SlideShare une entreprise Scribd logo
1  sur  30
Using Behavior to Protect
Cloud Servers
HELLO!
I am Anirban Banerjee.
I am the Founder and
CEO of Onion ID.
anirban@onionid.com
https://calendly.com/anirban/enterprise-demo/
THE STATUS QUO
CHALLENGES AND
THREATS
BEHAVIOR BASED
SECURITY
THE STATUS QUO
4
CLOUD
INFRASTRUCTURE
TODAY
AWS - IaaS
Heroku/GC
Docker
Azure
WHO IS
ACCESSING
Devops
IT
Developers
Shadow IT
Bloggers
Marketing
Automated Software
Deploy and Build software
Vendors and 3rd parties
THE STATUS
QUO
Usernames/
passwords
SSH Keys
▹ Helps login
automatically
IP filters
▹ Only talk to
certain
computers
VPNs
▹ Some
Security
▹ Encrypted
traffic
DIRECTORY
SERVICES
Various Directory Services
- Ties very basic Identity
- IAM solutions, first step
- IAM for infrastructure, way behind
CHALLENGES
AND THREATS
CHALLENGES
▸ Multiple dev teams
▹ Geographically distributed
▹ Shadow IT
▸ High Velocity Changes – IaaS/PaaS via APIs
▹ AWS, Rackspace, Docker
▹ All types of web apps
▸ Employee churn
▸ Compliance and Audits
▸ Attack surface has changed
▸ Horizontal attacker movement
▸ Vertical privilege escalation
THE THREAT
LANDSCAPE
Horizontal and Vertical Attacker Movement
GOING FORWARD
ACTIVE
AUTHENTICATION
CAN HELP
▸ Concept of least privilege
▸ Risk score everything
▸ Every command is analyzed
▸ Learn, Match, Act, Update
WHAT TO LOOK
FOR AND WHAT
TO DO
Usually never runs visudo /etc/shadow – high risk
COMMANDS BEING
RUN
Where are you connecting from, time, # of
connections
CONNECTION
STATISTICS
Risk score every command: White, Grey, Black
EVERY COMMAND
IS ANALYZED
Invisible 2FA for Grey, Physical 2FA for Black
TAKE ACTION
Apache Spark, Pykit Sci, SSH proxies
TOOLS
COMPLIANCE
▸PCI DSS, HIPAA, FedRamp, FFIEC, SOX,
SOC I,II
▸Legal consequences
▸Provide proof of controls
▸Keep the board informed
▸Use tools for reporting, automate
BEHAVIOR
▸What is Behavior
▸What to look for
▸Analyzing behavior
▸Making it actionable
▸Continuous improvement
▸OSS tools and plumbing
WHAT IS
BEHAVIOR
▸Markers for your Identity
▸What commands are used
▸What style is used
▸When do you use what
17
WHAT TO
LOOK FOR
▸Command history
▸Command Style
▸Mistakes and mistypes
▸Time of day, IP, Geo-location
▸Type of Resource
18
WHAT TO
LOOK FOR
▸Frequency analysis ;
▸Type of commands
▹Network
▹Stats
▸Identify patterns
▹Per Server, per user - profile
▹Profiles need to change
19
ANALYZING
BEHAVIOR
▸Create Feature sets
▸Feed Feature set to classifier
▸Obtain Score
▸Take Action
20
- What they run
- How they code
- Where from
- When
Source: http://www.cinemablend.com/images/news_img/71655/Bad_Grandpa_71655.jpg
ANALYZING
BEHAVIOR
▸Supervised
▹Classification (Bayes, SVM..)
▹Regression
▸Unsupervised
▹Clustering (expectation maximization,
k-means..)
▹Decomposition (PCA)
▸Gotchas
▹More data is always better – no
▹Bias, noise, beware of feature greed
21
MAKING IT
ACTIONABLE
▸Block access, Kill Sessions
▸Send alerts with actions
▸Dealing with FPs is easier
▸Distribute manual auth.
▸Dynamic ACL modification
22
CONTINUOUS
IMPROVEMENT
Your system needs to keep
“learning”
Think about rule based
approach, don’t obsess
Follow good login hygiene
Audit shadow IT accounts
OSS Tools
and Plumbing
▸Scikit Py,Weka
▸Apache Kafka
▸Apache Spark
▸Twilio
▸Nodejs
▸Try SVM, Ladtree, Stumps
24
OSS Tools
and Plumbing
25
Register Servers
Dynamic DNS
Change Keys
Why Stop
Here?
▸Tadaaaaa! Browser
Extension
▹How are you using the web app
▹# of actions per second
▹Curvature of mouse movement
▹Typing patterns
▹- not typing speed
▹- do you use tab
26
Customization
▸No vendor lock in
▸You decide actions
▸You decide on FP mitigation
▸Adaptive 2FA
▸Low Friction – very important
27
Making the
Case for C
Level
▸More Compliant, Less Risk
▸Time Savings for IT, SecOps
▸Better Control
▸Protect Customer Data
▸Don’t end up on Techcrunch
28
Thank you
29
▸Anirban@onionid.com
▸1-888-315-4745
▸Twitter - @onion_id
▸Connect with us on FB or Linkedin
▸We will be posting these slides
▸Feedback is very welcome
https://calendly.com/anirban/enterprise-demo/
THANK YOU!
Any questions?
You can find more about us at:
Onion ID – Privilege Management in 60 Seconds
www.onionid.com , anirban@onionid.com
Tel: +1-888 315 4745

