Zero Trust Network Architecture

Slides:



Advertisements
Similar presentations
Palo Alto Networks Jay Flanyak Channel Business Manager
Advertisements

Stonesoft Roadmap WHAT FEATURES WILL COME IN
Architecting and Building a Secure and Compliant Virtual Infrastructure and Private Cloud Rob Randell, CISSP, CCSK Principal Systems Engineer – Security.
1© Copyright 2011 EMC Corporation. All rights reserved. Anatomy of an Attack.
7 Effective Habits when using the Internet Philip O’Kane 1.
Security for Today’s Threat Landscape Kat Pelak 1.
11 Zero Trust Networking PALO ALTO NETWORKS Zero Trust Networking April 2015 | ©2014, Palo Alto Networks. Confidential and Proprietary.1 Greg Kreiling.
© 2015 Cisco and/or its affiliates. All rights reserved. 1 The Importance of Threat-Centric Security William Young Security Solutions Architect It’s Our.
Sophos / Utimaco Data Loss Prevention Peter Szendröi, SOPHOS Nordics Jan 20, 2010.
Global Information Security Issues According to the E&Y Global Survey, Managers Say the Right Thing… –90% of 1400 companies surveyed in 66 countries say.
RSA Approach for Securing the Cloud Bernard Montel Directeur Technique RSA France Juillet 2010.
MIGRATION FROM SCREENOS TO JUNOS based firewall
© 2014 Level 3 Communications, LLC. All Rights Reserved. Proprietary and Confidential. Polycom event Security Briefing 12/03/14 Level 3 Managed Security.
© 2003, Cisco Systems, Inc. All rights reserved _07_2003_Richardson_c11 Security Strategy Update Self Defending Network Initiative Network Admission.
© 2015 VMware Inc. All rights reserved. Software-Defined Data Center: Security for the new battlefield Rob Randell, CISSP Director/Principal Architect.
CISCO CONFIDENTIAL – DO NOT DUPLICATE OR COPY Protecting the Business Network and Resources with CiscoWorks VMS Security Management Software Girish Patel,
Sam Cook April 18, Overview What is penetration testing? Performing a penetration test Styles of penetration testing Tools of the trade.
© Centrify Corporation. All Rights Reserved. Unified Identity Management across Data Center, Cloud and Mobile.
1 1©2010 Check Point Software Technologies Ltd. | [Restricted] ONLY for designated groups and individuals |
Norman SecureSurf Protect your users when surfing the Internet.
Company LOGO Copyright Carrie Kerskie Data Breach & Identity Theft By Carrie Kerskie Kerskie Group, Inc.
1Cisco Security NOW © 2003, Cisco Systems, Inc. All rights reserved. THIS IS THE POWER OF CISCO SECURITY. now.
Security Framework For Cloud Computing -Sharath Reddy Gajjala.
Protecting Mainframe and Distributed Corporate Data from FTP Attacks: Introducing FTP/Security Suite Alessandro Braccia, DBA Sistemi.
1 Deployment of Computer Security in an Organization CE-408 Sir Syed University of Engineering & Technology 99-CE-282, 257 & 260.
Enterprise Computing Community June , 2010February 27, Information Security Industry View Linda Betz IBM Director IT Policy and Information.
Copyright © 2006 CyberRAVE LLC. All rights reserved. 1 Virtual Private Network Service Grid A Fixed-to-Mobile Secure Communications Framework Managed Security.
COPYRIGHT © 2007, PATRIOT TECHNOLOGIES, INC. THIRD PARTY BRANDS & NAMES ARE THE PROPERTY OF THEIR RESPECTIVE OWNERS Maryland Digital Government Summit.
Dell Connected Security Solutions Simplify & unify.
Asif Jinnah Microsoft IT – United Kingdom. Security Challenges in an ever changing landscape Evolution of Security Controls: Microsoft’s Secure Anywhere.
Web Application Firewall (WAF) RSA ® Conference 2013.
-Tyler. Social/Ethical Concern Security -Sony’s Playstation Network (PSN) hacked in April Hacker gained access to personal information -May have.
Secure Data Sharing What is it Where is it What is the Risk – Strategic > What Policy should be enforced > How can the process be Audited > Ongoing Process.
Symantec Targeted Attack Protection 1 Stopping Tomorrow’s Targeted Attacks Today iPuzzlebiz
Copyright © 2015 Centrify Corporation. All Rights Reserved. 1 Secure & Unified Identity for End Users & Privileged Users.
The Changing World of Endpoint Protection
CIO Perspectives on Security Fabrício Brasileiro Regional Sales Manager.
1© Copyright 2014 EMC Corporation. All rights reserved. Applying the Power of Data Analytics to Cyber Security Dr. Robert W. Griffin Chief Security Architect.
© Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. 1 Automate your way to.
Connected Security Your best defense against advanced threats Anne Aarness – Intel Security.
Information Security In the Corporate World. About Me Graduated from Utica College with a degree in Economic Crime Investigation (ECI) in Spring 2005.
Copyright © 2015 Centrify Corporation. All Rights Reserved. 1 Company Overview & Strategy Lance McAndrew Product Line Sales Engineer.
2© Copyright 2013 EMC Corporation. All rights reserved. Cyber Intelligence Fighting Cyber Crime Insert Event Date LEADERS EDGE.
©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties Check Point & Security Market June 2013.
Why SIEM – Why Security Intelligence??
1© Copyright 2012 EMC Corporation. All rights reserved. Next Generation Authentication Bring Your Own security impact Tim Dumas – Technology Consultant.
No boundaries with Unified Web Security Solutions Steven Vlastra Sr. Systems Engineer - Benelux.
Blue Coat Cloud Continuum
Copyright © 2015 Centrify Corporation. All Rights Reserved. 1 Securing Enterprise Identities Against Cyberthreats Brian Krause Manager of North America.
Stop Cyber Threats With Adaptive Micro-Segmentation
Juniper Software-Defined Secure Network
The Game has Changed… Ready or Not! Andrew Willetts Technologies, Inc.
Real-time protection for web sites and web apps against ATTACKS
Webinar Build Security Into Your Network’s DNA
WEBINAR Forrester Futurology Episode III: Trends For 2016 And Beyond
Threat Ready: The Benefits of Segmentation
Data protection in the “new threat” age
Secure & Unified Identity
بهترین راهکار را انتخاب کنید...
VMware NSX and Micro-Segmentation
Firewalls at UNM 11/8/2018 Chad VanPelt Sean Taylor.
Company Overview & Strategy
Understanding IDENTITY Assurance
Shifting from “Incident” to “Continuous” Response
CIPSEC architecture CIPSEC workshop Frankfurt 16/10/2018
Security Delivery Platform for the Micro-segmented Data Center
Security Trends and Threats Affecting Innovations in Technology
The Zero-Trust Model Redefining InfoSec.
In the attack index…what number is your Company?
Presentation transcript:

