Sourcefire Overview Jens Brandt. Regional Sales Manager Nordics and Baltics
|
|
- Kimberly Stevens
- 7 years ago
- Views:
Transcription
1 Sourcefire Overview Jens Brandt Regional Sales Manager Nordics and Baltics
2 About Sourcefire Mission: To be the leading provider of intelligent cyber security solutions for the enterprise.! Founded in 2001 by Snort Creator, Martin Roesch, CTO! Headquarters: Columbia, MD! Focus on enterprise and government customers! Global Security Alliance ecosystem! NASDAQ: FIRE 2
3 Gartner 2010 IPS Magic Quadrant FACT: Sourcefire has been a leader in Gartner s IPS Magic Quadrant since The Magic Quadrant is copyrighted 6 December 2010 by Gartner, Inc. and is reused with permission. The Magic Quadrant is a graphical representation of a marketplace at and for a specific time period. 3 It depicts Gartner's analysis of how certain vendors measure against criteria for that marketplace, as defined by Gartner. Gartner does not endorse any vendor, product or service depicted in the Magic Quadrant, and does not advise technology users to select only those vendors placed in the "Leaders" quadrant. The Magic Quadrant is intended solely as a research tool, and is not meant to be a specific guide to action. Gartner disclaims all warranties, express or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.
4 Traditional IPS vs. Next-Generation IPS Traditional IPS Next-Generation IPS Closed & Blind Architecture Open & Customizable None or Limited Awareness Visibility & Intelligence 4 Human Intensive Automation Self Tuning & Precision
5 Mgmt Sourcefire a comprehensive solution Products Defense Center Management Console Technologies IPSx IPS Awareness 5 NGIPS NGFW SSL Appliance Virtual Products Immunet
6 Security IS needed 6
7 When Security fails Always expect the unexpected! 7
8 Who is this a statue of? Born September 1846 in USA Died
9 9 Died 1911 Cause of death?
10 10 Kicked himself to death He proved that passwords aren t safe 100 years later we still haven t learned the lesson They can even kill you
11 Security systems All face similar problems In or out, same problem Same challenge What makes you smarter? 11
12 Awareness 12
13 Security is really easy!! Know everything!! Keep track of everything!! Be on top of everything!! Always take the right decision!! Be a superman? 13
14 Sourcefire is an alarm system! IPS is your network s combined automated burglar alarm and security guard force 14
15 Incidents Enough awareness? Organizations reputation/brand took a big hit. 15
16 Do you Know your soft spots? Have awareness enough? Have the capacity to handle all security events? Amount of incidents can be a big challenge! 16
17 Next-Gen IPS The Power of Awareness Network Know what s there, what s vulnerable, and what s under attack Application Identify change and enforce policy on hundreds of applications Behavior Detect anomalies in configuration, connections and data flow Identity Know who is doing what, with what, and where 17
18 Sample RNA Detection 18 Applications Operating Systems Network Infrastructure Consumer
19 Comprehensive Ecosystem Network Infrastructure SIEM / Log Management Configuration Management Incident 19 Management Vulnerability Management Systems Management
20 Next-Generation IPS Defense Center Management Console Awareness Technologies Intrusion Prevention Networks SSL Inspection 20 Apps Behavior Virtualization Users
21 Overall Achievable Block Rate 98% 97% 95% 94% 93% 91% 85% 83% 79% 63% 43% 21 Graphic by Sourcefire, Inc. Source data from NSS Labs Network IPS 2010 Comparative Test Results.
22 Protection Against Server-Side Attacks 96% 96% 93% 90% 90% 90% 73% 73% 69% 63% 43% 22 Graphic by Sourcefire, Inc. Source data from NSS Labs Network IPS 2010 Comparative Test Results.
23 Protection Against Client-Side Attacks 99% 98% 97% 97% 96% 96% 96% 93% 91% 55% 44% 23 Graphic by Sourcefire, Inc. Source data from NSS Labs Network IPS 2010 Comparative Test Results.
