SlideShare une entreprise Scribd logo
1  sur  23
Télécharger pour lire hors ligne
The trends in
     IT Security
    innovations

Arturs Filatovs

Value Added Distribution

headtechnology Baltics SIA
Latvia, Lithuania and Estonia
                                www.headtechnology.com
headtechnology Group




www.headtechnology.com
Operations in The Baltic States

   Business          Gateway Security   Host Security   Network Security



  Value Added
  Distribution

   Marketing
    & Sales
   assistance

   Technical &
   Integration
     Support

    Trainings

  Certification

    Business
    Network



 Managed Services & Support

www.headtechnology.com
2nd of December, Vilnius, Lithuania



The trends in IT Security
      innovations




www.headtechnology.com
Security and time

  Mobility is raising, productivity is decreasing security
  Problems with InfoSEC – were, are, WILL BE more




Early 90’s               Year 2000                   Year 2011
• DOS applications       • Complex aplications       • ?
• Passwords              • Mobility + Productivity
• Physical access        • Passwords
                         • Physical access

www.headtechnology.com
Besides technology – problems with security

 Top 10 Security problems in enterpise

  1.    Yelow Posters
  2.    We know better than you
  3.    Leaving the machine on
  4.    Opening e-mail attachments
  5.    Poor password selection
  6.    Loose lips sink ships
  7.    Laptops have legs
  8.    Poorly enforced security policies
  9.    Failing to consider the staff
  10.   Being slow to update



www.headtechnology.com
Key risks for shortlist

 End users – the weakest link
 Vulnerability – everyone vs. everything
 Data access and protection
 Black community makes it easy
  • Google.com/hacking for dummies
  • Youtube.com/how to hack passwords
  • P2P for software download




www.headtechnology.com
Hall of fame in Latvia




                                    99%
                                  Things we’ll never know
www.headtechnology.com
Solution?




 Weak security is not an option!




 Too much of security makes no sense!




www.headtechnology.com
IT Security puzle




www.headtechnology.com
Most important things


 Monitoring (systems, users, administrators)
 Vulnerability and EndPoints (done by Lumension)
 Encryption (in motion / during transfer / at rest)
 Agentless real time network visibility and NAC




www.headtechnology.com
MONITOR

www.headtechnology.com
Spectorsoft – Monitoring all




       Theft of confidential information   Fraud & embezzlement

       Sexual or racial harassment
                                           Litigation by employees and
                                           outside companies
       Discrimination claims

                                           Illegal downloads



www.headtechnology.com
How to use SpectorSoft?

 Maximize productivity
 Increase security
 Reduce liability
 Enforce compliance




www.headtechnology.com
ENCRYPT

www.headtechnology.com
PGP – Encryption Platform




                  PGP Encryption Solutions                                           3rd Party Solutions



Disk and       File        Email       Mobile         Mainframe           Commercial     Commercial     Custom
 Device                                Devices                             Hardware       Software    Applications




       Key Lifecycle                    Key Storage                 Authentication / Authorization
                                                                                                      Auditing
                                     Policy Management                                                Reporting
                                                                                                       Logging
                            Automated Operations and Provisioning

                                       PGP Encryption Platform

                                          Existing Infrastructure




www.headtechnology.com
PGP solutions


       PGP Universal™ Server
        Central Management of                                    PGP Universal™ Gateway Email
             all products                                        • User-transparent, gateway email
                                                                   encryption
                                                           PGP® Desktop Email
                                                           • Email, file, disk, & IM encryption

                                                     PGP® Whole Disk Encryption
                                                     • Laptop & disk security

                                             PGP® NetShare
                                             • Shared server storage security


                                PGP® Command Line
                                • Secure FTP/batch & backups

                PGP® Support Package for BlackBerry®           All PGP products are based on
                • Mobile client software                       the PGP SDK, a mature FIPS
                                                               140-2 validated cryptographic
        PDF Messenger                                                     module
        • Secure & Certified Statement Delivery

www.headtechnology.com
KNOW YOUR
   NETWORK
www.headtechnology.com
Real time “agentless” network assesment

                                                              Control &
                                                              Enforcement
                                                              Safeguarding the network’s security
                                                              integrity by preventing network access
                                                              from unauthorized and/or non-compliant
     Discovery                                                elements.
     Comprehensive collection of data from ALL network
     assets, gathering complete, accurate and detailed
     continuous network intelligence. This unique
     approach provides always on, real-time network
     visibility acting as the foundation for the BSA
     solution.                                                                                                 Remediation
                                                                                                               Identification of the corrective measures
                                                                                                               that must be put in place and fix
                                                                                                               inconsistencies with the security posture
                                                                                                               of assets attached to the network.
                                                                                                               Aligning the security configuration of
                                                                                                               assets with security best practices
                                                                                                               considerably reduces the enterprise
                                                                                                               networks' risk of exposure.




                 Audit, Compliance                                User Identity Profiling
                 & Risk Analysis:                                 Establishment and maintenance of user intelligence
                 Automated security configuration auditing,       by correlating between user identities and specific
                 simplifying the process of conducting            IP addresses. This improves audit controls, and
                 network-wide configuration audits. This          enhances regulatory compliance. It also significantly
                 provides efficient security compliance           enhances incident response by enabling locating
                 tracking and auditing procedures.                vulnerable and/or exploited hosts, and eliminating
                                                                  the manual efforts to track users.


