SlideShare uma empresa Scribd logo
1 de 94
Sigal Russin’s work/ Copyright@2014
Do not remove source or attribution from any slide, graph or portion of graph
1
Sigal Russin
STKI “IT Knowledge Integrators”
sigalr@stki.info
New Obstacle
run for
“delivery”
managers
Security & Networking
Sigal Russin’s work/ Copyright@2014
Do not remove source or attribution from any slide, graph or portion of graph
IT is divided into two distinct “worlds”
2
Sigal Russin’s work/ Copyright@2014
Do not remove source or attribution from any slide, graph or portion of graph
System of records
3
Reduce
Operating
Expenses
Long development and
deployment cycles
Sigal Russin’s work/ Copyright@2014
Do not remove source or attribution from any slide, graph or portion of graph
System of engagement
4
Invest
in new
systems
Touch people
In-moment decisions
Personalized & in-context
Social and analytics driven
short & rapid releases
Sigal Russin’s work/ Copyright@2014
Do not remove source or attribution from any slide, graph or portion of graph
5
CIO has 2 faces
Sigal Russin’s work/ Copyright@2014
Do not remove source or attribution from any slide, graph or portion of graph
Goals of the “engagement systems”
Deliver “best of class” customer experience
Focus on personalization “push” mode
Design for people to people interaction models
Drive relevancy with context not content
Deliver value for customers (time is the constraint for customers)
Move mobile strategies from campaign to e-commerce
Address big and small data (from BI through streaming analytics)
6
Sigal Russin’s work/ Copyright@2014
Do not remove source or attribution from any slide, graph or portion of graph
IT Delivery as a Factory!
7
XaaS
IT Delivery Services (SW + HW)
Sigal Russin’s work/ Copyright@2014
Do not remove source or attribution from any slide, graph or portion of graph
IT Delivery as a Factory!
8
Elastic
On-Demand
Usage Metered
Self-Service Access
Line of Businesses
IT Delivery Services (SW + HW)
Sigal Russin’s work/ Copyright@2014
Do not remove source or attribution from any slide, graph or portion of graph
IT Delivery Challenges
9
“Records” and “Engagement” share the
same IT Delivery problem domains
But might address these challenges
differently
Sigal Russin’s work/ Copyright@2014
Do not remove source or attribution from any slide, graph or portion of graph
IT Talent
10
Sigal Russin’s work/ Copyright@2014
Do not remove source or attribution from any slide, graph or portion of graph
11
Obstacles in the “System of records” delivery domain
Printing
infrastructure
Versatile
Communications
(Collaboration)
Obstacle
#8
API Security
Cyber Security
Identity and
access
management
Sigal Russin’s work/ Copyright@2014
Do not remove source or attribution from any slide, graph or portion of graph
Good communication is fundamental
Todays Communication network:
Data and voice in separate network
A lot of vendors
Separate maintenance for each network
More employees for each network
High costs
The solution: Unified Communication.
Combining telephony and business data on the same network. It gives the ability to combine and
use voice, data , video information in common business applications, saving and forwarding
whole instant message streams, faxes, e-mails, voice phone calls or videoconferencing sessions
as blocks of data.
12
Sigal Russin’s work/ Copyright@2014
Do not remove source or attribution from any slide, graph or portion of graph
CIOs Extend Unified Communications to Mobile Devices
Source: survey by IDG Enterprise, CIO's parent company
Why invest in UC?
61% - to boost employee productivity
42% - to increase flexibility for employees
The biggest obstacles to UC investments:
54% - the high cost
47% - systems integration headaches
33%- lack of in-house expertise
31% - security and privacy
UC deployments often cost at least $250,000, and can top $1 million
at large companies
13
Sigal Russin’s work/ Copyright@2014
Do not remove source or attribution from any slide, graph or portion of graph
14
Unified Communications Areas
Source: Gartner
Sigal Russin’s work/ Copyright@2014
Do not remove source or attribution from any slide, graph or portion of graph
15
How Many Horses In This Race?
Traditional PBX
vendors
• Cisco
• Avaya
• Siemens
• Alcatel-Lucent
OpenTouch
• Etc.
Desktop vendors
• IBM SameTime
• Microsoft LYNC
Social networking
with
Consumerization
• Google
• Skype Microsoft
• LinkedIn
• Facebook
Sigal Russin’s work/ Copyright@2014
Do not remove source or attribution from any slide, graph or portion of graph
Insights from Customer Roundtables
Maintaining the current UC infrastructure is complicated because many vendors
are involved
Different organizational cultures can lead to failure or success in UC projects
LYNC market share is very strong in Israel because most of the organizations
Microsoft based. But what about IPTEL with LYNC?
Cross organization projects that can optimize work and change organizational
culture
16
Sigal Russin’s work/ Copyright@2014
Do not remove source or attribution from any slide, graph or portion of graph
Web Browser with Real Time Communication
 No need to install
client/plug In.
 Supported in the
browser/Mobile.
 Better user
experience –Click
to call.
 Contact Center-
Meta Data of the
customers.
17
Sigal Russin’s work/ Copyright@2014
Do not remove source or attribution from any slide, graph or portion of graph
WebRTC - Web Real Time Collaboration
Google –disruptive competitor. The Google Apps Suite, which offers
functionality analogous (if not directly comparable) to Office, Exchange,
Sharepoint, Yammer and Lync.
Cisco Communications Manager (CUCM)- seeing an online contact in
your browser and being able to call their mobile directly from there, but
having your CUCM make and control the call. Also, if you take or make a
call through the CUCM, your online status or presence changes to reflect
this.
Source: http://www.irishtimes.com/blogs/eircom-business-centre/2013/03/25/top-three-trends-from
-unified-communications-expo-2013/
18
Sigal Russin’s work/ Copyright@2014
Do not remove source or attribution from any slide, graph or portion of graph
Future
Unified
Communication
19
Source:http://blog.dimensiondata.com/2013/04/the-future-of-unified-communications-and-
collaboration/
Sigal Russin’s work/ Copyright@2014
Do not remove source or attribution from any slide, graph or portion of graph
20
Sigal Russin’s work/ Copyright@2014
Do not remove source or attribution from any slide, graph or portion of graph
Unified Communication as a Service
21
Source:http://www.orange-business.com/en/blogs/enterprising-
business/unified-communications/hybrid-cloud-drives-ucaas-adoption
Sigal Russin’s work/ Copyright@2014
Do not remove source or attribution from any slide, graph or portion of graph
API obstacles
•Market transition to the POST-PC enterprise
It is an app world. The web just lives in it (Flurry Report)
•How customers experience your product or service?
•How your customers and partners access or integrate your data and resources into their
public or private sites and applications?
The solution : secure API.
22
Sigal Russin’s work/ Copyright@2014
Do not remove source or attribution from any slide, graph or portion of graph
API management & Security
23
Sigal Russin’s work/ Copyright@2014
Do not remove source or attribution from any slide, graph or portion of graph
APIs are the lifeblood of mobility
API definition - an Application programming interface
is a way for 2 computer applications to talk to each
other over a network (internet) using common
language that both understand
24
Sigal Russin’s work/ Copyright@2014
Do not remove source or attribution from any slide, graph or portion of graph
Organizations must to open up
25
Source:http://www.slideshare.net/rnewton/api-security-and-management-best-practices
Sigal Russin’s work/ Copyright@2014
Do not remove source or attribution from any slide, graph or portion of graph
26
Sigal Russin’s work/ Copyright@2014
Do not remove source or attribution from any slide, graph or portion of graph
27
Sigal Russin’s work/ Copyright@2014
Do not remove source or attribution from any slide, graph or portion of graph
API Management & Security with CA Layer 7
 Secure externalized data and
business services
 Protect against DOS and API attacks
 Wrap app with security policy &
jailbreak detection
 Cache, throttle and meter
 Learn about APIs available for use
 Grant certificates for access
 Test environment
 API usage metrics & reporting
 Accelerate API projects through
cloud delivery
 Deliver API gateway and developer
portal capabilities from the cloud
 Reach cloud, mobile and smart
technology markets faster
 Leverage existing application
infrastructures
 Convert legacy apps to REST API
 Create API composite applications
Protocol Adaptation Security & Govern
Developer Portal SaaS (Apify)
28
Sigal Russin’s work/ Copyright@2014
Do not remove source or attribution from any slide, graph or portion of graph
API Management & Security with IBM DataPower
29
Sigal Russin’s work/ Copyright@2014
Do not remove source or attribution from any slide, graph or portion of graph
Multiple
access
control
methods are
necessary.
use HTTPS
and more
strong
authenticatio
n mechanisms
OAuth, mutual (two-
way) TLS (transport
layer security)
authentication
SAML (security
assertion
markup
language)
tokens
DoS Attacks Against APIs
30
November 2010
Source: https://blog.apigee.com/detail/a_growing_threat_dos_attacks_against_apis
If you increase use of APIs, make sure you are paying
attention to DoS attacks.
Sigal Russin’s work/ Copyright@2014
Do not remove source or attribution from any slide, graph or portion of graph
End-to-End Security for the Digital Value Chain
31
Roll-Based
Access
control
DoS
Attacks
AAA via
OAuth,
SAML, and
LDAP
Policy
management
for
authorization
Sigal Russin’s work/ Copyright@2014
Do not remove source or attribution from any slide, graph or portion of graph
API-centric architecture meet security requirements
32
Developer
• Ability to create
and deploy apps
and configure
security (not code)
via the API and
self-service
management
portal
API architect
• Ability to securely
expose the back-
end services with
necessary
authentication,
authorization, and
threat protection
Security architect
• Protect high value
assets (sensitive
data) that are being
exposed via APIs,
while meeting
enterprise security
standards for
authentication,
authorization, and
auditing (AAA)
Application/business
owner
• Ability to manage
availability, risk,
