F5 Security and Strategic Direction. Jon Kuhn Security Product Management Team

Size: px
Start display at page:

Download "F5 Security and Strategic Direction. Jon Kuhn Security Product Management Team"

Transcription

1

2 F5 Security and Strategic Direction Jon Kuhn Security Product Management Team

3 Applications Drive Innovation and Massive Growth in Data 3

4 Applications Drive Innovation and Massive Growth in Data THE NEW NORMAL 3.2B people can access apps via internet 16B IP devices to 24B in 2019 Smart Phone Tablet Smart Device 3

5 Applications Drive Innovation and Massive Growth in Data THE NEW NORMAL APPLICATIONS KNOW NO BOUNDARY 3.2B people can access apps via internet 16B IP devices to 24B in 2019 Smart Phone Tablet Smart Device Data center applications Internet applications 3

6 Applications Drive Innovation and Massive Growth in Data THE NEW NORMAL APPLICATIONS KNOW NO BOUNDARY 3.2B people can access apps via internet 16B IP devices to 24B in 2019 Smart Phone Tablet Smart Device Data center applications Internet applications EVOLUTION OF APPLICATIONS 1B hybrid cloud applications in

7 Applications Drive Innovation and Massive Growth in Data THE NEW NORMAL APPLICATIONS KNOW NO BOUNDARY 3.2B people can access apps via internet 16B IP devices to 24B in 2019 Smart Phone Tablet Smart Device Data center applications Internet applications EVOLUTION OF APPLICATIONS 1B hybrid cloud applications in ZB data consumption in the world DATA IS EVERYWHERE 3

8 Resulting in an Unprecedented Increase in Attacks 4

9 Resulting in an Unprecedented Increase in Attacks 12% OTHER 16% HUMAN ELEMENT 44% VULNERABLE APPS 1.2B COMPROMISED RECORDS SINCE M PERSONAL PROFILES STOLEN $270M CREDIT CARD FRAUD IN % COMPROMISED IDENTITIES $15M AVERAGE COST OF AN ATTACK 46 AVERAGE DAYS TO RESOLVE AN ATTACK Source: Based on aggregated data from IT Business Edge, Krebs on Security, Security Week, and CSO Online 4

10 Security Investments Are Completely Misaligned with Reality Perimeter Security 5

11 Security Investments Are Completely Misaligned with Reality Perimeter Security 25% 90% OF ATTACKS ARE FOCUSED HERE OF SECURITY INVESTMENT 5

12 Security Investments Are Completely Misaligned with Reality Perimeter Security Identity & Application Security 25% 90% 72% 10% OF ATTACKS ARE FOCUSED HERE OF SECURITY INVESTMENT OF ATTACKS ARE FOCUSED HERE OF SECURITY INVESTMENT Source: Gartner 5

13 Traditionally, Data Was Secure Inside the Perimeter PERIMETER SECURITY AUTHORIZED USER MANAGED DEVICES APPS DATA AUTHORIZED USERS UNKNOWN USERS MALICIOUS USERS DLP Firewall IPS 6

14 The Perimeter Has Dissolved PERIMETER SECURITY and Zero Trust Must Reign 7

15 The Perimeter Has Dissolved Private Public ZERO TRUST SaaS and Zero Trust Must Reign 7

16 Cloud Apps and Mobility Have Changed the Game Public Private SaaS 8

17 Cloud Apps and Mobility Have Changed the Game Public Private SaaS 3.2 billion unknown users 7.4 billion unsecured devices 1 billion applications 44 ZB of data by

18 Today s Requirement Protect Identities, Apps, and Data Public Private SaaS 9

19 Today s Requirement Protect Identities, Apps, and Data Public Private SaaS 9

20 F5 s Access, Identity, and App Protection Solutions F5 IDENTITY AND ACCESS MANAGEMENT F5 APPLICATION PROTECTION Public Private SaaS PROTECT ACCESS AND IDENTITY Enable secure access for any user on any device PROTECT APPLICATIONS Safeguard your apps, regardless of where they live 10

21 F5 s Access, Identity, and App Protection Solutions F5 IDENTITY AND ACCESS MANAGEMENT F5 APPLICATION PROTECTION Public Private SaaS Remote Access Identity Federation Enterprise Mobility Gateway App Access Management Secure Web Gateway WAF DDoS Protection Web Fraud Protection Carrier-Class Firewall IP Intelligence DNS Security SSL Inspection and Interception 11

22 F5 s Access, Identity, and App Protection Solutions F5 IDENTITY AND ACCESS MANAGEMENT F5 APPLICATION PROTECTION Public Private SaaS Remote Access Identity Federation Enterprise Mobility Gateway App Access Management Secure Web Gateway WAF DDoS Protection Web Fraud Protection Carrier-Class Firewall IP Intelligence DNS Security SSL Inspection and Interception BIG-IP Virtual Edition(s) Purpose-Built Hardware F5 Silverline 12

23 13

24 FY16 Security Roadmap SSL Intercept DDoS Protection Carrier Class FW Identity and Access Anti-Fraud WAF Competitors F5 Strategy Trojan horse through SSL visibility Single vendor for hybrid DDoS protection Laser focus on GiFW and DC use cases for SP Retain leadership in SSL-VPN and expand into IAM Leverage position as a WAF player to deploy Anti-Fraud Drive market share leveraging hybrid WAF F5 Advantage Undisputed leader in proxy tech., scale Largest DDoS vector spectrum, hybrid, and L7 capabilities Best scale and price performance Consolidated access across applications Clientless approach 99.89% security effectiveness and lowest TCO Market/TAM 500M 12% CAGR 765M 16% CAGR 1B 12% CAGR 5.7B 8% Growth 380M 15% CAGR 580M 19% CAGR Roadmap Enhanced service chaining, risk integration Behavioral, analytics, out of band, reporting, management Addl. protocols, Volte, new compiler enhancements SSO/Fed protocols, app provisioning, adaptive auth. Improve malware detection, ease of configuration Transparent mode, improved context, risk engine, simplified deployment Cross-Product Roadmap Security Intelligence Risk Engine Visibility and Analytics BIG-IQ Centralized Management Advancements 14

25 FY16 Security Roadmap SSL Intercept DDoS Protection Carrier Class FW Identity and Access Anti-Fraud WAF Competitors F5 Strategy Trojan horse through SSL visibility Single vendor for hybrid DDoS protection Laser focus on GiFW and DC use cases for SP Retain leadership in SSL-VPN and expand into IAM Leverage position as a WAF player to deploy Anti-Fraud Drive market share leveraging hybrid WAF F5 Advantage Undisputed leader in proxy tech., scale Largest DDoS vector spectrum, hybrid, and L7 capabilities Best scale and price performance Consolidated access across applications Clientless approach 99.89% security effectiveness and lowest TCO Market/TAM 500M 12% CAGR 765M 16% CAGR 1B 12% CAGR 5.7B 8% Growth 380M 15% CAGR 580M 19% CAGR Roadmap Enhanced service chaining, risk integration Behavioral, analytics, out of band, reporting, management Addl. protocols, Volte, new compiler enhancements SSO/Fed protocols, app provisioning, adaptive auth. Improve malware detection, ease of configuration Transparent mode, improved context, risk engine, simplified deployment Cross-Product Roadmap Security Intelligence Risk Engine Visibility and Analytics BIG-IQ Centralized Management Advancements 15

