F5 Security and Strategic Direction. Jon Kuhn Security Product Management Team
|
|
- Prudence Paul
- 7 years ago
- Views:
Transcription
1
2 F5 Security and Strategic Direction Jon Kuhn Security Product Management Team
3 Applications Drive Innovation and Massive Growth in Data 3
4 Applications Drive Innovation and Massive Growth in Data THE NEW NORMAL 3.2B people can access apps via internet 16B IP devices to 24B in 2019 Smart Phone Tablet Smart Device 3
5 Applications Drive Innovation and Massive Growth in Data THE NEW NORMAL APPLICATIONS KNOW NO BOUNDARY 3.2B people can access apps via internet 16B IP devices to 24B in 2019 Smart Phone Tablet Smart Device Data center applications Internet applications 3
6 Applications Drive Innovation and Massive Growth in Data THE NEW NORMAL APPLICATIONS KNOW NO BOUNDARY 3.2B people can access apps via internet 16B IP devices to 24B in 2019 Smart Phone Tablet Smart Device Data center applications Internet applications EVOLUTION OF APPLICATIONS 1B hybrid cloud applications in
7 Applications Drive Innovation and Massive Growth in Data THE NEW NORMAL APPLICATIONS KNOW NO BOUNDARY 3.2B people can access apps via internet 16B IP devices to 24B in 2019 Smart Phone Tablet Smart Device Data center applications Internet applications EVOLUTION OF APPLICATIONS 1B hybrid cloud applications in ZB data consumption in the world DATA IS EVERYWHERE 3
8 Resulting in an Unprecedented Increase in Attacks 4
9 Resulting in an Unprecedented Increase in Attacks 12% OTHER 16% HUMAN ELEMENT 44% VULNERABLE APPS 1.2B COMPROMISED RECORDS SINCE M PERSONAL PROFILES STOLEN $270M CREDIT CARD FRAUD IN % COMPROMISED IDENTITIES $15M AVERAGE COST OF AN ATTACK 46 AVERAGE DAYS TO RESOLVE AN ATTACK Source: Based on aggregated data from IT Business Edge, Krebs on Security, Security Week, and CSO Online 4
10 Security Investments Are Completely Misaligned with Reality Perimeter Security 5
11 Security Investments Are Completely Misaligned with Reality Perimeter Security 25% 90% OF ATTACKS ARE FOCUSED HERE OF SECURITY INVESTMENT 5
12 Security Investments Are Completely Misaligned with Reality Perimeter Security Identity & Application Security 25% 90% 72% 10% OF ATTACKS ARE FOCUSED HERE OF SECURITY INVESTMENT OF ATTACKS ARE FOCUSED HERE OF SECURITY INVESTMENT Source: Gartner 5
13 Traditionally, Data Was Secure Inside the Perimeter PERIMETER SECURITY AUTHORIZED USER MANAGED DEVICES APPS DATA AUTHORIZED USERS UNKNOWN USERS MALICIOUS USERS DLP Firewall IPS 6
14 The Perimeter Has Dissolved PERIMETER SECURITY and Zero Trust Must Reign 7
15 The Perimeter Has Dissolved Private Public ZERO TRUST SaaS and Zero Trust Must Reign 7
16 Cloud Apps and Mobility Have Changed the Game Public Private SaaS 8
17 Cloud Apps and Mobility Have Changed the Game Public Private SaaS 3.2 billion unknown users 7.4 billion unsecured devices 1 billion applications 44 ZB of data by
18 Today s Requirement Protect Identities, Apps, and Data Public Private SaaS 9
19 Today s Requirement Protect Identities, Apps, and Data Public Private SaaS 9
20 F5 s Access, Identity, and App Protection Solutions F5 IDENTITY AND ACCESS MANAGEMENT F5 APPLICATION PROTECTION Public Private SaaS PROTECT ACCESS AND IDENTITY Enable secure access for any user on any device PROTECT APPLICATIONS Safeguard your apps, regardless of where they live 10
21 F5 s Access, Identity, and App Protection Solutions F5 IDENTITY AND ACCESS MANAGEMENT F5 APPLICATION PROTECTION Public Private SaaS Remote Access Identity Federation Enterprise Mobility Gateway App Access Management Secure Web Gateway WAF DDoS Protection Web Fraud Protection Carrier-Class Firewall IP Intelligence DNS Security SSL Inspection and Interception 11
22 F5 s Access, Identity, and App Protection Solutions F5 IDENTITY AND ACCESS MANAGEMENT F5 APPLICATION PROTECTION Public Private SaaS Remote Access Identity Federation Enterprise Mobility Gateway App Access Management Secure Web Gateway WAF DDoS Protection Web Fraud Protection Carrier-Class Firewall IP Intelligence DNS Security SSL Inspection and Interception BIG-IP Virtual Edition(s) Purpose-Built Hardware F5 Silverline 12
23 13
24 FY16 Security Roadmap SSL Intercept DDoS Protection Carrier Class FW Identity and Access Anti-Fraud WAF Competitors F5 Strategy Trojan horse through SSL visibility Single vendor for hybrid DDoS protection Laser focus on GiFW and DC use cases for SP Retain leadership in SSL-VPN and expand into IAM Leverage position as a WAF player to deploy Anti-Fraud Drive market share leveraging hybrid WAF F5 Advantage Undisputed leader in proxy tech., scale Largest DDoS vector spectrum, hybrid, and L7 capabilities Best scale and price performance Consolidated access across applications Clientless approach 99.89% security effectiveness and lowest TCO Market/TAM 500M 12% CAGR 765M 16% CAGR 1B 12% CAGR 5.7B 8% Growth 380M 15% CAGR 580M 19% CAGR Roadmap Enhanced service chaining, risk integration Behavioral, analytics, out of band, reporting, management Addl. protocols, Volte, new compiler enhancements SSO/Fed protocols, app provisioning, adaptive auth. Improve malware detection, ease of configuration Transparent mode, improved context, risk engine, simplified deployment Cross-Product Roadmap Security Intelligence Risk Engine Visibility and Analytics BIG-IQ Centralized Management Advancements 14
25 FY16 Security Roadmap SSL Intercept DDoS Protection Carrier Class FW Identity and Access Anti-Fraud WAF Competitors F5 Strategy Trojan horse through SSL visibility Single vendor for hybrid DDoS protection Laser focus on GiFW and DC use cases for SP Retain leadership in SSL-VPN and expand into IAM Leverage position as a WAF player to deploy Anti-Fraud Drive market share leveraging hybrid WAF F5 Advantage Undisputed leader in proxy tech., scale Largest DDoS vector spectrum, hybrid, and L7 capabilities Best scale and price performance Consolidated access across applications Clientless approach 99.89% security effectiveness and lowest TCO Market/TAM 500M 12% CAGR 765M 16% CAGR 1B 12% CAGR 5.7B 8% Growth 380M 15% CAGR 580M 19% CAGR Roadmap Enhanced service chaining, risk integration Behavioral, analytics, out of band, reporting, management Addl. protocols, Volte, new compiler enhancements SSO/Fed protocols, app provisioning, adaptive auth. Improve malware detection, ease of configuration Transparent mode, improved context, risk engine, simplified deployment Cross-Product Roadmap Security Intelligence Risk Engine Visibility and Analytics BIG-IQ Centralized Management Advancements 15
