Presentation is loading. Please wait.

Presentation is loading. Please wait.

Best Practices for Securing Hybrid Clouds

Similar presentations


Presentation on theme: "Best Practices for Securing Hybrid Clouds"— Presentation transcript:

1 Best Practices for Securing Hybrid Clouds
9/12/2018 6:30 AM THR1084 Best Practices for Securing Hybrid Clouds Check Point vSEC for Microsoft Azure and Azure Stack Don Meyer Head of Marketing, Data Center and Cloud Security Check Point Software Technologies  [Internal Use] for Check Point employees​ © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

2 NEW IT DEMANDS Self Service Enable business agility, streamline processes, enhance competitive advantages, and lower IT costs Centrally Orchestrated Fully Automated Software Defined  [Internal Use] for Check Point employees​

3 [Internal Use] for Check Point employees​
THE MODERN NETWORK Software Defined Networking (SDN) and IaaS allow IT to deliver applications and services in a fraction of the cost and time  [Internal Use] for Check Point employees​

4 Cloud = Shared Responsibility
Customer responsible for protecting their apps and data in the cloud Azure responsible for protecting the cloud infrastructure  [Internal Use] for Check Point employees​

5 State of Cloud Cyber Security
Gizmodo.com – September 19, 2917 Lightreading.com – September 5, 2017 Scmagazine.com, September 5, 2017 And the hits just keep on coming . . . esecurityplanet.com, September 19, 2017 Sdtimes.com, June 20, 2017 pcmag.com, July 7, 2017  [Internal Use] for Check Point employees​

6 Cloud Security Challenges
Increasingly sophisticated attacks Lateral spread of threats “Authorized” accounts / users Consistent visibility, management and reporting  [Internal Use] for Check Point employees​

7 Traditional Security Not Designed for Cloud
Static controls Manually intensive Silo’d disciplines Lack of knowledge / expertise among DevOps Lack of cloud knowledge/experience from IT security teams  [Internal Use] for Check Point employees​

8 [Internal Use] for Check Point employees​
IT’S TIME FOR A NEW SECURITY MODEL  [Internal Use] for Check Point employees​

9 [Internal Use] for Check Point employees​
Cloud Security requirements 1. Comprehensive Security Protections Advanced Threat Prevention for cloud data and workloads 2. Automated Operations Provisioning tied to Cloud Management Platforms 3. Dynamic Policies Consistent management for Physical and Virtual Infrastructures 4. Centralized Management Single pane-of-glass experience across premise and all clouds  [Internal Use] for Check Point employees​

10 INTRODUCING CHECK POINT vSEC
Advanced Threat Prevention for Microsoft Azure and Azure Stack Hybrid Clouds  [Internal Use] for Check Point employees​

11 Best Practices for Securing Hybrid Cloud Environments
 [Internal Use] for Check Point employees​

12 [Internal Use] for Check Point employees​
STEP #1: CONTROL THE CLOUD PERIMETER Use advanced threat prevention at the cloud perimeter Securely connect your cloud with your on-premises environment CLOUD ON-PREMISES  [Internal Use] for Check Point employees​

13 [Internal Use] for Check Point employees​
STEP #2: PROTECT THE INSIDE Micro-segment your cloud to control inside communication Prevent lateral threat movement between applications App App App App  [Internal Use] for Check Point employees​

14 [Internal Use] for Check Point employees​
STEP #3: UNIFIED SECURITY MANAGEMENT Single console management for hybrid cloud (On-Premise and Cloud) Enforce consistent policies Reduce operation costs CLOUD ON-PREMISE  [Internal Use] for Check Point employees​

15 [Internal Use] for Check Point employees​
9/12/2018 6:30 AM STEP #4: AUTOMATE YOUR SECURITY Security as elastic and dynamic as your cloud Auto-provisioned Auto-scaled Adaptive to changes  [Internal Use] for Check Point employees​ © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

16 [Internal Use] for Check Point employees​
Putting it All Together . . . Azure Branch Offices / Mobile Users Private Subnet Public Subnet Availability Region 2 Smart Management Internet Load Balancer Check Point NGFW Azure Stack Private Subnet Public Subnet Check Point NGFW Customer Data Center Availability Region 1  [Internal Use] for Check Point employees​

17 [Internal Use] for Check Point employees​
Thank You! Stop by booth 807 to learn more . . .  [Internal Use] for Check Point employees​

18 Please evaluate this session
Tech Ready 15 9/12/2018 Please evaluate this session From your Please expand notes window at bottom of slide and read. Then Delete this text box. PC or tablet: visit MyIgnite Phone: download and use the Microsoft Ignite mobile app Your input is important! © 2012 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

19


Download ppt "Best Practices for Securing Hybrid Clouds"

Similar presentations


Ads by Google