Security challenges in Southern Europe. Thanassis Papadopoulos Country Manager

Similar documents
Introduction to Cyber Security / Information Security

McAfee - Overview. Anthony Albisser

McAfee Security Architectures for the Public Sector

I.T. Security Specialists. Cyber Security Solutions and Services. Caretower Corporate Brochure

Data Security and Healthcare

We are Passionate about Total Security Management Architecture & Infrastructure Optimisation Review

Critical Controls for Cyber Security.

FIREWALL CHECKLIST. Pre Audit Checklist. 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review.

2012 North American Enterprise Firewalls Market Penetration Leadership Award

Leading The World Into Connected Security. Dipl.-Inform., CISSP, S+ Rolf Haas Enterprise Technology Specialist Content Lead EMEA

Gabriel Coimbra Research & Consulting Director IDC Portugal. Porto, 29 de Maio

Logging In: Auditing Cybersecurity in an Unsecure World

IT Networking and Security

Solving the Desktop Dilemma

The User is Evolving. July 12, 2011

How are we keeping Hackers away from our UCD networks and computer systems?

Data Centre. Business Intelligence. Enterprise Computing Solutions United Kingdom. Security Solutions. arrow.com

Cybersecurity in an All-IP World Are You Prepared?

全 球 資 安 剖 析, 您 做 確 實 了 嗎? Albert Yung Barracuda Networks

[Selezionare la data] INNOVERY GROUP COMPANY PROFILE. [Digitare il sottotitolo del documento] * *

IS YOUR INFORMATION SECURE? Secure and reliable ICT. Our experience. Your benefit. SWISS CYBER SECURITY

Telecom Business Continuity Solutions FOR INTERNAL USE ONLY

IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including:

Can Your Budget Reshape Your Threat Landscape?

Seamless ICT Infrastructure Security.

Modular Network Security. Tyler Carter, McAfee Network Security

The STAGEnet Security Model

Endpoint & Server Protection. Brent Biernat First Vice President Network Services May 13, 2014

IBM Security QRadar SIEM & Fortinet FortiGate / FortiAnalyzer

EARTHLINK BUSINESS. Simplify the Complex

Client Security Risk Assessment Questionnaire

Unified Threat Management, Managed Security, and the Cloud Services Model

PCI Compliance for Cloud Applications

Cyber Security Market by Solution - Global Forecast to 2020

External Supplier Control Requirements

Industrial Network Security for SCADA, Automation, Process Control and PLC Systems. Contents. 1 An Introduction to Industrial Network Security 1

Sophos Acquires Cyberoam

Qualification Specification. Level 4 Certificate in Cyber Security and Intrusion For Business

Security and Privacy

Unified Identity Management

Company Profile

Injazat s Managed Services Portfolio

Simple. Smart. Professional. A 2BSecured Company

Cybersecurity: An Innovative Approach to Advanced Persistent Threats

EMERGING THREATS & STRATEGIES FOR DEFENSE. Stephen Coty Chief Security

Top 5 Security Trends and Strategies for 2011/2012 Peter Sandkuijl Europe SE manager network security psandkuijl@checkpoint.com

INFORMATION PROTECTION

Discounted Pricing MANAGED SECURITY SERVICES

Security Analytics for Smart Grid

IT Security in Banque du Liban

Lot 1 Service Specification MANAGED SECURITY SERVICES

IT is complicated. There are so many moving pieces and parts, and your business is dependent on all

What s Wrong with Information Security Today? You are looking in the wrong places for the wrong things.

External Supplier Control Requirements

Agenda. 16:00 Registration & Welcome coffee. 18:30 Fortinet Demo. 16:30 Triple C - Opening. 19:00 Q & A - Closing. 19:30 Sunset BB Dinner

Since 2005 E-SPIN SDN BHD. All Right Reserved. SIEM - Log Consolidation Management (LCM) Solution

AL RAFEE ENTERPRISES Solutions & Expertise.

e2e Secure Cloud Connect Service - Service Definition Document

Advanced Threats: The New World Order

Cyber Resilience Implementing the Right Strategy. Grant Brown Security specialist,

Web Security Update. A Radicati Group, Inc. Webconference. The Radicati Group, Inc. Copyright March 2010, Reproduction Prohibited

Glasnost or Tyranny? You Can Have Secure and Open Networks!

INCIDENT RESPONSE CHECKLIST

Compliance Overview: FISMA / NIST SP800 53

Symantec Consulting Services

Security Information & Event Management (SIEM)

How to Practice Safely in an era of Cybercrime and Privacy Fears

Phone: Fax:

MANAGED SERVICES PROVIDER. Dynamic Solutions. Superior Results.

University of California, Riverside Computing and Communications. IS3 Local Campus Overview Departmental Planning Template

Nominee: Barracuda Networks

Cisco Security: Moving to Security Everywhere. #TIGcyberSec. Stefano Volpi

Security Tool Kit System Checklist Departmental Servers and Enterprise Systems

Cisco Unified MobilityManager Version 1.2

Security in the Software Defined Data Center

IT Networking and Security

O N L I N E I N C I D E N T R E S P O N S E C O M M U N I T Y

Information Services. The University of Kent Information Technology Security Policy

1. Perimeter Security Dealing with firewall, gateways and VPNs and technical entry points. Physical Access to your premises can also be reviewed.

