SlideShare ist ein Scribd-Unternehmen logo
1 von 31
IT Security Solutions from industry leaders
Arturs Filatovs
Regional Sales Director Baltic’s/
Member of the Board Baltics

07.11.2013
The trends in IT Security
innovations
History channel
PHONE E
LISHA
GRAY
AND
ALEXAND
ER
GRAHAM
BELL
MICROWA
VE
OVEN PER
CY
LEBARON
SPENCER

XEROGRAPH
YCHESTER
CARLSON

BARCODE
NORMAN
JOSEPH
WOODLAN
D&BERNA
RD SILVER
ENIAC
COMPUT
ERJOHN
MAUCHLY
AND
JOHN
PRESPER
ECKERT
EBOOKS
MICHAEL
STERN
HART

IPOD TON
Y FADELL

WORLD
WIDE
WEB SIR
TIM
BERNERS
-LEE
From desktop to mobile

We are at point where functionality of desktop
collides with mobility of mobile device.

Mobile IT
On Premises vs...
Cloud
From Wired technologies to...
To Boarderless technologies
Its all about Security
Security ?
• Weak security is not an option!

• Complex Security is not only option!
Top 5 Information Security Trends in 2013
1. Government surveillance
–

The Edward Snowden/NSA issue has been very eyeopening
2. Cloud distrust
–

CompTIA’s new 4th Annual Trends in Cloud Computing
confirmed that the main reason people avoid cloud solutions
was concerns over security.

3. Mobile complexity
–

Not just BYOD and MDM but mobile apps as well. I truly believe
that the lack of control most businesses have over mobile apps
is one of the greatest risks in information security today

4. Minimal visibility
–

This is not because you don’t have the information. It’s there on
your network right now. The problem is a general lack of time,
tools, and expertise in any given IT shop

5. Getting people on our side
–

Employees are the weakest link
Mobile has changed
Bring your ovn Problem
Mobile Security status
Complete Solution for Mobile IT
MOBILE APP
MANAGEMENT
• Scalable storefront for delivery
• Data containerization for DLP

MOBILE DEVICE
MANAGEMENT
• Purpose-built multi-OS security
• Self-service provisioning/config

• Dynamic policy & configuration
• Secure enterprise app persona
• App-specific tunneling
• … for in-house & public apps

• BYOD privacy protection

MOBILE CONTENT
MANAGEMENT

• Certificate-based identity

• Secure content hub on device

• Global scale for cloud & premise

• DLP for email attachments
• Remote SharePoint access
• Secure intranet browsing
Wireless Breaks the Wired Security Model

Wired Security

Layer 7 (Application)
Layer 6 (Presentation)
Layer 5 (Session)
Layer 4 (TCP)
Layer 3 (IP)
Layer 2 (MAC)
Layer 1 (PHY)

Anti-virus/ spyware/ malware/ spam
URL filters, Web proxies, IDS
SSL VPN, Network IDS, Host IDS
Network & Personal Firewalls, IP-SEC VPN
Unprotected
Unprotected
Wireless Security Challenges

•
•
•
•
•

Visibility into Wi-Fi security risks at HQ and remote offices
Understanding which wireless connections pose a genuine threat
Inability to block, locate & remove unauthorized Wi-Fi devices
Limited IT resources and expertise to manage wireless security
Maintain compliance with regulatory and internal security standards
The First Vendor to Offer an 11n
Only an 11n sensor can protect your
Sensor

investment in a/b/g and 11n infrastructure

• 11n rogue threats are here today even if

you only have a/b/g installed
• 11n increases the RF exposure risk
• Laptops now shipping with 11n

Reduce deployment costs by installing 11n
technology now
• Greater range reduces sensor density
• Backward compatibility with existing a/b/g

wireless networks
• No additional deployment costs to

upgrade sensors in 6-12 months
SpectraGuard Product Family

• SpectraGuard Enterprise Server and
Sensors for mid to large organizations
– Server can be delivered on an AirTight
Appliance or a ProCurve ONE Service
Module
– Sensors to support 802.11n and 802.11abg
networks

• SpectraGuard Online
– AirTight SpectraGuard delivered as a service
offering with no capital equipment purchase
required
Operations in The Baltic States
Mobile Security

Gateway Security

Managed Services & Support

Host Security

Network Security
headtechnology Group
Company business card
Founded in 2000, Germany and now covering 33 countries
world wide with 12 regional offices
HQ in Ukraine
Core business – IT Security
Offices in Berlin, Ludwigsburg, Warsaw, Riga, Kiev, Moscow,
St.Petersburg, Kazan, Ekaterinburg, Minsk, Baku, Almaty,
Sofia
More than 80 employees
More than 12 vendors in portfolio
Official distributor (for many cases exclusive) in Eastern
Europe and Asia for number of products / solutions / vendors
Participant of many IT exhibitions, road shows, business
forums, ENISA IT Security Awareness program – local IT
Security evangelist
Headtechnology for Partners
•
•
•
•

