Download presentation
Presentation is loading. Please wait.
Published byTamsin Paul Modified over 9 years ago
1
Cloud-based S(ecurity)aaS enables business strategy Jason Georgi Director, Value Management Office
2
Speaker Bio Director of Zscaler’s Value Management Office Jason Georgi Accomplished technology innovation strategy expert, led GE’s Global Network Council and Infrastructure-as-a-Service programs. 20+ years diverse IT infrastructure experience.
3
Calling all thought leaders How many of you have been the voice of “No” for IT decisions? How many of you would like to be the hero by saying “Yes!” …securely Tomorrow’s IT needs bold, disruptive direction
4
Applying strategy means answering 3 key questions… 1 What are top priorities for today’s CEOs? 2 How do business priorities translate to IT strategy? 3 How does IT strategy impact the network & security
5
Today’s business outcomes CEO priorities 3 Competitive Advantage 1 Business agility 2 Innovation CIO priorities 3 User Experience 1 Simplification 2 Cost Reduction
6
Common themes
7
Where is today’s C-suite looking to enable strategy? All present new challenges CIOs need a cloud strategy or risk looking “less progressive” Enable the business for cloud & mobility Future-proof investments with rapidly-evolving landscape Data Center consolidation Provide secure access from any device, any time, anywhere 3 Growth Markets 1 Cloud Computing 2 Internet of Things (IoT)
8
Oh, and by the way… …IT and info sec now have board-level visibility The fear of exfiltration of intellectual property and reputation damage due to breach and advanced persistent threats grows with every story
9
Security needs and coverage have evolved
10
CORPORATE NETWORK DATA CENTER Secure In the past, security wasn’t such a big deal Secure Desktop HQ Regional offices THREATS relatively few... THE INTERNET Small and simple... no problem Viruses, worms......proxies were employee policing tools
11
Cloud adoption is shifting workloads
12
Internet Perimeter around the Data Center Internet gateway Mobile HQ Remote Offices Put users as close to workloads as possible Eliminate coverage gaps for mobile devices Mitigate circumventing security Reduce WAN-backhaul of Internet traffic
13
THREATS scary, advanced PEOPLE & ASSETS EVERYWHERE CORPORATE NETWORK DATA CENTERTHE INTERNET Today the world is distributed, the cloud is dominant and threats are vastly more advanced Branches/ stores Home offices Factories Laptop Desktop Secure Laptop MobileIoT At risk HQ Regional offices At risk Botnets APT Exploits Malware On-the-go At risk...proxies require advanced security and must be ubiquitous
14
What is the answer for Internet security?
15
Not appliances: they force you into tough choices HQ Regional offices Branches / stores Factories On-the-go Mobile Data center HQ Regional offices Branches / stores Factories On-the-go Mobile Internet …mobile users often go unprotected Backhauling traffic through the data center is slow and costly Installing boxes at many locations is expensive and complex
16
It's too expensive, complex and slow to deploy all of this security hardware everywhere… Here’s a real-world example Source: Global 50 company, Actual Internet Gateway diagram
17
ExploitsBotnetsAPTMalware Cloud-based Internet security puts a perimeter around the Internet HQ Branches / stores Home offices Factories Regional offices On-the-go …this is a strategy, not a spot solution
18
Why cloud for internet security?
19
Why not? Other business-critical applications are moving (or have already moved!) to the cloud Evolution in workload placement is destroying the status quo and the traditional “perimeter” CRM, B-I, ERP Email & Collaboration File Storage App Workloads
20
Cloud-based internet security solves today’s challenges Added layer of security Hardware obsolescence and consolidation Cloud-enabled global networks Mobile & BYOD Guest WiFi protection Makes organizations more adaptable and agile
21
Where is cloud for internet security an ideal fit? Any organization! Adds most strategic value Cloud-first organizations Distributed enterprises Global footprint Heavy road warrior & mobile population Need security without UX compromise
22
21 The TCO for Security as a Service is up to 80% lower than on- premise appliances 10% purchase costs 90% operating costs
23
Applying the concept
24
Protecting the distributed enterprise HQ Remote VPN User Corporate Data Center Branch Office Centralized visibility and control Limited deployment of security appliances Gateway stack provides effective protection for those ‘on net’ Branch Office
25
Protecting the distributed enterprise HQ Remote VPN User Branch Office Corporate Data Center Branch Office Long-haul Branch Office Road Warrior Expansion puts additional strain on gateways User experience suffers in large and/or long-haul offices Challenging providing same level of security for road warriors
26
Protecting the distributed enterprise HQ Remote VPN User Branch Office Corporate Data Center Branch Office Long-haul Branch Office Road Warrior Cloud-enabled networks = local internet breakouts You’re only as strong as your weakest point Expensive and complicated to deliver the appliance stack where needed
27
Protecting the distributed enterprise HQ Remote VPN User Branch Office Corporate Data Center Branch Office Road Warrior It doesn’t have to be this expensive or complicated…
28
Protecting the distributed enterprise HQ Remote VPN User Branch Office Corporate Data Center Branch Office Road Warrior Local breakouts wherever you need them Uncompromised, Ubiquitous protection Reduce MPLS WAN cost and footprint DMZ & Gateway Simplification/Con solidation
29
In summary
30
Strategy enabled Secure, local Internet breakouts Cloud-based Internet Security as a Service Data Center and DMZ Consolidation Improved User Experience leads to more productive workforce, anywhere, anytime. Simplification of IT infrastructure equates to less overhead, reduced cost and complexity Cost Reduction and Avoidance means the business can increase R&D funding Agility achieved through a more dynamic workforce and ability to penetrate markets quickly Competitive Advantage faster market penetration via nimble workforce and reduced IT cost puts money back into business Innovation through enabling IoT and improved R&D from IT cost reduction Network & Security OutcomeCIO PrioritiesCEO & Business Priorities
31
It’s time to be BOLD Navigating business strategy requires thought leaders Today’s threats put IT & Information Security on the front lines C-suite knows what’s possible, so the “find a way, or we'll find someone who will” ultimatums exist Don't let it scare you, let it inspire you to: Challenge the status quo (it's dead anyway) Be disruptive Keep your seat at the table!
32
Questions?
33
Thank you!
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.