Contenu connexe

Tendances

Monitoring Highly Dynamic and Distributed Systems with NGINX Amplify
Monitoring Highly Dynamic and Distributed Systems with NGINX AmplifyMonitoring Highly Dynamic and Distributed Systems with NGINX Amplify
Monitoring Highly Dynamic and Distributed Systems with NGINX AmplifyNGINX, Inc.
 
All Your Containers Are Belong To Us
All Your Containers Are Belong To UsAll Your Containers Are Belong To Us
All Your Containers Are Belong To UsLacework
 
Zabbix for Hybrid Cloud Management
Zabbix for Hybrid Cloud ManagementZabbix for Hybrid Cloud Management
Zabbix for Hybrid Cloud ManagementDaisuke Ikeda
 
Nagios Conference 2014 - Shamas Demoret - An Overview of Nagios Solutions
Nagios Conference 2014 - Shamas Demoret - An Overview of Nagios SolutionsNagios Conference 2014 - Shamas Demoret - An Overview of Nagios Solutions
Nagios Conference 2014 - Shamas Demoret - An Overview of Nagios SolutionsNagios
 
Improve App Performance & Reliability with NGINX Amplify
Improve App Performance & Reliability with NGINX AmplifyImprove App Performance & Reliability with NGINX Amplify
Improve App Performance & Reliability with NGINX AmplifyNGINX, Inc.
 
Supercharge Application Delivery to Satisfy Users
Supercharge Application Delivery to Satisfy UsersSupercharge Application Delivery to Satisfy Users
Supercharge Application Delivery to Satisfy UsersNGINX, Inc.
 
Gwava gwava6
Gwava   gwava6Gwava   gwava6
Gwava gwava6GWAVA
 
DDoS mitigation EPIC FAIL collection - 32C3
DDoS mitigation EPIC FAIL collection - 32C3DDoS mitigation EPIC FAIL collection - 32C3
DDoS mitigation EPIC FAIL collection - 32C3Moshe Zioni
 
David Steiman - Getting serious with private kubernetes clusters & cloud nati...
David Steiman - Getting serious with private kubernetes clusters & cloud nati...David Steiman - Getting serious with private kubernetes clusters & cloud nati...
David Steiman - Getting serious with private kubernetes clusters & cloud nati...Codemotion
 
Latest Trends in Web Application Security
Latest Trends in Web Application SecurityLatest Trends in Web Application Security
Latest Trends in Web Application SecurityCloudflare
 
Comprendre les différents types de Cloud
Comprendre les différents types de CloudComprendre les différents types de Cloud
Comprendre les différents types de CloudOVHcloud
 
DerbyCon 2019: Prepare to be Boarded! A Tale of Kubernetes, Plunder, and Cryp...
DerbyCon 2019: Prepare to be Boarded! A Tale of Kubernetes, Plunder, and Cryp...DerbyCon 2019: Prepare to be Boarded! A Tale of Kubernetes, Plunder, and Cryp...
DerbyCon 2019: Prepare to be Boarded! A Tale of Kubernetes, Plunder, and Cryp...Lacework
 
