ActiveGuard® U.S. Patent Nos 6,988,208; 7,168,093; 7,370,359; 7,424,743; 7,673,049: 7,954,159; 8,261,347. Canadian Patent No. 2,436,096. © 2014 Solutionary,

Slides:



Advertisements
Similar presentations
1© Copyright 2011 EMC Corporation. All rights reserved. The Future of the Advance Soc 3rd Annual Privacy, Access and Security Congress, Ottawa, 2012 Mike.
Advertisements

1© Copyright 2011 EMC Corporation. All rights reserved. Anatomy of an Attack.
Introducing WatchGuard Dimension. Oceans of Log Data The 3 Dimensions of Big Data Volume –“Log Everything - Storage is Cheap” –Becomes too much data –
The Most Analytical and Comprehensive Defense Network in a Box.
Solutions & Services to ‘Multiply your Business Performance’ 2013.
Preventing Good People From Doing Bad Things Best Practices for Cloud Security Brian Anderson Chief Marketing Officer & Author of “Preventing Good People.
Boost your network security with NETASQ Vulnerability Manager.
Unified Logs and Reporting for Hybrid Centralized Management
MyCloudIT Removes the Complexity of Moving Cloud Customers’ Entire IT Infrastructures to Microsoft Azure – Including the Desktop MICROSOFT AZURE ISV: MYCLOUDIT.
MIGRATION FROM SCREENOS TO JUNOS based firewall
seminar on Intrusion detection system
Barracuda Networks Confidential1 Barracuda Backup Service Integrated Local & Offsite Data Backup.
H-1 Network Management Network management is the process of controlling a complex data network to maximize its efficiency and productivity The overall.
Cloud Computing How secure is it? Author: Marziyeh Arabnejad Revised/Edited: James Childress April 2014 Tandy School of Computer Science.
1 Managed Security. 2 Managed Security provides a comprehensive suite of security services to manage and protect your network assets –Managed Firewall.
BMC Software confidential. BMC Performance Manager Will Brown.
Know the Difference™ ITIL Solution Martin Perlin Marketing Director, Evolven BOOST YOUR ITIL ® INITIATIVES Evolven Comparison assists in many ITIL v3 areas.
The Most Analytical and Comprehensive Defense Network in a Box.
1 Panda Malware Radar Discovering hidden threats Channel Presentation Name Date.
Dell Connected Security Solutions Simplify & unify.
Data Center Firewall. 2 Common IT Security Challenges Does my network security protect my IT environment and sensitive data and meet the regulatory compliances?
1 CISCO SAFE: VALIDATED SECURITY REFERENCE ARCHITECTURE What It Is Business Transformation Top Questions To Ask To Initiate The Sale Where It Fits KEY.
Alert Logic Security and Compliance Solutions for vCloud Air High-level Overview.
CUTTING COMPLEXITY – SIMPLIFYING SECURITY INSERT PRESENTERS NAME HERE XXXX INSERT DATE OF EVENT HERE XXXX.
The ProactiveWatch Monitoring Service. Are These Problems For You? Your business gets disrupted when your IT environment has issues Your employee and.
Alert Logic Security and Compliance Solutions for vCloud Air High-level Overview.
Introducing Microsoft Azure Government Steve Read Barbara Brucker.
Alert Logic Provides a Fully Managed Security and Compliance Solution Based in the Cloud, Powered by the Robust Microsoft Azure Platform MICROSOFT AZURE.
Developer TECH REFRESH 15 Junho 2015 #pttechrefres h Understand your end-users and your app with Application Insights.
Network security Product Group 2 McAfee Network Security Platform.
2015 Security Conference Dave Gill Intel Security.
Mailjet and Microsoft Azure Offer All-in-One Infrastructure and Deliverability while Saving IT and Enterprise Time and Money with Scalability MICROSOFT.
Copyright © 2014 Juniper Networks, Inc. 1 Juniper Unite Cloud-Enabled Enterprise Juniper’s Innovation in Enterprise Networks.
Data Center Management Microsoft System Center. Objective: Drive Cost of Data Center Management 78% Maintenance 22% New Issue:Issue: 78% of IT budgets.
INNOVATE THROUGH MOTIVATION MSP Services Overview KEVIN KIRKPATRICK – OWNER, MSP INC LOGO.
Zentera Guardia Fabric ™ Securely Connects Client-Server Apps between Microsoft Azure, Enterprise Datacenters & Other Public Clouds MICROSOFT AZURE ISV.
IS3220 Information Technology Infrastructure Security
Microsoft Azure and ServiceNow: Extending IT Best Practices to the Microsoft Cloud to Give Enterprises Total Control of Their Infrastructure MICROSOFT.
Sicherheitsaspekte beim Betrieb von IT-Systemen Christian Leichtfried, BDE Smart Energy IBM Austria December 2011.
2© Copyright 2013 EMC Corporation. All rights reserved. Cyber Intelligence Fighting Cyber Crime Insert Event Date LEADERS EDGE.
1© Copyright 2016 EMC Corporation. All rights reserved. VIRTUSTREAM XSTREAM APP DIRECTOR AUTOMATED, AGILE MANAGEMENT FOR SAP.
© 2011 IBM Corporation IBM Security Services Smarter Security Enabling Growth and Innovation Obbe Knoop – Security Services Leader Pacific.
Despite of spending high on digital information security, organizations still remain exposed to external threats. However, data center providers are helping.
Best-in-class enterprise backup for the mobile enterprise Prepared for [Insert customer name] [Date}
REMOTE MANAGEMENT OF SYSTEM
Your Office 365 Journey Prepare, Migrate, and Operate with Barracuda
OIT Security Operations
Avenues International Inc.
Barracuda Web Security Flex
Cloud Firewall.
Data Center Firewall.
Hybrid Management and Security
New Heights by Guiding Them into the Cloud
Security Methods and Practice CET4884
Active Cyber Security, OnDemand
AWS. Introduction AWS launched in 2006 from the internal infrastructure that Amazon.com built to handle its online retail operations. AWS was one of the.
Virtualization & Security real solutions
Capitalize on modern technology
THE NEXT GENERATION MSSP
11/17/2018 9:32 PM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
IS4680 Security Auditing for Compliance
Is your deployment in pants-down mode?
Securing the Threats of Tomorrow, Today.
DATS International Portfolio.
Overview UA has formed is forming a Security Operations Center (SOC) with Students supporting Tier 1 Activities. The SOC provides benefits to the University.
GRC - A Strategic Approach
Cloud Security AWS as an example.
Cloud Security AWS as an example.
Capitalize on Your Business’s Technology
Presentation transcript:

