Download presentation
Presentation is loading. Please wait.
1
Bill Banks | Security Engineer
Securing Someone Else’s Computer Why Cloud Security Should be a Priority Bill Banks | Security Engineer [Internal Use] for Check Point employees
2
[Protected] Non-confidential content
FROM DATA CENTER TO CLOUD DATA CENTER CLOUD WHAT USED TO TAKE WEEKS, WITH CLOUD TAKES MINUTES [Protected] Non-confidential content
3
[Protected] Distribution or modification is subject to approval
What Are Your Biggest Cloud Security Headaches? Loss of Control Consistency Compliance 2017 Cyber Security Survey (Check Point) [Protected] Distribution or modification is subject to approval
4
Therefore, cloud is vulnerable and exposed…
CLOUD FUNDAMENTALS Cloud is a shared environment Cloud is a connected environment Cloud is a dynamic environment Therefore, cloud is vulnerable and exposed…
5
Cloud Security Challenges
Security processes, approach and skillsets for cloud computing Consistent protections and policy management Consolidated visibility, logging and reporting Increasing sophistication of threats and malware Lateral spread of threats
6
4 Steps to Securing “ANY” Cloud
CONTROL THE CLOUD PERIMETER Cloud providers don’t protect your Data and Applications SECURE THE CLOUD FROM THE INSIDE Segment and prevent lateral movement of threats MANAGE CONSISTENT SECURITY FOR HYBRID ENVIRONMENTS Deploy unified security management for your hybrid cloud AUTOMATE YOUR SECURITY Auto provision, Auto-Scale, Adaptive to changes
7
Cloud vendors don’t protect your Data and Applications
STEP #1: CONTROL THE CLOUD PERIMETER Cloud vendors don’t protect your Data and Applications CLOUD Therefore: Advanced threat prevention should protect at the cloud perimeter
8
Micro-segment your cloud and control inside communication
STEP #2: SECURE THE CLOUD FROM THE INSIDE Micro-segment your cloud and control inside communication Prevent lateral threats movement between applications App App App App
9
Deploy unified security management for your hybrid cloud
STEP #3: MANAGE CONSISTENT SECURITY FOR HYBRID ENVIRONMENTS Deploy unified security management for your hybrid cloud Ensure policy consistency Reduce administrative costs ON-PREMISE CLOUD
10
[Protected] Non-confidential content
STEP #4: AUTOMATE YOUR SECURITY Security should be as elastic and dynamic as your cloud Auto-provisioned Auto-scaled Adaptive to changes [Protected] Non-confidential content
11
Cloud Security Vendor Requirements
Prevent lateral movement of threats between applications and not only at the perimeter Protect new IT services and applications in seconds not weeks Automatically be provisioned and scale within the environment without operational overhead Provide unified security management for all cloud and existing assets Allow licensing flexibility through BYOL or PAYG models
12
THE vSEC FAMILY Consistent security policy and control across ALL Private and Public Clouds ACI
13
[Internal Use] for Check Point employees
THANK YOU [Internal Use] for Check Point employees
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.