Managing Security Threats in Today’s Enterprise
Agenda
1) Today’s enterprise scenario
2) Rise of Advanced Persistent Threats & Other Risks
3) Triangle of Use.x
4) User Awareness
5) One single point of observation
6) Security appliances have to work out-of-the-box
7) Q&A
• Consistent growth in number of malwares & cyber crime incidents
• No Platform/OS is 100% immune from threat
• Exponential growth of highly sophisticated and advanced global cyber criminals’
community
• Sophisticated cyber crooks want your intellectual property, confidential
information, financial data, trade secrets etc.
• Attacks are more persistent, pervasive, and in some cases more targeted than
ever before…!
Today’s enterprise Scenario
Rise of Advanced Persistent Threats & Other Risks
Advanced Persistent Threats (APTs)
are targeted cyber-attacks
designed to dodge an
organization’s technical
countermeasures.
APTs are specifically designed to
bypass firewalls, intrusion
detection systems, and anti-
malware programs.
Source: PWC
3.4
million
9.4
million
22.7
million
24.9
million
28.9
million
42.8
million
2009 2010 2011 2012 2013 2014
Total number of Security
Incidents to grow 66% CAGR
Page 4
Cloud
External factors to consider
Big Data
Mobility
Security and
Risk
738
25%
7.22
60%
Number of cloud services that a company uses on average.
By 2016, 25% of global firms will adopt big data analytics for
security and fraud detection.
Number of mobile devices around the world today in BILLIONS.
By 2020, 60% of enterprise security budgets will be allocated for
rapid detection and response strategies.
Attacks in News!!
• NSA implants software into 100,000 computers
• This allows them to reach non-connected machines
through supply chain attack vectors
• NSA calls this ‘active defense’
SECURITY (INCREASES)
FUNCTIONALITY(DECREASES)
EASE OF USE(DECREASES)
Triangle of Use
How it is done?
Today’s SMB & Enterprise Challenges
• Security Information and Event Management (SIEM) is an essential cyber
security technology.
• SMBs face the same cyber threats as their enterprise counterparts; however,
SMBs cannot typically apply the same security professional resources to the
issue.
• While SIEM platforms are built to scale up, the challenges to scale down an
enterprise-scale SIEM for SMB are challenging and costly.
Lack of dedicated Network Security Professional
• In the vast majority of SMB, network security is treated as a subset of
IT.
• Demand for cybersecurity tools and resources has doubled since 2014,
but a lack of skills and dedicated resources are the main obstacles to
implementing them
• In SMB Security function are managed by lower IT Admin staff & Due
to Lack of training & knowledge its unable to understand the network
security requirement.
• Budgets allocated for IT security are one of the big challenges .
Solution:-
• We analyzed all the network setup & extended awareness of security in
general.
• Identified policy and compliance issues originating from networks.
One single point of observation
In most of SMB Assuming that the IT Director could purchase several cyber
security tools,
Managing & Monitor the all the security incident at single console is challenge.
Detecting threat & prioritizing it is a big challenge
Solution
Provides real-time visibility for threat detection and prioritization, delivering
surveillance throughout the entire IT infrastructure.
Produces detailed data access and user activity reports to help manage
compliance.
Managed Service Providers helps deliver cost-effective security intelligence
using a single console that supports multiple sites & customer.
Advanced
Most of the targeted attacks have the ability to evade detection and the capability
to gain and maintain access to well protected networks and sensitive information.
Written by highly technical and motivated group of malware writers.
Persistent
Uses advanced root-kit /stealth technologies to be persistent in nature, very
difficult to sense the presence.
Threat
Everything is at risk…!
Most Infamous APTs:
Stuxnet, Ghostnet, Duqu, Flame, Shamoon, Wiper
APT: Not just another malware category!
Important factors behind successful Targeted Attack
Technology Factor:
• Bypassing Traditional Security with limited capabilities
• Software Design/Architecture Flaws: Vulnerable Systems
• Outdated/Unpatched Operating Systems OR Outdated Antivirus
Human Factor:
• Highly sophisticated and extremely organized cyber criminals
• Unaware/Irresponsible Insider
• Application developers not following Secure SDLC
• IT Admin Team’s Incompetence: Inefficient Configuration
Important Factors: Technology & Human
Security appliances have to work out-of-the-box
SMB don’t have dedicated personnel that can write rules for incident detection,
create inputs for compliance reporting, and write scripts to connect platforms
via application program interfaces (API).
In this case the IT Admin is constrained by time and practical network security
expertise.
Solution
• Collect, retain, search, alert and report on logs throughout your infrastructure
• Providing compliance focused analysts and auditors
• Automated mechanisms and advanced correlation
• Pre-Built Compliance Reports as per Industry Standard
• Design good security strategy: Understand the threat landscape relevant to your
computing environment and have good security strategy and policies with
periodic auditing and revision
• Develop efficient security Infrastructure: Your Infrastructure’s ability to rapidly
discover the presence of the threat and respond to it,will help you to mitigate
advanced and targeted threats
• Observe and track every smallest activity to sense any anomaly: Early Discovery->
Early Reaction ->Lesser the Impact
• Security in the culture: Security education, awareness and common sense will
play crucial role
DDOS: Mantra for best enterprise security
Write to us at:
support@seqrite.com
Follow us on:
Facebook: www.facebook.com/seqrite
Twitter: www.twitter.com/seqrite
Google Plus: http://bit.ly/SeqriteGooglePlus
LinkedIn: https://www.linkedin.com/company/seqrite
YouTube: http://bit.ly/SeqriteYouTube
Visit us:
Website: www.seqrite.com
Share your feedback with us
THANK YOU.

