You are on page 1of 45

IT at the crossroads:

Lead, follow or get out of the way

Changing Data Center

STKI Summit 2013

Pini Cohen Sigal Russin

Security and Networking

Customers Main Issues in 2012


Cyber security -Smarter & Complexity attacks,
APT, DDOS BYOD - Security on Mobile MDM Network monitoring -SIEM NAC network access control WI-FI as a service Control & Monitoring of Administrative Unauthorized Device Detection DLP- Data loss prevention Cloud security Regulation ISO
Pini Cohen and Sigal Russins work/ Copyright@2013
Do not remove source or attribution from any slide, graph or portion of graph

Security
Security 2013 Social engineering Identity management Cloud storage services

Pini Cohen and Sigal Russins work/ Copyright@2013


Do not remove source or attribution from any slide, graph or portion of graph

Security

Pini Cohen and Sigal Russin's work Copyright@2013 Do not remove source or attribution from any slide, graph or portion of graph 4

Industry groups represented by percent of breaches

Security
Source: Verison , 2012 DATA BREACH INVESTIGATIONS REPORT
Pini Cohen and Sigal Russins work/ Copyright@2013
Do not remove source or attribution from any slide, graph or portion of graph

Social tactics by percent of breaches within Social

Security
Source: Verison , 2012 DATA BREACH INVESTIGATIONS REPORT
Pini Cohen and Sigal Russins work/ Copyright@2013
Do not remove source or attribution from any slide, graph or portion of graph

Security
Source: Ponemon Institute
Pini Cohen and Sigal Russins work/ Copyright@2013
Do not remove source or attribution from any slide, graph or portion of graph

3
1

Pini Cohen and Sigal Russin's work Copyright@2013 Do not remove source or attribution from any slide, graph or portion of graph

Security

Pini Cohen and Sigal Russins work/ Copyright@2013


Do not remove source or attribution from any slide, graph or portion of graph

Identity & Access Management

Pini Cohen and Sigal Russin's work Copyright@2013 Do not remove source or attribution from any slide, graph or portion of graph 10

Security

Pini Cohen and Sigal Russins work/ Copyright@2013


Do not remove source or attribution from any slide, graph or portion of graph

11

Pini Cohen and Sigal Russins work/ Copyright@2013


Do not remove source or attribution from any slide, graph or portion of graph

Source: veracode

12

Forrester: Most data breaches caused by employees"


30% - 'simple loss or theft 27% - 'inadvertant misuse by an employee 25% - 'external attack 12% - 'malicious insiders
Security

Source: information week 2012


Pini Cohen and Sigal Russin's work Copyright@2013 Do not remove source or attribution from any slide, graph 13 or portion of graph

Turn Insiders Into Assets - Security Awareness Program


Focus on changing user behavior- training your employee (videos)

Test and retest - testing employee reaction to an actual test


like: phishing e-mails.

Teach the individual- tailored training to the company and


the individuals who work there (USB devices).

Even a failure can be a success- employee reports, susceptible


to social engineering.
Source: information week 2012
Pini Cohen and Sigal Russins work/ Copyright@2013
Do not remove source or attribution from any slide, graph or portion of graph

14

Most Intellectual Property Theft Involves Company Insiders


Perimeter defenses do not absolutely protect a network, vetting
suppliers is not a sure way to protect against compromised hardware. You should monitor for anomalies in your network.

Keep Policy Up To Date!

Security
Source: information week 2012, Verison
Pini Cohen and Sigal Russins work/ Copyright@2013
Do not remove source or attribution from any slide, graph or portion of graph

15

Best Practices for Defending Yourself


Out of office replies- do not give a stranger personally identifiable information. Email Links and Attachments-never open a link or an attachment from someone you dont know. Phone Calls-requiring that employees use verbal code words to verify their identity. On-Premise Badge and Security- use cameras, guards and mantraps before a secure doorway.

Unlocked Computers and Laptops- always be vigilant!


Pini Cohen and Sigal Russins work/ Copyright@2013
Do not remove source or attribution from any slide, graph or portion of graph

Source: http://blog.neustar.biz/dont/social-engineering-5-tips-and-best-practices-for-defending-against-it/

16

Security

Pini Cohen and Sigal Russins work/ Copyright@2013


Do not remove source or attribution from any slide, graph or portion of graph

17

Security

Pini Cohen and Sigal Russins work/ Copyright@2013


Do not remove source or attribution from any slide, graph or portion of graph

18

Dont risk your Data!

