Bill Banks | Security Engineer Securing Someone Else’s Computer Why Cloud Security Should be a Priority Bill Banks | Security Engineer [Internal Use] for Check Point employees
[Protected] Non-confidential content FROM DATA CENTER TO CLOUD DATA CENTER CLOUD WHAT USED TO TAKE WEEKS, WITH CLOUD TAKES MINUTES [Protected] Non-confidential content
[Protected] Distribution or modification is subject to approval What Are Your Biggest Cloud Security Headaches? Loss of Control Consistency Compliance 2017 Cyber Security Survey (Check Point) [Protected] Distribution or modification is subject to approval
Therefore, cloud is vulnerable and exposed… CLOUD FUNDAMENTALS Cloud is a shared environment Cloud is a connected environment Cloud is a dynamic environment Therefore, cloud is vulnerable and exposed…
Cloud Security Challenges Security processes, approach and skillsets for cloud computing Consistent protections and policy management Consolidated visibility, logging and reporting Increasing sophistication of threats and malware Lateral spread of threats
4 Steps to Securing “ANY” Cloud CONTROL THE CLOUD PERIMETER Cloud providers don’t protect your Data and Applications SECURE THE CLOUD FROM THE INSIDE Segment and prevent lateral movement of threats MANAGE CONSISTENT SECURITY FOR HYBRID ENVIRONMENTS Deploy unified security management for your hybrid cloud AUTOMATE YOUR SECURITY Auto provision, Auto-Scale, Adaptive to changes
Cloud vendors don’t protect your Data and Applications STEP #1: CONTROL THE CLOUD PERIMETER Cloud vendors don’t protect your Data and Applications CLOUD Therefore: Advanced threat prevention should protect at the cloud perimeter
Micro-segment your cloud and control inside communication STEP #2: SECURE THE CLOUD FROM THE INSIDE Micro-segment your cloud and control inside communication Prevent lateral threats movement between applications App App App App
Deploy unified security management for your hybrid cloud STEP #3: MANAGE CONSISTENT SECURITY FOR HYBRID ENVIRONMENTS Deploy unified security management for your hybrid cloud Ensure policy consistency Reduce administrative costs ON-PREMISE CLOUD
[Protected] Non-confidential content STEP #4: AUTOMATE YOUR SECURITY Security should be as elastic and dynamic as your cloud Auto-provisioned Auto-scaled Adaptive to changes [Protected] Non-confidential content
Cloud Security Vendor Requirements Prevent lateral movement of threats between applications and not only at the perimeter Protect new IT services and applications in seconds not weeks Automatically be provisioned and scale within the environment without operational overhead Provide unified security management for all cloud and existing assets Allow licensing flexibility through BYOL or PAYG models
THE vSEC FAMILY Consistent security policy and control across ALL Private and Public Clouds ACI
[Internal Use] for Check Point employees THANK YOU [Internal Use] for Check Point employees