SlideShare una empresa de Scribd logo
1 de 31
Descargar para leer sin conexión
Redefining Security for the Nomadic Workforce
                November 28, 2012
Webcast Logistics




        To send us questions during the sessions:
            •  Type the question in the Q&A section provided in
               WebEx. We will answer questions at the end of the
               webcast.

        Any Technical Issues?
      	
  



           •  Email: martin@opendns.com




#2ŸŸ 28-Nov-12
Agenda



          Redefining Security for the Nomadic Worker
          Dan Hubbard, CTO, OpenDNS
       	
  
       	
  
       	
  

          Challenges Of Existing Technologies
          Dan Hubbard, CTO, OpenDNS
       	
  
       	
  
       	
  

         Introducing Umbrella
         David Ulevitch, CEO and Founder, OpenDNS
       	
  
       	
  
       	
  

          Lessons Learned & Deployment Experience
       	
  


          Randy Raw, Network Security Director, Veterans United Home
          Loans
       	
  
       	
  
       	
  

          Q&A Session

#3ŸŸ 28-Nov-12
Speakers




              Dan Hubbard   David Ulevitch    Randy Raw
              OpenDNS       OpenDNS           Veterans United Home Loans
              CTO           Founder and CEO   Network Security Director




#4ŸŸ 28-Nov-12
Redefining Security for the Nomadic Worker




                                        Dan Hubbard
                                       CTO, OpenDNS



#5ŸŸ 28-Nov-12
The way we work has changed…



                   OLD-SCHOOL   THE NEW REALITY




#6ŸŸ 28-Nov-12
And so have the threats…


 BYOD and nomadic workers have
 introduced new challenges




http://blog.opendns.com/2012/10/16/cloud-security-alliance-top-threats-to-mobile-computing/

#7ŸŸ 28-Nov-12
#8ŸŸ 28-Nov-12
#9ŸŸ 28-Nov-12
…as a result, IT is losing visibility and control




  f10   28-Nov-12                                   UMBRELL
Challenges of Existing
                   Technologies


#11 ŸŸ 28-
Nov-12
Current solutions fail to measure up




                                       Host-based

                                          IDS



                                        a.          Host-based
                                                       FW
                                         Netwo
                                         Acooss
                                         Control




#12 • :28-
Nov-12
                                                                 U B EL
                                                                  MRL
Current approaches leave mobile devices unprotected


                       Existing solutions are
                      only designed to protect
                       network perimeter….




                                                                        Internet
                                            	
  
                                            	
  
                                            	
  
                                            	
  


                                            	
  
                                                      Direct-to-Net
                                            	
  
                                              …Leaving mobile devices
                                              and nomadic users
                                              completely unprotected




#13 ŸŸ 28-
Nov-12
InfoSec is undergoing a major transition


   Device Diversity
  	
  
  	
  
   We see hundreds of thousands of blocked requests that are connecting to
   malware, botnets, and phishing sites that are “mobile”.




#14 ŸŸ 28-
Nov-12
Existing technology issues



Companies are struggling
    •  Loss of visibility                                    Hardware          Software
                                                               Cost              Cost
    •  Loss of control
    •  Increased costs
                                                 Data                                      Software
    •  A changing threat landscape            Architecture                                Functionality



Incumbents are struggling                                               TCO                 Software
                                              Support and                                  Architecture
   •  Cloud technology transition             Maintenance                                 and Scalability

   •  Legacy business and technology models
                                                               User
                                                             Training             Time to
                                                                              Implementation




#15 ŸŸ 28-
Nov-12
#16 ŸŸ 28-
Nov-12
#17 ŸŸ 28-
Nov-12
Introducing Umbrella




                           David Ulevitch
               CEO and Founder, OpenDNS



#18 ŸŸ 28-
Nov-12
Introducing Umbrella




 11                    U M B RW. A
 9
UMBRELLA: Desktops, laptops, smart devices




                                         Do Not Distribute
UMBRELLA: Security that evolves with how we work




                                          Do Not Distribute
UMBRELLA is…
	
  
	
  
	
  
  •      Device Agnostic: Aim for all smart networked devices.