Zero Trust Network Architecture John Kindervag, Principal Analyst April 11, 2013

Agenda The new threat landscape Next gen security architecture for traditional networks Zero Trust – the next generation secure network

Agenda The new threat landscape Next gen security architecture for traditional networks Zero Trust – the next generation secure network

2011-2013 Notable Hacks RSA Epsilon Sony PSN Lockheed Martin Symantec Date Actor Attack Type Motive Data Impact RSA March 17, 2011 Advanced: State-sponsored APT – Targeted Malware Espionage – Intellectual Property RSA Secure ID token source code Potentially opens customers to attack Epsilon April 1, 2011 Unknown Not disclosed Financial Email addresses Brand damage, could lead to Spear Phishing attacks Sony PSN April 19, 2011 “Anonymous” suspected Hacktivism Personally Identifiable Information PII Sony PSN down: >$170M hard costs Lockheed Martin May 28, 2011 RSA Secure ID exploited Corporate Espionage Brand Damage Symantec February 8, 2012 Unknown perhaps “Anonymous” Extortion Source Code CIA February 10, 2012 “Anonymous,” DDoS None Website Offline Bit9 February 27, 2013 SQL Injection Create Attack Vector Companies using Bit9 were attacked Evernote March 3, 2013 Data Theft 50 Million customers passwords Password resets & possible data loss Source: CNET Hacker Chart: http://news.cnet.com/8301-27080_3-20071830-245/keeping-up-with-the-hackers-chart/ Source: CNET Hacker Chart: http://news.cnet.com/8301-27080_3-20071830-245/keeping-up-with-the-hackers-chart/ and http://www.privacyrights.org/data-breach/new.

Frequency of data breaches 25% of companies have experienced a breach during the last 12 months that they know of LL: Could we update the all report PDF screenshots to higher resolution? http://www.forrester.com/pimages/forrester/imported/forresterDotCom/Research/60564/60564_1.pptx Base: 1319 IT security decision-makers; Source: Forrsights Security Survey, Q3 2012

Data is the new oil Theme slide

Selling fresh vergin wordwide cvv GOOD OFFER SELLING hacked RDP GURANTED 24HOURS UP TIME ONLY 10$ Selling (Worldwide Cvvs, Worldwide Fullz, UK, Usa Logins Worldwide Dumps, UK, Usa Paypal, Ebay Accounts...) I need RDP UK US Germany To buy NOW VIA WMZ wana buy 9

Data Security And Control Framework Source: January 2012 “The Future Of Data Security And Privacy: Controlling Big Data”

Data Security And Control Framework Source: January 2012 “The Future Of Data Security And Privacy: Controlling Big Data”

Data Security And Control Framework Source: January 2012 “The Future Of Data Security And Privacy: Controlling Big Data”

Agenda The new threat landscape Next gen security architecture for traditional networks Zero Trust – the next generation secure network

TechRadar™: Network Threat Mitigation, Q2 ’12 May 2012 “TechRadar™ For Security & Risk Professionals: Zero Trust Network Threat Mitigation, Q2 2012”

Agenda The new threat landscape Next gen security architecture for traditional networks Zero Trust – the next generation secure network

Trust but verify

Which one goes to the Internet? UNTRUSTED TRUSTED

Zero Trust UNTRUSTED

Concepts of zero trust All resources are accessed in a secure manner regardless of location. Access control is on a “need-to-know” basis and is strictly enforced. Verify and never trust. Inspect and log all traffic. The network is designed from the inside out.

