SlideShare ist ein Scribd-Unternehmen logo
1 von 7
Secure your
Endpoints
Use a Firewall
Continuously
Monitor the
Network
Don’t Sit on a 2 leg Stool!
Because you will eventually fall and get hurt
Don’t Sit on a 2 leg
Stool!
Why You Need “Continuous Network Monitoring”
Netwatcher.com
Why Do Continuous Monitoring?
• Fortune 5000 companies have been doing advanced
cyber security for over 15 years and using all levels of
the cyber security maturity stool.
• Why? Because a layered approach is the only way to
cover your bases and reduce your risk of compromise
• Why? Industry compliance standards (HIPAA, GLBA,
FINRA, PCI-DSS etc.) compliance all require network
monitoring
• Why? Most companies are exploited because a user
lets a bad actor into the network & not a bad actor
breaking in on their own.
• Why? Because the median number of days that
attackers were present on a victim’s network before
being discovered is 146 days (more).
Secure Your Endpoints (laptop, phone etc.)
Endpoint protection consists of security solutions that address endpoint security issues, securing and protecting
endpoints against zero-day exploits, attacks, and inadvertent data leakage resulting from human error.
• Signature Based Anti Virus – Monitors memory, images & binaries for known malware
signatures.
• Endpoint Firewall – Monitors what TCP/IP ports the user of endpoint can use to
communicate.
• Virtual Private Network - Enables users to send and receive data across the Internet as if
their endpoint were directly connected to the private network.
• Web content filtering – Monitors what HTTP(S) sites user visits for malware and other
nefarious activity (pornography etc.)
• Host intrusion protection – Monitors important operating system activities to ensure
protection against malware intrusion.
• Behavior analysis – Monitors the behavior of all processes for potential harmful action.
Keep the bad actor from being able
To take control of your assets…
What happens if you don’t have endpoint security: Every time a user goes to a website, opens
an email or download a file your company is at risk of being owned!
Use a Firewall
A network security system that monitors and controls the incoming and outgoing network traffic based on predetermined
security rules. A firewall typically establishes a barrier between a trusted, secure internal network and the Internet, that is
assumed not to be trusted (secure).
• If you are using an internet provider’s router it does Network Address Translation
(NAT) converting an external IP address range to an internal IP address range –
this provides a certain level of traffic filtering.
• Layer 3 Firewall - A packet filter which looks at network addresses, ports and
services of the packet and determines if the packet should be allowed or blocked.
(example: block all inbound traffic from Iran; block a list of known bad IP
addresses; block all inbound HTTPS/443 traffic but allow outbound HTTPS/443
traffic)
• Layer 7 Firewall (or application firewall, or Next Generation Firewall or Intrusion
Protection or Unified Threat Management or Web Application Firewall) – A
packet filter which looks at the content of an application and determines if the
packet should be allowed or blocked. (example: block all pornography)
Keep the bad actor from being able
To get into the network…
What happens if you don’t have a firewall: Then your endpoint(s) is/are exposed directly to the
internet. Any services running on the endpoint will be accessible for attempted compromise and
reconnaissance.
Continuously
Monitor the Network
• Log Monitoring (SEM) - Provide real-time analysis of security alerts generated
by network hardware and applications.
• Intrusion Detection (IDS) – Monitors network via Deep Packet Inspection for
malicious activity or policy violations.
• Net Flow Analysis – Monitor the analytics of a networks traffic
• Active Scanning – Assess computers, networks & applications for weaknesses.
• Advanced Correlation – 1. Monitor events from the SEM, IDS, Net Flow and
Scanning over time for poor security hygiene, security vulnerabilities and
exploits 2. Classify severity of the issue 3. Alert others via a workflow based on
the severity of the issue.
What happens if you don’t do continuous monitoring: You may miss attacks on other IOT devices (smart TVs on board room walls, printers,
smart phones). You may miss root-kits that have compromised assets. You may miss poor behavior by the staff using vulnerable/risky
software or going to nefarious websites or sending data over the internet in clear text all of which will lead to your company being breached.
Monitor the network in case someone lets a bad
actor through the firewall by un-intentionally
creating a security vulnerability … Monitor if an
Endpoint gets exploited…
If all you have is this…
NetWatcher can do the rest
Easy to use, Easy to install, Accurate, Affordable,
Enterprise Security… Starting as low as
$299/month…

Weitere ähnliche Inhalte

Kürzlich hochgeladen

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Kürzlich hochgeladen (20)

Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 

Empfohlen

Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
Kurio // The Social Media Age(ncy)
 

Empfohlen (20)

AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
 
Skeleton Culture Code
Skeleton Culture CodeSkeleton Culture Code
Skeleton Culture Code
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
 
