SlideShare una empresa de Scribd logo
1 de 25
Descargar para leer sin conexión
BEYOND THE PC – COMBATING
UNMANAGED THREATS
June 12th, 2013
View the webinar replay here:
https://www.brainshark.com/xerox/vu?pi=zIDz6kmucz62tqz0
Watch this video here:
http://a400.g.akamai.net/7/400/14595/v0001/xeroxwebcast.download.akamai.com/14595/
TEMP/201306/Computer_Hacking-Cracking_down_on_cyber_crime-clip1.mp4
TODAY’S PROGRAM
• CISO Insights
– Mark Leary, Chief Information Security Officer, Xerox
• Solutions: Managed Print Services
and ConnectKey™
– Karl Dueland, VP Solutions Delivery Unit, Xerox
• Protecting Your Network
– John Hartman, Client Executive, Cisco
• Embedded Security, Smarter Security
– Brian Kenyon, Chief Technology Officer, McAfee
INSIGHTS
Mark Leary
Chief Information Security Officer
Xerox
THE “INTERNET OF THINGS”
It has arrived….and so have
huge security issues….
– Network and protocol
security
– Data privacy and security
– Identity
– Trust
population
with Internet
access in 2015
75%
devices
connected to
the Internet in
2015
6B
devices
connected to
the Internet
in 2020
30B
A “THING” CALLED A MFP…
3.4MILLION
businesses that
experienced a
printer-related
data breach
companies
without a
secure print
strategy
65%
companies
have a secure
print
initiative
22%
63%
COMMON MFP SECURITY THREATS
• Poor mobile device management
• Weak MFP wireless access control
• Poor VPN remote access controls
• Poor Web-based remote access controls
• Weak identity and access management
• MFP hardware component weaknesses
• MFP embedded software weaknesses
• Poor partner/contractor/consultant access
• Poor physical access to MFPs
• Poor MFP system and application access
• Poor MFP software management controls
REMOTE ACCESS
PROXIMITY
INSIDER THREAT
SUPPLY CHAIN
QUESTIONS TO ASK
1) Do we have an understanding of our business processes that
involve document management and printing?
2) What threats are targeting our IT environment and particularly
MFPs?
3) Are our policies addressing MFP information security still relevant
to protect the business?
4) Are our MFPs correctly configured to prevent cyber attacks?
5) Do we have visibility into our IT environment to identify devices
and determine normal behavior from abnormal?
6) Are we incorporating our customers, partners, and vendors into
our IT security operating model?
A CYCLE OF CONTINUOUS VALUE
Document
Outsourcing
IT Outsourcing
Business Process
Outsourcing
Sustainability
Cost Savings
Productivity
Security
Innovation
Insight
Mobility
Managed
Print Services and
Technology
Secure and
Integrate
Automate
and Simplify
Assess and
Optimize
SOLUTIONS: MANAGED PRINT
SERVICES AND CONNECTKEY™
Karl Dueland, Vice President, Solutions Delivery Unit, Xerox
STARTING POINT: SECURE TECHNOLOGY
• An ecosystem built into new Xerox MFPs
• Offering flexibility, coherency and commonality
• A complete refresh of key office products
• Integrated with Managed Print Services
8700,8900 7220,7225 7800 5800 9300+
ConnectKeyTM
LEADERSHIP SECURITY:
MULTILAYERED APPROACH
Network
Management
Consoles
• Simple email alerts
• Xerox Device
Manager
• McAfee ePolicy
Orchestrator
TrustSec
Access Protection
Xerox MFP
User Endpoints
Watch this video here:
http://a400.g.akamai.net/7/400/14595/v0001/xeroxwebcast.download.akamai.com/14595/
TEMP/201306/09-Security_low.mp4
PROTECTING YOUR NETWORK
John Hartman, CISCO
TOP OF MIND
SECURITY CONCERNS
• How do I classify so many devices
coming onto my network?
• How do I allow suppliers and
contractors to collaborate securely?
• Do we have control over devices
connecting to our applications & data
in the DC?
• Virtual Machine Sprawl! How should I
manage security for all of those VMs we
are being asked to provision everyday?
• My critical services are still running
on physical servers. Do I maintain
separate policies?
All-in-One Enterprise Policy Control
CISCO IDENTITY
SERVICES ENGINE (ISE)
Who What Where When How
Virtual machine client, IP device, guest, employee, and remote user
Cisco® ISE
WIRED WIRELESS VPN
Business-Relevant
Policies
Security Policy Attributes
IDENTITY
CONTEXT
EMBEDDED SECURITY, SMARTER
SECURITY
Brian Kenyon, Chief Technology Officer, McAfee
BLACKLIST VS. WHITELIST
THE DYNAMICS
OF WHITELISTING
Black Grey White
DYNAMIC STATIC
MAC
NetBook
Consumer PC
VDI
Smartphone
Mobile
Phone
REPUTATION-BASED
Medical
Devices
SCADA Systems
Servers
Point of
Sale
ATMs
Kiosks
COE
Desktop
Smart
Meter
MFP
Watch this video here:
http://www.youtube.com/watch?v=XbQowo1ForM
Sustainability
Cost Savings
Productivity
Security
Innovation
Insight
Mobility
Xerox Managed
Print Services
and Technology
Secure and
Integrate
Automate and
Simplify
Assess and
Optimize
MANAGING PRINT SECURELY
Sustainability
• Manage power consumption with Cisco
EnergyWise
• Earth Smart Print Drivers
Employee Productivity & Mobility
• Scan to Cloud / SharePoint
• Print from / to anywhere
• Open API for custom workflow integration
Security
• McAfee embedded security & whitelisting
• Cisco TrustSec – secure print
image overwrite & encryption
Cost Savings
• Reduce wasteful printing with
default settings
• Card access authentication
Watch this video here:
http://www.youtube.com/watch?v=_05x6fWtREQ
OPEN FOR QUESTIONS
• Please press *1 for the Operator
to ask a questions
• Or use the Q&A feature in
Live Meeting to submit a question
THANK YOU FOR JOINING US
• www.xerox.com/security
• Chief Optimist Magazine
– More insights and innovative ideas from
the newest issue focused on security.
• iPad edition: “Chief Optimist” on App Store
• PC edition: Xerox.com/optimist
• Focus Forward Events
– Explore expert commentary
• XeroxFocusForward.com