Mobile Security: The good, the bad, the way forward

IT Security. Muscat 15+ ABOUT US IN A GLANCE

Bellevue University Cybersecurity Programs & Courses

Security. Tiffany Trent-Abram VP, Global Product Management. November 6 th, One Connection - A World of Opportunities

Honeywell Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Honeywell Process Solutions (HPS) June 4, 2014

The Evolution of the Enterprise And Enterprise Security

Clavister InSight TM. Protecting Values

SIEM Implementation Approach Discussion. April 2012

Name: Position held: Company Name: Is your organisation ISO27001 accredited:

Say Yes to BOYD How Fortinet Enables You to Protect Your Network from the Risk of Mobile Devices

Jim Bray, Cyber Security Adviser InfoSight, Inc.

UNIFIED THREAT MANAGEMENT SOLUTIONS AND NEXT-GENERATION FIREWALLS ADMINISTRATION TOOLS NETWORK SECURITY I ENDPOINT SECURITY I DATA SECURITY

Data Loss Prevention in the Enterprise

74% 96 Action Items. Compliance

Ragy Magdy Regional Channel Manager MEA IBM Security Systems

Secure & Unified Identity

Securing the Service Desk in the Cloud

SIEM is only as good as the data it consumes

Simplify Your Network Security with All-In-One Unified Threat Management

Data Breaches and Cyber Risks

Transcription:

Security challenges in Southern Europe Thanassis Papadopoulos Country Manager

Itway Group With more than 120 M of revenues, Itway group is an important reality in Mediterranean Region Mare Nostrum- for value added distribution of e-business solutions, system integration and implementation of solutions and projects, thanks to a consolidated network of IT Partners. Itway is a group of companies, with more than 400 people, with a complete portfolio of solutions for the e-business, involving software and hardware integration, services and consultancy which allow to fulfill different needs and requirements and to solve all the issues pertaining new technologies.

Ravenna Milano Vicenza Massa Roma Paris Itway Group Madrid Barcelona Lisboa Athina Istanbul Ankara Tripoli Ravenna

Vision > Foresee and understand IT business trends to manage the change. > Through this vision, Itway VAD was able to foresee the Internet boom and understand its importance in the IT businessplace before other players. > This is the competitive advantage that led Itway VAD to its leadership, and that now allows us to offer to our partners stateof-the-art e-business technology. > We see IT as key competitive advantage in order to create social and economic wealth

The power of integration The power of Itway Group is based on an integrated approach Group Companies are able to fulfill different needs for different kinds of markets and customers, positioning themselves as reliable partners in the offer of high value added ICT solutions.

Strategy > 100% of sales through channel > major accounts (Sis, VARs) > project and opportunity oriented approach > best of breed technology selection > high value-added market areas > quick and effective logistics > flexible and adaptive marketing, sales and technical structure > financial strength and stability

Technology adoption lag of Greece 3 years

Southern Europe facts and challenges > Financial Crisis > Shrinking IT Budgets > Shriniking R&D budgets > BYOD > Social Media in Business > Unemployment > Government Budget cuts > Teleworking > Virtualization > Cloud > FUD : Fear, uncertainty and doubt > IT Security & Compliance a lesser priority > Cheaper to steal than develop research > Cost Savings with Security risks > Social Engineering as tool of hackers > Desperate people pose a security threat violating policies and rules > Turns entire countries into cyber warfare targets > Increased use of security risks for the extended enterprise > Increased Risks for the virtual Systems > Lack of control of Big Data

Technology portfolio E-business as the synergy of every of its components

Firewall/VPN IPS / IDS URL / Web Filtering AV / Endpoint Protection v Log Management Authentication Identity Management Application Control DLP

Disaster Recovery Storage Server Operating System Middleware/BPM Backup and Recovery Email Server & Archiving File Transfer Thin Client

Server Virtualization Cloud Services Application Virtualization Desktop Virtualization

Wireless Networking Videoconference Application Delivery Controller / WAN Optimization Controller

Itway services > Itway Professional Services > consultancy > technical support > presales > post sales > online services > Itway Ac@demy > Training > Certification audit

Trends and solutions to implement DATA CENTER Cloud Protection Virtual Systems Protection Change Control Database Security DDOS Application Control NETWORK Firewall / VPN Malware Protection DLP Intrusion Prevention System DDOS ENDPOINTS Application Control Device Control Host IPS / Firewall Virtual Desktop Protection Endpoint Encryption Mobile Protection WEB AND IDENTITY Web Security Email Security Identity Management Data Loss Prevention Authentication URL Filtering MALWARE PROTECTION Network Protection Web & Email Protection Endpoint protection SIEM / Log management Mobile Devices Protection REAL TIME PROTECTION SIEM Real Time Visibility Vulnerability Management Centralized Management Policy Management Network Forensics

We look to the future with experience and trust > We anticipate trends with solid foundations > Made of technology > Made of experience > Made of trusted and reliable partners > With our complete and integrated technology offering > We are innovative e-business enablers > we represent a modern partner for consulting and training > We empower your IT

Thank you for your attention