  •      Simple and Easy: Making complex solutions is easy to deploy and manage is a core
         strength and pre-requisite to effective mobile security.


  •      Disruptive Delivery: 100% subscription, no hardware, priced per user, not per device.


  •      Instant Scalability: No sizing guides, unlimited data and bandwidth, low latency, broad
         breadth with specific and selective depth. “Cloud” from the ground-up, servicing more
         than 50 Billion requests per day globally with zero downtime.


  •      Big Data meets Security: Big Data systems combined with security research algorithms
         to keep ahead of threats.




  #22ŸŸ 28-Nov-12
UMBRELLA: Security for nomadic workers and visibility for IT


                    Any Device
                     Any User
                    Anywhere
                                     14 Global Datacenters




                                       	
  
                                                                    Internet
                                       	
  
                                       	
  
                                       	
  
                                       	
  
                                         •    Malware protection
                                         •    Botnet containment
                                         •    Phishing protection
                                         •    Policy enforcement




#23ŸŸ 28-Nov-12
UMBRELLA: Dashboard




                      Do Not Distribute
UMBRELLA: Provision in minutes




                                 Do Not Distribute
UMBRELLA: Location aware policies	
  
UMBRELLA: Drill down activity search	
  
Lessons Learned and Deployment Experience




                                          Randy Raw
                              Network Security Director



#28ŸŸ 28-Nov-12
About Veterans United Home Loans
           The nation's largest dedicated provider of VA Loans
           Dedicated to making the American dream of homeownership a reality
          for those who so bravely served.
           27 offices
           Distributed across 22 states
           1,200 employees




#29ŸŸ 28-Nov-12
What have we learned?




#13:> • 2&
Nov-1. 2
                        •   U B EL
                             M RL
Q&A and next steps
  Want to try it today?
  Limited offer: $20/year for a single-user license of Umbrella Mobility
	
  


               Visit: www.umbrella.com/umbrella-security-pricing/
	
  
	
  
	
  
  To request a product demo visit: sales@opendns.com




          David Ulevitch             Dan Hubbard                    Randy Raw
          Email: david@opendns.com   Email: dan@opendns.com
          Twitter: @davidu           Twitter: @dhubbard858

#31 ŸŸ 28-
Nov-12

Más contenido relacionado

La actualidad más candente

A GENERIC FRAMEWORK FOR DEVICE PAIRING IN UBIQUITOUS COMPUTING ENVIRONMENTS
A GENERIC FRAMEWORK FOR DEVICE PAIRING IN UBIQUITOUS COMPUTING ENVIRONMENTSA GENERIC FRAMEWORK FOR DEVICE PAIRING IN UBIQUITOUS COMPUTING ENVIRONMENTS
A GENERIC FRAMEWORK FOR DEVICE PAIRING IN UBIQUITOUS COMPUTING ENVIRONMENTS
IJNSA Journal
 
Tech trendnotes
Tech trendnotesTech trendnotes
Tech trendnotes
Studying
 
Egress Switch Datasheet
Egress Switch Datasheet Egress Switch Datasheet
Egress Switch Datasheet
yonifine
 
StoneGate_Конкурс продуктов портала VirtualizationSecurityGroup.Ru_продукт пр...
StoneGate_Конкурс продуктов портала VirtualizationSecurityGroup.Ru_продукт пр...StoneGate_Конкурс продуктов портала VirtualizationSecurityGroup.Ru_продукт пр...
StoneGate_Конкурс продуктов портала VirtualizationSecurityGroup.Ru_продукт пр...
VirtSGR
 
Stealth solution for healthcare
Stealth solution for healthcareStealth solution for healthcare
Stealth solution for healthcare
Peter de Bruijn
 
Trend Micro - 13martie2012
Trend Micro - 13martie2012Trend Micro - 13martie2012
Trend Micro - 13martie2012
Agora Group
 
Trend Micro Dec 6 Toronto VMUG
Trend Micro Dec 6 Toronto VMUGTrend Micro Dec 6 Toronto VMUG
Trend Micro Dec 6 Toronto VMUG
tovmug
 
