Next-Gen CASB. Patrick Koh Bitglass

Similar documents
2016 BITGLASS, INC. mobile. solution brief

How to Apply a Zero-Trust Model to Cloud, Data and Identity

State of Cloud Adoption. Cloud usage is over 90%, are you ready?

CipherCloud CASB+ Connector for ServiceNow

The Next Generation Security Platform. Domenico Stranieri Pre- Sales Engineer Palo Alto Networks EMEA Italy

Speaker Introduction Who Mate Barany, VMware Manuel Mazzolin, VMware Peter Schmitt, Deutsche Bahn Systel Why VMworld 2017 Understanding the modern sec

Go mobile. Stay in control.

IBM Cloud Security for the Cloud. Amr Ismail Security Solutions Sales Leader Middle East & Pakistan

How to Secure Your Cloud with...a Cloud?

THE RISE OF BYOD. BYOD increases employee mobility and, consequently, organizational flexibility, efficiency, and collaboration.

Securing Your Cloud Introduction Presentation

RHM Presentation. Maas 360 Mobile device management

CloudSOC and Security.cloud for Microsoft Office 365

Best Practices in Securing a Multicloud World

MOBILE SECURITY 2017 SPOTLIGHT REPORT. Information Security PRESENTED BY. Group Partner

WHITE PAPER AIRWATCH SUPPORT FOR OFFICE 365

Microsoft Security Management

Rethinking Security: The Need For A Security Delivery Platform

85% 89% 10/5/2018. Do You Have A Firewall Around Your Cloud? Conquering The Big Threats & Challenges

Cloud Customer Architecture for Securing Workloads on Cloud Services

Zero Trust with Okta: A Modern Approach to Secure Access from Anywhere. How Okta enables a Zero Trust solution for our customers

2018 Cyber Security Predictions

WHITEPAPER. How to secure your Post-perimeter world

Symantec & Blue Coat Technical Update Webinar 29. Juni 2017

McAfee MVISION Cloud. Data Security for the Cloud Era

Proteggere Office365 e Cloud file sharing in meno di un minuto Tiberio Molino Sr.Sales Engineer Trend Micro

THE IDENTITY DEFINED SECURITY ALLIANCE

CLOUD REPORT LITTLE CHANGE IN GDPR-READINESS LEVELS WITH MAY 2018 DEADLINE LOOMING. 24.6% of cloud services rated high on GDPR-readiness

MaaS360 Secure Productivity Suite

The Challenge of Cloud Security

Cloud Security, Mobility and Current Threats. Tristan Watkins, Head of Research and Innovation

Securing the SMB Cloud Generation

Securing Your Most Sensitive Data

Securing Office 365 with SecureCloud

MAKING THE CLOUD A SECURE EXTENSION OF YOUR DATACENTER

Qualys Cloud Platform

Spotlight Report. Information Security. Presented by. Group Partner

CISCO NETWORKS BORDERLESS Cisco Systems, Inc. All rights reserved. 1

Security and Compliance for Office 365

2018 Edition. Security and Compliance for Office 365

SYMANTEC DATA CENTER SECURITY

WORKPLACE Data Leak Prevention: Keeping your sensitive out of the public domain. Frans Oudendorp Ronny de Jong

Copyright 2011 Trend Micro Inc.

Maximize your investment in Microsoft Office 365 with Citrix Workspace

Have breaches declined since the massive Heartland Payments leak in 2008? What proportion of breaches are the result of hacking?

Cybersecurity Roadmap: Global Healthcare Security Architecture

ADC im Cloud - Zeitalter

Cisco Firepower NGFW. Anticipate, block, and respond to threats

Presenting the VMware NSX ECO System May Geert Bussé Westcon Group Solutions Sales Specialist, Northern Europe

State of Office 365 Adoption & Risk A Dive into the Data. Jim Reavis, CEO, Cloud Security Alliance Brandon Cook, VP, Marketing, Skyhigh Networks

ForeScout CounterACT. Continuous Monitoring and Mitigation. Real-time Visibility. Network Access Control. Endpoint Compliance.

