Going beyond perimeter defence

Preview:

DESCRIPTION

SysAdmin day 2013 presentation

Citation preview

Going beyond perimeter defence

Dragos Madarasan26 July 2013

•Who & What

•Security challenges in Post-PC

•Beyond perimeter defence

Agenda

IN YOUR ZONE

Who

•Currently Support Engineer at Endava

•Former freelancer on oDesk.com

•Technologist & web enthusiast

IN YOUR ZONE

Who

•NOT a networking/security guru

•Just looking to share my findings

•Vendor agnostic presentation

IN YOUR ZONE

Security challenges in Post-PC

• Proliferation of web applications & mobile devices

•Virtualization

• BYOD

• Software vulnerabilities (bad code)

IN YOUR ZONE

Beyond perimeter security

•Vulnerability & patch management

•Network access control

•Public key infrastructure

•IPsec

•Mobile device management (MDM)

IN YOUR ZONE

Vulnerability & patch management

•Scan network infrastructure

•Determine unpatched / unsecured applications

•Automatic patch management

IN YOUR ZONE

Network access control (802.1X)

•RADIUS protocol

•Compliance enforcement

•Remediation / quarantine

IN YOUR ZONE

Public key infrastructure

•Self signed certificates are bad

•Provides better identification vs. passwords

IN YOUR ZONE

Mobile device management

•No demand in Romania, yet

•BYOD will change that

IN YOUR ZONE

Thank you!

IN YOUR ZONE

We’re hiring!

careers.endava.com

Recommended