26 FY16 Security Roadmap SSL Intercept DDoS Protection Carrier Class FW Identity and Access Anti-Fraud WAF Competitors F5 Strategy Trojan horse through SSL visibility Single vendor for hybrid DDoS protection Laser focus on GiFW and DC use cases for SP F5 in top 3 recommended vendors by NSS Retain leadership in SSL-VPN and expand into IAM Leverage position as a WAF player to deploy Anti-Fraud Drive market share leveraging hybrid WAF F5 Advantage Undisputed leader in proxy tech., scale Largest DDoS vector spectrum, hybrid, and L7 capabilities Best scale and price performance Consolidated access across applications Clientless approach 99.89% security effectiveness and lowest TCO Market/TAM 500M 12% CAGR 765M 16% CAGR 1B 12% CAGR 5.7B 8% Growth 380M 15% CAGR 580M 19% CAGR Roadmap Enhanced service chaining, risk integration Behavioral, analytics, out of band, reporting, management Addl. protocols, Volte, new compiler enhancements SSO/Fed protocols, app provisioning, adaptive auth. Improve malware detection, ease of configuration Transparent mode, improved context, risk engine, simplified deployment Cross-Product Roadmap Security Intelligence Risk Engine Visibility and Analytics BIG-IQ Centralized Management Advancements 15

27 FY16 Security Roadmap SSL Intercept DDoS Protection Carrier-Class FW Identity and Access Anti-Fraud WAF Competitors F5 Strategy Trojan horse through SSL visibility Single vendor for hybrid DDoS protection Laser focus on GiFW and DC use cases for SP Retain leadership in SSL-VPN and expand into IAM Leverage position as a WAF player to deploy Anti-Fraud Drive market share leveraging hybrid WAF F5 Advantage Undisputed leader in proxy tech., scale Largest DDoS vector spectrum, hybrid, and L7 capabilities Best scale and price performance Consolidated access across applications Clientless approach 99.89% security effectiveness and lowest TCO Market/TAM 500M 12% CAGR 765M 16% CAGR 1B 12% CAGR 5.7B 8% Growth 380M 15% CAGR 580M 19% CAGR Roadmap Enhanced service chaining, risk integration Behavioral, analytics, out of band, reporting, management Addl. protocols, Volte, new compiler enhancements SSO/Fed protocols, app provisioning, adaptive auth. Improve malware detection, ease of configuration Transparent mode, improved context, risk engine, simplified deployment Cross-Product Roadmap Security Intelligence Risk Engine Visibility and Analytics BIG-IQ Centralized Management Advancements 16

28 FY16 Security Roadmap SSL Intercept DDoS Protection Carrier Class FW Identity and Access Anti-Fraud WAF Competitors F5 Strategy Trojan horse through SSL visibility Single vendor for hybrid DDoS protection Laser focus on GiFW and DC use cases for SP Retain leadership in SSL-VPN and expand into IAM Leverage position as a WAF player to deploy Anti-Fraud Drive market share leveraging hybrid WAF F5 Advantage Undisputed leader in proxy tech., scale Largest DDoS vector spectrum, hybrid, and L7 capabilities Best scale and price performance Consolidated access across applications Clientless approach 99.89% security effectiveness and lowest TCO Market/TAM 500M 12% CAGR 765M 16% CAGR 1B 12% CAGR 5.7B 8% Growth 380M 15% CAGR 580M 19% CAGR Roadmap Enhanced service chaining, risk integration Behavioral, analytics, out of band, reporting, management Addl. protocols, Volte, new compiler enhancements SSO/Fed protocols, endpt. checks, adaptive auth. Improve malware detection, ease of configuration Transparent mode, improved context, risk engine, simplified deployment Cross-Product Roadmap Security Intelligence Risk Engine Visibility and Analytics BIG-IQ Centralized Management Advancements 17

29 FY16 Security Roadmap SSL Intercept DDoS Protection Carrier Class FW Identity and Access Anti-Fraud WAF Competitors F5 Strategy Trojan horse through SSL visibility Single vendor for hybrid DDoS protection Laser focus on GiFW and DC use cases for SP Retain leadership in SSL-VPN and expand into IAM Leverage position as a WAF player to deploy Anti-Fraud Drive market share leveraging hybrid WAF F5 Advantage Undisputed leader in proxy tech., scale Largest DDoS vector spectrum, hybrid, and L7 capabilities Best scale and price performance Consolidated access across applications Clientless approach 99.89% security effectiveness and lowest TCO Market/TAM 500M 12% CAGR 765M 16% CAGR 1B 12% CAGR 5.7B 8% Growth 380M 15% CAGR 580M 19% CAGR Roadmap Enhanced service chaining, risk integration Behavioral, analytics, out of band, reporting, management Addl. protocols, Volte, new compiler enhancements SSO/Fed protocols, app provisioning, adaptive auth. Improve malware detection, ease of configuration Transparent mode, improved context, risk engine, simplified deployment Cross-Product Roadmap Security Intelligence Risk Engine Visibility and Analytics BIG-IQ Centralized Management Advancements 18

30 FY16 Security Roadmap SSL Intercept DDoS Protection Carrier Class FW Identity and Access Anti-Fraud WAF Competitors F5 Strategy Trojan horse through SSL visibility Single vendor for hybrid DDoS protection Laser focus on GiFW and DC use cases for SP Retain leadership in SSL-VPN and expand into IAM Leverage position as a WAF player to deploy Anti-Fraud Drive market share leveraging hybrid WAF F5 Advantage Undisputed leader in proxy tech., scale Largest DDoS vector spectrum, hybrid, and L7 capabilities Best scale and price performance Consolidated access across applications Clientless approach 99.89% security effectiveness and lowest TCO Market/TAM 500M 12% CAGR 765M 16% CAGR 1B 12% CAGR 5.7B 8% Growth 380M 15% CAGR 580M 19% CAGR Roadmap Enhanced service chaining, risk integration Behavioral, analytics, out of band, reporting, management Addl. protocols, Volte, new compiler enhancements SSO/Fed protocols, app provisioning, adaptive auth. Improve malware detection, ease of configuration Transparent mode, improved context, risk engine, simplified deployment Cross-Product Roadmap Security Intelligence Risk Engine Visibility and Analytics BIG-IQ Centralized Management Advancements 19

31 FY16 Security Roadmap SSL Intercept DDoS Protection Carrier-Class FW Identity and Access Anti-Fraud WAF Competitors F5 Strategy Trojan horse through SSL visibility Single vendor for hybrid DDoS protection Laser focus on GiFW and DC use cases for SP Retain leadership in SSL-VPN and expand into IAM Leverage position as a WAF player to deploy Anti-Fraud Drive market share leveraging hybrid WAF F5 Advantage Undisputed leader in proxy tech., scale Largest DDoS vector spectrum, hybrid, and L7 capabilities Best scale and price performance Consolidated access across applications Clientless approach 99.89% security effectiveness and lowest TCO Market/TAM 500M 12% CAGR 765M 16% CAGR 1B 12% CAGR 5.7B 8% Growth 380M 15% CAGR 580M 19% CAGR Roadmap Enhanced service chaining, risk integration Behavioral, analytics, out of band, reporting, management Addl. protocols, Volte, new compiler enhancements SSO/Fed protocols, app provisioning, adaptive auth. Improve malware detection, ease of configuration Transparent mode, improved context, risk engine, simplified deployment Cross-Product Roadmap Risk Engine Visibility and Analytics BIG-IQ Centralized Management Advancements 20

32 Vision and Roadmap for Application Access 21

33 Vision and Roadmap for Application Access FALL 2016 Evolving Our Identity Bridge New cloud app access and auth. use cases (Oauth) Client: increase OS/browser support, less support issues BIG-IQ Centralized Management for central management Introduction of SSL Intercept PHASE 2 Simplified Access Management Consolidated dashboard for provisioned applications Integrated login protection to protect against credential stealing Evolve BIG-IQ Centralized Management: policy editing, HA, and reporting PHASE 3 Risk-Based Cloud Access Single point of visibility, risk scoring, and control for cloud/ on-premises app access Integrate user behavioral analytics (risk engine), service chaining decisions, and the analytics CASB API approach to protecting data and compliance for the use of apps 21

