SlideShare a Scribd company logo
1 of 20
Download to read offline
CY BERSECURI TY LEA DERS HIP FORUM 2017 | 1
CY BERSECURI TY LEA DERS HIP FORUM 2017 | 2
SECURITY INSIGHTS FOR
MISSION-CRITICAL NETWORKS
Jim Fulton
Sr. Director, Product Marketing, Forcepoint
CY BERSECURI TY LEA DERS HIP FORUM 2017 | 3
Where criticaldata is most valuable– and most
vulnerable
PROTECTING
THE HUMAN POINT
Modern firewallsconnect and protect people and data at the point they come together
– the Human Point
CY BERSECURI TY LEA DERS HIP FORUM 2017 | 4
NETWORK SECURITY HAS INCREASING ROLE IN GOVERNMENT MISSIONS
Optimizing networks
for growth & cost
Handling increasing
encrypted traffic
Reducing breaches/theft
by outsiders & insiders
Reducing overlap,
complexity
Simplifying
complianceand audits
Securing Virtual& Cloud
networks
Cutting TCO burden
Respondingfaster
to emerging threats
Mitigating shortageof
specializedIT expertise
Staying aheadof ever-
shifting perimeter
CY BERSECURI TY LEA DERS HIP FORUM 2017 | 5
CY BERSECURI TY LEA DERS HIP FORUM 2017 | 6
FIELD
OPERATIVES
COMMAND
CENTERS
INTERNATIONAL
PARTNERS
DATACENTERS
CY BERSECURI TY LEA DERS HIP FORUM 2017 | 7
COSTS ARE DRIVEN
BY MANY FACTORS
80%
OF THE
COSTS LIE
BENEATH THE
SURFACE
✖ # of Appliances
✚ Deployment
✚ Installation
✚ Configuration
✚ Updates
✚ Upgrades
✚ Rules
✚ Policies
✚ Signatures
✚ VPN Mesh
✖ # of Appliances
✖ # of Software blades
✖ # of Admins
✖ # of VPN Tunnels
■ Hardware
■ Subscriptions& Licenses
■ Support
THESEARE THE
VISIBLE
COSTS
CY BERSECURI TY LEA DERS HIP FORUM 2017 | 8
NEXT GEN OFFER A MORE-EFFICIENT
FIREWALLS APPROACH
TO CUT INVISIBLE
COSTS
HOW
 Uniform Solutions– Physical,Virtual,Cloud
 Built-in IPS, VPN, NGFW
 Zero-Touch Deployment
 High Availability at Every Level
 WAN Controlwith Low-CostBroadband
 CentralManagement,One-ClickDeployment
 UpgradableSoftware
 Reusable Appliances
CY BERSECURI TY LEA DERS HIP FORUM 2017 | 9
CY BERSECURI TY LEA DERS HIP FORUM 2017 | 10
FIREWALL
CLUSTERING
CY BERSECURI TY LEA DERS HIP FORUM 2017 | 11
UPDATE
POLICIES
UPGRADE
SOFTWARE&
WITHOUTDROPPINGA
SINGLEPACKET
CY BERSECURI TY LEA DERS HIP FORUM 2017 | 12
NETWORK
CLUSTERING
CY BERSECURI TY LEA DERS HIP FORUM 2017 | 13
CY BERSECURI TY LEA DERS HIP FORUM 2017 | 14
HIGH AVAILABILITY FOR MISSION-CRITICAL NETWORKS
ERP BACK UP
VOIP
BROADBAND
MPLS
3/4G
XDSL
SATELLITE
FIBER
CABLEFTP
WEB
NETWORK
CLUSTERING
 Centrally Managed
 Inspected & Encrypted
 Always-on  ControlledBandwidth& Costs
CY BERSECURI TY LEA DERS HIP FORUM 2017 | 15
CY BERSECURI TY LEA DERS HIP FORUM 2017 | 16
SECURITY – STOPPING ATTACKS, BREACHES, THEFT OF DATA
■ VPN
■ User-, app-controls
■ Anti-virus scanning
✚ IPS
✚ Encryptedinspection& privacycontrol
✚ Mission-criticalapplication protection
✚ Anti-botnetdefenses
BASIC NGFW
ADVANCED NGFW
✚ Automation
✚ Policies,Not Rules
✚ Sandboxing
CY BERSECURI TY LEA DERS HIP FORUM 2017 | 17
MODERNSECURITY IS
DYNAMIC
DECRYPTION
ADVANCED
EVASIONDETECTION APPLICATIONPROXIES
SANDBOXING
CY BERSECURI TY LEA DERS HIP FORUM 2017 | 18
MISSION-CRITICAL APPLICATION PROTECTION
NETWORK
Mission-critical
apps & services
STOP
CY BERSECURI TY LEA DERS HIP FORUM 2017 | 19
HOW AGENCIES SHOULD EVALUATE NGFW TECHNOLOGY
Efficiency
Lookfor best centralized management
Sophistication,not complication
Availability
Bestclustering options
Resilience forfirewalls and networks
Security
High-performance IPS,decryption,
VPN Integrated Proxy
Mission Critical
Payback, ROI, downtime and breach data from IDC Research
CY BERSECURI TY LEA DERS HIP FORUM 2017 | 20
THANK YOU