Enabling High Level Application Development In The Internet Of Things
Enabling High Level Application Development In The Internet Of ThingsEnabling High Level Application Development In The Internet Of Things
Enabling High Level Application Development In The Internet Of Things
Pankesh Patel
 

La actualidad más candente (20)

IT FUTURE 2011 - Présentation d'Intel
IT FUTURE 2011 - Présentation d'IntelIT FUTURE 2011 - Présentation d'Intel
IT FUTURE 2011 - Présentation d'Intel
 
Clavister Csp Sit Group
Clavister Csp Sit GroupClavister Csp Sit Group
Clavister Csp Sit Group
 
Open Cloud System Networking Vision
Open Cloud System Networking VisionOpen Cloud System Networking Vision
Open Cloud System Networking Vision
 
A GENERIC FRAMEWORK FOR DEVICE PAIRING IN UBIQUITOUS COMPUTING ENVIRONMENTS
A GENERIC FRAMEWORK FOR DEVICE PAIRING IN UBIQUITOUS COMPUTING ENVIRONMENTSA GENERIC FRAMEWORK FOR DEVICE PAIRING IN UBIQUITOUS COMPUTING ENVIRONMENTS
A GENERIC FRAMEWORK FOR DEVICE PAIRING IN UBIQUITOUS COMPUTING ENVIRONMENTS
 
Cloud Provisioning
Cloud ProvisioningCloud Provisioning
Cloud Provisioning
 
Bapinger Network Security
Bapinger Network SecurityBapinger Network Security
Bapinger Network Security
 
Wireless Distributed Sensor Networks Verhaert
Wireless Distributed Sensor Networks VerhaertWireless Distributed Sensor Networks Verhaert
Wireless Distributed Sensor Networks Verhaert
 
Tech trendnotes
Tech trendnotesTech trendnotes
Tech trendnotes
 
Egress Switch Datasheet
Egress Switch Datasheet Egress Switch Datasheet
Egress Switch Datasheet
 
Asigra Story
Asigra StoryAsigra Story
Asigra Story
 
Peering Through the Cloud Forrester EMEA 2010
Peering Through the Cloud Forrester EMEA 2010Peering Through the Cloud Forrester EMEA 2010
Peering Through the Cloud Forrester EMEA 2010
 
StoneGate_Конкурс продуктов портала VirtualizationSecurityGroup.Ru_продукт пр...
StoneGate_Конкурс продуктов портала VirtualizationSecurityGroup.Ru_продукт пр...StoneGate_Конкурс продуктов портала VirtualizationSecurityGroup.Ru_продукт пр...
StoneGate_Конкурс продуктов портала VirtualizationSecurityGroup.Ru_продукт пр...
 
Stealth solution for healthcare
Stealth solution for healthcareStealth solution for healthcare
Stealth solution for healthcare
 
What to curate? Preserving and Curating Software-Based Art
What to curate? Preserving and Curating Software-Based ArtWhat to curate? Preserving and Curating Software-Based Art
What to curate? Preserving and Curating Software-Based Art
 
Trend Micro - 13martie2012
Trend Micro - 13martie2012Trend Micro - 13martie2012
Trend Micro - 13martie2012
 
Take Control of End User Security
Take Control of End User SecurityTake Control of End User Security
Take Control of End User Security
 
Trend Micro Dec 6 Toronto VMUG
Trend Micro Dec 6 Toronto VMUGTrend Micro Dec 6 Toronto VMUG
Trend Micro Dec 6 Toronto VMUG
 
I GOvirtual En Brochure
I GOvirtual En BrochureI GOvirtual En Brochure
I GOvirtual En Brochure
 
Enabling High Level Application Development In The Internet Of Things
Enabling High Level Application Development In The Internet Of ThingsEnabling High Level Application Development In The Internet Of Things
Enabling High Level Application Development In The Internet Of Things
 
The next generation ethernet gangster (part 3)
The next generation ethernet gangster (part 3)The next generation ethernet gangster (part 3)
The next generation ethernet gangster (part 3)
 

