Cloud-based S(ecurity)aaS enables business strategy Jason Georgi Director, Value Management Office.

Slides:



Advertisements
Similar presentations
Enabling business beyond the corporate network.
Advertisements

Agenda Product Overview Hardware Interfaces Software Features
Which server is right for you? Get in Contact with us
The Internet of Riedwaan Bassadien Platform Strategy Manager Microsoft Everything Your things.
February 6, 2014 Ambuj Goyal General Manager, System Storage & Networking IBM Systems and Technology Group Why Infrastructure Matters.
1 Vladimir Knežević Microsoft Software d.o.o.. 80% Održavanje 80% Održavanje 20% New Cost Reduction Keep Business Up & Running End User Productivity End.
Citrix Partner Update The Citrix Delivery Centre.
© 2014 Level 3 Communications, LLC. All Rights Reserved. Proprietary and Confidential. Polycom event Security Briefing 12/03/14 Level 3 Managed Security.
Top 10 Strategic Technology Trends for 2013 A Channel Partners Slide Show … as highlighted at.
Greg Pierce| Concerto Cloud Services Which Cloud is Right for Microsoft CRM?
Wireless Solution Training for the (Enterprise) Carpeted Office February 2004 Tina Herrera
© 2010 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice Ville Norpo Hewlett-Packard Oy
Mobility Without Vulnerability: Secure and Enable Your Mobile Users, Apps, and Devices David Clapp – Intuitive.
Polycom Conference Firewall Solutions. 2 The use of Video Conferencing Is Rapidly Growing More and More people are adopting IP conferencing Audio and.
Real world cloud computing challenges Giedrius Markevičius Territory account manager.
1 Monday, June 27, 2011Copyright© 2011 Dragnet Dragnet ® Cloud Service Introduction Matthew McLeod, Managing Director
How STERIS is using Cloud Technology to Protect Web Access Presented By: Ed Pollock, CISSP-ISSMP, CISM CISO STERIS Corporation “Enabling Business”
BI IN THE CLOUD: TIME TO TAKE THE PLUNGE? Sunil Murray Sales Director Birst
The Citrix Delivery Center. 2 © 2008 Citrix Systems, Inc. — All rights reserved Every Day, IT Gets More Complex EMPLOYEES PARTNERS CUSTOMERS.
SOLUTIONS FOR THE EFFICIENT ENTERPRISE Sameer Garde Country GM,India.
Dell Connected Security Solutions Simplify & unify.
BRING YOUR OWN DEVICE. BYOD AND THE IMPACT ON IT SECURITY BYOD and pressure employees put on IT organization to supply or allow consumer mobility devices.
Richard Tworek VP, Enterprise Communication Servers 2006 Technology Focus Enhancing the Human Experience with Enterprise Real-Time and Secure Converged.
Acquisition of NetScaler Mark Templeton, Citrix President and CEO B.V. Jagadeesh, NetScaler President and CEO June 2, 2005.
SAM for Virtualizatio n Presenter Name. Virtualization: a key priority for business decision makers Technavio forecasts that the global virtualization.
Marketing Information Technology in Emerging Markets: Hewlett-Packard in Latin America.
Securely Synchronize and Share Enterprise Files across Desktops, Web, and Mobile with EasiShare on the Powerful Microsoft Azure Cloud Platform MICROSOFT.
The Real Time Initiative Laying the foundation for a Real Time Enterprise Internet Telephony Conference & EXPO October 14, 2003.
Cloud Market Readiness Report Finance, Media, and Legal Sectors March 2014 Trend Consulting 2013.
Built on Azure, Moodle Helps Educators Create Proprietary Private Web Sites Filled with Dynamic Courses that Extend Learning Anytime, Anywhere MICROSOFT.
Deploying Windows 10 in the Enterprise Introduction and Windows as a Service Michael blogs.technet.com/mniehaus.
Copyright © 2014 Juniper Networks, Inc. 1 Juniper Unite Cloud-Enabled Enterprise Juniper’s Innovation in Enterprise Networks.
Thomas E. Noonan President and Chief Executive Officer Issues in eBusiness Security.
