46
Get Your Head in the Cloud: A Practical Model for Enterprise Cloud Security Vishal Gupta, Vice President, Symantec Enterprise Security Group MAGIC SHOW How to deliver 47 slides in 15 minutes

Cyber Tech Israel 2016: Get Your Head in the Cloud

Embed Size (px)

Citation preview

Page 1: Cyber Tech Israel 2016: Get Your Head in the Cloud

Get Your Head in the Cloud: A Practical Model for Enterprise Cloud Security

Vishal Gupta, Vice President, Symantec Enterprise Security Group

MAGIC SHOW How to deliver 47 slides in 15 minutes

Page 2: Cyber Tech Israel 2016: Get Your Head in the Cloud

Copyright © 2014 Symantec Corporation2

WarningThis is a short fifteen minute presentation. No superfluous content is enclosed. There are no cloud adoption metrics, no data breach statistics, no distracting logos or graphics

and absolutely no diagrams with concentric circles, pyramids, arrows or other geometric shapes regularly used

to convey depth of information. No part of this presentation is fictional and all resemblance to real organizations and

people is completely intentional.

Page 3: Cyber Tech Israel 2016: Get Your Head in the Cloud

Copyright © 2014 Symantec Corporation3

there is only one word you need to know when talking about the cloud

Page 4: Cyber Tech Israel 2016: Get Your Head in the Cloud

Copyright © 2014 Symantec Corporation4

CONTROL

Page 5: Cyber Tech Israel 2016: Get Your Head in the Cloud

Copyright © 2014 Symantec Corporation5

all the benefits you receive from moving to the cloud: agility, elasticity, and low cost are received by giving up

Page 6: Cyber Tech Israel 2016: Get Your Head in the Cloud

Copyright © 2014 Symantec Corporation6

CONTROL

Page 7: Cyber Tech Israel 2016: Get Your Head in the Cloud

Copyright © 2014 Symantec Corporation7

all the challenges you face in the cloud: security, compliance, data residency, data privacy and management are rooted in your lack of

Page 8: Cyber Tech Israel 2016: Get Your Head in the Cloud

Copyright © 2014 Symantec Corporation8

CONTROL

Page 9: Cyber Tech Israel 2016: Get Your Head in the Cloud

Copyright © 2014 Symantec Corporation9

the only reason you have not moved your critical workloads to the cloud is because you cannot afford to give up

Page 10: Cyber Tech Israel 2016: Get Your Head in the Cloud

Copyright © 2014 Symantec Corporation10

CONTROL

Page 11: Cyber Tech Israel 2016: Get Your Head in the Cloud

Copyright © 2014 Symantec Corporation11

you want to keep the benefits but resolve the challenges

Page 12: Cyber Tech Israel 2016: Get Your Head in the Cloud

Copyright © 2014 Symantec Corporation12

CONTROL?how do you give it away and keep it at the same time

Page 13: Cyber Tech Israel 2016: Get Your Head in the Cloud

Copyright © 2014 Symantec Corporation13

WarningThis is a short fifteen minute presentation. No superfluous content is enclosed. There are no cloud adoption metrics, no data breach statistics, no distracting logos or graphics

and absolutely no diagrams with concentric circles, pyramids, arrows or other geometric shapes regularly used

to convey depth of information. No part of this presentation is fictional and all resemblance to real organizations and people is completely intentional.

Revised∧

just a few

Page 14: Cyber Tech Israel 2016: Get Your Head in the Cloud

Copyright © 2014 Symantec Corporation14

this is your enterprise – your temple of complete

CONTROL

Page 15: Cyber Tech Israel 2016: Get Your Head in the Cloud

Copyright © 2014 Symantec Corporation15

before cloud, you held your infrastructure and applications safe within its walls

---------------

Page 16: Cyber Tech Israel 2016: Get Your Head in the Cloud

Copyright © 2014 Symantec Corporation16

then cloud happened

---------------

Page 17: Cyber Tech Israel 2016: Get Your Head in the Cloud

Copyright © 2014 Symantec Corporation17

your infrastructure started moving over

---------------

CONTROLyou lost some

Page 18: Cyber Tech Israel 2016: Get Your Head in the Cloud

Copyright © 2014 Symantec Corporation18

---------------

your applications started moving over too ---------------

Page 19: Cyber Tech Israel 2016: Get Your Head in the Cloud

Copyright © 2014 Symantec Corporation19

---------------

---------------

CONTROLyou lost more

Page 20: Cyber Tech Israel 2016: Get Your Head in the Cloud

Copyright © 2014 Symantec Corporation20

---------------

---------------

in addition cloud endpoint, mobile, BYOD, have all spiraled

Page 21: Cyber Tech Israel 2016: Get Your Head in the Cloud

Copyright © 2014 Symantec Corporation21

---------------

---------------

CONTROL

out of your

Page 22: Cyber Tech Israel 2016: Get Your Head in the Cloud

Copyright © 2014 Symantec Corporation22

that teeny tiny bit is all you seem to have left

CONTROL

Page 23: Cyber Tech Israel 2016: Get Your Head in the Cloud

Copyright © 2014 Symantec Corporation23

CONTROLwould you like to get it back?