More Related Content

What's hot

What's hot (20)

Web Performance Without Sacrificing Security: Featuring Forrester Guest Speaker
Web Performance Without Sacrificing Security: Featuring Forrester Guest SpeakerWeb Performance Without Sacrificing Security: Featuring Forrester Guest Speaker
Web Performance Without Sacrificing Security: Featuring Forrester Guest Speaker
 
GDPR aneb jak umí Veritas pomoci být v souladu s tímto nařízením
GDPR aneb jak umí Veritas pomoci být v souladu s tímto nařízenímGDPR aneb jak umí Veritas pomoci být v souladu s tímto nařízením
GDPR aneb jak umí Veritas pomoci být v souladu s tímto nařízením
 
Stopping DDoS Attacks in North America
Stopping DDoS Attacks in North AmericaStopping DDoS Attacks in North America
Stopping DDoS Attacks in North America
 
It’s 9AM... Do you know what’s happening on your network?
It’s 9AM... Do you know what’s happening on your network?It’s 9AM... Do you know what’s happening on your network?
It’s 9AM... Do you know what’s happening on your network?
 
Ministry of Foreign Affairs
Ministry of Foreign AffairsMinistry of Foreign Affairs
Ministry of Foreign Affairs
 
Strengthening security posture for modern-age SaaS providers
Strengthening security posture for modern-age SaaS providersStrengthening security posture for modern-age SaaS providers
Strengthening security posture for modern-age SaaS providers
 
Proteja sus datos en cualquier servicio Cloud y Web de forma unificada
Proteja sus datos en cualquier servicio Cloud y Web de forma unificadaProteja sus datos en cualquier servicio Cloud y Web de forma unificada
Proteja sus datos en cualquier servicio Cloud y Web de forma unificada
 
Inteligentní ochrana osobních údajů v procesu digitální transformace
Inteligentní ochrana osobních údajů v procesu digitální transformaceInteligentní ochrana osobních údajů v procesu digitální transformace
Inteligentní ochrana osobních údajů v procesu digitální transformace
 
How to Build a Practical and Cost-Effective Security Strategy
How to Build a Practical and Cost-Effective Security StrategyHow to Build a Practical and Cost-Effective Security Strategy
How to Build a Practical and Cost-Effective Security Strategy
 
Securing Your Cloud Transformation
Securing Your Cloud TransformationSecuring Your Cloud Transformation
Securing Your Cloud Transformation
 
Dinis Cruz (CV) - CISO and Transformation Agent v1.2
Dinis Cruz (CV) - CISO and Transformation Agent v1.2Dinis Cruz (CV) - CISO and Transformation Agent v1.2
Dinis Cruz (CV) - CISO and Transformation Agent v1.2
 
