Protecting What Matters Most. Bartosz Kryński Senior Consultant, Clico

Similar documents
Industrial Control Systems Cyber Emergency Response Team (ICS-CERT) 2014: 245 incidents reported

Protect the data that drives our customers business. Data Security. Imperva s mission is simple:

We Secure What Matters Most: The Data Center. In physical, virtual, and cloud environments

Enterprise-Grade Security from the Cloud

End-to-End Application Security from the Cloud

10 Things Every Web Application Firewall Should Provide Share this ebook

Cutting the Cost of Application Security

5 Lines of Defense You Need to Secure Your SharePoint Environment SharePoint Security Resource Kit

Website Security. End-to-End Application Security from the Cloud. Cloud-Based, Big Data Security Approach. Datasheet: What You Get. Why Incapsula?

Applications and data are the main targets for modern attacks. Adoption of dedicated application and data security concepts, technologies and

Data Privacy: The High Cost of Unprotected Sensitive Data 6 Step Data Privacy Protection Plan

IAAS REFERENCE ARCHITECTURES: FOR AWS

Imperva Cloud WAF. How to Protect Your Website from Hackers. Hackers. *Bots. Legitimate. Your Websites. Scrapers. Comment Spammers

White Paper. Managing Risk to Sensitive Data with SecureSphere

10 Building Blocks for Securing File Data

Privilege Gone Wild: The State of Privileged Account Management in 2015

Stay ahead of insiderthreats with predictive,intelligent security

How to Secure Your SharePoint Deployment

CA Technologies Data Protection

Security for a Smarter Planet IBM Corporation All Rights Reserved.

Privilege Gone Wild: The State of Privileged Account Management in 2015

1 Introduction Product Description Strengths and Challenges Copyright... 5

SharePoint Governance & Security: Where to Start

A Layperson s Guide To DoS Attacks

<Insert Picture Here> Oracle Identity And Access Management

Compliance Doesn t Mean Security Achieving Security and Compliance with the latest Regulations and Standards

DISCOVER, MONITOR AND PROTECT YOUR SENSITIVE INFORMATION Symantec Data Loss Prevention. symantec.com

Independent process platform

Bringing Continuous Security to the Global Enterprise

Beyond passwords: Protect the mobile enterprise with smarter security solutions

FROM PRODUCT TO PLATFORM

Data Security: Fight Insider Threats & Protect Your Sensitive Data

Secure Cloud Hosting for Healthcare Organizations

How To Manage A Privileged Account Management

Vladimir Yordanov Director of Technology F5 Networks, Asia Pacific Developments in Web Application and Cloud Security

How To Buy Nitro Security

Embracing BYOD with MDM and NAC. Chris Isbrecht, Fiberlink Gil Friedrich, ForeScout

Understanding the Security Vendor Landscape Using the Cyber Defense Matrix

Adaptive IPS Security in a changing world. Dave Venman Security Engineer, UK & Ireland

WHAT EVERY CEO, CIO AND CFO NEEDS TO KNOW ABOUT CYBER SECURITY.

Securing and Monitoring Access to Office 365

Formulate A Database Security Strategy To Ensure Investments Will Actually Prevent Data Breaches And Satisfy Regulatory Requirements

DenyAll 2015 Newsletter

ForeScout CounterACT and Compliance June 2012 Overview Major Mandates PCI-DSS ISO 27002

Best Practices for a BYOD World

Introduction to Runtime Application Self Protection (RASP) Making Applications Self Protecting, Self Diagnosing and Self Testing

Protecting Your Data, Intellectual Property, and Brand from Cyber Attacks

#ITtrends #ITTRENDS SYMANTEC VISION

BIG SHIFT TO CLOUD-BASED SECURITY

The Hillstone and Trend Micro Joint Solution

F5 and Microsoft Exchange Security Solutions

IT Security & Compliance. On Time. On Budget. On Demand.

Changing the Enterprise Security Landscape

Monitoring Windows Workstations Seven Important Events

I ve been breached! Now what?

Adopt a unified, holistic approach to a broad range of data security challenges with IBM Data Security Services.

Breaking the Cyber Attack Lifecycle

KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES.

What Next Gen Firewalls Miss: 6 Requirements to Protect Web Applications

Technology Blueprint. Protect Your Servers. Guard the data and availability that enable business-critical communications

Akamai Security Products

Overview of F5 Networks. Fatih Bilger Senior Systems Engineer, Prolink.