More Related Content

PPT
IT Security management and risk assessment
 
PPTX
Roadmap to security operations excellence
PPTX
Cyber Security # Lec 3
PPTX
Security-Invest Where it Matters Most
PPTX
Cyber Security # Lec 2
PPTX
It and-cyber-module-2
PPTX
An introduction to SOC (Security Operation Center)
IT Security management and risk assessment
 
Roadmap to security operations excellence
Cyber Security # Lec 3
Security-Invest Where it Matters Most
Cyber Security # Lec 2
It and-cyber-module-2
An introduction to SOC (Security Operation Center)

What's hot (20)

PDF
PRESENTATION▶ Cyber Security Services (CSS): Security Simulation
PPTX
Building an application security program
PPTX
Your cyber security webinar
PDF
Cloud computing security infrastructure
PDF
Dealing with Information Security, Risk Management & Cyber Resilience
PDF
OSB180: Learn More About Ivanti Endpoint Security
PDF
Security operations center 5 security controls
PPTX
Cryptography and Network Security # Lecture 2
PDF
Alien vault sans cyber threat intelligence
PDF
IBM Security Strategy Overview
PDF
Symantec Cyber Security Solutions | MSS and Advanced Threat Protection
PPTX
5 Steps to an Effective Vulnerability Management Program
PPSX
Next-Gen security operation center
PPTX
Federal Cybersecurity: The latest challenges, initiatives and best practices
PPTX
Vulnerability Assessment Presentation
PPT
Information security management
PDF
Vulnerability Management
PPTX
Your cyber security webinar
PPTX
Legal and ethical aspects
 
PRESENTATION▶ Cyber Security Services (CSS): Security Simulation
Building an application security program
Your cyber security webinar
Cloud computing security infrastructure
Dealing with Information Security, Risk Management & Cyber Resilience
OSB180: Learn More About Ivanti Endpoint Security
Security operations center 5 security controls
Cryptography and Network Security # Lecture 2
Alien vault sans cyber threat intelligence
IBM Security Strategy Overview
Symantec Cyber Security Solutions | MSS and Advanced Threat Protection
5 Steps to an Effective Vulnerability Management Program
Next-Gen security operation center
Federal Cybersecurity: The latest challenges, initiatives and best practices
Vulnerability Assessment Presentation
Information security management
Vulnerability Management
Your cyber security webinar
Legal and ethical aspects
 
Ad

Similar to Managing security threats in today’s enterprise (20)

