dss itsec 2013 conference 07.11.2013 - headtechnology - it security trends 2014
DESCRIPTION
Presentation from one of the remarkable IT Security events in the Baltic States organized by “Data Security Solutions” (www.dss.lv ) Event took place in Riga, on 7th of November, 2013 and was visited by more than 400 participants at event place and more than 300 via online live streaming.TRANSCRIPT
![Page 1: DSS ITSEC 2013 Conference 07.11.2013 - HeadTechnology - IT security trends 2014](https://reader036.vdocument.in/reader036/viewer/2022062511/54bce9864a7959815b8b45cd/html5/thumbnails/1.jpg)
Arturs FilatovsRegional Sales Director Baltic’s/
Member of the Board Baltics
07.11.2013
IT Security Solutions from industry leaders
![Page 2: DSS ITSEC 2013 Conference 07.11.2013 - HeadTechnology - IT security trends 2014](https://reader036.vdocument.in/reader036/viewer/2022062511/54bce9864a7959815b8b45cd/html5/thumbnails/2.jpg)
The trends in IT Security innovations
![Page 3: DSS ITSEC 2013 Conference 07.11.2013 - HeadTechnology - IT security trends 2014](https://reader036.vdocument.in/reader036/viewer/2022062511/54bce9864a7959815b8b45cd/html5/thumbnails/3.jpg)
History channelPHONE ELISHA GRAY AND ALEXANDER GRAHAM BELL
MICROWAVE
OVEN PERCY
LEBARON SPENCER
XEROGRAPHYCHESTER CARLSON
BARCODE NORMAN
JOSEPH WOODLAND&BERNARD SILVER
![Page 4: DSS ITSEC 2013 Conference 07.11.2013 - HeadTechnology - IT security trends 2014](https://reader036.vdocument.in/reader036/viewer/2022062511/54bce9864a7959815b8b45cd/html5/thumbnails/4.jpg)
ENIAC COMPUTERJOHN MAUCHLY AND JOHN PRESPER ECKERT
EBOOKSMICHAEL
STERN HART
IPOD TONY
FADELL
WORLD WIDE WEB SIR TIM BERNERS-LEE
![Page 5: DSS ITSEC 2013 Conference 07.11.2013 - HeadTechnology - IT security trends 2014](https://reader036.vdocument.in/reader036/viewer/2022062511/54bce9864a7959815b8b45cd/html5/thumbnails/5.jpg)
From desktop to mobile
Mobile IT
We are at point where functionality of desktop collides with mobility of mobile device.
![Page 6: DSS ITSEC 2013 Conference 07.11.2013 - HeadTechnology - IT security trends 2014](https://reader036.vdocument.in/reader036/viewer/2022062511/54bce9864a7959815b8b45cd/html5/thumbnails/6.jpg)
![Page 7: DSS ITSEC 2013 Conference 07.11.2013 - HeadTechnology - IT security trends 2014](https://reader036.vdocument.in/reader036/viewer/2022062511/54bce9864a7959815b8b45cd/html5/thumbnails/7.jpg)
On Premises vs...
![Page 8: DSS ITSEC 2013 Conference 07.11.2013 - HeadTechnology - IT security trends 2014](https://reader036.vdocument.in/reader036/viewer/2022062511/54bce9864a7959815b8b45cd/html5/thumbnails/8.jpg)
Cloud
![Page 9: DSS ITSEC 2013 Conference 07.11.2013 - HeadTechnology - IT security trends 2014](https://reader036.vdocument.in/reader036/viewer/2022062511/54bce9864a7959815b8b45cd/html5/thumbnails/9.jpg)
From Wired technologies to...
![Page 10: DSS ITSEC 2013 Conference 07.11.2013 - HeadTechnology - IT security trends 2014](https://reader036.vdocument.in/reader036/viewer/2022062511/54bce9864a7959815b8b45cd/html5/thumbnails/10.jpg)
To Boarderless technologies
![Page 11: DSS ITSEC 2013 Conference 07.11.2013 - HeadTechnology - IT security trends 2014](https://reader036.vdocument.in/reader036/viewer/2022062511/54bce9864a7959815b8b45cd/html5/thumbnails/11.jpg)
Its all about Security
![Page 12: DSS ITSEC 2013 Conference 07.11.2013 - HeadTechnology - IT security trends 2014](https://reader036.vdocument.in/reader036/viewer/2022062511/54bce9864a7959815b8b45cd/html5/thumbnails/12.jpg)
Security ?• Weak security is not an option!
• Complex Security is not only option!
