SlideShare ist ein Scribd-Unternehmen logo
1 von 25
Downloaden Sie, um offline zu lesen
BEYOND THE PC – COMBATING
UNMANAGED THREATS
June 12th, 2013
View the webinar replay here:
https://www.brainshark.com/xerox/vu?pi=zIDz6kmucz62tqz0
Watch this video here:
http://a400.g.akamai.net/7/400/14595/v0001/xeroxwebcast.download.akamai.com/14595/
TEMP/201306/Computer_Hacking-Cracking_down_on_cyber_crime-clip1.mp4
TODAY’S PROGRAM
• CISO Insights
– Mark Leary, Chief Information Security Officer, Xerox
• Solutions: Managed Print Services
and ConnectKey™
– Karl Dueland, VP Solutions Delivery Unit, Xerox
• Protecting Your Network
– John Hartman, Client Executive, Cisco
• Embedded Security, Smarter Security
– Brian Kenyon, Chief Technology Officer, McAfee
INSIGHTS
Mark Leary
Chief Information Security Officer
Xerox
THE “INTERNET OF THINGS”
It has arrived….and so have
huge security issues….
– Network and protocol
security
– Data privacy and security
– Identity
– Trust
population
with Internet
access in 2015
75%
devices
connected to
the Internet in
2015
6B
devices
connected to
the Internet
in 2020
30B
A “THING” CALLED A MFP…
3.4MILLION
businesses that
experienced a
printer-related
data breach
companies
without a
secure print
strategy
65%
companies
have a secure
print
initiative
22%
63%
COMMON MFP SECURITY THREATS
• Poor mobile device management
• Weak MFP wireless access control
• Poor VPN remote access controls
• Poor Web-based remote access controls
• Weak identity and access management
• MFP hardware component weaknesses
• MFP embedded software weaknesses
• Poor partner/contractor/consultant access
• Poor physical access to MFPs
• Poor MFP system and application access
• Poor MFP software management controls
REMOTE ACCESS
PROXIMITY
INSIDER THREAT
SUPPLY CHAIN
QUESTIONS TO ASK
1) Do we have an understanding of our business processes that
involve document management and printing?
2) What threats are targeting our IT environment and particularly
MFPs?
3) Are our policies addressing MFP information security still relevant
to protect the business?
4) Are our MFPs correctly configured to prevent cyber attacks?
5) Do we have visibility into our IT environment to identify devices
and determine normal behavior from abnormal?
6) Are we incorporating our customers, partners, and vendors into
our IT security operating model?
A CYCLE OF CONTINUOUS VALUE
Document
Outsourcing
IT Outsourcing
Business Process
Outsourcing
Sustainability
Cost Savings
Productivity
Security
Innovation
Insight
Mobility
Managed
Print Services and
Technology
Secure and
Integrate
Automate
and Simplify
Assess and
Optimize
SOLUTIONS: MANAGED PRINT
SERVICES AND CONNECTKEY™
Karl Dueland, Vice President, Solutions Delivery Unit, Xerox
STARTING POINT: SECURE TECHNOLOGY
• An ecosystem built into new Xerox MFPs
• Offering flexibility, coherency and commonality
• A complete refresh of key office products
• Integrated with Managed Print Services
8700,8900 7220,7225 7800 5800 9300+
ConnectKeyTM
LEADERSHIP SECURITY:
MULTILAYERED APPROACH
Network
Management
Consoles
• Simple email alerts
• Xerox Device
Manager
• McAfee ePolicy
Orchestrator
TrustSec
Access Protection
Xerox MFP
User Endpoints
Watch this video here:
http://a400.g.akamai.net/7/400/14595/v0001/xeroxwebcast.download.akamai.com/14595/
TEMP/201306/09-Security_low.mp4
PROTECTING YOUR NETWORK
John Hartman, CISCO
TOP OF MIND
SECURITY CONCERNS
• How do I classify so many devices
coming onto my network?
• How do I allow suppliers and
contractors to collaborate securely?
• Do we have control over devices
connecting to our applications & data
in the DC?
• Virtual Machine Sprawl! How should I
manage security for all of those VMs we
are being asked to provision everyday?
• My critical services are still running
on physical servers. Do I maintain
separate policies?
All-in-One Enterprise Policy Control
CISCO IDENTITY
SERVICES ENGINE (ISE)
Who What Where When How
Virtual machine client, IP device, guest, employee, and remote user
CiscoÂŽ ISE
WIRED WIRELESS VPN
Business-Relevant
Policies
Security Policy Attributes
IDENTITY
CONTEXT
EMBEDDED SECURITY, SMARTER
SECURITY
Brian Kenyon, Chief Technology Officer, McAfee
BLACKLIST VS. WHITELIST
THE DYNAMICS
OF WHITELISTING
Black Grey White
DYNAMIC STATIC
MAC
NetBook
Consumer PC
VDI
Smartphone
Mobile
Phone
REPUTATION-BASED
Medical
Devices
SCADA Systems
Servers
Point of
Sale
ATMs
Kiosks
COE
Desktop
Smart
Meter
MFP
Watch this video here:
http://www.youtube.com/watch?v=XbQowo1ForM
Sustainability
Cost Savings
Productivity
Security
Innovation
Insight
Mobility
Xerox Managed
Print Services
and Technology
Secure and
Integrate
Automate and
Simplify
Assess and
Optimize
MANAGING PRINT SECURELY
Sustainability
• Manage power consumption with Cisco
EnergyWise
• Earth Smart Print Drivers
Employee Productivity & Mobility
• Scan to Cloud / SharePoint
• Print from / to anywhere
• Open API for custom workflow integration
Security
• McAfee embedded security & whitelisting
• Cisco TrustSec – secure print
image overwrite & encryption
Cost Savings
• Reduce wasteful printing with
default settings
• Card access authentication
Watch this video here:
http://www.youtube.com/watch?v=_05x6fWtREQ
OPEN FOR QUESTIONS
• Please press *1 for the Operator
to ask a questions
• Or use the Q&A feature in
Live Meeting to submit a question
THANK YOU FOR JOINING US
• www.xerox.com/security
• Chief Optimist Magazine
– More insights and innovative ideas from
the newest issue focused on security.
• iPad edition: “Chief Optimist” on App Store
• PC edition: Xerox.com/optimist
• Focus Forward Events
– Explore expert commentary
• XeroxFocusForward.com