and compliance
when delivering an
API service to end
users accessing
from any device at
anytime
Source: http://pages.apigee.com/rs/apigee/images/apigee-securing-the-digital-enterprise-ebook-02-2014.pdf
Sigal Russin’s work/ Copyright@2014
Do not remove source or attribution from any slide, graph or portion of graph
Business changes driven by APIs
Source:http://www.slideshare.net/balaiyer/why-do-we-need-ap-is
33
Sigal Russin’s work/ Copyright@2014
Do not remove source or attribution from any slide, graph or portion of graph
STKI Summit 2014 Frame tale: IDM project manager
34
Sigal Russin’s work/ Copyright@2014
Do not remove source or attribution from any slide, graph or portion of graph
Are you really you ?
35
 How can you know that “Avi” –CFO in your
business is not someone else? Another
employee?
 How do you recognize your employee and your
customers?
 How do you know that “Avi” had the correct
permissions to access enterprise resources?
 If “Avi” moves to another role, what are his new
permissions/access ?
Sigal Russin’s work/ Copyright@2014
Do not remove source or attribution from any slide, graph or portion of graph
Credential Theft
36
Sigal Russin’s work/ Copyright@2014
Do not remove source or attribution from any slide, graph or portion of graph
Identity Theft
2 Million Stolen Passwords Recovered
326,129 Facebook passwords (59%)
70,532 passwords for Google (13%)
59,549 for Yahoo (11%)
21,708 for Twitter (4%)
8,490 LinkedIn (2%)
37
You have to protect your sensitive business data from outsiders (especially
your employees) - take control over the identities & their accesses!
Sigal Russin’s work/ Copyright@2014
Do not remove source or attribution from any slide, graph or portion of graph
Control your sensitive business data
38
Sigal Russin’s work/ Copyright@2014
Do not remove source or attribution from any slide, graph or portion of graph
Why should we manage our identity?
Employees having
difficulty remembering
all of their accounts
and credentials.
Cloud integration
within a local network,
collaboration with
multiple cloud
suppliers.
Strict legislation and
regulations
Make information
widely available to
members of a business
Source: http://secureidnews.com/news-item/identity-and-access-management-what-is-in-store-for-2014/#sthash.GVUOvxeu.dpuf
39
Sigal Russin’s work/ Copyright@2014
Do not remove source or attribution from any slide, graph or portion of graph
Technologies to control your ID
Source: http://secureidnews.com/news-item/identity-and-access-management-what-is-in-store-for-2014/#sthash.GVUOvxeu.dpuf
40
Sigal Russin’s work/ Copyright@2014
Do not remove source or attribution from any slide, graph or portion of graph
Securing the Digital Enterprise
41
Source:http://pages.apigee.com/rs/apigee/images/apigee-securing-the-digital-enterprise-
ebook-02-2014.pdf
Sigal Russin’s work/ Copyright@2014
Do not remove source or attribution from any slide, graph or portion of graph
Inside your business
42
Source:http://cloudtweaks.com/2013/05/identity-access-management-perspective-saas-application/
Sigal Russin’s work/ Copyright@2014
Do not remove source or attribution from any slide, graph or portion of graph
IDM is not an easy project
43
Sigal Russin’s work/ Copyright@2014
Do not remove source or attribution from any slide, graph or portion of graph
44
Sigal Russin’s work/ Copyright@2014
Do not remove source or attribution from any slide, graph or portion of graph
45
Sigal Russin’s work/ Copyright@2014
Do not remove source or attribution from any slide, graph or portion of graph
Why we need IAM?
46
Finance department
Moving
Marketing department
Billing
System
ERP
finance
Employee
attendance
system
Enterprise
Portal
ERP
marketing
CRM Graphic
Design
System
Social
networks
We need
HR help!
Translate the business world into project specification process
It is not about technology! Support from organization's high management is also need.
Matching expectations of project initiators, users and desicsion makers
Hierarchical
organizational
structure
Sigal Russin’s work/ Copyright@2014
Do not remove source or attribution from any slide, graph or portion of graph
Active Directory Protection | Identity Theft Detection
47
Sigal Russin’s work/ Copyright@2014
Do not remove source or attribution from any slide, graph or portion of graph
Insights from Customer Roundtables
Cross organization project, need management support and
awareness.
Most customers are in the middle or beginning of
implementing an IDM project
Regular maintenance and human resources .
Most of these projects are failed or stopped
(budget, support, maintenance etc.)
48
Sigal Russin’s work/ Copyright@2014
Do not remove source or attribution from any slide, graph or portion of graph
STKI Summit 2014 Frame tale: The Network manager
49
Sigal Russin’s work/ Copyright@2014
Do not remove source or attribution from any slide, graph or portion of graph
Networking
50
Multiple virtualized machines exchange
multiple traffic flows.
Switching routes and juggling bandwidth
can be a headache.
Network hardware costs, network
management costs – human resource
Secure all networking components
Can not control business applications- they
run separately.
Sigal Russin’s work/ Copyright@2014
Do not remove source or attribution from any slide, graph or portion of graph
General Shift in Networking
51
Sigal Russin’s work/ Copyright@2014
Do not remove source or attribution from any slide, graph or portion of graph
Current Network
Control Plane
Data Plane
52
Sigal Russin’s work/ Copyright@2014
Do not remove source or attribution from any slide, graph or portion of graph
53
SDN- Software Defined Network
Control Plane
Data PlaneData Plane
Data Plane
Sigal Russin’s work/ Copyright@2014
Do not remove source or attribution from any slide, graph or portion of graph
Packet-Forwarding
Hardware
Openflow Firmware
Packet-Forwarding
Hardware
Openflow Firmware
Packet-Forwarding
Hardware
Openflow Firmware
Packet-Forwarding
Hardware
Openflow Firmware
Network Operating System –SDN Controller
Open Interface
to Hardware
Open API
The “Software-Defined Network”
Microsoft ERP SAP CRM
“If header = x, send to port 4”
54
Sigal Russin’s work/ Copyright@2014
Do not remove source or attribution from any slide, graph or portion of graph
SDN could improve your IT and business environment
55
1 2 3
Accelerating the Traffic
visibility into network loads ,and
jams, to make intelligent
rerouting and dynamic changes
to bandwidth much easier.
TCO + ROI
reduced expenditure on
network hardware, plus
reduced network
management costs
Controlling the
organization
Traffic
Sigal Russin’s work/ Copyright@2014
Do not remove source or attribution from any slide, graph or portion of graph
SDN could improve your IT and business environment
56
4 5 6
App-Friendly Ecosystem
SaaS apps can be readily
accessible, promotes rapid
deployment of new apps, and
efficiently manages bandwidth
requirements.
Securing the Network
virtual machines and
applications, regardless of
location, while providing a
central security brain
to diagnose and treat
threats.
Embracing Analytics
Deep intelligence from an increasingly
distributed computing environment,
automate network management.
Increasing processing speeds and
providing the flexibility and scalability to
handle big and unstructured data.
Sigal Russin’s work/ Copyright@2014
Do not remove source or attribution from any slide, graph or portion of graph
Future SDN
57
Sigal Russin’s work/ Copyright@2014
Do not remove source or attribution from any slide, graph or portion of graph
Business Applications with SDN
58Source: http://demo.ipspace.net/get/OpenFlow%20Functions.pdf; https://indico.cern.ch/event/294923/contribution/0/material/slides/0.pdf
SDN can improve your business applications performance
I want my SAP
traffic to have
priority. But no
more than 20%.
Rules- Every 24
hours: transfer 10
TB of data to the
backup service
,avoid impact on
any other
services.
A new prototype
application
:create a new
isolated network ,
must not interfere
with normal
network activity.
Every IP flow has
a matching
security policy as
a flow entry.
Sigal Russin’s work/ Copyright@2014
Do not remove source or attribution from any slide, graph or portion of graph
Networking technology findings for 2014
59
Sigal Russin’s work/ Copyright@2014
Do not remove source or attribution from any slide, graph or portion of graph
Insights from Customer Roundtables
FCOE not mature enough and can lead to
problems between the various teams :
networking ,storage ,DB.
Most organizations don’t believe in SDN,
because knowledgeable and expert
teams are not available yet
In wireless network don’t forget the
security and management (maybe
service provider).
Most customers do not plan to
migrate to IPV6 . They think the ISP
should lead it.
60
Sigal Russin’s work/ Copyright@2014
Do not remove source or attribution from any slide, graph or portion of graph
• SPAN Ports
• Taps
• Inline Bypass
• SPAN Ports
• Taps
• Inline Bypass
Tools Need End-to-End Network Access
Production Network
WAN Carrier Networks
Wired and Mobile
Data Center
Private Cloud
Virtualization
Core
Remote Office
Branch Office
Campus Network
Management
Application
Performance
Security
Intelligence
Customer
Experience
• SPAN Ports
• Taps
• Inline Bypass
• SPAN Ports
• Taps
• Inline Bypass
This isn’t
happening!
Why?
Network
Operations
Performance
Management
Security
Admin
Server Admin
Audit &
Privacy
Forensics
Tools Organization
61
Sigal Russin’s work/ Copyright@2014
Do not remove source or attribution from any slide, graph or portion of graph
New Needs to Solve the Tools Problem
Production Network
WAN Carrier Networks
Wired and Mobile
Data Center
Private Cloud
Virtualization
Core
Remote Office
Branch Office
Campus
Tools
End-to-End Visibility
Tool access to any point in the network
Scalability
Scales to fit the needs of any network
Manageability
Flexible macro-level management
Control
View exactly the information you need
Reduce Costs
Reduce tool costs & administrative burdens
Visibility Needs
Network
Operations
Performance
Management
Security
Admin
Server Admin
Audit &
Privacy
Forensics
Organization
Network
Management
Application
Performance
Security
Intelligence
Customer
Experience
62
Sigal Russin’s work/ Copyright@2014
Do not remove source or attribution from any slide, graph or portion of graph
STKI Summit 2014 Frame tale: The securitycyber manager
63
Sigal Russin’s work/ Copyright@2014
Do not remove source or attribution from any slide, graph or portion of graph