PDF
PDF
Infographic - Key Issues CIO's and CISO's Face
PDF
Lessons Learned Fighting Modern Cyberthreats in Critical ICS Networks
PDF
A Guide To SMB Network Security Compliance Research Group(1)
PPTX
Cyber-Espionage: Understanding the Advanced Threat Landscape
PDF
Continuous Monitoring and Real Time Risk Scoring
PDF
Rethinking Cyber-Security: 7 Key Strategies for the Challenges that Lie Ahead
PDF
Why_TG
PDF
Are you ready for the next attack? reviewing the sp security checklist (apnic...
PDF
Are you ready for the next attack? Reviewing the SP Security Checklist
PPTX
Cyber Security Needs and Challenges
PDF
Cisco Connect 2018 Malaysia - Risk less, achieve more with proactive security
PDF
RSA: Security Analytics Architecture for APT
PDF
[cb22] Keynote: Underwhelmed: Making Sense of the Overwhelming Challenge of C...
PPTX
Optimizing Security Operations: 5 Keys to Success
PDF
Pivotal Data Lake Architecture & its role in security analytics
 
PPTX
IT Security Essentials
PDF
Why Corporate Security Professionals Should Care About Information Security
PDF
Atelier Technique SYMANTEC ACSS 2018
PPTX
Vulnerability Areas Hackers Scan For When Choosing Their Next Victim
Infographic - Key Issues CIO's and CISO's Face
Lessons Learned Fighting Modern Cyberthreats in Critical ICS Networks
A Guide To SMB Network Security Compliance Research Group(1)
Cyber-Espionage: Understanding the Advanced Threat Landscape
Continuous Monitoring and Real Time Risk Scoring
Rethinking Cyber-Security: 7 Key Strategies for the Challenges that Lie Ahead
Why_TG
Are you ready for the next attack? reviewing the sp security checklist (apnic...
Are you ready for the next attack? Reviewing the SP Security Checklist
Cyber Security Needs and Challenges
Cisco Connect 2018 Malaysia - Risk less, achieve more with proactive security
RSA: Security Analytics Architecture for APT
[cb22] Keynote: Underwhelmed: Making Sense of the Overwhelming Challenge of C...
Optimizing Security Operations: 5 Keys to Success
Pivotal Data Lake Architecture & its role in security analytics
 
IT Security Essentials
Why Corporate Security Professionals Should Care About Information Security
Atelier Technique SYMANTEC ACSS 2018
Vulnerability Areas Hackers Scan For When Choosing Their Next Victim
Ad

More from Quick Heal Technologies Ltd. (20)

PDF
Digital Threat Landscape
PDF
Cybersecurity in Banking Sector
PDF
31 Internet Security Tips on CyberSecurity Month Ocotober
PDF
How a Ransomware Infects your Computer [INFOGRAPHIC]
PPTX
Next-Gen Security Solution: Gateway Protection
PPTX
Centralized Patch Management - Proven Security Approach for Ransomware Protec...
PPT
Protecting Your organization from WannaCry Ransomware
PPTX
Seqrite Data Loss Prevention- Complete Protection from Data Theft and Data Loss
PPTX
Is Antivirus (AV) Dead or Just Missing in Action
PPT
Safeguard your enterprise against ransomware
PDF
Data Security in Healthcare
PPTX
GITEX 2016, Dubai
PPTX
Seqrite EPS 7.0 launched in Poland by valued distributors, IT Dystrybucja 24
PPTX
Maharashtra Cooperative Summit 2016
PPTX
Seqrite Hyderabad Meet 2016
PPTX
Seqrite CXO Meet, Ahmedabad, India
PPTX
PPTX
Seqrite Launch Event in Athens, Greece.
PPTX
BFSI Leadership Summit, Mumbai
PPTX
Jnana Sangama Day 1 - National convention for higher education
Digital Threat Landscape
Cybersecurity in Banking Sector
31 Internet Security Tips on CyberSecurity Month Ocotober
How a Ransomware Infects your Computer [INFOGRAPHIC]
Next-Gen Security Solution: Gateway Protection
Centralized Patch Management - Proven Security Approach for Ransomware Protec...
Protecting Your organization from WannaCry Ransomware
Seqrite Data Loss Prevention- Complete Protection from Data Theft and Data Loss
Is Antivirus (AV) Dead or Just Missing in Action
Safeguard your enterprise against ransomware
Data Security in Healthcare
GITEX 2016, Dubai
Seqrite EPS 7.0 launched in Poland by valued distributors, IT Dystrybucja 24
Maharashtra Cooperative Summit 2016
Seqrite Hyderabad Meet 2016
Seqrite CXO Meet, Ahmedabad, India
Seqrite Launch Event in Athens, Greece.
BFSI Leadership Summit, Mumbai
Jnana Sangama Day 1 - National convention for higher education