Microsoft Desktop Virtualization Kiran N R Optimized Desktop – TSP Microsoft Corporation.
Desktop Virtualization —An Elegant Solution Presented by Cloud Computing. Endless Possibilities. August 10, 2012.
VDI AND DAAS – SAY WHAT?!? Bob Marshall, MD MPH MISM FAAFP Faculty, Valley Family Medicine Residency Faculty, DoD Clinical Informatics Fellowship.
Infrastructure for the People-Ready Business. Presentation Outline POINT B: Pro-actively work with your Account manager to go thru the discovery process.
Created by Alexis Ford Research done by Rebecca Tanner Ford 1.
Mobile Security Solution Solution Overview Check Point Mobile Threat Prevention is an innovative approach to mobile security that detects and stops advanced.
Vodafone Business Cloud
MICROSOFT ENTERPRISE SOLUTIONS FOR LEADERS.  Business intelligence and Enterprise Resource Planning With powerful business intelligence and ERP solutions,
Workshifting Transform your business – empower your people.
1© Copyright 2012 EMC Corporation. All rights reserved. Next Generation Authentication Bring Your Own security impact Tim Dumas – Technology Consultant.
Total Enterprise Mobility Comprehensive Management and Security
No boundaries with Unified Web Security Solutions Steven Vlastra Sr. Systems Engineer - Benelux.
Designing Cisco Data Center Unified Fabric
SDN & NFV Driving Additional Value into Managed Services.
Direct-to-cloud Issues & Implications Dale McCarty.
A Shift in the Data Security Paradigm
ESign365 Add-In Gives Enterprises and Their Users the Power to Seamlessly Edit and Send Documents for e-Signature Within Office 365 OFFICE 365 APP BUILDER.
Barracuda Web Security Flex
Cloud adoption NECOOST Advisory | June 2017.
Challenges facing Enterprise Mobility
SmartHOTEL Planner Add-In for Outlook: Office 365 Integration Enhances Room Planning, Booking, and Guest Management for Small Hotels and B&Bs OFFICE 365.
Uniting Office 365 and PRINCE2, UPrince and Project Online Make Managing Structured Projects More Efficient Without Increased Overhead Costs OFFICE 365.
Unified Communications UCaaS
Soft1 Open Enterprise Edition Allows Customers to Easily Synchronize Files Using Microsoft Office 365 and Seamlessly Store Any Information in SharePoint.
CIOs, IT, and Digital Transformation
How Smart Networks are Changing Corporate Networks
A Modern Intranet Integration that Extends the Value of Your Microsoft Office 365 Deployment, Boosts Productivity, and Enhances Collaboration OFFICE 365.
How to prepare for the End of License of Windows Server 2012/R2
DESIGN, DEPLOY, COLLABORATE.
Skyhigh Enables Enterprises to Use Productivity Tools of Microsoft Office 365 While Meeting Their Security, Compliance & Governance Requirements Partner.
With IvSign, Office 365 Users Can Digitally Sign Word Documents in the Cloud from Any Device Without Having to Install Any Digital Certificates OFFICE.
File Manager for Microsoft Office 365, SharePoint, and OneDrive: Extensible Via Custom Connectors in Enterprise Deployments, Ideal for End Users OFFICE.
Druva inSync: A 360° Endpoint and Cloud App Data Protection and Information Management Solution Powered by Azure for the Modern Mobile Workforce MICROSOFT.
Crypteron is a Developer-Friendly Data Breach Solution that Allows Organizations to Secure Applications on Microsoft Azure in Just Minutes MICROSOFT AZURE.
BluVault Provides Secure and Cost-Effective Cloud Endpoint Backup and Recovery Using Power of Microsoft OneDrive Business and Microsoft Azure OFFICE 365.
Application Portfolio Optimization
Office 365 and Microsoft Project Integrations for HULAK Project Management Software Enable Teams to Remain Productive and Within Budget OFFICE 365 APP.
Presentation transcript:

