network infrastructure security management solution - a holistic approach in network security
DESCRIPTION
Network Infrastructure Security Management Solution can continuously provide network visualisation and identify critical attack risk. It provide security network and risk team with a firm understanding of Where the investment is needed, and Where greatest cyber attack risks lie. This understanding enable organizations to allocate resouces and take prioritized actions.TRANSCRIPT
![Page 1: Network infrastructure security management solution - A holistic approach in Network Security](https://reader038.vdocuments.mx/reader038/viewer/2022102605/540cd7677bef0a84278b6ed4/html5/thumbnails/1.jpg)
A Holistic approach in network security
Network Infrastructure
Security Management (NISM)
Solution
![Page 2: Network infrastructure security management solution - A holistic approach in Network Security](https://reader038.vdocuments.mx/reader038/viewer/2022102605/540cd7677bef0a84278b6ed4/html5/thumbnails/2.jpg)
Thoughts on Network Infrastructure Security
![Page 3: Network infrastructure security management solution - A holistic approach in Network Security](https://reader038.vdocuments.mx/reader038/viewer/2022102605/540cd7677bef0a84278b6ed4/html5/thumbnails/3.jpg)
One small hole could lead to a significant data breach
![Page 4: Network infrastructure security management solution - A holistic approach in Network Security](https://reader038.vdocuments.mx/reader038/viewer/2022102605/540cd7677bef0a84278b6ed4/html5/thumbnails/4.jpg)
Threat agents use automated tools to find and exploit weak
points
![Page 5: Network infrastructure security management solution - A holistic approach in Network Security](https://reader038.vdocuments.mx/reader038/viewer/2022102605/540cd7677bef0a84278b6ed4/html5/thumbnails/5.jpg)
Addressing the millions of vulnerabilities in the system
![Page 6: Network infrastructure security management solution - A holistic approach in Network Security](https://reader038.vdocuments.mx/reader038/viewer/2022102605/540cd7677bef0a84278b6ed4/html5/thumbnails/6.jpg)
Situational awareness in the turbulent times
![Page 7: Network infrastructure security management solution - A holistic approach in Network Security](https://reader038.vdocuments.mx/reader038/viewer/2022102605/540cd7677bef0a84278b6ed4/html5/thumbnails/7.jpg)
Is the threat against your network
is increasing or decreasing?
![Page 8: Network infrastructure security management solution - A holistic approach in Network Security](https://reader038.vdocuments.mx/reader038/viewer/2022102605/540cd7677bef0a84278b6ed4/html5/thumbnails/8.jpg)
Where to spend the time and money
in your network
![Page 9: Network infrastructure security management solution - A holistic approach in Network Security](https://reader038.vdocuments.mx/reader038/viewer/2022102605/540cd7677bef0a84278b6ed4/html5/thumbnails/9.jpg)
Understand all the possible attack path
![Page 10: Network infrastructure security management solution - A holistic approach in Network Security](https://reader038.vdocuments.mx/reader038/viewer/2022102605/540cd7677bef0a84278b6ed4/html5/thumbnails/10.jpg)
Prioritizing the incidence response action, once
attacked.
![Page 11: Network infrastructure security management solution - A holistic approach in Network Security](https://reader038.vdocuments.mx/reader038/viewer/2022102605/540cd7677bef0a84278b6ed4/html5/thumbnails/11.jpg)
After attack, understand,
How it happened & prevention
![Page 12: Network infrastructure security management solution - A holistic approach in Network Security](https://reader038.vdocuments.mx/reader038/viewer/2022102605/540cd7677bef0a84278b6ed4/html5/thumbnails/12.jpg)
Understanding on the interaction
between the devices in the network
![Page 13: Network infrastructure security management solution - A holistic approach in Network Security](https://reader038.vdocuments.mx/reader038/viewer/2022102605/540cd7677bef0a84278b6ed4/html5/thumbnails/13.jpg)
Understanding on the interaction
between the devices in the network
![Page 14: Network infrastructure security management solution - A holistic approach in Network Security](https://reader038.vdocuments.mx/reader038/viewer/2022102605/540cd7677bef0a84278b6ed4/html5/thumbnails/14.jpg)
Some Facts
![Page 15: Network infrastructure security management solution - A holistic approach in Network Security](https://reader038.vdocuments.mx/reader038/viewer/2022102605/540cd7677bef0a84278b6ed4/html5/thumbnails/15.jpg)
A recent Ponemon Institute report on perceptions about network security found
that 90 percent of responding organizations had suffered a security breach within the
previous 12 months
![Page 16: Network infrastructure security management solution - A holistic approach in Network Security](https://reader038.vdocuments.mx/reader038/viewer/2022102605/540cd7677bef0a84278b6ed4/html5/thumbnails/16.jpg)
2012 Verizon data breach investigations report found that 97
percent of security breaches could have been prevented through a consistent, system-wide application of “simple or
intermediate controls.”
