SAFE JOURNEY TO THE CLOUD Eric Meadows Cloud Security Team 2017 Check Point Software Technologies Ltd. 1
Who is this guy? Eric Meadows Cloud Security Team 770-704-0512 emeadows@checkpoint.com Current Cloud Security Champion Former CIO Successfully built and exited two companies. Charter is to help customers and partners make the most of their cloud journey in a secure manner. Over 20 years in IT with experience in sales, marketing, consulting, project management and engineering at Nortel, Cisco and Verizon. Holds numerous certifications, studied Computer Science at West Georgia College and MIS at Kennesaw State College 2017 Check Point Software Technologies Ltd. 2
Axioms The application is king (and so is the developer) Agile discipline is taking over SDDC and cloud are mainstream Software defined and IaaS serve the dynamic nature of application delivery Automation is being used to test, build, deploy applications as well as build entire service chain 2017 Check Point Software Technologies Ltd. 3
FROM DATA CENTER TO CLOUD DATA CENTER CLOUD WHAT USED TO TAKE WEEKS, WITH CLOUD TAKES MINUTES 2017 Check Point Software Technologies Ltd. [Protected] Non-confidential content 4
THE CLOUD IS HERE ADOPTION 80% OF ENTERPRISES ARE COMMITTED TO CLOUD STRATEGY BY 2017 GROWTH 40% OF IT BUDGETS WILL BE CLOUD- BASED BY 2018 SECURITY SECURITY IS THE MAIN INHIBITOR FOR CLOUD ADOPTION (IDC) (Forbes) (Gartner) 2017 Check Point Software Technologies Ltd. [Protected] Non-confidential content 5
What Are Your Biggest Cloud Security Headaches? Loss of Control Consistency Compliance 2017 Cyber Security Survey (Check Point) 2017 Check Point Software Technologies Ltd. [Protected] Distribution or modification is subject to approval 6
Public Cloud Shared Responsibility 2017 Check Point Software Technologies Ltd. 7
CLOUD FUNDAMENTALS Cloud is a shared environment Cloud is a connected environment Cloud is a dynamic environment Therefore, cloud is vulnerable and exposed 2017 Check Point Software Technologies Ltd. [Protected] Non-confidential content 8
CLOUD SECURITY MUST BE ADAPTIVE Adding new application Security inside the cloud Application growth Legacy Security Add rule is a SHOWSTOPPER Network change is COMPLEX Replacing appliances is EXPENSIVE Cloud Security Adaptive policy is an ENABLER SDN integration is AUTOMATIC Auto-Scale is EFFORTLESS 2017 Check Point Software Technologies Ltd. [Protected] Non-confidential content 9
STEP #1: CONTROL THE CLOUD PERIMETER Cloud vendors don t protect your Data and Applications Therefore: CLOUD Advanced threat prevention should protect at the cloud perimeter 2017 Check Point Software Technologies Ltd. [Protected] Non-confidential content 10
STEP #2: SECURE THE CLOUD FROM THE INSIDE Micro-segment your cloud and control inside communication App App Prevent lateral threats movement between applications App App 2017 Check Point Software Technologies Ltd. [Protected] Non-confidential content 11
STEP #3: MANAGE CONSISTENT SECURITY FOR HYBRID ENVIRONMENTS Deploy unified security management for your hybrid cloud Ensure policy consistency CLOUD ON-PREMISE 2017 Check Point Software Technologies Ltd. [Protected] Non-confidential content 12
STEP #4: AUTOMATE YOUR SECURITY Security should be as elastic and dynamic as your cloud Auto-provisioned Auto-scaled Adaptive to changes 2017 Check Point Software Technologies Ltd. [Protected] Non-confidential content 13
STRATEGIC PARTNERSHIPS Check Point empowers enterprises to move to the Public Cloud with the best advanced threat prevention and security automation 2017 Check Point Software Technologies Ltd. 14
THE vsec FAMILY ACI Consistent security policy and control across ALL Private and Public Clouds 2017 Check Point Software Technologies Ltd. [Protected] Non-confidential content 15
ONE SECURITY PLATFORM CONSOLIDATED SYSTEM PREEMPTIVE THREAT PREVENTION MOBILE CLOUD THREAT PREVENTION 2017 Check Point Software Technologies Ltd. 16
THANK YOU Itai Greenberg Head of Cloud Security BU 2017 Check Point Software Technologies Ltd. 17