Recently uploaded (20)

PPTX
Introduction to Windows Operating System
PDF
MCP Security Tutorial - Beginner to Advanced
PDF
EaseUS PDF Editor Pro 6.2.0.2 Crack with License Key 2025
PDF
Wondershare Recoverit Full Crack New Version (Latest 2025)
PPTX
Airline CRS | Airline CRS Systems | CRS System
PPTX
"Secure File Sharing Solutions on AWS".pptx
PDF
Topaz Photo AI Crack New Download (Latest 2025)
PDF
Multiverse AI Review 2025: Access All TOP AI Model-Versions!
PDF
Autodesk AutoCAD Crack Free Download 2025
PPTX
Computer Software - Technology and Livelihood Education
PDF
Salesforce Agentforce AI Implementation.pdf
PDF
AI-Powered Threat Modeling: The Future of Cybersecurity by Arun Kumar Elengov...
PDF
BoxLang Dynamic AWS Lambda - Japan Edition
PPTX
Tech Workshop Escape Room Tech Workshop
PDF
AI/ML Infra Meetup | Beyond S3's Basics: Architecting for AI-Native Data Access
PPTX
Weekly report ppt - harsh dattuprasad patel.pptx
PPTX
CNN LeNet5 Architecture: Neural Networks
PDF
DuckDuckGo Private Browser Premium APK for Android Crack Latest 2025
PDF
CCleaner 6.39.11548 Crack 2025 License Key
PDF
How Tridens DevSecOps Ensures Compliance, Security, and Agility
Introduction to Windows Operating System
MCP Security Tutorial - Beginner to Advanced
EaseUS PDF Editor Pro 6.2.0.2 Crack with License Key 2025
Wondershare Recoverit Full Crack New Version (Latest 2025)
Airline CRS | Airline CRS Systems | CRS System
"Secure File Sharing Solutions on AWS".pptx
Topaz Photo AI Crack New Download (Latest 2025)
Multiverse AI Review 2025: Access All TOP AI Model-Versions!
Autodesk AutoCAD Crack Free Download 2025
Computer Software - Technology and Livelihood Education
Salesforce Agentforce AI Implementation.pdf
AI-Powered Threat Modeling: The Future of Cybersecurity by Arun Kumar Elengov...
BoxLang Dynamic AWS Lambda - Japan Edition
Tech Workshop Escape Room Tech Workshop
AI/ML Infra Meetup | Beyond S3's Basics: Architecting for AI-Native Data Access
Weekly report ppt - harsh dattuprasad patel.pptx
CNN LeNet5 Architecture: Neural Networks
DuckDuckGo Private Browser Premium APK for Android Crack Latest 2025
CCleaner 6.39.11548 Crack 2025 License Key
How Tridens DevSecOps Ensures Compliance, Security, and Agility