24 Vulnerability (CVE) Coverage by Year Sourcefire Vendor 2 Vendor 3 Vendor 4 Vendor 5 Vendor 4 Vendor 6 Vendor 7 Vendor 8 Vendor 9 Vendor 10 6 Vendor 10 Vendor 11 24
25 Vendor-Stated vs. Actual Performance 180% 160% 140% 161% Sourcefire s 2G IPS achieved 3.2G for 161% of vendor-stated performance 120% 100% 80% 60% 40% 20% 115% 113% 100% 81% 49% 40% 39% 100% Performance Baseline Most IPS products achieved well below vendor-stated performance claims 35% 20% 17% 3% 3% 0% 25 Graphic by Sourcefire, Inc. Computations derived from NSS Labs Network IPS 2010 Comparative Test Result
26 Thank you!
Effective IDS/IPS Network Security in a Dynamic World with Next-Generation Intrusion Detection & Prevention
Effective IDS/IPS Network Security in a Dynamic World with Next-Generation Intrusion Detection & Prevention Your Security Challenges Defending the Dynamic Network! Dynamic threats 䕬 䕬 䕬 䕬 Many threats
More informationHow To Protect Your Network From A Threat From A Rogue Host Or A Rogue Server From A Hacker (For A Fee)
Next-Generation Intrusion Detection & Prevention Manuel Minzoni, Brand Manager ITWAY VAD Today s Reality Begin the transformation to context-aware and adaptive security infrastructure now as you replace
More informationAdaptive IPS Security in a changing world. Dave Venman Security Engineer, UK & Ireland
Adaptive IPS Security in a changing world Dave Venman Security Engineer, UK & Ireland 2 Who Is Sourcefire? Mission: To help customers manage increasing risks and regulations by providing the most effective,
More informationSourcefire Solutions Overview Security for the Real World. SEE everything in your environment. LEARN by applying security intelligence to data
SEE everything in your environment LEARN by applying security intelligence to data ADAPT defenses automatically ACT in real-time Sourcefire Solutions Overview Security for the Real World Change is constant.
More informationThe Need for Intelligent Network Security: Adapting IPS for today s Threats
The Need for Intelligent Network Security: Adapting IPS for today s Threats James Tucker Security Engineer Sourcefire Nordics A Bit of History It started with passive IDS. Burglar alarm for the network
More informationCisco and Sourcefire. AGILE SECURITY : Security for the Real World. Stefano Volpi
Cisco and Sourcefire AGILE SECURITY : Security for the Real World Stefano Volpi SOURCEfire Worldwide John Chambers statement Security is the TOP issue for Cisco and many of the CIO s in the industry. We
More informationSourceFireNext-Generation IPS
D Ů V Ě Ř U J T E S I L N Ý M SourceFireNext-Generation IPS Petr Salač CCNP Security, CCNP, CICSP, CCSI #33835 petr.salac@alefnula.com Our Customers Biggest Security Challenges Maintaining security posture
More informationSourcefire Next-Generation IPS
Sourcefire Next-Generation IPS Sourcefire Next-Generation IPS sets a new standard for advanced threat protection, integrating real-time contextual awareness, intelligent security automation, and unprecedented
More informationOverview of F5 Networks. Fatih Bilger Senior Systems Engineer, Prolink. fatih.bilger@prolink.com.tr
Overview of F5 Networks Fatih Bilger Senior Systems Engineer, Prolink fatih.bilger@prolink.com.tr Company Snapshot Leading provider of Application Delivery Networking products that optimize the security,
More informationHow To Buy Nitro Security
McAfee Acquires NitroSecurity McAfee announced that it has closed the acquisition of privately owned NitroSecurity. 1. Who is NitroSecurity? What do they do? NitroSecurity develops high-performance security
More information32% of Excel users are comfortable with using it for Advanced Analysis e.g., PivotTables
Only 28% of potential BI users have any meaningful access 32% of Excel users are comfortable with using it for Advanced Analysis e.g., PivotTables 31% of all BI initiatives partially meet or don t meet
More informationSalient Partner Program
Salient Partner Program Resellers Referral Partners Salient Partner Program Why Partner with Salient? Salient partner programs deliver tools, resources and the expertise your company needs to implement
More informationFROM PRODUCT TO PLATFORM
FROM PRODUCT TO PLATFORM DATA EQUIPMENT 2016 Mikkel Bossen Agenda Today s Challenges Data Growth, SSL encryption, Application Growth & SaaS What s hiding in under the surface? Legacy Security is that really
More informationAltiris Asset Management Suite 7.0
