Cloud Access Security Broker. Ted Hendriks HP Atalla Pre-Sales Consultant, APJ Region HP Enterprise Security Products

Similar documents
HP Atalla. Data-Centric Security & Encryption Solutions. Jean-Charles Barbou Strategic Sales Manager HP Atalla EMEA MAY 2015

What you need to know about Office 365

The Case For A Cloud Access Security Broker

Visibility and Control for Sanctioned & Unsanctioned Cloud Apps

The Cloud App Visibility Blindspot

SAFELY ENABLING MICROSOFT OFFICE 365: THREE MUST-DO BEST PRACTICES

REVOLUTIONIZING ADVANCED THREAT PROTECTION

Empowering Your Business in the Cloud Without Compromising Security

Top Five Security Must-Haves for Office 365. Frank Cabri, Vice President, Marketing Shan Zhou, Senior Director, Security Engineering

KEYS TO CLOUD APP SECURITY

State of Security Monitoring of Public Cloud

Secure Cloud Computing

The Cloud App Visibility Blind Spot

CASE STUDY. Global Airline Empowers Mobile Workforce for SaaS Apps while Reducing Risk

What is Security Intelligence?

ISSA Phoenix Chapter Meeting Topic: Security Enablement & Risk Reducing Best Practices for BYOD + SaaS Cloud Apps

INFORMATION PROTECTION

RSA Identity Management & Governance (Aveksa)

The 5 Steps to Cloud Confidence

Q1 Labs Corporate Overview

Changing the Enterprise Security Landscape

Definitive Guide. Cloud Access Security Brokers. Jon Friedman Mark Bouchard, CISSP

EDITION CLOUD REPORT HEALTHCARE AND LIFE SCIENCES LEAD IN FINDING AND PREVENTING SENSITIVE DATA LOSS

Assessment & Monitoring

End-user Security Analytics Strengthens Protection with ArcSight

INCREASINGLY, ORGANIZATIONS ARE ASKING WHAT CAN T GO TO THE CLOUD, RATHER THAN WHAT CAN. Albin Penič Technical Team Leader Eastern Europe

RSA Via Lifecycle and Governance 101. Getting Started with a Solid Foundation

Niara Security Intelligence. Overview. Threat Discovery and Incident Investigation Reimagined

2H 2015 SHADOW DATA REPORT

Executive s Guide to Cloud Access Security Brokers

IBM Security Strategy

Unified Security, ATP and more

IBM Cloud Security Draft for Discussion September 12, IBM Corporation

Niara Security Analytics. Overview. Automatically detect attacks on the inside using machine learning

Leading The World Into Connected Security. Dipl.-Inform., CISSP, S+ Rolf Haas Enterprise Technology Specialist Content Lead EMEA

Symantec Endpoint Security Management Solutions Presentation and Demo for:

WHITE PAPER SPLUNK SOFTWARE AS A SIEM

with Managing RSA the Lifecycle of Key Manager RSA Streamlining Security Operations Data Loss Prevention Solutions RSA Solution Brief

THE NEW FRONTIER FOR PROTECTING CORPORATE DATA IN THE CLOUD

Решения HP по информационной безопасности

White Paper. FFIEC Authentication Compliance Using SecureAuth IdP

Dynamic Security for the Hybrid Cloud

Stop advanced targeted attacks, identify high risk users and control Insider Threats

Securing and Monitoring Access to Office 365

Information Technology Policy

Securing the Cloud: Making Cloud an Opportunity to Enhance Security

Securing the Cloud with IBM Security Systems. IBM Security Systems IBM Corporation IBM IBM Corporation Corporation

The Evolution of Application Monitoring

Cloud App Security. Tiberio Molino Sales Engineer

Modular Network Security. Tyler Carter, McAfee Network Security

PCI Compliance for Cloud Applications

The Netskope Active Platform

Security Information & Event Management (SIEM)

Addressing the SANS Top 20 Critical Security Controls for Effective Cyber Defense

HP NonStop Server Security and HP ArcSight SIEM

Comprehensive real-time protection against Advanced Threats and data theft

ForeScout CounterACT CONTINUOUS DIAGNOSTICS & MITIGATION (CDM)