Weitere ähnliche Inhalte

Was ist angesagt?

Brochure Security
Brochure SecurityBrochure Security
Brochure Security
bryanpsu
 

Was ist angesagt? (20)

Business Case Of Bring Your Own Device[ BYOD]
Business Case Of Bring Your Own Device[ BYOD] Business Case Of Bring Your Own Device[ BYOD]
Business Case Of Bring Your Own Device[ BYOD]
 
Bring your own device
Bring your own deviceBring your own device
Bring your own device
 
BYOD: Bring Your Own Device Implementation and Security Issues
BYOD: Bring Your Own Device Implementation and Security IssuesBYOD: Bring Your Own Device Implementation and Security Issues
BYOD: Bring Your Own Device Implementation and Security Issues
 
Byod
ByodByod
Byod
 
Mobile Device Security by Michael Gong, Jake Kreider, Chris Lugo, Kwame Osaf...
 Mobile Device Security by Michael Gong, Jake Kreider, Chris Lugo, Kwame Osaf... Mobile Device Security by Michael Gong, Jake Kreider, Chris Lugo, Kwame Osaf...
Mobile Device Security by Michael Gong, Jake Kreider, Chris Lugo, Kwame Osaf...
 
Preparing an Effective BYOD or Mobility Strategy
Preparing an Effective BYOD or Mobility StrategyPreparing an Effective BYOD or Mobility Strategy
Preparing an Effective BYOD or Mobility Strategy
 
Sophos Mobile Control - Product Overview
Sophos Mobile Control - Product OverviewSophos Mobile Control - Product Overview
Sophos Mobile Control - Product Overview
 
A Primer on iOS Management and What's Changing
A Primer on iOS Management and What's ChangingA Primer on iOS Management and What's Changing
A Primer on iOS Management and What's Changing
 
Bring Your Own Device
Bring Your Own Device Bring Your Own Device
Bring Your Own Device
 
The Three Critical Steps for Effective BYOD Management
The Three Critical Steps for Effective BYOD Management The Three Critical Steps for Effective BYOD Management
The Three Critical Steps for Effective BYOD Management
 
