SlideShare uma empresa Scribd logo
1 de 15
Baixar para ler offline
Trustwave Overview
Simple solutions
to your complex security and compliance challenges.



                                               Presented by:
                                              Edward Chandler
                                                            &
                                                     Eric Lehr
                                                          © 2012
Today’s Discussion

• Who is Trustwave
• What we do
• Dive into Financial Institution Specifics




                                              © 2012
Industry Problem - Statistics

    60 percent of the top 100 US Web sites contain malware -
    Gartner ®
    75 percent of the Web sites that serve malware are legitimate
    sites which deliver it unknowingly – Gartner ®
    59% of respondents said they’ve seen a jump in malware
    infections over the past 12 months due, specifically, to insecure
    mobile devices including laptops, smartphones, and tablets
    while 51% said their organization has experienced a data
    breach due to insecure devices. – Ponemon®




                                                                        © 2012
Layered, Best-in-Class Security
                                  SWG, Web Filter
                   Web            Protect from unsafe,
                                  malware infected sites

                                  WAF
                Application       Protect web applications
                                  from external threats


                                  UTM, NAC
                 Network          Firewall, IDS/IPS, IVS ,
                                  rogue device protection

                                  Encryption
                  Data            Encrypt laptops, USB and
                                  files with Smart Tags
                   &
                  Email           DLP, Secure Email
                                  Prevent data leaks –
                                  email, network, ports


                                                      © 2012
Unified, Co-operative Security

                        Web


                     Application



  SIEM                Network


                       Data
                        &
                       Email

                  Managed Security


                                     © 2012
Recognized as a Leader in
       The Forrester WaveTM




                                     Trustwave Managed Security
                                     We run your security, you run your business

March, 2012, Forrester Reasearch, Inc.




                                                                                   © 2012
Trustwave MSS – Beyond Firewalls


  Traditional        Trustwave Next
  Offerings          Generation MSS
  Firewalls
  Anti-spam
  Anti-malware
                 +   WAF
                     Application Security
                     NAC
                     Network Security
  UTM                Encryption
                     Data Security
  Secure email       FIM
                     powered by SIEM




                                            © 2012
Benefits of Trustwave MSS
                                            Recognized as a Leader in
                                              The Forrester WaveTM
• Lower TCO, predictable costs
• Supplement scarce resources,
  shared responsibility
• Top class security expertise
• Faster reaction times
• Higher value offering roadmap
• SpiderLabs threat intelligence         March, 2012, Forrester Reasearch, Inc.




         Lower Costs - Better Security

                                                                          © 2012
Top Global Financial Institutions Use Trustwave




                                                  © 2012
Who should I be speaking with?
•   CIO
•   CISO
•   COO
•   VP of IT
•   Information Security Manager
•   Network Administrator




                                   © 2012
Drivers For Financial Institutions
•   FFIEC
•   Gramm-Leach-Bliley Act(GLBA)
•   Sorbanes Oxley Act(SOX)
•   National Credit Union Association(NCUA)
•   Payment Card Industry(PCI)




                                              © 2012
What is the buzz in Financial Infosec?
•   Managed Security Services(MSS)
•   Security Information Event Management(SIEM)
•   Data Loss Prevention(DLP)
•   Intrusion Detection System(IDS)
•   Secure Web Gateway(SWG)
•   Secure Email Gateway(SEG)
•   Web Application Firewall(WAF)
•   Network Access Control(NAC)


                                                  © 2012
Qualifying Questions to Use
• Have you had an FDIC examiner come in recently?
• Where do you see your information security in the next
  year?
• Who hosts your web applications?
• How are you currently managing your logs?
• Do you have a web filtering solution in place?
• Who manages your security solutions? ie: Firewall,
  Intrusion Detection
• Do you have any other IT security initiatives you need
  addressed?


                                                           © 2012
QUESTIONS?
• Contact Info:
  – VerdeSol LLC
     •   Terell Jones, CEO
     •   (571) 212-0260
     •   theGreenITguy@gmail.com
     •   Authorized Reseller




                                   © 2012
© 2012

Mais conteúdo relacionado

Mais procurados

RSA 2010 Kevin Rowney
RSA 2010 Kevin RowneyRSA 2010 Kevin Rowney
RSA 2010 Kevin RowneySymantec
 
2011 FCC CSRIC WG2A Cyber Security Best Practices Final Report
2011 FCC CSRIC WG2A Cyber Security Best Practices Final Report2011 FCC CSRIC WG2A Cyber Security Best Practices Final Report
2011 FCC CSRIC WG2A Cyber Security Best Practices Final ReportPhil Agcaoili
 
Cyber Secuirty Visualization
Cyber Secuirty VisualizationCyber Secuirty Visualization
Cyber Secuirty VisualizationDoug Cogswell
 
Talking To The Board: How To Improve Your Board's Cyber Security Literacy – U...
Talking To The Board: How To Improve Your Board's Cyber Security Literacy – U...Talking To The Board: How To Improve Your Board's Cyber Security Literacy – U...
Talking To The Board: How To Improve Your Board's Cyber Security Literacy – U...Tripwire
 
InfraGard Webinar March 2016 033016 A
InfraGard Webinar March 2016 033016 AInfraGard Webinar March 2016 033016 A
InfraGard Webinar March 2016 033016 AWard Pyles
 
Nexagate corporate profile 2021
Nexagate corporate profile 2021Nexagate corporate profile 2021
Nexagate corporate profile 2021Khairil Effendy
 
Presentation : CIO challenges by AJ.Prinya ในงานสัมมนาผู้บริหารไอที เมื่อวันท...
Presentation : CIO challenges by AJ.Prinya ในงานสัมมนาผู้บริหารไอที เมื่อวันท...Presentation : CIO challenges by AJ.Prinya ในงานสัมมนาผู้บริหารไอที เมื่อวันท...
Presentation : CIO challenges by AJ.Prinya ในงานสัมมนาผู้บริหารไอที เมื่อวันท...Software Park Thailand
 
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...International Federation of Accountants
 
Cybersecurity PowerPoint Presentation Slides
Cybersecurity PowerPoint Presentation Slides Cybersecurity PowerPoint Presentation Slides
Cybersecurity PowerPoint Presentation Slides SlideTeam
 
Establishing an insider threat programme: Know your Snowden - Puneet Kukreja,...
Establishing an insider threat programme: Know your Snowden - Puneet Kukreja,...Establishing an insider threat programme: Know your Snowden - Puneet Kukreja,...
Establishing an insider threat programme: Know your Snowden - Puneet Kukreja,...Puneet Kukreja
 
Dell Solutions Tour 2015 - Security in the cloud, Ramses Gallego, Security St...
Dell Solutions Tour 2015 - Security in the cloud, Ramses Gallego, Security St...Dell Solutions Tour 2015 - Security in the cloud, Ramses Gallego, Security St...
Dell Solutions Tour 2015 - Security in the cloud, Ramses Gallego, Security St...Kenneth de Brucq
 
Hacktive Security - Ethical Hacking Services
Hacktive Security - Ethical Hacking ServicesHacktive Security - Ethical Hacking Services
Hacktive Security - Ethical Hacking ServicesCarlo Pelliccioni, CISSP
 
Cyber security resilience ESRM Conference Amsterdam 2016
Cyber security resilience  ESRM Conference Amsterdam 2016Cyber security resilience  ESRM Conference Amsterdam 2016
Cyber security resilience ESRM Conference Amsterdam 2016Niran Seriki, CCISO, CISM
 
IT Security - Guidelines
IT Security - GuidelinesIT Security - Guidelines
IT Security - GuidelinesPedro Espinosa
 
Denis Hackett M.Sc. - IDC Presentation Sept 2014 Croke Park Sept25 - Denis Ha...
Denis Hackett M.Sc. - IDC Presentation Sept 2014 Croke Park Sept25 - Denis Ha...Denis Hackett M.Sc. - IDC Presentation Sept 2014 Croke Park Sept25 - Denis Ha...
Denis Hackett M.Sc. - IDC Presentation Sept 2014 Croke Park Sept25 - Denis Ha...Education & Training Boards
 
New CISO - The First 90 Days
New CISO - The First 90 DaysNew CISO - The First 90 Days
New CISO - The First 90 DaysResilient Systems
 
Gainful Information Security 2012 services
Gainful Information Security 2012 servicesGainful Information Security 2012 services
Gainful Information Security 2012 servicesCade Zvavanjanja
 

Mais procurados (20)

Cyber security
Cyber securityCyber security
Cyber security
 
RSA 2010 Kevin Rowney
RSA 2010 Kevin RowneyRSA 2010 Kevin Rowney
RSA 2010 Kevin Rowney
 
2011 FCC CSRIC WG2A Cyber Security Best Practices Final Report
2011 FCC CSRIC WG2A Cyber Security Best Practices Final Report2011 FCC CSRIC WG2A Cyber Security Best Practices Final Report
2011 FCC CSRIC WG2A Cyber Security Best Practices Final Report
 
Cyber Secuirty Visualization
Cyber Secuirty VisualizationCyber Secuirty Visualization
Cyber Secuirty Visualization
 
Talking To The Board: How To Improve Your Board's Cyber Security Literacy – U...
Talking To The Board: How To Improve Your Board's Cyber Security Literacy – U...Talking To The Board: How To Improve Your Board's Cyber Security Literacy – U...
Talking To The Board: How To Improve Your Board's Cyber Security Literacy – U...
 