Solution Overview Gigamon Visibility Platform for AWS

Hybrid Identity de paraplu in de cloud

EU GENERAL DATA PROTECTION: TIME TO ACT. Laurent Vanderschrick Channel Manager Belgium & Luxembourg Stefaan Van Hoornick Technical Manager BeNeLux

Related Labs: Introduction to Universal Access and F5 SAML IDP (Self-paced)

Popular SIEM vs aisiem

Moshe Elias, Product Marketing, Allot. Network Intelligence to See, Control & Secure IT

Christopher Covert. Principal Product Manager Enterprise Solutions Group. Copyright 2016 Symantec Endpoint Protection Cloud

Consumerization. Copyright 2014 Trend Micro Inc. IT Work Load

DEFINING SECURITY FOR TODAY S CLOUD ENVIRONMENTS. Security Without Compromise

The Etihad Journey to a Secure Cloud

Addressing Today s Endpoint Security Challenges

Stopping Advanced Persistent Threats In Cloud and DataCenters

Balancing BYOD and Security. A Guide for Secure Mobility in Today s Digital Era

Transforming Security Part 2: From the Device to the Data Center

Cloud Security: Constant Innovation

Privilege Security & Next-Generation Technology. Morey J. Haber Chief Technology Officer

Office 365 Buyers Guide: Best Practices for Securing Office 365

Five Essential Capabilities for Airtight Cloud Security

2017 THALES DATA THREAT REPORT

Disclaimer This presentation may contain product features that are currently under development. This overview of new technology represents no commitme

EM L01 Introduction to Mobile

Security Readiness Assessment

A New Security Model for the IoE World. Henry Ong SE Manager - ASEAN Cisco Global Security Sales Organization

Oracle Buys Palerra Extends Oracle Identity Cloud Service with Innovative Cloud Access Security Broker

McAfee Skyhigh Security Cloud for Amazon Web Services

Modelos de Negócio na Era das Clouds. André Rodrigues, Cloud Systems Engineer

IBM Future of Work Forum

Use EMS to protect your mobile data and mobile app

Bring Your Own Device. Peter Silva Technical Marketing Manager

Microsoft 365 Security & Compliance For Small- and Mid-Sized Businesses

Delivering Integrated Cyber Defense for the Cloud Generation Darren Thomson

Designing an Adaptive Defense Security Architecture. George Chiorescu FireEye

Security for the Cloud Era

Fencing the Cloud. Roger Casals. Senior Director Product Management. Shared vision for the Identity: Fencing the Cloud 1

Cloud-Enable Your District s Network For Digital Learning

A tale of Modern Management Part 1

Securing Corporate Data on Mobile Devices

WHITEPAPER. Lookout Mobile Endpoint Security for App Risks

SECOPS: NAVIGATE THE NEW LANDSCAPE FOR PREVENTION, DETECTION AND RESPONSE

The threat landscape is constantly

How your network can take on the cloud and win. Think beyond traditional networking toward a secure digital perimeter

Best Practices in Securing Your Customer Data in Salesforce, Force.com & Chatter

Juniper Sky Advanced Threat Prevention

BYOD Success Kit. Table of Contents. Current state of BYOD in enterprise Checklist for BYOD Success Helpful Pilot Tips

ProteggereiDatiAziendalion-premises e nel cloud

JUNIPER SKY ADVANCED THREAT PREVENTION

Symantec Endpoint Protection Family Feature Comparison

Enabling Public Cloud Interconnect Services F5 Application Connector

Build a Software-Defined Network to Defend your Business

Transcription:

Next-Gen CASB Patrick Koh Bitglass pkoh@bitglass.com www.cloudsec.com

WW Cloud Service Adoption https://www.gartner.com/newsroom/id/3815165 "As of 2016, approximately 17 percent of the total market revenue for infrastructure, middleware, application and business process services had shifted to cloud," said Mr. Nag. "Through 2021, this will increase to approximately 28 percent."