Destacado

OISF: Regular Expressions (Regex) Overview
OISF: Regular Expressions (Regex) OverviewOISF: Regular Expressions (Regex) Overview
OISF: Regular Expressions (Regex) Overview
ThreatReel Podcast
 
(ISC)2 Cincinnati Tri-State Chapter: Phishing Forensics - Is it just suspicio...
(ISC)2 Cincinnati Tri-State Chapter: Phishing Forensics - Is it just suspicio...(ISC)2 Cincinnati Tri-State Chapter: Phishing Forensics - Is it just suspicio...
(ISC)2 Cincinnati Tri-State Chapter: Phishing Forensics - Is it just suspicio...
ThreatReel Podcast
 

Destacado (20)

DNS High-Availability Tools - Open-Source Load Balancing Solutions
DNS High-Availability Tools - Open-Source Load Balancing SolutionsDNS High-Availability Tools - Open-Source Load Balancing Solutions
DNS High-Availability Tools - Open-Source Load Balancing Solutions
 
Tcp udp
Tcp udpTcp udp
Tcp udp
 
Cyber Security # Lec 2
Cyber Security # Lec 2Cyber Security # Lec 2
Cyber Security # Lec 2
 
Social Networks And Phishing
Social Networks And PhishingSocial Networks And Phishing
Social Networks And Phishing
 
Cyber crime & security
Cyber crime & securityCyber crime & security
Cyber crime & security
 
Cisco Connect Toronto 2017 - Anatomy-of-attack
Cisco Connect Toronto 2017 - Anatomy-of-attackCisco Connect Toronto 2017 - Anatomy-of-attack
Cisco Connect Toronto 2017 - Anatomy-of-attack
 
Dns Hardening Linux Os
Dns Hardening   Linux OsDns Hardening   Linux Os
Dns Hardening Linux Os
 
OISF: Regular Expressions (Regex) Overview
OISF: Regular Expressions (Regex) OverviewOISF: Regular Expressions (Regex) Overview
OISF: Regular Expressions (Regex) Overview
 
Phishing Scams: 8 Helpful Tips to Keep You Safe
Phishing Scams: 8 Helpful Tips to Keep You SafePhishing Scams: 8 Helpful Tips to Keep You Safe
Phishing Scams: 8 Helpful Tips to Keep You Safe
 
How to send DNS over anything encrypted
How to send DNS over anything encryptedHow to send DNS over anything encrypted
How to send DNS over anything encrypted
 
Microsoft Cyber Security IT-Camp
Microsoft Cyber Security IT-CampMicrosoft Cyber Security IT-Camp
Microsoft Cyber Security IT-Camp
 
Windows Server 2016 Webinar
Windows Server 2016 WebinarWindows Server 2016 Webinar
Windows Server 2016 Webinar
 
(ISC)2 Cincinnati Tri-State Chapter: Phishing Forensics - Is it just suspicio...
(ISC)2 Cincinnati Tri-State Chapter: Phishing Forensics - Is it just suspicio...(ISC)2 Cincinnati Tri-State Chapter: Phishing Forensics - Is it just suspicio...
(ISC)2 Cincinnati Tri-State Chapter: Phishing Forensics - Is it just suspicio...
 
Cisco Connect Toronto 2017 - Accelerating Incident Response in Organizations...
Cisco Connect Toronto  2017 - Accelerating Incident Response in Organizations...Cisco Connect Toronto  2017 - Accelerating Incident Response in Organizations...
Cisco Connect Toronto 2017 - Accelerating Incident Response in Organizations...
 