The Insightix Business Security Assurance (BSA) product suite is designed to detect,
      identify, profile, audit and control ALL devices connected to your network.

 www.headtechnology.com
One to hundred locations




www.headtechnology.com
Summary




www.headtechnology.com
@ the end




              Privacy is dead!


www.headtechnology.com
Contacts




                 headtechnology Baltics SIA

                Innovative IT Security Solutions
                    Value Added Distributor

                    Latvia, Lithuania and Estonia

                        31 Cesu str. 3rd floor,
                        LV-1012, Riga, Latvia
                      Phone: +371 674 21 021
                      Fax:    +371 674 21 024
                  eMail: info@headtechnology.lv
                Internet: www.headtechnology.com

www.headtechnology.com

Contenu connexe

Tendances

Pawaa OCC Presentation
Pawaa OCC PresentationPawaa OCC Presentation
Pawaa OCC PresentationCloudComputing
 
Symantec Web Security Solutions
Symantec Web Security SolutionsSymantec Web Security Solutions
Symantec Web Security SolutionsSymantec
 
Cloud Security: Perception Vs. Reality
Cloud Security: Perception Vs. RealityCloud Security: Perception Vs. Reality
Cloud Security: Perception Vs. RealityInternap
 
Cio ciso security_strategyv1.1
Cio ciso security_strategyv1.1Cio ciso security_strategyv1.1
Cio ciso security_strategyv1.1Anindya Ghosh,
 
kaspersky presentation for palette business solution June 2016 v1.0.
kaspersky presentation for palette business solution June 2016 v1.0.kaspersky presentation for palette business solution June 2016 v1.0.
kaspersky presentation for palette business solution June 2016 v1.0.Onwubiko Emmanuel
 
Watchguard short introduction
Watchguard short introductionWatchguard short introduction
Watchguard short introductionJimmy Saigon
 
Next Generation Network: Security and Architecture
Next Generation Network: Security and ArchitectureNext Generation Network: Security and Architecture
Next Generation Network: Security and Architectureijsrd.com
 
It's 2012 and My Network Got Hacked - Omar Santos
It's 2012 and My Network Got Hacked  - Omar SantosIt's 2012 and My Network Got Hacked  - Omar Santos
It's 2012 and My Network Got Hacked - Omar Santossantosomar
 
CertainSafe MicroTokenization Technology Detailed Overview
CertainSafe MicroTokenization Technology Detailed OverviewCertainSafe MicroTokenization Technology Detailed Overview
CertainSafe MicroTokenization Technology Detailed OverviewSteven Russo
 
What is micro segmentation?
What is micro segmentation?What is micro segmentation?
What is micro segmentation?Mir Mustafa Ali
 
eForensics Free Magazine 01.12. teaser
eForensics Free Magazine 01.12. teasereForensics Free Magazine 01.12. teaser
eForensics Free Magazine 01.12. teasereForensicsMag
 
AGILE SECURITY™ Security for the Real World
AGILE SECURITY™ Security for the Real WorldAGILE SECURITY™ Security for the Real World
AGILE SECURITY™ Security for the Real WorldCisco Russia
 
Key Policy Considerations When Implementing Next-Generation Firewalls
Key Policy Considerations When Implementing Next-Generation FirewallsKey Policy Considerations When Implementing Next-Generation Firewalls
Key Policy Considerations When Implementing Next-Generation FirewallsAlgoSec
 
Palo Alto Networks Portfolio & Strategy Overview 2019
Palo Alto Networks Portfolio & Strategy Overview 2019Palo Alto Networks Portfolio & Strategy Overview 2019
Palo Alto Networks Portfolio & Strategy Overview 2019Sean Xie
 
Palo alto networks product overview
Palo alto networks product overviewPalo alto networks product overview
Palo alto networks product overviewBelsoft
 
8 Ocak 2015 SOME Etkinligi - A10 Networks - Accelerating and Securing Applica...
8 Ocak 2015 SOME Etkinligi - A10 Networks - Accelerating and Securing Applica...8 Ocak 2015 SOME Etkinligi - A10 Networks - Accelerating and Securing Applica...
8 Ocak 2015 SOME Etkinligi - A10 Networks - Accelerating and Securing Applica...BGA Cyber Security
 
3 Telecom+Network Part2
3 Telecom+Network Part23 Telecom+Network Part2
3 Telecom+Network Part2Alfred Ouyang
 

Tendances (20)

Pawaa OCC Presentation
Pawaa OCC PresentationPawaa OCC Presentation
Pawaa OCC Presentation
 
Symantec Web Security Solutions
Symantec Web Security SolutionsSymantec Web Security Solutions
Symantec Web Security Solutions
 
Cloud Security: Perception Vs. Reality
Cloud Security: Perception Vs. RealityCloud Security: Perception Vs. Reality
Cloud Security: Perception Vs. Reality
 
Cio ciso security_strategyv1.1
Cio ciso security_strategyv1.1Cio ciso security_strategyv1.1
Cio ciso security_strategyv1.1
 
kaspersky presentation for palette business solution June 2016 v1.0.
kaspersky presentation for palette business solution June 2016 v1.0.kaspersky presentation for palette business solution June 2016 v1.0.
kaspersky presentation for palette business solution June 2016 v1.0.
 
Watchguard short introduction
Watchguard short introductionWatchguard short introduction
Watchguard short introduction
 
Next Generation Network: Security and Architecture
Next Generation Network: Security and ArchitectureNext Generation Network: Security and Architecture
Next Generation Network: Security and Architecture
 
It's 2012 and My Network Got Hacked - Omar Santos
It's 2012 and My Network Got Hacked  - Omar SantosIt's 2012 and My Network Got Hacked  - Omar Santos
It's 2012 and My Network Got Hacked - Omar Santos
 
CertainSafe MicroTokenization Technology Detailed Overview
CertainSafe MicroTokenization Technology Detailed OverviewCertainSafe MicroTokenization Technology Detailed Overview
CertainSafe MicroTokenization Technology Detailed Overview
 
What is micro segmentation?
What is micro segmentation?What is micro segmentation?
What is micro segmentation?
 
eForensics Free Magazine 01.12. teaser
eForensics Free Magazine 01.12. teasereForensics Free Magazine 01.12. teaser
eForensics Free Magazine 01.12. teaser
 
Review of network diagram
Review of network diagramReview of network diagram
Review of network diagram
 
Datasheet stonegate ips-allinone
Datasheet stonegate ips-allinoneDatasheet stonegate ips-allinone
Datasheet stonegate ips-allinone
 
AGILE SECURITY™ Security for the Real World
AGILE SECURITY™ Security for the Real WorldAGILE SECURITY™ Security for the Real World
AGILE SECURITY™ Security for the Real World
 
Datasheet stonegate fw-allinone
Datasheet stonegate fw-allinoneDatasheet stonegate fw-allinone
Datasheet stonegate fw-allinone
 
Key Policy Considerations When Implementing Next-Generation Firewalls
Key Policy Considerations When Implementing Next-Generation FirewallsKey Policy Considerations When Implementing Next-Generation Firewalls
Key Policy Considerations When Implementing Next-Generation Firewalls
 
Palo Alto Networks Portfolio & Strategy Overview 2019
Palo Alto Networks Portfolio & Strategy Overview 2019Palo Alto Networks Portfolio & Strategy Overview 2019
Palo Alto Networks Portfolio & Strategy Overview 2019
 
Palo alto networks product overview
Palo alto networks product overviewPalo alto networks product overview
Palo alto networks product overview
 
8 Ocak 2015 SOME Etkinligi - A10 Networks - Accelerating and Securing Applica...
8 Ocak 2015 SOME Etkinligi - A10 Networks - Accelerating and Securing Applica...8 Ocak 2015 SOME Etkinligi - A10 Networks - Accelerating and Securing Applica...
8 Ocak 2015 SOME Etkinligi - A10 Networks - Accelerating and Securing Applica...
 
