Benefits of Implementing a SaaS Cybersecurity Solution Andras Cser, VP Principal Analyst

Similar documents
Access Governance in a Cloudy Environment. Nabeel Nizar VP Worldwide Solutions

Best Practices in Securing a Multicloud World

Paper. Delivering Strong Security in a Hyperconverged Data Center Environment

Modern Database Architectures Demand Modern Data Security Measures

Secure & Unified Identity

Go mobile. Stay in control.

Run the business. Not the risks.

IBM Cloud Security for the Cloud. Amr Ismail Security Solutions Sales Leader Middle East & Pakistan

Zero Trust with Okta: A Modern Approach to Secure Access from Anywhere. How Okta enables a Zero Trust solution for our customers

Security Readiness Assessment

Privilege Security & Next-Generation Technology. Morey J. Haber Chief Technology Officer

SYMANTEC DATA CENTER SECURITY

Enhancing the Cybersecurity of Federal Information and Assets through CSIP

Transforming Security from Defense in Depth to Comprehensive Security Assurance

State of Cloud Adoption. Cloud usage is over 90%, are you ready?

CHARLES DARWIN, CYBERSECURITY VISIONARY

RSA NetWitness Suite Respond in Minutes, Not Months

The Oracle Trust Fabric Securing the Cloud Journey

Mapping Your Requirements to the NIST Cybersecurity Framework. Industry Perspective

How to Secure Your Cloud with...a Cloud?

White Paper. Why IDS Can t Adequately Protect Your IoT Devices

Securing Your Cloud Introduction Presentation

Mastering The Endpoint

SECURITY REDEFINED. Managing risk and securing the business in the age of the third platform. Copyright 2014 EMC Corporation. All rights reserved.

Device Discovery for Vulnerability Assessment: Automating the Handoff

The threat landscape is constantly

Le sfide di oggi, l evoluzione e le nuove opportunità: il punto di vista e la strategia IBM per la Sicurezza

TRUSTED IT: REDEFINE SOCIAL, MOBILE & CLOUD INFRASTRUCTURE. Ralf Kaltenbach, Regional Director RSA Germany

Martijn Loderus. Merritt Maxim. Principal Analyst Forrester. Director & Global Practice Partner for Advisory Consulting Janrain

MEETING ISO STANDARDS

WHITE PAPER HYBRID CLOUD: FLEXIBLE, SCALABLE, AND COST-EFFICIENT UK: US: HK:

WHITEPAPER. How to secure your Post-perimeter world

SOLUTION BRIEF RSA NETWITNESS SUITE 3X THE IMPACT WITH YOUR EXISTING SECURITY TEAM

McAfee epolicy Orchestrator

Encryption Vision & Strategy

Secure Access - Update

Converged Security - Protect your Digital Enterprise May 24, Copyright 2016 Vivit Worldwide

Part III: Evaluating the Business Value of the Hybrid Cloud

A Data-Centric Approach to Endpoint Security

McAfee MVISION Cloud. Data Security for the Cloud Era

A Methodology to Build Lasting, Intelligent Cybersecurity Programs

Copyright 2011 Trend Micro Inc.

Sensitive Data Loss is NOT Inevitable

Unlocking the Power of the Cloud

Security as Code: The Time is Now. Dave Shackleford Founder, Voodoo Security Sr. Instructor, SANS

Fencing the Cloud. Roger Casals. Senior Director Product Management. Shared vision for the Identity: Fencing the Cloud 1

How to Apply a Zero-Trust Model to Cloud, Data and Identity

NOTHING IS WHAT IT SIEMs: COVER PAGE. Simpler Way to Effective Threat Management TEMPLATE. Dan Pitman Principal Security Architect

Evolve Your Security Operations Strategy To Account For Cloud

Prescriptive Security Operations Centers. Leveraging big data capabilities to build next generation SOC

How your network can take on the cloud and win. Think beyond traditional networking toward a secure digital perimeter

McAfee Skyhigh Security Cloud for Amazon Web Services

SIEM Solutions from McAfee

THALES DATA THREAT REPORT

THE IDENTITY DEFINED SECURITY ALLIANCE

AKAMAI CLOUD SECURITY SOLUTIONS

Automated Threat Management - in Real Time. Vectra Networks

WHITE PAPER AUTHENTICATION YOUR WAY SECURING ACCESS IN A CHANGING WORLD

SOLUTION BRIEF RSA NETWITNESS EVOLVED SIEM

OFFICE 365 GOVERNANCE: Top FAQ s & Best Practices. Internal Audit, Risk, Business & Technology Consulting

1 Copyright 2011, Oracle and/or its affiliates. All rights reserved. Insert Information Protection Policy Classification from Slide 7

