Software Defined Perimeter & PrecisionAccess. Secure. Simple.

Similar documents
So.ware Defined Perimeter Internet- scale Security for the Internet2 Community. Junaid Islam Co- Chair SDP Workgroup Cloud Security Alliance

Vidder PrecisionAccess

PrecisionAccess Trusted Access Control

Verizon Software Defined Perimeter (SDP).

Introduction. The Safe-T Solution

PracticeDump. Free Practice Dumps - Unlimited Free Access of practice exam

Defeating All Man-in-the-Middle Attacks

GLOBALPROTECT. Key Usage Scenarios and Benefits. Remote Access VPN Provides secure access to internal and cloud-based business applications


Cyber Security & Ethical Hacking Training. Introduction to Cyber Security Introduction to Cyber Security. Linux Operating System and Networking: LINUX

Securing Office 365 & Other SaaS

Curso: Ethical Hacking and Countermeasures

Ethical Hacking and Prevention

ADVANCED THREAT PREVENTION FOR ENDPOINT DEVICES 5 th GENERATION OF CYBER SECURITY

Identiteettien hallinta ja sovellusturvallisuus. Timo Lohenoja, CISPP Systems Engineer, F5 Networks

Related Labs: Introduction to Universal Access and F5 SAML IDP (Self-paced)

13 Ways Through A Firewall What you don t know will hurt you

Stop sweating the password and learn to love public key cryptography. Chris Streeks Solutions Engineer, Yubico

Building a More Secure Cloud Architecture

Cybersecurity Survey Results

EXAM - CAS-002. CompTIA Advanced Security Practitioner (CASP) Exam. Buy Full Product.

Segmentation for Security

The Top 6 WAF Essentials to Achieve Application Security Efficacy

PrepAwayExam. High-efficient Exam Materials are the best high pass-rate Exam Dumps

ADC im Cloud - Zeitalter

BraindumpsVCE. Best vce braindumps-exam vce pdf free download

Scanning. Introduction to Hacking. Networking Concepts. Windows Hacking. Linux Hacking. Virus and Worms. Foot Printing.

Mobile Field Worker Security Advocate Series: Customer Conversation Guide. Research by IDC, 2015

AURA ACADEMY Training With Expertised Faculty Call Us On For Free Demo

EBOOK 4 TIPS FOR STRENGTHENING THE SECURITY OF YOUR VPN ACCESS

PASS4TEST. IT Certification Guaranteed, The Easy Way! We offer free update service for one year

M2M / IoT Security. Eurotech`s Everyware IoT Security Elements Overview. Robert Andres

CS System Security Mid-Semester Review

CTS2134 Introduction to Networking. Module 08: Network Security

School of Computer Sciences Universiti Sains Malaysia Pulau Pinang

F5 comprehensive protection against application attacks. Jakub Sumpich Territory Manager Eastern Europe

How were the Credit Card Numbers Published on the Web? February 19, 2004


Hybrid Identity de paraplu in de cloud

ADAPTIVE AUTHENTICATION ADAPTER FOR IBM TIVOLI. Adaptive Authentication in IBM Tivoli Environments. Solution Brief

Modern IP Communication bears risks

Gladiator Incident Alert

O365 Solutions. Three Phase Approach. Page 1 34

Pass4suresVCE. Pass4sures exam vce dumps for guaranteed success with high scores

CompTIA Security+ Malware. Threats and Vulnerabilities Vulnerability Management

Securing Cloud Computing

We Believe: The market will soon require:

Protect Yourself Against VPN-Based Attacks: Five Do s and Don ts

IBM Secure Proxy. Advanced edge security for your multienterprise. Secure your network at the edge. Highlights

Passwords Are Dead. Long Live Multi-Factor Authentication. Chris Webber, Security Strategist

Keep the Door Open for Users and Closed to Hackers

Advanced Diploma on Information Security

Methods for Reducing Cybersecurity Vulnerabilities of Power Substations Using Multi-Vendor Smart Devices in a Smart Grid Environment