Security Cyber
•How much time (in seconds… ) can organization operate
properly without good defense?
 Do you have information that needs to be kept
confidential (secret)?
 Do you have information that needs to be
accurate/ Integrity?
 Do you have information that must be
available when you need it?
Solution: Cyber Security Plan.
Sigal Russin’s work/ Copyright@2014
Do not remove source or attribution from any slide, graph or portion of graph
Security Dominates the IT Conversation
65
Source:http://www.fedtechmagazine.com/article/2013/10/how-will-federal-agencies-
invest-2014-survey
Sigal Russin’s work/ Copyright@2014
Do not remove source or attribution from any slide, graph or portion of graph
STKI Survey CIO 2014 – Again Security Domains
66
8076
7168
62
5353535350
44
3229
21
12111
‫הפרויקטים‬ ‫תחומי‬,‫ב‬ ‫בארגונך‬ ‫החלו‬ ‫אשר‬-2013/‫ל‬ ‫מתוכננים‬-2014
*‫מרובה‬ ‫בחירה‬
Sigal Russin’s work/ Copyright@2014
Do not remove source or attribution from any slide, graph or portion of graph
67
Beware of Unknown Security Threats
Source: http://www.ebusinessplanet.com/category/online-business/
Sigal Russin’s work/ Copyright@2014
Do not remove source or attribution from any slide, graph or portion of graph
68
Sigal Russin’s work/ Copyright@2014
Do not remove source or attribution from any slide, graph or portion of graph
Cyber Intelligence
69
Sigal Russin’s work/ Copyright@2014
Do not remove source or attribution from any slide, graph or portion of graph
2014
70Source: CYREN
Sigal Russin’s work/ Copyright@2014
Do not remove source or attribution from any slide, graph or portion of graph
Internet of everything71
Sigal Russin’s work/ Copyright@2014
Do not remove source or attribution from any slide, graph or portion of graph
Challenges in Cyber Security
Expanding threat landscape
The increased complexity, number and sophistication of incoming threats have led to a fragmented infrastructure
approach for security provision, which is inefficient, risky and a nightmare to manage.
End-point consumerisation: IOT and M2M explosion
An increase in the number and variety of devices connected to the Internet increases the opportunity of
security breaches by orders of importance. Most security infrastructures are completely unprepared for the
escalation in event numbers and types.
Skills lack
The lack of availability of cyber security skills is very influence. Despite the professional associations that provide
security accreditation, there is still a major lack of resource with the right skills and experience to cope with
cyber security market demand. Salaries of experienced security analysts are increasing substantially, and staff
retention is proving elusive.
72
Source: http://www.icontact-archive.com/oVcotBdZudhBcQahFd9aCVMmrT_AgJpG?w=4
Sigal Russin’s work/ Copyright@2014
Do not remove source or attribution from any slide, graph or portion of graph
Cyber events 2013
‫ריגול‬–Espionage
Steal information government
agencies, embassies,
Oil and gas companies, research
institutes, provide military and social
activists.
Hit and Run Attacks
Small groups perform minor assaults and
targeted information and locate surgical
precision.
The attack usually lasts a few days/weeks,
and they have achieved what they were
looking for, Cleaning And leaving
Distributed Denial of
Service- DDoS
Activism and theft in the
virtual world
Ransomware"‫כופר‬ ‫תוכנות‬"
Malware and viruses used in the
internet crime factors blackmail
companies and private users in
the form of ransom.
Watering Hole
Attacks in which attackers infect
a website, their intended victims
Are expected to visit it, while
exposing victims of malware as
soon as they enter the site
Rise in malicious software
quality in mobile
The victim did not know he
would attack and could not
remove the offensive machine.
73
Sigal Russin’s work/ Copyright@2014
Do not remove source or attribution from any slide, graph or portion of graph
Cyber events 2013
74
The human factor is (still)
the weakest link in the
security chain
Social Engineering
Big brother is watching -
Lavabit , Silent Circle, NSA
Surveillance and invasion
of privacy information
Vulnerabilities & Zero Days
Don’t forget Patch
Management, win XP will
Not support by Microsoft
Bitcoins
Already crossed the border
1000$. So loved among the
attackers
Sigal Russin’s work/ Copyright@2014
Do not remove source or attribution from any slide, graph or portion of graph
How to deal with Cyber?
75
IT is not only changing information security tools but also an internal
vision of security inside your business.
Sigal Russin’s work/ Copyright@2014
Do not remove source or attribution from any slide, graph or portion of graph
Insights Customer Roundtable
Every organization approaches Cyber ​​differently. Some
customers use existing information security tools.
There are customers who are trying to test new tools
related to cyber such as forensic and APT tools.
Most organizations are working to increase awareness
among employees in different ways and the importance of
the organization's information security policy.
Mobile also brings the expansion of EP in endpoint
security.
76
Sigal Russin’s work/ Copyright@2014
Do not remove source or attribution from any slide, graph or portion of graph
ISO 27032
77
Information technology — Security techniques — Guidelines for cybersecurity
Published in 2012.
Defined as the “preservation of confidentiality, integrity and availability of information in the
Cyberspace”.
Main sections:
• Overview
• Assets in the Cyberspace
• Threats against the security of the Cyberspace
• Roles of stakeholders in Cybersecurity
• Guidelines for stakeholders
• Cybersecurity controls
• Framework of information sharing and coordination
• Annex A. Cybersecurity readiness
• Annex B. Additional resources
• Annex C. Examples of related documents
77
Sigal Russin’s work/ Copyright@2014
Do not remove source or attribution from any slide, graph or portion of graph
Security on virtual machines
There is no single unified threat management tool for the virtual world
1) Intrusion detection and firewall features
2) Compliance and auditing
3) Reporting- where and how an organization is vulnerable. Check how easy is to
generate actionable reports and whether the product can automatically flag particular violations.
1) Access controls- tie access control roles to particular Active Directory users.
2) Anti-virus/anti-malware protection
You should do some basic testing of any of these products and understand how they fit into your existing
security frameworks and operations.
78
Don’t forget to cover security layer on virtual machines
Sigal Russin’s work/ Copyright@2014
Do not remove source or attribution from any slide, graph or portion of graph
79
Source: http://www.arbornetworks.com/corporate/blog/5151-ddos-attacks-the-necessity-of-multi-layered-defense
Sigal Russin’s work/ Copyright@2014
Do not remove source or attribution from any slide, graph or portion of graph
80
Security To SaaS
Business applications
Sigal Russin’s work/ Copyright@2014
Do not remove source or attribution from any slide, graph or portion of graph
Cloud-based security as a service
81
The goal is to provide real-time analysis and
a clear audit trail and reporting related to
SaaS-based application usage by the
enterprise. The monitoring can allows
options for automating or manually
terminating sessions or blocking content
download.
Sigal Russin’s work/ Copyright@2014
Do not remove source or attribution from any slide, graph or portion of graph
Cyber forecast 2014
82
“Cloud computing” providers Gaps / weaknesses / vulnerabilities.
Focus on current and ongoing process of assessment and risk management in
the cyber world.
New threats will force organizations to change concept and move static
protection proactive.
Sophistication attacks that are based on the malware mobile (IOS & Android).
Security events in health care: attacks on electronic medical equipment, leakage of
confidential information Hospitals, international facilities in the area (HIPAA).
Sigal Russin’s work/ Copyright@2014
Do not remove source or attribution from any slide, graph or portion of graph
STKI Summit 2014 Frame tale: New Business enabling technologies 3D printing
83
Sigal Russin’s work/ Copyright@2014
Do not remove source or attribution from any slide, graph or portion of graph
3D printing
Printing Today – 2D Printing:
•Production time is too long
•High costs
•Lack of availability
•Need technical personnel to quote, specify
and configure product for design & engineering integrity
•Slower product design
•Late design changes take time to integrate
The solution: 3D Printing
84
Sigal Russin’s work/ Copyright@2014
Do not remove source or attribution from any slide, graph or portion of graph
85
Sigal Russin’s work/ Copyright@2014
Do not remove source or attribution from any slide, graph or portion of graph
3D printing is already transforming the way the company does business
86
Sigal Russin’s work/ Copyright@2014
Do not remove source or attribution from any slide, graph or portion of graph
3D printing is already transforming the way the company does business
87
Sigal Russin’s work/ Copyright@2014
Do not remove source or attribution from any slide, graph or portion of graph
88
Source:http://www.nationaldefensemagazine.org/archive/2014/March/pages/3DPrinti
ngPromisestoRevolutionizeDefense,AerospaceIndustries.aspx
Sigal Russin’s work/ Copyright@2014
Do not remove source or attribution from any slide, graph or portion of graph
3D Printing- Future Printing
Innovation
Improve
Communication
Different
Materials
Personalize
products
Reduce
Development
Costs
Speed Time
to Market
Win
Business
Source:http://www.computerweekly.com/feature/How-3D-printing-impacts-manufacturing
89
Sigal Russin’s work/ Copyright@2014
Do not remove source or attribution from any slide, graph or portion of graph
Coca-Cola Israel’s Mini-Bottles
90
Sigal Russin’s work/ Copyright@2014
Do not remove source or attribution from any slide, graph or portion of graph
91
Sigal Russin’s work/ Copyright@2014
Do not remove source or attribution from any slide, graph or portion of graph
92
Sigal Russin’s work/ Copyright@2014
Do not remove source or attribution from any slide, graph or portion of graph
POTENTIAL ECONOMIC IMPACT BY 2025
SOURCE: McKinsey Global Institute analysis
93
Sigal Russin’s work/ Copyright@2014
Do not remove source or attribution from any slide, graph or portion of graph
Thank You!
94
Sigalr@stki.info

