La sécurité de l'emploi : protégez votre SI

0 %
100 %
Information about La sécurité de l'emploi : protégez votre SI

Published on February 26, 2014

Author: MicrosoftEntrepreneurs



La sécurité n’est plus un add-on au système d’information, mais doit s’intégrer à tous les niveaux, depuis son architecture jusqu’à la résolution d’incidents, en passant par l’exploitation au quotidien des centres de données. Dans un contexte de mobilité accrue et en considérant l’émergence d’un modèle d’informatique à la demande, la sécurité repose autant sur la prévention technique que sur l’éducation comportementale des utilisateurs et sur la capacité des systèmes à résister aux attaques Session présentée par le partenaire : DELL.

Speakers : Florian Malecki (DELL)

La sécurité de l'emploi : protégez votre SI Florian Malecki EMEA Product & Marketing Solution Director Dell, Sécurité

Donnez votre avis ! Depuis votre smartphone sur : De nombreux lots à gagner toute les heures !!! Claviers, souris et jeux Microsoft… Merci de nous aider à améliorer les Techdays ! #mstechdays Sécurité

Underlying foundation of threats: Basic nature of threats is constant change Expanding complexity and reach of threats Global infrastructure • Cyber-terrorism, morphing and complex threats Regional networks • AI (learn) hacking Multiple networks • Internet • Worms • Modem Individual computers 1980 • DOS/ DDOS • Firewall 101 • Individual computers • Trojans • Security Individual networks • Physical again (Portable media) • TSRs • XSS, SQL Injection attacks • Espionage • Financial gain • Homeland security threats • Delivery via Web 2.0 and social networking sites • Viruses 1990 2000 2014

Threats are constantly evolving Risk of confidential data leakage is ever increasing

2014 Security Trends 1. Increased Usage of SSL Encryption 2. 3. 4. 5. 6.

Increased Usage of SSL Encryption

Increased Usage of SSL Encryption

Security Trends, 2014 1. Increased Usage of SSL Encryption 2. Ransomware Continues,news-18066.html

Security Trends, 2014 1. Increased Usage of SSL Encryption 2. Ransomware Continues 3. Increase in Win 7 & Win 8 Attacks

Increase in Win7 & Win8 Attacks

Increase in Win7 & Win8 Attacks

Security Trends, 2014 1. Increased Usage of SSL Encryption 2. Ransomware Continues 3. Increase in Win 7 & Win 8 Attacks 4. New Exploit Kits in the Wild

New Exploit Kits in the Wild

New Exploit Kits in the Wild

Security Trends, 2014 1. Increased Usage of SSL Encryption 2. Ransomware Continues 3. Increase in Win 7 & Win 8 Attacks 4. New Exploit Kits in the Wild 5. Sophisticated Smartphone Attacks

Sophisticated Smartphone Attacks

Sophisticated Smartphone Attacks Vulnerabilities Malware Families

Security Trends, 2014 1. Increased Usage of SSL Encryption 2. Ransomware Continues 3. Increase in Win 7 & Win 8 Attacks 4. New Exploit Kits in the Wild 5. Sophisticated Smartphone Attacks 6. System Hopping Malware

System Hopping Malware

System Hopping Malware

The IT journey… From mainframe to client server to distributed to risk everywhere

Powerful disrupters… the world is more connected than ever. Cloud Big Data Mobility Security and risk 85% of businesses said their organizations will use cloud tools moderately to extensively in the next 3 years. 35 By 2020 volume of data stored will reach 35 Zettabytes 5X Mobility source shifts from 62%/38% corporate/personal owned to 37% corporate owned and 63% personal owned 79% of surveyed companies experienced some type of significant security incident within the past year that resulted in financial and/or reputational impact

Unfortunately, the bad guys are more connected too. They have many names Spear-Phishers, BOTnets, DDoS, Zero-Day Threats, Insider threats & former employees They’re determined to exploit “disconnected security” Security tools, processes, user profiles and information, separated in siloes that leave dangerous gaps inbetween

Business can’t stop to wait for security Cloud SaaS Data growth BYOD Desire: secure How is your To embrace environment business trends with all these new initiatives Challenge: coming into Security often play? gets in the way Web 2.0 Virtualization Compliance

