1 / 17

Emerging Security Trends & Technologies

Emerging Security Trends & Technologies. Presented by Santhosh Koratt Head Consulting & Compliance SecureSynergy Pvt.Ltd. Aim. Highlight key security trends for the coming years Discuss the information risk management solutions from a technology front

quinta
Download Presentation

Emerging Security Trends & Technologies

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Emerging Security Trends & Technologies Presented by Santhosh Koratt Head Consulting & Compliance SecureSynergy Pvt.Ltd.

  2. Aim • Highlight key security trends for the coming years • Discuss the information risk management solutions from a technology front • To give a practical view of integrated security infrastructure TELECOM BANKING RETAIL IT “We are in the initial years of technology innovation and growth, namely, IT Everywhere”Source: Forrester Research PHARMA

  3. Security Trends & Technologies Confidentiality Integrity Availability

  4. Converged Endpoint Security Key Drivers • Multiple point solutions • Poor visibility & control • Compliance requirements • High cost of management Visible Trend • Emergence of holistic end point security • Endpoint security suites comprising Antivirus, Antispyware, Host-based IPS, Email Security & Network Access Control • Industry is moving towards Single Agent - Single Console concept

  5. Single Integrated Management Console expectations Web Security Network Access Control Host Intrusion PreventionDesktop Firewall Anti-Virus Anti-Spam Anti-Spyware Policy Auditing Converged Endpoint Security

  6. Data Loss Prevention Key Drivers • Unauthorized transfer of data to external devices • Growing insider attacks • Loss of data via Web & E-mail • Privacy regulations Visible Trend • Emphasis on Data discovery &classification • Solutions at host & perimeter levels • Policy based control

  7. Data Loss Prevention

  8. Information Rights Management Key Drivers • Growing outsourced relationships • Need to look beyond NDA Visible Trend

  9. Information Rights Management

  10. Mobile Device Security Key Drivers • Increasing connected mobile workforce • Lot of critical data on mobile devices • Physical theft prone devices • Full disclousure norms & compliance mandates Visible Trend • Acceptance of full disk encryption • Maturing technology Mobile Devices: “the most severe and overlooked threat to the enterprise,” Gartner Group

  11. Secure Software Engineering Key Drivers • Microsoft Patch Tuesday • Increasing VA/ PT adoption & costs • Hacktivism Visible Trend SDLC A secure product is one that protects the confidentiality, integrity, and availability of the customers’ information, and the integrity and availability of processing resources under control of the system’s owner or administrator. Source: Writing Secure Code (Microsoft.com)

  12. Secure Software Engineering

  13. Integrated Network Security Key Drivers Visible Trend

  14. Integrated Network Security

  15. Centralized Entitlement Management Key Drivers Visible Trend

  16. IT Enabled Physical Security Key Drivers Visible Trend

  17. Compliance Management Key Drivers Visible Trend

More Related