Security Challenges in the Cloud Era

Slides:



Advertisements
Similar presentations
Stonesoft Roadmap WHAT FEATURES WILL COME IN
Advertisements

1 Security on OpenStack 11/7/2013 Brian Chong – Global Technology Strategist.
Unified Logs and Reporting for Hybrid Centralized Management
MIGRATION FROM SCREENOS TO JUNOS based firewall
© 2014 Level 3 Communications, LLC. All Rights Reserved. Proprietary and Confidential. Polycom event Security Briefing 12/03/14 Level 3 Managed Security.
Kaspersky Open Space Security: Release 2 World-class security solution for your business.
Introducing Kerio Control Unified Threat Management Solution Release date: June 1, 2010 Kerio Technologies, Inc.
Mobility Without Vulnerability: Secure and Enable Your Mobile Users, Apps, and Devices David Clapp – Intuitive.
©2003–2008 Check Point Software Technologies Ltd. All rights reserved. CheckPoint new security architecture and R70 highlights.
Network and Perimeter Security Paula Kiernan Senior Consultant Ward Solutions.
CIO Perspectives on Security Fabrício Brasileiro Regional Sales Manager.
Network security Product Group 2 McAfee Network Security Platform.
Synchronized Security Revolutionizing Advanced Threat Protection
Copyright © 2014 Juniper Networks, Inc. 1 Juniper Unite Cloud-Enabled Enterprise Juniper’s Innovation in Enterprise Networks.
Enterprise Mobility Suite: Simplify security, stay productive Protect data and empower workers Unsecured company data can cost millions in lost research,
Introducing: Chengdu’s Industrial Cloud Huawei & GDS Services Industrial Cloud Solution for SMEs Author/ID: Zhao Zhijuan/ Dept: Industry Solutions.
A Better Way Huawei Financial Agile Network Solution Success Cases.
0 Agile Controller Key Message KM 1: Service Experience-centered Network Redefinition KM 2: Network-wide United Security KM 3: Product Openness and Collaboration.
Huawei FusionCloud Desktop Solution Key Message Optimal Experience, Security and Reliability, Agility and Efficiency.
Get Full Protection on Microsoft Azure with Symantec™ Endpoint Protection 12.1 MICROSOFT AZURE ISV PROFILE: SYMANTEC Symantec™ Endpoint Protection is an.
0 中文 NSS Tested Industry Leading DC Firewall “NSS is happy to see Huawei proactively seeking to subject its security platforms to independent evaluation.
Blue Coat Cloud Continuum
SELF-DEFENDING NETWORK. CONTENTS Introduction What is Self Defending Network? Types of Network Attacks Structure of Self Defending Network Conclusion.
Clouding with Microsoft Azure
Please delete this page before presenting it to customers.
Grid Wide IoT Gateway Supports open standards and technologies, with open interfaces that provide support for proprietary gas-meter reading protocols and.
Web Content Security Unlock the Power of the Web
Accelerating Your Journey to a Safe Cloud
2017 Security Predictions from FortiGuard Labs
Data Center Network Solution
Grow Your Business with the Security Leader
Barracuda Firewall The Next-Generation Firewall for Everyone
Web Content Security Unlock the Power of the Web
Barracuda Web Security Flex
Leading New ICT, Making eFinance More Effective.
Barracuda Firewall The Next-Generation Firewall for Everyone
Grow Your Business with the Security Leader
Barracuda Web Filtering Service
Enterprise Security in Practice
Hybrid Management and Security
Microsoft Operations Management Suite Insight and Analytics
Journey to Microsoft Secure Cloud
Real-time protection for web sites and web apps against ATTACKS
HUAWEI eSight Secure Center Feature Introduction
Announcing DDoS Protection preview for Azure
Wonderware Online Cost-Effective SaaS Solution Powered by the Microsoft Azure Cloud Platform Delivers Industrial Insights to Users and OEMs MICROSOFT AZURE.
Threat Management Gateway
VCE Practice Test Questions Answers
Enterprise vCPE use case requirement
Enterprise vCPE use case requirement
Advanced Borderless Network Architecture Sales Exam practice-questions.html.
Matt G change over point ?
Firewalls at UNM 11/8/2018 Chad VanPelt Sean Taylor.
Securing Your Digital Transformation
Securing Cloud-Native Applications Jason Schmitt CEO
Healthcare Cloud Security Stack for Microsoft Azure
Logsign All-In-One Security Information and Event Management (SIEM) Solution Built on Azure Improves Security & Business Continuity MICROSOFT AZURE APP.
11/17/2018 9:32 PM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
Data Security for Microsoft Azure
Check Point Connectra NGX R60
Secure once, run anywhere Simplify your security with Sophos
Abiquo’s Hybrid Cloud Management Solution Helps Enterprises Maximise the Full Potential of the Microsoft Azure Platform MICROSOFT AZURE ISV PROFILE: ABIQUO.
AIMS for BizTalk, Built on the Microsoft Azure Platform, Empowers Enterprises to Automate Insight and Analytics and Boost Value Creation MICROSOFT AZURE.
See your OpenStack Network Like Never Before
Healthcare Cloud Security Stack for Microsoft Azure
Introduction to the 3rd Gen Fortinet Security Fabric
Microsoft Data Insights Summit
NFV and SD-WAN Multi vendor deployment
AT&T Firewall Battlecard
Presentation transcript:

