SlideShare ist ein Scribd-Unternehmen logo
1 von 15
Downloaden Sie, um offline zu lesen
Future Security Now.
 @NOAHConference
 @noah_conference
 @noah-conference
 @NOAHConference
FOLLOW USONSOCIAL
CYBERSECURITY IS FOUNDATIONAL TO
OUR WAY OF LIFE
Every product and every service are becoming digital
1
OUR GATEWAY TO DATA ARE THE DEVICES
WE USE
Endpoints and IoT devices are conversing directly with
the cloud, data centers, and services
2
>1.5MM
cybersecurity jobs
unfilled by 2020
Source: Frost & Sullivan and (ISC)
NOT ENOUGH PEOPLE TO SCALE CYBER
SECURITY
3
WE ARE EVOLVING SECURITY INFRASTRUCTURE
ON A GLOBAL SCALE
By rebuilding the endpoint security stack and using AI to protect from cyber
threats, and regulate unprivileged access
4
Customers
3 of the Fortune 10, and…
Airline in Asia
Global credit card company
French Banking GroupUS airline for travel comfort
US airline for travel comfort
Weekly periodical
Healthcare logistics company
SMB cybersecurity company
CRM Platform
HCM software
Online music radio
Big data platform
Cosmetics manufacturer
Japanese heavy machinery manufacturer
Photo printing company
US public university system
Airline in Norway
Sports car company
Financial data platform
Cloud software company
Big data analytics company
Hyperconverged storage software company
Oil & Gas Corporation
Casino in France
Political publi
Railwa
Sanitation Se
Perfume
De
#1
#1
#1
#1 #1
#1#1
#1#1
#1
#1
#1
#1
#1
#1
#1
#1
#1
#1
#1
#1
#1
#1
#1
#1
#1
#1
#1
#1
#1
BEHAVIORAL AI IS CHANGING THE GAME
Highly scalable, fully automated and effective against any
vector of attack
Malware
Ransomware
Process migration
Privilege escalation
Key logging
Lateral movement
Live off the land
Track
IdentifyTrack Respond
IdentifyTrack Respond Hunt
Platform
Orchestration
SIEM
CASB Cloud
Mobile
*
IT Ops/Mgmt
Firewall
Signifies not yet announced integrations.*
*
Product Platform Coverage
*
SDK
S1 Nexus Integration Ecosystem
Unlock the Power of an API-First Approach
S1 Nexus
Embedded AI SDK
Anti-Phishing CompatibilityThreat Intel
Cyber Services
THE OPPORTUNITY
AV, EDR, Datacenter, Enterprise IoT
Endpoint (AV)
$17.4BN
$2.3BN
EDR
TODAY
Datacenter
$15BN
(2023)
$4.1BN
(2021)
EIoT
FUTURE
$19.6BN $19.1BN
+
$38.7BN
THANK YOU
* REAL HUBBLE TELESCOPE IMAGE OF THE TRANTULA NEBULA, 170,000 LIGHT YEARS AWAY

Weitere ähnliche Inhalte

Was ist angesagt?

Complete Endpoint protection
Complete Endpoint protectionComplete Endpoint protection
Complete Endpoint protectionxband
 
Forcepoint Dynamic Data Protection
Forcepoint Dynamic Data ProtectionForcepoint Dynamic Data Protection
Forcepoint Dynamic Data ProtectionMarketingArrowECS_CZ
 
Security Information and Event Management (SIEM)
Security Information and Event Management (SIEM)Security Information and Event Management (SIEM)
Security Information and Event Management (SIEM)k33a
 
Cyber Resilience – Strengthening Cybersecurity Posture & Preparedness by Phil...
Cyber Resilience – Strengthening Cybersecurity Posture & Preparedness by Phil...Cyber Resilience – Strengthening Cybersecurity Posture & Preparedness by Phil...
Cyber Resilience – Strengthening Cybersecurity Posture & Preparedness by Phil...BCM Institute
 
Endpoint Protection
Endpoint ProtectionEndpoint Protection
Endpoint ProtectionSophos
 
Application Security | Application Security Tutorial | Cyber Security Certifi...
Application Security | Application Security Tutorial | Cyber Security Certifi...Application Security | Application Security Tutorial | Cyber Security Certifi...
Application Security | Application Security Tutorial | Cyber Security Certifi...Edureka!
 
