Security as an Enabler for Data Centers and Cloud Networks Adam Geller Vice President, Product Management July 16 th, 2013.

Slides:



Advertisements
Similar presentations
Impacts of 3 rd Party IaaS on broadband network operations and businesses Prabhat Kumar Managing Partner, i 3 m 3 Solutions.
Advertisements

Palo Alto Networks Jay Flanyak Channel Business Manager
New Solutions to New Threats. The Threats, They Are A Changing Page 2 | © 2008 Palo Alto Networks. Proprietary and Confidential.
System Center 2012 R2 Overview
Current impacts of cloud migration on broadband network operations and businesses David Sterling Partner, i 3 m 3 Solutions.
11 Zero Trust Networking PALO ALTO NETWORKS Zero Trust Networking April 2015 | ©2014, Palo Alto Networks. Confidential and Proprietary.1 Greg Kreiling.
Unified Logs and Reporting for Hybrid Centralized Management
MIGRATION FROM SCREENOS TO JUNOS based firewall
© 2014 Level 3 Communications, LLC. All Rights Reserved. Proprietary and Confidential. Polycom event Security Briefing 12/03/14 Level 3 Managed Security.
Does "The Cloud" Fit Into Your Organization? Tom Horan Meridian IT Inc. VP, Strategic Markets (847)
PCM2U Presentation by Paul A Cook IT SERVICES. PCM2U Our History  Our team has been providing complete development and networking solutions for over.
Plan Introduction What is Cloud Computing?
How to protect your Virtual Datacenter Michiel van den Bos.
“ Does Cloud Computing Offer a Viable Option for the Control of Statistical Data: How Safe Are Clouds” Federal Committee for Statistical Methodology (FCSM)
© Copyright 2011 Hewlett-Packard Development Company, L.P. 1 Sundara Nagarajan (“SN”) CLOUD SYSTEMS AUTOMATION.
The Virtualized Enterprise MORE FUNCTIONALITY AND REDUCED IT SPEND Speaker: Frank Grillo EVP of Marketing CYPRESS COMMUNICATIONS.
Market reaction to consumerization ““…pressure from users to support non IT-procured, or individual liable devices whilst still providing convenient.
1 CISCO SAFE: VALIDATED SECURITY REFERENCE ARCHITECTURE What It Is Business Transformation Top Questions To Ask To Initiate The Sale Where It Fits KEY.
© 2014 VMware Inc. All rights reserved. Palo Alto Networks VM-Series for VMware vCloud ® Air TM Next-Generation Security for Hybrid Clouds Palo Alto Networks.
OnlineOn Premises Hybrid Cloud on your terms Messaging Voice & Video Content Management Enterprise Social Reporting & Analytics Best experience across.
Acquisition of NetScaler Mark Templeton, Citrix President and CEO B.V. Jagadeesh, NetScaler President and CEO June 2, 2005.
Plan  Introduction  What is Cloud Computing?  Why is it called ‘’Cloud Computing’’?  Characteristics of Cloud Computing  Advantages of Cloud Computing.
1 MIKE MARCELLIN VP PRODUCT MARKETING. THE NEW NETWORK ENABLES CLOUD SERVICES, SECURITY, MOBILITY AND CONTENT DELIVERY NETWORKS.
CIO Perspectives on Security Fabrício Brasileiro Regional Sales Manager.
| Copyright© 2011 Microsoft Corporation 1 journey to the cloud KOEN VAN TOLHUYZEN TSP OFFICE 365 MICROSOFT CORPORATION.
Enterprise Cloud Computing
HP PPM Center release 8 Helping IT answer the tough questions
Copyright © 2014 Juniper Networks, Inc. 1 Juniper Unite Cloud-Enabled Enterprise Juniper’s Innovation in Enterprise Networks.
Comprehensive Project Management Solutions with the.NET Server family.
Information Systems in Organizations 5.2 Cloud Computing.
Enterprise’ Ever-Evolving Challenge & Constraints Dealing with BYOD Challenges Enable Compliance to Regulations Stay Current with New Consumption Models.
Barracuda Networks. Safe Public Cloud Transitions Why Barracuda? The Challenge When organizations move workloads to the public cloud, data protection.
