Tidal Forces: The Changes Ripping Apart Security as We Know It

Size: px
Start display at page:

Download "Tidal Forces: The Changes Ripping Apart Security as We Know It"

Transcription

1 SESSION ID: CSV-T09 Tidal Forces: The Changes Ripping Apart Security as We Know It Rich Mogull

2 Image: lordsong-d5lrxws from

3

4

5

6

7 Image:

8 Technology Tidal Forces 8

9 Technology Tidal Forces IaaS Endpoints SaaS 9

10 Why You Care Many existing security skills sets have a best used by date. Many existing security tools have a best buy by date. We can learn from the organizations already over the event horizon. We can plan for a smoother transition. Smaller objects experience less tidal forces. Big objects can iterate across the event horizon. 10

11 Endpoints are different, more secure, and less open

12

13 Source:

14 No Widespread Malware

15 Closed Systems Can Improve Security 15

16 But Challenge Existing Models 16

17 Possibilities The Market The Profession Consumer AV contracts We are already seeing vendors prepare Enterprise EPP contracts Slower and less Network box vendors are in trouble Watch this thread Security better, monitoring and compliance harder Fewer endpoint tools to manage Greater use of cloud-based monitoring and filtering Enables Zero Trust Networks 17

18 SaaS is the new back office

19

20 AlwaysEven onyet Fewer No the non-saas security Internet; internal iscentralized consistency inalways servers the cloud encrypted

21 Possibilities The Market The Profession Bumps in the wire are incompatible with SaaS Square peg/round hole The value of perimeter security appliances declines CASB is here to stay But likely as a feature Fewer boxes to secure And smaller networks Risk instincts and assessment skills need to evolve You can t own or lock down all the devices Industry-specific providers will appear for verticals with special compliance needs 21 Monitoring will change Zero Trust networks enabled IR is redefined

22 IaaS is the new data center

23 Source: Fortune

24 Economically-Enforced Baseline Security 24

25 Hypersegregated Application Environments Security Group Security Group Security Group Security Group Security Group Security Group Subnet Subnet Subnet Subnet Subnet Subnet Virtual Network Virtual Network Virtual Network Virtual Network Virtual Network Virtual Network Account Account Account 25

26 New Architectures Where do you put your NGFW? Image credit: Parallax Agency Ltd 26

27 New Operational Frameworks Source Code Functional Tests NonFunctional Tests Security Tests Teraform Templates Git Jenkins Test Prod Chef Recipes Welcome to DevOps 27

28 The Power of Immutable Load Balancer a b c Auto Scale Group 28

29 The Power of Immutable Load Balancer a b c Auto Scale Group 29

30 The Power of Immutable Load Balancer a b c Auto Scale Group 30

31 The Power of Immutable Load Balancer Vulnerable Patched a b c Auto Scale Group 31

32 The Power of Immutable Load Balancer Vulnerable Patched a b c Auto Scale Group 32

33 The Power of Immutable Load Balancer Vulnerable Patched a b c Auto Scale Group 33

34 The Power of Immutable Load Balancer Vulnerable Patched a b c Auto Scale Group 34

35

36 < It s a Developer-Driven World />

37 Zero Trust Networks 37

38 Possibilities The Market Bumps in the wire are incompatible with IaaS Double whammy Data center security appliances contract Server-focused endpoint security tools contract As they exist, opportunity to refocus Developer-friendly application security tools expand The Profession Programming skills become essential You don t need to be a developer, but you need to know how to code Provider-specific technical cloud skills are vital to survive Application security architecture is critical Static patterns won t last, must be consultative Zero Trust networks redefine on-premise security strategies Don t tell Jericho Many existing skills will be less in demand Get used to change Cloud native == cloud survival 38

39 Roadblocks ahead

40 Challenges Security vendors are tied to existing revenue models Shareholders may be unwilling to balance quarterly revenue requirements with R&D and revenue model changes for future success Shifting sales models, especially at scale, is fraught with danger Rethinking product strategy without oswalding existing customers is also extremely difficult Security professionals need new skills, tools, processes, and mindsets while still protecting everything they have There has been a mid-term mindset that GRC > technical skills, but you can t make this transition without a firm understanding of new fundamentals Some technical skills also have an expiration date If you haven t been a developer, it s hard to think like one, even once you learn a little programming 40

41 Strategies to Thrive Vendors Build a cadre with a cloud-first mindset Start a skunkworks and/or buy your way in Talk to cloud-first/zero-trust network companies and understand what they want to buy, don t rely on your existing channels and customers Build the case for your stakeholders Professionals Learn to code, at least a little, even (especially) if you are management Go to cloud and DevOps events Get a personal cloud account and build something Embrace continuous change 41

42

43 Be like Iron Man Tidal Forces: The Changes Ripping Apart Security as We Know It Rich Mogull

Power Up/Level Up: Supercharging Your Security Program for Cloud and DevOps. Rich

Power Up/Level Up: Supercharging Your Security Program for Cloud and DevOps. Rich Power Up/Level Up: Supercharging Your Security Program for Cloud and DevOps Rich Mogull @rmogull CISO Ragnarok The board is breathing down your neck, the CEO wants reports, and the CFO writes Try Open

More information

Aspirin as a Service: Using the Cloud to Cure Security Headaches

Aspirin as a Service: Using the Cloud to Cure Security Headaches SESSION ID: CSV-T10 Aspirin as a Service: Using the Cloud to Cure Security Headaches Bill Shinn Principle Security Solutions Architect Amazon Web Services Rich Mogull CEO Securosis @rmogull Little. Cloudy.