Altiris Asset Management Suite 7.0

IBM Software Top tips for securing big data environments

Real-Time Security for Active Directory

IBM Security IBM Corporation IBM Corporation

Maintaining PCI-DSS compliance. Daniele Bertolotti Antonio Ricci

Preemptive security solutions for healthcare

Teradata and Protegrity High-Value Protection for High-Value Data

IBM Security Privileged Identity Manager helps prevent insider threats

HIGH-RISK USER MONITORING

Breaking down silos of protection: An integrated approach to managing application security

The Cloud App Visibility Blindspot

Reference Architecture: Enterprise Security For The Cloud

Securing and protecting the organization s most sensitive data

SecureVue Product Brochure

MaaSter Microsoft Ecosystem Management with MaaS360. Chuck Brown Jimmy Tsang

Securing SharePoint 101. Rob Rachwald Imperva

Are You Ready for PCI 3.1?

Feature. Log Management: A Pragmatic Approach to PCI DSS

Gartner Magic Quadrant Sources and Disclaimer

How Web Application Security Can Prevent Malicious Attacks

Everything You Need to Know About Effective Mobile Device Management. mastering the mobile workplace

85% of business networks identified with bot infections 63% of business networks identified to have downloaded malware files 89% of business networks

Key Steps to Meeting PCI DSS 2.0 Requirements Using Sensitive Data Discovery and Masking

El costo oculto de las aplicaciones Vulnerables. Faustino Sanchez. WW Security Sales Enablement. IBM Canada

ALERT LOGIC FOR HIPAA COMPLIANCE

Transcription:

Protecting What Matters Most Bartosz Kryński Senior Consultant, Clico

Cyber attacks are bad and getting

Leaked films and scripts Employee lawsuit Media field day

There are two kinds of big companies in the United States. There are those who ve been hacked and those who don t know they ve been hacked. FBI DIRECTOR JAMES COMEY October 2014

of companies have been hacked at one time or another

PERIMETER/NETWORK ENDPOINT Traditional security doesn t work APPLICATION

PERIMETER/NETWORK Insiders bypass the perimeter and compromise your data Traditional security doesn t work Malware leverages unsuspecting users Applications and data moving to the cloud

PERIMETER/NETWORK Insiders bypass the perimeter and compromise your data Traditional security doesn t work Malware leverages unsuspecting users Applications and data moving to the cloud

PERIMETER/NETWORK Insiders bypass the perimeter and compromise your data Traditional security doesn t work Malware leverages unsuspecting users Applications and data moving to the cloud

PERIMETER/NETWORK Insiders bypass the perimeter and compromise your data Traditional security doesn t work Malware leverages unsuspecting users Applications and data moving to the cloud

PERIMETER/NETWORK ENDPOINT Traditional security doesn t work Conspiring with users to steal data Duping users into opening up vulnerabilities BYOD

PERIMETER/NETWORK ENDPOINT Traditional security doesn t work Conspiring with users to steal data Duping users into opening up vulnerabilities BYOD

PERIMETER/NETWORK ENDPOINT Traditional security doesn t work Conspiring with users to steal data Duping users into opening up vulnerabilities BYOD

PERIMETER/NETWORK ENDPOINT Traditional security doesn t work Conspiring with users to steal data Duping users into opening up vulnerabilities BYOD

PERIMETER/NETWORK ENDPOINT Traditional security doesn t work APPLICATION Hackers breach applications effectively

PERIMETER/NETWORK ENDPOINT Traditional security doesn t work APPLICATION Hackers breach applications effectively

PERIMETER/NETWORK ENDPOINT Traditional security doesn t work APPLICATION

The Perimeter Is Not Enough to Protect Data EXTERNAL NG FW, IPS, IDS Technical Attacks Business Security: -Who can access data? - How are apps protected? - Are we compliant? apps data Usage INTERNAL Logic Attacks www.xyz.com www.xyz.com User Rights Customers Partners Employers Hackers Account Takeover Fraud E-Commerce E-Banking E-Health Users Financial data Creditcard data PII Unauthorized Access Careless employees Malicious insiders Compromised users 19 Confidential

Traditional security

Protect what s

Protecting is exactly what Imperva does

business-critical data and applications

OUR MISSION We are the best last line of defense between the data of the Global 2000 and the bad actors

OUR GLOBAL BUSINESS Founded in 2002 Global operations; HQ in Redwood Shores, CA 750+ employees Customers in 90+ countries

OUR CUSTOMERS 3,700+ direct; thousands Cloud-Based 325+ government agencies and departments 425+ Global 2000 companies 7 of the top 10 global telecommunications providers 3 of the top 5 - US commercial banks - global financial services firms - global computer hardware companies - global biotech companies - global diversified insurance services

Asset and vulnerability discovery Discover apps and monitor user behavior

NUMBER OF SYSTEMS USING REGULATED DATA

NUMBER OF SYSTEMS USING REGULATED DATA

CLOUD Skyfence Cloud Discovery Enables complete visibility of cloud apps WEB APP Incapsula Back Door Detection Detects and blocks hackers from installing or operating backdoors WEB APP / PARTNER Vulnerability Assessment Reduce exposure and disruption by virtually patching web app vulnerabilities Imperva products Products that cover both Protect and Comply Partners

