More Related Content
Similar to A10 presentation overcoming the industrys insecurity complex (20)
More from Dr. Wilfred Lin (Ph.D.) (20)
A10 presentation overcoming the industrys insecurity complex
- 1. 1Confidential | © A10 Networks, Inc.
Overcoming the Industry’s
INSECURITY COMPLEX
Neil Wu Becker
Vice President
Of Worldwide Marketing
& Communications
- 2. 2Confidential | © A10 Networks, Inc.
Generating Security Investment ROI by Putting
Culture First, Technology Second
- 3. 3Confidential | © A10 Networks, Inc.
They don’t teach you
about security in school
- 5. 5Confidential | © A10 Networks, Inc.
The biggest threat for a
company is between the
chair and the keyboard
- 8. 8Confidential | © A10 Networks, Inc.
VS
Blacksmiths Knights
Security Vendors' Insecurity Complex
- 10. 10Confidential | © A10 Networks, Inc.
Simultaneous Attacks
Network
Bandwidth Application
- 11. 11Confidential | © A10 Networks, Inc.
of all attacks are
multi-vector attacks
Source: BT, 2014
75%
Based on 640 interviews with IT decision makers
in large organizations (1000+ employees) In 11
countries across the world. Range of sectors
finance retail and public
- 12. 12Confidential | © A10 Networks, Inc.
Vectors
Media/Entertainment
Service
7
300 Gbps
Q2 2014
Vectors
Educational
Institutions
XOR Botnet
2
150+ Gbps attack
Q4 2015
Gambling Site
100 Gbps
Q2 2014
Vectors5
Multi-Vector Attacks Are Here
- 16. 16Confidential | © A10 Networks, Inc.
Cyber Threats Hidden in SSL Traffic
Sources:
SandvineInternetPhenomena Report “Security Leaders Must Address Threats From Rising SSL Traffic,” 2013
50% 80%
of Internet
traffic will be
encrypted
by 2016
of attacks will use
encryption to
bypass controls
by 2017
of organizations
with firewalls, IPS,
or UTM do not
decrypt SSL traffic
67%
- 19. 19Confidential | © A10 Networks, Inc.
The biggest threat for a
company is between the
chair and the keyboard
- 20. 20Confidential | © A10 Networks, Inc.
The biggest asset for a
company is between the
chair and the keyboard
- 21. 21Confidential | © A10 Networks, Inc.
Your Biggest Security Solution:
Your Security Culture
Culture