24
Network Security for the new era David Strom Erica Wilson/Fontebonne Univ. 11/2015 Download these slides here: http://slideshare.net/davidstrom

Network security practice: then and now

Embed Size (px)

Citation preview

Page 1: Network security practice: then and now

Network Security for the new era

David StromErica Wilson/Fontebonne Univ.

11/2015Download these slides here:

http://slideshare.net/davidstrom

Page 2: Network security practice: then and now

Editorial management positions:

My background

Page 3: Network security practice: then and now

Agenda

• Old school net sec (firewalls, UTMs)• What is changing: the center is no more!• How to protect apps at the source:– BYOD/MDM– Single sign-on– VM hypervisors

Page 4: Network security practice: then and now
Page 5: Network security practice: then and now
Page 6: Network security practice: then and now
Page 7: Network security practice: then and now
Page 8: Network security practice: then and now

Then we moved to UTMs

Page 9: Network security practice: then and now
Page 10: Network security practice: then and now
Page 11: Network security practice: then and now

But networks have no perimeter anymore

Page 12: Network security practice: then and now
Page 13: Network security practice: then and now
Page 14: Network security practice: then and now
Page 15: Network security practice: then and now
Page 16: Network security practice: then and now
Page 17: Network security practice: then and now
Page 18: Network security practice: then and now
Page 19: Network security practice: then and now
Page 20: Network security practice: then and now
Page 21: Network security practice: then and now
Page 22: Network security practice: then and now
Page 23: Network security practice: then and now
Page 24: Network security practice: then and now

Thanks for your time!

Go to http://sldieshare.net/davidstrom to download these slides