SİBER GÜVENLİK EVRİMİNDE SONRAKİ ADIM · SİBER GÜVENLİK EVRİMİNDE SONRAKİ ADIM PROLİNK...
Transcript of SİBER GÜVENLİK EVRİMİNDE SONRAKİ ADIM · SİBER GÜVENLİK EVRİMİNDE SONRAKİ ADIM PROLİNK...
SİBER GÜVENLİK EVRİMİNDE SONRAKİ ADIM
PROLİNK
EMRAH EROĞLU
Kıdemli Ağ ve Güvenlik Uzmanı
TRADITIONAL PERIMETER
TRADITIONAL PERIMETER
URL/IP
Sandbox
AV
IPS
Orchestration
MFA
Anti-Phishing
Forensics
UBA
Threat Intel
Endpoint AV
EDR
HIPS
USERS, DATA, AND APPLICATIONS ARE EVERYWHERE
Branch Security
SaaS Security Cloud Security
Mobile Security
Proxy
URL/IP
Sandbox
AV
IPS
Anti-Phishing
Forensics
UBA
Threat Intel
Orchestration
MFA
Endpoint AV
EDR
HIPS
Volume of alerts and
logs is
overwhelming
Highly manual response
lacking coordination
SECURITY DOESN’T WORK TODAY
Legacy approach to
visibility and
prevention
ANALYTICS
PREVENTING SUCCESSFUL CYBERATTACKS
Visibility
Network Endpoint Cloud
PREVENTING SUCCESSFUL CYBERATTACKS
Visibility
Reduce attack
surface
AUTOMATION OF ENFORCEMENT
REDUCE MANUAL EFFORT WITH ANALYTICS
PREVENTING SUCCESSFUL CYBERATTACKS
Visibility
Prevent known
threats
Reduce attack
surface
AUTOMATION OF ENFORCEMENT
REDUCE MANUAL EFFORT WITH ANALYTICS
SECURITY OUTCOMES
Maximize preventionMinimize manual
response
1
Rapid response to threats software
cannot prevent
2 3
Consistent securityfor all users, data, and
applications
4
HOW?
PALO ALTO NETWORKS PLATFORM
NETWORK SECURITY ADVANCED ENDPOINT PROTECTION CLOUD SECURITY
WildFireThreat Prevention URL Filtering AutoFocus Logging Service LightCyber MineMeld
CLOUD-DELIVERED SECURITY SERVICES
PALO ALTO NETWORKS PLATFORM: OPEN & EXTENSIBLEPALO ALTO NETWORKS APPS 3RD PARTY PARTNER APPS CUSTOMER APPS
CLOUD-DELIVERED SECURITY SERVICES
APPLICATION FRAMEWORK & LOGGING SERVICE
NETWORK SECURITY ADVANCED ENDPOINT PROTECTION CLOUD SECURITY
Prevention & safe
enablement:
Remove noise
Automation &
coordinated protection:
Successfully prevent data
breaches
NEW REALITY: BETTER SECURITY OUTCOMES
Better leverage:
Existing staff and
technology
STRATEGIC PARTNERSHIPS
SERVICE PROVIDERS
PARTNER ECOSYSTEM
16 | © 2017, Palo Alto Networks. All
TECHNOLOGY PARTNER ECOSYSTEM
CLOUD
IDENTİTY MOBİLİTY
IOT
SECURİTY
ANALYTİCS
AUTOMATİON
GSI
SD-WAN
ENTERPRİSE
SECURİTY
THREAT
INTELLİGENCEVİRTUALİZATİON
NETWORKİNG
ORCHESTRATION & SECURITY
AUTOMATION
ENTERPRISE SECURITY IDENTITY& ACCESS MANAGEMENT
NETWORKING
SD-WANSECURITY ANALYTICS
MOBILITY
VIRTUALIZATION
CLOUD
THREAT INTELLIGENCE
IOT
PARTNER ECOSYSTEM