SlideShare une entreprise Scribd logo
1  sur  20
webinar
june 29
2016
developing a
secure and
compliant cloud
strategy for
financial
services
STORYBOAR
the traditional
approach to
security is
inadequate
STORYBOAR
security must
evolve to protect
data in the cloud
ungoverned
access to
corporate data in
the cloud
data-at-rest
in the cloud
sensitive cloud
data on
unmanaged
devices
STORYBOAR
enterprise
(CASB)
end-user devices
visibility & analytics
data protection
identity & access control
application
storage
servers
network
native security features can’t be relied upon:
the data blind spot
app vendor
STORYBOAR
CASB: a
better
approach to
cloud security
identity
cloud encryption
data-centric
protection
audit + visibility
STORYBOAR
protecting cloud data end-to-end
■ Cloud data doesn’t exist only “in the cloud”
■ A complete solution must provide visibility
and control over data in the cloud
■ Solution must also protect data on end-
user devices
■ Leverage contextual access controls
STORYBOAR
access controls
the new data reality requires a new security architecture
■ Secure access from any unmanaged
device
■ Protect data in “unwrappable” native
mobile apps
■ Full data control and visibility for IT
■ Granular DLP applied to data at download
time
STORYBOAR
data leakage prevention
a complete set of data controls
■ Apply granular DLP to sensitive data with
spectrum of actions from watermarking to outright
blocking
■ Context-aware engine can distinguish between
users, managed and unmanaged devices, and
more
■ Easily modify sharing permissions and quarantine
STORYBOAR
audit and visibility
■ Detailed logging for compliance and
audit.
■ Identify sensitive data at rest and
external sharing
■ Easily modify permissions and
quarantine files
STORYBOAR
identity
■ Cloud app identity management should
maintain the best practices of on-prem
identity
■ Cross-app visibility into suspicious access
activity with actions like step-up multifactor
authentication
STORYBOAR
cloud encryption
encrypt data-at-rest while retaining app functionality
■ Necessary for data that is subject to
regulatory mandates (e.g. PII, PCI)
○ Only encrypt what’s necessary
■ Structured data
■ Sensitive fields (SSNs, addresses,
etc.)
STORYBOAR
cloud encryption
where some solutions fall short
■ Competitors limit the number of
Initialization Vectors to support search
■ Ex: search Salesforce for every ciphertext
value of “Bob”
○ As number of IVs increases, search
time increases exponentially
STORYBOAR
cloud encryption
encrypt data-at-rest while retaining app functionality
■ Encryption must be at full strength, using
industry standard encryption
■ Customer managed keys provide an
additional layer of security
■ Solution should be easy to deploy and cost-
effective
STORYBOAR
managed
devices
application access access control data protection
unmanaged
devices / byod
in the cloud
Forward Proxy
ActiveSync Proxy
Device Profile: Pass
● Email
● Browser
● OneDrive Sync
● Full Access
Reverse Proxy + AJAX VM
ActiveSync Proxy
● DLP/DRM/encryption
● Device controls
API Control External Sharing Blocked
● Block external shares
● Alert on DLP events
Device Profile: Fail
● Mobile Email
● Browser
● Contextual multi-factor auth
typical use case:
real-time data protection on any device
STORYBOAR
our
mission
total
data
protection est. jan
2013
100+
customer
s
tier 1
VCs
STORYBOAR
harbor: secure data in the cloud
searchable encryption
public cloud app with private cloud data
■ searchable, sortable true AES-256 + 256-bit IV
■ crypto-independent implementation
■ US Patent 9,047,480
■ endorsed by leading cryptographers
competition
■ maximum 20-bit IVs to support search
■ search performance drops with IV length
STORYBOAR
secure
salesforce +
office 365
financial
services
giant
17
challenge
■ Needed complete CASB for enterprise-wide
migration to SaaS
■ Encryption of data-at-rest in Salesforce
■ Security for Office 365
solution
■ Searchable true encryption of data in Salesforce
■ Preserve SOQL API integrations
■ Full control of encryption keys
■ Real-time inline DLP on any device (Citadel)
■ Contextual access control on managed &
unmanaged devices (Omni)
■ API control in the cloud
■ Discover breach & Shadow IT
STORYBOAR
client:
■ 15,000 employees in 190+ locations
globally
challenge:
■ Mitigate risks of Google Apps adoption
■ Prevent sensitive data from being stored
in the cloud
■ Limit data access based on device risk
level
■ Govern external sharing
solution:
■ Inline data protection for unmanaged
devices/BYOD
■ Bidirectional DLP
■ Real-time sharing control
secure
google
apps +
byod
business
data giant
resources:
more info about cloud security
■ whitepaper: the definitive guide to casbs
■ infographic: cloud adoption in financial services
■ case study: financial services firm secures salesforce and
o365
STORYBOAR
bitglass.com
@bitglass