ActiveGuard® U.S. Patent Nos 6,988,208; 7,168,093; 7,370,359; 7,424,743; 7,673,049: 7,954,159; 8,261,347. Canadian Patent No. 2,436,096. © 2014 Solutionary, Inc. June 13, 2014 Does Security in the Cloud Get More or Less Complex? Jozef Krakora, Senior Product Manager October 7, 2014

Physical  Cloud - Benefits & Drawbacks InfrastructureBenefitsDrawbacks Physical Familiarity Reliable Known capacity & throughputs Security controls hardwired More expensive Long time for new hardware Long time for reconfigurations Cloud Elastic Cheaper Easier to manage Safer? Where is the Firewall & Perimeter? Where are my Assets? Where is the Data? Who controls what?

Which is Easier to keep Secure?

Solutionary Founded ActiveGuard ® V1 ActiveGuard 2 nd Patent Application & Database Security Monitoring Vigilant Minds Acquisition Buffer Zone (Cloud) Patent Inline Enrichment & Dynamic Correlation Advanced Detection Analytics ActiveGuard V4 Next-Gen Platform Gartner MQ Leader 2012 Trillionth Log Processed Acquired by NTT 2013 Big Data Analytics GTIR Published Raw Log Search GTIR Published 2014 Next Generation MSSP The Islands and the Ships Come and Go 4

