SlideShare ist ein Scribd-Unternehmen logo
1 von 18
AGENDA
1)
2)
3)
4)
5)

The Perimeter
The Interior
The Security Policy
Workstation & Server Standards
Questions
PERIMETER
FIREWALLS
• Checkpoint UTM for site-to-site VPN
with UK
• Checkpoint UTM for ATG / IS data center
• Palo Alto for Atlanta Data Center (DMZ),
internet browsing, and disaster recovery
PERIMETER
FIREWALLS
• Juniper for VPN infrastructure
• ISA for perimeter applications and
reverse proxy
PERIMETER
REMOTE ACCESS
• Nortel Extranet- Client based
• Juniper- Clientless
• ActiveSync
• BES
PERIMETER
APPLICATIONS
• SendIt file transfer
• FTP / Box.Net
• Web Security
• E-mail Anti-virus / anti-malware / antispam
PERIMETER
APPLICATIONS
• DNS and domain registration
• Public security (SSL) certificates
• DNS Caching
• Various server support
INTERNAL
APPLICATIONS
• Patch management- WSUS and Altiris
• Computer anti-virus and anti-malware
• ADRMS
• Internal PKI
• Wireless
INTERNAL
APPLICATIONS
• IAS- Radius authentication
• Password auditing
• SIEM
• ADFS
POLICY AND PROCEDURE
•
•
•
•

Password change every 90 days
Complex password
IT installs all software
All software stored in secure location
POLICY AND PROCEDURE
•
•
•
•
•

Periodic software audits
Data backups
Incident Management
Security Awareness
Least privilege
WORKSTATION STANDARDS
•
•
•
•

Anti-virus / management agent
IE7
Windows XP SP3
Automated process to remove unused
workstations from the domain
WORKSTATION STANDARDS
• Local administrative privilege allowed by
exception
• Guest and administrator account
disabled
• Administrator account renamed
• No windows firewall
• No pop-up blocker
WORKSTATION STANDARDS
• Unused computers are removed from the
domain
• Other policies as recommended in
Microsoft Baseline Security
Configuration Manager
• Variety of IE settings
• Altiris workstation images
SERVER STANDARDS
• Anti-virus / management agent
• Windows 2003 R2 or higher
• Redundant hardware / UPS to protect
against data loss
SERVER STANDARDS
• Regular backup with offsite storage to
ensure data availability
• Encryption and secure protocols
• Other policies as recommended in
Microsoft Baseline Security
Configuration Manager
• Altiris server images
VISION
•
•
•
•
•
•

Vulnerability management
Full Disk Encryption
Intrusion prevention
Desktop Security
Mobile Device Management
Segregate confidential systems- HR,
Financial, and application development
Questions?
Thank you for your attention.

Weitere ähnliche Inhalte

Was ist angesagt?

Fortinet security fabric
Fortinet security fabricFortinet security fabric
Fortinet security fabricANSItunCERT
 
Jakub Bartoszek (Samsung Electronics) - Hardware Security in Connected World
Jakub Bartoszek (Samsung Electronics) - Hardware Security in Connected WorldJakub Bartoszek (Samsung Electronics) - Hardware Security in Connected World
Jakub Bartoszek (Samsung Electronics) - Hardware Security in Connected WorldCodiax
 
ZyXEL Success Story: World’s Second Largest Egyptian Museum Receives ZyXEL Wi...
ZyXEL Success Story: World’s Second Largest Egyptian Museum Receives ZyXEL Wi...ZyXEL Success Story: World’s Second Largest Egyptian Museum Receives ZyXEL Wi...
ZyXEL Success Story: World’s Second Largest Egyptian Museum Receives ZyXEL Wi...Zyxel Communications Corp.
 
Secured Communication Infrastructure for Substation Automation
Secured Communication Infrastructure for Substation AutomationSecured Communication Infrastructure for Substation Automation
Secured Communication Infrastructure for Substation AutomationNirmal Thaliyil
 
Get Your **IT Together: Discover & Organize Your IT Assets
Get Your **IT Together: Discover & Organize Your IT AssetsGet Your **IT Together: Discover & Organize Your IT Assets
Get Your **IT Together: Discover & Organize Your IT AssetsSolarWinds
 
NetBeez - Integration with Cisco DNA Center
NetBeez - Integration with Cisco DNA CenterNetBeez - Integration with Cisco DNA Center
NetBeez - Integration with Cisco DNA CenterNetBeez, Inc.
 