26 FY16 Security Roadmap SSL Intercept DDoS Protection Carrier Class FW Identity and Access Anti-Fraud WAF Competitors F5 Strategy Trojan horse through SSL visibility Single vendor for hybrid DDoS protection Laser focus on GiFW and DC use cases for SP F5 in top 3 recommended vendors by NSS Retain leadership in SSL-VPN and expand into IAM Leverage position as a WAF player to deploy Anti-Fraud Drive market share leveraging hybrid WAF F5 Advantage Undisputed leader in proxy tech., scale Largest DDoS vector spectrum, hybrid, and L7 capabilities Best scale and price performance Consolidated access across applications Clientless approach 99.89% security effectiveness and lowest TCO Market/TAM 500M 12% CAGR 765M 16% CAGR 1B 12% CAGR 5.7B 8% Growth 380M 15% CAGR 580M 19% CAGR Roadmap Enhanced service chaining, risk integration Behavioral, analytics, out of band, reporting, management Addl. protocols, Volte, new compiler enhancements SSO/Fed protocols, app provisioning, adaptive auth. Improve malware detection, ease of configuration Transparent mode, improved context, risk engine, simplified deployment Cross-Product Roadmap Security Intelligence Risk Engine Visibility and Analytics BIG-IQ Centralized Management Advancements 15
27 FY16 Security Roadmap SSL Intercept DDoS Protection Carrier-Class FW Identity and Access Anti-Fraud WAF Competitors F5 Strategy Trojan horse through SSL visibility Single vendor for hybrid DDoS protection Laser focus on GiFW and DC use cases for SP Retain leadership in SSL-VPN and expand into IAM Leverage position as a WAF player to deploy Anti-Fraud Drive market share leveraging hybrid WAF F5 Advantage Undisputed leader in proxy tech., scale Largest DDoS vector spectrum, hybrid, and L7 capabilities Best scale and price performance Consolidated access across applications Clientless approach 99.89% security effectiveness and lowest TCO Market/TAM 500M 12% CAGR 765M 16% CAGR 1B 12% CAGR 5.7B 8% Growth 380M 15% CAGR 580M 19% CAGR Roadmap Enhanced service chaining, risk integration Behavioral, analytics, out of band, reporting, management Addl. protocols, Volte, new compiler enhancements SSO/Fed protocols, app provisioning, adaptive auth. Improve malware detection, ease of configuration Transparent mode, improved context, risk engine, simplified deployment Cross-Product Roadmap Security Intelligence Risk Engine Visibility and Analytics BIG-IQ Centralized Management Advancements 16
28 FY16 Security Roadmap SSL Intercept DDoS Protection Carrier Class FW Identity and Access Anti-Fraud WAF Competitors F5 Strategy Trojan horse through SSL visibility Single vendor for hybrid DDoS protection Laser focus on GiFW and DC use cases for SP Retain leadership in SSL-VPN and expand into IAM Leverage position as a WAF player to deploy Anti-Fraud Drive market share leveraging hybrid WAF F5 Advantage Undisputed leader in proxy tech., scale Largest DDoS vector spectrum, hybrid, and L7 capabilities Best scale and price performance Consolidated access across applications Clientless approach 99.89% security effectiveness and lowest TCO Market/TAM 500M 12% CAGR 765M 16% CAGR 1B 12% CAGR 5.7B 8% Growth 380M 15% CAGR 580M 19% CAGR Roadmap Enhanced service chaining, risk integration Behavioral, analytics, out of band, reporting, management Addl. protocols, Volte, new compiler enhancements SSO/Fed protocols, endpt. checks, adaptive auth. Improve malware detection, ease of configuration Transparent mode, improved context, risk engine, simplified deployment Cross-Product Roadmap Security Intelligence Risk Engine Visibility and Analytics BIG-IQ Centralized Management Advancements 17
29 FY16 Security Roadmap SSL Intercept DDoS Protection Carrier Class FW Identity and Access Anti-Fraud WAF Competitors F5 Strategy Trojan horse through SSL visibility Single vendor for hybrid DDoS protection Laser focus on GiFW and DC use cases for SP Retain leadership in SSL-VPN and expand into IAM Leverage position as a WAF player to deploy Anti-Fraud Drive market share leveraging hybrid WAF F5 Advantage Undisputed leader in proxy tech., scale Largest DDoS vector spectrum, hybrid, and L7 capabilities Best scale and price performance Consolidated access across applications Clientless approach 99.89% security effectiveness and lowest TCO Market/TAM 500M 12% CAGR 765M 16% CAGR 1B 12% CAGR 5.7B 8% Growth 380M 15% CAGR 580M 19% CAGR Roadmap Enhanced service chaining, risk integration Behavioral, analytics, out of band, reporting, management Addl. protocols, Volte, new compiler enhancements SSO/Fed protocols, app provisioning, adaptive auth. Improve malware detection, ease of configuration Transparent mode, improved context, risk engine, simplified deployment Cross-Product Roadmap Security Intelligence Risk Engine Visibility and Analytics BIG-IQ Centralized Management Advancements 18
30 FY16 Security Roadmap SSL Intercept DDoS Protection Carrier Class FW Identity and Access Anti-Fraud WAF Competitors F5 Strategy Trojan horse through SSL visibility Single vendor for hybrid DDoS protection Laser focus on GiFW and DC use cases for SP Retain leadership in SSL-VPN and expand into IAM Leverage position as a WAF player to deploy Anti-Fraud Drive market share leveraging hybrid WAF F5 Advantage Undisputed leader in proxy tech., scale Largest DDoS vector spectrum, hybrid, and L7 capabilities Best scale and price performance Consolidated access across applications Clientless approach 99.89% security effectiveness and lowest TCO Market/TAM 500M 12% CAGR 765M 16% CAGR 1B 12% CAGR 5.7B 8% Growth 380M 15% CAGR 580M 19% CAGR Roadmap Enhanced service chaining, risk integration Behavioral, analytics, out of band, reporting, management Addl. protocols, Volte, new compiler enhancements SSO/Fed protocols, app provisioning, adaptive auth. Improve malware detection, ease of configuration Transparent mode, improved context, risk engine, simplified deployment Cross-Product Roadmap Security Intelligence Risk Engine Visibility and Analytics BIG-IQ Centralized Management Advancements 19