Mobile device management and BYOD – simple changes, big benefits
Mobile device management and BYOD – simple changes, big benefitsMobile device management and BYOD – simple changes, big benefits
Mobile device management and BYOD – simple changes, big benefits
 
Learnings while building Mobile Device Management [MDM]
Learnings while building Mobile Device Management [MDM] Learnings while building Mobile Device Management [MDM]
Learnings while building Mobile Device Management [MDM]
 
The Biggest Mistake you can make with your Data Center Licenses
The Biggest Mistake you can make with your Data Center LicensesThe Biggest Mistake you can make with your Data Center Licenses
The Biggest Mistake you can make with your Data Center Licenses
 
Smarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst ServicesSmarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst Services
 
5 Essential Tips for Creating An Effective BYOD Policy
5 Essential Tips for Creating An Effective BYOD Policy5 Essential Tips for Creating An Effective BYOD Policy
5 Essential Tips for Creating An Effective BYOD Policy
 
Nonprofit IT Trends 2018
Nonprofit IT Trends 2018Nonprofit IT Trends 2018
Nonprofit IT Trends 2018
 
Bring Your Own Device (BYOD)
Bring Your Own Device (BYOD)Bring Your Own Device (BYOD)
Bring Your Own Device (BYOD)
 
Brochure Security
Brochure SecurityBrochure Security
Brochure Security
 
Data-Centric Protection: The Future of BYOD Security
Data-Centric Protection: The Future of BYOD SecurityData-Centric Protection: The Future of BYOD Security
Data-Centric Protection: The Future of BYOD Security
 
Secure mobile content SharePoint Best Practices Conference 2013
Secure mobile content   SharePoint Best Practices Conference 2013Secure mobile content   SharePoint Best Practices Conference 2013
Secure mobile content SharePoint Best Practices Conference 2013
 

Ähnlich wie Beyond the PC: Combating Unmanaged Threats Security

Symantec 2006_Annual_Report
Symantec  2006_Annual_ReportSymantec  2006_Annual_Report
Symantec 2006_Annual_Report
finance40
 
IBM InterConnect 2103 - Institute a MobileFirst IT Infrastructure
IBM InterConnect 2103 -  Institute a MobileFirst IT InfrastructureIBM InterConnect 2103 -  Institute a MobileFirst IT Infrastructure
IBM InterConnect 2103 - Institute a MobileFirst IT Infrastructure
Chris Pepin
 
CIO Review - Top 20 CyberSecurity
CIO Review - Top 20 CyberSecurityCIO Review - Top 20 CyberSecurity
CIO Review - Top 20 CyberSecurity
Bob Guimarin
 
Virtela Corp Brochure
Virtela Corp BrochureVirtela Corp Brochure
Virtela Corp Brochure
tmcleland
 

Ähnlich wie Beyond the PC: Combating Unmanaged Threats Security (20)

TEUNO Summit - Presentaciones
TEUNO Summit - PresentacionesTEUNO Summit - Presentaciones
TEUNO Summit - Presentaciones
 
Advanced IT and Cyber Security for Your Business
Advanced IT and Cyber Security for Your BusinessAdvanced IT and Cyber Security for Your Business
Advanced IT and Cyber Security for Your Business
 
Cloud Security: Perception Vs. Reality
Cloud Security: Perception Vs. RealityCloud Security: Perception Vs. Reality
Cloud Security: Perception Vs. Reality
 
Sleeping well with cloud services
Sleeping well with cloud servicesSleeping well with cloud services
Sleeping well with cloud services
 
Symantec 2006_Annual_Report
Symantec  2006_Annual_ReportSymantec  2006_Annual_Report
Symantec 2006_Annual_Report
 
Embracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and CentrifyEmbracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and Centrify
 
IBM InterConnect 2103 - Institute a MobileFirst IT Infrastructure
IBM InterConnect 2103 -  Institute a MobileFirst IT InfrastructureIBM InterConnect 2103 -  Institute a MobileFirst IT Infrastructure
IBM InterConnect 2103 - Institute a MobileFirst IT Infrastructure
 
Micro Focus Corporate Overview
Micro Focus Corporate OverviewMicro Focus Corporate Overview
Micro Focus Corporate Overview
 
