SlideShare ist ein Scribd-Unternehmen logo
1 von 33
Downloaden Sie, um offline zu lesen
Trends in the Israeli
  Information Security Market
              2008
Shahar Geiger Maor
Analyst, STKI
shahar@stki.info
Information Security Threatscape




   Your Text here        Your Text here




                                          2
Global Security Mega Trends -Threat Horizon

Outside threats: Hackers and organized crime have
 joined hands
Inside threats: The human factor is the key
Application Attacks become more prevalent
There Yourno here
        is Text single logical place to put a “perimeter”
                                              Your Text here

 around the organization:
 Hackers focus on new and emerging technologies




           All Rights Reserved @STKI Moshav Bnei Zion, Israel +972 9 74 444 74 www.stki.info   3
General Trends for 2008
Virtual Machine Security Implications:
  • Virtualization made big headlines in 2007 with major
    players going public
  • The industry hasn’t fully explored the security implications
    of virtual technology
       Your Text here                                                                         Your Text here
Mobile Platforms:
  • Interest in mobile security has never been higher
  • Phones become more complex, more interesting and more
    connected
  • Attackers may take advantage


          All Rights Reserved @STKI Moshav Bnei Zion, Israel +972 9 74 444 74 www.stki.info                    4
General Trends for 2008 – The Human
  Factor
 CISOs tend to trust products and technologies
 One persons mistake can expose a well-protected
  organization
 Attackers know how to exploit the weaknesses of
  human nature:
  •   Greed here
        Your Text                                                                             Your Text here
  •   “Flockquot; mentality
  •   Trust assertive figures
  •   The need to please
 Human weaknesses have no airtight solution
  (Training?)


          All Rights Reserved @STKI Moshav Bnei Zion, Israel +972 9 74 444 74 www.stki.info                    5
The Relative Seriousness of IT
Security Threats




   Your Text here                                                                         Your Text here




      All Rights Reserved @STKI Moshav Bnei Zion, Israel +972 9 74 444 74 www.stki.info                    6
STKI Survey 2008:
100%
90%
80%
70%
60%
50%
                                                                                                                      Israel
40%
             Your Text here                                                                          Your Text here
30%                                                                                                                   World
20%
10%
 0%
       Careless/risky behavior            Lost or stolen laptops and                       At least 90% of
        by employees is the             computer media are the most                        employees follow
        most serious internal              serious technical threat                        security policies
           security threat
                                                                          Source: STKI, CIO Insight 2008
                 All Rights Reserved @STKI Moshav Bnei Zion, Israel +972 9 74 444 74 www.stki.info                             7
STKI survey results




   Your Text here                                                                    Your Text here




          All Rights Reserved @STKI Moshav Bnei Zion, Israel +972 9 74 444 74 www.stki.info           8
Am I Vulnerable?
 There is no such thing as quot;securequot;
 Despite the advanced systems, it's hard to know for
  sure
 High demand for penetration testing, risk
  assessments
       Your Text here                  Your Text here
 Many organizations are realizing the importance of a
  neutral party
 Market is dominated by small and medium consulting
  companies



         All Rights Reserved @STKI Moshav Bnei Zion, Israel +972 9 74 444 74 www.stki.info   9
The Cost of Security
              Dollar Amount Losses by Type of Attack (Top 5,
                             Thousands $)

                                   Financial Fraud
                                                                                                    21,124,750$

                     )Virus (Worms/Spyware                                           8,391,800$
        Your Text here                                                                       Your Text here

        System Penetration by Outsiders                                          6,875,000$

Theft of Confidential Data (Not Including
                                                                              5,685,000$
            )Mobile Devices

                      Laptop or Mobile Theft                             3,881,150$

                                                                           (Source: CSI Survey 2007)
                                                                                                                  10
         All Rights Reserved @STKI Moshav Bnei Zion, Israel +972 9 74 444 74 www.stki.info
World Security Technologies Used

                                      (By Percent of Respondents)
               )Four Most Common(
                    Antivirus Software                                                                                 98%
                                     Firewall                                                                          97%

            Your Text here                VPN                                                                    84%
                                                                                                    Your Text here
              Anti-Spyware Software                                                                          80%
                )Four Less Common(
             Public Key Infrastucture                                         32%
Specialized Wireless Security Systems                                      28%
                                   EPS/NAC                                27%
                                Biometrics                          18%
                                                                              (Source: CSI Survey 2007)
                All Rights Reserved @STKI Moshav Bnei Zion, Israel +972 9 74 444 74 www.stki.info                        11
What Interest Our Clients? 2007-2008



                                                     Firewall/
                 Miscellaneous                      Application
                                                     Firewall                                  Endpoint Security
                     20%                                                                            11%
                                                        12%
    Your Text here                                                                                     Mail/ Mobile
                                                                                            Your Text here
  Market Trends                                                                                    Device Encryption
      18%                                                                                                 8%
                                                                                   NAC
                                                                                   7%
                                                     IDM
                                                      6%


   URL Filtering              Antivirus                                        SIEM/SOC
       6%                       6%                                                6%

        All Rights Reserved @STKI Moshav Bnei Zion, Israel +972 9 74 444 74 www.stki.info                          12
STKI survey results




   Your Text here                                                 Your Text here




                    All Rights Reserved @STKI Moshav Bnei Zion,
                        Israel +972 9 74 444 74 www.stki.info
                                                                                   13
Endpoint Security




  Your Text here    Your Text here




                                     14
Endpoint Security
 The Endpoint is a major threat
 Risk Factors:
   •   Spyware
   •   Viruses
   •   Website with malicious code
   •   External here
          Your Text
                    devices carrying information                                                Your Text here
 Even when you have protection systems, they can’t
  be trusted:
   •Users Circumvent the systems for comfort
   •Communication problems prevent updates
   •New stations or guests with no protection
   •Infiltration of unprotected systems
 The Solution: NAC…
            All Rights Reserved @STKI Moshav Bnei Zion, Israel +972 9 74 444 74 www.stki.info                    15
Endpoint Security – Continue
 Device Management is in the spotlight
 Major players enter the market – McAfee, Checkpoint,
  Symantec
 Leading Solutions in Israel:
  •   Checkpoint -Pointsec Protector
  •   ControlGuard -Endpoint Access ManagerYour Text here
        Your Text here

  •   McAfee -Host Intrusion Prevention
  •   SafeEnd -Protector
  •   Symantec -Endpoint Protection
 Most of our clients use a product, or in advanced
  integration stages
 Device Management will become default soon
                                                                                              16
          All Rights Reserved @STKI Moshav Bnei Zion, Israel +972 9 74 444 74 www.stki.info
Network AccessAdmission Control




   Your Text here        Your Text here




                                          17
Trends -Network Admission/
   Access Control (NAC)
 NAC was invented by Cisco, but never standardized
 Standardization is expected in the coming years
 Even the acronym of NAC isn't clear
 Products exist, but experts can't agree on their
  effectiveness
       Your Text here                   Your Text here

 There are problems with non-PC hardware
 Many of our customers are interested
 Majority of customers: researching or doing POC



        All Rights Reserved @STKI Moshav Bnei Zion, Israel +972 9 74 444 74 www.stki.info   18
World NAC Players




  Your Text here                     Your Text here




                                                      19
                   Source: Gartner
World NAC Players




  Your Text here    Your Text here




                                     20
Israeli NAC Players
Leading Solutions:
•   Access Layers
•   Cisco
•   Enterasys
•   ForeScout
•   Insightix Text here
          Your            Your Text here

•   McAfee
•   Microsoft
•   Nortel
•   Symantec
•   XOR

                                           21
STKI Insights
NAC can be deployed less expensively when it is an
 embedded feature
Many of the infrastructure-based solutions won’t not
 work with older LAN switch product families - Some
 organizations will wait for newer versions Text here
        Your Text here                    Your
Some network and security vendors already have
 solutions that can be part of the NAC process (AC, IPS) –
 An important starting point for market domination
 First priority: implement a guest networking control
NAC is a Layer 2 vs. Layer 3 match

                                                       22
Data Leak/Loss Prevention




  Your Text here    Your Text here




                                     23
Data Leak /Loss Prevention (DLP)

 DLP is an overall framework into which different elements fit
 There are three types of data that may leak:
   • Data at rest
   • Data in transit
   • Data on endpoints
 No single DLP focus area is foolproof, so enforcinghere three
          Your Text here                         Your Text
                                                           all
  makes problems less likely
 DLP is a growing area, and vendors react accordingly
 It is suggested to use full-suite vendors in order
  to avoid integration problems


           All Rights Reserved @STKI Moshav Bnei Zion, Israel +972 9 74 444 74 www.stki.info   24
Data Leak /Loss Prevention –World Trends




      Your Text here                                                                         Your Text here




     Source: Aberdeen Report 2008


         All Rights Reserved @STKI Moshav Bnei Zion, Israel +972 9 74 444 74 www.stki.info                    25
Data Leak /Loss Prevention –EMEA Trends




      Your Text here                                                                         Your Text here




     Source: Aberdeen Report 2008


         All Rights Reserved @STKI Moshav Bnei Zion, Israel +972 9 74 444 74 www.stki.info                    26
DLP –Market Status & Players
World Leaders:
  •   Symantec (Acquired Vontu, 2007, 350$ M)
  •   Websense (Acquired PortAuthority 2007, 90$ M)
  •   Reconnex (Acquired by McAfee, July 2008, 46$ M)
  •   Tablus Text here
          Your (Acquired by RSA, 2007, 40$ M) Your Text here
  •   Vericept ?
Main drivers for DLP are:
  • Regulations such as Payment Card Industry (PCI),
    Accountability Act (HIPAA)
  • e-mail security, instant messaging (IM) and
    endpoint monitoring solutions
            All Rights Reserved @STKI Moshav Bnei Zion, Israel +972 9 74 444 74 www.stki.info   27
Mobile Devices Security




  Your Text here     Your Text here




                                      28
Mobile Devices Security
 Mobile devices like Smartphones and PDAs are becoming
  common
 Price drops make the phones attractive
 Now, some users sync, but it will expand, mostly at the
  workplace
 Rich apps are on the horizon
        Your Text here                        Your Text here
 Portable devices are prone to theft, loss and tapping (BT)
 There are inadequate solutions according to Israeli users
 We expect major developments and maturity
 Major players enter the market




           All Rights Reserved @STKI Moshav Bnei Zion, Israel +972 9 74 444 74 www.stki.info   29
Inadequate Mobile Security?




            Your Text here           Your Text here




Source: SafeNet Annual Survey 2008                    30
STKI Survey 2008:
40%
35%
30%
25%
20%
                                                                                                                     Israel
15%        Your Text here                                                                         Your Text here
                                                                                                                     World
10%
5%
0%
      Adequate solution   Inadequate                              Plan to install                 Don't know /No
          in place      solution in place                           /Currently                     plan to install
                                                                     installing
                                                                       Source: STKI, CIO Insight 2008
              All Rights Reserved @STKI Moshav Bnei Zion, Israel +972 9 74 444 74 www.stki.info                      31
Trends for 2009

DLP!
Data Monitoring
Mobile Security
NAC Your Text here   Your Text here




                                       32
Trends In The Israeli Information Security Market 2008

Weitere ähnliche Inhalte

Was ist angesagt?

2019 CYBER SECURITY TRENDS REPORT REVIEW
2019 CYBER SECURITY TRENDS REPORT REVIEW2019 CYBER SECURITY TRENDS REPORT REVIEW
2019 CYBER SECURITY TRENDS REPORT REVIEWSylvain Martinez
 
VTI Learning Series Beyond the Convergence of Physical & Cyber Security
VTI Learning Series Beyond the Convergence of Physical & Cyber SecurityVTI Learning Series Beyond the Convergence of Physical & Cyber Security
VTI Learning Series Beyond the Convergence of Physical & Cyber SecurityShane Glenn
 
Security 2 Q 07[1]
Security 2 Q 07[1]Security 2 Q 07[1]
Security 2 Q 07[1]Sharpe Smith
 
2015 Global Threat Intelligence Report Executive Summary | NTT i3
2015 Global Threat Intelligence Report Executive Summary | NTT i32015 Global Threat Intelligence Report Executive Summary | NTT i3
2015 Global Threat Intelligence Report Executive Summary | NTT i3NTT Innovation Institute Inc.
 
A6704d01
A6704d01A6704d01
A6704d01mudigonda
 
NUS-ISS Learning Day 2017 - Security Dynamics - Moving IoT and Beyond
NUS-ISS Learning Day 2017 - Security Dynamics - Moving IoT and BeyondNUS-ISS Learning Day 2017 - Security Dynamics - Moving IoT and Beyond
NUS-ISS Learning Day 2017 - Security Dynamics - Moving IoT and BeyondNUS-ISS
 
A Thorough Study on Video Integrity using Blockchain
A Thorough Study on Video Integrity using BlockchainA Thorough Study on Video Integrity using Blockchain
A Thorough Study on Video Integrity using Blockchainijtsrd
 
Bapinger Network Security
Bapinger Network SecurityBapinger Network Security
Bapinger Network SecurityDjadja Sardjana
 
Exposing the Money Behind Malware
Exposing the Money Behind MalwareExposing the Money Behind Malware
Exposing the Money Behind MalwareSophos
 
Video Conferencing and Security
Video Conferencing and SecurityVideo Conferencing and Security
Video Conferencing and SecurityVideoguy
 
DSS ITSEC Conference 2012 - SIEM Q1 Labs IBM Security Systems Intelligence
DSS ITSEC Conference 2012 - SIEM Q1 Labs IBM Security Systems IntelligenceDSS ITSEC Conference 2012 - SIEM Q1 Labs IBM Security Systems Intelligence
DSS ITSEC Conference 2012 - SIEM Q1 Labs IBM Security Systems IntelligenceAndris Soroka
 
Widyatama Lecture Applied Networking-IV Week05 Mobile Security 1
Widyatama Lecture Applied Networking-IV Week05 Mobile Security 1Widyatama Lecture Applied Networking-IV Week05 Mobile Security 1
Widyatama Lecture Applied Networking-IV Week05 Mobile Security 1Djadja Sardjana
 
[GPATS 2013] Makoto (Mac) Yokozawa - Cyber Immune Systems That Helps Trust a...
[GPATS 2013]  Makoto (Mac) Yokozawa - Cyber Immune Systems That Helps Trust a...[GPATS 2013]  Makoto (Mac) Yokozawa - Cyber Immune Systems That Helps Trust a...
[GPATS 2013] Makoto (Mac) Yokozawa - Cyber Immune Systems That Helps Trust a...Assespro Nacional
 
Owasp e crime-london-2012-final
Owasp e crime-london-2012-finalOwasp e crime-london-2012-final
Owasp e crime-london-2012-finalMarco Morana
 
Denis Hackett M.Sc. - IDC Presentation Sept 2014 Croke Park Sept25 - Denis Ha...
Denis Hackett M.Sc. - IDC Presentation Sept 2014 Croke Park Sept25 - Denis Ha...Denis Hackett M.Sc. - IDC Presentation Sept 2014 Croke Park Sept25 - Denis Ha...
Denis Hackett M.Sc. - IDC Presentation Sept 2014 Croke Park Sept25 - Denis Ha...Education & Training Boards
 
2017 March ISACA Security Challenges with the Internet of Things - Eric Vande...
2017 March ISACA Security Challenges with the Internet of Things - Eric Vande...2017 March ISACA Security Challenges with the Internet of Things - Eric Vande...
2017 March ISACA Security Challenges with the Internet of Things - Eric Vande...Eric Vanderburg
 
Howe Brand, smart security grid risks
Howe Brand, smart security grid risksHowe Brand, smart security grid risks
Howe Brand, smart security grid risksGavan Howe
 

Was ist angesagt? (20)

2019 CYBER SECURITY TRENDS REPORT REVIEW
2019 CYBER SECURITY TRENDS REPORT REVIEW2019 CYBER SECURITY TRENDS REPORT REVIEW
2019 CYBER SECURITY TRENDS REPORT REVIEW
 
VTI Learning Series Beyond the Convergence of Physical & Cyber Security
VTI Learning Series Beyond the Convergence of Physical & Cyber SecurityVTI Learning Series Beyond the Convergence of Physical & Cyber Security
VTI Learning Series Beyond the Convergence of Physical & Cyber Security
 
Security 2 Q 07[1]
Security 2 Q 07[1]Security 2 Q 07[1]
Security 2 Q 07[1]
 
2015 Global Threat Intelligence Report Executive Summary | NTT i3
2015 Global Threat Intelligence Report Executive Summary | NTT i32015 Global Threat Intelligence Report Executive Summary | NTT i3
2015 Global Threat Intelligence Report Executive Summary | NTT i3
 
Ci31560566
Ci31560566Ci31560566
Ci31560566
 
A6704d01
A6704d01A6704d01
A6704d01
 
NUS-ISS Learning Day 2017 - Security Dynamics - Moving IoT and Beyond
NUS-ISS Learning Day 2017 - Security Dynamics - Moving IoT and BeyondNUS-ISS Learning Day 2017 - Security Dynamics - Moving IoT and Beyond
NUS-ISS Learning Day 2017 - Security Dynamics - Moving IoT and Beyond
 
