SlideShare uma empresa Scribd logo
1 de 31
Baixar para ler offline
15 JAAR VOOROP IN ICT
SECURITY

NEXT GENERATION SECURITY
MOTIV BIEDT WEERBAARHEID EN MONITORING
VOOR UW GEBRUIKERSNETWERK OF
DATACENTER
15 JAAR VOOROP IN ICT
SECURITY

SECURITY CHALLENGES
15 JAAR VOOROP IN ICT
SECURITY

SECURITY CHALLENGES
MALWARE FOUND
15 JAAR VOOROP IN ICT
SECURITY

SECURITY CHALLENGES
BOTNETS ATTACK
15 JAAR VOOROP IN ICT
SECURITY

SECURITY CHALLENGES
GEBRUIK VAN DIVERSE
APPLICATIES
15 JAAR VOOROP IN ICT
SECURITY

SECURITY CHALLENGES
TRADITIONELE FIREWALL
15 JAAR VOOROP IN ICT
SECURITY

SECURITY CHALLENGES
PROTECT AGAINST
UNAUTHORIZED ACCES
15 JAAR VOOROP IN ICT
SECURITY
Identity
Awareness

SECURITY CHALLENGES
IPSEC VPN & IDENTITY
AWARENESS
15 JAAR VOOROP IN ICT
SECURITY

NEXT GENERATION FIREWALL
MUST HAVE . . .
15 JAAR VOOROP IN ICT
SECURITY
Policies

 Practical and relevant to daily operations

People

 Different People – Different needs
 Involve & Engage users in the security
process

Enforcement

 Multi-layer controls for strong security

[Confidential] For designated groups and individuals
15 JAAR VOOROP IN ICT
SECURITY

SECURITY CHALLENGES
NEXT GENERATION FIREWALL
15 JAAR VOOROP IN ICT
SECURITY

SECURITY CHALLENGES
PROTECT AGAINST
UNAUTHORIZED ACCES
15 JAAR VOOROP IN ICT
SECURITY
Identity
Awarenes
s

SECURITY CHALLENGES
IPSEC VPN & IDENTITY
AWARENESS
15 JAAR VOOROP IN ICT
SECURITY

SECURITY CHALLENGES
IPS & APPLICATION CONTROL
15 JAAR VOOROP IN ICT
SECURITY
IPS
Anti-Bot
Antivirus

Network Threat Prevention
Mobile Access
DLP

Sensitive Data
Application
Control
URLF

Identity
Awareness

Internet Applications Usage
User Access

Granular Visibility

Mobile
Access

SmartEvent
15 JAAR VOOROP IN ICT
SECURITY

SECURITY CHALLENGES
MULTI LAYERED THREAT
PREVENTION
15 JAAR VOOROP IN ICT
SECURITY

SECURITY CHALLENGES
THREAT MANAGEMENT
15 JAAR VOOROP IN ICT
SECURITY

SECURITY CHALLENGES
PROTECT AGAINST
UNAUTHORIZED ACCES
15 JAAR VOOROP IN ICT
SECURITY
Identity
Awareness

SECURITY CHALLENGES
IPSEC VPN & IDENTITY
AWARENESS
15 JAAR VOOROP IN ICT
SECURITY

SECURITY CHALLENGES
PROTECT AGAINST EXPLOIT OF
VULNERABILITIES IN: WORD, EXCEL, PDF,
BROWSERS, OPERATING SYSTEMS...
15 JAAR VOOROP IN ICT
SECURITY

SECURITY CHALLENGES
BLOCK MALWARE FILE DOWNLOAD AND
ACCESS TO MALWARE CONTAINING SITES
15 JAAR VOOROP IN ICT
SECURITY

SECURITY CHALLENGES
OPTIMIZED WEB SECURITY THROUGH FULL
INTEGRATION IN THE GATEWAY
15 JAAR VOOROP IN ICT
SECURITY

SECURITY CHALLENGES
OPTIMIZED WEB SECURITY THROUGH FULL
INTEGRATION IN THE GATEWAY
15 JAAR VOOROP IN ICT
SECURITY

SECURITY CHALLENGES
DISCOVER AND STOP BOT ATTACKS
15 JAAR VOOROP IN ICT
SECURITY

SECURITY CHALLENGES
FIGHT AGAINST UNKNOWN THREATS !
15 JAAR VOOROP IN ICT
SECURITY
Download file sent
to Threat
Emulation