34 Vision and Roadmap for Application Protection FALL 2016 Advancing Current Offerings Improved firewall robustness: NAT, compiler opt, SSH proxy Simplify policy, improve security with web sockets Improving fingerprinting and DDoS efficacy BIG-IQ Centralized Management: scale and configuration support PHASE 2 App-Centric Approach App-centric policy management Improved context around user authentication, endpoint type, posture, behavior human or a bot Improved visibility and threat event reporting Introduce risk engine to develop a risk score PHASE 3 Risk-Based App Security Evolved risk-aware, app-attached policy and workloads Fully evolved dynamic service chaining with large ecosystem of third-party vendors Shared intelligence across customers Matured centralized visibility and analytics 22

35 Vision and Roadmap for Application Protection FALL 2016 Advancing Current Offerings Improved firewall robustness: NAT, compiler opt, SSH proxy Simplify policy, improve security with web sockets Improving fingerprinting and DDoS efficacy BIG-IQ Centralized Management: scale and configuration support PHASE 2 App-Centric Approach App-centric policy management Improved context around user authentication, endpoint type, posture, behavior human or a bot Improved visibility and threat event reporting Introduce risk engine to develop a risk score PHASE 3 Risk-Based App Security Evolved risk-aware, app-attached policy and workloads Fully evolved dynamic service chaining with large ecosystem of third-party vendors Shared intelligence across customers Matured centralized visibility and analytics 22

36 Purpose-Built Initiative

37 Purpose-Built: Company-Wide Focus on the Security Buyer CHIEF INFORMATION SECURITY OFFICER (CISO) SECURITY ARCHITECT SECURITY ENGINEER 24

38 Purpose-Built: Company-Wide Focus on the Security Buyer PURPOSE-BUILT SECURITY PRODUCTS CHIEF INFORMATION SECURITY OFFICER (CISO) PURPOSE-BUILT MARKETING PURPOSE-BUILT PARTNERSHIPS SECURITY ARCHITECT SECURITY ENGINEER PURPOSE-BUILT SELLING F5 LABS SECURITY RESEARCH 24

39 Purpose-Built Guidelines 25

40 Purpose-Built Guidelines Market Opportunity Meaningful market opportunity Long-term investment for success New Hardware Leveraging state-of-the-art new hardware New look and feel User Experience Simplified setup and configuration Align UI with security buyers 25

41 Purpose-Built Products SSL Intercept All-in-one appliance solution designed to provide increased visibility into encrypted traffic Hybrid DDoS Comprehensive DDoS protection, tightly-integrated on-premises and cloud Carrier-Class FW Network firewall across SP-specific Gi and DC FW use cases 26

42 Purpose-Built Products SSL Intercept All-in-one appliance solution designed to provide increased visibility into encrypted traffic Hybrid DDoS Comprehensive DDoS protection, tightly-integrated on-premises and cloud Carrier-Class FW Network firewall across SP-specific Gi and DC FW use cases 26

43 Let's Go Deeper Into Our Products and Roadmap F5 IDENTITY AND ACCESS MANAGEMENT F5 APPLICATION PROTECTION Public Private SaaS PROTECT ACCESS AND IDENTITY Enable secure access for any user on any device PROTECT APPLICATIONS Safeguard your apps, regardless of where they live 27

44 Let's Go Deeper Into Our Products and Roadmap F5 IDENTITY AND ACCESS MANAGEMENT F5 APPLICATION PROTECTION Public Private SaaS PROTECT ACCESS AND IDENTITY Enable secure access for any user on any device PROTECT APPLICATIONS Safeguard your apps, regardless of where they live 27

45 F5 SSL Orchestrator 28

46 F5 SSL Orchestrator Text Here Text Here Text Here Text Here 28

47 Let's Go Deeper Into Our Products and Roadmap F5 IDENTITY AND ACCESS MANAGEMENT F5 APPLICATION PROTECTION Public Private SaaS PROTECT ACCESS AND IDENTITY Enable secure access for any user on any device PROTECT APPLICATIONS Safeguard your apps, regardless of where they live 29

48 Let's Go Deeper Into Our Products and Roadmap F5 IDENTITY AND ACCESS MANAGEMENT F5 APPLICATION PROTECTION Public Private SaaS PROTECT ACCESS AND IDENTITY Enable secure access for any user on any device PROTECT APPLICATIONS Safeguard your apps, regardless of where they live 29

49 F5 DDoS Hybrid Defender 30

50 F5 DDoS Hybrid Defender Text Here Text Here Text Here Text Here 30

51

52 Additional Slides

53 FY16 Security Roadmap MASTER Competitors SSL Intercept A10 DDoS Protection radware Carrier Class FW Identity & Access Anti-Fraud WAF F5 Strategy Trojan horse through SSL visibility Single vendor for hybrid DDoS protection Laser focus on GiFW and DC use cases for SP Retain leadership in SSL-VPN and expand into IAM Leverage position as a WAF player to deploy Anti-Fraud Drive market share leveraging hybrid WAF F5 Advantage Undisputed leader in proxy tech., scale Largest DDoS vector spectrum, hybrid, and L7 capabilities Best scale and price performance Consolidated access across applications Clientless approach 99.89% security effectiveness and lowest TCO Market/TAM 500m 12% CAGR 765m 16% CAGR 1b 12% CAGR 5.7b 8% Growth 380m 15% CAGR 580m 19% CAGR Roadmap Enhanced service chaining, risk integration Behavioral, analytics, out of band, reporting, mgmt. Addl. protocols, Volte, new compiler enhancements SSO/Fed protocols, app provisioning, adaptive auth. Improve malware detection, ease of configuration Transparent mode, improved context, risk engine, simplified deployment Cross Product Roadmap Security intelligence Risk Engine Visibility & Analytics BIG-IQ Centralized Management Advancements

54 FY16 Security Roadmap MASTER Competitors SSL Intercept A10 DDoS Protection radware Carrier-Class FW Identity & Access Anti-Fraud WAF F5 Strategy Trojan horse through SSL visibility Single vendor for hybrid DDoS protection Laser focus on GiFW and DC use cases for SP Retain leadership in SSL-VPN and expand into IAM Leverage position as a WAF player to deploy Anti-Fraud Drive market share leveraging hybrid WAF F5 Advantage Undisputed leader in proxy tech., scale Largest DDoS vector spectrum, hybrid, and L7 capabilities Best scale and price performance Consolidated access across applications Clientless approach 99.89% security effectiveness and lowest TCO Market/TAM 500m 12% CAGR 765m 16% CAGR 1b 12% CAGR 5.7b 8% Growth 380m 15% CAGR 580m 19% CAGR Roadmap Enhanced service chaining, risk integration Behavioral, analytics, out of band, reporting, mgmt. Addl. protocols, Volte, new compiler enhancements SSO/Fed protocols, app provisioning, adaptive auth. Improve malware detection, ease of configuration Transparent mode, improved context, risk engine, simplified deployment Cross Product Roadmap Security intelligence Risk Engine Visibility & Analytics BIG-IQ Centralized Management Advancements

55 Purpose-Built Security Products Launch Timing Launch phasing: Phase 1: July Phase 2: Aug Phase 3: Nov SKUs available for GA SSLI/ DDoS/CCFW with and Bourne Soft launch to gain acceptance and credibility Completion of naming and toplevel messaging Announcement at Agility Event Build references; customer acceptance; channel outreach Begin tactical marketing and sales/channel enablement Focus tier 1 marketing efforts on branded hardware Shuttle appliance focus, new user experience, message upcoming Daytona capabilities BIG-IP DNS execution across sales, marketing and channel Full Tier 1 Launch Timing is aligned to the strongest possible product and branding opportunities