A Thorough Study on Video Integrity using Blockchain
A Thorough Study on Video Integrity using BlockchainA Thorough Study on Video Integrity using Blockchain
A Thorough Study on Video Integrity using Blockchain
 
Bapinger Network Security
Bapinger Network SecurityBapinger Network Security
Bapinger Network Security
 
Exposing the Money Behind Malware
Exposing the Money Behind MalwareExposing the Money Behind Malware
Exposing the Money Behind Malware
 
Video Conferencing and Security
Video Conferencing and SecurityVideo Conferencing and Security
Video Conferencing and Security
 
DSS ITSEC Conference 2012 - SIEM Q1 Labs IBM Security Systems Intelligence
DSS ITSEC Conference 2012 - SIEM Q1 Labs IBM Security Systems IntelligenceDSS ITSEC Conference 2012 - SIEM Q1 Labs IBM Security Systems Intelligence
DSS ITSEC Conference 2012 - SIEM Q1 Labs IBM Security Systems Intelligence
 
Widyatama Lecture Applied Networking-IV Week05 Mobile Security 1
Widyatama Lecture Applied Networking-IV Week05 Mobile Security 1Widyatama Lecture Applied Networking-IV Week05 Mobile Security 1
Widyatama Lecture Applied Networking-IV Week05 Mobile Security 1
 
[GPATS 2013] Makoto (Mac) Yokozawa - Cyber Immune Systems That Helps Trust a...
[GPATS 2013]  Makoto (Mac) Yokozawa - Cyber Immune Systems That Helps Trust a...[GPATS 2013]  Makoto (Mac) Yokozawa - Cyber Immune Systems That Helps Trust a...
[GPATS 2013] Makoto (Mac) Yokozawa - Cyber Immune Systems That Helps Trust a...
 
Owasp e crime-london-2012-final
Owasp e crime-london-2012-finalOwasp e crime-london-2012-final
Owasp e crime-london-2012-final
 
Denis Hackett M.Sc. - IDC Presentation Sept 2014 Croke Park Sept25 - Denis Ha...
Denis Hackett M.Sc. - IDC Presentation Sept 2014 Croke Park Sept25 - Denis Ha...Denis Hackett M.Sc. - IDC Presentation Sept 2014 Croke Park Sept25 - Denis Ha...
Denis Hackett M.Sc. - IDC Presentation Sept 2014 Croke Park Sept25 - Denis Ha...
 
The Cloud Beckons, But is it Safe?
The Cloud Beckons, But is it Safe?The Cloud Beckons, But is it Safe?
The Cloud Beckons, But is it Safe?
 
2017 March ISACA Security Challenges with the Internet of Things - Eric Vande...
2017 March ISACA Security Challenges with the Internet of Things - Eric Vande...2017 March ISACA Security Challenges with the Internet of Things - Eric Vande...
2017 March ISACA Security Challenges with the Internet of Things - Eric Vande...
 
Pt08 19 final1
Pt08 19 final1Pt08 19 final1
Pt08 19 final1
 
Howe Brand, smart security grid risks
Howe Brand, smart security grid risksHowe Brand, smart security grid risks
Howe Brand, smart security grid risks
 

Ähnlich wie Trends In The Israeli Information Security Market 2008

Risk Management Practices for PCI DSS 2.0
Risk Management Practices for PCI DSS 2.0Risk Management Practices for PCI DSS 2.0
Risk Management Practices for PCI DSS 2.0Ulf Mattsson
 
Computerworld Conference (2002)
Computerworld Conference (2002)Computerworld Conference (2002)
Computerworld Conference (2002)Skeeve Stevens
 
Cyber Threat Jujitsu 101: Acknowledge. Assess. Avoid. Address.
Cyber Threat Jujitsu 101: Acknowledge. Assess. Avoid. Address.Cyber Threat Jujitsu 101: Acknowledge. Assess. Avoid. Address.
Cyber Threat Jujitsu 101: Acknowledge. Assess. Avoid. Address.Tripwire
 
Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party Cyb...
Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party  Cyb...Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party  Cyb...
Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party Cyb...Rishi Singh
 
Wk online trust solutions overview january 2012
Wk online trust solutions overview january 2012Wk online trust solutions overview january 2012
Wk online trust solutions overview january 2012Creus Moreira Carlos
 
Getting users to care about security
Getting users to care about securityGetting users to care about security
Getting users to care about securityAlison Gianotto
 
Introduction - The Smart Protection Network
Introduction - The Smart Protection NetworkIntroduction - The Smart Protection Network
Introduction - The Smart Protection NetworkAndrew Wong
 
On Demand Cloud Services Coury
On Demand Cloud Services   CouryOn Demand Cloud Services   Coury
On Demand Cloud Services CouryArman Sadat Hossain
 
Trends in the Israeli Infrastructure Services/STKI Summit -Update June 2008
Trends in the Israeli Infrastructure Services/STKI Summit  -Update June 2008Trends in the Israeli Infrastructure Services/STKI Summit  -Update June 2008
Trends in the Israeli Infrastructure Services/STKI Summit -Update June 2008Shahar Geiger Maor
 
Cyberjutitsu101coleevertzfinal 1296250763392-phpapp02
Cyberjutitsu101coleevertzfinal 1296250763392-phpapp02Cyberjutitsu101coleevertzfinal 1296250763392-phpapp02
Cyberjutitsu101coleevertzfinal 1296250763392-phpapp02Mark Evertz
 
MT 117 Key Innovations in Cybersecurity
MT 117 Key Innovations in CybersecurityMT 117 Key Innovations in Cybersecurity
MT 117 Key Innovations in CybersecurityDell EMC World
 