InfraGard Webinar March 2016 033016 A
InfraGard Webinar March 2016 033016 AInfraGard Webinar March 2016 033016 A
InfraGard Webinar March 2016 033016 A
 
Nexagate corporate profile 2021
Nexagate corporate profile 2021Nexagate corporate profile 2021
Nexagate corporate profile 2021
 
Presentation : CIO challenges by AJ.Prinya ในงานสัมมนาผู้บริหารไอที เมื่อวันท...
Presentation : CIO challenges by AJ.Prinya ในงานสัมมนาผู้บริหารไอที เมื่อวันท...Presentation : CIO challenges by AJ.Prinya ในงานสัมมนาผู้บริหารไอที เมื่อวันท...
Presentation : CIO challenges by AJ.Prinya ในงานสัมมนาผู้บริหารไอที เมื่อวันท...
 
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
 
Cybersecurity PowerPoint Presentation Slides
Cybersecurity PowerPoint Presentation Slides Cybersecurity PowerPoint Presentation Slides
Cybersecurity PowerPoint Presentation Slides
 
Establishing an insider threat programme: Know your Snowden - Puneet Kukreja,...
Establishing an insider threat programme: Know your Snowden - Puneet Kukreja,...Establishing an insider threat programme: Know your Snowden - Puneet Kukreja,...
Establishing an insider threat programme: Know your Snowden - Puneet Kukreja,...
 
Dell Solutions Tour 2015 - Security in the cloud, Ramses Gallego, Security St...
Dell Solutions Tour 2015 - Security in the cloud, Ramses Gallego, Security St...Dell Solutions Tour 2015 - Security in the cloud, Ramses Gallego, Security St...
Dell Solutions Tour 2015 - Security in the cloud, Ramses Gallego, Security St...
 
Hacktive Security - Ethical Hacking Services
Hacktive Security - Ethical Hacking ServicesHacktive Security - Ethical Hacking Services
Hacktive Security - Ethical Hacking Services
 
Cyber security resilience ESRM Conference Amsterdam 2016
Cyber security resilience  ESRM Conference Amsterdam 2016Cyber security resilience  ESRM Conference Amsterdam 2016
Cyber security resilience ESRM Conference Amsterdam 2016
 
IT Security - Guidelines
IT Security - GuidelinesIT Security - Guidelines
IT Security - Guidelines
 
Denis Hackett M.Sc. - IDC Presentation Sept 2014 Croke Park Sept25 - Denis Ha...
Denis Hackett M.Sc. - IDC Presentation Sept 2014 Croke Park Sept25 - Denis Ha...Denis Hackett M.Sc. - IDC Presentation Sept 2014 Croke Park Sept25 - Denis Ha...
Denis Hackett M.Sc. - IDC Presentation Sept 2014 Croke Park Sept25 - Denis Ha...
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
New CISO - The First 90 Days
New CISO - The First 90 DaysNew CISO - The First 90 Days
New CISO - The First 90 Days
 
Gainful Information Security 2012 services
Gainful Information Security 2012 servicesGainful Information Security 2012 services
Gainful Information Security 2012 services
 
Cyber Security for Financial Institutions
Cyber Security for Financial InstitutionsCyber Security for Financial Institutions
Cyber Security for Financial Institutions
 

Semelhante a Cloud Security

Безопасность данных мобильных приложений. Мифы и реальность.
Безопасность данных мобильных приложений. Мифы и реальность.Безопасность данных мобильных приложений. Мифы и реальность.
Безопасность данных мобильных приложений. Мифы и реальность.Advanced monitoring
 
"Thinking diffrent" about your information security strategy
"Thinking diffrent" about your information security strategy"Thinking diffrent" about your information security strategy
"Thinking diffrent" about your information security strategyJason Clark
 
From SIEM to SA: The Path Forward
From SIEM to SA: The Path ForwardFrom SIEM to SA: The Path Forward
From SIEM to SA: The Path ForwardEMC
 
Security&reliability
Security&reliabilitySecurity&reliability
Security&reliabilitycaca1009
 
