SHAPE Integrated Security in The Cloud. CNBG/SP Bobby Zhou

Similar documents
MAKING THE CLOUD A SECURE EXTENSION OF YOUR DATACENTER

CISCO NETWORKS BORDERLESS Cisco Systems, Inc. All rights reserved. 1

Evolution of Data Center Security Automated Security for Today s Dynamic Data Centers

Cybersecurity Roadmap: Global Healthcare Security Architecture

Cybersecurity Session IIA Conference 2018

Security in Cloud Environments

Cyber Security Technologies

Security for the Cloud Era

85% 89% 10/5/2018. Do You Have A Firewall Around Your Cloud? Conquering The Big Threats & Challenges

Modelos de Negócio na Era das Clouds. André Rodrigues, Cloud Systems Engineer

Qualys Cloud Platform

21ST CENTURY CYBER SECURITY FOR MEDIA AND BROADCASTING

Security Enhancements

GDPR Update and ENISA guidelines

Cloud Managed Campus, Cloudifying Network Management. Huawei Cloud Managed Campus Solution

SECURING THE NEXT GENERATION DATA CENTER. Leslie K. Lambert Juniper Networks VP & Chief Information Security Officer July 18, 2011

Cyber Resilience Solution for Smart Buildings

Securing Digital Transformation

to protect the well-being of citizens. Fairfax is also home to some Fortune 500 and large

LEAD YOUR CLOUD TRANSFORMATION. Copyright 2013 EMC Corporation. All rights reserved.

We b Ap p A t ac ks. U ser / Iden tity. P hysi ca l 11% Other (VPN, PoS,infra.)

locuz.com SOC Services

DEFINING SECURITY FOR TODAY S CLOUD ENVIRONMENTS. Security Without Compromise

Enterprise & Cloud Security

CHARTING THE FUTURE OF SOFTWARE DEFINED NETWORKING

We are innovating in security

Copyright 2011 Trend Micro Inc.

Synchronized Security

Securing Your Most Sensitive Data

Transforming IT: From Silos To Services

Towards an integrated regulation platform in Luxembourg. Information Security Education Day th of april

Service Provider View of Cyber Security. July 2017

Venusense UTM Introduction

IBM Cloud for VMware Solutions

Mobile Devices prioritize User Experience

SYMANTEC DATA CENTER SECURITY

Osynlig infrastruktur i datacentret med inbyggd säkerhet och resursoptimering.

Cisco Unified Data Center Strategy

Franck Greverie Group Cloud & CyberSecurity leader

Transformation Through Innovation

Cybersecurity Risk Mitigation: Protect Your Member Data. Introduction

Safeguarding company from cyber-crimes and other technology scams ASSOCHAM

Understanding Persistent Connectivity: How IoT and Data Will Impact the Connected Data Center

Endpoint Protection : Last line of defense?

Azure Stack: The hybrid cloud revolution

Vincent van Kooten, EMEA North Fraud & Risk Intelligence Specialist RSA, The Security Division of EMC

Security Challenges and

The Oracle Trust Fabric Securing the Cloud Journey

Huawei Next-Generation Network Security

Build a Software-Defined Network to Defend your Business

Cisco Cloud Strategy. Uwe Müller. Leader PreSales Cloud & Datacenter Germany

Hybrid Network present & future

3 Ways to Prevent and Protect Your Clients from a Cyber-Attack. George Anderson Product Marketing Director Business October 31 st 2017

Crises Control Cloud Security Principles. Transputec provides ICT Services and Solutions to leading organisations around the globe.

Huawei Cloud Fabric Data Center Security and Application Optimization Solution

Stopping Advanced Persistent Threats In Cloud and DataCenters

INTRODUCTION. We would like to thank HelpSystems for supporting this unique research. We hope you will enjoy the report.

Data Protection Modernization: Meeting the Challenges of a Changing IT Landscape

T-Systems Open telekom cloud

Security Readiness Assessment

Microsoft Security Management

Business Strategy Theatre

AT&T Endpoint Security

2018 Cyber Security Predictions

IBM Cloud Security for the Cloud. Amr Ismail Security Solutions Sales Leader Middle East & Pakistan

Fast IT - Policy Driven Infrastructure for the Intercloud World

Securing Your Amazon Web Services Virtual Networks

REALIZE YOUR. DIGITAL VISION with Digital Private Cloud from Atos and VMware

Securing Your Cloud Introduction Presentation

Qualys Cloud Platform

Richard Curran :Security Officer EMEA. Mario Romao : Senior Manager Policy, Intel

Sage Data Security Services Directory

Microsoft 365. A complete, intelligent, secure solution to empower employees. Integrated for simplicity. Built for teamwork. Unlocks creativity

Cyber Security. February 13, 2018 (webinar) February 15, 2018 (in-person)

Next Generation Infrastructure Outsourcing. Copyright 2016 Tech Mahindra. All rights reserved.

Atos Canopy Orchestrated Hybrid Cloud. Mark Nouris - Atos Head of Cloud Michael Kollar Head of Cloud engineering & TIC

Transforming Security Part 2: From the Device to the Data Center

Morgan Independent Software Vendor Lead

Everything visible. Everything secure.

PROTECT WORKLOADS IN THE HYBRID CLOUD

Cloud for Government: A Transformative Digital Tool to Better Serve Communities

Making hybrid IT simple with Capgemini and Microsoft Azure Stack

NTT Com Press Conference March 1, 2016 #enterprisecloud

Service. Sentry Cyber Security Gain protection against sophisticated and persistent security threats through our layered cyber defense solution

AKAMAI CLOUD SECURITY SOLUTIONS

CLOUD SECURITY: THE CHALLENGES FOR THE DATA CENTRE AND IT ENVIRONMENT NOVEMBER 2016

IEEE NetSoft 2016 Keynote. June 7, 2016

12,000+ Associates. Worldwide. Worldwide. 36 Countries. Customer Base 230+ Infra Supported Data Centers. 300,000+ End Users.

