Upload
stonesoft
View
495
Download
0
Tags:
Embed Size (px)
Citation preview
Future Juha Kivikoski
Chief Operating Officer
Stonesoft Corporation
Facts and figures Founded in 1990 over 20 years of high end network security
Listed company since 1999 (NASDAQ OMX: SFT1V)
Operational offices in18 countries. 4 continents
R&D in 3 locations across Europe, Finland, France and Poland
# 1 European based network security vendor.
Deployments in more than 90 countries, on 5 continents
app. 250 employees. Technology R&D 50 % Customer base over 6000 large and mid sized organizations
Customer retention rate 95% is the highest in the industry
Globally working with 200 active channel partners
Product sales growing over 40% in 2011 and 2012.
Customer Base by verticals
We are securing
Data centers
Mission Critical Networks
Classified Data
Critical Applications
Financial transactions
Critical Infrastructure
Product Scope
Stay connected and secured in a dynamic world. Now and in the future.
BEING IN THE EYE OF THE PERFECT STORM The change of REALITY
What is security?
The Security Trinity is a Combination of…
Reality What is the
situation out there?
Feeling Are we
secured or not?
Model & Technology
How are we protecting ourselves?
Reality
How things really are out there?
Model
How can we protect
ourselves?
Feeling
Are we secured or not?
Dynamics of Security
Some reality checks:
Feelings and Model must be
grounded in reality – NEVER the
other way around.
Changing a model or feeling never
changes the reality.
Marketing can make you feel
secured but reality can be
different
We need to always ask if the link
between Reality=Facts=Research
has changed and act on that
REALITY THE CHANGE OF …
302-DIRECT-MEDIA-ASN
8e6 Technologies, Inc.
AAPT AAPT Limited
ABBOTT Abbot Labs
ABOVENET-CUSTOMER – Abovenet
Communications, Inc
ACCNETWORKS – Advanced Computer Connections
ACEDATACENTERS-AS-1 – Ace Data Centers, Inc.
ACSEAST – ACS Inc.
ACS-INTERNET – Affiliated Computer Services
ACS-INTERNET – Armstrong Cable Services
ADELPHIA-AS – Road Runner HoldCo LLC
Administracion Nacional de Telecomunicaciones
AERO-NET – The Aerospace Corporation
AHP – WYETH-AYERST/AMERICAN HOME
PRODUCTS
AIRLOGIC – Digital Magicians, Inc.
AIRTELBROADBAND-AS-AP Bharti Airtel Ltd.,
Telemedia Services
AIS-WEST – American Internet Services, LLC.
AKADO-STOLITSA-AS _AKADO-Stolitsa_ JSC
ALCANET Corporate ALCANET Access
ALCANET-DE-AS Alcanet International Deutschland
GmbH
ALCATEL-NA – Alcanet International NA
ALCHEMYNET – Alchemy Communications, Inc.
Alestra, S. de R.L. de C.V.
ALLIANCE-GATEWAY-AS-AP Alliance Broadband
Services Pvt. Ltd.,Alliance Gateway AS,Broadband
Services Provider,Kolkata,India
ALMAZAYA Almazaya gateway L.L.C
AMAZON-AES – Amazon.com, Inc.
AMERITECH-AS – AT&T Services, Inc.
AMNET-AU-AP Amnet IT Services Pty Ltd
ANITEX-AS Anitex Autonomus System
AOL-ATDN – AOL Transit Data Network
API-DIGITAL – API Digital Communications Group,
LLC
APOLLO-AS LATTELEKOM-APOLLO
APOLLO-GROUP-INC – University of Phoenix
APT-AP AS
ARLINGTONVA – Arlington County Government
ARMENTEL Armenia Telephone Company
Advanced & Targeted attacks
Nationalization Industrialization
Industrialization
It is a 388 Billion USD industry…and
growing! Norton Cyber Crime report 2011
Malicious attacks by cyber criminals
increased by 81% in 2011 Symantec Report
2011
Organized crime is moving to e-
crime
Hacktivists have started
implementing e-tactics in their fight
Entry barriers to e-crime and
hacking lowering
Advanced & Persistent Threats increasing
National goals to improve cyber readiness and capabilities
State level hacking for national interests
Advanced and state level resourced attacks e.g. STUXNET
Cyber war strategies and programs
Nationalization
Advanced Hacking Techniques
More advanced and effective (e.g. AETs)
Professional activity. Own labs and testing tools
Focused on hacking strategies and delivery methods
Specific and sophisticated tools for specific needs
31% of attacks against large organizations utilized unknown hacking techniques Verizon Breach
Investigation report 2011
Implications
It’s public NEWS!
Bad guys are getting an upper hand
No one is safe but do not be an easy target
High Business risk
Becomes a personal matter for C-level, board members and shareholders
Digital World has become a domain where strategic advantage (national, industrial or military) can be lost or won
PARADIGM SHIFT TECHNOLOGY IMPLICATIONS
Physical contrains do not limit actions
”5 seconds war” from anywhere
Security can not be aftertough
Network Architecture must have Security build in
Situational Awareness Visibility is everything
Managing the ”Unknown” Focus to Vulnerabilities and visibility – not to known exploits
Deterrence Shown ability to Counter Measures
Layered Defence with Cell structure
System ability to support complex topologies
Dynamic and Agile All security functions must be remotely updateble efficiently
Digital Maintenance and Supply Security
Ability to make changes during crisis and use the HW platforms you find
Continuity All components must be HA
Our Mission
To Protect and save Lives and
Businesses in Cyber Space
Our Vision
The Best Protection for
Cyber Space