File Inspected
in virtual
sandbox

New attack
discovered

Malware is
blocked on
the gateway

New malware
signature sent
to ThreatCloud

 Monitor unexpected behavior:
 Network activity
 File system & registry
changes

 Process activity

Internet
Security
Gateway
15 JAAR VOOROP IN ICT
SECURITY

SECURITY CHALLENGES
POWERING THREAT PREVENTION SOFTWARE
BLADES WITH REAL-TIME SECURITY
INTELLIGENCE
15 JAAR VOOROP IN ICT
SECURITY

SECURITY CHALLENGES
MULTI LAYERED THREAT PREVENTION
15 JAAR VOOROPSecurity Gateways
IN ICT
Sec.Aas platform –
SECURITY

Weerbaarheid
& Monitoring

Optioneel (maatwerk):
Data Leakage Protection
Endpoint Protection
Mobile Access
Threat Emulation

STANDAARD
Preventie
Security
Gateway
Firewall
VPN
Identity Aware

NEXT GEN
Preventie

THREAT
Preventie

Security
Gateway

Security
Gateway

Firewall
VPN
Identity Aware

Firewall
VPN
Identity Aware

IPS
App Control

IPS
App Control
Malware
Filters
URL Filters
Spam Filters
Botnet Filters
15 JAAR VOOROP IN ICT
SECURITY
SECURITY MANAGEMENT PLATFORM
BRONNEN: THREAT CLOUD & NCSC
WEERBAARHEID & MONITORING
INCIDENT / RESPONSE
15 JAAR VOOROP IN -ICT
Sec. Aas Platform samenvatting
SECURITY

Wrap-up
• Geavanceerde cyberaanvallen zijn steeds lastiger te
signaleren en blokkeren;
• Motiv Next Generation platform blokkeert aanvallen met
de beste Next Generation Technologie en security
experts van Motiv;
• Dreigingen worden direct gemitigeerd dankzij security
intelligence van ThreatCloud en opvolging van
beveiligingsadviezen van NCSC;
• 24X7 monitoring met incident/response;
• Overzichtelijke compliancy rapportages.

Mais conteúdo relacionado

Mais procurados

PhD-Guidance-in-Information-Security
PhD-Guidance-in-Information-SecurityPhD-Guidance-in-Information-Security
PhD-Guidance-in-Information-SecurityPhdtopiccom
 
Ntxissacsc5 purple 4-threat detection using machine learning-markszewczul
Ntxissacsc5 purple 4-threat detection using machine learning-markszewczulNtxissacsc5 purple 4-threat detection using machine learning-markszewczul
Ntxissacsc5 purple 4-threat detection using machine learning-markszewczulNorth Texas Chapter of the ISSA
 
Privacy in Wireless Networks
Privacy in Wireless NetworksPrivacy in Wireless Networks
Privacy in Wireless NetworksMichael Boman
 
Security from sensor to sunset. “How to approach the security in the IoT ecos...
Security from sensor to sunset. “How to approach the security in the IoT ecos...Security from sensor to sunset. “How to approach the security in the IoT ecos...
Security from sensor to sunset. “How to approach the security in the IoT ecos...Data Driven Innovation
 
AppSec Awareness: A Blueprint for Security Culture Change
AppSec Awareness: A Blueprint for Security Culture ChangeAppSec Awareness: A Blueprint for Security Culture Change
AppSec Awareness: A Blueprint for Security Culture ChangePriyanka Aash
 
CLASS 2018 - Palestra de Shad Harris (Senior Subject Matter Expert on Securit...
CLASS 2018 - Palestra de Shad Harris (Senior Subject Matter Expert on Securit...CLASS 2018 - Palestra de Shad Harris (Senior Subject Matter Expert on Securit...
CLASS 2018 - Palestra de Shad Harris (Senior Subject Matter Expert on Securit...TI Safe
 
85% of App Store Apps Fail OWASP Mobile Top 10: Are you exposed?
85% of App Store Apps Fail OWASP Mobile Top 10: Are you exposed?85% of App Store Apps Fail OWASP Mobile Top 10: Are you exposed?
85% of App Store Apps Fail OWASP Mobile Top 10: Are you exposed?NowSecure
 
RSA APJ - BLOCKCHAIN SECURITY – IS IT REALLY DIFFERENT THAN ANYTHING ELSE ?
RSA APJ - BLOCKCHAIN SECURITY – IS IT REALLY DIFFERENT THAN ANYTHING ELSE ?RSA APJ - BLOCKCHAIN SECURITY – IS IT REALLY DIFFERENT THAN ANYTHING ELSE ?
RSA APJ - BLOCKCHAIN SECURITY – IS IT REALLY DIFFERENT THAN ANYTHING ELSE ?Scott Carlson
 
Zymr Cybersecurity
Zymr Cybersecurity Zymr Cybersecurity
Zymr Cybersecurity Zymr Inc
 
What is spear phishing ( cyber attack )
What is spear phishing ( cyber attack )What is spear phishing ( cyber attack )
What is spear phishing ( cyber attack )Olivia martins
 
Five mobile security challenges facing the enterprise
Five mobile security challenges facing the enterpriseFive mobile security challenges facing the enterprise
Five mobile security challenges facing the enterpriseNowSecure
 
"10 Tips To Keep Cybercriminals Out While Coronavirus Keeps You In" Infographic
"10 Tips To Keep Cybercriminals Out While Coronavirus Keeps You In" Infographic"10 Tips To Keep Cybercriminals Out While Coronavirus Keeps You In" Infographic
"10 Tips To Keep Cybercriminals Out While Coronavirus Keeps You In" InfographicDavid McHale
 
10 Tips to Keep Criminals Out
10 Tips to Keep Criminals Out10 Tips to Keep Criminals Out
10 Tips to Keep Criminals OutNeil Kemp
 
Business Continuity and app Security
Business Continuity and app Security Business Continuity and app Security
Business Continuity and app Security Cristian Garcia G.
 
Tackling today's cyber security challenges - WISER Services & Solutions
Tackling today's cyber security challenges - WISER Services & SolutionsTackling today's cyber security challenges - WISER Services & Solutions
Tackling today's cyber security challenges - WISER Services & SolutionsCYBERWISER .eu
 
20180120 spsbre - we are moving to the cloud what about security
20180120   spsbre - we are moving to the cloud what about security20180120   spsbre - we are moving to the cloud what about security
20180120 spsbre - we are moving to the cloud what about securityArjan Cornelissen
 

Mais procurados (20)

PhD-Guidance-in-Information-Security
PhD-Guidance-in-Information-SecurityPhD-Guidance-in-Information-Security
PhD-Guidance-in-Information-Security
 
Ntxissacsc5 purple 4-threat detection using machine learning-markszewczul
Ntxissacsc5 purple 4-threat detection using machine learning-markszewczulNtxissacsc5 purple 4-threat detection using machine learning-markszewczul
Ntxissacsc5 purple 4-threat detection using machine learning-markszewczul
 
Privacy in Wireless Networks
Privacy in Wireless NetworksPrivacy in Wireless Networks
Privacy in Wireless Networks
 
Security from sensor to sunset. “How to approach the security in the IoT ecos...
Security from sensor to sunset. “How to approach the security in the IoT ecos...Security from sensor to sunset. “How to approach the security in the IoT ecos...
Security from sensor to sunset. “How to approach the security in the IoT ecos...
 
Ten Expert Tips on Internet of Things Security
Ten Expert Tips on Internet of Things SecurityTen Expert Tips on Internet of Things Security
Ten Expert Tips on Internet of Things Security
 
AppSec Awareness: A Blueprint for Security Culture Change
AppSec Awareness: A Blueprint for Security Culture ChangeAppSec Awareness: A Blueprint for Security Culture Change
AppSec Awareness: A Blueprint for Security Culture Change
 
6 Security Tips for Using Public WiFi
6 Security Tips for Using Public WiFi6 Security Tips for Using Public WiFi
6 Security Tips for Using Public WiFi
 
CLASS 2018 - Palestra de Shad Harris (Senior Subject Matter Expert on Securit...
CLASS 2018 - Palestra de Shad Harris (Senior Subject Matter Expert on Securit...CLASS 2018 - Palestra de Shad Harris (Senior Subject Matter Expert on Securit...
CLASS 2018 - Palestra de Shad Harris (Senior Subject Matter Expert on Securit...
 