More information

CSV-W14 - BUILDING AND ADOPTING A CLOUD-NATIVE SECURITY PROGRAM

CSV-W14 - BUILDING AND ADOPTING A CLOUD-NATIVE SECURITY PROGRAM SESSION ID: CSV-W14 - BUILDING AND ADOPTING A CLOUD-NATIVE SECURITY PROGRAM Rich Mogull VP of Product/Analyst /Securosis @rmogull Bill Burns Chief Trust Officer, VP Business Transformation @x509v3 Our

More information

Lift and Shift, Don t Lift and Pray: Pragmatic Cloud Migration Strategies

Lift and Shift, Don t Lift and Pray: Pragmatic Cloud Migration Strategies SESSION ID: STR-T08 Lift and Shift, Don t Lift and Pray: Pragmatic Cloud Migration Strategies Rich Mogull Analyst/CEO Securosis VP of Product DisruptOps rmogull@securosis.com Reality Bites There is relentless

More information

CSA GUIDANCE VERSION 4 S TAT E O F T H E A R T CLOUD SECURITY AND GDPR NOTES. Hing-Yan Lee (Dr.) EVP, APAC, Cloud Security Alliance

CSA GUIDANCE VERSION 4 S TAT E O F T H E A R T CLOUD SECURITY AND GDPR NOTES. Hing-Yan Lee (Dr.) EVP, APAC, Cloud Security Alliance CSA GUIDANCE VERSION 4 S TAT E O F T H E A R T CLOUD SECURITY AND GDPR NOTES Hing-Yan Lee (Dr.) EVP, APAC, Cloud Security Alliance ABOUT THE BUILDING SECURITY BEST PRACTICES FOR NEXT GENERATION IT CLOUD

More information

Traditional Security Solutions Have Reached Their Limit

Traditional Security Solutions Have Reached Their Limit Traditional Security Solutions Have Reached Their Limit CHALLENGE #1 They are reactive They force you to deal only with symptoms, rather than root causes. CHALLENGE #2 256 DAYS TO IDENTIFY A BREACH TRADITIONAL

More information

Securing Your Cloud Introduction Presentation

Securing Your Cloud Introduction Presentation Securing Your Cloud Introduction Presentation Slides originally created by IBM Partial deck derived by Continental Resources, Inc. (ConRes) Security Division Revision March 17, 2017 1 IBM Security Today

More information

10 Cloud Myths Demystified

10 Cloud Myths Demystified 10 Cloud s Demystified The Realities for Digital Healthcare Transformation It s a challenging time for the healthcare industry, with changing regulations, consolidation and the consumerization of healthcare

More information

AZURE CLOUD SECURITY GUIDE: 6 BEST PRACTICES. To Secure Azure and Hybrid Cloud Environments

AZURE CLOUD SECURITY GUIDE: 6 BEST PRACTICES. To Secure Azure and Hybrid Cloud Environments AZURE CLOUD SECURITY GUIDE: 6 BEST PRACTICES To Secure Azure and Hybrid Cloud Environments Introduction Cloud is at the core of every successful digital transformation initiative. With cloud comes new

More information

IT Security: Managing a New Reality

IT Security: Managing a New Reality IT Security: Managing a New Reality Kevin Lonergan #IDCDirections IDC You re Only as Strong as Your Weakest Link Locks Only Work if you Know How to Use Them IDC 2 Millions Canadian Security Market Forecast:

More information

Microsoft Security Management

Microsoft Security Management Microsoft Security Management MICROSOFT SECURITY MANAGEMENT SECURITY MANAGEMENT CHALLENGES Some large financial services organizations have as many as 40 or more different security vendors inside their

More information

Beyond Firewalls: The Future Of Network Security

Beyond Firewalls: The Future Of Network Security Beyond Firewalls: The Future Of Network Security XChange University: IT Security Jennifer Blatnik 20 August 2016 Security Trends Today Network security landscape has expanded CISOs Treading Water Pouring

More information

Transforming Security Part 2: From the Device to the Data Center

Transforming Security Part 2: From the Device to the Data Center SESSION ID: SP01-R11 Transforming Security Part 2: From the Device to the Data Center John Britton Director, EUC Security VMware @RandomDevice The datacenter as a hospital 3 4 5 Digital transformation

More information

Pragmatic Cloud Security

Pragmatic Cloud Security Pragmatic Cloud Security Rich Mogull, Analyst & CEO, Securosis, LLC @rmogull events.techtarget.com Information Security Decisions TechTarget This Old Process Assess Redesign Secure Inspect Profit! Information

