SlideShare une entreprise Scribd logo
1  sur  22
7 SECURITY REQUIREMENTS TO
ACCELERATE CLOUD ADOPTION
TODAY’S SPEAKERS
Anthony Guida
Principal Security Architect
ProtectWise
Kelly Brazil
Vice President of Systems Engineering
ProtectWise
AGENDA
• Why legacy approaches fail
• What are the key requirements for an effective solution
• How The ProtectWise Grid can help
MIGRATING TO THE CLOUD?
HOW LEGACY PRODUCTS FAIL.
5 REASONS WHY LEGACY APPROACHES FAIL
1.Requires complete re-architecture
2.Reduced performance and uptime, increased latency
3.Not maintainable with standard cloud approaches
4.Encourages appliance sprawl
5.Expensive to run
A MODERN APPROACH IS NEEDED
Security-as-a-Utility
• Provides visibility and forensics for Cloud workloads
• Covers both Cloud and hybrid environments
• Works at scale
REQUIREMENTS FOR AN EFFECTIVE SOLUTION
REQUIREMENT #1: NETWORK REDESIGN NOT REQUIRED
•Out-of-band packet capture
•Software sensors that are
hypervisor agnostic
•Forwarding agents when no
network taps are possible
REQUIREMENT #2: DEVOPS FRIENDLY
•Sensors must be lightweight and
run on modern Linux
•Minimal infrastructure, even for
largest environments
•Must be able to automate
deployment of forwarding agents
REQUIREMENT #3: HIGHLY SCALABLE
•Analysis in the Cloud, not locally
•Run sensors on modest instances
•Multiple VPC deployment options
•Policy-based traffic filtering
REQUIREMENT #4: BUILT-IN HIGH AVAILABILITY
REQUIREMENT #5: REDUCE APPLIANCE SPRAWL
•One Cloud platform for
visibility, detection, forensics
•All analysis in the Cloud
•Sensor upgrades not
required for new functionality
in the platform
•Same sensor software for
cloud or on-premises
hardware
REQUIREMENT #6: COST REDUCTION
Legacy Solutions Security-as-a-Utility
Avoid the
“appliance tax”
REQUIREMENT #7: UNIFIED HAYSTACK
HOW CAN THE PROTECTWISE GRID HELP?
THE PROTECTWISE GRID
1
6
CLOUD
INGEST
VISUALIZER
EGRESS
CORE
REMOTE
INDUSTRIAL
NETWORK SENSORS
Flexible deployment
OPTIMIZED NETWORK
REPLAY
Compression &
Optimization up to 80%
ENTERPRISE SECURITY
PLATFORM
Secure, long-term full packet
retention (months or years)
TIME MACHINE
SECURE VAULT
A TIME MACHINE FOR THREAT DETECTION
Network Traffic
Machine Learning
Behavior Analysis
3rd Party Threat Intel
Heuristics
24 hours
1 month
6 month
1 year
RETROSPECTIVE
ANALYTICS
+6 months
+1 month
+24 hours
PREDICTIVE
ANALYSIS
REAL TIME ANALYTICS
C1 C2 C3
COLLECTIVE CORRELATION
Signatures
BYOI
DEMO
RECAP: THE 7 REQUIREMENTS
Network redesign should not be required1
Helps to avoid the “appliance tax”6
Should be highly scalable3
Uses native high-availability4
Must be DevOps friendly2
Unified haystack for cloud & hybrid environments7
Reduces appliance sprawl5
QUESTIONS
NEXT STEPS
•We’ll send you a copy of our white paper
“Deploying ProtectWise in the Cloud”
•Questions? Email info@protectwise.com
THANK YOU

Contenu connexe

Tendances

5 things you didn't know you could do with security policy management
5 things you didn't know you could do with security policy management5 things you didn't know you could do with security policy management
5 things you didn't know you could do with security policy management
AlgoSec
 
AlgoSec Application Migration Webinar
AlgoSec Application Migration WebinarAlgoSec Application Migration Webinar
AlgoSec Application Migration Webinar
Maytal Levi
 
Cisco aci and AlgoSec webinar
Cisco aci and AlgoSec webinar Cisco aci and AlgoSec webinar
Cisco aci and AlgoSec webinar
Maytal Levi
 
Managing Effective Security Policies Across Hybrid and Multi-Cloud Environment
Managing Effective Security Policies Across Hybrid and Multi-Cloud EnvironmentManaging Effective Security Policies Across Hybrid and Multi-Cloud Environment
Managing Effective Security Policies Across Hybrid and Multi-Cloud Environment
AlgoSec
 

Tendances (20)

Migrating and Managing Security in an AWS Environment- Best Practices
Migrating and Managing Security in an AWS Environment- Best PracticesMigrating and Managing Security in an AWS Environment- Best Practices
Migrating and Managing Security in an AWS Environment- Best Practices
 
How Aporeto Secures Cloud-native Across Public, Private, & Hybrid Clouds with...
How Aporeto Secures Cloud-native Across Public, Private, & Hybrid Clouds with...How Aporeto Secures Cloud-native Across Public, Private, & Hybrid Clouds with...
How Aporeto Secures Cloud-native Across Public, Private, & Hybrid Clouds with...
 