Users are Increasingly Out of Your Control More… Day Extenders Home Office Users Kiosks/Public Machine Users    Traveling Executives   Devices Saas/Hosted Apps Social Media Network environments Mobility Business Partners/ Extranet Users Saas, Web 2.0 Real-Time Apps Wireless LAN Users VOIP Users Tablets & Smart Phone Users Internal Users External Users

Mobile business use cases It’s not just email and calendar any more… SOURCE: Yankee Group, June 2012

Why mobile devices can be risky? 30

Every 56’’ a laptop is stolen $49,246 Average value of lost laptop1 46% Of lost laptops contained confidential data1 Data is the most important asset companies own: + Intellectual Property + Customer and employee data + Competitive information IT managers are looking for ways to: Were not protected with mobile security features1 $5.5M Average organizational cost of a data breach2 Source: 1. Poneman Institute Study Source: 2 Symantec & Poneman Institute Study: US cost of a Data Breach, 2011 Fully protect data wherever it goes without disrupting end users + Save time deploying and managing security + Ensure they remain in compliance + 57% + Flexible scale to ensure they meet the requirements of different users

Mobile usage – blurred lines Personal Business Email Email Calendar Calendar Internet access Intranet file share Social media Intranet business apps Increased risk of business data loss and introduction of malware

Today, layers and silos get the security job done but often have gaps = business risk Individual job done well in silos • Solutions often don’t work together • Solutions don’t work across the business Silos and layers add stress to your resources • Difficult to get to work together • Limited security resources Dell belief: there is a better way

Dell’s vision: Connected Security for a connected world Effective Security to enable business while also meeting the needs of security Connected Security is security that… • • • • Shares and applies intelligence Works with the business, end-to-end Maintains flexibility and open architecture Enables broad contextual awareness with dynamic control Protect information everywhere Efficient Work with the business

Securing & Monitoring Data and Access DDP| E KACE Applications SonicWALL SecureWorks Data

The Dell Approach is Simple and Modular with Outside in and inside out protection, from device to cloud. Data cloud Data Security Configuration & Patch Management Identity Identity & Access Management Data center Network End points Next Gen Firewall Secure Remote Access Email Security Security Services Incident Response Managed Security Services Security & Risk Consulting

Dell Security Service s Let good guys in Keep bad guys out Enstratius (Multi-Cloud Manager) IAM Dell Threat Intelligence Dell Incident Response Application Security Network Security Data & Endpoint Security Dell KACE Dell SonicWALL Dell SonicWALL Secure Remote Access (SRA) Mobile Connect Dell One Identity IAM Dell Security & Risk Consulting Configuration & Patch Management Dell Data Protection Encryption Dell KACE Dell SonicWALL Embedded in Dell Infrastructure & Devices Email Security Dell SonicWALL K3000 MDM Next-Gen Firewall Dell Wyse Cloud Client Manager Scalable and Mid-Market design point: endpoint to data center to cloud Endpoint Network Server Storage Cloud Did you know DELL does Security? *formerly Quest One Dell Managed Security Services

Better connected means better protected Connect security to infrastructure Embed: Security embedded natively into infrastructure Connect security to information Protect, Predict: Security solutions that gather, analyze, report and enable action Connect security to other security solutions Embed, Protect, Predict, Respond: Security that is no longer siloed…Data, User, Network,, Services

Making Dell Connected Security tangible • Encryption enforcement for Cloud Services

Demo: Encryption Enforcement for Cloud Services Data protection assurance… • Dell Data Protection | Encryption + • If encryption isn’t present, document cannot be posted until device is compliant with policy • Dell NextGeneration Firewall Ensures encryption is applied prior to the document being posted to a cloud service Applies company access policies to cloud service, if desired Better connected means better protected

Making Dell Connected Security tangible • Secure Mobile Access

Demo: Secure Mobile Access Dell Kace + Dell Secure Mobile Access Better connected means better protected

Demo: Secure Mobile Access • Quarantine systems not running the KACE agent • Redirect users to KACE User Portal • Allow KACE agent to bring endpoint to compliance Better connected means better protected

Demo: Secure Mobile Access Secure Mobile Access… Dell Defender + Dell Secure Mobile Access • Increased security using SSL VPN and 2 Factor Authentication solutions Better connected means better protected

Mobile Connect for Windows 8.1 • Microsoft ships Mobile Connect VPN plugin ‘Inbox’ in Windows 8.1 • Supports all versions of Windows 8.1 including Windows RT and (Window Phone Future) • Integrated Windows user experience with management via Windows UI, MDM solutions and PowerShell.