Más contenido relacionado

La actualidad más candente

Business Case Of Bring Your Own Device[ BYOD]
Business Case Of Bring Your Own Device[ BYOD] Business Case Of Bring Your Own Device[ BYOD]
Business Case Of Bring Your Own Device[ BYOD] Md Yousup Faruqu
 
BYOD: Bring Your Own Device Implementation and Security Issues
BYOD: Bring Your Own Device Implementation and Security IssuesBYOD: Bring Your Own Device Implementation and Security Issues
BYOD: Bring Your Own Device Implementation and Security IssuesHarsh Kishore Mishra
 
Mobile Device Security by Michael Gong, Jake Kreider, Chris Lugo, Kwame Osaf...
 Mobile Device Security by Michael Gong, Jake Kreider, Chris Lugo, Kwame Osaf... Mobile Device Security by Michael Gong, Jake Kreider, Chris Lugo, Kwame Osaf...
Mobile Device Security by Michael Gong, Jake Kreider, Chris Lugo, Kwame Osaf...Information Security Awareness Group
 
Preparing an Effective BYOD or Mobility Strategy
Preparing an Effective BYOD or Mobility StrategyPreparing an Effective BYOD or Mobility Strategy
Preparing an Effective BYOD or Mobility StrategyLogicalis Australia
 
Sophos Mobile Control - Product Overview
Sophos Mobile Control - Product OverviewSophos Mobile Control - Product Overview
Sophos Mobile Control - Product OverviewSophos
 
A Primer on iOS Management and What's Changing
A Primer on iOS Management and What's ChangingA Primer on iOS Management and What's Changing
A Primer on iOS Management and What's ChangingIvanti
 
The Three Critical Steps for Effective BYOD Management
The Three Critical Steps for Effective BYOD Management The Three Critical Steps for Effective BYOD Management
The Three Critical Steps for Effective BYOD Management Kaseya
 
Mobile device management and BYOD – simple changes, big benefits
Mobile device management and BYOD – simple changes, big benefitsMobile device management and BYOD – simple changes, big benefits
Mobile device management and BYOD – simple changes, big benefitsWaterstons Ltd
 
Learnings while building Mobile Device Management [MDM]
Learnings while building Mobile Device Management [MDM] Learnings while building Mobile Device Management [MDM]
Learnings while building Mobile Device Management [MDM] Leena N
 
The Biggest Mistake you can make with your Data Center Licenses
The Biggest Mistake you can make with your Data Center LicensesThe Biggest Mistake you can make with your Data Center Licenses
The Biggest Mistake you can make with your Data Center LicensesIvanti
 
Smarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst ServicesSmarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst ServicesChris Pepin
 
5 Essential Tips for Creating An Effective BYOD Policy
5 Essential Tips for Creating An Effective BYOD Policy5 Essential Tips for Creating An Effective BYOD Policy
5 Essential Tips for Creating An Effective BYOD PolicyKaseya
 
Brochure Security
Brochure SecurityBrochure Security
Brochure Securitybryanpsu
 
Data-Centric Protection: The Future of BYOD Security
Data-Centric Protection: The Future of BYOD SecurityData-Centric Protection: The Future of BYOD Security
Data-Centric Protection: The Future of BYOD SecurityBitglass
 
Secure mobile content SharePoint Best Practices Conference 2013
Secure mobile content   SharePoint Best Practices Conference 2013Secure mobile content   SharePoint Best Practices Conference 2013
Secure mobile content SharePoint Best Practices Conference 2013Mike Brannon
 