• Multilanguage technical, sales and
marketing support
• Product,
Partner
Trainings,
demonstrations, webexes, certifications
etc.
• More than 650 partners world wide

Innovative product portfolio
Partnership programms (Authorized, Bronze,
Silver and Gold)
Partner / Customer protection
International knowledge base
Headtechnology – Latvia /Lithuania / Estonia
• World class IT security
names (best in class)
• Fits
International
laws
regarding IT auditing (EU,
NATO directives)
• Regulation
compliance
(HIPAA, SOX,
BASEL2,
GLBA, PCI, etc.)
• Best Price / Performance
• Close and good relationships
with vendors for years
• Local competence center
Arturs Filatovs
Latvia, Lithuania and Estonia
31 Cesu str. 3 floor,
LV-1012, Riga, Latvia
Phone: +371 674 21 021
eMail: info@headtechnology.lv
Internet: www.headtechnology.lv

Weitere ähnliche Inhalte

Was ist angesagt?

Next-Generation Cybersecurity for the Globally Connected Enterprise with Telos
Next-Generation Cybersecurity for the Globally Connected Enterprise with TelosNext-Generation Cybersecurity for the Globally Connected Enterprise with Telos
Next-Generation Cybersecurity for the Globally Connected Enterprise with Telos
Amazon Web Services
 
Smart Cards & Devices Forum 2013 - Protecting enterprise sensitive informatio...
Smart Cards & Devices Forum 2013 - Protecting enterprise sensitive informatio...Smart Cards & Devices Forum 2013 - Protecting enterprise sensitive informatio...
Smart Cards & Devices Forum 2013 - Protecting enterprise sensitive informatio...
OKsystem
 

Was ist angesagt? (20)

ON THE SECURITY AND PRIVACY OF INTERNET OF THINGS ARCHITECTURES
ON THE SECURITY AND PRIVACY OF INTERNET OF THINGS ARCHITECTURESON THE SECURITY AND PRIVACY OF INTERNET OF THINGS ARCHITECTURES
ON THE SECURITY AND PRIVACY OF INTERNET OF THINGS ARCHITECTURES
 
Iot(security)
Iot(security)Iot(security)
Iot(security)
 
IoT Security and Privacy Considerations
IoT Security and Privacy ConsiderationsIoT Security and Privacy Considerations
IoT Security and Privacy Considerations
 
Internet of things security challenges
Internet of things security challengesInternet of things security challenges
Internet of things security challenges
 
The Internet of Things: Privacy and Security Issues
The Internet of Things: Privacy and Security IssuesThe Internet of Things: Privacy and Security Issues
The Internet of Things: Privacy and Security Issues
 
Privacy and security in IoT
Privacy and security in IoTPrivacy and security in IoT
Privacy and security in IoT
 
Next-Generation Cybersecurity for the Globally Connected Enterprise with Telos
Next-Generation Cybersecurity for the Globally Connected Enterprise with TelosNext-Generation Cybersecurity for the Globally Connected Enterprise with Telos
Next-Generation Cybersecurity for the Globally Connected Enterprise with Telos
 
Application security as crucial to the modern distributed trust model
Application security as crucial to   the modern distributed trust modelApplication security as crucial to   the modern distributed trust model
Application security as crucial to the modern distributed trust model
 
IoT Security, Threats and Challenges By V.P.Prabhakaran
IoT Security, Threats and Challenges By V.P.PrabhakaranIoT Security, Threats and Challenges By V.P.Prabhakaran
IoT Security, Threats and Challenges By V.P.Prabhakaran
 
Iot Security and Privacy at Scale
Iot Security and Privacy at ScaleIot Security and Privacy at Scale
Iot Security and Privacy at Scale
 
IOT Security
IOT SecurityIOT Security
IOT Security
 
Your Thing is Pwned - Security Challenges for the IoT
Your Thing is Pwned - Security Challenges for the IoTYour Thing is Pwned - Security Challenges for the IoT
Your Thing is Pwned - Security Challenges for the IoT
 
A survey in privacy and security in Internet of Things IOT
A survey in privacy and security in Internet of Things IOTA survey in privacy and security in Internet of Things IOT
A survey in privacy and security in Internet of Things IOT
 
Internet of Things Security
Internet of Things SecurityInternet of Things Security
Internet of Things Security
 