31 FY16 Security Roadmap SSL Intercept DDoS Protection Carrier-Class FW Identity and Access Anti-Fraud WAF Competitors F5 Strategy Trojan horse through SSL visibility Single vendor for hybrid DDoS protection Laser focus on GiFW and DC use cases for SP Retain leadership in SSL-VPN and expand into IAM Leverage position as a WAF player to deploy Anti-Fraud Drive market share leveraging hybrid WAF F5 Advantage Undisputed leader in proxy tech., scale Largest DDoS vector spectrum, hybrid, and L7 capabilities Best scale and price performance Consolidated access across applications Clientless approach 99.89% security effectiveness and lowest TCO Market/TAM 500M 12% CAGR 765M 16% CAGR 1B 12% CAGR 5.7B 8% Growth 380M 15% CAGR 580M 19% CAGR Roadmap Enhanced service chaining, risk integration Behavioral, analytics, out of band, reporting, management Addl. protocols, Volte, new compiler enhancements SSO/Fed protocols, app provisioning, adaptive auth. Improve malware detection, ease of configuration Transparent mode, improved context, risk engine, simplified deployment Cross-Product Roadmap Risk Engine Visibility and Analytics BIG-IQ Centralized Management Advancements 20
32 Vision and Roadmap for Application Access 21
33 Vision and Roadmap for Application Access FALL 2016 Evolving Our Identity Bridge New cloud app access and auth. use cases (Oauth) Client: increase OS/browser support, less support issues BIG-IQ Centralized Management for central management Introduction of SSL Intercept PHASE 2 Simplified Access Management Consolidated dashboard for provisioned applications Integrated login protection to protect against credential stealing Evolve BIG-IQ Centralized Management: policy editing, HA, and reporting PHASE 3 Risk-Based Cloud Access Single point of visibility, risk scoring, and control for cloud/ on-premises app access Integrate user behavioral analytics (risk engine), service chaining decisions, and the analytics CASB API approach to protecting data and compliance for the use of apps 21
34 Vision and Roadmap for Application Protection FALL 2016 Advancing Current Offerings Improved firewall robustness: NAT, compiler opt, SSH proxy Simplify policy, improve security with web sockets Improving fingerprinting and DDoS efficacy BIG-IQ Centralized Management: scale and configuration support PHASE 2 App-Centric Approach App-centric policy management Improved context around user authentication, endpoint type, posture, behavior human or a bot Improved visibility and threat event reporting Introduce risk engine to develop a risk score PHASE 3 Risk-Based App Security Evolved risk-aware, app-attached policy and workloads Fully evolved dynamic service chaining with large ecosystem of third-party vendors Shared intelligence across customers Matured centralized visibility and analytics 22
35 Vision and Roadmap for Application Protection FALL 2016 Advancing Current Offerings Improved firewall robustness: NAT, compiler opt, SSH proxy Simplify policy, improve security with web sockets Improving fingerprinting and DDoS efficacy BIG-IQ Centralized Management: scale and configuration support PHASE 2 App-Centric Approach App-centric policy management Improved context around user authentication, endpoint type, posture, behavior human or a bot Improved visibility and threat event reporting Introduce risk engine to develop a risk score PHASE 3 Risk-Based App Security Evolved risk-aware, app-attached policy and workloads Fully evolved dynamic service chaining with large ecosystem of third-party vendors Shared intelligence across customers Matured centralized visibility and analytics 22
36 Purpose-Built Initiative
37 Purpose-Built: Company-Wide Focus on the Security Buyer CHIEF INFORMATION SECURITY OFFICER (CISO) SECURITY ARCHITECT SECURITY ENGINEER 24
38 Purpose-Built: Company-Wide Focus on the Security Buyer PURPOSE-BUILT SECURITY PRODUCTS CHIEF INFORMATION SECURITY OFFICER (CISO) PURPOSE-BUILT MARKETING PURPOSE-BUILT PARTNERSHIPS SECURITY ARCHITECT SECURITY ENGINEER PURPOSE-BUILT SELLING F5 LABS SECURITY RESEARCH 24
39 Purpose-Built Guidelines 25
40 Purpose-Built Guidelines Market Opportunity Meaningful market opportunity Long-term investment for success New Hardware Leveraging state-of-the-art new hardware New look and feel User Experience Simplified setup and configuration Align UI with security buyers 25
41 Purpose-Built Products SSL Intercept All-in-one appliance solution designed to provide increased visibility into encrypted traffic Hybrid DDoS Comprehensive DDoS protection, tightly-integrated on-premises and cloud Carrier-Class FW Network firewall across SP-specific Gi and DC FW use cases 26
42 Purpose-Built Products SSL Intercept All-in-one appliance solution designed to provide increased visibility into encrypted traffic Hybrid DDoS Comprehensive DDoS protection, tightly-integrated on-premises and cloud Carrier-Class FW Network firewall across SP-specific Gi and DC FW use cases 26
43 Let's Go Deeper Into Our Products and Roadmap F5 IDENTITY AND ACCESS MANAGEMENT F5 APPLICATION PROTECTION Public Private SaaS PROTECT ACCESS AND IDENTITY Enable secure access for any user on any device PROTECT APPLICATIONS Safeguard your apps, regardless of where they live 27
44 Let's Go Deeper Into Our Products and Roadmap F5 IDENTITY AND ACCESS MANAGEMENT F5 APPLICATION PROTECTION Public Private SaaS PROTECT ACCESS AND IDENTITY Enable secure access for any user on any device PROTECT APPLICATIONS Safeguard your apps, regardless of where they live 27
45 F5 SSL Orchestrator 28
46 F5 SSL Orchestrator Text Here Text Here Text Here Text Here 28
47 Let's Go Deeper Into Our Products and Roadmap F5 IDENTITY AND ACCESS MANAGEMENT F5 APPLICATION PROTECTION Public Private SaaS PROTECT ACCESS AND IDENTITY Enable secure access for any user on any device PROTECT APPLICATIONS Safeguard your apps, regardless of where they live 29
48 Let's Go Deeper Into Our Products and Roadmap F5 IDENTITY AND ACCESS MANAGEMENT F5 APPLICATION PROTECTION Public Private SaaS PROTECT ACCESS AND IDENTITY Enable secure access for any user on any device PROTECT APPLICATIONS Safeguard your apps, regardless of where they live 29
49 F5 DDoS Hybrid Defender 30
50 F5 DDoS Hybrid Defender Text Here Text Here Text Here Text Here 30
51
52 Additional Slides
53 FY16 Security Roadmap MASTER Competitors SSL Intercept A10 DDoS Protection radware Carrier Class FW Identity & Access Anti-Fraud WAF F5 Strategy Trojan horse through SSL visibility Single vendor for hybrid DDoS protection Laser focus on GiFW and DC use cases for SP Retain leadership in SSL-VPN and expand into IAM Leverage position as a WAF player to deploy Anti-Fraud Drive market share leveraging hybrid WAF F5 Advantage Undisputed leader in proxy tech., scale Largest DDoS vector spectrum, hybrid, and L7 capabilities Best scale and price performance Consolidated access across applications Clientless approach 99.89% security effectiveness and lowest TCO Market/TAM 500m 12% CAGR 765m 16% CAGR 1b 12% CAGR 5.7b 8% Growth 380m 15% CAGR 580m 19% CAGR Roadmap Enhanced service chaining, risk integration Behavioral, analytics, out of band, reporting, mgmt. Addl. protocols, Volte, new compiler enhancements SSO/Fed protocols, app provisioning, adaptive auth. Improve malware detection, ease of configuration Transparent mode, improved context, risk engine, simplified deployment Cross Product Roadmap Security intelligence Risk Engine Visibility & Analytics BIG-IQ Centralized Management Advancements