Contenu connexe

Tendances

Tendances (20)

ISC(2) Security Briefing Part 2 - CASBs: Real-world use cases
ISC(2) Security Briefing Part 2 - CASBs: Real-world use casesISC(2) Security Briefing Part 2 - CASBs: Real-world use cases
ISC(2) Security Briefing Part 2 - CASBs: Real-world use cases
 
CASB Cases: How Your Peers are Securing the Cloud
CASB Cases: How Your Peers are Securing the CloudCASB Cases: How Your Peers are Securing the Cloud
CASB Cases: How Your Peers are Securing the Cloud
 
Webinar bitglass - complete deck-2
Webinar   bitglass - complete deck-2Webinar   bitglass - complete deck-2
Webinar bitglass - complete deck-2
 
The Future of CASBs - A Cloud Security Force Awakens
The Future of CASBs - A Cloud Security Force AwakensThe Future of CASBs - A Cloud Security Force Awakens
The Future of CASBs - A Cloud Security Force Awakens
 
Office 365 Security: How to Safeguard Your Data
Office 365 Security: How to Safeguard Your DataOffice 365 Security: How to Safeguard Your Data
Office 365 Security: How to Safeguard Your Data
 
Beyond the Firewall: Securing the cloud with a CASB (in partnership with CSA)
Beyond the Firewall: Securing the cloud with a CASB (in partnership with CSA)Beyond the Firewall: Securing the cloud with a CASB (in partnership with CSA)
Beyond the Firewall: Securing the cloud with a CASB (in partnership with CSA)
 
CASBs and Office 365: The Security Menace
CASBs and Office 365: The Security MenaceCASBs and Office 365: The Security Menace
CASBs and Office 365: The Security Menace
 
O365 security and privacy de_novo_event_july2014
O365 security and privacy de_novo_event_july2014O365 security and privacy de_novo_event_july2014
O365 security and privacy de_novo_event_july2014
 
CASBs: 8 Critical Capabilities in partnership with ISMG Media Group
CASBs: 8 Critical Capabilities in partnership with ISMG Media GroupCASBs: 8 Critical Capabilities in partnership with ISMG Media Group
CASBs: 8 Critical Capabilities in partnership with ISMG Media Group
 
Discover - Securing Your Hybrid Cloud
Discover - Securing Your Hybrid CloudDiscover - Securing Your Hybrid Cloud
Discover - Securing Your Hybrid Cloud
 
Cloud Access Security Broker (CASB)
Cloud Access Security Broker (CASB) Cloud Access Security Broker (CASB)
Cloud Access Security Broker (CASB)
 
Closing the Cloud Security Gap with a CASB (in partnership with Forrester)
Closing the Cloud Security Gap with a CASB (in partnership with Forrester)Closing the Cloud Security Gap with a CASB (in partnership with Forrester)
Closing the Cloud Security Gap with a CASB (in partnership with Forrester)
 
Discover - Securing Your Hybrid Cloud
Discover - Securing Your Hybrid CloudDiscover - Securing Your Hybrid Cloud
Discover - Securing Your Hybrid Cloud
 
Webinar: are casbs ready for primetime?
Webinar: are casbs ready for primetime?Webinar: are casbs ready for primetime?
Webinar: are casbs ready for primetime?
 