Cloak your critical industrial control systems before they get hacked
Cloak your critical industrial control systems before they get hackedCloak your critical industrial control systems before they get hacked
Cloak your critical industrial control systems before they get hackedTempered
 
stackconf 2021 | Introducing Thola – A tool for Monitoring and Provisioning N...
stackconf 2021 | Introducing Thola – A tool for Monitoring and Provisioning N...stackconf 2021 | Introducing Thola – A tool for Monitoring and Provisioning N...
stackconf 2021 | Introducing Thola – A tool for Monitoring and Provisioning N...NETWAYS
 
Antirus,Firewall,Encryption,Wifi Routers, IAS, Google admin console
Antirus,Firewall,Encryption,Wifi Routers, IAS, Google admin consoleAntirus,Firewall,Encryption,Wifi Routers, IAS, Google admin console
Antirus,Firewall,Encryption,Wifi Routers, IAS, Google admin consoleSACHIN SHARMA
 
Security standard
Security standardSecurity standard
Security standardlyndyv
 
ZyXEL Success Story: ZyXEL Solution Provides Istanbul Student Hostel with Con...
ZyXEL Success Story: ZyXEL Solution Provides Istanbul Student Hostel with Con...ZyXEL Success Story: ZyXEL Solution Provides Istanbul Student Hostel with Con...
ZyXEL Success Story: ZyXEL Solution Provides Istanbul Student Hostel with Con...Zyxel Communications Corp.
 
Security Framework for the IPv6 Era
Security Framework for the IPv6 EraSecurity Framework for the IPv6 Era
Security Framework for the IPv6 EraShinsuke SUZUKI
 

Was ist angesagt? (20)

Sathish Resume New_New
Sathish Resume New_NewSathish Resume New_New
Sathish Resume New_New
 
Fortinet security fabric
Fortinet security fabricFortinet security fabric
Fortinet security fabric
 
Building a Hacker Resistant Network
Building a Hacker Resistant Network Building a Hacker Resistant Network
Building a Hacker Resistant Network
 
kali linix
kali linixkali linix
kali linix
 
Jakub Bartoszek (Samsung Electronics) - Hardware Security in Connected World
Jakub Bartoszek (Samsung Electronics) - Hardware Security in Connected WorldJakub Bartoszek (Samsung Electronics) - Hardware Security in Connected World
Jakub Bartoszek (Samsung Electronics) - Hardware Security in Connected World
 
ZyXEL Success Story: World’s Second Largest Egyptian Museum Receives ZyXEL Wi...
ZyXEL Success Story: World’s Second Largest Egyptian Museum Receives ZyXEL Wi...ZyXEL Success Story: World’s Second Largest Egyptian Museum Receives ZyXEL Wi...
ZyXEL Success Story: World’s Second Largest Egyptian Museum Receives ZyXEL Wi...
 
Secured Communication Infrastructure for Substation Automation
Secured Communication Infrastructure for Substation AutomationSecured Communication Infrastructure for Substation Automation
Secured Communication Infrastructure for Substation Automation
 
Get Your **IT Together: Discover & Organize Your IT Assets
Get Your **IT Together: Discover & Organize Your IT AssetsGet Your **IT Together: Discover & Organize Your IT Assets
Get Your **IT Together: Discover & Organize Your IT Assets
 
NetBeez - Integration with Cisco DNA Center
NetBeez - Integration with Cisco DNA CenterNetBeez - Integration with Cisco DNA Center
NetBeez - Integration with Cisco DNA Center
 
Cloak your critical industrial control systems before they get hacked
Cloak your critical industrial control systems before they get hackedCloak your critical industrial control systems before they get hacked
Cloak your critical industrial control systems before they get hacked
 
Quickassist adapter-8960-8970-brief
Quickassist adapter-8960-8970-briefQuickassist adapter-8960-8970-brief
Quickassist adapter-8960-8970-brief
 
stackconf 2021 | Introducing Thola – A tool for Monitoring and Provisioning N...
stackconf 2021 | Introducing Thola – A tool for Monitoring and Provisioning N...stackconf 2021 | Introducing Thola – A tool for Monitoring and Provisioning N...
stackconf 2021 | Introducing Thola – A tool for Monitoring and Provisioning N...
 