Mais conteúdo relacionado

Mais procurados

Why Observability is Key to Solving Business and Operational Challenges
Why Observability is Key to Solving Business and Operational ChallengesWhy Observability is Key to Solving Business and Operational Challenges
Why Observability is Key to Solving Business and Operational ChallengesEnterprise Management Associates
 
Delivery positionnig 2017 v2
Delivery positionnig 2017   v2Delivery positionnig 2017   v2
Delivery positionnig 2017 v2Pini Cohen
 
The Impact of IoT on Product Design
The Impact of IoT on Product DesignThe Impact of IoT on Product Design
The Impact of IoT on Product DesignAras
 
STKI Summit 2014 - How does CIO deliver?
STKI Summit 2014 - How does CIO deliver?STKI Summit 2014 - How does CIO deliver?
STKI Summit 2014 - How does CIO deliver?Pini Cohen
 
Your Journey to the Cloud
Your Journey to the CloudYour Journey to the Cloud
Your Journey to the CloudDori Degenhardt
 
Live Demo: Accelerate the integration of workday applications
Live Demo: Accelerate the integration of workday applicationsLive Demo: Accelerate the integration of workday applications
Live Demo: Accelerate the integration of workday applicationsSnapLogic
 
AIOps-Driven Network Performance Management: The First Step Toward Self-Heali...
AIOps-Driven Network Performance Management: The First Step Toward Self-Heali...AIOps-Driven Network Performance Management: The First Step Toward Self-Heali...
AIOps-Driven Network Performance Management: The First Step Toward Self-Heali...Enterprise Management Associates
 
MBSE and the Business of Engineering
MBSE and the Business of EngineeringMBSE and the Business of Engineering
MBSE and the Business of EngineeringAras
 
Optimizing the Network for Reliable Application Delivery Across the Cloud
Optimizing the Network for Reliable Application Delivery Across the CloudOptimizing the Network for Reliable Application Delivery Across the Cloud
Optimizing the Network for Reliable Application Delivery Across the CloudEnterprise Management Associates
 
Four Can’t-Miss Future Trends from EMA’s 2021 Workload Automation Radar Report
Four Can’t-Miss Future Trends from EMA’s 2021 Workload Automation Radar ReportFour Can’t-Miss Future Trends from EMA’s 2021 Workload Automation Radar Report
Four Can’t-Miss Future Trends from EMA’s 2021 Workload Automation Radar ReportEnterprise Management Associates
 
Are you REALLY ready for the cloud?
Are you REALLY ready for the cloud?Are you REALLY ready for the cloud?
Are you REALLY ready for the cloud?Riverbed Technology
 
Automation analytics
Automation analyticsAutomation analytics
Automation analyticsEagle Insight
 
Digital Experience Management—The Key to Delivering Exceptional Digital Exper...
Digital Experience Management—The Key to Delivering Exceptional Digital Exper...Digital Experience Management—The Key to Delivering Exceptional Digital Exper...
Digital Experience Management—The Key to Delivering Exceptional Digital Exper...Riverbed Technology
 
Broadcast Music Inc. Release Rockstars: Program-Wide DevOps Success with Urba...
Broadcast Music Inc. Release Rockstars: Program-Wide DevOps Success with Urba...Broadcast Music Inc. Release Rockstars: Program-Wide DevOps Success with Urba...
Broadcast Music Inc. Release Rockstars: Program-Wide DevOps Success with Urba...Prolifics
 
Scale Container Operations with AIOps
Scale Container Operations with AIOpsScale Container Operations with AIOps
Scale Container Operations with AIOpsTimothy Chen
 
How Cisco Turned Marketing Ops Into a Production Powerhouse with Workfront
How Cisco Turned Marketing Ops Into a Production Powerhouse with WorkfrontHow Cisco Turned Marketing Ops Into a Production Powerhouse with Workfront
How Cisco Turned Marketing Ops Into a Production Powerhouse with WorkfrontIO Integration
 
AIOps Is How We Will Survive DevOps
AIOps Is How We Will Survive DevOpsAIOps Is How We Will Survive DevOps
AIOps Is How We Will Survive DevOpsDEVOPS LIVE Meetup
 
Escaping OpenStack: 3 Secrets to Delivering the Private Cloud Developers Want
Escaping OpenStack: 3 Secrets to Delivering the Private Cloud Developers WantEscaping OpenStack: 3 Secrets to Delivering the Private Cloud Developers Want
Escaping OpenStack: 3 Secrets to Delivering the Private Cloud Developers WantStratoscale
 
Future proof your jira integrations and avoid api change panic
Future proof your jira integrations and avoid api change panicFuture proof your jira integrations and avoid api change panic
Future proof your jira integrations and avoid api change panicTasktop
 

Mais procurados (20)

Why Observability is Key to Solving Business and Operational Challenges
Why Observability is Key to Solving Business and Operational ChallengesWhy Observability is Key to Solving Business and Operational Challenges
Why Observability is Key to Solving Business and Operational Challenges
 
Delivery positionnig 2017 v2
Delivery positionnig 2017   v2Delivery positionnig 2017   v2
Delivery positionnig 2017 v2
 
The Impact of IoT on Product Design
The Impact of IoT on Product DesignThe Impact of IoT on Product Design
The Impact of IoT on Product Design
 
App Modernization
App ModernizationApp Modernization
App Modernization
 
STKI Summit 2014 - How does CIO deliver?
STKI Summit 2014 - How does CIO deliver?STKI Summit 2014 - How does CIO deliver?
STKI Summit 2014 - How does CIO deliver?
 
Your Journey to the Cloud
Your Journey to the CloudYour Journey to the Cloud
Your Journey to the Cloud
 
Live Demo: Accelerate the integration of workday applications
Live Demo: Accelerate the integration of workday applicationsLive Demo: Accelerate the integration of workday applications
Live Demo: Accelerate the integration of workday applications
 
AIOps-Driven Network Performance Management: The First Step Toward Self-Heali...
AIOps-Driven Network Performance Management: The First Step Toward Self-Heali...AIOps-Driven Network Performance Management: The First Step Toward Self-Heali...
AIOps-Driven Network Performance Management: The First Step Toward Self-Heali...
 
MBSE and the Business of Engineering
MBSE and the Business of EngineeringMBSE and the Business of Engineering
MBSE and the Business of Engineering
 
Optimizing the Network for Reliable Application Delivery Across the Cloud
Optimizing the Network for Reliable Application Delivery Across the CloudOptimizing the Network for Reliable Application Delivery Across the Cloud
Optimizing the Network for Reliable Application Delivery Across the Cloud
 
Four Can’t-Miss Future Trends from EMA’s 2021 Workload Automation Radar Report
Four Can’t-Miss Future Trends from EMA’s 2021 Workload Automation Radar ReportFour Can’t-Miss Future Trends from EMA’s 2021 Workload Automation Radar Report
Four Can’t-Miss Future Trends from EMA’s 2021 Workload Automation Radar Report
 
Are you REALLY ready for the cloud?
Are you REALLY ready for the cloud?Are you REALLY ready for the cloud?
Are you REALLY ready for the cloud?
 
Automation analytics
Automation analyticsAutomation analytics
Automation analytics
 
Digital Experience Management—The Key to Delivering Exceptional Digital Exper...
Digital Experience Management—The Key to Delivering Exceptional Digital Exper...Digital Experience Management—The Key to Delivering Exceptional Digital Exper...
Digital Experience Management—The Key to Delivering Exceptional Digital Exper...
 
Broadcast Music Inc. Release Rockstars: Program-Wide DevOps Success with Urba...
Broadcast Music Inc. Release Rockstars: Program-Wide DevOps Success with Urba...Broadcast Music Inc. Release Rockstars: Program-Wide DevOps Success with Urba...
Broadcast Music Inc. Release Rockstars: Program-Wide DevOps Success with Urba...
 
