Emerging Security Trends & Technologies
Presented by
Santhosh KorattHead Consulting & ComplianceSecureSynergy Pvt.Ltd.
“We are in the initial years of technology innovation and growth, namely, IT Everywhere”
Source: Forrester Research
TELECOM BANKING
RETAIL
PHARMA
Highlight key security trends for the coming years
Discuss the information risk management solutions from a technology front
To give a practical view of integrated security infrastructure
Aim
IT
Security Trends & Technologies
Multiple point solutions
Poor visibility & control
Compliance requirements
High cost of management
Emergence of holistic end point security
Endpoint security suites comprising Antivirus, Antispyware, Host-based IPS, Email Security & Network Access Control
Industry is moving towards Single Agent - Single Console concept
Converged Endpoint Security
Converged Endpoint Security
Data Loss Prevention
Unauthorized transfer of data to external devices
Growing insider attacks
Loss of data via Web & E-mail
Privacy regulations
Emphasis on Data discovery &classification
Solutions at host & perimeter levels
Policy based control
Data Loss Prevention
Information Rights Management
• Growing outsourced relationships• Need to look beyond NDA
•
Information Rights Management
Mobile Device Security
Increasing connected mobile workforce
Lot of critical data on mobile devices
Physical theft prone devices
Full disclousure norms & compliance mandates
Acceptance of full disk encryption
Maturing technology
Mobile Devices: “the most severe and overlooked threat to the enterprise,”
Gartner Group
Secure Software Engineering
• Microsoft Patch Tuesday• Increasing VA/ PT adoption & costs• Hacktivism
•
A secure product is one that protects the confidentiality, integrity, and availability of the customers’ information, and the integrity and availability of processing resources under
control of the system’s owner or administrator.Source: Writing Secure Code (Microsoft.com)
Secure Software Engineering
Integrated Network Security
•
•
Integrated Network Security
Centralized Entitlement Management
•
•
IT Enabled Physical Security
•
•
Compliance Management
•
•