Module0&1 intro-foundations-b
Module0&1 intro-foundations-bModule0&1 intro-foundations-b
Module0&1 intro-foundations-bBbAOC
 
The Perils that PCI brings to Security
The Perils that PCI brings to SecurityThe Perils that PCI brings to Security
The Perils that PCI brings to SecurityTripwire
 
ASFWS 2013 - Critical Infrastructures in the Age of Cyber Insecurity par Andr...
ASFWS 2013 - Critical Infrastructures in the Age of Cyber Insecurity par Andr...ASFWS 2013 - Critical Infrastructures in the Age of Cyber Insecurity par Andr...
ASFWS 2013 - Critical Infrastructures in the Age of Cyber Insecurity par Andr...Cyber Security Alliance
 
End Your Security Nightmares with ePlus and Cisco
End Your Security Nightmares with ePlus and CiscoEnd Your Security Nightmares with ePlus and Cisco
End Your Security Nightmares with ePlus and CiscoePlus
 
Protect Yourself Against Today's Cybercriminals and Hackers
Protect Yourself Against Today's Cybercriminals and HackersProtect Yourself Against Today's Cybercriminals and Hackers
Protect Yourself Against Today's Cybercriminals and HackersKaseya
 
Mobile Banking Channel Security - Cyber Security Conference 2011
Mobile Banking Channel Security - Cyber Security Conference 2011Mobile Banking Channel Security - Cyber Security Conference 2011
Mobile Banking Channel Security - Cyber Security Conference 2011Filip Maertens
 
11 19-2015 - iasaca membership conference - the state of security
11 19-2015 - iasaca membership conference - the state of security11 19-2015 - iasaca membership conference - the state of security
11 19-2015 - iasaca membership conference - the state of securityMatthew Pascucci
 
The Internet Is a Dog-Eat-Dog World, and Your App Is Clad in Milk-Bone Underwear
The Internet Is a Dog-Eat-Dog World, and Your App Is Clad in Milk-Bone UnderwearThe Internet Is a Dog-Eat-Dog World, and Your App Is Clad in Milk-Bone Underwear
The Internet Is a Dog-Eat-Dog World, and Your App Is Clad in Milk-Bone UnderwearBob Wall
 

Ähnlich wie Trends In The Israeli Information Security Market 2008 (20)

Risk Management Practices for PCI DSS 2.0
Risk Management Practices for PCI DSS 2.0Risk Management Practices for PCI DSS 2.0
Risk Management Practices for PCI DSS 2.0
 
Computerworld Conference (2002)
Computerworld Conference (2002)Computerworld Conference (2002)
Computerworld Conference (2002)
 
Cyber Threat Jujitsu 101: Acknowledge. Assess. Avoid. Address.
Cyber Threat Jujitsu 101: Acknowledge. Assess. Avoid. Address.Cyber Threat Jujitsu 101: Acknowledge. Assess. Avoid. Address.
Cyber Threat Jujitsu 101: Acknowledge. Assess. Avoid. Address.
 
Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party Cyb...
Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party  Cyb...Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party  Cyb...
Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party Cyb...
 
Wk online trust solutions overview january 2012
Wk online trust solutions overview january 2012Wk online trust solutions overview january 2012
Wk online trust solutions overview january 2012
 
Getting users to care about security
Getting users to care about securityGetting users to care about security
Getting users to care about security
 
Introduction - The Smart Protection Network
Introduction - The Smart Protection NetworkIntroduction - The Smart Protection Network
Introduction - The Smart Protection Network
 
On Demand Cloud Services Coury
On Demand Cloud Services   CouryOn Demand Cloud Services   Coury
On Demand Cloud Services Coury
 
Trends in the Israeli Infrastructure Services/STKI Summit -Update June 2008
Trends in the Israeli Infrastructure Services/STKI Summit  -Update June 2008Trends in the Israeli Infrastructure Services/STKI Summit  -Update June 2008
Trends in the Israeli Infrastructure Services/STKI Summit -Update June 2008
 
Cyberjutitsu101coleevertzfinal 1296250763392-phpapp02
Cyberjutitsu101coleevertzfinal 1296250763392-phpapp02Cyberjutitsu101coleevertzfinal 1296250763392-phpapp02
Cyberjutitsu101coleevertzfinal 1296250763392-phpapp02
 
MT 117 Key Innovations in Cybersecurity
MT 117 Key Innovations in CybersecurityMT 117 Key Innovations in Cybersecurity
MT 117 Key Innovations in Cybersecurity
 
Module0&1 intro-foundations-b
Module0&1 intro-foundations-bModule0&1 intro-foundations-b
Module0&1 intro-foundations-b
 
The Perils that PCI brings to Security
The Perils that PCI brings to SecurityThe Perils that PCI brings to Security
The Perils that PCI brings to Security
 
ASFWS 2013 - Critical Infrastructures in the Age of Cyber Insecurity par Andr...
ASFWS 2013 - Critical Infrastructures in the Age of Cyber Insecurity par Andr...ASFWS 2013 - Critical Infrastructures in the Age of Cyber Insecurity par Andr...
ASFWS 2013 - Critical Infrastructures in the Age of Cyber Insecurity par Andr...
 