Cisco Live Cancun Collaboration Press
Cisco Live Cancun Collaboration PressCisco Live Cancun Collaboration Press
Cisco Live Cancun Collaboration Press
 
Ntxissacsc5 blue 5-holistic approach to cybersecurity-abu_sadeq
Ntxissacsc5 blue 5-holistic approach to cybersecurity-abu_sadeqNtxissacsc5 blue 5-holistic approach to cybersecurity-abu_sadeq
Ntxissacsc5 blue 5-holistic approach to cybersecurity-abu_sadeq
 
Ntxissacsc5 blue 7-zerotrust more effective approach to security-ed higgins
Ntxissacsc5 blue 7-zerotrust more effective approach to security-ed higginsNtxissacsc5 blue 7-zerotrust more effective approach to security-ed higgins
Ntxissacsc5 blue 7-zerotrust more effective approach to security-ed higgins
 
The 2019 Security Strategy
The 2019 Security StrategyThe 2019 Security Strategy
The 2019 Security Strategy
 
Accelerating Digital Leadership
Accelerating Digital LeadershipAccelerating Digital Leadership
Accelerating Digital Leadership
 
Serverless Security Workflows - cyber talks - 19th nov 2019
Serverless  Security Workflows - cyber talks - 19th nov 2019Serverless  Security Workflows - cyber talks - 19th nov 2019
Serverless Security Workflows - cyber talks - 19th nov 2019
 
Cisco Live Cancun PR Session
Cisco Live Cancun PR SessionCisco Live Cancun PR Session
Cisco Live Cancun PR Session
 
The GDPR and What It Means to You
The GDPR and What It Means to YouThe GDPR and What It Means to You
The GDPR and What It Means to You
 
Why Your Approach To Data Governance Needs a Major Update
Why Your Approach To Data Governance Needs a Major UpdateWhy Your Approach To Data Governance Needs a Major Update
Why Your Approach To Data Governance Needs a Major Update
 

Similar to Security Insights for Mission-Critical Networks

Similar to Security Insights for Mission-Critical Networks (20)

Exhibitor session: Efficient IP
Exhibitor session: Efficient IPExhibitor session: Efficient IP
Exhibitor session: Efficient IP
 
PLNOG15: Session Border Controller – cost effective virtualized and cloud dep...
PLNOG15: Session Border Controller – cost effective virtualized and cloud dep...PLNOG15: Session Border Controller – cost effective virtualized and cloud dep...
PLNOG15: Session Border Controller – cost effective virtualized and cloud dep...
 
Faster to 5G
Faster to 5GFaster to 5G
Faster to 5G
 
Businessday okt 2016 - Xirrus
Businessday okt 2016 - Xirrus Businessday okt 2016 - Xirrus
Businessday okt 2016 - Xirrus
 
Deliver The Latest Wave 2 Wi-Fi as a Service | The Future of Sophisticated Wi...
Deliver The Latest Wave 2 Wi-Fi as a Service | The Future of Sophisticated Wi...Deliver The Latest Wave 2 Wi-Fi as a Service | The Future of Sophisticated Wi...
Deliver The Latest Wave 2 Wi-Fi as a Service | The Future of Sophisticated Wi...
 
Security and services drive data north
Security and services drive data northSecurity and services drive data north
Security and services drive data north
 
Clouding the Networked Society
Clouding the Networked SocietyClouding the Networked Society
Clouding the Networked Society
 
Webinar connectivity vs hybrid networking
Webinar connectivity vs hybrid networkingWebinar connectivity vs hybrid networking
Webinar connectivity vs hybrid networking
 
Network Service Business: Transformation with Service Provider SDN, NFV and C...
Network Service Business: Transformation with Service Provider SDN, NFV and C...Network Service Business: Transformation with Service Provider SDN, NFV and C...
Network Service Business: Transformation with Service Provider SDN, NFV and C...
 