La actualidad más candente (20)

Business Case Of Bring Your Own Device[ BYOD]
Business Case Of Bring Your Own Device[ BYOD] Business Case Of Bring Your Own Device[ BYOD]
Business Case Of Bring Your Own Device[ BYOD]
 
Bring your own device
Bring your own deviceBring your own device
Bring your own device
 
BYOD: Bring Your Own Device Implementation and Security Issues
BYOD: Bring Your Own Device Implementation and Security IssuesBYOD: Bring Your Own Device Implementation and Security Issues
BYOD: Bring Your Own Device Implementation and Security Issues
 
Byod
ByodByod
Byod
 
Mobile Device Security by Michael Gong, Jake Kreider, Chris Lugo, Kwame Osaf...
 Mobile Device Security by Michael Gong, Jake Kreider, Chris Lugo, Kwame Osaf... Mobile Device Security by Michael Gong, Jake Kreider, Chris Lugo, Kwame Osaf...
Mobile Device Security by Michael Gong, Jake Kreider, Chris Lugo, Kwame Osaf...
 
Preparing an Effective BYOD or Mobility Strategy
Preparing an Effective BYOD or Mobility StrategyPreparing an Effective BYOD or Mobility Strategy
Preparing an Effective BYOD or Mobility Strategy
 
Sophos Mobile Control - Product Overview
Sophos Mobile Control - Product OverviewSophos Mobile Control - Product Overview
Sophos Mobile Control - Product Overview
 
A Primer on iOS Management and What's Changing
A Primer on iOS Management and What's ChangingA Primer on iOS Management and What's Changing
A Primer on iOS Management and What's Changing
 
Bring Your Own Device
Bring Your Own Device Bring Your Own Device
Bring Your Own Device
 
The Three Critical Steps for Effective BYOD Management
The Three Critical Steps for Effective BYOD Management The Three Critical Steps for Effective BYOD Management
The Three Critical Steps for Effective BYOD Management
 
Mobile device management and BYOD – simple changes, big benefits
Mobile device management and BYOD – simple changes, big benefitsMobile device management and BYOD – simple changes, big benefits
Mobile device management and BYOD – simple changes, big benefits
 
Learnings while building Mobile Device Management [MDM]
Learnings while building Mobile Device Management [MDM] Learnings while building Mobile Device Management [MDM]
Learnings while building Mobile Device Management [MDM]
 
The Biggest Mistake you can make with your Data Center Licenses
The Biggest Mistake you can make with your Data Center LicensesThe Biggest Mistake you can make with your Data Center Licenses
The Biggest Mistake you can make with your Data Center Licenses
 
Smarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst ServicesSmarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst Services
 
5 Essential Tips for Creating An Effective BYOD Policy
5 Essential Tips for Creating An Effective BYOD Policy5 Essential Tips for Creating An Effective BYOD Policy
5 Essential Tips for Creating An Effective BYOD Policy
 
Nonprofit IT Trends 2018
Nonprofit IT Trends 2018Nonprofit IT Trends 2018
Nonprofit IT Trends 2018
 
Bring Your Own Device (BYOD)
Bring Your Own Device (BYOD)Bring Your Own Device (BYOD)
Bring Your Own Device (BYOD)
 
Brochure Security
Brochure SecurityBrochure Security
Brochure Security
 
Data-Centric Protection: The Future of BYOD Security
Data-Centric Protection: The Future of BYOD SecurityData-Centric Protection: The Future of BYOD Security
Data-Centric Protection: The Future of BYOD Security
 
Secure mobile content SharePoint Best Practices Conference 2013
Secure mobile content   SharePoint Best Practices Conference 2013Secure mobile content   SharePoint Best Practices Conference 2013
Secure mobile content SharePoint Best Practices Conference 2013
 

Similar a Beyond the PC: Combating Unmanaged Threats Security

TEUNO Summit - Presentaciones
TEUNO Summit - PresentacionesTEUNO Summit - Presentaciones
TEUNO Summit - PresentacionesTEUNO
 
Advanced IT and Cyber Security for Your Business
Advanced IT and Cyber Security for Your BusinessAdvanced IT and Cyber Security for Your Business
Advanced IT and Cyber Security for Your BusinessInfopulse
 
Cloud Security: Perception Vs. Reality
Cloud Security: Perception Vs. RealityCloud Security: Perception Vs. Reality
Cloud Security: Perception Vs. RealityInternap
 
Sleeping well with cloud services
Sleeping well with cloud servicesSleeping well with cloud services
Sleeping well with cloud servicesComarch_Services
 
Symantec 2006_Annual_Report
Symantec  2006_Annual_ReportSymantec  2006_Annual_Report
Symantec 2006_Annual_Reportfinance40
 
Embracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and CentrifyEmbracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and CentrifySumana Mehta
 