Security Aspects in IoT - A Review
Security Aspects in IoT - A Review Security Aspects in IoT - A Review
Security Aspects in IoT - A Review
 
#OSSPARIS19 : The evolving (IoT) security landscape - Gianluca Varisco, Arduino
#OSSPARIS19 : The evolving (IoT) security landscape - Gianluca Varisco, Arduino#OSSPARIS19 : The evolving (IoT) security landscape - Gianluca Varisco, Arduino
#OSSPARIS19 : The evolving (IoT) security landscape - Gianluca Varisco, Arduino
 
Presentation on IOT SECURITY
Presentation on IOT SECURITYPresentation on IOT SECURITY
Presentation on IOT SECURITY
 
Smart Cards & Devices Forum 2013 - Protecting enterprise sensitive informatio...
Smart Cards & Devices Forum 2013 - Protecting enterprise sensitive informatio...Smart Cards & Devices Forum 2013 - Protecting enterprise sensitive informatio...
Smart Cards & Devices Forum 2013 - Protecting enterprise sensitive informatio...
 
Security in the Internet of Things
Security in the Internet of ThingsSecurity in the Internet of Things
Security in the Internet of Things
 
Security and Privacy considerations in Internet of Things
Security and Privacy considerations in Internet of ThingsSecurity and Privacy considerations in Internet of Things
Security and Privacy considerations in Internet of Things
 

Andere mochten auch

Data Security Solutions - Cyber Security & Security Intelligence - @ Lithuani...
Data Security Solutions - Cyber Security & Security Intelligence - @ Lithuani...Data Security Solutions - Cyber Security & Security Intelligence - @ Lithuani...
Data Security Solutions - Cyber Security & Security Intelligence - @ Lithuani...
Andris Soroka
 

Andere mochten auch (18)

2015 Data Security Solutions @SFK - Working and living in digital work of future
2015 Data Security Solutions @SFK - Working and living in digital work of future2015 Data Security Solutions @SFK - Working and living in digital work of future
2015 Data Security Solutions @SFK - Working and living in digital work of future
 
2014 - Digital Era Seminary #1 - Sintija Deruma - Informacijas drosibas profe...
2014 - Digital Era Seminary #1 - Sintija Deruma - Informacijas drosibas profe...2014 - Digital Era Seminary #1 - Sintija Deruma - Informacijas drosibas profe...
2014 - Digital Era Seminary #1 - Sintija Deruma - Informacijas drosibas profe...
 
2014 - DSS - Mobile devices & security overview
2014 - DSS - Mobile devices & security overview2014 - DSS - Mobile devices & security overview
2014 - DSS - Mobile devices & security overview
 
DSS @SFK International Conference - March 2014 - Quantifying Business Value o...
DSS @SFK International Conference - March 2014 - Quantifying Business Value o...DSS @SFK International Conference - March 2014 - Quantifying Business Value o...
DSS @SFK International Conference - March 2014 - Quantifying Business Value o...
 
2015 - The Cloud for Managers @ Riga Business School - DSS - Cloud risks and ...
2015 - The Cloud for Managers @ Riga Business School - DSS - Cloud risks and ...2015 - The Cloud for Managers @ Riga Business School - DSS - Cloud risks and ...
2015 - The Cloud for Managers @ Riga Business School - DSS - Cloud risks and ...
 
2015 - Data Security Solutions @Dienas Bizness Exigen IBM - Business Data Pro...
2015 - Data Security Solutions @Dienas Bizness Exigen IBM - Business Data Pro...2015 - Data Security Solutions @Dienas Bizness Exigen IBM - Business Data Pro...
2015 - Data Security Solutions @Dienas Bizness Exigen IBM - Business Data Pro...
 
DSS ITSEC 2013 Conference 07.11.2013 - ISACA LATVIA IVO IVANOVS
DSS ITSEC 2013 Conference 07.11.2013  - ISACA LATVIA IVO IVANOVSDSS ITSEC 2013 Conference 07.11.2013  - ISACA LATVIA IVO IVANOVS
DSS ITSEC 2013 Conference 07.11.2013 - ISACA LATVIA IVO IVANOVS
 
2014 - Digital Era Seminary #1 - Arnis Puksts - Izmainas ES personas datu regula
2014 - Digital Era Seminary #1 - Arnis Puksts - Izmainas ES personas datu regula2014 - Digital Era Seminary #1 - Arnis Puksts - Izmainas ES personas datu regula
2014 - Digital Era Seminary #1 - Arnis Puksts - Izmainas ES personas datu regula
 