56 APM GROWTH Y/Y ASM GROWTH Y/Y AFM GROWTH Y/Y SBS GROWTH Y/Y - 13 % 1 % 13 % 96% Actuals Future à ß Estimated 4% 4% 7% 8% YOY 1 Highlights 2 4% overall growth YoY due to AFM/DoS and EMEA SBS growth Total SFDC deal count was up 10% Y/Y Sec total unit count for HW SKU increased by 15% Y/Y AFM 27% Y/Y, ASM 10%, APM 6% Q116 Q216 Q316 Q416 Lowlights GBB contribution increased as a % of total $ from 51% to 53% YoY Continued mix shift to GBB causes a lowering of security $ Limited product specific campaigns and thought leadership, encourage leading with ADC + GBB APAC down 3% YoY due to APM non-gbb bookings

57 Vision and Roadmap For Application Access F5 securely connects users to applications to increase productivity while providing administrators with full control and visibility Fall 2016 Evolving Our Identity Bridge New cloud app access and auth. use cases (Oauth) Client: increase OS/browser support, less support issues BIG-IQ Centralized Management for central management Introduction of SSL Intercept Phase 2 Simplified Access Management Consolidated dashboard for provisioned applications Integrated login protection to protect against credential stealing Evolve BIG-IQ Centralized Management: policy editing, HA, and reporting Phase 3 Risk-Based Cloud Access Single point of visibility, risk scoring, and control for cloud/on-premises app access Integrate user behavioral analytics (risk engine), service chaining decisions, and the analytics CASB API approach to protecting data and compliance for the use of apps

58 Vision and Roadmap For Application Protection An integrated and intelligent approach to application and data protection Fall 2016 Advancing Current Offerings Improved firewall robustness: NAT, compiler opt, SSH proxy Simplify policy, improve security with web sockets Improving fingerprinting and DDoS efficacy BIG-IQ Centralized Management: scale and configuration support Phase 2 App-Centric Approach App-centric policy management Improved context around user auth., endpoint type, posture, behavior human or a bot Improved visibility and threat event reporting Introduce risk engine to develop a risk score Phase 3 Risk-Based App Security Evolved risk-aware, app-attached policy and workloads Fully evolved dynamic service chaining with large ecosystem of third-party vendors Shared intelligence across customers Matured centralized visibility and analytics

59 Give Feedback Get Points! Add class to your personal schedule. Survey will pop up in Mobile App. Answer the multiple choice. Submit your question to complete. Receive 5 points!

60

The Hillstone and Trend Micro Joint Solution

The Hillstone and Trend Micro Joint Solution The Hillstone and Trend Micro Joint Solution Advanced Threat Defense Platform Overview Hillstone and Trend Micro offer a joint solution the Advanced Threat Defense Platform by integrating the industry

More information

Threat-Centric Security for Service Providers

Threat-Centric Security for Service Providers Threat-Centric Security for Service Providers Enabling Open & Programmable Networks Sam Rastogi, Service Provider Security Product Marketing, Security Business Group Bill Mabon, Network Security Product

More information

On and off premises technologies Which is best for you?

On and off premises technologies Which is best for you? On and off premises technologies Which is best for you? We don t mind what you buy, as long as it is YELLOW! Warren Sealey and Paul-Christian Garpe On Premises or in the cloud? 1 Agenda Why Symantec? Email

More information

F5 (Security) Web Fraud Detection. Keiron Shepherd Security Systems Engineer

F5 (Security) Web Fraud Detection. Keiron Shepherd Security Systems Engineer F5 (Security) Web Fraud Detection Keiron Shepherd Security Systems Engineer The 21 st century application infrastructure (Trends) Users are going to access applications Mobile/VDI/XaaS/OS Security goes

More information

Secure Cloud Computing

Secure Cloud Computing Secure Cloud Computing Agenda Current Security Threat Landscape Over View: Cloud Security Overall Objective of Cloud Security Cloud Security Challenges/Concerns Cloud Security Requirements Strategy for

More information

Thank you for joining us today! The presentation will begin shortly. Thank you for your patience.

Thank you for joining us today! The presentation will begin shortly. Thank you for your patience. Thank you for joining us today! The presentation will begin shortly. Thank you for your patience. Copyright 2012-2015. SDNCentral LLC. All Rights Reserved September 11, 2015 Webinar Logistics Enable pop-ups

More information

Multi-Layer Security for Multi-Layer Attacks. Preston Hogue Dir, Cloud and Security Marketing Architectures

Multi-Layer Security for Multi-Layer Attacks. Preston Hogue Dir, Cloud and Security Marketing Architectures Multi-Layer Security for Multi-Layer Attacks Preston Hogue Dir, Cloud and Security Marketing Architectures High-Performance Services Fabric Programmability Data Plane Control Plane Management Plane Virtual

More information

Active Visibility for Multi-Tiered Security. Juergen Kirchmann Director Enterprise Sales EMEA

Active Visibility for Multi-Tiered Security. Juergen Kirchmann Director Enterprise Sales EMEA Active Visibility for Multi-Tiered Security Juergen Kirchmann Director Enterprise Sales EMEA Billions are Spent on Security Annually $18.4B SPENT BY ENTERPRISES WORLD-WIDE ON SECURITY IN 2014 ENTERPRISE

More information

IBM Cloud Security Draft for Discussion September 12, 2011. 2011 IBM Corporation

IBM Cloud Security Draft for Discussion September 12, 2011. 2011 IBM Corporation IBM Cloud Security Draft for Discussion September 12, 2011 IBM Point of View: Cloud can be made secure for business As with most new technology paradigms, security concerns surrounding cloud computing

More information

Cloud Access Security Broker. Ted Hendriks HP Atalla Pre-Sales Consultant, APJ Region HP Enterprise Security Products

Cloud Access Security Broker. Ted Hendriks HP Atalla Pre-Sales Consultant, APJ Region HP Enterprise Security Products Cloud Access Security Broker Ted Hendriks HP Atalla Pre-Sales Consultant, APJ Region HP Enterprise Security Products THERE IS A RAPID ADOPTION OF CLOUD APPS INTRODUCING NEW SET OF RISKS We are rapidly

More information

SECURING YOUR MODERN DATA CENTER WITH CHECK POINT

SECURING YOUR MODERN DATA CENTER WITH CHECK POINT SECURING YOUR MODERN DATA CENTER WITH CHECK POINT Javier Hijas Security Architect Check Point Europe 1 Agenda 1 2 3 4 What Questions is a modern / Answers datacenter Datacenter protection evolution Security

More information

Understanding the Security Vendor Landscape Using the Cyber Defense Matrix

Understanding the Security Vendor Landscape Using the Cyber Defense Matrix SESSION ID: PDIL-W02F Understanding the Security Vendor Landscape Using the Cyber Defense Matrix Sounil Yu sounil@gmail.com @sounilyu Disclaimers The views, opinions, and positions expressed in this presentation

More information

Arrow ECS University 2015 Radware Hybrid Cloud WAF Service. 9 Ottobre 2015

Arrow ECS University 2015 Radware Hybrid Cloud WAF Service. 9 Ottobre 2015 Arrow ECS University 2015 Radware Hybrid Cloud WAF Service 9 Ottobre 2015 Get to Know Radware 2 Our Track Record Company Growth Over 10,000 Customers USD Millions 200.00 150.00 32% 144.1 16% 167.0 15%

More information

Replacing Microsoft Forefront Threat Management Gateway with F5 BIG-IP. Dennis de Leest Sr. Systems Engineer Netherlands