Scale Container Operations with AIOps
Scale Container Operations with AIOpsScale Container Operations with AIOps
Scale Container Operations with AIOps
 
How Cisco Turned Marketing Ops Into a Production Powerhouse with Workfront
How Cisco Turned Marketing Ops Into a Production Powerhouse with WorkfrontHow Cisco Turned Marketing Ops Into a Production Powerhouse with Workfront
How Cisco Turned Marketing Ops Into a Production Powerhouse with Workfront
 
AIOps Is How We Will Survive DevOps
AIOps Is How We Will Survive DevOpsAIOps Is How We Will Survive DevOps
AIOps Is How We Will Survive DevOps
 
Escaping OpenStack: 3 Secrets to Delivering the Private Cloud Developers Want
Escaping OpenStack: 3 Secrets to Delivering the Private Cloud Developers WantEscaping OpenStack: 3 Secrets to Delivering the Private Cloud Developers Want
Escaping OpenStack: 3 Secrets to Delivering the Private Cloud Developers Want
 
Future proof your jira integrations and avoid api change panic
Future proof your jira integrations and avoid api change panicFuture proof your jira integrations and avoid api change panic
Future proof your jira integrations and avoid api change panic
 

Semelhante a Sigal summit 2014 final

Contact Center infrastructure 2014
Contact Center infrastructure 2014Contact Center infrastructure 2014
Contact Center infrastructure 2014Ariel Evans
 
contact center trends 2014
contact center trends 2014contact center trends 2014
contact center trends 2014Ariel Evans
 
CONTACT CENTER TRENDS 2014
CONTACT CENTER TRENDS 2014CONTACT CENTER TRENDS 2014
CONTACT CENTER TRENDS 2014Ariel Evans
 
DLP Data leak prevention
DLP Data leak preventionDLP Data leak prevention
DLP Data leak preventionAriel Evans
 
Pini sigal Summit 2014 final
Pini sigal  Summit 2014 finalPini sigal  Summit 2014 final
Pini sigal Summit 2014 finalAriel Evans
 
infra 2015 delivery
infra 2015  deliveryinfra 2015  delivery
infra 2015 deliveryAriel Evans
 
STKI Summit 2014 Infra Trends - How CIO Deliver - complete infra trends
STKI Summit 2014 Infra Trends - How CIO Deliver - complete infra trendsSTKI Summit 2014 Infra Trends - How CIO Deliver - complete infra trends
STKI Summit 2014 Infra Trends - How CIO Deliver - complete infra trendsPini Cohen
 
297727851 getting-to-the-cloud-event-2015
297727851 getting-to-the-cloud-event-2015297727851 getting-to-the-cloud-event-2015
297727851 getting-to-the-cloud-event-2015Inbalraanan
 
Output management 2013
Output management 2013 Output management 2013
Output management 2013 Ariel Evans
 
Cyber security 2013
Cyber security 2013 Cyber security 2013
Cyber security 2013 Ariel Evans
 
Printing om 2014
Printing om 2014Printing om 2014
Printing om 2014Ariel Evans
 
Stki summit2013 infra_pini sigaltechnologies_v5 final
Stki summit2013 infra_pini sigaltechnologies_v5 finalStki summit2013 infra_pini sigaltechnologies_v5 final
Stki summit2013 infra_pini sigaltechnologies_v5 finalAriel Evans
 
NEXT generation enterprise applications
NEXT generation enterprise applicationsNEXT generation enterprise applications
NEXT generation enterprise applicationsDr. Jimmy Schwarzkopf
 
STKI summit CTO presentation 2019
STKI summit CTO presentation 2019STKI summit CTO presentation 2019
STKI summit CTO presentation 2019Pini Cohen
 
Israel IT trends and positioning in networking and security
Israel IT  trends and positioning in networking and security Israel IT  trends and positioning in networking and security
Israel IT trends and positioning in networking and security Dr. Jimmy Schwarzkopf
 
Positioning+trends sigal summit 2014
Positioning+trends sigal summit 2014Positioning+trends sigal summit 2014
Positioning+trends sigal summit 2014Ariel Evans
 
Next generation applications
Next generation applicationsNext generation applications
Next generation applicationsInbalraanan
 
Best Practices for Building Scalable Visibility Architectures
Best Practices for Building Scalable Visibility ArchitecturesBest Practices for Building Scalable Visibility Architectures
Best Practices for Building Scalable Visibility ArchitecturesEnterprise Management Associates
 
Secure development 2014
Secure development 2014Secure development 2014
Secure development 2014Ariel Evans
 
Risk mngt gov compliance security cyber
Risk mngt  gov compliance security cyberRisk mngt  gov compliance security cyber
Risk mngt gov compliance security cyberAriel Evans
 

Semelhante a Sigal summit 2014 final (20)

Contact Center infrastructure 2014
Contact Center infrastructure 2014Contact Center infrastructure 2014
Contact Center infrastructure 2014
 
contact center trends 2014
contact center trends 2014contact center trends 2014
contact center trends 2014
 
CONTACT CENTER TRENDS 2014
CONTACT CENTER TRENDS 2014CONTACT CENTER TRENDS 2014
CONTACT CENTER TRENDS 2014
 
DLP Data leak prevention
DLP Data leak preventionDLP Data leak prevention
DLP Data leak prevention
 
Pini sigal Summit 2014 final
Pini sigal  Summit 2014 finalPini sigal  Summit 2014 final
Pini sigal Summit 2014 final
 
infra 2015 delivery
infra 2015  deliveryinfra 2015  delivery
infra 2015 delivery
 
STKI Summit 2014 Infra Trends - How CIO Deliver - complete infra trends
STKI Summit 2014 Infra Trends - How CIO Deliver - complete infra trendsSTKI Summit 2014 Infra Trends - How CIO Deliver - complete infra trends
STKI Summit 2014 Infra Trends - How CIO Deliver - complete infra trends
 
297727851 getting-to-the-cloud-event-2015
297727851 getting-to-the-cloud-event-2015297727851 getting-to-the-cloud-event-2015
297727851 getting-to-the-cloud-event-2015
 
Output management 2013
Output management 2013 Output management 2013
Output management 2013
 
Cyber security 2013
Cyber security 2013 Cyber security 2013
Cyber security 2013
 
Printing om 2014
Printing om 2014Printing om 2014
Printing om 2014
 
Stki summit2013 infra_pini sigaltechnologies_v5 final
Stki summit2013 infra_pini sigaltechnologies_v5 finalStki summit2013 infra_pini sigaltechnologies_v5 final
Stki summit2013 infra_pini sigaltechnologies_v5 final
 
NEXT generation enterprise applications
NEXT generation enterprise applicationsNEXT generation enterprise applications
NEXT generation enterprise applications
 
STKI summit CTO presentation 2019
STKI summit CTO presentation 2019STKI summit CTO presentation 2019
STKI summit CTO presentation 2019
 
Israel IT trends and positioning in networking and security
Israel IT  trends and positioning in networking and security Israel IT  trends and positioning in networking and security
Israel IT trends and positioning in networking and security
 
Positioning+trends sigal summit 2014
Positioning+trends sigal summit 2014Positioning+trends sigal summit 2014
Positioning+trends sigal summit 2014
 
Next generation applications
Next generation applicationsNext generation applications
Next generation applications
 
Best Practices for Building Scalable Visibility Architectures
Best Practices for Building Scalable Visibility ArchitecturesBest Practices for Building Scalable Visibility Architectures
Best Practices for Building Scalable Visibility Architectures
 
Secure development 2014
Secure development 2014Secure development 2014
Secure development 2014
 
Risk mngt gov compliance security cyber
Risk mngt  gov compliance security cyberRisk mngt  gov compliance security cyber
Risk mngt gov compliance security cyber
 

Mais de Ariel Evans

Secure develpment 2014
Secure develpment 2014Secure develpment 2014
Secure develpment 2014Ariel Evans
 
Stki summit2013 ratios
Stki summit2013 ratiosStki summit2013 ratios
Stki summit2013 ratiosAriel Evans
 
Cloud cc security
Cloud cc securityCloud cc security
Cloud cc securityAriel Evans
 
Stki summit2013 infra_pini sigal_mega_v10 final
Stki summit2013 infra_pini sigal_mega_v10 finalStki summit2013 infra_pini sigal_mega_v10 final
Stki summit2013 infra_pini sigal_mega_v10 finalAriel Evans
 
Mdm byod survey results 2013
Mdm byod survey results 2013Mdm byod survey results 2013
Mdm byod survey results 2013Ariel Evans
 
Trends In Infrastructure Services
Trends In Infrastructure ServicesTrends In Infrastructure Services
Trends In Infrastructure ServicesAriel Evans
 
From creeper to stuxnet
From creeper to stuxnetFrom creeper to stuxnet
From creeper to stuxnetAriel Evans
 

Mais de Ariel Evans (8)

Secure develpment 2014
Secure develpment 2014Secure develpment 2014
Secure develpment 2014
 
Stki summit2013 ratios
Stki summit2013 ratiosStki summit2013 ratios
Stki summit2013 ratios
 
Cloud cc security
Cloud cc securityCloud cc security
Cloud cc security
 
Stki summit2013 infra_pini sigal_mega_v10 final
Stki summit2013 infra_pini sigal_mega_v10 finalStki summit2013 infra_pini sigal_mega_v10 final
Stki summit2013 infra_pini sigal_mega_v10 final
 
Mdm byod survey results 2013
Mdm byod survey results 2013Mdm byod survey results 2013
Mdm byod survey results 2013
 
IDM & IAM 2012
IDM & IAM 2012IDM & IAM 2012
IDM & IAM 2012
 
Trends In Infrastructure Services
Trends In Infrastructure ServicesTrends In Infrastructure Services
Trends In Infrastructure Services
 
From creeper to stuxnet
From creeper to stuxnetFrom creeper to stuxnet
From creeper to stuxnet
 