DIGITAL GUARDIAN 6. The Foundation of Enterprise Information Protection

Authored by: Brought to you by. Jim Reavis, President - Reavis Consulting Group Brandon Cook, Director, Product Marketing Skyhigh Networks

HIGH-RISK USER MONITORING

Rethinking IT and IT Security Strategies in an Era of Advanced Attacks, Cloud and Consumerization

Microsoft Enterprise Mobility Suite

WEBSENSE TRITON SOLUTIONS

Compliance Overview: FISMA / NIST SP800 53

JUNIPER NETWORKS SPOTLIGHT SECURE THREAT INTELLIGENCE PLATFORM

Trend Micro Cloud App Security for Office 365. October 27, 2015 Trevor Richmond

Speed Up Incident Response with Actionable Forensic Analytics

Ragy Magdy Regional Channel Manager MEA IBM Security Systems

HP ArcSight User Behavior Analytics

SECURE FILE SHARING AND COLLABORATION: THE PATH TO INCREASED PRODUCTIVITY AND REDUCED RISK

Be Fast, but be Secure a New Approach to Application Security July 23, 2015

TRITON AP-WEB COMPREHENSIVE REAL-TIME PROTECTION AGAINST ADVANCED THREATS & DATA THEFT

Active Visibility for Multi-Tiered Security. Juergen Kirchmann Director Enterprise Sales EMEA

Security Operation Centre 5th generation

Replacing Microsoft Forefront Threat Management Gateway with F5 BIG-IP. Dennis de Leest Sr. Systems Engineer Netherlands

The Identity Defined Security Alliance

Top 8 Identity and Access Management Challenges with Your SaaS Applications. Okta White paper

Cloud and VM Based Security

Achieving Actionable Situational Awareness... McAfee ESM. Ad Quist, Sales Engineer NEEUR

White paper. Four Best Practices for Secure Web Access

About SecuPi. Your business runs on applications We secure them. Tel Aviv, Founded

Sarbanes-Oxley Compliance for Cloud Applications

TRITON AP-ENDPOINT STOP ADVANCED THREATS AND SECURE SENSITIVE DATA FOR ROAMING USERS

Adaptive Intelligent Firewall - der nächste Entwicklungssprung der NGFW. Jürgen Seitz Systems Engineering Manager

May 14 th, 2015 INTRODUCING WATCHDOX. And The ABC s Of Secure File Sharing. Jeff Holleran VP Corporate Strategy BlackBerry

The Sophos Security Heartbeat:

CyberArk Privileged Threat Analytics. Solution Brief

Safeguarding the cloud with IBM Dynamic Cloud Security

Protecting Your Data From The Inside Out UBA, Insider Threats and Least Privilege in only 10 minutes!

Cloud Security Implications for Financial Institutions By Scott Galyk Director of Software Development FIMAC Solutions, LLC

Office 365 Cloud App Security MARKO DJORDJEVIC CLOUD BUSINESS LEAD EE TREND MICRO EMEA LTD.

SAP HANA Cloud Platform for SuccessFactors High Level Overview August 2013

Ben Hall Technical Pre-Sales Manager

1 Introduction Product Description Strengths and Challenges Copyright... 5

Unified Identity Management

Securely Yours LLC IT Hot Topics. Sajay Rai, CPA, CISSP, CISM

Is your SIEM ready.???

RSA Identity and Access Management 2014

CLOUD SECURITY. Rafal Los. Renee Guttmann. Jason Clark SOLUTION PRIMER. Director, Information Security, Accuvant

Transcription:

Cloud Access Security Broker Ted Hendriks HP Atalla Pre-Sales Consultant, APJ Region HP Enterprise Security Products

THERE IS A RAPID ADOPTION OF CLOUD APPS INTRODUCING NEW SET OF RISKS We are rapidly moving towards a Cloud majority world. However, Cloud adoption has also introduced a new set of risks, both internal and external: Cloud providers are not liable or accountable for enterprise data in the cloud Every cloud provider has different sets of controls for their cloud application Existing security solutions don t extend to cloud app 2

THE NEED FOR SAAS SECURITY Cloud providers are not accountable Existing security controls do not extend to the cloud End Point Network Any device is accessible to SaaS Entirely based on public networks Application Dependency on SaaS provider 3