5 things you didn't know you could do with security policy management
5 things you didn't know you could do with security policy management5 things you didn't know you could do with security policy management
5 things you didn't know you could do with security policy management
 
Create and Manage a Micro-Segmented Data Center – Best Practices
Create and Manage a Micro-Segmented Data Center – Best PracticesCreate and Manage a Micro-Segmented Data Center – Best Practices
Create and Manage a Micro-Segmented Data Center – Best Practices
 
Application visibility across the security estate the value and the vision ...
Application visibility across the security estate   the value and the vision ...Application visibility across the security estate   the value and the vision ...
Application visibility across the security estate the value and the vision ...
 
DNSFilter Webinar: Decentralized Security
DNSFilter Webinar: Decentralized SecurityDNSFilter Webinar: Decentralized Security
DNSFilter Webinar: Decentralized Security
 
Avoid outages-from-misconfigured-devices-webinar-slides
Avoid outages-from-misconfigured-devices-webinar-slidesAvoid outages-from-misconfigured-devices-webinar-slides
Avoid outages-from-misconfigured-devices-webinar-slides
 
Accelerate Application Deployment Across Cisco ACI Fabric, On-Premise Firewal...
Accelerate Application Deployment Across Cisco ACI Fabric, On-Premise Firewal...Accelerate Application Deployment Across Cisco ACI Fabric, On-Premise Firewal...
Accelerate Application Deployment Across Cisco ACI Fabric, On-Premise Firewal...
 
Ransomware Attack: Best Practices to proactively prevent contain and respond
Ransomware Attack: Best Practices to proactively prevent contain and respondRansomware Attack: Best Practices to proactively prevent contain and respond
Ransomware Attack: Best Practices to proactively prevent contain and respond
 
Introducing Savvius Vigil
Introducing Savvius VigilIntroducing Savvius Vigil
Introducing Savvius Vigil
 
Reaching PCI Nirvana: Ensure a Successful Audit & Maintain Continuous Compliance
Reaching PCI Nirvana: Ensure a Successful Audit & Maintain Continuous ComplianceReaching PCI Nirvana: Ensure a Successful Audit & Maintain Continuous Compliance
Reaching PCI Nirvana: Ensure a Successful Audit & Maintain Continuous Compliance
 
AlgoSec Application Migration Webinar
AlgoSec Application Migration WebinarAlgoSec Application Migration Webinar
AlgoSec Application Migration Webinar
 
Cisco Firepower Migration | Cisco and AlgoSec Joint Webinar
Cisco Firepower Migration | Cisco and AlgoSec Joint WebinarCisco Firepower Migration | Cisco and AlgoSec Joint Webinar
Cisco Firepower Migration | Cisco and AlgoSec Joint Webinar
 
Managing Application Connectivity in the World of Network Security
Managing Application Connectivity in the World of Network SecurityManaging Application Connectivity in the World of Network Security
Managing Application Connectivity in the World of Network Security
 
2019 02-20 micro-segmentation based network security strategies (yoni geva)
2019 02-20 micro-segmentation based network security strategies (yoni geva)2019 02-20 micro-segmentation based network security strategies (yoni geva)
2019 02-20 micro-segmentation based network security strategies (yoni geva)
 
Cisco aci and AlgoSec webinar
Cisco aci and AlgoSec webinar Cisco aci and AlgoSec webinar
Cisco aci and AlgoSec webinar
 
Security Change Management: Agility vs. Control
Security Change Management: Agility vs. ControlSecurity Change Management: Agility vs. Control
Security Change Management: Agility vs. Control
 
compliance made easy. pass your audits stress-free webinar
compliance made easy. pass your audits stress-free webinarcompliance made easy. pass your audits stress-free webinar
compliance made easy. pass your audits stress-free webinar
 
What's Wrong with Vulnerability Management & How Can We Fix It
What's Wrong with Vulnerability Management & How Can We Fix ItWhat's Wrong with Vulnerability Management & How Can We Fix It
What's Wrong with Vulnerability Management & How Can We Fix It
 
