1 / 16

Security The Network The Cloud

Join us for a conference on cloud and network security, where industry experts will discuss the latest threats and best practices in securing networks and cloud solutions. Learn how to craft a multi-layered security approach and understand the benefits of cloud solutions in enhancing end-user security.

grenteria
Download Presentation

Security The Network The Cloud

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Cloud University – 12/03/14 SecurityThe NetworkThe Cloud Intelisys Confidential – Do Not Distribute to Third Parties

  2. Schedule for Today Welcome & Start (12 – 12:10 EST) Polycom Update (12:10 – 12:25 EST) Keynote: What is security? What are the typical components? What are your customers asking? (12:25 – 12:50 EST) The news promises to get worse before it gets better. We hear about the denial-of-service attacks, security breaches, intrusion detection and network access control when talking about cloud and network security. Every day there’s a security breach at another major retailer. Every day companies are being probed for security vulnerabilities and weaknesses. Ray Nelson will summarize these problems and other topics to give you a better understanding of how security can fit into your solutions sale. Panel 1: How to Secure your Network (12:50 – 1:50 EST) Listen to industry experts discuss how to craft and deploy a multi-layered security approach to your customers’ network design. A good security plan is no longer just a firewall.  It includes multiple layers of services to prevent and deter security breaches. Our panelists will talk about best practices around network security, intrusion prevention, DDoS, multi-site security and other factors that go into designing a highly secured network. Break (1:50 – 2:00 EST) Panel 2: Cloud Solutions: Are they more or less secure than a premise-based design? (2:00 – 3:00 EST) Listen to our Cloud providers talk about how a Cloud solution can enhance your end-user with security benefits. Typically people think that the Cloud is not secure.  Leveraging Desktop-as-a-Service, hardened data centers, managed services and various other industry best practices, a Cloud solution will most likely be more secure than what a customer has deployed themselves.  We will discuss various Cloud solutions, including supporting home-based workers, road warriors and wireless solutions.   Conclusion (3 – 3:15) Intelisys Confidential – Do Not Distribute to Third Parties

  3. Goals for Today • Describe security and its many components • Understand the threats • Understand the complexity • Discuss how we can help your customers Intelisys Confidential – Do Not Distribute to Third Parties

  4. $1.5M Monitored cyber attacks in the US in 2013…   16856 times as year a company is attacked. - IBM Security Services April 2014 SMBs collectively made up more than half of all targeted attacks at 61 percent – up from 50 percent in 2012 – with medium-sized (2,500+ employees) businesses seeing the largest increase.   - Symantec Internet Security Threat Report -  April 2014 Scary Times Intelisys Confidential – Do Not Distribute to Third Parties

  5. The Blob Intelisys Confidential – Do Not Distribute to Third Parties

  6. "We want our network to be like an M&M, with a hard crunchy outside and a soft chewy center.“ M&M ‘s No More Intelisys Confidential – Do Not Distribute to Third Parties

  7. Insider Threat – Edward Snowden Cyber attacks – Foreign Governments Social Media – Facebook, Fantasy Football DDOS and Botnets – Xbox Live Consumer products – Android/iPhones Malware Outdated Systems – XP Data gone AWOL – The lost laptop Unsecure Wireless Networks – Really The internet of things – securing the cloud Top 10 Security Threats – Present and Future Intelisys Confidential – Do Not Distribute to Third Parties

  8. Anatomy of aN Attack Intelisys Confidential – Do Not Distribute to Third Parties

  9. Anatomy of aN Attack Intelisys Confidential – Do Not Distribute to Third Parties

  10. Anatomy of aN Attack Intelisys Confidential – Do Not Distribute to Third Parties

  11. Security Breach – Poor Password policy allowed for a VPN access issue. No password policy Senior members of organization were the worst offenders Allowed access to all of the corporate information Email Spam Server – Found 2 separate customers with issues Poor password policy allowed for a relay server Poor security allowed for SPAM servers on network choking is Internet performance Asked for bigger circuits, but discovered he did not need them Wireless Security – No security key Allowed competition access to network Personal Experience Intelisys Confidential – Do Not Distribute to Third Parties

  12. Firewall and VPN – FW/VPN Anti-Virus and Spam Control – AV/SPAM Intrusion Detection System - IDS Intrusion Prevention System - IPS Unified Threat Management - UTM Network Admission Control – NAC Application Control and Next Generation Firewalls – NGFW Security Intelligence Security as a Service - SECaaS History of acronyms Intelisys Confidential – Do Not Distribute to Third Parties

  13. "Mobile security breaches are — and will continue to be — the result of misconfiguration and misuse on an app level, rather than the outcome of deeply technical attacks on mobile devices," said Dionisio Zumerle, principal research analyst at Gartner. "A classic example of misconfiguration is the misuse of personal cloud services through apps residing on smartphones and tablets. When used to convey enterprise data, these apps lead to data leaks that the organization remains unaware of for the majority of devices."  - Gartner May 2014 Network Firewalls(Access Control, DDOS, UTM) Direct Connections VPN(Users & site-site) System Servers Desktops Applications End Users – Knowledgeable Users Mobility Mobile Phones MDM Application Control Wireless Devices Monitor Secure End Users Behavioral – Physical surroundings, logical thought process Areas we need to Secure Intelisys Confidential – Do Not Distribute to Third Parties

  14. Security as a service (SECaaS) is a business model in which a large service provider integrates their security services into a corporate infrastructure on a subscription basis more cost effectively than most individuals or corporations can provide on their own, when total cost of ownership is considered. In this scenario, security is delivered as a service from the cloud, without requiring on-premises hardware avoiding substantial capital outlays. These security services often include authentication, anti-virus, anti-malware/spyware, intrusion detection, and security event management, among others. • Security-as-a-Service offers a number of benefits, including: • Constant virus definition updates that are not reliant on user compliance. • Greater security expertise than is typically available within an organization. • Faster user provisioning. • Outsourcing of administrative tasks, such as log management, to save time and money and allow an organization to devote more time to its core competencies. • A Web interface that allows in-house administration of some tasks as well as a view of the security environment and on-going activities. Security as a Service Intelisys Confidential – Do Not Distribute to Third Parties

  15. Highly secure data centers Inherent security benefits due to multi-tenancy Leverage the “as a Service” Model Migration to the cloud can be a redo Desktop as a Service and its benefits The Cloud and its many Benefits Intelisys Confidential – Do Not Distribute to Third Parties

  16. Questions Conclusion Intelisys Confidential – Do Not Distribute to Third Parties

More Related