A World without the Security Perimeter

The Enterprise IT landscape is changing with the adoption of mobility and cloud services, and enterprises need to change their architecture to meet the growing needs of securing users from anywhere on any device.

Join in and be inspired by mobile security session at the Nordic Security Conference in Stockholm.

Nordic ITSecurity 2016 Program

The IT landscape has shifted dramatically and the corporate perimeter is disappearing. This is putting huge pressure on your traditional appliance-based security infrastructure, which was designed to protect servers in the corporate data center. In this cloud-centric, mobile-first world, how can you protect all your users, apps, and devices, wherever they are?

Tony Fergusson, IT Infrastructure Architect at MAN will illustrate how the MAN Diesel & Turbo team reinvented their security architecture using cloud based technologies and building security into the network to protect 15.000 users over 100 locations in 50 countries.

Christopher Hodson, Senior Director Office of the CISO at Zscaler will elaborate on why many IT organizations are choosing to adopt a cloud based approach to securely enable mobility, cloud applications and social media, while ensuring compliance and reducing risk.

• Protect users from advanced threats: why traditional security appliances are failing • How to embrace cloud with full visibility and control of Shadow IT and allow users to access their applications without network-layer visibility

• Getting real-time visibility and control: mine billions of user transactions in seconds to quickly identify gaps in security and ensure compliance with corporate policies

Tony Ferguson, IT Architect, Man Diesel & Turbo Christopher Hodson, Senior Director Office of the CISO, Zscaler 10:30 The Corporate perimeter is Disappearing, how to Protect Users Anytime & Anywhere

Tony Fergusson is an Infrastructure architect, working with many technologies within the Enterprise with a focus on the Security.   Tony has over 20 years of experience in the IT industry and has been recently focusing his efforts on how to secure the enterprise and the internet of things using emerging technologies like software defined networking and cloud security.

 

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s