MPP Phone Roadmap
MPP Phone RoadmapMPP Phone Roadmap
MPP Phone Roadmap
 
Zigbee Security
Zigbee SecurityZigbee Security
Zigbee Security
 
PMResume
PMResumePMResume
PMResume
 
Antirus,Firewall,Encryption,Wifi Routers, IAS, Google admin console
Antirus,Firewall,Encryption,Wifi Routers, IAS, Google admin consoleAntirus,Firewall,Encryption,Wifi Routers, IAS, Google admin console
Antirus,Firewall,Encryption,Wifi Routers, IAS, Google admin console
 
Web arch gfdl
Web arch gfdlWeb arch gfdl
Web arch gfdl
 
Security standard
Security standardSecurity standard
Security standard
 
ZyXEL Success Story: ZyXEL Solution Provides Istanbul Student Hostel with Con...
ZyXEL Success Story: ZyXEL Solution Provides Istanbul Student Hostel with Con...ZyXEL Success Story: ZyXEL Solution Provides Istanbul Student Hostel with Con...
ZyXEL Success Story: ZyXEL Solution Provides Istanbul Student Hostel with Con...
 
Security Framework for the IPv6 Era
Security Framework for the IPv6 EraSecurity Framework for the IPv6 Era
Security Framework for the IPv6 Era
 

Ähnlich wie Security Landscape Presentation

Zero Trust for Private 5G and Edge
Zero Trust for Private 5G and EdgeZero Trust for Private 5G and Edge
Zero Trust for Private 5G and EdgeRebekah Rodriguez
 
Nist 800 82 ICS Security Auditing Framework
Nist 800 82 ICS Security Auditing FrameworkNist 800 82 ICS Security Auditing Framework
Nist 800 82 ICS Security Auditing FrameworkMarcoAfzali
 
Plnog13 2014 security intelligence_pkedra_v1
Plnog13 2014 security intelligence_pkedra_v1Plnog13 2014 security intelligence_pkedra_v1
Plnog13 2014 security intelligence_pkedra_v1PROIDEA
 
Plnog 3: Zbigniew Skurczyński - Wirtualizacja i optymalizacja infrastruktury
Plnog 3: Zbigniew Skurczyński -  Wirtualizacja i optymalizacja infrastrukturyPlnog 3: Zbigniew Skurczyński -  Wirtualizacja i optymalizacja infrastruktury
Plnog 3: Zbigniew Skurczyński - Wirtualizacja i optymalizacja infrastrukturyPROIDEA
 
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 11
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 11CCNA (R & S) Module 01 - Introduction to Networks - Chapter 11
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 11Waqas Ahmed Nawaz
 
AWS re:Invent 2016: Advanced Tips for Amazon EC2 Networking and High Availabi...
AWS re:Invent 2016: Advanced Tips for Amazon EC2 Networking and High Availabi...AWS re:Invent 2016: Advanced Tips for Amazon EC2 Networking and High Availabi...
AWS re:Invent 2016: Advanced Tips for Amazon EC2 Networking and High Availabi...Amazon Web Services
 
PLNOG 8: Robert Dąbrowski - Jak zaoferować usługi zintegrowanego bezpieczeńst...
PLNOG 8: Robert Dąbrowski - Jak zaoferować usługi zintegrowanego bezpieczeńst...PLNOG 8: Robert Dąbrowski - Jak zaoferować usługi zintegrowanego bezpieczeńst...
PLNOG 8: Robert Dąbrowski - Jak zaoferować usługi zintegrowanego bezpieczeńst...PROIDEA
 