Trend micro data protection
Trend micro data protectionTrend micro data protection
Trend micro data protectionAndrew Wong
 
Dell sonicwall connected security
Dell sonicwall connected securityDell sonicwall connected security
Dell sonicwall connected securityMotty Ben Atia
 
Cloud Security - Idealware
Cloud Security - IdealwareCloud Security - Idealware
Cloud Security - IdealwareIdealware
 
Top Strategies to Capture Security Intelligence for Applications
Top Strategies to Capture Security Intelligence for ApplicationsTop Strategies to Capture Security Intelligence for Applications
Top Strategies to Capture Security Intelligence for ApplicationsDenim Group
 
The Cloud Beckons, But is it Safe?
The Cloud Beckons, But is it Safe?The Cloud Beckons, But is it Safe?
The Cloud Beckons, But is it Safe?NTEN
 
Extending security in the cloud network box - v4
Extending security in the cloud   network box - v4Extending security in the cloud   network box - v4
Extending security in the cloud network box - v4Valencell, Inc.
 
White Paper: Protecting Your Cloud
White Paper: Protecting Your CloudWhite Paper: Protecting Your Cloud
White Paper: Protecting Your CloudthinkASG
 
Empowering the business while efficiently mitigating risks - Eva Chen (Trend ...
Empowering the business while efficiently mitigating risks - Eva Chen (Trend ...Empowering the business while efficiently mitigating risks - Eva Chen (Trend ...
Empowering the business while efficiently mitigating risks - Eva Chen (Trend ...Minh Le
 
Security Risks: The Threat is Real
Security Risks: The Threat is RealSecurity Risks: The Threat is Real
Security Risks: The Threat is RealePlus
 
Dell Solutions Tour 2015 - Reduce IT admin work load and reduce complexity an...
Dell Solutions Tour 2015 - Reduce IT admin work load and reduce complexity an...Dell Solutions Tour 2015 - Reduce IT admin work load and reduce complexity an...
Dell Solutions Tour 2015 - Reduce IT admin work load and reduce complexity an...Kenneth de Brucq
 
Cyber security event
Cyber security eventCyber security event
Cyber security eventTryzens
 
Assuring Reliable and Secure IT Services
Assuring Reliable and Secure IT ServicesAssuring Reliable and Secure IT Services
Assuring Reliable and Secure IT Servicestsaiblake
 

Semelhante a Cloud Security (20)

Безопасность данных мобильных приложений. Мифы и реальность.
Безопасность данных мобильных приложений. Мифы и реальность.Безопасность данных мобильных приложений. Мифы и реальность.
Безопасность данных мобильных приложений. Мифы и реальность.
 
"Thinking diffrent" about your information security strategy
"Thinking diffrent" about your information security strategy"Thinking diffrent" about your information security strategy
"Thinking diffrent" about your information security strategy
 
From SIEM to SA: The Path Forward
From SIEM to SA: The Path ForwardFrom SIEM to SA: The Path Forward
From SIEM to SA: The Path Forward
 
Challenges2013
Challenges2013Challenges2013
Challenges2013
 
Security&reliability
Security&reliabilitySecurity&reliability
Security&reliability
 
Trend micro data protection
Trend micro data protectionTrend micro data protection
Trend micro data protection
 
Dell sonicwall connected security
Dell sonicwall connected securityDell sonicwall connected security
Dell sonicwall connected security
 
Cloud Security - Idealware
Cloud Security - IdealwareCloud Security - Idealware
Cloud Security - Idealware
 
Top Strategies to Capture Security Intelligence for Applications
Top Strategies to Capture Security Intelligence for ApplicationsTop Strategies to Capture Security Intelligence for Applications
Top Strategies to Capture Security Intelligence for Applications
 
The Cloud Beckons, But is it Safe?
The Cloud Beckons, But is it Safe?The Cloud Beckons, But is it Safe?
The Cloud Beckons, But is it Safe?
 
Cloud Security by CK
Cloud Security by CKCloud Security by CK
Cloud Security by CK
 
What every executive needs to know about information technology security
What every executive needs to know about information technology securityWhat every executive needs to know about information technology security
What every executive needs to know about information technology security
 
Extending security in the cloud network box - v4
Extending security in the cloud   network box - v4Extending security in the cloud   network box - v4
Extending security in the cloud network box - v4
 
White Paper: Protecting Your Cloud
White Paper: Protecting Your CloudWhite Paper: Protecting Your Cloud
White Paper: Protecting Your Cloud
 
Empowering the business while efficiently mitigating risks - Eva Chen (Trend ...
Empowering the business while efficiently mitigating risks - Eva Chen (Trend ...Empowering the business while efficiently mitigating risks - Eva Chen (Trend ...
Empowering the business while efficiently mitigating risks - Eva Chen (Trend ...
 