DETENIENDO LOS ATAQUES DDOS CON NSFOCUS
DETENIENDO LOS ATAQUES DDOS CON NSFOCUSDETENIENDO LOS ATAQUES DDOS CON NSFOCUS
DETENIENDO LOS ATAQUES DDOS CON NSFOCUS
 
Netpluz corp presentation 2020
Netpluz corp presentation 2020Netpluz corp presentation 2020
Netpluz corp presentation 2020
 
Cisco Connect Vancouver 2017 - Cisco Meraki -Let Simple Work For You
Cisco Connect Vancouver 2017 - Cisco Meraki -Let Simple Work For YouCisco Connect Vancouver 2017 - Cisco Meraki -Let Simple Work For You
Cisco Connect Vancouver 2017 - Cisco Meraki -Let Simple Work For You
 
Cisco Connect 2018 Malaysia - Programmability and telemetry for future networks
Cisco Connect 2018 Malaysia - Programmability and telemetry for future networksCisco Connect 2018 Malaysia - Programmability and telemetry for future networks
Cisco Connect 2018 Malaysia - Programmability and telemetry for future networks
 
Forcepoint SD-WAN and NGFW + IPS
Forcepoint SD-WAN and NGFW + IPSForcepoint SD-WAN and NGFW + IPS
Forcepoint SD-WAN and NGFW + IPS
 
Nvis, inc. 03 18-2020 - final
Nvis, inc. 03 18-2020 - finalNvis, inc. 03 18-2020 - final
Nvis, inc. 03 18-2020 - final
 
M2M deployments in SDN Enabled IPv6 Networks
M2M deployments in SDN Enabled IPv6 NetworksM2M deployments in SDN Enabled IPv6 Networks
M2M deployments in SDN Enabled IPv6 Networks
 
Innovation Connected
Innovation ConnectedInnovation Connected
Innovation Connected
 
ICC Networking handles BYOD & BYOC
ICC Networking handles BYOD & BYOCICC Networking handles BYOD & BYOC
ICC Networking handles BYOD & BYOC
 
Cisco Connect Toronto 2017 - NFV/SDN Platform for Orchestrating Cloud and vBr...
Cisco Connect Toronto 2017 - NFV/SDN Platform for Orchestrating Cloud and vBr...Cisco Connect Toronto 2017 - NFV/SDN Platform for Orchestrating Cloud and vBr...
Cisco Connect Toronto 2017 - NFV/SDN Platform for Orchestrating Cloud and vBr...
 
Mobile enterprise sept 24 v1
Mobile enterprise sept 24 v1Mobile enterprise sept 24 v1
Mobile enterprise sept 24 v1
 

More from Forcepoint LLC

More from Forcepoint LLC (20)

Rethinking the concept of trust (DoDIIS 2019 presentation)
Rethinking the concept of trust (DoDIIS 2019 presentation)Rethinking the concept of trust (DoDIIS 2019 presentation)
Rethinking the concept of trust (DoDIIS 2019 presentation)
 
Sparking Curiosity to Change Security Behaviors
Sparking Curiosity to Change Security BehaviorsSparking Curiosity to Change Security Behaviors
Sparking Curiosity to Change Security Behaviors
 
Understanding the "Intelligence" in AI
Understanding the "Intelligence" in AIUnderstanding the "Intelligence" in AI
Understanding the "Intelligence" in AI
 
Weary Warriors: Reducing the Impact of Wishful Thinking & Fatigue on Informat...
Weary Warriors: Reducing the Impact of Wishful Thinking & Fatigue on Informat...Weary Warriors: Reducing the Impact of Wishful Thinking & Fatigue on Informat...
Weary Warriors: Reducing the Impact of Wishful Thinking & Fatigue on Informat...
 