Splunk Phantom SOAR Roundtable
Splunk Phantom SOAR RoundtableSplunk Phantom SOAR Roundtable
Splunk Phantom SOAR RoundtableSplunk
 
Understanding Cyber Kill Chain and OODA loop
Understanding Cyber Kill Chain and OODA loopUnderstanding Cyber Kill Chain and OODA loop
Understanding Cyber Kill Chain and OODA loopDavid Sweigert
 
Introduction to Cybersecurity
Introduction to CybersecurityIntroduction to Cybersecurity
Introduction to CybersecurityKrutarth Vasavada
 
FIRST CTI Symposium: Turning intelligence into action with MITRE ATT&CK™
FIRST CTI Symposium: Turning intelligence into action with MITRE ATT&CK™FIRST CTI Symposium: Turning intelligence into action with MITRE ATT&CK™
FIRST CTI Symposium: Turning intelligence into action with MITRE ATT&CK™Katie Nickels
 
The New Pentest? Rise of the Compromise Assessment
The New Pentest? Rise of the Compromise AssessmentThe New Pentest? Rise of the Compromise Assessment
The New Pentest? Rise of the Compromise AssessmentInfocyte
 
The Next Generation of Security Operations Centre (SOC)
The Next Generation of Security Operations Centre (SOC)The Next Generation of Security Operations Centre (SOC)
The Next Generation of Security Operations Centre (SOC)PECB
 
SOC Architecture - Building the NextGen SOC
SOC Architecture - Building the NextGen SOCSOC Architecture - Building the NextGen SOC
SOC Architecture - Building the NextGen SOCPriyanka Aash
 
ATTACKers Think in Graphs: Building Graphs for Threat Intelligence
ATTACKers Think in Graphs: Building Graphs for Threat IntelligenceATTACKers Think in Graphs: Building Graphs for Threat Intelligence
ATTACKers Think in Graphs: Building Graphs for Threat IntelligenceMITRE - ATT&CKcon
 
Threat Hunting - Moving from the ad hoc to the formal
Threat Hunting - Moving from the ad hoc to the formalThreat Hunting - Moving from the ad hoc to the formal
Threat Hunting - Moving from the ad hoc to the formalPriyanka Aash
 
SOC presentation- Building a Security Operations Center
SOC presentation- Building a Security Operations CenterSOC presentation- Building a Security Operations Center
SOC presentation- Building a Security Operations CenterMichael Nickle
 

Was ist angesagt? (20)

Global Cyber Threat Intelligence
Global Cyber Threat IntelligenceGlobal Cyber Threat Intelligence
Global Cyber Threat Intelligence
 
Complete Endpoint protection
Complete Endpoint protectionComplete Endpoint protection
Complete Endpoint protection
 
Forcepoint Dynamic Data Protection
Forcepoint Dynamic Data ProtectionForcepoint Dynamic Data Protection
Forcepoint Dynamic Data Protection
 
Security Information and Event Management (SIEM)
Security Information and Event Management (SIEM)Security Information and Event Management (SIEM)
Security Information and Event Management (SIEM)
 
FireEye Solutions
FireEye SolutionsFireEye Solutions
FireEye Solutions
 
Cyber Resilience – Strengthening Cybersecurity Posture & Preparedness by Phil...
Cyber Resilience – Strengthening Cybersecurity Posture & Preparedness by Phil...Cyber Resilience – Strengthening Cybersecurity Posture & Preparedness by Phil...
Cyber Resilience – Strengthening Cybersecurity Posture & Preparedness by Phil...
 
Endpoint Protection
Endpoint ProtectionEndpoint Protection
Endpoint Protection
 
Application Security | Application Security Tutorial | Cyber Security Certifi...
Application Security | Application Security Tutorial | Cyber Security Certifi...Application Security | Application Security Tutorial | Cyber Security Certifi...
Application Security | Application Security Tutorial | Cyber Security Certifi...
 
Splunk Phantom SOAR Roundtable
Splunk Phantom SOAR RoundtableSplunk Phantom SOAR Roundtable
Splunk Phantom SOAR Roundtable
 
Understanding Cyber Kill Chain and OODA loop
Understanding Cyber Kill Chain and OODA loopUnderstanding Cyber Kill Chain and OODA loop
Understanding Cyber Kill Chain and OODA loop
 
Introduction to Cybersecurity
Introduction to CybersecurityIntroduction to Cybersecurity
Introduction to Cybersecurity
 
FIRST CTI Symposium: Turning intelligence into action with MITRE ATT&CK™
FIRST CTI Symposium: Turning intelligence into action with MITRE ATT&CK™FIRST CTI Symposium: Turning intelligence into action with MITRE ATT&CK™
FIRST CTI Symposium: Turning intelligence into action with MITRE ATT&CK™
 
The New Pentest? Rise of the Compromise Assessment
The New Pentest? Rise of the Compromise AssessmentThe New Pentest? Rise of the Compromise Assessment
The New Pentest? Rise of the Compromise Assessment
 
The Next Generation of Security Operations Centre (SOC)
The Next Generation of Security Operations Centre (SOC)The Next Generation of Security Operations Centre (SOC)
The Next Generation of Security Operations Centre (SOC)
 
Security Information Event Management - nullhyd
Security Information Event Management - nullhydSecurity Information Event Management - nullhyd
Security Information Event Management - nullhyd
 
Wazuh Security Platform
Wazuh Security PlatformWazuh Security Platform
Wazuh Security Platform
 
SOC Architecture - Building the NextGen SOC
SOC Architecture - Building the NextGen SOCSOC Architecture - Building the NextGen SOC
SOC Architecture - Building the NextGen SOC
 
ATTACKers Think in Graphs: Building Graphs for Threat Intelligence
ATTACKers Think in Graphs: Building Graphs for Threat IntelligenceATTACKers Think in Graphs: Building Graphs for Threat Intelligence
ATTACKers Think in Graphs: Building Graphs for Threat Intelligence
 
Threat Hunting - Moving from the ad hoc to the formal
Threat Hunting - Moving from the ad hoc to the formalThreat Hunting - Moving from the ad hoc to the formal
Threat Hunting - Moving from the ad hoc to the formal
 
SOC presentation- Building a Security Operations Center
SOC presentation- Building a Security Operations CenterSOC presentation- Building a Security Operations Center
SOC presentation- Building a Security Operations Center
 

Ähnlich wie SentinelOne - NOAH19 Tel Aviv

Y20151003 IoT 資訊安全_趨勢科技分享
Y20151003 IoT 資訊安全_趨勢科技分享Y20151003 IoT 資訊安全_趨勢科技分享
Y20151003 IoT 資訊安全_趨勢科技分享m12016changTIIMP
 
21 Cybersecurity Companies You Need to Know.pptx
21 Cybersecurity Companies You Need to Know.pptx21 Cybersecurity Companies You Need to Know.pptx
21 Cybersecurity Companies You Need to Know.pptxSonaliG6
 
Top Cybersecurity vendors.pptx
Top Cybersecurity vendors.pptxTop Cybersecurity vendors.pptx
Top Cybersecurity vendors.pptxSonaliG6
 
The Next Big Thing in Technology: What innovations will have the biggest impa...
The Next Big Thing in Technology: What innovations will have the biggest impa...The Next Big Thing in Technology: What innovations will have the biggest impa...
The Next Big Thing in Technology: What innovations will have the biggest impa...Career Communications Group
 
Micro Technologies India ltd
Micro Technologies India ltdMicro Technologies India ltd
Micro Technologies India ltdNehul Gupta
 
Phil Carter of IDC: An analyst point of view
Phil Carter of IDC: An analyst point of viewPhil Carter of IDC: An analyst point of view
Phil Carter of IDC: An analyst point of viewVeritas Technologies LLC
 
E magazine april 2018
E magazine april 2018E magazine april 2018
E magazine april 2018VARINDIA
 
No IoT Without Identity
No IoT Without Identity No IoT Without Identity
No IoT Without Identity ForgeRock
 
Foro Empresarial Perú 2017 - Tendencias impactando Ciudades & Negocios
Foro Empresarial Perú 2017 - Tendencias impactando Ciudades & NegociosForo Empresarial Perú 2017 - Tendencias impactando Ciudades & Negocios
Foro Empresarial Perú 2017 - Tendencias impactando Ciudades & NegociosFrancesca Valente
 
