SlideShare a Scribd company logo
15 JAAR VOOROP IN ICT
SECURITY

NEXT GENERATION SECURITY
MOTIV BIEDT WEERBAARHEID EN MONITORING
VOOR UW GEBRUIKERSNETWERK OF
DATACENTER
15 JAAR VOOROP IN ICT
SECURITY

SECURITY CHALLENGES
15 JAAR VOOROP IN ICT
SECURITY

SECURITY CHALLENGES
MALWARE FOUND
15 JAAR VOOROP IN ICT
SECURITY

SECURITY CHALLENGES
BOTNETS ATTACK
15 JAAR VOOROP IN ICT
SECURITY

SECURITY CHALLENGES
GEBRUIK VAN DIVERSE
APPLICATIES
15 JAAR VOOROP IN ICT
SECURITY

SECURITY CHALLENGES
TRADITIONELE FIREWALL
15 JAAR VOOROP IN ICT
SECURITY

SECURITY CHALLENGES
PROTECT AGAINST
UNAUTHORIZED ACCES
15 JAAR VOOROP IN ICT
SECURITY
Identity
Awareness

SECURITY CHALLENGES
IPSEC VPN & IDENTITY
AWARENESS
15 JAAR VOOROP IN ICT
SECURITY

NEXT GENERATION FIREWALL
MUST HAVE . . .
15 JAAR VOOROP IN ICT
SECURITY
Policies

 Practical and relevant to daily operations

People

 Different People – Different needs
 Involve & Engage users in the security
process

Enforcement

 Multi-layer controls for strong security

[Confidential] For designated groups and individuals
15 JAAR VOOROP IN ICT
SECURITY

SECURITY CHALLENGES
NEXT GENERATION FIREWALL
15 JAAR VOOROP IN ICT
SECURITY

SECURITY CHALLENGES
PROTECT AGAINST
UNAUTHORIZED ACCES
15 JAAR VOOROP IN ICT
SECURITY
Identity
Awarenes
s

SECURITY CHALLENGES
IPSEC VPN & IDENTITY
AWARENESS
15 JAAR VOOROP IN ICT
SECURITY

SECURITY CHALLENGES
IPS & APPLICATION CONTROL
15 JAAR VOOROP IN ICT
SECURITY
IPS
Anti-Bot
Antivirus

Network Threat Prevention
Mobile Access
DLP

Sensitive Data
Application
Control
URLF

Identity
Awareness

Internet Applications Usage
User Access

Granular Visibility

Mobile
Access

SmartEvent
15 JAAR VOOROP IN ICT
SECURITY

SECURITY CHALLENGES
MULTI LAYERED THREAT
PREVENTION
15 JAAR VOOROP IN ICT
SECURITY

SECURITY CHALLENGES
THREAT MANAGEMENT
15 JAAR VOOROP IN ICT
SECURITY

SECURITY CHALLENGES
PROTECT AGAINST
UNAUTHORIZED ACCES
15 JAAR VOOROP IN ICT
SECURITY
Identity
Awareness

SECURITY CHALLENGES
IPSEC VPN & IDENTITY
AWARENESS
15 JAAR VOOROP IN ICT
SECURITY

SECURITY CHALLENGES
PROTECT AGAINST EXPLOIT OF
VULNERABILITIES IN: WORD, EXCEL, PDF,
BROWSERS, OPERATING SYSTEMS...
15 JAAR VOOROP IN ICT
SECURITY

SECURITY CHALLENGES
BLOCK MALWARE FILE DOWNLOAD AND
ACCESS TO MALWARE CONTAINING SITES
15 JAAR VOOROP IN ICT
SECURITY

SECURITY CHALLENGES
OPTIMIZED WEB SECURITY THROUGH FULL
INTEGRATION IN THE GATEWAY
15 JAAR VOOROP IN ICT
SECURITY

SECURITY CHALLENGES
OPTIMIZED WEB SECURITY THROUGH FULL
INTEGRATION IN THE GATEWAY
15 JAAR VOOROP IN ICT
SECURITY

SECURITY CHALLENGES
DISCOVER AND STOP BOT ATTACKS
15 JAAR VOOROP IN ICT
SECURITY

SECURITY CHALLENGES
FIGHT AGAINST UNKNOWN THREATS !
15 JAAR VOOROP IN ICT
SECURITY
Download file sent
to Threat
Emulation