2014 - Digital Era Seminary #1 - Ivo Krievs - Datu drosiba darba vieta
2014 - Digital Era Seminary #1 - Ivo Krievs - Datu drosiba darba vieta2014 - Digital Era Seminary #1 - Ivo Krievs - Datu drosiba darba vieta
2014 - Digital Era Seminary #1 - Ivo Krievs - Datu drosiba darba vieta
 
2014 - Digital Era Seminary #1 - Agnese Bobovica - Datu drosiba veselibas nozare
2014 - Digital Era Seminary #1 - Agnese Bobovica - Datu drosiba veselibas nozare2014 - Digital Era Seminary #1 - Agnese Bobovica - Datu drosiba veselibas nozare
2014 - Digital Era Seminary #1 - Agnese Bobovica - Datu drosiba veselibas nozare
 
Digitālā Ēra 2016 - Ivo Krievs - Likumiskās intereses kā personas datu apstrā...
Digitālā Ēra 2016 - Ivo Krievs - Likumiskās intereses kā personas datu apstrā...Digitālā Ēra 2016 - Ivo Krievs - Likumiskās intereses kā personas datu apstrā...
Digitālā Ēra 2016 - Ivo Krievs - Likumiskās intereses kā personas datu apstrā...
 
WWW.DSS.LV - Data Protection Basics 2015 - DeviceLock
WWW.DSS.LV - Data Protection Basics 2015 - DeviceLock WWW.DSS.LV - Data Protection Basics 2015 - DeviceLock
WWW.DSS.LV - Data Protection Basics 2015 - DeviceLock
 
DSS and Security Intelligence @IBM_Connect_2014_April
DSS and Security Intelligence @IBM_Connect_2014_AprilDSS and Security Intelligence @IBM_Connect_2014_April
DSS and Security Intelligence @IBM_Connect_2014_April
 
Digitālā Ēra 2016 - Aldis Alliks. - Persona. Sabiedrība. NEO.
 Digitālā Ēra 2016 - Aldis Alliks. - Persona. Sabiedrība. NEO. Digitālā Ēra 2016 - Aldis Alliks. - Persona. Sabiedrība. NEO.
Digitālā Ēra 2016 - Aldis Alliks. - Persona. Sabiedrība. NEO.
 
DSS ITSEC 2013 Conference 07.11.2013 -Radware - Protection against DDoS
DSS ITSEC 2013 Conference 07.11.2013 -Radware - Protection against DDoSDSS ITSEC 2013 Conference 07.11.2013 -Radware - Protection against DDoS
DSS ITSEC 2013 Conference 07.11.2013 -Radware - Protection against DDoS
 
Data Security Solutions - Cyber Security & Security Intelligence - @ Lithuani...
Data Security Solutions - Cyber Security & Security Intelligence - @ Lithuani...Data Security Solutions - Cyber Security & Security Intelligence - @ Lithuani...
Data Security Solutions - Cyber Security & Security Intelligence - @ Lithuani...
 
DSS.LV - Principles Of Data Protection - March2015 By Arturs Filatovs
DSS.LV - Principles Of Data Protection - March2015 By Arturs FilatovsDSS.LV - Principles Of Data Protection - March2015 By Arturs Filatovs
DSS.LV - Principles Of Data Protection - March2015 By Arturs Filatovs
 
DSS ITSEC 2013 Conference 07.11.2013 - For your eyes only - Symantec PGP Re-L...
DSS ITSEC 2013 Conference 07.11.2013 - For your eyes only - Symantec PGP Re-L...DSS ITSEC 2013 Conference 07.11.2013 - For your eyes only - Symantec PGP Re-L...
DSS ITSEC 2013 Conference 07.11.2013 - For your eyes only - Symantec PGP Re-L...
 

Ähnlich wie DSS ITSEC 2013 Conference 07.11.2013 - HeadTechnology - IT security trends 2014

Securing your IoT Implementations
Securing your IoT ImplementationsSecuring your IoT Implementations
Securing your IoT Implementations
TechWell
 
Emea Corporate Presentation 0709 Lin
Emea Corporate Presentation 0709 LinEmea Corporate Presentation 0709 Lin
Emea Corporate Presentation 0709 Lin
Joe Sarno
 
OptiCom Company Presentation
OptiCom Company PresentationOptiCom Company Presentation
OptiCom Company Presentation
Vladimir PAVLENKO
 
Infographic: SDN, BYOD and Cloud! Oh my!
Infographic: SDN, BYOD and Cloud! Oh my!Infographic: SDN, BYOD and Cloud! Oh my!
Infographic: SDN, BYOD and Cloud! Oh my!
SolarWinds
 

Ähnlich wie DSS ITSEC 2013 Conference 07.11.2013 - HeadTechnology - IT security trends 2014 (20)