More information

Modernizing Servers and Software

Modernizing Servers and Software SMB PLANNING GUIDE Modernizing Servers and Software Increase Performance with Intel Xeon Processor E3 v3 Family Servers and Windows Server* 2012 R2 Software Why You Should Read This Document This planning

More information

IBM Cloud Security for the Cloud. Amr Ismail Security Solutions Sales Leader Middle East & Pakistan

IBM Cloud Security for the Cloud. Amr Ismail Security Solutions Sales Leader Middle East & Pakistan IBM Cloud Security for the Cloud Amr Ismail Security Solutions Sales Leader Middle East & Pakistan Today s Drivers for Cloud Adoption ELASTIC LOWER COST SOLVES SKILLS SHORTAGE RAPID INNOVATION GREATER

More information

PRAGMATIC SECURITY AUTOMATION FOR CLOUD

PRAGMATIC SECURITY AUTOMATION FOR CLOUD SESSION ID: CSV-R04 PRAGMATIC SECURITY AUTOMATION FOR CLOUD Rich Mogull Analyst/VP of Product Securosis/DisruptOPS rmogull@disruptops.com @rmogull Cloud is Fundamentally Different Abstraction Automation

More information

THALES DATA THREAT REPORT

THALES DATA THREAT REPORT 2018 THALES DATA THREAT REPORT Trends in Encryption and Data Security INDIA EDITION EXECUTIVE SUMMARY #2018DataThreat THE TOPLINE Rising risks for sensitive data in India In India, as in the rest of the

More information

THALES DATA THREAT REPORT

THALES DATA THREAT REPORT 2018 THALES DATA THREAT REPORT Trends in Encryption and Data Security U.S. FEDERAL EDITION EXECUTIVE SUMMARY #2018DataThreat THE TOPLINE Federal agency data is under siege. Over half of all agency IT security

More information

Five Essential Capabilities for Airtight Cloud Security

Five Essential Capabilities for Airtight Cloud Security Five Essential Capabilities for Airtight Cloud Security SECURITY IN THE CLOUD REQUIRES NEW CAPABILITIES It is no secret; security and compliance are at the top of the list of concerns tied to cloud adoption.

More information

Building Trust in the Era of Cloud Computing

Building Trust in the Era of Cloud Computing Building Trust in the Era of Cloud Computing ICMC 2017 Conference May 17, 2017 v1.0 David Gerendas Group Product Manager TRUST A FIRM belief in the! Reliability! Truth! Ability of someone or something.

More information

10 FOCUS AREAS FOR BREACH PREVENTION

10 FOCUS AREAS FOR BREACH PREVENTION 10 FOCUS AREAS FOR BREACH PREVENTION Keith Turpin Chief Information Security Officer Universal Weather and Aviation Why It Matters Loss of Personally Identifiable Information (PII) Loss of Intellectual

More information

MAKING MONEY ON OPENSTACK. Boris

MAKING MONEY ON OPENSTACK. Boris MAKING MONEY ON OPENSTACK Boris Renski b@renski.com @zer0tweets China and Russia are alike! 2 We love gymnastics! 3 We love chess! 4 and we love money! 5 6 When most people think of OpenSt ack, they imagine

More information

eguide: Designing a Continuous Response Architecture 5 Steps to Reduce the Complexity of PCI Security Assessments

eguide: Designing a Continuous Response Architecture 5 Steps to Reduce the Complexity of PCI Security Assessments eguide: Designing a Continuous Response Architecture 5 Steps to Reduce the Complexity of PCI Security Assessments Today s PCI compliance landscape is one of continuing change and scrutiny. Given the number

More information

10 Cloud Myths Demystified

10 Cloud Myths Demystified 10 Cloud s Demystified The Realities for Modern Campus Transformation Higher education is in an era of transformation. To stay competitive, institutions must respond to changing student expectations, demanding

More information

Sichere Applikations- dienste

Sichere Applikations- dienste Sichere Applikations- dienste Innovate, Expand, Deliver Manny Rivelo Für SaaS und traditionelle Service-Modelle EVP, Strategic Solutions Carsten Langerbein Field Systems Engineer c.langerbein@f5.com Es

More information

Secure & Unified Identity

Secure & Unified Identity Secure & Unified Identity for End & Privileged Users Copyright 2015 Centrify Corporation. All Rights Reserved. 1 Key Point #1: Perimeter is Dissolving Making Identity Matter Most You must plant a strong

More information

Cloud Computing: Making the Right Choice for Your Organization

Cloud Computing: Making the Right Choice for Your Organization Cloud Computing: Making the Right Choice for Your Organization A decade ago, cloud computing was on the leading edge. Now, 95 percent of businesses use cloud technology, and Gartner says that by 2020,

More information

Security as Code: The Time is Now. Dave Shackleford Founder, Voodoo Security Sr. Instructor, SANS

Security as Code: The Time is Now. Dave Shackleford Founder, Voodoo Security Sr. Instructor, SANS Security as Code: The Time is Now Dave Shackleford Founder, Voodoo Security Sr. Instructor, SANS Introduction Business is moving faster to the cloud, and DevOps is accelerating scale and pushing automation