Webinar - Bitglass and CyberEdge - Hidden Security Threats
Webinar - Bitglass and CyberEdge - Hidden Security ThreatsWebinar - Bitglass and CyberEdge - Hidden Security Threats
Webinar - Bitglass and CyberEdge - Hidden Security Threats
 
CE Cybersecurity Trends and Strategies for Hosting in the Cloud
CE Cybersecurity Trends and Strategies for Hosting in the CloudCE Cybersecurity Trends and Strategies for Hosting in the Cloud
CE Cybersecurity Trends and Strategies for Hosting in the Cloud
 
Bitglass Webinar - Top 6 CASB Use Cases
Bitglass Webinar - Top 6 CASB Use CasesBitglass Webinar - Top 6 CASB Use Cases
Bitglass Webinar - Top 6 CASB Use Cases
 
The Four Horsemen of the O365 Apocalypse
The Four Horsemen of the O365 ApocalypseThe Four Horsemen of the O365 Apocalypse
The Four Horsemen of the O365 Apocalypse
 
Security and Accountability in the Cloud (in partnership with SANS)
Security and Accountability in the Cloud (in partnership with SANS)Security and Accountability in the Cloud (in partnership with SANS)
Security and Accountability in the Cloud (in partnership with SANS)
 
CASBs and Office 365 (with Argyle)
CASBs and Office 365 (with Argyle)CASBs and Office 365 (with Argyle)
CASBs and Office 365 (with Argyle)
 

En vedette

pinak new2...... -
pinak new2...... -pinak new2...... -
pinak new2...... -
Pinak Vyas
 
Robert Hill Inception to Completion
Robert Hill Inception to CompletionRobert Hill Inception to Completion
Robert Hill Inception to Completion
Robert Hill
 
대신리포트_모닝미팅_130927
대신리포트_모닝미팅_130927대신리포트_모닝미팅_130927
대신리포트_모닝미팅_130927
DaishinSecurities
 
Influence of diluted seawater irrigation on the Physiological and biochemical...
Influence of diluted seawater irrigation on the Physiological and biochemical...Influence of diluted seawater irrigation on the Physiological and biochemical...
Influence of diluted seawater irrigation on the Physiological and biochemical...
Premier Publishers
 
Iconografia_apostolica
Iconografia_apostolicaIconografia_apostolica
Iconografia_apostolica
educarconjesus
 

En vedette (18)

pinak new2...... -
pinak new2...... -pinak new2...... -
pinak new2...... -
 
Basında Bugün Göztepe
Basında Bugün GöztepeBasında Bugün Göztepe
Basında Bugün Göztepe
 
Reactiva
ReactivaReactiva
Reactiva
 
Presentación (1)
Presentación (1)Presentación (1)
Presentación (1)
 
Robert Hill Inception to Completion
Robert Hill Inception to CompletionRobert Hill Inception to Completion
Robert Hill Inception to Completion
 
Transformadores
TransformadoresTransformadores
Transformadores
 
대신리포트_모닝미팅_130927
대신리포트_모닝미팅_130927대신리포트_모닝미팅_130927
대신리포트_모닝미팅_130927
 
Qué tipo de recursos digitales existen para las nee
Qué tipo de recursos digitales existen para las neeQué tipo de recursos digitales existen para las nee
Qué tipo de recursos digitales existen para las nee
 
tahapan berfikir dan astetik pp 58 dalam kurikulum AUD
tahapan berfikir dan astetik pp 58 dalam kurikulum AUDtahapan berfikir dan astetik pp 58 dalam kurikulum AUD
tahapan berfikir dan astetik pp 58 dalam kurikulum AUD
 
20111115 terapia ocupacional_cosam_quintanormal
20111115 terapia ocupacional_cosam_quintanormal20111115 terapia ocupacional_cosam_quintanormal
20111115 terapia ocupacional_cosam_quintanormal
 
Introduction to Leadership
Introduction to Leadership Introduction to Leadership
Introduction to Leadership
 
Influence of diluted seawater irrigation on the Physiological and biochemical...
Influence of diluted seawater irrigation on the Physiological and biochemical...Influence of diluted seawater irrigation on the Physiological and biochemical...
Influence of diluted seawater irrigation on the Physiological and biochemical...
 
Computer Monitors
Computer MonitorsComputer Monitors
Computer Monitors
 
Diabetes in bangla case study dr md toufiqur rahman nicvd cardiologist
Diabetes in bangla  case study dr md toufiqur rahman nicvd cardiologistDiabetes in bangla  case study dr md toufiqur rahman nicvd cardiologist
Diabetes in bangla case study dr md toufiqur rahman nicvd cardiologist
 
Echo evaluation for DM/D.Card / post graduate fellows/ FCPS examinee
Echo evaluation for DM/D.Card / post graduate fellows/ FCPS examineeEcho evaluation for DM/D.Card / post graduate fellows/ FCPS examinee
Echo evaluation for DM/D.Card / post graduate fellows/ FCPS examinee
 