Leveraging mobility - turning enterprise wireless into a business enabler
Leveraging mobility - turning enterprise wireless into a business enablerLeveraging mobility - turning enterprise wireless into a business enabler
Leveraging mobility - turning enterprise wireless into a business enabler
 
Security Chat 5.0
Security Chat 5.0Security Chat 5.0
Security Chat 5.0
 
[Sencha 엔터프라이즈 웹애플리케이션 세미나] BYOD - Sencha space
[Sencha 엔터프라이즈 웹애플리케이션 세미나] BYOD - Sencha space[Sencha 엔터프라이즈 웹애플리케이션 세미나] BYOD - Sencha space
[Sencha 엔터프라이즈 웹애플리케이션 세미나] BYOD - Sencha space
 
Is workforce mobility presenting new technology challenges?
Is workforce mobility presenting new technology challenges?Is workforce mobility presenting new technology challenges?
Is workforce mobility presenting new technology challenges?
 
BluBØX Intro
BluBØX IntroBluBØX Intro
BluBØX Intro
 
CIO Review - Top 20 CyberSecurity
CIO Review - Top 20 CyberSecurityCIO Review - Top 20 CyberSecurity
CIO Review - Top 20 CyberSecurity
 
CASBs: 8 Critical Capabilities in partnership with ISMG Media Group
CASBs: 8 Critical Capabilities in partnership with ISMG Media GroupCASBs: 8 Critical Capabilities in partnership with ISMG Media Group
CASBs: 8 Critical Capabilities in partnership with ISMG Media Group
 
Virtela Corp Brochure
Virtela Corp BrochureVirtela Corp Brochure
Virtela Corp Brochure
 
Presentation cloud security the grand challenge
Presentation   cloud security the grand challengePresentation   cloud security the grand challenge
Presentation cloud security the grand challenge
 
Safeguard Your Business
Safeguard Your BusinessSafeguard Your Business
Safeguard Your Business
 
UDT - Government and Healthcare
UDT - Government and HealthcareUDT - Government and Healthcare
UDT - Government and Healthcare
 
The 5 ws of Cyber Security
The 5 ws of Cyber SecurityThe 5 ws of Cyber Security
The 5 ws of Cyber Security
 

Mehr von Chief Optimist

Information Security
Information SecurityInformation Security
Information Security
Chief Optimist
 
Business Goes Mobile
Business Goes MobileBusiness Goes Mobile
Business Goes Mobile
Chief Optimist
 

Mehr von Chief Optimist (20)

How Mobility is Changing the Way We Work
How Mobility is Changing the Way We WorkHow Mobility is Changing the Way We Work
How Mobility is Changing the Way We Work
 
Green Printing at UK Government Department [Infographic]
Green Printing at UK Government Department [Infographic]Green Printing at UK Government Department [Infographic]
Green Printing at UK Government Department [Infographic]
 
Financial Group Goes Beyond Document Management [Infographic]
Financial Group Goes Beyond Document Management [Infographic]Financial Group Goes Beyond Document Management [Infographic]
Financial Group Goes Beyond Document Management [Infographic]
 
Take the Stop and Go out of your Retail Supply Chain [Infographic]
Take the Stop and Go out of your Retail Supply Chain [Infographic]Take the Stop and Go out of your Retail Supply Chain [Infographic]
Take the Stop and Go out of your Retail Supply Chain [Infographic]
 
The Automated States of America: Transforming the Future of Government IT [In...
The Automated States of America: Transforming the Future of Government IT [In...The Automated States of America: Transforming the Future of Government IT [In...
The Automated States of America: Transforming the Future of Government IT [In...
 
Optimism in the Healthcare Workplace Revealed
Optimism in the Healthcare Workplace RevealedOptimism in the Healthcare Workplace Revealed
Optimism in the Healthcare Workplace Revealed
 
Optimism in Government Revealed
Optimism in Government RevealedOptimism in Government Revealed
Optimism in Government Revealed
 
Optimism in the Modern Workplace Revealed
Optimism in the Modern Workplace RevealedOptimism in the Modern Workplace Revealed
Optimism in the Modern Workplace Revealed
 
Finding the Retail Omnichannel Sweet Spots Infographic
Finding the Retail Omnichannel Sweet Spots InfographicFinding the Retail Omnichannel Sweet Spots Infographic
Finding the Retail Omnichannel Sweet Spots Infographic
 