Security

Question No: 1 After running a packet analyzer on the network, a security analyst has noticed the following output:

2016 Tri-State CF Partnership Webinar Series. Cyber Crime Trends a State of the Union April 7, 2016

CS System Security 2nd-Half Semester Review

Topics. Ensuring Security on Mobile Devices

Securing ArcGIS Services

An Aflac Case Study: Moving a Security Program from Defense to Offense

Incident Scale

En partenariat avec CA Technologies. Genève, Hôtel Warwick,

Information Technology Enhancing Productivity and Securing Against Cyber Attacks

Endpoint Security - what-if analysis 1

ISACA Silicon Valley. APIs The Next Hacker Target or a Business and Security Opportunity? Tim Mather, CISO Cadence Design Systems

Securing ArcGIS Server Services An Introduction

Building an Enterprise Infrastructure to Securely Manage Access to Web Applications

Cato Cloud. Software-defined and cloud-based secure enterprise network. Solution Brief

10 FOCUS AREAS FOR BREACH PREVENTION

Evidence-based protection of web resources a must under the GDPR. How the Akamai Intelligent Platform helps customers to mitigate risks

Exam : Title : Security Solutions for Systems Engineers. Version : Demo

Security and Authentication

The following chart provides the breakdown of exam as to the weight of each section of the exam.

AN IPSWITCH WHITEPAPER. The Definitive Guide to Secure FTP

SE420 Software Quality Assurance

Pass Microsoft Exam

SOLUTION BRIEF. Enabling and Securing Digital Business in API Economy. Protect APIs Serving Business Critical Applications

Cloud-Security: Show-Stopper or Enabling Technology?

Today s workforce is Mobile. Cloud and SaaSbased. are being deployed and used faster than ever. Most applications are Web-based apps

Copyright 2011 Trend Micro Inc.

What is Authentication? All requests for resources have to be monitored. Every request must be authenticated and authorized to use the resource.

Author: Tonny Rabjerg Version: Company Presentation WSF 4.0 WSF 4.0

Teradata and Protegrity High-Value Protection for High-Value Data

Symantec VIP Quick Start Guide. Helping your users. Version 1.0. Author Maren Peasley Symantec. All rights reserved.

Computer Forensics: Investigating Network Intrusions and Cyber Crime, 2nd Edition. Chapter 3 Investigating Web Attacks

The Next Generation Security Platform. Domenico Stranieri Pre- Sales Engineer Palo Alto Networks EMEA Italy

Web Application Penetration Testing

1 About Web Security. What is application security? So what can happen? see [?]

IoT Security for Critical Information Infrastructures. Andrey Tikhonov

COMPUTER NETWORK SECURITY

Rootkits and Trojans on Your SAP Landscape

Whitepaper on AuthShield Two Factor Authentication with SAP

AUTHENTICATION. Do You Know Who You're Dealing With? How Authentication Affects Prevention, Detection, and Response

Kenna Platform Security. A technical overview of the comprehensive security measures Kenna uses to protect your data

CompTIA Security+ (2008 Edition) Exam

MOBILE SECURITY OVERVIEW. Tim LeMaster

Aerohive and IntelliGO End-to-End Security for devices on your network

Endpoint Protection : Last line of defense?

Achieving End-to-End Security in the Internet of Things (IoT)

ADVANCED, UNKNOWN MALWARE IN THE HEART OF EUROPE

Transcription:

Software Defined Perimeter & PrecisionAccess Secure. Simple.