More information

GEARS + CounterACT. Advanced Compliance Enforcement for Healthcare. December 16, Presented by:

GEARS + CounterACT. Advanced Compliance Enforcement for Healthcare. December 16, Presented by: Advanced Compliance Enforcement for Healthcare Presented by: December 16, 2014 Adam Winn GEARS Product Manager OPSWAT Kevin Mayer Product Manager ForeScout Agenda Challenges for the healthcare industry

More information

Cloud Security Whitepaper

Cloud Security Whitepaper Cloud Security Whitepaper Sep, 2018 1. Product Overview 3 2. Personally identifiable information (PII) 3 Using Lookback without saving any PII 3 3. Security and privacy policy 4 4. Personnel security 4

More information

PCI DSS Compliance. White Paper Parallels Remote Application Server

PCI DSS Compliance. White Paper Parallels Remote Application Server PCI DSS Compliance White Paper Parallels Remote Application Server Table of Contents Introduction... 3 What Is PCI DSS?... 3 Why Businesses Need to Be PCI DSS Compliant... 3 What Is Parallels RAS?... 3

More information

SECOPS: NAVIGATE THE NEW LANDSCAPE FOR PREVENTION, DETECTION AND RESPONSE

SECOPS: NAVIGATE THE NEW LANDSCAPE FOR PREVENTION, DETECTION AND RESPONSE SESSION ID: SBX4W5 SECOPS: NAVIGATE THE NEW LANDSCAPE FOR PREVENTION, DETECTION AND RESPONSE Dara Such VP & Publisher, Security Networking and IoT TechTarget @darasuch What we ll cover today State of SecOps:

More information

Elizabeth Lawler CEO & Co-Founder Conjur,

Elizabeth Lawler CEO & Co-Founder Conjur, SESSION ID: ASD-W02 Is DevOps Breaking Your Company? Elizabeth Lawler CEO & Co-Founder Conjur, Inc. @elizabethlawler Agenda I. Security + DevOps Overview Unstoppable Force vs Immovable Object Aligning

More information

Endpoint Security Can Be Much More Effective and Less Costly. Here s How

Endpoint Security Can Be Much More Effective and Less Costly. Here s How Endpoint Security Can Be Much More Effective and Less Costly Here s How Contents Introduction More is not always better Escalating IT Security Budgets Ineffective management Need of the hour System management

More information

The Etihad Journey to a Secure Cloud

The Etihad Journey to a Secure Cloud SESSION ID: CCS-T07 The Etihad Journey to a Secure Cloud Georges de Moura Head of Group Information Security, Risk & Compliance Etihad Aviation Group History: Before The Cloud Devolved IT Decision-Making

More information

How to Apply a Zero-Trust Model to Cloud, Data and Identity

How to Apply a Zero-Trust Model to Cloud, Data and Identity SESSION ID: SPO3-T08 How to Apply a Zero-Trust Model to Cloud, Data and Identity Nico Popp Sr. VP of Information Protection Symantec Cloud Security Status Quo Today: CASB CASB Rich SaaS visibility (logs,

More information

Software-Defined Secure Networks. Sergei Gotchev April 2016

Software-Defined Secure Networks. Sergei Gotchev April 2016 Software-Defined Secure Networks Sergei Gotchev April 2016 Security Trends Today Network security landscape has changed. CISOs Treading Water Pouring money into security, yet not any more secure - Average

More information

Zero Trust with Okta: A Modern Approach to Secure Access from Anywhere. How Okta enables a Zero Trust solution for our customers

Zero Trust with Okta: A Modern Approach to Secure Access from Anywhere. How Okta enables a Zero Trust solution for our customers Zero Trust with Okta: A Modern Approach to Secure Access from Anywhere How Okta enables a Zero Trust solution for our customers Okta Inc. 301 Brannan Street, Suite 300 San Francisco, CA 94107 info@okta.com

More information

6 Critical Reasons for Office 365 Backup. The case for why organizations need to protect Office 365 data

6 Critical Reasons for Office 365 Backup. The case for why organizations need to protect Office 365 data 6 Critical Reasons for Office 365 Backup The case for why organizations need to protect Office 365 data 2 Introduction Do you have control of your Office 365 data? Do you have access to all the items you

More information

EVOLVING FROM BREACH PREVENTION TO BREACH ACCEPTANCE TO SECURING THE BREACH

EVOLVING FROM BREACH PREVENTION TO BREACH ACCEPTANCE TO SECURING THE BREACH EVOLVING FROM BREACH PREVENTION TO BREACH ACCEPTANCE TO SECURING THE BREACH Jason Hart CISSP CISM VP Cloud Solutions Safenet Inc Session ID: Session Classification: SP0-W10 General Interest Today s issues

More information

Securing Data in the Cloud: Point of View

Securing Data in the Cloud: Point of View Securing Data in the Cloud: Point of View Presentation by Infosys Limited www.infosys.com Agenda Data Security challenges & changing compliance requirements Approach to address Cloud Data Security requirements

More information

OFFICE 365 GOVERNANCE: Top FAQ s & Best Practices. Internal Audit, Risk, Business & Technology Consulting

OFFICE 365 GOVERNANCE: Top FAQ s & Best Practices. Internal Audit, Risk, Business & Technology Consulting OFFICE 365 GOVERNANCE: Top FAQ s & Best Practices Internal Audit, Risk, Business & Technology Consulting CLOUD ADOPTION Business demands faster, more agile and less costly solutions to achieve digital

More information

2018 THALES DATA THREAT REPORT

2018 THALES DATA THREAT REPORT 2018 THALES DATA THREAT REPORT Trends in Encryption and Data Security U.S. HEALTHCARE EDITION www.thales-esecurity.com 2018 THALES DATA THREAT REPORT NOW IN ITS SIXTH YEAR SWEDEN NETHERLANDS U.S. U.K.

