“ For A Moment, I Had A Feeling Of Total Security. Then Someone Said Cloud! “

Slides:



Advertisements
Similar presentations
Steve Jordan Director. Industry Solutions 05/05/14 Managing Chaos: Data Movement in 2014.
Advertisements

Serena Release Management Bridging Dev and Ops SERENA SOFTWARE INC. 05 Oct 2011 Presenter Name.
CA Confidential; provided under NDA. © 2014 CA. All rights reserved.2014 Industry Analyst Symposium | 1 Evolving Role of Mainframe in the Dynamic Data.
Solutions & Services to ‘Multiply your Business Performance’ 2013.
Validata Release Coordinator Accelerated application delivery through automated end-to-end release management.
Unified Logs and Reporting for Hybrid Centralized Management
DevOps and Private Cloud Automation 23 April 2015 Hal Clark.
Citrix Partner Update The Citrix Delivery Centre.
Rethinking Security to Enable Business LJ Johnson Nike’s Global Information Security Officer August 16, 2005.
July 8-9, 2014 | Ronald Reagan Building | Washington, DC Federal Cloud Computing Summit Dr. Barry C. West Cloud Tools and Integration.
It’s tough out there … Outperforming teams are collaborate extensively with their counterparts 54 % more likely to Developers 26.7% No executive.
Cisco Confidential 1 © 2012 Cisco and/or its affiliates. All rights reserved. Collaborative Professional Services (CPS) Smart Talk Series 303.
© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. HP Restricted. For HP.
Agile Testing with Testing Anywhere The road to automation need not be long.
Demonstrating IT Relevance to Business Aligning IT and Business Goals with On Demand Automation Solutions Robert LeBlanc General Manager Tivoli Software.
Cloud Attributes Business Challenges Influence Your IT Solutions Business to IT Conversation Microsoft is Changing too Supporting System Center In House.
1 Managed Security. 2 Managed Security provides a comprehensive suite of security services to manage and protect your network assets –Managed Firewall.
© 2009 IBM Corporation Delivering Quality Service with IBM Service Management April 13 th, 2009.
Cisco Confidential 1 © 2010 Cisco and/or its affiliates. All rights reserved. Data Center Solutions Marketing Data Center Business Advantage Customer Proof.
Enterprise DevOps Grid Jonny Wooldridge this deck available here:
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chris Wiborg Enterprise Architecture Marketing Manager Cisco Systems.
Dell Connected Security Solutions Simplify & unify.
© 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Confidential. For Channel Partners only. Do not distribute. C
1 IGT – Confidential IGT Cloud Caryn Cleereman Cloud Business Development & Sales Director.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
RIVERBED INTRODUCES NEW PLATFORM FOR ADC-AS-A-SERVICE New Stingray Services Controller Delivers Hyper-Elastic ADC Platform EXTREME ELASTICITY INSTANTLY.
© 2007 BigVisible Solutions, Inc. All Rights Reserved Training Solutions Agile Training Game v
What Is DevOps? DevOps is "a portmanteau of 'development' and 'operations'" and is "a software development method that stresses communications, collaboration,
IBM Bluemix Ecosystem Development Hands on Workshop Section 1 - Overview.
© Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. 1 Automate your way to.
Copyright © 2014 Juniper Networks, Inc. 1 Juniper Unite Cloud-Enabled Enterprise Juniper’s Innovation in Enterprise Networks.
1 Adopting and Embracing Open Source for NFV Guy Shemesh Senior Director for Cloud Solutions, CloudBand October 2015.
Rod Fontecilla, Ph.D. Vice President Application Services Nov 2015 Deploying Applications Using DevOps.
Robert Mahowald August 26, 2015 VP, Cloud Software, IDC
It’s tough out there … Software delivery challenges.
4/26/2017 Use Cloud-Based Load Testing Service to Find Scale and Performance Bottlenecks Randy Pagels Sr. Developer Technology Specialist © 2012 Microsoft.
© 2015 TriZetto Corporation Managed Services Overview Presenter Names 2.
Cisco Consulting Services for Application-Centric Cloud Your Company Needs Fast IT Cisco Application-Centric Cloud Can Help.
Simplify IT with Hyperconvergence June IT is Stuck Source: Goldman Sachs 40% 35% 30% 25% 20% 15% 10% 5% 0% 7%7% 7%7% 7%7% 36% 22% 8% 13% 8% 12%
SECURING THE SDLC Speed your innovation to market – securely Jeremy “Jet” Anderson
Banjot Chanana Sr Director of Product Docker for the Enterprise with Containers as a Service.
Structured Container Delivery Oscar Renalias Accenture Container Lead (NOTE: PASTE IN PORTRAIT AND SEND BEHIND FOREGROUND GRAPHIC FOR CROP)
READ ME FIRST Use this template to create your Partner datasheet for Azure Stack Foundation. The intent is that this document can be saved to PDF and provided.
Delivering on the Promise of a Virtualized Dynamic Data Center
Avenues International Inc.
Why does your datacenter need HyperConverged Infrastructure?
Partner Toolbox Cloud Infrastructure & Management
Juniper Software-Defined Secure Network
Hopefully a chuckle while the room fills before we begin
Hybrid Management and Security
Digital Workplace.
Cloud-First, Modern Windows Management and Security
Hopefully a chuckle while the room fills before we begin
CIOs, IT, and Digital Transformation
DevOps for the DBA Grant Fritchey Product Evangelist Redgate Software.
Speaker’s Name, SAP Month 00, 2017
DevOps CSCI 577b.
Healthcare Cloud Security Stack for Microsoft Azure
Protect | Transform | Innovate
Winter 2016 (c) Ian Davis.
Extending Your Integration Strategy
IBM Containers Docker in the Cloud
Healthcare Cloud Security Stack for Microsoft Azure
NSX Data Center for Security
Last.Backend is a Continuous Delivery Platform for Developers and Dev Teams, Allowing Them to Manage and Deploy Applications Easier and Faster MICROSOFT.
Cloud adoption NECOOST Advisory | June 2017.
4/3/2019 8:56 PM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS.
The Security Operations Hierarchy of Needs
SUSE CaaS and Dell EMC.
Healthcare Cloud Security Stack for Microsoft Azure
Presentation transcript:

