beyond the pc: combating unmanaged threats security
Post on 20-Oct-2014
555 views
DESCRIPTION
Beyond the PC: Combating Unmanaged Threats Security Gain insights about how to protect your vital information against security threats by viewing this presentation from the Optimist TV webinar.TRANSCRIPT
![Page 1: Beyond the PC: Combating Unmanaged Threats Security](https://reader034.vdocuments.mx/reader034/viewer/2022051816/544509eaafaf9fe72b8b4653/html5/thumbnails/1.jpg)
BEYOND THE PC – COMBATING UNMANAGED THREATS June 12th, 2013
![Page 2: Beyond the PC: Combating Unmanaged Threats Security](https://reader034.vdocuments.mx/reader034/viewer/2022051816/544509eaafaf9fe72b8b4653/html5/thumbnails/2.jpg)
View the webinar replay here: https://www.brainshark.com/xerox/vu?pi=zIDz6kmucz62tqz0
![Page 3: Beyond the PC: Combating Unmanaged Threats Security](https://reader034.vdocuments.mx/reader034/viewer/2022051816/544509eaafaf9fe72b8b4653/html5/thumbnails/3.jpg)
Watch this video here:
http://a400.g.akamai.net/7/400/14595/v0001/xeroxwebcast.download.akamai.com/14595/TEMP/201306/Computer_Hacking-Cracking_down_on_cyber_crime-clip1.mp4
![Page 4: Beyond the PC: Combating Unmanaged Threats Security](https://reader034.vdocuments.mx/reader034/viewer/2022051816/544509eaafaf9fe72b8b4653/html5/thumbnails/4.jpg)
TODAY’S PROGRAM
• CISO Insights – Mark Leary, Chief Information Security Officer, Xerox
• Solutions: Managed Print Services and ConnectKey™ – Karl Dueland, VP Solutions Delivery Unit, Xerox
• Protecting Your Network – John Hartman, Client Executive, Cisco
• Embedded Security, Smarter Security – Brian Kenyon, Chief Technology Officer, McAfee
![Page 5: Beyond the PC: Combating Unmanaged Threats Security](https://reader034.vdocuments.mx/reader034/viewer/2022051816/544509eaafaf9fe72b8b4653/html5/thumbnails/5.jpg)
INSIGHTS Mark Leary
Chief Information Security Officer
Xerox
![Page 6: Beyond the PC: Combating Unmanaged Threats Security](https://reader034.vdocuments.mx/reader034/viewer/2022051816/544509eaafaf9fe72b8b4653/html5/thumbnails/6.jpg)
THE “INTERNET OF THINGS”
It has arrived….and so have huge security issues….
– Network and protocol security
– Data privacy and security
– Identity
– Trust
population with Internet access in 2015
75%
devices connected to the Internet in 2015
6B
devices connected to the Internet in 2020
30B
![Page 7: Beyond the PC: Combating Unmanaged Threats Security](https://reader034.vdocuments.mx/reader034/viewer/2022051816/544509eaafaf9fe72b8b4653/html5/thumbnails/7.jpg)
A “THING” CALLED A MFP…
3.4
MILLION
businesses that experienced a printer-related data breach
companies without a secure print strategy
65%
companies have a secure print initiative
22%
63%
![Page 8: Beyond the PC: Combating Unmanaged Threats Security](https://reader034.vdocuments.mx/reader034/viewer/2022051816/544509eaafaf9fe72b8b4653/html5/thumbnails/8.jpg)
COMMON MFP SECURITY THREATS
• Poor mobile device management • Weak MFP wireless access control
• Poor VPN remote access controls • Poor Web-based remote access controls • Weak identity and access management
• MFP hardware component weaknesses • MFP embedded software weaknesses • Poor partner/contractor/consultant access
• Poor physical access to MFPs • Poor MFP system and application access • Poor MFP software management controls
REMOTE ACCESS
PROXIMITY
INSIDER THREAT
SUPPLY CHAIN
![Page 9: Beyond the PC: Combating Unmanaged Threats Security](https://reader034.vdocuments.mx/reader034/viewer/2022051816/544509eaafaf9fe72b8b4653/html5/thumbnails/9.jpg)
QUESTIONS TO ASK
1) Do we have an understanding of our business processes that involve document management and printing?
