Upload
others
View
1
Download
0
Embed Size (px)
Citation preview
© Atos
What security measures should
be deployed to provide the
required assurance for a Trusted
Digital Workplace?
Gartner Session 14A – 16:05 ~ 16:50 (2019/08/05)
© Atos
Atos: Trusted Partner for your Digital Journey
Speaker: Olivier IssartelAtos Japan
Big Data & Security Division Director
9,800UK & IrelandUnited Kingdom, Ireland
13,000Benelux & The Nordics
Belarus, Belgium, Denmark, Estonia, Finland, Latvia,
Lithuania, Luxembourg, Poland, Russia,
Sweden, The Netherlands
12,500North American OperationsCanada, Guatemala, Mexico, Puerto Rico, USA
15,000France
8,700Central & Eastern Europe
Austria, Bosnia, Bulgaria, Croatia, Czech Republic,
Greece, Hungary, Italy, Romania, Serbia, Slovakia,
Switzerland
6,000IberiaAndorra, Portugal,
Spain, Canaries
3,000South AmericaArgentina, Brazil, Chile, Colombia, Peru, Uruguay,
Venezuela
39,000Asia Pacific
Australia, China, Hong Kong, India, Indonesia, Japan,
Malaysia, New Zealand, Philippines, Singapore,
Taiwan, Thailand
Headcount as of November 2018
1,000Middle East & Africa
Algeria, Egypt, Gabon, Ivory Coast, Israel, Lebanon, Madagascar, Mali, Morocco, Qatar, Saudi Arabia,
Senegal, South Africa, Tunisia, Turkey, United Arab Emirates
12,000Germany
120,000 Business Technologists working in over 73 countries.
Atos: a global workforce to cover our clients’ needs
3
for the Olympic Games
DigitalTransformation
Atos and the International Olympic Committee
Long-term relationship based on trust and proven performance since
BARCELONA
0
IT security events at Olympic Games Rio 2016
570,000,000
Offering end-to-end Cyber-Security for the Games
Fending off
Impact onthe Games
Potential IT threats are growing exponentially in the 21st century …
6
Big Data & Security DivisionExtreme performance and extreme security
HPC & Quantum Cyber Security Mission-Critical Systems
Bull Sequana S
Bull Sequana X
Quantum Learning Machine
Bull Sequana EdgeSatellite
validation + interference mitigation
Emergency management
Battle Management Avionics
Deployable tactical LTE
Ben Marine
Critical Coms
AuxyliumHoox
7
© Atos
What security measures should be deployed to
provide the required assurance for a Trusted
Digital Workplace?
Speaker: Alexis CauretteAtos Big Data & Security Global Business Line
Cybersecurity Products Vice President
9
The digital workplace
“It is not the strongest of the species that survives, nor the most intelligent that survives. It is the one that is the most adaptable to change”
Charles Darwin
With the rise of the Digital Transformation, the employee environment needs to evolve.
Each and every employee should be able to work any time, from anywhere and fromany device securely.
10
A growing market already digital
1 https://office365itpros.com/2019/04/25/office-365-reaches-180-million-users/2 https://9to5google.com/2019/02/04/g-suite-5-million-businesses/https://alpin.io/blog/g-suite-growth/
180 million users
27% growth yoy since 20151
5 million paying customers
30% growth between 2017 & 20182
The workplace security paradigm is changingwith Cloud Adoption
CLOUD ADOPTION
Protect Data and IP in a digital workplace and an infrastructure-less world
CLOUD AGE FOR DIGITAL NATIVES
Securing the workplace & the infrastructure in a borderless World
NOT SO LONG AGO
Infrastructure-centric: Securing the desktop and the borders of the infrastructure
LEGACY IT WORLD
11
Cybersecurity IndustrySpeed & super cycle of innovation
Host-Based(AV) 2000
LayeredNetwork
Defense 2005
Global reputation& Sandboxing
2010
Intelligence & Analytics
visibility 2018+
Thre
at
landscape
IndustryResponse
Big data = Big problems
Crime syndicates take a quantum leap
Systemic vulnerabilities
are weaponized
Smart machinescreate new risks
Mobile apps become the main route for compromise
Opaque algorithms compromise integrity
OT/Smart meterhacks surge
File-less malware are difficult to detect
Serverless computing
blurs thedefense zone
AI powered attacksCryptojacking/Drive-by mining
cross cloud attacks
Worms
DDoS
Exploiting known vulnerabilities
Cross-site scripting exploits
Spywares
Intelligent botnets
MassSpams
Virus
Trojans
Zero days
APTs
Ransomware
IoT botnets
12
13
Security Challenges
Secure the business data available on mobile devices, with BYOD solutions
Control the shadow IT
Prevent data leakage & high-risk behaviors
Work everywhere securely and ensure data confidentiality even in case of device loss
Protect your system from unauthorized remote access
14
What security measures?
ACCESS CONTROL ENCRYPTION IDENTITY MANAGEMENT MONITORING
PROTECT & PREVENT
15
The Atos conviction to bring trust in digital workplace
Device Security
BYOD, security at the device’s level
Workplace & SaaS Security
Activate and optimize the right security settings
Independent
Identity providerKeeping control on your
identities is critical. Bring Your Own ID
Data EncryptionBring Your Own encryption
key
Analytics & monitoring
Monitor your infrastructure on premise and in the cloud
▶ Worldwide trusted partner
– US CASB
– EU Encryption & IAM
▶ MSSP worldwide partner
– full end-to-end Managed Services
– delivered from Atos SOC
▶ Own IP for IAM and encryption
– integrated with MVISION Cloud
Conditional Access Enterprise
SaaS
Device Identity & Posture
SSO
API, SMTP
SAML SAML
Threat & Context Sharing
The door opener to access the Cloud securely
16
Use case: data sanctuaryHow to move VIP securely to the cloud?
17
The challenge
Why us?
Key benefits
▶ Can benefit from the GSuite (or O365) user experience while maintaining tight control over their data
▶ Solution which combines the concepts of (1) digital workplace + user experience and (2) security and data sovereignty
▶ Security model which promotes openness and sharing while increasing detections & controls
▶ Provide in a Cloud environment a secure workspace that enforces data sovereignty
▶ Allow the dynamics of collaboration
Transnational company in Energy & Utilities
18
User endpoint
Gmail / Outlook Online
+ Encryption
Identity & Access
Management
+VIRTRU
+Encryption
Identity management. Strong authentication
with soft tokens.
Gdocs/Office Editing
Use case: the data sanctuaryArchitecture
19
Key takeaways
Ensure the right security settings are implemented
Make sure you have defined and activated the right security settings
Manage your identities
Enable user identity lifecycle, compatible with on-premise and cloud applications for employees, contractors or customers. Control and own your employees identities
Protect your data and keep its ownership
Identify your critical data, encrypt the most sensitive one and keep ownership1
2
3
Atos, the Atos logo, Atos Syntel, Unify, and Worldline are registered trademarks of the Atos group. June 2019. © 2019 Atos. Confidential information owned by Atos, to be used by the recipient only. This document, or any part of it, may not be reproduced, copied, circulated and/or distributed nor quoted without prior written approval from Atos.
Thank youPlease visit our booth
Contact: Alexis CauretteCybersecurity Products Vice [email protected]