File Inspected
in virtual
sandbox

New attack
discovered

Malware is
blocked on
the gateway

New malware
signature sent
to ThreatCloud

 Monitor unexpected behavior:
 Network activity
 File system & registry
changes

 Process activity

Internet
Security
Gateway
15 JAAR VOOROP IN ICT
SECURITY

SECURITY CHALLENGES
POWERING THREAT PREVENTION SOFTWARE
BLADES WITH REAL-TIME SECURITY
INTELLIGENCE
15 JAAR VOOROP IN ICT
SECURITY

SECURITY CHALLENGES
MULTI LAYERED THREAT PREVENTION
15 JAAR VOOROPSecurity Gateways
IN ICT
Sec.Aas platform –
SECURITY

Weerbaarheid
& Monitoring

Optioneel (maatwerk):
Data Leakage Protection
Endpoint Protection
Mobile Access
Threat Emulation

STANDAARD
Preventie
Security
Gateway
Firewall
VPN
Identity Aware

NEXT GEN
Preventie

THREAT
Preventie

Security
Gateway

Security
Gateway

Firewall
VPN
Identity Aware

Firewall
VPN
Identity Aware

IPS
App Control

IPS
App Control
Malware
Filters
URL Filters
Spam Filters
Botnet Filters
15 JAAR VOOROP IN ICT
SECURITY
SECURITY MANAGEMENT PLATFORM
BRONNEN: THREAT CLOUD & NCSC
WEERBAARHEID & MONITORING
INCIDENT / RESPONSE
15 JAAR VOOROP IN -ICT
Sec. Aas Platform samenvatting
SECURITY

Wrap-up
• Geavanceerde cyberaanvallen zijn steeds lastiger te
signaleren en blokkeren;
• Motiv Next Generation platform blokkeert aanvallen met
de beste Next Generation Technologie en security
experts van Motiv;
• Dreigingen worden direct gemitigeerd dankzij security
intelligence van ThreatCloud en opvolging van
beveiligingsadviezen van NCSC;
• 24X7 monitoring met incident/response;
• Overzichtelijke compliancy rapportages.

More Related Content

PPTX
Ascendiendo a la GEN V de Cyber Security
PDF
Surviving the Ransomware Plague
PDF
Understanding Advanced Threats and How to Prevent Them
PPTX
Seguridad en Capas: Smart & Actionable Data
PPT
Interop 2007 Keynote Teaser
PPTX
How to get Started in Cyber Security - Rayan Crasta
PDF
Evolución de la Ciber Seguridad
PDF
Protect Your Infrastructure: Basics of Cloud Security | Fpwebinar
Ascendiendo a la GEN V de Cyber Security
Surviving the Ransomware Plague
Understanding Advanced Threats and How to Prevent Them
Seguridad en Capas: Smart & Actionable Data
Interop 2007 Keynote Teaser
How to get Started in Cyber Security - Rayan Crasta
Evolución de la Ciber Seguridad
Protect Your Infrastructure: Basics of Cloud Security | Fpwebinar

What's hot (20)