PLNOG 8: Robert Dąbrowski - Jak zaoferować usługi zintegrowanego bezpieczeńst...
PLNOG 8: Robert Dąbrowski - Jak zaoferować usługi zintegrowanego bezpieczeńst...PLNOG 8: Robert Dąbrowski - Jak zaoferować usługi zintegrowanego bezpieczeńst...
PLNOG 8: Robert Dąbrowski - Jak zaoferować usługi zintegrowanego bezpieczeńst...PROIDEA
 
Network Design and Security Best Practices
Network Design and Security Best PracticesNetwork Design and Security Best Practices
Network Design and Security Best PracticesMike Sherwood
 
ITN6_Instructor_Materials_Chapter11.pdf
ITN6_Instructor_Materials_Chapter11.pdfITN6_Instructor_Materials_Chapter11.pdf
ITN6_Instructor_Materials_Chapter11.pdfThangDang53
 
Extending Your Network Cloud Security to AWS
Extending Your Network Cloud Security to AWSExtending Your Network Cloud Security to AWS
Extending Your Network Cloud Security to AWSFidelis Cybersecurity
 
4G LTE Security - What hackers know?
4G LTE Security - What hackers know?4G LTE Security - What hackers know?
4G LTE Security - What hackers know?Stephen Kho
 
Earth linkit servicesoverview
Earth linkit servicesoverviewEarth linkit servicesoverview
Earth linkit servicesoverviewscomoore
 
EarthLink IT Services Overview
EarthLink IT Services OverviewEarthLink IT Services Overview
EarthLink IT Services Overviewscomoore
 
Power Grid Communications & Control Systems
Power Grid Communications & Control SystemsPower Grid Communications & Control Systems
Power Grid Communications & Control Systemsfajjarrehman
 
Guy Jaszewski - In Depth Background Info
Guy Jaszewski - In Depth Background InfoGuy Jaszewski - In Depth Background Info
Guy Jaszewski - In Depth Background InfoGuy Jaszewski
 

Ähnlich wie Security Landscape Presentation (20)

Zero Trust for Private 5G and Edge
Zero Trust for Private 5G and EdgeZero Trust for Private 5G and Edge
Zero Trust for Private 5G and Edge
 
Nist 800 82 ICS Security Auditing Framework
Nist 800 82 ICS Security Auditing FrameworkNist 800 82 ICS Security Auditing Framework
Nist 800 82 ICS Security Auditing Framework
 
Pci Req
Pci ReqPci Req
Pci Req
 
Plnog13 2014 security intelligence_pkedra_v1
Plnog13 2014 security intelligence_pkedra_v1Plnog13 2014 security intelligence_pkedra_v1
Plnog13 2014 security intelligence_pkedra_v1
 
F5 TMOS v13.0
F5 TMOS v13.0F5 TMOS v13.0
F5 TMOS v13.0
 
Plnog 3: Zbigniew Skurczyński - Wirtualizacja i optymalizacja infrastruktury
Plnog 3: Zbigniew Skurczyński -  Wirtualizacja i optymalizacja infrastrukturyPlnog 3: Zbigniew Skurczyński -  Wirtualizacja i optymalizacja infrastruktury
Plnog 3: Zbigniew Skurczyński - Wirtualizacja i optymalizacja infrastruktury
 
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 11
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 11CCNA (R & S) Module 01 - Introduction to Networks - Chapter 11
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 11
 
AWS re:Invent 2016: Advanced Tips for Amazon EC2 Networking and High Availabi...
AWS re:Invent 2016: Advanced Tips for Amazon EC2 Networking and High Availabi...AWS re:Invent 2016: Advanced Tips for Amazon EC2 Networking and High Availabi...
AWS re:Invent 2016: Advanced Tips for Amazon EC2 Networking and High Availabi...
 
PLNOG 8: Robert Dąbrowski - Jak zaoferować usługi zintegrowanego bezpieczeńst...
PLNOG 8: Robert Dąbrowski - Jak zaoferować usługi zintegrowanego bezpieczeńst...PLNOG 8: Robert Dąbrowski - Jak zaoferować usługi zintegrowanego bezpieczeńst...
PLNOG 8: Robert Dąbrowski - Jak zaoferować usługi zintegrowanego bezpieczeńst...
 
