Download
dermot hayden n.
Skip this Video
Loading SlideShow in 5 Seconds..
Dermot Hayden PowerPoint Presentation
Download Presentation
Dermot Hayden

Dermot Hayden

95 Views Download Presentation
Download Presentation

Dermot Hayden

- - - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript

  1. Dermot Hayden

  2. Personally identifiable information Customer data Intellectual property Changing Security Landscape Digital generation set loose Information theft – not graffiti Firewall $ Complex threats.... Corporate data Mobile workers Fast changing Web-based, Invisible Targeted ...targeting commercial data Contractors, outsourcing Partners, customers Web 2.0 Regulatory disclosure and reputation damage PCI-DSS HIPAA GLBA 95/46/EC CSB 1386

  3. Increasing Pressure on IT Security Data everywhere, regulations growing Security takes too much time to manage and impacts users Threats changing, still increasing Users everywhere, using everything

  4. “ We now see 250,000+ new pieces of malware every day and that number is doubling every year” SophosLabs

  5. “30,000 websitesare infected every day and 80% of those are legitimate” SophosLabs

  6. Web is now the #1 source of risk Significant shift in the last 12-18 months… 85% Spam Web

  7. “As much as 90% of successful attacks are against vulnerabilities where a patch already exists” Gartner

  8. How Do Organisations Cope? Usually through appliance sprawl … SSL VPN Gateway Router Firewall Intrusion prevention Wireless Hotspot Spam filter Gateway antivirus Web ApplicationSecurity WAN link balancer Loadbalancer Web filter Mobile Device Mgnt Encryption EndpointProtection

  9. Complete Security Covering the entire security lifecycle URL Filtering Endpoint Web Protection Mobile Control Secure branch offices Virtualization Data Control • Anti-malware • Reduce attack surface Protect everywhere Keep people working Stop attacks and breaches • Anti-spam Web Application Firewall Patch Manager Application Control Device Control • Intrusion • prevention Mobile app security Visibility • Encryption • for cloud Clean up • User education • WiFi security Automation Access control Local self-help • Technical support • Firewall Encryption • Free Home use • Email • encryption • Tamper protection • Small updates • Live Protection • Performance • VPN

  10. “Smaller budgets and limited IT resources definitely affect buying behaviours. It’s all about finding all-in-one solutions and riding out current technology to its maximum lifeline.” CRN: IT Buying Behaviours, April 2012

  11. Two Paths to Complete Security Mid – Large Endpoint driven Small – Mid UTM driven

  12. Questions