Moving from Reactive to Proactive Securitysfisaca.org/images/FC14Presentations/S11.pdfMost Breaches...

17
Ben Ayed, CTO, Secure Access Technology Professional Strategies – S11 Moving from Reactive to Proactive Security

Transcript of Moving from Reactive to Proactive Securitysfisaca.org/images/FC14Presentations/S11.pdfMost Breaches...

Page 1: Moving from Reactive to Proactive Securitysfisaca.org/images/FC14Presentations/S11.pdfMost Breaches Involve Stolen Credentials. 5. Verizon Breach Report 2012. 2014 Fall Conference

Ben Ayed, CTO, Secure Access Technology Professional Strategies – S11

Moving from Reactive to Proactive Security

Page 2: Moving from Reactive to Proactive Securitysfisaca.org/images/FC14Presentations/S11.pdfMost Breaches Involve Stolen Credentials. 5. Verizon Breach Report 2012. 2014 Fall Conference

Traditional Security

2

2014 Fall Conference

Moving from Proactive to Reactive Security

tccordery
ISACA
tccordery
Text Box
2014 Fall Conference - "Think Big“ October 13-15, 2014
Page 3: Moving from Reactive to Proactive Securitysfisaca.org/images/FC14Presentations/S11.pdfMost Breaches Involve Stolen Credentials. 5. Verizon Breach Report 2012. 2014 Fall Conference

2014

3

2014 Fall Conference

Moving from Proactive to Reactive Security

tccordery
ISACA
tccordery
Text Box
2014 Fall Conference - "Think Big“ October 13-15, 2014
Page 4: Moving from Reactive to Proactive Securitysfisaca.org/images/FC14Presentations/S11.pdfMost Breaches Involve Stolen Credentials. 5. Verizon Breach Report 2012. 2014 Fall Conference

4

What Do Security Experts Do?

Difference Today?

2014 Fall Conference

Moving from Proactive to Reactive Security

Everything is remotely accessible

tccordery
Text Box
tccordery
ISACA
tccordery
Text Box
2014 Fall Conference - "Think Big“ October 13-15, 2014
Page 5: Moving from Reactive to Proactive Securitysfisaca.org/images/FC14Presentations/S11.pdfMost Breaches Involve Stolen Credentials. 5. Verizon Breach Report 2012. 2014 Fall Conference

Most Breaches Involve Stolen Credentials

5

Verizon Breach Report 2012

2014 Fall Conference

Moving from Proactive to Reactive Security

76% Stolen Credentials

24% Anything

Else

tccordery
ISACA
tccordery
Text Box
2014 Fall Conference - "Think Big“ October 13-15, 2014
Page 6: Moving from Reactive to Proactive Securitysfisaca.org/images/FC14Presentations/S11.pdfMost Breaches Involve Stolen Credentials. 5. Verizon Breach Report 2012. 2014 Fall Conference

APT?

6

2014 Fall Conference

Moving from Proactive to Reactive Security

Phishing against HVAC supplier

HVAC -> Target corp. network

Default credentials on internal systems

POS Malware written by a Russian teenager

Exfiltration over FTP

tccordery
ISACA
tccordery
Text Box
2014 Fall Conference - "Think Big“ October 13-15, 2014
Page 7: Moving from Reactive to Proactive Securitysfisaca.org/images/FC14Presentations/S11.pdfMost Breaches Involve Stolen Credentials. 5. Verizon Breach Report 2012. 2014 Fall Conference

New Security Perimeter

7

2014 Fall Conference

Moving from Proactive to Reactive Security

Cloud Mobile - BYOD

tccordery
ISACA
tccordery
Text Box
2014 Fall Conference - "Think Big“ October 13-15, 2014
Page 8: Moving from Reactive to Proactive Securitysfisaca.org/images/FC14Presentations/S11.pdfMost Breaches Involve Stolen Credentials. 5. Verizon Breach Report 2012. 2014 Fall Conference

Focus on User Targeted Attacks

8

2014 Fall Conference

Moving from Proactive to Reactive Security

Users: Access from Anywhere / Zero-trust Environment

>> Targeted attacks / Fishing

Devices: Mobile / BYOD

>> Mobile threats

Services: Diminishing perimeter / SaaS IaaS Cloud

>> Loss of visibility & control

tccordery
ISACA
tccordery
Text Box
2014 Fall Conference - "Think Big“ October 13-15, 2014
Page 9: Moving from Reactive to Proactive Securitysfisaca.org/images/FC14Presentations/S11.pdfMost Breaches Involve Stolen Credentials. 5. Verizon Breach Report 2012. 2014 Fall Conference