Managing Effective Security Policies Across Hybrid and Multi-Cloud Environment
Managing Effective Security Policies Across Hybrid and Multi-Cloud EnvironmentManaging Effective Security Policies Across Hybrid and Multi-Cloud Environment
Managing Effective Security Policies Across Hybrid and Multi-Cloud Environment
 

Similaire à 7 Security Requirements to Accelerate Cloud Adoption

Security and Compliance for Enterprise Cloud Infrastructure
Security and Compliance for Enterprise Cloud InfrastructureSecurity and Compliance for Enterprise Cloud Infrastructure
Security and Compliance for Enterprise Cloud Infrastructure
CloudPassage
 

Similaire à 7 Security Requirements to Accelerate Cloud Adoption (20)

2019 10-app gate sdp 101 09a
2019 10-app gate sdp 101 09a2019 10-app gate sdp 101 09a
2019 10-app gate sdp 101 09a
 
Security and Compliance for Enterprise Cloud Infrastructure
Security and Compliance for Enterprise Cloud InfrastructureSecurity and Compliance for Enterprise Cloud Infrastructure
Security and Compliance for Enterprise Cloud Infrastructure
 
Modernizing Applications by Replacing F5 with the NGINX Application Delivery ...
Modernizing Applications by Replacing F5 with the NGINX Application Delivery ...Modernizing Applications by Replacing F5 with the NGINX Application Delivery ...
Modernizing Applications by Replacing F5 with the NGINX Application Delivery ...
 
Supercharge Continuous Delivery for Kubernetes with Spinnaker
Supercharge Continuous Delivery for Kubernetes with SpinnakerSupercharge Continuous Delivery for Kubernetes with Spinnaker
Supercharge Continuous Delivery for Kubernetes with Spinnaker
 
CipherGraph Cloud VPN
CipherGraph Cloud VPNCipherGraph Cloud VPN
CipherGraph Cloud VPN
 
Check Point vSEC for Microsoft Azure Webinar
Check Point vSEC for Microsoft Azure WebinarCheck Point vSEC for Microsoft Azure Webinar
Check Point vSEC for Microsoft Azure Webinar
 
110307 cloud security requirements gourley
110307 cloud security requirements gourley110307 cloud security requirements gourley
110307 cloud security requirements gourley
 
Cloud migration
Cloud migrationCloud migration
Cloud migration
 
Plnog13 2014 security intelligence_pkedra_v1
Plnog13 2014 security intelligence_pkedra_v1Plnog13 2014 security intelligence_pkedra_v1
Plnog13 2014 security intelligence_pkedra_v1
 
Platform Security IRL: Busting Buzzwords & Building Better
Platform Security IRL:  Busting Buzzwords & Building BetterPlatform Security IRL:  Busting Buzzwords & Building Better
Platform Security IRL: Busting Buzzwords & Building Better
 
Webinar-GBA Episode 7-Managing blockchain infrastructure for enterprise-grade...
Webinar-GBA Episode 7-Managing blockchain infrastructure for enterprise-grade...Webinar-GBA Episode 7-Managing blockchain infrastructure for enterprise-grade...
Webinar-GBA Episode 7-Managing blockchain infrastructure for enterprise-grade...
 
VMworld 2013: Separating Cloud Hype from Reality in Healthcare – a Real-Life ...
VMworld 2013: Separating Cloud Hype from Reality in Healthcare – a Real-Life ...VMworld 2013: Separating Cloud Hype from Reality in Healthcare – a Real-Life ...
VMworld 2013: Separating Cloud Hype from Reality in Healthcare – a Real-Life ...
 
Presentacion de solucion cloud de navegacion segura
Presentacion de solucion cloud de navegacion seguraPresentacion de solucion cloud de navegacion segura
Presentacion de solucion cloud de navegacion segura
 
45 Minutes to PCI Compliance in the Cloud
45 Minutes to PCI Compliance in the Cloud45 Minutes to PCI Compliance in the Cloud
45 Minutes to PCI Compliance in the Cloud
 
Connecting the Clouds - RightScale Compute 2013
Connecting the Clouds - RightScale Compute 2013Connecting the Clouds - RightScale Compute 2013
Connecting the Clouds - RightScale Compute 2013
 
NGINX DevSecOps Workshop
NGINX DevSecOps WorkshopNGINX DevSecOps Workshop
NGINX DevSecOps Workshop
 
Webinar: IT Disaster Recovery - Simplifying IT Resilience With the Help of th...
Webinar: IT Disaster Recovery - Simplifying IT Resilience With the Help of th...Webinar: IT Disaster Recovery - Simplifying IT Resilience With the Help of th...
Webinar: IT Disaster Recovery - Simplifying IT Resilience With the Help of th...
 
