The Need For A New IT Security Architecture: Global Study On The Risk Of Outdated Technologies Daniel Yeung Technical Manager, Hong Kong & Taiwan AUG 2017 2017 Citrix
Why Worry? Security needs to be top-of-mind
3 2017 Citrix The threat is real
WannaCry: 230k Hosts infected NotPetya: 15k servers, 50k endpoints at one customer 4 2017 Citrix
The consequences are expensive 5 2017 Citrix
Cybercrime cost businesses $3b 89% of breaches had financial or espionage motive According to Verizon s 2016 Data Breach Investigations Report 6 2017 Citrix
Security Landscape Growing Attack Surface Security Professionals Biggest Sources of Concern Related to Cyber Attacks 10 2017 Citrix
Major cyber attacks in last 2 years by region North America 21% European Union 29% % of respondents who experienced cyber attacks Asia-Pacific 32% Below global average Global average Above global average Global Average 28% Source: KPMG CIO Survey 2016 3,400 responses from CIOs and technology leaders across 82 countries. 11 2017 Citrix
Businesses at Risk Because of Organizational Complexity 83% say their organization is at risk because of the complexity of business and IT operations 71% say there is risk from their inability to control employees devices and apps 74% say a new IT security framework is needed to improve security posture and reduce risk The Need for a New IT Security Architecture: Global Study Sponsored by Citrix and conducted by Ponemon Institute January 2017 12 2017 Citrix
13 2017 Citrix Rethinking Security
OLD NEW WHERE WHAT Apps Users Services Data 14 2017 Citrix
OLD NEW FORCE THE USER FOLLOW THE USER Software-Defined Perimeter Apps Users Services Centralized Policy Data Distributed Hybrid Enforcement 15 2017 Citrix
OLD NEW ATTACKERS USERS 16 2017 Citrix
OLD NEW ZONES CONTEXT Network Apps Data Access 17 2017 Citrix
OLD NEW LOCKS DETECTORS 18 2017 Citrix
NEW What Follow the User Users Context-based Detectors Software Defined Perimeter Citrix Analytics Service 19 2017 Citrix
NEW What Follow the User Users Context-based Detectors Software Defined Perimeter Citrix Analytics Service 20 2017 Citrix
21 2017 Citrix
Citrix Secure Digital Workspace Software Defined Perimeter Unified Experience Contextual Access Unified Endpoint Management BYO Identity App Ops Users Single Sign-on Contextual Performance Legacy/ Custom Apps Content Control Secure IT Security & Performance Analytics 22 2017 Citrix
Citrix Secure Digital Workspace Software-Defined Perimeter Unified Experience Contextual Access Unified Endpoint Mgmt. Users BYO Identity Single Sign-on Contextual Performance Legacy/ Custom Apps App Ops Content Control Secure IT Security & Performance Analytics 23 2017 Citrix
24 2017 Citrix
Citrix Secure Digital Workspace Software-Defined Perimeter Unified Experience Contextual Access Unified Endpoint Mgmt. Users BYO Identity Single Sign-on Contextual Performance Gateway as a Service Legacy/ Custom Apps WebApp Firewall and DDoS as a Service Security & Performance Analytics App Ops Content Control Secure IT SD-WAN as a Service 25 2017 Citrix
Citrix Secure Digital Workspace Software-Defined Perimeter Users Unified Experience BYO Identity Single Sign-on Contextual Access Contextual Performance IT Controls: Onboard, monitor and control Legacy/ your devices, apps, Custom Apps and content Unified Endpoint Mgmt. App Ops Content Control Secure IT Security & Performance Analytics 26 2017 Citrix
Citrix Secure Digital Workspace Software-Defined Perimeter Unified Experience Contextual Access Unified Endpoint Mgmt. Users BYO Identity Single Sign-on Contextual Performance Legacy/ Custom Apps App Ops Content Control Secure IT Security & Performance Analytics 27 2017 Citrix
28 2017 Citrix
29 2017 Citrix
Citrix: Secure Delivery of Apps & Data Enhanced IT and Security Operations Reduce Risk Confidentiality Integrity Availability Identity & Access Network Security Application Security Data Security Monitoring & Response Enterprise Cloud Public Cloud Managed Services 30 2017 Citrix
Citrix Security Capabilities Identity & Access Network Security Application Security Data Security Monitoring & Response Authentication n-factor Authentication Federation Single Sign On Remote Access Unified Gateway Encrypted Delivery SmartControl Centralization App Virtualization Restrict Virt. Channel Secure Browser Centralization Hosted Delivery Water Marking Peripheral Control Visibility HDX Insight Web Insight Security Insight Authorization Role Based Task Based Location Based Segmentation SDX Instances Admin Partitions Traffic Domains Containerization Micro VPN Jailbreak Detection Secure Apps Containerization Restrict Open-in Encrypt Data at Rest Inter-App Control Auditing Access Logs Configuration Logs Session Recording Access Control Endpoint Analysis Contextual Control Quarantine Availability Load Balancing Health Monitoring DDoS Protection Inspection Web AppFW DDoS Protection Zero-Day Protection File Sharing File Expiration Encrypted Email Remote Wipe Compliance FIPS 140-2 PCI DSS HIPAA Common Criteria 31 2017 Citrix
Takeaway Threat is Real The Consequences are Expensive Rethinking Security What from Where Follow the User from Force the User Users from Attackers Context-based from Zones Detectors from Locks 32 2017 Citrix
33 2017 Citrix