Palo Alto Networks - Next Generation Security Platform
Private KEEP OFF! Private KEEP OFF! Open! What is a cloud? Cloud computing is a model for enabling convenient, on-demand network access to a shared.
CAMPUS LAN DESIGN GUIDE Design Considerations for the High-Performance Campus LAN.
Agenda  What is Cloud Computing?  Milestone of Cloud Computing  Common Attributes of Cloud Computing  Cloud Service Layers  Cloud Implementation.
Clouding with Microsoft Azure
Unit 3 Virtualization.
Avenues International Inc.
By: Raza Usmani SaaS, PaaS & TaaS By: Raza Usmani
Cloud adoption NECOOST Advisory | June 2017.
Barracuda Networks Creates Next-Generation Security Solutions That Enable Customers to Accelerate Their Adoption of Microsoft Azure MICROSOFT AZURE APP.
Hybrid Management and Security
Partner Logo Veropath Offers a Next-Gen Expense Management SaaS Technology Solution, Built Specifically to Harness Big Data Analytics Capabilities in Azure.
HUAWEI eSight Secure Center Feature Introduction
A10 Networks vThunder Leverages the Powerful Microsoft Azure Cloud Platform to Offer Advanced Layer 4-7 Networking, Security on a Global Scale MICROSOFT.
SMS+ on Microsoft Azure Provides Enhanced and Secure Text Messaging, with Audit Trail, Scalability, End-to-End Encryption, and Special Certifications MICROSOFT.
How Smart Networks are Changing Corporate Networks
Veeam Backup Repository
Infrastructure, Data Center & Managed Services
Company Overview & Strategy
Cloud Computing Dr. Sharad Saxena.
Technology Management- A CIO Perspective
Yellowfin: An Azure-Compatible Business Intelligence Platform That Connects People with Their Data for Better Decision Making MICROSOFT AZURE APP BUILDER.
11/17/2018 9:32 PM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
DeFacto Planning on the Powerful Microsoft Azure Platform Puts the Power of Intelligent and Timely Planning at Any Business Manager’s Fingertips Partner.
Excelian Grid as a Service Offers Compute Power for a Variety of Scenarios, with Infrastructure on Microsoft Azure and Costs Aligned to Actual Use MICROSOFT.
Datacastle RED Delivers a Proven, Enterprise-Class Endpoint Data Protection Solution that Is Scalable to Millions of Devices on the Microsoft Azure Platform.
TruRating: Mass Point-of-Payment Customer Rating System Uses the Power of Microsoft Azure to Store and Analyze Millions of Ratings for Business Owners.
The Next Generation Cyber Security in the 4th Industrial Revolution
Abiquo’s Hybrid Cloud Management Solution Helps Enterprises Maximise the Full Potential of the Microsoft Azure Platform MICROSOFT AZURE ISV PROFILE: ABIQUO.
FileFacets Information Governance Solution Performs High-Quality Automated Enterprise Content Management Migration, Built on Azure MICROSOFT AZURE APP.
Implementing enterprise cloud scenarios with Microsoft cloud services and platform offerings
Cloud Consulting Services and Solutions
2/25/2019.
Cloud Computing: Concepts
Zendos Tecnologia Utilizes the Powerful, Scalable
Salesforce.com Salesforce.com is the world leader in on-demand customer relationship management (CRM) services Manages sales, marketing, customer service,
Introduction to the 3rd Gen Fortinet Security Fabric
Productive + Hybrid + Intelligent + Trusted
Presentation transcript:

Security as an Enabler for Data Centers and Cloud Networks Adam Geller Vice President, Product Management July 16 th, 2013

2 | ©2012, Palo Alto Networks. Confidential and Proprietary. Evolving Network and Compute InfrastructureChanging Landscape for Security ThreatsDefining the Security Needs for the Data CenterThe “Right” Security as a Business Enabler

