Upload
andris-soroka
View
635
Download
1
Tags:
Embed Size (px)
Citation preview
www.headtechnology.com
The trends in
IT Security
innovations
Arturs Filatovs
Value Added Distribution
headtechnology Baltics SIA
Latvia, Lithuania and Estonia
www.headtechnology.com
headtechnology Group
www.headtechnology.com
Operations in The Baltic States
Gateway Security Host Security Network Security Business
Managed Services & Support
Value Added
Distribution
Marketing
& Sales
assistance
Technical &
Integration
Support
Trainings
Certification
Business
Network
www.headtechnology.com
2nd of December, Vilnius, Lithuania
The trends in IT Security
innovations
www.headtechnology.com
Security and time
Mobility is raising, productivity is decreasing security
Problems with InfoSEC – were, are, WILL BE more
Early 90’s
• DOS applications
• Passwords
• Physical access
Year 2000
• Complex aplications
• Mobility + Productivity
• Passwords
• Physical access
Year 2011
• ?
www.headtechnology.com
Besides technology – problems with security
Top 10 Security problems in enterpise
1. Yelow Posters
2. We know better than you
3. Leaving the machine on
4. Opening e-mail attachments
5. Poor password selection
6. Loose lips sink ships
7. Laptops have legs
8. Poorly enforced security policies
9. Failing to consider the staff
10. Being slow to update
www.headtechnology.com
Key risks for shortlist
End users – the weakest link
Vulnerability – everyone vs. everything
Data access and protection
Black community makes it easy
• Google.com/hacking for dummies
• Youtube.com/how to hack passwords
• P2P for software download
www.headtechnology.com
Hall of fame in Latvia
99% Things we’ll never know
www.headtechnology.com
Solution?
Weak security is not an option!
Too much of security makes no sense!
www.headtechnology.com
IT Security puzle
www.headtechnology.com
Most important things
Monitoring (systems, users, administrators)
Vulnerability and EndPoints (done by Lumension)
Encryption (in motion / during transfer / at rest)
Agentless real time network visibility and NAC
www.headtechnology.com
MONITOR
www.headtechnology.com
Spectorsoft – Monitoring all
Theft of confidential information
Sexual or racial harassment
Discrimination claims
Fraud & embezzlement
Litigation by employees and
outside companies
Illegal downloads
www.headtechnology.com
How to use SpectorSoft?
Maximize productivity
Increase security
Reduce liability
Enforce compliance
www.headtechnology.com
ENCRYPT
www.headtechnology.com
PGP – Encryption Platform
Existing Infrastructure
PGP Encryption Solutions 3rd Party Solutions
Custom Applications
Commercial Software
Commercial Hardware
Email File Disk and Device
Mainframe Mobile Devices
PGP Encryption Platform
Key Lifecycle Key Storage Authentication / Authorization
Automated Operations and Provisioning
Policy Management
Auditing
Reporting
Logging
www.headtechnology.com
PGP solutions
PGP Universal™ Gateway Email
• User-transparent, gateway email
encryption
PGP® Desktop Email
• Email, file, disk, & IM encryption
PGP® Whole Disk Encryption
• Laptop & disk security
PGP® Command Line
• Secure FTP/batch & backups
PGP Universal™ Server Central Management of
all products
All PGP products are based on
the PGP SDK, a mature FIPS
140-2 validated cryptographic
module
PGP® Support Package for BlackBerry®
• Mobile client software
PGP® NetShare
• Shared server storage security
PDF Messenger
• Secure & Certified Statement Delivery
www.headtechnology.com
KNOW YOUR
NETWORK
www.headtechnology.com
Real time “agentless” network assesment
The Insightix Business Security Assurance (BSA) product suite is designed to detect,
identify, profile, audit and control ALL devices connected to your network.
Discovery Comprehensive collection of data from ALL network
assets, gathering complete, accurate and detailed
continuous network intelligence. This unique
approach provides always on, real-time network
visibility acting as the foundation for the BSA
solution.
Audit, Compliance
& Risk Analysis: Automated security configuration auditing,
simplifying the process of conducting
network-wide configuration audits. This
provides efficient security compliance
tracking and auditing procedures.
User Identity Profiling Establishment and maintenance of user intelligence
by correlating between user identities and specific
IP addresses. This improves audit controls, and
enhances regulatory compliance. It also significantly
enhances incident response by enabling locating
vulnerable and/or exploited hosts, and eliminating
the manual efforts to track users.
Remediation Identification of the corrective measures
that must be put in place and fix
inconsistencies with the security posture
of assets attached to the network.
Aligning the security configuration of
assets with security best practices
considerably reduces the enterprise
networks' risk of exposure.
Control &
Enforcement Safeguarding the network’s security
integrity by preventing network access
from unauthorized and/or non-compliant
elements.
www.headtechnology.com
One to hundred locations
www.headtechnology.com
Summary
www.headtechnology.com
@ the end
Privacy is dead!
www.headtechnology.com
Contacts
headtechnology Baltics SIA
Innovative IT Security Solutions
Value Added Distributor
Latvia, Lithuania and Estonia
31 Cesu str. 3rd floor,
LV-1012, Riga, Latvia
Phone: +371 674 21 021
Fax: +371 674 21 024
eMail: [email protected]
Internet: www.headtechnology.com