Security Risks: The Threat is Real
Security Risks: The Threat is RealSecurity Risks: The Threat is Real
Security Risks: The Threat is Real
 
Dell Solutions Tour 2015 - Reduce IT admin work load and reduce complexity an...
Dell Solutions Tour 2015 - Reduce IT admin work load and reduce complexity an...Dell Solutions Tour 2015 - Reduce IT admin work load and reduce complexity an...
Dell Solutions Tour 2015 - Reduce IT admin work load and reduce complexity an...
 
Cyber security event
Cyber security eventCyber security event
Cyber security event
 
Assuring Reliable and Secure IT Services
Assuring Reliable and Secure IT ServicesAssuring Reliable and Secure IT Services
Assuring Reliable and Secure IT Services
 
Appsec Introduction
Appsec IntroductionAppsec Introduction
Appsec Introduction
 

Cloud Security

  • 1. Trustwave Overview Simple solutions to your complex security and compliance challenges. Presented by: Edward Chandler & Eric Lehr © 2012
  • 2. Today’s Discussion • Who is Trustwave • What we do • Dive into Financial Institution Specifics © 2012
  • 3. Industry Problem - Statistics 60 percent of the top 100 US Web sites contain malware - Gartner ® 75 percent of the Web sites that serve malware are legitimate sites which deliver it unknowingly – Gartner ® 59% of respondents said they’ve seen a jump in malware infections over the past 12 months due, specifically, to insecure mobile devices including laptops, smartphones, and tablets while 51% said their organization has experienced a data breach due to insecure devices. – Ponemon® © 2012
  • 4. Layered, Best-in-Class Security SWG, Web Filter Web Protect from unsafe, malware infected sites WAF Application Protect web applications from external threats UTM, NAC Network Firewall, IDS/IPS, IVS , rogue device protection Encryption Data Encrypt laptops, USB and files with Smart Tags & Email DLP, Secure Email Prevent data leaks – email, network, ports © 2012
  • 5. Unified, Co-operative Security Web Application SIEM Network Data & Email Managed Security © 2012
  • 6. Recognized as a Leader in The Forrester WaveTM Trustwave Managed Security We run your security, you run your business March, 2012, Forrester Reasearch, Inc. © 2012
  • 7. Trustwave MSS – Beyond Firewalls Traditional Trustwave Next Offerings Generation MSS Firewalls Anti-spam Anti-malware + WAF Application Security NAC Network Security UTM Encryption Data Security Secure email FIM powered by SIEM © 2012
  • 8. Benefits of Trustwave MSS Recognized as a Leader in The Forrester WaveTM • Lower TCO, predictable costs • Supplement scarce resources, shared responsibility • Top class security expertise • Faster reaction times • Higher value offering roadmap • SpiderLabs threat intelligence March, 2012, Forrester Reasearch, Inc. Lower Costs - Better Security © 2012
  • 9. Top Global Financial Institutions Use Trustwave © 2012
  • 10. Who should I be speaking with? • CIO • CISO • COO • VP of IT • Information Security Manager • Network Administrator © 2012
  • 11. Drivers For Financial Institutions • FFIEC • Gramm-Leach-Bliley Act(GLBA) • Sorbanes Oxley Act(SOX) • National Credit Union Association(NCUA) • Payment Card Industry(PCI) © 2012
  • 12. What is the buzz in Financial Infosec? • Managed Security Services(MSS) • Security Information Event Management(SIEM) • Data Loss Prevention(DLP) • Intrusion Detection System(IDS) • Secure Web Gateway(SWG) • Secure Email Gateway(SEG) • Web Application Firewall(WAF) • Network Access Control(NAC) © 2012
  • 13. Qualifying Questions to Use • Have you had an FDIC examiner come in recently? • Where do you see your information security in the next year? • Who hosts your web applications? • How are you currently managing your logs? • Do you have a web filtering solution in place? • Who manages your security solutions? ie: Firewall, Intrusion Detection • Do you have any other IT security initiatives you need addressed? © 2012
  • 14. QUESTIONS? • Contact Info: – VerdeSol LLC • Terell Jones, CEO • (571) 212-0260 • theGreenITguy@gmail.com • Authorized Reseller © 2012