AI and ML in Cybersecurity
AI and ML in CybersecurityAI and ML in Cybersecurity
AI and ML in Cybersecurity
 
Using Language Modeling to Verify User Identities
Using Language Modeling to Verify User IdentitiesUsing Language Modeling to Verify User Identities
Using Language Modeling to Verify User Identities
 
Driving the successful adoption of Microsoft Office 365
Driving the successful adoption of Microsoft Office 365Driving the successful adoption of Microsoft Office 365
Driving the successful adoption of Microsoft Office 365
 
Securing Beyond the Cloud Generation
Securing Beyond the Cloud GenerationSecuring Beyond the Cloud Generation
Securing Beyond the Cloud Generation
 
Forcepoint Advanced Malware Detection
Forcepoint Advanced Malware DetectionForcepoint Advanced Malware Detection
Forcepoint Advanced Malware Detection
 
Top 5 Information Security Lessons Learned from Transitioning to the Cloud
Top 5 Information Security Lessons Learned from Transitioning to the CloudTop 5 Information Security Lessons Learned from Transitioning to the Cloud
Top 5 Information Security Lessons Learned from Transitioning to the Cloud
 
CASB: Securing your cloud applications
CASB: Securing your cloud applicationsCASB: Securing your cloud applications
CASB: Securing your cloud applications
 
One Year After WannaCry - Has Anything Changed? A Root Cause Analysis of Data...
One Year After WannaCry - Has Anything Changed? A Root Cause Analysis of Data...One Year After WannaCry - Has Anything Changed? A Root Cause Analysis of Data...
One Year After WannaCry - Has Anything Changed? A Root Cause Analysis of Data...
 
GDPR is Here. Now What?
GDPR is Here. Now What?GDPR is Here. Now What?
GDPR is Here. Now What?
 
Addressing Future Risks and Legal Challenges of Insider Threats
Addressing Future Risks and Legal Challenges of Insider ThreatsAddressing Future Risks and Legal Challenges of Insider Threats
Addressing Future Risks and Legal Challenges of Insider Threats
 
A Predictive “Precrime” Approach Requires a Human Focus
A Predictive “Precrime” Approach Requires a Human FocusA Predictive “Precrime” Approach Requires a Human Focus
A Predictive “Precrime” Approach Requires a Human Focus
 
Cyber Convergence, Warfare and You
Cyber Convergence, Warfare and YouCyber Convergence, Warfare and You
Cyber Convergence, Warfare and You
 
Securing the Global Mission: Enabling Effective Information Sharing (DoD MPE-IS)
Securing the Global Mission: Enabling Effective Information Sharing (DoD MPE-IS)Securing the Global Mission: Enabling Effective Information Sharing (DoD MPE-IS)
Securing the Global Mission: Enabling Effective Information Sharing (DoD MPE-IS)
 
Shift the Burden
Shift the BurdenShift the Burden
Shift the Burden
 
Revolutionary, Not Evolutionary
Revolutionary, Not EvolutionaryRevolutionary, Not Evolutionary
Revolutionary, Not Evolutionary
 
Cybersecurity and the Human Psyche
Cybersecurity and the Human PsycheCybersecurity and the Human Psyche
Cybersecurity and the Human Psyche
 

Recently uploaded

Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
 

Recently uploaded (20)

Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Cyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfCyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdf
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKSpring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 