Page 24: Cyber Tech Israel 2016: Get Your Head in the Cloud

Copyright © 2014 Symantec Corporation24

audience tongue twister testcan you say the following

HE WHO CONTROLS THE CONTROL POINTS CONTROLS THE CONTROL

Page 25: Cyber Tech Israel 2016: Get Your Head in the Cloud

Copyright © 2014 Symantec Corporation25

CONTROL = CONTROL POINTS

Page 26: Cyber Tech Israel 2016: Get Your Head in the Cloud

Copyright © 2014 Symantec Corporation26

---------------

---------------

lets add some control (points) back to the picture

Page 27: Cyber Tech Israel 2016: Get Your Head in the Cloud

Copyright © 2014 Symantec Corporation27

---------------

---------------

endpoints

SaaS

IaaS/PaaSstorage

the cloud killed the perimeter – what shall we do about that control point?

Page 28: Cyber Tech Israel 2016: Get Your Head in the Cloud

Copyright © 2014 Symantec Corporation28

hold that thought

Page 29: Cyber Tech Israel 2016: Get Your Head in the Cloud

Copyright © 2014 Symantec Corporation29

also remember – cloud challenged SIEMhold that thought too

Page 30: Cyber Tech Israel 2016: Get Your Head in the Cloud

Copyright © 2014 Symantec Corporation30

A MODERN CONTROLS BASED MODEL FOR SECURITY

Page 31: Cyber Tech Israel 2016: Get Your Head in the Cloud

Copyright © 2014 Symantec Corporation31

securing the modern endpoint

Page 32: Cyber Tech Israel 2016: Get Your Head in the Cloud

Copyright © 2014 Symantec Corporation32

---------------

endpoints

the modern endpoint is heterogeneous

IaaS/PaaS

Page 33: Cyber Tech Israel 2016: Get Your Head in the Cloud

Copyright © 2014 Symantec Corporation33

traditional, mobile, multiple clouds devices, desktops, servers

---------------

endpoints

IaaS/PaaS

WE NEED HOMOGENOUS SECURITY ACROSS HETEROGENOUS ENDPOINTS

Page 34: Cyber Tech Israel 2016: Get Your Head in the Cloud

34

---------------

endpoints

IaaS/PaaS

ENDPOINT

REMEMBER… CONTROL = CONTROL POINTS

1 Grab a common security agent

2 Embed in your on-prem endpoints

3 Put it on your mobile endpoints

4 Natively integrate it into your IaaS/PaaS infrastructure

5 Enjoy the control• Homogenous policies• Visibility, Control and Compliance• Correlation and Analytics

Page 35: Cyber Tech Israel 2016: Get Your Head in the Cloud

Copyright © 2014 Symantec Corporation35

securing modern applications

Page 36: Cyber Tech Israel 2016: Get Your Head in the Cloud

Copyright © 2014 Symantec Corporation36

---------------

---------------

modern applications live in the cloud

SaaS

Page 37: Cyber Tech Israel 2016: Get Your Head in the Cloud

Copyright © 2014 Symantec Corporation37

---------------

---------------

we don’t control any part of that stackwhere shall we put our control point?

SaaSWE NEED A NEW CONTROL POINTTHE CLOUD SECURITY BROKER

Page 38: Cyber Tech Israel 2016: Get Your Head in the Cloud

Copyright © 2014 Symantec Corporation38

---------------

---------------

SaaS

APPLICATIONS

1 External control point

2 Proxy and API based

3 Context, content and identity aware

4 Enjoy the control• Email, storage and application support• Event monitoring, SSO, data protection• Compliance and audit ready

remember the first thought you were holdingTHE CLOUD SECURITY BROKER

Page 39: Cyber Tech Israel 2016: Get Your Head in the Cloud

Copyright © 2014 Symantec Corporation39

so what?

Page 40: Cyber Tech Israel 2016: Get Your Head in the Cloud

Copyright © 2014 Symantec Corporation40

---------------

endpoints

IaaS/PaaS

---------------

SaaS

storage

---------------

ANALYTICS

when all these control points can communicate intelligentlywhat you get is nothing short of

MAGIC

Page 41: Cyber Tech Israel 2016: Get Your Head in the Cloud

Copyright © 2014 Symantec Corporation41

---------------

endpoints

IaaS/PaaS

---------------

SaaS

storage

---------------

ANALYTICS

get ready to harness the power of the cloud

---------------

1 The cloud powered SOC

2 The future of SIEM – on-prem and cloud telemetry

3 Cross-control point data correlation

4 Enjoy the control• Advanced Threat Protection• User behavior, data flow and threat

intelligence• Prioritized and actionable

WITHOUT GIVING UP CONTROL

Page 42: Cyber Tech Israel 2016: Get Your Head in the Cloud

Copyright © 2014 Symantec Corporation42

there is only one word you need to know when talking about the cloud

Page 43: Cyber Tech Israel 2016: Get Your Head in the Cloud

Copyright © 2014 Symantec Corporation43

CONTROL

Page 44: Cyber Tech Israel 2016: Get Your Head in the Cloud

Copyright © 2014 Symantec Corporation44

actually, there is a second thing you need to know about control in the cloud

Page 45: Cyber Tech Israel 2016: Get Your Head in the Cloud

Copyright © 2014 Symantec Corporation45

you can have it today with

Page 46: Cyber Tech Israel 2016: Get Your Head in the Cloud

Thank you!

Copyright © 2014 Symantec Corporation. All rights reserved. Symantec and the Symantec Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners.This document is provided for informational purposes only and is not intended as advertising. All warranties relating to the information in this document, either express or implied, are disclaimed to the maximum extent allowed by law. The information in this document is subject to change without notice.

Vishal Gupta

46