Survey
* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
Emerging Security Trends & Technologies Presented by Santhosh Koratt Head Consulting & Compliance SecureSynergy Pvt.Ltd. Aim Highlight key security trends for the coming years Discuss the information risk management solutions from a technology front TELECOM BANKING IT RETAIL To give a practical view of integrated security infrastructure “We are in the initial years of technology innovation and growth, namely, IT Everywhere” Source: Forrester Research PHARMA Security Trends & Technologies Converged Endpoint Security Multiple point solutions Poor visibility & control Compliance requirements High cost of management Emergence of holistic end point security Endpoint security suites comprising Antivirus, Antispyware, Host-based IPS, Email Security & Network Access Control Industry is moving towards Single Agent Single Console concept Converged Endpoint Security Data Loss Prevention Unauthorized transfer of data to external devices Growing insider attacks Loss of data via Web & E-mail Privacy regulations Emphasis on Data discovery &classification Solutions at host & perimeter levels Policy based control Data Loss Prevention Information Rights Management • Growing outsourced relationships • Need to look beyond NDA • Information Rights Management Mobile Device Security Increasing connected mobile workforce Lot of critical data on mobile devices Physical theft prone devices Full disclousure norms & compliance mandates Acceptance of full disk encryption Maturing technology Mobile Devices: “the most severe and overlooked threat to the enterprise,” Gartner Group Secure Software Engineering • Microsoft Patch Tuesday • Increasing VA/ PT adoption & costs • Hacktivism • A secure product is one that protects the confidentiality, integrity, and availability of the customers’ information, and the integrity and availability of processing resources under control of the system’s owner or administrator. Source: Writing Secure Code (Microsoft.com) Secure Software Engineering Integrated Network Security • • Integrated Network Security Centralized Entitlement Management • • IT Enabled Physical Security • • Compliance Management • •