54 FY16 Security Roadmap MASTER Competitors SSL Intercept A10 DDoS Protection radware Carrier-Class FW Identity & Access Anti-Fraud WAF F5 Strategy Trojan horse through SSL visibility Single vendor for hybrid DDoS protection Laser focus on GiFW and DC use cases for SP Retain leadership in SSL-VPN and expand into IAM Leverage position as a WAF player to deploy Anti-Fraud Drive market share leveraging hybrid WAF F5 Advantage Undisputed leader in proxy tech., scale Largest DDoS vector spectrum, hybrid, and L7 capabilities Best scale and price performance Consolidated access across applications Clientless approach 99.89% security effectiveness and lowest TCO Market/TAM 500m 12% CAGR 765m 16% CAGR 1b 12% CAGR 5.7b 8% Growth 380m 15% CAGR 580m 19% CAGR Roadmap Enhanced service chaining, risk integration Behavioral, analytics, out of band, reporting, mgmt. Addl. protocols, Volte, new compiler enhancements SSO/Fed protocols, app provisioning, adaptive auth. Improve malware detection, ease of configuration Transparent mode, improved context, risk engine, simplified deployment Cross Product Roadmap Security intelligence Risk Engine Visibility & Analytics BIG-IQ Centralized Management Advancements
55 Purpose-Built Security Products Launch Timing Launch phasing: Phase 1: July Phase 2: Aug Phase 3: Nov SKUs available for GA SSLI/ DDoS/CCFW with and Bourne Soft launch to gain acceptance and credibility Completion of naming and toplevel messaging Announcement at Agility Event Build references; customer acceptance; channel outreach Begin tactical marketing and sales/channel enablement Focus tier 1 marketing efforts on branded hardware Shuttle appliance focus, new user experience, message upcoming Daytona capabilities BIG-IP DNS execution across sales, marketing and channel Full Tier 1 Launch Timing is aligned to the strongest possible product and branding opportunities
56 APM GROWTH Y/Y ASM GROWTH Y/Y AFM GROWTH Y/Y SBS GROWTH Y/Y - 13 % 1 % 13 % 96% Actuals Future à ß Estimated 4% 4% 7% 8% YOY 1 Highlights 2 4% overall growth YoY due to AFM/DoS and EMEA SBS growth Total SFDC deal count was up 10% Y/Y Sec total unit count for HW SKU increased by 15% Y/Y AFM 27% Y/Y, ASM 10%, APM 6% Q116 Q216 Q316 Q416 Lowlights GBB contribution increased as a % of total $ from 51% to 53% YoY Continued mix shift to GBB causes a lowering of security $ Limited product specific campaigns and thought leadership, encourage leading with ADC + GBB APAC down 3% YoY due to APM non-gbb bookings
57 Vision and Roadmap For Application Access F5 securely connects users to applications to increase productivity while providing administrators with full control and visibility Fall 2016 Evolving Our Identity Bridge New cloud app access and auth. use cases (Oauth) Client: increase OS/browser support, less support issues BIG-IQ Centralized Management for central management Introduction of SSL Intercept Phase 2 Simplified Access Management Consolidated dashboard for provisioned applications Integrated login protection to protect against credential stealing Evolve BIG-IQ Centralized Management: policy editing, HA, and reporting Phase 3 Risk-Based Cloud Access Single point of visibility, risk scoring, and control for cloud/on-premises app access Integrate user behavioral analytics (risk engine), service chaining decisions, and the analytics CASB API approach to protecting data and compliance for the use of apps
58 Vision and Roadmap For Application Protection An integrated and intelligent approach to application and data protection Fall 2016 Advancing Current Offerings Improved firewall robustness: NAT, compiler opt, SSH proxy Simplify policy, improve security with web sockets Improving fingerprinting and DDoS efficacy BIG-IQ Centralized Management: scale and configuration support Phase 2 App-Centric Approach App-centric policy management Improved context around user auth., endpoint type, posture, behavior human or a bot Improved visibility and threat event reporting Introduce risk engine to develop a risk score Phase 3 Risk-Based App Security Evolved risk-aware, app-attached policy and workloads Fully evolved dynamic service chaining with large ecosystem of third-party vendors Shared intelligence across customers Matured centralized visibility and analytics
59 Give Feedback Get Points! Add class to your personal schedule. Survey will pop up in Mobile App. Answer the multiple choice. Submit your question to complete. Receive 5 points!
60
The Hillstone and Trend Micro Joint Solution
The Hillstone and Trend Micro Joint Solution Advanced Threat Defense Platform Overview Hillstone and Trend Micro offer a joint solution the Advanced Threat Defense Platform by integrating the industry
More informationThreat-Centric Security for Service Providers
Threat-Centric Security for Service Providers Enabling Open & Programmable Networks Sam Rastogi, Service Provider Security Product Marketing, Security Business Group Bill Mabon, Network Security Product
More informationOn and off premises technologies Which is best for you?
On and off premises technologies Which is best for you? We don t mind what you buy, as long as it is YELLOW! Warren Sealey and Paul-Christian Garpe On Premises or in the cloud? 1 Agenda Why Symantec? Email
More informationF5 (Security) Web Fraud Detection. Keiron Shepherd Security Systems Engineer
F5 (Security) Web Fraud Detection Keiron Shepherd Security Systems Engineer The 21 st century application infrastructure (Trends) Users are going to access applications Mobile/VDI/XaaS/OS Security goes
More informationSecure Cloud Computing
Secure Cloud Computing Agenda Current Security Threat Landscape Over View: Cloud Security Overall Objective of Cloud Security Cloud Security Challenges/Concerns Cloud Security Requirements Strategy for
More informationThank you for joining us today! The presentation will begin shortly. Thank you for your patience.
