to Making Data Quality a Successful Element of Your Cloud Strategy. Presented to Pervasive Metamorphosis Conference

MDM that Works. A Real World Guide to Making Data Quality a Successful Element of Your Cloud Strategy. Presented to Pervasive Metamorphosis Conference MDM that Works A Real World Guide to Making Data Quality a Successful Element of Your Cloud Strategy Presented to Pervasive Metamorphosis Conference Malcolm T. Hawker, Pivotal IT Consulting April 28, 2011

More information

Sourcefire Defense Center TM

Sourcefire Defense Center TM Sourcefire TM Sourcefire Capabilities Store up to 100,000,000 security & host events, including packet data Centralized policy & sensor management Centralized audit logging of configuration & security

More information

ORACLE FUSION MIDDLEWARE PROFILE

ORACLE FUSION MIDDLEWARE PROFILE ORACLE FUSION MIDDLEWARE PROFILE Corporate Addvantum, is a global service provider of Information Technology consulting and services, to customers in GCC region. Addvantum has technical delivery centers

More information

WHITE PAPER SPLUNK SOFTWARE AS A SIEM

WHITE PAPER SPLUNK SOFTWARE AS A SIEM SPLUNK SOFTWARE AS A SIEM Improve your security posture by using Splunk as your SIEM HIGHLIGHTS Splunk software can be used to operate security operations centers (SOC) of any size (large, med, small)

More information

CA Virtual Assurance for Infrastructure Managers

CA Virtual Assurance for Infrastructure Managers PRODUCT SHEET: CA Virtual Assurance for Infrastructure Managers CA Virtual Assurance for Infrastructure Managers agility made possible CA Virtual Assurance for Infrastructure Managers is an add-on product

More information

IBM Security QRadar SIEM Product Overview

IBM Security QRadar SIEM Product Overview IBM Security QRadar SIEM Product Overview Alex Kioni IBM Security Systems Technical Consultant 1 2012 IBM Corporation The importance of integrated, all source analysis cannot be overstated. Without it,

More information

IBM Security QRadar Risk Manager

IBM Security QRadar Risk Manager IBM Security QRadar Risk Manager Proactively manage vulnerabilities and network device configuration to reduce risk, improve compliance Highlights Collect network security device configuration data to

More information

Market Segment Definitions

Market Segment Definitions Market Segment Definitions Author Joshua Mittler Overview In addition to product testing, NSS Labs quantitatively evaluates market size for each of the product categories tested. NSS provides metrics that

More information

ObserveIT User Activity Monitoring

ObserveIT User Activity Monitoring KuppingerCole Report EXECUTIVE VIEW by Martin Kuppinger April 2015 ObserveIT provides a comprehensive solution for monitoring user activity across the enterprise. The product operates primarily based on

More information

Leading The World Into Connected Security. Dipl.-Inform., CISSP, S+ Rolf Haas Enterprise Technology Specialist Content Lead EMEA

Leading The World Into Connected Security. Dipl.-Inform., CISSP, S+ Rolf Haas Enterprise Technology Specialist Content Lead EMEA Leading The World Into Connected Security Dipl.-Inform., CISSP, S+ Rolf Haas Enterprise Technology Specialist Content Lead EMEA History of Defining Largest Dedicated Delivering a Next Generation Architecture

More information

IBM Tririga nástroj pre Real estate portfólio manažment

IBM Tririga nástroj pre Real estate portfólio manažment IBM Tririga nástroj pre Real estate portfólio manažment Druhá strana mince facility managementu Juraj Polák, Cloud & Smarter Infrastructure leader Juraj.polak@sk.ibm.com Agenda efocus 2013 lesson learned

More information