David Steiman - Getting serious with private kubernetes clusters & cloud nati...
David Steiman - Getting serious with private kubernetes clusters & cloud nati...David Steiman - Getting serious with private kubernetes clusters & cloud nati...
David Steiman - Getting serious with private kubernetes clusters & cloud nati...Codemotion
 
Dimitri Bellini and Pietro Antonacci - Manage Zabbix Proxies in Remote Networ...
Dimitri Bellini and Pietro Antonacci - Manage Zabbix Proxies in Remote Networ...Dimitri Bellini and Pietro Antonacci - Manage Zabbix Proxies in Remote Networ...
Dimitri Bellini and Pietro Antonacci - Manage Zabbix Proxies in Remote Networ...Zabbix
 
Reduce IT Spend with Software Load Balancing
Reduce IT Spend with Software Load BalancingReduce IT Spend with Software Load Balancing
Reduce IT Spend with Software Load BalancingNGINX, Inc.
 
Creating a Single View Part 3: Securing Your Deployment
Creating a Single View Part 3: Securing Your DeploymentCreating a Single View Part 3: Securing Your Deployment
Creating a Single View Part 3: Securing Your DeploymentMongoDB
 
NGINX for Application Delivery & Acceleration
NGINX for Application Delivery & AccelerationNGINX for Application Delivery & Acceleration
NGINX for Application Delivery & AccelerationNGINX, Inc.
 
3 Ways to Automate App Deployments with NGINX
3 Ways to Automate App Deployments with NGINX3 Ways to Automate App Deployments with NGINX
3 Ways to Automate App Deployments with NGINXNGINX, Inc.
 

Tendances (20)

Monitoring Highly Dynamic and Distributed Systems with NGINX Amplify
Monitoring Highly Dynamic and Distributed Systems with NGINX AmplifyMonitoring Highly Dynamic and Distributed Systems with NGINX Amplify
Monitoring Highly Dynamic and Distributed Systems with NGINX Amplify
 
All Your Containers Are Belong To Us
All Your Containers Are Belong To UsAll Your Containers Are Belong To Us
All Your Containers Are Belong To Us
 
Zabbix for Hybrid Cloud Management
Zabbix for Hybrid Cloud ManagementZabbix for Hybrid Cloud Management
Zabbix for Hybrid Cloud Management
 
Nagios Conference 2014 - Shamas Demoret - An Overview of Nagios Solutions
Nagios Conference 2014 - Shamas Demoret - An Overview of Nagios SolutionsNagios Conference 2014 - Shamas Demoret - An Overview of Nagios Solutions
Nagios Conference 2014 - Shamas Demoret - An Overview of Nagios Solutions
 
Improve App Performance & Reliability with NGINX Amplify
Improve App Performance & Reliability with NGINX AmplifyImprove App Performance & Reliability with NGINX Amplify
Improve App Performance & Reliability with NGINX Amplify
 
Supercharge Application Delivery to Satisfy Users
Supercharge Application Delivery to Satisfy UsersSupercharge Application Delivery to Satisfy Users
Supercharge Application Delivery to Satisfy Users
 
Gwava gwava6
Gwava   gwava6Gwava   gwava6
Gwava gwava6
 
DDoS mitigation EPIC FAIL collection - 32C3
DDoS mitigation EPIC FAIL collection - 32C3DDoS mitigation EPIC FAIL collection - 32C3
DDoS mitigation EPIC FAIL collection - 32C3
 
David Steiman - Getting serious with private kubernetes clusters & cloud nati...
David Steiman - Getting serious with private kubernetes clusters & cloud nati...David Steiman - Getting serious with private kubernetes clusters & cloud nati...
David Steiman - Getting serious with private kubernetes clusters & cloud nati...
 