Managing security threats in today’s enterprise

  • 1. Managing Security Threats in Today’s Enterprise
  • 2. Agenda 1) Today’s enterprise scenario 2) Rise of Advanced Persistent Threats & Other Risks 3) Triangle of Use.x 4) User Awareness 5) One single point of observation 6) Security appliances have to work out-of-the-box 7) Q&A
  • 3. • Consistent growth in number of malwares & cyber crime incidents • No Platform/OS is 100% immune from threat • Exponential growth of highly sophisticated and advanced global cyber criminals’ community • Sophisticated cyber crooks want your intellectual property, confidential information, financial data, trade secrets etc. • Attacks are more persistent, pervasive, and in some cases more targeted than ever before…! Today’s enterprise Scenario
  • 4. Rise of Advanced Persistent Threats & Other Risks Advanced Persistent Threats (APTs) are targeted cyber-attacks designed to dodge an organization’s technical countermeasures. APTs are specifically designed to bypass firewalls, intrusion detection systems, and anti- malware programs. Source: PWC 3.4 million 9.4 million 22.7 million 24.9 million 28.9 million 42.8 million 2009 2010 2011 2012 2013 2014 Total number of Security Incidents to grow 66% CAGR
  • 5. Page 4 Cloud External factors to consider Big Data Mobility Security and Risk 738 25% 7.22 60% Number of cloud services that a company uses on average. By 2016, 25% of global firms will adopt big data analytics for security and fraud detection. Number of mobile devices around the world today in BILLIONS. By 2020, 60% of enterprise security budgets will be allocated for rapid detection and response strategies.
  • 6. Attacks in News!! • NSA implants software into 100,000 computers • This allows them to reach non-connected machines through supply chain attack vectors • NSA calls this ‘active defense’
  • 8. How it is done?
  • 9. Today’s SMB & Enterprise Challenges • Security Information and Event Management (SIEM) is an essential cyber security technology. • SMBs face the same cyber threats as their enterprise counterparts; however, SMBs cannot typically apply the same security professional resources to the issue. • While SIEM platforms are built to scale up, the challenges to scale down an enterprise-scale SIEM for SMB are challenging and costly.
  • 10. Lack of dedicated Network Security Professional • In the vast majority of SMB, network security is treated as a subset of IT. • Demand for cybersecurity tools and resources has doubled since 2014, but a lack of skills and dedicated resources are the main obstacles to implementing them • In SMB Security function are managed by lower IT Admin staff & Due to Lack of training & knowledge its unable to understand the network security requirement. • Budgets allocated for IT security are one of the big challenges . Solution:- • We analyzed all the network setup & extended awareness of security in general. • Identified policy and compliance issues originating from networks.
  • 11. One single point of observation In most of SMB Assuming that the IT Director could purchase several cyber security tools, Managing & Monitor the all the security incident at single console is challenge. Detecting threat & prioritizing it is a big challenge Solution Provides real-time visibility for threat detection and prioritization, delivering surveillance throughout the entire IT infrastructure. Produces detailed data access and user activity reports to help manage compliance. Managed Service Providers helps deliver cost-effective security intelligence using a single console that supports multiple sites & customer.
  • 12. Advanced Most of the targeted attacks have the ability to evade detection and the capability to gain and maintain access to well protected networks and sensitive information. Written by highly technical and motivated group of malware writers. Persistent Uses advanced root-kit /stealth technologies to be persistent in nature, very difficult to sense the presence. Threat Everything is at risk…! Most Infamous APTs: Stuxnet, Ghostnet, Duqu, Flame, Shamoon, Wiper APT: Not just another malware category!
  • 13. Important factors behind successful Targeted Attack Technology Factor: • Bypassing Traditional Security with limited capabilities • Software Design/Architecture Flaws: Vulnerable Systems • Outdated/Unpatched Operating Systems OR Outdated Antivirus Human Factor: • Highly sophisticated and extremely organized cyber criminals • Unaware/Irresponsible Insider • Application developers not following Secure SDLC • IT Admin Team’s Incompetence: Inefficient Configuration Important Factors: Technology & Human
  • 14. Security appliances have to work out-of-the-box SMB don’t have dedicated personnel that can write rules for incident detection, create inputs for compliance reporting, and write scripts to connect platforms via application program interfaces (API). In this case the IT Admin is constrained by time and practical network security expertise. Solution • Collect, retain, search, alert and report on logs throughout your infrastructure • Providing compliance focused analysts and auditors • Automated mechanisms and advanced correlation • Pre-Built Compliance Reports as per Industry Standard
  • 15. • Design good security strategy: Understand the threat landscape relevant to your computing environment and have good security strategy and policies with periodic auditing and revision • Develop efficient security Infrastructure: Your Infrastructure’s ability to rapidly discover the presence of the threat and respond to it,will help you to mitigate advanced and targeted threats • Observe and track every smallest activity to sense any anomaly: Early Discovery-> Early Reaction ->Lesser the Impact • Security in the culture: Security education, awareness and common sense will play crucial role DDOS: Mantra for best enterprise security
  • 16. Write to us at: [email protected] Follow us on: Facebook: www.facebook.com/seqrite Twitter: www.twitter.com/seqrite Google Plus: http://bit.ly/SeqriteGooglePlus LinkedIn: https://www.linkedin.com/company/seqrite YouTube: http://bit.ly/SeqriteYouTube Visit us: Website: www.seqrite.com Share your feedback with us