85% of App Store Apps Fail OWASP Mobile Top 10: Are you exposed?
85% of App Store Apps Fail OWASP Mobile Top 10: Are you exposed?85% of App Store Apps Fail OWASP Mobile Top 10: Are you exposed?
85% of App Store Apps Fail OWASP Mobile Top 10: Are you exposed?
 
RSA APJ - BLOCKCHAIN SECURITY – IS IT REALLY DIFFERENT THAN ANYTHING ELSE ?
RSA APJ - BLOCKCHAIN SECURITY – IS IT REALLY DIFFERENT THAN ANYTHING ELSE ?RSA APJ - BLOCKCHAIN SECURITY – IS IT REALLY DIFFERENT THAN ANYTHING ELSE ?
RSA APJ - BLOCKCHAIN SECURITY – IS IT REALLY DIFFERENT THAN ANYTHING ELSE ?
 
Zymr Cybersecurity
Zymr Cybersecurity Zymr Cybersecurity
Zymr Cybersecurity
 
30 Killer Internet Security Tips
30 Killer Internet Security Tips30 Killer Internet Security Tips
30 Killer Internet Security Tips
 
What is spear phishing ( cyber attack )
What is spear phishing ( cyber attack )What is spear phishing ( cyber attack )
What is spear phishing ( cyber attack )
 
OFFICE 365 SECURITY
OFFICE 365 SECURITYOFFICE 365 SECURITY
OFFICE 365 SECURITY
 
Five mobile security challenges facing the enterprise
Five mobile security challenges facing the enterpriseFive mobile security challenges facing the enterprise
Five mobile security challenges facing the enterprise
 
"10 Tips To Keep Cybercriminals Out While Coronavirus Keeps You In" Infographic
"10 Tips To Keep Cybercriminals Out While Coronavirus Keeps You In" Infographic"10 Tips To Keep Cybercriminals Out While Coronavirus Keeps You In" Infographic
"10 Tips To Keep Cybercriminals Out While Coronavirus Keeps You In" Infographic
 
10 Tips to Keep Criminals Out
10 Tips to Keep Criminals Out10 Tips to Keep Criminals Out
10 Tips to Keep Criminals Out
 
Business Continuity and app Security
Business Continuity and app Security Business Continuity and app Security
Business Continuity and app Security
 
Tackling today's cyber security challenges - WISER Services & Solutions
Tackling today's cyber security challenges - WISER Services & SolutionsTackling today's cyber security challenges - WISER Services & Solutions
Tackling today's cyber security challenges - WISER Services & Solutions
 
20180120 spsbre - we are moving to the cloud what about security
20180120   spsbre - we are moving to the cloud what about security20180120   spsbre - we are moving to the cloud what about security
20180120 spsbre - we are moving to the cloud what about security
 

Semelhante a Next generation firewall (infosecurity 2013)

Csa summit seguridad en el sddc
Csa summit   seguridad en el sddcCsa summit   seguridad en el sddc
Csa summit seguridad en el sddcCSA Argentina
 
Vulnerability Assessment and Penetration Testing in online SCADA ICS Environm...
Vulnerability Assessment and Penetration Testing in online SCADA ICS Environm...Vulnerability Assessment and Penetration Testing in online SCADA ICS Environm...
Vulnerability Assessment and Penetration Testing in online SCADA ICS Environm...PECB
 
ALMUERZO DE TRABAJO CHECKPOINT - SECURE SOFT
ALMUERZO DE TRABAJO CHECKPOINT - SECURE SOFTALMUERZO DE TRABAJO CHECKPOINT - SECURE SOFT
ALMUERZO DE TRABAJO CHECKPOINT - SECURE SOFTCristian Garcia G.
 