Latest Trends in Web Application Security
Latest Trends in Web Application SecurityLatest Trends in Web Application Security
Latest Trends in Web Application Security
 
Comprendre les différents types de Cloud
Comprendre les différents types de CloudComprendre les différents types de Cloud
Comprendre les différents types de Cloud
 
DerbyCon 2019: Prepare to be Boarded! A Tale of Kubernetes, Plunder, and Cryp...
DerbyCon 2019: Prepare to be Boarded! A Tale of Kubernetes, Plunder, and Cryp...DerbyCon 2019: Prepare to be Boarded! A Tale of Kubernetes, Plunder, and Cryp...
DerbyCon 2019: Prepare to be Boarded! A Tale of Kubernetes, Plunder, and Cryp...
 
David Steiman - Getting serious with private kubernetes clusters & cloud nati...
David Steiman - Getting serious with private kubernetes clusters & cloud nati...David Steiman - Getting serious with private kubernetes clusters & cloud nati...
David Steiman - Getting serious with private kubernetes clusters & cloud nati...
 
Dimitri Bellini and Pietro Antonacci - Manage Zabbix Proxies in Remote Networ...
Dimitri Bellini and Pietro Antonacci - Manage Zabbix Proxies in Remote Networ...Dimitri Bellini and Pietro Antonacci - Manage Zabbix Proxies in Remote Networ...
Dimitri Bellini and Pietro Antonacci - Manage Zabbix Proxies in Remote Networ...
 
Reduce IT Spend with Software Load Balancing
Reduce IT Spend with Software Load BalancingReduce IT Spend with Software Load Balancing
Reduce IT Spend with Software Load Balancing
 
Golismero
GolismeroGolismero
Golismero
 
Cloudflare
CloudflareCloudflare
Cloudflare
 
Creating a Single View Part 3: Securing Your Deployment
Creating a Single View Part 3: Securing Your DeploymentCreating a Single View Part 3: Securing Your Deployment
Creating a Single View Part 3: Securing Your Deployment
 
NGINX for Application Delivery & Acceleration
NGINX for Application Delivery & AccelerationNGINX for Application Delivery & Acceleration
NGINX for Application Delivery & Acceleration
 
3 Ways to Automate App Deployments with NGINX
3 Ways to Automate App Deployments with NGINX3 Ways to Automate App Deployments with NGINX
3 Ways to Automate App Deployments with NGINX
 

En vedette

ពុទ្ធកិច្ច ៤៥ ព្រះវស្សា
ពុទ្ធកិច្ច ៤៥ ព្រះវស្សាពុទ្ធកិច្ច ៤៥ ព្រះវស្សា
ពុទ្ធកិច្ច ៤៥ ព្រះវស្សាVantha Kago
 
MATRIC_CERTIFICATE[1]
MATRIC_CERTIFICATE[1]MATRIC_CERTIFICATE[1]
MATRIC_CERTIFICATE[1]Thato Masala
 
Las tic, la internet y el estado del arte
Las tic, la internet y el estado del arteLas tic, la internet y el estado del arte
Las tic, la internet y el estado del arteMayra Pallo
 
Consumer behavior survey
Consumer behavior surveyConsumer behavior survey
Consumer behavior surveyakshmane
 
VOICE Oct'13 - MR Pickles
VOICE Oct'13 - MR PicklesVOICE Oct'13 - MR Pickles
VOICE Oct'13 - MR PicklesP.Rajan Mathews
 
Corsi di Montaggio Video
Corsi di Montaggio VideoCorsi di Montaggio Video
Corsi di Montaggio VideoDenis Leo
 
tranning format of nissan
 tranning format of nissan tranning format of nissan
tranning format of nissanDeepak Upadhyay
 
Monthly Presentation 'June 15
Monthly Presentation 'June 15Monthly Presentation 'June 15
Monthly Presentation 'June 15Sourav Das
 

En vedette (12)

ពុទ្ធកិច្ច ៤៥ ព្រះវស្សា
ពុទ្ធកិច្ច ៤៥ ព្រះវស្សាពុទ្ធកិច្ច ៤៥ ព្រះវស្សា
ពុទ្ធកិច្ច ៤៥ ព្រះវស្សា
 
Languagelab 17.2 - Synthesis
Languagelab 17.2 - SynthesisLanguagelab 17.2 - Synthesis
Languagelab 17.2 - Synthesis
 
