Upload
others
View
1
Download
0
Embed Size (px)
Citation preview
Protecting Federal Agencies in a World without Walls
Copyright © 2019 Broadcom. All Rights Reserved. The term “Broadcom” refers to Broadcom Inc. and/or its subsidiaries.
Ju
Copyright © 2018 Broadcom. All Rights Reserved. The term “Broadcom” refers to Broadcom Inc. and/or its subsidiaries
Inside Out
BRIEFING DECK
Protecting Your Agency in a World without Walls
Copyright © 2019 Broadcom. All Rights Reserved. The term “Broadcom” refers to Broadcom Inc. and/or its subsidiaries.
Almost 4.5 billion records stolenworldwide in first half of 20182
Data breaches increased by 75%over the past two years1
$6 trillion in estimated global cybercrime damages by 20213
700 millionpeople worldwidewere victims ofcybercrime last year3
1. Information Age, September 20182. Business Wire, October 2018 3. Comparitech, October 2018
Cybercrime is booming…
Copyright © 2019 Broadcom. All Rights Reserved. The term “Broadcom” refers to Broadcom Inc. and/or its subsidiaries.
It’s all about the data…
who is accessing it… and how…
where its stored…
CloudEnvironments
VirtualServers
Traditional Data Centers
LegacyMainframe
Customers/Citizens
Privileged Users
Business Users
Developers
Devices
80%of data breaches involved privileged credentials1
1. Forrester, The Forrester WaveTM: Privileged Identity Management,Q4 2018, Andras Cser, November 14, 2018
Copyright © 2019 Broadcom. All Rights Reserved. The term “Broadcom” refers to Broadcom Inc. and/or its subsidiaries.
Privileged access is the main target for hackers…
CloudEnvironments
VirtualServers
Traditional Data Centers
LegacyMainframe
Privileged Users PRIVILEGEDACCESS MGMT
Customers/Citizens
Business Users
Developers
Copyright © 2019 Broadcom. All Rights Reserved. The term “Broadcom” refers to Broadcom Inc. and/or its subsidiaries.
But a malicious user can compromise a privileged user…
CloudEnvironments
VirtualServers
Traditional Data Centers
LegacyMainframe
Privileged Users PRIVILEGEDACCESS MGMT
MaliciousUser
But this can be mitigated with Threat Analytics…
THREATANALYTICS
Copyright © 2019 Broadcom. All Rights Reserved. The term “Broadcom” refers to Broadcom Inc. and/or its subsidiaries.
THREATANALYTICS
IAM solutions are leveraged to control access…
Customers/Citizens
Privileged Users
Business Users
How to handle business and external users…
CloudEnvironments
VirtualServers
Traditional Data Centers
LegacyMainframe
PRIVILEGEDACCESS MGMT
ACCESS MANAGEMENT
IDENTITY MGMT & GOVERNANCE
AGENCYDIRECTORY
Copyright © 2019 Broadcom. All Rights Reserved. The term “Broadcom” refers to Broadcom Inc. and/or its subsidiaries.
THREAT
ANALYTICS
Stronger authentication is required to identify users…
Customers/
Citizens
Privileged Users
Business Users
But what about the rash of stolen credentials…
Cloud
Environments
Virtual
Servers
Traditional Data
Centers
Legacy
Mainframe
PRIVILEGED
ACCESS MGMT
ACCESS
MANAGEMENT
2.3Bauthentication credentials stolenin 20171
1. Credential Spill Report, 2018
STRONG
AUTHENTICATION
IDENTITY MGMT &
GOVERNANCE
AGENCY
DIRECTORY
Copyright © 2019 Broadcom. All Rights Reserved. The term “Broadcom” refers to Broadcom Inc. and/or its subsidiaries.
THREATANALYTICS
API Gateways integrate these new interfaces…
Customers/Citizens
Privileged Users
Business Users
But users aren’t just accessing data from a browser…
CloudEnvironments
VirtualServers
Traditional Data Centers
LegacyMainframe
PRIVILEGEDACCESS MGMT
ACCESS MANAGEMENT
Mobile Apps
IoT
Browser
API GATEWAY
IDENTITY MGMT & GOVERNANCE
AGENCYDIRECTORY
Copyright © 2019 Broadcom. All Rights Reserved. The term “Broadcom” refers to Broadcom Inc. and/or its subsidiaries.
THREATANALYTICS
It provides SDK’s to integrate with Mobile Apps and IoT…
Customers/Citizens
Privileged Users
Business Users
The API Gateway integrates with PAM & IAM systems…
CloudEnvironments
VirtualServers
Traditional Data Centers
LegacyMainframe
PRIVILEGEDACCESS MGMT
ACCESS MANAGEMENT
STRONGAUTHENTICATION
Mobile Apps
IoT
Browser
API GATEWAY
IDENTITY MGMT & GOVERNANCE
AGENCYDIRECTORY
Copyright © 2019 Broadcom. All Rights Reserved. The term “Broadcom” refers to Broadcom Inc. and/or its subsidiaries.
THREATANALYTICS
Enabling developer velocity needed for the business…
Customers/Citizens
Privileged Users
Business Users
And you need the ability to develop and expose API’s…
CloudEnvironments
VirtualServers
Traditional Data Centers
LegacyMainframe
PRIVILEGEDACCESS MGMT
ACCESS MANAGEMENT
API GATEWAY
APIPORTAL
Developers APICREATOR
Copyright © 2019 Broadcom. All Rights Reserved. The term “Broadcom” refers to Broadcom Inc. and/or its subsidiaries.
Enterprise Security from the Inside Out…
Layer7 Security & Integration Portfolio
Data
Privileged Access Management• Securing privileged
users, accounts and
credentials
Threat Analytics• Monitor privileged user
activities for abnormal
usage
Identity and Access Management• Securing and governing
business and privileged
users
Authentication• Applying multifactor
credentials for logins
API Management• Connecting data
securely to apps
and devices
Broadcom Proprietary and Confidential. Copyright © 2018 Broadcom. All Rights Reserved. The term “Broadcom” refers to Broadcom Inc. and/or its subsidiaries.
Thank You