3 Telecom+Network Part2
3 Telecom+Network Part23 Telecom+Network Part2
3 Telecom+Network Part2
 

En vedette

Virus Htlv 1
Virus Htlv 1Virus Htlv 1
Virus Htlv 1mono_lk22
 
Biologia: Virus HTLV-1
Biologia: Virus HTLV-1Biologia: Virus HTLV-1
Biologia: Virus HTLV-1C'Laau Ortega
 
HTLV-1. Infecciones por retrovirus
HTLV-1. Infecciones por retrovirusHTLV-1. Infecciones por retrovirus
HTLV-1. Infecciones por retroviruskidney00
 
HTLV - Vírus linfotrópico de células T humano
HTLV - Vírus linfotrópico de células T humanoHTLV - Vírus linfotrópico de células T humano
HTLV - Vírus linfotrópico de células T humanoJuliana Carvalho
 
Virus Htlv 1
Virus Htlv 1Virus Htlv 1
Virus Htlv 1csuazo
 
Lymphocyte kinetics in HTLV-1 infection
Lymphocyte kinetics in HTLV-1 infectionLymphocyte kinetics in HTLV-1 infection
Lymphocyte kinetics in HTLV-1 infectiondegarden
 
Que Es Power Point(1).Pptx Y Teoria Del Color Pryscyla
Que Es Power Point(1).Pptx Y Teoria Del Color PryscylaQue Es Power Point(1).Pptx Y Teoria Del Color Pryscyla
Que Es Power Point(1).Pptx Y Teoria Del Color Pryscylaguest489a11d
 
Presnt. definitiva vlth 1
Presnt. definitiva vlth 1Presnt. definitiva vlth 1
Presnt. definitiva vlth 1Wendy Balam
 
Ateneo 13 03-2015
Ateneo 13 03-2015Ateneo 13 03-2015
Ateneo 13 03-2015clinicosha
 
Que Es Power Point(1).Pptx Y Teoria Del Color Pryscyla
Que Es Power Point(1).Pptx Y Teoria Del Color PryscylaQue Es Power Point(1).Pptx Y Teoria Del Color Pryscyla
Que Es Power Point(1).Pptx Y Teoria Del Color PryscylaPRYCYLA
 
Trabajo Tecno
Trabajo TecnoTrabajo Tecno
Trabajo Tecnoforsakenn
 
The Link Between Alcohol and Breast Cancer
The Link Between Alcohol and Breast CancerThe Link Between Alcohol and Breast Cancer
The Link Between Alcohol and Breast CancerDr. Omer Hameed
 
Introduction to Information Architecture
Introduction to Information ArchitectureIntroduction to Information Architecture
Introduction to Information ArchitectureMike Crabb
 

En vedette (20)

Human t lymphotropic viruses
Human t lymphotropic virusesHuman t lymphotropic viruses
Human t lymphotropic viruses
 
Vih y virus htlv
Vih y virus htlvVih y virus htlv
Vih y virus htlv
 
Virus Htlv 1
Virus Htlv 1Virus Htlv 1
Virus Htlv 1
 
Biologia: Virus HTLV-1
Biologia: Virus HTLV-1Biologia: Virus HTLV-1
Biologia: Virus HTLV-1
 
HTLV-1. Infecciones por retrovirus
HTLV-1. Infecciones por retrovirusHTLV-1. Infecciones por retrovirus
HTLV-1. Infecciones por retrovirus
 
Retrovirus (VIH y HTLV)
Retrovirus (VIH y HTLV)Retrovirus (VIH y HTLV)
Retrovirus (VIH y HTLV)
 
HTLV - Vírus linfotrópico de células T humano
HTLV - Vírus linfotrópico de células T humanoHTLV - Vírus linfotrópico de células T humano
HTLV - Vírus linfotrópico de células T humano
 
Virus Htlv 1
Virus Htlv 1Virus Htlv 1
Virus Htlv 1
 
5.virología.retrovirus.vih.htlv.
5.virología.retrovirus.vih.htlv.5.virología.retrovirus.vih.htlv.
5.virología.retrovirus.vih.htlv.
 
Retrovirus
RetrovirusRetrovirus
Retrovirus
 
Lymphocyte kinetics in HTLV-1 infection
Lymphocyte kinetics in HTLV-1 infectionLymphocyte kinetics in HTLV-1 infection
Lymphocyte kinetics in HTLV-1 infection
 
Que Es Power Point(1).Pptx Y Teoria Del Color Pryscyla
Que Es Power Point(1).Pptx Y Teoria Del Color PryscylaQue Es Power Point(1).Pptx Y Teoria Del Color Pryscyla
Que Es Power Point(1).Pptx Y Teoria Del Color Pryscyla
 
Presnt. definitiva vlth 1
Presnt. definitiva vlth 1Presnt. definitiva vlth 1
Presnt. definitiva vlth 1
 
Forero clase 5
Forero clase 5Forero clase 5
Forero clase 5
 
Ateneo 13 03-2015
Ateneo 13 03-2015Ateneo 13 03-2015
Ateneo 13 03-2015
 
Aula HTLV Residencia Infectologia 2015
Aula HTLV Residencia Infectologia 2015Aula HTLV Residencia Infectologia 2015
Aula HTLV Residencia Infectologia 2015
 
Que Es Power Point(1).Pptx Y Teoria Del Color Pryscyla
Que Es Power Point(1).Pptx Y Teoria Del Color PryscylaQue Es Power Point(1).Pptx Y Teoria Del Color Pryscyla
Que Es Power Point(1).Pptx Y Teoria Del Color Pryscyla
 