More information

Cloudreach Data Center Migration Services

Cloudreach Data Center Migration Services Cloudreach Data Center Migration Services High Velocity Migration to Leverage Full Benefits of the Cloud The Cloud is Inevitable Cloudreach believe it is not about if, but when enterprises move their IT

More information

The Case for Office 365 Backup. Uncovering critical reasons why organizations need to backup Office 365 data

The Case for Office 365 Backup. Uncovering critical reasons why organizations need to backup Office 365 data The Case for Office 365 Backup Uncovering critical reasons why organizations need to backup Office 365 data 2 Introduction Do you have control of your Office 365 data? Do you have access to all the items

More information

Services solutions for Managed Service Providers (MSPs)

Services solutions for Managed Service Providers (MSPs) McAfee Advanced Threat Defense Services solutions for Managed Service Providers (MSPs) Differentiate your services and protect customers against zero-day attacks with the industry s most comprehensive

More information

5 Steps to Government IT Modernization

5 Steps to Government IT Modernization 5 Steps to Government IT Modernization 1 WHY MODERNIZE? IT modernization is intimidating, but it s necessary. What are the advantages of modernization? Enhance citizen experience and service delivery Lower

More information

Nine Steps to Smart Security for Small Businesses

Nine Steps to Smart Security for Small Businesses Nine Steps to Smart Security for Small Businesses by David Lacey Co-Founder, Jericho Forum Courtesy of TABLE OF CONTENTS INTRODUCTION... 1 WHY SHOULD I BOTHER?... 1 AREN T FIREWALLS AND ANTI-VIRUS ENOUGH?...

More information

Embracing a Secure Cloud. Cloud & Network Virtualisation India 2017

Embracing a Secure Cloud. Cloud & Network Virtualisation India 2017 Embracing a Secure Cloud Cloud & Network Virtualisation India 2017 Cloud Computing Group of computing resources providing services such as servers, storage, databases, software, applications, networks

More information

ADDRESSING TODAY S VULNERABILITIES

ADDRESSING TODAY S VULNERABILITIES E-Guide ADDRESSING TODAY S VULNERABILITIES SearchSecurity E ven if your firm has no legal or contractual obligation to perform them, authenticated scans should be an essential part of your security program.

More information

Stop Cyber Threats With Adaptive Micro-Segmentation. Jeff Francis Regional Systems Engineer

Stop Cyber Threats With Adaptive Micro-Segmentation. Jeff Francis Regional Systems Engineer Stop Cyber Threats With Adaptive Micro-Segmentation Jeff Francis Regional Systems Engineer Who is This Guy, and Why is He Here? Jeff Francis Regional Systems Engineer Northwestern United States Datacenter

More information

News Flash: Some Things Actually Do Work in Security!!!

News Flash: Some Things Actually Do Work in Security!!! SESSION ID: STR-T07R News Flash: Some Things Actually Do Work in Security!!! John Pescatore Director, Emerging Security Trends SANS Institute @John_Pescatore Largest Breach Ever A Short Reality Break

More information

Say Goodbye to Enterprise IT: Welcome to the Mobile First World. Sean Ginevan, Senior Director, Strategy Infosecurity Europe

Say Goodbye to Enterprise IT: Welcome to the Mobile First World. Sean Ginevan, Senior Director, Strategy Infosecurity Europe Say Goodbye to Enterprise IT: Welcome to the Mobile First World Sean Ginevan, Senior Director, Strategy Infosecurity Europe - 2015 Sean Ginevan Sr. Director, Strategy, MobileIron Linkedin.com/in/sginevan

More information

LTI Security Services. Intelligent & integrated Approach to Cyber & Digital Security

LTI Security Services. Intelligent & integrated Approach to Cyber & Digital Security LTI Security Intelligent & integrated Approach to Cyber & Digital Security Overview As businesses are expanding globally into new territories, propelled and steered by digital disruption and technological

More information

Next-Gen CASB. Patrick Koh Bitglass

Next-Gen CASB. Patrick Koh Bitglass Next-Gen CASB Patrick Koh Bitglass pkoh@bitglass.com www.cloudsec.com WW Cloud Service Adoption https://www.gartner.com/newsroom/id/3815165 "As of 2016, approximately 17 percent of the total market revenue

More information

Three Key Challenges Facing ISPs and Their Enterprise Clients

Three Key Challenges Facing ISPs and Their Enterprise Clients Three Key Challenges Facing ISPs and Their Enterprise Clients GRC, enterprise services, and ever-evolving hybrid infrastructures are all dynamic and significant challenges to the ISP s enterprise clients.