Security Insights for Mission-Critical Networks

  • 1. CY BERSECURI TY LEA DERS HIP FORUM 2017 | 1
  • 2. CY BERSECURI TY LEA DERS HIP FORUM 2017 | 2 SECURITY INSIGHTS FOR MISSION-CRITICAL NETWORKS Jim Fulton Sr. Director, Product Marketing, Forcepoint
  • 3. CY BERSECURI TY LEA DERS HIP FORUM 2017 | 3 Where criticaldata is most valuable– and most vulnerable PROTECTING THE HUMAN POINT Modern firewallsconnect and protect people and data at the point they come together – the Human Point
  • 4. CY BERSECURI TY LEA DERS HIP FORUM 2017 | 4 NETWORK SECURITY HAS INCREASING ROLE IN GOVERNMENT MISSIONS Optimizing networks for growth & cost Handling increasing encrypted traffic Reducing breaches/theft by outsiders & insiders Reducing overlap, complexity Simplifying complianceand audits Securing Virtual& Cloud networks Cutting TCO burden Respondingfaster to emerging threats Mitigating shortageof specializedIT expertise Staying aheadof ever- shifting perimeter
  • 5. CY BERSECURI TY LEA DERS HIP FORUM 2017 | 5
  • 6. CY BERSECURI TY LEA DERS HIP FORUM 2017 | 6 FIELD OPERATIVES COMMAND CENTERS INTERNATIONAL PARTNERS DATACENTERS
  • 7. CY BERSECURI TY LEA DERS HIP FORUM 2017 | 7 COSTS ARE DRIVEN BY MANY FACTORS 80% OF THE COSTS LIE BENEATH THE SURFACE ✖ # of Appliances ✚ Deployment ✚ Installation ✚ Configuration ✚ Updates ✚ Upgrades ✚ Rules ✚ Policies ✚ Signatures ✚ VPN Mesh ✖ # of Appliances ✖ # of Software blades ✖ # of Admins ✖ # of VPN Tunnels ■ Hardware ■ Subscriptions& Licenses ■ Support THESEARE THE VISIBLE COSTS
  • 8. CY BERSECURI TY LEA DERS HIP FORUM 2017 | 8 NEXT GEN OFFER A MORE-EFFICIENT FIREWALLS APPROACH TO CUT INVISIBLE COSTS HOW  Uniform Solutions– Physical,Virtual,Cloud  Built-in IPS, VPN, NGFW  Zero-Touch Deployment  High Availability at Every Level  WAN Controlwith Low-CostBroadband  CentralManagement,One-ClickDeployment  UpgradableSoftware  Reusable Appliances
  • 9. CY BERSECURI TY LEA DERS HIP FORUM 2017 | 9
  • 10. CY BERSECURI TY LEA DERS HIP FORUM 2017 | 10 FIREWALL CLUSTERING
  • 11. CY BERSECURI TY LEA DERS HIP FORUM 2017 | 11 UPDATE POLICIES UPGRADE SOFTWARE& WITHOUTDROPPINGA SINGLEPACKET
  • 12. CY BERSECURI TY LEA DERS HIP FORUM 2017 | 12 NETWORK CLUSTERING
  • 13. CY BERSECURI TY LEA DERS HIP FORUM 2017 | 13
  • 14. CY BERSECURI TY LEA DERS HIP FORUM 2017 | 14 HIGH AVAILABILITY FOR MISSION-CRITICAL NETWORKS ERP BACK UP VOIP BROADBAND MPLS 3/4G XDSL SATELLITE FIBER CABLEFTP WEB NETWORK CLUSTERING  Centrally Managed  Inspected & Encrypted  Always-on  ControlledBandwidth& Costs
  • 15. CY BERSECURI TY LEA DERS HIP FORUM 2017 | 15
  • 16. CY BERSECURI TY LEA DERS HIP FORUM 2017 | 16 SECURITY – STOPPING ATTACKS, BREACHES, THEFT OF DATA ■ VPN ■ User-, app-controls ■ Anti-virus scanning ✚ IPS ✚ Encryptedinspection& privacycontrol ✚ Mission-criticalapplication protection ✚ Anti-botnetdefenses BASIC NGFW ADVANCED NGFW ✚ Automation ✚ Policies,Not Rules ✚ Sandboxing
  • 17. CY BERSECURI TY LEA DERS HIP FORUM 2017 | 17 MODERNSECURITY IS DYNAMIC DECRYPTION ADVANCED EVASIONDETECTION APPLICATIONPROXIES SANDBOXING
  • 18. CY BERSECURI TY LEA DERS HIP FORUM 2017 | 18 MISSION-CRITICAL APPLICATION PROTECTION NETWORK Mission-critical apps & services STOP
  • 19. CY BERSECURI TY LEA DERS HIP FORUM 2017 | 19 HOW AGENCIES SHOULD EVALUATE NGFW TECHNOLOGY Efficiency Lookfor best centralized management Sophistication,not complication Availability Bestclustering options Resilience forfirewalls and networks Security High-performance IPS,decryption, VPN Integrated Proxy Mission Critical Payback, ROI, downtime and breach data from IDC Research
  • 20. CY BERSECURI TY LEA DERS HIP FORUM 2017 | 20 THANK YOU