How to Determine the Best IT Strategy for Business

Similar documents
Enabling Business Beyond the Corporate Network. Secure solutions for mobility, cloud and social media

Extending Threat Protection and Control to Mobile Workers with Cloud-Based Security Services > White Paper

Top 10 Reasons Enterprises are Moving Security to the Cloud

Cisco ASA and Cloud Web Security: Best-in-Class Network Security Combined with Best-in-Class Web Security

EXTENDING THREAT PROTECTION AND CONTROL TO MOBILE WORKERS

Guest Speaker. Michael Sutton Chief Information Security Officer Zscaler, Inc.

hybrid networks gaining technological and commercial agility from a new approach to networking

Mobile Security Solution BYOD

Say Yes to BOYD How Fortinet Enables You to Protect Your Network from the Risk of Mobile Devices

A Software-Defined WAN Is a Business Imperative

Improve Application Performance in the Hybrid Enterprise

COMLINK Cloud Technical Specification Guide CLOUD DESKTOP

White Paper: Nasuni Cloud NAS. Nasuni Cloud NAS. Combining the Best of Cloud and On-premises Storage

Reaping the Full Benefits of a Hybrid Network

Say Yes to BYOD How Fortinet Enables You to Protect Your Network from the Risk of Mobile Devices WHITE PAPER

Technology Trends in the Current Economic Scenario. A 3Com Presentation, Manoj Kanodia CEO

I D C T E C H N O L O G Y S P O T L I G H T. S e r ve r S e c u rity: N o t W h a t It U s e d t o Be!

Cloud, SDN and the Evolution of

The Fragmentation Challenge: Improving Enterprise Application Performance in a SaaS World

AGILE ANALYTICS IN THE CLOUD 93% ORACLE BUSINESS INTELLIGENCE CLOUD SERVICE EXECUTIVE SUMMARY

Mobile Device Management in the Systems Management Ecosystem. Katie Wiederholt, Dell Software

Readiness Assessments: Vital to Secure Mobility

Wireless Services. The Top Questions to Help You Choose the Right Wireless Solution for Your Business.

Riding technology waves

VIRTUALIZATION THE FOUNDATION OF CLOUD COMPUTING

next generation privilege identity management

Enabling Secure BYOD How Fortinet Provides a Secure Environment for BYOD

SOCIAL MEDIA MOBILE DEVICES CLOUD SERVICES INTERNET OF THINGS (IOT)

How To Handle A Threat From A Corporate Computer System

The BYOD Opportunity. Say Yes to Device Diversity and Enable New Ways to Drive Productivity WHITE PAPER

Cloud Roadmap to Success. October, 2014

A Brave. Who Owns Security in the Cloud? A Trend Micro Opinion Piece. February Written by Dave Asprey VP Cloud Security

Intelligent, Scalable Web Security

Nominee: Barracuda Networks

The Evolution of the Enterprise And Enterprise Security

Secure Your Mobile Device Access with Cisco BYOD Solutions

What does the Cloud mean to Enterprise Security? PREPARING YOUR COMPANY FOR MOBILE, SOCIAL, AND CLOUD SECURITY

Seven Reasons to Embrace Cloud Security

Buyers Guide to Web Protection

Configuration to the cloud Cloud configurator: Safe to Fly?

SSL Encryption and Traffic Inspection ADDRESSING THE INCREASED 2048-BIT PERFORMANCE DEMANDS OF 2048-BIT SSL CERTIFICATES

10 Threats to Successful. Enterprise Endpoint Backup

Securing Your Journey to the Cloud. Managing security across platforms today and for the future. Table of Contents

How To Decide If You Should Move To The Cloud

Keith Luck, CISSP, CCSK Security & Compliance Specialist, VMware, Inc. kluck@vmware.com

Mitigating Web Threats with Comprehensive, Cloud-Delivered Web Security

WHITE PAPER RUN VDI IN THE CLOUD WITH PANZURA SKYBRIDGE

2014 Authentication Survey Executive Summary. How Organizations Are Responding to Mobile and Cloud Threats

Five Best Practices for Improving the Cloud Experience by Cloud Innovators. By Hitachi Data Systems

Protecting Content and Securing the Organization Through Smarter Endpoint Choices

Why Cloud Security? FIVE WAYS CLOUD SECURITY IS BETTER AT PROTECTING AND ENABLING YOUR BUSINESS. Why Cloud Security?

Top Five Considerations for Building a Cloud-Ready Network for Distributed Enterprises

Cisco Cyber Threat Defense - Visibility and Network Prevention

The Future of Network Security Sophos 2012 Network Security Survey

F5 and VMware. Realize the Virtual Possibilities.

