Digital Transformation: Cure-All, Placebo Or Poison Pill? Leonidas Tougiannidis Country Manager, Greece & Cyprus

Digital Transformation: Cure-All, Placebo Or Poison Pill? Leonidas Tougiannidis Country Manager, Greece & Cyprus

Digital Transformation: Cure-all, Placebo or Poison Pill? Leonidas Tougiannidis Country Manager, Greece & Cyprus © Copyright Fortinet Inc. All rights reserved. IT Trends increase the ATTACK SURFACE & LIABILITIES ▪ Digital Transformation entails sharing data ▪ IoT brings 20 Billion new Devices Online ▪ Cloud breaks the Borders ▪ Mobility Disperses Users and Data ▪ SD-WAN stretchers enterprise networks ▪ Regulations (ie GDPR, PCI-DSS, PSD2) 2 [Digital Transformation] is the integration of digital technology into all areas of a business, resulting in fundamental changes to how businesses operate and how they deliver value to customers 3 Digital Transformation Digital Transformation Engage Your Empower Your Optimize Your Transform Your Customers Employees Business Products Digital Technology 4 Real Life Digital Transformation From 140-year old manufacturing company: Digital Transformation Goals – 2020: Top 10 Global Energy, Transportation, Healthcare Software Company – $15B Digital Revenue 5 Obstacles to Digital Transformation Security is the largest factor standing in the way of enterprise digital transformation efforts. More than half (55%) of companies said that security was the No. 1 challenge they face when implementing digital enablement technologies Source: SoftServe 2017 Cybersecurity one of Top 10 “Security nearly always tops the list of obstacles to Digital Transformation digital transformation obstacles”. Source:Harvard Business Review 2017 Marc Cecere, Forrester, ZD Net, 2017 The biggest disruptive technologies Some 57% of businesses reported cited by global respondents are the major issues finding and recruiting cloud (58%), mobility and talented IT security staff—a problem collaboration (54%), big data as digital transformation efforts (52%)...IoT (43%) move more data and systems to the cloud, and cyber attacks grow more Source: BT CIO Report 2016 sophisticated. Source: Osterman Research 2017 6 7 Securing the Digitally Transformed Enterprise “…in the digital era, [security] focus needs to shift from securing network perimeters to safeguarding data spread across systems, devices, and the cloud.” MIT Technology Review, 2017 Augmented Mobile Devices IoT Platforms Cloud Computing Reality/Wearables Bid Data Analytics Multi-level and Advanced Customer Algorithms Interaction and Customer Profiling 3D Printing Location Detection Smart Sensor Advanced Human-machine Technologies Interfaces 8 Virtualization and Cloud FOCUS #1 The Multi-Cloud Experience…In Silos VIRTUALIZATION PRIVATE CLOUD HYBRID PUBLIC CLOUD HYPERVISOR IaaS/PaaS East-West North-South SaaS 10 The Internet of Things FOCUS #2 Just How Many of These Things? 