Thank you for joining us today! The presentation will begin shortly. Thank you for your patience. Copyright 2012-2015. SDNCentral LLC. All Rights Reserved September 11, 2015 Webinar Logistics Enable pop-ups
More informationMulti-Layer Security for Multi-Layer Attacks. Preston Hogue Dir, Cloud and Security Marketing Architectures
Multi-Layer Security for Multi-Layer Attacks Preston Hogue Dir, Cloud and Security Marketing Architectures High-Performance Services Fabric Programmability Data Plane Control Plane Management Plane Virtual
More informationActive Visibility for Multi-Tiered Security. Juergen Kirchmann Director Enterprise Sales EMEA
Active Visibility for Multi-Tiered Security Juergen Kirchmann Director Enterprise Sales EMEA Billions are Spent on Security Annually $18.4B SPENT BY ENTERPRISES WORLD-WIDE ON SECURITY IN 2014 ENTERPRISE
More informationIBM Cloud Security Draft for Discussion September 12, 2011. 2011 IBM Corporation
IBM Cloud Security Draft for Discussion September 12, 2011 IBM Point of View: Cloud can be made secure for business As with most new technology paradigms, security concerns surrounding cloud computing
More informationCloud Access Security Broker. Ted Hendriks HP Atalla Pre-Sales Consultant, APJ Region HP Enterprise Security Products
Cloud Access Security Broker Ted Hendriks HP Atalla Pre-Sales Consultant, APJ Region HP Enterprise Security Products THERE IS A RAPID ADOPTION OF CLOUD APPS INTRODUCING NEW SET OF RISKS We are rapidly
More informationSECURING YOUR MODERN DATA CENTER WITH CHECK POINT
SECURING YOUR MODERN DATA CENTER WITH CHECK POINT Javier Hijas Security Architect Check Point Europe 1 Agenda 1 2 3 4 What Questions is a modern / Answers datacenter Datacenter protection evolution Security
More informationUnderstanding the Security Vendor Landscape Using the Cyber Defense Matrix
SESSION ID: PDIL-W02F Understanding the Security Vendor Landscape Using the Cyber Defense Matrix Sounil Yu sounil@gmail.com @sounilyu Disclaimers The views, opinions, and positions expressed in this presentation
More informationArrow ECS University 2015 Radware Hybrid Cloud WAF Service. 9 Ottobre 2015
Arrow ECS University 2015 Radware Hybrid Cloud WAF Service 9 Ottobre 2015 Get to Know Radware 2 Our Track Record Company Growth Over 10,000 Customers USD Millions 200.00 150.00 32% 144.1 16% 167.0 15%
More informationReplacing Microsoft Forefront Threat Management Gateway with F5 BIG-IP. Dennis de Leest Sr. Systems Engineer Netherlands
Replacing Microsoft Forefront Threat Management Gateway with F5 BIG-IP Dennis de Leest Sr. Systems Engineer Netherlands Microsoft Forefront Threat Management Gateway (TMG) Microsoft Forefront Threat Management
More informationSecuring the Cloud: Making Cloud an Opportunity to Enhance Security
Securing the Cloud: Making Cloud an Opportunity to Enhance Security February 2016 Greg Coughlin Director, IBM Security @JGCoughlin 1 The rise of Shadow IT? 2 Security reality we have all been compromised
More informationDelivering Managed Services Using Next Generation Branch Architectures
Delivering Managed Services Using Next Generation Branch Architectures By: Lee Doyle, Principal Analyst at Doyle Research Sponsored by Versa Networks Executive Summary Network architectures for the WAN
More informationSophos Cloud and Partner Dashboard Jonathan Shaw
Sophos Cloud and Partner Dashboard Jonathan Shaw Product Manager, Sophos Cloud Agenda 1) An introduction to Sophos Cloud 2) Recent updates to Sophos Cloud 3) The new partner dashboard 4) What s coming
More informationThe Cloud App Visibility Blindspot
The Cloud App Visibility Blindspot Understanding the Risks of Sanctioned and Unsanctioned Cloud Apps and How to Take Back Control Introduction Today, enterprise assets are more at risk than ever before
More informationWeb Security Update. A Radicati Group, Inc. Webconference. The Radicati Group, Inc. Copyright March 2010, Reproduction Prohibited
The Radicati Group, Inc. www.radicati.com Web Security Update A Radicati Group, Inc. Webconference The Radicati Group, Inc. Copyright March 2010, Reproduction Prohibited 9:30 am, PT March 25, 2010 Speakers
More informationF5 and Microsoft Exchange Security Solutions
F5 PARTNERSHIP SOLUTION GUIDE F5 and Microsoft Exchange Security Solutions Deploying a service-oriented perimeter for Microsoft Exchange WHAT'S INSIDE Pre-Authentication Mobile Device Security Web Application
More informationRequirements When Considering a Next- Generation Firewall
White Paper Requirements When Considering a Next- Generation Firewall What You Will Learn The checklist provided in this document details six must-have capabilities to look for when evaluating a nextgeneration
More informationSOFTWARE DEFINED NETWORKING
SOFTWARE DEFINED NETWORKING Bringing Networks to the Cloud Brendan Hayes DIRECTOR, SDN MARKETING AGENDA Market trends and Juniper s SDN strategy Network virtualization evolution Juniper s SDN technology
More informationSecurity Information & Event Management (SIEM)
Security Information & Event Management (SIEM) Peter Helms, Senior Sales Engineer, CISA, CISSP September 6, 2012 1 McAfee Security Connected 2 September 6, 2012 Enterprise Security How? CAN? 3 Getting
More informationIBM Endpoint Manager Product Introduction and Overview
IBM Endpoint Manager Product Introduction and Overview David Harsent Technical Specialist Unified Endpoint IBM Endpoint Manager and IBM MobileFirst Protect (MaaS360) Any device. Identify and respond to
More informationOffice 365 Cloud App Security MARKO DJORDJEVIC CLOUD BUSINESS LEAD EE TREND MICRO EMEA LTD.
Office 365 Cloud App Security MARKO DJORDJEVIC CLOUD BUSINESS LEAD EE TREND MICRO EMEA LTD. Your Valuable Data In The Cloud? How To Get The Best Protection! A world safe for exchanging digital information
More informationSimplify IT. With Cisco Application Centric Infrastructure. Roberto Barrera rbarrera@grupo-dice.com. VERSION May, 2015
Simplify IT With Cisco Application Centric Infrastructure Roberto Barrera rbarrera@grupo-dice.com VERSION May, 2015 Content Understanding Software Definded Network (SDN) Why SDN? What is SDN and Its Benefits?