DATABASE SecureSphere Database Assessment Server Finds sensitive data and runs assessments FILE / PARTNER Data Loss Prevention Discover and classify unstructured data Imperva products Products that cover both Protect and Comply Partners

INTELLECTUAL PROPERTY CUSTOMER & EMPLOYEE INFORMATION STRUCTURED & UNSTRUCTURED DATA

INTELLECTUAL PROPERTY CUSTOMER & EMPLOYEE INFORMATION STRUCTURED & UNSTRUCTURED DATA

INTELLECTUAL PROPERTY CUSTOMER & EMPLOYEE INFORMATION STRUCTURED & UNSTRUCTURED DATA

INTELLECTUAL PROPERTY DATACENTER & FILE SERVERS CUSTOMER & EMPLOYEE INFORMATION WEB APPLICATIONS STRUCTURED & UNSTRUCTURED DATA

DDOS Incapsula Infrastructure Protection Enables complete visibility of cloud apps DDOS Incapsula Website Protection Detects and blocks hackers from installing or operating backdoors DDOS Incapsula Name Server Protection Always-on service safeguards DNS servers from DDOS attacks Imperva products Products that cover both Protect and Comply DDOS SecureSphere Web Application Firewall Protects organizations against threats Partners

CLOUD Skyfence Cloud Analytics Detailed analytics of cloud app usage and a complete picture of risks CLOUD Skyfence Cloud Governance Protects vital business content WEB APP Incapsula Website Security Provides web sites and applications with best-of-breed protection Imperva products Products that cover both Protect and Comply WEB APP ThreatRadar Includes reputation and crowdsouced security intelligence Partners

WEB APP SecureSphere Web Application Firewall Protects organizations against threats DATABASE / PARTNER Data Masking Ensure data integrity and confidentiality by rendering sensitive data unreadable DATABASE SecureSphere Database Firewall Keeps your organization safe through visibility and reduced exposure Imperva products Products that cover both Protect and Comply FILE SecureSphere File Firewall Enables automated threat prevention for cloud apps Partners

sox HIPAA HITECH NCUA 748 IB-TRM Audit and Reporting User Rights Management GLBA REGULATIONS Monetary Authority of Singapore MANDATES India s Clause 49 PCI-DSS FISMA Financial Security Law of France EU Data Protection Directive Italy s L262/2005 BASEL II Assessment and Risk Management Attack Protection

CLOUD Skyfence Cloud Governance Combines traditional cloud discovery and risk assessment with customer-specific risk factors DATABASE SecureSphere for Big Data Helps you pass your audits and avoid hefty non-compliance fines DATABASE SecureSphere Database Activity Monitor Efficiently demonstrates database compliance Imperva products Products that cover both Protect and Comply Partners DATABASE User Rights Management Establish an automated access rights review process and demonstrate compliance

FILE File Activity Monitor Visibility to file access activity ensures business data is protected FILE User Rights Management for File Streamline complex access rights reviews and increase accuracy Imperva products Products that cover both Protect and Comply Partners

User Rights Management for File Data Loss Prevention SecureSphere File Firewall File Activity Monitor Incapsula Infrastructure Protection Incapsula Website Protection Incapsula Name Server Protection SecureSphere WAF SecureSphere Database Assessment Server SecureSphere Database Firewall SecureSphere for Big Data SecureSphere Database Activity Monitor User Rights Management Data Masking Skyfence Cloud Discovery Skyfence Cloud Analytics Skyfence Cloud Protection Skyfence Cloud Governance Vulnerability Assessment Incapsula Back Door Detection Imperva products Products that cover both Protect and Comply Partners SecureSphere WAF ThreatRadar Incapsula Website Security

Security and compliance are our ONLY focus

A LEADER Gartner Magic Quadrant for Web Application Firewalls Gartner Magic Quadrant for Web Application Firewalls by Jeremy D'Hoinne, Adam Hils, Greg Young, Joseph Feiman, 17 June 2014. This graphic was published by Gartner, Inc. as part of a larger research document and should be evaluated in the context of the entire document. The Gartner document is available upon request from Imperva. Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner's research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.

A Leader with Highest Ranking in Current Offering Category Forrester Wave for DDoS Providers, 2015 48 2015 Imperva, Inc. All rights reserved. The Forrester Wave is copyrighted by Forrester Research, Inc. Forrester and Forrester Wave are trademarks of Forrester Research, Inc. The Forrester Wave is a graphical representation of Forrester's call on a market and is plotted using a detailed spreadsheet with exposed scores, weightings, and comments. Forrester does not endorse any vendor, product, or service depicted in the Forrester Wave. Information is based on best available resources. Opinions reflect judgment at the time and are subject to change.

FAST TO DEPLOY EASY TO MANAGE GROWS SMARTER

FAST TO DEPLOY GROWS SMARTER Total of ownership EASY TO MANAGE