![Page 17: Network infrastructure security management solution - A holistic approach in Network Security](https://reader038.vdocuments.mx/reader038/viewer/2022102605/540cd7677bef0a84278b6ed4/html5/thumbnails/17.jpg)
Common Challenges in NISM
![Page 18: Network infrastructure security management solution - A holistic approach in Network Security](https://reader038.vdocuments.mx/reader038/viewer/2022102605/540cd7677bef0a84278b6ed4/html5/thumbnails/18.jpg)
Constantly changing Network complexity
exceeding human ability to analyze
![Page 19: Network infrastructure security management solution - A holistic approach in Network Security](https://reader038.vdocuments.mx/reader038/viewer/2022102605/540cd7677bef0a84278b6ed4/html5/thumbnails/19.jpg)
Multiple point of access
![Page 20: Network infrastructure security management solution - A holistic approach in Network Security](https://reader038.vdocuments.mx/reader038/viewer/2022102605/540cd7677bef0a84278b6ed4/html5/thumbnails/20.jpg)
Inconsistent IT implementation
![Page 21: Network infrastructure security management solution - A holistic approach in Network Security](https://reader038.vdocuments.mx/reader038/viewer/2022102605/540cd7677bef0a84278b6ed4/html5/thumbnails/21.jpg)
Typical Network Infrastructure comprises:
Networking Hardware ( Routers, Switches, LAN Cards, Wireless Routers, Cables)
Networking Software (Network Operations and Management, Operating systems, Firewall, Network Security Applications)
Network Service (T-1 Line, DSL, Satellite, Wireless Protocols, IP Addressing)
FYI
![Page 22: Network infrastructure security management solution - A holistic approach in Network Security](https://reader038.vdocuments.mx/reader038/viewer/2022102605/540cd7677bef0a84278b6ed4/html5/thumbnails/22.jpg)
Typical Network Infrastructure comprises: Networking Hardware ( Routers, Switches,
LAN Cards, Wireless Routers, Cables)
Networking Software (Network Operations and Management, Operating systems, Firewall,
Network Security Applications)
Network Service (T-1 Line, DSL, Satellite, Wireless Protocols, IP Addressing)
FYI
![Page 23: Network infrastructure security management solution - A holistic approach in Network Security](https://reader038.vdocuments.mx/reader038/viewer/2022102605/540cd7677bef0a84278b6ed4/html5/thumbnails/23.jpg)
Typical Network Infrastructure comprises:
Networking Hardware ( Routers, Switches, LAN Cards, Wireless Routers, Cables)
Networking Software (Network Operations and
Management, Operating systems, Firewall, Network Security Applications)
Network Service (T-1 Line, DSL, Satellite,
Wireless Protocols, IP Addressing)
FYI
![Page 24: Network infrastructure security management solution - A holistic approach in Network Security](https://reader038.vdocuments.mx/reader038/viewer/2022102605/540cd7677bef0a84278b6ed4/html5/thumbnails/24.jpg)
Typical Network Infrastructure comprises:
Networking Hardware ( Routers, Switches, LAN Cards, Wireless Routers, Cables)
Networking Software (Network Operations and
Management, Operating systems, Firewall, Network Security Applications)
Network Service (T-1 Line, DSL, Satellite,
Wireless Protocols, IP Addressing)
FYI
![Page 25: Network infrastructure security management solution - A holistic approach in Network Security](https://reader038.vdocuments.mx/reader038/viewer/2022102605/540cd7677bef0a84278b6ed4/html5/thumbnails/25.jpg)
Typical Network Infrastructure comprises:
Networking Hardware ( Routers, Switches, LAN Cards, Wireless Routers, Cables)
Networking Software (Network Operations and
Management, Operating systems, Firewall, Network Security Applications)
Network Service (T-1 Line, DSL, Satellite,
Wireless Protocols, IP Addressing)
FYI
![Page 26: Network infrastructure security management solution - A holistic approach in Network Security](https://reader038.vdocuments.mx/reader038/viewer/2022102605/540cd7677bef0a84278b6ed4/html5/thumbnails/26.jpg)
Health check on NISM
![Page 27: Network infrastructure security management solution - A holistic approach in Network Security](https://reader038.vdocuments.mx/reader038/viewer/2022102605/540cd7677bef0a84278b6ed4/html5/thumbnails/27.jpg)