But the Elements of Security Stay the Same Effectively plan and efficiently operate security controls –Broad experience, deep expertise to assist in planning and implementing security controls –Consistent, repeatable monitoring and management of security controls Continuously protect against threats –Harden your organization to maximize avoidable threats –Provide an advanced detective, investigative, and response capability to minimize the impact of threats Predict and prevent future threats through feedback –“Neighborhood watch” identifies threats before they can impact clients –Gather, analyze and validate global threat intelligence to create and deploy countermeasures 5

And Good Security Ties All the Pieces Together * Anti- Malware Endpoint IDS Firewall Asset Virus Malware Bytes-in Bytes-out Geography MHID User Compliance Criticality Internet AD xxxxx Incident Firewall, IDS Malware, Endpoint User Virus/Malware Asset Bytes in/out Geography Malicious * If you know where all the pieces are, what they are, and what they mean.....

55+M Pieces to be Exact  Into 7 Actionable Alerts Features Global Threat Intelligence — SERT Cross-device Correlation Advanced Threat Detection and Context-based Alerts Built-in Heuristics and Anomaly Detection Extension of the Internal Team Unparalleled, Passionate Customer Service 100% of collected logs are analyzed and retained for one year Analyzed by Security Experts 24/7 Portal Access with Industry, Compliance & Custom Reporting Benefits Peace of Mind Maximum Returns on Security Operations Investment or Spend Flexible, Easy-to-do Business with Partner Optimization of Existing Technology Investments Strengthened, Accelerated Security Program Reduced Cost of Security Eased Audits and Compliance Support Incident Response Preparedness (SERT CIR) 7 Events Alerted to Client Note: 15 minutes average per Event – 1 FTE = 2,080 hours

Today, Infrastructures Have At Least One Cloud 8 Regional Analyzer Internet Solutionary SOCs Cloud Environment WAN

Firewall & Perimeter PhysicalCloud Once place Fixed FW policy Fixed security log flow One FW administrator Many locations Many firewalls Numerous egress points Many security zones Constantly changing Numerous FW administrators

Malware & Intrusion Detection PhysicalCloud One egress Fixed internal networks Known DMZ and zones Known application pathways Limited threat pathways Many egress SDN  unpredictable number of internal networks and zones Difficult or impossible to cover all zones with malware and intrusion detection economically

Endpoint Security PhysicalCloud Fixed and knownInfinitely elastic Exponentially more risky

Users, Administrators and Domains PhysicalCloud Users known Administrators control user access to physical domains and endpoints Fixed and predictable domains with contents and perimeters easy to define and control # of users can be just as dynamic as # of endpoints Multiple administrators Legacy data center Cloud data center Virtualized infrastructure Dynamically growing applications and databases Dynamic domains with difficult to control perimeters and controls

Assets, Data and Compliance PhysicalCloud Assets are physical Data resides on Assets Compliance easy to map to Assets and Data Assets come and go Networks and perimeter dynamic Data is “swimming” from place to place Compliance becomes difficult to impossible to track without tremendous discipline

Geography PhysicalCloud Physical infrastructure is in one place With load balancing, virtual infrastructure, applications and data move from place to place Cloud providers guarantee locations to a degree, but the boat can still drift from one continent to another unless closely watched

Cloud Provisioning & Virtualization Administration PhysicalCloud n/aCloud Administrators (Amazon, Azure, etc.) Hypervisors and Host OSs Virtualization Management Consoles …

So, Is there Hope for Cloud Security? Despite the countless challenges that clouds introduce to security, with sufficient policy, process, discipline, and testing, cloud security can be achieved, and achieved at scale. But it is tricky!

And a Single Pain of Glass Helps

Additional Notes to work in Should have end to end visibility into and through the cloud Shouldn't be an island - ideally a single pane of glass to see what's happening where regardless of in the cloud or not You can outsource many things to a cloud provider But very hard to outsource risk and compliance requirements as they get more more detailed and involved with Still need to do all that you did before, Plus more SDN/virtual infrastructure admin monitoring, etc. Hacking the SDN admin console - increased risk…

ActiveGuard® U.S. Patent Nos 6,988,208; 7,168,093; 7,370,359; 7,424,743; 7,673,049: 7,954,159; 8,261,347. Canadian Patent No. 2,436,096. © 2014 Solutionary, Inc. June 13, 2014 Thank You!