Altiris Asset Management Suite 7.0 1 Today s Agenda 1 Asset Management Overview 2 What's New in AMS 7 3 New Process Automations (workflow) 4 Migration from 6.x to 7.0 Altiris Asset Management Suite 7.0
More informationRequirements When Considering a Next- Generation Firewall
White Paper Requirements When Considering a Next- Generation Firewall What You Will Learn The checklist provided in this document details six must-have capabilities to look for when evaluating a nextgeneration
More informationIndependent process platform
Independent process platform Megatrend in infrastructure software Dr. Wolfram Jost CTO February 22, 2012 2 Agenda Positioning BPE Strategy Cloud Strategy Data Management Strategy ETS goes Mobile Each layer
More informationРешения HP по информационной безопасности
Решения HP по информационной безопасности Евгений Нечитайло ynechyta@hp.com Mobile: +380 67 464 0218 Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject
More informationSourcefire Next-Generation IPS
Sourcefire Next-Generation IPS Key NGIPS Capabilities Snort IPS detection engine Network intelligence Impact assessment User identification Automated policy tuning Network behavior analysis Packet-level
More information<Insert Picture Here> Oracle Identity And Access Management
Oracle Identity And Access Management Gautam Gopal, MSIST, CISSP Senior Security Sales Consultant Oracle Public Sector The following is intended to outline our general product direction.
More informationGartner Magic Quadrant Sources and Disclaimer
Gartner Magic Quadrant Sources and Disclaimer 1. Gartner Magic Quadrant for Network Access Control; by Lawrence Orans, John Pescatore, Mark Nicolett; March 27, 2009 2. Gartner Magic Quadrant for Endpoint
More informationHow To Improve Your Network Security
Matthias Meier VP Engineering, bw digitronik 2013 ForeScout Technologies, Page 1 2014 ForeScout Technologies, Page 1 Inadequate Visibility Inadequate Collaboration Inadequate Automation 2013 ForeScout
More informationChanging the Enterprise Security Landscape
Changing the Enterprise Security Landscape Petr Hněvkovský Presales Consultant, ArcSight EMEA HP Enterprise Security Products 2012 Hewlett-Packard Development Company, L.P. The information contained herein
More informationStallion SIA Seminar 2.12.2015 PREVENTION FIRST. Introducing the Enterprise Security Platform. Sami Walle Regional Sales Manager
Stallion SIA Seminar 2.12.2015 PREVENTION FIRST Introducing the Enterprise Security Platform Sami Walle Regional Sales Manager CYBER THREATS ARE GETTING MORE ADVANCED Advanced Persistent Threat Uses a
More informationSkybox Security Survey: Next-Generation Firewall Management
Skybox Security Survey: Next-Generation Firewall Management November 2012 Worldwide Results Notice: This document contains a summary of the responses to a November 2012 survey of medium- to largesize organizations
More informationStatus Evolution Balance Trends
This summary represents opinions of Project Botticelli Ltd as of March 2011 only, and does not represent opinions or recommendations of Microsoft Corp, Gartner Group, Forrester Research, except when directly
More informationSecurity strategies to stay off the Børsen front page
Security strategies to stay off the Børsen front page Steve Durkin, Channel Director for Europe, Q1 Labs, an IBM Company 1 2012 IBM Corporation Given the dynamic nature of the challenge, measuring the
More informationHow To Protect Your Network From Intrusions From A Malicious Computer (Malware) With A Microsoft Network Security Platform)
McAfee Security: Intrusion Prevention System REV: 0.1.1 (July 2011) 1 Contents 1. McAfee Network Security Platform...3 2. McAfee Host Intrusion Prevention for Server...4 2.1 Network IPS...4 2.2 Workload
More informationInteractive Intelligence. Joe Staples Chief marketing officer Interactive Intelligence
Interactive Intelligence Joe Staples Chief marketing officer Interactive Intelligence As We Get Started 2 www.inin.com As We Get Started 3 www.inin.com As We Get Started 4 www.inin.com What We Do Customer
More informationCommvault - Modern Data and Information Management. Aleksandar Antić Commvault Regional Sales SEE Region
Commvault - Modern Data and Information Management Aleksandar Antić Commvault Regional Sales SEE Region Snapshot of Commvault Established in 1996, headquartered in New Jersey, USA Over 2,000 employees
More informationIntro to NSX. Network Virtualization. 2014 VMware Inc. All rights reserved.