Security Challenges in the Cloud Era Security, a major challenge in the cloud era. Lack of resources/experience Security Cloud management cost Compliance DDoS Management/Control Multi-type cloud service management Complexity of building private clouds Performance Source: 2017 State of the Cloud Report from RightScale Changing Services Conventional security unable to meet the requirements of changing services. Evolving Security Threats There is no mature defense solution for the advanced Threats. Changing Borders Multi-branch, cloudification, and IoT blur security borders. ERP/CRM/OA etc. Virus Worm Spam Spyware Smart worm Phishing APT IoT device and cloud VM vSwitch

Benefits for Enterprises Build Intelligent Self-learning System for Security Everywhere Security applications Policy management Self-service portal Identity management VAS store O&M platform Benefits for Enterprises Deep: Collaborated Protection with 99% Threat Detection Accuracy Wide: Virtualized Security Under Enterprise Security Scenarios Fast: Cloudified Security Services Subscription from within Minutes Open API Benefits for MSPs Security services increase revenues 12 types of VAS with PAYG mode Cloud-based, automatic Big Data analytics Passive defense → Positive defense Automatic policy management reduces OPEX by 80% Security management service Log correlation CIS (Big Data) Traffic analysis File behavior analysis VAS subscription Security service deployment SecoManager Security system O&M Security policy optimization Secure network connections CloudFabric Cloud Elastic Scale-out: 1 VM -> 128 VMs EC-IoT Security Lease Line Internet CloudEPN Security CloudCampus Security IVS Security

CloudFabric Security: Intelligent, Virtualized, and Automated Security Guarantees Cloud DCs Cloud management Complex security configuration & management Cloud management layer Unknown threat intrusion Automated, On-demand security management, proactively defense Automated configuration of security services ; Flexible security policy immigration CIS performs security posture awareness , collaborate to block unknown threats. Internet DC security Egress & border security protection FW/sandbox/AntiDDoS DC egress 3-layer defense , all-round security protection High capacity: Combination of Tbit/s FW, Tbit/s AntiDDoS, and 128-node cloud gateway Full-function: vFW 12-type security protection; Deep isolation: vFWs protect isolation among VMs; Advanced: Sandbox interworking with the firewall to inspect 50+ types of files Internal-Tenant Protection FW/IPS Core vFW Intra-Tenants Protection: among VMs Public Shared tenant Independent tenant

Cloud Campus & Branch Security: Comprehensive Cloudification Improves Security Construction Efficiency Network Architecture Solution Security cloud-based services improving efficiency Open API Mass branches Mass configuration Management of 200,000 branch security devices Management of 100,000 policies on campus SecoManager Authentication service Log collection Security configuration NGFW providing professional security protection 6300+ Internet applications identified Database of 85 M URLs NSS Lab recommended firewall, detecting 99.5% of malware Network intrusion Data theft Internet vpn Lease Line Unauthorized access Privilege escalation Multiple authentication supporting existing authentication system …… Includes AD, portal, AC, Radius, social account, etc. Branch A Branch B Branch N

EC-IoT Security: Security Solution Safeguards IoT Production Network Architecture Solution PKI Big Data security system analyzes IoT risks and prevents IoT incidents. IoT network anomaly Unaware threats Big Data security analysis, security posture awareness, collaborate protection, threat posture display Network-wide collaboration defending against unknown threats IoT platform Big Data Highly integrated IoT security gateways help reduce investment costs. Access of millions of devices Lightweight tunnel encryption algorithms IoT data disclosure IoT protocol-based attacks Device security plug-ins and a certificate management system make deployment more convenient and secure. Access of unauthorized IoT devices Device intrusion Security plug-in open API, device trusted authentication Certificate management system: PKI authentication capabilities Machine Camera Vehicle Electricity meter

First High-End Virtualization Universal SeGW in the Industry AS-IS TO-BE With the development of services, traffic in cloud DCs undergoes rapid changes. This creates a challenge for security O&M. Huawei's Cloud NFV NGFW solution helps build an elastic high-performance security system, simplifying O&M. Manual deployment Complex expansion Elastic scaling Easy LB 1 2 3 Fixed LB 1 Self-configurable 2 3 Adjustment on the core switch, induces O&M risks Device expansion: 30 days Link expansion: 8 days External LBs: Limited performance cannot meet long-term requirements of DCs. "0" adjustment of neighbor devices No interruption on services Automatic scale in/out in minutes with self-diagnosis Simple LBs: routing multiple next hops for MAX 128 VMs 2.56T throughput Internet USG9000V 1 Self-Configurable:Centralized management; distributed forwarding; automatically create a forwarding VM 2 Elastic scaling: Unified performance monitoring, automatic scale in/out 3 Load balancer Routing multi nexthop interface , Load balancing among forwarding VMs Internet Physical FW pool Adjust: IP/ACL/… Internet Isolated vFW cluster LB vFW Control plane MPU VM MPU VM Forwarding plane Core switch OR LPU VM SPU VM SPU VM LPU VM SPU VM SPU VM LPU VM SPU VM SPU VM

100,000+ enterprise customers across Europe, Latin America, Africa, and Asia Pacific in the Internet, finance, education, government, and energy industries Internet Finance Big companies Government Education Energy Media E-commerce Others EQUINIX,KIO,国家电网,Sberbank