CIO s Guide to Make $ense of Data Center Modernization

Securing Dispersed Networks

Fighting Advanced Threats

Addressing APTs and Modern Malware with Security Intelligence Date: September 2013 Author: Jon Oltsik, Senior Principal Analyst

Return On Investment

Advantages of Managed Security Services

Buyers Guide to ERP Business Management Software

The Necessity Of Cloud- Delivered Integrated Security Platforms

Best Practices for Secure Mobile Access

Live traffic feeds are increasingly being used by the modern enterprise to gain visibility for security and operations management

EOH Cloud Mobile Device Management. EOH Cloud Services - EOH Cloud Mobile Device Management

APT Protection Via Data-Centric Security. Alan Kessler President and CEO Vormetric

SIEM is only as good as the data it consumes

Delivering Control with Context Across the Extended Network

F5 PARTNERSHIP SOLUTION GUIDE. F5 and VMware. Virtualization solutions to tighten security, optimize performance and availability, and unify access

BYOD Networks for Kommuner

The Cloud for Productivity and Mobility

Fundamentals of Secure Collaboration in the Mobile Workforce. Sinisha Patkovic

REVOLUTIONIZING ADVANCED THREAT PROTECTION

Best Practices for Building a Mobility Strategy

Data- centric Security: A New Information Security Perimeter Date: March 2015 Author: Jon Oltsik, Senior Principal Analyst

Who Owns Security in the New Ambient Cloud?

Support for a Diverse IT Environment

Addressing Advanced Web Threats. Addressing Advanced Web Threats: Protect Your Data and Brand

Cisco Virtualization Experience Infrastructure: Secure the Virtual Desktop

Scott Lucas: I m Scott Lucas. I m the Director of Product Marketing for the Branch Solutions Business Unit.

DETECTING THE ENEMY INSIDE THE NETWORK. How Tough Is It to Deal with APTs?

Building a Business Case:

Complex solutions aren t solutions. We make security for the real world for the pragmatic enterprise. Simple security is better security.

WAN security threat landscape and best mitigation practices. Rex Stover Vice President, Americas, Enterprise & ICP Sales

Top Cloud Solutions For SMBs

The Evolution of Traditional Telecoms to IP Communications

Transform the datacenter. Ovidiu Pismac MCSE Security, CISSP, MCITP Virtualization, MCTS Forefront Microsoft Romania

Simple, scalable, secure Complete BYOD solution Michael Lloyd HP- Enterprise Group

What are your firm s plans to adopt x86 server virtualization? Not interested

Cisco & Big Data Security

State of Security Monitoring of Public Cloud

Cyber Security. John Leek Chief Strategist

Why Switch from IPSec to SSL VPN. And Four Steps to Ease Transition

The Top Ten Advantages of Using Cisco Enterprise Networking in 2014

Cisco ISR Web Security with Cisco ScanSafe

Application Delivery for Virtualized Infrastructures

investments of time and resources, at a cost that can be prohibitive. Oracle Business Intelligence

Content Security: Protect Your Network with Five Must-Haves

Datamation. 5 Reasons to Consider SaaS for Your Business Applications. Executive Brief. In This Paper

Transcription:

Cloud-based S(ecurity)aaS enables business strategy Jason Georgi Director, Value Management Office

Speaker Bio Jason Georgi Director of Zscaler s Value Management Office Accomplished technology innovation strategy expert, led GE s Global Network Council and Infrastructure-as-a-Service programs. 20+ years diverse IT infrastructure experience.

Calling all thought leaders How many of you have been the voice of No for IT decisions? How many of you would like to be the hero by saying Yes! securely Tomorrow s IT needs bold, disruptive direction

Applying strategy means answering 3 key questions 1 What are top priorities for today s CEOs? 2 How do business priorities translate to IT strategy? 3 How does IT strategy impact the network & security

Today s business outcomes CEO priorities CIO priorities 1 Business agility 1 Simplification 2 Innovation 2 Cost Reduction 3 Competitive Advantage 3 User Experience

Common themes

Where is today s C-suite looking to enable strategy? 1 Cloud Computing 2 Internet of Things (IoT) 3 Growth Markets CIOs need a cloud strategy or risk looking less progressive Enable the business for cloud & mobility Future-proof investments with rapidly-evolving landscape Data Center consolidation Provide secure access from any device, any time, anywhere All present new challenges

