Upload
others
View
0
Download
0
Embed Size (px)
Citation preview
© 2018 CenturyLink. All Rights Reserved. Services not available everywhere. © 2018 CenturyLink. All Rights Reserved.
Secure and optimise your global WAN, with
Adaptive Network Security
January 28th 2020
Saud Haq- Security Sales Specialist, EMEA
Graham Smith – Head of Security Solutions, EMEA
© 2018 CenturyLink. All Rights Reserved. © 2018 CenturyLink. All Rights Reserved. 2
An Introduction to CenturyLink
• 50k employees Internationally
• 60+ Countries
• $23 Billion revenue
Delivering Security Solutions since 1995
3,000+ Security Clients
Network Expansion
Datacenter Expansion
Cloud Migration
Global Expansion
2009
2017
2015
Digital Transformation
© 2018 CenturyLink. All Rights Reserved. © 2018 CenturyLink. All Rights Reserved. 3
Trusted connections that maximize
your digital opportunities
© 2019 CenturyLink. All Rights Reserved.
Provides internet
or voice to
~6Mconsumer broadband
subscribers in 37 states*
Approx.
450,000global route
miles of fiber
150,000+ on-net
buildings
Serves
customers in
60+countries
*As of 6/31/2019
© 2018 CenturyLink. All Rights Reserved. © 2018 CenturyLink. All Rights Reserved.
The Trusted Connection
to the Networked World
CenturyLink Security Mission
To efficiently secure
people, data and
things with an
adaptive security
ecosystem4
© 2018 CenturyLink. All Rights Reserved. © 2018 CenturyLink. All Rights Reserved. 5
Customer Business Challenges
Talent ChallengeNetwork Growth
& Change
Evolving Threat
Landscape
Security Complexity
Finding high caliber talent
that can surmount these
obstacles is rare
Increasingly difficult to
effectively manage cyber
security in-house
Volume and velocity of data
and traffic exploding due to
5G, IoT, connected devices
Changing Environment with
customer applications
migrating to the Cloud
Cybercrime is lucrative with low
barrier to entry
Threats proliferating from spam,
fraud, breaches and attacks
No one is immune - not
government large or small, local
or international business,
individuals, consumers
Organizations must protect their
expanding perimeters delivering
consistent end user experience
without compromising
performance
Business leaders bear burden
of stitching together security
solutions based on vast security
ecosystem of competitive
platforms
+
© 2018 CenturyLink. All Rights Reserved. © 2018 CenturyLink. All Rights Reserved.
Digital Trends…
Public
Head Office Remote OfficesMobile Workers
© 2018 CenturyLink. All Rights Reserved.
Adaptive Networking
IT Agility
Connected Security
The Pillars of Digital Business
© 2018 CenturyLink. All Rights Reserved.
CenturyLink, a network companyWhy work with us?
On-Net Market
CenturyLink Network
Local Serving Areas (US)
Map information above is current as of March 2018. Information is subject to change. Contact CenturyLink for
updates or details. CenturyLink’s global network is made up of owned, leased access and IRU segments, which
are not distinguished on this map. CenturyLink engages in-region carriers to provide services in some markets.
© 2018 CenturyLink. All Rights Reserved.
CenturyLink Internet ExcellenceGlobal Peering
CenturyLink Peering Points and/or Large Wholesale customers
Traditional Peering Points
• CenturyLink localised private peering with
private interconnects maximises performance
• Traditional peering points results
in unnecessary latency
• Allows CenturyLink to exchange IP traffic in
the market traffic originates and terminates
Map information above is current as of March 2018. Information is subject to change. Contact CenturyLink for
updates or details. CenturyLink’s global network is made up of owned, leased access and IRU segments, which
are not distinguished on this map. CenturyLink engages in-region carriers to provide services in some markets.
© 2018 CenturyLink. All Rights Reserved. © 2018 CenturyLink. All Rights Reserved.
Big Data Analytics / Machine Learning
Map information above is current as of April 2017. Information is subject to change. Contact CenturyLink for updates or details. CenturyLink’s global network is made
up of owned, leased access and IRU segments, which are not distinguished on this map. CenturyLink engages in-region carriers to provide services in some markets.
We track
1.2 millionThreats per day
We respond to and
Mitigate 120DDoS attacks a day
We monitor over
140 billionNetFlow sessions per day
We collect
800 millionDNS queries per day
We ‘takedown’ over
40new C2s a month
We track over
15,000 C2sper day
We Stop
More.
Security on a truly Global scale
© 2018 CenturyLink. All Rights Reserved.
CenturyLink®
Adaptive Threat
Intelligence
CenturyLink®
Security Log
Monitoring (SLM)
CenturyLink® DDoS
Mitigation Service
CenturyLink®
Network and
Premises Firewall
Services
CenturyLink® Professional Security and Consulting Services
See More. Stop More.
Network-integrated. Cloud-delivered.