More information

Modernize Your Infrastructure

Modernize Your Infrastructure Modernize Your Infrastructure The next industrial revolution 3 Dell - Internal Use - Confidential It s a journey. 4 Dell - Internal Use - Confidential Last 15 years IT-centric Systems of record Traditional

More information

with Advanced Protection

with Advanced  Protection with Advanced Email Protection OVERVIEW Today s sophisticated threats are changing. They re multiplying. They re morphing into new variants. And they re targeting people, not just technology. As organizations

More information

NetWitness Overview. Copyright 2011 EMC Corporation. All rights reserved.

NetWitness Overview. Copyright 2011 EMC Corporation. All rights reserved. NetWitness Overview 1 The Current Scenario APT Network Security Today Network-layer / perimeter-based Dependent on signatures, statistical methods, foreknowledge of adversary attacks High failure rate

More information

Transformation in Technology Barbara Duck Chief Information Officer. Investor Day 2018

Transformation in Technology Barbara Duck Chief Information Officer. Investor Day 2018 Transformation in Technology Barbara Duck Chief Information Officer Investor Day 2018 Key Takeaways 1Transformation in Technology driving out cost, supporting a more technologyenabled business Our new

More information

McAfee Public Cloud Server Security Suite

McAfee Public Cloud Server Security Suite McAfee Public Cloud Server Security Suite Comprehensive security for AWS and Azure cloud workloads As enterprises shift their data center strategy to include and often lead with public cloud server instances,

More information

STRATEGIC WHITE PAPER. Securing cloud environments with Nuage Networks VSP: Policy-based security automation and microsegmentation overview

STRATEGIC WHITE PAPER. Securing cloud environments with Nuage Networks VSP: Policy-based security automation and microsegmentation overview STRATEGIC WHITE PAPER Securing cloud environments with Nuage Networks VSP: Policy-based security automation and microsegmentation overview Abstract Cloud architectures rely on Software-Defined Networking

More information

Part III: Evaluating the Business Value of the Hybrid Cloud

Part III: Evaluating the Business Value of the Hybrid Cloud Contents at a Glance Introduction... 1 Part I: Understanding Concepts and Construction... 7 Chapter 1: Discovering the Fundamentals of Your Computing Environment...9 Chapter 2: The Hybrid Cloud Continuum...25

More information

Cyber Security. It s not just about technology. May 2017

Cyber Security. It s not just about technology. May 2017 Cyber Security It s not just about technology May 2017 Introduction The Internet has opened a new frontier in warfare: everything is networked and anything networked can be hacked. - World Economic Forum

More information

Best Practices for the Hybrid Cloud

Best Practices for the Hybrid Cloud Best Practices for the Hybrid Cloud Private clouds have been a popular topic amongst IT managers in the past year, but IT organizations that build private clouds need the peak computing power of a public

More information

Making hybrid IT simple with Capgemini and Microsoft Azure Stack

Making hybrid IT simple with Capgemini and Microsoft Azure Stack Making hybrid IT simple with Capgemini and Microsoft Azure Stack The significant evolution of cloud computing in the last few years has encouraged IT leaders to rethink their enterprise cloud strategy.

More information

Building a More Secure Cloud Architecture

Building a More Secure Cloud Architecture Building a More Secure Cloud Architecture Jerry Archer SVP and CSO Let s Make College Happen Security Guiding Principles in the Cloud Secure Perimeter Micro-segmentation -- isolating applications and data

More information

Delivering Complex Enterprise Applications via Hybrid Clouds

Delivering Complex Enterprise Applications via Hybrid Clouds Whitepaper Delivering Complex Enterprise Applications via Hybrid Clouds As enterprises and industries shake off the effects of the last recession, the focus of IT organizations has shifted from one marked

More information

HALO IN ACTION COMPLIANCE DON T LET LEGACY SECURITY TOOLS HOLD UP PCI COMPLIANCE IN THE CLOUD. Automated PCI compliance anytime, anywhere.

HALO IN ACTION COMPLIANCE DON T LET LEGACY SECURITY TOOLS HOLD UP PCI COMPLIANCE IN THE CLOUD. Automated PCI compliance anytime, anywhere. HALO IN ACTION COMPLIANCE DON T LET LEGACY SECURITY TOOLS HOLD UP PCI COMPLIANCE IN THE CLOUD Automated PCI compliance anytime, anywhere. THE PROBLEM Online commercial transactions will hit an estimated

More information

GET CLOUD EMPOWERED. SEE HOW THE CLOUD CAN TRANSFORM YOUR BUSINESS.