![Page 13: DSS ITSEC 2013 Conference 07.11.2013 - HeadTechnology - IT security trends 2014](https://reader036.vdocument.in/reader036/viewer/2022062511/54bce9864a7959815b8b45cd/html5/thumbnails/13.jpg)
Top 5 Information Security Trends in 2013
1. Government surveillance– The Edward Snowden/NSA issue has been very eye-
opening
![Page 14: DSS ITSEC 2013 Conference 07.11.2013 - HeadTechnology - IT security trends 2014](https://reader036.vdocument.in/reader036/viewer/2022062511/54bce9864a7959815b8b45cd/html5/thumbnails/14.jpg)
2. Cloud distrust– CompTIA’s new 4th Annual Trends in Cloud Computing confirmed that
the main reason people avoid cloud solutions was concerns over security.
3. Mobile complexity– Not just BYOD and MDM but mobile apps as well. I truly believe that the
lack of control most businesses have over mobile apps is one of the greatest risks in information security today
4. Minimal visibility– This is not because you don’t have the information. It’s there on your
network right now. The problem is a general lack of time, tools, and expertise in any given IT shop
5. Getting people on our side– Employees are the weakest link
![Page 15: DSS ITSEC 2013 Conference 07.11.2013 - HeadTechnology - IT security trends 2014](https://reader036.vdocument.in/reader036/viewer/2022062511/54bce9864a7959815b8b45cd/html5/thumbnails/15.jpg)
Mobile has changed
![Page 16: DSS ITSEC 2013 Conference 07.11.2013 - HeadTechnology - IT security trends 2014](https://reader036.vdocument.in/reader036/viewer/2022062511/54bce9864a7959815b8b45cd/html5/thumbnails/16.jpg)
Bring your ovn Problem
![Page 17: DSS ITSEC 2013 Conference 07.11.2013 - HeadTechnology - IT security trends 2014](https://reader036.vdocument.in/reader036/viewer/2022062511/54bce9864a7959815b8b45cd/html5/thumbnails/17.jpg)
Mobilitāte skaitļos
![Page 18: DSS ITSEC 2013 Conference 07.11.2013 - HeadTechnology - IT security trends 2014](https://reader036.vdocument.in/reader036/viewer/2022062511/54bce9864a7959815b8b45cd/html5/thumbnails/18.jpg)
Mobile Security status
![Page 19: DSS ITSEC 2013 Conference 07.11.2013 - HeadTechnology - IT security trends 2014](https://reader036.vdocument.in/reader036/viewer/2022062511/54bce9864a7959815b8b45cd/html5/thumbnails/19.jpg)
![Page 20: DSS ITSEC 2013 Conference 07.11.2013 - HeadTechnology - IT security trends 2014](https://reader036.vdocument.in/reader036/viewer/2022062511/54bce9864a7959815b8b45cd/html5/thumbnails/20.jpg)
Android ļaundabīgo kodu tendences
![Page 21: DSS ITSEC 2013 Conference 07.11.2013 - HeadTechnology - IT security trends 2014](https://reader036.vdocument.in/reader036/viewer/2022062511/54bce9864a7959815b8b45cd/html5/thumbnails/21.jpg)
MOBILE CONTENT MANAGEMENT
• Secure content hub on device
• DLP for email attachments
• Remote SharePoint access
• Secure intranet browsing
MOBILE APP MANAGEMENT
• Scalable storefront for delivery
• Data containerization for DLP
• Dynamic policy & configuration
• Secure enterprise app persona
• App-specific tunneling
• … for in-house & public apps
MOBILE DEVICEMANAGEMENT
• Purpose-built multi-OS security
• Self-service provisioning/config
• BYOD privacy protection
• Certificate-based identity
• Global scale for cloud & premise
Complete Solution for Mobile IT
![Page 22: DSS ITSEC 2013 Conference 07.11.2013 - HeadTechnology - IT security trends 2014](https://reader036.vdocument.in/reader036/viewer/2022062511/54bce9864a7959815b8b45cd/html5/thumbnails/22.jpg)
Wireless Breaks the Wired Security Model
Network & Personal Firewalls, IP-SEC VPN
SSL VPN, Network IDS, Host IDS
Anti-virus/ spyware/ malware/ spam
URL filters, Web proxies, IDS
Layer 3 (IP)
Layer 4 (TCP)
Layer 5 (Session)
Layer 6 (Presentation)
Layer 2 (MAC)
Layer 1 (PHY)
Unprotected
Unprotected
Layer 7 (Application) Wired Security
![Page 23: DSS ITSEC 2013 Conference 07.11.2013 - HeadTechnology - IT security trends 2014](https://reader036.vdocument.in/reader036/viewer/2022062511/54bce9864a7959815b8b45cd/html5/thumbnails/23.jpg)
Wireless Security Challenges
•Visibility into Wi-Fi security risks at HQ and remote offices•Understanding which wireless connections pose a genuine threat•Inability to block, locate & remove unauthorized Wi-Fi devices•Limited IT resources and expertise to manage wireless security •Maintain compliance with regulatory and internal security