“ For A Moment, I Had A Feeling Of Total Security. Then Someone Said Cloud! “

2 | © 2015 CloudPassage Confidential IT Security – The Missing Piece in IT Replatforming Steve Opfer Enterprise Sales Director

3 | © 2015 CloudPassage Confidential IT Replatforming – Next Gen, Gen 3, …

4 | © 2015 CloudPassage Confidential What’s Driving IT Replatforming? New Features = New Revenue The Business wants new features faster than ever IT has Responded ◦Virtualization ◦Self Service Development has Responded ◦DevOps ◦Rapid Releases ◦Cloud Test & QA Security has [Not] Responded ◦Current tools built for Gen 2 data center ◦In many cases, asking for things to Slow down ◦In other cases, pushed aside in acceptance of Risk Provisioning – Weeks to Minutes Release Cycle – Quarters to Days Change Breaks Security

5 | © 2015 CloudPassage Confidential Legacy Traditional Data Center Bare Metal Basic Virtualization

6 | © 2015 CloudPassage Confidential Modern UCS Director

7 | © 2015 CloudPassage Confidential Modern UCS Director

8 | © 2015 CloudPassage Confidential Modern UCS Director

9 | © 2015 CloudPassage Confidential Legacy Modern Seeks control to avoid risk Waterfall approach Low rate of change Data centers / colo Approval-driven Stringent change control Network-centric security IT focused (less customer-centric) More centralized IT operations Embraces risk to gain agility Fast-iteration approach High rate of change SDDC / cloud Learning-driven Little or no change control System & app-centric security Business focused (closer to customer) More distributed IT operations Legacy Modern Security Must: Embrace Both Legacy and Modern IT

10 | © 2015 CloudPassage Confidential Modern Legacy Experiments Innovation Greenfield Applications Any New Application Low-Risk Migrations High-Risk Migrations Core Business Applications “BUSINESS AS USUAL” Last Legacy Project IT Replatforming

11 | © 2015 CloudPassage Confidential Modern Legacy New Security Tool Research Experiments with Public Security Securing DevOps Full IT Security Replatforming Securing Low- Risk Apps Trusting Security to Protect your High-Risk Apps Wherever they Reside Network Security “BUSINESS AS USUAL” Server Security for Critical Apps IT Security Replatforming

12 | © 2015 CloudPassage Confidential JDFMAMJJASON Analysis and design Coding & implementationQuality testing Staging and release R1 Legacy Application Development (traditional waterfall)

13 | © 2015 CloudPassage Confidential Quality testing Staging and release JDFMAMJJASON Analysis and design Coding and implementation R1R12R11R10R2R3R4R5R6R7R8R9 Modern Application Development (agile / iterative)

14 | © 2015 CloudPassage Confidential Quality testing Staging and release JDFMAMJJASON Analysis and design Coding and implementation R1R12R11R10R2R3R4R5R6R7R8R9 Modern Application Development (agile / iterative) App 1 App 2 App 3 App 4 App n

15 | © 2015 CloudPassage Confidential Core security policies already implemented, regardless of environment Security unit-testing cases required, or code is rejected (yes, really) Code & infrastructure policies ensured using DevOps-style automation Staging smoke tests include automated pen-testing, vulnerability assessment, policy validation, security baselines (against gold master) JDFMAMJJASON R1R12R11R10R2R3R4R5R6R7R8R9 Weaving Security & Compliance into Modern AppDev / Devops All of this feeds into SIEM and GRC tools Quality testing Staging and release Analysis and design Coding and implementation

16 | © 2015 CloudPassage Confidential Everything “behind the firewall” Complete visibility & control Fewer changes at slower pace IT largely calls the shots Natural physical segmentation More controlled, paced cadence LegacyModern Assets are everywhere Inconsistent visibility & control More & faster changes (by OOM) Business units run their own IT Physical constructs are gone (portability) As-fast-as-automation-allows You Need Security That Embraces Both Modern and Legacy IT

17 | © 2015 CloudPassage Confidential 8 Keys To Securing The Transformation of IT 1.Built directly into core environments 2.Security that operates anywhere 3.Context-aware operation 4.Orchestration of many functions 5.Deep automation of each function 6.Instant and long-term scalability 7.Alignment with DevOps models 8.API-based integration capabilities This is the most profound IT transformation you’re likely to see in your career… make it count!

18 | © 2015 CloudPassage Confidential Questions or more importantly Thoughts/Comments?