Global Cyber Security Overview | TechSci Research
Global Cyber Security Overview | TechSci Research Global Cyber Security Overview | TechSci Research
Global Cyber Security Overview | TechSci Research TechSci Research
 
CIO Bulletin - 10 Best Cyber Security Companies
CIO Bulletin - 10 Best Cyber Security CompaniesCIO Bulletin - 10 Best Cyber Security Companies
CIO Bulletin - 10 Best Cyber Security CompaniesCIOBulletin1
 
CE Cybersecurity Trends and Strategies for Hosting in the Cloud
CE Cybersecurity Trends and Strategies for Hosting in the CloudCE Cybersecurity Trends and Strategies for Hosting in the Cloud
CE Cybersecurity Trends and Strategies for Hosting in the CloudCase IQ
 
Data Security Solutions @ Lithuania CIO Forum 2015 - Mobility will happen by ...
Data Security Solutions @ Lithuania CIO Forum 2015 - Mobility will happen by ...Data Security Solutions @ Lithuania CIO Forum 2015 - Mobility will happen by ...
Data Security Solutions @ Lithuania CIO Forum 2015 - Mobility will happen by ...Andris Soroka
 
WP-Privacy-IoT-Era - PRODUCTION
WP-Privacy-IoT-Era - PRODUCTIONWP-Privacy-IoT-Era - PRODUCTION
WP-Privacy-IoT-Era - PRODUCTIONJohn Pinson
 
Security of Things World 2016 - Post Event Report
Security of Things World 2016 - Post Event ReportSecurity of Things World 2016 - Post Event Report
Security of Things World 2016 - Post Event ReportRamona Kohrs
 
Automotive Cybersecurity: Shifting into Overdrive
Automotive Cybersecurity: Shifting into OverdriveAutomotive Cybersecurity: Shifting into Overdrive
Automotive Cybersecurity: Shifting into Overdriveaccenture
 
IoT services in the automotive sector
IoT services in the automotive sectorIoT services in the automotive sector
IoT services in the automotive sectorPRIME
 
Open Source Insight: Hospital, Medical Devices, Banking, and Automotive Cyber...
Open Source Insight: Hospital, Medical Devices, Banking, and Automotive Cyber...Open Source Insight: Hospital, Medical Devices, Banking, and Automotive Cyber...
Open Source Insight: Hospital, Medical Devices, Banking, and Automotive Cyber...Black Duck by Synopsys
 

Ähnlich wie SentinelOne - NOAH19 Tel Aviv (20)

Y20151003 IoT 資訊安全_趨勢科技分享
Y20151003 IoT 資訊安全_趨勢科技分享Y20151003 IoT 資訊安全_趨勢科技分享
Y20151003 IoT 資訊安全_趨勢科技分享
 
21 Cybersecurity Companies You Need to Know.pptx
21 Cybersecurity Companies You Need to Know.pptx21 Cybersecurity Companies You Need to Know.pptx
21 Cybersecurity Companies You Need to Know.pptx
 
Top Cybersecurity vendors.pptx
Top Cybersecurity vendors.pptxTop Cybersecurity vendors.pptx
Top Cybersecurity vendors.pptx
 
The Next Big Thing in Technology: What innovations will have the biggest impa...
The Next Big Thing in Technology: What innovations will have the biggest impa...The Next Big Thing in Technology: What innovations will have the biggest impa...
The Next Big Thing in Technology: What innovations will have the biggest impa...
 