Replacing Microsoft Forefront Threat Management Gateway with F5 BIG-IP. Dennis de Leest Sr. Systems Engineer Netherlands Replacing Microsoft Forefront Threat Management Gateway with F5 BIG-IP Dennis de Leest Sr. Systems Engineer Netherlands Microsoft Forefront Threat Management Gateway (TMG) Microsoft Forefront Threat Management

More information

Securing the Cloud: Making Cloud an Opportunity to Enhance Security

Securing the Cloud: Making Cloud an Opportunity to Enhance Security Securing the Cloud: Making Cloud an Opportunity to Enhance Security February 2016 Greg Coughlin Director, IBM Security @JGCoughlin 1 The rise of Shadow IT? 2 Security reality we have all been compromised

More information

Delivering Managed Services Using Next Generation Branch Architectures

Delivering Managed Services Using Next Generation Branch Architectures Delivering Managed Services Using Next Generation Branch Architectures By: Lee Doyle, Principal Analyst at Doyle Research Sponsored by Versa Networks Executive Summary Network architectures for the WAN

More information

Sophos Cloud and Partner Dashboard Jonathan Shaw

Sophos Cloud and Partner Dashboard Jonathan Shaw Sophos Cloud and Partner Dashboard Jonathan Shaw Product Manager, Sophos Cloud Agenda 1) An introduction to Sophos Cloud 2) Recent updates to Sophos Cloud 3) The new partner dashboard 4) What s coming

More information

The Cloud App Visibility Blindspot

The Cloud App Visibility Blindspot The Cloud App Visibility Blindspot Understanding the Risks of Sanctioned and Unsanctioned Cloud Apps and How to Take Back Control Introduction Today, enterprise assets are more at risk than ever before

More information

Web Security Update. A Radicati Group, Inc. Webconference. The Radicati Group, Inc. Copyright March 2010, Reproduction Prohibited

Web Security Update. A Radicati Group, Inc. Webconference. The Radicati Group, Inc. Copyright March 2010, Reproduction Prohibited The Radicati Group, Inc. www.radicati.com Web Security Update A Radicati Group, Inc. Webconference The Radicati Group, Inc. Copyright March 2010, Reproduction Prohibited 9:30 am, PT March 25, 2010 Speakers

More information

F5 and Microsoft Exchange Security Solutions

F5 and Microsoft Exchange Security Solutions F5 PARTNERSHIP SOLUTION GUIDE F5 and Microsoft Exchange Security Solutions Deploying a service-oriented perimeter for Microsoft Exchange WHAT'S INSIDE Pre-Authentication Mobile Device Security Web Application

More information

Requirements When Considering a Next- Generation Firewall

Requirements When Considering a Next- Generation Firewall White Paper Requirements When Considering a Next- Generation Firewall What You Will Learn The checklist provided in this document details six must-have capabilities to look for when evaluating a nextgeneration

More information

SOFTWARE DEFINED NETWORKING

SOFTWARE DEFINED NETWORKING SOFTWARE DEFINED NETWORKING Bringing Networks to the Cloud Brendan Hayes DIRECTOR, SDN MARKETING AGENDA Market trends and Juniper s SDN strategy Network virtualization evolution Juniper s SDN technology

More information

Security Information & Event Management (SIEM)

Security Information & Event Management (SIEM) Security Information & Event Management (SIEM) Peter Helms, Senior Sales Engineer, CISA, CISSP September 6, 2012 1 McAfee Security Connected 2 September 6, 2012 Enterprise Security How? CAN? 3 Getting

More information

IBM Endpoint Manager Product Introduction and Overview

IBM Endpoint Manager Product Introduction and Overview IBM Endpoint Manager Product Introduction and Overview David Harsent Technical Specialist Unified Endpoint IBM Endpoint Manager and IBM MobileFirst Protect (MaaS360) Any device. Identify and respond to

More information

Office 365 Cloud App Security MARKO DJORDJEVIC CLOUD BUSINESS LEAD EE TREND MICRO EMEA LTD.

Office 365 Cloud App Security MARKO DJORDJEVIC CLOUD BUSINESS LEAD EE TREND MICRO EMEA LTD. Office 365 Cloud App Security MARKO DJORDJEVIC CLOUD BUSINESS LEAD EE TREND MICRO EMEA LTD. Your Valuable Data In The Cloud? How To Get The Best Protection! A world safe for exchanging digital information

More information

Simplify IT. With Cisco Application Centric Infrastructure. Roberto Barrera rbarrera@grupo-dice.com. VERSION May, 2015

Simplify IT. With Cisco Application Centric Infrastructure. Roberto Barrera rbarrera@grupo-dice.com. VERSION May, 2015 Simplify IT With Cisco Application Centric Infrastructure Roberto Barrera rbarrera@grupo-dice.com VERSION May, 2015 Content Understanding Software Definded Network (SDN) Why SDN? What is SDN and Its Benefits?

More information

Dynamic Security for the Hybrid Cloud

Dynamic Security for the Hybrid Cloud Dynamic Security for the Hybrid Cloud Marc van Zadelhoff, VP Strategy, Marketing and Product Management, IBM Security Nataraj Nagaratnam, Distinguished Engineer and CTO Security Solutions, IBM Security

More information

www.obrela.com Swordfish

www.obrela.com Swordfish Swordfish Web Application Firewall Web Application Security as a Service Swordfish Web Application Security provides an innovative model to help businesses protect their brand and online information, incorporating

More information

Keith Luck, CISSP, CCSK Security & Compliance Specialist, VMware, Inc. kluck@vmware.com

Keith Luck, CISSP, CCSK Security & Compliance Specialist, VMware, Inc. kluck@vmware.com 1 Keith Luck, CISSP, CCSK Security & Compliance Specialist, VMware, Inc. kluck@vmware.com Agenda Cloud Computing VMware and Security Network Security Use Case Securing View Deployments Questions 2 IT consumption

More information

Powering the Internet of Things: SDN/NFV Architectures

Powering the Internet of Things: SDN/NFV Architectures Powering the Internet of Things: SDN/NFV Architectures 6B Connected Devices 2013 2013 2016 2018 2020 50B Connected Devices Worldwide by 2020 Implications for Service Providers Scaling the Networks End

More information

Mobile Security and Management Opportunities for Telcos and Service Providers

Mobile Security and Management Opportunities for Telcos and Service Providers Mobile Security and Management Opportunities for Telcos and Service Providers Lionel Gonzalez Symantec EMEA Solution architect Mike Gibson Protirus Brice Renaud Orange Business Services ST B03 - Mobile

More information

SSL Inspection Step-by-Step Guide. June 6, 2016

SSL Inspection Step-by-Step Guide. June 6, 2016 SSL Inspection Step-by-Step Guide June 6, 2016 Key Drivers for Inspecting Outbound SSL Traffic Eliminate blind spots of SSL encrypted communication to/from the enterprise Maintaining information s communication

More information

SAFE-T RSACCESS REPLACEMENT FOR MICROSOFT FOREFRONT UNIFIED ACCESS GATEWAY (UAG)

SAFE-T RSACCESS REPLACEMENT FOR MICROSOFT FOREFRONT UNIFIED ACCESS GATEWAY (UAG) SAFE-T RSACCESS REPLACEMENT FOR MICROSOFT FOREFRONT UNIFIED ACCESS GATEWAY (UAG) A RSACCESS WHITE PAPER 1 Microsoft Forefront Unified Access Gateway Overview 2 Safe-T RSAccess Secure Front-end Overview

More information

The Open Cloud Near-Term Infrastructure Trends in Cloud Computing

The Open Cloud Near-Term Infrastructure Trends in Cloud Computing The Open Cloud Near-Term Infrastructure Trends in Cloud Computing Markus Leberecht BELNET Networking Conference 25-Oct-2012 1 Growth & IT Challenges Drive Need for Cloud Computing IT Pros Growth IT Challenges