Intro to NSX Network Virtualization 2014 VMware Inc. All rights reserved. Agenda Introduction NSX Overview Details: Microsegmentation NSX Operations More Information SDDC/Network Virtualization Security
More informationQRadar SIEM and Zscaler Nanolog Streaming Service
QRadar SIEM and Zscaler Nanolog Streaming Service February 2014 1 QRadar SIEM: Security Intelligence Platform QRadar SIEM provides full visibility and actionable insight to protect networks and IT assets
More informationC a r l G o e t h a l s T e r r e m a r k E u r o p e. C a r l. g o e t h a l s @ t e r r e m a r k. c o m
Cloud Computing for Government & Enterprise C a r l G o e t h a l s T e r r e m a r k E u r o p e C a r l. g o e t h a l s @ t e r r e m a r k. c o m Agenda Some history on Terremark State of Cloud Public
More informationThe Next Generation of IT Management. Jason Andrew Vice President, Marketing & Communications
The Next Generation of IT Management Jason Andrew Vice President, Marketing & Communications BMC Has Outperformed the Market Growing Stock Price Over 130 Percent in 5 Years BMC +134% IBM +76% HP +50% NASDAQ
More informationMagic Quadrant and Microsoft Dynamics CRM ERM
Leader in Forrester Wave ratings (Large & Midsized) 2 nd year as a Leader in the Gartner Customer Service MQ Mitsubishi Caterpillar Forklift Europe received the all-up Gartner CRM Excellence Award ISS
More informationIBM QRadar Security Intelligence April 2013
IBM QRadar Security Intelligence April 2013 1 2012 IBM Corporation Today s Challenges 2 Organizations Need an Intelligent View into Their Security Posture 3 What is Security Intelligence? Security Intelligence
More informationSAS CUSTOMER INTELLIGENCE. Solve more marketing challenges with a comprehensive enterprise solution
SAS CUSTOMER INTELLIGENCE Solve more marketing challenges with a comprehensive enterprise solution Enable Smarter Decisions Throughout Your Marketing Process SAS analytics leads to deeper understanding
More informationIBM Security. 2013 IBM Corporation. 2013 IBM Corporation
IBM Security Security Intelligence What is Security Intelligence? Security Intelligence --noun 1.the real-time collection, normalization and analytics of the data generated by users, applications and infrastructure
More informationMicrosoft Business Intelligence solution. What makes Microsoft BI difference
Business Intelligence today Microsoft Business Intelligence solution What makes Microsoft BI difference Case study and Demo Gartner BI Platform Software Revenue (in $Billions) CIO Priorities: Data Analysis
More informationSalient Managed Services. Hosting and Support
Salient Managed Services Hosting and Support Salient Managed Services: Hosting and Support Salient s Managed Services provide clients with the highest level of reliability and peace of mind. We have qualified
More informationDATA CENTER IPS COMPARATIVE ANALYSIS
DATA CENTER IPS COMPARATIVE ANALYSIS Security Value Map (SVM) 2014 Thomas Skybakmoen, Jason Pappalexis Tested Products Fortinet FortiGate 5140B, Juniper SRX 5800, McAfee NS- 9300, Sourcefire 8290-2 Overview
More informationQ1 Labs Corporate Overview
Q1 Labs Corporate Overview The Security Intelligence Leader Who we are: Innovative Security Intelligence software company One of the largest and most successful SIEM vendors Leader in Gartner 2011, 2010,
More informationThe SDN Opportunity. Erik Papir Director, Global Technical Marketing & Competitive Intelligence HP Networking May 2014
The SDN Opportunity Erik Papir Director, Global Technical Marketing & Competitive Intelligence HP Networking May 2014 Enterprise is moving to a New Style of IT Networking innovations lay the foundation
More informationJeff Warson, GCIH, SCPS, CISSP, CCSK Sr. Principal Security Strategist Symantec Corpora5on
Jeff Warson, GCIH, SCPS, CISSP, CCSK Sr. Principal Security Strategist Symantec Corpora5on Agenda 1 2 3 4 5 Sources of a Breach Key IT Security Trends How is DLP Implemented Symantec's Strategy and Recent