End Your Security Nightmares with ePlus and Cisco
End Your Security Nightmares with ePlus and CiscoEnd Your Security Nightmares with ePlus and Cisco
End Your Security Nightmares with ePlus and Cisco
 
Protect Yourself Against Today's Cybercriminals and Hackers
Protect Yourself Against Today's Cybercriminals and HackersProtect Yourself Against Today's Cybercriminals and Hackers
Protect Yourself Against Today's Cybercriminals and Hackers
 
Mobile Banking Channel Security - Cyber Security Conference 2011
Mobile Banking Channel Security - Cyber Security Conference 2011Mobile Banking Channel Security - Cyber Security Conference 2011
Mobile Banking Channel Security - Cyber Security Conference 2011
 
11 19-2015 - iasaca membership conference - the state of security
11 19-2015 - iasaca membership conference - the state of security11 19-2015 - iasaca membership conference - the state of security
11 19-2015 - iasaca membership conference - the state of security
 
The Internet Is a Dog-Eat-Dog World, and Your App Is Clad in Milk-Bone Underwear
The Internet Is a Dog-Eat-Dog World, and Your App Is Clad in Milk-Bone UnderwearThe Internet Is a Dog-Eat-Dog World, and Your App Is Clad in Milk-Bone Underwear
The Internet Is a Dog-Eat-Dog World, and Your App Is Clad in Milk-Bone Underwear
 
Tt 06-ck
Tt 06-ckTt 06-ck
Tt 06-ck
 

Mehr von Shahar Geiger Maor

Cyber economics v2 -Measuring the true cost of Cybercrime
Cyber economics v2 -Measuring the true cost of CybercrimeCyber economics v2 -Measuring the true cost of Cybercrime
Cyber economics v2 -Measuring the true cost of CybercrimeShahar Geiger Maor
 
Networking stki summit 2012 -shahar geiger maor
Networking  stki summit 2012 -shahar geiger maorNetworking  stki summit 2012 -shahar geiger maor
Networking stki summit 2012 -shahar geiger maorShahar Geiger Maor
 
Information security stki summit 2012-shahar geiger maor
Information security  stki summit 2012-shahar geiger maorInformation security  stki summit 2012-shahar geiger maor
Information security stki summit 2012-shahar geiger maorShahar Geiger Maor
 
Endpoints stki summit 2012-shahar geiger maor
Endpoints  stki summit 2012-shahar geiger maorEndpoints  stki summit 2012-shahar geiger maor
Endpoints stki summit 2012-shahar geiger maorShahar Geiger Maor
 
Risk, regulation and data protection
Risk, regulation and data protectionRisk, regulation and data protection
Risk, regulation and data protectionShahar Geiger Maor
 
STKI Mobile brainstorming -MDM Panel
STKI Mobile brainstorming -MDM PanelSTKI Mobile brainstorming -MDM Panel
STKI Mobile brainstorming -MDM PanelShahar Geiger Maor
 
Social Sec infosec -pptx
Social Sec  infosec -pptxSocial Sec  infosec -pptx
Social Sec infosec -pptxShahar Geiger Maor
 
Cloud Security CISO club -April 2011 v2
Cloud Security CISO club -April 2011 v2Cloud Security CISO club -April 2011 v2
Cloud Security CISO club -April 2011 v2Shahar Geiger Maor
 
Summit 2011 trends in information security
Summit 2011  trends in information securitySummit 2011  trends in information security
Summit 2011 trends in information securityShahar Geiger Maor
 
Summit 2011 trends in infrastructure services
Summit 2011  trends in infrastructure servicesSummit 2011  trends in infrastructure services
Summit 2011 trends in infrastructure servicesShahar Geiger Maor
 
כנס אבטחת מידע מוטו תקשורת V2
כנס אבטחת מידע  מוטו תקשורת V2כנס אבטחת מידע  מוטו תקשורת V2
כנס אבטחת מידע מוטו תקשורת V2Shahar Geiger Maor
 
Stki Summit 2010 Infra Services V8
Stki Summit 2010  Infra Services  V8Stki Summit 2010  Infra Services  V8
Stki Summit 2010 Infra Services V8Shahar Geiger Maor
 
Infrastructure Trends -Jan 2010
Infrastructure Trends -Jan 2010Infrastructure Trends -Jan 2010
Infrastructure Trends -Jan 2010Shahar Geiger Maor
 
Info Sec C T O Forum Nov 2009 V1
Info Sec   C T O Forum   Nov 2009   V1Info Sec   C T O Forum   Nov 2009   V1
Info Sec C T O Forum Nov 2009 V1Shahar Geiger Maor
 
Security Summit July 2009
Security Summit  July 2009Security Summit  July 2009
Security Summit July 2009Shahar Geiger Maor
 

Mehr von Shahar Geiger Maor (20)

Cyber economics v2 -Measuring the true cost of Cybercrime
Cyber economics v2 -Measuring the true cost of CybercrimeCyber economics v2 -Measuring the true cost of Cybercrime
Cyber economics v2 -Measuring the true cost of Cybercrime
 
From creeper to stuxnet
From creeper to stuxnetFrom creeper to stuxnet
From creeper to stuxnet
 
Mobile payment v3
Mobile payment v3Mobile payment v3
Mobile payment v3
 
Networking stki summit 2012 -shahar geiger maor
Networking  stki summit 2012 -shahar geiger maorNetworking  stki summit 2012 -shahar geiger maor
Networking stki summit 2012 -shahar geiger maor
 
Information security stki summit 2012-shahar geiger maor
Information security  stki summit 2012-shahar geiger maorInformation security  stki summit 2012-shahar geiger maor
Information security stki summit 2012-shahar geiger maor
 
Endpoints stki summit 2012-shahar geiger maor
Endpoints  stki summit 2012-shahar geiger maorEndpoints  stki summit 2012-shahar geiger maor
Endpoints stki summit 2012-shahar geiger maor
 
Risk, regulation and data protection
Risk, regulation and data protectionRisk, regulation and data protection
Risk, regulation and data protection
 
STKI Mobile brainstorming -MDM Panel
STKI Mobile brainstorming -MDM PanelSTKI Mobile brainstorming -MDM Panel
STKI Mobile brainstorming -MDM Panel
 
Social Sec infosec -pptx
Social Sec  infosec -pptxSocial Sec  infosec -pptx
Social Sec infosec -pptx
 
