Security 1-2-3 process

Page 1

IT SECURITY


SECURITY 1-2-3 SEE PROTECT KNOW


Companies are losing control Applications are out there somewhere

Users are out there somewhere

Content is out there somewhere On a network your customers don’t own and can’t control


Digital world create ENTERPRISE 2.0 Business

Utility

Personal


SOME APP. MOVE TO THE CLOUD Frequency that Google and Microsoft Cloud-based Applications were Found 79% 73% 69% 74%

Microsoft Office Live Microsoft Skydrive 29%

Google Mail Enterprise*

93% 92%

Google Mail Google Docs Enterprise*

8% 80% 81% 85% 76%

Google Docs Google App Engine 0% * Respective A pp-IDs were released in M ay and June o f 2010.

50% Mar. 2010

100% Oct. 2010


Web & App changes security needs •Organizations •Increased •Risk

•Users

• IT driven • Explicit risk analysis • Predictable behavior Web Server E-Mail

Exploits P2P

IM

Social Networking

PC Remote Control

Web Browser Web Mail Enterprise VoIP

ERP Office Productivity •Life is •Good

•Hackers

Personal VoIP Media

Trojans Spyware • Primarily end user driven • Little regard for risks • Unpredictable/evasive behavior Cookies Adware

Games •#HNW, Het Nieuwe Werken •Cloud Computing •Social web app’s •Decreased •Control


The problem begins at the firewall Ports ≠ Applications IP Addresses ≠ Users Packets ≠ Content

Traditional firewalls provide no visibility or control


Identify at the door

GARTNER SAYS: PLAN NOW FOR TRANSITION TO NGFW


PALO ALTO NETWORKS THE “SECRET SAUCE” THAT TRANSFORMS THE FIREWALL

App-ID Identify the application

User-ID Identify the user

Content-ID Scan the content


5 key security solutions 1.

Applications - Enterprise 2.0, a new generation of business and personal Internet applications

2.

Threats - Enterprise 2.0 threats targeting applications, sensitive data and IT resources

3.

Users - Internet-savvy employees have taken control of the network

4.

Data Loss - Risk of sensitive and confidential data leaving the network

5.

Security - Traditional firewalls and security devices can’t see or control any of the above


SECURITY 1-2-3 SEE PROTECT KNOW


SECURITY TODAY


1

SECURITY SEE!


2

SECURITY PROTECT


3

SECURITY KNOW


SECURITY 1-2-3 SEE

Next Generation Firewall defined by Gartner: “move to next-gen firewalls at the next refresh”

PROTECT KNOW

The datacentre, virtualized, is in need of Virtual Security System

Compliancy demands a cont.gap analysys: the knowledge of who is accessing your data


ON2IT MANAGED SECURITY • •

can include : can include:

• • • • • • • • • •

standard: standard : standard: standard: standard: standard: standard: standard: standard: standard:

HARDWARE/SOFTWARE/RENEWALS INSTALLATION (INTAKE/POLICY REVIEW/CONFIG./TESTING/ PLACEMENT/TESTING/DOCUMENTING/AFTER CARE) UNLIMITED POLICY CHANGE REQUESTS BACKUP OF CONFIGURATION UPDATES/UPGRADES CONTINUOUS FINETUNING COLLECT/ANALYZE/REPORT 24x7x365 TELEPHONE & ONSITE SUPPORT 24x7x365 ADVANCED REPLACEMENT MAXIMUM TIME TO FIX: 8 HOURS CONFIDENTIALITY AGREEMENT ON2IT YOUR TRUSTED PARTNER


ON2IT VALUE ADD •

EXPERIENCE: THE ON2IT WAY. ASK OUR CUSTOMERS

• • • •

TRAINED: MANAGED: SERVICE: TRY:

ON2IT SECURITY CONSULTANTS & ENGINEERS ARE PAN CERTIFIED IN-HOUSE SECURITY OPERATIONS CENTER (SOC 24x7) IN-COUNTRY SPARES AND HELPDESK FREE TRAIL + REPORT AND WITHOUT OBLIGATION


SECURITY 1-2-3 SEE

Vraag een proefplaatsing aan

PROTECT KNOW

Vraag een audit aan

Slim en veilig IT beheer met security management en compliancy

Bel ON2IT voor Smarter IT Security • info@on2it.net • +31 418 653 818


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.