2. Agenda
โข Key Findings: Cloud Security Report, Spring 2014
- Alert Logic Customer Data
- Honeypot Research
โข Common Azure Security & Compliance Issues
โข Alert Logic for Azure
- Log Manager
- Threat Manager
- Web Security Manager
3. Cloud Adoption is Gaining Momentum
โข Major Public cloud vendors predicted to eclipse $10B in revenue by
2015
โข Oracle Cloud bookings increased by 35% in 2013
โข Gartner predicts 60% of banking institutions to migrate to the cloud
โข Healthcare is expected to adopt cloud computing at a 21% year over
year rate through 2017
โข VDI (Desktop as a Service) market reached $13.4 billion in 2013
4. Over 2,800 Organizations Worldwide Trust Alert Logic
Millions
of devices secured
3.7 Petabytes
of log data under
management
8.5 Million
security events
correlated per day
40,000
incidents identified
and reviewed
per month
5. Threats in the Cloud are Increasing With Adoption
โข Increase in attack frequency
โข Traditional on-premises threats are now moving to the
cloud
โข Majority of cloud incidents were related to web
application attacks, brute force attacks, and
vulnerability scans
โข Brute force attacks and vulnerability scans are now
occurring at near-equivalent rates
in both cloud and on-premises
environments
โข Malware/Botnet is increasing year
over year
6. Global Honeypot Network
Why Honeypots?
โขHoneypots give us a unique data set
โขSimulates vulnerable systems without
the risk of real data loss
โขGives the ability to collect intelligence
from malicious attackers
โขAllows for collection of various
different attacks based on
system
โขHelps identify what industry
specific targets are out there
18. Security and Compliance is Challenging
Skilled security resources
are in high demand and
hard to find
Moving to cloud and hybrid
IT environments brings
different threats and
complexities
Maintaining continuous
security and compliance
is expensive
19. Applications
Systems
Networks
Building a Security and Compliance Solution
IDS
Vulnerability Scanning
Web Application
Firewall
Log Management
Threat
Intelligence
Feeds
SIEM
Staff capable of:
โขProvisioning
โขMonitoring
โขConfiguration and tuning
โขResearching incidents,
emerging threats, and
defining remediation
steps
Big Data
Analytics
Products
Automated Correlation
and Analytics
People &
Process
20. Alert Logic Solutions
Alert Logic
Threat Managerโข
Alert Logic
Web Security Managerโข
Alert Logic
Log Managerโข
Alert Logic Unified Web User Interface
Intrusion Detection &
Vulnerability Scanning
Log Management &
Compliance Reporting
Active Protection for
Web Applications
Highest volume of attacks occurred in Europe
Attacks against Microsoft DS accounted for over 51% of the overall attack vectors
Database services have been a consistent target
Underscores the importance of a defense in depth strategy for the need to secure your cloud infrastructure