More informationDynamic Security for the Hybrid Cloud
Dynamic Security for the Hybrid Cloud Marc van Zadelhoff, VP Strategy, Marketing and Product Management, IBM Security Nataraj Nagaratnam, Distinguished Engineer and CTO Security Solutions, IBM Security
More informationwww.obrela.com Swordfish
Swordfish Web Application Firewall Web Application Security as a Service Swordfish Web Application Security provides an innovative model to help businesses protect their brand and online information, incorporating
More informationKeith Luck, CISSP, CCSK Security & Compliance Specialist, VMware, Inc. kluck@vmware.com
1 Keith Luck, CISSP, CCSK Security & Compliance Specialist, VMware, Inc. kluck@vmware.com Agenda Cloud Computing VMware and Security Network Security Use Case Securing View Deployments Questions 2 IT consumption
More informationPowering the Internet of Things: SDN/NFV Architectures
Powering the Internet of Things: SDN/NFV Architectures 6B Connected Devices 2013 2013 2016 2018 2020 50B Connected Devices Worldwide by 2020 Implications for Service Providers Scaling the Networks End
More informationMobile Security and Management Opportunities for Telcos and Service Providers
Mobile Security and Management Opportunities for Telcos and Service Providers Lionel Gonzalez Symantec EMEA Solution architect Mike Gibson Protirus Brice Renaud Orange Business Services ST B03 - Mobile
More informationSSL Inspection Step-by-Step Guide. June 6, 2016
SSL Inspection Step-by-Step Guide June 6, 2016 Key Drivers for Inspecting Outbound SSL Traffic Eliminate blind spots of SSL encrypted communication to/from the enterprise Maintaining information s communication
More informationSAFE-T RSACCESS REPLACEMENT FOR MICROSOFT FOREFRONT UNIFIED ACCESS GATEWAY (UAG)
SAFE-T RSACCESS REPLACEMENT FOR MICROSOFT FOREFRONT UNIFIED ACCESS GATEWAY (UAG) A RSACCESS WHITE PAPER 1 Microsoft Forefront Unified Access Gateway Overview 2 Safe-T RSAccess Secure Front-end Overview
More informationThe Open Cloud Near-Term Infrastructure Trends in Cloud Computing
The Open Cloud Near-Term Infrastructure Trends in Cloud Computing Markus Leberecht BELNET Networking Conference 25-Oct-2012 1 Growth & IT Challenges Drive Need for Cloud Computing IT Pros Growth IT Challenges
More informationBEST PRACTICES RESEARCH
2013 Frost & Sullivan 1 We Accelerate Growth Market Leadership Award Vulnerability Management Global, 2013 Frost & Sullivan s Global Research Platform Frost & Sullivan is in its 50th year of business with
More informationYour Security Partner of Choice
Your Security Partner of Choice 6/16/14 2 About WatchGuard 100% CHANNEL 5,000 partners in 120 countries Ø Firewall appliance pioneer Ø Nearing 1,000,000 appliances shipped to business customers worldwide
More informationThe Evolution of Application Monitoring
The Evolution of Application Monitoring Narayan Makaram, CISSP, Director, Solutions Marketing, HP Enterprise Security Business Unit, May 18 th, 2012 Rise of the cyber threat Enterprises and Governments
More informationHoneywell Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Honeywell Process Solutions (HPS) June 4, 2014
Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Process Solutions (HPS) June 4, Industrial Cyber Security Industrial Cyber Security is the leading provider of cyber security
More informationAddressing Advanced Web Threats. Addressing Advanced Web Threats: Protect Your Data and Brand
Addressing Advanced Web Threats: Protect Your Data and Brand What You Will Learn From collaboration to communication to data access, the web is a mission-critical business tool. Enterprises rely on the
More informationVirtual CPE and Software Defined Networking
Virtual CPE and Software Defined Networking Virtual CPE and Software Defined Networking Residential broadband service providers are looking for solutions that allow them to rapidly introduce innovative
More informationF5 Identity and Access Management (IAM) Overview. Laurent PETROQUE Manager Field Systems Engineering, France
F5 Identity and Access Management (IAM) Overview Laurent PETROQUE Manager Field Systems Engineering, France F5 s Security Strategy Protect Apps/Data Wherever They Reside Control Access to Apps/Data from
More informationWHITE PAPER SPLUNK SOFTWARE AS A SIEM
SPLUNK SOFTWARE AS A SIEM Improve your security posture by using Splunk as your SIEM HIGHLIGHTS Splunk software can be used to operate security operations centers (SOC) of any size (large, med, small)
More informationExecutive s Guide to Cloud Access Security Brokers
Executive s Guide to Cloud Access Security Brokers Contents Executive s Guide to Cloud Access Security Brokers Contributor: Amy Newman 2 2 Why You Need a Cloud Access Security Broker 5 You Can t Achieve
More informationBeyond passwords: Protect the mobile enterprise with smarter security solutions
IBM Software Thought Leadership White Paper September 2013 Beyond passwords: Protect the mobile enterprise with smarter security solutions Prevent fraud and improve the user experience with an adaptive
More informationSourceFireNext-Generation IPS
D Ů V Ě Ř U J T E S I L N Ý M SourceFireNext-Generation IPS Petr Salač CCNP Security, CCNP, CICSP, CCSI #33835 petr.salac@alefnula.com Our Customers Biggest Security Challenges Maintaining security posture
More informationDriving Success in 2013: Enabling a Smart Protection Strategy in the age of Consumerization, Cloud and new Cyber Threats. Eva Chen CEO and Co-Founder
Driving Success in 2013: Enabling a Smart Protection Strategy in the age of Consumerization, Cloud and new Cyber Threats Eva Chen CEO and Co-Founder Consistent Vision for 25 Years A world safe for exchanging
More informationFortinet Advanced Threat Protection- Part 3
Fortinet Advanced Threat Protection- Part 3 Upgrading Your Endpoint Security to Meet Advanced Threats Copyright Fortinet Inc. All rights reserved. Agenda Brief Recap on Breaches and the Need for Advanced
More informationOVERVIEW. Enterprise Security Solutions
Enterprise Security Solutions OVERVIEW For more than 25 years, Trend Micro has innovated constantly to keep our customers ahead of an everevolving IT threat landscape. It s how we got to be the world s
More information#ITtrends #ITTRENDS SYMANTEC VISION 2012 1
#ITtrends 1 Strategies for Security and Management in a Mobile and Virtual World Anil Chakravarthy Senior Vice President, Enterprise Security Group 2 MASSIVE INCREASE IN SOPHISTICATED ATTACKS 403 million
More informationBlending Embedded Hardware OTP, SSO, and Out of Band Auth for Secure Cloud Access
Blending Embedded Hardware OTP, SSO, and Out of Band Auth for Secure Cloud Access Vikas Jain Director, Product Management Intel Corporation Jesper Tohmo CTO, Nordic Edge (an Intel company) Session ID:
More informationMove over, TMG! Replacing TMG with Sophos UTM
Move over, TMG! Replacing TMG with Sophos UTM Christoph Litzbach, Pre-Sales Engineer NSG 39 Key Features of TMG HTTP Antivirus/spyware URL Filtering HTTPS forward inspection Web Caching Role based access