From hype to adoption  Tremendous growth in exploration and demand for public and private cloud  Success stories in SaaS, IaaS, PaaS, and of course traditional co-location and hosting 3 | ©2012, Palo Alto Networks. Confidential and Proprietary. “Cloud computing, along with other factors like consumerization and greater business involvement in tech spending, will bring major changes to the structure and distribution of ICT budgets.” “Cloud Investments Will Reconfigure Future IT Budgets” (Forrester Report January 2013) “Worldwide spending on public IT cloud services will be more than $40 billion in 2012 and is expected to approach $100 billion in 2016….public IT cloud services will enjoy a compound annual growth rate (CAGR) of 26.4%, five times that of the IT industry overall, as companies accelerate their shift to the cloud services model for IT consumption. “ “Worldwide and Regional Public IT Cloud Services Forecast “ (IDC Report, September 2012)

It’s a good time to be a service provider! 4 | ©2012, Palo Alto Networks. Confidential and Proprietary.

From a contained network to one without borders “Delivery models change, and the topics "cloud computing" and "virtualization" continue to dominate many discussions…” (Gartner MarketScope EMEA, 24 th Oct 2012) Legacy IT Infrastructure Local/CPE Branch Offices Emerging IT Infrastructure Hosted Cloud Managed Local/CPE Mobile Remote Social Virtualization Remote Employees Trusted Partners

Virtualization: Massive changes to the delivery model 6 | ©2013, Palo Alto Networks. Confidential and Proprietary.

7 | ©2012, Palo Alto Networks. Confidential and Proprietary. Evolving Network and Compute InfrastructureChanging Landscape for Security ThreatsDefining the Security Needs for the Data CenterThe “Right” Security as a Business Enabler

Loss of visibility from changed application behavior 8 | ©2012, Palo Alto Networks. Confidential and Proprietary.

Threats come from surprising places Application Usage and Threat Report – February 2013 “Application Usage and Threat Report” (Palo Alto Networks) February 2013  Aggregates application and threat logs  3,000+ organizations across the globe  95% of all exploit logs came from just 10 applications  9 of 10 are common business apps in data centers  MS-SQL  MS-RPC  SMB  MS SQL Monitor  MS Office Communicator  SIP  Active Directory  RPC  DNS 9 | ©2013, Palo Alto Networks. Confidential and Proprietary.

The actors have changed too Opportunists They’ll take whatever falls off the table Targeted Attacks They’re coming for you and you have no idea until it’s too late

New motivations and methods 11 | ©2012, Palo Alto Networks. Confidential and Proprietary. Blended Attacks Disguising traffic Visibility limitations of existing security technologies Political Motivations Financial Gain Intellectual Property Attackers Attacks

12 | ©2012, Palo Alto Networks. Confidential and Proprietary. Evolving Network and Compute InfrastructureChanging Landscape for Security ThreatsDefining the Security Needs for the Data CenterThe “Right” Security as a Business Enabler

Requirements to Secure Data Centers and Cloud Networks 13 | ©2013, Palo Alto Networks. Confidential and Proprietary. Visibility into ALL traffic in the data centerProtection against modern malware and attacksDeliver performance while implementing securityIntegration with existing data center architecturesCentralized management and policy automation

1. Visibility and 2. Protection: Next Generation Security a Business Enablement Tool  Applications: Enablement begins with application classification  Users: Tying users and devices to applications, regardless of location  Content: Scanning content and protecting against all threats, both known and unknown 14 | ©2012, Palo Alto Networks. Confidential and Proprietary.

Microsoft SharePoint Example 15 | ©2012, Palo Alto Networks. Confidential and Proprietary. Microsoft SharePoint: A business collaboration platform for the enterprise that allows users to share ideas on wikis and blogs, find people, and locate information. SharePoint also offers Interactive dashboards and scorecards to enable users to work with raw data. SharePoint sites are web applications served using the IIS web server and an SQL Server database as a data storage back end. SharePoint utilizes port 80 and port 443 for all functions.