Health check on NISM
Know your Network
![Page 28: Network infrastructure security management solution - A holistic approach in Network Security](https://reader038.vdocuments.mx/reader038/viewer/2022102605/540cd7677bef0a84278b6ed4/html5/thumbnails/28.jpg)
Health check on NISM
Know your Network Know your Assets
![Page 29: Network infrastructure security management solution - A holistic approach in Network Security](https://reader038.vdocuments.mx/reader038/viewer/2022102605/540cd7677bef0a84278b6ed4/html5/thumbnails/29.jpg)
Health check on NISM
Know your Network Know your Assets
Know your Security
![Page 30: Network infrastructure security management solution - A holistic approach in Network Security](https://reader038.vdocuments.mx/reader038/viewer/2022102605/540cd7677bef0a84278b6ed4/html5/thumbnails/30.jpg)
Health check on NISM
Know your Network Know your Assets
Know your Security Map the Topology
![Page 31: Network infrastructure security management solution - A holistic approach in Network Security](https://reader038.vdocuments.mx/reader038/viewer/2022102605/540cd7677bef0a84278b6ed4/html5/thumbnails/31.jpg)
Health check on NISM
Know your Network Know your Assets
Know your Security Map the Topology Prioritize & Fix
![Page 32: Network infrastructure security management solution - A holistic approach in Network Security](https://reader038.vdocuments.mx/reader038/viewer/2022102605/540cd7677bef0a84278b6ed4/html5/thumbnails/32.jpg)
Health check on NISM
Know your Network Know your Assets
Know your Security Map the Topology Prioritize & Fix
Monitor Continuously
![Page 33: Network infrastructure security management solution - A holistic approach in Network Security](https://reader038.vdocuments.mx/reader038/viewer/2022102605/540cd7677bef0a84278b6ed4/html5/thumbnails/33.jpg)
Health check on NISM
Know your Network Know your Assets
Know your Security Map the Topology Prioritize & Fix
Monitor Continuously Manage Change & Build Workflows
![Page 34: Network infrastructure security management solution - A holistic approach in Network Security](https://reader038.vdocuments.mx/reader038/viewer/2022102605/540cd7677bef0a84278b6ed4/html5/thumbnails/34.jpg)
How NISM solution prevent Cyber attacks
![Page 35: Network infrastructure security management solution - A holistic approach in Network Security](https://reader038.vdocuments.mx/reader038/viewer/2022102605/540cd7677bef0a84278b6ed4/html5/thumbnails/35.jpg)
How NISM prevent Cyber attacks Ensure all the access controls are configured correctly
![Page 36: Network infrastructure security management solution - A holistic approach in Network Security](https://reader038.vdocuments.mx/reader038/viewer/2022102605/540cd7677bef0a84278b6ed4/html5/thumbnails/36.jpg)
How NISM prevent Cyber attacks Ensure all the access controls are configured correctly
Maintaining situational analysis
![Page 37: Network infrastructure security management solution - A holistic approach in Network Security](https://reader038.vdocuments.mx/reader038/viewer/2022102605/540cd7677bef0a84278b6ed4/html5/thumbnails/37.jpg)
How NISM prevent Cyber attacks Ensure all the access controls are configured correctly
Expand the new network
Maintaining situational analysis
![Page 38: Network infrastructure security management solution - A holistic approach in Network Security](https://reader038.vdocuments.mx/reader038/viewer/2022102605/540cd7677bef0a84278b6ed4/html5/thumbnails/38.jpg)
How NISM prevent Cyber attacks Ensure all the access controls are configured correctly
Identify the greatest risk in the network
Expand the new network
Maintaining situational analysis
![Page 39: Network infrastructure security management solution - A holistic approach in Network Security](https://reader038.vdocuments.mx/reader038/viewer/2022102605/540cd7677bef0a84278b6ed4/html5/thumbnails/39.jpg)
How NISM prevent Cyber attacks Ensure all the access controls are configured correctly
Identify the greatest risk in the network
Identifying risk
levels
Expand the new network
Maintaining situational analysis