Trabajo Tecno
Trabajo TecnoTrabajo Tecno
Trabajo Tecno
 
The Link Between Alcohol and Breast Cancer
The Link Between Alcohol and Breast CancerThe Link Between Alcohol and Breast Cancer
The Link Between Alcohol and Breast Cancer
 
Introduction to Information Architecture
Introduction to Information ArchitectureIntroduction to Information Architecture
Introduction to Information Architecture
 

Similaire à HTLV - DSS @Vilnius 2010

Security and Mobile Application Management with Worklight
Security and Mobile Application Management with WorklightSecurity and Mobile Application Management with Worklight
Security and Mobile Application Management with WorklightIBM WebSphereIndia
 
Retail IT 2013: Data Security & PCI Compliance Briefing
Retail IT 2013: Data Security & PCI Compliance BriefingRetail IT 2013: Data Security & PCI Compliance Briefing
Retail IT 2013: Data Security & PCI Compliance BriefingKaseya
 
Sådan undgår du misbrug af kundedata og fortrolig information
Sådan undgår du misbrug af kundedata og fortrolig informationSådan undgår du misbrug af kundedata og fortrolig information
Sådan undgår du misbrug af kundedata og fortrolig informationIBM Danmark
 
Axxera Security Solutions Ver 2.0
Axxera Security Solutions Ver 2.0Axxera Security Solutions Ver 2.0
Axxera Security Solutions Ver 2.0Reddy Marri
 
Secure Your AWS Cloud Data by Porticor
Secure Your AWS Cloud Data by PorticorSecure Your AWS Cloud Data by Porticor
Secure Your AWS Cloud Data by PorticorNewvewm
 
CYBER INTELLIGENCE & RESPONSE TECHNOLOGY
CYBER INTELLIGENCE & RESPONSE TECHNOLOGYCYBER INTELLIGENCE & RESPONSE TECHNOLOGY
CYBER INTELLIGENCE & RESPONSE TECHNOLOGYjmical
 
Managed vs customer presentation
Managed vs customer presentationManaged vs customer presentation
Managed vs customer presentationhemanth102030
 
The 300 Leonidas Solution
The 300 Leonidas SolutionThe 300 Leonidas Solution
The 300 Leonidas Solutionmatthew.maisel
 
Axxera Security Solutions
Axxera Security SolutionsAxxera Security Solutions
Axxera Security Solutionsakshayvreddy
 
Enterprise Security in Cloud
Enterprise Security in CloudEnterprise Security in Cloud
Enterprise Security in CloudLenin Aboagye
 
Intel Cloud Summit: Greg Brown McAfee
Intel Cloud Summit: Greg Brown McAfeeIntel Cloud Summit: Greg Brown McAfee
Intel Cloud Summit: Greg Brown McAfeeIntelAPAC
 
Ultima - Mobile Data Security
Ultima - Mobile Data SecurityUltima - Mobile Data Security
Ultima - Mobile Data Securitytrickey270
 
Azure 101: Shared responsibility in the Azure Cloud
Azure 101: Shared responsibility in the Azure CloudAzure 101: Shared responsibility in the Azure Cloud
Azure 101: Shared responsibility in the Azure CloudPaulo Renato
 
Using Hard Disk Encryption and Novell SecureLogin
Using Hard Disk Encryption and Novell SecureLoginUsing Hard Disk Encryption and Novell SecureLogin
Using Hard Disk Encryption and Novell SecureLoginNovell
 
Endpoint Protection
Endpoint ProtectionEndpoint Protection
Endpoint ProtectionSophos
 
Sccm 2012 overview - chris_estonina
Sccm 2012 overview - chris_estoninaSccm 2012 overview - chris_estonina
Sccm 2012 overview - chris_estoninaMicrosoft Singapore
 

Similaire à HTLV - DSS @Vilnius 2010 (20)

Security and Mobile Application Management with Worklight
Security and Mobile Application Management with WorklightSecurity and Mobile Application Management with Worklight
Security and Mobile Application Management with Worklight
 
Retail IT 2013: Data Security & PCI Compliance Briefing
Retail IT 2013: Data Security & PCI Compliance BriefingRetail IT 2013: Data Security & PCI Compliance Briefing
Retail IT 2013: Data Security & PCI Compliance Briefing
 
Sådan undgår du misbrug af kundedata og fortrolig information
Sådan undgår du misbrug af kundedata og fortrolig informationSådan undgår du misbrug af kundedata og fortrolig information
Sådan undgår du misbrug af kundedata og fortrolig information
 
Axxera Security Solutions Ver 2.0
Axxera Security Solutions Ver 2.0Axxera Security Solutions Ver 2.0
Axxera Security Solutions Ver 2.0
 
Secure Your AWS Cloud Data by Porticor
Secure Your AWS Cloud Data by PorticorSecure Your AWS Cloud Data by Porticor
Secure Your AWS Cloud Data by Porticor
 
Hh 2012-mberman-sds2
Hh 2012-mberman-sds2Hh 2012-mberman-sds2
Hh 2012-mberman-sds2
 
CYBER INTELLIGENCE & RESPONSE TECHNOLOGY
CYBER INTELLIGENCE & RESPONSE TECHNOLOGYCYBER INTELLIGENCE & RESPONSE TECHNOLOGY
CYBER INTELLIGENCE & RESPONSE TECHNOLOGY
 
QualysGuard InfoDay 2012 - Secure Digital Vault for Qualys
QualysGuard InfoDay 2012 - Secure Digital Vault for QualysQualysGuard InfoDay 2012 - Secure Digital Vault for Qualys
QualysGuard InfoDay 2012 - Secure Digital Vault for Qualys
 
Managed vs customer presentation
Managed vs customer presentationManaged vs customer presentation
Managed vs customer presentation
 
The 300 Leonidas Solution
The 300 Leonidas SolutionThe 300 Leonidas Solution
The 300 Leonidas Solution
 
Axxera Security Solutions
Axxera Security SolutionsAxxera Security Solutions
Axxera Security Solutions
 
Enterprise Security in Cloud
Enterprise Security in CloudEnterprise Security in Cloud
Enterprise Security in Cloud
 
