View
553
Download
0
Tags:
Embed Size (px)
DESCRIPTION
Beyond the PC: Combating Unmanaged Threats Security Gain insights about how to protect your vital information against security threats by viewing this presentation from the Optimist TV webinar.
Citation preview
BEYOND THE PC – COMBATING UNMANAGED THREATS June 12th, 2013
View the webinar replay here: https://www.brainshark.com/xerox/vu?pi=zIDz6kmucz62tqz0
Watch this video here:
http://a400.g.akamai.net/7/400/14595/v0001/xeroxwebcast.download.akamai.com/14595/TEMP/201306/Computer_Hacking-Cracking_down_on_cyber_crime-clip1.mp4
TODAY’S PROGRAM
• CISO Insights – Mark Leary, Chief Information Security Officer, Xerox
• Solutions: Managed Print Services and ConnectKey™ – Karl Dueland, VP Solutions Delivery Unit, Xerox
• Protecting Your Network – John Hartman, Client Executive, Cisco
• Embedded Security, Smarter Security – Brian Kenyon, Chief Technology Officer, McAfee
INSIGHTS Mark Leary
Chief Information Security Officer
Xerox
THE “INTERNET OF THINGS”
It has arrived….and so have huge security issues….
– Network and protocol security
– Data privacy and security
– Identity
– Trust
population with Internet access in 2015
75%
devices connected to the Internet in 2015
6B
devices connected to the Internet in 2020
30B
A “THING” CALLED A MFP…
3.4
MILLION
businesses that experienced a printer-related data breach
companies without a secure print strategy
65%
companies have a secure print initiative
22%
63%
COMMON MFP SECURITY THREATS
• Poor mobile device management • Weak MFP wireless access control
• Poor VPN remote access controls • Poor Web-based remote access controls • Weak identity and access management
• MFP hardware component weaknesses • MFP embedded software weaknesses • Poor partner/contractor/consultant access
• Poor physical access to MFPs • Poor MFP system and application access • Poor MFP software management controls
REMOTE ACCESS
PROXIMITY
INSIDER THREAT
SUPPLY CHAIN
QUESTIONS TO ASK
1) Do we have an understanding of our business processes that involve document management and printing?
2) What threats are targeting our IT environment and particularly MFPs?
3) Are our policies addressing MFP information security still relevant to protect the business?
4) Are our MFPs correctly configured to prevent cyber attacks?
5) Do we have visibility into our IT environment to identify devices and determine normal behavior from abnormal?
6) Are we incorporating our customers, partners, and vendors into our IT security operating model?
A CYCLE OF CONTINUOUS VALUE
Document Outsourcing
IT Outsourcing
Business Process Outsourcing
Sustainability
Cost Savings
Productivity
Security
Innovation
Insight
Mobility
Managed Print Services and
Technology
Secure and Integrate
Automate and Simplify
Assess and Optimize
SOLUTIONS: MANAGED PRINT
SERVICES AND CONNECTKEY™
Karl Dueland, Vice President, Solutions Delivery Unit, Xerox
STARTING POINT: SECURE TECHNOLOGY
• An ecosystem built into new Xerox MFPs
• Offering flexibility, coherency and commonality
• A complete refresh of key office products
• Integrated with Managed Print Services
8700,8900 7220,7225 7800 5800 9300+
ConnectKeyTM
LEADERSHIP SECURITY: MULTILAYERED APPROACH
Network Management Consoles • Simple email alerts • Xerox Device
Manager • McAfee ePolicy
Orchestrator
TrustSec Access Protection
Xerox MFP
User Endpoints
Watch this video here:
http://a400.g.akamai.net/7/400/14595/v0001/xeroxwebcast.download.akamai.com/14595/TEMP/201306/09-Security_low.mp4
PROTECTING YOUR NETWORK
John Hartman, CISCO
TOP OF MIND
SECURITY CONCERNS
• How do I classify so many devices coming onto my network?
• How do I allow suppliers and contractors to collaborate securely?
• Do we have control over devices connecting to our applications & data in the DC?
• Virtual Machine Sprawl! How should I manage security for all of those VMs we are being asked to provision everyday?
• My critical services are still running on physical servers. Do I maintain separate policies?
All-in-One Enterprise Policy Control
CISCO IDENTITY
SERVICES ENGINE (ISE)
Who What Where When How
Virtual machine client, IP device, guest, employee, and remote user
Cisco® ISE
WIRED WIRELESS VPN
Business-Relevant Policies
Security Policy Attributes
IDENTITY
CONTEXT
EMBEDDED SECURITY, SMARTER
SECURITY
Brian Kenyon, Chief Technology Officer, McAfee
BLACKLIST VS. WHITELIST
THE DYNAMICS
OF WHITELISTING
Black Grey White
DYNAMIC STATIC
MAC
NetBook
Consumer PC
VDI
Smartphone
Mobile Phone
REPUTATION-BASED
Medical Devices
SCADA Systems Servers
Point of Sale
ATMs
Kiosks
COE Desktop
Smart Meter
MFP
Watch this video here:
http://www.youtube.com/watch?v=XbQowo1ForM
Sustainability
Cost Savings
Productivity
Security
Innovation
Insight
Mobility
Xerox Managed Print Services
and Technology
Secure and Integrate
Automate and Simplify
Assess and Optimize
MANAGING PRINT SECURELY
Sustainability • Manage power consumption with Cisco
EnergyWise • Earth Smart Print Drivers
Employee Productivity & Mobility • Scan to Cloud / SharePoint • Print from / to anywhere • Open API for custom workflow integration
Security • McAfee embedded security & whitelisting • Cisco TrustSec – secure print
image overwrite & encryption
Cost Savings • Reduce wasteful printing with
default settings • Card access authentication
Watch this video here:
http://www.youtube.com/watch?v=_05x6fWtREQ
OPEN FOR QUESTIONS
• Please press *1 for the Operator to ask a questions
• Or use the Q&A feature in Live Meeting to submit a question
THANK YOU FOR JOINING US
• www.xerox.com/security
• Chief Optimist Magazine
– More insights and innovative ideas from the newest issue focused on security.
• iPad edition: “Chief Optimist” on App Store
• PC edition: Xerox.com/optimist
• Focus Forward Events
– Explore expert commentary
• XeroxFocusForward.com