Enterprise Perimeter: Then & Now THEN: Fixed Perimeter blocked attackers NOW: Attackers are Inside the Perimeter Corporate employees Corporate employees Proxy, IPS, etc. Proxy, IPS, etc. Fixed perimeter protected traditional enterprise and kept the attackers out Sophisticated attacks, like phishing, bring the attackers inside the fixed perimeter Lesson learned: Perimeters can hide critical infrastructure 2

The Solution: Shrink the Perimeter ü Shrink perimeter to the server ü Attackers back on the outside Corporate employees ü Unfortunately, so are the users Proxy, IPS, etc. 4

Software Defined Perimeter (SDP) ü Separates control path from packet path ü Controller Authenticates & authorizes Devices & users Establishes packet paths ü Packet path provides scalability Proxy, IPS, etc. Client Controller Protected 4

SDP/PA: the Advanced Access Control ü Server isolation Defeats server exploitation Controller ü Transparent MFA Defeats credential theft ü End-to-end control Defeats connection hijacking ü -specific access control It s not a VPN Proxy, Proxy IPS, etc. Client Protected ü Multiple use case 4

The Multiple Use Cases of PrecisionAccess Traditional Enterprise Extended Enterprise Server Isolation 1. Internal Isolates Internal s from Unauthorized Users Protect Internet s as if they were Internal s Makes the Public Cloud Private 2. Internet 3. Cloud Instance Business Enablement 4. Extended Workforce 5. Critical Vendor Access 6. Distance Workers Unauthorized Unauthorized BYO D Internal Users Contractors, Consultants, SME s Critical Supply Chain Distance Workers 6

Vidder PrecisionAccess for External Access Control 0. One time on-boarding Client root of trust Crypto artifacts & thin client 1. Device Authentication & Authorization SPA: anti DDoS, defeats SSL attacks mtls & fingerprint: anti credential theft Context-based device authorization 2. User Authentication & Authorization Enterprise identity: separation of trust SAML IdP integrated with LDAP groups Gateway Device LDAP mtls Client SAML SPA Groups Crypto Auth'r & IP s FP PA Controller PA Gateways Hosting & IaaS 3. Dynamically Provisioned Connections lications isolated and protected Usability: portal page of applications PA 3. Dynamic Connection 3. Dynamic Connection DMZ & Data Center Server isolations defeats server exploitation Transparent MFA defeats credential theft mtls defeats connection hijacking 7

Simple Click & Access for Users (Demo) Vidder 8

Defeating Attacks on the Extended Enterprise Server exploitation Miscon:igurations Vulnerabilities Injections Denial of Service Credential theft Phishing Key loggers Brute force Connection hijacking Man- in- the- Middle Certi:icate forgery DNS poisoning : constant attacks 500 digital certi:icates were forged from this Dutch certi:icate authority. The real- word effect of this attack is still unknown. Injection attack on the web admin interface resulted in the public dumping of PII of 60K government workers. Turk Telekom was ordered to hijack Google s DNS servers at IP address 8.8.8.8 by the Turkish government. As a result of a spear phishing attack on Melbourne IT, the website of The New York Times was unavailable for two days. SQL Injection on a public website used to gain access to the database a database of 150K customer password hashes. Heartbleed enabled attackers to VPN into CHS and steal 4.5M patient records. A Russian cyber gang acquired 4.5B stolen credentials, cracked many of the passwords, and posed them online. A phishing attack on an employee of the South Carolina Dept. of Revenue and the resultant credential theft resulted in the loss of 75GB of data. Chinese attackers performed a massive man- in- the- middle attack on U.S. ISP s stealing unknown amounts of emails and passwords.

Defeating Attacks on the Extended Enterprise Server Isolation SPA, Dynamic FW No False Positives Server exploitation: constant attacks Miscon:igurations Vulnerabilities Injections Denial of Service Transparent MFA mtls, Fingerprint Credential theft: ⅔ of Verizon DBIR Phishing Keyloggers Brute force Encryption, Pinned Certs, No DNS Connection hijacking: stealthiest Man- in- the- Middle Certi:icate forgery DNS poisoning User name Password 479729cec9a2187c914df2b3078e320f

Which lications Will You Protect?