The CenturyLink Network
8 Global Security Operations Centers & 11 Regional Scrubbing Facilities
CenturyLink® Black Lotus Labs
© 2018 CenturyLink. All Rights Reserved. © 2018 CenturyLink. All Rights Reserved. 12
CenturyLink Managed Security FirewallsMultiple deployment options designed to meet needs of today’s hybrid network delivered under
consistent security experience
Adaptive Network Security
Centrally managed security built
within the cloud
• Secure access to private
networks or cloud providers
• Secure internet connectivity
• Virtual Sandbox
• Rapid deployment
• Built within CTL network to
leverage local Internet peering
points and minimize latency
SD-WAN Security
SD-WAN’s built in firewall for
basic Internet protection
• Low cost
• Split tunneling
• Customer managed
• Optional monitoring &
management services
Primary
Managed Premises
Dedicated managed firewalls at
customer premise
• Multiple vendor options
• Design, installation &
configuration services
• Optional managed take-over
of customer equipment
• Integrated routing and firewall
capabilities
• Co-Management Options
Powered By CenturyLink Threat Intelligence, Global SOC
CenturyLink Managed & Monitored
© 2018 CenturyLink. All Rights Reserved.
Adaptive Network Security
Next Gen FirewallHigh Availability, 99.999%
Uptime
Data Loss PreventionExamines network traffic and
blocks sensitive content from
being distributed outside of a
customers organization
IPS/IDSScans, Blocks and Reports on
Malicious Code Found in
Network Traffic
Content/URL FilteringRestrict and control content
available to users found
objectionable
Application Awareness
& ControlAllows or denies network
application usage based on
policies established by network
administrators
Anti-malware +
SandboxingScans, Blocks and Reports on
Malicious Code Found in
Network Traffic
MobilityEnables customers to securely
access enterprise resources
from a variety of Internet-
enabled endpoints
© 2018 CenturyLink. All Rights Reserved. © 2018 CenturyLink. All Rights Reserved. 14
CenturyLink’s Global Security Investments
On-Net Market
CenturyLink Network
London, UK
Singapore
Bangalore, IN
Buenos AiresSydney, AU
Hong Kong
Tokyo, JP
SOC
ANS Gateway
SLM Platform
Hosted Security Environments
DDoS Scrubbing Centres
Map information above is current as of June 2019. Information is subject to change. Contact CenturyLink for
updates or details. CenturyLink’s global network is made up of owned, leased access and IRU segments, which
are not distinguished on this map. CenturyLink engages in-region carriers to provide services in some markets.
© 2018 CenturyLink. All Rights Reserved. © 2018 CenturyLink. All Rights Reserved. 15
Today’s Hybrid Security ModelMost firewall deployments are not “one size fits all”
• Customers need a security model that
supports their hybrid network
• Security model must support of mix of
static and remote users connecting from
public and private connections (SD
WAN and VPN)
• Customers need consistent policies,
event management and customer
experience across hybrid security
environment
Medium OfficeSmall Office
SD-WAN Overlay
Large Office
CenturyLink
MPLS
Internet:
Broadband, DIA
Datacenter
Large Office
Mobile User
© 2018 CenturyLink. All Rights Reserved. © 2018 CenturyLink. All Rights Reserved. 16
Typical Firewall DeploymentsAny organization that is connected to the Internet must have a firewall
Firewall at each
customer location
Firewall at key Data
Centers and internet traffic
backhauled through VPN
Internet traffic flows over encrypted
connections to Adaptive Network
Security firewall
Internet traffic drains out
through VPN to Adaptive
Network Security firewall
Dedicated equipment
deployed physically at
customer premise or
hosted facility
Multi-tenant firewall
hosted in managed
service provider’s facility
HQ
Branch Offices
HQ
Branch Offices
CenturyLink
Private Cloud
Managed Premise
Firewall Services
Adaptive Network
Security → Cloud
Delivered Network
Firewall Services
HQ
Branch Offices
HQ
Branch Offices
Public Internet
Public Internet
Public Internet Public Internet
© 2019 CenturyLink. All Rights Reserved. Speaking now:
Adaptive Network Security
SD-WAN Site
Cloud,
Providers
SaaS
Providers
Office 365, Salesforce
Box, Workday, etc
Internet
Open
Internet Apps
Mobile Users
Branch Office
Private MPLS
Network
Google, CNN, BBC,
LinkedIn, Facebook, etcAWS, Microsoft Azure,
Google Cloud
MPLS
SDWAN
SD-WAN Site
Cloud Connect NNI
Public Cloud
SWG
▪ No software or hardware for customer to deploy
▪ Built within the CenturyLink network to leverage local
Internet peering points and minimize latency
▪ Highly available service provided by redundant network
architecture
▪ Configure one set of firewall policies to secure many
locations
▪ Supports third party Internet connectivity – don’t have to
use CenturyLink transport
© 2018 CenturyLink. All Rights Reserved. © 2018 CenturyLink. All Rights Reserved.
Q & A
Available in NA, EMEA, and APAC. Not available in LATAM. Not all AMS Roles available in all CenturyLink Regions.
© 2018 CenturyLink. All Rights Reserved. © 2019 CenturyLink. All Rights Reserved.
For more information: https://www.centurylink.co.uk/security.html
Threat Report:
https://www.centurylink.com/asset/business/enterprise/report/2019-threat-
research-report.pdf
CONTACTS