![Page 40: Network infrastructure security management solution - A holistic approach in Network Security](https://reader038.vdocuments.mx/reader038/viewer/2022102605/540cd7677bef0a84278b6ed4/html5/thumbnails/40.jpg)
How NISM prevent Cyber attacks Ensure all the access controls are configured correctly
Identify the greatest risk in the network
Maintain and proving with all applicable regulations
Identifying risk
levels
Expand the new network
Maintaining situational analysis
![Page 41: Network infrastructure security management solution - A holistic approach in Network Security](https://reader038.vdocuments.mx/reader038/viewer/2022102605/540cd7677bef0a84278b6ed4/html5/thumbnails/41.jpg)
How NISM prevent Cyber attacks Ensure all the access controls are configured correctly
Identify the greatest risk in the network
Maintain and proving with all applicable regulations
Identifying risk
levels
Manage and mitigate
risk from untrusted
network / partner or
network
Expand the new network
Maintaining situational analysis
![Page 42: Network infrastructure security management solution - A holistic approach in Network Security](https://reader038.vdocuments.mx/reader038/viewer/2022102605/540cd7677bef0a84278b6ed4/html5/thumbnails/42.jpg)
How NISM prevent Cyber attacks Ensure all the access controls are configured correctly
Identify the greatest risk in the network
Maintain and proving with all applicable regulations
Identifying risk
levels
Manage and mitigate
risk from untrusted
network / partner or
network
Expand the new network
Maintaining situational analysis
![Page 43: Network infrastructure security management solution - A holistic approach in Network Security](https://reader038.vdocuments.mx/reader038/viewer/2022102605/540cd7677bef0a84278b6ed4/html5/thumbnails/43.jpg)
How NISM prevent Cyber attacks Ensure all the access controls are configured correctly
Identify the greatest risk in the network
Maintain and proving with all applicable regulations
Identifying risk
levels
Integrating the wireless device
Manage and mitigate
risk from untrusted
network / partner or
network
Expand the new network
Maintaining situational analysis
![Page 44: Network infrastructure security management solution - A holistic approach in Network Security](https://reader038.vdocuments.mx/reader038/viewer/2022102605/540cd7677bef0a84278b6ed4/html5/thumbnails/44.jpg)
How NISM prevent Cyber attacks Ensure all the access controls are configured correctly
Identify the greatest risk in the network
Maintain and proving with all applicable regulations
Identifying risk
levels
Integrating the wireless device
Manage and mitigate
risk from untrusted
network / partner or
network
Expand the new network
Maintaining situational analysis
![Page 45: Network infrastructure security management solution - A holistic approach in Network Security](https://reader038.vdocuments.mx/reader038/viewer/2022102605/540cd7677bef0a84278b6ed4/html5/thumbnails/45.jpg)
To summarize:
![Page 46: Network infrastructure security management solution - A holistic approach in Network Security](https://reader038.vdocuments.mx/reader038/viewer/2022102605/540cd7677bef0a84278b6ed4/html5/thumbnails/46.jpg)
To summarize:
NISM solution models your security control
infrastructure to identify key points of attack
![Page 47: Network infrastructure security management solution - A holistic approach in Network Security](https://reader038.vdocuments.mx/reader038/viewer/2022102605/540cd7677bef0a84278b6ed4/html5/thumbnails/47.jpg)
To summarize:
NISM solution models your security control
infrastructure to identify key points of attack
NISMS Identifies the holes in your security controls
![Page 48: Network infrastructure security management solution - A holistic approach in Network Security](https://reader038.vdocuments.mx/reader038/viewer/2022102605/540cd7677bef0a84278b6ed4/html5/thumbnails/48.jpg)
To summarize:
NISM solution models your security control
infrastructure to identify key points of attack
NISMS Identifies the holes in your security controls
NISMS Identifies the holes in your security controls