Enterprise Security in Hybrid Cloud ISACA-SV 2012
Enterprise Security in Hybrid Cloud ISACA-SV 2012Enterprise Security in Hybrid Cloud ISACA-SV 2012
Enterprise Security in Hybrid Cloud ISACA-SV 2012
 
Intel Cloud Summit: Greg Brown McAfee
Intel Cloud Summit: Greg Brown McAfeeIntel Cloud Summit: Greg Brown McAfee
Intel Cloud Summit: Greg Brown McAfee
 
Ultima - Mobile Data Security
Ultima - Mobile Data SecurityUltima - Mobile Data Security
Ultima - Mobile Data Security
 
Azure 101: Shared responsibility in the Azure Cloud
Azure 101: Shared responsibility in the Azure CloudAzure 101: Shared responsibility in the Azure Cloud
Azure 101: Shared responsibility in the Azure Cloud
 
Using Hard Disk Encryption and Novell SecureLogin
Using Hard Disk Encryption and Novell SecureLoginUsing Hard Disk Encryption and Novell SecureLogin
Using Hard Disk Encryption and Novell SecureLogin
 
C2MS
C2MSC2MS
C2MS
 
Endpoint Protection
Endpoint ProtectionEndpoint Protection
Endpoint Protection
 
Sccm 2012 overview - chris_estonina
Sccm 2012 overview - chris_estoninaSccm 2012 overview - chris_estonina
Sccm 2012 overview - chris_estonina
 

Plus de Andris Soroka

Digitala Era 2017 - TransactPro - Normunds Aizstrauts - Maksājumu un finansu ...
Digitala Era 2017 - TransactPro - Normunds Aizstrauts - Maksājumu un finansu ...Digitala Era 2017 - TransactPro - Normunds Aizstrauts - Maksājumu un finansu ...
Digitala Era 2017 - TransactPro - Normunds Aizstrauts - Maksājumu un finansu ...Andris Soroka
 
Digitala Era 2017 - Datu Valsts Inspekcija - Lauris Linabergs - Vispārīgā dau...
Digitala Era 2017 - Datu Valsts Inspekcija - Lauris Linabergs - Vispārīgā dau...Digitala Era 2017 - Datu Valsts Inspekcija - Lauris Linabergs - Vispārīgā dau...
Digitala Era 2017 - Datu Valsts Inspekcija - Lauris Linabergs - Vispārīgā dau...Andris Soroka
 
Digitala Era 2017 - PMLP - Vilnis Vītoliņš - Gaisa kuģu pasažieru datu apstrā...
Digitala Era 2017 - PMLP - Vilnis Vītoliņš - Gaisa kuģu pasažieru datu apstrā...Digitala Era 2017 - PMLP - Vilnis Vītoliņš - Gaisa kuģu pasažieru datu apstrā...
Digitala Era 2017 - PMLP - Vilnis Vītoliņš - Gaisa kuģu pasažieru datu apstrā...Andris Soroka
 
Digitala Era 2017 - BOD LAW - Līva Aleksejeva - LIELIE DATI un personas datu ...
Digitala Era 2017 - BOD LAW - Līva Aleksejeva - LIELIE DATI un personas datu ...Digitala Era 2017 - BOD LAW - Līva Aleksejeva - LIELIE DATI un personas datu ...
Digitala Era 2017 - BOD LAW - Līva Aleksejeva - LIELIE DATI un personas datu ...Andris Soroka
 
Digitala Era 2017 - Spridzans Law Office - Anna Vladimirova Krykova - Mobilo ...
Digitala Era 2017 - Spridzans Law Office - Anna Vladimirova Krykova - Mobilo ...Digitala Era 2017 - Spridzans Law Office - Anna Vladimirova Krykova - Mobilo ...
Digitala Era 2017 - Spridzans Law Office - Anna Vladimirova Krykova - Mobilo ...Andris Soroka
 
Digitala Era 2017 - ZAB “BULLET” - Ivo Krievs - Vai uz valsti attiecināmi cit...
Digitala Era 2017 - ZAB “BULLET” - Ivo Krievs - Vai uz valsti attiecināmi cit...Digitala Era 2017 - ZAB “BULLET” - Ivo Krievs - Vai uz valsti attiecināmi cit...
Digitala Era 2017 - ZAB “BULLET” - Ivo Krievs - Vai uz valsti attiecināmi cit...Andris Soroka
 
Digitala Era 2017 - LSPDSA - Arnis Puksts - Datu aizsardzības speciālists (DPO)
Digitala Era 2017 - LSPDSA - Arnis Puksts - Datu aizsardzības speciālists (DPO)Digitala Era 2017 - LSPDSA - Arnis Puksts - Datu aizsardzības speciālists (DPO)
Digitala Era 2017 - LSPDSA - Arnis Puksts - Datu aizsardzības speciālists (DPO)Andris Soroka
 
Digitala Era 2017 - IIZI - Lauris Kļaviņš - GDPR - Kādus izdevumus un riskus ...
Digitala Era 2017 - IIZI - Lauris Kļaviņš - GDPR - Kādus izdevumus un riskus ...Digitala Era 2017 - IIZI - Lauris Kļaviņš - GDPR - Kādus izdevumus un riskus ...
Digitala Era 2017 - IIZI - Lauris Kļaviņš - GDPR - Kādus izdevumus un riskus ...Andris Soroka
 
Digitala Era 2017 - E-Risinajumi - Māris Ruķers - Vai ar vienu datu aizsardzī...
Digitala Era 2017 - E-Risinajumi - Māris Ruķers - Vai ar vienu datu aizsardzī...Digitala Era 2017 - E-Risinajumi - Māris Ruķers - Vai ar vienu datu aizsardzī...
Digitala Era 2017 - E-Risinajumi - Māris Ruķers - Vai ar vienu datu aizsardzī...Andris Soroka
 
Digitala Era 2017 - Gints Puškundzis - Personas datu apstrādes līgumi
Digitala Era 2017 - Gints Puškundzis - Personas datu apstrādes līgumi Digitala Era 2017 - Gints Puškundzis - Personas datu apstrādes līgumi
Digitala Era 2017 - Gints Puškundzis - Personas datu apstrādes līgumi Andris Soroka
 