standards
![Page 24: DSS ITSEC 2013 Conference 07.11.2013 - HeadTechnology - IT security trends 2014](https://reader036.vdocument.in/reader036/viewer/2022062511/54bce9864a7959815b8b45cd/html5/thumbnails/24.jpg)
The First Vendor to Offer an 11n SensorOnly an 11n sensor can protect your
investment in a/b/g and 11n infrastructure
• 11n rogue threats are here today even if you only have a/b/g installed
• 11n increases the RF exposure risk
• Laptops now shipping with 11n
Reduce deployment costs by installing 11n technology now
• Greater range reduces sensor density
• Backward compatibility with existing a/b/g wireless networks
• No additional deployment costs to upgrade sensors in 6-12 months
![Page 25: DSS ITSEC 2013 Conference 07.11.2013 - HeadTechnology - IT security trends 2014](https://reader036.vdocument.in/reader036/viewer/2022062511/54bce9864a7959815b8b45cd/html5/thumbnails/25.jpg)
SpectraGuard Product Family
• SpectraGuard Enterprise Server and Sensors for mid to large organizations– Server can be delivered on an AirTight
Appliance or a ProCurve ONE Service Module– Sensors to support 802.11n and 802.11abg
networks
• SpectraGuard Online– AirTight SpectraGuard delivered as a service
offering with no capital equipment purchase required
![Page 26: DSS ITSEC 2013 Conference 07.11.2013 - HeadTechnology - IT security trends 2014](https://reader036.vdocument.in/reader036/viewer/2022062511/54bce9864a7959815b8b45cd/html5/thumbnails/26.jpg)
Operations in The Baltic StatesGateway Security Host Security Network SecurityMobile Security
Managed Services & SupportManaged Services & Support
![Page 27: DSS ITSEC 2013 Conference 07.11.2013 - HeadTechnology - IT security trends 2014](https://reader036.vdocument.in/reader036/viewer/2022062511/54bce9864a7959815b8b45cd/html5/thumbnails/27.jpg)
headtechnology Group
![Page 28: DSS ITSEC 2013 Conference 07.11.2013 - HeadTechnology - IT security trends 2014](https://reader036.vdocument.in/reader036/viewer/2022062511/54bce9864a7959815b8b45cd/html5/thumbnails/28.jpg)
Company business card
Founded in 2000, Germany and now covering 33 countries world wide with 12 regional officesHQ in UkraineCore business – IT SecurityOffices in Berlin, Ludwigsburg, Warsaw, Riga, Kiev, Moscow, St.Petersburg, Kazan, Ekaterinburg, Minsk, Baku, Almaty, SofiaMore than 80 employeesMore than 12 vendors in portfolioOfficial distributor (for many cases exclusive) in Eastern Europe and Asia for number of products / solutions / vendorsParticipant of many IT exhibitions, road shows, business forums, ENISA IT Security Awareness program – local IT Security evangelist
![Page 29: DSS ITSEC 2013 Conference 07.11.2013 - HeadTechnology - IT security trends 2014](https://reader036.vdocument.in/reader036/viewer/2022062511/54bce9864a7959815b8b45cd/html5/thumbnails/29.jpg)
Headtechnology for Partners
• Multilanguage technical, sales and marketing support
• Product, Partner Trainings, demonstrations, webexes, certifications etc.
• More than 650 partners world wide
• Innovative product portfolio• Partnership programms (Authorized,
Bronze, Silver and Gold)• Partner / Customer protection• International knowledge base
![Page 30: DSS ITSEC 2013 Conference 07.11.2013 - HeadTechnology - IT security trends 2014](https://reader036.vdocument.in/reader036/viewer/2022062511/54bce9864a7959815b8b45cd/html5/thumbnails/30.jpg)
Headtechnology – Latvia /Lithuania / Estonia
• World class IT security names (best in class)
• Fits International laws regarding IT auditing (EU, NATO directives)
• Regulation compliance (HIPAA, SOX, BASEL2, GLBA, PCI, etc.)
• Best Price / Performance• Close and good relationships
with vendors for years• Local competence center
![Page 31: DSS ITSEC 2013 Conference 07.11.2013 - HeadTechnology - IT security trends 2014](https://reader036.vdocument.in/reader036/viewer/2022062511/54bce9864a7959815b8b45cd/html5/thumbnails/31.jpg)
Latvia, Lithuania and Estonia
31 Cesu str. 3 floor, LV-1012, Riga, Latvia
Phone: +371 674 21 021
eMail: [email protected]: www.headtechnology.lv
Arturs Filatovs