Micro Technologies India ltd
Micro Technologies India ltdMicro Technologies India ltd
Micro Technologies India ltd
 
Phil Carter of IDC: An analyst point of view
Phil Carter of IDC: An analyst point of viewPhil Carter of IDC: An analyst point of view
Phil Carter of IDC: An analyst point of view
 
E magazine april 2018
E magazine april 2018E magazine april 2018
E magazine april 2018
 
No IoT Without Identity
No IoT Without Identity No IoT Without Identity
No IoT Without Identity
 
Foro Empresarial Perú 2017 - Tendencias impactando Ciudades & Negocios
Foro Empresarial Perú 2017 - Tendencias impactando Ciudades & NegociosForo Empresarial Perú 2017 - Tendencias impactando Ciudades & Negocios
Foro Empresarial Perú 2017 - Tendencias impactando Ciudades & Negocios
 
Global Cyber Security Overview | TechSci Research
Global Cyber Security Overview | TechSci Research Global Cyber Security Overview | TechSci Research
Global Cyber Security Overview | TechSci Research
 
CIO Bulletin - 10 Best Cyber Security Companies
CIO Bulletin - 10 Best Cyber Security CompaniesCIO Bulletin - 10 Best Cyber Security Companies
CIO Bulletin - 10 Best Cyber Security Companies
 
CE Cybersecurity Trends and Strategies for Hosting in the Cloud
CE Cybersecurity Trends and Strategies for Hosting in the CloudCE Cybersecurity Trends and Strategies for Hosting in the Cloud
CE Cybersecurity Trends and Strategies for Hosting in the Cloud
 
Data Security Solutions @ Lithuania CIO Forum 2015 - Mobility will happen by ...
Data Security Solutions @ Lithuania CIO Forum 2015 - Mobility will happen by ...Data Security Solutions @ Lithuania CIO Forum 2015 - Mobility will happen by ...
Data Security Solutions @ Lithuania CIO Forum 2015 - Mobility will happen by ...
 
WP-Privacy-IoT-Era - PRODUCTION
WP-Privacy-IoT-Era - PRODUCTIONWP-Privacy-IoT-Era - PRODUCTION
WP-Privacy-IoT-Era - PRODUCTION
 
Security of Things World 2016 - Post Event Report
Security of Things World 2016 - Post Event ReportSecurity of Things World 2016 - Post Event Report
Security of Things World 2016 - Post Event Report
 
The New Style of Business
The New Style of Business The New Style of Business
The New Style of Business
 
SMAC -IoT Technology
SMAC -IoT TechnologySMAC -IoT Technology
SMAC -IoT Technology
 
Automotive Cybersecurity: Shifting into Overdrive
Automotive Cybersecurity: Shifting into OverdriveAutomotive Cybersecurity: Shifting into Overdrive
Automotive Cybersecurity: Shifting into Overdrive
 
IoT services in the automotive sector
IoT services in the automotive sectorIoT services in the automotive sector
IoT services in the automotive sector
 
Open Source Insight: Hospital, Medical Devices, Banking, and Automotive Cyber...
Open Source Insight: Hospital, Medical Devices, Banking, and Automotive Cyber...Open Source Insight: Hospital, Medical Devices, Banking, and Automotive Cyber...
Open Source Insight: Hospital, Medical Devices, Banking, and Automotive Cyber...
 

Mehr von NOAH Advisors

NOAH16 Berlin Fund Book
NOAH16 Berlin Fund BookNOAH16 Berlin Fund Book
NOAH16 Berlin Fund BookNOAH Advisors
 
NOAH19 Tel Aviv Speaker Book
NOAH19 Tel Aviv Speaker BookNOAH19 Tel Aviv Speaker Book
NOAH19 Tel Aviv Speaker BookNOAH Advisors
 
NOAH19 Tel Aviv Investor Book
NOAH19 Tel Aviv Investor BookNOAH19 Tel Aviv Investor Book
NOAH19 Tel Aviv Investor BookNOAH Advisors
 
NOAH19 London Startup Book
NOAH19 London Startup BookNOAH19 London Startup Book
NOAH19 London Startup BookNOAH Advisors
 
NOAH19 London Service Provider Book
NOAH19 London Service Provider BookNOAH19 London Service Provider Book
NOAH19 London Service Provider BookNOAH Advisors
 
NOAH19 London Investor Book
NOAH19 London Investor BookNOAH19 London Investor Book
NOAH19 London Investor BookNOAH Advisors
 
NOAH19 Berlin Launchpad 100
NOAH19 Berlin Launchpad 100NOAH19 Berlin Launchpad 100
NOAH19 Berlin Launchpad 100NOAH Advisors
 
NOAH19 Berlin Investor Book
NOAH19 Berlin Investor BookNOAH19 Berlin Investor Book
NOAH19 Berlin Investor BookNOAH Advisors
 