Digitala Era 2017 - DatuAizsardziba.LV - Agnese Boboviča - Datu aizsardzības ...
Digitala Era 2017 - DatuAizsardziba.LV - Agnese Boboviča - Datu aizsardzības ...Digitala Era 2017 - DatuAizsardziba.LV - Agnese Boboviča - Datu aizsardzības ...
Digitala Era 2017 - DatuAizsardziba.LV - Agnese Boboviča - Datu aizsardzības ...Andris Soroka
 
Digitala Era 2017 - NotAKey - Janis Graubins - Mobile technologies for single...
Digitala Era 2017 - NotAKey - Janis Graubins - Mobile technologies for single...Digitala Era 2017 - NotAKey - Janis Graubins - Mobile technologies for single...
Digitala Era 2017 - NotAKey - Janis Graubins - Mobile technologies for single...Andris Soroka
 
Digitala Era 2017 - Hermitage Solutions - Gatis Kaušs - Clearswift - Komunikā...
Digitala Era 2017 - Hermitage Solutions - Gatis Kaušs - Clearswift - Komunikā...Digitala Era 2017 - Hermitage Solutions - Gatis Kaušs - Clearswift - Komunikā...
Digitala Era 2017 - Hermitage Solutions - Gatis Kaušs - Clearswift - Komunikā...Andris Soroka
 
Digitala Era 2017 - Digital Mind - Leons Mednis - eDiscovery risinājums GDPR ...
Digitala Era 2017 - Digital Mind - Leons Mednis - eDiscovery risinājums GDPR ...Digitala Era 2017 - Digital Mind - Leons Mednis - eDiscovery risinājums GDPR ...
Digitala Era 2017 - Digital Mind - Leons Mednis - eDiscovery risinājums GDPR ...Andris Soroka
 
Digitala Era 2017 - ALSO - Artjoms Krūmiņš - Personas datu regulas (EU GDPR) ...
Digitala Era 2017 - ALSO - Artjoms Krūmiņš - Personas datu regulas (EU GDPR) ...Digitala Era 2017 - ALSO - Artjoms Krūmiņš - Personas datu regulas (EU GDPR) ...
Digitala Era 2017 - ALSO - Artjoms Krūmiņš - Personas datu regulas (EU GDPR) ...Andris Soroka
 
Digitala Era 2017 - ZAB Skopiņa & Azanda - Jūlija Terjuhana - Tiesības uz dat...
Digitala Era 2017 - ZAB Skopiņa & Azanda - Jūlija Terjuhana - Tiesības uz dat...Digitala Era 2017 - ZAB Skopiņa & Azanda - Jūlija Terjuhana - Tiesības uz dat...
Digitala Era 2017 - ZAB Skopiņa & Azanda - Jūlija Terjuhana - Tiesības uz dat...Andris Soroka
 
Digitala Era 2017 - IT Centrs - Agris Krusts - Latvijas iedzīvotāju digitālo ...
Digitala Era 2017 - IT Centrs - Agris Krusts - Latvijas iedzīvotāju digitālo ...Digitala Era 2017 - IT Centrs - Agris Krusts - Latvijas iedzīvotāju digitālo ...
Digitala Era 2017 - IT Centrs - Agris Krusts - Latvijas iedzīvotāju digitālo ...Andris Soroka
 
Digitala Era 2017 - DSS.LV - Arturs Filatovs - Datu Aizsardzības Tehnoloģiskā...
Digitala Era 2017 - DSS.LV - Arturs Filatovs - Datu Aizsardzības Tehnoloģiskā...Digitala Era 2017 - DSS.LV - Arturs Filatovs - Datu Aizsardzības Tehnoloģiskā...
Digitala Era 2017 - DSS.LV - Arturs Filatovs - Datu Aizsardzības Tehnoloģiskā...Andris Soroka
 
Digitala Era 2017 - DSS.LV - Arturs Filatovs - Mobilitāte un Personas Datu Dr...
Digitala Era 2017 - DSS.LV - Arturs Filatovs - Mobilitāte un Personas Datu Dr...Digitala Era 2017 - DSS.LV - Arturs Filatovs - Mobilitāte un Personas Datu Dr...
Digitala Era 2017 - DSS.LV - Arturs Filatovs - Mobilitāte un Personas Datu Dr...Andris Soroka
 
Digitala Era 2017 - DSS.LV - Andris Soroka - Personas datu regulas tehnoloģis...
Digitala Era 2017 - DSS.LV - Andris Soroka - Personas datu regulas tehnoloģis...Digitala Era 2017 - DSS.LV - Andris Soroka - Personas datu regulas tehnoloģis...
Digitala Era 2017 - DSS.LV - Andris Soroka - Personas datu regulas tehnoloģis...Andris Soroka
 

Plus de Andris Soroka (20)

Digitala Era 2017 - TransactPro - Normunds Aizstrauts - Maksājumu un finansu ...
Digitala Era 2017 - TransactPro - Normunds Aizstrauts - Maksājumu un finansu ...Digitala Era 2017 - TransactPro - Normunds Aizstrauts - Maksājumu un finansu ...
Digitala Era 2017 - TransactPro - Normunds Aizstrauts - Maksājumu un finansu ...
 
Digitala Era 2017 - Datu Valsts Inspekcija - Lauris Linabergs - Vispārīgā dau...
Digitala Era 2017 - Datu Valsts Inspekcija - Lauris Linabergs - Vispārīgā dau...Digitala Era 2017 - Datu Valsts Inspekcija - Lauris Linabergs - Vispārīgā dau...
Digitala Era 2017 - Datu Valsts Inspekcija - Lauris Linabergs - Vispārīgā dau...
 
Digitala Era 2017 - PMLP - Vilnis Vītoliņš - Gaisa kuģu pasažieru datu apstrā...
Digitala Era 2017 - PMLP - Vilnis Vītoliņš - Gaisa kuģu pasažieru datu apstrā...Digitala Era 2017 - PMLP - Vilnis Vītoliņš - Gaisa kuģu pasažieru datu apstrā...
Digitala Era 2017 - PMLP - Vilnis Vītoliņš - Gaisa kuģu pasažieru datu apstrā...
 