Microsoft SharePoint: As Seen by Security Infrastructure 16 | ©2012, Palo Alto Networks. Confidential and Proprietary. App User Content Next Generation Security

3. Performance demands in data centers  Enterprises will require and service providers need to deliver rigorous SLA’s for uptime & availability  Demand for multi-gigabit performance continues to grow within data centers  Technology sprawl runs counter to the performance need  Traditional solutions with bolted-on security services increasingly choke off performance, making organizations take measures to ensure performance – including disabling security functionality! 17 | ©2013, Palo Alto Networks. Confidential and Proprietary. Enterprise Network IM DLP IPS Proxy URL AV UTM Internet Only next generation security is architected for near real-time multi-gigabit speeds

4. Integration: Data Center Designs Are Unique  Data centers are like snowflakes – their purpose and ingredients are similar all around the world  Every data center has racks, servers, apps, storage, switches, routers, etc.  Like snowflakes, every data center design is unique  Usually were designed with networking, rather than security, in mind  The network is the end-result of a series of past decisions and implementations  It’s not feasible to ask the data center operations team to change their design to integrate security 18 | ©2013, Palo Alto Networks. Confidential and Proprietary.

Integrate With Existing Data Center Architectures  Tap into existing switching infrastructure for traffic visibility, or to audit your network  Slip into existing topology without reallocating addresses or redesigning your network  Securely segment 2 or more networks, ideal for security between VLANs  Replace existing legacy security with a next-generation security, when you’re ready 19 | ©2013, Palo Alto Networks. Confidential and Proprietary. Tap ModeLayer 3 Mode Must speak the language of the network: OSPF RIP BGP PBF PIM-SM/SMM IGMP IPv6 NAT VLAN HA QoS Vwire Mode Layer 2 Mode

5. Centralized Management and Policy Automation  Global, centralized management of security, regardless if they’re physical or virtual platforms  Centralized logging and reporting  Scalability for single enterprises as well as multi- tenant scenarios  Integration into existing service provider operational support systems 20 | ©2013, Palo Alto Networks. Confidential and Proprietary.  Automatically provision security policies together with your existing orchestrated tasks  RESTful XML API over SSL connection enables integration with leading orchestration vendors  Derive management efficiencies via orchestrated:  Application/service/tenant resource allocations  Service state tracking  Policy mapping Integration With Orchestration Vendors

21 | ©2012, Palo Alto Networks. Confidential and Proprietary. Evolving Network and Compute InfrastructureChanging Landscape for Security ThreatsDefining the Security Needs for the Data CenterThe “Right” Security as a Business Enabler

Four business models for security 1.Security for the data center – protect the infrastructure (Internal) 2.Security as a service to sister companies (Internal service provider) 3.Security as an add-on service in data center and CPE (New revenue) 1.Managed FW, IPS, Threat Prevention, etc. 4.Security is fully embedded into core offerings (Advanced) 1.Secure Connectivity, Secure Cloud Services, Secure Storage, etc. 2.Creates competitive differentiation and opportunity for price premiums 22 | ©2012, Palo Alto Networks. Confidential and Proprietary.

Next Generation Security Services Packaging Examples PackagesBasicStandardAdvancedPremium Visibility Reports Safe enablement of applications (NGFW) NG Firewall + VPN Advanced Threat Mitigation (IPS, Network AV ) Advanced Threat Protection and Modern Malware Prevention 23 | ©2013, Palo Alto Networks. Confidential and Proprietary. Rapid DeploymentDifferentiation

Summary  Customer expectations are pressuring the network to change  Legacy security approaches cannot keep up with the changing environment  Next generation security is required for data centers and cloud networks  The “right” security can be a business enabler for service providers 24 | ©2012, Palo Alto Networks. Confidential and Proprietary.

Thank you! Booth #23 Adam Geller | Vice President Product Management Leticia Gammill | Regional Sales Manager Caribbean & Central America