Upload
core-security
View
21
Download
1
Embed Size (px)
Citation preview
L E A R N M O R E
MIKE DESAISenior Vice President
L E A R N M O R E
RYAN ROWCLIFFESr. Manager Solution Architecture &
Enablement
• 4100+ data breaches
• Millions in financial harm
• $80B spent on Security
• Breaches still prevalent
63% 81%2015 2016
Percentage of hacking related breaches that leveraged either stolen and/or weak passwords.*
* 2017 Verizon Data Breach Investigations Report
Impact of a Data Breach
• Triggering Cyber Liability Insurance Policy
• Corporate Brand Damage• Loss of Revenue• Customer Churn
Anatomy of a Data BreachMajority of the breaches in the
enterprises start with social engineering and
phishing
Intruders gained access through a Citrix remote access portal set up for use by employees. {Home Depot Breach}
"The hackers acquired elevated rights that allowed them to navigate portions of Home Depot's network and to deploy unique, custom built malware on its self check out systems in the U.S. and Canada.” – eWeek
Our Approach
Focus on addressing the data breach problemEliminate the white noise between security solutionsVendors work together to ensure interoperabilityAll solutions will have product level integrationCreate a reference architecture Overall Goal: Protect. Detect. Remediate.
Network Security
Endpoint Security
Endpoint Security
Identity Security
Endpoint Security
Identity Security
Network Security
Identity Security
Endpoint Security
Identity Security
Security Information & Event Management
The Connected Security Alliance
A holistic approach to the data breach problem
The Connected Security Alliance
Network Security
Endpoint Security
Endpoint Security
Identity Security
Endpoint Security
Identity Security
Network Security
Identity Security
Endpoint Security
Identity Security
Security Information & Event Management
Pre Authentication Risk Analysis
• Over 3,000x more secure than 2FA alone
• Runs in the background, and doesn’t disrupt day-‐to-‐day usage
• Keeps checking after the log-‐in process for truly continuous authentication
2
Corporate Apps Launch Pad
1
Enter Corporate UID/PWD
3
Access to Cloud App
Required based on workflow
Transparent to user
Strong Security. Amazing User Experience
Adaptive Layers
T R U LY I N T E G R AT E D
All solutions pass rigorous interoperability testing to ensure they are compatible. The result is a reference architecture and documentation that can help
customers implement quickly and painlessly
A C T I O N A B L E I N T E L L I G E N C E
By providing multiple datasets to determine risk or evidence of the attack, Alliance products can
increase the chance of detecting a breach before it happens
F O UNDAT I O N O F I D E N T I T Y
Traditional perimeter security is failing due to the user of valid, yet compromised user credentials. Alliance members will leverage identity-‐context to detect and protect against bad actors
Benefits of a Holistic Approach
BE T T E R TO G E T H E R
By providing multiple datasets to determine risk or evidence of the attack, Alliance products can
increase the chance of detecting a breach before it happens