More informationCisco Advanced Malware Protection. Ross Shehov Security Virtual Systems Engineer March 2016
Cisco Advanced Malware Protection Ross Shehov Security Virtual Systems Engineer March 2016 The Reality Organizations Are Under Attack and Malware Is Getting in 95% of large companies targeted by malicious
More informationSikkerhet Network Protector SDN app Geir Åge Leirvik HP Networking
Sikkerhet Network Protector SDN app Geir Åge Leirvik HP Networking Agenda BYOD challenges A solution for BYOD Network Protector SDN matched with industry leading service How it works In summary BYOD challenges
More informationBusiness Case for a DDoS Consolidated Solution
Business Case for a DDoS Consolidated Solution Executive Summary Distributed denial-of-service (DDoS) attacks are becoming more serious and sophisticated. Attack motivations are increasingly financial
More informationUnified Threat Management, Managed Security, and the Cloud Services Model
Unified Threat Management, Managed Security, and the Cloud Services Model Kurtis E. Minder CISSP Global Account Manager - Service Provider Group Fortinet, Inc. Introduction Kurtis E. Minder, Technical
More informationISB13 Web security deployment options - which is really best for you? Duncan Mills, Piero DePaoli, Stuart Jones
ISB13 Web security deployment options - which is really best for you? Duncan Mills, Piero DePaoli, Stuart Jones Web Security Deployment Options 1 1 The threat landscape 2 Why Symantec web security 3 Generic
More informationTop 10 Reasons Enterprises are Moving Security to the Cloud
ZSCALER EBOOK Top 10 Reasons Enterprises are Moving Security to the Cloud A better approach to security Albert Einstein defined insanity as doing the same thing over and over again and expecting different
More informationSecuring the mobile enterprise with IBM Security solutions
Securing the mobile enterprise with IBM Security solutions Gain visibility and control with proven security for mobile initiatives in the enterprise Highlights Address the full spectrum of mobile risks
More informationWAN security threat landscape and best mitigation practices. Rex Stover Vice President, Americas, Enterprise & ICP Sales
WAN security threat landscape and best mitigation practices. Rex Stover Vice President, Americas, Enterprise & ICP Sales The Cost of Cybercrime Sony $171m PlayStation 3 data breach (April 2011) $3 trillion
More informationCisco Cloud Web Security
Data Sheet Today s highly connected and fast-moving world is filled with complex and sophisticated web security threats. Cisco delivers the strong protection, complete control, and investment value that
More informationCloud App Security. Tiberio Molino Sales Engineer
Cloud App Security Tiberio Molino Sales Engineer 2 Customer Challenges 3 Many Attacks Include Phishing Emails External Phishing attacks: May target specific individuals or companies Customer malware or
More informationPresented by Philippe Bogaerts Senior Field Systems Engineer p.bogaerts@f5.com. Securing application delivery in the cloud
Presented by Philippe Bogaerts Senior Field Systems Engineer p.bogaerts@f5.com Securing application delivery in the cloud 2 The Leader in Application Delivery Networking Users Data Center At Home In the
More informationLeading The World Into Connected Security. Dipl.-Inform., CISSP, S+ Rolf Haas Enterprise Technology Specialist Content Lead EMEA
Leading The World Into Connected Security Dipl.-Inform., CISSP, S+ Rolf Haas Enterprise Technology Specialist Content Lead EMEA History of Defining Largest Dedicated Delivering a Next Generation Architecture
More informationExperience the commitment WHITE PAPER. Information Security Continuous Monitoring. Charting the Right Course. cgi.com 2014 CGI GROUP INC.
Experience the commitment WHITE PAPER Information Security Continuous Monitoring Charting the Right Course May 2014 cgi.com 2014 CGI GROUP INC. During the last few months of 2013, six federal agencies
More informationMucho Big Data y La Seguridad para cuándo?
Mucho Big Data y La Seguridad para cuándo? Juan Carlos Vázquez Sales Systems Engineer, LTAM mayo 9, 2013 Agenda Business Drivers Big Security Data GTI Integration SIEM Architecture & Offering Why McAfee
More informationNext-Generation Firewalls: Critical to SMB Network Security
Next-Generation Firewalls: Critical to SMB Network Security Next-Generation Firewalls provide dramatic improvements in protection versus traditional firewalls, particularly in dealing with today s more
More informationEnabling Business Beyond the Corporate Network. Secure solutions for mobility, cloud and social media
Enabling Business Beyond the Corporate Network Secure solutions for mobility, cloud and social media 3 Trends Transforming Networks and Security Are you dealing with these challenges? Enterprise networks
More informationCustomer Benefits Through Automation with SDN and NFV
Customer Benefits Through Automation with SDN and NFV Helping service providers solve specific challenges they are facing today while improving the overall customer service life cycle 1 Table of Contents
More informationCloud email Security solutions
Cloud email Security solutions THE MARKET OPPORTUNITY KEY MESSAGES The security market is a very dynamic and evolving market - Threats are rapidly increasing in sophistication and severity - New technologies,
More informationvsrx Services Gateway: Protecting the Hybrid Data Center
Services Gateway: Protecting the Hybrid Data Center Extending Juniper Networks award-winning security products to virtualized, cloud-based, and hybrid IT environments Challenge Virtualization and cloud
More informationSecurity Considerations for DirectAccess Deployments. Whitepaper
Security Considerations for DirectAccess Deployments Whitepaper February 2015 This white paper discusses security planning for DirectAccess deployment. Introduction DirectAccess represents a paradigm shift
More informationAddressing Security for Hybrid Cloud
Addressing Security for Hybrid Cloud Sreekanth Iyer Executive IT Architect IBM Cloud (CTO Office) Email : sreek.iyer@in.ibm.com Twitter: @sreek Blog: http://ibm.co/sreek July 18, 2015 Cloud is rapidly
More information2012 North American Enterprise Firewalls Market Penetration Leadership Award
2012 2012 North American Enterprise Firewalls Market Penetration Leadership Award 2012 Frost & Sullivan 1 We Accelerate Growth Market Penetration Leadership Award Enterprise Firewalls North America, 2012
More informationVirtualized Security: The Next Generation of Consolidation
Virtualization. Consolidation. Simplification. Choice. WHITE PAPER Virtualized Security: The Next Generation of Consolidation Virtualized Security: The Next Generation of Consolidation As we approach the
More informationEnterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006
Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006 April 2013 Hologic and the Hologic Logo are trademarks or registered trademarks of Hologic, Inc. Microsoft, Active Directory,
More informationSecurity and Compliance challenges in Mobile environment