Digitala Era 2017 - BOD LAW - Līva Aleksejeva - LIELIE DATI un personas datu ...
Digitala Era 2017 - BOD LAW - Līva Aleksejeva - LIELIE DATI un personas datu ...Digitala Era 2017 - BOD LAW - Līva Aleksejeva - LIELIE DATI un personas datu ...
Digitala Era 2017 - BOD LAW - Līva Aleksejeva - LIELIE DATI un personas datu ...
 
Digitala Era 2017 - Spridzans Law Office - Anna Vladimirova Krykova - Mobilo ...
Digitala Era 2017 - Spridzans Law Office - Anna Vladimirova Krykova - Mobilo ...Digitala Era 2017 - Spridzans Law Office - Anna Vladimirova Krykova - Mobilo ...
Digitala Era 2017 - Spridzans Law Office - Anna Vladimirova Krykova - Mobilo ...
 
Digitala Era 2017 - ZAB “BULLET” - Ivo Krievs - Vai uz valsti attiecināmi cit...
Digitala Era 2017 - ZAB “BULLET” - Ivo Krievs - Vai uz valsti attiecināmi cit...Digitala Era 2017 - ZAB “BULLET” - Ivo Krievs - Vai uz valsti attiecināmi cit...
Digitala Era 2017 - ZAB “BULLET” - Ivo Krievs - Vai uz valsti attiecināmi cit...
 
Digitala Era 2017 - LSPDSA - Arnis Puksts - Datu aizsardzības speciālists (DPO)
Digitala Era 2017 - LSPDSA - Arnis Puksts - Datu aizsardzības speciālists (DPO)Digitala Era 2017 - LSPDSA - Arnis Puksts - Datu aizsardzības speciālists (DPO)
Digitala Era 2017 - LSPDSA - Arnis Puksts - Datu aizsardzības speciālists (DPO)
 
Digitala Era 2017 - IIZI - Lauris Kļaviņš - GDPR - Kādus izdevumus un riskus ...
Digitala Era 2017 - IIZI - Lauris Kļaviņš - GDPR - Kādus izdevumus un riskus ...Digitala Era 2017 - IIZI - Lauris Kļaviņš - GDPR - Kādus izdevumus un riskus ...
Digitala Era 2017 - IIZI - Lauris Kļaviņš - GDPR - Kādus izdevumus un riskus ...
 
Digitala Era 2017 - E-Risinajumi - Māris Ruķers - Vai ar vienu datu aizsardzī...
Digitala Era 2017 - E-Risinajumi - Māris Ruķers - Vai ar vienu datu aizsardzī...Digitala Era 2017 - E-Risinajumi - Māris Ruķers - Vai ar vienu datu aizsardzī...
Digitala Era 2017 - E-Risinajumi - Māris Ruķers - Vai ar vienu datu aizsardzī...
 
Digitala Era 2017 - Gints Puškundzis - Personas datu apstrādes līgumi
Digitala Era 2017 - Gints Puškundzis - Personas datu apstrādes līgumi Digitala Era 2017 - Gints Puškundzis - Personas datu apstrādes līgumi
Digitala Era 2017 - Gints Puškundzis - Personas datu apstrādes līgumi
 
Digitala Era 2017 - DatuAizsardziba.LV - Agnese Boboviča - Datu aizsardzības ...
Digitala Era 2017 - DatuAizsardziba.LV - Agnese Boboviča - Datu aizsardzības ...Digitala Era 2017 - DatuAizsardziba.LV - Agnese Boboviča - Datu aizsardzības ...
Digitala Era 2017 - DatuAizsardziba.LV - Agnese Boboviča - Datu aizsardzības ...
 
Digitala Era 2017 - NotAKey - Janis Graubins - Mobile technologies for single...
Digitala Era 2017 - NotAKey - Janis Graubins - Mobile technologies for single...Digitala Era 2017 - NotAKey - Janis Graubins - Mobile technologies for single...
Digitala Era 2017 - NotAKey - Janis Graubins - Mobile technologies for single...
 
Digitala Era 2017 - Hermitage Solutions - Gatis Kaušs - Clearswift - Komunikā...
Digitala Era 2017 - Hermitage Solutions - Gatis Kaušs - Clearswift - Komunikā...Digitala Era 2017 - Hermitage Solutions - Gatis Kaušs - Clearswift - Komunikā...
Digitala Era 2017 - Hermitage Solutions - Gatis Kaušs - Clearswift - Komunikā...
 
Digitala Era 2017 - Digital Mind - Leons Mednis - eDiscovery risinājums GDPR ...
Digitala Era 2017 - Digital Mind - Leons Mednis - eDiscovery risinājums GDPR ...Digitala Era 2017 - Digital Mind - Leons Mednis - eDiscovery risinājums GDPR ...
Digitala Era 2017 - Digital Mind - Leons Mednis - eDiscovery risinājums GDPR ...
 
Digitala Era 2017 - ALSO - Artjoms Krūmiņš - Personas datu regulas (EU GDPR) ...
Digitala Era 2017 - ALSO - Artjoms Krūmiņš - Personas datu regulas (EU GDPR) ...Digitala Era 2017 - ALSO - Artjoms Krūmiņš - Personas datu regulas (EU GDPR) ...
Digitala Era 2017 - ALSO - Artjoms Krūmiņš - Personas datu regulas (EU GDPR) ...
 
Digitala Era 2017 - ZAB Skopiņa & Azanda - Jūlija Terjuhana - Tiesības uz dat...
Digitala Era 2017 - ZAB Skopiņa & Azanda - Jūlija Terjuhana - Tiesības uz dat...Digitala Era 2017 - ZAB Skopiņa & Azanda - Jūlija Terjuhana - Tiesības uz dat...
Digitala Era 2017 - ZAB Skopiņa & Azanda - Jūlija Terjuhana - Tiesības uz dat...
 
Digitala Era 2017 - IT Centrs - Agris Krusts - Latvijas iedzīvotāju digitālo ...
Digitala Era 2017 - IT Centrs - Agris Krusts - Latvijas iedzīvotāju digitālo ...Digitala Era 2017 - IT Centrs - Agris Krusts - Latvijas iedzīvotāju digitālo ...
Digitala Era 2017 - IT Centrs - Agris Krusts - Latvijas iedzīvotāju digitālo ...
 