Role of DNS in Botnet Command and Control
Role of DNS in Botnet Command and ControlRole of DNS in Botnet Command and Control
Role of DNS in Botnet Command and Control
 
Symantec (ISTR) Internet Security Threat Report Volume 22
Symantec (ISTR) Internet Security Threat Report Volume 22Symantec (ISTR) Internet Security Threat Report Volume 22
Symantec (ISTR) Internet Security Threat Report Volume 22
 
Scripting and automation with the Men & Mice Suite
Scripting and automation with the Men & Mice SuiteScripting and automation with the Men & Mice Suite
Scripting and automation with the Men & Mice Suite
 
DerbyCon 7.0 Legacy: Regular Expressions (Regex) Overview
DerbyCon 7.0 Legacy: Regular Expressions (Regex) OverviewDerbyCon 7.0 Legacy: Regular Expressions (Regex) Overview
DerbyCon 7.0 Legacy: Regular Expressions (Regex) Overview
 
Comodo Multi Domain SSL Certificate: Key Features by CheapSSLsecurity
Comodo Multi Domain SSL Certificate: Key Features by CheapSSLsecurityComodo Multi Domain SSL Certificate: Key Features by CheapSSLsecurity
Comodo Multi Domain SSL Certificate: Key Features by CheapSSLsecurity
 
Cisco umbrella overview
Cisco umbrella overviewCisco umbrella overview
Cisco umbrella overview
 

Similar a Umbrella Webcast: Redefining Security for the Nomadic Worker

Using NetFlow to Streamline Security Analysis and Response to Cyber Threats
Using NetFlow to Streamline Security Analysis and Response to Cyber ThreatsUsing NetFlow to Streamline Security Analysis and Response to Cyber Threats
Using NetFlow to Streamline Security Analysis and Response to Cyber Threats
Emulex Corporation
 
Mikehall FutureWorld 2010 - enabling connectivity
Mikehall FutureWorld 2010 - enabling connectivityMikehall FutureWorld 2010 - enabling connectivity
Mikehall FutureWorld 2010 - enabling connectivity
Microsoft Windows Embedded
 
Walking through the fog (computing) - Keynote talk at Italian Networking Work...
Walking through the fog (computing) - Keynote talk at Italian Networking Work...Walking through the fog (computing) - Keynote talk at Italian Networking Work...
Walking through the fog (computing) - Keynote talk at Italian Networking Work...
FBK CREATE-NET
 
Ixia anue maximum roi from your existing toolsets
Ixia anue   maximum roi from your existing toolsetsIxia anue   maximum roi from your existing toolsets
Ixia anue maximum roi from your existing toolsets
responsedatacomms
 

Similar a Umbrella Webcast: Redefining Security for the Nomadic Worker (20)

Cohesive SDN Summit Presentation: OpenFlow is SDN, SDN is not OpenFlow
Cohesive SDN Summit Presentation: OpenFlow is SDN, SDN is not OpenFlowCohesive SDN Summit Presentation: OpenFlow is SDN, SDN is not OpenFlow
Cohesive SDN Summit Presentation: OpenFlow is SDN, SDN is not OpenFlow
 
Dynamic Software Defined Network Infrastructure Test Bed at Marist College
Dynamic Software Defined Network Infrastructure Test Bed at Marist CollegeDynamic Software Defined Network Infrastructure Test Bed at Marist College
Dynamic Software Defined Network Infrastructure Test Bed at Marist College
 
Using NetFlow to Streamline Security Analysis and Response to Cyber Threats
Using NetFlow to Streamline Security Analysis and Response to Cyber ThreatsUsing NetFlow to Streamline Security Analysis and Response to Cyber Threats
Using NetFlow to Streamline Security Analysis and Response to Cyber Threats
 
Mikehall FutureWorld 2010 - enabling connectivity
Mikehall FutureWorld 2010 - enabling connectivityMikehall FutureWorld 2010 - enabling connectivity
Mikehall FutureWorld 2010 - enabling connectivity
 
Breaking the Edge -- A Journey Through Cloud, Edge and Fog Computing
Breaking the Edge -- A Journey Through Cloud, Edge and Fog ComputingBreaking the Edge -- A Journey Through Cloud, Edge and Fog Computing
Breaking the Edge -- A Journey Through Cloud, Edge and Fog Computing
 
White Paper: Securing Nomadic Workforce
White Paper: Securing Nomadic WorkforceWhite Paper: Securing Nomadic Workforce
White Paper: Securing Nomadic Workforce
 
infraxstructure: Emil Gągała "Ludzie, procesy, technika – czy wirtualizacja ...
infraxstructure: Emil Gągała  "Ludzie, procesy, technika – czy wirtualizacja ...infraxstructure: Emil Gągała  "Ludzie, procesy, technika – czy wirtualizacja ...
infraxstructure: Emil Gągała "Ludzie, procesy, technika – czy wirtualizacja ...
 