Higher Education Student Retention and Achievement Infographic
Higher Education Student Retention and Achievement InfographicHigher Education Student Retention and Achievement Infographic
Higher Education Student Retention and Achievement Infographic
 
Government Data Breaches: An Inside Job? [Infographic]
Government Data Breaches: An Inside Job? [Infographic]Government Data Breaches: An Inside Job? [Infographic]
Government Data Breaches: An Inside Job? [Infographic]
 
26 Reasons You Need an MPS Assessment
26 Reasons You Need an MPS Assessment26 Reasons You Need an MPS Assessment
26 Reasons You Need an MPS Assessment
 
Four Necessities for Your Change Management Journey (Infographic)
Four Necessities for Your Change Management Journey (Infographic)Four Necessities for Your Change Management Journey (Infographic)
Four Necessities for Your Change Management Journey (Infographic)
 
Work is Not a Place Anymore
Work is Not a Place AnymoreWork is Not a Place Anymore
Work is Not a Place Anymore
 
Think you’re secure? You May Be Surprised
Think you’re secure? You May Be SurprisedThink you’re secure? You May Be Surprised
Think you’re secure? You May Be Surprised
 
Generating Revenue and Reducing Costs in Higher Education
Generating Revenue and Reducing Costs in Higher EducationGenerating Revenue and Reducing Costs in Higher Education
Generating Revenue and Reducing Costs in Higher Education
 
Information Security
Information SecurityInformation Security
Information Security
 
Business Goes Mobile
Business Goes MobileBusiness Goes Mobile
Business Goes Mobile
 
Workflow and The True Value of Managed Print Services
Workflow and The True Value of Managed Print ServicesWorkflow and The True Value of Managed Print Services
Workflow and The True Value of Managed Print Services
 
Change is good...when you manage it properly.
Change is good...when you manage it properly.Change is good...when you manage it properly.
Change is good...when you manage it properly.
 

KĂźrzlich hochgeladen

FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
dollysharma2066
 
Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...
Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...
Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...
Anamikakaur10
 
Call Girls In Noida 959961⊹3876 Independent Escort Service Noida
Call Girls In Noida 959961⊹3876 Independent Escort Service NoidaCall Girls In Noida 959961⊹3876 Independent Escort Service Noida
Call Girls In Noida 959961⊹3876 Independent Escort Service Noida
dlhescort
 
Call Girls Zirakpur👧 Book Now📱7837612180 📞👉Call Girl Service In Zirakpur No A...
Call Girls Zirakpur👧 Book Now📱7837612180 📞👉Call Girl Service In Zirakpur No A...Call Girls Zirakpur👧 Book Now📱7837612180 📞👉Call Girl Service In Zirakpur No A...
Call Girls Zirakpur👧 Book Now📱7837612180 📞👉Call Girl Service In Zirakpur No A...
Sheetaleventcompany
 
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
daisycvs
 
Russian Call Girls In Rajiv Chowk Gurgaon ❤️8448577510 ⊹Best Escorts Service ...
Russian Call Girls In Rajiv Chowk Gurgaon ❤️8448577510 ⊹Best Escorts Service ...Russian Call Girls In Rajiv Chowk Gurgaon ❤️8448577510 ⊹Best Escorts Service ...
Russian Call Girls In Rajiv Chowk Gurgaon ❤️8448577510 ⊹Best Escorts Service ...
lizamodels9
 
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...
lizamodels9
 
Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
amitlee9823
 
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
amitlee9823
 
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...
Sheetaleventcompany
 

KĂźrzlich hochgeladen (20)

FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
 
Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...
Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...
Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...
 
BAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
BAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRLBAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
BAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
 
Call Girls In Noida 959961⊹3876 Independent Escort Service Noida
Call Girls In Noida 959961⊹3876 Independent Escort Service NoidaCall Girls In Noida 959961⊹3876 Independent Escort Service Noida
Call Girls In Noida 959961⊹3876 Independent Escort Service Noida
 
Call Girls Zirakpur👧 Book Now📱7837612180 📞👉Call Girl Service In Zirakpur No A...
Call Girls Zirakpur👧 Book Now📱7837612180 📞👉Call Girl Service In Zirakpur No A...Call Girls Zirakpur👧 Book Now📱7837612180 📞👉Call Girl Service In Zirakpur No A...
Call Girls Zirakpur👧 Book Now📱7837612180 📞👉Call Girl Service In Zirakpur No A...
 