MAIN CHALLENGES FOR SAAS SECURITY Access What happens if an employee s home computer is stolen? How can I limit access from unmanaged devices? Data How do I know if sensitive data is shared externally/publicly? How do I protect sensitive data when it is downloaded on to an unmanaged device? Breach What if a user s account is breached? What if a disgruntled employee decides to exfiltrate data? 4

ADALLOM IS A CASB AND IS CHOSEN BY LEADING COMPANIES Visibility Gain complete context into users, data devices, activities, access Governance Implement policies for access, activities and data sharing Protection Address risky activities, suspicious behaviors and threats 5

WHY ADALLOM? Integrates with multiple cloud applications Work with any user, network, any device (managed & unmanaged) Cloud Security Platform integrates with existing controls (DLP, SIEM etc.) Ease of deployment (less than 10 mins to deploy) Secure data at rest and data in motion 6

VISIBILITY, GOVERNANCE, PROTECTION Understand how files are being shared with collaborators Complete attestation and audit trails Address compliance with cloud DLP and ediscovery Data security - Encrypt sensitive files and manage orphans Gain insights into users, data, activities, access Visibility Governance Govern access, devices, activities and datasharing Discover more than 13,000 cloud apps, understand risks Protection Manage users including privileged and zombies Find anomalies and threats Identify risky behaviors Fingerprint baseline usage 7

OUR PLATFORM APPROACH Dashboard Audit Trails Reports Data Security ediscovery Usage and access Anomalous behaviors High-risk usage Security Incidents Flexible integrations API SmartProxy TM Hybrid Deeper, meaningful context Unmatched efficacy Actionable Insights Users Data Access Activity Location SmartEngine TM Advanced Heuristics Adallom Labs Visibility Governance Protection Extensible to DLP, SIEM and encryption solutions Adallom Cloud Application Security Platform 8

CHOICE OF DEPLOYMENT ARCHITECTURE DEPENDING ON USE CASE API Integration for normal usage Smart Proxy for high-security use cases Cloud apps Cloud apps API (data at rest) Managed device Scalable model Sits out of band (minimal performance impact) HP currently using this mode unmanaged device home device Monitors data in real time for more control and governance 9

COMPREHENSIVE SECURITY CONTROLS Over 13,000 discoverable apps with the ability to onboard advanced protection for any app in about 2 weeks Cloud application security platform Data Protection Compliance & Risks Access & Activities Threat Prevention Cloud Encryption/IRM Cloud Risk Reports Limit access by device, Anomaly detection Sharing control (3rd Cloud DLP IP, user, role Security incidents party and ecosystem) ediscovery Device pinning Security intelligence Govern access to data Reports on config Granular activity policies Heuristics engine Govern lifecycle of management data Encrypti on and IRM DLP SSO NAC SIE M On-premises controls 10

ADALLOM & HP SOLUTIONS 11

HOW TO DEPLOY Manage corporate-approved applications Periodic discovery of 13,000 cloud services with 60+ risk ratings Phase 1: Out-of-band Out-of-band visibility and governance Cloud-to-cloud API Phase 2: In-line prevention for access Control access based on device (managed/unmanaged), IP, location, user or role Access control proxy Phase 3: In-line prevention for specific use cases Control access, content and activities Allow Sales to download Box documents on unmanaged devices, but encrypt/irm Full Proxy 12

DISCOVERY OF SHADOW IT Adallom Discovery Database 13K+ SaaS Applications Risk score based on 60+ risk factor service assessment Details on top users and service activity Adallom Discovery - Largest and most accurate cloud services database Logs from network devices, firewalls, etc Enriches Adallom Discovery with 75M users worldwide and 1B+ web requests categorized per day. 13

DISCOVERY OF SHADOW IT Cloud security research IAM connector Deployment Options Logs from network devices, firewalls, etc +13,000 cloud applications On-premise +1 billion transactions per day Cloud-to-cloud discovery Cloud 14

EXAMPLE SHADOW IT REPORT ACME 1. How can Acme understand if its employees are using unsanctioned cloud applications 2. How can Acme benefit from all this information 1 340 unsanctioned services 2 Evaluate cost saving opportunity by consolidating services Discover new & better tools for your business 15 Assess level of risk

Ted Hendriks HP Atalla Pre-Sales Consultant, APJ Region HP Enterprise Security Products