GET CLOUD EMPOWERED. SEE HOW THE CLOUD CAN TRANSFORM YOUR BUSINESS. GET CLOUD EMPOWERED. SEE HOW THE CLOUD CAN TRANSFORM YOUR BUSINESS. Cloud computing is as much a paradigm shift in data center and IT management as it is a culmination of IT s capacity to drive business

More information

BREACHES HAPPEN: BE PREPARED. Endpoint Detection & Response

BREACHES HAPPEN: BE PREPARED. Endpoint Detection & Response BREACHES HAPPEN: BE PREPARED. Endpoint Detection & Response INTRO PROTECT YOUR BUSINESS AND ITS DATA AGAINST ADVANCED ATTACKS Effective pre-compromise threat prevention is the cornerstone of cyber security,

More information

Accelerate your Azure Hybrid Cloud Business with HPE. Ken Won, HPE Director, Cloud Product Marketing

Accelerate your Azure Hybrid Cloud Business with HPE. Ken Won, HPE Director, Cloud Product Marketing Accelerate your Azure Hybrid Cloud Business with HPE Ken Won, HPE Director, Cloud Product Marketing Mega trend: Customers are increasingly buying cloud services from external service providers Speed of

More information

Virtustream Cloud and Managed Services Solutions for US State & Local Governments and Education

Virtustream Cloud and Managed Services Solutions for US State & Local Governments and Education Data Sheet Virtustream Cloud and Managed Services Solutions for US State & Local Governments and Education Available through NASPO ValuePoint Cloud Services VIRTUSTREAM CLOUD AND MANAGED SERVICES SOLUTIONS

More information

Cognizant Cloud Security Solution

Cognizant Cloud Security Solution CLOUD SECURITY OVERVIEW Cognizant Cloud Security Solution Transform your security operation to protect your business across public and hybrid cloud environments. December 2017 The advantages of moving

More information

Government Data Center Modernization

Government Data Center Modernization Government Data Center Modernization Strategy Focus Group Discussion 13 March 2017 Table of Contents Welcome and Introduction Trends in Data Center Modernization Current Situation at Thailand Key Challenges

More information

CSP 2017 Network Virtualisation and Security Scott McKinnon

CSP 2017 Network Virtualisation and Security Scott McKinnon CSP 2017 Network Virtualisation and Security Scott McKinnon smckinnon@vmware.com Security Lead, Northern EMEA Network & Security, VMware Disclaimer This presentation may contain product features that are

More information

Changing face of endpoint security

Changing face of endpoint security Changing face of endpoint security S A N T H O S H S R I N I V A S A N C I S S P, C I S M, C R I S C, C E H, C I S A, G S L C, C G E I T D I R E C T O R S H A R E D S E R V I C E S, H C L T E C H N O L

More information

Innovate or die!? Modern IT Workplace Security. Alex Verboon Cyber Security Consultant

Innovate or die!? Modern IT Workplace Security. Alex Verboon Cyber Security Consultant 1 Innovate or die!? Modern IT Workplace Security Alex Verboon Cyber Security Consultant Alex.verboon@basevision.ch Daniel Buehlmann Principal Workplace Consultant daniel.buehlmann@basevision.ch About Alex

More information

e:

e: t: @crosswordcyber e: tom.clark@crosswordcybersecurity.com Risk Analysis Tool: www.rizikon.com Research Database: https://clue.crosswordcybersecurity.com The View From 2018 An exercise to identify emerging

More information

Cloud Connections SEE Partner Summit Janos Strausz Product Sales Specialist, DC

Cloud Connections SEE Partner Summit Janos Strausz Product Sales Specialist, DC Cloud Connections SEE Partner Summit 2015 Janos Strausz Product Sales Specialist, DC 75% of Businesses To be Digital in 5 years 1 81% 80% 81% 80% Mobile Technologies Mobile for Technologies Customer for

More information

Network Security Protection Alternatives for the Cloud

Network Security Protection Alternatives for the Cloud A Trend Micro White Paper May 2016 Network Security Protection Alternatives for the Cloud» A technical brief summarizing the deployment options that can be used to deploy IDS/IPS protection for cloud instances

More information

Providing a Rapid Response to Meltdown and Spectre for Hybrid IT. Industry: Computer Security and Operations Date: February 2018

Providing a Rapid Response to Meltdown and Spectre for Hybrid IT. Industry: Computer Security and Operations Date: February 2018 Market Guide Providing a Rapid Response to Meltdown and Spectre for Hybrid IT Industry: Computer Security and Operations Date: February 2018 Meltdown and Spectre Exploits Vulnerabilities in Common Processors

More information

Welcome to IBM Security Guardium Analyzer!

Welcome to IBM Security Guardium Analyzer! Welcome to IBM Security Guardium Analyzer! To help you get started with IBM Security Guardium Analyzer, please refer to these frequently asked questions: What is IBM Security Guardium Analyzer? Guardium

More information

Fundamental Concepts and Models

Fundamental Concepts and Models Fundamental Concepts and Models 1 Contents 1. Roles and Boundaries 2. Cloud Delivery Models 3. Cloud Deployment Models 2 1. Roles and Boundaries Could provider The organization that provides the cloud

More information

Making Security Agile

Making Security Agile Making Security Agile 2017 - INVITING SECURITY INTO DEVOPS SURVEY 1 CEOs are caught between a rock and a hard place. On one hand, there is tremendous pressure to digitally transform their companies. As

More information

4 Hidden Budget-Killing PDF Software Pitfalls. And how to avoid them

4 Hidden Budget-Killing PDF Software Pitfalls. And how to avoid them 4 Hidden Budget-Killing PDF Software Pitfalls And how to avoid them 1 Do you know the real cost of your PDF software? It s more than some line items on a budget. Hidden PDF software costs can eat away

More information

Rethinking VDI: The Role of Client-Hosted Virtual Desktops. White Paper Virtual Computer, Inc. All Rights Reserved.