MATRIC_CERTIFICATE[1]
MATRIC_CERTIFICATE[1]MATRIC_CERTIFICATE[1]
MATRIC_CERTIFICATE[1]
 
Las tic, la internet y el estado del arte
Las tic, la internet y el estado del arteLas tic, la internet y el estado del arte
Las tic, la internet y el estado del arte
 
Find out your capacity
Find out your capacityFind out your capacity
Find out your capacity
 
Legislacion maritima 8
Legislacion maritima 8Legislacion maritima 8
Legislacion maritima 8
 
Consumer behavior survey
Consumer behavior surveyConsumer behavior survey
Consumer behavior survey
 
VOICE Oct'13 - MR Pickles
VOICE Oct'13 - MR PicklesVOICE Oct'13 - MR Pickles
VOICE Oct'13 - MR Pickles
 
Corsi di Montaggio Video
Corsi di Montaggio VideoCorsi di Montaggio Video
Corsi di Montaggio Video
 
tranning format of nissan
 tranning format of nissan tranning format of nissan
tranning format of nissan
 
Monthly Presentation 'June 15
Monthly Presentation 'June 15Monthly Presentation 'June 15
Monthly Presentation 'June 15
 
10 Ways to Stay Green
10 Ways to Stay Green10 Ways to Stay Green
10 Ways to Stay Green
 

Similaire à Using Behavior to Protect Cloud Servers

Active authentication to protect IT assets
Active authentication to protect IT assetsActive authentication to protect IT assets
Active authentication to protect IT assetsPlesk
 
Active Authentication to Protect IT Assets - Onion ID
Active Authentication to Protect IT Assets - Onion IDActive Authentication to Protect IT Assets - Onion ID
Active Authentication to Protect IT Assets - Onion IDbanerjeea
 
RVASec AWS Survival Guide 2.0
RVASec AWS Survival Guide 2.0RVASec AWS Survival Guide 2.0
RVASec AWS Survival Guide 2.0Ken Johnson
 
Shields Up! Securing React Apps
Shields Up! Securing React AppsShields Up! Securing React Apps
Shields Up! Securing React AppsZachary Klein
 
Slick eventsourcing
Slick eventsourcingSlick eventsourcing
Slick eventsourcingAdam Warski
 
Serverless - When to FaaS?
Serverless - When to FaaS?Serverless - When to FaaS?
Serverless - When to FaaS?Benny Bauer
 
Building and Deploying PHP Applications, PHPTour 2016
Building and Deploying PHP Applications, PHPTour 2016Building and Deploying PHP Applications, PHPTour 2016
Building and Deploying PHP Applications, PHPTour 2016Martins Sipenko
 
London Hashicorp Meetup #8 - Testing Programmable Infrastructure By Matt Long
London Hashicorp Meetup #8 -  Testing Programmable Infrastructure By Matt LongLondon Hashicorp Meetup #8 -  Testing Programmable Infrastructure By Matt Long
London Hashicorp Meetup #8 - Testing Programmable Infrastructure By Matt LongOpenCredo
 
Devops (start walking in the same direction) by ops
Devops (start walking in the same direction) by opsDevops (start walking in the same direction) by ops
Devops (start walking in the same direction) by opsDemis Rizzotto
 
10 Mistakes Hackers Want You to Make
10 Mistakes Hackers Want You to Make10 Mistakes Hackers Want You to Make
10 Mistakes Hackers Want You to MakeJoe Kutner
 
Keepler | Full-Stack Serverless Applications on GCP
Keepler | Full-Stack Serverless Applications on GCPKeepler | Full-Stack Serverless Applications on GCP
Keepler | Full-Stack Serverless Applications on GCPKeepler Data Tech
 
Real-World Application Observability - 11 Practical Developer Focused Tips
Real-World Application Observability - 11 Practical Developer Focused TipsReal-World Application Observability - 11 Practical Developer Focused Tips
Real-World Application Observability - 11 Practical Developer Focused TipsVictorSzoltysek
 
Technical Architecture of RASP Technology
Technical Architecture of RASP TechnologyTechnical Architecture of RASP Technology
Technical Architecture of RASP TechnologyPriyanka Aash
 