More information

BEST PRACTICES RESEARCH

BEST PRACTICES RESEARCH 2013 Frost & Sullivan 1 We Accelerate Growth Market Leadership Award Vulnerability Management Global, 2013 Frost & Sullivan s Global Research Platform Frost & Sullivan is in its 50th year of business with

More information

Your Security Partner of Choice

Your Security Partner of Choice Your Security Partner of Choice 6/16/14 2 About WatchGuard 100% CHANNEL 5,000 partners in 120 countries Ø Firewall appliance pioneer Ø Nearing 1,000,000 appliances shipped to business customers worldwide

More information

The Evolution of Application Monitoring

The Evolution of Application Monitoring The Evolution of Application Monitoring Narayan Makaram, CISSP, Director, Solutions Marketing, HP Enterprise Security Business Unit, May 18 th, 2012 Rise of the cyber threat Enterprises and Governments

More information

Honeywell Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Honeywell Process Solutions (HPS) June 4, 2014

Honeywell Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Honeywell Process Solutions (HPS) June 4, 2014 Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Process Solutions (HPS) June 4, Industrial Cyber Security Industrial Cyber Security is the leading provider of cyber security

More information

Addressing Advanced Web Threats. Addressing Advanced Web Threats: Protect Your Data and Brand

Addressing Advanced Web Threats. Addressing Advanced Web Threats: Protect Your Data and Brand Addressing Advanced Web Threats: Protect Your Data and Brand What You Will Learn From collaboration to communication to data access, the web is a mission-critical business tool. Enterprises rely on the

More information

Virtual CPE and Software Defined Networking

Virtual CPE and Software Defined Networking Virtual CPE and Software Defined Networking Virtual CPE and Software Defined Networking Residential broadband service providers are looking for solutions that allow them to rapidly introduce innovative

More information

F5 Identity and Access Management (IAM) Overview. Laurent PETROQUE Manager Field Systems Engineering, France

F5 Identity and Access Management (IAM) Overview. Laurent PETROQUE Manager Field Systems Engineering, France F5 Identity and Access Management (IAM) Overview Laurent PETROQUE Manager Field Systems Engineering, France F5 s Security Strategy Protect Apps/Data Wherever They Reside Control Access to Apps/Data from

More information

WHITE PAPER SPLUNK SOFTWARE AS A SIEM

WHITE PAPER SPLUNK SOFTWARE AS A SIEM SPLUNK SOFTWARE AS A SIEM Improve your security posture by using Splunk as your SIEM HIGHLIGHTS Splunk software can be used to operate security operations centers (SOC) of any size (large, med, small)

More information

Executive s Guide to Cloud Access Security Brokers

Executive s Guide to Cloud Access Security Brokers Executive s Guide to Cloud Access Security Brokers Contents Executive s Guide to Cloud Access Security Brokers Contributor: Amy Newman 2 2 Why You Need a Cloud Access Security Broker 5 You Can t Achieve

More information

Beyond passwords: Protect the mobile enterprise with smarter security solutions

Beyond passwords: Protect the mobile enterprise with smarter security solutions IBM Software Thought Leadership White Paper September 2013 Beyond passwords: Protect the mobile enterprise with smarter security solutions Prevent fraud and improve the user experience with an adaptive

More information

SourceFireNext-Generation IPS

SourceFireNext-Generation IPS D Ů V Ě Ř U J T E S I L N Ý M SourceFireNext-Generation IPS Petr Salač CCNP Security, CCNP, CICSP, CCSI #33835 petr.salac@alefnula.com Our Customers Biggest Security Challenges Maintaining security posture

More information

Driving Success in 2013: Enabling a Smart Protection Strategy in the age of Consumerization, Cloud and new Cyber Threats. Eva Chen CEO and Co-Founder

Driving Success in 2013: Enabling a Smart Protection Strategy in the age of Consumerization, Cloud and new Cyber Threats. Eva Chen CEO and Co-Founder Driving Success in 2013: Enabling a Smart Protection Strategy in the age of Consumerization, Cloud and new Cyber Threats Eva Chen CEO and Co-Founder Consistent Vision for 25 Years A world safe for exchanging

More information

Fortinet Advanced Threat Protection- Part 3

Fortinet Advanced Threat Protection- Part 3 Fortinet Advanced Threat Protection- Part 3 Upgrading Your Endpoint Security to Meet Advanced Threats Copyright Fortinet Inc. All rights reserved. Agenda Brief Recap on Breaches and the Need for Advanced

More information

OVERVIEW. Enterprise Security Solutions

OVERVIEW. Enterprise Security Solutions Enterprise Security Solutions OVERVIEW For more than 25 years, Trend Micro has innovated constantly to keep our customers ahead of an everevolving IT threat landscape. It s how we got to be the world s

More information

#ITtrends #ITTRENDS SYMANTEC VISION 2012 1

#ITtrends #ITTRENDS SYMANTEC VISION 2012 1 #ITtrends 1 Strategies for Security and Management in a Mobile and Virtual World Anil Chakravarthy Senior Vice President, Enterprise Security Group 2 MASSIVE INCREASE IN SOPHISTICATED ATTACKS 403 million

More information

Blending Embedded Hardware OTP, SSO, and Out of Band Auth for Secure Cloud Access

Blending Embedded Hardware OTP, SSO, and Out of Band Auth for Secure Cloud Access Blending Embedded Hardware OTP, SSO, and Out of Band Auth for Secure Cloud Access Vikas Jain Director, Product Management Intel Corporation Jesper Tohmo CTO, Nordic Edge (an Intel company) Session ID:

More information

Move over, TMG! Replacing TMG with Sophos UTM

Move over, TMG! Replacing TMG with Sophos UTM Move over, TMG! Replacing TMG with Sophos UTM Christoph Litzbach, Pre-Sales Engineer NSG 39 Key Features of TMG HTTP Antivirus/spyware URL Filtering HTTPS forward inspection Web Caching Role based access

More information

Cisco Advanced Malware Protection. Ross Shehov Security Virtual Systems Engineer March 2016

Cisco Advanced Malware Protection. Ross Shehov Security Virtual Systems Engineer March 2016 Cisco Advanced Malware Protection Ross Shehov Security Virtual Systems Engineer March 2016 The Reality Organizations Are Under Attack and Malware Is Getting in 95% of large companies targeted by malicious

More information

Sikkerhet Network Protector SDN app Geir Åge Leirvik HP Networking

Sikkerhet Network Protector SDN app Geir Åge Leirvik HP Networking Sikkerhet Network Protector SDN app Geir Åge Leirvik HP Networking Agenda BYOD challenges A solution for BYOD Network Protector SDN matched with industry leading service How it works In summary BYOD challenges

More information

Business Case for a DDoS Consolidated Solution

Business Case for a DDoS Consolidated Solution Business Case for a DDoS Consolidated Solution Executive Summary Distributed denial-of-service (DDoS) attacks are becoming more serious and sophisticated. Attack motivations are increasingly financial

More information

Unified Threat Management, Managed Security, and the Cloud Services Model

Unified Threat Management, Managed Security, and the Cloud Services Model Unified Threat Management, Managed Security, and the Cloud Services Model Kurtis E. Minder CISSP Global Account Manager - Service Provider Group Fortinet, Inc. Introduction Kurtis E. Minder, Technical

More information

ISB13 Web security deployment options - which is really best for you? Duncan Mills, Piero DePaoli, Stuart Jones

ISB13 Web security deployment options - which is really best for you? Duncan Mills, Piero DePaoli, Stuart Jones ISB13 Web security deployment options - which is really best for you? Duncan Mills, Piero DePaoli, Stuart Jones Web Security Deployment Options 1 1 The threat landscape 2 Why Symantec web security 3 Generic

