12
Going beyond perimeter defence Dragos Madarasan 26 July 2013

Going beyond perimeter defence

Embed Size (px)

DESCRIPTION

SysAdmin day 2013 presentation

Citation preview

Page 1: Going beyond perimeter defence

Going beyond perimeter defence

Dragos Madarasan26 July 2013

Page 2: Going beyond perimeter defence

•Who & What

•Security challenges in Post-PC

•Beyond perimeter defence

Agenda

Page 3: Going beyond perimeter defence

IN YOUR ZONE

Who

•Currently Support Engineer at Endava

•Former freelancer on oDesk.com

•Technologist & web enthusiast

Page 4: Going beyond perimeter defence

IN YOUR ZONE

Who

•NOT a networking/security guru

•Just looking to share my findings

•Vendor agnostic presentation

Page 5: Going beyond perimeter defence

IN YOUR ZONE

Security challenges in Post-PC

• Proliferation of web applications & mobile devices

•Virtualization

• BYOD

• Software vulnerabilities (bad code)

Page 6: Going beyond perimeter defence

IN YOUR ZONE

Beyond perimeter security

•Vulnerability & patch management

•Network access control

•Public key infrastructure

•IPsec

•Mobile device management (MDM)

Page 7: Going beyond perimeter defence

IN YOUR ZONE

Vulnerability & patch management

•Scan network infrastructure

•Determine unpatched / unsecured applications

•Automatic patch management

Page 8: Going beyond perimeter defence

IN YOUR ZONE

Network access control (802.1X)

•RADIUS protocol

•Compliance enforcement

•Remediation / quarantine

Page 9: Going beyond perimeter defence

IN YOUR ZONE

Public key infrastructure

•Self signed certificates are bad

•Provides better identification vs. passwords

Page 10: Going beyond perimeter defence

IN YOUR ZONE

Mobile device management

•No demand in Romania, yet

•BYOD will change that

Page 11: Going beyond perimeter defence

IN YOUR ZONE

Thank you!

Page 12: Going beyond perimeter defence

IN YOUR ZONE

We’re hiring!

careers.endava.com