Source: Ponemon Institute


Pini Cohen and Sigal Russins work/ Copyright@2013
Do not remove source or attribution from any slide, graph or portion of graph

19

Cloud Storage Services Definition


A network of distributed data centers which typically uses cloud
computing technologies like virtualization, and offers some kind of interface for storing data.

To increase the availability of the data, it may be redundantly


stored at different locations.

Many cloud storage providers are active on the market, offering


various kinds of services to their customers.
Security
Source: https://www.sit.fraunhofer.de/fileadmin/dokumente/studien_und_technical_reports/Cloud-Storage-Security_a4.pdf
Pini Cohen and Sigal Russins work/ Copyright@2013
Do not remove source or attribution from any slide, graph or portion of graph

20

Cloud Storage Features

Security
Source: https://www.sit.fraunhofer.de/fileadmin/dokumente/studien_und_technical_reports/Cloud-Storage-Security_a4.pdf
Pini Cohen and Sigal Russins work/ Copyright@2013
Do not remove source or attribution from any slide, graph or portion of graph

21

Case Study : DROPBOX


Browser API

Security

Dropbox uses Amazon Web Services (AWS) for storage and transfer. Dropbox does not verify the email address at registration, hence it is open for incrimination attacks. Client-side encryption is not supported. It is unclear which flavor of sharing is used if non-subscribers are included (closed user group vs. publication). In 2011 accounts could be accessed without a password, and in 2012 spam emails were sent to Dropbox users.
SouIe: https://www.sit.fraunhofer.de/fileadmin/dokumente/studien_und_technical_reports/Cloud-Storage-Security_a4.pdf
Pini Cohen and Sigal Russins work/ Copyright@2013
Do not remove source or attribution from any slide, graph or portion of graph

22

Security

Source: The FixYa Cloud Storage Report. Novmber 2012


Pini Cohen and Sigal Russins work/ Copyright@2013
Do not remove source or attribution from any slide, graph or portion of graph

23

Security Concerns
SkyDrive uses SSL to encrypt files during transport, but files are
unencrypted once at rest on Microsofts servers.

Data Leak

Source: Ponemon Institute


Pini Cohen and Sigal Russins work/ Copyright@2013
Do not remove source or attribution from any slide, graph or portion of graph

24

Secured Alternative Solutions



Use Local encryption for protecting your data IBM Collaboration Cloud Box.net 67% viewed third-party SpiderOak applications as a significant Sharefile Citrix risk second to mobile WatchDox security risk. Acronis Application Rapping Security Symantec F5
Pini Cohen and Sigal Russins work/ Copyright@2013
Do not remove source or attribution from any slide, graph or portion of graph

25

WatchDox ACCESS documents on any device SHARE documents across organizations CONTROL documents at all times

Security

Pini Cohen and Sigal Russins work/ Copyright@2013


Do not remove source or attribution from any slide, graph or portion of graph

26

WatchDox Makes Document Security Easy


Email Sharing

WatchDox Exchange
Group Collaboration

WatchDox Workspaces
Cross-Device Sync

WatchDox Sync Security is added seamlessly, automatically Documents encrypted at all times: rest, transit, use
Pini Cohen and Sigal Russin's work Copyright@2013 Do not remove source or attribution from any slide, graph or portion of graph

Recommendations

Review your security policy related to social engineering DO NOT allow using free cloud storage OR

Allow employee BYOA but secure it with encryption tools


Use a collaboration tool for better productivity & security

Start Identity & access management project


Education ,awareness Training!