More information

Top 10 Reasons Enterprises are Moving Security to the Cloud

Top 10 Reasons Enterprises are Moving Security to the Cloud ZSCALER EBOOK Top 10 Reasons Enterprises are Moving Security to the Cloud A better approach to security Albert Einstein defined insanity as doing the same thing over and over again and expecting different

More information

Securing the mobile enterprise with IBM Security solutions

Securing the mobile enterprise with IBM Security solutions Securing the mobile enterprise with IBM Security solutions Gain visibility and control with proven security for mobile initiatives in the enterprise Highlights Address the full spectrum of mobile risks

More information

WAN security threat landscape and best mitigation practices. Rex Stover Vice President, Americas, Enterprise & ICP Sales

WAN security threat landscape and best mitigation practices. Rex Stover Vice President, Americas, Enterprise & ICP Sales WAN security threat landscape and best mitigation practices. Rex Stover Vice President, Americas, Enterprise & ICP Sales The Cost of Cybercrime Sony $171m PlayStation 3 data breach (April 2011) $3 trillion

More information

Cisco Cloud Web Security

Cisco Cloud Web Security Data Sheet Today s highly connected and fast-moving world is filled with complex and sophisticated web security threats. Cisco delivers the strong protection, complete control, and investment value that

More information

Cloud App Security. Tiberio Molino Sales Engineer

Cloud App Security. Tiberio Molino Sales Engineer Cloud App Security Tiberio Molino Sales Engineer 2 Customer Challenges 3 Many Attacks Include Phishing Emails External Phishing attacks: May target specific individuals or companies Customer malware or

More information

Presented by Philippe Bogaerts Senior Field Systems Engineer p.bogaerts@f5.com. Securing application delivery in the cloud

Presented by Philippe Bogaerts Senior Field Systems Engineer p.bogaerts@f5.com. Securing application delivery in the cloud Presented by Philippe Bogaerts Senior Field Systems Engineer p.bogaerts@f5.com Securing application delivery in the cloud 2 The Leader in Application Delivery Networking Users Data Center At Home In the

More information

Leading The World Into Connected Security. Dipl.-Inform., CISSP, S+ Rolf Haas Enterprise Technology Specialist Content Lead EMEA

Leading The World Into Connected Security. Dipl.-Inform., CISSP, S+ Rolf Haas Enterprise Technology Specialist Content Lead EMEA Leading The World Into Connected Security Dipl.-Inform., CISSP, S+ Rolf Haas Enterprise Technology Specialist Content Lead EMEA History of Defining Largest Dedicated Delivering a Next Generation Architecture

More information

Experience the commitment WHITE PAPER. Information Security Continuous Monitoring. Charting the Right Course. cgi.com 2014 CGI GROUP INC.

Experience the commitment WHITE PAPER. Information Security Continuous Monitoring. Charting the Right Course. cgi.com 2014 CGI GROUP INC. Experience the commitment WHITE PAPER Information Security Continuous Monitoring Charting the Right Course May 2014 cgi.com 2014 CGI GROUP INC. During the last few months of 2013, six federal agencies

More information

Mucho Big Data y La Seguridad para cuándo?

Mucho Big Data y La Seguridad para cuándo? Mucho Big Data y La Seguridad para cuándo? Juan Carlos Vázquez Sales Systems Engineer, LTAM mayo 9, 2013 Agenda Business Drivers Big Security Data GTI Integration SIEM Architecture & Offering Why McAfee

More information

Next-Generation Firewalls: Critical to SMB Network Security

Next-Generation Firewalls: Critical to SMB Network Security Next-Generation Firewalls: Critical to SMB Network Security Next-Generation Firewalls provide dramatic improvements in protection versus traditional firewalls, particularly in dealing with today s more

More information

Enabling Business Beyond the Corporate Network. Secure solutions for mobility, cloud and social media

Enabling Business Beyond the Corporate Network. Secure solutions for mobility, cloud and social media Enabling Business Beyond the Corporate Network Secure solutions for mobility, cloud and social media 3 Trends Transforming Networks and Security Are you dealing with these challenges? Enterprise networks

More information

Customer Benefits Through Automation with SDN and NFV

Customer Benefits Through Automation with SDN and NFV Customer Benefits Through Automation with SDN and NFV Helping service providers solve specific challenges they are facing today while improving the overall customer service life cycle 1 Table of Contents

More information

Cloud email Security solutions

Cloud email Security solutions Cloud email Security solutions THE MARKET OPPORTUNITY KEY MESSAGES The security market is a very dynamic and evolving market - Threats are rapidly increasing in sophistication and severity - New technologies,

More information

vsrx Services Gateway: Protecting the Hybrid Data Center

vsrx Services Gateway: Protecting the Hybrid Data Center Services Gateway: Protecting the Hybrid Data Center Extending Juniper Networks award-winning security products to virtualized, cloud-based, and hybrid IT environments Challenge Virtualization and cloud

More information

Security Considerations for DirectAccess Deployments. Whitepaper

Security Considerations for DirectAccess Deployments. Whitepaper Security Considerations for DirectAccess Deployments Whitepaper February 2015 This white paper discusses security planning for DirectAccess deployment. Introduction DirectAccess represents a paradigm shift

More information

Addressing Security for Hybrid Cloud

Addressing Security for Hybrid Cloud Addressing Security for Hybrid Cloud Sreekanth Iyer Executive IT Architect IBM Cloud (CTO Office) Email : sreek.iyer@in.ibm.com Twitter: @sreek Blog: http://ibm.co/sreek July 18, 2015 Cloud is rapidly

More information

2012 North American Enterprise Firewalls Market Penetration Leadership Award

2012 North American Enterprise Firewalls Market Penetration Leadership Award 2012 2012 North American Enterprise Firewalls Market Penetration Leadership Award 2012 Frost & Sullivan 1 We Accelerate Growth Market Penetration Leadership Award Enterprise Firewalls North America, 2012

More information

Virtualized Security: The Next Generation of Consolidation

Virtualized Security: The Next Generation of Consolidation Virtualization. Consolidation. Simplification. Choice. WHITE PAPER Virtualized Security: The Next Generation of Consolidation Virtualized Security: The Next Generation of Consolidation As we approach the

More information

Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006

Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006 Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006 April 2013 Hologic and the Hologic Logo are trademarks or registered trademarks of Hologic, Inc. Microsoft, Active Directory,

More information

Security and Compliance challenges in Mobile environment

Security and Compliance challenges in Mobile environment Security and Compliance challenges in Mobile environment Emerging Technologies November 19, 2013 Bob Bastani Introductions Bob Bastani, Security & Compliance Program Manager, IBM, 301-803-6078, bbastani@us.ibm.com

More information

COORDINATED THREAT CONTROL

COORDINATED THREAT CONTROL APPLICATION NOTE COORDINATED THREAT CONTROL Interoperability of Juniper Networks IDP Series Intrusion Detection and Prevention Appliances and SA Series SSL VPN Appliances Copyright 2010, Juniper Networks,

More information

Security of Cloud Computing for the Power Grid

Security of Cloud Computing for the Power Grid ANNUAL INDUSTRY WORKSHOP NOVEMBER 12-13, 2014 Security of Cloud Computing for the Power Grid Industry Panel November 12, 2014 UNIVERSITY OF ILLINOIS DARTMOUTH COLLEGE UC DAVIS WASHINGTON STATE UNIVERSITY

More information

Copyright 2013 WatchGuard Technologies, Inc. All rights reserved. Introducción a Watchguard DLP Data Loss Prevention

Copyright 2013 WatchGuard Technologies, Inc. All rights reserved. Introducción a Watchguard DLP Data Loss Prevention Copyright 2013 WatchGuard Technologies, Inc. All rights reserved. Introducción a Watchguard DLP Data Loss Prevention About WatchGuard > Taken private in 2006; enabled strategic shift > Firewall appliance