Security and Compliance challenges in Mobile environment Emerging Technologies November 19, 2013 Bob Bastani Introductions Bob Bastani, Security & Compliance Program Manager, IBM, 301-803-6078, bbastani@us.ibm.com
More informationCOORDINATED THREAT CONTROL
APPLICATION NOTE COORDINATED THREAT CONTROL Interoperability of Juniper Networks IDP Series Intrusion Detection and Prevention Appliances and SA Series SSL VPN Appliances Copyright 2010, Juniper Networks,
More informationSecurity of Cloud Computing for the Power Grid
ANNUAL INDUSTRY WORKSHOP NOVEMBER 12-13, 2014 Security of Cloud Computing for the Power Grid Industry Panel November 12, 2014 UNIVERSITY OF ILLINOIS DARTMOUTH COLLEGE UC DAVIS WASHINGTON STATE UNIVERSITY
More informationCopyright 2013 WatchGuard Technologies, Inc. All rights reserved. Introducción a Watchguard DLP Data Loss Prevention
Copyright 2013 WatchGuard Technologies, Inc. All rights reserved. Introducción a Watchguard DLP Data Loss Prevention About WatchGuard > Taken private in 2006; enabled strategic shift > Firewall appliance
More informationEffective Methods to Detect Current Security Threats
terreactive AG. Swiss Cyber Storm 2015. Effective Methods to Detect Current Security Threats Taking your IT security to the next level, you have to consider a paradigm shift. In the past companies mostly
More informationSafeguarding the cloud with IBM Dynamic Cloud Security
Safeguarding the cloud with IBM Dynamic Cloud Security Maintain visibility and control with proven security solutions for public, private and hybrid clouds Highlights Extend enterprise-class security from
More informationSecure Cloud-Ready Data Centers Juniper Networks
Secure Cloud-Ready Data Centers Juniper Networks JUNIPER SECURITY LEADERSHIP A $1B BUSINESS Market Leadership Data Center with High- End Firewall #1 at 42% Secure Mobility with SSL VPN #1 at 25% Security
More informationRisk and threats everywhere, all the time
Risk and threats everywhere, all the time Hackers Cloud Remote Offices/ Workers Authentication & Encryption Mobile Devices Virtualization Malicious & Well-meaning Users Cyber Threats Social Media Compliance
More informationNETWORK ACCESS CONTROL AND CLOUD SECURITY. Tran Song Dat Phuc SeoulTech 2015
NETWORK ACCESS CONTROL AND CLOUD SECURITY Tran Song Dat Phuc SeoulTech 2015 Table of Contents Network Access Control (NAC) Network Access Enforcement Methods Extensible Authentication Protocol IEEE 802.1X
More informationEffective Methods to Detect Current Security Threats
terreactive AG. Swiss Cyber Storm 2015. Effective Methods to Detect Current Security Threats Enrico Petrov Director Managed Security Services terreactive October 21 st, 2015 terreactive Background. About
More informationRashmi Knowles Chief Security Architect EMEA
Rashmi Knowles Chief Security Architect EMEA AGENDA Transformation of IT New cyber-security challenges Intelligence Driven Security Security Analytics Q&A 2 ENTERPRISE DATA CENTER ADVANCED SECURITY A UNIQUE
More informationCheck Point Positions
Check Point Positions - Gartner Magic Quadrants - IDC Market Share Research 2012 Dean J. Whitehair Analyst Relations October 2012 Version 9.0 Updated 10/17/2012 2012 Check Point Software Technologies Ltd.
More informationSecure Your Mobile Workplace
Secure Your Mobile Workplace Sunny Leung Senior System Engineer Symantec 3th Dec, 2013 1 Agenda 1. The Threats 2. The Protection 3. Q&A 2 The Mobile Workplaces The Threats 4 Targeted Attacks up 42% in
More informationINCREASINGLY, ORGANIZATIONS ARE ASKING WHAT CAN T GO TO THE CLOUD, RATHER THAN WHAT CAN. Albin Penič Technical Team Leader Eastern Europe
INCREASINGLY, ORGANIZATIONS ARE ASKING WHAT CAN T GO TO THE CLOUD, RATHER THAN WHAT CAN Albin Penič Technical Team Leader Eastern Europe Trend Micro 27 years focused on security software Headquartered
More informationCloud and Critical Infrastructures how Cloud services are factored in from a risk perspective
Cloud and Critical Infrastructures how Cloud services are factored in from a risk perspective Reaching the Cloud era in the EU Riga 16 June 2015 Jonathan Sage Government and Regulatory Affairs Cyber Security
More informationDiscover how and why file transfer is changing
Discover how and why file transfer is changing Why you should think of it as more than FTP 1 2013 IBM Corporation Agenda What is Smarter Commerce? What is the role of B2B integration? What is MFT? Problems
More informationRSA Identity and Access Management 2014
RSA Identity and Access Management 2014 1 Agenda Today s Enterprises and IAM Customer Challenges IAM Requirements RSA IAM Our Competitive Advantage Leading The Pack RSA Views on Identity Management and
More informationSourcefire Solutions Overview Security for the Real World. SEE everything in your environment. LEARN by applying security intelligence to data
SEE everything in your environment LEARN by applying security intelligence to data ADAPT defenses automatically ACT in real-time Sourcefire Solutions Overview Security for the Real World Change is constant.
More informationMike Smart Cyber Strategist & Enterprise Security Solutions, EMEA. Cyber: The Catalyst to Transform the Security Program
Cyber: The Catalyst to Transform the Security Program Mike Smart Cyber Strategist & Enterprise Security Solutions, EMEA A Common Language? Hyper Connected World Rapid IT Evolution Agile Targeted Threat
More informationSANS Top 20 Critical Controls for Effective Cyber Defense
WHITEPAPER SANS Top 20 Critical Controls for Cyber Defense SANS Top 20 Critical Controls for Effective Cyber Defense JANUARY 2014 SANS Top 20 Critical Controls for Effective Cyber Defense Summary In a
More informationSHARE THIS WHITEPAPER. Top Selection Criteria for an Anti-DDoS Solution Whitepaper
SHARE THIS WHITEPAPER Top Selection Criteria for an Anti-DDoS Solution Whitepaper Table of Contents Top Selection Criteria for an Anti-DDoS Solution...3 DDoS Attack Coverage...3 Mitigation Technology...4
More informationNext Generation Enterprise Network Security Platform
Next Generation Enterprise Network Security Platform November 2014 Lyndon Clough - Territory Sales Manager Derran Guinan Systems Engineer Agenda The Palo Alto Networks story Today s Threat Landscape The
More informationBraindumps.700-295.50.QA
Braindumps.700-295.50.QA Number: 700-295 Passing Score: 800 Time Limit: 120 min File Version: 6.0 http://www.gratisexam.com/ Comprehensive, easy and to the point study material made it possible for me
More informationSecuring the Cloud infrastructure with IBM Dynamic Cloud Security
Securing the Cloud infrastructure with IBM Dynamic Cloud Security Ngo Duy Hiep Security Brand Manager Cell phone: +84 912216753 Email: hiepnd@vn.ibm.com 12015 IBM Corporation Cloud is rapidly transforming
More informationRadware ADC-VX Solution. The Agility of Virtual; The Predictability of Physical
Radware ADC-VX Solution The Agility of Virtual; The Predictability of Physical Table of Contents General... 3 Virtualization and consolidation trends in the data centers... 3 How virtualization and consolidation
More information