รวมแนวข้อสอบครูผู้ช่วยฉบับปรับปรุง
รวมแนวข้อสอบครูผู้ช่วยฉบับปรับปรุงรวมแนวข้อสอบครูผู้ช่วยฉบับปรับปรุง
รวมแนวข้อสอบครูผู้ช่วยฉบับปรับปรุง
 
หนังสือสอบ เพื่อนครู2559 ติวอินดี้ ง่ายโคตร
หนังสือสอบ เพื่อนครู2559 ติวอินดี้ ง่ายโคตรหนังสือสอบ เพื่อนครู2559 ติวอินดี้ ง่ายโคตร
หนังสือสอบ เพื่อนครู2559 ติวอินดี้ ง่ายโคตร
 
Iconografia_apostolica
Iconografia_apostolicaIconografia_apostolica
Iconografia_apostolica
 

Similaire à Developing a Secure and Compliant Cloud Strategy for Financial Services

Barracuda WAF: Scalable Security for Applications on AWS
Barracuda WAF: Scalable Security for Applications on AWSBarracuda WAF: Scalable Security for Applications on AWS
Barracuda WAF: Scalable Security for Applications on AWS
Amazon Web Services
 

Similaire à Developing a Secure and Compliant Cloud Strategy for Financial Services (20)

8 questions to ask when evaluating a Cloud Access Security Broker
8 questions to ask when evaluating a Cloud Access Security Broker8 questions to ask when evaluating a Cloud Access Security Broker
8 questions to ask when evaluating a Cloud Access Security Broker
 
The Security Gap: Protecting Healthcare Data in Office 365
The Security Gap: Protecting Healthcare Data in Office 365The Security Gap: Protecting Healthcare Data in Office 365
The Security Gap: Protecting Healthcare Data in Office 365
 
ISC(2) Security Briefing Part 3 - Enabling Secure BYOD with CASBs
ISC(2) Security Briefing Part 3 - Enabling Secure BYOD with CASBsISC(2) Security Briefing Part 3 - Enabling Secure BYOD with CASBs
ISC(2) Security Briefing Part 3 - Enabling Secure BYOD with CASBs
 
Securing IaaS Applications
Securing IaaS ApplicationsSecuring IaaS Applications
Securing IaaS Applications
 
Mitigating the Top 5 Cloud Security Threats
Mitigating the Top 5 Cloud Security ThreatsMitigating the Top 5 Cloud Security Threats
Mitigating the Top 5 Cloud Security Threats
 
Top 5 Cloud Security Threats in Healthcare
Top 5 Cloud Security Threats in HealthcareTop 5 Cloud Security Threats in Healthcare
Top 5 Cloud Security Threats in Healthcare
 
Data-Centric Protection: The Future of BYOD Security
Data-Centric Protection: The Future of BYOD SecurityData-Centric Protection: The Future of BYOD Security
Data-Centric Protection: The Future of BYOD Security
 
Empowering the Cloud Through G Suite
Empowering the Cloud Through G SuiteEmpowering the Cloud Through G Suite
Empowering the Cloud Through G Suite
 
Zero Trust Enterprise Network at Adobe
Zero Trust Enterprise Network at AdobeZero Trust Enterprise Network at Adobe
Zero Trust Enterprise Network at Adobe
 
Bitglass Webinar - 5 Cloud Security Best Practices for 2018
Bitglass Webinar - 5 Cloud Security Best Practices for 2018Bitglass Webinar - 5 Cloud Security Best Practices for 2018
Bitglass Webinar - 5 Cloud Security Best Practices for 2018
 
How Splunk and AWS Enabled End-to-End Visibility for PagerDuty and Bolstered ...
How Splunk and AWS Enabled End-to-End Visibility for PagerDuty and Bolstered ...How Splunk and AWS Enabled End-to-End Visibility for PagerDuty and Bolstered ...
How Splunk and AWS Enabled End-to-End Visibility for PagerDuty and Bolstered ...
 