NOAH18 Tel Aviv Speaker Book
NOAH18 Tel Aviv Speaker BookNOAH18 Tel Aviv Speaker Book
NOAH18 Tel Aviv Speaker BookNOAH Advisors
 
NOAH18 Tel Aviv Investor Book
NOAH18 Tel Aviv Investor BookNOAH18 Tel Aviv Investor Book
NOAH18 Tel Aviv Investor BookNOAH Advisors
 
NOAH18 London Startup Book
NOAH18 London Startup BookNOAH18 London Startup Book
NOAH18 London Startup BookNOAH Advisors
 
NOAH18 London Speaker Book
NOAH18 London Speaker BookNOAH18 London Speaker Book
NOAH18 London Speaker BookNOAH Advisors
 
NOAH18 London Service Provider Book
NOAH18 London Service Provider BookNOAH18 London Service Provider Book
NOAH18 London Service Provider BookNOAH Advisors
 
NOAH18 London Investor Book
NOAH18 London Investor BookNOAH18 London Investor Book
NOAH18 London Investor BookNOAH Advisors
 
NOAH18 Berlin Speaker Book
NOAH18 Berlin Speaker BookNOAH18 Berlin Speaker Book
NOAH18 Berlin Speaker BookNOAH Advisors
 
NOAH18 Berlin Service Provider Book
NOAH18 Berlin Service Provider BookNOAH18 Berlin Service Provider Book
NOAH18 Berlin Service Provider BookNOAH Advisors
 
NOAH18 Berlin Investor Book
NOAH18 Berlin Investor BookNOAH18 Berlin Investor Book
NOAH18 Berlin Investor BookNOAH Advisors
 
NOAH17 Berlin Speaker Book
NOAH17 Berlin Speaker BookNOAH17 Berlin Speaker Book
NOAH17 Berlin Speaker BookNOAH Advisors
 
NOAH17 London Investor Book
NOAH17 London Investor BookNOAH17 London Investor Book
NOAH17 London Investor BookNOAH Advisors
 
NOAH17 Berlin Speaker Book
NOAH17 Berlin Speaker BookNOAH17 Berlin Speaker Book
NOAH17 Berlin Speaker BookNOAH Advisors
 

Mehr von NOAH Advisors (20)

NOAH16 Berlin Fund Book
NOAH16 Berlin Fund BookNOAH16 Berlin Fund Book
NOAH16 Berlin Fund Book
 
NOAH19 Tel Aviv Speaker Book
NOAH19 Tel Aviv Speaker BookNOAH19 Tel Aviv Speaker Book
NOAH19 Tel Aviv Speaker Book
 
NOAH19 Tel Aviv Investor Book
NOAH19 Tel Aviv Investor BookNOAH19 Tel Aviv Investor Book
NOAH19 Tel Aviv Investor Book
 
NOAH19 London Startup Book
NOAH19 London Startup BookNOAH19 London Startup Book
NOAH19 London Startup Book
 
NOAH19 London Service Provider Book
NOAH19 London Service Provider BookNOAH19 London Service Provider Book
NOAH19 London Service Provider Book
 
NOAH19 London Investor Book
NOAH19 London Investor BookNOAH19 London Investor Book
NOAH19 London Investor Book
 
NOAH19 Berlin Launchpad 100
NOAH19 Berlin Launchpad 100NOAH19 Berlin Launchpad 100
NOAH19 Berlin Launchpad 100
 
NOAH19 Berlin Investor Book
NOAH19 Berlin Investor BookNOAH19 Berlin Investor Book
NOAH19 Berlin Investor Book
 
NOAH18 Tel Aviv Speaker Book
NOAH18 Tel Aviv Speaker BookNOAH18 Tel Aviv Speaker Book
NOAH18 Tel Aviv Speaker Book
 
NOAH18 Tel Aviv Investor Book
NOAH18 Tel Aviv Investor BookNOAH18 Tel Aviv Investor Book
NOAH18 Tel Aviv Investor Book
 
NOAH18 London Startup Book
NOAH18 London Startup BookNOAH18 London Startup Book
NOAH18 London Startup Book
 
NOAH18 London Speaker Book
NOAH18 London Speaker BookNOAH18 London Speaker Book
NOAH18 London Speaker Book
 
