Transcript

FIVE REASONS WHY

SECURITY NEEDS A RESETwww.secur i t y focuses .com

12 November 2013

[email protected]

01622 723456

1

TIME TO RESET SECURITY

Complexity in security is growing from all sides, but at the same time, IT teams have to do more with less people – and all without compromising data or the business. We need a new approach – but how do we do this?

2

Growing complexity

• The security landscape has changed

• Sophisticated attacks

• Many more access points

• Different data sources

Squeeze on IT depts

• IT budgets are under pressure

• Security without compromise to brand, data, commercials

Think differently

• More hardware isn’t solving the problem

• Time to approach security in a different way

IMPROVE

YOUR

VISION

Visibility across the whole of the infrastructure is the key to improving security intelligence and taking control of increasing complexity.

4

SEE THE WHOLE PICTURE

Informed assessment

Understand the infrastructure and gather intelligence

Platform approach

For visibility you need a platform collecting data from multiple

sources

Real time correlation

Real time monitoring and correlation is

the foundation for complete

security

YOU CAN’T

BUY

INTELLIGENCE

Security intelligence isn’t something you can buy off the shelf. Complete security goes beyond point technologysolutions to assess risk and detect threats in real-time.

6

TECHNOLOGY ≠ INTELLIGENCE

People count

Intelligence is the symbiotic relationship of

security managed by bright people

Correlate in context

When you have visibility, expert

contextual interpretation is vital for security

Early threat detection

Intelligence creates an early

warning platform –

beyond typical threat detection

PROACTIVE

THREAT

DETECTION

An end-to-end approach to security will shift security operations from reactive to proactive. Real-time threat detection can literally transform risk management and security effectiveness.

8

PROTECT THROUGH ACTIVE DEFENCE

Don’t just defend

What security does today is

defend our data – we want to do threat mitigation

Use your intelligence

If we have the information, we can proactively

detect and divert the threat

Course of action

Don’t wait for threats – use analytics to

actively disrupt, deny &

deceive adversaries

RESPONSE

IS TOO LATE

The best response to a security breach is to do something about it before the event. Maintaining the intelligence platform demands continuous expert management.

10

AVOID SECURITY INCIDENTS

Maintain your engine

More complex, deeper

technology is harder to

maintain and support

24x7 intelligenceContinuous

monitoring and correlation of

data is critical, but

tough to deliver in-house

Security as a service

Push monitoring data and

analytics to the cloud and

consume as an expert service

BECAUSE

YOU WANT TO

SAY ‘YES’

It’s not practical to lock down business users, or prevent access to certain devices or applications, and you can’t build a perimeter around your data. But your business still needs to be run securely.

12

MAKE SECURITY BUSINESS-FRIENDLY

Make security agile

Abstracted security

intelligence enables

business agility

Add business value

Integrate security

intelligence into big data projects

Time for a new approach

Assess risk; detect

threats, protect valuable assets and respond in

real-time

13

THANK YOU

Attend our event and learn more

about end-to-end securitywww.securityfocuses.com

[email protected] :: 01622 723456

14


Top Related