Improving velocity through abstraction
Improving velocity through abstractionImproving velocity through abstraction
Improving velocity through abstractionVictorSzoltysek
 
DevOps Security - Is It Really So Difficult? - Reuven Harrison - DevOpsDays T...
DevOps Security - Is It Really So Difficult? - Reuven Harrison - DevOpsDays T...DevOps Security - Is It Really So Difficult? - Reuven Harrison - DevOpsDays T...
DevOps Security - Is It Really So Difficult? - Reuven Harrison - DevOpsDays T...DevOpsDays Tel Aviv
 
[Capitole du Libre] #serverless -  mettez-le en oeuvre dans votre entreprise...
[Capitole du Libre] #serverless -  mettez-le en oeuvre dans votre entreprise...[Capitole du Libre] #serverless -  mettez-le en oeuvre dans votre entreprise...
[Capitole du Libre] #serverless -  mettez-le en oeuvre dans votre entreprise...Ludovic Piot
 
Security Practitioners guide to Micro Segmentation with VMware NSX and Log In...
Security Practitioners guide to Micro Segmentation with VMware NSX and Log In...Security Practitioners guide to Micro Segmentation with VMware NSX and Log In...
Security Practitioners guide to Micro Segmentation with VMware NSX and Log In...Anthony Burke
 
Game DDOS Prevention
Game DDOS PreventionGame DDOS Prevention
Game DDOS PreventionWalter Liu
 
Schlomo Schapiro - Why I like to use the proprietary Cloud services without f...
Schlomo Schapiro - Why I like to use the proprietary Cloud services without f...Schlomo Schapiro - Why I like to use the proprietary Cloud services without f...
Schlomo Schapiro - Why I like to use the proprietary Cloud services without f...Schlomo Schapiro
 

Similaire à Using Behavior to Protect Cloud Servers (20)

Active authentication to protect IT assets
Active authentication to protect IT assetsActive authentication to protect IT assets
Active authentication to protect IT assets
 
Active Authentication to Protect IT Assets - Onion ID
Active Authentication to Protect IT Assets - Onion IDActive Authentication to Protect IT Assets - Onion ID
Active Authentication to Protect IT Assets - Onion ID
 
RVASec AWS Survival Guide 2.0
RVASec AWS Survival Guide 2.0RVASec AWS Survival Guide 2.0
RVASec AWS Survival Guide 2.0
 
Shields Up! Securing React Apps
Shields Up! Securing React AppsShields Up! Securing React Apps
Shields Up! Securing React Apps
 
Slick eventsourcing
Slick eventsourcingSlick eventsourcing
Slick eventsourcing
 
Serverless - When to FaaS?
Serverless - When to FaaS?Serverless - When to FaaS?
Serverless - When to FaaS?
 
Building and Deploying PHP Applications, PHPTour 2016
Building and Deploying PHP Applications, PHPTour 2016Building and Deploying PHP Applications, PHPTour 2016
Building and Deploying PHP Applications, PHPTour 2016
 
London Hashicorp Meetup #8 - Testing Programmable Infrastructure By Matt Long
London Hashicorp Meetup #8 -  Testing Programmable Infrastructure By Matt LongLondon Hashicorp Meetup #8 -  Testing Programmable Infrastructure By Matt Long
London Hashicorp Meetup #8 - Testing Programmable Infrastructure By Matt Long
 
Devops (start walking in the same direction) by ops
Devops (start walking in the same direction) by opsDevops (start walking in the same direction) by ops
Devops (start walking in the same direction) by ops
 
Intro to DevOps
Intro to DevOpsIntro to DevOps
Intro to DevOps
 
10 Mistakes Hackers Want You to Make
10 Mistakes Hackers Want You to Make10 Mistakes Hackers Want You to Make
10 Mistakes Hackers Want You to Make
 
Keepler | Full-Stack Serverless Applications on GCP
Keepler | Full-Stack Serverless Applications on GCPKeepler | Full-Stack Serverless Applications on GCP
Keepler | Full-Stack Serverless Applications on GCP
 
Real-World Application Observability - 11 Practical Developer Focused Tips
Real-World Application Observability - 11 Practical Developer Focused TipsReal-World Application Observability - 11 Practical Developer Focused Tips
Real-World Application Observability - 11 Practical Developer Focused Tips
 