Shift Toward Dynamic Cyber Resilience
Shift Toward Dynamic Cyber ResilienceShift Toward Dynamic Cyber Resilience
Shift Toward Dynamic Cyber ResilienceDarren Argyle
 
DTS Solution - ISACA UAE Chapter - ISAFE 2014 - RU PWNED - Living a Life as a...
DTS Solution - ISACA UAE Chapter - ISAFE 2014 - RU PWNED - Living a Life as a...DTS Solution - ISACA UAE Chapter - ISAFE 2014 - RU PWNED - Living a Life as a...
DTS Solution - ISACA UAE Chapter - ISAFE 2014 - RU PWNED - Living a Life as a...Shah Sheikh
 
cybersecurityprt-131017183506-phpapp02.pdf
cybersecurityprt-131017183506-phpapp02.pdfcybersecurityprt-131017183506-phpapp02.pdf
cybersecurityprt-131017183506-phpapp02.pdfAnkitShrestha37
 
cybersecurityprt-131017183506-phpapp02.pdf
cybersecurityprt-131017183506-phpapp02.pdfcybersecurityprt-131017183506-phpapp02.pdf
cybersecurityprt-131017183506-phpapp02.pdfShantanuDharekar
 
Cyber security
Cyber securityCyber security
Cyber securitymanoj duli
 
Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentationBijay Bhandari
 
Check Point vSEC - Bezpečnostní řešení pro moderní datová centra
Check Point vSEC - Bezpečnostní řešení pro moderní datová centraCheck Point vSEC - Bezpečnostní řešení pro moderní datová centra
Check Point vSEC - Bezpečnostní řešení pro moderní datová centraMarketingArrowECS_CZ
 
End to End Security - Check Point
End to End Security - Check PointEnd to End Security - Check Point
End to End Security - Check PointHarry Gunns
 
Completing your Next Generation Threat Prevention - Check Point
Completing your Next Generation Threat Prevention - Check PointCompleting your Next Generation Threat Prevention - Check Point
Completing your Next Generation Threat Prevention - Check Pointaliciasyc
 
Advanced Threat protection – Digital Era - Ajit Pillai, Director Sales – Indi...
Advanced Threat protection – Digital Era - Ajit Pillai, Director Sales – Indi...Advanced Threat protection – Digital Era - Ajit Pillai, Director Sales – Indi...
Advanced Threat protection – Digital Era - Ajit Pillai, Director Sales – Indi...eGov Magazine
 

Semelhante a Next generation firewall (infosecurity 2013) (20)

Csa summit seguridad en el sddc
Csa summit   seguridad en el sddcCsa summit   seguridad en el sddc
Csa summit seguridad en el sddc
 
Cyber security
Cyber securityCyber security
Cyber security
 
Vulnerability Assessment and Penetration Testing in online SCADA ICS Environm...
Vulnerability Assessment and Penetration Testing in online SCADA ICS Environm...Vulnerability Assessment and Penetration Testing in online SCADA ICS Environm...
Vulnerability Assessment and Penetration Testing in online SCADA ICS Environm...
 
ALMUERZO DE TRABAJO CHECKPOINT - SECURE SOFT
ALMUERZO DE TRABAJO CHECKPOINT - SECURE SOFTALMUERZO DE TRABAJO CHECKPOINT - SECURE SOFT
ALMUERZO DE TRABAJO CHECKPOINT - SECURE SOFT
 
Check Point: Securing Web 2.0
Check Point: Securing Web 2.0 Check Point: Securing Web 2.0
Check Point: Securing Web 2.0
 
Shift Toward Dynamic Cyber Resilience
Shift Toward Dynamic Cyber ResilienceShift Toward Dynamic Cyber Resilience
Shift Toward Dynamic Cyber Resilience
 
DTS Solution - ISACA UAE Chapter - ISAFE 2014 - RU PWNED - Living a Life as a...
DTS Solution - ISACA UAE Chapter - ISAFE 2014 - RU PWNED - Living a Life as a...DTS Solution - ISACA UAE Chapter - ISAFE 2014 - RU PWNED - Living a Life as a...
DTS Solution - ISACA UAE Chapter - ISAFE 2014 - RU PWNED - Living a Life as a...
 