DSS Symantec PGP Encryption Fortress 2014 - ArrowECS - RoadShow Baltics
DSS Symantec PGP Encryption Fortress 2014 - ArrowECS - RoadShow BalticsDSS Symantec PGP Encryption Fortress 2014 - ArrowECS - RoadShow Baltics
DSS Symantec PGP Encryption Fortress 2014 - ArrowECS - RoadShow Baltics
 
Rapid industrial grade IoT prototyping with sierra wireless
Rapid industrial grade IoT prototyping with sierra wirelessRapid industrial grade IoT prototyping with sierra wireless
Rapid industrial grade IoT prototyping with sierra wireless
 
MT81 Keys to Successful Enterprise IoT Initiatives
MT81 Keys to Successful Enterprise IoT InitiativesMT81 Keys to Successful Enterprise IoT Initiatives
MT81 Keys to Successful Enterprise IoT Initiatives
 
[Webinar] Why Security Certification is Crucial for IoT Success
[Webinar] Why Security Certification is Crucial for IoT Success[Webinar] Why Security Certification is Crucial for IoT Success
[Webinar] Why Security Certification is Crucial for IoT Success
 
Developing Interoperable Components for an Open IoT Foundation
Developing Interoperable Components for an Open IoT Foundation Developing Interoperable Components for an Open IoT Foundation
Developing Interoperable Components for an Open IoT Foundation
 
Enterprise secure identity in the cloud with Single Sign On and Strong Authen...
Enterprise secure identity in the cloud with Single Sign On and Strong Authen...Enterprise secure identity in the cloud with Single Sign On and Strong Authen...
Enterprise secure identity in the cloud with Single Sign On and Strong Authen...
 
SecurePass at OpenBrighton
SecurePass at OpenBrightonSecurePass at OpenBrighton
SecurePass at OpenBrighton
 
Nordic IT Security 2014 agenda
Nordic IT Security 2014 agendaNordic IT Security 2014 agenda
Nordic IT Security 2014 agenda
 
Cyber security event
Cyber security eventCyber security event
Cyber security event
 
Secure channels main deck
Secure channels main deckSecure channels main deck
Secure channels main deck
 
IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...
IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...
IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...
 
Efficiency, effectiveness, productivity: Dell Connected Security in action
Efficiency, effectiveness, productivity: Dell Connected Security in actionEfficiency, effectiveness, productivity: Dell Connected Security in action
Efficiency, effectiveness, productivity: Dell Connected Security in action
 
Securing the Internet of Things
Securing the Internet of ThingsSecuring the Internet of Things
Securing the Internet of Things
 
Securing your IoT Implementations
Securing your IoT ImplementationsSecuring your IoT Implementations
Securing your IoT Implementations
 
Market Study on Mobile Authentication
Market Study on Mobile AuthenticationMarket Study on Mobile Authentication
Market Study on Mobile Authentication
 
Emea Corporate Presentation 0709 Lin
Emea Corporate Presentation 0709 LinEmea Corporate Presentation 0709 Lin
Emea Corporate Presentation 0709 Lin
 
OptiCom Company Presentation
OptiCom Company PresentationOptiCom Company Presentation
OptiCom Company Presentation
 
Challenges of the io t v1
Challenges of the io t v1Challenges of the io t v1
Challenges of the io t v1
 
Infographic: SDN, BYOD and Cloud! Oh my!
Infographic: SDN, BYOD and Cloud! Oh my!Infographic: SDN, BYOD and Cloud! Oh my!
Infographic: SDN, BYOD and Cloud! Oh my!
 
Industrial Internet of Things - On the Verge of Exponential Growth
Industrial Internet of Things - On the Verge of Exponential GrowthIndustrial Internet of Things - On the Verge of Exponential Growth
Industrial Internet of Things - On the Verge of Exponential Growth
 

Mehr von Andris Soroka

Mehr von Andris Soroka (20)

Digitala Era 2017 - TransactPro - Normunds Aizstrauts - Maksājumu un finansu ...
Digitala Era 2017 - TransactPro - Normunds Aizstrauts - Maksājumu un finansu ...Digitala Era 2017 - TransactPro - Normunds Aizstrauts - Maksājumu un finansu ...
Digitala Era 2017 - TransactPro - Normunds Aizstrauts - Maksājumu un finansu ...
 
Digitala Era 2017 - Datu Valsts Inspekcija - Lauris Linabergs - Vispārīgā dau...
Digitala Era 2017 - Datu Valsts Inspekcija - Lauris Linabergs - Vispārīgā dau...Digitala Era 2017 - Datu Valsts Inspekcija - Lauris Linabergs - Vispārīgā dau...
Digitala Era 2017 - Datu Valsts Inspekcija - Lauris Linabergs - Vispārīgā dau...
 