IBM InterConnect 2103 - Institute a MobileFirst IT Infrastructure
IBM InterConnect 2103 -  Institute a MobileFirst IT InfrastructureIBM InterConnect 2103 -  Institute a MobileFirst IT Infrastructure
IBM InterConnect 2103 - Institute a MobileFirst IT InfrastructureChris Pepin
 
Micro Focus Corporate Overview
Micro Focus Corporate OverviewMicro Focus Corporate Overview
Micro Focus Corporate OverviewMicro Focus
 
Leveraging mobility - turning enterprise wireless into a business enabler
Leveraging mobility - turning enterprise wireless into a business enablerLeveraging mobility - turning enterprise wireless into a business enabler
Leveraging mobility - turning enterprise wireless into a business enablerLogicalis Australia
 
[Sencha 엔터프라이즈 웹애플리케이션 세미나] BYOD - Sencha space
[Sencha 엔터프라이즈 웹애플리케이션 세미나] BYOD - Sencha space[Sencha 엔터프라이즈 웹애플리케이션 세미나] BYOD - Sencha space
[Sencha 엔터프라이즈 웹애플리케이션 세미나] BYOD - Sencha space미래웹기술연구소 (MIRAE WEB)
 
Is workforce mobility presenting new technology challenges?
Is workforce mobility presenting new technology challenges?Is workforce mobility presenting new technology challenges?
Is workforce mobility presenting new technology challenges?Parallels Inc
 
CIO Review - Top 20 CyberSecurity
CIO Review - Top 20 CyberSecurityCIO Review - Top 20 CyberSecurity
CIO Review - Top 20 CyberSecurityBob Guimarin
 
CASBs: 8 Critical Capabilities in partnership with ISMG Media Group
CASBs: 8 Critical Capabilities in partnership with ISMG Media GroupCASBs: 8 Critical Capabilities in partnership with ISMG Media Group
CASBs: 8 Critical Capabilities in partnership with ISMG Media GroupBitglass
 
Virtela Corp Brochure
Virtela Corp BrochureVirtela Corp Brochure
Virtela Corp Brochuretmcleland
 
Presentation cloud security the grand challenge
Presentation   cloud security the grand challengePresentation   cloud security the grand challenge
Presentation cloud security the grand challengexKinAnx
 
UDT - Government and Healthcare
UDT - Government and HealthcareUDT - Government and Healthcare
UDT - Government and HealthcareTina Dominguez
 
The 5 ws of Cyber Security
The 5 ws of Cyber SecurityThe 5 ws of Cyber Security
The 5 ws of Cyber SecurityMisha Hanin
 

Similar a Beyond the PC: Combating Unmanaged Threats Security (20)

TEUNO Summit - Presentaciones
TEUNO Summit - PresentacionesTEUNO Summit - Presentaciones
TEUNO Summit - Presentaciones
 
Advanced IT and Cyber Security for Your Business
Advanced IT and Cyber Security for Your BusinessAdvanced IT and Cyber Security for Your Business
Advanced IT and Cyber Security for Your Business
 
Cloud Security: Perception Vs. Reality
Cloud Security: Perception Vs. RealityCloud Security: Perception Vs. Reality
Cloud Security: Perception Vs. Reality
 
Sleeping well with cloud services
Sleeping well with cloud servicesSleeping well with cloud services
Sleeping well with cloud services
 
Symantec 2006_Annual_Report
Symantec  2006_Annual_ReportSymantec  2006_Annual_Report
Symantec 2006_Annual_Report
 
Embracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and CentrifyEmbracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and Centrify
 
IBM InterConnect 2103 - Institute a MobileFirst IT Infrastructure
IBM InterConnect 2103 -  Institute a MobileFirst IT InfrastructureIBM InterConnect 2103 -  Institute a MobileFirst IT Infrastructure
IBM InterConnect 2103 - Institute a MobileFirst IT Infrastructure
 
Micro Focus Corporate Overview
Micro Focus Corporate OverviewMicro Focus Corporate Overview
Micro Focus Corporate Overview
 
Leveraging mobility - turning enterprise wireless into a business enabler
Leveraging mobility - turning enterprise wireless into a business enablerLeveraging mobility - turning enterprise wireless into a business enabler
Leveraging mobility - turning enterprise wireless into a business enabler
 
Security Chat 5.0
Security Chat 5.0Security Chat 5.0
Security Chat 5.0
 
[Sencha 엔터프라이즈 웹애플리케이션 세미나] BYOD - Sencha space
[Sencha 엔터프라이즈 웹애플리케이션 세미나] BYOD - Sencha space[Sencha 엔터프라이즈 웹애플리케이션 세미나] BYOD - Sencha space
[Sencha 엔터프라이즈 웹애플리케이션 세미나] BYOD - Sencha space
 
Is workforce mobility presenting new technology challenges?
Is workforce mobility presenting new technology challenges?Is workforce mobility presenting new technology challenges?
Is workforce mobility presenting new technology challenges?
 
