32
MANAGING APPLICATION CONNECTIVITY SECURELY THROUGH AN M&A Edy Almer, VP Products

Managing application connectivity securely through a merger or acquisition – Best Practices

  • Upload
    algosec

  • View
    147

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Managing application connectivity securely through a merger or acquisition – Best Practices

MANAGING APPLICATION CONNECTIVITY SECURELY THROUGH AN M&A

Edy Almer, VP Products

Page 2: Managing application connectivity securely through a merger or acquisition – Best Practices

GOALS FOR TODAY

2 | Confidential

Review real life customer use cases

Product overview and best practices to address these challenges

01

02

03

Analyze several typical M&A/divestiture scenarios

Summary & Q&A04

Page 3: Managing application connectivity securely through a merger or acquisition – Best Practices

SCENARIOS

• M&A – large company acquires small company. Integrate small company into large company, add branch offices, discard most small applications.

• M&A – merger of equals. Mix applications from both teams, consolidate data centers.

• Company split – replicate applications, split into separate data centers, split teams, replicate infrastructure.

3 | Confidential

Page 4: Managing application connectivity securely through a merger or acquisition – Best Practices

SCENARIO 1

4 | Confidential

Page 5: Managing application connectivity securely through a merger or acquisition – Best Practices

SCENARIO 2

5 | Confidential

Page 6: Managing application connectivity securely through a merger or acquisition – Best Practices

SCENARIO 3

6 | Confidential

Page 7: Managing application connectivity securely through a merger or acquisition – Best Practices

RECENT EXAMPLE

• Large multinational technology bought competitor to become #1 in their field

• During the merger analysis process, 2 product lines were found to be out of focus and were spun out as 2 individual companies

• The merger of backend and frontend applications is expected to be a 24-36 months process

• Divested companies will need their own IT within 6-9 months

• A large number of new hires, and people leave because of uncertainty

7 | Confidential

Page 8: Managing application connectivity securely through a merger or acquisition – Best Practices

FIRST STEP – MAP APPLICATIONS

• To divide the spoils – need to understand inventory

• Then need to replicate and cancel various applications

• Move them to new data centers

• When hard to move or split, create agreements for shared services, but add security controls

8 | Confidential

Page 9: Managing application connectivity securely through a merger or acquisition – Best Practices

MIGRATE APPLICATIONS

APPLICATIONS

500

An organization comprising an average of 20,000-50,000 people has

Page 10: Managing application connectivity securely through a merger or acquisition – Best Practices

MIGRATE APPLICATIONS

APPLICATIONS

800

An organization comprising an average of 20,000-50,000 people has

Page 11: Managing application connectivity securely through a merger or acquisition – Best Practices

MIGRATE APPLICATIONS

APPLICATIONS

1000

An organization comprising an average of 20,000-50,000 people has

Page 12: Managing application connectivity securely through a merger or acquisition – Best Practices

MIGRATE APPLICATIONS

APPLICATIONS

1500

An organization comprising an average of 20,000-50,000 people has

Page 13: Managing application connectivity securely through a merger or acquisition – Best Practices

MIGRATE APPLICATIONS

85%

APPLICATIONS1500

Page 14: Managing application connectivity securely through a merger or acquisition – Best Practices

HOW LONG TO MAP ?

14 | Confidential

A good consultant can do5 applications a week

• 5 consultants can map over 90% of applications in under a year

• Good CMDBs are over 95% accurate – can validate 2 applications a day

6 months?

Page 15: Managing application connectivity securely through a merger or acquisition – Best Practices

HOW MANY FLOWS ?

15 | Confidential

A simple application has 10 flows

A medium application has 25 flows

A complex application has over 100 flows

Page 16: Managing application connectivity securely through a merger or acquisition – Best Practices

HOW MANY APPLICATIONS DO YOU HAVE ?

• up to 500• 501-1000• 1001-2000• 2001+

POLL

Please vote using the “votes from audience” tab in your BrightTALK panel

Page 17: Managing application connectivity securely through a merger or acquisition – Best Practices

DO I HAVE TO MAP APPLICATIONS?

• If Security is a nice to have – two other methods are used – but they introduce risks:• Map all active flows, without understanding them, and transfer all of them

(can’t do a gradual project) – this does not work when applications move in several different directions

• Move all applications, then open all traffic blocked by the firewall in near real time (big impact on organization)

17 | Confidential

Page 18: Managing application connectivity securely through a merger or acquisition – Best Practices

IDENTIFYING THE CHALLENGES - SECURITY

• Visibility – what are the assets my organization is moving?• Do I keep using it ?

• What kind of security controls are in place if at all?

• What new servers am I adding ?

• Security Policy Management and Governance• Security policy definition and enforcement

• Monitor the environment for changes and create alerts

• Auditing and Adherence to Regulatory Compliance• Analyze the environment

• Identify risks and gaps

• Remediate

18 | Confidential

Page 19: Managing application connectivity securely through a merger or acquisition – Best Practices

SECURITY CHECK – AM I GOOD TO GO ?

• Application Connectivity• Discover and map connectivity requirements of existing and migrated

workloads

• Hybrid environments – distributed architecture

• Troubleshooting connectivity

• Change Management Process – Can I?• Define and enforce

• Orchestrate

• Automate

19 | Confidential

Page 20: Managing application connectivity securely through a merger or acquisition – Best Practices

TACKLING THE CHALLENGES

• Manually• Slow

• Time Consuming

• Error Prone

• Professional Services Team• Minimal, may not suffice

• Will not unearth problems

20 | Confidential

Page 21: Managing application connectivity securely through a merger or acquisition – Best Practices

THE SOLUTION

• Single pane of glass for your traditional, hybrid and multi-cloud estate

• The experience gained through years of experience across traditional environments is leveraged and put into practice

• A single solution that addresses the most common, important concerns and use cases rather than a multitude of small tools

• Automated discovery and security connectivity migration

21 | Confidential

Page 22: Managing application connectivity securely through a merger or acquisition – Best Practices
Page 23: Managing application connectivity securely through a merger or acquisition – Best Practices
Page 24: Managing application connectivity securely through a merger or acquisition – Best Practices
Page 25: Managing application connectivity securely through a merger or acquisition – Best Practices
Page 26: Managing application connectivity securely through a merger or acquisition – Best Practices
Page 27: Managing application connectivity securely through a merger or acquisition – Best Practices
Page 28: Managing application connectivity securely through a merger or acquisition – Best Practices
Page 29: Managing application connectivity securely through a merger or acquisition – Best Practices
Page 30: Managing application connectivity securely through a merger or acquisition – Best Practices

SUMMARY

30 | Confidential

Application connectivity migration tools critical to support these scenarios

Review of how AlgoSec supports application migrations scenarios for M&A

01

02

03

Reviewed and analyzed various M&A scenarios

Summary & Q&A04

Page 31: Managing application connectivity securely through a merger or acquisition – Best Practices

MORE RESOURCES

www.algosec.com/resources

WHITEPAPERS

PPT

DATASHEET