Oh, and by the way IT and info sec now have board-level visibility The fear of exfiltration of intellectual property and reputation damage due to breach and advanced persistent threats grows with every story

Security needs and coverage have evolved

In the past, security wasn t such a big deal DATA CENTER Secure THE INTERNET Small and simple... no problem THREATS relatively few... Viruses, worms... CORPORATE NETWORK Secure Desktop HQ Regional offices...proxies were employee policing tools

Cloud adoption is shifting workloads

Cloud adoption is shifting workloads Internet gateway Internet Put users as close to workloads as possible Eliminate coverage gaps for mobile devices Mitigate circumventing security Reduce WAN-backhaul of Internet traffic Mobile HQ Remote Offices Perimeter around the Data Center

Today the world is distributed, the cloud is dominant and threats are vastly more advanced DATA CENTER Secure THE INTERNET At risk THREATS scary, advanced Malware APT CORPORATE NETWORK At risk Desktop Laptop PEOPLE & ASSETS EVERYWHERE At risk Laptop Mobile IoT Botnets Exploits HQ Regional offices Branches/ stores Factories On-the-go Home offices...proxies require advanced security and must be ubiquitous

What is the answer for Internet security?

Not appliances: they force you into tough choices Backhauling traffic through the data center is slow and costly Installing boxes at many locations is expensive and complex HQ HQ Regional offices Regional offices Branches / stores Branches / stores Factories Data center Internet Factories Internet On-the-go On-the-go Mobile Mobile mobile users often go unprotected

It's too expensive, complex and slow to deploy all of this security hardware everywhere Here s a real-world example Source: Global 50 company, Actual Internet Gateway diagram

Cloud-based Internet security puts a perimeter around the Internet Branches / stores Home offices Exploits Botnets APT Malware HQ On-the-go Regional offices Factories this is a strategy, not a spot solution

Why cloud for internet security?

Why not? Other business-critical applications are moving (or have already moved!) to the cloud Email & Collaboration Evolution in workload placement is destroying the status quo and the traditional perimeter CRM, B-I, ERP File Storage App Workloads

Cloud-based internet security solves today s challenges Cloud-enabled global networks Added layer of security Hardware obsolescence and consolidation Makes organizations more adaptable and agile Mobile & BYOD Guest WiFi protection

Where is cloud for internet security an ideal fit? Any organization! Adds most strategic value Cloud-first organizations Distributed enterprises Global footprint Heavy road warrior & mobile population Need security without UX compromise

The TCO for Security as a Service is up to 80% lower than onpremise appliances 10% purchase costs 90% operating costs 21

Applying the concept

Protecting the distributed enterprise Remote VPN User Corporate Data Center Centralized visibility and control Limited deployment of security appliances Gateway stack provides effective protection for those on net HQ

Protecting the distributed enterprise Expansion puts additional strain on gateways Road Warrior Remote VPN User Corporate Data Center Challenging providing same level of security for road warriors User experience suffers in large and/or long-haul offices HQ Long-haul

Protecting the distributed enterprise Cloud-enabled networks = local internet breakouts Road Warrior You re only as strong as your weakest point Remote VPN User Corporate Data Center Expensive and complicated to deliver the appliance stack where needed HQ Long-haul

Protecting the distributed enterprise It doesn t have to be this expensive or complicated Road Warrior Remote VPN User Corporate Data Center HQ

Protecting the distributed enterprise Local breakouts wherever you need them Uncompromised, Ubiquitous protection Road Warrior Remote VPN User Corporate Data Center Reduce MPLS WAN cost and footprint DMZ & Gateway Simplification/Con solidation HQ

In summary

Strategy enabled Network & Security Outcome CIO Priorities CEO & Business Priorities Secure, local Internet breakouts Cloud-based Internet Security as a Service Data Center and DMZ Consolidation Improved User Experience leads to more productive workforce, anywhere, anytime. Simplification of IT infrastructure equates to less overhead, reduced cost and complexity Cost Reduction and Avoidance means the business can increase R&D funding Agility achieved through a more dynamic workforce and ability to penetrate markets quickly Competitive Advantage faster market penetration via nimble workforce and reduced IT cost puts money back into business Innovation through enabling IoT and improved R&D from IT cost reduction

It s time to be BOLD Navigating business strategy requires thought leaders Today s threats put IT & Information Security on the front lines C-suite knows what s possible, so the find a way, or we'll find someone who will ultimatums exist Don't let it scare you, let it inspire you to: Challenge the status quo (it's dead anyway) Be disruptive Keep your seat at the table!

Questions?

Thank you!