Evolution For Enterprises In A Cloud World

Delivering Integrated Cyber Defense for the Cloud Generation Darren Thomson

A Simple Guide to Understanding EDR

The Transformation in Security How RSA is responding to the Changing Threat Landscape

Enhancing infrastructure cybersecurity in Europe Rossella Mattioli Secure Infrastructures and Services

Versa Software-Defined Solutions for Service Providers

Cybersecurity for Service Providers

Jim Reavis CEO and Founder Cloud Security Alliance December 2017

Introduction. Deployment Models. IBM Watson on the IBM Cloud Security Overview

Simplify, Streamline and Empower Security with ISecOps

NIS Standardisation ENISA view

Designing and Building a Cybersecurity Program

Transcription:

SHAPE Integrated Security in The Cloud CNBG/SP Bobby Zhou

1.0 2.0 Born in Cloud Cloud Grow from Cloud Rise of vertical industry clouds Internet Applications Agility, Innovation, Experience Embrace the cloud,into the Cloud Mind Shift,Innovative business and Operation Model To 2020, vertical cloud market growth compound rate 12.3% 2

Rich & Competitive service Simplicity & Efficiency Optimal user experience B2B Cloud IT Cloud Unified Cloud Management Platform (CMP) Edge DCs Regional DCs Telco Cloud 3rd party Public Cloud Core DCs Telco Tiered Data Centers Huawei DC Integration Solutions Remodeling S.H.A.P.E. Cloud Business Service-driven Planning 3 Hybrid Cloud Infra. Integration (Secure & Reliable) Agile PaaS Integration Proven Business Migration Efficient Facility Integration

Threats Everywhere Attacks Complicating Security top concern for cloud adoption Apps VM Virtualization System Infra Network 0-day Phishing Trojan Virus DDoS 253% Attack Growth Rate SmartPhone, 2004 Cloud, 2010 IoT, 2016 2016,APT attack multi banks, loss > $100M Forgery Phishing Botnet Fileless Ransom APT 50% APT target at ISP, Gov, FSI 87.5% 41% 28% Top Challenge Top priority for Telcos Major security incident over last 2 years TOP2 Focus by CIO in consecutive 5 years 4 APT : Advanced Persistent Threat (2006, Colonel Greg Rattray, USAF) Source: IDC, KPMG 2016

From Static, standalone, known threats defense to dynamic, collaborative, unknown threat defense Traditional Defense On premise/static NG Cloud Security Defense: Service-lized Intelligent Collaborative Distributed & Dynamic SDSec, Orchestration Boundary in depth Cloudification Orchestra tion Speedy Release Vuln. Worm Known Threats Spyware Spam Web Threats Malwar Piphing e APT Unknown Threats Mobile/IOT and Cloud Oriented Intelligent situation awareness Detection Prevention Response Point Solution Collaborative Collaborative, intelligent defense Security HW/SW End Point Network and Cloud 5

Regulatory Compliance Data Security Sec. Mgmt IAM Hypervisor security Infra security App Security Intelligent Security Management Detection Prevent Response Predict Security Infra. VM Security Platform Security Intel-Analytics International/Domes tic law Industry Regulation FW DLP WAF HiCloud CMP MV Security Prd. Integration Tenant Security Security Consultancy & Design Professional and Ease of use Secaas Security Mgmt Platform Integration APT Auto-collaboration <60sec response Secaas Integration 26 Secaas Deploy in a minute Security Integration Capability C-SMART Test Platform 12+ attack modeling test cases script library 6 Huawei IT security KB 10+ security control models Multi-dimension analysis model Huawei HiCloud CMP Integrate devices from 20+Security vendors

① Awareness Big data analytic situation awareness 防火墙 VPN WAF IPS 12 Secaas, self-service AntiDDoS Security market space 100+ on-demand security service Log, Report Analysis Awareness ② In-depth 100+ DDoS attack types Full-stack multi-layer, multi-dimension security architecture ③ Certifications 10+ security certifications for industry compliance 7

Huawei Global Threat Intelligent Center CyberSecurity Intelligent System (CIS) Big Data Analytics Behavioral Analysis Defense device Collaboration Machine Learning 99% accuracy, intuitive and configurable rule builder Automated security device collaboration,<60s response Intelligent Optimized detection models and protection policies Security Infrastructure Real-time Situation awareness and predication 8

26 Secaas,Self-service portal Service Catalogue Firewall DLP WAF Vuln. ScanAwareness EPP Partners Service Orchestrati on HiCloud Cloud Mgmt Platform (CMP) Cloud Resources Security Resources Security Infrastructu re WAN Cloud DC 9

Known Vulnerability Unknown Vulnerability C-SMART Platform Scanner:Vulnerability Scanning Master:Source Code Security analyzer Risker:Fuzz Testing Compass:Security Testing Framework Automata: automated security testing Troublemaker: Penetration Test Customer Value Build trusted cloud platform at software component level and solution level Complete security management lifecycle Enable efficient cloud application security testing with fully automated testing procedure Key Capabilities 12+ Security KB,including Test cases, attack PoC scripts library 40+ security testing tools,including Redline scan source code analyzer Fuzz tool CLOUD OPEN LAB,integrated 57+ mainstream security products 10

10,000+ Product vendors 11 1,000,000+ Certified Business Use Cases 500+ Vendor Certifications 350+ Huawei Products

Open Telekom Cloud with Deutsche Telekom 828 Security and Privacy Protection Enhancement s To compliant EU data and privacy protection laws/regulations 12

13 Thanks!