More informationBusiness Intelligence with SharePoint 2010
Business Intelligence with SharePoint 2010 August 2011 Asad Mahmood Head Of Business Analytics Consulting E: asad.mahmood@contemporary.co.uk T: @MrAsadMahmood Symon Garfield Chief Technology Officer E:
More informationHow to Choose the Right Security Information and Event Management (SIEM) Solution
How to Choose the Right Security Information and Event Management (SIEM) Solution John Burnham Director, Strategic Communications and Analyst Relations IBM Security Chris Meenan Director, Security Intelligence
More informationHow to choose the right NGFW for your organization: Independent 3 rd Party Testing
How to choose the right NGFW for your organization: Independent 3 rd Party Testing Daniel Ayoub, CISSP, CISM, CISA, CEH Manager, Product Marketing Dell Marketing 2 Confidential Marketing vs. Reality 3
More informationMcAfee Next Generation Firewall
McAfee Next Generation Firewall Services solutions for Managed Service Providers (MSPs) McAfee Next Generation Firewall offers the advanced security, flexibility, and multitenant control needed to protect
More informationSun and Oracle: Joining Forces in Identity Management
Sun and Oracle: Joining Forces in Identity Management The following is intended to outline our general product direction. It is intended for information purposes only, and may not be incorporated into
More informationHow To Manage Sourcefire From A Command Console
Sourcefire TM Sourcefire Capabilities Store up to 100,000,000 security & host events, including packet data Centralized policy & sensor management Centralized audit logging of configuration & security
More informationFortinet Advanced Threat Protection- Part 3
Fortinet Advanced Threat Protection- Part 3 Upgrading Your Endpoint Security to Meet Advanced Threats Copyright Fortinet Inc. All rights reserved. Agenda Brief Recap on Breaches and the Need for Advanced
More informationIan White EPM Specialist Microsoft
Ian White EPM Specialist Microsoft A bit of background A lot of demo Some closing thoughts Cost Reduction Enhance Efficiency Drive Growth Probably you have heard this 100 times Alignment Enhance strategic
More informationCA Technologies Data Protection
CA Technologies Data Protection can you protect and control information? Johan Van Hove Senior Solutions Strategist Security Johan.VanHove@CA.com CA Technologies Content-Aware IAM strategy CA Technologies
More informationIdentity Management Overview. Bill Nelson bill.nelson@gca.net Vice President of Professional Services
Identity Management Overview Bill Nelson bill.nelson@gca.net Vice President of Professional Services 1 Agenda Common Identity-related Requests Business Drivers for Identity Management Account (Identity)
More informationSymantec to Acquire Clearwell Systems, Inc. May 19, 2011
Symantec to Acquire Clearwell Systems, Inc. May 19, 2011 1 Forward-Looking Statements This presentation contains forward-looking statements within the meaning of U.S. federal securities laws, including
More informationSimplify and Automate IT
Simplify and Automate IT The current state of IT INCIDENT SERVICE LEVEL DATA SERVICE REQUEST ASSET RELEASE CONFIGURATION GOVERNANCE AND COMPLIANCE EVENT AND IMPACT ENTERPRISE SCHEDULING DASHBOARDS CAPACITY
More informationThe Hillstone and Trend Micro Joint Solution
The Hillstone and Trend Micro Joint Solution Advanced Threat Defense Platform Overview Hillstone and Trend Micro offer a joint solution the Advanced Threat Defense Platform by integrating the industry
More informationCHANGING THE RULES OF NETWORKING. Mike Banic, Vice President, Global Marketing, HP Networking January 13th, 2011
CHANGING THE RULES OF NETWORKING Mike Banic, Vice President, Global Marketing, HP Networking January 13th, 2011 FORWARD LOOKING STATEMENTS This presentation may contain forward-looking statements that
More informationThe real trend of the Future Workspace. John Phillips Enterprise Technology Strategist Microsoft Corporation john.phillips@microsoft.
