23. March 2013 · Comments Off on Practical Zero Trust Recommendations · Categories: Slides

Cymbel Zero Trust Recommendations with gray bottom1

Cymbel has adopted Forrester’s Zero Trust Model for Information Security. Zero Trust means there are no longer “trusted” networks, devices, or users. There is no such thing as 100% Prevention, if there ever was. In light of the changes we’ve seen during the last several years, this is the only approach that makes sense. There is simply no way to prevent end points and servers from becoming compromised 100% of the time. For more details see Cymbel’s Zero Trust Recommendations.

Links to Explore

25. February 2013 · Comments Off on Application Usage and Threat Report · Categories: Slides

Palo Alto Networks Real Data Real Threats for slider

The latest Application Usage and Threat Report from Palo Alto Networks provides a global view into enterprise application usage and the associated threats by summarizing network traffic assessments conducted in 3,056 organizations worldwide between May 2012 and December 2012.

This report discusses application usage patterns and the specific types of threats they may or may not introduce. The application and threat patterns discussed within this report dispel the position that social networking, filesharing and video applications are the most common threat vectors, while reaffirming that internal applications are highly prized targets. Rather than use more obvious, commercially available applications, attackers are masking their activities through custom or encrypted applications

If you would like a copy of this report, please fill out the form on the right side of this page.

Links to Explore

01. March 2012 · Comments Off on Modern Malware for Dummies · Categories: Slides

Modern malware has transformed into highly sophisticated network applications and has, in the process, changed the world of enterprise security and how networks are attacked.  These threats are experts at remaining hidden from traditional security while exhibiting an intelligence, resiliency, and scale that has never before been seen in malware.

“Modern Malware for Dummies,” by Lawrence C. Miller, provides an in-depth examination of real-world attacks and modern malware threats, the shortcomings of legacy security solutions, the capabilities of next-generation firewalls, and security best practices.

If you would like a copy of this book, please fill out the form on the right side of this page.

Links to Explore

01. March 2012 · Comments Off on NetFlow Security Monitoring for Dummmies · Categories: Slides

Network flow analysis is a critical Detection Control in a Zero Trust based Defense-in-Depth Architecture. This book takes you through the basics of NetFlow analysis for information security purposes — what NetFlow is, how it works, and how you can enable it to yield actionable security intelligence. It also provides some detail on the specific security risks addressed by NetFlow analysis and provides best practices for conducting NetFlow collection and analysis.

If you would like a copy of this book, please fill out the form on the right side of this page.

Links to Explore

18. January 2012 · Comments Off on CloudFlare vs Incapsula vs ModSecurity · Categories: Slides

Zero Science WAF Report v2

How much protection can a Web Application Firewall provide? Are all WAFs pretty much the same? Zero Science Lab performed a detailed comparative penetration testing analysis to answer these questions. They focused on the two leading cloud-based WAFs, CloudFlare and Incapsula, and ModSecurity, the open-source, software based WAF that is an Apache add-on. The results may surprise you because of the huge disparity in effectiveness between the two cloud-based services.

If you would like a copy of this white paper, please fill out the form on the right side of this page.

Links to Explore

21. April 2010 · Comments Off on Defense-in-Depth Architecture focused on Applications, Users & Data · Categories: Slides

In response to the five forces of change, our approach to defense-in-depth has changed. Our solutions are focused on applications, users, and data. In addition, many of our solutions have embraced function consolidation or unification. For example, in network security, firewall and IPS functionality are unified in next-generation firewalls. Overall, the benefits include:

  • Reduced IT Security risks
  • Reduced costs of meeting regulatory compliance requirements
  • Reduced IT Operations costs
  • Increased IT Service availability and performance
  • Improved IT alignment with business needs.

Links to Explore