APAC Cloud Service Adoption https://www.gartner.com/n ewsroom/id/3591417 By 2019, total public cloud services spending rise to $13.6 billion The highest growth (SaaS) with a 28.5 percent increase in 2017 indicators that migration of application and workloads from on premises data centers to the cloud, as well as development of cloud ready and cloud native applications, are fueling growth in the cloud space," said Sid Nagresearch director at Gartner. "Software vendors will continue to shift investments from on-premises license-based software to cloud-based offerings."

Problem Cloud and mobile are beyond the firewall... Unmanaged apps Managed apps Legacy Tech Firewall Web Proxy IPS / IDS DLP CASB Data & Threat Protection MDM Unmanaged devices...leaving legacy security technologies obsolete. Managed devices

Problem enterprises can t rely solely on native app security end-user devices visibility & analytics data protection identity & access control application storage servers network enterprise (CASB)

CASB a better approach to cloud security shadow IT APIbased approac h In-line Unknown cloud apps usage Protect Data-atrest Real time protectio n

Solutions Managed Applications Long-tail SaaS Unmanaged Applications Unmanaged Devices

Managed Apps: Control any SaaS or Custom App Major SaaS Long-tail SaaS Internal Apps Proxy + API Contextual access control DLP w/ adv. remediation Field and file encryption Data Protection Threat Protection Known & Zero-day malware protection Account hijack protection Zero-Day Core TM Integrated Single Sign-On (SSO) Step-up multi-factor auth Session management Identity Visibility UEBA Policy-based remediation Agent/Agentless Proxy Agentless Proxy Managed Devices Unmanaged Devices

Managed App Example: O365 Identity Data Protection Visibility Threat Protection Step-up MFA for risky behavior/logins Control access to O365 from unmanaged devices Session management Identification and selective encryption of PII Control external sharing via OneDrive, Sharepoint Block OneDrive sync client on select devices Comprehensive visibility and forensics across cloud footprint Data-at-rest and datain-transit visibility Stop known and zero-day threats before upload to OneDrive Block email attachments containing malware Scan and quarantine malware at-rest in OneDrive

Unmanaged Apps: Expanding Cloud Footprint First-Gen CASB Head: ~10 apps Long tail: 20,000 apps Next-Gen CASB

Unmanaged Apps: Zero-Day Shadow IT visibility and protection 95% of apps in use are not sanctioned by IT EFSS, content apps, social media Discover Shadow IT Automated Index of over 400K apps Sources of app reputation & risk Reports on app risk, compliance, etc Protect Shadow IT Automated Zero-Day identification of upload paths Machine-learning tech inspects all upload traffic Data-paths with natural language payloads identified Enforce DLP policy on data paths across all users No signatures required Risk Report s Proxy or Firewall Automated Index Log Feeds Zero-Day upload DLP Agent/DNS

Unmanaged Apps Unmanaged-Controlled Unmanaged-Blocked Control, Block, Coach Make any SaaS app read-only Zero-day data leakage path learning Data Protection Threat Protection Known & Zero-day malware protection Zero-Day Core TM Identity Visibility Identification Management Shadow IT visibility & risk analysis Single click app sanctioning Managed /Un-Managed Devices

Secure BYOD Unmanaged Device Protection Demand for byod continues to rise Mobile security cannot be overlooked IT must enable secure access to cloud apps from any device BYOD poses a threat to data security due to a lack of visibility and control after download

Unmanaged Devices Protect Corporate Data on Any Device Selective wipe Device level PIN, encryption Control flow of data to device via DLP and remediation actions Data Protection Zero-Day Core TM Threat Protection Agentless Deployment Avoid user privacy concerns Eliminate deployment complexity Device agnostic Identity Visibility

Our Solution IaaS SaaS Private Cloud/Premises Unsanctioned Apps Any App APIs + Proxies Data Protection Threat Protection Zero-Day Core TM Identity Visibility Managed Devices Agentless Proxies Any Device Unmanaged Devices

Trusted in Every Industry Financial Services, Healthcare, Manufacturing, Distribution and Many More

Summary Zero-day security, any app or workload Agentless deployment, any device Real-time data protection, anywhere

THANK YOU Patrick Koh Bitglass pkoh@bitglass.com www.cloudsec.com