19
Future Juha Kivikoski Chief Operating Officer Stonesoft Corporation

Ctab intro juha kivikoski

Embed Size (px)

Citation preview

Page 1: Ctab intro   juha kivikoski

Future Juha Kivikoski

Chief Operating Officer

Stonesoft Corporation

Page 2: Ctab intro   juha kivikoski

Facts and figures Founded in 1990 over 20 years of high end network security

Listed company since 1999 (NASDAQ OMX: SFT1V)

Operational offices in18 countries. 4 continents

R&D in 3 locations across Europe, Finland, France and Poland

# 1 European based network security vendor.

Deployments in more than 90 countries, on 5 continents

app. 250 employees. Technology R&D 50 % Customer base over 6000 large and mid sized organizations

Customer retention rate 95% is the highest in the industry

Globally working with 200 active channel partners

Product sales growing over 40% in 2011 and 2012.

Page 3: Ctab intro   juha kivikoski

Customer Base by verticals

Page 4: Ctab intro   juha kivikoski

We are securing

Data centers

Mission Critical Networks

Classified Data

Critical Applications

Financial transactions

Critical Infrastructure

Page 5: Ctab intro   juha kivikoski

Product Scope

Stay connected and secured in a dynamic world. Now and in the future.

Page 6: Ctab intro   juha kivikoski

BEING IN THE EYE OF THE PERFECT STORM The change of REALITY

Page 7: Ctab intro   juha kivikoski

What is security?

Page 8: Ctab intro   juha kivikoski

The Security Trinity is a Combination of…

Reality What is the

situation out there?

Feeling Are we

secured or not?

Model & Technology

How are we protecting ourselves?

Page 9: Ctab intro   juha kivikoski

Reality

How things really are out there?

Model

How can we protect

ourselves?

Feeling

Are we secured or not?

Dynamics of Security

Some reality checks:

Feelings and Model must be

grounded in reality – NEVER the

other way around.

Changing a model or feeling never

changes the reality.

Marketing can make you feel

secured but reality can be

different

We need to always ask if the link

between Reality=Facts=Research

has changed and act on that

Page 10: Ctab intro   juha kivikoski

REALITY THE CHANGE OF …

Page 11: Ctab intro   juha kivikoski

302-DIRECT-MEDIA-ASN

8e6 Technologies, Inc.

AAPT AAPT Limited

ABBOTT Abbot Labs

ABOVENET-CUSTOMER – Abovenet

Communications, Inc

ACCNETWORKS – Advanced Computer Connections

ACEDATACENTERS-AS-1 – Ace Data Centers, Inc.

ACSEAST – ACS Inc.

ACS-INTERNET – Affiliated Computer Services

ACS-INTERNET – Armstrong Cable Services

ADELPHIA-AS – Road Runner HoldCo LLC

Administracion Nacional de Telecomunicaciones

AERO-NET – The Aerospace Corporation

AHP – WYETH-AYERST/AMERICAN HOME

PRODUCTS

AIRLOGIC – Digital Magicians, Inc.

AIRTELBROADBAND-AS-AP Bharti Airtel Ltd.,

Telemedia Services

AIS-WEST – American Internet Services, LLC.

AKADO-STOLITSA-AS _AKADO-Stolitsa_ JSC

ALCANET Corporate ALCANET Access

ALCANET-DE-AS Alcanet International Deutschland

GmbH

ALCATEL-NA – Alcanet International NA

ALCHEMYNET – Alchemy Communications, Inc.

Alestra, S. de R.L. de C.V.

ALLIANCE-GATEWAY-AS-AP Alliance Broadband

Services Pvt. Ltd.,Alliance Gateway AS,Broadband

Services Provider,Kolkata,India

ALMAZAYA Almazaya gateway L.L.C

AMAZON-AES – Amazon.com, Inc.

AMERITECH-AS – AT&T Services, Inc.

AMNET-AU-AP Amnet IT Services Pty Ltd

ANITEX-AS Anitex Autonomus System

AOL-ATDN – AOL Transit Data Network

API-DIGITAL – API Digital Communications Group,

LLC

APOLLO-AS LATTELEKOM-APOLLO

APOLLO-GROUP-INC – University of Phoenix

APT-AP AS

ARLINGTONVA – Arlington County Government

ARMENTEL Armenia Telephone Company

Advanced & Targeted attacks

Nationalization Industrialization

Page 12: Ctab intro   juha kivikoski

Industrialization

It is a 388 Billion USD industry…and

growing! Norton Cyber Crime report 2011

Malicious attacks by cyber criminals

increased by 81% in 2011 Symantec Report

2011

Organized crime is moving to e-

crime

Hacktivists have started

implementing e-tactics in their fight

Entry barriers to e-crime and

hacking lowering

Page 13: Ctab intro   juha kivikoski

Advanced & Persistent Threats increasing

National goals to improve cyber readiness and capabilities

State level hacking for national interests

Advanced and state level resourced attacks e.g. STUXNET

Cyber war strategies and programs

Nationalization

Page 14: Ctab intro   juha kivikoski

Advanced Hacking Techniques

More advanced and effective (e.g. AETs)

Professional activity. Own labs and testing tools

Focused on hacking strategies and delivery methods

Specific and sophisticated tools for specific needs

31% of attacks against large organizations utilized unknown hacking techniques Verizon Breach

Investigation report 2011

Page 15: Ctab intro   juha kivikoski

Implications

It’s public NEWS!

Bad guys are getting an upper hand

No one is safe but do not be an easy target

High Business risk

Becomes a personal matter for C-level, board members and shareholders

Page 16: Ctab intro   juha kivikoski

Digital World has become a domain where strategic advantage (national, industrial or military) can be lost or won

Page 17: Ctab intro   juha kivikoski

PARADIGM SHIFT TECHNOLOGY IMPLICATIONS

Physical contrains do not limit actions

”5 seconds war” from anywhere

Security can not be aftertough

Network Architecture must have Security build in

Situational Awareness Visibility is everything

Managing the ”Unknown” Focus to Vulnerabilities and visibility – not to known exploits

Deterrence Shown ability to Counter Measures

Layered Defence with Cell structure

System ability to support complex topologies

Dynamic and Agile All security functions must be remotely updateble efficiently

Digital Maintenance and Supply Security

Ability to make changes during crisis and use the HW platforms you find

Continuity All components must be HA

Page 18: Ctab intro   juha kivikoski

Our Mission

To Protect and save Lives and

Businesses in Cyber Space

Page 19: Ctab intro   juha kivikoski

Our Vision

The Best Protection for

Cyber Space