The real trend of the Future Workspace John Phillips Enterprise Technology Strategist Microsoft Corporation john.phillips@microsoft.com Communications.... Our Vision Create experiences that combine the
More informationVMware Vision Accelerating the Journey to Your Cloud
VMware Vision Accelerating the Journey to Your Cloud Ralf von Gunten Sr. Systems Engineer 2010 VMware Inc. All rights reserved VMware is the Customer-Proven Market Leader Company Overview > $2.6 billion
More informationThe 2014 Next Generation Firewall Challenge
Network World and Robin Layland present The 2014 Next Generation Firewall Challenge Guide to Understanding and Choosing a Next Generation Firewall to Combat Today's Threats 2014 The 2014 Next Generation
More informationDATA TRANSPARENCY TOWN HALL MEETING
DATA TRANSPARENCY TOWN HALL MEETING September 26, 2014 richard.harmison@teradata.com gindy.feeser@teradata.com A Question How much financial data does the US Government have? 2 Teradata Confidential 3
More informationG06 - How to store your data in SharePoint
G06 - How to store your data in SharePoint European Microsoft SharePoint Conference 2007 A story about Performance, Compliance and Reliability by NetApp February 12th to 14th, 2007 Convention Center Hotel
More informationAchieve Deeper Network Security
Achieve Deeper Network Security Dell Next-Generation Firewalls Abstract Next-generation firewalls (NGFWs) have taken the world by storm, revolutionizing network security as we once knew it. Yet in order
More informationStrategies and Best Practices to Implement a Successful Data Loss Prevention Program Sebastian Brenner, CISSP
Strategies and Best Practices to Implement a Successful Data Loss Prevention Program Sebastian Brenner, CISSP Principal Systems Engineer Symantec LAMC Agenda 1 What DLP is and its purpose 2 Challenges
More informationThe webinar will begin shortly
The webinar will begin shortly An Introduction to Security Intelligence Presented by IBM Security Chris Ross Senior Security Specialist, IBM Security Agenda The Security Landscape An Introduction to Security
More informationHP ENTERPRISE SECURITY. Protecting the Instant-On Enterprise
HP ENTERPRISE SECURITY Protecting the Instant-On Enterprise HP SECURITY INTELLIGENCE AND RISK MANAGEMENT PLATFORM Advanced Protection Against Advanced Threats 360 Security Monitoring to Detect Incidents
More informationBraindumps.700-295.50.QA
Braindumps.700-295.50.QA Number: 700-295 Passing Score: 800 Time Limit: 120 min File Version: 6.0 http://www.gratisexam.com/ Comprehensive, easy and to the point study material made it possible for me
More informationJonas Vercruysse Technical Pre-sales February 2013. Endpoint Management. 2013 IBM Corporation
Jonas Vercruysse Technical Pre-sales February 2013 Endpoint Management 2013 IBM Corporation Agenda 2 Intro IBM Endpoint Manager overview Key value adds Functionalities Use cases Wrap-up Agenda 3 Intro
More informationIBM Tririga nástroj pre Real estate portfólio manažment
IBM Tririga nástroj pre Real estate portfólio manažment Druhá strana mince facility managementu Juraj Polák, Cloud & Smarter Infrastructure leader Juraj.polak@sk.ibm.com Agenda efocus 2013 lesson learned
More informationQRadar SIEM and FireEye MPS Integration
QRadar SIEM and FireEye MPS Integration March 2014 1 IBM QRadar Security Intelligence Platform Providing actionable intelligence INTELLIGENT Correlation, analysis and massive data reduction AUTOMATED Driving
More informationCisco Security Strategy Update Integrated Threat Defense. Oct 28, 2015
Cisco Security Strategy Update Integrated Threat Defense Oct 28, 2015 Breaches are the New Normal FDA Wards of Security Flaw in Infusion Pump Cisco Confidential Cisco s Covers the Threat-Centric Entire
More informationIBM Security QRadar SIEM Product Overview
IBM Security QRadar SIEM Product Overview Alex Kioni IBM Security Systems Technical Consultant 1 2012 IBM Corporation The importance of integrated, all source analysis cannot be overstated. Without it,