Digitala Era 2017 - PMLP - Vilnis Vītoliņš - Gaisa kuģu pasažieru datu apstrā...
Digitala Era 2017 - PMLP - Vilnis Vītoliņš - Gaisa kuģu pasažieru datu apstrā...Digitala Era 2017 - PMLP - Vilnis Vītoliņš - Gaisa kuģu pasažieru datu apstrā...
Digitala Era 2017 - PMLP - Vilnis Vītoliņš - Gaisa kuģu pasažieru datu apstrā...
 
Digitala Era 2017 - BOD LAW - Līva Aleksejeva - LIELIE DATI un personas datu ...
Digitala Era 2017 - BOD LAW - Līva Aleksejeva - LIELIE DATI un personas datu ...Digitala Era 2017 - BOD LAW - Līva Aleksejeva - LIELIE DATI un personas datu ...
Digitala Era 2017 - BOD LAW - Līva Aleksejeva - LIELIE DATI un personas datu ...
 
Digitala Era 2017 - Spridzans Law Office - Anna Vladimirova Krykova - Mobilo ...
Digitala Era 2017 - Spridzans Law Office - Anna Vladimirova Krykova - Mobilo ...Digitala Era 2017 - Spridzans Law Office - Anna Vladimirova Krykova - Mobilo ...
Digitala Era 2017 - Spridzans Law Office - Anna Vladimirova Krykova - Mobilo ...
 
Digitala Era 2017 - ZAB “BULLET” - Ivo Krievs - Vai uz valsti attiecināmi cit...
Digitala Era 2017 - ZAB “BULLET” - Ivo Krievs - Vai uz valsti attiecināmi cit...Digitala Era 2017 - ZAB “BULLET” - Ivo Krievs - Vai uz valsti attiecināmi cit...
Digitala Era 2017 - ZAB “BULLET” - Ivo Krievs - Vai uz valsti attiecināmi cit...
 
Digitala Era 2017 - LSPDSA - Arnis Puksts - Datu aizsardzības speciālists (DPO)
Digitala Era 2017 - LSPDSA - Arnis Puksts - Datu aizsardzības speciālists (DPO)Digitala Era 2017 - LSPDSA - Arnis Puksts - Datu aizsardzības speciālists (DPO)
Digitala Era 2017 - LSPDSA - Arnis Puksts - Datu aizsardzības speciālists (DPO)
 
Digitala Era 2017 - IIZI - Lauris Kļaviņš - GDPR - Kādus izdevumus un riskus ...
Digitala Era 2017 - IIZI - Lauris Kļaviņš - GDPR - Kādus izdevumus un riskus ...Digitala Era 2017 - IIZI - Lauris Kļaviņš - GDPR - Kādus izdevumus un riskus ...
Digitala Era 2017 - IIZI - Lauris Kļaviņš - GDPR - Kādus izdevumus un riskus ...
 
Digitala Era 2017 - E-Risinajumi - Māris Ruķers - Vai ar vienu datu aizsardzī...
Digitala Era 2017 - E-Risinajumi - Māris Ruķers - Vai ar vienu datu aizsardzī...Digitala Era 2017 - E-Risinajumi - Māris Ruķers - Vai ar vienu datu aizsardzī...
Digitala Era 2017 - E-Risinajumi - Māris Ruķers - Vai ar vienu datu aizsardzī...
 
Digitala Era 2017 - Gints Puškundzis - Personas datu apstrādes līgumi
Digitala Era 2017 - Gints Puškundzis - Personas datu apstrādes līgumi Digitala Era 2017 - Gints Puškundzis - Personas datu apstrādes līgumi
Digitala Era 2017 - Gints Puškundzis - Personas datu apstrādes līgumi
 
Digitala Era 2017 - DatuAizsardziba.LV - Agnese Boboviča - Datu aizsardzības ...
Digitala Era 2017 - DatuAizsardziba.LV - Agnese Boboviča - Datu aizsardzības ...Digitala Era 2017 - DatuAizsardziba.LV - Agnese Boboviča - Datu aizsardzības ...
Digitala Era 2017 - DatuAizsardziba.LV - Agnese Boboviča - Datu aizsardzības ...
 
Digitala Era 2017 - NotAKey - Janis Graubins - Mobile technologies for single...
Digitala Era 2017 - NotAKey - Janis Graubins - Mobile technologies for single...Digitala Era 2017 - NotAKey - Janis Graubins - Mobile technologies for single...
Digitala Era 2017 - NotAKey - Janis Graubins - Mobile technologies for single...
 
