Network Consulting Services, Inc - PowerPoint PPT Presentation

1 / 15
About This Presentation
Title:

Network Consulting Services, Inc

Description:

Regulatory is driving companies to enforce 'security best practices' ... Easy to obtain information, communicate and control systems over great distances ... – PowerPoint PPT presentation

Number of Views:77
Avg rating:3.0/5.0
Slides: 16
Provided by: angi66
Category:

less

Transcript and Presenter's Notes

Title: Network Consulting Services, Inc


1
Network Consulting Services, Inc
Endpoint Threatscape and Security
October 20, 2005
2
Agenda
  • Endpoint Security Principles and Priorities
  • Business Priorities
  • Threatscape
  • Wireless Hacking Demo
  • Business Community Direction

3
Endpoint Security Principles
  • Security Spectrum

Secure
Functional
4
Endpoint Security Principles
5
Information Technology Priorities
Security was and is a top priority
6
Security Market Growth
  • Regulatory is driving companies to enforce
    security best practices
  • Recent high-profile malicious attacks exploited
    known vulnerabilities
  • Growing demand of managing complex networks is
    driving companies to become proactive in managing
    vulnerabilities

Source Broadview International March 2005 IDC
2004
7
Market DynamicsThreats to Enterprise Network
Security
8
Threatscape
  • Vulnerabilities on the rise

9
Threatscape
  • Inside of our networks are almost as risky as the
    outside
  • Networks are not well-compartmentalized
  • Easy to obtain information, communicate and
    control systems over great distances
  • Ubiquitous interconnections and global networks
  • More links to business partners
  • Outsourced staff, consultants, and contractors
  • Pervasive mobile computing
  • Complex software has many vulnerabilities
  • Lots of bad guys very bad guys
  • Time is an enemy - Beat the clock

10
Threatscape Dynamics Evolution of Attacks
Attacker Skill
11
Wireless Hacking
  • DEMO

12
Market Dynamics Ignore IT Security Bad Idea
  • Companies must be more proactive against security
    threats to avoid
  • lost data
  • lost productivity
  • ruined reputation
  • unnecessary costs
  • significant business risk
  • Even with large investments in IT security
  • 1/3 companies will be infected by computer virus
  • Over 2/3 machines will be infected with spyware
  • 1/3 companies will experience internal security
    breach
  • 1/3 companies will fail compliance audit

13
Market DynamicsVulnerability Management is Key
  • IT security organizations should implement a set
    of processes and technologies that
  • Establishes and maintains a security
    configuration baseline
  • Discovers, prioritizes and mitigates exposures
  • Establishes security controls
  • Eliminates root causes

14
What do we do ?
We have two choices
Make the Mouse a Non-Issue
Build Better Mouse Traps
15
What do we do Right NOW ?
  • Make the endpoint a non-issue
  • We either trust the endpoint or we dont
  • Cisco NAC
  • Checkpoint Integrity Server
  • LANDesk Trusted Access
  • Etc
  • With these systems we can
  • Make and enforce access policies
  • Track and report (audit)
  • Mitigate the effects of the ThreatScape

16
  • Thank You
Write a Comment
User Comments (0)
About PowerShow.com