BluBØX Intro
BluBØX IntroBluBØX Intro
BluBØX Intro
 
CIO Review - Top 20 CyberSecurity
CIO Review - Top 20 CyberSecurityCIO Review - Top 20 CyberSecurity
CIO Review - Top 20 CyberSecurity
 
CASBs: 8 Critical Capabilities in partnership with ISMG Media Group
CASBs: 8 Critical Capabilities in partnership with ISMG Media GroupCASBs: 8 Critical Capabilities in partnership with ISMG Media Group
CASBs: 8 Critical Capabilities in partnership with ISMG Media Group
 
Virtela Corp Brochure
Virtela Corp BrochureVirtela Corp Brochure
Virtela Corp Brochure
 
Presentation cloud security the grand challenge
Presentation   cloud security the grand challengePresentation   cloud security the grand challenge
Presentation cloud security the grand challenge
 
Safeguard Your Business
Safeguard Your BusinessSafeguard Your Business
Safeguard Your Business
 
UDT - Government and Healthcare
UDT - Government and HealthcareUDT - Government and Healthcare
UDT - Government and Healthcare
 
The 5 ws of Cyber Security
The 5 ws of Cyber SecurityThe 5 ws of Cyber Security
The 5 ws of Cyber Security
 

Más de Chief Optimist

How Mobility is Changing the Way We Work
How Mobility is Changing the Way We WorkHow Mobility is Changing the Way We Work
How Mobility is Changing the Way We WorkChief Optimist
 
Green Printing at UK Government Department [Infographic]
Green Printing at UK Government Department [Infographic]Green Printing at UK Government Department [Infographic]
Green Printing at UK Government Department [Infographic]Chief Optimist
 
Financial Group Goes Beyond Document Management [Infographic]
Financial Group Goes Beyond Document Management [Infographic]Financial Group Goes Beyond Document Management [Infographic]
Financial Group Goes Beyond Document Management [Infographic]Chief Optimist
 
Take the Stop and Go out of your Retail Supply Chain [Infographic]
Take the Stop and Go out of your Retail Supply Chain [Infographic]Take the Stop and Go out of your Retail Supply Chain [Infographic]
Take the Stop and Go out of your Retail Supply Chain [Infographic]Chief Optimist
 
The Automated States of America: Transforming the Future of Government IT [In...
The Automated States of America: Transforming the Future of Government IT [In...The Automated States of America: Transforming the Future of Government IT [In...
The Automated States of America: Transforming the Future of Government IT [In...Chief Optimist
 
Optimism in the Healthcare Workplace Revealed
Optimism in the Healthcare Workplace RevealedOptimism in the Healthcare Workplace Revealed
Optimism in the Healthcare Workplace RevealedChief Optimist
 
Optimism in Government Revealed
Optimism in Government RevealedOptimism in Government Revealed
Optimism in Government RevealedChief Optimist
 
Optimism in the Modern Workplace Revealed
Optimism in the Modern Workplace RevealedOptimism in the Modern Workplace Revealed
Optimism in the Modern Workplace RevealedChief Optimist
 
Finding the Retail Omnichannel Sweet Spots Infographic
Finding the Retail Omnichannel Sweet Spots InfographicFinding the Retail Omnichannel Sweet Spots Infographic
Finding the Retail Omnichannel Sweet Spots InfographicChief Optimist
 
Higher Education Student Retention and Achievement Infographic
Higher Education Student Retention and Achievement InfographicHigher Education Student Retention and Achievement Infographic
Higher Education Student Retention and Achievement InfographicChief Optimist
 
Government Data Breaches: An Inside Job? [Infographic]
Government Data Breaches: An Inside Job? [Infographic]Government Data Breaches: An Inside Job? [Infographic]
Government Data Breaches: An Inside Job? [Infographic]Chief Optimist
 
26 Reasons You Need an MPS Assessment
26 Reasons You Need an MPS Assessment26 Reasons You Need an MPS Assessment
26 Reasons You Need an MPS AssessmentChief Optimist
 
Four Necessities for Your Change Management Journey (Infographic)
Four Necessities for Your Change Management Journey (Infographic)Four Necessities for Your Change Management Journey (Infographic)
Four Necessities for Your Change Management Journey (Infographic)Chief Optimist
 
Work is Not a Place Anymore
Work is Not a Place AnymoreWork is Not a Place Anymore
Work is Not a Place AnymoreChief Optimist
 
Think you’re secure? You May Be Surprised
Think you’re secure? You May Be SurprisedThink you’re secure? You May Be Surprised
Think you’re secure? You May Be SurprisedChief Optimist
 
Generating Revenue and Reducing Costs in Higher Education
Generating Revenue and Reducing Costs in Higher EducationGenerating Revenue and Reducing Costs in Higher Education
Generating Revenue and Reducing Costs in Higher EducationChief Optimist
 
