Download presentation
Presentation is loading. Please wait.
Published byLynn Hensley Modified over 9 years ago
1
BEN ROBINSON, ACCOUNT EXECUTIVE, PALO ALTO NETWORKS SAFELY ENABLE YOUR SAAS APPLICATIONS
2
2 | © 2015, Palo Alto Networks. Confidential and Proprietary. AGILITY DRIVING CHANGE Public Cloud (IaaS, PaaS) Software as a Service (SaaS) Private Cloud (SDN, NSX, ACI)
3
3 | © 2015, Palo Alto Networks. Confidential and Proprietary. DATA BREACHES SURGE Source: http://breachlevelindex.com/http://breachlevelindex.com/ MALICIOUS INSIDER 15% ACCIDENTAL DATA LOSS 25% MALICIOUS OUTSIDER 55% 1,541
4
4 | © 2015, Palo Alto Networks. Confidential and Proprietary. BUSINESS IMPACTS OF SAAS SANCTIONED Fast to deploy Minimal cost Infinitely Scalable UNSANCTIONED Violates Compliance Loss of corporate IP Malware distribution
5
5 | © 2015, Palo Alto Networks. Confidential and Proprietary. SAAS SECURITY REQUIREMENTS ANALYSIS Data volume and direction, malware and threats ENFORCEMENT Granular policy based on function VISIBILITY Apps, users, usages, categories and statistics
6
6 | © 2015, Palo Alto Networks. Confidential and Proprietary. SAAS DISCOVERY AND ANALYSIS New SaaS characteristics, ~400 apps, in 26 categories Leverage next-generation tools; NGFW, CASB, or CAP Build custom reports
7
7 | © 2015, Palo Alto Networks. Confidential and Proprietary. SAAS REPORTING
8
8 | © 2015, Palo Alto Networks. Confidential and Proprietary. SAAS SPECIFIC RISKS MALICIOUS DATA EXFILTRATION ACCIDENTAL DATA EXPOSURE MALWARE PROPAGATION
9
9 | © 2015, Palo Alto Networks. Confidential and Proprietary. MALWARE PROPAGATION
10
10 | © 2015, Palo Alto Networks. Confidential and Proprietary. Share With: Marketing Mark (CFO) mark Anyone with the link ACCIDENTAL DATA EXPOSURE
11
11 | © 2015, Palo Alto Networks. Confidential and Proprietary. Share all files publicly! MALICIOUS DATA EXFILTRATION
12
12 | © 2015, Palo Alto Networks. Confidential and Proprietary. SOLUTION REQUIREMENTS CONTEXTUAL CONTROL OF DATA EXPOSURE PROGRAMABLE DOCUMENT CLASSIFICATION MALWARE DETECTION AND REMOVAL DETAILED CONTENT INSPECTION AND ANALYTICS
13
13 | © 2015, Palo Alto Networks. Confidential and Proprietary. CLOUD DELIVERED SECURITY USER AGNOSTIC No agents required or app limitations PREVENTS THREATS Malware detection RETROACTIVE POLICY Policy applies to past and future events DEPLOYMENT AGNOSTIC No network changes or new HW/SW to install APERTURE
14
14 | © 2015, Palo Alto Networks. Confidential and Proprietary. CLOUD DELIVERED SECURITY APERTURE WILDFIRE
15
15 | © 2015, Palo Alto Networks. Confidential and Proprietary. SAAS SECURITY PILLARS VISIBILITY Applications usage and statistics SAAS ACCESS Access to and from SaaS applications SAAS CONTROL Data exposure and threat protection NGFW PLATFORM CASB/CAP
16
16 | © 2015, Palo Alto Networks. Confidential and Proprietary. COMPLETE SAAS SECURITY APERTURE GLOBALPROTECT WILDFIRE
17
17 | © 2015, Palo Alto Networks. Confidential and Proprietary. COMPLETE DATA SECURITY Public Cloud Software as a Service Private Cloud GLOBALPROTECT APERTURE
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.