Cloud Security CISO club -April 2011 v2
Cloud Security CISO club -April 2011 v2Cloud Security CISO club -April 2011 v2
Cloud Security CISO club -April 2011 v2
 
Summit 2011 trends in information security
Summit 2011  trends in information securitySummit 2011  trends in information security
Summit 2011 trends in information security
 
Summit 2011 trends in infrastructure services
Summit 2011  trends in infrastructure servicesSummit 2011  trends in infrastructure services
Summit 2011 trends in infrastructure services
 
DLP Trends -Dec 2010
DLP Trends -Dec 2010DLP Trends -Dec 2010
DLP Trends -Dec 2010
 
כנס אבטחת מידע מוטו תקשורת V2
כנס אבטחת מידע  מוטו תקשורת V2כנס אבטחת מידע  מוטו תקשורת V2
כנס אבטחת מידע מוטו תקשורת V2
 
Cloud security v2
Cloud security v2Cloud security v2
Cloud security v2
 
PCI Challenges
PCI ChallengesPCI Challenges
PCI Challenges
 
Stki Summit 2010 Infra Services V8
Stki Summit 2010  Infra Services  V8Stki Summit 2010  Infra Services  V8
Stki Summit 2010 Infra Services V8
 
Infrastructure Trends -Jan 2010
Infrastructure Trends -Jan 2010Infrastructure Trends -Jan 2010
Infrastructure Trends -Jan 2010
 
Info Sec C T O Forum Nov 2009 V1
Info Sec   C T O Forum   Nov 2009   V1Info Sec   C T O Forum   Nov 2009   V1
Info Sec C T O Forum Nov 2009 V1
 
Security Summit July 2009
Security Summit  July 2009Security Summit  July 2009
Security Summit July 2009
 

KĂźrzlich hochgeladen

Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfhans926745
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel AraĂşjo
 

KĂźrzlich hochgeladen (20)

Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 

Trends In The Israeli Information Security Market 2008

  • 1. Trends in the Israeli Information Security Market 2008 Shahar Geiger Maor Analyst, STKI shahar@stki.info
  • 2. Information Security Threatscape Your Text here Your Text here 2
  • 3. Global Security Mega Trends -Threat Horizon Outside threats: Hackers and organized crime have joined hands Inside threats: The human factor is the key Application Attacks become more prevalent There Yourno here is Text single logical place to put a “perimeter” Your Text here around the organization:  Hackers focus on new and emerging technologies All Rights Reserved @STKI Moshav Bnei Zion, Israel +972 9 74 444 74 www.stki.info 3
  • 4. General Trends for 2008 Virtual Machine Security Implications: • Virtualization made big headlines in 2007 with major players going public • The industry hasn’t fully explored the security implications of virtual technology Your Text here Your Text here Mobile Platforms: • Interest in mobile security has never been higher • Phones become more complex, more interesting and more connected • Attackers may take advantage All Rights Reserved @STKI Moshav Bnei Zion, Israel +972 9 74 444 74 www.stki.info 4
  • 5. General Trends for 2008 – The Human Factor  CISOs tend to trust products and technologies  One persons mistake can expose a well-protected organization  Attackers know how to exploit the weaknesses of human nature: • Greed here Your Text Your Text here • “Flockquot; mentality • Trust assertive figures • The need to please  Human weaknesses have no airtight solution (Training?) All Rights Reserved @STKI Moshav Bnei Zion, Israel +972 9 74 444 74 www.stki.info 5
  • 6. The Relative Seriousness of IT Security Threats Your Text here Your Text here All Rights Reserved @STKI Moshav Bnei Zion, Israel +972 9 74 444 74 www.stki.info 6
  • 7. STKI Survey 2008: 100% 90% 80% 70% 60% 50% Israel 40% Your Text here Your Text here 30% World 20% 10% 0% Careless/risky behavior Lost or stolen laptops and At least 90% of by employees is the computer media are the most employees follow most serious internal serious technical threat security policies security threat Source: STKI, CIO Insight 2008 All Rights Reserved @STKI Moshav Bnei Zion, Israel +972 9 74 444 74 www.stki.info 7
  • 8. STKI survey results Your Text here Your Text here All Rights Reserved @STKI Moshav Bnei Zion, Israel +972 9 74 444 74 www.stki.info 8
  • 9. Am I Vulnerable?  There is no such thing as quot;securequot;  Despite the advanced systems, it's hard to know for sure  High demand for penetration testing, risk assessments Your Text here Your Text here  Many organizations are realizing the importance of a neutral party  Market is dominated by small and medium consulting companies All Rights Reserved @STKI Moshav Bnei Zion, Israel +972 9 74 444 74 www.stki.info 9
  • 10. The Cost of Security Dollar Amount Losses by Type of Attack (Top 5, Thousands $) Financial Fraud 21,124,750$ )Virus (Worms/Spyware 8,391,800$ Your Text here Your Text here System Penetration by Outsiders 6,875,000$ Theft of Confidential Data (Not Including 5,685,000$ )Mobile Devices Laptop or Mobile Theft 3,881,150$ (Source: CSI Survey 2007) 10 All Rights Reserved @STKI Moshav Bnei Zion, Israel +972 9 74 444 74 www.stki.info
  • 11. World Security Technologies Used (By Percent of Respondents) )Four Most Common( Antivirus Software 98% Firewall 97% Your Text here VPN 84% Your Text here Anti-Spyware Software 80% )Four Less Common( Public Key Infrastucture 32% Specialized Wireless Security Systems 28% EPS/NAC 27% Biometrics 18% (Source: CSI Survey 2007) All Rights Reserved @STKI Moshav Bnei Zion, Israel +972 9 74 444 74 www.stki.info 11
  • 12. What Interest Our Clients? 2007-2008 Firewall/ Miscellaneous Application Firewall Endpoint Security 20% 11% 12% Your Text here Mail/ Mobile Your Text here Market Trends Device Encryption 18% 8% NAC 7% IDM 6% URL Filtering Antivirus SIEM/SOC 6% 6% 6% All Rights Reserved @STKI Moshav Bnei Zion, Israel +972 9 74 444 74 www.stki.info 12
  • 13. STKI survey results Your Text here Your Text here All Rights Reserved @STKI Moshav Bnei Zion, Israel +972 9 74 444 74 www.stki.info 13
  • 14. Endpoint Security Your Text here Your Text here 14
  • 15. Endpoint Security  The Endpoint is a major threat  Risk Factors: • Spyware • Viruses • Website with malicious code • External here Your Text devices carrying information Your Text here  Even when you have protection systems, they can’t be trusted: •Users Circumvent the systems for comfort •Communication problems prevent updates •New stations or guests with no protection •Infiltration of unprotected systems  The Solution: NAC… All Rights Reserved @STKI Moshav Bnei Zion, Israel +972 9 74 444 74 www.stki.info 15
  • 16. Endpoint Security – Continue  Device Management is in the spotlight  Major players enter the market – McAfee, Checkpoint, Symantec  Leading Solutions in Israel: • Checkpoint -Pointsec Protector • ControlGuard -Endpoint Access ManagerYour Text here Your Text here • McAfee -Host Intrusion Prevention • SafeEnd -Protector • Symantec -Endpoint Protection  Most of our clients use a product, or in advanced integration stages  Device Management will become default soon 16 All Rights Reserved @STKI Moshav Bnei Zion, Israel +972 9 74 444 74 www.stki.info
  • 17. Network AccessAdmission Control Your Text here Your Text here 17
  • 18. Trends -Network Admission/ Access Control (NAC)  NAC was invented by Cisco, but never standardized  Standardization is expected in the coming years  Even the acronym of NAC isn't clear  Products exist, but experts can't agree on their effectiveness Your Text here Your Text here  There are problems with non-PC hardware  Many of our customers are interested  Majority of customers: researching or doing POC All Rights Reserved @STKI Moshav Bnei Zion, Israel +972 9 74 444 74 www.stki.info 18
  • 19. World NAC Players Your Text here Your Text here 19 Source: Gartner
  • 20. World NAC Players Your Text here Your Text here 20
  • 21. Israeli NAC Players Leading Solutions: • Access Layers • Cisco • Enterasys • ForeScout • Insightix Text here Your Your Text here • McAfee • Microsoft • Nortel • Symantec • XOR 21
  • 22. STKI Insights NAC can be deployed less expensively when it is an embedded feature Many of the infrastructure-based solutions won’t not work with older LAN switch product families - Some organizations will wait for newer versions Text here Your Text here Your Some network and security vendors already have solutions that can be part of the NAC process (AC, IPS) – An important starting point for market domination  First priority: implement a guest networking control NAC is a Layer 2 vs. Layer 3 match 22
  • 23. Data Leak/Loss Prevention Your Text here Your Text here 23
  • 24. Data Leak /Loss Prevention (DLP)  DLP is an overall framework into which different elements fit  There are three types of data that may leak: • Data at rest • Data in transit • Data on endpoints  No single DLP focus area is foolproof, so enforcinghere three Your Text here Your Text all makes problems less likely  DLP is a growing area, and vendors react accordingly  It is suggested to use full-suite vendors in order to avoid integration problems All Rights Reserved @STKI Moshav Bnei Zion, Israel +972 9 74 444 74 www.stki.info 24
  • 25. Data Leak /Loss Prevention –World Trends Your Text here Your Text here Source: Aberdeen Report 2008 All Rights Reserved @STKI Moshav Bnei Zion, Israel +972 9 74 444 74 www.stki.info 25
  • 26. Data Leak /Loss Prevention –EMEA Trends Your Text here Your Text here Source: Aberdeen Report 2008 All Rights Reserved @STKI Moshav Bnei Zion, Israel +972 9 74 444 74 www.stki.info 26
  • 27. DLP –Market Status & Players World Leaders: • Symantec (Acquired Vontu, 2007, 350$ M) • Websense (Acquired PortAuthority 2007, 90$ M) • Reconnex (Acquired by McAfee, July 2008, 46$ M) • Tablus Text here Your (Acquired by RSA, 2007, 40$ M) Your Text here • Vericept ? Main drivers for DLP are: • Regulations such as Payment Card Industry (PCI), Accountability Act (HIPAA) • e-mail security, instant messaging (IM) and endpoint monitoring solutions All Rights Reserved @STKI Moshav Bnei Zion, Israel +972 9 74 444 74 www.stki.info 27
  • 28. Mobile Devices Security Your Text here Your Text here 28
  • 29. Mobile Devices Security  Mobile devices like Smartphones and PDAs are becoming common  Price drops make the phones attractive  Now, some users sync, but it will expand, mostly at the workplace  Rich apps are on the horizon Your Text here Your Text here  Portable devices are prone to theft, loss and tapping (BT)  There are inadequate solutions according to Israeli users  We expect major developments and maturity  Major players enter the market All Rights Reserved @STKI Moshav Bnei Zion, Israel +972 9 74 444 74 www.stki.info 29
  • 30. Inadequate Mobile Security? Your Text here Your Text here Source: SafeNet Annual Survey 2008 30
  • 31. STKI Survey 2008: 40% 35% 30% 25% 20% Israel 15% Your Text here Your Text here World 10% 5% 0% Adequate solution Inadequate Plan to install Don't know /No in place solution in place /Currently plan to install installing Source: STKI, CIO Insight 2008 All Rights Reserved @STKI Moshav Bnei Zion, Israel +972 9 74 444 74 www.stki.info 31
  • 32. Trends for 2009 DLP! Data Monitoring Mobile Security NAC Your Text here Your Text here 32