Workflow and The True Value of Managed Print Services
Workflow and The True Value of Managed Print ServicesWorkflow and The True Value of Managed Print Services
Workflow and The True Value of Managed Print ServicesChief Optimist
 
Change is good...when you manage it properly.
Change is good...when you manage it properly.Change is good...when you manage it properly.
Change is good...when you manage it properly.Chief Optimist
 

Más de Chief Optimist (20)

How Mobility is Changing the Way We Work
How Mobility is Changing the Way We WorkHow Mobility is Changing the Way We Work
How Mobility is Changing the Way We Work
 
Green Printing at UK Government Department [Infographic]
Green Printing at UK Government Department [Infographic]Green Printing at UK Government Department [Infographic]
Green Printing at UK Government Department [Infographic]
 
Financial Group Goes Beyond Document Management [Infographic]
Financial Group Goes Beyond Document Management [Infographic]Financial Group Goes Beyond Document Management [Infographic]
Financial Group Goes Beyond Document Management [Infographic]
 
Take the Stop and Go out of your Retail Supply Chain [Infographic]
Take the Stop and Go out of your Retail Supply Chain [Infographic]Take the Stop and Go out of your Retail Supply Chain [Infographic]
Take the Stop and Go out of your Retail Supply Chain [Infographic]
 
The Automated States of America: Transforming the Future of Government IT [In...
The Automated States of America: Transforming the Future of Government IT [In...The Automated States of America: Transforming the Future of Government IT [In...
The Automated States of America: Transforming the Future of Government IT [In...
 
Optimism in the Healthcare Workplace Revealed
Optimism in the Healthcare Workplace RevealedOptimism in the Healthcare Workplace Revealed
Optimism in the Healthcare Workplace Revealed
 
Optimism in Government Revealed
Optimism in Government RevealedOptimism in Government Revealed
Optimism in Government Revealed
 
Optimism in the Modern Workplace Revealed
Optimism in the Modern Workplace RevealedOptimism in the Modern Workplace Revealed
Optimism in the Modern Workplace Revealed
 
Finding the Retail Omnichannel Sweet Spots Infographic
Finding the Retail Omnichannel Sweet Spots InfographicFinding the Retail Omnichannel Sweet Spots Infographic
Finding the Retail Omnichannel Sweet Spots Infographic
 
Higher Education Student Retention and Achievement Infographic
Higher Education Student Retention and Achievement InfographicHigher Education Student Retention and Achievement Infographic
Higher Education Student Retention and Achievement Infographic
 
Government Data Breaches: An Inside Job? [Infographic]
Government Data Breaches: An Inside Job? [Infographic]Government Data Breaches: An Inside Job? [Infographic]
Government Data Breaches: An Inside Job? [Infographic]
 
26 Reasons You Need an MPS Assessment
26 Reasons You Need an MPS Assessment26 Reasons You Need an MPS Assessment
26 Reasons You Need an MPS Assessment
 
Four Necessities for Your Change Management Journey (Infographic)
Four Necessities for Your Change Management Journey (Infographic)Four Necessities for Your Change Management Journey (Infographic)
Four Necessities for Your Change Management Journey (Infographic)
 
Work is Not a Place Anymore
Work is Not a Place AnymoreWork is Not a Place Anymore
Work is Not a Place Anymore
 
Think you’re secure? You May Be Surprised
Think you’re secure? You May Be SurprisedThink you’re secure? You May Be Surprised
Think you’re secure? You May Be Surprised
 
Generating Revenue and Reducing Costs in Higher Education
Generating Revenue and Reducing Costs in Higher EducationGenerating Revenue and Reducing Costs in Higher Education
Generating Revenue and Reducing Costs in Higher Education
 
Information Security
Information SecurityInformation Security
Information Security
 
Business Goes Mobile
Business Goes MobileBusiness Goes Mobile
Business Goes Mobile
 
Workflow and The True Value of Managed Print Services
Workflow and The True Value of Managed Print ServicesWorkflow and The True Value of Managed Print Services
Workflow and The True Value of Managed Print Services
 
Change is good...when you manage it properly.
Change is good...when you manage it properly.Change is good...when you manage it properly.
Change is good...when you manage it properly.
 