Digitala Era 2017 - DSS.LV - Arturs Filatovs - Datu Aizsardzības Tehnoloģiskā...
Digitala Era 2017 - DSS.LV - Arturs Filatovs - Datu Aizsardzības Tehnoloģiskā...Digitala Era 2017 - DSS.LV - Arturs Filatovs - Datu Aizsardzības Tehnoloģiskā...
Digitala Era 2017 - DSS.LV - Arturs Filatovs - Datu Aizsardzības Tehnoloģiskā...
 
Digitala Era 2017 - DSS.LV - Arturs Filatovs - Mobilitāte un Personas Datu Dr...
Digitala Era 2017 - DSS.LV - Arturs Filatovs - Mobilitāte un Personas Datu Dr...Digitala Era 2017 - DSS.LV - Arturs Filatovs - Mobilitāte un Personas Datu Dr...
Digitala Era 2017 - DSS.LV - Arturs Filatovs - Mobilitāte un Personas Datu Dr...
 
Digitala Era 2017 - DSS.LV - Andris Soroka - Personas datu regulas tehnoloģis...
Digitala Era 2017 - DSS.LV - Andris Soroka - Personas datu regulas tehnoloģis...Digitala Era 2017 - DSS.LV - Andris Soroka - Personas datu regulas tehnoloģis...
Digitala Era 2017 - DSS.LV - Andris Soroka - Personas datu regulas tehnoloģis...
 

HTLV - DSS @Vilnius 2010

  • 1. The trends in IT Security innovations Arturs Filatovs Value Added Distribution headtechnology Baltics SIA Latvia, Lithuania and Estonia www.headtechnology.com
  • 3. Operations in The Baltic States Business Gateway Security Host Security Network Security Value Added Distribution Marketing & Sales assistance Technical & Integration Support Trainings Certification Business Network Managed Services & Support www.headtechnology.com
  • 4. 2nd of December, Vilnius, Lithuania The trends in IT Security innovations www.headtechnology.com
  • 5. Security and time Mobility is raising, productivity is decreasing security Problems with InfoSEC – were, are, WILL BE more Early 90’s Year 2000 Year 2011 • DOS applications • Complex aplications • ? • Passwords • Mobility + Productivity • Physical access • Passwords • Physical access www.headtechnology.com
  • 6. Besides technology – problems with security Top 10 Security problems in enterpise 1. Yelow Posters 2. We know better than you 3. Leaving the machine on 4. Opening e-mail attachments 5. Poor password selection 6. Loose lips sink ships 7. Laptops have legs 8. Poorly enforced security policies 9. Failing to consider the staff 10. Being slow to update www.headtechnology.com
  • 7. Key risks for shortlist End users – the weakest link Vulnerability – everyone vs. everything Data access and protection Black community makes it easy • Google.com/hacking for dummies • Youtube.com/how to hack passwords • P2P for software download www.headtechnology.com
  • 8. Hall of fame in Latvia 99% Things we’ll never know www.headtechnology.com
  • 9. Solution? Weak security is not an option! Too much of security makes no sense! www.headtechnology.com
  • 11. Most important things Monitoring (systems, users, administrators) Vulnerability and EndPoints (done by Lumension) Encryption (in motion / during transfer / at rest) Agentless real time network visibility and NAC www.headtechnology.com
  • 13. Spectorsoft – Monitoring all Theft of confidential information Fraud & embezzlement Sexual or racial harassment Litigation by employees and outside companies Discrimination claims Illegal downloads www.headtechnology.com
  • 14. How to use SpectorSoft? Maximize productivity Increase security Reduce liability Enforce compliance www.headtechnology.com
  • 16. PGP – Encryption Platform PGP Encryption Solutions 3rd Party Solutions Disk and File Email Mobile Mainframe Commercial Commercial Custom Device Devices Hardware Software Applications Key Lifecycle Key Storage Authentication / Authorization Auditing Policy Management Reporting Logging Automated Operations and Provisioning PGP Encryption Platform Existing Infrastructure www.headtechnology.com
  • 17. PGP solutions PGP Universal™ Server Central Management of PGP Universal™ Gateway Email all products • User-transparent, gateway email encryption PGP® Desktop Email • Email, file, disk, & IM encryption PGP® Whole Disk Encryption • Laptop & disk security PGP® NetShare • Shared server storage security PGP® Command Line • Secure FTP/batch & backups PGP® Support Package for BlackBerry® All PGP products are based on • Mobile client software the PGP SDK, a mature FIPS 140-2 validated cryptographic PDF Messenger module • Secure & Certified Statement Delivery www.headtechnology.com
  • 18. KNOW YOUR NETWORK www.headtechnology.com
  • 19. Real time “agentless” network assesment Control & Enforcement Safeguarding the network’s security integrity by preventing network access from unauthorized and/or non-compliant Discovery elements. Comprehensive collection of data from ALL network assets, gathering complete, accurate and detailed continuous network intelligence. This unique approach provides always on, real-time network visibility acting as the foundation for the BSA solution. Remediation Identification of the corrective measures that must be put in place and fix inconsistencies with the security posture of assets attached to the network. Aligning the security configuration of assets with security best practices considerably reduces the enterprise networks' risk of exposure. Audit, Compliance User Identity Profiling & Risk Analysis: Establishment and maintenance of user intelligence Automated security configuration auditing, by correlating between user identities and specific simplifying the process of conducting IP addresses. This improves audit controls, and network-wide configuration audits. This enhances regulatory compliance. It also significantly provides efficient security compliance enhances incident response by enabling locating tracking and auditing procedures. vulnerable and/or exploited hosts, and eliminating the manual efforts to track users. The Insightix Business Security Assurance (BSA) product suite is designed to detect, identify, profile, audit and control ALL devices connected to your network. www.headtechnology.com
  • 20. One to hundred locations www.headtechnology.com
  • 22. @ the end Privacy is dead! www.headtechnology.com
  • 23. Contacts headtechnology Baltics SIA Innovative IT Security Solutions Value Added Distributor Latvia, Lithuania and Estonia 31 Cesu str. 3rd floor, LV-1012, Riga, Latvia Phone: +371 674 21 021 Fax: +371 674 21 024 eMail: info@headtechnology.lv Internet: www.headtechnology.com www.headtechnology.com