12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work
 
ChatGPT webinar slides
ChatGPT webinar slidesChatGPT webinar slides
ChatGPT webinar slides
 
More than Just Lines on a Map: Best Practices for U.S Bike Routes
More than Just Lines on a Map: Best Practices for U.S Bike RoutesMore than Just Lines on a Map: Best Practices for U.S Bike Routes
More than Just Lines on a Map: Best Practices for U.S Bike Routes
 

Don’t sit on a 2 leg stool

  • 1. Secure your Endpoints Use a Firewall Continuously Monitor the Network Don’t Sit on a 2 leg Stool! Because you will eventually fall and get hurt Don’t Sit on a 2 leg Stool! Why You Need “Continuous Network Monitoring” Netwatcher.com
  • 2. Why Do Continuous Monitoring? • Fortune 5000 companies have been doing advanced cyber security for over 15 years and using all levels of the cyber security maturity stool. • Why? Because a layered approach is the only way to cover your bases and reduce your risk of compromise • Why? Industry compliance standards (HIPAA, GLBA, FINRA, PCI-DSS etc.) compliance all require network monitoring • Why? Most companies are exploited because a user lets a bad actor into the network & not a bad actor breaking in on their own. • Why? Because the median number of days that attackers were present on a victim’s network before being discovered is 146 days (more).
  • 3. Secure Your Endpoints (laptop, phone etc.) Endpoint protection consists of security solutions that address endpoint security issues, securing and protecting endpoints against zero-day exploits, attacks, and inadvertent data leakage resulting from human error. • Signature Based Anti Virus – Monitors memory, images & binaries for known malware signatures. • Endpoint Firewall – Monitors what TCP/IP ports the user of endpoint can use to communicate. • Virtual Private Network - Enables users to send and receive data across the Internet as if their endpoint were directly connected to the private network. • Web content filtering – Monitors what HTTP(S) sites user visits for malware and other nefarious activity (pornography etc.) • Host intrusion protection – Monitors important operating system activities to ensure protection against malware intrusion. • Behavior analysis – Monitors the behavior of all processes for potential harmful action. Keep the bad actor from being able To take control of your assets… What happens if you don’t have endpoint security: Every time a user goes to a website, opens an email or download a file your company is at risk of being owned!
  • 4. Use a Firewall A network security system that monitors and controls the incoming and outgoing network traffic based on predetermined security rules. A firewall typically establishes a barrier between a trusted, secure internal network and the Internet, that is assumed not to be trusted (secure). • If you are using an internet provider’s router it does Network Address Translation (NAT) converting an external IP address range to an internal IP address range – this provides a certain level of traffic filtering. • Layer 3 Firewall - A packet filter which looks at network addresses, ports and services of the packet and determines if the packet should be allowed or blocked. (example: block all inbound traffic from Iran; block a list of known bad IP addresses; block all inbound HTTPS/443 traffic but allow outbound HTTPS/443 traffic) • Layer 7 Firewall (or application firewall, or Next Generation Firewall or Intrusion Protection or Unified Threat Management or Web Application Firewall) – A packet filter which looks at the content of an application and determines if the packet should be allowed or blocked. (example: block all pornography) Keep the bad actor from being able To get into the network… What happens if you don’t have a firewall: Then your endpoint(s) is/are exposed directly to the internet. Any services running on the endpoint will be accessible for attempted compromise and reconnaissance.
  • 5. Continuously Monitor the Network • Log Monitoring (SEM) - Provide real-time analysis of security alerts generated by network hardware and applications. • Intrusion Detection (IDS) – Monitors network via Deep Packet Inspection for malicious activity or policy violations. • Net Flow Analysis – Monitor the analytics of a networks traffic • Active Scanning – Assess computers, networks & applications for weaknesses. • Advanced Correlation – 1. Monitor events from the SEM, IDS, Net Flow and Scanning over time for poor security hygiene, security vulnerabilities and exploits 2. Classify severity of the issue 3. Alert others via a workflow based on the severity of the issue. What happens if you don’t do continuous monitoring: You may miss attacks on other IOT devices (smart TVs on board room walls, printers, smart phones). You may miss root-kits that have compromised assets. You may miss poor behavior by the staff using vulnerable/risky software or going to nefarious websites or sending data over the internet in clear text all of which will lead to your company being breached. Monitor the network in case someone lets a bad actor through the firewall by un-intentionally creating a security vulnerability … Monitor if an Endpoint gets exploited…
  • 6. If all you have is this…
  • 7. NetWatcher can do the rest Easy to use, Easy to install, Accurate, Affordable, Enterprise Security… Starting as low as $299/month…