DSS ITSEC 2013 Conference 07.11.2013 - SAMSUNG KNOX - FIRST TIME
DSS ITSEC 2013 Conference 07.11.2013 - HeadTechnology - IT security trends 2014
-
Upload
andris-soroka -
Category
Technology
-
view
218 -
download
0
description
Transcript of DSS ITSEC 2013 Conference 07.11.2013 - HeadTechnology - IT security trends 2014
Arturs FilatovsRegional Sales Director Baltic’s/
Member of the Board Baltics
07.11.2013
IT Security Solutions from industry leaders
The trends in IT Security innovations
History channelPHONE ELISHA GRAY AND ALEXANDER GRAHAM BELL
MICROWAVE
OVEN PERCY
LEBARON SPENCER
XEROGRAPHYCHESTER CARLSON
BARCODE NORMAN
JOSEPH WOODLAND&BERNARD SILVER
ENIAC COMPUTERJOHN MAUCHLY AND JOHN PRESPER ECKERT
EBOOKSMICHAEL
STERN HART
IPOD TONY
FADELL
WORLD WIDE WEB SIR TIM BERNERS-LEE
From desktop to mobile
Mobile IT
We are at point where functionality of desktop collides with mobility of mobile device.
On Premises vs...
Cloud
From Wired technologies to...
To Boarderless technologies
Its all about Security
Security ?• Weak security is not an option!
• Complex Security is not only option!
Top 5 Information Security Trends in 2013
1. Government surveillance– The Edward Snowden/NSA issue has been very eye-
opening
2. Cloud distrust– CompTIA’s new 4th Annual Trends in Cloud Computing confirmed that
the main reason people avoid cloud solutions was concerns over security.
3. Mobile complexity– Not just BYOD and MDM but mobile apps as well. I truly believe that the
lack of control most businesses have over mobile apps is one of the greatest risks in information security today
4. Minimal visibility– This is not because you don’t have the information. It’s there on your
network right now. The problem is a general lack of time, tools, and expertise in any given IT shop
5. Getting people on our side– Employees are the weakest link
Mobile has changed
Bring your ovn Problem
Mobilitāte skaitļos
Mobile Security status
Android ļaundabīgo kodu tendences
MOBILE CONTENT MANAGEMENT
• Secure content hub on device
• DLP for email attachments
• Remote SharePoint access
• Secure intranet browsing
MOBILE APP MANAGEMENT
• Scalable storefront for delivery
• Data containerization for DLP
• Dynamic policy & configuration
• Secure enterprise app persona
• App-specific tunneling
• … for in-house & public apps
MOBILE DEVICEMANAGEMENT
• Purpose-built multi-OS security
• Self-service provisioning/config
• BYOD privacy protection
• Certificate-based identity
• Global scale for cloud & premise
Complete Solution for Mobile IT
Wireless Breaks the Wired Security Model
Network & Personal Firewalls, IP-SEC VPN
SSL VPN, Network IDS, Host IDS
Anti-virus/ spyware/ malware/ spam
URL filters, Web proxies, IDS
Layer 3 (IP)
Layer 4 (TCP)
Layer 5 (Session)
Layer 6 (Presentation)
Layer 2 (MAC)
Layer 1 (PHY)
Unprotected
Unprotected
Layer 7 (Application) Wired Security
Wireless Security Challenges
•Visibility into Wi-Fi security risks at HQ and remote offices•Understanding which wireless connections pose a genuine threat•Inability to block, locate & remove unauthorized Wi-Fi devices•Limited IT resources and expertise to manage wireless security •Maintain compliance with regulatory and internal security
standards
The First Vendor to Offer an 11n SensorOnly an 11n sensor can protect your
investment in a/b/g and 11n infrastructure
• 11n rogue threats are here today even if you only have a/b/g installed
• 11n increases the RF exposure risk
• Laptops now shipping with 11n
Reduce deployment costs by installing 11n technology now
• Greater range reduces sensor density
• Backward compatibility with existing a/b/g wireless networks
• No additional deployment costs to upgrade sensors in 6-12 months
SpectraGuard Product Family
• SpectraGuard Enterprise Server and Sensors for mid to large organizations– Server can be delivered on an AirTight
Appliance or a ProCurve ONE Service Module– Sensors to support 802.11n and 802.11abg
networks
• SpectraGuard Online– AirTight SpectraGuard delivered as a service
offering with no capital equipment purchase required
Operations in The Baltic StatesGateway Security Host Security Network SecurityMobile Security
Managed Services & SupportManaged Services & Support
headtechnology Group
Company business card
Founded in 2000, Germany and now covering 33 countries world wide with 12 regional officesHQ in UkraineCore business – IT SecurityOffices in Berlin, Ludwigsburg, Warsaw, Riga, Kiev, Moscow, St.Petersburg, Kazan, Ekaterinburg, Minsk, Baku, Almaty, SofiaMore than 80 employeesMore than 12 vendors in portfolioOfficial distributor (for many cases exclusive) in Eastern Europe and Asia for number of products / solutions / vendorsParticipant of many IT exhibitions, road shows, business forums, ENISA IT Security Awareness program – local IT Security evangelist
Headtechnology for Partners
• Multilanguage technical, sales and marketing support
• Product, Partner Trainings, demonstrations, webexes, certifications etc.
• More than 650 partners world wide
• Innovative product portfolio• Partnership programms (Authorized,
Bronze, Silver and Gold)• Partner / Customer protection• International knowledge base
Headtechnology – Latvia /Lithuania / Estonia
• World class IT security names (best in class)
• Fits International laws regarding IT auditing (EU, NATO directives)
• Regulation compliance (HIPAA, SOX, BASEL2, GLBA, PCI, etc.)
• Best Price / Performance• Close and good relationships
with vendors for years• Local competence center
Latvia, Lithuania and Estonia
31 Cesu str. 3 floor, LV-1012, Riga, Latvia
Phone: +371 674 21 021
eMail: [email protected]: www.headtechnology.lv
Arturs Filatovs