PLNOG 8: Robert Dąbrowski - Jak zaoferować usługi zintegrowanego bezpieczeńst...
PLNOG 8: Robert Dąbrowski - Jak zaoferować usługi zintegrowanego bezpieczeńst...PLNOG 8: Robert Dąbrowski - Jak zaoferować usługi zintegrowanego bezpieczeńst...
PLNOG 8: Robert Dąbrowski - Jak zaoferować usługi zintegrowanego bezpieczeńst...
 
Network Design and Security Best Practices
Network Design and Security Best PracticesNetwork Design and Security Best Practices
Network Design and Security Best Practices
 
ITN6_Instructor_Materials_Chapter11.pdf
ITN6_Instructor_Materials_Chapter11.pdfITN6_Instructor_Materials_Chapter11.pdf
ITN6_Instructor_Materials_Chapter11.pdf
 
Extending Your Network Cloud Security to AWS
Extending Your Network Cloud Security to AWSExtending Your Network Cloud Security to AWS
Extending Your Network Cloud Security to AWS
 
Sophos XG Firewall
Sophos XG FirewallSophos XG Firewall
Sophos XG Firewall
 
4G LTE Security - What hackers know?
4G LTE Security - What hackers know?4G LTE Security - What hackers know?
4G LTE Security - What hackers know?
 
Earth linkit servicesoverview
Earth linkit servicesoverviewEarth linkit servicesoverview
Earth linkit servicesoverview
 
EarthLink IT Services Overview
EarthLink IT Services OverviewEarthLink IT Services Overview
EarthLink IT Services Overview
 
Overdracht
OverdrachtOverdracht
Overdracht
 
Power Grid Communications & Control Systems
Power Grid Communications & Control SystemsPower Grid Communications & Control Systems
Power Grid Communications & Control Systems
 
Guy Jaszewski - In Depth Background Info
Guy Jaszewski - In Depth Background InfoGuy Jaszewski - In Depth Background Info
Guy Jaszewski - In Depth Background Info
 

Mehr von Doug McTighe

Risk & Emergency Management
Risk & Emergency ManagementRisk & Emergency Management
Risk & Emergency ManagementDoug McTighe
 
Steve jobs tribute 2011 10-05 rev2 show
Steve jobs tribute 2011 10-05 rev2 showSteve jobs tribute 2011 10-05 rev2 show
Steve jobs tribute 2011 10-05 rev2 showDoug McTighe
 
National support presentation final
National support presentation finalNational support presentation final
National support presentation finalDoug McTighe
 
National support organization
National support organizationNational support organization
National support organizationDoug McTighe
 
IT 5 year strategic plan 2009-2014
IT 5 year strategic plan 2009-2014IT 5 year strategic plan 2009-2014
IT 5 year strategic plan 2009-2014Doug McTighe
 
Proposed firewall management
Proposed firewall managementProposed firewall management
Proposed firewall managementDoug McTighe
 

Mehr von Doug McTighe (6)

Risk & Emergency Management
Risk & Emergency ManagementRisk & Emergency Management
Risk & Emergency Management
 
Steve jobs tribute 2011 10-05 rev2 show
Steve jobs tribute 2011 10-05 rev2 showSteve jobs tribute 2011 10-05 rev2 show
Steve jobs tribute 2011 10-05 rev2 show
 
National support presentation final
National support presentation finalNational support presentation final
National support presentation final
 
National support organization
National support organizationNational support organization
National support organization
 
IT 5 year strategic plan 2009-2014
IT 5 year strategic plan 2009-2014IT 5 year strategic plan 2009-2014
IT 5 year strategic plan 2009-2014
 
Proposed firewall management
Proposed firewall managementProposed firewall management
Proposed firewall management
 

Kürzlich hochgeladen

"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfSeasiaInfotech2
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 

Kürzlich hochgeladen (20)

"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdf
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 