Organizational Transformation Lead with Culture
Organizational Transformation Lead with CultureOrganizational Transformation Lead with Culture
Organizational Transformation Lead with Culture
 
Malegaon Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort Service
Malegaon Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort ServiceMalegaon Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort Service
Malegaon Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort Service
 
Cheap Rate Call Girls In Noida Sector 62 Metro 959961乂3876
Cheap Rate Call Girls In Noida Sector 62 Metro 959961乂3876Cheap Rate Call Girls In Noida Sector 62 Metro 959961乂3876
Cheap Rate Call Girls In Noida Sector 62 Metro 959961乂3876
 
RSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors DataRSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors Data
 
Phases of Negotiation .pptx
 Phases of Negotiation .pptx Phases of Negotiation .pptx
Phases of Negotiation .pptx
 
Falcon Invoice Discounting: The best investment platform in india for investors
Falcon Invoice Discounting: The best investment platform in india for investorsFalcon Invoice Discounting: The best investment platform in india for investors
Falcon Invoice Discounting: The best investment platform in india for investors
 
(Anamika) VIP Call Girls Napur Call Now 8617697112 Napur Escorts 24x7
(Anamika) VIP Call Girls Napur Call Now 8617697112 Napur Escorts 24x7(Anamika) VIP Call Girls Napur Call Now 8617697112 Napur Escorts 24x7
(Anamika) VIP Call Girls Napur Call Now 8617697112 Napur Escorts 24x7
 
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
 
Russian Call Girls In Rajiv Chowk Gurgaon ❤️8448577510 ⊹Best Escorts Service ...
Russian Call Girls In Rajiv Chowk Gurgaon ❤️8448577510 ⊹Best Escorts Service ...Russian Call Girls In Rajiv Chowk Gurgaon ❤️8448577510 ⊹Best Escorts Service ...
Russian Call Girls In Rajiv Chowk Gurgaon ❤️8448577510 ⊹Best Escorts Service ...
 
Value Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and painsValue Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and pains
 
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...
 
Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
 
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
 
PHX May 2024 Corporate Presentation Final
PHX May 2024 Corporate Presentation FinalPHX May 2024 Corporate Presentation Final
PHX May 2024 Corporate Presentation Final
 
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...
 