Cloud-based S(ecurity)aaS enables business strategy Jason Georgi Director, Value Management Office

Speaker Bio Director of Zscaler’s Value Management Office Jason Georgi Accomplished technology innovation strategy expert, led GE’s Global Network Council and Infrastructure-as-a-Service programs. 20+ years diverse IT infrastructure experience.

Calling all thought leaders How many of you have been the voice of “No” for IT decisions? How many of you would like to be the hero by saying “Yes!” …securely Tomorrow’s IT needs bold, disruptive direction

Applying strategy means answering 3 key questions… 1 What are top priorities for today’s CEOs? 2 How do business priorities translate to IT strategy? 3 How does IT strategy impact the network & security

Today’s business outcomes CEO priorities 3 Competitive Advantage 1 Business agility 2 Innovation CIO priorities 3 User Experience 1 Simplification 2 Cost Reduction

Common themes

Where is today’s C-suite looking to enable strategy? All present new challenges CIOs need a cloud strategy or risk looking “less progressive” Enable the business for cloud & mobility Future-proof investments with rapidly-evolving landscape Data Center consolidation Provide secure access from any device, any time, anywhere 3 Growth Markets 1 Cloud Computing 2 Internet of Things (IoT)

Oh, and by the way… …IT and info sec now have board-level visibility The fear of exfiltration of intellectual property and reputation damage due to breach and advanced persistent threats grows with every story

Security needs and coverage have evolved

CORPORATE NETWORK DATA CENTER Secure In the past, security wasn’t such a big deal Secure Desktop HQ Regional offices THREATS relatively few... THE INTERNET Small and simple... no problem Viruses, worms......proxies were employee policing tools

Cloud adoption is shifting workloads

Internet Perimeter around the Data Center Internet gateway Mobile HQ Remote Offices Put users as close to workloads as possible Eliminate coverage gaps for mobile devices Mitigate circumventing security Reduce WAN-backhaul of Internet traffic

THREATS scary, advanced PEOPLE & ASSETS EVERYWHERE CORPORATE NETWORK DATA CENTERTHE INTERNET Today the world is distributed, the cloud is dominant and threats are vastly more advanced Branches/ stores Home offices Factories Laptop Desktop Secure Laptop MobileIoT At risk HQ Regional offices At risk Botnets APT Exploits Malware On-the-go At risk...proxies require advanced security and must be ubiquitous

What is the answer for Internet security?

Not appliances: they force you into tough choices HQ Regional offices Branches / stores Factories On-the-go Mobile Data center HQ Regional offices Branches / stores Factories On-the-go Mobile Internet …mobile users often go unprotected Backhauling traffic through the data center is slow and costly Installing boxes at many locations is expensive and complex

It's too expensive, complex and slow to deploy all of this security hardware everywhere… Here’s a real-world example Source: Global 50 company, Actual Internet Gateway diagram

ExploitsBotnetsAPTMalware Cloud-based Internet security puts a perimeter around the Internet HQ Branches / stores Home offices Factories Regional offices On-the-go …this is a strategy, not a spot solution

Why cloud for internet security?

Why not? Other business-critical applications are moving (or have already moved!) to the cloud Evolution in workload placement is destroying the status quo and the traditional “perimeter” CRM, B-I, ERP & Collaboration File Storage App Workloads

Cloud-based internet security solves today’s challenges Added layer of security Hardware obsolescence and consolidation Cloud-enabled global networks Mobile & BYOD Guest WiFi protection Makes organizations more adaptable and agile

Where is cloud for internet security an ideal fit? Any organization! Adds most strategic value Cloud-first organizations Distributed enterprises Global footprint Heavy road warrior & mobile population Need security without UX compromise

21 The TCO for Security as a Service is up to 80% lower than on- premise appliances 10% purchase costs 90% operating costs

Applying the concept

Protecting the distributed enterprise HQ Remote VPN User Corporate Data Center Branch Office Centralized visibility and control Limited deployment of security appliances Gateway stack provides effective protection for those ‘on net’ Branch Office

Protecting the distributed enterprise HQ Remote VPN User Branch Office Corporate Data Center Branch Office Long-haul Branch Office Road Warrior Expansion puts additional strain on gateways User experience suffers in large and/or long-haul offices Challenging providing same level of security for road warriors

Protecting the distributed enterprise HQ Remote VPN User Branch Office Corporate Data Center Branch Office Long-haul Branch Office Road Warrior Cloud-enabled networks = local internet breakouts You’re only as strong as your weakest point Expensive and complicated to deliver the appliance stack where needed

Protecting the distributed enterprise HQ Remote VPN User Branch Office Corporate Data Center Branch Office Road Warrior It doesn’t have to be this expensive or complicated…

Protecting the distributed enterprise HQ Remote VPN User Branch Office Corporate Data Center Branch Office Road Warrior Local breakouts wherever you need them Uncompromised, Ubiquitous protection Reduce MPLS WAN cost and footprint DMZ & Gateway Simplification/Con solidation

In summary

Strategy enabled Secure, local Internet breakouts Cloud-based Internet Security as a Service Data Center and DMZ Consolidation Improved User Experience leads to more productive workforce, anywhere, anytime. Simplification of IT infrastructure equates to less overhead, reduced cost and complexity Cost Reduction and Avoidance means the business can increase R&D funding Agility achieved through a more dynamic workforce and ability to penetrate markets quickly Competitive Advantage faster market penetration via nimble workforce and reduced IT cost puts money back into business Innovation through enabling IoT and improved R&D from IT cost reduction Network & Security OutcomeCIO PrioritiesCEO & Business Priorities

It’s time to be BOLD Navigating business strategy requires thought leaders Today’s threats put IT & Information Security on the front lines C-suite knows what’s possible, so the “find a way, or we'll find someone who will” ultimatums exist Don't let it scare you, let it inspire you to: Challenge the status quo (it's dead anyway) Be disruptive Keep your seat at the table!

Questions?

Thank you!