More informationTRANSFORMING GOVERNMENT, ONE SOLUTION AT A TIME. Networx solutions from Verizon
TRANSFORMING GOVERNMENT, ONE SOLUTION AT A TIME Networx solutions from Verizon The business of government is complex as agencies face more demands. New executive priorities must be addressed. Agency-wide
More informationIBM Security QRadar Risk Manager
IBM Security QRadar Risk Manager Proactively manage vulnerabilities and network device configuration to reduce risk, improve compliance Highlights Collect network security device configuration data to
More informationIBM Security Intelligence Strategy
IBM Security Intelligence Strategy Delivering Insight with Agility October 17, 2014 Victor Margina Security Solutions Accent Electronic 12013 IBM Corporation We are in an era of continuous breaches Operational
More informationIAN MASSINGHAM. Technical Evangelist Amazon Web Services
IAN MASSINGHAM Technical Evangelist Amazon Web Services From 2014: Cloud computing has become the new normal Deploying new applications to the cloud by default Migrating existing applications as quickly
More informationSecurity Intelligence Solutions
Security Intelligence Solutions Know what is going on inside your enterprise with QRadar Joseph Skocich, WW Sales Integration Executive Q1 Labs, an IBM Company June 2012 jskocich@us.ibm.com What is Security
More information(S2.3) Security Spotlight: How cyber criminals can steal millions in seconds and how to fight back. Johannesburg
(S2.3) Security Spotlight: How cyber criminals can steal millions in seconds and how to fight back Johannesburg Bharat Mistry Security Chief Technologist HP Enterprise Security Tweet using #HPWorldZA Johannesburg
More informationEnterprise Identity Management Reference Architecture
Enterprise Identity Management Reference Architecture Umut Ceyhan Principal Sales Consultant, IDM SEE Agenda Introduction Virtualization Access Management Provisioning Demo Architecture
More informationCA Virtual Assurance for Infrastructure Managers
PRODUCT SHEET: CA Virtual Assurance for Infrastructure Managers CA Virtual Assurance for Infrastructure Managers agility made possible CA Virtual Assurance for Infrastructure Managers is an add-on product
More informationRevolutionize your Enterprise with IT-Infrastructure-as-a-Service. Thomas Riley International MD 17 th April 2009
Revolutionize your Enterprise with IT-Infrastructure-as-a-Service Thomas Riley International MD 17 th April 2009 Agenda Key challenges facing IT leaders in this challenging climate New findings! Singapore
More informationWHITE PAPER SPLUNK SOFTWARE AS A SIEM
SPLUNK SOFTWARE AS A SIEM Improve your security posture by using Splunk as your SIEM HIGHLIGHTS Splunk software can be used to operate security operations centers (SOC) of any size (large, med, small)
More informationRealize That Big Security Data Is Not Big Security Nor Big Intelligence
G00245789 Realize That Big Security Data Is Not Big Security Nor Big Intelligence Published: 19 April 2013 Analyst(s): Joseph Feiman Security intelligence's ultimate objective, enterprise protection, is
More informationParallel Data Warehouse
MICROSOFT S ANALYTICS SOLUTIONS WITH PARALLEL DATA WAREHOUSE Parallel Data Warehouse Stefan Cronjaeger Microsoft May 2013 AGENDA PDW overview Columnstore and Big Data Business Intellignece Project Ability
More informationHow To Sell Security Products To A Network Security Company
Market Segment Definitions Author Joshua Mittler Overview In addition to product testing, NSS Labs quantitatively evaluates market size for each of the product categories tested. NSS provides metrics that
More informationSimplify and Automate IT
Simplify and Automate IT Expectations have never been higher Reduce IT Costs 30% increase in staff efficiency Reduce support costs by 25% Improve Quality of Service Reduce downtime by 75% 70% faster MTTR
More informationProtecting What Matters Most. Bartosz Kryński Senior Consultant, Clico
Protecting What Matters Most Bartosz Kryński Senior Consultant, Clico Cyber attacks are bad and getting Leaked films and scripts Employee lawsuit Media field day There are two kinds of big companies in
