25
BEYOND THE PC COMBATING UNMANAGED THREATS June 12th, 2013

Beyond the PC: Combating Unmanaged Threats Security

  • View
    553

  • Download
    0

Embed Size (px)

DESCRIPTION

Beyond the PC: Combating Unmanaged Threats Security Gain insights about how to protect your vital information against security threats by viewing this presentation from the Optimist TV webinar.

Citation preview

Page 1: Beyond the PC: Combating Unmanaged Threats Security

BEYOND THE PC – COMBATING UNMANAGED THREATS June 12th, 2013

Page 2: Beyond the PC: Combating Unmanaged Threats Security

View the webinar replay here: https://www.brainshark.com/xerox/vu?pi=zIDz6kmucz62tqz0

Page 4: Beyond the PC: Combating Unmanaged Threats Security

TODAY’S PROGRAM

• CISO Insights – Mark Leary, Chief Information Security Officer, Xerox

• Solutions: Managed Print Services and ConnectKey™ – Karl Dueland, VP Solutions Delivery Unit, Xerox

• Protecting Your Network – John Hartman, Client Executive, Cisco

• Embedded Security, Smarter Security – Brian Kenyon, Chief Technology Officer, McAfee

Page 5: Beyond the PC: Combating Unmanaged Threats Security

INSIGHTS Mark Leary

Chief Information Security Officer

Xerox

Page 6: Beyond the PC: Combating Unmanaged Threats Security

THE “INTERNET OF THINGS”

It has arrived….and so have huge security issues….

– Network and protocol security

– Data privacy and security

– Identity

– Trust

population with Internet access in 2015

75%

devices connected to the Internet in 2015

6B

devices connected to the Internet in 2020

30B

Page 7: Beyond the PC: Combating Unmanaged Threats Security

A “THING” CALLED A MFP…

3.4

MILLION

businesses that experienced a printer-related data breach

companies without a secure print strategy

65%

companies have a secure print initiative

22%

63%

Page 8: Beyond the PC: Combating Unmanaged Threats Security

COMMON MFP SECURITY THREATS

• Poor mobile device management • Weak MFP wireless access control

• Poor VPN remote access controls • Poor Web-based remote access controls • Weak identity and access management

• MFP hardware component weaknesses • MFP embedded software weaknesses • Poor partner/contractor/consultant access

• Poor physical access to MFPs • Poor MFP system and application access • Poor MFP software management controls

REMOTE ACCESS

PROXIMITY

INSIDER THREAT

SUPPLY CHAIN

Page 9: Beyond the PC: Combating Unmanaged Threats Security

QUESTIONS TO ASK

1) Do we have an understanding of our business processes that involve document management and printing?

2) What threats are targeting our IT environment and particularly MFPs?

3) Are our policies addressing MFP information security still relevant to protect the business?

4) Are our MFPs correctly configured to prevent cyber attacks?

5) Do we have visibility into our IT environment to identify devices and determine normal behavior from abnormal?

6) Are we incorporating our customers, partners, and vendors into our IT security operating model?

Page 10: Beyond the PC: Combating Unmanaged Threats Security

A CYCLE OF CONTINUOUS VALUE

Document Outsourcing

IT Outsourcing

Business Process Outsourcing

Sustainability

Cost Savings

Productivity

Security

Innovation

Insight

Mobility

Managed Print Services and

Technology

Secure and Integrate

Automate and Simplify

Assess and Optimize

Page 11: Beyond the PC: Combating Unmanaged Threats Security

SOLUTIONS: MANAGED PRINT

SERVICES AND CONNECTKEY™

Karl Dueland, Vice President, Solutions Delivery Unit, Xerox

Page 12: Beyond the PC: Combating Unmanaged Threats Security

STARTING POINT: SECURE TECHNOLOGY

• An ecosystem built into new Xerox MFPs

• Offering flexibility, coherency and commonality

• A complete refresh of key office products

• Integrated with Managed Print Services

8700,8900 7220,7225 7800 5800 9300+

ConnectKeyTM

Page 15: Beyond the PC: Combating Unmanaged Threats Security

PROTECTING YOUR NETWORK

John Hartman, CISCO

Page 16: Beyond the PC: Combating Unmanaged Threats Security

TOP OF MIND

SECURITY CONCERNS

• How do I classify so many devices coming onto my network?

• How do I allow suppliers and contractors to collaborate securely?

• Do we have control over devices connecting to our applications & data in the DC?

• Virtual Machine Sprawl! How should I manage security for all of those VMs we are being asked to provision everyday?

• My critical services are still running on physical servers. Do I maintain separate policies?

Page 17: Beyond the PC: Combating Unmanaged Threats Security

All-in-One Enterprise Policy Control

CISCO IDENTITY

SERVICES ENGINE (ISE)

Who What Where When How

Virtual machine client, IP device, guest, employee, and remote user

Cisco® ISE

WIRED WIRELESS VPN

Business-Relevant Policies

Security Policy Attributes

IDENTITY

CONTEXT

Page 18: Beyond the PC: Combating Unmanaged Threats Security

EMBEDDED SECURITY, SMARTER

SECURITY

Brian Kenyon, Chief Technology Officer, McAfee

Page 19: Beyond the PC: Combating Unmanaged Threats Security

BLACKLIST VS. WHITELIST

Page 20: Beyond the PC: Combating Unmanaged Threats Security

THE DYNAMICS

OF WHITELISTING

Black Grey White

DYNAMIC STATIC

MAC

NetBook

Consumer PC

VDI

Smartphone

Mobile Phone

REPUTATION-BASED

Medical Devices

SCADA Systems Servers

Point of Sale

ATMs

Kiosks

COE Desktop

Smart Meter

MFP

Page 21: Beyond the PC: Combating Unmanaged Threats Security

Watch this video here:

http://www.youtube.com/watch?v=XbQowo1ForM

Page 22: Beyond the PC: Combating Unmanaged Threats Security

Sustainability

Cost Savings

Productivity

Security

Innovation

Insight

Mobility

Xerox Managed Print Services

and Technology

Secure and Integrate

Automate and Simplify

Assess and Optimize

MANAGING PRINT SECURELY

Sustainability • Manage power consumption with Cisco

EnergyWise • Earth Smart Print Drivers

Employee Productivity & Mobility • Scan to Cloud / SharePoint • Print from / to anywhere • Open API for custom workflow integration

Security • McAfee embedded security & whitelisting • Cisco TrustSec – secure print

image overwrite & encryption

Cost Savings • Reduce wasteful printing with

default settings • Card access authentication

Page 23: Beyond the PC: Combating Unmanaged Threats Security

Watch this video here:

http://www.youtube.com/watch?v=_05x6fWtREQ

Page 24: Beyond the PC: Combating Unmanaged Threats Security

OPEN FOR QUESTIONS

• Please press *1 for the Operator to ask a questions

• Or use the Q&A feature in Live Meeting to submit a question

Page 25: Beyond the PC: Combating Unmanaged Threats Security

THANK YOU FOR JOINING US

• www.xerox.com/security

• Chief Optimist Magazine

– More insights and innovative ideas from the newest issue focused on security.

• iPad edition: “Chief Optimist” on App Store

• PC edition: Xerox.com/optimist

• Focus Forward Events

– Explore expert commentary

• XeroxFocusForward.com