cybersecurityprt-131017183506-phpapp02.pdf
cybersecurityprt-131017183506-phpapp02.pdfcybersecurityprt-131017183506-phpapp02.pdf
cybersecurityprt-131017183506-phpapp02.pdf
 
cybersecurityprt-131017183506-phpapp02.pdf
cybersecurityprt-131017183506-phpapp02.pdfcybersecurityprt-131017183506-phpapp02.pdf
cybersecurityprt-131017183506-phpapp02.pdf
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Generación V de ciberataques
Generación V de ciberataquesGeneración V de ciberataques
Generación V de ciberataques
 
Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentation
 
Check Point vSEC - Bezpečnostní řešení pro moderní datová centra
Check Point vSEC - Bezpečnostní řešení pro moderní datová centraCheck Point vSEC - Bezpečnostní řešení pro moderní datová centra
Check Point vSEC - Bezpečnostní řešení pro moderní datová centra
 
End to End Security - Check Point
End to End Security - Check PointEnd to End Security - Check Point
End to End Security - Check Point
 
cyber security
cyber securitycyber security
cyber security
 
Completing your Next Generation Threat Prevention - Check Point
Completing your Next Generation Threat Prevention - Check PointCompleting your Next Generation Threat Prevention - Check Point
Completing your Next Generation Threat Prevention - Check Point
 
Advanced Threat protection – Digital Era - Ajit Pillai, Director Sales – Indi...
Advanced Threat protection – Digital Era - Ajit Pillai, Director Sales – Indi...Advanced Threat protection – Digital Era - Ajit Pillai, Director Sales – Indi...
Advanced Threat protection – Digital Era - Ajit Pillai, Director Sales – Indi...
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
 
Mind the gap_cpx2022_moti_sagey_final
Mind the gap_cpx2022_moti_sagey_finalMind the gap_cpx2022_moti_sagey_final
Mind the gap_cpx2022_moti_sagey_final
 

Último

GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 

Último (20)

GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 

Next generation firewall (infosecurity 2013)