AppGate: Achieving Compliance in the Cloud
AppGate: Achieving Compliance in the CloudAppGate: Achieving Compliance in the Cloud
AppGate: Achieving Compliance in the Cloud
 
How Splunk and AWS Enabled End-to-End Visibility for PagerDuty and Bolstered ...
How Splunk and AWS Enabled End-to-End Visibility for PagerDuty and Bolstered ...How Splunk and AWS Enabled End-to-End Visibility for PagerDuty and Bolstered ...
How Splunk and AWS Enabled End-to-End Visibility for PagerDuty and Bolstered ...
 
Making NFV Easy
Making NFV EasyMaking NFV Easy
Making NFV Easy
 

Dernier

Dernier (20)

Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 

7 Security Requirements to Accelerate Cloud Adoption

  • 1. 7 SECURITY REQUIREMENTS TO ACCELERATE CLOUD ADOPTION
  • 2. TODAY’S SPEAKERS Anthony Guida Principal Security Architect ProtectWise Kelly Brazil Vice President of Systems Engineering ProtectWise
  • 3. AGENDA • Why legacy approaches fail • What are the key requirements for an effective solution • How The ProtectWise Grid can help
  • 4. MIGRATING TO THE CLOUD? HOW LEGACY PRODUCTS FAIL.
  • 5. 5 REASONS WHY LEGACY APPROACHES FAIL 1.Requires complete re-architecture 2.Reduced performance and uptime, increased latency 3.Not maintainable with standard cloud approaches 4.Encourages appliance sprawl 5.Expensive to run
  • 6. A MODERN APPROACH IS NEEDED Security-as-a-Utility • Provides visibility and forensics for Cloud workloads • Covers both Cloud and hybrid environments • Works at scale
  • 7. REQUIREMENTS FOR AN EFFECTIVE SOLUTION
  • 8. REQUIREMENT #1: NETWORK REDESIGN NOT REQUIRED •Out-of-band packet capture •Software sensors that are hypervisor agnostic •Forwarding agents when no network taps are possible
  • 9. REQUIREMENT #2: DEVOPS FRIENDLY •Sensors must be lightweight and run on modern Linux •Minimal infrastructure, even for largest environments •Must be able to automate deployment of forwarding agents
  • 10. REQUIREMENT #3: HIGHLY SCALABLE •Analysis in the Cloud, not locally •Run sensors on modest instances •Multiple VPC deployment options •Policy-based traffic filtering
  • 11. REQUIREMENT #4: BUILT-IN HIGH AVAILABILITY
  • 12. REQUIREMENT #5: REDUCE APPLIANCE SPRAWL •One Cloud platform for visibility, detection, forensics •All analysis in the Cloud •Sensor upgrades not required for new functionality in the platform •Same sensor software for cloud or on-premises hardware
  • 13. REQUIREMENT #6: COST REDUCTION Legacy Solutions Security-as-a-Utility Avoid the “appliance tax”
  • 15. HOW CAN THE PROTECTWISE GRID HELP?
  • 16. THE PROTECTWISE GRID 1 6 CLOUD INGEST VISUALIZER EGRESS CORE REMOTE INDUSTRIAL NETWORK SENSORS Flexible deployment OPTIMIZED NETWORK REPLAY Compression & Optimization up to 80% ENTERPRISE SECURITY PLATFORM Secure, long-term full packet retention (months or years) TIME MACHINE SECURE VAULT
  • 17. A TIME MACHINE FOR THREAT DETECTION Network Traffic Machine Learning Behavior Analysis 3rd Party Threat Intel Heuristics 24 hours 1 month 6 month 1 year RETROSPECTIVE ANALYTICS +6 months +1 month +24 hours PREDICTIVE ANALYSIS REAL TIME ANALYTICS C1 C2 C3 COLLECTIVE CORRELATION Signatures BYOI
  • 18. DEMO
  • 19. RECAP: THE 7 REQUIREMENTS Network redesign should not be required1 Helps to avoid the “appliance tax”6 Should be highly scalable3 Uses native high-availability4 Must be DevOps friendly2 Unified haystack for cloud & hybrid environments7 Reduces appliance sprawl5
  • 21. NEXT STEPS •We’ll send you a copy of our white paper “Deploying ProtectWise in the Cloud” •Questions? Email info@protectwise.com