Click me
Transcribed

The Evolution of Network Security

The Evolution of Network Security Network security is a race against threats. Stay ahead of the curve with unified threat management. Infamous Nigerian scam spam, also known as 419 spam, becomes widespread ILOVEYOU worm infects millions of computers Microsoft sites hit by denial-of-service (DoS) worldwide within attacks on domain hours of release name servers Threats 2000 2001 Thwarts Threats drive consolidation of network protection Key 2000 2003 2004 2005 O Data breach + URL filter + Antivirus + VPN + Firewall + VolP security + Anti-phishing + Anti-spyware + Anti-spam + APS Phrase unified threat + UTM solution integrated by year management (UTM) defined as network O Industry milestone security in one appliance 2006 • 2003 • Leap, the first Mac OS X virus, appears Hacktivist group Anonymous is formed SQL injection attack hits UCLA database Koobface malware spreads on Facebook and Twitter 2007 TJX Companies Records 45.6 M Damages $256 M Conficker worm infiltrates millions of PCs worldwide despite available patch 2009 Heartland Payment Systems Impact Toughest data Records 100 M Damages $140 M protection law 2008 in the U.S UTM secures communication Impact New card data 2009 7 Apple releases rudimentary virus protection 2008 + Email encryption + P2P control + SSL VPN encryption standards 20110 Microsoft takes down Rustock botnet responsible for 45% of spam worldwide 2010 + App control + Remote Ethernet Device + Wireless security + Web application firewall UTM reduces the attack surface 2011. 2010• 2011 Epsilon Records 60 M Damages $4 B Malicious version of Angry Birds hits Android Market Stuxnet worm attacks Iran's Hacktivist group Lulz Security targets Sony nuclear facilities 2011 Flame attacks Iran's oil industry Sony Corp Open SQL injection exploit in Facebook's API E Records 100 M 2012 UTM Damages $2 B Global Payments Records 7 M+ Damages TBD A single appliance to protect the entire network, including cloud, mobile endpoints, branch offices, • 2012 UTM secures expanding network perimeter wireless networks and road warriors 2012 + Cloud/UTMAAS + Mobile control + Endpoint protection + Clientless HTML5 VPN How UTM Protects You can easily extend UTM protection to remote offices, mobile devices, WLANS and road warriors. INTERNET Remote Internet Company Wireless Road Warrior Mobile User Endpoints Endpoints UTM Ethernet Device Router Server (VPN) Endpoints BRANCH OFFICE CENTRAL OFFICE WLAN ROAD WARRIORS Get our UTM Buyers Guide at Sophos.com You're Safer in Our World SOPHOS Sophos is a registered trademark of Sophos Ltd. and Sophos Group. Other product/company names cited are trademarks/registered trademarks of their respective ow ners. © Copyright 2012. Sophos Ltd. All rights reserved. 6007

The Evolution of Network Security

shared by sophossecurity on Jul 17
1,276 views
2 shares
2 comments
From the ILOVEYOU worm to the 2011 Sony data breach, we've made a trip down memory lane to see how threats have changed how we create and defend network security. See full version here: http://bit.ly/SFvN4H

Publisher

Sophos

Source

Unknown. Add a source

Category

Technology
Did you work on this visual? Claim credit!

Get a Quote

Embed Code

For hosted site:

Click the code to copy

For wordpress.com:

Click the code to copy
Customize size