Building the Traditional Hierarchal Network Edge Core Distribution Access

Security Is An Overlay Edge FW IPS Email WCF WAF VPN DAM DLP DB ENC Core Distribution IPS IPS WLAN GW FW NAC Access

Deconstructing the Traditional Network Edge FW IPS Email WCF WAF VPN DAM DLP DB ENC Core Distribution IPS IPS WLAN GW FW NAC FW Access

Re-Building the Secure Network FW WLAN GW CRYPTO AM CF IPS WAF NAC FW IPS AC Email WCF DAM Packet Forwarding Engine DLP DB ENC VPN

Segmentation Gateway FW IPS CF AC Crypto AM NGFW Very High Speed Multiple 10G Interfaces Builds Security into the Network DNA

Zero Trust Drives Future Network Design MCAP – Micro Core and Perimeter MCAP resources have similar functionality and share global policy attributes MCAPs are centrally managed to create a unified switching fabric User MCAP WWW MCAP MGMT server Management = Backplane

Zero Trust Drives Future Network Design All Traffic to and from each MCAP is Inspected and Logged User MCAP WWW MCAP MGMT server SIM NAV DAN MCAP

Zero Trust Network is Platform Agnostic and VM Ready Creates VM friendly L2 Segments Aggregates Similar VM Hosts Secures VMs by Default User MCAP WWW MGMT server SIM NAV DAN MCAP WWW MCAP

Zero Trust Network Architecture is Compliant MGMT server WWW WWW MCAP User MCAP SIM NAV DAN MCAP WL MCAP

Zero Trust Network Architecture is Scalable MGMT server WWW WWW MCAP WL MCAP User MCAP SIM NAV DAN MCAP DB MCAP APPS MCAP

Zero Trust Network Architecture is Segmented WL MCAP DB MCAP User MCAP CHD MCAP APPS MCAP WWW MGMT server SIM NAV DAN MCAP WWW MCAP

Zero Trust Network Architecture is Flexible WL MCAP DB MCAP User MCAP CHD MCAP APPS MCAP WWW MGMT server SIM NAV DAN MCAP WWW MCAP

Zero Trust Network Architecture is Extensible WL MCAP DB MCAP User MCAP APPS MCAP CHD MCAP WAF WWW MGMT server SIM NAV DAN MCAP WWW MCAP

ZTNA Supports the Extended Enterprise WL MCAP DB MCAP User MCAP APPS MCAP CHD MCAP WAF WWW MGMT server SIM NAV DAN MCAP WWW MCAP

What about fabrics?

A Traditional Hierarchical Network Will Evolve To A Flatter, Meshed Topology Source: December 2010 “The Data Center Network Evolution: Five Reasons This Isn’t Your Dad’s Network”

A Traditional Hierarchical Network Will Evolve To A Flatter, Meshed Topology Source: December 2010 “The Data Center Network Evolution: Five Reasons This Isn’t Your Dad’s Network”

Zero Trust Network Architecture is Fabric Friendly Source: December 2010 “The Data Center Network Evolution: Five Reasons This Isn’t Your Dad’s Network”

Augment Hierarchal Networks with Zero Trust IPS Server farm WWW farm DB farm WAN WAF DAM CHD MCAP MGMT server WL MCAP User MCAP SIM NAV DAN MCAP

Zero Trust Multi-Dimensionality Zero Trust Data Identity: Treat data as if it’s living User identity (UID) Application identity (AID) Network User Transport Application Identity Generates traffic Generates traffic Context Data Idea: treat data as if it’s living Information Data Location Classification Type Data identity (DID)

Zero Trust Multi-Dimensionality Zero Trust Data Identity: Treat data as if it’s living Network Transport User identity (UID) User Application identity (AID) Application Data identity (DID) Data Monitored via DAN/NAV Idea: treat data as if it’s living Identity Context

http://us.fotolia.com/id/15840096 Trust But Verify

http://us.fotolia.com/id/13501861 Verify and Never Trust

Hard and Crunchy WL MCAP DB MCAP User MCAP CHD MCAP APPS MCAP WWW MGMT server SIM NAV DAN MCAP WWW MCAP

Summary Make the Network and Enforcement Point Zero Trust — “Verify and never trust!” Inspect and log all traffic. Design from the inside out. Design with compliance in mind. Embed security into network DNA. UNTRUSTED

Thank you John Kindervag +1 469.221.5372 jkindervag@forrester.com Twitter: Kindervag www.forrester.com - If you would like to include social media info (Twitter, blog, etc.), please add new lines below the email address but above the Web site.