RSA Security Analytics

MAKING THE CLOUD A SECURE EXTENSION OF YOUR DATACENTER

THALES DATA THREAT REPORT

SIEMLESS THREAT DETECTION FOR AWS

The Etihad Journey to a Secure Cloud

Introducing. Secure Access. for the Next Generation. Bram De Blander Sales Engineer

ForeScout Extended Module for Splunk

Video-Aware Networking: Automating Networks and Applications to Simplify the Future of Video

Cloud Computing Private Cloud

Managed Endpoint Defense

GDPR COMPLIANCE REPORT

PROTECT WORKLOADS IN THE HYBRID CLOUD

7 Steps to Complete Privileged Account Management. September 5, 2017 Fabricio Simao Country Manager

CSP 2017 Network Virtualisation and Security Scott McKinnon

Enabling Innovation in the Digital Economy

Angela McKay Director, Government Security Policy and Strategy Microsoft

Delivering Integrated Cyber Defense for the Cloud Generation Darren Thomson

Securing Dynamic Data Centers. Muhammad Wajahat Rajab, Pre-Sales Consultant Trend Micro, Pakistan &

NETWORK FORENSIC ANALYSIS IN THE AGE OF CLOUD COMPUTING.

Cyber Security Technologies

Accelerate Your Enterprise Private Cloud Initiative

SOLUTION BRIEF RSA SECURID SUITE ACCELERATE BUSINESS WHILE MANAGING IDENTITY RISK

Industrial Defender ASM. for Automation Systems Management

Managing Your Privileged Identities: The Choke Point of Advanced Attacks

Mobile Security Overview Rob Greer, VP Endpoint Management and Mobility Product Management Dave Cole, Sr. Director Consumer Mobile Product Management

Operationalize Security To Secure Your Data Perimeter

Speaker Introduction Who Mate Barany, VMware Manuel Mazzolin, VMware Peter Schmitt, Deutsche Bahn Systel Why VMworld 2017 Understanding the modern sec

Vulnerability Management Trends In APAC

Building Trust in the Era of Cloud Computing

Continuous Data Analysis

SMARTCRYPT CONTENTS POLICY MANAGEMENT DISCOVERY CLASSIFICATION DATA PROTECTION REPORTING COMPANIES USE SMARTCRYPT TO. Where does Smartcrypt Work?

State of Office 365 Adoption & Risk A Dive into the Data. Jim Reavis, CEO, Cloud Security Alliance Brandon Cook, VP, Marketing, Skyhigh Networks

Transforming IT: From Silos To Services

A Practical Step-by-Step Guide to Managing Cloud Access in your Organization

BYOD the HP Way: Secure, Device-Agnostic Network Access Management Jochen Fischer Solution Architect (MASE) September 2013

Citrix on Azure Better Together"

Technical Review Managing Risk, Complexity, and Cost with SanerNow Endpoint Security and Management Platform

Service Description VMware Workspace ONE

RSA Solution Brief. The RSA Solution for VMware. Key Manager RSA. RSA Solution Brief

Transcription:

Benefits of Implementing a SaaS Cybersecurity Solution Andras Cser, VP Principal Analyst September 27, 2018

About Andras Cser Vice President, Principal Analyst Serves Security & Risk Professionals Leading expert on identity management, access management, user account provisioning, entitlement management, federation, privileged identity management, and role design and management Andras Cser VP, Principal Analyst 2

About Ian Felder Product Marketing for SaaS and Managed Security Program (MSP) Over 16 Years of Marketing Experience Digital & Social Media Marketing, Competitive Analysis, and Product Marketing Previously at Hologic, Inc. and Signiant Ian Felder Sr. Manager, Product Marketing 3

We work with business and technology leaders to develop customer-obsessed strategies that drive growth. 2016 Forrester Research, Inc. Reproduction Prohibited 5

Benefits of Implementing a SaaS Cybersecurity Solution Andras Cser, VP Principal Analyst September 27, 2018

Assess the impact of cyberattacks You don t want to be on CNN headline news Security has shifted from a Director/VP/CISO/CIO IT problem to a CEO problem Data protection is a key concern Mobile and IoT present new challenges BYOD/user owned devices are here to stay 2018 Forrester Research, Inc. Reproduction Prohibited 7

The Perimeter Is Gone Network segmentation only goes so far in the era of Cloud Firewalling is cumbersome and insecure (too many rules) Data proliferation is only accelerating Email Cloud storage Unstructured 2018 Forrester Research, Inc. Reproduction Prohibited 8

Finding Threats Is Like Finding a Needle In A Haystack Too many infrastructure components (on-prem, managed, IaaS, PaaS, SaaS, hybrid clouds, etc.) Too much data Too many configuration points Too many places your users can place data Too many network paths in most instances BUT if you don t know what you have, you can t monitor it 2018 Forrester Research, Inc. Reproduction Prohibited 9

Why DLP Needs To Evolve DLP needs to evolve from just DLP to include other data controls for a data centric security model Standalone DLP is siloed and can only protect data in specific apps or network perimeters DLP admin access must be protected from malicious tampering and account takeover Traditional DLP may require significant investment to use and tune all its capabilities Limited DLP solutions can cause end user (workforce \ member) friction if used only to stop data flows 2018 Forrester Research, Inc. Reproduction Prohibited 10

Enter Zero Trust Xtended (ZTX) 11

Zero Trust Extended 2018 Forrester Research, Inc. Reproduction Prohibited 12

Zero Trust: How Identity and Information Life Cycles Need to Correlate Source: June 27, 2011, Your Data Protection Strategy Will Fail Without Strong Identity Context Forrester report 2018 Forrester Research, Inc. Reproduction Prohibited 13

Risk Based Access Controls The Only Way To comply, you need to be able to cover the riskiest apps and data, otherwise you drown in costs One size fits all is not an option You have to discover the riskiest apps You have to discover the riskiest users You have to discover the riskiest and largest volume data movements 2018 Forrester Research, Inc. Reproduction Prohibited 14

Context Matters Device type (managed vs. unmanaged) Device age GPS location IP geolocation Activity (Upload, download) Data Volume and Type Any other attribute 2018 Forrester Research, Inc. Reproduction Prohibited 15

Centralization of Identity Is The Only Way To Go Discovery Visibility Auditing Interception 2018 Forrester Research, Inc. Reproduction Prohibited 16

SaaS based approaches in data protection to the rescue Lower cost of operation (labor, hardware, etc.) Policy templates for compliance Fix one, fix all: the network effect Create risk scores using statistical models, machine learning and rules Prioritize risky activities across multiple channels Minimal user friction for accessing data or workloads from a static desktop in a secured building at 9:28am on Tuesday Maximal security (2FA, biometrics, device registration, etc.) for accessing data or workloads from a brand new ipad in a rogue country at 1:32am on Sunday You can also fast track known good users for easier access 2018 Forrester Research, Inc. Reproduction Prohibited 17

Recommendations Understand the mapping between identities and data Don t rely on network perimeters Enforce data access policies centrally B2E, B2B, B2C all require mobile first Cover structured and unstructured data Authorization must be built in 2018 Forrester Research, Inc. Reproduction Prohibited 18

Recommendations Start with a handful of apps Carefully track the user experience (metrics, surveys, etc.) Surface reasons for human-led investigation Integrate with web SSO for web applications (one time, centralized integration 2018 Forrester Research, Inc. Reproduction Prohibited 19

Forrester s Predictions Contextual DLP Cloud DLP Extension of canned models to non-web (phone, in-person, etc.) channels Behavioral biometrics integration with device ID, IP geolocation, etc. Consortium based data use increases Blockchain based RBA drawing information from other lines of businesses or peer companies 2018 Forrester Research, Inc. Reproduction Prohibited 20

Security Is Not Black And White: Anomaly and Automatic Risk Detection For User Behavior For Data Access Will Continue to Improve 2018 Forrester Research, Inc. Reproduction Prohibited 21

Thank you Andras Cser +1-617-613-6365 acser@forrester.com forrester.com

Digital Guardian SaaS Data Protection Reduce overhead, complexity and cost with cloud-based data protection

Cloud-Delivered Threat Aware Data Protection Analytics Workspaces Management Console Applications DG Big Data Cloud Backend Digital Guardian Agent Digital Guardian Appliance 24

Applications Data Loss Prevention Cloud Data Loss Prevention Data Discovery User & Entity Behavior Analytics Data Classification Endpoint Detection & Response 25

Delivering Cloud Based Data Protection FIRST and ONLY Solution to Unify Endpoint Detection & Response Data Loss Prevention User & Entity Behavior Analytics 26

Why Digital Guardian Delivers More Digital Guardian Software as a Service (SaaS) Hosts and Manages a Big Data Security Architecture Delivers Immediate Time to Value Simplifies Maintenance Provides Compute Power to Detect Threats Scalability Threat Intelligence 27

How Digital Guardian Delivers Even More Digital Guardian Managed Security Program Solves Your Security Talent Gap Enables Quick Wins & Long Term Success Allows for Efficient Use of Your Resources Taking Advantage of Best Practices 28

Summary DLP needs to evolve to include other data controls Zero Trust Extended SaaS to the rescue Digital Guardian s Data Protection Platform leverages SaaS to provide data protection that results in Superior Security Better Economics Reduced Overhead 29

See your data 30

Protect your data Data Protection Platform 31

Q&A 32