Download presentation
1
Blue Coat Cloud Continuum
John Rose, Regional Account Manager
2
Seismic Shifts Causing Organizations to Rethink Security
EVOLVING NETWORK USAGE PATTERNS NEXT-GENERATION ENDPOINT REVOLUTION SHIFT TO CLOUD APPLICATION USAGE MODELS
3
Blue Coat Cloud Generation Security Ensuring Safe Passage to the Cloud
SWG CAS Cloud API Security Regional Office Roaming Users Next Generation Endpoints
4
Blue Coat Cloud Generation Security Ensuring Safe Passage to the Cloud
Security Platform for the Cloud Generation Hybrid Ensures Smooth Transition (Physical, Virtual, Cloud) Protects All Devices Regardless of Form Factor Delivers Architecture for Open Integration Enables Advanced Threat Protection Provides Integrated Cloud Security Application Visibility Application Control Cloud Data Protection Protects Cloud Workloads Ensures Protection Even With Encrypted Traffic Incident Visibility Across Cloud and On-Premise Interactions Performance Optimization for Sanctioned Applications SSL Encryption SWG CAS Regional Office Roaming Users Next Generation Endpoints
5
Secure Transition to Cloud as it Arises
Evolving to Deliver Cloud Generation Security Key Requirements to Protect the Organization Secure Transition to Cloud as it Arises Use the Cloud to Secure Interactions Provide Visibility Into Application Usage Ensure Control Over Cloud Application Usage Protect Data As It Interacts With The Cloud Dynamically Protect Workloads In The Cloud Protect Next-Generation Endpoints Deliver Device Agnostic Protection Ensure Architectural Advancement Provide Open Environment Advanced Inspection On-Prem / Cloud DLP & Capture Capabilities On-Prem / Cloud SSL Encryption Headquarters / Data Center Regional Office Roaming Users Next Generation Endpoints
6
The Cloud Continuum Customer Entry into Cloud Security
Anti-Malware Engine Black/White Listing File Reputation File Prevalence and Frequency Anti-Malware (Anti-Virus) Full Packet Capture Threat Forensics Incident Workflow Network Recording Reconstruction Forensics & Recording Data Sovereignty Cipher and Tokenization Inline Enforcement Based on Policy Encryption & Tokenization API Cloud Integration Data Origination and Destination Awareness Federated User- Based Policy Enforcement Data Discovery and Machine Learning Classification Real-Time Bi-Directional DLP Big Data Visualization Compliance Standards, Reporting & Enforcement Reporting & Audit PROTECTION & SECURITY COMPLIANCE & GOVERNANCE IP & URL Filtering Internet Classification Malnet & Reputation Machine Learning Multi-Language Real-Time Risk Scoring Adv. Malware (Sandbox) Customizable Detonation Environments Real-Time Detonation and File Analysis Evasion & Obfuscation Detection Analytics & Intelligence Cloud SOC Anomaly Detection User Risk Analysis Cloud Application Risk Scoring Integrated Cloud Data Analysis API Cloud Integration Machine Learning Data Algorithms Real-Time Data Aggregation Data Visualization and Compliance Reporting Access & Authorization Inline Policy Enforcement Federated Identity Integration Granular Access Policy for Thousands of Cloud Applications Visibility & Discovery Application Identification Library Risks Scoring per Application Compliance Reporting for Sanctioned & Unsanctioned Apps Federated Identity of User Behavior
7
The Cloud Continuum PROTECTION & COMPLIANCE & SECURITY GOVERNANCE
Anti-Malware (Anti-Virus) Forensics & Recording Encryption & Tokenization Real-Time Bi-Directional DLP Reporting & Audit PROTECTION & SECURITY COMPLIANCE & GOVERNANCE IP & URL Filtering Adv. Malware (Sandbox) Analytics & Intelligence Integrated Cloud Data Analysis Access & Authorization Visibility & Discovery
8
A World of Chaos Existing Cloud Security Model Limits Adoption
Complications of Cloud Protection Who Owns the Comprehensive Service Level Agreements? Single Pane of Glass? Redundancy & High- Availability? Vendor Compatibility? Cloud DLP Provider Cloud Data Encryption Provider 7 11 10 Complexity Manifested 2 8 3 9 Cloud Web Gateway Provider User to Web Gateway Web Gateway to DLP DLP to Web Gateway Web Gateway to Application Application to Access Control Access Control to Application Application to Data Encryption Data Encryption to Application Application to Web Gateway Web Gateway to DLP Web Gateway to User 12 4 6 1 Cloud Access Control Provider 5
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.