More information

Effective Methods to Detect Current Security Threats

Effective Methods to Detect Current Security Threats terreactive AG. Swiss Cyber Storm 2015. Effective Methods to Detect Current Security Threats Taking your IT security to the next level, you have to consider a paradigm shift. In the past companies mostly

More information

Safeguarding the cloud with IBM Dynamic Cloud Security

Safeguarding the cloud with IBM Dynamic Cloud Security Safeguarding the cloud with IBM Dynamic Cloud Security Maintain visibility and control with proven security solutions for public, private and hybrid clouds Highlights Extend enterprise-class security from

More information

Secure Cloud-Ready Data Centers Juniper Networks

Secure Cloud-Ready Data Centers Juniper Networks Secure Cloud-Ready Data Centers Juniper Networks JUNIPER SECURITY LEADERSHIP A $1B BUSINESS Market Leadership Data Center with High- End Firewall #1 at 42% Secure Mobility with SSL VPN #1 at 25% Security

More information

Risk and threats everywhere, all the time

Risk and threats everywhere, all the time Risk and threats everywhere, all the time Hackers Cloud Remote Offices/ Workers Authentication & Encryption Mobile Devices Virtualization Malicious & Well-meaning Users Cyber Threats Social Media Compliance

More information

NETWORK ACCESS CONTROL AND CLOUD SECURITY. Tran Song Dat Phuc SeoulTech 2015

NETWORK ACCESS CONTROL AND CLOUD SECURITY. Tran Song Dat Phuc SeoulTech 2015 NETWORK ACCESS CONTROL AND CLOUD SECURITY Tran Song Dat Phuc SeoulTech 2015 Table of Contents Network Access Control (NAC) Network Access Enforcement Methods Extensible Authentication Protocol IEEE 802.1X

More information

Effective Methods to Detect Current Security Threats

Effective Methods to Detect Current Security Threats terreactive AG. Swiss Cyber Storm 2015. Effective Methods to Detect Current Security Threats Enrico Petrov Director Managed Security Services terreactive October 21 st, 2015 terreactive Background. About

More information

Rashmi Knowles Chief Security Architect EMEA

Rashmi Knowles Chief Security Architect EMEA Rashmi Knowles Chief Security Architect EMEA AGENDA Transformation of IT New cyber-security challenges Intelligence Driven Security Security Analytics Q&A 2 ENTERPRISE DATA CENTER ADVANCED SECURITY A UNIQUE

More information

Check Point Positions

Check Point Positions Check Point Positions - Gartner Magic Quadrants - IDC Market Share Research 2012 Dean J. Whitehair Analyst Relations October 2012 Version 9.0 Updated 10/17/2012 2012 Check Point Software Technologies Ltd.

More information

Secure Your Mobile Workplace

Secure Your Mobile Workplace Secure Your Mobile Workplace Sunny Leung Senior System Engineer Symantec 3th Dec, 2013 1 Agenda 1. The Threats 2. The Protection 3. Q&A 2 The Mobile Workplaces The Threats 4 Targeted Attacks up 42% in

More information

INCREASINGLY, ORGANIZATIONS ARE ASKING WHAT CAN T GO TO THE CLOUD, RATHER THAN WHAT CAN. Albin Penič Technical Team Leader Eastern Europe

INCREASINGLY, ORGANIZATIONS ARE ASKING WHAT CAN T GO TO THE CLOUD, RATHER THAN WHAT CAN. Albin Penič Technical Team Leader Eastern Europe INCREASINGLY, ORGANIZATIONS ARE ASKING WHAT CAN T GO TO THE CLOUD, RATHER THAN WHAT CAN Albin Penič Technical Team Leader Eastern Europe Trend Micro 27 years focused on security software Headquartered

More information

Cloud and Critical Infrastructures how Cloud services are factored in from a risk perspective

Cloud and Critical Infrastructures how Cloud services are factored in from a risk perspective Cloud and Critical Infrastructures how Cloud services are factored in from a risk perspective Reaching the Cloud era in the EU Riga 16 June 2015 Jonathan Sage Government and Regulatory Affairs Cyber Security

More information

Discover how and why file transfer is changing

Discover how and why file transfer is changing Discover how and why file transfer is changing Why you should think of it as more than FTP 1 2013 IBM Corporation Agenda What is Smarter Commerce? What is the role of B2B integration? What is MFT? Problems

More information

RSA Identity and Access Management 2014

RSA Identity and Access Management 2014 RSA Identity and Access Management 2014 1 Agenda Today s Enterprises and IAM Customer Challenges IAM Requirements RSA IAM Our Competitive Advantage Leading The Pack RSA Views on Identity Management and

More information

Sourcefire Solutions Overview Security for the Real World. SEE everything in your environment. LEARN by applying security intelligence to data

Sourcefire Solutions Overview Security for the Real World. SEE everything in your environment. LEARN by applying security intelligence to data SEE everything in your environment LEARN by applying security intelligence to data ADAPT defenses automatically ACT in real-time Sourcefire Solutions Overview Security for the Real World Change is constant.

More information

Mike Smart Cyber Strategist & Enterprise Security Solutions, EMEA. Cyber: The Catalyst to Transform the Security Program

Mike Smart Cyber Strategist & Enterprise Security Solutions, EMEA. Cyber: The Catalyst to Transform the Security Program Cyber: The Catalyst to Transform the Security Program Mike Smart Cyber Strategist & Enterprise Security Solutions, EMEA A Common Language? Hyper Connected World Rapid IT Evolution Agile Targeted Threat

More information

SANS Top 20 Critical Controls for Effective Cyber Defense

SANS Top 20 Critical Controls for Effective Cyber Defense WHITEPAPER SANS Top 20 Critical Controls for Cyber Defense SANS Top 20 Critical Controls for Effective Cyber Defense JANUARY 2014 SANS Top 20 Critical Controls for Effective Cyber Defense Summary In a

More information

SHARE THIS WHITEPAPER. Top Selection Criteria for an Anti-DDoS Solution Whitepaper

SHARE THIS WHITEPAPER. Top Selection Criteria for an Anti-DDoS Solution Whitepaper SHARE THIS WHITEPAPER Top Selection Criteria for an Anti-DDoS Solution Whitepaper Table of Contents Top Selection Criteria for an Anti-DDoS Solution...3 DDoS Attack Coverage...3 Mitigation Technology...4

More information

Next Generation Enterprise Network Security Platform

Next Generation Enterprise Network Security Platform Next Generation Enterprise Network Security Platform November 2014 Lyndon Clough - Territory Sales Manager Derran Guinan Systems Engineer Agenda The Palo Alto Networks story Today s Threat Landscape The

More information

Braindumps.700-295.50.QA

Braindumps.700-295.50.QA Braindumps.700-295.50.QA Number: 700-295 Passing Score: 800 Time Limit: 120 min File Version: 6.0 http://www.gratisexam.com/ Comprehensive, easy and to the point study material made it possible for me

More information

Securing the Cloud infrastructure with IBM Dynamic Cloud Security

Securing the Cloud infrastructure with IBM Dynamic Cloud Security Securing the Cloud infrastructure with IBM Dynamic Cloud Security Ngo Duy Hiep Security Brand Manager Cell phone: +84 912216753 Email: hiepnd@vn.ibm.com 12015 IBM Corporation Cloud is rapidly transforming

More information

Radware ADC-VX Solution. The Agility of Virtual; The Predictability of Physical

Radware ADC-VX Solution. The Agility of Virtual; The Predictability of Physical Radware ADC-VX Solution The Agility of Virtual; The Predictability of Physical Table of Contents General... 3 Virtualization and consolidation trends in the data centers... 3 How virtualization and consolidation

More information