IT SECURITY
SECURITY 1-2-3 SEE PROTECT KNOW
Companies are losing control Applications are out there somewhere
Users are out there somewhere
Content is out there somewhere On a network your customers don’t own and can’t control
Digital world create ENTERPRISE 2.0 Business
Utility
Personal
SOME APP. MOVE TO THE CLOUD Frequency that Google and Microsoft Cloud-based Applications were Found 79% 73% 69% 74%
Microsoft Office Live Microsoft Skydrive 29%
Google Mail Enterprise*
93% 92%
Google Mail Google Docs Enterprise*
8% 80% 81% 85% 76%
Google Docs Google App Engine 0% * Respective A pp-IDs were released in M ay and June o f 2010.
50% Mar. 2010
100% Oct. 2010
Web & App changes security needs •Organizations •Increased •Risk
•Users
• IT driven • Explicit risk analysis • Predictable behavior Web Server E-Mail
Exploits P2P
IM
Social Networking
PC Remote Control
Web Browser Web Mail Enterprise VoIP
ERP Office Productivity •Life is •Good
•Hackers
Personal VoIP Media
Trojans Spyware • Primarily end user driven • Little regard for risks • Unpredictable/evasive behavior Cookies Adware
Games •#HNW, Het Nieuwe Werken •Cloud Computing •Social web app’s •Decreased •Control
The problem begins at the firewall Ports ≠ Applications IP Addresses ≠ Users Packets ≠ Content
Traditional firewalls provide no visibility or control
Identify at the door
GARTNER SAYS: PLAN NOW FOR TRANSITION TO NGFW
PALO ALTO NETWORKS THE “SECRET SAUCE” THAT TRANSFORMS THE FIREWALL
App-ID Identify the application
User-ID Identify the user
Content-ID Scan the content
5 key security solutions 1.
Applications - Enterprise 2.0, a new generation of business and personal Internet applications
2.
Threats - Enterprise 2.0 threats targeting applications, sensitive data and IT resources
3.
Users - Internet-savvy employees have taken control of the network
4.
Data Loss - Risk of sensitive and confidential data leaving the network
5.
Security - Traditional firewalls and security devices can’t see or control any of the above
SECURITY 1-2-3 SEE PROTECT KNOW
SECURITY TODAY
1
SECURITY SEE!
2
SECURITY PROTECT
3
SECURITY KNOW
SECURITY 1-2-3 SEE
Next Generation Firewall defined by Gartner: “move to next-gen firewalls at the next refresh”
PROTECT KNOW
The datacentre, virtualized, is in need of Virtual Security System
Compliancy demands a cont.gap analysys: the knowledge of who is accessing your data
ON2IT MANAGED SECURITY • •
can include : can include:
• • • • • • • • • •
standard: standard : standard: standard: standard: standard: standard: standard: standard: standard:
HARDWARE/SOFTWARE/RENEWALS INSTALLATION (INTAKE/POLICY REVIEW/CONFIG./TESTING/ PLACEMENT/TESTING/DOCUMENTING/AFTER CARE) UNLIMITED POLICY CHANGE REQUESTS BACKUP OF CONFIGURATION UPDATES/UPGRADES CONTINUOUS FINETUNING COLLECT/ANALYZE/REPORT 24x7x365 TELEPHONE & ONSITE SUPPORT 24x7x365 ADVANCED REPLACEMENT MAXIMUM TIME TO FIX: 8 HOURS CONFIDENTIALITY AGREEMENT ON2IT YOUR TRUSTED PARTNER
ON2IT VALUE ADD •
EXPERIENCE: THE ON2IT WAY. ASK OUR CUSTOMERS
• • • •
TRAINED: MANAGED: SERVICE: TRY:
ON2IT SECURITY CONSULTANTS & ENGINEERS ARE PAN CERTIFIED IN-HOUSE SECURITY OPERATIONS CENTER (SOC 24x7) IN-COUNTRY SPARES AND HELPDESK FREE TRAIL + REPORT AND WITHOUT OBLIGATION
SECURITY 1-2-3 SEE
Vraag een proefplaatsing aan
PROTECT KNOW
Vraag een audit aan
Slim en veilig IT beheer met security management en compliancy
Bel ON2IT voor Smarter IT Security • info@on2it.net • +31 418 653 818