11 November 2015, Multipolar Technology Security Forum 2015

Taking the theme "Prepare for the Unexpected - Winning the War on Security Breach" Security Forum held by Multipolar Technology in collaboration with Cisco, Blue Coat, F5 and IBM SWG was a big success. Awareness of the importance of IT security to protect the company assets and also anticipate emerging threats from the outside, have attracted participant’s attention to attend the seminar on Wednesday, November 11th yesterday. Featuring IT expert on Security - Semi Yulianto, who study how hackers work to break into corporate data and how companies should deploy preventive measures to protect data as a valuable asset.

The event held at the Fairmont Hotel was also brought some of the material that explores:

  • Security Perimeter that are widely used in the Data Center nowadays is "traffic filter to the incoming data in the Data Center network", but when the data is already in the Data Center Network and it turns out the data is malware, security perimeter  could not handle it. Cisco Sourcefire present to resolve the issue, with features Trajectory can perform tracking of the data traveling on the Data Center network, in addition to the Sourcefire features the automatic tuning, so that when the application platform / OS is changed, Sourcefire can adjust new Policy automatically to protect the application
  • Blue Coat Proxy SG is a device capable of accelerating Web content and applications, reduce Internet bandwidth consumption, manage internal online user behavior, and protect from Web based threats such as malware, spyware and phishing. This solution serves to regulate the access of internal users to the internet outside, so it can do the blocking of unwanted Internet access and can do the blocking of malicious downloaded files.
  • F5 Websafe: a solution that serves to protect the customers or clients against fraud and phishing or theft of customer data when logged into a website
  • IBM Security QRadar SIEM: consolidates event logs from thousands of endpoint devices and applications across the network. QRadar normalize and direct correlation to distinguish real threats from false positives. This software combines IBM X-Force® from security threat intelligence that give list of potentially malicious IP addresses that potentially dangers if infiltrate to malware hosts, spam sources and other threats.