20.4B IoT Units Installed Base by Category (Billions of Units)* TOTAL 11.2B TOTAL 8.4B TOTAL Business Vertical Specific 12 863 Business Cross-Industry 7 038 5 244 Consumer 2017 2018 2020 12 *Gartner 2017 The Watchwords of IoT LEARN SEGMENT PROTECT Trusted or Not Define a Policy Everything 13 The Threat Landscape FOCUS #3 Q2 2018 by the Numbers* (some of the numbers) EXPLOITS MALWARE BOTNETS 7,230 unique exploit detections variants in 4,856 96% of firms saw severe 23,945 families exploits 265 unique botnets 23% detected cryptojacking 1.8 active botnets per firm malware 15 *FortiGuard Q2 2018 Threat Landscape Report FortiGuard Statistics – Greece Malware, IPS, Application and Botnet Greece: Last Month of Activity Total Malware Hits – Global Compared to GR Name Detection Count Name Detection Count W32/BackDoor.Prosiak.65 23,610,074 W32/Downloader_x.RE!tr.dldr 10,499 W32/GandCrab.E!tr.ransom 1,319,088 W32/Dx.DC!tr 8,218 W32/Dx.DC!tr 844,161 W32/K.AIG!tr.pws 8,215 W32/Khalesi.XB!tr 595,806 PossibleThreat.vw 2,963 W32/VB_BackDoor.B!tr 509,698 W32/Agent.AJFK!tr 2,719 W32/BDoor.IY!tr.bdr 460,562 W32/Bifrose.FMR!tr.bdr 2,648 Adware/Ejik 455,201 W32/Delf.TXH!tr.dldr 2,294 W32/Magef.4408!worm 420,354 WM/Agent.XY!tr.dldr 1,813 W32/Delf.TXH!tr.dldr 368,787 Adware/AirPush!Android 1,680 MSOffice/CVE_2017_11882.A!exploit 341,812 W32/GenKryptik.CJOK!tr 1,515 PossibleThreat.vw 295,973 W32/Injector.EADU!tr 1,073 W32/Agent.RGU!tr 285,472 Adware/Sprovider!Android 727 W32/AdClicker.C!tr 269,670 Adware/BHO 624 Android/Generic.AP.12BDF4E!tr 257,099 W32/Injector.EALR!tr 587 JS/Gnaeus.G!tr 245,402 W32/Injector.EAAL!tr 563 Riskware/PCAgent 244,589 BAT/Agent.OLR!tr 514 W32/Agent.DVC!tr.dldr 242,179 MSOffice/CVE_2017_11882.A!exploit 501 W32/K.AIG!tr.pws 238,172 Java/Kryptik.XF!tr 446 Riskware/CasOnline 234,310 MSOffice/Fareit.L!exploit 410 W32/Downloader_x.RE!tr.dldr 208,059 W32/Injector.EANJ!tr 399 17 Total IPS Hits – Global Compared to GR Name Detection Count Name Detection Count NTP.Monlist.Command.DoS 51,755,836,965 Netcore.Netis.Devices.Hardcoded.Password.Security.Bypass 1,096,210 SIPVicious.SIP.Scanner 46,275,576,615 SIPVicious.SIP.Scanner 387,197 MS.DNS.WINS.Server.Information.Spoofing 9,094,601,243 D-Link.DSL-2750B.CLI.OS.Command.Injection 229,491 MS.Communicator.SIP.Invite.DoS 6,367,250,294 Samba.AD.DC.Null.Pointer.Dereference.DoS 139,041 ZMAP.Scanner 2,237,021,906 ZmEu.Vulnerability.Scanner 135,330 SSLv3.POODLE.Information.Disclosure 1,835,759,706 App.Control.Signature.Test 131,197 Traceroute 1,738,324,185 HTTP.URI.SQL.Injection 88,192 Backdoor.DoublePulsar 1,469,386,552 MS.IIS.WebDAV.PROPFIND.ScStoragePathFromUrl.Buffer.Overflow 58,499 MS.SMB.Server.Trans.Peeking.Data.Information.Disclosure 1,401,600,137 VxWorks.WDB.Debug.Service.Version.Number.Scanner 56,203 SSL.Renegotiation.DoS 1,196,785,680 Port.Scanning 50,567 SNMP.Private.Access 1,158,390,728 OpenVAS.Web.Scanner 45,693 Memcached.UDP.Amplification.Detection 1,027,475,112 Masscan.Scanner 36,596 NBTStat.Query 914,678,349 Muieblackcat.Scanner 28,741 Netcore.Netis.Devices.Hardcoded.Password.Security.Bypass 878,895,936 ZMAP.Scanner 25,935 MS.RDP.Connection.Brute.Force 841,596,972 Dasan.GPON.Remote.Code.Execution 22,287 TLS.Padding.Oracle.Information.Disclosure 599,446,628 Obfuscated.Rich.Text.Format 19,853 SIPVicious.svcrack.Brute.Force.Login 433,363,589 DuckDuckGo.Search 19,431 Cisco.IPv4.DoS 411,502,692 STUNSHELL.Web.Shell.Remote.Code.Execution 16,577 WordPress.xmlrpc.Pingback.DoS 396,287,798 Memcached.UDP.Amplification.Detection 14,478 SSH.Connection.Brute.Force 366,451,427 Generic.JavaScript.Cryptocurrency.Mining.Script 14,231 18 Total App Hits – Global Compared to GR Name Detection Count