Beyond the PC: Combating Unmanaged Threats Security

  • 1. BEYOND THE PC – COMBATING UNMANAGED THREATS June 12th, 2013
  • 2. View the webinar replay here: https://www.brainshark.com/xerox/vu?pi=zIDz6kmucz62tqz0
  • 3. Watch this video here: http://a400.g.akamai.net/7/400/14595/v0001/xeroxwebcast.download.akamai.com/14595/ TEMP/201306/Computer_Hacking-Cracking_down_on_cyber_crime-clip1.mp4
  • 4. TODAY’S PROGRAM • CISO Insights – Mark Leary, Chief Information Security Officer, Xerox • Solutions: Managed Print Services and ConnectKey™ – Karl Dueland, VP Solutions Delivery Unit, Xerox • Protecting Your Network – John Hartman, Client Executive, Cisco • Embedded Security, Smarter Security – Brian Kenyon, Chief Technology Officer, McAfee
  • 5. INSIGHTS Mark Leary Chief Information Security Officer Xerox
  • 6. THE “INTERNET OF THINGS” It has arrived….and so have huge security issues…. – Network and protocol security – Data privacy and security – Identity – Trust population with Internet access in 2015 75% devices connected to the Internet in 2015 6B devices connected to the Internet in 2020 30B
  • 7. A “THING” CALLED A MFP… 3.4MILLION businesses that experienced a printer-related data breach companies without a secure print strategy 65% companies have a secure print initiative 22% 63%
  • 8. COMMON MFP SECURITY THREATS • Poor mobile device management • Weak MFP wireless access control • Poor VPN remote access controls • Poor Web-based remote access controls • Weak identity and access management • MFP hardware component weaknesses • MFP embedded software weaknesses • Poor partner/contractor/consultant access • Poor physical access to MFPs • Poor MFP system and application access • Poor MFP software management controls REMOTE ACCESS PROXIMITY INSIDER THREAT SUPPLY CHAIN
  • 9. QUESTIONS TO ASK 1) Do we have an understanding of our business processes that involve document management and printing? 2) What threats are targeting our IT environment and particularly MFPs? 3) Are our policies addressing MFP information security still relevant to protect the business? 4) Are our MFPs correctly configured to prevent cyber attacks? 5) Do we have visibility into our IT environment to identify devices and determine normal behavior from abnormal? 6) Are we incorporating our customers, partners, and vendors into our IT security operating model?
  • 10. A CYCLE OF CONTINUOUS VALUE Document Outsourcing IT Outsourcing Business Process Outsourcing Sustainability Cost Savings Productivity Security Innovation Insight Mobility Managed Print Services and Technology Secure and Integrate Automate and Simplify Assess and Optimize
  • 11. SOLUTIONS: MANAGED PRINT SERVICES AND CONNECTKEY™ Karl Dueland, Vice President, Solutions Delivery Unit, Xerox
  • 12. STARTING POINT: SECURE TECHNOLOGY • An ecosystem built into new Xerox MFPs • Offering flexibility, coherency and commonality • A complete refresh of key office products • Integrated with Managed Print Services 8700,8900 7220,7225 7800 5800 9300+ ConnectKeyTM
  • 13. LEADERSHIP SECURITY: MULTILAYERED APPROACH Network Management Consoles • Simple email alerts • Xerox Device Manager • McAfee ePolicy Orchestrator TrustSec Access Protection Xerox MFP User Endpoints
  • 14. Watch this video here: http://a400.g.akamai.net/7/400/14595/v0001/xeroxwebcast.download.akamai.com/14595/ TEMP/201306/09-Security_low.mp4
  • 16. TOP OF MIND SECURITY CONCERNS • How do I classify so many devices coming onto my network? • How do I allow suppliers and contractors to collaborate securely? • Do we have control over devices connecting to our applications & data in the DC? • Virtual Machine Sprawl! How should I manage security for all of those VMs we are being asked to provision everyday? • My critical services are still running on physical servers. Do I maintain separate policies?
  • 17. All-in-One Enterprise Policy Control CISCO IDENTITY SERVICES ENGINE (ISE) Who What Where When How Virtual machine client, IP device, guest, employee, and remote user CiscoÂŽ ISE WIRED WIRELESS VPN Business-Relevant Policies Security Policy Attributes IDENTITY CONTEXT
  • 18. EMBEDDED SECURITY, SMARTER SECURITY Brian Kenyon, Chief Technology Officer, McAfee
  • 20. THE DYNAMICS OF WHITELISTING Black Grey White DYNAMIC STATIC MAC NetBook Consumer PC VDI Smartphone Mobile Phone REPUTATION-BASED Medical Devices SCADA Systems Servers Point of Sale ATMs Kiosks COE Desktop Smart Meter MFP
  • 21. Watch this video here: http://www.youtube.com/watch?v=XbQowo1ForM
  • 22. Sustainability Cost Savings Productivity Security Innovation Insight Mobility Xerox Managed Print Services and Technology Secure and Integrate Automate and Simplify Assess and Optimize MANAGING PRINT SECURELY Sustainability • Manage power consumption with Cisco EnergyWise • Earth Smart Print Drivers Employee Productivity & Mobility • Scan to Cloud / SharePoint • Print from / to anywhere • Open API for custom workflow integration Security • McAfee embedded security & whitelisting • Cisco TrustSec – secure print image overwrite & encryption Cost Savings • Reduce wasteful printing with default settings • Card access authentication
  • 23. Watch this video here: http://www.youtube.com/watch?v=_05x6fWtREQ
  • 24. OPEN FOR QUESTIONS • Please press *1 for the Operator to ask a questions • Or use the Q&A feature in Live Meeting to submit a question
  • 25. THANK YOU FOR JOINING US • www.xerox.com/security • Chief Optimist Magazine – More insights and innovative ideas from the newest issue focused on security. • iPad edition: “Chief Optimist” on App Store • PC edition: Xerox.com/optimist • Focus Forward Events – Explore expert commentary • XeroxFocusForward.com