More informationINVESTOR PRESENTATION. Third Quarter 2014
INVESTOR PRESENTATION Third Quarter 2014 Note to Investors Certain non-gaap financial information regarding operating results may be discussed during this presentation. Reconciliations of the differences
More informationCA Systems Performance for Infrastructure Managers
PRODUCT SHEET: CA Systems Performance for Infrastructure Managers agility made possible CA Systems Performance for Infrastructure Managers CA Systems Performance for Infrastructure Managers is an add-on
More informationSmarter Security for Smarter Local Government. Craig Sargent, Solutions Specialist
Smarter Security for Smarter Local Government Craig Sargent, Solutions Specialist SUMMARY 1 Trustwave and SpiderLabs 2 Penetration Testing 3 Web Application Firewall (WAF) 4 Security Information & Event
More informationCisco Security: Moving to Security Everywhere. #TIGcyberSec. Stefano Volpi 13-10-2015
#TIGcyberSec Cisco Security: Moving to Security Everywhere Stefano Volpi 13-10-2015 2014 Cisco and/or its affiliates. All rights reserved. Cisco Public 1 Cisco is All In with Security I expect security
More informationNetApp SANscreen: come controllare i costi senza sacrificare la service quality. Roberto Patano Business Development Manager NetApp Italia
NetApp SANscreen: come controllare i costi senza sacrificare la service quality Roberto Patano Business Development Manager NetApp Italia Data Center Transformation Explosive Data Growth Dedicated Architectures
More informationCloud Database Demystified to Deliver SaaS Customer Value
Cloud Database Demystified to Deliver SaaS Customer Value 2 The business of Cloud Savvis ranks as a leader Magic Quadrant for Cloud Infrastructure-as-a-Service and Web Hosting The Magic Quadrant is copyrighted
More informationLeading The World Into Connected Security. Dipl.-Inform., CISSP, S+ Rolf Haas Enterprise Technology Specialist Content Lead EMEA
Leading The World Into Connected Security Dipl.-Inform., CISSP, S+ Rolf Haas Enterprise Technology Specialist Content Lead EMEA History of Defining Largest Dedicated Delivering a Next Generation Architecture
More informationNetwork that Know. Rasmus Andersen Lead Security Sales Specialist North & RESE
Network that Know Rasmus Andersen Lead Security Sales Specialist North & RESE Email Gateway vendor CERT AV vendor Law enforcement Web Security Vendor Network security appliance vendor IT Department App
More informationLog management & SIEM: QRadar Security Intelligence Platform
Log management & SIEM: QRadar Security Intelligence Platform Tibor Bősze Security Architect for CEE+RCIS tibor.boesze@hu.ibm.com The Security Intelligence Leader Who is Q1Labs: Innovative Security Intelligence
More informationEmbracing BYOD with MDM and NAC. Chris Isbrecht, Fiberlink Gil Friedrich, ForeScout
Embracing BYOD with MDM and NAC Chris Isbrecht, Fiberlink Gil Friedrich, ForeScout 1 Today s Agenda The BYOD Landscape Network Access Control (NAC) 101 Embracing BYOD with MDM and NAC Use Cases 2 The BYOD
More informationTop 5 Reasons to choose Microsoft Windows Server 2008 R2 SP1 Hyper-V over VMware vsphere 5
Top 5 Reasons to choose Microsoft Windows Server 2008 R2 SP1 Hyper-V over VMware Published: April 2012 2012 Microsoft Corporation. All rights reserved. This document is provided "as-is." Information and
More informationSecuring Healthcare Data on Mobile Devices
Securing Healthcare Data on Mobile Devices Michelle Cook, Healthcare Mobility Specialist Keith Glynn, CISSP, Sr. Technical Solutions Engineer October 31, 2013 Poll Question #1 Has your organization deployed
More informationBricata Next Generation Intrusion Prevention System A New, Evolved Breed of Threat Mitigation
Bricata Next Generation Intrusion Prevention System A New, Evolved Breed of Threat Mitigation Iain Davison Chief Technology Officer Bricata, LLC WWW.BRICATA.COM The Need for Multi-Threaded, Multi-Core
More information