Dell security and business solutions are recognized in the Gartner Magic Quadrants 2011 to 2013 Challengers Leaders • Identity and Access Governance • Managed Security Service Providers • Unified Threat Management • User Administration and Provisioning Security Solutions Niche Players • Enterprise Network Firewalls • Secure Email Gateways • Enterprise Backup/Recovery Software Visionaries • E-Class SRA SSL VPN • Mobile Data Protection

Snapshot Patagonia grew out of a small company that made tools for climbers. Alpinism remains at the heart of a worldwide business that still makes clothes for climbing – as well as for skiing, snowboarding, surfing, fly fishing, paddling and trail running, and employs over 1600 employees worldwide. Challenge The company needed to update its legacy firewalls and implement a centralised management tool to make it easy to deploy and manage. Application Intelligence and Control firewall functionalities and QoS were also key requirements. Results • Fast implementation of the Dell SonicWALL E-Class NSA 5500, TZ series and Wireless Access Points at the EMEA HQs and remote locations • Better bandwidth usage and management • Efficient and cost-effective distributed network implementation • Better work-life balance thanks to secure remote access • Dell SecureWorks for 24/7 security monitoring/auditing • Dell Eco System: servers, storage, laptops/PCs Software

Out Connect The Threats with

Dell Connected Security

Digital is business

#mstechdays presentations

Add a comment

Related presentations

Presentación que realice en el Evento Nacional de Gobierno Abierto, realizado los ...

In this presentation we will describe our experience developing with a highly dyna...

Presentation to the LITA Forum 7th November 2014 Albuquerque, NM

Un recorrido por los cambios que nos generará el wearabletech en el futuro

Um paralelo entre as novidades & mercado em Wearable Computing e Tecnologias Assis...

Microsoft finally joins the smartwatch and fitness tracker game by introducing the...

Related pages

La sécurité de l'emploi : protégez votre SI - YouTube

La sécurité n'est plus un add-on au système d'information, mais doit s'intégrer à tous les niveaux, depuis son architecture jusqu'à la ...
Read more

Sécutité Plus Services - Action Assistance - Nouvelle SITE ...

... l'assistance et la sécurité ... Protégez votre ... inutilement le contenu de votre portefeuille lors d'un paiement. Si vous devez ...
Read more

Sensibilisation à la sécurité de l'information - YouTube

... protégez votre ... Sécurité de l'information : la messagerie est le ... La sécurité de l'emploi : protégez votre SI ...
Read more

Sécurité et identifiant Apple - Assistance Apple

... plus sur la sécurité et sur votre ... La politique d’Apple induit l’emploi de mots de ... si vous pensez que la sécurité de votre ...
Read more


PROTÉGEZ ET CONNECTEZ VOTRE DOMICILE AVEC CIRCLE. ... Plus sur la sécurité. ... Si vous continuez à naviguer sur ce site sans modifier vos ...
Read more

Questions fréquentes sur la sécurité dans Google Apps ...

Trouvez les réponses aux questions fréquemment posées au sujet de la sécurité ... si la demande est adressée par ... prêts à l'emploi ...
Read more

Protégez votre domicile via votre ordinateur -

Protégez votre domicile via ... les télécommunications sans fil modernes pour assurer la sécurité de votre ... prêt à l'emploi", ...
Read more

Télécharger App Lock Android gratuit

Si votre information est ... Si vous vous inquiétez de la sécurité de l'information de votre ... La navigation sur nos sites et l'accès et l'emploi de ...
Read more

OneDrive - Outils et solutions pour la formation en ligne

Sécurité pour votre entreprise Protégez vos données Soyez prêt Raisons justifiant la mise à niveau de la sécurité de votre entreprise ...
Read more