  • 1. 15 JAAR VOOROP IN ICT SECURITY NEXT GENERATION SECURITY MOTIV BIEDT WEERBAARHEID EN MONITORING VOOR UW GEBRUIKERSNETWERK OF DATACENTER
  • 2. 15 JAAR VOOROP IN ICT SECURITY SECURITY CHALLENGES
  • 3. 15 JAAR VOOROP IN ICT SECURITY SECURITY CHALLENGES MALWARE FOUND
  • 4. 15 JAAR VOOROP IN ICT SECURITY SECURITY CHALLENGES BOTNETS ATTACK
  • 5. 15 JAAR VOOROP IN ICT SECURITY SECURITY CHALLENGES GEBRUIK VAN DIVERSE APPLICATIES
  • 6. 15 JAAR VOOROP IN ICT SECURITY SECURITY CHALLENGES TRADITIONELE FIREWALL
  • 7. 15 JAAR VOOROP IN ICT SECURITY SECURITY CHALLENGES PROTECT AGAINST UNAUTHORIZED ACCES
  • 8. 15 JAAR VOOROP IN ICT SECURITY Identity Awareness SECURITY CHALLENGES IPSEC VPN & IDENTITY AWARENESS
  • 9. 15 JAAR VOOROP IN ICT SECURITY NEXT GENERATION FIREWALL MUST HAVE . . .
  • 10. 15 JAAR VOOROP IN ICT SECURITY Policies  Practical and relevant to daily operations People  Different People – Different needs  Involve & Engage users in the security process Enforcement  Multi-layer controls for strong security [Confidential] For designated groups and individuals
  • 11. 15 JAAR VOOROP IN ICT SECURITY SECURITY CHALLENGES NEXT GENERATION FIREWALL
  • 12. 15 JAAR VOOROP IN ICT SECURITY SECURITY CHALLENGES PROTECT AGAINST UNAUTHORIZED ACCES
  • 13. 15 JAAR VOOROP IN ICT SECURITY Identity Awarenes s SECURITY CHALLENGES IPSEC VPN & IDENTITY AWARENESS
  • 14. 15 JAAR VOOROP IN ICT SECURITY SECURITY CHALLENGES IPS & APPLICATION CONTROL
  • 15. 15 JAAR VOOROP IN ICT SECURITY IPS Anti-Bot Antivirus Network Threat Prevention Mobile Access DLP Sensitive Data Application Control URLF Identity Awareness Internet Applications Usage User Access Granular Visibility Mobile Access SmartEvent
  • 16. 15 JAAR VOOROP IN ICT SECURITY SECURITY CHALLENGES MULTI LAYERED THREAT PREVENTION
  • 17. 15 JAAR VOOROP IN ICT SECURITY SECURITY CHALLENGES THREAT MANAGEMENT
  • 18. 15 JAAR VOOROP IN ICT SECURITY SECURITY CHALLENGES PROTECT AGAINST UNAUTHORIZED ACCES
  • 19. 15 JAAR VOOROP IN ICT SECURITY Identity Awareness SECURITY CHALLENGES IPSEC VPN & IDENTITY AWARENESS
  • 20. 15 JAAR VOOROP IN ICT SECURITY SECURITY CHALLENGES PROTECT AGAINST EXPLOIT OF VULNERABILITIES IN: WORD, EXCEL, PDF, BROWSERS, OPERATING SYSTEMS...
  • 21. 15 JAAR VOOROP IN ICT SECURITY SECURITY CHALLENGES BLOCK MALWARE FILE DOWNLOAD AND ACCESS TO MALWARE CONTAINING SITES
  • 22. 15 JAAR VOOROP IN ICT SECURITY SECURITY CHALLENGES OPTIMIZED WEB SECURITY THROUGH FULL INTEGRATION IN THE GATEWAY
  • 23. 15 JAAR VOOROP IN ICT SECURITY SECURITY CHALLENGES OPTIMIZED WEB SECURITY THROUGH FULL INTEGRATION IN THE GATEWAY
  • 24. 15 JAAR VOOROP IN ICT SECURITY SECURITY CHALLENGES DISCOVER AND STOP BOT ATTACKS
  • 25. 15 JAAR VOOROP IN ICT SECURITY SECURITY CHALLENGES FIGHT AGAINST UNKNOWN THREATS !
  • 26. 15 JAAR VOOROP IN ICT SECURITY Download file sent to Threat Emulation File Inspected in virtual sandbox New attack discovered Malware is blocked on the gateway New malware signature sent to ThreatCloud  Monitor unexpected behavior:  Network activity  File system & registry changes  Process activity Internet Security Gateway
  • 27. 15 JAAR VOOROP IN ICT SECURITY SECURITY CHALLENGES POWERING THREAT PREVENTION SOFTWARE BLADES WITH REAL-TIME SECURITY INTELLIGENCE
  • 28. 15 JAAR VOOROP IN ICT SECURITY SECURITY CHALLENGES MULTI LAYERED THREAT PREVENTION
  • 29. 15 JAAR VOOROPSecurity Gateways IN ICT Sec.Aas platform – SECURITY Weerbaarheid & Monitoring Optioneel (maatwerk): Data Leakage Protection Endpoint Protection Mobile Access Threat Emulation STANDAARD Preventie Security Gateway Firewall VPN Identity Aware NEXT GEN Preventie THREAT Preventie Security Gateway Security Gateway Firewall VPN Identity Aware Firewall VPN Identity Aware IPS App Control IPS App Control Malware Filters URL Filters Spam Filters Botnet Filters
  • 30. 15 JAAR VOOROP IN ICT SECURITY SECURITY MANAGEMENT PLATFORM BRONNEN: THREAT CLOUD & NCSC WEERBAARHEID & MONITORING INCIDENT / RESPONSE
  • 31. 15 JAAR VOOROP IN -ICT Sec. Aas Platform samenvatting SECURITY Wrap-up • Geavanceerde cyberaanvallen zijn steeds lastiger te signaleren en blokkeren; • Motiv Next Generation platform blokkeert aanvallen met de beste Next Generation Technologie en security experts van Motiv; • Dreigingen worden direct gemitigeerd dankzij security intelligence van ThreatCloud en opvolging van beveiligingsadviezen van NCSC; • 24X7 monitoring met incident/response; • Overzichtelijke compliancy rapportages.