Upload
twinkle-sebastian
View
378
Download
1
Tags:
Embed Size (px)
DESCRIPTION
Network Infrastructure Security Management Solution can continuously provide network visualisation and identify critical attack risk. It provide security network and risk team with a firm understanding of Where the investment is needed, and Where greatest cyber attack risks lie. This understanding enable organizations to allocate resouces and take prioritized actions.
Citation preview
A Holistic approach in network security
Network Infrastructure
Security Management (NISM)
Solution
Thoughts on Network Infrastructure Security
One small hole could lead to a significant data breach
Threat agents use automated tools to find and exploit weak
points
Addressing the millions of vulnerabilities in the system
Situational awareness in the turbulent times
Is the threat against your network
is increasing or decreasing?
Where to spend the time and money
in your network
Understand all the possible attack path
Prioritizing the incidence response action, once
attacked.
After attack, understand,
How it happened & prevention
Understanding on the interaction
between the devices in the network
Understanding on the interaction
between the devices in the network
Some Facts
A recent Ponemon Institute report on perceptions about network security found
that 90 percent of responding organizations had suffered a security breach within the
previous 12 months
2012 Verizon data breach investigations report found that 97
percent of security breaches could have been prevented through a consistent, system-wide application of “simple or
intermediate controls.”
Common Challenges in NISM
Constantly changing Network complexity
exceeding human ability to analyze
Multiple point of access
Inconsistent IT implementation
Typical Network Infrastructure comprises:
Networking Hardware ( Routers, Switches, LAN Cards, Wireless Routers, Cables)
Networking Software (Network Operations and Management, Operating systems, Firewall, Network Security Applications)
Network Service (T-1 Line, DSL, Satellite, Wireless Protocols, IP Addressing)
FYI
Typical Network Infrastructure comprises: Networking Hardware ( Routers, Switches,
LAN Cards, Wireless Routers, Cables)
Networking Software (Network Operations and Management, Operating systems, Firewall,
Network Security Applications)
Network Service (T-1 Line, DSL, Satellite, Wireless Protocols, IP Addressing)
FYI
Typical Network Infrastructure comprises:
Networking Hardware ( Routers, Switches, LAN Cards, Wireless Routers, Cables)
Networking Software (Network Operations and
Management, Operating systems, Firewall, Network Security Applications)
Network Service (T-1 Line, DSL, Satellite,
Wireless Protocols, IP Addressing)
FYI
Typical Network Infrastructure comprises:
Networking Hardware ( Routers, Switches, LAN Cards, Wireless Routers, Cables)
Networking Software (Network Operations and
Management, Operating systems, Firewall, Network Security Applications)
Network Service (T-1 Line, DSL, Satellite,
Wireless Protocols, IP Addressing)
FYI
Typical Network Infrastructure comprises:
Networking Hardware ( Routers, Switches, LAN Cards, Wireless Routers, Cables)
Networking Software (Network Operations and
Management, Operating systems, Firewall, Network Security Applications)
Network Service (T-1 Line, DSL, Satellite,
Wireless Protocols, IP Addressing)
FYI
Health check on NISM
Health check on NISM
Know your Network
Health check on NISM
Know your Network Know your Assets
Health check on NISM
Know your Network Know your Assets
Know your Security
Health check on NISM
Know your Network Know your Assets
Know your Security Map the Topology
Health check on NISM
Know your Network Know your Assets
Know your Security Map the Topology Prioritize & Fix
Health check on NISM
Know your Network Know your Assets
Know your Security Map the Topology Prioritize & Fix
Monitor Continuously
Health check on NISM
Know your Network Know your Assets
Know your Security Map the Topology Prioritize & Fix
Monitor Continuously Manage Change & Build Workflows
How NISM solution prevent Cyber attacks
How NISM prevent Cyber attacks Ensure all the access controls are configured correctly
How NISM prevent Cyber attacks Ensure all the access controls are configured correctly
Maintaining situational analysis
How NISM prevent Cyber attacks Ensure all the access controls are configured correctly
Expand the new network
Maintaining situational analysis
How NISM prevent Cyber attacks Ensure all the access controls are configured correctly
Identify the greatest risk in the network
Expand the new network
Maintaining situational analysis
How NISM prevent Cyber attacks Ensure all the access controls are configured correctly
Identify the greatest risk in the network
Identifying risk
levels
Expand the new network
Maintaining situational analysis
How NISM prevent Cyber attacks Ensure all the access controls are configured correctly
Identify the greatest risk in the network
Maintain and proving with all applicable regulations
Identifying risk
levels
Expand the new network
Maintaining situational analysis
How NISM prevent Cyber attacks Ensure all the access controls are configured correctly
Identify the greatest risk in the network
Maintain and proving with all applicable regulations
Identifying risk
levels
Manage and mitigate
risk from untrusted
network / partner or
network
Expand the new network
Maintaining situational analysis
How NISM prevent Cyber attacks Ensure all the access controls are configured correctly
Identify the greatest risk in the network
Maintain and proving with all applicable regulations
Identifying risk
levels
Manage and mitigate
risk from untrusted
network / partner or
network
Expand the new network
Maintaining situational analysis
How NISM prevent Cyber attacks Ensure all the access controls are configured correctly
Identify the greatest risk in the network
Maintain and proving with all applicable regulations
Identifying risk
levels
Integrating the wireless device
Manage and mitigate
risk from untrusted
network / partner or
network
Expand the new network
Maintaining situational analysis
How NISM prevent Cyber attacks Ensure all the access controls are configured correctly
Identify the greatest risk in the network
Maintain and proving with all applicable regulations
Identifying risk
levels
Integrating the wireless device
Manage and mitigate
risk from untrusted
network / partner or
network
Expand the new network
Maintaining situational analysis
To summarize:
To summarize:
NISM solution models your security control
infrastructure to identify key points of attack
To summarize:
NISM solution models your security control
infrastructure to identify key points of attack
NISMS Identifies the holes in your security controls
To summarize:
NISM solution models your security control
infrastructure to identify key points of attack
NISMS Identifies the holes in your security controls
NISMS Identifies the holes in your security controls
Thanking you Your response: [email protected]