2) What threats are targeting our IT environment and particularly MFPs?
3) Are our policies addressing MFP information security still relevant to protect the business?
4) Are our MFPs correctly configured to prevent cyber attacks?
5) Do we have visibility into our IT environment to identify devices and determine normal behavior from abnormal?
6) Are we incorporating our customers, partners, and vendors into our IT security operating model?
![Page 10: Beyond the PC: Combating Unmanaged Threats Security](https://reader034.vdocuments.mx/reader034/viewer/2022051816/544509eaafaf9fe72b8b4653/html5/thumbnails/10.jpg)
A CYCLE OF CONTINUOUS VALUE
Document Outsourcing
IT Outsourcing
Business Process Outsourcing
Sustainability
Cost Savings
Productivity
Security
Innovation
Insight
Mobility
Managed Print Services and
Technology
Secure and Integrate
Automate and Simplify
Assess and Optimize
![Page 11: Beyond the PC: Combating Unmanaged Threats Security](https://reader034.vdocuments.mx/reader034/viewer/2022051816/544509eaafaf9fe72b8b4653/html5/thumbnails/11.jpg)
SOLUTIONS: MANAGED PRINT
SERVICES AND CONNECTKEY™
Karl Dueland, Vice President, Solutions Delivery Unit, Xerox
![Page 12: Beyond the PC: Combating Unmanaged Threats Security](https://reader034.vdocuments.mx/reader034/viewer/2022051816/544509eaafaf9fe72b8b4653/html5/thumbnails/12.jpg)
STARTING POINT: SECURE TECHNOLOGY
• An ecosystem built into new Xerox MFPs
• Offering flexibility, coherency and commonality
• A complete refresh of key office products
• Integrated with Managed Print Services
8700,8900 7220,7225 7800 5800 9300+
ConnectKeyTM
![Page 13: Beyond the PC: Combating Unmanaged Threats Security](https://reader034.vdocuments.mx/reader034/viewer/2022051816/544509eaafaf9fe72b8b4653/html5/thumbnails/13.jpg)
LEADERSHIP SECURITY: MULTILAYERED APPROACH
Network Management Consoles • Simple email alerts • Xerox Device
Manager • McAfee ePolicy
Orchestrator
TrustSec Access Protection
Xerox MFP
User Endpoints
![Page 14: Beyond the PC: Combating Unmanaged Threats Security](https://reader034.vdocuments.mx/reader034/viewer/2022051816/544509eaafaf9fe72b8b4653/html5/thumbnails/14.jpg)
Watch this video here:
http://a400.g.akamai.net/7/400/14595/v0001/xeroxwebcast.download.akamai.com/14595/TEMP/201306/09-Security_low.mp4
![Page 15: Beyond the PC: Combating Unmanaged Threats Security](https://reader034.vdocuments.mx/reader034/viewer/2022051816/544509eaafaf9fe72b8b4653/html5/thumbnails/15.jpg)
PROTECTING YOUR NETWORK
John Hartman, CISCO
![Page 16: Beyond the PC: Combating Unmanaged Threats Security](https://reader034.vdocuments.mx/reader034/viewer/2022051816/544509eaafaf9fe72b8b4653/html5/thumbnails/16.jpg)
TOP OF MIND
SECURITY CONCERNS
• How do I classify so many devices coming onto my network?
• How do I allow suppliers and contractors to collaborate securely?
• Do we have control over devices connecting to our applications & data in the DC?
• Virtual Machine Sprawl! How should I manage security for all of those VMs we are being asked to provision everyday?
• My critical services are still running on physical servers. Do I maintain separate policies?