PPTX
PhD-Guidance-in-Information-Security
PPTX
Ntxissacsc5 purple 4-threat detection using machine learning-markszewczul
PPT
Privacy in Wireless Networks
PDF
Security from sensor to sunset. “How to approach the security in the IoT ecos...
PDF
Ten Expert Tips on Internet of Things Security
PDF
AppSec Awareness: A Blueprint for Security Culture Change
PDF
6 Security Tips for Using Public WiFi
PDF
CLASS 2018 - Palestra de Shad Harris (Senior Subject Matter Expert on Securit...
PDF
85% of App Store Apps Fail OWASP Mobile Top 10: Are you exposed?
PPTX
RSA APJ - BLOCKCHAIN SECURITY – IS IT REALLY DIFFERENT THAN ANYTHING ELSE ?
PDF
Zymr Cybersecurity
PDF
30 Killer Internet Security Tips
PPTX
What is spear phishing ( cyber attack )
PDF
OFFICE 365 SECURITY
PDF
Five mobile security challenges facing the enterprise
PDF
"10 Tips To Keep Cybercriminals Out While Coronavirus Keeps You In" Infographic
PDF
10 Tips to Keep Criminals Out
PPTX
Business Continuity and app Security
PPTX
Tackling today's cyber security challenges - WISER Services & Solutions
PPTX
20180120 spsbre - we are moving to the cloud what about security
PhD-Guidance-in-Information-Security
Ntxissacsc5 purple 4-threat detection using machine learning-markszewczul
Privacy in Wireless Networks
Security from sensor to sunset. “How to approach the security in the IoT ecos...
Ten Expert Tips on Internet of Things Security
AppSec Awareness: A Blueprint for Security Culture Change
6 Security Tips for Using Public WiFi
CLASS 2018 - Palestra de Shad Harris (Senior Subject Matter Expert on Securit...
85% of App Store Apps Fail OWASP Mobile Top 10: Are you exposed?
RSA APJ - BLOCKCHAIN SECURITY – IS IT REALLY DIFFERENT THAN ANYTHING ELSE ?
Zymr Cybersecurity
30 Killer Internet Security Tips
What is spear phishing ( cyber attack )
OFFICE 365 SECURITY
Five mobile security challenges facing the enterprise
"10 Tips To Keep Cybercriminals Out While Coronavirus Keeps You In" Infographic
10 Tips to Keep Criminals Out
Business Continuity and app Security
Tackling today's cyber security challenges - WISER Services & Solutions
20180120 spsbre - we are moving to the cloud what about security
Ad

Similar to Next generation firewall (infosecurity 2013) (20)

PPTX
Top 5 Cybersecurity Threats in Retail Industry
PDF
Security Industry Overview
PPT
Cisco Managed Security
PPTX
Cisco Security DNA
PDF
Data Security in Healthcare
PDF
VoIP security
PDF
Beveilig je data met windows 10
PDF
Top 10 Network Security Solutions by Infosectrain
PDF
Top 10 Network Security Solutions You Need to Know.pdf
PDF
Top 10 Network Security Solutions.pdf
PPTX
WatchGuard - Security event juni 2016
PPTX
Cisco Network Insider: Three Ways to Secure your Network
PDF
Insecure magazine - 52
PPTX
Network security
PPT
IoT security (Internet of Things)
PDF
fundamental of IT Security and what is IT security
PDF
Security Everywhere: A Growth Engine for the Digital Economy
PDF
Watchguard security proposal 2012
PDF
Know More about Core IT Infrastructure Security | Secninjaz Technologies LLP
PDF
Cyber security-briefing-presentation
Top 5 Cybersecurity Threats in Retail Industry
Security Industry Overview
Cisco Managed Security
Cisco Security DNA
Data Security in Healthcare
VoIP security
Beveilig je data met windows 10
Top 10 Network Security Solutions by Infosectrain
Top 10 Network Security Solutions You Need to Know.pdf
Top 10 Network Security Solutions.pdf
WatchGuard - Security event juni 2016
Cisco Network Insider: Three Ways to Secure your Network
Insecure magazine - 52
Network security
IoT security (Internet of Things)
fundamental of IT Security and what is IT security
Security Everywhere: A Growth Engine for the Digital Economy
Watchguard security proposal 2012
Know More about Core IT Infrastructure Security | Secninjaz Technologies LLP
Cyber security-briefing-presentation
Ad

Recently uploaded (20)

PDF
Hybrid model detection and classification of lung cancer
PDF
A novel scalable deep ensemble learning framework for big data classification...
PDF
August Patch Tuesday
PDF
Zenith AI: Advanced Artificial Intelligence
PDF
STKI Israel Market Study 2025 version august
PPTX
Chapter 5: Probability Theory and Statistics
PPTX
MicrosoftCybserSecurityReferenceArchitecture-April-2025.pptx
PPTX
Programs and apps: productivity, graphics, security and other tools
PDF
gpt5_lecture_notes_comprehensive_20250812015547.pdf
PDF
Getting Started with Data Integration: FME Form 101
PDF
1 - Historical Antecedents, Social Consideration.pdf
PPTX
TLE Review Electricity (Electricity).pptx
PDF
A contest of sentiment analysis: k-nearest neighbor versus neural network
PPTX
cloud_computing_Infrastucture_as_cloud_p
PDF
Hindi spoken digit analysis for native and non-native speakers
PDF
2021 HotChips TSMC Packaging Technologies for Chiplets and 3D_0819 publish_pu...
PPTX
observCloud-Native Containerability and monitoring.pptx
PDF
NewMind AI Weekly Chronicles – August ’25 Week III
PDF
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
PDF
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
Hybrid model detection and classification of lung cancer
A novel scalable deep ensemble learning framework for big data classification...
August Patch Tuesday
Zenith AI: Advanced Artificial Intelligence
STKI Israel Market Study 2025 version august
Chapter 5: Probability Theory and Statistics
MicrosoftCybserSecurityReferenceArchitecture-April-2025.pptx
Programs and apps: productivity, graphics, security and other tools
gpt5_lecture_notes_comprehensive_20250812015547.pdf
Getting Started with Data Integration: FME Form 101
1 - Historical Antecedents, Social Consideration.pdf
TLE Review Electricity (Electricity).pptx
A contest of sentiment analysis: k-nearest neighbor versus neural network
cloud_computing_Infrastucture_as_cloud_p
Hindi spoken digit analysis for native and non-native speakers
2021 HotChips TSMC Packaging Technologies for Chiplets and 3D_0819 publish_pu...
observCloud-Native Containerability and monitoring.pptx
NewMind AI Weekly Chronicles – August ’25 Week III
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
From MVP to Full-Scale Product A Startup’s Software Journey.pdf

Next generation firewall (infosecurity 2013)