Technical Architecture of RASP Technology
Technical Architecture of RASP TechnologyTechnical Architecture of RASP Technology
Technical Architecture of RASP Technology
 
Improving velocity through abstraction
Improving velocity through abstractionImproving velocity through abstraction
Improving velocity through abstraction
 
DevOps Security - Is It Really So Difficult? - Reuven Harrison - DevOpsDays T...
DevOps Security - Is It Really So Difficult? - Reuven Harrison - DevOpsDays T...DevOps Security - Is It Really So Difficult? - Reuven Harrison - DevOpsDays T...
DevOps Security - Is It Really So Difficult? - Reuven Harrison - DevOpsDays T...
 
[Capitole du Libre] #serverless -  mettez-le en oeuvre dans votre entreprise...
[Capitole du Libre] #serverless -  mettez-le en oeuvre dans votre entreprise...[Capitole du Libre] #serverless -  mettez-le en oeuvre dans votre entreprise...
[Capitole du Libre] #serverless -  mettez-le en oeuvre dans votre entreprise...
 
Security Practitioners guide to Micro Segmentation with VMware NSX and Log In...
Security Practitioners guide to Micro Segmentation with VMware NSX and Log In...Security Practitioners guide to Micro Segmentation with VMware NSX and Log In...
Security Practitioners guide to Micro Segmentation with VMware NSX and Log In...
 
Game DDOS Prevention
Game DDOS PreventionGame DDOS Prevention
Game DDOS Prevention
 
Schlomo Schapiro - Why I like to use the proprietary Cloud services without f...
Schlomo Schapiro - Why I like to use the proprietary Cloud services without f...Schlomo Schapiro - Why I like to use the proprietary Cloud services without f...
Schlomo Schapiro - Why I like to use the proprietary Cloud services without f...
 

Plus de banerjeea

ISACA-presentation-Aug-18-2016- Onion ID
ISACA-presentation-Aug-18-2016- Onion IDISACA-presentation-Aug-18-2016- Onion ID
ISACA-presentation-Aug-18-2016- Onion IDbanerjeea
 
Onion ID Overview
Onion ID OverviewOnion ID Overview
Onion ID Overviewbanerjeea
 
The 7 Layers of Privileged Access Management
The 7 Layers of Privileged Access ManagementThe 7 Layers of Privileged Access Management
The 7 Layers of Privileged Access Managementbanerjeea
 
Jun 29 - 2016-MultiFactorAuthentication
Jun 29 - 2016-MultiFactorAuthentication Jun 29 - 2016-MultiFactorAuthentication
Jun 29 - 2016-MultiFactorAuthentication banerjeea
 
Whitepaper-When-Admins-go-bad
Whitepaper-When-Admins-go-badWhitepaper-When-Admins-go-bad
Whitepaper-When-Admins-go-badbanerjeea
 
Anirban webappsecusa2014
Anirban webappsecusa2014Anirban webappsecusa2014
Anirban webappsecusa2014banerjeea
 

Plus de banerjeea (6)

ISACA-presentation-Aug-18-2016- Onion ID
ISACA-presentation-Aug-18-2016- Onion IDISACA-presentation-Aug-18-2016- Onion ID
ISACA-presentation-Aug-18-2016- Onion ID
 
Onion ID Overview
Onion ID OverviewOnion ID Overview
Onion ID Overview
 
The 7 Layers of Privileged Access Management
The 7 Layers of Privileged Access ManagementThe 7 Layers of Privileged Access Management
The 7 Layers of Privileged Access Management
 
Jun 29 - 2016-MultiFactorAuthentication
Jun 29 - 2016-MultiFactorAuthentication Jun 29 - 2016-MultiFactorAuthentication
Jun 29 - 2016-MultiFactorAuthentication
 
Whitepaper-When-Admins-go-bad
Whitepaper-When-Admins-go-badWhitepaper-When-Admins-go-bad
Whitepaper-When-Admins-go-bad
 
Anirban webappsecusa2014
Anirban webappsecusa2014Anirban webappsecusa2014
Anirban webappsecusa2014
 

Using Behavior to Protect Cloud Servers