NOAH18 London Service Provider Book
NOAH18 London Service Provider BookNOAH18 London Service Provider Book
NOAH18 London Service Provider Book
 
NOAH18 London Investor Book
NOAH18 London Investor BookNOAH18 London Investor Book
NOAH18 London Investor Book
 
NOAH18 Berlin Speaker Book
NOAH18 Berlin Speaker BookNOAH18 Berlin Speaker Book
NOAH18 Berlin Speaker Book
 
NOAH18 Berlin Service Provider Book
NOAH18 Berlin Service Provider BookNOAH18 Berlin Service Provider Book
NOAH18 Berlin Service Provider Book
 
NOAH18 Berlin Investor Book
NOAH18 Berlin Investor BookNOAH18 Berlin Investor Book
NOAH18 Berlin Investor Book
 
NOAH17 Berlin Speaker Book
NOAH17 Berlin Speaker BookNOAH17 Berlin Speaker Book
NOAH17 Berlin Speaker Book
 
NOAH17 London Investor Book
NOAH17 London Investor BookNOAH17 London Investor Book
NOAH17 London Investor Book
 
NOAH17 Berlin Speaker Book
NOAH17 Berlin Speaker BookNOAH17 Berlin Speaker Book
NOAH17 Berlin Speaker Book
 

Kürzlich hochgeladen

How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DaySri Ambati
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 

Kürzlich hochgeladen (20)

How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 

SentinelOne - NOAH19 Tel Aviv

  • 2.  @NOAHConference  @noah_conference  @noah-conference  @NOAHConference FOLLOW USONSOCIAL
  • 3. CYBERSECURITY IS FOUNDATIONAL TO OUR WAY OF LIFE Every product and every service are becoming digital 1
  • 4. OUR GATEWAY TO DATA ARE THE DEVICES WE USE Endpoints and IoT devices are conversing directly with the cloud, data centers, and services 2
  • 5. >1.5MM cybersecurity jobs unfilled by 2020 Source: Frost & Sullivan and (ISC) NOT ENOUGH PEOPLE TO SCALE CYBER SECURITY 3
  • 6. WE ARE EVOLVING SECURITY INFRASTRUCTURE ON A GLOBAL SCALE By rebuilding the endpoint security stack and using AI to protect from cyber threats, and regulate unprivileged access 4
  • 7. Customers 3 of the Fortune 10, and… Airline in Asia Global credit card company French Banking GroupUS airline for travel comfort US airline for travel comfort Weekly periodical Healthcare logistics company SMB cybersecurity company CRM Platform HCM software Online music radio Big data platform Cosmetics manufacturer Japanese heavy machinery manufacturer Photo printing company US public university system Airline in Norway Sports car company Financial data platform Cloud software company Big data analytics company Hyperconverged storage software company Oil & Gas Corporation Casino in France Political publi Railwa Sanitation Se Perfume De #1 #1 #1 #1 #1 #1#1 #1#1 #1 #1 #1 #1 #1 #1 #1 #1 #1 #1 #1 #1 #1 #1 #1 #1 #1 #1 #1 #1 #1
  • 8. BEHAVIORAL AI IS CHANGING THE GAME Highly scalable, fully automated and effective against any vector of attack Malware Ransomware Process migration Privilege escalation Key logging Lateral movement Live off the land
  • 12. Platform Orchestration SIEM CASB Cloud Mobile * IT Ops/Mgmt Firewall Signifies not yet announced integrations.* * Product Platform Coverage * SDK S1 Nexus Integration Ecosystem Unlock the Power of an API-First Approach S1 Nexus Embedded AI SDK Anti-Phishing CompatibilityThreat Intel Cyber Services
  • 13.
  • 14. THE OPPORTUNITY AV, EDR, Datacenter, Enterprise IoT Endpoint (AV) $17.4BN $2.3BN EDR TODAY Datacenter $15BN (2023) $4.1BN (2021) EIoT FUTURE $19.6BN $19.1BN + $38.7BN
  • 15. THANK YOU * REAL HUBBLE TELESCOPE IMAGE OF THE TRANTULA NEBULA, 170,000 LIGHT YEARS AWAY