infinit shield
play

INFINIT SHIELD Transparent, Optimized, Integrated, Intelligent The - PowerPoint PPT Presentation

INFINIT SHIELD Transparent, Optimized, Integrated, Intelligent The Future Of Security The changing landscape of enterprise security 72% 81% 1/3 Mobile workforce Compromised Shadow IT passwords 72% of the U.S. workforce will By 2022, a


  1. INFINIT SHIELD Transparent, Optimized, Integrated, Intelligent — The Future Of Security

  2. The changing landscape of enterprise security 72% 81% 1/3 Mobile workforce Compromised Shadow IT passwords 72% of the U.S. workforce will By 2022, a third of successful be mobile by 2020, relying on attacks experienced by 81% of confirmed data devices other than their enterprises will be on their breaches involved weak, laptops to be productive. shadow IT resources. default, or stolen passwords.

  3. Everyone agrees that security is important… 77% of global organizations indicate that security …but most don’t prioritize it. is a top challenge. 2% of customers have turned on multi-factor authentication.

  4. Meet INFINIT SHIELD A complete intelligent security solution — leveraging best-of-breed security products and solutions, INFINIT intellectual property, decades of security and compliance expertise, and a reinvented enterprise security framework — that empowers businesses to be secure and be productive. Four Core Principles of INFINIT SHIELD Transparency Optimized for Integrated Intelligent security by design productivity for simplicity

  5. INFINIT SHIELD Based on industry-standard security framework IDENTIFY PROTECT DETECT RESPOND RECOVER 5

  6. INFINIT SHIELD — Key Initiatives ▪ Migrate to Office 365 ▪ Enable Enterprise Mobility Suite + Security E5 ▪ Standardize wi-fi and firewalls ▪ Implement Cisco Umbrella • Low user impact ▪ Enable MFA for admin and privileged accounts • Low implementation cost ▪ Enable SSO for apps and wi-fi and establish guest network Quick Wins ▪ Restrict internet usage to approved content 0 – 3 months ▪ Disable forwarding and configure advanced threat protection for email ▪ Self-service password reset and sign-in risk and user risk policy ▪ Enable BitLocker on all capable Windows 10 machines ▪ Policy and enforce MDM for all devices accessing corporate data • Low and moderate user impact ▪ Enable MFA for all users ▪ Enable email encryption and automatic DLP and labeling • Moderate implementation cost ▪ Enabling document labeling and DLP for all documents 3 – 6 months ▪ Set advanced policies for devices and configure conditional access ▪ Start automated phish testing and implement more advanced training ▪ Ongoing training and phish training ▪ Deploy Azure ATP sensors to internal network ▪ Enable encryption at rest where possible • Moderate user impact ▪ Enable automatic tagging of CCPA and GDPR documents • Low and moderate implementation cost ▪ Establish corporate security standards and policies and test 6 months and ▪ Establish formal review of Shield Score and maintain score level beyond ▪ Implement Privileged Access Management and Zero Trust for admins ▪ Implement Privileged Workstation Access to perform admin functions ▪ Assess and renew security roadmap, and maintain baseline

  7. INFINIT SHIELD — Proposed Implementation Timeline 0 – 3 months 3 – 6 months 6 months and beyond Protect Enable ATP safe Enable data loss prevention Implement secure Apply IRM protections to Deploy Cisco Umbrella Enable MFA for all users device and app attachments policy policies email Enable MFA for all management global admins Enable ATP anti-spear Apply IRM protections Enable SSO for all Enable guest wi-fi and phishing and safe links Enable Defender company apps documents configure wi-fi SSO Enable BitLocker on all Enable privileged identity policies Application Guard on Windows machines access Win 10 machines Perform security Implement Cloud App Enforce MDM managed Deploy Azure ATP sensors Security Cloud awareness training and device for corporate data Deploy sign-in risk and to internal network phish testing Discovery user risk policy Conduct monthly Enable compliance features security and Shield Score for CCPA/GDPR Refine Security Enable conditional access review Standardize wi-fi and Restrict internet access policies to approved content Awareness Program firewalls Deploy EMS for MDM test phishing INFINIT SHIELD Managed Security Service: Monitoring, Account and Credential Abuse INFINIT SHIELD Ongoing Security Assessment Establish security education program for IT staff and end users Detect Managed Security Service : Threat Detection Implement and operate Implement and operate Implement and operate Implement and operate cloud app security and endpoint ATP solution endpoint ATP solution Azure ATP threat protection policies Respond Managed Security Service : Incident Response User impact: Low Moderate Implementation cost:

  8. INFINIT SHIELD Score Security Lifecycle • Use INFINIT SHIELD Score to understand your current security baseline and ranking among similar businesses • Track SHIELD Score improvements over time • Track desired state configuration and drift, using scheduled monthly or quarterly reviews Prioritize Design/Deploy INFINIT SHIELD Score Prioritize the security actions from Shield Score based • on user impact and implementation cost Prioritize Build Roadmap Build Roadmap User Impact & Cost Build a roadmap for the implementation of the • prioritized security actions Design/Deploy • Design and deploy the recommended security actions in the roadmap

  9. We are here to help Reduce security Expert guidance Cost-effective protection vulnerabilities INFINIT SHIELD: Accelerate deployment, gain end-user adoption, receive expert guidance, and protect your organization. Your Security | Our Passion

  10. Takeaways Next Steps The new enterprise landscape requires security deployment up front. Start your journey with confidence. INFINIT SHIELD gives you a clear place to begin, and a Reach out today to get expert guidance, accelerate continued path to advanced security. deployment, and discuss how to protect your organization from today’s security threats. SHIELD helps you to overcome the obstacles of security implementation.

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend