2. Mobile is overtaking desktop, social is beating search, messaging
apps are challenging email, and everything around us is becoming
connected.
THE ERA OF DIGITAL TRANSFORMATION
15. Most security technologies are
PATCHWORK OF POINT SOLUTIONS
COMPLEX SOLUTIONS WITH
UNCERTAIN SECURITY COVERAGE
• Looking for yesterday’s signatures
• Detection instead of prevention
ONE STEP BEHIND
28. 20%REDUCTION in
consolidating on single architecture
SECURITY SPEND
50%REDUCTION in
HUMAN CAPITAL
With single management platform
29. Stops exploits of
known vulnerabilities
IPS
Prevents bot damage
from infected devicesAnti-Bot
Blocks download of
known malware infested filesAntivirus
Stops unknown
zero-day malware in filesThreat Emulation
Multi Layer Detection and Threat PreventionKNOWNUNKNOWN
Remove Zero Day malware in Zero
SecondsThreat Extraction
30. Successful Defense Components
[Restricted] ONLY for designated groups and individuals
Reconnaissance Weaponization Delivery Exploitation Installation
Command &
Control
Act on
Objectives
P r e - C o m p r o m i s e C o m p r o m i s e P o s t - C o m p r o m i s e
DLP
Threat
Intelligence
Firewall Anti-Virus Anti-Bot Anti-BotIPS
Firewall
DLP
Document
Security
Anti-Spam
URL Filtering
Threat
Emulation
Threat
Extraction
Mobile Threat
Prevention
IPS
Threat
Emulation
Endpoint
Security
Endpoint
Security
Forensics
Mobile Threat
Prevention
Document
Security
Firewall
IPS
• Extensive research
• Collaboration with industry leading
services
• Sharing across users community
• Multi-layer architecture
• Evasion-resistant detection
• Best catch rate
• Proactive practical prevention
• Effective containment
• Clear visibility and insight
INTELLIGENCE DETECTION PREVENTION
People FACE - Biggest challenge for businesses today is how to make the best possible decision for the business, without compromising security; Security is a factor in almost any business decision.
Because there are more and more areas we don’t control,
IT environment is more and more shared and open and less and less controlled
With IoT, Cloud, Mobile, Software defined….
Because there are more and more threats and hackers we don’t know
Threat landscape is evolving so fast with new threats, new techniques, new actors and new targets.
Impossible to predict with certainty what the next waves of malware will look like.
Biggest challenge for businesses today is how to make the best possible decision for the business, without compromising security; Security is a factor in almost any business decision.
http://www.csoonline.com/article/2927395/data-protection/cybersecurity-on-the-agenda-for-80-percent-of-corporate-boards.html
Alternative stat
In 2015 almost half of boards participate in the overall security strategy of the company*
*PWC The Global State of Information Security® Survey 2016
Situation: The world wants to tell that breaches are inevitable
Situation: breaches keep happening, that’s true, so should you just wait until it’s your turn?
Industry says The only way to catch advanced malware like ransomware or an advanced persistent threat is to investigate after it has breached your business
Board down to Admins – What should we do?
Security technologies are embattled in constantly chasing after these threats to close the gaps.
An overabundance of security solutions makes it more complicated and challenging for IT managers to keep up. Organizations need to constantly gain new knowledge and hire talented people to continuously understand what is going on their network.
Not really
One step ahead means a number of things:
Prevention, Not Detection or remediation
Prevention on each part of the kill Chain
One step ahead means a number of things:
Prevention, Not Detection or remediation
Prevention on each part of the kill Chain
Known GOOD instead of Known BAD
Instead of lots of Point solutions
Protect your assets, data and your brand - and to do that in a way that allows the business the freedom to make the choices they need to make to run their business - without compromising security.
Our next generation policies provide a radically different way of approaching policy management. We’ve taken a long hard look at how daily tasks are performed and consolidated and streamlined features to make it as efficient as possible for the security admin to do his work. With R80’s automation capabilities, we are paving the way for automated security provisioning and controls. And when it comes to security visibility - we’ve fully integrated threat management into the main console so security teams can pivot quickly from policy to incidence response and have a holistic view of their security posture in one single place.