Digitala Era 2017 - Hermitage Solutions - Gatis Kaušs - Clearswift - Komunikā...
Digitala Era 2017 - Hermitage Solutions - Gatis Kaušs - Clearswift - Komunikā...Digitala Era 2017 - Hermitage Solutions - Gatis Kaušs - Clearswift - Komunikā...
Digitala Era 2017 - Hermitage Solutions - Gatis Kaušs - Clearswift - Komunikā...
 
Digitala Era 2017 - Digital Mind - Leons Mednis - eDiscovery risinājums GDPR ...
Digitala Era 2017 - Digital Mind - Leons Mednis - eDiscovery risinājums GDPR ...Digitala Era 2017 - Digital Mind - Leons Mednis - eDiscovery risinājums GDPR ...
Digitala Era 2017 - Digital Mind - Leons Mednis - eDiscovery risinājums GDPR ...
 
Digitala Era 2017 - ALSO - Artjoms Krūmiņš - Personas datu regulas (EU GDPR) ...
Digitala Era 2017 - ALSO - Artjoms Krūmiņš - Personas datu regulas (EU GDPR) ...Digitala Era 2017 - ALSO - Artjoms Krūmiņš - Personas datu regulas (EU GDPR) ...
Digitala Era 2017 - ALSO - Artjoms Krūmiņš - Personas datu regulas (EU GDPR) ...
 
Digitala Era 2017 - ZAB Skopiņa & Azanda - Jūlija Terjuhana - Tiesības uz dat...
Digitala Era 2017 - ZAB Skopiņa & Azanda - Jūlija Terjuhana - Tiesības uz dat...Digitala Era 2017 - ZAB Skopiņa & Azanda - Jūlija Terjuhana - Tiesības uz dat...
Digitala Era 2017 - ZAB Skopiņa & Azanda - Jūlija Terjuhana - Tiesības uz dat...
 
Digitala Era 2017 - IT Centrs - Agris Krusts - Latvijas iedzīvotāju digitālo ...
Digitala Era 2017 - IT Centrs - Agris Krusts - Latvijas iedzīvotāju digitālo ...Digitala Era 2017 - IT Centrs - Agris Krusts - Latvijas iedzīvotāju digitālo ...
Digitala Era 2017 - IT Centrs - Agris Krusts - Latvijas iedzīvotāju digitālo ...
 
Digitala Era 2017 - DSS.LV - Arturs Filatovs - Datu Aizsardzības Tehnoloģiskā...
Digitala Era 2017 - DSS.LV - Arturs Filatovs - Datu Aizsardzības Tehnoloģiskā...Digitala Era 2017 - DSS.LV - Arturs Filatovs - Datu Aizsardzības Tehnoloģiskā...
Digitala Era 2017 - DSS.LV - Arturs Filatovs - Datu Aizsardzības Tehnoloģiskā...
 
Digitala Era 2017 - DSS.LV - Arturs Filatovs - Mobilitāte un Personas Datu Dr...
Digitala Era 2017 - DSS.LV - Arturs Filatovs - Mobilitāte un Personas Datu Dr...Digitala Era 2017 - DSS.LV - Arturs Filatovs - Mobilitāte un Personas Datu Dr...
Digitala Era 2017 - DSS.LV - Arturs Filatovs - Mobilitāte un Personas Datu Dr...
 
Digitala Era 2017 - DSS.LV - Andris Soroka - Personas datu regulas tehnoloģis...
Digitala Era 2017 - DSS.LV - Andris Soroka - Personas datu regulas tehnoloģis...Digitala Era 2017 - DSS.LV - Andris Soroka - Personas datu regulas tehnoloģis...
Digitala Era 2017 - DSS.LV - Andris Soroka - Personas datu regulas tehnoloģis...
 

Kürzlich hochgeladen

EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Earley Information Science
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
 

Kürzlich hochgeladen (20)