Security Must Move Up the Stack

9

2014 Fall Conference

Moving from Proactive to Reactive Security

Behavior

User

Device

Application

Service

Data

New Security

Traditional

AD HIDS

FW IDS IPS

SIM SEM

tccordery
ISACA
tccordery
Text Box
2014 Fall Conference - "Think Big“ October 13-15, 2014
Page 10: Moving from Reactive to Proactive Securitysfisaca.org/images/FC14Presentations/S11.pdfMost Breaches Involve Stolen Credentials. 5. Verizon Breach Report 2012. 2014 Fall Conference

SAT Mobile Identity

10

2014 Fall Conference

Moving from Proactive to Reactive Security

Behavior

User

Device

Application

Service

Data

Risk-based Authentication

Presence monitoring

Secure SSO

tccordery
ISACA
tccordery
Text Box
2014 Fall Conference - "Think Big“ October 13-15, 2014
Page 11: Moving from Reactive to Proactive Securitysfisaca.org/images/FC14Presentations/S11.pdfMost Breaches Involve Stolen Credentials. 5. Verizon Breach Report 2012. 2014 Fall Conference

No Passwords: Breakthrough Security & Usability

SAT Mobile IDSAT Wrapped Application

SAT Policy Console

Proximity

iPhone / Android / key Fob

11

2014 Fall Conference

Moving from Proactive to Reactive Security

tccordery
ISACA
tccordery
Text Box
2014 Fall Conference - "Think Big“ October 13-15, 2014
Page 12: Moving from Reactive to Proactive Securitysfisaca.org/images/FC14Presentations/S11.pdfMost Breaches Involve Stolen Credentials. 5. Verizon Breach Report 2012. 2014 Fall Conference

Integration In Minutes

Install SAT Adapter

Load to Enterprise

App Store

Single Sign-On

Risk-based Muti-factor Auth

Proximity Security

Geo-fencing

Application Self-Defense

Device Loss Prevention

12

2014 Fall Conference

Moving from Proactive to Reactive Security

tccordery
ISACA
tccordery
Text Box
2014 Fall Conference - "Think Big“ October 13-15, 2014
Page 13: Moving from Reactive to Proactive Securitysfisaca.org/images/FC14Presentations/S11.pdfMost Breaches Involve Stolen Credentials. 5. Verizon Breach Report 2012. 2014 Fall Conference

Proactive Security

13

2014 Fall Conference -

October 13-15, 2014

13

Convergent Authentication

No Passwords

Risk-based Multifactor Auth.

[User / Location / Application]

Convergent Application Security

Proximity Security + Geo-fencing

DLP + Encryption

Auto-wipe

Convergent Policy Console

Policy-based security

Real-time logs

Page 14: Moving from Reactive to Proactive Securitysfisaca.org/images/FC14Presentations/S11.pdfMost Breaches Involve Stolen Credentials. 5. Verizon Breach Report 2012. 2014 Fall Conference

Proactive Security

14

2014 Fall Conference

Moving from Proactive to Reactive Security

All applications are secured with one security layer

Security policies are set using one policy console

Users authenticate to all applications with one risk-based multi-factor authentication token

Real-time audit logs

tccordery
ISACA
tccordery
Text Box
2014 Fall Conference - "Think Big“ October 13-15, 2014
Page 15: Moving from Reactive to Proactive Securitysfisaca.org/images/FC14Presentations/S11.pdfMost Breaches Involve Stolen Credentials. 5. Verizon Breach Report 2012. 2014 Fall Conference

Live Demos

15

2014 Fall Conference

Moving from Proactive to Reactive Security

tccordery
ISACA
tccordery
Text Box
tccordery
Text Box
2014 Fall Conference - "Think Big“ October 13-15, 2014
Page 16: Moving from Reactive to Proactive Securitysfisaca.org/images/FC14Presentations/S11.pdfMost Breaches Involve Stolen Credentials. 5. Verizon Breach Report 2012. 2014 Fall Conference

Integrated iOS Applications:

Integrated web portals:

Integrated Systems:

Partners:

Ecosystem

16

2014 Fall Conference

Moving from Proactive to Reactive Security

tccordery
ISACA
tccordery
Text Box
2014 Fall Conference - "Think Big“ October 13-15, 2014
Page 17: Moving from Reactive to Proactive Securitysfisaca.org/images/FC14Presentations/S11.pdfMost Breaches Involve Stolen Credentials. 5. Verizon Breach Report 2012. 2014 Fall Conference

Thank You

iPhone

iPad

Secure Access Technologies Inc.

1370 Willow Rd. #2, Menlo Park, CA 94025Tel: 650 209 6670

Email: [email protected]: www.SecureAccessTechnologies.com

7 patents issued:

Proximity token / proximity security, Security layer, application self-defense, wrapper engine, SSO, mobile

tccordery
ISACA
tccordery
Text Box
2014 Fall Conference - "Think Big“ October 13-15, 2014