Barracuda WAF: Scalable Security for Applications on AWS
Barracuda WAF: Scalable Security for Applications on AWSBarracuda WAF: Scalable Security for Applications on AWS
Barracuda WAF: Scalable Security for Applications on AWS
 
Embracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and CentrifyEmbracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and Centrify
 
5 Highest-Impact CASB Use Cases
5 Highest-Impact CASB Use Cases5 Highest-Impact CASB Use Cases
5 Highest-Impact CASB Use Cases
 
Zero trust for everybody: 3 ways to get there fast
Zero trust for everybody: 3 ways to get there fastZero trust for everybody: 3 ways to get there fast
Zero trust for everybody: 3 ways to get there fast
 
Cloud Security for Regulated Firms - Securing my cloud and proving it
Cloud Security for Regulated Firms - Securing my cloud and proving itCloud Security for Regulated Firms - Securing my cloud and proving it
Cloud Security for Regulated Firms - Securing my cloud and proving it
 
CipherCloud for Any App
CipherCloud for Any AppCipherCloud for Any App
CipherCloud for Any App
 
BT Cloud Enterprise Service Store - Rob Rowlingson
BT Cloud Enterprise Service Store - Rob RowlingsonBT Cloud Enterprise Service Store - Rob Rowlingson
BT Cloud Enterprise Service Store - Rob Rowlingson
 
Adopting A Zero-Trust Model. Google Did It, Can You?
Adopting A Zero-Trust Model. Google Did It, Can You?Adopting A Zero-Trust Model. Google Did It, Can You?
Adopting A Zero-Trust Model. Google Did It, Can You?
 
Xylos Clients Day - Public cloud and security go hand in hand, if you approac...
Xylos Clients Day - Public cloud and security go hand in hand, if you approac...Xylos Clients Day - Public cloud and security go hand in hand, if you approac...
Xylos Clients Day - Public cloud and security go hand in hand, if you approac...
 

Plus de Bitglass

Plus de Bitglass (7)

Bitglass Webinar - BlueCross BlueShield of Tennessee's CASB Journey to Secure...
Bitglass Webinar - BlueCross BlueShield of Tennessee's CASB Journey to Secure...Bitglass Webinar - BlueCross BlueShield of Tennessee's CASB Journey to Secure...
Bitglass Webinar - BlueCross BlueShield of Tennessee's CASB Journey to Secure...
 
Bitglass Webinar - A Primer on CASBs and Cloud Security
Bitglass Webinar - A Primer on CASBs and Cloud SecurityBitglass Webinar - A Primer on CASBs and Cloud Security
Bitglass Webinar - A Primer on CASBs and Cloud Security
 
Webinar - Mobile Security Trends
Webinar - Mobile Security TrendsWebinar - Mobile Security Trends
Webinar - Mobile Security Trends
 
Security O365 Using AI-based Advanced Threat Protection
Security O365 Using AI-based Advanced Threat ProtectionSecurity O365 Using AI-based Advanced Threat Protection
Security O365 Using AI-based Advanced Threat Protection
 
6 essentials for secure BYOD in healthcare
6 essentials for secure BYOD in healthcare6 essentials for secure BYOD in healthcare
6 essentials for secure BYOD in healthcare
 
Webinar Express: Securing BYOD without MDM
Webinar Express: Securing BYOD without MDMWebinar Express: Securing BYOD without MDM
Webinar Express: Securing BYOD without MDM
 
CSA Research: Mitigating Cloud Threats
CSA Research: Mitigating Cloud ThreatsCSA Research: Mitigating Cloud Threats
CSA Research: Mitigating Cloud Threats
 

Dernier

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Dernier (20)

🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 

Developing a Secure and Compliant Cloud Strategy for Financial Services

  • 1. webinar june 29 2016 developing a secure and compliant cloud strategy for financial services
  • 3. STORYBOAR security must evolve to protect data in the cloud ungoverned access to corporate data in the cloud data-at-rest in the cloud sensitive cloud data on unmanaged devices
  • 4. STORYBOAR enterprise (CASB) end-user devices visibility & analytics data protection identity & access control application storage servers network native security features can’t be relied upon: the data blind spot app vendor
  • 5. STORYBOAR CASB: a better approach to cloud security identity cloud encryption data-centric protection audit + visibility
  • 6. STORYBOAR protecting cloud data end-to-end ■ Cloud data doesn’t exist only “in the cloud” ■ A complete solution must provide visibility and control over data in the cloud ■ Solution must also protect data on end- user devices ■ Leverage contextual access controls
  • 7. STORYBOAR access controls the new data reality requires a new security architecture ■ Secure access from any unmanaged device ■ Protect data in “unwrappable” native mobile apps ■ Full data control and visibility for IT ■ Granular DLP applied to data at download time
  • 8. STORYBOAR data leakage prevention a complete set of data controls ■ Apply granular DLP to sensitive data with spectrum of actions from watermarking to outright blocking ■ Context-aware engine can distinguish between users, managed and unmanaged devices, and more ■ Easily modify sharing permissions and quarantine
  • 9. STORYBOAR audit and visibility ■ Detailed logging for compliance and audit. ■ Identify sensitive data at rest and external sharing ■ Easily modify permissions and quarantine files
  • 10. STORYBOAR identity ■ Cloud app identity management should maintain the best practices of on-prem identity ■ Cross-app visibility into suspicious access activity with actions like step-up multifactor authentication
  • 11. STORYBOAR cloud encryption encrypt data-at-rest while retaining app functionality ■ Necessary for data that is subject to regulatory mandates (e.g. PII, PCI) ○ Only encrypt what’s necessary ■ Structured data ■ Sensitive fields (SSNs, addresses, etc.)
  • 12. STORYBOAR cloud encryption where some solutions fall short ■ Competitors limit the number of Initialization Vectors to support search ■ Ex: search Salesforce for every ciphertext value of “Bob” ○ As number of IVs increases, search time increases exponentially
  • 13. STORYBOAR cloud encryption encrypt data-at-rest while retaining app functionality ■ Encryption must be at full strength, using industry standard encryption ■ Customer managed keys provide an additional layer of security ■ Solution should be easy to deploy and cost- effective
  • 14. STORYBOAR managed devices application access access control data protection unmanaged devices / byod in the cloud Forward Proxy ActiveSync Proxy Device Profile: Pass ● Email ● Browser ● OneDrive Sync ● Full Access Reverse Proxy + AJAX VM ActiveSync Proxy ● DLP/DRM/encryption ● Device controls API Control External Sharing Blocked ● Block external shares ● Alert on DLP events Device Profile: Fail ● Mobile Email ● Browser ● Contextual multi-factor auth typical use case: real-time data protection on any device
  • 16. STORYBOAR harbor: secure data in the cloud searchable encryption public cloud app with private cloud data ■ searchable, sortable true AES-256 + 256-bit IV ■ crypto-independent implementation ■ US Patent 9,047,480 ■ endorsed by leading cryptographers competition ■ maximum 20-bit IVs to support search ■ search performance drops with IV length
  • 17. STORYBOAR secure salesforce + office 365 financial services giant 17 challenge ■ Needed complete CASB for enterprise-wide migration to SaaS ■ Encryption of data-at-rest in Salesforce ■ Security for Office 365 solution ■ Searchable true encryption of data in Salesforce ■ Preserve SOQL API integrations ■ Full control of encryption keys ■ Real-time inline DLP on any device (Citadel) ■ Contextual access control on managed & unmanaged devices (Omni) ■ API control in the cloud ■ Discover breach & Shadow IT
  • 18. STORYBOAR client: ■ 15,000 employees in 190+ locations globally challenge: ■ Mitigate risks of Google Apps adoption ■ Prevent sensitive data from being stored in the cloud ■ Limit data access based on device risk level ■ Govern external sharing solution: ■ Inline data protection for unmanaged devices/BYOD ■ Bidirectional DLP ■ Real-time sharing control secure google apps + byod business data giant
  • 19. resources: more info about cloud security ■ whitepaper: the definitive guide to casbs ■ infographic: cloud adoption in financial services ■ case study: financial services firm secures salesforce and o365

Notes de l'éditeur

  1. The old approach to the problem is to secure the infrastructure. Historically this has been where the spend for large organizations has been. Secure your network, put agents on every trusted device to manage the device etc. Fact is that the "trusted device" approach makes you more vulnerable to breaches since users take their devices home for the weekend, and come back infected on monday. Malware Mondays! Issues with this approach - cumbersome. expensive to administer since you have to manage every device and network. And usability is poor too, especially when it comes to mdm One of the big problems with this architecture -- unmanaged devices accessing the cloud directly. No visibility or control for IT teams. Complex to deploy/ Poor user experience/ Data-sync proliferation/ BYOD blindspot
  2. we think CASBs provide a better approach to cloud security. It starts with discovery.
  3. in: CA, NY, MA, IL, N
  4. Competition: Skyhigh, Netskope, Cloudlock, Elastica/Bluecoat