08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 

DSS ITSEC 2013 Conference 07.11.2013 - HeadTechnology - IT security trends 2014

  • 1. IT Security Solutions from industry leaders Arturs Filatovs Regional Sales Director Baltic’s/ Member of the Board Baltics 07.11.2013
  • 2. The trends in IT Security innovations
  • 3. History channel PHONE E LISHA GRAY AND ALEXAND ER GRAHAM BELL MICROWA VE OVEN PER CY LEBARON SPENCER XEROGRAPH YCHESTER CARLSON BARCODE NORMAN JOSEPH WOODLAN D&BERNA RD SILVER
  • 5. From desktop to mobile We are at point where functionality of desktop collides with mobility of mobile device. Mobile IT
  • 6.
  • 11. Its all about Security
  • 12. Security ? • Weak security is not an option! • Complex Security is not only option!
  • 13. Top 5 Information Security Trends in 2013 1. Government surveillance – The Edward Snowden/NSA issue has been very eyeopening
  • 14. 2. Cloud distrust – CompTIA’s new 4th Annual Trends in Cloud Computing confirmed that the main reason people avoid cloud solutions was concerns over security. 3. Mobile complexity – Not just BYOD and MDM but mobile apps as well. I truly believe that the lack of control most businesses have over mobile apps is one of the greatest risks in information security today 4. Minimal visibility – This is not because you don’t have the information. It’s there on your network right now. The problem is a general lack of time, tools, and expertise in any given IT shop 5. Getting people on our side – Employees are the weakest link
  • 16. Bring your ovn Problem
  • 17.
  • 19.
  • 20.
  • 21. Complete Solution for Mobile IT MOBILE APP MANAGEMENT • Scalable storefront for delivery • Data containerization for DLP MOBILE DEVICE MANAGEMENT • Purpose-built multi-OS security • Self-service provisioning/config • Dynamic policy & configuration • Secure enterprise app persona • App-specific tunneling • … for in-house & public apps • BYOD privacy protection MOBILE CONTENT MANAGEMENT • Certificate-based identity • Secure content hub on device • Global scale for cloud & premise • DLP for email attachments • Remote SharePoint access • Secure intranet browsing
  • 22. Wireless Breaks the Wired Security Model Wired Security Layer 7 (Application) Layer 6 (Presentation) Layer 5 (Session) Layer 4 (TCP) Layer 3 (IP) Layer 2 (MAC) Layer 1 (PHY) Anti-virus/ spyware/ malware/ spam URL filters, Web proxies, IDS SSL VPN, Network IDS, Host IDS Network & Personal Firewalls, IP-SEC VPN Unprotected Unprotected
  • 23. Wireless Security Challenges • • • • • Visibility into Wi-Fi security risks at HQ and remote offices Understanding which wireless connections pose a genuine threat Inability to block, locate & remove unauthorized Wi-Fi devices Limited IT resources and expertise to manage wireless security Maintain compliance with regulatory and internal security standards
  • 24. The First Vendor to Offer an 11n Only an 11n sensor can protect your Sensor investment in a/b/g and 11n infrastructure • 11n rogue threats are here today even if you only have a/b/g installed • 11n increases the RF exposure risk • Laptops now shipping with 11n Reduce deployment costs by installing 11n technology now • Greater range reduces sensor density • Backward compatibility with existing a/b/g wireless networks • No additional deployment costs to upgrade sensors in 6-12 months
  • 25. SpectraGuard Product Family • SpectraGuard Enterprise Server and Sensors for mid to large organizations – Server can be delivered on an AirTight Appliance or a ProCurve ONE Service Module – Sensors to support 802.11n and 802.11abg networks • SpectraGuard Online – AirTight SpectraGuard delivered as a service offering with no capital equipment purchase required
  • 26. Operations in The Baltic States Mobile Security Gateway Security Managed Services & Support Host Security Network Security
  • 28. Company business card Founded in 2000, Germany and now covering 33 countries world wide with 12 regional offices HQ in Ukraine Core business – IT Security Offices in Berlin, Ludwigsburg, Warsaw, Riga, Kiev, Moscow, St.Petersburg, Kazan, Ekaterinburg, Minsk, Baku, Almaty, Sofia More than 80 employees More than 12 vendors in portfolio Official distributor (for many cases exclusive) in Eastern Europe and Asia for number of products / solutions / vendors Participant of many IT exhibitions, road shows, business forums, ENISA IT Security Awareness program – local IT Security evangelist
  • 29. Headtechnology for Partners • • • • • Multilanguage technical, sales and marketing support • Product, Partner Trainings, demonstrations, webexes, certifications etc. • More than 650 partners world wide Innovative product portfolio Partnership programms (Authorized, Bronze, Silver and Gold) Partner / Customer protection International knowledge base
  • 30. Headtechnology – Latvia /Lithuania / Estonia • World class IT security names (best in class) • Fits International laws regarding IT auditing (EU, NATO directives) • Regulation compliance (HIPAA, SOX, BASEL2, GLBA, PCI, etc.) • Best Price / Performance • Close and good relationships with vendors for years • Local competence center
  • 31. Arturs Filatovs Latvia, Lithuania and Estonia 31 Cesu str. 3 floor, LV-1012, Riga, Latvia Phone: +371 674 21 021 eMail: info@headtechnology.lv Internet: www.headtechnology.lv

Hinweis der Redaktion

  1. Mobile is where functionality of desktop collides with mobility with mobile device.
  2. Old vs newRepresent