![Page 17: Beyond the PC: Combating Unmanaged Threats Security](https://reader034.vdocuments.mx/reader034/viewer/2022051816/544509eaafaf9fe72b8b4653/html5/thumbnails/17.jpg)
All-in-One Enterprise Policy Control
CISCO IDENTITY
SERVICES ENGINE (ISE)
Who What Where When How
Virtual machine client, IP device, guest, employee, and remote user
Cisco® ISE
WIRED WIRELESS VPN
Business-Relevant Policies
Security Policy Attributes
IDENTITY
CONTEXT
![Page 18: Beyond the PC: Combating Unmanaged Threats Security](https://reader034.vdocuments.mx/reader034/viewer/2022051816/544509eaafaf9fe72b8b4653/html5/thumbnails/18.jpg)
EMBEDDED SECURITY, SMARTER
SECURITY
Brian Kenyon, Chief Technology Officer, McAfee
![Page 19: Beyond the PC: Combating Unmanaged Threats Security](https://reader034.vdocuments.mx/reader034/viewer/2022051816/544509eaafaf9fe72b8b4653/html5/thumbnails/19.jpg)
BLACKLIST VS. WHITELIST
![Page 20: Beyond the PC: Combating Unmanaged Threats Security](https://reader034.vdocuments.mx/reader034/viewer/2022051816/544509eaafaf9fe72b8b4653/html5/thumbnails/20.jpg)
THE DYNAMICS
OF WHITELISTING
Black Grey White
DYNAMIC STATIC
MAC
NetBook
Consumer PC
VDI
Smartphone
Mobile Phone
REPUTATION-BASED
Medical Devices
SCADA Systems Servers
Point of Sale
ATMs
Kiosks
COE Desktop
Smart Meter
MFP
![Page 21: Beyond the PC: Combating Unmanaged Threats Security](https://reader034.vdocuments.mx/reader034/viewer/2022051816/544509eaafaf9fe72b8b4653/html5/thumbnails/21.jpg)
Watch this video here:
http://www.youtube.com/watch?v=XbQowo1ForM
![Page 22: Beyond the PC: Combating Unmanaged Threats Security](https://reader034.vdocuments.mx/reader034/viewer/2022051816/544509eaafaf9fe72b8b4653/html5/thumbnails/22.jpg)
Sustainability
Cost Savings
Productivity
Security
Innovation
Insight
Mobility
Xerox Managed Print Services
and Technology
Secure and Integrate
Automate and Simplify
Assess and Optimize
MANAGING PRINT SECURELY
Sustainability • Manage power consumption with Cisco
EnergyWise • Earth Smart Print Drivers
Employee Productivity & Mobility • Scan to Cloud / SharePoint • Print from / to anywhere • Open API for custom workflow integration
Security • McAfee embedded security & whitelisting • Cisco TrustSec – secure print
image overwrite & encryption
Cost Savings • Reduce wasteful printing with
default settings • Card access authentication
![Page 23: Beyond the PC: Combating Unmanaged Threats Security](https://reader034.vdocuments.mx/reader034/viewer/2022051816/544509eaafaf9fe72b8b4653/html5/thumbnails/23.jpg)
Watch this video here:
http://www.youtube.com/watch?v=_05x6fWtREQ
![Page 24: Beyond the PC: Combating Unmanaged Threats Security](https://reader034.vdocuments.mx/reader034/viewer/2022051816/544509eaafaf9fe72b8b4653/html5/thumbnails/24.jpg)
OPEN FOR QUESTIONS
• Please press *1 for the Operator to ask a questions
• Or use the Q&A feature in Live Meeting to submit a question
![Page 25: Beyond the PC: Combating Unmanaged Threats Security](https://reader034.vdocuments.mx/reader034/viewer/2022051816/544509eaafaf9fe72b8b4653/html5/thumbnails/25.jpg)
THANK YOU FOR JOINING US
• www.xerox.com/security
• Chief Optimist Magazine
– More insights and innovative ideas from the newest issue focused on security.
• iPad edition: “Chief Optimist” on App Store
• PC edition: Xerox.com/optimist
• Focus Forward Events
– Explore expert commentary
• XeroxFocusForward.com