Último

unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 

Último (20)

unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 

Sigal summit 2014 final

  • 1. Sigal Russin’s work/ Copyright@2014 Do not remove source or attribution from any slide, graph or portion of graph 1 Sigal Russin STKI “IT Knowledge Integrators” sigalr@stki.info New Obstacle run for “delivery” managers Security & Networking
  • 2. Sigal Russin’s work/ Copyright@2014 Do not remove source or attribution from any slide, graph or portion of graph IT is divided into two distinct “worlds” 2
  • 3. Sigal Russin’s work/ Copyright@2014 Do not remove source or attribution from any slide, graph or portion of graph System of records 3 Reduce Operating Expenses Long development and deployment cycles
  • 4. Sigal Russin’s work/ Copyright@2014 Do not remove source or attribution from any slide, graph or portion of graph System of engagement 4 Invest in new systems Touch people In-moment decisions Personalized & in-context Social and analytics driven short & rapid releases
  • 5. Sigal Russin’s work/ Copyright@2014 Do not remove source or attribution from any slide, graph or portion of graph 5 CIO has 2 faces
  • 6. Sigal Russin’s work/ Copyright@2014 Do not remove source or attribution from any slide, graph or portion of graph Goals of the “engagement systems” Deliver “best of class” customer experience Focus on personalization “push” mode Design for people to people interaction models Drive relevancy with context not content Deliver value for customers (time is the constraint for customers) Move mobile strategies from campaign to e-commerce Address big and small data (from BI through streaming analytics) 6
  • 7. Sigal Russin’s work/ Copyright@2014 Do not remove source or attribution from any slide, graph or portion of graph IT Delivery as a Factory! 7 XaaS IT Delivery Services (SW + HW)
  • 8. Sigal Russin’s work/ Copyright@2014 Do not remove source or attribution from any slide, graph or portion of graph IT Delivery as a Factory! 8 Elastic On-Demand Usage Metered Self-Service Access Line of Businesses IT Delivery Services (SW + HW)
  • 9. Sigal Russin’s work/ Copyright@2014 Do not remove source or attribution from any slide, graph or portion of graph IT Delivery Challenges 9 “Records” and “Engagement” share the same IT Delivery problem domains But might address these challenges differently
  • 10. Sigal Russin’s work/ Copyright@2014 Do not remove source or attribution from any slide, graph or portion of graph IT Talent 10
  • 11. Sigal Russin’s work/ Copyright@2014 Do not remove source or attribution from any slide, graph or portion of graph 11 Obstacles in the “System of records” delivery domain Printing infrastructure Versatile Communications (Collaboration) Obstacle #8 API Security Cyber Security Identity and access management
  • 12. Sigal Russin’s work/ Copyright@2014 Do not remove source or attribution from any slide, graph or portion of graph Good communication is fundamental Todays Communication network: Data and voice in separate network A lot of vendors Separate maintenance for each network More employees for each network High costs The solution: Unified Communication. Combining telephony and business data on the same network. It gives the ability to combine and use voice, data , video information in common business applications, saving and forwarding whole instant message streams, faxes, e-mails, voice phone calls or videoconferencing sessions as blocks of data. 12
  • 13. Sigal Russin’s work/ Copyright@2014 Do not remove source or attribution from any slide, graph or portion of graph CIOs Extend Unified Communications to Mobile Devices Source: survey by IDG Enterprise, CIO's parent company Why invest in UC? 61% - to boost employee productivity 42% - to increase flexibility for employees The biggest obstacles to UC investments: 54% - the high cost 47% - systems integration headaches 33%- lack of in-house expertise 31% - security and privacy UC deployments often cost at least $250,000, and can top $1 million at large companies 13
  • 14. Sigal Russin’s work/ Copyright@2014 Do not remove source or attribution from any slide, graph or portion of graph 14 Unified Communications Areas Source: Gartner
  • 15. Sigal Russin’s work/ Copyright@2014 Do not remove source or attribution from any slide, graph or portion of graph 15 How Many Horses In This Race? Traditional PBX vendors • Cisco • Avaya • Siemens • Alcatel-Lucent OpenTouch • Etc. Desktop vendors • IBM SameTime • Microsoft LYNC Social networking with Consumerization • Google • Skype Microsoft • LinkedIn • Facebook
  • 16. Sigal Russin’s work/ Copyright@2014 Do not remove source or attribution from any slide, graph or portion of graph Insights from Customer Roundtables Maintaining the current UC infrastructure is complicated because many vendors are involved Different organizational cultures can lead to failure or success in UC projects LYNC market share is very strong in Israel because most of the organizations Microsoft based. But what about IPTEL with LYNC? Cross organization projects that can optimize work and change organizational culture 16
  • 17. Sigal Russin’s work/ Copyright@2014 Do not remove source or attribution from any slide, graph or portion of graph Web Browser with Real Time Communication  No need to install client/plug In.  Supported in the browser/Mobile.  Better user experience –Click to call.  Contact Center- Meta Data of the customers. 17
  • 18. Sigal Russin’s work/ Copyright@2014 Do not remove source or attribution from any slide, graph or portion of graph WebRTC - Web Real Time Collaboration Google –disruptive competitor. The Google Apps Suite, which offers functionality analogous (if not directly comparable) to Office, Exchange, Sharepoint, Yammer and Lync. Cisco Communications Manager (CUCM)- seeing an online contact in your browser and being able to call their mobile directly from there, but having your CUCM make and control the call. Also, if you take or make a call through the CUCM, your online status or presence changes to reflect this. Source: http://www.irishtimes.com/blogs/eircom-business-centre/2013/03/25/top-three-trends-from -unified-communications-expo-2013/ 18
  • 19. Sigal Russin’s work/ Copyright@2014 Do not remove source or attribution from any slide, graph or portion of graph Future Unified Communication 19 Source:http://blog.dimensiondata.com/2013/04/the-future-of-unified-communications-and- collaboration/
  • 20. Sigal Russin’s work/ Copyright@2014 Do not remove source or attribution from any slide, graph or portion of graph 20
  • 21. Sigal Russin’s work/ Copyright@2014 Do not remove source or attribution from any slide, graph or portion of graph Unified Communication as a Service 21 Source:http://www.orange-business.com/en/blogs/enterprising- business/unified-communications/hybrid-cloud-drives-ucaas-adoption
  • 22. Sigal Russin’s work/ Copyright@2014 Do not remove source or attribution from any slide, graph or portion of graph API obstacles •Market transition to the POST-PC enterprise It is an app world. The web just lives in it (Flurry Report) •How customers experience your product or service? •How your customers and partners access or integrate your data and resources into their public or private sites and applications? The solution : secure API. 22
  • 23. Sigal Russin’s work/ Copyright@2014 Do not remove source or attribution from any slide, graph or portion of graph API management & Security 23
  • 24. Sigal Russin’s work/ Copyright@2014 Do not remove source or attribution from any slide, graph or portion of graph APIs are the lifeblood of mobility API definition - an Application programming interface is a way for 2 computer applications to talk to each other over a network (internet) using common language that both understand 24
  • 25. Sigal Russin’s work/ Copyright@2014 Do not remove source or attribution from any slide, graph or portion of graph Organizations must to open up 25 Source:http://www.slideshare.net/rnewton/api-security-and-management-best-practices
  • 26. Sigal Russin’s work/ Copyright@2014 Do not remove source or attribution from any slide, graph or portion of graph 26
  • 27. Sigal Russin’s work/ Copyright@2014 Do not remove source or attribution from any slide, graph or portion of graph 27
  • 28. Sigal Russin’s work/ Copyright@2014 Do not remove source or attribution from any slide, graph or portion of graph API Management & Security with CA Layer 7  Secure externalized data and business services  Protect against DOS and API attacks  Wrap app with security policy & jailbreak detection  Cache, throttle and meter  Learn about APIs available for use  Grant certificates for access  Test environment  API usage metrics & reporting  Accelerate API projects through cloud delivery  Deliver API gateway and developer portal capabilities from the cloud  Reach cloud, mobile and smart technology markets faster  Leverage existing application infrastructures  Convert legacy apps to REST API  Create API composite applications Protocol Adaptation Security & Govern Developer Portal SaaS (Apify) 28
  • 29. Sigal Russin’s work/ Copyright@2014 Do not remove source or attribution from any slide, graph or portion of graph API Management & Security with IBM DataPower 29
  • 30. Sigal Russin’s work/ Copyright@2014 Do not remove source or attribution from any slide, graph or portion of graph Multiple access control methods are necessary. use HTTPS and more strong authenticatio n mechanisms OAuth, mutual (two- way) TLS (transport layer security) authentication SAML (security assertion markup language) tokens DoS Attacks Against APIs 30 November 2010 Source: https://blog.apigee.com/detail/a_growing_threat_dos_attacks_against_apis If you increase use of APIs, make sure you are paying attention to DoS attacks.
  • 31. Sigal Russin’s work/ Copyright@2014 Do not remove source or attribution from any slide, graph or portion of graph End-to-End Security for the Digital Value Chain 31 Roll-Based Access control DoS Attacks AAA via OAuth, SAML, and LDAP Policy management for authorization
  • 32. Sigal Russin’s work/ Copyright@2014 Do not remove source or attribution from any slide, graph or portion of graph API-centric architecture meet security requirements 32 Developer • Ability to create and deploy apps and configure security (not code) via the API and self-service management portal API architect • Ability to securely expose the back- end services with necessary authentication, authorization, and threat protection Security architect • Protect high value assets (sensitive data) that are being exposed via APIs, while meeting enterprise security standards for authentication, authorization, and auditing (AAA) Application/business owner • Ability to manage availability, risk, and compliance when delivering an API service to end users accessing from any device at anytime Source: http://pages.apigee.com/rs/apigee/images/apigee-securing-the-digital-enterprise-ebook-02-2014.pdf
  • 33. Sigal Russin’s work/ Copyright@2014 Do not remove source or attribution from any slide, graph or portion of graph Business changes driven by APIs Source:http://www.slideshare.net/balaiyer/why-do-we-need-ap-is 33
  • 34. Sigal Russin’s work/ Copyright@2014 Do not remove source or attribution from any slide, graph or portion of graph STKI Summit 2014 Frame tale: IDM project manager 34
  • 35. Sigal Russin’s work/ Copyright@2014 Do not remove source or attribution from any slide, graph or portion of graph Are you really you ? 35  How can you know that “Avi” –CFO in your business is not someone else? Another employee?  How do you recognize your employee and your customers?  How do you know that “Avi” had the correct permissions to access enterprise resources?  If “Avi” moves to another role, what are his new permissions/access ?
  • 36. Sigal Russin’s work/ Copyright@2014 Do not remove source or attribution from any slide, graph or portion of graph Credential Theft 36
  • 37. Sigal Russin’s work/ Copyright@2014 Do not remove source or attribution from any slide, graph or portion of graph Identity Theft 2 Million Stolen Passwords Recovered 326,129 Facebook passwords (59%) 70,532 passwords for Google (13%) 59,549 for Yahoo (11%) 21,708 for Twitter (4%) 8,490 LinkedIn (2%) 37 You have to protect your sensitive business data from outsiders (especially your employees) - take control over the identities & their accesses!
  • 38. Sigal Russin’s work/ Copyright@2014 Do not remove source or attribution from any slide, graph or portion of graph Control your sensitive business data 38
  • 39. Sigal Russin’s work/ Copyright@2014 Do not remove source or attribution from any slide, graph or portion of graph Why should we manage our identity? Employees having difficulty remembering all of their accounts and credentials. Cloud integration within a local network, collaboration with multiple cloud suppliers. Strict legislation and regulations Make information widely available to members of a business Source: http://secureidnews.com/news-item/identity-and-access-management-what-is-in-store-for-2014/#sthash.GVUOvxeu.dpuf 39
  • 40. Sigal Russin’s work/ Copyright@2014 Do not remove source or attribution from any slide, graph or portion of graph Technologies to control your ID Source: http://secureidnews.com/news-item/identity-and-access-management-what-is-in-store-for-2014/#sthash.GVUOvxeu.dpuf 40
  • 41. Sigal Russin’s work/ Copyright@2014 Do not remove source or attribution from any slide, graph or portion of graph Securing the Digital Enterprise 41 Source:http://pages.apigee.com/rs/apigee/images/apigee-securing-the-digital-enterprise- ebook-02-2014.pdf
  • 42. Sigal Russin’s work/ Copyright@2014 Do not remove source or attribution from any slide, graph or portion of graph Inside your business 42 Source:http://cloudtweaks.com/2013/05/identity-access-management-perspective-saas-application/
  • 43. Sigal Russin’s work/ Copyright@2014 Do not remove source or attribution from any slide, graph or portion of graph IDM is not an easy project 43
  • 44. Sigal Russin’s work/ Copyright@2014 Do not remove source or attribution from any slide, graph or portion of graph 44
  • 45. Sigal Russin’s work/ Copyright@2014 Do not remove source or attribution from any slide, graph or portion of graph 45
  • 46. Sigal Russin’s work/ Copyright@2014 Do not remove source or attribution from any slide, graph or portion of graph Why we need IAM? 46 Finance department Moving Marketing department Billing System ERP finance Employee attendance system Enterprise Portal ERP marketing CRM Graphic Design System Social networks We need HR help! Translate the business world into project specification process It is not about technology! Support from organization's high management is also need. Matching expectations of project initiators, users and desicsion makers Hierarchical organizational structure
  • 47. Sigal Russin’s work/ Copyright@2014 Do not remove source or attribution from any slide, graph or portion of graph Active Directory Protection | Identity Theft Detection 47
  • 48. Sigal Russin’s work/ Copyright@2014 Do not remove source or attribution from any slide, graph or portion of graph Insights from Customer Roundtables Cross organization project, need management support and awareness. Most customers are in the middle or beginning of implementing an IDM project Regular maintenance and human resources . Most of these projects are failed or stopped (budget, support, maintenance etc.) 48
  • 49. Sigal Russin’s work/ Copyright@2014 Do not remove source or attribution from any slide, graph or portion of graph STKI Summit 2014 Frame tale: The Network manager 49
  • 50. Sigal Russin’s work/ Copyright@2014 Do not remove source or attribution from any slide, graph or portion of graph Networking 50 Multiple virtualized machines exchange multiple traffic flows. Switching routes and juggling bandwidth can be a headache. Network hardware costs, network management costs – human resource Secure all networking components Can not control business applications- they run separately.
  • 51. Sigal Russin’s work/ Copyright@2014 Do not remove source or attribution from any slide, graph or portion of graph General Shift in Networking 51
  • 52. Sigal Russin’s work/ Copyright@2014 Do not remove source or attribution from any slide, graph or portion of graph Current Network Control Plane Data Plane 52
  • 53. Sigal Russin’s work/ Copyright@2014 Do not remove source or attribution from any slide, graph or portion of graph 53 SDN- Software Defined Network Control Plane Data PlaneData Plane Data Plane
  • 54. Sigal Russin’s work/ Copyright@2014 Do not remove source or attribution from any slide, graph or portion of graph Packet-Forwarding Hardware Openflow Firmware Packet-Forwarding Hardware Openflow Firmware Packet-Forwarding Hardware Openflow Firmware Packet-Forwarding Hardware Openflow Firmware Network Operating System –SDN Controller Open Interface to Hardware Open API The “Software-Defined Network” Microsoft ERP SAP CRM “If header = x, send to port 4” 54
  • 55. Sigal Russin’s work/ Copyright@2014 Do not remove source or attribution from any slide, graph or portion of graph SDN could improve your IT and business environment 55 1 2 3 Accelerating the Traffic visibility into network loads ,and jams, to make intelligent rerouting and dynamic changes to bandwidth much easier. TCO + ROI reduced expenditure on network hardware, plus reduced network management costs Controlling the organization Traffic
  • 56. Sigal Russin’s work/ Copyright@2014 Do not remove source or attribution from any slide, graph or portion of graph SDN could improve your IT and business environment 56 4 5 6 App-Friendly Ecosystem SaaS apps can be readily accessible, promotes rapid deployment of new apps, and efficiently manages bandwidth requirements. Securing the Network virtual machines and applications, regardless of location, while providing a central security brain to diagnose and treat threats. Embracing Analytics Deep intelligence from an increasingly distributed computing environment, automate network management. Increasing processing speeds and providing the flexibility and scalability to handle big and unstructured data.
  • 57. Sigal Russin’s work/ Copyright@2014 Do not remove source or attribution from any slide, graph or portion of graph Future SDN 57
  • 58. Sigal Russin’s work/ Copyright@2014 Do not remove source or attribution from any slide, graph or portion of graph Business Applications with SDN 58Source: http://demo.ipspace.net/get/OpenFlow%20Functions.pdf; https://indico.cern.ch/event/294923/contribution/0/material/slides/0.pdf SDN can improve your business applications performance I want my SAP traffic to have priority. But no more than 20%. Rules- Every 24 hours: transfer 10 TB of data to the backup service ,avoid impact on any other services. A new prototype application :create a new isolated network , must not interfere with normal network activity. Every IP flow has a matching security policy as a flow entry.
  • 59. Sigal Russin’s work/ Copyright@2014 Do not remove source or attribution from any slide, graph or portion of graph Networking technology findings for 2014 59
  • 60. Sigal Russin’s work/ Copyright@2014 Do not remove source or attribution from any slide, graph or portion of graph Insights from Customer Roundtables FCOE not mature enough and can lead to problems between the various teams : networking ,storage ,DB. Most organizations don’t believe in SDN, because knowledgeable and expert teams are not available yet In wireless network don’t forget the security and management (maybe service provider). Most customers do not plan to migrate to IPV6 . They think the ISP should lead it. 60
  • 61. Sigal Russin’s work/ Copyright@2014 Do not remove source or attribution from any slide, graph or portion of graph • SPAN Ports • Taps • Inline Bypass • SPAN Ports • Taps • Inline Bypass Tools Need End-to-End Network Access Production Network WAN Carrier Networks Wired and Mobile Data Center Private Cloud Virtualization Core Remote Office Branch Office Campus Network Management Application Performance Security Intelligence Customer Experience • SPAN Ports • Taps • Inline Bypass • SPAN Ports • Taps • Inline Bypass This isn’t happening! Why? Network Operations Performance Management Security Admin Server Admin Audit & Privacy Forensics Tools Organization 61
  • 62. Sigal Russin’s work/ Copyright@2014 Do not remove source or attribution from any slide, graph or portion of graph New Needs to Solve the Tools Problem Production Network WAN Carrier Networks Wired and Mobile Data Center Private Cloud Virtualization Core Remote Office Branch Office Campus Tools End-to-End Visibility Tool access to any point in the network Scalability Scales to fit the needs of any network Manageability Flexible macro-level management Control View exactly the information you need Reduce Costs Reduce tool costs & administrative burdens Visibility Needs Network Operations Performance Management Security Admin Server Admin Audit & Privacy Forensics Organization Network Management Application Performance Security Intelligence Customer Experience 62
  • 63. Sigal Russin’s work/ Copyright@2014 Do not remove source or attribution from any slide, graph or portion of graph STKI Summit 2014 Frame tale: The securitycyber manager 63