Name Detection Count DNS 587,891,495,602 DNS 1,064,868,547 HTTPS.BROWSER 565,554,559,139 HTTPS.BROWSER 906,340,485 HTTP.BROWSER 193,310,322,949 HTTP.BROWSER 216,825,735 SSL 150,135,989,528 Microsoft.Outlook.Office.365 215,333,375 SSL_TLSv1.2 116,122,231,605 SSL 192,932,550 Microsoft.Portal 84,703,575,535 QUIC 179,103,079 QUIC 82,892,628,214 Microsoft.Portal 136,388,869 HTTP.BROWSER_Chrome 75,547,220,308 SSL_TLSv1.2 124,878,308 Ping 58,903,009,200 HTTP.BROWSER_Chrome 108,403,265 Windows.File.Sharing 39,228,870,793 Microsoft.Office.Online 69,319,763 HTTP.BROWSER_IE 36,794,138,493 Fortiguard.Search 61,216,850 NetBIOS.SSN 33,002,586,007 SNMP_GetRequest 52,246,251 Microsoft.Outlook.Office.365 31,521,249,268 HTTP.BROWSER_Firefox 48,296,053 NTP 25,776,532,000 NTP 41,332,193 SNMP_GetRequest 22,244,565,109 Microsoft.SharePoint 38,583,845 Google.Services 21,834,681,002 HTTP.BROWSER_IE 36,701,324 SSL_TLSv1.0 19,104,364,543 DNS_Request.ANY.Record 32,099,085 HTTP.BROWSER_Firefox 19,099,401,544 MS.Windows.Update 32,005,889 BitTorrent_HTTP.Track 14,455,244,722 iCloud 31,090,789 Microsoft.Office.Online 14,315,356,235 MSSQL 31,018,432 19 Total Botnet Hits – Global Compared to GR Name Detection Count Name Detection Count Zeroaccess.Botnet 321,382,028 Conficker.Botnet 27,420 Andromeda.Botnet 242,791,307 Adwind.Botnet 21,815 H-worm.Botnet 150,059,634 Andromeda.Botnet 13,134 Conficker.Botnet 33,845,988 Loki.Botnet 12,830 Necurs.Botnet 27,918,793 Mariposa.Botnet 12,145 IMDDOS.Botnet 27,235,385 Citadel.Botnet 8,843 XorDDOS.Botnet 24,292,837 Zeroaccess.Botnet 3,051 Sality.Botnet 22,456,959 Gh0st.Rat.Botnet 2,839 Emotet.Botnet 16,769,768 Mirai.Botnet 2,192 Ramnit.Botnet 14,480,948 Torpig.Mebroot.Botnet 1,606 Neutrino.Botnet 11,798,216 Dyzap.Botnet 472 Cidox.Botnet 11,007,848 Emotet.Botnet 363 Smominru.Botnet 8,799,523 Pushdo.Botnet 292 Expiro.Botnet 7,609,933 Bladabindi.Botnet 255 Mariposa.Botnet 7,583,867 Nitol.Botnet 198 AAEH.Botnet 7,480,968 Gozi.Botnet 172 Torpig.Mebroot.Botnet 6,770,050 Quasar.Botnet 103 njRAT.Botnet 6,510,109 CryptoWall.Botnet 70 Gozi.Botnet 5,478,646 Fareit.Botnet 36 Pushdo.Botnet 4,938,046 Zeus.Botnet 16 20 Regulatory Pressure FOCUS #4 The Post-GDPR Era The World Didn’t End of May 25, 2018 23 [Security Transformation] is the integration of security into all areas of digital technology resulting in fundamental changes to how security is architected, deployed and operated. 24 Corporate Overview Network Security Leader Fortinet is among the top 3 public cybersecurity companies in the world. Its broad portfolio of solutions spans Network, Infrastructure, Cloud, and IoT $15B Mkt Cap $1.9B – 2017 (billings) Security. - HQ California, US Based - 6,000 employees - Fastest Growing Enterprise Network Security Company 25% YoY - 3 $Billion Revenue by 2020 - #1 Industry Clear Ranking by 2020 (Gartner, IDC, 350,000 + Customers 30% of Appliance NSS) Shipments Worldwide 25 70% of F100 Are Fortinet Customers 4 of 4 9 of 10 11 of 4 of 5 3 of 5 13 Financials/ Aerospace/ Telco Retail Energy Banking Defense 10 of 12 of 3 of 5 9 of 11 3 of 5 12 15 Technology Healthcare Transportation Financials/Ins Food/Bev 26 A Leader in Network Security 27 .

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    27 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us