Rethinking VDI: The Role of Client-Hosted Virtual Desktops. White Paper Virtual Computer, Inc. All Rights Reserved. Rethinking VDI: The Role of Client-Hosted Virtual Desktops White Paper 2011 Virtual Computer, Inc. All Rights Reserved. www.virtualcomputer.com The Evolving Corporate Desktop Personal computers are now

More information

CLOUD SECURITY CRASH COURSE

CLOUD SECURITY CRASH COURSE CLOUD SECURITY CRASH COURSE ADDRESSING REAL WORLD CONCERNS Joel Friedman, CTSO ABOUT ME Name: Joel Friedman Title: Chief Technology & Security Officer of Datapipe Certifications: CISSP, CISA, CISM, CRISC,

More information

Cloud Computing Private Cloud

Cloud Computing Private Cloud Cloud Computing Private Cloud Amplifying Business Value thru IT Ivo Sladoljev, Territory Manager, Adriatic Region December, 2010. 2010 VMware Inc. All rights reserved Agenda Company Facts VMware Focus

More information

IT Boosting Employee & Business Productivity with Innovative Technologies and Solutions Refresh Now

IT Boosting Employee & Business Productivity with Innovative Technologies and Solutions Refresh Now IT Boosting Employee & Business Productivity with Innovative Technologies and Solutions Refresh Now Lawson Lu Site Manager Vietnam August 20, 2013 Legal Notices This presentation is for informational purposes

More information

Copyright 2011 Trend Micro Inc.

Copyright 2011 Trend Micro Inc. Copyright 2011 Trend Micro Inc. 2008Q1 2008Q2 2008Q3 2008Q4 2009Q1 2009Q2 2009Q3 2009Q4 2010Q1 2010Q2 2010Q3 2010Q4 2011Q1 2011Q2 2011Q3 2011Q4 M'JPY Cloud Security revenue Q to Q Growth DeepSecurity/Hosted/CPVM/IDF

More information

Security-as-a-Service: The Future of Security Management

Security-as-a-Service: The Future of Security Management Security-as-a-Service: The Future of Security Management EVERY SINGLE ATTACK THAT AN ORGANISATION EXPERIENCES IS EITHER ON AN ENDPOINT OR HEADING THERE 65% of CEOs say their risk management approach is

More information

KuppingerCole Whitepaper. by Dave Kearns February 2013

KuppingerCole Whitepaper. by Dave Kearns February 2013 KuppingerCole Whitepaper by Dave Kearns February 2013 KuppingerCole Whitepaper Using Information Stewardship within by Dave Kearns dk@kuppingercole.com February 2013 Content 1. Summary... 3 2. Good information

More information

Healthcare IT Modernization and the Adoption of Hybrid Cloud

Healthcare IT Modernization and the Adoption of Hybrid Cloud Healthcare IT Modernization and the Adoption of Hybrid Cloud An IDC InfoBrief, Sponsored by VMware June 2018 Executive Summary The healthcare industry is facing unprecedented changes brought about by a

More information

Popular SIEM vs aisiem

Popular SIEM vs aisiem Popular SIEM vs aisiem You cannot flip a page in any Cybersecurity magazine, or scroll through security blogging sites without a mention of Next Gen SIEM. You can understand why traditional SIEM vendors

More information

Security and Compliance for Office 365

Security and Compliance for Office 365 Security and Compliance for Office 365 [Proofpoint has] given us our time back to focus on the really evil stuff. CISO, Global 500 Manufacturer Like millions of businesses around the world, you may be

More information

Device Discovery for Vulnerability Assessment: Automating the Handoff

Device Discovery for Vulnerability Assessment: Automating the Handoff Device Discovery for Vulnerability Assessment: Automating the Handoff O V E R V I E W While vulnerability assessment tools are widely believed to be very mature and approaching commodity status, they are

More information

Cloud Computing. Amazon Web Services (AWS)

Cloud Computing. Amazon Web Services (AWS) Cloud Computing What is Cloud Computing? Benefit of cloud computing Overview of IAAS, PAAS, SAAS Types Of Cloud private, public & hybrid Amazon Web Services (AWS) Introduction to Cloud Computing. Introduction

More information

STAY ONE STEP AHEAD OF THE CRIMINAL MIND. F-Secure Rapid Detection & Response

STAY ONE STEP AHEAD OF THE CRIMINAL MIND. F-Secure Rapid Detection & Response STAY ONE STEP AHEAD OF THE CRIMINAL MIND F-Secure Rapid Detection & Response INTRO PROTECT YOUR BUSINESS AND ITS DATA AGAINST ADVANCED ATTACKS Effective pre-compromise threat prevention is the cornerstone

More information