  • 1. 15 JAAR VOOROP IN ICT SECURITY NEXT GENERATION SECURITY MOTIV BIEDT WEERBAARHEID EN MONITORING VOOR UW GEBRUIKERSNETWERK OF DATACENTER
  • 2. 15 JAAR VOOROP IN ICT SECURITY SECURITY CHALLENGES
  • 3. 15 JAAR VOOROP IN ICT SECURITY SECURITY CHALLENGES MALWARE FOUND
  • 4. 15 JAAR VOOROP IN ICT SECURITY SECURITY CHALLENGES BOTNETS ATTACK
  • 5. 15 JAAR VOOROP IN ICT SECURITY SECURITY CHALLENGES GEBRUIK VAN DIVERSE APPLICATIES
  • 6. 15 JAAR VOOROP IN ICT SECURITY SECURITY CHALLENGES TRADITIONELE FIREWALL
  • 7. 15 JAAR VOOROP IN ICT SECURITY SECURITY CHALLENGES PROTECT AGAINST UNAUTHORIZED ACCES
  • 8. 15 JAAR VOOROP IN ICT SECURITY Identity Awareness SECURITY CHALLENGES IPSEC VPN & IDENTITY AWARENESS
  • 9. 15 JAAR VOOROP IN ICT SECURITY NEXT GENERATION FIREWALL MUST HAVE . . .
  • 10. 15 JAAR VOOROP IN ICT SECURITY Policies  Practical and relevant to daily operations People  Different People – Different needs  Involve & Engage users in the security process Enforcement  Multi-layer controls for strong security [Confidential] For designated groups and individuals
  • 11. 15 JAAR VOOROP IN ICT SECURITY SECURITY CHALLENGES NEXT GENERATION FIREWALL
  • 12. 15 JAAR VOOROP IN ICT SECURITY SECURITY CHALLENGES PROTECT AGAINST UNAUTHORIZED ACCES
  • 13. 15 JAAR VOOROP IN ICT SECURITY Identity Awarenes s SECURITY CHALLENGES IPSEC VPN & IDENTITY AWARENESS
  • 14. 15 JAAR VOOROP IN ICT SECURITY SECURITY CHALLENGES IPS & APPLICATION CONTROL
  • 15. 15 JAAR VOOROP IN ICT SECURITY IPS Anti-Bot Antivirus Network Threat Prevention Mobile Access DLP Sensitive Data Application Control URLF Identity Awareness Internet Applications Usage User Access Granular Visibility Mobile Access SmartEvent
  • 16. 15 JAAR VOOROP IN ICT SECURITY SECURITY CHALLENGES MULTI LAYERED THREAT PREVENTION
  • 17. 15 JAAR VOOROP IN ICT SECURITY SECURITY CHALLENGES THREAT MANAGEMENT
  • 18. 15 JAAR VOOROP IN ICT SECURITY SECURITY CHALLENGES PROTECT AGAINST UNAUTHORIZED ACCES
  • 19. 15 JAAR VOOROP IN ICT SECURITY Identity Awareness SECURITY CHALLENGES IPSEC VPN & IDENTITY AWARENESS
  • 20. 15 JAAR VOOROP IN ICT SECURITY SECURITY CHALLENGES PROTECT AGAINST EXPLOIT OF VULNERABILITIES IN: WORD, EXCEL, PDF, BROWSERS, OPERATING SYSTEMS...
  • 21. 15 JAAR VOOROP IN ICT SECURITY SECURITY CHALLENGES BLOCK MALWARE FILE DOWNLOAD AND ACCESS TO MALWARE CONTAINING SITES
  • 22. 15 JAAR VOOROP IN ICT SECURITY SECURITY CHALLENGES OPTIMIZED WEB SECURITY THROUGH FULL INTEGRATION IN THE GATEWAY
  • 23. 15 JAAR VOOROP IN ICT SECURITY SECURITY CHALLENGES OPTIMIZED WEB SECURITY THROUGH FULL INTEGRATION IN THE GATEWAY
  • 24. 15 JAAR VOOROP IN ICT SECURITY SECURITY CHALLENGES DISCOVER AND STOP BOT ATTACKS
  • 25. 15 JAAR VOOROP IN ICT SECURITY SECURITY CHALLENGES FIGHT AGAINST UNKNOWN THREATS !
  • 26. 15 JAAR VOOROP IN ICT SECURITY Download file sent to Threat Emulation File Inspected in virtual sandbox New attack discovered Malware is blocked on the gateway New malware signature sent to ThreatCloud  Monitor unexpected behavior:  Network activity  File system & registry changes  Process activity Internet Security Gateway
  • 27. 15 JAAR VOOROP IN ICT SECURITY SECURITY CHALLENGES POWERING THREAT PREVENTION SOFTWARE BLADES WITH REAL-TIME SECURITY INTELLIGENCE
  • 28. 15 JAAR VOOROP IN ICT SECURITY SECURITY CHALLENGES MULTI LAYERED THREAT PREVENTION
  • 29. 15 JAAR VOOROPSecurity Gateways IN ICT Sec.Aas platform – SECURITY Weerbaarheid & Monitoring Optioneel (maatwerk): Data Leakage Protection Endpoint Protection Mobile Access Threat Emulation STANDAARD Preventie Security Gateway Firewall VPN Identity Aware NEXT GEN Preventie THREAT Preventie Security Gateway Security Gateway Firewall VPN Identity Aware Firewall VPN Identity Aware IPS App Control IPS App Control Malware Filters URL Filters Spam Filters Botnet Filters
  • 30. 15 JAAR VOOROP IN ICT SECURITY SECURITY MANAGEMENT PLATFORM BRONNEN: THREAT CLOUD & NCSC WEERBAARHEID & MONITORING INCIDENT / RESPONSE
  • 31. 15 JAAR VOOROP IN -ICT Sec. Aas Platform samenvatting SECURITY Wrap-up • Geavanceerde cyberaanvallen zijn steeds lastiger te signaleren en blokkeren; • Motiv Next Generation platform blokkeert aanvallen met de beste Next Generation Technologie en security experts van Motiv; • Dreigingen worden direct gemitigeerd dankzij security intelligence van ThreatCloud en opvolging van beveiligingsadviezen van NCSC; • 24X7 monitoring met incident/response; • Overzichtelijke compliancy rapportages.