Pini Cohen and Sigal Russin's work Copyright@2013 Do not remove source or attribution from any slide, graph or portion of graph 30

Data Leakage Prevention -Israeli Market Positioning 1Q13


Websense

Local Support

Fidelis

Verdasys

Symantec

Player Worldwide Leader

GTB CA

McAfee
Safend Checkpoint EMC Market Presence/Perception
Pini Cohen and Sigal Russin's work Copyright@2013 Do not remove source or attribution from any slide, graph or portion of graph 31

Security Consultants -Israeli Market View 1Q13 (Partial List)

Source: STKI

*DataSec, **Oasis-Tech

Pini Cohen and Sigal Russin's work Copyright@2013 Do not remove source or attribution from any slide, graph or portion of graph 32

Security System Integrators -Israeli Market

View 1Q13 (Partial List)

*Netcom **Spider ^Oasis-Tech ^^Decimus

Source: STKI
Pini Cohen and Sigal Russin's work Copyright@2013 Do not remove source or attribution from any slide, graph or portion of graph 33

Networking General trends-2013

Softwaredefined networking will replace current NAC

Wireless local area network (WLAN) for guests and BYOD (VoWLAN)

Network visibility in virtualized environments

Pini Cohen and Sigal Russin's work Copyright@2013 Do not remove source or attribution from any slide, graph or portion of graph 34

Network Visibility Benefits


Improve the performance of your network with cloud computing,
video streaming, mobility etc.

Utilize security issues and application performance management. Good view of your network traffic down to the packet level. You dont need to go through an emergency change control at the
start of the incident just to get these taps!
Networking

Pini Cohen and Sigal Russin's work Copyright@2013 Do not remove source or attribution from any slide, graph or portion of graph 35

Port Mirroring
Requires an engineer to configure the switch or switches. Eliminate corrupt packets or packets which below a minimum size. Switches may drop layer 1 and select layer 2 errors depending on high
priority. Need to troubleshoot common physical layer problems such as faulty NIC. A network devices can support a restricted number of port mirrors. It is very important for security and analysis the same data with many devices.
Pini Cohen and Sigal Russin's work Copyright@2013 Do not remove source or attribution from any slide, graph or portion of graph 36

Cyber Security Challenges No Visibility


NETWORK INFRASTRUCTURE

Traffic Growth
Number of links, Size of links, amount of traffic
Traffic

New Applications
New Protocols, Encrypted Traffic
Data Center

BYOD
Mixture of devices, Policies & Compliance
Device

Cloud / Virtualization
Applications go virtual, Inter-VM traffic

Cloud / Virtualization

Solution - Visibility with NPB


NETWORK INFRASTRUCTURE MONITORING TOOLS

Network Packet Broker


Traffic

Data Center

Device

Cloud / Virtualization

Traffic Visibility Fabric Gigamon - Market Maker, Market Leader

Data Leakage Prevention -Israeli Market Positioning 1Q13


Websense

Local Support

Fidelis

Verdasys

Symantec

Player Worldwide Leader

GTB CA

McAfee
Safend Checkpoint EMC Market Presence/Perception
Pini Cohen and Sigal Russin's work Copyright@2013 Do not remove source or attribution from any slide, graph or portion of graph 40

Customer Center Infrastructure -Israeli Market Positioning 1Q13

Local Support

Player

Cisco Aspect

Avaya
Worldwide Leader

Cosmocom

Alcatel-Lucent

Interactive Intelligence Siemens EC Market Presence/Perception


Pini Cohen and Sigal Russin's work Copyright@2013 Do not remove source or attribution from any slide, graph or portion of graph 41

Network Access Control -Israeli Market Positioning 1Q13

Access Layers
Player

Local Support

Juniper
Checkpoint HP Microsoft Enterasys Symantec Cisco Wise-Mon

Fore Scout

Worldwide Leader

Market Presence/Perception
Pini Cohen and Sigal Russins work/ Copyright@2013
Do not remove source or attribution from any slide, graph or portion of graph

42

Output Management-Israeli Market Positioning 1Q13


Vendors to watch : HP

Consist

Local Support

Auto font Adobe

Player Worldwide Leader

Aman
ISIS-Papyrus

Market Presence/Perception
Pini Cohen and Sigal Russin's work Copyright@2013 Do not remove source or attribution from any slide, graph or portion of graph 43

HP Exstream

Pini Cohen and Sigal Russin's work Copyright@2013 Do not remove source or attribution from any slide, graph or portion of graph 44

Thanks for your patience and hope you enjoyed

Pini Cohen and Sigal Russin's work Copyright@2013 Do not remove source or attribution from any slide, graph or portion of graph

45

You might also like