  • 64. Sigal Russin’s work/ Copyright@2014 Do not remove source or attribution from any slide, graph or portion of graph Security Cyber •How much time (in seconds… ) can organization operate properly without good defense?  Do you have information that needs to be kept confidential (secret)?  Do you have information that needs to be accurate/ Integrity?  Do you have information that must be available when you need it? Solution: Cyber Security Plan.
  • 65. Sigal Russin’s work/ Copyright@2014 Do not remove source or attribution from any slide, graph or portion of graph Security Dominates the IT Conversation 65 Source:http://www.fedtechmagazine.com/article/2013/10/how-will-federal-agencies- invest-2014-survey
  • 66. Sigal Russin’s work/ Copyright@2014 Do not remove source or attribution from any slide, graph or portion of graph STKI Survey CIO 2014 – Again Security Domains 66 8076 7168 62 5353535350 44 3229 21 12111 ‫הפרויקטים‬ ‫תחומי‬,‫ב‬ ‫בארגונך‬ ‫החלו‬ ‫אשר‬-2013/‫ל‬ ‫מתוכננים‬-2014 *‫מרובה‬ ‫בחירה‬
  • 67. Sigal Russin’s work/ Copyright@2014 Do not remove source or attribution from any slide, graph or portion of graph 67 Beware of Unknown Security Threats Source: http://www.ebusinessplanet.com/category/online-business/
  • 68. Sigal Russin’s work/ Copyright@2014 Do not remove source or attribution from any slide, graph or portion of graph 68
  • 69. Sigal Russin’s work/ Copyright@2014 Do not remove source or attribution from any slide, graph or portion of graph Cyber Intelligence 69
  • 70. Sigal Russin’s work/ Copyright@2014 Do not remove source or attribution from any slide, graph or portion of graph 2014 70Source: CYREN
  • 71. Sigal Russin’s work/ Copyright@2014 Do not remove source or attribution from any slide, graph or portion of graph Internet of everything71
  • 72. Sigal Russin’s work/ Copyright@2014 Do not remove source or attribution from any slide, graph or portion of graph Challenges in Cyber Security Expanding threat landscape The increased complexity, number and sophistication of incoming threats have led to a fragmented infrastructure approach for security provision, which is inefficient, risky and a nightmare to manage. End-point consumerisation: IOT and M2M explosion An increase in the number and variety of devices connected to the Internet increases the opportunity of security breaches by orders of importance. Most security infrastructures are completely unprepared for the escalation in event numbers and types. Skills lack The lack of availability of cyber security skills is very influence. Despite the professional associations that provide security accreditation, there is still a major lack of resource with the right skills and experience to cope with cyber security market demand. Salaries of experienced security analysts are increasing substantially, and staff retention is proving elusive. 72 Source: http://www.icontact-archive.com/oVcotBdZudhBcQahFd9aCVMmrT_AgJpG?w=4
  • 73. Sigal Russin’s work/ Copyright@2014 Do not remove source or attribution from any slide, graph or portion of graph Cyber events 2013 ‫ריגול‬–Espionage Steal information government agencies, embassies, Oil and gas companies, research institutes, provide military and social activists. Hit and Run Attacks Small groups perform minor assaults and targeted information and locate surgical precision. The attack usually lasts a few days/weeks, and they have achieved what they were looking for, Cleaning And leaving Distributed Denial of Service- DDoS Activism and theft in the virtual world Ransomware"‫כופר‬ ‫תוכנות‬" Malware and viruses used in the internet crime factors blackmail companies and private users in the form of ransom. Watering Hole Attacks in which attackers infect a website, their intended victims Are expected to visit it, while exposing victims of malware as soon as they enter the site Rise in malicious software quality in mobile The victim did not know he would attack and could not remove the offensive machine. 73
  • 74. Sigal Russin’s work/ Copyright@2014 Do not remove source or attribution from any slide, graph or portion of graph Cyber events 2013 74 The human factor is (still) the weakest link in the security chain Social Engineering Big brother is watching - Lavabit , Silent Circle, NSA Surveillance and invasion of privacy information Vulnerabilities & Zero Days Don’t forget Patch Management, win XP will Not support by Microsoft Bitcoins Already crossed the border 1000$. So loved among the attackers
  • 75. Sigal Russin’s work/ Copyright@2014 Do not remove source or attribution from any slide, graph or portion of graph How to deal with Cyber? 75 IT is not only changing information security tools but also an internal vision of security inside your business.
  • 76. Sigal Russin’s work/ Copyright@2014 Do not remove source or attribution from any slide, graph or portion of graph Insights Customer Roundtable Every organization approaches Cyber ​​differently. Some customers use existing information security tools. There are customers who are trying to test new tools related to cyber such as forensic and APT tools. Most organizations are working to increase awareness among employees in different ways and the importance of the organization's information security policy. Mobile also brings the expansion of EP in endpoint security. 76
  • 77. Sigal Russin’s work/ Copyright@2014 Do not remove source or attribution from any slide, graph or portion of graph ISO 27032 77 Information technology — Security techniques — Guidelines for cybersecurity Published in 2012. Defined as the “preservation of confidentiality, integrity and availability of information in the Cyberspace”. Main sections: • Overview • Assets in the Cyberspace • Threats against the security of the Cyberspace • Roles of stakeholders in Cybersecurity • Guidelines for stakeholders • Cybersecurity controls • Framework of information sharing and coordination • Annex A. Cybersecurity readiness • Annex B. Additional resources • Annex C. Examples of related documents 77
  • 78. Sigal Russin’s work/ Copyright@2014 Do not remove source or attribution from any slide, graph or portion of graph Security on virtual machines There is no single unified threat management tool for the virtual world 1) Intrusion detection and firewall features 2) Compliance and auditing 3) Reporting- where and how an organization is vulnerable. Check how easy is to generate actionable reports and whether the product can automatically flag particular violations. 1) Access controls- tie access control roles to particular Active Directory users. 2) Anti-virus/anti-malware protection You should do some basic testing of any of these products and understand how they fit into your existing security frameworks and operations. 78 Don’t forget to cover security layer on virtual machines
  • 79. Sigal Russin’s work/ Copyright@2014 Do not remove source or attribution from any slide, graph or portion of graph 79 Source: http://www.arbornetworks.com/corporate/blog/5151-ddos-attacks-the-necessity-of-multi-layered-defense
  • 80. Sigal Russin’s work/ Copyright@2014 Do not remove source or attribution from any slide, graph or portion of graph 80 Security To SaaS Business applications
  • 81. Sigal Russin’s work/ Copyright@2014 Do not remove source or attribution from any slide, graph or portion of graph Cloud-based security as a service 81 The goal is to provide real-time analysis and a clear audit trail and reporting related to SaaS-based application usage by the enterprise. The monitoring can allows options for automating or manually terminating sessions or blocking content download.
  • 82. Sigal Russin’s work/ Copyright@2014 Do not remove source or attribution from any slide, graph or portion of graph Cyber forecast 2014 82 “Cloud computing” providers Gaps / weaknesses / vulnerabilities. Focus on current and ongoing process of assessment and risk management in the cyber world. New threats will force organizations to change concept and move static protection proactive. Sophistication attacks that are based on the malware mobile (IOS & Android). Security events in health care: attacks on electronic medical equipment, leakage of confidential information Hospitals, international facilities in the area (HIPAA).
  • 83. Sigal Russin’s work/ Copyright@2014 Do not remove source or attribution from any slide, graph or portion of graph STKI Summit 2014 Frame tale: New Business enabling technologies 3D printing 83
  • 84. Sigal Russin’s work/ Copyright@2014 Do not remove source or attribution from any slide, graph or portion of graph 3D printing Printing Today – 2D Printing: •Production time is too long •High costs •Lack of availability •Need technical personnel to quote, specify and configure product for design & engineering integrity •Slower product design •Late design changes take time to integrate The solution: 3D Printing 84
  • 85. Sigal Russin’s work/ Copyright@2014 Do not remove source or attribution from any slide, graph or portion of graph 85
  • 86. Sigal Russin’s work/ Copyright@2014 Do not remove source or attribution from any slide, graph or portion of graph 3D printing is already transforming the way the company does business 86
  • 87. Sigal Russin’s work/ Copyright@2014 Do not remove source or attribution from any slide, graph or portion of graph 3D printing is already transforming the way the company does business 87
  • 88. Sigal Russin’s work/ Copyright@2014 Do not remove source or attribution from any slide, graph or portion of graph 88 Source:http://www.nationaldefensemagazine.org/archive/2014/March/pages/3DPrinti ngPromisestoRevolutionizeDefense,AerospaceIndustries.aspx
  • 89. Sigal Russin’s work/ Copyright@2014 Do not remove source or attribution from any slide, graph or portion of graph 3D Printing- Future Printing Innovation Improve Communication Different Materials Personalize products Reduce Development Costs Speed Time to Market Win Business Source:http://www.computerweekly.com/feature/How-3D-printing-impacts-manufacturing 89
  • 90. Sigal Russin’s work/ Copyright@2014 Do not remove source or attribution from any slide, graph or portion of graph Coca-Cola Israel’s Mini-Bottles 90
  • 91. Sigal Russin’s work/ Copyright@2014 Do not remove source or attribution from any slide, graph or portion of graph 91
  • 92. Sigal Russin’s work/ Copyright@2014 Do not remove source or attribution from any slide, graph or portion of graph 92
  • 93. Sigal Russin’s work/ Copyright@2014 Do not remove source or attribution from any slide, graph or portion of graph POTENTIAL ECONOMIC IMPACT BY 2025 SOURCE: McKinsey Global Institute analysis 93
  • 94. Sigal Russin’s work/ Copyright@2014 Do not remove source or attribution from any slide, graph or portion of graph Thank You! 94 Sigalr@stki.info