Security Landscape Presentation

Hinweis der Redaktion

  1. Security is everyone’s job. For IT, it’s features are engrained in the technology and procedures they useI may touch on items managed by other people around this table and point those out
  2. PAN 5020 internet browsing as part of the internet consolidation projectIt’s the new firewall- Full application firewall. Firewalls used to be port management. Now, most ports are blocked except 80 and 443. To the hacker, this is always availableGoal- Better understand and control what goes through those ports
  3. Juniper VPN InfrastructureSSG520 Appliance Cluster – Concentrator for 90+ remote Site-to-Site offices connecting with Juniper Firewalls.Avaya VPN Phone connectivity for remote users. ISA 2006 –primary ISA firewall for Perimeter applications and reverse proxy of OWA, OCS, Active Sync, Outlook AnywhereISA 2006 Firewall for publishing current www.pbsj.com and external websites to Internet, used for northamerica.atkinsglobal.com website
  4. ActiveSync and BES-Device encryption, remote wipe, encryption (yes for Iphone, no for Android?)
  5. SendIT Appliance and application supportExternal FTP server and project folder managementSecure FTP infrastructure for Oracle Alert Driving data transferZscaler web filtering application management and configuration on 90+ Juniper firewallsURL filteringBotnet, browser exploits protectionWorks through a redirect of all HTTP trafficSoon to be replaced by PANMicrosoft Exchange Hosted Solution (EHS), Vircom server and application for SMTP mail flowQuarantine and Spam management
  6. Complete management of External DNS and domains in Network Solutions for all PBSJ.com and PBSJ subdomainsGlobalSign external Public SSL certificate management for all perimeter and some internal SSL websites2 Microsoft DNS caching servers on DMZ for DNS caching of DNS requestsODCEDGE DMZ server for OCSMEWEB01 – for McLaren Enterprise
  7. WSUS – Patch management application for enterprise-wide patching of servers & workstationsMcAfee InfrastructureEPO server configuration and management of software, policies and reporting5000+ nodes consisting of workstations and servers for Antivirus and SpywareAntigen/Forefront for Antivirus on current Exchange InfrastructureAD Rights Management (ADRMS) Infrastructure – configuration of policies, client deployment, setup, training guides etc.Internal PKI Infrastructure - Root CA server and Issuing CA server, architecture configuration, maintenance, security of infrastructure. Issuance of machine certificates to all enterprise workstations and servers. Issuance of internal code signing certificates and SSL certificates for internal applications.Wireless Aerohive InfrastructureHive Manager and Guest Manager Appliance: configuration, software updates, maintenance, security policy configuration.200 wireless access points: security policy configurations, RADIUS configuration and software updates
  8. Password AuditingL0phtcrace-mail reminders upon 90 day expirationPassword Reset/enable. Unlocks userIDs, 2 Microsoft IAS RADIUS servers for Wireless, Switch and Router Authentication for users.Password Auditing Server: Running L0phtcrackLog Rhythm SIEM Appliance – Collection of Security logs and domain controller logs, future collection of networking equipment (i.e. switches and routers.) IAS- Internet Authentication ServerSIEM- Security Information and Event ManagementADRMS- Active Directory Rights Management ServiceInternal PKI- Allows us to issue our own internal certificates, plays role in federating domains
  9. Complex password- At least 8 characters, 1 letter, 1 number, 1 special character
  10. Software inventory is obtained through Altiris, compared against licenses on-file by the respective areaConcept of Least privilege- Grant only the privileges required to fulfill job responsibilities. 4 AD Domain administrators
  11. Mcafee and ePO agent Ugh– IE 7To protect from retired workstations, there is an automated process to remove them from the domain
  12. IE Settings- Zones, etc.Altiris workstation images- Used on new and rebuilt computers to provide a consistent, supportable, secure system
  13. Desktop SecurityBrowser upgrades to IE8 for XP and IE9 to Windows 7 (IE9 is fully W3C compliant finally from Microsoft)Compatibility testing of all internal applicationsImplementation of Pop-up Blocker on Enterprise desktops Possible implementation of Windows Firewall on workstations (currently a requirement at DOT)