Building a security strategy?
-
Upload
lori-mcinnes -
Category
Technology
-
view
203 -
download
0
Transcript of Building a security strategy?
Helping customers solve business problems through technology.
Building a
STRATEGYCYBERSECURITY
Helping customers solve business problems through technology.
NWN FactsNational provider of top security services and solutions
with support from top Partners like • Cisco• Intel• HP and more
Experienced and qualified partner for your business needs, with: • 500+ Employees• Common Services/Solutions Delivery Model• Tailored Solutions for Each Customer• Certified Engineers• National Support Centers
Helping customers solve business problems through technology.
Today’s Cybersecurity Challenge
Helping customers solve business problems through technology.
It’s a Big Money BusinessCybercrime PAYS…The average data breach costs $7.2 million
and the average cost per stolen record is $214
$450B-$1TGlobal cybercrime market:
Source: Cisco presentation, The Network as Sensor
Helping customers solve business problems through technology.
Cybercrime Affects Every CompanyThere are two types of companies: Those that have been hacked… …and those that don't yet
realize they have been hacked.
Helping customers solve business problems through technology.
A Continuum of AttacksAttacks threaten corporate data making companies vulnerable across the enterprise:• General
• Network• Server• Application• Retired
Helping customers solve business problems through technology.
Companies Aren’t ReadyEnd users are complicit…Unwittingly downloading malicious add-ons from untrustworthy sources.
Source: 2015 Cisco Annual Security Report (CISR)
Helping customers solve business problems through technology.
Companies Aren’t ReadyEnd users are complicit…Falling victim to clickfraud, adware and malvertising.
Source: 2015 Cisco Annual Security Report (CISR)
Helping customers solve business problems through technology.
Companies Aren’t ReadyEnd users are complicit…Using unpatched browser software, thus providing malware an entry to the network.
Source: 2015 Cisco Annual Security Report (CISR)
Helping customers solve business problems through technology.
Today’s Cybersecurity Solution
Helping customers solve business problems through technology.
BEFOREDiscoverEnforce Harden
AFTERScope
ContainRemediate
Detect Block Defend
DURING
Enterprises need a Cybersecurity Continuum that exists before, during and after attacks.
A Cybersecurity Continuum
Helping customers solve business problems through technology.
A Cybersecurity Continuum
.
Mobile Device ManagementSecurity procedures and patterns of tech are the same when dealing with Mobile systems.
Cloud Computing InfrastructureSecurity procedures and patterns of tech are the same when dealing with Cloud systems.
Application SecuritySecurity procedures and patterns of tech are the same when dealing with Applications.
NWN Solutions
Helping customers solve business problems through technology.
A Cybersecurity ContinuumNWN Solutions
Virtual Computing EnvironmentFast software offerings have begun to proliferate the enterprise (eg. Microsoft Office 365, Salesforce.com).
Archives & BackupsAgility is the core value of cloud computing; Industries like healthcare and financial systems seem to benefit the most (eg. HIPAA, SOX, PCI DSS).
Helping customers solve business problems through technology.
A Cybersecurity ContinuumNWN Data Center Security Solutions• Network Threat Detection• Cisco ASA with Firepower Services• Cisco Cyber Threat Defense with Lancope• Cisco Web Security Appliance• Cisco AntiMalware Protection• Cisco Email Security Appliance
Helping customers solve business problems through technology.
Where to Begin?Start with an NWN Security Assessment We will assess your infrastructure,
analyze the results, then make recommendations on how to remediate and become more secure.
Once our assessment is completed we leverage our design services, then recommend products and installation services to deploy and protect the environment.
Helping customers solve business problems through technology.
Why NWN?We partner with industry leaders like Cisco. • With technologies spanning the entire security spectrum, Cisco’s AMP
helps organizations protect critical information.
• With years of experience in Cisco deployments, NWN has the experts and the expertise to make them work for you.
• Together, we deliver 100% tailored solutions that help our customers optimize their security infrastructure while bringing their organizations up to speed.
Helping customers solve business problems through technology.
Security ExpertiseNWN Offers Solutions:
Combining the expertise and flexibility of a niche, consulting firm with the capabilities of a global reseller
Leveraging full capabilities to provide end-to-end solutions
Providing identity and access control services
Helping customers solve business problems through technology.
Security ExpertiseNWN Offers Solutions:
Assessing vulnerability and event management Developing firewalls and intrusion prevention Orchestrating security policy With experience securing SLED environments
Helping customers solve business problems through technology.
Security ExpertiseNWN Offers Solutions for:
Mid-size and enterprise commercial environments
Public and hybrid cloud environments
In 2015, NWN implemented $6.1 million in Cisco Security Services
Helping customers solve business problems through technology.
A Cybersecurity ContinuumSecurity Certifications• Cisco Customer Satisfaction Excellence 13 years in a row• Cisco Master Security Certification• Cisco Advanced Content Security Specialization
Helping customers solve business problems through technology.
NWN is a Cisco Gold Master Security Partner
Delivering a Cybersecurity Continuum 24/7/365
We are able to help defend and protect your infrastructure during every stage of the attack continuum.
Learn more - Contact us at: NWN Security
Helping customers solve business problems through technology.
Additional SlidesAdditional Data Points
Helping customers solve business problems through technology.
A Continuum of AttacksNo one is immune
of companies connect to domains that host malicious files or services.
Source: Cisco presentation, Cisco Secure Data Center Solutions
Helping customers solve business problems through technology.
A Continuum of AttacksWhile you were sleeping…
Malware can remain dormant for months attacking after learning system vulnerabilities.
Attacks can happen in minutes, but detection can take weeks or months.
Beat the clock!
Source: Cisco presentation, The Network as Sensor
Helping customers solve business problems through technology.
Companies Aren’t ReadyIT is vulnerable…
Source: Cisco presentation, Cisco Secure Data Center Solutions
of breaches can be tied to misconfigured security solutions.
Helping customers solve business problems through technology.
Helping customers solve business problems through technology.
Companies Aren’t ReadyIT is vulnerable…
of IT professionals use standard security tools to help prevent security breaches.
Less than half of corporate security professionals believe their organizations can anticipate and mitigate potential security issues proactively.
Source: 2015 Cisco Annual Security Report (CISR)
Helping customers solve business problems through technology.
Helping customers solve business problems through technology.
Companies Aren’t Ready
Nearly
say their security budget is
squeezed under their
IT budget.
BUT
say executive leadership
considers security a
high priority.
Priorities, priorities
Source: 2015 Cisco Annual Security Report (CISR)
Helping customers solve business problems through technology.
Companies Aren’t ReadySacrificing Security for Agility
of security professionals believe their current security technology limits agility and performance.
Source: 2015 Cisco Annual Security Report (CISR)
Helping customers solve business problems through technology.