Application-Aware Network Performance Management
Application-Aware Network Performance ManagementApplication-Aware Network Performance Management
Application-Aware Network Performance Management
 
Towards the extinction of mega data centres? To which extent should the Clou...
 Towards the extinction of mega data centres? To which extent should the Clou... Towards the extinction of mega data centres? To which extent should the Clou...
Towards the extinction of mega data centres? To which extent should the Clou...
 
NEtwork Security Admin Portal
NEtwork Security Admin PortalNEtwork Security Admin Portal
NEtwork Security Admin Portal
 
Conférence ARBOR ACSS 2018
Conférence ARBOR ACSS 2018Conférence ARBOR ACSS 2018
Conférence ARBOR ACSS 2018
 
Nas nie zaatakują!
Nas nie zaatakują!Nas nie zaatakują!
Nas nie zaatakują!
 
Introduction to roof computing by Nishant Krishna
Introduction to roof computing by Nishant KrishnaIntroduction to roof computing by Nishant Krishna
Introduction to roof computing by Nishant Krishna
 
Technology & Policy Interaction Panel at Inform[ED] IoT Security
Technology & Policy Interaction Panel at Inform[ED] IoT SecurityTechnology & Policy Interaction Panel at Inform[ED] IoT Security
Technology & Policy Interaction Panel at Inform[ED] IoT Security
 
Sdn primer pdf
Sdn primer pdfSdn primer pdf
Sdn primer pdf
 
Cloudcomputing Nivo Consultancy 26 Mei 2009 Versie 1
Cloudcomputing Nivo Consultancy 26 Mei 2009 Versie 1Cloudcomputing Nivo Consultancy 26 Mei 2009 Versie 1
Cloudcomputing Nivo Consultancy 26 Mei 2009 Versie 1
 
IoT Design Principles
IoT Design PrinciplesIoT Design Principles
IoT Design Principles
 
Walking through the fog (computing) - Keynote talk at Italian Networking Work...
Walking through the fog (computing) - Keynote talk at Italian Networking Work...Walking through the fog (computing) - Keynote talk at Italian Networking Work...
Walking through the fog (computing) - Keynote talk at Italian Networking Work...
 
ICRTITCS-2012 Conference Publication
ICRTITCS-2012 Conference PublicationICRTITCS-2012 Conference Publication
ICRTITCS-2012 Conference Publication
 
Ixia anue maximum roi from your existing toolsets
Ixia anue   maximum roi from your existing toolsetsIxia anue   maximum roi from your existing toolsets
Ixia anue maximum roi from your existing toolsets
 

Último

EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Earley Information Science
 

Último (20)

Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 

Umbrella Webcast: Redefining Security for the Nomadic Worker

  • 1. Redefining Security for the Nomadic Workforce November 28, 2012
  • 2. Webcast Logistics To send us questions during the sessions: •  Type the question in the Q&A section provided in WebEx. We will answer questions at the end of the webcast. Any Technical Issues?   •  Email: martin@opendns.com #2ŸŸ 28-Nov-12
  • 3. Agenda Redefining Security for the Nomadic Worker Dan Hubbard, CTO, OpenDNS       Challenges Of Existing Technologies Dan Hubbard, CTO, OpenDNS       Introducing Umbrella David Ulevitch, CEO and Founder, OpenDNS       Lessons Learned & Deployment Experience   Randy Raw, Network Security Director, Veterans United Home Loans       Q&A Session #3ŸŸ 28-Nov-12
  • 4. Speakers Dan Hubbard David Ulevitch Randy Raw OpenDNS OpenDNS Veterans United Home Loans CTO Founder and CEO Network Security Director #4ŸŸ 28-Nov-12
  • 5. Redefining Security for the Nomadic Worker Dan Hubbard CTO, OpenDNS #5ŸŸ 28-Nov-12
  • 6. The way we work has changed… OLD-SCHOOL THE NEW REALITY #6ŸŸ 28-Nov-12
  • 7. And so have the threats… BYOD and nomadic workers have introduced new challenges http://blog.opendns.com/2012/10/16/cloud-security-alliance-top-threats-to-mobile-computing/ #7ŸŸ 28-Nov-12
  • 10. …as a result, IT is losing visibility and control f10 28-Nov-12 UMBRELL
  • 11. Challenges of Existing Technologies #11 ŸŸ 28- Nov-12
  • 12. Current solutions fail to measure up Host-based IDS a. Host-based FW Netwo Acooss Control #12 • :28- Nov-12 U B EL MRL
  • 13. Current approaches leave mobile devices unprotected Existing solutions are only designed to protect network perimeter…. Internet           Direct-to-Net   …Leaving mobile devices and nomadic users completely unprotected #13 ŸŸ 28- Nov-12
  • 14. InfoSec is undergoing a major transition Device Diversity     We see hundreds of thousands of blocked requests that are connecting to malware, botnets, and phishing sites that are “mobile”. #14 ŸŸ 28- Nov-12
  • 15. Existing technology issues Companies are struggling •  Loss of visibility Hardware Software Cost Cost •  Loss of control •  Increased costs Data Software •  A changing threat landscape Architecture Functionality Incumbents are struggling TCO Software Support and Architecture •  Cloud technology transition Maintenance and Scalability •  Legacy business and technology models User Training Time to Implementation #15 ŸŸ 28- Nov-12
  • 18. Introducing Umbrella David Ulevitch CEO and Founder, OpenDNS #18 ŸŸ 28- Nov-12
  • 19. Introducing Umbrella 11 U M B RW. A 9
  • 20. UMBRELLA: Desktops, laptops, smart devices Do Not Distribute
  • 21. UMBRELLA: Security that evolves with how we work Do Not Distribute
  • 22. UMBRELLA is…       •  Device Agnostic: Aim for all smart networked devices. •  Simple and Easy: Making complex solutions is easy to deploy and manage is a core strength and pre-requisite to effective mobile security. •  Disruptive Delivery: 100% subscription, no hardware, priced per user, not per device. •  Instant Scalability: No sizing guides, unlimited data and bandwidth, low latency, broad breadth with specific and selective depth. “Cloud” from the ground-up, servicing more than 50 Billion requests per day globally with zero downtime. •  Big Data meets Security: Big Data systems combined with security research algorithms to keep ahead of threats. #22ŸŸ 28-Nov-12
  • 23. UMBRELLA: Security for nomadic workers and visibility for IT Any Device Any User Anywhere 14 Global Datacenters   Internet         •  Malware protection •  Botnet containment •  Phishing protection •  Policy enforcement #23ŸŸ 28-Nov-12
  • 24. UMBRELLA: Dashboard Do Not Distribute
  • 25. UMBRELLA: Provision in minutes Do Not Distribute
  • 27. UMBRELLA: Drill down activity search  
  • 28. Lessons Learned and Deployment Experience Randy Raw Network Security Director #28ŸŸ 28-Nov-12
  • 29. About Veterans United Home Loans The nation's largest dedicated provider of VA Loans Dedicated to making the American dream of homeownership a reality for those who so bravely served. 27 offices Distributed across 22 states 1,200 employees #29ŸŸ 28-Nov-12
  • 30. What have we learned? #13:> • 2& Nov-1. 2 • U B EL M RL
  • 31. Q&A and next steps Want to try it today? Limited offer: $20/year for a single-user license of Umbrella Mobility   Visit: www.umbrella.com/umbrella-security-pricing/       To request a product demo visit: sales@opendns.com David Ulevitch Dan Hubbard Randy Raw Email: david@opendns.com Email: dan@opendns.com Twitter: @davidu Twitter: @dhubbard858 #31 ŸŸ 28- Nov-12