Último

MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRLMONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRLSeo
 
Understanding the Pakistan Budgeting Process: Basics and Key Insights
Understanding the Pakistan Budgeting Process: Basics and Key InsightsUnderstanding the Pakistan Budgeting Process: Basics and Key Insights
Understanding the Pakistan Budgeting Process: Basics and Key Insightsseri bangash
 
Cracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptxCracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptxWorkforce Group
 
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Dipal Arora
 
Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Neil Kimberley
 
Pharma Works Profile of Karan Communications
Pharma Works Profile of Karan CommunicationsPharma Works Profile of Karan Communications
Pharma Works Profile of Karan Communicationskarancommunications
 
7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...Paul Menig
 
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...Lviv Startup Club
 
Monthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxMonthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxAndy Lambert
 
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesMysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesDipal Arora
 
Call Girls In Holiday Inn Express Gurugram➥99902@11544 ( Best price)100% Genu...
Call Girls In Holiday Inn Express Gurugram➥99902@11544 ( Best price)100% Genu...Call Girls In Holiday Inn Express Gurugram➥99902@11544 ( Best price)100% Genu...
Call Girls In Holiday Inn Express Gurugram➥99902@11544 ( Best price)100% Genu...lizamodels9
 
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptxB.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptxpriyanshujha201
 
9599632723 Top Call Girls in Delhi at your Door Step Available 24x7 Delhi
9599632723 Top Call Girls in Delhi at your Door Step Available 24x7 Delhi9599632723 Top Call Girls in Delhi at your Door Step Available 24x7 Delhi
9599632723 Top Call Girls in Delhi at your Door Step Available 24x7 DelhiCall Girls in Delhi
 
Event mailer assignment progress report .pdf
Event mailer assignment progress report .pdfEvent mailer assignment progress report .pdf
Event mailer assignment progress report .pdftbatkhuu1
 
The Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case studyThe Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case studyEthan lee
 
Unlocking the Secrets of Affiliate Marketing.pdf
Unlocking the Secrets of Affiliate Marketing.pdfUnlocking the Secrets of Affiliate Marketing.pdf
Unlocking the Secrets of Affiliate Marketing.pdfOnline Income Engine
 
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...anilsa9823
 
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...amitlee9823
 

Último (20)

MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRLMONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
 
Understanding the Pakistan Budgeting Process: Basics and Key Insights
Understanding the Pakistan Budgeting Process: Basics and Key InsightsUnderstanding the Pakistan Budgeting Process: Basics and Key Insights
Understanding the Pakistan Budgeting Process: Basics and Key Insights
 
Cracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptxCracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptx
 
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
 
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabiunwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
 
Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023
 
Pharma Works Profile of Karan Communications
Pharma Works Profile of Karan CommunicationsPharma Works Profile of Karan Communications
Pharma Works Profile of Karan Communications
 
7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...
 
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
 
Monthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxMonthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptx
 
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesMysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
 
Forklift Operations: Safety through Cartoons
Forklift Operations: Safety through CartoonsForklift Operations: Safety through Cartoons
Forklift Operations: Safety through Cartoons
 
Call Girls In Holiday Inn Express Gurugram➥99902@11544 ( Best price)100% Genu...
Call Girls In Holiday Inn Express Gurugram➥99902@11544 ( Best price)100% Genu...Call Girls In Holiday Inn Express Gurugram➥99902@11544 ( Best price)100% Genu...
Call Girls In Holiday Inn Express Gurugram➥99902@11544 ( Best price)100% Genu...
 
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptxB.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
 
9599632723 Top Call Girls in Delhi at your Door Step Available 24x7 Delhi
9599632723 Top Call Girls in Delhi at your Door Step Available 24x7 Delhi9599632723 Top Call Girls in Delhi at your Door Step Available 24x7 Delhi
9599632723 Top Call Girls in Delhi at your Door Step Available 24x7 Delhi
 
Event mailer assignment progress report .pdf
Event mailer assignment progress report .pdfEvent mailer assignment progress report .pdf
Event mailer assignment progress report .pdf
 
The Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case studyThe Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case study
 
Unlocking the Secrets of Affiliate Marketing.pdf
Unlocking the Secrets of Affiliate Marketing.pdfUnlocking the Secrets of Affiliate Marketing.pdf
Unlocking the Secrets of Affiliate Marketing.pdf
 
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
 
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
 

Beyond the PC: Combating Unmanaged Threats Security

  • 1. BEYOND THE PC – COMBATING UNMANAGED THREATS June 12th, 2013
  • 2. View the webinar replay here: https://www.brainshark.com/xerox/vu?pi=zIDz6kmucz62tqz0
  • 3. Watch this video here: http://a400.g.akamai.net/7/400/14595/v0001/xeroxwebcast.download.akamai.com/14595/ TEMP/201306/Computer_Hacking-Cracking_down_on_cyber_crime-clip1.mp4
  • 4. TODAY’S PROGRAM • CISO Insights – Mark Leary, Chief Information Security Officer, Xerox • Solutions: Managed Print Services and ConnectKey™ – Karl Dueland, VP Solutions Delivery Unit, Xerox • Protecting Your Network – John Hartman, Client Executive, Cisco • Embedded Security, Smarter Security – Brian Kenyon, Chief Technology Officer, McAfee
  • 5. INSIGHTS Mark Leary Chief Information Security Officer Xerox
  • 6. THE “INTERNET OF THINGS” It has arrived….and so have huge security issues…. – Network and protocol security – Data privacy and security – Identity – Trust population with Internet access in 2015 75% devices connected to the Internet in 2015 6B devices connected to the Internet in 2020 30B
  • 7. A “THING” CALLED A MFP… 3.4MILLION businesses that experienced a printer-related data breach companies without a secure print strategy 65% companies have a secure print initiative 22% 63%
  • 8. COMMON MFP SECURITY THREATS • Poor mobile device management • Weak MFP wireless access control • Poor VPN remote access controls • Poor Web-based remote access controls • Weak identity and access management • MFP hardware component weaknesses • MFP embedded software weaknesses • Poor partner/contractor/consultant access • Poor physical access to MFPs • Poor MFP system and application access • Poor MFP software management controls REMOTE ACCESS PROXIMITY INSIDER THREAT SUPPLY CHAIN
  • 9. QUESTIONS TO ASK 1) Do we have an understanding of our business processes that involve document management and printing? 2) What threats are targeting our IT environment and particularly MFPs? 3) Are our policies addressing MFP information security still relevant to protect the business? 4) Are our MFPs correctly configured to prevent cyber attacks? 5) Do we have visibility into our IT environment to identify devices and determine normal behavior from abnormal? 6) Are we incorporating our customers, partners, and vendors into our IT security operating model?
  • 10. A CYCLE OF CONTINUOUS VALUE Document Outsourcing IT Outsourcing Business Process Outsourcing Sustainability Cost Savings Productivity Security Innovation Insight Mobility Managed Print Services and Technology Secure and Integrate Automate and Simplify Assess and Optimize
  • 11. SOLUTIONS: MANAGED PRINT SERVICES AND CONNECTKEY™ Karl Dueland, Vice President, Solutions Delivery Unit, Xerox
  • 12. STARTING POINT: SECURE TECHNOLOGY • An ecosystem built into new Xerox MFPs • Offering flexibility, coherency and commonality • A complete refresh of key office products • Integrated with Managed Print Services 8700,8900 7220,7225 7800 5800 9300+ ConnectKeyTM
  • 13. LEADERSHIP SECURITY: MULTILAYERED APPROACH Network Management Consoles • Simple email alerts • Xerox Device Manager • McAfee ePolicy Orchestrator TrustSec Access Protection Xerox MFP User Endpoints
  • 14. Watch this video here: http://a400.g.akamai.net/7/400/14595/v0001/xeroxwebcast.download.akamai.com/14595/ TEMP/201306/09-Security_low.mp4
  • 16. TOP OF MIND SECURITY CONCERNS • How do I classify so many devices coming onto my network? • How do I allow suppliers and contractors to collaborate securely? • Do we have control over devices connecting to our applications & data in the DC? • Virtual Machine Sprawl! How should I manage security for all of those VMs we are being asked to provision everyday? • My critical services are still running on physical servers. Do I maintain separate policies?
  • 17. All-in-One Enterprise Policy Control CISCO IDENTITY SERVICES ENGINE (ISE) Who What Where When How Virtual machine client, IP device, guest, employee, and remote user Cisco® ISE WIRED WIRELESS VPN Business-Relevant Policies Security Policy Attributes IDENTITY CONTEXT
  • 18. EMBEDDED SECURITY, SMARTER SECURITY Brian Kenyon, Chief Technology Officer, McAfee
  • 20. THE DYNAMICS OF WHITELISTING Black Grey White DYNAMIC STATIC MAC NetBook Consumer PC VDI Smartphone Mobile Phone REPUTATION-BASED Medical Devices SCADA Systems Servers Point of Sale ATMs Kiosks COE Desktop Smart Meter MFP
  • 21. Watch this video here: http://www.youtube.com/watch?v=XbQowo1ForM
  • 22. Sustainability Cost Savings Productivity Security Innovation Insight Mobility Xerox Managed Print Services and Technology Secure and Integrate Automate and Simplify Assess and Optimize MANAGING PRINT SECURELY Sustainability • Manage power consumption with Cisco EnergyWise • Earth Smart Print Drivers Employee Productivity & Mobility • Scan to Cloud / SharePoint • Print from / to anywhere • Open API for custom workflow integration Security • McAfee embedded security & whitelisting • Cisco TrustSec – secure print image overwrite & encryption Cost Savings • Reduce wasteful printing with default settings • Card access authentication
  • 23. Watch this video here: http://www.youtube.com/watch?v=_05x6fWtREQ
  • 24. OPEN FOR QUESTIONS • Please press *1 for the Operator to ask a questions • Or use the Q&A feature in Live Meeting to submit a question
  • 25. THANK YOU FOR JOINING US • www.xerox.com/security • Chief Optimist Magazine – More insights and innovative ideas from the newest issue focused on security. • iPad edition: “Chief Optimist” on App Store • PC edition: Xerox.com/optimist • Focus Forward Events – Explore expert commentary • XeroxFocusForward.com